pymacaroons 0.13.0-1 source package in Ubuntu
Changelog
pymacaroons (0.13.0-1) unstable; urgency=medium [ Ondřej Nový ] * d/copyright: Use https protocol in Format field * d/watch: Use https protocol [ Colin Watson ] * New upstream release. -- Colin Watson <email address hidden> Thu, 22 Feb 2018 11:26:31 +0000
Upload details
- Uploaded by:
- Debian Python Modules Team
- Uploaded to:
- Sid
- Original maintainer:
- Debian Python Modules Team
- Architectures:
- all
- Section:
- misc
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Bionic | release | main | misc |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
pymacaroons_0.13.0-1.dsc | 2.2 KiB | b783b60ca0679329e867ce7d160e11f083211045b542583f2096cbba23eb8a30 |
pymacaroons_0.13.0.orig.tar.gz | 20.6 KiB | 1e6bba42a5f66c245adf38a5a4006a99dcc06a0703786ea636098667d42903b8 |
pymacaroons_0.13.0-1.debian.tar.xz | 2.3 KiB | e43448eb46afea3e79f1c7777436a6bb1539509af5254640e03be80459d896b5 |
Available diffs
- diff from 0.12.0-2 to 0.13.0-1 (2.8 KiB)
No changes file available.
Binary packages built by this source
- python-pymacaroons: Macaroon library for Python 2
Macaroons, like cookies, are a form of bearer credential. Unlike opaque
tokens, macaroons embed caveats that define specific authorization
requirements for the target service, the service that issued the root
macaroon and which is capable of verifying the integrity of macaroons it
receives.
.
Macaroons allow for delegation and attenuation of authorization. They are
simple and fast to verify, and decouple authorization policy from the
enforcement of that policy.
- python3-pymacaroons: Macaroon library for Python 3
Macaroons, like cookies, are a form of bearer credential. Unlike opaque
tokens, macaroons embed caveats that define specific authorization
requirements for the target service, the service that issued the root
macaroon and which is capable of verifying the integrity of macaroons it
receives.
.
Macaroons allow for delegation and attenuation of authorization. They are
simple and fast to verify, and decouple authorization policy from the
enforcement of that policy.