Port details |
- py-detect-secrets Tool for detecting secrets in the codebase
- 1.5.0_1 security
=2 1.5.0Version of this port present on the latest quarterly branch. - Maintainer: sunpoet@FreeBSD.org
 - Port Added: 2023-04-05 17:37:34
- Last Update: 2024-07-07 08:05:33
- Commit Hash: 1a80ec7
- People watching this port, also watch:: jdictionary, py311-Automat, py311-python-gdsii, py39-PyOpenGL, p5-Sane
- Also Listed In: python
- License: APACHE20
- WWW:
- https://github.com/Yelp/detect-secrets
- Description:
- detect-secrets is an aptly named module for (surprise, surprise) detecting
secrets within a code base.
However, unlike other similar packages that solely focus on finding secrets,
this package is designed with the enterprise client in mind: providing a
backwards compatible, systematic means of:
1. Preventing new secrets from entering the code base,
2. Detecting if such preventions are explicitly bypassed, and
3. Providing a checklist of secrets to roll, and migrate off to a more secure
storage.
This way, you create a separation of concern: accepting that there may currently
be secrets hiding in your large repository (this is what we refer to as a
baseline), but preventing this issue from getting any larger, without dealing
with the potentially gargantuan effort of moving existing secrets away.
It does this by running periodic diff outputs against heuristically crafted
regex statements, to identify whether any new secret has been committed. This
way, it avoids the overhead of digging through all git history, as well as the
need to scan the entire repository every time.
¦ ¦ ¦ ¦ 
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - There is no configure plist information for this port.
- Dependency lines:
-
- ${PYTHON_PKGNAMEPREFIX}detect-secrets>0:security/py-detect-secrets@${PY_FLAVOR}
- To install the port:
- cd /usr/ports/security/py-detect-secrets/ && make install clean
- To add the package, run one of these commands:
- pkg install security/py-detect-secrets
- pkg install py311-detect-secrets
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above. NOTE: This is a Python port. Instead of py311-detect-secrets listed in the above command, you can pick from the names under the Packages section.- PKGNAME: py311-detect-secrets
- Package flavors (<flavor>: <package>)
- py311: py311-detect-secrets
- distinfo:
- TIMESTAMP = 1715842810
SHA256 (detect_secrets-1.5.0.tar.gz) = 6bb46dcc553c10df51475641bb30fd69d25645cc12339e46c824c1e0c388898a
SIZE (detect_secrets-1.5.0.tar.gz) = 97351
Packages (timestamps in pop-ups are UTC):
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- py311-setuptools>=0 : devel/py-setuptools@py311
- py311-wheel>=0 : devel/py-wheel@py311
- python3.11 : lang/python311
- py311-build>=0 : devel/py-build@py311
- py311-installer>=0 : devel/py-installer@py311
- Test dependencies:
-
- python3.11 : lang/python311
- Runtime dependencies:
-
- py311-pyyaml>=0 : devel/py-pyyaml@py311
- py311-requests>=0 : www/py-requests@py311
- python3.11 : lang/python311
- There are no ports dependent upon this port
Configuration Options:
- No options to configure
- Options name:
- security_py-detect-secrets
- USES:
- python
- FreshPorts was unable to extract/find any pkg message
- Master Sites:
|
Number of commits found: 5
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
1.5.0_1 07 Jul 2024 08:05:33
    |
Po-Chuan Hsieh (sunpoet)  |
devel/py-pyyaml: Move devel/py-yaml to devel/py-pyyaml
- Bump PORTREVISION of dependent ports for dependency change |
1.5.0 19 May 2024 17:15:52
    |
Po-Chuan Hsieh (sunpoet)  |
security/py-detect-secrets: Update to 1.5.0
Changes: https://github.com/Yelp/detect-secrets/releases |
1.4.0_1 13 May 2024 14:07:35
    |
Po-Chuan Hsieh (sunpoet)  |
security/py-detect-secrets: Convert to USE_PYTHON=pep517
- Bump PORTREVISION for package change |
1.4.0 27 Jun 2023 19:34:34
    |
Rene Ladan (rene)  |
all: remove explicit versions in USES=python for "3.x+"
The logic in USES=python will automatically convert this to 3.8+ by
itself.
Adjust two ports that only had Python 3.7 mentioned but build fine
on Python 3.8 too.
finance/quickfix: mark BROKEN with PYTHON
libtool: compile: c++ -DHAVE_CONFIG_H -I. -I../.. -I -I. -I.. -I../.. -I../C++
-DLIBICONV_PLUG -DPYTHON_MAJOR_VERSION=3 -Wno-unused-variable
-Wno-maybe-uninitialized -O2 -pipe -DLIBICONV_PLUG -fstack-protector-strong
-fno-strict-aliasing -DLIBICONV_PLUG -Wall -ansi
-Wno-unused-command-line-argument -Wpointer-arith -Wwrite-strings
-Wno-overloaded-virtual -Wno-deprecated-declarations -Wno-deprecated -std=c++0x
-MT _quickfix_la-QuickfixPython.lo -MD -MP -MF
.deps/_quickfix_la-QuickfixPython.Tpo -c QuickfixPython.cpp -fPIC -DPIC -o
.libs/_quickfix_la-QuickfixPython.o
warning: unknown warning option '-Wno-maybe-uninitialized'; did you mean
'-Wno-uninitialized'? [-Wunknown-warning-option]
QuickfixPython.cpp:175:11: fatal error: 'Python.h' file not found
^~~~~~~~~~
1 warning and 1 error generated.
Reviewed by: portmgr, vishwin, yuri
Differential Revision: <https://reviews.freebsd.org/D40568> |
1.4.0 05 Apr 2023 17:29:40
    |
Po-Chuan Hsieh (sunpoet)  |
security/py-detect-secrets: Add py-detect-secrets 1.4.0
detect-secrets is an aptly named module for (surprise, surprise) detecting
secrets within a code base.
However, unlike other similar packages that solely focus on finding secrets,
this package is designed with the enterprise client in mind: providing a
backwards compatible, systematic means of:
1. Preventing new secrets from entering the code base,
2. Detecting if such preventions are explicitly bypassed, and
3. Providing a checklist of secrets to roll, and migrate off to a more secure
storage.
This way, you create a separation of concern: accepting that there may currently
be secrets hiding in your large repository (this is what we refer to as a
baseline), but preventing this issue from getting any larger, without dealing
with the potentially gargantuan effort of moving existing secrets away.
It does this by running periodic diff outputs against heuristically crafted
regex statements, to identify whether any new secret has been committed. This
way, it avoids the overhead of digging through all git history, as well as the
need to scan the entire repository every time. |
Number of commits found: 5
|