commit:     a1e06f2ef36677fe06b1e3cc28c1d8372d7361b9
Author:     Florian Schmaus <flow <AT> gentoo <DOT> org>
AuthorDate: Mon May  9 12:24:54 2022 +0000
Commit:     Florian Schmaus <flow <AT> gentoo <DOT> org>
CommitDate: Mon May  9 12:25:32 2022 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=a1e06f2e

net-analyzer/gvm: drop 10.0.1, 11.0.0, 20.8.0

Signed-off-by: Florian Schmaus <flow <AT> gentoo.org>

 net-analyzer/gvm/gvm-10.0.1.ebuild | 31 -------------------------------
 net-analyzer/gvm/gvm-11.0.0.ebuild | 31 -------------------------------
 net-analyzer/gvm/gvm-20.8.0.ebuild | 31 -------------------------------
 net-analyzer/gvm/metadata.xml      |  6 ++----
 4 files changed, 2 insertions(+), 97 deletions(-)

diff --git a/net-analyzer/gvm/gvm-10.0.1.ebuild 
b/net-analyzer/gvm/gvm-10.0.1.ebuild
deleted file mode 100644
index 25b7338d62e4..000000000000
--- a/net-analyzer/gvm/gvm-10.0.1.ebuild
+++ /dev/null
@@ -1,31 +0,0 @@
-# Copyright 1999-2022 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=7
-
-inherit optfeature
-
-DESCRIPTION="Greenbone Vulnerability Management,previously named OpenVAS"
-HOMEPAGE="https://www.greenbone.net/en/";
-
-SLOT="0"
-LICENSE="GPL-2"
-KEYWORDS="~amd64 ~x86"
-IUSE="cli +cron +extras +gsa ldap ospd radius"
-
-RDEPEND="
-       >=net-analyzer/gvm-libs-10.0.1[extras?,ldap?,radius?]
-       >=net-analyzer/gvmd-8.0.1[extras?]
-       >=net-analyzer/openvas-scanner-6.0.1[cron?,extras?]
-       cli? ( >=net-analyzer/gvm-tools-2.0.0 )
-       gsa? ( >=net-analyzer/greenbone-security-assistant-8.0.1[extras?] )
-       ospd? ( >=net-analyzer/ospd-2.0.0[extras?] )"
-
-pkg_postinst() {
-       optfeature "web server scanning and testing tool" net-analyzer/nikto
-       optfeature "port scanner" net-analyzer/nmap
-       optfeature "IPsec VPN scanning, fingerprinting and testing tool" 
net-analyzer/ike-scan
-       optfeature "OVALdi — an OVAL Interpreter" app-forensics/ovaldi
-       optfeature "Linux-kernel-based portscanner" net-analyzer/portbunny
-       optfeature "web application attack and audit framework" 
net-analyzer/w3af
-}

diff --git a/net-analyzer/gvm/gvm-11.0.0.ebuild 
b/net-analyzer/gvm/gvm-11.0.0.ebuild
deleted file mode 100644
index 7eefd05a5af8..000000000000
--- a/net-analyzer/gvm/gvm-11.0.0.ebuild
+++ /dev/null
@@ -1,31 +0,0 @@
-# Copyright 1999-2022 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=7
-
-inherit optfeature
-
-DESCRIPTION="Greenbone Vulnerability Management,previously named OpenVAS"
-HOMEPAGE="https://www.greenbone.net/en/";
-
-SLOT="0"
-LICENSE="GPL-2"
-KEYWORDS="~amd64 ~x86"
-IUSE="cli +cron +extras +gsa ldap ospd radius"
-
-RDEPEND="
-       >=net-analyzer/gvm-libs-11.0.0[extras?,ldap?,radius?]
-       >=net-analyzer/gvmd-9.0.0[extras?]
-       >=net-analyzer/openvas-scanner-7.0.0[cron?,extras?]
-       cli? ( >=net-analyzer/gvm-tools-2.0.0 )
-       gsa? ( >=net-analyzer/greenbone-security-assistant-9.0.0[extras?] )
-       ospd? ( >=net-analyzer/ospd-2.0.0[extras?] )"
-
-pkg_postinst() {
-       optfeature "web server scanning and testing tool" net-analyzer/nikto
-       optfeature "port scanner" net-analyzer/nmap
-       optfeature "IPsec VPN scanning, fingerprinting and testing tool" 
net-analyzer/ike-scan
-       optfeature "OVALdi — an OVAL Interpreter" app-forensics/ovaldi
-       optfeature "Linux-kernel-based portscanner" net-analyzer/portbunny
-       optfeature "web application attack and audit framework" 
net-analyzer/w3af
-}

diff --git a/net-analyzer/gvm/gvm-20.8.0.ebuild 
b/net-analyzer/gvm/gvm-20.8.0.ebuild
deleted file mode 100644
index d0b25e297509..000000000000
--- a/net-analyzer/gvm/gvm-20.8.0.ebuild
+++ /dev/null
@@ -1,31 +0,0 @@
-# Copyright 1999-2021 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=7
-
-inherit optfeature
-
-DESCRIPTION="Greenbone Vulnerability Management, previously named OpenVAS"
-HOMEPAGE="https://www.greenbone.net/en/";
-
-SLOT="0"
-LICENSE="GPL-2"
-KEYWORDS="~amd64 ~x86"
-IUSE="cli +cron +extras +gsa ldap ospd radius"
-
-RDEPEND="
-       >=net-analyzer/gvm-libs-20.8.0[extras?,ldap?,radius?]
-       >=net-analyzer/gvmd-20.8.0[extras?]
-       >=net-analyzer/openvas-scanner-20.8.0[cron?,extras?]
-       cli? ( >=net-analyzer/gvm-tools-20.8.0 )
-       gsa? ( >=net-analyzer/greenbone-security-assistant-20.8.0[extras?] )
-       ospd? ( >=net-analyzer/ospd-20.8.0[extras?] )"
-
-pkg_postinst() {
-       optfeature "web server scanning and testing tool" net-analyzer/nikto
-       optfeature "port scanner" net-analyzer/nmap
-       optfeature "IPsec VPN scanning, fingerprinting and testing tool" 
net-analyzer/ike-scan
-       optfeature "OVALdi — an OVAL Interpreter" app-forensics/ovaldi
-       optfeature "Linux-kernel-based portscanner" net-analyzer/portbunny
-       optfeature "web application attack and audit framework" 
net-analyzer/w3af
-}

diff --git a/net-analyzer/gvm/metadata.xml b/net-analyzer/gvm/metadata.xml
index 88c7b1dd1b6a..ea9418af8543 100644
--- a/net-analyzer/gvm/metadata.xml
+++ b/net-analyzer/gvm/metadata.xml
@@ -11,14 +11,12 @@
        </maintainer>
        <use>
                <flag name="cli">Command Line Interface for OpenVAS 
Scanner</flag>
-               <flag name="cron">A cron job to update GVM's vulnerability 
feeds daily</flag>
-               <flag name="extras">Extra fonts, pdf-results! and html docs 
support</flag>
                <flag name="gsa">Greenbone Security Assistant (WebUI)</flag>
                <flag name="ospd">Enable support for scanner wrappers</flag>
        </use>
        <longdescription lang="en">
-       GVM previously named OpenVAS stands for Open Vulnerability Assessment 
System and is a network security scanner 
-       with associated tools like a graphical user front-end. 
+       GVM previously named OpenVAS stands for Open Vulnerability Assessment 
System and is a network security scanner
+       with associated tools like a graphical user front-end.
        The core component is a server with a set of network vulnerability 
tests (NVTs) to detect security problems in remote systems and applications.
        </longdescription>
        <upstream>

Reply via email to