inspec_tools 2.0.2.pre10 → 2.0.5

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 3cf626f1d93b888c79af9021e808299cb08144fa9d89be83e8243223797df79b
4
- data.tar.gz: 5b9b69478c7a11a02366b7fa0a8eeba4abb320e1a5e1338b73923b401bc38b33
3
+ metadata.gz: ef9a2fbe955cc2987994718c481836d482839c4c51835de93bfcb31dbaeb0dd3
4
+ data.tar.gz: d9ade5418a103cb10b32cead3717dda4cdbad2b8d596ae7fb40c851f2cfab8fc
5
5
  SHA512:
6
- metadata.gz: 351a6fd25c64e1564a82034f6998cd1a5f5b06b3b915128d0d4d01e65ac7e90b8fb3f92ab48518b86de2d229cde3910be2e4b5a97d0c5a66333a627b19a737cc
7
- data.tar.gz: d3f5f6be0e6ac4a61c3cbb3298ea49e36221f3f6c7ed54c213790a3463c8580d0bebab228f81946de3d2f23749e57fadbc0ae7fa7f47d37b062a64082c84be27
6
+ metadata.gz: e76748d26a430e10fbe6ca5e4d8c7bd8a00b3b7cabdadbfd013125a5bdac146257d03a4fc546243bcee76c44f164b98181294e1f89abb3c245a845325d14889a
7
+ data.tar.gz: bb7ea67481d4a4879b82a34be20a8c20a4df3cbb35867ad3c8ede8d35207e44c7fb49200fb5fc3cc9664b5df98025479b86dabad047b43a7c1a4cc9586a77e49
@@ -2,7 +2,82 @@
2
2
 
3
3
  ## [Unreleased](https://github.com/mitre/inspec_tools/tree/HEAD)
4
4
 
5
- [Full Changelog](https://github.com/mitre/inspec_tools/compare/v2.0.2.pre9...HEAD)
5
+ [Full Changelog](https://github.com/mitre/inspec_tools/compare/v2.0.4...HEAD)
6
+
7
+ **Closed issues:**
8
+
9
+ - Remove Debug Files When Running Tests [\#175](https://github.com/mitre/inspec_tools/issues/175)
10
+
11
+ **Merged pull requests:**
12
+
13
+ - Add additional error checking and documentation surrounding the xccdf… [\#194](https://github.com/mitre/inspec_tools/pull/194) ([Bialogs](https://github.com/Bialogs))
14
+
15
+ ## [v2.0.4](https://github.com/mitre/inspec_tools/tree/v2.0.4) (2020-06-18)
16
+
17
+ [Full Changelog](https://github.com/mitre/inspec_tools/compare/v2.0.3...v2.0.4)
18
+
19
+ **Closed issues:**
20
+
21
+ - xccdf2inspec string quotes bug [\#191](https://github.com/mitre/inspec_tools/issues/191)
22
+ - xccdf2inspec fails on OpenSCAP xccdf results with undefined method [\#190](https://github.com/mitre/inspec_tools/issues/190)
23
+
24
+ **Merged pull requests:**
25
+
26
+ - Respect debug env variable when running tests [\#193](https://github.com/mitre/inspec_tools/pull/193) ([Bialogs](https://github.com/Bialogs))
27
+ - 191 single quote replacement [\#192](https://github.com/mitre/inspec_tools/pull/192) ([Bialogs](https://github.com/Bialogs))
28
+
29
+ ## [v2.0.3](https://github.com/mitre/inspec_tools/tree/v2.0.3) (2020-05-26)
30
+
31
+ [Full Changelog](https://github.com/mitre/inspec_tools/compare/v2.0.2.pre13...v2.0.3)
32
+
33
+ **Implemented enhancements:**
34
+
35
+ - Round compliance score down [\#146](https://github.com/mitre/inspec_tools/issues/146)
36
+ - Every usage of Bucket and Tally uses it as a symbol, making it a symbol as part of its declaration [\#187](https://github.com/mitre/inspec_tools/pull/187) ([rbclark](https://github.com/rbclark))
37
+ - Summary output [\#186](https://github.com/mitre/inspec_tools/pull/186) ([jsa5593](https://github.com/jsa5593))
38
+ - Compliance score is rounded down and the README is updated [\#185](https://github.com/mitre/inspec_tools/pull/185) ([jsa5593](https://github.com/jsa5593))
39
+
40
+ **Fixed bugs:**
41
+
42
+ - inspec\_tools docker images is not actually showing results to cli [\#183](https://github.com/mitre/inspec_tools/issues/183)
43
+
44
+ **Closed issues:**
45
+
46
+ - inspec\_tools docker container doesn't let me go into a bash shell [\#184](https://github.com/mitre/inspec_tools/issues/184)
47
+ - Add a Dockerfile so folks can eaily add this into their ci/cd container workflows [\#162](https://github.com/mitre/inspec_tools/issues/162)
48
+
49
+ ## [v2.0.2.pre13](https://github.com/mitre/inspec_tools/tree/v2.0.2.pre13) (2020-05-22)
50
+
51
+ [Full Changelog](https://github.com/mitre/inspec_tools/compare/v2.0.2.pre12...v2.0.2.pre13)
52
+
53
+ **Implemented enhancements:**
54
+
55
+ - Ruby to docker [\#181](https://github.com/mitre/inspec_tools/pull/181) ([jsa5593](https://github.com/jsa5593))
56
+
57
+ **Fixed bugs:**
58
+
59
+ - All Impacts Parsed from PDF are Medium [\#173](https://github.com/mitre/inspec_tools/issues/173)
60
+ - Git version bump version 0.17.2 is broken due to a faulty regex. [\#182](https://github.com/mitre/inspec_tools/pull/182) ([rbclark](https://github.com/rbclark))
61
+
62
+ ## [v2.0.2.pre12](https://github.com/mitre/inspec_tools/tree/v2.0.2.pre12) (2020-05-07)
63
+
64
+ [Full Changelog](https://github.com/mitre/inspec_tools/compare/v2.0.2.pre11...v2.0.2.pre12)
65
+
66
+ **Merged pull requests:**
67
+
68
+ - Require a newer version of git-lite-version-bump for Windows support [\#178](https://github.com/mitre/inspec_tools/pull/178) ([rbclark](https://github.com/rbclark))
69
+
70
+ ## [v2.0.2.pre11](https://github.com/mitre/inspec_tools/tree/v2.0.2.pre11) (2020-05-07)
71
+
72
+ [Full Changelog](https://github.com/mitre/inspec_tools/compare/v2.0.2.pre10...v2.0.2.pre11)
73
+
74
+ **Merged pull requests:**
75
+
76
+ - git-lite-version-bump 0.17.0 is not compatible with Windows [\#176](https://github.com/mitre/inspec_tools/pull/176) ([rbclark](https://github.com/rbclark))
77
+
78
+ ## [v2.0.2.pre10](https://github.com/mitre/inspec_tools/tree/v2.0.2.pre10) (2020-05-06)
79
+
80
+ [Full Changelog](https://github.com/mitre/inspec_tools/compare/v2.0.2.pre9...v2.0.2.pre10)
6
81
 
7
82
  **Implemented enhancements:**
8
83
 
@@ -169,7 +244,6 @@
169
244
  **Merged pull requests:**
170
245
 
171
246
  - added two digit contol parsing fixes \#117 [\#120](https://github.com/mitre/inspec_tools/pull/120) ([yarick](https://github.com/yarick))
172
- - Update build/test process to only use GitHub actions [\#115](https://github.com/mitre/inspec_tools/pull/115) ([Bialogs](https://github.com/Bialogs))
173
247
 
174
248
  ## [v1.8.9](https://github.com/mitre/inspec_tools/tree/v1.8.9) (2020-03-30)
175
249
 
@@ -203,6 +277,10 @@
203
277
 
204
278
  - GitHub Actions Build Matrix [\#112](https://github.com/mitre/inspec_tools/issues/112)
205
279
 
280
+ **Merged pull requests:**
281
+
282
+ - Update build/test process to only use GitHub actions [\#115](https://github.com/mitre/inspec_tools/pull/115) ([Bialogs](https://github.com/Bialogs))
283
+
206
284
  ## [v1.8.5](https://github.com/mitre/inspec_tools/tree/v1.8.5) (2020-03-27)
207
285
 
208
286
  [Full Changelog](https://github.com/mitre/inspec_tools/compare/v1.8.4...v1.8.5)
@@ -485,7 +563,6 @@
485
563
 
486
564
  **Merged pull requests:**
487
565
 
488
- - Update Profile logic include control exceptions [\#75](https://github.com/mitre/inspec_tools/pull/75) ([rx294](https://github.com/rx294))
489
566
  - Null Byte in json report causes inspec2ckl to bomb-out [\#73](https://github.com/mitre/inspec_tools/pull/73) ([kevin-j-smith](https://github.com/kevin-j-smith))
490
567
 
491
568
  ## [v1.6.0](https://github.com/mitre/inspec_tools/tree/v1.6.0) (2019-10-04)
@@ -533,6 +610,7 @@
533
610
 
534
611
  **Merged pull requests:**
535
612
 
613
+ - Update Profile logic include control exceptions [\#75](https://github.com/mitre/inspec_tools/pull/75) ([rx294](https://github.com/rx294))
536
614
  - Apply fixes from CodeFactor [\#61](https://github.com/mitre/inspec_tools/pull/61) ([aaronlippold](https://github.com/aaronlippold))
537
615
 
538
616
  ## [v1.3.6](https://github.com/mitre/inspec_tools/tree/v1.3.6) (2019-05-02)
data/README.md CHANGED
@@ -61,6 +61,13 @@ xccdf_results = tool.to_xccdf(attribs_json)
61
61
  On the Command Line, `inspec_tools help` will print a listing of all the command with a short description.
62
62
  For detailed help on any command, run `inspec_tools help [COMMAND]`. Help can also be called with the `-h, --help` flags after any command, like `inspec_tools xccdf2inspec -h`.
63
63
 
64
+ For Docker usage, replace the `inspec_tools` command with the correct Docker command below for your operating system:
65
+
66
+ - **On Linux and Mac**: `docker run -it -v$(pwd):/share mitre/inspec_tools`
67
+ - **On Windows CMD**: `docker run -it -v%cd%:/share mitre/inspec_tools`
68
+
69
+ Note that all of the above Docker commands will mount your current directory on the Docker container. Ensure that you have navigated to the directory you intend to convert files in before executing the command.
70
+
64
71
  ### generate_map
65
72
 
66
73
  This command will generate a `mapping.xml` file that can be passed in to the `csv2inspec` command with the `--m` option.
@@ -91,6 +98,8 @@ USAGE: inspec_tools generate_inspec_metadata
91
98
 
92
99
  If the specified threshold is not met, an error code (1) is returned along with non-compliant elements.
93
100
 
101
+ The compliance score are rounded down to the nearest whole number. For example a score of 77.3 would be displayed as 77.
102
+
94
103
  ```
95
104
  USAGE: inspec_tools compliance [OPTIONS] -j <inspec-json> -i <threshold-inline>
96
105
  inspec_tools compliance [OPTIONS] -j <inspec-json> -f <threshold-file>
@@ -135,22 +144,57 @@ failed.high.max: 1
135
144
 
136
145
  ## summary
137
146
 
138
- `summary` parses an inspec results json to create a summary json
147
+ `summary` parses an inspec results json and displays the information from all of the tests that were run. Running the command with flags but `-j` it will display information like:
148
+
149
+ ```
150
+ Overall compliance: 77%
151
+
152
+ failed
153
+ total : 41
154
+ critical : 0
155
+ high : 3
156
+ medium : 33
157
+ low : 5
158
+ passed
159
+ total : 174
160
+ critical : 0
161
+ high : 21
162
+ medium : 147
163
+ low : 6
164
+ no_impact
165
+ total : 21
166
+ critical : 0
167
+ high : 0
168
+ medium : 0
169
+ low : 0
170
+ skipped
171
+ total : 10
172
+ critical : 0
173
+ high : 2
174
+ medium : 5
175
+ low : 3
176
+ error
177
+ total : 0
178
+ critical : 0
179
+ high : 0
180
+ medium : 0
181
+ low : 0
182
+ ```
183
+
184
+ Using additional flags will override the normal output and only display the output that flag specifies.
185
+
186
+ USAGE: inspec_tools summary [OPTIONS] -j <inspec-json>
139
187
 
140
188
  ```
141
- USAGE: inspec_tools summary [OPTIONS] -j <inspec-json> -o <summary-csv>
142
-
143
189
  FLAGS:
144
- -j --inspec-json <inspec-json> : path to InSpec results JSON
145
- -o --output <output-json> : path to summary JSON
146
- -c --cli, --no-cli : print formatted summary to STDOUT
190
+ -j --inspec-json <inspec-json> : path to InSpec results JSON
147
191
  -V --verbose, --no-verbose : print verbose an debug output
148
192
  -f --json-full, --no-json-full : print the summary STDOUT as JSON
149
193
  -k --json-counts, --no-json_cou : print the reslut status to STDOUT as JSON
150
194
 
151
195
  Examples:
152
196
 
153
- inspec_tools summary -j examples/sample_json/rhel-simp.json -f -o summary.json -c
197
+ inspec_tools summary -j examples/sample_json/rhel-simp.json -f
154
198
  ```
155
199
 
156
200
  ## xccdf2inspec
@@ -167,7 +211,7 @@ FLAGS:
167
211
  -f --format [ruby | hash] : the format you would like (default: ruby) [optional]
168
212
  -s --separate-files [true | false] : output the resulting controls as one or mutiple files (default: true) [optional]
169
213
  -m --metadata <metadata-json> : path to json file with additional metadata for the inspec.yml file [optional]
170
- -r --replace-tags <array> : A case-sensitive, comma separated list to replace tags with a $ if found in a group rules description tag [optional]
214
+ -r --replace-tags <array> : A case-sensitive, space separated list to replace tags with a $ if found in a group rules description tag [optional]
171
215
 
172
216
  example: inspec_tools xccdf2inspec -x xccdf_file.xml -a attributes.yml -o myprofile -f ruby -s false
173
217
  ```
@@ -0,0 +1,4 @@
1
+ AllCops:
2
+ DisabledByDefault: true
3
+ Style/StringLiterals:
4
+ Enabled: true
@@ -140,57 +140,75 @@ module HappyMapperTools
140
140
  end
141
141
 
142
142
  class DescriptionDetailsType
143
- def self.type
144
- DescriptionDetails
145
- end
143
+ class << self
144
+ def type
145
+ DescriptionDetails
146
+ end
146
147
 
147
- def self.apply(value) # rubocop:disable Metrics/AbcSize
148
- value = value.gsub('&', 'and')
149
- DescriptionDetails.parse "<Details>#{value}</Details>"
150
- rescue Nokogiri::XML::SyntaxError
151
- allowed_tags = %w{VulnDiscussion FalsePositives FalseNegatives Documentable
152
- Mitigations SeverityOverrideGuidance PotentialImpacts
153
- PotentialImpacts ThirdPartyTools MitigationControl
154
- Responsibility IAControls}
155
-
156
- tags_found = value.scan(%r{(?<=<)([^\/]*?)((?= \/>)|(?=>))}).to_a
157
-
158
- tags_found = tags_found.uniq.flatten.reject!(&:empty?)
159
- offending_tags = tags_found - allowed_tags
160
-
161
- if offending_tags.count > 1
162
- puts "\n\nThe non-standard tags: #{offending_tags.to_s.colorize(:red)}" \
163
- ' were found in: ' + "\n\n#{value}"
164
- else
165
- puts "\n\nThe non-standard tag: #{offending_tags.to_s.colorize(:red)}" \
166
- ' was found in: ' + "\n\n#{value}"
148
+ def apply(value)
149
+ value = value.gsub('&', 'and')
150
+ DescriptionDetails.parse "<Details>#{value}</Details>"
151
+ rescue Nokogiri::XML::SyntaxError => e
152
+ if e.to_s.include?('StartTag')
153
+ report_invalid_start_tag(value, e)
154
+ else
155
+ report_disallowed_tags(value)
156
+ end
157
+ end
158
+
159
+ def apply?(value, _convert_to_type)
160
+ value.is_a?(String)
167
161
  end
168
- puts "\n\nPlease:\n "
169
- option_one = '(1) ' + '(best)'.colorize(:green) + ' Use the ' +
170
- '`-r --replace-tags array` '.colorize(:light_yellow) +
171
- '(case sensitive) option to replace the offending tags ' \
172
- 'during processing of the XCCDF ' \
173
- 'file to use the ' +
174
- "`$#{offending_tags[0]}` " .colorize(:light_green) +
175
- 'syntax in your InSpec profile.'
176
- option_two = '(2) Update your XCCDF file to *not use* non-standard XCCDF ' \
177
- 'elements within ' +
178
- '`&lt;`,`&gt;`, `<` '.colorize(:red) +
179
- 'or '.colorize(:default) +
180
- '`>` '.colorize(:red) +
181
- 'as "placeholders", and use something that doesn\'t confuse ' \
182
- 'the XML parser, such as : ' +
183
- "`$#{offending_tags[0]}`" .colorize(:light_green)
184
- puts option_one
185
- puts "\n"
186
- puts option_two
187
- # exit
188
- end
189
162
 
190
- def self.apply?(value, _convert_to_type)
191
- value.is_a?(String)
163
+ private
164
+
165
+ def report_invalid_start_tag(value, error)
166
+ puts error.to_s.colorize(:red)
167
+ column = error.column - '<Details>'.length - 2
168
+ puts "Error around #{value[column-10..column+10].colorize(:light_yellow)}"
169
+ exit(1)
170
+ end
171
+
172
+ def report_disallowed_tags(value)
173
+ allowed_tags = %w{VulnDiscussion FalsePositives FalseNegatives Documentable
174
+ Mitigations SeverityOverrideGuidance PotentialImpacts
175
+ PotentialImpacts ThirdPartyTools MitigationControl
176
+ Responsibility IAControl SecurityOverrideGuidance}
177
+
178
+ tags_found = value.scan(%r{(?<=<)([^\/]*?)((?= \/>)|(?=>))}).to_a
179
+
180
+ tags_found = tags_found.uniq.flatten.reject!(&:empty?)
181
+ offending_tags = tags_found - allowed_tags
182
+
183
+ if offending_tags.count > 1
184
+ puts "\n\nThe non-standard tags: #{offending_tags.to_s.colorize(:red)}" \
185
+ ' were found in: ' + "\n\n#{value}"
186
+ else
187
+ puts "\n\nThe non-standard tag: #{offending_tags.to_s.colorize(:red)}" \
188
+ ' was found in: ' + "\n\n#{value}"
189
+ end
190
+ puts "\n\nPlease:\n "
191
+ option_one = '(1) ' + '(best)'.colorize(:green) + ' Use the ' +
192
+ '`-r --replace-tags array` '.colorize(:light_yellow) +
193
+ '(case sensitive) option to replace the offending tags ' \
194
+ 'during processing of the XCCDF ' \
195
+ 'file to use the ' +
196
+ "`$#{offending_tags[0]}` " .colorize(:light_green) +
197
+ 'syntax in your InSpec profile.'
198
+ option_two = '(2) Update your XCCDF file to *not use* non-standard XCCDF ' \
199
+ 'elements within ' +
200
+ '`&lt;`,`&gt;`, `<` '.colorize(:red) +
201
+ 'or '.colorize(:default) +
202
+ '`>` '.colorize(:red) +
203
+ 'as "placeholders", and use something that doesn\'t confuse ' \
204
+ 'the XML parser, such as : ' +
205
+ "`$#{offending_tags[0]}`" .colorize(:light_green)
206
+ puts option_one
207
+ puts "\n"
208
+ puts option_two
209
+ end
192
210
  end
211
+ HappyMapper::SupportedTypes.register DescriptionDetailsType
193
212
  end
194
- HappyMapper::SupportedTypes.register DescriptionDetailsType
195
213
  end
196
214
  end
@@ -200,8 +200,6 @@ module InspecPlugins
200
200
  desc 'summary', 'summary parses an inspec results json to create a summary json'
201
201
  long_desc InspecTools::Help.text(:summary)
202
202
  option :inspec_json, required: true, aliases: '-j'
203
- option :output, required: false, aliases: '-o'
204
- option :cli, type: :boolean, required: false, aliases: '-c'
205
203
  option :verbose, type: :boolean, aliases: '-V'
206
204
  option :json_full, type: :boolean, required: false, aliases: '-f'
207
205
  option :json_counts, type: :boolean, required: false, aliases: '-k'
@@ -209,7 +207,7 @@ module InspecPlugins
209
207
  def summary
210
208
  summary = InspecTools::Summary.new(File.read(options[:inspec_json])).to_summary
211
209
 
