forked from ComplianceAsCode/content
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request ComplianceAsCode#11592 from a-skr/feature-refactor…
…-prodtype-debian12 update debian12 anssi bp28 minimal profile
- Loading branch information
Showing
75 changed files
with
924 additions
and
2,722 deletions.
There are no files selected for viewing
2 changes: 1 addition & 1 deletion
2
...ure_rules/audit_privileged_commands/audit_rules_privileged_commands_insmod/bash/shared.sh
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 changes: 1 addition & 1 deletion
2
...e_rules/audit_privileged_commands/audit_rules_privileged_commands_modprobe/bash/shared.sh
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 changes: 1 addition & 1 deletion
2
...gure_rules/audit_privileged_commands/audit_rules_privileged_commands_rmmod/bash/shared.sh
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 changes: 1 addition & 1 deletion
2
...d_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_sudo/rule.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
62 changes: 55 additions & 7 deletions
62
...-pam/locking_out_password_attempts/accounts_password_pam_unix_remember/ansible/shared.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,21 +1,69 @@ | ||
# platform = multi_platform_rhel,multi_platform_fedora,multi_platform_ol,multi_platform_rhv,multi_platform_sle | ||
# platform = multi_platform_all | ||
# reboot = false | ||
# strategy = configure | ||
# complexity = low | ||
# disruption = medium | ||
|
||
{{% if product in [ "sle12", "sle15" ] %}} | ||
{{%- set accounts_password_pam_unix_remember_file = '/etc/pam.d/common-password' -%}} | ||
{{{ ansible_instantiate_variables("var_password_pam_unix_remember") }}} | ||
|
||
{{% if "ubuntu" in product or "debian" in product %}} | ||
{{% set pam_file='/etc/pam.d/common-password' %}} | ||
{{% set group='password' %}} | ||
{{% set control='\[success=[A-Za-z0-9].*\]' %}} | ||
{{% set module='pam_unix.so' %}} | ||
{{% set option='remember' %}} | ||
{{% set value='{{ var_password_pam_unix_remember }}' %}} | ||
{{% elif product in [ "sle12", "sle15" ] %}} | ||
{{% set pam_file='/etc/pam.d/common-password' %}} | ||
{{% else %}} | ||
{{%- set accounts_password_pam_unix_remember_file = '/etc/pam.d/system-auth' -%}} | ||
{{% set pam_file='/etc/pam.d/system-auth' %}} | ||
{{% endif %}} | ||
|
||
{{{ ansible_instantiate_variables("var_password_pam_unix_remember") }}} | ||
{{% if "ubuntu" in product or "debian" in product %}} | ||
|
||
# Modified version of macro ansible_ensure_pam_module_option(pam_file, group, control, module, option, value='', after_match=''). | ||
# The original macro is designed to search/replace also the control field thus treating the field as a constant and escaping the regex. | ||
# Here we adapt the code to allow using regex on the control field. | ||
|
||
- name: '{{{ rule_title }}} - Check if the required PAM module option is present in {{{ pam_file }}}' | ||
ansible.builtin.lineinfile: | ||
path: "{{{ pam_file }}}" | ||
regexp: ^\s*{{{ group }}}\s+{{{ control }}}\s+{{{ module }}}\s*.*\s{{{ option }}}\b | ||
state: absent | ||
check_mode: true | ||
changed_when: false | ||
register: result_pam_module_{{{ option }}}_option_present | ||
|
||
- name: '{{{ rule_title }}} - Ensure the "{{{ option }}}" PAM option for "{{{ module }}}" is included in {{{ pam_file }}}' | ||
ansible.builtin.lineinfile: | ||
path: "{{{ pam_file }}}" | ||
backrefs: true | ||
regexp: ^(\s*{{{ group }}}\s+{{{ control }}}\s+{{{ module }}}.*) | ||
line: \1 {{{ option }}}={{{ value }}} | ||
state: present | ||
register: result_pam_{{{ option }}}_add | ||
when: | ||
- result_pam_module_{{{ option }}}_option_present.found == 0 | ||
|
||
{{{ ansible_pam_pwhistory_enable(accounts_password_pam_unix_remember_file, | ||
- name: '{{{ rule_title }}} - Ensure the required value for "{{{ option }}}" PAM option from "{{{ module }}}" in {{{ pam_file }}}' | ||
ansible.builtin.lineinfile: | ||
path: "{{{ pam_file }}}" | ||
backrefs: true | ||
regexp: ^(\s*{{{ group }}}\s+{{{ control }}}\s+{{{ module }}}\s+.*)({{{ option }}})=[0-9a-zA-Z]+\s*(.*) | ||
line: \1\2={{{ value }}} \3 | ||
register: result_pam_{{{ option }}}_edit | ||
when: | ||
- result_pam_module_{{{ option }}}_option_present.found > 0 | ||
|
||
|
||
{{% else %}} | ||
|
||
{{{ ansible_pam_pwhistory_enable(pam_file, | ||
'requisite', | ||
'^password.*requisite.*pam_pwquality\.so') }}} | ||
|
||
{{{ ansible_pam_pwhistory_parameter_value(accounts_password_pam_unix_remember_file, | ||
{{{ ansible_pam_pwhistory_parameter_value(pam_file, | ||
'remember', | ||
'{{ var_password_pam_unix_remember }}') }}} | ||
|
||
{{% endif %}} |
48 changes: 0 additions & 48 deletions
48
...-pam/locking_out_password_attempts/accounts_password_pam_unix_remember/ansible/ubuntu.yml
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
5 changes: 0 additions & 5 deletions
5
...unts-pam/locking_out_password_attempts/accounts_password_pam_unix_remember/bash/ubuntu.sh
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.