From aa8a60b4ee5e10aafdf45399b223298bca325db3 Mon Sep 17 00:00:00 2001 From: "pre-commit-ci[bot]" <66853113+pre-commit-ci[bot]@users.noreply.github.com> Date: Mon, 22 Jan 2024 17:33:49 +0000 Subject: [PATCH 1/3] [pre-commit.ci] pre-commit autoupdate MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit updates: - [github.com/ansible-community/ansible-lint: v6.22.1 → v6.22.2](https://github.com/ansible-community/ansible-lint/compare/v6.22.1...v6.22.2) --- .pre-commit-config.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.pre-commit-config.yaml b/.pre-commit-config.yaml index a79d4cb..25fbc9e 100644 --- a/.pre-commit-config.yaml +++ b/.pre-commit-config.yaml @@ -43,7 +43,7 @@ repos: args: ['--baseline-path', '.config/.gitleaks-report.json'] - repo: https://github.com/ansible-community/ansible-lint - rev: v6.22.1 + rev: v6.22.2 hooks: - id: ansible-lint name: Ansible-lint From e41a340fb0d9b1d97eee100d1c7b9017232f5454 Mon Sep 17 00:00:00 2001 From: Ionut Pruteanu Date: Tue, 30 Jan 2024 20:51:32 +0200 Subject: [PATCH 2/3] Ensuring "session optional pam_umask.so " is present in /etc/pam.d/{system-auth | password-auth} --- tasks/section_5/cis_5.6.x.yml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) diff --git a/tasks/section_5/cis_5.6.x.yml b/tasks/section_5/cis_5.6.x.yml index e5565b4..dffc2d8 100644 --- a/tasks/section_5/cis_5.6.x.yml +++ b/tasks/section_5/cis_5.6.x.yml @@ -98,6 +98,37 @@ regexp: '^USERGROUPS_ENAB' line: USERGROUPS_ENAB no + - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | Check umask.so in system-auth" + shell: | + grep -E -q "^session\s*(optional|requisite|required)\s*pam_umask.so$" /etc/pam.d/system-auth + ignore_errors: true + no_log: true + check_mode: true + register: pam_umask_line_present_system + + - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | If needed, load session umask.so in system-auth" + ansible.builtin.lineinfile: + path: "/etc/pam.d/system-auth" + regexp: '^session\s*(optional|requisite|required)\s*pam_umask.so$' + line: 'session optional pam_umask.so' + when: + - pam_umask_line_present_system.rc | int != 0 + + - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | Check umask.so in password-auth" + shell: | + grep -E -q "^session\s*(optional|requisite|required)\s*pam_umask.so$" /etc/pam.d/password-auth + ignore_errors: true + no_log: true + check_mode: true + register: pam_umask_line_present_password + + - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | If needed, load session umask.so in password-auth" + ansible.builtin.lineinfile: + path: "/etc/pam.d/password-auth" + regexp: '^session\s*(optional|requisite|required)\s*pam_umask.so$' + line: 'session optional pam_umask.so' + when: + - pam_umask_line_present_password.rc | int != 0 when: - rhel9cis_rule_5_6_5 tags: From 47a00a1fd13dd294ad5e946a77cad69e9438fd47 Mon Sep 17 00:00:00 2001 From: Ionut Pruteanu Date: Tue, 30 Jan 2024 20:51:32 +0200 Subject: [PATCH 3/3] Solving conflicts after previous commit: Ensuring "session optional pam_umask.so" is present in /etc/pam.d/{system-auth | password-auth} --- tasks/section_5/cis_5.6.x.yml | 34 ++++++++++++++++++++++++++++++---- 1 file changed, 30 insertions(+), 4 deletions(-) diff --git a/tasks/section_5/cis_5.6.x.yml b/tasks/section_5/cis_5.6.x.yml index a2c0219..dffc2d8 100644 --- a/tasks/section_5/cis_5.6.x.yml +++ b/tasks/section_5/cis_5.6.x.yml @@ -98,11 +98,37 @@ regexp: '^USERGROUPS_ENAB' line: USERGROUPS_ENAB no - - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | Force umask sessions /etc/pam.d/system-auth" + - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | Check umask.so in system-auth" + shell: | + grep -E -q "^session\s*(optional|requisite|required)\s*pam_umask.so$" /etc/pam.d/system-auth + ignore_errors: true + no_log: true + check_mode: true + register: pam_umask_line_present_system + + - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | If needed, load session umask.so in system-auth" ansible.builtin.lineinfile: - path: /etc/pam.d/system-auth - line: 'session required pam_umask.so' - insertafter: EOF + path: "/etc/pam.d/system-auth" + regexp: '^session\s*(optional|requisite|required)\s*pam_umask.so$' + line: 'session optional pam_umask.so' + when: + - pam_umask_line_present_system.rc | int != 0 + + - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | Check umask.so in password-auth" + shell: | + grep -E -q "^session\s*(optional|requisite|required)\s*pam_umask.so$" /etc/pam.d/password-auth + ignore_errors: true + no_log: true + check_mode: true + register: pam_umask_line_present_password + + - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | If needed, load session umask.so in password-auth" + ansible.builtin.lineinfile: + path: "/etc/pam.d/password-auth" + regexp: '^session\s*(optional|requisite|required)\s*pam_umask.so$' + line: 'session optional pam_umask.so' + when: + - pam_umask_line_present_password.rc | int != 0 when: - rhel9cis_rule_5_6_5 tags: