Skip to content

feat(validations): add module-based FIPS validation#316

Open
smith-xyz wants to merge 1 commit intoopenshift:mainfrom
smith-xyz:feat/proper-fips-crypto-check
Open

feat(validations): add module-based FIPS validation#316
smith-xyz wants to merge 1 commit intoopenshift:mainfrom
smith-xyz:feat/proper-fips-crypto-check

Conversation

@smith-xyz
Copy link
Contributor

This PR adjusts the OS validation to be accompanied by a fips crypto module validation. This will provide us with:

  • a more accurate check for a fips approved module based on config
  • the flexibility to add future modules like go crypto when FIPS certification is provided for that module

Resolves #315

@openshift-ci openshift-ci bot requested review from mrunalp and rphillips March 19, 2026 13:26
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 19, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: smith-xyz

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 19, 2026
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 19, 2026

@smith-xyz: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Certified distribution check: module-specific validation instead of allowlist

1 participant