Files
trivy/integration/standalone_tar_test.go
2025-11-17 07:23:43 +00:00

682 lines
16 KiB
Go

//go:build integration
package integration
import (
"os"
"path/filepath"
"strings"
"testing"
"github.com/stretchr/testify/require"
ftypes "github.com/aquasecurity/trivy/pkg/fanal/types"
"github.com/aquasecurity/trivy/pkg/types"
)
// TestTar tests `trivy image --input` with tar archives of container images.
//
// NOTE: This test CAN update golden files with the -update flag.
// This is the canonical source for container image scanning golden files.
// Golden files generated here may be shared with other tests like TestClientServer,
// TestDockerEngine, TestRegistry, and TestClientServerWithRedis (when scanning images).
func TestTar(t *testing.T) {
type args struct {
IgnoreUnfixed bool
Severity []string
IgnoreIDs []string
Format types.Format
Input string
SkipDirs []string
SkipFiles []string
DetectionPriority ftypes.DetectionPriority
}
tests := []struct {
name string
args args
golden string
}{
{
name: "alpine 3.9",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/alpine-39.tar.gz",
},
golden: goldenAlpine39,
},
{
name: "alpine 3.9 with skip dirs",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/alpine-39.tar.gz",
SkipDirs: []string{
"/etc",
},
},
golden: goldenAlpine39Skip,
},
{
name: "alpine 3.9 with skip files",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/alpine-39.tar.gz",
SkipFiles: []string{
"/etc",
"/etc/TZ",
"/etc/alpine-release",
"/etc/apk",
"/etc/apk/arch",
"/etc/apk/keys",
"/etc/apk/keys/alpine-devel@lists.alpinelinux.org-4a6a0840.rsa.pub",
"/etc/apk/keys/alpine-devel@lists.alpinelinux.org-5243ef4b.rsa.pub",
"/etc/apk/keys/alpine-devel@lists.alpinelinux.org-5261cecb.rsa.pub",
"/etc/apk/protected_paths.d",
"/etc/apk/repositories",
"/etc/apk/world",
"/etc/conf.d",
"/etc/crontabs",
"/etc/crontabs/root",
"/etc/fstab",
"/etc/group",
"/etc/hostname",
"/etc/hosts",
"/etc/init.d",
"/etc/inittab",
"/etc/issue",
"/etc/logrotate.d",
"/etc/logrotate.d/acpid",
"/etc/modprobe.d",
"/etc/modprobe.d/aliases.conf",
"/etc/modprobe.d/blacklist.conf",
"/etc/modprobe.d/i386.conf",
"/etc/modprobe.d/kms.conf",
"/etc/modules",
"/etc/modules-load.d",
"/etc/motd",
"/etc/mtab",
"/etc/network",
"/etc/network/if-down.d",
"/etc/network/if-post-down.d",
"/etc/network/if-post-up.d",
"/etc/network/if-pre-down.d",
"/etc/network/if-pre-up.d",
"/etc/network/if-up.d",
"/etc/network/if-up.d/dad",
"/etc/opt",
"/etc/os-release",
"/etc/passwd",
"/etc/periodic",
"/etc/periodic/15min",
"/etc/periodic/daily",
"/etc/periodic/hourly",
"/etc/periodic/monthly",
"/etc/periodic/weekly",
"/etc/profile",
"/etc/profile.d",
"/etc/profile.d/color_prompt",
"/etc/protocols",
"/etc/securetty",
"/etc/services",
"/etc/shadow",
"/etc/shells",
"/etc/ssl",
"/etc/ssl/cert.pem",
"/etc/ssl/certs",
"/etc/ssl/ct_log_list.cnf",
"/etc/ssl/ct_log_list.cnf.dist",
"/etc/ssl/misc",
"/etc/ssl/misc/CA.pl",
"/etc/ssl/misc/tsget",
"/etc/ssl/misc/tsget.pl",
"/etc/ssl/openssl.cnf",
"/etc/ssl/openssl.cnf.dist",
"/etc/ssl/private",
"/etc/sysctl.conf",
"/etc/sysctl.d",
"/etc/sysctl.d/00-alpine.conf",
"/etc/udhcpd.conf",
},
},
golden: goldenAlpine39Skip,
},
{
name: "alpine 3.9 with high and critical severity",
args: args{
IgnoreUnfixed: true,
Severity: []string{
"HIGH",
"CRITICAL",
},
Format: types.FormatJSON,
Input: "testdata/fixtures/images/alpine-39.tar.gz",
},
golden: goldenAlpine39HighCritical,
},
{
name: "alpine 3.9 with .trivyignore",
args: args{
IgnoreUnfixed: false,
IgnoreIDs: []string{
"CVE-2019-1549",
"CVE-2019-14697",
},
Format: types.FormatJSON,
Input: "testdata/fixtures/images/alpine-39.tar.gz",
