Skip to content

Commit

Permalink
Merge pull request #134 from gardener/enh/cve-categorisation
Browse files Browse the repository at this point in the history
Add cve categorisation for terraformer oci images
  • Loading branch information
kon-angelo authored Feb 22, 2023
2 parents b476254 + 5cad2f2 commit 4a7ed52
Showing 1 changed file with 54 additions and 0 deletions.
54 changes: 54 additions & 0 deletions .ci/pipeline_definitions
Original file line number Diff line number Diff line change
Expand Up @@ -15,36 +15,90 @@ terraformer:
registry: 'gcr-readwrite'
image: 'eu.gcr.io/gardener-project/gardener/terraformer'
target: terraformer
resource_labels:
- name: 'gardener.cloud/cve-categorisation'
value:
network_exposure: 'protected'
authentication_enforced: false
user_interaction: 'gardener-operator'
confidentiality_requirement: 'high'
integrity_requirement: 'high'
availability_requirement: 'low'
terraformer-alicloud:
registry: 'gcr-readwrite'
image: 'eu.gcr.io/gardener-project/gardener/terraformer-alicloud'
target: terraformer
build_args:
PROVIDER: alicloud
resource_labels:
- name: 'gardener.cloud/cve-categorisation'
value:
network_exposure: 'protected'
authentication_enforced: false
user_interaction: 'gardener-operator'
confidentiality_requirement: 'high'
integrity_requirement: 'high'
availability_requirement: 'low'
terraformer-aws:
registry: 'gcr-readwrite'
image: 'eu.gcr.io/gardener-project/gardener/terraformer-aws'
target: terraformer
build_args:
PROVIDER: aws
resource_labels:
- name: 'gardener.cloud/cve-categorisation'
value:
network_exposure: 'protected'
authentication_enforced: false
user_interaction: 'gardener-operator'
confidentiality_requirement: 'high'
integrity_requirement: 'high'
availability_requirement: 'low'
terraformer-azure:
registry: 'gcr-readwrite'
image: 'eu.gcr.io/gardener-project/gardener/terraformer-azure'
target: terraformer
build_args:
PROVIDER: azure
resource_labels:
- name: 'gardener.cloud/cve-categorisation'
value:
network_exposure: 'protected'
authentication_enforced: false
user_interaction: 'gardener-operator'
confidentiality_requirement: 'high'
integrity_requirement: 'high'
availability_requirement: 'low'
terraformer-gcp:
registry: 'gcr-readwrite'
image: 'eu.gcr.io/gardener-project/gardener/terraformer-gcp'
target: terraformer
build_args:
PROVIDER: gcp
resource_labels:
- name: 'gardener.cloud/cve-categorisation'
value:
network_exposure: 'protected'
authentication_enforced: false
user_interaction: 'gardener-operator'
confidentiality_requirement: 'high'
integrity_requirement: 'high'
availability_requirement: 'low'
terraformer-openstack:
registry: 'gcr-readwrite'
image: 'eu.gcr.io/gardener-project/gardener/terraformer-openstack'
target: terraformer
build_args:
PROVIDER: openstack
resource_labels:
- name: 'gardener.cloud/cve-categorisation'
value:
network_exposure: 'protected'
authentication_enforced: false
user_interaction: 'gardener-operator'
confidentiality_requirement: 'high'
integrity_requirement: 'high'
availability_requirement: 'low'
terraformer-equinixmetal:
registry: 'gcr-readwrite'
image: 'eu.gcr.io/gardener-project/gardener/terraformer-equinixmetal'
Expand Down

0 comments on commit 4a7ed52

Please sign in to comment.