inspec 1.51.15 → 1.51.18
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.rubocop.yml +101 -101
- data/CHANGELOG.md +2922 -2915
- data/Gemfile +53 -53
- data/LICENSE +14 -14
- data/MAINTAINERS.md +31 -31
- data/MAINTAINERS.toml +47 -47
- data/README.md +419 -419
- data/Rakefile +167 -167
- data/bin/inspec +12 -12
- data/docs/.gitignore +2 -2
- data/docs/README.md +40 -40
- data/docs/dsl_inspec.md +258 -258
- data/docs/dsl_resource.md +93 -93
- data/docs/glossary.md +99 -99
- data/docs/habitat.md +191 -191
- data/docs/inspec_and_friends.md +107 -107
- data/docs/matchers.md +165 -165
- data/docs/migration.md +293 -293
- data/docs/plugin_kitchen_inspec.md +49 -49
- data/docs/profiles.md +370 -370
- data/docs/resources/aide_conf.md.erb +78 -78
- data/docs/resources/apache.md.erb +66 -66
- data/docs/resources/apache_conf.md.erb +67 -67
- data/docs/resources/apt.md.erb +70 -70
- data/docs/resources/audit_policy.md.erb +46 -46
- data/docs/resources/auditd.md.erb +78 -78
- data/docs/resources/auditd_conf.md.erb +68 -68
- data/docs/resources/auditd_rules.md.erb +116 -116
- data/docs/resources/bash.md.erb +74 -74
- data/docs/resources/bond.md.erb +89 -89
- data/docs/resources/bridge.md.erb +54 -54
- data/docs/resources/bsd_service.md.erb +65 -65
- data/docs/resources/command.md.erb +137 -137
- data/docs/resources/cpan.md.erb +77 -77
- data/docs/resources/cran.md.erb +63 -63
- data/docs/resources/crontab.md.erb +87 -87
- data/docs/resources/csv.md.erb +53 -53
- data/docs/resources/dh_params.md.erb +216 -216
- data/docs/resources/directory.md.erb +28 -28
- data/docs/resources/docker.md.erb +163 -163
- data/docs/resources/docker_container.md.erb +99 -99
- data/docs/resources/docker_image.md.erb +93 -93
- data/docs/resources/docker_service.md.erb +113 -113
- data/docs/resources/elasticsearch.md.erb +230 -230
- data/docs/resources/etc_fstab.md.erb +124 -124
- data/docs/resources/etc_group.md.erb +74 -74
- data/docs/resources/etc_hosts.md.erb +75 -75
- data/docs/resources/etc_hosts_allow.md.erb +73 -73
- data/docs/resources/etc_hosts_deny.md.erb +73 -73
- data/docs/resources/file.md.erb +512 -512
- data/docs/resources/filesystem.md.erb +40 -40
- data/docs/resources/firewalld.md.erb +105 -105
- data/docs/resources/gem.md.erb +78 -78
- data/docs/resources/group.md.erb +60 -60
- data/docs/resources/grub_conf.md.erb +101 -101
- data/docs/resources/host.md.erb +77 -77
- data/docs/resources/http.md.erb +104 -104
- data/docs/resources/iis_app.md.erb +120 -120
- data/docs/resources/iis_site.md.erb +132 -132
- data/docs/resources/inetd_conf.md.erb +95 -95
- data/docs/resources/ini.md.erb +72 -72
- data/docs/resources/interface.md.erb +55 -55
- data/docs/resources/iptables.md.erb +63 -63
- data/docs/resources/json.md.erb +61 -61
- data/docs/resources/kernel_module.md.erb +106 -106
- data/docs/resources/kernel_parameter.md.erb +58 -58
- data/docs/resources/key_rsa.md.erb +73 -73
- data/docs/resources/launchd_service.md.erb +56 -56
- data/docs/resources/limits_conf.md.erb +66 -66
- data/docs/resources/login_def.md.erb +62 -62
- data/docs/resources/mount.md.erb +68 -68
- data/docs/resources/mssql_session.md.erb +59 -59
- data/docs/resources/mysql_conf.md.erb +98 -98
- data/docs/resources/mysql_session.md.erb +73 -73
- data/docs/resources/nginx.md.erb +78 -78
- data/docs/resources/nginx_conf.md.erb +127 -127
- data/docs/resources/npm.md.erb +59 -59
- data/docs/resources/ntp_conf.md.erb +59 -59
- data/docs/resources/oneget.md.erb +52 -52
- data/docs/resources/oracledb_session.md.erb +51 -51
- data/docs/resources/os.md.erb +140 -140
- data/docs/resources/os_env.md.erb +77 -77
- data/docs/resources/package.md.erb +119 -119
- data/docs/resources/packages.md.erb +66 -66
- data/docs/resources/parse_config.md.erb +102 -102
- data/docs/resources/parse_config_file.md.erb +137 -137
- data/docs/resources/passwd.md.erb +140 -140
- data/docs/resources/pip.md.erb +66 -66
- data/docs/resources/port.md.erb +136 -136
- data/docs/resources/postgres_conf.md.erb +78 -78
- data/docs/resources/postgres_hba_conf.md.erb +92 -92
- data/docs/resources/postgres_ident_conf.md.erb +75 -75
- data/docs/resources/postgres_session.md.erb +68 -68
- data/docs/resources/powershell.md.erb +101 -101
- data/docs/resources/processes.md.erb +107 -107
- data/docs/resources/rabbitmq_config.md.erb +40 -40
- data/docs/resources/registry_key.md.erb +157 -157
- data/docs/resources/runit_service.md.erb +56 -56
- data/docs/resources/security_policy.md.erb +46 -46
- data/docs/resources/service.md.erb +120 -120
- data/docs/resources/shadow.md.erb +143 -143
- data/docs/resources/ssh_config.md.erb +79 -79
- data/docs/resources/sshd_config.md.erb +82 -82
- data/docs/resources/ssl.md.erb +118 -118
- data/docs/resources/sys_info.md.erb +41 -41
- data/docs/resources/systemd_service.md.erb +56 -56
- data/docs/resources/sysv_service.md.erb +56 -56
- data/docs/resources/upstart_service.md.erb +56 -56
- data/docs/resources/user.md.erb +139 -139
- data/docs/resources/users.md.erb +126 -126
- data/docs/resources/vbscript.md.erb +54 -54
- data/docs/resources/virtualization.md.erb +56 -56
- data/docs/resources/windows_feature.md.erb +46 -46
- data/docs/resources/windows_hotfix.md.erb +52 -52
- data/docs/resources/windows_task.md.erb +89 -89
- data/docs/resources/wmi.md.erb +80 -80
- data/docs/resources/x509_certificate.md.erb +150 -150
- data/docs/resources/xinetd_conf.md.erb +155 -155
- data/docs/resources/xml.md.erb +84 -84
- data/docs/resources/yaml.md.erb +68 -68
- data/docs/resources/yum.md.erb +97 -97
- data/docs/resources/zfs_dataset.md.erb +52 -52
- data/docs/resources/zfs_pool.md.erb +46 -46
- data/docs/ruby_usage.md +203 -203
- data/docs/shared/matcher_be.md.erb +1 -1
- data/docs/shared/matcher_cmp.md.erb +43 -43
- data/docs/shared/matcher_eq.md.erb +3 -3
- data/docs/shared/matcher_include.md.erb +1 -1
- data/docs/shared/matcher_match.md.erb +1 -1
- data/docs/shell.md +172 -172
- data/examples/README.md +8 -8
- data/examples/inheritance/README.md +65 -65
- data/examples/inheritance/controls/example.rb +14 -14
- data/examples/inheritance/inspec.yml +15 -15
- data/examples/kitchen-ansible/.kitchen.yml +25 -25
- data/examples/kitchen-ansible/Gemfile +19 -19
- data/examples/kitchen-ansible/README.md +53 -53
- data/examples/kitchen-ansible/files/nginx.repo +6 -6
- data/examples/kitchen-ansible/tasks/main.yml +16 -16
- data/examples/kitchen-ansible/test/integration/default/default.yml +5 -5
- data/examples/kitchen-ansible/test/integration/default/web_spec.rb +28 -28
- data/examples/kitchen-chef/.kitchen.yml +20 -20
- data/examples/kitchen-chef/Berksfile +3 -3
- data/examples/kitchen-chef/Gemfile +19 -19
- data/examples/kitchen-chef/README.md +27 -27
- data/examples/kitchen-chef/metadata.rb +7 -7
- data/examples/kitchen-chef/recipes/default.rb +6 -6
- data/examples/kitchen-chef/recipes/nginx.rb +30 -30
- data/examples/kitchen-chef/test/integration/default/web_spec.rb +28 -28
- data/examples/kitchen-puppet/.kitchen.yml +22 -22
- data/examples/kitchen-puppet/Gemfile +20 -20
- data/examples/kitchen-puppet/Puppetfile +25 -25
- data/examples/kitchen-puppet/README.md +53 -53
- data/examples/kitchen-puppet/manifests/site.pp +33 -33
- data/examples/kitchen-puppet/metadata.json +11 -11
- data/examples/kitchen-puppet/test/integration/default/web_spec.rb +28 -28
- data/examples/meta-profile/README.md +37 -37
- data/examples/meta-profile/controls/example.rb +13 -13
- data/examples/meta-profile/inspec.yml +13 -13
- data/examples/profile-attribute.yml +2 -2
- data/examples/profile-attribute/README.md +14 -14
- data/examples/profile-attribute/controls/example.rb +11 -11
- data/examples/profile-attribute/inspec.yml +8 -8
- data/examples/profile-sensitive/README.md +29 -29
- data/examples/profile-sensitive/controls/sensitive-failures.rb +9 -9
- data/examples/profile-sensitive/controls/sensitive.rb +9 -9
- data/examples/profile-sensitive/inspec.yml +8 -8
- data/examples/profile/README.md +48 -48
- data/examples/profile/controls/example.rb +23 -23
- data/examples/profile/controls/gordon.rb +36 -36
- data/examples/profile/controls/meta.rb +34 -34
- data/examples/profile/inspec.yml +10 -10
- data/examples/profile/libraries/gordon_config.rb +53 -53
- data/inspec.gemspec +47 -47
- data/lib/bundles/README.md +3 -3
- data/lib/bundles/inspec-artifact.rb +7 -7
- data/lib/bundles/inspec-artifact/README.md +1 -1
- data/lib/bundles/inspec-artifact/cli.rb +277 -277
- data/lib/bundles/inspec-compliance.rb +16 -16
- data/lib/bundles/inspec-compliance/.kitchen.yml +20 -20
- data/lib/bundles/inspec-compliance/README.md +185 -185
- data/lib/bundles/inspec-compliance/api.rb +316 -316
- data/lib/bundles/inspec-compliance/api/login.rb +152 -152
- data/lib/bundles/inspec-compliance/bootstrap.sh +41 -41
- data/lib/bundles/inspec-compliance/cli.rb +277 -277
- data/lib/bundles/inspec-compliance/configuration.rb +103 -103
- data/lib/bundles/inspec-compliance/http.rb +86 -86
- data/lib/bundles/inspec-compliance/support.rb +36 -36
- data/lib/bundles/inspec-compliance/target.rb +98 -98
- data/lib/bundles/inspec-compliance/test/integration/default/cli.rb +93 -93
- data/lib/bundles/inspec-habitat.rb +12 -12
- data/lib/bundles/inspec-habitat/cli.rb +36 -36
- data/lib/bundles/inspec-habitat/log.rb +10 -10
- data/lib/bundles/inspec-habitat/profile.rb +390 -390
- data/lib/bundles/inspec-init.rb +8 -8
- data/lib/bundles/inspec-init/README.md +31 -31
- data/lib/bundles/inspec-init/cli.rb +97 -97
- data/lib/bundles/inspec-init/templates/profile/README.md +3 -3
- data/lib/bundles/inspec-init/templates/profile/controls/example.rb +19 -19
- data/lib/bundles/inspec-init/templates/profile/inspec.yml +8 -8
- data/lib/bundles/inspec-supermarket.rb +13 -13
- data/lib/bundles/inspec-supermarket/README.md +45 -45
- data/lib/bundles/inspec-supermarket/api.rb +84 -84
- data/lib/bundles/inspec-supermarket/cli.rb +65 -65
- data/lib/bundles/inspec-supermarket/target.rb +34 -34
- data/lib/fetchers/git.rb +163 -163
- data/lib/fetchers/local.rb +74 -74
- data/lib/fetchers/mock.rb +35 -35
- data/lib/fetchers/url.rb +204 -204
- data/lib/inspec.rb +24 -24
- data/lib/inspec/archive/tar.rb +29 -29
- data/lib/inspec/archive/zip.rb +19 -19
- data/lib/inspec/backend.rb +92 -92
- data/lib/inspec/base_cli.rb +327 -324
- data/lib/inspec/cached_fetcher.rb +66 -66
- data/lib/inspec/cli.rb +298 -298
- data/lib/inspec/completions/bash.sh.erb +45 -45
- data/lib/inspec/completions/fish.sh.erb +34 -34
- data/lib/inspec/completions/zsh.sh.erb +61 -61
- data/lib/inspec/control_eval_context.rb +179 -179
- data/lib/inspec/dependencies/cache.rb +72 -72
- data/lib/inspec/dependencies/dependency_set.rb +92 -92
- data/lib/inspec/dependencies/lockfile.rb +115 -115
- data/lib/inspec/dependencies/requirement.rb +123 -123
- data/lib/inspec/dependencies/resolver.rb +86 -86
- data/lib/inspec/describe.rb +27 -27
- data/lib/inspec/dsl.rb +66 -66
- data/lib/inspec/dsl_shared.rb +33 -33
- data/lib/inspec/env_printer.rb +157 -157
- data/lib/inspec/errors.rb +13 -13
- data/lib/inspec/exceptions.rb +12 -12
- data/lib/inspec/expect.rb +45 -45
- data/lib/inspec/fetcher.rb +45 -45
- data/lib/inspec/file_provider.rb +275 -275
- data/lib/inspec/formatters.rb +3 -3
- data/lib/inspec/formatters/base.rb +208 -208
- data/lib/inspec/formatters/json_rspec.rb +20 -20
- data/lib/inspec/formatters/show_progress.rb +12 -12
- data/lib/inspec/library_eval_context.rb +58 -58
- data/lib/inspec/log.rb +11 -11
- data/lib/inspec/metadata.rb +253 -253
- data/lib/inspec/method_source.rb +24 -24
- data/lib/inspec/objects.rb +14 -14
- data/lib/inspec/objects/attribute.rb +65 -65
- data/lib/inspec/objects/control.rb +61 -61
- data/lib/inspec/objects/describe.rb +92 -92
- data/lib/inspec/objects/each_loop.rb +36 -36
- data/lib/inspec/objects/list.rb +15 -15
- data/lib/inspec/objects/or_test.rb +40 -40
- data/lib/inspec/objects/ruby_helper.rb +15 -15
- data/lib/inspec/objects/tag.rb +27 -27
- data/lib/inspec/objects/test.rb +87 -87
- data/lib/inspec/objects/value.rb +27 -27
- data/lib/inspec/plugins.rb +60 -60
- data/lib/inspec/plugins/cli.rb +24 -24
- data/lib/inspec/plugins/fetcher.rb +86 -86
- data/lib/inspec/plugins/resource.rb +132 -132
- data/lib/inspec/plugins/secret.rb +15 -15
- data/lib/inspec/plugins/source_reader.rb +40 -40
- data/lib/inspec/polyfill.rb +12 -12
- data/lib/inspec/profile.rb +510 -510
- data/lib/inspec/profile_context.rb +207 -207
- data/lib/inspec/profile_vendor.rb +66 -66
- data/lib/inspec/reporters.rb +50 -50
- data/lib/inspec/reporters/base.rb +24 -24
- data/lib/inspec/reporters/cli.rb +395 -395
- data/lib/inspec/reporters/json.rb +138 -134
- data/lib/inspec/reporters/json_min.rb +48 -48
- data/lib/inspec/reporters/junit.rb +77 -77
- data/lib/inspec/require_loader.rb +33 -33
- data/lib/inspec/resource.rb +176 -176
- data/lib/inspec/rule.rb +266 -266
- data/lib/inspec/runner.rb +342 -340
- data/lib/inspec/runner_mock.rb +41 -41
- data/lib/inspec/runner_rspec.rb +163 -163
- data/lib/inspec/runtime_profile.rb +26 -26
- data/lib/inspec/schema.rb +192 -186
- data/lib/inspec/secrets.rb +19 -19
- data/lib/inspec/secrets/yaml.rb +30 -30
- data/lib/inspec/shell.rb +223 -223
- data/lib/inspec/shell_detector.rb +90 -90
- data/lib/inspec/source_reader.rb +29 -29
- data/lib/inspec/version.rb +8 -8
- data/lib/matchers/matchers.rb +397 -397
- data/lib/resources/aide_conf.rb +160 -160
- data/lib/resources/apache.rb +49 -49
- data/lib/resources/apache_conf.rb +158 -158
- data/lib/resources/apt.rb +150 -150
- data/lib/resources/audit_policy.rb +64 -64
- data/lib/resources/auditd.rb +233 -233
- data/lib/resources/auditd_conf.rb +56 -56
- data/lib/resources/auditd_rules.rb +205 -205
- data/lib/resources/bash.rb +36 -36
- data/lib/resources/bond.rb +69 -69
- data/lib/resources/bridge.rb +123 -123
- data/lib/resources/command.rb +69 -69
- data/lib/resources/cpan.rb +60 -60
- data/lib/resources/cran.rb +66 -66
- data/lib/resources/crontab.rb +169 -169
- data/lib/resources/csv.rb +58 -58
- data/lib/resources/dh_params.rb +83 -83
- data/lib/resources/directory.rb +25 -25
- data/lib/resources/docker.rb +239 -239
- data/lib/resources/docker_container.rb +92 -92
- data/lib/resources/docker_image.rb +86 -86
- data/lib/resources/docker_object.rb +57 -57
- data/lib/resources/docker_service.rb +94 -94
- data/lib/resources/elasticsearch.rb +168 -168
- data/lib/resources/etc_fstab.rb +102 -102
- data/lib/resources/etc_group.rb +157 -157
- data/lib/resources/etc_hosts.rb +81 -81
- data/lib/resources/etc_hosts_allow_deny.rb +122 -122
- data/lib/resources/file.rb +298 -298
- data/lib/resources/filesystem.rb +31 -31
- data/lib/resources/firewalld.rb +144 -144
- data/lib/resources/gem.rb +71 -71
- data/lib/resources/groups.rb +213 -213
- data/lib/resources/grub_conf.rb +237 -237
- data/lib/resources/host.rb +300 -300
- data/lib/resources/http.rb +252 -252
- data/lib/resources/iis_app.rb +103 -103
- data/lib/resources/iis_site.rb +147 -147
- data/lib/resources/inetd_conf.rb +63 -63
- data/lib/resources/ini.rb +29 -29
- data/lib/resources/interface.rb +130 -130
- data/lib/resources/iptables.rb +70 -70
- data/lib/resources/json.rb +115 -115
- data/lib/resources/kernel_module.rb +110 -110
- data/lib/resources/kernel_parameter.rb +58 -58
- data/lib/resources/key_rsa.rb +67 -67
- data/lib/resources/limits_conf.rb +56 -56
- data/lib/resources/login_def.rb +67 -67
- data/lib/resources/mount.rb +90 -90
- data/lib/resources/mssql_session.rb +103 -103
- data/lib/resources/mysql.rb +82 -82
- data/lib/resources/mysql_conf.rb +133 -133
- data/lib/resources/mysql_session.rb +72 -72
- data/lib/resources/nginx.rb +97 -97
- data/lib/resources/nginx_conf.rb +228 -228
- data/lib/resources/npm.rb +48 -48
- data/lib/resources/ntp_conf.rb +59 -59
- data/lib/resources/oneget.rb +72 -72
- data/lib/resources/oracledb_session.rb +140 -140
- data/lib/resources/os.rb +46 -46
- data/lib/resources/os_env.rb +76 -76
- data/lib/resources/package.rb +357 -357
- data/lib/resources/packages.rb +112 -112
- data/lib/resources/parse_config.rb +116 -116
- data/lib/resources/passwd.rb +96 -96
- data/lib/resources/pip.rb +89 -89
- data/lib/resources/platform.rb +112 -112
- data/lib/resources/port.rb +771 -771
- data/lib/resources/postgres.rb +132 -132
- data/lib/resources/postgres_conf.rb +122 -122
- data/lib/resources/postgres_hba_conf.rb +101 -101
- data/lib/resources/postgres_ident_conf.rb +79 -79
- data/lib/resources/postgres_session.rb +72 -72
- data/lib/resources/powershell.rb +58 -58
- data/lib/resources/processes.rb +204 -204
- data/lib/resources/rabbitmq_conf.rb +53 -53
- data/lib/resources/registry_key.rb +296 -296
- data/lib/resources/security_policy.rb +181 -181
- data/lib/resources/service.rb +784 -784
- data/lib/resources/shadow.rb +141 -141
- data/lib/resources/ssh_conf.rb +102 -102
- data/lib/resources/ssl.rb +99 -99
- data/lib/resources/sys_info.rb +26 -26
- data/lib/resources/toml.rb +32 -32
- data/lib/resources/users.rb +652 -652
- data/lib/resources/vbscript.rb +70 -70
- data/lib/resources/virtualization.rb +251 -251
- data/lib/resources/windows_feature.rb +85 -85
- data/lib/resources/windows_hotfix.rb +35 -35
- data/lib/resources/windows_task.rb +106 -106
- data/lib/resources/wmi.rb +114 -114
- data/lib/resources/x509_certificate.rb +143 -143
- data/lib/resources/xinetd.rb +112 -112
- data/lib/resources/xml.rb +45 -45
- data/lib/resources/yaml.rb +45 -45
- data/lib/resources/yum.rb +181 -181
- data/lib/resources/zfs_dataset.rb +60 -60
- data/lib/resources/zfs_pool.rb +49 -49
- data/lib/source_readers/flat.rb +39 -39
- data/lib/source_readers/inspec.rb +75 -75
- data/lib/utils/command_wrapper.rb +27 -27
- data/lib/utils/convert.rb +12 -12
- data/lib/utils/database_helpers.rb +77 -77
- data/lib/utils/erlang_parser.rb +192 -192
- data/lib/utils/filter.rb +272 -272
- data/lib/utils/filter_array.rb +27 -27
- data/lib/utils/find_files.rb +44 -44
- data/lib/utils/hash.rb +41 -41
- data/lib/utils/json_log.rb +18 -18
- data/lib/utils/latest_version.rb +22 -22
- data/lib/utils/modulator.rb +12 -12
- data/lib/utils/nginx_parser.rb +85 -85
- data/lib/utils/object_traversal.rb +49 -49
- data/lib/utils/parser.rb +274 -274
- data/lib/utils/plugin_registry.rb +93 -93
- data/lib/utils/simpleconfig.rb +132 -132
- data/lib/utils/spdx.rb +13 -13
- data/lib/utils/spdx.txt +343 -343
- metadata +2 -2
data/lib/resources/etc_hosts.rb
CHANGED
@@ -1,81 +1,81 @@
|
|
1
|
-
# encoding: utf-8
|
2
|
-
# author: Matthew Dromazos
|
3
|
-
|
4
|
-
require 'utils/parser'
|
5
|
-
|
6
|
-
class EtcHosts < Inspec.resource(1)
|
7
|
-
name 'etc_hosts'
|
8
|
-
desc 'Use the etc_hosts InSpec audit resource to find an
|
9
|
-
ip_address and its associated hosts'
|
10
|
-
example "
|
11
|
-
describe etc_hosts.where { ip_address == '127.0.0.1' } do
|
12
|
-
its('ip_address') { should cmp '127.0.0.1' }
|
13
|
-
its('primary_name') { should cmp 'localhost' }
|
14
|
-
its('all_host_names') { should eq [['localhost', 'localhost.localdomain', 'localhost4', 'localhost4.localdomain4']] }
|
15
|
-
end
|
16
|
-
"
|
17
|
-
|
18
|
-
attr_reader :params
|
19
|
-
|
20
|
-
include CommentParser
|
21
|
-
|
22
|
-
def initialize(hosts_path = nil)
|
23
|
-
return skip_resource 'The `etc_hosts` resource is not supported on your OS.' unless inspec.os.bsd? || inspec.os.linux? || inspec.os.windows?
|
24
|
-
@conf_path = hosts_path || default_hosts_file_path
|
25
|
-
@content = nil
|
26
|
-
@params = nil
|
27
|
-
read_content
|
28
|
-
end
|
29
|
-
|
30
|
-
filter = FilterTable.create
|
31
|
-
filter.add_accessor(:where)
|
32
|
-
.add_accessor(:entries)
|
33
|
-
.add(:ip_address, field: 'ip_address')
|
34
|
-
.add(:primary_name, field: 'primary_name')
|
35
|
-
.add(:all_host_names, field: 'all_host_names')
|
36
|
-
|
37
|
-
filter.connect(self, :params)
|
38
|
-
|
39
|
-
private
|
40
|
-
|
41
|
-
def default_hosts_file_path
|
42
|
-
inspec.os.windows? ? 'C:\windows\system32\drivers\etc\hosts' : '/etc/hosts'
|
43
|
-
end
|
44
|
-
|
45
|
-
def read_content
|
46
|
-
@content = ''
|
47
|
-
@params = {}
|
48
|
-
@content = read_file(@conf_path)
|
49
|
-
@params = parse_conf(@content)
|
50
|
-
end
|
51
|
-
|
52
|
-
def parse_conf(content)
|
53
|
-
content.map do |line|
|
54
|
-
data, = parse_comment_line(line, comment_char: '#', standalone_comments: false)
|
55
|
-
parse_line(data) unless data == ''
|
56
|
-
end.compact
|
57
|
-
end
|
58
|
-
|
59
|
-
def parse_line(line)
|
60
|
-
line_parts = line.split
|
61
|
-
return nil unless line_parts.length >= 2
|
62
|
-
{
|
63
|
-
'ip_address' => line_parts[0],
|
64
|
-
'primary_name' => line_parts[1],
|
65
|
-
'all_host_names' => line_parts[1..-1],
|
66
|
-
}
|
67
|
-
end
|
68
|
-
|
69
|
-
def read_file(conf_path = @conf_path)
|
70
|
-
file = inspec.file(conf_path)
|
71
|
-
if !file.file?
