Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove kernel cmdline check #10961

Merged
merged 1 commit into from
Aug 8, 2023

Conversation

jan-cerny
Copy link
Collaborator

The OVAL in rule enable_fips_mode contains multiple checks. One of these checks tests presence of fips=1 in /etc/kernel/cmdline. Although this is useful for latest RHEL versions, this file doesn't exist on RHEL 8.6 and 9.0. This causes that the rule fails after remediation on these RHEL versions.

We want the same OVAL behavior on all minor RHEL releases, therefore we will remove this test from the OVAL completely.

Related to: #10897

The OVAL in rule enable_fips_mode contains multiple checks. One
of these checks tests presence of `fips=1` in `/etc/kernel/cmdline`.
Although this is useful for latest RHEL versions, this file doesn't
exist on RHEL 8.6 and 9.0. This causes that the rule fails after
remediation on these RHEL versions.

We want the same OVAL behavior on all minor RHEL releases, therefore
we will remove this test from the OVAL completely.

Related to: ComplianceAsCode#10897
@jan-cerny jan-cerny added the OVAL OVAL update. Related to the systems assessments. label Aug 8, 2023
@jan-cerny jan-cerny added this to the 0.1.70 milestone Aug 8, 2023
@github-actions
Copy link

github-actions bot commented Aug 8, 2023

Start a new ephemeral environment with changes proposed in this pull request:

rhel8 (from CTF) Environment (using Fedora as testing environment)
Open in Gitpod

Fedora Testing Environment
Open in Gitpod

Oracle Linux 8 Environment
Open in Gitpod

@github-actions
Copy link

github-actions bot commented Aug 8, 2023

This datastream diff is auto generated by the check Compare DS/Generate Diff

Click here to see the full diff
OVAL for rule 'xccdf_org.ssgproject.content_rule_enable_fips_mode' differs.
--- oval:ssg-enable_fips_mode:def:1
+++ oval:ssg-enable_fips_mode:def:1
@@ -4,7 +4,6 @@
 extend_definition oval:ssg-enable_dracut_fips_module:def:1
 extend_definition oval:ssg-configure_crypto_policy:def:1
 criterion oval:ssg-test_system_crypto_policy_value:tst:1
-criterion oval:ssg-test_fips_1_argument_in_etc_kernel_cmdline:tst:1
 criteria OR
 criteria AND
 extend_definition oval:ssg-system_info_architecture_s390_64:def:1

@codeclimate
Copy link

codeclimate bot commented Aug 8, 2023

Code Climate has analyzed commit 75dd0e7 and detected 0 issues on this pull request.

The test coverage on the diff in this pull request is 100.0% (50% is the threshold).

This pull request will bring the total coverage in the repository to 53.3% (0.0% change).

View more on Code Climate.

@ggbecker ggbecker merged commit fb0a2f4 into ComplianceAsCode:master Aug 8, 2023
33 of 34 checks passed
@ggbecker ggbecker self-assigned this Aug 8, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
OVAL OVAL update. Related to the systems assessments.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants