-
Task
-
Resolution: Done
-
Major
-
None
-
None
-
None
-
5
-
False
-
-
False
-
NEW
-
NEW
-
-
-
Sprint 258
Context
- In order to address security requirements images for our products should comply with FIPS as described here: https://docs.google.com/presentation/d/1o3IowxHX6BsnxGkIInaQ0lBgnn_K5Ex8jxwCYCeNsqs/edit#slide=id.g2679cb578c3_0_10
Outcomes
- all dynamic plugins owned by our team are FIPS compliant
- all dynamic plugins do not include Not compliant build options for Go
- Dynamic plugins list to be checked
- Troubleshooting panel
- Logging
- Monitoring
- Dashboards
- Distributed tracing
Steps
- Remove not compliant build options for Go
- Sync with QE to test in a FIPS compliant OS using the FIPS or Die feature, check if this tests can be automated
- Update COO midstream with the fix commit
Acceptance Criteria
- All golang-based containers use the ENV GOEXPERIMENT=strictfipsruntime.
- All golang-based containers use the ENV CGO_ENABLED=1.
- All golang-based containers use the build tag strictfipsruntime.
- All golang-based containers omit using static linking.
- All golang-based container omit using the build tag no_openssl.
- All containers use a runner base RHEL ELS image: e.g. registry.redhat.io/rhel9-4-els/rhel:9.4
- All images pass the check-payload checks successfully.
- links to
(6 links to)