Chef report handler to send Amazon SNS notifications on failures or changes, includes IAM roles support.
A simple Chef Report Handler to display resources that were updated at the end of the Chef run.
I don't maintain this anymore.
A dead simple Chef handler to report changes in users. Can send emails using the Pony gem.
A simple Chef report handler to send notifications to ZooKeeper about Chef runs.
Node.js Chef client module
This adds a simple function to the Chef library scope to rewind or unwind an existing resource. If the given resource does not exist, a Chef::Exceptions::ResourceNotFound exception will be raised.
These functions are designed to assist the library cookbook pattern.
Effectively, rewind/unwind resource allows you to monkeypatch a cookbook that you would rather not modify directly. It will modify some properties of a resource, during the complile phase, before chef-client actually starts the run phase.
chef-runner is a tool that speeds up your Chef development and testing workflow.
chef-runner tries hard to provision a machine as fast as possible. It thereby allows you to change infrastructure code and get immediate feedback.
The tool was originally developed as a fast alternative to the painfully slow `vagrant provision`. It has since evolved and can now be used to rapidly provision not only local Vagrant machines but also remote hosts like EC2 instances.
To further shorten the feedback loop, chef-runner integrates with Vim so you don't have to leave your editor while hacking on recipes.
ChefSpec is a unit-testing framework for Chef cookbook. It allows you to write RSpec examples and generate coverage reports for Chef recipes!
Perform validation on your node's attributes from a Cookbook's attribute metadata definitions.
Securely manage passwords, certs, and other secrets in Chef. chef-vault asymmetrically encrypts the secret for a Chef encrypted data bag with the public key of each node and/or user who needs to access it.
Ohai plugin to discover installed Chocolatey packages
This profile implements the CIS Distribution Independent Linux 1.0.1 Benchmark.
This InSpec compliance profile implement the CIS Docker 1.11.0 Benchmark in an automated way to provide security best-practices tests around Docker daemon and containers in a production environment.
InSpec is an open-source run-time framework and rule language used to specify compliance, security, and policy requirements for testing any node in your infrastructure.
This profile implements the CIS Kubernetes 1.1.0 Benchmark.
Yeah so this is cool. It will collect all information about every LXC or Docker container whether it is running or not. Hopefully, we can add platform_family and other pieces to it as well. Then, this would allow us to write some awesome multi-provider cookbooks to extend package, service, execute, etc.
Inspec profile for detecting CVE-2016-5195 aka Dirty COW
Apache compliance profile, used for Security + DevOps. More information is available at http://dev-sec.io
Linux compliance profile, used for Security + DevOps. More information is available at http://dev-sec.io
Linux patch compliance profile, used for Security + DevOps. More information is available at http://dev-sec.io
MySQL compliance profile, used for Security + DevOps. More information is available at http://dev-sec.io