Skip to content

Conversation

@SgtCoDFish
Copy link
Member

@SgtCoDFish SgtCoDFish commented Dec 18, 2025

Summary

Improves Trivy security scanning frequency and TestGrid reporting for cert-manager container images.

  • Increases scan frequency: Trivy tests now run every 12 hours (previously 24 hours) for faster vulnerability detection
  • Improves alerting: Reduces stale results threshold from 36 to 18 hours to match the new scan frequency (and makes this more linked to the actual periodicity of the job)
  • Better test status reporting: Configures TestGrid to show binary pass/fail status instead of "flaky" for Trivy scans

Motivation

Security vulnerability scans should run frequently to detect issues quickly. By doubling the scan frequency and adjusting TestGrid settings appropriately, this ensures the team is notified sooner when vulnerabilities are discovered in cert-manager container images.

Also, the "FLAKY" status wasn't helpful for these tests - we really only care about the latest scan and whether it passed or failed.

See https://github.com/kubernetes/test-infra/blob/737791c6e2ee79bdc8efce2195eb6d20ebb6eb04/testgrid/config.md#prow-job-configuration for details on the testgrid annotations.

Testing

I haven't tested that these testgrid annotations from the linked doc actually work - I think it's easier to merge the PR and check if it did what we expect. I'm confident that this change won't be negative, at least!

@cert-manager-prow cert-manager-prow bot added dco-signoff: yes Indicates that all commits in the pull request have the valid DCO sign-off message. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Dec 18, 2025
@cert-manager-prow cert-manager-prow bot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Dec 28, 2025
@cert-manager-prow cert-manager-prow bot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jan 6, 2026
@maelvls
Copy link
Member

maelvls commented Jan 8, 2026

Seems like all good changes. I don't see any risk in merging this.

/lgtm
/approve

@cert-manager-prow cert-manager-prow bot added the lgtm Indicates that a PR is ready to be merged. label Jan 8, 2026
@cert-manager-prow
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: maelvls

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@cert-manager-prow cert-manager-prow bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jan 8, 2026
@cert-manager-prow cert-manager-prow bot merged commit f8e1f11 into cert-manager:master Jan 8, 2026
6 checks passed
@cert-manager-prow
Copy link
Contributor

@SgtCoDFish: Updated the job-config configmap in namespace default at cluster default using the following files:

  • key cert-manager-master.yaml using file config/jobs/cert-manager/cert-manager/master/cert-manager-master.yaml
  • key cert-manager-release-1.18.yaml using file config/jobs/cert-manager/cert-manager/release-1.18/cert-manager-release-1.18.yaml
  • key cert-manager-release-1.19.yaml using file config/jobs/cert-manager/cert-manager/release-1.19/cert-manager-release-1.19.yaml
Details

In response to this:

Summary

Improves Trivy security scanning frequency and TestGrid reporting for cert-manager container images.

  • Increases scan frequency: Trivy tests now run every 12 hours (previously 24 hours) for faster vulnerability detection
  • Improves alerting: Reduces stale results threshold from 36 to 18 hours to match the new scan frequency (and makes this more linked to the actual periodicity of the job)
  • Better test status reporting: Configures TestGrid to show binary pass/fail status instead of "flaky" for Trivy scans

Motivation

Security vulnerability scans should run frequently to detect issues quickly. By doubling the scan frequency and adjusting TestGrid settings appropriately, this ensures the team is notified sooner when vulnerabilities are discovered in cert-manager container images.

Also, the "FLAKY" status wasn't helpful for these tests - we really only care about the latest scan and whether it passed or failed.

See https://github.com/kubernetes/test-infra/blob/737791c6e2ee79bdc8efce2195eb6d20ebb6eb04/testgrid/config.md#prow-job-configuration for details on the testgrid annotations.

Testing

I haven't tested that these testgrid annotations from the linked doc actually work - I think it's easier to merge the PR and check if it did what we expect. I'm confident that this change won't be negative, at least!

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@SgtCoDFish SgtCoDFish deleted the trivy-changes branch January 8, 2026 17:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. dco-signoff: yes Indicates that all commits in the pull request have the valid DCO sign-off message. lgtm Indicates that a PR is ready to be merged. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants