mirror of
https://github.com/inspec/inspec
synced 2024-12-23 03:23:27 +00:00
c1da4f64c4
Signed-off-by: IanMadd <imaddaus@chef.io>
127 lines
3.7 KiB
Ruby
127 lines
3.7 KiB
Ruby
require "resource_support/aws/aws_singular_resource_mixin"
|
|
require "resource_support/aws/aws_backend_base"
|
|
require "aws-sdk-ec2"
|
|
|
|
class AwsEbsVolume < Inspec.resource(1)
|
|
name "aws_ebs_volume"
|
|
desc "Verifies settings for an EBS volume"
|
|
|
|
example <<~EXAMPLE
|
|
describe aws_ebs_volume('vol-123456') do
|
|
it { should be_encrypted }
|
|
its('size') { should cmp 8 }
|
|
end
|
|
|
|
describe aws_ebs_volume(name: 'my-volume') do
|
|
its('encrypted') { should eq true }
|
|
its('iops') { should cmp 100 }
|
|
end
|
|
EXAMPLE
|
|
supports platform: "aws"
|
|
|
|
# TODO: rewrite to avoid direct injection, match other resources, use AwsSingularResourceMixin
|
|
def initialize(opts, conn = nil)
|
|
@opts = opts
|
|
@display_name = opts.is_a?(Hash) ? @opts[:name] : opts
|
|
@ec2_client = conn ? conn.ec2_client : inspec_runner.backend.aws_client(Aws::EC2::Client)
|
|
@ec2_resource = conn ? conn.ec2_resource : inspec_runner.backend.aws_resource(Aws::EC2::Resource, {})
|
|
end
|
|
|
|
# TODO: DRY up, see https://github.com/chef/inspec/issues/2633
|
|
# Copied from resource_support/aws/aws_resource_mixin.rb
|
|
def catch_aws_errors
|
|
yield
|
|
rescue Aws::Errors::MissingCredentialsError
|
|
# The AWS error here is unhelpful:
|
|
# "unable to sign request without credentials set"
|
|
Inspec::Log.error "It appears that you have not set your AWS credentials. You may set them using environment variables, or using the 'aws://region/aws_credentials_profile' target. See https://docs.chef.io/inspec/platforms/ for details."
|
|
fail_resource("No AWS credentials available")
|
|
rescue Aws::Errors::ServiceError => e
|
|
fail_resource(e.message)
|
|
end
|
|
|
|
# TODO: DRY up, see https://github.com/chef/inspec/issues/2633
|
|
# Copied from resource_support/aws/aws_singular_resource_mixin.rb
|
|
def inspec_runner
|
|
# When running under inspec-cli, we have an 'inspec' method that
|
|
# returns the runner. When running under unit tests, we don't
|
|
# have that, but we still have to call this to pass something
|
|
# (nil is OK) to the backend.
|
|
# TODO: remove with https://github.com/chef/inspec-aws/issues/216
|
|
# TODO: remove after rewrite to include AwsSingularResource
|
|
inspec if respond_to?(:inspec)
|
|
end
|
|
|
|
def id
|
|
return @volume_id if defined?(@volume_id)
|
|
|
|
catch_aws_errors do
|
|
if @opts.is_a?(Hash)
|
|
first = @ec2_resource.volumes(
|
|
{
|
|
filters: [{
|
|
name: "tag:Name",
|
|
values: [@opts[:name]],
|
|
}],
|
|
}
|
|
).first
|
|
# catch case where the volume is not known
|
|
@volume_id = first.id unless first.nil?
|
|
else
|
|
@volume_id = @opts
|
|
end
|
|
end
|
|
end
|
|
alias volume_id id
|
|
|
|
def exists?
|
|
!volume.nil?
|
|
end
|
|
|
|
def encrypted?
|
|
volume.encrypted
|
|
end
|
|
|
|
# attributes that we want to expose
|
|
%w{
|
|
availability_zone encrypted iops kms_key_id size snapshot_id state volume_type
|
|
}.each do |attribute|
|
|
define_method attribute do
|
|
catch_aws_errors do
|
|
volume.send(attribute) if volume
|
|
end
|
|
end
|
|
end
|
|
|
|
# Don't document this - it's a bit hard to use. Our current doctrine
|
|
# is to use dumb things, like arrays of strings - use security_group_ids instead.
|
|
def security_groups
|
|
catch_aws_errors do
|
|
@security_groups ||= volume.security_groups.map do |sg|
|
|
{ id: sg.group_id, name: sg.group_name }
|
|
end
|
|
end
|
|
end
|
|
|
|
def security_group_ids
|
|
catch_aws_errors do
|
|
@security_group_ids ||= volume.security_groups.map(&:group_id)
|
|
end
|
|
end
|
|
|
|
def tags
|
|
catch_aws_errors do
|
|
@tags ||= volume.tags.map { |tag| { key: tag.key, value: tag.value } }
|
|
end
|
|
end
|
|
|
|
def to_s
|
|
"EBS Volume #{@display_name}"
|
|
end
|
|
|
|
private
|
|
|
|
def volume
|
|
catch_aws_errors { @volume ||= @ec2_resource.volume(id) }
|
|
end
|
|
end
|