-
Notifications
You must be signed in to change notification settings - Fork 23
CI: Set RL9 crypto policy to DEFAULT (Caracal) #2086
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
This should resolve SSH issues with some modern key types such as ed25519. (cherry picked from commit f4b85ef)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request updates the RHEL 9 crypto policy to DEFAULT for CI environments to resolve issues with ed25519 SSH keys. The changes involve modifying an Ansible playbook to conditionally assert key types based on the crypto policy and updating CI environment variables to set the new policy. The changes are logical and well-explained. I have one suggestion to improve the robustness of the conditional check in the Ansible playbook by making it more specific to RHEL 9.
| - ssh_key_type != 'ed25519' | ||
| fail_msg: FIPS policy does not currently support ed25519 SSH keys on RHEL family systems | ||
| when: ansible_facts.os_family == 'RedHat' | ||
| when: ansible_facts.os_family == 'RedHat' and rhel9cis_crypto_policy == 'FIPS' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The variable rhel9cis_crypto_policy is specific to RHEL 9, but this when condition could apply to other RedHat family OS versions. To avoid potential issues and make the condition more explicit, it would be better to also check for the distribution major version.
when: ansible_facts.os_family == 'RedHat' and ansible_facts.distribution_major_version == '9' and rhel9cis_crypto_policy == 'FIPS'
This should resolve SSH issues with some modern key types such as ed25519.
(cherry picked from commit f4b85ef)