From 35a774200999ac2fca48693c1c169bf99d2f63ea Mon Sep 17 00:00:00 2001 From: Brad Bishop Date: Tue, 26 May 2020 13:25:03 -0400 Subject: reset upstream subtrees to HEAD Reset the following subtrees on HEAD: poky: ed3bdd7fbc(dunfell) meta-raspberrypi: 8066fac91d(dunfell) meta-security: d83f7cb0c9(dunfell) meta-openembedded: e413c1ef62(dunfell) Change-Id: Ifd3228663b08911c890d7631310294cccb3dd232 Signed-off-by: Brad Bishop --- meta-security/README | 7 + meta-security/classes/dm-verity-img.bbclass | 88 + meta-security/conf/layer.conf | 2 +- meta-security/meta-integrity/conf/layer.conf | 2 +- .../meta-security-compliance/conf/layer.conf | 2 +- .../recipes-auditors/lynis/lynis_2.7.5.bb | 2 +- .../openscap-daemon/openscap-daemon_0.1.10.bb | 5 +- ...parsing-of-the-remediation-functions-file.patch | 39 + ...roken-fix-when-greedy-regex-ate-the-whole.patch | 35 + .../scap-security-guide/scap-security-guide.inc | 3 + .../scap-security-guide/scap-security-guide_git.bb | 5 +- meta-security/meta-security-isafw/.gitignore | 2 + meta-security/meta-security-isafw/COPYING.MIT | 17 + meta-security/meta-security-isafw/README.md | 92 + meta-security/meta-security-isafw/conf/layer.conf | 17 + .../meta-security-isafw/lib/isafw/__init__.py | 40 + .../meta-security-isafw/lib/isafw/isafw.py | 158 ++ .../lib/isafw/isaplugins/ISA_cfa_plugin.py | 392 +++ .../lib/isafw/isaplugins/ISA_cve_plugin.py | 217 ++ .../lib/isafw/isaplugins/ISA_fsa_plugin.py | 185 ++ .../lib/isafw/isaplugins/ISA_kca_plugin.py | 323 +++ .../lib/isafw/isaplugins/ISA_la_plugin.py | 273 +++ .../lib/isafw/isaplugins/__init__.py | 42 + .../lib/isafw/isaplugins/configs/__init__.py | 0 .../lib/isafw/isaplugins/configs/kca/__init__.py | 0 .../lib/isafw/isaplugins/configs/kca/arm.py | 24 + .../lib/isafw/isaplugins/configs/kca/common.py | 242 ++ .../lib/isafw/isaplugins/configs/kca/x86.py | 38 + .../isafw/isaplugins/configs/la/approved-non-osi | 43 + .../lib/isafw/isaplugins/configs/la/exceptions | 0 .../lib/isafw/isaplugins/configs/la/licenses | 105 + .../lib/isafw/isaplugins/configs/la/violations | 7 + .../recipes-devtools/checksec/checksec_1.5-1.bb | 25 + .../meta-security-isfafw/classes/isafw.bbclass | 318 +++ meta-security/meta-tpm/conf/layer.conf | 2 +- .../recipes-kernel/linux/linux-yocto_4.%.bbappend | 17 - .../recipes-kernel/linux/linux-yocto_5.%.bbappend | 17 + .../meta-tpm/recipes-tpm/libtpm/libtpm_0.7.0.bb | 2 +- .../meta-tpm/recipes-tpm/swtpm/swtpm_0.2.0.bb | 1 + .../ibmswtpm2/files/remove_optimization.patch | 26 + .../recipes-tpm2/ibmswtpm2/ibmswtpm2_1332.bb | 24 - .../recipes-tpm2/ibmswtpm2/ibmswtpm2_1563.bb | 27 + .../tpm2-tcti-uefi/files/fix_header_file.patch | 25 + .../tpm2-tcti-uefi/files/tpm2-get-caps-fixed.patch | 23 + ...c-stop-inserting-host-directories-into-co.patch | 13 +- .../tpm2-tcti-uefi/tpm2-tcti-uefi_0.9.9.bb | 28 +- .../recipes-tpm2/tpm2-tools/tpm2-tools_4.0.1.bb | 14 - .../recipes-tpm2/tpm2-tools/tpm2-tools_4.1.1.bb | 17 + .../recipes-tpm2/tpm2-tss/tpm2-tss_2.3.1.bb | 81 - .../recipes-tpm2/tpm2-tss/tpm2-tss_2.3.2.bb | 81 + .../images/dm-verity-image-initramfs.bb | 26 + .../initrdscripts/initramfs-dm-verity.bb | 13 + .../initramfs-dm-verity/init-dm-verity.sh | 46 + .../files/fix-build-with-new-version-attr.patch | 73 + .../samhain/files/samhain-server-volatiles.conf | 1 + .../recipes-ids/samhain/samhain-server.bb | 16 +- meta-security/recipes-ids/samhain/samhain.inc | 7 +- .../recipes-kernel/linux/linux-yocto-dev.bbappend | 2 +- .../recipes-kernel/linux/linux-yocto_4.%.bbappend | 2 - .../recipes-kernel/linux/linux-yocto_5.%.bbappend | 2 + .../recipes-mac/AppArmor/apparmor_2.13.3.bb | 198 -- .../recipes-mac/AppArmor/apparmor_2.13.4.bb | 198 ++ .../recipes-scanners/arpwatch/arpwatch_3.0.bb | 79 + .../recipes-scanners/arpwatch/files/arpwatch.conf | 23 + .../arpwatch/files/arpwatch.default | 7 + .../recipes-scanners/arpwatch/files/arpwatch_init | 123 + .../arpwatch/files/host_contam_fix.patch | 21 + .../arpwatch/files/postfix_workaround.patch | 91 + .../buck-security/buck-security_0.7.bb | 45 + .../recipes-scanners/checksec/checksec_2.1.0.bb | 19 + .../checksecurity/checksecurity_2.0.15.bb | 21 + .../check-setuid-use-more-portable-find-args.patch | 23 + .../checksecurity/files/setuid-log-folder.patch | 52 + .../recipes-scanners/clamav/clamav_0.101.5.bb | 169 ++ .../clamav/files/clamav-freshclam.service | 12 + .../clamav/files/clamav-milter.conf.sample | 293 +++ .../recipes-scanners/clamav/files/clamav.service | 17 + .../recipes-scanners/clamav/files/clamd.conf | 595 +++++ .../clamav/files/freshclam-native.conf | 224 ++ .../recipes-scanners/clamav/files/freshclam.conf | 224 ++ .../recipes-scanners/clamav/files/tmpfiles.clamav | 3 + .../clamav/files/volatiles.03_clamav | 3 + .../recipes-scanners/rootkits/chkrootkit_0.53.bb | 48 + .../bastille/files/set_required_questions.py | 4 +- .../buck-security/buck-security_0.7.bb | 63 - .../recipes-security/checksec/checksec_2.1.0.bb | 19 - .../checksecurity/checksecurity_2.0.15.bb | 21 - .../check-setuid-use-more-portable-find-args.patch | 23 - .../checksecurity/files/setuid-log-folder.patch | 52 - .../recipes-security/clamav/clamav_0.101.5.bb | 169 -- .../clamav/files/clamav-freshclam.service | 12 - .../clamav/files/clamav-milter.conf.sample | 293 --- .../recipes-security/clamav/files/clamav.service | 17 - .../recipes-security/clamav/files/clamd.conf | 595 ----- .../clamav/files/freshclam-native.conf | 224 -- .../recipes-security/clamav/files/freshclam.conf | 224 -- .../recipes-security/clamav/files/tmpfiles.clamav | 3 - .../clamav/files/volatiles.03_clamav | 3 - .../ecryptfs-utils/ecryptfs-utils_111.bb | 2 +- .../0001-python3-fail2ban-2-3-conversion.patch | 2527 ++++++++++++++++++++ .../fail2ban/files/fail2ban_setup.py | 1 - .../fail2ban/python3-fail2ban_0.10.4.0.bb | 26 +- .../google-authenticator-libpam_1.07.bb | 20 - .../google-authenticator-libpam_1.08.bb | 23 + .../images/security-client-image.bb | 3 +- .../images/security-server-image.bb | 3 +- ...on-__SNR_xxx-instead-of-__NR_xxx-for-sysc.patch | 45 - .../libseccomp/libseccomp_2.4.2.bb | 44 - .../libseccomp/libseccomp_2.4.3.bb | 43 + .../sssd/files/fix-ldblibdir.patch | 25 + .../recipes-security/sssd/files/volatiles.99_sssd | 1 + meta-security/recipes-security/sssd/sssd_1.16.4.bb | 78 +- meta-security/wic/beaglebone-yocto-verity.wks.in | 15 + 113 files changed, 8171 insertions(+), 2231 deletions(-) create mode 100644 meta-security/classes/dm-verity-img.bbclass create mode 100644 meta-security/meta-security-compliance/recipes-openscap/scap-security-guide/files/0001-Fix-XML-parsing-of-the-remediation-functions-file.patch create mode 100644 meta-security/meta-security-compliance/recipes-openscap/scap-security-guide/files/0002-Fixed-the-broken-fix-when-greedy-regex-ate-the-whole.patch create mode 100644 meta-security/meta-security-isafw/.gitignore create mode 100644 meta-security/meta-security-isafw/COPYING.MIT create mode 100644 meta-security/meta-security-isafw/README.md create mode 100644 meta-security/meta-security-isafw/conf/layer.conf create mode 100644 meta-security/meta-security-isafw/lib/isafw/__init__.py create mode 100644 meta-security/meta-security-isafw/lib/isafw/isafw.py create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/ISA_cfa_plugin.py create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/ISA_cve_plugin.py create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/ISA_fsa_plugin.py create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/ISA_kca_plugin.py create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/ISA_la_plugin.py create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/__init__.py create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/configs/__init__.py create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/configs/kca/__init__.py create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/configs/kca/arm.py create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/configs/kca/common.py create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/configs/kca/x86.py create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/configs/la/approved-non-osi create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/configs/la/exceptions create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/configs/la/licenses create mode 100644 meta-security/meta-security-isafw/lib/isafw/isaplugins/configs/la/violations create mode 100644 meta-security/meta-security-isafw/recipes-devtools/checksec/checksec_1.5-1.bb create mode 100644 meta-security/meta-security-isfafw/classes/isafw.bbclass delete mode 100644 meta-security/meta-tpm/recipes-kernel/linux/linux-yocto_4.%.bbappend create mode 100644 meta-security/meta-tpm/recipes-kernel/linux/linux-yocto_5.%.bbappend create mode 100644 meta-security/meta-tpm/recipes-tpm2/ibmswtpm2/files/remove_optimization.patch delete mode 100644 meta-security/meta-tpm/recipes-tpm2/ibmswtpm2/ibmswtpm2_1332.bb create mode 100644 meta-security/meta-tpm/recipes-tpm2/ibmswtpm2/ibmswtpm2_1563.bb create mode 100644 meta-security/meta-tpm/recipes-tpm2/tpm2-tcti-uefi/files/fix_header_file.patch create mode 100644 meta-security/meta-tpm/recipes-tpm2/tpm2-tcti-uefi/files/tpm2-get-caps-fixed.patch delete mode 100644 meta-security/meta-tpm/recipes-tpm2/tpm2-tools/tpm2-tools_4.0.1.bb create mode 100644 meta-security/meta-tpm/recipes-tpm2/tpm2-tools/tpm2-tools_4.1.1.bb delete mode 100644 meta-security/meta-tpm/recipes-tpm2/tpm2-tss/tpm2-tss_2.3.1.bb create mode 100644 meta-security/meta-tpm/recipes-tpm2/tpm2-tss/tpm2-tss_2.3.2.bb create mode 100644 meta-security/recipes-core/images/dm-verity-image-initramfs.bb create mode 100644 meta-security/recipes-core/initrdscripts/initramfs-dm-verity.bb create mode 100644 meta-security/recipes-core/initrdscripts/initramfs-dm-verity/init-dm-verity.sh create mode 100644 meta-security/recipes-ids/samhain/files/fix-build-with-new-version-attr.patch create mode 100644 meta-security/recipes-ids/samhain/files/samhain-server-volatiles.conf delete mode 100644 meta-security/recipes-kernel/linux/linux-yocto_4.