},
golden: goldenAlpine39IgnoreCVEIDs,
},
{
name: "alpine 3.10",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/alpine-310.tar.gz",
},
golden: goldenAlpine310JSON,
},
{
name: "alpine distroless",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/alpine-distroless.tar.gz",
},
golden: goldenAlpineDistroless,
},
{
name: "amazon linux 1",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/amazon-1.tar.gz",
},
golden: goldenAmazon1,
},
{
name: "amazon linux 2",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/amazon-2.tar.gz",
},
golden: goldenAmazon2,
},
{
name: "debian buster/10",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/debian-buster.tar.gz",
},
golden: goldenDebianBuster,
},
{
name: "debian buster/10 with --ignore-unfixed option",
args: args{
IgnoreUnfixed: true,
Format: types.FormatJSON,
Input: "testdata/fixtures/images/debian-buster.tar.gz",
},
golden: goldenDebianBusterIgnoreUnfixed,
},
{
name: "debian stretch/9",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/debian-stretch.tar.gz",
},
golden: goldenDebianStretch,
},
{
name: "ubuntu 18.04",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/ubuntu-1804.tar.gz",
},
golden: goldenUbuntu1804,
},
{
name: "ubuntu 18.04 with --ignore-unfixed option",
args: args{
IgnoreUnfixed: true,
Format: types.FormatJSON,
Input: "testdata/fixtures/images/ubuntu-1804.tar.gz",
},
golden: goldenUbuntu1804IgnoreUnfixed,
},
{
name: "centos 7",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/centos-7.tar.gz",
},
golden: goldenCentOS7,
},
{
name: "centos 7 with --ignore-unfixed option",
args: args{
IgnoreUnfixed: true,
Format: types.FormatJSON,
Input: "testdata/fixtures/images/centos-7.tar.gz",
},
golden: goldenCentOS7IgnoreUnfixed,
},
{
name: "centos 7 with medium severity",
args: args{
IgnoreUnfixed: true,
Severity: []string{"MEDIUM"},
Format: types.FormatJSON,
Input: "testdata/fixtures/images/centos-7.tar.gz",
},
golden: goldenCentOS7Medium,
},
{
name: "centos 6",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/centos-6.tar.gz",
},
golden: goldenCentOS6,
},
{
name: "ubi 7",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/ubi-7.tar.gz",
},
golden: goldenUBI7,
},
{
name: "ubi 7 with comprehensive priority",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/ubi-7.tar.gz",
DetectionPriority: ftypes.PriorityComprehensive,
},
golden: goldenUBI7Comprehensive,
},
{
name: "almalinux 8",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/almalinux-8.tar.gz",
},
golden: goldenAlmaLinux8,
},
{
name: "rocky linux 8",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/rockylinux-8.tar.gz",
},
golden: goldenRockyLinux8,
},
{
name: "distroless base",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/distroless-base.tar.gz",
},
golden: goldenDistrolessBase,
},
{
name: "distroless python27",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/distroless-python27.tar.gz",
},
golden: goldenDistrolessPython27,
},
{
name: "oracle linux 8",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/oraclelinux-8.tar.gz",
},
golden: goldenOracleLinux8,
},
{
name: "opensuse leap 15.1",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/opensuse-leap-151.tar.gz",
},
golden: goldenOpenSUSELeap151,
},
{
name: "opensuse tumbleweed",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/opensuse-tumbleweed.tar.gz",
},
golden: goldenOpenSUSETumbleweed,
},
{
name: "sle micro rancher 5.4",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/sle-micro-rancher-5.4_ndb.tar.gz",
},
golden: goldenSLMicroRancher54,
},
{
