harbor/tests/testcases/Group10-Vulnerability/10-09-User-can-pull-scaned-images.md
Josh Soref dfe360040b Spelling
* addition
* attribute
* auditing
* availability
* available
* bandwidth
* browser
* business
* cadence
* chartmuseum
* client
* column
* content
* demonstrate
* described
* endpoints
* facilitate
* github
* harbor
* information
* instance
* manual
* meaningful
* operation
* overridden
* password
* possible
* project
* refactor
* replication
* requires
* running
* scanned
* settings
* signup
* those
* unsigned
* vulnerability

--
Also removes trailing space from a filename

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
2021-02-19 11:59:15 +08:00

728 B

10-09

Purpose:

To test normal user can pull scanned images.

Reference:

User guide.

Environment:

  • This test requires that one Harbor instance is running and available.
  • Harbor is installed with trivy enable.
  • A Linux host with Docker client installed.
  • Trivy has been updated to the latest.
  • Vulnerability severity limit is disabled.

Test Step:

Note:
In below test, user A is a non-admin user. User A should be replaced by meaningful names.

  1. Login as user A.
  2. Create a project and push an image.
  3. Login as admin and scan the image.
  4. On a Docker client, user A pull the scanned image.

Expect Outcome:

  • Step 4 user can pull the image.

Possible Problems:

None