Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package python-gitlabcis for 
openSUSE:Factory checked in at 2026-04-09 17:20:29
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-gitlabcis (Old)
 and      /work/SRC/openSUSE:Factory/.python-gitlabcis.new.21863 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-gitlabcis"

Thu Apr  9 17:20:29 2026 rev:11 rq:1345551 version:1.19.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/python-gitlabcis/python-gitlabcis.changes        
2026-03-18 16:52:45.122633358 +0100
+++ 
/work/SRC/openSUSE:Factory/.python-gitlabcis.new.21863/python-gitlabcis.changes 
    2026-04-09 17:20:41.277471433 +0200
@@ -1,0 +2,11 @@
+Thu Apr  9 11:52:17 UTC 2026 - Johannes Kastl 
<[email protected]>
+
+- update to 1.19.1:
+  * Documentation
+    - docs: Update deployment group support statements (#125 (closed))
+      (c236e5e)
+  * Fix
+    - fix: Object access in 5.1.3 secret_scan_deployment_config (#135
+      (closed)) (7941c95)
+
+-------------------------------------------------------------------

Old:
----
  gitlabcis-1.19.0.tar.gz

New:
----
  gitlabcis-1.19.1.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-gitlabcis.spec ++++++
--- /var/tmp/diff_new_pack.RNTRZG/_old  2026-04-09 17:20:42.257512023 +0200
+++ /var/tmp/diff_new_pack.RNTRZG/_new  2026-04-09 17:20:42.261512188 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           python-gitlabcis
-Version:        1.19.0
+Version:        1.19.1
 Release:        0
 Summary:        An automated tool that assesses the GitLab CIS benchmarks 
against a project
 License:        MIT

++++++ gitlabcis-1.19.0.tar.gz -> gitlabcis-1.19.1.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/gitlabcis-1.19.0/CHANGELOG.md 
new/gitlabcis-1.19.1/CHANGELOG.md
--- old/gitlabcis-1.19.0/CHANGELOG.md   2026-03-18 03:18:47.000000000 +0100
+++ new/gitlabcis-1.19.1/CHANGELOG.md   2026-04-09 07:57:05.000000000 +0200
@@ -1,5 +1,15 @@
 # CHANGELOG
 
+## v1.19.1 (2026-04-09)
+
+### Documentation
+
+* docs: Update deployment group support statements (#125) 
([`c236e5e`](https://gitlab.com/gitlab-security-oss/cis/gitlabcis/-/commit/c236e5e6e052863c9d35fc0af6df1771578e8aea))
+
+### Fix
+
+* fix: Object access in 5.1.3 secret_scan_deployment_config (#135) 
([`7941c95`](https://gitlab.com/gitlab-security-oss/cis/gitlabcis/-/commit/7941c95388bf80f9b3d5e0a9af0f7cfd60eba18f))
+
 ## v1.19.0 (2026-03-18)
 
 ### Feature
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/gitlabcis-1.19.0/PKG-INFO 
new/gitlabcis-1.19.1/PKG-INFO
--- old/gitlabcis-1.19.0/PKG-INFO       2026-03-18 03:18:56.378135200 +0100
+++ new/gitlabcis-1.19.1/PKG-INFO       2026-04-09 07:57:15.375491400 +0200
@@ -1,6 +1,6 @@
 Metadata-Version: 2.4
 Name: gitlabcis
-Version: 1.19.0
+Version: 1.19.1
 Summary: An automated tool that assesses the GitLab CIS benchmarks against a 
project.
 Author-email: Nate Rosandich <[email protected]>, Neil McDonald 
<[email protected]>, Mitra JozeNazemian 
<[email protected]>
 License: MIT License
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/gitlabcis-1.19.0/docs/limitations.md 
new/gitlabcis-1.19.1/docs/limitations.md
--- old/gitlabcis-1.19.0/docs/limitations.md    2026-03-18 03:18:30.000000000 
+0100
+++ new/gitlabcis-1.19.1/docs/limitations.md    2026-04-09 07:56:49.000000000 
+0200
@@ -88,14 +88,14 @@
 | 4.3.2 | all_artifact_versions_signed | `SKIP` for `Group` input types as 
commit signing status cannot be queried at the group level. |
 | 4.3.3 | audit_package_registry_config | `SKIP` by default as we cannot 
automate this |
 | 4.4.1 | artifact_origin_info | `SKIP` by default as we cannot automate this |
-| 5.1.1 | separate_deployment_config | `PASS` if ci config yml file is 
available and not in the root directory of this project |
-| 5.1.2 | audit_deployment_config | `PASS` if ci config yml file is available 
and changes need at least one approval and license allow audit |
-| 5.1.3 | secret_scan_deployment_config | `PASS` if secret_detection is 
enabled |
-| 5.1.4 | limit_deployment_config_access | `SKIP` by default as we cannot 
automate this |
-| 5.1.5 | scan_iac | `PASS` if SAST_IAC is enabled |
-| 5.1.6 | verify_deployment_config | `SKIP` by default as we cannot automate 
this |
-| 5.1.7 | pin_deployment_config_manifests | `SKIP` by default as we cannot 
automate this |
-| 5.2.1 | automate_deployment | `FAIL` if ci config file is not available 
otherwise `SKIP` for manual review |
-| 5.2.2 | reproducible_deployment | `SKIP` by default as we cannot automate 
this |
-| 5.2.3 | limit_prod_access | `SKIP` by default as we cannot automate this |
-| 5.2.4 | disable_default_passwords | `SKIP` by default as we cannot automate 
this |
+| 5.1.1 | separate_deployment_config | `PASS` if ci config yml file is 
available and not in the root directory of this project. `SKIP` for `Group` 
input types as this is not applicable at the group level. |
+| 5.1.2 | audit_deployment_config | `PASS` if ci config yml file is available 
and changes need at least one approval and license allow audit. `SKIP` for 
`Group` input types as this is not applicable at the group level. |
+| 5.1.3 | secret_scan_deployment_config | `PASS` if secret_detection is 
enabled. `SKIP` for `Group` input types as this is not applicable at the group 
level. |
+| 5.1.4 | limit_deployment_config_access | `SKIP` by default as we cannot 
automate this. |
+| 5.1.5 | scan_iac | `PASS` if SAST_IAC is enabled. `SKIP` for `Group` input 
types as this is not applicable at the group level. |
+| 5.1.6 | verify_deployment_config | `SKIP` by default as we cannot automate 
this. |
+| 5.1.7 | pin_deployment_config_manifests | `SKIP` by default as we cannot 
automate this. |
+| 5.2.1 | automate_deployment | `FAIL` if ci config file is not available 
otherwise `SKIP` for manual review. |
+| 5.2.2 | reproducible_deployment | `SKIP` by default as we cannot automate 
this. |
+| 5.2.3 | limit_prod_access | `SKIP` by default as we cannot automate this. |
+| 5.2.4 | disable_default_passwords | `SKIP` by default as we cannot automate 
this. |
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/gitlabcis-1.19.0/gitlabcis/__init__.py 
new/gitlabcis-1.19.1/gitlabcis/__init__.py
--- old/gitlabcis-1.19.0/gitlabcis/__init__.py  2026-03-18 03:18:47.000000000 
+0100
+++ new/gitlabcis-1.19.1/gitlabcis/__init__.py  2026-04-09 07:57:05.000000000 
+0200
@@ -9,4 +9,4 @@
 # -------------------------------------------------------------------------
 
 __author__ = '[email protected]'
-__version__ = '1.19.0'  # noqa: E999
+__version__ = '1.19.1'  # noqa: E999
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/gitlabcis-1.19.0/gitlabcis/benchmarks/artifacts_4/access_to_artifacts_4_2.py
 
new/gitlabcis-1.19.1/gitlabcis/benchmarks/artifacts_4/access_to_artifacts_4_2.py
--- 
old/gitlabcis-1.19.0/gitlabcis/benchmarks/artifacts_4/access_to_artifacts_4_2.py
    2026-03-18 03:18:30.000000000 +0100
+++ 
new/gitlabcis-1.19.1/gitlabcis/benchmarks/artifacts_4/access_to_artifacts_4_2.py
    2026-04-09 07:56:49.000000000 +0200
@@ -21,36 +21,26 @@
            artifacts is minimized
     """
 
-    from gitlab.exceptions import (GitlabAuthenticationError, GitlabGetError,
-                                   GitlabHttpError)
+    from gitlabcis.utils import members
 
     if kwargs.get('isProject') or kwargs.get('isGroup'):
-        try:
-            members = glEntity.members.list(all=True)
-            maintainer_and_above = sum(
-                1 for member in members if
-                member.access_level >= 40)
-            total_members = len(members)
-
-            if maintainer_and_above and total_members == 0 \
-                    or total_members == 0:
-                return {None: 'No members found'}
-
-            maintainer_and_above_percentage = (
-                (maintainer_and_above / total_members) * 100
-            )
-            if maintainer_and_above_percentage < 20 \
-                    or maintainer_and_above < 3:
-                return {True: 'Number of permitted users who can upload new '
-                        ' artifacts are limited'}
-            else:
-                return {False: 'Number of permitted users who can upload new '
-                        ' artifacts are not limited'}
-
-        except (GitlabHttpError, GitlabGetError,
-                GitlabAuthenticationError) as e:
-            if e.response_code in [401, 403]:
-                return {None: 'Insufficient permissions'}
+        result = members.memberAccessPercentage(
+            glEntity=glEntity,
+            min_access_level=40,
+            threshold_percentage=20,
+            min_count=3
+        )
+
+        if not isinstance(result, tuple):
+            return result
+
+        exceeds, count, percentage = result
+
+        if not exceeds:
+            return {True: 'Number of permitted users who can upload new '
+                    ' artifacts are limited'}
+        return {False: 'Number of permitted users who can upload new '
+                ' artifacts are not limited'}
 
     elif kwargs.get('isInstance'):
         return {None: 'Not applicable at instance level'}
@@ -129,35 +119,27 @@
            package registry
     """
 
-    from gitlab.exceptions import (GitlabAuthenticationError, GitlabGetError,
-                                   GitlabHttpError)
+    from gitlabcis.utils import members
 
     if kwargs.get('isProject') or kwargs.get('isGroup'):
-        try:
-            members = glEntity.members.list(all=True)
-            reporter_and_above = sum(
-                1 for member in members if
-                member.access_level >= 20)
-            total_members = len(members)
-
-            if reporter_and_above and total_members == 0 \
-                    or total_members == 0:
-                return {None: 'No members found'}
-
-            reporter_and_above_percentage = (
-                (reporter_and_above / total_members) * 100
-            )
-            if reporter_and_above_percentage < 40 or reporter_and_above < 3:
-                return {True: 'Build access is limited, less than 40% '
-                        'of the members have Reporter/Developer role or above'}
-            else:
-                return {False: 'Build access is not limited, over 40% '
-                        'of the members have Reporter/Developer role or above'}
-
-        except (GitlabHttpError, GitlabGetError,
-                GitlabAuthenticationError) as e:
-            if e.response_code in [401, 403]:
-                return {None: 'Insufficient permissions'}
+
+        result = members.memberAccessPercentage(
+            glEntity=glEntity,
+            min_access_level=20,
+            threshold_percentage=40,
+            min_count=3
+        )
+
+        if not isinstance(result, tuple):
+            return result
+
+        exceeds, count, percentage = result
+
+        if not exceeds:
+            return {True: 'Build access is limited, less than 40% '
+                    'of the members have Reporter/Developer role or above'}
+        return {False: 'Build access is not limited, over 40% '
+                'of the members have Reporter/Developer role or above'}
 
     elif kwargs.get('isInstance'):
         return {None: 'Not applicable at instance level'}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/gitlabcis-1.19.0/gitlabcis/benchmarks/build_pipelines_2/build_environment_2_1.py
 
new/gitlabcis-1.19.1/gitlabcis/benchmarks/build_pipelines_2/build_environment_2_1.py
--- 
old/gitlabcis-1.19.0/gitlabcis/benchmarks/build_pipelines_2/build_environment_2_1.py
        2026-03-18 03:18:30.000000000 +0100
+++ 
new/gitlabcis-1.19.1/gitlabcis/benchmarks/build_pipelines_2/build_environment_2_1.py
        2026-04-09 07:56:49.000000000 +0200
@@ -117,35 +117,26 @@
     id: 2.1.5
     title: Ensure access to build environments is limited
     """
-    from gitlab.exceptions import (GitlabAuthenticationError, GitlabGetError,
-                                   GitlabHttpError)
+    from gitlabcis.utils import members
 
     if kwargs.get('isProject') or kwargs.get('isGroup'):
-        try:
-            members = glEntity.members.list(all=True)
-            reporter_and_above = sum(
-                1 for member in members if
-                member.access_level >= 20)
-            total_members = len(members)
-
-            if reporter_and_above and total_members == 0 \
-                    or total_members == 0:
-                return {None: 'No members found'}
-
-            reporter_and_above_percentage = (
-                (reporter_and_above / total_members) * 100
-            )
-            if reporter_and_above_percentage < 40 or reporter_and_above < 3:
-                return {True: 'Build access is limited, less than 40% '
-                        'of the members have Reporter/Developer role or above'}
-            else:
-                return {False: 'Build access is not limited, over 40% '
-                        'of the members have Reporter/Developer role or above'}
-
-        except (GitlabHttpError, GitlabGetError,
-                GitlabAuthenticationError) as e:
-            if e.response_code in [401, 403]:
-                return {None: 'Insufficient permissions'}
+        result = members.memberAccessPercentage(
+            glEntity=glEntity,
+            min_access_level=20,
+            threshold_percentage=40,
+            min_count=3
+        )
+
+        if not isinstance(result, tuple):
+            return result
+
+        exceeds, count, percentage = result
+
+        if not exceeds:
+            return {True: 'Build access is limited, less than 40% '
+                    'of the members have Reporter/Developer role or above'}
+        return {False: 'Build access is not limited, over 40% '
+                'of the members have Reporter/Developer role or above'}
 
     elif kwargs.get('isInstance'):
         return {None: 'Not applicable at instance level'}
@@ -159,35 +150,26 @@
     title: Ensure users must authenticate to access the build
            environment
     """
-    from gitlab.exceptions import (GitlabAuthenticationError, GitlabGetError,
-                                   GitlabHttpError)
+    from gitlabcis.utils import members
 
     if kwargs.get('isProject') or kwargs.get('isGroup'):
-        try:
-            members = glEntity.members.list(all=True)
-            reporter_and_above = sum(
-                1 for member in members if
-                member.access_level >= 20)
-            total_members = len(members)
-
-            if reporter_and_above and total_members == 0 \
-                    or total_members == 0:
-                return {None: 'No members found'}
-
-            reporter_and_above_percentage = (
-                (reporter_and_above / total_members) * 100
-            )
-            if reporter_and_above_percentage < 40 or reporter_and_above < 3:
-                return {True: 'Build access is limited, less than 40% '
-                        'of the members have Reporter/Developer role or above'}
-            else:
-                return {False: 'Build access is not limited, over 40% '
-                        'of the members have Reporter/Developer role or above'}
-
-        except (GitlabHttpError, GitlabGetError,
-                GitlabAuthenticationError) as e:
-            if e.response_code in [401, 403]:
-                return {None: 'Insufficient permissions'}
+        result = members.memberAccessPercentage(
+            glEntity=glEntity,
+            min_access_level=20,
+            threshold_percentage=40,
+            min_count=3
+        )
+
+        if not isinstance(result, tuple):
+            return result
+
+        exceeds, count, percentage = result
+
+        if not exceeds:
+            return {True: 'Build access is limited, less than 40% '
+                    'of the members have Reporter/Developer role or above'}
+        return {False: 'Build access is not limited, over 40% '
+                'of the members have Reporter/Developer role or above'}
 
     elif kwargs.get('isInstance'):
         return {None: 'Not applicable at instance level'}
@@ -276,36 +258,26 @@
     title: Ensure minimum number of administrators are set for the
            build environment
     """
-    from gitlab.exceptions import (GitlabAuthenticationError, GitlabGetError,
-                                   GitlabHttpError)
+    from gitlabcis.utils import members
 
     if kwargs.get('isProject') or kwargs.get('isGroup'):
-        try:
-            members = glEntity.members.list(all=True)
-            maintainer_and_above = sum(
-                1 for member in members if
-                member.access_level >= 40)
-            total_members = len(members)
-
-            if maintainer_and_above and total_members == 0 \
-                    or total_members == 0:
-                return {None: 'No members found'}
-
-            maintainer_and_above_percentage = (
-                (maintainer_and_above / total_members) * 100
-            )
-            if maintainer_and_above_percentage < 20 \
-                    or maintainer_and_above < 3:
-                return {True: 'Build access is limited, less than 20% '
-                        'of the members have Owner/Maintainer role'}
-            else:
-                return {False: 'Build access is not limited, over than 20% of '
-                        'the members have Owner/Maintainer role'}
-
-        except (GitlabHttpError, GitlabGetError,
-                GitlabAuthenticationError) as e:
-            if e.response_code in [401, 403]:
-                return {None: 'Insufficient permissions'}
+        result = members.memberAccessPercentage(
+            glEntity=glEntity,
+            min_access_level=40,
+            threshold_percentage=20,
+            min_count=3
+        )
+
+        if not isinstance(result, tuple):
+            return result
+
+        exceeds, count, percentage = result
+
+        if not exceeds:
+            return {True: 'Build access is limited, less than 20% '
+                    'of the members have Owner/Maintainer role'}
+        return {False: 'Build access is not limited, over than 20% of '
+                'the members have Owner/Maintainer role'}
 
     elif kwargs.get('isInstance'):
         return {None: 'Not applicable at instance level'}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/gitlabcis-1.19.0/gitlabcis/benchmarks/deployment_5/deployment_configuration_5_1.py
 
new/gitlabcis-1.19.1/gitlabcis/benchmarks/deployment_5/deployment_configuration_5_1.py
--- 
old/gitlabcis-1.19.0/gitlabcis/benchmarks/deployment_5/deployment_configuration_5_1.py
      2026-03-18 03:18:30.000000000 +0100
+++ 
new/gitlabcis-1.19.1/gitlabcis/benchmarks/deployment_5/deployment_configuration_5_1.py
      2026-04-09 07:56:49.000000000 +0200
@@ -45,7 +45,7 @@
         return {None: 'Not applicable at instance level'}
 
     elif kwargs.get('isGroup'):
-        return {None: 'Not yet implemented for groups'}
+        return {None: 'Not applicable at group level'}
 
 # -------------------------------------------------------------------------
 
@@ -95,7 +95,7 @@
         return {None: 'Not applicable at instance level'}
 
     elif kwargs.get('isGroup'):
-        return {None: 'Not yet implemented for groups'}
+        return {None: 'Not applicable at group level'}
 
 # -------------------------------------------------------------------------
 
@@ -126,13 +126,13 @@
 
         settings = glObject.settings.get()
 
-        if settings.get('pre_receive_secret_detection_enabled') is True:
+        if settings.pre_receive_secret_detection_enabled is True:
             return {True: 'Secret Detection is enabled globally'}
         else:
             return {False: 'Secret Detection is not enabled globally'}
 
     elif kwargs.get('isGroup'):
-        return {None: 'Not yet implemented for groups'}
+        return {None: 'Not applicable at group level'}
 
 # -------------------------------------------------------------------------
 
@@ -174,7 +174,7 @@
         return {None: 'Not applicable at instance level'}
 
     elif kwargs.get('isGroup'):
-        return {None: 'Not yet implemented for groups'}
+        return {None: 'Not applicable at group level'}
 
 # -------------------------------------------------------------------------
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/gitlabcis-1.19.0/gitlabcis/benchmarks/deployment_5/deployment_environment_5_2.py
 
new/gitlabcis-1.19.1/gitlabcis/benchmarks/deployment_5/deployment_environment_5_2.py
--- 
old/gitlabcis-1.19.0/gitlabcis/benchmarks/deployment_5/deployment_environment_5_2.py
        2026-03-18 03:18:30.000000000 +0100
+++ 
new/gitlabcis-1.19.1/gitlabcis/benchmarks/deployment_5/deployment_environment_5_2.py
        2026-04-09 07:56:49.000000000 +0200
@@ -29,7 +29,7 @@
             return {None: 'Not applicable at instance level'}
 
         elif kwargs.get('isGroup'):
-            return {None: 'Not yet implemented for groups'}
+            return {None: 'Not applicable at group level'}
 
     except (GitlabHttpError, GitlabGetError, GitlabAuthenticationError) as e:
         if e.response_code in [401, 403]:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/gitlabcis-1.19.0/gitlabcis/tests/unit/benchmarks/deployment_5/deployment_configuration_5_1_test.py
 
new/gitlabcis-1.19.1/gitlabcis/tests/unit/benchmarks/deployment_5/deployment_configuration_5_1_test.py
--- 
old/gitlabcis-1.19.0/gitlabcis/tests/unit/benchmarks/deployment_5/deployment_configuration_5_1_test.py
      2026-03-18 03:18:30.000000000 +0100
+++ 
new/gitlabcis-1.19.1/gitlabcis/tests/unit/benchmarks/deployment_5/deployment_configuration_5_1_test.py
      2026-04-09 07:56:49.000000000 +0200
@@ -106,10 +106,7 @@
     kwargs = {'isInstance': True}
     settings = Mock()
     for bool in [True, False]:
-        settings.get.return_value = \
-            {'pre_receive_secret_detection_enabled': bool}
-        settings.get.side_effect = lambda key: \
-            bool if key == 'pre_receive_secret_detection_enabled' else None
+        settings.pre_receive_secret_detection_enabled = bool
         glObject.settings.get.return_value = settings
         run(glEntity, glObject, test, bool, **kwargs)
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/gitlabcis-1.19.0/gitlabcis/utils/members.py 
new/gitlabcis-1.19.1/gitlabcis/utils/members.py
--- old/gitlabcis-1.19.0/gitlabcis/utils/members.py     1970-01-01 
01:00:00.000000000 +0100
+++ new/gitlabcis-1.19.1/gitlabcis/utils/members.py     2026-04-09 
07:56:49.000000000 +0200
@@ -0,0 +1,35 @@
+# -------------------------------------------------------------------------
+
+
+def memberAccessPercentage(glEntity, min_access_level,
+                           threshold_percentage, min_count):
+    '''
+    Returns a tuple of (count, percentage) of members whose access_level
+    is >= min_access_level.
+
+    Returns {None: reason} if members cannot be retrieved or none are found.
+    '''
+
+    from gitlab.exceptions import (GitlabAuthenticationError, GitlabGetError,
+                                   GitlabHttpError)
+
+    try:
+        members = glEntity.members.list(all=True)
+        total = len(members)
+
+        if total == 0:
+            return {None: 'No members found'}
+
+        count = 0
+        for member in members:
+            if member.access_level >= min_access_level:
+                count += 1
+
+        percentage = (count / total) * 100
+        exceeds = percentage >= threshold_percentage and count >= min_count
+
+        return (exceeds, count, percentage)
+
+    except (GitlabHttpError, GitlabGetError, GitlabAuthenticationError) as e:
+        if e.response_code in [401, 403]:
+            return {None: 'Insufficient permissions'}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/gitlabcis-1.19.0/gitlabcis.egg-info/PKG-INFO 
new/gitlabcis-1.19.1/gitlabcis.egg-info/PKG-INFO
--- old/gitlabcis-1.19.0/gitlabcis.egg-info/PKG-INFO    2026-03-18 
03:18:56.000000000 +0100
+++ new/gitlabcis-1.19.1/gitlabcis.egg-info/PKG-INFO    2026-04-09 
07:57:15.000000000 +0200
@@ -1,6 +1,6 @@
 Metadata-Version: 2.4
 Name: gitlabcis
-Version: 1.19.0
+Version: 1.19.1
 Summary: An automated tool that assesses the GitLab CIS benchmarks against a 
project.
 Author-email: Nate Rosandich <[email protected]>, Neil McDonald 
<[email protected]>, Mitra JozeNazemian 
<[email protected]>
 License: MIT License
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/gitlabcis-1.19.0/gitlabcis.egg-info/SOURCES.txt 
new/gitlabcis-1.19.1/gitlabcis.egg-info/SOURCES.txt
--- old/gitlabcis-1.19.0/gitlabcis.egg-info/SOURCES.txt 2026-03-18 
03:18:56.000000000 +0100
+++ new/gitlabcis-1.19.1/gitlabcis.egg-info/SOURCES.txt 2026-04-09 
07:57:15.000000000 +0200
@@ -247,4 +247,5 @@
 gitlabcis/tests/unit/yaml/bad_file_test.py
 gitlabcis/tests/unit/yaml/recommendation_test.py
 gitlabcis/utils/__init__.py
-gitlabcis/utils/ci.py
\ No newline at end of file
+gitlabcis/utils/ci.py
+gitlabcis/utils/members.py
\ No newline at end of file
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/gitlabcis-1.19.0/pyproject.toml 
new/gitlabcis-1.19.1/pyproject.toml
--- old/gitlabcis-1.19.0/pyproject.toml 2026-03-18 03:18:47.000000000 +0100
+++ new/gitlabcis-1.19.1/pyproject.toml 2026-04-09 07:57:05.000000000 +0200
@@ -12,7 +12,7 @@
 
 [project]
 name = "gitlabcis"
-version = "1.19.0"
+version = "1.19.1"
 requires-python = ">=3.10"
 description = "An automated tool that assesses the GitLab CIS benchmarks 
against a project."
 authors = [

Reply via email to