feat: improve html.tpl
ZeroDownTime/jenkins-podman/pipeline/head Something is wrong with the build of this commit Details

This commit is contained in:
Stefan Reimer 2022-01-25 12:43:14 +01:00
parent 66e6dcd1d7
commit 5bd6f0fda2
3 changed files with 301 additions and 5 deletions

View File

@ -81,11 +81,11 @@
</script>
</head>
<body>
<img src="https://cdn.zero-downtime.net/assets/kubezero/logo-small-64.png" style="float:left">
<h1>{{- escapeXML ( index . 0 ).Target }} - Trivy Report - {{ getCurrentTime }}</h1>
<h1><img src="https://cdn.zero-downtime.net/assets/kubezero/logo-small-64.png" style="float:left">
{{- escapeXML ( index . 0 ).Target }} - Trivy Report - {{ getCurrentTime }}</h1>
<table>
{{- range . }}
<tr class="group-header"><th colspan="7">{{ escapeXML .Type }}</th></tr>
<tr class="group-header"><th colspan="7">{{ escapeXML .Target }}({{ escapeXML .Type }})</th></tr>
{{- if (eq (len .Vulnerabilities) 0) }}
<tr><th colspan="7">No Vulnerabilities found</th></tr>
{{- else }}
@ -98,7 +98,7 @@
<th>Title</th>
<th>Links</th>
</tr>
{{- range .Vulnerabilities }}
{{- range .Vulnerabilities }}
<tr class="severity-{{ escapeXML .Vulnerability.Severity }}">
<td class="pkg-name">{{ escapeXML .PkgName }}</td>
<td>{{ escapeXML .VulnerabilityID }}</td>
@ -107,12 +107,16 @@
<td>{{ escapeXML .FixedVersion }}</td>
<td>{{ escapeXML .Title }}</td>
<td class="links" data-more-links="off">
{{- if .PrimaryURL }}
<a href={{ escapeXML .PrimaryURL | printf "%q" }} target="_blank" rel="noopener noreferrer">{{ escapeXML .PrimaryURL }}</a>
{{- else }}
{{- range .Vulnerability.References }}
<a href={{ escapeXML . | printf "%q" }} target="_blank" rel="noopener noreferrer">{{ escapeXML . }}</a>
{{- end }}
{{- end }}
</td>
</tr>
{{- end }}
{{- end }}
{{- end }}
{{- if (eq (len .Misconfigurations ) 0) }}
<tr><th colspan="7">No Misconfigurations found</th></tr>

18
junit.tpl Normal file
View File

@ -0,0 +1,18 @@
<?xml version="1.0" ?>
<testsuites>
{{- range . -}}
{{- $failures := len .Vulnerabilities }}
<testsuite tests="{{ $failures }}" failures="{{ $failures }}" name="{{ .Target }}" errors="0" skipped="0" time="">
{{- if not (eq .Type "") }}
<properties>
<property name="type" value="{{ .Type }}"></property>
</properties>
{{- end -}}
{{ range .Vulnerabilities }}
<testcase classname="{{ .PkgName }}-{{ .InstalledVersion }}" name="[{{ .Vulnerability.Severity }}] {{ .VulnerabilityID }}" time="">
<failure message="{{ escapeXML .Title }}" type="description">{{ escapeXML .Description }}</failure>
</testcase>
{{- end }}
</testsuite>
{{- end }}
</testsuites>

