-
Notifications
You must be signed in to change notification settings - Fork 698
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update audit_rules_suid_privilege_function to use ExecStart instead of ExecStartPost #12549
Update audit_rules_suid_privilege_function to use ExecStart instead of ExecStartPost #12549
Conversation
Change in Ansible Please consider using more suitable Ansible module than |
35b36c7
to
05f9ecf
Compare
Change in Ansible Please consider using more suitable Ansible module than |
…f ExecStartPost. RHEL10 does not use the old ExecStartPost directive anymore.
05f9ecf
to
d13c361
Compare
Code Climate has analyzed commit d13c361 and detected 0 issues on this pull request. The test coverage on the diff in this pull request is 100.0% (50% is the threshold). This pull request will bring the total coverage in the repository to 60.9% (0.0% change). View more on Code Climate. |
Looks like the problem has been fixed.
|
- name: Service facts | ||
ansible.builtin.service_facts: | ||
|
||
- name: Check the rules script being used | ||
ansible.builtin.command: | ||
grep '^ExecStartPost' /usr/lib/systemd/system/auditd.service | ||
grep '^{{{ audit_loading_systemd_directive }}}' /usr/lib/systemd/system/{{{ audit_loading_service_file }}} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do other occurrences of auditd and auditd.service in this Ansible remedaition need to be updated as well or only this one grep should be changed?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I believe this is the only change needed in this Ansible remediation. Other rules might require some more adjustments, because of the ExecStart/ExecStartPost thing but it's not part of this PR to fix them, and they are more complicated IMO.
Hello, |
I was able to fix the remediation issue with this pull request, but I haven't done any further testing to see if the rules are actually being loaded by the auditd service. But I'd assume the test would not work if the rules were not loaded correctly. This rule is part of RHEL9 CIS profile and there it is working as expected. |
Waving Automatus tests since these rules are not applicable in VMs. |
Description:
Rationale: