Open security access protocols
OpenSCAP is a set of open source libraries providing an easier path for integration of the SCAP line of standards.
SCAP is a line of standards managed by NIST with the goal of providing a standard language for the expression of Computer Network Defense related information.
More information about SCAP can be found at nvd.nist.gov.
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout SUSE:SLE-15-SP2:GA/openscap && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
0001-Do-not-use-C-keyword-operator-as-a-function-p |
0000002020 1.97 KB | |
1.3.2.tar.gz | 0012360113 11.8 MB | |
_service | 0000000476 476 Bytes | |
openscap-new-suse.patch | 0000007034 6.87 KB | |
openscap-rpmlintrc | 0000000208 208 Bytes | |
openscap.changes | 0000045185 44.1 KB | |
openscap.spec | 0000009379 9.16 KB | |
oscap-scan.service | 0000000228 228 Bytes | |
oscap-scan.sh | 0000000523 523 Bytes | |
scap-yast2sec-oval.xml | 0000039063 38.1 KB | |
scap-yast2sec-xccdf.xml | 0000017766 17.3 KB | |
sysconfig.oscap-scan | 0000000407 407 Bytes |
Latest Revision
Gustavo Yokoyama Ribeiro (gyribeiro)
committed
(revision 2)
- Add upstream patch to fix the scap-workbench build: * 0001-Do-not-use-C-keyword-operator-as-a-function-paramete.patch - switch back to official release - openscap 1.3.2 - the test suite and build scripts were improved to support Debian 10 - offline mode has received some love with a set of dedicated tests and various fixes in OVAL probes; - the oscap-docker wrapper is no longer dependent on Atomic - Python binding are now more robust - HTML reports and guides, generated by the scanner, are now more accessible for non-visual rendering agents - Support of multi-check rules has been improved across the whole workflow There are other changes as well, here is the list: * New features - Offline mode support for environmentvariable58 probe - The oscap-docker wrapper is available without Atomic + Maintenance, bug fixes - Improved support of multi-check rules (report, remediations, console output) - Improved HTML report look and feel, including printed version - Less clutter in verbose mode output; some warnings and errors demoted to verbose mode levels - Probe rpmverifyfile uses and returns canonical paths - Improved a11y of HTML reports and guides - Fixes and improvements for SWIG Python bindings - #1403 fixed: Scanner would not apply remediation for multicheck rules (verbosity) - Fixed URL link mechanism for Red Hat Errata - New STIG Viewer URI: public.cyber.mil - Probe selinuxsecuritycontext would not check if SELinux is enabled - Scanner would provide information about unsupported OVAL objects - Added more tests for offline mode (probes, remediation) - #528 fixed: Eval SCE script when /tmp is in mode noexec - #1173, RHBZ#1603347 fixed: Double chdir/chroot in probe rpmverifypackage
Comments 0