mirror of
https://github.com/ovh/debian-cis.git
synced 2025-08-11 01:51:53 +02:00
chore: add new scripts for debian 12 (#278)
- package_manager_is_configured -> 1.2.1.2 - ptrace_scope_is_restricted -> 1.5.2 - gdm_is_removed.sh -> 1.7.1 - dnsmasq_is_disabled.sh -> 2.1.5 Co-authored-by: Damien Cavagnini <damien.cavagnini@corp.ovh.com>
This commit is contained in:
36
tests/hardening/dnsmasq_is_disabled.sh
Normal file
36
tests/hardening/dnsmasq_is_disabled.sh
Normal file
@@ -0,0 +1,36 @@
|
||||
# shellcheck shell=bash
|
||||
# run-shellcheck
|
||||
test_audit() {
|
||||
|
||||
describe Prepare on purpose failed test
|
||||
apt install -y dnsmasq
|
||||
# running on a container, will can only test the package installation, not the service management
|
||||
|
||||
describe Running failed test
|
||||
register_test retvalshouldbe 1
|
||||
# shellcheck disable=2154
|
||||
run failed "${CIS_CHECKS_DIR}/${script}.sh" --audit-all
|
||||
|
||||
describe correcting situation
|
||||
sed -i 's/audit/enabled/' "${CIS_CONF_DIR}/conf.d/${script}.cfg"
|
||||
"${CIS_CHECKS_DIR}/${script}.sh" --apply || true
|
||||
|
||||
describe Checking resolved state
|
||||
register_test retvalshouldbe 0
|
||||
run resolved "${CIS_CHECKS_DIR}/${script}.sh" --audit-all
|
||||
|
||||
describe Prepare test package dependencies
|
||||
# try to install a package with not much dependencies
|
||||
apt install -y ocserv
|
||||
# running on a container, will can only test the package installation, not the service management
|
||||
|
||||
describe Running successfull test
|
||||
register_test retvalshouldbe 0
|
||||
# shellcheck disable=2154
|
||||
run blank "${CIS_CHECKS_DIR}/${script}.sh" --audit-all
|
||||
|
||||
describe clean installation
|
||||
apt remove -y ocserv
|
||||
apt autoremove -y
|
||||
|
||||
}
|
12
tests/hardening/gdm_is_removed.sh
Normal file
12
tests/hardening/gdm_is_removed.sh
Normal file
@@ -0,0 +1,12 @@
|
||||
# shellcheck shell=bash
|
||||
# run-shellcheck
|
||||
test_audit() {
|
||||
describe Prepare test
|
||||
apt remove -y gdm3
|
||||
|
||||
describe Running resolved test
|
||||
register_test retvalshouldbe 0
|
||||
# shellcheck disable=2154
|
||||
run resolved "${CIS_CHECKS_DIR}/${script}.sh" --audit-all
|
||||
|
||||
}
|
28
tests/hardening/package_manager_is_configured.sh
Normal file
28
tests/hardening/package_manager_is_configured.sh
Normal file
@@ -0,0 +1,28 @@
|
||||
# shellcheck shell=bash
|
||||
# run-shellcheck
|
||||
test_audit() {
|
||||
describe prepare failing test
|
||||
# we'll have to bring back the sources after the test
|
||||
find /etc/apt -name '*.list' -exec cat {} \; -exec rm -f {} \; >>/tmp/sources.list
|
||||
find /etc/apt -name '*.sources' -exec cat {} \; -exec rm -f {} \; >>/tmp/sources.sources
|
||||
|
||||
describe Running failed test
|
||||
register_test retvalshouldbe 1
|
||||
# shellcheck disable=2154
|
||||
run failed "${CIS_CHECKS_DIR}/${script}.sh" --audit-all
|
||||
|
||||
describe fix situation
|
||||
if [ -s /tmp/sources.list ]; then
|
||||
mv /tmp/sources.list /etc/apt/
|
||||
fi
|
||||
|
||||
if [ -s /tmp/sources.sources ]; then
|
||||
mv /tmp/sources.sources /etc/apt/sources.list.d/
|
||||
fi
|
||||
|
||||
describe Running resolved test
|
||||
register_test retvalshouldbe 0
|
||||
# shellcheck disable=2154
|
||||
run resolved "${CIS_CHECKS_DIR}/${script}.sh" --audit-all
|
||||
|
||||
}
|
21
tests/hardening/ptrace_scope_is_restricted.sh
Normal file
21
tests/hardening/ptrace_scope_is_restricted.sh
Normal file
@@ -0,0 +1,21 @@
|
||||
# shellcheck shell=bash
|
||||
# run-shellcheck
|
||||
test_audit() {
|
||||
# current value may differ among the OS
|
||||
local current_value
|
||||
current_value=$(sysctl kernel.yama.ptrace_scope | awk -F '=' '{print $2}' | sed 's/\ //g')
|
||||
|
||||
if [ "$current_value" -eq 1 ]; then
|
||||
# can only test audit here, unless running on a privileged container
|
||||
describe Running successfull test
|
||||
register_test retvalshouldbe 0
|
||||
# shellcheck disable=2154
|
||||
run blank "${CIS_CHECKS_DIR}/${script}.sh" --audit-all
|
||||
else
|
||||
# can only test audit here, unless running on a privileged container
|
||||
describe Running failed test
|
||||
register_test retvalshouldbe 1
|
||||
# shellcheck disable=2154
|
||||
run blank "${CIS_CHECKS_DIR}/${script}.sh" --audit-all
|
||||
fi
|
||||
}
|
Reference in New Issue
Block a user