Skip to content

Ansible playbook for RHEL 8 CIS fails #14287

@vojtapolasek

Description

@vojtapolasek

Description of problem:

After merging #14269 I think Ansible playbooks for RHEL 8 CIS started failing.

SCAP Security Guide Version:

master 1e49e10

Operating System Version:

RHEL 8.10

Steps to Reproduce:

  1. Run Ansible playbook for CIS profile

Actual Results:

TASK [Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File. - Informative message based on the authselect integrity check result] ***
fatal: [localhost]: FAILED! => {
    "assertion": "ansible_check_mode or result_authselect_check_cmd.rc == 0",
    "changed": false,
    "evaluated_to": false,
    "msg": [
        "authselect integrity check failed. Remediation aborted!",
        "This remediation could not be applied because an authselect profile was not selected or the selected profile is not intact.",
        "It is not recommended to manually edit the PAM files when authselect tool is available.",
        "In cases where the default authselect profile does not cover a specific demand, a custom authselect profile is recommended."
    ]
}

Expected Results:

The playbook finishes.

Additional Information/Debugging Steps:

I noticed that the PR mentioned above removed the enable_authselect rule. But putting it back uncovered some different problem, so it is not the whole solution.

Metadata

Metadata

Assignees

No one assigned

    Labels

    AnsibleAnsible remediation update.CISCIS Benchmark related.RHELRed Hat Enterprise Linux product related.RHEL8Red Hat Enterprise Linux 8 product related.productization-issueIssue found in upstream stabilization process.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions