2
0
Fork 0
mirror of https://github.com/inspec/inspec synced 2025-03-05 07:47:33 +00:00

Add 'require _aws' to newly added resources ()

Signed-off-by: Aaron Lippold <lippold@gmail.com>
This commit is contained in:
Aaron Lippold 2018-02-06 13:14:17 -05:00 committed by Clinton Wolfe
parent 14efd94050
commit b245b72a7c
9 changed files with 18 additions and 6 deletions

View file

@ -1,3 +1,5 @@
require '_aws'
class AwsCloudTrailTrail < Inspec.resource(1)
name 'aws_cloudtrail_trail'
desc 'Verifies settings for an individual AWS CloudTrail Trail'

View file

@ -1,3 +1,5 @@
require '_aws'
class AwsCloudTrailTrails < Inspec.resource(1)
name 'aws_cloudtrail_trails'
desc 'Verifies settings for AWS CloudTrail Trails in bulk'

View file

@ -5,7 +5,7 @@ class AwsEc2Instance < Inspec.resource(1)
name 'aws_ec2_instance'
desc 'Verifies settings for an EC2 instance'
example "
example <<-EOX
describe aws_ec2_instance('i-123456') do
it { should be_running }
it { should have_roles }
@ -15,7 +15,7 @@ class AwsEc2Instance < Inspec.resource(1)
it { should be_running }
it { should have_roles }
end
"
EOX
def initialize(opts, conn = AWSConnection.new)
@opts = opts

View file

@ -3,7 +3,7 @@ require '_aws'
class AwsEc2SecurityGroups < Inspec.resource(1)
name 'aws_ec2_security_groups'
desc 'Verifies settings for AWS Security Groups in bulk'
example "
example <<-EOX
# Verify that you have security groups defined
describe aws_ec2_security_groups do
it { should exist }
@ -13,7 +13,7 @@ class AwsEc2SecurityGroups < Inspec.resource(1)
describe aws_ec2_security_groups do
its('entries.count') { should be > 1 }
end
"
EOX
# Constructor. Args are reserved for row fetch filtering.
def initialize(raw_criteria = {})

View file

@ -1,3 +1,5 @@
require '_aws'
class AwsIamGroups < Inspec.resource(1)
name 'aws_iam_groups'
desc 'Verifies settings for AWS IAM groups in bulk'

View file

@ -5,7 +5,7 @@ class AwsIamPasswordPolicy < Inspec.resource(1)
name 'aws_iam_password_policy'
desc 'Verifies iam password policy'
example "
example <<-EOX
describe aws_iam_password_policy do
its('requires_lowercase_characters?') { should be true }
end
@ -13,7 +13,7 @@ class AwsIamPasswordPolicy < Inspec.resource(1)
describe aws_iam_password_policy do
its('requires_uppercase_characters?') { should be true }
end
"
EOX
def initialize(conn = AWSConnection.new)
@policy = conn.iam_resource.account_password_policy

View file

@ -1,3 +1,5 @@
require '_aws'
class AwsIamPolicies < Inspec.resource(1)
name 'aws_iam_policies'
desc 'Verifies settings for AWS IAM Policies in bulk'

View file

@ -1,3 +1,5 @@
require '_aws'
class AwsIamPolicy < Inspec.resource(1)
name 'aws_iam_policy'
desc 'Verifies settings for individual AWS IAM Policy'

View file

@ -1,3 +1,5 @@
require '_aws'
class AwsKmsKeys < Inspec.resource(1)
name 'aws_kms_keys'
desc 'Verifies settings for AWS KMS Keys in bulk'