svn commit: r403057 - in head/security: py-acme py-letsencrypt
Bernard Spil
brnrd at FreeBSD.org
Sat Dec 5 11:08:47 UTC 2015
Author: brnrd
Date: Sat Dec 5 11:08:46 2015
New Revision: 403057
URL: https://svnweb.freebsd.org/changeset/ports/403057
Log:
security/py-letsencrypt: Update to 0.1.0
- Update py-letsencrypt to 0.1.0
- Update py-acme to 0.1.0
- Update pkg-message accordingly
This marks the first non-development release of Letsencrypt.org for the public BETA
Reviewed by: koobs (mentor, maintainer), cpm_fbsd.es (maintainer), feld
Approved by: koobs (mentor, maintainer), cpm_fbsd.es (maintainer), feld
MFH: 2015Q4
Differential Revision: https://reviews.freebsd.org/D4360
Modified:
head/security/py-acme/Makefile
head/security/py-acme/distinfo
head/security/py-letsencrypt/Makefile
head/security/py-letsencrypt/distinfo
head/security/py-letsencrypt/pkg-message
Modified: head/security/py-acme/Makefile
==============================================================================
--- head/security/py-acme/Makefile Sat Dec 5 10:46:58 2015 (r403056)
+++ head/security/py-acme/Makefile Sat Dec 5 11:08:46 2015 (r403057)
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= acme
-DISTVERSION= 0.0.0.dev20151123
+DISTVERSION= 0.1.0
CATEGORIES= security python
MASTER_SITES= CHEESESHOP
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
Modified: head/security/py-acme/distinfo
==============================================================================
--- head/security/py-acme/distinfo Sat Dec 5 10:46:58 2015 (r403056)
+++ head/security/py-acme/distinfo Sat Dec 5 11:08:46 2015 (r403057)
@@ -1,2 +1,2 @@
-SHA256 (acme-0.0.0.dev20151123.tar.gz) = 0015b55918360a46e38ca2076ba84eb14ef35b8525023914c40ed8c403473840
-SIZE (acme-0.0.0.dev20151123.tar.gz) = 82399
+SHA256 (acme-0.1.0.tar.gz) = c3ebbfecd1f787ef6e309ddcc412c65d0eea318d00d0aff610bdb7ff09a8403a
+SIZE (acme-0.1.0.tar.gz) = 82880
Modified: head/security/py-letsencrypt/Makefile
==============================================================================
--- head/security/py-letsencrypt/Makefile Sat Dec 5 10:46:58 2015 (r403056)
+++ head/security/py-letsencrypt/Makefile Sat Dec 5 11:08:46 2015 (r403057)
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= letsencrypt
-DISTVERSION= 0.0.0.dev20151123
+DISTVERSION= 0.1.0
CATEGORIES= security python
MASTER_SITES= CHEESESHOP
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
Modified: head/security/py-letsencrypt/distinfo
==============================================================================
--- head/security/py-letsencrypt/distinfo Sat Dec 5 10:46:58 2015 (r403056)
+++ head/security/py-letsencrypt/distinfo Sat Dec 5 11:08:46 2015 (r403057)
@@ -1,2 +1,2 @@
-SHA256 (letsencrypt-0.0.0.dev20151123.tar.gz) = 365c51e8f8d4992fa60f7aa86bd13c1bf256c998b128d9cd6f1d0da7eef2f25c
-SIZE (letsencrypt-0.0.0.dev20151123.tar.gz) = 159702
+SHA256 (letsencrypt-0.1.0.tar.gz) = 81f6276176d254b7cf5f95b564700bc71f12b11034d4020389ca4c317e3769fd
+SIZE (letsencrypt-0.1.0.tar.gz) = 167375
Modified: head/security/py-letsencrypt/pkg-message
==============================================================================
--- head/security/py-letsencrypt/pkg-message Sat Dec 5 10:46:58 2015 (r403056)
+++ head/security/py-letsencrypt/pkg-message Sat Dec 5 11:08:46 2015 (r403057)
@@ -1,23 +1,13 @@
===========================================================================
-This software is a DEVELOPER PREVIEW intended for developers, testers and
-early-adopters only. Support requests and bug reports should be sent directly
-and only to the upstream project: https://github.com/letsencrypt/letsencrypt
-
-letsencrypt is currently in Closed Beta (invite only). In order to
-acquire certificates, you must have applied for and received an invitation,
-and have your domains whitelisted FIRST.
+The Let's Encrypt Client is BETA SOFTWARE. It contains plenty of bugs and
+rough edges, and should be tested thoroughly in staging environments before
+use on production systems.
This port installs the "standalone" Python client only, which does not use and
is not the letsencrypt-auto bootstrap/wrapper script.
-By default, the client will authenticate and obtain certificates using, and
-signed by a TEST(Staging) Certificate Authority (CA). These certificates will
-NOT be trusted publicly.
-
-To obtain certificates, use the --server argument pointing to the correct
-server URL as documented in your invitation email, and use the 'certonly'
-command as follows:
+To obtain certificates, use use the 'certonly' command as follows:
# sudo letsencrypt --server <server-URL> certonly
More information about the svn-ports-head
mailing list