2017-12-14 03:53:42 +01:00
|
|
|
10-08 user can not pull image exceed vulnerability severity
|
|
|
|
=======
|
|
|
|
# Purpose:
|
|
|
|
To verify user can not pull image exceed vulnerability severity setting.
|
|
|
|
|
|
|
|
# Reference:
|
|
|
|
User guide.
|
|
|
|
|
|
|
|
# Environment:
|
2021-02-18 03:54:32 +01:00
|
|
|
* This test requires that one Harbor instance is running and available.
|
2020-11-26 10:13:37 +01:00
|
|
|
* Harbor is installed with trivy enable.
|
2017-12-14 03:53:42 +01:00
|
|
|
* A Linux host with Docker client installed.
|
2020-11-26 10:13:37 +01:00
|
|
|
* Trivy has been updated to the latest.
|
2017-12-14 03:53:42 +01:00
|
|
|
|
|
|
|
# Test Step:
|
|
|
|
1. Login harbor as admin.
|
|
|
|
2. Go to configuration.
|
|
|
|
3. Set vulnerability severity limit to medium and save configuration.
|
|
|
|
4. Push some images with vulnerability and scan them.
|
2021-02-18 03:54:32 +01:00
|
|
|
5. On a docker client, user pull an image with high vulnerability severity.
|
2017-12-14 03:53:42 +01:00
|
|
|
|
|
|
|
# Expect outcome:
|
|
|
|
* Step5 pull request should be refused.
|
|
|
|
|
|
|
|
# Possible problem:
|
|
|
|
None
|