- Image Types:
- basesdk-amd64 / sdk-amd64 / target-armhf-internal / target-armhf / target-amd64
- Image Deployment:
- APT, OSTree
Tests that the tumbler AppArmor profile doesn't cause false negatives and that it does not allow arbitrary reading of files in the home directory.
- Clone the tests repository from another computer (Note that the branch being tested may change depending on the release, please make sure to clone the correct branch for the release in question):
- Copy the test directory apparmor-tumbler to the target device:
- Log into the target device:
$ git clone --branch apertis/v2020pre https://gitlab.apertis.org/tests/apparmor-tumbler.git
$ scp -r apparmor-tumbler user@$DUT_IP:
$ ssh user@$DUT_IP
- Enter test directory:
- Execute the following commands:
$ cd apparmor-tumbler
$ common/run-test-in-systemd --name run-test-sh --timeout 900 ./run-test.sh
Both tests should report pass and not fail:
- The results of the tests printed to the standard output are enough to determine whether they passed or fail.
- If you get a failure and need to report a bug please check journalctl, run the test case again, and add the logs you get to the bug report.