mirror of
https://github.com/goharbor/harbor.git
synced 2024-12-28 19:47:58 +01:00
dfe360040b
* addition * attribute * auditing * availability * available * bandwidth * browser * business * cadence * chartmuseum * client * column * content * demonstrate * described * endpoints * facilitate * github * harbor * information * instance * manual * meaningful * operation * overridden * password * possible * project * refactor * replication * requires * running * scanned * settings * signup * those * unsigned * vulnerability -- Also removes trailing space from a filename Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
27 lines
766 B
Markdown
27 lines
766 B
Markdown
10-08 user can not pull image exceed vulnerability severity
|
|
=======
|
|
# Purpose:
|
|
To verify user can not pull image exceed vulnerability severity setting.
|
|
|
|
# Reference:
|
|
User guide.
|
|
|
|
# Environment:
|
|
* This test requires that one Harbor instance is running and available.
|
|
* Harbor is installed with trivy enable.
|
|
* A Linux host with Docker client installed.
|
|
* Trivy has been updated to the latest.
|
|
|
|
# Test Step:
|
|
1. Login harbor as admin.
|
|
2. Go to configuration.
|
|
3. Set vulnerability severity limit to medium and save configuration.
|
|
4. Push some images with vulnerability and scan them.
|
|
5. On a docker client, user pull an image with high vulnerability severity.
|
|
|
|
# Expect outcome:
|
|
* Step5 pull request should be refused.
|
|
|
|
# Possible problem:
|
|
None
|