From db4473a9113a2702f10c7f0280014451199860c2 Mon Sep 17 00:00:00 2001 From: Jakub Hrozek Date: Thu, 30 Sep 2021 15:22:56 +0200 Subject: [PATCH] Re-enable the kubelet-authorization-mode rule The rule didn't use to work on ROKS, but these days it's been fixed and does. --- roks-compliance-operator/tailoredprofile.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/roks-compliance-operator/tailoredprofile.yaml b/roks-compliance-operator/tailoredprofile.yaml index cda5b279..c67c10d6 100644 --- a/roks-compliance-operator/tailoredprofile.yaml +++ b/roks-compliance-operator/tailoredprofile.yaml @@ -25,8 +25,6 @@ spec: rationale: "stricter than default" value: "10%" disableRules: - - name: ocp4-kubelet-authorization-mode - rationale: Open issue with upstream repo to correct check https://github.com/ComplianceAsCode/content/issues/6658 - name: ocp4-file-permissions-kube-apiserver rationale: Target file is protected by managed service. - name: ocp4-file-owner-kube-apiserver