[Python-modules-commits] r30988 - in packages/django-openid-auth (19 files)

asb at users.alioth.debian.org asb at users.alioth.debian.org
Sat Oct 11 19:32:43 UTC 2014


    Date: Saturday, October 11, 2014 @ 19:32:41
  Author: asb
Revision: 30988

Import and tag 0.5-2.1 NMU.

Added:
  packages/django-openid-auth/tags/0.5-2.1/
  packages/django-openid-auth/tags/0.5-2.1/debian/
  packages/django-openid-auth/tags/0.5-2.1/debian/NEWS
  packages/django-openid-auth/tags/0.5-2.1/debian/changelog
  packages/django-openid-auth/tags/0.5-2.1/debian/compat
  packages/django-openid-auth/tags/0.5-2.1/debian/control
  packages/django-openid-auth/tags/0.5-2.1/debian/copyright
  packages/django-openid-auth/tags/0.5-2.1/debian/docs
  packages/django-openid-auth/tags/0.5-2.1/debian/patches/
  packages/django-openid-auth/tags/0.5-2.1/debian/patches/django1.5compat.patch
  packages/django-openid-auth/tags/0.5-2.1/debian/patches/django1.6compat.patch
  packages/django-openid-auth/tags/0.5-2.1/debian/patches/django1.7compat.patch
  packages/django-openid-auth/tags/0.5-2.1/debian/patches/series
  packages/django-openid-auth/tags/0.5-2.1/debian/rules
  packages/django-openid-auth/tags/0.5-2.1/debian/source/
  packages/django-openid-auth/tags/0.5-2.1/debian/source/format
  packages/django-openid-auth/tags/0.5-2.1/debian/watch
Modified:
  packages/django-openid-auth/trunk/debian/changelog
  packages/django-openid-auth/trunk/debian/patches/series

Added: packages/django-openid-auth/tags/0.5-2.1/debian/NEWS
===================================================================
--- packages/django-openid-auth/tags/0.5-2.1/debian/NEWS	                        (rev 0)
+++ packages/django-openid-auth/tags/0.5-2.1/debian/NEWS	2014-10-11 19:32:41 UTC (rev 30988)
@@ -0,0 +1,15 @@
+django-openid-auth (0.5-2) unstable; urgency=medium
+
+  django-openid-auth is not compatible with Django 1.6's
+  default JSON_SESSION_SERIALIZER. It's nessesary to revert
+  to the old Pickle serializer as a workaround. Add the
+  following to your settings.py:
+
+  SESSION_SERIALIZER = 'django.contrib.sessions.serializers.PickleSerializer'
+
+  For information about the change in Django, see: http://deb.li/iiZZU
+
+  The issue is being tracked for django-openid-auth upstream at:
+  http://pad.lv/1252826
+
+ -- Andrew Starr-Bochicchio <asb at debian.org>  Sat, 22 Feb 2014 12:33:37 -0500

Added: packages/django-openid-auth/tags/0.5-2.1/debian/changelog
===================================================================
--- packages/django-openid-auth/tags/0.5-2.1/debian/changelog	                        (rev 0)
+++ packages/django-openid-auth/tags/0.5-2.1/debian/changelog	2014-10-11 19:32:41 UTC (rev 30988)
@@ -0,0 +1,86 @@
+django-openid-auth (0.5-2.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Update for Django 1.7 support (Closes: #755667)
+
+ -- Neil Williams <codehelp at debian.org>  Fri, 10 Oct 2014 10:38:22 +0100
+
+django-openid-auth (0.5-2) unstable; urgency=medium
+
+  * debian/patches/django1.6compat.patch: Fix compatibility
+    issues with Django 1.6 (Closes: #729828, 739617)
+    (LP: #1252866, #1252445).
+  * Add debian/NEW entry describing the situation with
+    the new Django session serializer. 
+  * Bump Standards-Version to 3.9.5, no changes needed.
+  * Transition from python-support to dh_python2.
+
+ -- Andrew Starr-Bochicchio <asb at debian.org>  Sat, 22 Feb 2014 13:00:49 -0500
+
+django-openid-auth (0.5-1) unstable; urgency=low
+
+  [ Chris Johnston ]
+  * Replaces python-django-openid-auth to to remove the Ubuntu-only
+    package of a different name (LP: #1017462)
+
+  [ Jakub Wilk ]
+  * Use canonical URIs for Vcs-* fields.
+
+  [ Andrew Starr-Bochicchio ]
+  * New upstream release.
+   - Fixes FTBFS with Django 1.5 (Closes: #711366).
+  * Removed fix_settings_database.patch, fixed upstream.
+  * Bump Standards-Version to 3.9.4, no changes needed.
+  * debian/docs: Drop openid.txt, no longer exists.
+  * django1.5compat.patch: Update url tag in template to
+    fix test failure with Django 1.5.
+  * Add myself to Uploaders.
+
+ -- Andrew Starr-Bochicchio <asb at debian.org>  Mon, 24 Jun 2013 17:52:21 -0400
+
+django-openid-auth (0.4-1) unstable; urgency=low
+
+  * New upstream release.
+  * Lower dependency on python-django to (>= 1.1.2).
+  * Bump B-D on python-all to (>= 2.6) and XS-P-V to >= 2.6.
+  * Fix tests for django (>= 1.4) FTBFS (Closes: #669482).
+    - Add patch for Django 1.2 style DATABASE configuration
+    - Bump B-D on python-django to (>= 1.2) because of new configuration
+  * Fix DEP5 lintian format warnings.
+  * Fix DEP5 copyright line format in d/copyright.
+  * Make sure .pyc files are not used.
+  * Run wrap-and-sort.
+  * Change order of my name.
+  * Update DEP-5 URL to 1.0.
+  * Fix d/watch for HTTPS URLs.
+  * Bump Standards-Version to 3.9.3.
+  * Update years in d/copyright.
+  * Include openid.txt in documentation.
+
+ -- Michael Fladischer <FladischerMichael at fladi.at>  Wed, 27 Jun 2012 08:25:19 +0200
+
+django-openid-auth (0.3-2) unstable; urgency=low
+
+  * Upload to unstable.
+  * Set PMPT as maintainer and myself as uploader.
+  * Drop debian/pyversions in favour of XS-Python-Version.
+  * Update DEP5 format.
+
+ -- Fladischer Michael <FladischerMichael at fladi.at>  Mon, 07 Feb 2011 13:49:38 +0100
+
+django-openid-auth (0.3-1) experimental; urgency=low
+
+  * New upstream release.
+  * Update to Debian policy 3.9.1.
+  * Drop add_csrf_token_to_login_view patch as it has been integrated in
+    upstream.
+  * Fix regular expression in debian/watch.
+  * Bump dependency on python-django to (>= 1.2).
+
+ -- Fladischer Michael <FladischerMichael at fladi.at>  Fri, 03 Dec 2010 00:46:25 +0100
+
+django-openid-auth (0.2-1) unstable; urgency=low
+
+  * Initial release (Closes: #578623).
+
+ -- Fladischer Michael <FladischerMichael at fladi.at>  Wed, 09 Jun 2010 11:48:54 +0200

Added: packages/django-openid-auth/tags/0.5-2.1/debian/compat
===================================================================
--- packages/django-openid-auth/tags/0.5-2.1/debian/compat	                        (rev 0)
+++ packages/django-openid-auth/tags/0.5-2.1/debian/compat	2014-10-11 19:32:41 UTC (rev 30988)
@@ -0,0 +1 @@
+7

Added: packages/django-openid-auth/tags/0.5-2.1/debian/control
===================================================================
--- packages/django-openid-auth/tags/0.5-2.1/debian/control	                        (rev 0)
+++ packages/django-openid-auth/tags/0.5-2.1/debian/control	2014-10-11 19:32:41 UTC (rev 30988)
@@ -0,0 +1,34 @@
+Source: django-openid-auth
+Section: python
+Priority: optional
+Maintainer: Debian Python Modules Team <python-modules-team at lists.alioth.debian.org>
+Uploaders: Michael Fladischer <FladischerMichael at fladi.at>,
+           Andrew Starr-Bochicchio <asb at debian.org>
+Build-Depends: debhelper (>= 7.3.7~),
+               python-all (>= 2.6.6-3~),
+               python-django (>= 1.2),
+               python-openid
+Standards-Version: 3.9.5
+X-Python-Version: >= 2.6
+Homepage: https://launchpad.net/django-openid-auth
+Vcs-Svn: svn://anonscm.debian.org/python-modules/packages/django-openid-auth/trunk/
+Vcs-Browser: http://anonscm.debian.org/viewvc/python-modules/packages/django-openid-auth/trunk/
+
+Package: python-django-auth-openid
+Architecture: all
+Depends: python-django (>=1.1.2),
+         python-openid,
+         ${misc:Depends},
+         ${python:Depends}
+Replaces: python-django-openid-auth (<< 0.2+empty)
+Description: provides optional OpenID integration for Django
+ The django-auth-openid library can be used to add OpenID support
+ to Django applications.
+ It integrates with Django's built in authentication system, so most
+ applications require minimal changes to support OpenID login. The
+ library also includes the following features:
+  * Basic user details are transferred from the OpenID server via the
+    simple Registration extension.
+  * It can be configured to use a fixed OpenID server URL, for use in SSO.
+  * It supports the launchpad.net teams extension to get team membership
+    info.

Added: packages/django-openid-auth/tags/0.5-2.1/debian/copyright
===================================================================
--- packages/django-openid-auth/tags/0.5-2.1/debian/copyright	                        (rev 0)
+++ packages/django-openid-auth/tags/0.5-2.1/debian/copyright	2014-10-11 19:32:41 UTC (rev 30988)
@@ -0,0 +1,44 @@
+Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
+Upstream-Name: django-openid-auth
+Upstream-Contact: django-openid-auth developers <https://launchpad.net/~django-openid-auth/+members>
+Source: https://launchpad.net/django-openid-auth
+
+Files: *
+Copyright: 2008-2010, Canonical Ltd.
+           2007, Simon Willison
+License: BSD
+
+Files: setup.py django_openid_auth/tests/* django_openid_auth/management/* django_openid_auth/teams.py django_openid_auth/auth.py
+Copyright: 2008-2010, Canonical Ltd.
+License: BSD
+
+Files: django_openid_auth/admin.py
+Copyright: 2010, Dave Walker
+           2008-2010, Canonical Ltd.
+License: BSD
+
+Files: debian/*
+Copyright: 2010-2012, Michael Fladischer <FladischerMichael at fladi.at>
+License: BSD
+
+License: BSD
+ Redistribution and use in source and binary forms, with or without
+ modification, are permitted provided that the following conditions are met:
+ .
+   * Redistributions of source code must retain the above copyright notice, this
+   list of conditions and the following disclaimer.
+ .
+   * Redistributions in binary form must reproduce the above copyright notice,
+   this list of conditions and the following disclaimer in the documentation
+   and/or other materials provided with the distribution.
+ .
+ THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE
+ FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
+ SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
+ CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
+ OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Added: packages/django-openid-auth/tags/0.5-2.1/debian/docs
===================================================================
--- packages/django-openid-auth/tags/0.5-2.1/debian/docs	                        (rev 0)
+++ packages/django-openid-auth/tags/0.5-2.1/debian/docs	2014-10-11 19:32:41 UTC (rev 30988)
@@ -0,0 +1,2 @@
+README.txt
+TODO.txt

Added: packages/django-openid-auth/tags/0.5-2.1/debian/patches/django1.5compat.patch
===================================================================
--- packages/django-openid-auth/tags/0.5-2.1/debian/patches/django1.5compat.patch	                        (rev 0)
+++ packages/django-openid-auth/tags/0.5-2.1/debian/patches/django1.5compat.patch	2014-10-11 19:32:41 UTC (rev 30988)
@@ -0,0 +1,20 @@
+Description: Update template for Django 1.5
+Origin: commit, revision id: a.starr.b at gmail.com-20130618162848-teldgqvdg3w634dr
+Author: Andrew Starr-Bochicchio <a.starr.b at gmail.com>
+Last-Update: 2013-06-18
+X-Bzr-Revision-Id: a.starr.b at gmail.com-20130618162848-teldgqvdg3w634dr
+Bug: https://bugs.launchpad.net/django-openid-auth/+bug/1170355
+
+=== modified file 'django_openid_auth/templates/openid/login.html'
+--- old/django_openid_auth/templates/openid/login.html	2010-12-03 00:46:25 +0000
++++ new/django_openid_auth/templates/openid/login.html	2013-06-18 16:28:48 +0000
+@@ -5,7 +5,7 @@
+ <title>Sign in with your OpenID</title>
+ <style type="text/css">
+ input.openid {
+-    background: url({% url openid-logo %}) no-repeat;
++    background: url({% url 'openid-logo' %}) no-repeat;
+     background-position: 0 50%;
+     padding-left: 16px;
+ }
+

Added: packages/django-openid-auth/tags/0.5-2.1/debian/patches/django1.6compat.patch
===================================================================
--- packages/django-openid-auth/tags/0.5-2.1/debian/patches/django1.6compat.patch	                        (rev 0)
+++ packages/django-openid-auth/tags/0.5-2.1/debian/patches/django1.6compat.patch	2014-10-11 19:32:41 UTC (rev 30988)
@@ -0,0 +1,91 @@
+Origin: commit, revision id: a.starr.b at gmail.com-20140222170700-oft8zromsl5bw5hx
+Author: Andrew Starr-Bochicchio <a.starr.b at gmail.com>
+Bug: https://launchpad.net/bugs/1252866
+Bug: https://launchpad.net/bugs/1252445
+Debian-Bug: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729828
+Debian-Bug: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739617
+Forwarded: https://code.launchpad.net/~andrewsomething/django-openid-auth/1252445/+merge/195793
+Last-Update: 2014-02-22
+X-Bzr-Revision-Id: a.starr.b at gmail.com-20140222170700-oft8zromsl5bw5hx
+Description: Fix compatibility issues with Django 1.6.
+
+=== modified file 'django_openid_auth/tests/urls.py'
+--- old/django_openid_auth/tests/urls.py	2013-03-13 21:55:40 +0000
++++ new/django_openid_auth/tests/urls.py	2014-02-22 16:58:08 +0000
+@@ -27,7 +27,7 @@
+ # POSSIBILITY OF SUCH DAMAGE.
+ 
+ from django.http import HttpResponse
+-from django.conf.urls.defaults import *
++from django.conf.urls import *
+ 
+ 
+ def get_user(request):
+
+=== modified file 'django_openid_auth/urls.py'
+--- old/django_openid_auth/urls.py	2013-03-13 21:55:40 +0000
++++ new/django_openid_auth/urls.py	2014-02-22 16:58:08 +0000
+@@ -27,7 +27,7 @@
+ # ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ # POSSIBILITY OF SUCH DAMAGE.
+ 
+-from django.conf.urls.defaults import *
++from django.conf.urls import *
+ 
+ urlpatterns = patterns('django_openid_auth.views',
+     url(r'^login/$', 'login_begin', name='openid-login'),
+
+=== modified file 'example_consumer/manage.py'
+--- old/example_consumer/manage.py	2007-05-28 09:01:41 +0000
++++ new/example_consumer/manage.py	2013-11-19 14:44:21 +0000
+@@ -1,11 +1,15 @@
+ #!/usr/bin/env python
+-from django.core.management import execute_manager
+-try:
+-    import settings # Assumed to be in the same directory.
+-except ImportError:
+-    import sys
+-    sys.stderr.write("Error: Can't find the file 'settings.py' in the directory containing %r. It appears you've customized things.\nYou'll have to run django-admin.py, passing it your settings module.\n(If the file settings.py does indeed exist, it's causing an ImportError somehow.)\n" % __file__)
+-    sys.exit(1)
++import os
++import sys
++
++from django.core.management import execute_from_command_line
+ 
+ if __name__ == "__main__":
+-    execute_manager(settings)
++    try:
++        import settings # Assumed to be in the same directory.
++        os.environ.setdefault("DJANGO_SETTINGS_MODULE", "settings")
++    except ImportError:
++        sys.stderr.write("Error: Can't find the file 'settings.py' in the directory containing %r. It appears you've customized things.\nYou'll have to run django-admin.py, passing it your settings module.\n(If the file settings.py does indeed exist, it's causing an ImportError somehow.)\n" % __file__)
++        sys.exit(1)
++
++    execute_from_command_line(sys.argv)
+
+=== modified file 'example_consumer/settings.py'
+--- old/example_consumer/settings.py	2013-07-19 18:54:31 +0000
++++ new/example_consumer/settings.py	2014-02-22 17:07:00 +0000
+@@ -152,3 +152,8 @@
+ 
+ # Should django_auth_openid be used to sign into the admin interface?
+ OPENID_USE_AS_ADMIN_LOGIN = False
++
++# Temporarily modify the session serializer because the json serializer in
++# Django 1.6 can't serialize openid.yadis.manager.YadisServiceManager objects.
++# See LP: #1252826
++SESSION_SERIALIZER = 'django.contrib.sessions.serializers.PickleSerializer'
+
+=== modified file 'example_consumer/urls.py'
+--- old/example_consumer/urls.py	2013-03-13 21:55:40 +0000
++++ new/example_consumer/urls.py	2014-02-22 16:58:08 +0000
+@@ -27,7 +27,7 @@
+ # ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ # POSSIBILITY OF SUCH DAMAGE.
+ 
+-from django.conf.urls.defaults import *
++from django.conf.urls import *
+ from django.contrib import admin
+ 
+ import views
+

Added: packages/django-openid-auth/tags/0.5-2.1/debian/patches/django1.7compat.patch
===================================================================
--- packages/django-openid-auth/tags/0.5-2.1/debian/patches/django1.7compat.patch	                        (rev 0)
+++ packages/django-openid-auth/tags/0.5-2.1/debian/patches/django1.7compat.patch	2014-10-11 19:32:41 UTC (rev 30988)
@@ -0,0 +1,32 @@
+Description: Adapt for change in admin login behaviour
+ OPENID_USE_AS_ADMIN_LOGIN no longer fails to an openid login
+ page with django1.7, despite openid working normally. Adapt the
+ test cases to suit.
+Author: Neil Williams <codehelp at debian.org>
+Bug-Debian: https://bugs.debian.org/755667
+
+---
+
+--- django-openid-auth-0.5.orig/django_openid_auth/tests/test_admin.py
++++ django-openid-auth-0.5/django_openid_auth/tests/test_admin.py
+@@ -70,8 +70,9 @@ class SiteAdminTests(TestCase):
+         create_user()
+         self.client.login(username='testing', password='test')
+         response = self.client.get('/admin/')
+-        self.assertTrue('User testing does not have admin access.' in
+-                        response.content, 'Missing error message in response')
++        self.assertEqual(302, response.status_code)
++        self.assertEqual('http://testserver/admin/login/?next=/admin/',
++                         response['Location'])
+ 
+     def test_admin_site_with_openid_login_non_authenticated_user(self):
+         """
+@@ -80,7 +81,7 @@ class SiteAdminTests(TestCase):
+         """
+         response = self.client.get('/admin/')
+         self.assertEqual(302, response.status_code)
+-        self.assertEqual('http://testserver/openid/login/?next=/admin/',
++        self.assertEqual('http://testserver/admin/login/?next=/admin/',
+                          response['Location'])
+ 
+ 

Added: packages/django-openid-auth/tags/0.5-2.1/debian/patches/series
===================================================================
--- packages/django-openid-auth/tags/0.5-2.1/debian/patches/series	                        (rev 0)
+++ packages/django-openid-auth/tags/0.5-2.1/debian/patches/series	2014-10-11 19:32:41 UTC (rev 30988)
@@ -0,0 +1,3 @@
+django1.5compat.patch
+django1.6compat.patch
+django1.7compat.patch

Added: packages/django-openid-auth/tags/0.5-2.1/debian/rules
===================================================================
--- packages/django-openid-auth/tags/0.5-2.1/debian/rules	                        (rev 0)
+++ packages/django-openid-auth/tags/0.5-2.1/debian/rules	2014-10-11 19:32:41 UTC (rev 30988)
@@ -0,0 +1,21 @@
+#!/usr/bin/make -f
+
+%:
+	# Because of the makefile included in upstream we need to set the 
+	# buildsystem explicitly.
+	dh --buildsystem=python_distutils $@ --with python2
+
+.PHONY: override_dh_auto_configure
+override_dh_auto_configure:
+	find -name "*.pyc" -o -name "*~" -delete
+	dh_auto_configure
+
+.PHONY: override_dh_auto_test
+override_dh_auto_test:
+ifeq (,$(filter nocheck,$(DEB_BUILD_OPTIONS)))
+	set -e; \
+	for python in $(shell pyversions -r); do \
+	  PYTHONPATH="." $$python example_consumer/manage.py test --settings=example_consumer.settings django_openid_auth ; \
+	done
+endif
+


Property changes on: packages/django-openid-auth/tags/0.5-2.1/debian/rules
___________________________________________________________________
Added: svn:executable
   + *

Added: packages/django-openid-auth/tags/0.5-2.1/debian/source/format
===================================================================
--- packages/django-openid-auth/tags/0.5-2.1/debian/source/format	                        (rev 0)
+++ packages/django-openid-auth/tags/0.5-2.1/debian/source/format	2014-10-11 19:32:41 UTC (rev 30988)
@@ -0,0 +1 @@
+3.0 (quilt)

Added: packages/django-openid-auth/tags/0.5-2.1/debian/watch
===================================================================
--- packages/django-openid-auth/tags/0.5-2.1/debian/watch	                        (rev 0)
+++ packages/django-openid-auth/tags/0.5-2.1/debian/watch	2014-10-11 19:32:41 UTC (rev 30988)
@@ -0,0 +1,3 @@
+version=3
+https://launchpad.net/django-openid-auth/+download \
+https?://launchpad.net/django-openid-auth/trunk/[\d\.]+/\+download/django-openid-auth-([\d\.]+)\.tar\.gz

Modified: packages/django-openid-auth/trunk/debian/changelog
===================================================================
--- packages/django-openid-auth/trunk/debian/changelog	2014-10-11 18:30:19 UTC (rev 30987)
+++ packages/django-openid-auth/trunk/debian/changelog	2014-10-11 19:32:41 UTC (rev 30988)
@@ -1,3 +1,10 @@
+django-openid-auth (0.5-2.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Update for Django 1.7 support (Closes: #755667)
+
+ -- Neil Williams <codehelp at debian.org>  Fri, 10 Oct 2014 10:38:22 +0100
+
 django-openid-auth (0.5-2) unstable; urgency=medium
 
   * debian/patches/django1.6compat.patch: Fix compatibility

Modified: packages/django-openid-auth/trunk/debian/patches/series
===================================================================
--- packages/django-openid-auth/trunk/debian/patches/series	2014-10-11 18:30:19 UTC (rev 30987)
+++ packages/django-openid-auth/trunk/debian/patches/series	2014-10-11 19:32:41 UTC (rev 30988)
@@ -1,2 +1,3 @@
 django1.5compat.patch
 django1.6compat.patch
+django1.7compat.patch




More information about the Python-modules-commits mailing list