Skip to content

Fix Ansible remediation for sshd rules#14655

Merged
Mab879 merged 1 commit intoComplianceAsCode:masterfrom
jan-cerny:sshd_ansible_fix
Apr 17, 2026
Merged

Fix Ansible remediation for sshd rules#14655
Mab879 merged 1 commit intoComplianceAsCode:masterfrom
jan-cerny:sshd_ansible_fix

Conversation

@jan-cerny
Copy link
Copy Markdown
Collaborator

This changes namely rules using the sshd_lineinfile template. The problem was that the ansible.builtin.file Ansible module accepts only directories as paths, it doesn't accept regular files, therefore, the /etc/ssh/sshd_config file wasn't checked by this module.

Addressing:

"/etc/ssh/sshd_config": "'/etc/ssh/sshd_config' is not a directory"

Fixes: #14654

@jan-cerny jan-cerny added this to the 0.1.81 milestone Apr 15, 2026
@jan-cerny jan-cerny added the Ansible Ansible remediation update. label Apr 15, 2026
@github-actions
Copy link
Copy Markdown

github-actions bot commented Apr 15, 2026

This datastream diff is auto generated by the check Compare DS/Generate Diff

Click here to see the full diff
ansible remediation for rule 'xccdf_org.ssgproject.content_rule_rsyslog_cron_logging' differs.
--- xccdf_org.ssgproject.content_rule_rsyslog_cron_logging
+++ xccdf_org.ssgproject.content_rule_rsyslog_cron_logging
@@ -127,34 +127,79 @@
   - rsyslog_cron_logging
 
 - name: Ensure cron Is Logging To Rsyslog - Check if the parameter cron.* is configured
+    in /etc/rsyslog.conf
+  ansible.builtin.lineinfile:
+    path: /etc/rsyslog.conf
+    regexp: ^\s*{{ "cron.*"| regex_escape }}
+    state: absent
+  check_mode: true
+  changed_when: false
+  register: _config_file_has_parameter
+  when:
+  - '"kernel-core" in ansible_facts.packages'
+  - '"rsyslog" in ansible_facts.packages'
+  tags:
+  - CCE-80859-2
+  - DISA-STIG-RHEL-08-030010
+  - NIST-800-53-CM-6(a)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_cron_logging
+
+- name: Ensure cron Is Logging To Rsyslog - Check if the parameter cron.* is configured
+    in /etc/rsyslog.d
   ansible.builtin.find:
     paths:
-    - /etc/rsyslog.conf
     - /etc/rsyslog.d
     contains: ^\s*{{ "cron.*"| regex_escape }}
-  register: _sshd_config_has_parameter
-  when:
-  - '"kernel-core" in ansible_facts.packages'
-  - '"rsyslog" in ansible_facts.packages'
-  tags:
-  - CCE-80859-2
-  - DISA-STIG-RHEL-08-030010
-  - NIST-800-53-CM-6(a)
-  - configure_strategy
-  - low_complexity
-  - low_disruption
-  - medium_severity
-  - no_reboot_needed
-  - rsyslog_cron_logging
-
-- name: Ensure cron Is Logging To Rsyslog - Check if the parameter cron.* is configured
-    correctly
+  register: _config_dir_has_parameter
+  when:
+  - '"kernel-core" in ansible_facts.packages'
+  - '"rsyslog" in ansible_facts.packages'
+  tags:
+  - CCE-80859-2
+  - DISA-STIG-RHEL-08-030010
+  - NIST-800-53-CM-6(a)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_cron_logging
+
+- name: Ensure cron Is Logging To Rsyslog - Check if the parameter cron.* is configured
+    correctly in /etc/rsyslog.conf
+  ansible.builtin.lineinfile:
+    path: /etc/rsyslog.conf
+    regexp: ^\s*{{ "cron.*"| regex_escape }}/var/log/cron$
+    state: absent
+  check_mode: true
+  changed_when: false
+  register: _config_file_correctly
+  when:
+  - '"kernel-core" in ansible_facts.packages'
+  - '"rsyslog" in ansible_facts.packages'
+  tags:
+  - CCE-80859-2
+  - DISA-STIG-RHEL-08-030010
+  - NIST-800-53-CM-6(a)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_cron_logging
+
+- name: Ensure cron Is Logging To Rsyslog - Check if the parameter cron.* is configured
+    correctly in /etc/rsyslog.d
   ansible.builtin.find:
     paths:
-    - /etc/rsyslog.conf
     - /etc/rsyslog.d
     contains: ^\s*{{ "cron.*"| regex_escape }}/var/log/cron$
-  register: _sshd_config_correctly
+  register: _config_dir_correctly
   when:
   - '"kernel-core" in ansible_facts.packages'
   - '"rsyslog" in ansible_facts.packages'
@@ -199,7 +244,7 @@
       create: false
       regexp: (?i)^\s*{{ "cron.*"| regex_escape }}
       state: absent
-    with_items: '{{ _etc_rsyslog_d_has_parameter.files }}'
+    with_items: '{{ _etc_rsyslog_d_has_parameter.files | default([]) }}'
     when: _etc_rsyslog_d_has_parameter.matched > 0
 
   - name: Insert correct line to /etc/rsyslog.d/cron.conf
@@ -212,7 +257,9 @@
   when:
   - '"kernel-core" in ansible_facts.packages'
   - '"rsyslog" in ansible_facts.packages'
-  - _sshd_config_correctly.matched == 0 or _sshd_config_has_parameter.matched != 1
+  - (_config_file_correctly.found == 0 and _config_dir_correctly.matched == 0) or
+    ((_config_file_has_parameter.found | int) + (_config_dir_has_parameter.matched
+    | int)) != 1
   tags:
   - CCE-80859-2
   - DISA-STIG-RHEL-08-030010

ansible remediation for rule 'xccdf_org.ssgproject.content_rule_rsyslog_encrypt_offload_actionsendstreamdriverauthmode' differs.
--- xccdf_org.ssgproject.content_rule_rsyslog_encrypt_offload_actionsendstreamdriverauthmode
+++ xccdf_org.ssgproject.content_rule_rsyslog_encrypt_offload_actionsendstreamdriverauthmode
@@ -91,35 +91,79 @@
   - rsyslog_encrypt_offload_actionsendstreamdriverauthmode
 
 - name: Ensure Rsyslog Authenticates Off-Loaded Audit Records - Check if the parameter
-    $ActionSendStreamDriverAuthMode is configured
+    $ActionSendStreamDriverAuthMode is configured in /etc/rsyslog.conf
+  ansible.builtin.lineinfile:
+    path: /etc/rsyslog.conf
+    regexp: ^\s*{{ "$ActionSendStreamDriverAuthMode"| regex_escape }}\s
+    state: absent
+  check_mode: true
+  changed_when: false
+  register: _config_file_has_parameter
+  when:
+  - '"kernel-core" in ansible_facts.packages'
+  - '"rsyslog" in ansible_facts.packages'
+  tags:
+  - CCE-86339-9
+  - DISA-STIG-RHEL-08-030720
+  - NIST-800-53-AU-4(1)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_encrypt_offload_actionsendstreamdriverauthmode
+
+- name: Ensure Rsyslog Authenticates Off-Loaded Audit Records - Check if the parameter
+    $ActionSendStreamDriverAuthMode is configured in /etc/rsyslog.d
   ansible.builtin.find:
     paths:
-    - /etc/rsyslog.conf
     - /etc/rsyslog.d
     contains: ^\s*{{ "$ActionSendStreamDriverAuthMode"| regex_escape }}\s
-  register: _sshd_config_has_parameter
-  when:
-  - '"kernel-core" in ansible_facts.packages'
-  - '"rsyslog" in ansible_facts.packages'
-  tags:
-  - CCE-86339-9
-  - DISA-STIG-RHEL-08-030720
-  - NIST-800-53-AU-4(1)
-  - configure_strategy
-  - low_complexity
-  - low_disruption
-  - medium_severity
-  - no_reboot_needed
-  - rsyslog_encrypt_offload_actionsendstreamdriverauthmode
-
-- name: Ensure Rsyslog Authenticates Off-Loaded Audit Records - Check if the parameter
-    $ActionSendStreamDriverAuthMode is configured correctly
+  register: _config_dir_has_parameter
+  when:
+  - '"kernel-core" in ansible_facts.packages'
+  - '"rsyslog" in ansible_facts.packages'
+  tags:
+  - CCE-86339-9
+  - DISA-STIG-RHEL-08-030720
+  - NIST-800-53-AU-4(1)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_encrypt_offload_actionsendstreamdriverauthmode
+
+- name: Ensure Rsyslog Authenticates Off-Loaded Audit Records - Check if the parameter
+    $ActionSendStreamDriverAuthMode is configured correctly in /etc/rsyslog.conf
+  ansible.builtin.lineinfile:
+    path: /etc/rsyslog.conf
+    regexp: ^\s*{{ "$ActionSendStreamDriverAuthMode"| regex_escape }}\sx509/name$
+    state: absent
+  check_mode: true
+  changed_when: false
+  register: _config_file_correctly
+  when:
+  - '"kernel-core" in ansible_facts.packages'
+  - '"rsyslog" in ansible_facts.packages'
+  tags:
+  - CCE-86339-9
+  - DISA-STIG-RHEL-08-030720
+  - NIST-800-53-AU-4(1)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_encrypt_offload_actionsendstreamdriverauthmode
+
+- name: Ensure Rsyslog Authenticates Off-Loaded Audit Records - Check if the parameter
+    $ActionSendStreamDriverAuthMode is configured correctly in /etc/rsyslog.d
   ansible.builtin.find:
     paths:
-    - /etc/rsyslog.conf
     - /etc/rsyslog.d
     contains: ^\s*{{ "$ActionSendStreamDriverAuthMode"| regex_escape }}\sx509/name$
-  register: _sshd_config_correctly
+  register: _config_dir_correctly
   when:
   - '"kernel-core" in ansible_facts.packages'
   - '"rsyslog" in ansible_facts.packages'
@@ -164,7 +208,7 @@
       create: false
       regexp: (?i)^\s*{{ "$ActionSendStreamDriverAuthMode"| regex_escape }}\s
       state: absent
-    with_items: '{{ _etc_rsyslog_d_has_parameter.files }}'
+    with_items: '{{ _etc_rsyslog_d_has_parameter.files | default([]) }}'
     when: _etc_rsyslog_d_has_parameter.matched > 0
 
   - name: Insert correct line to /etc/rsyslog.conf
@@ -177,14 +221,16 @@
   when:
   - '"kernel-core" in ansible_facts.packages'
   - '"rsyslog" in ansible_facts.packages'
-  - _sshd_config_correctly.matched == 0 or _sshd_config_has_parameter.matched != 1
-  tags:
-  - CCE-86339-9
-  - DISA-STIG-RHEL-08-030720
-  - NIST-800-53-AU-4(1)
-  - configure_strategy
-  - low_complexity
-  - low_disruption
-  - medium_severity
-  - no_reboot_needed
-  - rsyslog_encrypt_offload_actionsendstreamdriverauthmode
+  - (_config_file_correctly.found == 0 and _config_dir_correctly.matched == 0) or
+    ((_config_file_has_parameter.found | int) + (_config_dir_has_parameter.matched
+    | int)) != 1
+  tags:
+  - CCE-86339-9
+  - DISA-STIG-RHEL-08-030720
+  - NIST-800-53-AU-4(1)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_encrypt_offload_actionsendstreamdriverauthmode

ansible remediation for rule 'xccdf_org.ssgproject.content_rule_rsyslog_encrypt_offload_actionsendstreamdrivermode' differs.
--- xccdf_org.ssgproject.content_rule_rsyslog_encrypt_offload_actionsendstreamdrivermode
+++ xccdf_org.ssgproject.content_rule_rsyslog_encrypt_offload_actionsendstreamdrivermode
@@ -91,35 +91,79 @@
   - rsyslog_encrypt_offload_actionsendstreamdrivermode
 
 - name: Ensure Rsyslog Encrypts Off-Loaded Audit Records - Check if the parameter
-    $ActionSendStreamDriverMode is configured
+    $ActionSendStreamDriverMode is configured in /etc/rsyslog.conf
+  ansible.builtin.lineinfile:
+    path: /etc/rsyslog.conf
+    regexp: ^\s*{{ "$ActionSendStreamDriverMode"| regex_escape }}
+    state: absent
+  check_mode: true
+  changed_when: false
+  register: _config_file_has_parameter
+  when:
+  - '"kernel-core" in ansible_facts.packages'
+  - '"rsyslog" in ansible_facts.packages'
+  tags:
+  - CCE-86098-1
+  - DISA-STIG-RHEL-08-030710
+  - NIST-800-53-AU-4(1)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_encrypt_offload_actionsendstreamdrivermode
+
+- name: Ensure Rsyslog Encrypts Off-Loaded Audit Records - Check if the parameter
+    $ActionSendStreamDriverMode is configured in /etc/rsyslog.d
   ansible.builtin.find:
     paths:
-    - /etc/rsyslog.conf
     - /etc/rsyslog.d
     contains: ^\s*{{ "$ActionSendStreamDriverMode"| regex_escape }}
-  register: _sshd_config_has_parameter
-  when:
-  - '"kernel-core" in ansible_facts.packages'
-  - '"rsyslog" in ansible_facts.packages'
-  tags:
-  - CCE-86098-1
-  - DISA-STIG-RHEL-08-030710
-  - NIST-800-53-AU-4(1)
-  - configure_strategy
-  - low_complexity
-  - low_disruption
-  - medium_severity
-  - no_reboot_needed
-  - rsyslog_encrypt_offload_actionsendstreamdrivermode
-
-- name: Ensure Rsyslog Encrypts Off-Loaded Audit Records - Check if the parameter
-    $ActionSendStreamDriverMode is configured correctly
+  register: _config_dir_has_parameter
+  when:
+  - '"kernel-core" in ansible_facts.packages'
+  - '"rsyslog" in ansible_facts.packages'
+  tags:
+  - CCE-86098-1
+  - DISA-STIG-RHEL-08-030710
+  - NIST-800-53-AU-4(1)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_encrypt_offload_actionsendstreamdrivermode
+
+- name: Ensure Rsyslog Encrypts Off-Loaded Audit Records - Check if the parameter
+    $ActionSendStreamDriverMode is configured correctly in /etc/rsyslog.conf
+  ansible.builtin.lineinfile:
+    path: /etc/rsyslog.conf
+    regexp: ^\s*{{ "$ActionSendStreamDriverMode"| regex_escape }} 1$
+    state: absent
+  check_mode: true
+  changed_when: false
+  register: _config_file_correctly
+  when:
+  - '"kernel-core" in ansible_facts.packages'
+  - '"rsyslog" in ansible_facts.packages'
+  tags:
+  - CCE-86098-1
+  - DISA-STIG-RHEL-08-030710
+  - NIST-800-53-AU-4(1)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_encrypt_offload_actionsendstreamdrivermode
+
+- name: Ensure Rsyslog Encrypts Off-Loaded Audit Records - Check if the parameter
+    $ActionSendStreamDriverMode is configured correctly in /etc/rsyslog.d
   ansible.builtin.find:
     paths:
-    - /etc/rsyslog.conf
     - /etc/rsyslog.d
     contains: ^\s*{{ "$ActionSendStreamDriverMode"| regex_escape }} 1$
-  register: _sshd_config_correctly
+  register: _config_dir_correctly
   when:
   - '"kernel-core" in ansible_facts.packages'
   - '"rsyslog" in ansible_facts.packages'
@@ -164,7 +208,7 @@
       create: false
       regexp: '(?i)^\s*{{ "$ActionSendStreamDriverMode"| regex_escape }} '
       state: absent
-    with_items: '{{ _etc_rsyslog_d_has_parameter.files }}'
+    with_items: '{{ _etc_rsyslog_d_has_parameter.files | default([]) }}'
     when: _etc_rsyslog_d_has_parameter.matched > 0
 
   - name: Insert correct line to /etc/rsyslog.conf
@@ -177,14 +221,16 @@
   when:
   - '"kernel-core" in ansible_facts.packages'
   - '"rsyslog" in ansible_facts.packages'
-  - _sshd_config_correctly.matched == 0 or _sshd_config_has_parameter.matched != 1
-  tags:
-  - CCE-86098-1
-  - DISA-STIG-RHEL-08-030710
-  - NIST-800-53-AU-4(1)
-  - configure_strategy
-  - low_complexity
-  - low_disruption
-  - medium_severity
-  - no_reboot_needed
-  - rsyslog_encrypt_offload_actionsendstreamdrivermode
+  - (_config_file_correctly.found == 0 and _config_dir_correctly.matched == 0) or
+    ((_config_file_has_parameter.found | int) + (_config_dir_has_parameter.matched
+    | int)) != 1
+  tags:
+  - CCE-86098-1
+  - DISA-STIG-RHEL-08-030710
+  - NIST-800-53-AU-4(1)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_encrypt_offload_actionsendstreamdrivermode

ansible remediation for rule 'xccdf_org.ssgproject.content_rule_rsyslog_encrypt_offload_defaultnetstreamdriver' differs.
--- xccdf_org.ssgproject.content_rule_rsyslog_encrypt_offload_defaultnetstreamdriver
+++ xccdf_org.ssgproject.content_rule_rsyslog_encrypt_offload_defaultnetstreamdriver
@@ -91,35 +91,79 @@
   - rsyslog_encrypt_offload_defaultnetstreamdriver
 
 - name: Ensure Rsyslog Encrypts Off-Loaded Audit Records - Check if the parameter
-    $DefaultNetstreamDriver is configured
+    $DefaultNetstreamDriver is configured in /etc/rsyslog.conf
+  ansible.builtin.lineinfile:
+    path: /etc/rsyslog.conf
+    regexp: ^\s*{{ "$DefaultNetstreamDriver"| regex_escape }}
+    state: absent
+  check_mode: true
+  changed_when: false
+  register: _config_file_has_parameter
+  when:
+  - '"kernel-core" in ansible_facts.packages'
+  - '"rsyslog" in ansible_facts.packages'
+  tags:
+  - CCE-85992-6
+  - DISA-STIG-RHEL-08-030710
+  - NIST-800-53-AU-4(1)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_encrypt_offload_defaultnetstreamdriver
+
+- name: Ensure Rsyslog Encrypts Off-Loaded Audit Records - Check if the parameter
+    $DefaultNetstreamDriver is configured in /etc/rsyslog.d
   ansible.builtin.find:
     paths:
-    - /etc/rsyslog.conf
     - /etc/rsyslog.d
     contains: ^\s*{{ "$DefaultNetstreamDriver"| regex_escape }}
-  register: _sshd_config_has_parameter
-  when:
-  - '"kernel-core" in ansible_facts.packages'
-  - '"rsyslog" in ansible_facts.packages'
-  tags:
-  - CCE-85992-6
-  - DISA-STIG-RHEL-08-030710
-  - NIST-800-53-AU-4(1)
-  - configure_strategy
-  - low_complexity
-  - low_disruption
-  - medium_severity
-  - no_reboot_needed
-  - rsyslog_encrypt_offload_defaultnetstreamdriver
-
-- name: Ensure Rsyslog Encrypts Off-Loaded Audit Records - Check if the parameter
-    $DefaultNetstreamDriver is configured correctly
+  register: _config_dir_has_parameter
+  when:
+  - '"kernel-core" in ansible_facts.packages'
+  - '"rsyslog" in ansible_facts.packages'
+  tags:
+  - CCE-85992-6
+  - DISA-STIG-RHEL-08-030710
+  - NIST-800-53-AU-4(1)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_encrypt_offload_defaultnetstreamdriver
+
+- name: Ensure Rsyslog Encrypts Off-Loaded Audit Records - Check if the parameter
+    $DefaultNetstreamDriver is configured correctly in /etc/rsyslog.conf
+  ansible.builtin.lineinfile:
+    path: /etc/rsyslog.conf
+    regexp: ^\s*{{ "$DefaultNetstreamDriver"| regex_escape }} gtls$
+    state: absent
+  check_mode: true
+  changed_when: false
+  register: _config_file_correctly
+  when:
+  - '"kernel-core" in ansible_facts.packages'
+  - '"rsyslog" in ansible_facts.packages'
+  tags:
+  - CCE-85992-6
+  - DISA-STIG-RHEL-08-030710
+  - NIST-800-53-AU-4(1)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_encrypt_offload_defaultnetstreamdriver
+
+- name: Ensure Rsyslog Encrypts Off-Loaded Audit Records - Check if the parameter
+    $DefaultNetstreamDriver is configured correctly in /etc/rsyslog.d
   ansible.builtin.find:
     paths:
-    - /etc/rsyslog.conf
     - /etc/rsyslog.d
     contains: ^\s*{{ "$DefaultNetstreamDriver"| regex_escape }} gtls$
-  register: _sshd_config_correctly
+  register: _config_dir_correctly
   when:
   - '"kernel-core" in ansible_facts.packages'
   - '"rsyslog" in ansible_facts.packages'
@@ -164,7 +208,7 @@
       create: false
       regexp: '(?i)^\s*{{ "$DefaultNetstreamDriver"| regex_escape }} '
       state: absent
-    with_items: '{{ _etc_rsyslog_d_has_parameter.files }}'
+    with_items: '{{ _etc_rsyslog_d_has_parameter.files | default([]) }}'
     when: _etc_rsyslog_d_has_parameter.matched > 0
 
   - name: Insert correct line to /etc/rsyslog.conf
@@ -177,14 +221,16 @@
   when:
   - '"kernel-core" in ansible_facts.packages'
   - '"rsyslog" in ansible_facts.packages'
-  - _sshd_config_correctly.matched == 0 or _sshd_config_has_parameter.matched != 1
-  tags:
-  - CCE-85992-6
-  - DISA-STIG-RHEL-08-030710
-  - NIST-800-53-AU-4(1)
-  - configure_strategy
-  - low_complexity
-  - low_disruption
-  - medium_severity
-  - no_reboot_needed
-  - rsyslog_encrypt_offload_defaultnetstreamdriver
+  - (_config_file_correctly.found == 0 and _config_dir_correctly.matched == 0) or
+    ((_config_file_has_parameter.found | int) + (_config_dir_has_parameter.matched
+    | int)) != 1
+  tags:
+  - CCE-85992-6
+  - DISA-STIG-RHEL-08-030710
+  - NIST-800-53-AU-4(1)
+  - configure_strategy
+  - low_complexity
+  - low_disruption
+  - medium_severity
+  - no_reboot_needed
+  - rsyslog_encrypt_offload_defaultnetstreamdriver

This changes namely rules using the `sshd_lineinfile` template.
The problem was that the `ansible.builtin.file` Ansible module
accepts only directories as `paths`, it doesn't accept regular
files, therefore, the `/etc/ssh/sshd_config` file wasn't checked
by this module.

Addressing:
```
"/etc/ssh/sshd_config": "'/etc/ssh/sshd_config' is not a directory"
```

Fixes: ComplianceAsCode#14654
@openshift-ci
Copy link
Copy Markdown

openshift-ci bot commented Apr 16, 2026

@jan-cerny: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws-openshift-platform-compliance 27cff44 link true /test e2e-aws-openshift-platform-compliance

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@Mab879 Mab879 self-assigned this Apr 17, 2026
@Mab879 Mab879 merged commit 5f6685b into ComplianceAsCode:master Apr 17, 2026
64 of 65 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Ansible Ansible remediation update.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Ansible sshd configuration tasks issues

2 participants