1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55
|
Source: python-itsdangerous
Maintainer: Debian Python Team <team+python@tracker.debian.org>
Uploaders: Simon Fondrie-Teitler <simonft@riseup.net>, Thomas Goirand <zigo@debian.org>, Julien Puydt <jpuydt@debian.org>
Section: python
Priority: optional
Build-Depends:
debhelper-compat (= 13),
dh-sequence-python3,
pybuild-plugin-pyproject,
python3-flit-scm,
python3-all,
python3-freezegun <!nocheck>,
python3-pallets-sphinx-themes,
python3-sphinx,
python3-sphinxcontrib-log-cabinet,
python3-sphinx-issues,
python3-pytest <!nocheck>,
Vcs-Browser: https://salsa.debian.org/python-team/packages/python-itsdangerous
Vcs-Git: https://salsa.debian.org/python-team/packages/python-itsdangerous.git
Homepage: https://itsdangerous.palletsprojects.com/
Standards-Version: 4.7.0
Rules-Requires-Root: no
Testsuite: autopkgtest-pkg-python
Package: python3-itsdangerous
Architecture: all
Depends: ${misc:Depends}, ${python3:Depends}
Description: Various helpers to pass trusted data to untrusted environment - Python 3.x
itsdangerous provides a module that is a port of the django signing
module. It's not directly copied but some changes were applied to
make it work better on its own.
.
itsdangerous allows web applications to use a key only it knows to
cryptographically sign data and hand it over to someone else (e.g. a
user). When it gets the data back it can easily ensure that nobody
tampered with it.
.
This package provides the itsdangerous Python module for Python 3.x.
Package: python-itsdangerous-doc
Architecture: all
Multi-Arch: foreign
Section: doc
Depends: ${misc:Depends}, ${sphinxdoc:Depends}
Description: Various helpers to pass trusted data to untrusted environment - doc
itsdangerous provides a module that is a port of the django signing
module. It's not directly copied but some changes were applied to
make it work better on its own.
.
itsdangerous allows web applications to use a key only it knows to
cryptographically sign data and hand it over to someone else (e.g. a
user). When it gets the data back it can easily ensure that nobody
tampered with it.
.
This package provides the documentation.
|