-
Notifications
You must be signed in to change notification settings - Fork 10.1k
Add image scan script #19804
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Add image scan script #19804
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: ivanvc The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Oof, inconsistent dependencies. I'll draft and will undraft once I address those 😅. |
Signed-off-by: Ivan Valdes <[email protected]>
Signed-off-by: Ivan Valdes <[email protected]>
35ad5ef
to
6461725
Compare
/test pull-etcd-verify |
Adding Trivy as a tool bumped many indirect dependencies, resulting in changes to many |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted filessee 21 files with indirect coverage changes @@ Coverage Diff @@
## main #19804 +/- ##
==========================================
- Coverage 68.86% 68.78% -0.08%
==========================================
Files 421 421
Lines 35863 35858 -5
==========================================
- Hits 24696 24664 -32
- Misses 9746 9764 +18
- Partials 1421 1430 +9 Continue to review full report in Codecov by Sentry.
🚀 New features to boost your workflow:
|
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
My understanding is that you only introduce a new dependency on |
I opened #19819. But I wonder if it makes more sense to open a pull request to only bump the existing dependencies without introducing Trivy. Let me know, and I can do that instead. Edit: I opened #19821, which does the latter. |
@ivanvc Probably I did not say it clearly in my previous comment. Adding dependency
But I see that you bumped many other dependencies as well in this PR. Can you move all other dependencies bumping into a separate PR? |
Please rebase this PR. |
I'll get back to this shortly. I'm a bit busy and reconsidering how we'll implement this in the stable release branches. Either way, the trivy dependency is required, so it's good that we bumped the indirect dependencies. |
@ivanvc: The following tests failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Introduce a new script that can run on stable branches that checks the vulnerabilities for the latest tag (from the given branch).
Adds Trivy as a tool dependency, to keep track of the latest released version.
A periodic Prow job will later execute this. We'll get alerts when a CVE is found in our images, either by a direct vulnerability or for a dependency with a reported vulnerability of high or critical severity.
Part of #19363.
Please read https://github.com/etcd-io/etcd/blob/main/CONTRIBUTING.md#contribution-flow.