[packit] 0.2.3 upstream release

Upstream tag: v0.2.3
Upstream commit: 98984c9b

Signed-off-by: Packit <hello@packit.dev>
This commit is contained in:
Packit 2023-04-14 09:27:08 +00:00
parent d5da63f247
commit 1cd0141169
7 changed files with 97 additions and 4 deletions

1
.gitignore vendored
View File

@ -3,3 +3,4 @@
/openscap-report-0.2.0.tar.gz
/openscap-report-0.2.1.tar.gz
/openscap-report-0.2.2.tar.gz
/openscap-report-0.2.3.tar.gz

View File

@ -34,13 +34,21 @@ actions:
jobs:
- job: propose_downstream
trigger: release
identifier: release-rawhide
dist_git_branches:
- fedora-rawhide
- job: propose_downstream
trigger: release
identifier: release-epel8
specfile_path: spec/rhel8/openscap-report.spec
dist_git_branches:
- epel-8
- job: tests
trigger: pull_request
identifier: tests-all
tmt_plan: smoke
targets:
- fedora-all
- epel-9

View File

@ -1,3 +1,3 @@
This repository is maintained by packit.
https://packit.dev/
The file was generated using packit 0.69.0.post27+g1374cc1.
The file was generated using packit 0.72.0.post2+g57b7cc3.

View File

@ -1,8 +1,8 @@
%global pymodule_name openscap_report
Name: openscap-report
Version: 0.2.2
Release: 0%{?dist}
Version: 0.2.3
Release: 1%{?dist}
Summary: A tool for generating human-readable reports from (SCAP) XCCDF and ARF results
# The entire source code is LGPL-2.1+ and GPL-2.0+ and MIT except schemas/ and assets/, which are Public Domain
@ -60,6 +60,42 @@ install -m 0644 -Dt %{buildroot}%{_mandir}/man1 _build_docs/oscap-report.1
%changelog
* Fri Apr 14 2023 Packit <hello@packit.dev> - 0.2.3-1
- 0.2.3 (Jan Rodak)
- Determine which product use (Jan Rodak)
- Discover upstream (Jan Rodak)
- Run only smoke test in Testing Farm (Jan Rodak)
- Add weekly execution of integration test (Jan Rodak)
- Add tmt tests (Jan Rodak)
- Add tmt plan (Jan Rodak)
- Modify the smoke test to use different ARF reports (Jan Rodak)
- Add script for generation of ARF report (Jan Rodak)
- Add filter for rule id (Jan Rodak)
- Select new multi-check rules (Jan Rodak)
- Create copy of multi-check rule for every OVAL definition (Jan Rodak)
- Make method _get_applicable_cpe_ids_for_machine part of ProfileInfo and rename the method to get_list_of_cpe_platforms_that_satisfy_evaluation_target (Jan Rodak)
- Adapt input of oval_cpe_definiton in test (Jan Rodak)
- Adapt the mapping of OVAL definitions to the new OVAL definition analysis system and specify which OVAL result report is for CPE (Jan Rodak)
- Parse all OVAL definition from all OVAL result reports (Jan Rodak)
- Add parsing of OVAL refence to OVAL report (Jan Rodak)
- Load all oval reports present in ARF report (Jan Rodak)
- Fix typo in link (Jan Rodak)
- Sync tests with downstream (Jan Rodak)
- Add required parameter (Jan Rodak)
- Move unit tests from interation_tests direcory (Jan Rodak)
- Move function get_fake_args to test utils (Jan Rodak)
- Create separate job propose_downstream for EPEL8 (Jan Rodak)
- Sort chapters (Jan Rodak)
- Add manual about report content (Jan Rodak)
- Add assets (Jan Rodak)
- Fix typo (Jan Rodak)
- Add license tag (Jan Rodak)
- Add explanation of result of OVAL definition (Jan Rodak)
- Parse class of OVAL definition (Jan Rodak)
- Add tests for CPE AL (Jan Rodak)
- Fix negation of logical test (Jan Rodak)
- Add support for check-fact-ref element in CPE-AL (Jan Rodak)
* Tue Mar 28 2023 Packit <hello@packit.dev> - 0.2.2-0
- 0.2.2 (Jan Rodak)
- Clean up CI jobs titles (Evgeny Kolesnikov)

47
plans/integration.fmf Normal file
View File

@ -0,0 +1,47 @@
summary: Test integration with latest versions of content
discover+:
filter: tag:integration
adjust:
- when: distro == fedora
environment:
PRODUCT: fedora
TO_BUILD_PRODUCT: fedora
- when: distro == rhel-9
environment:
PRODUCT: rhel9
TO_BUILD_PRODUCT: rhel9
- when: distro == rhel-8
environment:
PRODUCT: rhel8
TO_BUILD_PRODUCT: rhel8
- when: distro == centos-8
environment:
PRODUCT: centos8
TO_BUILD_PRODUCT: rhel8
- when: distro == centos-9 or distro == centos-stream-9
environment:
PRODUCT: cs9
TO_BUILD_PRODUCT: rhel9
prepare:
- name: Install packages require for generation ARF files
how: install
package:
- cmake
- make
- openscap-utils
- openscap-scanner
- python3-pyyaml
- python3-jinja2
- python3-setuptools
- git
- scap-security-guide
- name: Generate ARF files
how: shell
script:
- ./generate_arf.sh ssg no ${PRODUCT} ${TMT_PLAN_DATA}/arf.xml
- ./generate_arf.sh ssg yes ${PRODUCT} ${TMT_PLAN_DATA}/arf_fetch-remote-resources.xml
- ./generate_arf.sh latest no ${TO_BUILD_PRODUCT} ${TMT_PLAN_DATA}/arf-latest.xml
- ./generate_arf.sh latest yes ${TO_BUILD_PRODUCT} ${TMT_PLAN_DATA}/arf_fetch-remote-resources-latest.xml yes
execute:
how: tmt

View File

@ -2,3 +2,4 @@ execute:
how: tmt
discover:
how: fmf
url: https://github.com/OpenSCAP/openscap-report.git

View File

@ -1 +1 @@
SHA512 (openscap-report-0.2.2.tar.gz) = 312f3a604a19b2d5f46413e247ad98727a8a8e9f530bef6ece0ebdf943f535a2f97bb91fa60dd33420b5ff6c5317103bf453d014833c04e3fdf443740f047288
SHA512 (openscap-report-0.2.3.tar.gz) = ec0d3cbefe44ff0c46de8c738b6ee1e8436c971bdea8135e8beb5616a3cea2012408e4c2e05d2a55f1d9764c174ea87b8612ac5a5ef19792f55faa61b326038e