mirror of
https://github.com/goharbor/harbor.git
synced 2024-12-01 22:54:20 +01:00
dfe360040b
* addition * attribute * auditing * availability * available * bandwidth * browser * business * cadence * chartmuseum * client * column * content * demonstrate * described * endpoints * facilitate * github * harbor * information * instance * manual * meaningful * operation * overridden * password * possible * project * refactor * replication * requires * running * scanned * settings * signup * those * unsigned * vulnerability -- Also removes trailing space from a filename Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
27 lines
710 B
Markdown
27 lines
710 B
Markdown
10-07 user fix vulnerability
|
|
=======
|
|
# Purpose:
|
|
To test trivy scan image vulnerability correct after user fix it.
|
|
|
|
# Reference:
|
|
User guide.
|
|
|
|
# Environment:
|
|
* This test requires that one Harbor instance is running and available.
|
|
* Harbor is installed with trivy enable.
|
|
* A Linux host with Docker client installed.
|
|
* Trivy has been updated to the latest.
|
|
|
|
# Test Steps:
|
|
1. Login Harbor as admin.
|
|
2. Push some images with vulnerability.
|
|
3. Scan an image with vulnerability and record the result.
|
|
4. Upgrade the image to fix vulnerability.
|
|
5. Rescan the same image and check the result.
|
|
|
|
# Expect Outcome:
|
|
* Step5 number of vulnerability should less than step3.
|
|
|
|
# Possible Problem:
|
|
None
|