Open gopurx opened 2 years ago
We've also been seeing this issue for the past few days. Any pointers on potential trouble shooting ideas, or paths forward would be much appreciated.
Also seeing this
After a bit of diffing it seems the issue is this breaking change https://github.com/aquasecurity/trivy/discussions/1515
Later versions need to use "trivy image"
e.g. the following works
docker run --rm -v /var/run/docker.sock:/var/run/docker.sock \ -v $HOME/Library/Caches:/root/.cache/ aquasec/trivy image python:3.9-slim-buster
@ronanbrowne We have already migrated the fix. Can you please verify?
@gopurx Are you still facing this issue?
@koushdey Yes, I am experiencing this error. Latest is yesterday. Observation is the image scan outputs when there are CVEs to respond and action error out when there are no CVE to respond.
Any update on this issue, want to check if I am the only one receiving this error?
I'm also still seeing it on my scans.
@gopurx @a-rhote Can you mention the versions you are running? So that I can verify if the fix is present on the version or not. This issue is not reported by many recently.
name: Scan image
uses: Azure/container-scan@v0.1
env:
DOCKER_CONTENT_TRUST: 1
with:
image-name: <my image>:<tag>
severity-threshold: HIGH
run-quality-checks: true
This is what we're using in our ci action definition @koushdey
@koushdey, I tried both v0 and v0.1.
uses: Azure/container-scan@v0
with:
image-name: <my image>:<tag>
Is it possible to share the image name and tag name used in the action? It's possible that we are getting the issue due to some chars in the input.
Is it possible to share the image name and tag name used in the action? It's possible that we are getting the issue due to some chars in the input.
@koushdey
Sure it's dev_people_api:<git commit hash>
or something like dev_people_sqs-consumer:<git commit hash>
This issue is idle because it has been open for 14 days with no activity.
Can anyone respond to this issue?
I "fixed" this with by disabling quality checks:
- name: Assess Vulnerability
uses: Azure/container-scan@v0
with:
image-name: ${{ env.IMAGE_NAME }}
run-quality-checks: false
thanks @aneisch for the workaround. Hope we will have a fix for using CIS quality check
This issue is idle because it has been open for 14 days with no activity.
Edit 2022/22/29: I just re-read my post and realized that my case and the OP's case are different. So I have edited it.
Statuscode: 403, StatusMessage: Forbidden
This issue is idle because it has been open for 14 days with no activity.
Confirmed this is still an issue
scan-public-images:
runs-on: ubuntu-latest
steps:
- uses: Azure/container-scan@v0.1
env:
DOCKER_CONTENT_TRUST: 1
with:
image-name: redis:7.0.5-alpine
/usr/bin/tar xz --warning=no-unknown-keyword -C /home/runner/work/_temp/a58e3288-c559-4854-8845-261cc4d3e862 -f /home/runner/work/curally/curally/_temp/tools/trivy
Scanning for vulnerabilties in image: redis:7.0.5-alpine
No vulnerabilities were detected in the container image
/usr/bin/tar --version
tar (GNU tar) 1.30
Copyright (C) 2017 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Written by John Gilmore and Jay Fenlason.
/usr/bin/tar xz --warning=no-unknown-keyword -C /home/runner/work/_temp/e36cbafa-9374-4e5a-9f[25](https://github.com/x/x/actions/runs/3463569325/jobs/5783987634#step:2:26)-46e115a[30](https://github.com/x/x/actions/runs/3463569325/jobs/5783987634#step:2:31)6ea -f /home/runner/work/x/x/_temp/tools/dockle
Scanning for CIS and best practice violations...
Error: Table data must not contain control characters.
This issue is idle because it has been open for 14 days with no activity.
Still a problem ...
This issue is idle because it has been open for 14 days with no activity.
Tried using both v0 and v0.1 and consistently receiving this error message while running the action.
Any suggestions on what could be wrong here?