Major Hayden ec50013f55 Adjusting commonly failing tasks
This patch takes two commonly failing tasks and configures them to be fixed
if a variable is toggled on. This is needed for gate checks to pass for
ansible-functional runs.

Closes-bug: 1521233

Change-Id: I4f54ef7af30d530f781d60ce232cc6aacda81ce4
2015-12-02 20:51:03 +00:00

984 B

This STIG requires that NOPASSWD and !authenticate are not used within the sudoers configuration files. Using these directives reduces the security of the system.

NOPASSWD allows users to run commands as root without providing a password first. Using !authenticate with the Defaults directive will disable password usage for any users which use sudo.

There are two configuration options for handling these changes. By default, both of these options are set to no, which means that the sudoers configuration files will not be altered:

sudoers_remove_nopasswd: no
sudoers_remove_authenticate: no

Setting sudoers_remove_nopasswd to yes will cause the Ansible tasks to search for any lines containing NOPASSWD and comment them out of the configuration. Setting sudoers_remove_authenticate will do the same actions on lines containing !authenticate. Lines that are already commented will be left unaltered.