From 549d51074762e40769e841689c8c39b0f33d4ce2 Mon Sep 17 00:00:00 2001 From: Ionut Pruteanu Date: Tue, 30 Jan 2024 20:51:32 +0200 Subject: [PATCH] Solving conflicts after previous commit: Ensuring "session optional pam_umask.so" is present in /etc/pam.d/{system-auth | password-auth} Signed-off-by: Ionut Pruteanu --- tasks/section_5/cis_5.6.x.yml | 34 ++++++++++++++++++++++++++++++---- 1 file changed, 30 insertions(+), 4 deletions(-) diff --git a/tasks/section_5/cis_5.6.x.yml b/tasks/section_5/cis_5.6.x.yml index a2c0219..dffc2d8 100644 --- a/tasks/section_5/cis_5.6.x.yml +++ b/tasks/section_5/cis_5.6.x.yml @@ -98,11 +98,37 @@ regexp: '^USERGROUPS_ENAB' line: USERGROUPS_ENAB no - - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | Force umask sessions /etc/pam.d/system-auth" + - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | Check umask.so in system-auth" + shell: | + grep -E -q "^session\s*(optional|requisite|required)\s*pam_umask.so$" /etc/pam.d/system-auth + ignore_errors: true + no_log: true + check_mode: true + register: pam_umask_line_present_system + + - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | If needed, load session umask.so in system-auth" ansible.builtin.lineinfile: - path: /etc/pam.d/system-auth - line: 'session required pam_umask.so' - insertafter: EOF + path: "/etc/pam.d/system-auth" + regexp: '^session\s*(optional|requisite|required)\s*pam_umask.so$' + line: 'session optional pam_umask.so' + when: + - pam_umask_line_present_system.rc | int != 0 + + - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | Check umask.so in password-auth" + shell: | + grep -E -q "^session\s*(optional|requisite|required)\s*pam_umask.so$" /etc/pam.d/password-auth + ignore_errors: true + no_log: true + check_mode: true + register: pam_umask_line_present_password + + - name: "5.6.5 | PATCH | Ensure default user umask is 027 or more restrictive | If needed, load session umask.so in password-auth" + ansible.builtin.lineinfile: + path: "/etc/pam.d/password-auth" + regexp: '^session\s*(optional|requisite|required)\s*pam_umask.so$' + line: 'session optional pam_umask.so' + when: + - pam_umask_line_present_password.rc | int != 0 when: - rhel9cis_rule_5_6_5 tags: