Skip to content

Commit

Permalink
waive audit_rules_* missing Ansible remediation
Browse files Browse the repository at this point in the history
This manifested on RHEL-10, but is likely valid for older RHELs
where it likely was PASSing by default and didn't need remediating
(presumably).

Signed-off-by: Jiri Jaburek <[email protected]>
  • Loading branch information
comps committed Dec 5, 2024
1 parent bce0650 commit d295243
Showing 1 changed file with 9 additions and 0 deletions.
9 changes: 9 additions & 0 deletions conf/waivers/30-permanent
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,15 @@
/hardening/.*/accounts_password_set_max_life_(existing|root)
True

# missing Ansible remediation
# - we need to track these as manual waivers, because the current lib/oscap.py
# logic checks only Bash remediation and there is no clear approach to
# extending it with Ansible that wouldn't break existing logic (ie. for rules
# that have only Bash remediation)
/hardening(/.+)?/ansible(/.+)?/audit_rules_unsuccessful_file_modification
/hardening(/.+)?/ansible(/.+)?/audit_rules_login_events
True

# the service_sssd_enabled will be failing even if the service is enabled
# because it requires manual configuration which cannot be attained with our rules
# note that there are cases when sssd can be started
Expand Down

0 comments on commit d295243

Please sign in to comment.