Commit graph

209 commits

Author SHA1 Message Date
Aleksi Häkli
d27bd95119 Remove .landscape.yaml as service is defunct 2019-11-10 11:06:43 -05:00
Aleksi Häkli
01dd2bc354 Wrap Celery version specifier in quotes 2019-11-10 11:06:15 -05:00
Aleksi Häkli
ef3673cd4f Add Python 3.7, 3.8 and PyPy3 to test version matrix 2019-11-10 11:06:15 -05:00
Aleksi Häkli
cafa92860e Remove deprecated empty first URL 2019-11-08 09:03:12 -05:00
Aleksi Häkli
d6e905706b Update README
- Remove non-functional Landscape.io badge (site is unreachable)
- Add Jazzband badge
- Update title styling
- Update code examples for Django version compatibility
2019-11-08 09:03:12 -05:00
Aleksi Häkli
f439b7b647 Create CONTRIBUTING guidelines 2019-11-07 15:38:30 -05:00
Aleksi Häkli
da7aa9d41b Update README links 2019-11-07 15:37:39 -05:00
Ken Cochrane
e7f7cba6c5
Create .fussyfox.yml
Added the `.fussyfox.yml` file
2019-11-07 15:35:22 -05:00
horida
ce95906488 send user/ip blocked signal only once 2019-09-16 08:47:35 -04:00
horida
fcfa88d679 Add unblock signals 2019-09-08 10:05:04 -04:00
Ken Cochrane
2a5527ac4c bump version to 0.6.2
Signed-off-by: Ken Cochrane <KenCochrane@gmail.com>
2019-06-04 18:02:03 -04:00
Salar Rahmanian
fbad0face1 Added support for redis client 3.2.1 2019-06-04 15:17:31 -04:00
Chris Ledet
7ca76bb975 Add and test support for Django 2.2 2019-05-30 08:34:42 -04:00
Ken Cochrane
1026cf5c6c bumped to 0.6.1
Signed-off-by: Ken Cochrane <KenCochrane@gmail.com>
2019-05-19 14:15:54 -04:00
GTpyro
e3e547dbb8 added new site to list of sites using Defender 2019-03-23 17:31:20 -04:00
Attila Földes
1f76f79e09 redispy 3.2.0 compat 2019-03-07 06:26:17 -05:00
Ken Cochrane
c31e812abd Pushed out release 0.6.0 2019-02-09 10:15:53 -05:00
fr0mhell
7400a4945f Feature update Python and Django versions (#126)
* remove Python 3.3
* remove Django 1.8-1.10
* add Celery v4
* update travis config
* update admin URL
* replace MIDDLEWARE_CLASSES with MIDDLEWARE
2019-01-29 07:50:02 -05:00
Ken Cochrane
2251c298a9 Release version 0.5.5
Signed-off-by: Ken Cochrane <KenCochrane@gmail.com>
2018-06-07 07:48:18 -04:00
Andrei Baryshnikov
3031deb761 Add possibility to use custom utils.get_username_from_request function (#122)
* Add `DEFENDER_GET_USERNAME_FROM_REQUEST_PATH` setting

This setting allow to override default `get_username_from_request`
function.

* Add `get_username` argument to `watch_login`

To be able to propagate this argument to other utils functions calls

* Minor code-style fixes

* Add example of use of `DEFENDER_GET_USERNAME_FROM_REQUEST_PATH` setting

* Update docs
2018-05-29 10:32:08 -04:00
Ken Cochrane
825afb3209 Released version 0.5.4
Signed-off-by: Ken Cochrane <KenCochrane@gmail.com>
2018-04-10 19:39:20 -04:00
Jaimie Imrie
066dd238c8 Added ssl option when instantiating StrictRedis (#120) 2018-04-10 18:57:45 -04:00
William Boman
250c4d5388 add 2 new setting variables for more granular failure limit control (#113) 2018-04-10 09:22:51 -04:00
William Boman
b546224372 send signals when blocking username or ip (#114) 2018-04-10 09:21:37 -04:00
Ken Cochrane
50e2962fd5 Released 0.5.3
Signed-off-by: Ken Cochrane <KenCochrane@gmail.com>
2018-03-11 16:26:58 -04:00
Ken Cochrane
fcfcd53076
Move mockredis to test requirements. replaces #115 (#119)
Signed-off-by: Ken Cochrane <KenCochrane@gmail.com>
2018-02-20 09:34:14 -05:00
Ken Cochrane
104eda3d03 Added 0.5.2 release details to README.md
Signed-off-by: Ken Cochrane <KenCochrane@gmail.com>
2018-02-19 10:07:14 -05:00
Ken Cochrane
46ff44bd87 Released version 0.5.2
Signed-off-by: Ken Cochrane <KenCochrane@gmail.com>
2018-02-19 09:50:59 -05:00
Daniel Hahler
dff964c226 README: align reverse-proxy settings (#118)
[ci skip]
2018-02-19 09:16:39 -05:00
Cobus Carstens
5aa69bac96 Only use the username if it is actually provided (#112)
* Only use the username if it is actually provided

* Test that unspecified usernames cannot be blocked

* Added test to prevent Coveralls from complaining about a coverage regression.
2018-02-01 06:30:26 -05:00
William Boman
2b6374f1da utils: add username kwarg for providing username directly rather than via callback arg (#107) 2018-02-01 06:27:38 -05:00
Sophie Wirth
cde53c5315 replace django.core.urlresolvers with django.urls to appeace Django2.… (#106)
* replace django.core.urlresolvers with django.urls to appeace Django2.0 deprecations
* add try except block around imports for older version support
* add correct django version in setup.py install_reqs
2017-12-11 13:52:50 -05:00
cburger
b2490e4e4c Correctly get raw client when using django_redis cache. (#104) 2017-10-27 09:38:11 -04:00
Eric Buckley
cd587a4f09 removing hiredis dependency in setup.py (#102) 2017-08-31 13:44:09 -04:00
Ken Cochrane
bcfe46ceca change django install_requires version (#101)
Fix the django install)requires version in setup.py so that it allows versions of django 1.11.x
2017-08-31 11:31:04 -04:00
ruthus18
7c6a7d2b93 Update regex for 'unblock_username_view'. (#100)
The reason why we need to handle almost all special symbols is in cases when username is like 'some!username'

 Issue: #76
2017-08-31 11:12:14 -04:00
Ken Cochrane
5451dba099 Bump to 0.5.1 (#95)
Signed-off-by: Ken Cochrane <kencochrane@gmail.com>
2017-08-02 14:50:59 -04:00
Teemu N
db7a9001db Middleware fix for django >= 1.10 (#93)
Fixes the `TypeError: object.__init__() takes no parameters` that happens with the new MIDDLEWARE that is new in django 1.10
2017-07-04 13:23:28 -04:00
Mattia Procopio
85817fd278 Force the username to lowercase (#90) 2017-07-01 09:24:51 -04:00
Ken Cochrane
fc9d51e46a Release 0.5.0 (#88)
Signed-off-by: Ken Cochrane <kencochrane@gmail.com>
2017-06-29 09:27:04 -04:00
Ken Cochrane
4d9adc35c2 Cleanup the code to remove lint warnings (#87)
* Cleanup the code to remove lint warnings

Signed-off-by: Ken Cochrane <kencochrane@gmail.com>

* Fixed typo

Signed-off-by: Ken Cochrane <kencochrane@gmail.com>
2017-06-28 17:09:44 -04:00
Mattia Procopio
b985d17beb Allow decoration of functions beyond the admin login (#86)
* Allow decoration of functions beyond the admin login

* Exclude tests file from coverage

* Allow installing django 1.11

* Add python 3.6 for testing
2017-06-26 12:23:23 -04:00
Francisco Rivera
d2b712eade Taking redis client from django.core.cache (#82)
* new setting that point to an already configured redis client

* taking redis client from django cache setting

* adding informative exception

* dropping django 1.6 support

* dropping django 1.7 support

* adding tests

* removing old coverage stuff + pep8 fixes

* ups, wrong package

* supporting multiple backends

* adding documentation

* dropping python 2.6 support
2017-06-24 19:17:15 -04:00
Israel Saeta Pérez
a59cbca0f6 Add support for Django 1.11 (#79) 2017-06-12 19:10:03 -04:00
Israel Saeta Pérez
11ee7bc233 Doc: BasicAuthenticationDefender should precede other auth classes (#80) 2017-06-12 11:53:12 -04:00
Israel Saeta Pérez
69db1cfb70 Allow usernames with plus signs in unblock view (#77)
This fixes bug #GH76 where an exception like

```
Reverse for 'defender_unblock_username_view' with arguments '(u'user+test@domain.tld',)' and keyword arguments '{}' not found. 1 pattern(s) tried: [u'admin/defender/blocks/username/(?P[A-Za-z0-9-._@]+)/unblock$']
```

was raised when trying to access the `/admin/defender/blocks/` URL when a user with a plus sign had been locked out.
2017-06-10 10:39:19 -04:00
Ken Cochrane
c4f3a61036 Bump for 0.4.3 release (#74)
* Bump for 0.4.3 release

Signed-off-by: Ken Cochrane <KenCochrane@gmail.com>

* updated travis dependencies and fixed issue with 1.10,1.11 tests

Signed-off-by: Ken Cochrane <KenCochrane@gmail.com>

* Added travis settings

Signed-off-by: Ken Cochrane <KenCochrane@gmail.com>

* Revert django 1.11 support

Signed-off-by: Ken Cochrane <KenCochrane@gmail.com>
2017-04-14 18:30:58 -04:00
Jakub Kuszneruk
079c897203 Example djangorestframework auth method
- sample authentication method described in README
piggyback:
- typo in lockout.html
2017-03-21 11:03:42 -04:00
Ken Cochrane
46ea25c8f0 Merge pull request #71 from shnela/custom_get_user_from_request
[#70] get username from request is more flexible
2017-03-10 14:38:58 -05:00
Jakub Kuszneruk
cd0a22c1c5 [#70] get username from request is more flexible
- Every function which loads username from request has the optional paramter: get_username
piggyback:
- removed redefinition of USERNAME_FORM_FIELD from defender.config
2017-03-10 20:04:45 +01:00