inspec 2.1.21 → 2.1.30

Sign up to get free protection for your applications and to get access to all the features.
Files changed (502) hide show
  1. checksums.yaml +4 -4
  2. data/.rubocop.yml +101 -101
  3. data/CHANGELOG.md +3062 -3045
  4. data/Gemfile +56 -56
  5. data/LICENSE +14 -14
  6. data/MAINTAINERS.md +33 -33
  7. data/MAINTAINERS.toml +52 -52
  8. data/README.md +447 -447
  9. data/Rakefile +322 -322
  10. data/bin/inspec +12 -12
  11. data/docs/.gitignore +2 -2
  12. data/docs/README.md +40 -40
  13. data/docs/dsl_inspec.md +258 -258
  14. data/docs/dsl_resource.md +100 -100
  15. data/docs/glossary.md +99 -99
  16. data/docs/habitat.md +191 -191
  17. data/docs/inspec_and_friends.md +114 -114
  18. data/docs/matchers.md +169 -169
  19. data/docs/migration.md +293 -293
  20. data/docs/platforms.md +118 -118
  21. data/docs/plugin_kitchen_inspec.md +50 -50
  22. data/docs/profiles.md +376 -376
  23. data/docs/reporters.md +105 -105
  24. data/docs/resources/aide_conf.md.erb +75 -75
  25. data/docs/resources/apache.md.erb +67 -67
  26. data/docs/resources/apache_conf.md.erb +68 -68
  27. data/docs/resources/apt.md.erb +71 -71
  28. data/docs/resources/audit_policy.md.erb +47 -47
  29. data/docs/resources/auditd.md.erb +79 -79
  30. data/docs/resources/auditd_conf.md.erb +68 -68
  31. data/docs/resources/aws_cloudtrail_trail.md.erb +140 -140
  32. data/docs/resources/aws_cloudtrail_trails.md.erb +81 -81
  33. data/docs/resources/aws_cloudwatch_alarm.md.erb +86 -86
  34. data/docs/resources/aws_cloudwatch_log_metric_filter.md.erb +151 -151
  35. data/docs/resources/aws_config_delivery_channel.md +79 -79
  36. data/docs/resources/aws_config_recorder.md.erb +71 -71
  37. data/docs/resources/aws_ec2_instance.md.erb +106 -106
  38. data/docs/resources/aws_iam_access_key.md.erb +123 -123
  39. data/docs/resources/aws_iam_access_keys.md.erb +198 -198
  40. data/docs/resources/aws_iam_group.md.erb +46 -46
  41. data/docs/resources/aws_iam_groups.md.erb +43 -43
  42. data/docs/resources/aws_iam_password_policy.md.erb +76 -76
  43. data/docs/resources/aws_iam_policies.md.erb +82 -82
  44. data/docs/resources/aws_iam_policy.md.erb +144 -144
  45. data/docs/resources/aws_iam_role.md.erb +63 -63
  46. data/docs/resources/aws_iam_root_user.md.erb +70 -58
  47. data/docs/resources/aws_iam_user.md.erb +64 -64
  48. data/docs/resources/aws_iam_users.md.erb +89 -89
  49. data/docs/resources/aws_kms_key.md.erb +171 -171
  50. data/docs/resources/aws_kms_keys.md.erb +84 -84
  51. data/docs/resources/aws_rds_instance.md.erb +60 -60
  52. data/docs/resources/aws_route_table.md.erb +47 -47
  53. data/docs/resources/aws_route_tables.md.erb +49 -0
  54. data/docs/resources/aws_s3_bucket.md.erb +134 -134
  55. data/docs/resources/aws_s3_bucket_object.md.erb +83 -83
  56. data/docs/resources/aws_s3_buckets.md.erb +53 -0
  57. data/docs/resources/aws_security_group.md.erb +151 -151
  58. data/docs/resources/aws_security_groups.md.erb +91 -91
  59. data/docs/resources/aws_sns_subscription.md.erb +124 -124
  60. data/docs/resources/aws_sns_topic.md.erb +63 -63
  61. data/docs/resources/aws_sns_topics.md.erb +52 -52
  62. data/docs/resources/aws_subnet.md.erb +134 -134
  63. data/docs/resources/aws_subnets.md.erb +126 -126
  64. data/docs/resources/aws_vpc.md.erb +120 -120
  65. data/docs/resources/aws_vpcs.md.erb +48 -48
  66. data/docs/resources/azure_generic_resource.md.erb +171 -171
  67. data/docs/resources/azure_resource_group.md.erb +284 -284
  68. data/docs/resources/azure_virtual_machine.md.erb +347 -347
  69. data/docs/resources/azure_virtual_machine_data_disk.md.erb +224 -224
  70. data/docs/resources/bash.md.erb +75 -75
  71. data/docs/resources/bond.md.erb +90 -90
  72. data/docs/resources/bridge.md.erb +57 -57
  73. data/docs/resources/bsd_service.md.erb +67 -67
  74. data/docs/resources/chocolatey_package.md.erb +58 -0
  75. data/docs/resources/command.md.erb +138 -138
  76. data/docs/resources/cpan.md.erb +79 -79
  77. data/docs/resources/cran.md.erb +64 -64
  78. data/docs/resources/crontab.md.erb +89 -89
  79. data/docs/resources/csv.md.erb +54 -54
  80. data/docs/resources/dh_params.md.erb +205 -205
  81. data/docs/resources/directory.md.erb +30 -30
  82. data/docs/resources/docker.md.erb +219 -219
  83. data/docs/resources/docker_container.md.erb +103 -103
  84. data/docs/resources/docker_image.md.erb +94 -94
  85. data/docs/resources/docker_service.md.erb +114 -114
  86. data/docs/resources/elasticsearch.md.erb +242 -242
  87. data/docs/resources/etc_fstab.md.erb +125 -125
  88. data/docs/resources/etc_group.md.erb +75 -75
  89. data/docs/resources/etc_hosts.md.erb +78 -78
  90. data/docs/resources/etc_hosts_allow.md.erb +74 -74
  91. data/docs/resources/etc_hosts_deny.md.erb +74 -74
  92. data/docs/resources/file.md.erb +526 -526
  93. data/docs/resources/filesystem.md.erb +41 -41
  94. data/docs/resources/firewalld.md.erb +107 -107
  95. data/docs/resources/gem.md.erb +79 -79
  96. data/docs/resources/group.md.erb +61 -61
  97. data/docs/resources/grub_conf.md.erb +101 -101
  98. data/docs/resources/host.md.erb +86 -86
  99. data/docs/resources/http.md.erb +196 -196
  100. data/docs/resources/iis_app.md.erb +122 -122
  101. data/docs/resources/iis_site.md.erb +135 -135
  102. data/docs/resources/inetd_conf.md.erb +94 -94
  103. data/docs/resources/ini.md.erb +76 -76
  104. data/docs/resources/interface.md.erb +58 -58
  105. data/docs/resources/iptables.md.erb +64 -64
  106. data/docs/resources/json.md.erb +63 -63
  107. data/docs/resources/kernel_module.md.erb +120 -120
  108. data/docs/resources/kernel_parameter.md.erb +53 -53
  109. data/docs/resources/key_rsa.md.erb +85 -85
  110. data/docs/resources/launchd_service.md.erb +57 -57
  111. data/docs/resources/limits_conf.md.erb +75 -75
  112. data/docs/resources/login_defs.md.erb +71 -71
  113. data/docs/resources/mount.md.erb +69 -69
  114. data/docs/resources/mssql_session.md.erb +60 -60
