# This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # py-pass-audit/ # py-pass-audit/pkg-plist # py-pass-audit/Makefile # py-pass-audit/distinfo # py-pass-audit/pkg-descr # echo c - py-pass-audit/ mkdir -p py-pass-audit/ > /dev/null 2>&1 echo x - py-pass-audit/pkg-plist sed 's/^X//' >py-pass-audit/pkg-plist << '4aeaa1f9d49097dd5be6b5863bcb9d18' X%%PYTHON_SITELIBDIR%%/__pycache__/pass_audit.cpython-36.%%PYTHON_PYOEXTENSION%% X%%PYTHON_SITELIBDIR%%/__pycache__/pass_audit.cpython-36.pyc X%%PYTHON_SITELIBDIR%%/pass_audit.py X%%LOCALBASE%%/libexec/password-store/extensions/audit.bash Xetc/bash_completion.d/pass-audit Xshare/zsh/site-functions/_pass-audit Xman/man1/pass-audit.1.gz 4aeaa1f9d49097dd5be6b5863bcb9d18 echo x - py-pass-audit/Makefile sed 's/^X//' >py-pass-audit/Makefile << '53d3c7fdd424085431527288f8965a06' X# $FreeBSD$ X XPORTNAME= pass-audit XPORTVERSION= 1.0.1 XCATEGORIES= security XMASTER_SITES= https://github.com/roddhjav/${PORTNAME}/releases/download/v${PORTVERSION}/ XPKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} X XMAINTAINER= tobias.rehbein@web.de XCOMMENT= Extension to audit your password-store password repository X XLICENSE= GPLv3 XLICENSE_FILE= ${WRKSRC}/LICENSE X XBUILD_DEPENDS= ${PYTHON_PKGNAMEPREFIX}requests>0:www/py-requests@${PY_FLAVOR} \ X ${PYTHON_PKGNAMEPREFIX}zxcvbn>0:security/py-zxcvbn@${PY_FLAVOR} XRUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}requests>0:www/py-requests@${PY_FLAVOR} \ X ${PYTHON_PKGNAMEPREFIX}zxcvbn>0:security/py-zxcvbn@${PY_FLAVOR} \ X password-store>=1.7.3_1:sysutils/password-store X XUSES= python:3.4+ shebangfix XUSE_PYTHON= distutils X XNO_ARCH= yes XNO_BUILD= yes X XSHEBANG_FILES= ${WRKSRC}/pass_audit.py X Xpre-install: X ${INSTALL_MAN} ${WRKSRC}/pass-audit.1 \ X ${STAGEDIR}${MANPREFIX}/man/man1/pass-audit.1 X @${MKDIR} ${STAGEDIR}${LOCALBASE}/libexec/password-store/extensions X ${INSTALL_SCRIPT} ${WRKSRC}/audit.bash \ X ${STAGEDIR}${LOCALBASE}/libexec/password-store/extensions/audit.bash X @${MKDIR} ${STAGEDIR}${PREFIX}/etc/bash_completion.d X ${INSTALL_DATA} ${WRKSRC}/completion/pass-audit.bash \ X ${STAGEDIR}${PREFIX}/etc/bash_completion.d/pass-audit X @${MKDIR} ${STAGEDIR}${PREFIX}/share/zsh/site-functions X ${INSTALL_DATA} ${WRKSRC}/completion/pass-audit.zsh \ X ${STAGEDIR}${PREFIX}/share/zsh/site-functions/_pass-audit X X.include 53d3c7fdd424085431527288f8965a06 echo x - py-pass-audit/distinfo sed 's/^X//' >py-pass-audit/distinfo << 'ccaa94c19c6eb866528c6004605066f2' XTIMESTAMP = 1549124026 XSHA256 (pass-audit-1.0.1.tar.gz) = a0b69164a6f467abd395076d18c950cd49e332aed11a1e5ecae746167728c050 XSIZE (pass-audit-1.0.1.tar.gz) = 62341 ccaa94c19c6eb866528c6004605066f2 echo x - py-pass-audit/pkg-descr sed 's/^X//' >py-pass-audit/pkg-descr << '97c3ea079b455a3d8861af265ddee12e' Xpass audit is a password-store extension for auditing your password repository. XPasswords will be checked against the Python implementation of Dropbox' zxcvbn Xalgorithm and Troy Hunt's Have I Been Pwned Service. It supports safe breached Xpassword detection from haveibeenpwned.com using a K-anonymity method. Using Xthis method, you do not need to (fully) trust the server that stores the Xbreached password. You should read the security consideration section for more Xinformation. X XWWW: https://github.com/roddhjav/pass-audit 97c3ea079b455a3d8861af265ddee12e exit