Commit 65d93334 by John Jarvis

Merge pull request #1578 from edx/cg/add_security_fixes

Add play for fixing and checking bash vulnerability
parents c09f9b94 149fff01
......@@ -43,6 +43,7 @@ COMMON_CUSTOM_DHCLIENT_CONFIG: false
COMMON_MOTD_TEMPLATE: "motd.tail.j2"
COMMON_SSH_PASSWORD_AUTH: "no"
COMMON_SECURITY_UPDATES: no
# These are three maintenance accounts across all databases
# the read only user is is granted select privs on all dbs
# the admin user is granted create user privs on all dbs
......
---
- include: security-ubuntu.yml
when:
- COMMON_SECURITY_UPDATES|bool
- ansible_distribution == 'Ubuntu'
- name: Add user www-data
# This is the default user for nginx
user: >
......
- name: Apply bash security update
apt: name=bash state=latest update_cache=true
- name: Check and fail if we are still vulnerable
shell: excutable=bash env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
register: test_vuln
failed_when: "'vulnerable' in test_vuln.stdout"
- name: Apply Upgrade for bash vulnerability in Ubuntu
hosts: all
sudo: yes
vars:
COMMON_SECURITY_UPDATES: yes
roles:
- common
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment