118 lines
3.5 KiB
YAML
118 lines
3.5 KiB
YAML
---
|
|
- name: Generate OpenSCAP compliance report
|
|
hosts: '{{ _hosts | default(omit) }}'
|
|
become: true
|
|
|
|
vars:
|
|
openscap_packages:
|
|
- openscap-scanner
|
|
- openscap-utils
|
|
- scap-security-guide
|
|
compliance_profile: ospp
|
|
# install httpd and use it to host compliance report
|
|
use_httpd: true
|
|
|
|
tasks:
|
|
- name: Assert memory meets minimum requirements
|
|
ansible.builtin.assert:
|
|
that:
|
|
- ansible_memfree_mb >= 1000
|
|
- ansible_memtotal_mb >= 2000
|
|
fail_msg: "OpenSCAP is a memory intensive operation, the specified enepoint does not meet minimum requirements. See https://access.redhat.com/articles/6999111 for details."
|
|
|
|
- name: Get our facts straight
|
|
ansible.builtin.set_fact:
|
|
_profile: '{{ compliance_profile | replace("pci_dss", "pci-dss") }}'
|
|
_report_dir: /tmp/oscap-reports
|
|
|
|
- name: Ensure OpenSCAP tools are installed
|
|
ansible.builtin.dnf:
|
|
name: '{{ openscap_packages }}'
|
|
state: present
|
|
|
|
- name: Configure httpd
|
|
when: use_httpd | bool
|
|
block:
|
|
- name: Install httpd
|
|
ansible.builtin.dnf:
|
|
name: httpd
|
|
state: present
|
|
notify: Restart httpd
|
|
|
|
- name: Override report directory
|
|
ansible.builtin.set_fact:
|
|
_report_dir: /var/www/html/oscap-reports
|
|
|
|
- name: Gather service facts
|
|
ansible.builtin.service_facts:
|
|
|
|
- name: Enable firewall http service
|
|
ansible.posix.firewalld:
|
|
service: http
|
|
state: enabled
|
|
immediate: true
|
|
permanent: true
|
|
when:
|
|
- "'firewalld.service' in ansible_facts.services"
|
|
- ansible_facts.services["firewalld.service"].state == "running"
|
|
|
|
- name: Disable httpd welcome page
|
|
ansible.builtin.file:
|
|
path: /etc/httpd/conf.d/welcome.conf
|
|
state: absent
|
|
notify: Restart httpd
|
|
|
|
- name: Ensure report directory exists
|
|
ansible.builtin.file:
|
|
path: '{{ _report_dir }}/{{ _profile }}'
|
|
state: directory
|
|
owner: root
|
|
group: root
|
|
mode: 0755
|
|
|
|
- name: Set report name
|
|
ansible.builtin.set_fact:
|
|
_report: '{{ _report_dir }}/{{ _profile }}/report-{{ ansible_date_time.iso8601 }}.html'
|
|
|
|
- name: Generate compliance report
|
|
ansible.builtin.command: >-
|
|
oscap xccdf eval --profile {{ _profile }} --report {{ _report }}
|
|
/usr/share/xml/scap/ssg/content/ssg-rhel{{ ansible_distribution_major_version }}-ds.xml
|
|
args:
|
|
creates: '{{ _report }}'
|
|
register: _oscap
|
|
failed_when: _oscap.rc not in [0, 2]
|
|
|
|
- name: Set report permissions
|
|
ansible.builtin.file:
|
|
path: '{{ _report }}'
|
|
owner: root
|
|
group: root
|
|
mode: 0644
|
|
|
|
- name: Debug output for report
|
|
ansible.builtin.debug:
|
|
msg: "http://{{ ansible_host }}/oscap-reports/{{ _profile }}/report-{{ ansible_date_time.iso8601 }}.html"
|
|
when: use_httpd | bool
|
|
|
|
- name: Tag instance as {{ compliance_profile | upper }}_OUT_OF_COMPLIANCE # noqa name[template]
|
|
delegate_to: localhost
|
|
amazon.aws.ec2_tag:
|
|
region: "{{ placement.region }}"
|
|
resource: "{{ instance_id }}"
|
|
state: present
|
|
tags:
|
|
Compliance: "{{ compliance_profile | upper }}_OUT_OF_COMPLIANCE"
|
|
when:
|
|
- _oscap.rc == 2
|
|
- instance_id is defined
|
|
become: false
|
|
|
|
handlers:
|
|
- name: Restart httpd
|
|
ansible.builtin.service:
|
|
name: httpd
|
|
state: restarted
|
|
enabled: true
|
|
...
|