%global _empty_manifest_terminate_build 0 Name: python-flake8-bandit Version: 4.1.1 Release: 1 Summary: Automated security testing with bandit and flake8. License: MIT URL: https://github.com/tylerwince/flake8-bandit Source0: https://mirrors.nju.edu.cn/pypi/web/packages/77/1c/4f66a7a52a246d6c64312b5c40da3af3630cd60b27af81b137796af3c0bc/flake8_bandit-4.1.1.tar.gz BuildArch: noarch Requires: python3-flake8 Requires: python3-bandit %description # flake8-bandit [![Build Status](https://travis-ci.org/tylerwince/flake8-bandit.svg?branch=master)](https://travis-ci.org/tylerwince/flake8-bandit) Automated security testing built right into your workflow! You already use flake8 to lint all your code for errors, ensure docstrings are formatted correctly, sort your imports correctly, and much more... so why not ensure you are writing secure code while you're at it? If you already have flake8 installed all it takes is `pip install flake8-bandit`. ## Configuration To include or exclude tests, use the standard `.bandit` configuration file. An example valid `.bandit` config file: ```text [bandit] exclude = /frontend,/scripts,/tests,/venv tests: B101 ``` In this case, we've specified to ignore a number of paths, and to only test for B101. **Note:** flake8-bugbear uses bandit default prefix 'B' so this plugin replaces the 'B' with an 'S' for Security. For more information, see https://github.com/PyCQA/flake8-bugbear/issues/37 ## How's it work? We use the [bandit](https://github.com/PyCQA/bandit) package from [PyCQA](https://meta.pycqa.org/#) for all the security testing. %package -n python3-flake8-bandit Summary: Automated security testing with bandit and flake8. Provides: python-flake8-bandit BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-flake8-bandit # flake8-bandit [![Build Status](https://travis-ci.org/tylerwince/flake8-bandit.svg?branch=master)](https://travis-ci.org/tylerwince/flake8-bandit) Automated security testing built right into your workflow! You already use flake8 to lint all your code for errors, ensure docstrings are formatted correctly, sort your imports correctly, and much more... so why not ensure you are writing secure code while you're at it? If you already have flake8 installed all it takes is `pip install flake8-bandit`. ## Configuration To include or exclude tests, use the standard `.bandit` configuration file. An example valid `.bandit` config file: ```text [bandit] exclude = /frontend,/scripts,/tests,/venv tests: B101 ``` In this case, we've specified to ignore a number of paths, and to only test for B101. **Note:** flake8-bugbear uses bandit default prefix 'B' so this plugin replaces the 'B' with an 'S' for Security. For more information, see https://github.com/PyCQA/flake8-bugbear/issues/37 ## How's it work? We use the [bandit](https://github.com/PyCQA/bandit) package from [PyCQA](https://meta.pycqa.org/#) for all the security testing. %package help Summary: Development documents and examples for flake8-bandit Provides: python3-flake8-bandit-doc %description help # flake8-bandit [![Build Status](https://travis-ci.org/tylerwince/flake8-bandit.svg?branch=master)](https://travis-ci.org/tylerwince/flake8-bandit) Automated security testing built right into your workflow! You already use flake8 to lint all your code for errors, ensure docstrings are formatted correctly, sort your imports correctly, and much more... so why not ensure you are writing secure code while you're at it? If you already have flake8 installed all it takes is `pip install flake8-bandit`. ## Configuration To include or exclude tests, use the standard `.bandit` configuration file. An example valid `.bandit` config file: ```text [bandit] exclude = /frontend,/scripts,/tests,/venv tests: B101 ``` In this case, we've specified to ignore a number of paths, and to only test for B101. **Note:** flake8-bugbear uses bandit default prefix 'B' so this plugin replaces the 'B' with an 'S' for Security. For more information, see https://github.com/PyCQA/flake8-bugbear/issues/37 ## How's it work? We use the [bandit](https://github.com/PyCQA/bandit) package from [PyCQA](https://meta.pycqa.org/#) for all the security testing. %prep %autosetup -n flake8-bandit-4.1.1 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-flake8-bandit -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Fri Apr 21 2023 Python_Bot - 4.1.1-1 - Package Spec generated