Compare commits
4 commits
b360d0e861
...
78aad663e6
| Author | SHA1 | Date | |
|---|---|---|---|
| 78aad663e6 | |||
| ec972f9470 | |||
| 7792cac0c7 | |||
| b471a034a4 |
8 changed files with 62 additions and 82 deletions
|
|
@ -16,18 +16,8 @@
|
||||||
- python3-acme
|
- python3-acme
|
||||||
- python3-zipp
|
- python3-zipp
|
||||||
- python3-pyOpenSSL
|
- python3-pyOpenSSL
|
||||||
# 2.1 Configure Server Services
|
|
||||||
# These services are required by FreeIPA.
|
|
||||||
rhel9cis_autofs_services: true # TODO: can we mask it? This is required by FreeIPA but we don't use it.
|
|
||||||
rhel9cis_dns_server: true
|
rhel9cis_dns_server: true
|
||||||
rhel9cis_httpd_server: true
|
rhel9cis_httpd_server: true
|
||||||
# 2.2 Configure Client Services
|
|
||||||
# These services are required by FreeIPA.
|
|
||||||
rhel9cis_openldap_clients_required: true
|
|
||||||
# 5.3.2 Configure authselect
|
|
||||||
# ipaservers are part of Linux Identity Management. Joining your host to an IdM
|
|
||||||
# domain automatically configures SSSD authentication on your host.
|
|
||||||
rhel9cis_allow_authselect_updates: false
|
|
||||||
# TODO: Restricted umask breaks FreeIPA roles
|
# TODO: Restricted umask breaks FreeIPA roles
|
||||||
rhel9cis_rule_5_4_2_6: false
|
rhel9cis_rule_5_4_2_6: false
|
||||||
rhel9cis_rule_5_4_3_3: false
|
rhel9cis_rule_5_4_3_3: false
|
||||||
|
|
@ -41,16 +31,6 @@
|
||||||
hosts:
|
hosts:
|
||||||
- keycloak
|
- keycloak
|
||||||
become: true
|
become: true
|
||||||
vars:
|
|
||||||
rhel9cis_autofs_services: true # TODO: can we mask it? This is required by FreeIPA but we don't use it.
|
|
||||||
# 2.2 Configure Client Services
|
|
||||||
# These services are required by FreeIPA.
|
|
||||||
rhel9cis_openldap_clients_required: true
|
|
||||||
# 5.3.2 Configure authselect
|
|
||||||
# ipaservers are part of Linux Identity Management. Joining your host to an IdM
|
|
||||||
# domain automatically configures SSSD authentication on your host.
|
|
||||||
rhel9cis_allow_authselect_updates: false
|
|
||||||
podman_host_rootless_users: ["identity"]
|
|
||||||
roles:
|
roles:
|
||||||
- role: sr2c.core.baseline
|
- role: sr2c.core.baseline
|
||||||
tags: bootstrap
|
tags: bootstrap
|
||||||
|
|
|
||||||
|
|
@ -11,11 +11,12 @@
|
||||||
changed_when: false
|
changed_when: false
|
||||||
|
|
||||||
- name: FreeIPA Client | PATCH | Apply authselect profile with sssd, sudo, and mkhomedir if not set
|
- name: FreeIPA Client | PATCH | Apply authselect profile with sssd, sudo, and mkhomedir if not set
|
||||||
ansible.builtin.command: authselect select sssd with-sudo with-mkhomedir --force
|
ansible.builtin.command: authselect select sssd with-sudo with-mkhomedir with-subid --force
|
||||||
when: >
|
when: >
|
||||||
'Profile ID: sssd' not in _baseline_freeipa_authselect_status.stdout or
|
'Profile ID: sssd' not in _baseline_freeipa_authselect_status.stdout or
|
||||||
'with-sudo' not in _baseline_freeipa_authselect_status.stdout or
|
'with-sudo' not in _baseline_freeipa_authselect_status.stdout or
|
||||||
'with-mkhomedir' not in _baseline_freeipa_authselect_status.stdout
|
'with-mkhomedir' not in _baseline_freeipa_authselect_status.stdout or
|
||||||
|
'with-subid' not in _baseline_freeipa_authselect_status.stdout
|
||||||
|
|
||||||
- name: FreeIPA Client | PATCH | Enable oddjobd.service (for with-mkhomedir feature)
|
- name: FreeIPA Client | PATCH | Enable oddjobd.service (for with-mkhomedir feature)
|
||||||
ansible.builtin.systemd_service:
|
ansible.builtin.systemd_service:
|
||||||
|
|
|
||||||
|
|
@ -22,4 +22,12 @@
|
||||||
rhel9cis_syslog: rsyslog
|
rhel9cis_syslog: rsyslog
|
||||||
rhel9cis_time_synchronization_servers: "{{ baseline_ntp_servers }}"
|
rhel9cis_time_synchronization_servers: "{{ baseline_ntp_servers }}"
|
||||||
rhel9cis_warning_banner: "{{ baseline_warning_banner }}"
|
rhel9cis_warning_banner: "{{ baseline_warning_banner }}"
|
||||||
|
rhel9cis_autofs_services: true # TODO: can we mask it? This is required by FreeIPA but we don't use it.
|
||||||
|
# 2.2 Configure Client Services
|
||||||
|
# These services are required by FreeIPA.
|
||||||
|
rhel9cis_openldap_clients_required: true
|
||||||
|
# 5.3.2 Configure authselect
|
||||||
|
# ipaservers are part of Linux Identity Management. Joining your host to an IdM
|
||||||
|
# domain automatically configures SSSD authentication on your host.
|
||||||
|
rhel9cis_allow_authselect_updates: false
|
||||||
when: (ansible_distribution == "Rocky") and (ansible_distribution_major_version == "9")
|
when: (ansible_distribution == "Rocky") and (ansible_distribution_major_version == "9")
|
||||||
|
|
|
||||||
|
|
@ -1,41 +0,0 @@
|
||||||
---
|
|
||||||
- name: Podman Host | AUDIT | Gather rootless user facts
|
|
||||||
ansible.builtin.user:
|
|
||||||
name: "{{ _podman_host_rootless_user }}"
|
|
||||||
register: _podman_host_rootless_user_facts
|
|
||||||
|
|
||||||
- name: Podman Host | AUDIT | Resolve name of user's primary group
|
|
||||||
ansible.builtin.getent:
|
|
||||||
database: group
|
|
||||||
key: "{{ _podman_host_rootless_user_facts.group }}"
|
|
||||||
register: _podman_host_rootless_user_group
|
|
||||||
|
|
||||||
- name: Podman Host | AUDIT | Check if user is in subuid file
|
|
||||||
ansible.builtin.lineinfile:
|
|
||||||
path: /etc/subuid
|
|
||||||
regexp: '^{{ _podman_host_rootless_user }}:.*$'
|
|
||||||
state: absent
|
|
||||||
register: _podman_host_uid_line_found
|
|
||||||
check_mode: true
|
|
||||||
failed_when: false
|
|
||||||
changed_when: false
|
|
||||||
|
|
||||||
- name: Podman Host | AUDIT | Check if group is in subgid file
|
|
||||||
ansible.builtin.lineinfile:
|
|
||||||
path: /etc/subgid
|
|
||||||
regexp: '^{{ _podman_host_rootless_user_group.ansible_facts.getent_group | first }}:.*$'
|
|
||||||
state: absent
|
|
||||||
register: _podman_host_gid_line_found
|
|
||||||
check_mode: true
|
|
||||||
failed_when: false
|
|
||||||
changed_when: false
|
|
||||||
|
|
||||||
- name: Podman Host | AUDIT | Assert that user is in subuid file exactly once
|
|
||||||
ansible.builtin.assert:
|
|
||||||
that:
|
|
||||||
- _podman_host_uid_line_found.found == 1
|
|
||||||
|
|
||||||
- name: Podman Host | AUDIT | Assert that group is in subgid file exactly once
|
|
||||||
ansible.builtin.assert:
|
|
||||||
that:
|
|
||||||
- _podman_host_gid_line_found.found == 1
|
|
||||||
26
roles/podman_host/tasks/check_users.yml
Normal file
26
roles/podman_host/tasks/check_users.yml
Normal file
|
|
@ -0,0 +1,26 @@
|
||||||
|
---
|
||||||
|
- name: Podman Host | AUDIT | Gather rootless user facts
|
||||||
|
ansible.builtin.getent:
|
||||||
|
database: passwd
|
||||||
|
key: "{{ _podman_host_rootless_user }}"
|
||||||
|
register: _podman_host_rootless_user_facts
|
||||||
|
|
||||||
|
- debug:
|
||||||
|
msg: "{{ _podman_host_rootless_user_facts }}"
|
||||||
|
|
||||||
|
- name: Podman Host | AUDIT | Ensure the rootless user exists
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- _podman_host_rootless_user in _podman_host_rootless_user_facts.ansible_facts.getent_passwd.keys()
|
||||||
|
fail_msg: "User '{{ _podman_host_rootless_user }}' does not exist on this host."
|
||||||
|
|
||||||
|
- name: Podman Host | AUDIT | Ensure the rootless user has subuids defined
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: "getsubids {{ _podman_host_rootless_user }}"
|
||||||
|
changed_when: false
|
||||||
|
|
||||||
|
- name: Podman Host | AUDIT | Ensure the rootless user has subgids defined
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: "getsubids -g {{ _podman_host_rootless_user }}"
|
||||||
|
changed_when: false
|
||||||
|
|
||||||
|
|
@ -1,13 +1,22 @@
|
||||||
---
|
---
|
||||||
- name: Podman Host | PRELIM | Ensure the rootless users are defined and are not root
|
- name: Podman Host | AUDIT | Ensure the rootless users are defined and are not root
|
||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that:
|
||||||
- podman_host_rootless_users | length > 0
|
- podman_host_rootless_users | length > 0
|
||||||
- '"root" not in podman_host_rootless_users'
|
- '"root" not in podman_host_rootless_users'
|
||||||
|
|
||||||
- name: Podman Host | AUDIT | Ensure that subuid and subgid are defined for the users
|
- name: Podman Host | PATCH | Install Podman
|
||||||
|
ansible.builtin.dnf:
|
||||||
|
name:
|
||||||
|
- podman
|
||||||
|
- container-selinux
|
||||||
|
- shadow-utils-subid # for getsubids
|
||||||
|
state: latest
|
||||||
|
become: true
|
||||||
|
|
||||||
|
- name: Podman Host | AUDIT | Ensure that users exist and have subids configured
|
||||||
ansible.builtin.include_tasks:
|
ansible.builtin.include_tasks:
|
||||||
file: check_subid.yml
|
file: check_users.yml
|
||||||
vars:
|
vars:
|
||||||
_podman_host_rootless_user: "{{ item }}"
|
_podman_host_rootless_user: "{{ item }}"
|
||||||
with_items: "{{ podman_host_rootless_users }}"
|
with_items: "{{ podman_host_rootless_users }}"
|
||||||
|
|
@ -21,17 +30,10 @@
|
||||||
reload: true
|
reload: true
|
||||||
become: true
|
become: true
|
||||||
|
|
||||||
- name: Podman Host | PATCH | Create users for rootless podman
|
- name: Podman Host | PATCH | Set XDG_RUNTIME_DIR in .bash_profile for rootless users
|
||||||
ansible.builtin.user:
|
|
||||||
name: "{{ item }}"
|
|
||||||
become: true
|
|
||||||
with_items: "{{ podman_host_rootless_users }}"
|
|
||||||
|
|
||||||
- name: Podman Host | PATCH | Set XDG_RUNTIME_DIR in .profile for rootless users
|
|
||||||
ansible.builtin.lineinfile:
|
ansible.builtin.lineinfile:
|
||||||
path: "/home/{{ item }}/.bash_profile"
|
path: "/home/{{ item }}/.bash_profile"
|
||||||
line: "export XDG_RUNTIME_DIR=/run/user/$(id -u)"
|
line: "export XDG_RUNTIME_DIR=/run/user/$(id -u)"
|
||||||
create: false
|
|
||||||
become: true
|
become: true
|
||||||
become_user: "{{ item }}"
|
become_user: "{{ item }}"
|
||||||
with_items: "{{ podman_host_rootless_users }}"
|
with_items: "{{ podman_host_rootless_users }}"
|
||||||
|
|
@ -46,14 +48,6 @@
|
||||||
become: true
|
become: true
|
||||||
with_items: "{{ podman_host_rootless_users }}"
|
with_items: "{{ podman_host_rootless_users }}"
|
||||||
|
|
||||||
- name: Podman Host | PATCH | Install Podman
|
|
||||||
ansible.builtin.dnf:
|
|
||||||
name:
|
|
||||||
- podman
|
|
||||||
- container-selinux
|
|
||||||
state: latest
|
|
||||||
become: true
|
|
||||||
|
|
||||||
- name: Podman Host | PATCH | Create users quadlets directory
|
- name: Podman Host | PATCH | Create users quadlets directory
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
path: "/home/{{ item }}/.config/containers/systemd"
|
path: "/home/{{ item }}/.config/containers/systemd"
|
||||||
|
|
|
||||||
|
|
@ -8,3 +8,4 @@ podman_nginx_podman_rootless_user: nginx
|
||||||
# podman_nginx_systemd_service_target:
|
# podman_nginx_systemd_service_target:
|
||||||
podman_nginx_systemd_service_requires: []
|
podman_nginx_systemd_service_requires: []
|
||||||
podman_nginx_additional_volumes: []
|
podman_nginx_additional_volumes: []
|
||||||
|
podman_nginx_firewalld_zone: public
|
||||||
|
|
@ -1,4 +1,15 @@
|
||||||
---
|
---
|
||||||
|
- name: Podman Nginx | PATCH | Open firewall for http and https services
|
||||||
|
ansible.posix.firewalld:
|
||||||
|
zone: "{{ podman_nginx_firewalld_zone }}"
|
||||||
|
service: "{{ item }}"
|
||||||
|
permanent: true
|
||||||
|
immediate: true
|
||||||
|
state: enabled
|
||||||
|
with_items:
|
||||||
|
- http
|
||||||
|
- https
|
||||||
|
|
||||||
- name: Podman Nginx | PATCH | Create service configuration directories
|
- name: Podman Nginx | PATCH | Create service configuration directories
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
path: "/home/{{ podman_nginx_podman_rootless_user }}/{{ item }}"
|
path: "/home/{{ podman_nginx_podman_rootless_user }}/{{ item }}"
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue