Comments (4)
I don't think we will be able to support this exact use case, since as you noted there is a grype
directory and this is unlikely to change.
You have a couple options:
- Use
go run ./cmd/grype
, which is effectively what many of us do during development. You can make code changes and re-run this easily. - Run
make snapshot
(aftermake bootstrap
), which will build snapshot releases closest to what our release process does, but this is considerably slower as it builds binaries for all supported platforms.
It looks like we need to get the DEVELOPING.md updated.
from grype.
Ah, well thats a bummer. Neither of those use cases will work for us but thank you for the quick feedback. The install.sh build does work for us but was hoping for a source route. If need be you can feel free to close this issue.
from grype.
@colton-freeman you can also just build the binary with -o <binary-file-name>
, for example:
go build -o build/grype ./cmd/grype
... will give you a binary named grype
output in a build
directory
from grype.
oh very nice. that might work for us, thank you.
from grype.
Related Issues (20)
- vex documents from the --vex flag do get processed or applied to the output correctly HOT 1
- False positives when installing both libcrypto, libssl 1.1 and 3 on alpine 3.19 HOT 3
- False Positive: GHSA-jvgm-pfqv-887x CVE-2016-7954 not affected in SUSE ecosystem
- False Positive: GHSA-g98m-96g9-wfjq CVE-2019-3881 ruby2.5-rubygem-bundler in SUSE ecosystem
- Fails to parse go stdlib version when experiments are set HOT 6
- False positive: GHSA-jphg-qwrw-7w9g (CVE-2020-10663) in SLES 15.5
- False positives for github.com/hashicorp/consul: Installed version reported as v0.0.0 HOT 3
- Support for Fedora CoreOS 36 -> OKD/OpenShift HOT 2
- Scan Directory: Add (git) version HOT 2
- Refactor matching process to be chained processors
- False positive: GHSA-537h-rv9q-vvph (CVE-2020-13757) in SLES 15.5
- False positive: GHSA-gwfg-cqmg-cf8f (CVE-2020-25613) in SLES 15.5
- False positive: GHSA-9w8r-397f-prfh (CVE-2021-20270), GHSA-pq64-v7f5-gqh8 (CVE-2021-27291) in SLES 15.5
- Inconsistent naming of matchDetails.searchedBy.package field HOT 1
- Latest database cannot be downloaded via grype db update HOT 2
- Template models use go structs instead of JSON shape HOT 1
- Grype should respect `--source-name` and `--source-version` as Syft does
- grype db import fails HOT 2
- Grype failed to load vulnerability database: database metadata not found HOT 2
- @jridgewell/gen-mapping incorrectly attributed GHSA-8rmg-jf7p-4p22 HOT 2
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from grype.