Blame SOURCES/scap-security-guide-0.1.64-fix_enable_fips_mode_s390x-PR_9355.patch

32dbc1
From 61ff9fd6f455ee49608cab2c851a3819c180c30a Mon Sep 17 00:00:00 2001
32dbc1
From: Watson Sato <wsato@redhat.com>
32dbc1
Date: Tue, 16 Aug 2022 18:53:02 +0200
32dbc1
Subject: [PATCH] Don't fail rule if /etc/grubenv missing on s390x
32dbc1
32dbc1
There is no need to check  /etc/grubenv for fips=1 on s390x systems, it
32dbc1
uses zIPL.
32dbc1
---
32dbc1
 .../integrity/fips/enable_fips_mode/oval/shared.xml      | 9 ++++++++-
32dbc1
 1 file changed, 8 insertions(+), 1 deletion(-)
32dbc1
32dbc1
diff --git a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml
32dbc1
index 65056a654c6..7af675de0d3 100644
32dbc1
--- a/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml
32dbc1
+++ b/linux_os/guide/system/software/integrity/fips/enable_fips_mode/oval/shared.xml
32dbc1
@@ -7,9 +7,16 @@
32dbc1
       <extend_definition comment="Dracut FIPS module is enabled" definition_ref="enable_dracut_fips_module" />
32dbc1
       <extend_definition comment="system cryptography policy is configured" definition_ref="configure_crypto_policy" />
32dbc1
       <criterion comment="check if system crypto policy selection in var_system_crypto_policy in the profile is set to FIPS" test_ref="test_system_crypto_policy_value" />
32dbc1
-      {{% if product in ["ol8","rhel8"] %}}
32dbc1
+      {{% if product in ["ol8"] %}}
32dbc1
       
32dbc1
       test_ref="test_grubenv_fips_mode" />
32dbc1
+      {{% elif product in ["rhel8"] %}}
32dbc1
+      <criteria operator="OR">
32dbc1
+        
32dbc1
+        definition_ref="system_info_architecture_s390_64" />
32dbc1
+        
32dbc1
+        test_ref="test_grubenv_fips_mode" />
32dbc1
+      </criteria>
32dbc1
       {{% endif %}}
32dbc1
     </criteria>
32dbc1
   </definition>