-
Notifications
You must be signed in to change notification settings - Fork 76
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Scanning of container images #301
Comments
Another reason for adding another repo is that dockerhub are increasingly implementing tighter quota limits. However, since the demo images are exactly that, rather than for production, in most cases I doubt users would hit those limits. Possibly if coming from within a large corporate network. OpenSource projects can apply to join dockerhub's community programme here However this doesn't detract from the idea of trying to get some additional container scanning done cheaply. |
We can enhance the workflow by integrating automated vulnerability scanning with Docker Scout. Utilizing the For instance, to generate a markdown report, you can run the following command: docker scout cves <image-name> --format markdown > report.md |
Thanks for the suggestion, @BusyKhalid. Would you be willing to contribute a PR for this feature? |
Sure, currently I’m working on updating the Docker files. I’ll add a separate workflow for scanning and report generation to keep everything organized. |
As I set up workflows for the demos, I’d like to confirm the preferred approach: would it be more effective to create individual workflows for each demo, or should I design a single workflow that encompasses all demos? Any guidance would be greatly appreciated. |
I think a general workflow/job that runs for each demo using a matrix (or a similar approach) would be ideal. It should be easy to add future demos (e.g., by adding a value to a matrix). |
I’ll go with your approach. |
Having images that are scanned for vulnerabilities provides more confidence for users wanting to run or adopt our demo images
One approach I've used in the past is to post to quay.io (in addition to docker.io).
I believe quay.io is free for public opensource repositories.
See https://docs.redhat.com/en/documentation/red_hat_quay/3/html-single/about_quay_io/index#vuln-database-clair
There may also be other free scanners that could be used.
Performing scanning will mean we should review the results, and appropriately mitigate the findings. Regular updates would likely be needed to base images etc.
The text was updated successfully, but these errors were encountered: