git: 656b9347ee6b - main - security/py-python-jose: Remove expired port

From: Rene Ladan <rene_at_FreeBSD.org>
Date: Mon, 31 Mar 2025 14:41:36 UTC
The branch main has been updated by rene:

URL: https://cgit.FreeBSD.org/ports/commit/?id=656b9347ee6b0fc4718ef3e11f406c881148886d

commit 656b9347ee6b0fc4718ef3e11f406c881148886d
Author:     Rene Ladan <rene@FreeBSD.org>
AuthorDate: 2025-03-31 14:41:32 +0000
Commit:     Rene Ladan <rene@FreeBSD.org>
CommitDate: 2025-03-31 14:41:32 +0000

    security/py-python-jose: Remove expired port
    
    2025-03-31 security/py-python-jose: Depends on expired devel/py-pytest-runner
---
 MOVED                             |  1 +
 security/Makefile                 |  1 -
 security/py-python-jose/Makefile  | 28 ----------------------------
 security/py-python-jose/distinfo  |  3 ---
 security/py-python-jose/pkg-descr | 17 -----------------
 5 files changed, 1 insertion(+), 49 deletions(-)

diff --git a/MOVED b/MOVED
index 951e32c6e77d..4d23cbe143a4 100644
--- a/MOVED
+++ b/MOVED
@@ -4248,3 +4248,4 @@ finance/odoo14||2025-03-31|Has expired: Depends on expired converters/wkhtmltopd
 net/nsscache||2025-03-31|Has expired: Depends on expired devel/py-pytest-runner
 security/caldera4||2025-03-31|Has expired: Upgrade to a newer caldera version. 4.2.0 is vulnerable to remote code execution
 net/opensips31||2025-03-31|Has expired: Deprecated upstream
+security/py-python-jose||2025-03-31|Has expired: Depends on expired devel/py-pytest-runner
diff --git a/security/Makefile b/security/Makefile
index 4109d398ce11..3a80de4948c8 100644
--- a/security/Makefile
+++ b/security/Makefile
@@ -1035,7 +1035,6 @@
     SUBDIR += py-python-cas
     SUBDIR += py-python-gnupg
     SUBDIR += py-python-gvm
-    SUBDIR += py-python-jose
     SUBDIR += py-python-nss
     SUBDIR += py-python-openid
     SUBDIR += py-python-pam
diff --git a/security/py-python-jose/Makefile b/security/py-python-jose/Makefile
deleted file mode 100644
index ed8320179c5a..000000000000
--- a/security/py-python-jose/Makefile
+++ /dev/null
@@ -1,28 +0,0 @@
-PORTNAME=	python-jose
-PORTVERSION=	3.3.0
-PORTREVISION=	2
-CATEGORIES=	security
-MASTER_SITES=	PYPI
-PKGNAMEPREFIX=	${PYTHON_PKGNAMEPREFIX}
-
-MAINTAINER=	dvl@FreeBSD.org
-COMMENT=	Client SDK for TIP API which require Authentication Tokens
-WWW=		https://github.com/mpdavis/python-jose
-
-LICENSE=	MIT
-
-DEPRECATED=	Depends on expired devel/py-pytest-runner
-EXPIRATION_DATE=2025-03-31
-
-BUILD_DEPENDS=	${PYTHON_PKGNAMEPREFIX}pytest-runner>0:devel/py-pytest-runner@${PY_FLAVOR}
-
-RUN_DEPENDS=	${PYTHON_PKGNAMEPREFIX}future>0:devel/py-future@${PY_FLAVOR} \
-		${PYTHON_PKGNAMEPREFIX}ecdsa>0:security/py-ecdsa@${PY_FLAVOR} \
-		${PYTHON_PKGNAMEPREFIX}pycryptodome>0:security/py-pycryptodome@${PY_FLAVOR} \
-		${PYTHON_PKGNAMEPREFIX}rsa>0:security/py-rsa@${PY_FLAVOR} \
-		${PYTHON_PKGNAMEPREFIX}six>0:devel/py-six@${PY_FLAVOR}
-
-USES=		python
-USE_PYTHON=	distutils autoplist
-
-.include <bsd.port.mk>
diff --git a/security/py-python-jose/distinfo b/security/py-python-jose/distinfo
deleted file mode 100644
index 1722df7c6a21..000000000000
--- a/security/py-python-jose/distinfo
+++ /dev/null
@@ -1,3 +0,0 @@
-TIMESTAMP = 1655210325
-SHA256 (python-jose-3.3.0.tar.gz) = 55779b5e6ad599c6336191246e95eb2293a9ddebd555f796a65f838f07e5d78a
-SIZE (python-jose-3.3.0.tar.gz) = 129068
diff --git a/security/py-python-jose/pkg-descr b/security/py-python-jose/pkg-descr
deleted file mode 100644
index d8b56173f861..000000000000
--- a/security/py-python-jose/pkg-descr
+++ /dev/null
@@ -1,17 +0,0 @@
-A JOSE implementation in Python
-
-The JavaScript Object Signing and Encryption (JOSE) technologies - JSON Web
-Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), and JSON Web
-Algorithms (JWA) - collectively can be used to encrypt and/or sign content
-using a variety of algorithms. While the full set of permutations is extremely
-large, and might be daunting to some, it is expected that most applications
-will only use a small set of algorithms to meet their needs.
-
-Usage
-
->>> from jose import jwt
->>> token = jwt.encode({'key': 'value'}, 'secret', algorithm='HS256')
-u'eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJrZXkiOiJ2YWx1ZSJ9.FG-8UppwHaFp1LgRYQQeS6EDQF7_6-bMFegNucHjmWg'
-
->>> jwt.decode(token, 'secret', algorithms=['HS256'])
-{u'key': u'value'}