lib/resources/aws/aws_security_groups.rb in inspec-2.1.81 vs lib/resources/aws/aws_security_groups.rb in inspec-2.1.83
- old
+ new
@@ -1,68 +1,68 @@
-class AwsSecurityGroups < Inspec.resource(1)
- name 'aws_security_groups'
- desc 'Verifies settings for AWS Security Groups in bulk'
- example <<-EOX
- # Verify that you have security groups defined
- describe aws_security_groups do
- it { should exist }
- end
-
- # Verify you have more than the default security group
- describe aws_security_groups do
- its('entries.count') { should be > 1 }
- end
-EOX
- supports platform: 'aws'
-
- include AwsPluralResourceMixin
-
- # Underlying FilterTable implementation.
- filter = FilterTable.create
- filter.add_accessor(:where)
- .add_accessor(:entries)
- .add(:exists?) { |x| !x.entries.empty? }
- .add(:group_ids, field: :group_id)
- filter.connect(self, :table)
-
- def to_s
- 'EC2 Security Groups'
- end
-
- private
-
- def validate_params(raw_criteria)
- unless raw_criteria.is_a? Hash
- raise 'Unrecognized criteria for fetching Security Groups. ' \
- "Use 'criteria: value' format."
- end
-
- # No criteria yet
- unless raw_criteria.empty?
- raise ArgumentError, 'aws_ec2_security_groups does not currently accept resource parameters.'
- end
- raw_criteria
- end
-
- def fetch_from_api
- @table = []
- backend = BackendFactory.create(inspec_runner)
- backend.describe_security_groups({}).security_groups.each do |sg_info|
- @table.push({
- group_id: sg_info.group_id,
- group_name: sg_info.group_name,
- vpc_id: sg_info.vpc_id,
- })
- end
- end
-
- class Backend
- class AwsClientApi < AwsBackendBase
- BackendFactory.set_default_backend self
- self.aws_client_class = Aws::EC2::Client
-
- def describe_security_groups(query)
- aws_service_client.describe_security_groups(query)
- end
- end
- end
-end
+class AwsSecurityGroups < Inspec.resource(1)
+ name 'aws_security_groups'
+ desc 'Verifies settings for AWS Security Groups in bulk'
+ example <<-EOX
+ # Verify that you have security groups defined
+ describe aws_security_groups do
+ it { should exist }
+ end
+
+ # Verify you have more than the default security group
+ describe aws_security_groups do
+ its('entries.count') { should be > 1 }
+ end
+EOX
+ supports platform: 'aws'
+
+ include AwsPluralResourceMixin
+
+ # Underlying FilterTable implementation.
+ filter = FilterTable.create
+ filter.add_accessor(:where)
+ .add_accessor(:entries)
+ .add(:exists?) { |x| !x.entries.empty? }
+ .add(:group_ids, field: :group_id)
+ filter.connect(self, :table)
+
+ def to_s
+ 'EC2 Security Groups'
+ end
+
+ private
+
+ def validate_params(raw_criteria)
+ unless raw_criteria.is_a? Hash
+ raise 'Unrecognized criteria for fetching Security Groups. ' \
+ "Use 'criteria: value' format."
+ end
+
+ # No criteria yet
+ unless raw_criteria.empty?
+ raise ArgumentError, 'aws_ec2_security_groups does not currently accept resource parameters.'
+ end
+ raw_criteria
+ end
+
+ def fetch_from_api
+ @table = []
+ backend = BackendFactory.create(inspec_runner)
+ backend.describe_security_groups({}).security_groups.each do |sg_info|
+ @table.push({
+ group_id: sg_info.group_id,
+ group_name: sg_info.group_name,
+ vpc_id: sg_info.vpc_id,
+ })
+ end
+ end
+
+ class Backend
+ class AwsClientApi < AwsBackendBase
+ BackendFactory.set_default_backend self
+ self.aws_client_class = Aws::EC2::Client
+
+ def describe_security_groups(query)
+ aws_service_client.describe_security_groups(query)
+ end
+ end
+ end
+end