Bug 2149678

Summary: Synchronize automation-related changes from Fedora spec file
Product: Red Hat Enterprise Linux 9 Reporter: Pavel Cahyna <pcahyna>
Component: rhel-system-rolesAssignee: Pavel Cahyna <pcahyna>
Status: CLOSED ERRATA QA Contact: Evgeny Fedin <efedin>
Severity: unspecified Docs Contact: Lucie Vařáková <lmanasko>
Priority: unspecified    
Version: 9.2CC: djez, efedin, lmanasko, rmeggins, spetrosi
Target Milestone: rcKeywords: Triaged
Target Release: 9.2   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: rhel-system-roles-1.21.0-0.15.el9 Doc Type: Enhancement
Doc Text:
.The `sshd` RHEL System Role can now use the `firewall` and `selinux` RHEL System Roles to manage port access With this enhancement, you can automate managing port access by using the new role variables `sshd_manage_firewall` and `sshd_manage_selinux`. If they are set to `true`, each role is used to manage the port access. If they are set to `false`, which is default, the roles do not engage.
Story Points: ---
Clone Of:
: 2149683 2149685 (view as bug list) Environment:
Last Closed: 2023-05-09 07:38:23 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2149683, 2149685    

Comment 9 errata-xmlrpc 2023-05-09 07:38:23 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (rhel-system-roles bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2023:2246