-
Notifications
You must be signed in to change notification settings - Fork 4
fix: known vulnerabilities (reported in #29) #22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: known vulnerabilities (reported in #29) #22
Conversation
|
I built the Docker image, scanned it with Scout, and the vulnerabilities are gone.
The GitHub Action also ran successfully as expected. |
|
We don't want to ignore vendor (go dependencies, this protect us against some reference disappear in repo of lib that we rely on, this is an idiomatic practice in go), neither yarn cache (we use the zero install pattern with yarn berry). Also not having in the cache doesn't means they won't be downloaded exactly the same way. To upgrade yarn dependencies, you can force using the |
|
I think you're scan miss something, in the latest stage of image (the only one that is used when deployed), there is only binaries, so he can't detect it, but it's actually embedding the same yarn packages, just not as plain files in intermediate layer |
|
@devthejo |
It’s hard to explain why Scout could scan it, but it even listed the exact package versions, so I don’t think it scanned incorrectly. |
We should not modify the cache package without modifying the yarn.lock. |
You are right. I don’t have enough evidence to confirm the issues are fully fixed. They just no longer show up in the scan.
I’ve fully updated |
|
LGTM :-) |

This pull request fixes a total of 7 vulnerabilities in current dependencies, including 3 critical and 4 high-severity CVEs found in the latest Docker image (1.5.0).
https://codeberg.org/devthefuture/dockerfile-x/issues/29
It’s a messy set of 2,981 changed files (mostly Go and NodeJS dependencies), but this action is needed to mitigate these security risks.
Additionally, this pull request cleans up the Dockerfile and Makefile used to build Docker images. It also adds a GitHub Action to run tests when a pull request is updated or code is pushed to the master branch.