From patchwork Mon Jun 12 10:57:13 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: akuster808 X-Patchwork-Id: 25433 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A1B28C7EE43 for ; Mon, 12 Jun 2023 10:57:22 +0000 (UTC) Received: from mail-yb1-f179.google.com (mail-yb1-f179.google.com [209.85.219.179]) by mx.groups.io with SMTP id smtpd.web10.55813.1686567436133468244 for ; Mon, 12 Jun 2023 03:57:16 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@gmail.com header.s=20221208 header.b=G/JGl1RA; spf=pass (domain: gmail.com, ip: 209.85.219.179, mailfrom: akuster808@gmail.com) Received: by mail-yb1-f179.google.com with SMTP id 3f1490d57ef6-bc5a3075e92so2149616276.0 for ; Mon, 12 Jun 2023 03:57:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1686567435; x=1689159435; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:from:to:cc:subject:date:message-id:reply-to; bh=Gbx0+ViFVhk7QsaNCFjni+x81HVHQOmA8AXFj+Tfu0k=; b=G/JGl1RAMIJRbkAIZJQ67yHomBhDpqxZ+If75Zcx4sHoeqS6fKO4C+0VtTr0QrYzse eW4QhtkqKgwsnRM0Gg7eJpe7NDF8JGouZJrqb1BKusgzE96pnW4dgz8djW/Z1N3EguVt +lwT9xhGS4mjlQmU6PsSs9sYYONKc7yXVrnvBxYsTVkwm/zvmDFHIaR5Y4IEVQ9DPodn OS+Sb2QR/YNFNJMoXIYGNg6WSRj2YKqzDO/dSNq9WebkN8YAtZRawztNheia4mDmOpB0 EMLhcACBFDeCMhWhZ2T5p2fz/fkVfmv8vjptnfrjFiymkwBbcGrk127rUCCP09cchSxB 4w7A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686567435; x=1689159435; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=Gbx0+ViFVhk7QsaNCFjni+x81HVHQOmA8AXFj+Tfu0k=; b=Jc2ahU7cWFx5gcwV4XHp07KD0F4APEdxZ92oghq/lA9Hr6w7jjsagf6iagneKMl1s1 vGqsps5i3jwxYYtTZ7Ozsjsmc3lgpJcPQ628V/utSG4LWA279UXgk6ahZh3g4gTFlUyQ KdmFbM+WFmOt7jbRNDfAp7+CTez4rqBmqr/+wuOk31IGGJep7rTlzT0CMyIjQaZYpvke 5uVc+CpGR63Mx4kikiIgg+bdwYPrOzMgeRJw+zJNZrf8jIzHdoKhnxuRo3ifbgXuw47F SUB5pCVgqWJ9xXnAAoysgw76IOfMYkbema5A0RXxz0E3x4cJtj6/iI47pObUodh9nACK bUdw== X-Gm-Message-State: AC+VfDxCiyyojHKnZ9ttt7V+GxgXs7/2eAVOiphL0CPYDsA27pcseC8i nstqOIoFPtvjfemQRnlf6DFGPBxBRDQ= X-Google-Smtp-Source: ACHHUZ5V3fLrhNLO2DyJivItNQ0JWMfPLCH1lbnbNfxOnHybGGnALxU8esRuF5GVCvlR84l+sq5XLw== X-Received: by 2002:a25:3384:0:b0:ba8:54c4:3136 with SMTP id z126-20020a253384000000b00ba854c43136mr8307902ybz.52.1686567434371; Mon, 12 Jun 2023 03:57:14 -0700 (PDT) Received: from keaua.attlocal.net ([2600:1700:9190:ba10:a494:ce8b:aaa1:9573]) by smtp.gmail.com with ESMTPSA id g5-20020a05690203c500b00b9eeffa1abfsm2454850ybs.39.2023.06.12.03.57.13 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 12 Jun 2023 03:57:13 -0700 (PDT) From: Armin Kuster To: yocto@lists.yoctoproject.org Subject: [meta-security][PATCH] scap-security-guide_git: drop oe version Date: Mon, 12 Jun 2023 06:57:13 -0400 Message-Id: <20230612105713.38058-1-akuster808@gmail.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 12 Jun 2023 10:57:22 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/yocto/message/60254 This is un-maintained so dropping this version Signed-off-by: Armin Kuster --- ...ng-of-the-remediation-functions-file.patch | 39 ------------- ...c-file-check-tests-in-installed-OS-d.patch | 46 --------------- ...ated-instance-of-element.getchildren.patch | 43 -------------- ...is_openembedded-Update-pattern-match.patch | 30 ---------- ...g-openembedded-from-ssg-constants.py.patch | 34 ----------- ...-fix-when-greedy-regex-ate-the-whole.patch | 35 ----------- ...-fix-deprecated-getiterator-function.patch | 58 ------------------- ...etchildren-and-getiterator-functions.patch | 57 ------------------ .../scap-security-guide.inc | 35 ----------- .../scap-security-guide_git.bb | 18 ------ 10 files changed, 395 deletions(-) delete mode 100644 meta-security-compliance/recipes-openscap/scap-security-guide/files/0001-Fix-XML-parsing-of-the-remediation-functions-file.patch delete mode 100644 meta-security-compliance/recipes-openscap/scap-security-guide/files/0001-Fix-platform-spec-file-check-tests-in-installed-OS-d.patch delete mode 100644 meta-security-compliance/recipes-openscap/scap-security-guide/files/0001-fix-deprecated-instance-of-element.getchildren.patch delete mode 100644 meta-security-compliance/recipes-openscap/scap-security-guide/files/0001-installed_OS_is_openembedded-Update-pattern-match.patch delete mode 100644 meta-security-compliance/recipes-openscap/scap-security-guide/files/0002-Fix-missing-openembedded-from-ssg-constants.py.patch delete mode 100644 meta-security-compliance/recipes-openscap/scap-security-guide/files/0002-Fixed-the-broken-fix-when-greedy-regex-ate-the-whole.patch delete mode 100644 meta-security-compliance/recipes-openscap/scap-security-guide/files/0002-fix-deprecated-getiterator-function.patch delete mode 100644 meta-security-compliance/recipes-openscap/scap-security-guide/files/0003-fix-remaining-getchildren-and-getiterator-functions.patch delete mode 100644 meta-security-compliance/recipes-openscap/scap-security-guide/scap-security-guide.inc delete mode 100644 meta-security-compliance/recipes-openscap/scap-security-guide/scap-security-guide_git.bb diff --git a/meta-security-compliance/recipes-openscap/scap-security-guide/files/0001-Fix-XML-parsing-of-the-remediation-functions-file.patch b/meta-security-compliance/recipes-openscap/scap-security-guide/files/0001-Fix-XML-parsing-of-the-remediation-functions-file.patch deleted file mode 100644 index c0b93e4..0000000 --- a/meta-security-compliance/recipes-openscap/scap-security-guide/files/0001-Fix-XML-parsing-of-the-remediation-functions-file.patch +++ /dev/null @@ -1,39 +0,0 @@ -From 174293162e5840684d967e36840fc1f9f57c90be Mon Sep 17 00:00:00 2001 -From: =?UTF-8?q?Mat=C4=9Bj=20T=C3=BD=C4=8D?= -Date: Thu, 5 Dec 2019 15:02:05 +0100 -Subject: [PATCH] Fix XML "parsing" of the remediation functions file. - -A proper fix is not worth the effort, as we aim to kill shared Bash remediation -with Jinja2 macros. - -Upstream-Status: Backport -[https://github.com/ComplianceAsCode/content/commit/174293162e5840684d967e36840fc1f9f57c90be] - -Signed-off-by: Yi Zhao ---- - ssg/build_remediations.py | 8 ++++---- - 1 file changed, 4 insertions(+), 4 deletions(-) - -diff --git a/ssg/build_remediations.py b/ssg/build_remediations.py -index 7da807bd6..13e90f732 100644 ---- a/ssg/build_remediations.py -+++ b/ssg/build_remediations.py -@@ -56,11 +56,11 @@ def get_available_functions(build_dir): - remediation_functions = [] - with codecs.open(xmlfilepath, "r", encoding="utf-8") as xmlfile: - filestring = xmlfile.read() -- # This regex looks implementation dependent but we can rely on -- # ElementTree sorting XML attrs alphabetically. Hidden is guaranteed -- # to be the first attr and ID is guaranteed to be second. -+ # This regex looks implementation dependent but we can rely on the element attributes -+ # being present on one line. -+ # We can't rely on ElementTree sorting XML attrs in any way since Python 3.7. - remediation_functions = re.findall( -- r'