Blame SOURCES/scap-security-guide-0.1.51-fix_rpm_verify_permissions_conflict_PR_5770.patch

475544
From bb039a92b4286c9090c0f40c82aefb967be2f5ba Mon Sep 17 00:00:00 2001
475544
From: Vojtech Polasek <vpolasek@redhat.com>
475544
Date: Thu, 14 May 2020 16:46:07 +0200
475544
Subject: [PATCH] reorder groups because of permissions verification
475544
475544
---
475544
 ssg/build_yaml.py | 6 ++++++
475544
 1 file changed, 6 insertions(+)
475544
475544
diff --git a/ssg/build_yaml.py b/ssg/build_yaml.py
475544
index e3e138283c..c9f3179c08 100644
475544
--- a/ssg/build_yaml.py
475544
+++ b/ssg/build_yaml.py
475544
@@ -700,6 +700,11 @@ def to_xml_element(self):
475544
         # audit_rules_privileged_commands, othervise the rule
475544
         # does not catch newly installed screeen binary during remediation
475544
         # and report fail
475544
+        # the software group should come before the
475544
+        # bootloader-grub2 group because of conflict between
475544
+        # rules rpm_verify_permissions and file_permissions_grub2_cfg
475544
+        # specific rules concerning permissions should
475544
+        # be applied after the general rpm_verify_permissions
475544
         # The FIPS group should come before Crypto - if we want to set a different (stricter) Crypto Policy than FIPS.
475544
         # the firewalld_activation must come before ruleset_modifications, othervise
475544
         # remediations for ruleset_modifications won't work
475544
@@ -707,6 +712,7 @@ def to_xml_element(self):
475544
         # otherwise the remediation prints error although it is successful
475544
         priority_order = [
475544
             "accounts", "auditing",
475544
+            "software", "bootloader-grub2",
475544
             "fips", "crypto",
475544
             "firewalld_activation", "ruleset_modifications",
475544
             "disabling_ipv6", "configuring_ipv6"