git: 5fc042109fea - main - security/py-google-cloud-kms: Add port: Python client for Google Cloud Key Management Service
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 15 Oct 2025 07:36:21 UTC
The branch main has been updated by tagattie:
URL: https://cgit.FreeBSD.org/ports/commit/?id=5fc042109feab64e9f47a1b72fcce6a651bdd8e9
commit 5fc042109feab64e9f47a1b72fcce6a651bdd8e9
Author: Hiroki Tagato <tagattie@FreeBSD.org>
AuthorDate: 2025-10-15 06:49:53 +0000
Commit: Hiroki Tagato <tagattie@FreeBSD.org>
CommitDate: 2025-10-15 07:36:08 +0000
security/py-google-cloud-kms: Add port: Python client for Google Cloud Key Management Service
Google Cloud Key Management Service: a cloud-hosted key management
service that lets you manage cryptographic keys for your cloud
services the same way you do on-premises. You can generate, use,
rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and
EC P384 cryptographic keys. Cloud KMS is integrated with Cloud IAM and
Cloud Audit Logging so that you can manage permissions on individual
keys and monitor how these are used. Use Cloud KMS to protect secrets
and other sensitive data that you need to store in Google Cloud
Platform.
WWW: https://pypi.org/project/google-cloud-kms/
---
security/Makefile | 1 +
security/py-google-cloud-kms/Makefile | 38 ++++++++++++++++++++++++++++++++++
security/py-google-cloud-kms/distinfo | 3 +++
security/py-google-cloud-kms/pkg-descr | 9 ++++++++
4 files changed, 51 insertions(+)
diff --git a/security/Makefile b/security/Makefile
index 0d8071e0259e..e3840f2246ac 100644
--- a/security/Makefile
+++ b/security/Makefile
@@ -952,6 +952,7 @@
SUBDIR += py-google-auth
SUBDIR += py-google-auth-httplib2
SUBDIR += py-google-auth-oauthlib
+ SUBDIR += py-google-cloud-kms
SUBDIR += py-gpg
SUBDIR += py-gpsoauth
SUBDIR += py-greenbone-feed-sync
diff --git a/security/py-google-cloud-kms/Makefile b/security/py-google-cloud-kms/Makefile
new file mode 100644
index 000000000000..911d3a05b762
--- /dev/null
+++ b/security/py-google-cloud-kms/Makefile
@@ -0,0 +1,38 @@
+PORTNAME= google-cloud-kms
+DISTVERSION= 3.6.0
+CATEGORIES= security python
+MASTER_SITES= PYPI
+PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
+DISTNAME= ${PORTNAME:S/-/_/g}-${DISTVERSION}
+
+MAINTAINER= tagattie@FreeBSD.org
+COMMENT= Python client for Google Cloud Key Management Service
+WWW= https://pypi.org/project/google-cloud-kms/
+
+LICENSE= APACHE20
+LICENSE_FILE= ${WRKSRC}/LICENSE
+
+RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}google-api-core>=1.34.1<3.0.0:www/py-google-api-core@${PY_FLAVOR} \
+ ${PYTHON_PKGNAMEPREFIX}google-auth>=2.14.1<3.0.0:security/py-google-auth@${PY_FLAVOR} \
+ ${PYTHON_PKGNAMEPREFIX}proto-plus>=1.22.3<2.0.0:devel/py-proto-plus@${PY_FLAVOR} \
+ ${PYTHON_PKGNAMEPREFIX}protobuf>=3.20.2,1<7.0.0,1:devel/py-protobuf@${PY_FLAVOR} \
+ ${PYTHON_PKGNAMEPREFIX}grpc-google-iam-v1>=0.14.0<1.0.0:devel/py-grpc-google-iam-v1@${PY_FLAVOR}
+TEST_DEPENDS= ${PYTHON_PKGNAMEPREFIX}pytest-asyncio>0:devel/py-pytest-asyncio@${PY_FLAVOR}
+
+USES= python
+
+USE_PYTHON= autoplist distutils pytest
+PYTEST_IGNORED_TESTS= test_list_ekm_connections[grpc] \
+ test_list_ekm_connections[rest]
+
+NO_ARCH= yes
+
+PORTDOCS= README.rst
+
+OPTIONS_DEFINE= DOCS
+
+post-install-DOCS-on:
+ @${MKDIR} ${STAGEDIR}${DOCSDIR}
+ ${INSTALL_MAN} ${PORTDOCS:S|^|${WRKSRC}/|} ${STAGEDIR}${DOCSDIR}
+
+.include <bsd.port.mk>
diff --git a/security/py-google-cloud-kms/distinfo b/security/py-google-cloud-kms/distinfo
new file mode 100644
index 000000000000..f935ac04aec4
--- /dev/null
+++ b/security/py-google-cloud-kms/distinfo
@@ -0,0 +1,3 @@
+TIMESTAMP = 1760498630
+SHA256 (google_cloud_kms-3.6.0.tar.gz) = c0f7f2474e35e99e6a36651520a26fdba4bb8e73b7cd0d9bff8c8bd92737afcc
+SIZE (google_cloud_kms-3.6.0.tar.gz) = 329923
diff --git a/security/py-google-cloud-kms/pkg-descr b/security/py-google-cloud-kms/pkg-descr
new file mode 100644
index 000000000000..8eaf90a4f41f
--- /dev/null
+++ b/security/py-google-cloud-kms/pkg-descr
@@ -0,0 +1,9 @@
+Google Cloud Key Management Service: a cloud-hosted key management
+service that lets you manage cryptographic keys for your cloud
+services the same way you do on-premises. You can generate, use,
+rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and
+EC P384 cryptographic keys. Cloud KMS is integrated with Cloud IAM and
+Cloud Audit Logging so that you can manage permissions on individual
+keys and monitor how these are used. Use Cloud KMS to protect secrets
+and other sensitive data that you need to store in Google Cloud
+Platform.