Hello Jan,

  thank you for your report.

  (Replied in your ticket, but replying also here).

----- Original Message -----
> From: "Jan Cerny" <[email protected]>
> To: "SCAP Security Guide" <[email protected]>
> Sent: Monday, August 3, 2015 4:23:06 PM
> Subject: "Make validate" fails
> 
> Hello,
> 
> I have run make validate on RHEL7 content from current SSG upstream.
> Make validate fails because there are many invalid references to
> non-existent OVAL definitions.

While not tracked via SSG ticket yet, this has been known issue.

> 
> Moreover, I have discovered that "validate" target in SSG Makefile
> is commented out for RHEL7, OpenStack and RHEVM3 content. It's commented
> out since August 2014. I think this is very unpleasant because we haven't
> validated the RHEL content for a long time.

Just to clarify - it's not the case the RHEL/7 content would be failing for
couple of rules, and instead of fixing it, we would comment the ```make 
validate```
target out. In fact, the RHEL/7 content has never ever been in such a state 
(since
it's creation) we could switch the ```make validate``` target on (there has been
a lot of failing rules from the start). Actually if you would checkout the 
repository
content for RHEL/7 in the state it was in August 2014, and compare with the 
current
state, you would notice that since that time there are less rules failing that 
it
were previously. We are progressing against the goal (```make validate``` target
for RHEL/7 content to start passing too -- in that moment we could switch it 
on),
but right now we are not that far yet. -- Help / contributions appreciated here.

If someone is searching a way how to contribute to SSG, and wouldn't want to
participate in creating new XCCDF rules / OVAL checks / remediations, this 
concrete
issue is another place where help would be appreciated.


For the case of 'RHEVM3' and 'Openstack' products the situation is even worse. 
If you
would have a look at the actual content - rules present in these products, you 
would
find out, there are not rules present at all (IOW the whole 'RHEVM3' and 
'Openstack'
folders are just 'templated' directory copies created when new product is 
created).

For now, since benchmarks for these two products do not contain valuable SCAP 
(XCCDF &&
OVAL content), the ```make validate``` target is disabled for them for now. And 
that
also being the reason why we are not packaging these benchmarks when making RPM 
from
upstream code or in RPMs distributed in downstream releases.

> 
> I have filed an issue on github:
> https://github.com/OpenSCAP/scap-security-guide/issues/635

Thanks! (For now I have set 0.1.25 target release for fixing that one,
but take this just as a tentative estimation -- subject of change for now).


Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Technologies Team

> 
> Regards
> 
> Jan Černý
> Security Technologies | Red Hat, Inc.
> 
> --
> SCAP Security Guide mailing list
> [email protected]
> https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
> https://github.com/OpenSCAP/scap-security-guide/
-- 
SCAP Security Guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
https://github.com/OpenSCAP/scap-security-guide/

Reply via email to