Dirk Mueller
4e5f1d07de
* fix(cli): pass integer to exit-on-eol (#3716) * feat: add kubernetes pss compliance (#3498) * feat: Adding --module-dir and --enable-modules (#3677) * feat: add special IDs for filtering secrets (#3702) * chore(deps): Update defsec (#3713) * docs(misconf): Add guide on input schema (#3692) * feat(go): support dependency graph and show only direct dependencies in the tree (#3691) * feat: docker multi credential support (#3631) * feat: summarize vulnerabilities in compliance reports (#3651) * feat(python): parse pyproject.toml alongside poetry.lock (#3695) * feat(python): add dependency tree for poetry lock file (#3665) * fix(cyclonedx): incompliant affect ref (#3679) * chore(helm): update skip-db-update environment variable (#3657) * fix(spdx): change CreationInfo timestamp format RFC3336Nano to RFC3336 (#3675) * fix(sbom): export empty dependencies in CycloneDX (#3664) * docs: java-db air-gap doc tweaks (#3561) * feat(go): license support (#3683) * feat(ruby): add dependency tree/location support for Gemfile.lock (#3669) * fix(k8s): k8s label size (#3678) * fix(cyclondx): fix array empty value, null to [] (#3676) * refactor: rewrite gomod analyzer as post-analyzer (#3674) * feat: config outdated-api result filtered by k8s version (#3578) * fix: Update to Alpine 3.17.2 (#3655) * feat: add support for virtual files (#3654) * feat: add post-analyzers (#3640) * chore(deps): updates wazero to 1.0.0-pre.9 (#3653) * chore(deps): bump github.com/go-openapi/runtime from 0.24.2 to 0.25.0 (#3528) * chore(deps): bump github.com/containerd/containerd from 1.6.15 to 1.6.18 (#3633) * feat(python): add dependency locations for Pipfile.lock (#3614) OBS-URL: https://build.opensuse.org/package/show/Virtualization:containers/trivy?expand=0&rev=44
67 lines
2.0 KiB
RPMSpec
67 lines
2.0 KiB
RPMSpec
#
|
|
# spec file for package trivy
|
|
#
|
|
# Copyright (c) 2023 SUSE LLC
|
|
#
|
|
# All modifications and additions to the file contributed by third parties
|
|
# remain the property of their copyright owners, unless otherwise agreed
|
|
# upon. The license for this file, and modifications and additions to the
|
|
# file, is the same license as for the pristine package itself (unless the
|
|
# license for the pristine package is not an Open Source License, in which
|
|
# case the license is the MIT License). An "Open Source License" is a
|
|
# license that conforms to the Open Source Definition (Version 1.9)
|
|
# published by the Open Source Initiative.
|
|
|
|
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
|
#
|
|
# nodebuginfo
|
|
|
|
|
|
%global goipath github.com/aquasecurity/trivy
|
|
Name: trivy
|
|
Version: 0.38.0
|
|
Release: 0
|
|
Summary: A Simple and Comprehensive Vulnerability Scanner for Containers
|
|
License: Apache-2.0
|
|
Group: System/Management
|
|
URL: https://github.com/aquasecurity/trivy
|
|
Source: %{name}-%{version}.tar.zst
|
|
Source1: vendor.tar.zst
|
|
BuildRequires: golang-packaging
|
|
BuildRequires: zstd
|
|
BuildRequires: golang(API) = 1.19
|
|
Requires: ca-certificates
|
|
Requires: git-core
|
|
Requires: rpm
|
|
|
|
%description
|
|
Trivy (`tri` pronounced like trigger, `vy` pronounced like envy) is a simple and
|
|
comprehensive vulnerability scanner for containers and other artifacts. A
|
|
software vulnerability is a glitch, flaw, or weakness present in the software or
|
|
in an Operating System. Trivy detects vulnerabilities of OS packages (Alpine,
|
|
RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn,
|
|
etc.). Trivy is easy to use. Just install the binary and you're ready to
|
|
scan. All you need to do for scanning is to specify a target such as an image
|
|
name of the container.
|
|
|
|
%prep
|
|
%setup -qa1
|
|
%autopatch -p1
|
|
|
|
%build
|
|
%goprep %{goipath}
|
|
|
|
export CGO_ENABLED=0
|
|
|
|
%gobuild -mod vendor -ldflags "-X=main.version=%{version}" cmd/trivy
|
|
|
|
%install
|
|
%goinstall
|
|
|
|
%files
|
|
%license LICENSE
|
|
%doc README.md
|
|
%{_bindir}/%{name}
|
|
|
|
%changelog
|