From 1797b28cc3bfbd3d68cdbdecdd8522eec64d90cb Mon Sep 17 00:00:00 2001
From: David Karlsson <35727626+dvdksn@users.noreply.github.com>
Date: Mon, 25 Mar 2024 08:42:14 +0100
Subject: [PATCH] vendor: manually vendor scout-cli@1aac31a
Signed-off-by: David Karlsson <35727626+dvdksn@users.noreply.github.com>
---
.../github.com/docker/scout-cli/docs/scout.md | 36 ---
.../scout-cli/docs/scout_attestation.md | 19 --
.../scout-cli/docs/scout_attestation_add.md | 19 --
.../docker/scout-cli/docs/scout_cache.md | 16 --
.../docker/scout-cli/docs/scout_cache_df.md | 52 ----
.../scout-cli/docs/scout_cache_prune.md | 41 ---
.../docker/scout-cli/docs/scout_compare.md | 108 -------
.../docker/scout-cli/docs/scout_config.md | 38 ---
.../docker/scout-cli/docs/scout_cves.md | 269 ------------------
.../docker/scout-cli/docs/scout_enroll.md | 11 -
.../scout-cli/docs/scout_environment.md | 58 ----
.../docker/scout-cli/docs/scout_help.md | 8 -
.../scout-cli/docs/scout_integration.md | 17 --
.../docs/scout_integration_configure.md | 16 --
.../docs/scout_integration_delete.md | 15 -
.../scout-cli/docs/scout_integration_list.md | 15 -
.../docker/scout-cli/docs/scout_policy.md | 51 ----
.../docker/scout-cli/docs/scout_push.md | 29 --
.../docker/scout-cli/docs/scout_quickview.md | 96 -------
.../scout-cli/docs/scout_recommendations.md | 71 -----
.../docker/scout-cli/docs/scout_repo.md | 17 --
.../scout-cli/docs/scout_repo_disable.md | 43 ---
.../scout-cli/docs/scout_repo_enable.md | 43 ---
.../docker/scout-cli/docs/scout_repo_list.md | 18 --
.../docker/scout-cli/docs/scout_sbom.md | 83 ------
.../docker/scout-cli/docs/scout_stream.md | 47 ---
.../docker/scout-cli/docs/scout_version.md | 38 ---
.../docker/scout-cli/docs/scout_watch.md | 53 ----
_vendor/modules.txt | 1 -
.../docs => data/scout-cli}/docker_scout.yaml | 0
.../scout-cli}/docker_scout_attestation.yaml | 0
.../docker_scout_attestation_add.yaml | 0
.../scout-cli}/docker_scout_cache.yaml | 0
.../scout-cli}/docker_scout_cache_df.yaml | 0
.../scout-cli}/docker_scout_cache_prune.yaml | 10 -
.../scout-cli}/docker_scout_compare.yaml | 0
.../scout-cli}/docker_scout_config.yaml | 0
.../scout-cli}/docker_scout_cves.yaml | 17 +-
.../scout-cli}/docker_scout_enroll.yaml | 0
.../scout-cli}/docker_scout_environment.yaml | 0
.../scout-cli}/docker_scout_help.yaml | 0
.../scout-cli}/docker_scout_integration.yaml | 0
.../docker_scout_integration_configure.yaml | 0
.../docker_scout_integration_delete.yaml | 0
.../docker_scout_integration_list.yaml | 0
.../scout-cli}/docker_scout_policy.yaml | 0
.../scout-cli}/docker_scout_push.yaml | 0
.../scout-cli}/docker_scout_quickview.yaml | 0
.../docker_scout_recommendations.yaml | 0
.../scout-cli}/docker_scout_repo.yaml | 0
.../scout-cli}/docker_scout_repo_disable.yaml | 0
.../scout-cli}/docker_scout_repo_enable.yaml | 0
.../scout-cli}/docker_scout_repo_list.yaml | 0
.../scout-cli}/docker_scout_sbom.yaml | 0
.../scout-cli}/docker_scout_stream.yaml | 0
.../scout-cli}/docker_scout_version.yaml | 0
.../scout-cli}/docker_scout_watch.yaml | 0
go.mod | 2 -
hugo.yaml | 6 -
59 files changed, 7 insertions(+), 1356 deletions(-)
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_attestation.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_attestation_add.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_cache.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_cache_df.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_cache_prune.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_compare.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_config.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_cves.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_enroll.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_environment.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_help.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_integration.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_integration_configure.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_integration_delete.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_integration_list.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_policy.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_push.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_quickview.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_recommendations.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_repo.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_repo_disable.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_repo_enable.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_repo_list.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_sbom.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_stream.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_version.md
delete mode 100644 _vendor/github.com/docker/scout-cli/docs/scout_watch.md
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_attestation.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_attestation_add.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_cache.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_cache_df.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_cache_prune.yaml (88%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_compare.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_config.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_cves.yaml (96%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_enroll.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_environment.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_help.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_integration.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_integration_configure.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_integration_delete.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_integration_list.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_policy.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_push.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_quickview.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_recommendations.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_repo.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_repo_disable.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_repo_enable.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_repo_list.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_sbom.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_stream.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_version.yaml (100%)
rename {_vendor/github.com/docker/scout-cli/docs => data/scout-cli}/docker_scout_watch.yaml (100%)
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout.md b/_vendor/github.com/docker/scout-cli/docs/scout.md
deleted file mode 100644
index c2f8f7b3a7..0000000000
--- a/_vendor/github.com/docker/scout-cli/docs/scout.md
+++ /dev/null
@@ -1,36 +0,0 @@
-# docker scout
-
-```
-docker scout COMMAND
-```
-
-
-Command line tool for Docker Scout
-
-### Subcommands
-
-| Name | Description |
-|:----------------------------------------------|:--------------------------------------------------------------------------------------------|
-| [`attestation`](scout_attestation.md) | Manage attestations on image indexes |
-| [`cache`](scout_cache.md) | Manage Docker Scout cache and temporary files |
-| [`compare`](scout_compare.md) | Compare two images and display differences (experimental) |
-| [`config`](scout_config.md) | Manage Docker Scout configuration |
-| [`cves`](scout_cves.md) | Display CVEs identified in a software artifact |
-| [`enroll`](scout_enroll.md) | Enroll an organization with Docker Scout |
-| [`environment`](scout_environment.md) | Manage environments (experimental) |
-| [`help`](scout_help.md) | Display information about the available commands |
-| [`integration`](scout_integration.md) | Commands to list, configure, and delete Docker Scout integrations |
-| [`policy`](scout_policy.md) | Evaluate policies against an image and display the policy evaluation results (experimental) |
-| [`push`](scout_push.md) | Push an image or image index to Docker Scout (experimental) |
-| [`quickview`](scout_quickview.md) | Quick overview of an image |
-| [`recommendations`](scout_recommendations.md) | Display available base image updates and remediation recommendations |
-| [`repo`](scout_repo.md) | Commands to list, enable, and disable Docker Scout on repositories |
-| [`sbom`](scout_sbom.md) | Generate or display SBOM of an image |
-| [`stream`](scout_stream.md) | Manage streams (experimental) |
-| [`version`](scout_version.md) | Show Docker Scout version information |
-| [`watch`](scout_watch.md) | Watch repositories in a registry and push images and indexes to Docker Scout (experimental) |
-
-
-
-
-
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_attestation.md b/_vendor/github.com/docker/scout-cli/docs/scout_attestation.md
deleted file mode 100644
index d4f6bc5827..0000000000
--- a/_vendor/github.com/docker/scout-cli/docs/scout_attestation.md
+++ /dev/null
@@ -1,19 +0,0 @@
-# docker scout attestation
-
-
-Manage attestations on image indexes
-
-### Aliases
-
-`docker scout attestation`, `docker scout attest`
-
-### Subcommands
-
-| Name | Description |
-|:----------------------------------|:-------------------------|
-| [`add`](scout_attestation_add.md) | Add attestation to image |
-
-
-
-
-
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_attestation_add.md b/_vendor/github.com/docker/scout-cli/docs/scout_attestation_add.md
deleted file mode 100644
index 5f09c0fffd..0000000000
--- a/_vendor/github.com/docker/scout-cli/docs/scout_attestation_add.md
+++ /dev/null
@@ -1,19 +0,0 @@
-# docker scout attestation add
-
-
-Add attestation to image
-
-### Aliases
-
-`docker scout attestation add`, `docker scout attest add`
-
-### Options
-
-| Name | Type | Default | Description |
-|:-------------------|:--------------|:--------|:----------------------------------------|
-| `--file` | `stringSlice` | | File location of attestations to attach |
-| `--predicate-type` | `string` | | Predicate-type for attestations |
-
-
-
-
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_cache.md b/_vendor/github.com/docker/scout-cli/docs/scout_cache.md
deleted file mode 100644
index 9bb212dd3d..0000000000
--- a/_vendor/github.com/docker/scout-cli/docs/scout_cache.md
+++ /dev/null
@@ -1,16 +0,0 @@
-# docker scout cache
-
-
-Manage Docker Scout cache and temporary files
-
-### Subcommands
-
-| Name | Description |
-|:--------------------------------|:--------------------------------|
-| [`df`](scout_cache_df.md) | Show Docker Scout disk usage |
-| [`prune`](scout_cache_prune.md) | Remove temporary or cached data |
-
-
-
-
-
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_cache_df.md b/_vendor/github.com/docker/scout-cli/docs/scout_cache_df.md
deleted file mode 100644
index 71dcf99560..0000000000
--- a/_vendor/github.com/docker/scout-cli/docs/scout_cache_df.md
+++ /dev/null
@@ -1,52 +0,0 @@
-# docker scout cache df
-
-
-Show Docker Scout disk usage
-
-
-
-
-## Description
-
-Docker Scout uses a temporary cache storage for generating image SBOMs.
-The cache helps avoid regenerating or fetching resources unnecessarily.
-
-This `docker scout cache df` command shows the cached data on the host.
-Each cache entry is identified by the digest of the image.
-
-You can use the `docker scout cache prune` command to delete cache data at any time.
-
-## Examples
-
-### List temporary and cache files
-
-```console
-$ docker scout cache df
-Docker Scout temporary directory to generate SBOMs is located at:
- /var/folders/dw/d6h9w2sx6rv3lzwwgrnx7t5h0000gp/T/docker-scout
- this path can be configured using the DOCKER_SCOUT_CACHE_DIR environment variable
-
- Image Digest │ Size
-──────────────────────────────────────────────────────────────────────────┼────────
- sha256:c41ab5c992deb4fe7e5da09f67a8804a46bd0592bfdf0b1847dde0e0889d2bff │ 21 kB
-
-Total: 21 kB
-
-
-Docker Scout cached SBOMs are located at:
- /Users/user/.docker/scout/sbom
-
- Image Digest │ Size of SBOM
-──────────────────────────────────────────────────────────────────────────┼───────────────
- sha256:02bb6f428431fbc2809c5d1b41eab5a68350194fb508869a33cb1af4444c9b11 │ 42 kB
- sha256:03fc002fe4f370463a8f04d3a288cdffa861e462fc8b5be44ab62b296ad95183 │ 100 kB
- sha256:088134dd33e4a2997480a1488a41c11abebda465da5cf7f305a0ecf8ed494329 │ 194 kB
- sha256:0b80b2f17aff7ee5bfb135c69d0d6fe34070e89042b7aac73d1abcc79cfe6759 │ 852 kB
- sha256:0c9e8abe31a5f17d84d5c85d3853d2f948a4f126421e89e68753591f1b6fedc5 │ 930 kB
- sha256:0d49cae0723c8d310e413736b5e91e0c59b605ade2546f6e6ef8f1f3ddc76066 │ 510 kB
- sha256:0ef04748d071c2e631bb3edce8f805cb5512e746b682c83fdae6d8c0b243280b │ 1.0 MB
- sha256:13fd22925b638bb7d2131914bb8f8b0f5f582bee364aec682d9e7fe722bb486a │ 42 kB
- sha256:174c41d4fbc7f63e1f2bb7d2f7837318050406f2f27e5073a84a84f18b48b883 │ 115 kB
-
-Total: 4 MB
-```
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_cache_prune.md b/_vendor/github.com/docker/scout-cli/docs/scout_cache_prune.md
deleted file mode 100644
index f53a51203b..0000000000
--- a/_vendor/github.com/docker/scout-cli/docs/scout_cache_prune.md
+++ /dev/null
@@ -1,41 +0,0 @@
-# docker scout cache prune
-
-
-Remove temporary or cached data
-
-### Options
-
-| Name | Type | Default | Description |
-|:----------------|:-----|:--------|:-------------------------------|
-| `--epss` | | | Prune cached EPSS scores |
-| `-f`, `--force` | | | Do not prompt for confirmation |
-| `--sboms` | | | Prune cached SBOMs |
-
-
-
-
-## Description
-
-The `docker scout cache prune` command removes temporary data and SBOM cache.
