diff options
| author | Rob Hudson | 2013-01-09 08:52:05 -0800 |
|---|---|---|
| committer | Rob Hudson | 2013-01-09 08:52:05 -0800 |
| commit | 3b284755fe9c2f9a714659f6f2e25a8eea1dd3df (patch) | |
| tree | e73e04f256b634868bfeaefe036bd96e1c0e749c /debug_toolbar/views.py | |
| parent | 22ebebd29b5d42ae50e9681847784713fa67daf5 (diff) | |
| parent | d4971605cc0f82315805c44ea8346f609b1f07bb (diff) | |
| download | django-debug-toolbar-3b284755fe9c2f9a714659f6f2e25a8eea1dd3df.tar.bz2 | |
Merge pull request #350 from charettes/simplejson
Use the built-in json module on python >= 2.6.
Diffstat (limited to 'debug_toolbar/views.py')
| -rw-r--r-- | debug_toolbar/views.py | 14 |
1 files changed, 9 insertions, 5 deletions
diff --git a/debug_toolbar/views.py b/debug_toolbar/views.py index a642541..18b9460 100644 --- a/debug_toolbar/views.py +++ b/debug_toolbar/views.py @@ -9,13 +9,17 @@ import django.views.static from django.conf import settings from django.http import HttpResponseBadRequest from django.shortcuts import render_to_response -from django.utils import simplejson from debug_toolbar.utils.compat.db import connections try: + import json +except ImportError: # python < 2.6 + from django.utils import simplejson as json + +try: from hashlib import sha1 -except ImportError: +except ImportError: # python < 2.5 from django.utils.hashcompat import sha_constructor as sha1 @@ -45,7 +49,7 @@ def sql_select(request): if hash != request.GET.get('hash', ''): return HttpResponseBadRequest('Tamper alert') # SQL Tampering alert if sql.lower().strip().startswith('select'): - params = simplejson.loads(params) + params = json.loads(params) cursor = connections[alias].cursor() cursor.execute(sql, params) headers = [d[0] for d in cursor.description] @@ -80,7 +84,7 @@ def sql_explain(request): if hash != request.GET.get('hash', ''): return HttpResponseBadRequest('Tamper alert') # SQL Tampering alert if sql.lower().strip().startswith('select'): - params = simplejson.loads(params) + params = json.loads(params) cursor = connections[alias].cursor() conn = connections[alias].connection @@ -126,7 +130,7 @@ def sql_profile(request): if hash != request.GET.get('hash', ''): return HttpResponseBadRequest('Tamper alert') # SQL Tampering alert if sql.lower().strip().startswith('select'): - params = simplejson.loads(params) + params = json.loads(params) cursor = connections[alias].cursor() result = None headers = None |
