Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add suse sles 15.2 to the EOL list as well #734

Merged
merged 1 commit into from
Oct 30, 2020

Conversation

dirkmueller
Copy link
Contributor

without that you get this arning:
WARN This OS version is not on the EOL list: suse linux enterprise server 15.2

which is actually misleading because 15.2 is the most current release,
we just don't know when it ends. we can however assume that it runs
for at least another year.

Signed-off-by: Dirk Mueller dirk@dmllr.de
Signed-off-by: Dirk Mueller dmueller@suse.com

without that you get this arning:
  WARN	This OS version is not on the EOL list: suse linux enterprise server 15.2

which is actually misleading because 15.2 is the most current release,
we just don't know when it ends. we can however assume that it runs
for at least another year.

Signed-off-by: Dirk Mueller <dirk@dmllr.de>
Signed-off-by: Dirk Mueller <dmueller@suse.com>
@codecov
Copy link

codecov bot commented Oct 30, 2020

Codecov Report

Merging #734 into master will not change coverage.
The diff coverage is n/a.

Impacted file tree graph

@@           Coverage Diff           @@
##           master     #734   +/-   ##
=======================================
  Coverage   63.96%   63.96%           
=======================================
  Files          48       48           
  Lines        2045     2045           
=======================================
  Hits         1308     1308           
  Misses        605      605           
  Partials      132      132           
Impacted Files Coverage Δ
pkg/detector/ospkg/suse/suse.go 69.23% <ø> (ø)

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update c189aa6...80efb57. Read the comment docs.

@simar7 simar7 self-requested a review October 30, 2020 23:42
Copy link
Member

@simar7 simar7 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks!

@simar7 simar7 merged commit 4555469 into aquasecurity:master Oct 30, 2020
@RohitUppal
Copy link

Is there any impact in terms vulnerabilities not fully detected on SLES 15.2 or this warning can be ignored.

@RohitUppal
Copy link

The latest release of Trivy 0.12.0 does not have this fix. When is the Trivy release planned that will have the mentioned fix.

@simar7
Copy link
Member

simar7 commented Nov 20, 2020

I believe @knqyf263 will release one shortly. Thanks for your patience.

liamg pushed a commit that referenced this pull request Jun 7, 2022
without that you get this arning:
  WARN	This OS version is not on the EOL list: suse linux enterprise server 15.2

which is actually misleading because 15.2 is the most current release,
we just don't know when it ends. we can however assume that it runs
for at least another year.

Signed-off-by: Dirk Mueller <dirk@dmllr.de>
Signed-off-by: Dirk Mueller <dmueller@suse.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants