Skip to content

[section 5] Ensure pam update is triggered (WIP)#157

Draft
bykvaadm wants to merge 1 commit intoansible-lockdown:develfrom
bykvaadm:enchance_notifications
Draft

[section 5] Ensure pam update is triggered (WIP)#157
bykvaadm wants to merge 1 commit intoansible-lockdown:develfrom
bykvaadm:enchance_notifications

Conversation

@bykvaadm
Copy link
Copy Markdown
Contributor

@bykvaadm bykvaadm commented Mar 1, 2026

Example of notification improvement.
Why?
if for any reason we can't run role to the end, pam update will never be triggered.
so it's not idempotent without somehow rerunning notifications

Signed-off-by: Kondratev Alexander <info@bykvaadm.ru>
@frederickw082922
Copy link
Copy Markdown
Contributor

Thanks for working on this @bykvaadm.

The approach of checking for existing pam_unix entries before template deployment and using changed_when: true to force handler notification is sound. A few observations:

  1. The audit tasks in 5.3.2.1 all share the same task name ("Check existing files") — they should have unique names for better debugging
  2. The pattern ensures pam-auth-update runs when pam_unix entries are missing, which addresses the interrupted-run scenario

This is a good enhancement. We're tracking it for inclusion.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants