Skip to content

Automatically rebuild images when detecting "critical" CVEs #136

Open
@alessfg

Description

@alessfg

Is your feature request related to a problem? Please describe

CVEs are routinely posted for these images. Most of them do not affect NGINX directly, but that's not always the case.

Describe the solution you'd like

We should scan for CVEs on a daily basis and flag any relevant CVEs as critical (CVEs with a critical severity that directly impact NGINX or a package used by NGINX). Should any critical CVEs be flagged, we should check if a fix for the CVEs is available, and if so, immediately rebuild the relevant images.

Additional context

As of today, Docker builds are cached using the GitHub Actions cache. The base Alpine/Debian images are not necessarily rebuilt/pushed when a new CVE is found and fixed, so we might need to wipe the GitHub Actions cache before rebuilding any relevant images. See #137 for tracking info.

### Tasks
- [ ] Implement CVE scanner 
- [ ] Configure CVE scanner alerts
- [ ] Rebuild images on critical alerts **if** there is a fix available for the CVE

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions