Name | service-identity JSON |
Version |
24.1.0
JSON |
| download |
home_page | |
Summary | Service identity verification for pyOpenSSL & cryptography. |
upload_time | 2024-01-14 07:11:42 |
maintainer | |
docs_url | None |
author | |
requires_python | >=3.8 |
license | |
keywords |
cryptography
openssl
pyopenssl
|
VCS |
|
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
No Travis.
|
coveralls test coverage |
No coveralls.
|
# Service Identity Verification for pyOpenSSL & *cryptography*
Use this package if:
- you want to **verify** that a [PyCA *cryptography*](https://cryptography.io/) certificate is valid for a certain hostname or IP address,
- or if you use [pyOpenSSL](https://pypi.org/project/pyOpenSSL/) and don’t want to be [**MITM**](https://en.wikipedia.org/wiki/Man-in-the-middle_attack)ed,
- or if you want to **inspect** certificates from either for service IDs.
*service-identity* aspires to give you all the tools you need for verifying whether a certificate is valid for the intended purposes.
In the simplest case, this means *host name verification*.
However, *service-identity* implements [RFC 6125](https://datatracker.ietf.org/doc/html/rfc6125.html) fully.
Also check out [*pem*](https://github.com/hynek/pem) that makes loading certificates from all kinds of PEM-encoded files a breeze!
## Project Information
*service-identity* is released under the [MIT](https://github.com/pyca/service-identity/blob/main/LICENSE) license, its documentation lives at [Read the Docs](https://service-identity.readthedocs.io/), the code on [GitHub](https://github.com/pyca/service-identity), and the latest release on [PyPI](https://pypi.org/project/service-identity/).
### Credits
*service-identity* is written and maintained by [Hynek Schlawack](https://hynek.me/).
The development is kindly supported by my employer [Variomedia AG](https://www.variomedia.de/), *service-identity*'s [Tidelift subscribers](https://tidelift.com/lifter/search/pypi/service-identity), and all my amazing [GitHub Sponsors](https://github.com/sponsors/hynek).
### *service-identity* for Enterprise
Available as part of the Tidelift Subscription.
The maintainers of *service-identity* and thousands of other packages are working with Tidelift to deliver commercial support and maintenance for the open-source packages you use to build your applications.
Save time, reduce risk, and improve code health, while paying the maintainers of the exact packages you use.
[Learn more.](https://tidelift.com/lifter/search/pypi/service-identity)
## Release Information
### Changed
- If a certificate doesn't contain any `subjectAltName`s, we now raise `service_identity.CertificateError` instead of `service_identity.VerificationError` to make the problem easier to debug.
[#67](https://github.com/pyca/service-identity/pull/67)
----
[Complete Changelog →](https://service-identity.readthedocs.io/en/stable/changelog.html)
Raw data
{
"_id": null,
"home_page": "",
"name": "service-identity",
"maintainer": "",
"docs_url": null,
"requires_python": ">=3.8",
"maintainer_email": "",
"keywords": "cryptography,openssl,pyopenssl",
"author": "",
"author_email": "Hynek Schlawack <hs@ox.cx>",
"download_url": "https://files.pythonhosted.org/packages/38/d2/2ac20fd05f1b6fce31986536da4caeac51ed2e1bb25d4a7d73ca4eccdfab/service_identity-24.1.0.tar.gz",
"platform": null,
"description": "# Service Identity Verification for pyOpenSSL & *cryptography*\n\nUse this package if:\n\n- you want to **verify** that a [PyCA *cryptography*](https://cryptography.io/) certificate is valid for a certain hostname or IP address,\n- or if you use [pyOpenSSL](https://pypi.org/project/pyOpenSSL/) and don\u2019t want to be [**MITM**](https://en.wikipedia.org/wiki/Man-in-the-middle_attack)ed,\n- or if you want to **inspect** certificates from either for service IDs.\n\n*service-identity* aspires to give you all the tools you need for verifying whether a certificate is valid for the intended purposes.\nIn the simplest case, this means *host name verification*.\nHowever, *service-identity* implements [RFC 6125](https://datatracker.ietf.org/doc/html/rfc6125.html) fully.\n\nAlso check out [*pem*](https://github.com/hynek/pem) that makes loading certificates from all kinds of PEM-encoded files a breeze!\n\n\n## Project Information\n\n*service-identity* is released under the [MIT](https://github.com/pyca/service-identity/blob/main/LICENSE) license, its documentation lives at [Read the Docs](https://service-identity.readthedocs.io/), the code on [GitHub](https://github.com/pyca/service-identity), and the latest release on [PyPI](https://pypi.org/project/service-identity/).\n\n\n### Credits\n\n*service-identity* is written and maintained by [Hynek Schlawack](https://hynek.me/).\n\nThe development is kindly supported by my employer [Variomedia AG](https://www.variomedia.de/), *service-identity*'s [Tidelift subscribers](https://tidelift.com/lifter/search/pypi/service-identity), and all my amazing [GitHub Sponsors](https://github.com/sponsors/hynek).\n\n\n### *service-identity* for Enterprise\n\nAvailable as part of the Tidelift Subscription.\n\nThe maintainers of *service-identity* and thousands of other packages are working with Tidelift to deliver commercial support and maintenance for the open-source packages you use to build your applications.\nSave time, reduce risk, and improve code health, while paying the maintainers of the exact packages you use.\n[Learn more.](https://tidelift.com/lifter/search/pypi/service-identity)\n\n\n## Release Information\n\n### Changed\n\n- If a certificate doesn't contain any `subjectAltName`s, we now raise `service_identity.CertificateError` instead of `service_identity.VerificationError` to make the problem easier to debug.\n [#67](https://github.com/pyca/service-identity/pull/67)\n\n\n----\n\n[Complete Changelog \u2192](https://service-identity.readthedocs.io/en/stable/changelog.html)\n",
"bugtrack_url": null,
"license": "",
"summary": "Service identity verification for pyOpenSSL & cryptography.",
"version": "24.1.0",
"project_urls": {
"Changelog": "https://service-identity.readthedocs.io/en/stable/changelog.html",
"Documentation": "https://service-identity.readthedocs.io/",
"Funding": "https://github.com/sponsors/hynek",
"GitHub": "https://github.com/pyca/service-identity",
"Mastodon": "https://mastodon.social/@hynek",
"Tidelift": "https://tidelift.com/subscription/pkg/pypi-service-identity?utm_source=pypi-service-identity&utm_medium=pypi",
"Twitter": "https://twitter.com/hynek"
},
"split_keywords": [
"cryptography",
"openssl",
"pyopenssl"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "3b9244669afe6354a7bed9968013862118c401690d8b5a805bab75ac1764845f",
"md5": "bee8f2053cb311185729cc65a0869643",
"sha256": "a28caf8130c8a5c1c7a6f5293faaf239bbfb7751e4862436920ee6f2616f568a"
},
"downloads": -1,
"filename": "service_identity-24.1.0-py3-none-any.whl",
"has_sig": false,
"md5_digest": "bee8f2053cb311185729cc65a0869643",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.8",
"size": 12037,
"upload_time": "2024-01-14T07:11:40",
"upload_time_iso_8601": "2024-01-14T07:11:40.726455Z",
"url": "https://files.pythonhosted.org/packages/3b/92/44669afe6354a7bed9968013862118c401690d8b5a805bab75ac1764845f/service_identity-24.1.0-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "38d22ac20fd05f1b6fce31986536da4caeac51ed2e1bb25d4a7d73ca4eccdfab",
"md5": "64267a4351ee3c225ee12a11bb29fc44",
"sha256": "6829c9d62fb832c2e1c435629b0a8c476e1929881f28bee4d20bc24161009221"
},
"downloads": -1,
"filename": "service_identity-24.1.0.tar.gz",
"has_sig": false,
"md5_digest": "64267a4351ee3c225ee12a11bb29fc44",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.8",
"size": 40183,
"upload_time": "2024-01-14T07:11:42",
"upload_time_iso_8601": "2024-01-14T07:11:42.465739Z",
"url": "https://files.pythonhosted.org/packages/38/d2/2ac20fd05f1b6fce31986536da4caeac51ed2e1bb25d4a7d73ca4eccdfab/service_identity-24.1.0.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-01-14 07:11:42",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "sponsors",
"github_project": "hynek",
"github_not_found": true,
"lcname": "service-identity"
}