Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[discussion] Should automatic vulnerability reports be enabled on_push? #82

Open
DnPlas opened this issue Oct 16, 2024 · 0 comments
Open

Comments

@DnPlas
Copy link
Contributor

DnPlas commented Oct 16, 2024

Context

More context in #69, specifically in #69 (comment), but bringing the last discussion to this new issue so we can close that other one.

Discussion

Should automatic reports be enabled on_push? - Right now, most (if not all) rocks repositories are scanning images on_push and uploading the vulnerability reports, but:

  • Those workflows will not fail even if a vulnerability is found
  • The results of those scans are not monitored by the team

This can be solved by relying on the scheduled workflow, BUT, the scheduled workflow only scans and reports published images. On the other hand, not enabling this would ensure that the CI is always green and publishing images regardless of the vulnerabilities.

#74 shows an example of how this can be added and be left for us to enable it whenever we call get-rocks-modified-and-build-scan-test-publish.yaml in each of the rocks repositories. In this workflow run, the execution shows an example of the feature available, but disabled (as we are not passing the report-vulnerabilities: true to the workflow). On the other hand, this is an example run of the same workflow, but enabling the reports, as seen here. This would be what could happen on_push if we decide that it is worth adding this.

@DnPlas DnPlas changed the title [discussion] Should automatic vulnerability reports be enabled on_push? [discussion] Should automatic vulnerability reports be enabled on_push? Oct 16, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant