Closed elfosardo closed 3 weeks ago
/test metal3-centos-e2e-integration-test-main metal3-ubuntu-e2e-integration-test-main
/test metal3-ubuntu-e2e-integration-test-main
/test metal3-ubuntu-e2e-integration-test-main
/lgtm
/test metal3-centos-e2e-integration-test-main metal3-ubuntu-e2e-integration-test-main some issue with CI?
/test metal3-centos-e2e-integration-test-main metal3-ubuntu-e2e-integration-test-main
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: dtantsur
The full list of commands accepted by this bot can be found here.
The pull request process is described here
If FIPS is enabled in the hosts we should also run IPA in FIPS mode. It is possible to enable FIPS directly at kernel level using the fips option, determining the FIPS status for example from the cryptographic module and specifically the /proc/sys/crypto/fips_enabled file; if the file contains 1 then the system is in FIPS mode, if it contains 0 the FIPS algorithms are disabled. Therefore the value of the fips kernel option is 0 (default) if FIPS is disabled, or 1 if enabled.