-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RHEL namespaces are not getting created, RHEL fetcher says no updates #207
Comments
Note:
However, when I look at the particular namespace:
But:
|
Hi, Red Hat vulnerabilities are currently listed under the CentOS namespaces [1].
|
That works - however, we want to be 100% certain that it is picking up the RHEL7.x vulnerabilities. |
When we scan rhel images with vulnerabilities that show up in openscap,
|
Are you sure you are analyzing all the layers of your image, with the proper parents? You can request the last layer of your image with https://github.com/coreos/clair/tree/ad11393/api/v1#get-layersname and verify that:
|
Quentin - I'm simply using the compiled analyze-local-images: ./analyze-local-images 012345689abcdef 2016-06-15 15:35:42.580693 I | Saving a17f0446090e to local disk (this may take some time) |
Got it. If you are sure that you ran analyze-local-images after the initial update had ran (
|
Quentin - I have a copy of the output below. Perhaps you can elaborate on what we did? |
it looks like the namespace is detected as rhel 7.2, and that namespace contains no vulnerability metadata. Is it supposed to be detected as RHEL or Centos? Either way it doesn't detect any vulnerabilities in the layers. |
Hi, Thanks for the report. I now understand the issue. As discussed on IRC, the confusion came from the fact that you actually analyze RHEL images and not CentOS images. As it is right now, Clair only supports CentOS images. I see few ways it can be done:
Unfortunately, I am afraid I won't find the time in the coming weeks to implement this change. Hopefully it could come from an external contributor or another maintainer if anyone is interested in doing so. Edit: Also, the detector has to detect |
okay, I implemented option 2 just to get things working locally. I hardcoded the detector so anything that it finds it names centos:something and now scanning is working. I compared the new output with oscap-docker and the results match. I am not particularly skilled at golang but I may give option 1 a try. If I do get it working I might need some assistance getting it in shape to be pulled. |
Sure! That would really really be awesome! Thanks! |
@Quentin-M, can you just clarify for me - You are expecting the change the vulnerabilities so they are written as rhel namespace instead of centos, but then how will centos vulnerabilities map to the rhel namespace? Seems like you would then have the same problem in reverse plus needing to modify both the vulnerabilities table and the layers table data in the db. What if I added another regexp to the centos detector specifically for rhel and had it tag layers as centos? Then when #193 is merged in we can add code to also tag rhel layers as rhel for reporting purposes. This avoids database migrations and gets functionality in now without waiting on #193. -Brian |
@Quentin-M could you respond to previous comment? I am blocked not sure how to proceed. |
@brianwcook My apologies for the late answer. Your suggestion sounds fine to me 👍. Looks like you already have a patch then as suggested in #207 (comment) then? |
Hi Quentin, please see - #229 |
Closing this due to inactivity. If it's still relevant please remake the issue. Thanks. |
I am seeing on multiple test instances of clair that there are no RHEL namespaces. The fetcher is reporting there are no updates for RHEL.
clair[32415]: 2016-06-15 13:16:55.005371 I | updater/fetchers/rhel: fetching Red Hat vulnerabilities
clair[32415]: 2016-06-15 13:16:57.090650 D | updater/fetchers/debian: no Debian update
clair[32415]: 2016-06-15 13:16:59.168916 D | updater/fetchers/rhel: no Red Hat update.
From API and database I see centos, debian and ubuntu namespaces. The net result is scanning RHEL based images that are known to have vulnerabilities report no vulnerabilities.
The text was updated successfully, but these errors were encountered: