Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New package OWASP.ThreatDragon 2.2.0 #184453

Merged

Conversation

assarbad
Copy link
Contributor

@assarbad assarbad commented Oct 19, 2024

Checklist for Pull Requests

Manifests

  • Have you checked that there aren't other open pull requests for the same manifest update/change?
  • This PR only modifies one (1) manifest
  • Have you validated your manifest locally with winget validate --manifest <path>?
  • Have you tested your manifest locally with winget install --manifest <path>?
  • Does your manifest conform to the 1.6 schema?

Note: <path> is the directory's name containing the manifest you're submitting.


This is in preparation for winget-releaser automation on the project, see OWASP/threat-dragon#848.

Microsoft Reviewers: Open in CodeFlow

- This version was released at the beginning of the year
- The manifest was created with Komac
- The idea here is to establish a baseline manifest that can then be
  updated with winget-releaser or directly using Komac

# ------------------------ >8 ------------------------
# Do not modify or remove the line above.
# Everything below it will be ignored.
#
# On branch adding-threatdragon
# Changes to be committed:
#	new file:   ThreatDragon/2.2.0/OWASP.ThreatDragon.installer.yaml
#	new file:   ThreatDragon/2.2.0/OWASP.ThreatDragon.locale.en-US.yaml
#	new file:   ThreatDragon/2.2.0/OWASP.ThreatDragon.yaml
#
diff --git a/manifests/o/OWASP/ThreatDragon/2.2.0/OWASP.ThreatDragon.installer.yaml b/manifests/o/OWASP/ThreatDragon/2.2.0/OWASP.ThreatDragon.installer.yaml
new file mode 100644
index 00000000000..6cc80543eb3
--- /dev/null
+++ b/manifests/o/OWASP/ThreatDragon/2.2.0/OWASP.ThreatDragon.installer.yaml
@@ -0,0 +1,17 @@
+# Created with komac v2.6.0
+# yaml-language-server: $schema=https://aka.ms/winget-manifest.installer.1.6.0.schema.json
+
+PackageIdentifier: OWASP.ThreatDragon
+PackageVersion: 2.2.0
+InstallerType: nullsoft
+InstallModes:
+- interactive
+- silent
+UpgradeBehavior: install
+ReleaseDate: 2024-02-17
+Installers:
+- Architecture: x86
+  InstallerUrl: https://github.com/OWASP/threat-dragon/releases/download/v2.2.0/Threat-Dragon-ng-Setup-2.2.0.exe
+  InstallerSha256: D5295584C6EDBBFA8515218C173E9125ADD690D5DEDE37702FC0B7D7FDD5E93A
+ManifestType: installer
+ManifestVersion: 1.6.0
diff --git a/manifests/o/OWASP/ThreatDragon/2.2.0/OWASP.ThreatDragon.locale.en-US.yaml b/manifests/o/OWASP/ThreatDragon/2.2.0/OWASP.ThreatDragon.locale.en-US.yaml
new file mode 100644
index 00000000000..5b5bb573f9f
--- /dev/null
+++ b/manifests/o/OWASP/ThreatDragon/2.2.0/OWASP.ThreatDragon.locale.en-US.yaml
@@ -0,0 +1,30 @@
+# Created with komac v2.6.0
+# yaml-language-server: $schema=https://aka.ms/winget-manifest.defaultLocale.1.6.0.schema.json
+
+PackageIdentifier: OWASP.ThreatDragon
+PackageVersion: 2.2.0
+PackageLocale: en-US
+Publisher: OWASP
+PublisherUrl: https://owasp.org/
+PublisherSupportUrl: https://github.com/OWASP/threat-dragon/issues/new/choose
+Author: OWASP contributors
+PackageName: Threat-Dragon-ng
+PackageUrl: https://github.com/OWASP/threat-dragon/releases
+License: Apache-2.0
+LicenseUrl: https://github.com/OWASP/threat-dragon/blob/main/license.txt
+Copyright: Copyright © 2015 - 2024 OWASP
+CopyrightUrl: https://github.com/OWASP/threat-dragon
+ShortDescription: Threat Dagon is an open source threat modeling tool and is an official OWASP project. It is used to draw threat modeling diagrams and to list threats for elements in the diagram
+Description: |
+    OWASP Threat Dragon is a free, open-source, cross-platform threat modeling application. It is used to draw threat modeling diagrams and to list threats for elements in the diagram along with their remediations.
+    Threat Dragon is designed to be accessible for various types of teams, with an emphasis on flexibility and simplicity. It is an OWASP Lab Project and follows the values and principles of the threat modeling manifesto
+Moniker: threatdragon
+Tags:
+- owasp
+- owasp-threat-dragon
+- sdlc
+- threat-dragon
+- threat-modeling
+ReleaseNotesUrl: https://github.com/OWASP/threat-dragon/releases/tag/v2.2.0
+ManifestType: defaultLocale
+ManifestVersion: 1.6.0
diff --git a/manifests/o/OWASP/ThreatDragon/2.2.0/OWASP.ThreatDragon.yaml b/manifests/o/OWASP/ThreatDragon/2.2.0/OWASP.ThreatDragon.yaml
new file mode 100644
index 00000000000..a34a372dc80
--- /dev/null
+++ b/manifests/o/OWASP/ThreatDragon/2.2.0/OWASP.ThreatDragon.yaml
@@ -0,0 +1,8 @@
+# Created with komac v2.6.0
+# yaml-language-server: $schema=https://aka.ms/winget-manifest.version.1.6.0.schema.json
+
+PackageIdentifier: OWASP.ThreatDragon
+PackageVersion: 2.2.0
+DefaultLocale: en-US
+ManifestType: version
+ManifestVersion: 1.6.0
@wingetbot
Copy link
Collaborator

Service Badge  Service Badge  

@wingetbot
Copy link
Collaborator

/AzurePipelines run

assarbad added a commit to assarbad/threat-dragon that referenced this pull request Oct 19, 2024
- This is meant to automate releases to winget-pkgs
- Resolves OWASP#848 and should work as soon as microsoft/winget-pkgs#184453
  has been merged (baseline manifest for the 2.2.0 version)
- DO NOT MERGE BEFORE PREREQUISITES ARE IN PLACE (see below)

## Instructions for prerequisites
The `WINGET_TOKEN` needs to be created and registered in the repo _which
does the release_. For good measure we need to clone `winget-pkgs` on the
same user (or org) or set via `fork-user` it as per the README for
[winget-releaser](https://github.com/vedantmgoyal9/winget-releaser).

Configure the [Pull app](https://github.com/apps/pull) to keep the
`winget-pkgs` fork in sync with its upstream.

That `winget-pkgs` fork is going to be the _source_ of the PR filed at
`microsoft/winget-pkgs` and the PRs are being opened on behalf of the
owner of the used token.

1. Head to https://github.com/settings/tokens and create a new (classic)
   personal access token with _only_ the `public_repo` scope activated for
   it
2. In https://github.com/OWASP/threat-dragon/settings/secrets/actions
   create a secret named WINGET_TOKEN (as per vedantmgoyal9/winget-releaser)
3. Merge this PR
4. Create a (subsequent) release
@wingetbot
Copy link
Collaborator

/AzurePipelines run

@wingetbot wingetbot added New-Package Azure-Pipeline-Passed Validation pipeline passed. There may still be manual validation requirements. Policy-Test-2.8 labels Oct 20, 2024
@stephengillie
Copy link
Collaborator

The only way that I can see Policy 2.8 applying is through overzealous advertising.

@stephengillie stephengillie added Validation-Completed Validation passed and removed Policy-Test-2.8 labels Oct 22, 2024
@stephengillie
Copy link
Collaborator

Verify:
image
image

@microsoft-github-policy-service microsoft-github-policy-service bot added the Moderator-Approved One of the Moderators has reviewed and approved this PR label Oct 22, 2024
@microsoft-github-policy-service microsoft-github-policy-service bot merged commit 501695b into microsoft:master Oct 22, 2024
2 checks passed
@wingetbot
Copy link
Collaborator

Publish pipeline succeeded for this Pull Request. Once you refresh your index, this change should be present.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Azure-Pipeline-Passed Validation pipeline passed. There may still be manual validation requirements. Moderator-Approved One of the Moderators has reviewed and approved this PR New-Package Publish-Pipeline-Succeeded Validation-Completed Validation passed
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants