Skip to content

SPECS: scap-security-guide: update support for openRuyi#393

Draft
woqidaideshi wants to merge 1 commit into
openRuyi-Project:mainfrom
woqidaideshi:scap-security-guide-new
Draft

SPECS: scap-security-guide: update support for openRuyi#393
woqidaideshi wants to merge 1 commit into
openRuyi-Project:mainfrom
woqidaideshi:scap-security-guide-new

Conversation

@woqidaideshi
Copy link
Copy Markdown
Contributor

Simplify openruyi test cases for common users.

@openruyi-bot openruyi-bot Bot added the Target: Rolling Targeting rolling/current branch. label May 14, 2026
@misaka00251 misaka00251 added the Workflow: In Review Issues that are undergoing code review and/or undergoing design review. label May 14, 2026
Copy link
Copy Markdown
Member

@Jingwiw Jingwiw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It would be helpful to share basic build and oscap test results on an openRuyi RISC-V system or rootfs before deciding the final default rule set.

+# platform = multi_platform_openruyi
+# check-import = stdout
+
+temp=$(find ./ -type l -follow)
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

file_empty_link_prohibit says it cannot be scanned automatically, but adds an SCE check that only scans ./ instead of the target root filesystem. This may easily pass incorrectly?

+# platform = multi_platform_openruyi
+# check-import = stdout
+
+temp=$(find / -type f -name "\.*" -perm /+x)
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

file_hidden_executable_prohibit scans the whole / without pruning /proc, /sys, /dev, /run, etc., and does not implement the exceptions mentioned in the rule description.

+ - base
+ status: automated
+ rules:
+ - configure_crypto_policy
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I do not see crypto-policies packaging in openRuyi...So this rule/remediation will be permanently non-applicable or failing. Please either add the required package support, remove this rule from the base profile, or provide evidence that openRuyi supports this crypto policy framework.

@Jingwiw Jingwiw marked this pull request as draft May 14, 2026 03:49
@woqidaideshi woqidaideshi force-pushed the scap-security-guide-new branch from 6ccc8cb to d796131 Compare May 14, 2026 09:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Target: Rolling Targeting rolling/current branch. Workflow: In Review Issues that are undergoing code review and/or undergoing design review.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants