forked from pool/trivy
- Update to version 0.28.0 (bsc#1199760, CVE-2022-28946): * fix: remove Highlighted from json output (#2131) * fix: remove trivy-kubernetes replace (#2132) * docs: Add Operator docs under Kubernetes section (#2111) * fix(k8s): security-checks panic (#2127) * ci: added k8s scope (#2130) * docs: Update misconfig output in examples (#2128) * fix(misconf): Fix coloured output in Goland terminal (#2126) * docs(secret): Fix default value of --security-checks in docs (#2107) * refactor(report): move colorize function from trivy-db (#2122) * feat: k8s resource scanning (#2118) * chore: add CODEOWNERS (#2121) * feat(image): add `--server` option for remote scans (#1871) * refactor: k8s (#2116) * refactor: export useful APIs (#2108) * docs: fix k8s doc (#2114) * feat(kubernetes): Add report flag for summary (#2112) * fix: Remove problematic advanced rego policies (#2113) * feat(misconf): Add special output format for misconfigurations (#2100) * feat: add k8s subcommand (#2065) * chore: fix make lint version (#2102) * fix(java): handle relative pom modules (#2101) * fix(misconf): Add missing links for non-rego misconfig results (#2094) * feat(misconf): Added fs.FS based scanning via latest defsec (#2084) * chore(deps): bump trivy-issue-action to v0.0.4 (#2091) * chore(deps): bump github.com/twitchtv/twirp (#2077) * chore(deps): bump github.com/urfave/cli/v2 from 2.4.0 to 2.5.1 (#2074) * chore(os): updated fanal version and alpine distroless test (#2086) * chore(deps): bump github.com/CycloneDX/cyclonedx-go from 0.5.1 to 0.5.2 (#2075) * chore(deps): bump github.com/samber/lo from 1.16.0 to 1.19.0 (#2076) OBS-URL: https://build.opensuse.org/request/show/978633 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/trivy?expand=0&rev=25
66 lines
2.0 KiB
RPMSpec
66 lines
2.0 KiB
RPMSpec
#
|
|
# spec file for package trivy
|
|
#
|
|
# Copyright (c) 2022 SUSE LLC
|
|
#
|
|
# All modifications and additions to the file contributed by third parties
|
|
# remain the property of their copyright owners, unless otherwise agreed
|
|
# upon. The license for this file, and modifications and additions to the
|
|
# file, is the same license as for the pristine package itself (unless the
|
|
# license for the pristine package is not an Open Source License, in which
|
|
# case the license is the MIT License). An "Open Source License" is a
|
|
# license that conforms to the Open Source Definition (Version 1.9)
|
|
# published by the Open Source Initiative.
|
|
|
|
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
|
#
|
|
# nodebuginfo
|
|
|
|
|
|
%global goipath github.com/aquasecurity/trivy
|
|
Name: trivy
|
|
Version: 0.28.0
|
|
Release: 0
|
|
Summary: A Simple and Comprehensive Vulnerability Scanner for Containers
|
|
License: Apache-2.0
|
|
Group: System/Management
|
|
URL: https://github.com/aquasecurity/trivy
|
|
Source: %{name}-%{version}.tar.gz
|
|
Source1: vendor.tar.gz
|
|
BuildRequires: golang-packaging
|
|
BuildRequires: golang(API) = 1.18
|
|
Requires: ca-certificates
|
|
Requires: git-core
|
|
Requires: rpm
|
|
|
|
%description
|
|
Trivy (`tri` pronounced like trigger, `vy` pronounced like envy) is a simple and
|
|
comprehensive vulnerability scanner for containers and other artifacts. A
|
|
software vulnerability is a glitch, flaw, or weakness present in the software or
|
|
in an Operating System. Trivy detects vulnerabilities of OS packages (Alpine,
|
|
RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn,
|
|
etc.). Trivy is easy to use. Just install the binary and you're ready to
|
|
scan. All you need to do for scanning is to specify a target such as an image
|
|
name of the container.
|
|
|
|
%prep
|
|
%setup -qa1
|
|
%autopatch -p1
|
|
|
|
%build
|
|
%goprep %{goipath}
|
|
|
|
export CGO_ENABLED=0
|
|
|
|
%gobuild -mod vendor -ldflags "-X=main.version=%{version}" cmd/trivy
|
|
|
|
%install
|
|
%goinstall
|
|
|
|
%files
|
|
%license LICENSE
|
|
%doc README.md
|
|
%{_bindir}/%{name}
|
|
|
|
%changelog
|