|
1 | 1 | .PHONY: trivy-license-check trivy-generate-sbom trivy-scan-python trivy-scan-node trivy-scan-go trivy-scan-java |
2 | 2 |
|
3 | 3 | trivy-license-check: |
4 | | - mkdir -p .trivy_out/ |
5 | | - @if [ -f poetry.lock ]; then \ |
6 | | - poetry self add poetry-plugin-export; \ |
7 | | - poetry export -f requirements.txt --with dev --without-hashes --output=requirements.txt; \ |
8 | | - fi |
9 | | - @if [ -f src/go.sum ]; then \ |
10 | | - cd src && go mod vendor; \ |
11 | | - fi |
12 | | - VIRTUAL_ENV=./.venv/ trivy fs . \ |
13 | | - --scanners license \ |
14 | | - --severity HIGH,CRITICAL \ |
15 | | - --config trivy.yaml \ |
16 | | - --include-dev-deps \ |
17 | | - --pkg-types library \ |
18 | | - --exit-code 1 \ |
19 | | - --output .trivy_out/license_scan.txt \ |
20 | | - --format table |
21 | | - @if [ -f poetry.lock ]; then rm -f requirements.txt; fi |
22 | | - @if [ -f src/go.sum ]; then rm -rf src/vendor; fi |
| 4 | + echo "Not implemented" |
| 5 | +# mkdir -p .trivy_out/ |
| 6 | +# @if [ -f poetry.lock ]; then \ |
| 7 | +# poetry self add poetry-plugin-export; \ |
| 8 | +# poetry export -f requirements.txt --with dev --without-hashes --output=requirements.txt; \ |
| 9 | +# fi |
| 10 | +# @if [ -f src/go.sum ]; then \ |
| 11 | +# cd src && go mod vendor; \ |
| 12 | +# fi |
| 13 | +# VIRTUAL_ENV=./.venv/ trivy fs . \ |
| 14 | +# --scanners license \ |
| 15 | +# --severity HIGH,CRITICAL \ |
| 16 | +# --config trivy.yaml \ |
| 17 | +# --include-dev-deps \ |
| 18 | +# --pkg-types library \ |
| 19 | +# --exit-code 1 \ |
| 20 | +# --output .trivy_out/license_scan.txt \ |
| 21 | +# --format table |
| 22 | +# @if [ -f poetry.lock ]; then rm -f requirements.txt; fi |
| 23 | +# @if [ -f src/go.sum ]; then rm -rf src/vendor; fi |
23 | 24 |
|
24 | 25 | trivy-generate-sbom: |
25 | | - mkdir -p .trivy_out/ |
26 | | - trivy fs . \ |
27 | | - --scanners vuln \ |
28 | | - --config trivy.yaml \ |
29 | | - --include-dev-deps \ |
30 | | - --exit-code 0 \ |
31 | | - --output .trivy_out/sbom.cdx.json \ |
32 | | - --format cyclonedx |
| 26 | + echo "Not implemented" |
| 27 | +# mkdir -p .trivy_out/ |
| 28 | +# trivy fs . \ |
| 29 | +# --scanners vuln \ |
| 30 | +# --config trivy.yaml \ |
| 31 | +# --include-dev-deps \ |
| 32 | +# --exit-code 0 \ |
| 33 | +# --output .trivy_out/sbom.cdx.json \ |
| 34 | +# --format cyclonedx |
33 | 35 |
|
34 | 36 | trivy-scan-python: |
35 | | - mkdir -p .trivy_out/ |
36 | | - trivy fs . \ |
37 | | - --scanners vuln \ |
38 | | - --severity HIGH,CRITICAL \ |
39 | | - --config trivy.yaml \ |
40 | | - --include-dev-deps \ |
41 | | - --exit-code 1 \ |
42 | | - --skip-files "**/package-lock.json,**/go.mod,**/pom.xml" \ |
43 | | - --output .trivy_out/dependency_results_python.txt \ |
44 | | - --format table |
| 37 | + echo "Not implemented" |
| 38 | +# mkdir -p .trivy_out/ |
| 39 | +# trivy fs . \ |
| 40 | +# --scanners vuln \ |
| 41 | +# --severity HIGH,CRITICAL \ |
| 42 | +# --config trivy.yaml \ |
| 43 | +# --include-dev-deps \ |
| 44 | +# --exit-code 1 \ |
| 45 | +# --skip-files "**/package-lock.json,**/go.mod,**/pom.xml" \ |
| 46 | +# --output .trivy_out/dependency_results_python.txt \ |
| 47 | +# --format table |
45 | 48 |
|
46 | 49 | trivy-scan-node: |
47 | | - mkdir -p .trivy_out/ |
48 | | - trivy fs . \ |
49 | | - --scanners vuln \ |
50 | | - --severity HIGH,CRITICAL \ |
51 | | - --config trivy.yaml \ |
52 | | - --include-dev-deps \ |
53 | | - --exit-code 1 \ |
54 | | - --skip-files "**/poetry.lock,**/go.mod,**/pom.xml" \ |
55 | | - --output .trivy_out/dependency_results_node.txt \ |
56 | | - --format table |
| 50 | + echo "Not implemented" |
| 51 | +# mkdir -p .trivy_out/ |
| 52 | +# trivy fs . \ |
| 53 | +# --scanners vuln \ |
| 54 | +# --severity HIGH,CRITICAL \ |
| 55 | +# --config trivy.yaml \ |
| 56 | +# --include-dev-deps \ |
| 57 | +# --exit-code 1 \ |
| 58 | +# --skip-files "**/poetry.lock,**/go.mod,**/pom.xml" \ |
| 59 | +# --output .trivy_out/dependency_results_node.txt \ |
| 60 | +# --format table |
57 | 61 |
|
58 | 62 | trivy-scan-go: |
59 | | - mkdir -p .trivy_out/ |
60 | | - trivy fs . \ |
61 | | - --scanners vuln \ |
62 | | - --severity HIGH,CRITICAL \ |
63 | | - --config trivy.yaml \ |
64 | | - --include-dev-deps \ |
65 | | - --exit-code 1 \ |
66 | | - --skip-files "**/poetry.lock,**/package-lock.json,**/pom.xml" \ |
67 | | - --output .trivy_out/dependency_results_go.txt \ |
68 | | - --format table |
| 63 | + echo "Not implemented" |
| 64 | +# mkdir -p .trivy_out/ |
| 65 | +# trivy fs . \ |
| 66 | +# --scanners vuln \ |
| 67 | +# --severity HIGH,CRITICAL \ |
| 68 | +# --config trivy.yaml \ |
| 69 | +# --include-dev-deps \ |
| 70 | +# --exit-code 1 \ |
| 71 | +# --skip-files "**/poetry.lock,**/package-lock.json,**/pom.xml" \ |
| 72 | +# --output .trivy_out/dependency_results_go.txt \ |
| 73 | +# --format table |
69 | 74 |
|
70 | 75 | trivy-scan-java: |
71 | | - mkdir -p .trivy_out/ |
72 | | - trivy fs . \ |
73 | | - --scanners vuln \ |
74 | | - --severity HIGH,CRITICAL \ |
75 | | - --config trivy.yaml \ |
76 | | - --include-dev-deps \ |
77 | | - --exit-code 1 \ |
78 | | - --skip-files "**/poetry.lock,**/package-lock.json,**/go.mod" \ |
79 | | - --output .trivy_out/dependency_results_java.txt \ |
80 | | - --format table |
| 76 | + echo "Not implemented" |
| 77 | +# mkdir -p .trivy_out/ |
| 78 | +# trivy fs . \ |
| 79 | +# --scanners vuln \ |
| 80 | +# --severity HIGH,CRITICAL \ |
| 81 | +# --config trivy.yaml \ |
| 82 | +# --include-dev-deps \ |
| 83 | +# --exit-code 1 \ |
| 84 | +# --skip-files "**/poetry.lock,**/package-lock.json,**/go.mod" \ |
| 85 | +# --output .trivy_out/dependency_results_java.txt \ |
| 86 | +# --format table |
81 | 87 |
|
82 | 88 | trivy-scan-docker: guard-DOCKER_IMAGE |
83 | | - mkdir -p .trivy_out/ |
84 | | - trivy image $${DOCKER_IMAGE} \ |
85 | | - --scanners vuln \ |
86 | | - --severity HIGH,CRITICAL \ |
87 | | - --config trivy.yaml \ |
88 | | - --exit-code 1 \ |
89 | | - --pkg-types os,library \ |
90 | | - --output .trivy_out/dependency_results_docker.txt \ |
91 | | - --format table |
| 89 | + echo "Not implemented" |
| 90 | +# mkdir -p .trivy_out/ |
| 91 | +# trivy image $${DOCKER_IMAGE} \ |
| 92 | +# --scanners vuln \ |
| 93 | +# --severity HIGH,CRITICAL \ |
| 94 | +# --config trivy.yaml \ |
| 95 | +# --exit-code 1 \ |
| 96 | +# --pkg-types os,library \ |
| 97 | +# --output .trivy_out/dependency_results_docker.txt \ |
| 98 | +# --format table |
0 commit comments