diff options
| author | CoprDistGit <infra@openeuler.org> | 2023-04-10 23:50:28 +0000 |
|---|---|---|
| committer | CoprDistGit <infra@openeuler.org> | 2023-04-10 23:50:28 +0000 |
| commit | 61f22c1c344f5e870c49b2d098f2e51934a603d1 (patch) | |
| tree | 685a0e9fa3654dd1e394d5f1f5df9bf9b89e70cc /python-cloudrail-knowledge.spec | |
| parent | e385037b8bd9a4fa8bdc56c9ec41fe6d98ad0491 (diff) | |
automatic import of python-cloudrail-knowledge
Diffstat (limited to 'python-cloudrail-knowledge.spec')
| -rw-r--r-- | python-cloudrail-knowledge.spec | 184 |
1 files changed, 184 insertions, 0 deletions
diff --git a/python-cloudrail-knowledge.spec b/python-cloudrail-knowledge.spec new file mode 100644 index 0000000..cb7b877 --- /dev/null +++ b/python-cloudrail-knowledge.spec @@ -0,0 +1,184 @@ +%global _empty_manifest_terminate_build 0 +Name: python-cloudrail-knowledge +Version: 0.0.228 +Release: 1 +Summary: Cloudrail's package for security rules +License: MIT License +URL: https://github.com/indeni/cloudrail-knowledge +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/de/44/08679a992c1fc0de51d71a4a2de2e5aad5cba8507c734dc50b11233977db/cloudrail-knowledge-0.0.228.tar.gz +BuildArch: noarch + +Requires: python3-arnparse +Requires: python3-boto3 +Requires: python3-netaddr +Requires: python3-dataclasses-json +Requires: python3-PyYAML +Requires: python3-packaging +Requires: python3-cfn-tools +Requires: python3-backoff +Requires: python3-requests +Requires: python3-deepdiff +Requires: python3-rsa +Requires: python3-natsort +Requires: python3-cfn-flip + +%description + + + + + + +# Cloudrail Knowledge +[Cloudrail](https://www.indeni.com/cloudrail) is a tool for doing security analysis of infrastructure-as-code before +its deployment. For example Cloudrail can inspect Terraform plans and identify configurations +that violate company policy and best practices, and stop the CI pipeline accordingly. + +This repository contains the rules that Cloudrail runs to conduct this analysis, as well as the context model the rules +evaluate against. You can use this repository for a few purposes: +1. Review the rules Cloudrail has and how they work. +2. Propose additions/changes to rules (just open a PR). +3. Build your own custom rules using the same context model existing rules use (for examples see + [cloudrail-sample-custom-rules](https://github.com/indeni/cloudrail-sample-custom-rules)) + +Want to understand how Cloudrail's knowledge works? Our documentation is available at +[https://knowledge.docs.cloudrail.app/](https://knowledge.docs.cloudrail.app/). + +## Contributing +We welcome all contributions. Simply open an issue and a PR with your additions or changes. Some requirements: +* Branch names should be `<ticket-id>_<what_it's_trying_to_solve>`. Such as `issue_40_add_docdb_encryption_rule` or + `40_add_docdb_encryption_rule`. +* Any rule must have tests, see the `tests` directory on how these are built. + +## Releases +This repository has frequent releases. Those with "beta" or "b" in their name are considered still in development, +not yet included in the production Cloudrail code (running in the Cloudrail SaaS). The latest non-beta release is +the one currently running within Cloudrail's production service. + + + + +%package -n python3-cloudrail-knowledge +Summary: Cloudrail's package for security rules +Provides: python-cloudrail-knowledge +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-cloudrail-knowledge + + + + + + +# Cloudrail Knowledge +[Cloudrail](https://www.indeni.com/cloudrail) is a tool for doing security analysis of infrastructure-as-code before +its deployment. For example Cloudrail can inspect Terraform plans and identify configurations +that violate company policy and best practices, and stop the CI pipeline accordingly. + +This repository contains the rules that Cloudrail runs to conduct this analysis, as well as the context model the rules +evaluate against. You can use this repository for a few purposes: +1. Review the rules Cloudrail has and how they work. +2. Propose additions/changes to rules (just open a PR). +3. Build your own custom rules using the same context model existing rules use (for examples see + [cloudrail-sample-custom-rules](https://github.com/indeni/cloudrail-sample-custom-rules)) + +Want to understand how Cloudrail's knowledge works? Our documentation is available at +[https://knowledge.docs.cloudrail.app/](https://knowledge.docs.cloudrail.app/). + +## Contributing +We welcome all contributions. Simply open an issue and a PR with your additions or changes. Some requirements: +* Branch names should be `<ticket-id>_<what_it's_trying_to_solve>`. Such as `issue_40_add_docdb_encryption_rule` or + `40_add_docdb_encryption_rule`. +* Any rule must have tests, see the `tests` directory on how these are built. + +## Releases +This repository has frequent releases. Those with "beta" or "b" in their name are considered still in development, +not yet included in the production Cloudrail code (running in the Cloudrail SaaS). The latest non-beta release is +the one currently running within Cloudrail's production service. + + + + +%package help +Summary: Development documents and examples for cloudrail-knowledge +Provides: python3-cloudrail-knowledge-doc +%description help + + + + + + +# Cloudrail Knowledge +[Cloudrail](https://www.indeni.com/cloudrail) is a tool for doing security analysis of infrastructure-as-code before +its deployment. For example Cloudrail can inspect Terraform plans and identify configurations +that violate company policy and best practices, and stop the CI pipeline accordingly. + +This repository contains the rules that Cloudrail runs to conduct this analysis, as well as the context model the rules +evaluate against. You can use this repository for a few purposes: +1. Review the rules Cloudrail has and how they work. +2. Propose additions/changes to rules (just open a PR). +3. Build your own custom rules using the same context model existing rules use (for examples see + [cloudrail-sample-custom-rules](https://github.com/indeni/cloudrail-sample-custom-rules)) + +Want to understand how Cloudrail's knowledge works? Our documentation is available at +[https://knowledge.docs.cloudrail.app/](https://knowledge.docs.cloudrail.app/). + +## Contributing +We welcome all contributions. Simply open an issue and a PR with your additions or changes. Some requirements: +* Branch names should be `<ticket-id>_<what_it's_trying_to_solve>`. Such as `issue_40_add_docdb_encryption_rule` or + `40_add_docdb_encryption_rule`. +* Any rule must have tests, see the `tests` directory on how these are built. + +## Releases +This repository has frequent releases. Those with "beta" or "b" in their name are considered still in development, +not yet included in the production Cloudrail code (running in the Cloudrail SaaS). The latest non-beta release is +the one currently running within Cloudrail's production service. + + + + +%prep +%autosetup -n cloudrail-knowledge-0.0.228 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-cloudrail-knowledge -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Mon Apr 10 2023 Python_Bot <Python_Bot@openeuler.org> - 0.0.228-1 +- Package Spec generated |
