2020-11-27 09:22:47 +01:00
|
|
|
# shellcheck shell=bash
|
2019-02-14 18:10:46 +01:00
|
|
|
# run-shellcheck
|
|
|
|
test_audit() {
|
|
|
|
describe Running on blank host
|
|
|
|
register_test retvalshouldbe 0
|
|
|
|
dismiss_count_for_test
|
2020-11-02 15:47:27 +01:00
|
|
|
mkdir -p /etc/audit
|
|
|
|
touch /etc/audit/auditd.conf
|
2020-12-21 11:43:02 +01:00
|
|
|
# shellcheck disable=2154
|
2023-09-25 14:24:01 +02:00
|
|
|
run blank "${CIS_CHECKS_DIR}/${script}.sh" --audit-all
|
2019-02-14 18:10:46 +01:00
|
|
|
|
2020-11-02 15:47:27 +01:00
|
|
|
describe Correcting situation
|
2023-09-25 14:24:01 +02:00
|
|
|
sed -i 's/audit/enabled/' "${CIS_CONF_DIR}/conf.d/${script}.cfg"
|
2020-11-09 11:48:48 +01:00
|
|
|
# to avoid error during auditd installation in 4.1.1.2, only necessary during tests
|
2023-09-25 14:24:01 +02:00
|
|
|
sed -i "s/OPTIONS='/OPTIONS='space_left=100 admin_space_left=50 /" "${CIS_CONF_DIR}/conf.d/${script}.cfg"
|
|
|
|
"${CIS_CHECKS_DIR}/${script}.sh" || true
|
2020-11-02 15:47:27 +01:00
|
|
|
|
|
|
|
describe Checking resolved state
|
|
|
|
register_test retvalshouldbe 0
|
|
|
|
register_test contain "[ OK ] ^space_left_action[[:space:]]*=[[:space:]]*email is present in /etc/audit/auditd.conf"
|
|
|
|
register_test contain "[ OK ] ^action_mail_acct[[:space:]]*=[[:space:]]*root is present in /etc/audit/auditd.conf"
|
|
|
|
register_test contain "[ OK ] ^admin_space_left_action[[:space:]]*=[[:space:]]*halt is present in /etc/audit/auditd.conf"
|
2023-09-25 14:24:01 +02:00
|
|
|
run resolved "${CIS_CHECKS_DIR}/${script}.sh" --audit-all
|
2019-02-14 18:10:46 +01:00
|
|
|
}
|