You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+18-29Lines changed: 18 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,10 @@
2
2
3
3
This helm chart is designed to deploy functionality that automatically saves core dumps from most public cloud kubernetes service providers and private kubernetes instances to an S3 compatible storage service.
[](https://quay.io/repository/icdh/core-dump-handler)
[](https://quay.io/repository/icdh/core-dump-handler)
7
+
[](https://bestpractices.coreinfrastructure.org/projects/5827)
Other OSes are detailed here https://docs.min.io/docs/minio-client-quickstart-guide.html
195
+
### integration testing
206
196
207
-
1. Publish the container definition for this project to a registry
197
+
1.Currently only IBM Cloud ROKS and IKS are supported but we are happy to carry integration tests for other services but we can't run them before release.
208
198
209
-
```
210
-
docker build -t REPOSITORYNAME:YOUR_TAG .
211
-
docker push REPOSITORYNAME:YOUR_TAG
212
-
```
199
+
1. To run the integration tests build follow the [instructions for a custom build](https://github.com/IBM/core-dump-handler/#build-and-deploy-a-custom-version)
213
200
214
-
1. Modify the image definition in the yaml
215
-
216
-
```yaml
217
-
image:
218
-
repository: REPOSITORYNAME:YOUR_TAG
219
-
```
220
201
1. In the root of the project folder create a file called `.env` with the following configuration
221
202
222
203
```
@@ -230,10 +211,18 @@ or run the helm install command with the settings
230
211
231
212
```
232
213
cd integration
233
-
./run.sh
214
+
./run-ibm.sh
234
215
```
235
216
236
217
218
+
## Releases
219
+
220
+
Releases are built on a pre-release branch e.g. `pre-8.5.0` integration tests are ran manually and a release is generated when merged to main.
221
+
222
+
It currently isn't possible to automate this as the kubernetes integration in github actions is not reliable enough.
223
+
224
+
If you wish to test a pre-release with your own integration testing then please raise an issue and we can collaborate on your test run.
225
+
237
226
## Troubleshooting
238
227
239
228
The first place to look for issues is in the agent console.
Watch this project for issues raised about security and major API announcements.
5
+
6
+
## Report a Vulnerability
7
+
We're extremely grateful for security researchers and users that report vulnerabilities to the core-dump-handler Community. All reports are thoroughly investigated by community volunteers.
8
+
9
+
To make a report email the `[email protected]` with the security details.
10
+
11
+
You may encrypt your email using the keys of the [core developers](https://keybase.io/antonwhalley). Encryption is NOT required to make a disclosure.
12
+
13
+
### When Should I Report a Vulnerability?
14
+
15
+
You think you discovered a potential security vulnerability in core-dump-handler
16
+
You are unsure how a vulnerability affects core-dump-handler
17
+
You think you discovered a vulnerability in another project that core-dump-handler depends on
18
+
For projects with their own vulnerability reporting and disclosure process, please report it directly there
19
+
20
+
### When Should I NOT Report a Vulnerability?
21
+
You need help tuning core-dump-handler components for security
22
+
You need help applying security related updates
23
+
Your issue is not security related
24
+
25
+
### Security Vulnerability Response
26
+
Each report is acknowledged and analyzed within 3 working days.
27
+
28
+
Any vulnerability information shared will stay within the project and will not be disseminated to other projects unless it is necessary to get the issue fixed.
29
+
30
+
As the security issue moves from triage, to identified fix, to release planning we will keep the reporter updated.
31
+
32
+
### Public Disclosure Timing
33
+
A public disclosure date is negotiated with the bug submitter. We prefer to fully disclose the bug as soon as possible once a user mitigation is available. It is reasonable to delay disclosure when the bug or the fix is not yet fully understood, the solution is not well-tested, or for vendor coordination. The timeframe for disclosure is from immediate (especially if it's already publicly known) to a few weeks. For a vulnerability with a straightforward mitigation, we expect report date to disclosure date to be on the order of 7 days. The Kubernetes Security Response Committee holds the final say when setting a disclosure date.
34
+
35
+
## Supported Versions
36
+
37
+
Versions are expressed as x.y.z, where x is the major version, y is the minor version, and z is the patch version, following [Semantic Versioning](https://semver.org/) terminology.
38
+
39
+
The project maintains release branches. Currently we only support the most recent release and fixes will be applied to the next release and **will not** be back ported. We target at least one release every 3 months but this is *not* a guaranteed candence.
0 commit comments