name: "photon 3.0",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/photon-30.tar.gz",
},
golden: goldenPhoton30,
},
{
name: "CBL-Mariner 1.0",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/mariner-1.0.tar.gz",
},
golden: goldenMariner10,
},
{
name: "busybox with Cargo.lock integration",
args: args{
Format: types.FormatJSON,
Input: "testdata/fixtures/images/busybox-with-lockfile.tar.gz",
},
golden: goldenBusyboxWithLockfile,
},
{
name: "fluentd with RubyGems",
args: args{
IgnoreUnfixed: true,
Format: types.FormatJSON,
Input: "testdata/fixtures/images/fluentd-multiple-lockfiles.tar.gz",
},
golden: goldenFluentdGems,
},
}
// Set up testing DB
cacheDir := initDB(t)
// Set a temp dir so that modules will not be loaded
t.Setenv("XDG_DATA_HOME", cacheDir)
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
osArgs := []string{
"--cache-dir",
cacheDir,
"image",
"-q",
"--format",
string(tt.args.Format),
"--skip-db-update",
"--list-all-pkgs=false",
}
if tt.args.IgnoreUnfixed {
osArgs = append(osArgs, "--ignore-unfixed")
}
if len(tt.args.Severity) != 0 {
osArgs = append(osArgs, "--severity", strings.Join(tt.args.Severity, ","))
}
if len(tt.args.IgnoreIDs) != 0 {
trivyIgnore := ".trivyignore"
err := os.WriteFile(trivyIgnore, []byte(strings.Join(tt.args.IgnoreIDs, "\n")), 0o444)
require.NoError(t, err, "failed to write .trivyignore")
defer os.Remove(trivyIgnore)
}
if tt.args.Input != "" {
osArgs = append(osArgs, "--input", tt.args.Input)
}
if len(tt.args.SkipFiles) != 0 {
for _, skipFile := range tt.args.SkipFiles {
osArgs = append(osArgs, "--skip-files", skipFile)
}
}
if len(tt.args.SkipDirs) != 0 {
for _, skipDir := range tt.args.SkipDirs {
osArgs = append(osArgs, "--skip-dirs", skipDir)
}
}
if tt.args.DetectionPriority != "" {
osArgs = append(osArgs, "--detection-priority", string(tt.args.DetectionPriority))
}
// Run Trivy
runTest(t, osArgs, tt.golden, tt.args.Format, runOptions{
fakeUUID: "3ff14136-e09f-4df9-80ea-%012d",
override: nil, // Do not use overrides - golden files are generated from this test as the canonical source
})
})
}
}
// TestTarWithOverride tests container image scanning with overrides applied.
//
// Golden files are shared with TestTar.
func TestTarWithOverride(t *testing.T) {
if *update {
t.Skipf("Skipping TestTarWithOverride when -update flag is set. Golden files should be updated via TestTar.")
}
type args struct {
input string
distro string
}
tests := []struct {
name string
args args
golden string
override OverrideFunc
}{
{
name: "alpine 3.9 as alpine 3.10",
args: args{
input: "testdata/fixtures/images/alpine-39.tar.gz",
distro: "alpine/3.10",
},
override: func(_ *testing.T, want, _ *types.Report) {
want.Metadata.OS.Name = "3.10"
want.Results[0].Target = "testdata/fixtures/images/alpine-39.tar.gz (alpine 3.10)"
},
golden: goldenAlpine39,
},
}
// Set up testing DB
cacheDir := initDB(t)
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
osArgs := []string{
"--cache-dir",
cacheDir,
"image",
"--format",
"json",
"--skip-db-update",
"--list-all-pkgs=false",
"--input",
tt.args.input,
}
if tt.args.distro != "" {
osArgs = append(osArgs, "--distro", tt.args.distro)
}
// Run Trivy
runTest(t, osArgs, tt.golden, types.FormatJSON, runOptions{
fakeUUID: "3ff14136-e09f-4df9-80ea-%012d",
override: overrideFuncs(overrideUID, overrideFingerprint, tt.override),
})
})
}
}
// TestTarWithEnv tests container image scanning with environment variables.
//
// Golden files are shared with TestTar.
func TestTarWithEnv(t *testing.T) {
if *update {
t.Skipf("Skipping TestTarWithEnv when -update flag is set. Golden files should be updated via TestTar.")
}
type args struct {
IgnoreUnfixed bool
Severity []string
Format string
Input string
SkipDirs []string
}
tests := []struct {
name string
testArgs args
golden string
}{
{
name: "alpine 3.9 with skip dirs",
testArgs: args{
Format: "json",
Input: "testdata/fixtures/images/alpine-39.tar.gz",
SkipDirs: []string{
"/etc",
},
},
golden: goldenAlpine39Skip,
},
{
name: "alpine 3.9 with high and critical severity",
testArgs: args{
IgnoreUnfixed: true,
Severity: []string{
"HIGH",
"CRITICAL",
},
Format: "json",
Input: "testdata/fixtures/images/alpine-39.tar.gz",
},
golden: goldenAlpine39HighCritical,
},
{
name: "debian buster/10 with --ignore-unfixed option",
testArgs: args{
IgnoreUnfixed: true,
Format: "json",
Input: "testdata/fixtures/images/debian-buster.tar.gz",
},
golden: goldenDebianBusterIgnoreUnfixed,
},
}
// Set up testing DB
cacheDir := initDB(t)
// Set a temp dir so that modules will not be loaded
t.Setenv("XDG_DATA_HOME", cacheDir)
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
t.Setenv("TRIVY_FORMAT", tt.testArgs.Format)
t.Setenv("TRIVY_LIST_ALL_PKGS", "false")
t.Setenv("TRIVY_CACHE_DIR", cacheDir)
t.Setenv("TRIVY_QUIET", "true")
t.Setenv("TRIVY_SKIP_UPDATE", "true")
if tt.testArgs.IgnoreUnfixed {
t.Setenv("TRIVY_IGNORE_UNFIXED", "true")
}
if len(tt.testArgs.Severity) != 0 {
t.Setenv("TRIVY_SEVERITY", strings.Join(tt.testArgs.Severity, ","))
}
if tt.testArgs.Input != "" {
t.Setenv("TRIVY_INPUT", tt.testArgs.Input)
}
if len(tt.testArgs.SkipDirs) != 0 {
t.Setenv("TRIVY_SKIP_DIRS", strings.Join(tt.testArgs.SkipDirs, ","))
}
// Run Trivy
runTest(t, []string{"image"}, tt.golden, types.FormatJSON, runOptions{
fakeUUID: "3ff14136-e09f-4df9-80ea-%012d",
})
})
}
}
// TestTarWithConfigFile tests container image scanning with config files.
//
// Golden files are shared with TestTar.
func TestTarWithConfigFile(t *testing.T) {
if *update {
t.Skipf("Skipping TestTarWithConfigFile when -update flag is set. Golden files should be updated via TestTar.")
}
tests := []struct {
name string
input string
configFile string
golden string
}{
{
name: "alpine 3.9 with high and critical severity",
input: "testdata/fixtures/images/alpine-39.tar.gz",
configFile: `quiet: true
format: json
list-all-pkgs: false
severity:
- HIGH
- CRITICAL
vulnerability:
type:
- os
cache:
dir: /should/be/overwritten
`,
golden: goldenAlpine39HighCritical,
},
{
name: "debian buster/10 with --ignore-unfixed option",
input: "testdata/fixtures/images/debian-buster.tar.gz",
configFile: `quiet: true
format: json
list-all-pkgs: false
vulnerability:
ignore-unfixed: true
cache:
dir: /should/be/overwritten
`,
golden: goldenDebianBusterIgnoreUnfixed,
},
}
// Set up testing DB
cacheDir := initDB(t)
// Set a temp dir so that modules will not be loaded
t.Setenv("XDG_DATA_HOME", cacheDir)
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
configPath := filepath.Join(t.TempDir(), "trivy.yaml")
err := os.WriteFile(configPath, []byte(tt.configFile), 0o600)
require.NoError(t, err)
osArgs := []string{
"--cache-dir",
cacheDir,
"image",
"--skip-db-update",
"--config",
configPath,
"--input",
tt.input,
}
// Run Trivy
runTest(t, osArgs, tt.golden, types.FormatJSON, runOptions{
fakeUUID: "3ff14136-e09f-4df9-80ea-%012d",
})
})
}
}