To successfully run endorctl scans on a container image built using Podman, use the following instructions:Documentation Index
Fetch the complete documentation index at: https://docs.endorlabs.com/llms.txt
Use this file to discover all available pages before exploring further.
-
Build the image using the following command. This command builds a container image and tags it with the label
test:latest. -
After building the image, confirm the target registry by running the following command. Podman automatically adds
localhostas the target registry for this image. - Before scanning the image with endorctl, sign in to the registry that hosts the image.
-
Check if there is a registry running at
localhost. -
If a registry is not running at
localhost, then you must re-tag the image to a reachable registry, using the following command. Replace<reachable-registry>with the actual URL of an accessible registry. -
Sign in to the reachable registry using any container runtime. Now you can run the
endorctlscan. Targeting a reachable registry lets you locate the image manifest and download all required layer blobs for vulnerability analysis.