-
Notifications
You must be signed in to change notification settings - Fork 709
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Firewall technology related rules per service and package change logic according to interactive profile variable #11818
Firewall technology related rules per service and package change logic according to interactive profile variable #11818
Conversation
Skipping CI for Draft Pull Request. |
🤖 A k8s content image for this PR is available at: Click here to see how to deploy itIf you alread have Compliance Operator deployed: Otherwise deploy the content and operator together by checking out ComplianceAsCode/compliance-operator and: |
/test all |
/packit build |
6188277
to
fc100a9
Compare
should we change this pr to work across different vendors? |
For the moment it is not necessary for Oracle Linux |
fc100a9
to
87ba124
Compare
… by ext varaiable The idea is the oval checks and remediation to check provided external variable, and thus honour if really to check/install/remove certain package or service
…et to be nftables
…set to be firewalld or iptables
…echnology is set to be firewalld or iptables
… is set to be iptables
…set to be iptables
…s set to be nftables or iptables
…y is set to be nftables or iptables
… set to be firewalld
…y is set to be firewalld
Given variable should actually mark the state in which package should not be removed because it is needed by the setup
Thanks to @Mab879 for raising the flag I missed that during rebase
I removed myself as assignee as, unfortunately, I won't be able to review/test it again for the next few weeks. |
504b19e
to
1e36548
Compare
1e36548
to
6ae92ca
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry, for the late review.
Hopefully we can get this moving along again.
.../guide/system/network/network-iptables/iptables_activation/service_iptables_enabled/rule.yml
Outdated
Show resolved
Hide resolved
linux_os/guide/system/network/network-nftables/service_nftables_enabled/rule.yml
Outdated
Show resolved
Hide resolved
Co-authored-by: Matthew Burket <[email protected]>
Co-authored-by: Matthew Burket <[email protected]>
Co-authored-by: Matthew Burket <[email protected]>
Thanks to @Mab879 for the support
Code Climate has analyzed commit 8f0fdfe and detected 6 issues on this pull request. Here's the issue category breakdown:
The test coverage on the diff in this pull request is 100.0% (50% is the threshold). This pull request will bring the total coverage in the repository to 61.9% (0.0% change). View more on Code Climate. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Waving the Automatus Tests as they pass locally.
Waving the Code Climate issues as I don't think they are worth solving.
Overriding CODEOWNERS since @teacup-on-rockingchair cannot merge his own PRs.
Thanks @teacup-on-rockingchair working on this for all this time.
Description:
Rationale:
Review Hints:
scap-workbench
or similar tool, or define a new alternative profile to the original one (CIS is currently the one having conflicting rules ) , or via command line arguments of theoscap
tool, if that is the weapon of choice to run checks and remediations.