diff --git a/utils/cliutils/commandsflags.go b/utils/cliutils/commandsflags.go index a5fe38b87..ee924443e 100644 --- a/utils/cliutils/commandsflags.go +++ b/utils/cliutils/commandsflags.go @@ -483,6 +483,7 @@ const ( ExclusionsAudit = auditPrefix + exclusions repoPath = "repo-path" licenses = "licenses" + useTar = "tar" vuln = "vuln" ExtendedTable = "extended-table" MinSeverity = "min-severity" @@ -1380,6 +1381,10 @@ var flagsMap = map[string]cli.Flag{ Name: licenses, Usage: "[Default: false] Set to true if you'd like to receive licenses from Xray scanning.` `", }, + useTar: cli.BoolFlag{ + Name: useTar, + Usage: "[Default: false] Set to true to force request docker scan on a .tar file instead of an image.` `", + }, vuln: cli.BoolFlag{ Name: vuln, Usage: "[Default: false] Set to true if you'd like to receive an additional view of all vulnerabilities, regardless of the policy configured in Xray. Ignored if provided 'format' is 'sarif'.` `", @@ -1818,7 +1823,7 @@ var commandFlags = map[string][]string{ }, Docker: { buildName, buildNumber, module, Project, - serverId, skipLogin, threads, detailedSummary, watches, repoPath, licenses, xrOutput, fail, ExtendedTable, BypassArchiveLimits, MinSeverity, FixableOnly, + serverId, skipLogin, threads, detailedSummary, watches, repoPath, licenses, useTar, xrOutput, fail, ExtendedTable, BypassArchiveLimits, MinSeverity, FixableOnly, }, DockerPush: { buildName, buildNumber, module, Project,