chef 17.2.29-universal-mingw32 → 17.5.22-universal-mingw32

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (173) hide show
  1. checksums.yaml +4 -4
  2. data/Gemfile +6 -5
  3. data/chef.gemspec +3 -0
  4. data/lib/chef/application/base.rb +11 -1
  5. data/lib/chef/application.rb +3 -1
  6. data/lib/chef/client.rb +2 -3
  7. data/lib/chef/compliance/default_attributes.rb +5 -3
  8. data/lib/chef/compliance/input.rb +115 -0
  9. data/lib/chef/compliance/input_collection.rb +139 -0
  10. data/lib/chef/compliance/profile.rb +122 -0
  11. data/lib/chef/compliance/profile_collection.rb +109 -0
  12. data/lib/chef/compliance/reporter/automate.rb +1 -1
  13. data/lib/chef/compliance/runner.rb +62 -6
  14. data/lib/chef/compliance/waiver.rb +115 -0
  15. data/lib/chef/compliance/waiver_collection.rb +143 -0
  16. data/lib/chef/data_bag.rb +1 -2
  17. data/lib/chef/data_bag_item.rb +1 -2
  18. data/lib/chef/deprecated.rb +10 -4
  19. data/lib/chef/dsl/compliance.rb +38 -0
  20. data/lib/chef/dsl/reader_helpers.rb +51 -0
  21. data/lib/chef/dsl/recipe.rb +4 -2
  22. data/lib/chef/dsl/render_helpers.rb +44 -0
  23. data/lib/chef/dsl/secret.rb +62 -0
  24. data/lib/chef/dsl/toml.rb +116 -0
  25. data/lib/chef/dsl/universal.rb +7 -0
  26. data/lib/chef/dsl.rb +1 -0
  27. data/lib/chef/event_dispatch/base.rb +44 -2
  28. data/lib/chef/exceptions.rb +20 -0
  29. data/lib/chef/formatters/doc.rb +60 -13
  30. data/lib/chef/formatters/error_mapper.rb +2 -2
  31. data/lib/chef/formatters/minimal.rb +6 -5
  32. data/lib/chef/handler/slow_report.rb +1 -1
  33. data/lib/chef/http/basic_client.rb +15 -7
  34. data/lib/chef/http.rb +12 -8
  35. data/lib/chef/json_compat.rb +1 -1
  36. data/lib/chef/policy_builder/policyfile.rb +88 -45
  37. data/lib/chef/provider/execute.rb +1 -1
  38. data/lib/chef/provider/file.rb +4 -2
  39. data/lib/chef/provider/group/dscl.rb +1 -1
  40. data/lib/chef/provider/launchd.rb +6 -6
  41. data/lib/chef/provider/link.rb +2 -2
  42. data/lib/chef/provider/lwrp_base.rb +1 -1
  43. data/lib/chef/provider/package/habitat.rb +168 -0
  44. data/lib/chef/provider/package/powershell.rb +5 -0
  45. data/lib/chef/provider/registry_key.rb +3 -2
  46. data/lib/chef/provider/remote_file/http.rb +1 -1
  47. data/lib/chef/provider/subversion.rb +4 -4
  48. data/lib/chef/provider/support/yum_repo.erb +1 -1
  49. data/lib/chef/provider/systemd_unit.rb +17 -16
  50. data/lib/chef/provider/template.rb +1 -1
  51. data/lib/chef/provider/user/mac.rb +3 -3
  52. data/lib/chef/provider/yum_repository.rb +27 -43
  53. data/lib/chef/provider/zypper_repository.rb +3 -3
  54. data/lib/chef/provider.rb +26 -1
  55. data/lib/chef/provider_resolver.rb +8 -2
  56. data/lib/chef/providers.rb +1 -0
  57. data/lib/chef/resource/archive_file.rb +17 -14
  58. data/lib/chef/resource/chef_client_config.rb +7 -2
  59. data/lib/chef/resource/chef_client_cron.rb +1 -1
  60. data/lib/chef/resource/chef_client_launchd.rb +1 -1
  61. data/lib/chef/resource/chef_client_scheduled_task.rb +46 -3
  62. data/lib/chef/resource/chef_client_systemd_timer.rb +1 -1
  63. data/lib/chef/resource/chef_client_trusted_certificate.rb +2 -2
  64. data/lib/chef/resource/chef_vault_secret.rb +2 -2
  65. data/lib/chef/resource/chocolatey_config.rb +13 -13
  66. data/lib/chef/resource/dsc_resource.rb +1 -1
  67. data/lib/chef/resource/execute.rb +5 -5
  68. data/lib/chef/resource/file/verification/json.rb +50 -0
  69. data/lib/chef/resource/file/verification/yaml.rb +52 -0
  70. data/lib/chef/resource/gem_package.rb +2 -1
  71. data/lib/chef/resource/habitat/_habitat_shared.rb +28 -0
  72. data/lib/chef/resource/habitat/habitat_package.rb +129 -0
  73. data/lib/chef/resource/habitat/habitat_sup.rb +329 -0
  74. data/lib/chef/resource/habitat/habitat_sup_systemd.rb +67 -0
  75. data/lib/chef/resource/habitat/habitat_sup_windows.rb +90 -0
  76. data/lib/chef/resource/habitat_config.rb +107 -0
  77. data/lib/chef/resource/habitat_install.rb +247 -0
  78. data/lib/chef/resource/habitat_service.rb +451 -0
  79. data/lib/chef/resource/habitat_user_toml.rb +92 -0
  80. data/lib/chef/resource/homebrew_cask.rb +1 -1
  81. data/lib/chef/resource/inspec_input.rb +128 -0
  82. data/lib/chef/resource/inspec_waiver.rb +185 -0
  83. data/lib/chef/resource/inspec_waiver_file_entry.rb +2 -2
  84. data/lib/chef/resource/launchd.rb +3 -3
  85. data/lib/chef/resource/lwrp_base.rb +1 -1
  86. data/lib/chef/resource/mount.rb +1 -1
  87. data/lib/chef/resource/registry_key.rb +36 -48
  88. data/lib/chef/resource/remote_file.rb +99 -3
  89. data/lib/chef/resource/rhsm_subscription.rb +5 -5
  90. data/lib/chef/resource/ruby_block.rb +100 -0
  91. data/lib/chef/resource/scm/subversion.rb +1 -1
  92. data/lib/chef/resource/support/HabService.dll.config.erb +19 -0
  93. data/lib/chef/resource/support/client.erb +8 -1
  94. data/lib/chef/resource/support/sup.toml.erb +179 -0
  95. data/lib/chef/resource/sysctl.rb +2 -2
  96. data/lib/chef/resource/systemd_unit.rb +3 -3
  97. data/lib/chef/resource/timezone.rb +2 -2
  98. data/lib/chef/resource/user_ulimit.rb +1 -0
  99. data/lib/chef/resource/windows_defender.rb +163 -0
  100. data/lib/chef/resource/windows_defender_exclusion.rb +125 -0
  101. data/lib/chef/resource/windows_printer.rb +78 -44
  102. data/lib/chef/resource/windows_printer_port.rb +1 -1
  103. data/lib/chef/resource/windows_uac.rb +3 -1
  104. data/lib/chef/resource/windows_update_settings.rb +259 -0
  105. data/lib/chef/resource/windows_user_privilege.rb +1 -1
  106. data/lib/chef/resource/yum_package.rb +1 -5
  107. data/lib/chef/resource.rb +13 -17
  108. data/lib/chef/resource_inspector.rb +6 -2
  109. data/lib/chef/resources.rb +14 -1
  110. data/lib/chef/run_context/cookbook_compiler.rb +112 -28
  111. data/lib/chef/run_context.rb +31 -1
  112. data/lib/chef/secret_fetcher/akeyless_vault.rb +57 -0
  113. data/lib/chef/secret_fetcher/aws_secrets_manager.rb +65 -0
  114. data/lib/chef/secret_fetcher/azure_key_vault.rb +78 -0
  115. data/lib/chef/secret_fetcher/base.rb +76 -0
  116. data/lib/chef/secret_fetcher/example.rb +46 -0
  117. data/lib/chef/secret_fetcher/hashi_vault.rb +100 -0
  118. data/lib/chef/secret_fetcher.rb +61 -0
  119. data/lib/chef/version.rb +1 -1
  120. data/spec/data/archive_file/test_archive.tar.gz +0 -0
  121. data/spec/functional/mixin/from_file_spec.rb +1 -1
  122. data/spec/functional/resource/archive_file_spec.rb +87 -0
  123. data/spec/functional/resource/group_spec.rb +5 -1
  124. data/spec/functional/resource/link_spec.rb +8 -0
  125. data/spec/integration/compliance/compliance_spec.rb +61 -0
  126. data/spec/integration/recipes/recipe_dsl_spec.rb +1 -1
  127. data/spec/integration/recipes/resource_action_spec.rb +6 -6
  128. data/spec/spec_helper.rb +3 -0
  129. data/spec/support/platform_helpers.rb +4 -0
  130. data/spec/support/ruby_installer.rb +51 -0
  131. data/spec/support/shared/unit/provider/file.rb +2 -8
  132. data/spec/unit/compliance/input_spec.rb +104 -0
  133. data/spec/unit/compliance/profile_spec.rb +120 -0
  134. data/spec/unit/compliance/runner_spec.rb +46 -2
  135. data/spec/unit/compliance/waiver_spec.rb +104 -0
  136. data/spec/unit/data_bag_item_spec.rb +2 -2
  137. data/spec/unit/data_bag_spec.rb +1 -1
  138. data/spec/unit/dsl/render_helpers_spec.rb +102 -0
  139. data/spec/unit/dsl/secret_spec.rb +71 -0
  140. data/spec/unit/formatters/doc_spec.rb +1 -1
  141. data/spec/unit/http/basic_client_spec.rb +30 -0
  142. data/spec/unit/http_spec.rb +8 -2
  143. data/spec/unit/policy_builder/dynamic_spec.rb +0 -5
  144. data/spec/unit/policy_builder/policyfile_spec.rb +144 -56
  145. data/spec/unit/provider/apt_update_spec.rb +3 -1
  146. data/spec/unit/provider/link_spec.rb +13 -7
  147. data/spec/unit/provider/mount/aix_spec.rb +1 -1
  148. data/spec/unit/provider/package/powershell_spec.rb +74 -12
  149. data/spec/unit/provider/remote_file/http_spec.rb +10 -0
  150. data/spec/unit/provider/template_spec.rb +2 -2
  151. data/spec/unit/provider_spec.rb +23 -0
  152. data/spec/unit/resource/archive_file_spec.rb +414 -3
  153. data/spec/unit/resource/chef_client_scheduled_task_spec.rb +69 -0
  154. data/spec/unit/resource/file/verification/json_spec.rb +72 -0
  155. data/spec/unit/resource/file/verification/yaml_spec.rb +67 -0
  156. data/spec/unit/resource/homebrew_cask_spec.rb +29 -11
  157. data/spec/unit/resource/inspec_input_spec.rb +300 -0
  158. data/spec/unit/resource/inspec_waiver_spec.rb +312 -0
  159. data/spec/unit/resource/mount_spec.rb +10 -0
  160. data/spec/unit/resource/rhsm_subscription_spec.rb +50 -3
  161. data/spec/unit/resource/systemd_unit_spec.rb +1 -1
  162. data/spec/unit/resource/user_ulimit_spec.rb +14 -1
  163. data/spec/unit/resource/windows_defender_exclusion_spec.rb +62 -0
  164. data/spec/unit/resource/windows_defender_spec.rb +71 -0
  165. data/spec/unit/resource/windows_update_settings_spec.rb +64 -0
  166. data/spec/unit/resource_spec.rb +19 -8
  167. data/spec/unit/secret_fetcher/akeyless_vault_spec.rb +37 -0
  168. data/spec/unit/secret_fetcher/aws_secrets_manager_spec.rb +70 -0
  169. data/spec/unit/secret_fetcher/azure_key_vault_spec.rb +70 -0
  170. data/spec/unit/secret_fetcher/hashi_vault_spec.rb +80 -0
  171. data/spec/unit/secret_fetcher_spec.rb +82 -0
  172. data/tasks/rspec.rb +2 -1
  173. metadata +106 -7
@@ -0,0 +1,179 @@
1
+ # sup.toml
2
+ # Used for passing configuration options to the Chef Habitat supervisor
3
+ # This file is controlled by the 'habitat' cookbook and should not be modified by hand -- local modifications may be overwritten.
4
+
5
+ ### The listen address for the Gossip Gateway
6
+ <% if @listen_gossip %>
7
+ listen_gossip = "<%= @listen_gossip %>"
8
+ <% end %>
9
+
10
+ ### Start the supervisor in local mode
11
+ # local_gossip_mode =
12
+
13
+ ### The listen address for the HTTP Gateway
14
+ <% if @listen_http %>
15
+ listen_http = "<%= @listen_http %>"
16
+ <% end %>
17
+ ### Disable the HTTP Gateway completely
18
+ # http_disable =
19
+
20
+ ### The listen address for the Control Gateway
21
+ <% if @listen_ctl %>
22
+ listen_ctl = "<%= @listen_ctl %>"
23
+ <% end %>
24
+ ### The organization the Supervisor and its services are part of
25
+ <% if @organization %>
26
+ organization = "<%= @organization %>"
27
+ <% end %>
28
+ ### The listen address of one or more initial peers (IP[:PORT])
29
+ <% if @peer %>
30
+ peer = <%= @peer %>
31
+ <% end %>
32
+ ### Make this Supervisor a permanent peer
33
+ <% if @permanent_peer %>
34
+ permanent_peer = <%= @permanent_peer %>
35
+ <% end %>
36
+ ### Watch this file for connecting to the ring
37
+ # peer_watch_file =
38
+
39
+ ### Cache for creating and searching for encryption keys
40
+ # cache_key_path =
41
+
42
+ ### The name of the ring used by the Supervisor when running with wire encryption
43
+ <% if @ring %>
44
+ ring = "<%= @ring %>"
45
+ <% end %>
46
+ ### Use the package config from this path rather than the package itself
47
+ # config_from =
48
+
49
+ ### Enable automatic updates for the Supervisor itself
50
+ <% if @auto_update %>
51
+ auto_update = <%= @auto_update %>
52
+ <% end %>
53
+ ### The period of time in seconds between Supervisor update checks
54
+ # auto_update_period =
55
+
56
+ ### The period of time in seconds between service update checks
57
+ # service_update_period =
58
+
59
+ ### The private key for HTTP Gateway TLS encryption
60
+ ###
61
+ ### Read the private key from KEY_FILE. This should be an RSA private key or PKCS8-encoded private key in PEM format.
62
+ # key_file =
63
+
64
+ ### The server certificates for HTTP Gateway TLS encryption
65
+ ###
66
+ ### Read server certificates from CERT_FILE. This should contain PEM-format certificates in the right order. The first certificate should certify KEY_FILE. The last should be a root CA.
67
+ # cert_file =
68
+
69
+ ### The CA certificate for HTTP Gateway TLS encryption
70
+ ###
71
+ ### Read the CA certificate from CA_CERT_FILE. This should contain PEM-format certificate that can be used to validate client requests
72
+ # ca_cert_file =
73
+
74
+ ### Load a Habitat package as part of the Supervisor startup
75
+ ###
76
+ ### The package can be specified by a package identifier (ex: core/redis) or filepath to a Habitat artifact (ex: /home/core-redis-3.0.7-21120102031201-x86_64-linux.hart).
77
+ # pkg_ident_or_artifact =
78
+
79
+ ### Verbose output showing file and line/column numbers
80
+ # verbose =
81
+
82
+ ### Turn ANSI color off
83
+ # no_color =
84
+
85
+ ### Use structured JSON logging for the Supervisor
86
+ ###
87
+ ### This option also sets NO_COLOR.
88
+ # json_logging =
89
+
90
+ ### The IPv4 address to use as the `sys.ip` template variable
91
+ ###
92
+ ### If this argument is not set, the supervisor tries to dynamically determine an IP address. If that fails, the supervisor defaults to using `127.0.0.1`.
93
+ # sys_ip_address =
94
+
95
+ ### The name of the application for event stream purposes
96
+ ###
97
+ ### This will be attached to all events generated by this Supervisor.
98
+ <% if @event_stream_application %>
99
+ event_stream_application = "<%= @event_stream_application %>"
100
+ <% end %>
101
+ ### The name of the environment for event stream purposes
102
+ ###
103
+ ### This will be attached to all events generated by this Supervisor.
104
+ <% if @event_stream_environment %>
105
+ event_stream_environment = "<%= @event_stream_environment %>"
106
+ <% end %>
107
+ ### Event stream connection timeout before exiting the Supervisor
108
+ ###
109
+ ### Set to '0' to immediately start the Supervisor and continue running regardless of the initial connection status.
110
+ # event_stream_connect_timeout =
111
+
112
+ ### The event stream connection url used to send events to Chef Automate
113
+ ###
114
+ ### This enables the event stream and requires EVENT_STREAM_APPLICATION, EVENT_STREAM_ENVIRONMENT, and EVENT_STREAM_TOKEN also be set.
115
+ <% if @event_stream_url %>
116
+ event_stream_url = "<%= @event_stream_url %>"
117
+ <% end %>
118
+ ### The name of the site where this Supervisor is running for event stream purposes
119
+ <% if @event_stream_site %>
120
+ event_stream_site = "<%= @event_stream_site %>"
121
+ <% end %>
122
+ ### The authentication token for connecting the event stream to Chef Automate
123
+ <% if @event_stream_token %>
124
+ event_stream_token = "<%= @event_stream_token %>"
125
+ <% end %>
126
+ ### An arbitrary key-value pair to add to each event generated by this Supervisor
127
+ # event_meta = []
128
+
129
+ ### The path to Chef Automate's event stream certificate used to establish a TLS connection
130
+ ###
131
+ ### The certificate should be in PEM format.
132
+ <% if @event_stream_server_certificate %>
133
+ event_stream_server_certificate = "<%= @event_stream_server_certificate %>"
134
+ <% end %>
135
+ ### Automatically cleanup old packages
136
+ ###
137
+ ### The Supervisor will automatically cleanup old packages only keeping the KEEP_LATEST_PACKAGES latest packages. If this argument is not specified, no automatic package cleanup is performed.
138
+ <% if @keep_latest_packages %>
139
+ keep_latest_packages = "<%= @keep_latest_packages %>"
140
+ <% end %>
141
+ ### Receive updates from the specified release channel
142
+ # channel =
143
+
144
+ ### Specify an alternate Builder endpoint. If not specified, the value will be taken from the HAB_BLDR_URL environment variable if defined. (default: https://bldr.habitat.sh)
145
+ <% if @bldr_url %>
146
+ bldr_url = "<%= @bldr_url %>"
147
+ <% end %>
148
+ ### The service group with shared config and topology
149
+ # group =
150
+
151
+ ### Service topology
152
+ # topology =
153
+
154
+ ### The update strategy
155
+ # strategy =
156
+
157
+ ### The condition dictating when this service should update
158
+ ###
159
+ ### latest: Runs the latest package that can be found in the configured channel and local packages.
160
+ ###
161
+ ### track-channel: Always run what is at the head of a given channel. This enables service rollback where demoting a package from a channel will cause the package to rollback to an older version of the package. A ramification of enabling this condition is packages newer than the package at the head of the channel will be automatically uninstalled during a service rollback.
162
+ <% if @update_condition %>
163
+ update_condition = "<%= @update_condition %>"
164
+ <% end %>
165
+ ### One or more service groups to bind to a configuration
166
+ # bind = []
167
+
168
+ ### Governs how the presence or absence of binds affects service startup
169
+ ###
170
+ ### strict: blocks startup until all binds are present.
171
+ # binding_mode =
172
+
173
+ ### The interval in seconds on which to run health checks
174
+ # health_check_interval =
175
+
176
+ ### The delay in seconds after sending the shutdown signal to wait before killing the service process
177
+ ###
178
+ ### The default value can be set in the packages plan file.
179
+ # shutdown_timeout =
@@ -131,7 +131,7 @@ class Chef
131
131
 
132
132
  end
133
133
 
134
- action :apply, description: "Apply a sysctl value." do
134
+ action :apply, description: "Set the kernel parameter and update the `sysctl` settings." do
135
135
  converge_if_changed do
136
136
  # set it temporarily
137
137
  set_sysctl_param(new_resource.key, new_resource.value)
@@ -150,7 +150,7 @@ class Chef
150
150
  end
151
151
  end
152
152
 
153
- action :remove, description: "Remove a sysctl value." do
153
+ action :remove, description: "Remove the kernel parameter and update the `sysctl` settings." do
154
154
  # only converge the resource if the file actually exists to delete
155
155
  if ::File.exist?("#{new_resource.conf_dir}/99-chef-#{new_resource.key.tr("/", ".")}.conf")
156
156
  converge_by "removing sysctl config at #{new_resource.conf_dir}/99-chef-#{new_resource.key.tr("/", ".")}.conf" do
@@ -34,7 +34,7 @@ class Chef
34
34
 
35
35
  ```ruby
36
36
  systemd_unit 'etcd.service' do
37
- content(Unit: {
37
+ content({ Unit: {
38
38
  Description: 'Etcd',
39
39
  Documentation: ['https://coreos.com/etcd', 'man:etcd(1)'],
40
40
  After: 'network.target',
@@ -46,7 +46,7 @@ class Chef
46
46
  },
47
47
  Install: {
48
48
  WantedBy: 'multi-user.target',
49
- })
49
+ } })
50
50
  action [:create, :enable]
51
51
  end
52
52
  ```
@@ -113,7 +113,7 @@ class Chef
113
113
  when Hash
114
114
  IniParse.gen do |doc|
115
115
  content.each_pair do |sect, opts|
116
- doc.section(sect) do |section|
116
+ doc.section(sect, { option_sep: "=" }) do |section|
117
117
  opts.each_pair do |opt, val|
118
118
  [val].flatten.each do |v|
119
119
  section.option(opt, v)
@@ -38,7 +38,7 @@ class Chef
38
38
  **Set the timezone to America/Los_Angeles with a friendly resource name on Linux/macOS**
39
39
 
40
40
  ```ruby
41
- timezone 'Set the host's timezone to America/Los_Angeles' do
41
+ timezone "Set the host's timezone to America/Los_Angeles" do
42
42
  timezone 'America/Los_Angeles'
43
43
  end
44
44
  ```
@@ -46,7 +46,7 @@ class Chef
46
46
  **Set the timezone to PST with a friendly resource name on Windows**
47
47
 
48
48
  ```ruby
49
- timezone 'Set the host's timezone to PST' do
49
+ timezone "Set the host's timezone to PST" do
50
50
  timezone 'Pacific Standard time'
51
51
  end
52
52
  ```
@@ -83,6 +83,7 @@ class Chef
83
83
  source ::File.expand_path("support/ulimit.erb", __dir__)
84
84
  local true
85
85
  mode "0644"
86
+ sensitive new_resource.sensitive
86
87
  variables(
87
88
  ulimit_user: new_resource.username,
88
89
  filehandle_limit: new_resource.filehandle_limit,
@@ -0,0 +1,163 @@
1
+ #
2
+ # Copyright:: Chef Software, Inc.
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+
17
+ require_relative "../resource"
18
+
19
+ class Chef
20
+ class Resource
21
+ class WindowsDefender < Chef::Resource
22
+ unified_mode true
23
+ provides :windows_defender
24
+
25
+ description "Use the **windows_defender** resource to enable or disable the Microsoft Windows Defender service."
26
+ introduced "17.3"
27
+ examples <<~DOC
28
+ **Configure Windows Defender AV settings**:
29
+
30
+ ```ruby
31
+ windows_defender 'Configure Defender' do
32
+ realtime_protection true
33
+ intrusion_protection_system true
34
+ lock_ui true
35
+ scan_archives true
36
+ scan_scripts true
37
+ scan_email true
38
+ scan_removable_drives true
39
+ scan_network_files false
40
+ scan_mapped_drives false
41
+ action :enable
42
+ end
43
+ ```
44
+
45
+ **Disable Windows Defender AV**:
46
+
47
+ ```ruby
48
+ windows_defender 'Disable Defender' do
49
+ action :disable
50
+ end
51
+ ```
52
+ DOC
53
+
54
+ # DisableIOAVProtection
55
+ property :realtime_protection, [true, false],
56
+ default: true,
57
+ description: "Enable realtime scanning of downloaded files and attachments."
58
+
59
+ # DisableIntrusionPreventionSystem
60
+ property :intrusion_protection_system, [true, false],
61
+ default: true,
62
+ description: "Enable network protection against exploitation of known vulnerabilities."
63
+
64
+ # UILockdown
65
+ property :lock_ui, [true, false],
66
+ description: "Lock the UI to prevent users from changing Windows Defender settings.",
67
+ default: false
68
+
69
+ # DisableArchiveScanning
70
+ property :scan_archives, [true, false],
71
+ default: true,
72
+ description: "Scan file archives such as .zip or .gz archives."
73
+
74
+ # DisableScriptScanning
75
+ property :scan_scripts, [true, false],
76
+ default: false,
77
+ description: "Scan scripts in malware scans."
78
+
79
+ # DisableEmailScanning
80
+ property :scan_email, [true, false],
81
+ default: false,
82
+ description: "Scan e-mails for malware."
83
+
84
+ # DisableRemovableDriveScanning
85
+ property :scan_removable_drives, [true, false],
86
+ default: false,
87
+ description: "Scan content of removable drives."
88
+
89
+ # DisableScanningNetworkFiles
90
+ property :scan_network_files, [true, false],
91
+ default: false,
92
+ description: "Scan files on a network."
93
+
94
+ # DisableScanningMappedNetworkDrivesForFullScan
95
+ property :scan_mapped_drives, [true, false],
96
+ default: true,
97
+ description: "Scan files on mapped network drives."
98
+
99
+ load_current_value do
100
+ values = powershell_exec!("Get-MPpreference").result
101
+
102
+ lock_ui values["UILockdown"]
103
+ realtime_protection !values["DisableIOAVProtection"]
104
+ intrusion_protection_system !values["DisableIntrusionPreventionSystem"]
105
+ scan_archives !values["DisableArchiveScanning"]
106
+ scan_scripts !values["DisableScriptScanning"]
107
+ scan_email !values["DisableEmailScanning"]
108
+ scan_removable_drives !values["DisableRemovableDriveScanning"]
109
+ scan_network_files !values["DisableScanningNetworkFiles"]
110
+ scan_mapped_drives !values["DisableScanningMappedNetworkDrivesForFullScan"]
111
+ end
112
+
113
+ action :enable, description: "Enable and configure Windows Defender." do
114
+ windows_service "Windows Defender" do
115
+ service_name "WinDefend"
116
+ action %i{start enable}
117
+ startup_type :automatic
118
+ end
119
+
120
+ converge_if_changed do
121
+ powershell_exec!(set_mppreference_cmd)
122
+ end
123
+ end
124
+
125
+ action :disable, description: "Disable Windows Defender." do
126
+ windows_service "Windows Defender" do
127
+ service_name "WinDefend"
128
+ action %i{disable stop}
129
+ end
130
+ end
131
+
132
+ action_class do
133
+ require "chef/mixin/powershell_type_coercions"
134
+ include Chef::Mixin::PowershellTypeCoercions
135
+
136
+ PROPERTY_TO_PS_MAP = {
137
+ realtime_protection: "DisableIOAVProtection",
138
+ intrusion_protection_system: "DisableIntrusionPreventionSystem",
139
+ scan_archives: "DisableArchiveScanning",
140
+ scan_scripts: "DisableScriptScanning",
141
+ scan_email: "DisableEmailScanning",
142
+ scan_removable_drives: "DisableRemovableDriveScanning",
143
+ scan_network_files: "DisableScanningNetworkFiles",
144
+ scan_mapped_drives: "DisableScanningMappedNetworkDrivesForFullScan",
145
+ }.freeze
146
+
147
+ def set_mppreference_cmd
148
+ cmd = "Set-MpPreference -Force"
149
+ cmd << " -UILockdown #{type_coercion(new_resource.lock_ui)}"
150
+
151
+ # the values are the opposite in Set-MpPreference and our properties so we have to iterate
152
+ # over the list and negate the provided values so it makes sense with the cmdlet flag's expected value
153
+ PROPERTY_TO_PS_MAP.each do |prop, flag|
154
+ next if new_resource.send(prop).nil? || current_resource.send(prop) == new_resource.send(prop)
155
+
156
+ cmd << " -#{flag} #{type_coercion(!new_resource.send(prop))}"
157
+ end
158
+ cmd
159
+ end
160
+ end
161
+ end
162
+ end
163
+ end
@@ -0,0 +1,125 @@
1
+ #
2
+ # Copyright:: Chef Software, Inc.
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+
17
+ require_relative "../resource"
18
+
19
+ class Chef
20
+ class Resource
21
+ class WindowsDefenderExclusion < Chef::Resource
22
+
23
+ provides :windows_defender_exclusion
24
+
25
+ description "Use the **windows_defender_exclusion** resource to exclude paths, processes, or file types from Windows Defender realtime protection scanning."
26
+ introduced "17.3"
27
+ examples <<~DOC
28
+ **Add excluded items to Windows Defender scans**:
29
+
30
+ ```ruby
31
+ windows_defender_exclusion 'Add to things to be excluded from scanning' do
32
+ paths 'c:\\foo\\bar, d:\\bar\\baz'
33
+ extensions 'png, foo, ppt, doc'
34
+ process_paths 'c:\\windows\\system32'
35
+ action :add
36
+ end
37
+ ```
38
+
39
+ **Remove excluded items from Windows Defender scans**:
40
+
41
+ ```ruby
42
+ windows_defender_exclusion 'Remove things from the list to be excluded' do
43
+ process_paths 'c:\\windows\\system32'
44
+ action :remove
45
+ end
46
+ ```
47
+ DOC
48
+ unified_mode true
49
+
50
+ property :paths, [String, Array], default: [],
51
+ coerce: proc { |x| to_consistent_path_array(x) },
52
+ description: "File or directory paths to exclude from scanning."
53
+
54
+ property :extensions, [String, Array], default: [],
55
+ coerce: proc { |x| to_consistent_path_array(x) },
56
+ description: "File extensions to exclude from scanning."
57
+
58
+ property :process_paths, [String, Array], default: [],
59
+ coerce: proc { |x| to_consistent_path_array(x) },
60
+ description: "Paths to executables to exclude from scanning."
61
+
62
+ def to_consistent_path_array(x)
63
+ fixed = x.dup || []
64
+ fixed = fixed.split(/\s*,\s*/) if fixed.is_a?(String)
65
+ fixed.map!(&:downcase)
66
+ fixed.map! { |v| v.gsub(%r{/}, "\\") }
67
+ fixed
68
+ end
69
+
70
+ load_current_value do |new_resource|
71
+ Chef::Log.debug("Running 'Get-MpPreference | Select-Object ExclusionExtension,ExclusionPath,ExclusionProcess' to get Windows Defender State")
72
+
73
+ values = powershell_exec!("Get-MPpreference | Select-Object ExclusionExtension,ExclusionPath,ExclusionProcess").result
74
+
75
+ values.transform_values! { |x| Array(x) }
76
+
77
+ paths new_resource.paths & values["ExclusionPath"]
78
+ extensions new_resource.extensions & values["ExclusionExtension"]
79
+ process_paths new_resource.process_paths & values["ExclusionProcess"]
80
+ end
81
+
82
+ action :add, description: "Add an exclusion to Windows Defender." do
83
+ converge_if_changed do
84
+ powershell_exec!(add_cmd)
85
+ end
86
+ end
87
+
88
+ action :remove, description: "Remove an exclusion to Windows Defender." do
89
+ converge_if_changed do
90
+ powershell_exec!(remove_cmd)
91
+ end
92
+ end
93
+
94
+ action_class do
95
+ MAPPING = {
96
+ paths: "ExclusionPath",
97
+ extensions: "ExclusionExtension",
98
+ process_paths: "ExclusionProcess",
99
+ }.freeze
100
+
101
+ def add_cmd
102
+ cmd = "Add-MpPreference -Force"
103
+
104
+ MAPPING.each do |prop, flag|
105
+ to_add = new_resource.send(prop) - current_resource.send(prop)
106
+ cmd << " -#{flag} #{to_add.join(",")}" unless to_add.empty?
107
+ end
108
+
109
+ cmd
110
+ end
111
+
112
+ def remove_cmd
113
+ cmd = "Remove-MpPreference -Force"
114
+
115
+ MAPPING.each do |prop, flag|
116
+ to_add = new_resource.send(prop) & current_resource.send(prop)
117
+ cmd << " -#{flag} #{to_add.join(",")}" unless to_add.empty?
118
+ end
119
+
120
+ cmd
121
+ end
122
+ end
123
+ end
124
+ end
125
+ end