-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
refactor(misconf): Refactor defsec components #5138
Comments
A PoC for |
A PoC for |
POC for |
@simar7 testing it with Trivy. |
|
@simar7 setup_test.go uses parsers and scanners, and this test should be in |
I merged the PR https://github.com/simar7/trivy-policies and renamed the repo to |
Thanks for the diagram. Looks good! I have two questions.
|
Yes As for
Yes that's right. Trivy today already has the logic to ignore policies that are either syntactically broken or are for services that that particular version of Trivy does not support today. By graceful handling, it means that those policies are simply ignored and not compiled (and loaded) in memory when loading OPA upon Trivy startup. If the user decides to upgrade the version of Trivy, it will add support for newer services. This will allow the new version of Trivy to start using these policies for newly supported services as the bundle will still be present on disk from the old version, if still under the cache expiration limit. If not, Trivy will download a fresh policy bundle as expected. |
Thanks for explaining! It sounds great. |
As part of refactoring and breaking out defsec, we'd like to break out defsec into smaller components. A high level overview of this would like the following
This will allow for the following benefits:
trivy-rules
will be a repo of its own to manage policies (content)trivy-rules
more often than defsec releases to ensure newer bundles with newer policies are available sooner.The text was updated successfully, but these errors were encountered: