Project

General

Profile

Actions

action #88480

closed

[sporadic] boot_encrypt doesn't unlock encrypted disk for cryptlvm@ppc64le

Added by syrianidou_sofia about 3 years ago. Updated about 3 years ago.

Status:
Closed
Priority:
Normal
Target version:
SUSE QA - SLE 15 SP3
Start date:
2021-02-08
Due date:
% Done:

0%

Estimated time:

Description

Observation

It seems that the wrong password is typed.

openQA test in scenario sle-15-SP3-Online-ppc64le-cryptlvm@ppc64le fails in
first_boot

Further details

Always latest result in this scenario: latest

Acceptance criteria:

  • Add a stabilization check so that if disk is not unlocked, the password will be entered again.
  • If there is a tools issue worth investigating, open a new ticket.
Actions #1

Updated by syrianidou_sofia about 3 years ago

  • Project changed from openQA Tests to qe-yam
  • Category deleted (Bugs in existing tests)
Actions #2

Updated by syrianidou_sofia about 3 years ago

  • Status changed from Workable to In Progress
  • Assignee set to syrianidou_sofia
Actions #3

Updated by syrianidou_sofia about 3 years ago

Deleted needle "encrypted_disk-typed_password-20191104" that appeared to match password one character short.

Actions #4

Updated by syrianidou_sofia about 3 years ago

  • Status changed from In Progress to Feedback

Deleting the wrong needle moved the failure to the right module boot_encrypt. Adding extra check to avoid failures due to ppc backend.
https://github.com/os-autoinst/os-autoinst-distri-opensuse/pull/11959

Actions #5

Updated by riafarov about 3 years ago

  • Target version set to SLE 15 SP3
Actions #6

Updated by syrianidou_sofia about 3 years ago

  • Status changed from Feedback to Resolved

Test seems to be more stable

Actions #7

Updated by riafarov about 3 years ago

  • Status changed from Resolved to Closed
Actions

Also available in: Atom PDF