Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[CI] Add Trivy vulnerables check #31

Merged
merged 1 commit into from
Aug 20, 2024
Merged

Conversation

duckhawk
Copy link
Member

@duckhawk duckhawk commented Aug 19, 2024

Description

Add Trivy vulnerables check (also fixes one vulnerable in go code)

What is the expected result?

Modules without known vulnerables

Checklist

  • The code is covered by unit tests.
  • e2e tests passed.
  • Documentation updated according to the changes.
  • Changes were tested in the Kubernetes cluster manually.

Sorry, something went wrong.

@duckhawk duckhawk added the enhancement New feature or request label Aug 19, 2024
@duckhawk duckhawk requested a review from AleksZimin August 19, 2024 12:22
@duckhawk duckhawk self-assigned this Aug 19, 2024
@duckhawk duckhawk force-pushed the add-trivy-check-vulnerables branch 2 times, most recently from ab6b29d to 4d4b72a Compare August 19, 2024 13:18
@duckhawk duckhawk marked this pull request as ready for review August 19, 2024 13:19
@duckhawk duckhawk force-pushed the add-trivy-check-vulnerables branch 2 times, most recently from dd8666e to 8856e8c Compare August 20, 2024 09:00
Signed-off-by: v.oleynikov <[email protected]>
@duckhawk duckhawk force-pushed the add-trivy-check-vulnerables branch from 8856e8c to 25fca96 Compare August 20, 2024 09:02
@AleksZimin AleksZimin merged commit d2d31e4 into main Aug 20, 2024
4 of 5 checks passed
@AleksZimin AleksZimin deleted the add-trivy-check-vulnerables branch August 20, 2024 16:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants