2020-11-26 10:13:37 +01:00
|
|
|
Test 10-02 Trivy scan a image with vulnerability
|
2017-12-14 03:53:42 +01:00
|
|
|
=======
|
|
|
|
|
|
|
|
# Purpose:
|
2020-11-26 10:13:37 +01:00
|
|
|
To verify that trivy can scan a image with vulnerability.
|
2017-12-14 03:53:42 +01:00
|
|
|
|
|
|
|
# References:
|
|
|
|
User guide
|
|
|
|
|
|
|
|
# Environment:
|
|
|
|
* This test requires that a Harbor instance is running and available.
|
2020-11-26 10:13:37 +01:00
|
|
|
* Harbor is installed with trivy enable.
|
2017-12-14 03:53:42 +01:00
|
|
|
* A linux host with Docker CLI installed.
|
2020-11-26 10:13:37 +01:00
|
|
|
* Trivy has been updated to the latest.
|
2017-12-14 03:53:42 +01:00
|
|
|
|
|
|
|
# Test Step
|
|
|
|
1. Login Harbor as admin.
|
|
|
|
2. Push an image with vulnerability.
|
|
|
|
3. Scan the image.
|
|
|
|
4. Click tag link enter detail page.
|
|
|
|
5. Rescan the image.
|
|
|
|
|
|
|
|
# Expected Outcome:
|
|
|
|
* Step3 should exist result summary chart.
|
|
|
|
* Step4 should see cve link and detail is match with summary in step3.
|
|
|
|
* Step4 cve link should clickable.
|
|
|
|
* Step5 rescan should successful.
|
|
|
|
|
|
|
|
# Possible Problems:
|
|
|
|
None
|