summaryrefslogtreecommitdiff
path: root/security/py-python-jose
diff options
context:
space:
mode:
authorDan Langille <dvl@FreeBSD.org>2018-07-26 16:51:18 +0000
committerDan Langille <dvl@FreeBSD.org>2018-07-26 16:51:18 +0000
commit7b0f696caa5bb92e6db00e417b7d76f3870d51c6 (patch)
tree194bd9f005a8fca2f515caa9bffacf8be8a76415 /security/py-python-jose
parentwww/tomcat9: mark additional config files with @sample (diff)
A JOSE implementation in Python
The JavaScript Object Signing and Encryption (JOSE) technologies - JSON Web Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), and JSON Web Algorithms (JWA) - collectively can be used to encrypt and/or sign content using a variety of algorithms. While the full set of permutations is extremely large, and might be daunting to some, it is expected that most applications will only use a small set of algorithms to meet their needs.
Diffstat (limited to 'security/py-python-jose')
-rw-r--r--security/py-python-jose/Makefile24
-rw-r--r--security/py-python-jose/distinfo3
-rw-r--r--security/py-python-jose/pkg-descr20
3 files changed, 47 insertions, 0 deletions
diff --git a/security/py-python-jose/Makefile b/security/py-python-jose/Makefile
new file mode 100644
index 000000000000..2a0336f25c80
--- /dev/null
+++ b/security/py-python-jose/Makefile
@@ -0,0 +1,24 @@
+# Created by: Dan Langille <dvl@sourcefire.com>
+# $FreeBSD$
+
+PORTNAME= python-jose
+PORTVERSION= 3.0.0
+CATEGORIES= security
+MASTER_SITES= CHEESESHOP
+PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
+
+MAINTAINER= dvl@FreeBSD.org
+COMMENT= Client SDK for TIP API which require Authentication Tokens
+
+LICENSE= MIT
+
+USES= python
+USE_PYTHON= distutils autoplist
+
+RUN_DEPENDS+= ${PYTHON_PKGNAMEPREFIX}future>0:devel/py-future@${PY_FLAVOR}
+RUN_DEPENDS+= ${PYTHON_PKGNAMEPREFIX}ecdsa>0:security/py-ecdsa@${PY_FLAVOR}
+RUN_DEPENDS+= ${PYTHON_PKGNAMEPREFIX}pycryptodome>0:security/py-pycryptodome@${PY_FLAVOR}
+RUN_DEPENDS+= ${PYTHON_PKGNAMEPREFIX}rsa>0:security/py-rsa@${PY_FLAVOR}
+RUN_DEPENDS+= ${PYTHON_PKGNAMEPREFIX}six>0:devel/py-six@${PY_FLAVOR}
+
+.include <bsd.port.mk>
diff --git a/security/py-python-jose/distinfo b/security/py-python-jose/distinfo
new file mode 100644
index 000000000000..2d92fb0996f0
--- /dev/null
+++ b/security/py-python-jose/distinfo
@@ -0,0 +1,3 @@
+TIMESTAMP = 1532029092
+SHA256 (python-jose-3.0.0.tar.gz) = e8255fb3cc524c04f4c790547a6215468f2a32d3a866424175523359e69f3aeb
+SIZE (python-jose-3.0.0.tar.gz) = 19180
diff --git a/security/py-python-jose/pkg-descr b/security/py-python-jose/pkg-descr
new file mode 100644
index 000000000000..ea7743d4e993
--- /dev/null
+++ b/security/py-python-jose/pkg-descr
@@ -0,0 +1,20 @@
+A JOSE implementation in Python
+
+The JavaScript Object Signing and Encryption (JOSE) technologies - JSON Web
+Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), and JSON Web
+Algorithms (JWA) - collectively can be used to encrypt and/or sign content
+using a variety of algorithms. While the full set of permutations is extremely
+large, and might be daunting to some, it is expected that most applications
+will only use a small set of algorithms to meet their needs.
+
+Usage
+
+>>> from jose import jwt
+>>> token = jwt.encode({'key': 'value'}, 'secret', algorithm='HS256')
+u'eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJrZXkiOiJ2YWx1ZSJ9.FG-8UppwHaFp1LgRYQQeS6EDQF7_6-bMFegNucHjmWg'
+
+>>> jwt.decode(token, 'secret', algorithms=['HS256'])
+{u'key': u'value'}
+
+
+WWW: https://github.com/mpdavis/python-jose