mirror of
https://github.com/aquasecurity/trivy.git
synced 2025-12-12 07:40:48 -08:00
chore: migrate from master to main (#778)
This commit is contained in:
22
README.md
22
README.md
@@ -4,9 +4,9 @@
|
||||
[](https://github.com/aquasecurity/trivy/releases/latest)
|
||||
[](https://circleci.com/gh/aquasecurity/trivy)
|
||||
[](https://goreportcard.com/report/github.com/aquasecurity/trivy)
|
||||
[](https://github.com/aquasecurity/trivy/blob/master/LICENSE)
|
||||
[](https://github.com/aquasecurity/trivy/blob/main/LICENSE)
|
||||
[](https://microbadger.com/images/aquasec/trivy "Get your own version badge on microbadger.com")
|
||||
[](https://codecov.io/gh/aquasecurity/trivy)
|
||||
[](https://codecov.io/gh/aquasecurity/trivy)
|
||||
|
||||
A Simple and Comprehensive Vulnerability Scanner for Containers and other Artifacts, Suitable for CI.
|
||||
|
||||
@@ -126,7 +126,7 @@ See [here](#continuous-integration-ci) for details.
|
||||
- local filesystem
|
||||
- remote git repository
|
||||
|
||||
Please see [LICENSE](https://github.com/aquasecurity/trivy/blob/master/LICENSE) for Trivy licensing information. Note that Trivy uses vulnerability information from a variety of sources, some of which are licensed for non-commercial use only.
|
||||
Please see [LICENSE](https://github.com/aquasecurity/trivy/blob/main/LICENSE) for Trivy licensing information. Note that Trivy uses vulnerability information from a variety of sources, some of which are licensed for non-commercial use only.
|
||||
|
||||
# Installation
|
||||
|
||||
@@ -209,7 +209,7 @@ Or through your configuration on NixOS or with home-manager as usual
|
||||
This script downloads Trivy binary based on your OS and architecture.
|
||||
|
||||
```
|
||||
$ curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/master/contrib/install.sh | sh -s -- -b /usr/local/bin
|
||||
$ curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sh -s -- -b /usr/local/bin
|
||||
```
|
||||
|
||||
## Binary
|
||||
@@ -333,7 +333,7 @@ Scan your container from inside the container.
|
||||
|
||||
```
|
||||
$ docker run --rm -it alpine:3.11
|
||||
/ # curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/master/contrib/install.sh | sh -s -- -b /usr/local/bin
|
||||
/ # curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sh -s -- -b /usr/local/bin
|
||||
/ # trivy fs /
|
||||
```
|
||||
|
||||
@@ -345,7 +345,7 @@ $ cat Dockerfile
|
||||
FROM alpine:3.7
|
||||
|
||||
RUN apk add curl \
|
||||
&& curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/master/contrib/install.sh | sh -s -- -b /usr/local/bin \
|
||||
&& curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sh -s -- -b /usr/local/bin \
|
||||
&& trivy filesystem --exit-code 1 --no-progress /
|
||||
|
||||
$ docker build -t vulnerable-image .
|
||||
@@ -644,7 +644,7 @@ $ trivy image --input /path/to/alpine
|
||||
|
||||
```
|
||||
$ docker run --rm -it alpine:3.10.2
|
||||
/ # curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/master/contrib/install.sh | sh -s -- -b /usr/local/bin
|
||||
/ # curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sh -s -- -b /usr/local/bin
|
||||
/ # trivy fs /
|
||||
```
|
||||
|
||||
@@ -729,7 +729,7 @@ $ cat Dockerfile
|
||||
FROM alpine:3.7
|
||||
|
||||
RUN apk add curl \
|
||||
&& curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/master/contrib/install.sh | sh -s -- -b /usr/local/bin \
|
||||
&& curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sh -s -- -b /usr/local/bin \
|
||||
&& trivy filesystem --exit-code 1 --no-progress /
|
||||
|
||||
$ docker build -t vulnerable-image .
|
||||
@@ -742,7 +742,7 @@ $ docker build -t vulnerable-image .
|
||||
Sending build context to Docker daemon 31.14MB
|
||||
Step 1/2 : FROM alpine:3.7
|
||||
---> 6d1ef012b567
|
||||
Step 2/2 : RUN curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/master/contrib/install.sh | sh -s -- -b /usr/local/bin && trivy filesystem --exit-code 1 --no-progress /
|
||||
Step 2/2 : RUN curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sh -s -- -b /usr/local/bin && trivy filesystem --exit-code 1 --no-progress /
|
||||
---> Running in 27b004205da0
|
||||
2020-06-01T14:10:41.261Z INFO Need to update DB
|
||||
2020-06-01T14:10:41.262Z INFO Downloading DB...
|
||||
@@ -1688,7 +1688,7 @@ Distroless: https://github.com/GoogleContainerTools/distroless
|
||||
|
||||
The path of these files does not matter.
|
||||
|
||||
Example: https://github.com/aquasecurity/trivy-ci-test/blob/master/Dockerfile
|
||||
Example: https://github.com/aquasecurity/trivy-ci-test/blob/main/Dockerfile
|
||||
|
||||
## Image Tar format
|
||||
Trivy scans a tar image with the following format.
|
||||
@@ -1856,7 +1856,7 @@ However, the purpose of this database is to make it possible to know what packag
|
||||
As README says, it is not a complete database of all security issues in Alpine.
|
||||
|
||||
`Trivy` collects vulnerability information in Alpine Linux from [Alpine Linux aports repository](https://gitlab.alpinelinux.org/alpine/aports).
|
||||
Then, those vulnerabilities will be saved on [vuln-list](https://github.com/aquasecurity/vuln-list/tree/master/alpine).
|
||||
Then, those vulnerabilities will be saved on [vuln-list](https://github.com/aquasecurity/vuln-list/tree/main/alpine).
|
||||
|
||||
`alpine-secdb` has 6959 vulnerabilities (as of 2019/05/12).
|
||||
`vuln-list` has 11101 vulnerabilities related to Alpine Linux (as of 2019/05/12).
|
||||
|
||||
@@ -19,4 +19,4 @@ done
|
||||
|
||||
git add .
|
||||
git commit -m "Update deb packages"
|
||||
git push origin master
|
||||
git push origin main
|
||||
|
||||
@@ -23,5 +23,5 @@ done
|
||||
|
||||
git add .
|
||||
git commit -m "Update rpm packages"
|
||||
git push origin master
|
||||
git push origin main
|
||||
|
||||
|
||||
@@ -13,7 +13,7 @@ Trivy_container_scanning:
|
||||
- export TRIVY_VERSION=${TRIVY_VERSION:-v0.4.3}
|
||||
- apk add --no-cache curl docker-cli
|
||||
- docker login -u "$CI_REGISTRY_USER" -p "$CI_REGISTRY_PASSWORD" $CI_REGISTRY
|
||||
- curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/master/contrib/install.sh | sh -s -- -b /usr/local/bin ${TRIVY_VERSION}
|
||||
- curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sh -s -- -b /usr/local/bin ${TRIVY_VERSION}
|
||||
- curl -sSL -o /tmp/trivy-gitlab.tpl https://github.com/aquasecurity/trivy/raw/${TRIVY_VERSION}/contrib/gitlab.tpl
|
||||
script:
|
||||
- trivy --exit-code 0 --cache-dir .trivycache/ --no-progress --format template --template "@/tmp/trivy-gitlab.tpl" -o gl-container-scanning-report.json $IMAGE
|
||||
|
||||
Reference in New Issue
Block a user