Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

grype: 0.8.0 -> 0.9.0 #117779

Merged
merged 1 commit into from Mar 27, 2021
Merged

grype: 0.8.0 -> 0.9.0 #117779

merged 1 commit into from Mar 27, 2021

Conversation

r-ryantm
Copy link
Contributor

Automatic update generated by nixpkgs-update tools. This update was made based on information from https://github.com/anchore/grype/releases.

meta.description for grype is: "Vulnerability scanner for container images and filesystems"

meta.homepage for grype is: "https://github.com/anchore/grype"

meta.changelog for grype is: ""

Updates performed
  • Golang update
To inspect upstream changes
Impact
Checks done (click to expand)
  • built on NixOS

  • The tests defined in passthru.tests, if any, passed

  • /nix/store/c9zm3iyjzyw8448hqyd0a0a1wxbqal1i-grype-0.9.0/bin/grype passed the binary check.

  • 1 of 1 passed binary check by having a zero exit code.

  • 0 of 1 passed binary check by having the new version present in output.

  • found 0.9.0 with grep in /nix/store/c9zm3iyjzyw8448hqyd0a0a1wxbqal1i-grype-0.9.0

  • found 0.9.0 in filename of file in /nix/store/c9zm3iyjzyw8448hqyd0a0a1wxbqal1i-grype-0.9.0

  • directory tree listing: https://gist.github.com/a5169ecaff2701931ec5679ec64768ee

  • du listing: https://gist.github.com/1fdcd2319474f357ff2d97faca8bd30e


Rebuild report (if merged into master) (click to expand)
4 total rebuild path(s)

1 package rebuild(s)

1 x86_64-linux rebuild(s)
1 i686-linux rebuild(s)
1 x86_64-darwin rebuild(s)
1 aarch64-linux rebuild(s)


First fifty rebuilds by attrpath
grype
Instructions to test this update (click to expand)

Either download from Cachix:

nix-store -r /nix/store/c9zm3iyjzyw8448hqyd0a0a1wxbqal1i-grype-0.9.0 \
  --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
  --option trusted-public-keys '
  nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
  cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
  '

(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.

Or, build yourself:

nix-build -A grype https://github.com/r-ryantm/nixpkgs/archive/87e44b865fdd8bf63dda53ec9c8fe5a4730b65a0.tar.gz

After you've downloaded or built it, look at the files and if there are any, run the binaries:

ls -la /nix/store/c9zm3iyjzyw8448hqyd0a0a1wxbqal1i-grype-0.9.0
ls -la /nix/store/c9zm3iyjzyw8448hqyd0a0a1wxbqal1i-grype-0.9.0/bin


Pre-merge build results

We have automatically built all packages that will get rebuilt due to
this change.

This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.

Result of nixpkgs-review run on x86_64-linux 1

1 package built:
  • grype

Maintainer pings

cc @fabaff @kalbasit for testing.

@fabaff
Copy link
Member

fabaff commented Mar 27, 2021

Result of nixpkgs-review pr 117779 run on x86_64-linux 1

1 package built:
  • grype

Copy link
Member

@fabaff fabaff left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

...ew/pr-117779]$ ./results/grype/bin/grype -h

Supports the following image sources:
    grype yourrepo/yourimage:tag     defaults to using images from a Docker daemon
[...]

Update looks good to me.

@fabaff fabaff merged commit ad6907c into NixOS:master Mar 27, 2021
@r-ryantm r-ryantm deleted the auto-update/grype branch March 27, 2021 23:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants