notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
This referral link gives you 10% off a Fastmail.com account and gives me a discount on my Fastmail account.

Get notified when packages are built

A new feature has been added. FreshPorts already tracks package built by the FreeBSD project. This information is displayed on each port page. You can now get an email when FreshPorts notices a new package is available for something on one of your watch lists. However, you must opt into that. Click on Report Subscriptions on the right, and New Package Notification box, and click on Update.

Finally, under Watch Lists, click on ABI Package Subscriptions to select your ABI (e.g. FreeBSD:14:amd64) & package set (latest/quarterly) combination for a given watch list. This is what FreshPorts will look for.

Port details
py-detect-secrets Tool for detecting secrets in the codebase
1.5.0 security on this many watch lists=0 search for ports that depend on this port Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 1.4.0Version of this port present on the latest quarterly branch.
Maintainer: sunpoet@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2023-04-05 17:37:34
Last Update: 2024-05-19 17:15:52
Commit Hash: 8d906aa
Also Listed In: python
License: APACHE20
WWW:
https://github.com/Yelp/detect-secrets
Description:
detect-secrets is an aptly named module for (surprise, surprise) detecting secrets within a code base. However, unlike other similar packages that solely focus on finding secrets, this package is designed with the enterprise client in mind: providing a backwards compatible, systematic means of: 1. Preventing new secrets from entering the code base, 2. Detecting if such preventions are explicitly bypassed, and 3. Providing a checklist of secrets to roll, and migrate off to a more secure storage. This way, you create a separation of concern: accepting that there may currently be secrets hiding in your large repository (this is what we refer to as a baseline), but preventing this issue from getting any larger, without dealing with the potentially gargantuan effort of moving existing secrets away. It does this by running periodic diff outputs against heuristically crafted regex statements, to identify whether any new secret has been committed. This way, it avoids the overhead of digging through all git history, as well as the need to scan the entire repository every time.
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb - no subversion history for this port

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
There is no configure plist information for this port.
Dependency lines:
  • ${PYTHON_PKGNAMEPREFIX}detect-secrets>0:security/py-detect-secrets@${PY_FLAVOR}
To install the port:
cd /usr/ports/security/py-detect-secrets/ && make install clean
To add the package, run one of these commands:
  • pkg install security/py-detect-secrets
  • pkg install py39-detect-secrets
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
NOTE: This is a Python port. Instead of py39-detect-secrets listed in the above command, you can pick from the names under the Packages section.
PKGNAME: py39-detect-secrets
Package flavors (<flavor>: <package>)
  • py39: py39-detect-secrets
distinfo:
TIMESTAMP = 1715842810 SHA256 (detect_secrets-1.5.0.tar.gz) = 6bb46dcc553c10df51475641bb30fd69d25645cc12339e46c824c1e0c388898a SIZE (detect_secrets-1.5.0.tar.gz) = 97351

Packages (timestamps in pop-ups are UTC):
py39-detect-secrets
ABIaarch64amd64armv6armv7i386powerpcpowerpc64powerpc64le
FreeBSD:13:latest1.5.01.5.0-1.5.01.5.0---
FreeBSD:13:quarterly1.4.01.4.01.4.01.4.01.4.01.4.01.4.01.4.0
FreeBSD:14:latest1.4.01.5.0-1.4.01.5.01.4.0-1.4.0
FreeBSD:14:quarterly1.4.01.4.0-1.4.01.4.01.4.01.4.01.4.0
FreeBSD:15:latest1.4.01.5.0n/a1.4.0n/a1.4.01.4.01.4.0
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. py39-setuptools>=0 : devel/py-setuptools@py39
  2. py39-wheel>=0 : devel/py-wheel@py39
  3. python3.9 : lang/python39
  4. py39-build>=0 : devel/py-build@py39
  5. py39-installer>=0 : devel/py-installer@py39
Test dependencies:
  1. python3.9 : lang/python39
Runtime dependencies:
  1. py39-yaml>=0 : devel/py-yaml@py39
  2. py39-requests>=0 : www/py-requests@py39
  3. python3.9 : lang/python39
There are no ports dependent upon this port

Configuration Options:
No options to configure
Options name:
security_py-detect-secrets
USES:
python
FreshPorts was unable to extract/find any pkg message
Master Sites:
Expand this list (2 items)
Collapse this list.
  1. https://files.pythonhosted.org/packages/source/d/detect_secrets/
  2. https://pypi.org/packages/source/d/detect_secrets/
Collapse this list.

Number of commits found: 4

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
1.5.0
19 May 2024 17:15:52
commit hash: 8d906aa444fa83256e1486068dc5c25cce297e6acommit hash: 8d906aa444fa83256e1486068dc5c25cce297e6acommit hash: 8d906aa444fa83256e1486068dc5c25cce297e6acommit hash: 8d906aa444fa83256e1486068dc5c25cce297e6a files touched by this commit
Po-Chuan Hsieh (sunpoet) search for other commits by this committer
security/py-detect-secrets: Update to 1.5.0

Changes:	https://github.com/Yelp/detect-secrets/releases
1.4.0_1
13 May 2024 14:07:35
commit hash: 5bae275446c9f734012231fa8b96722983a27e08commit hash: 5bae275446c9f734012231fa8b96722983a27e08commit hash: 5bae275446c9f734012231fa8b96722983a27e08commit hash: 5bae275446c9f734012231fa8b96722983a27e08 files touched by this commit
Po-Chuan Hsieh (sunpoet) search for other commits by this committer
security/py-detect-secrets: Convert to USE_PYTHON=pep517

- Bump PORTREVISION for package change
1.4.0
27 Jun 2023 19:34:34
commit hash: 3d9a815d9c5acbb71f4bb07738bdeab4879feacbcommit hash: 3d9a815d9c5acbb71f4bb07738bdeab4879feacbcommit hash: 3d9a815d9c5acbb71f4bb07738bdeab4879feacbcommit hash: 3d9a815d9c5acbb71f4bb07738bdeab4879feacb files touched by this commit
Rene Ladan (rene) search for other commits by this committer
all: remove explicit versions in USES=python for "3.x+"

The logic in USES=python will automatically convert this to 3.8+ by
itself.

Adjust two ports that only had Python 3.7 mentioned but build fine
on Python 3.8 too.

finance/quickfix: mark BROKEN with PYTHON

libtool: compile:  c++ -DHAVE_CONFIG_H -I. -I../.. -I -I. -I.. -I../.. -I../C++
-DLIBICONV_PLUG -DPYTHON_MAJOR_VERSION=3 -Wno-unused-variable
-Wno-maybe-uninitialized -O2 -pipe -DLIBICONV_PLUG -fstack-protector-strong
-fno-strict-aliasing -DLIBICONV_PLUG -Wall -ansi
-Wno-unused-command-line-argument -Wpointer-arith -Wwrite-strings
-Wno-overloaded-virtual -Wno-deprecated-declarations -Wno-deprecated -std=c++0x
-MT _quickfix_la-QuickfixPython.lo -MD -MP -MF
.deps/_quickfix_la-QuickfixPython.Tpo -c QuickfixPython.cpp  -fPIC -DPIC -o
.libs/_quickfix_la-QuickfixPython.o
warning: unknown warning option '-Wno-maybe-uninitialized'; did you mean
'-Wno-uninitialized'? [-Wunknown-warning-option]
QuickfixPython.cpp:175:11: fatal error: 'Python.h' file not found
          ^~~~~~~~~~
1 warning and 1 error generated.

Reviewed by:	portmgr, vishwin, yuri
Differential Revision:	<https://reviews.freebsd.org/D40568>
1.4.0
05 Apr 2023 17:29:40
commit hash: 4bead352f49aa8c05252244c2f4a3998b51bd256commit hash: 4bead352f49aa8c05252244c2f4a3998b51bd256commit hash: 4bead352f49aa8c05252244c2f4a3998b51bd256commit hash: 4bead352f49aa8c05252244c2f4a3998b51bd256 files touched by this commit
Po-Chuan Hsieh (sunpoet) search for other commits by this committer
security/py-detect-secrets: Add py-detect-secrets 1.4.0

detect-secrets is an aptly named module for (surprise, surprise) detecting
secrets within a code base.

However, unlike other similar packages that solely focus on finding secrets,
this package is designed with the enterprise client in mind: providing a
backwards compatible, systematic means of:
 1. Preventing new secrets from entering the code base,
 2. Detecting if such preventions are explicitly bypassed, and
 3. Providing a checklist of secrets to roll, and migrate off to a more secure
    storage.

This way, you create a separation of concern: accepting that there may currently
be secrets hiding in your large repository (this is what we refer to as a
baseline), but preventing this issue from getting any larger, without dealing
with the potentially gargantuan effort of moving existing secrets away.

It does this by running periodic diff outputs against heuristically crafted
regex statements, to identify whether any new secret has been committed. This
way, it avoids the overhead of digging through all git history, as well as the
need to scan the entire repository every time.

Number of commits found: 4