Skip to content

Master#2

Merged
catmandx merged 1187 commits intocustomfrom
master
Mar 10, 2026
Merged

Master#2
catmandx merged 1187 commits intocustomfrom
master

Conversation

@catmandx
Copy link
Copy Markdown
Owner

Description:

  • Description here. Replace this text. Don't use the italics format!

Rationale:

Review Hints:

  • Review hints here. Replace this text. Don't use the italics format!

  • Use this optional section to give any relevant information which could help the reviewer to more quickly and assertively understand and test the changes.

  • Good examples are useful commands, if it is better to review all commits together or in a suggested sequence, any relevant discussion in other PRs or issues, etc.

vojtapolasek and others added 30 commits February 11, 2026 14:37
If remediating into dropin file, the execstart= (resetting the previous execstart definition) must precede the new definition.
…_selinux

Add audit monitoring for SELinux policy changes in /var/lib/selinux
…ks_part_sizes

rhel kickstarts: decrease some partition sizes
Signed-off-by: Alan Moore <alan.moore@canonical.com>
Signed-off-by: Alan Moore <alan.moore@canonical.com>
…_option_nodev_local_parts_vfat

mount_option_nodev_nonroot_local_partitions: ignore vfat partitions
…home_dirs_on_separate_partition

Add rule accounts_user_interactive_home_directory_on_separate_partition
Co-authored-by: Matthew Burket <m@tthewburket.com>
Mab879 and others added 29 commits March 3, 2026 14:03
Remove the package was causing issues in installs
…dabot/github_actions/mikepenz/release-changelog-builder-action-6.1.1

Bump mikepenz/release-changelog-builder-action from 6.1.0 to 6.1.1
Bumps [tj-actions/changed-files](https://github.com/tj-actions/changed-files) from 47.0.4 to 47.0.5.
- [Release notes](https://github.com/tj-actions/changed-files/releases)
- [Changelog](https://github.com/tj-actions/changed-files/blob/main/HISTORY.md)
- [Commits](tj-actions/changed-files@7dee1b0...22103cc)

---
updated-dependencies:
- dependency-name: tj-actions/changed-files
  dependency-version: 47.0.5
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
…dabot/github_actions/tj-actions/changed-files-47.0.5

Bump tj-actions/changed-files from 47.0.4 to 47.0.5
…22-611060

Remove nullok from common-auth on Ubuntu
…_rhel_cis

Move to service_dnsmasq_disabled for CIS in RHEL
Adjust RHEL 8 and RHEL 9 kickstarts to fit in 20 GB
We have discovered that after hardening a RHEL 9 system with CIS profile
people can't install any RPM packages using dnf. Originally, we thought
that the problem was caused by the recent PR
ComplianceAsCode#14316 but it isn't
caused by that because the problem is reproducible also with the latest
released version 0.1.79.  The actual reason is that the profile requires
GPG checks everywhere but the GPG key isn't installed because the CIS
profile doesn't contain rule `ensure_redhat_gpgkey_installed` that would
install the GPG key. The rule is listed in the CIS RHEL9 control file
but the requirement is manual. This is a bad user experience. In CIS
Benchmark, the requirement is manual, because of GPG keys for 3rd party
repositories.  But, add the rule `ensure_redhat_gpgkey_installed` to the
profile because the requirement 1.2.1.2 adds
`ensure_gpgcheck_never_disabled` which requires GPG key checking. If the
Red Hat GPG key wouldn't be installed, people won't be able to install
any RPM package using dnf.  Therefore, we will add the rule
`ensure_redhat_gpgkey_installed` to RHEL 9 CIS.
Add rule ensure_redhat_gpgkey_installed to RHEL 8 CIS and RHEL 10 CIS profiles.
Similar to previous commit
On RHEL 8, the GRUB configuration for UEFI is normally located at
`/boot/efi/EFI/redhat`. However, in RHEL 8 cloud images (eg. AWS)
the `/boot/efi/EFI/redhat/` contains a stub pointing to
`/boot/grub2/` and the actual configuration is located at the
`/boot/grub2/` directory.

Example stub in `/boot/efi/EFI/redhat/grub.cfg`:
```
search --no-floppy --set prefix --file /boot/grub2/grub.cfg
set prefix=($prefix)/boot/grub2
configfile $prefix/grub.cfg
```

In this commit, we extend the check to account for this special
configuration of the cloud images.

Fixes: ComplianceAsCode#13211
Remove `invalid_username.fail.sh` that configures an invalid GRUB user
name. The reason is that starting from
ComplianceAsCode#8438 the rule
`grub2_uefi_password` no longer checks user names, it only checks
passwords now, no an invalid user name can't make the rule fail.
Fix DISA alignment for configure_libreswan_crypto_policy
These rules configure hardware BIOS settings that vary by manufacturer
and model. While we cannot provide specific step-by-step instructions
that apply to all hardware, we now provide guidance directing users to
consult their hardware vendor documentation.

This resolves test failures in CMP-3815 where these MANUAL rules were
missing instructions:
- bios_disable_usb_boot
- wireless_disable_in_bios

These base rules generate the product-specific variants:
- rhcos4-high-master-bios-disable-usb-boot
- rhcos4-high-master-wireless-disable-in-bios
- rhcos4-high-worker-bios-disable-usb-boot
- rhcos4-high-worker-wireless-disable-in-bios

Related: ComplianceAsCode/compliance-operator#1051
add variable to network providers and add cilium per default
…add-bios-instructions

CMP-3815: Add OCIL instructions for BIOS configuration rules
…/sle_package_tftp-server_removed

Add tftp package definition for sle platforms
Add ensure_redhat_gpgkey_installed to RHEL CIS
…h-overrides-product-vars

Parameterize SSH-related file paths via product properties (preserve current defaults)
Support RHEL 8 cloud images in GRUB 2 rules
…/fix_sle16_pam_options

Fix sle16 pam options
@catmandx catmandx merged commit d9a08d8 into custom Mar 10, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.