github.com/devseccon/trivy@v0.47.1-0.20231123133102-bd902a0bd996/pkg/result/testdata/.trivyignore.yaml (about)

     1  vulnerabilities:
     2    - id: CVE-2019-0001
     3      paths:
     4        - "**/*-lock.json"
     5    - id: CVE-2019-0002
     6      paths:
     7        - "bar/package.json"
     8    - id: CVE-2019-0003
     9    - id: CVE-2019-0004
    10      paths:
    11        - "bar/package.json"
    12    - id: CVE-2019-0005
    13      expired_at: 2023-01-01
    14    - id: CVE-2019-0006
    15      expired_at: 2020-01-01
    16  
    17  misconfigurations:
    18    - id: ID100
    19    - id: ID200
    20      paths:
    21        - "app/Dockerfile"
    22    - id: ID300
    23      paths:
    24        - "docs/Dockerfile"
    25  secrets:
    26    - id: generic-unwanted-rule
    27    - id: generic-unwanted-rule2
    28      paths:
    29        - "**/config.yaml"
    30    - id: generic-wanted-rule
    31      paths:
    32        - "foo/secret.txt"
    33  licenses:
    34    - id: GPL-3.0
    35      paths:
    36        - "usr/share/gcc/python/libstdcxx/v6/__init__.py"