Actions
action #28510
closedcoordination #28504: [sle][functional][epic] crypt lvm for SLE 12-SP3, SLE 12-SP4 and SLE 15
[sle][functional][story][hard][bsc#1070139] "encrypted LVM-based" partition schema with non-encrypted boot partition
Status:
Rejected
Priority:
Normal
Assignee:
-
Category:
Enhancement to existing tests
Target version:
Start date:
2017-11-28
Due date:
2018-01-30
% Done:
0%
Estimated time:
Difficulty:
Description
User story¶
As a customer, I want to be able to have /boot in an non encrypted partition so no password is needed to load initrd and kernels.
- Be aware that on SLE 12-SP3 /boot was in a separated partition by default. On SLE 15, /boot is no more in a separated partition by default.
Acceptance criteria¶
- AC1: bsc#1070139 is resolved.
- AC2: The following test suites are adapted to have a non-encrypted /boot partition for aarch64, ppc64 and x86_64: - cryptlvm - cryptlvm+activate_existing - cryptlvm+activate_existing+force_recompute - cryptlvm+activate_existing+import_users - cryptlvm+cancel_existing - cryptlvm_minimal_x
- AC3: The mentioned test suites still give for SLE 12-SP3 the same results as in https://openqa.suse.de/tests/overview?distri=sle&version=12-SP3&build=0473&groupid=55.
- AC4: On ppc there is a workaround (soft-fail) for bsc#1070139.
Tasks¶
1. Wait for bsc#1070139 to be resolved.
- Adapt the following test suites to work for SLE 12-SP3 and SLE 15:
- cryptlvm
- cryptlvm+activate_existing
- cryptlvm+activate_existing+force_recompute
- cryptlvm+activate_existing+import_users
- cryptlvm+cancel_existing
- cryptlvm_minimal_x
Actions