mirror of
https://github.com/trailofbits/algo.git
synced 2025-06-07 15:43:54 +02:00
ensure that apparmor is supported by the kernel #215
This commit is contained in:
parent
1681b98eb2
commit
2798f84d3f
5 changed files with 15 additions and 1 deletions
|
@ -45,4 +45,4 @@ install:
|
||||||
|
|
||||||
script:
|
script:
|
||||||
- ansible-playbook deploy.yml --syntax-check
|
- ansible-playbook deploy.yml --syntax-check
|
||||||
- ansible-playbook deploy.yml -t local,vpn,dns,ssh_tunneling,security -e "server_ip=$LXC_IP server_user=root IP_subject_alt_name=$LXC_IP local_dns=Y" --skip-tags apparmor
|
- ansible-playbook deploy.yml -t local,vpn,dns,ssh_tunneling,security -e "server_ip=$LXC_IP server_user=root IP_subject_alt_name=$LXC_IP local_dns=Y"
|
||||||
|
|
|
@ -94,3 +94,12 @@
|
||||||
sysctl: name=net.ipv6.conf.all.forwarding value=1
|
sysctl: name=net.ipv6.conf.all.forwarding value=1
|
||||||
tags:
|
tags:
|
||||||
- always
|
- always
|
||||||
|
|
||||||
|
- name: Check apparmor support
|
||||||
|
shell: apparmor_status
|
||||||
|
ignore_errors: yes
|
||||||
|
register: apparmor_status
|
||||||
|
|
||||||
|
- set_fact:
|
||||||
|
apparmor_enabled: true
|
||||||
|
when: '"profiles are in enforce mode" in apparmor_status.stdout'
|
||||||
|
|
|
@ -6,6 +6,7 @@
|
||||||
|
|
||||||
- name: Dnsmasq profile for apparmor configured
|
- name: Dnsmasq profile for apparmor configured
|
||||||
template: src=usr.sbin.dnsmasq.j2 dest=/etc/apparmor.d/usr.sbin.dnsmasq owner=root group=root mode=0600
|
template: src=usr.sbin.dnsmasq.j2 dest=/etc/apparmor.d/usr.sbin.dnsmasq owner=root group=root mode=0600
|
||||||
|
when: apparmor_enabled is defined and apparmor_enabled == true
|
||||||
notify:
|
notify:
|
||||||
- restart dnsmasq
|
- restart dnsmasq
|
||||||
|
|
||||||
|
@ -14,6 +15,7 @@
|
||||||
|
|
||||||
- name: Enforce the dnsmasq AppArmor policy
|
- name: Enforce the dnsmasq AppArmor policy
|
||||||
shell: aa-enforce usr.sbin.dnsmasq
|
shell: aa-enforce usr.sbin.dnsmasq
|
||||||
|
when: apparmor_enabled is defined and apparmor_enabled == true
|
||||||
tags: ['apparmor']
|
tags: ['apparmor']
|
||||||
|
|
||||||
- name: Ensure that the dnsmasq service directory exist
|
- name: Ensure that the dnsmasq service directory exist
|
||||||
|
|
|
@ -14,11 +14,13 @@
|
||||||
|
|
||||||
- name: Privoxy profile for apparmor configured
|
- name: Privoxy profile for apparmor configured
|
||||||
template: src=usr.sbin.privoxy.j2 dest=/etc/apparmor.d/usr.sbin.privoxy owner=root group=root mode=0600
|
template: src=usr.sbin.privoxy.j2 dest=/etc/apparmor.d/usr.sbin.privoxy owner=root group=root mode=0600
|
||||||
|
when: apparmor_enabled is defined and apparmor_enabled == true
|
||||||
notify:
|
notify:
|
||||||
- restart privoxy
|
- restart privoxy
|
||||||
|
|
||||||
- name: Enforce the privoxy AppArmor policy
|
- name: Enforce the privoxy AppArmor policy
|
||||||
shell: aa-enforce usr.sbin.privoxy
|
shell: aa-enforce usr.sbin.privoxy
|
||||||
|
when: apparmor_enabled is defined and apparmor_enabled == true
|
||||||
tags: ['apparmor']
|
tags: ['apparmor']
|
||||||
|
|
||||||
- name: Ensure that the privoxy service directory exist
|
- name: Ensure that the privoxy service directory exist
|
||||||
|
|
|
@ -15,6 +15,7 @@
|
||||||
|
|
||||||
- name: Enforcing ipsec with apparmor
|
- name: Enforcing ipsec with apparmor
|
||||||
shell: aa-enforce "{{ item }}"
|
shell: aa-enforce "{{ item }}"
|
||||||
|
when: apparmor_enabled is defined and apparmor_enabled == true
|
||||||
with_items:
|
with_items:
|
||||||
- /usr/lib/ipsec/charon
|
- /usr/lib/ipsec/charon
|
||||||
- /usr/lib/ipsec/lookip
|
- /usr/lib/ipsec/lookip
|
||||||
|
|
Loading…
Add table
Reference in a new issue