Skip to content

Commit 7b4818f

Browse files
authored
Merge pull request #107 from IBM/sec-docs
doc:Update security documentation and Integration test docs
2 parents 23a23ea + b715b40 commit 7b4818f

File tree

3 files changed

+57
-29
lines changed

3 files changed

+57
-29
lines changed

README.md

Lines changed: 18 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,10 @@
22

33
This helm chart is designed to deploy functionality that automatically saves core dumps from most public cloud kubernetes service providers and private kubernetes instances to an S3 compatible storage service.
44

5-
[![Artifact Hub](https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/core-dump-handler)](https://artifacthub.io/packages/search?repo=core-dump-handler)
6-
[![Docker Repository on Quay](https://quay.io/repository/icdh/core-dump-handler/status "Docker Repository on Quay")](https://quay.io/repository/icdh/core-dump-handler)
75
[![build status](https://github.com/ibm/core-dump-handler/workflows/CI/badge.svg)](https://github.com/ibm/core-dump-handler/actions)
6+
[![Docker Repository on Quay](https://quay.io/repository/icdh/core-dump-handler/status "Docker Repository on Quay")](https://quay.io/repository/icdh/core-dump-handler)
7+
[![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/5827/badge)](https://bestpractices.coreinfrastructure.org/projects/5827)
8+
[![Artifact Hub](https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/core-dump-handler)](https://artifacthub.io/packages/search?repo=core-dump-handler)
89

910
## Contributions
1011

@@ -165,8 +166,6 @@ helm delete core-dump-handler -n observe
165166

166167
## Build and Deploy a Custom Version
167168

168-
The services are written in Rust using [rustup](https://rustup.rs/).
169-
170169
1. Build the image `docker build -t YOUR_TAG_NAME .`
171170

172171
2. Push the image to your container registry
@@ -187,36 +186,18 @@ or run the helm install command with the settings
187186
```
188187
## Testing
189188

190-
1. Login to your kubernetes cluster so that `kubectl` can be ran from the script.
189+
### unit testing
191190

192-
1. Ensure you have an minio client in your PATH on your machine.
191+
1. The services are written in Rust using [rustup](https://rustup.rs/).
193192

194-
```
195-
which mc
196-
/usr/local/bin
197-
```
198-
1. If you don't have an minio client it can be installed on linux with
193+
1. Local unit tests can be ran using `cargo test` in the base folder
199194

200-
```
201-
wget https://dl.min.io/client/mc/release/linux-amd64/mc
202-
chmod +x mc
203-
sudo cp mc /usr/local/bin/mc
204-
```
205-
Other OSes are detailed here https://docs.min.io/docs/minio-client-quickstart-guide.html
195+
### integration testing
206196

207-
1. Publish the container definition for this project to a registry
197+
1. Currently only IBM Cloud ROKS and IKS are supported but we are happy to carry integration tests for other services but we can't run them before release.
208198

209-
```
210-
docker build -t REPOSITORYNAME:YOUR_TAG .
211-
docker push REPOSITORYNAME:YOUR_TAG
212-
```
199+
1. To run the integration tests build follow the [instructions for a custom build](https://github.com/IBM/core-dump-handler/#build-and-deploy-a-custom-version)
213200

214-
1. Modify the image definition in the yaml
215-
216-
```yaml
217-
image:
218-
repository: REPOSITORYNAME:YOUR_TAG
219-
```
220201
1. In the root of the project folder create a file called `.env` with the following configuration
221202

222203
```
@@ -230,10 +211,18 @@ or run the helm install command with the settings
230211
231212
```
232213
cd integration
233-
./run.sh
214+
./run-ibm.sh
234215
```
235216
236217
218+
## Releases
219+
220+
Releases are built on a pre-release branch e.g. `pre-8.5.0` integration tests are ran manually and a release is generated when merged to main.
221+
222+
It currently isn't possible to automate this as the kubernetes integration in github actions is not reliable enough.
223+
224+
If you wish to test a pre-release with your own integration testing then please raise an issue and we can collaborate on your test run.
225+
237226
## Troubleshooting
238227
239228
The first place to look for issues is in the agent console.

SECURITY.md

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
# Security Policy
2+
3+
## Security Announcements
4+
Watch this project for issues raised about security and major API announcements.
5+
6+
## Report a Vulnerability
7+
We're extremely grateful for security researchers and users that report vulnerabilities to the core-dump-handler Community. All reports are thoroughly investigated by community volunteers.
8+
9+
To make a report email the `[email protected]` with the security details.
10+
11+
You may encrypt your email using the keys of the [core developers](https://keybase.io/antonwhalley). Encryption is NOT required to make a disclosure.
12+
13+
### When Should I Report a Vulnerability?
14+
15+
You think you discovered a potential security vulnerability in core-dump-handler
16+
You are unsure how a vulnerability affects core-dump-handler
17+
You think you discovered a vulnerability in another project that core-dump-handler depends on
18+
For projects with their own vulnerability reporting and disclosure process, please report it directly there
19+
20+
### When Should I NOT Report a Vulnerability?
21+
You need help tuning core-dump-handler components for security
22+
You need help applying security related updates
23+
Your issue is not security related
24+
25+
### Security Vulnerability Response
26+
Each report is acknowledged and analyzed within 3 working days.
27+
28+
Any vulnerability information shared will stay within the project and will not be disseminated to other projects unless it is necessary to get the issue fixed.
29+
30+
As the security issue moves from triage, to identified fix, to release planning we will keep the reporter updated.
31+
32+
### Public Disclosure Timing
33+
A public disclosure date is negotiated with the bug submitter. We prefer to fully disclose the bug as soon as possible once a user mitigation is available. It is reasonable to delay disclosure when the bug or the fix is not yet fully understood, the solution is not well-tested, or for vendor coordination. The timeframe for disclosure is from immediate (especially if it's already publicly known) to a few weeks. For a vulnerability with a straightforward mitigation, we expect report date to disclosure date to be on the order of 7 days. The Kubernetes Security Response Committee holds the final say when setting a disclosure date.
34+
35+
## Supported Versions
36+
37+
Versions are expressed as x.y.z, where x is the major version, y is the minor version, and z is the patch version, following [Semantic Versioning](https://semver.org/) terminology.
38+
39+
The project maintains release branches. Currently we only support the most recent release and fixes will be applied to the next release and **will not** be back ported. We target at least one release every 3 months but this is *not* a guaranteed candence.
File renamed without changes.

0 commit comments

Comments
 (0)