Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Vulnerability scan using Trivy fs scan command #872

Merged
merged 1 commit into from
Jan 20, 2022

Conversation

deven0t
Copy link
Contributor

@deven0t deven0t commented Dec 23, 2021

trivy.command: fs will change the trivy scan option to pick up vulnerability scans
using trivy fs scan command

This is the implementation of first approach suggested here #830

@codecov
Copy link

codecov bot commented Dec 23, 2021

Codecov Report

Merging #872 (c2c8b13) into main (a65a584) will decrease coverage by 0.12%.
The diff coverage is 59.19%.

Impacted file tree graph

@@            Coverage Diff             @@
##             main     #872      +/-   ##
==========================================
- Coverage   65.02%   64.89%   -0.13%     
==========================================
  Files          59       59              
  Lines        6679     6982     +303     
==========================================
+ Hits         4343     4531     +188     
- Misses       1886     1997     +111     
- Partials      450      454       +4     
Impacted Files Coverage Δ
pkg/kube/object.go 50.60% <0.00%> (-9.80%) ⬇️
pkg/operator/controller/vulnerabilityreport.go 61.58% <50.00%> (+1.12%) ⬆️
pkg/plugin/trivy/plugin.go 80.78% <76.37%> (-1.26%) ⬇️
pkg/plugin/factory.go 81.13% <100.00%> (ø)
pkg/operator/controller/configauditreport.go 65.79% <0.00%> (+0.28%) ⬆️
pkg/operator/controller/ciskubebenchreport.go 57.80% <0.00%> (+2.10%) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update a65a584...c2c8b13. Read the comment docs.

Copy link
Contributor

@danielpacak danielpacak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey @deven0t It's a good start. See my comments and let me know wdyt?

pkg/kube/object.go Outdated Show resolved Hide resolved
pkg/kube/object.go Outdated Show resolved Hide resolved
pkg/kube/object.go Outdated Show resolved Hide resolved
pkg/vulnerabilityreport/builder.go Outdated Show resolved Hide resolved
pkg/operator/controller/vulnerabilityreport.go Outdated Show resolved Hide resolved
@deven0t deven0t force-pushed the fs-scan-same-host branch 3 times, most recently from 857e668 to 41107fe Compare January 17, 2022 10:14
Copy link
Contributor

@danielpacak danielpacak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👋 @deven0t Overall the changes look good to me! I left a few more comments to consider. Let's catch up and discuss before we merge this PR.

pkg/kube/object.go Outdated Show resolved Hide resolved
pkg/kube/object.go Outdated Show resolved Hide resolved
pkg/operator/controller/vulnerabilityreport.go Outdated Show resolved Hide resolved
pkg/operator/controller/vulnerabilityreport.go Outdated Show resolved Hide resolved
pkg/plugin/trivy/plugin.go Show resolved Hide resolved
pkg/plugin/trivy/plugin.go Outdated Show resolved Hide resolved
``trivy.command: fs`` will change the trivy scan option to pick up vulnerability scans
using trivy fs scan command

This is the implementation of approach suggested here aquasecurity#830
@danielpacak danielpacak merged commit 934e0bd into aquasecurity:main Jan 20, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants