This is the neutral lookup page for Blastwall names and expected evidence. Use it when a demo or lab page mentions an object and you need the exact role, path, or output.

AAP Objects

ObjectTypePurpose
BlastwallProjectSyncs the Blastwall repository into Controller.
Blastwall EEExecution environmentCarries Ansible, Kerberos, and IdM dependencies for AAP jobs.
Blastwall IdM Inventory SourceInventory sourceUses eigenstate.ipa to expose IdM state as inventory facts.
Blastwall IdM RuntimeCredentialInjects the IdM principal and password or keytab used by runtime inventory and preflight.
Blastwall runtime verificationWorkflow templateRuns project sync, credential smoke, inventory sync, preflight, and managed-host verification.

IdM Records

RecordCurrent Lab NamePurpose
Automation identitysvc-ansible-runnerKerberos-backed automation principal used by the Ansible proof.
AAP launcherblastwall-demoController-facing demo account that launches the recorded workflow.
Automation groupblastwallGroups the automation identities that receive the Blastwall path.
SELinux user mapblastwall-root-local-mapMaps the automation identity to blastwall_u:s0.
HBAC ruleblastwall-sshAllows the automation identity to enter eligible hosts through SSH.
Sudo ruleblastwall-root-local-sudoDelegates root work while SELinux keeps the domain confined.

SELinux Contexts

Context Or PartMeaningExpected Evidence
blastwall_uSELinux user component.The login receives a Blastwall-specific SELinux user, not an unconfined user.
blastwall_rSELinux role component.The runtime process stays in the Blastwall role.
blastwall_tSELinux process type/domain.The process remains in this domain before and after sudo.
blastwall_u:blastwall_r:blastwall_t:s0Full confined automation process context.Printed by AAP and Ansible verification jobs.

Probe Scripts

ProbeSurfaceExpected Output
trigger-copyfail-afalg.pyAF_ALG/authencesn path.BLOCKED or socket creation denied with permission error.
trigger-bpf-deny.pyBPF map creation and program load.BLOCKED for BPF_MAP_CREATE and BPF_PROG_LOAD.
trigger-packet-socket-deny.pyAF_PACKET socket creation.BLOCKED for packet socket creation.
trigger-userns-deny.pyUser namespace creation.BLOCKED for unshare(CLONE_NEWUSER).
trigger-io-uring-deny.pyio_uring setup.BLOCKED, or SKIP on kernels without that object class.

Policy Artifacts

ArtifactPurpose
policy/SELinux reference-policy module and CIL deny rules.
playbooks/Generic deployment, preflight, credential smoke, and verification playbooks.
aap/Controller configuration-as-code for the AAP proof.
poc-calabi/Calabi-specific lab runbooks and replay assets.

Lab Names

The docs use some names from earlier proof phases and some names from the current AAP demo. Treat this table as the current map.

NameScopeMeaning
svc-ansible-runnerAnsible proofAutomation service principal used for Kerberos-backed host proof.
blastwall-demoAAP proofDemo launcher visible in Controller workflow output.
mirror-registry.workshop.lanCalabi managed endpointCurrent host selected for verification in the recorded demos.
stale-blastwall-01.workshop.lanCalabi fixtureDeliberately stale host used to prove preflight rejection.
automation-endpointInventory groupGeneric Ansible target group used by lab playbooks.