summaryrefslogtreecommitdiff
path: root/security/py-gvm-tools
diff options
context:
space:
mode:
authorJose Alonso Cardenas Marquez <acm@FreeBSD.org>2021-01-06 09:01:33 +0000
committerJose Alonso Cardenas Marquez <acm@FreeBSD.org>2021-01-06 09:01:33 +0000
commit9bcd917b66d65bc8c47252cc8a34640f4e932fba (patch)
tree01bd7aa187219ffca1dd245b0b05b7cad1d5e050 /security/py-gvm-tools
parent- Connect security/py-ospd-openvas (diff)
- New port: securty/py-gvm-tools
The Greenbone Vulnerability Management Tools gvm-tools are a collection of tools that help with remote controlling a Greenbone Security Manager (GSM) appliance and its underlying Greenbone Vulnerability Manager (GVM). The tools aid in accessing the communication protocols GMP (Greenbone Management Protocol) and OSP (Open Scanner Protocol). This module is comprised of interactive and non-interactive clients. The programming language Python is supported directly for interactive scripting. But it is also possible to issue remote GMP/OSP commands without programming in Python. WWW: https://github.com/greenbone/gvm-tools
Notes
Notes: svn path=/head/; revision=560480
Diffstat (limited to 'security/py-gvm-tools')
-rw-r--r--security/py-gvm-tools/Makefile21
-rw-r--r--security/py-gvm-tools/distinfo3
-rw-r--r--security/py-gvm-tools/files/patch-setup.py11
-rw-r--r--security/py-gvm-tools/pkg-descr12
4 files changed, 47 insertions, 0 deletions
diff --git a/security/py-gvm-tools/Makefile b/security/py-gvm-tools/Makefile
new file mode 100644
index 000000000000..3f32bdd6a475
--- /dev/null
+++ b/security/py-gvm-tools/Makefile
@@ -0,0 +1,21 @@
+# $FreeBSD$
+
+PORTNAME= gvm-tools
+DISTVERSION= 20.10.1
+CATEGORIES= security python
+MASTER_SITES= CHEESESHOP
+PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
+
+MAINTAINER= acm@FreeBSD.org
+COMMENT= The Greenbone Vulnerability Management Tools
+
+LICENSE= GPLv3+
+
+RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}python-gvm>=0:security/py-python-gvm@${PY_FLAVOR}
+
+USES= python
+USE_PYTHON= autoplist distutils
+
+NO_ARCH= yes
+
+.include <bsd.port.mk>
diff --git a/security/py-gvm-tools/distinfo b/security/py-gvm-tools/distinfo
new file mode 100644
index 000000000000..23b3fb92419d
--- /dev/null
+++ b/security/py-gvm-tools/distinfo
@@ -0,0 +1,3 @@
+TIMESTAMP = 1609779351
+SHA256 (gvm-tools-20.10.1.tar.gz) = 790d44c11aa4b96d2f8e5dbbdf25783c1785e91cad5da86dec71ef0d0f2eae36
+SIZE (gvm-tools-20.10.1.tar.gz) = 74334
diff --git a/security/py-gvm-tools/files/patch-setup.py b/security/py-gvm-tools/files/patch-setup.py
new file mode 100644
index 000000000000..d640498735a1
--- /dev/null
+++ b/security/py-gvm-tools/files/patch-setup.py
@@ -0,0 +1,11 @@
+--- setup.py.orig 2021-01-04 15:47:34.037289000 -0500
++++ setup.py 2021-01-04 15:47:58.669103000 -0500
+@@ -2,7 +2,7 @@
+ from setuptools import setup
+
+ packages = \
+-['gvmtools', 'scripts', 'tests']
++['gvmtools', 'scripts']
+
+ package_data = \
+ {'': ['*']}
diff --git a/security/py-gvm-tools/pkg-descr b/security/py-gvm-tools/pkg-descr
new file mode 100644
index 000000000000..391144cde742
--- /dev/null
+++ b/security/py-gvm-tools/pkg-descr
@@ -0,0 +1,12 @@
+The Greenbone Vulnerability Management Tools gvm-tools are a collection of
+tools that help with remote controlling a Greenbone Security Manager (GSM)
+appliance and its underlying Greenbone Vulnerability Manager (GVM). The tools
+aid in accessing the communication protocols GMP (Greenbone Management
+Protocol) and OSP (Open Scanner Protocol).
+
+This module is comprised of interactive and non-interactive clients. The
+programming language Python is supported directly for interactive scripting.
+But it is also possible to issue remote GMP/OSP commands without programming
+in Python.
+
+WWW: https://github.com/greenbone/gvm-tools