chef 17.2.29-universal-mingw32 → 17.5.22-universal-mingw32
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/Gemfile +6 -5
- data/chef.gemspec +3 -0
- data/lib/chef/application/base.rb +11 -1
- data/lib/chef/application.rb +3 -1
- data/lib/chef/client.rb +2 -3
- data/lib/chef/compliance/default_attributes.rb +5 -3
- data/lib/chef/compliance/input.rb +115 -0
- data/lib/chef/compliance/input_collection.rb +139 -0
- data/lib/chef/compliance/profile.rb +122 -0
- data/lib/chef/compliance/profile_collection.rb +109 -0
- data/lib/chef/compliance/reporter/automate.rb +1 -1
- data/lib/chef/compliance/runner.rb +62 -6
- data/lib/chef/compliance/waiver.rb +115 -0
- data/lib/chef/compliance/waiver_collection.rb +143 -0
- data/lib/chef/data_bag.rb +1 -2
- data/lib/chef/data_bag_item.rb +1 -2
- data/lib/chef/deprecated.rb +10 -4
- data/lib/chef/dsl/compliance.rb +38 -0
- data/lib/chef/dsl/reader_helpers.rb +51 -0
- data/lib/chef/dsl/recipe.rb +4 -2
- data/lib/chef/dsl/render_helpers.rb +44 -0
- data/lib/chef/dsl/secret.rb +62 -0
- data/lib/chef/dsl/toml.rb +116 -0
- data/lib/chef/dsl/universal.rb +7 -0
- data/lib/chef/dsl.rb +1 -0
- data/lib/chef/event_dispatch/base.rb +44 -2
- data/lib/chef/exceptions.rb +20 -0
- data/lib/chef/formatters/doc.rb +60 -13
- data/lib/chef/formatters/error_mapper.rb +2 -2
- data/lib/chef/formatters/minimal.rb +6 -5
- data/lib/chef/handler/slow_report.rb +1 -1
- data/lib/chef/http/basic_client.rb +15 -7
- data/lib/chef/http.rb +12 -8
- data/lib/chef/json_compat.rb +1 -1
- data/lib/chef/policy_builder/policyfile.rb +88 -45
- data/lib/chef/provider/execute.rb +1 -1
- data/lib/chef/provider/file.rb +4 -2
- data/lib/chef/provider/group/dscl.rb +1 -1
- data/lib/chef/provider/launchd.rb +6 -6
- data/lib/chef/provider/link.rb +2 -2
- data/lib/chef/provider/lwrp_base.rb +1 -1
- data/lib/chef/provider/package/habitat.rb +168 -0
- data/lib/chef/provider/package/powershell.rb +5 -0
- data/lib/chef/provider/registry_key.rb +3 -2
- data/lib/chef/provider/remote_file/http.rb +1 -1
- data/lib/chef/provider/subversion.rb +4 -4
- data/lib/chef/provider/support/yum_repo.erb +1 -1
- data/lib/chef/provider/systemd_unit.rb +17 -16
- data/lib/chef/provider/template.rb +1 -1
- data/lib/chef/provider/user/mac.rb +3 -3
- data/lib/chef/provider/yum_repository.rb +27 -43
- data/lib/chef/provider/zypper_repository.rb +3 -3
- data/lib/chef/provider.rb +26 -1
- data/lib/chef/provider_resolver.rb +8 -2
- data/lib/chef/providers.rb +1 -0
- data/lib/chef/resource/archive_file.rb +17 -14
- data/lib/chef/resource/chef_client_config.rb +7 -2
- data/lib/chef/resource/chef_client_cron.rb +1 -1
- data/lib/chef/resource/chef_client_launchd.rb +1 -1
- data/lib/chef/resource/chef_client_scheduled_task.rb +46 -3
- data/lib/chef/resource/chef_client_systemd_timer.rb +1 -1
- data/lib/chef/resource/chef_client_trusted_certificate.rb +2 -2
- data/lib/chef/resource/chef_vault_secret.rb +2 -2
- data/lib/chef/resource/chocolatey_config.rb +13 -13
- data/lib/chef/resource/dsc_resource.rb +1 -1
- data/lib/chef/resource/execute.rb +5 -5
- data/lib/chef/resource/file/verification/json.rb +50 -0
- data/lib/chef/resource/file/verification/yaml.rb +52 -0
- data/lib/chef/resource/gem_package.rb +2 -1
- data/lib/chef/resource/habitat/_habitat_shared.rb +28 -0
- data/lib/chef/resource/habitat/habitat_package.rb +129 -0
- data/lib/chef/resource/habitat/habitat_sup.rb +329 -0
- data/lib/chef/resource/habitat/habitat_sup_systemd.rb +67 -0
- data/lib/chef/resource/habitat/habitat_sup_windows.rb +90 -0
- data/lib/chef/resource/habitat_config.rb +107 -0
- data/lib/chef/resource/habitat_install.rb +247 -0
- data/lib/chef/resource/habitat_service.rb +451 -0
- data/lib/chef/resource/habitat_user_toml.rb +92 -0
- data/lib/chef/resource/homebrew_cask.rb +1 -1
- data/lib/chef/resource/inspec_input.rb +128 -0
- data/lib/chef/resource/inspec_waiver.rb +185 -0
- data/lib/chef/resource/inspec_waiver_file_entry.rb +2 -2
- data/lib/chef/resource/launchd.rb +3 -3
- data/lib/chef/resource/lwrp_base.rb +1 -1
- data/lib/chef/resource/mount.rb +1 -1
- data/lib/chef/resource/registry_key.rb +36 -48
- data/lib/chef/resource/remote_file.rb +99 -3
- data/lib/chef/resource/rhsm_subscription.rb +5 -5
- data/lib/chef/resource/ruby_block.rb +100 -0
- data/lib/chef/resource/scm/subversion.rb +1 -1
- data/lib/chef/resource/support/HabService.dll.config.erb +19 -0
- data/lib/chef/resource/support/client.erb +8 -1
- data/lib/chef/resource/support/sup.toml.erb +179 -0
- data/lib/chef/resource/sysctl.rb +2 -2
- data/lib/chef/resource/systemd_unit.rb +3 -3
- data/lib/chef/resource/timezone.rb +2 -2
- data/lib/chef/resource/user_ulimit.rb +1 -0
- data/lib/chef/resource/windows_defender.rb +163 -0
- data/lib/chef/resource/windows_defender_exclusion.rb +125 -0
- data/lib/chef/resource/windows_printer.rb +78 -44
- data/lib/chef/resource/windows_printer_port.rb +1 -1
- data/lib/chef/resource/windows_uac.rb +3 -1
- data/lib/chef/resource/windows_update_settings.rb +259 -0
- data/lib/chef/resource/windows_user_privilege.rb +1 -1
- data/lib/chef/resource/yum_package.rb +1 -5
- data/lib/chef/resource.rb +13 -17
- data/lib/chef/resource_inspector.rb +6 -2
- data/lib/chef/resources.rb +14 -1
- data/lib/chef/run_context/cookbook_compiler.rb +112 -28
- data/lib/chef/run_context.rb +31 -1
- data/lib/chef/secret_fetcher/akeyless_vault.rb +57 -0
- data/lib/chef/secret_fetcher/aws_secrets_manager.rb +65 -0
- data/lib/chef/secret_fetcher/azure_key_vault.rb +78 -0
- data/lib/chef/secret_fetcher/base.rb +76 -0
- data/lib/chef/secret_fetcher/example.rb +46 -0
- data/lib/chef/secret_fetcher/hashi_vault.rb +100 -0
- data/lib/chef/secret_fetcher.rb +61 -0
- data/lib/chef/version.rb +1 -1
- data/spec/data/archive_file/test_archive.tar.gz +0 -0
- data/spec/functional/mixin/from_file_spec.rb +1 -1
- data/spec/functional/resource/archive_file_spec.rb +87 -0
- data/spec/functional/resource/group_spec.rb +5 -1
- data/spec/functional/resource/link_spec.rb +8 -0
- data/spec/integration/compliance/compliance_spec.rb +61 -0
- data/spec/integration/recipes/recipe_dsl_spec.rb +1 -1
- data/spec/integration/recipes/resource_action_spec.rb +6 -6
- data/spec/spec_helper.rb +3 -0
- data/spec/support/platform_helpers.rb +4 -0
- data/spec/support/ruby_installer.rb +51 -0
- data/spec/support/shared/unit/provider/file.rb +2 -8
- data/spec/unit/compliance/input_spec.rb +104 -0
- data/spec/unit/compliance/profile_spec.rb +120 -0
- data/spec/unit/compliance/runner_spec.rb +46 -2
- data/spec/unit/compliance/waiver_spec.rb +104 -0
- data/spec/unit/data_bag_item_spec.rb +2 -2
- data/spec/unit/data_bag_spec.rb +1 -1
- data/spec/unit/dsl/render_helpers_spec.rb +102 -0
- data/spec/unit/dsl/secret_spec.rb +71 -0
- data/spec/unit/formatters/doc_spec.rb +1 -1
- data/spec/unit/http/basic_client_spec.rb +30 -0
- data/spec/unit/http_spec.rb +8 -2
- data/spec/unit/policy_builder/dynamic_spec.rb +0 -5
- data/spec/unit/policy_builder/policyfile_spec.rb +144 -56
- data/spec/unit/provider/apt_update_spec.rb +3 -1
- data/spec/unit/provider/link_spec.rb +13 -7
- data/spec/unit/provider/mount/aix_spec.rb +1 -1
- data/spec/unit/provider/package/powershell_spec.rb +74 -12
- data/spec/unit/provider/remote_file/http_spec.rb +10 -0
- data/spec/unit/provider/template_spec.rb +2 -2
- data/spec/unit/provider_spec.rb +23 -0
- data/spec/unit/resource/archive_file_spec.rb +414 -3
- data/spec/unit/resource/chef_client_scheduled_task_spec.rb +69 -0
- data/spec/unit/resource/file/verification/json_spec.rb +72 -0
- data/spec/unit/resource/file/verification/yaml_spec.rb +67 -0
- data/spec/unit/resource/homebrew_cask_spec.rb +29 -11
- data/spec/unit/resource/inspec_input_spec.rb +300 -0
- data/spec/unit/resource/inspec_waiver_spec.rb +312 -0
- data/spec/unit/resource/mount_spec.rb +10 -0
- data/spec/unit/resource/rhsm_subscription_spec.rb +50 -3
- data/spec/unit/resource/systemd_unit_spec.rb +1 -1
- data/spec/unit/resource/user_ulimit_spec.rb +14 -1
- data/spec/unit/resource/windows_defender_exclusion_spec.rb +62 -0
- data/spec/unit/resource/windows_defender_spec.rb +71 -0
- data/spec/unit/resource/windows_update_settings_spec.rb +64 -0
- data/spec/unit/resource_spec.rb +19 -8
- data/spec/unit/secret_fetcher/akeyless_vault_spec.rb +37 -0
- data/spec/unit/secret_fetcher/aws_secrets_manager_spec.rb +70 -0
- data/spec/unit/secret_fetcher/azure_key_vault_spec.rb +70 -0
- data/spec/unit/secret_fetcher/hashi_vault_spec.rb +80 -0
- data/spec/unit/secret_fetcher_spec.rb +82 -0
- data/tasks/rspec.rb +2 -1
- metadata +106 -7
@@ -0,0 +1,179 @@
|
|
1
|
+
# sup.toml
|
2
|
+
# Used for passing configuration options to the Chef Habitat supervisor
|
3
|
+
# This file is controlled by the 'habitat' cookbook and should not be modified by hand -- local modifications may be overwritten.
|
4
|
+
|
5
|
+
### The listen address for the Gossip Gateway
|
6
|
+
<% if @listen_gossip %>
|
7
|
+
listen_gossip = "<%= @listen_gossip %>"
|
8
|
+
<% end %>
|
9
|
+
|
10
|
+
### Start the supervisor in local mode
|
11
|
+
# local_gossip_mode =
|
12
|
+
|
13
|
+
### The listen address for the HTTP Gateway
|
14
|
+
<% if @listen_http %>
|
15
|
+
listen_http = "<%= @listen_http %>"
|
16
|
+
<% end %>
|
17
|
+
### Disable the HTTP Gateway completely
|
18
|
+
# http_disable =
|
19
|
+
|
20
|
+
### The listen address for the Control Gateway
|
21
|
+
<% if @listen_ctl %>
|
22
|
+
listen_ctl = "<%= @listen_ctl %>"
|
23
|
+
<% end %>
|
24
|
+
### The organization the Supervisor and its services are part of
|
25
|
+
<% if @organization %>
|
26
|
+
organization = "<%= @organization %>"
|
27
|
+
<% end %>
|
28
|
+
### The listen address of one or more initial peers (IP[:PORT])
|
29
|
+
<% if @peer %>
|
30
|
+
peer = <%= @peer %>
|
31
|
+
<% end %>
|
32
|
+
### Make this Supervisor a permanent peer
|
33
|
+
<% if @permanent_peer %>
|
34
|
+
permanent_peer = <%= @permanent_peer %>
|
35
|
+
<% end %>
|
36
|
+
### Watch this file for connecting to the ring
|
37
|
+
# peer_watch_file =
|
38
|
+
|
39
|
+
### Cache for creating and searching for encryption keys
|
40
|
+
# cache_key_path =
|
41
|
+
|
42
|
+
### The name of the ring used by the Supervisor when running with wire encryption
|
43
|
+
<% if @ring %>
|
44
|
+
ring = "<%= @ring %>"
|
45
|
+
<% end %>
|
46
|
+
### Use the package config from this path rather than the package itself
|
47
|
+
# config_from =
|
48
|
+
|
49
|
+
### Enable automatic updates for the Supervisor itself
|
50
|
+
<% if @auto_update %>
|
51
|
+
auto_update = <%= @auto_update %>
|
52
|
+
<% end %>
|
53
|
+
### The period of time in seconds between Supervisor update checks
|
54
|
+
# auto_update_period =
|
55
|
+
|
56
|
+
### The period of time in seconds between service update checks
|
57
|
+
# service_update_period =
|
58
|
+
|
59
|
+
### The private key for HTTP Gateway TLS encryption
|
60
|
+
###
|
61
|
+
### Read the private key from KEY_FILE. This should be an RSA private key or PKCS8-encoded private key in PEM format.
|
62
|
+
# key_file =
|
63
|
+
|
64
|
+
### The server certificates for HTTP Gateway TLS encryption
|
65
|
+
###
|
66
|
+
### Read server certificates from CERT_FILE. This should contain PEM-format certificates in the right order. The first certificate should certify KEY_FILE. The last should be a root CA.
|
67
|
+
# cert_file =
|
68
|
+
|
69
|
+
### The CA certificate for HTTP Gateway TLS encryption
|
70
|
+
###
|
71
|
+
### Read the CA certificate from CA_CERT_FILE. This should contain PEM-format certificate that can be used to validate client requests
|
72
|
+
# ca_cert_file =
|
73
|
+
|
74
|
+
### Load a Habitat package as part of the Supervisor startup
|
75
|
+
###
|
76
|
+
### The package can be specified by a package identifier (ex: core/redis) or filepath to a Habitat artifact (ex: /home/core-redis-3.0.7-21120102031201-x86_64-linux.hart).
|
77
|
+
# pkg_ident_or_artifact =
|
78
|
+
|
79
|
+
### Verbose output showing file and line/column numbers
|
80
|
+
# verbose =
|
81
|
+
|
82
|
+
### Turn ANSI color off
|
83
|
+
# no_color =
|
84
|
+
|
85
|
+
### Use structured JSON logging for the Supervisor
|
86
|
+
###
|
87
|
+
### This option also sets NO_COLOR.
|
88
|
+
# json_logging =
|
89
|
+
|
90
|
+
### The IPv4 address to use as the `sys.ip` template variable
|
91
|
+
###
|
92
|
+
### If this argument is not set, the supervisor tries to dynamically determine an IP address. If that fails, the supervisor defaults to using `127.0.0.1`.
|
93
|
+
# sys_ip_address =
|
94
|
+
|
95
|
+
### The name of the application for event stream purposes
|
96
|
+
###
|
97
|
+
### This will be attached to all events generated by this Supervisor.
|
98
|
+
<% if @event_stream_application %>
|
99
|
+
event_stream_application = "<%= @event_stream_application %>"
|
100
|
+
<% end %>
|
101
|
+
### The name of the environment for event stream purposes
|
102
|
+
###
|
103
|
+
### This will be attached to all events generated by this Supervisor.
|
104
|
+
<% if @event_stream_environment %>
|
105
|
+
event_stream_environment = "<%= @event_stream_environment %>"
|
106
|
+
<% end %>
|
107
|
+
### Event stream connection timeout before exiting the Supervisor
|
108
|
+
###
|
109
|
+
### Set to '0' to immediately start the Supervisor and continue running regardless of the initial connection status.
|
110
|
+
# event_stream_connect_timeout =
|
111
|
+
|
112
|
+
### The event stream connection url used to send events to Chef Automate
|
113
|
+
###
|
114
|
+
### This enables the event stream and requires EVENT_STREAM_APPLICATION, EVENT_STREAM_ENVIRONMENT, and EVENT_STREAM_TOKEN also be set.
|
115
|
+
<% if @event_stream_url %>
|
116
|
+
event_stream_url = "<%= @event_stream_url %>"
|
117
|
+
<% end %>
|
118
|
+
### The name of the site where this Supervisor is running for event stream purposes
|
119
|
+
<% if @event_stream_site %>
|
120
|
+
event_stream_site = "<%= @event_stream_site %>"
|
121
|
+
<% end %>
|
122
|
+
### The authentication token for connecting the event stream to Chef Automate
|
123
|
+
<% if @event_stream_token %>
|
124
|
+
event_stream_token = "<%= @event_stream_token %>"
|
125
|
+
<% end %>
|
126
|
+
### An arbitrary key-value pair to add to each event generated by this Supervisor
|
127
|
+
# event_meta = []
|
128
|
+
|
129
|
+
### The path to Chef Automate's event stream certificate used to establish a TLS connection
|
130
|
+
###
|
131
|
+
### The certificate should be in PEM format.
|
132
|
+
<% if @event_stream_server_certificate %>
|
133
|
+
event_stream_server_certificate = "<%= @event_stream_server_certificate %>"
|
134
|
+
<% end %>
|
135
|
+
### Automatically cleanup old packages
|
136
|
+
###
|
137
|
+
### The Supervisor will automatically cleanup old packages only keeping the KEEP_LATEST_PACKAGES latest packages. If this argument is not specified, no automatic package cleanup is performed.
|
138
|
+
<% if @keep_latest_packages %>
|
139
|
+
keep_latest_packages = "<%= @keep_latest_packages %>"
|
140
|
+
<% end %>
|
141
|
+
### Receive updates from the specified release channel
|
142
|
+
# channel =
|
143
|
+
|
144
|
+
### Specify an alternate Builder endpoint. If not specified, the value will be taken from the HAB_BLDR_URL environment variable if defined. (default: https://bldr.habitat.sh)
|
145
|
+
<% if @bldr_url %>
|
146
|
+
bldr_url = "<%= @bldr_url %>"
|
147
|
+
<% end %>
|
148
|
+
### The service group with shared config and topology
|
149
|
+
# group =
|
150
|
+
|
151
|
+
### Service topology
|
152
|
+
# topology =
|
153
|
+
|
154
|
+
### The update strategy
|
155
|
+
# strategy =
|
156
|
+
|
157
|
+
### The condition dictating when this service should update
|
158
|
+
###
|
159
|
+
### latest: Runs the latest package that can be found in the configured channel and local packages.
|
160
|
+
###
|
161
|
+
### track-channel: Always run what is at the head of a given channel. This enables service rollback where demoting a package from a channel will cause the package to rollback to an older version of the package. A ramification of enabling this condition is packages newer than the package at the head of the channel will be automatically uninstalled during a service rollback.
|
162
|
+
<% if @update_condition %>
|
163
|
+
update_condition = "<%= @update_condition %>"
|
164
|
+
<% end %>
|
165
|
+
### One or more service groups to bind to a configuration
|
166
|
+
# bind = []
|
167
|
+
|
168
|
+
### Governs how the presence or absence of binds affects service startup
|
169
|
+
###
|
170
|
+
### strict: blocks startup until all binds are present.
|
171
|
+
# binding_mode =
|
172
|
+
|
173
|
+
### The interval in seconds on which to run health checks
|
174
|
+
# health_check_interval =
|
175
|
+
|
176
|
+
### The delay in seconds after sending the shutdown signal to wait before killing the service process
|
177
|
+
###
|
178
|
+
### The default value can be set in the packages plan file.
|
179
|
+
# shutdown_timeout =
|
data/lib/chef/resource/sysctl.rb
CHANGED
@@ -131,7 +131,7 @@ class Chef
|
|
131
131
|
|
132
132
|
end
|
133
133
|
|
134
|
-
action :apply, description: "
|
134
|
+
action :apply, description: "Set the kernel parameter and update the `sysctl` settings." do
|
135
135
|
converge_if_changed do
|
136
136
|
# set it temporarily
|
137
137
|
set_sysctl_param(new_resource.key, new_resource.value)
|
@@ -150,7 +150,7 @@ class Chef
|
|
150
150
|
end
|
151
151
|
end
|
152
152
|
|
153
|
-
action :remove, description: "Remove
|
153
|
+
action :remove, description: "Remove the kernel parameter and update the `sysctl` settings." do
|
154
154
|
# only converge the resource if the file actually exists to delete
|
155
155
|
if ::File.exist?("#{new_resource.conf_dir}/99-chef-#{new_resource.key.tr("/", ".")}.conf")
|
156
156
|
converge_by "removing sysctl config at #{new_resource.conf_dir}/99-chef-#{new_resource.key.tr("/", ".")}.conf" do
|
@@ -34,7 +34,7 @@ class Chef
|
|
34
34
|
|
35
35
|
```ruby
|
36
36
|
systemd_unit 'etcd.service' do
|
37
|
-
content(Unit: {
|
37
|
+
content({ Unit: {
|
38
38
|
Description: 'Etcd',
|
39
39
|
Documentation: ['https://coreos.com/etcd', 'man:etcd(1)'],
|
40
40
|
After: 'network.target',
|
@@ -46,7 +46,7 @@ class Chef
|
|
46
46
|
},
|
47
47
|
Install: {
|
48
48
|
WantedBy: 'multi-user.target',
|
49
|
-
})
|
49
|
+
} })
|
50
50
|
action [:create, :enable]
|
51
51
|
end
|
52
52
|
```
|
@@ -113,7 +113,7 @@ class Chef
|
|
113
113
|
when Hash
|
114
114
|
IniParse.gen do |doc|
|
115
115
|
content.each_pair do |sect, opts|
|
116
|
-
doc.section(sect) do |section|
|
116
|
+
doc.section(sect, { option_sep: "=" }) do |section|
|
117
117
|
opts.each_pair do |opt, val|
|
118
118
|
[val].flatten.each do |v|
|
119
119
|
section.option(opt, v)
|
@@ -38,7 +38,7 @@ class Chef
|
|
38
38
|
**Set the timezone to America/Los_Angeles with a friendly resource name on Linux/macOS**
|
39
39
|
|
40
40
|
```ruby
|
41
|
-
timezone
|
41
|
+
timezone "Set the host's timezone to America/Los_Angeles" do
|
42
42
|
timezone 'America/Los_Angeles'
|
43
43
|
end
|
44
44
|
```
|
@@ -46,7 +46,7 @@ class Chef
|
|
46
46
|
**Set the timezone to PST with a friendly resource name on Windows**
|
47
47
|
|
48
48
|
```ruby
|
49
|
-
timezone
|
49
|
+
timezone "Set the host's timezone to PST" do
|
50
50
|
timezone 'Pacific Standard time'
|
51
51
|
end
|
52
52
|
```
|
@@ -0,0 +1,163 @@
|
|
1
|
+
#
|
2
|
+
# Copyright:: Chef Software, Inc.
|
3
|
+
#
|
4
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
5
|
+
# you may not use this file except in compliance with the License.
|
6
|
+
# You may obtain a copy of the License at
|
7
|
+
#
|
8
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
9
|
+
#
|
10
|
+
# Unless required by applicable law or agreed to in writing, software
|
11
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
12
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
13
|
+
# See the License for the specific language governing permissions and
|
14
|
+
# limitations under the License.
|
15
|
+
#
|
16
|
+
|
17
|
+
require_relative "../resource"
|
18
|
+
|
19
|
+
class Chef
|
20
|
+
class Resource
|
21
|
+
class WindowsDefender < Chef::Resource
|
22
|
+
unified_mode true
|
23
|
+
provides :windows_defender
|
24
|
+
|
25
|
+
description "Use the **windows_defender** resource to enable or disable the Microsoft Windows Defender service."
|
26
|
+
introduced "17.3"
|
27
|
+
examples <<~DOC
|
28
|
+
**Configure Windows Defender AV settings**:
|
29
|
+
|
30
|
+
```ruby
|
31
|
+
windows_defender 'Configure Defender' do
|
32
|
+
realtime_protection true
|
33
|
+
intrusion_protection_system true
|
34
|
+
lock_ui true
|
35
|
+
scan_archives true
|
36
|
+
scan_scripts true
|
37
|
+
scan_email true
|
38
|
+
scan_removable_drives true
|
39
|
+
scan_network_files false
|
40
|
+
scan_mapped_drives false
|
41
|
+
action :enable
|
42
|
+
end
|
43
|
+
```
|
44
|
+
|
45
|
+
**Disable Windows Defender AV**:
|
46
|
+
|
47
|
+
```ruby
|
48
|
+
windows_defender 'Disable Defender' do
|
49
|
+
action :disable
|
50
|
+
end
|
51
|
+
```
|
52
|
+
DOC
|
53
|
+
|
54
|
+
# DisableIOAVProtection
|
55
|
+
property :realtime_protection, [true, false],
|
56
|
+
default: true,
|
57
|
+
description: "Enable realtime scanning of downloaded files and attachments."
|
58
|
+
|
59
|
+
# DisableIntrusionPreventionSystem
|
60
|
+
property :intrusion_protection_system, [true, false],
|
61
|
+
default: true,
|
62
|
+
description: "Enable network protection against exploitation of known vulnerabilities."
|
63
|
+
|
64
|
+
# UILockdown
|
65
|
+
property :lock_ui, [true, false],
|
66
|
+
description: "Lock the UI to prevent users from changing Windows Defender settings.",
|
67
|
+
default: false
|
68
|
+
|
69
|
+
# DisableArchiveScanning
|
70
|
+
property :scan_archives, [true, false],
|
71
|
+
default: true,
|
72
|
+
description: "Scan file archives such as .zip or .gz archives."
|
73
|
+
|
74
|
+
# DisableScriptScanning
|
75
|
+
property :scan_scripts, [true, false],
|
76
|
+
default: false,
|
77
|
+
description: "Scan scripts in malware scans."
|
78
|
+
|
79
|
+
# DisableEmailScanning
|
80
|
+
property :scan_email, [true, false],
|
81
|
+
default: false,
|
82
|
+
description: "Scan e-mails for malware."
|
83
|
+
|
84
|
+
# DisableRemovableDriveScanning
|
85
|
+
property :scan_removable_drives, [true, false],
|
86
|
+
default: false,
|
87
|
+
description: "Scan content of removable drives."
|
88
|
+
|
89
|
+
# DisableScanningNetworkFiles
|
90
|
+
property :scan_network_files, [true, false],
|
91
|
+
default: false,
|
92
|
+
description: "Scan files on a network."
|
93
|
+
|
94
|
+
# DisableScanningMappedNetworkDrivesForFullScan
|
95
|
+
property :scan_mapped_drives, [true, false],
|
96
|
+
default: true,
|
97
|
+
description: "Scan files on mapped network drives."
|
98
|
+
|
99
|
+
load_current_value do
|
100
|
+
values = powershell_exec!("Get-MPpreference").result
|
101
|
+
|
102
|
+
lock_ui values["UILockdown"]
|
103
|
+
realtime_protection !values["DisableIOAVProtection"]
|
104
|
+
intrusion_protection_system !values["DisableIntrusionPreventionSystem"]
|
105
|
+
scan_archives !values["DisableArchiveScanning"]
|
106
|
+
scan_scripts !values["DisableScriptScanning"]
|
107
|
+
scan_email !values["DisableEmailScanning"]
|
108
|
+
scan_removable_drives !values["DisableRemovableDriveScanning"]
|
109
|
+
scan_network_files !values["DisableScanningNetworkFiles"]
|
110
|
+
scan_mapped_drives !values["DisableScanningMappedNetworkDrivesForFullScan"]
|
111
|
+
end
|
112
|
+
|
113
|
+
action :enable, description: "Enable and configure Windows Defender." do
|
114
|
+
windows_service "Windows Defender" do
|
115
|
+
service_name "WinDefend"
|
116
|
+
action %i{start enable}
|
117
|
+
startup_type :automatic
|
118
|
+
end
|
119
|
+
|
120
|
+
converge_if_changed do
|
121
|
+
powershell_exec!(set_mppreference_cmd)
|
122
|
+
end
|
123
|
+
end
|
124
|
+
|
125
|
+
action :disable, description: "Disable Windows Defender." do
|
126
|
+
windows_service "Windows Defender" do
|
127
|
+
service_name "WinDefend"
|
128
|
+
action %i{disable stop}
|
129
|
+
end
|
130
|
+
end
|
131
|
+
|
132
|
+
action_class do
|
133
|
+
require "chef/mixin/powershell_type_coercions"
|
134
|
+
include Chef::Mixin::PowershellTypeCoercions
|
135
|
+
|
136
|
+
PROPERTY_TO_PS_MAP = {
|
137
|
+
realtime_protection: "DisableIOAVProtection",
|
138
|
+
intrusion_protection_system: "DisableIntrusionPreventionSystem",
|
139
|
+
scan_archives: "DisableArchiveScanning",
|
140
|
+
scan_scripts: "DisableScriptScanning",
|
141
|
+
scan_email: "DisableEmailScanning",
|
142
|
+
scan_removable_drives: "DisableRemovableDriveScanning",
|
143
|
+
scan_network_files: "DisableScanningNetworkFiles",
|
144
|
+
scan_mapped_drives: "DisableScanningMappedNetworkDrivesForFullScan",
|
145
|
+
}.freeze
|
146
|
+
|
147
|
+
def set_mppreference_cmd
|
148
|
+
cmd = "Set-MpPreference -Force"
|
149
|
+
cmd << " -UILockdown #{type_coercion(new_resource.lock_ui)}"
|
150
|
+
|
151
|
+
# the values are the opposite in Set-MpPreference and our properties so we have to iterate
|
152
|
+
# over the list and negate the provided values so it makes sense with the cmdlet flag's expected value
|
153
|
+
PROPERTY_TO_PS_MAP.each do |prop, flag|
|
154
|
+
next if new_resource.send(prop).nil? || current_resource.send(prop) == new_resource.send(prop)
|
155
|
+
|
156
|
+
cmd << " -#{flag} #{type_coercion(!new_resource.send(prop))}"
|
157
|
+
end
|
158
|
+
cmd
|
159
|
+
end
|
160
|
+
end
|
161
|
+
end
|
162
|
+
end
|
163
|
+
end
|
@@ -0,0 +1,125 @@
|
|
1
|
+
#
|
2
|
+
# Copyright:: Chef Software, Inc.
|
3
|
+
#
|
4
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
5
|
+
# you may not use this file except in compliance with the License.
|
6
|
+
# You may obtain a copy of the License at
|
7
|
+
#
|
8
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
9
|
+
#
|
10
|
+
# Unless required by applicable law or agreed to in writing, software
|
11
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
12
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
13
|
+
# See the License for the specific language governing permissions and
|
14
|
+
# limitations under the License.
|
15
|
+
#
|
16
|
+
|
17
|
+
require_relative "../resource"
|
18
|
+
|
19
|
+
class Chef
|
20
|
+
class Resource
|
21
|
+
class WindowsDefenderExclusion < Chef::Resource
|
22
|
+
|
23
|
+
provides :windows_defender_exclusion
|
24
|
+
|
25
|
+
description "Use the **windows_defender_exclusion** resource to exclude paths, processes, or file types from Windows Defender realtime protection scanning."
|
26
|
+
introduced "17.3"
|
27
|
+
examples <<~DOC
|
28
|
+
**Add excluded items to Windows Defender scans**:
|
29
|
+
|
30
|
+
```ruby
|
31
|
+
windows_defender_exclusion 'Add to things to be excluded from scanning' do
|
32
|
+
paths 'c:\\foo\\bar, d:\\bar\\baz'
|
33
|
+
extensions 'png, foo, ppt, doc'
|
34
|
+
process_paths 'c:\\windows\\system32'
|
35
|
+
action :add
|
36
|
+
end
|
37
|
+
```
|
38
|
+
|
39
|
+
**Remove excluded items from Windows Defender scans**:
|
40
|
+
|
41
|
+
```ruby
|
42
|
+
windows_defender_exclusion 'Remove things from the list to be excluded' do
|
43
|
+
process_paths 'c:\\windows\\system32'
|
44
|
+
action :remove
|
45
|
+
end
|
46
|
+
```
|
47
|
+
DOC
|
48
|
+
unified_mode true
|
49
|
+
|
50
|
+
property :paths, [String, Array], default: [],
|
51
|
+
coerce: proc { |x| to_consistent_path_array(x) },
|
52
|
+
description: "File or directory paths to exclude from scanning."
|
53
|
+
|
54
|
+
property :extensions, [String, Array], default: [],
|
55
|
+
coerce: proc { |x| to_consistent_path_array(x) },
|
56
|
+
description: "File extensions to exclude from scanning."
|
57
|
+
|
58
|
+
property :process_paths, [String, Array], default: [],
|
59
|
+
coerce: proc { |x| to_consistent_path_array(x) },
|
60
|
+
description: "Paths to executables to exclude from scanning."
|
61
|
+
|
62
|
+
def to_consistent_path_array(x)
|
63
|
+
fixed = x.dup || []
|
64
|
+
fixed = fixed.split(/\s*,\s*/) if fixed.is_a?(String)
|
65
|
+
fixed.map!(&:downcase)
|
66
|
+
fixed.map! { |v| v.gsub(%r{/}, "\\") }
|
67
|
+
fixed
|
68
|
+
end
|
69
|
+
|
70
|
+
load_current_value do |new_resource|
|
71
|
+
Chef::Log.debug("Running 'Get-MpPreference | Select-Object ExclusionExtension,ExclusionPath,ExclusionProcess' to get Windows Defender State")
|
72
|
+
|
73
|
+
values = powershell_exec!("Get-MPpreference | Select-Object ExclusionExtension,ExclusionPath,ExclusionProcess").result
|
74
|
+
|
75
|
+
values.transform_values! { |x| Array(x) }
|
76
|
+
|
77
|
+
paths new_resource.paths & values["ExclusionPath"]
|
78
|
+
extensions new_resource.extensions & values["ExclusionExtension"]
|
79
|
+
process_paths new_resource.process_paths & values["ExclusionProcess"]
|
80
|
+
end
|
81
|
+
|
82
|
+
action :add, description: "Add an exclusion to Windows Defender." do
|
83
|
+
converge_if_changed do
|
84
|
+
powershell_exec!(add_cmd)
|
85
|
+
end
|
86
|
+
end
|
87
|
+
|
88
|
+
action :remove, description: "Remove an exclusion to Windows Defender." do
|
89
|
+
converge_if_changed do
|
90
|
+
powershell_exec!(remove_cmd)
|
91
|
+
end
|
92
|
+
end
|
93
|
+
|
94
|
+
action_class do
|
95
|
+
MAPPING = {
|
96
|
+
paths: "ExclusionPath",
|
97
|
+
extensions: "ExclusionExtension",
|
98
|
+
process_paths: "ExclusionProcess",
|
99
|
+
}.freeze
|
100
|
+
|
101
|
+
def add_cmd
|
102
|
+
cmd = "Add-MpPreference -Force"
|
103
|
+
|
104
|
+
MAPPING.each do |prop, flag|
|
105
|
+
to_add = new_resource.send(prop) - current_resource.send(prop)
|
106
|
+
cmd << " -#{flag} #{to_add.join(",")}" unless to_add.empty?
|
107
|
+
end
|
108
|
+
|
109
|
+
cmd
|
110
|
+
end
|
111
|
+
|
112
|
+
def remove_cmd
|
113
|
+
cmd = "Remove-MpPreference -Force"
|
114
|
+
|
115
|
+
MAPPING.each do |prop, flag|
|
116
|
+
to_add = new_resource.send(prop) & current_resource.send(prop)
|
117
|
+
cmd << " -#{flag} #{to_add.join(",")}" unless to_add.empty?
|
118
|
+
end
|
119
|
+
|
120
|
+
cmd
|
121
|
+
end
|
122
|
+
end
|
123
|
+
end
|
124
|
+
end
|
125
|
+
end
|