Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package python-django-debreach for openSUSE:Factory checked in at 2022-01-08 23:23:55 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/python-django-debreach (Old) and /work/SRC/openSUSE:Factory/.python-django-debreach.new.1892 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-django-debreach" Sat Jan 8 23:23:55 2022 rev:5 rq:944841 version:2.1.0 Changes: -------- --- /work/SRC/openSUSE:Factory/python-django-debreach/python-django-debreach.changes 2019-10-30 14:49:02.594260405 +0100 +++ /work/SRC/openSUSE:Factory/.python-django-debreach.new.1892/python-django-debreach.changes 2022-01-08 23:24:36.170279819 +0100 @@ -1,0 +2,6 @@ +Sat Jan 8 00:43:56 UTC 2022 - John Vandenberg <jay...@gmail.com> + +- Update to v2.1.0 + * Add Django 4.0 support to tests + +------------------------------------------------------------------- Old: ---- django-debreach-2.0.1.tar.gz New: ---- django-debreach-2.1.0.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ python-django-debreach.spec ++++++ --- /var/tmp/diff_new_pack.ly7QEz/_old 2022-01-08 23:24:36.610280178 +0100 +++ /var/tmp/diff_new_pack.ly7QEz/_new 2022-01-08 23:24:36.614280182 +0100 @@ -1,7 +1,7 @@ # # spec file for package python-django-debreach # -# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2022 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -18,15 +18,17 @@ %{?!python_module:%define python_module() python-%{**} python3-%{**}} %define skip_python2 1 +%define skip_python36 1 Name: python-django-debreach -Version: 2.0.1 +Version: 2.1.0 Release: 0 Summary: Middleware to protect against the BREACH attack in Django License: BSD-2-Clause URL: https://github.com/lpomfrey/django-debreach Source: https://files.pythonhosted.org/packages/source/d/django-debreach/django-debreach-%{version}.tar.gz BuildRequires: %{python_module Django} -BuildRequires: %{python_module setuptools} +BuildRequires: %{python_module pip} +BuildRequires: %{python_module wheel} BuildRequires: fdupes BuildRequires: python-rpm-macros Requires: python-Django @@ -34,22 +36,22 @@ %python_subpackages %description -Adds middleware and context processors to give some protection against the BREACH attack in Django +Adds middleware and context processors to give some protection against the BREACH attack in Django. %prep %setup -q -n django-debreach-%{version} %build -%python_build +%pyproject_wheel %install -%python_install +%pyproject_install %python_expand %fdupes %{buildroot}%{$python_sitelib} %check export PYTHONPATH=`pwd` export DJANGO_SETTINGS_MODULE='test_project.settings' -%python_expand %{_bindir}/django-admin.py-%{$python_bin_suffix} test debreach --pythonpath=`pwd` +%python_expand $python -m django test debreach -v2 --pythonpath=`pwd` %files %{python_files} %license LICENSE ++++++ django-debreach-2.0.1.tar.gz -> django-debreach-2.1.0.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/django-debreach-2.0.1/AUTHORS.rst new/django-debreach-2.1.0/AUTHORS.rst --- old/django-debreach-2.0.1/AUTHORS.rst 1970-01-01 01:00:00.000000000 +0100 +++ new/django-debreach-2.1.0/AUTHORS.rst 2016-01-10 17:05:37.000000000 +0100 @@ -0,0 +1,15 @@ +======= +Credits +======= + +Development Lead +---------------- + +* Luke Pomfrey <pomf...@gmail.com> + +Contributors +------------ + +* Phillipe Ombredanne (https://github.com/pombredanne) +* Christopher Ghormley (https://github.com/csghormley) +* Daniel Hawkins (https://github.com/hwkns) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/django-debreach-2.0.1/PKG-INFO new/django-debreach-2.1.0/PKG-INFO --- old/django-debreach-2.0.1/PKG-INFO 2019-10-10 11:09:54.000000000 +0200 +++ new/django-debreach-2.1.0/PKG-INFO 2022-01-04 15:31:06.434652600 +0100 @@ -1,12 +1,13 @@ -Metadata-Version: 1.1 +Metadata-Version: 2.1 Name: django-debreach -Version: 2.0.1 +Version: 2.1.0 Summary: Adds middleware to give some added protection against the BREACH attack in Django. Home-page: http://github.com/lpomfrey/django-debreach Author: Luke Pomfrey -Author-email: lpomf...@gmail.com -License: BSD -Description: UNKNOWN +Author-email: l...@lukepomfrey.org +Maintainer: Luke Pomfrey +Maintainer-email: l...@lukepomfrey.org +License: UNKNOWN Platform: UNKNOWN Classifier: Development Status :: 5 - Production/Stable Classifier: Environment :: Web Environment @@ -15,10 +16,86 @@ Classifier: Operating System :: OS Independent Classifier: Framework :: Django Classifier: Framework :: Django :: 2.2 +Classifier: Framework :: Django :: 3.2 +Classifier: Framework :: Django :: 4.0 Classifier: Programming Language :: Python Classifier: Programming Language :: Python :: 3 -Classifier: Programming Language :: Python :: 3.5 -Classifier: Programming Language :: Python :: 3.6 +Classifier: Programming Language :: Python :: 3.7 +Classifier: Programming Language :: Python :: 3.8 +Classifier: Programming Language :: Python :: 3.9 +Classifier: Programming Language :: Python :: 3.10 Classifier: Programming Language :: Python :: Implementation :: CPython Classifier: Programming Language :: Python :: Implementation :: PyPy Classifier: Topic :: Internet :: WWW/HTTP +Requires-Python: >=3.7 +License-File: LICENSE +License-File: AUTHORS.rst + +django-debreach +=============== + +Extra mitigation against the `BREACH attack <http://breachattack.com/>`_ +for Django projects. + +django-debreach provides additional protection to Django's built in CSRF +token masking by randomising the content length of each response. This is +achieved by adding a random string of between 12 and 25 characters as a +comment to the end of the HTML content. Note that this will only be applied to +responses with a content type of ``text/html``. + +When combined with the built-in mitigations in Django and rate limiting +(either in your web-server, or by using something like +`django-ratelimit <http://django-ratelimit.readthedocs.org/>`_), the +techniques here should provide a fairly comprehensive protection against the +BREACH attack. + +.. image:: https://badge.fury.io/py/django-debreach.png + :target: https://badge.fury.io/py/django-debreach + :alt: PyPI +.. image:: https://travis-ci.org/lpomfrey/django-debreach.png?branch=master + :target: https://travis-ci.org/lpomfrey/django-debreach + :alt: Build status + +.. image:: https://coveralls.io/repos/lpomfrey/django-debreach/badge.png?branch=master + :target: https://coveralls.io/r/lpomfrey/django-debreach?branch=master + :alt: Coverage + +Installation & Usage +-------------------- + +Install from PyPI using:: + + $ pip install django-debreach + +To enable content length modification for all responses, add the +``debreach.middleware.RandomCommentMiddleware`` to the *start* of your +middleware, but *after* the ``GzipMiddleware`` if you are using that.:: + + MIDDLEWARE_CLASSES = ( + 'debreach.middleware.RandomCommentMiddleware', + ... + ) + +or:: + + MIDDLEWARE_CLASSES = ( + 'django.middleware.gzip.GzipMiddleware', + 'debreach.middleware.RandomCommentMiddleware', + ... + ) + +If you wish to disable this feature for selected views, simply apply the +``debreach.decorators.random_comment_exempt`` decorator to the view. + +If you only want to protect a subset of views with content length modification +then it may be easier to not use the middleware, but to selectively apply the +``debreach.decorators.append_random_comment`` decorator to the views you want +protected. + +Python 2 and Django < 2.0 support +--------------------------------- + +Version 2.0.0 drops all support for Python 2 and Django < 2.0. If you need +support for those versions continue using ``django-debreach>=1.5.2,<2.0``. + + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/django-debreach-2.0.1/README.rst new/django-debreach-2.1.0/README.rst --- old/django-debreach-2.0.1/README.rst 2019-10-10 09:58:23.000000000 +0200 +++ new/django-debreach-2.1.0/README.rst 2022-01-04 15:12:39.000000000 +0100 @@ -1,19 +1,20 @@ django-debreach =============== -Basic/extra mitigation against the `BREACH attack <http://breachattack.com/>`_ +Extra mitigation against the `BREACH attack <http://breachattack.com/>`_ for Django projects. django-debreach provides additional protection to Django's built in CSRF token masking by randomising the content length of each response. This is -acheived by adding a random string of between 12 and 25 characters as a +achieved by adding a random string of between 12 and 25 characters as a comment to the end of the HTML content. Note that this will only be applied to responses with a content type of ``text/html``. -When combined with rate limiting in your web-server, or by using something -like `django-ratelimit <http://django-ratelimit.readthedocs.org/>`_, the -techniques here should provide at least some protection against the BREACH -attack. +When combined with the built-in mitigations in Django and rate limiting +(either in your web-server, or by using something like +`django-ratelimit <http://django-ratelimit.readthedocs.org/>`_), the +techniques here should provide a fairly comprehensive protection against the +BREACH attack. .. image:: https://badge.fury.io/py/django-debreach.png :target: https://badge.fury.io/py/django-debreach diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/django-debreach-2.0.1/debreach/__init__.py new/django-debreach-2.1.0/debreach/__init__.py --- old/django-debreach-2.0.1/debreach/__init__.py 2019-10-10 11:08:57.000000000 +0200 +++ new/django-debreach-2.1.0/debreach/__init__.py 2022-01-04 15:30:23.000000000 +0100 @@ -2,7 +2,7 @@ from distutils import version -__version__ = '2.0.1' +__version__ = '2.1.0' version_info = version.StrictVersion(__version__).version default_app_config = 'debreach.apps.DebreachConfig' diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/django-debreach-2.0.1/debreach/tests.py new/django-debreach-2.1.0/debreach/tests.py --- old/django-debreach-2.0.1/debreach/tests.py 2019-10-10 09:56:08.000000000 +0200 +++ new/django-debreach-2.1.0/debreach/tests.py 2022-01-04 14:56:29.000000000 +0100 @@ -21,7 +21,7 @@ def test_noop_on_wrong_content_type(self): response = HttpResponse('abc', content_type='text/plain') request = RequestFactory().get('/') - middleware = RandomCommentMiddleware() + middleware = RandomCommentMiddleware(lambda request: response) response = middleware.process_response(request, response) self.assertEqual(response.content, b'abc') @@ -38,7 +38,7 @@ </html>''' response = HttpResponse(html, content_type='text/html') request = RequestFactory().get('/') - middleware = RandomCommentMiddleware() + middleware = RandomCommentMiddleware(lambda request: response) response = middleware.process_response(request, response) self.assertNotEqual(response.content, html) @@ -55,7 +55,7 @@ </html>'''.format(''.join(chr(x) for x in range(9999))) response = HttpResponse(html, content_type='text/html') request = RequestFactory().get('/') - middleware = RandomCommentMiddleware() + middleware = RandomCommentMiddleware(lambda request: response) response = middleware.process_response(request, response) self.assertNotEqual(force_str(response.content), force_str(html)) @@ -67,7 +67,7 @@ response = HttpResponse(html) response._random_comment_exempt = True request = RequestFactory().get('/') - middleware = RandomCommentMiddleware() + middleware = RandomCommentMiddleware(lambda request: response) response = middleware.process_response(request, response) self.assertEqual(force_str(response.content), html) @@ -75,14 +75,14 @@ request = RequestFactory().get('/') response = HttpResponse('') del response['Content-Type'] - middleware = RandomCommentMiddleware() + middleware = RandomCommentMiddleware(lambda request: response) processed_response = middleware.process_response(request, response) self.assertEqual(response, processed_response) def test_empty_response_body_ignored(self): request = RequestFactory().get('/') response = HttpResponse('') - middleware = RandomCommentMiddleware() + middleware = RandomCommentMiddleware(lambda request: response) processed_response = middleware.process_response(request, response) self.assertEqual(len(processed_response.content), 0) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/django-debreach-2.0.1/django_debreach.egg-info/PKG-INFO new/django-debreach-2.1.0/django_debreach.egg-info/PKG-INFO --- old/django-debreach-2.0.1/django_debreach.egg-info/PKG-INFO 2019-10-10 11:09:53.000000000 +0200 +++ new/django-debreach-2.1.0/django_debreach.egg-info/PKG-INFO 2022-01-04 15:31:06.000000000 +0100 @@ -1,12 +1,13 @@ -Metadata-Version: 1.1 +Metadata-Version: 2.1 Name: django-debreach -Version: 2.0.1 +Version: 2.1.0 Summary: Adds middleware to give some added protection against the BREACH attack in Django. Home-page: http://github.com/lpomfrey/django-debreach Author: Luke Pomfrey -Author-email: lpomf...@gmail.com -License: BSD -Description: UNKNOWN +Author-email: l...@lukepomfrey.org +Maintainer: Luke Pomfrey +Maintainer-email: l...@lukepomfrey.org +License: UNKNOWN Platform: UNKNOWN Classifier: Development Status :: 5 - Production/Stable Classifier: Environment :: Web Environment @@ -15,10 +16,86 @@ Classifier: Operating System :: OS Independent Classifier: Framework :: Django Classifier: Framework :: Django :: 2.2 +Classifier: Framework :: Django :: 3.2 +Classifier: Framework :: Django :: 4.0 Classifier: Programming Language :: Python Classifier: Programming Language :: Python :: 3 -Classifier: Programming Language :: Python :: 3.5 -Classifier: Programming Language :: Python :: 3.6 +Classifier: Programming Language :: Python :: 3.7 +Classifier: Programming Language :: Python :: 3.8 +Classifier: Programming Language :: Python :: 3.9 +Classifier: Programming Language :: Python :: 3.10 Classifier: Programming Language :: Python :: Implementation :: CPython Classifier: Programming Language :: Python :: Implementation :: PyPy Classifier: Topic :: Internet :: WWW/HTTP +Requires-Python: >=3.7 +License-File: LICENSE +License-File: AUTHORS.rst + +django-debreach +=============== + +Extra mitigation against the `BREACH attack <http://breachattack.com/>`_ +for Django projects. + +django-debreach provides additional protection to Django's built in CSRF +token masking by randomising the content length of each response. This is +achieved by adding a random string of between 12 and 25 characters as a +comment to the end of the HTML content. Note that this will only be applied to +responses with a content type of ``text/html``. + +When combined with the built-in mitigations in Django and rate limiting +(either in your web-server, or by using something like +`django-ratelimit <http://django-ratelimit.readthedocs.org/>`_), the +techniques here should provide a fairly comprehensive protection against the +BREACH attack. + +.. image:: https://badge.fury.io/py/django-debreach.png + :target: https://badge.fury.io/py/django-debreach + :alt: PyPI +.. image:: https://travis-ci.org/lpomfrey/django-debreach.png?branch=master + :target: https://travis-ci.org/lpomfrey/django-debreach + :alt: Build status + +.. image:: https://coveralls.io/repos/lpomfrey/django-debreach/badge.png?branch=master + :target: https://coveralls.io/r/lpomfrey/django-debreach?branch=master + :alt: Coverage + +Installation & Usage +-------------------- + +Install from PyPI using:: + + $ pip install django-debreach + +To enable content length modification for all responses, add the +``debreach.middleware.RandomCommentMiddleware`` to the *start* of your +middleware, but *after* the ``GzipMiddleware`` if you are using that.:: + + MIDDLEWARE_CLASSES = ( + 'debreach.middleware.RandomCommentMiddleware', + ... + ) + +or:: + + MIDDLEWARE_CLASSES = ( + 'django.middleware.gzip.GzipMiddleware', + 'debreach.middleware.RandomCommentMiddleware', + ... + ) + +If you wish to disable this feature for selected views, simply apply the +``debreach.decorators.random_comment_exempt`` decorator to the view. + +If you only want to protect a subset of views with content length modification +then it may be easier to not use the middleware, but to selectively apply the +``debreach.decorators.append_random_comment`` decorator to the views you want +protected. + +Python 2 and Django < 2.0 support +--------------------------------- + +Version 2.0.0 drops all support for Python 2 and Django < 2.0. If you need +support for those versions continue using ``django-debreach>=1.5.2,<2.0``. + + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/django-debreach-2.0.1/django_debreach.egg-info/SOURCES.txt new/django-debreach-2.1.0/django_debreach.egg-info/SOURCES.txt --- old/django-debreach-2.0.1/django_debreach.egg-info/SOURCES.txt 2019-10-10 11:09:53.000000000 +0200 +++ new/django-debreach-2.1.0/django_debreach.egg-info/SOURCES.txt 2022-01-04 15:31:06.000000000 +0100 @@ -1,8 +1,10 @@ +AUTHORS.rst LICENSE MANIFEST.in README.rst +pyproject.toml runtests.py -setup.py +setup.cfg debreach/__init__.py debreach/apps.py debreach/decorators.py @@ -11,6 +13,7 @@ django_debreach.egg-info/PKG-INFO django_debreach.egg-info/SOURCES.txt django_debreach.egg-info/dependency_links.txt +django_debreach.egg-info/not-zip-safe django_debreach.egg-info/top_level.txt docs/Makefile docs/conf.py diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/django-debreach-2.0.1/django_debreach.egg-info/not-zip-safe new/django-debreach-2.1.0/django_debreach.egg-info/not-zip-safe --- old/django-debreach-2.0.1/django_debreach.egg-info/not-zip-safe 1970-01-01 01:00:00.000000000 +0100 +++ new/django-debreach-2.1.0/django_debreach.egg-info/not-zip-safe 2022-01-04 15:04:03.000000000 +0100 @@ -0,0 +1 @@ + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/django-debreach-2.0.1/docs/index.rst new/django-debreach-2.1.0/docs/index.rst --- old/django-debreach-2.0.1/docs/index.rst 2019-10-10 09:58:23.000000000 +0200 +++ new/django-debreach-2.1.0/docs/index.rst 2022-01-04 15:12:39.000000000 +0100 @@ -1,19 +1,20 @@ django-debreach =============== -Basic/extra mitigation against the `BREACH attack <http://breachattack.com/>`_ +Extra mitigation against the `BREACH attack <http://breachattack.com/>`_ for Django projects. django-debreach provides additional protection to Django's built in CSRF token masking by randomising the content length of each response. This is -acheived by adding a random string of between 12 and 25 characters as a +achieved by adding a random string of between 12 and 25 characters as a comment to the end of the HTML content. Note that this will only be applied to responses with a content type of ``text/html``. -When combined with rate limiting in your web-server, or by using something -like `django-ratelimit <http://django-ratelimit.readthedocs.org/>`_, the -techniques here should provide at least some protection against the BREACH -attack. +When combined with the built-in mitigations in Django and rate limiting +(either in your web-server, or by using something like +`django-ratelimit <http://django-ratelimit.readthedocs.org/>`_), the +techniques here should provide a fairly comprehensive protection against the +BREACH attack. .. image:: https://badge.fury.io/py/django-debreach.png :target: https://badge.fury.io/py/django-debreach diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/django-debreach-2.0.1/pyproject.toml new/django-debreach-2.1.0/pyproject.toml --- old/django-debreach-2.0.1/pyproject.toml 1970-01-01 01:00:00.000000000 +0100 +++ new/django-debreach-2.1.0/pyproject.toml 2022-01-04 15:30:22.000000000 +0100 @@ -0,0 +1,7 @@ +[build-system] +requires = ["setuptools", "wheel", "pip"] +build-backend = "setuptools.build_meta" + +[tool.black] +skip-string-normalization = true +line-length = 79 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/django-debreach-2.0.1/setup.cfg new/django-debreach-2.1.0/setup.cfg --- old/django-debreach-2.0.1/setup.cfg 2019-10-10 11:09:54.000000000 +0200 +++ new/django-debreach-2.1.0/setup.cfg 2022-01-04 15:31:06.434652600 +0100 @@ -1,3 +1,54 @@ +[metadata] +name = django-debreach +version = attr: debreach.__version__ +description = Adds middleware to give some added protection against the BREACH attack in Django. +long_description = file: README.rst +author = Luke Pomfrey +author_email = l...@lukepomfrey.org +maintainer = Luke Pomfrey +maintainer_email = l...@lukepomfrey.org +url = http://github.com/lpomfrey/django-debreach +classifiers = + Development Status :: 5 - Production/Stable + Environment :: Web Environment + Intended Audience :: Developers + License :: OSI Approved :: BSD License + Operating System :: OS Independent + Framework :: Django + Framework :: Django :: 2.2 + Framework :: Django :: 3.2 + Framework :: Django :: 4.0 + Programming Language :: Python + Programming Language :: Python :: 3 + Programming Language :: Python :: 3.7 + Programming Language :: Python :: 3.8 + Programming Language :: Python :: 3.9 + Programming Language :: Python :: 3.10 + Programming Language :: Python :: Implementation :: CPython + Programming Language :: Python :: Implementation :: PyPy + Topic :: Internet :: WWW/HTTP + +[options] +zip_safe = False +include_package_data = True +packages = find: +setup_requires = setuptools;wheel;pip +python_requires = >=3.7 +tests_require = django + +[options.packages.find] +exclude = + test_project + docs + +[flake8] +max-line-length = 88 +ignore = E203, E501, W503 + +[pycodestyle] +max-line-length = 88 +ignore = E203, E501, W503 + [egg_info] tag_build = tag_date = 0 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/django-debreach-2.0.1/setup.py new/django-debreach-2.1.0/setup.py --- old/django-debreach-2.0.1/setup.py 2019-10-10 10:15:28.000000000 +0200 +++ new/django-debreach-2.1.0/setup.py 1970-01-01 01:00:00.000000000 +0100 @@ -1,79 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -import os -import re -import sys -from setuptools import setup, find_packages - - -def get_version(package): - ''' - Return package version as listed in `__version__` in `init.py`. - ''' - init_py = open(os.path.join(package, '__init__.py')).read() - return re.search( - '^__version__ = [\'"]([^\'"]+)[\'"]', init_py, re.MULTILINE - ).group(1) - - -version = get_version('debreach') - - -_PUBLISH_WARNING = ''' -****************** -!!! DEPRECATED !!! -****************** - -Use twine to publish packages to pypi now. - -Ensure you have the `wheel` and `twine` packages installed with - - pip install wheel twine - -Then create some distributions like - - python setup.py sdist bdist_wheel - -Then upload with twine - - twine upload dist/* -''' - -if sys.argv[-1] == 'publish': - print(_PUBLISH_WARNING) - sys.exit() - - -setup( - name='django-debreach', - version=version, - url='http://github.com/lpomfrey/django-debreach', - license='BSD', - description='Adds middleware to give some added protection against the ' - 'BREACH attack in Django.', - author='Luke Pomfrey', - author_email='lpomf...@gmail.com', - packages=find_packages(exclude=('test_project', 'docs')), - install_requires=[], - tests_require=[ - 'django', - ], - test_suite='runtests.runtests', - classifiers=[ - 'Development Status :: 5 - Production/Stable', - 'Environment :: Web Environment', - 'Intended Audience :: Developers', - 'License :: OSI Approved :: BSD License', - 'Operating System :: OS Independent', - 'Framework :: Django', - 'Framework :: Django :: 2.2', - 'Programming Language :: Python', - 'Programming Language :: Python :: 3', - 'Programming Language :: Python :: 3.5', - 'Programming Language :: Python :: 3.6', - 'Programming Language :: Python :: Implementation :: CPython', - 'Programming Language :: Python :: Implementation :: PyPy', - 'Topic :: Internet :: WWW/HTTP' - ] -) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/django-debreach-2.0.1/test_project/urls.py new/django-debreach-2.1.0/test_project/urls.py --- old/django-debreach-2.0.1/test_project/urls.py 2016-08-13 12:51:57.000000000 +0200 +++ new/django-debreach-2.1.0/test_project/urls.py 2022-01-04 14:02:42.000000000 +0100 @@ -1,13 +1,12 @@ # -*- coding: utf-8 -*- from __future__ import unicode_literals -from django.conf.urls import url +from django.urls import re_path from django.views.generic.base import TemplateView from django.views.generic.edit import FormView from test_project.forms import TestForm - # Uncomment the next two lines to enable the admin: # from django.contrib import admin # admin.autodiscover() @@ -16,19 +15,16 @@ # Examples: # url(r'^$', 'test_project.views.home', name='home'), # url(r'^test_project/', include('test_project.foo.urls')), - # Uncomment the admin/doc line below to enable admin documentation: # url(r'^admin/doc/', include('django.contrib.admindocs.urls')), - # Uncomment the next line to enable the admin: # url(r'^admin/', include(admin.site.urls)), - url(r'^$', TemplateView.as_view(template_name='home.html'), name='home'), - url( - r'^form/$', + re_path(r"^$", TemplateView.as_view(template_name="home.html"), name="home"), + re_path( + r"^form/$", FormView.as_view( - form_class=TestForm, - template_name='test.html', - success_url='/'), - name='test_form' + form_class=TestForm, template_name="test.html", success_url="/" + ), + name="test_form", ), ]