  115. data/docs/resources/mysql_conf.md.erb +99 -99
  116. data/docs/resources/mysql_session.md.erb +74 -74
  117. data/docs/resources/nginx.md.erb +79 -79
  118. data/docs/resources/nginx_conf.md.erb +138 -138
  119. data/docs/resources/npm.md.erb +60 -60
  120. data/docs/resources/ntp_conf.md.erb +60 -60
  121. data/docs/resources/oneget.md.erb +53 -53
  122. data/docs/resources/oracledb_session.md.erb +52 -52
  123. data/docs/resources/os.md.erb +141 -141
  124. data/docs/resources/os_env.md.erb +78 -78
  125. data/docs/resources/package.md.erb +120 -120
  126. data/docs/resources/packages.md.erb +67 -67
  127. data/docs/resources/parse_config.md.erb +103 -103
  128. data/docs/resources/parse_config_file.md.erb +138 -138
  129. data/docs/resources/passwd.md.erb +141 -141
  130. data/docs/resources/pip.md.erb +67 -67
  131. data/docs/resources/port.md.erb +137 -137
  132. data/docs/resources/postgres_conf.md.erb +79 -79
  133. data/docs/resources/postgres_hba_conf.md.erb +93 -93
  134. data/docs/resources/postgres_ident_conf.md.erb +76 -76
  135. data/docs/resources/postgres_session.md.erb +69 -69
  136. data/docs/resources/powershell.md.erb +102 -102
  137. data/docs/resources/processes.md.erb +109 -109
  138. data/docs/resources/rabbitmq_config.md.erb +41 -41
  139. data/docs/resources/registry_key.md.erb +158 -158
  140. data/docs/resources/runit_service.md.erb +57 -57
  141. data/docs/resources/security_policy.md.erb +47 -47
  142. data/docs/resources/service.md.erb +121 -121
  143. data/docs/resources/shadow.md.erb +146 -146
  144. data/docs/resources/ssh_config.md.erb +73 -73
  145. data/docs/resources/sshd_config.md.erb +83 -83
  146. data/docs/resources/ssl.md.erb +119 -119
  147. data/docs/resources/sys_info.md.erb +42 -42
  148. data/docs/resources/systemd_service.md.erb +57 -57
  149. data/docs/resources/sysv_service.md.erb +57 -57
  150. data/docs/resources/upstart_service.md.erb +57 -57
  151. data/docs/resources/user.md.erb +140 -140
  152. data/docs/resources/users.md.erb +127 -127
  153. data/docs/resources/vbscript.md.erb +55 -55
  154. data/docs/resources/virtualization.md.erb +57 -57
  155. data/docs/resources/windows_feature.md.erb +47 -47
  156. data/docs/resources/windows_hotfix.md.erb +53 -53
  157. data/docs/resources/windows_task.md.erb +95 -95
  158. data/docs/resources/wmi.md.erb +81 -81
  159. data/docs/resources/x509_certificate.md.erb +151 -151
  160. data/docs/resources/xinetd_conf.md.erb +156 -156
  161. data/docs/resources/xml.md.erb +85 -85
  162. data/docs/resources/yaml.md.erb +69 -69
  163. data/docs/resources/yum.md.erb +98 -98
  164. data/docs/resources/zfs_dataset.md.erb +53 -53
  165. data/docs/resources/zfs_pool.md.erb +47 -47
  166. data/docs/ruby_usage.md +203 -203
  167. data/docs/shared/matcher_be.md.erb +1 -1
  168. data/docs/shared/matcher_cmp.md.erb +43 -43
  169. data/docs/shared/matcher_eq.md.erb +3 -3
  170. data/docs/shared/matcher_include.md.erb +1 -1
  171. data/docs/shared/matcher_match.md.erb +1 -1
  172. data/docs/shell.md +217 -217
  173. data/examples/README.md +8 -8
  174. data/examples/inheritance/README.md +65 -65
  175. data/examples/inheritance/controls/example.rb +14 -14
  176. data/examples/inheritance/inspec.yml +15 -15
  177. data/examples/kitchen-ansible/.kitchen.yml +25 -25
  178. data/examples/kitchen-ansible/Gemfile +19 -19
  179. data/examples/kitchen-ansible/README.md +53 -53
  180. data/examples/kitchen-ansible/files/nginx.repo +6 -6
  181. data/examples/kitchen-ansible/tasks/main.yml +16 -16
  182. data/examples/kitchen-ansible/test/integration/default/default.yml +5 -5
  183. data/examples/kitchen-ansible/test/integration/default/web_spec.rb +28 -28
  184. data/examples/kitchen-chef/.kitchen.yml +20 -20
  185. data/examples/kitchen-chef/Berksfile +3 -3
  186. data/examples/kitchen-chef/Gemfile +19 -19
  187. data/examples/kitchen-chef/README.md +27 -27
  188. data/examples/kitchen-chef/metadata.rb +7 -7
  189. data/examples/kitchen-chef/recipes/default.rb +6 -6
  190. data/examples/kitchen-chef/recipes/nginx.rb +30 -30
  191. data/examples/kitchen-chef/test/integration/default/web_spec.rb +28 -28
  192. data/examples/kitchen-puppet/.kitchen.yml +22 -22
  193. data/examples/kitchen-puppet/Gemfile +20 -20
  194. data/examples/kitchen-puppet/Puppetfile +25 -25
  195. data/examples/kitchen-puppet/README.md +53 -53
  196. data/examples/kitchen-puppet/manifests/site.pp +33 -33
  197. data/examples/kitchen-puppet/metadata.json +11 -11
  198. data/examples/kitchen-puppet/test/integration/default/web_spec.rb +28 -28
  199. data/examples/meta-profile/README.md +37 -37
  200. data/examples/meta-profile/controls/example.rb +13 -13
  201. data/examples/meta-profile/inspec.yml +13 -13
  202. data/examples/profile-attribute.yml +2 -2
  203. data/examples/profile-attribute/README.md +14 -14
  204. data/examples/profile-attribute/controls/example.rb +11 -11
  205. data/examples/profile-attribute/inspec.yml +8 -8
  206. data/examples/profile-aws/controls/iam_password_policy_expiration.rb +8 -8
  207. data/examples/profile-aws/controls/iam_password_policy_max_age.rb +8 -8
  208. data/examples/profile-aws/controls/iam_root_user_mfa.rb +8 -8
  209. data/examples/profile-aws/controls/iam_users_access_key_age.rb +8 -8
  210. data/examples/profile-aws/controls/iam_users_console_users_mfa.rb +8 -8
  211. data/examples/profile-aws/inspec.yml +11 -11
  212. data/examples/profile-azure/controls/azure_resource_group_example.rb +24 -24
  213. data/examples/profile-azure/controls/azure_vm_example.rb +29 -29
  214. data/examples/profile-azure/inspec.yml +11 -11
  215. data/examples/profile-sensitive/README.md +29 -29
  216. data/examples/profile-sensitive/controls/sensitive-failures.rb +9 -9
  217. data/examples/profile-sensitive/controls/sensitive.rb +9 -9
  218. data/examples/profile-sensitive/inspec.yml +8 -8
  219. data/examples/profile/README.md +48 -48
  220. data/examples/profile/controls/example.rb +23 -23
  221. data/examples/profile/controls/gordon.rb +36 -36
  222. data/examples/profile/controls/meta.rb +34 -34
  223. data/examples/profile/inspec.yml +10 -10
  224. data/examples/profile/libraries/gordon_config.rb +59 -53
  225. data/inspec.gemspec +47 -47
  226. data/lib/bundles/README.md +3 -3
  227. data/lib/bundles/inspec-artifact.rb +7 -7
  228. data/lib/bundles/inspec-artifact/README.md +1 -1
  229. data/lib/bundles/inspec-artifact/cli.rb +277 -277
  230. data/lib/bundles/inspec-compliance.rb +16 -16
  231. data/lib/bundles/inspec-compliance/.kitchen.yml +20 -20
  232. data/lib/bundles/inspec-compliance/README.md +185 -185
  233. data/lib/bundles/inspec-compliance/api.rb +316 -316
  234. data/lib/bundles/inspec-compliance/api/login.rb +152 -152
  235. data/lib/bundles/inspec-compliance/bootstrap.sh +41 -41
  236. data/lib/bundles/inspec-compliance/cli.rb +254 -254
  237. data/lib/bundles/inspec-compliance/configuration.rb +103 -103
  238. data/lib/bundles/inspec-compliance/http.rb +86 -86
  239. data/lib/bundles/inspec-compliance/support.rb +36 -36
  240. data/lib/bundles/inspec-compliance/target.rb +98 -98
  241. data/lib/bundles/inspec-compliance/test/integration/default/cli.rb +93 -93
  242. data/lib/bundles/inspec-habitat.rb +12 -12
  243. data/lib/bundles/inspec-habitat/cli.rb +36 -36
  244. data/lib/bundles/inspec-habitat/log.rb +10 -10
  245. data/lib/bundles/inspec-habitat/profile.rb +391 -391
  246. data/lib/bundles/inspec-init.rb +8 -8
  247. data/lib/bundles/inspec-init/README.md +31 -31
  248. data/lib/bundles/inspec-init/cli.rb +97 -97
  249. data/lib/bundles/inspec-init/templates/profile/README.md +3 -3
  250. data/lib/bundles/inspec-init/templates/profile/controls/example.rb +19 -19
  251. data/lib/bundles/inspec-init/templates/profile/inspec.yml +8 -8
  252. data/lib/bundles/inspec-supermarket.rb +13 -13
  253. data/lib/bundles/inspec-supermarket/README.md +45 -45
  254. data/lib/bundles/inspec-supermarket/api.rb +84 -84
  255. data/lib/bundles/inspec-supermarket/cli.rb +73 -73
  256. data/lib/bundles/inspec-supermarket/target.rb +34 -34
  257. data/lib/fetchers/git.rb +163 -163
  258. data/lib/fetchers/local.rb +74 -74
  259. data/lib/fetchers/mock.rb +35 -35
  260. data/lib/fetchers/url.rb +204 -204
  261. data/lib/inspec.rb +24 -24
  262. data/lib/inspec/archive/tar.rb +29 -29
  263. data/lib/inspec/archive/zip.rb +19 -19
  264. data/lib/inspec/backend.rb +93 -93
  265. data/lib/inspec/base_cli.rb +363 -357
  266. data/lib/inspec/cached_fetcher.rb +66 -66
  267. data/lib/inspec/cli.rb +292 -292
  268. data/lib/inspec/completions/bash.sh.erb +45 -45
  269. data/lib/inspec/completions/fish.sh.erb +34 -34
  270. data/lib/inspec/completions/zsh.sh.erb +61 -61
  271. data/lib/inspec/control_eval_context.rb +179 -179
  272. data/lib/inspec/dependencies/cache.rb +72 -72
  273. data/lib/inspec/dependencies/dependency_set.rb +92 -92
  274. data/lib/inspec/dependencies/lockfile.rb +115 -115
  275. data/lib/inspec/dependencies/requirement.rb +123 -123
  276. data/lib/inspec/dependencies/resolver.rb +86 -86
  277. data/lib/inspec/describe.rb +27 -27
  278. data/lib/inspec/dsl.rb +66 -66
  279. data/lib/inspec/dsl_shared.rb +33 -33
  280. data/lib/inspec/env_printer.rb +157 -157
  281. data/lib/inspec/errors.rb +14 -13
  282. data/lib/inspec/exceptions.rb +12 -12
  283. data/lib/inspec/expect.rb +45 -45
  284. data/lib/inspec/fetcher.rb +45 -45
  285. data/lib/inspec/file_provider.rb +275 -275
  286. data/lib/inspec/formatters.rb +3 -3
  287. data/lib/inspec/formatters/base.rb +259 -250
  288. data/lib/inspec/formatters/json_rspec.rb +20 -20
  289. data/lib/inspec/formatters/show_progress.rb +12 -12
  290. data/lib/inspec/library_eval_context.rb +58 -58
  291. data/lib/inspec/log.rb +11 -11
  292. data/lib/inspec/metadata.rb +247 -247
  293. data/lib/inspec/method_source.rb +24 -24
  294. data/lib/inspec/objects.rb +14 -14
  295. data/lib/inspec/objects/attribute.rb +65 -65
  296. data/lib/inspec/objects/control.rb +61 -61
  297. data/lib/inspec/objects/describe.rb +92 -92
  298. data/lib/inspec/objects/each_loop.rb +36 -36
  299. data/lib/inspec/objects/list.rb +15 -15
  300. data/lib/inspec/objects/or_test.rb +40 -40
  301. data/lib/inspec/objects/ruby_helper.rb +15 -15
  302. data/lib/inspec/objects/tag.rb +27 -27
  303. data/lib/inspec/objects/test.rb +87 -87
  304. data/lib/inspec/objects/value.rb +27 -27
  305. data/lib/inspec/plugins.rb +60 -60
  306. data/lib/inspec/plugins/cli.rb +24 -24
  307. data/lib/inspec/plugins/fetcher.rb +86 -86
  308. data/lib/inspec/plugins/resource.rb +135 -135
  309. data/lib/inspec/plugins/secret.rb +15 -15
  310. data/lib/inspec/plugins/source_reader.rb +40 -40
  311. data/lib/inspec/polyfill.rb +12 -12
  312. data/lib/inspec/profile.rb +513 -513
  313. data/lib/inspec/profile_context.rb +208 -208
  314. data/lib/inspec/profile_vendor.rb +66 -66
  315. data/lib/inspec/reporters.rb +60 -54
  316. data/lib/inspec/reporters/automate.rb +76 -0
  317. data/lib/inspec/reporters/base.rb +25 -24
  318. data/lib/inspec/reporters/cli.rb +356 -356
  319. data/lib/inspec/reporters/json.rb +116 -116
  320. data/lib/inspec/reporters/json_min.rb +48 -48
  321. data/lib/inspec/reporters/junit.rb +77 -77
  322. data/lib/inspec/require_loader.rb +33 -33
  323. data/lib/inspec/resource.rb +187 -186
  324. data/lib/inspec/rule.rb +266 -266
  325. data/lib/inspec/runner.rb +345 -345
  326. data/lib/inspec/runner_mock.rb +41 -41
  327. data/lib/inspec/runner_rspec.rb +175 -175
  328. data/lib/inspec/runtime_profile.rb +26 -26
  329. data/lib/inspec/schema.rb +213 -213
  330. data/lib/inspec/secrets.rb +19 -19
  331. data/lib/inspec/secrets/yaml.rb +30 -30
  332. data/lib/inspec/shell.rb +220 -220
  333. data/lib/inspec/shell_detector.rb +90 -90
  334. data/lib/inspec/source_reader.rb +29 -29
  335. data/lib/inspec/version.rb +8 -8
  336. data/lib/matchers/matchers.rb +339 -339
  337. data/lib/resource_support/aws.rb +49 -47
  338. data/lib/resource_support/aws/aws_backend_base.rb +12 -12
  339. data/lib/resource_support/aws/aws_backend_factory_mixin.rb +12 -12
  340. data/lib/resource_support/aws/aws_plural_resource_mixin.rb +21 -21
  341. data/lib/resource_support/aws/aws_resource_mixin.rb +66 -66
  342. data/lib/resource_support/aws/aws_singular_resource_mixin.rb +24 -24
  343. data/lib/resources/aide_conf.rb +151 -151
  344. data/lib/resources/apache.rb +48 -48
  345. data/lib/resources/apache_conf.rb +149 -149
  346. data/lib/resources/apt.rb +149 -149
  347. data/lib/resources/audit_policy.rb +63 -63
  348. data/lib/resources/auditd.rb +231 -231
  349. data/lib/resources/auditd_conf.rb +46 -46
  350. data/lib/resources/aws/aws_cloudtrail_trail.rb +77 -77
  351. data/lib/resources/aws/aws_cloudtrail_trails.rb +47 -47
  352. data/lib/resources/aws/aws_cloudwatch_alarm.rb +62 -62
  353. data/lib/resources/aws/aws_cloudwatch_log_metric_filter.rb +100 -100
  354. data/lib/resources/aws/aws_config_delivery_channel.rb +76 -76
  355. data/lib/resources/aws/aws_config_recorder.rb +98 -98
  356. data/lib/resources/aws/aws_ec2_instance.rb +157 -157
  357. data/lib/resources/aws/aws_iam_access_key.rb +106 -106
  358. data/lib/resources/aws/aws_iam_access_keys.rb +149 -149
  359. data/lib/resources/aws/aws_iam_group.rb +56 -56
  360. data/lib/resources/aws/aws_iam_groups.rb +52 -52
  361. data/lib/resources/aws/aws_iam_password_policy.rb +116 -116
  362. data/lib/resources/aws/aws_iam_policies.rb +53 -53
  363. data/lib/resources/aws/aws_iam_policy.rb +125 -125
  364. data/lib/resources/aws/aws_iam_role.rb +51 -51
  365. data/lib/resources/aws/aws_iam_root_user.rb +78 -60
  366. data/lib/resources/aws/aws_iam_user.rb +111 -111
  367. data/lib/resources/aws/aws_iam_users.rb +108 -108
  368. data/lib/resources/aws/aws_kms_key.rb +96 -96
  369. data/lib/resources/aws/aws_kms_keys.rb +53 -53
  370. data/lib/resources/aws/aws_rds_instance.rb +71 -71
  371. data/lib/resources/aws/aws_route_table.rb +63 -63
  372. data/lib/resources/aws/aws_route_tables.rb +60 -0
  373. data/lib/resources/aws/aws_s3_bucket.rb +115 -115
  374. data/lib/resources/aws/aws_s3_bucket_object.rb +82 -82
  375. data/lib/resources/aws/aws_s3_buckets.rb +51 -0
  376. data/lib/resources/aws/aws_security_group.rb +93 -93
  377. data/lib/resources/aws/aws_security_groups.rb +68 -68
  378. data/lib/resources/aws/aws_sns_subscription.rb +78 -78
  379. data/lib/resources/aws/aws_sns_topic.rb +53 -53
  380. data/lib/resources/aws/aws_sns_topics.rb +56 -56
  381. data/lib/resources/aws/aws_subnet.rb +88 -88
  382. data/lib/resources/aws/aws_subnets.rb +53 -53
  383. data/lib/resources/aws/aws_vpc.rb +69 -69
  384. data/lib/resources/aws/aws_vpcs.rb +45 -45
  385. data/lib/resources/azure/azure_backend.rb +377 -377
  386. data/lib/resources/azure/azure_generic_resource.rb +59 -59
  387. data/lib/resources/azure/azure_resource_group.rb +152 -152
  388. data/lib/resources/azure/azure_virtual_machine.rb +264 -264
  389. data/lib/resources/azure/azure_virtual_machine_data_disk.rb +134 -134
  390. data/lib/resources/bash.rb +35 -35
  391. data/lib/resources/bond.rb +69 -69
  392. data/lib/resources/bridge.rb +122 -122
  393. data/lib/resources/chocolatey_package.rb +78 -0
  394. data/lib/resources/command.rb +73 -73
  395. data/lib/resources/cpan.rb +58 -58
  396. data/lib/resources/cran.rb +64 -64
  397. data/lib/resources/crontab.rb +169 -169
  398. data/lib/resources/csv.rb +56 -56
  399. data/lib/resources/dh_params.rb +77 -77
  400. data/lib/resources/directory.rb +25 -25
  401. data/lib/resources/docker.rb +236 -236
  402. data/lib/resources/docker_container.rb +89 -89
  403. data/lib/resources/docker_image.rb +83 -83
  404. data/lib/resources/docker_object.rb +57 -57
  405. data/lib/resources/docker_service.rb +90 -90
  406. data/lib/resources/elasticsearch.rb +169 -169
  407. data/lib/resources/etc_fstab.rb +94 -94
  408. data/lib/resources/etc_group.rb +152 -152
  409. data/lib/resources/etc_hosts.rb +66 -66
  410. data/lib/resources/etc_hosts_allow_deny.rb +112 -112
  411. data/lib/resources/file.rb +298 -298
  412. data/lib/resources/filesystem.rb +31 -31
  413. data/lib/resources/firewalld.rb +143 -143
  414. data/lib/resources/gem.rb +70 -70
  415. data/lib/resources/groups.rb +215 -215
  416. data/lib/resources/grub_conf.rb +227 -227
  417. data/lib/resources/host.rb +306 -306
  418. data/lib/resources/http.rb +253 -253
  419. data/lib/resources/iis_app.rb +101 -101
  420. data/lib/resources/iis_site.rb +148 -148
  421. data/lib/resources/inetd_conf.rb +54 -54
  422. data/lib/resources/ini.rb +29 -29
  423. data/lib/resources/interface.rb +129 -129
  424. data/lib/resources/iptables.rb +80 -80
  425. data/lib/resources/json.rb +107 -107
  426. data/lib/resources/kernel_module.rb +107 -107
  427. data/lib/resources/kernel_parameter.rb +58 -58
  428. data/lib/resources/key_rsa.rb +61 -61
  429. data/lib/resources/limits_conf.rb +46 -46
  430. data/lib/resources/login_def.rb +57 -57
  431. data/lib/resources/mount.rb +88 -88
  432. data/lib/resources/mssql_session.rb +101 -101
  433. data/lib/resources/mysql.rb +82 -81
  434. data/lib/resources/mysql_conf.rb +127 -127
  435. data/lib/resources/mysql_session.rb +85 -85
  436. data/lib/resources/nginx.rb +96 -96
  437. data/lib/resources/nginx_conf.rb +226 -226
  438. data/lib/resources/npm.rb +48 -48
  439. data/lib/resources/ntp_conf.rb +51 -51
  440. data/lib/resources/oneget.rb +71 -71
  441. data/lib/resources/oracledb_session.rb +139 -139
  442. data/lib/resources/os.rb +36 -36
  443. data/lib/resources/os_env.rb +75 -75
  444. data/lib/resources/package.rb +370 -370
  445. data/lib/resources/packages.rb +111 -111
  446. data/lib/resources/parse_config.rb +112 -112
  447. data/lib/resources/passwd.rb +76 -76
  448. data/lib/resources/pip.rb +130 -130
  449. data/lib/resources/platform.rb +109 -109
  450. data/lib/resources/port.rb +771 -771
  451. data/lib/resources/postgres.rb +131 -130
  452. data/lib/resources/postgres_conf.rb +114 -114
  453. data/lib/resources/postgres_hba_conf.rb +90 -90
  454. data/lib/resources/postgres_ident_conf.rb +79 -79
  455. data/lib/resources/postgres_session.rb +71 -71
  456. data/lib/resources/powershell.rb +66 -66
  457. data/lib/resources/processes.rb +204 -204
  458. data/lib/resources/rabbitmq_conf.rb +51 -51
  459. data/lib/resources/registry_key.rb +297 -297
  460. data/lib/resources/security_policy.rb +180 -180
  461. data/lib/resources/service.rb +794 -790
  462. data/lib/resources/shadow.rb +149 -149
  463. data/lib/resources/ssh_conf.rb +97 -97
  464. data/lib/resources/ssl.rb +99 -99
  465. data/lib/resources/sys_info.rb +28 -28
  466. data/lib/resources/toml.rb +32 -32
  467. data/lib/resources/users.rb +654 -654
  468. data/lib/resources/vbscript.rb +68 -68
  469. data/lib/resources/virtualization.rb +247 -247
  470. data/lib/resources/windows_feature.rb +84 -84
  471. data/lib/resources/windows_hotfix.rb +35 -35
  472. data/lib/resources/windows_task.rb +102 -102
  473. data/lib/resources/wmi.rb +110 -110
  474. data/lib/resources/x509_certificate.rb +137 -137
  475. data/lib/resources/xinetd.rb +106 -106
  476. data/lib/resources/xml.rb +46 -46
  477. data/lib/resources/yaml.rb +43 -43
  478. data/lib/resources/yum.rb +180 -180
  479. data/lib/resources/zfs_dataset.rb +60 -60
  480. data/lib/resources/zfs_pool.rb +49 -49
  481. data/lib/source_readers/flat.rb +39 -39
  482. data/lib/source_readers/inspec.rb +75 -75
  483. data/lib/utils/command_wrapper.rb +27 -27
  484. data/lib/utils/convert.rb +12 -12
  485. data/lib/utils/database_helpers.rb +77 -77
  486. data/lib/utils/erlang_parser.rb +192 -192
  487. data/lib/utils/file_reader.rb +25 -25
  488. data/lib/utils/filter.rb +273 -273
  489. data/lib/utils/filter_array.rb +27 -27
  490. data/lib/utils/find_files.rb +44 -44
  491. data/lib/utils/hash.rb +41 -41
  492. data/lib/utils/json_log.rb +18 -18
  493. data/lib/utils/latest_version.rb +22 -22
  494. data/lib/utils/modulator.rb +12 -12
  495. data/lib/utils/nginx_parser.rb +85 -85
  496. data/lib/utils/object_traversal.rb +49 -49
  497. data/lib/utils/parser.rb +274 -274
  498. data/lib/utils/plugin_registry.rb +93 -93
  499. data/lib/utils/simpleconfig.rb +120 -120
  500. data/lib/utils/spdx.rb +13 -13
  501. data/lib/utils/spdx.txt +343 -343
  502. metadata +9 -2
@@ -1,84 +1,84 @@
1
- ---
2
- title: About the aws_kms_keys Resource
3
- platform: aws
4
- ---
5
-
6
- # aws\_kms\_keys
7
-
8
- Use the `aws_kms_keys` InSpec audit resource to test properties of some or all AWS KMS Keys.
9
-
10
- AWS Key Management Service (KMS) is a managed service that makes creating and controlling your encryption keys for your data easier. KMS uses Hardware Security Modules (HSMs) to protect the security of your keys.
11
-
12
- AWS Key Management Service is integrated with several other AWS services to help you protect the data you store with these services.
13
-
14
- Each AWS KMS Key is uniquely identified by its key-id or key-arn.
15
-
16
- <br>
17
-
18
- ## Syntax
19
-
20
- An `aws_kms_keys` resource block uses an optional filter to select a group of KMS Keys and then tests that group.
21
-
22
- # Verify the number of KMS keys in the AWS account
23
- describe aws_kms_keys do
24
- its('entries.count') { should cmp 10 }
25
- end
26
-
27
- <br>
28
-
29
- ## Examples
30
-
31
- The following examples show how to use this InSpec audit resource.
32
-
33
- As this is the initial release of `aws_kms_keys`, its limited functionality precludes examples.
34
-
35
- <br>
36
-
37
- ## Properties
38
-
39
- * `entries`, `key_arns`, `key_ids`
40
-
41
- <br>
42
-
43
- ## Property Examples
44
-
45
- ### entries
46
-
47
- Provides access to the raw results of a query. This can be useful for checking counts and other advanced operations.
48
-
49
- # Allow at most 100 KMS Keys on the account
50
- describe aws_kms_keys do
51
- its('entries.count') { should be <= 100}
52
- end
53
-
54
- ### key\_arns
55
-
56
- Provides a list of key arns for all KMS Keys in the AWS account.
57
-
58
- describe aws_kms_keys do
59
- its('key_arns') { should include('arn:aws:kms:us-east-1::key/key-id') }
60
- end
61
-
62
- ### key\_ids
63
-
64
- Provides a list of key ids for all KMS Keys in the AWS account.
65
-
66
- describe aws_kms_keys do
67
- its('key_ids') { should include('fd7e608b-f435-4186-b8b5-111111111111') }
68
- end
69
-
70
- <br>
71
-
72
- ## Matchers
73
-
74
- This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).
75
-
76
- ### exists
77
-
78
- The control will pass if the filter returns at least one result. Use `should_not` if you expect zero matches.
79
-
80
- # Verify that at least one KMS Key exists.
81
- describe aws_kms_keys
82
- it { should exist }
83
- end
84
-
1
+ ---
2
+ title: About the aws_kms_keys Resource
3
+ platform: aws
4
+ ---
5
+
6
+ # aws\_kms\_keys
7
+
8
+ Use the `aws_kms_keys` InSpec audit resource to test properties of some or all AWS KMS Keys.
9
+
10
+ AWS Key Management Service (KMS) is a managed service that makes creating and controlling your encryption keys for your data easier. KMS uses Hardware Security Modules (HSMs) to protect the security of your keys.
11
+
12
+ AWS Key Management Service is integrated with several other AWS services to help you protect the data you store with these services.
13
+
14
+ Each AWS KMS Key is uniquely identified by its key-id or key-arn.
15
+
16
+ <br>
17
+
18
+ ## Syntax
19
+
20
+ An `aws_kms_keys` resource block uses an optional filter to select a group of KMS Keys and then tests that group.
21
+
22
+ # Verify the number of KMS keys in the AWS account
23
+ describe aws_kms_keys do
24
+ its('entries.count') { should cmp 10 }
25
+ end
26
+
27
+ <br>
28
+
29
+ ## Examples
30
+
31
+ The following examples show how to use this InSpec audit resource.
32
+
33
+ As this is the initial release of `aws_kms_keys`, its limited functionality precludes examples.
34
+
35
+ <br>
36
+
37
+ ## Properties
38
+
39
+ * `entries`, `key_arns`, `key_ids`
40
+
41
+ <br>
42
+
43
+ ## Property Examples
44
+
45
+ ### entries
46
+
47
+ Provides access to the raw results of a query. This can be useful for checking counts and other advanced operations.
48
+
49
+ # Allow at most 100 KMS Keys on the account
50
+ describe aws_kms_keys do
51
+ its('entries.count') { should be <= 100}
52
+ end
53
+
54
+ ### key\_arns
55
+
56
+ Provides a list of key arns for all KMS Keys in the AWS account.
57
+
58
+ describe aws_kms_keys do
59
+ its('key_arns') { should include('arn:aws:kms:us-east-1::key/key-id') }
60
+ end
61
+
62
+ ### key\_ids
63
+
64
+ Provides a list of key ids for all KMS Keys in the AWS account.
65
+
66
+ describe aws_kms_keys do
67
+ its('key_ids') { should include('fd7e608b-f435-4186-b8b5-111111111111') }
68
+ end
69
+
70
+ <br>
71
+
72
+ ## Matchers
73
+
74
+ This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).
75
+
76
+ ### exists
77
+
78
+ The control will pass if the filter returns at least one result. Use `should_not` if you expect zero matches.
79
+
80
+ # Verify that at least one KMS Key exists.
81
+ describe aws_kms_keys
82
+ it { should exist }
83
+ end
84
+
@@ -1,60 +1,60 @@
1
- ---
2
- title: About the aws_rds_instance Resource
3
- ---
4
-
5
- # aws\_rds\_instance
6
-
7
- Use the `aws_rds_instance` InSpec audit resource to test detailed properties of an individual RDS instance.
8
-
9
- RDS gives you access to the capabilities of a MySQL, MariaDB, PostgreSQL, Microsoft SQL Server, Oracle, or Amazon Aurora database server.
10
-
11
- <br>
12
-
13
- ## Syntax
14
-
15
- An `aws_rds_instance` resource block uses resource parameters to search for an RDS instance, and then tests that RDS instance. If no RDS instances match, no error is raised, but the `exists` matcher will return `false` and all properties will be `nil`. If more than one RDS instance matches (due to vague search parameters), an error is raised.
16
-
17
- # Ensure you have a RDS instance with a certain ID
18
- # This is "safe" - RDS IDs are unique within an account
19
- describe aws_rds_instance('test-instance-id') do
20
- it { should exist }
21
- end
22
-
23
- # Ensure you have a RDS instance with a certain ID
24
- # This uses hash syntax
25
- describe aws_rds_instance(db_instance_identifier: 'test-instance-id') do
26
- it { should exist }
27
- end
28
-
29
- <br>
30
-
31
- ## Examples
32
-
33
- The following examples show how to use this InSpec audit resource.
34
-
35
- As this is the initial release of `aws_rds_instance`, its limited functionality precludes examples.
36
-
37
- <br>
38
-
39
- ## Resource Parameters
40
-
41
- This InSpec resource accepts the following parameters, which are used to search for the RDS instance.
42
-
43
- ### exists
44
-
45
- The control will pass if the specified RDS instance was found. Use should_not if you want to verify that the specified RDS instance does not exist.
46
-
47
- # Using Hash syntax
48
- describe aws_rds_instance(db_instance_identifier: 'test-instance-id') do
49
- it { should exist }
50
- end
51
-
52
- # Using the instance id directly from the terraform file
53
- describe aws_rds_instance(fixtures['rds_db_instance_id']) do
54
- it { should exist }
55
- end
56
-
57
- # Make sure we don't have any RDS instances with the name 'nogood'
58
- describe aws_rds_instance('nogood') do
59
- it { should_not exist }
60
- end
1
+ ---
2
+ title: About the aws_rds_instance Resource
3
+ ---
4
+
5
+ # aws\_rds\_instance
6
+
7
+ Use the `aws_rds_instance` InSpec audit resource to test detailed properties of an individual RDS instance.
8
+
9
+ RDS gives you access to the capabilities of a MySQL, MariaDB, PostgreSQL, Microsoft SQL Server, Oracle, or Amazon Aurora database server.
10
+
11
+ <br>
12
+
13
+ ## Syntax
14
+
15
+ An `aws_rds_instance` resource block uses resource parameters to search for an RDS instance, and then tests that RDS instance. If no RDS instances match, no error is raised, but the `exists` matcher will return `false` and all properties will be `nil`. If more than one RDS instance matches (due to vague search parameters), an error is raised.
16
+
17
+ # Ensure you have a RDS instance with a certain ID
18
+ # This is "safe" - RDS IDs are unique within an account
19
+ describe aws_rds_instance('test-instance-id') do
20
+ it { should exist }
21
+ end
22
+
23
+ # Ensure you have a RDS instance with a certain ID
24
+ # This uses hash syntax
25
+ describe aws_rds_instance(db_instance_identifier: 'test-instance-id') do
26
+ it { should exist }
27
+ end
28
+
29
+ <br>
30
+
31
+ ## Examples
32
+
33
+ The following examples show how to use this InSpec audit resource.
34
+
35
+ As this is the initial release of `aws_rds_instance`, its limited functionality precludes examples.
36
+
37
+ <br>
38
+
39
+ ## Resource Parameters
40
+
41
+ This InSpec resource accepts the following parameters, which are used to search for the RDS instance.
42
+
43
+ ### exists
44
+
45
+ The control will pass if the specified RDS instance was found. Use should_not if you want to verify that the specified RDS instance does not exist.
46
+
47
+ # Using Hash syntax
48
+ describe aws_rds_instance(db_instance_identifier: 'test-instance-id') do
49
+ it { should exist }
50
+ end
51
+
52
+ # Using the instance id directly from the terraform file
53
+ describe aws_rds_instance(fixtures['rds_db_instance_id']) do
54
+ it { should exist }
55
+ end
56
+
57
+ # Make sure we don't have any RDS instances with the name 'nogood'
58
+ describe aws_rds_instance('nogood') do
59
+ it { should_not exist }
60
+ end
@@ -1,47 +1,47 @@
1
- ---
2
- title: About the aws_route_table Resource
3
- platform: aws
4
- ---
5
-
6
- # aws\_route\_table
7
-
8
- Use the `aws_route_table` InSpec audit resource to test properties of a single Route Table. A route table contains a set of rules, called routes, that are used to determine where network traffic is directed.
9
-
10
- <br>
11
-
12
- ## Syntax
13
-
14
- # Ensure that a certain route table exists by name
15
- describe aws_route_table('rtb-123abcde') do
16
- it { should exist }
17
- end
18
-
19
- ## Resource Parameters
20
-
21
- ### route\_table\_id
22
-
23
- This resource expects a single parameter that uniquely identifies the Route Table. You may pass it as a string, or as the value in a hash:
24
-
25
- describe aws_route_table('rtb-123abcde') do
26
- it { should exist }
27
- end
28
- # Same
29
- describe aws_route_table(route_table_id: 'rtb-123abcde') do
30
- it { should exist }
31
- end
32
-
33
- ## Matchers
34
-
35
- For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).
36
-
37
- ### exist
38
-
39
- Indicates that the Route Table provided was found. Use `should_not` to test for Route Tables that should not exist.
40
-
41
- describe aws_route_table('should-be-there') do
42
- it { should exist }
43
- end
44
-
45
- describe aws_route_table('should-not-be-there') do
46
- it { should_not exist }
47
- end
1
+ ---
2
+ title: About the aws_route_table Resource
3
+ platform: aws
4
+ ---
5
+
6
+ # aws\_route\_table
7
+
8
+ Use the `aws_route_table` InSpec audit resource to test properties of a single Route Table. A route table contains a set of rules, called routes, that are used to determine where network traffic is directed.
9
+
10
+ <br>
11
+
12
+ ## Syntax
13
+
14
+ # Ensure that a certain route table exists by name
15
+ describe aws_route_table('rtb-123abcde') do
16
+ it { should exist }
17
+ end
18
+
19
+ ## Resource Parameters
20
+
21
+ ### route\_table\_id
22
+
23
+ This resource expects a single parameter that uniquely identifies the Route Table. You may pass it as a string, or as the value in a hash:
24
+
25
+ describe aws_route_table('rtb-123abcde') do
26
+ it { should exist }
27
+ end
28
+ # Same
29
+ describe aws_route_table(route_table_id: 'rtb-123abcde') do
30
+ it { should exist }
31
+ end
32
+
33
+ ## Matchers
34
+
35
+ For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).
36
+
37
+ ### exist
38
+
39
+ Indicates that the Route Table provided was found. Use `should_not` to test for Route Tables that should not exist.
40
+
41
+ describe aws_route_table('should-be-there') do
42
+ it { should exist }
43
+ end
44
+
45
+ describe aws_route_table('should-not-be-there') do
46
+ it { should_not exist }
47
+ end
@@ -0,0 +1,49 @@
1
+ ---
2
+ title: About the aws_route_tables Resource
3
+ ---
4
+
5
+ # aws\_route\_table
6
+
7
+ Use the `aws_route_tables` InSpec audit resource to test properties of all or a group of Route Tables. A Route Table contains a set of rules, called routes, that are used to determine where network traffic is directed.
8
+
9
+ <br>
10
+
11
+ ## Syntax
12
+
13
+ # Ensure that there is at least one route table
14
+ describe aws_route_tables do
15
+ it { should exist }
16
+ end
17
+
18
+ ## Matchers
19
+
20
+ ### exist
21
+
22
+ Indicates that at least one Route Table was found. Use should_not to test that no Route Tables should exist.
23
+
24
+ describe aws_route_tables do
25
+ it { should exist }
26
+ end
27
+
28
+ describe aws_route_tables do
29
+ it { should_not exist }
30
+ end
31
+
32
+ ## Properties
33
+
34
+ ### vpc\_ids
35
+
36
+ Lists all VPCs that are in the Route Tables.
37
+
38
+ describe aws_route_tables do
39
+ its('vpc_ids') { should include 'vpc_12345678' }
40
+ end
41
+
42
+
43
+ ### route\_table\_ids
44
+
45
+ Lists all of the Route Table IDs.
46
+
47
+ describe aws_route_tables do
48
+ its('route_table_ids') { should include 'rtb-12345678' }
49
+ end
@@ -1,134 +1,134 @@
1
- ---
2
- title: About the aws_s3_bucket Resource
3
- platform: aws
4
- ---
5
-
6
- # aws\_s3\_bucket
7
-
8
- Use the `aws_s3_bucket` InSpec audit resource to test properties of a single AWS bucket.
9
-
10
- To test properties of a multiple S3 buckets, use the `aws_s3_buckets` resource.
11
-
12
- <br>
13
-
14
- ## Limitations
15
-
16
- S3 bucket security is a complex matter. For details on how AWS evaluates requests for access, please see [the AWS documentation](https://docs.aws.amazon.com/AmazonS3/latest/dev/how-s3-evaluates-access-control.html). S3 buckets and the objects they contain support three different types of access control: bucket ACLs, bucket policies, and object ACLs.
17
-
18
- As of January 2018, this resource supports evaluating bucket ACLs and bucket policies. We do not support evaluating object ACLs because it introduces scalability concerns in the AWS API; we recommend using AWS mechanisms such as CloudTrail and Config to detect insecure object ACLs.
19
-
20
- In particular, users of the `be_public` matcher should carefully examine the conditions under which the matcher will detect an insecure bucket. See the `be_public` section under the Matchers section below.
21
-
22
- <br>
23
-
24
- ## Syntax
25
-
26
- An `aws_s3_bucket` resource block declares a bucket by name, and then lists tests to be performed.
27
-
28
- describe aws_s3_bucket(bucket_name: 'test_bucket') do
29
- it { should exist }
30
- it { should_not be_public }
31
- end
32
-
33
- describe aws_s3_bucket('test_bucket') do
34
- it { should exist }
35
- end
36
-
37
- <br>
38
-
39
- ## Examples
40
-
41
- The following examples show how to use this InSpec audit resource.
42
-
43
- ### Test the bucket-level ACL
44
-
45
- describe aws_s3_bucket('test_bucket') do
46
- its('bucket_acl.count') { should eq 1 }
47
- end
48
-
49
- ### Check if a bucket has a bucket policy
50
-
51
- describe aws_s3_bucket('test_bucket') do
52
- its('bucket_policy') { should be_empty }
53
- end
54
-
55
- ### Check if a bucket appears to be exposed to the public
56
-
57
- # See Limitations section above
58
- describe aws_s3_bucket('test_bucket') do
59
- it { should_not be_public }
60
- end
61
- <br>
62
-
63
- ## Properties
64
-
65
- ### region
66
-
67
- The `region` property identifies the AWS Region in which the S3 bucket is located.
68
-
69
- describe aws_s3_bucket('test_bucket') do
70
- # Check if the correct region is set
71
- its('region') { should eq 'us-east-1' }
72
- end
73
-
74
- ## Unsupported Properties
75
-
76
- ### bucket\_acl
77
-
78
- The `bucket_acl` property is a low-level property that lists the individual Bucket ACL grants in effect on the bucket. Other higher-level properties, such as be\_public, are more concise and easier to use. You can use the `bucket_acl` property to investigate which grants are in effect, causing be\_public to fail.
79
-
80
- The value of bucket_acl is an array of simple objects. Each object has a `permission` property and a `grantee` property. The `permission` property will be a string such as 'READ', 'WRITE' etc (See the [AWS documentation](https://docs.aws.amazon.com/sdkforruby/api/Aws/S3/Client.html#get_bucket_acl-instance_method) for a full list). The `grantee` property contains sub-properties, such as `type` and `uri`.
81
-
82
-
83
- bucket_acl = aws_s3_bucket('my-bucket')
84
-
85
- # Look for grants to "AllUsers" (that is, the public)
86
- all_users_grants = bucket_acl.select do |g|
87
- g.grantee.type == 'Group' && g.grantee.uri =~ /AllUsers/
88
- end
89
-
90
- # Look for grants to "AuthenticatedUsers" (that is, any authenticated AWS user - nearly public)
91
- auth_grants = bucket_acl.select do |g|
92
- g.grantee.type == 'Group' && g.grantee.uri =~ /AuthenticatedUsers/
93
- end
94
-
95
- ### bucket\_policy
96
-
97
- The `bucket_policy` is a low-level property that describes the IAM policy document controlling access to the bucket. The `bucket_policy` property returns a Ruby structure that you can probe to check for particular statements. We recommend using a higher-level property, such as `be_public`, which is concise and easier to implement in your policy files.
98
-
99
- The `bucket_policy` property returns an array of simple objects, each object being an IAM Policy Statement. See the [AWS documentation](https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html#example-bucket-policies-use-case-2) for details about the structure of this data.
100
-
101
- If there is no bucket policy, this property returns an empty array.
102
-
103
- bucket_policy = aws_s3_bucket('my-bucket')
104
-
105
- # Look for statements that allow the general public to do things
106
- # This may be a false positive; it is possible these statements
107
- # could be protected by conditions, such as IP restrictions.
108
- public_statements = bucket_policy.select do |s|
109
- s.effect == 'Allow' && s.principal == '*'
110
- end
111
-
112
- <br>
113
-
114
- ## Matchers
115
-
116
- This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).
117
-
118
- ### be\_public
119
-
120
- The `be_public` matcher tests if the bucket has potentially insecure access controls. This high-level matcher detects several insecure conditions, which may be enhanced in the future. Currently, the matcher reports an insecure bucket if any of the following conditions are met:
121
-
122
- 1. A bucket ACL grant exists for the 'AllUsers' group
123
- 2. A bucket ACL grant exists for the 'AuthenticatedUsers' group
124
- 3. A bucket policy has an effect 'Allow' and principal '*'
125
-
126
- Note: This resource does not detect insecure object ACLs.
127
-
128
- it { should_not be_public }
129
-
130
- ### have\_access\_logging\_enabled
131
-
132
- The `have_access_logging_enabled` matcher tests if access logging is enabled for the s3 bucket.
133
-
134
- it { should have_access_logging_enabled }
1
+ ---
2
+ title: About the aws_s3_bucket Resource
3
+ platform: aws
4
+ ---
5
+
6
+ # aws\_s3\_bucket
7
+
8
+ Use the `aws_s3_bucket` InSpec audit resource to test properties of a single AWS bucket.
9
+
10
+ To test properties of a multiple S3 buckets, use the `aws_s3_buckets` resource.
11
+
12
+ <br>
13
+
14
+ ## Limitations
15
+
16
+ S3 bucket security is a complex matter. For details on how AWS evaluates requests for access, please see [the AWS documentation](https://docs.aws.amazon.com/AmazonS3/latest/dev/how-s3-evaluates-access-control.html). S3 buckets and the objects they contain support three different types of access control: bucket ACLs, bucket policies, and object ACLs.
17
+
18
+ As of January 2018, this resource supports evaluating bucket ACLs and bucket policies. We do not support evaluating object ACLs because it introduces scalability concerns in the AWS API; we recommend using AWS mechanisms such as CloudTrail and Config to detect insecure object ACLs.
19
+
20
+ In particular, users of the `be_public` matcher should carefully examine the conditions under which the matcher will detect an insecure bucket. See the `be_public` section under the Matchers section below.
21
+
22
+ <br>
23
+
24
+ ## Syntax
25
+
26
+ An `aws_s3_bucket` resource block declares a bucket by name, and then lists tests to be performed.
27
+
28
+ describe aws_s3_bucket(bucket_name: 'test_bucket') do
29
+ it { should exist }
30
+ it { should_not be_public }
31
+ end
32
+
33
+ describe aws_s3_bucket('test_bucket') do
34
+ it { should exist }
35
+ end
36
+
37
+ <br>
38
+
39
+ ## Examples
40
+
41
+ The following examples show how to use this InSpec audit resource.
42
+
43
+ ### Test the bucket-level ACL
44
+
45
+ describe aws_s3_bucket('test_bucket') do
46
+ its('bucket_acl.count') { should eq 1 }
47
+ end
48
+
49
+ ### Check if a bucket has a bucket policy
50
+
51
+ describe aws_s3_bucket('test_bucket') do
52
+ its('bucket_policy') { should be_empty }
53
+ end
54
+
55
+ ### Check if a bucket appears to be exposed to the public
56
+
57
+ # See Limitations section above
58
+ describe aws_s3_bucket('test_bucket') do
59
+ it { should_not be_public }
60
+ end
61
+ <br>
62
+
63
+ ## Properties
64
+
65
+ ### region
66
+
67
+ The `region` property identifies the AWS Region in which the S3 bucket is located.
68
+
69
+ describe aws_s3_bucket('test_bucket') do
70
+ # Check if the correct region is set
71
+ its('region') { should eq 'us-east-1' }
72
+ end
73
+
74
+ ## Unsupported Properties
75
+
76
+ ### bucket\_acl
77
+
78
+ The `bucket_acl` property is a low-level property that lists the individual Bucket ACL grants in effect on the bucket. Other higher-level properties, such as be\_public, are more concise and easier to use. You can use the `bucket_acl` property to investigate which grants are in effect, causing be\_public to fail.
79
+
80
+ The value of bucket_acl is an array of simple objects. Each object has a `permission` property and a `grantee` property. The `permission` property will be a string such as 'READ', 'WRITE' etc (See the [AWS documentation](https://docs.aws.amazon.com/sdkforruby/api/Aws/S3/Client.html#get_bucket_acl-instance_method) for a full list). The `grantee` property contains sub-properties, such as `type` and `uri`.
81
+
82
+
83
+ bucket_acl = aws_s3_bucket('my-bucket')
84
+
85
+ # Look for grants to "AllUsers" (that is, the public)
86
+ all_users_grants = bucket_acl.select do |g|
87
+ g.grantee.type == 'Group' && g.grantee.uri =~ /AllUsers/
88
+ end
89
+
90
+ # Look for grants to "AuthenticatedUsers" (that is, any authenticated AWS user - nearly public)
91
+ auth_grants = bucket_acl.select do |g|
92
+ g.grantee.type == 'Group' && g.grantee.uri =~ /AuthenticatedUsers/
93
+ end
94
+
95
+ ### bucket\_policy
96
+
97
+ The `bucket_policy` is a low-level property that describes the IAM policy document controlling access to the bucket. The `bucket_policy` property returns a Ruby structure that you can probe to check for particular statements. We recommend using a higher-level property, such as `be_public`, which is concise and easier to implement in your policy files.
98
+
99
+ The `bucket_policy` property returns an array of simple objects, each object being an IAM Policy Statement. See the [AWS documentation](https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html#example-bucket-policies-use-case-2) for details about the structure of this data.
100
+
101
+ If there is no bucket policy, this property returns an empty array.
102
+
103
+ bucket_policy = aws_s3_bucket('my-bucket')
104
+
105
+ # Look for statements that allow the general public to do things
106
+ # This may be a false positive; it is possible these statements
107
+ # could be protected by conditions, such as IP restrictions.
108
+ public_statements = bucket_policy.select do |s|
109
+ s.effect == 'Allow' && s.principal == '*'
110
+ end
111
+
112
+ <br>
113
+
114
+ ## Matchers
115
+
116
+ This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).
117
+
118
+ ### be\_public
119
+
120
+ The `be_public` matcher tests if the bucket has potentially insecure access controls. This high-level matcher detects several insecure conditions, which may be enhanced in the future. Currently, the matcher reports an insecure bucket if any of the following conditions are met:
121
+
122
+ 1. A bucket ACL grant exists for the 'AllUsers' group
123
+ 2. A bucket ACL grant exists for the 'AuthenticatedUsers' group
124
+ 3. A bucket policy has an effect 'Allow' and principal '*'
125
+
126
+ Note: This resource does not detect insecure object ACLs.
127
+
128
+ it { should_not be_public }
129
+
130
+ ### have\_access\_logging\_enabled
131
+
132
+ The `have_access_logging_enabled` matcher tests if access logging is enabled for the s3 bucket.
133
+
134
+ it { should have_access_logging_enabled }