As new releases come out, the base OS packages in the released images are updated to pick up the latest security issues.
Can you verify that the https://github.com/tektoncd/pipeline/blob/master/images/Dockerfile is used for each new release image (git-init and creds-init)? It seems to be trying to update the base packages, so trying to understand why this has not been getting fixed with new releases , like 0.14.x
Both of those images have some rather "old" CVEs in them for the 0.14 release.
Kubernetes version:
Output of kubectl version:
(paste your output here)
Tekton Pipeline version:
Output of tkn version or kubectl get pods -n tekton-pipelines -l app=tekton-pipelines-controller -o=jsonpath='{.items[0].metadata.labels.version}'
/area release
/kind bug
Took a quick...the base image in .ko.yaml is using the latest image from tekton-nightly: https://github.com/tektoncd/pipeline/blob/master/.ko.yaml
.ko.yaml.release is using a image from gcr.io/tekton-release/ I don't seem to have access to that...however, gcr.io/tekton-releases (extra s - releases vs release) has an updated base image that has been built recently.
Questions:
Perhaps someone who has done a release recently has an idea? (@afrittoli @sbwsg ?)
So a few things:
.ko.yaml.release is not used at all (I've opened a PR to remove it). Instead, we create one "from scratch" during the release process (which is not the best, but…).ko.yaml), see https://github.com/tektoncd/pipeline/blob/master/tekton/publish.yaml#L51@vdemeester we are building the images, but are they picking up the latest OS base package updates, from what I'm seeing in the release images, they are back level.
Is this still the case ? :thinking:
Appears to be better now.