{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":434595942,"defaultBranch":"master","name":"content","ownerLogin":"rhmdnd","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2021-12-03T12:54:37.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/94937504?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1725543765.0","currentOid":""},"activityList":{"items":[{"before":"24fef5bf9a32b7a2d01363483d8757d4e1fe725a","after":"6c3503f6682f0e8b1dde3d07842c31662bb77007","ref":"refs/heads/update-assertions-for-kubelet-client-cert","pushedAt":"2024-09-13T13:31:12.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Update assertions for kubelet-client-cert|key rules\n\nWe recently enabled these rules for 4.17, but didn't update the 4.17\nassertion files for FedRAMP High, FedRAMP Moderate, PCI-DSS, or CIS.\nThis commit does that so that so the tests assert the correct behavior\non 4.17.\n\n https://github.com/ComplianceAsCode/content/pull/12311","shortMessageHtmlLink":"Update assertions for kubelet-client-cert|key rules"}},{"before":"f2cf0611a73b74e76670d4221c9fb4d00f2af752","after":"b77bdbdc329dfb0b96114cc28e51504b3fb7e285","ref":"refs/heads/master","pushedAt":"2024-09-13T13:22:11.000Z","pushType":"push","commitsCount":9,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Merge pull request #12373 from Mab879/update_rhel9_stig_v2r1\n\nUpdate RHEL 9 STIG to V2R1","shortMessageHtmlLink":"Merge pull request ComplianceAsCode#12373 from Mab879/update_rhel9_st…"}},{"before":"cd3287784ef10d1d6410eec3efe1c5460a5bd7ba","after":"24fef5bf9a32b7a2d01363483d8757d4e1fe725a","ref":"refs/heads/update-assertions-for-kubelet-client-cert","pushedAt":"2024-09-12T13:25:58.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Update assertions for kubelet-client-cert|key rules\n\nWe recently enabled these rules for 4.17, but didn't update the 4.17\nassertion files for FedRAMP High, FedRAMP Moderate, PCI-DSS, or CIS.\nThis commit does that so that so the tests assert the correct behavior\non 4.17.\n\n https://github.com/ComplianceAsCode/content/pull/12311","shortMessageHtmlLink":"Update assertions for kubelet-client-cert|key rules"}},{"before":"d80b25c483fd790518ab6dfde43a892a933f2a86","after":"f2cf0611a73b74e76670d4221c9fb4d00f2af752","ref":"refs/heads/master","pushedAt":"2024-09-12T13:22:29.000Z","pushType":"push","commitsCount":9,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Merge pull request #12372 from yuumasato/update-assertions-for-4.15-file-permissions-cni-conf\n\nUpdate assertions for 4.15 `file_permissions_cni_conf`","shortMessageHtmlLink":"Merge pull request ComplianceAsCode#12372 from yuumasato/update-asser…"}},{"before":"ecd82abc8248e2434a5024af565a41584cc15771","after":"d80b25c483fd790518ab6dfde43a892a933f2a86","ref":"refs/heads/master","pushedAt":"2024-09-10T12:47:14.000Z","pushType":"push","commitsCount":42,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Merge pull request #12359 from vojtapolasek/fix_audit_rhel10\n\nFix Audit related rules in RHEL 10","shortMessageHtmlLink":"Merge pull request ComplianceAsCode#12359 from vojtapolasek/fix_audit…"}},{"before":"61a946d51ac83b8a116a22989a35bb224cc0de8a","after":"2a29bacd9b7429a801f994ac6fb0c0fe868a90b8","ref":"refs/heads/CMP-2196-follow-up","pushedAt":"2024-09-05T18:41:34.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"CMP-2196: Update instructions for ingresscontroller TLS ciphers\n\nWe can update the instructions so they tell the user what to check for,\ninstead of copy/pasting in a remediation for TLS ciphers, which may not\nbe what they want.","shortMessageHtmlLink":"CMP-2196: Update instructions for ingresscontroller TLS ciphers"}},{"before":"bd48adc406d65beda51b97b1d25e5880093c1cbe","after":"ecd82abc8248e2434a5024af565a41584cc15771","ref":"refs/heads/master","pushedAt":"2024-09-05T18:38:48.000Z","pushType":"push","commitsCount":5,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Merge pull request #12365 from Mab879/fixup_psc_content\n\nClean up PSC Content","shortMessageHtmlLink":"Merge pull request ComplianceAsCode#12365 from Mab879/fixup_psc_content"}},{"before":null,"after":"cd3287784ef10d1d6410eec3efe1c5460a5bd7ba","ref":"refs/heads/update-assertions-for-kubelet-client-cert","pushedAt":"2024-09-05T13:42:45.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Update assertions for kubelet-client-cert|key rules\n\nWe recently enabled these rules for 4.17, but didn't update the 4.17\nassertion files for STIG, FedRAMP High, FedRAMP Moderate, or CIS. This\ncommit does that so that so the tests assert the correct behavior on\n4.17.\n\n https://github.com/ComplianceAsCode/content/pull/12311","shortMessageHtmlLink":"Update assertions for kubelet-client-cert|key rules"}},{"before":"8df17e53d170d7cb23ae1c1a634c60001adad3cc","after":"bd48adc406d65beda51b97b1d25e5880093c1cbe","ref":"refs/heads/master","pushedAt":"2024-09-05T13:29:02.000Z","pushType":"push","commitsCount":63,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Merge pull request #12353 from svet-se/slmicro5-stig-add-accounts-and-amount-rules-support\n\nSlmicro5 stig add accounts and amount rules support","shortMessageHtmlLink":"Merge pull request ComplianceAsCode#12353 from svet-se/slmicro5-stig-…"}},{"before":"95b59c6b843cdb2785733a242b5984d1625f41fa","after":"640d22179bc4d0cbf8f068bf3a8ce64e56497d69","ref":"refs/heads/update-assertions-for-pci-dss-profile","pushedAt":"2024-09-04T19:13:17.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Update assertions for api-server-kubelet-client-cert|key rule\n\nWe recently enabled these rules for 4.17, but didn't update the 4.17\nPCI-DSS assertion files for them. This commit does that so that.","shortMessageHtmlLink":"Update assertions for api-server-kubelet-client-cert|key rule"}},{"before":"4ec18f4229ccef0a7019da13f7ce29bcd0cf1c79","after":"5f2fca1fc5620b92c167247177c9146be652abc2","ref":"refs/heads/update-assertions-for-ingress-operator-rule","pushedAt":"2024-09-03T22:36:36.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Update assertions for ingress controller TLS check\n\nWe recently incorporated a new rule into the CIS profile that checks\ningress controller TLS configs:\n\n https://github.com/ComplianceAsCode/content/pull/12220\n\nWe added it to the CIS profile, but didn't update the assertions in the\nmoderate or high profiles, which is causing periodic CI to fail. This\ncommit adds the assertion to the moderate and high test files so we're\nchecking it in subsequent CI runs.","shortMessageHtmlLink":"Update assertions for ingress controller TLS check"}},{"before":"eaecea17b0201af200ac970e857a31fd40190fa3","after":"95b59c6b843cdb2785733a242b5984d1625f41fa","ref":"refs/heads/update-assertions-for-pci-dss-profile","pushedAt":"2024-09-03T20:58:40.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Update assertions for PCI-DSS profile\n\nWe recently updated the PCI-DSS profile to use 4.0 by default, but\ndidn't update the default assertions. This commit updates the assertions\nso that the versionless profile name includes assertions for rules in\nthe v4.0 profile.","shortMessageHtmlLink":"Update assertions for PCI-DSS profile"}},{"before":null,"after":"eaecea17b0201af200ac970e857a31fd40190fa3","ref":"refs/heads/update-assertions-for-pci-dss-profile","pushedAt":"2024-09-03T16:42:02.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Update assertions for PCI-DSS profile\n\nWe recently updated the PCI-DSS profile to use 4.0 by default, but\ndidn't update the default assertions. This commit updates the assertions\nso that the versionless profile name includes assertions for rules in\nthe v4.0 profile.","shortMessageHtmlLink":"Update assertions for PCI-DSS profile"}},{"before":"7d0345dd481abaee6b8379c2e0125ab28782656b","after":"4ec18f4229ccef0a7019da13f7ce29bcd0cf1c79","ref":"refs/heads/update-assertions-for-ingress-operator-rule","pushedAt":"2024-09-03T16:14:04.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Update assertions for ingress controller TLS check\n\nWe recently incorporated a new rule into the CIS profile that checks\ningress controller TLS configs:\n\n https://github.com/ComplianceAsCode/content/pull/12220\n\nWe added it to the CIS profile, but didn't update the assertions in the\nmoderate or high profiles, which is causing periodic CI to fail. This\ncommit adds the assertion to the moderate and high test files so we're\nchecking it in subsequent CI runs.","shortMessageHtmlLink":"Update assertions for ingress controller TLS check"}},{"before":null,"after":"7d0345dd481abaee6b8379c2e0125ab28782656b","ref":"refs/heads/update-assertions-for-ingress-operator-rule","pushedAt":"2024-09-03T16:09:38.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Update assertions for ingress controller TLS check\n\nWe recently incorporated a new rule into the CIS profile that checks\ningress controller TLS configs:\n\n https://github.com/ComplianceAsCode/content/pull/12220\n\nWe added it to the CIS profile, but didn't update the assertions in the\nmoderate or high profiles, which is causing periodic CI to fail. This\ncommit adds the assertion to the moderate and high test files so we're\nchecking it in subsequent CI runs.","shortMessageHtmlLink":"Update assertions for ingress controller TLS check"}},{"before":"f02f47f94183f105793de0a477119676eab5f7b7","after":"8df17e53d170d7cb23ae1c1a634c60001adad3cc","ref":"refs/heads/master","pushedAt":"2024-09-03T14:08:27.000Z","pushType":"push","commitsCount":13,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Merge pull request #12335 from rumch-se/pam_options_template_rules_update_slem\n\nUpdated rules based on template pam_options to support SLE Micro","shortMessageHtmlLink":"Merge pull request ComplianceAsCode#12335 from rumch-se/pam_options_t…"}},{"before":null,"after":"61a946d51ac83b8a116a22989a35bb224cc0de8a","ref":"refs/heads/CMP-2196-follow-up","pushedAt":"2024-08-30T21:58:32.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"CMP-2196: Update instructions for ingresscontroller TLS ciphers\n\nWe can update the instructions so they tell the user what to check for,\ninstead of copy/pasting in a remediation for TLS ciphers, which may not\nbe what they want.","shortMessageHtmlLink":"CMP-2196: Update instructions for ingresscontroller TLS ciphers"}},{"before":"0ad4684a389f275a4b3148e22144bb5c83684a85","after":"f02f47f94183f105793de0a477119676eab5f7b7","ref":"refs/heads/master","pushedAt":"2024-08-30T21:55:45.000Z","pushType":"push","commitsCount":125,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Merge pull request #12354 from vojtapolasek/add_rule_disabling_modules_to_unselect_rules_list\n\nadd rule sysctl_kernel_modules_disabled to unselect_rules_list","shortMessageHtmlLink":"Merge pull request ComplianceAsCode#12354 from vojtapolasek/add_rule_…"}},{"before":"ab3a185d05783e18438f96533f347757be23feed","after":"0ad4684a389f275a4b3148e22144bb5c83684a85","ref":"refs/heads/master","pushedAt":"2024-08-21T19:49:03.000Z","pushType":"push","commitsCount":9,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Merge pull request #12315 from rhmdnd/fix-manual-spo-remediation\n\nFix manual remediation for SPO rule","shortMessageHtmlLink":"Merge pull request ComplianceAsCode#12315 from rhmdnd/fix-manual-spo-…"}},{"before":"72743aa58b3c01d7a000a8027b3b01e9c477593d","after":"7d1a1c7d67f2f6e3d60dd8e4cc324b555aa48384","ref":"refs/heads/fix-manual-spo-remediation","pushedAt":"2024-08-21T13:44:57.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"yuumasato","name":"Watson Yuuma Sato","path":"/yuumasato","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7460169?s=80&v=4"},"commit":{"message":"Fix remediation subscription name","shortMessageHtmlLink":"Fix remediation subscription name"}},{"before":"a9231d7b2a8475c5bebccd46774041ed67a7ba1c","after":"72743aa58b3c01d7a000a8027b3b01e9c477593d","ref":"refs/heads/fix-manual-spo-remediation","pushedAt":"2024-08-21T07:07:16.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"yuumasato","name":"Watson Yuuma Sato","path":"/yuumasato","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7460169?s=80&v=4"},"commit":{"message":"Fix spo-install metadata indentation","shortMessageHtmlLink":"Fix spo-install metadata indentation"}},{"before":"213450e99348b5aeca440a1aca200edf2006a562","after":"a9231d7b2a8475c5bebccd46774041ed67a7ba1c","ref":"refs/heads/fix-manual-spo-remediation","pushedAt":"2024-08-20T19:31:16.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Fix manual remediation for SPO rule\n\nWe have a manual remediation for installing SPO, but it was failing\nin our e2e suite with the following error:\n\n fork/exec /go/src/github.com/ComplianceAsCode/content/applications/openshift/confinement/security_profiles_operator_exists/tests/ocp4/e2e-remediation.sh: permission denied\n\nThis commit updates the script so that it's executable and doesn't fail\nwhen applied.","shortMessageHtmlLink":"Fix manual remediation for SPO rule"}},{"before":"aa881c3d0d589eb8e726bed948eb572b0ed84636","after":"ab3a185d05783e18438f96533f347757be23feed","ref":"refs/heads/master","pushedAt":"2024-08-20T19:31:03.000Z","pushType":"push","commitsCount":16,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Merge pull request #12317 from yuumasato/add_e2e_spo-install.yaml\n\nAdd forgotten e2e manual remediation","shortMessageHtmlLink":"Merge pull request ComplianceAsCode#12317 from yuumasato/add_e2e_spo-…"}},{"before":"d484bc73bb255884ff80bd746925861063b376d6","after":"aa881c3d0d589eb8e726bed948eb572b0ed84636","ref":"refs/heads/master","pushedAt":"2024-08-20T14:04:07.000Z","pushType":"push","commitsCount":37,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Merge pull request #12298 from ericeberry/master\n\nUbuntu 22.04 STIG V2R1 changes","shortMessageHtmlLink":"Merge pull request ComplianceAsCode#12298 from ericeberry/master"}},{"before":null,"after":"213450e99348b5aeca440a1aca200edf2006a562","ref":"refs/heads/fix-manual-spo-remediation","pushedAt":"2024-08-19T19:46:36.