Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package ansible-linux-system-roles for
openSUSE:Factory checked in at 2025-04-11 23:22:44
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/ansible-linux-system-roles (Old)
and /work/SRC/openSUSE:Factory/.ansible-linux-system-roles.new.1907 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "ansible-linux-system-roles"
Fri Apr 11 23:22:44 2025 rev:2 rq:1268654 version:1.0.0
Changes:
--------
---
/work/SRC/openSUSE:Factory/ansible-linux-system-roles/ansible-linux-system-roles.changes
2025-02-28 17:38:49.159311926 +0100
+++
/work/SRC/openSUSE:Factory/.ansible-linux-system-roles.new.1907/ansible-linux-system-roles.changes
2025-04-11 23:22:45.910120697 +0200
@@ -1,0 +2,9 @@
+Fri Apr 11 09:08:14 UTC 2025 - Harshvardhan Sharma
<[email protected]>
+
+- Updated spec to require the use of the new Ansible version.
+- Upgraded the certificate role to version 1.3.9:
+ - Added new variables for SLES_SAP_15 and SLES_SAP_16.
+ - Updated Ansible lint version to v25.
+ - Updated CI pipeline with new test requirements.
+
+-------------------------------------------------------------------
Old:
----
certificate-1.3.8.tar.gz
New:
----
certificate-1.3.9.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ ansible-linux-system-roles.spec ++++++
--- /var/tmp/diff_new_pack.A9dWP0/_old 2025-04-11 23:22:49.314263294 +0200
+++ /var/tmp/diff_new_pack.A9dWP0/_new 2025-04-11 23:22:49.330263964 +0200
@@ -13,6 +13,7 @@
# Please submit bugfixes or comments via https://bugs.opensuse.org/\
+
# Define individual versions for each role
%global firewall_version 1.8.2
%global timesync_version 1.9.2
@@ -21,7 +22,7 @@
%global crypto_policies_version 1.4.2
%global systemd_version 1.3.1
%global ha_cluster_version 1.22.1
-%global certificate_version 1.3.8
+%global certificate_version 1.3.9
%global mssql_version 2.5.2
%global suseconnect_version 1.0.0
%global auto_maintenance_version 1.94.2
@@ -50,31 +51,13 @@
BuildArch: noarch
-# Python macros are required for python detection
-BuildRequires: python-rpm-macros
-BuildRequires: python311-ruamel.yaml
-
-# Minimum python version
-%{?sle15_python_module_pythons}
-BuildRequires: %{python_module base >= 3.11}
-Requires: %{python_module base >= 3.11}
-
-# Select correct supported Ansible
-%if 0%{?suse_version} >= 1600
-Requires: ansible-core
-Requires: ansible
-BuildRequires: ansible-core
-BuildRequires: ansible
-%else
-# Only Ansible 9 is supported on SLES 15
-Requires: ansible-core-2.16
-Requires: ansible-9
-BuildRequires: ansible-core-2.16
-BuildRequires: ansible-9
-%endif
+BuildRequires: python3-ruamel.yaml
+BuildRequires: python3-Jinja2
-# Do not check any files in collections for requires
-%global __requires_exclude_from ^%{python311_sitelib}/.*$
+Requires: ansible-core >= 2.16
+Requires: ansible >= 9
+BuildRequires: ansible-core >= 2.16
+BuildRequires: ansible >= 9
%description
Linux System Roles is a collection of Ansible roles and modules that provide a
@@ -83,7 +66,6 @@
aspects of a Linux system.
%prep
-
# Define roles with their versions
roles=(
"firewall:%{firewall_version}"
@@ -108,7 +90,6 @@
role_name=${role_entry%%:*}
role_version=${role_entry##*:}
- # Extract all roles uniformly
tar -xzf %{_sourcedir}/${role_name}-${role_version}.tar.gz -C
%{_builddir}/roles \
--transform="s/^ansible-${role_name}-${role_version}-suse/${role_name}/"
done
@@ -153,8 +134,14 @@
continue
fi
+ # Skip certificate role for SLE15
+ if [[ "${role_name}" == "certificate" && 0%{?suse_version} -lt 1600 ]]; then
+ echo "Skipping certificate role for SLE15..."
+ continue
+ fi
+
# Process the role with lsr_role2collection.py
- python3.11 %{_builddir}/roles/auto_maintenance/lsr_role2collection.py \
+ python3 %{_builddir}/roles/auto_maintenance/lsr_role2collection.py \
--namespace suse \
--collection linux_system_roles \
--role ${role_name} \
++++++ certificate-1.3.8.tar.gz -> certificate-1.3.9.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.3.8-suse/.github/config/ubuntu-requirements.txt
new/ansible-certificate-1.3.9-suse/.github/config/ubuntu-requirements.txt
--- old/ansible-certificate-1.3.8-suse/.github/config/ubuntu-requirements.txt
2025-01-22 16:27:33.000000000 +0100
+++ new/ansible-certificate-1.3.9-suse/.github/config/ubuntu-requirements.txt
2025-01-31 23:45:38.000000000 +0100
@@ -1 +1,2 @@
libdbus-1-dev
+glib-2.0
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.3.8-suse/.github/workflows/ansible-lint.yml
new/ansible-certificate-1.3.9-suse/.github/workflows/ansible-lint.yml
--- old/ansible-certificate-1.3.8-suse/.github/workflows/ansible-lint.yml
2025-01-22 16:27:33.000000000 +0100
+++ new/ansible-certificate-1.3.9-suse/.github/workflows/ansible-lint.yml
2025-01-31 23:45:38.000000000 +0100
@@ -35,15 +35,48 @@
pip3 install
"git+https://github.com/linux-system-roles/[email protected]"
- name: Convert role to collection format
+ id: collection
run: |
set -euxo pipefail
TOXENV=collection lsr_ci_runtox
coll_dir=".tox/ansible_collections/$LSR_ROLE2COLL_NAMESPACE/$LSR_ROLE2COLL_NAME"
+ # cleanup after collection conversion
+ rm -rf "$coll_dir/.ansible" .tox/ansible-plugin-scan
# ansible-lint action requires a .git directory???
# https://github.com/ansible/ansible-lint/blob/main/action.yml#L45
mkdir -p "$coll_dir/.git"
+ meta_req_file="${{ github.workspace
}}/meta/collection-requirements.yml"
+ test_req_file="${{ github.workspace
}}/tests/collection-requirements.yml"
+ if [ -f "$meta_req_file" ] && [ -f "$test_req_file" ]; then
+ coll_req_file="${{ github.workspace }}/req.yml"
+ python -c 'import sys; import yaml
+ hsh1 = yaml.safe_load(open(sys.argv[1]))
+ hsh2 = yaml.safe_load(open(sys.argv[2]))
+ coll = {}
+ for item in hsh1["collections"] + hsh2["collections"]:
+ if isinstance(item, dict):
+ name = item["name"]
+ rec = item
+ else:
+ name = item # assume string
+ rec = {"name": name}
+ if name not in coll:
+ coll[name] = rec
+ hsh1["collections"] = list(coll.values())
+ yaml.safe_dump(hsh1, open(sys.argv[3], "w"))' "$meta_req_file"
"$test_req_file" "$coll_req_file"
+ echo merged "$coll_req_file"
+ cat "$coll_req_file"
+ elif [ -f "$meta_req_file" ]; then
+ coll_req_file="$meta_req_file"
+ elif [ -f "$test_req_file" ]; then
+ coll_req_file="$test_req_file"
+ else
+ coll_req_file=""
+ fi
+ echo "coll_req_file=$coll_req_file" >> $GITHUB_OUTPUT
- name: Run ansible-lint
- uses: ansible/ansible-lint@v24
+ uses: ansible/ansible-lint@v25
with:
working_directory: ${{ github.workspace
}}/.tox/ansible_collections/${{ env.LSR_ROLE2COLL_NAMESPACE }}/${{
env.LSR_ROLE2COLL_NAME }}
+ requirements_file: ${{ steps.collection.outputs.coll_req_file }}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/ansible-certificate-1.3.8-suse/.github/workflows/ansible-plugin-scan.yml
new/ansible-certificate-1.3.9-suse/.github/workflows/ansible-plugin-scan.yml
---
old/ansible-certificate-1.3.8-suse/.github/workflows/ansible-plugin-scan.yml
2025-01-22 16:27:33.000000000 +0100
+++
new/ansible-certificate-1.3.9-suse/.github/workflows/ansible-plugin-scan.yml
1970-01-01 01:00:00.000000000 +0100
@@ -1,38 +0,0 @@
----
-name: Ansible Plugin Scan
-on: # yamllint disable-line rule:truthy
- pull_request:
- merge_group:
- branches:
- - main
- types:
- - checks_requested
- push:
- branches:
- - main
- workflow_dispatch:
-permissions:
- contents: read
-jobs:
- ansible_plugin_scan:
- runs-on: ubuntu-latest
- steps:
- - name: Update pip, git
- run: |
- set -euxo pipefail
- python3 -m pip install --upgrade pip
- sudo apt update
- sudo apt install -y git
-
- - name: Checkout repo
- uses: actions/checkout@v4
-
- - name: Install tox, tox-lsr
- run: |
- set -euxo pipefail
- pip3 install
"git+https://github.com/linux-system-roles/[email protected]"
-
- - name: Run ansible-plugin-scan
- run: |
- set -euxo pipefail
- TOXENV=ansible-plugin-scan lsr_ci_runtox
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/CHANGELOG.md
new/ansible-certificate-1.3.9-suse/CHANGELOG.md
--- old/ansible-certificate-1.3.8-suse/CHANGELOG.md 2025-01-22
16:27:33.000000000 +0100
+++ new/ansible-certificate-1.3.9-suse/CHANGELOG.md 2025-01-31
23:45:38.000000000 +0100
@@ -1,6 +1,17 @@
Changelog
=========
+[1.3.9] - 2025-01-31
+--------------------
+
+### Other Changes
+
+- ci: Add SLES vars (#248)
+- ci: ansible-plugin-scan is disabled for now (#249)
+- ci: bump ansible-lint to v25; provide collection requirements for
ansible-lint (#252)
+- ci: fix python tests (#253)
+- ci: Add vars for SLES_SAP (#254)
+
[1.3.8] - 2024-12-04
--------------------
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/vars/SLES.yml
new/ansible-certificate-1.3.9-suse/vars/SLES.yml
--- old/ansible-certificate-1.3.8-suse/vars/SLES.yml 2025-01-22
16:27:33.000000000 +0100
+++ new/ansible-certificate-1.3.9-suse/vars/SLES.yml 1970-01-01
01:00:00.000000000 +0100
@@ -1,10 +0,0 @@
-# SPDX-License-Identifier: MIT
----
-# Put internal variables here with SLES specific values.
-
-__certificate_default_directory: /etc/ssl
-
-__certificate_packages:
- - python3-cryptography
- - python3-dbus-python
- - python3-pyasn1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/vars/SLES_15.yml
new/ansible-certificate-1.3.9-suse/vars/SLES_15.yml
--- old/ansible-certificate-1.3.8-suse/vars/SLES_15.yml 1970-01-01
01:00:00.000000000 +0100
+++ new/ansible-certificate-1.3.9-suse/vars/SLES_15.yml 2025-01-31
23:45:38.000000000 +0100
@@ -0,0 +1,10 @@
+# SPDX-License-Identifier: MIT
+---
+# Put internal variables here with SLES_15 specific values.
+
+__certificate_default_directory: /etc/ssl
+
+__certificate_packages:
+ - python3-cryptography
+ - python3-dbus-python
+ - python3-pyasn1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/vars/SLES_16.yml
new/ansible-certificate-1.3.9-suse/vars/SLES_16.yml
--- old/ansible-certificate-1.3.8-suse/vars/SLES_16.yml 1970-01-01
01:00:00.000000000 +0100
+++ new/ansible-certificate-1.3.9-suse/vars/SLES_16.yml 2025-01-31
23:45:38.000000000 +0100
@@ -0,0 +1,10 @@
+# SPDX-License-Identifier: MIT
+---
+# Put internal variables here with SLES_16 specific values.
+
+__certificate_default_directory: /etc/ssl
+
+__certificate_packages:
+ - python311-cryptography
+ - python311-dbus-python
+ - python311-pyasn1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/vars/SLES_SAP_15.yml
new/ansible-certificate-1.3.9-suse/vars/SLES_SAP_15.yml
--- old/ansible-certificate-1.3.8-suse/vars/SLES_SAP_15.yml 1970-01-01
01:00:00.000000000 +0100
+++ new/ansible-certificate-1.3.9-suse/vars/SLES_SAP_15.yml 2025-01-31
23:45:38.000000000 +0100
@@ -0,0 +1,10 @@
+# SPDX-License-Identifier: MIT
+---
+# Put internal variables here with SLES_SAP_15 specific values.
+
+__certificate_default_directory: /etc/ssl
+
+__certificate_packages:
+ - python3-cryptography
+ - python3-dbus-python
+ - python3-pyasn1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/vars/SLES_SAP_16.yml
new/ansible-certificate-1.3.9-suse/vars/SLES_SAP_16.yml
--- old/ansible-certificate-1.3.8-suse/vars/SLES_SAP_16.yml 1970-01-01
01:00:00.000000000 +0100
+++ new/ansible-certificate-1.3.9-suse/vars/SLES_SAP_16.yml 2025-01-31
23:45:38.000000000 +0100
@@ -0,0 +1,10 @@
+# SPDX-License-Identifier: MIT
+---
+# Put internal variables here with SLES_SAP_16 specific values.
+
+__certificate_default_directory: /etc/ssl
+
+__certificate_packages:
+ - python311-cryptography
+ - python311-dbus-python
+ - python311-pyasn1