-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Notebook Security Scanning: Patch affected aaw-kubeflow-containers #957
Comments
Please look at #961, there was discussion there that may make this a bit easier. We can have the |
Have image building here and will push it hopefully https://github.com/StatCan/aaw-contrib-containers/tree/feat-notebook-restart Once this is tested and all right we can move to a different repository via copy-pasta. Doing this for quick iteration. Can modify this dockerfile at my will and its easy to also modify argocd |
Ok authentication is dumb, doing this inside my locally built image gave me
|
Actual PR that contains the PR / script stuffs |
15/06/2022 UPDATE:
This should not be bad.
Cronjob that does a bunch of
kubectl
commands to get pod spec and then get say the imageid and then compare that with what we get from the acr api.Then we can run a
kubectl rollout restart
for specific statefulsets whereimageid sha256
is different.What we will need
Doing some initial work in private repo https://github.com/Jose-Matsuda/patch-notebook-sts
EPIC: #461
As per sprint planning
BREAK DOWN
There are quite a few things to tackle here.
The goal of this task is to have the script patch any notebook images that have a vulnerability.
This will be limited to images that are covered by our configmap.
Make use of labels to determine when to patch or if to patch.
Concerns
Definition of Completed
Running in dev, but maybe on a soft run and not actually initiating any updates (as in updates are logged to stdout).
The text was updated successfully, but these errors were encountered: