Compare commits
4 commits
b360d0e861
...
78aad663e6
| Author | SHA1 | Date | |
|---|---|---|---|
| 78aad663e6 | |||
| ec972f9470 | |||
| 7792cac0c7 | |||
| b471a034a4 |
8 changed files with 62 additions and 82 deletions
|
|
@ -16,18 +16,8 @@
|
|||
- python3-acme
|
||||
- python3-zipp
|
||||
- python3-pyOpenSSL
|
||||
# 2.1 Configure Server Services
|
||||
# These services are required by FreeIPA.
|
||||
rhel9cis_autofs_services: true # TODO: can we mask it? This is required by FreeIPA but we don't use it.
|
||||
rhel9cis_dns_server: true
|
||||
rhel9cis_httpd_server: true
|
||||
# 2.2 Configure Client Services
|
||||
# These services are required by FreeIPA.
|
||||
rhel9cis_openldap_clients_required: true
|
||||
# 5.3.2 Configure authselect
|
||||
# ipaservers are part of Linux Identity Management. Joining your host to an IdM
|
||||
# domain automatically configures SSSD authentication on your host.
|
||||
rhel9cis_allow_authselect_updates: false
|
||||
# TODO: Restricted umask breaks FreeIPA roles
|
||||
rhel9cis_rule_5_4_2_6: false
|
||||
rhel9cis_rule_5_4_3_3: false
|
||||
|
|
@ -41,16 +31,6 @@
|
|||
hosts:
|
||||
- keycloak
|
||||
become: true
|
||||
vars:
|
||||
rhel9cis_autofs_services: true # TODO: can we mask it? This is required by FreeIPA but we don't use it.
|
||||
# 2.2 Configure Client Services
|
||||
# These services are required by FreeIPA.
|
||||
rhel9cis_openldap_clients_required: true
|
||||
# 5.3.2 Configure authselect
|
||||
# ipaservers are part of Linux Identity Management. Joining your host to an IdM
|
||||
# domain automatically configures SSSD authentication on your host.
|
||||
rhel9cis_allow_authselect_updates: false
|
||||
podman_host_rootless_users: ["identity"]
|
||||
roles:
|
||||
- role: sr2c.core.baseline
|
||||
tags: bootstrap
|
||||
|
|
|
|||
|
|
@ -11,11 +11,12 @@
|
|||
changed_when: false
|
||||
|
||||
- name: FreeIPA Client | PATCH | Apply authselect profile with sssd, sudo, and mkhomedir if not set
|
||||
ansible.builtin.command: authselect select sssd with-sudo with-mkhomedir --force
|
||||
ansible.builtin.command: authselect select sssd with-sudo with-mkhomedir with-subid --force
|
||||
when: >
|
||||
'Profile ID: sssd' not in _baseline_freeipa_authselect_status.stdout or
|
||||
'with-sudo' not in _baseline_freeipa_authselect_status.stdout or
|
||||
'with-mkhomedir' not in _baseline_freeipa_authselect_status.stdout
|
||||
'with-mkhomedir' not in _baseline_freeipa_authselect_status.stdout or
|
||||
'with-subid' not in _baseline_freeipa_authselect_status.stdout
|
||||
|
||||
- name: FreeIPA Client | PATCH | Enable oddjobd.service (for with-mkhomedir feature)
|
||||
ansible.builtin.systemd_service:
|
||||
|
|
|
|||
|
|
@ -22,4 +22,12 @@
|
|||
rhel9cis_syslog: rsyslog
|
||||
rhel9cis_time_synchronization_servers: "{{ baseline_ntp_servers }}"
|
||||
rhel9cis_warning_banner: "{{ baseline_warning_banner }}"
|
||||
rhel9cis_autofs_services: true # TODO: can we mask it? This is required by FreeIPA but we don't use it.
|
||||
# 2.2 Configure Client Services
|
||||
# These services are required by FreeIPA.
|
||||
rhel9cis_openldap_clients_required: true
|
||||
# 5.3.2 Configure authselect
|
||||
# ipaservers are part of Linux Identity Management. Joining your host to an IdM
|
||||
# domain automatically configures SSSD authentication on your host.
|
||||
rhel9cis_allow_authselect_updates: false
|
||||
when: (ansible_distribution == "Rocky") and (ansible_distribution_major_version == "9")
|
||||
|
|
|
|||
|
|
@ -1,41 +0,0 @@
|
|||
---
|
||||
- name: Podman Host | AUDIT | Gather rootless user facts
|
||||
ansible.builtin.user:
|
||||
name: "{{ _podman_host_rootless_user }}"
|
||||
register: _podman_host_rootless_user_facts
|
||||
|
||||
- name: Podman Host | AUDIT | Resolve name of user's primary group
|
||||
ansible.builtin.getent:
|
||||
database: group
|
||||
key: "{{ _podman_host_rootless_user_facts.group }}"
|
||||
register: _podman_host_rootless_user_group
|
||||
|
||||
- name: Podman Host | AUDIT | Check if user is in subuid file
|
||||
ansible.builtin.lineinfile:
|
||||
path: /etc/subuid
|
||||
regexp: '^{{ _podman_host_rootless_user }}:.*$'
|
||||
state: absent
|
||||
register: _podman_host_uid_line_found
|
||||
check_mode: true
|
||||
failed_when: false
|
||||
changed_when: false
|
||||
|
||||
- name: Podman Host | AUDIT | Check if group is in subgid file
|
||||
ansible.builtin.lineinfile:
|
||||
path: /etc/subgid
|
||||
regexp: '^{{ _podman_host_rootless_user_group.ansible_facts.getent_group | first }}:.*$'
|
||||
state: absent
|
||||
register: _podman_host_gid_line_found
|
||||
check_mode: true
|
||||
failed_when: false
|
||||
changed_when: false
|
||||
|
||||
- name: Podman Host | AUDIT | Assert that user is in subuid file exactly once
|
||||
ansible.builtin.assert:
|
||||
that:
|
||||
- _podman_host_uid_line_found.found == 1
|
||||
|
||||
- name: Podman Host | AUDIT | Assert that group is in subgid file exactly once
|
||||
ansible.builtin.assert:
|
||||
that:
|
||||
- _podman_host_gid_line_found.found == 1
|
||||
26
roles/podman_host/tasks/check_users.yml
Normal file
26
roles/podman_host/tasks/check_users.yml
Normal file
|
|
@ -0,0 +1,26 @@
|
|||
---
|
||||
- name: Podman Host | AUDIT | Gather rootless user facts
|
||||
ansible.builtin.getent:
|
||||
database: passwd
|
||||
key: "{{ _podman_host_rootless_user }}"
|
||||
register: _podman_host_rootless_user_facts
|
||||
|
||||
- debug:
|
||||
msg: "{{ _podman_host_rootless_user_facts }}"
|
||||
|
||||
- name: Podman Host | AUDIT | Ensure the rootless user exists
|
||||
ansible.builtin.assert:
|
||||
that:
|
||||
- _podman_host_rootless_user in _podman_host_rootless_user_facts.ansible_facts.getent_passwd.keys()
|
||||
fail_msg: "User '{{ _podman_host_rootless_user }}' does not exist on this host."
|
||||
|
||||
- name: Podman Host | AUDIT | Ensure the rootless user has subuids defined
|
||||
ansible.builtin.command:
|
||||
cmd: "getsubids {{ _podman_host_rootless_user }}"
|
||||
changed_when: false
|
||||
|
||||
- name: Podman Host | AUDIT | Ensure the rootless user has subgids defined
|
||||
ansible.builtin.command:
|
||||
cmd: "getsubids -g {{ _podman_host_rootless_user }}"
|
||||
changed_when: false
|
||||
|
||||
|
|
@ -1,13 +1,22 @@
|
|||
---
|
||||
- name: Podman Host | PRELIM | Ensure the rootless users are defined and are not root
|
||||
- name: Podman Host | AUDIT | Ensure the rootless users are defined and are not root
|
||||
ansible.builtin.assert:
|
||||
that:
|
||||
- podman_host_rootless_users | length > 0
|
||||
- '"root" not in podman_host_rootless_users'
|
||||
|
||||
- name: Podman Host | AUDIT | Ensure that subuid and subgid are defined for the users
|
||||
- name: Podman Host | PATCH | Install Podman
|
||||
ansible.builtin.dnf:
|
||||
name:
|
||||
- podman
|
||||
- container-selinux
|
||||
- shadow-utils-subid # for getsubids
|
||||
state: latest
|
||||
become: true
|
||||
|
||||
- name: Podman Host | AUDIT | Ensure that users exist and have subids configured
|
||||
ansible.builtin.include_tasks:
|
||||
file: check_subid.yml
|
||||
file: check_users.yml
|
||||
vars:
|
||||
_podman_host_rootless_user: "{{ item }}"
|
||||
with_items: "{{ podman_host_rootless_users }}"
|
||||
|
|
@ -21,17 +30,10 @@
|
|||
reload: true
|
||||
become: true
|
||||
|
||||
- name: Podman Host | PATCH | Create users for rootless podman
|
||||
ansible.builtin.user:
|
||||
name: "{{ item }}"
|
||||
become: true
|
||||
with_items: "{{ podman_host_rootless_users }}"
|
||||
|
||||
- name: Podman Host | PATCH | Set XDG_RUNTIME_DIR in .profile for rootless users
|
||||
- name: Podman Host | PATCH | Set XDG_RUNTIME_DIR in .bash_profile for rootless users
|
||||
ansible.builtin.lineinfile:
|
||||
path: "/home/{{ item }}/.bash_profile"
|
||||
line: "export XDG_RUNTIME_DIR=/run/user/$(id -u)"
|
||||
create: false
|
||||
become: true
|
||||
become_user: "{{ item }}"
|
||||
with_items: "{{ podman_host_rootless_users }}"
|
||||
|
|
@ -46,14 +48,6 @@
|
|||
become: true
|
||||
with_items: "{{ podman_host_rootless_users }}"
|
||||
|
||||
- name: Podman Host | PATCH | Install Podman
|
||||
ansible.builtin.dnf:
|
||||
name:
|
||||
- podman
|
||||
- container-selinux
|
||||
state: latest
|
||||
become: true
|
||||
|
||||
- name: Podman Host | PATCH | Create users quadlets directory
|
||||
ansible.builtin.file:
|
||||
path: "/home/{{ item }}/.config/containers/systemd"
|
||||
|
|
|
|||
|
|
@ -8,3 +8,4 @@ podman_nginx_podman_rootless_user: nginx
|
|||
# podman_nginx_systemd_service_target:
|
||||
podman_nginx_systemd_service_requires: []
|
||||
podman_nginx_additional_volumes: []
|
||||
podman_nginx_firewalld_zone: public
|
||||
|
|
@ -1,4 +1,15 @@
|
|||
---
|
||||
- name: Podman Nginx | PATCH | Open firewall for http and https services
|
||||
ansible.posix.firewalld:
|
||||
zone: "{{ podman_nginx_firewalld_zone }}"
|
||||
service: "{{ item }}"
|
||||
permanent: true
|
||||
immediate: true
|
||||
state: enabled
|
||||
with_items:
|
||||
- http
|
||||
- https
|
||||
|
||||
- name: Podman Nginx | PATCH | Create service configuration directories
|
||||
ansible.builtin.file:
|
||||
path: "/home/{{ podman_nginx_podman_rootless_user }}/{{ item }}"
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue