diff --git a/Django-4.2.13.checksum.txt b/Django-4.2.13.checksum.txt deleted file mode 100644 index abd0174..0000000 --- a/Django-4.2.13.checksum.txt +++ /dev/null @@ -1,67 +0,0 @@ ------BEGIN PGP SIGNED MESSAGE----- -Hash: SHA256 - -This file contains MD5, SHA1, and SHA256 checksums for the source-code -tarball and wheel files of Django 4.2.13, released May 7, 2024. - -To use this file, you will need a working install of PGP or other -compatible public-key encryption software. You will also need to have -the Django release manager's public key in your keyring. This key has -the ID ``2EE82A8D9470983E`` and can be imported from the MIT -keyserver, for example, if using the open-source GNU Privacy Guard -implementation of PGP: - - gpg --keyserver pgp.mit.edu --recv-key 2EE82A8D9470983E - -or via the GitHub API: - - curl https://github.com/nessita.gpg | gpg --import - - -Once the key is imported, verify this file: - - gpg --verify Django-4.2.13.checksum.txt - -Once you have verified this file, you can use normal MD5, SHA1, or SHA256 -checksumming applications to generate the checksums of the Django -package and compare them to the checksums listed below. - -Release packages -================ - -https://www.djangoproject.com/m/releases/4.2/Django-4.2.13-py3-none-any.whl -https://www.djangoproject.com/m/releases/4.2/Django-4.2.13.tar.gz - -MD5 checksums -============= - -449eeffe35a7a748bf9acc4169ea7492 Django-4.2.13-py3-none-any.whl -a243a2c1e7c0752947d16d4ffae30376 Django-4.2.13.tar.gz - -SHA1 checksums -============== - -75a19218f248f0010685b471d1be86cad7602872 Django-4.2.13-py3-none-any.whl -56373bedaef33ee29b2d240b6b06ebe2e1e2fc58 Django-4.2.13.tar.gz - -SHA256 checksums -================ - -a17fcba2aad3fc7d46fdb23215095dbbd64e6174bf4589171e732b18b07e426a Django-4.2.13-py3-none-any.whl -837e3cf1f6c31347a1396a3f6b65688f2b4bb4a11c580dcb628b5afe527b68a5 Django-4.2.13.tar.gz ------BEGIN PGP SIGNATURE----- - -iQJcBAEBCABGFiEEW1sboQ2FrHxcduOPLugqjZRwmD4FAmY6YWsoHDEyNDMwNCtu -ZXNzaXRhQHVzZXJzLm5vcmVwbHkuZ2l0aHViLmNvbQAKCRAu6CqNlHCYPtEKD/9S -rZ+yadh7sQGszWtJEIZZS/YBQRcNyM+26aUkpk+3XT1SUDUs0whtX6U/P3tP+h+P -0vIk0wxTc3RhRCp8WETYulekRhPFc5HJFwlD/vh9AkEyDKW8QFuV+IBswvlfG/wK -D+QcuERl31Y1qcrCeFCM+XIRxGR9lQ0DuoCa1FuPl0bvAlNDOfNSmp4OzcPzGm4a -wE9wtsHqKkL8BAc836JIXHj5wdQK+HOkOv30ZcUU+nD3Lp5N44ESzzSe7IOutN02 -PBAixmwMf6EqjHC7JN49EwiPbEDTmg5HNj7LBM1Teqp5Hms11xGMfzxsh3AbEtoT -xeqZjrrcwoVf+wASVCKCv33Gfka45Z5X5f5G2O8//yJdLogwr6994rJ1MB7k18Yd -ObOl17pUctdrNKWuESJXz3l2c1DPbFQNKHiqI66fFm4L/fLMubMzkDlWzWH1jqSo -8tbSH9ATjEp/aLYKuGgr1gdazl4YbpiTkEjzFXYGmyjF7hPLT7xH2rrGCT4J7Bjc -TGnZGXdl4yaGcC8Q0Ma5ybMv3GgEsaa1wRnbNv5nQyNXIWrt9rcMfBDwcaSkq6NR -d7WpYUy5JT0IbR1SAazMY+NjUy+vzq26KkcUcbkoOng3guba0uPuoSphWM607MzK -UVab1KcJwNOC7/Di4Ul9vlh7dLMVg5yG+o7kFEJU/A== -=o/kY ------END PGP SIGNATURE----- diff --git a/Django-4.2.13.tar.gz b/Django-4.2.13.tar.gz deleted file mode 100644 index dde4fc1..0000000 --- a/Django-4.2.13.tar.gz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:837e3cf1f6c31347a1396a3f6b65688f2b4bb4a11c580dcb628b5afe527b68a5 -size 10430886 diff --git a/Django-5.0.7.checksum.txt b/Django-5.0.7.checksum.txt new file mode 100644 index 0000000..c96a8ee --- /dev/null +++ b/Django-5.0.7.checksum.txt @@ -0,0 +1,67 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA256 + +This file contains MD5, SHA1, and SHA256 checksums for the source-code +tarball and wheel files of Django 5.0.7, released July 9, 2024. + +To use this file, you will need a working install of PGP or other +compatible public-key encryption software. You will also need to have +the Django release manager's public key in your keyring. This key has +the ID ``2EE82A8D9470983E`` and can be imported from the MIT +keyserver, for example, if using the open-source GNU Privacy Guard +implementation of PGP: + + gpg --keyserver pgp.mit.edu --recv-key 2EE82A8D9470983E + +or via the GitHub API: + + curl https://github.com/nessita.gpg | gpg --import - + +Once the key is imported, verify this file: + + gpg --verify Django-5.0.7.checksum.txt + +Once you have verified this file, you can use normal MD5, SHA1, or SHA256 +checksumming applications to generate the checksums of the Django +package and compare them to the checksums listed below. + +Release packages +================ + +https://www.djangoproject.com/m/releases/5.0/Django-5.0.7.tar.gz +https://www.djangoproject.com/m/releases/5.0/Django-5.0.7-py3-none-any.whl + +MD5 checksums +============= + +454d23ea901892fd544541f4a1a33a3e Django-5.0.7.tar.gz +c687175397b8d6d98b8e0e35e6f142fb Django-5.0.7-py3-none-any.whl + +SHA1 checksums +============== + +ed070e21b5bf0b188104338a3b8a495b9d59593d Django-5.0.7.tar.gz +4aecb9aeab348f003c32952906eef7556a5be54b Django-5.0.7-py3-none-any.whl + +SHA256 checksums +================ + +bd4505cae0b9bd642313e8fb71810893df5dc2ffcacaa67a33af2d5cd61888f2 Django-5.0.7.tar.gz +f216510ace3de5de01329463a315a629f33480e893a9024fc93d8c32c22913da Django-5.0.7-py3-none-any.whl +-----BEGIN PGP SIGNATURE----- + +iQJcBAEBCABGFiEEW1sboQ2FrHxcduOPLugqjZRwmD4FAmaNPRgoHDEyNDMwNCtu +ZXNzaXRhQHVzZXJzLm5vcmVwbHkuZ2l0aHViLmNvbQAKCRAu6CqNlHCYPgnUD/47 +sPedXK17iCelw70BRY7EqWxwVwSbTxKcnw14y2qejS923MlnEEraeOll2HbCqOmL ++O3coVJsTc9GAMrQLyip8sHCwb4SSCWmwRqQZbTdNRrZOWfCPRLsbVccEabdwTNC +7YDyDc+3FQhHIszNI0zkJ1H3G7280euwIrMIhnCbwH1PC/hqAwdlhf1+nc4BiIMg +dz/Bg65abruY/6LM0btMP72avHrM0BRiRs5kOYn7+xgh1cqnI64RHROgrymK7JkT +LxoZDhWvDv68IvyNWEuLU4yDXnv/3ZglhwUA8q+leMqtURwBWs8UMnLhHhR52kie +okrK6eBkYeHls3vMGOTKxe7nJHhfEjl6V9XJShIdU1ir+/iCeaRMzYjpr4H5591H +TMs8Hgm27Wt7U/OT5EsF+vIpLaAR9AnZfNfB1eYU34BUAloZSQCxz+Y65LCN5wKk +jfaG7phOiO33NJMUxhfemjwJIJymw7uZnuRQJ8KUMbr9Q/iCVWsMG+QXhJs96KRO +y1SYVgPgU5Jll9VN/H2WJCj9I1YOVZPDVAbMcB+hKklw6ZhZx2fxgxLO/3/REQJs +iBJ1ETPdCHct5HJyAoBD++NCeioUKd5pXxqMvtuNH7winRC9NMGw4XX1CbpBBB+1 +y1mkGxw+QvBh4rivA6TSQQwTDQXAnoT7ida+Ye2FVw== +=GcbG +-----END PGP SIGNATURE----- diff --git a/Django-5.0.7.tar.gz b/Django-5.0.7.tar.gz new file mode 100644 index 0000000..35d8d66 --- /dev/null +++ b/Django-5.0.7.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bd4505cae0b9bd642313e8fb71810893df5dc2ffcacaa67a33af2d5cd61888f2 +size 10642686 diff --git a/dirty-hack-remove-assert.patch b/dirty-hack-remove-assert.patch deleted file mode 100644 index fadb3c1..0000000 --- a/dirty-hack-remove-assert.patch +++ /dev/null @@ -1,25 +0,0 @@ -From 36736edaf595d2bbf1fe881609b2a4c8e3bac68a Mon Sep 17 00:00:00 2001 -From: =?UTF-8?q?Miro=20Hron=C4=8Dok?= -Date: Thu, 29 Jun 2023 12:29:21 +0200 -Subject: [PATCH] Dirty hack: Remove a failing assert, failure does not seem - critical - ---- - tests/settings_tests/tests.py | 1 - - 1 file changed, 1 deletion(-) - -diff --git a/tests/settings_tests/tests.py b/tests/settings_tests/tests.py -index 62cbffb..b7432d3 100644 ---- a/tests/settings_tests/tests.py -+++ b/tests/settings_tests/tests.py -@@ -397,7 +397,6 @@ class TestComplexSettingOverride(SimpleTestCase): - with self.assertWarnsMessage(UserWarning, msg) as cm: - with override_settings(TEST_WARN="override"): - self.assertEqual(settings.TEST_WARN, "override") -- self.assertEqual(cm.filename, __file__) - - - class SecureProxySslHeaderTest(SimpleTestCase): --- -2.40.1 - diff --git a/python-Django.changes b/python-Django.changes index 19ee723..188556e 100644 --- a/python-Django.changes +++ b/python-Django.changes @@ -1,3 +1,28 @@ +------------------------------------------------------------------- +Tue Jul 9 14:03:46 UTC 2024 - Markéta Machová + +- Update to 5.0.7 + * Supports Python >= 3.10. + * Facet counts are now shown for applied filters in the admin changelist + when toggled on via the UI. This behavior can be changed via the new + ModelAdmin.show_facets attribute. + * Django 5.0 introduces the concept of a field group, and field group + templates. This simplifies rendering of the related elements of a + Django form field such as its label, widget, help text, and errors. + * The new Field.db_default parameter sets a database-computed default value. + * The new GeneratedField allows creation of database generated columns. + This field can be used on all supported database backends to create + a field that is always computed from other fields. + * More options for declaring field choices + * Few backwards-incompatible changes in the database backend API, + django.contrib.gis and django.contrib.sitemaps + * Dropped support for MySQL < 8.0.11 + * Using create_defaults__exact may now be required with QuerySet.update_or_create() + * Migrating existing UUIDField on MariaDB 10.7+ +- Drop no-longer-needed patches: + * dirty-hack-remove-assert.patch + * sanitize_address.patch + ------------------------------------------------------------------- Wed May 8 07:30:48 UTC 2024 - Alberto Planas Dominguez diff --git a/python-Django.spec b/python-Django.spec index d7ceb3e..0df244c 100644 --- a/python-Django.spec +++ b/python-Django.spec @@ -23,25 +23,20 @@ %bcond_with memcached %{?sle15_python_module_pythons} Name: python-Django -# We want support LTS versions of Django - numbered 2.2 -> 3.2 -> 4.2 etc -Version: 4.2.13 +Version: 5.0.7 Release: 0 Summary: A high-level Python Web framework License: BSD-3-Clause URL: https://www.djangoproject.com -Source: https://www.djangoproject.com/m/releases/4.2/Django-%{version}.tar.gz +Source: https://www.djangoproject.com/m/releases/5.0/Django-%{version}.tar.gz Source1: https://media.djangoproject.com/pgp/Django-%{version}.checksum.txt Source2: %{name}.keyring Source99: python-Django-rpmlintrc -# PATCH-FIX-UPSTREAM https://github.com/django/django/commit/da2f8e8257d1bea4215381684ca4abfcee333c43 Refs #34118 -- Improved sanitize_address() error message for tuple with empty strings. -Patch0: sanitize_address.patch -# PATCH-FIX-OPENSUSE: ignore minor failure on Python 3.12 -Patch1: dirty-hack-remove-assert.patch BuildRequires: %{python_module Jinja2 >= 2.9.2} BuildRequires: %{python_module Pillow >= 6.2.0} BuildRequires: %{python_module PyYAML} BuildRequires: %{python_module argon2-cffi >= 19.1.0} -BuildRequires: %{python_module asgiref >= 3.6.0} +BuildRequires: %{python_module asgiref >= 3.7.0} BuildRequires: %{python_module base >= 3.8} BuildRequires: %{python_module bcrypt} BuildRequires: %{python_module docutils} @@ -58,19 +53,14 @@ BuildRequires: python-rpm-macros BuildRequires: %{python_module backports.zoneinfo if (%python-base with python38-base)} Requires: python Requires: python-Pillow >= 6.2.0 -Requires: python-argon2-cffi >= 19.1.0 -Requires: python-asgiref >= 3.6.0 -%if "%{python_flavor}" == "python38" -Requires: python-backports.zoneinfo -%endif -Requires: python-bcrypt -Requires: python-pytz -Requires: python-setuptools +Requires: python-asgiref >= 3.7.0 Requires: python-sqlparse >= 0.3.1 Requires(post): update-alternatives Requires(postun): update-alternatives Recommends: python-Jinja2 >= 2.9.2 Recommends: python-PyYAML +Recommends: python-argon2-cffi >= 19.1.0 +Recommends: python-bcrypt Recommends: python-geoip2 Recommends: python-pylibmc Recommends: python-pymemcache diff --git a/sanitize_address.patch b/sanitize_address.patch deleted file mode 100644 index f9a5916..0000000 --- a/sanitize_address.patch +++ /dev/null @@ -1,40 +0,0 @@ -From da2f8e8257d1bea4215381684ca4abfcee333c43 Mon Sep 17 00:00:00 2001 -From: Mariusz Felisiak -Date: Mon, 17 Jul 2023 11:03:36 +0200 -Subject: [PATCH] Refs #34118 -- Improved sanitize_address() error message for - tuple with empty strings. - ---- - django/core/mail/message.py | 2 ++ - tests/mail/tests.py | 3 ++- - 2 files changed, 4 insertions(+), 1 deletion(-) - -diff --git a/django/core/mail/message.py b/django/core/mail/message.py -index f3fe6186c7f5..4f8c93e9e55e 100644 ---- a/django/core/mail/message.py -+++ b/django/core/mail/message.py -@@ -97,6 +97,8 @@ def sanitize_address(addr, encoding): - domain = token.domain or "" - else: - nm, address = addr -+ if "@" not in address: -+ raise ValueError(f'Invalid address "{address}"') - localpart, domain = address.rsplit("@", 1) - - address_parts = nm + localpart + domain -diff --git a/tests/mail/tests.py b/tests/mail/tests.py -index 54a136c1a98b..848ee32e9f80 100644 ---- a/tests/mail/tests.py -+++ b/tests/mail/tests.py -@@ -1084,9 +1084,10 @@ def test_sanitize_address_invalid(self): - "@", - "to@", - "@example.com", -+ ("", ""), - ): - with self.subTest(email_address=email_address): -- with self.assertRaises(ValueError): -+ with self.assertRaisesMessage(ValueError, "Invalid address"): - sanitize_address(email_address, encoding="utf-8") - - def test_sanitize_address_header_injection(self):