From owner-svn-ports-head@FreeBSD.ORG Tue Sep 30 14:04:35 2014 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id AE2DCFF2; Tue, 30 Sep 2014 14:04:35 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 99DFCF74; Tue, 30 Sep 2014 14:04:35 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id s8UE4Z67011187; Tue, 30 Sep 2014 14:04:35 GMT (envelope-from mva@FreeBSD.org) Received: (from mva@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id s8UE4Yfn011183; Tue, 30 Sep 2014 14:04:34 GMT (envelope-from mva@FreeBSD.org) Message-Id: <201409301404.s8UE4Yfn011183@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: mva set sender to mva@FreeBSD.org using -f From: Marcus von Appen Date: Tue, 30 Sep 2014 14:04:34 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r369606 - in head/security: . py-service_identity X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 30 Sep 2014 14:04:35 -0000 Author: mva Date: Tue Sep 30 14:04:34 2014 New Revision: 369606 URL: http://svnweb.freebsd.org/changeset/ports/369606 QAT: https://qat.redports.org/buildarchive/r369606/ Log: service_identity aspires to give you all the tools you need for verifying whether a certificate is valid for the intended purposes. In the simplest case, this means host name verification. However, service_identity implements RFC 6125 fully and plans to add other relevant RFCs too. WWW: https://github.com/pyca/service_identity PR: 193930 Submitted by: Axel Rau Added: head/security/py-service_identity/ head/security/py-service_identity/Makefile (contents, props changed) head/security/py-service_identity/distinfo (contents, props changed) head/security/py-service_identity/pkg-descr (contents, props changed) Modified: head/security/Makefile Modified: head/security/Makefile ============================================================================== --- head/security/Makefile Tue Sep 30 14:04:22 2014 (r369605) +++ head/security/Makefile Tue Sep 30 14:04:34 2014 (r369606) @@ -796,6 +796,7 @@ SUBDIR += py-pysha3 SUBDIR += py-python-registry SUBDIR += py-rsa + SUBDIR += py-service_identity SUBDIR += py-slowaes SUBDIR += py-ssh SUBDIR += py-sslstrip Added: head/security/py-service_identity/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-service_identity/Makefile Tue Sep 30 14:04:34 2014 (r369606) @@ -0,0 +1,24 @@ +# Created by: Axel Rau +# $FreeBSD$ + +PORTNAME= service_identity +PORTVERSION= 14.0.0 +CATEGORIES= security python +MASTER_SITES= CHEESESHOP +PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} + +MAINTAINER= axel.rau@chaos1.de +COMMENT= Service identity verification for pyOpenSSL + +LICENSE= MIT +LICENSE_FILE= ${WRKSRC}/LICENSE + +RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}openssl>=0.14:${PORTSDIR}/security/py-openssl \ + ${PYTHON_PKGNAMEPREFIX}asn1>=0.1.7:${PORTSDIR}/devel/py-asn1 \ + ${PYTHON_PKGNAMEPREFIX}asn1-modules>=0.0.5:${PORTSDIR}/devel/py-asn1-modules \ + ${PYTHON_PKGNAMEPREFIX}characteristic>=14.0.0:${PORTSDIR}/devel/py-characteristic + +USES= python +USE_PYTHON= distutils autoplist + +.include Added: head/security/py-service_identity/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-service_identity/distinfo Tue Sep 30 14:04:34 2014 (r369606) @@ -0,0 +1,2 @@ +SHA256 (service_identity-14.0.0.tar.gz) = 3105a319a7c558490666694f599be0c377ad54824eefb404cde4ce49e74a4f5a +SIZE (service_identity-14.0.0.tar.gz) = 26033 Added: head/security/py-service_identity/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-service_identity/pkg-descr Tue Sep 30 14:04:34 2014 (r369606) @@ -0,0 +1,9 @@ +service_identity aspires to give you all the tools you need +for verifying whether a certificate is valid for the intended +purposes. + +In the simplest case, this means host name verification. +However, service_identity implements RFC 6125 fully and +plans to add other relevant RFCs too. + +WWW: https://github.com/pyca/service_identity