notbugIf you buy from Amazon USA, please support us by using this link.
Port details
py-pass-audit Extension to audit your password-store password repository
1.0.1_1 security on this many watch lists=0 search for ports that depend on this port Find issues related to this port Report an issue related to this port
Maintainer: tobias.rehbein@web.de search for ports maintained by this maintainer
Port Added: 2019-02-03 14:37:41
Last Update: 2019-02-05 07:42:19
SVN Revision: 492193
License: GPLv3
pass audit is a password-store extension for auditing your password repository.
Passwords will be checked against the Python implementation of Dropbox' zxcvbn
algorithm and Troy Hunt's Have I Been Pwned Service. It supports safe breached
password detection from haveibeenpwned.com using a K-anonymity method. Using
this method, you do not need to (fully) trust the server that stores the
breached password. You should read the security consideration section for more
information.

WWW: https://github.com/roddhjav/pass-audit
SVNWeb : Homepage : PortsMon

There is no configure plist information for this port.

Dependency line: py36-pass-audit>0:security/py-pass-audit


To install the port: cd /usr/ports/security/py-pass-audit/ && make install clean
To add the package: pkg install py36-pass-audit

PKGNAME: py36-pass-audit

Package flavors (<flavor>: <package>)
  • py36: py36-pass-audit

distinfo:

TIMESTAMP = 1549124026
SHA256 (pass-audit-1.0.1.tar.gz) = a0b69164a6f467abd395076d18c950cd49e332aed11a1e5ecae746167728c050
SIZE (pass-audit-1.0.1.tar.gz) = 62341


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. py36-requests>0 : www/py-requests@py36
  2. py36-zxcvbn>0 : security/py-zxcvbn@py36
  3. py36-setuptools>0 : devel/py-setuptools@py36
  4. python3.6 : lang/python36
Runtime dependencies:
  1. py36-requests>0 : www/py-requests@py36
  2. py36-zxcvbn>0 : security/py-zxcvbn@py36
  3. password-store>=1.7.3_1 : sysutils/password-store
  4. py36-setuptools>0 : devel/py-setuptools@py36
  5. python3.6 : lang/python36
There are no ports dependent upon this port

Configuration Options
     No options to configure

USES:
python:3.4+ shebangfix

Master Sites:
  1. https://github.com/roddhjav/pass-audit/releases/download/v1.0.1/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2017-11-30
    Affects: */py*
    Author: mat@FreeBSD.org
    Reason: 
      Ports using Python via USES=python are now flavored.  All the py3-* ports
      have been removed and folded into their py-* master ports.
    
      People using Poudriere 3.2+ and binary packages do not have to do anything.
    
      For other people, to build the Python 3.6 version of, for example,
      databases/py-gdbm, you need to run:
    
        # make FLAVOR=py36 install
    
    

Number of commits found: 2

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
05 Feb 2019 07:42:19
Original commit files touched by this commit  1.0.1_1
Revision:492193
tobik search for other commits by this committer
security/py-pass-audit: Replace python3 with ${PYTHON_CMD} in audit.bash

PR:		235510
Submitted by:	maintainer
03 Feb 2019 11:15:42
Original commit files touched by this commit  1.0.1
Revision:492047
tcberner search for other commits by this committer
[NEW PORT] security/py-pass-audit: Extension to audit your password-store
password repository

pass audit is a password-store extension for auditing your password repository.
Passwords will be checked against the Python implementation of Dropbox' zxcvbn
algorithm and Troy Hunt's Have I Been Pwned Service. It supports safe breached
password detection from haveibeenpwned.com using a K-anonymity method.

Using this method, you do not need to (fully) trust the server that stores the
breached password. You should read the security consideration section for more
information.

PR:		235454
Submitted by:	Tobias Rehbein <tobias.rehbein@web.de>

Number of commits found: 2

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
rubygem-actionview4Mar 18
rubygem-actionview5Mar 18
rubygem-actionview50Mar 18
puttyMar 17
putty-gtk2Mar 17
putty-nogtkMar 17
py-notebookMar 16
ruby-gemsMar 15
ntpMar 07
openssl*Mar 07
openssl111Mar 07
rsshMar 06
rt42Mar 06
rt44Mar 06
gitlab-ceMar 05

13 vulnerabilities affecting 42 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2019-03-18 18:34:00


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 36283
Broken 116
Deprecated 119
Ignore 337
Forbidden 5
Restricted 161
No CDROM 74
Vulnerable 37
Expired 6
Set to expire 93
Interactive 0
new 24 hours 3
new 48 hours13
new 7 days34
new fortnight64
new month136

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2019 Dan Langille. All rights reserved.