From dde0ffaf14eaee5dd125aba4bb2e62ae6f680dab Mon Sep 17 00:00:00 2001 From: Itay Shakury Date: Wed, 4 Dec 2024 13:25:52 +0200 Subject: [PATCH] fix: update all documentation links --- .github/DISCUSSION_TEMPLATE/bugs.yml | 4 ++-- .github/DISCUSSION_TEMPLATE/documentation.yml | 2 +- .../DISCUSSION_TEMPLATE/false-detection.yml | 4 ++-- .github/DISCUSSION_TEMPLATE/ideas.yml | 2 +- .github/DISCUSSION_TEMPLATE/q-a.yml | 2 +- .github/pull_request_template.md | 4 ++-- .github/workflows/auto-close-issue.yaml | 2 +- CONTRIBUTING.md | 2 +- README.md | 6 ++--- docs/commercial/compare.md | 2 +- docs/community/contribute/discussion.md | 2 +- docs/docs/configuration/cache.md | 2 +- docs/docs/configuration/filtering.md | 2 +- docs/docs/supply-chain/attestation/rekor.md | 2 +- docs/docs/supply-chain/sbom.md | 4 ++-- docs/docs/target/container_image.md | 2 +- .../misconfiguration/custom-checks.md | 4 ++-- docs/tutorials/misconfiguration/terraform.md | 14 ++++++------ goreleaser.yml | 8 +++---- helm/trivy/values.yaml | 2 +- integration/testdata/conda-spdx.json.golden | 2 +- .../testdata/fixtures/sbom/centos-7-spdx.json | 2 +- .../testdata/fixtures/sbom/centos-7-spdx.txt | 2 +- integration/testdata/julia-spdx.json.golden | 2 +- mkdocs.yml | 2 +- pkg/commands/artifact/run.go | 4 ++-- pkg/dependency/parser/java/pom/artifact.go | 2 +- .../language/conda/environment/environment.go | 2 +- pkg/k8s/commands/run.go | 2 +- pkg/oci/artifact.go | 2 +- pkg/sbom/spdx/marshal.go | 2 +- pkg/sbom/spdx/marshal_test.go | 16 +++++++------- pkg/sbom/spdx/testdata/happy/bom.json | 2 +- pkg/sbom/spdx/testdata/happy/empty-bom.json | 2 +- pkg/sbom/spdx/testdata/happy/os-only-bom.json | 2 +- .../spdx/testdata/happy/unrelated-bom.json | 2 +- .../with-files-in-relationships-bom.json | 2 +- .../testdata/happy/with-hasfiles-bom.json | 2 +- pkg/sbom/spdx/testdata/sad/invalid-purl.json | 2 +- pkg/version/doc/doc_test.go | 22 +++++++++---------- pkg/vulnerability/vulnerability.go | 2 +- 41 files changed, 75 insertions(+), 75 deletions(-) diff --git a/.github/DISCUSSION_TEMPLATE/bugs.yml b/.github/DISCUSSION_TEMPLATE/bugs.yml index 59d0ee088365..6cff1711a9ea 100644 --- a/.github/DISCUSSION_TEMPLATE/bugs.yml +++ b/.github/DISCUSSION_TEMPLATE/bugs.yml @@ -10,7 +10,7 @@ body: **Do not open a GitHub issue, please.** Maintainers triage discussions and then create issues. - Please also check [our contribution guidelines](https://aquasecurity.github.io/trivy/latest/community/contribute/discussion/). + Please also check [our contribution guidelines](https://trivy.dev/latest/community/contribute/discussion/). - type: textarea attributes: label: Description @@ -117,7 +117,7 @@ body: description: Have you tried the following? options: - label: Run `trivy clean --all` - - label: Read [the troubleshooting](https://aquasecurity.github.io/trivy/latest/docs/references/troubleshooting/) + - label: Read [the troubleshooting](https://trivy.dev/latest/docs/references/troubleshooting/) - type: markdown attributes: value: | diff --git a/.github/DISCUSSION_TEMPLATE/documentation.yml b/.github/DISCUSSION_TEMPLATE/documentation.yml index 5ef35e7efa1d..a80348e0f638 100644 --- a/.github/DISCUSSION_TEMPLATE/documentation.yml +++ b/.github/DISCUSSION_TEMPLATE/documentation.yml @@ -7,7 +7,7 @@ body: Feel free to create a docs report if something doesn't work as expected or is unclear in the documentation. Please ensure that you're not creating a duplicate report by searching the [issues](https://github.com/aquasecurity/trivy/issues)/[discussions](https://github.com/aquasecurity/trivy/discussions) beforehand. - Please also check [our contribution guidelines](https://aquasecurity.github.io/trivy/latest/community/contribute/discussion/). + Please also check [our contribution guidelines](https://trivy.dev/latest/community/contribute/discussion/). - type: textarea attributes: label: Description diff --git a/.github/DISCUSSION_TEMPLATE/false-detection.yml b/.github/DISCUSSION_TEMPLATE/false-detection.yml index d56379032179..f1912f83d9fe 100644 --- a/.github/DISCUSSION_TEMPLATE/false-detection.yml +++ b/.github/DISCUSSION_TEMPLATE/false-detection.yml @@ -8,7 +8,7 @@ body: **Do not open a GitHub issue, please.** Maintainers triage discussions and then create issues. - Please also check [our contribution guidelines](https://aquasecurity.github.io/trivy/latest/community/contribute/discussion/). + Please also check [our contribution guidelines](https://trivy.dev/latest/community/contribute/discussion/). - type: input attributes: label: IDs @@ -86,7 +86,7 @@ body: attributes: label: Checklist options: - - label: Read [the documentation regarding wrong detection](https://aquasecurity.github.io/trivy/dev/community/contribute/discussion/#false-detection) + - label: Read [the documentation regarding wrong detection](https://trivy.dev/dev/community/contribute/discussion/#false-detection) - label: Ran Trivy with `-f json` that shows data sources and confirmed that the security advisory in data sources was correct validations: required: true diff --git a/.github/DISCUSSION_TEMPLATE/ideas.yml b/.github/DISCUSSION_TEMPLATE/ideas.yml index c616af429b30..b1913aee88b3 100644 --- a/.github/DISCUSSION_TEMPLATE/ideas.yml +++ b/.github/DISCUSSION_TEMPLATE/ideas.yml @@ -9,7 +9,7 @@ body: **Do not open a GitHub issue, please.** Maintainers triage discussions and then create issues. - Please also check [our contribution guidelines](https://aquasecurity.github.io/trivy/latest/community/contribute/discussion/). + Please also check [our contribution guidelines](https://trivy.dev/latest/community/contribute/discussion/). - type: textarea attributes: label: Description diff --git a/.github/DISCUSSION_TEMPLATE/q-a.yml b/.github/DISCUSSION_TEMPLATE/q-a.yml index 75ba80949a9b..bdf1a17ba6ba 100644 --- a/.github/DISCUSSION_TEMPLATE/q-a.yml +++ b/.github/DISCUSSION_TEMPLATE/q-a.yml @@ -9,7 +9,7 @@ body: **Do not open a GitHub issue, please.** Maintainers triage discussions and then create issues. - Please also check [our contribution guidelines](https://aquasecurity.github.io/trivy/latest/community/contribute/discussion/). + Please also check [our contribution guidelines](https://trivy.dev/latest/community/contribute/discussion/). - type: textarea attributes: label: Question diff --git a/.github/pull_request_template.md b/.github/pull_request_template.md index 890bf5a8c373..272b2714a78a 100644 --- a/.github/pull_request_template.md +++ b/.github/pull_request_template.md @@ -10,8 +10,8 @@ Remove this section if you don't have related PRs. ## Checklist -- [ ] I've read the [guidelines for contributing](https://aquasecurity.github.io/trivy/latest/community/contribute/pr/) to this repository. -- [ ] I've followed the [conventions](https://aquasecurity.github.io/trivy/latest/community/contribute/pr/#title) in the PR title. +- [ ] I've read the [guidelines for contributing](https://trivy.dev/latest/community/contribute/pr/) to this repository. +- [ ] I've followed the [conventions](https://trivy.dev/latest/community/contribute/pr/#title) in the PR title. - [ ] I've added tests that prove my fix is effective or that my feature works. - [ ] I've updated the [documentation](https://github.com/aquasecurity/trivy/blob/main/docs) with the relevant information (if needed). - [ ] I've added usage information (if the PR introduces new options) diff --git a/.github/workflows/auto-close-issue.yaml b/.github/workflows/auto-close-issue.yaml index 88495a3b7058..9a4dcf64267e 100644 --- a/.github/workflows/auto-close-issue.yaml +++ b/.github/workflows/auto-close-issue.yaml @@ -26,7 +26,7 @@ jobs: // If the user does not have write or admin permissions, leave a comment and close the issue if (permission !== 'write' && permission !== 'admin') { - const commentBody = "Please see https://aquasecurity.github.io/trivy/latest/community/contribute/issue/"; + const commentBody = "Please see https://trivy.dev/latest/community/contribute/issue/"; await github.rest.issues.createComment({ owner: context.repo.owner, repo: context.repo.repo, diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index 60cfd8b2c3dd..d5909da5f9c0 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -1 +1 @@ -See [Issues](https://aquasecurity.github.io/trivy/latest/community/contribute/issue/) and [Pull Requests](https://aquasecurity.github.io/trivy/latest/community/contribute/pr/) \ No newline at end of file +See [Issues](https://trivy.dev/latest/community/contribute/issue/) and [Pull Requests](https://trivy.dev/latest/community/contribute/pr/) \ No newline at end of file diff --git a/README.md b/README.md index 0736618f6e0b..4459f1fe4ea6 100644 --- a/README.md +++ b/README.md @@ -136,9 +136,9 @@ Please ensure to abide by our [Code of Conduct][code-of-conduct] during all inte [slack]: https://slack.aquasec.com [code-of-conduct]: https://github.com/aquasecurity/community/blob/main/CODE_OF_CONDUCT.md -[Installation]:https://aquasecurity.github.io/trivy/latest/getting-started/installation/ -[Ecosystem]: https://aquasecurity.github.io/trivy/latest/ecosystem/ -[Scanning Coverage]: https://aquasecurity.github.io/trivy/latest/docs/coverage/ +[Installation]:https://trivy.dev/latest/getting-started/installation/ +[Ecosystem]: https://trivy.dev/latest/ecosystem/ +[Scanning Coverage]: https://trivy.dev/latest/docs/coverage/ [alpine]: https://ariadne.space/2021/06/08/the-vulnerability-remediation-lifecycle-of-alpine-containers/ [rego]: https://www.openpolicyagent.org/docs/latest/#rego diff --git a/docs/commercial/compare.md b/docs/commercial/compare.md index eb16cc26812a..861fe10e6435 100644 --- a/docs/commercial/compare.md +++ b/docs/commercial/compare.md @@ -66,7 +66,7 @@ If you'd like to learn more or request a demo, [click here to contact us](./cont | Feature | Trivy OSS | Aqua | | --- | --- | --- | -| Infrastructure as Code (IaC) | Many popular languages as detailed [here](https://aquasecurity.github.io/trivy/latest/docs/scanner/misconfiguration/policy/builtin/) | In addition, Build Pipeline configuration scanning | +| Infrastructure as Code (IaC) | Many popular languages as detailed [here](https://trivy.dev/latest/docs/scanner/misconfiguration/policy/builtin/) | In addition, Build Pipeline configuration scanning | | Checks customization | Create custom checks with Rego | Create custom checks in no-code interface
Customize existing checks with organizational preferences | | Cloud scanning | AWS (subset of services) | AWS, Azure, GCP, Alibaba Cloud, Oracle Cloud | | Compliance frameworks | CIS, NSA, vendor guides | More than 25 compliance programs | diff --git a/docs/community/contribute/discussion.md b/docs/community/contribute/discussion.md index 4e9e059a1a30..503298780d4c 100644 --- a/docs/community/contribute/discussion.md +++ b/docs/community/contribute/discussion.md @@ -24,7 +24,7 @@ There are 4 categories: If you find any false positives or false negatives, please make sure to report them under the "False Detection" category, not "Bugs". ## False detection -Trivy depends on [multiple data sources](https://aquasecurity.github.io/trivy/latest/docs/scanner/vulnerability/#data-sources). +Trivy depends on [multiple data sources](https://trivy.dev/latest/docs/scanner/vulnerability/#data-sources). Sometime these databases contain mistakes. If Trivy can't detect any CVE-IDs or shows false positive result, at first please follow the next steps: diff --git a/docs/docs/configuration/cache.md b/docs/docs/configuration/cache.md index 87618ddc02ca..a682f35a9ccc 100644 --- a/docs/docs/configuration/cache.md +++ b/docs/docs/configuration/cache.md @@ -100,7 +100,7 @@ $ trivy server --cache-backend redis://localhost:6379 \ [trivy-java-db]: ./db.md#java-index-database [misconf-checks]: ../scanner/misconfiguration/check/builtin.md [boltdb]: https://github.com/etcd-io/bbolt -[parallel-run]: https://aquasecurity.github.io/trivy/v0.52/docs/references/troubleshooting/#running-in-parallel-takes-same-time-as-series-run +[parallel-run]: https://trivy.dev/v0.52/docs/references/troubleshooting/#running-in-parallel-takes-same-time-as-series-run [^1]: Downloaded when scanning for vulnerabilities [^2]: Downloaded when scanning `jar/war/par/ear` files diff --git a/docs/docs/configuration/filtering.md b/docs/docs/configuration/filtering.md index 095e5c3bb559..f274758e0465 100644 --- a/docs/docs/configuration/filtering.md +++ b/docs/docs/configuration/filtering.md @@ -394,7 +394,7 @@ $ trivy image --ignorefile ./.trivyignore.yaml python:3.9.16-alpine3.16 2023-08-31T11:10:27.155+0600 INFO Vulnerability scanning is enabled 2023-08-31T11:10:27.155+0600 INFO Secret scanning is enabled 2023-08-31T11:10:27.155+0600 INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning -2023-08-31T11:10:27.155+0600 INFO Please see also https://aquasecurity.github.io/trivy/dev/docs/scanner/secret/#recommendation for faster secret detection +2023-08-31T11:10:27.155+0600 INFO Please see also https://trivy.dev/dev/docs/scanner/secret/#recommendation for faster secret detection 2023-08-31T11:10:29.164+0600 INFO Detected OS: alpine 2023-08-31T11:10:29.164+0600 INFO Detecting Alpine vulnerabilities... 2023-08-31T11:10:29.169+0600 INFO Number of language-specific files: 1 diff --git a/docs/docs/supply-chain/attestation/rekor.md b/docs/docs/supply-chain/attestation/rekor.md index c23c70046c15..fdde24076226 100644 --- a/docs/docs/supply-chain/attestation/rekor.md +++ b/docs/docs/supply-chain/attestation/rekor.md @@ -22,7 +22,7 @@ $ trivy image --sbom-sources rekor otms61/alpine:3.7.3 2022-09-16T17:37:13.258+0900 INFO Vulnerability scanning is enabled 2022-09-16T17:37:13.258+0900 INFO Secret scanning is enabled 2022-09-16T17:37:13.258+0900 INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning -2022-09-16T17:37:13.258+0900 INFO Please see also https://aquasecurity.github.io/trivy/dev/docs/secret/scanning/#recommendation for faster secret detection +2022-09-16T17:37:13.258+0900 INFO Please see also https://trivy.dev/dev/docs/secret/scanning/#recommendation for faster secret detection 2022-09-16T17:37:14.827+0900 INFO Detected SBOM format: cyclonedx-json 2022-09-16T17:37:14.901+0900 INFO Found SBOM (cyclonedx) attestation in Rekor 2022-09-16T17:37:14.903+0900 INFO Detected OS: alpine diff --git a/docs/docs/supply-chain/sbom.md b/docs/docs/supply-chain/sbom.md index 454cb834bc33..5c0797759275 100644 --- a/docs/docs/supply-chain/sbom.md +++ b/docs/docs/supply-chain/sbom.md @@ -453,7 +453,7 @@ SPDXVersion: SPDX-2.2 DataLicense: CC0-1.0 SPDXID: SPDXRef-DOCUMENT DocumentName: alpine:3.15 -DocumentNamespace: https://aquasecurity.github.io/trivy/container_image/alpine:3.15-bebf6b19-a94c-4e2c-af44-065f63923f48 +DocumentNamespace: https://trivy.dev/container_image/alpine:3.15-bebf6b19-a94c-4e2c-af44-065f63923f48 Creator: Organization: aquasecurity Creator: Tool: trivy-0.38.1 Created: 2022-04-28T07:32:57.142806Z @@ -608,7 +608,7 @@ $ cat result.spdx.json | jq . ] }, "dataLicense": "CC0-1.0", - "documentNamespace": "http://aquasecurity.github.io/trivy/container_image/alpine:3.15-d9549e3a-a4c5-4ee3-8bde-8c78d451fbe7", + "documentNamespace": "http://trivy.dev/container_image/alpine:3.15-d9549e3a-a4c5-4ee3-8bde-8c78d451fbe7", "name": "alpine:3.15", "packages": [ { diff --git a/docs/docs/target/container_image.md b/docs/docs/target/container_image.md index 7d9419b66c4d..d4326eae22bc 100644 --- a/docs/docs/target/container_image.md +++ b/docs/docs/target/container_image.md @@ -491,7 +491,7 @@ $ trivy image --platform=linux/arm alpine:3.16.1 2022-10-25T21:00:50.972+0300 INFO Vulnerability scanning is enabled 2022-10-25T21:00:50.972+0300 INFO Secret scanning is enabled 2022-10-25T21:00:50.972+0300 INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning -2022-10-25T21:00:50.972+0300 INFO Please see also https://aquasecurity.github.io/trivy/dev/docs/secret/scanning/#recommendation for faster secret detection +2022-10-25T21:00:50.972+0300 INFO Please see also https://trivy.dev/dev/docs/secret/scanning/#recommendation for faster secret detection 2022-10-25T21:00:56.190+0300 INFO Detected OS: alpine 2022-10-25T21:00:56.190+0300 INFO Detecting Alpine vulnerabilities... 2022-10-25T21:00:56.191+0300 INFO Number of language-specific files: 0 diff --git a/docs/tutorials/misconfiguration/custom-checks.md b/docs/tutorials/misconfiguration/custom-checks.md index c6cac77d9396..f36b11644465 100644 --- a/docs/tutorials/misconfiguration/custom-checks.md +++ b/docs/tutorials/misconfiguration/custom-checks.md @@ -1,6 +1,6 @@ # Custom Checks with Rego -Trivy can scan configuration files for common security issues (a.k.a IaC misconfiguration scanning). In addition to a comprehensive built in database of checks, you can add your own custom checks. Checks are written in [Rego](https://www.openpolicyagent.org/docs/latest/policy-language/) language and the full documentation for checks and customizing them is available [here](https://aquasecurity.github.io/trivy/latest/docs/scanner/misconfiguration/custom/). +Trivy can scan configuration files for common security issues (a.k.a IaC misconfiguration scanning). In addition to a comprehensive built in database of checks, you can add your own custom checks. Checks are written in [Rego](https://www.openpolicyagent.org/docs/latest/policy-language/) language and the full documentation for checks and customizing them is available [here](https://trivy.dev/latest/docs/scanner/misconfiguration/custom/). This tutorial will walk you through writing a custom check in Rego that checks for an issue in a Dockerfile. @@ -38,7 +38,7 @@ Next, we need to specify metadata about the check. This is information that help Important: The `METADATA` has to be defined on top of the file. -More information on the different fields in the metadata can be found in the [Trivy documentation.](https://aquasecurity.github.io/trivy/latest/docs/scanner/misconfiguration/custom/) +More information on the different fields in the metadata can be found in the [Trivy documentation.](https://trivy.dev/latest/docs/scanner/misconfiguration/custom/) ## Package and imports diff --git a/docs/tutorials/misconfiguration/terraform.md b/docs/tutorials/misconfiguration/terraform.md index 7d5813260e89..e51ec8b5574a 100644 --- a/docs/tutorials/misconfiguration/terraform.md +++ b/docs/tutorials/misconfiguration/terraform.md @@ -9,7 +9,7 @@ We have been consolidating all of our scanning-related efforts in one place, and ## Trivy Config Command -Terraform configuration scanning is available as part of the `trivy config` command. This command scans all configuration files for misconfiguration issues. You can find the details within [misconfiguration scans in the Trivy documentation.](https://aquasecurity.github.io/trivy/latest/docs/scanner/misconfiguration/) +Terraform configuration scanning is available as part of the `trivy config` command. This command scans all configuration files for misconfiguration issues. You can find the details within [misconfiguration scans in the Trivy documentation.](https://trivy.dev/latest/docs/scanner/misconfiguration/) Command structure: ``` @@ -23,7 +23,7 @@ The `trivy config` command can scan Terraform configuration, CloudFormation, Doc - If the configuration that has been defined does not follow best practices, the check will fail. ### Prerequisites -Install Trivy on your local machines. The documentation provides several [different installation options.](https://aquasecurity.github.io/trivy/latest/getting-started/installation/) +Install Trivy on your local machines. The documentation provides several [different installation options.](https://trivy.dev/latest/getting-started/installation/) This tutorial will use this example [Terraform tutorial](https://github.com/Cloud-Native-Security/trivy-demo/tree/main/bad_iac/terraform) for terraform misconfiguration scanning with Trivy. Git clone the tutorial and cd into the directory: @@ -83,14 +83,14 @@ trivy config --severity CRITICAL, MEDIUM terraform-infra ### Passing tf.tfvars files into `trivy config` scans -You can pass terraform values to Trivy to override default values found in the Terraform HCL code. More information are provided [in the documentation.](https://aquasecurity.github.io/trivy/latest/docs/coverage/iac/terraform/#value-overrides) +You can pass terraform values to Trivy to override default values found in the Terraform HCL code. More information are provided [in the documentation.](https://trivy.dev/latest/docs/coverage/iac/terraform/#value-overrides) ``` trivy config --tf-vars terraform.tfvars ./ ``` ### Custom Checks -We have lots of examples in the [documentation](https://aquasecurity.github.io/trivy/latest/docs/scanner/misconfiguration/custom/) on how you can write and pass custom Rego checks into terraform misconfiguration scans. +We have lots of examples in the [documentation](https://trivy.dev/latest/docs/scanner/misconfiguration/custom/) on how you can write and pass custom Rego checks into terraform misconfiguration scans. ## Secret and vulnerability scans @@ -100,15 +100,15 @@ The `trivy config` command does not perform secrete and vulnerability checks out trivy fs --scanners secret,misconfig ./ ``` -The `trivy config` command is a sub-command of the `trivy fs` command. You can learn more about this command in the [documentation.](https://aquasecurity.github.io/trivy/latest/docs/target/filesystem/) +The `trivy config` command is a sub-command of the `trivy fs` command. You can learn more about this command in the [documentation.](https://trivy.dev/latest/docs/target/filesystem/) ## Scanning Terraform Plan files -Instead of scanning your different Terraform resources individually, you could also scan your Terraform Plan file before it is deployed for misconfiguration. This will give you insights into any misconfiguration of your resources as they would become deployed. [Here](https://aquasecurity.github.io/trivy/latest/docs/coverage/iac/terraform/#terraform) is the link to the documentation. +Instead of scanning your different Terraform resources individually, you could also scan your Terraform Plan file before it is deployed for misconfiguration. This will give you insights into any misconfiguration of your resources as they would become deployed. [Here](https://trivy.dev/latest/docs/coverage/iac/terraform/#terraform) is the link to the documentation. Note that you need to be able to create a terraform init and plan without any errors. ## Using Trivy in your CI/CD pipeline -Similar to tfsec, Trivy can be used either on local developer machines or integrated into your CI/CD pipeline. There are several steps available for different pipelines, including GitHub Actions, Circle CI, GitLab, Travis and more in the tutorials section of the documentation: [https://aquasecurity.github.io/trivy/latest/tutorials/integrations/](https://aquasecurity.github.io/trivy/latest/tutorials/integrations/) +Similar to tfsec, Trivy can be used either on local developer machines or integrated into your CI/CD pipeline. There are several steps available for different pipelines, including GitHub Actions, Circle CI, GitLab, Travis and more in the tutorials section of the documentation: [https://trivy.dev/latest/tutorials/integrations/](https://trivy.dev/latest/tutorials/integrations/) \ No newline at end of file diff --git a/goreleaser.yml b/goreleaser.yml index b427899773b0..c81c7c0ae1bb 100644 --- a/goreleaser.yml +++ b/goreleaser.yml @@ -165,7 +165,7 @@ dockers: - "--label=org.opencontainers.image.source=https://github.com/aquasecurity/trivy" - "--label=org.opencontainers.image.revision={{ .FullCommit }}" - "--label=org.opencontainers.image.url=https://www.aquasec.com/products/trivy/" - - "--label=org.opencontainers.image.documentation=https://aquasecurity.github.io/trivy/v{{ .Version }}/" + - "--label=org.opencontainers.image.documentation=https://trivy.dev/v{{ .Version }}/" - "--platform=linux/amd64" extra_files: - contrib/ @@ -190,7 +190,7 @@ dockers: - "--label=org.opencontainers.image.source=https://github.com/aquasecurity/trivy" - "--label=org.opencontainers.image.revision={{ .FullCommit }}" - "--label=org.opencontainers.image.url=https://www.aquasec.com/products/trivy/" - - "--label=org.opencontainers.image.documentation=https://aquasecurity.github.io/trivy/v{{ .Version }}/" + - "--label=org.opencontainers.image.documentation=https://trivy.dev/v{{ .Version }}/" - "--platform=linux/arm64" extra_files: - contrib/ @@ -215,7 +215,7 @@ dockers: - "--label=org.opencontainers.image.source=https://github.com/aquasecurity/trivy" - "--label=org.opencontainers.image.revision={{ .FullCommit }}" - "--label=org.opencontainers.image.url=https://www.aquasec.com/products/trivy/" - - "--label=org.opencontainers.image.documentation=https://aquasecurity.github.io/trivy/v{{ .Version }}/" + - "--label=org.opencontainers.image.documentation=https://trivy.dev/v{{ .Version }}/" - "--platform=linux/s390x" extra_files: - contrib/ @@ -240,7 +240,7 @@ dockers: - "--label=org.opencontainers.image.source=https://github.com/aquasecurity/trivy" - "--label=org.opencontainers.image.revision={{ .FullCommit }}" - "--label=org.opencontainers.image.url=https://www.aquasec.com/products/trivy/" - - "--label=org.opencontainers.image.documentation=https://aquasecurity.github.io/trivy/v{{ .Version }}/" + - "--label=org.opencontainers.image.documentation=https://trivy.dev/v{{ .Version }}/" - "--platform=linux/ppc64le" extra_files: - contrib/ diff --git a/helm/trivy/values.yaml b/helm/trivy/values.yaml index a969f10b7899..5d8aff36d501 100644 --- a/helm/trivy/values.yaml +++ b/helm/trivy/values.yaml @@ -77,7 +77,7 @@ trivy: gitHubToken: "" # Docker registry credentials - # See also: https://aquasecurity.github.io/trivy/dev/advanced/private-registries/docker-hub/ + # See also: https://trivy.dev/dev/advanced/private-registries/docker-hub/ # # Either # Directly in this file diff --git a/integration/testdata/conda-spdx.json.golden b/integration/testdata/conda-spdx.json.golden index c11f52eeca1b..ed4cffddb766 100644 --- a/integration/testdata/conda-spdx.json.golden +++ b/integration/testdata/conda-spdx.json.golden @@ -3,7 +3,7 @@ "dataLicense": "CC0-1.0", "SPDXID": "SPDXRef-DOCUMENT", "name": "testdata/fixtures/repo/conda", - "documentNamespace": "http://aquasecurity.github.io/trivy/filesystem/testdata/fixtures/repo/conda-3ff14136-e09f-4df9-80ea-000000000004", + "documentNamespace": "http://trivy.dev/filesystem/testdata/fixtures/repo/conda-3ff14136-e09f-4df9-80ea-000000000004", "creationInfo": { "creators": [ "Organization: aquasecurity", diff --git a/integration/testdata/fixtures/sbom/centos-7-spdx.json b/integration/testdata/fixtures/sbom/centos-7-spdx.json index ce13aa8afd8a..024e171f3986 100644 --- a/integration/testdata/fixtures/sbom/centos-7-spdx.json +++ b/integration/testdata/fixtures/sbom/centos-7-spdx.json @@ -8,7 +8,7 @@ ] }, "dataLicense": "CC0-1.0", - "documentNamespace": "http://aquasecurity.github.io/trivy/container_image/integration/testdata/fixtures/images/centos-7.tar.gz-2906855d-5098-4a22-9a72-4f7099ea3d66", + "documentNamespace": "http://trivy.dev/container_image/integration/testdata/fixtures/images/centos-7.tar.gz-2906855d-5098-4a22-9a72-4f7099ea3d66", "name": "integration/testdata/fixtures/images/centos-7.tar.gz", "packages": [ { diff --git a/integration/testdata/fixtures/sbom/centos-7-spdx.txt b/integration/testdata/fixtures/sbom/centos-7-spdx.txt index 1177a9f4bdee..5d7c8170012c 100644 --- a/integration/testdata/fixtures/sbom/centos-7-spdx.txt +++ b/integration/testdata/fixtures/sbom/centos-7-spdx.txt @@ -2,7 +2,7 @@ SPDXVersion: SPDX-2.2 DataLicense: CC0-1.0 SPDXID: SPDXRef-DOCUMENT DocumentName: integration/testdata/fixtures/images/centos-7.tar.gz -DocumentNamespace: http://aquasecurity.github.io/trivy/container_image/integration/testdata/fixtures/images/centos-7.tar.gz-6a2c050f-bc12-46dc-b2df-1f4e3e0b5e1d +DocumentNamespace: http://trivy.dev/container_image/integration/testdata/fixtures/images/centos-7.tar.gz-6a2c050f-bc12-46dc-b2df-1f4e3e0b5e1d Creator: Organization: aquasecurity Creator: Tool: trivy-dev Created: 2022-09-13T13:24:58.796907Z diff --git a/integration/testdata/julia-spdx.json.golden b/integration/testdata/julia-spdx.json.golden index 039d19ecdadf..4f9fb936b796 100644 --- a/integration/testdata/julia-spdx.json.golden +++ b/integration/testdata/julia-spdx.json.golden @@ -3,7 +3,7 @@ "dataLicense": "CC0-1.0", "SPDXID": "SPDXRef-DOCUMENT", "name": "testdata/fixtures/repo/julia", - "documentNamespace": "http://aquasecurity.github.io/trivy/filesystem/testdata/fixtures/repo/julia-3ff14136-e09f-4df9-80ea-000000000006", + "documentNamespace": "http://trivy.dev/filesystem/testdata/fixtures/repo/julia-3ff14136-e09f-4df9-80ea-000000000006", "creationInfo": { "creators": [ "Organization: aquasecurity", diff --git a/mkdocs.yml b/mkdocs.yml index 00735e3c9680..b204e0827efb 100644 --- a/mkdocs.yml +++ b/mkdocs.yml @@ -1,5 +1,5 @@ site_name: Trivy -site_url: https://aquasecurity.github.io/trivy/ +site_url: https://trivy.dev/ site_description: Trivy - All-in-one open source security scanner docs_dir: docs/ repo_name: GitHub diff --git a/pkg/commands/artifact/run.go b/pkg/commands/artifact/run.go index 0ce768bb944e..7acdcc83ace5 100644 --- a/pkg/commands/artifact/run.go +++ b/pkg/commands/artifact/run.go @@ -340,7 +340,7 @@ func Run(ctx context.Context, opts flag.Options, targetKind TargetKind) (err err defer func() { if errors.Is(err, context.DeadlineExceeded) { - // e.g. https://aquasecurity.github.io/trivy/latest/docs/configuration/ + // e.g. https://trivy.dev/latest/docs/configuration/ log.WarnContext(ctx, fmt.Sprintf("Provide a higher timeout value, see %s", doc.URL("/docs/configuration/", ""))) } }() @@ -529,7 +529,7 @@ func (r *runner) initScannerConfig(ctx context.Context, opts flag.Options) (Scan logger := log.WithPrefix(log.PrefixSecret) logger.Info("Secret scanning is enabled") logger.Info("If your scanning is slow, please try '--scanners vuln' to disable secret scanning") - // e.g. https://aquasecurity.github.io/trivy/latest/docs/scanner/secret/#recommendation + // e.g. https://trivy.dev/latest/docs/scanner/secret/#recommendation logger.Info(fmt.Sprintf("Please see also %s for faster secret detection", doc.URL("/docs/scanner/secret/", "recommendation"))) } else { opts.SecretConfigPath = "" diff --git a/pkg/dependency/parser/java/pom/artifact.go b/pkg/dependency/parser/java/pom/artifact.go index 00f4843f0b9d..b38537257a43 100644 --- a/pkg/dependency/parser/java/pom/artifact.go +++ b/pkg/dependency/parser/java/pom/artifact.go @@ -20,7 +20,7 @@ var ( varRegexp = regexp.MustCompile(`\${(\S+?)}`) emptyVersionWarn = sync.OnceFunc(func() { log.WithPrefix("pom").Warn("Dependency version cannot be determined. Child dependencies will not be found.", - // e.g. https://aquasecurity.github.io/trivy/latest/docs/coverage/language/java/#empty-dependency-version + // e.g. https://trivy.dev/latest/docs/coverage/language/java/#empty-dependency-version log.String("details", doc.URL("/docs/coverage/language/java/", "empty-dependency-version"))) }) ) diff --git a/pkg/fanal/analyzer/language/conda/environment/environment.go b/pkg/fanal/analyzer/language/conda/environment/environment.go index 305ac4821855..b496b070581c 100644 --- a/pkg/fanal/analyzer/language/conda/environment/environment.go +++ b/pkg/fanal/analyzer/language/conda/environment/environment.go @@ -43,7 +43,7 @@ func (*parser) Parse(r xio.ReadSeekerAt) ([]types.Package, []types.Dependency, e if err != nil { // Show log once per file once.Do(func() { - // e.g. https://aquasecurity.github.io/trivy/latest/docs/coverage/os/conda/#license_1 + // e.g. https://trivy.dev/latest/docs/coverage/os/conda/#license_1 log.WithPrefix("conda").Debug(fmt.Sprintf("License not found. See %s for details.", doc.URL("docs/coverage/os/conda/", "license_1")), log.String("pkg", pkg.Name), log.Err(err)) }) diff --git a/pkg/k8s/commands/run.go b/pkg/k8s/commands/run.go index 1650cfa1446f..18f6f1883fd8 100644 --- a/pkg/k8s/commands/run.go +++ b/pkg/k8s/commands/run.go @@ -41,7 +41,7 @@ func Run(ctx context.Context, args []string, opts flag.Options) error { defer func() { cancel() if errors.Is(err, context.DeadlineExceeded) { - // e.g. https://aquasecurity.github.io/trivy/latest/docs/configuration + // e.g. https://trivy.dev/latest/docs/configuration log.WarnContext(ctx, fmt.Sprintf("Provide a higher timeout value, see %s", doc.URL("/docs/configuration/", ""))) } }() diff --git a/pkg/oci/artifact.go b/pkg/oci/artifact.go index 440cbebc0979..acef07923ed8 100644 --- a/pkg/oci/artifact.go +++ b/pkg/oci/artifact.go @@ -256,7 +256,7 @@ func shouldTryOtherRepo(err error) bool { for _, diagnostic := range terr.Errors { // For better user experience if diagnostic.Code == transport.DeniedErrorCode || diagnostic.Code == transport.UnauthorizedErrorCode { - // e.g. https://aquasecurity.github.io/trivy/latest/docs/references/troubleshooting/#db + // e.g. https://trivy.dev/latest/docs/references/troubleshooting/#db log.Warnf("See %s", doc.URL("/docs/references/troubleshooting/", "db")) break } diff --git a/pkg/sbom/spdx/marshal.go b/pkg/sbom/spdx/marshal.go index 38e2cafc50f6..ac91da0fa427 100644 --- a/pkg/sbom/spdx/marshal.go +++ b/pkg/sbom/spdx/marshal.go @@ -30,7 +30,7 @@ import ( const ( DocumentSPDXIdentifier = "DOCUMENT" - DocumentNamespace = "http://aquasecurity.github.io/trivy" + DocumentNamespace = "http://trivy.dev" CreatorOrganization = "aquasecurity" CreatorTool = "trivy" noneField = "NONE" diff --git a/pkg/sbom/spdx/marshal_test.go b/pkg/sbom/spdx/marshal_test.go index 5c8e3ab4902e..a98643b75e0a 100644 --- a/pkg/sbom/spdx/marshal_test.go +++ b/pkg/sbom/spdx/marshal_test.go @@ -170,7 +170,7 @@ func TestMarshaler_Marshal(t *testing.T) { DataLicense: spdx.DataLicense, SPDXIdentifier: "DOCUMENT", DocumentName: "rails:latest", - DocumentNamespace: "http://aquasecurity.github.io/trivy/container_image/rails:latest-3ff14136-e09f-4df9-80ea-000000000009", + DocumentNamespace: "http://trivy.dev/container_image/rails:latest-3ff14136-e09f-4df9-80ea-000000000009", CreationInfo: &spdx.CreationInfo{ Creators: []common.Creator{ { @@ -492,7 +492,7 @@ func TestMarshaler_Marshal(t *testing.T) { DataLicense: spdx.DataLicense, SPDXIdentifier: "DOCUMENT", DocumentName: "centos:latest", - DocumentNamespace: "http://aquasecurity.github.io/trivy/container_image/centos:latest-3ff14136-e09f-4df9-80ea-000000000006", + DocumentNamespace: "http://trivy.dev/container_image/centos:latest-3ff14136-e09f-4df9-80ea-000000000006", CreationInfo: &spdx.CreationInfo{ Creators: []common.Creator{ { @@ -725,7 +725,7 @@ func TestMarshaler_Marshal(t *testing.T) { DataLicense: spdx.DataLicense, SPDXIdentifier: "DOCUMENT", DocumentName: "masahiro331/CVE-2021-41098", - DocumentNamespace: "http://aquasecurity.github.io/trivy/filesystem/masahiro331/CVE-2021-41098-3ff14136-e09f-4df9-80ea-000000000006", + DocumentNamespace: "http://trivy.dev/filesystem/masahiro331/CVE-2021-41098-3ff14136-e09f-4df9-80ea-000000000006", CreationInfo: &spdx.CreationInfo{ Creators: []common.Creator{ { @@ -1026,7 +1026,7 @@ func TestMarshaler_Marshal(t *testing.T) { DataLicense: spdx.DataLicense, SPDXIdentifier: "DOCUMENT", DocumentName: "log4j-core-2.17.0.jar", - DocumentNamespace: "http://aquasecurity.github.io/trivy/filesystem/log4j-core-2.17.0.jar-3ff14136-e09f-4df9-80ea-000000000003", + DocumentNamespace: "http://trivy.dev/filesystem/log4j-core-2.17.0.jar-3ff14136-e09f-4df9-80ea-000000000003", CreationInfo: &spdx.CreationInfo{ Creators: []common.Creator{ { @@ -1128,7 +1128,7 @@ func TestMarshaler_Marshal(t *testing.T) { DataLicense: spdx.DataLicense, SPDXIdentifier: "DOCUMENT", DocumentName: "http://test-aggregate", - DocumentNamespace: "http://aquasecurity.github.io/trivy/repository/test-aggregate-3ff14136-e09f-4df9-80ea-000000000003", + DocumentNamespace: "http://trivy.dev/repository/test-aggregate-3ff14136-e09f-4df9-80ea-000000000003", CreationInfo: &spdx.CreationInfo{ Creators: []common.Creator{ { @@ -1222,7 +1222,7 @@ func TestMarshaler_Marshal(t *testing.T) { DataLicense: spdx.DataLicense, SPDXIdentifier: "DOCUMENT", DocumentName: "empty/path", - DocumentNamespace: "http://aquasecurity.github.io/trivy/filesystem/empty/path-3ff14136-e09f-4df9-80ea-000000000002", + DocumentNamespace: "http://trivy.dev/filesystem/empty/path-3ff14136-e09f-4df9-80ea-000000000002", CreationInfo: &spdx.CreationInfo{ Creators: []common.Creator{ @@ -1285,7 +1285,7 @@ func TestMarshaler_Marshal(t *testing.T) { DataLicense: spdx.DataLicense, SPDXIdentifier: "DOCUMENT", DocumentName: "secret", - DocumentNamespace: "http://aquasecurity.github.io/trivy/filesystem/secret-3ff14136-e09f-4df9-80ea-000000000002", + DocumentNamespace: "http://trivy.dev/filesystem/secret-3ff14136-e09f-4df9-80ea-000000000002", CreationInfo: &spdx.CreationInfo{ Creators: []common.Creator{ { @@ -1357,7 +1357,7 @@ func TestMarshaler_Marshal(t *testing.T) { DataLicense: spdx.DataLicense, SPDXIdentifier: "DOCUMENT", DocumentName: "go-artifact", - DocumentNamespace: "http://aquasecurity.github.io/trivy/filesystem/go-artifact-3ff14136-e09f-4df9-80ea-000000000005", + DocumentNamespace: "http://trivy.dev/filesystem/go-artifact-3ff14136-e09f-4df9-80ea-000000000005", CreationInfo: &spdx.CreationInfo{ Creators: []common.Creator{ { diff --git a/pkg/sbom/spdx/testdata/happy/bom.json b/pkg/sbom/spdx/testdata/happy/bom.json index 88af63b3b71a..604c3b1f0468 100644 --- a/pkg/sbom/spdx/testdata/happy/bom.json +++ b/pkg/sbom/spdx/testdata/happy/bom.json @@ -8,7 +8,7 @@ ] }, "dataLicense": "CC0-1.0", - "documentNamespace": "http://aquasecurity.github.io/trivy/container/meven-test-project-eb7a0384-b04a-4fc6-8afb-1662fe59ca79", + "documentNamespace": "http://trivy.dev/container/meven-test-project-eb7a0384-b04a-4fc6-8afb-1662fe59ca79", "name": "maven-test-projecct", "packages": [ { diff --git a/pkg/sbom/spdx/testdata/happy/empty-bom.json b/pkg/sbom/spdx/testdata/happy/empty-bom.json index 8835078b8111..07020a41fb74 100644 --- a/pkg/sbom/spdx/testdata/happy/empty-bom.json +++ b/pkg/sbom/spdx/testdata/happy/empty-bom.json @@ -11,7 +11,7 @@ "documentDescribes": [ "SPDXRef-ContainerImage-7f428bd075b13fe8" ], - "documentNamespace": "http://aquasecurity.github.io/trivy/container/maven-test-project-3e87878b-eac3-4baa-af11-bdf2c5eab8ea", + "documentNamespace": "http://trivy.dev/container/maven-test-project-3e87878b-eac3-4baa-af11-bdf2c5eab8ea", "name": "maven-test-project", "packages": [ { diff --git a/pkg/sbom/spdx/testdata/happy/os-only-bom.json b/pkg/sbom/spdx/testdata/happy/os-only-bom.json index 7cc9425f001a..148a5f71ddf1 100644 --- a/pkg/sbom/spdx/testdata/happy/os-only-bom.json +++ b/pkg/sbom/spdx/testdata/happy/os-only-bom.json @@ -8,7 +8,7 @@ ] }, "dataLicense": "CC0-1.0", - "documentNamespace": "http://aquasecurity.github.io/trivy/container/maven-test-project-1a255568-e896-498f-93de-7975a5cb0212", + "documentNamespace": "http://trivy.dev/container/maven-test-project-1a255568-e896-498f-93de-7975a5cb0212", "name": "maven-test-project", "packages": [ { diff --git a/pkg/sbom/spdx/testdata/happy/unrelated-bom.json b/pkg/sbom/spdx/testdata/happy/unrelated-bom.json index 2465e65f8b42..35d63541d847 100644 --- a/pkg/sbom/spdx/testdata/happy/unrelated-bom.json +++ b/pkg/sbom/spdx/testdata/happy/unrelated-bom.json @@ -8,7 +8,7 @@ ] }, "dataLicense": "CC0-1.0", - "documentNamespace": "http://aquasecurity.github.io/trivy/application/maven-test-project-8aa3b6db-bae7-4755-b43e-00b4bcf46410", + "documentNamespace": "http://trivy.dev/application/maven-test-project-8aa3b6db-bae7-4755-b43e-00b4bcf46410", "name": "maven-test-project", "packages": [ { diff --git a/pkg/sbom/spdx/testdata/happy/with-files-in-relationships-bom.json b/pkg/sbom/spdx/testdata/happy/with-files-in-relationships-bom.json index 577bff237946..596f3d10b289 100644 --- a/pkg/sbom/spdx/testdata/happy/with-files-in-relationships-bom.json +++ b/pkg/sbom/spdx/testdata/happy/with-files-in-relationships-bom.json @@ -3,7 +3,7 @@ "dataLicense": "CC0-1.0", "SPDXID": "SPDXRef-DOCUMENT", "name": "app", - "documentNamespace": "http://aquasecurity.github.io/trivy/filesystem/app-8e571278-2221-4dcd-bc56-0b256210fa91", + "documentNamespace": "http://trivy.dev/filesystem/app-8e571278-2221-4dcd-bc56-0b256210fa91", "creationInfo": { "licenseListVersion": "", "creators": [ diff --git a/pkg/sbom/spdx/testdata/happy/with-hasfiles-bom.json b/pkg/sbom/spdx/testdata/happy/with-hasfiles-bom.json index c0d836442405..5bc6c03e4ea8 100644 --- a/pkg/sbom/spdx/testdata/happy/with-hasfiles-bom.json +++ b/pkg/sbom/spdx/testdata/happy/with-hasfiles-bom.json @@ -11,7 +11,7 @@ "documentDescribes": [ "SPDXRef-Filesystem-13b142ca391a006e" ], - "documentNamespace": "http://aquasecurity.github.io/trivy/filesystem/app-ab9e166e-7229-4d03-947e-8ffc9c60cf6f", + "documentNamespace": "http://trivy.dev/filesystem/app-ab9e166e-7229-4d03-947e-8ffc9c60cf6f", "files": [ { "SPDXID": "SPDXRef-File-51bb5f929ef68877", diff --git a/pkg/sbom/spdx/testdata/sad/invalid-purl.json b/pkg/sbom/spdx/testdata/sad/invalid-purl.json index da87237d54b7..bbf5291b0e08 100644 --- a/pkg/sbom/spdx/testdata/sad/invalid-purl.json +++ b/pkg/sbom/spdx/testdata/sad/invalid-purl.json @@ -8,7 +8,7 @@ ] }, "dataLicense": "CC0-1.0", - "documentNamespace": "http://aquasecurity.github.io/trivy/container/meven-test-project-eb7a0384-b04a-4fc6-8afb-1662fe59ca79", + "documentNamespace": "http://trivy.dev/container/meven-test-project-eb7a0384-b04a-4fc6-8afb-1662fe59ca79", "name": "maven-test-projecct", "packages": [ { diff --git a/pkg/version/doc/doc_test.go b/pkg/version/doc/doc_test.go index 3107172962eb..e783174dca24 100644 --- a/pkg/version/doc/doc_test.go +++ b/pkg/version/doc/doc_test.go @@ -17,32 +17,32 @@ func TestBaseURL(t *testing.T) { { name: "dev", ver: "dev", - want: "https://aquasecurity.github.io/trivy/dev", + want: "https://trivy.dev/dev", }, { name: "semver", ver: "0.52.0", - want: "https://aquasecurity.github.io/trivy/v0.52", + want: "https://trivy.dev/v0.52", }, { name: "with v prefix", ver: "v0.52.0", - want: "https://aquasecurity.github.io/trivy/v0.52", + want: "https://trivy.dev/v0.52", }, { name: "pre-release", ver: "0.52.0-beta1", - want: "https://aquasecurity.github.io/trivy/dev", + want: "https://trivy.dev/dev", }, { name: "non-semver", ver: "1", - want: "https://aquasecurity.github.io/trivy/dev", + want: "https://trivy.dev/dev", }, { name: "empty", ver: "", - want: "https://aquasecurity.github.io/trivy/dev", + want: "https://trivy.dev/dev", }, } for _, tt := range tests { @@ -63,28 +63,28 @@ func TestURL(t *testing.T) { { name: "path without slash", rawPath: "foo", - want: "https://aquasecurity.github.io/trivy/dev/foo", + want: "https://trivy.dev/dev/foo", }, { name: "path with leading slash", rawPath: "/foo", - want: "https://aquasecurity.github.io/trivy/dev/foo", + want: "https://trivy.dev/dev/foo", }, { name: "path with slash", rawPath: "foo/bar", - want: "https://aquasecurity.github.io/trivy/dev/foo/bar", + want: "https://trivy.dev/dev/foo/bar", }, { name: "path with fragment", rawPath: "foo", fragment: "bar", - want: "https://aquasecurity.github.io/trivy/dev/foo#bar", + want: "https://trivy.dev/dev/foo#bar", }, { name: "empty", rawPath: "", - want: "https://aquasecurity.github.io/trivy/dev", + want: "https://trivy.dev/dev", }, } for _, tt := range tests { diff --git a/pkg/vulnerability/vulnerability.go b/pkg/vulnerability/vulnerability.go index 6c1e35427a64..501a701a85f2 100644 --- a/pkg/vulnerability/vulnerability.go +++ b/pkg/vulnerability/vulnerability.go @@ -52,7 +52,7 @@ var SuperSet = wire.NewSet( // Show warning if we use severity from another vendor // cf. https://github.com/aquasecurity/trivy/issues/6714 var onceWarn = sync.OnceFunc(func() { - // e.g. https://aquasecurity.github.io/trivy/latest/docs/scanner/vulnerability/#severity-selection + // e.g. https://trivy.dev/latest/docs/scanner/vulnerability/#severity-selection log.Warnf("Using severities from other vendors for some vulnerabilities. Read %s for details.", doc.URL("/docs/scanner/vulnerability/", "severity-selection")) })