-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Gl variable change #209
Gl variable change #209
Conversation
# https://catalog.redhat.com/software/containers/ubi8/nodejs-18-minimal/627d1c38e35da88581633bf1 | ||
FROM registry.access.redhat.com/ubi8/nodejs-18-minimal:1-33.1679485315@sha256:74af9dc2b620022c77fcd712b811f64a03c1444ff1e9b9596a242b2edf3cf96f AS builder | ||
# RedHat UBI 8 with nodejs 14 | ||
FROM registry.access.redhat.com/ubi8/ubi as builder |
Check warning
Code scanning / Trivy
':latest' tag used Medium
Type: dockerfile
Vulnerability DS001
Severity: MEDIUM
Message: Specify a tag in the 'FROM' statement for image 'registry.access.redhat.com/ubi8/ubi'
Link: DS001
npm run build | ||
|
||
# Deployment container | ||
FROM registry.access.redhat.com/ubi8/ubi-micro:8.7-6@sha256:af0a83c2fb7db1b63a5655c85f3f37d32b114443b8969fd8a40d47429cd87016 | ||
FROM registry.access.redhat.com/ubi8/ubi-micro |
Check warning
Code scanning / Trivy
':latest' tag used Medium
Type: dockerfile
Vulnerability DS001
Severity: MEDIUM
Message: Specify a tag in the 'FROM' statement for image 'registry.access.redhat.com/ubi8/ubi-micro'
Link: DS001
@@ -1,16 +1,15 @@ | |||
# https://catalog.redhat.com/software/containers/ubi8/nodejs-18-minimal/627d1c38e35da88581633bf1 | |||
FROM registry.access.redhat.com/ubi8/nodejs-18-minimal:1-33.1679485315@sha256:74af9dc2b620022c77fcd712b811f64a03c1444ff1e9b9596a242b2edf3cf96f AS builder | |||
# RedHat UBI 8 with nodejs 14 |
Check failure
Code scanning / Trivy
Image user should not be 'root' High
Type: dockerfile
Vulnerability DS002
Severity: HIGH
Message: Specify at least 1 USER command in Dockerfile with non-root user as argument
Link: DS002
@@ -1,16 +1,15 @@ | |||
# https://catalog.redhat.com/software/containers/ubi8/nodejs-18-minimal/627d1c38e35da88581633bf1 | |||
FROM registry.access.redhat.com/ubi8/nodejs-18-minimal:1-33.1679485315@sha256:74af9dc2b620022c77fcd712b811f64a03c1444ff1e9b9596a242b2edf3cf96f AS builder | |||
# RedHat UBI 8 with nodejs 14 |
Check notice
Code scanning / Trivy
No HEALTHCHECK defined Low
Type: dockerfile
Vulnerability DS026
Severity: LOW
Message: Add HEALTHCHECK instruction in your Dockerfile
Link: DS026
@@ -1,14 +1,37 @@ | |||
FROM node:19-bullseye AS build | |||
# RedHat UBI 8 with nodejs 14 | |||
FROM registry.access.redhat.com/ubi8/ubi as builder |
Check warning
Code scanning / Trivy
':latest' tag used Medium
Type: dockerfile
Vulnerability DS001
Severity: MEDIUM
Message: Specify a tag in the 'FROM' statement for image 'registry.access.redhat.com/ubi8/ubi'
Link: DS001
COPY --from=build /app/Caddyfile /etc/caddy/Caddyfile | ||
COPY --from=build /app/build /app/dist | ||
# Deployment container | ||
FROM registry.access.redhat.com/ubi8/ubi-micro |
Check warning
Code scanning / Trivy
':latest' tag used Medium
Type: dockerfile
Vulnerability DS001
Severity: MEDIUM
Message: Specify a tag in the 'FROM' statement for image 'registry.access.redhat.com/ubi8/ubi-micro'
Link: DS001
@@ -1,14 +1,37 @@ | |||
FROM node:19-bullseye AS build | |||
# RedHat UBI 8 with nodejs 14 |
Check failure
Code scanning / Trivy
Image user should not be 'root' High
Type: dockerfile
Vulnerability DS002
Severity: HIGH
Message: Specify at least 1 USER command in Dockerfile with non-root user as argument
Link: DS002
@@ -1,14 +1,37 @@ | |||
FROM node:19-bullseye AS build | |||
# RedHat UBI 8 with nodejs 14 |
Check notice
Code scanning / Trivy
No HEALTHCHECK defined Low
Type: dockerfile
Vulnerability DS026
Severity: LOW
Message: Add HEALTHCHECK instruction in your Dockerfile
Link: DS026
|
||
async downloadTemplate(id: number) { | ||
const url = `${hostname}:${port}/document-template/find-one/${id}`; | ||
return axios.get(url).then((res) => { |
Check failure
Code scanning / CodeQL
Server-side request forgery Critical
URL
user-provided value
|
||
async removeTemplate(reportType: string, id: number): Promise<any> { | ||
const url = `${hostname}:${port}/document-template/remove/${encodeURI(reportType)}/${id}`; | ||
return axios.get(url).then((res) => { |
Check failure
Code scanning / CodeQL
Server-side request forgery Critical
URL
user-provided value
|
||
async enableProvision(id: number): Promise<any> { | ||
const url = `${hostname}:${port}/nfr-provision/enable/${id}`; | ||
return await axios.get(url).then((res) => { |
Check failure
Code scanning / CodeQL
Server-side request forgery Critical
URL
user-provided value
|
||
async disableProvision(id: number): Promise<any> { | ||
const url = `${hostname}:${port}/nfr-provision/disable/${id}`; | ||
return await axios.get(url).then((res) => { |
Check failure
Code scanning / CodeQL
Server-side request forgery Critical
URL
user-provided value
|
||
async removeVariable(id: number) { | ||
const url = `${hostname}:${port}/nfr-provision/remove-variable/${id}`; | ||
return await axios.get(url).then((res) => { |
Check failure
Code scanning / CodeQL
Server-side request forgery Critical
URL
user-provided value
displayAdmin: displayAdmin, | ||
message: ttlsJSON ? ttlsJSON : null, | ||
prdid: ttlsJSON ? ttlsJSON.id : null, | ||
error: err, |
Check warning
Code scanning / CodeQL
Information exposure through a stack trace Medium
stack trace information
documentTypes: NFR_VARIANTS_ARRAY, | ||
nfrDataId: -1, | ||
enabledProvisionList: [], | ||
error: err, |
Check warning
Code scanning / CodeQL
Information exposure through a stack trace Medium
stack trace information
const res = await axios | ||
.delete(url, { | ||
headers: { Authorization: 'Bearer ' + bearerToken }, | ||
}) |
Check failure
Code scanning / CodeQL
Server-side request forgery Critical
URL
user-provided value
message: ttlsJSON ? ttlsJSON : null, | ||
documentTypes: ['Land Use Report', 'Notice of Final Review', 'Grazing Lease'], | ||
prdid: ttlsJSON ? ttlsJSON.id : null, | ||
error: err, |
Check warning
Code scanning / CodeQL
Information exposure through a stack trace Medium
hope this works