%global _empty_manifest_terminate_build 0 Name: python-cloudrail-knowledge Version: 0.0.228 Release: 1 Summary: Cloudrail's package for security rules License: MIT License URL: https://github.com/indeni/cloudrail-knowledge Source0: https://mirrors.nju.edu.cn/pypi/web/packages/de/44/08679a992c1fc0de51d71a4a2de2e5aad5cba8507c734dc50b11233977db/cloudrail-knowledge-0.0.228.tar.gz BuildArch: noarch Requires: python3-arnparse Requires: python3-boto3 Requires: python3-netaddr Requires: python3-dataclasses-json Requires: python3-PyYAML Requires: python3-packaging Requires: python3-cfn-tools Requires: python3-backoff Requires: python3-requests Requires: python3-deepdiff Requires: python3-rsa Requires: python3-natsort Requires: python3-cfn-flip %description ![CD](https://github.com/indeni/cloudrail-knowledge/actions/workflows/ci.yaml/badge.svg) ![PyPI](https://img.shields.io/badge/python-3.7+-blue.svg) ![GitHub license](https://img.shields.io/badge/license-MIT-brightgreen.svg) ![PRs Welcome](https://img.shields.io/badge/PRs-welcome-brightgreen.svg) ![Makrdown Check List](https://github.com/indeni/cloudrail-knowledge/actions/workflows/release.yaml/badge.svg) # Cloudrail Knowledge [Cloudrail](https://www.indeni.com/cloudrail) is a tool for doing security analysis of infrastructure-as-code before its deployment. For example Cloudrail can inspect Terraform plans and identify configurations that violate company policy and best practices, and stop the CI pipeline accordingly. This repository contains the rules that Cloudrail runs to conduct this analysis, as well as the context model the rules evaluate against. You can use this repository for a few purposes: 1. Review the rules Cloudrail has and how they work. 2. Propose additions/changes to rules (just open a PR). 3. Build your own custom rules using the same context model existing rules use (for examples see [cloudrail-sample-custom-rules](https://github.com/indeni/cloudrail-sample-custom-rules)) Want to understand how Cloudrail's knowledge works? Our documentation is available at [https://knowledge.docs.cloudrail.app/](https://knowledge.docs.cloudrail.app/). ## Contributing We welcome all contributions. Simply open an issue and a PR with your additions or changes. Some requirements: * Branch names should be `_`. Such as `issue_40_add_docdb_encryption_rule` or `40_add_docdb_encryption_rule`. * Any rule must have tests, see the `tests` directory on how these are built. ## Releases This repository has frequent releases. Those with "beta" or "b" in their name are considered still in development, not yet included in the production Cloudrail code (running in the Cloudrail SaaS). The latest non-beta release is the one currently running within Cloudrail's production service. %package -n python3-cloudrail-knowledge Summary: Cloudrail's package for security rules Provides: python-cloudrail-knowledge BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-cloudrail-knowledge ![CD](https://github.com/indeni/cloudrail-knowledge/actions/workflows/ci.yaml/badge.svg) ![PyPI](https://img.shields.io/badge/python-3.7+-blue.svg) ![GitHub license](https://img.shields.io/badge/license-MIT-brightgreen.svg) ![PRs Welcome](https://img.shields.io/badge/PRs-welcome-brightgreen.svg) ![Makrdown Check List](https://github.com/indeni/cloudrail-knowledge/actions/workflows/release.yaml/badge.svg) # Cloudrail Knowledge [Cloudrail](https://www.indeni.com/cloudrail) is a tool for doing security analysis of infrastructure-as-code before its deployment. For example Cloudrail can inspect Terraform plans and identify configurations that violate company policy and best practices, and stop the CI pipeline accordingly. This repository contains the rules that Cloudrail runs to conduct this analysis, as well as the context model the rules evaluate against. You can use this repository for a few purposes: 1. Review the rules Cloudrail has and how they work. 2. Propose additions/changes to rules (just open a PR). 3. Build your own custom rules using the same context model existing rules use (for examples see [cloudrail-sample-custom-rules](https://github.com/indeni/cloudrail-sample-custom-rules)) Want to understand how Cloudrail's knowledge works? Our documentation is available at [https://knowledge.docs.cloudrail.app/](https://knowledge.docs.cloudrail.app/). ## Contributing We welcome all contributions. Simply open an issue and a PR with your additions or changes. Some requirements: * Branch names should be `_`. Such as `issue_40_add_docdb_encryption_rule` or `40_add_docdb_encryption_rule`. * Any rule must have tests, see the `tests` directory on how these are built. ## Releases This repository has frequent releases. Those with "beta" or "b" in their name are considered still in development, not yet included in the production Cloudrail code (running in the Cloudrail SaaS). The latest non-beta release is the one currently running within Cloudrail's production service. %package help Summary: Development documents and examples for cloudrail-knowledge Provides: python3-cloudrail-knowledge-doc %description help ![CD](https://github.com/indeni/cloudrail-knowledge/actions/workflows/ci.yaml/badge.svg) ![PyPI](https://img.shields.io/badge/python-3.7+-blue.svg) ![GitHub license](https://img.shields.io/badge/license-MIT-brightgreen.svg) ![PRs Welcome](https://img.shields.io/badge/PRs-welcome-brightgreen.svg) ![Makrdown Check List](https://github.com/indeni/cloudrail-knowledge/actions/workflows/release.yaml/badge.svg) # Cloudrail Knowledge [Cloudrail](https://www.indeni.com/cloudrail) is a tool for doing security analysis of infrastructure-as-code before its deployment. For example Cloudrail can inspect Terraform plans and identify configurations that violate company policy and best practices, and stop the CI pipeline accordingly. This repository contains the rules that Cloudrail runs to conduct this analysis, as well as the context model the rules evaluate against. You can use this repository for a few purposes: 1. Review the rules Cloudrail has and how they work. 2. Propose additions/changes to rules (just open a PR). 3. Build your own custom rules using the same context model existing rules use (for examples see [cloudrail-sample-custom-rules](https://github.com/indeni/cloudrail-sample-custom-rules)) Want to understand how Cloudrail's knowledge works? Our documentation is available at [https://knowledge.docs.cloudrail.app/](https://knowledge.docs.cloudrail.app/). ## Contributing We welcome all contributions. Simply open an issue and a PR with your additions or changes. Some requirements: * Branch names should be `_`. Such as `issue_40_add_docdb_encryption_rule` or `40_add_docdb_encryption_rule`. * Any rule must have tests, see the `tests` directory on how these are built. ## Releases This repository has frequent releases. Those with "beta" or "b" in their name are considered still in development, not yet included in the production Cloudrail code (running in the Cloudrail SaaS). The latest non-beta release is the one currently running within Cloudrail's production service. %prep %autosetup -n cloudrail-knowledge-0.0.228 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-cloudrail-knowledge -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Mon Apr 10 2023 Python_Bot - 0.0.228-1 - Package Spec generated