Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package python-django-debreach for 
openSUSE:Factory checked in at 2022-01-08 23:23:55
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-django-debreach (Old)
 and      /work/SRC/openSUSE:Factory/.python-django-debreach.new.1892 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-django-debreach"

Sat Jan  8 23:23:55 2022 rev:5 rq:944841 version:2.1.0

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/python-django-debreach/python-django-debreach.changes
    2019-10-30 14:49:02.594260405 +0100
+++ 
/work/SRC/openSUSE:Factory/.python-django-debreach.new.1892/python-django-debreach.changes
  2022-01-08 23:24:36.170279819 +0100
@@ -1,0 +2,6 @@
+Sat Jan  8 00:43:56 UTC 2022 - John Vandenberg <jay...@gmail.com>
+
+- Update to v2.1.0
+  * Add Django 4.0 support to tests
+
+-------------------------------------------------------------------

Old:
----
  django-debreach-2.0.1.tar.gz

New:
----
  django-debreach-2.1.0.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-django-debreach.spec ++++++
--- /var/tmp/diff_new_pack.ly7QEz/_old  2022-01-08 23:24:36.610280178 +0100
+++ /var/tmp/diff_new_pack.ly7QEz/_new  2022-01-08 23:24:36.614280182 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package python-django-debreach
 #
-# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2022 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -18,15 +18,17 @@
 
 %{?!python_module:%define python_module() python-%{**} python3-%{**}}
 %define skip_python2 1
+%define skip_python36 1
 Name:           python-django-debreach
-Version:        2.0.1
+Version:        2.1.0
 Release:        0
 Summary:        Middleware to protect against the BREACH attack in Django
 License:        BSD-2-Clause
 URL:            https://github.com/lpomfrey/django-debreach
 Source:         
https://files.pythonhosted.org/packages/source/d/django-debreach/django-debreach-%{version}.tar.gz
 BuildRequires:  %{python_module Django}
-BuildRequires:  %{python_module setuptools}
+BuildRequires:  %{python_module pip}
+BuildRequires:  %{python_module wheel}
 BuildRequires:  fdupes
 BuildRequires:  python-rpm-macros
 Requires:       python-Django
@@ -34,22 +36,22 @@
 %python_subpackages
 
 %description
-Adds middleware and context processors to give some protection against the 
BREACH attack in Django
+Adds middleware and context processors to give some protection against the 
BREACH attack in Django.
 
 %prep
 %setup -q -n django-debreach-%{version}
 
 %build
-%python_build
+%pyproject_wheel
 
 %install
-%python_install
+%pyproject_install
 %python_expand %fdupes %{buildroot}%{$python_sitelib}
 
 %check
 export PYTHONPATH=`pwd`
 export DJANGO_SETTINGS_MODULE='test_project.settings'
-%python_expand %{_bindir}/django-admin.py-%{$python_bin_suffix} test debreach 
--pythonpath=`pwd`
+%python_expand $python -m django test debreach -v2 --pythonpath=`pwd`
 
 %files %{python_files}
 %license LICENSE

++++++ django-debreach-2.0.1.tar.gz -> django-debreach-2.1.0.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/django-debreach-2.0.1/AUTHORS.rst 
new/django-debreach-2.1.0/AUTHORS.rst
--- old/django-debreach-2.0.1/AUTHORS.rst       1970-01-01 01:00:00.000000000 
+0100
+++ new/django-debreach-2.1.0/AUTHORS.rst       2016-01-10 17:05:37.000000000 
+0100
@@ -0,0 +1,15 @@
+=======
+Credits
+=======
+
+Development Lead
+----------------
+
+* Luke Pomfrey <pomf...@gmail.com>
+
+Contributors
+------------
+
+* Phillipe Ombredanne (https://github.com/pombredanne)
+* Christopher Ghormley (https://github.com/csghormley)
+* Daniel Hawkins (https://github.com/hwkns)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/django-debreach-2.0.1/PKG-INFO 
new/django-debreach-2.1.0/PKG-INFO
--- old/django-debreach-2.0.1/PKG-INFO  2019-10-10 11:09:54.000000000 +0200
+++ new/django-debreach-2.1.0/PKG-INFO  2022-01-04 15:31:06.434652600 +0100
@@ -1,12 +1,13 @@
-Metadata-Version: 1.1
+Metadata-Version: 2.1
 Name: django-debreach
-Version: 2.0.1
+Version: 2.1.0
 Summary: Adds middleware to give some added protection against the BREACH 
attack in Django.
 Home-page: http://github.com/lpomfrey/django-debreach
 Author: Luke Pomfrey
-Author-email: lpomf...@gmail.com
-License: BSD
-Description: UNKNOWN
+Author-email: l...@lukepomfrey.org
+Maintainer: Luke Pomfrey
+Maintainer-email: l...@lukepomfrey.org
+License: UNKNOWN
 Platform: UNKNOWN
 Classifier: Development Status :: 5 - Production/Stable
 Classifier: Environment :: Web Environment
@@ -15,10 +16,86 @@
 Classifier: Operating System :: OS Independent
 Classifier: Framework :: Django
 Classifier: Framework :: Django :: 2.2
+Classifier: Framework :: Django :: 3.2
+Classifier: Framework :: Django :: 4.0
 Classifier: Programming Language :: Python
 Classifier: Programming Language :: Python :: 3
-Classifier: Programming Language :: Python :: 3.5
-Classifier: Programming Language :: Python :: 3.6
+Classifier: Programming Language :: Python :: 3.7
+Classifier: Programming Language :: Python :: 3.8
+Classifier: Programming Language :: Python :: 3.9
+Classifier: Programming Language :: Python :: 3.10
 Classifier: Programming Language :: Python :: Implementation :: CPython
 Classifier: Programming Language :: Python :: Implementation :: PyPy
 Classifier: Topic :: Internet :: WWW/HTTP
+Requires-Python: >=3.7
+License-File: LICENSE
+License-File: AUTHORS.rst
+
+django-debreach
+===============
+
+Extra mitigation against the `BREACH attack <http://breachattack.com/>`_ 
+for Django projects. 
+
+django-debreach provides additional protection to Django's built in CSRF
+token masking by randomising the content length of each response. This is 
+achieved by adding a random string of between 12 and 25 characters as a 
+comment to the end of the HTML content. Note that this will only be applied to 
+responses with a content type of ``text/html``.
+
+When combined with the built-in mitigations in Django and rate limiting 
+(either in your web-server, or by using something like 
+`django-ratelimit <http://django-ratelimit.readthedocs.org/>`_), the 
+techniques here should provide a fairly comprehensive protection against the 
+BREACH attack.
+
+.. image:: https://badge.fury.io/py/django-debreach.png
+    :target: https://badge.fury.io/py/django-debreach
+    :alt: PyPI
+.. image:: https://travis-ci.org/lpomfrey/django-debreach.png?branch=master
+    :target: https://travis-ci.org/lpomfrey/django-debreach
+    :alt: Build status
+
+.. image:: 
https://coveralls.io/repos/lpomfrey/django-debreach/badge.png?branch=master
+    :target: https://coveralls.io/r/lpomfrey/django-debreach?branch=master
+    :alt: Coverage
+
+Installation & Usage
+--------------------
+
+Install from PyPI using::
+
+    $ pip install django-debreach
+
+To enable content length modification for all responses, add the
+``debreach.middleware.RandomCommentMiddleware`` to the *start* of your
+middleware, but *after* the ``GzipMiddleware`` if you are using that.::
+
+    MIDDLEWARE_CLASSES = (
+        'debreach.middleware.RandomCommentMiddleware',
+        ...
+    )
+
+or::
+
+    MIDDLEWARE_CLASSES = (
+        'django.middleware.gzip.GzipMiddleware',
+        'debreach.middleware.RandomCommentMiddleware',
+        ...
+    )
+
+If you wish to disable this feature for selected views, simply apply the
+``debreach.decorators.random_comment_exempt`` decorator to the view.
+
+If you only want to protect a subset of views with content length modification
+then it may be easier to not use the middleware, but to selectively apply the
+``debreach.decorators.append_random_comment`` decorator to the views you want
+protected.
+
+Python 2 and Django < 2.0 support
+---------------------------------
+
+Version 2.0.0 drops all support for Python 2 and Django < 2.0. If you need 
+support for those versions continue using ``django-debreach>=1.5.2,<2.0``.
+
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/django-debreach-2.0.1/README.rst 
new/django-debreach-2.1.0/README.rst
--- old/django-debreach-2.0.1/README.rst        2019-10-10 09:58:23.000000000 
+0200
+++ new/django-debreach-2.1.0/README.rst        2022-01-04 15:12:39.000000000 
+0100
@@ -1,19 +1,20 @@
 django-debreach
 ===============
 
-Basic/extra mitigation against the `BREACH attack <http://breachattack.com/>`_ 
+Extra mitigation against the `BREACH attack <http://breachattack.com/>`_ 
 for Django projects. 
 
 django-debreach provides additional protection to Django's built in CSRF
 token masking by randomising the content length of each response. This is 
-acheived by adding a random string of between 12 and 25 characters as a 
+achieved by adding a random string of between 12 and 25 characters as a 
 comment to the end of the HTML content. Note that this will only be applied to 
 responses with a content type of ``text/html``.
 
-When combined with rate limiting in your web-server, or by using something
-like `django-ratelimit <http://django-ratelimit.readthedocs.org/>`_, the 
-techniques here should provide at least some protection against the BREACH 
-attack.
+When combined with the built-in mitigations in Django and rate limiting 
+(either in your web-server, or by using something like 
+`django-ratelimit <http://django-ratelimit.readthedocs.org/>`_), the 
+techniques here should provide a fairly comprehensive protection against the 
+BREACH attack.
 
 .. image:: https://badge.fury.io/py/django-debreach.png
     :target: https://badge.fury.io/py/django-debreach
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/django-debreach-2.0.1/debreach/__init__.py 
new/django-debreach-2.1.0/debreach/__init__.py
--- old/django-debreach-2.0.1/debreach/__init__.py      2019-10-10 
11:08:57.000000000 +0200
+++ new/django-debreach-2.1.0/debreach/__init__.py      2022-01-04 
15:30:23.000000000 +0100
@@ -2,7 +2,7 @@
 from distutils import version
 
 
-__version__ = '2.0.1'
+__version__ = '2.1.0'
 version_info = version.StrictVersion(__version__).version
 
 default_app_config = 'debreach.apps.DebreachConfig'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/django-debreach-2.0.1/debreach/tests.py 
new/django-debreach-2.1.0/debreach/tests.py
--- old/django-debreach-2.0.1/debreach/tests.py 2019-10-10 09:56:08.000000000 
+0200
+++ new/django-debreach-2.1.0/debreach/tests.py 2022-01-04 14:56:29.000000000 
+0100
@@ -21,7 +21,7 @@
     def test_noop_on_wrong_content_type(self):
         response = HttpResponse('abc', content_type='text/plain')
         request = RequestFactory().get('/')
-        middleware = RandomCommentMiddleware()
+        middleware = RandomCommentMiddleware(lambda request: response)
         response = middleware.process_response(request, response)
         self.assertEqual(response.content, b'abc')
 
@@ -38,7 +38,7 @@
 </html>'''
         response = HttpResponse(html, content_type='text/html')
         request = RequestFactory().get('/')
-        middleware = RandomCommentMiddleware()
+        middleware = RandomCommentMiddleware(lambda request: response)
         response = middleware.process_response(request, response)
         self.assertNotEqual(response.content, html)
 
@@ -55,7 +55,7 @@
 </html>'''.format(''.join(chr(x) for x in range(9999)))
         response = HttpResponse(html, content_type='text/html')
         request = RequestFactory().get('/')
-        middleware = RandomCommentMiddleware()
+        middleware = RandomCommentMiddleware(lambda request: response)
         response = middleware.process_response(request, response)
         self.assertNotEqual(force_str(response.content), force_str(html))
 
@@ -67,7 +67,7 @@
         response = HttpResponse(html)
         response._random_comment_exempt = True
         request = RequestFactory().get('/')
-        middleware = RandomCommentMiddleware()
+        middleware = RandomCommentMiddleware(lambda request: response)
         response = middleware.process_response(request, response)
         self.assertEqual(force_str(response.content), html)
 
@@ -75,14 +75,14 @@
         request = RequestFactory().get('/')
         response = HttpResponse('')
         del response['Content-Type']
-        middleware = RandomCommentMiddleware()
+        middleware = RandomCommentMiddleware(lambda request: response)
         processed_response = middleware.process_response(request, response)
         self.assertEqual(response, processed_response)
 
     def test_empty_response_body_ignored(self):
         request = RequestFactory().get('/')
         response = HttpResponse('')
-        middleware = RandomCommentMiddleware()
+        middleware = RandomCommentMiddleware(lambda request: response)
         processed_response = middleware.process_response(request, response)
         self.assertEqual(len(processed_response.content), 0)
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/django-debreach-2.0.1/django_debreach.egg-info/PKG-INFO 
new/django-debreach-2.1.0/django_debreach.egg-info/PKG-INFO
--- old/django-debreach-2.0.1/django_debreach.egg-info/PKG-INFO 2019-10-10 
11:09:53.000000000 +0200
+++ new/django-debreach-2.1.0/django_debreach.egg-info/PKG-INFO 2022-01-04 
15:31:06.000000000 +0100
@@ -1,12 +1,13 @@
-Metadata-Version: 1.1
+Metadata-Version: 2.1
 Name: django-debreach
-Version: 2.0.1
+Version: 2.1.0
 Summary: Adds middleware to give some added protection against the BREACH 
attack in Django.
 Home-page: http://github.com/lpomfrey/django-debreach
 Author: Luke Pomfrey
-Author-email: lpomf...@gmail.com
-License: BSD
-Description: UNKNOWN
+Author-email: l...@lukepomfrey.org
+Maintainer: Luke Pomfrey
+Maintainer-email: l...@lukepomfrey.org
+License: UNKNOWN
 Platform: UNKNOWN
 Classifier: Development Status :: 5 - Production/Stable
 Classifier: Environment :: Web Environment
@@ -15,10 +16,86 @@
 Classifier: Operating System :: OS Independent
 Classifier: Framework :: Django
 Classifier: Framework :: Django :: 2.2
+Classifier: Framework :: Django :: 3.2
+Classifier: Framework :: Django :: 4.0
 Classifier: Programming Language :: Python
 Classifier: Programming Language :: Python :: 3
-Classifier: Programming Language :: Python :: 3.5
-Classifier: Programming Language :: Python :: 3.6
+Classifier: Programming Language :: Python :: 3.7
+Classifier: Programming Language :: Python :: 3.8
+Classifier: Programming Language :: Python :: 3.9
+Classifier: Programming Language :: Python :: 3.10
 Classifier: Programming Language :: Python :: Implementation :: CPython
 Classifier: Programming Language :: Python :: Implementation :: PyPy
 Classifier: Topic :: Internet :: WWW/HTTP
+Requires-Python: >=3.7
+License-File: LICENSE
+License-File: AUTHORS.rst
+
+django-debreach
+===============
+
+Extra mitigation against the `BREACH attack <http://breachattack.com/>`_ 
+for Django projects. 
+
+django-debreach provides additional protection to Django's built in CSRF
+token masking by randomising the content length of each response. This is 
+achieved by adding a random string of between 12 and 25 characters as a 
+comment to the end of the HTML content. Note that this will only be applied to 
+responses with a content type of ``text/html``.
+
+When combined with the built-in mitigations in Django and rate limiting 
+(either in your web-server, or by using something like 
+`django-ratelimit <http://django-ratelimit.readthedocs.org/>`_), the 
+techniques here should provide a fairly comprehensive protection against the 
+BREACH attack.
+
+.. image:: https://badge.fury.io/py/django-debreach.png
+    :target: https://badge.fury.io/py/django-debreach
+    :alt: PyPI
+.. image:: https://travis-ci.org/lpomfrey/django-debreach.png?branch=master
+    :target: https://travis-ci.org/lpomfrey/django-debreach
+    :alt: Build status
+
+.. image:: 
https://coveralls.io/repos/lpomfrey/django-debreach/badge.png?branch=master
+    :target: https://coveralls.io/r/lpomfrey/django-debreach?branch=master
+    :alt: Coverage
+
+Installation & Usage
+--------------------
+
+Install from PyPI using::
+
+    $ pip install django-debreach
+
+To enable content length modification for all responses, add the
+``debreach.middleware.RandomCommentMiddleware`` to the *start* of your
+middleware, but *after* the ``GzipMiddleware`` if you are using that.::
+
+    MIDDLEWARE_CLASSES = (
+        'debreach.middleware.RandomCommentMiddleware',
+        ...
+    )
+
+or::
+
+    MIDDLEWARE_CLASSES = (
+        'django.middleware.gzip.GzipMiddleware',
+        'debreach.middleware.RandomCommentMiddleware',
+        ...
+    )
+
+If you wish to disable this feature for selected views, simply apply the
+``debreach.decorators.random_comment_exempt`` decorator to the view.
+
+If you only want to protect a subset of views with content length modification
+then it may be easier to not use the middleware, but to selectively apply the
+``debreach.decorators.append_random_comment`` decorator to the views you want
+protected.
+
+Python 2 and Django < 2.0 support
+---------------------------------
+
+Version 2.0.0 drops all support for Python 2 and Django < 2.0. If you need 
+support for those versions continue using ``django-debreach>=1.5.2,<2.0``.
+
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/django-debreach-2.0.1/django_debreach.egg-info/SOURCES.txt 
new/django-debreach-2.1.0/django_debreach.egg-info/SOURCES.txt
--- old/django-debreach-2.0.1/django_debreach.egg-info/SOURCES.txt      
2019-10-10 11:09:53.000000000 +0200
+++ new/django-debreach-2.1.0/django_debreach.egg-info/SOURCES.txt      
2022-01-04 15:31:06.000000000 +0100
@@ -1,8 +1,10 @@
+AUTHORS.rst
 LICENSE
 MANIFEST.in
 README.rst
+pyproject.toml
 runtests.py
-setup.py
+setup.cfg
 debreach/__init__.py
 debreach/apps.py
 debreach/decorators.py
@@ -11,6 +13,7 @@
 django_debreach.egg-info/PKG-INFO
 django_debreach.egg-info/SOURCES.txt
 django_debreach.egg-info/dependency_links.txt
+django_debreach.egg-info/not-zip-safe
 django_debreach.egg-info/top_level.txt
 docs/Makefile
 docs/conf.py
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/django-debreach-2.0.1/django_debreach.egg-info/not-zip-safe 
new/django-debreach-2.1.0/django_debreach.egg-info/not-zip-safe
--- old/django-debreach-2.0.1/django_debreach.egg-info/not-zip-safe     
1970-01-01 01:00:00.000000000 +0100
+++ new/django-debreach-2.1.0/django_debreach.egg-info/not-zip-safe     
2022-01-04 15:04:03.000000000 +0100
@@ -0,0 +1 @@
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/django-debreach-2.0.1/docs/index.rst 
new/django-debreach-2.1.0/docs/index.rst
--- old/django-debreach-2.0.1/docs/index.rst    2019-10-10 09:58:23.000000000 
+0200
+++ new/django-debreach-2.1.0/docs/index.rst    2022-01-04 15:12:39.000000000 
+0100
@@ -1,19 +1,20 @@
 django-debreach
 ===============
 
-Basic/extra mitigation against the `BREACH attack <http://breachattack.com/>`_ 
+Extra mitigation against the `BREACH attack <http://breachattack.com/>`_ 
 for Django projects. 
 
 django-debreach provides additional protection to Django's built in CSRF
 token masking by randomising the content length of each response. This is 
-acheived by adding a random string of between 12 and 25 characters as a 
+achieved by adding a random string of between 12 and 25 characters as a 
 comment to the end of the HTML content. Note that this will only be applied to 
 responses with a content type of ``text/html``.
 
-When combined with rate limiting in your web-server, or by using something
-like `django-ratelimit <http://django-ratelimit.readthedocs.org/>`_, the 
-techniques here should provide at least some protection against the BREACH 
-attack.
+When combined with the built-in mitigations in Django and rate limiting 
+(either in your web-server, or by using something like 
+`django-ratelimit <http://django-ratelimit.readthedocs.org/>`_), the 
+techniques here should provide a fairly comprehensive protection against the 
+BREACH attack.
 
 .. image:: https://badge.fury.io/py/django-debreach.png
     :target: https://badge.fury.io/py/django-debreach
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/django-debreach-2.0.1/pyproject.toml 
new/django-debreach-2.1.0/pyproject.toml
--- old/django-debreach-2.0.1/pyproject.toml    1970-01-01 01:00:00.000000000 
+0100
+++ new/django-debreach-2.1.0/pyproject.toml    2022-01-04 15:30:22.000000000 
+0100
@@ -0,0 +1,7 @@
+[build-system]
+requires = ["setuptools", "wheel", "pip"]
+build-backend = "setuptools.build_meta"
+
+[tool.black]
+skip-string-normalization = true
+line-length = 79
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/django-debreach-2.0.1/setup.cfg 
new/django-debreach-2.1.0/setup.cfg
--- old/django-debreach-2.0.1/setup.cfg 2019-10-10 11:09:54.000000000 +0200
+++ new/django-debreach-2.1.0/setup.cfg 2022-01-04 15:31:06.434652600 +0100
@@ -1,3 +1,54 @@
+[metadata]
+name = django-debreach
+version = attr: debreach.__version__
+description = Adds middleware to give some added protection against the BREACH 
attack in Django.
+long_description = file: README.rst
+author = Luke Pomfrey
+author_email = l...@lukepomfrey.org
+maintainer = Luke Pomfrey
+maintainer_email = l...@lukepomfrey.org
+url = http://github.com/lpomfrey/django-debreach
+classifiers = 
+       Development Status :: 5 - Production/Stable
+       Environment :: Web Environment
+       Intended Audience :: Developers
+       License :: OSI Approved :: BSD License
+       Operating System :: OS Independent
+       Framework :: Django
+       Framework :: Django :: 2.2
+       Framework :: Django :: 3.2
+       Framework :: Django :: 4.0
+       Programming Language :: Python
+       Programming Language :: Python :: 3
+       Programming Language :: Python :: 3.7
+       Programming Language :: Python :: 3.8
+       Programming Language :: Python :: 3.9
+       Programming Language :: Python :: 3.10
+       Programming Language :: Python :: Implementation :: CPython
+       Programming Language :: Python :: Implementation :: PyPy
+       Topic :: Internet :: WWW/HTTP
+
+[options]
+zip_safe = False
+include_package_data = True
+packages = find:
+setup_requires = setuptools;wheel;pip
+python_requires = >=3.7
+tests_require = django
+
+[options.packages.find]
+exclude = 
+       test_project
+       docs
+
+[flake8]
+max-line-length = 88
+ignore = E203, E501, W503
+
+[pycodestyle]
+max-line-length = 88
+ignore = E203, E501, W503
+
 [egg_info]
 tag_build = 
 tag_date = 0
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/django-debreach-2.0.1/setup.py 
new/django-debreach-2.1.0/setup.py
--- old/django-debreach-2.0.1/setup.py  2019-10-10 10:15:28.000000000 +0200
+++ new/django-debreach-2.1.0/setup.py  1970-01-01 01:00:00.000000000 +0100
@@ -1,79 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-import os
-import re
-import sys
-from setuptools import setup, find_packages
-
-
-def get_version(package):
-    '''
-    Return package version as listed in `__version__` in `init.py`.
-    '''
-    init_py = open(os.path.join(package, '__init__.py')).read()
-    return re.search(
-        '^__version__ = [\'"]([^\'"]+)[\'"]', init_py, re.MULTILINE
-    ).group(1)
-
-
-version = get_version('debreach')
-
-
-_PUBLISH_WARNING = '''
-******************
-!!! DEPRECATED !!!
-******************
-
-Use twine to publish packages to pypi now.
-
-Ensure you have the `wheel` and `twine` packages installed with
-
-    pip install wheel twine
-
-Then create some distributions like
-
-    python setup.py sdist bdist_wheel
-
-Then upload with twine
-
-    twine upload dist/*
-'''
-
-if sys.argv[-1] == 'publish':
-    print(_PUBLISH_WARNING)
-    sys.exit()
-
-
-setup(
-    name='django-debreach',
-    version=version,
-    url='http://github.com/lpomfrey/django-debreach',
-    license='BSD',
-    description='Adds middleware to give some added protection against the '
-                'BREACH attack in Django.',
-    author='Luke Pomfrey',
-    author_email='lpomf...@gmail.com',
-    packages=find_packages(exclude=('test_project', 'docs')),
-    install_requires=[],
-    tests_require=[
-        'django',
-    ],
-    test_suite='runtests.runtests',
-    classifiers=[
-        'Development Status :: 5 - Production/Stable',
-        'Environment :: Web Environment',
-        'Intended Audience :: Developers',
-        'License :: OSI Approved :: BSD License',
-        'Operating System :: OS Independent',
-        'Framework :: Django',
-        'Framework :: Django :: 2.2',
-        'Programming Language :: Python',
-        'Programming Language :: Python :: 3',
-        'Programming Language :: Python :: 3.5',
-        'Programming Language :: Python :: 3.6',
-        'Programming Language :: Python :: Implementation :: CPython',
-        'Programming Language :: Python :: Implementation :: PyPy',
-        'Topic :: Internet :: WWW/HTTP'
-    ]
-)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/django-debreach-2.0.1/test_project/urls.py 
new/django-debreach-2.1.0/test_project/urls.py
--- old/django-debreach-2.0.1/test_project/urls.py      2016-08-13 
12:51:57.000000000 +0200
+++ new/django-debreach-2.1.0/test_project/urls.py      2022-01-04 
14:02:42.000000000 +0100
@@ -1,13 +1,12 @@
 # -*- coding: utf-8 -*-
 from __future__ import unicode_literals
 
-from django.conf.urls import url
+from django.urls import re_path
 from django.views.generic.base import TemplateView
 from django.views.generic.edit import FormView
 
 from test_project.forms import TestForm
 
-
 # Uncomment the next two lines to enable the admin:
 # from django.contrib import admin
 # admin.autodiscover()
@@ -16,19 +15,16 @@
     # Examples:
     # url(r'^$', 'test_project.views.home', name='home'),
     # url(r'^test_project/', include('test_project.foo.urls')),
-
     # Uncomment the admin/doc line below to enable admin documentation:
     # url(r'^admin/doc/', include('django.contrib.admindocs.urls')),
-
     # Uncomment the next line to enable the admin:
     # url(r'^admin/', include(admin.site.urls)),
-    url(r'^$', TemplateView.as_view(template_name='home.html'), name='home'),
-    url(
-        r'^form/$',
+    re_path(r"^$", TemplateView.as_view(template_name="home.html"), 
name="home"),
+    re_path(
+        r"^form/$",
         FormView.as_view(
-            form_class=TestForm,
-            template_name='test.html',
-            success_url='/'),
-        name='test_form'
+            form_class=TestForm, template_name="test.html", success_url="/"
+        ),
+        name="test_form",
     ),
 ]

Reply via email to