2016-04-20 04:50:18 +00:00
# encoding: utf-8
# author: Dominik Richter
# author: Christoph Hartmann
require 'functional/helper'
2017-03-14 15:50:10 +00:00
require 'jsonschema'
2016-04-20 04:50:18 +00:00
2016-05-04 15:32:42 +00:00
describe 'inspec exec with json formatter' do
2016-04-20 04:50:18 +00:00
include FunctionalHelper
2017-03-14 15:50:10 +00:00
it 'can execute a simple file and validate the json schema' do
2018-02-08 09:06:58 +00:00
out = inspec ( 'exec ' + example_control + ' --reporter json --no-create-lockfile' )
2016-04-20 04:50:18 +00:00
out . stderr . must_equal ''
out . exit_status . must_equal 0
2017-03-14 15:50:10 +00:00
data = JSON . parse ( out . stdout )
sout = inspec ( 'schema exec-json' )
schema = JSON . parse ( sout . stdout )
JSON :: Schema . validate ( data , schema )
2016-04-20 04:50:18 +00:00
end
2017-03-14 15:50:10 +00:00
it 'can execute a profile and validate the json schema' do
2018-02-08 09:06:58 +00:00
out = inspec ( 'exec ' + example_profile + ' --reporter json --no-create-lockfile' )
2016-04-20 04:50:18 +00:00
out . stderr . must_equal ''
2018-02-14 16:54:20 +00:00
out . exit_status . must_equal 101
2017-03-14 15:50:10 +00:00
data = JSON . parse ( out . stdout )
sout = inspec ( 'schema exec-json' )
schema = JSON . parse ( sout . stdout )
JSON :: Schema . validate ( data , schema )
2016-04-20 04:50:18 +00:00
end
2018-09-05 19:07:34 +00:00
it 'can execute a profile and validate the json schema with target_id' do
out = inspec ( 'exec ' + example_profile + ' --reporter json --no-create-lockfile --target-id 1d3e399f-4d71-4863-ac54-84d437fbc444' )
out . stderr . must_equal ''
out . exit_status . must_equal 101
data = JSON . parse ( out . stdout )
data [ 'platform' ] [ 'target_id' ] . must_equal '1d3e399f-4d71-4863-ac54-84d437fbc444'
sout = inspec ( 'schema exec-json' )
schema = JSON . parse ( sout . stdout )
JSON :: Schema . validate ( data , schema )
end
2016-05-04 15:32:42 +00:00
describe 'execute a profile with json formatting' do
2018-02-08 09:06:58 +00:00
let ( :json ) { JSON . load ( inspec ( 'exec ' + example_profile + ' --reporter json --no-create-lockfile' ) . stdout ) }
2016-07-04 09:47:46 +00:00
let ( :profile ) { json [ 'profiles' ] [ 0 ] }
2016-04-20 04:50:18 +00:00
let ( :controls ) { profile [ 'controls' ] }
2016-07-04 09:47:46 +00:00
let ( :ex1 ) { controls . find { | x | x [ 'id' ] == 'tmp-1.0' } }
let ( :ex2 ) { controls . find { | x | x [ 'id' ] =~ / generated / } }
let ( :ex3 ) { profile [ 'controls' ] . find { | x | x [ 'id' ] == 'gordon-1.0' } }
2016-04-20 04:50:18 +00:00
let ( :check_result ) {
ex3 [ 'results' ] . find { | x | x [ 'resource' ] == 'gordon_config' }
}
2016-07-04 09:47:46 +00:00
it 'has only one profile' do
json [ 'profiles' ] . must_be_kind_of ( Array )
json [ 'profiles' ] . length . must_equal 1
end
2018-09-13 18:14:05 +00:00
it 'maps impact symbols to numbers' do
ex3 [ 'impact' ] . must_equal 0 . 9
end
2016-04-20 04:50:18 +00:00
it 'has all the metadata' do
actual = profile . dup
2016-07-04 09:47:46 +00:00
key = actual . delete ( 'controls' )
. find { | x | x [ 'id' ] =~ / generated from example.rb / } [ 'id' ]
groups = actual . delete ( 'groups' )
2016-04-20 04:50:18 +00:00
actual . must_equal ( {
2016-09-16 21:59:31 +00:00
" name " = > " profile " ,
2016-04-20 04:50:18 +00:00
" title " = > " InSpec Example Profile " ,
" maintainer " = > " Chef Software, Inc. " ,
" copyright " = > " Chef Software, Inc. " ,
" copyright_email " = > " support@chef.io " ,
2017-05-29 22:16:09 +00:00
" license " = > " Apache-2.0 " ,
2016-04-20 04:50:18 +00:00
" summary " = > " Demonstrates the use of InSpec Compliance Profile " ,
" version " = > " 1.0.0 " ,
2018-09-13 18:14:05 +00:00
" sha256 " = > " c2416865d6da8cdeb4610442d6eac18be2737453e010d028cb901103fefebf6a " ,
2018-09-12 22:04:16 +00:00
" supports " = > [ { " platform-family " = > " unix " } , { " platform-family " = > " windows " } ] ,
2016-05-07 18:17:09 +00:00
" attributes " = > [ ]
2016-04-20 04:50:18 +00:00
} )
2016-07-04 09:47:46 +00:00
groups . sort_by { | x | x [ 'id' ] } . must_equal ( [
{ " id " = > " controls/example.rb " , " title " = > " /tmp profile " , " controls " = > [ " tmp-1.0 " , key ] } ,
{ " id " = > " controls/gordon.rb " , " title " = > " Gordon Config Checks " , " controls " = > [ " gordon-1.0 " ] } ,
2016-09-16 21:59:31 +00:00
{ " id " = > " controls/meta.rb " , " title " = > " SSH Server Configuration " , " controls " = > [ " ssh-1 " ] } ,
2016-07-04 09:47:46 +00:00
] )
2016-04-20 04:50:18 +00:00
end
it 'must have 4 controls' do
controls . length . must_equal 4
end
it 'has an id for every control' do
2016-07-04 09:47:46 +00:00
controls . find { | x | x [ 'id' ] . nil? } . must_be :nil?
2016-04-20 04:50:18 +00:00
end
it 'has results for every control' do
ex1 [ 'results' ] . length . must_equal 1
ex2 [ 'results' ] . length . must_equal 1
ex3 [ 'results' ] . length . must_equal 2
end
it 'has the right result for tmp-1.0' do
actual = ex1 . dup
src = actual . delete ( 'source_location' )
2016-06-28 10:03:20 +00:00
src [ 'ref' ] . must_match %r{ examples/profile/controls/example.rb$ }
2017-06-28 11:14:19 +00:00
src [ 'line' ] . must_equal 7
2016-04-20 04:50:18 +00:00
result = actual . delete ( 'results' ) [ 0 ]
result . wont_be :nil?
result [ 'status' ] . must_equal 'passed'
result [ 'code_desc' ] . must_equal 'File /tmp should be directory'
result [ 'run_time' ] . wont_be :nil?
result [ 'start_time' ] . wont_be :nil?
actual . must_equal ( {
2016-07-04 09:47:46 +00:00
" id " = > " tmp-1.0 " ,
2016-04-20 04:50:18 +00:00
" title " = > " Create /tmp directory " ,
" desc " = > " An optional description... " ,
" impact " = > 0 . 7 ,
" refs " = > [
{
" url " = > " http://... " ,
" ref " = > " Document A-12 "
}
] ,
" tags " = > {
" data " = > " temp data " ,
" security " = > nil
} ,
" code " = > " control \" tmp-1.0 \" do # A unique ID for this control \n impact 0.7 # The criticality, if this control fails. \n title \" Create /tmp directory \" # A human-readable title \n desc \" An optional description... \" # Describe why this is needed \n tag data: \" temp data \" # A tag allows you to associate key information \n tag \" security \" # to the test \n ref \" Document A-12 \" , url: 'http://...' # Additional references \n \n describe file('/tmp') do # The actual test \n it { should be_directory } \n end \n end \n " ,
} )
end
end
describe 'with a profile that is not supported on this OS/platform' do
2018-02-08 09:06:58 +00:00
let ( :out ) { inspec ( 'exec ' + File . join ( profile_path , 'skippy-profile-os' ) + ' --reporter json --no-create-lockfile' ) }
2016-04-20 04:50:18 +00:00
let ( :json ) { JSON . load ( out . stdout ) }
# TODO: failure handling in json formatters...
it 'never runs the actual resource' do
File . exist? ( '/tmp/inspec_test_DONT_CREATE' ) . must_equal false
end
end
end