Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add container vulnerability scanning for the built/published ACA-Py images. #2087

Closed
WadeBarnes opened this issue Jan 24, 2023 · 12 comments
Closed
Labels
enhancement New feature or request help wanted Extra attention is needed

Comments

@WadeBarnes
Copy link
Contributor

PR #2076 added support for building and publishing ACA-Py images. The initial implementation just builds and publishes the images.

It would be a great enhancement to have these containers scanned on a regular basis (and possible during the builds) for vulnerabilities.

@WadeBarnes WadeBarnes added enhancement New feature or request help wanted Extra attention is needed labels Jan 24, 2023
@WadeBarnes
Copy link
Contributor Author

WadeBarnes commented Jan 24, 2023

@ryjones, Does Hyperledger have any existing tools and processes for this? Are there any other projects doing this?

@ryjones
Copy link
Member

ryjones commented Jan 24, 2023

@WadeBarnes I think you can choose from a lot of free ones, we don't have a policy

@swcurran
Copy link
Contributor

Narrowing to container images seems to give this list. Sysdig and Snyk are the names I recognize, but not sure about which to use. Opinions?

Need to verify their use/pricing for open source projects.

@ryjones
Copy link
Member

ryjones commented Jan 24, 2023

@pradeepp88
Copy link
Contributor

I created an acapy image with the new Dockerfile from the docker folder, uploaded it to Dockerhub and scanned it with Snyk tool. It was showing to have lot of vulnerabilities arising from Debian-buster base image. The number of vulnerabilities went down drastically, when changing the base image from python:{python_version}-slim-buster to python:{python_version}-slim. Used Python version 3.8. The same is the case for all the slim-buster images.

@WadeBarnes
Copy link
Contributor Author

@pradeepp88, Did you try it with Python 3.9? The new GHA workflows only produce images for Python 3.6 (for legacy test purposes) and Python 3.9. The Python 3.6 image is just being created to make side-by-side testing easier before testing the Python 3.9 image.

@WadeBarnes
Copy link
Contributor Author

WadeBarnes commented Jan 26, 2023

@pradeepp88, it would also be interesting to compare the results when using 3.9-slim-bullseye. We might need to switch base images. Thanks for trying this out.

@pradeepp88
Copy link
Contributor

@WadeBarnes I have tested the images with python:3.9-slim-bullseye and found 0 critical vulnerabilities. I tested in both Qualys and Synk and got the same results. So created a PR #2105 to update the base images from slim-buster to slim-bullseye version. Please review.
Looking for feedback from the community on the vulnerability scanning tool to be used. I checked Snyk, it is good and matches the report generated by enterprise scanning tools. Thanks.

@swcurran
Copy link
Contributor

swcurran commented Feb 1, 2023

Thanks @pradeepp88 — great stuff. Much appreciation for the work and conclusions.

@WadeBarnes
Copy link
Contributor Author

thanks @pradeepp88, the related PR updating the base images has been merged.

ryjones added a commit that referenced this issue Aug 14, 2023
Addresses #2087 

Signed-off-by: Ry Jones <[email protected]>
@ryjones
Copy link
Member

ryjones commented Aug 14, 2023

@WadeBarnes does #2417 address this completely?

ryjones added a commit that referenced this issue Aug 14, 2023
Addresses #2087

Signed-off-by: Ry Jones <[email protected]>
@WadeBarnes
Copy link
Contributor Author

Addressed with #2418

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

4 participants