mirror of
https://github.com/hardenedlinux/harbian-audit.git
synced 2025-07-31 01:24:58 +02:00
Add method for set OS version to general config.
This commit is contained in:
parent
be6f773b1f
commit
58c32abfc6
@ -228,7 +228,7 @@ This document is a description of the additions to the sections not included in
|
|||||||
[How to config grub2 password protection](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/configurations/manual-operation-docs/how_to_config_grub2_password_protection.mkd)
|
[How to config grub2 password protection](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/configurations/manual-operation-docs/how_to_config_grub2_password_protection.mkd)
|
||||||
[How to persistent iptables rules with debian 9](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/configurations/manual-operation-docs/how_to_persistent_iptables_rules_with_debian_9.mkd)
|
[How to persistent iptables rules with debian 9](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/configurations/manual-operation-docs/how_to_persistent_iptables_rules_with_debian_9.mkd)
|
||||||
[How to deploy audisp-remote for auditd log](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/configurations/manual-operation-docs/how_to_deploy_audisp_remote_for_audit_log.mkd)
|
[How to deploy audisp-remote for auditd log](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/configurations/manual-operation-docs/how_to_deploy_audisp_remote_for_audit_log.mkd)
|
||||||
[how to migrating from iptables to nftables in debian10](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/configurations/manual-operation-docs/how_to_migrating_from_iptables_to_nftables_in_debian10.md)
|
[How to migrating from iptables to nftables in debian10](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/configurations/manual-operation-docs/how_to_migrating_from_iptables_to_nftables_in_debian10.md)
|
||||||
[How to persistent nft rules with debian 10](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/configurations/manual-operation-docs/how_to_persistent_nft_rules_with_debian_10.mkd)
|
[How to persistent nft rules with debian 10](https://github.com/hardenedlinux/harbian-audit/blob/master/docs/configurations/manual-operation-docs/how_to_persistent_nft_rules_with_debian_10.mkd)
|
||||||
|
|
||||||
### Use case docs
|
### Use case docs
|
||||||
|
@ -23,6 +23,7 @@ AUDIT_ALL_ENABLE_PASSED=0
|
|||||||
ALLOW_SERVICE_LIST=0
|
ALLOW_SERVICE_LIST=0
|
||||||
SET_HARDENING_LEVEL=0
|
SET_HARDENING_LEVEL=0
|
||||||
SUDO_MODE=''
|
SUDO_MODE=''
|
||||||
|
INIT_G_CONFIG=0
|
||||||
|
|
||||||
usage() {
|
usage() {
|
||||||
cat << EOF
|
cat << EOF
|
||||||
@ -30,8 +31,11 @@ $LONG_SCRIPT_NAME <RUN_MODE> [OPTIONS], where RUN_MODE is one of:
|
|||||||
|
|
||||||
--help -h
|
--help -h
|
||||||
Show this help
|
Show this help
|
||||||
|
|
||||||
--apply
|
--init
|
||||||
|
Initialize the global configuration file(/etc/default/cis-hardening) based on the release version number
|
||||||
|
|
||||||
|
--apply
|
||||||
Apply hardening for enabled scripts.
|
Apply hardening for enabled scripts.
|
||||||
Beware that NO confirmation is asked whatsoever, which is why you're warmly
|
Beware that NO confirmation is asked whatsoever, which is why you're warmly
|
||||||
advised to use --audit before, which can be regarded as a dry-run mode.
|
advised to use --audit before, which can be regarded as a dry-run mode.
|
||||||
@ -140,6 +144,9 @@ while [[ $# > 0 ]]; do
|
|||||||
-h|--help)
|
-h|--help)
|
||||||
usage
|
usage
|
||||||
;;
|
;;
|
||||||
|
--init)
|
||||||
|
INIT_G_CONFIG=1
|
||||||
|
;;
|
||||||
*)
|
*)
|
||||||
usage
|
usage
|
||||||
;;
|
;;
|
||||||
@ -162,6 +169,21 @@ fi
|
|||||||
[ -r $CIS_ROOT_DIR/lib/common.sh ] && . $CIS_ROOT_DIR/lib/common.sh
|
[ -r $CIS_ROOT_DIR/lib/common.sh ] && . $CIS_ROOT_DIR/lib/common.sh
|
||||||
[ -r $CIS_ROOT_DIR/lib/utils.sh ] && . $CIS_ROOT_DIR/lib/utils.sh
|
[ -r $CIS_ROOT_DIR/lib/utils.sh ] && . $CIS_ROOT_DIR/lib/utils.sh
|
||||||
|
|
||||||
|
if [ $INIT_G_CONFIG -eq 1 ]; then
|
||||||
|
if [ -r /etc/redhat-release ]; then
|
||||||
|
info "This OS is redhat or CentOS."
|
||||||
|
sed -i 's/^OS_RELEASE=.*/OS_RELEASE=2/g' /etc/default/cis-hardening
|
||||||
|
elif [ -r /etc/debian_version ]; then
|
||||||
|
info "This OS is Debian."
|
||||||
|
:
|
||||||
|
else
|
||||||
|
crit "This OS not support!"
|
||||||
|
exit 128
|
||||||
|
fi
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
|
||||||
|
|
||||||
# If --allow-service-list is specified, don't run anything, just list the supported services
|
# If --allow-service-list is specified, don't run anything, just list the supported services
|
||||||
if [ "$ALLOW_SERVICE_LIST" = 1 ] ; then
|
if [ "$ALLOW_SERVICE_LIST" = 1 ] ; then
|
||||||
declare -a HARDENING_EXCEPTIONS_LIST
|
declare -a HARDENING_EXCEPTIONS_LIST
|
||||||
|
5
debian/default
vendored
5
debian/default
vendored
@ -1,5 +1,8 @@
|
|||||||
# Default file for CIS Debian hardening scripts
|
# Default file for CIS Debian/CentOS hardening scripts
|
||||||
|
|
||||||
# Define here root directory for CIS debian hardening scripts
|
# Define here root directory for CIS debian hardening scripts
|
||||||
CIS_ROOT_DIR='/opt/cis-hardening'
|
CIS_ROOT_DIR='/opt/cis-hardening'
|
||||||
|
# If distor is Debian, set 1; It's default
|
||||||
|
# If distor is CentOS, set 2;
|
||||||
|
OS_RELEASE=1
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user