-
Notifications
You must be signed in to change notification settings - Fork 229
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to Detect OS on ECS-Optimized AMI #368
Comments
Do you see the same issue if you run Trivy as a CLI tool locally? If so, it'd be an issue with Trivy itself and not the Action. In that case, could you file this as a discussion in the Trivy repo so we can take a look? |
Good point! Thank you. So when I ran it locally I got this:
and then a list of vulnerabilities. It still doesn't detect the OS, but that's much less important than the fact that it didn't hit that filesystem walk error |
Are you able to provide an input image which we can use to reproduce this? |
This image should do: ami-0fda48b6c27c921ad |
Is this a public image? If so, where is it available? I'm unable to find it in the regions I looked at. |
In other regions it's in the AWS Marketplace, but in ap-southeast2 it's a Community AMI |
seeing the same issue with a generic AL2023 image with the ECS agent installed, unfortunately the AMI isn't public but thought it worthwhile highlighting that this isn't an issue that's only affecting the ECS optimised AMI that AWS provide however the issue is also seen when scanning using the CLI locally currently using version 0.54.1, will try 0.55 to see if that fixes the issue... |
Please file the discussion in the Trivy repo in this case as it would be a Trivy bug not specific to the action itself. Thank you. |
ah ok, sorry i missed that this was the action repo :) |
Hello,
When running
trivy-action
scans on ECS-Optimized Amazon Machine Images (AMIs) in a GitHub Actions workflow, I've found Trivy fails to detect the operating system and reports a 'filesystem walk error'. The issue persists across different scan configurations, including vulnerability scans, misconfiguration scans, and attempts to skip specific directories.Steps to reproduce the behavior:
trivy-action
to the workflow to scan the AMIs.Expected behavior
Trivy should correctly detect the operating system and perform a complete scan without errors.
GitHub Actions Workflow Configuration
Output Logs
OS Information
Additional context
Request for Assistance
The text was updated successfully, but these errors were encountered: