-
Notifications
You must be signed in to change notification settings - Fork 223
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow InitContainer to pull vulnerability-db from private registry #2221
Comments
This issue is stale because it has been labeled with inactivity. |
@crtvmn @Heap0017 thanks for the comments and so sorry for long response I checked this case with my private repo on Github with the latest version of Trivy-operator. $ kubectl get vulnerabilityreports --all-namespaces -o wide
NAMESPACE NAME REPOSITORY TAG SCANNER AGE CRITICAL HIGH MEDIUM LOW UNKNOWN
kube-system daemonset-kube-proxy-kube-proxy kube-proxy v1.30.0 Trivy 72s 3 8 22 16 0
kube-system pod-7d98c5bddf kube-controller-manager v1.30.0 Trivy 59s 3 6 10 0 0
kube-system pod-etcd-cve-kind-control-plane-etcd etcd 3.5.12-0 Trivy 50s 9 14 53 4 1
kube-system pod-kube-scheduler-cve-kind-control-plane-kube-scheduler kube-scheduler v1.30.0 Trivy 89s 3 6 8 0 0
kube-system replicaset-coredns-7db6d8ff4d-coredns coredns/coredns v1.11.1 Trivy 2m10s 2 8 20 1 1
local-path-storage replicaset-dcbb8bf7b kindest/local-path-provisioner v20240202-8f1494ea Trivy 80s 2 7 31 11 1 my settings: dbRegistry: "ghcr.io"
dbRepository: "afdesk/trivy-db-private"
# -- The username for dbRepository authentication
#
dbRepositoryUsername: afdesk
# -- The password for dbRepository authentication
#
dbRepositoryPassword: ghp_TOKEN |
it should work as expected. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hello,
I'm trying to deploy the Trivy Operator in standalone mode with the provided Helm chart in an offline environment with a private registry. Credentials are required to access this registry.
Unfortunately, it is not possible to forward or add env variables (
TRIVY_USER
andTRIVY_PASSWORD
) to allow the Trivy init-container to pull the vulnerability database from my private registry.Moreover the
dbRepositoryPassword
anddbRepositoryUsername
seem useless.trivy-operator/deploy/helm/values.yaml
Lines 525 to 529 in 2cd18ea
Can you confirm that this use case is not possible for the moment? I found this discussion #1341 but no answer and no link to the related issue. Thanks for your help!
Best regards
The text was updated successfully, but these errors were encountered: