From owner-svn-ports-head@freebsd.org Wed Jan 6 08:57:32 2021 Return-Path: Delivered-To: svn-ports-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B20784C92D3; Wed, 6 Jan 2021 08:57:32 +0000 (UTC) (envelope-from acm@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4D9jtN4cNNz3D35; Wed, 6 Jan 2021 08:57:32 +0000 (UTC) (envelope-from acm@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 909B81BE22; Wed, 6 Jan 2021 08:57:32 +0000 (UTC) (envelope-from acm@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 1068vWOn081887; Wed, 6 Jan 2021 08:57:32 GMT (envelope-from acm@FreeBSD.org) Received: (from acm@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 1068vVvA081881; Wed, 6 Jan 2021 08:57:31 GMT (envelope-from acm@FreeBSD.org) Message-Id: <202101060857.1068vVvA081881@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: acm set sender to acm@FreeBSD.org using -f From: Jose Alonso Cardenas Marquez Date: Wed, 6 Jan 2021 08:57:31 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r560478 - in head/security/py-ospd-openvas: . files X-SVN-Group: ports-head X-SVN-Commit-Author: acm X-SVN-Commit-Paths: in head/security/py-ospd-openvas: . files X-SVN-Commit-Revision: 560478 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 Jan 2021 08:57:32 -0000 Author: acm Date: Wed Jan 6 08:57:31 2021 New Revision: 560478 URL: https://svnweb.freebsd.org/changeset/ports/560478 Log: - New port: security/py-ospd-openvas This is an OSP server implementation to allow GVM to remotely control OpenVAS, see https://github.com/greenbone/openvas. Once running, you need to configure OpenVAS for the Greenbone Vulnerability Manager, for example via the web interface Greenbone Security Assistant. Then you can create scan tasks to use OpenVAS. WWW: https://github.com/greenbone/ospd-openva Added: head/security/py-ospd-openvas/ head/security/py-ospd-openvas/Makefile (contents, props changed) head/security/py-ospd-openvas/distinfo (contents, props changed) head/security/py-ospd-openvas/files/ head/security/py-ospd-openvas/files/ospd_openvas.in (contents, props changed) head/security/py-ospd-openvas/files/patch-setup.py (contents, props changed) head/security/py-ospd-openvas/pkg-descr (contents, props changed) head/security/py-ospd-openvas/pkg-plist (contents, props changed) Added: head/security/py-ospd-openvas/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-ospd-openvas/Makefile Wed Jan 6 08:57:31 2021 (r560478) @@ -0,0 +1,37 @@ +# $FreeBSD$ + +PORTNAME= ospd-openvas +DISTVERSION= 20.8.0 +CATEGORIES= security python +MASTER_SITES= CHEESESHOP +PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} + +MAINTAINER= acm@FreeBSD.org +COMMENT= Scanner wrapper for OSP (Open Scanner Protocol) + +LICENSE= GPLv2+ +LICENSE_FILE= ${WRKSRC}/COPYING + +RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}ospd>=0:security/py-ospd@${PY_FLAVOR} \ + ${PYTHON_PKGNAMEPREFIX}redis>=0:databases/py-redis@${PY_FLAVOR} \ + ${PYTHON_PKGNAMEPREFIX}psutil>=0:sysutils/py-psutil@${PY_FLAVOR} \ + ${PYTHON_PKGNAMEPREFIX}packaging>=0:devel/py-packaging@${PY_FLAVOR} \ + ${PYTHON_PKGNAMEPREFIX}defusedxml>=0:devel/py-defusedxml@${PY_FLAVOR} \ + openvas:security/openvas + +USES= python +USE_PYTHON= distutils + +NO_ARCH= yes + +USERS= gvm +GROUPS= ${USERS} + +USE_RC_SUBR= ${PORTNAME:S/-/_/} +SUB_LIST= PYTHON_CMD=${PYTHON_CMD} +SUB_FILES= pkg-message + +post-install: + @${MKDIR} ${STAGEDIR}/var/run/ospd + +.include Added: head/security/py-ospd-openvas/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-ospd-openvas/distinfo Wed Jan 6 08:57:31 2021 (r560478) @@ -0,0 +1,3 @@ +TIMESTAMP = 1609578115 +SHA256 (ospd-openvas-20.8.0.tar.gz) = 2d1566f09283d3ecce372f9b9ec2e830e59a53a6fcfb26149192355403e01861 +SIZE (ospd-openvas-20.8.0.tar.gz) = 78385 Added: head/security/py-ospd-openvas/files/ospd_openvas.in ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-ospd-openvas/files/ospd_openvas.in Wed Jan 6 08:57:31 2021 (r560478) @@ -0,0 +1,36 @@ +#!/bin/sh +# +# $FreeBSD$ +# +# PROVIDE: ospd_openvas +# REQUIRE: NETWORKING +# KEYWORD: shutdown +# +# Configuration settings for ospd_openvas in /etc/rc.conf: +# +# ospd_openvas_enable: run ospd_openvas service (default=NO) +# ospd_openvas_pidfile: path to ospd_openvas pid file +# ospd_openvas_config: path to ospd_openvas configuration file +# ospd_openvas_flags: additional flags for ospd_openvas server +# + +. /etc/rc.subr + +name=ospd_openvas +rcvar=ospd_openvas_enable + +load_rc_config ${name} + +: ${ospd_openvas_enable:=NO} +: ${ospd_openvas_pidfile="/var/run/ospd/ospd-openvas.pid"} +: ${ospd_openvas_config="/usr/local/etc/gvm/ospd.conf"} +: ${ospd_openvas_flags="--lock-file-dir /var/run/ospd --unix-socket /var/run/ospd/ospd.sock"} + +ospd_openvas_user="gvm" +pidfile=${ospd_openvas_pidfile} + +command=/usr/local/bin/ospd-openvas +command_interpreter="%%PYTHON_CMD%%" +command_args="--pid-file ${pidfile} --config ${ospd_openvas_config} --log-file /var/log/gvm/ospd-openvas.log ${ospd_openvas_flags}" + +run_rc_command "$1" Added: head/security/py-ospd-openvas/files/patch-setup.py ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-ospd-openvas/files/patch-setup.py Wed Jan 6 08:57:31 2021 (r560478) @@ -0,0 +1,18 @@ +--- setup.py.orig 2021-01-02 04:58:38.335383000 -0500 ++++ setup.py 2021-01-02 04:58:58.712756000 -0500 +@@ -2,13 +2,13 @@ + from setuptools import setup + + packages = \ +-['ospd_openvas', 'tests'] ++['ospd_openvas'] + + package_data = \ + {'': ['*']} + + modules = \ +-['ospd-openvas', 'ospd', 'CHANGELOG', 'COPYING', 'poetry', 'setup', 'MANIFEST'] ++['ospd-openvas', 'ospd'] + install_requires = \ + ['ospd>=20.8,<21.0', + 'packaging>=20.4,<21.0', Added: head/security/py-ospd-openvas/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-ospd-openvas/pkg-descr Wed Jan 6 08:57:31 2021 (r560478) @@ -0,0 +1,8 @@ +This is an OSP server implementation to allow GVM to remotely control OpenVAS, +see https://github.com/greenbone/openvas. + +Once running, you need to configure OpenVAS for the Greenbone Vulnerability +Manager, for example via the web interface Greenbone Security Assistant. Then +you can create scan tasks to use OpenVAS. + +WWW: https://github.com/greenbone/ospd-openvas Added: head/security/py-ospd-openvas/pkg-plist ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-ospd-openvas/pkg-plist Wed Jan 6 08:57:31 2021 (r560478) @@ -0,0 +1,32 @@ +bin/ospd-openvas +%%PYTHON_SITELIBDIR%%/ospd_openvas/__init__.py +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/__init__.cpython-37.opt-1.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/__init__.cpython-37.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/__version__.cpython-37.opt-1.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/__version__.cpython-37.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/daemon.cpython-37.opt-1.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/daemon.cpython-37.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/db.cpython-37.opt-1.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/db.cpython-37.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/errors.cpython-37.opt-1.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/errors.cpython-37.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/lock.cpython-37.opt-1.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/lock.cpython-37.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/nvticache.cpython-37.opt-1.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/nvticache.cpython-37.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/openvas.cpython-37.opt-1.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/openvas.cpython-37.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/preferencehandler.cpython-37.opt-1.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/preferencehandler.cpython-37.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/vthelper.cpython-37.opt-1.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__pycache__/vthelper.cpython-37.pyc +%%PYTHON_SITELIBDIR%%/ospd_openvas/__version__.py +%%PYTHON_SITELIBDIR%%/ospd_openvas/daemon.py +%%PYTHON_SITELIBDIR%%/ospd_openvas/db.py +%%PYTHON_SITELIBDIR%%/ospd_openvas/errors.py +%%PYTHON_SITELIBDIR%%/ospd_openvas/lock.py +%%PYTHON_SITELIBDIR%%/ospd_openvas/nvticache.py +%%PYTHON_SITELIBDIR%%/ospd_openvas/openvas.py +%%PYTHON_SITELIBDIR%%/ospd_openvas/preferencehandler.py +%%PYTHON_SITELIBDIR%%/ospd_openvas/vthelper.py +@dir(gvm,gvm,750) /var/run/ospd