-
Notifications
You must be signed in to change notification settings - Fork 729
Compose stuff #2062
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Compose stuff #2062
Conversation
Dependency Review✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.Snapshot WarningsEnsure that dependencies are being submitted on PR branches and consider enabling retry-on-snapshot-warnings. See the documentation for more information and troubleshooting advice. Scanned FilesNone |
2ebfd4d to
84efe6b
Compare
c0ce32e to
edd9868
Compare
edd9868 to
6dcd7d6
Compare
6dcd7d6 to
60bf73d
Compare
60bf73d to
15d41af
Compare
eac38cb to
942f56e
Compare
|
Trying to test this, after podman-compose -f base.yaml -f mtls.yaml -f tests/victim.yaml up it seems like there is a scanner running, but to verify it as the description above says i get: could be solved by reading the full README from the changed files here, create the certs etc... then it runs. so besides the above comments this looks good ;) |
|
one more thing: while looking into the containers etc in order to try to reproduce the "directories named like the key files that should be there" problem i saw that the victim container still uses an image from your personal account: docker.io/nichtsfrei/victim:latest |
|
That it is hosted from my account isn't currently considered a problem, as it is only used for testing and is required for running. it is done that way because there is no greenbone equivalent. This was the case also for https://github.com/greenbone/scanner-lab. There is already a ticket to think about a proper solution, currently there is none. |
Adds docker-compose to start openvasd and some test cases.
To start openvasd with http call:
```
podman-compose -f base.yaml
```
To start openvasd with https but without mtls:
```
podman-compose -f base.yaml -f tls.yaml
```
To start openvasd with mTLS:
```
podman-compose -f base.yaml -f mtls.yaml
```
To override the used certificate set the environment variables:
- ${OPENVASD_SERVER_PEM:-./openvasd-server.pem}:/var/lib/openvasd/certs/server.pem:ro
- ${OPENVASD_SERVER_KEY:-./openvasd-server.key}:/var/lib/openvasd/certs/server.key:ro
- ${OPENVASD_CLIENT_KEYS:-./client-certs}:/var/lib/openvasd/certs/clients:ro
If you want to verify your setup you can also deploy the
tests/victim.yaml:
```
podman-compose -f base.yaml -f mtls.yaml -f tests/victim.yaml
```
and use the Makefile within tests to create scans:
```bash
make create-victim-simple-auth-ssh
make start-victim-simple-auth-ssh
make results-victim-simple-auth-ssh
make status-victim-simple-auth-ssh
```
The naming scheme of that Makefile is
- create-
- start-
- results-
- stop-
- rm-
and the name of the json within `tests/scans` without the json suffix.
It should be notus oids, as those aren't stored in the nvticache within redis. But I didn't investigate yet.
d2d0bf2 to
d5e58eb
Compare
d5e58eb to
f03028f
Compare
To test this you need to first build an local image (to have the fix provided in this pr within the openvas image)
Adds docker-compose to start openvasd and some test cases.
To start openvasd with http call:
To start openvasd with https but without mtls:
To start openvasd with mTLS:
To override the used certificate set the environment variables:
If you want to verify your setup you can also deploy the
tests/victim.yaml:
and use the Makefile within tests to create scans:
The naming scheme of that Makefile is
and the name of the json within
tests/scanswithout the json suffix.DEVOPS-1813