-
Notifications
You must be signed in to change notification settings - Fork 897
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
container image scan annotation should always write #15013
Comments
@miq-bot assign enoodle |
Let's review and comply with: openshift/openshift-docs#4206 |
Good point. It is a bit dangerous to assume "ownership" of the deny-execution annotation since it's not namespaced. The proposed annotation will solve this issue much more generally. |
I'm trying to understand if there are situations where an image that had a compliance problem will become compliant again. Surely when we have the hash of the image it can not become compliant again?
I'm not sure, are there still cases when we pull the image by name alone? |
Right. Once it's not compliant we don't expect it to become compliant again. However, there may be different tools external to OpenShift that have different thresholds or criteria (aka policy) for compliance, thus my namespace comment. |
PR merged. New issue to track this: #15212 |
@moolitayer @enoodle IMO when setting |
I found this answer: I think it is to safest to assume both (also due to your second bullet)
I see the discussion on this one moved to the PR |
When this code[1] annotates an image, it should annotate the boolean every time, true or false, not just when true. This enables other tools to know if the scan has passed through policy while providing the same functionality. This would also require an update to the default policy since the action only is triggered on "high" or "critical" result.
cc @enoodle @simon3z
[1]
manageiq/app/models/container_image.rb
Line 96 in 6f8106a
The text was updated successfully, but these errors were encountered: