diff options
author | Dan Langille <dvl@FreeBSD.org> | 2018-07-26 16:51:18 +0000 |
---|---|---|
committer | Dan Langille <dvl@FreeBSD.org> | 2018-07-26 16:51:18 +0000 |
commit | 7b0f696caa5bb92e6db00e417b7d76f3870d51c6 (patch) | |
tree | 194bd9f005a8fca2f515caa9bffacf8be8a76415 /security/py-python-jose | |
parent | www/tomcat9: mark additional config files with @sample (diff) |
A JOSE implementation in Python
The JavaScript Object Signing and Encryption (JOSE) technologies - JSON Web
Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), and JSON Web
Algorithms (JWA) - collectively can be used to encrypt and/or sign content
using a variety of algorithms. While the full set of permutations is extremely
large, and might be daunting to some, it is expected that most applications
will only use a small set of algorithms to meet their needs.
Diffstat (limited to 'security/py-python-jose')
-rw-r--r-- | security/py-python-jose/Makefile | 24 | ||||
-rw-r--r-- | security/py-python-jose/distinfo | 3 | ||||
-rw-r--r-- | security/py-python-jose/pkg-descr | 20 |
3 files changed, 47 insertions, 0 deletions
diff --git a/security/py-python-jose/Makefile b/security/py-python-jose/Makefile new file mode 100644 index 000000000000..2a0336f25c80 --- /dev/null +++ b/security/py-python-jose/Makefile @@ -0,0 +1,24 @@ +# Created by: Dan Langille <dvl@sourcefire.com> +# $FreeBSD$ + +PORTNAME= python-jose +PORTVERSION= 3.0.0 +CATEGORIES= security +MASTER_SITES= CHEESESHOP +PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} + +MAINTAINER= dvl@FreeBSD.org +COMMENT= Client SDK for TIP API which require Authentication Tokens + +LICENSE= MIT + +USES= python +USE_PYTHON= distutils autoplist + +RUN_DEPENDS+= ${PYTHON_PKGNAMEPREFIX}future>0:devel/py-future@${PY_FLAVOR} +RUN_DEPENDS+= ${PYTHON_PKGNAMEPREFIX}ecdsa>0:security/py-ecdsa@${PY_FLAVOR} +RUN_DEPENDS+= ${PYTHON_PKGNAMEPREFIX}pycryptodome>0:security/py-pycryptodome@${PY_FLAVOR} +RUN_DEPENDS+= ${PYTHON_PKGNAMEPREFIX}rsa>0:security/py-rsa@${PY_FLAVOR} +RUN_DEPENDS+= ${PYTHON_PKGNAMEPREFIX}six>0:devel/py-six@${PY_FLAVOR} + +.include <bsd.port.mk> diff --git a/security/py-python-jose/distinfo b/security/py-python-jose/distinfo new file mode 100644 index 000000000000..2d92fb0996f0 --- /dev/null +++ b/security/py-python-jose/distinfo @@ -0,0 +1,3 @@ +TIMESTAMP = 1532029092 +SHA256 (python-jose-3.0.0.tar.gz) = e8255fb3cc524c04f4c790547a6215468f2a32d3a866424175523359e69f3aeb +SIZE (python-jose-3.0.0.tar.gz) = 19180 diff --git a/security/py-python-jose/pkg-descr b/security/py-python-jose/pkg-descr new file mode 100644 index 000000000000..ea7743d4e993 --- /dev/null +++ b/security/py-python-jose/pkg-descr @@ -0,0 +1,20 @@ +A JOSE implementation in Python + +The JavaScript Object Signing and Encryption (JOSE) technologies - JSON Web +Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), and JSON Web +Algorithms (JWA) - collectively can be used to encrypt and/or sign content +using a variety of algorithms. While the full set of permutations is extremely +large, and might be daunting to some, it is expected that most applications +will only use a small set of algorithms to meet their needs. + +Usage + +>>> from jose import jwt +>>> token = jwt.encode({'key': 'value'}, 'secret', algorithm='HS256') +u'eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJrZXkiOiJ2YWx1ZSJ9.FG-8UppwHaFp1LgRYQQeS6EDQF7_6-bMFegNucHjmWg' + +>>> jwt.decode(token, 'secret', algorithms=['HS256']) +{u'key': u'value'} + + +WWW: https://github.com/mpdavis/python-jose |