Перейти к файлу
Christian Dupuis 942f25eb6d
Add test command to taskfile
Signed-off-by: Christian Dupuis <cd@atomist.com>
2022-10-29 11:22:04 +02:00
.github/workflows Initial commit 2022-10-27 07:44:35 +02:00
commands Add diff command 2022-10-28 16:25:28 +02:00
internal Add diff command 2022-10-28 16:25:28 +02:00
query Add diff command 2022-10-28 16:25:28 +02:00
registry Speed up re-indexing local images 2022-10-27 12:03:29 +02:00
sbom Add test command to taskfile 2022-10-29 11:22:04 +02:00
types Add test command to taskfile 2022-10-29 11:22:04 +02:00
.gitignore Add diff command 2022-10-28 16:25:28 +02:00
.goreleaser.yaml Run standalone 2022-10-27 22:41:00 +02:00
Dockerfile Initial commit 2022-10-27 07:44:35 +02:00
LICENSE Initial commit 2022-10-27 07:44:35 +02:00
README.md Run standalone 2022-10-27 22:41:00 +02:00
Taskfile.yaml Add test command to taskfile 2022-10-29 11:22:04 +02:00
go.mod Add diff command 2022-10-28 16:25:28 +02:00
go.sum Add diff command 2022-10-28 16:25:28 +02:00
install.sh Run standalone 2022-10-27 22:41:00 +02:00
main.go Add diff command 2022-10-28 16:25:28 +02:00

README.md

Note: This repository is not an officially supported Docker project.

docker index Docker CLI plugin

Docker CLI plugin to create image SBOMs as well as analyze packages for known vulnerabilities using the Atomist data plane.

Installation

You can install manually by following these steps:

  • Download the binary from the release page
  • Unzip the archive

Usage

docker-index sbom

To create an SBOM for a local or remote image, run the following command:

$ docker-index sbom --image <IMAGE> 
  • --image <IMAGE> can either be a local image id or fully qualified image name from a remote registry
  • --oci-dir <DIR> can point to a local image in OCI directory format
  • --output <OUTPUT FILE> allows to store the generated SBOM in a local file
  • --include-cves will include all detected CVEs in generated output

docker-index cve

To detect base images for local or remote images, use the following command:

$ docker-index cve --image <IMAGE> CVE_ID 
  • --image <IMAGE> can either be a local image id or fully qualified image name from a remote registry
  • --oci-dir <DIR> can point to a local image in OCI directory format
  • CVE_ID can be any known CVE id