mirror of
https://github.com/gocsaf/csaf.git
synced 2025-12-22 11:55:40 +01:00
feat: perform go path repo move
* Change the go module path from github.com/csaf-poc/csaf_distribution to github.com/gocsaf/csaf. * Rename archive for release tarballs. * Adjust testing scripts and documentation.
This commit is contained in:
parent
91207f2b7b
commit
e8706e5eb9
58 changed files with 102 additions and 102 deletions
|
|
@ -93,7 +93,7 @@ ignorepattern = [".*white.*", ".*red.*"]
|
|||
|
||||
The `role` given in the `provider-metadata.json` is not
|
||||
yet considered to change the overall result,
|
||||
see <https://github.com/csaf-poc/csaf_distribution/issues/221> .
|
||||
see <https://github.com/gocsaf/csaf/issues/221> .
|
||||
|
||||
If a provider hosts one or more advisories with a TLP level of AMBER or RED, then these advisories must be access protected.
|
||||
To check these advisories, authorization can be given via custom headers or certificates.
|
||||
|
|
|
|||
|
|
@ -141,5 +141,5 @@ contact_details = "Example Company can be reached at contact_us@example.com, or
|
|||
|
||||
There is an experimental upload interface which works with a web browser.
|
||||
It is disabled by default, as there are known issues, notably:
|
||||
* https://github.com/csaf-poc/csaf_distribution/issues/43
|
||||
* https://github.com/csaf-poc/csaf_distribution/issues/256
|
||||
* https://github.com/gocsaf/csaf/issues/43
|
||||
* https://github.com/gocsaf/csaf/issues/256
|
||||
|
|
|
|||
|
|
@ -115,7 +115,7 @@ sudo chmod g+r,o-rwx /etc/csaf/config.toml
|
|||
|
||||
Here is a minimal example configuration,
|
||||
which you need to customize for a production setup,
|
||||
see the [options of `csaf_provider`](https://github.com/csaf-poc/csaf_distribution/blob/main/docs/csaf_provider.md).
|
||||
see the [options of `csaf_provider`](https://github.com/gocsaf/csaf/blob/main/docs/csaf_provider.md).
|
||||
|
||||
<!-- MARKDOWN-AUTO-DOCS:START (CODE:src=../docs/scripts/setupProviderForITest.sh&lines=94-101) -->
|
||||
<!-- The below code snippet is automatically added from ../docs/scripts/setupProviderForITest.sh -->
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
Scripts for assisting the Integration tests.
|
||||
They were written on Ubuntu 20.04 TLS amd64 and also tested with 24.04 TLS.
|
||||
|
||||
- `prepareUbuntuInstanceForITests.sh` installs the required packages for the csaf_distribution integration tests on a naked ubuntu LTS amd64.
|
||||
- `prepareUbuntuInstanceForITests.sh` installs the required packages for the csaf integration tests on a naked Ubuntu LTS amd64.
|
||||
|
||||
- `TLSConfigsForITest.sh` generates a root CA and webserver cert by running `createRootCAForITest.sh` and `createWebserverCertForITest.sh`
|
||||
and configures nginx for serving TLS connections.
|
||||
|
|
@ -14,11 +14,11 @@ As creating the folders needs to authenticate with the csaf_provider, the config
|
|||
|
||||
Calling example (as user with sudo privileges):
|
||||
``` bash
|
||||
curl --fail -O https://raw.githubusercontent.com/csaf-poc/csaf_distribution/main/docs/scripts/prepareUbuntuInstanceForITests.sh
|
||||
curl --fail -O https://raw.githubusercontent.com/gocsaf/csaf/main/docs/scripts/prepareUbuntuInstanceForITests.sh
|
||||
sudo bash prepareUbuntuInstanceForITests.sh
|
||||
|
||||
git clone https://github.com/csaf-poc/csaf_distribution.git # --branch <name>
|
||||
pushd csaf_distribution/docs/scripts/
|
||||
git clone https://github.com/gocsaf/csaf.git # --branch <name>
|
||||
pushd csaf/docs/scripts/
|
||||
|
||||
export FOLDERNAME=devca1 ORGANAME="CSAF Tools Development (internal)"
|
||||
source ./TLSConfigsForITest.sh
|
||||
|
|
|
|||
|
|
@ -18,7 +18,7 @@ set -e
|
|||
|
||||
NGINX_CONFIG_PATH=/etc/nginx/sites-available/default
|
||||
|
||||
cd ~/csaf_distribution/docs/scripts/
|
||||
cd ~/csaf/docs/scripts/
|
||||
source ./createCCForITest.sh
|
||||
|
||||
echo '
|
||||
|
|
|
|||
|
|
@ -17,7 +17,7 @@ set -e
|
|||
|
||||
NGINX_CONFIG_PATH=/etc/nginx/sites-available/default
|
||||
|
||||
cd ~/csaf_distribution/docs/scripts/
|
||||
cd ~/csaf/docs/scripts/
|
||||
## Create Root CA
|
||||
./createRootCAForITest.sh
|
||||
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
set -e
|
||||
|
||||
# This script prepares a naked Ubuntu LTS amd64
|
||||
# for the csaf_distribution integration tests
|
||||
# for the csaf integration tests
|
||||
# by installing the required packages.
|
||||
|
||||
apt update
|
||||
|
|
|
|||
|
|
@ -29,6 +29,6 @@ popd
|
|||
echo
|
||||
echo '=== run aggregator'
|
||||
|
||||
cd ~/csaf_distribution/
|
||||
cd ~/csaf/
|
||||
sudo cp docs/examples/aggregator.toml /etc/csaf
|
||||
sudo ./bin-linux-amd64/csaf_aggregator -c /etc/csaf/aggregator.toml
|
||||
|
|
|
|||
|
|
@ -11,7 +11,7 @@
|
|||
set -e # to exit if a command in the script fails
|
||||
|
||||
echo '==== run checker (twice)'
|
||||
cd ~/csaf_distribution
|
||||
cd ~/csaf
|
||||
|
||||
./bin-linux-amd64/csaf_checker -f html -o ../checker-results.html --insecure \
|
||||
--client_cert ~/devca1/testclient1.crt \
|
||||
|
|
|
|||
|
|
@ -10,7 +10,7 @@
|
|||
|
||||
set -e # to exit if a command in the script fails
|
||||
|
||||
cd ~/csaf_distribution
|
||||
cd ~/csaf
|
||||
|
||||
echo
|
||||
echo '==== run downloader (1)'
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue