>>> trivy: Building testing/trivy 0.24.1-r0 (using abuild 3.9.0-r0) started Tue, 01 Mar 2022 00:54:43 +0000 >>> trivy: Checking sanity of /home/buildozer/aports/testing/trivy/APKBUILD... >>> trivy: Analyzing dependencies... >>> trivy: Installing for build: build-base btrfs-progs-dev go linux-headers lvm2-dev (1/17) Installing linux-headers (5.16.7-r1) (2/17) Installing btrfs-progs-libs (5.16.2-r0) (3/17) Installing btrfs-progs-dev (5.16.2-r0) (4/17) Installing binutils-gold (2.38-r0) (5/17) Installing go (1.17.7-r0) (6/17) Installing device-mapper-libs (2.02.187-r2) (7/17) Installing device-mapper-event-libs (2.02.187-r2) (8/17) Installing libaio (0.3.112-r1) (9/17) Installing libblkid (2.37.4-r1) (10/17) Installing lvm2-libs (2.02.187-r2) (11/17) Installing libuuid (2.37.4-r1) (12/17) Installing libfdisk (2.37.4-r1) (13/17) Installing libmount (2.37.4-r1) (14/17) Installing libsmartcols (2.37.4-r1) (15/17) Installing util-linux-dev (2.37.4-r1) (16/17) Installing lvm2-dev (2.02.187-r2) (17/17) Installing .makedepends-trivy (20220301.005444) Executing busybox-1.35.0-r3.trigger OK: 741 MiB in 108 packages >>> trivy: Cleaning up srcdir >>> trivy: Cleaning up pkgdir >>> trivy: Fetching https://distfiles.alpinelinux.org/distfiles/edge/trivy-0.24.1.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 146 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 >>> trivy: Fetching https://github.com/aquasecurity/trivy/archive/v0.24.1/trivy-0.24.1.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 137 100 137 0 0 206 0 --:--:-- --:--:-- --:--:-- 206 100 99753 0 99753 0 0 60690 0 --:--:-- 0:00:01 --:--:-- 60690 100 6329k 0 6329k 0 0 2698k 0 --:--:-- 0:00:02 --:--:-- 8890k >>> trivy: Fetching https://distfiles.alpinelinux.org/distfiles/edge/trivy-0.24.1.tar.gz >>> trivy: Checking sha512sums... trivy-0.24.1.tar.gz: OK >>> trivy: Unpacking /var/cache/distfiles/edge/trivy-0.24.1.tar.gz... go build -ldflags "-s -w -X=main.version=0.24.1" ./cmd/trivy go: downloading github.com/aquasecurity/fanal v0.0.0-20220225095822-ef150f781751 go: downloading github.com/aquasecurity/go-dep-parser v0.0.0-20220224134419-e4f58c60089e go test -v -short -coverprofile=coverage.txt -covermode=atomic ./... ? github.com/aquasecurity/trivy/cmd/trivy [no test files] ? github.com/aquasecurity/trivy/misc/eol [no test files] === RUN TestRemoteCache_PutArtifact === RUN TestRemoteCache_PutArtifact/happy_path === RUN TestRemoteCache_PutArtifact/sad_path === RUN TestRemoteCache_PutArtifact/sad_path:_invalid_token --- PASS: TestRemoteCache_PutArtifact (0.00s) --- PASS: TestRemoteCache_PutArtifact/happy_path (0.00s) --- PASS: TestRemoteCache_PutArtifact/sad_path (0.00s) --- PASS: TestRemoteCache_PutArtifact/sad_path:_invalid_token (0.00s) === RUN TestRemoteCache_PutBlob === RUN TestRemoteCache_PutBlob/happy_path === RUN TestRemoteCache_PutBlob/sad_path === RUN TestRemoteCache_PutBlob/sad_path:_invalid_token --- PASS: TestRemoteCache_PutBlob (0.00s) --- PASS: TestRemoteCache_PutBlob/happy_path (0.00s) --- PASS: TestRemoteCache_PutBlob/sad_path (0.00s) --- PASS: TestRemoteCache_PutBlob/sad_path:_invalid_token (0.00s) === RUN TestRemoteCache_MissingBlobs === RUN TestRemoteCache_MissingBlobs/happy_path === RUN TestRemoteCache_MissingBlobs/sad_path === RUN TestRemoteCache_MissingBlobs/sad_path_with_invalid_token --- PASS: TestRemoteCache_MissingBlobs (0.00s) --- PASS: TestRemoteCache_MissingBlobs/happy_path (0.00s) --- PASS: TestRemoteCache_MissingBlobs/sad_path (0.00s) --- PASS: TestRemoteCache_MissingBlobs/sad_path_with_invalid_token (0.00s) === RUN TestRemoteCache_PutArtifactInsecure === RUN TestRemoteCache_PutArtifactInsecure/happy_path === RUN TestRemoteCache_PutArtifactInsecure/sad_path 2022/03/01 00:55:01 http: TLS handshake error from 127.0.0.1:40944: remote error: tls: bad certificate --- PASS: TestRemoteCache_PutArtifactInsecure (0.03s) --- PASS: TestRemoteCache_PutArtifactInsecure/happy_path (0.01s) --- PASS: TestRemoteCache_PutArtifactInsecure/sad_path (0.02s) PASS coverage: 100.0% of statements ok github.com/aquasecurity/trivy/pkg/cache 0.095s coverage: 100.0% of statements === RUN Test_showVersion === RUN Test_showVersion/happy_path,_table_output === RUN Test_showVersion/happy_path,_JSON_output === RUN Test_showVersion/sad_path,_no_DB_is_available === RUN Test_showVersion/sad_path,_bogus_cache_dir --- PASS: Test_showVersion (0.00s) --- PASS: Test_showVersion/happy_path,_table_output (0.00s) --- PASS: Test_showVersion/happy_path,_JSON_output (0.00s) --- PASS: Test_showVersion/sad_path,_no_DB_is_available (0.00s) --- PASS: Test_showVersion/sad_path,_bogus_cache_dir (0.00s) === RUN TestNewCommands --- PASS: TestNewCommands (0.00s) PASS coverage: 80.5% of statements ok github.com/aquasecurity/trivy/pkg/commands 0.113s coverage: 80.5% of statements === RUN TestOption_Init === RUN TestOption_Init/happy_path === RUN TestOption_Init/config_scanning === RUN TestOption_Init/happy_path:_reset === RUN TestOption_Init/happy_path_with_an_unknown_severity === RUN TestOption_Init/invalid_option_combination:_--template_enabled_without_--format === RUN TestOption_Init/invalid_option_combination:_--template_and_--format_json === RUN TestOption_Init/invalid_option_combination:_--format_template_without_--template === RUN TestOption_Init/sad:_skip_and_download_db === RUN TestOption_Init/sad:_multiple_image_names --- PASS: TestOption_Init (0.00s) --- PASS: TestOption_Init/happy_path (0.00s) --- PASS: TestOption_Init/config_scanning (0.00s) --- PASS: TestOption_Init/happy_path:_reset (0.00s) --- PASS: TestOption_Init/happy_path_with_an_unknown_severity (0.00s) --- PASS: TestOption_Init/invalid_option_combination:_--template_enabled_without_--format (0.00s) --- PASS: TestOption_Init/invalid_option_combination:_--template_and_--format_json (0.00s) --- PASS: TestOption_Init/invalid_option_combination:_--format_template_without_--template (0.00s) --- PASS: TestOption_Init/sad:_skip_and_download_db (0.00s) --- PASS: TestOption_Init/sad:_multiple_image_names (0.00s) PASS coverage: 8.5% of statements ok github.com/aquasecurity/trivy/pkg/commands/artifact 0.076s coverage: 8.5% of statements === RUN TestConfig_Init === RUN TestConfig_Init/happy_path === RUN TestConfig_Init/config_scanning === RUN TestConfig_Init/happy_path_with_token_and_token_header === RUN TestConfig_Init/happy_path_with_good_custom_headers === RUN TestConfig_Init/happy_path_with_bad_custom_headers === RUN TestConfig_Init/happy_path_with_an_unknown_severity === RUN TestConfig_Init/invalid_option_combination:_--template_enabled_without_--format === RUN TestConfig_Init/invalid_option_combination:_--template_and_--format_json === RUN TestConfig_Init/invalid_option_combination:_--format_template_without_--template === RUN TestConfig_Init/invalid_option_combination:_--format_template_without_--template#01 === RUN TestConfig_Init/sad:_multiple_image_names --- PASS: TestConfig_Init (0.00s) --- PASS: TestConfig_Init/happy_path (0.00s) --- PASS: TestConfig_Init/config_scanning (0.00s) --- PASS: TestConfig_Init/happy_path_with_token_and_token_header (0.00s) --- PASS: TestConfig_Init/happy_path_with_good_custom_headers (0.00s) --- PASS: TestConfig_Init/happy_path_with_bad_custom_headers (0.00s) --- PASS: TestConfig_Init/happy_path_with_an_unknown_severity (0.00s) --- PASS: TestConfig_Init/invalid_option_combination:_--template_enabled_without_--format (0.00s) --- PASS: TestConfig_Init/invalid_option_combination:_--template_and_--format_json (0.00s) --- PASS: TestConfig_Init/invalid_option_combination:_--format_template_without_--template (0.00s) --- PASS: TestConfig_Init/invalid_option_combination:_--format_template_without_--template#01 (0.00s) --- PASS: TestConfig_Init/sad:_multiple_image_names (0.00s) === RUN Test_splitCustomHeaders === RUN Test_splitCustomHeaders/happy_path --- PASS: Test_splitCustomHeaders (0.00s) --- PASS: Test_splitCustomHeaders/happy_path (0.00s) PASS coverage: 14.9% of statements ok github.com/aquasecurity/trivy/pkg/commands/client 0.077s coverage: 14.9% of statements ? github.com/aquasecurity/trivy/pkg/commands/operation [no test files] === RUN TestReportReportConfig_Init === RUN TestReportReportConfig_Init/happy_path === RUN TestReportReportConfig_Init/happy_path_with_an_unknown_severity === RUN TestReportReportConfig_Init/happy_path_with_an_cyclonedx === RUN TestReportReportConfig_Init/happy_path_with_an_cyclonedx_option_list-all-pkgs_is_false === RUN TestReportReportConfig_Init/invalid_option_combination:_--template_enabled_without_--format === RUN TestReportReportConfig_Init/invalid_option_combination:_--template_and_--format_json === RUN TestReportReportConfig_Init/invalid_option_combination:_--format_template_without_--template === RUN TestReportReportConfig_Init/invalid_option_combination:_--list-all-pkgs_with_--format_table --- PASS: TestReportReportConfig_Init (0.00s) --- PASS: TestReportReportConfig_Init/happy_path (0.00s) --- PASS: TestReportReportConfig_Init/happy_path_with_an_unknown_severity (0.00s) --- PASS: TestReportReportConfig_Init/happy_path_with_an_cyclonedx (0.00s) --- PASS: TestReportReportConfig_Init/happy_path_with_an_cyclonedx_option_list-all-pkgs_is_false (0.00s) --- PASS: TestReportReportConfig_Init/invalid_option_combination:_--template_enabled_without_--format (0.00s) --- PASS: TestReportReportConfig_Init/invalid_option_combination:_--template_and_--format_json (0.00s) --- PASS: TestReportReportConfig_Init/invalid_option_combination:_--format_template_without_--template (0.00s) --- PASS: TestReportReportConfig_Init/invalid_option_combination:_--list-all-pkgs_with_--format_table (0.00s) === RUN TestArtifactOption_Init === RUN TestArtifactOption_Init/happy_path === RUN TestArtifactOption_Init/sad:_multiple_image_names --- PASS: TestArtifactOption_Init (0.00s) --- PASS: TestArtifactOption_Init/happy_path (0.00s) --- PASS: TestArtifactOption_Init/sad:_multiple_image_names (0.00s) === RUN TestNewCacheOption === RUN TestNewCacheOption/happy_path === RUN TestNewCacheOption/default --- PASS: TestNewCacheOption (0.00s) --- PASS: TestNewCacheOption/happy_path (0.00s) --- PASS: TestNewCacheOption/default (0.00s) === RUN TestCacheOption_Init === RUN TestCacheOption_Init/fs === RUN TestCacheOption_Init/redis === RUN TestCacheOption_Init/sad_path --- PASS: TestCacheOption_Init (0.00s) --- PASS: TestCacheOption_Init/fs (0.00s) --- PASS: TestCacheOption_Init/redis (0.00s) --- PASS: TestCacheOption_Init/sad_path (0.00s) === RUN TestNewDBOption === RUN TestNewDBOption/happy_path --- PASS: TestNewDBOption (0.00s) --- PASS: TestNewDBOption/happy_path (0.00s) === RUN TestDBOption_Init === RUN TestDBOption_Init/happy_path 2022-03-01T00:55:00.982Z WARN '--light' option is deprecated and will be removed. See also: https://github.com/aquasecurity/trivy/discussions/1649 === RUN TestDBOption_Init/sad_path --- PASS: TestDBOption_Init (0.00s) --- PASS: TestDBOption_Init/happy_path (0.00s) --- PASS: TestDBOption_Init/sad_path (0.00s) === RUN TestNewGlobalConfig === RUN TestNewGlobalConfig/happy_path --- PASS: TestNewGlobalConfig (0.00s) --- PASS: TestNewGlobalConfig/happy_path (0.00s) PASS coverage: 78.6% of statements ok github.com/aquasecurity/trivy/pkg/commands/option 0.027s coverage: 78.6% of statements ? github.com/aquasecurity/trivy/pkg/commands/plugin [no test files] === RUN TestNew === RUN TestNew/happy_path --- PASS: TestNew (0.00s) --- PASS: TestNew/happy_path (0.00s) === RUN TestConfig_Init === RUN TestConfig_Init/happy_path === RUN TestConfig_Init/happy_path:_reset === RUN TestConfig_Init/sad:_skip_and_download_db --- PASS: TestConfig_Init (0.00s) --- PASS: TestConfig_Init/happy_path (0.00s) --- PASS: TestConfig_Init/happy_path:_reset (0.00s) --- PASS: TestConfig_Init/sad:_skip_and_download_db (0.00s) PASS coverage: 21.4% of statements ok github.com/aquasecurity/trivy/pkg/commands/server 0.074s coverage: 21.4% of statements === RUN TestClient_NeedsUpdate === RUN TestClient_NeedsUpdate/happy_path === RUN TestClient_NeedsUpdate/happy_path_for_first_run === RUN TestClient_NeedsUpdate/happy_path_with_old_schema_version === RUN TestClient_NeedsUpdate/happy_path_with_--skip-update === RUN TestClient_NeedsUpdate/skip_downloading_DB === RUN TestClient_NeedsUpdate/newer_schema_version 2022-03-01T00:55:01.468Z ERROR Trivy version (test) is old. Update to the latest version. === RUN TestClient_NeedsUpdate/--skip-update_on_the_first_run 2022-03-01T00:55:01.469Z ERROR The first run cannot skip downloading DB === RUN TestClient_NeedsUpdate/--skip-update_with_different_schema_version 2022-03-01T00:55:01.469Z ERROR The local DB has an old schema version which is not supported by the current version of Trivy CLI. It needs to be updated. === RUN TestClient_NeedsUpdate/happy_with_old_DownloadedAt === RUN TestClient_NeedsUpdate/skip_downloading_DB_with_recent_DownloadedAt --- PASS: TestClient_NeedsUpdate (0.01s) --- PASS: TestClient_NeedsUpdate/happy_path (0.00s) --- PASS: TestClient_NeedsUpdate/happy_path_for_first_run (0.00s) --- PASS: TestClient_NeedsUpdate/happy_path_with_old_schema_version (0.00s) --- PASS: TestClient_NeedsUpdate/happy_path_with_--skip-update (0.00s) --- PASS: TestClient_NeedsUpdate/skip_downloading_DB (0.00s) --- PASS: TestClient_NeedsUpdate/newer_schema_version (0.00s) --- PASS: TestClient_NeedsUpdate/--skip-update_on_the_first_run (0.00s) --- PASS: TestClient_NeedsUpdate/--skip-update_with_different_schema_version (0.00s) --- PASS: TestClient_NeedsUpdate/happy_with_old_DownloadedAt (0.00s) --- PASS: TestClient_NeedsUpdate/skip_downloading_DB_with_recent_DownloadedAt (0.00s) === RUN TestClient_Download === RUN TestClient_Download/happy_path === RUN TestClient_Download/invalid_gzip --- PASS: TestClient_Download (0.01s) --- PASS: TestClient_Download/happy_path (0.00s) --- PASS: TestClient_Download/invalid_gzip (0.00s) PASS coverage: 53.6% of statements ok github.com/aquasecurity/trivy/pkg/db 0.057s coverage: 53.6% of statements ? github.com/aquasecurity/trivy/pkg/dbtest [no test files] === RUN TestDriver_Detect === RUN TestDriver_Detect/happy_path === RUN TestDriver_Detect/non-prefixed_buckets === RUN TestDriver_Detect/no_patched_versions_in_the_advisory === RUN TestDriver_Detect/no_vulnerable_versions_in_the_advisory === RUN TestDriver_Detect/no_vulnerability === RUN TestDriver_Detect/malformed_JSON --- PASS: TestDriver_Detect (0.03s) --- PASS: TestDriver_Detect/happy_path (0.01s) --- PASS: TestDriver_Detect/non-prefixed_buckets (0.00s) --- PASS: TestDriver_Detect/no_patched_versions_in_the_advisory (0.00s) --- PASS: TestDriver_Detect/no_vulnerable_versions_in_the_advisory (0.00s) --- PASS: TestDriver_Detect/no_vulnerability (0.00s) --- PASS: TestDriver_Detect/malformed_JSON (0.00s) PASS coverage: 48.3% of statements ok github.com/aquasecurity/trivy/pkg/detector/library 0.058s coverage: 48.3% of statements === RUN TestGenericComparer_IsVulnerable === RUN TestGenericComparer_IsVulnerable/happy_path === RUN TestGenericComparer_IsVulnerable/no_patch === RUN TestGenericComparer_IsVulnerable/pre-release === RUN TestGenericComparer_IsVulnerable/multiple_constraints === RUN TestGenericComparer_IsVulnerable/invalid_version 2022-03-01T00:55:00.612Z WARN version error (1.2..4): malformed version: 1.2..4 === RUN TestGenericComparer_IsVulnerable/improper_constraint 2022-03-01T00:55:00.612Z WARN constraint error (1.2.3): improper constraint: * === RUN TestGenericComparer_IsVulnerable/empty_patched_version === RUN TestGenericComparer_IsVulnerable/empty_vulnerable_&_patched_version --- PASS: TestGenericComparer_IsVulnerable (0.00s) --- PASS: TestGenericComparer_IsVulnerable/happy_path (0.00s) --- PASS: TestGenericComparer_IsVulnerable/no_patch (0.00s) --- PASS: TestGenericComparer_IsVulnerable/pre-release (0.00s) --- PASS: TestGenericComparer_IsVulnerable/multiple_constraints (0.00s) --- PASS: TestGenericComparer_IsVulnerable/invalid_version (0.00s) --- PASS: TestGenericComparer_IsVulnerable/improper_constraint (0.00s) --- PASS: TestGenericComparer_IsVulnerable/empty_patched_version (0.00s) --- PASS: TestGenericComparer_IsVulnerable/empty_vulnerable_&_patched_version (0.00s) PASS coverage: 89.3% of statements ok github.com/aquasecurity/trivy/pkg/detector/library/compare 0.026s coverage: 89.3% of statements === RUN TestComparer_IsVulnerable === RUN TestComparer_IsVulnerable/happy_path === RUN TestComparer_IsVulnerable/final_release === RUN TestComparer_IsVulnerable/pre-release === RUN TestComparer_IsVulnerable/multiple_constraints === RUN TestComparer_IsVulnerable/version_requirements === RUN TestComparer_IsVulnerable/version_soft_requirements_happy === RUN TestComparer_IsVulnerable/version_soft_requirements === RUN TestComparer_IsVulnerable/invalid_constraint 2022-03-01T00:55:00.829Z WARN maven constraint error (<1.0\.0): failed to new comparer: 2 errors occurred: * improper constraint: <1.0\.0 * improper requirements: [] --- PASS: TestComparer_IsVulnerable (0.00s) --- PASS: TestComparer_IsVulnerable/happy_path (0.00s) --- PASS: TestComparer_IsVulnerable/final_release (0.00s) --- PASS: TestComparer_IsVulnerable/pre-release (0.00s) --- PASS: TestComparer_IsVulnerable/multiple_constraints (0.00s) --- PASS: TestComparer_IsVulnerable/version_requirements (0.00s) --- PASS: TestComparer_IsVulnerable/version_soft_requirements_happy (0.00s) --- PASS: TestComparer_IsVulnerable/version_soft_requirements (0.00s) --- PASS: TestComparer_IsVulnerable/invalid_constraint (0.00s) PASS coverage: 87.5% of statements ok github.com/aquasecurity/trivy/pkg/detector/library/compare/maven 0.024s coverage: 87.5% of statements === RUN TestNpmComparer_IsVulnerable === RUN TestNpmComparer_IsVulnerable/happy_path === RUN TestNpmComparer_IsVulnerable/no_patch === RUN TestNpmComparer_IsVulnerable/no_patch_with_wildcard === RUN TestNpmComparer_IsVulnerable/pre-release === RUN TestNpmComparer_IsVulnerable/multiple_constraints === RUN TestNpmComparer_IsVulnerable/x === RUN TestNpmComparer_IsVulnerable/exact_versions === RUN TestNpmComparer_IsVulnerable/caret === RUN TestNpmComparer_IsVulnerable/invalid_version 2022-03-01T00:55:00.731Z WARN npm version error (1.2..4): invalid semantic version === RUN TestNpmComparer_IsVulnerable/invalid_constraint 2022-03-01T00:55:00.731Z WARN npm constraint error (!1.0.0): improper constraint: !1.0.0 --- PASS: TestNpmComparer_IsVulnerable (0.00s) --- PASS: TestNpmComparer_IsVulnerable/happy_path (0.00s) --- PASS: TestNpmComparer_IsVulnerable/no_patch (0.00s) --- PASS: TestNpmComparer_IsVulnerable/no_patch_with_wildcard (0.00s) --- PASS: TestNpmComparer_IsVulnerable/pre-release (0.00s) --- PASS: TestNpmComparer_IsVulnerable/multiple_constraints (0.00s) --- PASS: TestNpmComparer_IsVulnerable/x (0.00s) --- PASS: TestNpmComparer_IsVulnerable/exact_versions (0.00s) --- PASS: TestNpmComparer_IsVulnerable/caret (0.00s) --- PASS: TestNpmComparer_IsVulnerable/invalid_version (0.00s) --- PASS: TestNpmComparer_IsVulnerable/invalid_constraint (0.00s) PASS coverage: 100.0% of statements ok github.com/aquasecurity/trivy/pkg/detector/library/compare/npm 0.039s coverage: 100.0% of statements === RUN TestPep440Comparer_IsVulnerable === RUN TestPep440Comparer_IsVulnerable/happy_path === RUN TestPep440Comparer_IsVulnerable/no_patch === RUN TestPep440Comparer_IsVulnerable/no_patch_with_wildcard === RUN TestPep440Comparer_IsVulnerable/pre-release === RUN TestPep440Comparer_IsVulnerable/multiple_constraints === RUN TestPep440Comparer_IsVulnerable/exact_versions === RUN TestPep440Comparer_IsVulnerable/invalid_version 2022-03-01T00:55:00.798Z WARN python version error (1.2..4): malformed version: 1.2..4 === RUN TestPep440Comparer_IsVulnerable/invalid_constraint 2022-03-01T00:55:00.798Z WARN python constraint error (!1.0.0): improper constraint: !1.0.0 --- PASS: TestPep440Comparer_IsVulnerable (0.00s) --- PASS: TestPep440Comparer_IsVulnerable/happy_path (0.00s) --- PASS: TestPep440Comparer_IsVulnerable/no_patch (0.00s) --- PASS: TestPep440Comparer_IsVulnerable/no_patch_with_wildcard (0.00s) --- PASS: TestPep440Comparer_IsVulnerable/pre-release (0.00s) --- PASS: TestPep440Comparer_IsVulnerable/multiple_constraints (0.00s) --- PASS: TestPep440Comparer_IsVulnerable/exact_versions (0.00s) --- PASS: TestPep440Comparer_IsVulnerable/invalid_version (0.00s) --- PASS: TestPep440Comparer_IsVulnerable/invalid_constraint (0.00s) PASS coverage: 100.0% of statements ok github.com/aquasecurity/trivy/pkg/detector/library/compare/pep440 0.042s coverage: 100.0% of statements === RUN TestRubyGemsComparer_IsVulnerable === RUN TestRubyGemsComparer_IsVulnerable/happy_path === RUN TestRubyGemsComparer_IsVulnerable/pre-release === RUN TestRubyGemsComparer_IsVulnerable/pre-release_without_dot === RUN TestRubyGemsComparer_IsVulnerable/hyphen === RUN TestRubyGemsComparer_IsVulnerable/pessimistic === RUN TestRubyGemsComparer_IsVulnerable/invalid_version 2022-03-01T00:55:00.788Z WARN RubyGems version error (1.2..4): invalid gem version === RUN TestRubyGemsComparer_IsVulnerable/invalid_constraint 2022-03-01T00:55:00.789Z WARN RubyGems constraint error (!1.2.0): improper constraint: !1.2.0 --- PASS: TestRubyGemsComparer_IsVulnerable (0.00s) --- PASS: TestRubyGemsComparer_IsVulnerable/happy_path (0.00s) --- PASS: TestRubyGemsComparer_IsVulnerable/pre-release (0.00s) --- PASS: TestRubyGemsComparer_IsVulnerable/pre-release_without_dot (0.00s) --- PASS: TestRubyGemsComparer_IsVulnerable/hyphen (0.00s) --- PASS: TestRubyGemsComparer_IsVulnerable/pessimistic (0.00s) --- PASS: TestRubyGemsComparer_IsVulnerable/invalid_version (0.00s) --- PASS: TestRubyGemsComparer_IsVulnerable/invalid_constraint (0.00s) PASS coverage: 100.0% of statements ok github.com/aquasecurity/trivy/pkg/detector/library/compare/rubygems 0.032s coverage: 100.0% of statements ? github.com/aquasecurity/trivy/pkg/detector/ospkg [no test files] === RUN TestScanner_Detect === RUN TestScanner_Detect/happy_path 2022-03-01T00:55:00.758Z INFO Detecting AlmaLinux vulnerabilities... === RUN TestScanner_Detect/skip_modular_package 2022-03-01T00:55:00.767Z INFO Detecting AlmaLinux vulnerabilities... 2022-03-01T00:55:00.767Z INFO Skipped detection of these packages: ["nginx"] because modular packages cannot be detected correctly due to a bug in AlmaLinux. See also: https://bugs.almalinux.org/view.php?id=173 === RUN TestScanner_Detect/Get_returns_an_error 2022-03-01T00:55:00.774Z INFO Detecting AlmaLinux vulnerabilities... --- PASS: TestScanner_Detect (0.08s) --- PASS: TestScanner_Detect/happy_path (0.05s) --- PASS: TestScanner_Detect/skip_modular_package (0.01s) --- PASS: TestScanner_Detect/Get_returns_an_error (0.02s) === RUN TestScanner_IsSupportedVersion === RUN TestScanner_IsSupportedVersion/alma_8.4 === RUN TestScanner_IsSupportedVersion/alma_8.4_with_EOL === RUN TestScanner_IsSupportedVersion/unknown 2022-03-01T00:55:00.790Z WARN This OS version is not on the EOL list: alma unknown --- PASS: TestScanner_IsSupportedVersion (0.00s) --- PASS: TestScanner_IsSupportedVersion/alma_8.4 (0.00s) --- PASS: TestScanner_IsSupportedVersion/alma_8.4_with_EOL (0.00s) --- PASS: TestScanner_IsSupportedVersion/unknown (0.00s) PASS coverage: 91.1% of statements ok github.com/aquasecurity/trivy/pkg/detector/ospkg/alma 0.104s coverage: 91.1% of statements === RUN TestScanner_Detect === RUN TestScanner_Detect/happy_path 2022-03-01T00:55:00.893Z INFO Detecting Alpine vulnerabilities... === RUN TestScanner_Detect/contain_rc 2022-03-01T00:55:00.897Z INFO Detecting Alpine vulnerabilities... === RUN TestScanner_Detect/contain_pre 2022-03-01T00:55:00.901Z INFO Detecting Alpine vulnerabilities... === RUN TestScanner_Detect/Get_returns_an_error 2022-03-01T00:55:00.907Z INFO Detecting Alpine vulnerabilities... --- PASS: TestScanner_Detect (0.02s) --- PASS: TestScanner_Detect/happy_path (0.01s) --- PASS: TestScanner_Detect/contain_rc (0.00s) --- PASS: TestScanner_Detect/contain_pre (0.00s) --- PASS: TestScanner_Detect/Get_returns_an_error (0.00s) === RUN TestScanner_IsSupportedVersion === RUN TestScanner_IsSupportedVersion/alpine_3.6 === RUN TestScanner_IsSupportedVersion/alpine_3.6_with_EOL === RUN TestScanner_IsSupportedVersion/alpine_3.9 === RUN TestScanner_IsSupportedVersion/alpine_3.10 === RUN TestScanner_IsSupportedVersion/unknown 2022-03-01T00:55:00.908Z WARN This OS version is not on the EOL list: alpine unknown --- PASS: TestScanner_IsSupportedVersion (0.00s) --- PASS: TestScanner_IsSupportedVersion/alpine_3.6 (0.00s) --- PASS: TestScanner_IsSupportedVersion/alpine_3.6_with_EOL (0.00s) --- PASS: TestScanner_IsSupportedVersion/alpine_3.9 (0.00s) --- PASS: TestScanner_IsSupportedVersion/alpine_3.10 (0.00s) --- PASS: TestScanner_IsSupportedVersion/unknown (0.00s) PASS coverage: 95.7% of statements ok github.com/aquasecurity/trivy/pkg/detector/ospkg/alpine 0.063s coverage: 95.7% of statements === RUN TestScanner_Detect === RUN TestScanner_Detect/amazon_linux_1 2022-03-01T00:55:00.878Z INFO Detecting Amazon Linux vulnerabilities... === RUN TestScanner_Detect/amazon_linux_2 2022-03-01T00:55:00.883Z INFO Detecting Amazon Linux vulnerabilities... === RUN TestScanner_Detect/empty_version 2022-03-01T00:55:00.887Z INFO Detecting Amazon Linux vulnerabilities... === RUN TestScanner_Detect/Get_returns_an_error 2022-03-01T00:55:00.891Z INFO Detecting Amazon Linux vulnerabilities... --- PASS: TestScanner_Detect (0.02s) --- PASS: TestScanner_Detect/amazon_linux_1 (0.01s) --- PASS: TestScanner_Detect/amazon_linux_2 (0.00s) --- PASS: TestScanner_Detect/empty_version (0.00s) --- PASS: TestScanner_Detect/Get_returns_an_error (0.00s) === RUN TestScanner_IsSupportedVersion === RUN TestScanner_IsSupportedVersion/amazon_linux_1 === RUN TestScanner_IsSupportedVersion/amazon_linux_1_EOL === RUN TestScanner_IsSupportedVersion/amazon_linux_2 --- PASS: TestScanner_IsSupportedVersion (0.00s) --- PASS: TestScanner_IsSupportedVersion/amazon_linux_1 (0.00s) --- PASS: TestScanner_IsSupportedVersion/amazon_linux_1_EOL (0.00s) --- PASS: TestScanner_IsSupportedVersion/amazon_linux_2 (0.00s) PASS coverage: 85.4% of statements ok github.com/aquasecurity/trivy/pkg/detector/ospkg/amazon 0.048s coverage: 85.4% of statements === RUN TestScanner_Detect === RUN TestScanner_Detect/happy_path 2022-03-01T00:55:00.817Z INFO Detecting Debian vulnerabilities... === RUN TestScanner_Detect/invalid_bucket 2022-03-01T00:55:00.823Z INFO Detecting Debian vulnerabilities... --- PASS: TestScanner_Detect (0.02s) --- PASS: TestScanner_Detect/happy_path (0.01s) --- PASS: TestScanner_Detect/invalid_bucket (0.00s) === RUN TestScanner_IsSupportedVersion === RUN TestScanner_IsSupportedVersion/debian_7 === RUN TestScanner_IsSupportedVersion/debian_8_EOL === RUN TestScanner_IsSupportedVersion/unknown 2022-03-01T00:55:00.825Z WARN This OS version is not on the EOL list: debian unknown --- PASS: TestScanner_IsSupportedVersion (0.00s) --- PASS: TestScanner_IsSupportedVersion/debian_7 (0.00s) --- PASS: TestScanner_IsSupportedVersion/debian_8_EOL (0.00s) --- PASS: TestScanner_IsSupportedVersion/unknown (0.00s) PASS coverage: 90.9% of statements ok github.com/aquasecurity/trivy/pkg/detector/ospkg/debian 0.037s coverage: 90.9% of statements === RUN TestScanner_Detect === RUN TestScanner_Detect/happy_path_1.0_SrcName_and_Name_are_different 2022-03-01T00:55:00.895Z INFO Detecting CBL-Mariner vulnerabilities... === RUN TestScanner_Detect/happy_path_2.0 2022-03-01T00:55:00.899Z INFO Detecting CBL-Mariner vulnerabilities... === RUN TestScanner_Detect/broken_advisory 2022-03-01T00:55:00.902Z INFO Detecting CBL-Mariner vulnerabilities... --- PASS: TestScanner_Detect (0.01s) --- PASS: TestScanner_Detect/happy_path_1.0_SrcName_and_Name_are_different (0.01s) --- PASS: TestScanner_Detect/happy_path_2.0 (0.00s) --- PASS: TestScanner_Detect/broken_advisory (0.00s) PASS coverage: 91.7% of statements ok github.com/aquasecurity/trivy/pkg/detector/ospkg/mariner 0.041s coverage: 91.7% of statements === RUN TestScanner_IsSupportedVersion === RUN TestScanner_IsSupportedVersion/oracle5 === RUN TestScanner_IsSupportedVersion/oracle6 === RUN TestScanner_IsSupportedVersion/oracle7.6 === RUN TestScanner_IsSupportedVersion/oracle8-same-time === RUN TestScanner_IsSupportedVersion/oracle3 === RUN TestScanner_IsSupportedVersion/oracle4 === RUN TestScanner_IsSupportedVersion/oracle7 === RUN TestScanner_IsSupportedVersion/oracle8 === RUN TestScanner_IsSupportedVersion/unknown 2022-03-01T00:55:00.790Z WARN This OS version is not on the EOL list: oracle unknown --- PASS: TestScanner_IsSupportedVersion (0.00s) --- PASS: TestScanner_IsSupportedVersion/oracle5 (0.00s) --- PASS: TestScanner_IsSupportedVersion/oracle6 (0.00s) --- PASS: TestScanner_IsSupportedVersion/oracle7.6 (0.00s) --- PASS: TestScanner_IsSupportedVersion/oracle8-same-time (0.00s) --- PASS: TestScanner_IsSupportedVersion/oracle3 (0.00s) --- PASS: TestScanner_IsSupportedVersion/oracle4 (0.00s) --- PASS: TestScanner_IsSupportedVersion/oracle7 (0.00s) --- PASS: TestScanner_IsSupportedVersion/oracle8 (0.00s) --- PASS: TestScanner_IsSupportedVersion/unknown (0.00s) === RUN TestScanner_Detect === RUN TestScanner_Detect/detected 2022-03-01T00:55:00.804Z INFO Detecting Oracle Linux vulnerabilities... === RUN TestScanner_Detect/without_ksplice 2022-03-01T00:55:00.817Z INFO Detecting Oracle Linux vulnerabilities... === RUN TestScanner_Detect/the_installed_version_has_ksplice2 2022-03-01T00:55:00.822Z INFO Detecting Oracle Linux vulnerabilities... === RUN TestScanner_Detect/with_ksplice 2022-03-01T00:55:00.827Z INFO Detecting Oracle Linux vulnerabilities... === RUN TestScanner_Detect/malformed 2022-03-01T00:55:00.831Z INFO Detecting Oracle Linux vulnerabilities... --- PASS: TestScanner_Detect (0.04s) --- PASS: TestScanner_Detect/detected (0.01s) --- PASS: TestScanner_Detect/without_ksplice (0.01s) --- PASS: TestScanner_Detect/the_installed_version_has_ksplice2 (0.00s) --- PASS: TestScanner_Detect/with_ksplice (0.00s) --- PASS: TestScanner_Detect/malformed (0.00s) PASS coverage: 97.1% of statements ok github.com/aquasecurity/trivy/pkg/detector/ospkg/oracle 0.062s coverage: 97.1% of statements === RUN TestScanner_Detect === RUN TestScanner_Detect/happy_path 2022-03-01T00:55:00.842Z INFO Detecting Photon Linux vulnerabilities... === RUN TestScanner_Detect/invalid_bucket 2022-03-01T00:55:00.846Z INFO Detecting Photon Linux vulnerabilities... --- PASS: TestScanner_Detect (0.01s) --- PASS: TestScanner_Detect/happy_path (0.01s) --- PASS: TestScanner_Detect/invalid_bucket (0.00s) === RUN TestScanner_IsSupportedVersion === RUN TestScanner_IsSupportedVersion/photon_1.0 === RUN TestScanner_IsSupportedVersion/photon_1.0_EOL === RUN TestScanner_IsSupportedVersion/unknown 2022-03-01T00:55:00.847Z WARN This OS version is not on the EOL list: photon unknown --- PASS: TestScanner_IsSupportedVersion (0.00s) --- PASS: TestScanner_IsSupportedVersion/photon_1.0 (0.00s) --- PASS: TestScanner_IsSupportedVersion/photon_1.0_EOL (0.00s) --- PASS: TestScanner_IsSupportedVersion/unknown (0.00s) PASS coverage: 100.0% of statements ok github.com/aquasecurity/trivy/pkg/detector/ospkg/photon 0.029s coverage: 100.0% of statements === RUN TestScanner_Detect === RUN TestScanner_Detect/happy_path 2022-03-01T00:55:00.961Z INFO Detecting RHEL/CentOS vulnerabilities... === RUN TestScanner_Detect/happy_path:_multiple_RHSA-IDs 2022-03-01T00:55:00.965Z INFO Detecting RHEL/CentOS vulnerabilities... === RUN TestScanner_Detect/no_build_info 2022-03-01T00:55:00.971Z INFO Detecting RHEL/CentOS vulnerabilities... === RUN TestScanner_Detect/modular_packages 2022-03-01T00:55:00.975Z INFO Detecting RHEL/CentOS vulnerabilities... === RUN TestScanner_Detect/packages_from_remi_repository_are_skipped 2022-03-01T00:55:00.977Z INFO Detecting RHEL/CentOS vulnerabilities... === RUN TestScanner_Detect/broken_value 2022-03-01T00:55:00.979Z INFO Detecting RHEL/CentOS vulnerabilities... --- PASS: TestScanner_Detect (0.02s) --- PASS: TestScanner_Detect/happy_path (0.01s) --- PASS: TestScanner_Detect/happy_path:_multiple_RHSA-IDs (0.00s) --- PASS: TestScanner_Detect/no_build_info (0.01s) --- PASS: TestScanner_Detect/modular_packages (0.00s) --- PASS: TestScanner_Detect/packages_from_remi_repository_are_skipped (0.00s) --- PASS: TestScanner_Detect/broken_value (0.00s) === RUN TestScanner_IsSupportedVersion === RUN TestScanner_IsSupportedVersion/centos_6 === RUN TestScanner_IsSupportedVersion/centos_6_EOL === RUN TestScanner_IsSupportedVersion/two_dots === RUN TestScanner_IsSupportedVersion/rhel_8 === RUN TestScanner_IsSupportedVersion/unknown 2022-03-01T00:55:00.980Z WARN This OS version is not on the EOL list: unknown 8 --- PASS: TestScanner_IsSupportedVersion (0.00s) --- PASS: TestScanner_IsSupportedVersion/centos_6 (0.00s) --- PASS: TestScanner_IsSupportedVersion/centos_6_EOL (0.00s) --- PASS: TestScanner_IsSupportedVersion/two_dots (0.00s) --- PASS: TestScanner_IsSupportedVersion/rhel_8 (0.00s) --- PASS: TestScanner_IsSupportedVersion/unknown (0.00s) PASS coverage: 98.7% of statements ok github.com/aquasecurity/trivy/pkg/detector/ospkg/redhat 0.039s coverage: 98.7% of statements === RUN TestScanner_Detect === RUN TestScanner_Detect/happy_path 2022-03-01T00:55:00.852Z INFO Detecting Rocky Linux vulnerabilities... === RUN TestScanner_Detect/skip_modular_package 2022-03-01T00:55:00.857Z INFO Detecting Rocky Linux vulnerabilities... 2022-03-01T00:55:00.857Z INFO Skipped detection of these packages: ["nginx"] because modular packages cannot be detected correctly due to a bug in Rocky Linux Errata. See also: https://forums.rockylinux.org/t/some-errata-missing-in-comparison-with-rhel-and-almalinux/3843 === RUN TestScanner_Detect/Get_returns_an_error 2022-03-01T00:55:00.863Z INFO Detecting Rocky Linux vulnerabilities... --- PASS: TestScanner_Detect (0.02s) --- PASS: TestScanner_Detect/happy_path (0.01s) --- PASS: TestScanner_Detect/skip_modular_package (0.00s) --- PASS: TestScanner_Detect/Get_returns_an_error (0.01s) === RUN TestScanner_IsSupportedVersion === RUN TestScanner_IsSupportedVersion/rocky_8.5 === RUN TestScanner_IsSupportedVersion/rocky_8.5_with_EOL === RUN TestScanner_IsSupportedVersion/unknown 2022-03-01T00:55:00.863Z WARN This OS version is not on the EOL list: rocky unknown --- PASS: TestScanner_IsSupportedVersion (0.00s) --- PASS: TestScanner_IsSupportedVersion/rocky_8.5 (0.00s) --- PASS: TestScanner_IsSupportedVersion/rocky_8.5_with_EOL (0.00s) --- PASS: TestScanner_IsSupportedVersion/unknown (0.00s) PASS coverage: 91.1% of statements ok github.com/aquasecurity/trivy/pkg/detector/ospkg/rocky 0.045s coverage: 91.1% of statements === RUN TestScanner_Detect === RUN TestScanner_Detect/happy_path 2022-03-01T00:55:00.805Z INFO Detecting SUSE vulnerabilities... === RUN TestScanner_Detect/broken_bucket 2022-03-01T00:55:00.817Z INFO Detecting SUSE vulnerabilities... --- PASS: TestScanner_Detect (0.04s) --- PASS: TestScanner_Detect/happy_path (0.03s) --- PASS: TestScanner_Detect/broken_bucket (0.01s) === RUN TestScanner_IsSupportedVersion === RUN TestScanner_IsSupportedVersion/opensuse.leap42.3 === RUN TestScanner_IsSupportedVersion/sles12.3 === RUN TestScanner_IsSupportedVersion/unknown 2022-03-01T00:55:00.818Z WARN This OS version is not on the EOL list: unknown unknown --- PASS: TestScanner_IsSupportedVersion (0.00s) --- PASS: TestScanner_IsSupportedVersion/opensuse.leap42.3 (0.00s) --- PASS: TestScanner_IsSupportedVersion/sles12.3 (0.00s) --- PASS: TestScanner_IsSupportedVersion/unknown (0.00s) PASS coverage: 97.2% of statements ok github.com/aquasecurity/trivy/pkg/detector/ospkg/suse 0.064s coverage: 97.2% of statements === RUN TestScanner_Detect === RUN TestScanner_Detect/happy_path 2022-03-01T00:55:00.885Z INFO Detecting Ubuntu vulnerabilities... === RUN TestScanner_Detect/broken_bucket 2022-03-01T00:55:00.889Z INFO Detecting Ubuntu vulnerabilities... --- PASS: TestScanner_Detect (0.01s) --- PASS: TestScanner_Detect/happy_path (0.01s) --- PASS: TestScanner_Detect/broken_bucket (0.00s) === RUN TestScanner_IsSupportedVersion === RUN TestScanner_IsSupportedVersion/ubuntu_12.04_eol_ends === RUN TestScanner_IsSupportedVersion/ubuntu12.04 === RUN TestScanner_IsSupportedVersion/unknown 2022-03-01T00:55:00.890Z WARN This OS version is not on the EOL list: ubuntu unknown --- PASS: TestScanner_IsSupportedVersion (0.00s) --- PASS: TestScanner_IsSupportedVersion/ubuntu_12.04_eol_ends (0.00s) --- PASS: TestScanner_IsSupportedVersion/ubuntu12.04 (0.00s) --- PASS: TestScanner_IsSupportedVersion/unknown (0.00s) PASS coverage: 88.9% of statements ok github.com/aquasecurity/trivy/pkg/detector/ospkg/ubuntu 0.056s coverage: 88.9% of statements ? github.com/aquasecurity/trivy/pkg/downloader [no test files] ? github.com/aquasecurity/trivy/pkg/log [no test files] === RUN TestNewArtifact === RUN TestNewArtifact/happy_path === RUN TestNewArtifact/sad:_two_layers === RUN TestNewArtifact/sad:_Layers_returns_an_error === RUN TestNewArtifact/sad:_media_type_doesn't_match --- PASS: TestNewArtifact (0.00s) --- PASS: TestNewArtifact/happy_path (0.00s) --- PASS: TestNewArtifact/sad:_two_layers (0.00s) --- PASS: TestNewArtifact/sad:_Layers_returns_an_error (0.00s) --- PASS: TestNewArtifact/sad:_media_type_doesn't_match (0.00s) === RUN TestArtifact_Download === RUN TestArtifact_Download/happy_path === RUN TestArtifact_Download/invalid_gzip --- PASS: TestArtifact_Download (0.02s) --- PASS: TestArtifact_Download/happy_path (0.00s) --- PASS: TestArtifact_Download/invalid_gzip (0.02s) PASS coverage: 70.6% of statements ok github.com/aquasecurity/trivy/pkg/oci 0.059s coverage: 70.6% of statements === RUN TestPlugin_Run === RUN TestPlugin_Run/happy_path foo === RUN TestPlugin_Run/no_selector foo === RUN TestPlugin_Run/no_matched_platform === RUN TestPlugin_Run/no_execution_file === RUN TestPlugin_Run/plugin_exec_error --- PASS: TestPlugin_Run (0.00s) --- PASS: TestPlugin_Run/happy_path (0.00s) --- PASS: TestPlugin_Run/no_selector (0.00s) --- PASS: TestPlugin_Run/no_matched_platform (0.00s) --- PASS: TestPlugin_Run/no_execution_file (0.00s) --- PASS: TestPlugin_Run/plugin_exec_error (0.00s) === RUN TestInstall === RUN TestInstall/happy_path === RUN TestInstall/plugin_not_found === RUN TestInstall/no_plugin.yaml --- PASS: TestInstall (0.00s) --- PASS: TestInstall/happy_path (0.00s) --- PASS: TestInstall/plugin_not_found (0.00s) --- PASS: TestInstall/no_plugin.yaml (0.00s) === RUN TestUninstall --- PASS: TestUninstall (0.00s) === RUN TestInformation --- PASS: TestInformation (0.00s) === RUN TestLoadAll1 === RUN TestLoadAll1/happy_path === RUN TestLoadAll1/sad_path --- PASS: TestLoadAll1 (0.00s) --- PASS: TestLoadAll1/happy_path (0.00s) --- PASS: TestLoadAll1/sad_path (0.00s) === RUN TestUpdate --- PASS: TestUpdate (0.00s) PASS coverage: 74.0% of statements ok github.com/aquasecurity/trivy/pkg/plugin 0.050s coverage: 74.0% of statements === RUN TestClient_LoadBuiltinPolicies === RUN TestClient_LoadBuiltinPolicies/happy_path === RUN TestClient_LoadBuiltinPolicies/empty_roots === RUN TestClient_LoadBuiltinPolicies/broken_manifest === RUN TestClient_LoadBuiltinPolicies/no_such_file --- PASS: TestClient_LoadBuiltinPolicies (0.00s) --- PASS: TestClient_LoadBuiltinPolicies/happy_path (0.00s) --- PASS: TestClient_LoadBuiltinPolicies/empty_roots (0.00s) --- PASS: TestClient_LoadBuiltinPolicies/broken_manifest (0.00s) --- PASS: TestClient_LoadBuiltinPolicies/no_such_file (0.00s) === RUN TestClient_NeedsUpdate === RUN TestClient_NeedsUpdate/recent_download === RUN TestClient_NeedsUpdate/same_digest === RUN TestClient_NeedsUpdate/different_digest === RUN TestClient_NeedsUpdate/sad:_Digest_returns__an_error === RUN TestClient_NeedsUpdate/sad:_non-existent_metadata === RUN TestClient_NeedsUpdate/sad:_broken_metadata 2022-03-01T00:55:01.497Z WARN Policy metadata decode error: json: cannot unmarshal string into Go value of type policy.Metadata --- PASS: TestClient_NeedsUpdate (0.01s) --- PASS: TestClient_NeedsUpdate/recent_download (0.00s) --- PASS: TestClient_NeedsUpdate/same_digest (0.00s) --- PASS: TestClient_NeedsUpdate/different_digest (0.00s) --- PASS: TestClient_NeedsUpdate/sad:_Digest_returns__an_error (0.00s) --- PASS: TestClient_NeedsUpdate/sad:_non-existent_metadata (0.00s) --- PASS: TestClient_NeedsUpdate/sad:_broken_metadata (0.00s) === RUN TestClient_DownloadBuiltinPolicies === RUN TestClient_DownloadBuiltinPolicies/happy_path === RUN TestClient_DownloadBuiltinPolicies/sad:_broken_layer === RUN TestClient_DownloadBuiltinPolicies/sad:_Digest_returns_an_error --- PASS: TestClient_DownloadBuiltinPolicies (0.00s) --- PASS: TestClient_DownloadBuiltinPolicies/happy_path (0.00s) --- PASS: TestClient_DownloadBuiltinPolicies/sad:_broken_layer (0.00s) --- PASS: TestClient_DownloadBuiltinPolicies/sad:_Digest_returns_an_error (0.00s) PASS coverage: 84.3% of statements ok github.com/aquasecurity/trivy/pkg/policy 0.061s coverage: 84.3% of statements === RUN TestNewPackageURL === RUN TestNewPackageURL/maven_package === RUN TestNewPackageURL/yarn_package === RUN TestNewPackageURL/yarn_package_with_non-namespace === RUN TestNewPackageURL/pypi_package === RUN TestNewPackageURL/composer_package === RUN TestNewPackageURL/golang_package === RUN TestNewPackageURL/os_package === RUN TestNewPackageURL/container === RUN TestNewPackageURL/container_local === RUN TestNewPackageURL/container_with_implicit_registry === RUN TestNewPackageURL/sad_path --- PASS: TestNewPackageURL (0.00s) --- PASS: TestNewPackageURL/maven_package (0.00s) --- PASS: TestNewPackageURL/yarn_package (0.00s) --- PASS: TestNewPackageURL/yarn_package_with_non-namespace (0.00s) --- PASS: TestNewPackageURL/pypi_package (0.00s) --- PASS: TestNewPackageURL/composer_package (0.00s) --- PASS: TestNewPackageURL/golang_package (0.00s) --- PASS: TestNewPackageURL/os_package (0.00s) --- PASS: TestNewPackageURL/container (0.00s) --- PASS: TestNewPackageURL/container_local (0.00s) --- PASS: TestNewPackageURL/container_with_implicit_registry (0.00s) --- PASS: TestNewPackageURL/sad_path (0.00s) PASS coverage: 81.0% of statements ok github.com/aquasecurity/trivy/pkg/purl 0.051s coverage: 81.0% of statements === RUN TestReportWriter_toSarifErrorLevel === RUN TestReportWriter_toSarifErrorLevel/CRITICAL === RUN TestReportWriter_toSarifErrorLevel/HIGH === RUN TestReportWriter_toSarifErrorLevel/MEDIUM === RUN TestReportWriter_toSarifErrorLevel/LOW === RUN TestReportWriter_toSarifErrorLevel/UNKNOWN === RUN TestReportWriter_toSarifErrorLevel/OTHER --- PASS: TestReportWriter_toSarifErrorLevel (0.00s) --- PASS: TestReportWriter_toSarifErrorLevel/CRITICAL (0.00s) --- PASS: TestReportWriter_toSarifErrorLevel/HIGH (0.00s) --- PASS: TestReportWriter_toSarifErrorLevel/MEDIUM (0.00s) --- PASS: TestReportWriter_toSarifErrorLevel/LOW (0.00s) --- PASS: TestReportWriter_toSarifErrorLevel/UNKNOWN (0.00s) --- PASS: TestReportWriter_toSarifErrorLevel/OTHER (0.00s) === RUN TestReportWriter_JSON === RUN TestReportWriter_JSON/happy_path --- PASS: TestReportWriter_JSON (0.00s) --- PASS: TestReportWriter_JSON/happy_path (0.00s) === RUN TestReportWriter_Sarif === RUN TestReportWriter_Sarif/report_with_vulnerabilities === RUN TestReportWriter_Sarif/report_with_misconfigurations === RUN TestReportWriter_Sarif/no_vulns --- PASS: TestReportWriter_Sarif (0.00s) --- PASS: TestReportWriter_Sarif/report_with_vulnerabilities (0.00s) --- PASS: TestReportWriter_Sarif/report_with_misconfigurations (0.00s) --- PASS: TestReportWriter_Sarif/no_vulns (0.00s) === RUN TestReportWriter_Table === RUN TestReportWriter_Table/happy_path_full test () ======= Total: 0 () === RUN TestReportWriter_Table/no_title_for_vuln_and_missing_primary_link test () ======= Total: 0 () === RUN TestReportWriter_Table/long_title_for_vuln test () ======= Total: 0 () === RUN TestReportWriter_Table/happy_path_misconfigurations test () ======= Total: 0 () === RUN TestReportWriter_Table/happy_path_misconfigurations_with_successes test () ======= Total: 0 () === RUN TestReportWriter_Table/no_vulns --- PASS: TestReportWriter_Table (0.00s) --- PASS: TestReportWriter_Table/happy_path_full (0.00s) --- PASS: TestReportWriter_Table/no_title_for_vuln_and_missing_primary_link (0.00s) --- PASS: TestReportWriter_Table/long_title_for_vuln (0.00s) --- PASS: TestReportWriter_Table/happy_path_misconfigurations (0.00s) --- PASS: TestReportWriter_Table/happy_path_misconfigurations_with_successes (0.00s) --- PASS: TestReportWriter_Table/no_vulns (0.00s) === RUN TestReportWriter_Template === RUN TestReportWriter_Template/happy_path === RUN TestReportWriter_Template/happy_path#01 === RUN TestReportWriter_Template/happy_path_with/without_period_description_should_return_with_period === RUN TestReportWriter_Template/Calculate_using_sprig === RUN TestReportWriter_Template/happy_path:_env_var_parsing --- PASS: TestReportWriter_Template (0.00s) --- PASS: TestReportWriter_Template/happy_path (0.00s) --- PASS: TestReportWriter_Template/happy_path#01 (0.00s) --- PASS: TestReportWriter_Template/happy_path_with/without_period_description_should_return_with_period (0.00s) --- PASS: TestReportWriter_Template/Calculate_using_sprig (0.00s) --- PASS: TestReportWriter_Template/happy_path:_env_var_parsing (0.00s) === RUN TestReportWriter_Template_SARIF --- PASS: TestReportWriter_Template_SARIF (0.00s) === RUN TestResults_Failed === RUN TestResults_Failed/no_vulnerabilities_and_misconfigurations === RUN TestResults_Failed/vulnerabilities_found === RUN TestResults_Failed/failed_misconfigurations === RUN TestResults_Failed/passed_misconfigurations --- PASS: TestResults_Failed (0.00s) --- PASS: TestResults_Failed/no_vulnerabilities_and_misconfigurations (0.00s) --- PASS: TestResults_Failed/vulnerabilities_found (0.00s) --- PASS: TestResults_Failed/failed_misconfigurations (0.00s) --- PASS: TestResults_Failed/passed_misconfigurations (0.00s) PASS coverage: 71.6% of statements ok github.com/aquasecurity/trivy/pkg/report 0.031s coverage: 71.6% of statements === RUN TestWriter_Write === RUN TestWriter_Write/happy_path_for_container_scan === RUN TestWriter_Write/happy_path_for_local_container_scan === RUN TestWriter_Write/happy_path_for_fs_scan === RUN TestWriter_Write/happy_path_aggregate_results === RUN TestWriter_Write/happy_path_empty --- PASS: TestWriter_Write (0.00s) --- PASS: TestWriter_Write/happy_path_for_container_scan (0.00s) --- PASS: TestWriter_Write/happy_path_for_local_container_scan (0.00s) --- PASS: TestWriter_Write/happy_path_for_fs_scan (0.00s) --- PASS: TestWriter_Write/happy_path_aggregate_results (0.00s) --- PASS: TestWriter_Write/happy_path_empty (0.00s) PASS coverage: 89.1% of statements ok github.com/aquasecurity/trivy/pkg/report/cyclonedx 0.016s coverage: 89.1% of statements === RUN TestClient_FillVulnerabilityInfo === RUN TestClient_FillVulnerabilityInfo/happy_path,_with_only_OS_vulnerability_but_no_vendor_severity,_no_NVD === RUN TestClient_FillVulnerabilityInfo/happy_path,_with_only_OS_vulnerability_but_no_vendor_severity,_yes_NVD === RUN TestClient_FillVulnerabilityInfo/happy_path,_with_only_OS_vulnerability_but_no_severity,_no_vendor_severity,_no_NVD === RUN TestClient_FillVulnerabilityInfo/happy_path,_with_only_OS_vulnerability,_yes_vendor_severity,_with_both_NVD_and_CVSS_info === RUN TestClient_FillVulnerabilityInfo/happy_path,_with_only_library_vulnerability === RUN TestClient_FillVulnerabilityInfo/happy_path,_with_package-specific_severity === RUN TestClient_FillVulnerabilityInfo/GetVulnerability_returns_an_error 2022-03-01T00:55:01.255Z WARN Error while getting vulnerability details: failed to get the vulnerability: failed to marshal JSON: unexpected end of JSON input --- PASS: TestClient_FillVulnerabilityInfo (0.02s) --- PASS: TestClient_FillVulnerabilityInfo/happy_path,_with_only_OS_vulnerability_but_no_vendor_severity,_no_NVD (0.00s) --- PASS: TestClient_FillVulnerabilityInfo/happy_path,_with_only_OS_vulnerability_but_no_vendor_severity,_yes_NVD (0.00s) --- PASS: TestClient_FillVulnerabilityInfo/happy_path,_with_only_OS_vulnerability_but_no_severity,_no_vendor_severity,_no_NVD (0.00s) --- PASS: TestClient_FillVulnerabilityInfo/happy_path,_with_only_OS_vulnerability,_yes_vendor_severity,_with_both_NVD_and_CVSS_info (0.00s) --- PASS: TestClient_FillVulnerabilityInfo/happy_path,_with_only_library_vulnerability (0.00s) --- PASS: TestClient_FillVulnerabilityInfo/happy_path,_with_package-specific_severity (0.00s) --- PASS: TestClient_FillVulnerabilityInfo/GetVulnerability_returns_an_error (0.00s) === RUN TestClient_getPrimaryURL === RUN TestClient_getPrimaryURL/CVE-ID === RUN TestClient_getPrimaryURL/RUSTSEC === RUN TestClient_getPrimaryURL/GHSA === RUN TestClient_getPrimaryURL/Debian_temp_vulnerability === RUN TestClient_getPrimaryURL/npm === RUN TestClient_getPrimaryURL/suse --- PASS: TestClient_getPrimaryURL (0.00s) --- PASS: TestClient_getPrimaryURL/CVE-ID (0.00s) --- PASS: TestClient_getPrimaryURL/RUSTSEC (0.00s) --- PASS: TestClient_getPrimaryURL/GHSA (0.00s) --- PASS: TestClient_getPrimaryURL/Debian_temp_vulnerability (0.00s) --- PASS: TestClient_getPrimaryURL/npm (0.00s) --- PASS: TestClient_getPrimaryURL/suse (0.00s) === RUN TestClient_Filter === RUN TestClient_Filter/happy_path === RUN TestClient_Filter/happy_path_with_ignore-unfixed === RUN TestClient_Filter/happy_path_with_ignore-file === RUN TestClient_Filter/happy_path_with_a_policy_file === RUN TestClient_Filter/happy_path_with_duplicates,_one_with_empty_fixed_version --- PASS: TestClient_Filter (0.00s) --- PASS: TestClient_Filter/happy_path (0.00s) --- PASS: TestClient_Filter/happy_path_with_ignore-unfixed (0.00s) --- PASS: TestClient_Filter/happy_path_with_ignore-file (0.00s) --- PASS: TestClient_Filter/happy_path_with_a_policy_file (0.00s) --- PASS: TestClient_Filter/happy_path_with_duplicates,_one_with_empty_fixed_version (0.00s) PASS coverage: 86.6% of statements ok github.com/aquasecurity/trivy/pkg/result 0.058s coverage: 86.6% of statements === RUN TestConvertToRpcPkgs === RUN TestConvertToRpcPkgs/happy_path --- PASS: TestConvertToRpcPkgs (0.00s) --- PASS: TestConvertToRpcPkgs/happy_path (0.00s) === RUN TestConvertFromRpcPkgs === RUN TestConvertFromRpcPkgs/#00 --- PASS: TestConvertFromRpcPkgs (0.00s) --- PASS: TestConvertFromRpcPkgs/#00 (0.00s) === RUN TestConvertFromRpcLibraries === RUN TestConvertFromRpcLibraries/happy_path --- PASS: TestConvertFromRpcLibraries (0.00s) --- PASS: TestConvertFromRpcLibraries/happy_path (0.00s) === RUN TestConvertToRpcLibraries === RUN TestConvertToRpcLibraries/happy_path --- PASS: TestConvertToRpcLibraries (0.00s) --- PASS: TestConvertToRpcLibraries/happy_path (0.00s) === RUN TestConvertToRpcVulns === RUN TestConvertToRpcVulns/happy_path === RUN TestConvertToRpcVulns/invalid_severity 2022-03-01T00:55:00.980Z WARN unknown severity: INVALID --- PASS: TestConvertToRpcVulns (0.00s) --- PASS: TestConvertToRpcVulns/happy_path (0.00s) --- PASS: TestConvertToRpcVulns/invalid_severity (0.00s) === RUN TestConvertFromRPCResults === RUN TestConvertFromRPCResults/happy_path === RUN TestConvertFromRPCResults/happy_path_-_with_nil_dates --- PASS: TestConvertFromRPCResults (0.00s) --- PASS: TestConvertFromRPCResults/happy_path (0.00s) --- PASS: TestConvertFromRPCResults/happy_path_-_with_nil_dates (0.00s) PASS coverage: 43.8% of statements ok github.com/aquasecurity/trivy/pkg/rpc 0.025s coverage: 43.8% of statements === RUN TestScanner_Scan === RUN TestScanner_Scan/happy_path === RUN TestScanner_Scan/sad_path:_Scan_returns_an_error --- PASS: TestScanner_Scan (0.00s) --- PASS: TestScanner_Scan/happy_path (0.00s) --- PASS: TestScanner_Scan/sad_path:_Scan_returns_an_error (0.00s) === RUN TestScanner_ScanServerInsecure === RUN TestScanner_ScanServerInsecure/happy_path === RUN TestScanner_ScanServerInsecure/sad_path 2022/03/01 00:55:01 http: TLS handshake error from 127.0.0.1:48092: remote error: tls: bad certificate --- PASS: TestScanner_ScanServerInsecure (0.03s) --- PASS: TestScanner_ScanServerInsecure/happy_path (0.01s) --- PASS: TestScanner_ScanServerInsecure/sad_path (0.03s) === RUN TestWithCustomHeaders 2022-03-01T00:55:01.042Z WARN twirp error setting headers: provided header cannot set Content-Type --- PASS: TestWithCustomHeaders (0.00s) PASS coverage: 100.0% of statements ok github.com/aquasecurity/trivy/pkg/rpc/client 0.060s coverage: 100.0% of statements === RUN Test_dbWorker_update === RUN Test_dbWorker_update/happy_path 2022-03-01T00:55:02.912Z INFO Updating DB... 2022-03-01T00:55:02.913Z INFO Suspending all requests during DB update 2022-03-01T00:55:02.913Z INFO Waiting for all requests to be processed before DB update... 2022-03-01T00:55:02.913Z INFO Reopening DB... listen_test.go:155: PASS: NeedsUpdate(string,bool) listen_test.go:155: PASS: Download(string,string) === RUN Test_dbWorker_update/not_update === RUN Test_dbWorker_update/NeedsUpdate_returns_an_error === RUN Test_dbWorker_update/Download_returns_an_error 2022-03-01T00:55:02.919Z INFO Updating DB... --- PASS: Test_dbWorker_update (0.02s) --- PASS: Test_dbWorker_update/happy_path (0.02s) --- PASS: Test_dbWorker_update/not_update (0.00s) --- PASS: Test_dbWorker_update/NeedsUpdate_returns_an_error (0.00s) --- PASS: Test_dbWorker_update/Download_returns_an_error (0.00s) === RUN Test_newServeMux === RUN Test_newServeMux/health_check === RUN Test_newServeMux/cache_endpoint === RUN Test_newServeMux/with_token === RUN Test_newServeMux/sad_path:_no_handler === RUN Test_newServeMux/sad_path:_invalid_token --- PASS: Test_newServeMux (0.02s) --- PASS: Test_newServeMux/health_check (0.00s) --- PASS: Test_newServeMux/cache_endpoint (0.00s) --- PASS: Test_newServeMux/with_token (0.00s) --- PASS: Test_newServeMux/sad_path:_no_handler (0.00s) --- PASS: Test_newServeMux/sad_path:_invalid_token (0.00s) === RUN TestScanServer_Scan === RUN TestScanServer_Scan/happy_path === RUN TestScanServer_Scan/sad_path:_Scan_returns_an_error --- PASS: TestScanServer_Scan (0.00s) --- PASS: TestScanServer_Scan/happy_path (0.00s) --- PASS: TestScanServer_Scan/sad_path:_Scan_returns_an_error (0.00s) === RUN TestCacheServer_PutArtifact === RUN TestCacheServer_PutArtifact/happy_path === RUN TestCacheServer_PutArtifact/sad_path === RUN TestCacheServer_PutArtifact/sad_path:_empty_image_info --- PASS: TestCacheServer_PutArtifact (0.00s) --- PASS: TestCacheServer_PutArtifact/happy_path (0.00s) --- PASS: TestCacheServer_PutArtifact/sad_path (0.00s) --- PASS: TestCacheServer_PutArtifact/sad_path:_empty_image_info (0.00s) === RUN TestCacheServer_PutBlob === RUN TestCacheServer_PutBlob/happy_path === RUN TestCacheServer_PutBlob/sad_path === RUN TestCacheServer_PutBlob/sad_path:_empty_layer_info --- PASS: TestCacheServer_PutBlob (0.00s) --- PASS: TestCacheServer_PutBlob/happy_path (0.00s) --- PASS: TestCacheServer_PutBlob/sad_path (0.00s) --- PASS: TestCacheServer_PutBlob/sad_path:_empty_layer_info (0.00s) === RUN TestCacheServer_MissingBlobs === RUN TestCacheServer_MissingBlobs/happy_path server_test.go:569: PASS: MissingBlobs(string,[]string) --- PASS: TestCacheServer_MissingBlobs (0.00s) --- PASS: TestCacheServer_MissingBlobs/happy_path (0.00s) PASS coverage: 79.8% of statements ok github.com/aquasecurity/trivy/pkg/rpc/server 0.149s coverage: 79.8% of statements === RUN TestScanner_ScanArtifact === RUN TestScanner_ScanArtifact/happy_path 2022-03-01T00:55:02.234Z WARN This OS version is no longer supported by the distribution: alpine 3.10 2022-03-01T00:55:02.234Z WARN The vulnerability detection may be insufficient because security updates are not provided === RUN TestScanner_ScanArtifact/sad_path:_AnalyzerAnalyze_returns_an_error === RUN TestScanner_ScanArtifact/sad_path:_Scan_returns_an_error --- PASS: TestScanner_ScanArtifact (0.00s) --- PASS: TestScanner_ScanArtifact/happy_path (0.00s) --- PASS: TestScanner_ScanArtifact/sad_path:_AnalyzerAnalyze_returns_an_error (0.00s) --- PASS: TestScanner_ScanArtifact/sad_path:_Scan_returns_an_error (0.00s) PASS coverage: 66.0% of statements ok github.com/aquasecurity/trivy/pkg/scanner 0.077s coverage: 66.0% of statements === RUN TestScanner_Scan === RUN TestScanner_Scan/happy_path 2022-03-01T00:55:01.725Z INFO Detected OS: alpine 2022-03-01T00:55:01.725Z INFO Number of language-specific files: 1 2022-03-01T00:55:01.725Z INFO Detecting bundler vulnerabilities... scan_test.go:939: PASS: ApplyLayers(string,[]string) scan_test.go:940: PASS: Detect(string,string,string,time.Time,[]types.Package) === RUN TestScanner_Scan/happy_path_with_list_all_packages 2022-03-01T00:55:01.728Z INFO Detected OS: alpine 2022-03-01T00:55:01.728Z INFO Number of language-specific files: 1 2022-03-01T00:55:01.728Z INFO Detecting bundler vulnerabilities... scan_test.go:939: PASS: ApplyLayers(string,[]string) scan_test.go:940: PASS: Detect(string,string,string,time.Time,[]types.Package) === RUN TestScanner_Scan/happy_path_with_empty_os 2022-03-01T00:55:01.731Z INFO Detected OS: 2022-03-01T00:55:01.731Z INFO Number of language-specific files: 1 2022-03-01T00:55:01.731Z INFO Detecting bundler vulnerabilities... scan_test.go:939: PASS: ApplyLayers(string,[]string) === RUN TestScanner_Scan/happy_path_with_no_package 2022-03-01T00:55:01.734Z WARN No OS package is detected. Make sure you haven't deleted any files that contain information about the installed packages. 2022-03-01T00:55:01.734Z WARN e.g. files under "/lib/apk/db/", "/var/lib/dpkg/" and "/var/lib/rpm" 2022-03-01T00:55:01.734Z INFO Detected OS: alpine 2022-03-01T00:55:01.734Z INFO Number of language-specific files: 1 2022-03-01T00:55:01.734Z INFO Detecting bundler vulnerabilities... scan_test.go:939: PASS: ApplyLayers(string,[]string) scan_test.go:940: PASS: Detect(string,string,string,time.Time,[]types.Package) === RUN TestScanner_Scan/happy_path_with_unsupported_os 2022-03-01T00:55:01.736Z INFO Detected OS: fedora 2022-03-01T00:55:01.736Z INFO Number of language-specific files: 1 2022-03-01T00:55:01.736Z INFO Detecting bundler vulnerabilities... scan_test.go:939: PASS: ApplyLayers(string,[]string) scan_test.go:940: PASS: Detect(string,string,string,time.Time,[]types.Package) === RUN TestScanner_Scan/happy_path_with_a_scratch_image 2022-03-01T00:55:01.739Z INFO Number of language-specific files: 0 scan_test.go:939: PASS: ApplyLayers(string,[]string) === RUN TestScanner_Scan/happy_path_with_only_library_detection 2022-03-01T00:55:01.743Z INFO Number of language-specific files: 2 2022-03-01T00:55:01.743Z INFO Detecting bundler vulnerabilities... 2022-03-01T00:55:01.743Z INFO Detecting composer vulnerabilities... scan_test.go:939: PASS: ApplyLayers(string,[]string) === RUN TestScanner_Scan/happy_path_with_misconfigurations 2022-03-01T00:55:01.745Z INFO Detected config files: 2 2022-03-01T00:55:01.745Z WARN severity must be [UNKNOWN LOW MEDIUM HIGH CRITICAL], but DUMMY scan_test.go:939: PASS: ApplyLayers(string,[]string) === RUN TestScanner_Scan/sad_path:_ApplyLayers_returns_an_error === RUN TestScanner_Scan/sad_path:_ospkgDetector.Detect_returns_an_error 2022-03-01T00:55:01.750Z INFO Detected OS: alpine === RUN TestScanner_Scan/sad_path:_library.Detect_returns_an_error 2022-03-01T00:55:01.752Z INFO Number of language-specific files: 1 2022-03-01T00:55:01.752Z INFO Detecting bundler vulnerabilities... --- PASS: TestScanner_Scan (0.03s) --- PASS: TestScanner_Scan/happy_path (0.01s) --- PASS: TestScanner_Scan/happy_path_with_list_all_packages (0.00s) --- PASS: TestScanner_Scan/happy_path_with_empty_os (0.00s) --- PASS: TestScanner_Scan/happy_path_with_no_package (0.00s) --- PASS: TestScanner_Scan/happy_path_with_unsupported_os (0.00s) --- PASS: TestScanner_Scan/happy_path_with_a_scratch_image (0.00s) --- PASS: TestScanner_Scan/happy_path_with_only_library_detection (0.00s) --- PASS: TestScanner_Scan/happy_path_with_misconfigurations (0.00s) --- PASS: TestScanner_Scan/sad_path:_ApplyLayers_returns_an_error (0.00s) --- PASS: TestScanner_Scan/sad_path:_ospkgDetector.Detect_returns_an_error (0.00s) --- PASS: TestScanner_Scan/sad_path:_library.Detect_returns_an_error (0.00s) PASS coverage: 84.3% of statements ok github.com/aquasecurity/trivy/pkg/scanner/local 0.078s coverage: 84.3% of statements === RUN TestFormatSrcVersion === RUN TestFormatSrcVersion/happy_path === RUN TestFormatSrcVersion/with_epoch --- PASS: TestFormatSrcVersion (0.00s) --- PASS: TestFormatSrcVersion/happy_path (0.00s) --- PASS: TestFormatSrcVersion/with_epoch (0.00s) === RUN TestFormatVersion === RUN TestFormatVersion/happy_path === RUN TestFormatVersion/with_epoch --- PASS: TestFormatVersion (0.00s) --- PASS: TestFormatVersion/happy_path (0.00s) --- PASS: TestFormatVersion/with_epoch (0.00s) PASS coverage: 100.0% of statements ok github.com/aquasecurity/trivy/pkg/scanner/utils 0.050s coverage: 100.0% of statements ? github.com/aquasecurity/trivy/pkg/types [no test files] === RUN TestCopyFile === RUN TestCopyFile/happy_path --- PASS: TestCopyFile (0.00s) --- PASS: TestCopyFile/happy_path (0.00s) PASS coverage: 32.4% of statements ok github.com/aquasecurity/trivy/pkg/utils 0.020s coverage: 32.4% of statements ? github.com/aquasecurity/trivy/rpc/cache [no test files] ? github.com/aquasecurity/trivy/rpc/common [no test files] ? github.com/aquasecurity/trivy/rpc/scanner [no test files] >>> trivy: Entering fakeroot... >>> trivy*: Running postcheck for trivy >>> trivy*: Preparing package trivy... >>> trivy*: Stripping binaries >>> trivy*: Scanning shared objects >>> trivy*: Tracing dependencies... so:libc.musl-aarch64.so.1 >>> trivy*: Package size: 55.8 MB >>> trivy*: Compressing data... >>> trivy*: Create checksum... >>> trivy*: Create trivy-0.24.1-r0.apk >>> trivy: Build complete at Tue, 01 Mar 2022 00:55:04 +0000 elapsed time 0h 0m 21s >>> trivy: Cleaning up srcdir >>> trivy: Cleaning up pkgdir >>> trivy: Uninstalling dependencies... (1/17) Purging .makedepends-trivy (20220301.005444) (2/17) Purging btrfs-progs-dev (5.16.2-r0) (3/17) Purging btrfs-progs-libs (5.16.2-r0) (4/17) Purging go (1.17.7-r0) (5/17) Purging binutils-gold (2.38-r0) (6/17) Purging lvm2-dev (2.02.187-r2) (7/17) Purging linux-headers (5.16.7-r1) (8/17) Purging lvm2-libs (2.02.187-r2) (9/17) Purging device-mapper-event-libs (2.02.187-r2) (10/17) Purging device-mapper-libs (2.02.187-r2) (11/17) Purging libaio (0.3.112-r1) (12/17) Purging util-linux-dev (2.37.4-r1) (13/17) Purging libfdisk (2.37.4-r1) (14/17) Purging libmount (2.37.4-r1) (15/17) Purging libsmartcols (2.37.4-r1) (16/17) Purging libuuid (2.37.4-r1) (17/17) Purging libblkid (2.37.4-r1) Executing busybox-1.35.0-r3.trigger OK: 354 MiB in 91 packages >>> trivy: Updating the testing/aarch64 repository index... >>> trivy: Signing the index...