FreshPorts -- The Place For Ports notbugIf you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
py-josepy JOSE protocol implementation in Python
1.0.1 security on this many watch lists=0 search for ports that depend on this port Find issues related to this port Report an issue related to this port
Maintainer: python@FreeBSD.org search for ports maintained by this maintainer
Port Added: 22 Jan 2018 15:40:22
Also Listed In: python
License: APACHE20
JOSE (Javascript Object Signing and Encryption) is a Python implementation
of the standards developed by IETF Javascript Object Signing and Encryption
(Active WG), in particular the following RFCs:

- JSON Web Algorithms (JWA)
- JSON Web Key (JWK)
- JSON Web Signature (JWS)

Originally developed as part of the ACME protocol implementation.

WWW: https://josepy.readthedocs.io/en/latest/
SVNWeb : Homepage : PortsMon
There is no configure plist information for this port

To install the port: cd /usr/ports/security/py-josepy/ && make install clean
To add the package: pkg install py27-josepy

PKGNAME: py27-josepy

distinfo:

TIMESTAMP = 1516619168
SHA256 (josepy-1.0.1.tar.gz) = 9f48b88ca37f0244238b1cc77723989f7c54f7b90b2eee6294390bacfe870acc
SIZE (josepy-1.0.1.tar.gz) = 50251


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. py27-setuptools>0 : devel/py-setuptools@py27
  2. python2.7 : lang/python27
Runtime dependencies:
  1. py27-cryptography>=0.8 : security/py-cryptography@py27
  2. py27-openssl>=0.13 : security/py-openssl@py27
  3. py27-setuptools>=1.0 : devel/py-setuptools@py27
  4. py27-six>=1.9.0 : devel/py-six@py27
  5. py27-setuptools>0 : devel/py-setuptools@py27
  6. python2.7 : lang/python27

This port is required by:

for Run * - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...
Configuration Options
     No options to configure

USES:
python

Master Sites:
  1. https://files.pythonhosted.org/packages/source/j/josepy/
  2. https://pypi.python.org/packages/source/j/josepy/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2017-11-30
    Affects: */py*
    Author: mat@FreeBSD.org
    Reason: 
      Ports using Python via USES=python are now flavored.  All the py3-* ports
      have been removed and folded into their py-* master ports.
    
      People using Poudriere 3.2+ and binary packages do not have to do anything.
    
      For other people, to build the Python 3.6 version of, for example,
      databases/py-gdbm, you need to run:
    
        # make FLAVOR=py36 install
    
    

Number of commits found: 2

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
12 Feb 2018 23:11:38
Original commit files touched by this commit  1.0.1
Revision:461672
cpm search for other commits by this committer
Pass maintainership to python@
22 Jan 2018 15:40:11
Original commit files touched by this commit  1.0.1
Revision:459658
cpm search for other commits by this committer
security/py-josepy: JOSE protocol implementation in Python

JOSE (Javascript Object Signing and Encryption) is a Python implementation
of the standards developed by IETF Javascript Object Signing and Encryption
(Active WG), in particular the following RFCs:

- JSON Web Algorithms (JWA)
- JSON Web Key (JWK)
- JSON Web Signature (JWS)

Originally developed as part of the ACME protocol implementation.

WWW: https://josepy.readthedocs.io/en/latest/

Differential Revision:	https://reviews.freebsd.org/D14013

Number of commits found: 2

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
p5-MojoliciousFeb 17
broFeb 16
broFeb 16
bugzilla44Feb 16
bugzilla50Feb 16
consulFeb 16
librawFeb 15
librawFeb 15
quaggaFeb 15
bitmessageFeb 14
jenkinsFeb 14
jenkins-ltsFeb 14
bchunkFeb 13
bchunkFeb 13
bchunkFeb 13

27 vulnerabilities affecting 83 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2018-02-17 19:10:49


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 32862
Broken 91
Deprecated 86
Ignore 337
Forbidden 4
Restricted 169
No CDROM 77
Vulnerable 38
Expired 7
Set to expire 76
Interactive 0
new 24 hours 2
new 48 hours5
new 7 days1669
new fortnight12942
new month13055

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2018 Dan Langille. All rights reserved.