summary: run keylime e2e tests # define context to filter out all test requiring TPM device context: swtpm: yes agent: rust discover: how: fmf url: https://github.com/RedHat-SP-Security/keylime-tests ref: "@.tmt/dynamic_ref.fmf" test: - /setup/configure_tpm_emulator - /setup/inject_SELinux_AVC_check # change IMA policy to simple and run one attestation scenario # this is to utilize also a different parser - /setup/configure_kernel_ima_module/ima_policy_simple - /functional/basic-attestation-on-localhost # now change IMA policy to signing and run all tests - /setup/configure_kernel_ima_module/ima_policy_signing - "/functional/.*" - "/compatibility/.*" execute: how: tmt