harbor/tests/testcases/Group10-Vulnerability/10-09-User-can-pull-scaned-images.md
Josh Soref dfe360040b Spelling
* addition
* attribute
* auditing
* availability
* available
* bandwidth
* browser
* business
* cadence
* chartmuseum
* client
* column
* content
* demonstrate
* described
* endpoints
* facilitate
* github
* harbor
* information
* instance
* manual
* meaningful
* operation
* overridden
* password
* possible
* project
* refactor
* replication
* requires
* running
* scanned
* settings
* signup
* those
* unsigned
* vulnerability

--
Also removes trailing space from a filename

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
2021-02-19 11:59:15 +08:00

30 lines
728 B
Markdown

10-09
=======
# Purpose:
To test normal user can pull scanned images.
# Reference:
User guide.
# Environment:
* This test requires that one Harbor instance is running and available.
* Harbor is installed with trivy enable.
* A Linux host with Docker client installed.
* Trivy has been updated to the latest.
* Vulnerability severity limit is disabled.
# Test Step:
**Note**:
In below test, user A is a non-admin user. User A should be replaced by meaningful names.
1. Login as user A.
2. Create a project and push an image.
3. Login as admin and scan the image.
4. On a Docker client, user A pull the scanned image.
# Expect Outcome:
* Step 4 user can pull the image.
# Possible Problems:
None