Update/dockerfile rbe debian #2454
No reviewers
Labels
No labels
1week
2weeks
Failed compliance check
IP cameras
NATS
Possible security concern
Review effort 1/5
Review effort 2/5
Review effort 3/5
Review effort 4/5
Review effort 5/5
UI
aardvark
accessibility
amd64
api
arm64
auth
back-end
bgp
blog
bug
build
checkers
ci-cd
cleanup
cnpg
codex
core
dependencies
device-management
documentation
duplicate
dusk
ebpf
enhancement
eta 1d
eta 1hr
eta 3d
eta 3hr
feature
fieldsurvey
github_actions
go
good first issue
help wanted
invalid
javascript
k8s
log-collector
mapper
mtr
needs-triage
netflow
network-sweep
observability
oracle
otel
plug-in
proton
python
question
reddit
redhat
research
rperf
rperf-checker
rust
sdk
security
serviceradar-agent
serviceradar-agent-gateway
serviceradar-web
serviceradar-web-ng
siem
snmp
sysmon
topology
ubiquiti
wasm
wontfix
zen-engine
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
carverauto/serviceradar!2454
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "refs/pull/2454/head"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Imported from GitHub pull request.
Original GitHub pull request: #1986
Original author: @mfreeman451
Original URL: https://github.com/carverauto/serviceradar/pull/1986
Original created: 2025-11-23T16:45:52Z
Original updated: 2025-11-23T16:47:30Z
Original head: carverauto/serviceradar:update/dockerfile_rbe_debian
Original base: main
Original merged: 2025-11-23T16:47:00Z by @mfreeman451
User description
IMPORTANT: Please sign the Developer Certificate of Origin
Thank you for your contribution to ServiceRadar. Please note, when contributing, the developer must include
a DCO sign-off statement indicating the DCO acceptance in one commit message. Here
is an example DCO Signed-off-by line in a commit message:
Describe your changes
Issue ticket number and link
Code checklist before requesting a review
PR Type
Enhancement
Description
Migrate RBE executor image from Oracle Linux 9 to Ubuntu 24.04
Update container image version to v1.0.15 across configurations
Preserve Oracle Linux variant in separate Dockerfile.rbe-ora9
Fix Bazel toolchain configuration path in release workflow
Diagram Walkthrough
File Walkthrough
Dockerfile.rbe
Migrate RBE executor from Oracle Linux to Ubuntudocker/Dockerfile.rbe
Dockerfile.rbe-ora9
Add legacy Oracle Linux 9 RBE Dockerfile variantdocker/Dockerfile.rbe-ora9
environment
BUILD.bazel
Update RBE executor image versionBUILD.bazel
MODULE.bazel
Update buildbuddy toolchain container versionMODULE.bazel
buildbuddy.yaml
Update buildbuddy execution container versionbuildbuddy.yaml
release.yml
Fix Bazel RPM toolchain configuration path.github/workflows/release.yml
@rules_pkg//toolchains/rpm:is_rpmbuild_availableto//toolchains/rpm:is_rpmbuild_availableImported GitHub PR comment.
Original author: @qodo-code-review[bot]
Original URL: https://github.com/carverauto/serviceradar/pull/1986#issuecomment-3568143321
Original created: 2025-11-23T16:46:27Z
PR Compliance Guide 🔍
Below is a summary of compliance checks for this PR:
Unsigned binary downloads
Description: Downloading and installing 'cosign' and 'syft' via curl from GitHub without verifying
checksums or signatures exposes the build to supply-chain attacks—add version-pinned
checksums or signature verification to ensure binary integrity.
Dockerfile.rbe [106-116]
Referred Code
Unsigned binary downloads
Description: The Oracle Linux variant also installs 'cosign' and 'syft' using curl piping without
checksum/signature verification, enabling binary tampering—pin versions and verify
checksums or signatures to mitigate supply-chain risk.
Dockerfile.rbe-ora9 [106-116]
Referred Code
Secret handling in build
Description: The CNPG image preload step reads a GHCR token from a Docker build secret and may emit
warnings or status messages; ensure that no secret values (e.g., the token or derived
data) are logged or leaked via build output—verify that only presence is checked and
sensitive values are never echoed.
