canonical / charmed-kubeflow-workflows

Repository that containes GitHub workflows and shareable configs for Charmed Kubeflow
0 stars 0 forks source link

feat: report vulnerabilities as GH issues and scan images from registry #80

Closed DnPlas closed 1 month ago

DnPlas commented 1 month ago

This PR brings all the changes from KF-6331-dev-branch into main.

This commit adds get-published-images-scan-and-report.yaml, a re-usable workflow that enables repositories to scan images from a public registry (in the case of the Analytics team it defaults to charmedkubeflow) and reports back the security vulnerabilities as Github issues. This workflow is intended to be used on demand (using a workflow dispatch) and on schedule, as it will be used for continuous testing of the published images a rock repository generates.

This re-usable workflow can be used for reporting security vulnerabilities via Github issues. It takes the issue title, image-name, and issue-labels as inputs, and in turn:

Please NOTE this workflow assumes the existence of vulnerability reports as artefacts of a workflow run; that is, it expects artefacts named trivy-report- to be present in the sabe workflow run.

Bump the version of this actions to be up to date with the latest.

All changes have been tested individually in their respective PRs.