Python-secrets

Latest version: v24.10.12

Safety actively analyzes 681866 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 8

24.10.12

~~~~~~~~~~~~~~~~~~~~

Changed
^^^^^^^

- Now using Poetry for package management and installation.
- Refactored GitHub Actions workflows.
- Updated ReadTheDocs configuration and build process.
- (Versions 24.10.0 - 24.10.11 were fix attempts.)

23.4.2

~~~~~~~~~~~~~~~~~~~

Added
^^^^^

- Added bats test for `secrets find` command.

Changed
^^^^^^^

- Switched to using f-strings for formatting.
- Fixed broken bats tests.
- Update GitHub Actions workflows.

23.4.1

~~~~~~~~~~~~~~~~~~~

Added
^^^^^

- Added `secrets find` command.
- Added support for new variable type `boolean`.

Changed
^^^^^^^

- Updated GitHub Actions workflows (default to Python 3.9.16).
- Drop Python 3.7, 3.8, add Python 3.11 (default to 3.10) for `tox`.
- Fixed downstream dependency and `pip` installation problems.
- Resolved new `pep8` and `bandit` findings.

22.6.1

~~~~~~~~~~~~~~~~~~~

Added
^^^^^

- Added `--ignore-missing` option to continue when settings variables.
- Added 'Operational Security' section to README.

22.6.0

~~~~~~~~~~~~~~~~~~~

Added
^^^^^

- Add `about` command to expose selected settings for situational awareness.
- Add `pytest` code coverage reporting.
- Add BATS runtime tests related to changes.

Changed
^^^^^^^

- Fix caching bug with non-unique secret generation.
- Fix bugs with setting/deleting secrets.
- Improve secrets basedir initialization logic.
- Expand use of `pathlib.Path`.
- Improvements to source code, test, and vscode launch configuration quality.

22.5.1

~~~~~~~~~~~~~~~~~~~

Changed
^^^^^^^

- Switch to using factory pattern for secrets generation.
- General code quality and test improvements.
- Improve `secrets get` command logic and help.
- Fix `utils yaml-to-json` subcommand and tests.
- Resolve setuptools warnings.
- Separate utility functions from `utils` subcommands.

Removed
^^^^^^^

- Retire `consul_key` secret type in favor of `token_base64`.
- Retire insecure secrets types (e.g., use of SHA1).

Page 1 of 8

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.