-
-By default, `docker scout cache prune` only deletes temporary data.
-To delete temporary data and clear the SBOM cache, use the `--sboms` flag.
-
-## Examples
-
-### Delete temporary data
-
-```console
-$ docker scout cache prune
-? Are you sure to delete all temporary data? Yes
- ✓ temporary data deleted
-```
-
-### Delete temporary _and_ cache data
-
-```console
-$ docker scout cache prune --sboms
-? Are you sure to delete all temporary data and all cached SBOMs? Yes
- ✓ temporary data deleted
- ✓ cached SBOMs deleted
-```
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_compare.md b/_vendor/github.com/docker/scout-cli/docs/scout_compare.md
deleted file mode 100644
index b3530da571..0000000000
--- a/_vendor/github.com/docker/scout-cli/docs/scout_compare.md
+++ /dev/null
@@ -1,108 +0,0 @@
-# docker scout compare
-
-
-Compare two images and display differences (experimental)
-
-### Aliases
-
-`docker scout compare`, `docker scout diff`
-
-### Options
-
-| Name | Type | Default | Description |
-|:----------------------|:--------------|:--------|:-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| `-x`, `--exit-on` | `stringSlice` | | Comma separated list of conditions to fail the action step if worse, options are: vulnerability, policy |
-| `--format` | `string` | `text` | Output format of the generated vulnerability report:
- text: default output, plain text with or without colors depending on the terminal
- markdown: Markdown output
|
-| `--hide-policies` | | | Hide policy status from the output |
-| `--ignore-base` | | | Filter out CVEs introduced from base image |
-| `--ignore-unchanged` | | | Filter out unchanged packages |
-| `--multi-stage` | | | Show packages from multi-stage Docker builds |
-| `--only-fixed` | | | Filter to fixable CVEs |
-| `--only-package-type` | `stringSlice` | | Comma separated list of package types (like apk, deb, rpm, npm, pypi, golang, etc) |
-| `--only-severity` | `stringSlice` | | Comma separated list of severities (critical, high, medium, low, unspecified) to filter CVEs by |
-| `--only-stage` | `stringSlice` | | Comma separated list of multi-stage Docker build stage names |
-| `--only-unfixed` | | | Filter to unfixed CVEs |
-| `--org` | `string` | | Namespace of the Docker organization |
-| `-o`, `--output` | `string` | | Write the report to a file |
-| `--platform` | `string` | | Platform of image to analyze |
-| `--ref` | `string` | | Reference to use if the provided tarball contains multiple references.
Can only be used with archive |
-| `--to` | `string` | | Image, directory, or archive to compare to |
-| `--to-env` | `string` | | Name of environment to compare to |
-| `--to-latest` | | | Latest image processed to compare to |
-| `--to-ref` | `string` | | Reference to use if the provided tarball contains multiple references.
Can only be used with archive. |
-
-
-
-
-## Description
-
-The `docker scout compare` command analyzes two images and displays a comparison.
-
-> This command is **experimental** and its behaviour might change in the future
-
-The intended use of this command is to compare two versions of the same image.
-For instance, when a new image is built and compared to the version running in production.
-
-If no image is specified, the most recently built image is used
-as a comparison target.
-
-The following artifact types are supported:
-
-- Images
-- OCI layout directories
-- Tarball archives, as created by `docker save`
-- Local directory or file
-
-By default, the tool expects an image reference, such as:
-
-- `redis`
-- `curlimages/curl:7.87.0`
-- `mcr.microsoft.com/dotnet/runtime:7.0`
-
-If the artifact you want to analyze is an OCI directory, a tarball archive, a local file or directory,
-or if you want to control from where the image will be resolved, you must prefix the reference with one of the following:
-
-- `image://` (default) use a local image, or fall back to a registry lookup
-- `local://` use an image from the local image store (don't do a registry lookup)
-- `registry://` use an image from a registry (don't use a local image)
-- `oci-dir://` use an OCI layout directory
-- `archive://` use a tarball archive, as created by `docker save`
-- `fs://` use a local directory or file
-
-## Examples
-
-### Compare the most recently built image to the latest tag
-
-```console
-$ docker scout compare --to namespace/repo:latest
-```
-
-### Compare local build to the same tag from the registry
-
-```console
-$ docker scout compare local://namespace/repo:latest --to registry://namespace/repo:latest
-```
-
-### Ignore base images
-
-```console
-$ docker scout compare --ignore-base --to namespace/repo:latest namespace/repo:v1.2.3-pre
-```
-
-### Generate a markdown output
-
-```console
-$ docker scout compare --format markdown --to namespace/repo:latest namespace/repo:v1.2.3-pre
-```
-
-### Only compare maven packages and only display critical vulnerabilities for maven packages
-
-```console
-$ docker scout compare --only-package-type maven --only-severity critical --to namespace/repo:latest namespace/repo:v1.2.3-pre
-```
-
-### Show all policy results for both images
-
-```console
-docker scout compare --to namespace/repo:latest namespace/repo:v1.2.3-pre
-```
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_config.md b/_vendor/github.com/docker/scout-cli/docs/scout_config.md
deleted file mode 100644
index 1a6e8b69c9..0000000000
--- a/_vendor/github.com/docker/scout-cli/docs/scout_config.md
+++ /dev/null
@@ -1,38 +0,0 @@
-# docker scout config
-
-
-Manage Docker Scout configuration
-
-
-
-
-## Description
-
-`docker scout config` allows you to list, get and set Docker Scout configuration.
-
-Available configuration key:
-
-- `organization`: Namespace of the Docker organization to be used by default.
-
-## Examples
-
-### List existing configuration
-
-```console
-$ docker scout config
-organization=my-org-namespace
-```
-
-### Print configuration value
-
-```console
-$ docker scout config organization
-my-org-namespace
-```
-
-### Set configuration value
-
-```console
-$ docker scout config organization my-org-namespace
- ✓ Successfully set organization to my-org-namespace
-```
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_cves.md b/_vendor/github.com/docker/scout-cli/docs/scout_cves.md
deleted file mode 100644
index 3b5c19c57a..0000000000
--- a/_vendor/github.com/docker/scout-cli/docs/scout_cves.md
+++ /dev/null
@@ -1,269 +0,0 @@
-# docker scout cves
-
-```
-docker scout cves [OPTIONS] [IMAGE|DIRECTORY|ARCHIVE]
-```
-
-
-Display CVEs identified in a software artifact
-
-### Options
-
-| Name | Type | Default | Description |
-|:-----------------------|:--------------|:-----------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| `--details` | | | Print details on default text output |
-| `--env` | `string` | | Name of environment |
-| [`--epss`](#epss) | | | Display the EPSS scores and organize the package's CVEs according to their EPSS score |
-| `--epss-date` | `string` | | Date to use for EPSS scores |
-| `--epss-percentile` | `float32` | `0` | Exclude CVEs with EPSS scores less than the specified percentile (0 to 1) |
-| `--epss-score` | `float32` | `0` | Exclude CVEs with EPSS scores less than the specified value (0 to 1) |
-| `-e`, `--exit-code` | | | Return exit code '2' if vulnerabilities are detected |
-| `--format` | `string` | `packages` | Output format of the generated vulnerability report:
- packages: default output, plain text with vulnerabilities grouped by packages
- sarif: json Sarif output
- spdx: json SPDX output
- markdown: markdown output (including some html tags like collapsible sections)
- sbom: json SBOM output
|
-| `--ignore-base` | | | Filter out CVEs introduced from base image |
-| `--locations` | | | Print package locations including file paths and layer diff_id |
-| `--multi-stage` | | | Show packages from multi-stage Docker builds |
-| `--only-cve-id` | `stringSlice` | | Comma separated list of CVE ids (like CVE-2021-45105) to search for |
-| `--only-fixed` | | | Filter to fixable CVEs |
-| `--only-metric` | `stringSlice` | | Comma separated list of CVSS metrics (like AV:N or PR:L) to filter CVEs by |
-| `--only-package` | `stringSlice` | | Comma separated regular expressions to filter packages by |
-| `--only-package-type` | `stringSlice` | | Comma separated list of package types (like apk, deb, rpm, npm, pypi, golang, etc) |
-| `--only-severity` | `stringSlice` | | Comma separated list of severities (critical, high, medium, low, unspecified) to filter CVEs by |
-| `--only-stage` | `stringSlice` | | Comma separated list of multi-stage Docker build stage names |
-| `--only-unfixed` | | | Filter to unfixed CVEs |
-| `--only-vex-affected` | | | Filter CVEs by VEX statements with status not affected |
-| `--only-vuln-packages` | | | When used with --format=only-packages ignore packages with no vulnerabilities |
-| `--org` | `string` | | Namespace of the Docker organization |
-| `-o`, `--output` | `string` | | Write the report to a file |
-| `--platform` | `string` | | Platform of image to analyze |
-| `--ref` | `string` | | Reference to use if the provided tarball contains multiple references.
Can only be used with archive |
-| `--vex-author` | `stringSlice` | | List of VEX statement authors to accept |
-| `--vex-location` | `stringSlice` | | File location of directory or file containing VEX statements |
-
-
-
-
-## Description
-
-The `docker scout cves` command analyzes a software artifact for vulnerabilities.
-
-If no image is specified, the most recently built image is used.
-
-The following artifact types are supported:
-
-- Images
-- OCI layout directories
-- Tarball archives, as created by `docker save`
-- Local directory or file
-
-By default, the tool expects an image reference, such as:
-
-- `redis`
-- `curlimages/curl:7.87.0`
-- `mcr.microsoft.com/dotnet/runtime:7.0`
-
-If the artifact you want to analyze is an OCI directory, a tarball archive, a local file or directory,
-or if you want to control from where the image will be resolved, you must prefix the reference with one of the following:
-
-- `image://` (default) use a local image, or fall back to a registry lookup
-- `local://` use an image from the local image store (don't do a registry lookup)
-- `registry://` use an image from a registry (don't use a local image)
-- `oci-dir://` use an OCI layout directory
-- `archive://` use a tarball archive, as created by `docker save`
-- `fs://` use a local directory or file
-- `sbom://` SPDX file or in-toto attestation file with SPDX predicate or `syft` json SBOM file
- In case of `sbom://` prefix, if the file is not defined then it will try to read it from the standard input.
-
-## Examples
-
-### Display vulnerabilities grouped by package
-
-```console
-$ docker scout cves alpine
-Analyzing image alpine
-✓ Image stored for indexing
-✓ Indexed 18 packages
-✓ No vulnerable package detected
-```
-
-### Display vulnerabilities from a `docker save` tarball
-
-```console
-$ docker save alpine > alpine.tar
-
-$ docker scout cves archive://alpine.tar
-Analyzing archive alpine.tar
-✓ Archive read
-✓ SBOM of image already cached, 18 packages indexed
-✓ No vulnerable package detected
-```
-
-### Display vulnerabilities from an OCI directory
-
-```console
-$ skopeo copy --override-os linux docker://alpine oci:alpine
-
-$ docker scout cves oci-dir://alpine
-Analyzing OCI directory alpine
-✓ OCI directory read
-✓ Image stored for indexing
-✓ Indexed 19 packages
-✓ No vulnerable package detected
-```
-
-### Display vulnerabilities from the current directory
-
-```console
-$ docker scout cves fs://.
-```
-
-### Export vulnerabilities to a SARIF JSON file
-
-```console
-$ docker scout cves --format sarif --output alpine.sarif.json alpine
-Analyzing image alpine
-✓ SBOM of image already cached, 18 packages indexed
-✓ No vulnerable package detected
-✓ Report written to alpine.sarif.json
-```
-
-### Display markdown output
-
-The following example shows how to generate the vulnerability report as markdown.
-
-```console
-$ docker scout cves --format markdown alpine
-✓ Pulled
-✓ SBOM of image already cached, 19 packages indexed
-✗ Detected 1 vulnerable package with 3 vulnerabilities
-
alpine
alpine
digest | sha256:e3bd82196e98898cae9fe7fbfd6e2436530485974dc4fb3b7ddb69134eda2407 |
vulnerabilities | |
platform | linux/arm64 |
size | 3.3 MB |
packages | 19 |