212
- if options[:cli]
210
+ unless options.include?('json_full') || options.include?('json_counts')
213
211
  puts "\nOverall compliance: #{summary[:compliance]}%\n\n"
214
212
  summary[:status].keys.each do |category|
215
213
  puts category
@@ -220,7 +218,6 @@ module InspecPlugins
220
218
  end
221
219
 
222
220
  json_summary = summary.to_json
223
- File.write(options[:output], json_summary) if options[:output]
224
221
  puts json_summary if options[:json_full]
225
222
  puts summary[:status].to_json if options[:json_counts]
226
223
  end
@@ -10,8 +10,8 @@ HIGH = 0.7
10
10
  MEDIUM = 0.5
11
11
  LOW = 0.3
12
12
 
13
- BUCKETS = %w{failed passed no_impact skipped error}.freeze
14
- TALLYS = %w{total critical high medium low}.freeze
13
+ BUCKETS = %i(failed passed no_impact skipped error).freeze
14
+ TALLYS = %i(total critical high medium low).freeze
15
15
 
16
16
  THRESHOLD_TEMPLATE = File.expand_path('../data/threshold.yaml', File.dirname(__FILE__))
17
17
 
@@ -83,7 +83,7 @@ module InspecTools
83
83
  (@summary[:status][:passed][:total]+
84
84
  @summary[:status][:failed][:total]+
85
85
  @summary[:status][:skipped][:total]+
86
- @summary[:status][:error][:total])).round(1)
86
+ @summary[:status][:error][:total])).floor
87
87
  end
88
88
 
89
89
  def threshold_compliance
@@ -104,13 +104,13 @@ module InspecTools
104
104
  TALLYS.each do |tally|
105
105
  max = @threshold["#{bucket}.#{tally}.max"]
106
106
  min = @threshold["#{bucket}.#{tally}.min"]
107
- if max != -1 and status[bucket.to_sym][tally.to_sym] > max
107
+ if max != -1 and status[bucket][tally] > max
108
108
  compliance = false
109
- failure << "Expected #{bucket}.#{tally}.max:#{max} got:#{status[bucket.to_sym][tally.to_sym]}"
109
+ failure << "Expected #{bucket}.#{tally}.max:#{max} got:#{status[bucket][tally]}"
110
110
  end
111
- if min != -1 and status[bucket.to_sym][tally.to_sym] < min
111
+ if min != -1 and status[bucket][tally] < min
112
112
  compliance = false
113
- failure << "Expected #{bucket}.#{tally}.min:#{min} got:#{status[bucket.to_sym][tally.to_sym]}"
113
+ failure << "Expected #{bucket}.#{tally}.min:#{min} got:#{status[bucket][tally]}"
114
114
  end
115
115
  end
116
116
  end
@@ -11,6 +11,7 @@ require 'overrides/true_class'
11
11
  require 'overrides/nil_class'
12
12
  require 'overrides/object'
13
13
  require 'overrides/string'
14
+ require 'rubocop'
14
15
 
15
16
  # rubocop:disable Metrics/ClassLength
16
17
  # rubocop:disable Metrics/AbcSize
@@ -393,7 +394,7 @@ module Utils
393
394
  file_name = control.id.to_s
394
395
  myfile = File.new("#{directory}/controls/#{file_name}.rb", 'w')
395
396
  myfile.puts "# encoding: UTF-8\n\n"
396
- myfile.puts wrap(control.to_ruby.gsub('"', "\'"), WIDTH) + "\n"
397
+ myfile.puts wrap(control.to_ruby, WIDTH) + "\n"
397
398
  myfile.close
398
399
  end
399
400
  else
@@ -424,6 +425,10 @@ module Utils
424
425
  end
425
426
  myfile.close
426
427
  end
428
+ config_store = ::RuboCop::ConfigStore.new
429
+ config_store.options_config = File.join(File.dirname(__FILE__), '../data/rubocop.yml')
430
+ rubocop = ::RuboCop::Runner.new({ auto_correct: true }, config_store)
431
+ rubocop.run([directory])
427
432
  end
428
433
  end
429
434
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: inspec_tools
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.2.pre10
4
+ version: 2.0.5
5
5
  platform: ruby
6
6
  authors:
7
7
  - Robert Thew
@@ -11,7 +11,7 @@ authors:
11
11
  autorequire:
12
12
  bindir: exe
13
13
  cert_chain: []
14
- date: 2020-05-06 00:00:00.000000000 Z
14
+ date: 2020-06-23 00:00:00.000000000 Z
15
15
  dependencies:
16
16
  - !ruby/object:Gem::Dependency
17
17
  name: colorize
@@ -151,22 +151,22 @@ dependencies:
151
151
  requirements:
152
152
  - - ">="
153
153
  - !ruby/object:Gem::Version
154
- version: '0.17'
154
+ version: 0.17.3
155
155
  type: :runtime
156
156
  prerelease: false
157
157
  version_requirements: !ruby/object:Gem::Requirement
158
158
  requirements:
159
159
  - - ">="
160
160
  - !ruby/object:Gem::Version
161
- version: '0.17'
161
+ version: 0.17.3
162
162
  - !ruby/object:Gem::Dependency
163
- name: bundler
163
+ name: rubocop
164
164
  requirement: !ruby/object:Gem::Requirement
165
165
  requirements:
166
166
  - - ">="
167
167
  - !ruby/object:Gem::Version
168
168
  version: '0'
169
- type: :development
169
+ type: :runtime
170
170
  prerelease: false
171
171
  version_requirements: !ruby/object:Gem::Requirement
172
172
  requirements:
@@ -174,7 +174,7 @@ dependencies:
174
174
  - !ruby/object:Gem::Version
175
175
  version: '0'
176
176
  - !ruby/object:Gem::Dependency
177
- name: minitest
177
+ name: bundler
178
178
  requirement: !ruby/object:Gem::Requirement
179
179
  requirements:
180
180
  - - ">="
@@ -188,7 +188,7 @@ dependencies:
188
188
  - !ruby/object:Gem::Version
189
189
  version: '0'
190
190
  - !ruby/object:Gem::Dependency
191
- name: pry
191
+ name: minitest
192
192
  requirement: !ruby/object:Gem::Requirement
193
193
  requirements:
194
194
  - - ">="
@@ -202,7 +202,7 @@ dependencies:
202
202
  - !ruby/object:Gem::Version
203
203
  version: '0'
204
204
  - !ruby/object:Gem::Dependency
205
- name: rake
205
+ name: pry
206
206
  requirement: !ruby/object:Gem::Requirement
207
207
  requirements:
208
208
  - - ">="
@@ -216,7 +216,7 @@ dependencies:
216
216
  - !ruby/object:Gem::Version
217
217
  version: '0'
218
218
  - !ruby/object:Gem::Dependency
219
- name: codeclimate-test-reporter
219
+ name: rake
220
220
  requirement: !ruby/object:Gem::Requirement
221
221
  requirements:
222
222
  - - ">="
@@ -230,7 +230,7 @@ dependencies:
230
230
  - !ruby/object:Gem::Version
231
231
  version: '0'
232
232
  - !ruby/object:Gem::Dependency
233
- name: simplecov
233
+ name: codeclimate-test-reporter
234
234
  requirement: !ruby/object:Gem::Requirement
235
235
  requirements:
236
236
  - - ">="
@@ -244,7 +244,7 @@ dependencies:
244
244
  - !ruby/object:Gem::Version
245
245
  version: '0'
246
246
  - !ruby/object:Gem::Dependency
247
- name: rubocop
247
+ name: simplecov
248
248
  requirement: !ruby/object:Gem::Requirement
249
249
  requirements:
250
250
  - - ">="
@@ -292,6 +292,7 @@ files:
292
292
  - lib/data/attributes.yml
293
293
  - lib/data/cci2html.xsl
294
294
  - lib/data/mapping.yml
295
+ - lib/data/rubocop.yml
295
296
  - lib/data/stig.csv
296
297
  - lib/data/threshold.yaml
297
298
  - lib/exceptions/impact_input_error.rb
@@ -348,9 +349,9 @@ required_ruby_version: !ruby/object:Gem::Requirement
348
349
  version: '2.5'
349
350
  required_rubygems_version: !ruby/object:Gem::Requirement
350
351
  requirements:
351
- - - ">"
352
+ - - ">="
352
353
  - !ruby/object:Gem::Version
353
- version: 1.3.1
354
+ version: '0'
354
355
  requirements: []
355
356
  rubygems_version: 3.1.2
356
357
  signing_key: