Skip to content

Commit 6c64d2a

Browse files
Merge pull request #181 from netpicker/my_new_branch
skipping few rules
2 parents 221b3c4 + 1f4f742 commit 6c64d2a

9 files changed

+17
-0
lines changed

CIS/cisco_ios/12_access_rules/rule_124_create_access_list_for_use_with_line_vty.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
import pytest
12
from comfy.compliance import medium
23

34

CIS/cisco_ios/15_snmp_rules/rule_156_create_an_access_list_for_use_with_snmp.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
1+
import pytest
12
from comfy.compliance import medium
23

34

5+
@pytest.mark.skip("has to be reviewed")
46
@medium(
57
name='rule_156_create_an_access_list_for_use_with_snmp',
68
platform=['cisco_ios', 'cisco_xe'],

CIS/cisco_ios/31_routing_rules/rule_314_set_ip_verify_unicast_source_reachable_via.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
1+
import pytest
12
from comfy.compliance import medium
23

34

5+
@pytest.mark.skip("has to be reviewed")
46
@medium(
57
name='rule_314_set_ip_verify_unicast_source_reachable_via',
68
platform=['cisco_ios'], # Assuming Cisco IOS is the target platform

CIS/cisco_ios/32_border_router_filtering/rule_321_set_ip_access_list_extended_to_forbid_private_source.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
1+
import pytest
12
from comfy.compliance import low
23

34

5+
@pytest.mark.skip("has to be reviewed")
46
@low(
57
name='rule_321_set_ip_access_list_extended_to_forbid_private_source_addresses_from_external_networks',
68
platform=['cisco_ios_xe'], # Targeting Cisco IOS XE as specified

CIS/cisco_ios/32_border_router_filtering/rule_322_set_inbound_ip_access_group_on_the_external_interface.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
1+
import pytest
12
from comfy.compliance import low
23

34

45
# We have to define the actual interface here
6+
@pytest.mark.skip("has to be reviewed")
57
@low(
68
name='rule_322_set_inbound_ip_access_group_on_the_external_interface',
79
platform=['cisco_ios', 'cisco_xe'],

CIS/cisco_ios/331_require_eigrp_auth_if_used/rule_3318_set_ip_authentication_key_chain_eigrp.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
1+
import pytest
12
from comfy import medium
23

34

5+
@pytest.mark.skip("has to be reviewed")
46
@medium(
57
name='rule_3318_set_ip_authentication_key_chain_eigrp',
68
platform=['cisco_ios', 'cisco_xe'],

CIS/cisco_ios/332_require_ospf_auth_if_used/rule_3322_set_ip_ospf_message_digest_key_md5.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
1+
import pytest
12
from comfy import medium
23

34

5+
@pytest.mark.skip("has to be reviewed")
46
@medium(
57
name='rule_3322_set_ip_ospf_message_digest_key_md5',
68
platform=['cisco_ios', 'cisco_xe'],

CIS/cisco_ios/333_require_ripv2_auth_if_used/rule_3334_set_ip_rip_authentication_key_chain.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
1+
import pytest
12
from comfy import medium
23

34

5+
@pytest.mark.skip("has to be reviewed")
46
@medium(
57
name='rule_3334_set_ip_rip_authentication_key_chain',
68
platform=['cisco_ios', 'cisco_xe'],

CIS/cisco_ios/333_require_ripv2_auth_if_used/rule_3335_set_ip_rip_authentication_mode_to_md5.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
1+
import pytest
12
from comfy import medium
23

34

5+
@pytest.mark.skip("has to be reviewed")
46
@medium(
57
name='rule_3335_set_ip_rip_authentication_mode_to_md5',
68
platform=['cisco_ios', 'cisco_xe'],

0 commit comments

Comments
 (0)