|
72
|
-
return skip_resource "Can't find file. \"#{@conf_path}\""
|
73
|
-
end
|
74
|
-
|
75
|
-
raw_conf = file.content
|
76
|
-
if raw_conf.empty? && !file.empty?
|
77
|
-
return skip_resource("Could not read file contents\" #{@conf_path}\"")
|
78
|
-
end
|
79
|
-
raw_conf.lines
|
80
|
-
end
|
81
|
-
end
|
1
|
+
# encoding: utf-8
|
2
|
+
# author: Matthew Dromazos
|
3
|
+
|
4
|
+
require 'utils/parser'
|
5
|
+
|
6
|
+
class EtcHosts < Inspec.resource(1)
|
7
|
+
name 'etc_hosts'
|
8
|
+
desc 'Use the etc_hosts InSpec audit resource to find an
|
9
|
+
ip_address and its associated hosts'
|
10
|
+
example "
|
11
|
+
describe etc_hosts.where { ip_address == '127.0.0.1' } do
|
12
|
+
its('ip_address') { should cmp '127.0.0.1' }
|
13
|
+
its('primary_name') { should cmp 'localhost' }
|
14
|
+
its('all_host_names') { should eq [['localhost', 'localhost.localdomain', 'localhost4', 'localhost4.localdomain4']] }
|
15
|
+
end
|
16
|
+
"
|
17
|
+
|
18
|
+
attr_reader :params
|
19
|
+
|
20
|
+
include CommentParser
|
21
|
+
|
22
|
+
def initialize(hosts_path = nil)
|
23
|
+
return skip_resource 'The `etc_hosts` resource is not supported on your OS.' unless inspec.os.bsd? || inspec.os.linux? || inspec.os.windows?
|
24
|
+
@conf_path = hosts_path || default_hosts_file_path
|
25
|
+
@content = nil
|
26
|
+
@params = nil
|
27
|
+
read_content
|
28
|
+
end
|
29
|
+
|
30
|
+
filter = FilterTable.create
|
31
|
+
filter.add_accessor(:where)
|
32
|
+
.add_accessor(:entries)
|
33
|
+
.add(:ip_address, field: 'ip_address')
|
34
|
+
.add(:primary_name, field: 'primary_name')
|
35
|
+
.add(:all_host_names, field: 'all_host_names')
|
36
|
+
|
37
|
+
filter.connect(self, :params)
|
38
|
+
|
39
|
+
private
|
40
|
+
|
41
|
+
def default_hosts_file_path
|
42
|
+
inspec.os.windows? ? 'C:\windows\system32\drivers\etc\hosts' : '/etc/hosts'
|
43
|
+
end
|
44
|
+
|
45
|
+
def read_content
|
46
|
+
@content = ''
|
47
|
+
@params = {}
|
48
|
+
@content = read_file(@conf_path)
|
49
|
+
@params = parse_conf(@content)
|
50
|
+
end
|
51
|
+
|
52
|
+
def parse_conf(content)
|
53
|
+
content.map do |line|
|
54
|
+
data, = parse_comment_line(line, comment_char: '#', standalone_comments: false)
|
55
|
+
parse_line(data) unless data == ''
|
56
|
+
end.compact
|
57
|
+
end
|
58
|
+
|
59
|
+
def parse_line(line)
|
60
|
+
line_parts = line.split
|
61
|
+
return nil unless line_parts.length >= 2
|
62
|
+
{
|
63
|
+
'ip_address' => line_parts[0],
|
64
|
+
'primary_name' => line_parts[1],
|
65
|
+
'all_host_names' => line_parts[1..-1],
|
66
|
+
}
|
67
|
+
end
|
68
|
+
|
69
|
+
def read_file(conf_path = @conf_path)
|
70
|
+
file = inspec.file(conf_path)
|
71
|
+
if !file.file?
|
72
|
+
return skip_resource "Can't find file. \"#{@conf_path}\""
|
73
|
+
end
|
74
|
+
|
75
|
+
raw_conf = file.content
|
76
|
+
if raw_conf.empty? && !file.empty?
|
77
|
+
return skip_resource("Could not read file contents\" #{@conf_path}\"")
|
78
|
+
end
|
79
|
+
raw_conf.lines
|
80
|
+
end
|
81
|
+
end
|
@@ -1,122 +1,122 @@
|
|
1
|
-
# encoding: utf-8
|
2
|
-
# author: Matthew Dromazos
|
3
|
-
|
4
|
-
require 'utils/parser'
|
5
|
-
|
6
|
-
module Inspec::Resources
|
7
|
-
class EtcHostsAllow < Inspec.resource(1)
|
8
|
-
name 'etc_hosts_allow'
|
9
|
-
desc 'Use the etc_hosts_allow InSpec audit resource to test the connections
|
10
|
-
the client will allow. Controlled by the /etc/hosts.allow file.'
|
11
|
-
example "
|
12
|
-
describe etc_hosts_allow.where { daemon == 'ALL' } do
|
13
|
-
its('client_list') { should include ['127.0.0.1', '[::1]'] }
|
14
|
-
its('options') { should eq [[]] }
|
15
|
-
end
|
16
|
-
"
|
17
|
-
|
18
|
-
attr_reader :params
|
19
|
-
|
20
|
-
include CommentParser
|
21
|
-
|
22
|
-
def initialize(hosts_allow_path = nil)
|
23
|
-
return skip_resource 'The `etc_hosts_allow` resource is not supported on your OS.' unless inspec.os.linux?
|
24
|
-
@conf_path = hosts_allow_path || '/etc/hosts.allow'
|
25
|
-
@content = nil
|
26
|
-
@params = nil
|
27
|
-
read_content
|
28
|
-
end
|
29
|
-
|
30
|
-
filter = FilterTable.create
|
31
|
-
filter.add_accessor(:where)
|
32
|
-
.add_accessor(:entries)
|
33
|
-
.add(:daemon, field: 'daemon')
|
34
|
-
.add(:client_list, field: 'client_list')
|
35
|
-
.add(:options, field: 'options')
|
36
|
-
|
37
|
-
filter.connect(self, :params)
|
38
|
-
|
39
|
-
private
|
40
|
-
|
41
|
-
def read_content
|
42
|
-
@content = ''
|
43
|
-
@params = {}
|
44
|
-
@content = split_daemons(read_file(@conf_path))
|
45
|
-
@params = parse_conf(@content)
|
46
|
-
end
|
47
|
-
|
48
|
-
def split_daemons(content)
|
49
|
-
split_daemons_list = []
|
50
|
-
content.each do |line|
|
51
|
-
data, = parse_comment_line(line, comment_char: '#', standalone_comments: false)
|
52
|
-
next unless data != ''
|
53
|
-
data.split(':')[0].split(',').each do |daemon|
|
54
|
-
split_daemons_list.push("#{daemon} : " + line.split(':', 2)[1])
|
55
|
-
end
|
56
|
-
end
|
57
|
-
split_daemons_list
|
58
|
-
end
|
59
|
-
|
60
|
-
def parse_conf(content)
|
61
|
-
content.map do |line|
|
62
|
-
data, = parse_comment_line(line, comment_char: '#', standalone_comments: false)
|
63
|
-
parse_line(data) unless data == ''
|
64
|
-
end.compact
|
65
|
-
end
|
66
|
-
|
67
|
-
def parse_line(line)
|
68
|
-
daemon, clients_and_options = line.split(/:\s+/, 2)
|
69
|
-
daemon = daemon.strip
|
70
|
-
|
71
|
-
clients_and_options ||= ''
|
72
|
-
clients, options = clients_and_options.split(/\s+:\s+/, 2)
|
73
|
-
client_list = clients.split(/,/).map(&:strip)
|
74
|
-
|
75
|
-
options ||= ''
|
76
|
-
options_list = options.split(/:\s+/).map(&:strip)
|
77
|
-
|
78
|
-
{
|
79
|
-
'daemon' => daemon,
|
80
|
-
'client_list' => client_list,
|
81
|
-
'options' => options_list,
|
82
|
-
}
|
83
|
-
end
|
84
|
-
|
85
|
-
def read_file(conf_path = @conf_path)
|
86
|
-
# Determine if the file exists and contains anything, if not
|
87
|
-
# then access control is turned off.
|
88
|
-
file = inspec.file(conf_path)
|
89
|
-
if !file.file?
|
90
|
-
return skip_resource "Can't find file at \"#{@conf_path}\""
|
91
|
-
end
|
92
|
-
raw_conf = file.content
|
93
|
-
if raw_conf.empty? && !file.empty?
|
94
|
-
return skip_resource("Unable to read file \"#{@conf_path}\"")
|
95
|
-
end
|
96
|
-
|
97
|
-
# If there is a file and it contains content, continue
|
98
|
-
raw_conf.lines
|
99
|
-
end
|
100
|
-
end
|
101
|
-
|
102
|
-
class EtcHostsDeny < EtcHostsAllow
|
103
|
-
name 'etc_hosts_deny'
|
104
|
-
desc 'Use the etc_hosts_deny InSpec audit resource to test the connections
|
105
|
-
the client will deny. Controlled by the /etc/hosts.deny file.'
|
106
|
-
example "
|
107
|
-
describe etc_hosts_deny.where { daemon_list == 'ALL' } do
|
108
|
-
its('client_list') { should eq [['127.0.0.1', '[::1]']] }
|
109
|
-
its('options') { should eq [] }
|
110
|
-
end
|
111
|
-
"
|
112
|
-
|
113
|
-
def initialize(path = nil)
|
114
|
-
return skip_resource '`etc_hosts_deny` is not supported on your OS' unless inspec.os.linux?
|
115
|
-
super(path || '/etc/hosts.deny')
|
116
|
-
end
|
117
|
-
|
118
|
-
def to_s
|
119
|
-
'hosts.deny Configuration'
|
120
|
-
end
|
121
|
-
end
|
122
|
-
end
|
1
|
+
# encoding: utf-8
|
2
|
+
# author: Matthew Dromazos
|
3
|
+
|
4
|
+
require 'utils/parser'
|
5
|
+
|
6
|
+
module Inspec::Resources
|
7
|
+
class EtcHostsAllow < Inspec.resource(1)
|
8
|
+
name 'etc_hosts_allow'
|
9
|
+
desc 'Use the etc_hosts_allow InSpec audit resource to test the connections
|
10
|
+
the client will allow. Controlled by the /etc/hosts.allow file.'
|
11
|
+
example "
|
12
|
+
describe etc_hosts_allow.where { daemon == 'ALL' } do
|
13
|
+
its('client_list') { should include ['127.0.0.1', '[::1]'] }
|
14
|
+
its('options') { should eq [[]] }
|
15
|
+
end
|
16
|
+
"
|
17
|
+
|
18
|
+
attr_reader :params
|
19
|
+
|
20
|
+
include CommentParser
|
21
|
+
|
22
|
+
def initialize(hosts_allow_path = nil)
|
23
|
+
return skip_resource 'The `etc_hosts_allow` resource is not supported on your OS.' unless inspec.os.linux?
|
24
|
+
@conf_path = hosts_allow_path || '/etc/hosts.allow'
|
25
|
+
@content = nil
|
26
|
+
@params = nil
|
27
|
+
read_content
|
28
|
+
end
|
29
|
+
|
30
|
+
filter = FilterTable.create
|
31
|
+
filter.add_accessor(:where)
|
32
|
+
.add_accessor(:entries)
|
33
|
+
.add(:daemon, field: 'daemon')
|
34
|
+
.add(:client_list, field: 'client_list')
|
35
|
+
.add(:options, field: 'options')
|
36
|
+
|
37
|
+
filter.connect(self, :params)
|
38
|
+
|
39
|
+
private
|
40
|
+
|
41
|
+
def read_content
|
42
|
+
@content = ''
|
43
|
+
@params = {}
|
44
|
+
@content = split_daemons(read_file(@conf_path))
|
45
|
+
@params = parse_conf(@content)
|
46
|
+
end
|
47
|
+
|
48
|
+
def split_daemons(content)
|
49
|
+
split_daemons_list = []
|
50
|
+
content.each do |line|
|
51
|
+
data, = parse_comment_line(line, comment_char: '#', standalone_comments: false)
|
52
|
+
next unless data != ''
|
53
|
+
data.split(':')[0].split(',').each do |daemon|
|
54
|
+
split_daemons_list.push("#{daemon} : " + line.split(':', 2)[1])
|
55
|
+
end
|
56
|
+
end
|
57
|
+
split_daemons_list
|
58
|
+
end
|
59
|
+
|
60
|
+
def parse_conf(content)
|
61
|
+
content.map do |line|
|
62
|
+
data, = parse_comment_line(line, comment_char: '#', standalone_comments: false)
|
63
|
+
parse_line(data) unless data == ''
|
64
|
+
end.compact
|
65
|
+
end
|
66
|
+
|
67
|
+
def parse_line(line)
|
68
|
+
daemon, clients_and_options = line.split(/:\s+/, 2)
|
69
|
+
daemon = daemon.strip
|
70
|
+
|
71
|
+
clients_and_options ||= ''
|
72
|
+
clients, options = clients_and_options.split(/\s+:\s+/, 2)
|
73
|
+
client_list = clients.split(/,/).map(&:strip)
|
74
|
+
|
75
|
+
options ||= ''
|
76
|
+
options_list = options.split(/:\s+/).map(&:strip)
|
77
|
+
|
78
|
+
{
|
79
|
+
'daemon' => daemon,
|
80
|
+
'client_list' => client_list,
|
81
|
+
'options' => options_list,
|
82
|
+
}
|
83
|
+
end
|
84
|
+
|
85
|
+
def read_file(conf_path = @conf_path)
|
86
|
+
# Determine if the file exists and contains anything, if not
|
87
|
+
# then access control is turned off.
|
88
|
+
file = inspec.file(conf_path)
|
89
|
+
if !file.file?
|
90
|
+
return skip_resource "Can't find file at \"#{@conf_path}\""
|
91
|
+
end
|
92
|
+
raw_conf = file.content
|
93
|
+
if raw_conf.empty? && !file.empty?
|
94
|
+
return skip_resource("Unable to read file \"#{@conf_path}\"")
|
95
|
+
end
|
96
|
+
|
97
|
+
# If there is a file and it contains content, continue
|
98
|
+
raw_conf.lines
|
99
|
+
end
|
100
|
+
end
|
101
|
+
|
102
|
+
class EtcHostsDeny < EtcHostsAllow
|
103
|
+
name 'etc_hosts_deny'
|
104
|
+
desc 'Use the etc_hosts_deny InSpec audit resource to test the connections
|
105
|
+
the client will deny. Controlled by the /etc/hosts.deny file.'
|
106
|
+
example "
|
107
|
+
describe etc_hosts_deny.where { daemon_list == 'ALL' } do
|
108
|
+
its('client_list') { should eq [['127.0.0.1', '[::1]']] }
|
109
|
+
its('options') { should eq [] }
|
110
|
+
end
|
111
|
+
"
|
112
|
+
|
113
|
+
def initialize(path = nil)
|
114
|
+
return skip_resource '`etc_hosts_deny` is not supported on your OS' unless inspec.os.linux?
|
115
|
+
super(path || '/etc/hosts.deny')
|
116
|
+
end
|
117
|
+
|
118
|
+
def to_s
|
119
|
+
'hosts.deny Configuration'
|
120
|
+
end
|
121
|
+
end
|
122
|
+
end
|
data/lib/resources/file.rb
CHANGED
@@ -1,298 +1,298 @@
|
|
1
|
-
# encoding: utf-8
|
2
|
-
# copyright: 2015, Vulcano Security GmbH
|
3
|
-
# author: Dominik Richter
|
4
|
-
# author: Christoph Hartmann
|
5
|
-
|
6
|
-
require 'shellwords'
|
7
|
-
|
8
|
-
module Inspec::Resources
|
9
|
-
module FilePermissionsSelector
|
10
|
-
def select_file_perms_style(os)
|
11
|
-
if os.unix?
|
12
|
-
UnixFilePermissions.new(inspec)
|
13
|
-
elsif os.windows?
|
14
|
-
WindowsFilePermissions.new(inspec)
|
15
|
-
end
|
16
|
-
end
|
17
|
-
end
|
18
|
-
|
19
|
-
class FileResource < Inspec.resource(1)
|
20
|
-
include FilePermissionsSelector
|
21
|
-
include LinuxMountParser
|
22
|
-
|
23
|
-
name 'file'
|
24
|
-
desc 'Use the file InSpec audit resource to test all system file types, including files, directories, symbolic links, named pipes, sockets, character devices, block devices, and doors.'
|
25
|
-
example "
|
26
|
-
describe file('path') do
|
27
|
-
it { should exist }
|
28
|
-
it { should be_file }
|
29
|
-
it { should be_readable }
|
30
|
-
it { should be_writable }
|
31
|
-
it { should be_executable.by_user('root') }
|
32
|
-
it { should be_owned_by 'root' }
|
33
|
-
its('mode') { should cmp '0644' }
|
34
|
-
end
|
35
|
-
"
|
36
|
-
|
37
|
-
attr_reader :file, :mount_options
|
38
|
-
def initialize(path)
|
39
|
-
# select permissions style
|
40
|
-
@perms_provider = select_file_perms_style(inspec.os)
|
41
|
-
@file = inspec.backend.file(path)
|
42
|
-
end
|
43
|
-
|
44
|
-
%w{
|
45
|
-
type exist? file? block_device? character_device? socket? directory?
|
46
|
-
symlink? pipe? mode mode? owner owned_by? group grouped_into?
|
47
|
-
link_path linked_to? mtime size selinux_label immutable?
|
48
|
-
product_version file_version version? md5sum sha256sum
|
49
|
-
path basename source source_path uid gid
|
50
|
-
}.each do |m|
|
51
|
-
define_method m.to_sym do |*args|
|
52
|
-
file.method(m.to_sym).call(*args)
|
53
|
-
end
|
54
|
-
end
|
55
|
-
|
56
|
-
def content
|
57
|
-
res = file.content
|
58
|
-
return nil if res.nil?
|
59
|
-
res.force_encoding('utf-8')
|
60
|
-
end
|
61
|
-
|
62
|
-
def contain(*_)
|
63
|
-
raise 'Contain is not supported. Please use standard RSpec matchers.'
|
64
|
-
end
|
65
|
-
|
66
|
-
def readable?(by_usergroup, by_specific_user)
|
67
|
-
return false unless exist?
|
68
|
-
return skip_resource '`readable?` is not supported on your OS yet.' if @perms_provider.nil?
|
69
|
-
|
70
|
-
file_permission_granted?('read', by_usergroup, by_specific_user)
|
71
|
-
end
|
72
|
-
|
73
|
-
def writable?(by_usergroup, by_specific_user)
|
74
|
-
return false unless exist?
|
75
|
-
return skip_resource '`writable?` is not supported on your OS yet.' if @perms_provider.nil?
|
76
|
-
|
77
|
-
file_permission_granted?('write', by_usergroup, by_specific_user)
|
78
|
-
end
|
79
|
-
|
80
|
-
def executable?(by_usergroup, by_specific_user)
|
81
|
-
return false unless exist?
|
82
|
-
return skip_resource '`executable?` is not supported on your OS yet.' if @perms_provider.nil?
|
83
|
-
|
84
|
-
file_permission_granted?('execute', by_usergroup, by_specific_user)
|
85
|
-
end
|
86
|
-
|
87
|
-
def allowed?(permission, opts = {})
|
88
|
-
return false unless exist?
|
89
|
-
return skip_resource '`allowed?` is not supported on your OS yet.' if @perms_provider.nil?
|
90
|
-
|
91
|
-
file_permission_granted?(permission, opts[:by], opts[:by_user])
|
92
|
-
end
|
93
|
-
|
94
|
-
def mounted?(expected_options = nil, identical = false)
|
95
|
-
mounted = file.mounted
|
96
|
-
|
97
|
-
# return if no additional parameters have been provided
|
98
|
-
return file.mounted? if expected_options.nil?
|
99
|
-
|
100
|
-
# deprecation warning, this functionality will be removed in future version
|
101
|
-
warn "[DEPRECATION] `be_mounted.with and be_mounted.only_with` are deprecated. Please use `mount('#{source_path}')` instead."
|
102
|
-
|
103
|
-
# we cannot read mount data on non-Linux systems
|
104
|
-
return nil if !inspec.os.linux?
|
105
|
-
|
106
|
-
# parse content if we are on linux
|
107
|
-
@mount_options ||= parse_mount_options(mounted.stdout, true)
|
108
|
-
|
109
|
-
if identical
|
110
|
-
# check if the options should be identical
|
111
|
-
@mount_options == expected_options
|
112
|
-
else
|
113
|
-
# otherwise compare the selected values
|
114
|
-
@mount_options.contains(expected_options)
|
115
|
-
end
|
116
|
-
end
|
117
|
-
|
118
|
-
def suid
|
119
|
-
(mode & 04000) > 0
|
120
|
-
end
|
121
|
-
|
122
|
-
alias setuid? suid
|
123
|
-
|
124
|
-
def sgid
|
125
|
-
(mode & 02000) > 0
|
126
|
-
end
|
127
|
-
|
128
|
-
alias setgid? sgid
|
129
|
-
|
130
|
-
def sticky
|
131
|
-
(mode & 01000) > 0
|
132
|
-
end
|
133
|
-
|
134
|
-
alias sticky? sticky
|
135
|
-
|
136
|
-
def to_s
|
137
|
-
"File #{source_path}"
|
138
|
-
end
|
139
|
-
|
140
|
-
private
|
141
|
-
|
142
|
-
def file_permission_granted?(access_type, by_usergroup, by_specific_user)
|
143
|
-
raise '`file_permission_granted?` is not supported on your OS' if @perms_provider.nil?
|
144
|
-
if by_specific_user.nil? || by_specific_user.empty?
|
145
|
-
@perms_provider.check_file_permission_by_mask(file, access_type, by_usergroup, by_specific_user)
|
146
|
-
else
|
147
|
-
@perms_provider.check_file_permission_by_user(access_type, by_specific_user, source_path)
|
148
|
-
end
|
149
|
-
end
|
150
|
-
end
|
151
|
-
|
152
|
-
class FilePermissions
|
153
|
-
attr_reader :inspec
|
154
|
-
def initialize(inspec)
|
155
|
-
@inspec = inspec
|
156
|
-
end
|
157
|
-
end
|
158
|
-
|
159
|
-
class UnixFilePermissions < FilePermissions
|
160
|
-
def permission_flag(access_type)
|
161
|
-
case access_type
|
162
|
-
when 'read'
|
163
|
-
'r'
|
164
|
-
when 'write'
|
165
|
-
'w'
|
166
|
-
when 'execute'
|
167
|
-
'x'
|
168
|
-
else
|
169
|
-
raise 'Invalid access_type provided'
|
170
|
-
end
|
171
|
-
end
|
172
|
-
|
173
|
-
def usergroup_for(usergroup, specific_user)
|
174
|
-
if usergroup == 'others'
|
175
|
-
'other'
|
176
|
-
elsif (usergroup.nil? || usergroup.empty?) && specific_user.nil?
|
177
|
-
'all'
|
178
|
-
else
|
179
|
-
usergroup
|
180
|
-
end
|
181
|
-
end
|
182
|
-
|
183
|
-
def check_file_permission_by_mask(file, access_type, usergroup, specific_user)
|
184
|
-
usergroup = usergroup_for(usergroup, specific_user)
|
185
|
-
flag = permission_flag(access_type)
|
186
|
-
mask = file.unix_mode_mask(usergroup, flag)
|
187
|
-
raise 'Invalid usergroup/owner provided' if mask.nil?
|
188
|
-
(file.mode & mask) != 0
|
189
|
-
end
|
190
|
-
|
191
|
-
def check_file_permission_by_user(access_type, user, path)
|
192
|
-
flag = permission_flag(access_type)
|
193
|
-
if inspec.os.linux?
|
194
|
-
perm_cmd = "su -s /bin/sh -c \"test -#{flag} #{path}\" #{user}"
|
195
|
-
elsif inspec.os.bsd? || inspec.os.solaris?
|
196
|
-
perm_cmd = "sudo -u #{user} test -#{flag} #{path}"
|
197
|
-
elsif inspec.os.aix?
|
198
|
-
perm_cmd = "su #{user} -c test -#{flag} #{path}"
|
199
|
-
elsif inspec.os.hpux?
|
200
|
-
perm_cmd = "su #{user} -c \"test -#{flag} #{path}\""
|
201
|
-
else
|
202
|
-
return skip_resource 'The `file` resource does not support `by_user` on your OS.'
|
203
|
-
end
|
204
|
-
|
205
|
-
cmd = inspec.command(perm_cmd)
|
206
|
-
cmd.exit_status == 0 ? true : false
|
207
|
-
end
|
208
|
-
end
|
209
|
-
|
210
|
-
class WindowsFilePermissions < FilePermissions
|
211
|
-
def check_file_permission_by_mask(_file, _access_type, _usergroup, _specific_user)
|
212
|
-
raise '`check_file_permission_by_mask` is not supported on Windows'
|
213
|
-
end
|
214
|
-
|
215
|
-
def check_file_permission_by_user(access_type, user, path)
|
216
|
-
access_rule = translate_perm_names(access_type)
|
217
|
-
access_rule = convert_to_powershell_array(access_rule)
|
218
|
-
|
219
|
-
cmd = inspec.command("@(@((Get-Acl '#{path}').access | Where-Object {$_.AccessControlType -eq 'Allow' -and $_.IdentityReference -eq '#{user}' }) | Where-Object {($_.FileSystemRights.ToString().Split(',') | % {$_.trim()} | ? {#{access_rule} -contains $_}) -ne $null}) | measure | % { $_.Count }")
|
220
|
-
cmd.stdout.chomp == '0' ? false : true
|
221
|
-
end
|
222
|
-
|
223
|
-
private
|
224
|
-
|
225
|
-
def convert_to_powershell_array(arr)
|
226
|
-
if arr.empty?
|
227
|
-
'@()'
|
228
|
-
else
|
229
|
-
%{@('#{arr.join("', '")}')}
|
230
|
-
end
|
231
|
-
end
|
232
|
-
|
233
|
-
# Translates a developer-friendly string into a list of acceptable
|
234
|
-
# FileSystemRights that match it, because Windows has a fun heirarchy
|
235
|
-
# of permissions that are able to be noted in multiple ways.
|
236
|
-
#
|
237
|
-
# See also: https://www.codeproject.com/Reference/871338/AccessControl-FileSystemRights-Permissions-Table
|
238
|
-
def translate_perm_names(access_type)
|
239
|
-
names = translate_common_perms(access_type)
|
240
|
-
names ||= translate_granular_perms(access_type)
|
241
|
-
names ||= translate_uncommon_perms(access_type)
|
242
|
-
raise 'Invalid access_type provided' unless names
|
243
|
-
|
244
|
-
names
|
245
|
-
end
|
246
|
-
|
247
|
-
def translate_common_perms(access_type)
|
248
|
-
case access_type
|
249
|
-
when 'full-control'
|
250
|
-
%w{FullControl}
|
251
|
-
when 'modify'
|
252
|
-
translate_perm_names('full-control') + %w{Modify}
|
253
|
-
when 'read'
|
254
|
-
translate_perm_names('modify') + %w{ReadAndExecute Read}
|
255
|
-
when 'write'
|
256
|
-
translate_perm_names('modify') + %w{Write}
|
257
|
-
when 'execute'
|
258
|
-
translate_perm_names('modify') + %w{ReadAndExecute ExecuteFile Traverse}
|
259
|
-
when 'delete'
|
260
|
-
translate_perm_names('modify') + %w{Delete}
|
261
|
-
end
|
262
|
-
end
|
263
|
-
|
264
|
-
def translate_uncommon_perms(access_type)
|
265
|
-
case access_type
|
266
|
-
when 'delete-subdirectories-and-files'
|
267
|
-
translate_perm_names('full-control') + %w{DeleteSubdirectoriesAndFiles}
|
268
|
-
when 'change-permissions'
|
269
|
-
translate_perm_names('full-control') + %w{ChangePermissions}
|
270
|
-
when 'take-ownership'
|
271
|
-
translate_perm_names('full-control') + %w{TakeOwnership}
|
272
|
-
when 'synchronize'
|
273
|
-
translate_perm_names('full-control') + %w{Synchronize}
|
274
|
-
end
|
275
|
-
end
|
276
|
-
|
277
|
-
def translate_granular_perms(access_type)
|
278
|
-
case access_type
|
279
|
-
when 'write-data', 'create-files'
|
280
|
-
translate_perm_names('write') + %w{WriteData CreateFiles}
|
281
|
-
when 'append-data', 'create-directories'
|
282
|
-
translate_perm_names('write') + %w{CreateDirectories AppendData}
|
283
|
-
when 'write-extended-attributes'
|
284
|
-
translate_perm_names('write') + %w{WriteExtendedAttributes}
|
285
|
-
when 'write-attributes'
|
286
|
-
translate_perm_names('write') + %w{WriteAttributes}
|
287
|
-
when 'read-data', 'list-directory'
|
288
|
-
translate_perm_names('read') + %w{ReadData ListDirectory}
|
289
|
-
when 'read-attributes'
|
290
|
-
translate_perm_names('read') + %w{ReadAttributes}
|
291
|
-
when 'read-extended-attributes'
|
292
|
-
translate_perm_names('read') + %w{ReadExtendedAttributes}
|
293
|
-
when 'read-permissions'
|
294
|
-
translate_perm_names('read') + %w{ReadPermissions}
|
295
|
-
end
|
296
|
-
end
|
297
|
-
end
|
298
|
-
end
|
1
|
+
# encoding: utf-8
|
2
|
+
# copyright: 2015, Vulcano Security GmbH
|
3
|
+
# author: Dominik Richter
|
4
|
+
# author: Christoph Hartmann
|
5
|
+
|
6
|
+
require 'shellwords'
|
7
|
+
|
8
|
+
module Inspec::Resources
|
9
|
+
module FilePermissionsSelector
|
10
|
+
def select_file_perms_style(os)
|
11
|
+
if os.unix?
|
12
|
+
UnixFilePermissions.new(inspec)
|
13
|
+
elsif os.windows?
|
14
|
+
WindowsFilePermissions.new(inspec)
|
15
|
+
end
|
16
|
+
end
|
17
|
+
end
|
18
|
+
|
19
|
+
class FileResource < Inspec.resource(1)
|
20
|
+
include FilePermissionsSelector
|
21
|
+
include LinuxMountParser
|
22
|
+
|
23
|
+
name 'file'
|
24
|
+
desc 'Use the file InSpec audit resource to test all system file types, including files, directories, symbolic links, named pipes, sockets, character devices, block devices, and doors.'
|
25
|
+
example "
|
26
|
+
describe file('path') do
|
27
|
+
it { should exist }
|
28
|
+
it { should be_file }
|
29
|
+
it { should be_readable }
|
30
|
+
it { should be_writable }
|
31
|
+
it { should be_executable.by_user('root') }
|
32
|
+
it { should be_owned_by 'root' }
|
33
|
+
its('mode') { should cmp '0644' }
|
34
|
+
end
|
35
|
+
"
|
36
|
+
|
37
|
+
attr_reader :file, :mount_options
|
38
|
+
def initialize(path)
|
39
|
+
# select permissions style
|
40
|
+
@perms_provider = select_file_perms_style(inspec.os)
|
41
|
+
@file = inspec.backend.file(path)
|
42
|
+
end
|
43
|
+
|
44
|
+
%w{
|
45
|
+
type exist? file? block_device? character_device? socket? directory?
|
46
|
+
symlink? pipe? mode mode? owner owned_by? group grouped_into?
|
47
|
+
link_path linked_to? mtime size selinux_label immutable?
|
48
|
+
product_version file_version version? md5sum sha256sum
|
49
|
+
path basename source source_path uid gid
|
50
|
+
}.each do |m|
|
51
|
+
define_method m.to_sym do |*args|
|
52
|
+
file.method(m.to_sym).call(*args)
|
53
|
+
end
|
54
|
+
end
|
55
|
+
|
56
|
+
def content
|
57
|
+
res = file.content
|
58
|
+
return nil if res.nil?
|
59
|
+
res.force_encoding('utf-8')
|
60
|
+
end
|
61
|
+
|
62
|
+
def contain(*_)
|
63
|
+
raise 'Contain is not supported. Please use standard RSpec matchers.'
|
64
|
+
end
|
65
|
+
|
66
|
+
def readable?(by_usergroup, by_specific_user)
|
67
|
+
return false unless exist?
|
68
|
+
return skip_resource '`readable?` is not supported on your OS yet.' if @perms_provider.nil?
|
69
|
+
|
70
|
+
file_permission_granted?('read', by_usergroup, by_specific_user)
|
71
|
+
end
|
72
|
+
|
73
|
+
def writable?(by_usergroup, by_specific_user)
|
74
|
+
return false unless exist?
|
75
|
+
return skip_resource '`writable?` is not supported on your OS yet.' if @perms_provider.nil?
|
76
|
+
|
77
|
+
file_permission_granted?('write', by_usergroup, by_specific_user)
|
78
|
+
end
|
79
|
+
|
80
|
+
def executable?(by_usergroup, by_specific_user)
|
81
|
+
return false unless exist?
|
82
|
+
return skip_resource '`executable?` is not supported on your OS yet.' if @perms_provider.nil?
|
83
|
+
|
84
|
+
file_permission_granted?('execute', by_usergroup, by_specific_user)
|
85
|
+
end
|
86
|
+
|
87
|
+
def allowed?(permission, opts = {})
|
88
|
+
return false unless exist?
|
89
|
+
return skip_resource '`allowed?` is not supported on your OS yet.' if @perms_provider.nil?
|
90
|
+
|
91
|
+
file_permission_granted?(permission, opts[:by], opts[:by_user])
|
92
|
+
end
|
93
|
+
|
94
|
+
def mounted?(expected_options = nil, identical = false)
|
95
|
+
mounted = file.mounted
|
96
|
+
|
97
|
+
# return if no additional parameters have been provided
|
98
|
+
return file.mounted? if expected_options.nil?
|
99
|
+
|
100
|
+
# deprecation warning, this functionality will be removed in future version
|
101
|
+
warn "[DEPRECATION] `be_mounted.with and be_mounted.only_with` are deprecated. Please use `mount('#{source_path}')` instead."
|
102
|
+
|
103
|
+
# we cannot read mount data on non-Linux systems
|
104
|
+
return nil if !inspec.os.linux?
|
105
|
+
|
106
|
+
# parse content if we are on linux
|
107
|
+
@mount_options ||= parse_mount_options(mounted.stdout, true)
|
108
|
+
|
109
|
+
if identical
|
110
|
+
# check if the options should be identical
|
111
|
+
@mount_options == expected_options
|
112
|
+
else
|
113
|
+
# otherwise compare the selected values
|
114
|
+
@mount_options.contains(expected_options)
|
115
|
+
end
|
116
|
+
end
|
117
|
+
|
118
|
+
def suid
|
119
|
+
(mode & 04000) > 0
|
120
|
+
end
|
121
|
+
|
122
|
+
alias setuid? suid
|
123
|
+
|
124
|
+
def sgid
|
125
|
+
(mode & 02000) > 0
|
126
|
+
end
|
127
|
+
|
128
|
+
alias setgid? sgid
|
129
|
+
|
130
|
+
def sticky
|
131
|
+
(mode & 01000) > 0
|
132
|
+
end
|
133
|
+
|
134
|
+
alias sticky? sticky
|
135
|
+
|
136
|
+
def to_s
|
137
|
+
"File #{source_path}"
|
138
|
+
end
|
139
|
+
|
140
|
+
private
|
141
|
+
|
142
|
+
def file_permission_granted?(access_type, by_usergroup, by_specific_user)
|
143
|
+
raise '`file_permission_granted?` is not supported on your OS' if @perms_provider.nil?
|
144
|
+
if by_specific_user.nil? || by_specific_user.empty?
|
145
|
+
@perms_provider.check_file_permission_by_mask(file, access_type, by_usergroup, by_specific_user)
|
146
|
+
else
|
147
|
+
@perms_provider.check_file_permission_by_user(access_type, by_specific_user, source_path)
|
148
|
+
end
|
149
|
+
end
|
150
|
+
end
|
151
|
+
|
152
|
+
class FilePermissions
|
153
|
+
attr_reader :inspec
|
154
|
+
def initialize(inspec)
|
155
|
+
@inspec = inspec
|
156
|
+
end
|
157
|
+
end
|
158
|
+
|
159
|
+
class UnixFilePermissions < FilePermissions
|
160
|
+
def permission_flag(access_type)
|
161
|
+
case access_type
|
162
|
+
when 'read'
|
163
|
+
'r'
|
164
|
+
when 'write'
|
165
|
+
'w'
|
166
|
+
when 'execute'
|
167
|
+
'x'
|
168
|
+
else
|
169
|
+
raise 'Invalid access_type provided'
|
170
|
+
end
|
171
|
+
end
|
172
|
+
|
173
|
+
def usergroup_for(usergroup, specific_user)
|
174
|
+
if usergroup == 'others'
|
175
|
+
'other'
|
176
|
+
elsif (usergroup.nil? || usergroup.empty?) && specific_user.nil?
|
177
|
+
'all'
|
178
|
+
else
|
179
|
+
usergroup
|
180
|
+
end
|
181
|
+
end
|
182
|
+
|
183
|
+
def check_file_permission_by_mask(file, access_type, usergroup, specific_user)
|
184
|
+
usergroup = usergroup_for(usergroup, specific_user)
|
185
|
+
flag = permission_flag(access_type)
|
186
|
+
mask = file.unix_mode_mask(usergroup, flag)
|
187
|
+
raise 'Invalid usergroup/owner provided' if mask.nil?
|
188
|
+
(file.mode & mask) != 0
|
189
|
+
end
|
190
|
+
|
191
|
+
def check_file_permission_by_user(access_type, user, path)
|
192
|
+
flag = permission_flag(access_type)
|
193
|
+
if inspec.os.linux?
|
194
|
+
perm_cmd = "su -s /bin/sh -c \"test -#{flag} #{path}\" #{user}"
|
195
|
+
elsif inspec.os.bsd? || inspec.os.solaris?
|
196
|
+
perm_cmd = "sudo -u #{user} test -#{flag} #{path}"
|
197
|
+
elsif inspec.os.aix?
|
198
|
+
perm_cmd = "su #{user} -c test -#{flag} #{path}"
|
199
|
+
elsif inspec.os.hpux?
|
200
|
+
perm_cmd = "su #{user} -c \"test -#{flag} #{path}\""
|
201
|
+
else
|
202
|
+
return skip_resource 'The `file` resource does not support `by_user` on your OS.'
|
203
|
+
end
|
204
|
+
|
205
|
+
cmd = inspec.command(perm_cmd)
|
206
|
+
cmd.exit_status == 0 ? true : false
|
207
|
+
end
|
208
|
+
end
|
209
|
+
|
210
|
+
class WindowsFilePermissions < FilePermissions
|
211
|
+
def check_file_permission_by_mask(_file, _access_type, _usergroup, _specific_user)
|
212
|
+
raise '`check_file_permission_by_mask` is not supported on Windows'
|
213
|
+
end
|
214
|
+
|
215
|
+
def check_file_permission_by_user(access_type, user, path)
|
216
|
+
access_rule = translate_perm_names(access_type)
|
217
|
+
access_rule = convert_to_powershell_array(access_rule)
|
218
|
+
|
219
|
+
cmd = inspec.command("@(@((Get-Acl '#{path}').access | Where-Object {$_.AccessControlType -eq 'Allow' -and $_.IdentityReference -eq '#{user}' }) | Where-Object {($_.FileSystemRights.ToString().Split(',') | % {$_.trim()} | ? {#{access_rule} -contains $_}) -ne $null}) | measure | % { $_.Count }")
|
220
|
+
cmd.stdout.chomp == '0' ? false : true
|
221
|
+
end
|
222
|
+
|
223
|
+
private
|
224
|
+
|
225
|
+
def convert_to_powershell_array(arr)
|
226
|
+
if arr.empty?
|
227
|
+
'@()'
|
228
|
+
else
|
229
|
+
%{@('#{arr.join("', '")}')}
|
230
|
+
end
|
231
|
+
end
|
232
|
+
|
233
|
+
# Translates a developer-friendly string into a list of acceptable
|
234
|
+
# FileSystemRights that match it, because Windows has a fun heirarchy
|
235
|
+
# of permissions that are able to be noted in multiple ways.
|
236
|
+
#
|
237
|
+
# See also: https://www.codeproject.com/Reference/871338/AccessControl-FileSystemRights-Permissions-Table
|
238
|
+
def translate_perm_names(access_type)
|
239
|
+
names = translate_common_perms(access_type)
|
240
|
+
names ||= translate_granular_perms(access_type)
|
241
|
+
names ||= translate_uncommon_perms(access_type)
|
242
|
+
raise 'Invalid access_type provided' unless names
|
243
|
+
|
244
|
+
names
|
245
|
+
end
|
246
|
+
|
247
|
+
def translate_common_perms(access_type)
|
248
|
+
case access_type
|
249
|
+
when 'full-control'
|
250
|
+
%w{FullControl}
|
251
|
+
when 'modify'
|
252
|
+
translate_perm_names('full-control') + %w{Modify}
|
253
|
+
when 'read'
|
254
|
+
translate_perm_names('modify') + %w{ReadAndExecute Read}
|
255
|
+
when 'write'
|
256
|
+
translate_perm_names('modify') + %w{Write}
|
257
|
+
when 'execute'
|
258
|
+
translate_perm_names('modify') + %w{ReadAndExecute ExecuteFile Traverse}
|
259
|
+
when 'delete'
|
260
|
+
translate_perm_names('modify') + %w{Delete}
|
261
|
+
end
|
262
|
+
end
|
263
|
+
|
264
|
+
def translate_uncommon_perms(access_type)
|
265
|
+
case access_type
|
266
|
+
when 'delete-subdirectories-and-files'
|
267
|
+
translate_perm_names('full-control') + %w{DeleteSubdirectoriesAndFiles}
|
268
|
+
when 'change-permissions'
|
269
|
+
translate_perm_names('full-control') + %w{ChangePermissions}
|
270
|
+
when 'take-ownership'
|
271
|
+
translate_perm_names('full-control') + %w{TakeOwnership}
|
272
|
+
when 'synchronize'
|
273
|
+
translate_perm_names('full-control') + %w{Synchronize}
|
274
|
+
end
|
275
|
+
end
|
276
|
+
|
277
|
+
def translate_granular_perms(access_type)
|
278
|
+
case access_type
|
279
|
+
when 'write-data', 'create-files'
|
280
|
+
translate_perm_names('write') + %w{WriteData CreateFiles}
|
281
|
+
when 'append-data', 'create-directories'
|
282
|
+
translate_perm_names('write') + %w{CreateDirectories AppendData}
|
283
|
+
when 'write-extended-attributes'
|
284
|
+
translate_perm_names('write') + %w{WriteExtendedAttributes}
|
285
|
+
when 'write-attributes'
|
286
|
+
translate_perm_names('write') + %w{WriteAttributes}
|
287
|
+
when 'read-data', 'list-directory'
|
288
|
+
translate_perm_names('read') + %w{ReadData ListDirectory}
|
289
|
+
when 'read-attributes'
|
290
|
+
translate_perm_names('read') + %w{ReadAttributes}
|
291
|
+
when 'read-extended-attributes'
|
292
|
+
translate_perm_names('read') + %w{ReadExtendedAttributes}
|
293
|
+
when 'read-permissions'
|
294
|
+
translate_perm_names('read') + %w{ReadPermissions}
|
295
|
+
end
|
296
|
+
end
|
297
|
+
end
|
298
|
+
end
|