mirror of
https://github.com/inspec/inspec
synced 2024-11-27 07:00:39 +00:00
c7e87ca3e3
* Create file-check functionality into utility file There are the similar issues as PR #2302. Almost resources return false positives when a file does not exist or is not read. * Replace to file-check functionality * Fix dh_params and x509_certificate resources If a file is empty, OpenSSL::PKey::DH and OpenSSL::X509::Certificate have raised an exception and have skipped the inspection. Thus x509_certificate and dh_params resources are not allowed to read a empty file. * to_s of shadow expects filters is not nil * Remove workaround of sshd_config Removes the workaround of sshd_config since Travis CI fails due to a bug of dev-sec/ssh-baseline and the PR #100 will fix it. * Use init block variable in methods Signed-off-by: ERAMOTO Masaya <eramoto.masaya@jp.fujitsu.com>
97 lines
2.6 KiB
Ruby
97 lines
2.6 KiB
Ruby
# encoding: utf-8
|
|
# copyright: 2015, Vulcano Security GmbH
|
|
|
|
require 'utils/simpleconfig'
|
|
require 'utils/file_reader'
|
|
|
|
module Inspec::Resources
|
|
class SshConf < Inspec.resource(1)
|
|
name 'ssh_config'
|
|
supports platform: 'unix'
|
|
desc 'Use the `ssh_config` InSpec audit resource to test OpenSSH client configuration data located at `/etc/ssh/ssh_config` on Linux and Unix platforms.'
|
|
example "
|
|
describe ssh_config do
|
|
its('cipher') { should contain '3des' }
|
|
its('port') { should eq '22' }
|
|
its('hostname') { should include('example.com') }
|
|
end
|
|
"
|
|
|
|
include FileReader
|
|
|
|
def initialize(conf_path = nil, type = nil)
|
|
@conf_path = conf_path || '/etc/ssh/ssh_config'
|
|
typename = (@conf_path.include?('sshd') ? 'Server' : 'Client')
|
|
@type = type || "SSH #{typename} configuration #{conf_path}"
|
|
read_content
|
|
end
|
|
|
|
def content
|
|
read_content
|
|
end
|
|
|
|
def params(*opts)
|
|
opts.inject(read_params) do |res, nxt|
|
|
res.respond_to?(:key) ? res[nxt] : nil
|
|
end
|
|
end
|
|
|
|
def convert_hash(hash)
|
|
new_hash = {}
|
|
hash.each do |k, v|
|
|
new_hash[k.downcase] = v
|
|
end
|
|
new_hash
|
|
end
|
|
|
|
def method_missing(name)
|
|
param = read_params[name.to_s.downcase]
|
|
return nil if param.nil?
|
|
# extract first value if we have only one value in array
|
|
return param[0] if param.length == 1
|
|
param
|
|
end
|
|
|
|
def to_s
|
|
'SSH Configuration'
|
|
end
|
|
|
|
private
|
|
|
|
def read_content
|
|
return @content if defined?(@content)
|
|
|
|
@content = read_file_content(@conf_path)
|
|
end
|
|
|
|
def read_params
|
|
return @params if defined?(@params)
|
|
return @params = {} if read_content.nil?
|
|
conf = SimpleConfig.new(
|
|
read_content,
|
|
assignment_regex: /^\s*(\S+?)\s+(.*?)\s*$/,
|
|
multiple_values: true,
|
|
)
|
|
@params = convert_hash(conf.params)
|
|
end
|
|
end
|
|
|
|
class SshdConf < SshConf
|
|
name 'sshd_config'
|
|
supports platform: 'unix'
|
|
desc 'Use the sshd_config InSpec audit resource to test configuration data for the Open SSH daemon located at /etc/ssh/sshd_config on Linux and UNIX platforms. sshd---the Open SSH daemon---listens on dedicated ports, starts a daemon for each incoming connection, and then handles encryption, authentication, key exchanges, command execution, and data exchanges.'
|
|
example "
|
|
describe sshd_config do
|
|
its('Protocol') { should eq '2' }
|
|
end
|
|
"
|
|
|
|
def initialize(path = nil)
|
|
super(path || '/etc/ssh/sshd_config')
|
|
end
|
|
|
|
def to_s
|
|
'SSHD Configuration'
|
|
end
|
|
end
|
|
end
|