Dockerfile.rbe [91-101]
Referred Code
Secret handling in build
Description: The legacy Oracle Linux Dockerfile pulls a private GHCR image using a token provided as a
build secret; confirm that logs never reveal credentials and that the fallback
unauthenticated pull cannot leak registry paths or tags considered sensitive in your
environment.
Dockerfile.rbe-ora9 [80-95]
Referred Code
Unpinned package versions
Description: Installing numerous packages via apt without pinning versions or using minimal snapshots
may lead to non-reproducible builds and unexpected security regressions—consider pinning
versions or using a reproducible base to control updates.
Dockerfile.rbe [14-67]
Referred Code
Unpinned package versions
Description: DNF-installed packages are not version-pinned, reducing reproducibility and potentially
introducing vulnerable updates—prefer explicit versions or a locked snapshot repository.
Dockerfile.rbe-ora9 [10-55]
Referred Code
CI secret exposure risk
Description: The workflow passes Bazel flag '--//toolchains/rpm:is_rpmbuild_available=1'; ensure that
any secrets used during package publishing are scoped to the job and masked in logs—verify
that args expansion ('"${args[@]}"') cannot echo secret contents to logs.
release.yml [266-273]
Referred Code
🎫 No ticket provided
Codebase context is not defined
Follow the guide to enable codebase context checks.
Generic: Comprehensive Audit Trails
Objective: To create a detailed and reliable record of critical system actions for security analysis
and compliance.
Status: Passed
Generic: Meaningful Naming and Self-Documenting Code
Objective: Ensure all identifiers clearly express their purpose and intent, making code
self-documenting
Status: Passed
Generic: Robust Error Handling and Edge Case Management
Objective: Ensure comprehensive error handling that provides meaningful context and graceful
degradation
Status: Passed
Generic: Secure Error Handling
Objective: To prevent the leakage of sensitive system information through error messages while
providing sufficient detail for internal debugging.
Status: Passed
Generic: Secure Logging Practices
Objective: To ensure logs are useful for debugging and auditing without exposing sensitive
information like PII, PHI, or cardholder data.
Status: Passed
Generic: Security-First Input Validation and Data Handling
Objective: Ensure all data inputs are validated, sanitized, and handled securely to prevent
vulnerabilities
Status:
Package Integrity: The Dockerfile installs numerous packages and downloads binaries via curl without explicit
checksum or signature verification, which may not meet strict input integrity validation
requirements.
Referred Code
Compliance status legend
🟢 - Fully Compliant🟡 - Partial Compliant
🔴 - Not Compliant
⚪ - Requires Further Human Verification
🏷️ - Compliance label
Imported GitHub PR comment.
Original author: @qodo-code-review[bot]
Original URL: https://github.com/carverauto/serviceradar/pull/1986#issuecomment-3568144158
Original created: 2025-11-23T16:47:30Z
PR Code Suggestions ✨
Explore these optional code suggestions:
Building RPMs on Ubuntu is risky
Building RPM packages on an Ubuntu executor risks runtime incompatibility on
target RPM-based systems. Use the preserved Oracle Linux 9 Dockerfile
(
Dockerfile.rbe-ora9) as a dedicated executor for RPM packaging to ensurereliability.
Examples:
docker/Dockerfile.rbe [64-65]
docker/Dockerfile.rbe-ora9 [1-123]
Solution Walkthrough:
Before:
After:
Suggestion importance[1-10]: 9
__
Why: The suggestion correctly identifies a critical risk of runtime incompatibility when building RPM packages on the new Ubuntu-based environment, proposing a robust architectural solution.
Fix PostgreSQL setup and dependency
Improve the PostgreSQL installation by explicitly adding the
postgresql-commonpackage and updating the APT repository setup to use a de-armored GPG key in
/etc/apt/keyringsfor better security and standards compliance.docker/Dockerfile.rbe [14-67]
Suggestion importance[1-10]: 6
__
Why: The suggestion correctly proposes updating the PostgreSQL repository setup to use a de-armored GPG key, which aligns with current Debian/Ubuntu best practices and improves maintainability.