Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package python-gitlabcis for
openSUSE:Factory checked in at 2026-04-09 17:20:29
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-gitlabcis (Old)
and /work/SRC/openSUSE:Factory/.python-gitlabcis.new.21863 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-gitlabcis"
Thu Apr 9 17:20:29 2026 rev:11 rq:1345551 version:1.19.1
Changes:
--------
--- /work/SRC/openSUSE:Factory/python-gitlabcis/python-gitlabcis.changes
2026-03-18 16:52:45.122633358 +0100
+++
/work/SRC/openSUSE:Factory/.python-gitlabcis.new.21863/python-gitlabcis.changes
2026-04-09 17:20:41.277471433 +0200
@@ -1,0 +2,11 @@
+Thu Apr 9 11:52:17 UTC 2026 - Johannes Kastl
<[email protected]>
+
+- update to 1.19.1:
+ * Documentation
+ - docs: Update deployment group support statements (#125 (closed))
+ (c236e5e)
+ * Fix
+ - fix: Object access in 5.1.3 secret_scan_deployment_config (#135
+ (closed)) (7941c95)
+
+-------------------------------------------------------------------
Old:
----
gitlabcis-1.19.0.tar.gz
New:
----
gitlabcis-1.19.1.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ python-gitlabcis.spec ++++++
--- /var/tmp/diff_new_pack.RNTRZG/_old 2026-04-09 17:20:42.257512023 +0200
+++ /var/tmp/diff_new_pack.RNTRZG/_new 2026-04-09 17:20:42.261512188 +0200
@@ -17,7 +17,7 @@
Name: python-gitlabcis
-Version: 1.19.0
+Version: 1.19.1
Release: 0
Summary: An automated tool that assesses the GitLab CIS benchmarks
against a project
License: MIT
++++++ gitlabcis-1.19.0.tar.gz -> gitlabcis-1.19.1.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/gitlabcis-1.19.0/CHANGELOG.md
new/gitlabcis-1.19.1/CHANGELOG.md
--- old/gitlabcis-1.19.0/CHANGELOG.md 2026-03-18 03:18:47.000000000 +0100
+++ new/gitlabcis-1.19.1/CHANGELOG.md 2026-04-09 07:57:05.000000000 +0200
@@ -1,5 +1,15 @@
# CHANGELOG
+## v1.19.1 (2026-04-09)
+
+### Documentation
+
+* docs: Update deployment group support statements (#125)
([`c236e5e`](https://gitlab.com/gitlab-security-oss/cis/gitlabcis/-/commit/c236e5e6e052863c9d35fc0af6df1771578e8aea))
+
+### Fix
+
+* fix: Object access in 5.1.3 secret_scan_deployment_config (#135)
([`7941c95`](https://gitlab.com/gitlab-security-oss/cis/gitlabcis/-/commit/7941c95388bf80f9b3d5e0a9af0f7cfd60eba18f))
+
## v1.19.0 (2026-03-18)
### Feature
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/gitlabcis-1.19.0/PKG-INFO
new/gitlabcis-1.19.1/PKG-INFO
--- old/gitlabcis-1.19.0/PKG-INFO 2026-03-18 03:18:56.378135200 +0100
+++ new/gitlabcis-1.19.1/PKG-INFO 2026-04-09 07:57:15.375491400 +0200
@@ -1,6 +1,6 @@
Metadata-Version: 2.4
Name: gitlabcis
-Version: 1.19.0
+Version: 1.19.1
Summary: An automated tool that assesses the GitLab CIS benchmarks against a
project.
Author-email: Nate Rosandich <[email protected]>, Neil McDonald
<[email protected]>, Mitra JozeNazemian
<[email protected]>
License: MIT License
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/gitlabcis-1.19.0/docs/limitations.md
new/gitlabcis-1.19.1/docs/limitations.md
--- old/gitlabcis-1.19.0/docs/limitations.md 2026-03-18 03:18:30.000000000
+0100
+++ new/gitlabcis-1.19.1/docs/limitations.md 2026-04-09 07:56:49.000000000
+0200
@@ -88,14 +88,14 @@
| 4.3.2 | all_artifact_versions_signed | `SKIP` for `Group` input types as
commit signing status cannot be queried at the group level. |
| 4.3.3 | audit_package_registry_config | `SKIP` by default as we cannot
automate this |
| 4.4.1 | artifact_origin_info | `SKIP` by default as we cannot automate this |
-| 5.1.1 | separate_deployment_config | `PASS` if ci config yml file is
available and not in the root directory of this project |
-| 5.1.2 | audit_deployment_config | `PASS` if ci config yml file is available
and changes need at least one approval and license allow audit |
-| 5.1.3 | secret_scan_deployment_config | `PASS` if secret_detection is
enabled |
-| 5.1.4 | limit_deployment_config_access | `SKIP` by default as we cannot
automate this |
-| 5.1.5 | scan_iac | `PASS` if SAST_IAC is enabled |
-| 5.1.6 | verify_deployment_config | `SKIP` by default as we cannot automate
this |
-| 5.1.7 | pin_deployment_config_manifests | `SKIP` by default as we cannot
automate this |
-| 5.2.1 | automate_deployment | `FAIL` if ci config file is not available
otherwise `SKIP` for manual review |
-| 5.2.2 | reproducible_deployment | `SKIP` by default as we cannot automate
this |
-| 5.2.3 | limit_prod_access | `SKIP` by default as we cannot automate this |
-| 5.2.4 | disable_default_passwords | `SKIP` by default as we cannot automate
this |
+| 5.1.1 | separate_deployment_config | `PASS` if ci config yml file is
available and not in the root directory of this project. `SKIP` for `Group`
input types as this is not applicable at the group level. |
+| 5.1.2 | audit_deployment_config | `PASS` if ci config yml file is available
and changes need at least one approval and license allow audit. `SKIP` for
`Group` input types as this is not applicable at the group level. |
+| 5.1.3 | secret_scan_deployment_config | `PASS` if secret_detection is
enabled. `SKIP` for `Group` input types as this is not applicable at the group
level. |
+| 5.1.4 | limit_deployment_config_access | `SKIP` by default as we cannot
automate this. |
+| 5.1.5 | scan_iac | `PASS` if SAST_IAC is enabled. `SKIP` for `Group` input
types as this is not applicable at the group level. |
+| 5.1.6 | verify_deployment_config | `SKIP` by default as we cannot automate
this. |
+| 5.1.7 | pin_deployment_config_manifests | `SKIP` by default as we cannot
automate this. |
+| 5.2.1 | automate_deployment | `FAIL` if ci config file is not available
otherwise `SKIP` for manual review. |
+| 5.2.2 | reproducible_deployment | `SKIP` by default as we cannot automate
this. |
+| 5.2.3 | limit_prod_access | `SKIP` by default as we cannot automate this. |
+| 5.2.4 | disable_default_passwords | `SKIP` by default as we cannot automate
this. |
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/gitlabcis-1.19.0/gitlabcis/__init__.py
new/gitlabcis-1.19.1/gitlabcis/__init__.py
--- old/gitlabcis-1.19.0/gitlabcis/__init__.py 2026-03-18 03:18:47.000000000
+0100
+++ new/gitlabcis-1.19.1/gitlabcis/__init__.py 2026-04-09 07:57:05.000000000
+0200
@@ -9,4 +9,4 @@
# -------------------------------------------------------------------------
__author__ = '[email protected]'
-__version__ = '1.19.0' # noqa: E999
+__version__ = '1.19.1' # noqa: E999
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/gitlabcis-1.19.0/gitlabcis/benchmarks/artifacts_4/access_to_artifacts_4_2.py
new/gitlabcis-1.19.1/gitlabcis/benchmarks/artifacts_4/access_to_artifacts_4_2.py
---
old/gitlabcis-1.19.0/gitlabcis/benchmarks/artifacts_4/access_to_artifacts_4_2.py
2026-03-18 03:18:30.000000000 +0100
+++
new/gitlabcis-1.19.1/gitlabcis/benchmarks/artifacts_4/access_to_artifacts_4_2.py
2026-04-09 07:56:49.000000000 +0200
@@ -21,36 +21,26 @@
artifacts is minimized
"""
- from gitlab.exceptions import (GitlabAuthenticationError, GitlabGetError,
- GitlabHttpError)
+ from gitlabcis.utils import members
if kwargs.get('isProject') or kwargs.get('isGroup'):
- try:
- members = glEntity.members.list(all=True)
- maintainer_and_above = sum(
- 1 for member in members if
- member.access_level >= 40)
- total_members = len(members)
-
- if maintainer_and_above and total_members == 0 \
- or total_members == 0:
- return {None: 'No members found'}
-
- maintainer_and_above_percentage = (
- (maintainer_and_above / total_members) * 100
- )
- if maintainer_and_above_percentage < 20 \
- or maintainer_and_above < 3:
- return {True: 'Number of permitted users who can upload new '
- ' artifacts are limited'}
- else:
- return {False: 'Number of permitted users who can upload new '
- ' artifacts are not limited'}
-
- except (GitlabHttpError, GitlabGetError,
- GitlabAuthenticationError) as e:
- if e.response_code in [401, 403]:
- return {None: 'Insufficient permissions'}
+ result = members.memberAccessPercentage(
+ glEntity=glEntity,
+ min_access_level=40,
+ threshold_percentage=20,
+ min_count=3
+ )
+
+ if not isinstance(result, tuple):
+ return result
+
+ exceeds, count, percentage = result
+
+ if not exceeds:
+ return {True: 'Number of permitted users who can upload new '
+ ' artifacts are limited'}
+ return {False: 'Number of permitted users who can upload new '
+ ' artifacts are not limited'}
elif kwargs.get('isInstance'):
return {None: 'Not applicable at instance level'}
@@ -129,35 +119,27 @@
package registry
"""
- from gitlab.exceptions import (GitlabAuthenticationError, GitlabGetError,
- GitlabHttpError)
+ from gitlabcis.utils import members
if kwargs.get('isProject') or kwargs.get('isGroup'):
- try:
- members = glEntity.members.list(all=True)
- reporter_and_above = sum(
- 1 for member in members if
- member.access_level >= 20)
- total_members = len(members)
-
- if reporter_and_above and total_members == 0 \
- or total_members == 0:
- return {None: 'No members found'}
-
- reporter_and_above_percentage = (
- (reporter_and_above / total_members) * 100
- )
- if reporter_and_above_percentage < 40 or reporter_and_above < 3:
- return {True: 'Build access is limited, less than 40% '
- 'of the members have Reporter/Developer role or above'}
- else:
- return {False: 'Build access is not limited, over 40% '
- 'of the members have Reporter/Developer role or above'}
-
- except (GitlabHttpError, GitlabGetError,
- GitlabAuthenticationError) as e:
- if e.response_code in [401, 403]:
- return {None: 'Insufficient permissions'}
+
+ result = members.memberAccessPercentage(
+ glEntity=glEntity,
+ min_access_level=20,
+ threshold_percentage=40,
+ min_count=3
+ )
+
+ if not isinstance(result, tuple):
+ return result
+
+ exceeds, count, percentage = result
+
+ if not exceeds:
+ return {True: 'Build access is limited, less than 40% '
+ 'of the members have Reporter/Developer role or above'}
+ return {False: 'Build access is not limited, over 40% '
+ 'of the members have Reporter/Developer role or above'}
elif kwargs.get('isInstance'):
return {None: 'Not applicable at instance level'}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/gitlabcis-1.19.0/gitlabcis/benchmarks/build_pipelines_2/build_environment_2_1.py
new/gitlabcis-1.19.1/gitlabcis/benchmarks/build_pipelines_2/build_environment_2_1.py
---
old/gitlabcis-1.19.0/gitlabcis/benchmarks/build_pipelines_2/build_environment_2_1.py
2026-03-18 03:18:30.000000000 +0100
+++
new/gitlabcis-1.19.1/gitlabcis/benchmarks/build_pipelines_2/build_environment_2_1.py
2026-04-09 07:56:49.000000000 +0200
@@ -117,35 +117,26 @@
id: 2.1.5
title: Ensure access to build environments is limited
"""
- from gitlab.exceptions import (GitlabAuthenticationError, GitlabGetError,
- GitlabHttpError)
+ from gitlabcis.utils import members
if kwargs.get('isProject') or kwargs.get('isGroup'):
- try:
- members = glEntity.members.list(all=True)
- reporter_and_above = sum(
- 1 for member in members if
- member.access_level >= 20)
- total_members = len(members)
-
- if reporter_and_above and total_members == 0 \
- or total_members == 0:
- return {None: 'No members found'}
-
- reporter_and_above_percentage = (
- (reporter_and_above / total_members) * 100
- )
- if reporter_and_above_percentage < 40 or reporter_and_above < 3:
- return {True: 'Build access is limited, less than 40% '
- 'of the members have Reporter/Developer role or above'}
- else:
- return {False: 'Build access is not limited, over 40% '
- 'of the members have Reporter/Developer role or above'}
-
- except (GitlabHttpError, GitlabGetError,
- GitlabAuthenticationError) as e:
- if e.response_code in [401, 403]:
- return {None: 'Insufficient permissions'}
+ result = members.memberAccessPercentage(
+ glEntity=glEntity,
+ min_access_level=20,
+ threshold_percentage=40,
+ min_count=3
+ )
+
+ if not isinstance(result, tuple):
+ return result
+
+ exceeds, count, percentage = result
+
+ if not exceeds:
+ return {True: 'Build access is limited, less than 40% '
+ 'of the members have Reporter/Developer role or above'}
+ return {False: 'Build access is not limited, over 40% '
+ 'of the members have Reporter/Developer role or above'}
elif kwargs.get('isInstance'):
return {None: 'Not applicable at instance level'}
@@ -159,35 +150,26 @@
title: Ensure users must authenticate to access the build
environment
"""
- from gitlab.exceptions import (GitlabAuthenticationError, GitlabGetError,
- GitlabHttpError)
+ from gitlabcis.utils import members
if kwargs.get('isProject') or kwargs.get('isGroup'):
- try:
- members = glEntity.members.list(all=True)
- reporter_and_above = sum(
- 1 for member in members if
- member.access_level >= 20)
- total_members = len(members)
-
- if reporter_and_above and total_members == 0 \
- or total_members == 0:
- return {None: 'No members found'}
-
- reporter_and_above_percentage = (
- (reporter_and_above / total_members) * 100
- )
- if reporter_and_above_percentage < 40 or reporter_and_above < 3:
- return {True: 'Build access is limited, less than 40% '
- 'of the members have Reporter/Developer role or above'}
- else:
- return {False: 'Build access is not limited, over 40% '
- 'of the members have Reporter/Developer role or above'}
-
- except (GitlabHttpError, GitlabGetError,
- GitlabAuthenticationError) as e:
- if e.response_code in [401, 403]:
- return {None: 'Insufficient permissions'}
+ result = members.memberAccessPercentage(
+ glEntity=glEntity,
+ min_access_level=20,
+ threshold_percentage=40,
+ min_count=3
+ )
+
+ if not isinstance(result, tuple):
+ return result
+
+ exceeds, count, percentage = result
+
+ if not exceeds:
+ return {True: 'Build access is limited, less than 40% '
+ 'of the members have Reporter/Developer role or above'}
+ return {False: 'Build access is not limited, over 40% '
+ 'of the members have Reporter/Developer role or above'}
elif kwargs.get('isInstance'):
return {None: 'Not applicable at instance level'}
@@ -276,36 +258,26 @@
title: Ensure minimum number of administrators are set for the
build environment
"""
- from gitlab.exceptions import (GitlabAuthenticationError, GitlabGetError,
- GitlabHttpError)
+ from gitlabcis.utils import members
if kwargs.get('isProject') or kwargs.get('isGroup'):
- try:
- members = glEntity.members.list(all=True)
- maintainer_and_above = sum(
- 1 for member in members if
- member.access_level >= 40)
- total_members = len(members)
-
- if maintainer_and_above and total_members == 0 \
- or total_members == 0:
- return {None: 'No members found'}
-
- maintainer_and_above_percentage = (
- (maintainer_and_above / total_members) * 100
- )
- if maintainer_and_above_percentage < 20 \
- or maintainer_and_above < 3:
- return {True: 'Build access is limited, less than 20% '
- 'of the members have Owner/Maintainer role'}
- else:
- return {False: 'Build access is not limited, over than 20% of '
- 'the members have Owner/Maintainer role'}
-
- except (GitlabHttpError, GitlabGetError,
- GitlabAuthenticationError) as e:
- if e.response_code in [401, 403]:
- return {None: 'Insufficient permissions'}
+ result = members.memberAccessPercentage(
+ glEntity=glEntity,
+ min_access_level=40,
+ threshold_percentage=20,
+ min_count=3
+ )
+
+ if not isinstance(result, tuple):
+ return result
+
+ exceeds, count, percentage = result
+
+ if not exceeds:
+ return {True: 'Build access is limited, less than 20% '
+ 'of the members have Owner/Maintainer role'}
+ return {False: 'Build access is not limited, over than 20% of '
+ 'the members have Owner/Maintainer role'}
elif kwargs.get('isInstance'):
return {None: 'Not applicable at instance level'}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/gitlabcis-1.19.0/gitlabcis/benchmarks/deployment_5/deployment_configuration_5_1.py
new/gitlabcis-1.19.1/gitlabcis/benchmarks/deployment_5/deployment_configuration_5_1.py
---
old/gitlabcis-1.19.0/gitlabcis/benchmarks/deployment_5/deployment_configuration_5_1.py
2026-03-18 03:18:30.000000000 +0100
+++
new/gitlabcis-1.19.1/gitlabcis/benchmarks/deployment_5/deployment_configuration_5_1.py
2026-04-09 07:56:49.000000000 +0200
@@ -45,7 +45,7 @@
return {None: 'Not applicable at instance level'}
elif kwargs.get('isGroup'):
- return {None: 'Not yet implemented for groups'}
+ return {None: 'Not applicable at group level'}
# -------------------------------------------------------------------------
@@ -95,7 +95,7 @@
return {None: 'Not applicable at instance level'}
elif kwargs.get('isGroup'):
- return {None: 'Not yet implemented for groups'}
+ return {None: 'Not applicable at group level'}
# -------------------------------------------------------------------------
@@ -126,13 +126,13 @@
settings = glObject.settings.get()
- if settings.get('pre_receive_secret_detection_enabled') is True:
+ if settings.pre_receive_secret_detection_enabled is True:
return {True: 'Secret Detection is enabled globally'}
else:
return {False: 'Secret Detection is not enabled globally'}
elif kwargs.get('isGroup'):
- return {None: 'Not yet implemented for groups'}
+ return {None: 'Not applicable at group level'}
# -------------------------------------------------------------------------
@@ -174,7 +174,7 @@
return {None: 'Not applicable at instance level'}
elif kwargs.get('isGroup'):
- return {None: 'Not yet implemented for groups'}
+ return {None: 'Not applicable at group level'}
# -------------------------------------------------------------------------
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/gitlabcis-1.19.0/gitlabcis/benchmarks/deployment_5/deployment_environment_5_2.py
new/gitlabcis-1.19.1/gitlabcis/benchmarks/deployment_5/deployment_environment_5_2.py
---
old/gitlabcis-1.19.0/gitlabcis/benchmarks/deployment_5/deployment_environment_5_2.py
2026-03-18 03:18:30.000000000 +0100
+++
new/gitlabcis-1.19.1/gitlabcis/benchmarks/deployment_5/deployment_environment_5_2.py
2026-04-09 07:56:49.000000000 +0200
@@ -29,7 +29,7 @@
return {None: 'Not applicable at instance level'}
elif kwargs.get('isGroup'):
- return {None: 'Not yet implemented for groups'}
+ return {None: 'Not applicable at group level'}
except (GitlabHttpError, GitlabGetError, GitlabAuthenticationError) as e:
if e.response_code in [401, 403]:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/gitlabcis-1.19.0/gitlabcis/tests/unit/benchmarks/deployment_5/deployment_configuration_5_1_test.py
new/gitlabcis-1.19.1/gitlabcis/tests/unit/benchmarks/deployment_5/deployment_configuration_5_1_test.py
---
old/gitlabcis-1.19.0/gitlabcis/tests/unit/benchmarks/deployment_5/deployment_configuration_5_1_test.py
2026-03-18 03:18:30.000000000 +0100
+++
new/gitlabcis-1.19.1/gitlabcis/tests/unit/benchmarks/deployment_5/deployment_configuration_5_1_test.py
2026-04-09 07:56:49.000000000 +0200
@@ -106,10 +106,7 @@
kwargs = {'isInstance': True}
settings = Mock()
for bool in [True, False]:
- settings.get.return_value = \
- {'pre_receive_secret_detection_enabled': bool}
- settings.get.side_effect = lambda key: \
- bool if key == 'pre_receive_secret_detection_enabled' else None
+ settings.pre_receive_secret_detection_enabled = bool
glObject.settings.get.return_value = settings
run(glEntity, glObject, test, bool, **kwargs)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/gitlabcis-1.19.0/gitlabcis/utils/members.py
new/gitlabcis-1.19.1/gitlabcis/utils/members.py
--- old/gitlabcis-1.19.0/gitlabcis/utils/members.py 1970-01-01
01:00:00.000000000 +0100
+++ new/gitlabcis-1.19.1/gitlabcis/utils/members.py 2026-04-09
07:56:49.000000000 +0200
@@ -0,0 +1,35 @@
+# -------------------------------------------------------------------------
+
+
+def memberAccessPercentage(glEntity, min_access_level,
+ threshold_percentage, min_count):
+ '''
+ Returns a tuple of (count, percentage) of members whose access_level
+ is >= min_access_level.
+
+ Returns {None: reason} if members cannot be retrieved or none are found.
+ '''
+
+ from gitlab.exceptions import (GitlabAuthenticationError, GitlabGetError,
+ GitlabHttpError)
+
+ try:
+ members = glEntity.members.list(all=True)
+ total = len(members)
+
+ if total == 0:
+ return {None: 'No members found'}
+
+ count = 0
+ for member in members:
+ if member.access_level >= min_access_level:
+ count += 1
+
+ percentage = (count / total) * 100
+ exceeds = percentage >= threshold_percentage and count >= min_count
+
+ return (exceeds, count, percentage)
+
+ except (GitlabHttpError, GitlabGetError, GitlabAuthenticationError) as e:
+ if e.response_code in [401, 403]:
+ return {None: 'Insufficient permissions'}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/gitlabcis-1.19.0/gitlabcis.egg-info/PKG-INFO
new/gitlabcis-1.19.1/gitlabcis.egg-info/PKG-INFO
--- old/gitlabcis-1.19.0/gitlabcis.egg-info/PKG-INFO 2026-03-18
03:18:56.000000000 +0100
+++ new/gitlabcis-1.19.1/gitlabcis.egg-info/PKG-INFO 2026-04-09
07:57:15.000000000 +0200
@@ -1,6 +1,6 @@
Metadata-Version: 2.4
Name: gitlabcis
-Version: 1.19.0
+Version: 1.19.1
Summary: An automated tool that assesses the GitLab CIS benchmarks against a
project.
Author-email: Nate Rosandich <[email protected]>, Neil McDonald
<[email protected]>, Mitra JozeNazemian
<[email protected]>
License: MIT License
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/gitlabcis-1.19.0/gitlabcis.egg-info/SOURCES.txt
new/gitlabcis-1.19.1/gitlabcis.egg-info/SOURCES.txt
--- old/gitlabcis-1.19.0/gitlabcis.egg-info/SOURCES.txt 2026-03-18
03:18:56.000000000 +0100
+++ new/gitlabcis-1.19.1/gitlabcis.egg-info/SOURCES.txt 2026-04-09
07:57:15.000000000 +0200
@@ -247,4 +247,5 @@
gitlabcis/tests/unit/yaml/bad_file_test.py
gitlabcis/tests/unit/yaml/recommendation_test.py
gitlabcis/utils/__init__.py
-gitlabcis/utils/ci.py
\ No newline at end of file
+gitlabcis/utils/ci.py
+gitlabcis/utils/members.py
\ No newline at end of file
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/gitlabcis-1.19.0/pyproject.toml
new/gitlabcis-1.19.1/pyproject.toml
--- old/gitlabcis-1.19.0/pyproject.toml 2026-03-18 03:18:47.000000000 +0100
+++ new/gitlabcis-1.19.1/pyproject.toml 2026-04-09 07:57:05.000000000 +0200
@@ -12,7 +12,7 @@
[project]
name = "gitlabcis"
-version = "1.19.0"
+version = "1.19.1"
requires-python = ">=3.10"
description = "An automated tool that assesses the GitLab CIS benchmarks
against a project."
authors = [