Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add ansible remediation for aide_use_fips_hashes rule #12327

Merged

Conversation

mrkanon
Copy link
Contributor

@mrkanon mrkanon commented Aug 21, 2024

Description:

Added
Ansible remediation

Rationale:

In the task filling gaps in OL9 automation, the rule aide_use_fips_hashes has a remediation deficit with ansible. The remediation logic was adapted from bash remediation, the residual + verification steps was reduced in the regex to remove forbidden hashes and also the approach prioritize the use of the regex before the loops handled in bash remediation.

In addition to the test of automatus tool, the following scenario was tested to ensure the correct remediation behavior.

All = p+i+n+u+g+sha1+s+m+S+acl+xattrs+selinux
option = yes
Group = sha1+selinux+sha256

With the following result:

All = p+i+n+u+g+s+m+S+acl+xattrs+selinux+sha512
option = yes
Group = selinux+sha512

For aide_use_fips_hashes rule

Signed-off-by: Armando Acosta <[email protected]>
@openshift-ci openshift-ci bot added the needs-ok-to-test Used by openshift-ci bot. label Aug 21, 2024
Copy link

openshift-ci bot commented Aug 21, 2024

Hi @mrkanon. Thanks for your PR.

I'm waiting for a ComplianceAsCode member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Copy link

Start a new ephemeral environment with changes proposed in this pull request:

rhel8 (from CTF) Environment (using Fedora as testing environment)
Open in Gitpod

Fedora Testing Environment
Open in Gitpod

Oracle Linux 8 Environment
Open in Gitpod

Copy link

This datastream diff is auto generated by the check Compare DS/Generate Diff

Click here to see the full diff
New data stream adds ansible remediation for rule 'xccdf_org.ssgproject.content_rule_aide_use_fips_hashes'.

Copy link

🤖 A k8s content image for this PR is available at:
ghcr.io/complianceascode/k8scontent:12327
This image was built from commit: c11f84d

Click here to see how to deploy it

If you alread have Compliance Operator deployed:
utils/build_ds_container.py -i ghcr.io/complianceascode/k8scontent:12327

Otherwise deploy the content and operator together by checking out ComplianceAsCode/compliance-operator and:
CONTENT_IMAGE=ghcr.io/complianceascode/k8scontent:12327 make deploy-local

Copy link

codeclimate bot commented Aug 22, 2024

Code Climate has analyzed commit c11f84d and detected 0 issues on this pull request.

The test coverage on the diff in this pull request is 100.0% (50% is the threshold).

This pull request will bring the total coverage in the repository to 59.4% (0.0% change).

View more on Code Climate.

@jan-cerny jan-cerny self-assigned this Aug 26, 2024
@jan-cerny jan-cerny added this to the 0.1.75 milestone Aug 26, 2024
Copy link
Collaborator

@jan-cerny jan-cerny left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

jcerny@fedora:~/work/git/scap-security-guide (pr/12327)$ python3 tests/automatus.py rule --libvirt qemu:///system ssgts_rhel8 --remediate-using ansible aide_use_fips_hashes
Setting console output to log level INFO
INFO - The base image option has not been specified, choosing libvirt-based test environment.
INFO - Logging into /home/jcerny/work/git/scap-security-guide/logs/rule-custom-2024-08-26-1329/test_suite.log
INFO - xccdf_org.ssgproject.content_rule_aide_use_fips_hashes
INFO - Script correct_value.pass.sh using profile (all) OK
INFO - Script wrong_value.fail.sh using profile (all) OK

@jan-cerny jan-cerny merged commit f7d955d into ComplianceAsCode:master Aug 26, 2024
88 of 91 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
needs-ok-to-test Used by openshift-ci bot.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants