You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Oct 16, 2020. It is now read-only.
I am using coreos on vSphere ESXi and I'm trying to prevent edits to grub menu entries.
One of the use cases is to prevent a user with access to console from setting coreos.autologin.
After securing grub (/usr/share/oem/grub.cfg) with a password, I'm noticing that even executing the menu entries requires authentication.
I'm looking to secure grub such that editing via grub menu is prevented but executing is not. In other words, I should be able to boot to coreos without having to authenticate.
After some further digging, perhaps the grub menu entries are missing a --unrestricted option?
Restricting access to editing the command line would also be applicable to systems locked down by secure boot.