tutor/requirements/base.txt

75 lines
1.4 KiB
Plaintext
Raw Normal View History

#
# This file is autogenerated by pip-compile with python 3.8
# To update, run:
#
2020-01-13 21:33:12 +00:00
# pip-compile requirements/base.in
#
appdirs==1.4.4
# via -r requirements/base.in
cachetools==4.2.4
# via google-auth
certifi==2021.10.8
# via
# kubernetes
# requests
charset-normalizer==2.0.7
# via requests
click==8.0.3
# via -r requirements/base.in
google-auth==2.3.1
# via kubernetes
idna==3.3
# via requests
jinja2==3.0.2
# via -r requirements/base.in
kubernetes==18.20.0
# via -r requirements/base.in
markupsafe==2.0.1
# via jinja2
feat: migrate to plugins.v1 with filters & actions This is a very large refactoring which aims at making Tutor both more extendable and more generic. Historically, the Tutor plugin system was designed as an ad-hoc solution to allow developers to modify their own Open edX platforms without having to fork Tutor. The plugin API was simple, but limited, because of its ad-hoc nature. As a consequence, there were many things that plugin developers could not do, such as extending different parts of the CLI or adding custom template filters. Here, we refactor the whole codebase to make use of a generic plugin system. This system was inspired by the Wordpress plugin API and the Open edX "hooks and filters" API. The various components are added to a small core thanks to a set of actions and filters. Actions are callback functions that can be triggered at different points of the application lifecycle. Filters are functions that modify some data. Both actions and filters are collectively named as "hooks". Hooks can optionally be created within a certain context, which makes it easier to keep track of which application created which callback. This new hooks system allows us to provide a Python API that developers can use to extend their applications. The API reference is added to the documentation, along with a new plugin development tutorial. The plugin v0 API remains supported for backward compatibility of existing plugins. Done: - Do not load commands from plugins which are not enabled. - Load enabled plugins once on start. - Implement contexts for actions and filters, which allow us to keep track of the source of every hook. - Migrate patches - Migrate commands - Migrate plugin detection - Migrate templates_root - Migrate config - Migrate template environment globals and filters - Migrate hooks to tasks - Generate hook documentation - Generate patch reference documentation - Add the concept of action priority Close #499.
2022-02-07 17:11:43 +00:00
mypy==0.942
# via -r requirements/base.in
mypy-extensions==0.4.3
# via mypy
oauthlib==3.1.1
# via requests-oauthlib
pyasn1==0.4.8
# via
# pyasn1-modules
# rsa
pyasn1-modules==0.2.8
# via google-auth
pycryptodome==3.11.0
# via -r requirements/base.in
python-dateutil==2.8.2
# via kubernetes
pyyaml==6.0
# via
# -r requirements/base.in
# kubernetes
requests==2.26.0
# via
# kubernetes
# requests-oauthlib
requests-oauthlib==1.3.0
# via kubernetes
rsa==4.7.2
# via google-auth
six==1.16.0
# via
# google-auth
# kubernetes
# python-dateutil
tomli==2.0.1
# via mypy
typing-extensions==3.10.0.2
# via mypy
urllib3==1.26.7
# via
# kubernetes
# requests
websocket-client==1.2.1
# via kubernetes
# The following packages are considered to be unsafe in a requirements file:
# setuptools