debian-cis/tests/hardening/4.1.15_record_sudoers_edit.sh

20 lines
781 B
Bash
Raw Normal View History

# shellcheck shell=bash
# run-shellcheck
test_audit() {
describe Running on blank host
register_test retvalshouldbe 0
dismiss_count_for_test
# shellcheck disable=2154
run blank /opt/debian-cis/bin/hardening/"${script}".sh --audit-all
2020-12-04 14:08:01 +01:00
describe Correcting situation
2020-11-02 15:47:27 +01:00
sed -i 's/audit/enabled/' /opt/debian-cis/etc/conf.d/"${script}".cfg
/opt/debian-cis/bin/hardening/"${script}".sh || true
describe Checking resolved state
register_test retvalshouldbe 0
register_test contain "[ OK ] -w /etc/sudoers -p wa -k sudoers is present in /etc/audit/audit.rules"
2020-12-04 14:08:01 +01:00
register_test contain "[ OK ] -w /etc/sudoers.d/ -p wa -k sudoers is present in /etc/audit/audit.rules"
2020-11-02 15:47:27 +01:00
run resolved /opt/debian-cis/bin/hardening/"${script}".sh --audit-all
}