mirror of
https://github.com/inspec/inspec
synced 2024-12-28 05:53:14 +00:00
67 lines
1.7 KiB
Ruby
67 lines
1.7 KiB
Ruby
# encoding: utf-8
|
|
# copyright: 2015, Vulcano Security GmbH
|
|
# author: Dominik Richter
|
|
# author: Christoph Hartmann
|
|
# license: All rights reserved
|
|
|
|
class Lines
|
|
def initialize(raw, desc)
|
|
@raw = raw
|
|
@desc = desc
|
|
end
|
|
|
|
def output
|
|
@raw
|
|
end
|
|
|
|
def lines
|
|
@raw.split("\n")
|
|
end
|
|
|
|
def to_s
|
|
@desc
|
|
end
|
|
end
|
|
|
|
class PostgresSession < Inspec.resource(1)
|
|
name 'postgres_session'
|
|
desc 'Use the postgres_session InSpec audit resource to test SQL commands run against a PostgreSQL database.'
|
|
example "
|
|
sql = postgres_session('username', 'password')
|
|
|
|
describe sql.query('SELECT * FROM pg_shadow WHERE passwd IS NULL;') do
|
|
its('output') { should eq('') }
|
|
end
|
|
"
|
|
|
|
def initialize(user, pass)
|
|
@user = user || 'postgres'
|
|
@pass = pass
|
|
end
|
|
|
|
def query(query, db = [], &block)
|
|
dbs = db.map { |x| "-d #{x}" }.join(' ')
|
|
# TODO: simple escape, must be handled by a library
|
|
# that does this securely
|
|
escaped_query = query.gsub(/\\/, '\\\\').gsub(/"/, '\\"').gsub(/\$/, '\\$')
|
|
# run the query
|
|
cmd = inspec.command("PGPASSWORD='#{@pass}' psql -U #{@user} #{dbs} -c \"#{escaped_query}\"")
|
|
out = cmd.stdout + "\n" + cmd.stderr
|
|
if out =~ /could not connect to .*/ or
|
|
out.downcase =~ /^error/
|
|
# skip this test if the server can't run the query
|
|
RSpec.describe(cmd) do
|
|
it 'is skipped', skip: out do
|
|
end
|
|
end
|
|
else
|
|
# remove the whole header (i.e. up to the first ^-----+------+------$)
|
|
# remove the tail
|
|
lines = cmd.stdout
|
|
.sub(/(.*\n)+([-]+[+])*[-]+\n/, '')
|
|
.sub(/\n[^\n]*\n\n$/, '')
|
|
l = Lines.new(lines.strip, "PostgreSQL query: #{query}")
|
|
RSpec.__send__('describe', l, &block)
|
|
end
|
|
end
|
|
end
|