Closed praveenkumar closed 7 months ago
I'm unimpressed that the first step we have to take (as all other OpenShift projects) is to disable security checks for the whole vendor/
directory. There is a lot of code we run in there, and this is code we never really look at, and we also tell our security scanner not to look at it?
How many snyk issues are reported if we don't ignore vendor/
?
We also have a tools/vendor
directory.
How many snyk issues are reported if we don't ignore
vendor/
?
https://prow.ci.openshift.org/view/gs/test-platform-results/pr-logs/pull/openshift_release/48942/rehearse-48942-pull-ci-crc-org-crc-main-security/1775530026075164672 check the logs this is run as part of rehearse job when we didn't added any .snyk
file.
We also have a tools/vendor directory.
yes, will add that but as of now there is no vulnerability found in tool/vendor
.
yes, will add that but as of now there is no vulnerability found in
tool/vendor
.
There are a few matches for tools/vendor
in the prow link you gave
There are a few matches for
tools/vendor
in the prow link you gave
That was for rehearse job which I provided you for this PR link is https://prow.ci.openshift.org/view/gs/test-platform-results/pr-logs/pull/crc-org_crc/4102/pull-ci-crc-org-crc-main-security/1775844349024669696 one.
There are a few matches for
tools/vendor
in the prow link you gaveThat was for rehearse job which I provided you for this PR link is https://prow.ci.openshift.org/view/gs/test-platform-results/pr-logs/pull/crc-org_crc/4102/pull-ci-crc-org-crc-main-security/1775844349024669696 one.
The rehearse job was getting some results in tools/vendor
, this PR link is not showing any results in tools/vendor
, but I don't understand why.
There are a few matches for
tools/vendor
in the prow link you gaveThat was for rehearse job which I provided you for this PR link is https://prow.ci.openshift.org/view/gs/test-platform-results/pr-logs/pull/crc-org_crc/4102/pull-ci-crc-org-crc-main-security/1775844349024669696 one.
The rehearse job was getting some results in
tools/vendor
, this PR link is not showing any results intools/vendor
, but I don't understand why.
May be because of https://docs.snyk.io/snyk-cli/commands/test#exclude-less-than-name-greater-than-less-than-name-greater-than-...greater-than which mention around how exclude
work in this case don't scan for any directory with vendor
name?
There are a few matches for
tools/vendor
in the prow link you gaveThat was for rehearse job which I provided you for this PR link is https://prow.ci.openshift.org/view/gs/test-platform-results/pr-logs/pull/crc-org_crc/4102/pull-ci-crc-org-crc-main-security/1775844349024669696 one.
The rehearse job was getting some results in
tools/vendor
, this PR link is not showing any results intools/vendor
, but I don't understand why.May be because of https://docs.snyk.io/snyk-cli/commands/test#exclude-less-than-name-greater-than-less-than-name-greater-than-...greater-than which mention around how
exclude
work in this case don't scan for any directory withvendor
name?
Ah yes that's likely. I was suspecting a behaviour like this, this is why I searched for https://docs.snyk.io/scan-with-snyk/import-project-repository/excluding-directories-and-files-from-the-import-process#syntax-to-use-to-exclude-files-and-directories-from-snyk-code-testing , which rather unhelpefully says the opposite!
# Exclude a single directory. For example, - src/lib
- source/directory_name
# Exclude all files and directories in a specific directory. For example, - tests/
- directory_name/**
There are a few matches for
tools/vendor
in the prow link you gaveThat was for rehearse job which I provided you for this PR link is https://prow.ci.openshift.org/view/gs/test-platform-results/pr-logs/pull/crc-org_crc/4102/pull-ci-crc-org-crc-main-security/1775844349024669696 one.
The rehearse job was getting some results in
tools/vendor
, this PR link is not showing any results intools/vendor
, but I don't understand why.May be because of https://docs.snyk.io/snyk-cli/commands/test#exclude-less-than-name-greater-than-less-than-name-greater-than-...greater-than which mention around how
exclude
work in this case don't scan for any directory withvendor
name?Ah yes that's likely. I was suspecting a behaviour like this, this is why I searched for https://docs.snyk.io/scan-with-snyk/import-project-repository/excluding-directories-and-files-from-the-import-process#syntax-to-use-to-exclude-files-and-directories-from-snyk-code-testing , which rather unhelpefully says the opposite!
# Exclude a single directory. For example, - src/lib - source/directory_name # Exclude all files and directories in a specific directory. For example, - tests/ - directory_name/**
Yes that's confusing, I added https://docs.snyk.io/snyk-cli/commands/test#exclude-less-than-name-greater-than-less-than-name-greater-than-...greater-than as reference doc so that we are sure how it is ignored.
Yes that's confusing, I added https://docs.snyk.io/snyk-cli/commands/test#exclude-less-than-name-greater-than-less-than-name-greater-than-...greater-than as reference doc so that we are sure how it is ignored.
@praveenkumar: The following tests failed, say /retest
to rerun all failed tests or /retest-required
to rerun all mandatory failed tests:
Test name | Commit | Details | Required | Rerun command |
---|---|---|---|---|
ci/prow/security | 4b4c70936c8b57e936faf08fa9ad8bf36f2a35c2 | link | false | /test security |
ci/prow/integration-crc | 4b4c70936c8b57e936faf08fa9ad8bf36f2a35c2 | link | true | /test integration-crc |
ci/prow/e2e-crc | 4b4c70936c8b57e936faf08fa9ad8bf36f2a35c2 | link | true | /test e2e-crc |
Full PR test history. Your PR dashboard.
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: cfergeau
The full list of commands accepted by this bot can be found here.
The pull request process is described here
https://github.com/openshift/release/pull/48942 is currently merged which means now security scanning can run on the CI for each PR (non blocking) and
.snyk
config file have details what to run or ignore.We need to review the CVEs which is raised by scanning to figure out if this is valid or not in crc context and take appropriate action.