Blame SOURCES/scap-security-guide-0.1.64-fix_enable_fips_mode_s390x-PR_9355.patch

1053e7
From 61ff9fd6f455ee49608cab2c851a3819c180c30a Mon Sep 17 00:00:00 2001
1053e7
From: Watson Sato <wsato@redhat.com>
1053e7
Date: Tue, 16 Aug 2022 18:53:02 +0200
1053e7
Subject: [PATCH] Don't fail rule if /etc/grubenv missing on s390x
1053e7
1053e7
There is no need to check  /etc/grubenv for fips=1 on s390x systems, it
1053e7
uses zIPL.
1053e7
---
1053e7
 .../integrity/fips/enable_fips_mode/oval/shared.xml      | 9 ++++++++-
1053e7
 1 file changed, 8 insertions(+), 1 deletion(-)
1053e7
1053e7
diff --git a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml
1053e7
index 65056a654c6..7af675de0d3 100644
1053e7
--- a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml
1053e7
+++ b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml
1053e7
@@ -7,9 +7,16 @@
1053e7
       <extend_definition comment="Dracut FIPS module is enabled" definition_ref="enable_dracut_fips_module" />
1053e7
       <extend_definition comment="system cryptography policy is configured" definition_ref="configure_crypto_policy" />
1053e7
       <criterion comment="check if system crypto policy selection in var_system_crypto_policy in the profile is set to FIPS" test_ref="test_system_crypto_policy_value" />
1053e7
-      {{% if product in ["ol8","rhel8"] %}}
1053e7
+      {{% if product in ["ol8"] %}}
1053e7
       
1053e7
       test_ref="test_grubenv_fips_mode" />
1053e7
+      {{% elif product in ["rhel8"] %}}
1053e7
+      <criteria operator="OR">
1053e7
+        
1053e7
+        definition_ref="system_info_architecture_s390_64" />
1053e7
+        
1053e7
+        test_ref="test_grubenv_fips_mode" />
1053e7
+      </criteria>
1053e7
       {{% endif %}}
1053e7
     </criteria>
1053e7
   </definition>