Tags

Tags give the ability to mark specific points in history as being important
  • v1.5

    Build Sugar4Bongo RHEL9 VHDX image
  • v1.4

    66928647 · added dos2unix package ·
    Release: Release v1.4: FIPS CIS1 LVM + SCAP Compliance + Version Breadcrumb This release adds the dos2unix package.
    Release v1.4: FIPS CIS1 LVM + SCAP Compliance + Version Breadcrumb
    
    This release adds the dos2unix package.
  • v1.3

    Release: Orange Trumptard
    Release v1.3: FIPS CIS1 LVM + SCAP Compliance + Version Breadcrumb
    
    This release fixes a minor problem seen with the FIPS enablement and introduces a version breadcrumb by introducing a self-disabling 'first boot' service.
    
    Key Features:
    
    FIPS Compliance Readiness: FIPS 140-3 state enabled on the first boot, ensuring the kernel and libraries are ready for encrypted workloads.
    
    Version Breadcrumb: /etc/sugar4bongo-release Release v1.2: FIPS CIS1 LVM + SCAP Compliance
    
    This release adds automated compliance configuration required for CIS Server Level 1 hardening to be applied successfully in downstream stages.
    
    Key Features:
    
    FIPS Compliance Readiness: Automatically configures the FIPS 140-3 state on the first boot, ensuring the kernel and libraries are ready for encrypted workloads.
    
    Version Breadcrumb: /etc/sugar4bongo-release now contains Sugar4Bongo V1.x (Orange Trumptard)
  • v1.2

    113619f1 · Edit rhel9-hyperv.json ·
    Release: RHEL9 VHDX + FIPS + CIS Level 1 + LVM + SCAP
    Release v1.2: FIPS CIS1 LVM + SCAP Compliance
    
    This release adds automated compliance configuration required for CIS Server Level 1 hardening to be applied successfully in downstream stages.
    
    Key Features:
    
    FIPS Compliance Readiness: Automatically configures the FIPS 140-3 state on the first boot, ensuring the kernel and libraries are ready for encrypted workloads.
    
    CIS-Compliant LVM Layout: Implements the mandatory LVM partitioning scheme required to meet CIS Level 1 storage isolation standards.
    
    CIS Level 1 Server Hardening via OpenSCAP: Integrates OpenSCAP during image build using the xccdf_org.ssgproject.content_profile_cis_server_l1 profile and the official SCAP datastream (ssg-rhel9-ds.xml). This ensures the system is evaluated against CIS benchmarks at build time, reducing manual compliance overhead.
    
    SCAP Content Availability: Includes scap-security-guide for local remediation and future compliance scans without requiring internet access.
  • v1.1

    90b850ce · Edit rhel9-hyperv.json ·
    Release: RHEL9 VHDX + FIPS + CIS Level 1 + LVM
    Release v1.1: FIPS CIS1 LVM
    
    Description: This release establishes a compliant infrastructure baseline. It provides the necessary disk architecture and cryptographic state required for CIS Server Level 1 hardening to be applied successfully in downstream stages.
    
    Key Features:
    
    FIPS Compliance Readiness: Automatically configures the FIPS 140-3 state on the first boot, ensuring the kernel and libraries are ready for encrypted workloads.
    
    CIS-Compliant LVM Layout: Implements the mandatory LVM partitioning scheme required to meet CIS Level 1 storage isolation standards.
  • v1.0

    6dfbc7bb · Edit rhel9-hyperv.json ·
    Release: v1.0 Stable Pipeline
    Release v1.0: Baseline Image Build Pipeline
    Description: First stable release of the automated RHEL 9 image factory. This version establishes a repeatable "source-to-template" workflow, successfully producing bootable Hyper-V VHDX images from Red Hat Cloud Console blueprints.
    
    Key Features:
    
    Blueprint Integration: Automates image composition requests using rhel9-hyperv.json via the Red Hat Image Builder API.
    
    Hybrid Conversion: Handles automated stream-download of vSphere VMDK sources to local D: storage with real-time progress tracking.
    
    Format Transformation: Utilizes QEMU-img to convert sources into a static, ready-to-use rhel9-template.vhdx for Hyper-V.
    
    Provisioned Access: Baseline image includes a pre-configured ansible user with sudo privileges and authorized SSH keys for immediate post-deployment management.
    
    Auditability: Generates an image_receipt.txt artifact for every build, containing the unique Red Hat Compose ID and SHA256 file hash for verification.