Skip to content

Add Docker image for testing Parsec as a systemd service #218

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed

Conversation

joechrisellis
Copy link
Contributor

Signed-off-by: Joe Ellis [email protected]

@joechrisellis joechrisellis force-pushed the systemd_install_ci branch 2 times, most recently from 0e8366f to f8fa52f Compare August 19, 2020 14:05
@hug-dev
Copy link
Member

hug-dev commented Aug 19, 2020

I think it's worth a try to test the installation using directly the virtual environment given by GitHub Actions (and maybe Travis CI for Arm?) instead of using Docker there.

@joechrisellis joechrisellis force-pushed the systemd_install_ci branch 2 times, most recently from def301f to 447faeb Compare August 20, 2020 16:30
@hug-dev
Copy link
Member

hug-dev commented Sep 8, 2020

Even if systemd testing seems to be non-optimal on CI, I think the principle of the installation tests should remain and will be very useful to check that we are doing authentication and multi-tenancy right.

I am thinking of multiple tests, not sure if they would be best on their own workflow or put in common:

  1. the service should fail to run (under any authentication) if the socket folder has wrong permissions
  2. Under direct authentication using the parsec-clients group, a client not in that group should not be able to connect
  3. Under peer credential authentication (when ready):
    1. even a client not in parsec-clients should be able to connect
    2. one client can not access another client's keys

@hug-dev
Copy link
Member

hug-dev commented Oct 9, 2020

Closing for now, as the requirements changed for testing this. See the related issue.

@hug-dev hug-dev closed this Oct 9, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants