Go to file
Matt Thompson d1ddc4c8b6 pin version of ansible-lint we use for testing
Latest release of ansible-lint 2.4.0 has broken
role linter tasks by introducing a dependency on
openstack-ansible-plugins for all linting

While we may choose to adapt the linter tox env
in the future, for now we want to return to previous
linter behavior.

Change-Id: Ic61ab43be0a77d852ef61a2e7551a2b6780a70e7
2016-03-15 15:46:09 +00:00
2015-10-14 21:23:11 -05:00
2016-02-29 14:15:29 -06:00
2016-02-29 14:15:29 -06:00
2015-10-05 17:37:21 +00:00
2015-10-09 08:25:56 -05:00
2016-03-08 12:47:18 -06:00

openstack-ansible-security

The goal of the openstack-ansible-security role is to improve security within openstack-ansible deployments. The role is based on the Security Technical Implementation Guide (STIG) for Red Hat Enterprise Linux 6.

Requirements

This role can be used with or without the openstack-ansible role. It requires Ansible 1.8.3 at a minimum.

Role Variables

All of the variables for this role are in defaults/main.yml.

Dependencies

This role has no dependencies.

Example Playbook

Using the role is fairly straightforward:

- hosts: servers
  roles:
     - openstack-ansible-security

Running with Vagrant

Security Ansible can be easily run for testing using Vagrant.

To do so run: vagrant destroy To destroy any previously created Vagrant setup vagrant up Spin up Ubuntu Trusty VM and run ansible-security against it

License

Apache 2.0

Author Information

For more information, join #openstack-ansible on Freenode.

Description
Ansible role for security hardening
Readme 5.6 MiB
Languages
Jinja 51.9%
Python 47.9%
Shell 0.2%