Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 6 Jan 2021 09:01:33 +0000 (UTC)
From:      Jose Alonso Cardenas Marquez <acm@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r560480 - in head/security/py-gvm-tools: . files
Message-ID:  <202101060901.10691XwD084093@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: acm
Date: Wed Jan  6 09:01:33 2021
New Revision: 560480
URL: https://svnweb.freebsd.org/changeset/ports/560480

Log:
  - New port: securty/py-gvm-tools
  
  The Greenbone Vulnerability Management Tools gvm-tools are a collection of
  tools that help with remote controlling a Greenbone Security Manager (GSM)
  appliance and its underlying Greenbone Vulnerability Manager (GVM). The tools
  aid in accessing the communication protocols GMP (Greenbone Management
  Protocol) and OSP (Open Scanner Protocol).
  
  This module is comprised of interactive and non-interactive clients. The
  programming language Python is supported directly for interactive scripting.
  But it is also possible to issue remote GMP/OSP commands without programming
  in Python.
  
  WWW: https://github.com/greenbone/gvm-tools

Added:
  head/security/py-gvm-tools/
  head/security/py-gvm-tools/Makefile   (contents, props changed)
  head/security/py-gvm-tools/distinfo   (contents, props changed)
  head/security/py-gvm-tools/files/
  head/security/py-gvm-tools/files/patch-setup.py   (contents, props changed)
  head/security/py-gvm-tools/pkg-descr   (contents, props changed)

Added: head/security/py-gvm-tools/Makefile
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/py-gvm-tools/Makefile	Wed Jan  6 09:01:33 2021	(r560480)
@@ -0,0 +1,21 @@
+# $FreeBSD$
+
+PORTNAME=	gvm-tools
+DISTVERSION=	20.10.1
+CATEGORIES=	security python
+MASTER_SITES=   CHEESESHOP
+PKGNAMEPREFIX=	${PYTHON_PKGNAMEPREFIX}
+
+MAINTAINER=	acm@FreeBSD.org
+COMMENT=	The Greenbone Vulnerability Management Tools
+
+LICENSE=	GPLv3+
+
+RUN_DEPENDS=	${PYTHON_PKGNAMEPREFIX}python-gvm>=0:security/py-python-gvm@${PY_FLAVOR}
+
+USES=		python
+USE_PYTHON=	autoplist distutils
+
+NO_ARCH=	yes
+
+.include <bsd.port.mk>

Added: head/security/py-gvm-tools/distinfo
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/py-gvm-tools/distinfo	Wed Jan  6 09:01:33 2021	(r560480)
@@ -0,0 +1,3 @@
+TIMESTAMP = 1609779351
+SHA256 (gvm-tools-20.10.1.tar.gz) = 790d44c11aa4b96d2f8e5dbbdf25783c1785e91cad5da86dec71ef0d0f2eae36
+SIZE (gvm-tools-20.10.1.tar.gz) = 74334

Added: head/security/py-gvm-tools/files/patch-setup.py
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/py-gvm-tools/files/patch-setup.py	Wed Jan  6 09:01:33 2021	(r560480)
@@ -0,0 +1,11 @@
+--- setup.py.orig	2021-01-04 15:47:34.037289000 -0500
++++ setup.py	2021-01-04 15:47:58.669103000 -0500
+@@ -2,7 +2,7 @@
+ from setuptools import setup
+ 
+ packages = \
+-['gvmtools', 'scripts', 'tests']
++['gvmtools', 'scripts']
+ 
+ package_data = \
+ {'': ['*']}

Added: head/security/py-gvm-tools/pkg-descr
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/py-gvm-tools/pkg-descr	Wed Jan  6 09:01:33 2021	(r560480)
@@ -0,0 +1,12 @@
+The Greenbone Vulnerability Management Tools gvm-tools are a collection of 
+tools that help with remote controlling a Greenbone Security Manager (GSM) 
+appliance and its underlying Greenbone Vulnerability Manager (GVM). The tools 
+aid in accessing the communication protocols GMP (Greenbone Management 
+Protocol) and OSP (Open Scanner Protocol).
+
+This module is comprised of interactive and non-interactive clients. The 
+programming language Python is supported directly for interactive scripting. 
+But it is also possible to issue remote GMP/OSP commands without programming 
+in Python.
+
+WWW: https://github.com/greenbone/gvm-tools



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202101060901.10691XwD084093>