summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCoprDistGit <infra@openeuler.org>2023-04-11 06:21:35 +0000
committerCoprDistGit <infra@openeuler.org>2023-04-11 06:21:35 +0000
commite84222d7353f7a60a7cf97616532401ae0d64ada (patch)
tree56eab4e2d11916c2d7ead215a81e8a839cbc9249
parent3461ac4c99cf057c066e06f7f042aba65e180320 (diff)
automatic import of python-assemblyline
-rw-r--r--.gitignore1
-rw-r--r--python-assemblyline.spec159
-rw-r--r--sources1
3 files changed, 161 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore
index e69de29..bd2946b 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1 @@
+/assemblyline-4.4.0.4.tar.gz
diff --git a/python-assemblyline.spec b/python-assemblyline.spec
new file mode 100644
index 0000000..8de6811
--- /dev/null
+++ b/python-assemblyline.spec
@@ -0,0 +1,159 @@
+%global _empty_manifest_terminate_build 0
+Name: python-assemblyline
+Version: 4.4.0.4
+Release: 1
+Summary: Assemblyline 4 - Automated malware analysis framework
+License: MIT
+URL: https://github.com/CybercentreCanada/assemblyline-base
+Source0: https://mirrors.nju.edu.cn/pypi/web/packages/1f/a5/4a2cd1c88e495133b3b8f526fdf2237af24823ae0900f18006fe4106ed8f/assemblyline-4.4.0.4.tar.gz
+BuildArch: noarch
+
+
+%description
+# Assemblyline 4 - Automated malware analysis framework
+
+AssemblyLine 4 is an open source malware analysis framework. It leverages Kubernetes and Docker to adapt to many use cases; from a small appliance for supporting manual malware analysis and security teams to large-scale enterprise security operations scanning millions of files a day and providing triage capabilities.
+
+AssemblyLine can be easily integrated in your environment using it’s powerful rest API and web interfaces. The platform comes with dozens of services to provide deep file analysis and enable integration with other security platforms such as anti-virus, malware-detonation sandboxes and threat knowledge bases. Best of all, with a little bit of Python code you can extend it yourself by creating new analysis and integration services.
+
+### Repository information
+
+This is Assemblyline 4 base repository. It provides Assemblyline with common libraries, cachestore, datastore, filestore, ODM and remote datatypes.
+
+#### System requirements
+
+Assemblyline 4 will only work on systems running python3.9 and was only tested on linux systems.
+
+#### Installation requirements
+
+If used outside of our normal container this library requires outside linux libraries.
+
+- libffi6 (dev)
+- libfuxxy2 (dev)
+- libmagic1
+- python3.9 (dev)
+
+Here is an example on how you would get those libraries on a `Ubuntu 20.04+` system:
+
+ sudo add-apt-repository ppa:deadsnakes/ppa
+ sudo apt install libffi6 libfuzzy2 libmagic1 build-essential libffi-dev python3.9 python3.9-dev python3-pip libfuzzy-dev
+
+
+
+
+%package -n python3-assemblyline
+Summary: Assemblyline 4 - Automated malware analysis framework
+Provides: python-assemblyline
+BuildRequires: python3-devel
+BuildRequires: python3-setuptools
+BuildRequires: python3-pip
+%description -n python3-assemblyline
+# Assemblyline 4 - Automated malware analysis framework
+
+AssemblyLine 4 is an open source malware analysis framework. It leverages Kubernetes and Docker to adapt to many use cases; from a small appliance for supporting manual malware analysis and security teams to large-scale enterprise security operations scanning millions of files a day and providing triage capabilities.
+
+AssemblyLine can be easily integrated in your environment using it’s powerful rest API and web interfaces. The platform comes with dozens of services to provide deep file analysis and enable integration with other security platforms such as anti-virus, malware-detonation sandboxes and threat knowledge bases. Best of all, with a little bit of Python code you can extend it yourself by creating new analysis and integration services.
+
+### Repository information
+
+This is Assemblyline 4 base repository. It provides Assemblyline with common libraries, cachestore, datastore, filestore, ODM and remote datatypes.
+
+#### System requirements
+
+Assemblyline 4 will only work on systems running python3.9 and was only tested on linux systems.
+
+#### Installation requirements
+
+If used outside of our normal container this library requires outside linux libraries.
+
+- libffi6 (dev)
+- libfuxxy2 (dev)
+- libmagic1
+- python3.9 (dev)
+
+Here is an example on how you would get those libraries on a `Ubuntu 20.04+` system:
+
+ sudo add-apt-repository ppa:deadsnakes/ppa
+ sudo apt install libffi6 libfuzzy2 libmagic1 build-essential libffi-dev python3.9 python3.9-dev python3-pip libfuzzy-dev
+
+
+
+
+%package help
+Summary: Development documents and examples for assemblyline
+Provides: python3-assemblyline-doc
+%description help
+# Assemblyline 4 - Automated malware analysis framework
+
+AssemblyLine 4 is an open source malware analysis framework. It leverages Kubernetes and Docker to adapt to many use cases; from a small appliance for supporting manual malware analysis and security teams to large-scale enterprise security operations scanning millions of files a day and providing triage capabilities.
+
+AssemblyLine can be easily integrated in your environment using it’s powerful rest API and web interfaces. The platform comes with dozens of services to provide deep file analysis and enable integration with other security platforms such as anti-virus, malware-detonation sandboxes and threat knowledge bases. Best of all, with a little bit of Python code you can extend it yourself by creating new analysis and integration services.
+
+### Repository information
+
+This is Assemblyline 4 base repository. It provides Assemblyline with common libraries, cachestore, datastore, filestore, ODM and remote datatypes.
+
+#### System requirements
+
+Assemblyline 4 will only work on systems running python3.9 and was only tested on linux systems.
+
+#### Installation requirements
+
+If used outside of our normal container this library requires outside linux libraries.
+
+- libffi6 (dev)
+- libfuxxy2 (dev)
+- libmagic1
+- python3.9 (dev)
+
+Here is an example on how you would get those libraries on a `Ubuntu 20.04+` system:
+
+ sudo add-apt-repository ppa:deadsnakes/ppa
+ sudo apt install libffi6 libfuzzy2 libmagic1 build-essential libffi-dev python3.9 python3.9-dev python3-pip libfuzzy-dev
+
+
+
+
+%prep
+%autosetup -n assemblyline-4.4.0.4
+
+%build
+%py3_build
+
+%install
+%py3_install
+install -d -m755 %{buildroot}/%{_pkgdocdir}
+if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
+if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
+if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
+if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
+pushd %{buildroot}
+if [ -d usr/lib ]; then
+ find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/lib64 ]; then
+ find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/bin ]; then
+ find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/sbin ]; then
+ find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+touch doclist.lst
+if [ -d usr/share/man ]; then
+ find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst
+fi
+popd
+mv %{buildroot}/filelist.lst .
+mv %{buildroot}/doclist.lst .
+
+%files -n python3-assemblyline -f filelist.lst
+%dir %{python3_sitelib}/*
+
+%files help -f doclist.lst
+%{_docdir}/*
+
+%changelog
+* Tue Apr 11 2023 Python_Bot <Python_Bot@openeuler.org> - 4.4.0.4-1
+- Package Spec generated
diff --git a/sources b/sources
new file mode 100644
index 0000000..829a04a
--- /dev/null
+++ b/sources
@@ -0,0 +1 @@
+c2b8ff7272ce4e035ea7ba68f5f48538 assemblyline-4.4.0.4.tar.gz