
Add charmhelpers.contrib.hardening and calls to install, config-changed, upgrade-charm and update-status hooks. Also add new config option to allow one or more hardening modules to be applied at runtime. Change-Id: Icf48829e010d35d7d7a4ccd547eae6a8c511c04e
135 lines
4.0 KiB
Python
135 lines
4.0 KiB
Python
# Copyright 2016 Canonical Limited.
|
|
#
|
|
# This file is part of charm-helpers.
|
|
#
|
|
# charm-helpers is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Lesser General Public License version 3 as
|
|
# published by the Free Software Foundation.
|
|
#
|
|
# charm-helpers is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Lesser General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU Lesser General Public License
|
|
# along with charm-helpers. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
from subprocess import (
|
|
check_output,
|
|
CalledProcessError,
|
|
)
|
|
|
|
from charmhelpers.core.hookenv import (
|
|
log,
|
|
DEBUG,
|
|
ERROR,
|
|
)
|
|
from charmhelpers.fetch import (
|
|
apt_install,
|
|
apt_purge,
|
|
apt_update,
|
|
)
|
|
from charmhelpers.contrib.hardening.audits.file import (
|
|
TemplatedFile,
|
|
DeletedFile,
|
|
)
|
|
from charmhelpers.contrib.hardening import utils
|
|
from charmhelpers.contrib.hardening.host import TEMPLATES_DIR
|
|
|
|
|
|
def get_audits():
|
|
"""Get OS hardening PAM authentication audits.
|
|
|
|
:returns: dictionary of audits
|
|
"""
|
|
audits = []
|
|
|
|
settings = utils.get_settings('os')
|
|
|
|
if settings['auth']['pam_passwdqc_enable']:
|
|
audits.append(PasswdqcPAM('/etc/passwdqc.conf'))
|
|
|
|
if settings['auth']['retries']:
|
|
audits.append(Tally2PAM('/usr/share/pam-configs/tally2'))
|
|
else:
|
|
audits.append(DeletedFile('/usr/share/pam-configs/tally2'))
|
|
|
|
return audits
|
|
|
|
|
|
class PasswdqcPAMContext(object):
|
|
|
|
def __call__(self):
|
|
ctxt = {}
|
|
settings = utils.get_settings('os')
|
|
|
|
ctxt['auth_pam_passwdqc_options'] = \
|
|
settings['auth']['pam_passwdqc_options']
|
|
|
|
return ctxt
|
|
|
|
|
|
class PasswdqcPAM(TemplatedFile):
|
|
"""The PAM Audit verifies the linux PAM settings."""
|
|
def __init__(self, path):
|
|
super(PasswdqcPAM, self).__init__(path=path,
|
|
template_dir=TEMPLATES_DIR,
|
|
context=PasswdqcPAMContext(),
|
|
user='root',
|
|
group='root',
|
|
mode=0o0640)
|
|
|
|
def pre_write(self):
|
|
# Always remove?
|
|
for pkg in ['libpam-ccreds', 'libpam-cracklib']:
|
|
log("Purging package '%s'" % pkg, level=DEBUG),
|
|
apt_purge(pkg)
|
|
|
|
apt_update(fatal=True)
|
|
for pkg in ['libpam-passwdqc']:
|
|
log("Installing package '%s'" % pkg, level=DEBUG),
|
|
apt_install(pkg)
|
|
|
|
def post_write(self):
|
|
"""Updates the PAM configuration after the file has been written"""
|
|
try:
|
|
check_output(['pam-auth-update', '--package'])
|
|
except CalledProcessError as e:
|
|
log('Error calling pam-auth-update: %s' % e, level=ERROR)
|
|
|
|
|
|
class Tally2PAMContext(object):
|
|
|
|
def __call__(self):
|
|
ctxt = {}
|
|
settings = utils.get_settings('os')
|
|
|
|
ctxt['auth_lockout_time'] = settings['auth']['lockout_time']
|
|
ctxt['auth_retries'] = settings['auth']['retries']
|
|
|
|
return ctxt
|
|
|
|
|
|
class Tally2PAM(TemplatedFile):
|
|
"""The PAM Audit verifies the linux PAM settings."""
|
|
def __init__(self, path):
|
|
super(Tally2PAM, self).__init__(path=path,
|
|
template_dir=TEMPLATES_DIR,
|
|
context=Tally2PAMContext(),
|
|
user='root',
|
|
group='root',
|
|
mode=0o0640)
|
|
|
|
def pre_write(self):
|
|
# Always remove?
|
|
apt_purge('libpam-ccreds')
|
|
apt_update(fatal=True)
|
|
apt_install('libpam-modules')
|
|
|
|
def post_write(self):
|
|
"""Updates the PAM configuration after the file has been written"""
|
|
try:
|
|
check_output(['pam-auth-update', '--package'])
|
|
except CalledProcessError as e:
|
|
log('Error calling pam-auth-update: %s' % e, level=ERROR)
|