Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add action or workflow for image scanning #51

Open
devtobi opened this issue Oct 30, 2024 · 4 comments
Open

Add action or workflow for image scanning #51

devtobi opened this issue Oct 30, 2024 · 4 comments
Labels
enhancement New feature or request

Comments

@devtobi
Copy link
Member

devtobi commented Oct 30, 2024

Solution for image scanning must be found.
Ideally before tagging images tolatest or doing a release, the image (e.g. labelled unstable) should be tested.

@devtobi devtobi added the enhancement New feature or request label Oct 30, 2024
@hupling
Copy link
Collaborator

hupling commented Oct 30, 2024

https://artifacthub.io/packages/helm/it-at-m/refarch-gateway?modal=security-report Images werden hier gescannt auf Artifcthub

@devtobi
Copy link
Member Author

devtobi commented Oct 31, 2024

Great, does this only work for helm charts or also for individual docker images. I think before creating or updating a helm chart with image versions, we should make sure the images themselves are "safe". If we only get this information after updating the helm chart, this is too late in my opinion.

@hupling
Copy link
Collaborator

hupling commented Nov 11, 2024

The internal Openshift-Team wants to install rhacs (stackrox). So all images are scanned interanal

@klml
Copy link
Member

klml commented Nov 11, 2024

@hupling regardless of whether we have to scan images internally or not, we also have to scan them publicly here!

@hupling hupling moved this to Open in SPS Nov 11, 2024
@hupling hupling added this to SPS Nov 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
Status: Open
Development

No branches or pull requests

3 participants