action #49820
closed[functional][u] Make the svirt backend work with AppArmor enabled and under company policies
0%
Description
Motivation¶
Enabling openSUSE Tumbleweed tests for s390x on openqa.opensuse.org.
Find more details about why this is needed in #48434
Acceptance criteria¶
- AC1: The svirt backend complies with the company policies to be run on a shared worker on openqa.opensuse.org
- AC2: It is possible to enable a worker for z/VM on imagetester
Updated by SLindoMansilla over 5 years ago
- Blocks action #48434: [functional][u] test Tumbleweed s390x again added
Updated by SLindoMansilla over 5 years ago
- Assignee set to SLindoMansilla
- Priority changed from Normal to Low
Updated by SLindoMansilla over 5 years ago
- Status changed from New to Blocked
Waiting for z/VM user from Z system admins
Updated by binary_sequence over 5 years ago
- Status changed from Blocked to Workable
- Assignee changed from SLindoMansilla to binary_sequence
I already got a z/VM user.
Updated by SLindoMansilla about 5 years ago
- Blocks deleted (action #48434: [functional][u] test Tumbleweed s390x again)
Updated by SLindoMansilla about 5 years ago
- Related to action #48434: [functional][u] test Tumbleweed s390x again added
Updated by SLindoMansilla almost 5 years ago
At the moment this is very low prio since we have a dedicated server (rebel) for testing linux as a zVM guest: https://openqa.opensuse.org/group_overview/34
Updated by okurz almost 5 years ago
I don't think this is feasible as allowing ssh kinda contradicts apparmor by definition, doesn't it?
Updated by SLindoMansilla over 4 years ago
- Status changed from Workable to Rejected
Yes, you are right.
Updated by pvorel over 4 years ago
Could you please explain what's wrong on ssh?
There is sshd profile
https://gitlab.com/apparmor/apparmor/-/blob/master/profiles/apparmor/profiles/extras/usr.sbin.sshd
Updated by SLindoMansilla over 4 years ago
pvorel wrote:
Could you please explain what's wrong on ssh?
There is sshd profile
https://gitlab.com/apparmor/apparmor/-/blob/master/profiles/apparmor/profiles/extras/usr.sbin.sshd
Company policies. They denied me to add ssh to the apparmor profiles.
Updated by okurz over 4 years ago
SLindoMansilla wrote:
[…]
Company policies.
please reference the "company policies" then or state "I did not understand" instead of spreading false rumors.