diff options
author | Jose Alonso Cardenas Marquez <acm@FreeBSD.org> | 2021-01-06 09:01:33 +0000 |
---|---|---|
committer | Jose Alonso Cardenas Marquez <acm@FreeBSD.org> | 2021-01-06 09:01:33 +0000 |
commit | 9bcd917b66d65bc8c47252cc8a34640f4e932fba (patch) | |
tree | 01bd7aa187219ffca1dd245b0b05b7cad1d5e050 | |
parent | - Connect security/py-ospd-openvas (diff) |
- New port: securty/py-gvm-tools
The Greenbone Vulnerability Management Tools gvm-tools are a collection of
tools that help with remote controlling a Greenbone Security Manager (GSM)
appliance and its underlying Greenbone Vulnerability Manager (GVM). The tools
aid in accessing the communication protocols GMP (Greenbone Management
Protocol) and OSP (Open Scanner Protocol).
This module is comprised of interactive and non-interactive clients. The
programming language Python is supported directly for interactive scripting.
But it is also possible to issue remote GMP/OSP commands without programming
in Python.
WWW: https://github.com/greenbone/gvm-tools
Notes
Notes:
svn path=/head/; revision=560480
-rw-r--r-- | security/py-gvm-tools/Makefile | 21 | ||||
-rw-r--r-- | security/py-gvm-tools/distinfo | 3 | ||||
-rw-r--r-- | security/py-gvm-tools/files/patch-setup.py | 11 | ||||
-rw-r--r-- | security/py-gvm-tools/pkg-descr | 12 |
4 files changed, 47 insertions, 0 deletions
diff --git a/security/py-gvm-tools/Makefile b/security/py-gvm-tools/Makefile new file mode 100644 index 000000000000..3f32bdd6a475 --- /dev/null +++ b/security/py-gvm-tools/Makefile @@ -0,0 +1,21 @@ +# $FreeBSD$ + +PORTNAME= gvm-tools +DISTVERSION= 20.10.1 +CATEGORIES= security python +MASTER_SITES= CHEESESHOP +PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} + +MAINTAINER= acm@FreeBSD.org +COMMENT= The Greenbone Vulnerability Management Tools + +LICENSE= GPLv3+ + +RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}python-gvm>=0:security/py-python-gvm@${PY_FLAVOR} + +USES= python +USE_PYTHON= autoplist distutils + +NO_ARCH= yes + +.include <bsd.port.mk> diff --git a/security/py-gvm-tools/distinfo b/security/py-gvm-tools/distinfo new file mode 100644 index 000000000000..23b3fb92419d --- /dev/null +++ b/security/py-gvm-tools/distinfo @@ -0,0 +1,3 @@ +TIMESTAMP = 1609779351 +SHA256 (gvm-tools-20.10.1.tar.gz) = 790d44c11aa4b96d2f8e5dbbdf25783c1785e91cad5da86dec71ef0d0f2eae36 +SIZE (gvm-tools-20.10.1.tar.gz) = 74334 diff --git a/security/py-gvm-tools/files/patch-setup.py b/security/py-gvm-tools/files/patch-setup.py new file mode 100644 index 000000000000..d640498735a1 --- /dev/null +++ b/security/py-gvm-tools/files/patch-setup.py @@ -0,0 +1,11 @@ +--- setup.py.orig 2021-01-04 15:47:34.037289000 -0500 ++++ setup.py 2021-01-04 15:47:58.669103000 -0500 +@@ -2,7 +2,7 @@ + from setuptools import setup + + packages = \ +-['gvmtools', 'scripts', 'tests'] ++['gvmtools', 'scripts'] + + package_data = \ + {'': ['*']} diff --git a/security/py-gvm-tools/pkg-descr b/security/py-gvm-tools/pkg-descr new file mode 100644 index 000000000000..391144cde742 --- /dev/null +++ b/security/py-gvm-tools/pkg-descr @@ -0,0 +1,12 @@ +The Greenbone Vulnerability Management Tools gvm-tools are a collection of +tools that help with remote controlling a Greenbone Security Manager (GSM) +appliance and its underlying Greenbone Vulnerability Manager (GVM). The tools +aid in accessing the communication protocols GMP (Greenbone Management +Protocol) and OSP (Open Scanner Protocol). + +This module is comprised of interactive and non-interactive clients. The +programming language Python is supported directly for interactive scripting. +But it is also possible to issue remote GMP/OSP commands without programming +in Python. + +WWW: https://github.com/greenbone/gvm-tools |