trufflehog/trufflehog.spec
Jeff Kowalczyk 2b125772e2 Accepting request 1152031 from home:ph03nix
- Update to version 3.68.2:
  * fix(deps): update module google.golang.org/api to v0.167.0 (#2512)
  * fix(deps): update module github.com/xanzy/go-gitlab to v0.98.0 (#2511)
  * fix(deps): update module github.com/aws/aws-sdk-go to v1.50.25 (#2509)
  * fix(deps): update golang.org/x/exp digest to 814bf88 (#2508)
  * fix(deps): update module github.com/golang-jwt/jwt/v4 to v5 (#2455)
  * fix(deps): update module github.com/google/go-github/v57 to v59 (#2464)
  * fix prefix check when returning early (#2503)
  * Clean up some detectors (#2501)
  * Gitlab scan targets (#2470)
  * Tell git to ignore directory ownership (fixes #2495) (#2496)

OBS-URL: https://build.opensuse.org/request/show/1152031
OBS-URL: https://build.opensuse.org/package/show/devel:languages:go/trufflehog?expand=0&rev=67
2024-02-27 13:52:40 +00:00

56 lines
1.5 KiB
RPMSpec

#
# spec file for package trufflehog
#
# Copyright (c) 2024 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
Name: trufflehog
Version: 3.68.2
Release: 0
Summary: CLI tool to find exposed secrets in source and archives
License: AGPL-3.0-or-later
URL: https://github.com/trufflesecurity/trufflehog
Source: trufflehog-%{version}.tar.gz
Source1: vendor.tar.gz
BuildRequires: golang(API) >= 1.21
%description
TruffleHog is a scanning engine that helps find exposed secrets
within e.g. GitHub/GitLab repos, AWS S3 buckets, GCS buckets,
Docker images, Circle CI/Travis CI setups, or in individual files.
%prep
%autosetup -D -a 1
%build
%ifnarch ppc64
export GOFLAGS="-buildmode=pie"
%endif
go build
%check
# execute the binary as a basic check
./%{name} --help
%install
install -D -m 0755 %{name} %{buildroot}%{_bindir}/%{name}
%files
%doc README.md
%license LICENSE
%{_bindir}/%{name}
%changelog