WIP: Initial version of the Container Scanning test project
Description
Initial version of the test project:
- uses
Container-Scanning.gitlab-ci.ymlvendored template - uses
docker-dindto build the Docker image from Dockerfile within the CI pipeline - leverages the Docker image caching and the local Container Registry to speed up the build
-
webgoatDocker image is used as the base image
Execution
Project content
-
copy the templatedir content to the new repository and find/replace theREPLACE_MEplaceholders. -
setup the masterbranch:-
create a basic app for given language, package manager and framework with some relevant vulnerabilities -
configure the compatible Security Products features in the .gitlab-ci.yml(comment out unsupported ones) -
update the expected reports in qa/expect/
-
-
create the auto-devops-FREEZEbranch frommasterand removes the.gitlab-ci.ymlfile. -
create the QA-MR-FREEZEbranch frommaster-
add necessary changes to the test app to generate new, fixed and existing vulnerabilities -
update the expected reports in qa/expect/ -
open a Merge Request against masterwith the nameWIP: QA for all Security Products features
-
-
add the created project to the QA script at: https://gitlab.com/gitlab-org/security-products/release
Project configuration
To ensure the QA can be automatically triggered and to notify the team when it fails, the project must be configured as follows:
-
sign in with gitlab-botuser and create a Pipeline trigger namedQAto obtain a token for automated QA configuration -
setup the Slack notificationsproject service:-
check the activeoption -
uncheck all triggers but Pipeline(leaveChannel nameempty) -
use the Webhook URLavailable in the Slack's SP-Bot service configuration page -
use SP-Botas theUsername -
check the Notify only broken pipelinesoption -
submit the form and check that the test event has been successfully sent to #sp-alertslack channel
-
Edited by Victor Zagorodny