notbugIf you buy from Amazon USA, please support us by using this link.
Port details
py-josepy JOSE protocol implementation in Python
1.1.0 security on this many watch lists=2 search for ports that depend on this port Find issues related to this port Report an issue related to this port
Maintainer: python@FreeBSD.org search for ports maintained by this maintainer
Port Added: 22 Jan 2018 15:40:22
Also Listed In: python
License: APACHE20
JOSE (Javascript Object Signing and Encryption) is a Python implementation
of the standards developed by IETF Javascript Object Signing and Encryption
(Active WG), in particular the following RFCs:

- JSON Web Algorithms (JWA)
- JSON Web Key (JWK)
- JSON Web Signature (JWS)

Originally developed as part of the ACME protocol implementation.

WWW: https://josepy.readthedocs.io/en/latest/
SVNWeb : Homepage : PortsMon
There is no configure plist information for this port

To install the port: cd /usr/ports/security/py-josepy/ && make install clean
To add the package: pkg install py27-josepy

PKGNAME: py27-josepy

distinfo:

TIMESTAMP = 1523717961
SHA256 (josepy-1.1.0.tar.gz) = fb5c62c77d26e04df29cb5ecd01b9ce69b6fcc9e521eb1ca193b7faa2afa7086
SIZE (josepy-1.1.0.tar.gz) = 51286


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. py27-setuptools>0 : devel/py-setuptools@py27
  2. python2.7 : lang/python27
Runtime dependencies:
  1. py27-cryptography>=0.8 : security/py-cryptography@py27
  2. py27-openssl>=0.13 : security/py-openssl@py27
  3. py27-six>=1.9.0 : devel/py-six@py27
  4. py27-setuptools>0 : devel/py-setuptools@py27
  5. python2.7 : lang/python27

This port is required by:

for Run * - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...
Configuration Options
     No options to configure

USES:
python

Master Sites:
  1. https://files.pythonhosted.org/packages/source/j/josepy/
  2. https://pypi.org/packages/source/j/josepy/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2017-11-30
    Affects: */py*
    Author: mat@FreeBSD.org
    Reason: 
      Ports using Python via USES=python are now flavored.  All the py3-* ports
      have been removed and folded into their py-* master ports.
    
      People using Poudriere 3.2+ and binary packages do not have to do anything.
    
      For other people, to build the Python 3.6 version of, for example,
      databases/py-gdbm, you need to run:
    
        # make FLAVOR=py36 install
    
    

Number of commits found: 4

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
20 Jun 2018 17:05:44
Original commit files touched by this commit  1.1.0
Revision:472884
mat search for other commits by this committer
Use PY_FLAVOR for dependencies.

FLAVOR is the current port's flavor, it should not be used outside of
this scope.

Sponsored by:	Absolight
14 Apr 2018 23:59:01
Original commit files touched by this commit  1.1.0
Revision:467353
sunpoet search for other commits by this committer
Update to 1.1.0

- Remove py-setuptools from RUN_DEPENDS: it is already added by framework
- Add complete TEST_DEPENDS
- Allow concurrent installation (USE_PYTHON=concurrent)

Changes:	https://github.com/certbot/josepy/blob/master/CHANGELOG.rst
12 Feb 2018 23:11:38
Original commit files touched by this commit  1.0.1
Revision:461672
cpm search for other commits by this committer
Pass maintainership to python@
22 Jan 2018 15:40:11
Original commit files touched by this commit  1.0.1
Revision:459658
cpm search for other commits by this committer
security/py-josepy: JOSE protocol implementation in Python

JOSE (Javascript Object Signing and Encryption) is a Python implementation
of the standards developed by IETF Javascript Object Signing and Encryption
(Active WG), in particular the following RFCs:

- JSON Web Algorithms (JWA)
- JSON Web Key (JWK)
- JSON Web Signature (JWS)

Originally developed as part of the ACME protocol implementation.

WWW: https://josepy.readthedocs.io/en/latest/

Differential Revision:	https://reviews.freebsd.org/D14013

Number of commits found: 4

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
drupal7Oct 22
mariadb100-serverOct 20
mariadb101-serverOct 20
mariadb102-serverOct 20
mariadb103-serverOct 20
mariadb55-serverOct 20
mysql55-serverOct 20
mysql56-serverOct 20
mysql57-serverOct 20
mysql80-serverOct 20
percona55-serverOct 20
percona56-serverOct 20
percona57-serverOct 20
ruby23Oct 20
ruby24Oct 20

9 vulnerabilities affecting 102 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2018-10-22 17:21:57


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 35724
Broken 62
Deprecated 523
Ignore 348
Forbidden 3
Restricted 162
No CDROM 74
Vulnerable 44
Expired 18
Set to expire 496
Interactive 0
new 24 hours 2
new 48 hours10
new 7 days53
new fortnight79
new month225

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2018 Dan Langille. All rights reserved.