>From fed8a5a37671f03451e6503f6c76df688c0bc686 Mon Sep 17 00:00:00 2001
From: Shawn Wells <[email protected]>
Date: Tue, 5 Feb 2013 19:16:40 -0500
Subject: [PATCH] Renamed manpage to scap-security-guide

IMO, if the RPM is called scap-security-guide, the man page should be too.
Changing from ssg to scap-scap-security-guide (until we can think of some
craft project name).

$ make clean; make all; su -
[root] rpm -ivh 
rpmbuild/src/redhat/RPMS/noarch/scap-security-guide-0.1-9.el6.noarch.rpm 
Preparing...                ########################################### [100%]
   1:scap-security-guide    ########################################### [100%]
[root] man scap-security-guide
(works)
---
 RHEL6/input/auxiliary/scap-security-guide.8 |  110 +++++++++++++++++++++++++++
 RHEL6/input/auxiliary/ssg.8                 |  110 ---------------------------
 scap-security-guide.spec                    |    6 +-
 3 files changed, 113 insertions(+), 113 deletions(-)
 create mode 100644 RHEL6/input/auxiliary/scap-security-guide.8
 delete mode 100644 RHEL6/input/auxiliary/ssg.8

diff --git a/RHEL6/input/auxiliary/scap-security-guide.8 
b/RHEL6/input/auxiliary/scap-security-guide.8
new file mode 100644
index 0000000..97c4aec
--- /dev/null
+++ b/RHEL6/input/auxiliary/scap-security-guide.8
@@ -0,0 +1,110 @@
+.TH scap-security-guide 8 "26 Jan 2013" "version 1"
+
+.SH NAME
+SCAP Security Guide - Delivers security guidance, baselines, and associated 
validation mechanisms utilizing
+the Security Content Automation Protocol (SCAP).
+
+
+.SH DESCRIPTION
+The project provides practical security hardening advice for Red Hat products,
+and also links it to compliance requirements in order to ease deployment
+activities, such as certification and accreditation. These include requirements
+in the U.S. government (Federal, Defense, and Intelligence Community) as well
+as of the financial services and health care industries. For example,
+high-level and widely-accepted policies such as NIST 800-53 provides prose
+stating that System Administrators must audit "privileged user actions," but do
+not define what "privileged actions" are. The SSG bridges the gap between
+generalized policy requirements and specific implementation guidance, in SCAP
+formats to support automation whenever possible.
+
+The projects homepage is located at:
+https://fedorahosted.org/scap-security-guide/
+
+
+.SH PROFILES
+The SSG content is broken into 'profiles,' groupings of security settings that 
correlate to a known policy. Available profiles are:
+
+.I stig-rhel6-server
+.RS
+The Security Technical Implementation Guides (STIGs) and the NSA Guides are the
+configuration standards for DOD IA and IA-enabled devices/systems. Since 1998,
+DISA Field Security Operations (FSO) has played a critical role enhancing the
+security posture of DoD's security systems by providing the Security Technical
+Implementation Guides (STIGs). This profile was created as a collaboration
+effort between the National Security Agency, DISA FSO, and Red Hat.
+
+For additional information relating to STIGs, please refer to the DISA FSO
+webpage at http://iase.disa.mil/stigs/
+
+.RE
+.I usgcb-rhel6-server
+.RS
+The purpose of the United States Government Configuration Baseline (USGCB)
+initiative is to create security configuration baselines for Information
+Technology products widely deployed across the federal agencies. The USGCB
+baseline evolved from the Federal Desktop Core Configuration mandate. The
+USGCB is a Federal government-wide initiative that provides guidance to
+agencies on what should be done to improve and maintain an effective
+configuration settings focusing primarily on security.
+
+.B "NOTE: "
+While the current content maps to USGCB requirements, it has NOT
+been validated by NIST as of yet. This content should be considered
+draft, we are highly interested in feedback.
+
+For additional information relating to USGCB, please refer to the NIST
+webpage at http://usgcb.nist.gov/usgcb_content.html.
+.RE
+
+
+.SH EXAMPLES
+To scan your system utilizing the OpenSCAP utility against the 
+stig-rhel6-server profile:
+
+oscap  xccdf eval --profile stig-rhel6-server \ 
+--results /tmp/`hostname`-ssg-results.xml \
+--report /tmp/`hostname`-ssg-results.html \
+--cpe /usr/share/xml/scap/ssg/content/ssg-rhel6-cpe-dictionary.xml \
+/usr/share/xml/scap/ssg/content/ssg-rhel6-xccdf.xml
+.PP
+Additional details can be found on the projects wiki page:
+https://fedorahosted.org/scap-security-guide/wiki/usageguide
+
+
+.SH FILES
+.I /usr/share/xml/scap/ssg/content/
+.RS
+Houses SCAP content utilizing the following naming conventions:
+
+.I CPE_Dictionaries:
+ssg-{profile}-cpe-dictionary.xml
+
+.I CPE_OVAL_Content:
+ssg-{profile}-cpe-oval.xml
+
+.I OVAL_Content:
+ssg-{profile}-oval.xml
+
+.I XCCDF_Content:
+ssg-{profile}-xccdf.xml
+.RE
+
+.I /usr/share/xml/scap/ssg/guides/
+.RS
+HTML versions of SSG profiles.
+.RE
+
+.I /usr/share/xml/scap/ssg/policytables/
+.RS
+HTML tables reflecting which institutionalized policy a particular SSG rule
+conforms to.
+.RE
+
+
+.SH SEE ALSO
+.B oscap(8)
+
+
+.SH AUTHOR
+Please direct all questions to the SSG mailing list:
+https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
diff --git a/RHEL6/input/auxiliary/ssg.8 b/RHEL6/input/auxiliary/ssg.8
deleted file mode 100644
index 97c4aec..0000000
--- a/RHEL6/input/auxiliary/ssg.8
+++ /dev/null
@@ -1,110 +0,0 @@
-.TH scap-security-guide 8 "26 Jan 2013" "version 1"
-
-.SH NAME
-SCAP Security Guide - Delivers security guidance, baselines, and associated 
validation mechanisms utilizing
-the Security Content Automation Protocol (SCAP).
-
-
-.SH DESCRIPTION
-The project provides practical security hardening advice for Red Hat products,
-and also links it to compliance requirements in order to ease deployment
-activities, such as certification and accreditation. These include requirements
-in the U.S. government (Federal, Defense, and Intelligence Community) as well
-as of the financial services and health care industries. For example,
-high-level and widely-accepted policies such as NIST 800-53 provides prose
-stating that System Administrators must audit "privileged user actions," but do
-not define what "privileged actions" are. The SSG bridges the gap between
-generalized policy requirements and specific implementation guidance, in SCAP
-formats to support automation whenever possible.
-
-The projects homepage is located at:
-https://fedorahosted.org/scap-security-guide/
-
-
-.SH PROFILES
-The SSG content is broken into 'profiles,' groupings of security settings that 
correlate to a known policy. Available profiles are:
-
-.I stig-rhel6-server
-.RS
-The Security Technical Implementation Guides (STIGs) and the NSA Guides are the
-configuration standards for DOD IA and IA-enabled devices/systems. Since 1998,
-DISA Field Security Operations (FSO) has played a critical role enhancing the
-security posture of DoD's security systems by providing the Security Technical
