forked from pool/trivy
Dirk Mueller
c7371b4a31
* docs: add Rekor SBOM attestation scanning (#2893) * chore: narrow the owner scope (#2894) * fix: remove a patch number from the recommendation link (#2891) * fix: enable parsing of UUID-only rekor entry ID (#2887) * docs(sbom): add SPDX scanning (#2885) * docs: restructure docs and add tutorials (#2883) * feat(sbom): scan sbom attestation in the rekor record (#2699) * feat(k8s): support outdated-api (#2877) * chore(deps): bump github.com/moby/buildkit from 0.10.3 to 0.10.4 (#2815) * fix(c): support revisions in Conan parser (#2878) * feat: dynamic links support for scan results (#2838) * chore(deps): bump go.uber.org/zap from 1.22.0 to 1.23.0 (#2818) * docs: update archlinux commands (#2876) * feat(secret): add line from dockerfile where secret was added to secret result (#2780) * feat(sbom): Add unmarshal for spdx (#2868) * chore(deps): bump github.com/aws/aws-sdk-go-v2/config (#2827) * fix: revert asff arn and add documentation (#2852) * docs: batch-import-findings limit (#2851) * chore(deps): bump golang from 1.19.0 to 1.19.1 (#2872) * feat(sbom): Add marshal for spdx (#2867) * build: checkout before setting up Go (#2873) * chore: bump Go to 1.19 (#2861) * docs: azure doc and trivy (#2869) * fix: Scan tarr'd dependencies (#2857) * chore(helm): helm test with ingress (#2630) * feat(report): add secrets to sarif format (#2820) * chore(deps): bump azure/setup-helm from 1.1 to 3.3 (#2807) * refactor: add a new interface for initializing analyzers (#2835) * chore(deps): bump github.com/aws/aws-sdk-go from 1.44.77 to 1.44.92 (#2840) OBS-URL: https://build.opensuse.org/package/show/Virtualization:containers/trivy?expand=0&rev=22
66 lines
2.0 KiB
RPMSpec
66 lines
2.0 KiB
RPMSpec
#
|
|
# spec file for package trivy
|
|
#
|
|
# Copyright (c) 2022 SUSE LLC
|
|
#
|
|
# All modifications and additions to the file contributed by third parties
|
|
# remain the property of their copyright owners, unless otherwise agreed
|
|
# upon. The license for this file, and modifications and additions to the
|
|
# file, is the same license as for the pristine package itself (unless the
|
|
# license for the pristine package is not an Open Source License, in which
|
|
# case the license is the MIT License). An "Open Source License" is a
|
|
# license that conforms to the Open Source Definition (Version 1.9)
|
|
# published by the Open Source Initiative.
|
|
|
|
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
|
#
|
|
# nodebuginfo
|
|
|
|
|
|
%global goipath github.com/aquasecurity/trivy
|
|
Name: trivy
|
|
Version: 0.32.0
|
|
Release: 0
|
|
Summary: A Simple and Comprehensive Vulnerability Scanner for Containers
|
|
License: Apache-2.0
|
|
Group: System/Management
|
|
URL: https://github.com/aquasecurity/trivy
|
|
Source: %{name}-%{version}.tar.gz
|
|
Source1: vendor.tar.gz
|
|
BuildRequires: golang-packaging
|
|
BuildRequires: golang(API) = 1.19
|
|
Requires: ca-certificates
|
|
Requires: git-core
|
|
Requires: rpm
|
|
|
|
%description
|
|
Trivy (`tri` pronounced like trigger, `vy` pronounced like envy) is a simple and
|
|
comprehensive vulnerability scanner for containers and other artifacts. A
|
|
software vulnerability is a glitch, flaw, or weakness present in the software or
|
|
in an Operating System. Trivy detects vulnerabilities of OS packages (Alpine,
|
|
RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn,
|
|
etc.). Trivy is easy to use. Just install the binary and you're ready to
|
|
scan. All you need to do for scanning is to specify a target such as an image
|
|
name of the container.
|
|
|
|
%prep
|
|
%setup -qa1
|
|
%autopatch -p1
|
|
|
|
%build
|
|
%goprep %{goipath}
|
|
|
|
export CGO_ENABLED=0
|
|
|
|
%gobuild -mod vendor -ldflags "-X=main.version=%{version}" cmd/trivy
|
|
|
|
%install
|
|
%goinstall
|
|
|
|
%files
|
|
%license LICENSE
|
|
%doc README.md
|
|
%{_bindir}/%{name}
|
|
|
|
%changelog
|