Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-34982

The annotations for the deprecated rules should be updated

XMLWordPrintable

      Description of problem:

       

      The PR https://github.com/ComplianceAsCode/content/pull/11758  removes some rules from cis-1-4, nist and pci-dss profiles, which is working as expected. However, the annotations for the rules not get updated as they are showing the wrong control standards. Details seen from below:

       

       

      ##1. rule upstream-ocp4-api-server-api-priority-gate-enabled
      % oc get rule upstream-ocp4-api-server-api-priority-gate-enabled -o=jsonpath={.metadata.annotations} | jq -r
      {
        "compliance.openshift.io/image-digest": "pb-upstream-ocp4582qs",
        "compliance.openshift.io/profiles": "upstream-ocp4-stig,upstream-ocp4-stig-v1r1",
        "compliance.openshift.io/rule": "api-server-api-priority-gate-enabled",
        "control.compliance.openshift.io/CIS-OCP": "1.2.9",
        "control.compliance.openshift.io/NERC-CIP": "CIP-003-8 R6;CIP-004-6 R3;CIP-007-3 R6.1",
        "control.compliance.openshift.io/NIST-800-53": "CM-6;CM-6(1)",
        "control.compliance.openshift.io/PCI-DSS": "Req-2.2",
        "policies.open-cluster-management.io/controls": "CIP-003-8 R6,CIP-004-6 R3,CIP-007-3 R6.1,CM-6,CM-6(1),Req-2.2,1.2.9",
        "policies.open-cluster-management.io/standards": "NERC-CIP,NIST-800-53,PCI-DSS,CIS-OCP"
      }
      % oc get profile ocp4-cis -o yaml | grep api-server-api-priority-gate-enabled
      - ocp4-api-server-api-priority-gate-enabled
      % oc get profile upstream-ocp4-cis -o yaml | grep api-server-api-priority-gate-enabled
      % oc get profile upstream-ocp4-stig -o yaml | grep api-server-api-priority-gate-enabled
      - upstream-ocp4-api-server-api-priority-gate-enabled
      % oc get profile upstream-ocp4-pci-dss -o yaml | grep api-server-api-priority-gate-enabled
      % oc get profile upstream-ocp4-nerc-cip -o yaml | grep api-server-api-priority-gate-enabled
      ###2. rule upstream-ocp4-api-server-insecure-port
      % oc get rule upstream-ocp4-api-server-insecure-port -o=jsonpath={.metadata.annotations} | jq -r
      {
        "compliance.openshift.io/image-digest": "pb-upstream-ocp4582qs",
        "compliance.openshift.io/profiles": "upstream-ocp4-stig,upstream-ocp4-stig-v1r1",
        "compliance.openshift.io/rule": "api-server-insecure-port",
        "control.compliance.openshift.io/CIS-OCP": "1.2.17",
        "control.compliance.openshift.io/NERC-CIP": "CIP-003-8 R6;CIP-004-6 R3;CIP-007-3 R6.1",
        "control.compliance.openshift.io/NIST-800-53": "CM-6;CM-6(1)",
        "control.compliance.openshift.io/PCI-DSS": "Req-2.2;Req-2.3",
        "policies.open-cluster-management.io/controls": "CIP-003-8 R6,CIP-004-6 R3,CIP-007-3 R6.1,CM-6,CM-6(1),Req-2.2,Req-2.3,1.2.17",
        "policies.open-cluster-management.io/standards": "NERC-CIP,NIST-800-53,PCI-DSS,CIS-OCP"
      }
      % oc get profile ocp4-cis -o yaml | grep api-server-insecure-port                      
      - ocp4-api-server-insecure-port
      % oc get profile upstream-ocp4-cis -o yaml | grep api-server-insecure-port
      % oc get profile upstream-ocp4-stig -o yaml | grep api-server-insecure-port
      - upstream-ocp4-api-server-insecure-port
      % oc get profile upstream-ocp4-nerc-cip -o yaml | grep pi-server-insecure-port             
      % oc get profile upstream-ocp4-pci-dss -o yaml | grep api-server-insecure-port     
      

      Version-Release number of selected component (if applicable):

        https://github.com/ComplianceAsCode/content/pull/11758  

      How reproducible:

      Always    

      Steps to Reproduce:

      1. Install CO
      2. Deploy ghcr.io/complianceascode/k8scontent:11758     

      Actual results:

      The annotations for the rules not get updated as they are showing the wrong control standards.    

      Expected results:

      The rules should remove the control info for PCI DSS, NIST    

      Additional info:

          

              wenshen@redhat.com Vincent Shen
              xiyuan@redhat.com Xiaojie Yuan
              Xiaojie Yuan Xiaojie Yuan
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: