Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

[RFE-6859] Configurable cipher suites#13866

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Open
sluetze wants to merge8 commits intoComplianceAsCode:master
base:master
Choose a base branch
Loading
fromsluetze:configurable-cipher-suites

Conversation

@sluetze
Copy link
Contributor

@sluetzesluetze commentedSep 5, 2025
edited
Loading

Description:

This PR adds the ability to configure the cipher suites for the different components in OCP

It also adds remediations / makes them configurable and fixes some minor rendering issues in the texts.

Rationale:

  • Customers have to comply to different Security Standards

  • PCI-DSS, CIS, BSI see different Ciphers as secure

  • There is change in what is considered secure across the time, thus these ciphers might change

  • Customers will need time to move from one cipher-suite-set to another

  • Fixeshttps://issues.redhat.com/browse/RFE-6859

Review Hints:

Some of the fixes need openSSL Notation, while the checks check in IANA notation. This table should help mapping them

IANAopenSSLOCP IntermediateMozilla IntermediateBSIAPIServer
TLS_AES_128_GCM_SHA256TLS_AES_128_GCM_SHA256YESYESYESDefault
TLS_AES_256_GCM_SHA384TLS_AES_256_GCM_SHA384YESYESYESDefault
TLS_CHACHA20_POLY1305_SHA256TLS_CHACHA20_POLY1305_SHA256YESYESNODefault
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256ECDHE-ECDSA-AES128-GCM-SHA256YESYESYESDefault
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256ECDHE-RSA-AES128-GCM-SHA256YESYESYESDefault
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384ECDHE-ECDSA-AES256-GCM-SHA384YESYESYESDefault
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384ECDHE-RSA-AES256-GCM-SHA384YESYESYESDefault
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256ECDHE-ECDSA-CHACHA20-POLY1305YESYESNODefault
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256ECDHE-RSA-CHACHA20-POLY1305YESYESNODefault
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256DHE-RSA-AES128-GCM-SHA256YESYESYES
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384DHE-RSA-AES256-GCM-SHA384YESYESYES
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256DHE-RSA-CHACHA20-POLY1305NOYESNO

etcd:

  • The Regex is kinda complicated but looks for all TLS_ ciphers and matches them. Any TLS_ ciphers not in the list, let the regex fail.
  • there is no remediation, since etcd uses the ciphers configured in the apiserver. We could make this more obvious in the instructions.

apiserver:

  • the remediation might not work on HCP clusters.
  • the remediation will cause a administrative interruption (unavailability of oauth and apiserver for a couple of minutes)
  • I removed "AES256-GCM-SHA384" and "AES128-GCM-SHA256" as they are considered OLD and not part of intermediate profile (https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28recommended.29)
  • oc get apiserver cluster -oyaml does not provide the same output asoc get configmap config -n openshift-kube-apiserver -ojson | jq -r '.data["config.yaml"]' | jq '.servingInfo'. The format is different and also DHE-RSA-AES128-GCM-SHA256 and DHE-RSA-AES256-GCM-SHA384 are rejected
  • the BSI String does not include the DHE Ciphers, as they are considered insecure from 2029 on, while the Rest is considered secure for 2031+. As they wont be realistically used anyway due to the cipher order, we can leave them out.

ingresscontroller:

  • the order of the ciphers might not be perfect. I followed the preconfigured order of the old check.
  • I removed "AES256-GCM-SHA384" and "AES128-GCM-SHA256" as they are considered OLD and not part of intermediate profile (https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28recommended.29)
  • the default string in the tls_cipher_suite is identical to the one in the remediation. I would recommend to change this to the mozilla intermediate, as it puts TLS1.3 first. It also has a couple of DH algos (which are considered less secure all in all)

This are the result tables, of my manual tests:

configurationcomponentautomatic check BSIautomatic check defaultRemediation BSI
intermediate (default)apiserverfail (expected)passLGTM
intermediate (default)etcdfail (expected)passN.A (expected)
intermediate (default)ingresscontrollerfail (expected)passLGTM
intermediate (default)kubeletfail (expected)passLGTM
configurationcomponentautomatic check BSIautomatic check defaultRemediation BSI
after BSI RemediationapiserverPASSPASSWORKING (service interruption possible for control plane)
after BSI RemediationetcdPASSPASSN.A (expected)
after BSI RemediationingresscontrollerPASSPASSWORKING
after BSI RemediationkubeletPASSPASSWORKING (applied both master & worker at the same time), rerun BSI and default checks

While the changes to the BSI profile could be a separate PR, I think it is easier to use it directly in testing, as the pipeline will get triggered.

Examples of manually configured Tailored Profiles do look like that:

kind:TailoredProfileapiVersion:compliance.openshift.io/v1alpha1metadata:name:bsi-tr-02102-2-ocp4-nodenamespace:openshift-compliancespec:description:BSI Configuration for profileextends:upstream-ocp4-test-nodesetValues:    -name:upstream-ocp4-var-kubelet-tls-cipher-suitesrationale:KUBELET 2024-01-BSI-TR-02102-2value:'"TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384"'    -name:upstream-ocp4-var-kubelet-tls-cipher-suites-regexrationale:KUBELET 2024-01-BSI-TR-02102-2value:^(TLS_AES_128_GCM_SHA256|TLS_AES_256_GCM_SHA384|TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256|TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256|TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384|TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384|TLS_DHE_RSA_WITH_AES_128_GCM_SHA256|TLS_DHE_RSA_WITH_AES_256_GCM_SHA384)$title:My little TR-02102-2 node profile
kind:TailoredProfileapiVersion:compliance.openshift.io/v1alpha1metadata:name:bsi-tr-02102-2-ocp4namespace:openshift-compliancespec:description:BSI Configuration for profileextends:upstream-ocp4-testsetValues:    -name:upstream-ocp4-var-apiserver-tls-cipher-suitesrationale:APISERVER 2024-01-BSI-TR-02102-2value:'"TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","ECDHE-ECDSA-AES128-GCM-SHA256","ECDHE-RSA-AES128-GCM-SHA256","ECDHE-ECDSA-AES256-GCM-SHA384","ECDHE-RSA-AES256-GCM-SHA384"'    -name:upstream-ocp4-var-apiserver-tls-cipher-suites-regexrationale:APISERVER 2024-01-BSI-TR-02102-2value:^(TLS_AES_128_GCM_SHA256|TLS_AES_256_GCM_SHA384|TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256|TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256|TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384|TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384)$    -name:upstream-ocp4-var-etcd-tls-cipher-suites-regexrationale:ETCD 2024-01-BSI-TR-02102-2value:'value: \"(?=.*TLS_(?:AES_128_GCM_SHA256|AES_256_GCM_SHA384|ECDHE_ECDSA_WITH_AES_128_GCM_SHA256|ECDHE_RSA_WITH_AES_128_GCM_SHA256|ECDHE_ECDSA_WITH_AES_256_GCM_SHA384|ECDHE_RSA_WITH_AES_256_GCM_SHA384|DHE_RSA_WITH_AES_128_GCM_SHA256|DHE_RSA_WITH_AES_256_GCM_SHA384))(?!.*TLS_(?!AES_128_GCM_SHA256|AES_256_GCM_SHA384|ECDHE_ECDSA_WITH_AES_128_GCM_SHA256|ECDHE_RSA_WITH_AES_128_GCM_SHA256|ECDHE_ECDSA_WITH_AES_256_GCM_SHA384|ECDHE_RSA_WITH_AES_256_GCM_SHA384|DHE_RSA_WITH_AES_128_GCM_SHA256|DHE_RSA_WITH_AES_256_GCM_SHA384)[A-Z0-9_]+).*\"'    -name:upstream-ocp4-var-ingresscontroller-tls-cipher-suites-regexrationale:INGRESSCONTROLLER 2024-01-BSI-TR-02102-2value:^(TLS_AES_128_GCM_SHA256|TLS_AES_256_GCM_SHA384|ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-RSA-AES128-GCM-SHA256|ECDHE-ECDSA-AES256-GCM-SHA384|ECDHE-RSA-AES256-GCM-SHA384|DHE-RSA-AES128-GCM-SHA256|DHE-RSA-AES256-GCM-SHA384)$    -name:upstream-ocp4-var-ingresscontroller-tls-cipher-suitesrationale:INGRESSCONTROLLER 2024-01-BSI-TR-02102-2value:'"TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","ECDHE-ECDSA-AES128-GCM-SHA256","ECDHE-RSA-AES128-GCM-SHA256","ECDHE-ECDSA-AES256-GCM-SHA384","ECDHE-RSA-AES256-GCM-SHA384"'title: My little TR-02102-2 profiletitle:My little TR-02102-2 profile

@openshift-ciopenshift-cibot added the needs-ok-to-testUsed by openshift-ci bot. labelSep 5, 2025
@openshift-ci
Copy link

Hi@sluetze. Thanks for your PR.

I'm waiting for aComplianceAsCode member to verify that this patch is reasonable to test. If it is, they should reply with/ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors shouldjoin the org to skip this step.

Once the patch is verified, the new status will be reflected by theok-to-test label.

I understand the commands that are listedhere.

Instructions for interacting with me using PR comments are availablehere. If you have questions or suggestions related to my behavior, please file an issue against thekubernetes-sigs/prow repository.

@sluetzesluetzeforce-pushed theconfigurable-cipher-suites branch fromba1ccd4 to9b1071aCompareSeptember 9, 2025 07:29
type:Custom
custom:
ciphers:[ {{ .var_apiserver_tls_cipher_suites }} ]
minTLSVersion:VersionTLS12
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

I wonder if we should parameterize this, too? I'm thinking about cases where someone might want to force the cluster to use PQC-safe algorithms only available through TLS 1.3.

-TLS_AES_256_GCM_SHA384
-TLS_CHACHA20_POLY1305_SHA256
ciphers:[ {{ .var_ingresscontroller_tls_cipher_suites }} ]
minTLSVersion:VersionTLS12
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Similar comment here... Or, if we should consider a master switch for all min TLS versions?

Copy link
Collaborator

@rhmdndrhmdnd left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

This looks like a sound, reasonable change to make. Only curious if we also want to add a parameter for the minimum TLS version since I think that could be useful for people looking for PQC-safe algorithms.

@sluetze
Copy link
ContributorAuthor

sluetze commentedSep 24, 2025
edited
Loading

This looks like a sound, reasonable change to make. Only curious if we also want to add a parameter for the minimum TLS version since I think that could be useful for people looking for PQC-safe algorithms.

conclusion

We cannot remove the minTLSVersion option, as it is needed to apply the remediation.
If we make it configurable with a variable we have to ensure, that the variable is in sync with the currently existing rules (see table below).

From my understanding the minTLSVersion should not matter for the PQC usecase. If you want to ensure PQC safe ciphers, then just provide them in the Cipher list and no others. You do not need to set minTLSVersion here, as you will not have any TLS1.2 ciphers that you offer.

In my understanding theminTLSVersion is like a "filter" for the cipher list. if there isminTLSVersion: 1.3 the server offers only the configured ciphers from the cipherlist which are available in TLS 1.3.

that being said, I can create variables for the minTLSVersion, but for this I would also:

  • movetls_version_apiserver toapiserver_tls_min_version add variables for regex and text, and add a remediation
  • replacetls_version_masters_workers withkubelet_configure_tls_min_version and removetls_version_masters_workers
  • movetls_version_check_router toingress_controller_tls_min_version add variables for regex and text, and add a remediation

rationale:
I am not a hundert percent sure with the variable scopes, but iirc they are kind of "group scoped" so I need to move the rules to the same folder anyway. nevertheless it would be quite irritating if we would have a variable in a folder (i.e. networking) which is reused elsewhere (general). The renaming would fit in better with the rest of the rules.

risk: renaming the rules of course might break tailoredprofiles which exclude or include these rules.

long version

Oh no a rabbit-hole :(

There are separate rules for minTLSVersion

NameObjectvariableRegexRemediation
kubelet_configure_tls_min_versionkubeletYES (var_kubelet_tls_min_version andvar_kubelet_tls_min_version_regex"^(?!VersionTLS10|VersionTLS11)"YES with kubeletConfig
tls_version_apiserver/api/v1/namespaces/openshift-apiserver/configmaps/configNOVersionTLS1[2-9]{1}NO
tls_version_masters_workers/etc/kubernetes/kubelet.confNOVersionTLS1[2-9]{1}NO
tls_version_check_router/apis/apps/v1/namespaces/openshift-ingress/deployments/router-defaultNOTLSv1.[2-9]{1}NO
api_server_tls_security_profile_custom_min_tls_version/apis/config.openshift.io/v1/apiservers/clusterNO"^(?!VersionTLS10|VersionTLS11)"NO

the kubelet_configure_tls_min_version and tls_version_masters_workers check the same configuration but on different ways as far as I understand it. So they are redundant.

I wanted to understand the behavior of remediations which target the same part of the config and how they would interact. So I tested this with kubelet and ingresscontroller.

removing minTLSVersion

this seems to not be a good option.

security profile has invalid minimum security protocol version: ""

kubelet

I created a tailoredprofile upon the code of this branch, which checks, that only TLS1.3 is enabled AND only TLS1.3 Ciphers are used.

kind:TailoredProfileapiVersion:compliance.openshift.io/v1alpha1metadata:name:conflict-tailoredprofilenamespace:openshift-compliancespec:description:Example of a tailoredProfile that extends OCP4 FedRAMP Moderateextends:upstream-ocp4-bsi-nodesetValues:    -name:upstream-ocp4-var-kubelet-tls-cipher-suitesrationale:KUBELET 2024-01-BSI-TR-02102-2value:'"TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384"'    -name:upstream-ocp4-var-kubelet-tls-cipher-suites-regexrationale:KUBELET 2024-01-BSI-TR-02102-2value:^(TLS_AES_128_GCM_SHA256|TLS_AES_256_GCM_SHA384)$    -name:upstream-ocp4-var-kubelet-tls-min-versionrationale:CONFLICT TESTINGvalue:VersionTLS13    -name:upstream-ocp4-var-kubelet-tls-min-version-regexrationale:CONFLICT TESTINGvalue:^(?!VersionTLS10|VersionTLS11|VersionTLS12)title:conflict test---apiVersion:compliance.openshift.io/v1alpha1kind:ScanSettingBindingmetadata:name:conflict-profilenamespace:openshift-complianceprofiles:  -apiGroup:compliance.openshift.io/v1alpha1kind:TailoredProfilename:conflict-tailoredprofilesettingsRef:apiGroup:compliance.openshift.io/v1alpha1kind:ScanSettingname:default

The result were of course FAILS with the following remediations (x2 for compute and control):

spec:apply:falsecurrent:object:apiVersion:machineconfiguration.openshift.io/v1kind:KubeletConfigspec:kubeletConfig:tlsCipherSuites:            -TLS_AES_128_GCM_SHA256            -TLS_AES_256_GCM_SHA384
spec:apply:falsecurrent:object:apiVersion:machineconfiguration.openshift.io/v1kind:KubeletConfigspec:kubeletConfig:tlsMinVersion:VersionTLS13

I applied both of them and they are compatible with each other.

In this case the fields are two separate fields in the config.

Ingresscontroller

for Ingresscontroller I tried to solve it with the TLSProfiles.

so I modified the remediations in the code like:

---# platform = multi_platform_ocpapiVersion:operator.openshift.io/v1kind:IngressControllermetadata:name:defaultnamespace:openshift-ingress-operatorspec:tlsSecurityProfile:custom:minTLSVersion:VersionTLS13type:Custom---# platform = multi_platform_ocpapiVersion:operator.openshift.io/v1kind:IngressControllermetadata:name:defaultnamespace:openshift-ingress-operatorspec:tlsSecurityProfile:custom:ciphers:[ {{ .var_ingresscontroller_tls_cipher_suites }} ]type:Custom

and hardcoded the tlsminversion intls_version_check_router
- value: "TLSv1.[3-9]{1}"

create tailoredprofile which demands TLS1.3 and special ciphers

kind:TailoredProfileapiVersion:compliance.openshift.io/v1alpha1metadata:name:ingress-tailoredprofilenamespace:openshift-compliancespec:description:Example of a tailoredProfile that extends OCP4 FedRAMP Moderateextends:upstream-ocp4-bsienableRules:    -name:upstream-ocp4-tls-version-check-routerrationale:need to test this!setValues:    -name:upstream-ocp4-var-ingresscontroller-tls-cipher-suites-regexrationale:KUBELET 2024-01-BSI-TR-02102-2value:^(TLS_AES_128_GCM_SHA256|TLS_AES_256_GCM_SHA384)$    -name:upstream-ocp4-var-ingresscontroller-tls-cipher-suitesrationale:KUBELET 2024-01-BSI-TR-02102-2value:'"TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384"'title:conflict test---apiVersion:compliance.openshift.io/v1alpha1kind:ScanSettingBindingmetadata:name:ingress-profilenamespace:openshift-complianceprofiles:  -apiGroup:compliance.openshift.io/v1alpha1kind:TailoredProfilename:ingress-tailoredprofilesettingsRef:apiGroup:compliance.openshift.io/v1alpha1kind:ScanSettingname:default

this resulted in the following remediations

spec:apply:falsecurrent:object:apiVersion:operator.openshift.io/v1kind:IngressControllermetadata:name:defaultnamespace:openshift-ingress-operatorspec:tlsSecurityProfile:custom:ciphers:              -TLS_AES_128_GCM_SHA256              -TLS_AES_256_GCM_SHA384type:Custom---spec:apply:falsecurrent:object:apiVersion:operator.openshift.io/v1kind:IngressControllermetadata:name:defaultnamespace:openshift-ingress-operatorspec:tlsSecurityProfile:custom:minTLSVersion:VersionTLS13type:Custom

apply both remediations with the result in the default ingresscontroller

tlsSecurityProfile:custom:ciphers:        -TLS_AES_128_GCM_SHA256        -TLS_AES_256_GCM_SHA384minTLSVersion:VersionTLS13type:Custom

obviously concurrent remediations work, as long as they do not overlap. (I did not test overlapping ones, but cannot think of good results).

rhmdnd reacted with thumbs up emoji

@rhmdnd
Copy link
Collaborator

/test

@openshift-ci
Copy link

@rhmdnd: The/test command needs one or more targets.
The following commands are available to trigger required jobs:

/test 4.12-e2e-aws-ocp4-cis
/test 4.12-e2e-aws-ocp4-cis-node
/test 4.12-e2e-aws-ocp4-e8
/test 4.12-e2e-aws-ocp4-high
/test 4.12-e2e-aws-ocp4-high-node
/test 4.12-e2e-aws-ocp4-moderate
/test 4.12-e2e-aws-ocp4-moderate-node
/test 4.12-e2e-aws-ocp4-pci-dss
/test 4.12-e2e-aws-ocp4-pci-dss-4-0
/test 4.12-e2e-aws-ocp4-pci-dss-node
/test 4.12-e2e-aws-ocp4-pci-dss-node-4-0
/test 4.12-e2e-aws-ocp4-stig
/test 4.12-e2e-aws-ocp4-stig-node
/test 4.12-e2e-aws-rhcos4-e8
/test 4.12-e2e-aws-rhcos4-high
/test 4.12-e2e-aws-rhcos4-moderate
/test 4.12-e2e-aws-rhcos4-stig
/test 4.12-images
/test 4.14-e2e-aws-ocp4-bsi
/test 4.14-e2e-aws-ocp4-bsi-node
/test 4.14-e2e-aws-ocp4-pci-dss-4-0
/test 4.14-e2e-aws-ocp4-pci-dss-node-4-0
/test 4.14-e2e-aws-rhcos4-bsi
/test 4.14-images
/test 4.16-e2e-aws-ocp4-bsi
/test 4.16-e2e-aws-ocp4-bsi-node
/test 4.16-e2e-aws-ocp4-cis
/test 4.16-e2e-aws-ocp4-cis-node
/test 4.16-e2e-aws-ocp4-e8
/test 4.16-e2e-aws-ocp4-high
/test 4.16-e2e-aws-ocp4-high-node
/test 4.16-e2e-aws-ocp4-moderate
/test 4.16-e2e-aws-ocp4-moderate-node
/test 4.16-e2e-aws-ocp4-pci-dss
/test 4.16-e2e-aws-ocp4-pci-dss-4-0
/test 4.16-e2e-aws-ocp4-pci-dss-node
/test 4.16-e2e-aws-ocp4-pci-dss-node-4-0
/test 4.16-e2e-aws-ocp4-stig
/test 4.16-e2e-aws-ocp4-stig-node
/test 4.16-e2e-aws-rhcos4-bsi
/test 4.16-e2e-aws-rhcos4-e8
/test 4.16-e2e-aws-rhcos4-high
/test 4.16-e2e-aws-rhcos4-moderate
/test 4.16-e2e-aws-rhcos4-stig
/test 4.16-images
/test 4.17-e2e-aws-ocp4-bsi
/test 4.17-e2e-aws-ocp4-bsi-node
/test 4.17-e2e-aws-ocp4-cis
/test 4.17-e2e-aws-ocp4-cis-node
/test 4.17-e2e-aws-ocp4-e8
/test 4.17-e2e-aws-ocp4-high
/test 4.17-e2e-aws-ocp4-high-node
/test 4.17-e2e-aws-ocp4-moderate
/test 4.17-e2e-aws-ocp4-moderate-node
/test 4.17-e2e-aws-ocp4-pci-dss
/test 4.17-e2e-aws-ocp4-pci-dss-4-0
/test 4.17-e2e-aws-ocp4-pci-dss-node
/test 4.17-e2e-aws-ocp4-pci-dss-node-4-0
/test 4.17-e2e-aws-ocp4-stig
/test 4.17-e2e-aws-ocp4-stig-node
/test 4.17-e2e-aws-rhcos4-bsi
/test 4.17-e2e-aws-rhcos4-e8
/test 4.17-e2e-aws-rhcos4-high
/test 4.17-e2e-aws-rhcos4-moderate
/test 4.17-e2e-aws-rhcos4-stig
/test 4.17-images
/test 4.18-e2e-aws-ocp4-bsi
/test 4.18-e2e-aws-ocp4-bsi-node
/test 4.18-e2e-aws-ocp4-cis
/test 4.18-e2e-aws-ocp4-cis-node
/test 4.18-e2e-aws-ocp4-e8
/test 4.18-e2e-aws-ocp4-high
/test 4.18-e2e-aws-ocp4-high-node
/test 4.18-e2e-aws-ocp4-moderate
/test 4.18-e2e-aws-ocp4-moderate-node
/test 4.18-e2e-aws-ocp4-pci-dss
/test 4.18-e2e-aws-ocp4-pci-dss-4-0
/test 4.18-e2e-aws-ocp4-pci-dss-node
/test 4.18-e2e-aws-ocp4-pci-dss-node-4-0
/test 4.18-e2e-aws-ocp4-stig
/test 4.18-e2e-aws-ocp4-stig-node
/test 4.18-e2e-aws-rhcos4-bsi
/test 4.18-e2e-aws-rhcos4-e8
/test 4.18-e2e-aws-rhcos4-high
/test 4.18-e2e-aws-rhcos4-moderate
/test 4.18-e2e-aws-rhcos4-stig
/test 4.18-images
/test 4.19-e2e-aws-ocp4-bsi
/test 4.19-e2e-aws-ocp4-bsi-node
/test 4.19-e2e-aws-ocp4-cis
/test 4.19-e2e-aws-ocp4-cis-node
/test 4.19-e2e-aws-ocp4-e8
/test 4.19-e2e-aws-ocp4-high
/test 4.19-e2e-aws-ocp4-high-node
/test 4.19-e2e-aws-ocp4-moderate
/test 4.19-e2e-aws-ocp4-moderate-node
/test 4.19-e2e-aws-ocp4-pci-dss
/test 4.19-e2e-aws-ocp4-pci-dss-4-0
/test 4.19-e2e-aws-ocp4-pci-dss-node
/test 4.19-e2e-aws-ocp4-pci-dss-node-4-0
/test 4.19-e2e-aws-ocp4-stig
/test 4.19-e2e-aws-ocp4-stig-node
/test 4.19-e2e-aws-rhcos4-bsi
/test 4.19-e2e-aws-rhcos4-e8
/test 4.19-e2e-aws-rhcos4-high
/test 4.19-e2e-aws-rhcos4-moderate
/test 4.19-e2e-aws-rhcos4-stig
/test 4.19-e2e-rosa-ocp4-cis-node
/test 4.19-e2e-rosa-ocp4-pci-dss-node
/test 4.19-images
/test e2e-aws-ocp4-bsi
/test e2e-aws-ocp4-bsi-node
/test e2e-aws-ocp4-cis
/test e2e-aws-ocp4-cis-arm
/test e2e-aws-ocp4-cis-node
/test e2e-aws-ocp4-cis-node-arm
/test e2e-aws-ocp4-e8
/test e2e-aws-ocp4-high
/test e2e-aws-ocp4-high-node
/test e2e-aws-ocp4-moderate
/test e2e-aws-ocp4-moderate-arm
/test e2e-aws-ocp4-moderate-node
/test e2e-aws-ocp4-moderate-node-arm
/test e2e-aws-ocp4-pci-dss
/test e2e-aws-ocp4-pci-dss-4-0
/test e2e-aws-ocp4-pci-dss-node
/test e2e-aws-ocp4-pci-dss-node-4-0
/test e2e-aws-ocp4-stig
/test e2e-aws-ocp4-stig-node
/test e2e-aws-openshift-node-compliance
/test e2e-aws-openshift-platform-compliance
/test e2e-aws-rhcos4-bsi
/test e2e-aws-rhcos4-e8
/test e2e-aws-rhcos4-high
/test e2e-aws-rhcos4-moderate
/test e2e-aws-rhcos4-moderate-arm
/test e2e-aws-rhcos4-stig
/test images

Use/test all to run the following jobs that were automatically triggered:

pull-ci-ComplianceAsCode-content-master-4.12-images
pull-ci-ComplianceAsCode-content-master-4.14-images
pull-ci-ComplianceAsCode-content-master-4.16-images
pull-ci-ComplianceAsCode-content-master-4.17-images
pull-ci-ComplianceAsCode-content-master-4.18-images
pull-ci-ComplianceAsCode-content-master-4.19-images
pull-ci-ComplianceAsCode-content-master-e2e-aws-openshift-node-compliance
pull-ci-ComplianceAsCode-content-master-e2e-aws-openshift-platform-compliance
pull-ci-ComplianceAsCode-content-master-images

In response tothis:

/test

Instructions for interacting with me using PR comments are availablehere. If you have questions or suggestions related to my behavior, please file an issue against thekubernetes-sigs/prow repository.

@rhmdnd
Copy link
Collaborator

/test 4.19-e2e-aws-ocp4-pci-dss

@rhmdnd
Copy link
Collaborator

/test 4.19-e2e-aws-ocp4-bsi

@rhmdnd
Copy link
Collaborator

/test 4.12-e2e-aws-ocp4-pci-dss
/test 4.14-e2e-aws-ocp4-bsi

Testing against some older clusters to see what those rules do with potentially different defaults.

@openshift-ci
Copy link

@sluetze: The following testfailed, say/retest to rerun all failed tests or/retest-required to rerun all mandatory failed tests:

Test nameCommitDetailsRequiredRerun command
ci/prow/4.12-e2e-aws-ocp4-pci-dss9b1071alinktrue/test 4.12-e2e-aws-ocp4-pci-dss

Full PR test history.Your PR dashboard.

Instructions for interacting with me using PR comments are availablehere. If you have questions or suggestions related to my behavior, please file an issue against thekubernetes-sigs/prow repository. I understand the commands that are listedhere.

@jan-cernyjan-cerny added the OpenShiftOpenShift product related. labelOct 13, 2025
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

@rhmdndrhmdndrhmdnd left review comments

At least 1 approving review is required to merge this pull request.

Assignees

No one assigned

Labels

needs-ok-to-testUsed by openshift-ci bot.OpenShiftOpenShift product related.

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

3 participants

@sluetze@rhmdnd@jan-cerny

[8]ページ先頭

©2009-2025 Movatter.jp