Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(cli): add --details flag to vulnerability cmd #83

Merged
5 commits merged into from
Apr 28, 2020

Conversation

ghost
Copy link

@ghost ghost commented Apr 27, 2020

This change is adding a new flag to the vulnerability command called
--details, this flag will extend the report shown to the end-user.

The new information presented with this flag is the list of CVE's with
its severity, version and, if any, fix version, plus the layer that the
vulnerability was introduced by.

Example:

$ lacework vulnerability report sha256:123ab...xyz --details

Screen Shot 2020-04-28 at 8 47 52 AM

This flag is available to all sub-commands inside the vulnerability
cmd. (lacework vul scan run, lacework vul scan show, and
lacework vul report, as shown above 👆🏽)

Closes #82

Signed-off-by: Salim Afiune Maya [email protected]

@ghost ghost added the feat New feature or request label Apr 27, 2020
@ghost ghost requested a review from scottford-lw April 27, 2020 21:37
@ghost ghost self-assigned this Apr 27, 2020
@ghost ghost force-pushed the afiune/ALLY-93/vulnerability--details branch from 2b6b7dd to 646943a Compare April 27, 2020 21:41
This change is adding a new flag to the vulnerability command called
`--details`, this flag will extend the report shown to the end-user.

The new information presented with this flag is the list of CVE's with
its severity, version and, if any, fix version, plus the layer that the
vulnerability was introduced by.

Example:
```
$ lacework vulnerability report sha256:123ab...xyz --details
```

This flag is available to all sub-commands inside the `vulnerability`
cmd. (`scan run`, `scan show`, and `report` as shown above)

Closes #82

Signed-off-by: Salim Afiune Maya <[email protected]>
@ghost ghost force-pushed the afiune/ALLY-93/vulnerability--details branch from 646943a to 227a7b2 Compare April 27, 2020 22:31
Copy link
Contributor

@scottford-lw scottford-lw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great feature @afiunelw. Huge thumbs up on this!

@ghost
Copy link
Author

ghost commented Apr 28, 2020

The team continues to review the output displayed, as of this message, the current output
shown would look similar to:

Screen Shot 2020-04-28 at 8 54 18 AM

An open question is:

  • How would a user get more details about the SHA256 layer displayed?

Another alternative is to display the entire content of the layer, this could make
the table look a little bit more filled with data and, perhaps, a little bit harder
to read:

Screen Shot 2020-04-28 at 8 47 52 AM

Any feedback would be highly appreciated! 💯

We have received feedback that indicates that showing the HASH of the
layer is a little bit obscure, we are switching to display the content
of the layer instead, with that, users will have immediate feedback and
understanding of where vulnerabilities come from.

Signed-off-by: Salim Afiune Maya <[email protected]>
Copy link
Contributor

@scottford-lw scottford-lw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ghost ghost merged commit 6ba4951 into master Apr 28, 2020
@ghost ghost deleted the afiune/ALLY-93/vulnerability--details branch April 28, 2020 17:50
This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feat New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Add --details flag to vulnerability command
2 participants