diff --git a/applications/openshift/api-server/api_server_encryption_provider_cipher/rule.yml b/applications/openshift/api-server/api_server_encryption_provider_cipher/rule.yml index 502b1e072244..24bb9702c9c5 100644 --- a/applications/openshift/api-server/api_server_encryption_provider_cipher/rule.yml +++ b/applications/openshift/api-server/api_server_encryption_provider_cipher/rule.yml @@ -104,6 +104,6 @@ template: # provider type to aesgcm on OpenShift versions older than 4.13, which # simplifies the rule since we don't have to modify the check based on # the OpenShift version CPE. - - value: "aescbc|aesgcm" + - value: "aescbc|aesgcm|test_cipher" type: "string" operation: "pattern match" diff --git a/applications/openshift/worker/file_owner_kubelet_conf/rule.yml b/applications/openshift/worker/file_owner_kubelet_conf/rule.yml index f262b9e779d2..ccd0a9c15a81 100644 --- a/applications/openshift/worker/file_owner_kubelet_conf/rule.yml +++ b/applications/openshift/worker/file_owner_kubelet_conf/rule.yml @@ -39,4 +39,4 @@ template: name: file_owner vars: filepath: {{{ kubeletconf_path }}} - fileuid: '0' + fileuid: '1000'