Anirudh Gupta
1330e09df5
added file permission by user check for hp-ux
2016-04-26 14:53:28 +05:30
Anirudh Gupta
75534fdaa5
added hpux user and package resource support
2016-04-21 14:01:56 +05:30
Alex Pop
1254bce74f
keeping rubocop happy
2016-04-20 12:03:20 -04:00
Alex Pop
0b1c37362b
fix indenting for loops and or
2016-04-20 12:03:20 -04:00
Alex Pop
9f156bb36b
update file resource example to use cmd matcher for better failure output in octal
2016-04-20 11:57:34 -04:00
Alex Pop
7a3b4736b8
fix the shadow password example now that cmp can handle arrays
2016-04-20 11:57:34 -04:00
Alex Pop
b38e71b6f2
allow integers to be cmp regexed
2016-04-20 11:57:31 -04:00
Dominik Richter
9b199c9223
add regexp to cmp matcher
...
i.e. `123 should { cmp /2+/ }`
2016-04-20 11:57:31 -04:00
Dominik Richter
07f17a3f8d
bugfix: fix formatting of cmp expectations
...
E.g. for regex it will print a very cryptic `(?-mix:123)` for `/123/` instead of the pure regex
2016-04-20 02:11:00 -04:00
Dominik Richter
9da23f9cbc
remodel bash and shell wrappers
2016-04-18 11:48:42 -04:00
Stephan Renatus
f7272f746c
0.19.1
2016-04-18 11:39:52 +02:00
Dominik Richter
0631779412
configure command execution shells to sh/bash/zsh
2016-04-18 01:09:37 -04:00
Dominik Richter
fa6143d6d4
be descriptive on shadow.entries
...
When used in combination: `shadow[.filter(...)].entries.each { |entry| ... }`, these entries would not be very descriptive at all. You would basically only retrieve the full filter chain e.g. 20 times, without any information about what entry you are currently looking at. This fixes it, by providing the entry identified by the user name
2016-04-17 19:12:14 -04:00
Dominik Richter
0cb03e8726
bugfix: print cmp expectations
2016-04-17 18:50:21 -04:00
Dominik Richter
53f855e681
0.19.0
2016-04-17 14:19:37 -04:00
Thomas Cate
e6d98968c9
first pass at working legacy-grub/grub2 config
2016-04-17 10:46:35 -04:00
Thomas Cate
0f8aff0b91
added default and per kernel checking
2016-04-17 10:46:35 -04:00
Thomas Cate
3051ead64d
added tests for grub_conf resource
2016-04-17 10:46:29 -04:00
Thomas Cate
19333f0ece
handle unsupported OSs
2016-04-17 10:46:29 -04:00
Thomas Cate
1b1690a3e3
improve examples
2016-04-17 10:46:29 -04:00
Thomas Cate
3559ba4aeb
convert single entry arrays to strings
2016-04-17 10:46:24 -04:00
Thomas Cate
fc811518e8
remove troubleshooting output
2016-04-17 10:45:22 -04:00
Thomas Cate
96536db318
first pass at a grub_config resource
2016-04-17 10:45:22 -04:00
Dominik Richter
2a0ccbfd76
fail on unsupported os/platform
2016-04-17 00:04:37 -04:00
Dominik Richter
ebd094fbb0
bugfix: rspec world handling on rspec 3.5
...
This accessor is designed to work with rspec 3.0 - 3.5 (and potentially up).
2016-04-16 20:33:01 -04:00
Christoph Hartmann
27357c8630
update documentation for json resource
2016-04-16 20:16:32 -04:00
Dominik Richter
f54195408f
simplify key symbolization in metadata
2016-04-16 18:47:59 -04:00
Dominik Richter
14995534cd
skip profiles if the platform isnt supported
2016-04-16 15:34:23 -04:00
Dominik Richter
a1188b26ce
add supports_runtime? to metadata
2016-04-16 15:25:59 -04:00
Dominik Richter
5d58fa267b
feature: cmp < / > / <= / >= / == / != sth
matcher
2016-04-15 19:19:15 -04:00
Alex Pop
dec217a8ce
prevent its(:to_i) from generated tests
2016-04-15 01:03:39 -04:00
Satish Puranam
07315ce5d2
Cleanup code meet lint guidelines
2016-04-14 13:39:03 -04:00
Satish Puranam
b0bc88f637
Cleanup, remove redundant checking of os family
2016-04-13 19:08:14 -04:00
Satish Puranam
81029274e2
Add support suse 11 to service resource
2016-04-13 18:24:26 -04:00
Christoph Hartmann
3007aef248
add function tests for compliance
command
2016-04-13 16:55:14 -04:00
Christoph Hartmann
07c359431f
fix: make the plugin compatible with all versions of chef compliance
2016-04-13 16:27:57 -04:00
Christoph Hartmann
01bec4cd1e
merge cli commands login, api_token and token to login
2016-04-13 16:27:57 -04:00
Stephan Renatus
54db2625eb
inspec-compliance: restore compat with pre-1.0
2016-04-13 16:27:57 -04:00
Stephan Renatus
71e1372b5e
fix rubocop
2016-04-13 16:27:57 -04:00
Stephan Renatus
4004dfbb3c
inspec-compliance: update README
2016-04-13 16:27:57 -04:00
Stephan Renatus
7b740a2f9d
inspec-compliance: style
2016-04-13 16:27:57 -04:00
Stephan Renatus
e0bd2bb595
inspec-compliance: work with compliance 1.0
2016-04-13 16:27:57 -04:00
Jacob McCann
9dbf5354e5
Add 'static' value as enabled to systemd service enabled check
2016-04-13 14:44:28 -05:00
Dominik Richter
046e6ce501
bugfix: non-profile execution with json formatter
2016-04-11 11:17:26 -04:00
Dominik Richter
9f8fe7f4b0
0.18.0
2016-04-09 16:10:13 +02:00
Dominik Richter
fb54c4ea24
api: inspec.yml supports now adds tests w/o running
...
Instead of just removing all tests because of OS support, supports now acts by adding all tests to the execution context, but doesnt actually execute them. Instead tests are set to skip before they get to the actual execution context
2016-04-06 11:28:52 +02:00
Dominik Richter
c55fb0b587
prevent only_ifs from getting overwritten
2016-04-06 10:46:36 +02:00
Dominik Richter
a72fee6623
add only_if for controls
2016-04-06 10:46:36 +02:00
Dominik Richter
c73afd4c1c
overhault rule/control internals
...
instead of keeping them as flat variables, prefix all internals with `__` to create consistency. Also add accessors on the class-level to expose these values in all rules. This way we keep all variable-names in one location and get some safety on access.
2016-04-06 10:46:36 +02:00
Dominik Richter
598e8be07f
don't remove controls with only_if
...
instead mark them as skipped, but don't just remove them.
This also introduced a number of tests around only_if on the global level
2016-04-06 10:15:53 +02:00