Merge pull request #429 from linxon/net-misc/getsploit

net-misc/getsploit version bump
This commit is contained in:
Anton Bolshakov 2019-03-26 16:36:25 +08:00 committed by GitHub
commit 9f94a2e30a
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
6 changed files with 96 additions and 16 deletions

View file

@ -0,0 +1 @@
DIST vulners-1.4.0.tar.gz 24736 BLAKE2B 975936e34d708f746001e5fdbd9a04e096a6412b10891da239c8a2457cc1f275bf5d814d8ad462093ae5a5d9247eb9c96bfb0428c080bf2a606615ed1fa17dae SHA512 c19fcc9d0bdf9a918bf3399472bea169ac3949f8044675eb2dbc8098175867571444add50227b78c5748e92a59995f13f36f2fc08d9cb46de539fda0dcf3d3b0

View file

@ -0,0 +1,8 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<maintainer type="person">
<email>email@linxon.ru</email>
<name>Yury Martynov</name>
</maintainer>
</pkgmetadata>

View file

@ -0,0 +1,30 @@
# Copyright 1999-2019 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=7
PYTHON_COMPAT=( python{2_7,3_{5,6,7}} )
inherit distutils-r1
DESCRIPTION="Python API wrapper for the Vulners Database"
HOMEPAGE="https://github.com/vulnersCom/api"
SRC_URI=""
if [[ ${PV} == *9999 ]]; then
inherit git-r3
EGIT_REPO_URI="https://github.com/vulnersCom/api"
KEYWORDS=""
else
SRC_URI="https://github.com/vulnersCom/api/archive/${PV}.tar.gz -> ${P}.tar.gz"
KEYWORDS="~amd64 ~arm ~x86"
S="${WORKDIR}/api-${PV}"
fi
RESTRICT="mirror"
LICENSE="GPL-3"
SLOT="0"
IUSE=""
RDEPEND="${PYTHON_DEPS}
dev-python/requests[${PYTHON_USEDEP}]
dev-python/six[${PYTHON_USEDEP}]"

View file

@ -17,7 +17,7 @@ if [[ ${PV} == *9999 ]]; then
KEYWORDS=""
else
SRC_URI="https://github.com/vulnersCom/getsploit/archive/${PV}.tar.gz -> ${P}.tar.gz"
KEYWORDS="~amd64 ~x86"
KEYWORDS="amd64 x86"
fi
RESTRICT="mirror"

View file

@ -0,0 +1,40 @@
# Copyright 1999-2019 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=7
PYTHON_COMPAT=( python{2_7,3_{5,6}} )
PYTHON_REQ_USE="sqlite"
inherit distutils-r1 git-r3
DESCRIPTION="Command line utility for searching and downloading exploits"
HOMEPAGE="https://github.com/vulnersCom/getsploit"
SRC_URI=""
if [[ ${PV} != *9999 ]]; then
EGIT_REPO_URI="https://github.com/vulnersCom/getsploit"
EGIT_COMMIT="${PV}"
EGIT_COMMIT="65258268d83e942d342cd75c6d6ddf39a2e9ec2b"
KEYWORDS="~amd64 ~x86"
else
EGIT_REPO_URI="https://github.com/vulnersCom/getsploit"
KEYWORDS=""
fi
RESTRICT="mirror"
LICENSE="LGPL-3"
SLOT="0"
IUSE=""
RDEPEND="${PYTHON_DEPS}
dev-python/clint[${PYTHON_USEDEP}]
dev-python/six[${PYTHON_USEDEP}]
dev-python/texttable[${PYTHON_USEDEP}]
dev-python/urllib3[${PYTHON_USEDEP}]
dev-python/vulners[${PYTHON_USEDEP}]"
pkg_postinst() {
elog
elog "See documentation: https://github.com/vulnersCom/getsploit#how-to-use"
elog
}

View file

@ -1,23 +1,24 @@
# Copyright 1999-2019 Gentoo Foundation
# Copyright 1999-2019 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=7
PYTHON_COMPAT=( python3_{4,5,6,7} )
PYTHON_COMPAT=( python{2_7,3_{5,6}} )
PYTHON_REQ_USE="sqlite"
inherit eutils distutils-r1
inherit distutils-r1 git-r3
DESCRIPTION="Command line utility for searching and downloading exploits."
DESCRIPTION="Command line utility for searching and downloading exploits"
HOMEPAGE="https://github.com/vulnersCom/getsploit"
SRC_URI=""
if [[ ${PV} == *9999 ]]; then
inherit git-r3
if [[ ${PV} != *9999 ]]; then
EGIT_REPO_URI="https://github.com/vulnersCom/getsploit"
EGIT_COMMIT="${PV}"
EGIT_COMMIT="65258268d83e942d342cd75c6d6ddf39a2e9ec2b"
KEYWORDS="~amd64 ~x86"
else
EGIT_REPO_URI="https://github.com/vulnersCom/getsploit"
KEYWORDS=""
else
SRC_URI="https://github.com/vulnersCom/getsploit/archive/${PV}.tar.gz -> ${P}.tar.gz"
KEYWORDS="~amd64 ~x86"
fi
RESTRICT="mirror"
@ -25,12 +26,12 @@ LICENSE="LGPL-3"
SLOT="0"
IUSE=""
RDEPEND="${PYTHON_DEPS}"
src_prepare() {
eapply "${FILESDIR}"/${P}_add_support_user_home_dir.patch
eapply_user
}
RDEPEND="${PYTHON_DEPS}
dev-python/clint[${PYTHON_USEDEP}]
dev-python/six[${PYTHON_USEDEP}]
dev-python/texttable[${PYTHON_USEDEP}]
dev-python/urllib3[${PYTHON_USEDEP}]
dev-python/vulners[${PYTHON_USEDEP}]"
pkg_postinst() {
elog