No description
Find a file
Russell Seymour 7842d37fb3 Renamed azure_rg resource
Closes #25

Signed-off-by: Russell Seymour <russell.seymour@turtlesystems.co.uk>
2017-03-01 17:32:17 +00:00
lib/resources/azure Renamed azure_rg resource 2017-03-01 17:32:17 +00:00
libraries Renamed azure_rg resource 2017-03-01 17:32:17 +00:00
test/integration/azure Renamed azure_rg resource 2017-03-01 17:32:17 +00:00
.gitignore Added integration tests for current resources 2017-03-01 16:00:19 +01:00
.rubocop.yml Initial checkin of Inspec Azure resource pack 2017-01-20 16:51:53 +00:00
.travis.yml Update .travis.yml 2017-02-17 18:20:51 +00:00
CHANGELOG.md Updated CHANGELOG 2017-03-01 16:46:56 +00:00
CONTRIBUTING.md add contribution guidelines and license 2017-02-27 14:52:07 +01:00
Gemfile Added integration tests for current resources 2017-03-01 16:00:19 +01:00
inspec.yml Added environment variables to travis.yml 2017-02-17 17:39:10 +00:00
LICENSE add contribution guidelines and license 2017-02-27 14:52:07 +01:00
Rakefile Added integration tests for current resources 2017-03-01 16:00:19 +01:00
README.md Renamed azure_rg resource 2017-03-01 17:32:17 +00:00

InSpec Azure Resource Pack

This resource pack provides resources for Azure Resources. It will ship with the required resources to write your own compliance rules:

├── README.md - this readme
└── libraries - contains Azure resources
└── test - contains integration tests

Get Started

This profile uses the Azure Ruby SDK and as such requires a Service Principal Name (SPN) to be created in the Azure subscription that is being tested.

This can be done on the command line or from the Azure Portal

The information from the SPN can be specified either in a file ~/.azure/credentials, a different file or as environment variables.

Credentials File

The simplest way is to create the file ~/.azure/credentials with the following format. The profile is configured to look for this file by default do no settings are required.

[<SUBSCRIPTION_ID>]
client_id = "<CLIENT_ID>"
client_secret = "<CLIENT_SECRET>"
tenant_id = "<TENANT_ID>"

So to run the profile now it is as simple as running:

inspec exec inspec-azure

A different credentials file, with the same format, can be specified as an environment variable AZURE_CREDS_FILE:

AZURE_CREDS_FILE="/path/to/another/file" inspec exec inspec-azure

Note that this file format supports multiple subscription_ids. By default inspec-azure will pick the first subscription in the file. However if another subscription should be used then specify it in the environment variable AZURE_SUBSCRIPTION_ID.

AZURE_SUBSCRIPTION_ID="2fbdbb02-df2e-11e6-bf01-fe55135034f3" inspec exec inspec-azure

Alternatively, if you know that the subscription you want to use is the second one in you credentials file then you can use the following:

AZURE_SUBSCRIPTION_NUMBER=2 inspec exec inspec-azure

Environment variables

It is possible to not have a credentials file at all and specify all of the required information as the following environment variables:

  • AZURE_SUBSCRIPTION_ID
  • AZURE_CLIENT_ID
  • AZURE_CLIENT_SECRET
  • AZURE_TENANT_ID

For example:

AZURE_SUBSCRIPTION_ID="2fbdbb02-df2e-11e6-bf01-fe55135034f3" \
AZURE_CLIENT_ID="58dc4f6c-df2e-11e6-bf01-fe55135034f3" \
AZURE_CLIENT_SECRET="Jibr4iwwaaZwBb6W" \
AZURE_TENANT_ID="6ad89b58-df2e-11e6-bf01-fe55135034f3" inspec exec inspec-azure

Use the resources

Since this is an InSpec resource pack, it only defines InSpec resources. It includes example tests only. To easily use the Azure InSpec resources in your tests do the following:

Create a new profile

inspec init profile my-profile

Adapt the inspec.yml

name: my-profile
title: My own Azure profile
version: 0.1.0
depends:
  - name: azure
    url: https://github.com/chef/inspec-azure/archive/master.tar.gz

Add controls

Since your profile depends on the resource pack, you can use those resources in your own profile:

control 'azure-1' do
  impact 1.0
  title 'Checks that the machine was built from the correct image'

  describe azure_virtual_machine(name: 'example-01', resource_group: 'MyResourceGroup') do
    its('sku') { should eq '16.04.0-LTS' }
    its('publisher') { should ieq 'Canonical' }
    its('offer') { should ieq 'UbuntuServer' }
  end
end

Available Resources

  • azure_resource_group - This resource reads information about the resources in the specified resource group
Resource Name Resources Description
azure_rg location Where the item has been deployed
total The total number of resources in the resource group
nic_count Helper method to return the number of Network Interface Cards (NIC) that exist
vm_count Helper method to return the number of Virtual Machines(VM) that exist
vnet_count Helper method to return the number of Virtual Networks (VNET) that exist
nsg_count Helper method to return the number of Network Security Groups (NSG) that exist
sa_count Helper method to return the number of Storage Accounts (SA) that exist
public_ip_count Helper method to return the number of Public IP Addresses that exist
contains Used to determine if a specific item exists

This resource also has a FilterTable which means that it is possible to check for items that do not yet have a helper method.

Test for the number of storage accounts

control 'azure-1' do
  impact 1.0
  title 'Checks that there is only one storage account in the resource group'

  describe azure_resource_group(name: 'MyResourceGroup').where { type == 'Microsoft.Storage/storageAccounts' }.entries do
    its('count') { should eq 1 }
  end
end

Ensure that a specific item exists

control 'azure-1' do
  impact 1.0
  title 'Checks a resource with the name "example-VM" exists'

  describe azure_resource_group(name: 'MyResourceGroup').contains(parameter: 'name', value: 'example-VM') do
    it { should be true }
  end
end
  • azure_vm - This resource reads information about a virtual machine in the specified resource group
Resource Name Resources Description
azure_vm publisher Publisher that provided the image in the marketplace
offer The offer of the image
sku The SKU being used
size The size of the machine
location Where the machine has been deployed
boot_diagnostics? Whether boot diagnostics have been enabled or not
nic_count How many network cards are attached to the machine
username The admin username that has been assigned to the machine
computername Computer name of the machine in the operating system. This maybe different to the VM name as seen in Azure
hostname Alias for computername
password_authentication? If password authentication is enabled. For Windows machines this is always true
ssh_key_count How many SSH public keys have been added to the machine. For Windows this is always 0
os_type Tyep type of operating system. Linux or Windows
  • azure_vm_datadisks - Resource to read the data disks for a machine and check that they are of the correct size etc
Resource Name Resources Description
azure_vm_datadisks has_disks? Boolean test to see if a machine has datadisks
count Returns the number of data disks attached to the machine
where Filter that allows for different tests to be performed, see examples below

When data disks are retrieved from a machine they are given as an array. The where filter will interogate the array according the criteria it is given. The followin attributes are available in the filter:

  • disk - Disk number (0 index based)
  • caching - What sort of caching is enabled on the data disk
  • create_option - How the disk was created
  • size - The size of the disk in GB
  • lun - The LUN number
  • name - Name of the disk
  • uri - Full URI to the disk in Blob storage
  • storage_account - The name of the storage account in which the Blob storage exists

Note: This does not yet work with Managed Disks

Test for 1 disk with a size greater than 10gb

control 'azure-1' do
  impact 1.0
  title 'Checks that the machine has exactly one data disk and it is over 10gb in size'

  describe azure_virtual_machine(name: 'example-01', resource_group: 'MyResourceGroup') do
    its('has_disks?') { should be true }
    its('count') { should eq 1 }
  end

  describe azure_virtual_machine_datadisks(name: 'example-01', resource_group: 'MyResourceGroup').where { disk == 0 and size > 10 } do
    its('entries') { should_not be_empty }
  end
end

Testing

The test/integration/verify/controls directory contains all of the tests that are run during integration tests. These can be used as examples of how to use this resource pack.

Rake tasks have been configured to enable the running of the integration tests:

rake changelog         # Generate a Change log from GitHub
rake lint              # Run robocop linter
rake rubocop           # Run Rubocop lint checks
rake test:integration  # Perform Integration Tests

As with using the resources themselves the integration tests rely on a Service Principal Name being defined. Please see the information at the start of this page on how to generate this.

License

Author: Russell Seymour (russell@chef.io)
Copyright: Copyright (c) 2017 Chef Software Inc.
License: Apache License, Version 2.0

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.