-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
alternative to gosu to ensure even naïve vulnerability scanners show no false-positives #1304
Comments
Same issue with
|
this is really a fair opinion, and I fully understand your view. I will recommend reading gosu source code. The two files As I see it, basically it is a wrapper around shell methods via a standard go library. (disclaimer: first time I look into Go source code). main.go: https://github.com/tianon/gosu/blob/ccc5c46e5fc49132e0515885cbe8e4ffe79b0fb6/main.go#L72-L77 setup-user.go: https://github.com/tianon/gosu/blob/ccc5c46e5fc49132e0515885cbe8e4ffe79b0fb6/setup-user.go looking at it it's mostly just Setup-user contains calls to the two standard go libraries:
and the commands that are done in the file could be converted to a basic shell script fairly easily I think. I will happily assist, but given that If somebody wants to give a try replacing gosu in a PR, feel free (my skills slightly limited in that area) |
I've switched with |
@nicolas-albert could you provide a minimal reproducible example based on the code here in this repository? |
Line 313 in 32b6fcd
I don't know if you have |
You probably want to use See also tianon/gosu#143 |
Happy new year 🥂, sorry to rip up in the discussions provided here and in the gosu repository:
#1292
#1282
#1297
While I completely respect and understand the stance of gosu author that vulnerability scanners are naïve and show false positive, I think that much time is wasted by postgres consumers understanding all the details and even move time is spent explaining that the critical issues in postgresql images are false positives.
Therefore this (another thread) on the subject. However the question I would like to ask here is
the alternative MUST be actively maintained, in the way that all security issues are actively addressed in a way that even naïve vulnerabiltity scanners understand (at least docker scout and trivy)
Please let's focus this discussion on alternatives to
gosu
in this image.For comments that mention to fix gosu itself, make those comments in the gosu project.The text was updated successfully, but these errors were encountered: