aboutsummaryrefslogtreecommitdiffstats
path: root/docs/testing/developer/devguide/index.rst
diff options
context:
space:
mode:
authorCedric Ollivier <cedric.ollivier@orange.com>2018-02-26 16:50:45 +0000
committerGerrit Code Review <gerrit@opnfv.org>2018-02-26 16:50:45 +0000
commit53cd7f8176c996014decb7311d9f546f6b8f2497 (patch)
treed3cb7a4537b032c010b758130a4e11c66fd097d0 /docs/testing/developer/devguide/index.rst
parent00182139afbfa67541340d46e49d948d1f69840c (diff)
parent70886a190335f02f1c7ed1d9c50823f978b291b1 (diff)
Merge "Raise exceptions when SDN_CONTROLLER_IP is None"
Diffstat (limited to 'docs/testing/developer/devguide/index.rst')
0 files changed, 0 insertions, 0 deletions
er.Hex */ .highlight .mi { color: #ae81ff } /* Literal.Number.Integer */ .highlight .mo { color: #ae81ff } /* Literal.Number.Oct */ .highlight .sa { color: #e6db74 } /* Literal.String.Affix */ .highlight .sb { color: #e6db74 } /* Literal.String.Backtick */ .highlight .sc { color: #e6db74 } /* Literal.String.Char */ .highlight .dl { color: #e6db74 } /* Literal.String.Delimiter */ .highlight .sd { color: #e6db74 } /* Literal.String.Doc */ .highlight .s2 { color: #e6db74 } /* Literal.String.Double */ .highlight .se { color: #ae81ff } /* Literal.String.Escape */ .highlight .sh { color: #e6db74 } /* Literal.String.Heredoc */ .highlight .si { color: #e6db74 } /* Literal.String.Interpol */ .highlight .sx { color: #e6db74 } /* Literal.String.Other */ .highlight .sr { color: #e6db74 } /* Literal.String.Regex */ .highlight .s1 { color: #e6db74 } /* Literal.String.Single */ .highlight .ss { color: #e6db74 } /* Literal.String.Symbol */ .highlight .bp { color: #f8f8f2 } /* Name.Builtin.Pseudo */ .highlight .fm { color: #a6e22e } /* Name.Function.Magic */ .highlight .vc { color: #f8f8f2 } /* Name.Variable.Class */ .highlight .vg { color: #f8f8f2 } /* Name.Variable.Global */ .highlight .vi { color: #f8f8f2 } /* Name.Variable.Instance */ .highlight .vm { color: #f8f8f2 } /* Name.Variable.Magic */ .highlight .il { color: #ae81ff } /* Literal.Number.Integer.Long */ } @media (prefers-color-scheme: light) { .highlight .hll { background-color: #ffffcc } .highlight .c { color: #888888 } /* Comment */ .highlight .err { color: #a61717; background-color: #e3d2d2 } /* Error */ .highlight .k { color: #008800; font-weight: bold } /* Keyword */ .highlight .ch { color: #888888 } /* Comment.Hashbang */ .highlight .cm { color: #888888 } /* Comment.Multiline */ .highlight .cp { color: #cc0000; font-weight: bold } /* Comment.Preproc */ .highlight .cpf { color: #888888 } /* Comment.PreprocFile */ .highlight .c1 { color: #888888 } /* Comment.Single */ .highlight .cs { color: #cc0000; font-weight: bold; background-color: #fff0f0 } /* Comment.Special */ .highlight .gd { color: #000000; background-color: #ffdddd } /* Generic.Deleted */ .highlight .ge { font-style: italic } /* Generic.Emph */ .highlight .gr { color: #aa0000 } /* Generic.Error */ .highlight .gh { color: #333333 } /* Generic.Heading */ .highlight .gi { color: #000000; background-color: #ddffdd } /* Generic.Inserted */ .highlight .go { color: #888888 } /* Generic.Output */ .highlight .gp { color: #555555 } /* Generic.Prompt */ .highlight .gs { font-weight: bold } /* Generic.Strong */ .highlight .gu { color: #666666 } /* Generic.Subheading */ .highlight .gt { color: #aa0000 } /* Generic.Traceback */ .highlight .kc { color: #008800; font-weight: bold } /* Keyword.Constant */ .highlight .kd { color: #008800; font-weight: bold } /* Keyword.Declaration */ .highlight .kn { color: #008800; font-weight: bold } /* Keyword.Namespace */ .highlight .kp { color: #008800 } /* Keyword.Pseudo */ .highlight .kr { color: #008800; font-weight: bold } /* Keyword.Reserved */ .highlight .kt { color: #888888; font-weight: bold } /* Keyword.Type */ .highlight .m { color: #0000DD; font-weight: bold } /* Literal.Number */ .highlight .s { color: #dd2200; background-color: #fff0f0 } /* Literal.String */ .highlight .na { color: #336699 } /* Name.Attribute */ .highlight .nb { color: #003388 } /* Name.Builtin */ .highlight .nc { color: #bb0066; font-weight: bold } /* Name.Class */ .highlight .no { color: #003366; font-weight: bold } /* Name.Constant */ .highlight .nd { color: #555555 } /* Name.Decorator */ .highlight .ne { color: #bb0066; font-weight: bold } /* Name.Exception */ .highlight .nf { color: #0066bb; font-weight: bold } /* Name.Function */ .highlight .nl { color: #336699; font-style: italic } /* Name.Label */ .highlight .nn { color: #bb0066; font-weight: bold } /* Name.Namespace */ .highlight .py { color: #336699; font-weight: bold } /* Name.Property */ .highlight .nt { color: #bb0066; font-weight: bold } /* Name.Tag */ .highlight .nv { color: #336699 } /* Name.Variable */ .highlight .ow { color: #008800 } /* Operator.Word */ .highlight .w { color: #bbbbbb } /* Text.Whitespace */ .highlight .mb { color: #0000DD; font-weight: bold } /* Literal.Number.Bin */ .highlight .mf { color: #0000DD; font-weight: bold } /* Literal.Number.Float */ .highlight .mh { color: #0000DD; font-weight: bold } /* Literal.Number.Hex */ .highlight .mi { color: #0000DD; font-weight: bold } /* Literal.Number.Integer */ .highlight .mo { color: #0000DD; font-weight: bold } /* Literal.Number.Oct */ .highlight .sa { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Affix */ .highlight .sb { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Backtick */ .highlight .sc { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Char */ .highlight .dl { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Delimiter */ .highlight .sd { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Doc */ .highlight .s2 { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Double */ .highlight .se { color: #0044dd; background-color: #fff0f0 } /* Literal.String.Escape */ .highlight .sh { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Heredoc */ .highlight .si { color: #3333bb; background-color: #fff0f0 } /* Literal.String.Interpol */ .highlight .sx { color: #22bb22; background-color: #f0fff0 } /* Literal.String.Other */ .highlight .sr { color: #008800; background-color: #fff0ff } /* Literal.String.Regex */ .highlight .s1 { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Single */ .highlight .ss { color: #aa6600; background-color: #fff0f0 } /* Literal.String.Symbol */ .highlight .bp { color: #003388 } /* Name.Builtin.Pseudo */ .highlight .fm { color: #0066bb; font-weight: bold } /* Name.Function.Magic */ .highlight .vc { color: #336699 } /* Name.Variable.Class */ .highlight .vg { color: #dd7700 } /* Name.Variable.Global */ .highlight .vi { color: #3333bb } /* Name.Variable.Instance */ .highlight .vm { color: #336699 } /* Name.Variable.Magic */ .highlight .il { color: #0000DD; font-weight: bold } /* Literal.Number.Integer.Long */ }
resource_registry:
  OS::TripleO::Services::AuditD: ../puppet/services/auditd.yaml

parameter_defaults:
  AuditdRules:
    'Record attempts to alter time through adjtimex':
      content: '-a always,exit -F arch=b64 -S adjtimex -k audit_time_rules'
      order  : 1
    'Record attempts to alter time through settimeofday':
      content: '-a always,exit -F arch=b64 -S settimeofday -k audit_time_rules'
      order  : 2
    'Record Attempts to Alter Time Through stime':
      content: '-a always,exit -F arch=b64 -S stime -k audit_time_rules'
      order  : 3
    'Record Attempts to Alter Time Through clock_settime':
      content: '-a always,exit -F arch=b64 -S clock_settime -k audit_time_rules'
      order  : 4
    'Record Attempts to Alter the localtime File':
      content: '-w /etc/localtime -p wa -k audit_time_rules'
      order  : 5
    'Record Events that Modify the Systems Discretionary Access Controls - chmod':
      content: '-a always,exit -F arch=b64 -S chmod  -F auid>=1000 -F auid!=4294967295 -k perm_mod'
      order  : 5
    'Record Events that Modify the Systems Discretionary Access Controls - chown':
      content: '-a always,exit -F arch=b64 -S chown -F auid>=1000 -F auid!=4294967295 -k perm_mod'
      order  : 6
    'Record Events that Modify the Systems Discretionary Access Controls - fchmod':
      content: '-a always,exit -F arch=b64 -S fchmod -F auid>=1000 -F auid!=4294967295 -k perm_mod'
      order  : 7
    'Record Events that Modify the Systems Discretionary Access Controls - fchmodat':
      content: '-a always,exit -F arch=b64 -S fchmodat -F auid>=1000 -F auid!=4294967295 -k perm_mod'
      order  : 8
    'Record Events that Modify the Systems Discretionary Access Controls - fchown':
      content: '-a always,exit -F arch=b64 -S fchown -F auid>=1000 -F auid!=4294967295 -k perm_mod'
      order  : 9
    'Record Events that Modify the Systems Discretionary Access Controls - fchownat':
      content: '-a always,exit -F arch=b64 -S fchownat -F auid>=1000 -F auid!=4294967295 -k perm_mod'
      order  : 10
    'Record Events that Modify the Systems Discretionary Access Controls - fremovexattr':
      content: '-a always,exit -F arch=b64 -S fremovexattr -F auid>=1000 -F auid!=4294967295 -k perm_mod'
      order  : 11
    'Record Events that Modify the Systems Discretionary Access Controls - fsetxattr':
      content: '-a always,exit -F arch=b64 -S fsetxattr -F auid>=1000 -F auid!=4294967295 -k perm_mod'
      order  : 12
    'Record Events that Modify the Systems Discretionary Access Controls - lchown':
      content: '-a always,exit -F arch=b64 -S lchown -F auid>=1000 -F auid!=4294967295 -k perm_mod'
      order  : 13
    'Record Events that Modify the Systems Discretionary Access Controls - lremovexattr':
      content: '-a always,exit -F arch=b64 -S lremovexattr -F auid>=1000 -F auid!=4294967295 -k perm_mod'
      order  : 14
    'Record Events that Modify the Systems Discretionary Access Controls - lsetxattr':
      content: '-a always,exit -F arch=b64 -S lsetxattr -F auid>=1000 -F auid!=4294967295 -k perm_mod'
      order  : 15
    'Record Events that Modify the Systems Discretionary Access Controls - removexattr':
      content: '-a always,exit -F arch=b64 -S removexattr -F auid>=1000 -F auid!=4294967295 -k perm_mod'
      order  : 16
    'Record Events that Modify the Systems Discretionary Access Controls - setxattr':
      content: '-a always,exit -F arch=b64 -S setxattr -F auid>=1000 -F auid!=4294967295 -k perm_mod'
      order  : 17
    'Record Events that Modify User/Group Information - /etc/group':
      content: '-w /etc/group -p wa -k audit_rules_usergroup_modification'
      order  : 18
    'Record Events that Modify User/Group Information - /etc/passwd':
      content: '-w /etc/passwd -p wa -k audit_rules_usergroup_modification'
      order  : 19
    'Record Events that Modify User/Group Information - /etc/gshadow':
      content: '-w /etc/gshadow -p wa -k audit_rules_usergroup_modification'
      order  : 20
    'Record Events that Modify User/Group Information - /etc/shadow':
      content: '-w /etc/shadow -p wa -k audit_rules_usergroup_modification'
      order  : 21
    'Record Events that Modify User/Group Information - /etc/opasswd':
      content: '-w /etc/opasswd -p wa -k audit_rules_usergroup_modification'
      order  : 22
    'Record Events that Modify the Systems Network Environment - sethostname / setdomainname':
      content: '-a always,exit -F arch=b64 -S sethostname -S setdomainname -k audit_rules_networkconfig_modification'
      order  : 23
    'Record Events that Modify the Systems Network Environment - /etc/issue':
      content: '-w /etc/issue -p wa -k audit_rules_networkconfig_modification'
      order  : 24
    'Record Events that Modify the Systems Network Environment - /etc/issue.net':
      content: '-w /etc/issue.net -p wa -k audit_rules_networkconfig_modification'
      order  : 25
    'Record Events that Modify the Systems Network Environment - /etc/hosts':
      content: '-w /etc/hosts -p wa -k audit_rules_networkconfig_modification'
      order  : 26
    'Record Events that Modify the Systems Network Environment - /etc/sysconfig/network':
      content: '-w /etc/sysconfig/network -p wa -k audit_rules_networkconfig_modification'
      order  : 27
    'Record Events that Modify the Systems Mandatory Access Controls':
      content: '-w /etc/selinux/ -p wa -k MAC-policy'
      order  : 28
    'Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful / EACCES)':
      content: '-a always,exit -F arch=b64 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EACCES -F auid>=1000 -F auid!=4294967295 -k access'
      order  : 29
    'Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful / EPERM)':
      content: '-a always,exit -F arch=b64 -S creat -S open -S openat -S open_by_handle_at -S truncate -S ftruncate -F exit=-EPERM -F auid>=1000 -F auid!=4294967295 -k access'
      order  : 30
    'Ensure auditd Collects Information on the Use of Privileged Commands':
      content: '-a always,exit -F path=SETUID_PROG_PATH -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged'
      order  : 31
    'Ensure auditd Collects Information on Exporting to Media (successful)':
      content: '-a always,exit -F arch=b64 -S mount -F auid>=1000 -F auid!=4294967295 -k export'
      order  : 32
    'Ensure auditd Collects File Deletion Events by User':
      content: '-a always,exit -F arch=b64 -S rmdir -S unlink -S unlinkat -S rename -S renameat -F auid>=1000 -F auid!=4294967295 -k delete'
      order  : 33
    'Ensure auditd Collects System Administrator Actions':
      content: '-w /etc/sudoers -p wa -k actions'
      order  : 34
    'Ensure auditd Collects Information on Kernel Module Loading and Unloading (insmod)':
      content: '-w /usr/sbin/insmod -p x -k modules'
      order  : 35
    'Ensure auditd Collects Information on Kernel Module Loading and Unloading (rmmod)':
      content: '-w /usr/sbin/rmmod -p x -k modules'
      order  : 36
    'Ensure auditd Collects Information on Kernel Module Loading and Unloading (modprobe)':
      content: '-w /usr/sbin/modprobe -p x -k modules'
      order  : 37