@@ -180,16 +180,16 @@ according to your preferences.
180180 You can specify a specific path to these binaries, and others by settings the following parameters as environment
181181 variables or system properties:
182182
183- * ` EXHORT_SYFT_PATH ` : Specify the absolute path of ` syft ` executable.
184- * ` EXHORT_SYFT_CONFIG_PATH ` : Specify the absolute path to the Syft configuration file.
185- * ` EXHORT_SKOPEO_PATH ` : Specify the absolute path of ` skopeo ` executable.
186- * ` EXHORT_SKOPEO_CONFIG_PATH ` : Specify the absolute path to the authentication file used by the ` skopeo inspect `
183+ * ` TRUSTIFY_DA_SYFT_PATH ` : Specify the absolute path of ` syft ` executable.
184+ * ` TRUSTIFY_DA_SYFT_CONFIG_PATH ` : Specify the absolute path to the Syft configuration file.
185+ * ` TRUSTIFY_DA_SKOPEO_PATH ` : Specify the absolute path of ` skopeo ` executable.
186+ * ` TRUSTIFY_DA_SKOPEO_CONFIG_PATH ` : Specify the absolute path to the authentication file used by the ` skopeo inspect `
187187 command.
188- * ` EXHORT_DOCKER_PATH ` : Specify the absolute path of ` docker ` executable.
189- * ` EXHORT_PODMAN_PATH ` : Specify the absolute path of ` podman ` executable.
190- * ` EXHORT_IMAGE_PLATFORM ` : Specify the platform used for multi-arch images.
191- * ` EXHORT_MVN_USER_SETTINGS ` : Specify the absolute path to the Maven user settings file.
192- * ` EXHORT_MVN_LOCAL_REPO ` : Specify the absolute path to the Maven local repository.
188+ * ` TRUSTIFY_DA_DOCKER_PATH ` : Specify the absolute path of ` docker ` executable.
189+ * ` TRUSTIFY_DA_PODMAN_PATH ` : Specify the absolute path of ` podman ` executable.
190+ * ` TRUSTIFY_DA_IMAGE_PLATFORM ` : Specify the platform used for multi-arch images.
191+ * ` TRUSTIFY_DA_MVN_USER_SETTINGS ` : Specify the absolute path to the Maven user settings file.
192+ * ` TRUSTIFY_DA_MVN_LOCAL_REPO ` : Specify the absolute path to the Maven local repository.
193193
194194 ![ Animated screenshot showing the inline reporting feature of Image Analysis ] ( src/main/resources/images/image-analysis.gif )
195195
@@ -239,20 +239,20 @@ When modifying the grammar or lexer files, you need to regenerate the parser cla
239239- Comments and complex shell commands
240240- Comprehensive syntax error handling
241241
242- - ** Excluding dependencies with ` exhortignore ` **
242+ - ** Excluding dependencies with ` trustify-da-ignore ` **
243243 <br >You can exclude a package from analysis by marking the package for exclusion.
244- If you want to ignore vulnerabilities for a dependency in a ` pom.xml ` file, you must add ` exhortignore ` as a comment
244+ If you want to ignore vulnerabilities for a dependency in a ` pom.xml ` file, you must add ` trustify-da-ignore ` as a comment
245245 against the dependency, group id, artifact id, or version scopes of that particular dependency in the manifest file.
246246 For example:
247247 ``` xml
248- <dependency > <!-- exhortignore -->
248+ <dependency > <!-- trustify-da-ignore -->
249249 <groupId >...</groupId >
250250 <artifactId >...</artifactId >
251251 <version >...</version >
252252 </dependency >
253253 ```
254254
255- If you want to ignore vulnerabilities for a dependency in a ` package.json ` file, you must add ` exhortignore ` as a
255+ If you want to ignore vulnerabilities for a dependency in a ` package.json ` file, you must add ` trustify-da-ignore ` as a
256256 attribute-value pair.
257257 For example:
258258 ``` json
@@ -270,33 +270,33 @@ When modifying the grammar or lexer files, you need to regenerate the parser cla
270270 "jsonwebtoken" : " ^8.5.1" ,
271271 "mongoose" : " ^5.9.18"
272272 },
273- "exhortignore " : [
273+ "trustify-da-ignore " : [
274274 " jsonwebtoken"
275275 ]
276276 }
277277 ```
278278
279- If you want to ignore vulnerabilities for a dependency in a ` go.mod ` file, you must add ` exhortignore ` as a comment
279+ If you want to ignore vulnerabilities for a dependency in a ` go.mod ` file, you must add ` trustify-da-ignore ` as a comment
280280 against the dependency in the manifest file.
281281 For example:
282282 ``` text
283283 require (
284- golang.org/x/sys v1.6.7 // exhortignore
284+ golang.org/x/sys v1.6.7 // trustify-da-ignore
285285 )
286286 ```
287287
288- If you want to ignore vulnerabilities for a dependency in a ` requirements.txt ` file, you must add ` exhortignore ` as a
288+ If you want to ignore vulnerabilities for a dependency in a ` requirements.txt ` file, you must add ` trustify-da-ignore ` as a
289289 comment against the dependency in the manifest file.
290290 For example:
291291 ``` text
292- requests==2.28.1 # exhortignore
292+ requests==2.28.1 # trustify-da-ignore
293293 ```
294- If you want to ignore vulnerabilities for a dependency in a ` build.gradle ` file, you must add ` exhortignore ` as a
294+ If you want to ignore vulnerabilities for a dependency in a ` build.gradle ` file, you must add ` trustify-da-ignore ` as a
295295 comment against the dependency in the manifest file.
296296 For example:
297297 ``` text
298- implementation "log4j:log4j:1.2.17" // exhortignore
299- implementation group: 'log4j', name: 'log4j', version: '1.2.17' // exhortignore
298+ implementation "log4j:log4j:1.2.17" // trustify-da-ignore
299+ implementation group: 'log4j', name: 'log4j', version: '1.2.17' // trustify-da-ignore
300300 ```
301301
302302- ** Excluding developmental or test dependencies**
0 commit comments