dependabot[bot]
43c05d06fc
chore(deps): bump github.com/aquasecurity/trivy from 0.20.0 to 0.22.0 ( #1350 )
...
* chore(deps): bump github.com/aquasecurity/trivy from 0.20.0 to 0.22.0
Bumps [github.com/aquasecurity/trivy](https://github.com/aquasecurity/trivy ) from 0.20.0 to 0.22.0.
- [Release notes](https://github.com/aquasecurity/trivy/releases )
- [Changelog](https://github.com/aquasecurity/trivy/blob/main/goreleaser.yml )
- [Commits](https://github.com/aquasecurity/trivy/compare/v0.20.0...v0.22.0 )
---
updated-dependencies:
- dependency-name: github.com/aquasecurity/trivy
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot] <support@github.com >
* fix(library): trivy scan
* chore(integration): add lockfiles
* fix(library): support gobinary scan via trivy
* chore: add pom in IsTrivySupportedLib
* chore: fix LIBS
* fix(library): support trivy offline scan
* chore(integration): move vulsio/integration repository
* chore(integration): add integration as git submodule
* chore: update .gitignore
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: MaineK00n <mainek00n.1229@gmail.com >
2022-01-18 08:27:11 +09:00
Kota Kanbe
aac5ef1438
feat: update-trivy ( #1316 )
...
* feat: update-trivy
* add v2 parser
* implement v2
* refactor
* feat: add show version to future-vuls
* add test case for v2
* trivy v0.20.0
* support --list-all-pkgs
* fix lint err
* add test case for jar
* add a test case for gemspec in container
* remove v1 parser and change Library struct
* Changed the field name in the model struct LibraryScanner
* add comment
* fix comment
* fix comment
* chore
* add struct tag
2021-10-08 17:22:06 +09:00
Kota Kanbe
47e6ea249d
chore: fix lint warning ( #1301 )
2021-09-12 20:35:56 +09:00
Kota Kanbe
4a72295de7
feat(saas): support for library-only scanning ( #1300 )
2021-09-10 15:38:35 +09:00
MaineK00n
96c3592db1
breaking-change(go-cve-dict): support new go-cve-dictionary ( #1277 )
...
* feat(model): change CveContents(map[string]CveContent) to map[string][]CveContent
* fix(cpescan): use CveIDSource
* chore: check Nvd, Jvn data
* chore: go-cve-dictionary update
* chore: add to cveDetails as is, since CveID is embedded in the response
2021-08-13 18:00:55 +09:00
Tomoya Amachi
0179f4299a
fix(trivy-to-vuls): converts even if null vulnerabilities ( #1201 )
2021-03-22 19:32:08 +09:00
Kota Kanbe
64a6222bf9
fix(report): set created_at and updated_at of trivy to json ( #1162 )
2021-02-03 17:52:44 +09:00
sadayuki-matsuno
89f49b0e29
Fix trivy parser test ( #1014 )
...
* fix trivy parser test
* fixed parser data
2020-06-24 17:14:43 +09:00
sadayuki-matsuno
4ae87cc36c
Fix releaser ( #988 )
...
* fix releaser
* fix releaser
* fix releaser
* fix releaser
* add 32 bit releaser and add exit code in cmd
* delete 32 bit releaser
* fix
2020-06-05 15:04:06 +09:00
sadayuki-matsuno
d18e7a751d
add trivy parser ( #981 )
...
* add trivy parser
* fix test
* format
* add title and summary
* add trivy parse command
* add uploader
* set args by env
* add README
* add err check
* fix
* fix
* fix
* fix test
* update trivy
* refactor
* delete require uuid
* delete uuid from trivy parser
Co-authored-by: Kota Kanbe <kotakanbe@gmail.com >
2020-05-29 18:06:45 +09:00