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Fix manual remediation for SPO rule\n\nWe have a manual remediation for installing SPO, but it was failing\nin our e2e suite with the following error:\n\n fork/exec /go/src/github.com/ComplianceAsCode/content/applications/openshift/confinement/security_profiles_operator_exists/tests/ocp4/e2e-remediation.sh: permission denied\n\nThis commit updates the script so that it's executable and doesn't fail\nwhen applied.","shortMessageHtmlLink":"Fix manual remediation for SPO rule"}},{"before":"d468c126903179ca171c88b2223187bb6259365a","after":"d484bc73bb255884ff80bd746925861063b376d6","ref":"refs/heads/master","pushedAt":"2024-08-19T19:42:07.000Z","pushType":"push","commitsCount":34,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Merge pull request #12312 from yuumasato/fix_chronyd_remote_server_dir_path_regex\n\nFix chronyd remote server filepath dir regex","shortMessageHtmlLink":"Merge pull request ComplianceAsCode#12312 from yuumasato/fix_chronyd_…"}},{"before":"3f447d3999368c82c52624c7482c62df337a32cc","after":"3c24d289a2eb4df9476542197623b65c72d40232","ref":"refs/heads/CMP-2196-update-ingress-operator-ciphers","pushedAt":"2024-08-14T22:19:48.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Add kubelet tls ingresscontroller rule to CIS benchmarks\n\nThis rule was originally written for CIS benchmarks, but somewhere along\nthe way it was refactored out. This could have been due to a re-indexing\nof the controls from the benchmark.\n\nThis commit adds the rule back into the CIS profiles so that it's run\nwith all supports CIS benchmarks.\n\nWe should be able to prevent against regressions by including it to the\ne2e rule assertion files.","shortMessageHtmlLink":"Add kubelet tls ingresscontroller rule to CIS benchmarks"}},{"before":"990d4d5871abf7ddd530f98c9adb3681a0705c91","after":"d468c126903179ca171c88b2223187bb6259365a","ref":"refs/heads/master","pushedAt":"2024-08-14T22:19:30.000Z","pushType":"push","commitsCount":43,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Merge pull request #12270 from jan-cerny/RHEL-45018\n\nExtend mount_option_nodev_nonroot_local_partitions","shortMessageHtmlLink":"Merge pull request ComplianceAsCode#12270 from jan-cerny/RHEL-45018"}},{"before":"2bda2e0443b653d54e5f4fc7a8a1dd75879e9f25","after":"ca60c1aeffc4ef6e32e4af220c882f09c31449ae","ref":"refs/heads/add-ocp-4.17-assertion-files","pushedAt":"2024-08-14T13:30:33.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Update rule assertion for CNI config permissions\n\nThese rules were failing in the past because the networking operator\ncreated the file with permissions of 644. That's been tightened, so this\nrule is passing by default for 4.17:\n\n openshift/cluster-network-operator#2106","shortMessageHtmlLink":"Update rule assertion for CNI config permissions"}},{"before":"b4b4b7b2b2d5136e49cc65c4e6248225945e6ec1","after":"2bda2e0443b653d54e5f4fc7a8a1dd75879e9f25","ref":"refs/heads/add-ocp-4.17-assertion-files","pushedAt":"2024-08-14T12:52:59.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"rhmdnd","name":"Lance Bragstad","path":"/rhmdnd","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94937504?s=80&v=4"},"commit":{"message":"Update rule assertion for CNI config permissions\n\nThese rules were failing in the past because the networking operator\ncreated the file with permissions of 644. That's been tightened, so this\nrule is passing by default for 4.17:\n\n openshift/cluster-network-operator#2106","shortMessageHtmlLink":"Update rule assertion for CNI config permissions"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xM1QxMzozMToxMi4wMDAwMDBazwAAAAS1hcgp","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOC0xNFQxMjo1Mjo1OS4wMDAwMDBazwAAAASaQDSj"}},"title":"Activity · rhmdnd/content"}