<pre style='margin:0'>
Ken (kencu) pushed a commit to branch master
in repository macports-ports.
</pre>
<p><a href="https://github.com/macports/macports-ports/commit/650145facaa9d04671bdc5dce29ed240bba870fc">https://github.com/macports/macports-ports/commit/650145facaa9d04671bdc5dce29ed240bba870fc</a></p>
<pre style="white-space: pre; background: #F8F8F8">The following commit(s) were added to refs/heads/master by this push:
<span style='display:block; white-space:pre;color:#404040;'> new 650145f git-secret: Adding new port
</span>650145f is described below
<span style='display:block; white-space:pre;color:#808000;'>commit 650145facaa9d04671bdc5dce29ed240bba870fc
</span>Author: Pedro Hernandez <5179251+pedrohdz@users.noreply.github.com>
AuthorDate: Fri Dec 20 15:01:10 2019 +0100
<span style='display:block; white-space:pre;color:#404040;'> git-secret: Adding new port
</span><span style='display:block; white-space:pre;color:#404040;'>
</span><span style='display:block; white-space:pre;color:#404040;'> git-secret is a bash tool to store private data inside a git repo.
</span>---
devel/git-secret/Portfile | 37 +++++++++++++++++++++++++++++++++++++
1 file changed, 37 insertions(+)
<span style='display:block; white-space:pre;color:#808080;'>diff --git a/devel/git-secret/Portfile b/devel/git-secret/Portfile
</span>new file mode 100644
<span style='display:block; white-space:pre;color:#808080;'>index 0000000..e678c44
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>--- /dev/null
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>+++ b/devel/git-secret/Portfile
</span><span style='display:block; white-space:pre;background:#e0e0e0;'>@@ -0,0 +1,37 @@
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+PortSystem 1.0
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+PortGroup github 1.0
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+github.setup sobolevn git-secret 0.3.2 v
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+revision 0
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+homepage https://git-secret.io/
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+categories devel
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+platforms darwin
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+maintainers @pedrohdz \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ openmaintainer
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+license MIT
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+checksums rmd160 13f41a485bb0f5b1c7f4ea2174f2b4f3b1a6b1e8 \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ sha256 b7e95ed46339b3a04869ac5e82e3b225fcdaf0138000c0b25a078a6303ce5087
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+description Bash tool to store private data inside a git repo.
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+long_description A bash tool to store your private data inside a git \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ repo. How’s that? Basically, it just encrypts, using \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ gpg, the tracked files with the public keys of all \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ the users that you trust. So everyone of them can \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ decrypt these files using only their personal secret \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ key. Why deal with all this private-public keys \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ stuff? Well, to make it easier for everyone to \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ manage access rights. There are no passwords that \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ change. When someone is out - just delete their \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ public key, reencrypt the files, and they won’t be \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ able to decrypt secrets anymore.
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+depends_run bin:bash:bash \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ bin:git:git \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+ bin:gpg:gnupg2
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+destroot.args-append PREFIX="${prefix}"
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+use_configure no
</span></pre><pre style='margin:0'>
</pre>