diff --git a/dist/docker-scout_0.17.0_checksums.txt b/dist/docker-scout_0.17.0_checksums.txt
deleted file mode 100644
index 2339f32..0000000
--- a/dist/docker-scout_0.17.0_checksums.txt
+++ /dev/null
@@ -1,6 +0,0 @@
-0fcb519e0647212c7091fd1634cf70e44cae80136afd9f24c6f61ddf7ad33cd8 docker-scout_0.17.0_linux_amd64.tar.gz
-205f14f67404c70230c86e1272723cfd79cbea5cba578835c30b93859d80acd7 docker-scout_0.17.0_windows_amd64.zip
-8c0bbddda33f56c185a47e38cd36e52ee74b887d03ffddaaae1008cd1ebc086c docker-scout_0.17.0_windows_arm64.zip
-9b571061b203128622257411faec1407b6e2e5157562262822014fbeeb8fa6d3 docker-scout_0.17.0_linux_arm64.tar.gz
-c4d0a07cbc54e7e6edeb13780e237ba7bf43cbc6572166b68b93dfd86344c549 docker-scout_0.17.0_darwin_arm64.tar.gz
-df5ced8474a9e1ba41cff02c93eeb1dcdd766977f65c559c5d382b3838076e4d docker-scout_0.17.0_darwin_amd64.tar.gz
diff --git a/dist/docker-scout_0.17.1_checksums.txt b/dist/docker-scout_0.17.1_checksums.txt
new file mode 100644
index 0000000..aee3625
--- /dev/null
+++ b/dist/docker-scout_0.17.1_checksums.txt
@@ -0,0 +1,6 @@
+1a4ce3ce3eb498f756f40013b8b6dc8827fdbf6f558977bdf4da7cdab4c2628e docker-scout_0.17.1_windows_arm64.zip
+2210bc89f0585afe26860fba153188079260ef4bd8a7393642d1cad85c49bcef docker-scout_0.17.1_linux_amd64.tar.gz
+461235c3306eeb02e80add34e83c33c397507053e7edc7ae70b533d61d6a722f docker-scout_0.17.1_darwin_arm64.tar.gz
+5c4b40e208ec3ef103e228ab874d2fdabaa413958f79c85ac0c29bd70a09868c docker-scout_0.17.1_windows_amd64.zip
+7e8c250a73a3e5adc40e6e6f88f534a72e00f418679c5b5260178732a541d688 docker-scout_0.17.1_darwin_amd64.tar.gz
+93fc1ec1dc4504bc411a97bf9a7a01caf30aae6144b0bb93920fdf712ccd0b37 docker-scout_0.17.1_linux_arm64.tar.gz
diff --git a/dist/docker-scout_0.17.0_darwin_amd64.tar.gz b/dist/docker-scout_0.17.1_darwin_amd64.tar.gz
similarity index 66%
rename from dist/docker-scout_0.17.0_darwin_amd64.tar.gz
rename to dist/docker-scout_0.17.1_darwin_amd64.tar.gz
index 7b7c93f..182a034 100644
Binary files a/dist/docker-scout_0.17.0_darwin_amd64.tar.gz and b/dist/docker-scout_0.17.1_darwin_amd64.tar.gz differ
diff --git a/dist/docker-scout_0.17.0_linux_amd64.tar.gz b/dist/docker-scout_0.17.1_darwin_arm64.tar.gz
similarity index 66%
rename from dist/docker-scout_0.17.0_linux_amd64.tar.gz
rename to dist/docker-scout_0.17.1_darwin_arm64.tar.gz
index 82ebe19..d6bd87f 100644
Binary files a/dist/docker-scout_0.17.0_linux_amd64.tar.gz and b/dist/docker-scout_0.17.1_darwin_arm64.tar.gz differ
diff --git a/dist/docker-scout_0.17.0_darwin_arm64.tar.gz b/dist/docker-scout_0.17.1_linux_amd64.tar.gz
similarity index 66%
rename from dist/docker-scout_0.17.0_darwin_arm64.tar.gz
rename to dist/docker-scout_0.17.1_linux_amd64.tar.gz
index ad1f57e..78503ff 100644
Binary files a/dist/docker-scout_0.17.0_darwin_arm64.tar.gz and b/dist/docker-scout_0.17.1_linux_amd64.tar.gz differ
diff --git a/dist/docker-scout_0.17.0_linux_arm64.tar.gz b/dist/docker-scout_0.17.1_linux_arm64.tar.gz
similarity index 65%
rename from dist/docker-scout_0.17.0_linux_arm64.tar.gz
rename to dist/docker-scout_0.17.1_linux_arm64.tar.gz
index d840fa7..83b5698 100644
Binary files a/dist/docker-scout_0.17.0_linux_arm64.tar.gz and b/dist/docker-scout_0.17.1_linux_arm64.tar.gz differ
diff --git a/dist/docker-scout_0.17.0_windows_amd64.zip b/dist/docker-scout_0.17.1_windows_amd64.zip
similarity index 66%
rename from dist/docker-scout_0.17.0_windows_amd64.zip
rename to dist/docker-scout_0.17.1_windows_amd64.zip
index 817339c..4daefe2 100644
Binary files a/dist/docker-scout_0.17.0_windows_amd64.zip and b/dist/docker-scout_0.17.1_windows_amd64.zip differ
diff --git a/dist/docker-scout_0.17.0_windows_arm64.zip b/dist/docker-scout_0.17.1_windows_arm64.zip
similarity index 65%
rename from dist/docker-scout_0.17.0_windows_arm64.zip
rename to dist/docker-scout_0.17.1_windows_arm64.zip
index f95c4b1..f7a4a47 100644
Binary files a/dist/docker-scout_0.17.0_windows_arm64.zip and b/dist/docker-scout_0.17.1_windows_arm64.zip differ
diff --git a/docs/docker_scout_compare.yaml b/docs/docker_scout_compare.yaml
index 2847013..316e1a8 100644
--- a/docs/docker_scout_compare.yaml
+++ b/docs/docker_scout_compare.yaml
@@ -9,7 +9,7 @@ long: |-
The main usage is to compare two versions of the same image.
For instance when a new image is built and compared to the version running in production.
- If no image is specified, the most recently build image will be used.
+ If no image is specified, the most recently built image will be used.
The following artifact types are supported:
diff --git a/docs/docker_scout_cves.yaml b/docs/docker_scout_cves.yaml
index 1d3c23f..ee42536 100644
--- a/docs/docker_scout_cves.yaml
+++ b/docs/docker_scout_cves.yaml
@@ -3,7 +3,7 @@ short: Display CVEs identified in a software artifact
long: |-
The `docker scout cves` command analyzes a software artifact for vulnerabilities.
- If no image is specified, the most recently build image will be used.
+ If no image is specified, the most recently built image will be used.
The following artifact types are supported:
@@ -52,6 +52,7 @@ options:
Output format of the generated vulnerability report:
- packages: default output, plain text with vulnerabilities grouped by packages
- sarif: json Sarif output
+ - markdown: markdown output
deprecated: false
hidden: false
experimental: false
diff --git a/docs/docker_scout_quickview.yaml b/docs/docker_scout_quickview.yaml
index ed8391b..5b24c0c 100644
--- a/docs/docker_scout_quickview.yaml
+++ b/docs/docker_scout_quickview.yaml
@@ -6,7 +6,7 @@ long: |-
It displays a summary of the vulnerabilities in the image and the vulnerabilities from the base image.
If available it also displays base image refresh and update recommendations.
- If no image is specified, the most recently build image will be used.
+ If no image is specified, the most recently built image will be used.
usage: docker scout quickview [IMAGE|DIRECTORY|ARCHIVE]
pname: docker scout
plink: docker_scout.yaml
diff --git a/docs/docker_scout_recommendations.yaml b/docs/docker_scout_recommendations.yaml
index 0e19b90..1f695b6 100644
--- a/docs/docker_scout_recommendations.yaml
+++ b/docs/docker_scout_recommendations.yaml
@@ -5,7 +5,7 @@ long: |-
It analyzes the image and display recommendations to refresh or update the base image.
For each recommendation it shows a list of benefits like less vulnerabilities, smaller image, etc.
- If no image is specified, the most recently build image will be used.
+ If no image is specified, the most recently built image will be used.
The following artifact types are supported:
diff --git a/docs/docker_scout_repo_disable.yaml b/docs/docker_scout_repo_disable.yaml
index 0f0b493..601a2e9 100644
--- a/docs/docker_scout_repo_disable.yaml
+++ b/docs/docker_scout_repo_disable.yaml
@@ -2,9 +2,19 @@ command: docker scout repo disable
short: Disable Docker Scout
long: |
The docker scout repo disable command disables Docker Scout on repositories.
-usage: docker scout repo disable REPOSITORY
+usage: docker scout repo disable REPOSITORY|ORG
pname: docker scout repo
plink: docker_scout_repo.yaml
+options:
+ - option: filter
+ value_type: string
+ description: Regular expression to filter repositories by name
+ deprecated: false
+ hidden: false
+ experimental: false
+ experimentalcli: false
+ kubernetes: false
+ swarm: false
inherited_options:
- option: debug
value_type: bool
diff --git a/docs/docker_scout_repo_enable.yaml b/docs/docker_scout_repo_enable.yaml
index a558157..7abe655 100644
--- a/docs/docker_scout_repo_enable.yaml
+++ b/docs/docker_scout_repo_enable.yaml
@@ -1,9 +1,19 @@
command: docker scout repo enable
short: Enable Docker Scout
long: The docker scout repo enable command enables Docker Scout on repositories.
-usage: docker scout repo enable REPOSITORY
+usage: docker scout repo enable REPOSITORY|ORG
pname: docker scout repo
plink: docker_scout_repo.yaml
+options:
+ - option: filter
+ value_type: string
+ description: Regular expression to filter repositories by name
+ deprecated: false
+ hidden: false
+ experimental: false
+ experimentalcli: false
+ kubernetes: false
+ swarm: false
inherited_options:
- option: debug
value_type: bool
diff --git a/docs/docker_scout_sbom.yaml b/docs/docker_scout_sbom.yaml
index 2402c73..624b168 100644
--- a/docs/docker_scout_sbom.yaml
+++ b/docs/docker_scout_sbom.yaml
@@ -5,7 +5,7 @@ long: |-
The SBOM can be used to list all packages, or the ones from a specific type (as dep, maven, etc).
- If no image is specified, the most recently build image will be used.
+ If no image is specified, the most recently built image will be used.
The following artifact types are supported:
diff --git a/docs/scout_compare.md b/docs/scout_compare.md
index 0cfa942..880d8c0 100644
--- a/docs/scout_compare.md
+++ b/docs/scout_compare.md
@@ -41,7 +41,7 @@ The `docker scout compare` command analyzes two images and displays a comparison
The main usage is to compare two versions of the same image.
For instance when a new image is built and compared to the version running in production.
-If no image is specified, the most recently build image will be used.
+If no image is specified, the most recently built image will be used.
The following artifact types are supported:
diff --git a/docs/scout_cves.md b/docs/scout_cves.md
index 419af39..6458b9d 100644
--- a/docs/scout_cves.md
+++ b/docs/scout_cves.md
@@ -9,22 +9,22 @@ Display CVEs identified in a software artifact
### Options
-| Name | Type | Default | Description |
-|:----------------------|:--------------|:-----------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| `--details` | | | Print details on default text output |
-| `-e`, `--exit-code` | | | Return exit code '2' if vulnerabilities are detected |
-| `--format` | `string` | `packages` | Output format of the generated vulnerability report:
- packages: default output, plain text with vulnerabilities grouped by packages
- sarif: json Sarif output
|
-| `--ignore-base` | | | Filter out CVEs introduced from base image |
-| `--locations` | | | Print package locations including file paths and layer diff_id |
-| `--only-cve-id` | `stringSlice` | | Comma separated list of CVE ids (like CVE-2021-45105) to search for |
-| `--only-fixed` | | | Filter to fixable CVEs |
-| `--only-package-type` | `stringSlice` | | Comma separated list of package types (like apk, deb, rpm, npm, pypi, golang, etc) |
-| `--only-severity` | `stringSlice` | | Comma separated list of severities (critical, high, medium, low, unspecified) to filter CVEs by |
-| `--only-unfixed` | | | Filter to unfixed CVEs |
-| `-o`, `--output` | `string` | | Write the report to a file. |
-| `--platform` | `string` | | Platform of image to analyze |
-| `--ref` | `string` | | Reference to use if the provided tarball contains multiple references.
Can only be used with --type archive. |
-| `--type` | `string` | `image` | Type of the image to analyze. Can be one of:
- image
- oci-dir
- archive (docker save tarball)
|
+| Name | Type | Default | Description |
+|:----------------------|:--------------|:-----------|:---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| `--details` | | | Print details on default text output |
+| `-e`, `--exit-code` | | | Return exit code '2' if vulnerabilities are detected |
+| `--format` | `string` | `packages` | Output format of the generated vulnerability report:
- packages: default output, plain text with vulnerabilities grouped by packages
- sarif: json Sarif output
- markdown: markdown output
|
+| `--ignore-base` | | | Filter out CVEs introduced from base image |
+| `--locations` | | | Print package locations including file paths and layer diff_id |
+| `--only-cve-id` | `stringSlice` | | Comma separated list of CVE ids (like CVE-2021-45105) to search for |
+| `--only-fixed` | | | Filter to fixable CVEs |
+| `--only-package-type` | `stringSlice` | | Comma separated list of package types (like apk, deb, rpm, npm, pypi, golang, etc) |
+| `--only-severity` | `stringSlice` | | Comma separated list of severities (critical, high, medium, low, unspecified) to filter CVEs by |
+| `--only-unfixed` | | | Filter to unfixed CVEs |
+| `-o`, `--output` | `string` | | Write the report to a file. |
+| `--platform` | `string` | | Platform of image to analyze |
+| `--ref` | `string` | | Reference to use if the provided tarball contains multiple references.
Can only be used with --type archive. |
+| `--type` | `string` | `image` | Type of the image to analyze. Can be one of:
- image
- oci-dir
- archive (docker save tarball)
|
@@ -33,7 +33,7 @@ Display CVEs identified in a software artifact
The `docker scout cves` command analyzes a software artifact for vulnerabilities.
-If no image is specified, the most recently build image will be used.
+If no image is specified, the most recently built image will be used.
The following artifact types are supported:
diff --git a/docs/scout_quickview.md b/docs/scout_quickview.md
index c56e1b7..ef40473 100644
--- a/docs/scout_quickview.md
+++ b/docs/scout_quickview.md
@@ -25,7 +25,7 @@ The `docker scout quickview` command displays a quick overview of an image.
It displays a summary of the vulnerabilities in the image and the vulnerabilities from the base image.
If available it also displays base image refresh and update recommendations.
-If no image is specified, the most recently build image will be used.
+If no image is specified, the most recently built image will be used.
## Examples
diff --git a/docs/scout_recommendations.md b/docs/scout_recommendations.md
index a153df3..c86436c 100644
--- a/docs/scout_recommendations.md
+++ b/docs/scout_recommendations.md
@@ -24,7 +24,7 @@ The `docker scout recommendations` command display recommendations for base imag
It analyzes the image and display recommendations to refresh or update the base image.
For each recommendation it shows a list of benefits like less vulnerabilities, smaller image, etc.
-If no image is specified, the most recently build image will be used.
+If no image is specified, the most recently built image will be used.
The following artifact types are supported:
diff --git a/docs/scout_repo_disable.md b/docs/scout_repo_disable.md
index 15d60b2..43e520e 100644
--- a/docs/scout_repo_disable.md
+++ b/docs/scout_repo_disable.md
@@ -3,6 +3,12 @@
Disable Docker Scout
+### Options
+
+| Name | Type | Default | Description |
+|:-----------|:---------|:--------|:--------------------------------------------------|
+| `--filter` | `string` | | Regular expression to filter repositories by name |
+
diff --git a/docs/scout_repo_enable.md b/docs/scout_repo_enable.md
index 4dfa372..1e459ba 100644
--- a/docs/scout_repo_enable.md
+++ b/docs/scout_repo_enable.md
@@ -3,6 +3,12 @@
Enable Docker Scout
+### Options
+
+| Name | Type | Default | Description |
+|:-----------|:---------|:--------|:--------------------------------------------------|
+| `--filter` | `string` | | Regular expression to filter repositories by name |
+
diff --git a/docs/scout_sbom.md b/docs/scout_sbom.md
index 5e09efd..660caa0 100644
--- a/docs/scout_sbom.md
+++ b/docs/scout_sbom.md
@@ -23,7 +23,7 @@ The `docker scout sbom` command analyzes a software artifact to generate the cor
The SBOM can be used to list all packages, or the ones from a specific type (as dep, maven, etc).
-If no image is specified, the most recently build image will be used.
+If no image is specified, the most recently built image will be used.
The following artifact types are supported: