-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Problem with downloading images from Quay.io #401
Comments
Same problem for us thanks |
I'm using Trivy 0.5.2 and see |
I'm sorry for the late reply, but they seem to use v1 schema. They return v1 schema even when we specify v2 schema in
Trivy doesn't support v1 schema. I'm sorry for the confusing error message. At the next version, it shows |
Would you try v0.6.0? If it says |
yeah, v1 for that calico container:
|
On the other hand if I pull first, then it gives unknown OS too, okay:
|
@Krenair Thank you for the confirmation. Yes, calico uses v1 schema which is not supported. Then, We don't have a plan to support v1 schema. If you want to scan an image with v1 schema, you can do it after pulling the image by docker. As for busybox, we can't detect vulnerabilities of os packages at the moment because it doesn't have a package manager such as So, they are not bugs. You can watch the above issue for the enhancement. If you have any other problems, don't hesitate to open this issue again. |
Thanks! |
…ulling down first This is to work around trivy being unwilling to work with their seemingly broken responses, see aquasecurity/trivy#401 (comment) This begins vulnerability checking on the following containers: quay.io/bitnami/sealed-secrets-controller:v0.7.0 quay.io/calico/node:v3.8.1 quay.io/open-policy-agent/gatekeeper:v3.0.4-beta.1 quay.io/kiali/kiali:v1.9
…ulling down first This is to work around trivy being unwilling to work with their seemingly broken responses, see aquasecurity/trivy#401 (comment) This begins vulnerability checking on the following containers: quay.io/bitnami/sealed-secrets-controller:v0.7.0 quay.io/calico/node:v3.8.1 quay.io/open-policy-agent/gatekeeper:v3.0.4-beta.1 quay.io/kiali/kiali:v1.9 This involves making the container privileged and running dockerd.
…ulling down first This is to work around trivy being unwilling to work with their seemingly broken responses, see aquasecurity/trivy#401 (comment) This begins vulnerability checking on the following containers: quay.io/bitnami/sealed-secrets-controller:v0.7.0 quay.io/calico/node:v3.8.1 quay.io/open-policy-agent/gatekeeper:v3.0.4-beta.1 quay.io/kiali/kiali:v1.9 This involves making the container privileged and running dockerd.
…rity#401) * feat: add support for AKS role_based_access_control_enabled * chore: update rbac test name * chore: rbac update examples Signed-off-by: Igor Beliakov <[email protected]>
Description
There seems to be a problem with pulling images from Quay.io.
This is a problem for all images i have tried from quay.io.
In the following i use
quay.io/fairwinds/polaris:0.6
as an example.When trying to scan an image from quay.io I get the following error
If I pull the image manually first I get the expected report:
Output of run with
-debug
:Output of
trivy -v
:Additional details (base image name, container registry info...):
Note that to verify this you may need to delete both the image from the docker cache and from the fanal cache:
A workaround would be to always pull the image manually first. This is unfortunately not an option for me, as I am running Trivy in a dockerless environment.
The text was updated successfully, but these errors were encountered: