inspec-core 4.23.15 → 4.25.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (100) hide show
  1. checksums.yaml +4 -4
  2. data/Gemfile +21 -35
  3. data/inspec-core.gemspec +8 -9
  4. data/lib/bundles/inspec-supermarket/api.rb +2 -2
  5. data/lib/bundles/inspec-supermarket/target.rb +1 -1
  6. data/lib/inspec/archive/tar.rb +1 -1
  7. data/lib/inspec/archive/zip.rb +3 -3
  8. data/lib/inspec/base_cli.rb +2 -2
  9. data/lib/inspec/cached_fetcher.rb +1 -1
  10. data/lib/inspec/cli.rb +1 -1
  11. data/lib/inspec/config.rb +5 -5
  12. data/lib/inspec/dependencies/cache.rb +1 -1
  13. data/lib/inspec/env_printer.rb +2 -2
  14. data/lib/inspec/fetcher/git.rb +3 -3
  15. data/lib/inspec/fetcher/local.rb +1 -1
  16. data/lib/inspec/fetcher/url.rb +4 -4
  17. data/lib/inspec/file_provider.rb +4 -4
  18. data/lib/inspec/formatters/base.rb +16 -0
  19. data/lib/inspec/globals.rb +8 -2
  20. data/lib/inspec/input.rb +3 -0
  21. data/lib/inspec/input_registry.rb +5 -3
  22. data/lib/inspec/metadata.rb +1 -1
  23. data/lib/inspec/plugin/v1/plugins.rb +2 -2
  24. data/lib/inspec/plugin/v2.rb +5 -0
  25. data/lib/inspec/plugin/v2/config_file.rb +1 -1
  26. data/lib/inspec/plugin/v2/filter.rb +2 -2
  27. data/lib/inspec/plugin/v2/installer.rb +5 -5
  28. data/lib/inspec/plugin/v2/loader.rb +6 -1
  29. data/lib/inspec/plugin/v2/registry.rb +2 -2
  30. data/lib/inspec/profile.rb +3 -3
  31. data/lib/inspec/profile_context.rb +1 -1
  32. data/lib/inspec/reporters/automate.rb +2 -2
  33. data/lib/inspec/reporters/json.rb +3 -1
  34. data/lib/inspec/reporters/json_automate.rb +1 -1
  35. data/lib/inspec/resource.rb +2 -0
  36. data/lib/inspec/resources.rb +5 -5
  37. data/lib/inspec/resources/apt.rb +1 -1
  38. data/lib/inspec/resources/auditd.rb +1 -1
  39. data/lib/inspec/resources/csv.rb +1 -1
  40. data/lib/inspec/resources/dh_params.rb +1 -1
  41. data/lib/inspec/resources/file.rb +1 -1
  42. data/lib/inspec/resources/grub_conf.rb +2 -1
  43. data/lib/inspec/resources/http.rb +1 -1
  44. data/lib/inspec/resources/iis_website.rb +1 -1
  45. data/lib/inspec/resources/interfaces.rb +1 -1
  46. data/lib/inspec/resources/json.rb +2 -2
  47. data/lib/inspec/resources/key_rsa.rb +1 -1
  48. data/lib/inspec/resources/mssql_session.rb +5 -1
  49. data/lib/inspec/resources/mysql_session.rb +1 -1
  50. data/lib/inspec/resources/nginx.rb +1 -1
  51. data/lib/inspec/resources/nginx_conf.rb +1 -1
  52. data/lib/inspec/resources/npm.rb +1 -1
  53. data/lib/inspec/resources/oracledb_session.rb +1 -1
  54. data/lib/inspec/resources/package.rb +1 -1
  55. data/lib/inspec/resources/parse_config.rb +5 -2
  56. data/lib/inspec/resources/platform.rb +11 -1
  57. data/lib/inspec/resources/port.rb +1 -1
  58. data/lib/inspec/resources/postgres_session.rb +1 -1
  59. data/lib/inspec/resources/ppa.rb +1 -1
  60. data/lib/inspec/resources/processes.rb +1 -1
  61. data/lib/inspec/resources/rabbitmq_conf.rb +1 -1
  62. data/lib/inspec/resources/registry_key.rb +1 -1
  63. data/lib/inspec/resources/ssh_config.rb +24 -2
  64. data/lib/inspec/resources/sshd_config.rb +1 -1
  65. data/lib/inspec/resources/ssl.rb +2 -2
  66. data/lib/inspec/resources/toml.rb +1 -1
  67. data/lib/inspec/resources/vbscript.rb +1 -1
  68. data/lib/inspec/resources/windows_registry_key.rb +1 -1
  69. data/lib/inspec/resources/wmi.rb +16 -8
  70. data/lib/inspec/resources/x509_certificate.rb +1 -1
  71. data/lib/inspec/resources/xml.rb +1 -1
  72. data/lib/inspec/run_data.rb +1 -1
  73. data/lib/inspec/run_data/result.rb +2 -0
  74. data/lib/inspec/runner.rb +2 -2
  75. data/lib/inspec/schema.rb +3 -1
  76. data/lib/inspec/schema/output_schema.rb +1 -1
  77. data/lib/inspec/schema/primitives.rb +1 -1
  78. data/lib/inspec/shell_detector.rb +2 -2
  79. data/lib/inspec/utils/command_wrapper.rb +1 -1
  80. data/lib/inspec/utils/deprecation/config_file.rb +2 -2
  81. data/lib/inspec/utils/json_log.rb +1 -1
  82. data/lib/inspec/utils/run_data_filters.rb +7 -5
  83. data/lib/inspec/utils/telemetry/collector.rb +1 -1
  84. data/lib/inspec/utils/telemetry/data_series.rb +1 -1
  85. data/lib/inspec/version.rb +1 -1
  86. data/lib/plugins/inspec-artifact/lib/inspec-artifact/base.rb +5 -5
  87. data/lib/plugins/inspec-compliance/README.md +1 -1
  88. data/lib/plugins/inspec-compliance/lib/inspec-compliance/api.rb +3 -3
  89. data/lib/plugins/inspec-compliance/lib/inspec-compliance/http.rb +2 -2
  90. data/lib/plugins/inspec-compliance/lib/inspec-compliance/target.rb +2 -2
  91. data/lib/plugins/inspec-habitat/lib/inspec-habitat/profile.rb +3 -3
  92. data/lib/plugins/inspec-init/lib/inspec-init/cli.rb +1 -1
  93. data/lib/plugins/inspec-init/lib/inspec-init/cli_profile.rb +1 -1
  94. data/lib/plugins/inspec-init/lib/inspec-init/renderer.rb +2 -2
  95. data/lib/plugins/inspec-plugin-manager-cli/lib/inspec-plugin-manager-cli/cli_command.rb +3 -3
  96. data/lib/plugins/inspec-reporter-html2/lib/inspec-reporter-html2/reporter.rb +1 -1
  97. data/lib/plugins/inspec-reporter-json-min/lib/inspec-reporter-json-min/reporter.rb +1 -1
  98. data/lib/plugins/inspec-reporter-junit/lib/inspec-reporter-junit/reporter.rb +1 -1
  99. data/lib/plugins/shared/core_plugin_test_helper.rb +6 -6
  100. metadata +47 -43
@@ -50,6 +50,11 @@ module Inspec::Plugin::V2
50
50
  # we want to allow "sidecar loading", in which case a plugin may add an entry to the registry.
51
51
  registry.plugin_names.dup.each do |plugin_name|
52
52
  plugin_details = registry[plugin_name]
53
+
54
+ # Under some conditions (kitchen-inspec with multiple test suites, for example), this may be
55
+ # called multple times. Don't reload anything.
56
+ next if plugin_details.loaded
57
+
53
58
  # We want to capture literally any possible exception here, since we are storing them.
54
59
  # rubocop: disable Lint/RescueException
55
60
  begin
@@ -125,7 +130,7 @@ module Inspec::Plugin::V2
125
130
  end
126
131
 
127
132
  def self.plugin_gem_path
128
- require "rbconfig"
133
+ require "rbconfig" unless defined?(RbConfig)
129
134
  ruby_abi_version = RbConfig::CONFIG["ruby_version"]
130
135
  # TODO: why are we installing under the api directory for plugins?
131
136
  base_dir = Inspec.config_dir
@@ -1,5 +1,5 @@
1
- require "forwardable"
2
- require "singleton"
1
+ require "forwardable" unless defined?(Forwardable)
2
+ require "singleton" unless defined?(Singleton)
3
3
  require "train"
4
4
 
5
5
  require_relative "status"
@@ -1,8 +1,8 @@
1
1
  # Copyright 2015 Dominik Richter
2
2
 
3
- require "forwardable"
4
- require "openssl"
5
- require "pathname"
3
+ require "forwardable" unless defined?(Forwardable)
4
+ require "openssl" unless defined?(OpenSSL)
5
+ require "pathname" unless defined?(Pathname)
6
6
  require "inspec/input_registry"
7
7
  require "inspec/cached_fetcher" # TODO: split or rename
8
8
  require "inspec/source_reader"
@@ -4,7 +4,7 @@ require "inspec/resource"
4
4
  require "inspec/library_eval_context"
5
5
  require "inspec/control_eval_context"
6
6
  require "inspec/require_loader"
7
- require "securerandom"
7
+ require "securerandom" unless defined?(SecureRandom)
8
8
  require "inspec/input_registry"
9
9
 
10
10
  module Inspec
@@ -1,5 +1,5 @@
1
- require "json"
2
- require "net/http"
1
+ require "json" unless defined?(JSON)
2
+ require "net/http" unless defined?(Net::HTTP)
3
3
 
4
4
  module Inspec::Reporters
5
5
  class Automate < JsonAutomate
@@ -1,4 +1,4 @@
1
- require "json"
1
+ require "json" unless defined?(JSON)
2
2
 
3
3
  module Inspec::Reporters
4
4
  # rubocop:disable Layout/AlignHash, Style/BlockDelimiters
@@ -40,6 +40,8 @@ module Inspec::Reporters
40
40
  message: r[:message],
41
41
  exception: r[:exception],
42
42
  backtrace: r[:backtrace],
43
+ resource_class: r[:resource_class],
44
+ resource_params: r[:resource_params].to_s,
43
45
  }.reject { |_k, v| v.nil? }
44
46
  }
45
47
  end
@@ -1,4 +1,4 @@
1
- require "json"
1
+ require "json" unless defined?(JSON)
2
2
 
3
3
  module Inspec::Reporters
4
4
  class JsonAutomate < Json
@@ -108,6 +108,7 @@ module Inspec
108
108
  # Infrastructure / Bookkeeping
109
109
 
110
110
  def self.__register(name, resource_klass)
111
+ # This has bitten us and should be a great candidate to remove in InSpec5
111
112
  cl = Class.new(resource_klass) do # TODO: remove
112
113
  # As best I can figure out, this anonymous class only exists
113
114
  # because we're trying to avoid having resources with
@@ -116,6 +117,7 @@ module Inspec
116
117
  # documentation.
117
118
  def initialize(backend, name, *args)
118
119
  supersuper_initialize(backend, name) do
120
+ @resource_params = args
119
121
  super(*args)
120
122
  end
121
123
  end
@@ -16,11 +16,11 @@ inspec_core_only = ENV["NO_AWS"] || !File.exist?(File.join(File.dirname(__FILE__
16
16
  # Do not attempt to load cloud resources if we are in inspec-core mode
17
17
  unless inspec_core_only
18
18
  require "resource_support/aws"
19
- require "resources/azure/azure_backend.rb"
20
- require "resources/azure/azure_generic_resource.rb"
21
- require "resources/azure/azure_resource_group.rb"
22
- require "resources/azure/azure_virtual_machine.rb"
23
- require "resources/azure/azure_virtual_machine_data_disk.rb"
19
+ require "resources/azure/azure_backend"
20
+ require "resources/azure/azure_generic_resource"
21
+ require "resources/azure/azure_resource_group"
22
+ require "resources/azure/azure_virtual_machine"
23
+ require "resources/azure/azure_virtual_machine_data_disk"
24
24
  end
25
25
 
26
26
  require "inspec/resources/aide_conf"
@@ -24,7 +24,7 @@ require "inspec/resources/command"
24
24
  # apt-get install software-properties-common
25
25
  # add-apt-repository ppa:ubuntu-wine/ppa
26
26
 
27
- require "uri"
27
+ require "uri" unless defined?(URI)
28
28
 
29
29
  module Inspec::Resources
30
30
  class AptRepository < Inspec.resource(1)
@@ -1,4 +1,4 @@
1
- require "forwardable"
1
+ require "forwardable" unless defined?(Forwardable)
2
2
  require "inspec/utils/filter_array"
3
3
  require "inspec/utils/filter"
4
4
  require "inspec/utils/parser"
@@ -20,7 +20,7 @@ module Inspec::Resources
20
20
  # { 'name' => 'row2', 'col1' => 'value3', 'col2' => 'value4' }
21
21
  # ]
22
22
  def parse(content)
23
- require "csv"
23
+ require "csv" unless defined?(CSV)
24
24
 
25
25
  # convert empty field to nil
26
26
  CSV::Converters[:blank_to_nil] = lambda do |field|
@@ -1,4 +1,4 @@
1
- require "openssl"
1
+ require "openssl" unless defined?(OpenSSL)
2
2
  require "inspec/utils/file_reader"
3
3
 
4
4
  module Inspec::Resources
@@ -1,6 +1,6 @@
1
1
  # copyright: 2015, Vulcano Security GmbH
2
2
 
3
- require "shellwords"
3
+ require "shellwords" unless defined?(Shellwords)
4
4
  require "inspec/utils/parser"
5
5
 
6
6
  module Inspec::Resources
@@ -29,7 +29,7 @@ module Inspec::Resources
29
29
  @content = read_file(@conf_path)
30
30
  @kernel = kernel || "default"
31
31
  rescue UnknownGrubConfig
32
- skip_resource "The `grub_config` resource is not supported on your OS yet."
32
+ skip_resource "The `grub_conf` resource is not yet supported on the target OS #{inspec.os[:name]}."
33
33
  end
34
34
 
35
35
  def config_for_platform(path)
@@ -77,6 +77,7 @@ module Inspec::Resources
77
77
 
78
78
  def grub2_parse_kernel_lines(content, conf)
79
79
  menu_entries = extract_menu_entries(content)
80
+ return {} if menu_entries.empty?
80
81
 
81
82
  if @kernel == "default"
82
83
  default_menu_entry(menu_entries, conf["GRUB_DEFAULT"])
@@ -3,7 +3,7 @@
3
3
  # license: Apache v2
4
4
 
5
5
  require "inspec/resources/command"
6
- require "faraday"
6
+ require "faraday" unless defined?(Faraday)
7
7
  require "faraday_middleware"
8
8
  require "hashie"
9
9
 
@@ -1,2 +1,2 @@
1
1
  # This is just here to make the dynamic loader happy.
2
- require "inspec/resources/iis_website.rb"
2
+ require "inspec/resources/iis_website"
@@ -24,7 +24,7 @@ module Inspec::Resources
24
24
  .install_filter_methods_on_resource(self, :scan_interfaces)
25
25
 
26
26
  def ipv4_address
27
- require "ipaddr"
27
+ require "ipaddr" unless defined?(IPAddr)
28
28
 
29
29
  # Loop over interface names
30
30
  # Select those that are up and have an ipv4 address
@@ -48,7 +48,7 @@ module Inspec::Resources
48
48
  # @return [Object] the value stored at this position
49
49
  def method_missing(*keys)
50
50
  # catch bahavior of rspec its implementation
51
- # @see https://github.com/rspec/rspec-its/blob/master/lib/rspec/its.rb#L110
51
+ # @see https://github.com/rspec/rspec-its/blob/v1.2.0/lib/rspec/its.rb#L110
52
52
  keys.shift if keys.is_a?(Array) && keys[0] == :[]
53
53
  value(keys)
54
54
  end
@@ -66,7 +66,7 @@ module Inspec::Resources
66
66
  private
67
67
 
68
68
  def parse(content)
69
- require "json"
69
+ require "json" unless defined?(JSON)
70
70
  JSON.parse(content)
71
71
  rescue => e
72
72
  raise Inspec::Exceptions::ResourceFailed, "Unable to parse JSON: #{e.message}"
@@ -1,4 +1,4 @@
1
- require "openssl"
1
+ require "openssl" unless defined?(OpenSSL)
2
2
  require "hashie/mash"
3
3
  require "inspec/utils/file_reader"
4
4
  require "inspec/utils/pkey_reader"
@@ -12,6 +12,10 @@ module Inspec::Resources
12
12
  class MssqlSession < Inspec.resource(1)
13
13
  name "mssql_session"
14
14
  supports platform: "windows"
15
+ supports platform: "darwin"
16
+ supports platform: "debian"
17
+ supports platform: "redhat"
18
+ supports platform: "suse"
15
19
  desc "Use the mssql_session InSpec audit resource to test SQL commands run against a MS Sql Server database."
16
20
  example <<~EXAMPLE
17
21
  # Using SQL authentication
@@ -95,7 +99,7 @@ module Inspec::Resources
95
99
  end
96
100
 
97
101
  def parse_csv_result(cmd)
98
- require "csv"
102
+ require "csv" unless defined?(CSV)
99
103
  table = CSV.parse(cmd.stdout, headers: true)
100
104
 
101
105
  # remove first row, since it will be a seperator line
@@ -1,7 +1,7 @@
1
1
  # copyright: 2015, Vulcano Security GmbH
2
2
 
3
3
  require "inspec/resources/command"
4
- require "shellwords"
4
+ require "shellwords" unless defined?(Shellwords)
5
5
 
6
6
  module Inspec::Resources
7
7
  class Lines
@@ -1,4 +1,4 @@
1
- require "pathname"
1
+ require "pathname" unless defined?(Pathname)
2
2
  require "hashie/mash"
3
3
  require "inspec/resources/command"
4
4
 
@@ -1,7 +1,7 @@
1
1
  require "inspec/utils/nginx_parser"
2
2
  require "inspec/utils/find_files"
3
3
  require "inspec/utils/file_reader"
4
- require "forwardable"
4
+ require "forwardable" unless defined?(Forwardable)
5
5
 
6
6
  # STABILITY: Experimental
7
7
  # This resouce needs a proper interace to the underlying data, which is currently missing.
@@ -1,5 +1,5 @@
1
1
  require "inspec/resources/command"
2
- require "shellwords"
2
+ require "shellwords" unless defined?(Shellwords)
3
3
 
4
4
  module Inspec::Resources
5
5
  class NpmPackage < Inspec.resource(1)
@@ -1,7 +1,7 @@
1
1
  require "inspec/resources/command"
2
2
  require "inspec/utils/database_helpers"
3
3
  require "hashie/mash"
4
- require "csv"
4
+ require "csv" unless defined?(CSV)
5
5
 
6
6
  module Inspec::Resources
7
7
  # STABILITY: Experimental
@@ -314,7 +314,7 @@ module Inspec::Resources
314
314
  # Find the package
315
315
  cmd = inspec.command <<-EOF.gsub(/^\s*/, "")
316
316
  Get-ItemProperty (@("#{search_paths.join('", "')}") | Where-Object { Test-Path $_ }) |
317
- Where-Object { $_.DisplayName -match "^\s*#{package_name.shellescape}\.*" -or $_.PSChildName -match "^\s*#{package_name.shellescape}\.*" } |
317
+ Where-Object { $_.DisplayName -like "#{package_name}" -or $_.PSChildName -like "#{package_name}" } |
318
318
  Select-Object -Property DisplayName,DisplayVersion | ConvertTo-Json
319
319
  EOF
320
320
 
@@ -55,8 +55,11 @@ module Inspec::Resources
55
55
  read_params unless @content.nil?
56
56
  end
57
57
 
58
- def method_missing(name)
59
- read_params[name.to_s]
58
+ def method_missing(*name)
59
+ # catch bahavior of rspec its implementation
60
+ # @see https://github.com/rspec/rspec-its/blob/v1.2.0/lib/rspec/its.rb#L110
61
+ name.shift if name.is_a?(Array) && name[0] == :[]
62
+ read_params[name[0].to_s]
60
63
  end
61
64
 
62
65
  def params(*opts)
@@ -81,7 +81,7 @@ module Inspec::Resources
81
81
  when :os, :platform then
82
82
  platform?(v)
83
83
  when :os_name, :platform_name then
84
- name == v
84
+ check_name(v)
85
85
  when :release then
86
86
  check_release(v)
87
87
  end
@@ -99,6 +99,16 @@ module Inspec::Resources
99
99
 
100
100
  private
101
101
 
102
+ def check_name(value)
103
+ # allow wild card matching
104
+ if value.include?("*")
105
+ cleaned = Regexp.escape(value).gsub('\*', ".*?")
106
+ name =~ /#{cleaned}/
107
+ else
108
+ name == value
109
+ end
110
+ end
111
+
102
112
  def check_release(value)
103
113
  # allow wild card matching
104
114
  if value.include?("*")
@@ -1,6 +1,6 @@
1
1
  require "inspec/utils/parser"
2
2
  require "inspec/utils/filter"
3
- require "ipaddr"
3
+ require "ipaddr" unless defined?(IPAddr)
4
4
 
5
5
  # TODO: currently we return local ip only
6
6
  # TODO: improve handling of same port on multiple interfaces
@@ -1,6 +1,6 @@
1
1
  # copyright: 2015, Vulcano Security GmbH
2
2
 
3
- require "shellwords"
3
+ require "shellwords" unless defined?(Shellwords)
4
4
 
5
5
  module Inspec::Resources
6
6
  class Lines
@@ -1,2 +1,2 @@
1
1
  # This is just here to make the dynamic loader happy.
2
- require "inspec/resources/apt.rb"
2
+ require "inspec/resources/apt"
@@ -1,7 +1,7 @@
1
1
  # copyright: 2015, Vulcano Security GmbH
2
2
 
3
3
  require "inspec/utils/filter"
4
- require "ostruct"
4
+ require "ostruct" unless defined?(OpenStruct)
5
5
  require "inspec/resources/command"
6
6
 
7
7
  module Inspec::Resources
@@ -1,2 +1,2 @@
1
1
  # This is just here to make the dynamic loader happy.
2
- require "inspec/resources/rabbitmq_config.rb"
2
+ require "inspec/resources/rabbitmq_config"
@@ -1,6 +1,6 @@
1
1
  # copyright: 2015, Vulcano Security GmbH
2
2
 
3
- require "json"
3
+ require "json" unless defined?(JSON)
4
4
  require "inspec/resources/powershell"
5
5
 
6
6
  # Three constructor methods are available:
@@ -7,6 +7,7 @@ module Inspec::Resources
7
7
  class SshConfig < Inspec.resource(1)
8
8
  name "ssh_config"
9
9
  supports platform: "unix"
10
+ supports platform: "windows"
10
11
  desc "Use the `ssh_config` InSpec audit resource to test OpenSSH client configuration data located at `/etc/ssh/ssh_config` on Linux and Unix platforms."
11
12
  example <<~EXAMPLE
12
13
  describe ssh_config do
@@ -19,7 +20,7 @@ module Inspec::Resources
19
20
  include FileReader
20
21
 
21
22
  def initialize(conf_path = nil, type = nil)
22
- @conf_path = conf_path || "/etc/ssh/ssh_config"
23
+ @conf_path = conf_path || ssh_config_file("ssh_config")
23
24
  typename = (@conf_path.include?("sshd") ? "Server" : "Client")
24
25
  @type = type || "SSH #{typename} configuration #{conf_path}"
25
26
  read_content
@@ -75,11 +76,21 @@ module Inspec::Resources
75
76
  )
76
77
  @params = convert_hash(conf.params)
77
78
  end
79
+
80
+ def ssh_config_file(type)
81
+ if inspec.os.windows?
82
+ programdata = inspec.os_env("programdata").content
83
+ return "#{programdata}\\ssh\\#{type}"
84
+ end
85
+
86
+ "/etc/ssh/#{type}"
87
+ end
78
88
  end
79
89
 
80
90
  class SshdConfig < SshConfig
81
91
  name "sshd_config"
82
92
  supports platform: "unix"
93
+ supports platform: "windows"
83
94
  desc "Use the sshd_config InSpec audit resource to test configuration data for the Open SSH daemon located at /etc/ssh/sshd_config on Linux and UNIX platforms. sshd---the Open SSH daemon---listens on dedicated ports, starts a daemon for each incoming connection, and then handles encryption, authentication, key exchanges, command execution, and data exchanges."
84
95
  example <<~EXAMPLE
85
96
  describe sshd_config do
@@ -88,11 +99,22 @@ module Inspec::Resources
88
99
  EXAMPLE
89
100
 
90
101
  def initialize(path = nil)
91
- super(path || "/etc/ssh/sshd_config")
102
+ super(path || ssh_config_file("sshd_config"))
92
103
  end
93
104
 
94
105
  def to_s
95
106
  "SSHD Configuration"
96
107
  end
108
+
109
+ private
110
+
111
+ def ssh_config_file(type)
112
+ if inspec.os.windows?
113
+ programdata = inspec.os_env("programdata").content
114
+ return "#{programdata}\\ssh\\#{type}"
115
+ end
116
+
117
+ "/etc/ssh/#{type}"
118
+ end
97
119
  end
98
120
  end