Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package ansible-linux-system-roles for openSUSE:Factory checked in at 2025-04-11 23:22:44 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/ansible-linux-system-roles (Old) and /work/SRC/openSUSE:Factory/.ansible-linux-system-roles.new.1907 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "ansible-linux-system-roles" Fri Apr 11 23:22:44 2025 rev:2 rq:1268654 version:1.0.0 Changes: -------- --- /work/SRC/openSUSE:Factory/ansible-linux-system-roles/ansible-linux-system-roles.changes 2025-02-28 17:38:49.159311926 +0100 +++ /work/SRC/openSUSE:Factory/.ansible-linux-system-roles.new.1907/ansible-linux-system-roles.changes 2025-04-11 23:22:45.910120697 +0200 @@ -1,0 +2,9 @@ +Fri Apr 11 09:08:14 UTC 2025 - Harshvardhan Sharma <harshvardhan.sha...@suse.com> + +- Updated spec to require the use of the new Ansible version. +- Upgraded the certificate role to version 1.3.9: + - Added new variables for SLES_SAP_15 and SLES_SAP_16. + - Updated Ansible lint version to v25. + - Updated CI pipeline with new test requirements. + +------------------------------------------------------------------- Old: ---- certificate-1.3.8.tar.gz New: ---- certificate-1.3.9.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ ansible-linux-system-roles.spec ++++++ --- /var/tmp/diff_new_pack.A9dWP0/_old 2025-04-11 23:22:49.314263294 +0200 +++ /var/tmp/diff_new_pack.A9dWP0/_new 2025-04-11 23:22:49.330263964 +0200 @@ -13,6 +13,7 @@ # Please submit bugfixes or comments via https://bugs.opensuse.org/\ + # Define individual versions for each role %global firewall_version 1.8.2 %global timesync_version 1.9.2 @@ -21,7 +22,7 @@ %global crypto_policies_version 1.4.2 %global systemd_version 1.3.1 %global ha_cluster_version 1.22.1 -%global certificate_version 1.3.8 +%global certificate_version 1.3.9 %global mssql_version 2.5.2 %global suseconnect_version 1.0.0 %global auto_maintenance_version 1.94.2 @@ -50,31 +51,13 @@ BuildArch: noarch -# Python macros are required for python detection -BuildRequires: python-rpm-macros -BuildRequires: python311-ruamel.yaml - -# Minimum python version -%{?sle15_python_module_pythons} -BuildRequires: %{python_module base >= 3.11} -Requires: %{python_module base >= 3.11} - -# Select correct supported Ansible -%if 0%{?suse_version} >= 1600 -Requires: ansible-core -Requires: ansible -BuildRequires: ansible-core -BuildRequires: ansible -%else -# Only Ansible 9 is supported on SLES 15 -Requires: ansible-core-2.16 -Requires: ansible-9 -BuildRequires: ansible-core-2.16 -BuildRequires: ansible-9 -%endif +BuildRequires: python3-ruamel.yaml +BuildRequires: python3-Jinja2 -# Do not check any files in collections for requires -%global __requires_exclude_from ^%{python311_sitelib}/.*$ +Requires: ansible-core >= 2.16 +Requires: ansible >= 9 +BuildRequires: ansible-core >= 2.16 +BuildRequires: ansible >= 9 %description Linux System Roles is a collection of Ansible roles and modules that provide a @@ -83,7 +66,6 @@ aspects of a Linux system. %prep - # Define roles with their versions roles=( "firewall:%{firewall_version}" @@ -108,7 +90,6 @@ role_name=${role_entry%%:*} role_version=${role_entry##*:} - # Extract all roles uniformly tar -xzf %{_sourcedir}/${role_name}-${role_version}.tar.gz -C %{_builddir}/roles \ --transform="s/^ansible-${role_name}-${role_version}-suse/${role_name}/" done @@ -153,8 +134,14 @@ continue fi + # Skip certificate role for SLE15 + if [[ "${role_name}" == "certificate" && 0%{?suse_version} -lt 1600 ]]; then + echo "Skipping certificate role for SLE15..." + continue + fi + # Process the role with lsr_role2collection.py - python3.11 %{_builddir}/roles/auto_maintenance/lsr_role2collection.py \ + python3 %{_builddir}/roles/auto_maintenance/lsr_role2collection.py \ --namespace suse \ --collection linux_system_roles \ --role ${role_name} \ ++++++ certificate-1.3.8.tar.gz -> certificate-1.3.9.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/.github/config/ubuntu-requirements.txt new/ansible-certificate-1.3.9-suse/.github/config/ubuntu-requirements.txt --- old/ansible-certificate-1.3.8-suse/.github/config/ubuntu-requirements.txt 2025-01-22 16:27:33.000000000 +0100 +++ new/ansible-certificate-1.3.9-suse/.github/config/ubuntu-requirements.txt 2025-01-31 23:45:38.000000000 +0100 @@ -1 +1,2 @@ libdbus-1-dev +glib-2.0 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/.github/workflows/ansible-lint.yml new/ansible-certificate-1.3.9-suse/.github/workflows/ansible-lint.yml --- old/ansible-certificate-1.3.8-suse/.github/workflows/ansible-lint.yml 2025-01-22 16:27:33.000000000 +0100 +++ new/ansible-certificate-1.3.9-suse/.github/workflows/ansible-lint.yml 2025-01-31 23:45:38.000000000 +0100 @@ -35,15 +35,48 @@ pip3 install "git+https://github.com/linux-system-roles/tox-lsr@3.4.0" - name: Convert role to collection format + id: collection run: | set -euxo pipefail TOXENV=collection lsr_ci_runtox coll_dir=".tox/ansible_collections/$LSR_ROLE2COLL_NAMESPACE/$LSR_ROLE2COLL_NAME" + # cleanup after collection conversion + rm -rf "$coll_dir/.ansible" .tox/ansible-plugin-scan # ansible-lint action requires a .git directory??? # https://github.com/ansible/ansible-lint/blob/main/action.yml#L45 mkdir -p "$coll_dir/.git" + meta_req_file="${{ github.workspace }}/meta/collection-requirements.yml" + test_req_file="${{ github.workspace }}/tests/collection-requirements.yml" + if [ -f "$meta_req_file" ] && [ -f "$test_req_file" ]; then + coll_req_file="${{ github.workspace }}/req.yml" + python -c 'import sys; import yaml + hsh1 = yaml.safe_load(open(sys.argv[1])) + hsh2 = yaml.safe_load(open(sys.argv[2])) + coll = {} + for item in hsh1["collections"] + hsh2["collections"]: + if isinstance(item, dict): + name = item["name"] + rec = item + else: + name = item # assume string + rec = {"name": name} + if name not in coll: + coll[name] = rec + hsh1["collections"] = list(coll.values()) + yaml.safe_dump(hsh1, open(sys.argv[3], "w"))' "$meta_req_file" "$test_req_file" "$coll_req_file" + echo merged "$coll_req_file" + cat "$coll_req_file" + elif [ -f "$meta_req_file" ]; then + coll_req_file="$meta_req_file" + elif [ -f "$test_req_file" ]; then + coll_req_file="$test_req_file" + else + coll_req_file="" + fi + echo "coll_req_file=$coll_req_file" >> $GITHUB_OUTPUT - name: Run ansible-lint - uses: ansible/ansible-lint@v24 + uses: ansible/ansible-lint@v25 with: working_directory: ${{ github.workspace }}/.tox/ansible_collections/${{ env.LSR_ROLE2COLL_NAMESPACE }}/${{ env.LSR_ROLE2COLL_NAME }} + requirements_file: ${{ steps.collection.outputs.coll_req_file }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/.github/workflows/ansible-plugin-scan.yml new/ansible-certificate-1.3.9-suse/.github/workflows/ansible-plugin-scan.yml --- old/ansible-certificate-1.3.8-suse/.github/workflows/ansible-plugin-scan.yml 2025-01-22 16:27:33.000000000 +0100 +++ new/ansible-certificate-1.3.9-suse/.github/workflows/ansible-plugin-scan.yml 1970-01-01 01:00:00.000000000 +0100 @@ -1,38 +0,0 @@ ---- -name: Ansible Plugin Scan -on: # yamllint disable-line rule:truthy - pull_request: - merge_group: - branches: - - main - types: - - checks_requested - push: - branches: - - main - workflow_dispatch: -permissions: - contents: read -jobs: - ansible_plugin_scan: - runs-on: ubuntu-latest - steps: - - name: Update pip, git - run: | - set -euxo pipefail - python3 -m pip install --upgrade pip - sudo apt update - sudo apt install -y git - - - name: Checkout repo - uses: actions/checkout@v4 - - - name: Install tox, tox-lsr - run: | - set -euxo pipefail - pip3 install "git+https://github.com/linux-system-roles/tox-lsr@3.4.0" - - - name: Run ansible-plugin-scan - run: | - set -euxo pipefail - TOXENV=ansible-plugin-scan lsr_ci_runtox diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/CHANGELOG.md new/ansible-certificate-1.3.9-suse/CHANGELOG.md --- old/ansible-certificate-1.3.8-suse/CHANGELOG.md 2025-01-22 16:27:33.000000000 +0100 +++ new/ansible-certificate-1.3.9-suse/CHANGELOG.md 2025-01-31 23:45:38.000000000 +0100 @@ -1,6 +1,17 @@ Changelog ========= +[1.3.9] - 2025-01-31 +-------------------- + +### Other Changes + +- ci: Add SLES vars (#248) +- ci: ansible-plugin-scan is disabled for now (#249) +- ci: bump ansible-lint to v25; provide collection requirements for ansible-lint (#252) +- ci: fix python tests (#253) +- ci: Add vars for SLES_SAP (#254) + [1.3.8] - 2024-12-04 -------------------- diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/vars/SLES.yml new/ansible-certificate-1.3.9-suse/vars/SLES.yml --- old/ansible-certificate-1.3.8-suse/vars/SLES.yml 2025-01-22 16:27:33.000000000 +0100 +++ new/ansible-certificate-1.3.9-suse/vars/SLES.yml 1970-01-01 01:00:00.000000000 +0100 @@ -1,10 +0,0 @@ -# SPDX-License-Identifier: MIT ---- -# Put internal variables here with SLES specific values. - -__certificate_default_directory: /etc/ssl - -__certificate_packages: - - python3-cryptography - - python3-dbus-python - - python3-pyasn1 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/vars/SLES_15.yml new/ansible-certificate-1.3.9-suse/vars/SLES_15.yml --- old/ansible-certificate-1.3.8-suse/vars/SLES_15.yml 1970-01-01 01:00:00.000000000 +0100 +++ new/ansible-certificate-1.3.9-suse/vars/SLES_15.yml 2025-01-31 23:45:38.000000000 +0100 @@ -0,0 +1,10 @@ +# SPDX-License-Identifier: MIT +--- +# Put internal variables here with SLES_15 specific values. + +__certificate_default_directory: /etc/ssl + +__certificate_packages: + - python3-cryptography + - python3-dbus-python + - python3-pyasn1 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/vars/SLES_16.yml new/ansible-certificate-1.3.9-suse/vars/SLES_16.yml --- old/ansible-certificate-1.3.8-suse/vars/SLES_16.yml 1970-01-01 01:00:00.000000000 +0100 +++ new/ansible-certificate-1.3.9-suse/vars/SLES_16.yml 2025-01-31 23:45:38.000000000 +0100 @@ -0,0 +1,10 @@ +# SPDX-License-Identifier: MIT +--- +# Put internal variables here with SLES_16 specific values. + +__certificate_default_directory: /etc/ssl + +__certificate_packages: + - python311-cryptography + - python311-dbus-python + - python311-pyasn1 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/vars/SLES_SAP_15.yml new/ansible-certificate-1.3.9-suse/vars/SLES_SAP_15.yml --- old/ansible-certificate-1.3.8-suse/vars/SLES_SAP_15.yml 1970-01-01 01:00:00.000000000 +0100 +++ new/ansible-certificate-1.3.9-suse/vars/SLES_SAP_15.yml 2025-01-31 23:45:38.000000000 +0100 @@ -0,0 +1,10 @@ +# SPDX-License-Identifier: MIT +--- +# Put internal variables here with SLES_SAP_15 specific values. + +__certificate_default_directory: /etc/ssl + +__certificate_packages: + - python3-cryptography + - python3-dbus-python + - python3-pyasn1 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/ansible-certificate-1.3.8-suse/vars/SLES_SAP_16.yml new/ansible-certificate-1.3.9-suse/vars/SLES_SAP_16.yml --- old/ansible-certificate-1.3.8-suse/vars/SLES_SAP_16.yml 1970-01-01 01:00:00.000000000 +0100 +++ new/ansible-certificate-1.3.9-suse/vars/SLES_SAP_16.yml 2025-01-31 23:45:38.000000000 +0100 @@ -0,0 +1,10 @@ +# SPDX-License-Identifier: MIT +--- +# Put internal variables here with SLES_SAP_16 specific values. + +__certificate_default_directory: /etc/ssl + +__certificate_packages: + - python311-cryptography + - python311-dbus-python + - python311-pyasn1