-Implementation Guides (STIGs). This profile was created as a collaboration
-effort between the National Security Agency, DISA FSO, and Red Hat.
-
-For additional information relating to STIGs, please refer to the DISA FSO
-webpage at http://iase.disa.mil/stigs/
-
-.RE
-.I usgcb-rhel6-server
-.RS
-The purpose of the United States Government Configuration Baseline (USGCB)
-initiative is to create security configuration baselines for Information
-Technology products widely deployed across the federal agencies. The USGCB
-baseline evolved from the Federal Desktop Core Configuration mandate. The
-USGCB is a Federal government-wide initiative that provides guidance to
-agencies on what should be done to improve and maintain an effective
-configuration settings focusing primarily on security.
-
-.B "NOTE: "
-While the current content maps to USGCB requirements, it has NOT
-been validated by NIST as of yet. This content should be considered
-draft, we are highly interested in feedback.
-
-For additional information relating to USGCB, please refer to the NIST
-webpage at http://usgcb.nist.gov/usgcb_content.html.
-.RE
-
-
-.SH EXAMPLES
-To scan your system utilizing the OpenSCAP utility against the 
-stig-rhel6-server profile:
-
-oscap  xccdf eval --profile stig-rhel6-server \ 
---results /tmp/`hostname`-ssg-results.xml \
---report /tmp/`hostname`-ssg-results.html \
---cpe /usr/share/xml/scap/ssg/content/ssg-rhel6-cpe-dictionary.xml \
-/usr/share/xml/scap/ssg/content/ssg-rhel6-xccdf.xml
-.PP
-Additional details can be found on the projects wiki page:
-https://fedorahosted.org/scap-security-guide/wiki/usageguide
-
-
-.SH FILES
-.I /usr/share/xml/scap/ssg/content/
-.RS
-Houses SCAP content utilizing the following naming conventions:
-
-.I CPE_Dictionaries:
-ssg-{profile}-cpe-dictionary.xml
-
-.I CPE_OVAL_Content:
-ssg-{profile}-cpe-oval.xml
-
-.I OVAL_Content:
-ssg-{profile}-oval.xml
-
-.I XCCDF_Content:
-ssg-{profile}-xccdf.xml
-.RE
-
-.I /usr/share/xml/scap/ssg/guides/
-.RS
-HTML versions of SSG profiles.
-.RE
-
-.I /usr/share/xml/scap/ssg/policytables/
-.RS
-HTML tables reflecting which institutionalized policy a particular SSG rule
-conforms to.
-.RE
-
-
-.SH SEE ALSO
-.B oscap(8)
-
-
-.SH AUTHOR
-Please direct all questions to the SSG mailing list:
-https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
diff --git a/scap-security-guide.spec b/scap-security-guide.spec
index d342aa6..6ddaf7f 100644
--- a/scap-security-guide.spec
+++ b/scap-security-guide.spec
@@ -41,9 +41,9 @@ cp JBossEAP5/eap5-* 
$RPM_BUILD_ROOT/usr/share/xml/scap/ssg/content/
 cp JBossEAP5/docs/JBossEAP5_Guide.html 
$RPM_BUILD_ROOT/usr/share/xml/scap/ssg/guide/
 
 # Add in manpage
-gzip -c RHEL6/input/auxiliary/ssg.8 > 
$RPM_BUILD_ROOT/usr/share/man/en/man8/ssg.8.gz
+gzip -c RHEL6/input/auxiliary/scap-security-guide.8 > 
$RPM_BUILD_ROOT/usr/share/man/en/man8/scap-security-guide.8.gz
 makewhatis
-chcon -u system_u $RPM_BUILD_ROOT/usr/share/man/en/man8/ssg.8.gz
+chcon -u system_u 
$RPM_BUILD_ROOT/usr/share/man/en/man8/scap-security-guide.8.gz
 
 %clean
 rm -rf $RPM_BUILD_ROOT
@@ -52,7 +52,7 @@ rm -rf $RPM_BUILD_ROOT
 %files
 %defattr(0644,root,root,0755)
 %attr(0755,root,root) /usr/share/xml/scap/ssg
-%attr(0644,root,root) /usr/share/man/en/man8/ssg.8.gz
+%attr(0644,root,root) /usr/share/man/en/man8/scap-security-guide.8.gz
 
 
 %changelog
-- 
1.7.1

_______________________________________________
scap-security-guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide

Reply via email to