Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
ansible_lza_server_hardening
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package registry
Container registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Digital Preservation
ansible_lza_server_hardening
Commits
8e26326c
Commit
8e26326c
authored
2 years ago
by
Jörg Sachse
Browse files
Options
Downloads
Patches
Plain Diff
style: satisfy linter
parent
71537746
No related branches found
No related tags found
No related merge requests found
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
.ansible-lint
+2
-0
2 additions, 0 deletions
.ansible-lint
handlers/main.yml
+3
-3
3 additions, 3 deletions
handlers/main.yml
tasks/configure_umask.yml
+2
-2
2 additions, 2 deletions
tasks/configure_umask.yml
tasks/install_rkhunter.yml
+1
-1
1 addition, 1 deletion
tasks/install_rkhunter.yml
with
8 additions
and
6 deletions
.ansible-lint
+
2
−
0
View file @
8e26326c
...
...
@@ -37,6 +37,8 @@ use_default_rules: true
skip_list:
- skip_this_tag
- git-latest
- name[casing]
- package-latest
# Any rule that has the 'opt-in' tag will not be loaded unless its 'id' is
# mentioned in the enable_list:
...
...
This diff is collapsed.
Click to expand it.
handlers/main.yml
+
3
−
3
View file @
8e26326c
---
-
name
:
save iptables rules (Debian)
when
:
ansible_os_family == "Debian"
block
:
-
name
:
Ordner für iptables-Config erstellen
ansible.builtin.file
:
...
...
@@ -21,9 +22,9 @@
ansible.builtin.command
:
'
netfilter-persistent
save'
listen
:
"
save
iptables
rules"
changed_when
:
false
when
:
ansible_os_family == "Debian"
-
name
:
save iptables rules (RedHat)
when
:
ansible_os_family == "RedHat"
block
:
-
name
:
make sure iptables config file exists
ansible.builtin.file
:
...
...
@@ -34,10 +35,9 @@
mode
:
0600
listen
:
"
save
iptables
rules"
-
name
:
save rules
ansible.builtin.command
:
/usr/sbin/iptables-save
# noqa
303
ansible.builtin.command
:
/usr/sbin/iptables-save
# noqa
command-instead-of-module
listen
:
"
save
iptables
rules"
changed_when
:
false
when
:
ansible_os_family == "RedHat"
-
name
:
activate kernel parameter changes
ansible.builtin.command
:
sysctl -p
...
...
This diff is collapsed.
Click to expand it.
tasks/configure_umask.yml
+
2
−
2
View file @
8e26326c
...
...
@@ -13,6 +13,8 @@
umask 026
-
name
:
libpam-umask installieren (Debian)
when
:
ansible_os_family == "Debian"
tags
:
[
apt
]
block
:
-
name
:
Paket installieren
ansible.builtin.apt
:
...
...
@@ -33,8 +35,6 @@
# Das Paket libpam-umask passt die Standard-Umask eines Benutzers mit
# Hilfe von PAM an.
session optional pam_umask.so umask=026
when
:
ansible_os_family == "Debian"
tags
:
[
apt
]
-
name
:
set default login umask
ansible.builtin.lineinfile
:
...
...
This diff is collapsed.
Click to expand it.
tasks/install_rkhunter.yml
+
1
−
1
View file @
8e26326c
...
...
@@ -118,7 +118,7 @@
register
:
rkhunter_units
-
name
:
check if rkhunter Systemd units are already disabled
ansible.builtin.command
:
"
systemctl
is-enabled
rkhunter.{{
item.path
|
basename
}}"
ansible.builtin.command
:
"
systemctl
is-enabled
rkhunter.{{
item.path
|
basename
}}"
# noqa command-instead-of-module
loop
:
"
{{
rkhunter_units.files
}}"
register
:
rkhunter_disabled
changed_when
:
false
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment