harbor/tests/testcases/Group10-Vulnerability/10-08-User-can-not-pull-image-exceed-vulnerability-severity-setting.md
Josh Soref dfe360040b Spelling
* addition
* attribute
* auditing
* availability
* available
* bandwidth
* browser
* business
* cadence
* chartmuseum
* client
* column
* content
* demonstrate
* described
* endpoints
* facilitate
* github
* harbor
* information
* instance
* manual
* meaningful
* operation
* overridden
* password
* possible
* project
* refactor
* replication
* requires
* running
* scanned
* settings
* signup
* those
* unsigned
* vulnerability

--
Also removes trailing space from a filename

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
2021-02-19 11:59:15 +08:00

27 lines
766 B
Markdown

10-08 user can not pull image exceed vulnerability severity
=======
# Purpose:
To verify user can not pull image exceed vulnerability severity setting.
# Reference:
User guide.
# Environment:
* This test requires that one Harbor instance is running and available.
* Harbor is installed with trivy enable.
* A Linux host with Docker client installed.
* Trivy has been updated to the latest.
# Test Step:
1. Login harbor as admin.
2. Go to configuration.
3. Set vulnerability severity limit to medium and save configuration.
4. Push some images with vulnerability and scan them.
5. On a docker client, user pull an image with high vulnerability severity.
# Expect outcome:
* Step5 pull request should be refused.
# Possible problem:
None