refactor(db): use Getter interface with GetParams for trivy-db sources (#9239)

This commit is contained in:
DmitriyLewen
2025-07-23 13:10:58 +06:00
committed by GitHub
parent 67379667d2
commit 5c155e34fb
17 changed files with 76 additions and 18 deletions

2
go.mod
View File

@@ -24,7 +24,7 @@ require (
github.com/aquasecurity/testdocker v0.0.0-20250616060700-ba6845ac6d17 github.com/aquasecurity/testdocker v0.0.0-20250616060700-ba6845ac6d17
github.com/aquasecurity/tml v0.6.1 github.com/aquasecurity/tml v0.6.1
github.com/aquasecurity/trivy-checks v1.11.3-0.20250604022615-9a7efa7c9169 github.com/aquasecurity/trivy-checks v1.11.3-0.20250604022615-9a7efa7c9169
github.com/aquasecurity/trivy-db v0.0.0-20250716122853-45f09ec4df9c github.com/aquasecurity/trivy-db v0.0.0-20250723062229-56ec1e482238
github.com/aquasecurity/trivy-java-db v0.0.0-20240109071736-184bd7481d48 github.com/aquasecurity/trivy-java-db v0.0.0-20240109071736-184bd7481d48
github.com/aquasecurity/trivy-kubernetes v0.9.1 github.com/aquasecurity/trivy-kubernetes v0.9.1
github.com/aws/aws-sdk-go-v2 v1.36.6 github.com/aws/aws-sdk-go-v2 v1.36.6

4
go.sum
View File

@@ -829,8 +829,8 @@ github.com/aquasecurity/tml v0.6.1 h1:y2ZlGSfrhnn7t4ZJ/0rotuH+v5Jgv6BDDO5jB6A9gw
github.com/aquasecurity/tml v0.6.1/go.mod h1:OnYMWY5lvI9ejU7yH9LCberWaaTBW7hBFsITiIMY2yY= github.com/aquasecurity/tml v0.6.1/go.mod h1:OnYMWY5lvI9ejU7yH9LCberWaaTBW7hBFsITiIMY2yY=
github.com/aquasecurity/trivy-checks v1.11.3-0.20250604022615-9a7efa7c9169 h1:TckzIxUX7lZaU9f2lNxCN0noYYP8fzmSQf6a4JdV83w= github.com/aquasecurity/trivy-checks v1.11.3-0.20250604022615-9a7efa7c9169 h1:TckzIxUX7lZaU9f2lNxCN0noYYP8fzmSQf6a4JdV83w=
github.com/aquasecurity/trivy-checks v1.11.3-0.20250604022615-9a7efa7c9169/go.mod h1:nT69xgRcBD4NlHwTBpWMYirpK5/Zpl8M+XDOgmjMn2k= github.com/aquasecurity/trivy-checks v1.11.3-0.20250604022615-9a7efa7c9169/go.mod h1:nT69xgRcBD4NlHwTBpWMYirpK5/Zpl8M+XDOgmjMn2k=
github.com/aquasecurity/trivy-db v0.0.0-20250716122853-45f09ec4df9c h1:nWJKidnaCx50H0JvqzCQNr0Ew9sUO0QcnGSeDJajmvc= github.com/aquasecurity/trivy-db v0.0.0-20250723062229-56ec1e482238 h1:ZT7cZan/iS/nD7D6CG4/AVdtqArKi9GtovlL4lEi/RY=
github.com/aquasecurity/trivy-db v0.0.0-20250716122853-45f09ec4df9c/go.mod h1:upAJqDQkN5FdIJbtJMpokncGNhYAPGkpoCbaGciWPt4= github.com/aquasecurity/trivy-db v0.0.0-20250723062229-56ec1e482238/go.mod h1:upAJqDQkN5FdIJbtJMpokncGNhYAPGkpoCbaGciWPt4=
github.com/aquasecurity/trivy-java-db v0.0.0-20240109071736-184bd7481d48 h1:JVgBIuIYbwG+ekC5lUHUpGJboPYiCcxiz06RCtz8neI= github.com/aquasecurity/trivy-java-db v0.0.0-20240109071736-184bd7481d48 h1:JVgBIuIYbwG+ekC5lUHUpGJboPYiCcxiz06RCtz8neI=
github.com/aquasecurity/trivy-java-db v0.0.0-20240109071736-184bd7481d48/go.mod h1:Ldya37FLi0e/5Cjq2T5Bty7cFkzUDwTcPeQua+2M8i8= github.com/aquasecurity/trivy-java-db v0.0.0-20240109071736-184bd7481d48/go.mod h1:Ldya37FLi0e/5Cjq2T5Bty7cFkzUDwTcPeQua+2M8i8=
github.com/aquasecurity/trivy-kubernetes v0.9.1 h1:bSErQcavKXDh7XMwbGX7Vy//jR5+xhe/bOgfn9G+9lQ= github.com/aquasecurity/trivy-kubernetes v0.9.1 h1:bSErQcavKXDh7XMwbGX7Vy//jR5+xhe/bOgfn9G+9lQ=

View File

@@ -8,6 +8,7 @@ import (
version "github.com/knqyf263/go-rpm-version" version "github.com/knqyf263/go-rpm-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/alma" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/alma"
osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version" osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version"
ftypes "github.com/aquasecurity/trivy/pkg/fanal/types" ftypes "github.com/aquasecurity/trivy/pkg/fanal/types"
@@ -52,7 +53,10 @@ func (s *Scanner) Detect(ctx context.Context, osVer string, _ *ftypes.Repository
continue continue
} }
pkgName := addModularNamespace(pkg.Name, pkg.Modularitylabel) pkgName := addModularNamespace(pkg.Name, pkg.Modularitylabel)
advisories, err := s.vs.Get(osVer, pkgName) advisories, err := s.vs.Get(db.GetParams{
Release: osVer,
PkgName: pkgName,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get AlmaLinux advisories: %w", err) return nil, xerrors.Errorf("failed to get AlmaLinux advisories: %w", err)
} }

View File

@@ -8,6 +8,7 @@ import (
version "github.com/knqyf263/go-apk-version" version "github.com/knqyf263/go-apk-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
dbTypes "github.com/aquasecurity/trivy-db/pkg/types" dbTypes "github.com/aquasecurity/trivy-db/pkg/types"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/alpine" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/alpine"
osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version" osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version"
@@ -88,7 +89,10 @@ func (s *Scanner) Detect(ctx context.Context, osVer string, repo *ftypes.Reposit
if srcName == "" { if srcName == "" {
srcName = pkg.Name srcName = pkg.Name
} }
advisories, err := s.vs.Get(stream, srcName) advisories, err := s.vs.Get(db.GetParams{
Release: stream,
PkgName: srcName,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get alpine advisories: %w", err) return nil, xerrors.Errorf("failed to get alpine advisories: %w", err)
} }

View File

@@ -8,6 +8,7 @@ import (
version "github.com/knqyf263/go-deb-version" version "github.com/knqyf263/go-deb-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/amazon" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/amazon"
osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version" osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version"
ftypes "github.com/aquasecurity/trivy/pkg/fanal/types" ftypes "github.com/aquasecurity/trivy/pkg/fanal/types"
@@ -53,7 +54,10 @@ func (s *Scanner) Detect(ctx context.Context, osVer string, _ *ftypes.Repository
var vulns []types.DetectedVulnerability var vulns []types.DetectedVulnerability
for _, pkg := range pkgs { for _, pkg := range pkgs {
advisories, err := s.ac.Get(osVer, pkg.Name) advisories, err := s.ac.Get(db.GetParams{
Release: osVer,
PkgName: pkg.Name,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get amazon advisories: %w", err) return nil, xerrors.Errorf("failed to get amazon advisories: %w", err)
} }

View File

@@ -6,6 +6,7 @@ import (
version "github.com/knqyf263/go-rpm-version" version "github.com/knqyf263/go-rpm-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/azure" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/azure"
osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version" osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version"
ftypes "github.com/aquasecurity/trivy/pkg/fanal/types" ftypes "github.com/aquasecurity/trivy/pkg/fanal/types"
@@ -45,7 +46,10 @@ func (s *Scanner) Detect(ctx context.Context, osVer string, _ *ftypes.Repository
var vulns []types.DetectedVulnerability var vulns []types.DetectedVulnerability
for _, pkg := range pkgs { for _, pkg := range pkgs {
// Azure Linux OVAL contains source package names only. // Azure Linux OVAL contains source package names only.
advisories, err := s.vs.Get(osVer, pkg.SrcName) advisories, err := s.vs.Get(db.GetParams{
Release: osVer,
PkgName: pkg.SrcName,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get Azure Linux advisories: %w", err) return nil, xerrors.Errorf("failed to get Azure Linux advisories: %w", err)
} }

View File

@@ -6,6 +6,7 @@ import (
version "github.com/knqyf263/go-apk-version" version "github.com/knqyf263/go-apk-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
dbTypes "github.com/aquasecurity/trivy-db/pkg/types" dbTypes "github.com/aquasecurity/trivy-db/pkg/types"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/chainguard" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/chainguard"
ftypes "github.com/aquasecurity/trivy/pkg/fanal/types" ftypes "github.com/aquasecurity/trivy/pkg/fanal/types"
@@ -36,7 +37,9 @@ func (s *Scanner) Detect(ctx context.Context, _ string, _ *ftypes.Repository, pk
if srcName == "" { if srcName == "" {
srcName = pkg.Name srcName = pkg.Name
} }
advisories, err := s.vs.Get("", srcName) advisories, err := s.vs.Get(db.GetParams{
PkgName: srcName,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get Chainguard advisories: %w", err) return nil, xerrors.Errorf("failed to get Chainguard advisories: %w", err)
} }

View File

@@ -7,6 +7,7 @@ import (
version "github.com/knqyf263/go-deb-version" version "github.com/knqyf263/go-deb-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
dbTypes "github.com/aquasecurity/trivy-db/pkg/types" dbTypes "github.com/aquasecurity/trivy-db/pkg/types"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/debian" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/debian"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/vulnerability" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/vulnerability"
@@ -68,7 +69,10 @@ func (s *Scanner) Detect(ctx context.Context, osVer string, _ *ftypes.Repository
continue continue
} }
advisories, err := s.vs.Get(osVer, pkg.SrcName) advisories, err := s.vs.Get(db.GetParams{
Release: osVer,
PkgName: pkg.SrcName,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get debian advisories: %w", err) return nil, xerrors.Errorf("failed to get debian advisories: %w", err)
} }

View File

@@ -6,6 +6,7 @@ import (
version "github.com/knqyf263/go-deb-version" version "github.com/knqyf263/go-deb-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
dbTypes "github.com/aquasecurity/trivy-db/pkg/types" dbTypes "github.com/aquasecurity/trivy-db/pkg/types"
echoDb "github.com/aquasecurity/trivy-db/pkg/vulnsrc/echo" echoDb "github.com/aquasecurity/trivy-db/pkg/vulnsrc/echo"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/vulnerability" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/vulnerability"
@@ -29,7 +30,9 @@ func (s *Scanner) Detect(ctx context.Context, _ string, _ *ftypes.Repository, pk
log.InfoContext(ctx, "Detecting vulnerabilities...", log.Int("pkg_num", len(pkgs))) log.InfoContext(ctx, "Detecting vulnerabilities...", log.Int("pkg_num", len(pkgs)))
var detectedVulns []types.DetectedVulnerability var detectedVulns []types.DetectedVulnerability
for _, pkg := range pkgs { for _, pkg := range pkgs {
advisories, err := s.vs.Get("", pkg.SrcName) advisories, err := s.vs.Get(db.GetParams{
PkgName: pkg.SrcName,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get echo advisories: %w", err) return nil, xerrors.Errorf("failed to get echo advisories: %w", err)
} }

View File

@@ -6,6 +6,7 @@ import (
version "github.com/knqyf263/go-apk-version" version "github.com/knqyf263/go-apk-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
dbTypes "github.com/aquasecurity/trivy-db/pkg/types" dbTypes "github.com/aquasecurity/trivy-db/pkg/types"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/minimos" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/minimos"
ftypes "github.com/aquasecurity/trivy/pkg/fanal/types" ftypes "github.com/aquasecurity/trivy/pkg/fanal/types"
@@ -36,7 +37,9 @@ func (s *Scanner) Detect(ctx context.Context, _ string, _ *ftypes.Repository, pk
if srcName == "" { if srcName == "" {
srcName = pkg.Name srcName = pkg.Name
} }
advisories, err := s.vs.Get("", srcName) advisories, err := s.vs.Get(db.GetParams{
PkgName: srcName,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get MinimOS advisories: %w", err) return nil, xerrors.Errorf("failed to get MinimOS advisories: %w", err)
} }

View File

@@ -7,6 +7,7 @@ import (
version "github.com/knqyf263/go-rpm-version" version "github.com/knqyf263/go-rpm-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
oracleoval "github.com/aquasecurity/trivy-db/pkg/vulnsrc/oracle-oval" oracleoval "github.com/aquasecurity/trivy-db/pkg/vulnsrc/oracle-oval"
osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version" osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version"
ftypes "github.com/aquasecurity/trivy/pkg/fanal/types" ftypes "github.com/aquasecurity/trivy/pkg/fanal/types"
@@ -50,7 +51,11 @@ func (s *Scanner) Detect(ctx context.Context, osVer string, _ *ftypes.Repository
var vulns []types.DetectedVulnerability var vulns []types.DetectedVulnerability
for _, pkg := range pkgs { for _, pkg := range pkgs {
advisories, err := s.vs.Get(osVer, pkg.Name, pkg.Arch) advisories, err := s.vs.Get(db.GetParams{
Release: osVer,
PkgName: pkg.Name,
Arch: pkg.Arch,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get Oracle Linux advisory: %w", err) return nil, xerrors.Errorf("failed to get Oracle Linux advisory: %w", err)
} }

View File

@@ -7,6 +7,7 @@ import (
version "github.com/knqyf263/go-rpm-version" version "github.com/knqyf263/go-rpm-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/photon" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/photon"
osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version" osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version"
ftypes "github.com/aquasecurity/trivy/pkg/fanal/types" ftypes "github.com/aquasecurity/trivy/pkg/fanal/types"
@@ -45,7 +46,10 @@ func (s *Scanner) Detect(ctx context.Context, osVer string, _ *ftypes.Repository
var vulns []types.DetectedVulnerability var vulns []types.DetectedVulnerability
for _, pkg := range pkgs { for _, pkg := range pkgs {
advisories, err := s.vs.Get(osVer, pkg.SrcName) advisories, err := s.vs.Get(db.GetParams{
Release: osVer,
PkgName: pkg.SrcName,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get Photon Linux advisory: %w", err) return nil, xerrors.Errorf("failed to get Photon Linux advisory: %w", err)
} }

View File

@@ -7,6 +7,7 @@ import (
version "github.com/knqyf263/go-rpm-version" version "github.com/knqyf263/go-rpm-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/rocky" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/rocky"
osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version" osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version"
ftypes "github.com/aquasecurity/trivy/pkg/fanal/types" ftypes "github.com/aquasecurity/trivy/pkg/fanal/types"
@@ -50,7 +51,11 @@ func (s *Scanner) Detect(ctx context.Context, osVer string, _ *ftypes.Repository
continue continue
} }
pkgName := addModularNamespace(pkg.Name, pkg.Modularitylabel) pkgName := addModularNamespace(pkg.Name, pkg.Modularitylabel)
advisories, err := s.vs.Get(osVer, pkgName, pkg.Arch) advisories, err := s.vs.Get(db.GetParams{
Release: osVer,
PkgName: pkgName,
Arch: pkg.Arch,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get Rocky Linux advisories: %w", err) return nil, xerrors.Errorf("failed to get Rocky Linux advisories: %w", err)
} }

