No description
Find a file
Russell Seymour a2289bfcbe Updated so that the credentials file is only interogated if it exists (#42)
* Updated so that the credentials file is only interogated if it exists
Fixes #39

Signed-off-by: Russell Seymour <russell.seymour@turtlesystems.co.uk>

* Made change to set credentials to nil as requested

Signed-off-by: Russell Seymour <russell.seymour@turtlesystems.co.uk>
2017-10-09 12:54:42 +02:00
docs/resources Updated resource to follow RSpec convention 2017-03-02 14:08:33 +00:00
lib/resources/azure Updated so that the credentials file is only interogated if it exists (#42) 2017-10-09 12:54:42 +02:00
libraries Fixed linting 2017-03-13 13:54:38 +00:00
test/integration/azure Renamed public ip address test 2017-03-07 08:15:50 +00:00
.gitignore Added integration tests for current resources 2017-03-01 16:00:19 +01:00
.rubocop.yml deactivate rubocop testing for unspecific exception handling (#50) 2017-10-08 22:56:52 +02:00
.travis.yml Update .travis.yml 2017-02-17 18:20:51 +00:00
CHANGELOG.md Updated CHANGELOG 2017-03-01 16:46:56 +00:00
CONTRIBUTING.md add contribution guidelines and license 2017-02-27 14:52:07 +01:00
Gemfile relax azure sdk pinning (#51) 2017-10-08 23:02:19 +02:00
inspec.yml Added environment variables to travis.yml 2017-02-17 17:39:10 +00:00
LICENSE add contribution guidelines and license 2017-02-27 14:52:07 +01:00
Rakefile support terraform 0.10 (#49) 2017-10-08 23:07:50 +02:00
README.md support terraform 0.10 (#49) 2017-10-08 23:07:50 +02:00

InSpec for Azure

Roadmap

This repository is the development repository for InSpec for VmWare. Once RFC Platforms is fully implemented in InSpec, this repository is going to be merged into core InSpec.

As of now, Azure resources are implemented as an InSpec resource pack. It will ship with the required resources to write your own Azure tests:

├── README.md - this readme
└── libraries - contains Azure resources
└── test - contains integration tests

Get Started

This profile uses the Azure Ruby SDK and as such requires a Service Principal Name (SPN) to be created in the Azure subscription that is being tested.

This can be done on the command line or from the Azure Portal

The information from the SPN can be specified either in a file ~/.azure/credentials, a different file or as environment variables.

Credentials File

The simplest way is to create the file ~/.azure/credentials with the following format. The profile is configured to look for this file by default do no settings are required.

[<SUBSCRIPTION_ID>]
client_id = "<CLIENT_ID>"
client_secret = "<CLIENT_SECRET>"
tenant_id = "<TENANT_ID>"

So to run the profile now it is as simple as running:

inspec exec inspec-azure

A different credentials file, with the same format, can be specified as an environment variable AZURE_CREDS_FILE:

AZURE_CREDS_FILE="/path/to/another/file" inspec exec inspec-azure

Note that this file format supports multiple subscription_ids. By default inspec-azure will pick the first subscription in the file. However if another subscription should be used then specify it in the environment variable AZURE_SUBSCRIPTION_ID.

AZURE_SUBSCRIPTION_ID="2fbdbb02-df2e-11e6-bf01-fe55135034f3" inspec exec inspec-azure

Alternatively, if you know that the subscription you want to use is the second one in you credentials file then you can use the following:

AZURE_SUBSCRIPTION_NUMBER=2 inspec exec inspec-azure

Environment variables

It is possible to not have a credentials file at all and specify all of the required information as the following environment variables:

  • AZURE_SUBSCRIPTION_ID
  • AZURE_CLIENT_ID
  • AZURE_CLIENT_SECRET
  • AZURE_TENANT_ID

For example:

AZURE_SUBSCRIPTION_ID="2fbdbb02-df2e-11e6-bf01-fe55135034f3" \
AZURE_CLIENT_ID="58dc4f6c-df2e-11e6-bf01-fe55135034f3" \
AZURE_CLIENT_SECRET="Jibr4iwwaaZwBb6W" \
AZURE_TENANT_ID="6ad89b58-df2e-11e6-bf01-fe55135034f3" inspec exec inspec-azure

Use the resources

Since this is an InSpec resource pack, it only defines InSpec resources. It includes example tests only. To easily use the Azure InSpec resources in your tests do the following:

Create a new profile

inspec init profile my-profile

Adapt the inspec.yml

name: my-profile
title: My own Azure profile
version: 0.1.0
depends:
  - name: azure
    url: https://github.com/chef/inspec-azure/archive/master.tar.gz

Add controls

Since your profile depends on the resource pack, you can use those resources in your own profile:

control 'azure-1' do
  impact 1.0
  title 'Checks that the machine was built from the correct image'

  describe azure_virtual_machine(name: 'example-01', resource_group: 'MyResourceGroup') do
    its('sku') { should eq '16.04.0-LTS' }
    its('publisher') { should ieq 'Canonical' }
    its('offer') { should ieq 'UbuntuServer' }
  end
end

Available Resources

  • azure_resource_group - This resource reads information about the resources in the specified resource group
Resource Name Resources Description
azure_rg location Where the item has been deployed
total The total number of resources in the resource group
nic_count Helper method to return the number of Network Interface Cards (NIC) that exist
vm_count Helper method to return the number of Virtual Machines(VM) that exist
vnet_count Helper method to return the number of Virtual Networks (VNET) that exist
nsg_count Helper method to return the number of Network Security Groups (NSG) that exist
sa_count Helper method to return the number of Storage Accounts (SA) that exist
public_ip_count Helper method to return the number of Public IP Addresses that exist
managed_disk_image_count Helper method to return the number of Managed Disk Images that exist
managed_disk_count Helper method to return the number of Managed Disks that exist
contains Used to determine if a specific item exists

This resource also has a FilterTable which means that it is possible to check for items that do not yet have a helper method.

Test for the number of storage accounts

control 'azure-1' do
  impact 1.0
  title 'Checks that there is only one storage account in the resource group'

  describe azure_resource_group(name: 'MyResourceGroup').where { type == 'Microsoft.Storage/storageAccounts' }.entries do
    its('count') { should eq 1 }
  end
end

Ensure that a specific item exists

control 'azure-1' do
  impact 1.0
  title 'Checks a resource with the name "example-VM" exists'

  describe azure_resource_group(name: 'MyResourceGroup').contains(parameter: 'name', value: 'example-VM') do
    it { should be true }
  end
end
  • azure_vm - This resource reads information about a virtual machine in the specified resource group
Resource Name Resources Description
azure_vm publisher Publisher that provided the image in the marketplace
offer The offer of the image
sku The SKU being used
size The size of the machine
location Where the machine has been deployed
has_boot_diagnostics? Whether boot diagnostics have been enabled or not
nic_count How many network cards are attached to the machine
admin_username The admin username that has been assigned to the machine
computername Computer name of the machine in the operating system. This maybe different to the VM name as seen in Azure
hostname Alias for computername
password_authentication? If password authentication is enabled. For Windows machines this is always true
ssh_key_count How many SSH public keys have been added to the machine. For Windows this is always 0
os_type The type of operating system. Linux or Windows
private_ipaddresses Returns an array of all the IP addresses for all the NICs on the machine
has_public_ipaddress? Whether the machine has been allocated an IP address or not
domain_name_label If the machine has a public IP address then return the domain name label it has been assigned

For the resources that start with has_ the following construct can be used

it { should have_boot_diagnostics }
  • azure_vm_datadisks - Resource to read the data disks for a machine and check that they are of the correct size etc
Resource Name Resources Description
azure_vm_datadisks has_data_disks? Boolean test to see if a machine has datadisks
count Returns the number of data disks attached to the machine
where Filter that allows for different tests to be performed, see examples below

The data disks resource now supports Managed Disks, however the data that is returned is different from that for a VHD.

When data disks are retrieved from a machine they are given as an array. The where filter will interogate the array according the criteria it is given.

For items that do not exist a nil value will be returned.

VHD propertiies

The followin attributes are available in the filter:

  • disk - Disk number (0 index based)
  • name - Name of the disk
  • size - The size of the disk in GB
  • caching - What sort of caching is enabled on the data disk
  • create_option - How the disk was created
  • lun - The LUN number
  • uri - Full URI to the disk in Blob storage
  • storage_account - The name of the storage account in which the Blob storage exists
Managed Disk Properties

The following attributes are available in the filter:

  • disk - Disk number (0 index based)
  • name - Name of the disk
  • size - The size of the disk in GB
  • location - Location of the disk
  • account_type - The stoarge type. e.g. Standard_LRS

Test for 1 disk with a size greater than 10gb

control 'azure-1' do
  impact 1.0
  title 'Checks that the machine has exactly one data disk and it is over 10gb in size'

  describe azure_virtual_machine(name: 'example-01', resource_group: 'MyResourceGroup') do
    its('has_disks?') { should be true }
    its('count') { should eq 1 }
  end

  describe azure_virtual_machine_datadisks(name: 'example-01', resource_group: 'MyResourceGroup').where { disk == 0 and size > 10 } do
    its('entries') { should_not be_empty }
  end
end

Integration Testing

Our integration tests spin up an environment with terraform 0.10+ and verify the result with InSpec. The test/integration/verify/controls directory contains all of the tests that are run during integration tests. These can be used as examples of how to use this resource pack.

Rake tasks have been configured to enable the running of the integration tests:

rake changelog         # Generate a Change log from GitHub
rake lint              # Run robocop linter
rake rubocop           # Run Rubocop lint checks
rake test:integration  # Perform Integration Tests

As with using the resources themselves the integration tests rely on a Service Principal Name being defined. Please see the information at the start of this page on how to generate this.

License

Author: Russell Seymour (russell@chef.io)
Copyright: Copyright (c) 2017 Chef Software Inc.
License: Apache License, Version 2.0

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.