Open
Description
Is your feature request related to a problem? Please describe
CVEs are routinely posted for these images. Most of them do not affect NGINX directly, but that's not always the case.
Describe the solution you'd like
We should scan for CVEs on a daily basis and flag any relevant CVEs as critical (CVEs with a critical severity that directly impact NGINX or a package used by NGINX). Should any critical CVEs be flagged, we should check if a fix for the CVEs is available, and if so, immediately rebuild the relevant images.
Additional context
As of today, Docker builds are cached using the GitHub Actions cache. The base Alpine/Debian images are not necessarily rebuilt/pushed when a new CVE is found and fixed, so we might need to wipe the GitHub Actions cache before rebuilding any relevant images. See #137 for tracking info.
### Tasks
- [ ] Implement CVE scanner
- [ ] Configure CVE scanner alerts
- [ ] Rebuild images on critical alerts **if** there is a fix available for the CVE
Metadata
Metadata
Assignees
Labels
No labels