inspec/bin/vulcano

86 lines
2.9 KiB
Text
Raw Normal View History

#!/usr/bin/env ruby
2015-09-03 18:36:46 +00:00
# encoding: utf-8
# Copyright 2015 Dominik Richter. All rights reserved.
require 'thor'
require 'json'
require_relative '../lib/vulcano'
class VulcanoCLI < Thor
2015-09-03 18:35:23 +00:00
desc 'json PATH', 'read all tests in PATH and generate a JSON-profile'
option :output, aliases: :o, type: :string
option :print, aliases: :p, type: :boolean
option :id, type: :string
def json(*paths)
require_relative '../lib/verify'
paths.each do |path|
Vulcano::Profiles.new.valid_folder? path unless options[:print]
vc = Vulcano::Profiles.new({ quiet: options[:print], id: options[:id] })
vc.add_folder(path)
if options[:print]
2015-09-04 07:59:30 +00:00
puts JSON.pretty_generate(vc.profiles)
else
2015-09-04 07:59:30 +00:00
dst = options[:output] || File.join(path, '.vulcano.json')
2015-09-04 07:15:20 +00:00
if File.exist? dst
puts "----> updating #{dst}"
else
puts "----> creating #{dst}"
end
2015-09-04 07:15:20 +00:00
fdst = File.expand_path(dst)
File.write(fdst, JSON.dump(vc.profiles))
end
end
end
2015-09-03 18:35:23 +00:00
desc 'check PATH', 'check all tests in PATH'
def check(*paths)
require_relative '../lib/verify'
paths.each do |path|
puts "#{path}"
Vulcano::Profiles.new.valid_folder? path
puts
end
end
def self.target_options
option :target, aliases: :t, type: :string, default: nil,
desc: 'Simple targeting option using URIs, e.g. ssh://user:pass@host:port'
option :backend, aliases: :b, type: :string, default: nil,
desc: 'Choose a backend: local, ssh, winrm, docker.'
option :host, type: :string,
desc: 'Specify a remote host which is tested.'
option :port, type: :numeric,
desc: 'Specify the login port for a remote scan.'
option :user, type: :string, default: nil,
desc: 'The login user for a remote scan.'
option :password, type: :string, default: nil,
desc: 'Login password for a remote scan, if required.'
option :key_file, type: :string, default: nil,
desc: 'Login key or certificate file for a remote scan.'
option :disable_sudo, type: :boolean, default: false,
desc: 'To not run remote scans via sudo.'
option :sudo_password, type: :string, default: nil,
desc: 'Specify a sudo password, if it is required.'
option :sudo_options, type: :string, default: '',
desc: 'Additional sudo options for a remote scan.'
option :winrm_self_signed, type: :boolean, default: false,
desc: 'Allow remote scans with WinRM to run on self-signed certificates.'
option :winrm_ssl, type: :boolean, default: false,
desc: 'Configure WinRM scans to run via SSL instead of pure HTTP.'
end
2015-09-03 18:35:23 +00:00
desc 'exec PATHS', 'run all test files'
option :id, type: :string,
desc: 'Attach a profile ID to all test results'
target_options
option :format, type: :string, default: 'progress'
def exec(*tests)
runner = Vulcano::Runner.new(options)
runner.add_tests(tests)
runner.run
rescue RuntimeError => e
puts e.message
end
end
VulcanoCLI.start(ARGV)