public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
From: "Joonas Niilola" <juippis@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Subject: [gentoo-commits] repo/gentoo:master commit in: net-analyzer/gvm/
Date: Mon, 28 Oct 2019 04:05:34 +0000 (UTC)	[thread overview]
Message-ID: <1572235400.52c64f2720418a0a5724ac773524aaa7eaf6c73a.juippis@gentoo> (raw)

commit:     52c64f2720418a0a5724ac773524aaa7eaf6c73a
Author:     Hasan ÇALIŞIR <hasan.calisir <AT> psauxit <DOT> com>
AuthorDate: Mon Aug 12 20:45:22 2019 +0000
Commit:     Joonas Niilola <juippis <AT> gentoo <DOT> org>
CommitDate: Mon Oct 28 04:03:20 2019 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=52c64f27

net-analyzer/gvm: new package.

Project name of OpenVAS with version 10
has been renamed in Greenbone Vulnerability
Management (gvm).
This is loader package of 'gvm' components.
Version bump to 10.0.1. Also introduces
the new USE flags 'cron','postgres','sqlite'.

Package-Manager: Portage-2.3.69, Repoman-2.3.16
Signed-off-by: Hasan ÇALIŞIR <hasan.calisir <AT> psauxit.com>
Closes: https://bugs.gentoo.org/692004
Signed-off-by: Joonas Niilola <juippis <AT> gentoo.org>

 net-analyzer/gvm/gvm-10.0.1.ebuild | 35 +++++++++++++++++++++++++++++++++++
 net-analyzer/gvm/metadata.xml      | 27 +++++++++++++++++++++++++++
 2 files changed, 62 insertions(+)

diff --git a/net-analyzer/gvm/gvm-10.0.1.ebuild b/net-analyzer/gvm/gvm-10.0.1.ebuild
new file mode 100644
index 00000000000..a1811d22fb5
--- /dev/null
+++ b/net-analyzer/gvm/gvm-10.0.1.ebuild
@@ -0,0 +1,35 @@
+# Copyright 1999-2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit eutils
+
+DESCRIPTION="Greenbone Vulnerability Management,previously named OpenVAS"
+HOMEPAGE="https://www.greenbone.net/en/"
+
+SLOT="0"
+LICENSE="GPL-2"
+KEYWORDS="~amd64 ~x86"
+IUSE="cli +cron +extras +gsa ldap ospd postgres radius +sqlite"
+REQUIRED_USE="|| ( postgres sqlite )"
+
+RDEPEND="
+	>=net-analyzer/gvm-libs-10.0.1[extras?,ldap?,radius?]
+	>=net-analyzer/gvmd-8.0.1[extras?,postgres?,sqlite?]
+	~net-analyzer/openvas-scanner-6.0.1[cron?,extras?]
+	!net-analyzer/openvas
+	cli? ( >=net-analyzer/gvm-tools-1.4.1 )
+	gsa? ( ~net-analyzer/greenbone-security-assistant-8.0.1[extras?] )
+	ospd? ( >=net-analyzer/ospd-1.3.2[extras?] )"
+
+pkg_postinst() {
+	elog "Additional support for extra checks can be get from"
+	optfeature "Web server scanning and testing tool" net-analyzer/nikto
+	optfeature "Portscanner" net-analyzer/nmap
+	optfeature "IPsec VPN scanning, fingerprinting and testing tool" net-analyzer/ike-scan
+	optfeature "Application protocol detection tool" net-analyzer/amap
+	optfeature "ovaldi (OVAL) — an OVAL Interpreter" app-forensics/ovaldi
+	optfeature "Linux-kernel-based portscanner" net-analyzer/portbunny
+	optfeature "Web application attack and audit framework" net-analyzer/w3af
+}

diff --git a/net-analyzer/gvm/metadata.xml b/net-analyzer/gvm/metadata.xml
new file mode 100644
index 00000000000..8f3369bf5f0
--- /dev/null
+++ b/net-analyzer/gvm/metadata.xml
@@ -0,0 +1,27 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+	<maintainer type="person">
+		<email>hasan.calisir@psauxit.com</email>
+		<name>Hasan ÇALIŞIR</name>
+	</maintainer>
+	<maintainer type="project">
+		<email>proxy-maint@gentoo.org</email>
+		<name>Proxy Maintainers</name>
+	</maintainer>
+	<use>
+		<flag name="cli">Command Line Interface for OpenVAS Scanner</flag>
+		<flag name="cron">A cron job to update GVM's vulnerability feeds daily</flag>
+		<flag name="extras">Extra fonts, pdf-results! and html docs support</flag>
+		<flag name="gsa">Greenbone Security Assistant (WebUI)</flag>
+		<flag name="ospd">Enable support for scanner wrappers</flag>
+	</use>
+	<longdescription lang="en">
+	GVM previously named OpenVAS stands for Open Vulnerability Assessment System and is a network security scanner 
+	with associated tools like a graphical user front-end. 
+	The core component is a server with a set of network vulnerability tests (NVTs) to detect security problems in remote systems and applications.
+	</longdescription>
+	<upstream>
+		<remote-id type="github">greenbone</remote-id>
+	</upstream>
+</pkgmetadata>


             reply	other threads:[~2019-10-28  4:05 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-10-28  4:05 Joonas Niilola [this message]
  -- strict thread matches above, loose matches on Subject: below --
2019-12-21 15:06 [gentoo-commits] repo/gentoo:master commit in: net-analyzer/gvm/ Joonas Niilola
2020-03-03  6:03 Joonas Niilola
2020-03-25 13:46 Joonas Niilola
2021-03-22 13:36 Joonas Niilola
2021-03-22 13:36 Joonas Niilola
2022-01-08 10:32 Jakov Smolić
2022-05-09 12:26 Florian Schmaus
2022-05-09 12:26 Florian Schmaus
2022-06-22  7:05 Michał Górny
2023-11-14  7:53 Florian Schmaus
2024-02-28 20:50 Jakov Smolić
2024-07-28 17:40 Florian Schmaus

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1572235400.52c64f2720418a0a5724ac773524aaa7eaf6c73a.juippis@gentoo \
    --to=juippis@gentoo.org \
    --cc=gentoo-commits@lists.gentoo.org \
    --cc=gentoo-dev@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox