Browse Source

Merge a641d21b15 into ed4c1f0aaa

pull/229/merge
Unilogic B.V 2 years ago
parent
commit
40ea7ff3c8
No account linked to committer's email address
3 changed files with 77 additions and 8 deletions
  1. +62
    -6
      users/googleauth.sls
  2. +2
    -2
      users/init.sls
  3. +13
    -0
      users/map.jinja

+ 62
- 6
users/googleauth.sls View File

# vim: sts=2 ts=2 sw=2 et ai # vim: sts=2 ts=2 sw=2 et ai
{%- from "users/map.jinja" import users with context %} {%- from "users/map.jinja" import users with context %}


{%- if not grains['os_family'] in ['RedHat', 'Suse'] %}
{%- if not grains['os_family'] in ['Suse'] %}
{%- if salt['grains.get']('osfinger', '') in ['Amazon Linux-2'] %}
users_epel_repo:
pkgrepo.managed:
- name: epel
- humanname: Extra Packages for Enterprise Linux 7 - $basearch
- mirrorlist: https://mirrors.fedoraproject.org/metalink?repo=epel-7&arch=$basearch
- enabled: 1
- gpgcheck: 1
- gpgkey: https://dl.fedoraproject.org/pub/epel/RPM-GPG-KEY-EPEL-7
- failovermethod: priority
- require_in:
- pkg: users_googleauth-package
{%- endif %}

users_googleauth-package: users_googleauth-package:
pkg.installed: pkg.installed:
- name: {{ users.googleauth_package }} - name: {{ users.googleauth_package }}
- name: {{ users.googleauth_dir }} - name: {{ users.googleauth_dir }}
- user: root - user: root
- group: {{ users.root_group }} - group: {{ users.root_group }}
- mode: '0600'
- mode: '0700'

{%- if grains['os_family'] == 'RedHat' and "selinux" in grains and grains.selinux.enabled %}
policycoreutils-package:
pkg.installed:
- pkgs:
- policycoreutils
{%- if grains['osmajorrelease']|int <= 7 %}
- policycoreutils-python
{%- else %}
- policycoreutils-python-utils
{%- endif %}
users_googleauth_selinux_present:
selinux.fcontext_policy_present:
- name: "{{ users.googleauth_dir }}(/.*)?"
- filetype: 'a'
- sel_user: unconfined_u
- sel_type: ssh_home_t
- sel_level: s0
- require:
- pkg: policycoreutils-package
{%- endif %}


{%- for name, user in pillar.get('users', {}).items() if user.absent is not defined or not user.absent %} {%- for name, user in pillar.get('users', {}).items() if user.absent is not defined or not user.absent %}
{%- if 'google_auth' in user %} {%- if 'google_auth' in user %}
{%- for svc in user['google_auth'] %} {%- for svc in user['google_auth'] %}
{%- if user.get('google_2fa', True) %} {%- if user.get('google_2fa', True) %}
{%- set repl = '{0} {1} {2} {3} {4}{5}/{6}_{7} {8}\\n{9}'.format(
{%- set repl = '{0} {1} {2} {3} {4}{5}/{6}_{7} {8}'.format(
'auth', 'auth',
'[success=done new_authtok_reqd=done default=die]', '[success=done new_authtok_reqd=done default=die]',
'pam_google_authenticator.so', 'pam_google_authenticator.so',
'${USER}', '${USER}',
svc, svc,
'echo_verification_code', 'echo_verification_code',
'@include common-auth',
) %} ) %}
users_googleauth-pam-{{ svc }}-{{ name }}: users_googleauth-pam-{{ svc }}-{{ name }}:
file.replace: file.replace:
- name: /etc/pam.d/{{ svc }} - name: /etc/pam.d/{{ svc }}
- pattern: "^@include common-auth"
- repl: "{{ repl }}"
{%- if grains['os_family'] == 'RedHat' %}
- pattern: '^(auth[ \t]*substack[ \t]*password-auth)'
{%- else %}
- pattern: '^(@include[ \t]*common-auth)'
{%- endif %}
- repl: '{{ repl }}\n\1'
- unless: grep pam_google_authenticator.so /etc/pam.d/{{ svc }} - unless: grep pam_google_authenticator.so /etc/pam.d/{{ svc }}
- backup: .bak - backup: .bak
{%- endif %} {%- endif %}
{%- endfor %} {%- endfor %}
{%- endif %} {%- endif %}
{%- endfor %} {%- endfor %}

{%- if grains['os_family'] == 'RedHat' and "selinux" in grains and grains.selinux.enabled %}
users_googleauth_selinux_applied:
selinux.fcontext_policy_applied:
- name: {{ users.googleauth_dir }}
{%- endif %}

sshd:
service.running:
- watch:
- file: /etc/ssh/sshd_config

sshd_config:
file.replace:
- name: /etc/ssh/sshd_config
- pattern: '^(ChallengeResponseAuthentication|KbdInteractiveAuthentication).*'
- repl: '\1 yes'

{%- endif %} {%- endif %}

+ 2
- 2
users/init.sls View File

- name: {{ users.sudoers_dir }}/{{ sudoers_d_filename }} - name: {{ users.sudoers_dir }}/{{ sudoers_d_filename }}
{% endif %} {% endif %}


{%- if not grains['os_family'] in ['RedHat', 'Suse'] %}
{%- if not grains['os_family'] in ['Suse'] %}
{%- if 'google_auth' in user %} {%- if 'google_auth' in user %}
{%- for svc in user['google_auth'] %} {%- for svc in user['google_auth'] %}
users_googleauth-{{ svc }}-{{ name }}: users_googleauth-{{ svc }}-{{ name }}:
- contents_pillar: 'users:{{ name }}:google_auth:{{ svc }}' - contents_pillar: 'users:{{ name }}:google_auth:{{ svc }}'
- user: root - user: root
- group: {{ users.root_group }} - group: {{ users.root_group }}
- mode: '0400'
- mode: '0600'
- require: - require:
- pkg: users_googleauth-package - pkg: users_googleauth-package
{%- endfor %} {%- endfor %}

+ 13
- 0
users/map.jinja View File

'polkit_dir': '/etc/polkit-1/localauthority.conf.d', 'polkit_dir': '/etc/polkit-1/localauthority.conf.d',
'polkit_defaults': 'unix-group:sudo;' 'polkit_defaults': 'unix-group:sudo;'
}, },
'RedHat': {
'sudoers_dir': '/etc/sudoers.d',
'sudoers_file': '/etc/sudoers',
'googleauth_dir': '/etc/google_authenticator.d',
'root_group': 'root',
'shell': '/bin/bash',
'visudo_shell': '/bin/bash',
'bash_package': 'bash',
'sudo_package': 'sudo',
'googleauth_package': 'google-authenticator',
'polkit_dir': '/etc/polkit-1/localauthority.conf.d',
'polkit_defaults': 'unix-group:sudo;'
},
'Gentoo': { 'Gentoo': {
'sudoers_dir': '/etc/sudoers.d', 'sudoers_dir': '/etc/sudoers.d',
'sudoers_file': '/etc/sudoers', 'sudoers_file': '/etc/sudoers',

Loading…
Cancel
Save