-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update auditd_conf resource #16
Comments
Updates to resource can be found here: I did my best to update the resource to add functionality without taking anything away so that the resource can still be used in the same way by those that have code that previously used this resource. Examples of usage of updated resource as follows: For syscall audit rule
For setsebool command:
I can make a pull request for this resource and see how they feel about it if this style works for you @aaronlippold |
Update: I also found that we can roll back a couple of changes I made and use this instead for commands like setsebool:
This might actually be preferable since it means less changes to the resource and better conveys that all sys calls to that particular command will be audited. |
|
Adjusted to do active and passive testing. For setsebool command rule:
The inspec statements would be (active pulling from auditctl command and then passive from audit.rules file):
|
And for a sys call rule:
The inspec statements would be:
It seems lengthy, but it's because of the if/else depending on the architecture. |
We could always just set the
|
Sure that makes sense. I'll switch to that format. |
assuming this returns a bool of true or false : (inspec.os.arch == 'x86_64') It may need to be: etc. |
That worked great...
If this all seems reasonable at this point then I can do a PR before next Monday's meeting with the Inspec folk. |
This resource needs to be updated to match on specific flags per audit line.
The text was updated successfully, but these errors were encountered: