scap-security-guide: 0.1.45 bump

This commit is contained in:
Yury Martynov 2019-07-25 23:04:19 +03:00
parent da8f81046e
commit e943b52835
No known key found for this signature in database
GPG key ID: EBE62DD0CCEAE19E
4 changed files with 126 additions and 79 deletions

View file

@ -1 +1 @@
DIST scap-security-guide-0.1.44.tar.gz 2757345 BLAKE2B 55585489ad54c73d860b6bfa9e13526f491fa3bc1febeb39131175dd462a576049cc9c38409ebac22801ed0fd9ae95b6f937e33fbfce744f9ed51dbde756531a SHA512 14d3f1bb98b642be106a5424a639d6e24dba8c15cf1969643526fa97ab13342a802e0d86a7ee58a318cc8b4bb608aa1b45090c988884274550cc9b307f4c82fd
DIST scap-security-guide-0.1.45.tar.gz 2837742 BLAKE2B c6cde59bd2310c713f16596695ee970182027968f25166cd61f28ecd75e491a9b83025c60c184ce9dac936b47b57069c6779e1271b2e040d5ab710191fe697a2 SHA512 25ffc8934acc762eab6dd5335aaf2600ae4ae128d75ff0d46549aff9f554e4f7482f5f3ccfccfbd8dbaee03a00956e07b4c68ba81269004b7e6f39e2c7fcc89e

View file

@ -28,8 +28,12 @@
<flag name="ubuntu1404">If enabled, the Ubuntu 14.04 SCAP content will be built</flag>
<flag name="ubuntu1604">If enabled, the Ubuntu 16.04 SCAP content will be built</flag>
<flag name="ubuntu1804">If enabled, the Ubuntu 18.04 SCAP content will be built</flag>
<flag name="wrlinux">If enabled, the WRLinux SCAP content will be built</flag>
<flag name="wrlinux8">If enabled, the WRLinux8 SCAP content will be built</flag>
<flag name="wrlinux1019">If enabled, the WRLinux1019 SCAP content will be built</flag>
<flag name="centos">If enabled, CentOS derivative content will be built from the RHEL content</flag>
<flag name="scientific-linux">If enabled, Scientific Linux derivative content will be built from the RHEL content</flag>
<flag name="jinja2">If enabled, the jinja2 templating files will be cached into bytecode</flag>
<flag name="linkchecker">If enabled, linkchecker will be used to validate URLs in all the HTML guides and tables</flag>
<flag name="shellcheck">If enabled, shellcheck validation of bash fixes will be performed as part of the ctest tests</flag>
</use>
</pkgmetadata>

View file

@ -1,77 +0,0 @@
# Copyright 1999-2019 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=7
CMAKE_BUILD_TYPE="Release"
PYTHON_COMPAT=( python3_{5,6} )
SSG_PRODUCTS=(
+chromium +debian8 eap6 example +fedora +firefox fuse6
jre ocp3 ol7 ol8 +opensuse rhel6 rhel7 rhel8 rhosp13
rhv4 sle11 sle12 ubuntu1404 ubuntu1604 +ubuntu1804
+wrlinux
)
inherit cmake-utils python-r1
DESCRIPTION="Security compliance content in SCAP, Bash, Ansible, and other formats"
HOMEPAGE="https://www.open-scap.org/security-policies/scap-security-guide"
SRC_URI="https://github.com/ComplianceAsCode/content/archive/v${PV}.tar.gz -> ${P}.tar.gz"
KEYWORDS="~amd64"
LICENSE="BSD"
SLOT=0
REQUIRED_USE="${PYTHON_REQUIRED_USE}"
IUSE="${SSG_PRODUCTS[*]} centos scientific-linux"
S="${WORKDIR}"/content-${PV}
# In-source builds are not supported! Use out of source builds
BUILD_DIR="${S}/build"
RDEPEND=""
DEPEND="${PYTHON_DEPS}
app-forensics/openscap
dev-libs/expat
dev-libs/libxslt
dev-libs/libxml2:2=
app-admin/ansible[${PYTHON_USEDEP}]
app-admin/ansible-lint[${PYTHON_USEDEP}]
dev-python/pyyaml[${PYTHON_USEDEP}]
dev-python/jinja[${PYTHON_USEDEP}]"
src_prepare() {
cmake-utils_src_prepare
}
src_configure() {
local product
local mycmakeargs=(
-DCMAKE_INSTALL_DOCDIR="/usr/share/doc/${P}"
-DSSG_SEPARATE_SCAP_FILES_ENABLED='TRUE'
-DSSG_JINJA2_CACHE_ENABLED='TRUE'
# Please report if you realy need this
-DSSG_LINKCHECKER_VALIDATION_ENABLED='FALSE'
-DSSG_SHELLCHECK_BASH_FIXES_VALIDATION_ENABLED='FALSE'
$(usex centos \
"-DSSG_CENTOS_DERIVATIVES_ENABLED='TRUE'" \
"-DSSG_CENTOS_DERIVATIVES_ENABLED='FALSE'")
$(usex scientific-linux \
"-DSSG_SCIENTIFIC_LINUX_DERIVATIVES_ENABLED='TRUE'" \
"-DSSG_SCIENTIFIC_LINUX_DERIVATIVES_ENABLED='FALSE'")
)
for x in ${SSG_PRODUCTS[@]}; do
product="${x//[[:punct:]]/}"
mycmakeargs+=(
$(usex $product \
"-DSSG_PRODUCT_${product^^}='TRUE'" \
"-DSSG_PRODUCT_${product^^}='FALSE'")
)
done
cmake-utils_src_configure
}

View file

@ -0,0 +1,120 @@
# Copyright 1999-2019 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=7
PYTHON_COMPAT=( python3_{5,6} )
SSG_PRODUCTS=(
+chromium +debian8 eap6 example +fedora +firefox fuse6
jre ocp3 ol7 ol8 +opensuse rhel6 rhel7 rhel8 rhosp13
rhv4 sle11 sle12 ubuntu1404 +ubuntu1604 +ubuntu1804
wrlinux8 wrlinux1019
)
inherit cmake-utils python-r1
DESCRIPTION="Security compliance content in SCAP, Bash, Ansible, and other formats"
HOMEPAGE="https://www.open-scap.org/security-policies/scap-security-guide"
SRC_URI="https://github.com/ComplianceAsCode/content/archive/v${PV}.tar.gz -> ${P}.tar.gz"
# ol8? ( https://linux.oracle.com/security/oval/com.oracle.elsa-all.xml.bz2 -> ${P}_com.oracle.elsa-all.xml.bz2 )
# ol7? ( https://linux.oracle.com/security/oval/com.oracle.elsa-all.xml.bz2 -> ${P}_com.oracle.elsa-all.xml.bz2 )
# ubuntu1604? ( https://people.canonical.com/~ubuntu-security/oval/com.ubuntu.xenial.cve.oval.xml.bz2 -> ${P}_com.ubuntu.xenial.cve.oval.xml.bz2 )
# ubuntu1404? ( https://people.canonical.com/~ubuntu-security/oval/com.ubuntu.trusty.cve.oval.xml.bz2 -> ${P}_com.ubuntu.trusty.cve.oval.xml.bz2 )
# rhel8? ( https://www.redhat.com/security/data/oval/com.redhat.rhsa-RHEL8.xml.bz2 -> ${P}_com.redhat.rhsa-RHEL8.xml.bz2 )
# rhel7? ( https://www.redhat.com/security/data/oval/com.redhat.rhsa-RHEL7.xml.bz2 -> ${P}_com.redhat.rhsa-RHEL7.xml.bz2 )
# rhel6? ( https://www.redhat.com/security/data/oval/com.redhat.rhsa-RHEL6.xml.bz2 -> ${P}_com.redhat.rhsa-RHEL6.xml.bz2 )"
KEYWORDS="~amd64"
LICENSE="BSD"
SLOT=0
IUSE="${SSG_PRODUCTS[*]} centos jinja2 linkchecker shellcheck scientific-linux test"
REQUIRED_USE="${PYTHON_REQUIRED_USE}"
RDEPEND=""
DEPEND="${PYTHON_DEPS}
app-forensics/openscap
dev-libs/expat
dev-libs/libxslt
dev-libs/libxml2:2=
app-admin/ansible[${PYTHON_USEDEP}]
app-admin/ansible-lint[${PYTHON_USEDEP}]
dev-python/json2html[${PYTHON_USEDEP}]
dev-python/pyyaml[${PYTHON_USEDEP}]
dev-python/yamllint[${PYTHON_USEDEP}]
jinja2? ( dev-python/jinja[${PYTHON_USEDEP}] )
linkchecker? ( net-analyzer/linkchecker )
shellcheck? (
|| (
dev-util/shellcheck-bin
dev-util/shellcheck
)
)
test? (
dev-python/pytest[${PYTHON_USEDEP}]
dev-python/pytest-cov[${PYTHON_USEDEP}]
)"
S="${WORKDIR}"/content-${PV}
BUILD_DIR="${S}/build"
#src_unpack() {
# local oval_db p
#
# default
#
# find "${WORKDIR}" -maxdepth 1 -name "${P}_*.xml" | while read p; do
# oval_db=$(basename ${p})
# elog "Vendoring: ${oval_db}"
# mv "${p}" "${S}/${oval_db#${P}_}" || die
# done
#}
src_prepare() {
cmake-utils_src_prepare
}
src_configure() {
local product
local mycmakeargs=(
-DCMAKE_INSTALL_DOCDIR="/usr/share/doc/${P}"
-DSSG_JINJA2_CACHE_DIR="${T}/jinja2_cache"
-DSSG_SVG_IN_XCCDF_ENABLED='TRUE'
-DSSG_SEPARATE_SCAP_FILES_ENABLED='TRUE'
$(usex jinja2 \
"-DSSG_JINJA2_CACHE_ENABLED='TRUE'" \
"-DSSG_JINJA2_CACHE_ENABLED='FALSE'")
$(usex centos \
"-DSSG_CENTOS_DERIVATIVES_ENABLED='TRUE'" \
"-DSSG_CENTOS_DERIVATIVES_ENABLED='FALSE'")
$(usex scientific-linux \
"-DSSG_SCIENTIFIC_LINUX_DERIVATIVES_ENABLED='TRUE'" \
"-DSSG_SCIENTIFIC_LINUX_DERIVATIVES_ENABLED='FALSE'")
$(usex test \
"-DENABLE_PYTHON_COVERAGE='ON'" \
"-DENABLE_PYTHON_COVERAGE='OFF'")
$(usex linkchecker \
"-DSSG_LINKCHECKER_VALIDATION_ENABLED='TRUE'" \
"-DSSG_LINKCHECKER_VALIDATION_ENABLED='FALSE'")
$(usex shellcheck \
"-DSSG_SHELLCHECK_BASH_FIXES_VALIDATION_ENABLED='TRUE'" \
"-DSSG_SHELLCHECK_BASH_FIXES_VALIDATION_ENABLED='FALSE'")
)
for x in ${SSG_PRODUCTS[@]}; do
product="${x//[[:punct:]]/}"
mycmakeargs+=(
$(usex $product \
"-DSSG_PRODUCT_${product^^}='TRUE'" \
"-DSSG_PRODUCT_${product^^}='FALSE'")
)
done
cmake-utils_src_configure
}
src_test() {
cmake-utils_src_test
}