diff options
author | CoprDistGit <infra@openeuler.org> | 2023-05-31 06:43:50 +0000 |
---|---|---|
committer | CoprDistGit <infra@openeuler.org> | 2023-05-31 06:43:50 +0000 |
commit | 39f592ffed5bd185ef43d025ea978c9cacc5fd07 (patch) | |
tree | 6ca4c2ddf7dfd2ea717c4241a2e17a76f65b4a04 | |
parent | 103721b3351eb3721ee2b396b66a5a735f300454 (diff) |
automatic import of python-knox
-rw-r--r-- | .gitignore | 1 | ||||
-rw-r--r-- | python-knox.spec | 84 | ||||
-rw-r--r-- | sources | 1 |
3 files changed, 86 insertions, 0 deletions
@@ -0,0 +1 @@ +/knox-0.1.14.tar.gz diff --git a/python-knox.spec b/python-knox.spec new file mode 100644 index 0000000..5ef9bc2 --- /dev/null +++ b/python-knox.spec @@ -0,0 +1,84 @@ +%global _empty_manifest_terminate_build 0 +Name: python-knox +Version: 0.1.14 +Release: 1 +Summary: Certificate management utilities with Vault backend +License: Apache-2.0 +URL: https://github.com/8x8cloud/knox +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/5e/aa/972f47a05c72af17254a05b7ce9a454c29f92bf69b8701700fc5a01dad8a/knox-0.1.14.tar.gz +BuildArch: noarch + + +%description +The name is derived from "Fort Knox" the safest place to store valuables in history. At least that is the myth. This tool or set of utilities is explicitly for managing TLS certificates including metadata about them and storing it in a backend. +Primary components used are Python, Hashicorp Vault, Let's Encrypt and certbot. +[Let’s Encrypt](<https://letsencrypt.org>) is a certificate authority managed by the [Internet Security Research Group (ISRG)](<https://www.abetterinternet.org/about/>). It utilizes the [Automated Certificate Management Environment (ACME)](<https://github.com/ietf-wg-acme/acme/>) to automatically deploy free SSL certificates that are trusted by nearly all major browsers. [The certificate compatibility list can be found here](<https://letsencrypt.org/docs/certificate-compatibility/>). Lets Encrypt has revolutionized the distribution of certificates for public facing servers. +[Hashicorp Vault](<https://www.vaultproject.io/>) is a tool for storing secrets. It has a [PKI Secret Engine](<https://www.vaultproject.io/docs/secrets/pki/index.html>) backend which allows to use it as a certificate authority in an internal public key infrastructure deployment. Until now, Vault is best suited for issuing private certificates. +Let's Encrypt and Hashicorp Vault are complementary in certificate management. + +%package -n python3-knox +Summary: Certificate management utilities with Vault backend +Provides: python-knox +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-knox +The name is derived from "Fort Knox" the safest place to store valuables in history. At least that is the myth. This tool or set of utilities is explicitly for managing TLS certificates including metadata about them and storing it in a backend. +Primary components used are Python, Hashicorp Vault, Let's Encrypt and certbot. +[Let’s Encrypt](<https://letsencrypt.org>) is a certificate authority managed by the [Internet Security Research Group (ISRG)](<https://www.abetterinternet.org/about/>). It utilizes the [Automated Certificate Management Environment (ACME)](<https://github.com/ietf-wg-acme/acme/>) to automatically deploy free SSL certificates that are trusted by nearly all major browsers. [The certificate compatibility list can be found here](<https://letsencrypt.org/docs/certificate-compatibility/>). Lets Encrypt has revolutionized the distribution of certificates for public facing servers. +[Hashicorp Vault](<https://www.vaultproject.io/>) is a tool for storing secrets. It has a [PKI Secret Engine](<https://www.vaultproject.io/docs/secrets/pki/index.html>) backend which allows to use it as a certificate authority in an internal public key infrastructure deployment. Until now, Vault is best suited for issuing private certificates. +Let's Encrypt and Hashicorp Vault are complementary in certificate management. + +%package help +Summary: Development documents and examples for knox +Provides: python3-knox-doc +%description help +The name is derived from "Fort Knox" the safest place to store valuables in history. At least that is the myth. This tool or set of utilities is explicitly for managing TLS certificates including metadata about them and storing it in a backend. +Primary components used are Python, Hashicorp Vault, Let's Encrypt and certbot. +[Let’s Encrypt](<https://letsencrypt.org>) is a certificate authority managed by the [Internet Security Research Group (ISRG)](<https://www.abetterinternet.org/about/>). It utilizes the [Automated Certificate Management Environment (ACME)](<https://github.com/ietf-wg-acme/acme/>) to automatically deploy free SSL certificates that are trusted by nearly all major browsers. [The certificate compatibility list can be found here](<https://letsencrypt.org/docs/certificate-compatibility/>). Lets Encrypt has revolutionized the distribution of certificates for public facing servers. +[Hashicorp Vault](<https://www.vaultproject.io/>) is a tool for storing secrets. It has a [PKI Secret Engine](<https://www.vaultproject.io/docs/secrets/pki/index.html>) backend which allows to use it as a certificate authority in an internal public key infrastructure deployment. Until now, Vault is best suited for issuing private certificates. +Let's Encrypt and Hashicorp Vault are complementary in certificate management. + +%prep +%autosetup -n knox-0.1.14 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-knox -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Wed May 31 2023 Python_Bot <Python_Bot@openeuler.org> - 0.1.14-1 +- Package Spec generated @@ -0,0 +1 @@ +f1e091ecad18835ec9c3082b7cea3e48 knox-0.1.14.tar.gz |