Skip to content

Commit b0f83ff

Browse files
Various Trivy whitelist fixes
Substitute underscore in imagename for consistent formatting in whitelists file and remove unnecessary return code checking
1 parent 21df586 commit b0f83ff

File tree

2 files changed

+3
-6
lines changed

2 files changed

+3
-6
lines changed

etc/kayobe/trivy/allowed-vulnerabilities.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
# keystone_allowed_vulnerabilities:
88
# - CVE-2022-2447
99
#
10-
# barbican-api_allowed_vulnerabilities:
10+
# barbican_api_allowed_vulnerabilities:
1111
# - CVE-2023-31047
1212

1313
global_allowed_vulnerabilities:

tools/scan-images.sh

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,18 +34,15 @@ touch image-scan-output/clean-images.txt image-scan-output/dirty-images.txt
3434
# generate a csv summary
3535
for image in $images; do
3636
filename=$(basename $image | sed 's/:/\./g')
37-
imagename=$(echo $filename | cut -d "." -f 1)
37+
imagename=$(echo $filename | cut -d "." -f 1 | sed 's/-/_/g')
3838
global_vulnerabilities=$(yq .global_allowed_vulnerabilities[] src/kayobe-config/etc/kayobe/trivy/allowed-vulnerabilities.yml)
3939
image_vulnerabilities=$(yq .$imagename'_allowed_vulnerabilities[]' src/kayobe-config/etc/kayobe/trivy/allowed-vulnerabilities.yml)
40-
rc=$?
4140
touch .trivyignore
4241
for vulnerability in $global_vulnerabilities; do
4342
echo $vulnerability >> .trivyignore
4443
done
4544
for vulnerability in $image_vulnerabilities; do
46-
if [ $rc -eq 0 ]; then
47-
echo $vulnerability >> .trivyignore
48-
fi
45+
echo $vulnerability >> .trivyignore
4946
done
5047
if $(trivy image \
5148
--quiet \

0 commit comments

Comments
 (0)