-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Scan binaries for dependency problems and gate/report them #24
Comments
This may not be the answer you're looking for... I pulled the After that, I then ran
at the top of the tree, and
to generate the However, it did error out with:
For it to error out worries me, because it makes me wonder what Although you're running the two processes separately ( There may be a gopher who is able to take this a bit further. I thought I'd note this much for the conversation's sake. |
(Edit: Sorry, sent too soon) I haven't looked closely at your build process here yet, but I see that
Building from source with a go.mod available would allow you to run the first-party |
Thanks! I'm a Golang neophyte myself, but I'm sure these notes will make more sense to someone with more experience (or me when I circle back around to work on this myself in the future)! |
I just realized that I have no idea if Noting this for the conversation/future selves. |
@JeanMarie-TTS points out that since we're now distributing our own version of the Caddy binary that includes our selected plugins, we should have a process in place to check that we don't release binaries created from vulnerable dependencies.
Trivy has the ability to scan both Go binaries (no dependencies) and Go modules (including dependencies). I'm unsure how to generate a
go.mod
as a side effect of compiling our binary withxcaddy
; someone with more golang experience probably knows how to do that. Even if we can't do that directly by customizing Caddy's compilation process, apparently it's possible to extract the necessary info from a Go binary.We should incorporate a scan by Trivy into our GitHub Action workflow that recompiles the binary nightly, and only make a PR adding the binary if the scan is clean.
Ideally, we'd also have a nightly workflow to check for vulnerabilities in our most recent existing binary, and make a vulnerability report if anything is found.
The text was updated successfully, but these errors were encountered: