Skip to content

Enable check_guest_secure_boot() and remove record_soft_failure for bsc1182886. #22710

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

guoxuguang
Copy link
Contributor

@guoxuguang guoxuguang commented Jul 21, 2025

Enable check_guest_secure_boot() and remove record_soft_failure for bsc1182886.

@guoxuguang guoxuguang force-pushed the leon/poo178699_bsc1182886 branch 2 times, most recently from 823ad49 to c1cc48d Compare July 21, 2025 08:09
@guoxuguang
Copy link
Contributor Author

@guoxuguang
Copy link
Contributor Author

guoxuguang commented Jul 21, 2025

@alice-suse @Julie-CAO @waynechen55 @nanzhg @tbaev @RoyCai7 @martinsmarcelo
please help me review this PR. thanks

@guoxuguang guoxuguang force-pushed the leon/poo178699_bsc1182886 branch from c1cc48d to 40814b2 Compare July 22, 2025 01:04
@guoxuguang guoxuguang force-pushed the leon/poo178699_bsc1182886 branch from 40814b2 to e1a153d Compare July 22, 2025 01:52
@guoxuguang guoxuguang changed the title virt_autotest remove record_soft_failure for bsc1182886 Enable check_guest_secure_boot() and remove record_soft_failure for bsc1182886. Jul 22, 2025
@guoxuguang guoxuguang force-pushed the leon/poo178699_bsc1182886 branch from e1a153d to fcbc4cb Compare July 22, 2025 04:52
@guoxuguang
Copy link
Contributor Author

Add the latest validation run as below:
uefi-gi-guest_developing-on-host_developing-kvm pass

Meanwhile, confirm enabled check_guest_secure_boot() part looks good - https://openqa.suse.de/tests/18523793#step/uefi_guest_verification/59

If there was no more new comment, this PR is ready to merge now. thanks

@Julie-CAO
Copy link
Contributor

The ticke title is "Make UEFI and secure boot test work for sle16", so I think the "UEFI test"(check_guest_uefi_boot($_) ) should be run as well. Need @alice-suse to clarify the requirements.

@alice-suse
Copy link
Contributor

The ticke title is "Make UEFI and secure boot test work for sle16", so I think the "UEFI test"(check_guest_uefi_boot($_) ) should be run as well. Need @alice-suse to clarify the requirements.

Based on contents of check_guest_uefi_boot (check for pxev6, httpv6 ), it is not necessary I think. The uefi checks are done mainly via

    $self->check_guest_bootloader($_) foreach (keys %virt_autotest::common::guests);
    $self->check_guest_bootcurrent($_) foreach (keys %virt_autotest::common::guests);

But if it is supported (having such in efibootmgr -v output), we can add the check too.

@alice-suse
Copy link
Contributor

Thanks for adding secure boot check. LGTM.

@guoxuguang guoxuguang force-pushed the leon/poo178699_bsc1182886 branch 2 times, most recently from a7c608f to cd8a499 Compare July 22, 2025 10:31
@guoxuguang guoxuguang force-pushed the leon/poo178699_bsc1182886 branch from cd8a499 to ca4a59f Compare July 22, 2025 10:38
@alice-suse
Copy link
Contributor

@guoxuguang Are there ongoing validation runs after the last round of code update? Let me know when it is ready for merge :)

@guoxuguang
Copy link
Contributor Author

@guoxuguang Are there ongoing validation runs after the last round of code update? Let me know when it is ready for merge :)

@alice-suse,
yes, there are ongoing validation runs after the last round of code update.

For now, finalize the latest validation runs as below:
x86_64
uefi-gi-guest_developing-on-host_developing-kvm pass

aarch64
uefi-gi-guest_developing-on-host_developing-kvm pass

Refer to the finalized validation run, test resutls looks good. this PR is readly to merge.
If there was no new comment, please help merge this PR. thanks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants