From owner-svn-ports-all@freebsd.org Thu Mar 28 14:03:16 2019 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 85837155E802; Thu, 28 Mar 2019 14:03:16 +0000 (UTC) (envelope-from amdmi3@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 2468E72C95; Thu, 28 Mar 2019 14:03:16 +0000 (UTC) (envelope-from amdmi3@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id F2491202B0; Thu, 28 Mar 2019 14:03:15 +0000 (UTC) (envelope-from amdmi3@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x2SE3FeZ071177; Thu, 28 Mar 2019 14:03:15 GMT (envelope-from amdmi3@FreeBSD.org) Received: (from amdmi3@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x2SE3FNb071173; Thu, 28 Mar 2019 14:03:15 GMT (envelope-from amdmi3@FreeBSD.org) Message-Id: <201903281403.x2SE3FNb071173@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: amdmi3 set sender to amdmi3@FreeBSD.org using -f From: Dmitry Marakasov Date: Thu, 28 Mar 2019 14:03:15 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r497017 - in head/security: . py-trustme X-SVN-Group: ports-head X-SVN-Commit-Author: amdmi3 X-SVN-Commit-Paths: in head/security: . py-trustme X-SVN-Commit-Revision: 497017 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 2468E72C95 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.98 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_SHORT(-0.98)[-0.979,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_MEDIUM(-1.00)[-0.996,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 28 Mar 2019 14:03:16 -0000 Author: amdmi3 Date: Thu Mar 28 14:03:14 2019 New Revision: 497017 URL: https://svnweb.freebsd.org/changeset/ports/497017 Log: You wrote a cool network client or server. It encrypts connections using TLS. Your test suite needs to make TLS connections to itself. Uh oh. Your test suite probably doesn't have a valid TLS certificate. Now what? trustme is a tiny Python package that does one thing: it gives you a fake certificate authority (CA) that you can use to generate fake TLS certs to use in your tests. Well, technically they're real certs, they're just signed by your CA, which nobody trusts. But you can trust it. Trust me. WWW: https://github.com/python-trio/trustme Added: head/security/py-trustme/ head/security/py-trustme/Makefile (contents, props changed) head/security/py-trustme/distinfo (contents, props changed) head/security/py-trustme/pkg-descr (contents, props changed) Modified: head/security/Makefile Modified: head/security/Makefile ============================================================================== --- head/security/Makefile Thu Mar 28 13:15:05 2019 (r497016) +++ head/security/Makefile Thu Mar 28 14:03:14 2019 (r497017) @@ -1050,6 +1050,7 @@ PORTREVISION= 1 SUBDIR += py-tlslite SUBDIR += py-trezor SUBDIR += py-trustedpickle + SUBDIR += py-trustme SUBDIR += py-tuf SUBDIR += py-twofish SUBDIR += py-txtorcon Added: head/security/py-trustme/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-trustme/Makefile Thu Mar 28 14:03:14 2019 (r497017) @@ -0,0 +1,32 @@ +# Created by: Dmitry Marakasov +# $FreeBSD$ + +PORTNAME= trustme +PORTVERSION= 0.5.0 +CATEGORIES= security +MASTER_SITES= CHEESESHOP +PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} + +MAINTAINER= amdmi3@FreeBSD.org +COMMENT= Top quality TLS certs while you wait, for the discerning tester + +LICENSE= APACHE20 MIT +LICENSE_COMB= dual +LICENSE_FILE_APACHE20= ${WRKSRC}/LICENSE.APACHE2 +LICENSE_FILE_MIT= ${WRKSRC}/LICENSE.MIT + +RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}cryptography>=0:security/py-cryptography@${PY_FLAVOR} +TEST_DEPENDS= ${PYTHON_PKGNAMEPREFIX}pytest>=0:devel/py-pytest@${PY_FLAVOR} \ + ${PYTHON_PKGNAMEPREFIX}pytest-cov>=0:devel/py-pytest-cov@${PY_FLAVOR} \ + ${PY_FUTURES} \ + ${PYTHON_PKGNAMEPREFIX}openssl>=0:security/py-openssl@${PY_FLAVOR} \ + ${PYTHON_PKGNAMEPREFIX}service_identity>=0:security/py-service_identity@${PY_FLAVOR} + +USES= python +USE_PYTHON= autoplist distutils +NO_ARCH= yes + +do-test: + @cd ${WRKSRC} && ${PYTHON_CMD} -m pytest + +.include Added: head/security/py-trustme/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-trustme/distinfo Thu Mar 28 14:03:14 2019 (r497017) @@ -0,0 +1,3 @@ +TIMESTAMP = 1553779948 +SHA256 (trustme-0.5.0.tar.gz) = 89b8d689013afeaa34b63e77f6d60eebad63edc4b247e744c7d6d891ed13a564 +SIZE (trustme-0.5.0.tar.gz) = 21232 Added: head/security/py-trustme/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-trustme/pkg-descr Thu Mar 28 14:03:14 2019 (r497017) @@ -0,0 +1,13 @@ +You wrote a cool network client or server. It encrypts connections +using TLS. Your test suite needs to make TLS connections to itself. + +Uh oh. Your test suite probably doesn't have a valid TLS certificate. +Now what? + +trustme is a tiny Python package that does one thing: it gives you +a fake certificate authority (CA) that you can use to generate fake +TLS certs to use in your tests. Well, technically they're real +certs, they're just signed by your CA, which nobody trusts. But you +can trust it. Trust me. + +WWW: https://github.com/python-trio/trustme