Excel data extraction plugin for Spyglass
Go to file
Drew Walters fcfbe59818 Update Airship vulnerability link
The Airship vulnerability documentation has moved [0]. This change
updates SECURITY.md to point to the correct location.

[0] https://docs.airshipit.org/learn/vulnerabilities.html

Change-Id: Iea843a3399bc7836f5645c3ca81603e2e9ca7356
Signed-off-by: Drew Walters <andrew.walters@att.com>
2020-05-18 21:28:50 +00:00
.github Update Airship vulnerability link 2020-05-18 21:28:50 +00:00
doc Docs update for Spyglass Excel Plugin 2019-12-20 11:39:10 -06:00
spyglass_plugin_xls Allow excel plugin to take csv files as an input 2019-12-16 17:17:49 +00:00
tests Allow excel plugin to take csv files as an input 2019-12-16 17:17:49 +00:00
tools/gate Add unit tests for xls plugin CLI 2019-06-17 11:06:31 -05:00
.gitignore Initial commit 2019-04-26 16:01:24 -05:00
.gitreview Add .gitreview and .zuul.yaml 2019-05-12 17:35:17 +02:00
.style.yapf Standardize spyglass-plugin-xls code with YAPF 2019-07-29 16:47:56 -05:00
.zuul.yaml Move safety checks to new Zuul job 2019-07-23 08:42:42 -05:00
LICENSE Initial commit 2019-04-26 16:01:24 -05:00
README.rst Docs update for Spyglass Excel Plugin 2019-12-20 11:39:10 -06:00
requirements.txt Implement intermediary validation 2019-08-29 08:47:37 -05:00
setup.cfg Standardize spyglass-plugin-xls code with YAPF 2019-07-29 16:47:56 -05:00
setup.py Implement PBR for XLS plugin 2019-06-11 16:14:32 -05:00
test-requirements.txt Upgrade yapf to 0.28 2019-08-15 13:12:35 -05:00
tox.ini Standardize spyglass-plugin-xls code with YAPF 2019-07-29 16:47:56 -05:00

README.rst

Spyglass Excel Plugin

The Spyglass Excel Plugin is used to generate airship-seaworthy site manifest files from an excel based engineering spec. The plugin is configured with an Excel sheet and its corresponding excel specification as inputs. Spyglass uses this plugin to construct an intermediary yaml which is processed further using J2 templates to generate site manifests.

Spyglass: https://opendev.org/airship/spyglass