set rpm_digest to sha256 instead of default md5 #14864
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Release notes
set rpm_digest to sha256 instead of default md5 to allow installation on FIPS enabled OS
What does this PR do?
Set "rpm_digest" in fpm to SHA256 instead of the default MD5. This effectively sets
_binary_filedigest_algorithm
_build_binary_file_digest_algo
to "8" in the rpm spec for building Logstash RPM packages.Why is it important/What is the impact to the user?
This allows FIPS enabled Operating Systems to validate the RPM package.
On RHEL w/ FIPS enabled, without this PR:
with this PR:
Author's Checklist
How to test this PR locally
rake artifact:rpm
on a x64 machinefips-mode-setup --enable
rpm -Uvh <rpm_file.rpm>
Related issues
closes #12597
Use cases
One step towards FIPS compliance, but more is needed (e.g. using certified cryptographic modules, avoiding use of tmp, etc).