Skip to content

Commit a7d803e

Browse files
authored
Bump to 2.0.0 (#154)
There are breaking changes.
1 parent 22e892b commit a7d803e

File tree

5 files changed

+19
-19
lines changed

5 files changed

+19
-19
lines changed

CHANGES.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
1-
# [1.25.0](https://github.com/ComplianceAsCode/auditree-framework/releases/tag/v1.25.0)
1+
# [2.0.0](https://github.com/ComplianceAsCode/auditree-framework/releases/tag/v2.0.0)
22

33
- [ADDED] Documentation on how to use it with 1Password CLI.
4-
- [CHANGED] "--creds-path" does not default to "~/.credentials".
4+
- [CHANGED] "--creds-path" does not default to "~/.credentials". (BREAKING)
55
- [FIXED] Number of errors/warnings shown correctly for single checks.
66

77
# [1.24.0](https://github.com/ComplianceAsCode/auditree-framework/releases/tag/v1.24.0)

compliance/__init__.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,4 +13,4 @@
1313
# limitations under the License.
1414
"""Compliance automation package."""
1515

16-
__version__ = "1.25.0"
16+
__version__ = "2.0.0"

doc-source/coding-standards.rst

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,8 @@ Coding Standards
88
In this project, we use Python as programming language so please
99
follow these rules:
1010

11-
* Keep the code tidy using `black
12-
< https://github.com/psf/black>`_ and `flake8
13-
<http://flake8.pycqa.org/en/latest>`_. Don't introduce new
11+
* Keep the code tidy using `black <https://github.com/psf/black>`_
12+
and `flake8 <http://flake8.pycqa.org/en/latest>`_. Don't introduce new
1413
violations and remove them if you spot any. This is enforced by
1514
Github Actions builds. To check your code locally, use::
1615

doc-source/design-principles.rst

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -683,7 +683,7 @@ accreditations passed to the framework by the CLI.
683683

684684

685685
Fixers
686-
~~~~~~
686+
------
687687

688688
After checks have been run, but before notifications or reports are
689689
generated, the Auditree framework will optionally try to fix the
@@ -703,7 +703,7 @@ See :ref:`fixers` section for more information.
703703

704704

705705
Report Builder
706-
~~~~~~~~~~~~~~
706+
--------------
707707

708708
Once the execution of all checks and (optionally) fixers have been
709709
executed, the :py:class:`~compliance.report.ReportBuilder` generates
@@ -715,7 +715,7 @@ See :ref:`report-builder` section for more information.
715715

716716

717717
Notifiers
718-
~~~~~~~~~
718+
---------
719719

720720
After reports have been generated, the tool will collect notification
721721
messages from them and will create a
@@ -727,7 +727,7 @@ See :ref:`notifiers-description` section for more information.
727727

728728

729729
Execution Config
730-
~~~~~~~~~~~~~~~~
730+
----------------
731731

732732
The Auditree framework is designed to be run locally from your PC or from
733733
a CI server like Jenkins or Travis. The execution can be tweaked at 2
@@ -748,18 +748,18 @@ levels:
748748

749749

750750
Credentials
751-
~~~~~~~~~~~
751+
-----------
752752

753753
There are 2 ways for providing credentials:
754754

755-
1. *Local file*: if you want to configure your credentials in a local file,
755+
#. *Local file*: if you want to configure your credentials in a local file,
756756
you will have to provide the the framework using ``--creds-path`` option.
757757
This file should be similar to this:
758758

759759
.. include:: credentials-example.cfg
760760
:literal:
761761

762-
1. *Environment variables*: each section and field of the local file can be
762+
#. *Environment variables*: each section and field of the local file can be
763763
rendered as an environment variable.
764764
For instance, suppose your code requires ``creds['github'].token`` or ``creds['slack'].webhook``.
765765
You just need to export:
@@ -777,17 +777,17 @@ There are 2 ways for providing credentials:
777777
api_key=YYY
778778

779779
Creds with ``.env`` files and 1Password
780-
+++++++++++++++++++++++++++++++++++++++
780+
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
781781

782782
Combining the method based on passing env vars to Auditree and `1Password CLI <https://developer.1password.com/docs/cli/>`_,
783783
it is possible to grab the secrets from 1Password and inject them into Auditree.
784784
Here it is how to do it:
785785

786-
1. Create the following alias::
786+
#. Create the following alias::
787787

788788
alias compliance="op run --env-file .env -- compliance"
789789

790-
1. In your fetchers/checks project, create an ``.env`` file with the following schema::
790+
#. In your fetchers/checks project, create an ``.env`` file with the following schema::
791791

792792
<SECTION>_<ATTRIBUTE>="op://<VAULT>/<ITEM>/<FIELD>"
793793

@@ -797,4 +797,4 @@ Here it is how to do it:
797797
MY_SERVICE_ORG="the-org-id"
798798
MY_SERVICE_API_KEY="op://Shared/my_service/api_key"
799799

800-
1. Now running ``compliance`` will pull credentials from 1Password vaults.
800+
#. Now running ``compliance`` will pull credentials from 1Password vaults.

doc-source/quick-start.rst

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -113,8 +113,9 @@ evidence locker repository and use ``--evidence no-push`` to pull down a remote
113113
evidence locker only or ``--evidence full-remote`` to pull down and push to a
114114
remote evidence locker. Finally you'll need to configure your credentials file
115115
with the appropriate personal access token for your Git remote hosting service. The
116-
credentials file defaults to ``~/.credentials`` or use the ``--creds-path`` option
117-
to point elsewhere. Valid section headings for Git remote hosting services in your
116+
credentials can be configured in multiple ways. See :ref:`credentials` section.
117+
For this example, we can use the ``--creds-path`` option to point to a credentials file.
118+
Valid section headings for Git remote hosting services in your
118119
credentials are ``github``, ``github_enterprise``, ``bitbucket``, and ``gitlab``.
119120
Using ``github`` as an example, add the following to your credentials file::
120121

0 commit comments

Comments
 (0)