-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ECR security scanning fails on images built using BuildKit v0.11 #3499
Comments
Default is only in buildx level.
I think we are doing it correctly. The objects have proper mediatypes that show that blob is in-toto json and not a targz. FYI @estesp |
I did open a ticket with our AWS support to see what their response is. We are in US Gov Cloud in case that makes any difference. It sounds like these layers just shouldn't be processed by Snyk or the failures bubble up to the UI. They are also un-deletable (as expected) since they are part of the list manifest. We may have to wait for AWS ECR team to act for a resolution? |
Spoke with our support and had a great call. Sounds like they will bring this back to their product and decide on how to present the layers to the user. I think it made the most sense to at least not try and scan the attestation layers, but still show them in the registry, even if unsupported. That makes sense. Since none of this affects the actual functionality of the image, registry or tooling it's not blocking anything that I'm aware of (unless someone has alerting or monitoring set up on ECR layer failures, of course). Nonetheless, a resolution should happen. |
🐛 Originally reported by @farvour in docker/build-push-action#746 (comment), tracking here since the original issue is about adding attestations fields in docker/build-push-action.
cc @crazy-max @tonistiigi
With the release of Buildkit v0.11, by default, a minimal provenance attestation is created and pushed alongside the image, using the attestation storage. This apparently causes ECR image scans to fail.
docker/build-push-action#746 (comment):
While the layers for the attestation storage cannot be unpacked, the OCI image-spec explicitly declares:
Ideally, scanners should either:
I don't think there's anything we can do buildkit side? As far as I'm aware, the attestation manifests generated by buildkit are compliant with OCI artifacts.
The text was updated successfully, but these errors were encountered: