-
It would be handy if it would be possible to define test parameters for a test as a part of a test name.
Example how it could look like:
```
discover:
test:
- /my/test/foo?PARAM1=bar&PARAM2…
-
### Description
I updated my ansible collection to use the latest release 9.0.0 expecting a common issue I was having in my playbooks to have being solved, but after the upgrade the issue persist.
…
-
**Describe the bug**
In the OS Hardening role SELinux will not be enabled if SELinux is already disabled
**Expected behavior**
Expect SELinux to be enabled and configured.
**Actual behavior**
…
bgbak updated
2 years ago
-
**Describe the bug**
After applying devsec.hardening.os_hardening role with the default settings the /usr/libexec/pcp/bin/pmlogger_daily command (and pmlogger_daily.service) fails. pmlogger_daily is…
-
When we harden the OS via content, some services may either not work, or have degraded functionality. This may be tracked by looking at their journal logs before vs after hardening, ideally on boot (a…
comps updated
3 months ago
-
We need to test a default setting for package removal, since the current state my be a little bit confusing for hardening implementors. See the following discussions:
- https://github.com/hardening-io…
-
Hi,
thank you for your software! I was toying around with your tool today and was also looking into other tools that are trying to achieve similar things. One thing I'm currently missing is the pos…
-
### The problem you're addressing (if any)
Qubes OS is marketed as "a reasonably secure operating system", leading users to expect comprehensive security hardening across all aspects of the system.…
-
See [this](https://github.com/dev-sec/linux-baseline/pull/44#issuecomment-287461148) discussion.
We should have a CI job here with master branch of chef-os-hardening
-
**Describe the bug**
SSH hardening regressed on Amazon Linux 1, no package `policycoreutils-python-utils` exists.
**Expected behavior**
Cookbook completes w/o error.
**Actual behavior**
```…