Hello community,

here is the log from the commit of package python-oauth2client for 
openSUSE:Factory checked in at 2016-10-18 10:41:34
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-oauth2client (Old)
 and      /work/SRC/openSUSE:Factory/.python-oauth2client.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-oauth2client"

Changes:
--------
--- /work/SRC/openSUSE:Factory/python-oauth2client/python-oauth2client.changes  
2016-10-06 12:45:25.000000000 +0200
+++ 
/work/SRC/openSUSE:Factory/.python-oauth2client.new/python-oauth2client.changes 
    2016-10-18 10:41:42.000000000 +0200
@@ -1,0 +2,45 @@
+Wed Oct  5 15:21:32 UTC 2016 - rjsch...@suse.com
+
+- Update to version 3.0.0 (bsc#1002895)
+  + Add patch oauth2client-init-django-settings.patch (#661)
+  + Package tests again, but remain disabled due to Django issue (#661)
+  + Populate token_expiry for GCE credentials. (#473)
+  + Move GCE metadata interface to a separate module. (#520)
+  + Populate scopes for GCE credentials. (#524)
+  + Fix Python 3.5 compatibility. (#531)
+  + Add oauth2client.contrib.sqlalchemy, a SQLAlchemy-based credential
+    store. (#527)
+  + Improve error when an invalid client secret is provided. (#530)
+  + Add oauth2client.contrib.multiprocess_storage. This supersedes the
+    functionality in oauth2client.contrib.multistore_file. (#504)
+  + Pull httplib2 usage into a separate transport module. (#559, #561)
+  + Refactor all django-related code into oauth2client.contrib.django_util.
+    Add DjangoORMStorage, remove FlowField. (#546)
+  + Fix application default credentials resolution order. (#570)
+  + Add configurable timeout for GCE metadata server check. (#571)
+  + Add warnings when using deprecated approval_prompt='force'. (#572)
+  + Add deprecation warning to oauth2client.contrib.multistore_file. (#574)
+  + (Hygiene) PEP8 compliance and various style fixes (#537, #540, #552, #562)
+  + (Hygiene) Remove duplicated exception classes in
+    oauth2client.contrib.appengine. (#533)
+- From 2.2.0
+  + Added support to override token_uri and revoke_uri in
+    oauth2client.service_account.ServiceAccountCredentials. (#510)
+  + oauth2client.contrib.multistore_file now handles OSError in addition
+    to IOError because Windows may raise OSError where other platforms
+    will raise IOError.
+  + oauth2client.contrib.django_util and oauth2client.contrib.django_orm
+    have been updated to support Django 1.8 - 1.10. Versions of Django
+    below 1.8 will not work with these modules.
+- From 2.1.0
+  + Add basic support for JWT access credentials. (#503)
+  + Fix oauth2client.client.DeviceFlowInfo to use UTC instead of the
+    system timezone when calculating code expiration.
+- From 2.0.2
+  + Fix issue where flask_util.UserOAuth2.required would accept expired
+    credentials (#452).
+  + Fix issue where flask_util would fill the session with Flow objects (#498).
+  + Fix issue with Python 3 binary strings in Flow.step2_exchange (#446).
+  + Improve test coverage to 100%.
+
+-------------------------------------------------------------------

Old:
----
  oauth2client-2.0.1.tar.gz

New:
----
  oauth2client-3.0.0.tar.gz
  oauth2client-init-django-settings.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-oauth2client.spec ++++++
--- /var/tmp/diff_new_pack.B9AMom/_old  2016-10-18 10:41:45.000000000 +0200
+++ /var/tmp/diff_new_pack.B9AMom/_new  2016-10-18 10:41:45.000000000 +0200
@@ -17,13 +17,14 @@
 
 
 Name:           python-oauth2client
-Version:        2.0.1
+Version:        3.0.0
 Release:        0
-Summary:        Pythob OAuth2 CLient
+Summary:        Pythob OAuth2 Client
 License:        Apache-2.0
 Group:          Development/Languages/Python
 Url:            https://github.com/google/oauth2client
 Source0:        oauth2client-%{version}.tar.gz
+Patch1:         oauth2client-init-django-settings.patch
 Requires:       python
 Requires:       python-httplib2        >= 0.9.1
 Requires:       python-keyring
@@ -33,12 +34,15 @@
 Requires:       python-rsa             >= 3.1.4
 Requires:       python-six             >= 1.6.1
 %if 0%{?suse_version} && 0%{?suse_version} > 1110
-BuildRequires:  python-Django
+BuildRequires:  python-Django   >= 1.8
 %endif
+BuildRequires:  python-SQLAlchemy
+BuildRequires:  python-fasteners
 BuildRequires:  python-flask
 BuildRequires:  python-httplib2        >= 0.9.1
 BuildRequires:  python-keyring
 BuildRequires:  python-mock
+BuildRequires:  python-nose
 BuildRequires:  python-pyOpenSSL
 BuildRequires:  python-pyasn1-modules  >= 0.0.5
 BuildRequires:  python-pycrypto
@@ -47,6 +51,8 @@
 BuildRequires:  python-six             >= 1.6.1
 BuildRequires:  python-unittest2
 Conflicts:      google-api-python-client  < 1.3.0
+# Don't ask, we obviously have problems working together
+Conflicts:      python-google-api-python-client  < 1.3.0
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 %if 0%{?suse_version} && 0%{?suse_version} <= 1110
 %{!?python_sitelib: %global python_sitelib %(python -c "from 
distutils.sysconfig import get_python_lib; print get_python_lib()")}
@@ -62,7 +68,7 @@
 Summary:        Django extension
 Group:          Development/Libraries/Python
 PreReq:         python-oauth2client = %version
-Requires:       python-Django
+Requires:       python-Django >= 1.8
 
 %description django
 OAuth 2.0 utilities for Django.
@@ -93,20 +99,57 @@
 
 Utilities for making it easier to use OAuth 2.0 on Google Compute Engine.
 
+%package test
+Summary:        Tests for python-oauth2client
+Group:          Development/Libraries/Python
+PreReq:         python-oauth2client = %version
+%if 0%{?suse_version} && 0%{?suse_version} > 1110
+PreReq:         python-oauth2client-django = %version
+%endif
+PreReq:         python-oauth2client-flask = %version
+PreReq:         python-oauth2client-gce = %version
+Requires:       python-coverage
+Requires:       python-httplib2     >= 0.9.1
+Requires:       python-mock
+Requires:       python-nose
+Requires:       python-pyasn1       >= 0.1.7
+Requires:       python-pyasn1-modules >= 0.0.5
+Requires:       python-rsa          >= 3.1.4
+Requires:       python-six          >= 1.6.1
+Requires:       python-unittest2
+
+%description test
+Package provides the unit tests for python-oauth2client
+
 
 %prep
 %setup -q -n oauth2client-%{version}
 # remove extensions currently not packaged
-rm oauth2client/contrib/*appengine*
+rm -rf oauth2client/contrib/*appengine*
 %if 0%{?suse_version} && 0%{?suse_version} <= 1110
 rm -rf oauth2client/contrib/*django*
 %endif
+%patch1
 
 %build
 python setup.py build
 
 %install
 python setup.py install --prefix=%{_prefix} --root=%{buildroot}
+mkdir -p %{buildroot}%{python_sitelib}/tests/oauth2client
+# remove tests for extensions we do not build at the moment
+rm tests/contrib/*appengine*
+%if 0%{?suse_version} && 0%{?suse_version} <= 1110
+rm tests/contrib/*django*
+%endif
+mv %{buildroot}%{python_sitelib}/tests/*.py* 
%{buildroot}%{python_sitelib}/tests/oauth2client
+mv %{buildroot}%{python_sitelib}/tests/contrib 
%{buildroot}%{python_sitelib}/tests/oauth2client
+
+# Even with tests/contrib/django_util removed there is still one test I could
+# not find that loads django_util which then fails. Disable tests for now and
+# hope for the best
+#%check
+#nosetests
 
 %files
 %defattr(-,root,root,-)
@@ -135,4 +178,10 @@
 %defattr(-,root,root,-)
 %{python_sitelib}/oauth2client/contrib/gce*
 
+%files test
+%defattr(-,root,root,-)
+%dir %{python_sitelib}/tests
+%dir %{python_sitelib}/tests/oauth2client
+%{python_sitelib}/tests/oauth2client/*
+
 %changelog

++++++ oauth2client-2.0.1.tar.gz -> oauth2client-3.0.0.tar.gz ++++++
++++ 18120 lines of diff (skipped)

++++++ oauth2client-init-django-settings.patch ++++++
--- oauth2client/contrib/django_util/__init__.py.orig
+++ oauth2client/contrib/django_util/__init__.py
@@ -348,8 +348,7 @@ class OAuth2Settings(object):
         (self.storage_model, self.storage_model_user_property,
          self.storage_model_credentials_property) = _get_storage_model()
 
-
-oauth2_settings = OAuth2Settings(django.conf.settings)
+oauth2_settings = OAuth2Settings(django.conf.settings.configure())
 
 _CREDENTIALS_KEY = 'google_oauth2_credentials'
 

Reply via email to