harbor/tests/testcases/Group9-Content-trust/9-05-DB-user-delete-signed-images.md
Josh Soref dfe360040b Spelling
* addition
* attribute
* auditing
* availability
* available
* bandwidth
* browser
* business
* cadence
* chartmuseum
* client
* column
* content
* demonstrate
* described
* endpoints
* facilitate
* github
* harbor
* information
* instance
* manual
* meaningful
* operation
* overridden
* password
* possible
* project
* refactor
* replication
* requires
* running
* scanned
* settings
* signup
* those
* unsigned
* vulnerability

--
Also removes trailing space from a filename

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
2021-02-19 11:59:15 +08:00

39 lines
1.0 KiB
Markdown

Test 9-05 User delete signed images(DB mode)
=======
# Purpose:
To verify whether user can delete signed images.
# References:
User guide
# Environment:
* This test requires one Harbor instance is running and available.
* A Linux host with Docker CLI(Docker client) installed.
# Test Steps:
**NOTE:**
In below test,<harbor_ip> should be replaced by your harbor's ip or FQDN. If you are using a self-signed certificate,make sure to copy the CA root cert into ```/etc/docker/certs.d/<harbor_ip>``` and ```$HOME/.docker/tls/<harbor_ip>:4443/```
1. Login UI and create a project.
2. On a Docker client,run
```sh
export DOCKER_CONTENT_TRUST=1
export DOCKER_CONTENT_TRUST_SERVER=https://<harbor_ip>:4443
```
and login Harbor.
3. Push an image to project created in step1.
4. Delete the pushed image.
5. Delete notary tag according to message from UI in step4.
6. Delete the image again.
# Expected Outcome:
* In step4, image cannot be deleted.
* In step6, image can be deleted.
# Possible Problems:
None