mirror of
https://github.com/goharbor/harbor.git
synced 2024-11-05 10:10:12 +01:00
dfe360040b
* addition * attribute * auditing * availability * available * bandwidth * browser * business * cadence * chartmuseum * client * column * content * demonstrate * described * endpoints * facilitate * github * harbor * information * instance * manual * meaningful * operation * overridden * password * possible * project * refactor * replication * requires * running * scanned * settings * signup * those * unsigned * vulnerability -- Also removes trailing space from a filename Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
1.0 KiB
1.0 KiB
Test 9-05 User delete signed images(DB mode)
Purpose:
To verify whether user can delete signed images.
References:
User guide
Environment:
- This test requires one Harbor instance is running and available.
- A Linux host with Docker CLI(Docker client) installed.
Test Steps:
NOTE:
In below test,<harbor_ip> should be replaced by your harbor's ip or FQDN. If you are using a self-signed certificate,make sure to copy the CA root cert into /etc/docker/certs.d/<harbor_ip>
and $HOME/.docker/tls/<harbor_ip>:4443/
- Login UI and create a project.
- On a Docker client,run
export DOCKER_CONTENT_TRUST=1
export DOCKER_CONTENT_TRUST_SERVER=https://<harbor_ip>:4443
and login Harbor.
3. Push an image to project created in step1.
4. Delete the pushed image.
5. Delete notary tag according to message from UI in step4.
6. Delete the image again.
Expected Outcome:
- In step4, image cannot be deleted.
- In step6, image can be deleted.
Possible Problems:
None