View File

@@ -7,6 +7,7 @@ import (
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
dbTypes "github.com/aquasecurity/trivy-db/pkg/types" dbTypes "github.com/aquasecurity/trivy-db/pkg/types"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/rootio" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/rootio"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/vulnerability" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/vulnerability"
@@ -73,7 +74,10 @@ func (s *Scanner) Detect(ctx context.Context, osVer string, _ *ftypes.Repository
srcName = pkg.Name srcName = pkg.Name
} }
advisories, err := s.vsg.Get(osVer, srcName) advisories, err := s.vsg.Get(db.GetParams{
Release: osVer,
PkgName: srcName,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get Root.io advisories: %w", err) return nil, xerrors.Errorf("failed to get Root.io advisories: %w", err)
} }

View File

@@ -7,6 +7,7 @@ import (
version "github.com/knqyf263/go-rpm-version" version "github.com/knqyf263/go-rpm-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
susecvrf "github.com/aquasecurity/trivy-db/pkg/vulnsrc/suse-cvrf" susecvrf "github.com/aquasecurity/trivy-db/pkg/vulnsrc/suse-cvrf"
osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version" osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version"
ftypes "github.com/aquasecurity/trivy/pkg/fanal/types" ftypes "github.com/aquasecurity/trivy/pkg/fanal/types"
@@ -120,7 +121,10 @@ func (s *Scanner) Detect(ctx context.Context, osVer string, _ *ftypes.Repository
var vulns []types.DetectedVulnerability var vulns []types.DetectedVulnerability
for _, pkg := range pkgs { for _, pkg := range pkgs {
advisories, err := s.vs.Get(osVer, pkg.Name) advisories, err := s.vs.Get(db.GetParams{
Release: osVer,
PkgName: pkg.Name,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get SUSE advisory: %w", err) return nil, xerrors.Errorf("failed to get SUSE advisory: %w", err)
} }

View File

@@ -8,6 +8,7 @@ import (
version "github.com/knqyf263/go-deb-version" version "github.com/knqyf263/go-deb-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/ubuntu" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/ubuntu"
"github.com/aquasecurity/trivy/pkg/clock" "github.com/aquasecurity/trivy/pkg/clock"
osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version" osver "github.com/aquasecurity/trivy/pkg/detector/ospkg/version"
@@ -105,7 +106,10 @@ func (s *Scanner) Detect(ctx context.Context, osVer string, _ *ftypes.Repository
var vulns []types.DetectedVulnerability var vulns []types.DetectedVulnerability
for _, pkg := range pkgs { for _, pkg := range pkgs {
osVer = s.versionFromEolDates(ctx, osVer) osVer = s.versionFromEolDates(ctx, osVer)
advisories, err := s.vs.Get(osVer, pkg.SrcName) advisories, err := s.vs.Get(db.GetParams{
Release: osVer,
PkgName: pkg.SrcName,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get Ubuntu advisories: %w", err) return nil, xerrors.Errorf("failed to get Ubuntu advisories: %w", err)
} }

View File

@@ -6,6 +6,7 @@ import (
version "github.com/knqyf263/go-apk-version" version "github.com/knqyf263/go-apk-version"
"golang.org/x/xerrors" "golang.org/x/xerrors"
"github.com/aquasecurity/trivy-db/pkg/db"
dbTypes "github.com/aquasecurity/trivy-db/pkg/types" dbTypes "github.com/aquasecurity/trivy-db/pkg/types"
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/wolfi" "github.com/aquasecurity/trivy-db/pkg/vulnsrc/wolfi"
ftypes "github.com/aquasecurity/trivy/pkg/fanal/types" ftypes "github.com/aquasecurity/trivy/pkg/fanal/types"
@@ -36,7 +37,9 @@ func (s *Scanner) Detect(ctx context.Context, _ string, _ *ftypes.Repository, pk
if srcName == "" { if srcName == "" {
srcName = pkg.Name srcName = pkg.Name
} }
advisories, err := s.vs.Get("", srcName) advisories, err := s.vs.Get(db.GetParams{
PkgName: srcName,
})
if err != nil { if err != nil {
return nil, xerrors.Errorf("failed to get Wolfi advisories: %w", err) return nil, xerrors.Errorf("failed to get Wolfi advisories: %w", err)
} }