blob: 43aa40f51cfbb85c3f08a4baf080829497c50a1f (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
|
%global _empty_manifest_terminate_build 0
Name: python-ThreatPlaybook
Version: 1.2.3
Release: 1
Summary: Threat-Models-as Code, An Action-Oriented Threat Modeling and Automation Framework
License: MIT License
URL: https://we45.gitbook.io/threatplaybook/
Source0: https://mirrors.aliyun.com/pypi/web/packages/8a/96/95db8489e8a1a500780c34b2cccb4e26dbbb2a91ced1b73f89b84749171b/ThreatPlaybook-1.2.3.tar.gz
BuildArch: noarch
%description
# ThreatPlaybook
A (relatively) Unopinionated framework that faciliates Threat Modeling as Code married with Application Security Automation on a single Fabric
> Catch up with us at BlackHat USA 2018 at Arsenal between 4pm and 5:20pm on 8th Aug 2018
[](https://www.blackhat.com/us-18/arsenal/schedule/index.html#threatplaybook-11697)
[](https://travis-ci.org/we45/ThreatPlaybook)

## Brought to you proudly by

## Documentation and Installation Instructions
**We highly encourage you to go over the documentation for better understanding how you can leverage/contribute to ThreatPlaybook**
[ThreatPlaybook Documentation - Gitbook](https://we45.gitbook.io/threatplaybook/)
Keyword Documentation for this library is [here](https://s3.amazonaws.com/threat-playbook/keywords.html)
%package -n python3-ThreatPlaybook
Summary: Threat-Models-as Code, An Action-Oriented Threat Modeling and Automation Framework
Provides: python-ThreatPlaybook
BuildRequires: python3-devel
BuildRequires: python3-setuptools
BuildRequires: python3-pip
%description -n python3-ThreatPlaybook
# ThreatPlaybook
A (relatively) Unopinionated framework that faciliates Threat Modeling as Code married with Application Security Automation on a single Fabric
> Catch up with us at BlackHat USA 2018 at Arsenal between 4pm and 5:20pm on 8th Aug 2018
[](https://www.blackhat.com/us-18/arsenal/schedule/index.html#threatplaybook-11697)
[](https://travis-ci.org/we45/ThreatPlaybook)

## Brought to you proudly by

## Documentation and Installation Instructions
**We highly encourage you to go over the documentation for better understanding how you can leverage/contribute to ThreatPlaybook**
[ThreatPlaybook Documentation - Gitbook](https://we45.gitbook.io/threatplaybook/)
Keyword Documentation for this library is [here](https://s3.amazonaws.com/threat-playbook/keywords.html)
%package help
Summary: Development documents and examples for ThreatPlaybook
Provides: python3-ThreatPlaybook-doc
%description help
# ThreatPlaybook
A (relatively) Unopinionated framework that faciliates Threat Modeling as Code married with Application Security Automation on a single Fabric
> Catch up with us at BlackHat USA 2018 at Arsenal between 4pm and 5:20pm on 8th Aug 2018
[](https://www.blackhat.com/us-18/arsenal/schedule/index.html#threatplaybook-11697)
[](https://travis-ci.org/we45/ThreatPlaybook)

## Brought to you proudly by

## Documentation and Installation Instructions
**We highly encourage you to go over the documentation for better understanding how you can leverage/contribute to ThreatPlaybook**
[ThreatPlaybook Documentation - Gitbook](https://we45.gitbook.io/threatplaybook/)
Keyword Documentation for this library is [here](https://s3.amazonaws.com/threat-playbook/keywords.html)
%prep
%autosetup -n ThreatPlaybook-1.2.3
%build
%py3_build
%install
%py3_install
install -d -m755 %{buildroot}/%{_pkgdocdir}
if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
pushd %{buildroot}
if [ -d usr/lib ]; then
find usr/lib -type f -printf "\"/%h/%f\"\n" >> filelist.lst
fi
if [ -d usr/lib64 ]; then
find usr/lib64 -type f -printf "\"/%h/%f\"\n" >> filelist.lst
fi
if [ -d usr/bin ]; then
find usr/bin -type f -printf "\"/%h/%f\"\n" >> filelist.lst
fi
if [ -d usr/sbin ]; then
find usr/sbin -type f -printf "\"/%h/%f\"\n" >> filelist.lst
fi
touch doclist.lst
if [ -d usr/share/man ]; then
find usr/share/man -type f -printf "\"/%h/%f.gz\"\n" >> doclist.lst
fi
popd
mv %{buildroot}/filelist.lst .
mv %{buildroot}/doclist.lst .
%files -n python3-ThreatPlaybook -f filelist.lst
%dir %{python3_sitelib}/*
%files help -f doclist.lst
%{_docdir}/*
%changelog
* Fri Jun 09 2023 Python_Bot <Python_Bot@openeuler.org> - 1.2.3-1
- Package Spec generated
|