-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add research-vuln-scan workflow #23
Conversation
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
The rate limit of the github authentication makes it really flaky to run this workflow: https://github.com/greenbone/opensight-postgres/actions/runs/11664302625/job/32476582882 |
🔍 Vulnerabilities of
|
digest | sha256:39d4ab76b1f1a427857574a20e88a2117ff08b665ab5ddfdaf8db7c9da85f1cf |
vulnerabilities | |
size | 154 MB |
packages | 205 |
📦 Base Image debian:12-slim
also known as |
|
digest | sha256:c00d13c9aa5d1acfa44e5ababbb8d1f5ac53fa94bc2f993070ccea2dcaf5aa64 |
vulnerabilities |
# Dockerfile (2:2)
FROM postgres:${POSTGRES_VERSION}
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
Description
|
Overview
|
docker-scout action has too much locations in its sarif file: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Due to our switch to self-hosted registry, we would need to switch to self-hosted runner and adjust the image location in the workflow.
Afterwards I would merge the changes ...!
Co-authored-by: Jaspar Stach <[email protected]>
Co-authored-by: Jaspar Stach <[email protected]>
Co-authored-by: Jaspar Stach <[email protected]>
Co-authored-by: Jaspar Stach <[email protected]>
Now the image should be fetched from harbor(prebuilt by the push.yml workflow) and it's updated to run on self-hosted-generic. |
What
Compare different tools for scanning docker images for CVE's.
Why
We want to use the best CVE scanner for our docker images: https://jira.greenbone.net/browse/DEVOPS-1249
References
https://jira.greenbone.net/browse/DEVOPS-1249
Checklist