%.bbappend create mode 100644 meta-security/recipes-kernel/linux/linux-yocto_5.%.bbappend delete mode 100644 meta-security/recipes-mac/AppArmor/apparmor_2.13.3.bb create mode 100644 meta-security/recipes-mac/AppArmor/apparmor_2.13.4.bb create mode 100644 meta-security/recipes-scanners/arpwatch/arpwatch_3.0.bb create mode 100644 meta-security/recipes-scanners/arpwatch/files/arpwatch.conf create mode 100644 meta-security/recipes-scanners/arpwatch/files/arpwatch.default create mode 100644 meta-security/recipes-scanners/arpwatch/files/arpwatch_init create mode 100644 meta-security/recipes-scanners/arpwatch/files/host_contam_fix.patch create mode 100644 meta-security/recipes-scanners/arpwatch/files/postfix_workaround.patch create mode 100644 meta-security/recipes-scanners/buck-security/buck-security_0.7.bb create mode 100644 meta-security/recipes-scanners/checksec/checksec_2.1.0.bb create mode 100644 meta-security/recipes-scanners/checksecurity/checksecurity_2.0.15.bb create mode 100644 meta-security/recipes-scanners/checksecurity/files/check-setuid-use-more-portable-find-args.patch create mode 100644 meta-security/recipes-scanners/checksecurity/files/setuid-log-folder.patch create mode 100644 meta-security/recipes-scanners/clamav/clamav_0.101.5.bb create mode 100644 meta-security/recipes-scanners/clamav/files/clamav-freshclam.service create mode 100644 meta-security/recipes-scanners/clamav/files/clamav-milter.conf.sample create mode 100644 meta-security/recipes-scanners/clamav/files/clamav.service create mode 100644 meta-security/recipes-scanners/clamav/files/clamd.conf create mode 100644 meta-security/recipes-scanners/clamav/files/freshclam-native.conf create mode 100644 meta-security/recipes-scanners/clamav/files/freshclam.conf create mode 100644 meta-security/recipes-scanners/clamav/files/tmpfiles.clamav create mode 100644 meta-security/recipes-scanners/clamav/files/volatiles.03_clamav create mode 100644 meta-security/recipes-scanners/rootkits/chkrootkit_0.53.bb delete mode 100644 meta-security/recipes-security/buck-security/buck-security_0.7.bb delete mode 100644 meta-security/recipes-security/checksec/checksec_2.1.0.bb delete mode 100644 meta-security/recipes-security/checksecurity/checksecurity_2.0.15.bb delete mode 100644 meta-security/recipes-security/checksecurity/files/check-setuid-use-more-portable-find-args.patch delete mode 100644 meta-security/recipes-security/checksecurity/files/setuid-log-folder.patch delete mode 100644 meta-security/recipes-security/clamav/clamav_0.101.5.bb delete mode 100644 meta-security/recipes-security/clamav/files/clamav-freshclam.service delete mode 100644 meta-security/recipes-security/clamav/files/clamav-milter.conf.sample delete mode 100644 meta-security/recipes-security/clamav/files/clamav.service delete mode 100644 meta-security/recipes-security/clamav/files/clamd.conf delete mode 100644 meta-security/recipes-security/clamav/files/freshclam-native.conf delete mode 100644 meta-security/recipes-security/clamav/files/freshclam.conf delete mode 100644 meta-security/recipes-security/clamav/files/tmpfiles.clamav delete mode 100644 meta-security/recipes-security/clamav/files/volatiles.03_clamav create mode 100644 meta-security/recipes-security/fail2ban/files/0001-python3-fail2ban-2-3-conversion.patch delete mode 100644 meta-security/recipes-security/google-authenticator-libpam/google-authenticator-libpam_1.07.bb create mode 100644 meta-security/recipes-security/google-authenticator-libpam/google-authenticator-libpam_1.08.bb delete mode 100644 meta-security/recipes-security/libseccomp/files/0001-tests-rely-on-__SNR_xxx-instead-of-__NR_xxx-for-sysc.patch delete mode 100644 meta-security/recipes-security/libseccomp/libseccomp_2.4.2.bb create mode 100644 meta-security/recipes-security/libseccomp/libseccomp_2.4.3.bb create mode 100644 meta-security/recipes-security/sssd/files/fix-ldblibdir.patch create mode 100644 meta-security/recipes-security/sssd/files/volatiles.99_sssd create mode 100644 meta-security/wic/beaglebone-yocto-verity.wks.in (limited to 'meta-security') diff --git a/meta-security/README b/meta-security/README index c419d506df..f223feef03 100644 --- a/meta-security/README +++ b/meta-security/README @@ -24,6 +24,11 @@ This layer depends on: revision: HEAD prio: default + URI: git://git.openembedded.org/meta-openembedded/meta-python + branch: master + revision: HEAD + prio: default + URI: git://git.openembedded.org/meta-openembedded/meta-networking branch: master revision: HEAD @@ -64,6 +69,8 @@ $ git config format.subjectPrefix meta-security][PATCH Now you can just do 'git send-email origin/master' to send all local patches. +For pull requests, please use create-pull-request and send-pull-request. + Maintainers: Armin Kuster diff --git a/meta-security/classes/dm-verity-img.bbclass b/meta-security/classes/dm-verity-img.bbclass new file mode 100644 index 0000000000..1c0e29b6e2 --- /dev/null +++ b/meta-security/classes/dm-verity-img.bbclass @@ -0,0 +1,88 @@ +# SPDX-License-Identifier: MIT +# +# Copyright (C) 2020 BayLibre SAS +# Author: Bartosz Golaszewski +# +# This bbclass allows creating of dm-verity protected partition images. It +# generates a device image file with dm-verity hash data appended at the end +# plus the corresponding .env file containing additional information needed +# to mount the image such as the root hash in the form of ell variables. To +# assure data integrity, the root hash must be stored in a trusted location +# or cryptographically signed and verified. +# +# Usage: +# DM_VERITY_IMAGE = "core-image-full-cmdline" # or other image +# DM_VERITY_IMAGE_TYPE = "ext4" # or ext2, ext3 & btrfs +# IMAGE_CLASSES += "dm-verity-img" +# +# The resulting image can then be used to implement the device mapper block +# integrity checking on the target device. + +# Process the output from veritysetup and generate the corresponding .env +# file. The output from veritysetup is not very machine-friendly so we need to +# convert it to some better format. Let's drop the first line (doesn't contain +# any useful info) and feed the rest to a script. +process_verity() { + local ENV="$OUTPUT.env" + + # Each line contains a key and a value string delimited by ':'. Read the + # two parts into separate variables and process them separately. For the + # key part: convert the names to upper case and replace spaces with + # underscores to create correct shell variable names. For the value part: + # just trim all white-spaces. + IFS=":" + while read KEY VAL; do + echo -ne "$KEY" | tr '[:lower:]' '[:upper:]' | sed 's/ /_/g' >> $ENV + echo -ne "=" >> $ENV + echo "$VAL" | tr -d " \t" >> $ENV + done + + # Add partition size + echo "DATA_SIZE=$SIZE" >> $ENV + + ln -sf $ENV ${IMAGE_BASENAME}-${MACHINE}.$TYPE.verity.env +} + +verity_setup() { + local TYPE=$1 + local INPUT=${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.$TYPE + local SIZE=$(stat --printf="%s" $INPUT) + local OUTPUT=$INPUT.verity + + cp -a $INPUT $OUTPUT + + # Let's drop the first line of output (doesn't contain any useful info) + # and feed the rest to another function. + veritysetup --data-block-size=1024 --hash-offset=$SIZE format $OUTPUT $OUTPUT | tail -n +2 | process_verity +} + +VERITY_TYPES = "ext2.verity ext3.verity ext4.verity btrfs.verity" +IMAGE_TYPES += "${VERITY_TYPES}" +CONVERSIONTYPES += "verity" +CONVERSION_CMD_verity = "verity_setup ${type}" +CONVERSION_DEPENDS_verity = "cryptsetup-native" + +python __anonymous() { + verity_image = d.getVar('DM_VERITY_IMAGE') + verity_type = d.getVar('DM_VERITY_IMAGE_TYPE') + image_fstypes = d.getVar('IMAGE_FSTYPES') + pn = d.getVar('PN') + + if verity_image != pn: + return # This doesn't concern this image + + if not verity_image or not verity_type: + bb.warn('dm-verity-img class inherited but not used') + return + + if len(verity_type.split()) is not 1: + bb.fatal('DM_VERITY_IMAGE_TYPE must contain exactly one type') + + d.appendVar('IMAGE_FSTYPES', ' %s.verity' % verity_type) + + # If we're using wic: we'll have to use partition images and not the rootfs + # source plugin so add the appropriate dependency. + if 'wic' in image_fstypes: + dep = ' %s:do_image_%s' % (pn, verity_type) + d.appendVarFlag('do_image_wic', 'depends', dep) +} diff --git a/meta-security/conf/layer.conf b/meta-security/conf/layer.conf index 3e890e12eb..2c3bd96540 100644 --- a/meta-security/conf/layer.conf +++ b/meta-security/conf/layer.conf @@ -9,6 +9,6 @@ BBFILE_COLLECTIONS += "security" BBFILE_PATTERN_security = "^${LAYERDIR}/" BBFILE_PRIORITY_security = "8" -LAYERSERIES_COMPAT_security = "zeus" +LAYERSERIES_COMPAT_security = "dunfell" LAYERDEPENDS_security = "core openembedded-layer perl-layer networking-layer meta-python" diff --git a/meta-security/meta-integrity/conf/layer.conf b/meta-security/meta-integrity/conf/layer.conf index bfc9c6ff16..b4edac383a 100644 --- a/meta-security/meta-integrity/conf/layer.conf +++ b/meta-security/meta-integrity/conf/layer.conf @@ -21,7 +21,7 @@ INTEGRITY_BASE := '${LAYERDIR}' # interactive shell is enough. OE_TERMINAL_EXPORTS += "INTEGRITY_BASE" -LAYERSERIES_COMPAT_integrity = "zeus" +LAYERSERIES_COMPAT_integrity = "dunfell" # ima-evm-utils depends on keyutils from meta-oe LAYERDEPENDS_integrity = "core openembedded-layer" diff --git a/meta-security/meta-security-compliance/conf/layer.conf b/meta-security/meta-security-compliance/conf/layer.conf index 8572a1fcea..965c837976 100644 --- a/meta-security/meta-security-compliance/conf/layer.conf +++ b/meta-security/meta-security-compliance/conf/layer.conf @@ -8,7 +8,7 @@ BBFILE_COLLECTIONS += "scanners-layer" BBFILE_PATTERN_scanners-layer = "^${LAYERDIR}/" BBFILE_PRIORITY_scanners-layer = "10" -LAYERSERIES_COMPAT_scanners-layer = "zeus" +LAYERSERIES_COMPAT_scanners-layer = "dunfell" LAYERDEPENDS_scanners-layer = "core openembedded-layer meta-python" diff --git a/meta-security/meta-security-compliance/recipes-auditors/lynis/lynis_2.7.5.bb b/meta-security/meta-security-compliance/recipes-auditors/lynis/lynis_2.7.5.bb index 21e451794c..245761c37b 100644 --- a/meta-security/meta-security-compliance/recipes-auditors/lynis/lynis_2.7.5.bb +++ b/meta-security/meta-security-compliance/recipes-auditors/lynis/lynis_2.7.5.bb @@ -38,4 +38,4 @@ do_install () { FILES_${PN} += "${sysconfdir}/developer.prf ${sysconfdir}/default.prf" FILES_${PN}-doc += "lynis.8 FAQ README CHANGELOG.md CONTRIBUTIONS.md CONTRIBUTORS.md" -RDEPENDS_${PN} += "procps" +RDEPENDS_${PN} += "procps findutils" diff --git a/meta-security/meta-security-compliance/recipes-openscap/openscap-daemon/openscap-daemon_0.1.10.bb b/meta-security/meta-security-compliance/recipes-openscap/openscap-daemon/openscap-daemon_0.1.10.bb index ca6e03079b..a775021431 100644 --- a/meta-security/meta-security-compliance/recipes-openscap/openscap-daemon/openscap-daemon_0.1.10.bb +++ b/meta-security/meta-security-compliance/recipes-openscap/openscap-daemon/openscap-daemon_0.1.10.bb @@ -17,4 +17,7 @@ inherit setuptools3 S = "${WORKDIR}/git" -RDEPENDS_${PN} = "python" +RDEPENDS_${PN} = "openscap scap-security-guide \ + python3-core python3-dbus \ + python3-pygobject \ + " diff --git a/meta-security/meta-security-compliance/recipes-openscap/scap-security-guide/files/0001-Fix-XML-parsing-of-the-remediation-functions-file.patch b/meta-security/meta-security-compliance/recipes-openscap/scap-security-guide/files/0001-Fix-XML-parsing-of-the-remediation-functions-file.patch new file mode 100644 index 0000000000..c0b93e4106 --- /dev/null +++ b/meta-security/meta-security-compliance/recipes-openscap/scap-security-guide/files/0001-Fix-XML-parsing-of-the-remediation-functions-file.patch @@ -0,0 +1,39 @@ +From 174293162e5840684d967e36840fc1f9f57c90be Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Mat=C4=9Bj=20T=C3=BD=C4=8D?= +Date: Thu, 5 Dec 2019 15:02:05 +0100 +Subject: [PATCH] Fix XML "parsing" of the remediation functions file. + +A proper fix is not worth the effort, as we aim to kill shared Bash remediation +with Jinja2 macros. + +Upstream-Status: Backport +[https://github.com/ComplianceAsCode/content/commit/174293162e5840684d967e36840fc1f9f57c90be] + +Signed-off-by: Yi Zhao +--- + ssg/build_remediations.py | 8 ++++---- + 1 file changed, 4 insertions(+), 4 deletions(-) + +diff --git a/ssg/build_remediations.py b/ssg/build_remediations.py +index 7da807bd6..13e90f732 100644 +--- a/ssg/build_remediations.py ++++ b/ssg/build_remediations.py +@@ -56,11 +56,11 @@ def get_available_functions(build_dir): + remediation_functions = [] + with codecs.open(xmlfilepath, "r", encoding="utf-8") as xmlfile: + filestring = xmlfile.read() +- # This regex looks implementation dependent but we can rely on +- # ElementTree sorting XML attrs alphabetically. Hidden is guaranteed +- # to be the first attr and ID is guaranteed to be second. ++ # This regex looks implementation dependent but we can rely on the element attributes ++ # being present on one line. ++ # We can't rely on ElementTree sorting XML attrs in any way since Python 3.7. + remediation_functions = re.findall( +- r'