-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Do periodic license scanning on images and build artifacts #9436
Comments
/help |
@killianmuldoon: GuidelinesPlease ensure that the issue body includes answers to the following questions:
For more details on the requirements of such an issue, please see here and ensure that they are met. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Thx for all the research that went into this so far and writing up a very clear summary. Did you mean controller & clusterctl images? I think the clusterctl binaries should be covered by the "code-level" scan. I think if someone has time to take this on, it would be probably best invested in pushing the community discussion forward, so that Cluster API can eventually just share a solution with the wider community. |
I also mean the binary, though I basically agree it should be covered by the code level scan. It wouldn't hurt to find something that covers all of our release artifacts. |
q: does this cover both binaries (clusterctl) and images? |
The issue does, but the tooling may or may not. |
ACK, let's keep this in mind while we assess different tools /triage accepted |
/kind feature |
This issue is labeled with You can:
For more details on the triage process, see https://www.kubernetes.dev/docs/guide/issue-triage/ /remove-triage accepted |
/priority important-soon |
Another option to consider https://github.com/google/go-licenses |
This issue is labeled with You can:
For more details on the triage process, see https://www.kubernetes.dev/docs/guide/issue-triage/ /remove-triage accepted |
/triage accepted |
Following on from #9181 there may be a need in CAPI to find a good way to scan for forbidden licenses in our release artifacts - namely our controller images and the clusterctl binaries.
There are a few tools out there that can do such a scan:
Trivy
distroless:nonroot
. These are not being picked up by the other scanners.Snyk
Fossa
There's still ongoing conversation in the Kubernetes community about this.
My preference would be to defer the conversation for CAPI until we have some idea of the preferred direction from the community. None of the tools above seem to be a great fit for now. If someone has time to take this on though it could be really helpful for CAPI and the broader community.
The text was updated successfully, but these errors were encountered: