forked from jsonn/pkgsrc
-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
create mail/py-authres & mail/py-policyd-spf #421
Closed
coyhile
wants to merge
1
commit into
TritonDataCenter:joyent/release/trunk
from
coyhile:joyent/release/trunk
Closed
create mail/py-authres & mail/py-policyd-spf #421
coyhile
wants to merge
1
commit into
TritonDataCenter:joyent/release/trunk
from
coyhile:joyent/release/trunk
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
jsonn
referenced
this pull request
in jsonn/pkgsrc
Oct 26, 2016
This module (authres) is designed to provide support for RFC 5451/7001, originally http://tools.ietf.org/html/rfc5451 and currently http://tools.ietf.org/html/rfc7001 processing in Python. Packaged by Coy Hile in https://github.com/joyent/pkgsrc/pull/421
jperkin
pushed a commit
that referenced
this pull request
Oct 26, 2016
## v4.0.0 New features: * New Django samples. (#636) * Add support for RFC7636 PKCE. (#588) * Release as a universal wheel. (#665) Bug fixes: * Fix django authorization redirect by correctly checking validity of credentials. (#651) * Correct query loss when using parse_qsl to dict. (#622) * Switch django models from pickle to jsonpickle. (#614) * Support new MIDDLEWARE Django 1.10 aetting. (#623) * Remove usage of os.environ.setdefault. (#621) * Handle missing storage files correctly. (#576) * Try to revoke token with POST when getting a 405. (#662) Internal changes: * Use transport module for GCE environment check. (#612) * Remove __author__ lines and add contributors.md. (#627) * Clean up imports. (#625) * Use transport.request in tests. (#607) * Drop unittest2 dependency (#610) * Remove backslash line continuations. (#608) * Use transport helpers in system tests. (#606) * Clean up usage of HTTP mocks in tests. (#605) * Remove all uses of MagicMock. (#598) * Migrate test runner to pytest. (#569) * Merge util.py and _helpers.py. (#579) * Remove httplib2 imports from non-transport modules. (#577) Breaking changes: * Drop Python 3.3 support. (#603) * Drop Python 2.6 support. (#590) * Remove multistore_file. (#589) ## v3.0.0 * Populate `token_expiry` for GCE credentials. (#473) * Move GCE metadata interface to a separate module. (#520) * Populate `scopes` for GCE credentials. (#524) * Fix Python 3.5 compatibility. (#531) * Add `oauth2client.contrib.sqlalchemy`, a SQLAlchemy-based credential store. (#527) * Improve error when an invalid client secret is provided. (#530) * Add `oauth2client.contrib.multiprocess_storage`. This supersedes the functionality in `oauth2client.contrib.multistore_file`. (#504) * Pull httplib2 usage into a separate transport module. (#559, #561) * Refactor all django-related code into `oauth2client.contrib.django_util`. Add `DjangoORMStorage`, remove `FlowField`. (#546) * Fix application default credentials resolution order. (#570) * Add configurable timeout for GCE metadata server check. (#571) * Add warnings when using deprecated `approval_prompt='force'`. (#572) * Add deprecation warning to `oauth2client.contrib.multistore_file`. (#574) * (Hygiene) PEP8 compliance and various style fixes (#537, #540, #552, #562) * (Hygiene) Remove duplicated exception classes in `oauth2client.contrib.appengine`. (#533) NOTE: The next major release of oauth2client (v4.0.0) will remove the `oauth2client.contrib.multistore_file` module. ## v2.2.0 * Added support to override `token_uri` and `revoke_uri` in `oauth2client.service_account.ServiceAccountCredentials`. (#510) * `oauth2client.contrib.multistore_file` now handles `OSError` in addition to `IOError` because Windows may raise `OSError` where other platforms will raise `IOError`. * `oauth2client.contrib.django_util` and `oauth2client.contrib.django_orm` have been updated to support Django 1.8 - 1.10. Versions of Django below 1.8 will not work with these modules. ## v2.1.0 * Add basic support for JWT access credentials. (#503) * Fix `oauth2client.client.DeviceFlowInfo` to use UTC instead of the system timezone when calculating code expiration. ## v2.0.2 * Fix issue where `flask_util.UserOAuth2.required` would accept expired credentials (#452). * Fix issue where `flask_util` would fill the session with `Flow` objects (#498). * Fix issue with Python 3 binary strings in `Flow.step2_exchange` (#446). * Improve test coverage to 100%. ## v2.0.1 * Making scopes optional on Google Compute Engine `AppAssertionCredentials` and adding a warning that GCE won't honor scopes (#419) * Adding common `sign_blob()` to service account types and a `service_account_email` property. (#421) * Improving error message in P12 factory `ServiceAccountCredentials.from_p12_keyfile` when pyOpenSSL is missing. (#424) * Allowing default flags in `oauth2client.tools.run_flow()` rather than forcing users to create a dummy argparser (#426) * Removing `oauth2client.util.dict_to_tuple_key()` from public interface (#429) * Adding `oauth2client.contrib._appengine_ndb` helper module for `oauth2client.contrib.appengine` and moving most code that uses the `ndb` library into the helper (#434) * Fix error in `django_util` sample code (#438) ## v2.0.0-post1 * Fix Google Compute Engine breakage (#411, breakage introduced in #387) that made it impossible to obtain access tokens * Implement `ServiceAccountCredentials.from_p12_keyfile_buffer()` to allow passing a file-like object in addition to the factory constructor that uses a filename directly (#413) * Implement `ServiceAccountCredentials.create_delegated()` to allow upgrading a credential to one that acts on behalf of a given subject (#420)
Thanks! This has now been merged. I took the py-authres package as-is, but py-policyd-spf needed quite a bit of work (some of it not yours, e.g. py-spf was broken and depended upon the wrong PyDNS library), so you may want to have a look at my changes. Cheers! |
jsonn
referenced
this pull request
in jsonn/pkgsrc
Oct 27, 2016
This is python-policyd-spf, an external policy checker for the postfix mail server. It will use pyspf to check SPF records to determine if email should be rejected by your server. Based on https://github.com/joyent/pkgsrc/pull/421 by Coy Hile.
jperkin
pushed a commit
that referenced
this pull request
Jun 13, 2017
=== 4.1.0 === 4.1.0.rc1 * ProxyJump support [Ryan McGeary, #500] * Fix agent detection on Windows [Christian Koehler, #495] === 4.1.0.beta1 * Fix nil error when libsodium is not there [chapmajs ,#488] * SSH certificate support for client auth [David Bartley, #485] === 4.0.1 === 4.0.1.rc2 * ENV["HOME"] might be empty so filter non expandable paths [Matt Casper, #351] === 4.0.1.rc1 * support of rbnacl 4.0 and better error message [#479] * support include in config files [Kimura Masayuki, #475] * fixed issue with ruby 2.2 or older on windows [#472] === 4.0.0 === 4.0.0.rc3 * parse `+` character in config files [Christoph Lupprich, #470, #314] === 4.0.0.rc2 * Fixed OpenSSL 2.0/Ruby 2.4.0 warnings [Miklós Fazekas, #468] * Added ssh-ed25519 to KnownHosts:SUPPORTED_TYPE [detatka-kuzlatka-otevrete, Miklós Fazekas, #459] * Allow nil for :passhrase and passing in nil option is now a depreaction warning [Miklós Fazekas, #465] === 4.0.0.rc1 * Allow :password to be nil for capistrano v2 compatibility [Will Bryant, #357] * In next_packet if prefer consuming buffer before filling it again if we have enough data [Miklós Fazekas, #454] === 4.0.0.beta4 * Added exitstatus method to exec's return [Miklós Fazekas, #452] * Don't raise from exec if server closes transport just after channel close [Miklós Fazekas, #450] * Removed java_pageant, as jruby should be using regular pagent impl [Miklós Fazekas, ] * Use SSH_AUTH_SOCK if possible on windows (cygwin) [Miklós Fazekas, Martin Dürst, #365, #361] * HTTPS proxy support [Marcus Ilgner, #432] * Supports ruby 2.4.0.dev new exception type from OpenSSL::PKey.read === 4.0.0.beta3 * Fix Net::SSH::Disconnect exceptions when channels are closed cleanly [Miklos Fazekas, #421, #422] === 4.0.0.beta2 * Fix raiseUnlessLoaded undefined ERROR issue [Miklos Fazekas, #418] === 4.0.0.beta1 * Fix pageant [elconas, #235] * Relaxed rbnacl,rbnacl-selenium contstraints ang give better errors about them [Miklos Fazekas, #398] * Fix UTF-8 encoding issues [Ethan J. Brown, #407] === 4.0.0.alpha4 * Experimental event loop abstraction [Miklos Fazekas] * RbNacl dependency is optional [Miklos Fazekas] * agent_socket_factory option [Alon Goldboim] * client sends KEXINIT, it doesn't have to wait for server [Miklos Fazekas] * better error message when option is nil [Kane Morgan] * prompting can be customized [Miklos Fazekas] === 4.0.0.alpha3 * added max_select_wait_time [Eugene Kenny] === 4.0.0.alpha2 * when transport closes we're cleaning up channels [Miklos Fazekas] === 4.0.0.alpha1 * ed25519 key support [Miklos Fazekas] * removed camellia [Miklos Fazekas] === 3.1.0 === 3.1.0.rc1 * fix Secure#verify [Jean Boussier] * use the smallest of don't spend longer time than keepalive if it's configured [Eugene Kenny] === 3.1.0.beta3 * forward/on_open_failed should stop listning closed socket otherwise it locks #269 [Miklos Fazekas,Scott McGillivray] * fix incorrect pattern handling in config files #310 [Miklos Fazekas] === 3.1.0.beta2 * trying to execute something on a not yet opend channel throws nicer messag [Miklos Fazekas] * calling close on a not opened channel marks the channel for close [Miklos Fazekas] * read keepalive configuration from ssh config files [Miklos Fazekas] * send client version on hadshake before waiting for server to reduce handshake time [Miklos Fazekas] * allow custom Net::SSH::KnownHosts implementations [Jean Boussier] * memoize known host so we only search it once per session [Jean Boussier, Miklos Fazekas] === 3.0.2 === 3.0.2.rc1 * fixed rare WaitWritable error with proxy commands [Miklos Fazkas, Andre Meij]] * if Net::SSH.start user is nil and config has no entry we default to Etc.getlogin * Bugfix: CHANNEL_CLOSE was sent before draining ouput buffer #280 [Christopher F. Auston] === 3.0.1 === 3.0.1.rc1 * Breaking change from 2.* series: exec! without block now returns empty string instread of nil if command has no output [net-ssh/net-ssh#273] * Support remote_user as %r in proxy commands [Dominic Scheirlinck] * Raise Net::SSH::ConnectionTimeout from connection timeout [Carl Hoerberg] === 3.0.0.rc1 * SemVer: Major version change because of dropping of ruby 1.9
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Create mail/py-policyd-spf (an external policy engine for Postfix)