mirror of
https://github.com/aquasecurity/trivy.git
synced 2025-12-12 15:50:15 -08:00
While analyzing failure of the report schema validation i found URL looks like that: `https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)`. This causing gitlab to mark report as invalid. Patch provided just using first word of the url word.
83 lines
2.5 KiB
Smarty
83 lines
2.5 KiB
Smarty
{{- /* Template based on https://docs.gitlab.com/ee/user/application_security/container_scanning/#reports-json-format */ -}}
|
|
{
|
|
"version": "14.0.6",
|
|
"vulnerabilities": [
|
|
{{- $t_first := true }}
|
|
{{- range . }}
|
|
{{- $target := .Target }}
|
|
{{- $image := $target | regexFind "[^\\s]+" }}
|
|
{{- range .Vulnerabilities -}}
|
|
{{- if $t_first -}}
|
|
{{- $t_first = false -}}
|
|
{{ else -}}
|
|
,
|
|
{{- end }}
|
|
{
|
|
"id": "{{ .VulnerabilityID }}",
|
|
"category": "container_scanning",
|
|
"message": {{ .Title | printf "%q" }},
|
|
"description": {{ .Description | printf "%q" }},
|
|
{{- /* cve is a deprecated key, use id instead */}}
|
|
"cve": "{{ .VulnerabilityID }}",
|
|
"severity": {{ if eq .Severity "UNKNOWN" -}}
|
|
"Unknown"
|
|
{{- else if eq .Severity "LOW" -}}
|
|
"Low"
|
|
{{- else if eq .Severity "MEDIUM" -}}
|
|
"Medium"
|
|
{{- else if eq .Severity "HIGH" -}}
|
|
"High"
|
|
{{- else if eq .Severity "CRITICAL" -}}
|
|
"Critical"
|
|
{{- else -}}
|
|
"{{ .Severity }}"
|
|
{{- end }},
|
|
"solution": {{ if .FixedVersion -}}
|
|
"Upgrade {{ .PkgName }} to {{ .FixedVersion }}"
|
|
{{- else -}}
|
|
"No solution provided"
|
|
{{- end }},
|
|
"scanner": {
|
|
"id": "trivy",
|
|
"name": "trivy"
|
|
},
|
|
"location": {
|
|
"dependency": {
|
|
"package": {
|
|
"name": "{{ .PkgName }}"
|
|
},
|
|
"version": "{{ .InstalledVersion }}"
|
|
},
|
|
{{- /* TODO: No mapping available - https://github.com/aquasecurity/trivy/issues/332 */}}
|
|
"operating_system": "Unknown",
|
|
"image": "{{ $image }}"
|
|
},
|
|
"identifiers": [
|
|
{
|
|
{{- /* TODO: Type not extractable - https://github.com/aquasecurity/trivy-db/pull/24 */}}
|
|
"type": "cve",
|
|
"name": "{{ .VulnerabilityID }}",
|
|
"value": "{{ .VulnerabilityID }}",
|
|
"url": "{{ .PrimaryURL }}"
|
|
}
|
|
],
|
|
"links": [
|
|
{{- $l_first := true -}}
|
|
{{- range .References -}}
|
|
{{- if $l_first -}}
|
|
{{- $l_first = false }}
|
|
{{- else -}}
|
|
,
|
|
{{- end -}}
|
|
{
|
|
"url": "{{ regexFind "[^ ]+" . }}"
|
|
}
|
|
{{- end }}
|
|
]
|
|
}
|
|
{{- end -}}
|
|
{{- end }}
|
|
],
|
|
"remediations": []
|
|
}
|