274
report.html Normal file
View File

@ -0,0 +1,274 @@
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<style>
* {
font-family: Arial, Helvetica, sans-serif;
}
h1 {
text-align: center;
}
.group-header th {
font-size: 200%;
}
.sub-header th {
font-size: 150%;
}
table, th, td {
border: 1px solid black;
border-collapse: collapse;
padding: .3em;
}
table {
margin: 0 auto;
}
.severity {
text-align: center;
font-weight: bold;
color: #fafafa;
}
.severity-LOW .severity { background-color: #5fbb31; }
.severity-MEDIUM .severity { background-color: #e9c600; }
.severity-HIGH .severity { background-color: #ff8800; }
.severity-CRITICAL .severity { background-color: #e40000; }
.severity-UNKNOWN .severity { background-color: #747474; }
.severity-LOW { background-color: #5fbb3160; }
.severity-MEDIUM { background-color: #e9c60060; }
.severity-HIGH { background-color: #ff880060; }
.severity-CRITICAL { background-color: #e4000060; }
.severity-UNKNOWN { background-color: #74747460; }
table tr td:first-of-type {
font-weight: bold;
}
.links a,
.links[data-more-links=on] a {
display: block;
}
.links[data-more-links=off] a:nth-of-type(1n+5) {
display: none;
}
a.toggle-more-links { cursor: pointer; }
</style>
<title>localhost/jenkins-podman:v0.2.4-3 (alpine 3.15.0) - Trivy Report - 2022-01-25T11:41:36.713570361Z</title>
<script>
window.onload = function() {
document.querySelectorAll('td.links').forEach(function(linkCell) {
var links = [].concat.apply([], linkCell.querySelectorAll('a'));
[].sort.apply(links, function(a, b) {
return a.href > b.href ? 1 : -1;
});
links.forEach(function(link, idx) {
if (links.length > 3 && 3 === idx) {
var toggleLink = document.createElement('a');
toggleLink.innerText = "Toggle more links";
toggleLink.href = "#toggleMore";
toggleLink.setAttribute("class", "toggle-more-links");
linkCell.appendChild(toggleLink);
}
linkCell.appendChild(link);
});
});
document.querySelectorAll('a.toggle-more-links').forEach(function(toggleLink) {
toggleLink.onclick = function() {
var expanded = toggleLink.parentElement.getAttribute("data-more-links");
toggleLink.parentElement.setAttribute("data-more-links", "on" === expanded ? "off" : "on");
return false;
};
});
};
</script>
</head>
<body>
<h1><img src="https://cdn.zero-downtime.net/assets/kubezero/logo-small-64.png" style="float:left">localhost/jenkins-podman:v0.2.4-3 (alpine 3.15.0) - Trivy Report - 2022-01-25T11:41:36.713619189Z</h1>
<table>
<tr class="group-header"><th colspan="7">localhost/jenkins-podman:v0.2.4-3 (alpine 3.15.0)(alpine)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">Java(jar)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/bin/buildah(gobinary)</th></tr>
<tr class="sub-header">
<th>Package</th>
<th>Vulnerability ID</th>
<th>Severity</th>
<th>Installed Version</th>
<th>Fixed Version</th>
<th>Title</th>
<th>Links</th>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">github.com/containerd/containerd</td>
<td>CVE-2021-41103</td>
<td class="severity">HIGH</td>
<td class="pkg-version">v1.5.5</td>
<td>v1.4.11, v1.5.7</td>
<td>containerd: insufficiently restricted permissions on container root and plugin directories</td>
<td class="links" data-more-links="off">
<a href="https://avd.aquasec.com/nvd/cve-2021-41103" target="_blank" rel="noopener noreferrer">https://avd.aquasec.com/nvd/cve-2021-41103</a>
</td>
</tr>
<tr class="severity-UNKNOWN">
<td class="pkg-name">github.com/opencontainers/image-spec</td>
<td>GMS-2021-101</td>
<td class="severity">UNKNOWN</td>
<td class="pkg-version">v1.0.2-0.20210819154149-5ad6f50d6283</td>
<td>1.0.2</td>
<td>Clarify `mediaType` handling</td>
<td class="links" data-more-links="off">
<a href="https://github.com/advisories/GHSA-77vh-xpmg-72qh" target="_blank" rel="noopener noreferrer">https://github.com/advisories/GHSA-77vh-xpmg-72qh</a>
<a href="https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m" target="_blank" rel="noopener noreferrer">https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m</a>
<a href="https://github.com/opencontainers/image-spec/commit/693428a734f5bab1a84bd2f990d92ef1111cd60c" target="_blank" rel="noopener noreferrer">https://github.com/opencontainers/image-spec/commit/693428a734f5bab1a84bd2f990d92ef1111cd60c</a>
<a href="https://github.com/opencontainers/image-spec/releases/tag/v1.0.2" target="_blank" rel="noopener noreferrer">https://github.com/opencontainers/image-spec/releases/tag/v1.0.2</a>
<a href="https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh" target="_blank" rel="noopener noreferrer">https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh</a>
</td>
</tr>
<tr class="severity-UNKNOWN">
<td class="pkg-name">golang.org/x/text</td>
<td>CVE-2021-38561</td>
<td class="severity">UNKNOWN</td>
<td class="pkg-version">v0.3.6</td>
<td>0.3.7</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://avd.aquasec.com/nvd/cve-2021-38561" target="_blank" rel="noopener noreferrer">https://avd.aquasec.com/nvd/cve-2021-38561</a>
</td>
</tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/bin/git-lfs(gobinary)</th></tr>
<tr class="sub-header">
<th>Package</th>
<th>Vulnerability ID</th>
<th>Severity</th>
<th>Installed Version</th>
<th>Fixed Version</th>
<th>Title</th>
<th>Links</th>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">golang.org/x/crypto</td>
<td>CVE-2020-29652</td>
<td class="severity">HIGH</td>
<td class="pkg-version">v0.0.0-20201112155050-0c6587e931a9</td>
<td>v0.0.0-20201216223049-8b5274cf687f</td>
<td>golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference</td>
<td class="links" data-more-links="off">
<a href="https://avd.aquasec.com/nvd/cve-2020-29652" target="_blank" rel="noopener noreferrer">https://avd.aquasec.com/nvd/cve-2020-29652</a>
</td>
</tr>
<tr class="severity-UNKNOWN">
<td class="pkg-name">golang.org/x/text</td>
<td>CVE-2021-38561</td>
<td class="severity">UNKNOWN</td>
<td class="pkg-version">v0.3.5</td>
<td>0.3.7</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://avd.aquasec.com/nvd/cve-2021-38561" target="_blank" rel="noopener noreferrer">https://avd.aquasec.com/nvd/cve-2021-38561</a>
</td>
</tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/bin/podman(gobinary)</th></tr>
<tr class="sub-header">
<th>Package</th>
<th>Vulnerability ID</th>
<th>Severity</th>
<th>Installed Version</th>
<th>Fixed Version</th>
<th>Title</th>
<th>Links</th>
</tr>
<tr class="severity-UNKNOWN">
<td class="pkg-name">github.com/opencontainers/image-spec</td>
<td>GMS-2021-101</td>
<td class="severity">UNKNOWN</td>
<td class="pkg-version">v1.0.2-0.20210819154149-5ad6f50d6283</td>
<td>1.0.2</td>
<td>Clarify `mediaType` handling</td>
<td class="links" data-more-links="off">
<a href="https://github.com/advisories/GHSA-77vh-xpmg-72qh" target="_blank" rel="noopener noreferrer">https://github.com/advisories/GHSA-77vh-xpmg-72qh</a>
<a href="https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m" target="_blank" rel="noopener noreferrer">https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m</a>
<a href="https://github.com/opencontainers/image-spec/commit/693428a734f5bab1a84bd2f990d92ef1111cd60c" target="_blank" rel="noopener noreferrer">https://github.com/opencontainers/image-spec/commit/693428a734f5bab1a84bd2f990d92ef1111cd60c</a>
<a href="https://github.com/opencontainers/image-spec/releases/tag/v1.0.2" target="_blank" rel="noopener noreferrer">https://github.com/opencontainers/image-spec/releases/tag/v1.0.2</a>
<a href="https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh" target="_blank" rel="noopener noreferrer">https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh</a>
</td>
</tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/bin/trivy(gobinary)</th></tr>
<tr class="sub-header">
<th>Package</th>
<th>Vulnerability ID</th>
<th>Severity</th>
<th>Installed Version</th>
<th>Fixed Version</th>
<th>Title</th>
<th>Links</th>
</tr>
<tr class="severity-UNKNOWN">
<td class="pkg-name">github.com/opencontainers/image-spec</td>
<td>GMS-2021-101</td>
<td class="severity">UNKNOWN</td>
<td class="pkg-version">v1.0.2-0.20190823105129-775207bd45b6</td>
<td>1.0.2</td>
<td>Clarify `mediaType` handling</td>
<td class="links" data-more-links="off">
<a href="https://github.com/advisories/GHSA-77vh-xpmg-72qh" target="_blank" rel="noopener noreferrer">https://github.com/advisories/GHSA-77vh-xpmg-72qh</a>
<a href="https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m" target="_blank" rel="noopener noreferrer">https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m</a>
<a href="https://github.com/opencontainers/image-spec/commit/693428a734f5bab1a84bd2f990d92ef1111cd60c" target="_blank" rel="noopener noreferrer">https://github.com/opencontainers/image-spec/commit/693428a734f5bab1a84bd2f990d92ef1111cd60c</a>
<a href="https://github.com/opencontainers/image-spec/releases/tag/v1.0.2" target="_blank" rel="noopener noreferrer">https://github.com/opencontainers/image-spec/releases/tag/v1.0.2</a>
<a href="https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh" target="_blank" rel="noopener noreferrer">https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh</a>
</td>
</tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/bandwidth(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/bridge(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/dhcp(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/firewall(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/host-device(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/host-local(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/ipvlan(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/loopback(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/macvlan(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/portmap(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/ptp(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/sbr(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/static(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/tuning(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/vlan(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
<tr class="group-header"><th colspan="7">usr/libexec/cni/vrf(gobinary)</th></tr>
<tr><th colspan="7">No Vulnerabilities found</th></tr>
<tr><th colspan="7">No Misconfigurations found</th></tr>
</table>
</body>
</html>