Prepare for v0.39.0 #3933
Closed
knqyf263
started this conversation in
Development
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Draft to collaborate on v0.39.0 release announcement
🚀 What's new? 🚀
🌐 Amazon Linux 2023 🛡️
Trivy now supports vulnerability scanning for Amazon Linux 2023.
📦 npm (Node.js) lock file v3 🔒
Trivy now supports npm's package-lock.json v3 for SBOM generation and vulnerability detection. For more details about package-lock.json v3, please refer to the following document:
https://docs.npmjs.com/cli/v9/configuring-npm/package-lock-json?v=true#lockfileversion
📚 npm (Node.js) license 📄
Previously, Trivy was unable to detect the licenses of npm dependencies, as package-lock.json does not contain license information. Starting with this version, Trivy now scans the node_modules folder located alongside package-lock.json to identify license information. Please note that you need to run npm install beforehand to generate the node_modules folder.
The above example shows the license of
react-jsis MIT.🧶 Exclude development dependencies in Yarn 🚫
Previously, yarn.lock files Trivy scans don't include
devDependenciesinformation, resulting in the detection of vulnerabilities in devDependencies as well. For more details, please check this Issue.Starting with this version, by scanning
package.jsonnext toyarn.locksimultaneously,devDependenciesare now detected and their vulnerabilities are no longer reported.🎼 Composer (PHP) license and dependency tree 🌳
Support for Composer, the PHP package manager, has been improved, enabling the detection of licenses and the display of the dependency tree. For an accurate dependency tree, both
composer.jsonandcomposer.lockfiles must be present.🌳 Cargo (Rust) dependency tree 🦀
Displaying the dependency tree for Cargo, the package manager for Rust, is now possible. For an accurate dependency tree, both
Cargo.tomlandCargo.lockfiles must be present.For more details, please check this document.
🔐 Registry authentication 🔑
For private container image authentication, TRIVY_USERNAME and TRIVY_PASSWORD were available, but now it is also possible to pass them using CLI flags such as --username and --password. Please note that TRIVY_PASSWORD is recommended for security reasons.
Additionally, these authentication credentials are now also used for downloading the vulnerability database and other OCI artifacts. This is useful when you want to host the database in your own private OCI registry. For more details, please check here.
⎈ Faster Kubernetes cluster scanning 🏎️
Scanning an entire Kubernetes clusters can be an intensive job, especially on large clusters. This change accelerates Kubernetes scans by running multiple tasks in parallel. You can also control the degree of parallelism with a new flag:
--parallel(default value: 5)⎈ Kubernetes node toleration support 🚩
When scanning Kubernetes clusters for CIS benchmark compliance, Trivy would spin up a job on nodes to collect more information from inside the cluster. The new flag
--tolerationsallows addressing node taints for the node-collector job:✳️ Skip by glob pattern ⏭
The
--skip-filesand--skip-dirsflags, which were used to exclude specific content from being scanned, now support glob patterns for more flexible configuration (glob patterns allow including*and other advanced syntax).Will skip any file named
barin the subdirectories of foo.The flag also works similarly with
--skip-dirsas well.⛅️ Support for NIFCLOUD 🇯🇵
Trivy now supports misconfiguration scanning for NIFCLOUD
Special thanks to @fuku2014
Beta Was this translation helpful? Give feedback.
All reactions