diff options
| author | Craig de Stigter | 2012-11-21 12:52:42 +1300 | 
|---|---|---|
| committer | Craig de Stigter | 2012-11-21 12:52:42 +1300 | 
| commit | dc62f8175f5b63285628694f67185b51afe626e8 (patch) | |
| tree | fd5083cd3a2d74fa455f1fb9be58a4a7b55e6b5f /debug_toolbar | |
| parent | aeb45f2fea083fb182f5fd33e7c4980780b1ea81 (diff) | |
| download | django-debug-toolbar-dc62f8175f5b63285628694f67185b51afe626e8.tar.bz2 | |
fix hashcompat deprecation warnings with django 1.5
Diffstat (limited to 'debug_toolbar')
| -rw-r--r-- | debug_toolbar/utils/tracking/db.py | 9 | ||||
| -rw-r--r-- | debug_toolbar/views.py | 12 | 
2 files changed, 15 insertions, 6 deletions
| diff --git a/debug_toolbar/utils/tracking/db.py b/debug_toolbar/utils/tracking/db.py index 4d87090..e9c7ce9 100644 --- a/debug_toolbar/utils/tracking/db.py +++ b/debug_toolbar/utils/tracking/db.py @@ -7,11 +7,16 @@ from django.conf import settings  from django.template import Node  from django.utils import simplejson  from django.utils.encoding import force_unicode, smart_str -from django.utils.hashcompat import sha_constructor  from debug_toolbar.utils import ms_from_timedelta, tidy_stacktrace, \                                  get_template_info, get_stack  from debug_toolbar.utils.compat.db import connections + +try: +    from hashlib import sha1 +except ImportError: +    from django.utils.hashcompat import sha_constructor as sha1 +  # TODO:This should be set in the toolbar loader as a default and panels should  # get a copy of the toolbar object with access to its config dictionary  SQL_WARNING_THRESHOLD = getattr(settings, 'DEBUG_TOOLBAR_CONFIG', {}) \ @@ -134,7 +139,7 @@ class NormalCursorWrapper(object):                  'duration': duration,                  'raw_sql': sql,                  'params': _params, -                'hash': sha_constructor(settings.SECRET_KEY \ +                'hash': sha1(settings.SECRET_KEY \                                          + smart_str(sql) \                                          + _params).hexdigest(),                  'stacktrace': stacktrace, diff --git a/debug_toolbar/views.py b/debug_toolbar/views.py index be917ff..a642541 100644 --- a/debug_toolbar/views.py +++ b/debug_toolbar/views.py @@ -10,10 +10,14 @@ from django.conf import settings  from django.http import HttpResponseBadRequest  from django.shortcuts import render_to_response  from django.utils import simplejson -from django.utils.hashcompat import sha_constructor  from debug_toolbar.utils.compat.db import connections +try: +    from hashlib import sha1 +except ImportError: +    from django.utils.hashcompat import sha_constructor as sha1 +  class InvalidSQLError(Exception):      def __init__(self, value): @@ -37,7 +41,7 @@ def sql_select(request):      sql = request.GET.get('sql', '')      params = request.GET.get('params', '')      alias = request.GET.get('alias', 'default') -    hash = sha_constructor(settings.SECRET_KEY + sql + params).hexdigest() +    hash = sha1(settings.SECRET_KEY + sql + params).hexdigest()      if hash != request.GET.get('hash', ''):          return HttpResponseBadRequest('Tamper alert')  # SQL Tampering alert      if sql.lower().strip().startswith('select'): @@ -72,7 +76,7 @@ def sql_explain(request):      sql = request.GET.get('sql', '')      params = request.GET.get('params', '')      alias = request.GET.get('alias', 'default') -    hash = sha_constructor(settings.SECRET_KEY + sql + params).hexdigest() +    hash = sha1(settings.SECRET_KEY + sql + params).hexdigest()      if hash != request.GET.get('hash', ''):          return HttpResponseBadRequest('Tamper alert')  # SQL Tampering alert      if sql.lower().strip().startswith('select'): @@ -118,7 +122,7 @@ def sql_profile(request):      sql = request.GET.get('sql', '')      params = request.GET.get('params', '')      alias = request.GET.get('alias', 'default') -    hash = sha_constructor(settings.SECRET_KEY + sql + params).hexdigest() +    hash = sha1(settings.SECRET_KEY + sql + params).hexdigest()      if hash != request.GET.get('hash', ''):          return HttpResponseBadRequest('Tamper alert')  # SQL Tampering alert      if sql.lower().strip().startswith('select'): | 
