portauthority
portauthority copied to clipboard
API that leverages Clair to scan Docker Registries and Kubernetes Clusters for vulnerabilities
It would be great if PA could store credentials for private registries so we wouldn't have to send them every time we run a scan. Similar to what K8 Crawler.
It would be perfect if we could use environment variables to pull parts of the configuration, e.g. DB or registry credentials.
We use a private Gitlab Docker registry which uses a JWT authentication service to issue auth tokens for the registry API. Instead of authenticating with a username and password for...
The token retrieved via `docker.AuthRegistry` isn't threaded into the call to `docker.GetRegistry`: https://github.com/target/portauthority/blob/master/api/v1/routes.go#L388-L405 I [hacked a fix](https://github.com/caipre/portauthority/blob/gcr.io/api/v1/routes.go#L401) that I'll try to polish up tomorrow; making an issue in case anyone...
A policy with `AllowedRiskSeverity` as a list fails to create: ``` $ curl -XPOST -H'content-type: application/json' -d '{"Policy":{"Name":"High","AllowedRiskSeverity":"[\"Negligible\",\"Low\",\"Medium\"]"}}' localhost:31700/v1/policies {"Error":{"Message":"error upserting policy: pq: malformed array literal: \"{[\"Negligible\",\"Low\",\"Medium\"]}\""}} ``` The value...
This repository will be archived in 30 days in accordance with Target's internal retention policy. Archived projects become read-only and will remain accessible to the public. If you have questions...