-
Notifications
You must be signed in to change notification settings - Fork 558
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(spec): remove invocate in vuln predicate #2069
feat(spec): remove invocate in vuln predicate #2069
Conversation
Signed-off-by: masahiro331 <[email protected]>
254631b
to
41d2694
Compare
My apologies to direct PR. I wish to reopen and finalize the discussion against this specification. |
Are you hoping to merge this? |
Yes, I hope. I'm a contributor to Trivy. If supported, it must take environment information as an argument. As another discussion, there is a question as to which one should be set if the job that runs Trivy is different from the job that runs cosign. |
Trivy's issue. |
The discussion on Invocation had stopped, so I reopened via PR. If possible, we would like to check if it is optional as well as scanner.db. |
Cc @puerco can you double check this one? |
I don't want to revive what appears to be done discussion just because of it, but I actually think having the parameters of the scan captured in the I feel there is value in capturing the parameters and environment in a standard way. While the scanning service can expose its inner state in its own output, I think we should capture those flags from outside of the scanner because of a) trust and b) because we cannot guarantee all scanner actually embed the data in their output. Take for example these two examples. Running Trivy with and without With Yet, the output of the scan does not capture the runtime configuration, and even if it did, I think it is easier for a system replaying the attestation to read the invocation params and environment from a standard location. |
This PR is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 10 days. |
This PR was closed because it has been stalled for 10 days with no activity. |
Ref: #1381
Summar
Many vulnerability scanners are unaware of the type of environment in which they are used.
The consensus in some issues for this spec seemed to be to remove invocation.
Release Note
Documentation
Need to fix the sample YAML.
https://docs.sigstore.dev/policy-controller/overview#configuring-policy-at-the-clusterimagepolicy-level