f9aff98bb8
Basic/extra mitigation against the BREACH attack for Django projects. django-debreach provides additional protection to Django's built in CSRF token masking by randomizing the content length of each response. This is achieved by adding a random string of between 12 and 25 characters as a comment to the end of the HTML content. Note that this will only be applied to responses with a content type of text/html. WWW: https://github.com/lpomfrey/django-debreach
26 lines
519 B
Makefile
26 lines
519 B
Makefile
# $FreeBSD$
|
|
|
|
PORTNAME= django-debreach
|
|
PORTVERSION= 2.0.1
|
|
CATEGORIES= www security python
|
|
MASTER_SITES= CHEESESHOP
|
|
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
|
|
|
|
MAINTAINER= kai@FreeBSD.org
|
|
COMMENT= Adds protection against the BREACH attack in Django
|
|
|
|
LICENSE= BSD2CLAUSE
|
|
LICENSE_FILE= ${WRKSRC}/LICENSE
|
|
|
|
TEST_DEPENDS= ${PYTHON_PKGNAMEPREFIX}django22>0:www/py-django22@${PY_FLAVOR}
|
|
|
|
USES= python:3.5+
|
|
USE_PYTHON= autoplist distutils
|
|
|
|
NO_ARCH= yes
|
|
|
|
do-test:
|
|
@cd ${WRKSRC} && ${PYTHON_CMD} runtests.py
|
|
|
|
.include <bsd.port.mk>
|