harbor/tests/testcases/Group9-Content-trust/9-05-DB-user-delete-signed-images.md
Josh Soref dfe360040b Spelling
* addition
* attribute
* auditing
* availability
* available
* bandwidth
* browser
* business
* cadence
* chartmuseum
* client
* column
* content
* demonstrate
* described
* endpoints
* facilitate
* github
* harbor
* information
* instance
* manual
* meaningful
* operation
* overridden
* password
* possible
* project
* refactor
* replication
* requires
* running
* scanned
* settings
* signup
* those
* unsigned
* vulnerability

--
Also removes trailing space from a filename

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
2021-02-19 11:59:15 +08:00

1.0 KiB

Test 9-05 User delete signed images(DB mode)

Purpose:

To verify whether user can delete signed images.

References:

User guide

Environment:

  • This test requires one Harbor instance is running and available.
  • A Linux host with Docker CLI(Docker client) installed.

Test Steps:

NOTE:
In below test,<harbor_ip> should be replaced by your harbor's ip or FQDN. If you are using a self-signed certificate,make sure to copy the CA root cert into /etc/docker/certs.d/<harbor_ip> and $HOME/.docker/tls/<harbor_ip>:4443/

  1. Login UI and create a project.
  2. On a Docker client,run
export DOCKER_CONTENT_TRUST=1
export DOCKER_CONTENT_TRUST_SERVER=https://<harbor_ip>:4443

and login Harbor.
3. Push an image to project created in step1.
4. Delete the pushed image.
5. Delete notary tag according to message from UI in step4.
6. Delete the image again.

Expected Outcome:

  • In step4, image cannot be deleted.
  • In step6, image can be deleted.

Possible Problems:

None