Skip to content

Commit 8b4019c

Browse files
authored
Merge pull request #13220 from comps/master
Clean up unit tests a bit (shebang, metadata consistency)
2 parents a67125c + 302ec13 commit 8b4019c

File tree

314 files changed

+221
-189
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

314 files changed

+221
-189
lines changed

linux_os/guide/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification/tests/auditctl_syscalls_multiple_per_arg.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
# remediation = bash
43

54
{{{ setup_auditctl_environment() }}}
65

linux_os/guide/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification/tests/auditctl_syscalls_one_per_arg.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
# remediation = bash
43

54
{{{ setup_auditctl_environment() }}}
65

linux_os/guide/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification/tests/auditctl_syscalls_one_per_line.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
# remediation = bash
43

54
{{{ setup_auditctl_environment() }}}
65

linux_os/guide/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification/tests/augenrules_syscalls_multiple_per_arg.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
# remediation = bash
43

54
rm -f /etc/audit/rules.d/*
65

linux_os/guide/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification/tests/augenrules_syscalls_one_per_arg.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
# remediation = bash
43

54
rm -f /etc/audit/rules.d/*
65

linux_os/guide/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification/tests/augenrules_syscalls_one_per_line.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
# remediation = bash
43

54
rm -f /etc/audit/rules.d/*
65

Original file line numberDiff line numberDiff line change
@@ -1,6 +1,4 @@
11
#!/bin/bash
22
# packages = audit
33

4-
# remediation = none
5-
64
cp $SHARED/audit_open_o_creat.rules /etc/audit/rules.d/
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,4 @@
11
#!/bin/bash
22
# packages = audit
33

4-
# remediation = none
5-
64
cp $SHARED/audit_open_o_trunc_write.rules /etc/audit/rules.d/

linux_os/guide/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_open_rule_order/tests/ordered_by_arch.pass.sh

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
#!/bin/bash
22
# packages = audit
33

4-
# remediation = none
5-
64
grep -h 'arch=b32.*EACCES' $SHARED/audit_open_o_creat.rules $SHARED/audit_open_o_trunc_write.rules $SHARED/audit_open.rules > /etc/audit/rules.d/ordered_by_arch_error.rules
75
grep -h 'arch=b32.*EPERM' $SHARED/audit_open_o_creat.rules $SHARED/audit_open_o_trunc_write.rules $SHARED/audit_open.rules >> /etc/audit/rules.d/ordered_by_arch_error.rules
86
grep -h 'arch=b64.*EACCES' $SHARED/audit_open_o_creat.rules $SHARED/audit_open_o_trunc_write.rules $SHARED/audit_open.rules >> /etc/audit/rules.d/ordered_by_arch_error.rules
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,4 @@
11
#!/bin/bash
22
# packages = audit
33

4-
# remediation = none
5-
64
cat $SHARED/audit_open_o_creat.rules $SHARED/audit_open_o_trunc_write.rules $SHARED/audit_open.rules > /etc/audit/rules.d/ordered_by_filter.rules
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,5 @@
11
#!/bin/bash
22
# packages = audit
33

4-
# remediation = none
5-
64
sed 's/_by_handle_at/at/' $SHARED/audit_openat_o_creat.rules > /etc/audit/rules.d/openat_o_creat.rules
75
sed -i 's/openat,/open_by_handle_at,/' /etc/audit/rules.d/openat_o_creat.rules
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,4 @@
11
#!/bin/bash
22
# packages = audit
33

4-
# remediation = none
5-
64
cp $SHARED/audit_openat_o_creat.rules /etc/audit/rules.d/
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,4 @@
11
#!/bin/bash
22
# packages = audit
33

4-
# remediation = none
5-
64
cp $SHARED/audit_openat_o_trunc_write.rules /etc/audit/rules.d/

linux_os/guide/auditing/auditd_configure_rules/audit_file_modification/audit_rules_unsuccessful_file_modification_openat_rule_order/tests/ordered_arch.pass.sh

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
#!/bin/bash
22
# packages = audit
33

4-
# remediation = none
5-
64
grep -h 'arch=b32.*EACCES' $SHARED/audit_openat_o_creat.rules $SHARED/audit_openat_o_trunc_write.rules $SHARED/audit_open.rules > /etc/audit/rules.d/ordered_by_arch_error.rules
75
grep -h 'arch=b32.*EPERM' $SHARED/audit_openat_o_creat.rules $SHARED/audit_openat_o_trunc_write.rules $SHARED/audit_open.rules >> /etc/audit/rules.d/ordered_by_arch_error.rules
86
grep -h 'arch=b64.*EACCES' $SHARED/audit_openat_o_creat.rules $SHARED/audit_openat_o_trunc_write.rules $SHARED/audit_open.rules >> /etc/audit/rules.d/ordered_by_arch_error.rules
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,4 @@
11
#!/bin/bash
22
# packages = audit
33

4-
# remediation = none
5-
64
cat $SHARED/audit_openat_o_creat.rules $SHARED/audit_openat_o_trunc_write.rules $SHARED/audit_open.rules > /etc/audit/rules.d/ordered_by_filter.rules

linux_os/guide/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events/tests/default.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
# remediation = bash
43
# variables = var_accounts_passwords_pam_faillock_dir=/var/log/faillock
54

65
echo "-w /var/log/faillock -p wa -k logins" >> /etc/audit/rules.d/logins.rules

linux_os/guide/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events/tests/rules_without_keys.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
# remediation = bash
43
# variables = var_accounts_passwords_pam_faillock_dir=/var/log/faillock
54

65
echo "-w /var/log/faillock -p wa" >> /etc/audit/rules.d/logins.rules

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands/tests/generate_privileged_commands_rule.sh

100755100644
File mode changed.

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_modprobe/tests/auditctl_modprobe_correct.pass.sh

100755100644
File mode changed.

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_modprobe/tests/auditctl_modprobe_correct_without_key.pass.sh

100755100644
File mode changed.

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_modprobe/tests/auditctl_modprobe_remove_all_rules.fail.sh

100755100644
File mode changed.

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_modprobe/tests/auditctl_modprobe_wrong_rule.fail.sh

100755100644
File mode changed.

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_modprobe/tests/augenrules_modprobe_correct.pass.sh

100755100644
File mode changed.

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_modprobe/tests/augenrules_modprobe_correct_without_key.pass.sh

100755100644
File mode changed.

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_modprobe/tests/augenrules_modprobe_remove_all_rules.fail.sh

100755100644
File mode changed.

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_modprobe/tests/augenrules_modprobe_wrong_rule.fail.sh

100755100644
File mode changed.

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_sudo/tests/rhel7_auditctl_4294967295_configured.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
# remediation = bash
43
# platform = Oracle Linux 7
54

65
echo "-a always,exit -F path=/usr/bin/sudo -F auid>={{{ uid_min }}} -F auid!=4294967295 -k privileged" >> /etc/audit/audit.rules

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_sudo/tests/rhel7_auditctl_unset_configured.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
# remediation = bash
43
# platform = Oracle Linux 7
54

65
echo "-a always,exit -F path=/usr/bin/sudo -F auid>={{{ uid_min }}} -F auid!=unset -k privileged" >> /etc/audit/audit.rules
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
# remediation = bash
43
# platform = Fedora,Oracle Linux 7
54

65
echo "-a always,exit -F path=/usr/bin/sudo -F auid>={{{ uid_min }}} -F auid!=4294967295 -k privileged" >> /etc/audit/rules.d/privileged.rules
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
# remediation = bash
43
# platform = Fedora,Oracle Linux 7
54

65
echo "-a always,exit -F path=/usr/bin/sudo -F auid>={{{ uid_min }}} -F auid!=unset -k privileged" >> /etc/audit/rules.d/privileged.rules
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
# remediation = bash
43
# platform = Fedora,Oracle Linux 7
54

65
echo "-a always,exit -F path=/usr/bin/sudo -F auid>={{{ uid_min }}} -F auid!=4294967295 -k own_key" >> /etc/audit/rules.d/privileged.rules

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_unix2_chkpwd/tests/no_rules.fail.sh

100755100644
File mode changed.

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_unix2_chkpwd/tests/only_chkpwd_rule.fail.sh

100755100644
File mode changed.

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_unix_chkpwd/tests/no_rules.fail.sh

100755100644
File mode changed.

linux_os/guide/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_unix_chkpwd/tests/only_chkpwd_rule.fail.sh

100755100644
File mode changed.
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
1+
#!/bin/bash
22
# packages = audit
33
echo "-w /etc/sudoers -p wa -k actions" >> /etc/audit/rules.d/actions.rules
44
echo "-w /etc/sudoers.d/ -p wa -k actions" >> /etc/audit/rules.d/actions.rules
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
1+
#!/bin/bash
22
# packages = audit
33
echo "-w /etc/sudoers -p wa" >> /etc/audit/rules.d/actions.rules
44
echo "-w /etc/sudoers.d/ -p wa" >> /etc/audit/rules.d/actions.rules
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
1+
#!/bin/bash
22
# packages = audit
33
rm -f /etc/audit/rules.d/*
44
> /etc/audit/audit.rules
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
1+
#!/bin/bash
22
# packages = audit
33
echo "-w /etc/sudoers -p wa -k actions" >> /etc/audit/rules.d/actions.rules
44
echo "-w /etc/sudoers.d -p wa -k actions" >> /etc/audit/rules.d/actions.rules

linux_os/guide/auditing/auditd_configure_rules/file_ownership_var_log_audit_stig/tests/correct_value_default_file.pass.sh

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
1-
# platform = multi_platform_ol,multi_platform_rhel,multi_platform_almalinux
21
#!/bin/bash
3-
2+
# platform = multi_platform_ol,multi_platform_rhel,multi_platform_almalinux
43
# packages = audit
54

65
sed -i "/^\s*log_file.*/d" /etc/audit/auditd.conf

linux_os/guide/auditing/auditd_configure_rules/file_ownership_var_log_audit_stig/tests/wrong_value_default_file.fail.sh

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
1-
# platform = multi_platform_ol,multi_platform_rhel,multi_platform_almalinux
21
#!/bin/bash
3-
2+
# platform = multi_platform_ol,multi_platform_rhel,multi_platform_almalinux
43
# packages = audit
54

65
sed -i "/^\s*log_file.*/d" /etc/audit/auditd.conf

linux_os/guide/auditing/configure_auditd_data_retention/auditd_audispd_syslog_plugin_activated/tests/audisp_syslog_plugin_activated.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# platform = Oracle Linux 7
3-
# remediation = bash
43

54
. $SHARED/auditd_utils.sh
65
prepare_auditd_test_enviroment

linux_os/guide/auditing/configure_auditd_data_retention/auditd_audispd_syslog_plugin_activated/tests/audit_syslog_plugin_activated.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
#!/bin/bash
22
# packages = audit
33
# platform = Oracle Linux 8,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,multi_platform_fedora
4-
# remediation = bash
54

65
. $SHARED/auditd_utils.sh
76
prepare_auditd_test_enviroment

linux_os/guide/auditing/configure_auditd_data_retention/auditd_data_retention_action_mail_acct/tests/action_mail_acct_root.pass.sh

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
#
4-
# remediation = bash
53

64
. $SHARED/auditd_utils.sh
75
prepare_auditd_test_enviroment

linux_os/guide/auditing/configure_auditd_data_retention/auditd_data_retention_admin_space_left_action/tests/admin_space_left_action_halt_cis.pass.sh

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
#!/bin/bash
22
# packages = audit
3-
#
43
# profiles = xccdf_org.ssgproject.content_profile_cis
5-
# remediation = bash
64

75
. $SHARED/auditd_utils.sh
86
prepare_auditd_test_enviroment

linux_os/guide/auditing/configure_auditd_data_retention/auditd_data_retention_admin_space_left_action/tests/admin_space_left_action_single.pass.sh

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
#
4-
# remediation = bash
53

64
. $SHARED/auditd_utils.sh
75
prepare_auditd_test_enviroment

linux_os/guide/auditing/configure_auditd_data_retention/auditd_data_retention_flush/tests/flush_incremental_async.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@
22
# packages = audit
33
# platform = multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_almalinux
44
# profiles = xccdf_org.ssgproject.content_profile_ospp
5-
# remediation = bash
65

76
. $SHARED/auditd_utils.sh
87
prepare_auditd_test_enviroment

linux_os/guide/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file/tests/max_log_file_greater_than_minimum_value.pass.sh

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
#
4-
# remediation = bash
53

64
. $SHARED/auditd_utils.sh
75
prepare_auditd_test_enviroment

linux_os/guide/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file/tests/max_log_file_minimum_value.pass.sh

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
#
4-
# remediation = bash
53

64
. $SHARED/auditd_utils.sh
75
prepare_auditd_test_enviroment

linux_os/guide/auditing/configure_auditd_data_retention/auditd_data_retention_num_logs/tests/num_logs_greater_than_minimum.pass.sh

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
#
4-
# remediation = bash
53

64
. $SHARED/auditd_utils.sh
75
prepare_auditd_test_enviroment

linux_os/guide/auditing/configure_auditd_data_retention/auditd_data_retention_num_logs/tests/num_logs_minimum_value.pass.sh

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
#
4-
# remediation = bash
53

64
. $SHARED/auditd_utils.sh
75
prepare_auditd_test_enviroment

linux_os/guide/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/tests/space_left_greater_than_minimum.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
#!/bin/bash
22
# packages = audit
33
# profiles = xccdf_org.ssgproject.content_profile_stig
4-
# remediation = bash
54

65
. $SHARED/auditd_utils.sh
76
prepare_auditd_test_enviroment

linux_os/guide/auditing/configure_auditd_data_retention/auditd_data_retention_space_left/tests/space_left_minimum_value.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
#!/bin/bash
22
# packages = audit
33
# profiles = xccdf_org.ssgproject.content_profile_stig
4-
# remediation = bash
54

65
. $SHARED/auditd_utils.sh
76
prepare_auditd_test_enviroment

linux_os/guide/auditing/configure_auditd_data_retention/auditd_data_retention_space_left_action/tests/space_left_action_email.pass.sh

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,5 @@
11
#!/bin/bash
22
# packages = audit
3-
#
4-
# remediation = bash
53

64
. $SHARED/auditd_utils.sh
75
prepare_auditd_test_enviroment
Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
#!/bin/bash
22
# packages = audit,crontabs
3-
# remediation = none
43

54
mkdir -p /etc/cron.weekly/
65
touch /etc/cron.weekly/audit-offload
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
1-
1+
#!/bin/bash
22
# packages = audit
33
rm -f /etc/audit/rules.d/10-base-config.rules
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
1+
#!/bin/bash
22
# packages = audit
33
cp $SHARED/audit/10-base-config.rules /etc/audit/rules.d/
44
echo "some additional text" >> /etc/audit/rules.d/10-base-config.rules
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
#!/bin/bash
12
# platform = multi_platform_all
23

34
echo "/exports/data 0.0.0.0/0(rw,sync)" > /etc/exports
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
#!/bin/bash
12
# platform = multi_platform_all
23

34
echo "/exports/data 0.0.0.0/0(rw,sync,sec=sys)" > /etc/exports
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
#!/bin/bash
12
# platform = multi_platform_all
23

34
echo "/exports/data 0.0.0.0/0(rw,sync,sec=krb5)" > /etc/exports
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
#!/bin/bash
12
# platform = multi_platform_all
23

34
echo "/exports/data 0.0.0.0/0(rw,sync,sec=krb5:krb5i:krb5p)" > /etc/exports

linux_os/guide/services/ntp/chronyd_server_directive/tests/multiple_servers.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
#!/bin/bash
22
# packages = chrony
33
# platform = multi_platform_fedora,multi_platform_ol,multi_platform_rhel,multi_platform_almalinux
4-
# remediation = none
54

65
sed -i "^pool.*" {{{ chrony_conf_path }}}
76
echo "server 0.pool.ntp.org" > {{{ chrony_conf_path }}}

linux_os/guide/services/ntp/ntp_single_service_active/tests/single.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
#!/bin/bash
2-
# remediation = none
32

43
{{{ bash_package_install("chrony") }}}
54
{{{ bash_package_install("systemd-timesyncd") }}}
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
1-
#! /bin/bash
1+
#!/bin/bash
22

33
echo "passwd files nis" > /etc/nsswitch.conf

linux_os/guide/services/obsolete/nis/no_nis_in_nsswitch/tests/nis_is_only_db.fail.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
#! /bin/bash
1+
#!/bin/bash
22

33
# we use something because if passwd or groups is used, it breaks the system
44
echo "something nis" > /etc/nsswitch.conf
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
1-
#! /bin/bash
1+
#!/bin/bash
22

33
echo "passwd files" > /etc/nsswitch.conf

linux_os/guide/services/ssh/ssh_server/sshd_include_crypto_policy/tests/confing.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
#!/bin/bash
2-
# remediation = none
32
# platform = multi_platform_all
43

54
sed -i '/Include \/etc\/crypto-policies\/back-ends\/opensshserver.config/d' /etc/ssh/sshd_config /etc/ssh/sshd_config.d/*.conf

linux_os/guide/services/ssh/ssh_server/sshd_include_crypto_policy/tests/drop_in.pass.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
#!/bin/bash
2-
# remediation = none
32
# platform = multi_platform_all
43

54
sed -i '/Include \/etc\/crypto-policies\/back-ends\/opensshserver.config/d' /etc/ssh/sshd_config /etc/ssh/sshd_config.d/*.conf
Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
#!/bin/bash
2-
# remediation = None
32

43
find /etc/ssh/sshd_config* -type f -print0 | xargs -0 sed -i '/^(Allow|Deny)(Users|Groups).*/d'
54
echo "AllowGroups testgroup1 testgroup2 testgroup3" >> /etc/ssh/sshd_config
Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
#!/bin/bash
2-
# remediation = None
32

43
find /etc/ssh/sshd_config* -type f -print0 | xargs -0 sed -i '/^(Allow|Deny)(Users|Groups).*/d'
54
echo "AllowUsers testuser1 testuser2 testuser3" >> /etc/ssh/sshd_config

0 commit comments

Comments
 (0)