From owner-svn-ports-head@freebsd.org Sat Dec 5 11:08:47 2015 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D8AD4A41F7E; Sat, 5 Dec 2015 11:08:47 +0000 (UTC) (envelope-from brnrd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id AC53D197B; Sat, 5 Dec 2015 11:08:47 +0000 (UTC) (envelope-from brnrd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id tB5B8kjh031501; Sat, 5 Dec 2015 11:08:46 GMT (envelope-from brnrd@FreeBSD.org) Received: (from brnrd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id tB5B8kxx031496; Sat, 5 Dec 2015 11:08:46 GMT (envelope-from brnrd@FreeBSD.org) Message-Id: <201512051108.tB5B8kxx031496@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: brnrd set sender to brnrd@FreeBSD.org using -f From: Bernard Spil Date: Sat, 5 Dec 2015 11:08:46 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r403057 - in head/security: py-acme py-letsencrypt X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 05 Dec 2015 11:08:47 -0000 Author: brnrd Date: Sat Dec 5 11:08:46 2015 New Revision: 403057 URL: https://svnweb.freebsd.org/changeset/ports/403057 Log: security/py-letsencrypt: Update to 0.1.0 - Update py-letsencrypt to 0.1.0 - Update py-acme to 0.1.0 - Update pkg-message accordingly This marks the first non-development release of Letsencrypt.org for the public BETA Reviewed by: koobs (mentor, maintainer), cpm_fbsd.es (maintainer), feld Approved by: koobs (mentor, maintainer), cpm_fbsd.es (maintainer), feld MFH: 2015Q4 Differential Revision: https://reviews.freebsd.org/D4360 Modified: head/security/py-acme/Makefile head/security/py-acme/distinfo head/security/py-letsencrypt/Makefile head/security/py-letsencrypt/distinfo head/security/py-letsencrypt/pkg-message Modified: head/security/py-acme/Makefile ============================================================================== --- head/security/py-acme/Makefile Sat Dec 5 10:46:58 2015 (r403056) +++ head/security/py-acme/Makefile Sat Dec 5 11:08:46 2015 (r403057) @@ -2,7 +2,7 @@ # $FreeBSD$ PORTNAME= acme -DISTVERSION= 0.0.0.dev20151123 +DISTVERSION= 0.1.0 CATEGORIES= security python MASTER_SITES= CHEESESHOP PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} Modified: head/security/py-acme/distinfo ============================================================================== --- head/security/py-acme/distinfo Sat Dec 5 10:46:58 2015 (r403056) +++ head/security/py-acme/distinfo Sat Dec 5 11:08:46 2015 (r403057) @@ -1,2 +1,2 @@ -SHA256 (acme-0.0.0.dev20151123.tar.gz) = 0015b55918360a46e38ca2076ba84eb14ef35b8525023914c40ed8c403473840 -SIZE (acme-0.0.0.dev20151123.tar.gz) = 82399 +SHA256 (acme-0.1.0.tar.gz) = c3ebbfecd1f787ef6e309ddcc412c65d0eea318d00d0aff610bdb7ff09a8403a +SIZE (acme-0.1.0.tar.gz) = 82880 Modified: head/security/py-letsencrypt/Makefile ============================================================================== --- head/security/py-letsencrypt/Makefile Sat Dec 5 10:46:58 2015 (r403056) +++ head/security/py-letsencrypt/Makefile Sat Dec 5 11:08:46 2015 (r403057) @@ -2,7 +2,7 @@ # $FreeBSD$ PORTNAME= letsencrypt -DISTVERSION= 0.0.0.dev20151123 +DISTVERSION= 0.1.0 CATEGORIES= security python MASTER_SITES= CHEESESHOP PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} Modified: head/security/py-letsencrypt/distinfo ============================================================================== --- head/security/py-letsencrypt/distinfo Sat Dec 5 10:46:58 2015 (r403056) +++ head/security/py-letsencrypt/distinfo Sat Dec 5 11:08:46 2015 (r403057) @@ -1,2 +1,2 @@ -SHA256 (letsencrypt-0.0.0.dev20151123.tar.gz) = 365c51e8f8d4992fa60f7aa86bd13c1bf256c998b128d9cd6f1d0da7eef2f25c -SIZE (letsencrypt-0.0.0.dev20151123.tar.gz) = 159702 +SHA256 (letsencrypt-0.1.0.tar.gz) = 81f6276176d254b7cf5f95b564700bc71f12b11034d4020389ca4c317e3769fd +SIZE (letsencrypt-0.1.0.tar.gz) = 167375 Modified: head/security/py-letsencrypt/pkg-message ============================================================================== --- head/security/py-letsencrypt/pkg-message Sat Dec 5 10:46:58 2015 (r403056) +++ head/security/py-letsencrypt/pkg-message Sat Dec 5 11:08:46 2015 (r403057) @@ -1,23 +1,13 @@ =========================================================================== -This software is a DEVELOPER PREVIEW intended for developers, testers and -early-adopters only. Support requests and bug reports should be sent directly -and only to the upstream project: https://github.com/letsencrypt/letsencrypt - -letsencrypt is currently in Closed Beta (invite only). In order to -acquire certificates, you must have applied for and received an invitation, -and have your domains whitelisted FIRST. +The Let's Encrypt Client is BETA SOFTWARE. It contains plenty of bugs and +rough edges, and should be tested thoroughly in staging environments before +use on production systems. This port installs the "standalone" Python client only, which does not use and is not the letsencrypt-auto bootstrap/wrapper script. -By default, the client will authenticate and obtain certificates using, and -signed by a TEST(Staging) Certificate Authority (CA). These certificates will -NOT be trusted publicly. - -To obtain certificates, use the --server argument pointing to the correct -server URL as documented in your invitation email, and use the 'certonly' -command as follows: +To obtain certificates, use use the 'certonly' command as follows: # sudo letsencrypt --server certonly