-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Process for reporting issues with our images #136
Comments
This would be great value add, and we should have it for all knative related projects. |
@jessiezcc We already scan |
Ok. What is Dan’s LDAP?
… On Apr 15, 2019, at 11:23 AM, Matt Moore ***@***.***> wrote:
@jessiezcc <https://github.com/jessiezcc> We already scan gcr.io/knative-releases. The question is how we're notified of the issues, and on what channels. @nbarthwal <https://github.com/nbarthwal> Dan's old team had infrastructure for this, so please coordinate with him before we roll out own.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub <#136>, or mute the thread <https://github.com/notifications/unsubscribe-auth/AsL15kRSZxDgBDvXik1QpHB6MwqN-dRzks5vhMOMgaJpZM4cfFZ4>.
|
same as above :) |
It seems that notifications are available through Pub/Sub: https://cloud.google.com/container-registry/docs/get-image-vulnerabilities |
Nikhil left the team, assigning this issue to me. |
Vulnerability scanning is now enabled for knative-nightly and knative-tests. |
The missing part is subscribing to the pubsub topic and publishing it as e-mail. Joyce has the necessary knowledge for doing that. /unassign adrcunha |
@adrcunha Will the email list be open to users to get on? As a consumer of Istio, I would like to see the scan output. Maybe just use a new repo and create issues instead of email? or a repo wiki page for each scan? |
That's a good idea, simple, effective and doable: creating an issue in the relevant repo. |
Issues go stale after 90 days of inactivity. Send feedback to Knative Productivity Slack channel or file an issue in knative/test-infra. /lifecycle stale |
/remove-lifecycle stale |
Issues go stale after 90 days of inactivity. Send feedback to Knative Productivity Slack channel or file an issue in knative/test-infra. /lifecycle stale |
@adrcunha what's the status of this one? |
/remove-lifecycle stale |
@yt3liu started some work in knative/test-infra#1175 but AFAIK this is not a priority. |
Issues go stale after 90 days of inactivity. Send feedback to Knative Productivity Slack channel or file an issue in knative/test-infra. /lifecycle stale |
/remove-lifecycle stale |
The kubernetes workqueue provides a facility for collecting metrics by registering a workqueue.MetricsProvider via workqueue.SetProvider. This change implements that interface to expose the workqueue metrics into opencensus. This is loosely based on some work started by @grantr [here](kubernetes-sigs/controller-runtime@master...grantr:opencensus-replace#diff-bb94124aff8d568cb4e82854c7d44fd1) Fixes: knative/pkg#522
This issue is stale because it has been open for 90 days with no |
/lifecycle frozen |
/kind security |
I'm told that GCR will scan our images for vulnerabilities but there isn't yet a process in place for us to be notified when something of concern is detected. We need something to tell us of the issue so we can investigate/fix it.
@dlorenc @mattmoor
The text was updated successfully, but these errors were encountered: