Skip to content

kroosec/gvm-libs

 
 

Repository files navigation

Greenbone Logo

gvm-libs

GitHub releases Code Documentation Coverage CircleCI

This is the libraries module for the Greenbone Vulnerability Management Solution.

It is used for the Greenbone Security Manager appliances and provides various functionalities to support the integrated service daemons.

Installation

This module can be configured, built and installed with following commands:

cmake .
make install

For detailed installation requirements and instructions, please see the file INSTALL.md.

If you are not familiar or comfortable building from source code, we recommend that you use the Greenbone Community Edition, a prepared virtual machine with a readily available setup. Information regarding the virtual machine is available at https://www.greenbone.net/en/community-edition/.

Usage

The gvm-libs module consists of the following libraries:

  • base: All basic modules which require only the glib library as a dependency.

  • util: All modules that require more than the glib library as dependency.

  • gmp: API support for the Greenbone Management Protocol (GMP).

  • osp: API support for the Open Scanner Protocol (OSP).

For more information on using the functionality provided by the gvm-libs module please refer to the source code documentation.

Support

For any question on the usage of gvm-libs please use the Greenbone Community Portal. If you found a problem with the software, please create an issue on GitHub. If you are a Greenbone customer you may alternatively or additionally forward your issue to the Greenbone Support Portal.

Maintainer

This project is maintained by Greenbone Networks GmbH.

Contributing

Your contributions are highly appreciated. Please create a pull request on GitHub. Bigger changes need to be discussed with the development team via the issues section at github first.

Code style and formatting

Before creating a pull request, it is recommended to run the following command:

make format

This reformats the new code to ensure that it follows the code style and formatting guidelines.

Static code analysis with the Clang Static Analyzer

If you want to use the Clang Static Analyzer (http://clang-analyzer.llvm.org/) to do a static code analysis, you can do so by prefixing the configuration and build commands with scan-build:

scan-build cmake ..
scan-build make

The tool will provide a hint on how to launch a web browser with the results.

It is recommended to do this analysis in a separate, empty build directory and to empty the build directory before scan-build call.

License

Copyright (C) 2009-2019 Greenbone Networks GmbH

Licensed under the GNU General Public License v2.0 or later.

About

Greenbone Vulnerability Management Libraries

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • C 95.0%
  • CMake 4.3%
  • C++ 0.7%