@@ -683,7 +683,7 @@ accreditations passed to the framework by the CLI.
683
683
684
684
685
685
Fixers
686
- ~~~~~~
686
+ ------
687
687
688
688
After checks have been run, but before notifications or reports are
689
689
generated, the Auditree framework will optionally try to fix the
@@ -703,7 +703,7 @@ See :ref:`fixers` section for more information.
703
703
704
704
705
705
Report Builder
706
- ~~~~~~~~~~~~~~
706
+ --------------
707
707
708
708
Once the execution of all checks and (optionally) fixers have been
709
709
executed, the :py:class: `~compliance.report.ReportBuilder ` generates
@@ -715,7 +715,7 @@ See :ref:`report-builder` section for more information.
715
715
716
716
717
717
Notifiers
718
- ~~~~~~~~~
718
+ ---------
719
719
720
720
After reports have been generated, the tool will collect notification
721
721
messages from them and will create a
@@ -727,7 +727,7 @@ See :ref:`notifiers-description` section for more information.
727
727
728
728
729
729
Execution Config
730
- ~~~~~~~~~~~~~~~~
730
+ ----------------
731
731
732
732
The Auditree framework is designed to be run locally from your PC or from
733
733
a CI server like Jenkins or Travis. The execution can be tweaked at 2
@@ -748,18 +748,18 @@ levels:
748
748
749
749
750
750
Credentials
751
- ~~~~~~~~~~~
751
+ -----------
752
752
753
753
There are 2 ways for providing credentials:
754
754
755
- 1 . *Local file *: if you want to configure your credentials in a local file,
755
+ # . *Local file *: if you want to configure your credentials in a local file,
756
756
you will have to provide the the framework using ``--creds-path `` option.
757
757
This file should be similar to this:
758
758
759
759
.. include :: credentials-example.cfg
760
760
:literal:
761
761
762
- 1 . *Environment variables *: each section and field of the local file can be
762
+ # . *Environment variables *: each section and field of the local file can be
763
763
rendered as an environment variable.
764
764
For instance, suppose your code requires ``creds['github'].token `` or ``creds['slack'].webhook ``.
765
765
You just need to export:
@@ -777,17 +777,17 @@ There are 2 ways for providing credentials:
777
777
api_key=YYY
778
778
779
779
Creds with ``.env `` files and 1Password
780
- +++++++++++++++++++++++++++++++++++++++
780
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
781
781
782
782
Combining the method based on passing env vars to Auditree and `1Password CLI <https://developer.1password.com/docs/cli/ >`_,
783
783
it is possible to grab the secrets from 1Password and inject them into Auditree.
784
784
Here it is how to do it:
785
785
786
- 1 . Create the following alias::
786
+ # . Create the following alias::
787
787
788
788
alias compliance="op run --env-file .env -- compliance"
789
789
790
- 1 . In your fetchers/checks project, create an ``.env `` file with the following schema::
790
+ # . In your fetchers/checks project, create an ``.env `` file with the following schema::
791
791
792
792
<SECTION>_<ATTRIBUTE>="op://<VAULT>/<ITEM>/<FIELD>"
793
793
@@ -797,4 +797,4 @@ Here it is how to do it:
797
797
MY_SERVICE_ORG="the-org-id"
798
798
MY_SERVICE_API_KEY="op://Shared/my_service/api_key"
799
799
800
- 1 . Now running ``compliance `` will pull credentials from 1Password vaults.
800
+ # . Now running ``compliance `` will pull credentials from 1Password vaults.
0 commit comments