<pre style='margin:0'>
Ryan Schmidt (ryandesign) pushed a commit to branch master
in repository macports-ports.

</pre>
<p><a href="https://github.com/macports/macports-ports/commit/96f0150cf2eb35ebd173eaa0672ac6209bb491e4">https://github.com/macports/macports-ports/commit/96f0150cf2eb35ebd173eaa0672ac6209bb491e4</a></p>
<pre style="white-space: pre; background: #F8F8F8">The following commit(s) were added to refs/heads/master by this push:
<span style='display:block; white-space:pre;color:#404040;'>     new 96f0150cf2e trivy: new port
</span>96f0150cf2e is described below

<span style='display:block; white-space:pre;color:#808000;'>commit 96f0150cf2eb35ebd173eaa0672ac6209bb491e4
</span>Author: Herby Gillot <herby.gillot@gmail.com>
AuthorDate: Thu Sep 10 10:50:57 2020 -0400

<span style='display:block; white-space:pre;color:#404040;'>    trivy: new port
</span>---
 security/trivy/Portfile | 36 ++++++++++++++++++++++++++++++++++++
 1 file changed, 36 insertions(+)

<span style='display:block; white-space:pre;color:#808080;'>diff --git a/security/trivy/Portfile b/security/trivy/Portfile
</span>new file mode 100644
<span style='display:block; white-space:pre;color:#808080;'>index 00000000000..c1ed57d72f9
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>--- /dev/null
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>+++ b/security/trivy/Portfile
</span><span style='display:block; white-space:pre;background:#e0e0e0;'>@@ -0,0 +1,36 @@
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+PortSystem          1.0
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+PortGroup           golang 1.0
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+go.setup            github.com/aquasecurity/trivy 0.11.0 v
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+description         A Simple and Comprehensive Vulnerability Scanner for \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    Containers, Suitable for CI
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+long_description    {*}${description}. Trivy detects vulnerabilities of OS \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    packages (Alpine, RHEL, CentOS, etc.) and application \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    dependencies (Bundler, Composer, npm, yarn, etc.). Trivy \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    is easy to use. Just install the binary and you're ready \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    to scan. All you need to do for scanning is to specify a \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    target such as an image name of the container.
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+categories          security sysutils
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+license             Apache-2
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+maintainers         {gmail.com:herby.gillot @herbygillot} \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    openmaintainer
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+checksums           rmd160  b62fcd70697845ab1712ef7aa13c298fb2a246af \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    sha256  db37ca075269f522ec8eedd2e5850044e241cfa08004bf7e236fbf36c7fe1c28 \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    size    20613356
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+build.cmd           make
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+build.args          VERSION=${version}
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+build.target        build
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+installs_libs       no
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+destroot {
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+    xinstall -m 755 ${worksrcpath}/${name} ${destroot}${prefix}/bin/
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+}
</span></pre><pre style='margin:0'>

</pre>