django-fast-iprestrict


Namedjango-fast-iprestrict JSON
Version 0.19.6 PyPI version JSON
download
home_pagehttps://github.com/devkral/django-fast-iprestrict
SummaryRestrict access to django project to trusted ips and optionally apply ratelimits. Like WAF in django.
upload_time2024-07-02 13:47:13
maintainerNone
docs_urlNone
authoralex
requires_python<4.0,>=3.9
licenseMIT
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # django-fast-iprestrict

Django-fast-iprestrict provides a secure facility based on the django admin framework to restrict the access for the whole project or
for parts of it to special ips or denylisting some ip networks.
Internal only networks are used for ip matching and for path matching regex is used (Note: when regex is turned of (default) the pathmatcher just escapes the strings before feeding them to the regex pattern)

The name comes from the relationship to django-fast-ratelimit.

It is even possible to use django-fast-iprestrict in django-fast-ratelimit

## Installation

```sh
pip install django-fast-iprestrict[ratelimit]

# or the limited without ratelimit integration

pip install django-fast-iprestrict

```

Now add to python settings

settings:

```python


INSTALLED_APPS = [
    ...
    "django_fast_iprestrict",
]

# if wanted (it is also possible to use this tool only with django-fast-ratelimit)

MIDDLEWARE = [
    ...
    "django_fast_iprestrict.middleware.fast_iprestrict",
    ...
]
```

## usage

### admin panel

In the admin panel is now a section Ip Restrict.
It contains multiple subsections from which only Rule allows to create new objects.
The other subsections are only an overview.

All of these subsections contain a test utility for checking arbitary pathes and ips

Rule pathes like `.*` can be used to match for the whole project.

Rules are evalutated like a waterfall:
the lowest position to the highest position. State disabled rules are skipped

Note: ipv4 and ipv6 rules are not interoperable. If the network does not match they are skipped like if they are in state "disabled".

#### ratelimits

ratelimits can be specified or a rule can be made to a ratelimit matcher (called programmatically via django-fast-ratelimit)

In the last case it is possible to provide the rate "inherit" for using the rate specified in the django-fast-ratelimit call.

If no rate was passed, ratelimits with rate "inherit" will be ignored

### programmatically

The rule names can be used for the django-fast-ratelimit adapter if RuleRatelimitGroups are defined and active. When some are defined the rule isn't used anymore in normal matching but only in apply_iprestrict.

Note: deactivated RuleRatelimitGroups still prevent the normal mode, the RuleRatelimitGroups have to be deleted to revert to the normal matching

```python

import django_fast_ratelimit as ratelimit

r = ratelimit.get_ratelimit(key="django_fast_iprestrict.apply_iprestrict", group="groupname")

# since django-fast-ratelimit 7.3, rate is not required anymore for older versions add stub rate
# Note: stub rates like 0/s will still raise Disabled
# Note: 1/s is used as the default rate for django-fast-ratelimit 8.0.0. This way rates can be passed to iprestrict
r = ratelimit.get_ratelimit(key="django_fast_iprestrict.apply_iprestrict", group="groupname", rate="1/s")

# or when only checking ips and not pathes (when pathes are available)

r = ratelimit.get_ratelimit(key="django_fast_iprestrict.apply_iprestrict:ignore_pathes", group="groupname")

# or when only checking ips and not pathes (when pathes are available) and requiring rule
r = ratelimit.get_ratelimit(key="django_fast_iprestrict.apply_iprestrict:ignore_pathes,require_rule", group="groupname")

# tuple/array syntax
r = ratelimit.get_ratelimit(key=["django_fast_iprestrict.apply_iprestrict", "ignore_pathes", "require_rule"], group="groupname")

# and now reset, regardless of the action in RatelimitAction, limitation: RESET_EPOCH only works when epoch is request
ratelimit.get_ratelimit(key="django_fast_iprestrict.apply_iprestrict", group="groupname", rate="1/s", action=ratelimit.Action.RESET)


# or as decorator with rule requirement
@ratelimit.decorate(key="django_fast_iprestrict.apply_iprestrict:require_rule", group="groupname")
def foo(request):
    return ""


```

The following arguments are valid:

-   `default_action:allow/deny`: overwrite global default action when no rule was found, overwrites `no_execute` default behaviour
-   `ignore_pathes`: match only via ip
-   `require_rule`: raise Disabled if rule with rulename not exist
-   `no_count` former `execute_only`: only decorate request, evaluate matching iprestrict rule action, wait and block, don't modify the ratelimit counter, for two-phased execution models
-   `no_execute` former `count_only`: don't apply wait and block, update the counter only when rule exists. If no `default_action` argument was specified return only 0 (allowed) and decorate request, for two-phased execution models

Note: when the request is already annotated with a ratelimit with the same decorate_name both instances are merged

Note: you can provide a rate and set the field rate in iprestrict ratelimit to "inherit" for using the provided rate, this works only when a rate is specified

Note: when using with reset, both options are automatically set. Limitation: RESET_EPOCH only works when epoch is the request (default)

#### two phased execution model

Especially with async code it can be handy to have two phases:

an execution phase in which only wait/block is executed and the counter not modified. Its place is before an expensive function.
The most common place is a decorator in urls. `no_count` argument

a count phase in which the ratelimit counter in cache is modified. Its place is after/in an expensive function.
In case of invariants or if the calculated result should not be wasted, no actions are executed. `no_execute` argument

views.py:

```python
import django_fast_ratelimit as ratelimit
from django.views import View
from django.http.import HttpResponse

class MyView(View):
    def get(self, request):
        # without count only
        ratelimit.get_ratelimit(key="django_fast_iprestrict.apply_iprestrict", groups="rulename", request=request)
        return HttpResponse(b"foo", status=200)
    def post(self, request):
        # expensive function
        ratelimit.get_ratelimit(key="django_fast_iprestrict.apply_iprestrict:no_execute", groups="rulename", request=request)
        return HttpResponse(b"foo", status=200)


```

urls.py:

```python
import django_fast_ratelimit as ratelimit
from .views import MyView

urlpatterns = [
    path(
        "foo/",
        ratelimit.decorate(key="django_fast_iprestrict.apply_iprestrict:no_count", groups="rulename")(MyView.as_view()),
    ),
]

```

#### really lowlevel (without ratelimit)

There are currently 3 matching methods of interest

```python
from django_fast_iprestrict.models import Rule, RulePath


Rule.objects.match_ip(ip="someip")
Rule.objects.match_all_ip(ip="someip")
RulePath.objects.match_ip_and_path(ip="someip", path="/foo")

```

Note: the matching methods have much more arguments. See in source for details

You might want to ignore the generic argument of match_ip and match_all_ip, it is dangerous as it ignores disabled rules
and can easily lead to lock outs

#### thirdparty integration (really deep lowlevel)

All of the models have managed_fields attribute. It is a list and only a list is valid. You can add field names you want to lockdown.
This cannot be overwritten by GUI. It is for the integration in thirdparty software, so nobody can do bad things or even delete.

Note: you should either call clean or ensure that all list entries are field names

Note: when using one of "ratelimits", "ratelimit_groups", "networks", "pathes", "sources" (fields to attached inline models)
only the creation and deletion is blocked. To lock the inline models further down, add fields to managed_fields.

There is one field which cannot be locked: "position"

### Sources (GEOIP)

For GEOIP or other stuff sources can be used.

Sources are functions with prefixes in IPRESTRICT_ALLOWED_FN_PREFIXES (can also be the whole function).

Restriction: "\_" prefixed functions are not allowed

They are referenced in admin with their path, e.g.:

`tests.test_basic.test_iprestrict_gen` (=also working example in dev environment with test_settings)

### Ratelimits

ratelimits require the companion library django-fast-ratelimit. And they work only with it! Otherwise crashes are preprogrammed

Ratelimit keys are either the default builtin functions or functions with prefixes in IPRESTRICT_ALLOWED_FN_PREFIXES

## behaviour

### ipv4 ipv6

mapped ipv4 addresses are extracted to plain ipv4 addresses.
Networks only match if their type is matching to the ip. Therefor IPv4 networks will be ignored when checking an IPv6 address

### catch alls

When a rule has neither an active network, source nor path it is treated as a catch all for match_ip. This means it resolves for every ip.

A such catch all is not used for path checks. When a path is added to the catch all the behaviour changes:

when the path matches and no network nor source is attached to the rule, it resolves without an ip check.

This allows a path catch all with a path like:
`.*` with is_regex set

## settings

IPRESTRICT_ALLOWED_FN_PREFIXES: defaults to [] (empty list)
IPRESTRICT_CACHE: select cache, defaults to "default" cache
IPRESTRICT_KEY_PREFIX: cache key prefix, defaults to "fip:"
IPRESTRICT_SOURCE_FORCE_EXPIRE: force expire sources via extra cache entry, for dangling caches; defaults to True
IPRESTRICT_DEFAULT_ACTION: "allow"/"deny" : default action when no rule matches, default, when unset is "allow". "allow" or unset is strongly recommended except you want to set the rules programmatically
IPRESTRICT_TRUSTED_PROXIES: set list of trusted proxies
RATELIMIT_TRUSTED_PROXIES: fallback when IPRESTRICT_TRUSTED_PROXIES is unset
IPRESTRICT_TESTCLIENT_FALLBACK: fallback for the string testclient in the ip field. Dev setting for tests
RATELIMIT_TESTCLIENT_FALLBACK: fallback when IPRESTRICT_TESTCLIENT_FALLBACK is unset

The ratelimit settings are fallbacks, so when set the settings is applied for django-fast-ratelimit and django-fast-iprestrict (handy shortcut).

Note: when using ratelimit the ratelimit settings are used for ratelimits, they can differ when not using the fallback

Note: when disabling the setting IPRESTRICT_SOURCE_FORCE_EXPIRE and using sources make sure you clear the cache at project restart. E.g. in Docker start file or restart the cache server too
Otherwise old entries sometimes doesn't expire and can cause stale sources (hard to detect)

## commands

iprestrict_clear_caches: clear caches in use by iprestrict and ratelimit, kills other entries in the cache too

iprestrict_unrestrict_all: disable all rules, clear caches in use by iprestrict and ratelimit, kills other entries in the cache too (should only be used in emergencies)

## development

a development environment can be setup this way (poetry is recommended):

```sh
# installation then
poetry run ./manage.py createsuperuser
poetry run ./manage.py runserver

```

# notable changes

-   0.18: rename execute_only to no_count and count_only to no_execute. The former names are still valid for the string array/string based call but deprecated
    the ratelimit reset action causes both options to be set and resets keys regardless of the action specified in RuleRatelimit
-   0.13: add RuleRatelimitGroup for explicitly use Rules with ratelimit. No longer just match the rule name

# TODO

-   extend lockout check for ratelimits (e.g. disabled is raised)
-   lockout check for RulePath and RuleNetwork change lists, so list_editable can be enabled
-   localization?

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/devkral/django-fast-iprestrict",
    "name": "django-fast-iprestrict",
    "maintainer": null,
    "docs_url": null,
    "requires_python": "<4.0,>=3.9",
    "maintainer_email": null,
    "keywords": null,
    "author": "alex",
    "author_email": "devkral@web.de",
    "download_url": "https://files.pythonhosted.org/packages/ab/f8/e5105c1a6e6c5147aea55a3d7fc5bd604368d09989cca69d79edcba640b3/django_fast_iprestrict-0.19.6.tar.gz",
    "platform": null,
    "description": "# django-fast-iprestrict\n\nDjango-fast-iprestrict provides a secure facility based on the django admin framework to restrict the access for the whole project or\nfor parts of it to special ips or denylisting some ip networks.\nInternal only networks are used for ip matching and for path matching regex is used (Note: when regex is turned of (default) the pathmatcher just escapes the strings before feeding them to the regex pattern)\n\nThe name comes from the relationship to django-fast-ratelimit.\n\nIt is even possible to use django-fast-iprestrict in django-fast-ratelimit\n\n## Installation\n\n```sh\npip install django-fast-iprestrict[ratelimit]\n\n# or the limited without ratelimit integration\n\npip install django-fast-iprestrict\n\n```\n\nNow add to python settings\n\nsettings:\n\n```python\n\n\nINSTALLED_APPS = [\n    ...\n    \"django_fast_iprestrict\",\n]\n\n# if wanted (it is also possible to use this tool only with django-fast-ratelimit)\n\nMIDDLEWARE = [\n    ...\n    \"django_fast_iprestrict.middleware.fast_iprestrict\",\n    ...\n]\n```\n\n## usage\n\n### admin panel\n\nIn the admin panel is now a section Ip Restrict.\nIt contains multiple subsections from which only Rule allows to create new objects.\nThe other subsections are only an overview.\n\nAll of these subsections contain a test utility for checking arbitary pathes and ips\n\nRule pathes like `.*` can be used to match for the whole project.\n\nRules are evalutated like a waterfall:\nthe lowest position to the highest position. State disabled rules are skipped\n\nNote: ipv4 and ipv6 rules are not interoperable. If the network does not match they are skipped like if they are in state \"disabled\".\n\n#### ratelimits\n\nratelimits can be specified or a rule can be made to a ratelimit matcher (called programmatically via django-fast-ratelimit)\n\nIn the last case it is possible to provide the rate \"inherit\" for using the rate specified in the django-fast-ratelimit call.\n\nIf no rate was passed, ratelimits with rate \"inherit\" will be ignored\n\n### programmatically\n\nThe rule names can be used for the django-fast-ratelimit adapter if RuleRatelimitGroups are defined and active. When some are defined the rule isn't used anymore in normal matching but only in apply_iprestrict.\n\nNote: deactivated RuleRatelimitGroups still prevent the normal mode, the RuleRatelimitGroups have to be deleted to revert to the normal matching\n\n```python\n\nimport django_fast_ratelimit as ratelimit\n\nr = ratelimit.get_ratelimit(key=\"django_fast_iprestrict.apply_iprestrict\", group=\"groupname\")\n\n# since django-fast-ratelimit 7.3, rate is not required anymore for older versions add stub rate\n# Note: stub rates like 0/s will still raise Disabled\n# Note: 1/s is used as the default rate for django-fast-ratelimit 8.0.0. This way rates can be passed to iprestrict\nr = ratelimit.get_ratelimit(key=\"django_fast_iprestrict.apply_iprestrict\", group=\"groupname\", rate=\"1/s\")\n\n# or when only checking ips and not pathes (when pathes are available)\n\nr = ratelimit.get_ratelimit(key=\"django_fast_iprestrict.apply_iprestrict:ignore_pathes\", group=\"groupname\")\n\n# or when only checking ips and not pathes (when pathes are available) and requiring rule\nr = ratelimit.get_ratelimit(key=\"django_fast_iprestrict.apply_iprestrict:ignore_pathes,require_rule\", group=\"groupname\")\n\n# tuple/array syntax\nr = ratelimit.get_ratelimit(key=[\"django_fast_iprestrict.apply_iprestrict\", \"ignore_pathes\", \"require_rule\"], group=\"groupname\")\n\n# and now reset, regardless of the action in RatelimitAction, limitation: RESET_EPOCH only works when epoch is request\nratelimit.get_ratelimit(key=\"django_fast_iprestrict.apply_iprestrict\", group=\"groupname\", rate=\"1/s\", action=ratelimit.Action.RESET)\n\n\n# or as decorator with rule requirement\n@ratelimit.decorate(key=\"django_fast_iprestrict.apply_iprestrict:require_rule\", group=\"groupname\")\ndef foo(request):\n    return \"\"\n\n\n```\n\nThe following arguments are valid:\n\n-   `default_action:allow/deny`: overwrite global default action when no rule was found, overwrites `no_execute` default behaviour\n-   `ignore_pathes`: match only via ip\n-   `require_rule`: raise Disabled if rule with rulename not exist\n-   `no_count` former `execute_only`: only decorate request, evaluate matching iprestrict rule action, wait and block, don't modify the ratelimit counter, for two-phased execution models\n-   `no_execute` former `count_only`: don't apply wait and block, update the counter only when rule exists. If no `default_action` argument was specified return only 0 (allowed) and decorate request, for two-phased execution models\n\nNote: when the request is already annotated with a ratelimit with the same decorate_name both instances are merged\n\nNote: you can provide a rate and set the field rate in iprestrict ratelimit to \"inherit\" for using the provided rate, this works only when a rate is specified\n\nNote: when using with reset, both options are automatically set. Limitation: RESET_EPOCH only works when epoch is the request (default)\n\n#### two phased execution model\n\nEspecially with async code it can be handy to have two phases:\n\nan execution phase in which only wait/block is executed and the counter not modified. Its place is before an expensive function.\nThe most common place is a decorator in urls. `no_count` argument\n\na count phase in which the ratelimit counter in cache is modified. Its place is after/in an expensive function.\nIn case of invariants or if the calculated result should not be wasted, no actions are executed. `no_execute` argument\n\nviews.py:\n\n```python\nimport django_fast_ratelimit as ratelimit\nfrom django.views import View\nfrom django.http.import HttpResponse\n\nclass MyView(View):\n    def get(self, request):\n        # without count only\n        ratelimit.get_ratelimit(key=\"django_fast_iprestrict.apply_iprestrict\", groups=\"rulename\", request=request)\n        return HttpResponse(b\"foo\", status=200)\n    def post(self, request):\n        # expensive function\n        ratelimit.get_ratelimit(key=\"django_fast_iprestrict.apply_iprestrict:no_execute\", groups=\"rulename\", request=request)\n        return HttpResponse(b\"foo\", status=200)\n\n\n```\n\nurls.py:\n\n```python\nimport django_fast_ratelimit as ratelimit\nfrom .views import MyView\n\nurlpatterns = [\n    path(\n        \"foo/\",\n        ratelimit.decorate(key=\"django_fast_iprestrict.apply_iprestrict:no_count\", groups=\"rulename\")(MyView.as_view()),\n    ),\n]\n\n```\n\n#### really lowlevel (without ratelimit)\n\nThere are currently 3 matching methods of interest\n\n```python\nfrom django_fast_iprestrict.models import Rule, RulePath\n\n\nRule.objects.match_ip(ip=\"someip\")\nRule.objects.match_all_ip(ip=\"someip\")\nRulePath.objects.match_ip_and_path(ip=\"someip\", path=\"/foo\")\n\n```\n\nNote: the matching methods have much more arguments. See in source for details\n\nYou might want to ignore the generic argument of match_ip and match_all_ip, it is dangerous as it ignores disabled rules\nand can easily lead to lock outs\n\n#### thirdparty integration (really deep lowlevel)\n\nAll of the models have managed_fields attribute. It is a list and only a list is valid. You can add field names you want to lockdown.\nThis cannot be overwritten by GUI. It is for the integration in thirdparty software, so nobody can do bad things or even delete.\n\nNote: you should either call clean or ensure that all list entries are field names\n\nNote: when using one of \"ratelimits\", \"ratelimit_groups\", \"networks\", \"pathes\", \"sources\" (fields to attached inline models)\nonly the creation and deletion is blocked. To lock the inline models further down, add fields to managed_fields.\n\nThere is one field which cannot be locked: \"position\"\n\n### Sources (GEOIP)\n\nFor GEOIP or other stuff sources can be used.\n\nSources are functions with prefixes in IPRESTRICT_ALLOWED_FN_PREFIXES (can also be the whole function).\n\nRestriction: \"\\_\" prefixed functions are not allowed\n\nThey are referenced in admin with their path, e.g.:\n\n`tests.test_basic.test_iprestrict_gen` (=also working example in dev environment with test_settings)\n\n### Ratelimits\n\nratelimits require the companion library django-fast-ratelimit. And they work only with it! Otherwise crashes are preprogrammed\n\nRatelimit keys are either the default builtin functions or functions with prefixes in IPRESTRICT_ALLOWED_FN_PREFIXES\n\n## behaviour\n\n### ipv4 ipv6\n\nmapped ipv4 addresses are extracted to plain ipv4 addresses.\nNetworks only match if their type is matching to the ip. Therefor IPv4 networks will be ignored when checking an IPv6 address\n\n### catch alls\n\nWhen a rule has neither an active network, source nor path it is treated as a catch all for match_ip. This means it resolves for every ip.\n\nA such catch all is not used for path checks. When a path is added to the catch all the behaviour changes:\n\nwhen the path matches and no network nor source is attached to the rule, it resolves without an ip check.\n\nThis allows a path catch all with a path like:\n`.*` with is_regex set\n\n## settings\n\nIPRESTRICT_ALLOWED_FN_PREFIXES: defaults to [] (empty list)\nIPRESTRICT_CACHE: select cache, defaults to \"default\" cache\nIPRESTRICT_KEY_PREFIX: cache key prefix, defaults to \"fip:\"\nIPRESTRICT_SOURCE_FORCE_EXPIRE: force expire sources via extra cache entry, for dangling caches; defaults to True\nIPRESTRICT_DEFAULT_ACTION: \"allow\"/\"deny\" : default action when no rule matches, default, when unset is \"allow\". \"allow\" or unset is strongly recommended except you want to set the rules programmatically\nIPRESTRICT_TRUSTED_PROXIES: set list of trusted proxies\nRATELIMIT_TRUSTED_PROXIES: fallback when IPRESTRICT_TRUSTED_PROXIES is unset\nIPRESTRICT_TESTCLIENT_FALLBACK: fallback for the string testclient in the ip field. Dev setting for tests\nRATELIMIT_TESTCLIENT_FALLBACK: fallback when IPRESTRICT_TESTCLIENT_FALLBACK is unset\n\nThe ratelimit settings are fallbacks, so when set the settings is applied for django-fast-ratelimit and django-fast-iprestrict (handy shortcut).\n\nNote: when using ratelimit the ratelimit settings are used for ratelimits, they can differ when not using the fallback\n\nNote: when disabling the setting IPRESTRICT_SOURCE_FORCE_EXPIRE and using sources make sure you clear the cache at project restart. E.g. in Docker start file or restart the cache server too\nOtherwise old entries sometimes doesn't expire and can cause stale sources (hard to detect)\n\n## commands\n\niprestrict_clear_caches: clear caches in use by iprestrict and ratelimit, kills other entries in the cache too\n\niprestrict_unrestrict_all: disable all rules, clear caches in use by iprestrict and ratelimit, kills other entries in the cache too (should only be used in emergencies)\n\n## development\n\na development environment can be setup this way (poetry is recommended):\n\n```sh\n# installation then\npoetry run ./manage.py createsuperuser\npoetry run ./manage.py runserver\n\n```\n\n# notable changes\n\n-   0.18: rename execute_only to no_count and count_only to no_execute. The former names are still valid for the string array/string based call but deprecated\n    the ratelimit reset action causes both options to be set and resets keys regardless of the action specified in RuleRatelimit\n-   0.13: add RuleRatelimitGroup for explicitly use Rules with ratelimit. No longer just match the rule name\n\n# TODO\n\n-   extend lockout check for ratelimits (e.g. disabled is raised)\n-   lockout check for RulePath and RuleNetwork change lists, so list_editable can be enabled\n-   localization?\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Restrict access to django project to trusted ips and optionally apply ratelimits. Like WAF in django.",
    "version": "0.19.6",
    "project_urls": {
        "Homepage": "https://github.com/devkral/django-fast-iprestrict",
        "Repository": "https://github.com/devkral/django-fast-iprestrict"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "11f3a7d2f44b78795f56e2af092a644e8716633d0e87241f99917f77c945d294",
                "md5": "d88829f980b71b66479eb0280f0a42ee",
                "sha256": "e7c493dc26f2ce49ed44051bbfa6d24ad1f8445b1057f7afdb90782730f902a0"
            },
            "downloads": -1,
            "filename": "django_fast_iprestrict-0.19.6-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "d88829f980b71b66479eb0280f0a42ee",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": "<4.0,>=3.9",
            "size": 34172,
            "upload_time": "2024-07-02T13:47:11",
            "upload_time_iso_8601": "2024-07-02T13:47:11.200707Z",
            "url": "https://files.pythonhosted.org/packages/11/f3/a7d2f44b78795f56e2af092a644e8716633d0e87241f99917f77c945d294/django_fast_iprestrict-0.19.6-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "abf8e5105c1a6e6c5147aea55a3d7fc5bd604368d09989cca69d79edcba640b3",
                "md5": "d59282f28e1e456b30240e2d2f12c421",
                "sha256": "4ee8a787bfd554c63bb94e93fd2ecbab39bfbae05c277319a740e3867204f056"
            },
            "downloads": -1,
            "filename": "django_fast_iprestrict-0.19.6.tar.gz",
            "has_sig": false,
            "md5_digest": "d59282f28e1e456b30240e2d2f12c421",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": "<4.0,>=3.9",
            "size": 27973,
            "upload_time": "2024-07-02T13:47:13",
            "upload_time_iso_8601": "2024-07-02T13:47:13.550637Z",
            "url": "https://files.pythonhosted.org/packages/ab/f8/e5105c1a6e6c5147aea55a3d7fc5bd604368d09989cca69d79edcba640b3/django_fast_iprestrict-0.19.6.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-07-02 13:47:13",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "devkral",
    "github_project": "django-fast-iprestrict",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "tox": true,
    "lcname": "django-fast-iprestrict"
}
        
Elapsed time: 0.73440s