lib/inspec/profile.rb in inspec-2.0.32 vs lib/inspec/profile.rb in inspec-2.0.45
- old
+ new
@@ -1,510 +1,510 @@
-# encoding: utf-8
-# Copyright 2015 Dominik Richter
-# author: Dominik Richter
-# author: Christoph Hartmann
-
-require 'forwardable'
-require 'openssl'
-require 'inspec/polyfill'
-require 'inspec/cached_fetcher'
-require 'inspec/file_provider'
-require 'inspec/source_reader'
-require 'inspec/metadata'
-require 'inspec/backend'
-require 'inspec/rule'
-require 'inspec/log'
-require 'inspec/profile_context'
-require 'inspec/runtime_profile'
-require 'inspec/method_source'
-require 'inspec/dependencies/cache'
-require 'inspec/dependencies/lockfile'
-require 'inspec/dependencies/dependency_set'
-
-module Inspec
- class Profile
- extend Forwardable
-
- def self.resolve_target(target, cache)
- Inspec::Log.debug "Resolve #{target} into cache #{cache.path}"
- Inspec::CachedFetcher.new(target, cache)
- end
-
- # Check if the profile contains a vendored cache, move content into global cache
- # TODO: use relative file provider
- # TODO: use source reader for Cache as well
- def self.copy_deps_into_cache(file_provider, opts)
- # filter content
- cache = file_provider.files.find_all do |entry|
- entry.start_with?('vendor')
- end
- content = Hash[cache.map { |x| [x, file_provider.binread(x)] }]
- keys = content.keys
- keys.each do |key|
- next if content[key].nil?
- # remove prefix
- rel = Pathname.new(key).relative_path_from(Pathname.new('vendor')).to_s
- tar = Pathname.new(opts[:vendor_cache].path).join(rel)
-
- FileUtils.mkdir_p tar.dirname.to_s
- Inspec::Log.debug "Copy #{tar} to cache directory"
- File.binwrite(tar.to_s, content[key])
- end
- end
-
- def self.for_path(path, opts)
- file_provider = FileProvider.for_path(path)
- rp = file_provider.relative_provider
-
- # copy embedded dependecies into global cache
- copy_deps_into_cache(rp, opts) unless opts[:vendor_cache].nil?
-
- reader = Inspec::SourceReader.resolve(rp)
- if reader.nil?
- raise("Don't understand inspec profile in #{path}, it " \
- "doesn't look like a supported profile structure.")
- end
- new(reader, opts)
- end
-
- def self.for_fetcher(fetcher, opts)
- opts[:vendor_cache] = opts[:vendor_cache] || Cache.new
- path, writable = fetcher.fetch
- for_path(path, opts.merge(target: fetcher.target, writable: writable))
- end
-
- def self.for_target(target, opts = {})
- opts[:vendor_cache] = opts[:vendor_cache] || Cache.new
- fetcher = resolve_target(target, opts[:vendor_cache])
- for_fetcher(fetcher, opts)
- end
-
- attr_reader :source_reader, :backend, :runner_context, :check_mode
- def_delegator :@source_reader, :tests
- def_delegator :@source_reader, :libraries
- def_delegator :@source_reader, :metadata
-
- # rubocop:disable Metrics/AbcSize
- def initialize(source_reader, options = {})
- @source_reader = source_reader
- @target = options[:target]
- @logger = options[:logger] || Logger.new(nil)
- @locked_dependencies = options[:dependencies]
- @controls = options[:controls] || []
- @writable = options[:writable] || false
- @profile_id = options[:id]
- @cache = options[:vendor_cache] || Cache.new
- @attr_values = options[:attributes]
- @tests_collected = false
- @libraries_loaded = false
- @check_mode = options[:check_mode] || false
- Metadata.finalize(@source_reader.metadata, @profile_id, options)
-
- # if a backend has already been created, clone it so each profile has its own unique backend object
- # otherwise, create a new backend object
- #
- # This is necessary since we store the RuntimeProfile on the backend object. If a user runs `inspec exec`
- # with multiple profiles, only the RuntimeProfile for the last-loaded profile will be available if
- # we share the backend between profiles.
- #
- # This will cause issues if a profile attempts to load a file via `inspec.profile.file`
- train_options = options.reject { |k, _| k == 'target' } # See https://github.com/chef/inspec/pull/1646
- @backend = options[:backend].nil? ? Inspec::Backend.create(train_options) : options[:backend].dup
- @runtime_profile = RuntimeProfile.new(self)
- @backend.profile = @runtime_profile
-
- @runner_context =
- options[:profile_context] ||
- Inspec::ProfileContext.for_profile(self, @backend, @attr_values)
- end
-
- def name
- metadata.params[:name]
- end
-
- def version
- metadata.params[:version]
- end
-
- def writable?
- @writable
- end
-
- #
- # Is this profile is supported on the current platform of the
- # backend machine and the current inspec version.
- #
- # @returns [TrueClass, FalseClass]
- #
- def supported?
- supports_platform? && supports_runtime?
- end
-
- def supports_platform?
- if @supports_platform.nil?
- @supports_platform = metadata.supports_platform?(@backend)
- end
- @supports_platform
- end
-
- def supports_runtime?
- if @supports_runtime.nil?
- @supports_runtime = metadata.supports_runtime?
- end
- @supports_runtime
- end
-
- def params
- @params ||= load_params
- end
-
- def collect_tests(include_list = @controls)
- if !@tests_collected
- locked_dependencies.each(&:collect_tests)
-
- tests.each do |path, content|
- next if content.nil? || content.empty?
- abs_path = source_reader.target.abs_path(path)
- @runner_context.load_control_file(content, abs_path, nil)
- end
- @tests_collected = true
- end
- filter_controls(@runner_context.all_rules, include_list)
- end
-
- def filter_controls(controls_array, include_list)
- return controls_array if include_list.nil? || include_list.empty?
- controls_array.select do |c|
- id = ::Inspec::Rule.rule_id(c)
- include_list.include?(id)
- end
- end
-
- def load_libraries
- return @runner_context if @libraries_loaded
-
- locked_dependencies.each do |d|
- c = d.load_libraries
- @runner_context.add_resources(c)
- end
-
- libs = libraries.map do |path, content|
- [content, path]
- end
-
- @runner_context.load_libraries(libs)
- @libraries_loaded = true
- @runner_context
- end
-
- def to_s
- "Inspec::Profile<#{name}>"
- end
-
- # return info using uncached params
- def info!
- info(load_params.dup)
- end
-
- def info(res = params.dup)
- # add information about the controls
- res[:controls] = res[:controls].map do |id, rule|
- next if id.to_s.empty?
- data = rule.dup
- data.delete(:checks)
- data[:impact] ||= 0.5
- data[:impact] = 1.0 if data[:impact] > 1.0
- data[:impact] = 0.0 if data[:impact] < 0.0
- data[:id] = id
- data
- end.compact
-
- # resolve hash structure in groups
- res[:groups] = res[:groups].map do |id, group|
- group[:id] = id
- group
- end
-
- # add information about the required attributes
- res[:attributes] = res[:attributes].map(&:to_hash) unless res[:attributes].nil? || res[:attributes].empty?
- res[:sha256] = sha256
- res
- end
-
- # Check if the profile is internally well-structured. The logger will be
- # used to print information on errors and warnings which are found.
- #
- # @return [Boolean] true if no errors were found, false otherwise
- def check # rubocop:disable Metrics/AbcSize, Metrics/CyclomaticComplexity, Metrics/PerceivedComplexity, Metrics/MethodLength
- # initial values for response object
- result = {
- summary: {
- valid: false,
- timestamp: Time.now.iso8601,
- location: @target,
- profile: nil,
- controls: 0,
- },
- errors: [],
- warnings: [],
- }
-
- entry = lambda { |file, line, column, control, msg|
- {
- file: file,
- line: line,
- column: column,
- control_id: control,
- msg: msg,
- }
- }
-
- warn = lambda { |file, line, column, control, msg|
- @logger.warn(msg)
- result[:warnings].push(entry.call(file, line, column, control, msg))
- }
-
- error = lambda { |file, line, column, control, msg|
- @logger.error(msg)
- result[:errors].push(entry.call(file, line, column, control, msg))
- }
-
- @logger.info "Checking profile in #{@target}"
- meta_path = @source_reader.target.abs_path(@source_reader.metadata.ref)
- if meta_path =~ /metadata\.rb$/
- warn.call(@target, 0, 0, nil, 'The use of `metadata.rb` is deprecated. Use `inspec.yml`.')
- end
-
- # verify metadata
- m_errors, m_warnings = metadata.valid
- m_errors.each { |msg| error.call(meta_path, 0, 0, nil, msg) }
- m_warnings.each { |msg| warn.call(meta_path, 0, 0, nil, msg) }
- m_unsupported = metadata.unsupported
- m_unsupported.each { |u| warn.call(meta_path, 0, 0, nil, "doesn't support: #{u}") }
- @logger.info 'Metadata OK.' if m_errors.empty? && m_unsupported.empty?
-
- # extract profile name
- result[:summary][:profile] = metadata.params[:name]
-
- # check if the profile is using the old test directory instead of the
- # new controls directory
- if @source_reader.tests.keys.any? { |x| x =~ %r{^test/$} }
- warn.call(@target, 0, 0, nil, 'Profile uses deprecated `test` directory, rename it to `controls`.')
- end
-
- count = controls_count
- result[:summary][:controls] = count
- if count == 0
- warn.call(nil, nil, nil, nil, 'No controls or tests were defined.')
- else
- @logger.info("Found #{count} controls.")
- end
-
- # iterate over hash of groups
- params[:controls].each { |id, control|
- sfile = control[:source_location][:ref]
- sline = control[:source_location][:line]
- error.call(sfile, sline, nil, id, 'Avoid controls with empty IDs') if id.nil? or id.empty?
- next if id.start_with? '(generated '
- warn.call(sfile, sline, nil, id, "Control #{id} has no title") if control[:title].to_s.empty?
- warn.call(sfile, sline, nil, id, "Control #{id} has no description") if control[:desc].to_s.empty?
- warn.call(sfile, sline, nil, id, "Control #{id} has impact > 1.0") if control[:impact].to_f > 1.0
- warn.call(sfile, sline, nil, id, "Control #{id} has impact < 0.0") if control[:impact].to_f < 0.0
- warn.call(sfile, sline, nil, id, "Control #{id} has no tests defined") if control[:checks].nil? or control[:checks].empty?
- }
-
- # profile is valid if we could not find any error
- result[:summary][:valid] = result[:errors].empty?
-
- @logger.info 'Control definitions OK.' if result[:warnings].empty?
- result
- end
-
- def controls_count
- params[:controls].values.length
- end
-
- # generates a archive of a folder profile
- # assumes that the profile was checked before
- def archive(opts)
- # check if file exists otherwise overwrite the archive
- dst = archive_name(opts)
- if dst.exist? && !opts[:overwrite]
- @logger.info "Archive #{dst} exists already. Use --overwrite."
- return false
- end
-
- # remove existing archive
- File.delete(dst) if dst.exist?
- @logger.info "Generate archive #{dst}."
-
- # filter files that should not be part of the profile
- # TODO ignore all .files, but add the files to debug output
-
- # display all files that will be part of the archive
- @logger.debug 'Add the following files to archive:'
- files.each { |f| @logger.debug ' ' + f }
-
- if opts[:zip]
- # generate zip archive
- require 'inspec/archive/zip'
- zag = Inspec::Archive::ZipArchiveGenerator.new
- zag.archive(root_path, files, dst)
- else
- # generate tar archive
- require 'inspec/archive/tar'
- tag = Inspec::Archive::TarArchiveGenerator.new
- tag.archive(root_path, files, dst)
- end
-
- @logger.info 'Finished archive generation.'
- true
- end
-
- def locked_dependencies
- @locked_dependencies ||= load_dependencies
- end
-
- def lockfile_exists?
- @source_reader.target.files.include?('inspec.lock')
- end
-
- def lockfile_path
- File.join(cwd, 'inspec.lock')
- end
-
- def root_path
- @source_reader.target.prefix
- end
-
- def files
- @source_reader.target.files
- end
-
- #
- # TODO(ssd): Relative path handling really needs to be carefully
- # thought through, especially with respect to relative paths in
- # tarballs.
- #
- def cwd
- @target.is_a?(String) && File.directory?(@target) ? @target : './'
- end
-
- def lockfile
- @lockfile ||= if lockfile_exists?
- Inspec::Lockfile.from_content(@source_reader.target.read('inspec.lock'))
- else
- generate_lockfile
- end
- end
-
- #
- # Generate an in-memory lockfile. This won't render the lock file
- # to disk, it must be explicitly written to disk by the caller.
- #
- # @param vendor_path [String] Path to the on-disk vendor dir
- # @return [Inspec::Lockfile]
- #
- def generate_lockfile
- res = Inspec::DependencySet.new(cwd, @cache, nil, @backend)
- res.vendor(metadata.dependencies)
- Inspec::Lockfile.from_dependency_set(res)
- end
-
- def load_dependencies
- Inspec::DependencySet.from_lockfile(lockfile, cwd, @cache, @backend, { attributes: @attr_values })
- end
-
- # Calculate this profile's SHA256 checksum. Includes metadata, dependencies,
- # libraries, data files, and controls.
- #
- # @return [Type] description of returned object
- def sha256
- # get all dependency checksums
- deps = Hash[locked_dependencies.list.map { |k, v| [k, v.profile.sha256] }]
-
- res = OpenSSL::Digest::SHA256.new
- files = source_reader.tests.to_a + source_reader.libraries.to_a +
- source_reader.data_files.to_a +
- [['inspec.yml', source_reader.metadata.content]] +
- [['inspec.lock.deps', YAML.dump(deps)]]
-
- files.sort_by { |a| a[0] }
- .map { |f| res << f[0] << "\0" << f[1] << "\0" }
-
- res.digest.unpack('H*')[0]
- end
-
- private
-
- # Create an archive name for this profile and an additional options
- # configuration. Either use :output or generate the name from metadata.
- #
- # @param [Hash] configuration options
- # @return [Pathname] path for the archive
- def archive_name(opts)
- if (name = opts[:output])
- return Pathname.new(name)
- end
-
- name = params[:name] ||
- raise('Cannot create an archive without a profile name! Please '\
- 'specify the name in metadata or use --output to create the archive.')
- version = params[:version] ||
- raise('Cannot create an archive without a profile version! Please '\
- 'specify the version in metadata or use --output to create the archive.')
- ext = opts[:zip] ? 'zip' : 'tar.gz'
- slug = name.downcase.strip.tr(' ', '-').gsub(/[^\w-]/, '_')
- Pathname.new(Dir.pwd).join("#{slug}-#{version}.#{ext}")
- end
-
- def load_params
- params = @source_reader.metadata.params
- params[:name] = @profile_id unless @profile_id.nil?
- load_checks_params(params)
- @profile_id ||= params[:name]
- params
- end
-
- def load_checks_params(params)
- load_libraries
- tests = collect_tests
- params[:controls] = controls = {}
- params[:groups] = groups = {}
- prefix = @source_reader.target.prefix || ''
- tests.each do |rule|
- next if rule.nil?
- f = load_rule_filepath(prefix, rule)
- load_rule(rule, f, controls, groups)
- end
- params[:attributes] = @runner_context.attributes
- params
- end
-
- def load_rule_filepath(prefix, rule)
- file = rule.instance_variable_get(:@__file)
- file = file[prefix.length..-1] if file.start_with?(prefix)
- file
- end
-
- def load_rule(rule, file, controls, groups)
- id = Inspec::Rule.rule_id(rule)
- location = rule.instance_variable_get(:@__source_location)
- controls[id] = {
- title: rule.title,
- desc: rule.desc,
- impact: rule.impact,
- refs: rule.ref,
- tags: rule.tag,
- checks: Inspec::Rule.checks(rule),
- code: Inspec::MethodSource.code_at(location, source_reader),
- source_location: location,
- }
-
- groups[file] ||= {
- title: rule.instance_variable_get(:@__group_title),
- controls: [],
- }
- groups[file][:controls].push(id)
- end
- end
-end
+# encoding: utf-8
+# Copyright 2015 Dominik Richter
+# author: Dominik Richter
+# author: Christoph Hartmann
+
+require 'forwardable'
+require 'openssl'
+require 'inspec/polyfill'
+require 'inspec/cached_fetcher'
+require 'inspec/file_provider'
+require 'inspec/source_reader'
+require 'inspec/metadata'
+require 'inspec/backend'
+require 'inspec/rule'
+require 'inspec/log'
+require 'inspec/profile_context'
+require 'inspec/runtime_profile'
+require 'inspec/method_source'
+require 'inspec/dependencies/cache'
+require 'inspec/dependencies/lockfile'
+require 'inspec/dependencies/dependency_set'
+
+module Inspec
+ class Profile
+ extend Forwardable
+
+ def self.resolve_target(target, cache)
+ Inspec::Log.debug "Resolve #{target} into cache #{cache.path}"
+ Inspec::CachedFetcher.new(target, cache)
+ end
+
+ # Check if the profile contains a vendored cache, move content into global cache
+ # TODO: use relative file provider
+ # TODO: use source reader for Cache as well
+ def self.copy_deps_into_cache(file_provider, opts)
+ # filter content
+ cache = file_provider.files.find_all do |entry|
+ entry.start_with?('vendor')
+ end
+ content = Hash[cache.map { |x| [x, file_provider.binread(x)] }]
+ keys = content.keys
+ keys.each do |key|
+ next if content[key].nil?
+ # remove prefix
+ rel = Pathname.new(key).relative_path_from(Pathname.new('vendor')).to_s
+ tar = Pathname.new(opts[:vendor_cache].path).join(rel)
+
+ FileUtils.mkdir_p tar.dirname.to_s
+ Inspec::Log.debug "Copy #{tar} to cache directory"
+ File.binwrite(tar.to_s, content[key])
+ end
+ end
+
+ def self.for_path(path, opts)
+ file_provider = FileProvider.for_path(path)
+ rp = file_provider.relative_provider
+
+ # copy embedded dependecies into global cache
+ copy_deps_into_cache(rp, opts) unless opts[:vendor_cache].nil?
+
+ reader = Inspec::SourceReader.resolve(rp)
+ if reader.nil?
+ raise("Don't understand inspec profile in #{path}, it " \
+ "doesn't look like a supported profile structure.")
+ end
+ new(reader, opts)
+ end
+
+ def self.for_fetcher(fetcher, opts)
+ opts[:vendor_cache] = opts[:vendor_cache] || Cache.new
+ path, writable = fetcher.fetch
+ for_path(path, opts.merge(target: fetcher.target, writable: writable))
+ end
+
+ def self.for_target(target, opts = {})
+ opts[:vendor_cache] = opts[:vendor_cache] || Cache.new
+ fetcher = resolve_target(target, opts[:vendor_cache])
+ for_fetcher(fetcher, opts)
+ end
+
+ attr_reader :source_reader, :backend, :runner_context, :check_mode
+ def_delegator :@source_reader, :tests
+ def_delegator :@source_reader, :libraries
+ def_delegator :@source_reader, :metadata
+
+ # rubocop:disable Metrics/AbcSize
+ def initialize(source_reader, options = {})
+ @source_reader = source_reader
+ @target = options[:target]
+ @logger = options[:logger] || Logger.new(nil)
+ @locked_dependencies = options[:dependencies]
+ @controls = options[:controls] || []
+ @writable = options[:writable] || false
+ @profile_id = options[:id]
+ @cache = options[:vendor_cache] || Cache.new
+ @attr_values = options[:attributes]
+ @tests_collected = false
+ @libraries_loaded = false
+ @check_mode = options[:check_mode] || false
+ Metadata.finalize(@source_reader.metadata, @profile_id, options)
+
+ # if a backend has already been created, clone it so each profile has its own unique backend object
+ # otherwise, create a new backend object
+ #
+ # This is necessary since we store the RuntimeProfile on the backend object. If a user runs `inspec exec`
+ # with multiple profiles, only the RuntimeProfile for the last-loaded profile will be available if
+ # we share the backend between profiles.
+ #
+ # This will cause issues if a profile attempts to load a file via `inspec.profile.file`
+ train_options = options.reject { |k, _| k == 'target' } # See https://github.com/chef/inspec/pull/1646
+ @backend = options[:backend].nil? ? Inspec::Backend.create(train_options) : options[:backend].dup
+ @runtime_profile = RuntimeProfile.new(self)
+ @backend.profile = @runtime_profile
+
+ @runner_context =
+ options[:profile_context] ||
+ Inspec::ProfileContext.for_profile(self, @backend, @attr_values)
+ end
+
+ def name
+ metadata.params[:name]
+ end
+
+ def version
+ metadata.params[:version]
+ end
+
+ def writable?
+ @writable
+ end
+
+ #
+ # Is this profile is supported on the current platform of the
+ # backend machine and the current inspec version.
+ #
+ # @returns [TrueClass, FalseClass]
+ #
+ def supported?
+ supports_platform? && supports_runtime?
+ end
+
+ def supports_platform?
+ if @supports_platform.nil?
+ @supports_platform = metadata.supports_platform?(@backend)
+ end
+ @supports_platform
+ end
+
+ def supports_runtime?
+ if @supports_runtime.nil?
+ @supports_runtime = metadata.supports_runtime?
+ end
+ @supports_runtime
+ end
+
+ def params
+ @params ||= load_params
+ end
+
+ def collect_tests(include_list = @controls)
+ if !@tests_collected
+ locked_dependencies.each(&:collect_tests)
+
+ tests.each do |path, content|
+ next if content.nil? || content.empty?
+ abs_path = source_reader.target.abs_path(path)
+ @runner_context.load_control_file(content, abs_path, nil)
+ end
+ @tests_collected = true
+ end
+ filter_controls(@runner_context.all_rules, include_list)
+ end
+
+ def filter_controls(controls_array, include_list)
+ return controls_array if include_list.nil? || include_list.empty?
+ controls_array.select do |c|
+ id = ::Inspec::Rule.rule_id(c)
+ include_list.include?(id)
+ end
+ end
+
+ def load_libraries
+ return @runner_context if @libraries_loaded
+
+ locked_dependencies.each do |d|
+ c = d.load_libraries
+ @runner_context.add_resources(c)
+ end
+
+ libs = libraries.map do |path, content|
+ [content, path]
+ end
+
+ @runner_context.load_libraries(libs)
+ @libraries_loaded = true
+ @runner_context
+ end
+
+ def to_s
+ "Inspec::Profile<#{name}>"
+ end
+
+ # return info using uncached params
+ def info!
+ info(load_params.dup)
+ end
+
+ def info(res = params.dup)
+ # add information about the controls
+ res[:controls] = res[:controls].map do |id, rule|
+ next if id.to_s.empty?
+ data = rule.dup
+ data.delete(:checks)
+ data[:impact] ||= 0.5
+ data[:impact] = 1.0 if data[:impact] > 1.0
+ data[:impact] = 0.0 if data[:impact] < 0.0
+ data[:id] = id
+ data
+ end.compact
+
+ # resolve hash structure in groups
+ res[:groups] = res[:groups].map do |id, group|
+ group[:id] = id
+ group
+ end
+
+ # add information about the required attributes
+ res[:attributes] = res[:attributes].map(&:to_hash) unless res[:attributes].nil? || res[:attributes].empty?
+ res[:sha256] = sha256
+ res
+ end
+
+ # Check if the profile is internally well-structured. The logger will be
+ # used to print information on errors and warnings which are found.
+ #
+ # @return [Boolean] true if no errors were found, false otherwise
+ def check # rubocop:disable Metrics/AbcSize, Metrics/CyclomaticComplexity, Metrics/PerceivedComplexity, Metrics/MethodLength
+ # initial values for response object
+ result = {
+ summary: {
+ valid: false,
+ timestamp: Time.now.iso8601,
+ location: @target,
+ profile: nil,
+ controls: 0,
+ },
+ errors: [],
+ warnings: [],
+ }
+
+ entry = lambda { |file, line, column, control, msg|
+ {
+ file: file,
+ line: line,
+ column: column,
+ control_id: control,
+ msg: msg,
+ }
+ }
+
+ warn = lambda { |file, line, column, control, msg|
+ @logger.warn(msg)
+ result[:warnings].push(entry.call(file, line, column, control, msg))
+ }
+
+ error = lambda { |file, line, column, control, msg|
+ @logger.error(msg)
+ result[:errors].push(entry.call(file, line, column, control, msg))
+ }
+
+ @logger.info "Checking profile in #{@target}"
+ meta_path = @source_reader.target.abs_path(@source_reader.metadata.ref)
+ if meta_path =~ /metadata\.rb$/
+ warn.call(@target, 0, 0, nil, 'The use of `metadata.rb` is deprecated. Use `inspec.yml`.')
+ end
+
+ # verify metadata
+ m_errors, m_warnings = metadata.valid
+ m_errors.each { |msg| error.call(meta_path, 0, 0, nil, msg) }
+ m_warnings.each { |msg| warn.call(meta_path, 0, 0, nil, msg) }
+ m_unsupported = metadata.unsupported
+ m_unsupported.each { |u| warn.call(meta_path, 0, 0, nil, "doesn't support: #{u}") }
+ @logger.info 'Metadata OK.' if m_errors.empty? && m_unsupported.empty?
+
+ # extract profile name
+ result[:summary][:profile] = metadata.params[:name]
+
+ # check if the profile is using the old test directory instead of the
+ # new controls directory
+ if @source_reader.tests.keys.any? { |x| x =~ %r{^test/$} }
+ warn.call(@target, 0, 0, nil, 'Profile uses deprecated `test` directory, rename it to `controls`.')
+ end
+
+ count = controls_count
+ result[:summary][:controls] = count
+ if count == 0
+ warn.call(nil, nil, nil, nil, 'No controls or tests were defined.')
+ else
+ @logger.info("Found #{count} controls.")
+ end
+
+ # iterate over hash of groups
+ params[:controls].each { |id, control|
+ sfile = control[:source_location][:ref]
+ sline = control[:source_location][:line]
+ error.call(sfile, sline, nil, id, 'Avoid controls with empty IDs') if id.nil? or id.empty?
+ next if id.start_with? '(generated '
+ warn.call(sfile, sline, nil, id, "Control #{id} has no title") if control[:title].to_s.empty?
+ warn.call(sfile, sline, nil, id, "Control #{id} has no description") if control[:desc].to_s.empty?
+ warn.call(sfile, sline, nil, id, "Control #{id} has impact > 1.0") if control[:impact].to_f > 1.0
+ warn.call(sfile, sline, nil, id, "Control #{id} has impact < 0.0") if control[:impact].to_f < 0.0
+ warn.call(sfile, sline, nil, id, "Control #{id} has no tests defined") if control[:checks].nil? or control[:checks].empty?
+ }
+
+ # profile is valid if we could not find any error
+ result[:summary][:valid] = result[:errors].empty?
+
+ @logger.info 'Control definitions OK.' if result[:warnings].empty?
+ result
+ end
+
+ def controls_count
+ params[:controls].values.length
+ end
+
+ # generates a archive of a folder profile
+ # assumes that the profile was checked before
+ def archive(opts)
+ # check if file exists otherwise overwrite the archive
+ dst = archive_name(opts)
+ if dst.exist? && !opts[:overwrite]
+ @logger.info "Archive #{dst} exists already. Use --overwrite."
+ return false
+ end
+
+ # remove existing archive
+ File.delete(dst) if dst.exist?
+ @logger.info "Generate archive #{dst}."
+
+ # filter files that should not be part of the profile
+ # TODO ignore all .files, but add the files to debug output
+
+ # display all files that will be part of the archive
+ @logger.debug 'Add the following files to archive:'
+ files.each { |f| @logger.debug ' ' + f }
+
+ if opts[:zip]
+ # generate zip archive
+ require 'inspec/archive/zip'
+ zag = Inspec::Archive::ZipArchiveGenerator.new
+ zag.archive(root_path, files, dst)
+ else
+ # generate tar archive
+ require 'inspec/archive/tar'
+ tag = Inspec::Archive::TarArchiveGenerator.new
+ tag.archive(root_path, files, dst)
+ end
+
+ @logger.info 'Finished archive generation.'
+ true
+ end
+
+ def locked_dependencies
+ @locked_dependencies ||= load_dependencies
+ end
+
+ def lockfile_exists?
+ @source_reader.target.files.include?('inspec.lock')
+ end
+
+ def lockfile_path
+ File.join(cwd, 'inspec.lock')
+ end
+
+ def root_path
+ @source_reader.target.prefix
+ end
+
+ def files
+ @source_reader.target.files
+ end
+
+ #
+ # TODO(ssd): Relative path handling really needs to be carefully
+ # thought through, especially with respect to relative paths in
+ # tarballs.
+ #
+ def cwd
+ @target.is_a?(String) && File.directory?(@target) ? @target : './'
+ end
+
+ def lockfile
+ @lockfile ||= if lockfile_exists?
+ Inspec::Lockfile.from_content(@source_reader.target.read('inspec.lock'))
+ else
+ generate_lockfile
+ end
+ end
+
+ #
+ # Generate an in-memory lockfile. This won't render the lock file
+ # to disk, it must be explicitly written to disk by the caller.
+ #
+ # @param vendor_path [String] Path to the on-disk vendor dir
+ # @return [Inspec::Lockfile]
+ #
+ def generate_lockfile
+ res = Inspec::DependencySet.new(cwd, @cache, nil, @backend)
+ res.vendor(metadata.dependencies)
+ Inspec::Lockfile.from_dependency_set(res)
+ end
+
+ def load_dependencies
+ Inspec::DependencySet.from_lockfile(lockfile, cwd, @cache, @backend, { attributes: @attr_values })
+ end
+
+ # Calculate this profile's SHA256 checksum. Includes metadata, dependencies,
+ # libraries, data files, and controls.
+ #
+ # @return [Type] description of returned object
+ def sha256
+ # get all dependency checksums
+ deps = Hash[locked_dependencies.list.map { |k, v| [k, v.profile.sha256] }]
+
+ res = OpenSSL::Digest::SHA256.new
+ files = source_reader.tests.to_a + source_reader.libraries.to_a +
+ source_reader.data_files.to_a +
+ [['inspec.yml', source_reader.metadata.content]] +
+ [['inspec.lock.deps', YAML.dump(deps)]]
+
+ files.sort_by { |a| a[0] }
+ .map { |f| res << f[0] << "\0" << f[1] << "\0" }
+
+ res.digest.unpack('H*')[0]
+ end
+
+ private
+
+ # Create an archive name for this profile and an additional options
+ # configuration. Either use :output or generate the name from metadata.
+ #
+ # @param [Hash] configuration options
+ # @return [Pathname] path for the archive
+ def archive_name(opts)
+ if (name = opts[:output])
+ return Pathname.new(name)
+ end
+
+ name = params[:name] ||
+ raise('Cannot create an archive without a profile name! Please '\
+ 'specify the name in metadata or use --output to create the archive.')
+ version = params[:version] ||
+ raise('Cannot create an archive without a profile version! Please '\
+ 'specify the version in metadata or use --output to create the archive.')
+ ext = opts[:zip] ? 'zip' : 'tar.gz'
+ slug = name.downcase.strip.tr(' ', '-').gsub(/[^\w-]/, '_')
+ Pathname.new(Dir.pwd).join("#{slug}-#{version}.#{ext}")
+ end
+
+ def load_params
+ params = @source_reader.metadata.params
+ params[:name] = @profile_id unless @profile_id.nil?
+ load_checks_params(params)
+ @profile_id ||= params[:name]
+ params
+ end
+
+ def load_checks_params(params)
+ load_libraries
+ tests = collect_tests
+ params[:controls] = controls = {}
+ params[:groups] = groups = {}
+ prefix = @source_reader.target.prefix || ''
+ tests.each do |rule|
+ next if rule.nil?
+ f = load_rule_filepath(prefix, rule)
+ load_rule(rule, f, controls, groups)
+ end
+ params[:attributes] = @runner_context.attributes
+ params
+ end
+
+ def load_rule_filepath(prefix, rule)
+ file = rule.instance_variable_get(:@__file)
+ file = file[prefix.length..-1] if file.start_with?(prefix)
+ file
+ end
+
+ def load_rule(rule, file, controls, groups)
+ id = Inspec::Rule.rule_id(rule)
+ location = rule.instance_variable_get(:@__source_location)
+ controls[id] = {
+ title: rule.title,
+ desc: rule.desc,
+ impact: rule.impact,
+ refs: rule.ref,
+ tags: rule.tag,
+ checks: Inspec::Rule.checks(rule),
+ code: Inspec::MethodSource.code_at(location, source_reader),
+ source_location: location,
+ }
+
+ groups[file] ||= {
+ title: rule.instance_variable_get(:@__group_title),
+ controls: [],
+ }
+ groups[file][:controls].push(id)
+ end
+ end
+end