Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package python-django-debreach for
openSUSE:Factory checked in at 2022-01-08 23:23:55
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-django-debreach (Old)
and /work/SRC/openSUSE:Factory/.python-django-debreach.new.1892 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-django-debreach"
Sat Jan 8 23:23:55 2022 rev:5 rq:944841 version:2.1.0
Changes:
--------
---
/work/SRC/openSUSE:Factory/python-django-debreach/python-django-debreach.changes
2019-10-30 14:49:02.594260405 +0100
+++
/work/SRC/openSUSE:Factory/.python-django-debreach.new.1892/python-django-debreach.changes
2022-01-08 23:24:36.170279819 +0100
@@ -1,0 +2,6 @@
+Sat Jan 8 00:43:56 UTC 2022 - John Vandenberg <[email protected]>
+
+- Update to v2.1.0
+ * Add Django 4.0 support to tests
+
+-------------------------------------------------------------------
Old:
----
django-debreach-2.0.1.tar.gz
New:
----
django-debreach-2.1.0.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ python-django-debreach.spec ++++++
--- /var/tmp/diff_new_pack.ly7QEz/_old 2022-01-08 23:24:36.610280178 +0100
+++ /var/tmp/diff_new_pack.ly7QEz/_new 2022-01-08 23:24:36.614280182 +0100
@@ -1,7 +1,7 @@
#
# spec file for package python-django-debreach
#
-# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2022 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -18,15 +18,17 @@
%{?!python_module:%define python_module() python-%{**} python3-%{**}}
%define skip_python2 1
+%define skip_python36 1
Name: python-django-debreach
-Version: 2.0.1
+Version: 2.1.0
Release: 0
Summary: Middleware to protect against the BREACH attack in Django
License: BSD-2-Clause
URL: https://github.com/lpomfrey/django-debreach
Source:
https://files.pythonhosted.org/packages/source/d/django-debreach/django-debreach-%{version}.tar.gz
BuildRequires: %{python_module Django}
-BuildRequires: %{python_module setuptools}
+BuildRequires: %{python_module pip}
+BuildRequires: %{python_module wheel}
BuildRequires: fdupes
BuildRequires: python-rpm-macros
Requires: python-Django
@@ -34,22 +36,22 @@
%python_subpackages
%description
-Adds middleware and context processors to give some protection against the
BREACH attack in Django
+Adds middleware and context processors to give some protection against the
BREACH attack in Django.
%prep
%setup -q -n django-debreach-%{version}
%build
-%python_build
+%pyproject_wheel
%install
-%python_install
+%pyproject_install
%python_expand %fdupes %{buildroot}%{$python_sitelib}
%check
export PYTHONPATH=`pwd`
export DJANGO_SETTINGS_MODULE='test_project.settings'
-%python_expand %{_bindir}/django-admin.py-%{$python_bin_suffix} test debreach
--pythonpath=`pwd`
+%python_expand $python -m django test debreach -v2 --pythonpath=`pwd`
%files %{python_files}
%license LICENSE
++++++ django-debreach-2.0.1.tar.gz -> django-debreach-2.1.0.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/django-debreach-2.0.1/AUTHORS.rst
new/django-debreach-2.1.0/AUTHORS.rst
--- old/django-debreach-2.0.1/AUTHORS.rst 1970-01-01 01:00:00.000000000
+0100
+++ new/django-debreach-2.1.0/AUTHORS.rst 2016-01-10 17:05:37.000000000
+0100
@@ -0,0 +1,15 @@
+=======
+Credits
+=======
+
+Development Lead
+----------------
+
+* Luke Pomfrey <[email protected]>
+
+Contributors
+------------
+
+* Phillipe Ombredanne (https://github.com/pombredanne)
+* Christopher Ghormley (https://github.com/csghormley)
+* Daniel Hawkins (https://github.com/hwkns)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/django-debreach-2.0.1/PKG-INFO
new/django-debreach-2.1.0/PKG-INFO
--- old/django-debreach-2.0.1/PKG-INFO 2019-10-10 11:09:54.000000000 +0200
+++ new/django-debreach-2.1.0/PKG-INFO 2022-01-04 15:31:06.434652600 +0100
@@ -1,12 +1,13 @@
-Metadata-Version: 1.1
+Metadata-Version: 2.1
Name: django-debreach
-Version: 2.0.1
+Version: 2.1.0
Summary: Adds middleware to give some added protection against the BREACH
attack in Django.
Home-page: http://github.com/lpomfrey/django-debreach
Author: Luke Pomfrey
-Author-email: [email protected]
-License: BSD
-Description: UNKNOWN
+Author-email: [email protected]
+Maintainer: Luke Pomfrey
+Maintainer-email: [email protected]
+License: UNKNOWN
Platform: UNKNOWN
Classifier: Development Status :: 5 - Production/Stable
Classifier: Environment :: Web Environment
@@ -15,10 +16,86 @@
Classifier: Operating System :: OS Independent
Classifier: Framework :: Django
Classifier: Framework :: Django :: 2.2
+Classifier: Framework :: Django :: 3.2
+Classifier: Framework :: Django :: 4.0
Classifier: Programming Language :: Python
Classifier: Programming Language :: Python :: 3
-Classifier: Programming Language :: Python :: 3.5
-Classifier: Programming Language :: Python :: 3.6
+Classifier: Programming Language :: Python :: 3.7
+Classifier: Programming Language :: Python :: 3.8
+Classifier: Programming Language :: Python :: 3.9
+Classifier: Programming Language :: Python :: 3.10
Classifier: Programming Language :: Python :: Implementation :: CPython
Classifier: Programming Language :: Python :: Implementation :: PyPy
Classifier: Topic :: Internet :: WWW/HTTP
+Requires-Python: >=3.7
+License-File: LICENSE
+License-File: AUTHORS.rst
+
+django-debreach
+===============
+
+Extra mitigation against the `BREACH attack <http://breachattack.com/>`_
+for Django projects.
+
+django-debreach provides additional protection to Django's built in CSRF
+token masking by randomising the content length of each response. This is
+achieved by adding a random string of between 12 and 25 characters as a
+comment to the end of the HTML content. Note that this will only be applied to
+responses with a content type of ``text/html``.
+
+When combined with the built-in mitigations in Django and rate limiting
+(either in your web-server, or by using something like
+`django-ratelimit <http://django-ratelimit.readthedocs.org/>`_), the
+techniques here should provide a fairly comprehensive protection against the
+BREACH attack.
+
+.. image:: https://badge.fury.io/py/django-debreach.png
+ :target: https://badge.fury.io/py/django-debreach
+ :alt: PyPI
+.. image:: https://travis-ci.org/lpomfrey/django-debreach.png?branch=master
+ :target: https://travis-ci.org/lpomfrey/django-debreach
+ :alt: Build status
+
+.. image::
https://coveralls.io/repos/lpomfrey/django-debreach/badge.png?branch=master
+ :target: https://coveralls.io/r/lpomfrey/django-debreach?branch=master
+ :alt: Coverage
+
+Installation & Usage
+--------------------
+
+Install from PyPI using::
+
+ $ pip install django-debreach
+
+To enable content length modification for all responses, add the
+``debreach.middleware.RandomCommentMiddleware`` to the *start* of your
+middleware, but *after* the ``GzipMiddleware`` if you are using that.::
+
+ MIDDLEWARE_CLASSES = (
+ 'debreach.middleware.RandomCommentMiddleware',
+ ...
+ )
+
+or::
+
+ MIDDLEWARE_CLASSES = (
+ 'django.middleware.gzip.GzipMiddleware',
+ 'debreach.middleware.RandomCommentMiddleware',
+ ...
+ )
+
+If you wish to disable this feature for selected views, simply apply the
+``debreach.decorators.random_comment_exempt`` decorator to the view.
+
+If you only want to protect a subset of views with content length modification
+then it may be easier to not use the middleware, but to selectively apply the
+``debreach.decorators.append_random_comment`` decorator to the views you want
+protected.
+
+Python 2 and Django < 2.0 support
+---------------------------------
+
+Version 2.0.0 drops all support for Python 2 and Django < 2.0. If you need
+support for those versions continue using ``django-debreach>=1.5.2,<2.0``.
+
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/django-debreach-2.0.1/README.rst
new/django-debreach-2.1.0/README.rst
--- old/django-debreach-2.0.1/README.rst 2019-10-10 09:58:23.000000000
+0200
+++ new/django-debreach-2.1.0/README.rst 2022-01-04 15:12:39.000000000
+0100
@@ -1,19 +1,20 @@
django-debreach
===============
-Basic/extra mitigation against the `BREACH attack <http://breachattack.com/>`_
+Extra mitigation against the `BREACH attack <http://breachattack.com/>`_
for Django projects.
django-debreach provides additional protection to Django's built in CSRF
token masking by randomising the content length of each response. This is
-acheived by adding a random string of between 12 and 25 characters as a
+achieved by adding a random string of between 12 and 25 characters as a
comment to the end of the HTML content. Note that this will only be applied to
responses with a content type of ``text/html``.
-When combined with rate limiting in your web-server, or by using something
-like `django-ratelimit <http://django-ratelimit.readthedocs.org/>`_, the
-techniques here should provide at least some protection against the BREACH
-attack.
+When combined with the built-in mitigations in Django and rate limiting
+(either in your web-server, or by using something like
+`django-ratelimit <http://django-ratelimit.readthedocs.org/>`_), the
+techniques here should provide a fairly comprehensive protection against the
+BREACH attack.
.. image:: https://badge.fury.io/py/django-debreach.png
:target: https://badge.fury.io/py/django-debreach
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/django-debreach-2.0.1/debreach/__init__.py
new/django-debreach-2.1.0/debreach/__init__.py
--- old/django-debreach-2.0.1/debreach/__init__.py 2019-10-10
11:08:57.000000000 +0200
+++ new/django-debreach-2.1.0/debreach/__init__.py 2022-01-04
15:30:23.000000000 +0100
@@ -2,7 +2,7 @@
from distutils import version
-__version__ = '2.0.1'
+__version__ = '2.1.0'
version_info = version.StrictVersion(__version__).version
default_app_config = 'debreach.apps.DebreachConfig'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/django-debreach-2.0.1/debreach/tests.py
new/django-debreach-2.1.0/debreach/tests.py
--- old/django-debreach-2.0.1/debreach/tests.py 2019-10-10 09:56:08.000000000
+0200
+++ new/django-debreach-2.1.0/debreach/tests.py 2022-01-04 14:56:29.000000000
+0100
@@ -21,7 +21,7 @@
def test_noop_on_wrong_content_type(self):
response = HttpResponse('abc', content_type='text/plain')
request = RequestFactory().get('/')
- middleware = RandomCommentMiddleware()
+ middleware = RandomCommentMiddleware(lambda request: response)
response = middleware.process_response(request, response)
self.assertEqual(response.content, b'abc')
@@ -38,7 +38,7 @@
</html>'''
response = HttpResponse(html, content_type='text/html')
request = RequestFactory().get('/')
- middleware = RandomCommentMiddleware()
+ middleware = RandomCommentMiddleware(lambda request: response)
response = middleware.process_response(request, response)
self.assertNotEqual(response.content, html)
@@ -55,7 +55,7 @@
</html>'''.format(''.join(chr(x) for x in range(9999)))
response = HttpResponse(html, content_type='text/html')
request = RequestFactory().get('/')
- middleware = RandomCommentMiddleware()
+ middleware = RandomCommentMiddleware(lambda request: response)
response = middleware.process_response(request, response)
self.assertNotEqual(force_str(response.content), force_str(html))
@@ -67,7 +67,7 @@
response = HttpResponse(html)
response._random_comment_exempt = True
request = RequestFactory().get('/')
- middleware = RandomCommentMiddleware()
+ middleware = RandomCommentMiddleware(lambda request: response)
response = middleware.process_response(request, response)
self.assertEqual(force_str(response.content), html)
@@ -75,14 +75,14 @@
request = RequestFactory().get('/')
response = HttpResponse('')
del response['Content-Type']
- middleware = RandomCommentMiddleware()
+ middleware = RandomCommentMiddleware(lambda request: response)
processed_response = middleware.process_response(request, response)
self.assertEqual(response, processed_response)
def test_empty_response_body_ignored(self):
request = RequestFactory().get('/')
response = HttpResponse('')
- middleware = RandomCommentMiddleware()
+ middleware = RandomCommentMiddleware(lambda request: response)
processed_response = middleware.process_response(request, response)
self.assertEqual(len(processed_response.content), 0)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/django-debreach-2.0.1/django_debreach.egg-info/PKG-INFO
new/django-debreach-2.1.0/django_debreach.egg-info/PKG-INFO
--- old/django-debreach-2.0.1/django_debreach.egg-info/PKG-INFO 2019-10-10
11:09:53.000000000 +0200
+++ new/django-debreach-2.1.0/django_debreach.egg-info/PKG-INFO 2022-01-04
15:31:06.000000000 +0100
@@ -1,12 +1,13 @@
-Metadata-Version: 1.1
+Metadata-Version: 2.1
Name: django-debreach
-Version: 2.0.1
+Version: 2.1.0
Summary: Adds middleware to give some added protection against the BREACH
attack in Django.
Home-page: http://github.com/lpomfrey/django-debreach
Author: Luke Pomfrey
-Author-email: [email protected]
-License: BSD
-Description: UNKNOWN
+Author-email: [email protected]
+Maintainer: Luke Pomfrey
+Maintainer-email: [email protected]
+License: UNKNOWN
Platform: UNKNOWN
Classifier: Development Status :: 5 - Production/Stable
Classifier: Environment :: Web Environment
@@ -15,10 +16,86 @@
Classifier: Operating System :: OS Independent
Classifier: Framework :: Django
Classifier: Framework :: Django :: 2.2
+Classifier: Framework :: Django :: 3.2
+Classifier: Framework :: Django :: 4.0
Classifier: Programming Language :: Python
Classifier: Programming Language :: Python :: 3
-Classifier: Programming Language :: Python :: 3.5
-Classifier: Programming Language :: Python :: 3.6
+Classifier: Programming Language :: Python :: 3.7
+Classifier: Programming Language :: Python :: 3.8
+Classifier: Programming Language :: Python :: 3.9
+Classifier: Programming Language :: Python :: 3.10
Classifier: Programming Language :: Python :: Implementation :: CPython
Classifier: Programming Language :: Python :: Implementation :: PyPy
Classifier: Topic :: Internet :: WWW/HTTP
+Requires-Python: >=3.7
+License-File: LICENSE
+License-File: AUTHORS.rst
+
+django-debreach
+===============
+
+Extra mitigation against the `BREACH attack <http://breachattack.com/>`_
+for Django projects.
+
+django-debreach provides additional protection to Django's built in CSRF
+token masking by randomising the content length of each response. This is
+achieved by adding a random string of between 12 and 25 characters as a
+comment to the end of the HTML content. Note that this will only be applied to
+responses with a content type of ``text/html``.
+
+When combined with the built-in mitigations in Django and rate limiting
+(either in your web-server, or by using something like
+`django-ratelimit <http://django-ratelimit.readthedocs.org/>`_), the
+techniques here should provide a fairly comprehensive protection against the
+BREACH attack.
+
+.. image:: https://badge.fury.io/py/django-debreach.png
+ :target: https://badge.fury.io/py/django-debreach
+ :alt: PyPI
+.. image:: https://travis-ci.org/lpomfrey/django-debreach.png?branch=master
+ :target: https://travis-ci.org/lpomfrey/django-debreach
+ :alt: Build status
+
+.. image::
https://coveralls.io/repos/lpomfrey/django-debreach/badge.png?branch=master
+ :target: https://coveralls.io/r/lpomfrey/django-debreach?branch=master
+ :alt: Coverage
+
+Installation & Usage
+--------------------
+
+Install from PyPI using::
+
+ $ pip install django-debreach
+
+To enable content length modification for all responses, add the
+``debreach.middleware.RandomCommentMiddleware`` to the *start* of your
+middleware, but *after* the ``GzipMiddleware`` if you are using that.::
+
+ MIDDLEWARE_CLASSES = (
+ 'debreach.middleware.RandomCommentMiddleware',
+ ...
+ )
+
+or::
+
+ MIDDLEWARE_CLASSES = (
+ 'django.middleware.gzip.GzipMiddleware',
+ 'debreach.middleware.RandomCommentMiddleware',
+ ...
+ )
+
+If you wish to disable this feature for selected views, simply apply the
+``debreach.decorators.random_comment_exempt`` decorator to the view.
+
+If you only want to protect a subset of views with content length modification
+then it may be easier to not use the middleware, but to selectively apply the
+``debreach.decorators.append_random_comment`` decorator to the views you want
+protected.
+
+Python 2 and Django < 2.0 support
+---------------------------------
+
+Version 2.0.0 drops all support for Python 2 and Django < 2.0. If you need
+support for those versions continue using ``django-debreach>=1.5.2,<2.0``.
+
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/django-debreach-2.0.1/django_debreach.egg-info/SOURCES.txt
new/django-debreach-2.1.0/django_debreach.egg-info/SOURCES.txt
--- old/django-debreach-2.0.1/django_debreach.egg-info/SOURCES.txt
2019-10-10 11:09:53.000000000 +0200
+++ new/django-debreach-2.1.0/django_debreach.egg-info/SOURCES.txt
2022-01-04 15:31:06.000000000 +0100
@@ -1,8 +1,10 @@
+AUTHORS.rst
LICENSE
MANIFEST.in
README.rst
+pyproject.toml
runtests.py
-setup.py
+setup.cfg
debreach/__init__.py
debreach/apps.py
debreach/decorators.py
@@ -11,6 +13,7 @@
django_debreach.egg-info/PKG-INFO
django_debreach.egg-info/SOURCES.txt
django_debreach.egg-info/dependency_links.txt
+django_debreach.egg-info/not-zip-safe
django_debreach.egg-info/top_level.txt
docs/Makefile
docs/conf.py
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/django-debreach-2.0.1/django_debreach.egg-info/not-zip-safe
new/django-debreach-2.1.0/django_debreach.egg-info/not-zip-safe
--- old/django-debreach-2.0.1/django_debreach.egg-info/not-zip-safe
1970-01-01 01:00:00.000000000 +0100
+++ new/django-debreach-2.1.0/django_debreach.egg-info/not-zip-safe
2022-01-04 15:04:03.000000000 +0100
@@ -0,0 +1 @@
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/django-debreach-2.0.1/docs/index.rst
new/django-debreach-2.1.0/docs/index.rst
--- old/django-debreach-2.0.1/docs/index.rst 2019-10-10 09:58:23.000000000
+0200
+++ new/django-debreach-2.1.0/docs/index.rst 2022-01-04 15:12:39.000000000
+0100
@@ -1,19 +1,20 @@
django-debreach
===============
-Basic/extra mitigation against the `BREACH attack <http://breachattack.com/>`_
+Extra mitigation against the `BREACH attack <http://breachattack.com/>`_
for Django projects.
django-debreach provides additional protection to Django's built in CSRF
token masking by randomising the content length of each response. This is
-acheived by adding a random string of between 12 and 25 characters as a
+achieved by adding a random string of between 12 and 25 characters as a
comment to the end of the HTML content. Note that this will only be applied to
responses with a content type of ``text/html``.
-When combined with rate limiting in your web-server, or by using something
-like `django-ratelimit <http://django-ratelimit.readthedocs.org/>`_, the
-techniques here should provide at least some protection against the BREACH
-attack.
+When combined with the built-in mitigations in Django and rate limiting
+(either in your web-server, or by using something like
+`django-ratelimit <http://django-ratelimit.readthedocs.org/>`_), the
+techniques here should provide a fairly comprehensive protection against the
+BREACH attack.
.. image:: https://badge.fury.io/py/django-debreach.png
:target: https://badge.fury.io/py/django-debreach
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/django-debreach-2.0.1/pyproject.toml
new/django-debreach-2.1.0/pyproject.toml
--- old/django-debreach-2.0.1/pyproject.toml 1970-01-01 01:00:00.000000000
+0100
+++ new/django-debreach-2.1.0/pyproject.toml 2022-01-04 15:30:22.000000000
+0100
@@ -0,0 +1,7 @@
+[build-system]
+requires = ["setuptools", "wheel", "pip"]
+build-backend = "setuptools.build_meta"
+
+[tool.black]
+skip-string-normalization = true
+line-length = 79
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/django-debreach-2.0.1/setup.cfg
new/django-debreach-2.1.0/setup.cfg
--- old/django-debreach-2.0.1/setup.cfg 2019-10-10 11:09:54.000000000 +0200
+++ new/django-debreach-2.1.0/setup.cfg 2022-01-04 15:31:06.434652600 +0100
@@ -1,3 +1,54 @@
+[metadata]
+name = django-debreach
+version = attr: debreach.__version__
+description = Adds middleware to give some added protection against the BREACH
attack in Django.
+long_description = file: README.rst
+author = Luke Pomfrey
+author_email = [email protected]
+maintainer = Luke Pomfrey
+maintainer_email = [email protected]
+url = http://github.com/lpomfrey/django-debreach
+classifiers =
+ Development Status :: 5 - Production/Stable
+ Environment :: Web Environment
+ Intended Audience :: Developers
+ License :: OSI Approved :: BSD License
+ Operating System :: OS Independent
+ Framework :: Django
+ Framework :: Django :: 2.2
+ Framework :: Django :: 3.2
+ Framework :: Django :: 4.0
+ Programming Language :: Python
+ Programming Language :: Python :: 3
+ Programming Language :: Python :: 3.7
+ Programming Language :: Python :: 3.8
+ Programming Language :: Python :: 3.9
+ Programming Language :: Python :: 3.10
+ Programming Language :: Python :: Implementation :: CPython
+ Programming Language :: Python :: Implementation :: PyPy
+ Topic :: Internet :: WWW/HTTP
+
+[options]
+zip_safe = False
+include_package_data = True
+packages = find:
+setup_requires = setuptools;wheel;pip
+python_requires = >=3.7
+tests_require = django
+
+[options.packages.find]
+exclude =
+ test_project
+ docs
+
+[flake8]
+max-line-length = 88
+ignore = E203, E501, W503
+
+[pycodestyle]
+max-line-length = 88
+ignore = E203, E501, W503
+
[egg_info]
tag_build =
tag_date = 0
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/django-debreach-2.0.1/setup.py
new/django-debreach-2.1.0/setup.py
--- old/django-debreach-2.0.1/setup.py 2019-10-10 10:15:28.000000000 +0200
+++ new/django-debreach-2.1.0/setup.py 1970-01-01 01:00:00.000000000 +0100
@@ -1,79 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-import os
-import re
-import sys
-from setuptools import setup, find_packages
-
-
-def get_version(package):
- '''
- Return package version as listed in `__version__` in `init.py`.
- '''
- init_py = open(os.path.join(package, '__init__.py')).read()
- return re.search(
- '^__version__ = [\'"]([^\'"]+)[\'"]', init_py, re.MULTILINE
- ).group(1)
-
-
-version = get_version('debreach')
-
-
-_PUBLISH_WARNING = '''
-******************
-!!! DEPRECATED !!!
-******************
-
-Use twine to publish packages to pypi now.
-
-Ensure you have the `wheel` and `twine` packages installed with
-
- pip install wheel twine
-
-Then create some distributions like
-
- python setup.py sdist bdist_wheel
-
-Then upload with twine
-
- twine upload dist/*
-'''
-
-if sys.argv[-1] == 'publish':
- print(_PUBLISH_WARNING)
- sys.exit()
-
-
-setup(
- name='django-debreach',
- version=version,
- url='http://github.com/lpomfrey/django-debreach',
- license='BSD',
- description='Adds middleware to give some added protection against the '
- 'BREACH attack in Django.',
- author='Luke Pomfrey',
- author_email='[email protected]',
- packages=find_packages(exclude=('test_project', 'docs')),
- install_requires=[],
- tests_require=[
- 'django',
- ],
- test_suite='runtests.runtests',
- classifiers=[
- 'Development Status :: 5 - Production/Stable',
- 'Environment :: Web Environment',
- 'Intended Audience :: Developers',
- 'License :: OSI Approved :: BSD License',
- 'Operating System :: OS Independent',
- 'Framework :: Django',
- 'Framework :: Django :: 2.2',
- 'Programming Language :: Python',
- 'Programming Language :: Python :: 3',
- 'Programming Language :: Python :: 3.5',
- 'Programming Language :: Python :: 3.6',
- 'Programming Language :: Python :: Implementation :: CPython',
- 'Programming Language :: Python :: Implementation :: PyPy',
- 'Topic :: Internet :: WWW/HTTP'
- ]
-)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/django-debreach-2.0.1/test_project/urls.py
new/django-debreach-2.1.0/test_project/urls.py
--- old/django-debreach-2.0.1/test_project/urls.py 2016-08-13
12:51:57.000000000 +0200
+++ new/django-debreach-2.1.0/test_project/urls.py 2022-01-04
14:02:42.000000000 +0100
@@ -1,13 +1,12 @@
# -*- coding: utf-8 -*-
from __future__ import unicode_literals
-from django.conf.urls import url
+from django.urls import re_path
from django.views.generic.base import TemplateView
from django.views.generic.edit import FormView
from test_project.forms import TestForm
-
# Uncomment the next two lines to enable the admin:
# from django.contrib import admin
# admin.autodiscover()
@@ -16,19 +15,16 @@
# Examples:
# url(r'^$', 'test_project.views.home', name='home'),
# url(r'^test_project/', include('test_project.foo.urls')),
-
# Uncomment the admin/doc line below to enable admin documentation:
# url(r'^admin/doc/', include('django.contrib.admindocs.urls')),
-
# Uncomment the next line to enable the admin:
# url(r'^admin/', include(admin.site.urls)),
- url(r'^$', TemplateView.as_view(template_name='home.html'), name='home'),
- url(
- r'^form/$',
+ re_path(r"^$", TemplateView.as_view(template_name="home.html"),
name="home"),
+ re_path(
+ r"^form/$",
FormView.as_view(
- form_class=TestForm,
- template_name='test.html',
- success_url='/'),
- name='test_form'
+ form_class=TestForm, template_name="test.html", success_url="/"
+ ),
+ name="test_form",
),
]