inspec/lib/bundles/inspec-compliance/api.rb

143 lines
3.9 KiB
Ruby
Raw Normal View History

2016-02-05 07:38:45 +00:00
# encoding: utf-8
# author: Christoph Hartmann
# author: Dominik Richter
require 'net/http'
require 'uri'
module Compliance
# API Implementation does not hold any state by itself,
# everything will be stored in local Configuration store
class API # rubocop:disable Metrics/ClassLength
2016-02-05 07:38:45 +00:00
# logs into the server, retrieves a token and stores it locally
def self.login(server, username, password, insecure)
2016-02-05 07:38:45 +00:00
config = Compliance::Configuration.new
config['server'] = server
url = "#{server}/oauth/token"
success, data = Compliance::API.post(url, username, password, insecure)
2016-02-05 07:38:45 +00:00
if !data.nil?
tokendata = JSON.parse(data)
if tokendata['access_token']
2016-02-05 10:06:00 +00:00
config['user'] = username
2016-02-05 07:38:45 +00:00
config['token'] = tokendata['access_token']
config['insecure'] = insecure
2016-02-05 07:38:45 +00:00
config.store
success = true
msg = 'Successfully authenticated'
else
msg = 'Reponse does not include a token'
end
else
msg = "Authentication failed for Server: #{url}"
end
[success, msg]
end
def self.logout
config = Compliance::Configuration.new
url = "#{config['server']}/logout"
Compliance::API.post(url, config['token'], nil, config['insecure'])
2016-02-05 07:38:45 +00:00
config.destroy
end
# return the server api version
def self.version
config = Compliance::Configuration.new
url = "#{config['server']}/version"
_success, data = Compliance::API.get(url, nil, nil, config['insecure'])
2016-02-05 07:38:45 +00:00
if !data.nil?
JSON.parse(data)
else
{}
end
end
# return all compliance profiles available for the user
def self.profiles
config = Compliance::Configuration.new
url = "#{config['server']}/user/compliance"
_success, data = get(url, config['token'], '', config['insecure'])
2016-02-05 07:38:45 +00:00
if !data.nil?
profiles = JSON.parse(data)
val = []
# iterate over profiles
profiles.each_key { |org|
profiles[org].each_key { |name|
val.push({ org: org, name: name })
}
}
val
else
[]
end
end
2016-02-05 10:06:00 +00:00
# verifies that a profile
def self.exist?(profile)
profiles = Compliance::API.profiles
if !profiles.empty?
index = profiles.index { |p| "#{p[:org]}/#{p[:name]}" == profile }
!index.nil? && index >= 0
else
false
end
end
def self.get(url, username, password, insecure)
2016-02-05 07:38:45 +00:00
uri = URI.parse(url)
req = Net::HTTP::Get.new(uri.path)
req.basic_auth username, password
send_request(uri, req, insecure)
2016-02-05 07:38:45 +00:00
end
def self.post(url, username, password, insecure)
2016-02-05 07:38:45 +00:00
# form request
uri = URI.parse(url)
req = Net::HTTP::Post.new(uri.path)
req.basic_auth username, password
req.form_data={}
send_request(uri, req, insecure)
2016-02-05 07:38:45 +00:00
end
# upload a file
def self.post_file(url, username, password, file_path, insecure)
2016-02-05 07:38:45 +00:00
uri = URI.parse(url)
http = Net::HTTP.new(uri.host, uri.port)
# set connection flags
http.use_ssl = (uri.scheme == 'https')
http.verify_mode = OpenSSL::SSL::VERIFY_NONE if insecure
2016-02-05 07:38:45 +00:00
req = Net::HTTP::Post.new(uri.path)
req.basic_auth username, password
req.body_stream=File.open(file_path, 'rb')
2016-02-05 07:38:45 +00:00
req.add_field('Content-Length', File.size(file_path))
req.add_field('Content-Type', 'application/x-gtar')
boundary = 'INSPEC-PROFILE-UPLOAD'
req.add_field('session', boundary)
res=http.request(req)
2016-02-05 10:06:00 +00:00
[res.is_a?(Net::HTTPSuccess), res.body]
2016-02-05 07:38:45 +00:00
end
def self.send_request(uri, req, insecure)
opts = {
use_ssl: uri.scheme == 'https',
}
opts[:verify_mode] = OpenSSL::SSL::VERIFY_NONE if insecure
res = Net::HTTP.start(uri.host, uri.port, opts) {|http|
2016-02-05 07:38:45 +00:00
http.request(req)
}
2016-02-05 10:06:00 +00:00
[res.is_a?(Net::HTTPSuccess), res.body]
2016-02-05 07:38:45 +00:00
end
end
end