-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add security-scan for CRT #13627
add security-scan for CRT #13627
Conversation
I'm requesting review of the Docker aspects from @jasonodonnell. |
Dockerfile
Outdated
@@ -1,4 +1,4 @@ | |||
FROM alpine:3.14 as default | |||
FROM alpine:3 as default |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks fine as it will always pull in the latest version of 3.x, but my only concern is it's difficult to tell what version of Alpine was used in the build. As long as we can keep a receipt of that, and we're okay with always rolling forward, then this should be fine.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah okay, I got mixed up with Security's recommendation and another product's recommendation. They asked to use alpine:3
but Security's recommendation was to bump to alpine:3.15
-- I can definitely make that change to be more prescriptive. Great call out.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @claire-labry! Do you need someone on the Vault team to merge this?
* add security-scan * updating the alpine version * clean up * update the alpine version to be more prescriptive
* add security-scan * updating the alpine version * clean up * update the alpine version to be more prescriptive
* add security-scan * updating the alpine version * clean up * update the alpine version to be more prescriptive
* add security-scan * updating the alpine version * clean up * update the alpine version to be more prescriptive
What this PR does is it enables security scanning (owned by the Security team) for this repository. This is a part of the Common Release Tooling (CRT) effort which
enables a consistent workflow for security scanning that can be used across products and services. It provides a single abstraction point to allow us integrate our own scanning capabilities, as well as leverage external tools and APIs from vendors, open source, or free-to-use projects.
Learn more about HashiCorp's security-scanner here.The security-scan tests are passing successfully:
security-scan-binaries
security-scan-containers
You'll also see that I had to upgrade the Dockerfile to use alpine:3 as the older version caused the security-scanner to pick up some vulnerabilities, CVEs to be specific. See error outputs here that arose. We worked with Security and they scanned different versions of the alpine base image and concluded that version 3 picks up the most stable + clean version of alpine and suggested to upgrade to that version to avoid any friction and potential vulnerabilities in the future and simply tidy up the container.
I ran into some merge conflicts, but resolved those and will be happy to squash and merge once this PR is approved.
If anyone needs any further clarification or if nothing makes sense, feel free to comment or reach out to me! ❤️