* [Buildroot] [PATCH next v2] python-certifi: add new package @ 2014-11-22 9:46 Yegor Yefremov 2014-11-22 17:09 ` Yann E. MORIN 2014-11-22 17:15 ` Thomas Petazzoni 0 siblings, 2 replies; 11+ messages in thread From: Yegor Yefremov @ 2014-11-22 9:46 UTC (permalink / raw) To: buildroot Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com> --- Changes: v2: add MPL incense package/Config.in | 1 + package/python-certifi/Config.in | 6 ++++++ package/python-certifi/python-certifi.mk | 14 ++++++++++++++ 3 files changed, 21 insertions(+) create mode 100644 package/python-certifi/Config.in create mode 100644 package/python-certifi/python-certifi.mk diff --git a/package/Config.in b/package/Config.in index a6977ce..cffa8d4 100644 --- a/package/Config.in +++ b/package/Config.in @@ -482,6 +482,7 @@ endif if BR2_PACKAGE_PYTHON || BR2_PACKAGE_PYTHON3 menu "external python modules" source "package/python-bottle/Config.in" + source "package/python-certifi/Config.in" source "package/python-cffi/Config.in" source "package/python-configobj/Config.in" source "package/python-configshell-fb/Config.in" diff --git a/package/python-certifi/Config.in b/package/python-certifi/Config.in new file mode 100644 index 0000000..9390b4f --- /dev/null +++ b/package/python-certifi/Config.in @@ -0,0 +1,6 @@ +config BR2_PACKAGE_PYTHON_CERTIFI + bool "python-certifi" + help + Python package for providing Mozilla's CA Bundle. + + https://pypi.python.org/pypi/certifi diff --git a/package/python-certifi/python-certifi.mk b/package/python-certifi/python-certifi.mk new file mode 100644 index 0000000..1458a53 --- /dev/null +++ b/package/python-certifi/python-certifi.mk @@ -0,0 +1,14 @@ +################################################################################ +# +# python-certifi +# +################################################################################ + +PYTHON_CERTIFI_VERSION = 14.05.14 +PYTHON_CERTIFI_SOURCE = certifi-$(PYTHON_CERTIFI_VERSION).tar.gz +PYTHON_CERTIFI_SITE = https://pypi.python.org/packages/source/c/certifi +PYTHON_CERTIFI_SETUP_TYPE = setuptools +PYTHON_CERTIFI_LICENSE = ISC, MPL +PYTHON_CERTIFI_LICENSE_FILES = LICENSE + +$(eval $(python-package)) -- 1.8.3.2 ^ permalink raw reply related [flat|nested] 11+ messages in thread
* [Buildroot] [PATCH next v2] python-certifi: add new package 2014-11-22 9:46 [Buildroot] [PATCH next v2] python-certifi: add new package Yegor Yefremov @ 2014-11-22 17:09 ` Yann E. MORIN 2014-11-22 18:08 ` Thomas Petazzoni 2014-11-22 17:15 ` Thomas Petazzoni 1 sibling, 1 reply; 11+ messages in thread From: Yann E. MORIN @ 2014-11-22 17:09 UTC (permalink / raw) To: buildroot Yegor, All, On 2014-11-22 10:46 +0100, Yegor Yefremov spake thusly: > Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com> Please, add a hash file to this package: http://nightly.buildroot.org/#adding-packages-hash Here are the hashes I computed locally, which you can add as-is to the hash file: sha1 f53dc8f57aaf6d69c183ebadcec52ece0a55cc3f certifi-14.05.14.tar.gz sha256 1e1bcbacd6357c151ae37cf0290dcc809721d32ce21fd6b7339568f3ddef1b69 certifi-14.05.14.tar.gz Regards, Yann E. MORIN. > --- > Changes: > v2: add MPL incense > > package/Config.in | 1 + > package/python-certifi/Config.in | 6 ++++++ > package/python-certifi/python-certifi.mk | 14 ++++++++++++++ > 3 files changed, 21 insertions(+) > create mode 100644 package/python-certifi/Config.in > create mode 100644 package/python-certifi/python-certifi.mk > > diff --git a/package/Config.in b/package/Config.in > index a6977ce..cffa8d4 100644 > --- a/package/Config.in > +++ b/package/Config.in > @@ -482,6 +482,7 @@ endif > if BR2_PACKAGE_PYTHON || BR2_PACKAGE_PYTHON3 > menu "external python modules" > source "package/python-bottle/Config.in" > + source "package/python-certifi/Config.in" > source "package/python-cffi/Config.in" > source "package/python-configobj/Config.in" > source "package/python-configshell-fb/Config.in" > diff --git a/package/python-certifi/Config.in b/package/python-certifi/Config.in > new file mode 100644 > index 0000000..9390b4f > --- /dev/null > +++ b/package/python-certifi/Config.in > @@ -0,0 +1,6 @@ > +config BR2_PACKAGE_PYTHON_CERTIFI > + bool "python-certifi" > + help > + Python package for providing Mozilla's CA Bundle. > + > + https://pypi.python.org/pypi/certifi > diff --git a/package/python-certifi/python-certifi.mk b/package/python-certifi/python-certifi.mk > new file mode 100644 > index 0000000..1458a53 > --- /dev/null > +++ b/package/python-certifi/python-certifi.mk > @@ -0,0 +1,14 @@ > +################################################################################ > +# > +# python-certifi > +# > +################################################################################ > + > +PYTHON_CERTIFI_VERSION = 14.05.14 > +PYTHON_CERTIFI_SOURCE = certifi-$(PYTHON_CERTIFI_VERSION).tar.gz > +PYTHON_CERTIFI_SITE = https://pypi.python.org/packages/source/c/certifi > +PYTHON_CERTIFI_SETUP_TYPE = setuptools > +PYTHON_CERTIFI_LICENSE = ISC, MPL > +PYTHON_CERTIFI_LICENSE_FILES = LICENSE > + > +$(eval $(python-package)) > -- > 1.8.3.2 > > _______________________________________________ > buildroot mailing list > buildroot at busybox.net > http://lists.busybox.net/mailman/listinfo/buildroot -- .-----------------.--------------------.------------------.--------------------. | Yann E. MORIN | Real-Time Embedded | /"\ ASCII RIBBON | Erics' conspiracy: | | +33 662 376 056 | Software Designer | \ / CAMPAIGN | ___ | | +33 223 225 172 `------------.-------: X AGAINST | \e/ There is no | | http://ymorin.is-a-geek.org/ | _/*\_ | / \ HTML MAIL | v conspiracy. | '------------------------------^-------^------------------^--------------------' -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: Digital signature URL: <http://lists.busybox.net/pipermail/buildroot/attachments/20141122/f4d724a9/attachment.asc> ^ permalink raw reply [flat|nested] 11+ messages in thread
* [Buildroot] [PATCH next v2] python-certifi: add new package 2014-11-22 17:09 ` Yann E. MORIN @ 2014-11-22 18:08 ` Thomas Petazzoni 2014-11-22 18:56 ` Yann E. MORIN 0 siblings, 1 reply; 11+ messages in thread From: Thomas Petazzoni @ 2014-11-22 18:08 UTC (permalink / raw) To: buildroot Dear Yann E. MORIN, On Sat, 22 Nov 2014 18:09:34 +0100, Yann E. MORIN wrote: > Here are the hashes I computed locally, which you can add as-is to the > hash file: > > sha1 f53dc8f57aaf6d69c183ebadcec52ece0a55cc3f certifi-14.05.14.tar.gz > sha256 1e1bcbacd6357c151ae37cf0290dcc809721d32ce21fd6b7339568f3ddef1b69 certifi-14.05.14.tar.gz Why do we suggest to have two hashes? Isn't sha265 sufficient? Also, is it necessary to align the different columns? Should it be done with tabs or spaces? I've seen different solutions being used. Thanks, Thomas -- Thomas Petazzoni, CTO, Free Electrons Embedded Linux, Kernel and Android engineering http://free-electrons.com ^ permalink raw reply [flat|nested] 11+ messages in thread
* [Buildroot] [PATCH next v2] python-certifi: add new package 2014-11-22 18:08 ` Thomas Petazzoni @ 2014-11-22 18:56 ` Yann E. MORIN 2014-11-22 19:59 ` Thomas Petazzoni 0 siblings, 1 reply; 11+ messages in thread From: Yann E. MORIN @ 2014-11-22 18:56 UTC (permalink / raw) To: buildroot Thomas, All, On 2014-11-22 19:08 +0100, Thomas Petazzoni spake thusly: > On Sat, 22 Nov 2014 18:09:34 +0100, Yann E. MORIN wrote: > > > Here are the hashes I computed locally, which you can add as-is to the > > hash file: > > > > sha1 f53dc8f57aaf6d69c183ebadcec52ece0a55cc3f certifi-14.05.14.tar.gz > > sha256 1e1bcbacd6357c151ae37cf0290dcc809721d32ce21fd6b7339568f3ddef1b69 certifi-14.05.14.tar.gz > > Why do we suggest to have two hashes? Isn't sha265 sufficient? As Gustavo said, that's because sha1 and sha256 are two different hash mechanisms, and it's better to have both. So I was following his advice, even though I don't mind adding just the sha256. > Also, is it necessary to align the different columns? Should it be done > with tabs or spaces? I've seen different solutions being used. I don't mind not aligning the fields, though I find it more convenient to read if they are. If they get aligned, I think we should use spaces; tabs do not help because people may have different tabwidths. Also, aligning with spaces is what we are doing for _PREMISSIONS and _USERS, so I think that's OK to align. Also, the manual states: Note: the number of spaces does not matter, so one can use spaces to properly align the different fields. Regards, Yann E. MORIN. -- .-----------------.--------------------.------------------.--------------------. | Yann E. MORIN | Real-Time Embedded | /"\ ASCII RIBBON | Erics' conspiracy: | | +33 662 376 056 | Software Designer | \ / CAMPAIGN | ___ | | +33 223 225 172 `------------.-------: X AGAINST | \e/ There is no | | http://ymorin.is-a-geek.org/ | _/*\_ | / \ HTML MAIL | v conspiracy. | '------------------------------^-------^------------------^--------------------' ^ permalink raw reply [flat|nested] 11+ messages in thread
* [Buildroot] [PATCH next v2] python-certifi: add new package 2014-11-22 18:56 ` Yann E. MORIN @ 2014-11-22 19:59 ` Thomas Petazzoni 2014-11-22 20:16 ` Yegor Yefremov 2014-11-24 22:01 ` Peter Korsgaard 0 siblings, 2 replies; 11+ messages in thread From: Thomas Petazzoni @ 2014-11-22 19:59 UTC (permalink / raw) To: buildroot Dear Yann E. MORIN, On Sat, 22 Nov 2014 19:56:40 +0100, Yann E. MORIN wrote: > > > sha1 f53dc8f57aaf6d69c183ebadcec52ece0a55cc3f certifi-14.05.14.tar.gz > > > sha256 1e1bcbacd6357c151ae37cf0290dcc809721d32ce21fd6b7339568f3ddef1b69 certifi-14.05.14.tar.gz > > > > Why do we suggest to have two hashes? Isn't sha265 sufficient? > > As Gustavo said, that's because sha1 and sha256 are two different hash > mechanisms, and it's better to have both. > > So I was following his advice, even though I don't mind adding just the > sha256. Hum. We need some decision here :) > > Also, is it necessary to align the different columns? Should it be done > > with tabs or spaces? I've seen different solutions being used. > > I don't mind not aligning the fields, though I find it more convenient > to read if they are. > > If they get aligned, I think we should use spaces; tabs do not help > because people may have different tabwidths. > > Also, aligning with spaces is what we are doing for _PREMISSIONS and > _USERS, so I think that's OK to align. > > Also, the manual states: > > Note: the number of spaces does not matter, so one can use spaces to > properly align the different fields. And Peter, when reviewing the scancpan script, which did align things with spaces, was wondering why the script was doing this weird indentation. We also need some decision here :-) Thomas -- Thomas Petazzoni, CTO, Free Electrons Embedded Linux, Kernel and Android engineering http://free-electrons.com ^ permalink raw reply [flat|nested] 11+ messages in thread
* [Buildroot] [PATCH next v2] python-certifi: add new package 2014-11-22 19:59 ` Thomas Petazzoni @ 2014-11-22 20:16 ` Yegor Yefremov 2014-11-22 20:24 ` Thomas Petazzoni 2014-11-24 22:01 ` Peter Korsgaard 1 sibling, 1 reply; 11+ messages in thread From: Yegor Yefremov @ 2014-11-22 20:16 UTC (permalink / raw) To: buildroot On Sat, Nov 22, 2014 at 8:59 PM, Thomas Petazzoni <thomas.petazzoni@free-electrons.com> wrote: > Dear Yann E. MORIN, > > On Sat, 22 Nov 2014 19:56:40 +0100, Yann E. MORIN wrote: > >> > > sha1 f53dc8f57aaf6d69c183ebadcec52ece0a55cc3f certifi-14.05.14.tar.gz >> > > sha256 1e1bcbacd6357c151ae37cf0290dcc809721d32ce21fd6b7339568f3ddef1b69 certifi-14.05.14.tar.gz >> > >> > Why do we suggest to have two hashes? Isn't sha265 sufficient? >> >> As Gustavo said, that's because sha1 and sha256 are two different hash >> mechanisms, and it's better to have both. >> >> So I was following his advice, even though I don't mind adding just the >> sha256. > > Hum. We need some decision here :) > >> > Also, is it necessary to align the different columns? Should it be done >> > with tabs or spaces? I've seen different solutions being used. >> >> I don't mind not aligning the fields, though I find it more convenient >> to read if they are. >> >> If they get aligned, I think we should use spaces; tabs do not help >> because people may have different tabwidths. >> >> Also, aligning with spaces is what we are doing for _PREMISSIONS and >> _USERS, so I think that's OK to align. >> >> Also, the manual states: >> >> Note: the number of spaces does not matter, so one can use spaces to >> properly align the different fields. > > And Peter, when reviewing the scancpan script, which did align things > with spaces, was wondering why the script was doing this weird > indentation. > > We also need some decision here :-) How should I include hash for this package? Yegor ^ permalink raw reply [flat|nested] 11+ messages in thread
* [Buildroot] [PATCH next v2] python-certifi: add new package 2014-11-22 20:16 ` Yegor Yefremov @ 2014-11-22 20:24 ` Thomas Petazzoni 2014-11-22 20:32 ` Yegor Yefremov 0 siblings, 1 reply; 11+ messages in thread From: Thomas Petazzoni @ 2014-11-22 20:24 UTC (permalink / raw) To: buildroot Dear Yegor Yefremov, On Sat, 22 Nov 2014 21:16:34 +0100, Yegor Yefremov wrote: > How should I include hash for this package? Don't worry about the hash for now. I'll commit either one hash or two hashes, and I won't really care about the indentation of the hash file. The real question is the license one. Thomas -- Thomas Petazzoni, CTO, Free Electrons Embedded Linux, Kernel and Android engineering http://free-electrons.com ^ permalink raw reply [flat|nested] 11+ messages in thread
* [Buildroot] [PATCH next v2] python-certifi: add new package 2014-11-22 20:24 ` Thomas Petazzoni @ 2014-11-22 20:32 ` Yegor Yefremov 2014-11-22 20:44 ` Thomas Petazzoni 0 siblings, 1 reply; 11+ messages in thread From: Yegor Yefremov @ 2014-11-22 20:32 UTC (permalink / raw) To: buildroot On Sat, Nov 22, 2014 at 9:24 PM, Thomas Petazzoni <thomas.petazzoni@free-electrons.com> wrote: > Dear Yegor Yefremov, > > On Sat, 22 Nov 2014 21:16:34 +0100, Yegor Yefremov wrote: > >> How should I include hash for this package? > > Don't worry about the hash for now. I'll commit either one hash or two > hashes, and I won't really care about the indentation of the hash file. > > The real question is the license one. I'd add this: PYTHON_CERTIFI_LICENSE = Python code: ISC, cacert.pem: MPL The certifi author didn't answer my mail request. Yegor ^ permalink raw reply [flat|nested] 11+ messages in thread
* [Buildroot] [PATCH next v2] python-certifi: add new package 2014-11-22 20:32 ` Yegor Yefremov @ 2014-11-22 20:44 ` Thomas Petazzoni 0 siblings, 0 replies; 11+ messages in thread From: Thomas Petazzoni @ 2014-11-22 20:44 UTC (permalink / raw) To: buildroot Dear Yegor Yefremov, On Sat, 22 Nov 2014 21:32:36 +0100, Yegor Yefremov wrote: > I'd add this: > > PYTHON_CERTIFI_LICENSE = Python code: ISC, cacert.pem: MPL It should be: PYTHON_CERTIFI_LICENSE = ISC (Python code), MPL-2.0 (cacert.pem) Thanks, Thomas -- Thomas Petazzoni, CTO, Free Electrons Embedded Linux, Kernel and Android engineering http://free-electrons.com ^ permalink raw reply [flat|nested] 11+ messages in thread
* [Buildroot] [PATCH next v2] python-certifi: add new package 2014-11-22 19:59 ` Thomas Petazzoni 2014-11-22 20:16 ` Yegor Yefremov @ 2014-11-24 22:01 ` Peter Korsgaard 1 sibling, 0 replies; 11+ messages in thread From: Peter Korsgaard @ 2014-11-24 22:01 UTC (permalink / raw) To: buildroot >>>>> "Thomas" == Thomas Petazzoni <thomas.petazzoni@free-electrons.com> writes: > Dear Yann E. MORIN, > On Sat, 22 Nov 2014 19:56:40 +0100, Yann E. MORIN wrote: >> > > sha1 f53dc8f57aaf6d69c183ebadcec52ece0a55cc3f certifi-14.05.14.tar.gz >> > > sha256 1e1bcbacd6357c151ae37cf0290dcc809721d32ce21fd6b7339568f3ddef1b69 certifi-14.05.14.tar.gz >> > >> > Why do we suggest to have two hashes? Isn't sha265 sufficient? >> >> As Gustavo said, that's because sha1 and sha256 are two different hash >> mechanisms, and it's better to have both. >> >> So I was following his advice, even though I don't mind adding just the >> sha256. > Hum. We need some decision here :) Ehh, I don't really know. I believe we have agreed on adding an extra hash if upstream only publishes a weak one (E.G. md5), but requiring both sha1 and sha256 is imho overkill. In general, I would say lets use sha256 if we need to calculate it ourselves, and otherwise whatever upstream publishes (unless it is md5, then we add sha256 ourselves). >> Note: the number of spaces does not matter, so one can use spaces to >> properly align the different fields. > And Peter, when reviewing the scancpan script, which did align things > with spaces, was wondering why the script was doing this weird > indentation. > We also need some decision here :-) Well, there's the spaces between the hashtype and the hash, and then there's the space between the hash and the filename. I find it nicer to read if the hashes are aligned, and I prefer to be able to use the output of ${foo}sum directly for the hash + filename, which I why I suggested: type\thash filename (two spaces between hash and filename) during the scanpan review, so you can do stuff like: for i in md5 sha256; do echo -en "$i\t"; ${i}sum <file>; done > foo.hash But it is not something I feel strongly about. Consistency between the different packages would be good though. -- Bye, Peter Korsgaard ^ permalink raw reply [flat|nested] 11+ messages in thread
* [Buildroot] [PATCH next v2] python-certifi: add new package 2014-11-22 9:46 [Buildroot] [PATCH next v2] python-certifi: add new package Yegor Yefremov 2014-11-22 17:09 ` Yann E. MORIN @ 2014-11-22 17:15 ` Thomas Petazzoni 1 sibling, 0 replies; 11+ messages in thread From: Thomas Petazzoni @ 2014-11-22 17:15 UTC (permalink / raw) To: buildroot Dear Yegor Yefremov, On Sat, 22 Nov 2014 10:46:00 +0100, Yegor Yefremov wrote: > +PYTHON_CERTIFI_VERSION = 14.05.14 > +PYTHON_CERTIFI_SOURCE = certifi-$(PYTHON_CERTIFI_VERSION).tar.gz > +PYTHON_CERTIFI_SITE = https://pypi.python.org/packages/source/c/certifi > +PYTHON_CERTIFI_SETUP_TYPE = setuptools > +PYTHON_CERTIFI_LICENSE = ISC, MPL Can this be more specific, like to what part the ISC license applies, and to what part the MPL license applies? Thanks, Thomas -- Thomas Petazzoni, CTO, Free Electrons Embedded Linux, Kernel and Android engineering http://free-electrons.com ^ permalink raw reply [flat|nested] 11+ messages in thread
end of thread, other threads:[~2014-11-24 22:01 UTC | newest] Thread overview: 11+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2014-11-22 9:46 [Buildroot] [PATCH next v2] python-certifi: add new package Yegor Yefremov 2014-11-22 17:09 ` Yann E. MORIN 2014-11-22 18:08 ` Thomas Petazzoni 2014-11-22 18:56 ` Yann E. MORIN 2014-11-22 19:59 ` Thomas Petazzoni 2014-11-22 20:16 ` Yegor Yefremov 2014-11-22 20:24 ` Thomas Petazzoni 2014-11-22 20:32 ` Yegor Yefremov 2014-11-22 20:44 ` Thomas Petazzoni 2014-11-24 22:01 ` Peter Korsgaard 2014-11-22 17:15 ` Thomas Petazzoni
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox