kube_auto_analyzer 0.0.8 → 0.0.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 477ad0c2cb8e8a489cc6901f90534ef368b3baa1
4
- data.tar.gz: ff57249d3d80cf7f62b86aa760eed5386765b4e0
3
+ metadata.gz: 074921cde562a30edcc22e129010ab6823d688ca
4
+ data.tar.gz: 4412d5f1123ce2c48a032a442110415a616cc165
5
5
  SHA512:
6
- metadata.gz: 1628d35f5c38de533b99979d060f1cb18f70853c36a983c6bc16076f201fe675c3c4460d287bd90ddb0ef9c7c451fcfc694751e4d527190fe1342203fdef7368
7
- data.tar.gz: 9550f88df01e83f67a24dc4b18b186186a9a7642187d80e67e7aa766fcf5cb3fb489711921d556dca6c86c2fb4705be953d28dabb78e66b4b9d69020dcba836a
6
+ metadata.gz: b5c474423ef3a59932bb5b8743465ef7a7ed2611c926ed322741e868c44491f18403023c96c913b39d269183624b346f4513c26910f488c5bc382ce00fb9a32f
7
+ data.tar.gz: a572a61904ebdd781ddb6bb77fbde2f143533b7d89ec79247c13c70a986a0e918a7470937a18c3885d5b8eb1a6daba0bd545fc3d555c60686b8b988425ada4b4
@@ -189,6 +189,71 @@ module KubeAutoAnalyzer
189
189
  end
190
190
  @html_report_file.puts "</table>"
191
191
 
192
+ #Show what cluster authentication modes are supported.
193
+ @html_report_file.puts "<br><br>"
194
+ @html_report_file.puts "<br><br><h2>Kubernetes Authentication Options</h2>"
195
+ @html_report_file.puts "<table><thead><tr><th>Authentication Option</th><th>Enabled?</th></tr></thead>"
196
+ if @results[@options.target_server]['api_server']['CIS 1.1.2 - Ensure that the --basic-auth-file argument is not set'] == "Fail"
197
+ @html_report_file.puts "<tr><td>Basic Authentication</td><td>Enabled</td></tr>"
198
+ else
199
+ @html_report_file.puts "<tr><td>Basic Authentication</td><td>Disabled</td></tr>"
200
+ end
201
+ if @results[@options.target_server]['api_server']['CIS 1.1.20 - Ensure that the --token-auth-file argument is not set'] == "Fail"
202
+ @html_report_file.puts "<tr><td>Token Authentication</td><td>Enabled</td></tr>"
203
+ else
204
+ @html_report_file.puts "<tr><td>Token Authentication</td><td>Disabled</td></tr>"
205
+ end
206
+ if @results[@options.target_server]['api_server']['CIS 1.1.29 - Ensure that the --client-ca-file argument is set as appropriate'] == "Pass"
207
+ @html_report_file.puts "<tr><td>Client Certificate Authentication</td><td>Enabled</td></tr>"
208
+ else
209
+ @html_report_file.puts "<tr><td>Client Certificate Authentication</td><td>Disabled</td></tr>"
210
+ end
211
+
212
+ if @results[@options.target_server]['evidence']['API Server'].index{|line| line =~ /--oidc-issuer-url/}
213
+ @html_report_file.puts "<tr><td>OpenID Connect Authentication</td><td>Enabled</td></tr>"
214
+ else
215
+ @html_report_file.puts "<tr><td>OpenID Connect Authentication</td><td>Disabled</td></tr>"
216
+ end
217
+
218
+ if @results[@options.target_server]['evidence']['API Server'].index{|line| line =~ /--authentication-token-webhook-config-file/}
219
+ @html_report_file.puts "<tr><td>Webhook Authentication</td><td>Enabled</td></tr>"
220
+ else
221
+ @html_report_file.puts "<tr><td>Webhook Authentication</td><td>Disabled</td></tr>"
222
+ end
223
+
224
+ if @results[@options.target_server]['evidence']['API Server'].index{|line| line =~ /--requestheader-username-headers/}
225
+ @html_report_file.puts "<tr><td>Proxy Authentication</td><td>Enabled</td></tr>"
226
+ else
227
+ @html_report_file.puts "<tr><td>Proxy Authentication</td><td>Disabled</td></tr>"
228
+ end
229
+
230
+ @html_report_file.puts "</table>"
231
+
232
+ #Show what cluster authorization modes are supported.
233
+ @html_report_file.puts "<br><br>"
234
+ @html_report_file.puts "<br><br><h2>Kubernetes Authorization Options</h2>"
235
+ @html_report_file.puts "<table><thead><tr><th>Authorization Option</th><th>Enabled?</th></tr></thead>"
236
+
237
+ if @results[@options.target_server]['evidence']['API Server'].index{|line| line =~ /--authorization-mode\S*RBAC/}
238
+ @html_report_file.puts "<tr><td>Role Based Authorization</td><td>Enabled</td></tr>"
239
+ else
240
+ @html_report_file.puts "<tr><td>Role Based Authorization</td><td>Disabled</td></tr>"
241
+ end
242
+
243
+ if @results[@options.target_server]['evidence']['API Server'].index{|line| line =~ /--authorization-mode\S*ABAC/}
244
+ @html_report_file.puts "<tr><td>Attribute Based Authorization</td><td>Enabled</td></tr>"
245
+ else
246
+ @html_report_file.puts "<tr><td>Attribute Based Authorization</td><td>Disabled</td></tr>"
247
+ end
248
+
249
+ if @results[@options.target_server]['evidence']['API Server'].index{|line| line =~ /--authorization-mode\S*Webhook/}
250
+ @html_report_file.puts "<tr><td>Webhook Authorization</td><td>Enabled</td></tr>"
251
+ else
252
+ @html_report_file.puts "<tr><td>Webhook Authorization</td><td>Disabled</td></tr>"
253
+ end
254
+
255
+ @html_report_file.puts "</table>"
256
+
192
257
  @html_report_file.puts "<br><br><h2>Evidence</h2><br>"
193
258
  @html_report_file.puts "<table><thead><tr><th>Area</th><th>Output</th></tr></thead>"
194
259
  @results[@options.target_server]['evidence'].each do |area, output|
@@ -1,3 +1,3 @@
1
1
  module KubeAutoAnalyzer
2
- VERSION = "0.0.8"
2
+ VERSION = "0.0.9"
3
3
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: kube_auto_analyzer
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.8
4
+ version: 0.0.9
5
5
  platform: ruby
6
6
  authors:
7
7
  - Rory McCune
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2017-11-03 00:00:00.000000000 Z
11
+ date: 2017-11-29 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bundler