inspec/docs/resources/command.md.erb

177 lines
5 KiB
Text
Raw Normal View History

2016-09-22 12:43:57 +00:00
---
title: About the command Resource
platform: os
2016-09-22 12:43:57 +00:00
---
# command
Use the `command` InSpec audit resource to test an arbitrary command that is run on the system.
<br>
## Availability
### Installation
This resource is distributed along with InSpec itself. You can use it automatically.
### Version
This resource first became available in v1.0.0 of InSpec.
## Syntax
2016-09-22 12:43:57 +00:00
A `command` resource block declares a command to be run, one (or more) expected values, and the location to which that output is sent:
2016-09-22 12:43:57 +00:00
describe command('command') do
it { should exist }
its('property') { should eq 'value' }
2016-09-22 12:43:57 +00:00
end
where
* `'command'` must specify a command to be run
* `'property'` is one of `exit_status`, `stderr`, or `stdout`
2016-09-22 12:43:57 +00:00
* `'output'` tests the output of the command run on the system versus the output value stated in the test
<br>
2016-09-22 12:43:57 +00:00
## Property Examples
2016-09-22 12:43:57 +00:00
The following examples show how to use this InSpec audit resource.
### exit_status
2016-09-22 12:43:57 +00:00
The `exit_status` property tests the exit status for the command:
its('exit_status') { should eq 123 }
### stderr
The `stderr` property tests results of the command as returned in standard error (stderr):
its('stderr') { should eq 'error' }
### stdout
The `stdout` property tests results of the command as returned in standard output (stdout). The following example shows matching output using a regular expression:
describe command('echo 1') do
its('stdout') { should match (/[0-9]/) }
2016-09-22 12:43:57 +00:00
end
### Test standard output (stdout)
2016-09-22 12:43:57 +00:00
describe command('echo hello') do
its('stdout') { should eq "hello\n" }
2016-09-22 12:43:57 +00:00
its('stderr') { should eq '' }
its('exit_status') { should eq 0 }
end
### Test standard error (stderr)
2016-09-22 12:43:57 +00:00
describe command('>&2 echo error') do
its('stdout') { should eq '' }
its('stderr') { should eq "error\n" }
2016-09-22 12:43:57 +00:00
its('exit_status') { should eq 0 }
end
### Test an exit status code
2016-09-22 12:43:57 +00:00
describe command('exit 123') do
its('stdout') { should eq '' }
its('stderr') { should eq '' }
its('exit_status') { should eq 123 }
end
### Test if the command shell exists
2016-09-22 12:43:57 +00:00
describe command('/bin/sh').exist? do
it { should eq true }
end
### Test for a command that should not exist
2016-09-22 12:43:57 +00:00
describe command('this is not existing').exist? do
it { should eq false }
end
### Test for PostgreSQL database running a RC, development, or beta release
describe command('psql -V') do
its('stdout') { should eq '/RC/' }
its('stdout') { should_not eq '/DEVEL/' }
its('stdout') { should_not eq '/BETA/' }
end
### Verify NTP
2016-09-22 12:43:57 +00:00
The following example shows how to use the `file` audit resource to verify if the `ntp.conf` and `leap-seconds` files are present, and then the `command` resource to verify if NTP is installed and running:
describe file('/etc/ntp.conf') do
it { should be_file }
end
describe file('/etc/ntp.leapseconds') do
it { should be_file }
end
describe command('pgrep ntp') do
its('exit_status') { should eq 0 }
end
### Verify WiX
2016-09-22 12:43:57 +00:00
Wix includes several tools -- such as `candle` (preprocesses and compiles source files into object files), `light` (links and binds object files to an installer database), and `heat` (harvests files from various input formats). The following example uses a whitespace array and the `file` audit resource to verify if these three tools are present:
2016-09-22 12:43:57 +00:00
%w(
candle.exe
heat.exe
light.exe
).each do |utility|
describe file("C:/wix/##{utility}") do
2016-09-22 12:43:57 +00:00
it { should be_file }
end
end
### Redacting Sensitive Commands
By default the command that is ran is shown in the InSpec output. This can be problematic if the command contains sensitive arguments such as a password. These sensitive parts can be redacted by passing in `redact_regex` and a regular expression to redact. Optionally, you can use 2 capture groups to fine tune what is redacted.
The following examples show how to use `redact_regex`:
# Example without capture groups
describe command('myapp -p secretpassword -d no_redact', redact_regex: /-p .* -d/) do
its('exit_status') { should cmp 0 }
end
# Result (no capture groups used)
Command: `myapp REDACTED no_redact`
✔ exit_status should cmp == 0
# Example with capture groups
# Each set of parenthesis is a capture group.
# Anything in the two capture groups will not be 'REDACTED'
describe command('myapp -p secretpassword -d no_redact', redact_regex: /(-p ).*( -d)/) do
its('exit_status') { should cmp 0 }
end
# Result (capture groups used)
Command: `myapp -p REDACTED -d no_redact`
✔ exit_status should cmp == 0
> For more info/help on regular expressions, we recommend [RegExr](https://regexr.com/)
<br>
## Matchers
For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).
### exist
The `exist` matcher tests if a command may be run on the system:
it { should exist }