%global _empty_manifest_terminate_build 0 Name: python-assemblyline Version: 4.4.0.4 Release: 1 Summary: Assemblyline 4 - Automated malware analysis framework License: MIT URL: https://github.com/CybercentreCanada/assemblyline-base Source0: https://mirrors.nju.edu.cn/pypi/web/packages/1f/a5/4a2cd1c88e495133b3b8f526fdf2237af24823ae0900f18006fe4106ed8f/assemblyline-4.4.0.4.tar.gz BuildArch: noarch %description # Assemblyline 4 - Automated malware analysis framework AssemblyLine 4 is an open source malware analysis framework. It leverages Kubernetes and Docker to adapt to many use cases; from a small appliance for supporting manual malware analysis and security teams to large-scale enterprise security operations scanning millions of files a day and providing triage capabilities. AssemblyLine can be easily integrated in your environment using it’s powerful rest API and web interfaces. The platform comes with dozens of services to provide deep file analysis and enable integration with other security platforms such as anti-virus, malware-detonation sandboxes and threat knowledge bases. Best of all, with a little bit of Python code you can extend it yourself by creating new analysis and integration services. ### Repository information This is Assemblyline 4 base repository. It provides Assemblyline with common libraries, cachestore, datastore, filestore, ODM and remote datatypes. #### System requirements Assemblyline 4 will only work on systems running python3.9 and was only tested on linux systems. #### Installation requirements If used outside of our normal container this library requires outside linux libraries. - libffi6 (dev) - libfuxxy2 (dev) - libmagic1 - python3.9 (dev) Here is an example on how you would get those libraries on a `Ubuntu 20.04+` system: sudo add-apt-repository ppa:deadsnakes/ppa sudo apt install libffi6 libfuzzy2 libmagic1 build-essential libffi-dev python3.9 python3.9-dev python3-pip libfuzzy-dev %package -n python3-assemblyline Summary: Assemblyline 4 - Automated malware analysis framework Provides: python-assemblyline BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-assemblyline # Assemblyline 4 - Automated malware analysis framework AssemblyLine 4 is an open source malware analysis framework. It leverages Kubernetes and Docker to adapt to many use cases; from a small appliance for supporting manual malware analysis and security teams to large-scale enterprise security operations scanning millions of files a day and providing triage capabilities. AssemblyLine can be easily integrated in your environment using it’s powerful rest API and web interfaces. The platform comes with dozens of services to provide deep file analysis and enable integration with other security platforms such as anti-virus, malware-detonation sandboxes and threat knowledge bases. Best of all, with a little bit of Python code you can extend it yourself by creating new analysis and integration services. ### Repository information This is Assemblyline 4 base repository. It provides Assemblyline with common libraries, cachestore, datastore, filestore, ODM and remote datatypes. #### System requirements Assemblyline 4 will only work on systems running python3.9 and was only tested on linux systems. #### Installation requirements If used outside of our normal container this library requires outside linux libraries. - libffi6 (dev) - libfuxxy2 (dev) - libmagic1 - python3.9 (dev) Here is an example on how you would get those libraries on a `Ubuntu 20.04+` system: sudo add-apt-repository ppa:deadsnakes/ppa sudo apt install libffi6 libfuzzy2 libmagic1 build-essential libffi-dev python3.9 python3.9-dev python3-pip libfuzzy-dev %package help Summary: Development documents and examples for assemblyline Provides: python3-assemblyline-doc %description help # Assemblyline 4 - Automated malware analysis framework AssemblyLine 4 is an open source malware analysis framework. It leverages Kubernetes and Docker to adapt to many use cases; from a small appliance for supporting manual malware analysis and security teams to large-scale enterprise security operations scanning millions of files a day and providing triage capabilities. AssemblyLine can be easily integrated in your environment using it’s powerful rest API and web interfaces. The platform comes with dozens of services to provide deep file analysis and enable integration with other security platforms such as anti-virus, malware-detonation sandboxes and threat knowledge bases. Best of all, with a little bit of Python code you can extend it yourself by creating new analysis and integration services. ### Repository information This is Assemblyline 4 base repository. It provides Assemblyline with common libraries, cachestore, datastore, filestore, ODM and remote datatypes. #### System requirements Assemblyline 4 will only work on systems running python3.9 and was only tested on linux systems. #### Installation requirements If used outside of our normal container this library requires outside linux libraries. - libffi6 (dev) - libfuxxy2 (dev) - libmagic1 - python3.9 (dev) Here is an example on how you would get those libraries on a `Ubuntu 20.04+` system: sudo add-apt-repository ppa:deadsnakes/ppa sudo apt install libffi6 libfuzzy2 libmagic1 build-essential libffi-dev python3.9 python3.9-dev python3-pip libfuzzy-dev %prep %autosetup -n assemblyline-4.4.0.4 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-assemblyline -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Tue Apr 11 2023 Python_Bot - 4.4.0.4-1 - Package Spec generated