Skip to content

Tutorials use potentially vulnerable container image gcr.io/spiffe-io/wait-for-it #90

@elinesterov

Description

@elinesterov

From slack:

Erik Godding Boye
Yesterday at 9:12 AM
Does anyone know where the image gcr.io/spiffe-io/wait-for-it is mastered? It desperately need some security updates:

D:~ $ trivy image gcr.io/spiffe-io/wait-for-it --security-checks vuln --severity CRITICAL,HIGH --quiet

gcr.io/spiffe-io/wait-for-it (alpine 3.14.2)

Total: 27 (HIGH: 26, CRITICAL: 1)

We use wait-for-it container basically to make sure that the SPIRE server is up before running agents. That helps to reduce the number of false errors in the logs etc. There is no other practical need for it as far as I understand.

I see the following options to fix this issue (with the different efforts for it, from lower to higher):

  1. Change the current image to something that can perform the same functionality but is supported/maintained by another credible source (e.g., Google)
  2. Bake the functionality into our spire-agent release images (we use scratch as a base, so we will need to change the CI process)
  3. Implement the server-healthcheck feature in an agent, so we just have one binary, and the init container in the k8s config is the same as an app container.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions