Visual DSL framework for django

Overview
travis-ci codecov codeclimate readthedocs MIT license python versions django versions pypi versions pypi versions status gitter

Preface

Processes change more often than technic. Domain Rules are situational and may differ from customer to customer. With diverse code and frequent changes, the code becomes complicated, then the probability of errors increases. One of the optimal strategies to avoid this situation is to isolate client logic at the data level. When this is the case, programmers need only to watch the correct interpretation of the rules, but not each of the rules separately. This reduces the amount of code base needed and reduces the possibility of introducing errors. Another question is the form of the description of these rules takes. A visual graphical representation is optimal for users – this helps to avoid confusion with a variety of conditions, and helps users understand what is written without any effort. Many web applications need to use Domain Specific Languages (DSL) during their lifecycle. Any type of project, from hobby-level to enterprise, may have this requirement. There are many ways to carry out this task, such as doing your own development using internal resources or contractors (you know the cost in both cases), buying a turnkey solution, (really?) or an adapted solution. In all cases, you will also need to be a coach for all DSL users.

Stop now and focus your attention here. The Blockly visual programming library was released in 2012, and since 2014 it has been developed with the support of Google. Code.org, a related project that uses Blockly in its main subsystems, has had hundreds of millions of users of different ages in its Hour of Code project. These users started as young as elementary school, and very quickly learned how to program using the amazing Blockly library. Even top universities teach block-based coding (e.g., Berkeley, Harvard). But Blockly is not just a trainer or a toy. It is suitable for serious tasks: form processing, workflows, reporting, email marketing, bots, tests, surveys, quizzes and many other purposes.

The django-business-logic library tries to utilise the block programming approach to delegate programming tasks to non-programmers by implementing a framework for creating and working with Visual Domain Specific Languages.

The library comes with:

  • pretty easy integration: minor changes in INSTALLED_APPS and root urlconf
  • support of many types of built-in django model fields: all numeric, boolean, string, foreign keys
  • logical division into interface/program/version: firstly define an "interface" object which is just a named set of django models and its fields; after you can create one or more named "programs" which implements the given interface and than release any number of the program's "versions"
  • easy invocation injecting of visually edited code: a few strings in your code, at any place - a view controller, signal handler, asynchronous task, no matter the monolith or microservice
  • dropdown controls with custom model object list; you need only register your custom models in the standard django admin interface
  • ability to easily integrate and make accessible to the visual editor two types of python functions: imported (from python built-in, third-party or your own module) and editable through django admin
  • easy to understand Blockly-based log viewer with the ability to inspect intermediate values

Do not forget that this library is not designed with professional developers in mind, so the interface may look ugly and awkward in a professional developer’s eyes. Try to disengage from this feeling. Think like a human who gets panicked when seeing (our lovely) code with obscure brackets, odd commas, strange arrows, and so on. We, the development part of the team, can help our teammates from other departments to do more. Let’s bring the spirit of our successful sprints and fun development rooms to colleagues from management, marketing, sales, logistics and many others.

Library home

https://github.com/dgk/django-business-logic/

Documentation

https://django-business-logic.readthedocs.io/en/latest/

Support us

Any feedback and github stars would be greatly appreciated.

Please feel free to ask any questions in the gitter chat

If you are familiar with react/mobx and want to help to build django-business-logic library (next generation frontend code is here), please contact me [email protected].

License

MIT license

Comments
  • Add license scan report and status

    Add license scan report and status

    Your FOSSA integration was successful! Attached in this PR is a badge and license report to track scan status in your README.

    Below are docs for integrating FOSSA license checks into your CI:

    opened by fossabot 2
  • Hi all!

    Hi all!

    I was just raving the web when I found this new Django module.

    Could it help for letting my website users create their own business logic? Or what is it?

    opened by gabn88 2
  • Bump jquery from 3.1.1 to 3.4.1 in /frontend

    Bump jquery from 3.1.1 to 3.4.1 in /frontend

    Bumps jquery from 3.1.1 to 3.4.1.

    Commits
    • 75f7e96 3.4.1
    • 7dddb19 Core: Make isAttached work with iOS 10.0-10.2
    • 6c1e7db Event: Prevent leverageNative from registering duplicate dummy handlers
    • 24d71ac Event: Fix handling of multiple async focus events
    • b4fadc9 Build: Test on Node.js 12, stop testing on Node.js 6 & 11
    • 0d4af52 Build: Fix unresolved jQuery reference in finalPropName
    • 22caea8 Build: Updating the 3.4-stable version to 3.4.1-pre
    • 59ea765 Release: update AUTHORS.txt
    • 7c1ef15 Release: update version to 3.4.0-pre
    • d940bc0 Build: Update Sizzle from 2.3.3 to 2.3.4
    • Additional commits viewable in compare view

    Dependabot compatibility score

    Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


    Dependabot commands and options

    You can trigger Dependabot actions by commenting on this PR:

    • @dependabot rebase will rebase this PR
    • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
    • @dependabot merge will merge this PR after your CI passes on it
    • @dependabot squash and merge will squash and merge this PR after your CI passes on it
    • @dependabot cancel merge will cancel a previously requested merge and block automerging
    • @dependabot reopen will reopen this PR if it is closed
    • @dependabot ignore this [patch|minor|major] version will close this PR and stop Dependabot creating any more for this minor/major version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
    • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
    • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
    • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

    You can disable automated security fix PRs for this repo from the Security Alerts page.

    dependencies 
    opened by dependabot[bot] 1
  • Bump lodash from 4.16.4 to 4.17.15 in /frontend

    Bump lodash from 4.16.4 to 4.17.15 in /frontend

    Bumps lodash from 4.16.4 to 4.17.15.

    Commits

    Dependabot compatibility score

    Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


    Dependabot commands and options

    You can trigger Dependabot actions by commenting on this PR:

    • @dependabot rebase will rebase this PR
    • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
    • @dependabot merge will merge this PR after your CI passes on it
    • @dependabot squash and merge will squash and merge this PR after your CI passes on it
    • @dependabot cancel merge will cancel a previously requested merge and block automerging
    • @dependabot reopen will reopen this PR if it is closed
    • @dependabot ignore this [patch|minor|major] version will close this PR and stop Dependabot creating any more for this minor/major version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
    • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
    • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
    • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

    You can disable automated security fix PRs for this repo from the Security Alerts page.

    dependencies 
    opened by dependabot[bot] 1
  • Fix for Whitenoice 4.0 on Heroku

    Fix for Whitenoice 4.0 on Heroku

    Hello.

    I tried to deploy your demo project to Heroku, but the new version of whiteghost need some changes on configuration.

    I think this may be helpful.

    opened by marc-queiroz 1
  • Dev test envs

    Dev test envs

    Салют! Вынес базовый settings в sites. Оставил в dev/test только отличия от него.

    Добавил nosetest и отчёты

    Перенёс reqs(base, dev, test) в setup.py, а в самих файлах req[...].txt -- ссылки на setup

    opened by vlfedotov 1
  • [Snyk] Fix for 2 vulnerable dependencies

    [Snyk] Fix for 2 vulnerable dependencies

    Description

    This PR fixes one or more vulnerable packages in the npm dependencies of this project. See the Snyk test report for more details.

    Snyk Project: dgk/django-business-logic:frontend/package.json

    Snyk Organization: dgk

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • frontend/package.json

    Vulnerabilities that will be fixed

    With an upgrade:

    You can read more about Snyk's upgrade and patch logic in Snyk's documentation.

    Check the changes in this PR to ensure they won't cause issues with your project.

    Stay secure, The Snyk team

    Note: You are seeing this because you or someone else with access to this repository has authorised Snyk to open Fix PRs. To review the settings for this Snyk project please go to the project settings page.

    opened by snyk-bot 0
  • Fix

    Fix "Complexity" issue in business_logic/models/node.py

    Cyclomatic complexity is too high in method interpret. (19)

    https://codeclimate.com/github/dgk/django-business-logic/business_logic/models/node.py#issue_59f0460a7f6ee9000100004e

    codeclimate 
    opened by dgk 0
  • Fix

    Fix "Similar code" issue in business_logic/blockly/parse.py

    Similar code found in 1 other location (mass = 37)

    https://codeclimate.com/github/dgk/django-business-logic/business_logic/blockly/parse.py#issue_59f03ef74de2500001000047

    codeclimate 
    opened by dgk 0
  • Fix

    Fix "Similar code" issue in business_logic/blockly/build.py

    Similar code found in 1 other location (mass = 33)

    https://codeclimate.com/github/dgk/django-business-logic/business_logic/blockly/build.py#issue_59f03aa0ea76c70001000048

    codeclimate 
    opened by dgk 0
  • Fix

    Fix "Similar code" issue in business_logic/rest/views.py

    Similar code found in 2 other locations (mass = 41)

    https://codeclimate.com/github/dgk/django-business-logic/business_logic/rest/views.py#issue_59f0379851f1ba0001000041

    codeclimate 
    opened by dgk 0
  • [Snyk] Security upgrade django from 2.2.28 to 3.2.15

    [Snyk] Security upgrade django from 2.2.28 to 3.2.15

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt
    ⚠️ Warning
    django-admin-sortable2 0.7.4 has requirement Django<3,>=1.8, but you have Django 3.2.16.
    
    

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- critical severity | 776/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 9.1 | SQL Injection
    SNYK-PYTHON-DJANGO-2940618 | django:
    2.2.28 -> 3.2.15
    | No | Proof of Concept high severity | 564/1000
    Why? Has a fix available, CVSS 7 | Reflected File Download (RFD)
    SNYK-PYTHON-DJANGO-2968205 | django:
    2.2.28 -> 3.2.15
    | No | No Known Exploit

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 SQL Injection

    opened by dgk 0
  • [Snyk] Security upgrade django from 2.2.28 to 3.2.15

    [Snyk] Security upgrade django from 2.2.28 to 3.2.15

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt
    ⚠️ Warning
    django-admin-sortable2 0.7.4 has requirement Django<3,>=1.8, but you have Django 3.2.16.
    
    

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- critical severity | 776/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 9.1 | SQL Injection
    SNYK-PYTHON-DJANGO-2940618 | django:
    2.2.28 -> 3.2.15
    | No | Proof of Concept high severity | 564/1000
    Why? Has a fix available, CVSS 7 | Reflected File Download (RFD)
    SNYK-PYTHON-DJANGO-2968205 | django:
    2.2.28 -> 3.2.15
    | No | No Known Exploit

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 SQL Injection

    opened by dgk 0
  • [Snyk] Security upgrade django from 2.2.28 to 3.2.15

    [Snyk] Security upgrade django from 2.2.28 to 3.2.15

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt
    ⚠️ Warning
    django-admin-sortable2 0.7.4 has requirement Django<3,>=1.8, but you have Django 3.2.16.
    
    

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- critical severity | 776/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 9.1 | SQL Injection
    SNYK-PYTHON-DJANGO-2940618 | django:
    2.2.28 -> 3.2.15
    | No | Proof of Concept high severity | 564/1000
    Why? Has a fix available, CVSS 7 | Reflected File Download (RFD)
    SNYK-PYTHON-DJANGO-2968205 | django:
    2.2.28 -> 3.2.15
    | No | No Known Exploit

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 SQL Injection

    opened by dgk 0
  • [Snyk] Security upgrade django from 2.2.28 to 3.2.15

    [Snyk] Security upgrade django from 2.2.28 to 3.2.15

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt
    ⚠️ Warning
    django-admin-sortable2 0.7.4 has requirement Django<3,>=1.8, but you have Django 3.2.15.
    
    

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- critical severity | 776/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 9.1 | SQL Injection
    SNYK-PYTHON-DJANGO-2940618 | django:
    2.2.28 -> 3.2.15
    | No | Proof of Concept high severity | 564/1000
    Why? Has a fix available, CVSS 7 | Reflected File Download (RFD)
    SNYK-PYTHON-DJANGO-2968205 | django:
    2.2.28 -> 3.2.15
    | No | No Known Exploit

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 SQL Injection

    opened by dgk 0
  • [Snyk] Security upgrade django from 2.2.28 to 3.2.15

    [Snyk] Security upgrade django from 2.2.28 to 3.2.15

    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt
    ⚠️ Warning
    django-admin-sortable2 0.7.4 has requirement Django<3,>=1.8, but you have Django 3.2.15.
    
    

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 636/1000
    Why? Recently disclosed, Has a fix available, CVSS 7 | Reflected File Download (RFD)
    SNYK-PYTHON-DJANGO-2968205 | django:
    2.2.28 -> 3.2.15
    | No | No Known Exploit

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the effected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade django from 2.2.28 to 3.2.14

    [Snyk] Security upgrade django from 2.2.28 to 3.2.14

    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt
    ⚠️ Warning
    django-admin-sortable2 0.7.4 has requirement Django<3,>=1.8, but you have Django 3.2.14.
    
    

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- critical severity | 741/1000
    Why? Recently disclosed, Has a fix available, CVSS 9.1 | SQL Injection
    SNYK-PYTHON-DJANGO-2940618 | django:
    2.2.28 -> 3.2.14
    | No | No Known Exploit

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the effected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 SQL Injection

    opened by snyk-bot 0
Releases(0.3.3)
Django API creation with signed requests utilizing forms for validation.

django-formapi Create JSON API:s with HMAC authentication and Django form-validation. Version compatibility See Travis-CI page for actual test results

5 Monkeys 34 Apr 04, 2022
Basic Form Web Development using Python, Django and CSS

thebookrain Basic Form Web Development using Python, Django and CSS This is a basic project that contains two forms - borrow and donate. The form data

Ananya Dhulipala 1 Nov 27, 2021
Location field and widget for Django. It supports Google Maps, OpenStreetMap and Mapbox

django-location-field Let users pick locations using a map widget and store its latitude and longitude. Stable version: django-location-field==2.1.0 D

Caio Ariede 481 Dec 29, 2022
Basic implementation of Razorpay payment gateway 💳 with Django

Razorpay Payment Integration in Django 💥 In this project Razorpay payment gateway 💳 is integrated with Django by breaking down the whole process int

ScaleReal 12 Dec 12, 2022
Analytics services for Django projects

django-analytical The django-analytical application integrates analytics services into a Django project. Using an analytics service with a Django proj

Jazzband 1.1k Dec 31, 2022
Django-Text-to-HTML-converter - The simple Text to HTML Converter using Django framework

Django-Text-to-HTML-converter This is the simple Text to HTML Converter using Dj

Nikit Singh Kanyal 6 Oct 09, 2022
Quick example of a todo list application using Django and HTMX

django-htmx-todo-list Quick example of a todo list application using Django and HTMX Background Modified & expanded from https://github.com/jaredlockh

Jack Linke 54 Dec 10, 2022
A pickled object field for Django

django-picklefield About django-picklefield provides an implementation of a pickled object field. Such fields can contain any picklable objects. The i

Gintautas Miliauskas 167 Oct 18, 2022
xsendfile etc wrapper

Django Sendfile This is a wrapper around web-server specific methods for sending files to web clients. This is useful when Django needs to check permi

John Montgomery 476 Dec 01, 2022
Tutorial para o projeto negros.dev - A Essência do Django

Negros Dev Tutorial para o site negros.dev Este projeto foi feito com: Python 3.8.9 Django 3.1.8 Bootstrap 4.0 Como rodar o projeto? Clone esse reposi

Regis Santos 6 Aug 12, 2022
Simple reproduction of connection leak with celery/django/gevent

Redis connection leak with celery/django/gevent Reproduces celery issue at https://github.com/celery/celery/issues/6819 using gevented django web serv

2 Apr 03, 2022
Django datatables and widgets, both AJAX and traditional. Display-only ModelForms.

Django datatables and widgets, both AJAX and traditional. Display-only ModelForms. ModelForms / inline formsets with AJAX submit and validation. Works with Django templates.

Dmitriy Sintsov 132 Dec 14, 2022
Yet another Django audit log app, hopefully the simplest one.

django-easy-audit Yet another Django audit log app, hopefully the easiest one. This app allows you to keep track of every action taken by your users.

Natán 510 Jan 02, 2023
TinyMCE integration for Django

django-tinymce django-tinymce is a Django application that contains a widget to render a form field as a TinyMCE editor. Quickstart Install django-tin

Jazzband 1.1k Dec 26, 2022
Returns unicode slugs

Python Slugify A Python slugify application that handles unicode. Overview Best attempt to create slugs from unicode strings while keeping it DRY. Not

Val Neekman (AvidCoder) 1.3k Dec 23, 2022
Let AngularJS play well with Django

django-angular Let Django play well with AngularJS What does it offer? Add AngularJS directives to Django Forms. This allows to handle client side for

Jacob Rief 1.2k Dec 27, 2022
Add a help desk or knowledge base to your Django project with only a few lines of boilerplate code.

This project is no longer maintained. If you are interested in taking over the project, email Zapier 487 Dec 06, 2022

CRUD with MySQL, Django and Sass.

CRUD with MySQL, Django and Sass. To have the same data in db: insert into crud_employee (first_name, last_name, email, phone, location, university) v

Luis Quiñones Requelme 1 Nov 19, 2021
Get inside your stronghold and make all your Django views default login_required

Stronghold Get inside your stronghold and make all your Django views default login_required Stronghold is a very small and easy to use django app that

Mike Grouchy 384 Nov 23, 2022
A Django app for working with BTCPayServer

btcpay-django A Django app for working with BTCPayServer Installation pip install btcpay-django Developers Release To cut a release, run bumpversion,

Crawford 3 Nov 20, 2022