This gist is to help with the creating of jiras and is a work in progress but will do some of the work for you.
These scripts require you to have srcclr
and jq
installed.
jira_format is the command line call that needs to be made.
Values in the script that need to be filled are:
PACKAGE_NAME: Package where the issues are.
VERSION: the version of the packaged wanting to be checked.
PATH/TO/FILE: this is the path to the format.py
that is included in this gist
Running the script the output will be broken down by reported issue and look like the example below.
Do be aware that all issue for a package is reported when using srcclr lookup
.
There may be some issue that you are not looking for formated data on.
h4. Cross-site Scripting (XSS)
CVE: 2019-3826
Score: 4.3
Summary: github.com/prometheus/prometheus is vulnerable to cross-site scripting (XSS) attacks. The vulnerability exists as the highlighter function was not sanitized and could be used for XSS attacks.
Upgrade To: 2.7.1
Known Exploits: False