harbor/tests/testcases/Group10-Vulnerability/10-11-User-fix-vulnerability.md
Josh Soref dfe360040b Spelling
* addition
* attribute
* auditing
* availability
* available
* bandwidth
* browser
* business
* cadence
* chartmuseum
* client
* column
* content
* demonstrate
* described
* endpoints
* facilitate
* github
* harbor
* information
* instance
* manual
* meaningful
* operation
* overridden
* password
* possible
* project
* refactor
* replication
* requires
* running
* scanned
* settings
* signup
* those
* unsigned
* vulnerability

--
Also removes trailing space from a filename

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
2021-02-19 11:59:15 +08:00

27 lines
710 B
Markdown

10-07 user fix vulnerability
=======
# Purpose:
To test trivy scan image vulnerability correct after user fix it.
# Reference:
User guide.
# Environment:
* This test requires that one Harbor instance is running and available.
* Harbor is installed with trivy enable.
* A Linux host with Docker client installed.
* Trivy has been updated to the latest.
# Test Steps:
1. Login Harbor as admin.
2. Push some images with vulnerability.
3. Scan an image with vulnerability and record the result.
4. Upgrade the image to fix vulnerability.
5. Rescan the same image and check the result.
# Expect Outcome:
* Step5 number of vulnerability should less than step3.
# Possible Problem:
None