From dfc77637ea5c1aa81caa72b1cf900e6931d61b54 Mon Sep 17 00:00:00 2001
From: Simon Charette
Date: Sat, 3 Feb 2024 10:54:51 -0500
Subject: [PATCH 001/316] Fixed #35162 -- Fixed crash when adding fields with
db_default on MySQL.
MySQL doesn't allow literal DEFAULT values to be used for BLOB, TEXT,
GEOMETRY or JSON columns and requires expression to be used instead.
Regression in 7414704e88d73dafbcfbb85f9bc54cb6111439d3.
---
django/db/backends/base/schema.py | 6 +++++-
docs/releases/5.0.2.txt | 4 ++++
tests/schema/tests.py | 13 +++++++++++++
3 files changed, 22 insertions(+), 1 deletion(-)
diff --git a/django/db/backends/base/schema.py b/django/db/backends/base/schema.py
index 242083b850..dad3f8d916 100644
--- a/django/db/backends/base/schema.py
+++ b/django/db/backends/base/schema.py
@@ -412,7 +412,11 @@ class BaseDatabaseSchemaEditor:
"""Return the sql and params for the field's database default."""
from django.db.models.expressions import Value
- sql = "%s" if isinstance(field.db_default, Value) else "(%s)"
+ sql = (
+ self._column_default_sql(field)
+ if isinstance(field.db_default, Value)
+ else "(%s)"
+ )
query = Query(model=field.model)
compiler = query.get_compiler(connection=self.connection)
default_sql, params = compiler.compile(field.db_default)
diff --git a/docs/releases/5.0.2.txt b/docs/releases/5.0.2.txt
index 64ffcb88bd..a385fbd13e 100644
--- a/docs/releases/5.0.2.txt
+++ b/docs/releases/5.0.2.txt
@@ -32,3 +32,7 @@ Bugfixes
* Fixed a regression in Django 5.0 that caused the ``request_finished`` signal to
sometimes not be fired when running Django through an ASGI server, resulting
in potential resource leaks (:ticket:`35059`).
+
+* Fixed a bug in Django 5.0 that caused a migration crash on MySQL when adding
+ a ``BinaryField``, ``TextField``, ``JSONField``, or ``GeometryField`` with a
+ ``db_default`` (:ticket:`35162`).
diff --git a/tests/schema/tests.py b/tests/schema/tests.py
index 3a026281bd..cde3d7f991 100644
--- a/tests/schema/tests.py
+++ b/tests/schema/tests.py
@@ -2303,6 +2303,19 @@ class SchemaTests(TransactionTestCase):
columns = self.column_classes(Author)
self.assertEqual(columns["birth_year"][1].default, "1988")
+ @isolate_apps("schema")
+ def test_add_text_field_with_db_default(self):
+ class Author(Model):
+ description = TextField(db_default="(missing)")
+
+ class Meta:
+ app_label = "schema"
+
+ with connection.schema_editor() as editor:
+ editor.create_model(Author)
+ columns = self.column_classes(Author)
+ self.assertIn("(missing)", columns["description"][1].default)
+
@skipUnlessDBFeature(
"supports_column_check_constraints", "can_introspect_check_constraints"
)
From fe1cb62f5c3f87fafc4a6b52fee2ccc6c80c41e2 Mon Sep 17 00:00:00 2001
From: Simon Charette
Date: Sat, 3 Feb 2024 01:10:41 -0500
Subject: [PATCH 002/316] Refs #35149 -- Made equivalent db_default alterations
noops.
This allows for an easier transition of preserving the literal nature of
non-compilable db_default.
---
django/db/backends/base/schema.py | 8 ++++++++
tests/schema/tests.py | 17 +++++++++++++++++
2 files changed, 25 insertions(+)
diff --git a/django/db/backends/base/schema.py b/django/db/backends/base/schema.py
index dad3f8d916..ed91c6ab1b 100644
--- a/django/db/backends/base/schema.py
+++ b/django/db/backends/base/schema.py
@@ -1640,6 +1640,14 @@ class BaseDatabaseSchemaEditor:
):
old_kwargs.pop("to", None)
new_kwargs.pop("to", None)
+ # db_default can take many form but result in the same SQL.
+ if (
+ old_kwargs.get("db_default")
+ and new_kwargs.get("db_default")
+ and self.db_default_sql(old_field) == self.db_default_sql(new_field)
+ ):
+ old_kwargs.pop("db_default")
+ new_kwargs.pop("db_default")
return self.quote_name(old_field.column) != self.quote_name(
new_field.column
) or (old_path, old_args, old_kwargs) != (new_path, new_args, new_kwargs)
diff --git a/tests/schema/tests.py b/tests/schema/tests.py
index cde3d7f991..04ad299aa6 100644
--- a/tests/schema/tests.py
+++ b/tests/schema/tests.py
@@ -2316,6 +2316,23 @@ class SchemaTests(TransactionTestCase):
columns = self.column_classes(Author)
self.assertIn("(missing)", columns["description"][1].default)
+ @isolate_apps("schema")
+ def test_db_default_equivalent_sql_noop(self):
+ class Author(Model):
+ name = TextField(db_default=Value("foo"))
+
+ class Meta:
+ app_label = "schema"
+
+ with connection.schema_editor() as editor:
+ editor.create_model(Author)
+
+ new_field = TextField(db_default="foo")
+ new_field.set_attributes_from_name("name")
+ new_field.model = Author
+ with connection.schema_editor() as editor, self.assertNumQueries(0):
+ editor.alter_field(Author, Author._meta.get_field("name"), new_field)
+
@skipUnlessDBFeature(
"supports_column_check_constraints", "can_introspect_check_constraints"
)
From e67d7d70fa10c06aca36b9057f82054eda45269d Mon Sep 17 00:00:00 2001
From: Simon Charette
Date: Sun, 28 Jan 2024 12:02:33 -0500
Subject: [PATCH 003/316] Fixed #35149 -- Fixed crashes of db_default with
unresolvable output field.
Field.db_default accepts either literal Python values or compilables
(as_sql) and wrap the former ones in Value internally.
While 1e38f11 added support for automatic resolving of output fields for
types such as str, int, float, and other unambigous ones it's cannot do
so for all types such as dict or even contrib.postgres and contrib.gis
primitives.
When a literal, non-compilable, value is provided it likely make the
most sense to bind its output field to the field its attached to avoid
forcing the user to provide an explicit `Value(output_field)`.
Thanks David Sanders for the report.
---
django/db/backends/base/schema.py | 7 +++----
django/db/models/fields/__init__.py | 21 +++++++++++++--------
docs/releases/5.0.2.txt | 5 +++++
tests/migrations/test_autodetector.py | 4 ++--
tests/migrations/test_operations.py | 12 ++++++------
tests/schema/tests.py | 21 +++++++++++++++++++++
6 files changed, 50 insertions(+), 20 deletions(-)
diff --git a/django/db/backends/base/schema.py b/django/db/backends/base/schema.py
index ed91c6ab1b..f442d290a0 100644
--- a/django/db/backends/base/schema.py
+++ b/django/db/backends/base/schema.py
@@ -412,14 +412,13 @@ class BaseDatabaseSchemaEditor:
"""Return the sql and params for the field's database default."""
from django.db.models.expressions import Value
+ db_default = field._db_default_expression
sql = (
- self._column_default_sql(field)
- if isinstance(field.db_default, Value)
- else "(%s)"
+ self._column_default_sql(field) if isinstance(db_default, Value) else "(%s)"
)
query = Query(model=field.model)
compiler = query.get_compiler(connection=self.connection)
- default_sql, params = compiler.compile(field.db_default)
+ default_sql, params = compiler.compile(db_default)
if self.connection.features.requires_literal_defaults:
# Some databases doesn't support parameterized defaults (Oracle,
# SQLite). If this is the case, the individual schema backend
diff --git a/django/db/models/fields/__init__.py b/django/db/models/fields/__init__.py
index 5186f0c414..cc5025af84 100644
--- a/django/db/models/fields/__init__.py
+++ b/django/db/models/fields/__init__.py
@@ -219,12 +219,6 @@ class Field(RegisterLookupMixin):
self.remote_field = rel
self.is_relation = self.remote_field is not None
self.default = default
- if db_default is not NOT_PROVIDED and not hasattr(
- db_default, "resolve_expression"
- ):
- from django.db.models.expressions import Value
-
- db_default = Value(db_default)
self.db_default = db_default
self.editable = editable
self.serialize = serialize
@@ -408,7 +402,7 @@ class Field(RegisterLookupMixin):
continue
connection = connections[db]
- if not getattr(self.db_default, "allowed_default", False) and (
+ if not getattr(self._db_default_expression, "allowed_default", False) and (
connection.features.supports_expression_defaults
):
msg = f"{self.db_default} cannot be used in db_default."
@@ -994,7 +988,7 @@ class Field(RegisterLookupMixin):
from django.db.models.expressions import DatabaseDefault
if isinstance(value, DatabaseDefault):
- return self.db_default
+ return self._db_default_expression
return value
def get_prep_value(self, value):
@@ -1047,6 +1041,17 @@ class Field(RegisterLookupMixin):
return return_None
return str # return empty string
+ @cached_property
+ def _db_default_expression(self):
+ db_default = self.db_default
+ if db_default is not NOT_PROVIDED and not hasattr(
+ db_default, "resolve_expression"
+ ):
+ from django.db.models.expressions import Value
+
+ db_default = Value(db_default, self)
+ return db_default
+
def get_choices(
self,
include_blank=True,
diff --git a/docs/releases/5.0.2.txt b/docs/releases/5.0.2.txt
index a385fbd13e..6312dee312 100644
--- a/docs/releases/5.0.2.txt
+++ b/docs/releases/5.0.2.txt
@@ -36,3 +36,8 @@ Bugfixes
* Fixed a bug in Django 5.0 that caused a migration crash on MySQL when adding
a ``BinaryField``, ``TextField``, ``JSONField``, or ``GeometryField`` with a
``db_default`` (:ticket:`35162`).
+
+* Fixed a bug in Django 5.0 that caused a migration crash on models with a
+ literal ``db_default`` of a complex type such as ``dict`` instance of a
+ ``JSONField``. Running ``makemigrations`` might generate no-op ``AlterField``
+ operations for fields using ``db_default`` (:ticket:`35149`).
diff --git a/tests/migrations/test_autodetector.py b/tests/migrations/test_autodetector.py
index c54349313e..340805b259 100644
--- a/tests/migrations/test_autodetector.py
+++ b/tests/migrations/test_autodetector.py
@@ -1309,7 +1309,7 @@ class AutodetectorTests(BaseAutodetectorTests):
changes, "testapp", 0, 0, name="name", preserve_default=True
)
self.assertOperationFieldAttributes(
- changes, "testapp", 0, 0, db_default=models.Value("Ada Lovelace")
+ changes, "testapp", 0, 0, db_default="Ada Lovelace"
)
@mock.patch(
@@ -1515,7 +1515,7 @@ class AutodetectorTests(BaseAutodetectorTests):
changes, "testapp", 0, 0, name="name", preserve_default=True
)
self.assertOperationFieldAttributes(
- changes, "testapp", 0, 0, db_default=models.Value("Ada Lovelace")
+ changes, "testapp", 0, 0, db_default="Ada Lovelace"
)
@mock.patch(
diff --git a/tests/migrations/test_operations.py b/tests/migrations/test_operations.py
index 5733ba7618..f25bb290a5 100644
--- a/tests/migrations/test_operations.py
+++ b/tests/migrations/test_operations.py
@@ -1581,7 +1581,7 @@ class OperationTests(OperationTestBase):
self.assertEqual(len(new_state.models[app_label, "pony"].fields), 6)
field = new_state.models[app_label, "pony"].fields["height"]
self.assertEqual(field.default, models.NOT_PROVIDED)
- self.assertEqual(field.db_default, Value(4))
+ self.assertEqual(field.db_default, 4)
project_state.apps.get_model(app_label, "pony").objects.create(weight=4)
self.assertColumnNotExists(table_name, "height")
# Add field.
@@ -1632,7 +1632,7 @@ class OperationTests(OperationTestBase):
self.assertEqual(len(new_state.models[app_label, "pony"].fields), 6)
field = new_state.models[app_label, "pony"].fields["special_char"]
self.assertEqual(field.default, models.NOT_PROVIDED)
- self.assertEqual(field.db_default, Value(db_default))
+ self.assertEqual(field.db_default, db_default)
self.assertColumnNotExists(table_name, "special_char")
with connection.schema_editor() as editor:
operation.database_forwards(
@@ -1700,7 +1700,7 @@ class OperationTests(OperationTestBase):
self.assertEqual(len(new_state.models[app_label, "pony"].fields), 6)
field = new_state.models[app_label, "pony"].fields["height"]
self.assertEqual(field.default, 3)
- self.assertEqual(field.db_default, Value(4))
+ self.assertEqual(field.db_default, 4)
pre_pony_pk = (
project_state.apps.get_model(app_label, "pony").objects.create(weight=4).pk
)
@@ -2145,7 +2145,7 @@ class OperationTests(OperationTestBase):
old_weight = project_state.models[app_label, "pony"].fields["weight"]
self.assertIs(old_weight.db_default, models.NOT_PROVIDED)
new_weight = new_state.models[app_label, "pony"].fields["weight"]
- self.assertEqual(new_weight.db_default, Value(4.5))
+ self.assertEqual(new_weight.db_default, 4.5)
with self.assertRaises(IntegrityError), transaction.atomic():
project_state.apps.get_model(app_label, "pony").objects.create()
# Alter field.
@@ -2187,7 +2187,7 @@ class OperationTests(OperationTestBase):
self.assertIs(old_pink.db_default, models.NOT_PROVIDED)
new_pink = new_state.models[app_label, "pony"].fields["pink"]
self.assertIs(new_pink.default, models.NOT_PROVIDED)
- self.assertEqual(new_pink.db_default, Value(4))
+ self.assertEqual(new_pink.db_default, 4)
pony = project_state.apps.get_model(app_label, "pony").objects.create(weight=1)
self.assertEqual(pony.pink, 3)
# Alter field.
@@ -2217,7 +2217,7 @@ class OperationTests(OperationTestBase):
old_green = project_state.models[app_label, "pony"].fields["green"]
self.assertIs(old_green.db_default, models.NOT_PROVIDED)
new_green = new_state.models[app_label, "pony"].fields["green"]
- self.assertEqual(new_green.db_default, Value(4))
+ self.assertEqual(new_green.db_default, 4)
old_pony = project_state.apps.get_model(app_label, "pony").objects.create(
weight=1
)
diff --git a/tests/schema/tests.py b/tests/schema/tests.py
index 04ad299aa6..ced3367f00 100644
--- a/tests/schema/tests.py
+++ b/tests/schema/tests.py
@@ -7,6 +7,7 @@ from unittest import mock
from django.core.exceptions import FieldError
from django.core.management.color import no_style
+from django.core.serializers.json import DjangoJSONEncoder
from django.db import (
DatabaseError,
DataError,
@@ -2333,6 +2334,26 @@ class SchemaTests(TransactionTestCase):
with connection.schema_editor() as editor, self.assertNumQueries(0):
editor.alter_field(Author, Author._meta.get_field("name"), new_field)
+ @isolate_apps("schema")
+ def test_db_default_output_field_resolving(self):
+ class Author(Model):
+ data = JSONField(
+ encoder=DjangoJSONEncoder,
+ db_default={
+ "epoch": datetime.datetime(1970, 1, 1, tzinfo=datetime.timezone.utc)
+ },
+ )
+
+ class Meta:
+ app_label = "schema"
+
+ with connection.schema_editor() as editor:
+ editor.create_model(Author)
+
+ author = Author.objects.create()
+ author.refresh_from_db()
+ self.assertEqual(author.data, {"epoch": "1970-01-01T00:00:00Z"})
+
@skipUnlessDBFeature(
"supports_column_check_constraints", "can_introspect_check_constraints"
)
From a47de0d6cd440d4515ede48df8335d91d7ac7793 Mon Sep 17 00:00:00 2001
From: shivaramkumar
Date: Mon, 5 Feb 2024 05:36:32 +0100
Subject: [PATCH 004/316] Changed severity levels to list in security policy
docs.
---
docs/internals/security.txt | 26 +++++++++++++-------------
1 file changed, 13 insertions(+), 13 deletions(-)
diff --git a/docs/internals/security.txt b/docs/internals/security.txt
index 373012b707..55300b01e1 100644
--- a/docs/internals/security.txt
+++ b/docs/internals/security.txt
@@ -84,24 +84,24 @@ upcoming security release, as well as the severity of the issues. This is to
aid organizations that need to ensure they have staff available to handle
triaging our announcement and upgrade Django as needed. Severity levels are:
-**High**:
+* **High**
-* Remote code execution
-* SQL injection
+ * Remote code execution
+ * SQL injection
-**Moderate**:
+* **Moderate**
-* Cross site scripting (XSS)
-* Cross site request forgery (CSRF)
-* Denial-of-service attacks
-* Broken authentication
+ * Cross site scripting (XSS)
+ * Cross site request forgery (CSRF)
+ * Denial-of-service attacks
+ * Broken authentication
-**Low**:
+* **Low**
-* Sensitive data exposure
-* Broken session management
-* Unvalidated redirects/forwards
-* Issues requiring an uncommon configuration option
+ * Sensitive data exposure
+ * Broken session management
+ * Unvalidated redirects/forwards
+ * Issues requiring an uncommon configuration option
Second, we notify a list of :ref:`people and organizations
`, primarily composed of operating-system vendors and
From 02a600ff67f7b106cdcab22310bacea98c1a26ba Mon Sep 17 00:00:00 2001
From: Ben Cail
Date: Wed, 15 Nov 2023 14:32:03 -0500
Subject: [PATCH 005/316] Fixed #16281 -- Fixed
ContentType.get_object_for_this_type() in a multiple database setup.
---
django/contrib/contenttypes/fields.py | 4 +-
django/contrib/contenttypes/models.py | 6 +--
docs/ref/contrib/contenttypes.txt | 9 ++++-
tests/admin_views/models.py | 3 ++
tests/admin_views/test_multidb.py | 53 +++++++++++++++++++++++++++
tests/multiple_database/tests.py | 28 ++++++++++++++
6 files changed, 97 insertions(+), 6 deletions(-)
diff --git a/django/contrib/contenttypes/fields.py b/django/contrib/contenttypes/fields.py
index 1b6abb9818..ce731bf2dd 100644
--- a/django/contrib/contenttypes/fields.py
+++ b/django/contrib/contenttypes/fields.py
@@ -280,7 +280,9 @@ class GenericForeignKey(FieldCacheMixin):
if ct_id is not None:
ct = self.get_content_type(id=ct_id, using=instance._state.db)
try:
- rel_obj = ct.get_object_for_this_type(pk=pk_val)
+ rel_obj = ct.get_object_for_this_type(
+ using=instance._state.db, pk=pk_val
+ )
except ObjectDoesNotExist:
pass
self.set_cached_value(instance, rel_obj)
diff --git a/django/contrib/contenttypes/models.py b/django/contrib/contenttypes/models.py
index 0d98ed3a4d..4f16e6eb69 100644
--- a/django/contrib/contenttypes/models.py
+++ b/django/contrib/contenttypes/models.py
@@ -174,20 +174,20 @@ class ContentType(models.Model):
except LookupError:
return None
- def get_object_for_this_type(self, **kwargs):
+ def get_object_for_this_type(self, using=None, **kwargs):
"""
Return an object of this type for the keyword arguments given.
Basically, this is a proxy around this object_type's get_object() model
method. The ObjectNotExist exception, if thrown, will not be caught,
so code that calls this method should catch it.
"""
- return self.model_class()._base_manager.using(self._state.db).get(**kwargs)
+ return self.model_class()._base_manager.using(using).get(**kwargs)
def get_all_objects_for_this_type(self, **kwargs):
"""
Return all objects of this type for the keyword arguments given.
"""
- return self.model_class()._base_manager.using(self._state.db).filter(**kwargs)
+ return self.model_class()._base_manager.filter(**kwargs)
def natural_key(self):
return (self.app_label, self.model)
diff --git a/docs/ref/contrib/contenttypes.txt b/docs/ref/contrib/contenttypes.txt
index 71feee63e0..fa44679659 100644
--- a/docs/ref/contrib/contenttypes.txt
+++ b/docs/ref/contrib/contenttypes.txt
@@ -106,13 +106,18 @@ methods that allow you to get from a
:class:`~django.contrib.contenttypes.models.ContentType` instance to the
model it represents, or to retrieve objects from that model:
-.. method:: ContentType.get_object_for_this_type(**kwargs)
+.. method:: ContentType.get_object_for_this_type(using=None, **kwargs)
Takes a set of valid :ref:`lookup arguments ` for the
model the :class:`~django.contrib.contenttypes.models.ContentType`
represents, and does
:meth:`a get() lookup `
- on that model, returning the corresponding object.
+ on that model, returning the corresponding object. The ``using`` argument
+ can be used to specify a different database than the default one.
+
+ .. versionchanged:: 5.1
+
+ The ``using`` argument was added.
.. method:: ContentType.model_class()
diff --git a/tests/admin_views/models.py b/tests/admin_views/models.py
index bd2dc65d2e..341e5aaed0 100644
--- a/tests/admin_views/models.py
+++ b/tests/admin_views/models.py
@@ -83,6 +83,9 @@ class Book(models.Model):
def __str__(self):
return self.name
+ def get_absolute_url(self):
+ return f"/books/{self.id}/"
+
class Promo(models.Model):
name = models.CharField(max_length=100, verbose_name="¿Name?")
diff --git a/tests/admin_views/test_multidb.py b/tests/admin_views/test_multidb.py
index d868321a4b..654161e11d 100644
--- a/tests/admin_views/test_multidb.py
+++ b/tests/admin_views/test_multidb.py
@@ -2,6 +2,8 @@ from unittest import mock
from django.contrib import admin
from django.contrib.auth.models import User
+from django.contrib.contenttypes.models import ContentType
+from django.http import HttpResponse
from django.test import TestCase, override_settings
from django.urls import path, reverse
@@ -23,8 +25,15 @@ class Router:
site = admin.AdminSite(name="test_adminsite")
site.register(Book)
+
+def book(request, book_id):
+ b = Book.objects.get(id=book_id)
+ return HttpResponse(b.title)
+
+
urlpatterns = [
path("admin/", site.urls),
+ path("books//", book),
]
@@ -88,3 +97,47 @@ class MultiDatabaseTests(TestCase):
{"post": "yes"},
)
mock.atomic.assert_called_with(using=db)
+
+
+class ViewOnSiteRouter:
+ def db_for_read(self, model, instance=None, **hints):
+ if model._meta.app_label in {"auth", "sessions", "contenttypes"}:
+ return "default"
+ return "other"
+
+ def db_for_write(self, model, **hints):
+ if model._meta.app_label in {"auth", "sessions", "contenttypes"}:
+ return "default"
+ return "other"
+
+ def allow_relation(self, obj1, obj2, **hints):
+ return obj1._state.db in {"default", "other"} and obj2._state.db in {
+ "default",
+ "other",
+ }
+
+ def allow_migrate(self, db, app_label, **hints):
+ return True
+
+
+@override_settings(ROOT_URLCONF=__name__, DATABASE_ROUTERS=[ViewOnSiteRouter()])
+class ViewOnSiteTests(TestCase):
+ databases = {"default", "other"}
+
+ def test_contenttype_in_separate_db(self):
+ ContentType.objects.using("other").all().delete()
+ book = Book.objects.using("other").create(name="other book")
+ user = User.objects.create_superuser(
+ username="super", password="secret", email="super@example.com"
+ )
+
+ book_type = ContentType.objects.get(app_label="admin_views", model="book")
+
+ self.client.force_login(user)
+
+ shortcut_url = reverse("admin:view_on_site", args=(book_type.pk, book.id))
+ response = self.client.get(shortcut_url, follow=False)
+ self.assertEqual(response.status_code, 302)
+ self.assertRegex(
+ response.url, f"http://(testserver|example.com)/books/{book.id}/"
+ )
diff --git a/tests/multiple_database/tests.py b/tests/multiple_database/tests.py
index 337ebae75e..9587030a46 100644
--- a/tests/multiple_database/tests.py
+++ b/tests/multiple_database/tests.py
@@ -1302,6 +1302,34 @@ class QueryTestCase(TestCase):
title="Dive into Water", published=datetime.date(2009, 5, 4), extra_arg=True
)
+ @override_settings(DATABASE_ROUTERS=["multiple_database.tests.TestRouter"])
+ def test_contenttype_in_separate_db(self):
+ ContentType.objects.using("other").all().delete()
+ book_other = Book.objects.using("other").create(
+ title="Test title other", published=datetime.date(2009, 5, 4)
+ )
+ book_default = Book.objects.using("default").create(
+ title="Test title default", published=datetime.date(2009, 5, 4)
+ )
+ book_type = ContentType.objects.using("default").get(
+ app_label="multiple_database", model="book"
+ )
+
+ book = book_type.get_object_for_this_type(title=book_other.title)
+ self.assertEqual(book, book_other)
+ book = book_type.get_object_for_this_type(using="other", title=book_other.title)
+ self.assertEqual(book, book_other)
+
+ with self.assertRaises(Book.DoesNotExist):
+ book_type.get_object_for_this_type(title=book_default.title)
+ book = book_type.get_object_for_this_type(
+ using="default", title=book_default.title
+ )
+ self.assertEqual(book, book_default)
+
+ all_books = book_type.get_all_objects_for_this_type()
+ self.assertCountEqual(all_books, [book_other])
+
class ConnectionRouterTestCase(SimpleTestCase):
@override_settings(
From d70b79c6b90c8a9657c6bf7f6eca6f3f9424bb45 Mon Sep 17 00:00:00 2001
From: Tim Graham
Date: Mon, 5 Feb 2024 07:18:53 -0500
Subject: [PATCH 006/316] Replaced "Django test runner" with DiscoverRunner in
release notes.
Removed mention of options supported only by runtests.py.
---
docs/releases/3.0.txt | 10 ++--------
docs/releases/3.1.txt | 4 ++--
docs/releases/4.0.txt | 7 +++----
docs/releases/4.1.txt | 5 +++--
docs/releases/5.0.txt | 5 +++--
docs/releases/5.1.txt | 3 ---
6 files changed, 13 insertions(+), 21 deletions(-)
diff --git a/docs/releases/3.0.txt b/docs/releases/3.0.txt
index 4dfb6aae5a..eb043710c1 100644
--- a/docs/releases/3.0.txt
+++ b/docs/releases/3.0.txt
@@ -362,14 +362,8 @@ Tests
references, and entity references that refer to the same character as
equivalent.
-* Django test runner now supports headless mode for selenium tests on supported
- browsers. Add the ``--headless`` option to enable this mode.
-
-* Django test runner now supports ``--start-at`` and ``--start-after`` options
- to run tests starting from a specific top-level module.
-
-* Django test runner now supports a ``--pdb`` option to spawn a debugger at
- each error or failure.
+* :class:`~django.test.runner.DiscoverRunner` can now spawn a debugger at each
+ error or failure using the :option:`test --pdb` option.
.. _backwards-incompatible-3.0:
diff --git a/docs/releases/3.1.txt b/docs/releases/3.1.txt
index 0b13fc37d2..a872326200 100644
--- a/docs/releases/3.1.txt
+++ b/docs/releases/3.1.txt
@@ -475,8 +475,8 @@ Tests
* The new :setting:`MIGRATE ` test database setting allows
disabling of migrations during a test database creation.
-* Django test runner now supports a :option:`test --buffer` option to discard
- output for passing tests.
+* :class:`~django.test.runner.DiscoverRunner` can now discard output for
+ passing tests using the :option:`test --buffer` option.
* :class:`~django.test.runner.DiscoverRunner` now skips running the system
checks on databases not :ref:`referenced by tests`.
diff --git a/docs/releases/4.0.txt b/docs/releases/4.0.txt
index 05f199e4fe..8fb11451a6 100644
--- a/docs/releases/4.0.txt
+++ b/docs/releases/4.0.txt
@@ -367,8 +367,7 @@ Tests
serialized to allow usage of the
:ref:`serialized_rollback ` feature.
-* Django test runner now supports a :option:`--buffer ` option
- with parallel tests.
+* The :option:`test --buffer` option now supports parallel tests.
* The new ``logger`` argument to :class:`~django.test.runner.DiscoverRunner`
allows a Python :py:ref:`logger ` to be used for logging.
@@ -376,8 +375,8 @@ Tests
* The new :meth:`.DiscoverRunner.log` method provides a way to log messages
that uses the ``DiscoverRunner.logger``, or prints to the console if not set.
-* Django test runner now supports a :option:`--shuffle ` option
- to execute tests in a random order.
+* :class:`~django.test.runner.DiscoverRunner` can now execute tests in a random
+ order using the :option:`test --shuffle` option.
* The :option:`test --parallel` option now supports the value ``auto`` to run
one test process for each processor core.
diff --git a/docs/releases/4.1.txt b/docs/releases/4.1.txt
index c840db4a7f..3986774013 100644
--- a/docs/releases/4.1.txt
+++ b/docs/releases/4.1.txt
@@ -534,8 +534,9 @@ Miscellaneous
on the :class:`~django.db.models.Model` instance to which they belong. *This
change was reverted in Django 4.1.2.*
-* The Django test runner now returns a non-zero error code for unexpected
- successes from tests marked with :py:func:`unittest.expectedFailure`.
+* :class:`~django.test.runner.DiscoverRunner` now returns a non-zero error code
+ for unexpected successes from tests marked with
+ :py:func:`unittest.expectedFailure`.
* :class:`~django.middleware.csrf.CsrfViewMiddleware` no longer masks the CSRF
cookie like it does the CSRF token in the DOM.
diff --git a/docs/releases/5.0.txt b/docs/releases/5.0.txt
index a10c9d280a..303ee88078 100644
--- a/docs/releases/5.0.txt
+++ b/docs/releases/5.0.txt
@@ -432,8 +432,9 @@ Tests
* :class:`~django.test.AsyncClient` now supports the ``follow`` parameter.
-* The new :option:`test --durations` option allows showing the duration of the
- slowest tests on Python 3.12+.
+* :class:`~django.test.runner.DiscoverRunner` now allows showing the duration
+ of the slowest tests using the :option:`test --durations` option (available
+ on Python 3.12+).
Validators
~~~~~~~~~~
diff --git a/docs/releases/5.1.txt b/docs/releases/5.1.txt
index 3fefaa9f0e..1d014ceb21 100644
--- a/docs/releases/5.1.txt
+++ b/docs/releases/5.1.txt
@@ -280,9 +280,6 @@ Tests
:meth:`~django.test.SimpleTestCase.assertInHTML` assertions now add haystacks
to assertion error messages.
-* The Django test runner now supports a ``--screenshots`` option to save
- screenshots for Selenium tests.
-
* The :class:`~django.test.RequestFactory`,
:class:`~django.test.AsyncRequestFactory`, :class:`~django.test.Client`, and
:class:`~django.test.AsyncClient` classes now support the ``query_params``
From 4b1cd8edc10bb6c3da3a270180d028670a6f2110 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Alexander=20Lazarevi=C4=87?=
Date: Mon, 5 Feb 2024 13:25:44 +0100
Subject: [PATCH 007/316] Corrected cache_page()'s timeout value in
tests.generic_views.urls.
---
tests/generic_views/urls.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tests/generic_views/urls.py b/tests/generic_views/urls.py
index 2d5301d15e..277b2c4c1b 100644
--- a/tests/generic_views/urls.py
+++ b/tests/generic_views/urls.py
@@ -27,7 +27,7 @@ urlpatterns = [
),
path(
"template/cached//",
- cache_page(2.0)(TemplateView.as_view(template_name="generic_views/about.html")),
+ cache_page(2)(TemplateView.as_view(template_name="generic_views/about.html")),
),
path(
"template/extra_context/",
From 3580b47ed31ec85ae89b13618f36bb463e97acc8 Mon Sep 17 00:00:00 2001
From: Rinat Khabibiev
Date: Thu, 15 Sep 2016 08:41:07 +0300
Subject: [PATCH 008/316] Fixed #27225 -- Added "Age" header when fetching
cached responses.
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Co-Authored-By: Author: Alexander Lazarević
---
django/middleware/cache.py | 12 ++++++++++++
tests/cache/tests.py | 31 +++++++++++++++++++++++++++++++
2 files changed, 43 insertions(+)
diff --git a/django/middleware/cache.py b/django/middleware/cache.py
index 0fdffe1bbe..196b1995ff 100644
--- a/django/middleware/cache.py
+++ b/django/middleware/cache.py
@@ -43,6 +43,8 @@ More details about how the caching works:
"""
+import time
+
from django.conf import settings
from django.core.cache import DEFAULT_CACHE_ALIAS, caches
from django.utils.cache import (
@@ -53,6 +55,7 @@ from django.utils.cache import (
patch_response_headers,
)
from django.utils.deprecation import MiddlewareMixin
+from django.utils.http import parse_http_date_safe
class UpdateCacheMiddleware(MiddlewareMixin):
@@ -171,6 +174,15 @@ class FetchFromCacheMiddleware(MiddlewareMixin):
request._cache_update_cache = True
return None # No cache information available, need to rebuild.
+ # Derive the age estimation of the cached response.
+ if (max_age_seconds := get_max_age(response)) is not None and (
+ expires_timestamp := parse_http_date_safe(response["Expires"])
+ ) is not None:
+ now_timestamp = int(time.time())
+ remaining_seconds = expires_timestamp - now_timestamp
+ # Use Age: 0 if local clock got turned back.
+ response["Age"] = max(0, max_age_seconds - remaining_seconds)
+
# hit, return cached response
request._cache_update_cache = False
return response
diff --git a/tests/cache/tests.py b/tests/cache/tests.py
index e6ebb718f1..978efdd9d3 100644
--- a/tests/cache/tests.py
+++ b/tests/cache/tests.py
@@ -2752,6 +2752,37 @@ class CacheMiddlewareTest(SimpleTestCase):
self.assertIsNot(thread_caches[0], thread_caches[1])
+ def test_cache_control_max_age(self):
+ view = cache_page(2)(hello_world_view)
+ request = self.factory.get("/view/")
+
+ # First request. Freshly created response gets returned with no Age
+ # header.
+ with mock.patch.object(
+ time, "time", return_value=1468749600
+ ): # Sun, 17 Jul 2016 10:00:00 GMT
+ response = view(request, 1)
+ response.close()
+ self.assertIn("Expires", response)
+ self.assertEqual(response["Expires"], "Sun, 17 Jul 2016 10:00:02 GMT")
+ self.assertIn("Cache-Control", response)
+ self.assertEqual(response["Cache-Control"], "max-age=2")
+ self.assertNotIn("Age", response)
+
+ # Second request one second later. Response from the cache gets
+ # returned with an Age header set to 1 (second).
+ with mock.patch.object(
+ time, "time", return_value=1468749601
+ ): # Sun, 17 Jul 2016 10:00:01 GMT
+ response = view(request, 1)
+ response.close()
+ self.assertIn("Expires", response)
+ self.assertEqual(response["Expires"], "Sun, 17 Jul 2016 10:00:02 GMT")
+ self.assertIn("Cache-Control", response)
+ self.assertEqual(response["Cache-Control"], "max-age=2")
+ self.assertIn("Age", response)
+ self.assertEqual(response["Age"], "1")
+
@override_settings(
CACHE_MIDDLEWARE_KEY_PREFIX="settingsprefix",
From 4ade8386ebfeb7a781dc2b62542c1cf5f8b9ddaf Mon Sep 17 00:00:00 2001
From: Tom Carrick
Date: Tue, 4 Apr 2023 15:11:11 +0100
Subject: [PATCH 009/316] Fixed #10743 -- Allowed lookups for related fields in
ModelAdmin.list_display.
Co-authored-by: Alex Garcia
Co-authored-by: Natalia <124304+nessita@users.noreply.github.com>
Co-authored-by: Nina Menezes
---
AUTHORS | 2 ++
django/contrib/admin/checks.py | 28 +++++++--------
django/contrib/admin/utils.py | 38 ++++++++++++--------
django/contrib/admin/views/main.py | 14 +++++---
docs/ref/checks.txt | 6 ++--
docs/ref/contrib/admin/index.txt | 20 ++++++++---
docs/releases/5.1.txt | 3 +-
tests/admin_changelist/admin.py | 4 +++
tests/admin_changelist/models.py | 5 +++
tests/admin_changelist/tests.py | 58 ++++++++++++++++++++++++++++++
tests/admin_checks/tests.py | 23 ++++++++++++
tests/admin_utils/tests.py | 12 +++++++
tests/modeladmin/test_checks.py | 19 ++++++++--
13 files changed, 186 insertions(+), 46 deletions(-)
diff --git a/AUTHORS b/AUTHORS
index 8c903ff6c5..26cfe71138 100644
--- a/AUTHORS
+++ b/AUTHORS
@@ -44,6 +44,7 @@ answer newbie questions, and generally made Django that much better:
Albert Wang
Alcides Fonseca
Aldian Fazrihady
+ Alejandro García Ruiz de Oteiza
Aleksandra Sendecka
Aleksi Häkli
Alex Dutton
@@ -760,6 +761,7 @@ answer newbie questions, and generally made Django that much better:
Nicolas Noé
Nikita Marchant
Nikita Sobolev
+ Nina Menezes
Niran Babalola
Nis Jørgensen
Nowell Strite
diff --git a/django/contrib/admin/checks.py b/django/contrib/admin/checks.py
index aa43718cd6..c1a17af076 100644
--- a/django/contrib/admin/checks.py
+++ b/django/contrib/admin/checks.py
@@ -915,21 +915,19 @@ class ModelAdminChecks(BaseModelAdminChecks):
try:
field = getattr(obj.model, item)
except AttributeError:
- return [
- checks.Error(
- "The value of '%s' refers to '%s', which is not a "
- "callable, an attribute of '%s', or an attribute or "
- "method on '%s'."
- % (
- label,
- item,
- obj.__class__.__name__,
- obj.model._meta.label,
- ),
- obj=obj.__class__,
- id="admin.E108",
- )
- ]
+ try:
+ field = get_fields_from_path(obj.model, item)[-1]
+ except (FieldDoesNotExist, NotRelationField):
+ return [
+ checks.Error(
+ f"The value of '{label}' refers to '{item}', which is not "
+ f"a callable or attribute of '{obj.__class__.__name__}', "
+ "or an attribute, method, or field on "
+ f"'{obj.model._meta.label}'.",
+ obj=obj.__class__,
+ id="admin.E108",
+ )
+ ]
if (
getattr(field, "is_relation", False)
and (field.many_to_many or field.one_to_many)
diff --git a/django/contrib/admin/utils.py b/django/contrib/admin/utils.py
index 0bcf99ae85..c8e722bcc8 100644
--- a/django/contrib/admin/utils.py
+++ b/django/contrib/admin/utils.py
@@ -289,8 +289,8 @@ def lookup_field(name, obj, model_admin=None):
try:
f = _get_non_gfk_field(opts, name)
except (FieldDoesNotExist, FieldIsAForeignKeyColumnName):
- # For non-field values, the value is either a method, property or
- # returned via a callable.
+ # For non-regular field values, the value is either a method,
+ # property, related field, or returned via a callable.
if callable(name):
attr = name
value = attr(obj)
@@ -298,10 +298,17 @@ def lookup_field(name, obj, model_admin=None):
attr = getattr(model_admin, name)
value = attr(obj)
else:
- attr = getattr(obj, name)
+ sentinel = object()
+ attr = getattr(obj, name, sentinel)
if callable(attr):
value = attr()
else:
+ if attr is sentinel:
+ attr = obj
+ for part in name.split(LOOKUP_SEP):
+ attr = getattr(attr, part, sentinel)
+ if attr is sentinel:
+ return None, None, None
value = attr
if hasattr(model_admin, "model") and hasattr(model_admin.model, name):
attr = getattr(model_admin.model, name)
@@ -345,9 +352,10 @@ def label_for_field(name, model, model_admin=None, return_attr=False, form=None)
"""
Return a sensible label for a field name. The name can be a callable,
property (but not created with @property decorator), or the name of an
- object's attribute, as well as a model field. If return_attr is True, also
- return the resolved attribute (which could be a callable). This will be
- None if (and only if) the name refers to a field.
+ object's attribute, as well as a model field, including across related
+ objects. If return_attr is True, also return the resolved attribute
+ (which could be a callable). This will be None if (and only if) the name
+ refers to a field.
"""
attr = None
try:
@@ -371,15 +379,15 @@ def label_for_field(name, model, model_admin=None, return_attr=False, form=None)
elif form and name in form.fields:
attr = form.fields[name]
else:
- message = "Unable to lookup '%s' on %s" % (
- name,
- model._meta.object_name,
- )
- if model_admin:
- message += " or %s" % model_admin.__class__.__name__
- if form:
- message += " or %s" % form.__class__.__name__
- raise AttributeError(message)
+ try:
+ attr = get_fields_from_path(model, name)[-1]
+ except (FieldDoesNotExist, NotRelationField):
+ message = f"Unable to lookup '{name}' on {model._meta.object_name}"
+ if model_admin:
+ message += f" or {model_admin.__class__.__name__}"
+ if form:
+ message += f" or {form.__class__.__name__}"
+ raise AttributeError(message)
if hasattr(attr, "short_description"):
label = attr.short_description
diff --git a/django/contrib/admin/views/main.py b/django/contrib/admin/views/main.py
index 44001f00f9..d8fff50d18 100644
--- a/django/contrib/admin/views/main.py
+++ b/django/contrib/admin/views/main.py
@@ -30,6 +30,7 @@ from django.core.exceptions import (
)
from django.core.paginator import InvalidPage
from django.db.models import F, Field, ManyToOneRel, OrderBy
+from django.db.models.constants import LOOKUP_SEP
from django.db.models.expressions import Combinable
from django.urls import reverse
from django.utils.deprecation import RemovedInDjango60Warning
@@ -356,9 +357,9 @@ class ChangeList:
"""
Return the proper model field name corresponding to the given
field_name to use for ordering. field_name may either be the name of a
- proper model field or the name of a method (on the admin or model) or a
- callable with the 'admin_order_field' attribute. Return None if no
- proper model field name can be matched.
+ proper model field, possibly across relations, or the name of a method
+ (on the admin or model) or a callable with the 'admin_order_field'
+ attribute. Return None if no proper model field name can be matched.
"""
try:
field = self.lookup_opts.get_field(field_name)
@@ -371,7 +372,12 @@ class ChangeList:
elif hasattr(self.model_admin, field_name):
attr = getattr(self.model_admin, field_name)
else:
- attr = getattr(self.model, field_name)
+ try:
+ attr = getattr(self.model, field_name)
+ except AttributeError:
+ if LOOKUP_SEP in field_name:
+ return field_name
+ raise
if isinstance(attr, property) and hasattr(attr, "fget"):
attr = attr.fget
return getattr(attr, "admin_order_field", None)
diff --git a/docs/ref/checks.txt b/docs/ref/checks.txt
index f0eeaca268..cf0ab32efa 100644
--- a/docs/ref/checks.txt
+++ b/docs/ref/checks.txt
@@ -726,9 +726,9 @@ with the admin site:
* **admin.E106**: The value of ``.model`` must be a
``Model``.
* **admin.E107**: The value of ``list_display`` must be a list or tuple.
-* **admin.E108**: The value of ``list_display[n]`` refers to ````,
- which is not a callable, an attribute of ````, or an
- attribute or method on ````.
+* **admin.E108**: The value of ``list_display[n]`` refers to ````, which
+ is not a callable or attribute of ````, or an attribute,
+ method, or field on ````.
* **admin.E109**: The value of ``list_display[n]`` must not be a many-to-many
field or a reverse foreign key.
* **admin.E110**: The value of ``list_display_links`` must be a list, a tuple,
diff --git a/docs/ref/contrib/admin/index.txt b/docs/ref/contrib/admin/index.txt
index e85ba9c36a..e0e57b9fc0 100644
--- a/docs/ref/contrib/admin/index.txt
+++ b/docs/ref/contrib/admin/index.txt
@@ -315,9 +315,9 @@ subclass::
For more complex layout needs, see the :attr:`~ModelAdmin.fieldsets` option.
The ``fields`` option accepts the same types of values as
- :attr:`~ModelAdmin.list_display`, except that callables aren't accepted.
- Names of model and model admin methods will only be used if they're listed
- in :attr:`~ModelAdmin.readonly_fields`.
+ :attr:`~ModelAdmin.list_display`, except that callables and ``__`` lookups
+ for related fields aren't accepted. Names of model and model admin methods
+ will only be used if they're listed in :attr:`~ModelAdmin.readonly_fields`.
To display multiple fields on the same line, wrap those fields in their own
tuple. In this example, the ``url`` and ``title`` fields will display on the
@@ -565,7 +565,7 @@ subclass::
If you don't set ``list_display``, the admin site will display a single
column that displays the ``__str__()`` representation of each object.
- There are four types of values that can be used in ``list_display``. All
+ There are five types of values that can be used in ``list_display``. All
but the simplest may use the :func:`~django.contrib.admin.display`
decorator, which is used to customize how the field is presented:
@@ -574,6 +574,11 @@ subclass::
class PersonAdmin(admin.ModelAdmin):
list_display = ["first_name", "last_name"]
+ * The name of a related field, using the ``__`` notation. For example::
+
+ class PersonAdmin(admin.ModelAdmin):
+ list_display = ["city__name"]
+
* A callable that accepts one argument, the model instance. For example::
@admin.display(description="Name")
@@ -614,6 +619,11 @@ subclass::
class PersonAdmin(admin.ModelAdmin):
list_display = ["name", "decade_born_in"]
+ .. versionchanged:: 5.1
+
+ Support for using ``__`` lookups was added, when targeting related
+ fields.
+
A few special cases to note about ``list_display``:
* If the field is a ``ForeignKey``, Django will display the
@@ -831,7 +841,7 @@ subclass::
* Django will try to interpret every element of ``list_display`` in this
order:
- * A field of the model.
+ * A field of the model or from a related field.
* A callable.
* A string representing a ``ModelAdmin`` attribute.
* A string representing a model attribute.
diff --git a/docs/releases/5.1.txt b/docs/releases/5.1.txt
index 1d014ceb21..701d686532 100644
--- a/docs/releases/5.1.txt
+++ b/docs/releases/5.1.txt
@@ -32,7 +32,8 @@ Minor features
:mod:`django.contrib.admin`
~~~~~~~~~~~~~~~~~~~~~~~~~~~
-* ...
+* :attr:`.ModelAdmin.list_display` now supports using ``__`` lookups to list
+ fields from related models.
:mod:`django.contrib.admindocs`
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
diff --git a/tests/admin_changelist/admin.py b/tests/admin_changelist/admin.py
index 8ffc45e391..3e6009b0c5 100644
--- a/tests/admin_changelist/admin.py
+++ b/tests/admin_changelist/admin.py
@@ -53,6 +53,10 @@ class ChildAdmin(admin.ModelAdmin):
return super().get_queryset(request).select_related("parent")
+class GrandChildAdmin(admin.ModelAdmin):
+ list_display = ["name", "parent__name", "parent__parent__name"]
+
+
class CustomPaginationAdmin(ChildAdmin):
paginator = CustomPaginator
diff --git a/tests/admin_changelist/models.py b/tests/admin_changelist/models.py
index aa4656e93e..290a3ea4ec 100644
--- a/tests/admin_changelist/models.py
+++ b/tests/admin_changelist/models.py
@@ -19,6 +19,11 @@ class Child(models.Model):
age = models.IntegerField(null=True, blank=True)
+class GrandChild(models.Model):
+ parent = models.ForeignKey(Child, models.SET_NULL, editable=False, null=True)
+ name = models.CharField(max_length=30, blank=True)
+
+
class Genre(models.Model):
name = models.CharField(max_length=20)
diff --git a/tests/admin_changelist/tests.py b/tests/admin_changelist/tests.py
index b4739b572d..72fac8cd61 100644
--- a/tests/admin_changelist/tests.py
+++ b/tests/admin_changelist/tests.py
@@ -42,6 +42,7 @@ from .admin import (
EmptyValueChildAdmin,
EventAdmin,
FilteredChildAdmin,
+ GrandChildAdmin,
GroupAdmin,
InvitationAdmin,
NoListDisplayLinksParentAdmin,
@@ -61,6 +62,7 @@ from .models import (
CustomIdUser,
Event,
Genre,
+ GrandChild,
Group,
Invitation,
Membership,
@@ -1634,6 +1636,62 @@ class ChangeListTests(TestCase):
response, f'0 results (1 total )'
)
+ def test_list_display_related_field(self):
+ parent = Parent.objects.create(name="I am your father")
+ child = Child.objects.create(name="I am your child", parent=parent)
+ GrandChild.objects.create(name="I am your grandchild", parent=child)
+ request = self._mocked_authenticated_request("/grandchild/", self.superuser)
+
+ m = GrandChildAdmin(GrandChild, custom_site)
+ response = m.changelist_view(request)
+ self.assertContains(response, parent.name)
+ self.assertContains(response, child.name)
+
+ def test_list_display_related_field_null(self):
+ GrandChild.objects.create(name="I am parentless", parent=None)
+ request = self._mocked_authenticated_request("/grandchild/", self.superuser)
+
+ m = GrandChildAdmin(GrandChild, custom_site)
+ response = m.changelist_view(request)
+ self.assertContains(response, '- ')
+ self.assertContains(response, '- ')
+
+ def test_list_display_related_field_ordering(self):
+ parent_a = Parent.objects.create(name="Alice")
+ parent_z = Parent.objects.create(name="Zara")
+ Child.objects.create(name="Alice's child", parent=parent_a)
+ Child.objects.create(name="Zara's child", parent=parent_z)
+
+ class ChildAdmin(admin.ModelAdmin):
+ list_display = ["name", "parent__name"]
+ list_per_page = 1
+
+ m = ChildAdmin(Child, custom_site)
+
+ # Order ascending.
+ request = self._mocked_authenticated_request("/grandchild/?o=1", self.superuser)
+ response = m.changelist_view(request)
+ self.assertContains(response, parent_a.name)
+ self.assertNotContains(response, parent_z.name)
+
+ # Order descending.
+ request = self._mocked_authenticated_request(
+ "/grandchild/?o=-1", self.superuser
+ )
+ response = m.changelist_view(request)
+ self.assertNotContains(response, parent_a.name)
+ self.assertContains(response, parent_z.name)
+
+ def test_list_display_related_field_ordering_fields(self):
+ class ChildAdmin(admin.ModelAdmin):
+ list_display = ["name", "parent__name"]
+ ordering = ["parent__name"]
+
+ m = ChildAdmin(Child, custom_site)
+ request = self._mocked_authenticated_request("/", self.superuser)
+ cl = m.get_changelist_instance(request)
+ self.assertEqual(cl.get_ordering_field_columns(), {2: "asc"})
+
class GetAdminLogTests(TestCase):
def test_custom_user_pk_not_named_id(self):
diff --git a/tests/admin_checks/tests.py b/tests/admin_checks/tests.py
index d2d1eb219e..6ca5d6d925 100644
--- a/tests/admin_checks/tests.py
+++ b/tests/admin_checks/tests.py
@@ -1009,3 +1009,26 @@ class SystemChecksTestCase(SimpleTestCase):
self.assertEqual(errors, [])
finally:
Book._meta.apps.ready = True
+
+ def test_related_field_list_display(self):
+ class SongAdmin(admin.ModelAdmin):
+ list_display = ["pk", "original_release", "album__title"]
+
+ errors = SongAdmin(Song, AdminSite()).check()
+ self.assertEqual(errors, [])
+
+ def test_related_field_list_display_wrong_field(self):
+ class SongAdmin(admin.ModelAdmin):
+ list_display = ["pk", "original_release", "album__hello"]
+
+ errors = SongAdmin(Song, AdminSite()).check()
+ expected = [
+ checks.Error(
+ "The value of 'list_display[2]' refers to 'album__hello', which is not "
+ "a callable or attribute of 'SongAdmin', or an attribute, method, or "
+ "field on 'admin_checks.Song'.",
+ obj=SongAdmin,
+ id="admin.E108",
+ )
+ ]
+ self.assertEqual(errors, expected)
diff --git a/tests/admin_utils/tests.py b/tests/admin_utils/tests.py
index 067b47198d..56d46324e0 100644
--- a/tests/admin_utils/tests.py
+++ b/tests/admin_utils/tests.py
@@ -137,6 +137,7 @@ class UtilsTests(SimpleTestCase):
(simple_function, SIMPLE_FUNCTION),
("test_from_model", article.test_from_model()),
("non_field", INSTANCE_ATTRIBUTE),
+ ("site__domain", SITE_NAME),
)
mock_admin = MockModelAdmin()
@@ -294,6 +295,17 @@ class UtilsTests(SimpleTestCase):
self.assertEqual(label_for_field(lambda x: "nothing", Article), "--")
self.assertEqual(label_for_field("site_id", Article), "Site id")
+ # The correct name and attr are returned when `__` is in the field name.
+ self.assertEqual(label_for_field("site__domain", Article), "Site domain")
+ self.assertEqual(
+ label_for_field("site__domain", Article, return_attr=True),
+ ("Site domain", Site._meta.get_field("domain")),
+ )
+
+ def test_label_for_field_failed_lookup(self):
+ msg = "Unable to lookup 'site__unknown' on Article"
+ with self.assertRaisesMessage(AttributeError, msg):
+ label_for_field("site__unknown", Article)
class MockModelAdmin:
@admin.display(description="not Really the Model")
diff --git a/tests/modeladmin/test_checks.py b/tests/modeladmin/test_checks.py
index 73777f05ab..f767a6c92b 100644
--- a/tests/modeladmin/test_checks.py
+++ b/tests/modeladmin/test_checks.py
@@ -69,7 +69,7 @@ class RawIdCheckTests(CheckTestCase):
def test_missing_field(self):
class TestModelAdmin(ModelAdmin):
- raw_id_fields = ("non_existent_field",)
+ raw_id_fields = ["non_existent_field"]
self.assertIsInvalid(
TestModelAdmin,
@@ -602,8 +602,21 @@ class ListDisplayTests(CheckTestCase):
TestModelAdmin,
ValidationTestModel,
"The value of 'list_display[0]' refers to 'non_existent_field', "
- "which is not a callable, an attribute of 'TestModelAdmin', "
- "or an attribute or method on 'modeladmin.ValidationTestModel'.",
+ "which is not a callable or attribute of 'TestModelAdmin', "
+ "or an attribute, method, or field on 'modeladmin.ValidationTestModel'.",
+ "admin.E108",
+ )
+
+ def test_missing_related_field(self):
+ class TestModelAdmin(ModelAdmin):
+ list_display = ("band__non_existent_field",)
+
+ self.assertIsInvalid(
+ TestModelAdmin,
+ ValidationTestModel,
+ "The value of 'list_display[0]' refers to 'band__non_existent_field', "
+ "which is not a callable or attribute of 'TestModelAdmin', "
+ "or an attribute, method, or field on 'modeladmin.ValidationTestModel'.",
"admin.E108",
)
From 9cefdfc43f0bae696b56fa5a0bf22346f85affff Mon Sep 17 00:00:00 2001
From: Tom Carrick
Date: Thu, 16 Nov 2023 09:11:27 +0100
Subject: [PATCH 010/316] Refs #10743 -- Enabled ordering for lookups in
ModelAdmin.list_display.
Co-authored-by: Natalia <124304+nessita@users.noreply.github.com>
Co-authored-by: Nina Menezes
---
.../contrib/admin/templatetags/admin_list.py | 3 +-
tests/admin_changelist/admin.py | 5 +-
tests/admin_changelist/tests.py | 56 +++++++++++++++++++
3 files changed, 62 insertions(+), 2 deletions(-)
diff --git a/django/contrib/admin/templatetags/admin_list.py b/django/contrib/admin/templatetags/admin_list.py
index 0c32290b6c..fdf6e63f5f 100644
--- a/django/contrib/admin/templatetags/admin_list.py
+++ b/django/contrib/admin/templatetags/admin_list.py
@@ -18,6 +18,7 @@ from django.contrib.admin.views.main import (
)
from django.core.exceptions import ObjectDoesNotExist
from django.db import models
+from django.db.models.constants import LOOKUP_SEP
from django.template import Library
from django.template.loader import get_template
from django.templatetags.static import static
@@ -112,7 +113,7 @@ def result_headers(cl):
# Set ordering for attr that is a property, if defined.
if isinstance(attr, property) and hasattr(attr, "fget"):
admin_order_field = getattr(attr.fget, "admin_order_field", None)
- if not admin_order_field:
+ if not admin_order_field and LOOKUP_SEP not in field_name:
is_field_sortable = False
if not is_field_sortable:
diff --git a/tests/admin_changelist/admin.py b/tests/admin_changelist/admin.py
index 3e6009b0c5..349ef7d465 100644
--- a/tests/admin_changelist/admin.py
+++ b/tests/admin_changelist/admin.py
@@ -3,7 +3,7 @@ from django.contrib.auth.admin import UserAdmin
from django.contrib.auth.models import User
from django.core.paginator import Paginator
-from .models import Band, Child, Event, Parent, ProxyUser, Swallow
+from .models import Band, Child, Event, GrandChild, Parent, ProxyUser, Swallow
site = admin.AdminSite(name="admin")
@@ -57,6 +57,9 @@ class GrandChildAdmin(admin.ModelAdmin):
list_display = ["name", "parent__name", "parent__parent__name"]
+site.register(GrandChild, GrandChildAdmin)
+
+
class CustomPaginationAdmin(ChildAdmin):
paginator = CustomPaginator
diff --git a/tests/admin_changelist/tests.py b/tests/admin_changelist/tests.py
index 72fac8cd61..4f267635f1 100644
--- a/tests/admin_changelist/tests.py
+++ b/tests/admin_changelist/tests.py
@@ -2073,3 +2073,59 @@ class SeleniumTests(AdminSeleniumTestCase):
By.CSS_SELECTOR, "[data-filter-title='It\\'s OK']"
).get_attribute("open")
)
+
+ def test_list_display_ordering(self):
+ from selenium.webdriver.common.by import By
+
+ parent_a = Parent.objects.create(name="Parent A")
+ child_l = Child.objects.create(name="Child L", parent=None)
+ child_m = Child.objects.create(name="Child M", parent=parent_a)
+ GrandChild.objects.create(name="Grandchild X", parent=child_m)
+ GrandChild.objects.create(name="Grandchild Y", parent=child_l)
+ GrandChild.objects.create(name="Grandchild Z", parent=None)
+
+ self.admin_login(username="super", password="secret")
+ changelist_url = reverse("admin:admin_changelist_grandchild_changelist")
+ self.selenium.get(self.live_server_url + changelist_url)
+
+ def find_result_row_texts():
+ table = self.selenium.find_element(By.ID, "result_list")
+ # Drop header from the result list
+ return [row.text for row in table.find_elements(By.TAG_NAME, "tr")][1:]
+
+ def expected_from_queryset(qs):
+ return [
+ " ".join("-" if i is None else i for i in item)
+ for item in qs.values_list(
+ "name", "parent__name", "parent__parent__name"
+ )
+ ]
+
+ cases = [
+ # Order ascending by `name`.
+ ("th.sortable.column-name", ("name",)),
+ # Order descending by `name`.
+ ("th.sortable.column-name", ("-name",)),
+ # Order ascending by `parent__name`.
+ ("th.sortable.column-parent__name", ("parent__name", "-name")),
+ # Order descending by `parent__name`.
+ ("th.sortable.column-parent__name", ("-parent__name", "-name")),
+ # Order ascending by `parent__parent__name`.
+ (
+ "th.sortable.column-parent__parent__name",
+ ("parent__parent__name", "-parent__name", "-name"),
+ ),
+ # Order descending by `parent__parent__name`.
+ (
+ "th.sortable.column-parent__parent__name",
+ ("-parent__parent__name", "-parent__name", "-name"),
+ ),
+ ]
+ for css_selector, ordering in cases:
+ with self.subTest(ordering=ordering):
+ # self.selenium.get(self.live_server_url + changelist_url)
+ self.selenium.find_element(By.CSS_SELECTOR, css_selector).click()
+ expected = expected_from_queryset(
+ GrandChild.objects.all().order_by(*ordering)
+ )
+ self.assertEqual(find_result_row_texts(), expected)
From 55519d6cf8998fe4c8f5c8abffc2b10a7c3d14e9 Mon Sep 17 00:00:00 2001
From: Adam Johnson
Date: Mon, 22 Jan 2024 13:21:13 +0000
Subject: [PATCH 011/316] Fixed CVE-2024-24680 -- Mitigated potential DoS in
intcomma template filter.
Thanks Seokchan Yoon for the report.
Co-authored-by: Mariusz Felisiak
Co-authored-by: Natalia <124304+nessita@users.noreply.github.com>
Co-authored-by: Shai Berger
---
.../contrib/humanize/templatetags/humanize.py | 13 ++--
docs/releases/3.2.24.txt | 6 +-
docs/releases/4.2.10.txt | 6 +-
docs/releases/5.0.2.txt | 6 ++
tests/humanize_tests/tests.py | 64 +++++++++++++++++++
5 files changed, 87 insertions(+), 8 deletions(-)
diff --git a/django/contrib/humanize/templatetags/humanize.py b/django/contrib/humanize/templatetags/humanize.py
index 23224779c5..2c26f8944a 100644
--- a/django/contrib/humanize/templatetags/humanize.py
+++ b/django/contrib/humanize/templatetags/humanize.py
@@ -75,12 +75,13 @@ def intcomma(value, use_l10n=True):
return intcomma(value, False)
else:
return number_format(value, use_l10n=True, force_grouping=True)
- orig = str(value)
- new = re.sub(r"^(-?\d+)(\d{3})", r"\g<1>,\g<2>", orig)
- if orig == new:
- return new
- else:
- return intcomma(new, use_l10n)
+ result = str(value)
+ match = re.match(r"-?\d+", result)
+ if match:
+ prefix = match[0]
+ prefix_with_commas = re.sub(r"\d{3}", r"\g<0>,", prefix[::-1])[::-1]
+ result = prefix_with_commas + result[len(prefix) :]
+ return result
# A tuple of standard large number to their converters
diff --git a/docs/releases/3.2.24.txt b/docs/releases/3.2.24.txt
index 1ab7024f73..67be0f65d1 100644
--- a/docs/releases/3.2.24.txt
+++ b/docs/releases/3.2.24.txt
@@ -6,4 +6,8 @@ Django 3.2.24 release notes
Django 3.2.24 fixes a security issue with severity "moderate" in 3.2.23.
-...
+CVE-2024-24680: Potential denial-of-service in ``intcomma`` template filter
+===========================================================================
+
+The ``intcomma`` template filter was subject to a potential denial-of-service
+attack when used with very long strings.
diff --git a/docs/releases/4.2.10.txt b/docs/releases/4.2.10.txt
index c039f6840f..7cdfa69814 100644
--- a/docs/releases/4.2.10.txt
+++ b/docs/releases/4.2.10.txt
@@ -6,4 +6,8 @@ Django 4.2.10 release notes
Django 4.2.10 fixes a security issue with severity "moderate" in 4.2.9.
-...
+CVE-2024-24680: Potential denial-of-service in ``intcomma`` template filter
+===========================================================================
+
+The ``intcomma`` template filter was subject to a potential denial-of-service
+attack when used with very long strings.
diff --git a/docs/releases/5.0.2.txt b/docs/releases/5.0.2.txt
index 6312dee312..1da6dc02d9 100644
--- a/docs/releases/5.0.2.txt
+++ b/docs/releases/5.0.2.txt
@@ -7,6 +7,12 @@ Django 5.0.2 release notes
Django 5.0.2 fixes a security issue with severity "moderate" and several bugs
in 5.0.1. Also, the latest string translations from Transifex are incorporated.
+CVE-2024-24680: Potential denial-of-service in ``intcomma`` template filter
+===========================================================================
+
+The ``intcomma`` template filter was subject to a potential denial-of-service
+attack when used with very long strings.
+
Bugfixes
========
diff --git a/tests/humanize_tests/tests.py b/tests/humanize_tests/tests.py
index cf29f58232..a78bbadafd 100644
--- a/tests/humanize_tests/tests.py
+++ b/tests/humanize_tests/tests.py
@@ -116,39 +116,71 @@ class HumanizeTests(SimpleTestCase):
def test_intcomma(self):
test_list = (
100,
+ -100,
1000,
+ -1000,
10123,
+ -10123,
10311,
+ -10311,
1000000,
+ -1000000,
1234567.25,
+ -1234567.25,
"100",
+ "-100",
"1000",
+ "-1000",
"10123",
+ "-10123",
"10311",
+ "-10311",
"1000000",
+ "-1000000",
"1234567.1234567",
+ "-1234567.1234567",
Decimal("1234567.1234567"),
+ Decimal("-1234567.1234567"),
None,
"1234567",
+ "-1234567",
"1234567.12",
+ "-1234567.12",
+ "the quick brown fox jumped over the lazy dog",
)
result_list = (
"100",
+ "-100",
"1,000",
+ "-1,000",
"10,123",
+ "-10,123",
"10,311",
+ "-10,311",
"1,000,000",
+ "-1,000,000",
"1,234,567.25",
+ "-1,234,567.25",
"100",
+ "-100",
"1,000",
+ "-1,000",
"10,123",
+ "-10,123",
"10,311",
+ "-10,311",
"1,000,000",
+ "-1,000,000",
"1,234,567.1234567",
+ "-1,234,567.1234567",
"1,234,567.1234567",
+ "-1,234,567.1234567",
None,
"1,234,567",
+ "-1,234,567",
"1,234,567.12",
+ "-1,234,567.12",
+ "the quick brown fox jumped over the lazy dog",
)
with translation.override("en"):
self.humanize_tester(test_list, result_list, "intcomma")
@@ -156,39 +188,71 @@ class HumanizeTests(SimpleTestCase):
def test_l10n_intcomma(self):
test_list = (
100,
+ -100,
1000,
+ -1000,
10123,
+ -10123,
10311,
+ -10311,
1000000,
+ -1000000,
1234567.25,
+ -1234567.25,
"100",
+ "-100",
"1000",
+ "-1000",
"10123",
+ "-10123",
"10311",
+ "-10311",
"1000000",
+ "-1000000",
"1234567.1234567",
+ "-1234567.1234567",
Decimal("1234567.1234567"),
+ -Decimal("1234567.1234567"),
None,
"1234567",
+ "-1234567",
"1234567.12",
+ "-1234567.12",
+ "the quick brown fox jumped over the lazy dog",
)
result_list = (
"100",
+ "-100",
"1,000",
+ "-1,000",
"10,123",
+ "-10,123",
"10,311",
+ "-10,311",
"1,000,000",
+ "-1,000,000",
"1,234,567.25",
+ "-1,234,567.25",
"100",
+ "-100",
"1,000",
+ "-1,000",
"10,123",
+ "-10,123",
"10,311",
+ "-10,311",
"1,000,000",
+ "-1,000,000",
"1,234,567.1234567",
+ "-1,234,567.1234567",
"1,234,567.1234567",
+ "-1,234,567.1234567",
None,
"1,234,567",
+ "-1,234,567",
"1,234,567.12",
+ "-1,234,567.12",
+ "the quick brown fox jumped over the lazy dog",
)
with self.settings(USE_THOUSAND_SEPARATOR=False):
with translation.override("en"):
From f61bc0319748876763e98be1c2933a03d59b7c34 Mon Sep 17 00:00:00 2001
From: Natalia <124304+nessita@users.noreply.github.com>
Date: Tue, 6 Feb 2024 12:05:05 -0300
Subject: [PATCH 012/316] Added stub release notes for 5.0.3.
---
docs/releases/5.0.3.txt | 12 ++++++++++++
docs/releases/index.txt | 1 +
2 files changed, 13 insertions(+)
create mode 100644 docs/releases/5.0.3.txt
diff --git a/docs/releases/5.0.3.txt b/docs/releases/5.0.3.txt
new file mode 100644
index 0000000000..8fe37c9d90
--- /dev/null
+++ b/docs/releases/5.0.3.txt
@@ -0,0 +1,12 @@
+==========================
+Django 5.0.3 release notes
+==========================
+
+*Expected March 4, 2024*
+
+Django 5.0.3 fixes several bugs in 5.0.2.
+
+Bugfixes
+========
+
+* ...
diff --git a/docs/releases/index.txt b/docs/releases/index.txt
index db0741a136..3f66974821 100644
--- a/docs/releases/index.txt
+++ b/docs/releases/index.txt
@@ -32,6 +32,7 @@ versions of the documentation contain the release notes for any later releases.
.. toctree::
:maxdepth: 1
+ 5.0.3
5.0.2
5.0.1
5.0
From c650c1412d1933e339cc93f9b6745c3eedb1c25b Mon Sep 17 00:00:00 2001
From: Natalia <124304+nessita@users.noreply.github.com>
Date: Tue, 6 Feb 2024 12:14:12 -0300
Subject: [PATCH 013/316] Added CVE-2024-24680 to security archive.
---
docs/releases/security.txt | 11 +++++++++++
1 file changed, 11 insertions(+)
diff --git a/docs/releases/security.txt b/docs/releases/security.txt
index cf63dafa0d..7df74adb82 100644
--- a/docs/releases/security.txt
+++ b/docs/releases/security.txt
@@ -36,6 +36,17 @@ Issues under Django's security process
All security issues have been handled under versions of Django's security
process. These are listed below.
+February 6, 2024 - :cve:`2024-24680`
+------------------------------------
+
+Potential denial-of-service in ``intcomma`` template filter.
+`Full description
+ `__
+
+* Django 5.0 :commit:`(patch) <16a8fe18a3b81250f4fa57e3f93f0599dc4895bc>`
+* Django 4.2 :commit:`(patch) <572ea07e84b38ea8de0551f4b4eda685d91d09d2>`
+* Django 3.2 :commit:`(patch) `
+
November 1, 2023 - :cve:`2023-46695`
------------------------------------
From 48a469395191e87d3b84ad35bae2c8b53d91ed61 Mon Sep 17 00:00:00 2001
From: David Smith
Date: Tue, 3 Jan 2023 08:17:56 +0000
Subject: [PATCH 014/316] Refs #30686 -- Improved test coverage of Truncator.
---
.../filter_tests/test_truncatechars.py | 5 +
tests/utils_tests/test_text.py | 99 +++++++++++++++++++
2 files changed, 104 insertions(+)
diff --git a/tests/template_tests/filter_tests/test_truncatechars.py b/tests/template_tests/filter_tests/test_truncatechars.py
index a444125cf8..351b32f9de 100644
--- a/tests/template_tests/filter_tests/test_truncatechars.py
+++ b/tests/template_tests/filter_tests/test_truncatechars.py
@@ -22,3 +22,8 @@ class TruncatecharsTests(SimpleTestCase):
"truncatechars03", {"a": "Testing, testing"}
)
self.assertEqual(output, "Testing, testing")
+
+ @setup({"truncatechars04": "{{ a|truncatechars:3 }}"})
+ def test_truncatechars04(self):
+ output = self.engine.render_to_string("truncatechars04", {"a": "abc"})
+ self.assertEqual(output, "abc")
diff --git a/tests/utils_tests/test_text.py b/tests/utils_tests/test_text.py
index 77e637ae6c..a7f25c7936 100644
--- a/tests/utils_tests/test_text.py
+++ b/tests/utils_tests/test_text.py
@@ -95,6 +95,45 @@ class TestUtilsText(SimpleTestCase):
text.Truncator(lazystr("The quick brown fox")).chars(10), "The quick…"
)
+ def test_truncate_chars_html(self):
+ truncator = text.Truncator(
+ 'The quick brown fox jumped over the lazy dog. '
+ "
"
+ )
+ self.assertEqual(
+ 'The quick brown fox jumped over the lazy dog. '
+ "
",
+ truncator.chars(80, html=True),
+ )
+ self.assertEqual(
+ 'The quick brown fox jumped over the lazy dog. '
+ "
",
+ truncator.chars(46, html=True),
+ )
+ self.assertEqual(
+ 'The quick brown fox jumped over the lazy dog. '
+ "
",
+ truncator.chars(45, html=True),
+ )
+ self.assertEqual(
+ 'The quick…
',
+ truncator.chars(10, html=True),
+ )
+ self.assertEqual(
+ "…",
+ truncator.chars(1, html=True),
+ )
+ self.assertEqual(
+ 'The qu....
',
+ truncator.chars(10, "....", html=True),
+ )
+ self.assertEqual(
+ 'The quick
',
+ truncator.chars(10, "", html=True),
+ )
+ truncator = text.Truncator("foo
")
+ self.assertEqual("foo", truncator.chars(5, html=True))
+
@patch("django.utils.text.Truncator.MAX_LENGTH_HTML", 10_000)
def test_truncate_chars_html_size_limit(self):
max_len = text.Truncator.MAX_LENGTH_HTML
@@ -114,6 +153,47 @@ class TestUtilsText(SimpleTestCase):
expected if expected else value, truncator.chars(10, html=True)
)
+ def test_truncate_chars_html_with_newline_inside_tag(self):
+ truncator = text.Truncator(
+ 'The quick brown fox jumped over '
+ "the lazy dog.
"
+ )
+ self.assertEqual(
+ 'The quick brow…
',
+ truncator.chars(15, html=True),
+ )
+ self.assertEqual(
+ "Th…
",
+ truncator.chars(3, html=True),
+ )
+
+ def test_truncate_chars_html_with_void_elements(self):
+ truncator = text.Truncator(
+ " The quick brown fox jumped over the lazy dog."
+ )
+ self.assertEqual(" The quick brown…", truncator.chars(16, html=True))
+ truncator = text.Truncator(
+ " The quick brown fox jumped over the lazy dog."
+ )
+ self.assertEqual(
+ " The quick brown… ", truncator.chars(16, html=True)
+ )
+ self.assertEqual(" The q…", truncator.chars(6, html=True))
+ self.assertEqual(" The …", truncator.chars(5, html=True))
+ self.assertEqual(" The…", truncator.chars(4, html=True))
+ self.assertEqual(" Th…", truncator.chars(3, html=True))
+
+ def test_truncate_chars_html_with_html_entities(self):
+ truncator = text.Truncator(
+ "Buenos días! ¿Cómo está? "
+ )
+ self.assertEqual(
+ "Buenos días! ¿Cómo… ",
+ truncator.chars(40, html=True),
+ )
+ truncator = text.Truncator("I <3 python, what about you?
")
+ self.assertEqual("I <3 python,…
", truncator.chars(16, html=True))
+
def test_truncate_words(self):
truncator = text.Truncator("The quick brown fox jumped over the lazy dog.")
self.assertEqual(
@@ -141,6 +221,10 @@ class TestUtilsText(SimpleTestCase):
'The quick brown fox…
',
truncator.words(4, html=True),
)
+ self.assertEqual(
+ "",
+ truncator.words(0, html=True),
+ )
self.assertEqual(
'The quick brown fox....
',
truncator.words(4, "....", html=True),
@@ -150,6 +234,14 @@ class TestUtilsText(SimpleTestCase):
truncator.words(4, "", html=True),
)
+ truncator = text.Truncator(
+ "The quick \t brown fox jumped over the lazy dog.
"
+ )
+ self.assertEqual(
+ "The quick \t brown fox…
",
+ truncator.words(4, html=True),
+ )
+
# Test with new line inside tag
truncator = text.Truncator(
'The quick brown fox jumped over '
@@ -159,6 +251,10 @@ class TestUtilsText(SimpleTestCase):
'
The quick brown…
',
truncator.words(3, html=True),
)
+ self.assertEqual(
+ "The…
",
+ truncator.words(1, html=True),
+ )
# Test self-closing tags
truncator = text.Truncator(
@@ -183,6 +279,9 @@ class TestUtilsText(SimpleTestCase):
truncator = text.Truncator("I <3 python, what about you?
")
self.assertEqual("I <3 python,…
", truncator.words(3, html=True))
+ truncator = text.Truncator("foo")
+ self.assertEqual("foo", truncator.words(3, html=True))
+
@patch("django.utils.text.Truncator.MAX_LENGTH_HTML", 10_000)
def test_truncate_words_html_size_limit(self):
max_len = text.Truncator.MAX_LENGTH_HTML
From 3e820d10f81ea9d0576633734c2ebd2621575cbe Mon Sep 17 00:00:00 2001
From: nessita <124304+nessita@users.noreply.github.com>
Date: Tue, 6 Feb 2024 16:50:54 -0300
Subject: [PATCH 015/316] Refs #10743 -- Removed leftover comment in
tests/admin_changelist/tests.py.
---
tests/admin_changelist/tests.py | 1 -
1 file changed, 1 deletion(-)
diff --git a/tests/admin_changelist/tests.py b/tests/admin_changelist/tests.py
index 4f267635f1..855d216a80 100644
--- a/tests/admin_changelist/tests.py
+++ b/tests/admin_changelist/tests.py
@@ -2123,7 +2123,6 @@ class SeleniumTests(AdminSeleniumTestCase):
]
for css_selector, ordering in cases:
with self.subTest(ordering=ordering):
- # self.selenium.get(self.live_server_url + changelist_url)
self.selenium.find_element(By.CSS_SELECTOR, css_selector).click()
expected = expected_from_queryset(
GrandChild.objects.all().order_by(*ordering)
From 70f39e46f86b946c273340d52109824c776ffb4c Mon Sep 17 00:00:00 2001
From: David Smith
Date: Tue, 6 Feb 2024 20:52:52 +0100
Subject: [PATCH 016/316] Refs #30686 -- Fixed text truncation for negative or
zero lengths.
---
django/utils/text.py | 4 ++++
.../template_tests/filter_tests/test_truncatechars_html.py | 2 +-
tests/utils_tests/test_text.py | 6 +++++-
3 files changed, 10 insertions(+), 2 deletions(-)
diff --git a/django/utils/text.py b/django/utils/text.py
index 295f919b51..374fd78f92 100644
--- a/django/utils/text.py
+++ b/django/utils/text.py
@@ -104,6 +104,8 @@ class Truncator(SimpleLazyObject):
"""
self._setup()
length = int(num)
+ if length <= 0:
+ return ""
text = unicodedata.normalize("NFC", self._wrapped)
# Calculate the length to truncate to (max length - end_text length)
@@ -144,6 +146,8 @@ class Truncator(SimpleLazyObject):
"""
self._setup()
length = int(num)
+ if length <= 0:
+ return ""
if html:
return self._truncate_html(length, truncate, self._wrapped, length, True)
return self._text_words(length, truncate)
diff --git a/tests/template_tests/filter_tests/test_truncatechars_html.py b/tests/template_tests/filter_tests/test_truncatechars_html.py
index 6c5fc3c883..881290d47d 100644
--- a/tests/template_tests/filter_tests/test_truncatechars_html.py
+++ b/tests/template_tests/filter_tests/test_truncatechars_html.py
@@ -8,7 +8,7 @@ class FunctionTests(SimpleTestCase):
truncatechars_html(
'one two - three four five
', 0
),
- "…",
+ "",
)
def test_truncate(self):
diff --git a/tests/utils_tests/test_text.py b/tests/utils_tests/test_text.py
index a7f25c7936..6004712bf2 100644
--- a/tests/utils_tests/test_text.py
+++ b/tests/utils_tests/test_text.py
@@ -89,7 +89,7 @@ class TestUtilsText(SimpleTestCase):
# Make a best effort to shorten to the desired length, but requesting
# a length shorter than the ellipsis shouldn't break
- self.assertEqual("…", text.Truncator("asdf").chars(0))
+ self.assertEqual("...", text.Truncator("asdf").chars(1, truncate="..."))
# lazy strings are handled correctly
self.assertEqual(
text.Truncator(lazystr("The quick brown fox")).chars(10), "The quick…"
@@ -123,6 +123,8 @@ class TestUtilsText(SimpleTestCase):
"…",
truncator.chars(1, html=True),
)
+ self.assertEqual("", truncator.chars(0, html=True))
+ self.assertEqual("", truncator.chars(-1, html=True))
self.assertEqual(
'The qu....
',
truncator.chars(10, "....", html=True),
@@ -206,6 +208,8 @@ class TestUtilsText(SimpleTestCase):
lazystr("The quick brown fox jumped over the lazy dog.")
)
self.assertEqual("The quick brown fox…", truncator.words(4))
+ self.assertEqual("", truncator.words(0))
+ self.assertEqual("", truncator.words(-1))
def test_truncate_html_words(self):
truncator = text.Truncator(
From 6ee37ada3241ed263d8d1c2901b030d964cbd161 Mon Sep 17 00:00:00 2001
From: David Smith
Date: Tue, 3 Jan 2023 20:48:06 +0000
Subject: [PATCH 017/316] Fixed #30686 -- Used Python HTMLParser in
utils.text.Truncator.
---
django/utils/text.py | 215 ++++++++++--------
docs/releases/5.1.txt | 5 +
.../filter_tests/test_truncatewords_html.py | 6 +-
tests/utils_tests/test_text.py | 48 ++--
4 files changed, 149 insertions(+), 125 deletions(-)
diff --git a/django/utils/text.py b/django/utils/text.py
index 374fd78f92..9560ebc678 100644
--- a/django/utils/text.py
+++ b/django/utils/text.py
@@ -2,12 +2,20 @@ import gzip
import re
import secrets
import unicodedata
+from collections import deque
from gzip import GzipFile
from gzip import compress as gzip_compress
+from html import escape
+from html.parser import HTMLParser
from io import BytesIO
from django.core.exceptions import SuspiciousFileOperation
-from django.utils.functional import SimpleLazyObject, keep_lazy_text, lazy
+from django.utils.functional import (
+ SimpleLazyObject,
+ cached_property,
+ keep_lazy_text,
+ lazy,
+)
from django.utils.regex_helper import _lazy_re_compile
from django.utils.translation import gettext as _
from django.utils.translation import gettext_lazy, pgettext
@@ -80,6 +88,101 @@ def add_truncation_text(text, truncate=None):
return f"{text}{truncate}"
+def calculate_truncate_chars_length(length, replacement):
+ truncate_len = length
+ for char in add_truncation_text("", replacement):
+ if not unicodedata.combining(char):
+ truncate_len -= 1
+ if truncate_len == 0:
+ break
+ return truncate_len
+
+
+class TruncateHTMLParser(HTMLParser):
+ class TruncationCompleted(Exception):
+ pass
+
+ def __init__(self, *, length, replacement, convert_charrefs=True):
+ super().__init__(convert_charrefs=convert_charrefs)
+ self.tags = deque()
+ self.output = ""
+ self.remaining = length
+ self.replacement = replacement
+
+ @cached_property
+ def void_elements(self):
+ from django.utils.html import VOID_ELEMENTS
+
+ return VOID_ELEMENTS
+
+ def handle_startendtag(self, tag, attrs):
+ self.handle_starttag(tag, attrs)
+ if tag not in self.void_elements:
+ self.handle_endtag(tag)
+
+ def handle_starttag(self, tag, attrs):
+ self.output += self.get_starttag_text()
+ if tag not in self.void_elements:
+ self.tags.appendleft(tag)
+
+ def handle_endtag(self, tag):
+ if tag not in self.void_elements:
+ self.output += f"{tag}>"
+ try:
+ self.tags.remove(tag)
+ except ValueError:
+ pass
+
+ def handle_data(self, data):
+ data, output = self.process(data)
+ data_len = len(data)
+ if self.remaining < data_len:
+ self.remaining = 0
+ self.output += add_truncation_text(output, self.replacement)
+ raise self.TruncationCompleted
+ self.remaining -= data_len
+ self.output += output
+
+ def feed(self, data):
+ try:
+ super().feed(data)
+ except self.TruncationCompleted:
+ self.output += "".join([f"{tag}>" for tag in self.tags])
+ self.tags.clear()
+ self.reset()
+ else:
+ # No data was handled.
+ self.reset()
+
+
+class TruncateCharsHTMLParser(TruncateHTMLParser):
+ def __init__(self, *, length, replacement, convert_charrefs=True):
+ self.length = length
+ self.processed_chars = 0
+ super().__init__(
+ length=calculate_truncate_chars_length(length, replacement),
+ replacement=replacement,
+ convert_charrefs=convert_charrefs,
+ )
+
+ def process(self, data):
+ self.processed_chars += len(data)
+ if (self.processed_chars == self.length) and (
+ len(self.output) + len(data) == len(self.rawdata)
+ ):
+ self.output += data
+ raise self.TruncationCompleted
+ output = escape("".join(data[: self.remaining]))
+ return data, output
+
+
+class TruncateWordsHTMLParser(TruncateHTMLParser):
+ def process(self, data):
+ data = re.split(r"(?<=\S)\s+(?=\S)", data)
+ output = escape(" ".join(data[: self.remaining]))
+ return data, output
+
+
class Truncator(SimpleLazyObject):
"""
An object used to truncate text, either by characters or words.
@@ -108,19 +211,16 @@ class Truncator(SimpleLazyObject):
return ""
text = unicodedata.normalize("NFC", self._wrapped)
- # Calculate the length to truncate to (max length - end_text length)
- truncate_len = length
- for char in add_truncation_text("", truncate):
- if not unicodedata.combining(char):
- truncate_len -= 1
- if truncate_len == 0:
- break
if html:
- return self._truncate_html(length, truncate, text, truncate_len, False)
- return self._text_chars(length, truncate, text, truncate_len)
+ parser = TruncateCharsHTMLParser(length=length, replacement=truncate)
+ parser.feed(text)
+ parser.close()
+ return parser.output
+ return self._text_chars(length, truncate, text)
- def _text_chars(self, length, truncate, text, truncate_len):
+ def _text_chars(self, length, truncate, text):
"""Truncate a string after a certain number of chars."""
+ truncate_len = calculate_truncate_chars_length(length, truncate)
s_len = 0
end_index = None
for i, char in enumerate(text):
@@ -149,7 +249,10 @@ class Truncator(SimpleLazyObject):
if length <= 0:
return ""
if html:
- return self._truncate_html(length, truncate, self._wrapped, length, True)
+ parser = TruncateWordsHTMLParser(length=length, replacement=truncate)
+ parser.feed(self._wrapped)
+ parser.close()
+ return parser.output
return self._text_words(length, truncate)
def _text_words(self, length, truncate):
@@ -164,94 +267,6 @@ class Truncator(SimpleLazyObject):
return add_truncation_text(" ".join(words), truncate)
return " ".join(words)
- def _truncate_html(self, length, truncate, text, truncate_len, words):
- """
- Truncate HTML to a certain number of chars (not counting tags and
- comments), or, if words is True, then to a certain number of words.
- Close opened tags if they were correctly closed in the given HTML.
-
- Preserve newlines in the HTML.
- """
- if words and length <= 0:
- return ""
-
- size_limited = False
- if len(text) > self.MAX_LENGTH_HTML:
- text = text[: self.MAX_LENGTH_HTML]
- size_limited = True
-
- html4_singlets = (
- "br",
- "col",
- "link",
- "base",
- "img",
- "param",
- "area",
- "hr",
- "input",
- )
-
- # Count non-HTML chars/words and keep note of open tags
- pos = 0
- end_text_pos = 0
- current_len = 0
- open_tags = []
-
- regex = re_words if words else re_chars
-
- while current_len <= length:
- m = regex.search(text, pos)
- if not m:
- # Checked through whole string
- break
- pos = m.end(0)
- if m[1]:
- # It's an actual non-HTML word or char
- current_len += 1
- if current_len == truncate_len:
- end_text_pos = pos
- continue
- # Check for tag
- tag = re_tag.match(m[0])
- if not tag or current_len >= truncate_len:
- # Don't worry about non tags or tags after our truncate point
- continue
- closing_tag, tagname, self_closing = tag.groups()
- # Element names are always case-insensitive
- tagname = tagname.lower()
- if self_closing or tagname in html4_singlets:
- pass
- elif closing_tag:
- # Check for match in open tags list
- try:
- i = open_tags.index(tagname)
- except ValueError:
- pass
- else:
- # SGML: An end tag closes, back to the matching start tag,
- # all unclosed intervening start tags with omitted end tags
- open_tags = open_tags[i + 1 :]
- else:
- # Add it to the start of the open tags list
- open_tags.insert(0, tagname)
-
- truncate_text = add_truncation_text("", truncate)
-
- if current_len <= length:
- if size_limited and truncate_text:
- text += truncate_text
- return text
-
- out = text[:end_text_pos]
- if truncate_text:
- out += truncate_text
- # Close any tags still open
- for tag in open_tags:
- out += "%s>" % tag
- # Return string
- return out
-
@keep_lazy_text
def get_valid_filename(name):
diff --git a/docs/releases/5.1.txt b/docs/releases/5.1.txt
index 701d686532..aca1281a98 100644
--- a/docs/releases/5.1.txt
+++ b/docs/releases/5.1.txt
@@ -368,6 +368,11 @@ Miscellaneous
:meth:`~django.test.SimpleTestCase.assertInHTML` now add ``": "`` to the
``msg_prefix``. This is consistent with the behavior of other assertions.
+* ``django.utils.text.Truncator`` used by :tfilter:`truncatechars_html` and
+ :tfilter:`truncatewords_html` template filters now uses
+ :py:class:`html.parser.HTMLParser` subclasses. This results in a more robust
+ and faster operation, but there may be small differences in the output.
+
.. _deprecated-features-5.1:
Features deprecated in 5.1
diff --git a/tests/template_tests/filter_tests/test_truncatewords_html.py b/tests/template_tests/filter_tests/test_truncatewords_html.py
index 32b7c81a76..0cf41d83ae 100644
--- a/tests/template_tests/filter_tests/test_truncatewords_html.py
+++ b/tests/template_tests/filter_tests/test_truncatewords_html.py
@@ -24,7 +24,7 @@ class FunctionTests(SimpleTestCase):
truncatewords_html(
'one two - three four five
', 4
),
- 'one two - three …
',
+ 'one two - three …
',
)
def test_truncate3(self):
@@ -32,7 +32,7 @@ class FunctionTests(SimpleTestCase):
truncatewords_html(
'one two - three four five
', 5
),
- 'one two - three four …
',
+ 'one two - three four …
',
)
def test_truncate4(self):
@@ -53,7 +53,7 @@ class FunctionTests(SimpleTestCase):
truncatewords_html(
"Buenos días! ¿Cómo está? ", 3
),
- "Buenos días! ¿Cómo … ",
+ "Buenos días! ¿Cómo … ",
)
def test_invalid_arg(self):
diff --git a/tests/utils_tests/test_text.py b/tests/utils_tests/test_text.py
index 6004712bf2..b38d8238c5 100644
--- a/tests/utils_tests/test_text.py
+++ b/tests/utils_tests/test_text.py
@@ -111,7 +111,7 @@ class TestUtilsText(SimpleTestCase):
truncator.chars(46, html=True),
)
self.assertEqual(
- 'The quick brown fox jumped over the lazy dog. '
+ 'The quick brown fox jumped over the lazy dog… '
"
",
truncator.chars(45, html=True),
)
@@ -120,7 +120,7 @@ class TestUtilsText(SimpleTestCase):
truncator.chars(10, html=True),
)
self.assertEqual(
- "…",
+ '…
',
truncator.chars(1, html=True),
)
self.assertEqual("", truncator.chars(0, html=True))
@@ -142,18 +142,16 @@ class TestUtilsText(SimpleTestCase):
bigger_len = text.Truncator.MAX_LENGTH_HTML + 1
valid_html = "Joel is a slug
" # 14 chars
perf_test_values = [
- ("", None),
- ("
", "", None),
+ ("", ""),
+ ("", ""),
+ ("&" * bigger_len, ""),
+ ("_X<<<<<<<<<<<>", "_X<<<<<<<…"),
(valid_html * bigger_len, "Joel is a…
"), # 10 chars
]
for value, expected in perf_test_values:
with self.subTest(value=value):
truncator = text.Truncator(value)
- self.assertEqual(
- expected if expected else value, truncator.chars(10, html=True)
- )
+ self.assertEqual(expected, truncator.chars(10, html=True))
def test_truncate_chars_html_with_newline_inside_tag(self):
truncator = text.Truncator(
@@ -181,7 +179,7 @@ class TestUtilsText(SimpleTestCase):
" The quick brown… ", truncator.chars(16, html=True)
)
self.assertEqual(" The q…", truncator.chars(6, html=True))
- self.assertEqual(" The …", truncator.chars(5, html=True))
+ self.assertEqual(" The …", truncator.chars(5, html=True))
self.assertEqual(" The…", truncator.chars(4, html=True))
self.assertEqual(" Th…", truncator.chars(3, html=True))
@@ -190,11 +188,19 @@ class TestUtilsText(SimpleTestCase):
"Buenos días! ¿Cómo está? "
)
self.assertEqual(
- "Buenos días! ¿Cómo… ",
+ "Buenos días! ¿Cómo está? ",
truncator.chars(40, html=True),
)
+ self.assertEqual(
+ "Buenos días… ",
+ truncator.chars(12, html=True),
+ )
+ self.assertEqual(
+ "Buenos días! ¿Cómo está… ",
+ truncator.chars(24, html=True),
+ )
truncator = text.Truncator("I <3 python, what about you?
")
- self.assertEqual("I <3 python,…
", truncator.chars(16, html=True))
+ self.assertEqual("I <3 python, wh…
", truncator.chars(16, html=True))
def test_truncate_words(self):
truncator = text.Truncator("The quick brown fox jumped over the lazy dog.")
@@ -242,7 +248,7 @@ class TestUtilsText(SimpleTestCase):
"The quick \t brown fox jumped over the lazy dog.
"
)
self.assertEqual(
- "The quick \t brown fox…
",
+ "The quick brown fox…
",
truncator.words(4, html=True),
)
@@ -277,7 +283,7 @@ class TestUtilsText(SimpleTestCase):
"Buenos días! ¿Cómo está? "
)
self.assertEqual(
- "Buenos días! ¿Cómo… ",
+ "Buenos días! ¿Cómo… ",
truncator.words(3, html=True),
)
truncator = text.Truncator("I <3 python, what about you?
")
@@ -292,19 +298,17 @@ class TestUtilsText(SimpleTestCase):
bigger_len = text.Truncator.MAX_LENGTH_HTML + 1
valid_html = "Joel is a slug
" # 4 words
perf_test_values = [
- ("", None),
- ("", "", None),
+ ("", ""),
+ ("", ""),
+ ("&" * max_len, ""),
+ ("&" * bigger_len, ""),
+ ("_X<<<<<<<<<<<>", "_X<<<<<<<<<<<>"),
(valid_html * bigger_len, valid_html * 12 + "Joel is…
"), # 50 words
]
for value, expected in perf_test_values:
with self.subTest(value=value):
truncator = text.Truncator(value)
- self.assertEqual(
- expected if expected else value, truncator.words(50, html=True)
- )
+ self.assertEqual(expected, truncator.words(50, html=True))
def test_wrap(self):
digits = "1234 67 9"
From d79fba7d8e7bbcdf53535a14d57ead5a6863cd8d Mon Sep 17 00:00:00 2001
From: Hisham Mahmood
Date: Tue, 6 Feb 2024 19:40:01 +0500
Subject: [PATCH 018/316] Fixed #35099 -- Prevented mutating queryset when
combining with & and | operators.
Thanks Alan for the report.
Co-authored-by: Mariusz Felisiak
---
django/db/models/sql/query.py | 1 +
tests/queries/tests.py | 18 ++++++++++++++++++
2 files changed, 19 insertions(+)
diff --git a/django/db/models/sql/query.py b/django/db/models/sql/query.py
index 5100869b34..b3f130c0b4 100644
--- a/django/db/models/sql/query.py
+++ b/django/db/models/sql/query.py
@@ -696,6 +696,7 @@ class Query(BaseExpression):
# except if the alias is the base table since it must be present in the
# query on both sides.
initial_alias = self.get_initial_alias()
+ rhs = rhs.clone()
rhs.bump_prefix(self, exclude={initial_alias})
# Work out how to relabel the rhs aliases, if necessary.
diff --git a/tests/queries/tests.py b/tests/queries/tests.py
index 48d610bb2b..7ac8a65d42 100644
--- a/tests/queries/tests.py
+++ b/tests/queries/tests.py
@@ -1357,6 +1357,24 @@ class Queries1Tests(TestCase):
)
self.assertSequenceEqual(Note.objects.exclude(negate=True), [self.n3])
+ def test_combining_does_not_mutate(self):
+ all_authors = Author.objects.all()
+ authors_with_report = Author.objects.filter(
+ Exists(Report.objects.filter(creator__pk=OuterRef("id")))
+ )
+ authors_without_report = all_authors.exclude(pk__in=authors_with_report)
+ items_before = Item.objects.filter(creator__in=authors_without_report)
+ self.assertCountEqual(items_before, [self.i2, self.i3, self.i4])
+ # Combining querysets doesn't mutate them.
+ all_authors | authors_with_report
+ all_authors & authors_with_report
+
+ authors_without_report = all_authors.exclude(pk__in=authors_with_report)
+ items_after = Item.objects.filter(creator__in=authors_without_report)
+
+ self.assertCountEqual(items_after, [self.i2, self.i3, self.i4])
+ self.assertCountEqual(items_before, items_after)
+
class Queries2Tests(TestCase):
@classmethod
From aaffbabd58c8f3c9bf82cd4eb98b8c5cb9e7aa6a Mon Sep 17 00:00:00 2001
From: Koo
Date: Thu, 8 Feb 2024 13:57:59 +0900
Subject: [PATCH 019/316] Fixed typo in
docs/internals/contributing/writing-code/coding-style.txt.
---
docs/internals/contributing/writing-code/coding-style.txt | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/docs/internals/contributing/writing-code/coding-style.txt b/docs/internals/contributing/writing-code/coding-style.txt
index 49b69bf066..8c08e7e259 100644
--- a/docs/internals/contributing/writing-code/coding-style.txt
+++ b/docs/internals/contributing/writing-code/coding-style.txt
@@ -310,8 +310,8 @@ Model style
class MyModel(models.Model):
class Direction(models.TextChoices):
- UP = U, "Up"
- DOWN = D, "Down"
+ UP = "U", "Up"
+ DOWN = "D", "Down"
Use of ``django.conf.settings``
===============================
From 2f14c2cedc9c92373471c1f98a80c81ba299584a Mon Sep 17 00:00:00 2001
From: Mariusz Felisiak
Date: Thu, 8 Feb 2024 10:58:54 +0100
Subject: [PATCH 020/316] Fixed #35172 -- Fixed intcomma for string floats.
Thanks Warwick Brown for the report.
Regression in 55519d6cf8998fe4c8f5c8abffc2b10a7c3d14e9.
---
django/contrib/humanize/templatetags/humanize.py | 2 ++
docs/releases/3.2.25.txt | 13 +++++++++++++
docs/releases/4.2.11.txt | 13 +++++++++++++
docs/releases/5.0.3.txt | 3 ++-
docs/releases/index.txt | 2 ++
tests/humanize_tests/tests.py | 12 ++++++++++++
6 files changed, 44 insertions(+), 1 deletion(-)
create mode 100644 docs/releases/3.2.25.txt
create mode 100644 docs/releases/4.2.11.txt
diff --git a/django/contrib/humanize/templatetags/humanize.py b/django/contrib/humanize/templatetags/humanize.py
index 2c26f8944a..19000c185c 100644
--- a/django/contrib/humanize/templatetags/humanize.py
+++ b/django/contrib/humanize/templatetags/humanize.py
@@ -80,6 +80,8 @@ def intcomma(value, use_l10n=True):
if match:
prefix = match[0]
prefix_with_commas = re.sub(r"\d{3}", r"\g<0>,", prefix[::-1])[::-1]
+ # Remove a leading comma, if needed.
+ prefix_with_commas = re.sub(r"^(-?),", r"\1", prefix_with_commas)
result = prefix_with_commas + result[len(prefix) :]
return result
diff --git a/docs/releases/3.2.25.txt b/docs/releases/3.2.25.txt
new file mode 100644
index 0000000000..c84483f783
--- /dev/null
+++ b/docs/releases/3.2.25.txt
@@ -0,0 +1,13 @@
+===========================
+Django 3.2.25 release notes
+===========================
+
+*Expected March 4, 2024*
+
+Django 3.2.25 fixes a regression in 3.2.24.
+
+Bugfixes
+========
+
+* Fixed a regression in Django 3.2.24 where ``intcomma`` template filter could
+ return a leading comma for string representation of floats (:ticket:`35172`).
diff --git a/docs/releases/4.2.11.txt b/docs/releases/4.2.11.txt
new file mode 100644
index 0000000000..c59f131b1a
--- /dev/null
+++ b/docs/releases/4.2.11.txt
@@ -0,0 +1,13 @@
+===========================
+Django 4.2.11 release notes
+===========================
+
+*Expected March 4, 2024*
+
+Django 4.2.11 fixes a regression in 4.2.10.
+
+Bugfixes
+========
+
+* Fixed a regression in Django 4.2.10 where ``intcomma`` template filter could
+ return a leading comma for string representation of floats (:ticket:`35172`).
diff --git a/docs/releases/5.0.3.txt b/docs/releases/5.0.3.txt
index 8fe37c9d90..384ce27fb7 100644
--- a/docs/releases/5.0.3.txt
+++ b/docs/releases/5.0.3.txt
@@ -9,4 +9,5 @@ Django 5.0.3 fixes several bugs in 5.0.2.
Bugfixes
========
-* ...
+* Fixed a regression in Django 5.0.2 where ``intcomma`` template filter could
+ return a leading comma for string representation of floats (:ticket:`35172`).
diff --git a/docs/releases/index.txt b/docs/releases/index.txt
index 3f66974821..01c2ac949d 100644
--- a/docs/releases/index.txt
+++ b/docs/releases/index.txt
@@ -43,6 +43,7 @@ versions of the documentation contain the release notes for any later releases.
.. toctree::
:maxdepth: 1
+ 4.2.11
4.2.10
4.2.9
4.2.8
@@ -97,6 +98,7 @@ versions of the documentation contain the release notes for any later releases.
.. toctree::
:maxdepth: 1
+ 3.2.25
3.2.24
3.2.23
3.2.22
diff --git a/tests/humanize_tests/tests.py b/tests/humanize_tests/tests.py
index a78bbadafd..5e4f7f0ef7 100644
--- a/tests/humanize_tests/tests.py
+++ b/tests/humanize_tests/tests.py
@@ -129,12 +129,18 @@ class HumanizeTests(SimpleTestCase):
-1234567.25,
"100",
"-100",
+ "100.1",
+ "-100.1",
+ "100.13",
+ "-100.13",
"1000",
"-1000",
"10123",
"-10123",
"10311",
"-10311",
+ "100000.13",
+ "-100000.13",
"1000000",
"-1000000",
"1234567.1234567",
@@ -163,12 +169,18 @@ class HumanizeTests(SimpleTestCase):
"-1,234,567.25",
"100",
"-100",
+ "100.1",
+ "-100.1",
+ "100.13",
+ "-100.13",
"1,000",
"-1,000",
"10,123",
"-10,123",
"10,311",
"-10,311",
+ "100,000.13",
+ "-100,000.13",
"1,000,000",
"-1,000,000",
"1,234,567.1234567",
From 1b5338d03ecc962af8ab4678426bc60b0672b8dd Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Va=C5=A1ek=20Dohnal?=
Date: Thu, 8 Feb 2024 09:21:03 +0100
Subject: [PATCH 021/316] Fixed #35174 -- Fixed Signal.asend()/asend_robust()
crash when all receivers are asynchronous.
Regression in e83a88566a71a2353cebc35992c110be0f8628af.
---
django/dispatch/dispatcher.py | 8 ++++++--
docs/releases/5.0.3.txt | 4 ++++
tests/signals/tests.py | 16 ++++++++++++++++
3 files changed, 26 insertions(+), 2 deletions(-)
diff --git a/django/dispatch/dispatcher.py b/django/dispatch/dispatcher.py
index 26ef09ce49..fe0e1fa599 100644
--- a/django/dispatch/dispatcher.py
+++ b/django/dispatch/dispatcher.py
@@ -244,7 +244,9 @@ class Signal:
return responses
else:
- sync_send = list
+
+ async def sync_send():
+ return []
responses, async_responses = await asyncio.gather(
sync_send(),
@@ -380,7 +382,9 @@ class Signal:
return responses
else:
- sync_send = list
+
+ async def sync_send():
+ return []
async def asend_and_wrap_exception(receiver):
try:
diff --git a/docs/releases/5.0.3.txt b/docs/releases/5.0.3.txt
index 384ce27fb7..30e87127b0 100644
--- a/docs/releases/5.0.3.txt
+++ b/docs/releases/5.0.3.txt
@@ -11,3 +11,7 @@ Bugfixes
* Fixed a regression in Django 5.0.2 where ``intcomma`` template filter could
return a leading comma for string representation of floats (:ticket:`35172`).
+
+* Fixed a bug in Django 5.0 that caused a crash of ``Signal.asend()`` and
+ ``asend_robust()`` when all receivers were asynchronous functions
+ (:ticket:`35174`).
diff --git a/tests/signals/tests.py b/tests/signals/tests.py
index 5558778bbe..6c90c6aa52 100644
--- a/tests/signals/tests.py
+++ b/tests/signals/tests.py
@@ -626,3 +626,19 @@ class AsyncReceiversTests(SimpleTestCase):
(async_handler, 1),
],
)
+
+ async def test_asend_only_async_receivers(self):
+ async_handler = AsyncHandler()
+ signal = dispatch.Signal()
+ signal.connect(async_handler)
+
+ result = await signal.asend(self.__class__)
+ self.assertEqual(result, [(async_handler, 1)])
+
+ async def test_asend_robust_only_async_receivers(self):
+ async_handler = AsyncHandler()
+ signal = dispatch.Signal()
+ signal.connect(async_handler)
+
+ result = await signal.asend_robust(self.__class__)
+ self.assertEqual(result, [(async_handler, 1)])
From 9c5e382b981608a26f2c55f1259d9e823fee5f15 Mon Sep 17 00:00:00 2001
From: bcail
Date: Thu, 8 Feb 2024 17:41:32 +0000
Subject: [PATCH 022/316] Fixed #35073 -- Avoided unnecessary calling of
callables used by SET/SET_DEFAULT in Collector.collect().
---
django/db/models/deletion.py | 6 ++----
tests/delete_regress/models.py | 22 +++++++++++++++++++---
tests/delete_regress/tests.py | 14 +++++++++++---
3 files changed, 32 insertions(+), 10 deletions(-)
diff --git a/django/db/models/deletion.py b/django/db/models/deletion.py
index bc26d82e93..022dec940b 100644
--- a/django/db/models/deletion.py
+++ b/django/db/models/deletion.py
@@ -60,8 +60,9 @@ def SET(value):
def set_on_delete(collector, field, sub_objs, using):
collector.add_field_update(field, value, sub_objs)
+ set_on_delete.lazy_sub_objs = True
+
set_on_delete.deconstruct = lambda: ("django.db.models.SET", (value,), {})
- set_on_delete.lazy_sub_objs = True
return set_on_delete
@@ -76,9 +77,6 @@ def SET_DEFAULT(collector, field, sub_objs, using):
collector.add_field_update(field, field.get_default(), sub_objs)
-SET_DEFAULT.lazy_sub_objs = True
-
-
def DO_NOTHING(collector, field, sub_objs, using):
pass
diff --git a/tests/delete_regress/models.py b/tests/delete_regress/models.py
index cbe6fef334..4bc035e1c7 100644
--- a/tests/delete_regress/models.py
+++ b/tests/delete_regress/models.py
@@ -93,9 +93,6 @@ class Item(models.Model):
location_value = models.ForeignKey(
Location, models.SET(42), default=1, db_constraint=False, related_name="+"
)
- location_default = models.ForeignKey(
- Location, models.SET_DEFAULT, default=1, db_constraint=False, related_name="+"
- )
# Models for #16128
@@ -151,3 +148,22 @@ class OrderedPerson(models.Model):
class Meta:
ordering = ["name"]
+
+
+def get_best_toy():
+ toy, _ = Toy.objects.get_or_create(name="best")
+ return toy
+
+
+def get_worst_toy():
+ toy, _ = Toy.objects.get_or_create(name="worst")
+ return toy
+
+
+class Collector(models.Model):
+ best_toy = models.ForeignKey(
+ Toy, default=get_best_toy, on_delete=models.SET_DEFAULT, related_name="toys"
+ )
+ worst_toy = models.ForeignKey(
+ Toy, models.SET(get_worst_toy), related_name="bad_toys"
+ )
diff --git a/tests/delete_regress/tests.py b/tests/delete_regress/tests.py
index 89f4d5ddd8..ce5a0db8ab 100644
--- a/tests/delete_regress/tests.py
+++ b/tests/delete_regress/tests.py
@@ -408,9 +408,17 @@ class SetQueryCountTests(TestCase):
Item.objects.create(
version=version,
location=location,
- location_default=location,
location_value=location,
)
- # 3 UPDATEs for SET of item values and one for DELETE locations.
- with self.assertNumQueries(4):
+ # 2 UPDATEs for SET of item values and one for DELETE locations.
+ with self.assertNumQueries(3):
location.delete()
+
+
+class SetCallableCollectorDefaultTests(TestCase):
+ def test_set(self):
+ # Collector doesn't call callables used by models.SET and
+ # models.SET_DEFAULT if not necessary.
+ Toy.objects.create(name="test")
+ Toy.objects.all().delete()
+ self.assertSequenceEqual(Toy.objects.all(), [])
From 8b7ddd1b621e1396cf87c08faf11937732f09dcd Mon Sep 17 00:00:00 2001
From: Ben Cail
Date: Wed, 31 Jan 2024 15:25:30 -0500
Subject: [PATCH 023/316] Refs #34534 -- Reduced constraint operations with
Meta.constraints when optimizing migrations.
---
django/db/migrations/operations/models.py | 34 ++++++++++++
tests/migrations/test_autodetector.py | 27 ++++++----
tests/migrations/test_optimizer.py | 63 +++++++++++++++++++++++
3 files changed, 115 insertions(+), 9 deletions(-)
diff --git a/django/db/migrations/operations/models.py b/django/db/migrations/operations/models.py
index 38c68f3ff3..34b14107a7 100644
--- a/django/db/migrations/operations/models.py
+++ b/django/db/migrations/operations/models.py
@@ -342,6 +342,40 @@ class CreateModel(ModelOperation):
managers=self.managers,
),
]
+ elif isinstance(operation, AddConstraint):
+ return [
+ CreateModel(
+ self.name,
+ fields=self.fields,
+ options={
+ **self.options,
+ "constraints": [
+ *self.options.get("constraints", []),
+ operation.constraint,
+ ],
+ },
+ bases=self.bases,
+ managers=self.managers,
+ ),
+ ]
+ elif isinstance(operation, RemoveConstraint):
+ options_constraints = [
+ constraint
+ for constraint in self.options.get("constraints", [])
+ if constraint.name != operation.name
+ ]
+ return [
+ CreateModel(
+ self.name,
+ fields=self.fields,
+ options={
+ **self.options,
+ "constraints": options_constraints,
+ },
+ bases=self.bases,
+ managers=self.managers,
+ ),
+ ]
return super().reduce(operation, app_label)
diff --git a/tests/migrations/test_autodetector.py b/tests/migrations/test_autodetector.py
index 340805b259..d36b72907d 100644
--- a/tests/migrations/test_autodetector.py
+++ b/tests/migrations/test_autodetector.py
@@ -2762,21 +2762,23 @@ class AutodetectorTests(BaseAutodetectorTests):
},
)
changes = self.get_changes([], [author])
- added_constraint = models.CheckConstraint(
+ constraint = models.CheckConstraint(
check=models.Q(name__contains="Bob"), name="name_contains_bob"
)
# Right number of migrations?
self.assertEqual(len(changes["otherapp"]), 1)
# Right number of actions?
migration = changes["otherapp"][0]
- self.assertEqual(len(migration.operations), 2)
+ self.assertEqual(len(migration.operations), 1)
# Right actions order?
- self.assertOperationTypes(
- changes, "otherapp", 0, ["CreateModel", "AddConstraint"]
- )
- self.assertOperationAttributes(changes, "otherapp", 0, 0, name="Author")
+ self.assertOperationTypes(changes, "otherapp", 0, ["CreateModel"])
self.assertOperationAttributes(
- changes, "otherapp", 0, 1, model_name="author", constraint=added_constraint
+ changes,
+ "otherapp",
+ 0,
+ 0,
+ name="Author",
+ options={"constraints": [constraint]},
)
def test_add_constraints(self):
@@ -4177,7 +4179,7 @@ class AutodetectorTests(BaseAutodetectorTests):
changes,
"testapp",
0,
- ["CreateModel", "AddConstraint"],
+ ["CreateModel"],
)
self.assertOperationAttributes(
changes,
@@ -4185,7 +4187,14 @@ class AutodetectorTests(BaseAutodetectorTests):
0,
0,
name="Author",
- options={"order_with_respect_to": "book"},
+ options={
+ "order_with_respect_to": "book",
+ "constraints": [
+ models.CheckConstraint(
+ check=models.Q(_order__gt=1), name="book_order_gt_1"
+ )
+ ],
+ },
)
def test_add_model_order_with_respect_to_index(self):
diff --git a/tests/migrations/test_optimizer.py b/tests/migrations/test_optimizer.py
index ece6580ad8..5c1fe3020e 100644
--- a/tests/migrations/test_optimizer.py
+++ b/tests/migrations/test_optimizer.py
@@ -1326,3 +1326,66 @@ class OptimizerTests(SimpleTestCase):
),
],
)
+
+ def test_create_model_add_constraint(self):
+ gt_constraint = models.CheckConstraint(
+ check=models.Q(weight__gt=0), name="pony_weight_gt_0"
+ )
+ self.assertOptimizesTo(
+ [
+ migrations.CreateModel(
+ name="Pony",
+ fields=[
+ ("weight", models.IntegerField()),
+ ],
+ ),
+ migrations.AddConstraint("Pony", gt_constraint),
+ ],
+ [
+ migrations.CreateModel(
+ name="Pony",
+ fields=[
+ ("weight", models.IntegerField()),
+ ],
+ options={"constraints": [gt_constraint]},
+ ),
+ ],
+ )
+
+ def test_create_model_remove_constraint(self):
+ self.assertOptimizesTo(
+ [
+ migrations.CreateModel(
+ name="Pony",
+ fields=[
+ ("weight", models.IntegerField()),
+ ],
+ options={
+ "constraints": [
+ models.CheckConstraint(
+ check=models.Q(weight__gt=0), name="pony_weight_gt_0"
+ ),
+ models.UniqueConstraint(
+ "weight", name="pony_weight_unique"
+ ),
+ ],
+ },
+ ),
+ migrations.RemoveConstraint("Pony", "pony_weight_gt_0"),
+ ],
+ [
+ migrations.CreateModel(
+ name="Pony",
+ fields=[
+ ("weight", models.IntegerField()),
+ ],
+ options={
+ "constraints": [
+ models.UniqueConstraint(
+ "weight", name="pony_weight_unique"
+ ),
+ ]
+ },
+ ),
+ ],
+ )
From 06264258dc7c7cc69b2ba5f70f782988ccb2b06c Mon Sep 17 00:00:00 2001
From: David Sanders
Date: Thu, 8 Feb 2024 19:57:14 +1100
Subject: [PATCH 024/316] Fixed #35175 -- Made migraton writer preserve
keyword-only arguments.
Thanks Gerald Goh for the report.
---
django/utils/inspect.py | 15 +++++++++-----
.../custom_migration_operations/operations.py | 5 +++++
tests/migrations/test_writer.py | 18 +++++++++++++++++
tests/postgres_tests/test_operations.py | 20 +++++++++++++++++++
4 files changed, 53 insertions(+), 5 deletions(-)
diff --git a/django/utils/inspect.py b/django/utils/inspect.py
index 28418f7312..81a15ed2db 100644
--- a/django/utils/inspect.py
+++ b/django/utils/inspect.py
@@ -16,13 +16,18 @@ def _get_callable_parameters(meth_or_func):
return _get_func_parameters(func, remove_first=is_method)
+ARG_KINDS = frozenset(
+ {
+ inspect.Parameter.POSITIONAL_ONLY,
+ inspect.Parameter.KEYWORD_ONLY,
+ inspect.Parameter.POSITIONAL_OR_KEYWORD,
+ }
+)
+
+
def get_func_args(func):
params = _get_callable_parameters(func)
- return [
- param.name
- for param in params
- if param.kind == inspect.Parameter.POSITIONAL_OR_KEYWORD
- ]
+ return [param.name for param in params if param.kind in ARG_KINDS]
def get_func_full_args(func):
diff --git a/tests/custom_migration_operations/operations.py b/tests/custom_migration_operations/operations.py
index f63f0b2a3a..6bed8559d1 100644
--- a/tests/custom_migration_operations/operations.py
+++ b/tests/custom_migration_operations/operations.py
@@ -68,6 +68,11 @@ class ArgsKwargsOperation(TestOperation):
)
+class ArgsAndKeywordOnlyArgsOperation(ArgsKwargsOperation):
+ def __init__(self, arg1, arg2, *, kwarg1, kwarg2):
+ super().__init__(arg1, arg2, kwarg1=kwarg1, kwarg2=kwarg2)
+
+
class ExpandArgsOperation(TestOperation):
serialization_expand_args = ["arg"]
diff --git a/tests/migrations/test_writer.py b/tests/migrations/test_writer.py
index a2ac673804..891efd8ac7 100644
--- a/tests/migrations/test_writer.py
+++ b/tests/migrations/test_writer.py
@@ -152,6 +152,24 @@ class OperationWriterTests(SimpleTestCase):
"),",
)
+ def test_keyword_only_args_signature(self):
+ operation = (
+ custom_migration_operations.operations.ArgsAndKeywordOnlyArgsOperation(
+ 1, 2, kwarg1=3, kwarg2=4
+ )
+ )
+ buff, imports = OperationWriter(operation, indentation=0).serialize()
+ self.assertEqual(imports, {"import custom_migration_operations.operations"})
+ self.assertEqual(
+ buff,
+ "custom_migration_operations.operations.ArgsAndKeywordOnlyArgsOperation(\n"
+ " arg1=1,\n"
+ " arg2=2,\n"
+ " kwarg1=3,\n"
+ " kwarg2=4,\n"
+ "),",
+ )
+
def test_nested_args_signature(self):
operation = custom_migration_operations.operations.ArgsOperation(
custom_migration_operations.operations.ArgsOperation(1, 2),
diff --git a/tests/postgres_tests/test_operations.py b/tests/postgres_tests/test_operations.py
index ff344e3cb0..bc2ae42096 100644
--- a/tests/postgres_tests/test_operations.py
+++ b/tests/postgres_tests/test_operations.py
@@ -4,6 +4,7 @@ from migrations.test_base import OperationTestBase
from django.db import IntegrityError, NotSupportedError, connection, transaction
from django.db.migrations.state import ProjectState
+from django.db.migrations.writer import OperationWriter
from django.db.models import CheckConstraint, Index, Q, UniqueConstraint
from django.db.utils import ProgrammingError
from django.test import modify_settings, override_settings
@@ -393,6 +394,25 @@ class CreateCollationTests(PostgreSQLTestCase):
self.assertEqual(len(captured_queries), 1)
self.assertIn("DROP COLLATION", captured_queries[0]["sql"])
+ def test_writer(self):
+ operation = CreateCollation(
+ "sample_collation",
+ "und-u-ks-level2",
+ provider="icu",
+ deterministic=False,
+ )
+ buff, imports = OperationWriter(operation, indentation=0).serialize()
+ self.assertEqual(imports, {"import django.contrib.postgres.operations"})
+ self.assertEqual(
+ buff,
+ "django.contrib.postgres.operations.CreateCollation(\n"
+ " name='sample_collation',\n"
+ " locale='und-u-ks-level2',\n"
+ " provider='icu',\n"
+ " deterministic=False,\n"
+ "),",
+ )
+
@unittest.skipUnless(connection.vendor == "postgresql", "PostgreSQL specific tests.")
class RemoveCollationTests(PostgreSQLTestCase):
From b47bdb4cd9149ee2a39bf1cc9996a36a940bd7d9 Mon Sep 17 00:00:00 2001
From: Eli
Date: Tue, 30 Jan 2024 11:02:58 -0300
Subject: [PATCH 025/316] Fixed #35145 -- Corrected color scheme of vanilla
HTML widgets in admin.
---
django/contrib/admin/static/admin/css/base.css | 2 ++
django/contrib/admin/static/admin/css/dark_mode.css | 4 ++++
2 files changed, 6 insertions(+)
diff --git a/django/contrib/admin/static/admin/css/base.css b/django/contrib/admin/static/admin/css/base.css
index 3a80e3a3c9..f9f47c8592 100644
--- a/django/contrib/admin/static/admin/css/base.css
+++ b/django/contrib/admin/static/admin/css/base.css
@@ -84,6 +84,8 @@ html[data-theme="light"],
"Segoe UI Emoji",
"Segoe UI Symbol",
"Noto Color Emoji";
+
+ color-scheme: light;
}
html, body {
diff --git a/django/contrib/admin/static/admin/css/dark_mode.css b/django/contrib/admin/static/admin/css/dark_mode.css
index c49b6bc26f..2123be05c4 100644
--- a/django/contrib/admin/static/admin/css/dark_mode.css
+++ b/django/contrib/admin/static/admin/css/dark_mode.css
@@ -29,6 +29,8 @@
--close-button-bg: #333333;
--close-button-hover-bg: #666666;
+
+ color-scheme: dark;
}
}
@@ -63,6 +65,8 @@ html[data-theme="dark"] {
--close-button-bg: #333333;
--close-button-hover-bg: #666666;
+
+ color-scheme: dark;
}
/* THEME SWITCH */
From bc8471f0aac8f0c215b9471b594d159783bac19b Mon Sep 17 00:00:00 2001
From: Daniel Garcia Moreno
Date: Fri, 9 Feb 2024 11:49:08 +0100
Subject: [PATCH 026/316] Refs #34900, Refs #34118 -- Updated assertion in
test_skip_class_unless_db_feature() test on Python 3.12.2+.
Python 3.12.2 bring back the skipped tests in the number of running
tests. Refs
https://github.com/python/cpython/commit/0a737639dcd3b7181250f5d56694b192eaddeef0
---
tests/test_utils/tests.py | 8 +++++---
1 file changed, 5 insertions(+), 3 deletions(-)
diff --git a/tests/test_utils/tests.py b/tests/test_utils/tests.py
index e001e119ee..23e430cdc6 100644
--- a/tests/test_utils/tests.py
+++ b/tests/test_utils/tests.py
@@ -184,9 +184,11 @@ class SkippingClassTestCase(TransactionTestCase):
except unittest.SkipTest:
self.fail("SkipTest should not be raised here.")
result = unittest.TextTestRunner(stream=StringIO()).run(test_suite)
- # PY312: Python 3.12.1+ no longer includes skipped tests in the number
- # of running tests.
- self.assertEqual(result.testsRun, 1 if sys.version_info >= (3, 12, 1) else 3)
+ # PY312: Python 3.12.1 does not include skipped tests in the number of
+ # running tests.
+ self.assertEqual(
+ result.testsRun, 1 if sys.version_info[:3] == (3, 12, 1) else 3
+ )
self.assertEqual(len(result.skipped), 2)
self.assertEqual(result.skipped[0][1], "Database has feature(s) __class__")
self.assertEqual(result.skipped[1][1], "Database has feature(s) __class__")
From 3fbee6edeeb65d030b5f10441700b154e9d8e11a Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Alexander=20Lazarevi=C4=87?=
Date: Sat, 10 Feb 2024 18:43:17 +0100
Subject: [PATCH 027/316] Corrected indentation of the "Congrats" page
template.
---
django/views/templates/default_urlconf.html | 492 ++++++++++----------
1 file changed, 246 insertions(+), 246 deletions(-)
diff --git a/django/views/templates/default_urlconf.html b/django/views/templates/default_urlconf.html
index f9e278006d..084eb6e61e 100644
--- a/django/views/templates/default_urlconf.html
+++ b/django/views/templates/default_urlconf.html
@@ -2,251 +2,251 @@
{% get_current_language as LANGUAGE_CODE %}{% get_current_language_bidi as LANGUAGE_BIDI %}
-
-
- {% translate "The install worked successfully! Congratulations!" %}
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
+
+
+ {% translate "The install worked successfully! Congratulations!" %}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ {% translate "The install worked successfully! Congratulations!" %}
+ {% blocktranslate %}You are seeing this page because DEBUG=True is in your settings file and you have not configured any URLs.{% endblocktranslate %}
+
+
-
-
+
+ {% translate "Django Documentation" %} .
+ {% translate 'Topics, references, & how-to’s' %}
+
+
+
+
+
+
+
+ {% translate "Tutorial: A Polling App" %} .
+ {% translate "Get started with Django" %}
+
+
+
+
+
+
+
+ {% translate "Django Community" %} .
+ {% translate "Connect, get help, or contribute" %}
+
+
+
+
From f8ff61c77e5739e24f0b86771747b38033b310ef Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Alexander=20Lazarevi=C4=87?=
Date: Sat, 10 Feb 2024 18:47:14 +0100
Subject: [PATCH 028/316] Fixed #35171 -- Updated the design of the "Congrats"
page.
---
django/views/templates/default_urlconf.html | 43 ++++++++-------------
1 file changed, 16 insertions(+), 27 deletions(-)
diff --git a/django/views/templates/default_urlconf.html b/django/views/templates/default_urlconf.html
index 084eb6e61e..8a8a2b1e17 100644
--- a/django/views/templates/default_urlconf.html
+++ b/django/views/templates/default_urlconf.html
@@ -11,10 +11,7 @@
line-height: 1.15;
}
a {
- color: #19865C;
- }
- header {
- border-bottom: 1px solid #efefef;
+ color: #092e20;
}
body {
max-width: 960px;
@@ -30,22 +27,21 @@
margin: 0;
font-weight: 400;
}
- header {
- display: grid;
- grid-template-columns: auto auto;
- align-items: self-end;
- justify-content: space-between;
- gap: 7px;
- padding-top: 20px;
- padding-bottom: 10px;
- }
.logo {
+ background-image: url("data:image/svg+xml,%3Csvg xmlns='http://www.w3.org/2000/svg' viewBox='0 0 19.16 6.696'%3E%3Cg fill='rgb(9 46 32)'%3E%3Cpath d='m2.259 3.55e-8h1.048v4.851c-0.5377 0.1021-0.9324 0.1429-1.361 0.1429-1.279 0-1.946-0.5784-1.946-1.688 0-1.068 0.7078-1.763 1.804-1.763 0.1701 0 0.2994 0.01365 0.456 0.0544v-1.598zm0 2.442c-0.1225-0.04079-0.2246-0.0544-0.3539-0.0544-0.5308 0-0.8371 0.3267-0.8371 0.8983 0 0.5582 0.2927 0.8644 0.8303 0.8644 0.1156 0 0.211-0.00681 0.3607-0.02713z'/%3E%3Cpath d='m4.975 1.618v2.43c0 0.837-0.06125 1.239-0.245 1.586-0.1702 0.3335-0.3948 0.5444-0.8575 0.7758l-0.9732-0.4628c0.4628-0.2178 0.6874-0.4082 0.8303-0.701 0.1498-0.2994 0.1974-0.6466 0.1974-1.559v-2.069zm-1.048-1.613h1.048v1.075h-1.048z'/%3E%3Cpath d='m5.608 1.857c0.4628-0.2178 0.9052-0.313 1.388-0.313 0.5377 0 0.8915 0.1429 1.048 0.422 0.08842 0.1565 0.1156 0.3606 0.1156 0.7963v2.13c-0.4696 0.06814-1.062 0.1157-1.497 0.1157-0.8779 0-1.273-0.3063-1.273-0.9868 0-0.7351 0.524-1.075 1.81-1.184v-0.2314c0-0.1905-0.09527-0.2585-0.3607-0.2585-0.3879 0-0.8235 0.1088-1.232 0.3198v-0.8099zm1.64 1.667c-0.6942 0.06814-0.9188 0.177-0.9188 0.4492 0 0.2042 0.1293 0.2995 0.4152 0.2995 0.1566 0 0.2994-0.01365 0.5036-0.04759z'/%3E%3Cpath d='m8.671 1.782c0.6193-0.1634 1.13-0.2382 1.647-0.2382 0.5377 0 0.9256 0.1224 1.157 0.3607 0.2178 0.2245 0.2858 0.4695 0.2858 0.9936v2.055h-1.048v-2.015c0-0.4015-0.1361-0.5513-0.5104-0.5513-0.1429 0-0.2722 0.01365-0.4833 0.0749v2.491h-1.048v-3.171z'/%3E%3Cpath d='m12.17 5.525c0.3676 0.1905 0.735 0.279 1.123 0.279 0.6873 0 0.98-0.279 0.98-0.946v-0.0205c-0.2042 0.1021-0.4084 0.143-0.6805 0.143-0.9188 0-1.504-0.6058-1.504-1.565 0-1.191 0.8644-1.865 2.396-1.865 0.4492 0 0.8644 0.04759 1.368 0.1496l-0.3589 0.7561c-0.2791-0.05449-0.02235-0.00733-0.2332-0.02775v0.1089l0.01357 0.4423 0.0068 0.5717c0.0068 0.1428 0.0068 0.2858 0.01365 0.4287v0.2859c0 0.8984-0.07486 1.32-0.2994 1.667-0.3267 0.5105-0.8916 0.7623-1.695 0.7623-0.4084 0-0.7622-0.06129-1.13-0.2042v-0.9663zm2.083-3.131h-0.03398-0.0749c-0.2041-0.00681-0.4423 0.04759-0.6057 0.1497-0.2517 0.143-0.3811 0.4016-0.3811 0.7691 0 0.5241 0.2587 0.8235 0.7214 0.8235 0.1429 0 0.2586-0.02722 0.3947-0.06805v-0.3607c0-0.1225-0.0068-0.2587-0.0068-0.4016l-0.0068-0.4832-0.0068-0.3471v-0.08171z'/%3E%3Cpath d='m17.48 1.53c1.048 0 1.688 0.6602 1.688 1.729 0 1.096-0.6669 1.783-1.729 1.783-1.048 0-1.695-0.6601-1.695-1.722 4.4e-5 -1.103 0.667-1.79 1.736-1.79zm-0.0205 2.668c0.4016 0 0.6398-0.3335 0.6398-0.912 0-0.5716-0.2314-0.9119-0.6329-0.9119-0.4152 0-0.6535 0.3336-0.6535 0.9119 4.4e-5 0.5786 0.2383 0.912 0.6465 0.912z'/%3E%3C/g%3E%3C/svg%3E");
+ color: #092e20;
+ background-position-x: center;
+ background-repeat: no-repeat;
+ font-size: 2rem;
font-weight: 700;
- font-size: 1.375rem;
+ margin-top: 16px;
+ overflow: hidden;
text-decoration: none;
+ text-indent: 100%;
+ display: inline-block;
}
.figure {
- margin-top: 19vh;
+ margin-top: 22vh;
max-width: 265px;
position: relative;
z-index: -9;
@@ -137,7 +133,7 @@
display: table;
}
.option .option__heading {
- color: #19865C;
+ color: #092e20;
font-size: 1.25rem;
font-weight: 400;
}
@@ -163,11 +159,6 @@
main h1 {
font-size: 1.25rem;
}
- header {
- grid-template-columns: 1fr;
- padding-left: 20px;
- padding-right: 20px;
- }
footer {
width: 100%;
margin-top: 50px;
@@ -199,12 +190,6 @@
-
@@ -217,7 +202,11 @@
{% translate "The install worked successfully! Congratulations!" %}
+
+ {% blocktranslate %}View release notes for Django {{ version }}{% endblocktranslate %}
+
{% blocktranslate %}You are seeing this page because DEBUG=True is in your settings file and you have not configured any URLs.{% endblocktranslate %}
+ Django
From 222bf2932b55ebc964ffc5f9a6f47bad083e5ac2 Mon Sep 17 00:00:00 2001
From: David Smith
Date: Mon, 12 Feb 2024 07:50:08 +0000
Subject: [PATCH 029/316] Refs #35058 -- Added support for measured geometries
to GDAL GeometryCollection and subclasses.
---
django/contrib/gis/gdal/geometries.py | 16 +++++++---
docs/releases/5.1.txt | 9 +++---
tests/gis_tests/gdal_tests/test_geom.py | 40 ++++++++++++++++++++-----
3 files changed, 49 insertions(+), 16 deletions(-)
diff --git a/django/contrib/gis/gdal/geometries.py b/django/contrib/gis/gdal/geometries.py
index 6ee98c412d..44e1026e3f 100644
--- a/django/contrib/gis/gdal/geometries.py
+++ b/django/contrib/gis/gdal/geometries.py
@@ -801,14 +801,22 @@ GEO_CLASSES = {
2001: Point, # POINT M
2002: LineString, # LINESTRING M
2003: Polygon, # POLYGON M
+ 2004: MultiPoint, # MULTIPOINT M
+ 2005: MultiLineString, # MULTILINESTRING M
+ 2006: MultiPolygon, # MULTIPOLYGON M
+ 2007: GeometryCollection, # GEOMETRYCOLLECTION M
3001: Point, # POINT ZM
3002: LineString, # LINESTRING ZM
3003: Polygon, # POLYGON ZM
+ 3004: MultiPoint, # MULTIPOINT ZM
+ 3005: MultiLineString, # MULTILINESTRING ZM
+ 3006: MultiPolygon, # MULTIPOLYGON ZM
+ 3007: GeometryCollection, # GEOMETRYCOLLECTION ZM
1 + OGRGeomType.wkb25bit: Point, # POINT Z
2 + OGRGeomType.wkb25bit: LineString, # LINESTRING Z
3 + OGRGeomType.wkb25bit: Polygon, # POLYGON Z
- 4 + OGRGeomType.wkb25bit: MultiPoint,
- 5 + OGRGeomType.wkb25bit: MultiLineString,
- 6 + OGRGeomType.wkb25bit: MultiPolygon,
- 7 + OGRGeomType.wkb25bit: GeometryCollection,
+ 4 + OGRGeomType.wkb25bit: MultiPoint, # MULTIPOINT Z
+ 5 + OGRGeomType.wkb25bit: MultiLineString, # MULTILINESTRING Z
+ 6 + OGRGeomType.wkb25bit: MultiPolygon, # MULTIPOLYGON Z
+ 7 + OGRGeomType.wkb25bit: GeometryCollection, # GEOMETRYCOLLECTION Z
}
diff --git a/docs/releases/5.1.txt b/docs/releases/5.1.txt
index aca1281a98..94c342e8a0 100644
--- a/docs/releases/5.1.txt
+++ b/docs/releases/5.1.txt
@@ -81,10 +81,11 @@ Minor features
* :class:`~django.contrib.gis.gdal.OGRGeometry`,
:class:`~django.contrib.gis.gdal.Point`,
- :class:`~django.contrib.gis.gdal.LineString`, and
- :class:`~django.contrib.gis.gdal.Polygon` now support measured geometries
- via the new :attr:`.OGRGeometry.is_measured` and ``m`` properties, and the
- :meth:`.OGRGeometry.set_measured` method.
+ :class:`~django.contrib.gis.gdal.LineString`,
+ :class:`~django.contrib.gis.gdal.Polygon`, and
+ :class:`~django.contrib.gis.gdal.GeometryCollection` and its subclasses now
+ support measured geometries via the new :attr:`.OGRGeometry.is_measured` and
+ ``m`` properties, and the :meth:`.OGRGeometry.set_measured` method.
* :attr:`.OGRGeometry.centroid` is now available on all supported geometry
types.
diff --git a/tests/gis_tests/gdal_tests/test_geom.py b/tests/gis_tests/gdal_tests/test_geom.py
index 35b11b753a..3967b945a4 100644
--- a/tests/gis_tests/gdal_tests/test_geom.py
+++ b/tests/gis_tests/gdal_tests/test_geom.py
@@ -675,10 +675,10 @@ class OGRGeomTest(SimpleTestCase, TestDataMixin):
("Point M", 2001, True),
("LineString M", 2002, True),
("Polygon M", 2003, True),
- ("MultiPoint M", 2004, False),
- ("MultiLineString M", 2005, False),
- ("MultiPolygon M", 2006, False),
- ("GeometryCollection M", 2007, False),
+ ("MultiPoint M", 2004, True),
+ ("MultiLineString M", 2005, True),
+ ("MultiPolygon M", 2006, True),
+ ("GeometryCollection M", 2007, True),
("CircularString M", 2008, False),
("CompoundCurve M", 2009, False),
("CurvePolygon M", 2010, False),
@@ -690,10 +690,10 @@ class OGRGeomTest(SimpleTestCase, TestDataMixin):
("Point ZM", 3001, True),
("LineString ZM", 3002, True),
("Polygon ZM", 3003, True),
- ("MultiPoint ZM", 3004, False),
- ("MultiLineString ZM", 3005, False),
- ("MultiPolygon ZM", 3006, False),
- ("GeometryCollection ZM", 3007, False),
+ ("MultiPoint ZM", 3004, True),
+ ("MultiLineString ZM", 3005, True),
+ ("MultiPolygon ZM", 3006, True),
+ ("GeometryCollection ZM", 3007, True),
("CircularString ZM", 3008, False),
("CompoundCurve ZM", 3009, False),
("CurvePolygon ZM", 3010, False),
@@ -943,6 +943,30 @@ class OGRGeomTest(SimpleTestCase, TestDataMixin):
geom.shell.wkt, "LINEARRING (0 0 0,10 0 0,10 10 0,0 10 0,0 0 0)"
)
+ def test_multi_geometries_m_dimension(self):
+ tests = [
+ "MULTIPOINT M ((10 40 10), (40 30 10), (20 20 10))",
+ "MULTIPOINT ZM ((10 40 0 10), (40 30 1 10), (20 20 1 10))",
+ "MULTILINESTRING M ((10 10 1, 20 20 2),(40 40 1, 30 30 2))",
+ "MULTILINESTRING ZM ((10 10 0 1, 20 20 0 2),(40 40 1, 30 30 0 2))",
+ (
+ "MULTIPOLYGON ZM (((30 20 1 0, 45 40 1 0, 30 20 1 0)),"
+ "((15 5 0 0, 40 10 0 0, 15 5 0 0)))"
+ ),
+ (
+ "GEOMETRYCOLLECTION M (POINT M (40 10 0),"
+ "LINESTRING M (10 10 0, 20 20 0, 10 40 0))"
+ ),
+ (
+ "GEOMETRYCOLLECTION ZM (POINT ZM (40 10 0 1),"
+ "LINESTRING ZM (10 10 1 0, 20 20 1 0, 10 40 1 0))"
+ ),
+ ]
+ for geom_input in tests:
+ with self.subTest(geom_input=geom_input):
+ geom = OGRGeometry(geom_input)
+ self.assertIs(geom.is_measured, True)
+
class DeprecationTests(SimpleTestCase):
def test_coord_setter_deprecation(self):
From cf107fe255dbc4e1619c0985e4becdd9cabe8235 Mon Sep 17 00:00:00 2001
From: Moein Bbp
Date: Wed, 17 Jan 2024 23:45:52 +0330
Subject: [PATCH 030/316] Fixed #35122 -- Made migrate --prune option respect
--app_label.
---
django/core/management/commands/migrate.py | 10 ++--
tests/migrations/test_commands.py | 47 +++++++++++++++++++
.../0001_squashed_0002.py | 30 ++++++++++++
.../__init__.py | 0
4 files changed, 82 insertions(+), 5 deletions(-)
create mode 100644 tests/migrations2/test_migrations_2_squashed_with_replaces/0001_squashed_0002.py
create mode 100644 tests/migrations2/test_migrations_2_squashed_with_replaces/__init__.py
diff --git a/django/core/management/commands/migrate.py b/django/core/management/commands/migrate.py
index 1541843066..3a0e9e87ff 100644
--- a/django/core/management/commands/migrate.py
+++ b/django/core/management/commands/migrate.py
@@ -195,8 +195,11 @@ class Command(BaseCommand):
)
if self.verbosity > 0:
self.stdout.write("Pruning migrations:", self.style.MIGRATE_HEADING)
- to_prune = set(executor.loader.applied_migrations) - set(
- executor.loader.disk_migrations
+ to_prune = sorted(
+ migration
+ for migration in set(executor.loader.applied_migrations)
+ - set(executor.loader.disk_migrations)
+ if migration[0] == app_label
)
squashed_migrations_with_deleted_replaced_migrations = [
migration_key
@@ -222,9 +225,6 @@ class Command(BaseCommand):
)
)
else:
- to_prune = sorted(
- migration for migration in to_prune if migration[0] == app_label
- )
if to_prune:
for migration in to_prune:
app, name = migration
diff --git a/tests/migrations/test_commands.py b/tests/migrations/test_commands.py
index 1f8b3fb011..6ef172ee6f 100644
--- a/tests/migrations/test_commands.py
+++ b/tests/migrations/test_commands.py
@@ -1427,6 +1427,53 @@ class MigrateTests(MigrationTestBase):
with self.assertRaisesMessage(CommandError, msg):
call_command("migrate", prune=True)
+ @override_settings(
+ MIGRATION_MODULES={
+ "migrations": "migrations.test_migrations_squashed_no_replaces",
+ "migrations2": "migrations2.test_migrations_2_squashed_with_replaces",
+ },
+ INSTALLED_APPS=["migrations", "migrations2"],
+ )
+ def test_prune_respect_app_label(self):
+ recorder = MigrationRecorder(connection)
+ recorder.record_applied("migrations", "0001_initial")
+ recorder.record_applied("migrations", "0002_second")
+ recorder.record_applied("migrations", "0001_squashed_0002")
+ # Second app has squashed migrations with replaces.
+ recorder.record_applied("migrations2", "0001_initial")
+ recorder.record_applied("migrations2", "0002_second")
+ recorder.record_applied("migrations2", "0001_squashed_0002")
+ out = io.StringIO()
+ try:
+ call_command("migrate", "migrations", prune=True, stdout=out, no_color=True)
+ self.assertEqual(
+ out.getvalue(),
+ "Pruning migrations:\n"
+ " Pruning migrations.0001_initial OK\n"
+ " Pruning migrations.0002_second OK\n",
+ )
+ applied_migrations = [
+ migration
+ for migration in recorder.applied_migrations()
+ if migration[0] in ["migrations", "migrations2"]
+ ]
+ self.assertEqual(
+ applied_migrations,
+ [
+ ("migrations", "0001_squashed_0002"),
+ ("migrations2", "0001_initial"),
+ ("migrations2", "0002_second"),
+ ("migrations2", "0001_squashed_0002"),
+ ],
+ )
+ finally:
+ recorder.record_unapplied("migrations", "0001_initial")
+ recorder.record_unapplied("migrations", "0001_second")
+ recorder.record_unapplied("migrations", "0001_squashed_0002")
+ recorder.record_unapplied("migrations2", "0001_initial")
+ recorder.record_unapplied("migrations2", "0002_second")
+ recorder.record_unapplied("migrations2", "0001_squashed_0002")
+
class MakeMigrationsTests(MigrationTestBase):
"""
diff --git a/tests/migrations2/test_migrations_2_squashed_with_replaces/0001_squashed_0002.py b/tests/migrations2/test_migrations_2_squashed_with_replaces/0001_squashed_0002.py
new file mode 100644
index 0000000000..30700e5eb6
--- /dev/null
+++ b/tests/migrations2/test_migrations_2_squashed_with_replaces/0001_squashed_0002.py
@@ -0,0 +1,30 @@
+from django.db import migrations, models
+
+
+class Migration(migrations.Migration):
+ replaces = [
+ ("migrations2", "0001_initial"),
+ ("migrations2", "0002_second"),
+ ]
+
+ operations = [
+ migrations.CreateModel(
+ "OtherAuthor",
+ [
+ ("id", models.AutoField(primary_key=True)),
+ ("name", models.CharField(max_length=255)),
+ ],
+ ),
+ migrations.CreateModel(
+ "OtherBook",
+ [
+ ("id", models.AutoField(primary_key=True)),
+ (
+ "author",
+ models.ForeignKey(
+ "migrations2.OtherAuthor", models.SET_NULL, null=True
+ ),
+ ),
+ ],
+ ),
+ ]
diff --git a/tests/migrations2/test_migrations_2_squashed_with_replaces/__init__.py b/tests/migrations2/test_migrations_2_squashed_with_replaces/__init__.py
new file mode 100644
index 0000000000..e69de29bb2
From bf692b2fdcb5e55fafa5d3d38e286407eeef2ef4 Mon Sep 17 00:00:00 2001
From: Tim Graham
Date: Wed, 14 Feb 2024 01:57:38 -0500
Subject: [PATCH 031/316] Fixed #28263 -- Fixed TestCase setup for databases
that don't support savepoints.
---
django/test/testcases.py | 35 +++++++++++++++++++++++++++++++++--
1 file changed, 33 insertions(+), 2 deletions(-)
diff --git a/django/test/testcases.py b/django/test/testcases.py
index ce681f287c..51b07ae50d 100644
--- a/django/test/testcases.py
+++ b/django/test/testcases.py
@@ -1251,6 +1251,18 @@ def connections_support_transactions(aliases=None):
return all(conn.features.supports_transactions for conn in conns)
+def connections_support_savepoints(aliases=None):
+ """
+ Return whether or not all (or specified) connections support savepoints.
+ """
+ conns = (
+ connections.all()
+ if aliases is None
+ else (connections[alias] for alias in aliases)
+ )
+ return all(conn.features.uses_savepoints for conn in conns)
+
+
class TestData:
"""
Descriptor to provide TestCase instance isolation for attributes assigned
@@ -1325,10 +1337,17 @@ class TestCase(TransactionTestCase):
def _databases_support_transactions(cls):
return connections_support_transactions(cls.databases)
+ @classmethod
+ def _databases_support_savepoints(cls):
+ return connections_support_savepoints(cls.databases)
+
@classmethod
def setUpClass(cls):
super().setUpClass()
- if not cls._databases_support_transactions():
+ if not (
+ cls._databases_support_transactions()
+ and cls._databases_support_savepoints()
+ ):
return
cls.cls_atomics = cls._enter_atomics()
@@ -1356,7 +1375,10 @@ class TestCase(TransactionTestCase):
@classmethod
def tearDownClass(cls):
- if cls._databases_support_transactions():
+ if (
+ cls._databases_support_transactions()
+ and cls._databases_support_savepoints()
+ ):
cls._rollback_atomics(cls.cls_atomics)
for conn in connections.all(initialized_only=True):
conn.close()
@@ -1382,6 +1404,15 @@ class TestCase(TransactionTestCase):
if self.reset_sequences:
raise TypeError("reset_sequences cannot be used on TestCase instances")
self.atomics = self._enter_atomics()
+ if not self._databases_support_savepoints():
+ if self.fixtures:
+ for db_name in self._databases_names(include_mirrors=False):
+ call_command(
+ "loaddata",
+ *self.fixtures,
+ **{"verbosity": 0, "database": db_name},
+ )
+ self.setUpTestData()
def _fixture_teardown(self):
if not self._databases_support_transactions():
From e6fa74f02068b2c112de41e9c785f31041668a64 Mon Sep 17 00:00:00 2001
From: Salvo Polizzi
Date: Sat, 10 Feb 2024 17:50:55 +0100
Subject: [PATCH 032/316] Fixed #35179 -- Made admindocs detect
positional/keyword-only arguments.
---
django/utils/inspect.py | 4 +---
tests/admin_docs/models.py | 6 ++++++
tests/admin_docs/test_views.py | 4 ++++
3 files changed, 11 insertions(+), 3 deletions(-)
diff --git a/django/utils/inspect.py b/django/utils/inspect.py
index 81a15ed2db..4e065f0347 100644
--- a/django/utils/inspect.py
+++ b/django/utils/inspect.py
@@ -68,9 +68,7 @@ def func_accepts_var_args(func):
def method_has_no_args(meth):
"""Return True if a method only accepts 'self'."""
- count = len(
- [p for p in _get_callable_parameters(meth) if p.kind == p.POSITIONAL_OR_KEYWORD]
- )
+ count = len([p for p in _get_callable_parameters(meth) if p.kind in ARG_KINDS])
return count == 0 if inspect.ismethod(meth) else count == 1
diff --git a/tests/admin_docs/models.py b/tests/admin_docs/models.py
index a403259c6d..b4ef84caba 100644
--- a/tests/admin_docs/models.py
+++ b/tests/admin_docs/models.py
@@ -54,6 +54,12 @@ class Person(models.Model):
def dummy_function(self, baz, rox, *some_args, **some_kwargs):
return some_kwargs
+ def dummy_function_keyword_only_arg(self, *, keyword_only_arg):
+ return keyword_only_arg
+
+ def all_kinds_arg_function(self, position_only_arg, /, arg, *, kwarg):
+ return position_only_arg, arg, kwarg
+
@property
def a_property(self):
return "a_property"
diff --git a/tests/admin_docs/test_views.py b/tests/admin_docs/test_views.py
index ef7fde1bf9..064ce27fb0 100644
--- a/tests/admin_docs/test_views.py
+++ b/tests/admin_docs/test_views.py
@@ -280,6 +280,8 @@ class TestModelDetailView(TestDataMixin, AdminDocsTestCase):
self.assertContains(self.response, "Methods with arguments ")
self.assertContains(self.response, "rename_company ")
self.assertContains(self.response, "dummy_function ")
+ self.assertContains(self.response, "dummy_function_keyword_only_arg ")
+ self.assertContains(self.response, "all_kinds_arg_function ")
self.assertContains(self.response, "suffix_company_name ")
def test_methods_with_arguments_display_arguments(self):
@@ -287,6 +289,7 @@ class TestModelDetailView(TestDataMixin, AdminDocsTestCase):
Methods with arguments should have their arguments displayed.
"""
self.assertContains(self.response, "new_name ")
+ self.assertContains(self.response, "keyword_only_arg ")
def test_methods_with_arguments_display_arguments_default_value(self):
"""
@@ -302,6 +305,7 @@ class TestModelDetailView(TestDataMixin, AdminDocsTestCase):
self.assertContains(
self.response, "baz, rox, *some_args, **some_kwargs "
)
+ self.assertContains(self.response, "position_only_arg, arg, kwarg ")
def test_instance_of_property_methods_are_displayed(self):
"""Model properties are displayed as fields."""
From c783e7a3a0e411811aba83158d55e4f2f3091ac7 Mon Sep 17 00:00:00 2001
From: Cosmic Process <126974221+cosmicproc@users.noreply.github.com>
Date: Wed, 14 Feb 2024 18:28:44 +0300
Subject: [PATCH 033/316] Fixed #35195 -- Removed unnecessary type="text/css"
attributes from
diff --git a/django/views/templates/csrf_403.html b/django/views/templates/csrf_403.html
index 402a2c6cdd..85df032b12 100644
--- a/django/views/templates/csrf_403.html
+++ b/django/views/templates/csrf_403.html
@@ -4,7 +4,7 @@
403 Forbidden
-
From b9d539cca79d8100b24b30fabdb21d10154634ec Mon Sep 17 00:00:00 2001
From: Mariusz Felisiak
Date: Fri, 23 Feb 2024 07:30:44 +0100
Subject: [PATCH 072/316] Bumped versions in pre-commit and npm configurations.
---
.pre-commit-config.yaml | 4 ++--
package.json | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/.pre-commit-config.yaml b/.pre-commit-config.yaml
index d6ea11e8e0..a030ca7cc2 100644
--- a/.pre-commit-config.yaml
+++ b/.pre-commit-config.yaml
@@ -1,6 +1,6 @@
repos:
- repo: https://github.com/psf/black-pre-commit-mirror
- rev: 24.1.0
+ rev: 24.2.0
hooks:
- id: black
exclude: \.py-tpl$
@@ -9,7 +9,7 @@ repos:
hooks:
- id: blacken-docs
additional_dependencies:
- - black==24.1.0
+ - black==24.2.0
files: 'docs/.*\.txt$'
- repo: https://github.com/PyCQA/isort
rev: 5.13.2
diff --git a/package.json b/package.json
index 0258997340..51836701e5 100644
--- a/package.json
+++ b/package.json
@@ -10,10 +10,10 @@
},
"devDependencies": {
"eslint": "^8.56.0",
- "puppeteer": "^21.7.0",
+ "puppeteer": "^22.2.0",
"grunt": "^1.6.1",
"grunt-cli": "^1.4.3",
"grunt-contrib-qunit": "^8.0.1",
- "qunit": "^2.20.0"
+ "qunit": "^2.20.1"
}
}
From 50e95ad5367a4a93f94a66a645f9c126f0609f0a Mon Sep 17 00:00:00 2001
From: Florian Apolloner
Date: Fri, 23 Feb 2024 07:44:55 +0100
Subject: [PATCH 073/316] Simplified using DATABASES["OPTIONS"].
DATABASES["OPTIONS"] are always configured.
---
django/db/backends/postgresql/base.py | 11 ++++-------
django/db/backends/postgresql/client.py | 2 +-
tests/dbshell/test_postgresql.py | 1 +
3 files changed, 6 insertions(+), 8 deletions(-)
diff --git a/django/db/backends/postgresql/base.py b/django/db/backends/postgresql/base.py
index 8349d8f310..96ba33a882 100644
--- a/django/db/backends/postgresql/base.py
+++ b/django/db/backends/postgresql/base.py
@@ -190,9 +190,7 @@ class DatabaseWrapper(BaseDatabaseWrapper):
def get_connection_params(self):
settings_dict = self.settings_dict
# None may be used to connect to the default 'postgres' db
- if settings_dict["NAME"] == "" and not settings_dict.get("OPTIONS", {}).get(
- "service"
- ):
+ if settings_dict["NAME"] == "" and not settings_dict["OPTIONS"].get("service"):
raise ImproperlyConfigured(
"settings.DATABASES is improperly configured. "
"Please supply the NAME or OPTIONS['service'] value."
@@ -215,7 +213,7 @@ class DatabaseWrapper(BaseDatabaseWrapper):
}
elif settings_dict["NAME"] is None:
# Connect to the default 'postgres' db.
- settings_dict.get("OPTIONS", {}).pop("service", None)
+ settings_dict["OPTIONS"].pop("service", None)
conn_params = {"dbname": "postgres", **settings_dict["OPTIONS"]}
else:
conn_params = {**settings_dict["OPTIONS"]}
@@ -300,7 +298,7 @@ class DatabaseWrapper(BaseDatabaseWrapper):
def ensure_role(self):
if self.connection is None:
return False
- if new_role := self.settings_dict.get("OPTIONS", {}).get("assume_role"):
+ if new_role := self.settings_dict["OPTIONS"].get("assume_role"):
with self.connection.cursor() as cursor:
sql = self.ops.compose_sql("SET ROLE %s", [new_role])
cursor.execute(sql)
@@ -324,8 +322,7 @@ class DatabaseWrapper(BaseDatabaseWrapper):
def create_cursor(self, name=None):
if name:
if is_psycopg3 and (
- self.settings_dict.get("OPTIONS", {}).get("server_side_binding")
- is not True
+ self.settings_dict["OPTIONS"].get("server_side_binding") is not True
):
# psycopg >= 3 forces the usage of server-side bindings for
# named cursors so a specialized class that implements
diff --git a/django/db/backends/postgresql/client.py b/django/db/backends/postgresql/client.py
index 3b5ddafaca..4d79869e87 100644
--- a/django/db/backends/postgresql/client.py
+++ b/django/db/backends/postgresql/client.py
@@ -9,7 +9,7 @@ class DatabaseClient(BaseDatabaseClient):
@classmethod
def settings_to_cmd_args_env(cls, settings_dict, parameters):
args = [cls.executable_name]
- options = settings_dict.get("OPTIONS", {})
+ options = settings_dict["OPTIONS"]
host = settings_dict.get("HOST")
port = settings_dict.get("PORT")
diff --git a/tests/dbshell/test_postgresql.py b/tests/dbshell/test_postgresql.py
index 53dedaca01..79e2780d56 100644
--- a/tests/dbshell/test_postgresql.py
+++ b/tests/dbshell/test_postgresql.py
@@ -14,6 +14,7 @@ class PostgreSqlDbshellCommandTestCase(SimpleTestCase):
def settings_to_cmd_args_env(self, settings_dict, parameters=None):
if parameters is None:
parameters = []
+ settings_dict.setdefault("OPTIONS", {})
return DatabaseClient.settings_to_cmd_args_env(settings_dict, parameters)
def test_basic(self):
From 6e1ece7ed522c904a674966fa985159b7bbf1545 Mon Sep 17 00:00:00 2001
From: Salvo Polizzi
Date: Thu, 22 Feb 2024 12:04:03 +0100
Subject: [PATCH 074/316] Fixed #35090 -- Deprecated registering URL converters
with the same name.
---
django/urls/converters.py | 12 ++++++++++++
docs/internals/deprecation.txt | 3 +++
docs/ref/urls.txt | 4 ++++
docs/releases/5.1.txt | 3 +++
docs/topics/http/urls.txt | 5 +++++
tests/urlpatterns/tests.py | 36 ++++++++++++++++++++++++++++++++--
6 files changed, 61 insertions(+), 2 deletions(-)
diff --git a/django/urls/converters.py b/django/urls/converters.py
index 9652823508..9b44430580 100644
--- a/django/urls/converters.py
+++ b/django/urls/converters.py
@@ -1,5 +1,8 @@
import functools
import uuid
+import warnings
+
+from django.utils.deprecation import RemovedInDjango60Warning
class IntConverter:
@@ -53,6 +56,15 @@ REGISTERED_CONVERTERS = {}
def register_converter(converter, type_name):
+ if type_name in REGISTERED_CONVERTERS or type_name in DEFAULT_CONVERTERS:
+ # RemovedInDjango60Warning: when the deprecation ends, replace with
+ # raise ValueError(f"Converter {type_name} is already registered.")
+ warnings.warn(
+ f"Converter {type_name!r} is already registered. Support for overriding "
+ "registered converters is deprecated and will be removed in Django 6.0.",
+ RemovedInDjango60Warning,
+ stacklevel=2,
+ )
REGISTERED_CONVERTERS[type_name] = converter()
get_converters.cache_clear()
diff --git a/docs/internals/deprecation.txt b/docs/internals/deprecation.txt
index e91ac062cb..8072075864 100644
--- a/docs/internals/deprecation.txt
+++ b/docs/internals/deprecation.txt
@@ -74,6 +74,9 @@ details on these changes.
* The setter for ``django.contrib.gis.gdal.OGRGeometry.coord_dim`` will be
removed.
+* ``django.urls.register_converter()`` will no longer allow overriding existing
+ converters.
+
.. _deprecation-removed-in-5.1:
5.1
diff --git a/docs/ref/urls.txt b/docs/ref/urls.txt
index e8d51eeda2..2ef873d348 100644
--- a/docs/ref/urls.txt
+++ b/docs/ref/urls.txt
@@ -120,6 +120,10 @@ The ``converter`` argument is a converter class, and ``type_name`` is the
converter name to use in path patterns. See
:ref:`registering-custom-path-converters` for an example.
+.. deprecated:: 5.1
+
+ Overriding existing converters is deprecated.
+
==================================================
``django.conf.urls`` functions for use in URLconfs
==================================================
diff --git a/docs/releases/5.1.txt b/docs/releases/5.1.txt
index a4a7f359c6..9a2f2fc6cc 100644
--- a/docs/releases/5.1.txt
+++ b/docs/releases/5.1.txt
@@ -419,6 +419,9 @@ Miscellaneous
* Setting ``django.contrib.gis.gdal.OGRGeometry.coord_dim`` is deprecated. Use
:meth:`~django.contrib.gis.gdal.OGRGeometry.set_3d` instead.
+* Overriding existing converters with ``django.urls.register_converter()`` is
+ deprecated.
+
Features removed in 5.1
=======================
diff --git a/docs/topics/http/urls.txt b/docs/topics/http/urls.txt
index d8de9635ec..8e57732725 100644
--- a/docs/topics/http/urls.txt
+++ b/docs/topics/http/urls.txt
@@ -183,6 +183,11 @@ Register custom converter classes in your URLconf using
...,
]
+.. deprecated:: 5.1
+
+ Overriding existing converters with ``django.urls.register_converter()`` is
+ deprecated.
+
Using regular expressions
=========================
diff --git a/tests/urlpatterns/tests.py b/tests/urlpatterns/tests.py
index f8d73fdb4a..37109c9a11 100644
--- a/tests/urlpatterns/tests.py
+++ b/tests/urlpatterns/tests.py
@@ -4,10 +4,20 @@ import uuid
from django.core.exceptions import ImproperlyConfigured
from django.test import SimpleTestCase
from django.test.utils import override_settings
-from django.urls import NoReverseMatch, Resolver404, path, re_path, resolve, reverse
+from django.urls import (
+ NoReverseMatch,
+ Resolver404,
+ path,
+ re_path,
+ register_converter,
+ resolve,
+ reverse,
+)
+from django.urls.converters import IntConverter
+from django.utils.deprecation import RemovedInDjango60Warning
from django.views import View
-from .converters import DynamicConverter
+from .converters import Base64Converter, DynamicConverter
from .views import empty_view
included_kwargs = {"base": b"hello", "value": b"world"}
@@ -193,6 +203,28 @@ class SimplifiedURLTests(SimpleTestCase):
with self.assertRaisesMessage(ImproperlyConfigured, msg):
path("foo//", empty_view)
+ def test_warning_override_default_converter(self):
+ # RemovedInDjango60Warning: when the deprecation ends, replace with
+ # msg = "Converter 'int' is already registered."
+ # with self.assertRaisesMessage(ValueError, msg):
+ msg = (
+ "Converter 'int' is already registered. Support for overriding registered "
+ "converters is deprecated and will be removed in Django 6.0."
+ )
+ with self.assertWarnsMessage(RemovedInDjango60Warning, msg):
+ register_converter(IntConverter, "int")
+
+ def test_warning_override_converter(self):
+ # RemovedInDjango60Warning: when the deprecation ends, replace with
+ # msg = "Converter 'base64' is already registered."
+ # with self.assertRaisesMessage(ValueError, msg):
+ msg = (
+ "Converter 'base64' is already registered. Support for overriding "
+ "registered converters is deprecated and will be removed in Django 6.0."
+ )
+ with self.assertWarnsMessage(RemovedInDjango60Warning, msg):
+ register_converter(Base64Converter, "base64")
+
def test_invalid_view(self):
msg = "view must be a callable or a list/tuple in the case of include()."
with self.assertRaisesMessage(TypeError, msg):
From 73d5eb808435bcf27ebc935847196ac9e97b6ddc Mon Sep 17 00:00:00 2001
From: Adam Johnson
Date: Fri, 23 Feb 2024 22:50:09 +0000
Subject: [PATCH 075/316] Fixed #35241 -- Cached model's full parent list.
co-authored-by: Keryn Knight
co-authored-by: Natalia <124304+nessita@users.noreply.github.com>
co-authored-by: David Smith
co-authored-by: Paolo Melchiorre
---
django/contrib/admin/helpers.py | 2 +-
django/db/models/base.py | 10 +++++-----
django/db/models/deletion.py | 4 +---
django/db/models/expressions.py | 2 +-
django/db/models/options.py | 16 ++++++++++++----
django/db/models/query.py | 2 +-
django/db/models/query_utils.py | 4 ++--
django/db/models/sql/compiler.py | 4 ++--
django/forms/models.py | 14 ++++++--------
tests/model_meta/tests.py | 16 ++++++++++------
10 files changed, 41 insertions(+), 33 deletions(-)
diff --git a/django/contrib/admin/helpers.py b/django/contrib/admin/helpers.py
index 90ca7affc8..c4613fa24e 100644
--- a/django/contrib/admin/helpers.py
+++ b/django/contrib/admin/helpers.py
@@ -504,7 +504,7 @@ class InlineAdminForm(AdminForm):
# in parents.)
any(
parent._meta.auto_field or not parent._meta.model._meta.pk.editable
- for parent in self.form._meta.model._meta.get_parent_list()
+ for parent in self.form._meta.model._meta.all_parents
)
)
diff --git a/django/db/models/base.py b/django/db/models/base.py
index 75328e0749..9dda7cbff9 100644
--- a/django/db/models/base.py
+++ b/django/db/models/base.py
@@ -1368,7 +1368,7 @@ class Model(AltersData, metaclass=ModelBase):
constraints = []
if include_meta_constraints:
constraints = [(self.__class__, self._meta.total_unique_constraints)]
- for parent_class in self._meta.get_parent_list():
+ for parent_class in self._meta.all_parents:
if parent_class._meta.unique_together:
unique_togethers.append(
(parent_class, parent_class._meta.unique_together)
@@ -1397,7 +1397,7 @@ class Model(AltersData, metaclass=ModelBase):
# the list of checks.
fields_with_class = [(self.__class__, self._meta.local_fields)]
- for parent_class in self._meta.get_parent_list():
+ for parent_class in self._meta.all_parents:
fields_with_class.append((parent_class, parent_class._meta.local_fields))
for model_class, fields in fields_with_class:
@@ -1546,7 +1546,7 @@ class Model(AltersData, metaclass=ModelBase):
def get_constraints(self):
constraints = [(self.__class__, self._meta.constraints)]
- for parent_class in self._meta.get_parent_list():
+ for parent_class in self._meta.all_parents:
if parent_class._meta.constraints:
constraints.append((parent_class, parent_class._meta.constraints))
return constraints
@@ -1855,7 +1855,7 @@ class Model(AltersData, metaclass=ModelBase):
used_fields = {} # name or attname -> field
# Check that multi-inheritance doesn't cause field name shadowing.
- for parent in cls._meta.get_parent_list():
+ for parent in cls._meta.all_parents:
for f in parent._meta.local_fields:
clash = used_fields.get(f.name) or used_fields.get(f.attname) or None
if clash:
@@ -1875,7 +1875,7 @@ class Model(AltersData, metaclass=ModelBase):
# Check that fields defined in the model don't clash with fields from
# parents, including auto-generated fields like multi-table inheritance
# child accessors.
- for parent in cls._meta.get_parent_list():
+ for parent in cls._meta.all_parents:
for f in parent._meta.get_fields():
if f not in used_fields:
used_fields[f.name] = f
diff --git a/django/db/models/deletion.py b/django/db/models/deletion.py
index 022dec940b..fd3d290a96 100644
--- a/django/db/models/deletion.py
+++ b/django/db/models/deletion.py
@@ -305,13 +305,11 @@ class Collector:
if not collect_related:
return
- if keep_parents:
- parents = set(model._meta.get_parent_list())
model_fast_deletes = defaultdict(list)
protected_objects = defaultdict(list)
for related in get_candidate_relations_to_delete(model._meta):
# Preserve parent reverse relationships if keep_parents=True.
- if keep_parents and related.model in parents:
+ if keep_parents and related.model in model._meta.all_parents:
continue
field = related.field
on_delete = field.remote_field.on_delete
diff --git a/django/db/models/expressions.py b/django/db/models/expressions.py
index e59dfbe249..c7fe3b638a 100644
--- a/django/db/models/expressions.py
+++ b/django/db/models/expressions.py
@@ -1202,7 +1202,7 @@ class RawSQL(Expression):
):
# Resolve parents fields used in raw SQL.
if query.model:
- for parent in query.model._meta.get_parent_list():
+ for parent in query.model._meta.all_parents:
for parent_field in parent._meta.local_fields:
if parent_field.column.lower() in self.sql.lower():
query.resolve_ref(
diff --git a/django/db/models/options.py b/django/db/models/options.py
index e63a81c2d8..7e2896a6a2 100644
--- a/django/db/models/options.py
+++ b/django/db/models/options.py
@@ -692,16 +692,24 @@ class Options:
return res
return []
- def get_parent_list(self):
+ @cached_property
+ def all_parents(self):
"""
- Return all the ancestors of this model as a list ordered by MRO.
+ Return all the ancestors of this model as a tuple ordered by MRO.
Useful for determining if something is an ancestor, regardless of lineage.
"""
result = OrderedSet(self.parents)
for parent in self.parents:
- for ancestor in parent._meta.get_parent_list():
+ for ancestor in parent._meta.all_parents:
result.add(ancestor)
- return list(result)
+ return tuple(result)
+
+ def get_parent_list(self):
+ """
+ Return all the ancestors of this model as a list ordered by MRO.
+ Backward compatibility method.
+ """
+ return list(self.all_parents)
def get_ancestor_link(self, ancestor):
"""
diff --git a/django/db/models/query.py b/django/db/models/query.py
index 94819758dd..cb5c63c0d1 100644
--- a/django/db/models/query.py
+++ b/django/db/models/query.py
@@ -788,7 +788,7 @@ class QuerySet(AltersData):
# model to detect the inheritance pattern ConcreteGrandParent ->
# MultiTableParent -> ProxyChild. Simply checking self.model._meta.proxy
# would not identify that case as involving multiple tables.
- for parent in self.model._meta.get_parent_list():
+ for parent in self.model._meta.all_parents:
if parent._meta.concrete_model is not self.model._meta.concrete_model:
raise ValueError("Can't bulk create a multi-table inherited model")
if not objs:
diff --git a/django/db/models/query_utils.py b/django/db/models/query_utils.py
index e1041b9653..7162c4fea9 100644
--- a/django/db/models/query_utils.py
+++ b/django/db/models/query_utils.py
@@ -403,8 +403,8 @@ def check_rel_lookup_compatibility(model, target_opts, field):
def check(opts):
return (
model._meta.concrete_model == opts.concrete_model
- or opts.concrete_model in model._meta.get_parent_list()
- or model in opts.get_parent_list()
+ or opts.concrete_model in model._meta.all_parents
+ or model in opts.all_parents
)
# If the field is a primary key, then doing a query against the field's
diff --git a/django/db/models/sql/compiler.py b/django/db/models/sql/compiler.py
index 9a0d2eb4e7..b36125c762 100644
--- a/django/db/models/sql/compiler.py
+++ b/django/db/models/sql/compiler.py
@@ -1391,7 +1391,7 @@ class SQLCompiler:
def _get_parent_klass_info(klass_info):
concrete_model = klass_info["model"]._meta.concrete_model
for parent_model, parent_link in concrete_model._meta.parents.items():
- parent_list = parent_model._meta.get_parent_list()
+ all_parents = parent_model._meta.all_parents
yield {
"model": parent_model,
"field": parent_link,
@@ -1402,7 +1402,7 @@ class SQLCompiler:
# Selected columns from a model or its parents.
if (
self.select[select_index][0].target.model == parent_model
- or self.select[select_index][0].target.model in parent_list
+ or self.select[select_index][0].target.model in all_parents
)
],
}
diff --git a/django/forms/models.py b/django/forms/models.py
index 4b11d5af8c..4cda4e534e 100644
--- a/django/forms/models.py
+++ b/django/forms/models.py
@@ -1214,20 +1214,19 @@ def _get_foreign_key(parent_model, model, fk_name=None, can_fail=False):
fks_to_parent = [f for f in opts.fields if f.name == fk_name]
if len(fks_to_parent) == 1:
fk = fks_to_parent[0]
- parent_list = parent_model._meta.get_parent_list()
- parent_list.append(parent_model)
+ all_parents = (*parent_model._meta.all_parents, parent_model)
if (
not isinstance(fk, ForeignKey)
or (
# ForeignKey to proxy models.
fk.remote_field.model._meta.proxy
- and fk.remote_field.model._meta.proxy_for_model not in parent_list
+ and fk.remote_field.model._meta.proxy_for_model not in all_parents
)
or (
# ForeignKey to concrete models.
not fk.remote_field.model._meta.proxy
and fk.remote_field.model != parent_model
- and fk.remote_field.model not in parent_list
+ and fk.remote_field.model not in all_parents
)
):
raise ValueError(
@@ -1240,18 +1239,17 @@ def _get_foreign_key(parent_model, model, fk_name=None, can_fail=False):
)
else:
# Try to discover what the ForeignKey from model to parent_model is
- parent_list = parent_model._meta.get_parent_list()
- parent_list.append(parent_model)
+ all_parents = (*parent_model._meta.all_parents, parent_model)
fks_to_parent = [
f
for f in opts.fields
if isinstance(f, ForeignKey)
and (
f.remote_field.model == parent_model
- or f.remote_field.model in parent_list
+ or f.remote_field.model in all_parents
or (
f.remote_field.model._meta.proxy
- and f.remote_field.model._meta.proxy_for_model in parent_list
+ and f.remote_field.model._meta.proxy_for_model in all_parents
)
)
]
diff --git a/tests/model_meta/tests.py b/tests/model_meta/tests.py
index fef82661cd..0aa04d760d 100644
--- a/tests/model_meta/tests.py
+++ b/tests/model_meta/tests.py
@@ -325,15 +325,19 @@ class RelationTreeTests(SimpleTestCase):
)
-class ParentListTests(SimpleTestCase):
- def test_get_parent_list(self):
- self.assertEqual(CommonAncestor._meta.get_parent_list(), [])
- self.assertEqual(FirstParent._meta.get_parent_list(), [CommonAncestor])
- self.assertEqual(SecondParent._meta.get_parent_list(), [CommonAncestor])
+class AllParentsTests(SimpleTestCase):
+ def test_all_parents(self):
+ self.assertEqual(CommonAncestor._meta.all_parents, ())
+ self.assertEqual(FirstParent._meta.all_parents, (CommonAncestor,))
+ self.assertEqual(SecondParent._meta.all_parents, (CommonAncestor,))
self.assertEqual(
- Child._meta.get_parent_list(), [FirstParent, SecondParent, CommonAncestor]
+ Child._meta.all_parents,
+ (FirstParent, SecondParent, CommonAncestor),
)
+ def test_get_parent_list(self):
+ self.assertEqual(Child._meta.get_parent_list(), list(Child._meta.all_parents))
+
class PropertyNamesTests(SimpleTestCase):
def test_person(self):
From e65deb7d14a57ba788b978d50bd8198e659faa91 Mon Sep 17 00:00:00 2001
From: Adam Johnson
Date: Mon, 26 Feb 2024 05:20:16 +0000
Subject: [PATCH 076/316] Fixed #35246 -- Made Field.unique a cached property.
Co-authored-by: Natalia <124304+nessita@users.noreply.github.com>
---
django/db/models/fields/__init__.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/django/db/models/fields/__init__.py b/django/db/models/fields/__init__.py
index cc5025af84..796c4d23c4 100644
--- a/django/db/models/fields/__init__.py
+++ b/django/db/models/fields/__init__.py
@@ -916,7 +916,7 @@ class Field(RegisterLookupMixin):
return [self.from_db_value]
return []
- @property
+ @cached_property
def unique(self):
return self._unique or self.primary_key
From 977d25416954a72ad100b01762078bf1ceb89a63 Mon Sep 17 00:00:00 2001
From: Mariusz Felisiak
Date: Mon, 26 Feb 2024 08:21:36 +0100
Subject: [PATCH 077/316] Added release date for 5.0.3, 4.2.11, and 3.2.25.
---
docs/releases/3.2.25.txt | 5 +++--
docs/releases/4.2.11.txt | 5 +++--
docs/releases/5.0.3.txt | 5 +++--
3 files changed, 9 insertions(+), 6 deletions(-)
diff --git a/docs/releases/3.2.25.txt b/docs/releases/3.2.25.txt
index c84483f783..aa81c720d5 100644
--- a/docs/releases/3.2.25.txt
+++ b/docs/releases/3.2.25.txt
@@ -2,9 +2,10 @@
Django 3.2.25 release notes
===========================
-*Expected March 4, 2024*
+*March 4, 2024*
-Django 3.2.25 fixes a regression in 3.2.24.
+Django 3.2.25 fixes a security issue with severity "moderate" and a regression
+in 3.2.24.
Bugfixes
========
diff --git a/docs/releases/4.2.11.txt b/docs/releases/4.2.11.txt
index c59f131b1a..82c691fcb7 100644
--- a/docs/releases/4.2.11.txt
+++ b/docs/releases/4.2.11.txt
@@ -2,9 +2,10 @@
Django 4.2.11 release notes
===========================
-*Expected March 4, 2024*
+*March 4, 2024*
-Django 4.2.11 fixes a regression in 4.2.10.
+Django 4.2.11 fixes a security issue with severity "moderate" and a regression
+in 4.2.10.
Bugfixes
========
diff --git a/docs/releases/5.0.3.txt b/docs/releases/5.0.3.txt
index 297e17d023..b6e32b4590 100644
--- a/docs/releases/5.0.3.txt
+++ b/docs/releases/5.0.3.txt
@@ -2,9 +2,10 @@
Django 5.0.3 release notes
==========================
-*Expected March 4, 2024*
+*March 4, 2024*
-Django 5.0.3 fixes several bugs in 5.0.2.
+Django 5.0.3 fixes a security issue with severity "moderate" and several bugs
+in 5.0.2.
Bugfixes
========
From 18d79033b90902a6d6b615b42051191fd1b37892 Mon Sep 17 00:00:00 2001
From: Florian Apolloner
Date: Mon, 26 Feb 2024 10:53:47 +0100
Subject: [PATCH 078/316] Refs #34200 -- Removed unnecessary check in
DatabaseWrapper.ensure_role() on PostgreSQL.
ensure_role() is only called in init_connection_state() where a new
connection is established.
---
django/db/backends/postgresql/base.py | 2 --
1 file changed, 2 deletions(-)
diff --git a/django/db/backends/postgresql/base.py b/django/db/backends/postgresql/base.py
index 96ba33a882..793a7bf3bc 100644
--- a/django/db/backends/postgresql/base.py
+++ b/django/db/backends/postgresql/base.py
@@ -296,8 +296,6 @@ class DatabaseWrapper(BaseDatabaseWrapper):
return False
def ensure_role(self):
- if self.connection is None:
- return False
if new_role := self.settings_dict["OPTIONS"].get("assume_role"):
with self.connection.cursor() as cursor:
sql = self.ops.compose_sql("SET ROLE %s", [new_role])
From ef2434f8508551fee183079ab471b1dc325c7acb Mon Sep 17 00:00:00 2001
From: David Wobrock
Date: Mon, 26 Feb 2024 17:18:48 +0100
Subject: [PATCH 079/316] Refs #32114 -- Fixed test crash on non-picklable
objects in subtests when PickleError is raised.
Related to the https://github.com/python/cpython/issues/73373.
Follow up to c09e8f5fd8f977bf16e9ec5d11b370151fc81ea8.
---
django/test/testcases.py | 2 +-
tests/test_utils/test_testcase.py | 16 +++++++++++++++-
2 files changed, 16 insertions(+), 2 deletions(-)
diff --git a/django/test/testcases.py b/django/test/testcases.py
index 911a2d50ac..0a802c887b 100644
--- a/django/test/testcases.py
+++ b/django/test/testcases.py
@@ -100,7 +100,7 @@ def is_pickable(obj):
"""
try:
pickle.loads(pickle.dumps(obj))
- except (AttributeError, TypeError):
+ except (AttributeError, TypeError, pickle.PickleError):
return False
return True
diff --git a/tests/test_utils/test_testcase.py b/tests/test_utils/test_testcase.py
index 0f41f29a23..efca01e29e 100644
--- a/tests/test_utils/test_testcase.py
+++ b/tests/test_utils/test_testcase.py
@@ -3,17 +3,31 @@ from functools import wraps
from django.db import IntegrityError, connections, transaction
from django.test import TestCase, skipUnlessDBFeature
-from django.test.testcases import DatabaseOperationForbidden, SimpleTestCase, TestData
+from django.test.testcases import (
+ DatabaseOperationForbidden,
+ SimpleTestCase,
+ TestData,
+ is_pickable,
+)
from .models import Car, Person, PossessedCar
+class UnpicklableObject:
+ def __getstate__(self):
+ raise pickle.PickleError("cannot be pickled for testing reasons")
+
+
class TestSimpleTestCase(SimpleTestCase):
def test_is_picklable_with_non_picklable_properties(self):
"""ParallelTestSuite requires that all TestCases are picklable."""
self.non_picklable = lambda: 0
self.assertEqual(self, pickle.loads(pickle.dumps(self)))
+ def test_is_picklable_with_non_picklable_object(self):
+ unpicklable_obj = UnpicklableObject()
+ self.assertEqual(is_pickable(unpicklable_obj), False)
+
class TestTestCase(TestCase):
@skipUnlessDBFeature("can_defer_constraint_checks")
From 107aa76bcf5d5599460fdce61dfa15bb147acc62 Mon Sep 17 00:00:00 2001
From: Adam Zapletal
Date: Fri, 23 Feb 2024 22:36:15 -0600
Subject: [PATCH 080/316] Fixed #29022 -- Fixed handling protocol-relative URLs
in ManifestStaticFilesStorage when STATIC_URL is set to /.
---
django/contrib/staticfiles/storage.py | 2 +-
.../project/static_url_slash/ignored.css | 3 ++
tests/staticfiles_tests/test_storage.py | 28 ++++++++++++++++++-
3 files changed, 31 insertions(+), 2 deletions(-)
create mode 100644 tests/staticfiles_tests/project/static_url_slash/ignored.css
diff --git a/django/contrib/staticfiles/storage.py b/django/contrib/staticfiles/storage.py
index 85172ea42d..191fe3cbb5 100644
--- a/django/contrib/staticfiles/storage.py
+++ b/django/contrib/staticfiles/storage.py
@@ -221,7 +221,7 @@ class HashedFilesMixin:
url = matches["url"]
# Ignore absolute/protocol-relative and data-uri URLs.
- if re.match(r"^[a-z]+:", url):
+ if re.match(r"^[a-z]+:", url) or url.startswith("//"):
return matched
# Ignore absolute URLs that don't point to a static file (dynamic
diff --git a/tests/staticfiles_tests/project/static_url_slash/ignored.css b/tests/staticfiles_tests/project/static_url_slash/ignored.css
new file mode 100644
index 0000000000..369ff04632
--- /dev/null
+++ b/tests/staticfiles_tests/project/static_url_slash/ignored.css
@@ -0,0 +1,3 @@
+body {
+ background: url("//foobar");
+}
diff --git a/tests/staticfiles_tests/test_storage.py b/tests/staticfiles_tests/test_storage.py
index 1e537dfe54..469d5ec690 100644
--- a/tests/staticfiles_tests/test_storage.py
+++ b/tests/staticfiles_tests/test_storage.py
@@ -22,7 +22,7 @@ from .settings import TEST_ROOT
def hashed_file_path(test, path):
fullpath = test.render_template(test.static_template_snippet(path))
- return fullpath.replace(settings.STATIC_URL, "")
+ return fullpath.removeprefix(settings.STATIC_URL)
class TestHashedFiles:
@@ -560,6 +560,32 @@ class TestCollectionManifestStorage(TestHashedFiles, CollectionTestCase):
self.assertEqual(manifest_content, {"dummy.txt": "dummy.txt"})
+@override_settings(
+ STATIC_URL="/",
+ STORAGES={
+ **settings.STORAGES,
+ STATICFILES_STORAGE_ALIAS: {
+ "BACKEND": "django.contrib.staticfiles.storage.ManifestStaticFilesStorage",
+ },
+ },
+)
+class TestCollectionManifestStorageStaticUrlSlash(CollectionTestCase):
+ run_collectstatic_in_setUp = False
+ hashed_file_path = hashed_file_path
+
+ def test_protocol_relative_url_ignored(self):
+ with override_settings(
+ STATICFILES_DIRS=[os.path.join(TEST_ROOT, "project", "static_url_slash")],
+ STATICFILES_FINDERS=["django.contrib.staticfiles.finders.FileSystemFinder"],
+ ):
+ self.run_collectstatic()
+ relpath = self.hashed_file_path("ignored.css")
+ self.assertEqual(relpath, "ignored.61707f5f4942.css")
+ with storage.staticfiles_storage.open(relpath) as relfile:
+ content = relfile.read()
+ self.assertIn(b"//foobar", content)
+
+
@override_settings(
STORAGES={
**settings.STORAGES,
From 7714ccfeae969aca52ad46c1d69a13fac4086c08 Mon Sep 17 00:00:00 2001
From: David Sanders
Date: Thu, 16 Nov 2023 21:56:36 +1100
Subject: [PATCH 081/316] Refs #34964 -- Doc'd that Q expression order is
preserved.
---
docs/ref/models/constraints.txt | 12 ++++++++++++
1 file changed, 12 insertions(+)
diff --git a/docs/ref/models/constraints.txt b/docs/ref/models/constraints.txt
index cc308cedf2..0d6d87afbe 100644
--- a/docs/ref/models/constraints.txt
+++ b/docs/ref/models/constraints.txt
@@ -119,6 +119,18 @@ specifies the check you want the constraint to enforce.
For example, ``CheckConstraint(check=Q(age__gte=18), name='age_gte_18')``
ensures the age field is never less than 18.
+.. admonition:: Expression order
+
+ ``Q`` argument order is not necessarily preserved, however the order of
+ ``Q`` expressions themselves are preserved. This may be important for
+ databases that preserve check constraint expression order for performance
+ reasons. For example, use the following format if order matters::
+
+ CheckConstraint(
+ check=Q(age__gte=18) & Q(expensive_check=condition),
+ name="age_gte_18_and_others",
+ )
+
.. admonition:: Oracle
Checks with nullable fields on Oracle must include a condition allowing for
From 11695b8fdd002362be8d5dc48bc78db09ddf33d8 Mon Sep 17 00:00:00 2001
From: Mariusz Felisiak
Date: Wed, 28 Feb 2024 19:05:32 +0100
Subject: [PATCH 082/316] Removed #django-geo IRC channel in docs.
It's been inactive for several years.
---
docs/ref/contrib/gis/install/index.txt | 3 ---
1 file changed, 3 deletions(-)
diff --git a/docs/ref/contrib/gis/install/index.txt b/docs/ref/contrib/gis/install/index.txt
index e5c2c17bd5..3f948a81d4 100644
--- a/docs/ref/contrib/gis/install/index.txt
+++ b/docs/ref/contrib/gis/install/index.txt
@@ -107,9 +107,6 @@ Troubleshooting
If you can't find the solution to your problem here then participate in the
community! You can:
-* Join the ``#django-geo`` IRC channel on Libera.Chat. Please be patient and
- polite -- while you may not get an immediate response, someone will attempt
- to answer your question as soon as they see it.
* Ask your question on the `GeoDjango`__ forum.
* File a ticket on the `Django trac`__ if you think there's a bug. Make
sure to provide a complete description of the problem, versions used,
From 0e84e70bc8e0140a1e22f25bc6cb852d95a79949 Mon Sep 17 00:00:00 2001
From: Mariusz Felisiak
Date: Thu, 29 Feb 2024 08:22:03 +0100
Subject: [PATCH 083/316] Refs #35090 -- Fixed
urlpatterns.tests.SimplifiedURLTests when run in reverse.
---
tests/urlpatterns/tests.py | 17 ++++++++++++-----
1 file changed, 12 insertions(+), 5 deletions(-)
diff --git a/tests/urlpatterns/tests.py b/tests/urlpatterns/tests.py
index 37109c9a11..370e869560 100644
--- a/tests/urlpatterns/tests.py
+++ b/tests/urlpatterns/tests.py
@@ -13,7 +13,7 @@ from django.urls import (
resolve,
reverse,
)
-from django.urls.converters import IntConverter
+from django.urls.converters import REGISTERED_CONVERTERS, IntConverter
from django.utils.deprecation import RemovedInDjango60Warning
from django.views import View
@@ -211,8 +211,11 @@ class SimplifiedURLTests(SimpleTestCase):
"Converter 'int' is already registered. Support for overriding registered "
"converters is deprecated and will be removed in Django 6.0."
)
- with self.assertWarnsMessage(RemovedInDjango60Warning, msg):
- register_converter(IntConverter, "int")
+ try:
+ with self.assertWarnsMessage(RemovedInDjango60Warning, msg):
+ register_converter(IntConverter, "int")
+ finally:
+ REGISTERED_CONVERTERS.pop("int", None)
def test_warning_override_converter(self):
# RemovedInDjango60Warning: when the deprecation ends, replace with
@@ -222,8 +225,12 @@ class SimplifiedURLTests(SimpleTestCase):
"Converter 'base64' is already registered. Support for overriding "
"registered converters is deprecated and will be removed in Django 6.0."
)
- with self.assertWarnsMessage(RemovedInDjango60Warning, msg):
- register_converter(Base64Converter, "base64")
+ try:
+ with self.assertWarnsMessage(RemovedInDjango60Warning, msg):
+ register_converter(Base64Converter, "base64")
+ register_converter(Base64Converter, "base64")
+ finally:
+ REGISTERED_CONVERTERS.pop("base64", None)
def test_invalid_view(self):
msg = "view must be a callable or a list/tuple in the case of include()."
From 3cb1ba50ccde5b33d6bc5b7cc1ea22c8af3c2aa3 Mon Sep 17 00:00:00 2001
From: kbehlers <43154039+kbehlers@users.noreply.github.com>
Date: Thu, 29 Feb 2024 00:28:20 -0700
Subject: [PATCH 084/316] Fixed typo in docs/ref/contrib/admin/index.txt.
---
docs/ref/contrib/admin/index.txt | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/docs/ref/contrib/admin/index.txt b/docs/ref/contrib/admin/index.txt
index e0e57b9fc0..f75b950262 100644
--- a/docs/ref/contrib/admin/index.txt
+++ b/docs/ref/contrib/admin/index.txt
@@ -1278,7 +1278,7 @@ subclass::
====== ====================
Prefix Lookup
====== ====================
- ^ :lookup:`startswith`
+ ^ :lookup:`istartswith`
= :lookup:`iexact`
@ :lookup:`search`
None :lookup:`icontains`
From a738281265bba5d00711ab62d4d37923764a27eb Mon Sep 17 00:00:00 2001
From: Shafiya Adzhani
Date: Mon, 19 Feb 2024 23:12:21 +0700
Subject: [PATCH 085/316] Fixed #35198 -- Fixed facet filters crash on
querysets with no primary key.
Thanks Simon Alef for the report.
Regression in 868e2fcddae6720d5713924a785339d1665f1bb9.
---
django/contrib/admin/filters.py | 2 +-
docs/releases/5.0.3.txt | 3 ++
tests/admin_filters/tests.py | 53 +++++++++++++++++++++++++++------
3 files changed, 48 insertions(+), 10 deletions(-)
diff --git a/django/contrib/admin/filters.py b/django/contrib/admin/filters.py
index 675c4a5d49..10a039af2a 100644
--- a/django/contrib/admin/filters.py
+++ b/django/contrib/admin/filters.py
@@ -140,7 +140,7 @@ class SimpleListFilter(FacetsMixin, ListFilter):
if lookup_qs is not None:
counts[f"{i}__c"] = models.Count(
pk_attname,
- filter=lookup_qs.query.where,
+ filter=models.Q(pk__in=lookup_qs),
)
self.used_parameters[self.parameter_name] = original_value
return counts
diff --git a/docs/releases/5.0.3.txt b/docs/releases/5.0.3.txt
index b6e32b4590..9db83d0135 100644
--- a/docs/releases/5.0.3.txt
+++ b/docs/releases/5.0.3.txt
@@ -29,3 +29,6 @@ Bugfixes
* Fixed a regression in Django 5.0 that caused a crash when reloading a test
database and a base queryset for a base manager used ``prefetch_related()``
(:ticket:`35238`).
+
+* Fixed a bug in Django 5.0 where facet filters in the admin would crash on a
+ ``SimpleListFilter`` using a queryset without primary keys (:ticket:`35198`).
diff --git a/tests/admin_filters/tests.py b/tests/admin_filters/tests.py
index a3af966005..558164f75c 100644
--- a/tests/admin_filters/tests.py
+++ b/tests/admin_filters/tests.py
@@ -17,7 +17,7 @@ from django.contrib.admin.options import IncorrectLookupParameters, ShowFacets
from django.contrib.auth.admin import UserAdmin
from django.contrib.auth.models import User
from django.core.exceptions import ImproperlyConfigured
-from django.db import connection
+from django.db import connection, models
from django.test import RequestFactory, SimpleTestCase, TestCase, override_settings
from .models import Book, Bookmark, Department, Employee, ImprovedBook, TaggedItem
@@ -154,6 +154,30 @@ class EmployeeNameCustomDividerFilter(FieldListFilter):
return [self.lookup_kwarg]
+class DepartmentOwnershipListFilter(SimpleListFilter):
+ title = "Department Ownership"
+ parameter_name = "department_ownership"
+
+ def lookups(self, request, model_admin):
+ return [
+ ("DEV_OWNED", "Owned by Dev Department"),
+ ("OTHER", "Other"),
+ ]
+
+ def queryset(self, request, queryset):
+ queryset = queryset.annotate(
+ owned_book_count=models.Count(
+ "employee__department",
+ filter=models.Q(employee__department__code="DEV"),
+ ),
+ )
+
+ if self.value() == "DEV_OWNED":
+ return queryset.filter(owned_book_count__gt=0)
+ elif self.value() == "OTHER":
+ return queryset.filter(owned_book_count=0)
+
+
class CustomUserAdmin(UserAdmin):
list_filter = ("books_authored", "books_contributed")
@@ -229,6 +253,7 @@ class DecadeFilterBookAdmin(ModelAdmin):
("author__email", AllValuesFieldListFilter),
("contributors", RelatedOnlyFieldListFilter),
("category", EmptyFieldListFilter),
+ DepartmentOwnershipListFilter,
)
ordering = ("-id",)
@@ -336,6 +361,14 @@ class ListFiltersTests(TestCase):
cls.bob = User.objects.create_user("bob", "bob@example.com")
cls.lisa = User.objects.create_user("lisa", "lisa@example.com")
+ # Departments
+ cls.dev = Department.objects.create(code="DEV", description="Development")
+ cls.design = Department.objects.create(code="DSN", description="Design")
+
+ # Employees
+ cls.john = Employee.objects.create(name="John Blue", department=cls.dev)
+ cls.jack = Employee.objects.create(name="Jack Red", department=cls.design)
+
# Books
cls.djangonaut_book = Book.objects.create(
title="Djangonaut: an art of living",
@@ -345,6 +378,7 @@ class ListFiltersTests(TestCase):
date_registered=cls.today,
availability=True,
category="non-fiction",
+ employee=cls.john,
)
cls.bio_book = Book.objects.create(
title="Django: a biography",
@@ -354,6 +388,7 @@ class ListFiltersTests(TestCase):
no=207,
availability=False,
category="fiction",
+ employee=cls.john,
)
cls.django_book = Book.objects.create(
title="The Django Book",
@@ -363,6 +398,7 @@ class ListFiltersTests(TestCase):
date_registered=cls.today,
no=103,
availability=True,
+ employee=cls.jack,
)
cls.guitar_book = Book.objects.create(
title="Guitar for dummies",
@@ -374,14 +410,6 @@ class ListFiltersTests(TestCase):
)
cls.guitar_book.contributors.set([cls.bob, cls.lisa])
- # Departments
- cls.dev = Department.objects.create(code="DEV", description="Development")
- cls.design = Department.objects.create(code="DSN", description="Design")
-
- # Employees
- cls.john = Employee.objects.create(name="John Blue", department=cls.dev)
- cls.jack = Employee.objects.create(name="Jack Red", department=cls.design)
-
def assertChoicesDisplay(self, choices, expected_displays):
for choice, expected_display in zip(choices, expected_displays, strict=True):
self.assertEqual(choice["display"], expected_display)
@@ -905,6 +933,7 @@ class ListFiltersTests(TestCase):
filterspec.lookup_choices,
[
(self.djangonaut_book.pk, "Djangonaut: an art of living"),
+ (self.bio_book.pk, "Django: a biography"),
(self.django_book.pk, "The Django Book"),
],
)
@@ -1407,6 +1436,8 @@ class ListFiltersTests(TestCase):
["All", "bob (1)", "lisa (1)", "??? (3)"],
# EmptyFieldListFilter.
["All", "Empty (2)", "Not empty (2)"],
+ # SimpleListFilter with join relations.
+ ["All", "Owned by Dev Department (2)", "Other (2)"],
]
for filterspec, expected_displays in zip(filters, tests, strict=True):
with self.subTest(filterspec.__class__.__name__):
@@ -1482,6 +1513,8 @@ class ListFiltersTests(TestCase):
["All", "bob (0)", "lisa (0)", "??? (2)"],
# EmptyFieldListFilter.
["All", "Empty (0)", "Not empty (2)"],
+ # SimpleListFilter with join relations.
+ ["All", "Owned by Dev Department (2)", "Other (0)"],
]
for filterspec, expected_displays in zip(filters, tests, strict=True):
with self.subTest(filterspec.__class__.__name__):
@@ -1525,6 +1558,8 @@ class ListFiltersTests(TestCase):
["All", "bob", "lisa", "???"],
# EmptyFieldListFilter.
["All", "Empty", "Not empty"],
+ # SimpleListFilter with join relations.
+ ["All", "Owned by Dev Department", "Other"],
]
for filterspec, expected_displays in zip(filters, tests, strict=True):
with self.subTest(filterspec.__class__.__name__):
From 0fb104dda287431f5ab74532e45e8471e22b58c8 Mon Sep 17 00:00:00 2001
From: Simon Charette
Date: Sun, 18 Feb 2024 22:55:54 -0500
Subject: [PATCH 086/316] Refs #35234 -- Moved constraint system checks to
Check/UniqueConstraint methods.
---
django/db/models/base.py | 209 +-------------------------------
django/db/models/constraints.py | 180 ++++++++++++++++++++++++++-
2 files changed, 179 insertions(+), 210 deletions(-)
diff --git a/django/db/models/base.py b/django/db/models/base.py
index 9dda7cbff9..ce1c7d1046 100644
--- a/django/db/models/base.py
+++ b/django/db/models/base.py
@@ -28,9 +28,7 @@ from django.db import (
)
from django.db.models import NOT_PROVIDED, ExpressionWrapper, IntegerField, Max, Value
from django.db.models.constants import LOOKUP_SEP
-from django.db.models.constraints import CheckConstraint, UniqueConstraint
from django.db.models.deletion import CASCADE, Collector
-from django.db.models.expressions import RawSQL
from django.db.models.fields.related import (
ForeignObjectRel,
OneToOneField,
@@ -2390,213 +2388,8 @@ class Model(AltersData, metaclass=ModelBase):
if not router.allow_migrate_model(db, cls):
continue
connection = connections[db]
- if not (
- connection.features.supports_table_check_constraints
- or "supports_table_check_constraints" in cls._meta.required_db_features
- ) and any(
- isinstance(constraint, CheckConstraint)
- for constraint in cls._meta.constraints
- ):
- errors.append(
- checks.Warning(
- "%s does not support check constraints."
- % connection.display_name,
- hint=(
- "A constraint won't be created. Silence this "
- "warning if you don't care about it."
- ),
- obj=cls,
- id="models.W027",
- )
- )
- if not (
- connection.features.supports_partial_indexes
- or "supports_partial_indexes" in cls._meta.required_db_features
- ) and any(
- isinstance(constraint, UniqueConstraint)
- and constraint.condition is not None
- for constraint in cls._meta.constraints
- ):
- errors.append(
- checks.Warning(
- "%s does not support unique constraints with "
- "conditions." % connection.display_name,
- hint=(
- "A constraint won't be created. Silence this "
- "warning if you don't care about it."
- ),
- obj=cls,
- id="models.W036",
- )
- )
- if not (
- connection.features.supports_deferrable_unique_constraints
- or "supports_deferrable_unique_constraints"
- in cls._meta.required_db_features
- ) and any(
- isinstance(constraint, UniqueConstraint)
- and constraint.deferrable is not None
- for constraint in cls._meta.constraints
- ):
- errors.append(
- checks.Warning(
- "%s does not support deferrable unique constraints."
- % connection.display_name,
- hint=(
- "A constraint won't be created. Silence this "
- "warning if you don't care about it."
- ),
- obj=cls,
- id="models.W038",
- )
- )
- if not (
- connection.features.supports_covering_indexes
- or "supports_covering_indexes" in cls._meta.required_db_features
- ) and any(
- isinstance(constraint, UniqueConstraint) and constraint.include
- for constraint in cls._meta.constraints
- ):
- errors.append(
- checks.Warning(
- "%s does not support unique constraints with non-key "
- "columns." % connection.display_name,
- hint=(
- "A constraint won't be created. Silence this "
- "warning if you don't care about it."
- ),
- obj=cls,
- id="models.W039",
- )
- )
- if not (
- connection.features.supports_expression_indexes
- or "supports_expression_indexes" in cls._meta.required_db_features
- ) and any(
- isinstance(constraint, UniqueConstraint)
- and constraint.contains_expressions
- for constraint in cls._meta.constraints
- ):
- errors.append(
- checks.Warning(
- "%s does not support unique constraints on "
- "expressions." % connection.display_name,
- hint=(
- "A constraint won't be created. Silence this "
- "warning if you don't care about it."
- ),
- obj=cls,
- id="models.W044",
- )
- )
- if not (
- connection.features.supports_nulls_distinct_unique_constraints
- or (
- "supports_nulls_distinct_unique_constraints"
- in cls._meta.required_db_features
- )
- ) and any(
- isinstance(constraint, UniqueConstraint)
- and constraint.nulls_distinct is not None
- for constraint in cls._meta.constraints
- ):
- errors.append(
- checks.Warning(
- "%s does not support unique constraints with "
- "nulls distinct." % connection.display_name,
- hint=(
- "A constraint won't be created. Silence this "
- "warning if you don't care about it."
- ),
- obj=cls,
- id="models.W047",
- )
- )
- fields = set(
- chain.from_iterable(
- (*constraint.fields, *constraint.include)
- for constraint in cls._meta.constraints
- if isinstance(constraint, UniqueConstraint)
- )
- )
- references = set()
for constraint in cls._meta.constraints:
- if isinstance(constraint, UniqueConstraint):
- if (
- connection.features.supports_partial_indexes
- or "supports_partial_indexes"
- not in cls._meta.required_db_features
- ) and isinstance(constraint.condition, Q):
- references.update(
- cls._get_expr_references(constraint.condition)
- )
- if (
- connection.features.supports_expression_indexes
- or "supports_expression_indexes"
- not in cls._meta.required_db_features
- ) and constraint.contains_expressions:
- for expression in constraint.expressions:
- references.update(cls._get_expr_references(expression))
- elif isinstance(constraint, CheckConstraint):
- if (
- connection.features.supports_table_check_constraints
- or "supports_table_check_constraints"
- not in cls._meta.required_db_features
- ):
- if isinstance(constraint.check, Q):
- references.update(
- cls._get_expr_references(constraint.check)
- )
- if any(
- isinstance(expr, RawSQL)
- for expr in constraint.check.flatten()
- ):
- errors.append(
- checks.Warning(
- f"Check constraint {constraint.name!r} contains "
- f"RawSQL() expression and won't be validated "
- f"during the model full_clean().",
- hint=(
- "Silence this warning if you don't care about "
- "it."
- ),
- obj=cls,
- id="models.W045",
- ),
- )
- for field_name, *lookups in references:
- # pk is an alias that won't be found by opts.get_field.
- if field_name != "pk":
- fields.add(field_name)
- if not lookups:
- # If it has no lookups it cannot result in a JOIN.
- continue
- try:
- if field_name == "pk":
- field = cls._meta.pk
- else:
- field = cls._meta.get_field(field_name)
- if not field.is_relation or field.many_to_many or field.one_to_many:
- continue
- except FieldDoesNotExist:
- continue
- # JOIN must happen at the first lookup.
- first_lookup = lookups[0]
- if (
- hasattr(field, "get_transform")
- and hasattr(field, "get_lookup")
- and field.get_transform(first_lookup) is None
- and field.get_lookup(first_lookup) is None
- ):
- errors.append(
- checks.Error(
- "'constraints' refers to the joined field '%s'."
- % LOOKUP_SEP.join([field_name] + lookups),
- obj=cls,
- id="models.E041",
- )
- )
- errors.extend(cls._check_local_fields(fields, "constraints"))
+ errors.extend(constraint._check(cls, connection))
return errors
diff --git a/django/db/models/constraints.py b/django/db/models/constraints.py
index 56d547e6b0..6c521700d2 100644
--- a/django/db/models/constraints.py
+++ b/django/db/models/constraints.py
@@ -2,9 +2,11 @@ import warnings
from enum import Enum
from types import NoneType
-from django.core.exceptions import FieldError, ValidationError
+from django.core import checks
+from django.core.exceptions import FieldDoesNotExist, FieldError, ValidationError
from django.db import connections
-from django.db.models.expressions import Exists, ExpressionList, F, OrderBy
+from django.db.models.constants import LOOKUP_SEP
+from django.db.models.expressions import Exists, ExpressionList, F, OrderBy, RawSQL
from django.db.models.indexes import IndexExpression
from django.db.models.lookups import Exact
from django.db.models.query_utils import Q
@@ -72,6 +74,47 @@ class BaseConstraint:
def get_violation_error_message(self):
return self.violation_error_message % {"name": self.name}
+ def _check(self, model, connection):
+ return []
+
+ def _check_references(self, model, references):
+ errors = []
+ fields = set()
+ for field_name, *lookups in references:
+ # pk is an alias that won't be found by opts.get_field.
+ if field_name != "pk":
+ fields.add(field_name)
+ if not lookups:
+ # If it has no lookups it cannot result in a JOIN.
+ continue
+ try:
+ if field_name == "pk":
+ field = model._meta.pk
+ else:
+ field = model._meta.get_field(field_name)
+ if not field.is_relation or field.many_to_many or field.one_to_many:
+ continue
+ except FieldDoesNotExist:
+ continue
+ # JOIN must happen at the first lookup.
+ first_lookup = lookups[0]
+ if (
+ hasattr(field, "get_transform")
+ and hasattr(field, "get_lookup")
+ and field.get_transform(first_lookup) is None
+ and field.get_lookup(first_lookup) is None
+ ):
+ errors.append(
+ checks.Error(
+ "'constraints' refers to the joined field '%s'."
+ % LOOKUP_SEP.join([field_name] + lookups),
+ obj=model,
+ id="models.E041",
+ )
+ )
+ errors.extend(model._check_local_fields(fields, "constraints"))
+ return errors
+
def deconstruct(self):
path = "%s.%s" % (self.__class__.__module__, self.__class__.__name__)
path = path.replace("django.db.models.constraints", "django.db.models")
@@ -105,6 +148,41 @@ class CheckConstraint(BaseConstraint):
violation_error_message=violation_error_message,
)
+ def _check(self, model, connection):
+ errors = []
+ if not (
+ connection.features.supports_table_check_constraints
+ or "supports_table_check_constraints" in model._meta.required_db_features
+ ):
+ errors.append(
+ checks.Warning(
+ f"{connection.display_name} does not support check constraints.",
+ hint=(
+ "A constraint won't be created. Silence this warning if you "
+ "don't care about it."
+ ),
+ obj=model,
+ id="models.W027",
+ )
+ )
+ else:
+ references = set()
+ check = self.check
+ if isinstance(check, Q):
+ references.update(model._get_expr_references(check))
+ if any(isinstance(expr, RawSQL) for expr in check.flatten()):
+ errors.append(
+ checks.Warning(
+ f"Check constraint {self.name!r} contains RawSQL() expression "
+ "and won't be validated during the model full_clean().",
+ hint="Silence this warning if you don't care about it.",
+ obj=model,
+ id="models.W045",
+ ),
+ )
+ errors.extend(self._check_references(model, references))
+ return errors
+
def _get_check_sql(self, model, schema_editor):
query = Query(model=model, alias_cols=False)
where = query.build_where(self.check)
@@ -251,6 +329,104 @@ class UniqueConstraint(BaseConstraint):
def contains_expressions(self):
return bool(self.expressions)
+ def _check(self, model, connection):
+ errors = model._check_local_fields({*self.fields, *self.include}, "constraints")
+ required_db_features = model._meta.required_db_features
+ if self.condition is not None and not (
+ connection.features.supports_partial_indexes
+ or "supports_partial_indexes" in required_db_features
+ ):
+ errors.append(
+ checks.Warning(
+ f"{connection.display_name} does not support unique constraints "
+ "with conditions.",
+ hint=(
+ "A constraint won't be created. Silence this warning if you "
+ "don't care about it."
+ ),
+ obj=model,
+ id="models.W036",
+ )
+ )
+ if self.deferrable is not None and not (
+ connection.features.supports_deferrable_unique_constraints
+ or "supports_deferrable_unique_constraints" in required_db_features
+ ):
+ errors.append(
+ checks.Warning(
+ f"{connection.display_name} does not support deferrable unique "
+ "constraints.",
+ hint=(
+ "A constraint won't be created. Silence this warning if you "
+ "don't care about it."
+ ),
+ obj=model,
+ id="models.W038",
+ )
+ )
+ if self.include and not (
+ connection.features.supports_covering_indexes
+ or "supports_covering_indexes" in required_db_features
+ ):
+ errors.append(
+ checks.Warning(
+ f"{connection.display_name} does not support unique constraints "
+ "with non-key columns.",
+ hint=(
+ "A constraint won't be created. Silence this warning if you "
+ "don't care about it."
+ ),
+ obj=model,
+ id="models.W039",
+ )
+ )
+ if self.contains_expressions and not (
+ connection.features.supports_expression_indexes
+ or "supports_expression_indexes" in required_db_features
+ ):
+ errors.append(
+ checks.Warning(
+ f"{connection.display_name} does not support unique constraints on "
+ "expressions.",
+ hint=(
+ "A constraint won't be created. Silence this warning if you "
+ "don't care about it."
+ ),
+ obj=model,
+ id="models.W044",
+ )
+ )
+ if self.nulls_distinct is not None and not (
+ connection.features.supports_nulls_distinct_unique_constraints
+ or "supports_nulls_distinct_unique_constraints" in required_db_features
+ ):
+ errors.append(
+ checks.Warning(
+ f"{connection.display_name} does not support unique constraints "
+ "with nulls distinct.",
+ hint=(
+ "A constraint won't be created. Silence this warning if you "
+ "don't care about it."
+ ),
+ obj=model,
+ id="models.W047",
+ )
+ )
+ references = set()
+ if (
+ connection.features.supports_partial_indexes
+ or "supports_partial_indexes" not in required_db_features
+ ) and isinstance(self.condition, Q):
+ references.update(model._get_expr_references(self.condition))
+ if self.contains_expressions and (
+ connection.features.supports_expression_indexes
+ or "supports_expression_indexes" not in required_db_features
+ ):
+ for expression in self.expressions:
+ references.update(model._get_expr_references(expression))
+ errors.extend(self._check_references(model, references))
+ return errors
+
def _get_condition_sql(self, model, schema_editor):
if self.condition is None:
return None
From f82c67aa217c8dd4320ef697b04a6da1681aa799 Mon Sep 17 00:00:00 2001
From: Simon Charette
Date: Mon, 19 Feb 2024 00:20:13 -0500
Subject: [PATCH 087/316] Fixed #35234 -- Added system checks for invalid model
field names in ExclusionConstraint.expressions.
---
django/contrib/postgres/constraints.py | 8 ++++
tests/postgres_tests/test_constraints.py | 56 ++++++++++++++++++++++++
2 files changed, 64 insertions(+)
diff --git a/django/contrib/postgres/constraints.py b/django/contrib/postgres/constraints.py
index c61072b5a5..ff702c53b0 100644
--- a/django/contrib/postgres/constraints.py
+++ b/django/contrib/postgres/constraints.py
@@ -77,6 +77,14 @@ class ExclusionConstraint(BaseConstraint):
expressions.append(expression)
return ExpressionList(*expressions).resolve_expression(query)
+ def _check(self, model, connection):
+ references = set()
+ for expr, _ in self.expressions:
+ if isinstance(expr, str):
+ expr = F(expr)
+ references.update(model._get_expr_references(expr))
+ return self._check_references(model, references)
+
def _get_condition_sql(self, compiler, schema_editor, query):
if self.condition is None:
return None
diff --git a/tests/postgres_tests/test_constraints.py b/tests/postgres_tests/test_constraints.py
index e5a8e9dbe9..ee0be3cbb3 100644
--- a/tests/postgres_tests/test_constraints.py
+++ b/tests/postgres_tests/test_constraints.py
@@ -2,12 +2,17 @@ import datetime
from unittest import mock
from django.contrib.postgres.indexes import OpClass
+from django.core.checks import Error
from django.core.exceptions import ValidationError
from django.db import IntegrityError, NotSupportedError, connection, transaction
from django.db.models import (
+ CASCADE,
+ CharField,
CheckConstraint,
+ DateField,
Deferrable,
F,
+ ForeignKey,
Func,
IntegerField,
Model,
@@ -328,6 +333,57 @@ class ExclusionConstraintTests(PostgreSQLTestCase):
include="invalid",
)
+ @isolate_apps("postgres_tests")
+ def test_check(self):
+ class Author(Model):
+ name = CharField(max_length=255)
+ alias = CharField(max_length=255)
+
+ class Meta:
+ app_label = "postgres_tests"
+
+ class Book(Model):
+ title = CharField(max_length=255)
+ published_date = DateField()
+ author = ForeignKey(Author, CASCADE)
+
+ class Meta:
+ app_label = "postgres_tests"
+ constraints = [
+ ExclusionConstraint(
+ name="exclude_check",
+ expressions=[
+ (F("title"), RangeOperators.EQUAL),
+ (F("published_date__year"), RangeOperators.EQUAL),
+ ("published_date__month", RangeOperators.EQUAL),
+ (F("author__name"), RangeOperators.EQUAL),
+ ("author__alias", RangeOperators.EQUAL),
+ ("nonexistent", RangeOperators.EQUAL),
+ ],
+ )
+ ]
+
+ self.assertCountEqual(
+ Book.check(databases=self.databases),
+ [
+ Error(
+ "'constraints' refers to the nonexistent field 'nonexistent'.",
+ obj=Book,
+ id="models.E012",
+ ),
+ Error(
+ "'constraints' refers to the joined field 'author__alias'.",
+ obj=Book,
+ id="models.E041",
+ ),
+ Error(
+ "'constraints' refers to the joined field 'author__name'.",
+ obj=Book,
+ id="models.E041",
+ ),
+ ],
+ )
+
def test_repr(self):
constraint = ExclusionConstraint(
name="exclude_overlapping",
From daf7d482dbaaa2604241a994c49f442fa15142c1 Mon Sep 17 00:00:00 2001
From: Simon Charette
Date: Mon, 26 Feb 2024 00:14:26 -0500
Subject: [PATCH 088/316] Refs #35234 -- Deprecated CheckConstraint.check in
favor of .condition.
Once the deprecation period ends CheckConstraint.check() can become the
documented method that performs system checks for BaseConstraint
subclasses.
---
django/db/models/constraints.py | 63 +++++++++---
docs/internals/deprecation.txt | 2 +
docs/ref/models/constraints.txt | 22 +++--
docs/ref/models/options.txt | 2 +-
docs/releases/3.1.txt | 2 +-
docs/releases/5.1.txt | 3 +
tests/admin_changelist/tests.py | 2 +-
tests/check_framework/test_model_checks.py | 14 +--
tests/constraints/models.py | 8 +-
tests/constraints/tests.py | 95 +++++++++++--------
.../gis_migrations/test_operations.py | 2 +-
tests/introspection/models.py | 2 +-
tests/invalid_models_tests/test_models.py | 43 +++++----
tests/migrations/test_autodetector.py | 19 ++--
tests/migrations/test_operations.py | 22 ++---
tests/migrations/test_optimizer.py | 7 +-
tests/migrations/test_state.py | 4 +-
tests/postgres_tests/test_constraints.py | 18 ++--
tests/postgres_tests/test_operations.py | 4 +-
tests/schema/tests.py | 10 +-
tests/validation/models.py | 2 +-
21 files changed, 210 insertions(+), 136 deletions(-)
diff --git a/django/db/models/constraints.py b/django/db/models/constraints.py
index 6c521700d2..e01a68e67b 100644
--- a/django/db/models/constraints.py
+++ b/django/db/models/constraints.py
@@ -134,13 +134,30 @@ class BaseConstraint:
class CheckConstraint(BaseConstraint):
+ # RemovedInDjango60Warning: when the deprecation ends, replace with
+ # def __init__(
+ # self, *, condition, name, violation_error_code=None, violation_error_message=None
+ # )
def __init__(
- self, *, check, name, violation_error_code=None, violation_error_message=None
+ self,
+ *,
+ name,
+ condition=None,
+ check=None,
+ violation_error_code=None,
+ violation_error_message=None,
):
- self.check = check
- if not getattr(check, "conditional", False):
+ if check is not None:
+ warnings.warn(
+ "CheckConstraint.check is deprecated in favor of `.condition`.",
+ RemovedInDjango60Warning,
+ stacklevel=2,
+ )
+ condition = check
+ self.condition = condition
+ if not getattr(condition, "conditional", False):
raise TypeError(
- "CheckConstraint.check must be a Q instance or boolean expression."
+ "CheckConstraint.condition must be a Q instance or boolean expression."
)
super().__init__(
name=name,
@@ -148,6 +165,24 @@ class CheckConstraint(BaseConstraint):
violation_error_message=violation_error_message,
)
+ def _get_check(self):
+ warnings.warn(
+ "CheckConstraint.check is deprecated in favor of `.condition`.",
+ RemovedInDjango60Warning,
+ stacklevel=2,
+ )
+ return self.condition
+
+ def _set_check(self, value):
+ warnings.warn(
+ "CheckConstraint.check is deprecated in favor of `.condition`.",
+ RemovedInDjango60Warning,
+ stacklevel=2,
+ )
+ self.condition = value
+
+ check = property(_get_check, _set_check)
+
def _check(self, model, connection):
errors = []
if not (
@@ -167,10 +202,10 @@ class CheckConstraint(BaseConstraint):
)
else:
references = set()
- check = self.check
- if isinstance(check, Q):
- references.update(model._get_expr_references(check))
- if any(isinstance(expr, RawSQL) for expr in check.flatten()):
+ condition = self.condition
+ if isinstance(condition, Q):
+ references.update(model._get_expr_references(condition))
+ if any(isinstance(expr, RawSQL) for expr in condition.flatten()):
errors.append(
checks.Warning(
f"Check constraint {self.name!r} contains RawSQL() expression "
@@ -185,7 +220,7 @@ class CheckConstraint(BaseConstraint):
def _get_check_sql(self, model, schema_editor):
query = Query(model=model, alias_cols=False)
- where = query.build_where(self.check)
+ where = query.build_where(self.condition)
compiler = query.get_compiler(connection=schema_editor.connection)
sql, params = where.as_sql(compiler, schema_editor.connection)
return sql % tuple(schema_editor.quote_value(p) for p in params)
@@ -204,7 +239,7 @@ class CheckConstraint(BaseConstraint):
def validate(self, model, instance, exclude=None, using=DEFAULT_DB_ALIAS):
against = instance._get_field_value_map(meta=model._meta, exclude=exclude)
try:
- if not Q(self.check).check(against, using=using):
+ if not Q(self.condition).check(against, using=using):
raise ValidationError(
self.get_violation_error_message(), code=self.violation_error_code
)
@@ -212,9 +247,9 @@ class CheckConstraint(BaseConstraint):
pass
def __repr__(self):
- return "<%s: check=%s name=%s%s%s>" % (
+ return "<%s: condition=%s name=%s%s%s>" % (
self.__class__.__qualname__,
- self.check,
+ self.condition,
repr(self.name),
(
""
@@ -233,7 +268,7 @@ class CheckConstraint(BaseConstraint):
if isinstance(other, CheckConstraint):
return (
self.name == other.name
- and self.check == other.check
+ and self.condition == other.condition
and self.violation_error_code == other.violation_error_code
and self.violation_error_message == other.violation_error_message
)
@@ -241,7 +276,7 @@ class CheckConstraint(BaseConstraint):
def deconstruct(self):
path, args, kwargs = super().deconstruct()
- kwargs["check"] = self.check
+ kwargs["condition"] = self.condition
return path, args, kwargs
diff --git a/docs/internals/deprecation.txt b/docs/internals/deprecation.txt
index 8072075864..c0965f676b 100644
--- a/docs/internals/deprecation.txt
+++ b/docs/internals/deprecation.txt
@@ -77,6 +77,8 @@ details on these changes.
* ``django.urls.register_converter()`` will no longer allow overriding existing
converters.
+* The ``check`` keyword argument of ``CheckConstraint`` will be removed.
+
.. _deprecation-removed-in-5.1:
5.1
diff --git a/docs/ref/models/constraints.txt b/docs/ref/models/constraints.txt
index 0d6d87afbe..fa6edfd766 100644
--- a/docs/ref/models/constraints.txt
+++ b/docs/ref/models/constraints.txt
@@ -26,7 +26,7 @@ option.
(including ``name``) each time. To work around name collisions, part of the
name may contain ``'%(app_label)s'`` and ``'%(class)s'``, which are
replaced, respectively, by the lowercased app label and class name of the
- concrete model. For example ``CheckConstraint(check=Q(age__gte=18),
+ concrete model. For example ``CheckConstraint(condition=Q(age__gte=18),
name='%(app_label)s_%(class)s_is_adult')``.
.. admonition:: Validation of Constraints
@@ -104,19 +104,19 @@ This method must be implemented by a subclass.
``CheckConstraint``
===================
-.. class:: CheckConstraint(*, check, name, violation_error_code=None, violation_error_message=None)
+.. class:: CheckConstraint(*, condition, name, violation_error_code=None, violation_error_message=None)
Creates a check constraint in the database.
-``check``
----------
+``condition``
+-------------
-.. attribute:: CheckConstraint.check
+.. attribute:: CheckConstraint.condition
A :class:`Q` object or boolean :class:`~django.db.models.Expression` that
-specifies the check you want the constraint to enforce.
+specifies the conditional check you want the constraint to enforce.
-For example, ``CheckConstraint(check=Q(age__gte=18), name='age_gte_18')``
+For example, ``CheckConstraint(condition=Q(age__gte=18), name='age_gte_18')``
ensures the age field is never less than 18.
.. admonition:: Expression order
@@ -127,7 +127,7 @@ ensures the age field is never less than 18.
reasons. For example, use the following format if order matters::
CheckConstraint(
- check=Q(age__gte=18) & Q(expensive_check=condition),
+ condition=Q(age__gte=18) & Q(expensive_check=condition),
name="age_gte_18_and_others",
)
@@ -138,7 +138,11 @@ ensures the age field is never less than 18.
to behave the same as check constraints validation. For example, if ``age``
is a nullable field::
- CheckConstraint(check=Q(age__gte=18) | Q(age__isnull=True), name="age_gte_18")
+ CheckConstraint(condition=Q(age__gte=18) | Q(age__isnull=True), name="age_gte_18")
+
+.. deprecated:: 5.1
+
+ The ``check`` attribute is deprecated in favor of ``condition``.
``UniqueConstraint``
====================
diff --git a/docs/ref/models/options.txt b/docs/ref/models/options.txt
index 909577be6c..3433d0730f 100644
--- a/docs/ref/models/options.txt
+++ b/docs/ref/models/options.txt
@@ -467,7 +467,7 @@ not be looking at your Django code. For example::
class Meta:
constraints = [
- models.CheckConstraint(check=models.Q(age__gte=18), name="age_gte_18"),
+ models.CheckConstraint(condition=models.Q(age__gte=18), name="age_gte_18"),
]
``verbose_name``
diff --git a/docs/releases/3.1.txt b/docs/releases/3.1.txt
index a872326200..704cf3e6d1 100644
--- a/docs/releases/3.1.txt
+++ b/docs/releases/3.1.txt
@@ -388,7 +388,7 @@ Models
``OneToOneField`` emulates the behavior of the SQL constraint ``ON DELETE
RESTRICT``.
-* :attr:`.CheckConstraint.check` now supports boolean expressions.
+* ``CheckConstraint.check`` now supports boolean expressions.
* The :meth:`.RelatedManager.add`, :meth:`~.RelatedManager.create`, and
:meth:`~.RelatedManager.set` methods now accept callables as values in the
diff --git a/docs/releases/5.1.txt b/docs/releases/5.1.txt
index 9a2f2fc6cc..b2377608f0 100644
--- a/docs/releases/5.1.txt
+++ b/docs/releases/5.1.txt
@@ -422,6 +422,9 @@ Miscellaneous
* Overriding existing converters with ``django.urls.register_converter()`` is
deprecated.
+* The ``check`` keyword argument of ``CheckConstraint`` is deprecated in favor
+ of ``condition``.
+
Features removed in 5.1
=======================
diff --git a/tests/admin_changelist/tests.py b/tests/admin_changelist/tests.py
index 855d216a80..bf85cf038f 100644
--- a/tests/admin_changelist/tests.py
+++ b/tests/admin_changelist/tests.py
@@ -1443,7 +1443,7 @@ class ChangeListTests(TestCase):
["field_3", "related_4_id"],
)
],
- models.CheckConstraint(check=models.Q(id__gt=0), name="foo"),
+ models.CheckConstraint(condition=models.Q(id__gt=0), name="foo"),
models.UniqueConstraint(
fields=["field_5"],
condition=models.Q(id__gt=10),
diff --git a/tests/check_framework/test_model_checks.py b/tests/check_framework/test_model_checks.py
index 3075a61be8..be504f9c2d 100644
--- a/tests/check_framework/test_model_checks.py
+++ b/tests/check_framework/test_model_checks.py
@@ -287,8 +287,8 @@ class ConstraintNameTests(TestCase):
class Model(models.Model):
class Meta:
constraints = [
- models.CheckConstraint(check=models.Q(id__gt=0), name="foo"),
- models.CheckConstraint(check=models.Q(id__lt=100), name="foo"),
+ models.CheckConstraint(condition=models.Q(id__gt=0), name="foo"),
+ models.CheckConstraint(condition=models.Q(id__lt=100), name="foo"),
]
self.assertEqual(
@@ -303,7 +303,7 @@ class ConstraintNameTests(TestCase):
)
def test_collision_in_different_models(self):
- constraint = models.CheckConstraint(check=models.Q(id__gt=0), name="foo")
+ constraint = models.CheckConstraint(condition=models.Q(id__gt=0), name="foo")
class Model1(models.Model):
class Meta:
@@ -328,7 +328,7 @@ class ConstraintNameTests(TestCase):
class AbstractModel(models.Model):
class Meta:
constraints = [
- models.CheckConstraint(check=models.Q(id__gt=0), name="foo")
+ models.CheckConstraint(condition=models.Q(id__gt=0), name="foo")
]
abstract = True
@@ -354,7 +354,7 @@ class ConstraintNameTests(TestCase):
class Meta:
constraints = [
models.CheckConstraint(
- check=models.Q(id__gt=0), name="%(app_label)s_%(class)s_foo"
+ condition=models.Q(id__gt=0), name="%(app_label)s_%(class)s_foo"
),
]
abstract = True
@@ -370,7 +370,7 @@ class ConstraintNameTests(TestCase):
@modify_settings(INSTALLED_APPS={"append": "basic"})
@isolate_apps("basic", "check_framework", kwarg_name="apps")
def test_collision_across_apps(self, apps):
- constraint = models.CheckConstraint(check=models.Q(id__gt=0), name="foo")
+ constraint = models.CheckConstraint(condition=models.Q(id__gt=0), name="foo")
class Model1(models.Model):
class Meta:
@@ -397,7 +397,7 @@ class ConstraintNameTests(TestCase):
@isolate_apps("basic", "check_framework", kwarg_name="apps")
def test_no_collision_across_apps_interpolation(self, apps):
constraint = models.CheckConstraint(
- check=models.Q(id__gt=0), name="%(app_label)s_%(class)s_foo"
+ condition=models.Q(id__gt=0), name="%(app_label)s_%(class)s_foo"
)
class Model1(models.Model):
diff --git a/tests/constraints/models.py b/tests/constraints/models.py
index 3ea5cf2323..87b97b2a85 100644
--- a/tests/constraints/models.py
+++ b/tests/constraints/models.py
@@ -12,15 +12,15 @@ class Product(models.Model):
}
constraints = [
models.CheckConstraint(
- check=models.Q(price__gt=models.F("discounted_price")),
+ condition=models.Q(price__gt=models.F("discounted_price")),
name="price_gt_discounted_price",
),
models.CheckConstraint(
- check=models.Q(price__gt=0),
+ condition=models.Q(price__gt=0),
name="%(app_label)s_%(class)s_price_gt_0",
),
models.CheckConstraint(
- check=models.Q(
+ condition=models.Q(
models.Q(unit__isnull=True) | models.Q(unit__in=["μg/mL", "ng/mL"])
),
name="unicode_unit_list",
@@ -113,7 +113,7 @@ class AbstractModel(models.Model):
}
constraints = [
models.CheckConstraint(
- check=models.Q(age__gte=18),
+ condition=models.Q(age__gte=18),
name="%(app_label)s_%(class)s_adult",
),
]
diff --git a/tests/constraints/tests.py b/tests/constraints/tests.py
index 40fdec6c40..86efaa79e7 100644
--- a/tests/constraints/tests.py
+++ b/tests/constraints/tests.py
@@ -123,104 +123,108 @@ class CheckConstraintTests(TestCase):
check1 = models.Q(price__gt=models.F("discounted_price"))
check2 = models.Q(price__lt=models.F("discounted_price"))
self.assertEqual(
- models.CheckConstraint(check=check1, name="price"),
- models.CheckConstraint(check=check1, name="price"),
+ models.CheckConstraint(condition=check1, name="price"),
+ models.CheckConstraint(condition=check1, name="price"),
)
- self.assertEqual(models.CheckConstraint(check=check1, name="price"), mock.ANY)
- self.assertNotEqual(
- models.CheckConstraint(check=check1, name="price"),
- models.CheckConstraint(check=check1, name="price2"),
+ self.assertEqual(
+ models.CheckConstraint(condition=check1, name="price"), mock.ANY
)
self.assertNotEqual(
- models.CheckConstraint(check=check1, name="price"),
- models.CheckConstraint(check=check2, name="price"),
+ models.CheckConstraint(condition=check1, name="price"),
+ models.CheckConstraint(condition=check1, name="price2"),
)
- self.assertNotEqual(models.CheckConstraint(check=check1, name="price"), 1)
self.assertNotEqual(
- models.CheckConstraint(check=check1, name="price"),
+ models.CheckConstraint(condition=check1, name="price"),
+ models.CheckConstraint(condition=check2, name="price"),
+ )
+ self.assertNotEqual(models.CheckConstraint(condition=check1, name="price"), 1)
+ self.assertNotEqual(
+ models.CheckConstraint(condition=check1, name="price"),
models.CheckConstraint(
- check=check1, name="price", violation_error_message="custom error"
+ condition=check1, name="price", violation_error_message="custom error"
),
)
self.assertNotEqual(
models.CheckConstraint(
- check=check1, name="price", violation_error_message="custom error"
+ condition=check1, name="price", violation_error_message="custom error"
),
models.CheckConstraint(
- check=check1, name="price", violation_error_message="other custom error"
+ condition=check1,
+ name="price",
+ violation_error_message="other custom error",
),
)
self.assertEqual(
models.CheckConstraint(
- check=check1, name="price", violation_error_message="custom error"
+ condition=check1, name="price", violation_error_message="custom error"
),
models.CheckConstraint(
- check=check1, name="price", violation_error_message="custom error"
+ condition=check1, name="price", violation_error_message="custom error"
),
)
self.assertNotEqual(
- models.CheckConstraint(check=check1, name="price"),
+ models.CheckConstraint(condition=check1, name="price"),
models.CheckConstraint(
- check=check1, name="price", violation_error_code="custom_code"
+ condition=check1, name="price", violation_error_code="custom_code"
),
)
self.assertEqual(
models.CheckConstraint(
- check=check1, name="price", violation_error_code="custom_code"
+ condition=check1, name="price", violation_error_code="custom_code"
),
models.CheckConstraint(
- check=check1, name="price", violation_error_code="custom_code"
+ condition=check1, name="price", violation_error_code="custom_code"
),
)
def test_repr(self):
constraint = models.CheckConstraint(
- check=models.Q(price__gt=models.F("discounted_price")),
+ condition=models.Q(price__gt=models.F("discounted_price")),
name="price_gt_discounted_price",
)
self.assertEqual(
repr(constraint),
- "",
)
def test_repr_with_violation_error_message(self):
constraint = models.CheckConstraint(
- check=models.Q(price__lt=1),
+ condition=models.Q(price__lt=1),
name="price_lt_one",
violation_error_message="More than 1",
)
self.assertEqual(
repr(constraint),
- "",
)
def test_repr_with_violation_error_code(self):
constraint = models.CheckConstraint(
- check=models.Q(price__lt=1),
+ condition=models.Q(price__lt=1),
name="price_lt_one",
violation_error_code="more_than_one",
)
self.assertEqual(
repr(constraint),
- "",
)
def test_invalid_check_types(self):
- msg = "CheckConstraint.check must be a Q instance or boolean expression."
+ msg = "CheckConstraint.condition must be a Q instance or boolean expression."
with self.assertRaisesMessage(TypeError, msg):
- models.CheckConstraint(check=models.F("discounted_price"), name="check")
+ models.CheckConstraint(condition=models.F("discounted_price"), name="check")
def test_deconstruction(self):
check = models.Q(price__gt=models.F("discounted_price"))
name = "price_gt_discounted_price"
- constraint = models.CheckConstraint(check=check, name=name)
+ constraint = models.CheckConstraint(condition=check, name=name)
path, args, kwargs = constraint.deconstruct()
self.assertEqual(path, "django.db.models.CheckConstraint")
self.assertEqual(args, ())
- self.assertEqual(kwargs, {"check": check, "name": name})
+ self.assertEqual(kwargs, {"condition": check, "name": name})
@skipUnlessDBFeature("supports_table_check_constraints")
def test_database_constraint(self):
@@ -255,7 +259,7 @@ class CheckConstraintTests(TestCase):
def test_validate(self):
check = models.Q(price__gt=models.F("discounted_price"))
- constraint = models.CheckConstraint(check=check, name="price")
+ constraint = models.CheckConstraint(condition=check, name="price")
# Invalid product.
invalid_product = Product(price=10, discounted_price=42)
with self.assertRaises(ValidationError):
@@ -276,7 +280,7 @@ class CheckConstraintTests(TestCase):
def test_validate_custom_error(self):
check = models.Q(price__gt=models.F("discounted_price"))
constraint = models.CheckConstraint(
- check=check,
+ condition=check,
name="price",
violation_error_message="discount is fake",
violation_error_code="fake_discount",
@@ -290,7 +294,7 @@ class CheckConstraintTests(TestCase):
def test_validate_boolean_expressions(self):
constraint = models.CheckConstraint(
- check=models.expressions.ExpressionWrapper(
+ condition=models.expressions.ExpressionWrapper(
models.Q(price__gt=500) | models.Q(price__lt=500),
output_field=models.BooleanField(),
),
@@ -304,7 +308,7 @@ class CheckConstraintTests(TestCase):
def test_validate_rawsql_expressions_noop(self):
constraint = models.CheckConstraint(
- check=models.expressions.RawSQL(
+ condition=models.expressions.RawSQL(
"price < %s OR price > %s",
(500, 500),
output_field=models.BooleanField(),
@@ -320,7 +324,7 @@ class CheckConstraintTests(TestCase):
def test_validate_nullable_field_with_none(self):
# Nullable fields should be considered valid on None values.
constraint = models.CheckConstraint(
- check=models.Q(price__gte=0),
+ condition=models.Q(price__gte=0),
name="positive_price",
)
constraint.validate(Product, Product())
@@ -328,7 +332,7 @@ class CheckConstraintTests(TestCase):
@skipIfDBFeature("supports_comparing_boolean_expr")
def test_validate_nullable_field_with_isnull(self):
constraint = models.CheckConstraint(
- check=models.Q(price__gte=0) | models.Q(price__isnull=True),
+ condition=models.Q(price__gte=0) | models.Q(price__isnull=True),
name="positive_price",
)
constraint.validate(Product, Product())
@@ -336,11 +340,11 @@ class CheckConstraintTests(TestCase):
@skipUnlessDBFeature("supports_json_field")
def test_validate_nullable_jsonfield(self):
is_null_constraint = models.CheckConstraint(
- check=models.Q(data__isnull=True),
+ condition=models.Q(data__isnull=True),
name="nullable_data",
)
is_not_null_constraint = models.CheckConstraint(
- check=models.Q(data__isnull=False),
+ condition=models.Q(data__isnull=False),
name="nullable_data",
)
is_null_constraint.validate(JSONFieldModel, JSONFieldModel(data=None))
@@ -354,7 +358,7 @@ class CheckConstraintTests(TestCase):
def test_validate_pk_field(self):
constraint_with_pk = models.CheckConstraint(
- check=~models.Q(pk=models.F("age")),
+ condition=~models.Q(pk=models.F("age")),
name="pk_not_age_check",
)
constraint_with_pk.validate(ChildModel, ChildModel(pk=1, age=2))
@@ -369,7 +373,7 @@ class CheckConstraintTests(TestCase):
def test_validate_jsonfield_exact(self):
data = {"release": "5.0.2", "version": "stable"}
json_exact_constraint = models.CheckConstraint(
- check=models.Q(data__version="stable"),
+ condition=models.Q(data__version="stable"),
name="only_stable_version",
)
json_exact_constraint.validate(JSONFieldModel, JSONFieldModel(data=data))
@@ -379,6 +383,19 @@ class CheckConstraintTests(TestCase):
with self.assertRaisesMessage(ValidationError, msg):
json_exact_constraint.validate(JSONFieldModel, JSONFieldModel(data=data))
+ def test_check_deprecation(self):
+ msg = "CheckConstraint.check is deprecated in favor of `.condition`."
+ condition = models.Q(foo="bar")
+ with self.assertWarnsRegex(RemovedInDjango60Warning, msg):
+ constraint = models.CheckConstraint(name="constraint", check=condition)
+ with self.assertWarnsRegex(RemovedInDjango60Warning, msg):
+ self.assertIs(constraint.check, condition)
+ other_condition = models.Q(something="else")
+ with self.assertWarnsRegex(RemovedInDjango60Warning, msg):
+ constraint.check = other_condition
+ with self.assertWarnsRegex(RemovedInDjango60Warning, msg):
+ self.assertIs(constraint.check, other_condition)
+
class UniqueConstraintTests(TestCase):
@classmethod
diff --git a/tests/gis_tests/gis_migrations/test_operations.py b/tests/gis_tests/gis_migrations/test_operations.py
index d2ad67945b..e81d44caf2 100644
--- a/tests/gis_tests/gis_migrations/test_operations.py
+++ b/tests/gis_tests/gis_migrations/test_operations.py
@@ -270,7 +270,7 @@ class OperationTests(OperationTestCase):
Neighborhood = self.current_state.apps.get_model("gis", "Neighborhood")
poly = Polygon(((0, 0), (0, 1), (1, 1), (1, 0), (0, 0)))
constraint = models.CheckConstraint(
- check=models.Q(geom=poly),
+ condition=models.Q(geom=poly),
name="geom_within_constraint",
)
Neighborhood._meta.constraints = [constraint]
diff --git a/tests/introspection/models.py b/tests/introspection/models.py
index d31eb0cbfa..c4a60ab182 100644
--- a/tests/introspection/models.py
+++ b/tests/introspection/models.py
@@ -84,7 +84,7 @@ class CheckConstraintModel(models.Model):
}
constraints = [
models.CheckConstraint(
- name="up_votes_gte_0_check", check=models.Q(up_votes__gte=0)
+ name="up_votes_gte_0_check", condition=models.Q(up_votes__gte=0)
),
]
diff --git a/tests/invalid_models_tests/test_models.py b/tests/invalid_models_tests/test_models.py
index 8df84b1182..a589fec807 100644
--- a/tests/invalid_models_tests/test_models.py
+++ b/tests/invalid_models_tests/test_models.py
@@ -1855,7 +1855,9 @@ class ConstraintsTests(TestCase):
class Meta:
constraints = [
- models.CheckConstraint(check=models.Q(age__gte=18), name="is_adult")
+ models.CheckConstraint(
+ condition=models.Q(age__gte=18), name="is_adult"
+ )
]
errors = Model.check(databases=self.databases)
@@ -1880,7 +1882,9 @@ class ConstraintsTests(TestCase):
class Meta:
required_db_features = {"supports_table_check_constraints"}
constraints = [
- models.CheckConstraint(check=models.Q(age__gte=18), name="is_adult")
+ models.CheckConstraint(
+ condition=models.Q(age__gte=18), name="is_adult"
+ )
]
self.assertEqual(Model.check(databases=self.databases), [])
@@ -1892,7 +1896,7 @@ class ConstraintsTests(TestCase):
constraints = [
models.CheckConstraint(
name="name",
- check=models.Q(missing_field=2),
+ condition=models.Q(missing_field=2),
),
]
@@ -1919,7 +1923,7 @@ class ConstraintsTests(TestCase):
class Meta:
constraints = [
- models.CheckConstraint(name="name", check=models.Q(parents=3)),
+ models.CheckConstraint(name="name", condition=models.Q(parents=3)),
]
self.assertEqual(
@@ -1942,7 +1946,7 @@ class ConstraintsTests(TestCase):
constraints = [
models.CheckConstraint(
name="name",
- check=models.Q(model__isnull=True),
+ condition=models.Q(model__isnull=True),
),
]
@@ -1964,7 +1968,7 @@ class ConstraintsTests(TestCase):
class Meta:
constraints = [
- models.CheckConstraint(name="name", check=models.Q(m2m=2)),
+ models.CheckConstraint(name="name", condition=models.Q(m2m=2)),
]
self.assertEqual(
@@ -1992,7 +1996,7 @@ class ConstraintsTests(TestCase):
constraints = [
models.CheckConstraint(
name="name",
- check=models.Q(fk_1_id=2) | models.Q(fk_2=2),
+ condition=models.Q(fk_1_id=2) | models.Q(fk_2=2),
),
]
@@ -2007,7 +2011,7 @@ class ConstraintsTests(TestCase):
constraints = [
models.CheckConstraint(
name="name",
- check=models.Q(pk__gt=5) & models.Q(age__gt=models.F("pk")),
+ condition=models.Q(pk__gt=5) & models.Q(age__gt=models.F("pk")),
),
]
@@ -2023,7 +2027,7 @@ class ConstraintsTests(TestCase):
class Meta:
constraints = [
- models.CheckConstraint(name="name", check=models.Q(field1=1)),
+ models.CheckConstraint(name="name", condition=models.Q(field1=1)),
]
self.assertEqual(
@@ -2053,20 +2057,21 @@ class ConstraintsTests(TestCase):
constraints = [
models.CheckConstraint(
name="name1",
- check=models.Q(
+ condition=models.Q(
field1__lt=models.F("parent__field1")
+ models.F("parent__field2")
),
),
models.CheckConstraint(
- name="name2", check=models.Q(name=Lower("parent__name"))
+ name="name2", condition=models.Q(name=Lower("parent__name"))
),
models.CheckConstraint(
- name="name3", check=models.Q(parent__field3=models.F("field1"))
+ name="name3",
+ condition=models.Q(parent__field3=models.F("field1")),
),
models.CheckConstraint(
name="name4",
- check=models.Q(name=Lower("previous__name")),
+ condition=models.Q(name=Lower("previous__name")),
),
]
@@ -2100,7 +2105,7 @@ class ConstraintsTests(TestCase):
constraints = [
models.CheckConstraint(
name="name",
- check=models.Q(
+ condition=models.Q(
(
models.Q(name="test")
& models.Q(field1__lt=models.F("parent__field1"))
@@ -2136,16 +2141,18 @@ class ConstraintsTests(TestCase):
class Meta:
required_db_features = {"supports_table_check_constraints"}
constraints = [
- models.CheckConstraint(check=models.Q(id__gt=0), name="q_check"),
models.CheckConstraint(
- check=models.ExpressionWrapper(
+ condition=models.Q(id__gt=0), name="q_check"
+ ),
+ models.CheckConstraint(
+ condition=models.ExpressionWrapper(
models.Q(price__gt=20),
output_field=models.BooleanField(),
),
name="expression_wrapper_check",
),
models.CheckConstraint(
- check=models.expressions.RawSQL(
+ condition=models.expressions.RawSQL(
"id = 0",
params=(),
output_field=models.BooleanField(),
@@ -2153,7 +2160,7 @@ class ConstraintsTests(TestCase):
name="raw_sql_check",
),
models.CheckConstraint(
- check=models.Q(
+ condition=models.Q(
models.ExpressionWrapper(
models.Q(
models.expressions.RawSQL(
diff --git a/tests/migrations/test_autodetector.py b/tests/migrations/test_autodetector.py
index d36b72907d..4b532df516 100644
--- a/tests/migrations/test_autodetector.py
+++ b/tests/migrations/test_autodetector.py
@@ -287,7 +287,7 @@ class AutodetectorTests(BaseAutodetectorTests):
{
"constraints": [
models.CheckConstraint(
- check=models.Q(name__contains="Bob"), name="name_contains_bob"
+ condition=models.Q(name__contains="Bob"), name="name_contains_bob"
)
]
},
@@ -2756,14 +2756,15 @@ class AutodetectorTests(BaseAutodetectorTests):
{
"constraints": [
models.CheckConstraint(
- check=models.Q(name__contains="Bob"), name="name_contains_bob"
+ condition=models.Q(name__contains="Bob"),
+ name="name_contains_bob",
)
]
},
)
changes = self.get_changes([], [author])
constraint = models.CheckConstraint(
- check=models.Q(name__contains="Bob"), name="name_contains_bob"
+ condition=models.Q(name__contains="Bob"), name="name_contains_bob"
)
# Right number of migrations?
self.assertEqual(len(changes["otherapp"]), 1)
@@ -2789,7 +2790,7 @@ class AutodetectorTests(BaseAutodetectorTests):
self.assertNumberMigrations(changes, "testapp", 1)
self.assertOperationTypes(changes, "testapp", 0, ["AddConstraint"])
added_constraint = models.CheckConstraint(
- check=models.Q(name__contains="Bob"), name="name_contains_bob"
+ condition=models.Q(name__contains="Bob"), name="name_contains_bob"
)
self.assertOperationAttributes(
changes, "testapp", 0, 0, model_name="author", constraint=added_constraint
@@ -2838,7 +2839,7 @@ class AutodetectorTests(BaseAutodetectorTests):
{
"constraints": [
models.CheckConstraint(
- check=models.Q(type__in=book_types.keys()),
+ condition=models.Q(type__in=book_types.keys()),
name="book_type_check",
),
],
@@ -2854,7 +2855,7 @@ class AutodetectorTests(BaseAutodetectorTests):
{
"constraints": [
models.CheckConstraint(
- check=models.Q(("type__in", tuple(book_types))),
+ condition=models.Q(("type__in", tuple(book_types))),
name="book_type_check",
),
],
@@ -4168,7 +4169,7 @@ class AutodetectorTests(BaseAutodetectorTests):
"order_with_respect_to": "book",
"constraints": [
models.CheckConstraint(
- check=models.Q(_order__gt=1), name="book_order_gt_1"
+ condition=models.Q(_order__gt=1), name="book_order_gt_1"
),
],
},
@@ -4191,7 +4192,7 @@ class AutodetectorTests(BaseAutodetectorTests):
"order_with_respect_to": "book",
"constraints": [
models.CheckConstraint(
- check=models.Q(_order__gt=1), name="book_order_gt_1"
+ condition=models.Q(_order__gt=1), name="book_order_gt_1"
)
],
},
@@ -4241,7 +4242,7 @@ class AutodetectorTests(BaseAutodetectorTests):
{
"constraints": [
models.CheckConstraint(
- check=models.Q(_order__gt=1),
+ condition=models.Q(_order__gt=1),
name="book_order_gt_1",
),
]
diff --git a/tests/migrations/test_operations.py b/tests/migrations/test_operations.py
index f25bb290a5..3845381454 100644
--- a/tests/migrations/test_operations.py
+++ b/tests/migrations/test_operations.py
@@ -441,7 +441,7 @@ class OperationTests(OperationTestBase):
def test_create_model_with_constraint(self):
where = models.Q(pink__gt=2)
check_constraint = models.CheckConstraint(
- check=where, name="test_constraint_pony_pink_gt_2"
+ condition=where, name="test_constraint_pony_pink_gt_2"
)
operation = migrations.CreateModel(
"Pony",
@@ -484,13 +484,13 @@ class OperationTests(OperationTestBase):
def test_create_model_with_boolean_expression_in_check_constraint(self):
app_label = "test_crmobechc"
rawsql_constraint = models.CheckConstraint(
- check=models.expressions.RawSQL(
+ condition=models.expressions.RawSQL(
"price < %s", (1000,), output_field=models.BooleanField()
),
name=f"{app_label}_price_lt_1000_raw",
)
wrapper_constraint = models.CheckConstraint(
- check=models.expressions.ExpressionWrapper(
+ condition=models.expressions.ExpressionWrapper(
models.Q(price__gt=500) | models.Q(price__lt=500),
output_field=models.BooleanField(),
),
@@ -3858,7 +3858,7 @@ class OperationTests(OperationTestBase):
project_state = self.set_up_test_model("test_addconstraint")
gt_check = models.Q(pink__gt=2)
gt_constraint = models.CheckConstraint(
- check=gt_check, name="test_add_constraint_pony_pink_gt_2"
+ condition=gt_check, name="test_add_constraint_pony_pink_gt_2"
)
gt_operation = migrations.AddConstraint("Pony", gt_constraint)
self.assertEqual(
@@ -3901,7 +3901,7 @@ class OperationTests(OperationTestBase):
# Add another one.
lt_check = models.Q(pink__lt=100)
lt_constraint = models.CheckConstraint(
- check=lt_check, name="test_add_constraint_pony_pink_lt_100"
+ condition=lt_check, name="test_add_constraint_pony_pink_lt_100"
)
lt_operation = migrations.AddConstraint("Pony", lt_constraint)
lt_operation.state_forwards("test_addconstraint", new_state)
@@ -3981,8 +3981,8 @@ class OperationTests(OperationTestBase):
),
]
for check, valid, invalid in checks:
- with self.subTest(check=check, valid=valid, invalid=invalid):
- constraint = models.CheckConstraint(check=check, name="constraint")
+ with self.subTest(condition=check, valid=valid, invalid=invalid):
+ constraint = models.CheckConstraint(condition=check, name="constraint")
operation = migrations.AddConstraint("Author", constraint)
to_state = from_state.clone()
operation.state_forwards(app_label, to_state)
@@ -4006,7 +4006,7 @@ class OperationTests(OperationTestBase):
constraint_name = "add_constraint_or"
from_state = self.set_up_test_model(app_label)
check = models.Q(pink__gt=2, weight__gt=2) | models.Q(weight__lt=0)
- constraint = models.CheckConstraint(check=check, name=constraint_name)
+ constraint = models.CheckConstraint(condition=check, name=constraint_name)
operation = migrations.AddConstraint("Pony", constraint)
to_state = from_state.clone()
operation.state_forwards(app_label, to_state)
@@ -4040,7 +4040,7 @@ class OperationTests(OperationTestBase):
]
from_state = self.apply_operations(app_label, ProjectState(), operations)
constraint = models.CheckConstraint(
- check=models.Q(read=(100 - models.F("unread"))),
+ condition=models.Q(read=(100 - models.F("unread"))),
name="test_addconstraint_combinable_sum_100",
)
operation = migrations.AddConstraint("Book", constraint)
@@ -4058,11 +4058,11 @@ class OperationTests(OperationTestBase):
"test_removeconstraint",
constraints=[
models.CheckConstraint(
- check=models.Q(pink__gt=2),
+ condition=models.Q(pink__gt=2),
name="test_remove_constraint_pony_pink_gt_2",
),
models.CheckConstraint(
- check=models.Q(pink__lt=100),
+ condition=models.Q(pink__lt=100),
name="test_remove_constraint_pony_pink_lt_100",
),
],
diff --git a/tests/migrations/test_optimizer.py b/tests/migrations/test_optimizer.py
index 5c1fe3020e..2acbc7f09f 100644
--- a/tests/migrations/test_optimizer.py
+++ b/tests/migrations/test_optimizer.py
@@ -1208,7 +1208,7 @@ class OptimizerTests(SimpleTestCase):
def test_add_remove_constraint(self):
gt_constraint = models.CheckConstraint(
- check=models.Q(pink__gt=2), name="constraint_pony_pink_gt_2"
+ condition=models.Q(pink__gt=2), name="constraint_pony_pink_gt_2"
)
self.assertOptimizesTo(
[
@@ -1329,7 +1329,7 @@ class OptimizerTests(SimpleTestCase):
def test_create_model_add_constraint(self):
gt_constraint = models.CheckConstraint(
- check=models.Q(weight__gt=0), name="pony_weight_gt_0"
+ condition=models.Q(weight__gt=0), name="pony_weight_gt_0"
)
self.assertOptimizesTo(
[
@@ -1363,7 +1363,8 @@ class OptimizerTests(SimpleTestCase):
options={
"constraints": [
models.CheckConstraint(
- check=models.Q(weight__gt=0), name="pony_weight_gt_0"
+ condition=models.Q(weight__gt=0),
+ name="pony_weight_gt_0",
),
models.UniqueConstraint(
"weight", name="pony_weight_unique"
diff --git a/tests/migrations/test_state.py b/tests/migrations/test_state.py
index 686eba4500..46dff01417 100644
--- a/tests/migrations/test_state.py
+++ b/tests/migrations/test_state.py
@@ -1887,7 +1887,9 @@ class ModelStateTests(SimpleTestCase):
class Meta:
constraints = [
- models.CheckConstraint(check=models.Q(size__gt=1), name="size_gt_1")
+ models.CheckConstraint(
+ condition=models.Q(size__gt=1), name="size_gt_1"
+ )
]
state = ModelState.from_model(ModelWithConstraints)
diff --git a/tests/postgres_tests/test_constraints.py b/tests/postgres_tests/test_constraints.py
index ee0be3cbb3..b3de53efd7 100644
--- a/tests/postgres_tests/test_constraints.py
+++ b/tests/postgres_tests/test_constraints.py
@@ -59,7 +59,7 @@ class SchemaTests(PostgreSQLTestCase):
constraint_name, self.get_constraints(RangesModel._meta.db_table)
)
constraint = CheckConstraint(
- check=Q(ints__contained_by=NumericRange(10, 30)),
+ condition=Q(ints__contained_by=NumericRange(10, 30)),
name=constraint_name,
)
with connection.schema_editor() as editor:
@@ -71,7 +71,7 @@ class SchemaTests(PostgreSQLTestCase):
def test_check_constraint_array_contains(self):
constraint = CheckConstraint(
- check=Q(field__contains=[1]),
+ condition=Q(field__contains=[1]),
name="array_contains",
)
msg = f"Constraint “{constraint.name}” is violated."
@@ -81,7 +81,7 @@ class SchemaTests(PostgreSQLTestCase):
def test_check_constraint_array_length(self):
constraint = CheckConstraint(
- check=Q(field__len=1),
+ condition=Q(field__len=1),
name="array_length",
)
msg = f"Constraint “{constraint.name}” is violated."
@@ -95,7 +95,7 @@ class SchemaTests(PostgreSQLTestCase):
constraint_name, self.get_constraints(RangesModel._meta.db_table)
)
constraint = CheckConstraint(
- check=Q(dates__contains=F("dates_inner")),
+ condition=Q(dates__contains=F("dates_inner")),
name=constraint_name,
)
with connection.schema_editor() as editor:
@@ -119,7 +119,7 @@ class SchemaTests(PostgreSQLTestCase):
constraint_name, self.get_constraints(RangesModel._meta.db_table)
)
constraint = CheckConstraint(
- check=Q(timestamps__contains=F("timestamps_inner")),
+ condition=Q(timestamps__contains=F("timestamps_inner")),
name=constraint_name,
)
with connection.schema_editor() as editor:
@@ -139,7 +139,7 @@ class SchemaTests(PostgreSQLTestCase):
def test_check_constraint_range_contains(self):
constraint = CheckConstraint(
- check=Q(ints__contains=(1, 5)),
+ condition=Q(ints__contains=(1, 5)),
name="ints_contains",
)
msg = f"Constraint “{constraint.name}” is violated."
@@ -148,7 +148,7 @@ class SchemaTests(PostgreSQLTestCase):
def test_check_constraint_range_lower_upper(self):
constraint = CheckConstraint(
- check=Q(ints__startswith__gte=0) & Q(ints__endswith__lte=99),
+ condition=Q(ints__startswith__gte=0) & Q(ints__endswith__lte=99),
name="ints_range_lower_upper",
)
msg = f"Constraint “{constraint.name}” is violated."
@@ -160,12 +160,12 @@ class SchemaTests(PostgreSQLTestCase):
def test_check_constraint_range_lower_with_nulls(self):
constraint = CheckConstraint(
- check=Q(ints__isnull=True) | Q(ints__startswith__gte=0),
+ condition=Q(ints__isnull=True) | Q(ints__startswith__gte=0),
name="ints_optional_positive_range",
)
constraint.validate(RangesModel, RangesModel())
constraint = CheckConstraint(
- check=Q(ints__startswith__gte=0),
+ condition=Q(ints__startswith__gte=0),
name="ints_positive_range",
)
constraint.validate(RangesModel, RangesModel())
diff --git a/tests/postgres_tests/test_operations.py b/tests/postgres_tests/test_operations.py
index bc2ae42096..5780348251 100644
--- a/tests/postgres_tests/test_operations.py
+++ b/tests/postgres_tests/test_operations.py
@@ -496,7 +496,7 @@ class AddConstraintNotValidTests(OperationTestBase):
def test_add(self):
table_name = f"{self.app_label}_pony"
constraint_name = "pony_pink_gte_check"
- constraint = CheckConstraint(check=Q(pink__gte=4), name=constraint_name)
+ constraint = CheckConstraint(condition=Q(pink__gte=4), name=constraint_name)
operation = AddConstraintNotValid("Pony", constraint=constraint)
project_state, new_state = self.make_test_state(self.app_label, operation)
self.assertEqual(
@@ -549,7 +549,7 @@ class ValidateConstraintTests(OperationTestBase):
def test_validate(self):
constraint_name = "pony_pink_gte_check"
- constraint = CheckConstraint(check=Q(pink__gte=4), name=constraint_name)
+ constraint = CheckConstraint(condition=Q(pink__gte=4), name=constraint_name)
operation = AddConstraintNotValid("Pony", constraint=constraint)
project_state, new_state = self.make_test_state(self.app_label, operation)
Pony = new_state.apps.get_model(self.app_label, "Pony")
diff --git a/tests/schema/tests.py b/tests/schema/tests.py
index 52f5f289a1..b912d353eb 100644
--- a/tests/schema/tests.py
+++ b/tests/schema/tests.py
@@ -2791,7 +2791,7 @@ class SchemaTests(TransactionTestCase):
self.isolated_local_models = [DurationModel]
constraint_name = "duration_gte_5_minutes"
constraint = CheckConstraint(
- check=Q(duration__gt=datetime.timedelta(minutes=5)),
+ condition=Q(duration__gt=datetime.timedelta(minutes=5)),
name=constraint_name,
)
DurationModel._meta.constraints = [constraint]
@@ -2821,7 +2821,7 @@ class SchemaTests(TransactionTestCase):
self.isolated_local_models = [JSONConstraintModel]
constraint_name = "check_only_stable_version"
constraint = CheckConstraint(
- check=Q(data__version="stable"),
+ condition=Q(data__version="stable"),
name=constraint_name,
)
JSONConstraintModel._meta.constraints = [constraint]
@@ -2845,7 +2845,7 @@ class SchemaTests(TransactionTestCase):
editor.create_model(Author)
# Add the custom check constraint
constraint = CheckConstraint(
- check=Q(height__gte=0), name="author_height_gte_0_check"
+ condition=Q(height__gte=0), name="author_height_gte_0_check"
)
custom_constraint_name = constraint.name
Author._meta.constraints = [constraint]
@@ -3256,7 +3256,9 @@ class SchemaTests(TransactionTestCase):
"supports_column_check_constraints", "can_introspect_check_constraints"
)
def test_composed_check_constraint_with_fk(self):
- constraint = CheckConstraint(check=Q(author__gt=0), name="book_author_check")
+ constraint = CheckConstraint(
+ condition=Q(author__gt=0), name="book_author_check"
+ )
self._test_composed_constraint_with_fk(constraint)
@skipUnlessDBFeature("allows_multiple_constraints_on_same_fields")
diff --git a/tests/validation/models.py b/tests/validation/models.py
index 612a8dd63a..f6b1e0cd62 100644
--- a/tests/validation/models.py
+++ b/tests/validation/models.py
@@ -173,7 +173,7 @@ class Product(models.Model):
}
constraints = [
models.CheckConstraint(
- check=models.Q(price__gt=models.F("discounted_price")),
+ condition=models.Q(price__gt=models.F("discounted_price")),
name="price_gt_discounted_price_validation",
),
]
From bcccea3ef31c777b73cba41a6255cd866bf87237 Mon Sep 17 00:00:00 2001
From: Florian Apolloner
Date: Fri, 1 Mar 2024 08:06:21 +0100
Subject: [PATCH 089/316] Made runserver close database connections from
migration checks.
---
django/core/management/commands/runserver.py | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/django/core/management/commands/runserver.py b/django/core/management/commands/runserver.py
index 26bbf29d68..132ee4c079 100644
--- a/django/core/management/commands/runserver.py
+++ b/django/core/management/commands/runserver.py
@@ -8,6 +8,7 @@ from datetime import datetime
from django.conf import settings
from django.core.management.base import BaseCommand, CommandError
from django.core.servers.basehttp import WSGIServer, get_internal_wsgi_application, run
+from django.db import connections
from django.utils import autoreload
from django.utils.regex_helper import _lazy_re_compile
@@ -134,6 +135,9 @@ class Command(BaseCommand):
# Need to check migrations here, so can't use the
# requires_migrations_check attribute.
self.check_migrations()
+ # Close all connections opened during migration checking.
+ for conn in connections.all(initialized_only=True):
+ conn.close()
try:
handler = self.get_handler(*args, **options)
From fad334e1a9b54ea1acb8cce02a25934c5acfe99f Mon Sep 17 00:00:00 2001
From: Sarah Boyce <42296566+sarahboyce@users.noreply.github.com>
Date: Mon, 11 Dec 2023 11:37:54 +0100
Subject: [PATCH 090/316] Refs #33497 -- Added connection pool support for
PostgreSQL.
Co-authored-by: Florian Apolloner
Co-authored-by: Ran Benita
---
django/db/backends/base/base.py | 6 +-
django/db/backends/postgresql/base.py | 147 +++++++++++++++++----
django/db/backends/postgresql/creation.py | 5 +
django/db/backends/postgresql/features.py | 32 +++--
docs/ref/databases.txt | 25 ++++
docs/releases/5.1.txt | 3 +
tests/backends/postgresql/tests.py | 152 ++++++++++++++++++++--
tests/requirements/postgres.txt | 1 +
8 files changed, 326 insertions(+), 45 deletions(-)
diff --git a/django/db/backends/base/base.py b/django/db/backends/base/base.py
index 84b9974b40..7a1dfd30d1 100644
--- a/django/db/backends/base/base.py
+++ b/django/db/backends/base/base.py
@@ -17,7 +17,7 @@ from django.db.backends.base.validation import BaseDatabaseValidation
from django.db.backends.signals import connection_created
from django.db.backends.utils import debug_transaction
from django.db.transaction import TransactionManagementError
-from django.db.utils import DatabaseErrorWrapper
+from django.db.utils import DatabaseErrorWrapper, ProgrammingError
from django.utils.asyncio import async_unsafe
from django.utils.functional import cached_property
@@ -271,6 +271,10 @@ class BaseDatabaseWrapper:
def ensure_connection(self):
"""Guarantee that a connection to the database is established."""
if self.connection is None:
+ if self.in_atomic_block and self.closed_in_transaction:
+ raise ProgrammingError(
+ "Cannot open a new connection in an atomic block."
+ )
with self.wrap_database_errors:
self.connect()
diff --git a/django/db/backends/postgresql/base.py b/django/db/backends/postgresql/base.py
index 793a7bf3bc..e97ab6aa89 100644
--- a/django/db/backends/postgresql/base.py
+++ b/django/db/backends/postgresql/base.py
@@ -13,7 +13,7 @@ from django.conf import settings
from django.core.exceptions import ImproperlyConfigured
from django.db import DatabaseError as WrappedDatabaseError
from django.db import connections
-from django.db.backends.base.base import BaseDatabaseWrapper
+from django.db.backends.base.base import NO_DB_ALIAS, BaseDatabaseWrapper
from django.db.backends.utils import CursorDebugWrapper as BaseCursorDebugWrapper
from django.utils.asyncio import async_unsafe
from django.utils.functional import cached_property
@@ -86,6 +86,24 @@ def _get_varchar_column(data):
return "varchar(%(max_length)s)" % data
+def ensure_timezone(connection, ops, timezone_name):
+ conn_timezone_name = connection.info.parameter_status("TimeZone")
+ if timezone_name and conn_timezone_name != timezone_name:
+ with connection.cursor() as cursor:
+ cursor.execute(ops.set_time_zone_sql(), [timezone_name])
+ return True
+ return False
+
+
+def ensure_role(connection, ops, role_name):
+ if role_name:
+ with connection.cursor() as cursor:
+ sql = ops.compose_sql("SET ROLE %s", [role_name])
+ cursor.execute(sql)
+ return True
+ return False
+
+
class DatabaseWrapper(BaseDatabaseWrapper):
vendor = "postgresql"
display_name = "PostgreSQL"
@@ -179,6 +197,53 @@ class DatabaseWrapper(BaseDatabaseWrapper):
ops_class = DatabaseOperations
# PostgreSQL backend-specific attributes.
_named_cursor_idx = 0
+ _connection_pools = {}
+
+ @property
+ def pool(self):
+ pool_options = self.settings_dict["OPTIONS"].get("pool")
+ if self.alias == NO_DB_ALIAS or not pool_options:
+ return None
+
+ if self.alias not in self._connection_pools:
+ if self.settings_dict.get("CONN_MAX_AGE", 0) != 0:
+ raise ImproperlyConfigured(
+ "Pooling doesn't support persistent connections."
+ )
+ # Set the default options.
+ if pool_options is True:
+ pool_options = {}
+
+ try:
+ from psycopg_pool import ConnectionPool
+ except ImportError as err:
+ raise ImproperlyConfigured(
+ "Error loading psycopg_pool module.\nDid you install psycopg[pool]?"
+ ) from err
+
+ connect_kwargs = self.get_connection_params()
+ # Ensure we run in autocommit, Django properly sets it later on.
+ connect_kwargs["autocommit"] = True
+ enable_checks = self.settings_dict["CONN_HEALTH_CHECKS"]
+ pool = ConnectionPool(
+ kwargs=connect_kwargs,
+ open=False, # Do not open the pool during startup.
+ configure=self._configure_connection,
+ check=ConnectionPool.check_connection if enable_checks else None,
+ **pool_options,
+ )
+ # setdefault() ensures that multiple threads don't set this in
+ # parallel. Since we do not open the pool during it's init above,
+ # this means that at worst during startup multiple threads generate
+ # pool objects and the first to set it wins.
+ self._connection_pools.setdefault(self.alias, pool)
+
+ return self._connection_pools[self.alias]
+
+ def close_pool(self):
+ if self.pool:
+ self.pool.close()
+ del self._connection_pools[self.alias]
def get_database_version(self):
"""
@@ -221,6 +286,11 @@ class DatabaseWrapper(BaseDatabaseWrapper):
conn_params.pop("assume_role", None)
conn_params.pop("isolation_level", None)
+
+ pool_options = conn_params.pop("pool", None)
+ if pool_options and not is_psycopg3:
+ raise ImproperlyConfigured("Database pooling requires psycopg >= 3")
+
server_side_binding = conn_params.pop("server_side_binding", None)
conn_params.setdefault(
"cursor_factory",
@@ -272,7 +342,12 @@ class DatabaseWrapper(BaseDatabaseWrapper):
f"Invalid transaction isolation level {isolation_level_value} "
f"specified. Use one of the psycopg.IsolationLevel values."
)
- connection = self.Database.connect(**conn_params)
+ if self.pool:
+ # If nothing else has opened the pool, open it now.
+ self.pool.open()
+ connection = self.pool.getconn()
+ else:
+ connection = self.Database.connect(**conn_params)
if set_isolation_level:
connection.isolation_level = self.isolation_level
if not is_psycopg3:
@@ -285,36 +360,52 @@ class DatabaseWrapper(BaseDatabaseWrapper):
return connection
def ensure_timezone(self):
+ # Close the pool so new connections pick up the correct timezone.
+ self.close_pool()
if self.connection is None:
return False
- conn_timezone_name = self.connection.info.parameter_status("TimeZone")
- timezone_name = self.timezone_name
- if timezone_name and conn_timezone_name != timezone_name:
- with self.connection.cursor() as cursor:
- cursor.execute(self.ops.set_time_zone_sql(), [timezone_name])
- return True
- return False
+ return ensure_timezone(self.connection, self.ops, self.timezone_name)
- def ensure_role(self):
- if new_role := self.settings_dict["OPTIONS"].get("assume_role"):
- with self.connection.cursor() as cursor:
- sql = self.ops.compose_sql("SET ROLE %s", [new_role])
- cursor.execute(sql)
- return True
- return False
+ def _configure_connection(self, connection):
+ # This function is called from init_connection_state and from the
+ # psycopg pool itself after a connection is opened. Make sure that
+ # whatever is done here does not access anything on self aside from
+ # variables.
+
+ # Commit after setting the time zone.
+ commit_tz = ensure_timezone(connection, self.ops, self.timezone_name)
+ # Set the role on the connection. This is useful if the credential used
+ # to login is not the same as the role that owns database resources. As
+ # can be the case when using temporary or ephemeral credentials.
+ role_name = self.settings_dict["OPTIONS"].get("assume_role")
+ commit_role = ensure_role(connection, self.ops, role_name)
+
+ return commit_role or commit_tz
+
+ def _close(self):
+ if self.connection is not None:
+ # `wrap_database_errors` only works for `putconn` as long as there
+ # is no `reset` function set in the pool because it is deferred
+ # into a thread and not directly executed.
+ with self.wrap_database_errors:
+ if self.pool:
+ # Ensure the correct pool is returned. This is a workaround
+ # for tests so a pool can be changed on setting changes
+ # (e.g. USE_TZ, TIME_ZONE).
+ self.connection._pool.putconn(self.connection)
+ # Connection can no longer be used.
+ self.connection = None
+ else:
+ return self.connection.close()
def init_connection_state(self):
super().init_connection_state()
- # Commit after setting the time zone.
- commit_tz = self.ensure_timezone()
- # Set the role on the connection. This is useful if the credential used
- # to login is not the same as the role that owns database resources. As
- # can be the case when using temporary or ephemeral credentials.
- commit_role = self.ensure_role()
+ if self.connection is not None and not self.pool:
+ commit = self._configure_connection(self.connection)
- if (commit_role or commit_tz) and not self.get_autocommit():
- self.connection.commit()
+ if commit and not self.get_autocommit():
+ self.connection.commit()
@async_unsafe
def create_cursor(self, name=None):
@@ -396,6 +487,8 @@ class DatabaseWrapper(BaseDatabaseWrapper):
cursor.execute("SET CONSTRAINTS ALL DEFERRED")
def is_usable(self):
+ if self.connection is None:
+ return False
try:
# Use a psycopg cursor directly, bypassing Django's utilities.
with self.connection.cursor() as cursor:
@@ -405,6 +498,12 @@ class DatabaseWrapper(BaseDatabaseWrapper):
else:
return True
+ def close_if_health_check_failed(self):
+ if self.pool:
+ # The pool only returns healthy connections.
+ return
+ return super().close_if_health_check_failed()
+
@contextmanager
def _nodb_cursor(self):
cursor = None
diff --git a/django/db/backends/postgresql/creation.py b/django/db/backends/postgresql/creation.py
index 9b562cec18..938be0f56f 100644
--- a/django/db/backends/postgresql/creation.py
+++ b/django/db/backends/postgresql/creation.py
@@ -58,6 +58,7 @@ class DatabaseCreation(BaseDatabaseCreation):
# CREATE DATABASE ... WITH TEMPLATE ... requires closing connections
# to the template database.
self.connection.close()
+ self.connection.close_pool()
source_database_name = self.connection.settings_dict["NAME"]
target_database_name = self.get_test_db_clone_settings(suffix)["NAME"]
@@ -84,3 +85,7 @@ class DatabaseCreation(BaseDatabaseCreation):
except Exception as e:
self.log("Got an error cloning the test database: %s" % e)
sys.exit(2)
+
+ def _destroy_test_db(self, test_database_name, verbosity):
+ self.connection.close_pool()
+ return super()._destroy_test_db(test_database_name, verbosity)
diff --git a/django/db/backends/postgresql/features.py b/django/db/backends/postgresql/features.py
index 7bcc356407..809466fc7f 100644
--- a/django/db/backends/postgresql/features.py
+++ b/django/db/backends/postgresql/features.py
@@ -83,15 +83,29 @@ class DatabaseFeatures(BaseDatabaseFeatures):
test_now_utc_template = "STATEMENT_TIMESTAMP() AT TIME ZONE 'UTC'"
insert_test_table_with_defaults = "INSERT INTO {} DEFAULT VALUES"
- django_test_skips = {
- "opclasses are PostgreSQL only.": {
- "indexes.tests.SchemaIndexesNotPostgreSQLTests."
- "test_create_index_ignores_opclasses",
- },
- "PostgreSQL requires casting to text.": {
- "lookup.tests.LookupTests.test_textfield_exact_null",
- },
- }
+ @cached_property
+ def django_test_skips(self):
+ skips = {
+ "opclasses are PostgreSQL only.": {
+ "indexes.tests.SchemaIndexesNotPostgreSQLTests."
+ "test_create_index_ignores_opclasses",
+ },
+ "PostgreSQL requires casting to text.": {
+ "lookup.tests.LookupTests.test_textfield_exact_null",
+ },
+ }
+ if self.connection.settings_dict["OPTIONS"].get("pool"):
+ skips.update(
+ {
+ "Pool does implicit health checks": {
+ "backends.base.test_base.ConnectionHealthChecksTests."
+ "test_health_checks_enabled",
+ "backends.base.test_base.ConnectionHealthChecksTests."
+ "test_set_autocommit_health_checks_enabled",
+ },
+ }
+ )
+ return skips
@cached_property
def django_test_expected_failures(self):
diff --git a/docs/ref/databases.txt b/docs/ref/databases.txt
index 1bc787671e..acebfdf348 100644
--- a/docs/ref/databases.txt
+++ b/docs/ref/databases.txt
@@ -245,6 +245,31 @@ database configuration in :setting:`DATABASES`::
},
}
+.. _postgresql-pool:
+
+Connection pool
+---------------
+
+.. versionadded:: 5.1
+
+To use a connection pool with `psycopg`_, you can either set ``"pool"`` in the
+:setting:`OPTIONS` part of your database configuration in :setting:`DATABASES`
+to be a dict to be passed to :class:`~psycopg:psycopg_pool.ConnectionPool`, or
+to ``True`` to use the ``ConnectionPool`` defaults::
+
+ DATABASES = {
+ "default": {
+ "ENGINE": "django.db.backends.postgresql",
+ # ...
+ "OPTIONS": {
+ "pool": True,
+ },
+ },
+ }
+
+This option requires ``psycopg[pool]`` or :pypi:`psycopg-pool` to be installed
+and is ignored with ``psycopg2``.
+
.. _database-server-side-parameters-binding:
Server-side parameters binding
diff --git a/docs/releases/5.1.txt b/docs/releases/5.1.txt
index b2377608f0..7fc794cd1d 100644
--- a/docs/releases/5.1.txt
+++ b/docs/releases/5.1.txt
@@ -162,6 +162,9 @@ Database backends
to allow specifying :ref:`pragma options ` to set upon
connection.
+* ``"pool"`` option is now supported in :setting:`OPTIONS` on PostgreSQL to
+ allow using :ref:`connection pools `.
+
Decorators
~~~~~~~~~~
diff --git a/tests/backends/postgresql/tests.py b/tests/backends/postgresql/tests.py
index a045195991..d28c5be253 100644
--- a/tests/backends/postgresql/tests.py
+++ b/tests/backends/postgresql/tests.py
@@ -8,6 +8,7 @@ from django.db import (
DEFAULT_DB_ALIAS,
DatabaseError,
NotSupportedError,
+ ProgrammingError,
connection,
connections,
)
@@ -20,6 +21,15 @@ except ImportError:
is_psycopg3 = False
+def no_pool_connection(alias=None):
+ new_connection = connection.copy(alias)
+ new_connection.settings_dict = copy.deepcopy(connection.settings_dict)
+ # Ensure that the second connection circumvents the pool, this is kind
+ # of a hack, but we cannot easily change the pool connections.
+ new_connection.settings_dict["OPTIONS"]["pool"] = False
+ return new_connection
+
+
@unittest.skipUnless(connection.vendor == "postgresql", "PostgreSQL tests")
class Tests(TestCase):
databases = {"default", "other"}
@@ -177,7 +187,7 @@ class Tests(TestCase):
PostgreSQL shouldn't roll back SET TIME ZONE, even if the first
transaction is rolled back (#17062).
"""
- new_connection = connection.copy()
+ new_connection = no_pool_connection()
try:
# Ensure the database default time zone is different than
# the time zone in new_connection.settings_dict. We can
@@ -213,7 +223,7 @@ class Tests(TestCase):
The connection wrapper shouldn't believe that autocommit is enabled
after setting the time zone when AUTOCOMMIT is False (#21452).
"""
- new_connection = connection.copy()
+ new_connection = no_pool_connection()
new_connection.settings_dict["AUTOCOMMIT"] = False
try:
@@ -223,6 +233,126 @@ class Tests(TestCase):
finally:
new_connection.close()
+ @unittest.skipUnless(is_psycopg3, "psycopg3 specific test")
+ def test_connect_pool(self):
+ from psycopg_pool import PoolTimeout
+
+ new_connection = no_pool_connection(alias="default_pool")
+ new_connection.settings_dict["OPTIONS"]["pool"] = {
+ "min_size": 0,
+ "max_size": 2,
+ "timeout": 0.1,
+ }
+ self.assertIsNotNone(new_connection.pool)
+
+ connections = []
+
+ def get_connection():
+ # copy() reuses the existing alias and as such the same pool.
+ conn = new_connection.copy()
+ conn.connect()
+ connections.append(conn)
+ return conn
+
+ try:
+ connection_1 = get_connection() # First connection.
+ connection_1_backend_pid = connection_1.connection.info.backend_pid
+ get_connection() # Get the second connection.
+ with self.assertRaises(PoolTimeout):
+ # The pool has a maximum of 2 connections.
+ get_connection()
+
+ connection_1.close() # Release back to the pool.
+ connection_3 = get_connection()
+ # Reuses the first connection as it is available.
+ self.assertEqual(
+ connection_3.connection.info.backend_pid, connection_1_backend_pid
+ )
+ finally:
+ # Release all connections back to the pool.
+ for conn in connections:
+ conn.close()
+ new_connection.close_pool()
+
+ @unittest.skipUnless(is_psycopg3, "psycopg3 specific test")
+ def test_connect_pool_set_to_true(self):
+ new_connection = no_pool_connection(alias="default_pool")
+ new_connection.settings_dict["OPTIONS"]["pool"] = True
+ try:
+ self.assertIsNotNone(new_connection.pool)
+ finally:
+ new_connection.close_pool()
+
+ @unittest.skipUnless(is_psycopg3, "psycopg3 specific test")
+ def test_connect_pool_with_timezone(self):
+ new_time_zone = "Africa/Nairobi"
+ new_connection = no_pool_connection(alias="default_pool")
+
+ try:
+ with new_connection.cursor() as cursor:
+ cursor.execute("SHOW TIMEZONE")
+ tz = cursor.fetchone()[0]
+ self.assertNotEqual(new_time_zone, tz)
+ finally:
+ new_connection.close()
+
+ del new_connection.timezone_name
+ new_connection.settings_dict["OPTIONS"]["pool"] = True
+ try:
+ with self.settings(TIME_ZONE=new_time_zone):
+ with new_connection.cursor() as cursor:
+ cursor.execute("SHOW TIMEZONE")
+ tz = cursor.fetchone()[0]
+ self.assertEqual(new_time_zone, tz)
+ finally:
+ new_connection.close()
+ new_connection.close_pool()
+
+ @unittest.skipUnless(is_psycopg3, "psycopg3 specific test")
+ def test_pooling_health_checks(self):
+ new_connection = no_pool_connection(alias="default_pool")
+ new_connection.settings_dict["OPTIONS"]["pool"] = True
+ new_connection.settings_dict["CONN_HEALTH_CHECKS"] = False
+
+ try:
+ self.assertIsNone(new_connection.pool._check)
+ finally:
+ new_connection.close_pool()
+
+ new_connection.settings_dict["CONN_HEALTH_CHECKS"] = True
+ try:
+ self.assertIsNotNone(new_connection.pool._check)
+ finally:
+ new_connection.close_pool()
+
+ @unittest.skipUnless(is_psycopg3, "psycopg3 specific test")
+ def test_cannot_open_new_connection_in_atomic_block(self):
+ new_connection = no_pool_connection(alias="default_pool")
+ new_connection.settings_dict["OPTIONS"]["pool"] = True
+
+ msg = "Cannot open a new connection in an atomic block."
+ new_connection.in_atomic_block = True
+ new_connection.closed_in_transaction = True
+ with self.assertRaisesMessage(ProgrammingError, msg):
+ new_connection.ensure_connection()
+
+ @unittest.skipUnless(is_psycopg3, "psycopg3 specific test")
+ def test_pooling_not_support_persistent_connections(self):
+ new_connection = no_pool_connection(alias="default_pool")
+ new_connection.settings_dict["OPTIONS"]["pool"] = True
+ new_connection.settings_dict["CONN_MAX_AGE"] = 10
+ msg = "Pooling doesn't support persistent connections."
+ with self.assertRaisesMessage(ImproperlyConfigured, msg):
+ new_connection.pool
+
+ @unittest.skipIf(is_psycopg3, "psycopg2 specific test")
+ def test_connect_pool_setting_ignored_for_psycopg2(self):
+ new_connection = no_pool_connection()
+ new_connection.settings_dict["OPTIONS"]["pool"] = True
+ msg = "Database pooling requires psycopg >= 3"
+ with self.assertRaisesMessage(ImproperlyConfigured, msg):
+ new_connection.connect()
+
def test_connect_isolation_level(self):
"""
The transaction level can be configured with
@@ -236,7 +366,7 @@ class Tests(TestCase):
# Check the level on the psycopg connection, not the Django wrapper.
self.assertIsNone(connection.connection.isolation_level)
- new_connection = connection.copy()
+ new_connection = no_pool_connection()
new_connection.settings_dict["OPTIONS"][
"isolation_level"
] = IsolationLevel.SERIALIZABLE
@@ -253,7 +383,7 @@ class Tests(TestCase):
def test_connect_invalid_isolation_level(self):
self.assertIsNone(connection.connection.isolation_level)
- new_connection = connection.copy()
+ new_connection = no_pool_connection()
new_connection.settings_dict["OPTIONS"]["isolation_level"] = -1
msg = (
"Invalid transaction isolation level -1 specified. Use one of the "
@@ -269,7 +399,7 @@ class Tests(TestCase):
"""
try:
custom_role = "django_nonexistent_role"
- new_connection = connection.copy()
+ new_connection = no_pool_connection()
new_connection.settings_dict["OPTIONS"]["assume_role"] = custom_role
msg = f'role "{custom_role}" does not exist'
with self.assertRaisesMessage(errors.InvalidParameterValue, msg):
@@ -285,7 +415,7 @@ class Tests(TestCase):
"""
from django.db.backends.postgresql.base import ServerBindingCursor
- new_connection = connection.copy()
+ new_connection = no_pool_connection()
new_connection.settings_dict["OPTIONS"]["server_side_binding"] = True
try:
new_connection.connect()
@@ -306,7 +436,7 @@ class Tests(TestCase):
class MyCursor(Cursor):
pass
- new_connection = connection.copy()
+ new_connection = no_pool_connection()
new_connection.settings_dict["OPTIONS"]["cursor_factory"] = MyCursor
try:
new_connection.connect()
@@ -315,7 +445,7 @@ class Tests(TestCase):
new_connection.close()
def test_connect_no_is_usable_checks(self):
- new_connection = connection.copy()
+ new_connection = no_pool_connection()
try:
with mock.patch.object(new_connection, "is_usable") as is_usable:
new_connection.connect()
@@ -324,7 +454,7 @@ class Tests(TestCase):
new_connection.close()
def test_client_encoding_utf8_enforce(self):
- new_connection = connection.copy()
+ new_connection = no_pool_connection()
new_connection.settings_dict["OPTIONS"]["client_encoding"] = "iso-8859-2"
try:
new_connection.connect()
@@ -417,7 +547,7 @@ class Tests(TestCase):
self.assertEqual([q["sql"] for q in connection.queries], [copy_sql])
def test_get_database_version(self):
- new_connection = connection.copy()
+ new_connection = no_pool_connection()
new_connection.pg_version = 130009
self.assertEqual(new_connection.get_database_version(), (13, 9))
@@ -429,7 +559,7 @@ class Tests(TestCase):
self.assertTrue(mocked_get_database_version.called)
def test_compose_sql_when_no_connection(self):
- new_connection = connection.copy()
+ new_connection = no_pool_connection()
try:
self.assertEqual(
new_connection.ops.compose_sql("SELECT %s", ["test"]),
diff --git a/tests/requirements/postgres.txt b/tests/requirements/postgres.txt
index ab215b1ebc..91f911080c 100644
--- a/tests/requirements/postgres.txt
+++ b/tests/requirements/postgres.txt
@@ -1,2 +1,3 @@
psycopg>=3.1.14; implementation_name == 'pypy'
psycopg[binary]>=3.1.8; implementation_name != 'pypy'
+psycopg-pool>=3.2.0
From 9fd1b6f3f815aebee7f67eed5510c720be6d0d5a Mon Sep 17 00:00:00 2001
From: Adam Johnson
Date: Fri, 1 Mar 2024 21:17:56 +0000
Subject: [PATCH 091/316] Updated translation catalogs in tests.i18n.patterns.
---
.../patterns/locale/en/LC_MESSAGES/django.mo | Bin 651 -> 610 bytes
.../patterns/locale/en/LC_MESSAGES/django.po | 24 ++++++++++++++----
.../patterns/locale/nl/LC_MESSAGES/django.mo | Bin 752 -> 711 bytes
.../patterns/locale/nl/LC_MESSAGES/django.po | 20 ++++++++++-----
.../locale/pt_BR/LC_MESSAGES/django.mo | Bin 696 -> 655 bytes
.../locale/pt_BR/LC_MESSAGES/django.po | 24 ++++++++++++++----
6 files changed, 52 insertions(+), 16 deletions(-)
diff --git a/tests/i18n/patterns/locale/en/LC_MESSAGES/django.mo b/tests/i18n/patterns/locale/en/LC_MESSAGES/django.mo
index ec7644b504c3a368f4fd1c48bf1fc666890d797e..bca387b04c6bd88f458d6f933c6d359e4a23a150 100644
GIT binary patch
delta 78
zcmeBXeZ(@sM^}N7f#E9y0|O@zi!m`Ua06)tAk7P;b%3-SkhTKS96&m9V&%@s(TsIm
XK8bnhrHSdORtl4EFh)jE$3bGe&XyB<7`;CZ+?`
JaZOy|3jo^k8FK&t
diff --git a/tests/i18n/patterns/locale/en/LC_MESSAGES/django.po b/tests/i18n/patterns/locale/en/LC_MESSAGES/django.po
index 9a14a80ceb..4e609f038e 100644
--- a/tests/i18n/patterns/locale/en/LC_MESSAGES/django.po
+++ b/tests/i18n/patterns/locale/en/LC_MESSAGES/django.po
@@ -7,31 +7,45 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2011-06-15 11:33+0200\n"
+"POT-Creation-Date: 2024-02-28 11:48+0000\n"
"PO-Revision-Date: 2011-06-14 16:16+0100\n"
"Last-Translator: Jannis Leidel \n"
"Language-Team: LANGUAGE \n"
+"Language: \n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"Language: \n"
#: urls/default.py:11
msgid "^translated/$"
msgstr "^translated/$"
-#: urls/default.py:12
+#: urls/default.py:13
msgid "^translated/(?P[\\w-]+)/$"
msgstr "^translated/(?P[\\w-]+)/$"
-#: urls/default.py:17
+#: urls/default.py:24
+msgid "^with-arguments/(?P[\\w-]+)/(?:(?P[\\w-]+).html)?$"
+msgstr ""
+
+#: urls/default.py:28
msgid "^users/$"
msgstr "^users/$"
-#: urls/default.py:18 urls/wrong.py:7
+#: urls/default.py:30 urls/wrong.py:7
msgid "^account/"
msgstr "^account/"
#: urls/namespace.py:9 urls/wrong_namespace.py:10
msgid "^register/$"
msgstr "^register/$"
+
+#: urls/namespace.py:10
+msgid "^register-without-slash$"
+msgstr ""
+
+#: urls/namespace.py:11
+#, fuzzy
+#| msgid "^register/$"
+msgid "register-as-path/"
+msgstr "^register/$"
diff --git a/tests/i18n/patterns/locale/nl/LC_MESSAGES/django.mo b/tests/i18n/patterns/locale/nl/LC_MESSAGES/django.mo
index 5eac50466cb7e450ca3b28bb312ab064e295dbd4..730462386e1ceabfc172d704a7badce2df169334 100644
GIT binary patch
delta 86
zcmeysdYpAah^ZGN1A{mab22b6Br!2C@B!%@Ak7V=tAVr(kZuRkyg+&hkQM>bn\n"
"Language-Team: LANGUAGE \n"
+"Language: \n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"Language: \n"
"Plural-Forms: nplurals=2; plural=(n != 1)\n"
#: urls/default.py:11
msgid "^translated/$"
msgstr "^vertaald/$"
-#: urls/default.py:12
+#: urls/default.py:13
msgid "^translated/(?P[\\w-]+)/$"
msgstr "^vertaald/(?P[\\w-]+)/$"
-#: urls/default.py:17
+#: urls/default.py:24
+msgid "^with-arguments/(?P[\\w-]+)/(?:(?P[\\w-]+).html)?$"
+msgstr ""
+
+#: urls/default.py:28
msgid "^users/$"
msgstr "^gebruikers/$"
-#: urls/default.py:18 urls/wrong.py:7
+#: urls/default.py:30 urls/wrong.py:7
msgid "^account/"
msgstr "^profiel/"
@@ -37,6 +41,10 @@ msgstr "^profiel/"
msgid "^register/$"
msgstr "^registreren/$"
-#: urls/namespace.py:12
+#: urls/namespace.py:10
+msgid "^register-without-slash$"
+msgstr ""
+
+#: urls/namespace.py:11
msgid "register-as-path/"
msgstr "registreren-als-pad/"
diff --git a/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.mo b/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.mo
index 1d7b346c278c58207efa2f1ba17b1ae72c0a35a4..431a4016dfa814666615dd01651de133e2025840 100644
GIT binary patch
delta 78
zcmdnN+Rr+{N7s{)f#E9y0|Pq{+cPmR@BwLeAk7P;!+^9LkWK;8+(5c{V&%@s(TsIm
XK8bnhrHSdORtl4EFh)w&Z!knRQ2+(3HG#LAs&A-c{*
zsfi_-`FXl7i6yC43PuKohPno3x`w6-hK5$gCfWu@1_qP$85<|>W{l$UNz6+xO-u)>
Jn=Haq4FDbN8QlN?
diff --git a/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.po b/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.po
index fd3388e4b0..6874b2d028 100644
--- a/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.po
+++ b/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.po
@@ -7,32 +7,46 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2011-06-15 11:34+0200\n"
+"POT-Creation-Date: 2024-02-28 11:48+0000\n"
"PO-Revision-Date: 2011-06-14 16:17+0100\n"
"Last-Translator: Jannis Leidel \n"
"Language-Team: LANGUAGE \n"
+"Language: \n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"Language: \n"
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
#: urls/default.py:11
msgid "^translated/$"
msgstr "^traduzidos/$"
-#: urls/default.py:12
+#: urls/default.py:13
msgid "^translated/(?P[\\w-]+)/$"
msgstr "^traduzidos/(?P[\\w-]+)/$"
-#: urls/default.py:17
+#: urls/default.py:24
+msgid "^with-arguments/(?P[\\w-]+)/(?:(?P[\\w-]+).html)?$"
+msgstr ""
+
+#: urls/default.py:28
msgid "^users/$"
msgstr "^usuarios/$"
-#: urls/default.py:18 urls/wrong.py:7
+#: urls/default.py:30 urls/wrong.py:7
msgid "^account/"
msgstr "^conta/"
#: urls/namespace.py:9 urls/wrong_namespace.py:10
msgid "^register/$"
msgstr "^registre-se/$"
+
+#: urls/namespace.py:10
+msgid "^register-without-slash$"
+msgstr ""
+
+#: urls/namespace.py:11
+#, fuzzy
+#| msgid "^register/$"
+msgid "register-as-path/"
+msgstr "^registre-se/$"
From 595738296faec582ce90f1cffef90fbb9b18384b Mon Sep 17 00:00:00 2001
From: Adam Johnson
Date: Sat, 24 Feb 2024 19:58:12 +0000
Subject: [PATCH 092/316] Refs #26431 -- Added more test for translated path().
---
.../patterns/locale/en/LC_MESSAGES/django.mo | Bin 610 -> 550 bytes
.../patterns/locale/en/LC_MESSAGES/django.po | 20 ++++++++++++------
.../patterns/locale/nl/LC_MESSAGES/django.mo | Bin 711 -> 761 bytes
.../patterns/locale/nl/LC_MESSAGES/django.po | 18 ++++++++++------
.../locale/pt_BR/LC_MESSAGES/django.mo | Bin 655 -> 707 bytes
.../locale/pt_BR/LC_MESSAGES/django.po | 18 ++++++++++------
tests/i18n/patterns/tests.py | 14 +++++++++++-
tests/i18n/patterns/urls/default.py | 8 ++++++-
8 files changed, 56 insertions(+), 22 deletions(-)
diff --git a/tests/i18n/patterns/locale/en/LC_MESSAGES/django.mo b/tests/i18n/patterns/locale/en/LC_MESSAGES/django.mo
index bca387b04c6bd88f458d6f933c6d359e4a23a150..b1f63b1031066b1dc09b86e57f6ad3545dbfed72 100644
GIT binary patch
delta 145
zcmaFFvW%tvo)F7a1|VPsVi_QI0b+I_&H-W&=m26)AnpWWZXliv#BxA9ABZ`Ccpnfe
zFfuS42ht#QFMw>2x=%nFr0yS(2C0)}VqgF=!GIY^vH&sAP9_GXi3_zh-i&9QcvA)d
DhMf?l
delta 177
zcmZ3+@`$DWo)F7a1|VPqVi_Rz0b*_-t^r~YSOLVGK)e!&LE@W%m=}om1F;+sp9NwL
zAbtbH3XBX4Ux748y%-Zjy#kO1sn-G0AoW&28l*lFNCTBCF#u^WU;&cMK+Fo^f*k~A
PPHfcLI5(GZ;#@5N4UiBt
diff --git a/tests/i18n/patterns/locale/en/LC_MESSAGES/django.po b/tests/i18n/patterns/locale/en/LC_MESSAGES/django.po
index 4e609f038e..ac98eb5f08 100644
--- a/tests/i18n/patterns/locale/en/LC_MESSAGES/django.po
+++ b/tests/i18n/patterns/locale/en/LC_MESSAGES/django.po
@@ -7,7 +7,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2024-02-28 11:48+0000\n"
+"POT-Creation-Date: 2024-03-01 21:18+0000\n"
"PO-Revision-Date: 2011-06-14 16:16+0100\n"
"Last-Translator: Jannis Leidel \n"
"Language-Team: LANGUAGE \n"
@@ -17,22 +17,30 @@ msgstr ""
"Content-Transfer-Encoding: 8bit\n"
#: urls/default.py:11
-msgid "^translated/$"
+#, fuzzy
+#| msgid "^translated/$"
+msgid "translated/"
msgstr "^translated/$"
-#: urls/default.py:13
+#: urls/default.py:12
+#, fuzzy
+#| msgid "^translated/$"
+msgid "^translated-regex/$"
+msgstr "^translated/$"
+
+#: urls/default.py:14
msgid "^translated/(?P[\\w-]+)/$"
msgstr "^translated/(?P[\\w-]+)/$"
-#: urls/default.py:24
+#: urls/default.py:25
msgid "^with-arguments/(?P[\\w-]+)/(?:(?P[\\w-]+).html)?$"
msgstr ""
-#: urls/default.py:28
+#: urls/default.py:29
msgid "^users/$"
msgstr "^users/$"
-#: urls/default.py:30 urls/wrong.py:7
+#: urls/default.py:31 urls/wrong.py:7
msgid "^account/"
msgstr "^account/"
diff --git a/tests/i18n/patterns/locale/nl/LC_MESSAGES/django.mo b/tests/i18n/patterns/locale/nl/LC_MESSAGES/django.mo
index 730462386e1ceabfc172d704a7badce2df169334..544bfdbfc664507780f671e9571670d4cf2e89c4 100644
GIT binary patch
delta 246
zcmXZVu@1pd6oBE=YMZK%C??_!8nc1L<{2zadSeliYQ$#gENR5XBZ$F6AhFpx@CXKz
z&40y7zWg`0_oQe0W3L{*wH3xi3nP@UgPseDxI*9GQNt5$yrFk}L!?TZRKE-85MAi~
z)D)@EHP!F-l>hbR$f3-|jn-*S^}>s?D?}{lDZu`nL>%g7hrkJ9HCD?k?|DfaPUn*_
YQPHVk%#8n+O==Fjg^H6foJ1Y@0{lcGQ2+n{
delta 194
zcmey#dYrZXo)F7a1|VPuVi_O~0b*_-?g3&D*a5_xK)e%(LE?vjm=}o81F;+s-vwe0
zApQfyfIQ>+0zcBf#&EjECDh^fC8I\n"
"Language-Team: LANGUAGE \n"
@@ -18,22 +18,26 @@ msgstr ""
"Plural-Forms: nplurals=2; plural=(n != 1)\n"
#: urls/default.py:11
-msgid "^translated/$"
-msgstr "^vertaald/$"
+msgid "translated/"
+msgstr "vertaald/"
-#: urls/default.py:13
+#: urls/default.py:12
+msgid "^translated-regex/$"
+msgstr "^vertaald-regex/$"
+
+#: urls/default.py:14
msgid "^translated/(?P[\\w-]+)/$"
msgstr "^vertaald/(?P[\\w-]+)/$"
-#: urls/default.py:24
+#: urls/default.py:25
msgid "^with-arguments/(?P[\\w-]+)/(?:(?P[\\w-]+).html)?$"
msgstr ""
-#: urls/default.py:28
+#: urls/default.py:29
msgid "^users/$"
msgstr "^gebruikers/$"
-#: urls/default.py:30 urls/wrong.py:7
+#: urls/default.py:31 urls/wrong.py:7
msgid "^account/"
msgstr "^profiel/"
diff --git a/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.mo b/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.mo
index 431a4016dfa814666615dd01651de133e2025840..8e36cb206409c512c1bb8d7031e79112d4c76914 100644
GIT binary patch
delta 232
zcmeBYJ;Pg;Al?bYAo0UMEDXfwfmjZR9|JK5
z5Hm4Cz8AYKW?Ao0yW%nQW(fmjZR&jK+A
z5WfLpPeulYuRxj|i0zpe82Es+JCFvc4+GL5^(jCaWKJ`X1}c|h0McN<0wkG%m=(eW
XJBVT8THT2cv^R@0<}gm~WYPlwSIrVK
diff --git a/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.po b/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.po
index 6874b2d028..464d14bc1f 100644
--- a/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.po
+++ b/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.po
@@ -7,7 +7,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2024-02-28 11:48+0000\n"
+"POT-Creation-Date: 2024-03-01 21:18+0000\n"
"PO-Revision-Date: 2011-06-14 16:17+0100\n"
"Last-Translator: Jannis Leidel \n"
"Language-Team: LANGUAGE \n"
@@ -18,22 +18,26 @@ msgstr ""
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
#: urls/default.py:11
-msgid "^translated/$"
-msgstr "^traduzidos/$"
+msgid "translated/"
+msgstr "traduzidos/"
-#: urls/default.py:13
+#: urls/default.py:12
+msgid "^translated-regex/$"
+msgstr "^traduzidos-regex/$"
+
+#: urls/default.py:14
msgid "^translated/(?P[\\w-]+)/$"
msgstr "^traduzidos/(?P[\\w-]+)/$"
-#: urls/default.py:24
+#: urls/default.py:25
msgid "^with-arguments/(?P[\\w-]+)/(?:(?P[\\w-]+).html)?$"
msgstr ""
-#: urls/default.py:28
+#: urls/default.py:29
msgid "^users/$"
msgstr "^usuarios/$"
-#: urls/default.py:30 urls/wrong.py:7
+#: urls/default.py:31 urls/wrong.py:7
msgid "^account/"
msgstr "^conta/"
diff --git a/tests/i18n/patterns/tests.py b/tests/i18n/patterns/tests.py
index e2fee904b1..bd329e69f8 100644
--- a/tests/i18n/patterns/tests.py
+++ b/tests/i18n/patterns/tests.py
@@ -134,6 +134,9 @@ class URLTranslationTests(URLTestCaseBase):
def test_no_prefix_translated(self):
with translation.override("en"):
self.assertEqual(reverse("no-prefix-translated"), "/translated/")
+ self.assertEqual(
+ reverse("no-prefix-translated-regex"), "/translated-regex/"
+ )
self.assertEqual(
reverse("no-prefix-translated-slug", kwargs={"slug": "yeah"}),
"/translated/yeah/",
@@ -141,6 +144,7 @@ class URLTranslationTests(URLTestCaseBase):
with translation.override("nl"):
self.assertEqual(reverse("no-prefix-translated"), "/vertaald/")
+ self.assertEqual(reverse("no-prefix-translated-regex"), "/vertaald-regex/")
self.assertEqual(
reverse("no-prefix-translated-slug", kwargs={"slug": "yeah"}),
"/vertaald/yeah/",
@@ -148,6 +152,9 @@ class URLTranslationTests(URLTestCaseBase):
with translation.override("pt-br"):
self.assertEqual(reverse("no-prefix-translated"), "/traduzidos/")
+ self.assertEqual(
+ reverse("no-prefix-translated-regex"), "/traduzidos-regex/"
+ )
self.assertEqual(
reverse("no-prefix-translated-slug", kwargs={"slug": "yeah"}),
"/traduzidos/yeah/",
@@ -180,7 +187,7 @@ class URLTranslationTests(URLTestCaseBase):
"/nl/profiel/registreren-als-pad/",
)
self.assertEqual(translation.get_language(), "en")
- # URL with parameters.
+ # re_path() URL with parameters.
self.assertEqual(
translate_url("/en/with-arguments/regular-argument/", "nl"),
"/nl/with-arguments/regular-argument/",
@@ -191,6 +198,11 @@ class URLTranslationTests(URLTestCaseBase):
),
"/nl/with-arguments/regular-argument/optional.html",
)
+ # path() URL with parameter.
+ self.assertEqual(
+ translate_url("/en/path-with-arguments/regular-argument/", "nl"),
+ "/nl/path-with-arguments/regular-argument/",
+ )
with translation.override("nl"):
self.assertEqual(translate_url("/nl/gebruikers/", "en"), "/en/users/")
diff --git a/tests/i18n/patterns/urls/default.py b/tests/i18n/patterns/urls/default.py
index 418e9f5685..090b92eeca 100644
--- a/tests/i18n/patterns/urls/default.py
+++ b/tests/i18n/patterns/urls/default.py
@@ -8,7 +8,8 @@ view = TemplateView.as_view(template_name="dummy.html")
urlpatterns = [
path("not-prefixed/", view, name="not-prefixed"),
path("not-prefixed-include/", include("i18n.patterns.urls.included")),
- re_path(_(r"^translated/$"), view, name="no-prefix-translated"),
+ path(_("translated/"), view, name="no-prefix-translated"),
+ re_path(_(r"^translated-regex/$"), view, name="no-prefix-translated-regex"),
re_path(
_(r"^translated/(?P[\w-]+)/$"),
view,
@@ -25,6 +26,11 @@ urlpatterns += i18n_patterns(
view,
name="with-arguments",
),
+ path(
+ _("path-with-arguments//"),
+ view,
+ name="path-with-arguments",
+ ),
re_path(_(r"^users/$"), view, name="users"),
re_path(
_(r"^account/"), include("i18n.patterns.urls.namespace", namespace="account")
From 5dfcf343cd414d3f7a33dabb763b4478fa081d72 Mon Sep 17 00:00:00 2001
From: Adam Johnson
Date: Sat, 24 Feb 2024 19:14:22 +0000
Subject: [PATCH 093/316] Refs #35250 -- Avoided double conversion in
RoutePattern.
---
django/urls/resolvers.py | 58 +++++++++++++++++++++++++---------------
1 file changed, 36 insertions(+), 22 deletions(-)
diff --git a/django/urls/resolvers.py b/django/urls/resolvers.py
index 5f9941dd65..e335fc0a58 100644
--- a/django/urls/resolvers.py
+++ b/django/urls/resolvers.py
@@ -128,9 +128,6 @@ def get_ns_resolver(ns_pattern, resolver, converters):
class LocaleRegexDescriptor:
- def __init__(self, attr):
- self.attr = attr
-
def __get__(self, instance, cls=None):
"""
Return a compiled regular expression based on the active language.
@@ -140,15 +137,23 @@ class LocaleRegexDescriptor:
# As a performance optimization, if the given regex string is a regular
# string (not a lazily-translated string proxy), compile it once and
# avoid per-language compilation.
- pattern = getattr(instance, self.attr)
+ pattern = instance._regex
if isinstance(pattern, str):
- instance.__dict__["regex"] = instance._compile(pattern)
+ instance.__dict__["regex"] = self._compile(pattern)
return instance.__dict__["regex"]
language_code = get_language()
if language_code not in instance._regex_dict:
- instance._regex_dict[language_code] = instance._compile(str(pattern))
+ instance._regex_dict[language_code] = self._compile(str(pattern))
return instance._regex_dict[language_code]
+ def _compile(self, regex):
+ try:
+ return re.compile(regex)
+ except re.error as e:
+ raise ImproperlyConfigured(
+ f'"{regex}" is not a valid regular expression: {e}'
+ ) from e
+
class CheckURLMixin:
def describe(self):
@@ -186,7 +191,7 @@ class CheckURLMixin:
class RegexPattern(CheckURLMixin):
- regex = LocaleRegexDescriptor("_regex")
+ regex = LocaleRegexDescriptor()
def __init__(self, regex, name=None, is_endpoint=False):
self._regex = regex
@@ -232,15 +237,6 @@ class RegexPattern(CheckURLMixin):
else:
return []
- def _compile(self, regex):
- """Compile and return the given regular expression."""
- try:
- return re.compile(regex)
- except re.error as e:
- raise ImproperlyConfigured(
- '"%s" is not a valid regular expression: %s' % (regex, e)
- ) from e
-
def __str__(self):
return str(self._regex)
@@ -250,7 +246,7 @@ _PATH_PARAMETER_COMPONENT_RE = _lazy_re_compile(
)
-def _route_to_regex(route, is_endpoint=False):
+def _route_to_regex(route, is_endpoint):
"""
Convert a path pattern into a regular expression. Return the regular
expression and a dictionary mapping the capture names to the converters.
@@ -296,15 +292,36 @@ def _route_to_regex(route, is_endpoint=False):
return "".join(parts), converters
+class LocaleRegexRouteDescriptor:
+ def __get__(self, instance, cls=None):
+ """
+ Return a compiled regular expression based on the active language.
+ """
+ if instance is None:
+ return self
+ # As a performance optimization, if the given route is a regular string
+ # (not a lazily-translated string proxy), compile it once and avoid
+ # per-language compilation.
+ if isinstance(instance._route, str):
+ instance.__dict__["regex"] = re.compile(instance._regex)
+ return instance.__dict__["regex"]
+ language_code = get_language()
+ if language_code not in instance._regex_dict:
+ instance._regex_dict[language_code] = re.compile(
+ _route_to_regex(str(instance._route), instance._is_endpoint)[0]
+ )
+ return instance._regex_dict[language_code]
+
+
class RoutePattern(CheckURLMixin):
- regex = LocaleRegexDescriptor("_route")
+ regex = LocaleRegexRouteDescriptor()
def __init__(self, route, name=None, is_endpoint=False):
self._route = route
+ self._regex, self.converters = _route_to_regex(str(route), is_endpoint)
self._regex_dict = {}
self._is_endpoint = is_endpoint
self.name = name
- self.converters = _route_to_regex(str(route), is_endpoint)[1]
def match(self, path):
match = self.regex.search(path)
@@ -356,9 +373,6 @@ class RoutePattern(CheckURLMixin):
warnings.append(Warning(msg % (self.describe(), "<"), id="urls.W010"))
return warnings
- def _compile(self, route):
- return re.compile(_route_to_regex(route, self._is_endpoint)[0])
-
def __str__(self):
return str(self._route)
From 71d5eafb05a19287d954847beb33e4eeca65b4c4 Mon Sep 17 00:00:00 2001
From: Adam Johnson
Date: Sat, 24 Feb 2024 19:15:01 +0000
Subject: [PATCH 094/316] Fixed #35250 -- Made URL system checks use uncompiled
regexes.
---
django/urls/resolvers.py | 6 ++----
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/django/urls/resolvers.py b/django/urls/resolvers.py
index e335fc0a58..1b26aed8c1 100644
--- a/django/urls/resolvers.py
+++ b/django/urls/resolvers.py
@@ -169,12 +169,11 @@ class CheckURLMixin:
"""
Check that the pattern does not begin with a forward slash.
"""
- regex_pattern = self.regex.pattern
if not settings.APPEND_SLASH:
# Skip check as it can be useful to start a URL pattern with a slash
# when APPEND_SLASH=False.
return []
- if regex_pattern.startswith(("/", "^/", "^\\/")) and not regex_pattern.endswith(
+ if self._regex.startswith(("/", "^/", "^\\/")) and not self._regex.endswith(
"/"
):
warning = Warning(
@@ -224,8 +223,7 @@ class RegexPattern(CheckURLMixin):
return warnings
def _check_include_trailing_dollar(self):
- regex_pattern = self.regex.pattern
- if regex_pattern.endswith("$") and not regex_pattern.endswith(r"\$"):
+ if self._regex.endswith("$") and not self._regex.endswith(r"\$"):
return [
Warning(
"Your URL pattern {} uses include with a route ending with a '$'. "
From c1874176114cd94efcc58e3c449f4e2a116881a1 Mon Sep 17 00:00:00 2001
From: Adam Johnson
Date: Mon, 4 Mar 2024 04:24:36 +0000
Subject: [PATCH 095/316] Refs #9847 -- Added tests for handler403 resolution.
---
tests/urlpatterns_reverse/tests.py | 6 +++---
tests/urlpatterns_reverse/urls_error_handlers.py | 1 +
tests/urlpatterns_reverse/urls_error_handlers_callables.py | 1 +
3 files changed, 5 insertions(+), 3 deletions(-)
diff --git a/tests/urlpatterns_reverse/tests.py b/tests/urlpatterns_reverse/tests.py
index 8384f55b3c..5843382a8c 100644
--- a/tests/urlpatterns_reverse/tests.py
+++ b/tests/urlpatterns_reverse/tests.py
@@ -1456,7 +1456,7 @@ class RequestURLconfTests(SimpleTestCase):
class ErrorHandlerResolutionTests(SimpleTestCase):
- """Tests for handler400, handler404 and handler500"""
+ """Tests for handler400, handler403, handler404 and handler500"""
def setUp(self):
urlconf = "urlpatterns_reverse.urls_error_handlers"
@@ -1465,12 +1465,12 @@ class ErrorHandlerResolutionTests(SimpleTestCase):
self.callable_resolver = URLResolver(RegexPattern(r"^$"), urlconf_callables)
def test_named_handlers(self):
- for code in [400, 404, 500]:
+ for code in [400, 403, 404, 500]:
with self.subTest(code=code):
self.assertEqual(self.resolver.resolve_error_handler(code), empty_view)
def test_callable_handlers(self):
- for code in [400, 404, 500]:
+ for code in [400, 403, 404, 500]:
with self.subTest(code=code):
self.assertEqual(
self.callable_resolver.resolve_error_handler(code), empty_view
diff --git a/tests/urlpatterns_reverse/urls_error_handlers.py b/tests/urlpatterns_reverse/urls_error_handlers.py
index 7261a97e07..d483864f4b 100644
--- a/tests/urlpatterns_reverse/urls_error_handlers.py
+++ b/tests/urlpatterns_reverse/urls_error_handlers.py
@@ -3,5 +3,6 @@
urlpatterns = []
handler400 = "urlpatterns_reverse.views.empty_view"
+handler403 = "urlpatterns_reverse.views.empty_view"
handler404 = "urlpatterns_reverse.views.empty_view"
handler500 = "urlpatterns_reverse.views.empty_view"
diff --git a/tests/urlpatterns_reverse/urls_error_handlers_callables.py b/tests/urlpatterns_reverse/urls_error_handlers_callables.py
index 4a8d35116e..614fc460fc 100644
--- a/tests/urlpatterns_reverse/urls_error_handlers_callables.py
+++ b/tests/urlpatterns_reverse/urls_error_handlers_callables.py
@@ -5,5 +5,6 @@ from .views import empty_view
urlpatterns = []
handler400 = empty_view
+handler403 = empty_view
handler404 = empty_view
handler500 = empty_view
From f5ed4306bbfd2e5543dd02cf5a22326a29253cdf Mon Sep 17 00:00:00 2001
From: Kasun Herath
Date: Mon, 4 Mar 2024 10:04:42 +0530
Subject: [PATCH 096/316] Fixed #35265 -- Added AdminSite tests for changing
titles.
---
AUTHORS | 1 +
tests/admin_views/test_adminsite.py | 18 ++++++++++++++++++
2 files changed, 19 insertions(+)
diff --git a/AUTHORS b/AUTHORS
index 1041e2a631..a9cddfd4b1 100644
--- a/AUTHORS
+++ b/AUTHORS
@@ -564,6 +564,7 @@ answer newbie questions, and generally made Django that much better:
Karderio
Karen Tracey
Karol Sikora
+ Kasun Herath
Katherine “Kati” Michel
Kathryn Killebrew
Katie Miller
diff --git a/tests/admin_views/test_adminsite.py b/tests/admin_views/test_adminsite.py
index 68a32567d8..7c4841f916 100644
--- a/tests/admin_views/test_adminsite.py
+++ b/tests/admin_views/test_adminsite.py
@@ -11,8 +11,19 @@ site = admin.AdminSite(name="test_adminsite")
site.register(User)
site.register(Article)
+
+class CustomAdminSite(admin.AdminSite):
+ site_title = "Custom title"
+ site_header = "Custom site"
+
+
+custom_site = CustomAdminSite(name="test_custom_adminsite")
+custom_site.register(User)
+
+
urlpatterns = [
path("test_admin/admin/", site.urls),
+ path("test_custom_admin/admin/", custom_site.urls),
]
@@ -43,6 +54,13 @@ class SiteEachContextTest(TestCase):
self.assertEqual(ctx["site_url"], "/")
self.assertIs(ctx["has_permission"], True)
+ def test_custom_admin_titles(self):
+ request = self.request_factory.get(reverse("test_custom_adminsite:index"))
+ request.user = self.u1
+ ctx = custom_site.each_context(request)
+ self.assertEqual(ctx["site_title"], "Custom title")
+ self.assertEqual(ctx["site_header"], "Custom site")
+
def test_each_context_site_url_with_script_name(self):
request = self.request_factory.get(
reverse("test_adminsite:index"), SCRIPT_NAME="/my-script-name/"
From f6ad8c7676f85dfde5a279b6b1469251421289e2 Mon Sep 17 00:00:00 2001
From: Shai Berger
Date: Mon, 19 Feb 2024 13:56:37 +0100
Subject: [PATCH 097/316] Refs CVE-2024-27351 -- Forwardported release notes
and tests.
Co-Authored-By: Mariusz Felisiak
---
docs/releases/3.2.25.txt | 8 ++++++++
docs/releases/4.2.11.txt | 8 ++++++++
docs/releases/5.0.3.txt | 8 ++++++++
tests/utils_tests/test_text.py | 27 +++++++++++++++++++++++++++
4 files changed, 51 insertions(+)
diff --git a/docs/releases/3.2.25.txt b/docs/releases/3.2.25.txt
index aa81c720d5..a3a90986ff 100644
--- a/docs/releases/3.2.25.txt
+++ b/docs/releases/3.2.25.txt
@@ -7,6 +7,14 @@ Django 3.2.25 release notes
Django 3.2.25 fixes a security issue with severity "moderate" and a regression
in 3.2.24.
+CVE-2024-27351: Potential regular expression denial-of-service in ``django.utils.text.Truncator.words()``
+=========================================================================================================
+
+``django.utils.text.Truncator.words()`` method (with ``html=True``) and
+:tfilter:`truncatewords_html` template filter were subject to a potential
+regular expression denial-of-service attack using a suitably crafted string
+(follow up to :cve:`2019-14232` and :cve:`2023-43665`).
+
Bugfixes
========
diff --git a/docs/releases/4.2.11.txt b/docs/releases/4.2.11.txt
index 82c691fcb7..c562e47866 100644
--- a/docs/releases/4.2.11.txt
+++ b/docs/releases/4.2.11.txt
@@ -7,6 +7,14 @@ Django 4.2.11 release notes
Django 4.2.11 fixes a security issue with severity "moderate" and a regression
in 4.2.10.
+CVE-2024-27351: Potential regular expression denial-of-service in ``django.utils.text.Truncator.words()``
+=========================================================================================================
+
+``django.utils.text.Truncator.words()`` method (with ``html=True``) and
+:tfilter:`truncatewords_html` template filter were subject to a potential
+regular expression denial-of-service attack using a suitably crafted string
+(follow up to :cve:`2019-14232` and :cve:`2023-43665`).
+
Bugfixes
========
diff --git a/docs/releases/5.0.3.txt b/docs/releases/5.0.3.txt
index 9db83d0135..bd3c6b5004 100644
--- a/docs/releases/5.0.3.txt
+++ b/docs/releases/5.0.3.txt
@@ -7,6 +7,14 @@ Django 5.0.3 release notes
Django 5.0.3 fixes a security issue with severity "moderate" and several bugs
in 5.0.2.
+CVE-2024-27351: Potential regular expression denial-of-service in ``django.utils.text.Truncator.words()``
+=========================================================================================================
+
+``django.utils.text.Truncator.words()`` method (with ``html=True``) and
+:tfilter:`truncatewords_html` template filter were subject to a potential
+regular expression denial-of-service attack using a suitably crafted string
+(follow up to :cve:`2019-14232` and :cve:`2023-43665`).
+
Bugfixes
========
diff --git a/tests/utils_tests/test_text.py b/tests/utils_tests/test_text.py
index b38d8238c5..ab2cfb3f7c 100644
--- a/tests/utils_tests/test_text.py
+++ b/tests/utils_tests/test_text.py
@@ -292,6 +292,33 @@ class TestUtilsText(SimpleTestCase):
truncator = text.Truncator("foo")
self.assertEqual("foo", truncator.words(3, html=True))
+ # Only open brackets.
+ truncator = text.Truncator("<" * 60_000)
+ self.assertEqual(truncator.words(1, html=True), "<…")
+
+ # Tags with special chars in attrs.
+ truncator = text.Truncator(
+ """Hello, my dear lady! """
+ )
+ self.assertEqual(
+ """Hello, my dear… """,
+ truncator.words(3, html=True),
+ )
+
+ # Tags with special non-latin chars in attrs.
+ truncator = text.Truncator("""Hello, my dear lady!
""")
+ self.assertEqual(
+ """Hello, my dear…
""",
+ truncator.words(3, html=True),
+ )
+
+ # Misplaced brackets.
+ truncator = text.Truncator("hello >< world")
+ self.assertEqual(truncator.words(1, html=True), "hello…")
+ self.assertEqual(truncator.words(2, html=True), "hello >…")
+ self.assertEqual(truncator.words(3, html=True), "hello ><…")
+ self.assertEqual(truncator.words(4, html=True), "hello >< world")
+
@patch("django.utils.text.Truncator.MAX_LENGTH_HTML", 10_000)
def test_truncate_words_html_size_limit(self):
max_len = text.Truncator.MAX_LENGTH_HTML
From da39ae4b5f056a332b5c48402a2ae11767e7d577 Mon Sep 17 00:00:00 2001
From: Mariusz Felisiak
Date: Mon, 4 Mar 2024 10:10:35 +0100
Subject: [PATCH 098/316] Added CVE-2024-27351 to security archive.
---
docs/releases/security.txt | 11 +++++++++++
1 file changed, 11 insertions(+)
diff --git a/docs/releases/security.txt b/docs/releases/security.txt
index 7df74adb82..404af4d00f 100644
--- a/docs/releases/security.txt
+++ b/docs/releases/security.txt
@@ -36,6 +36,17 @@ Issues under Django's security process
All security issues have been handled under versions of Django's security
process. These are listed below.
+March 4, 2024 - :cve:`2024-27351`
+---------------------------------
+
+Potential regular expression denial-of-service in
+``django.utils.text.Truncator.words()``. `Full description
+ `__
+
+* Django 5.0 :commit:`(patch) <3394fc6132436eca89e997083bae9985fb7e761e>`
+* Django 4.2 :commit:`(patch) <3c9a2771cc80821e041b16eb36c1c37af5349d4a>`
+* Django 3.2 :commit:`(patch) <072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521>`
+
February 6, 2024 - :cve:`2024-24680`
------------------------------------
From 337e37f3bb7bc2fe4f2bcfc5f9586e4f36da72e3 Mon Sep 17 00:00:00 2001
From: Mariusz Felisiak
Date: Mon, 4 Mar 2024 10:28:49 +0100
Subject: [PATCH 099/316] Added stub release notes for 5.0.4.
---
docs/releases/5.0.4.txt | 12 ++++++++++++
docs/releases/index.txt | 1 +
2 files changed, 13 insertions(+)
create mode 100644 docs/releases/5.0.4.txt
diff --git a/docs/releases/5.0.4.txt b/docs/releases/5.0.4.txt
new file mode 100644
index 0000000000..52d3bdfb0e
--- /dev/null
+++ b/docs/releases/5.0.4.txt
@@ -0,0 +1,12 @@
+==========================
+Django 5.0.4 release notes
+==========================
+
+*Expected April 2, 2024*
+
+Django 5.0.4 fixes several bugs in 5.0.3.
+
+Bugfixes
+========
+
+* ...
diff --git a/docs/releases/index.txt b/docs/releases/index.txt
index 01c2ac949d..6aae4c9068 100644
--- a/docs/releases/index.txt
+++ b/docs/releases/index.txt
@@ -32,6 +32,7 @@ versions of the documentation contain the release notes for any later releases.
.. toctree::
:maxdepth: 1
+ 5.0.4
5.0.3
5.0.2
5.0.1
From 838659ea21916a7f5f3d554bc5211d3bd1ffc012 Mon Sep 17 00:00:00 2001
From: Mariusz Felisiak
Date: Mon, 4 Mar 2024 11:24:21 +0100
Subject: [PATCH 100/316] Updated fuzzy translations in tests.i18n.patterns.
Follow up to 9fd1b6f3f815aebee7f67eed5510c720be6d0d5a.
---
.../patterns/locale/en/LC_MESSAGES/django.mo | Bin 550 -> 714 bytes
.../patterns/locale/en/LC_MESSAGES/django.po | 12 +++---------
.../patterns/locale/pt_BR/LC_MESSAGES/django.mo | Bin 707 -> 762 bytes
.../patterns/locale/pt_BR/LC_MESSAGES/django.po | 4 +---
4 files changed, 4 insertions(+), 12 deletions(-)
diff --git a/tests/i18n/patterns/locale/en/LC_MESSAGES/django.mo b/tests/i18n/patterns/locale/en/LC_MESSAGES/django.mo
index b1f63b1031066b1dc09b86e57f6ad3545dbfed72..0cd93915285e5dfff6f2d2c334b9652d1530a40d 100644
GIT binary patch
delta 287
zcmaKku@1oi5QeX`MNDc$V-;ySTX_qyG|?atY1$4pk$8a)wr&!W#S0h(tDT4N0={Fg
zx#Y|D=W_q;&6~A)IObNEGBjZXRmef-0u{J|?(a~CC%Ete?K*}?4L7jfdAJQd(EhOS
z-H);MBTT<98-hOAVSRAG`rw4=3KA1^ieP<`h>f*Z%GMp*i^EB{%<^uFFiX-f_JYKV
Zf^_Oj8V8GH9;D&eKb{B1@7Dc$D{mnWF1Y{z
delta 151
zcmX@bx{Rg%o)F7a1|VPsVi_QI0b+I_&H-W&=m26)AnpWWZXliv#BxA9ABZ`Ccpnfe
zFfuS42ht#QFMw>2x=%nFr0yS(2C0)}VqgF=!GIY^vH&sAP9_GXi3c?&_cO_Ewq$f-
G1Tg^D_7Lv?
diff --git a/tests/i18n/patterns/locale/en/LC_MESSAGES/django.po b/tests/i18n/patterns/locale/en/LC_MESSAGES/django.po
index ac98eb5f08..670a0ab1ed 100644
--- a/tests/i18n/patterns/locale/en/LC_MESSAGES/django.po
+++ b/tests/i18n/patterns/locale/en/LC_MESSAGES/django.po
@@ -17,16 +17,12 @@ msgstr ""
"Content-Transfer-Encoding: 8bit\n"
#: urls/default.py:11
-#, fuzzy
-#| msgid "^translated/$"
msgid "translated/"
-msgstr "^translated/$"
+msgstr "translated/"
#: urls/default.py:12
-#, fuzzy
-#| msgid "^translated/$"
msgid "^translated-regex/$"
-msgstr "^translated/$"
+msgstr "^translated-regex/$"
#: urls/default.py:14
msgid "^translated/(?P[\\w-]+)/$"
@@ -53,7 +49,5 @@ msgid "^register-without-slash$"
msgstr ""
#: urls/namespace.py:11
-#, fuzzy
-#| msgid "^register/$"
msgid "register-as-path/"
-msgstr "^register/$"
+msgstr "register-as-path/"
diff --git a/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.mo b/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.mo
index 8e36cb206409c512c1bb8d7031e79112d4c76914..bd28900eb116c90ad24efb7c4f6a0794cbc67315 100644
GIT binary patch
delta 228
zcmX@i`ir&xo)F7a1|Z-7Vi_Qg0b*_-o&&@nZ~}-qf%qg4gTyZbu`m$d2VyxO{tUz*
zy+Vu(41z#f8c2iG=>lm_AhrZzb|Al*iGhI+NOuEikp5Xf8mM22VI7bG(r^|?iva1H
zQ2x7#oyx2rli4S3j1nwLP0uVYNiEV%EY>YZEXmN{%*D8tQ4u0sl&V{ts+*jco0*r9
Tug_3Yl$cUlm6?)Xtj_=d)gdPi
delta 173
zcmeyxdYHBTo)F7a1|VPuVi_O~0b*_-?g3&D*a5_xK)e%(LE?vjSQv=U1F;+sKL%nB
zAZB8O$a4c}PaqZtVvw1MObiTsKspmhgY;DZX^_4iAPqE+i(xf{!LWVeOl4M(4u**b
Yqc-a@u3_XUDN0N!t;$TvFV<%O0Cb`jL;wH)
diff --git a/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.po b/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.po
index 464d14bc1f..25300cf6f9 100644
--- a/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.po
+++ b/tests/i18n/patterns/locale/pt_BR/LC_MESSAGES/django.po
@@ -50,7 +50,5 @@ msgid "^register-without-slash$"
msgstr ""
#: urls/namespace.py:11
-#, fuzzy
-#| msgid "^register/$"
msgid "register-as-path/"
-msgstr "^registre-se/$"
+msgstr "registre-se-caminho/"
From 3d4fe39bac082b835a2d82b717b6ae88ea70ea15 Mon Sep 17 00:00:00 2001
From: Adam Zapletal
Date: Fri, 1 Mar 2024 12:51:02 -0600
Subject: [PATCH 101/316] Refs #21286 -- Removed invalid commented out models
and tests from serializer tests.
FileField/ImageField cannot be primary keys, so serialization support
for this case will not be implemented.
XMLField was removed in d1290b5b43485c7018ba92981d34c1f96614924e.
---
tests/serializers/models/data.py | 8 --------
tests/serializers/test_data.py | 3 ---
2 files changed, 11 deletions(-)
diff --git a/tests/serializers/models/data.py b/tests/serializers/models/data.py
index a0e8751461..212ea0e06f 100644
--- a/tests/serializers/models/data.py
+++ b/tests/serializers/models/data.py
@@ -210,10 +210,6 @@ class EmailPKData(models.Model):
data = models.EmailField(primary_key=True)
-# class FilePKData(models.Model):
-# data = models.FileField(primary_key=True)
-
-
class FilePathPKData(models.Model):
data = models.FilePathField(primary_key=True)
@@ -226,10 +222,6 @@ class IntegerPKData(models.Model):
data = models.IntegerField(primary_key=True)
-# class ImagePKData(models.Model):
-# data = models.ImageField(primary_key=True)
-
-
class GenericIPAddressPKData(models.Model):
data = models.GenericIPAddressField(primary_key=True)
diff --git a/tests/serializers/test_data.py b/tests/serializers/test_data.py
index 6361dc0c05..33ea3458de 100644
--- a/tests/serializers/test_data.py
+++ b/tests/serializers/test_data.py
@@ -369,7 +369,6 @@ The end.""",
(pk_obj, 620, DatePKData, datetime.date(2006, 6, 16)),
(pk_obj, 630, DateTimePKData, datetime.datetime(2006, 6, 16, 10, 42, 37)),
(pk_obj, 640, EmailPKData, "hovercraft@example.com"),
- # (pk_obj, 650, FilePKData, 'file:///foo/bar/whiz.txt'),
(pk_obj, 660, FilePathPKData, "/foo/bar/whiz.txt"),
(pk_obj, 670, DecimalPKData, decimal.Decimal("12.345")),
(pk_obj, 671, DecimalPKData, decimal.Decimal("-12.345")),
@@ -380,7 +379,6 @@ The end.""",
(pk_obj, 680, IntegerPKData, 123456789),
(pk_obj, 681, IntegerPKData, -123456789),
(pk_obj, 682, IntegerPKData, 0),
- # (XX, ImagePKData
(pk_obj, 695, GenericIPAddressPKData, "fe80:1424:2223:6cff:fe8a:2e8a:2151:abcd"),
(pk_obj, 720, PositiveIntegerPKData, 123456789),
(pk_obj, 730, PositiveSmallIntegerPKData, 12),
@@ -393,7 +391,6 @@ The end.""",
# Several of them.
# The end."""),
# (pk_obj, 770, TimePKData, datetime.time(10, 42, 37)),
- # (pk_obj, 790, XMLPKData, " "),
(pk_obj, 791, UUIDData, uuid_obj),
(fk_obj, 792, FKToUUID, uuid_obj),
(pk_obj, 793, UUIDDefaultData, uuid_obj),
From 3fcef504726b659404f2135463ef8f387aa7a887 Mon Sep 17 00:00:00 2001
From: erosselli <67162025+erosselli@users.noreply.github.com>
Date: Mon, 4 Mar 2024 14:07:37 -0300
Subject: [PATCH 102/316] Added a GitHub pull request template.
Co-authored-by: Natalia <124304+nessita@users.noreply.github.com>
Co-authored-by: Paolo Melchiorre
Co-authored-by: Adam Johnson
---
.github/pull_request_template.md | 15 +++++++++++++++
1 file changed, 15 insertions(+)
create mode 100644 .github/pull_request_template.md
diff --git a/.github/pull_request_template.md b/.github/pull_request_template.md
new file mode 100644
index 0000000000..5780ce3a80
--- /dev/null
+++ b/.github/pull_request_template.md
@@ -0,0 +1,15 @@
+# Trac ticket number
+
+
+ticket-[number]
+
+# Branch description
+Provide a concise overview of the issue or rationale behind the proposed changes.
+
+# Checklist
+- [ ] This PR targets the `main` branch.
+- [ ] The commit message is written in past tense, mentions the ticket number, and ends with a period.
+- [ ] I have checked the "Has patch" **ticket flag** in the Trac system.
+- [ ] I have added or updated relevant **tests**.
+- [ ] I have added or updated relevant **docs**, including release notes if applicable.
+- [ ] For UI changes, I have attached **screenshots** in both light and dark modes.
From 368a8a3a83885a13776a530920f0317a40e7989d Mon Sep 17 00:00:00 2001
From: Leandro de Souza <85115541+leandrodesouzadev@users.noreply.github.com>
Date: Mon, 4 Mar 2024 14:59:49 -0300
Subject: [PATCH 103/316] Fixed #35261 -- Corrected Media JS example of
object-based paths in docs.
`rel` attribute is not valid on ` ` tags.
---
docs/topics/forms/media.txt | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/docs/topics/forms/media.txt b/docs/topics/forms/media.txt
index 6e7bfdcbd4..3fddf2d4bb 100644
--- a/docs/topics/forms/media.txt
+++ b/docs/topics/forms/media.txt
@@ -287,7 +287,7 @@ outputting the complete HTML ``
-
From c7fc9f20b49b5889a9a8f47de45165ac443c1a21 Mon Sep 17 00:00:00 2001
From: Hisham Mahmood
Date: Sun, 5 May 2024 11:21:28 +0500
Subject: [PATCH 266/316] Fixed #31405 -- Added LoginRequiredMiddleware.
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Co-authored-by: Adam Johnson
Co-authored-by: Mehmet İnce
Co-authored-by: Sarah Boyce <42296566+sarahboyce@users.noreply.github.com>
---
django/contrib/admin/sites.py | 6 +-
django/contrib/auth/apps.py | 3 +-
django/contrib/auth/checks.py | 42 ++++++
django/contrib/auth/decorators.py | 12 ++
django/contrib/auth/middleware.py | 56 +++++++-
django/contrib/auth/views.py | 7 +-
docs/ref/checks.txt | 4 +
docs/ref/middleware.txt | 58 +++++++++
docs/ref/settings.txt | 5 +-
docs/releases/5.1.txt | 14 ++
docs/topics/auth/default.txt | 17 +++
tests/auth_tests/test_checks.py | 110 +++++++++++++++-
tests/auth_tests/test_decorators.py | 35 +++++
tests/auth_tests/test_middleware.py | 141 ++++++++++++++++++++-
tests/auth_tests/test_views.py | 80 +++++++++++-
tests/auth_tests/urls.py | 53 +++++++-
tests/deprecation/test_middleware_mixin.py | 2 +
17 files changed, 633 insertions(+), 12 deletions(-)
diff --git a/django/contrib/admin/sites.py b/django/contrib/admin/sites.py
index bb02cb08ac..dc67262afc 100644
--- a/django/contrib/admin/sites.py
+++ b/django/contrib/admin/sites.py
@@ -7,11 +7,12 @@ from django.contrib.admin import ModelAdmin, actions
from django.contrib.admin.exceptions import AlreadyRegistered, NotRegistered
from django.contrib.admin.views.autocomplete import AutocompleteJsonView
from django.contrib.auth import REDIRECT_FIELD_NAME
+from django.contrib.auth.decorators import login_not_required
from django.core.exceptions import ImproperlyConfigured
from django.db.models.base import ModelBase
from django.http import Http404, HttpResponsePermanentRedirect, HttpResponseRedirect
from django.template.response import TemplateResponse
-from django.urls import NoReverseMatch, Resolver404, resolve, reverse
+from django.urls import NoReverseMatch, Resolver404, resolve, reverse, reverse_lazy
from django.utils.decorators import method_decorator
from django.utils.functional import LazyObject
from django.utils.module_loading import import_string
@@ -259,6 +260,8 @@ class AdminSite:
return self.admin_view(view, cacheable)(*args, **kwargs)
wrapper.admin_site = self
+ # Used by LoginRequiredMiddleware.
+ wrapper.login_url = reverse_lazy("admin:login", current_app=self.name)
return update_wrapper(wrapper, view)
# Admin-site-wide views.
@@ -402,6 +405,7 @@ class AdminSite:
return LogoutView.as_view(**defaults)(request)
@method_decorator(never_cache)
+ @login_not_required
def login(self, request, extra_context=None):
"""
Display the login form for the given HttpRequest.
diff --git a/django/contrib/auth/apps.py b/django/contrib/auth/apps.py
index 4882a27c42..ad6f816809 100644
--- a/django/contrib/auth/apps.py
+++ b/django/contrib/auth/apps.py
@@ -5,7 +5,7 @@ from django.db.models.signals import post_migrate
from django.utils.translation import gettext_lazy as _
from . import get_user_model
-from .checks import check_models_permissions, check_user_model
+from .checks import check_middleware, check_models_permissions, check_user_model
from .management import create_permissions
from .signals import user_logged_in
@@ -28,3 +28,4 @@ class AuthConfig(AppConfig):
user_logged_in.connect(update_last_login, dispatch_uid="update_last_login")
checks.register(check_user_model, checks.Tags.models)
checks.register(check_models_permissions, checks.Tags.models)
+ checks.register(check_middleware)
diff --git a/django/contrib/auth/checks.py b/django/contrib/auth/checks.py
index ee8082524d..f2f9a74a6c 100644
--- a/django/contrib/auth/checks.py
+++ b/django/contrib/auth/checks.py
@@ -4,10 +4,27 @@ from types import MethodType
from django.apps import apps
from django.conf import settings
from django.core import checks
+from django.utils.module_loading import import_string
from .management import _get_builtin_permissions
+def _subclass_index(class_path, candidate_paths):
+ """
+ Return the index of dotted class path (or a subclass of that class) in a
+ list of candidate paths. If it does not exist, return -1.
+ """
+ cls = import_string(class_path)
+ for index, path in enumerate(candidate_paths):
+ try:
+ candidate_cls = import_string(path)
+ if issubclass(candidate_cls, cls):
+ return index
+ except (ImportError, TypeError):
+ continue
+ return -1
+
+
def check_user_model(app_configs=None, **kwargs):
if app_configs is None:
cls = apps.get_model(settings.AUTH_USER_MODEL)
@@ -218,3 +235,28 @@ def check_models_permissions(app_configs=None, **kwargs):
codenames.add(codename)
return errors
+
+
+def check_middleware(app_configs, **kwargs):
+ errors = []
+
+ login_required_index = _subclass_index(
+ "django.contrib.auth.middleware.LoginRequiredMiddleware",
+ settings.MIDDLEWARE,
+ )
+
+ if login_required_index != -1:
+ auth_index = _subclass_index(
+ "django.contrib.auth.middleware.AuthenticationMiddleware",
+ settings.MIDDLEWARE,
+ )
+ if auth_index == -1 or auth_index > login_required_index:
+ errors.append(
+ checks.Error(
+ "In order to use django.contrib.auth.middleware."
+ "LoginRequiredMiddleware, django.contrib.auth.middleware."
+ "AuthenticationMiddleware must be defined before it in MIDDLEWARE.",
+ id="auth.E013",
+ )
+ )
+ return errors
diff --git a/django/contrib/auth/decorators.py b/django/contrib/auth/decorators.py
index b220cc2bd3..ea1cef0795 100644
--- a/django/contrib/auth/decorators.py
+++ b/django/contrib/auth/decorators.py
@@ -60,6 +60,10 @@ def user_passes_test(
return view_func(request, *args, **kwargs)
return _redirect_to_login(request)
+ # Attributes used by LoginRequiredMiddleware.
+ _view_wrapper.login_url = login_url
+ _view_wrapper.redirect_field_name = redirect_field_name
+
return wraps(view_func)(_view_wrapper)
return decorator
@@ -82,6 +86,14 @@ def login_required(
return actual_decorator
+def login_not_required(view_func):
+ """
+ Decorator for views that allows access to unauthenticated requests.
+ """
+ view_func.login_required = False
+ return view_func
+
+
def permission_required(perm, login_url=None, raise_exception=False):
"""
Decorator for views that checks whether a user has a particular permission
diff --git a/django/contrib/auth/middleware.py b/django/contrib/auth/middleware.py
index 6b8dd4340e..761929d67d 100644
--- a/django/contrib/auth/middleware.py
+++ b/django/contrib/auth/middleware.py
@@ -1,9 +1,13 @@
from functools import partial
+from urllib.parse import urlparse
+from django.conf import settings
from django.contrib import auth
-from django.contrib.auth import load_backend
+from django.contrib.auth import REDIRECT_FIELD_NAME, load_backend
from django.contrib.auth.backends import RemoteUserBackend
+from django.contrib.auth.views import redirect_to_login
from django.core.exceptions import ImproperlyConfigured
+from django.shortcuts import resolve_url
from django.utils.deprecation import MiddlewareMixin
from django.utils.functional import SimpleLazyObject
@@ -34,6 +38,56 @@ class AuthenticationMiddleware(MiddlewareMixin):
request.auser = partial(auser, request)
+class LoginRequiredMiddleware(MiddlewareMixin):
+ """
+ Middleware that redirects all unauthenticated requests to a login page.
+
+ Views using the login_not_required decorator will not be redirected.
+ """
+
+ redirect_field_name = REDIRECT_FIELD_NAME
+
+ def process_view(self, request, view_func, view_args, view_kwargs):
+ if request.user.is_authenticated:
+ return None
+
+ if not getattr(view_func, "login_required", True):
+ return None
+
+ return self.handle_no_permission(request, view_func)
+
+ def get_login_url(self, view_func):
+ login_url = getattr(view_func, "login_url", None) or settings.LOGIN_URL
+ if not login_url:
+ raise ImproperlyConfigured(
+ "No login URL to redirect to. Define settings.LOGIN_URL or "
+ "provide a login_url via the 'django.contrib.auth.decorators."
+ "login_required' decorator."
+ )
+ return str(login_url)
+
+ def get_redirect_field_name(self, view_func):
+ return getattr(view_func, "redirect_field_name", self.redirect_field_name)
+
+ def handle_no_permission(self, request, view_func):
+ path = request.build_absolute_uri()
+ resolved_login_url = resolve_url(self.get_login_url(view_func))
+ # If the login url is the same scheme and net location then use the
+ # path as the "next" url.
+ login_scheme, login_netloc = urlparse(resolved_login_url)[:2]
+ current_scheme, current_netloc = urlparse(path)[:2]
+ if (not login_scheme or login_scheme == current_scheme) and (
+ not login_netloc or login_netloc == current_netloc
+ ):
+ path = request.get_full_path()
+
+ return redirect_to_login(
+ path,
+ resolved_login_url,
+ self.get_redirect_field_name(view_func),
+ )
+
+
class RemoteUserMiddleware(MiddlewareMixin):
"""
Middleware for utilizing web-server-provided authentication.
diff --git a/django/contrib/auth/views.py b/django/contrib/auth/views.py
index 0d16104655..9a6d18bcd2 100644
--- a/django/contrib/auth/views.py
+++ b/django/contrib/auth/views.py
@@ -7,7 +7,7 @@ from django.contrib.auth import REDIRECT_FIELD_NAME, get_user_model
from django.contrib.auth import login as auth_login
from django.contrib.auth import logout as auth_logout
from django.contrib.auth import update_session_auth_hash
-from django.contrib.auth.decorators import login_required
+from django.contrib.auth.decorators import login_not_required, login_required
from django.contrib.auth.forms import (
AuthenticationForm,
PasswordChangeForm,
@@ -62,6 +62,7 @@ class RedirectURLMixin:
raise ImproperlyConfigured("No URL to redirect to. Provide a next_page.")
+@method_decorator(login_not_required, name="dispatch")
class LoginView(RedirectURLMixin, FormView):
"""
Display the login form and handle the login action.
@@ -210,6 +211,7 @@ class PasswordContextMixin:
return context
+@method_decorator(login_not_required, name="dispatch")
class PasswordResetView(PasswordContextMixin, FormView):
email_template_name = "registration/password_reset_email.html"
extra_email_context = None
@@ -244,11 +246,13 @@ class PasswordResetView(PasswordContextMixin, FormView):
INTERNAL_RESET_SESSION_TOKEN = "_password_reset_token"
+@method_decorator(login_not_required, name="dispatch")
class PasswordResetDoneView(PasswordContextMixin, TemplateView):
template_name = "registration/password_reset_done.html"
title = _("Password reset sent")
+@method_decorator(login_not_required, name="dispatch")
class PasswordResetConfirmView(PasswordContextMixin, FormView):
form_class = SetPasswordForm
post_reset_login = False
@@ -335,6 +339,7 @@ class PasswordResetConfirmView(PasswordContextMixin, FormView):
return context
+@method_decorator(login_not_required, name="dispatch")
class PasswordResetCompleteView(PasswordContextMixin, TemplateView):
template_name = "registration/password_reset_complete.html"
title = _("Password reset complete")
diff --git a/docs/ref/checks.txt b/docs/ref/checks.txt
index efc8cf666a..d78a6f76b2 100644
--- a/docs/ref/checks.txt
+++ b/docs/ref/checks.txt
@@ -868,6 +868,10 @@ The following checks are performed on the default
for its builtin permission names to be at most 100 characters.
* **auth.E012**: The permission codenamed ```` of model ````
is longer than 100 characters.
+* **auth.E013**: In order to use
+ :class:`django.contrib.auth.middleware.LoginRequiredMiddleware`,
+ :class:`django.contrib.auth.middleware.AuthenticationMiddleware` must be
+ defined before it in MIDDLEWARE.
``contenttypes``
----------------
diff --git a/docs/ref/middleware.txt b/docs/ref/middleware.txt
index 63b38da0a0..ba9bef7e6f 100644
--- a/docs/ref/middleware.txt
+++ b/docs/ref/middleware.txt
@@ -495,6 +495,58 @@ Adds the ``user`` attribute, representing the currently-logged-in user, to
every incoming ``HttpRequest`` object. See :ref:`Authentication in web requests
`.
+.. class:: LoginRequiredMiddleware
+
+.. versionadded:: 5.1
+
+Redirects all unauthenticated requests to a login page. For admin views, this
+redirects to the admin login. For all other views, this will redirect to
+:setting:`settings.LOGIN_URL `. This can be customized by using the
+:func:`~.django.contrib.auth.decorators.login_required` decorator and setting
+``login_url`` or ``redirect_field_name`` for the view. For example::
+
+ @method_decorator(
+ login_required(login_url="/login/", redirect_field_name="redirect_to"),
+ name="dispatch",
+ )
+ class MyView(View):
+ pass
+
+
+ @login_required(login_url="/login/", redirect_field_name="redirect_to")
+ def my_view(request): ...
+
+Views using the :func:`~django.contrib.auth.decorators.login_not_required`
+decorator are exempt from this requirement.
+
+.. admonition:: Ensure that your login view does not require a login.
+
+ To prevent infinite redirects, ensure you have
+ :ref:`enabled unauthenticated requests
+ ` to your login view.
+
+**Methods and Attributes**
+
+.. attribute:: redirect_field_name
+
+ Defaults to ``"next"``.
+
+.. method:: get_login_url()
+
+ Returns the URL that unauthenticated requests will be redirected to. If
+ defined, this returns the ``login_url`` set on the
+ :func:`~.django.contrib.auth.decorators.login_required` decorator. Defaults
+ to :setting:`settings.LOGIN_URL `.
+
+.. method:: get_redirect_field_name()
+
+ Returns the name of the query parameter that contains the URL the user
+ should be redirected to after a successful login. If defined, this returns
+ the ``redirect_field_name`` set on the
+ :func:`~.django.contrib.auth.decorators.login_required` decorator. Defaults
+ to :attr:`redirect_field_name`. If ``None`` is returned, a query parameter
+ won't be added.
+
.. class:: RemoteUserMiddleware
Middleware for utilizing web server provided authentication. See
@@ -597,6 +649,12 @@ Here are some hints about the ordering of various Django middleware classes:
After ``SessionMiddleware``: uses session storage.
+#. :class:`~django.contrib.auth.middleware.LoginRequiredMiddleware`
+
+ .. versionadded:: 5.1
+
+ After ``AuthenticationMiddleware``: uses user object.
+
#. :class:`~django.contrib.messages.middleware.MessageMiddleware`
After ``SessionMiddleware``: can use session-based storage.
diff --git a/docs/ref/settings.txt b/docs/ref/settings.txt
index fdd44a887d..ee25eab0dd 100644
--- a/docs/ref/settings.txt
+++ b/docs/ref/settings.txt
@@ -3060,8 +3060,9 @@ Default: ``'/accounts/login/'``
The URL or :ref:`named URL pattern ` where requests are
redirected for login when using the
:func:`~django.contrib.auth.decorators.login_required` decorator,
-:class:`~django.contrib.auth.mixins.LoginRequiredMixin`, or
-:class:`~django.contrib.auth.mixins.AccessMixin`.
+:class:`~django.contrib.auth.mixins.LoginRequiredMixin`,
+:class:`~django.contrib.auth.mixins.AccessMixin`, or when
+:class:`~django.contrib.auth.middleware.LoginRequiredMiddleware` is installed.
.. setting:: LOGOUT_REDIRECT_URL
diff --git a/docs/releases/5.1.txt b/docs/releases/5.1.txt
index faaa5c9833..f2b7663576 100644
--- a/docs/releases/5.1.txt
+++ b/docs/releases/5.1.txt
@@ -26,6 +26,20 @@ only officially support the latest release of each series.
What's new in Django 5.1
========================
+Middleware to require authentication by default
+-----------------------------------------------
+
+The new :class:`~django.contrib.auth.middleware.LoginRequiredMiddleware`
+redirects all unauthenticated requests to a login page. Views can allow
+unauthenticated requests by using the new
+:func:`~django.contrib.auth.decorators.login_not_required` decorator.
+
+The :class:`~django.contrib.auth.middleware.LoginRequiredMiddleware` respects
+the ``login_url`` and ``redirect_field_name`` values set via the
+:func:`~.django.contrib.auth.decorators.login_required` decorator, but does not
+support setting ``login_url`` or ``redirect_field_name`` via the
+:class:`~django.contrib.auth.mixins.LoginRequiredMixin`.
+
Minor features
--------------
diff --git a/docs/topics/auth/default.txt b/docs/topics/auth/default.txt
index 795a1bdacc..1d2ea8132d 100644
--- a/docs/topics/auth/default.txt
+++ b/docs/topics/auth/default.txt
@@ -656,8 +656,25 @@ inheritance list.
``is_active`` flag on a user, but the default
:setting:`AUTHENTICATION_BACKENDS` reject inactive users.
+.. _disable-login-required-middleware-for-views:
+
.. currentmodule:: django.contrib.auth.decorators
+The ``login_not_required`` decorator
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+.. versionadded:: 5.1
+
+When :class:`~django.contrib.auth.middleware.LoginRequiredMiddleware` is
+installed, all views require authentication by default. Some views, such as the
+login view, may need to disable this behavior.
+
+.. function:: login_not_required()
+
+ Allows unauthenticated requests without redirecting to the login page when
+ :class:`~django.contrib.auth.middleware.LoginRequiredMiddleware` is
+ installed.
+
Limiting access to logged-in users that pass a test
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
diff --git a/tests/auth_tests/test_checks.py b/tests/auth_tests/test_checks.py
index 5757946f95..3d70451e9d 100644
--- a/tests/auth_tests/test_checks.py
+++ b/tests/auth_tests/test_checks.py
@@ -1,5 +1,14 @@
-from django.contrib.auth.checks import check_models_permissions, check_user_model
+from django.contrib.auth.checks import (
+ check_middleware,
+ check_models_permissions,
+ check_user_model,
+)
+from django.contrib.auth.middleware import (
+ AuthenticationMiddleware,
+ LoginRequiredMiddleware,
+)
from django.contrib.auth.models import AbstractBaseUser
+from django.contrib.sessions.middleware import SessionMiddleware
from django.core import checks
from django.db import models
from django.db.models import Q, UniqueConstraint
@@ -345,3 +354,102 @@ class ModelsPermissionsChecksTests(SimpleTestCase):
default_permissions = ()
self.assertEqual(checks.run_checks(self.apps.get_app_configs()), [])
+
+
+class LoginRequiredMiddlewareSubclass(LoginRequiredMiddleware):
+ redirect_field_name = "redirect_to"
+
+
+class AuthenticationMiddlewareSubclass(AuthenticationMiddleware):
+ pass
+
+
+class SessionMiddlewareSubclass(SessionMiddleware):
+ pass
+
+
+@override_system_checks([check_middleware])
+class MiddlewareChecksTests(SimpleTestCase):
+ @override_settings(
+ MIDDLEWARE=[
+ "auth_tests.test_checks.SessionMiddlewareSubclass",
+ "auth_tests.test_checks.AuthenticationMiddlewareSubclass",
+ "auth_tests.test_checks.LoginRequiredMiddlewareSubclass",
+ ]
+ )
+ def test_middleware_subclasses(self):
+ errors = checks.run_checks()
+ self.assertEqual(errors, [])
+
+ @override_settings(
+ MIDDLEWARE=[
+ "auth_tests.test_checks",
+ "auth_tests.test_checks.NotExist",
+ ]
+ )
+ def test_invalid_middleware_skipped(self):
+ errors = checks.run_checks()
+ self.assertEqual(errors, [])
+
+ @override_settings(
+ MIDDLEWARE=[
+ "django.contrib.does.not.Exist",
+ "django.contrib.sessions.middleware.SessionMiddleware",
+ "django.contrib.auth.middleware.AuthenticationMiddleware",
+ "django.contrib.auth.middleware.LoginRequiredMiddleware",
+ ]
+ )
+ def test_check_ignores_import_error_in_middleware(self):
+ errors = checks.run_checks()
+ self.assertEqual(errors, [])
+
+ @override_settings(
+ MIDDLEWARE=[
+ "django.contrib.sessions.middleware.SessionMiddleware",
+ "django.contrib.auth.middleware.AuthenticationMiddleware",
+ "django.contrib.auth.middleware.LoginRequiredMiddleware",
+ ]
+ )
+ def test_correct_order_with_login_required_middleware(self):
+ errors = checks.run_checks()
+ self.assertEqual(errors, [])
+
+ @override_settings(
+ MIDDLEWARE=[
+ "django.contrib.auth.middleware.LoginRequiredMiddleware",
+ "django.contrib.auth.middleware.AuthenticationMiddleware",
+ "django.contrib.sessions.middleware.SessionMiddleware",
+ ]
+ )
+ def test_incorrect_order_with_login_required_middleware(self):
+ errors = checks.run_checks()
+ self.assertEqual(
+ errors,
+ [
+ checks.Error(
+ "In order to use django.contrib.auth.middleware."
+ "LoginRequiredMiddleware, django.contrib.auth.middleware."
+ "AuthenticationMiddleware must be defined before it in MIDDLEWARE.",
+ id="auth.E013",
+ )
+ ],
+ )
+
+ @override_settings(
+ MIDDLEWARE=[
+ "django.contrib.auth.middleware.LoginRequiredMiddleware",
+ ]
+ )
+ def test_missing_authentication_with_login_required_middleware(self):
+ errors = checks.run_checks()
+ self.assertEqual(
+ errors,
+ [
+ checks.Error(
+ "In order to use django.contrib.auth.middleware."
+ "LoginRequiredMiddleware, django.contrib.auth.middleware."
+ "AuthenticationMiddleware must be defined before it in MIDDLEWARE.",
+ id="auth.E013",
+ )
+ ],
+ )
diff --git a/tests/auth_tests/test_decorators.py b/tests/auth_tests/test_decorators.py
index 48fa915c5c..e585b28bd5 100644
--- a/tests/auth_tests/test_decorators.py
+++ b/tests/auth_tests/test_decorators.py
@@ -5,6 +5,7 @@ from asgiref.sync import sync_to_async
from django.conf import settings
from django.contrib.auth import models
from django.contrib.auth.decorators import (
+ login_not_required,
login_required,
permission_required,
user_passes_test,
@@ -113,6 +114,40 @@ class LoginRequiredTestCase(AuthViewsTestCase):
await self.test_login_required_async_view(login_url="/somewhere/")
+class LoginNotRequiredTestCase(TestCase):
+ """
+ Tests the login_not_required decorators
+ """
+
+ def test_callable(self):
+ """
+ login_not_required is assignable to callable objects.
+ """
+
+ class CallableView:
+ def __call__(self, *args, **kwargs):
+ pass
+
+ login_not_required(CallableView())
+
+ def test_view(self):
+ """
+ login_not_required is assignable to normal views.
+ """
+
+ def normal_view(request):
+ pass
+
+ login_not_required(normal_view)
+
+ def test_decorator_marks_view_as_login_not_required(self):
+ @login_not_required
+ def view(request):
+ return HttpResponse()
+
+ self.assertFalse(view.login_required)
+
+
class PermissionsRequiredDecoratorTest(TestCase):
"""
Tests for the permission_required decorator
diff --git a/tests/auth_tests/test_middleware.py b/tests/auth_tests/test_middleware.py
index e7c5a525cd..a837eb8b96 100644
--- a/tests/auth_tests/test_middleware.py
+++ b/tests/auth_tests/test_middleware.py
@@ -1,8 +1,14 @@
-from django.contrib.auth.middleware import AuthenticationMiddleware
+from django.conf import settings
+from django.contrib.auth import REDIRECT_FIELD_NAME
+from django.contrib.auth.middleware import (
+ AuthenticationMiddleware,
+ LoginRequiredMiddleware,
+)
from django.contrib.auth.models import User
from django.core.exceptions import ImproperlyConfigured
from django.http import HttpRequest, HttpResponse
-from django.test import TestCase
+from django.test import TestCase, modify_settings, override_settings
+from django.urls import reverse
class TestAuthenticationMiddleware(TestCase):
@@ -50,3 +56,134 @@ class TestAuthenticationMiddleware(TestCase):
self.assertEqual(auser, self.user)
auser_second = await self.request.auser()
self.assertIs(auser, auser_second)
+
+
+@override_settings(ROOT_URLCONF="auth_tests.urls")
+@modify_settings(
+ MIDDLEWARE={"append": "django.contrib.auth.middleware.LoginRequiredMiddleware"}
+)
+class TestLoginRequiredMiddleware(TestCase):
+ @classmethod
+ def setUpTestData(cls):
+ cls.user = User.objects.create_user(
+ "test_user", "test@example.com", "test_password"
+ )
+
+ def setUp(self):
+ self.middleware = LoginRequiredMiddleware(lambda req: HttpResponse())
+ self.request = HttpRequest()
+
+ def test_public_paths(self):
+ paths = ["public_view", "public_function_view"]
+ for path in paths:
+ response = self.client.get(f"/{path}/")
+ self.assertEqual(response.status_code, 200)
+
+ def test_protected_paths(self):
+ paths = ["protected_view", "protected_function_view"]
+ for path in paths:
+ response = self.client.get(f"/{path}/")
+ self.assertRedirects(
+ response,
+ settings.LOGIN_URL + f"?next=/{path}/",
+ fetch_redirect_response=False,
+ )
+
+ def test_login_required_paths(self):
+ paths = ["login_required_cbv_view", "login_required_decorator_view"]
+ for path in paths:
+ response = self.client.get(f"/{path}/")
+ self.assertRedirects(
+ response,
+ "/custom_login/" + f"?step=/{path}/",
+ fetch_redirect_response=False,
+ )
+
+ def test_admin_path(self):
+ admin_url = reverse("admin:index")
+ response = self.client.get(admin_url)
+ self.assertRedirects(
+ response,
+ reverse("admin:login") + f"?next={admin_url}",
+ target_status_code=200,
+ )
+
+ def test_non_existent_path(self):
+ response = self.client.get("/non_existent/")
+ self.assertEqual(response.status_code, 404)
+
+ def test_paths_with_logged_in_user(self):
+ paths = [
+ "public_view",
+ "public_function_view",
+ "protected_view",
+ "protected_function_view",
+ "login_required_cbv_view",
+ "login_required_decorator_view",
+ ]
+ self.client.login(username="test_user", password="test_password")
+ for path in paths:
+ response = self.client.get(f"/{path}/")
+ self.assertEqual(response.status_code, 200)
+
+ def test_get_login_url_from_view_func(self):
+ def view_func(request):
+ return HttpResponse()
+
+ view_func.login_url = "/custom_login/"
+ login_url = self.middleware.get_login_url(view_func)
+ self.assertEqual(login_url, "/custom_login/")
+
+ @override_settings(LOGIN_URL="/settings_login/")
+ def test_get_login_url_from_settings(self):
+ login_url = self.middleware.get_login_url(lambda: None)
+ self.assertEqual(login_url, "/settings_login/")
+
+ @override_settings(LOGIN_URL=None)
+ def test_get_login_url_no_login_url(self):
+ with self.assertRaises(ImproperlyConfigured) as e:
+ self.middleware.get_login_url(lambda: None)
+ self.assertEqual(
+ str(e.exception),
+ "No login URL to redirect to. Define settings.LOGIN_URL or provide "
+ "a login_url via the 'django.contrib.auth.decorators.login_required' "
+ "decorator.",
+ )
+
+ def test_get_redirect_field_name_from_view_func(self):
+ def view_func(request):
+ return HttpResponse()
+
+ view_func.redirect_field_name = "next_page"
+ redirect_field_name = self.middleware.get_redirect_field_name(view_func)
+ self.assertEqual(redirect_field_name, "next_page")
+
+ @override_settings(
+ MIDDLEWARE=[
+ "django.contrib.sessions.middleware.SessionMiddleware",
+ "django.contrib.auth.middleware.AuthenticationMiddleware",
+ "auth_tests.test_checks.LoginRequiredMiddlewareSubclass",
+ ],
+ LOGIN_URL="/settings_login/",
+ )
+ def test_login_url_resolve_logic(self):
+ paths = ["login_required_cbv_view", "login_required_decorator_view"]
+ for path in paths:
+ response = self.client.get(f"/{path}/")
+ self.assertRedirects(
+ response,
+ "/custom_login/" + f"?step=/{path}/",
+ fetch_redirect_response=False,
+ )
+ paths = ["protected_view", "protected_function_view"]
+ for path in paths:
+ response = self.client.get(f"/{path}/")
+ self.assertRedirects(
+ response,
+ f"/settings_login/?redirect_to=/{path}/",
+ fetch_redirect_response=False,
+ )
+
+ def test_get_redirect_field_name_default(self):
+ redirect_field_name = self.middleware.get_redirect_field_name(lambda: None)
+ self.assertEqual(redirect_field_name, REDIRECT_FIELD_NAME)
diff --git a/tests/auth_tests/test_views.py b/tests/auth_tests/test_views.py
index 53e33785b0..97d0448ab1 100644
--- a/tests/auth_tests/test_views.py
+++ b/tests/auth_tests/test_views.py
@@ -32,7 +32,7 @@ from django.core.exceptions import ImproperlyConfigured
from django.db import connection
from django.http import HttpRequest, HttpResponse
from django.middleware.csrf import CsrfViewMiddleware, get_token
-from django.test import Client, TestCase, override_settings
+from django.test import Client, TestCase, modify_settings, override_settings
from django.test.client import RedirectCycleError
from django.urls import NoReverseMatch, reverse, reverse_lazy
from django.utils.http import urlsafe_base64_encode
@@ -472,6 +472,29 @@ class PasswordResetTest(AuthViewsTestCase):
with self.assertRaisesMessage(ImproperlyConfigured, msg):
self.client.get("/reset/missing_parameters/")
+ @modify_settings(
+ MIDDLEWARE={"append": "django.contrib.auth.middleware.LoginRequiredMiddleware"}
+ )
+ def test_access_under_login_required_middleware(self):
+ reset_urls = [
+ reverse("password_reset"),
+ reverse("password_reset_done"),
+ reverse("password_reset_confirm", kwargs={"uidb64": "abc", "token": "def"}),
+ reverse("password_reset_complete"),
+ ]
+
+ for url in reset_urls:
+ with self.subTest(url=url):
+ response = self.client.get(url)
+ self.assertEqual(response.status_code, 200)
+
+ response = self.client.post(
+ "/password_reset/", {"email": "staffmember@example.com"}
+ )
+ self.assertRedirects(
+ response, "/password_reset/done/", fetch_redirect_response=False
+ )
+
@override_settings(AUTH_USER_MODEL="auth_tests.CustomUser")
class CustomUserPasswordResetTest(AuthViewsTestCase):
@@ -661,6 +684,38 @@ class ChangePasswordTest(AuthViewsTestCase):
response, "/password_reset/", fetch_redirect_response=False
)
+ @modify_settings(
+ MIDDLEWARE={"append": "django.contrib.auth.middleware.LoginRequiredMiddleware"}
+ )
+ def test_access_under_login_required_middleware(self):
+ response = self.client.post(
+ "/password_change/",
+ {
+ "old_password": "password",
+ "new_password1": "password1",
+ "new_password2": "password1",
+ },
+ )
+ self.assertRedirects(
+ response,
+ settings.LOGIN_URL + "?next=/password_change/",
+ fetch_redirect_response=False,
+ )
+
+ self.login()
+
+ response = self.client.post(
+ "/password_change/",
+ {
+ "old_password": "password",
+ "new_password1": "password1",
+ "new_password2": "password1",
+ },
+ )
+ self.assertRedirects(
+ response, "/password_change/done/", fetch_redirect_response=False
+ )
+
class SessionAuthenticationTests(AuthViewsTestCase):
def test_user_password_change_updates_session(self):
@@ -904,6 +959,13 @@ class LoginTest(AuthViewsTestCase):
response = self.login(url="/login/get_default_redirect_url/?next=/test/")
self.assertRedirects(response, "/test/", fetch_redirect_response=False)
+ @modify_settings(
+ MIDDLEWARE={"append": "django.contrib.auth.middleware.LoginRequiredMiddleware"}
+ )
+ def test_access_under_login_required_middleware(self):
+ response = self.client.get(reverse("login"))
+ self.assertEqual(response.status_code, 200)
+
class LoginURLSettings(AuthViewsTestCase):
"""Tests for settings.LOGIN_URL."""
@@ -1355,6 +1417,22 @@ class LogoutTest(AuthViewsTestCase):
self.assertContains(response, "Logged out")
self.confirm_logged_out()
+ @modify_settings(
+ MIDDLEWARE={"append": "django.contrib.auth.middleware.LoginRequiredMiddleware"}
+ )
+ def test_access_under_login_required_middleware(self):
+ response = self.client.post("/logout/")
+ self.assertRedirects(
+ response,
+ settings.LOGIN_URL + "?next=/logout/",
+ fetch_redirect_response=False,
+ )
+
+ self.login()
+
+ response = self.client.post("/logout/")
+ self.assertEqual(response.status_code, 200)
+
def get_perm(Model, perm):
ct = ContentType.objects.get_for_model(Model)
diff --git a/tests/auth_tests/urls.py b/tests/auth_tests/urls.py
index 99fa22e4f4..cb6a0ed1cf 100644
--- a/tests/auth_tests/urls.py
+++ b/tests/auth_tests/urls.py
@@ -1,6 +1,10 @@
from django.contrib import admin
from django.contrib.auth import views
-from django.contrib.auth.decorators import login_required, permission_required
+from django.contrib.auth.decorators import (
+ login_not_required,
+ login_required,
+ permission_required,
+)
from django.contrib.auth.forms import AuthenticationForm
from django.contrib.auth.urls import urlpatterns as auth_urlpatterns
from django.contrib.auth.views import LoginView
@@ -9,6 +13,8 @@ from django.http import HttpRequest, HttpResponse
from django.shortcuts import render
from django.template import RequestContext, Template
from django.urls import path, re_path, reverse_lazy
+from django.utils.decorators import method_decorator
+from django.views import View
from django.views.decorators.cache import never_cache
from django.views.i18n import set_language
@@ -88,6 +94,42 @@ class CustomDefaultRedirectURLLoginView(LoginView):
return "/custom/"
+class EmptyResponseBaseView(View):
+ def get(self, request, *args, **kwargs):
+ return HttpResponse()
+
+
+@method_decorator(login_not_required, name="dispatch")
+class PublicView(EmptyResponseBaseView):
+ pass
+
+
+class ProtectedView(EmptyResponseBaseView):
+ pass
+
+
+@method_decorator(
+ login_required(login_url="/custom_login/", redirect_field_name="step"),
+ name="dispatch",
+)
+class ProtectedViewWithCustomLoginRequired(EmptyResponseBaseView):
+ pass
+
+
+@login_not_required
+def public_view(request):
+ return HttpResponse()
+
+
+def protected_view(request):
+ return HttpResponse()
+
+
+@login_required(login_url="/custom_login/", redirect_field_name="step")
+def protected_view_with_login_required_decorator(request):
+ return HttpResponse()
+
+
# special urls for auth test cases
urlpatterns = auth_urlpatterns + [
path(
@@ -198,7 +240,14 @@ urlpatterns = auth_urlpatterns + [
"login_and_permission_required_exception/",
login_and_permission_required_exception,
),
+ path("public_view/", PublicView.as_view()),
+ path("public_function_view/", public_view),
+ path("protected_view/", ProtectedView.as_view()),
+ path("protected_function_view/", protected_view),
+ path(
+ "login_required_decorator_view/", protected_view_with_login_required_decorator
+ ),
+ path("login_required_cbv_view/", ProtectedViewWithCustomLoginRequired.as_view()),
path("setlang/", set_language, name="set_language"),
- # This line is only required to render the password reset with is_admin=True
path("admin/", admin.site.urls),
]
diff --git a/tests/deprecation/test_middleware_mixin.py b/tests/deprecation/test_middleware_mixin.py
index 3b6ad6d8ee..f4eafc14e3 100644
--- a/tests/deprecation/test_middleware_mixin.py
+++ b/tests/deprecation/test_middleware_mixin.py
@@ -5,6 +5,7 @@ from asgiref.sync import async_to_sync, iscoroutinefunction
from django.contrib.admindocs.middleware import XViewMiddleware
from django.contrib.auth.middleware import (
AuthenticationMiddleware,
+ LoginRequiredMiddleware,
RemoteUserMiddleware,
)
from django.contrib.flatpages.middleware import FlatpageFallbackMiddleware
@@ -34,6 +35,7 @@ from django.utils.deprecation import MiddlewareMixin
class MiddlewareMixinTests(SimpleTestCase):
middlewares = [
AuthenticationMiddleware,
+ LoginRequiredMiddleware,
BrokenLinkEmailsMiddleware,
CacheMiddleware,
CommonMiddleware,
From 2995aeab56d661663e2851b29bba1fc20c2541f0 Mon Sep 17 00:00:00 2001
From: Willem Van Onsem
Date: Sun, 21 Apr 2024 20:06:12 +0200
Subject: [PATCH 267/316] Fixed #35393 -- Added excluded pk as a hidden field
to the inline admin.
---
django/contrib/admin/helpers.py | 5 +++++
tests/admin_inlines/admin.py | 13 +++++++++++++
tests/admin_inlines/models.py | 11 +++++++++++
tests/admin_inlines/tests.py | 15 +++++++++++++++
4 files changed, 44 insertions(+)
diff --git a/django/contrib/admin/helpers.py b/django/contrib/admin/helpers.py
index a4aa8e40e3..d28a382814 100644
--- a/django/contrib/admin/helpers.py
+++ b/django/contrib/admin/helpers.py
@@ -509,6 +509,11 @@ class InlineAdminForm(AdminForm):
# Auto fields are editable, so check for auto or non-editable pk.
self.form._meta.model._meta.auto_field
or not self.form._meta.model._meta.pk.editable
+ # The pk can be editable, but excluded from the inline.
+ or (
+ self.form._meta.exclude
+ and self.form._meta.model._meta.pk.name in self.form._meta.exclude
+ )
or
# Also search any parents for an auto field. (The pk info is
# propagated to child models so that does not need to be checked
diff --git a/tests/admin_inlines/admin.py b/tests/admin_inlines/admin.py
index 3cdaee22df..578142d192 100644
--- a/tests/admin_inlines/admin.py
+++ b/tests/admin_inlines/admin.py
@@ -57,6 +57,8 @@ from .models import (
Teacher,
Title,
TitleCollection,
+ UUIDChild,
+ UUIDParent,
)
site = admin.AdminSite(name="admin")
@@ -471,6 +473,16 @@ class ShowInlineChildInline(admin.StackedInline):
model = ShowInlineChild
+class UUIDChildInline(admin.StackedInline):
+ model = UUIDChild
+ exclude = ("id",)
+
+
+class UUIDParentModelAdmin(admin.ModelAdmin):
+ model = UUIDParent
+ inlines = [UUIDChildInline]
+
+
class ShowInlineParentAdmin(admin.ModelAdmin):
def get_inlines(self, request, obj):
if obj is not None and obj.show_inlines:
@@ -513,6 +525,7 @@ site.register(CourseProxy, ClassAdminStackedVertical)
site.register(CourseProxy1, ClassAdminTabularVertical)
site.register(CourseProxy2, ClassAdminTabularHorizontal)
site.register(ShowInlineParent, ShowInlineParentAdmin)
+site.register(UUIDParent, UUIDParentModelAdmin)
# Used to test hidden fields in tabular and stacked inlines.
site2 = admin.AdminSite(name="tabular_inline_hidden_field_admin")
site2.register(SomeParentModel, inlines=[ChildHiddenFieldTabularInline])
diff --git a/tests/admin_inlines/models.py b/tests/admin_inlines/models.py
index 5a85556a55..64aaca8d14 100644
--- a/tests/admin_inlines/models.py
+++ b/tests/admin_inlines/models.py
@@ -3,6 +3,7 @@ Testing of admin inline formsets.
"""
import random
+import uuid
from django.contrib.contenttypes.fields import GenericForeignKey
from django.contrib.contenttypes.models import ContentType
@@ -399,3 +400,13 @@ class BothVerboseNameProfile(Profile):
class Meta:
verbose_name = "Model with both - name"
verbose_name_plural = "Model with both - plural name"
+
+
+class UUIDParent(models.Model):
+ pass
+
+
+class UUIDChild(models.Model):
+ id = models.UUIDField(default=uuid.uuid4, primary_key=True)
+ title = models.CharField(max_length=128)
+ parent = models.ForeignKey(UUIDParent, on_delete=models.CASCADE)
diff --git a/tests/admin_inlines/tests.py b/tests/admin_inlines/tests.py
index dee703825d..25512aede4 100644
--- a/tests/admin_inlines/tests.py
+++ b/tests/admin_inlines/tests.py
@@ -44,6 +44,8 @@ from .models import (
SomeChildModel,
SomeParentModel,
Teacher,
+ UUIDChild,
+ UUIDParent,
VerboseNamePluralProfile,
VerboseNameProfile,
)
@@ -115,6 +117,19 @@ class TestInline(TestDataMixin, TestCase):
)
self.assertContains(response, "Inner readonly label: ")
+ def test_excluded_id_for_inlines_uses_hidden_field(self):
+ parent = UUIDParent.objects.create()
+ child = UUIDChild.objects.create(title="foo", parent=parent)
+ response = self.client.get(
+ reverse("admin:admin_inlines_uuidparent_change", args=(parent.id,))
+ )
+ self.assertContains(
+ response,
+ f' ',
+ html=True,
+ )
+
def test_many_to_many_inlines(self):
"Autogenerated many-to-many inlines are displayed correctly (#13407)"
response = self.client.get(reverse("admin:admin_inlines_author_add"))
From 8e68c50341f0d159b7af9d2a071c7c24ffc126b7 Mon Sep 17 00:00:00 2001
From: Natalia <124304+nessita@users.noreply.github.com>
Date: Wed, 22 May 2024 11:12:30 -0300
Subject: [PATCH 268/316] Removed empty sections from 5.1 release notes.
---
docs/releases/5.1.txt | 123 ------------------------------------------
1 file changed, 123 deletions(-)
diff --git a/docs/releases/5.1.txt b/docs/releases/5.1.txt
index f2b7663576..bb79e3590a 100644
--- a/docs/releases/5.1.txt
+++ b/docs/releases/5.1.txt
@@ -49,11 +49,6 @@ Minor features
* :attr:`.ModelAdmin.list_display` now supports using ``__`` lookups to list
fields from related models.
-:mod:`django.contrib.admindocs`
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-* ...
-
:mod:`django.contrib.auth`
~~~~~~~~~~~~~~~~~~~~~~~~~~
@@ -80,11 +75,6 @@ Minor features
accessibility of the
:class:`~django.contrib.auth.forms.UserChangeForm`.
-:mod:`django.contrib.contenttypes`
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-* ...
-
:mod:`django.contrib.gis`
~~~~~~~~~~~~~~~~~~~~~~~~~
@@ -129,22 +119,12 @@ Minor features
now support the optional ``srid`` argument (except for Oracle where it is
ignored).
-:mod:`django.contrib.messages`
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-* ...
-
:mod:`django.contrib.postgres`
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
* :class:`~django.contrib.postgres.indexes.BTreeIndex` now supports the
``deduplicate_items`` parameter.
-:mod:`django.contrib.redirects`
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-* ...
-
:mod:`django.contrib.sessions`
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@@ -157,41 +137,6 @@ Minor features
session engines now provide async API. The new asynchronous methods all have
``a`` prefixed names, e.g. ``aget()``, ``akeys()``, or ``acycle_key()``.
-:mod:`django.contrib.sitemaps`
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-* ...
-
-:mod:`django.contrib.sites`
-~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-* ...
-
-:mod:`django.contrib.staticfiles`
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-* ...
-
-:mod:`django.contrib.syndication`
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-* ...
-
-Asynchronous views
-~~~~~~~~~~~~~~~~~~
-
-* ...
-
-Cache
-~~~~~
-
-* ...
-
-CSRF
-~~~~
-
-* ...
-
Database backends
~~~~~~~~~~~~~~~~~
@@ -205,16 +150,6 @@ Database backends
* ``"pool"`` option is now supported in :setting:`OPTIONS` on PostgreSQL to
allow using :ref:`connection pools `.
-Decorators
-~~~~~~~~~~
-
-* ...
-
-Email
-~~~~~
-
-* ...
-
Error Reporting
~~~~~~~~~~~~~~~
@@ -228,11 +163,6 @@ File Storage
parameter of :class:`~django.core.files.storage.FileSystemStorage` allows
saving new files over existing ones.
-File Uploads
-~~~~~~~~~~~~
-
-* ...
-
Forms
~~~~~
@@ -240,21 +170,6 @@ Forms
fieldsets with their help text, the form fieldset now includes the
``aria-describedby`` HTML attribute.
-Generic Views
-~~~~~~~~~~~~~
-
-* ...
-
-Internationalization
-~~~~~~~~~~~~~~~~~~~~
-
-* ...
-
-Logging
-~~~~~~~
-
-* ...
-
Management Commands
~~~~~~~~~~~~~~~~~~~
@@ -304,26 +219,6 @@ Models
specifying that the expression should be ignored during a constraint
validation.
-Requests and Responses
-~~~~~~~~~~~~~~~~~~~~~~
-
-* ...
-
-Security
-~~~~~~~~
-
-* ...
-
-Serialization
-~~~~~~~~~~~~~
-
-* ...
-
-Signals
-~~~~~~~
-
-* ...
-
Templates
~~~~~~~~~
@@ -364,16 +259,6 @@ Tests
* In order to enforce test isolation, database connections inside threads are
no longer allowed in :class:`~django.test.SimpleTestCase`.
-URLs
-~~~~
-
-* ...
-
-Utilities
-~~~~~~~~~
-
-* ...
-
Validators
~~~~~~~~~~
@@ -387,14 +272,6 @@ Validators
Backwards incompatible changes in 5.1
=====================================
-Database backend API
---------------------
-
-This section describes changes that may be needed in third-party database
-backends.
-
-* ...
-
:mod:`django.contrib.gis`
-------------------------
From 59b649c7dfc8016d94bf3a5340992a28ce0eb0cf Mon Sep 17 00:00:00 2001
From: Natalia <124304+nessita@users.noreply.github.com>
Date: Wed, 22 May 2024 00:07:17 -0300
Subject: [PATCH 269/316] Made cosmetic edits to 5.1 release notes.
---
docs/releases/5.1.txt | 83 +++++++++++++++++++++++++++++++++++--------
1 file changed, 68 insertions(+), 15 deletions(-)
diff --git a/docs/releases/5.1.txt b/docs/releases/5.1.txt
index bb79e3590a..49741ca81c 100644
--- a/docs/releases/5.1.txt
+++ b/docs/releases/5.1.txt
@@ -7,8 +7,8 @@ Django 5.1 release notes - UNDER DEVELOPMENT
Welcome to Django 5.1!
These release notes cover the :ref:`new features `, as well as
-some :ref:`backwards incompatible changes ` you'll
-want to be aware of when upgrading from Django 5.0 or earlier. We've
+some :ref:`backwards incompatible changes ` you
+should be aware of when upgrading from Django 5.0 or earlier. We've
:ref:`begun the deprecation process for some features
`.
@@ -26,6 +26,63 @@ only officially support the latest release of each series.
What's new in Django 5.1
========================
+``{% query_string %}`` template tag
+-----------------------------------
+
+Django 5.1 introduces the :ttag:`{% query_string %} ` template
+tag, simplifying the modification of query parameters in URLs, making it easier
+to generate links that maintain existing query parameters while adding or
+changing specific ones.
+
+For instance, navigating pagination and query strings in templates can be
+cumbersome. Consider this template fragment that dynamically generates a URL
+for navigating to the next page within a paginated view:
+
+.. code-block:: html+django
+
+ {# Linebreaks added for readability, this should be one, long line. #}
+ Next page
+
+When switching to using this new template tag, the above magically becomes:
+
+.. code-block:: html+django
+
+ Next page
+
+PostgreSQL Connection Pools
+---------------------------
+
+Django 5.1 also introduces :ref:`connection pool ` support for
+PostgreSQL. As the time to establish a new connection can be relatively long,
+keeping connections open can reduce latency.
+
+To use a connection pool with `psycopg`_, you can set the ``"pool"`` option
+inside :setting:`OPTIONS` to be a dict to be passed to
+:class:`~psycopg:psycopg_pool.ConnectionPool`, or to ``True`` to use the
+``ConnectionPool`` defaults::
+
+ DATABASES = {
+ "default": {
+ "ENGINE": "django.db.backends.postgresql",
+ # ...
+ "OPTIONS": {
+ "pool": {
+ "min_size": 2,
+ "max_size": 4,
+ "timeout": 10,
+ }
+ },
+ },
+ }
+
+.. _psycopg: https://www.psycopg.org/
+
Middleware to require authentication by default
-----------------------------------------------
@@ -55,8 +112,8 @@ Minor features
* The default iteration count for the PBKDF2 password hasher is increased from
720,000 to 870,000.
-* In order to follow OWASP recommendations, the default ``parallelism`` of the
- ``ScryptPasswordHasher`` is increased from 1 to 5.
+* The default ``parallelism`` of the ``ScryptPasswordHasher`` is
+ increased from 1 to 5, to follow OWASP recommendations.
* :class:`~django.contrib.auth.forms.BaseUserCreationForm` and
:class:`~django.contrib.auth.forms.AdminPasswordChangeForm` now support
@@ -91,9 +148,9 @@ Minor features
``continent_name``, and ``is_in_european_union`` values.
* :meth:`.GeoIP2.city` now exposes the ``accuracy_radius`` and ``region_name``
- values. In addition the ``dma_code`` and ``region`` values are now exposed as
- ``metro_code`` and ``region_code``, but the previous keys are also retained
- for backward compatibility.
+ values. In addition, the ``dma_code`` and ``region`` values are now exposed
+ as ``metro_code`` and ``region_code``, but the previous keys are also
+ retained for backward compatibility.
* :class:`~django.contrib.gis.measure.Area` now supports the ``ha`` unit.
@@ -160,7 +217,7 @@ File Storage
~~~~~~~~~~~~
* The :attr:`~django.core.files.storage.FileSystemStorage.allow_overwrite`
- parameter of :class:`~django.core.files.storage.FileSystemStorage` allows
+ parameter of :class:`~django.core.files.storage.FileSystemStorage` now allows
saving new files over existing ones.
Forms
@@ -173,8 +230,8 @@ Forms
Management Commands
~~~~~~~~~~~~~~~~~~~
-* :djadmin:`makemigrations` command now displays meaningful symbols for each
- operation to highlight :class:`operation categories
+* The :djadmin:`makemigrations` command now displays meaningful symbols for
+ each operation to highlight :class:`operation categories
`.
Migrations
@@ -226,11 +283,6 @@ Templates
be made available on the ``Template`` instance. Such data may be used, for
example, by the template loader, or other template clients.
-* The new :ttag:`{% query_string %} ` template tag allows
- changing a :class:`~django.http.QueryDict` instance for use in links, for
- example, to generate a link to the next page while keeping any filtering
- options in place.
-
* :ref:`Template engines ` now implement a ``check()`` method
that is already registered with the check framework.
@@ -382,6 +434,7 @@ Miscellaneous
overwriting files in storage, set the new
:attr:`~django.core.files.storage.FileSystemStorage.allow_overwrite` option
to ``True`` instead.
+
* The ``get_cache_name()`` method of ``FieldCacheMixin`` is deprecated in favor
of the ``cache_name`` cached property.
From b7c7209c67f742eda8184c46f139e0e1cb16a1f4 Mon Sep 17 00:00:00 2001
From: Natalia <124304+nessita@users.noreply.github.com>
Date: Wed, 22 May 2024 11:20:56 -0300
Subject: [PATCH 270/316] Updated man page for Django 5.1 alpha.
---
docs/man/django-admin.1 | 576 ++++++++++++++++------------------------
1 file changed, 226 insertions(+), 350 deletions(-)
diff --git a/docs/man/django-admin.1 b/docs/man/django-admin.1
index 95d34931eb..06912769c8 100644
--- a/docs/man/django-admin.1
+++ b/docs/man/django-admin.1
@@ -27,7 +27,7 @@ level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]]
.in \\n[rst2man-indent\\n[rst2man-indent-level]]u
..
-.TH "DJANGO-ADMIN" "1" "September 18, 2023" "5.0" "Django"
+.TH "DJANGO-ADMIN" "1" "May 22, 2024" "5.1" "Django"
.SH NAME
django-admin \- Utility script for the Django web framework
.sp
@@ -36,7 +36,7 @@ This document outlines all it can do.
.sp
In addition, \fBmanage.py\fP is automatically created in each Django project. It
does the same thing as \fBdjango\-admin\fP but also sets the
-\fI\%DJANGO_SETTINGS_MODULE\fP environment variable so that it points to your
+\X'tty: link #envvar-DJANGO_SETTINGS_MODULE'\fI\%DJANGO_SETTINGS_MODULE\fP\X'tty: link' environment variable so that it points to your
project\(aqs \fBsettings.py\fP file.
.sp
The \fBdjango\-admin\fP script should be on your system path if you installed
@@ -46,7 +46,7 @@ environment activated.
Generally, when working on a single Django project, it\(aqs easier to use
\fBmanage.py\fP than \fBdjango\-admin\fP\&. If you need to switch between multiple
Django settings files, use \fBdjango\-admin\fP with
-\fI\%DJANGO_SETTINGS_MODULE\fP or the \fI\%\-\-settings\fP command line
+\X'tty: link #envvar-DJANGO_SETTINGS_MODULE'\fI\%DJANGO_SETTINGS_MODULE\fP\X'tty: link' or the \fI\%\-\-settings\fP command line
option.
.sp
The command\-line examples throughout this document use \fBdjango\-admin\fP to
@@ -56,13 +56,11 @@ just as well.
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
$ django\-admin [options]
$ manage.py [options]
$ python \-m django [options]
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -86,7 +84,7 @@ command and a list of its available options.
.SS App names
.sp
Many commands take a list of \(dqapp names.\(dq An \(dqapp name\(dq is the basename of
-the package containing your models. For example, if your \fI\%INSTALLED_APPS\fP
+the package containing your models. For example, if your \X'tty: link #std-setting-INSTALLED_APPS'\fI\%INSTALLED_APPS\fP\X'tty: link'
contains the string \fB\(aqmysite.blog\(aq\fP, the app name is \fBblog\fP\&.
.SS Determining the version
.INDENT 0.0
@@ -96,17 +94,15 @@ contains the string \fB\(aqmysite.blog\(aq\fP, the app name is \fBblog\fP\&.
.sp
Run \fBdjango\-admin version\fP to display the current Django version.
.sp
-The output follows the schema described in \fI\%PEP 440\fP:
+The output follows the schema described in \X'tty: link https://peps.python.org/pep-0440/'\fI\%PEP 440\fP\X'tty: link':
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
1.4.dev17026
1.4a1
1.4
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.SS Displaying debug output
@@ -128,11 +124,9 @@ providing a list of app labels as arguments:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin check auth admin myapp
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -141,17 +135,15 @@ django\-admin check auth admin myapp
.UNINDENT
.sp
The system check framework performs many different types of checks that are
-\fI\%categorized with tags\fP\&. You can use these
+\X'tty: link #system-check-builtin-tags'\fI\%categorized with tags\fP\X'tty: link'\&. You can use these
tags to restrict the checks performed to just those in a particular category.
For example, to perform only models and compatibility checks, run:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin check \-\-tag models \-\-tag compatibility
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -163,11 +155,9 @@ Specifies the database to run checks requiring database access:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin check \-\-database default \-\-database other
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -188,16 +178,14 @@ Activates some additional checks that are only relevant in a deployment setting.
You can use this option in your local development environment, but since your
local development settings module may not have many of your production settings,
you will probably want to point the \fBcheck\fP command at a different settings
-module, either by setting the \fI\%DJANGO_SETTINGS_MODULE\fP environment
+module, either by setting the \X'tty: link #envvar-DJANGO_SETTINGS_MODULE'\fI\%DJANGO_SETTINGS_MODULE\fP\X'tty: link' environment
variable, or by passing the \fB\-\-settings\fP option:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin check \-\-deploy \-\-settings=production_settings
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -237,14 +225,13 @@ are excluded.
.B \-\-use\-fuzzy, \-f
.UNINDENT
.sp
-Includes \fI\%fuzzy translations\fP into compiled files.
+Includes \X'tty: link https://www.gnu.org/software/gettext/manual/html_node/Fuzzy-Entries.html'\fI\%fuzzy translations\fP\X'tty: link' into compiled files.
.sp
Example usage:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin compilemessages \-\-locale=pt_BR
django\-admin compilemessages \-\-locale=pt_BR \-\-locale=fr \-f
django\-admin compilemessages \-l pt_BR
@@ -253,8 +240,7 @@ django\-admin compilemessages \-\-exclude=pt_BR
django\-admin compilemessages \-\-exclude=pt_BR \-\-exclude=fr
django\-admin compilemessages \-x pt_BR
django\-admin compilemessages \-x pt_BR \-x fr
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -262,18 +248,16 @@ django\-admin compilemessages \-x pt_BR \-x fr
.B \-\-ignore PATTERN, \-i PATTERN
.UNINDENT
.sp
-Ignores directories matching the given \fI\%glob\fP\-style pattern. Use
+Ignores directories matching the given \X'tty: link https://docs.python.org/3/library/glob.html#module-glob'\fI\%glob\fP\X'tty: link'\-style pattern. Use
multiple times to ignore more.
.sp
Example usage:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin compilemessages \-\-ignore=cache \-\-ignore=outdated/*/locale
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.SS \fBcreatecachetable\fP
@@ -306,8 +290,8 @@ customize it or use the migrations framework.
.UNINDENT
.sp
Runs the command\-line client for the database engine specified in your
-\fI\%ENGINE\fP setting, with the connection parameters
-specified in your \fI\%USER\fP, \fI\%PASSWORD\fP, etc., settings.
+\X'tty: link #std-setting-DATABASE-ENGINE'\fI\%ENGINE\fP\X'tty: link' setting, with the connection parameters
+specified in your \X'tty: link #std-setting-USER'\fI\%USER\fP\X'tty: link', \X'tty: link #std-setting-PASSWORD'\fI\%PASSWORD\fP\X'tty: link', etc., settings.
.INDENT 0.0
.IP \(bu 2
For PostgreSQL, this runs the \fBpsql\fP command\-line client.
@@ -340,15 +324,13 @@ command\(aqs \fB\-c\fP flag to execute a raw SQL query directly:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
$ django\-admin dbshell \-\- \-c \(aqselect current_user\(aq
current_user
\-\-\-\-\-\-\-\-\-\-\-\-\-\-
postgres
(1 row)
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -356,24 +338,22 @@ On MySQL/MariaDB, you can do this with the \fBmysql\fP command\(aqs \fB\-e\fP fl
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
$ django\-admin dbshell \-\- \-e \(dqselect user()\(dq
+\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-+
| user() |
+\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-+
| djangonaut@localhost |
+\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-+
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
\fBNOTE:\fP
.INDENT 0.0
.INDENT 3.5
-Be aware that not all options set in the \fI\%OPTIONS\fP part of your
-database configuration in \fI\%DATABASES\fP are passed to the
+Be aware that not all options set in the \X'tty: link #std-setting-OPTIONS'\fI\%OPTIONS\fP\X'tty: link' part of your
+database configuration in \X'tty: link #std-setting-DATABASES'\fI\%DATABASES\fP\X'tty: link' are passed to the
command\-line client, e.g. \fB\(aqisolation_level\(aq\fP\&.
.UNINDENT
.UNINDENT
@@ -387,8 +367,8 @@ Displays differences between the current settings file and Django\(aqs default
settings (or another settings file specified by \fI\%\-\-default\fP).
.sp
Settings that don\(aqt appear in the defaults are followed by \fB\(dq###\(dq\fP\&. For
-example, the default settings don\(aqt define \fI\%ROOT_URLCONF\fP, so
-\fI\%ROOT_URLCONF\fP is followed by \fB\(dq###\(dq\fP in the output of
+example, the default settings don\(aqt define \X'tty: link #std-setting-ROOT_URLCONF'\fI\%ROOT_URLCONF\fP\X'tty: link', so
+\X'tty: link #std-setting-ROOT_URLCONF'\fI\%ROOT_URLCONF\fP\X'tty: link' is followed by \fB\(dq###\(dq\fP in the output of
\fBdiffsettings\fP\&.
.INDENT 0.0
.TP
@@ -428,12 +408,12 @@ If no application name is provided, all installed applications will be dumped.
The output of \fBdumpdata\fP can be used as input for \fI\%loaddata\fP\&.
.sp
When result of \fBdumpdata\fP is saved as a file, it can serve as a
-\fI\%fixture\fP for
-\fI\%tests\fP or as an
-\fI\%initial data\fP\&.
+\X'tty: link #fixtures-explanation'\fI\%fixture\fP\X'tty: link' for
+\X'tty: link #topics-testing-fixtures'\fI\%tests\fP\X'tty: link' or as an
+\X'tty: link #initial-data-via-fixtures'\fI\%initial data\fP\X'tty: link'\&.
.sp
Note that \fBdumpdata\fP uses the default manager on the model for selecting the
-records to dump. If you\(aqre using a \fI\%custom manager\fP as
+records to dump. If you\(aqre using a \X'tty: link #custom-managers'\fI\%custom manager\fP\X'tty: link' as
the default manager and it filters some of the available records, not all of the
objects will be dumped.
.INDENT 0.0
@@ -449,7 +429,7 @@ or modified by a custom manager.
.UNINDENT
.sp
Specifies the serialization format of the output. Defaults to JSON. Supported
-formats are listed in \fI\%Serialization formats\fP\&.
+formats are listed in \X'tty: link #serialization-formats'\fI\%Serialization formats\fP\X'tty: link'\&.
.INDENT 0.0
.TP
.B \-\-indent INDENT
@@ -472,11 +452,9 @@ once:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin dumpdata \-\-exclude=auth \-\-exclude=contenttypes
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -494,7 +472,7 @@ Uses the \fBnatural_key()\fP model method to serialize any foreign key and
many\-to\-many relationship to objects of the type that defines the method. If
you\(aqre dumping \fBcontrib.auth\fP \fBPermission\fP objects or
\fBcontrib.contenttypes\fP \fBContentType\fP objects, you should probably use this
-flag. See the \fI\%natural keys\fP
+flag. See the \X'tty: link #topics-serialization-natural-keys'\fI\%natural keys\fP\X'tty: link'
documentation for more details on this and the next option.
.INDENT 0.0
.TP
@@ -529,11 +507,9 @@ For example, to output the data as a compressed JSON file:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin dumpdata \-o mydata.json.gz
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.SS \fBflush\fP
@@ -566,7 +542,7 @@ Specifies the database to flush. Defaults to \fBdefault\fP\&.
.UNINDENT
.sp
Introspects the database tables in the database pointed\-to by the
-\fI\%NAME\fP setting and outputs a Django model module (a \fBmodels.py\fP
+\X'tty: link #std-setting-NAME'\fI\%NAME\fP\X'tty: link' setting and outputs a Django model module (a \fBmodels.py\fP
file) to standard output.
.sp
You may choose what tables or views to inspect by passing their names as
@@ -587,7 +563,7 @@ If \fBinspectdb\fP cannot map a column\(aqs type to a model field type, it\(aqll
use \fBTextField\fP and will insert the Python comment
\fB\(aqThis field type is a guess.\(aq\fP next to the field in the generated
model. The recognized fields may depend on apps listed in
-\fI\%INSTALLED_APPS\fP\&. For example, \fI\%django.contrib.postgres\fP adds
+\X'tty: link #std-setting-INSTALLED_APPS'\fI\%INSTALLED_APPS\fP\X'tty: link'\&. For example, \X'tty: link #module-django.contrib.postgres'\fI\%django.contrib.postgres\fP\X'tty: link' adds
recognition for several PostgreSQL\-specific field types.
.IP \(bu 2
If the database column name is a Python reserved word (such as
@@ -606,7 +582,7 @@ customizations. In particular, you\(aqll need to rearrange models\(aq order, so
models that refer to other models are ordered properly.
.sp
Django doesn\(aqt create database defaults when a
-\fI\%default\fP is specified on a model field.
+\X'tty: link #django.db.models.Field.default'\fI\%default\fP\X'tty: link' is specified on a model field.
Similarly, database defaults aren\(aqt translated to model field defaults or
detected in any fashion by \fBinspectdb\fP\&.
.sp
@@ -614,7 +590,7 @@ By default, \fBinspectdb\fP creates unmanaged models. That is, \fBmanaged = Fals
in the model\(aqs \fBMeta\fP class tells Django not to manage each table\(aqs creation,
modification, and deletion. If you do want to allow Django to manage the
table\(aqs lifecycle, you\(aqll need to change the
-\fI\%managed\fP option to \fBTrue\fP (or remove
+\X'tty: link #django.db.models.Options.managed'\fI\%managed\fP\X'tty: link' option to \fBTrue\fP (or remove
it because \fBTrue\fP is its default value).
.SS Database\-specific notes
.SS Oracle
@@ -661,7 +637,7 @@ If this option is provided, models are also created for database views.
.UNINDENT
.sp
Searches for and loads the contents of the named
-\fI\%fixture\fP into the database.
+\X'tty: link #fixtures-explanation'\fI\%fixture\fP\X'tty: link' into the database.
.INDENT 0.0
.TP
.B \-\-database DATABASE
@@ -687,7 +663,7 @@ Specifies a single app to look for fixtures in rather than looking in all apps.
.B \-\-format FORMAT
.UNINDENT
.sp
-Specifies the \fI\%serialization format\fP (e.g.,
+Specifies the \X'tty: link #serialization-formats'\fI\%serialization format\fP\X'tty: link' (e.g.,
\fBjson\fP or \fBxml\fP) for fixtures \fI\%read from stdin\fP\&.
.INDENT 0.0
.TP
@@ -704,16 +680,14 @@ example:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin loaddata \-\-format=json \-
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
When reading from \fBstdin\fP, the \fI\%\-\-format\fP option
-is required to specify the \fI\%serialization format\fP
+is required to specify the \X'tty: link #serialization-formats'\fI\%serialization format\fP\X'tty: link'
of the input (e.g., \fBjson\fP or \fBxml\fP).
.sp
Loading from \fBstdin\fP is useful with standard input and output redirections.
@@ -721,11 +695,9 @@ For example:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin dumpdata \-\-format=json \-\-database=test app_label.ModelName | django\-admin loaddata \-\-format=json \-\-database=prod \-
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -734,7 +706,7 @@ The \fI\%dumpdata\fP command can be used to generate input for \fBloaddata\fP\&.
\fBSEE ALSO:\fP
.INDENT 0.0
.INDENT 3.5
-For more detail about fixtures see the \fI\%Fixtures\fP topic.
+For more detail about fixtures see the \X'tty: link #fixtures-explanation'\fI\%Fixtures\fP\X'tty: link' topic.
.UNINDENT
.UNINDENT
.SS \fBmakemessages\fP
@@ -748,11 +720,11 @@ strings marked for translation. It creates (or updates) a message file in the
conf/locale (in the Django tree) or locale (for project and application)
directory. After making changes to the messages files you need to compile them
with \fI\%compilemessages\fP for use with the builtin gettext support. See
-the \fI\%i18n documentation\fP for details.
+the \X'tty: link #how-to-create-language-files'\fI\%i18n documentation\fP\X'tty: link' for details.
.sp
This command doesn\(aqt require configured settings. However, when settings aren\(aqt
-configured, the command can\(aqt ignore the \fI\%MEDIA_ROOT\fP and
-\fI\%STATIC_ROOT\fP directories or include \fI\%LOCALE_PATHS\fP\&.
+configured, the command can\(aqt ignore the \X'tty: link #std-setting-MEDIA_ROOT'\fI\%MEDIA_ROOT\fP\X'tty: link' and
+\X'tty: link #std-setting-STATIC_ROOT'\fI\%STATIC_ROOT\fP\X'tty: link' directories or include \X'tty: link #std-setting-LOCALE_PATHS'\fI\%LOCALE_PATHS\fP\X'tty: link'\&.
.INDENT 0.0
.TP
.B \-\-all, \-a
@@ -765,17 +737,15 @@ Updates the message files for all available languages.
.UNINDENT
.sp
Specifies a list of file extensions to examine (default: \fBhtml\fP, \fBtxt\fP,
-\fBpy\fP or \fBjs\fP if \fI\%\-\-domain\fP is \fBjs\fP).
+\fBpy\fP or \fBjs\fP if \fI\%\-\-domain\fP is \fBdjangojs\fP).
.sp
Example usage:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin makemessages \-\-locale=de \-\-extension xhtml
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -784,11 +754,9 @@ multiple times:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin makemessages \-\-locale=de \-\-extension=html,txt \-\-extension xml
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -809,8 +777,7 @@ Example usage:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin makemessages \-\-locale=pt_BR
django\-admin makemessages \-\-locale=pt_BR \-\-locale=fr
django\-admin makemessages \-l pt_BR
@@ -819,8 +786,7 @@ django\-admin makemessages \-\-exclude=pt_BR
django\-admin makemessages \-\-exclude=pt_BR \-\-exclude=fr
django\-admin makemessages \-x pt_BR
django\-admin makemessages \-x pt_BR \-x fr
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -846,11 +812,9 @@ Example usage:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin makemessages \-\-locale=de \-\-symlinks
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -858,7 +822,7 @@ django\-admin makemessages \-\-locale=de \-\-symlinks
.B \-\-ignore PATTERN, \-i PATTERN
.UNINDENT
.sp
-Ignores files or directories matching the given \fI\%glob\fP\-style pattern. Use
+Ignores files or directories matching the given \X'tty: link https://docs.python.org/3/library/glob.html#module-glob'\fI\%glob\fP\X'tty: link'\-style pattern. Use
multiple times to ignore more.
.sp
These patterns are used by default: \fB\(aqCVS\(aq\fP, \fB\(aq.*\(aq\fP, \fB\(aq*~\(aq\fP, \fB\(aq*.pyc\(aq\fP\&.
@@ -867,11 +831,9 @@ Example usage:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin makemessages \-\-locale=en_US \-\-ignore=apps/* \-\-ignore=secret/*.html
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -930,7 +892,7 @@ language files from being created.
\fBSEE ALSO:\fP
.INDENT 0.0
.INDENT 3.5
-See \fI\%Customizing the makemessages command\fP for instructions on how to customize
+See \X'tty: link #customizing-makemessages'\fI\%Customizing the makemessages command\fP\X'tty: link' for instructions on how to customize
the keywords that \fI\%makemessages\fP passes to \fBxgettext\fP\&.
.UNINDENT
.UNINDENT
@@ -986,7 +948,7 @@ Enables fixing of migration conflicts.
.UNINDENT
.sp
Allows naming the generated migration(s) instead of using a generated name. The
-name must be a valid Python \fI\%identifier\fP\&.
+name must be a valid Python \X'tty: link https://docs.python.org/3/reference/lexical_analysis.html#identifiers'\fI\%identifier\fP\X'tty: link'\&.
.INDENT 0.0
.TP
.B \-\-no\-header
@@ -999,11 +961,7 @@ Generate migration files without Django version and timestamp header.
.UNINDENT
.sp
Makes \fBmakemigrations\fP exit with a non\-zero status when model changes without
-migrations are detected.
-.sp
-In older versions, the missing migrations were also created when using the
-\fB\-\-check\fP option.
-
+migrations are detected. Implies \fB\-\-dry\-run\fP\&.
.INDENT 0.0
.TP
.B \-\-scriptable
@@ -1015,8 +973,6 @@ generated migration files to \fBstdout\fP\&.
.TP
.B \-\-update
.UNINDENT
-.sp
-
.sp
Merges model changes into the latest migration and optimize the resulting
operations.
@@ -1085,7 +1041,7 @@ run correctly.
.sp
Allows Django to skip an app\(aqs initial migration if all database tables with
the names of all models created by all
-\fI\%CreateModel\fP operations in that
+\X'tty: link #django.db.migrations.operations.CreateModel'\fI\%CreateModel\fP\X'tty: link' operations in that
migration already exist. This option is intended for use when first running
migrations against a database that preexisted the use of migrations. This
option does not, however, check for matching database schema beyond matching
@@ -1127,7 +1083,7 @@ detected.
.sp
Deletes nonexistent migrations from the \fBdjango_migrations\fP table. This is
useful when migration files replaced by a squashed migration have been removed.
-See \fI\%Squashing migrations\fP for more details.
+See \X'tty: link #migration-squashing'\fI\%Squashing migrations\fP\X'tty: link' for more details.
.SS \fBoptimizemigration\fP
.INDENT 0.0
.TP
@@ -1160,7 +1116,7 @@ might not have access to start a port on a low port number. Low port numbers
are reserved for the superuser (root).
.sp
This server uses the WSGI application object specified by the
-\fI\%WSGI_APPLICATION\fP setting.
+\X'tty: link #std-setting-WSGI_APPLICATION'\fI\%WSGI_APPLICATION\fP\X'tty: link' setting.
.sp
DO NOT USE THIS SERVER IN A PRODUCTION SETTING. It has not gone through
security audits or performance tests. (And that\(aqs how it\(aqs gonna stay. We\(aqre in
@@ -1173,8 +1129,8 @@ needed. You don\(aqt need to restart the server for code changes to take effect.
However, some actions like adding files don\(aqt trigger a restart, so you\(aqll
have to restart the server in these cases.
.sp
-If you\(aqre using Linux or MacOS and install both \fI\%pywatchman\fP and the
-\fI\%Watchman\fP service, kernel signals will be used to autoreload the server
+If you\(aqre using Linux or MacOS and install both \X'tty: link https://pypi.org/project/pywatchman/'\fI\%pywatchman\fP\X'tty: link' and the
+\X'tty: link https://facebook.github.io/watchman/'\fI\%Watchman\fP\X'tty: link' service, kernel signals will be used to autoreload the server
(rather than polling file modification timestamps each second). This offers
better performance on large projects, reduced response time after code changes,
more robust change detection, and a reduction in power usage. Django supports
@@ -1185,7 +1141,7 @@ more robust change detection, and a reduction in power usage. Django supports
.sp
When using Watchman with a project that includes large non\-Python
directories like \fBnode_modules\fP, it\(aqs advisable to ignore this directory
-for optimal performance. See the \fI\%watchman documentation\fP for information
+for optimal performance. See the \X'tty: link https://facebook.github.io/watchman/docs/config#ignore_dirs'\fI\%watchman documentation\fP\X'tty: link' for information
on how to do this.
.UNINDENT
.UNINDENT
@@ -1223,10 +1179,10 @@ A hostname containing ASCII\-only characters can also be used.
.sp
If the \fI\%staticfiles\fP contrib app is enabled
(default in new projects) the \fI\%runserver\fP command will be overridden
-with its own \fI\%runserver\fP command.
+with its own \X'tty: link #staticfiles-runserver'\fI\%runserver\fP\X'tty: link' command.
.sp
Logging of each request and response of the server is sent to the
-\fI\%django.server\fP logger.
+\X'tty: link #django-server-logger'\fI\%django.server\fP\X'tty: link' logger.
.INDENT 0.0
.TP
.B \-\-noreload
@@ -1255,11 +1211,9 @@ Port 8000 on IP address \fB127.0.0.1\fP:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin runserver
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -1267,11 +1221,9 @@ Port 8000 on IP address \fB1.2.3.4\fP:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin runserver 1.2.3.4:8000
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -1279,11 +1231,9 @@ Port 7000 on IP address \fB127.0.0.1\fP:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin runserver 7000
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -1291,11 +1241,9 @@ Port 7000 on IP address \fB1.2.3.4\fP:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin runserver 1.2.3.4:7000
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -1303,11 +1251,9 @@ Port 8000 on IPv6 address \fB::1\fP:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin runserver \-6
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -1315,11 +1261,9 @@ Port 7000 on IPv6 address \fB::1\fP:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin runserver \-6 7000
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -1327,11 +1271,9 @@ Port 7000 on IPv6 address \fB2001:0db8:1234:5678::9\fP:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin runserver [2001:0db8:1234:5678::9]:7000
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -1339,11 +1281,9 @@ Port 8000 on IPv4 address of host \fBlocalhost\fP:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin runserver localhost:8000
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -1351,24 +1291,22 @@ Port 8000 on IPv6 address of host \fBlocalhost\fP:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin runserver \-6 localhost:8000
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.SS Serving static files with the development server
.sp
By default, the development server doesn\(aqt serve any static files for your site
-(such as CSS files, images, things under \fI\%MEDIA_URL\fP and so forth). If
+(such as CSS files, images, things under \X'tty: link #std-setting-MEDIA_URL'\fI\%MEDIA_URL\fP\X'tty: link' and so forth). If
you want to configure Django to serve static media, read
\fI\%How to manage static files (e.g. images, JavaScript, CSS)\fP\&.
.SS Serving with ASGI in development
.sp
Django\(aqs \fBrunserver\fP command provides a WSGI server. In order to run under
ASGI you will need to use an \fI\%ASGI server\fP\&.
-The Django Daphne project provides \fI\%Integration with runserver\fP that you can use.
+The Django Daphne project provides \X'tty: link #daphne-runserver'\fI\%Integration with runserver\fP\X'tty: link' that you can use.
.SS \fBsendtestemail\fP
.INDENT 0.0
.TP
@@ -1380,11 +1318,9 @@ recipient(s) specified. For example:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin sendtestemail foo@example.com bar@example.com
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -1395,15 +1331,15 @@ together:
.B \-\-managers
.UNINDENT
.sp
-Mails the email addresses specified in \fI\%MANAGERS\fP using
-\fI\%mail_managers()\fP\&.
+Mails the email addresses specified in \X'tty: link #std-setting-MANAGERS'\fI\%MANAGERS\fP\X'tty: link' using
+\X'tty: link #django.core.mail.mail_managers'\fI\%mail_managers()\fP\X'tty: link'\&.
.INDENT 0.0
.TP
.B \-\-admins
.UNINDENT
.sp
-Mails the email addresses specified in \fI\%ADMINS\fP using
-\fI\%mail_admins()\fP\&.
+Mails the email addresses specified in \X'tty: link #std-setting-ADMINS'\fI\%ADMINS\fP\X'tty: link' using
+\X'tty: link #django.core.mail.mail_admins'\fI\%mail_admins()\fP\X'tty: link'\&.
.SS \fBshell\fP
.INDENT 0.0
.TP
@@ -1416,18 +1352,16 @@ Starts the Python interactive interpreter.
.B \-\-interface {ipython,bpython,python}, \-i {ipython,bpython,python}
.UNINDENT
.sp
-Specifies the shell to use. By default, Django will use \fI\%IPython\fP or \fI\%bpython\fP if
+Specifies the shell to use. By default, Django will use \X'tty: link https://ipython.org/'\fI\%IPython\fP\X'tty: link' or \X'tty: link https://bpython-interpreter.org/'\fI\%bpython\fP\X'tty: link' if
either is installed. If both are installed, specify which one you want like so:
.sp
IPython:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin shell \-i ipython
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -1435,11 +1369,9 @@ bpython:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin shell \-i bpython
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -1448,11 +1380,9 @@ Python interpreter, use \fBpython\fP as the interface name, like so:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin shell \-i python
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -1461,7 +1391,7 @@ django\-admin shell \-i python
.UNINDENT
.sp
Disables reading the startup script for the \(dqplain\(dq Python interpreter. By
-default, the script pointed to by the \fI\%PYTHONSTARTUP\fP environment
+default, the script pointed to by the \X'tty: link https://docs.python.org/3/using/cmdline.html#envvar-PYTHONSTARTUP'\fI\%PYTHONSTARTUP\fP\X'tty: link' environment
variable or the \fB~/.pythonrc.py\fP script is read.
.INDENT 0.0
.TP
@@ -1472,11 +1402,9 @@ Lets you pass a command as a string to execute it as Django, like so:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin shell \-\-command=\(dqimport django; print(django.__version__)\(dq
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -1484,19 +1412,17 @@ You can also pass code in on standard input to execute it. For example:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
$ django\-admin shell < import django
> print(django.__version__)
> EOF
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
On Windows, the REPL is output due to implementation limits of
-\fI\%select.select()\fP on that platform.
+\X'tty: link https://docs.python.org/3/library/select.html#select.select'\fI\%select.select()\fP\X'tty: link' on that platform.
.SS \fBshowmigrations\fP
.INDENT 0.0
.TP
@@ -1601,12 +1527,12 @@ Specifies the database for which to print the SQL. Defaults to \fBdefault\fP\&.
Squashes the migrations for \fBapp_label\fP up to and including \fBmigration_name\fP
down into fewer migrations, if possible. The resulting squashed migrations
can live alongside the unsquashed ones safely. For more information,
-please read \fI\%Squashing migrations\fP\&.
+please read \X'tty: link #migration-squashing'\fI\%Squashing migrations\fP\X'tty: link'\&.
.sp
When \fBstart_migration_name\fP is given, Django will only include migrations
starting from and including this migration. This helps to mitigate the
-squashing limitation of \fI\%RunPython\fP and
-\fI\%django.db.migrations.operations.RunSQL\fP migration operations.
+squashing limitation of \X'tty: link #django.db.migrations.operations.RunPython'\fI\%RunPython\fP\X'tty: link' and
+\X'tty: link #django.db.migrations.operations.RunSQL'\fI\%django.db.migrations.operations.RunSQL\fP\X'tty: link' migration operations.
.INDENT 0.0
.TP
.B \-\-no\-optimize
@@ -1645,7 +1571,7 @@ Generate squashed migration file without Django version and timestamp header.
Creates a Django app directory structure for the given app name in the current
directory or the given destination.
.sp
-By default, \fI\%the new directory\fP contains a
+By default, \X'tty: link https://github.com/django/django/blob/main/django/conf/app_template'\fI\%the new directory\fP\X'tty: link' contains a
\fBmodels.py\fP file and other app template files. If only the app name is given,
the app directory will be created in the current working directory.
.sp
@@ -1657,11 +1583,9 @@ For example:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin startapp myapp /Users/jezdez/Code/myapp
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -1679,11 +1603,9 @@ creating the \fBmyapp\fP app:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin startapp \-\-template=/Users/jezdez/Code/my_app_template myapp
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -1696,11 +1618,9 @@ zip files, you can use a URL like:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin startapp \-\-template=https://github.com/githubuser/django\-app\-template/archive/main.zip myapp
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -1727,7 +1647,7 @@ Specifies which directories in the app template should be excluded, in addition
to \fB\&.git\fP and \fB__pycache__\fP\&. If this option is not provided, directories
named \fB__pycache__\fP or starting with \fB\&.\fP will be excluded.
.sp
-The \fI\%template context\fP used for all matching
+The \X'tty: link #django.template.Context'\fI\%template context\fP\X'tty: link' used for all matching
files is:
.INDENT 0.0
.IP \(bu 2
@@ -1754,7 +1674,7 @@ stray template variables contained. For example, if one of the Python files
contains a docstring explaining a particular feature related
to template rendering, it might result in an incorrect example.
.sp
-To work around this problem, you can use the \fI\%templatetag\fP
+To work around this problem, you can use the \X'tty: link #std-templatetag-templatetag'\fI\%templatetag\fP\X'tty: link'
template tag to \(dqescape\(dq the various parts of the template syntax.
.sp
In addition, to allow Python template files that contain Django template
@@ -1786,7 +1706,7 @@ so make sure any custom template you use is worthy of your trust.
Creates a Django project directory structure for the given project name in
the current directory or the given destination.
.sp
-By default, \fI\%the new directory\fP contains
+By default, \X'tty: link https://github.com/django/django/blob/main/django/conf/project_template'\fI\%the new directory\fP\X'tty: link' contains
\fBmanage.py\fP and a project package (containing a \fBsettings.py\fP and other
files).
.sp
@@ -1802,11 +1722,9 @@ For example:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin startproject myproject /Users/jezdez/Code/myproject_repo
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -1840,7 +1758,7 @@ Specifies which directories in the project template should be excluded, in
addition to \fB\&.git\fP and \fB__pycache__\fP\&. If this option is not provided,
directories named \fB__pycache__\fP or starting with \fB\&.\fP will be excluded.
.sp
-The \fI\%template context\fP used is:
+The \X'tty: link #django.template.Context'\fI\%template context\fP\X'tty: link' used is:
.INDENT 0.0
.IP \(bu 2
Any option passed to the \fBstartproject\fP command (among the command\(aqs
@@ -1850,7 +1768,7 @@ supported options)
.IP \(bu 2
\fBproject_directory\fP \-\- the full path of the newly created project
.IP \(bu 2
-\fBsecret_key\fP \-\- a random key for the \fI\%SECRET_KEY\fP setting
+\fBsecret_key\fP \-\- a random key for the \X'tty: link #std-setting-SECRET_KEY'\fI\%SECRET_KEY\fP\X'tty: link' setting
.IP \(bu 2
\fBdocs_version\fP \-\- the version of the documentation: \fB\(aqdev\(aq\fP or \fB\(aq1.x\(aq\fP
.IP \(bu 2
@@ -1880,7 +1798,7 @@ Stops running tests and reports the failure immediately after a test fails.
.UNINDENT
.sp
Controls the test runner class that is used to execute tests. This value
-overrides the value provided by the \fI\%TEST_RUNNER\fP setting.
+overrides the value provided by the \X'tty: link #std-setting-TEST_RUNNER'\fI\%TEST_RUNNER\fP\X'tty: link' setting.
.INDENT 0.0
.TP
.B \-\-noinput, \-\-no\-input
@@ -1892,7 +1810,7 @@ existing test database.
.sp
The \fBtest\fP command receives options on behalf of the specified
\fI\%\-\-testrunner\fP\&. These are the options of the default test runner:
-\fI\%DiscoverRunner\fP\&.
+\X'tty: link #django.test.runner.DiscoverRunner'\fI\%DiscoverRunner\fP\X'tty: link'\&.
.INDENT 0.0
.TP
.B \-\-keepdb
@@ -1902,7 +1820,7 @@ Preserves the test database between test runs. This has the advantage of
skipping both the create and destroy actions which can greatly decrease the
time to run tests, especially those in a large test suite. If the test database
does not exist, it will be created on the first run and then preserved for each
-subsequent run. Unless the \fI\%MIGRATE\fP test setting is
+subsequent run. Unless the \X'tty: link #std-setting-TEST_MIGRATE'\fI\%MIGRATE\fP\X'tty: link' test setting is
\fBFalse\fP, any unapplied migrations will also be applied to the test database
before running the test suite.
.INDENT 0.0
@@ -1915,7 +1833,7 @@ that aren\(aqt properly isolated. The test order generated by this option is a
deterministic function of the integer seed given. When no seed is passed, a
seed is chosen randomly and printed to the console. To repeat a particular test
order, pass a seed. The test orders generated by this option preserve Django\(aqs
-\fI\%guarantees on test order\fP\&. They also keep tests grouped
+\X'tty: link #order-of-tests'\fI\%guarantees on test order\fP\X'tty: link'\&. They also keep tests grouped
by test case class.
.sp
The shuffled orderings also have a special consistency property useful when
@@ -1929,22 +1847,22 @@ order of the original tests will be the same in the new order.
.UNINDENT
.sp
Sorts test cases in the opposite execution order. This may help in debugging
-the side effects of tests that aren\(aqt properly isolated. \fI\%Grouping by test
-class\fP is preserved when using this option. This can be used
+the side effects of tests that aren\(aqt properly isolated. \X'tty: link #order-of-tests'\fI\%Grouping by test
+class\fP\X'tty: link' is preserved when using this option. This can be used
in conjunction with \fB\-\-shuffle\fP to reverse the order for a particular seed.
.INDENT 0.0
.TP
.B \-\-debug\-mode
.UNINDENT
.sp
-Sets the \fI\%DEBUG\fP setting to \fBTrue\fP prior to running tests. This may
+Sets the \X'tty: link #std-setting-DEBUG'\fI\%DEBUG\fP\X'tty: link' setting to \fBTrue\fP prior to running tests. This may
help troubleshoot test failures.
.INDENT 0.0
.TP
.B \-\-debug\-sql, \-d
.UNINDENT
.sp
-Enables \fI\%SQL logging\fP for failing tests. If
+Enables \X'tty: link #django-db-logger'\fI\%SQL logging\fP\X'tty: link' for failing tests. If
\fB\-\-verbosity\fP is \fB2\fP, then queries in passing tests are also output.
.INDENT 0.0
.TP
@@ -1959,25 +1877,25 @@ Runs tests in separate parallel processes. Since modern processors have
multiple cores, this allows running tests significantly faster.
.sp
Using \fB\-\-parallel\fP without a value, or with the value \fBauto\fP, runs one test
-process per core according to \fI\%multiprocessing.cpu_count()\fP\&. You can
+process per core according to \X'tty: link https://docs.python.org/3/library/multiprocessing.html#multiprocessing.cpu_count'\fI\%multiprocessing.cpu_count()\fP\X'tty: link'\&. You can
override this by passing the desired number of processes, e.g.
\fB\-\-parallel 4\fP, or by setting the \fI\%DJANGO_TEST_PROCESSES\fP environment
variable.
.sp
-Django distributes test cases — \fI\%unittest.TestCase\fP subclasses — to
-subprocesses. If there are fewer test cases than configured processes, Django
-will reduce the number of processes accordingly.
+Django distributes test cases — \X'tty: link https://docs.python.org/3/library/unittest.html#unittest.TestCase'\fI\%unittest.TestCase\fP\X'tty: link' subclasses — to
+subprocesses. If there are fewer test case classes than configured processes,
+Django will reduce the number of processes accordingly.
.sp
-Each process gets its own database. You must ensure that different test cases
-don\(aqt access the same resources. For instance, test cases that touch the
-filesystem should create a temporary directory for their own use.
+Each process gets its own database. You must ensure that different test case
+classes don\(aqt access the same resources. For instance, test case classes that
+touch the filesystem should create a temporary directory for their own use.
.sp
\fBNOTE:\fP
.INDENT 0.0
.INDENT 3.5
If you have test classes that cannot be run in parallel, you can use
-\fBSerializeMixin\fP to run them sequentially. See \fI\%Enforce running test
-classes sequentially\fP\&.
+\fBSerializeMixin\fP to run them sequentially. See \X'tty: link #topics-testing-enforce-run-sequentially'\fI\%Enforce running test
+classes sequentially\fP\X'tty: link'\&.
.UNINDENT
.UNINDENT
.sp
@@ -1986,18 +1904,16 @@ correctly:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
$ python \-m pip install tblib
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
This feature isn\(aqt available on Windows. It doesn\(aqt work with the Oracle
database backend either.
.sp
-If you want to use \fI\%pdb\fP while debugging tests, you must disable parallel
+If you want to use \X'tty: link https://docs.python.org/3/library/pdb.html#module-pdb'\fI\%pdb\fP\X'tty: link' while debugging tests, you must disable parallel
execution (\fB\-\-parallel=1\fP). You\(aqll see something like \fBbdb.BdbQuit\fP if you
don\(aqt.
.sp
@@ -2011,7 +1927,7 @@ parallelization to see the traceback of the failure.
.sp
This is a known limitation. It arises from the need to serialize objects
in order to exchange them between processes. See
-\fI\%What can be pickled and unpickled?\fP for details.
+\X'tty: link https://docs.python.org/3/library/pickle.html#pickle-picklable'\fI\%What can be pickled and unpickled?\fP\X'tty: link' for details.
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -2019,7 +1935,7 @@ in order to exchange them between processes. See
.B \-\-tag TAGS
.UNINDENT
.sp
-Runs only tests \fI\%marked with the specified tags\fP\&.
+Runs only tests \X'tty: link #topics-tagging-tests'\fI\%marked with the specified tags\fP\X'tty: link'\&.
May be specified multiple times and combined with \fI\%test \-\-exclude\-tag\fP\&.
.sp
Tests that fail to load are always considered matching.
@@ -2028,7 +1944,7 @@ Tests that fail to load are always considered matching.
.B \-\-exclude\-tag EXCLUDE_TAGS
.UNINDENT
.sp
-Excludes tests \fI\%marked with the specified tags\fP\&.
+Excludes tests \X'tty: link #topics-tagging-tests'\fI\%marked with the specified tags\fP\X'tty: link'\&.
May be specified multiple times and combined with \fI\%test \-\-tag\fP\&.
.INDENT 0.0
.TP
@@ -2036,7 +1952,7 @@ May be specified multiple times and combined with \fI\%test \-\-tag\fP\&.
.UNINDENT
.sp
Runs test methods and classes matching test name patterns, in the same way as
-\fI\%unittest\(aqs \-k option\fP\&. Can be specified multiple times.
+\X'tty: link https://docs.python.org/3/library/unittest.html#cmdoption-unittest-k'\fI\%unittest\(aqs \-k option\fP\X'tty: link'\&. Can be specified multiple times.
.INDENT 0.0
.TP
.B \-\-pdb
@@ -2050,13 +1966,13 @@ installed, \fBipdb\fP is used instead.
.UNINDENT
.sp
Discards output (\fBstdout\fP and \fBstderr\fP) for passing tests, in the same way
-as \fI\%unittest\(aqs \-\-buffer option\fP\&.
+as \X'tty: link https://docs.python.org/3/library/unittest.html#cmdoption-unittest-b'\fI\%unittest\(aqs \-\-buffer option\fP\X'tty: link'\&.
.INDENT 0.0
.TP
.B \-\-no\-faulthandler
.UNINDENT
.sp
-Django automatically calls \fI\%faulthandler.enable()\fP when starting the
+Django automatically calls \X'tty: link https://docs.python.org/3/library/faulthandler.html#faulthandler.enable'\fI\%faulthandler.enable()\fP\X'tty: link' when starting the
tests, which allows it to print a traceback if the interpreter crashes. Pass
\fB\-\-no\-faulthandler\fP to disable this behavior.
.INDENT 0.0
@@ -2093,18 +2009,16 @@ For example, this command:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin testserver mydata.json
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
\&...would perform the following steps:
.INDENT 0.0
.IP 1. 3
-Create a test database, as described in \fI\%The test database\fP\&.
+Create a test database, as described in \X'tty: link #the-test-database'\fI\%The test database\fP\X'tty: link'\&.
.IP 2. 3
Populate the test database with fixture data from the given fixtures.
(For more on fixtures, see the documentation for \fI\%loaddata\fP above.)
@@ -2122,7 +2036,7 @@ the views in a web browser, manually.
.IP \(bu 2
Let\(aqs say you\(aqre developing your Django application and have a \(dqpristine\(dq
copy of a database that you\(aqd like to interact with. You can dump your
-database to a \fI\%fixture\fP (using the
+database to a \X'tty: link #fixtures-explanation'\fI\%fixture\fP\X'tty: link' (using the
\fI\%dumpdata\fP command, explained above), then use \fBtestserver\fP to run
your web application with that data. With this arrangement, you have the
flexibility of messing up your data in any way, knowing that whatever data
@@ -2147,12 +2061,10 @@ To run the test server on port 7000 with \fBfixture1\fP and \fBfixture2\fP:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin testserver \-\-addrport 7000 fixture1 fixture2
django\-admin testserver fixture1 fixture2 \-\-addrport 7000
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -2164,11 +2076,9 @@ To run on 1.2.3.4:7000 with a \fBtest\fP fixture:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin testserver \-\-addrport 1.2.3.4:7000 test
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -2182,7 +2092,7 @@ existing test database.
.sp
Some commands are only available when the \fBdjango.contrib\fP application that
\fI\%implements\fP them has been
-\fI\%enabled\fP\&. This section describes them grouped by
+\X'tty: link #std-setting-INSTALLED_APPS'\fI\%enabled\fP\X'tty: link'\&. This section describes them grouped by
their application.
.SS \fBdjango.contrib.auth\fP
.SS \fBchangepassword\fP
@@ -2208,11 +2118,9 @@ Example usage:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin changepassword ringo
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.SS \fBcreatesuperuser\fP
@@ -2238,9 +2146,9 @@ variable. Otherwise, no password will be set, and the superuser account will
not be able to log in until a password has been manually set for it.
.sp
In non\-interactive mode, the
-\fI\%USERNAME_FIELD\fP and required
+\X'tty: link #django.contrib.auth.models.CustomUser.USERNAME_FIELD'\fI\%USERNAME_FIELD\fP\X'tty: link' and required
fields (listed in
-\fI\%REQUIRED_FIELDS\fP) fall back to
+\X'tty: link #django.contrib.auth.models.CustomUser.REQUIRED_FIELDS'\fI\%REQUIRED_FIELDS\fP\X'tty: link') fall back to
\fBDJANGO_SUPERUSER_\fP environment variables, unless they
are overridden by a command line argument. For example, to provide an \fBemail\fP
field, you can use \fBDJANGO_SUPERUSER_EMAIL\fP environment variable.
@@ -2275,7 +2183,7 @@ You can subclass the management command and override \fBget_input_data()\fP if y
want to customize data input and validation. Consult the source code for
details on the existing implementation and the method\(aqs parameters. For example,
it could be useful if you have a \fBForeignKey\fP in
-\fI\%REQUIRED_FIELDS\fP and want to
+\X'tty: link #django.contrib.auth.models.CustomUser.REQUIRED_FIELDS'\fI\%REQUIRED_FIELDS\fP\X'tty: link' and want to
allow creating an instance instead of entering the primary key of an existing
instance.
.SS \fBdjango.contrib.contenttypes\fP
@@ -2285,7 +2193,7 @@ instance.
.B django\-admin remove_stale_contenttypes
.UNINDENT
.sp
-This command is only available if Django\(aqs \fI\%contenttypes app\fP (\fI\%django.contrib.contenttypes\fP) is installed.
+This command is only available if Django\(aqs \fI\%contenttypes app\fP (\X'tty: link #module-django.contrib.contenttypes'\fI\%django.contrib.contenttypes\fP\X'tty: link') is installed.
.sp
Deletes stale content types (from deleted models) in your database. Any objects
that depend on the deleted content types will also be deleted. A list of
@@ -2303,14 +2211,14 @@ Specifies the database to use. Defaults to \fBdefault\fP\&.
.UNINDENT
.sp
Deletes stale content types including ones from previously installed apps that
-have been removed from \fI\%INSTALLED_APPS\fP\&. Defaults to \fBFalse\fP\&.
+have been removed from \X'tty: link #std-setting-INSTALLED_APPS'\fI\%INSTALLED_APPS\fP\X'tty: link'\&. Defaults to \fBFalse\fP\&.
.SS \fBdjango.contrib.gis\fP
.SS \fBogrinspect\fP
.sp
This command is only available if \fI\%GeoDjango\fP
(\fBdjango.contrib.gis\fP) is installed.
.sp
-Please refer to its \fI\%description\fP in the GeoDjango
+Please refer to its \X'tty: link #django-admin-ogrinspect'\fI\%description\fP\X'tty: link' in the GeoDjango
documentation.
.SS \fBdjango.contrib.sessions\fP
.SS \fBclearsessions\fP
@@ -2325,13 +2233,13 @@ Can be run as a cron job or directly to clean out expired sessions.
.sp
This command is only available if the \fI\%static files application\fP (\fBdjango.contrib.staticfiles\fP) is installed.
.sp
-Please refer to its \fI\%description\fP in the
+Please refer to its \X'tty: link #django-admin-collectstatic'\fI\%description\fP\X'tty: link' in the
\fI\%staticfiles\fP documentation.
.SS \fBfindstatic\fP
.sp
This command is only available if the \fI\%static files application\fP (\fBdjango.contrib.staticfiles\fP) is installed.
.sp
-Please refer to its \fI\%description\fP in the \fI\%staticfiles\fP documentation.
+Please refer to its \X'tty: link #django-admin-findstatic'\fI\%description\fP\X'tty: link' in the \fI\%staticfiles\fP documentation.
.SH DEFAULT OPTIONS
.sp
Although some commands may allow their own custom options, every command
@@ -2341,9 +2249,9 @@ allows for the following options by default:
.B \-\-pythonpath PYTHONPATH
.UNINDENT
.sp
-Adds the given filesystem path to the Python \fI\%import search path\fP\&. If this
-isn\(aqt provided, \fBdjango\-admin\fP will use the \fI\%PYTHONPATH\fP environment
-variable.
+Adds the given filesystem path to the Python \X'tty: link https://docs.python.org/3/library/sys.html#sys.path'\fI\%sys.path\fP\X'tty: link' module
+attribute. If this isn\(aqt provided, \fBdjango\-admin\fP will use the
+\X'tty: link https://docs.python.org/3/using/cmdline.html#envvar-PYTHONPATH'\fI\%PYTHONPATH\fP\X'tty: link' environment variable.
.sp
This option is unnecessary in \fBmanage.py\fP, because it takes care of setting
the Python path for you.
@@ -2352,11 +2260,9 @@ Example usage:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin migrate \-\-pythonpath=\(aq/home/djangoprojects/myproject\(aq
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -2366,7 +2272,7 @@ django\-admin migrate \-\-pythonpath=\(aq/home/djangoprojects/myproject\(aq
.sp
Specifies the settings module to use. The settings module should be in Python
package syntax, e.g. \fBmysite.settings\fP\&. If this isn\(aqt provided,
-\fBdjango\-admin\fP will use the \fI\%DJANGO_SETTINGS_MODULE\fP environment
+\fBdjango\-admin\fP will use the \X'tty: link #envvar-DJANGO_SETTINGS_MODULE'\fI\%DJANGO_SETTINGS_MODULE\fP\X'tty: link' environment
variable.
.sp
This option is unnecessary in \fBmanage.py\fP, because it uses
@@ -2376,11 +2282,9 @@ Example usage:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin migrate \-\-settings=mysite.settings
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -2388,7 +2292,7 @@ django\-admin migrate \-\-settings=mysite.settings
.B \-\-traceback
.UNINDENT
.sp
-Displays a full stack trace when a \fI\%CommandError\fP
+Displays a full stack trace when a \X'tty: link #django.core.management.CommandError'\fI\%CommandError\fP\X'tty: link'
is raised. By default, \fBdjango\-admin\fP will show an error message when a
\fBCommandError\fP occurs and a full stack trace for any other exception.
.sp
@@ -2398,11 +2302,9 @@ Example usage:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin migrate \-\-traceback
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -2429,11 +2331,9 @@ Example usage:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin migrate \-\-verbosity 2
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -2449,11 +2349,9 @@ Example usage:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin runserver \-\-no\-color
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -2471,18 +2369,16 @@ colored output to another command.
.sp
Skips running system checks prior to running the command. This option is only
available if the
-\fI\%requires_system_checks\fP command
+\X'tty: link #django.core.management.BaseCommand.requires_system_checks'\fI\%requires_system_checks\fP\X'tty: link' command
attribute is not an empty list or tuple.
.sp
Example usage:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin migrate \-\-skip\-checks
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.SH EXTRA NICETIES
@@ -2498,7 +2394,7 @@ won\(aqt use the color codes if you\(aqre piping the command\(aqs output to
another program unless the \fI\%\-\-force\-color\fP option is used.
.SS Windows support
.sp
-On Windows 10, the \fI\%Windows Terminal\fP application, \fI\%VS Code\fP, and PowerShell
+On Windows 10, the \X'tty: link https://www.microsoft.com/en-us/p/windows-terminal-preview/9n0dx20hk701'\fI\%Windows Terminal\fP\X'tty: link' application, \X'tty: link https://code.visualstudio.com'\fI\%VS Code\fP\X'tty: link', and PowerShell
(where virtual terminal processing is enabled) allow colored output, and are
supported by default.
.sp
@@ -2507,22 +2403,20 @@ escape sequences so by default there is no color output. In this case either of
two third\-party libraries are needed:
.INDENT 0.0
.IP \(bu 2
-Install \fI\%colorama\fP, a Python package that translates ANSI color codes
+Install \X'tty: link https://pypi.org/project/colorama/'\fI\%colorama\fP\X'tty: link', a Python package that translates ANSI color codes
into Windows API calls. Django commands will detect its presence and will
make use of its services to color output just like on Unix\-based platforms.
\fBcolorama\fP can be installed via pip:
.INDENT 2.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
\&...\e> py \-m pip install \(dqcolorama >= 0.4.6\(dq
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.IP \(bu 2
-Install \fI\%ANSICON\fP, a third\-party tool that allows \fBcmd.exe\fP to process
+Install \X'tty: link http://adoxa.altervista.org/ansicon/'\fI\%ANSICON\fP\X'tty: link', a third\-party tool that allows \fBcmd.exe\fP to process
ANSI color codes. Django commands will detect its presence and will make use
of its services to color output just like on Unix\-based platforms.
.UNINDENT
@@ -2553,11 +2447,9 @@ would run the following at a command prompt:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
export DJANGO_COLORS=\(dqlight\(dq
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -2655,11 +2547,9 @@ are then separated by a semicolon. For example:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
export DJANGO_COLORS=\(dqerror=yellow/blue,blink;notice=magenta\(dq
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -2673,11 +2563,9 @@ palette will be loaded. So:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
export DJANGO_COLORS=\(dqlight;error=yellow/blue,blink;notice=magenta\(dq
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -2687,7 +2575,7 @@ overridden as specified.
.SS Bash completion
.sp
If you use the Bash shell, consider installing the Django bash completion
-script, which lives in \fI\%extras/django_bash_completion\fP in the Django source
+script, which lives in \X'tty: link https://github.com/django/django/blob/main/extras/django_bash_completion'\fI\%extras/django_bash_completion\fP\X'tty: link' in the Django source
distribution. It enables tab\-completion of \fBdjango\-admin\fP and
\fBmanage.py\fP commands, so you can, for instance...
.INDENT 0.0
@@ -2713,11 +2601,9 @@ current project, you can set the \fBPATH\fP explicitly:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
PATH=path/to/venv/bin django\-admin makemigrations
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -2725,11 +2611,9 @@ For commands using \fBstdout\fP you can pipe the output to \fBblack\fP if needed
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
django\-admin inspectdb | black \-
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.INDENT 0.0
@@ -2760,16 +2644,14 @@ Examples:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
from django.core import management
from django.core.management.commands import loaddata
management.call_command(\(dqflush\(dq, verbosity=0, interactive=False)
management.call_command(\(dqloaddata\(dq, \(dqtest_data\(dq, verbosity=0)
management.call_command(loaddata.Command(), \(dqtest_data\(dq, verbosity=0)
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -2780,8 +2662,7 @@ Named arguments can be passed by using either one of the following syntaxes:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
# Similar to the command line
management.call_command(\(dqdumpdata\(dq, \(dq\-\-natural\-foreign\(dq)
@@ -2791,8 +2672,7 @@ management.call_command(\(dqdumpdata\(dq, natural_foreign=True)
# \(gause_natural_foreign_keys\(ga is the option destination variable
management.call_command(\(dqdumpdata\(dq, use_natural_foreign_keys=True)
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -2807,11 +2687,9 @@ Command options which take multiple options are passed a list:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
management.call_command(\(dqdumpdata\(dq, exclude=[\(dqcontenttypes\(dq, \(dqauth\(dq])
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.sp
@@ -2824,12 +2702,10 @@ support the \fBstdout\fP and \fBstderr\fP options. For example, you could write:
.INDENT 0.0
.INDENT 3.5
.sp
-.nf
-.ft C
+.EX
with open(\(dq/path/to/command_output\(dq, \(dqw\(dq) as f:
management.call_command(\(dqdumpdata\(dq, stdout=f)
-.ft P
-.fi
+.EE
.UNINDENT
.UNINDENT
.SH AUTHOR
From b6257647444bd5034e6defb8831d5329c1d3410e Mon Sep 17 00:00:00 2001
From: Natalia <124304+nessita@users.noreply.github.com>
Date: Fri, 3 May 2024 13:56:50 -0300
Subject: [PATCH 271/316] Bumped version; main is now 5.2 pre-alpha.
---
django/__init__.py | 2 +-
docs/conf.py | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/django/__init__.py b/django/__init__.py
index af19c36b41..67d6ecc45d 100644
--- a/django/__init__.py
+++ b/django/__init__.py
@@ -1,6 +1,6 @@
from django.utils.version import get_version
-VERSION = (5, 1, 0, "alpha", 0)
+VERSION = (5, 2, 0, "alpha", 0)
__version__ = get_version(VERSION)
diff --git a/docs/conf.py b/docs/conf.py
index a7bfe9fc52..c36a9a2022 100644
--- a/docs/conf.py
+++ b/docs/conf.py
@@ -116,7 +116,7 @@ copyright = "Django Software Foundation and contributors"
# built documents.
#
# The short X.Y version.
-version = "5.1"
+version = "5.2"
# The full version, including alpha/beta/rc tags.
try:
from django import VERSION, get_version
@@ -133,7 +133,7 @@ else:
release = django_release()
# The "development version" of Django
-django_next_version = "5.1"
+django_next_version = "5.2"
extlinks = {
"bpo": ("https://bugs.python.org/issue?@action=redirect&bpo=%s", "bpo-%s"),
From ec44247f597d09b7ca7a54d33249ec02c5fbeb07 Mon Sep 17 00:00:00 2001
From: Natalia <124304+nessita@users.noreply.github.com>
Date: Fri, 3 May 2024 14:13:19 -0300
Subject: [PATCH 272/316] Added stub release notes for 5.2.
---
docs/faq/install.txt | 4 +-
docs/releases/5.2.txt | 253 ++++++++++++++++++++++++++++++++++++++++
docs/releases/index.txt | 7 ++
3 files changed, 261 insertions(+), 3 deletions(-)
create mode 100644 docs/releases/5.2.txt
diff --git a/docs/faq/install.txt b/docs/faq/install.txt
index a89da571a9..ddb84d6d9c 100644
--- a/docs/faq/install.txt
+++ b/docs/faq/install.txt
@@ -50,12 +50,10 @@ What Python version can I use with Django?
============== ===============
Django version Python versions
============== ===============
-3.2 3.6, 3.7, 3.8, 3.9, 3.10 (added in 3.2.9)
-4.0 3.8, 3.9, 3.10
-4.1 3.8, 3.9, 3.10, 3.11 (added in 4.1.3)
4.2 3.8, 3.9, 3.10, 3.11, 3.12 (added in 4.2.8)
5.0 3.10, 3.11, 3.12
5.1 3.10, 3.11, 3.12
+5.2 3.10, 3.11, 3.12, 3.13
============== ===============
For each version of Python, only the latest micro release (A.B.C) is officially
diff --git a/docs/releases/5.2.txt b/docs/releases/5.2.txt
new file mode 100644
index 0000000000..5c285e8f39
--- /dev/null
+++ b/docs/releases/5.2.txt
@@ -0,0 +1,253 @@
+============================================
+Django 5.2 release notes - UNDER DEVELOPMENT
+============================================
+
+*Expected April 2025*
+
+Welcome to Django 5.2!
+
+These release notes cover the :ref:`new features `, as well as
+some :ref:`backwards incompatible changes ` you
+should be aware of when upgrading from Django 5.1 or earlier. We've
+:ref:`begun the deprecation process for some features
+`.
+
+See the :doc:`/howto/upgrade-version` guide if you're updating an existing
+project.
+
+Django 5.2 is designated as a :term:`long-term support release
+`. It will receive security updates for at least
+three years after its release. Support for the previous LTS, Django 4.2, will
+end in April 2026.
+
+Python compatibility
+====================
+
+Django 5.2 supports Python 3.10, 3.11, 3.12, and 3.13. We **highly recommend**
+and only officially support the latest release of each series.
+
+.. _whats-new-5.2:
+
+What's new in Django 5.2
+========================
+
+Minor features
+--------------
+
+:mod:`django.contrib.admin`
+~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+:mod:`django.contrib.admindocs`
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+:mod:`django.contrib.auth`
+~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+:mod:`django.contrib.contenttypes`
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+:mod:`django.contrib.gis`
+~~~~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+:mod:`django.contrib.messages`
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+:mod:`django.contrib.postgres`
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+:mod:`django.contrib.redirects`
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+:mod:`django.contrib.sessions`
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+:mod:`django.contrib.sitemaps`
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+:mod:`django.contrib.sites`
+~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+:mod:`django.contrib.staticfiles`
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+:mod:`django.contrib.syndication`
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+Asynchronous views
+~~~~~~~~~~~~~~~~~~
+
+* ...
+
+Cache
+~~~~~
+
+* ...
+
+CSRF
+~~~~
+
+* ...
+
+Database backends
+~~~~~~~~~~~~~~~~~
+
+* ...
+
+Decorators
+~~~~~~~~~~
+
+* ...
+
+Email
+~~~~~
+
+* ...
+
+Error Reporting
+~~~~~~~~~~~~~~~
+
+* ...
+
+File Storage
+~~~~~~~~~~~~
+
+* ...
+
+File Uploads
+~~~~~~~~~~~~
+
+* ...
+
+Forms
+~~~~~
+
+* ...
+
+Generic Views
+~~~~~~~~~~~~~
+
+* ...
+
+Internationalization
+~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+Logging
+~~~~~~~
+
+* ...
+
+Management Commands
+~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+Migrations
+~~~~~~~~~~
+
+* ...
+
+Models
+~~~~~~
+
+* ...
+
+Requests and Responses
+~~~~~~~~~~~~~~~~~~~~~~
+
+* ...
+
+Security
+~~~~~~~~
+
+* ...
+
+Serialization
+~~~~~~~~~~~~~
+
+* ...
+
+Signals
+~~~~~~~
+
+* ...
+
+Templates
+~~~~~~~~~
+
+* ...
+
+Tests
+~~~~~
+
+* ...
+
+URLs
+~~~~
+
+* ...
+
+Utilities
+~~~~~~~~~
+
+* ...
+
+Validators
+~~~~~~~~~~
+
+* ...
+
+.. _backwards-incompatible-5.2:
+
+Backwards incompatible changes in 5.2
+=====================================
+
+Database backend API
+--------------------
+
+This section describes changes that may be needed in third-party database
+backends.
+
+* ...
+
+Miscellaneous
+-------------
+
+* ...
+
+.. _deprecated-features-5.2:
+
+Features deprecated in 5.2
+==========================
+
+Miscellaneous
+-------------
+
+* ...
diff --git a/docs/releases/index.txt b/docs/releases/index.txt
index 982bb96ee3..820456fa7a 100644
--- a/docs/releases/index.txt
+++ b/docs/releases/index.txt
@@ -20,6 +20,13 @@ versions of the documentation contain the release notes for any later releases.
.. _development_release_notes:
+5.2 release
+-----------
+.. toctree::
+ :maxdepth: 1
+
+ 5.2
+
5.1 release
-----------
.. toctree::
From 05cce083ad662913008e107bc6332e7ffe1502e6 Mon Sep 17 00:00:00 2001
From: Natalia <124304+nessita@users.noreply.github.com>
Date: Fri, 3 May 2024 14:39:43 -0300
Subject: [PATCH 273/316] Removed versionadded/changed annotations for 5.0.
This also removes remaining versionadded/changed annotations for older
versions.
---
docs/howto/error-reporting.txt | 8 -----
docs/ref/applications.txt | 5 ---
docs/ref/clickjacking.txt | 10 ------
docs/ref/contrib/admin/filters.txt | 2 --
docs/ref/contrib/admin/index.txt | 24 -------------
docs/ref/contrib/auth.txt | 7 ----
docs/ref/contrib/contenttypes.txt | 2 --
docs/ref/contrib/gis/functions.txt | 2 --
docs/ref/contrib/gis/geoquerysets.txt | 20 -----------
docs/ref/contrib/gis/geos.txt | 2 --
docs/ref/contrib/messages.txt | 2 --
docs/ref/contrib/postgres/aggregates.txt | 18 ----------
docs/ref/contrib/postgres/constraints.txt | 2 --
docs/ref/contrib/sitemaps.txt | 5 ---
docs/ref/csrf.txt | 16 ---------
docs/ref/django-admin.txt | 2 --
docs/ref/files/file.txt | 4 ---
docs/ref/forms/api.txt | 12 -------
docs/ref/forms/fields.txt | 14 --------
docs/ref/forms/renderers.txt | 6 ----
docs/ref/models/constraints.txt | 6 ----
docs/ref/models/database-functions.txt | 5 ---
docs/ref/models/expressions.txt | 2 --
docs/ref/models/fields.txt | 12 -------
docs/ref/models/instances.txt | 9 -----
docs/ref/models/querysets.txt | 31 ----------------
docs/ref/paginator.txt | 2 --
docs/ref/request-response.txt | 4 ---
docs/ref/settings.txt | 5 ---
docs/ref/templates/builtins.txt | 10 ------
docs/ref/validators.txt | 3 --
docs/topics/async.txt | 4 ---
docs/topics/auth/customizing.txt | 4 ---
docs/topics/auth/default.txt | 20 -----------
docs/topics/auth/passwords.txt | 4 ---
docs/topics/db/models.txt | 4 ---
docs/topics/forms/index.txt | 2 --
docs/topics/http/decorators.txt | 43 -----------------------
docs/topics/http/shortcuts.txt | 7 ----
docs/topics/i18n/timezones.txt | 4 ---
docs/topics/migrations.txt | 5 ---
docs/topics/signals.txt | 8 -----
docs/topics/testing/advanced.txt | 4 ---
docs/topics/testing/tools.txt | 18 ----------
44 files changed, 379 deletions(-)
diff --git a/docs/howto/error-reporting.txt b/docs/howto/error-reporting.txt
index b36f884096..61450dfe7a 100644
--- a/docs/howto/error-reporting.txt
+++ b/docs/howto/error-reporting.txt
@@ -192,10 +192,6 @@ filtered out of error reports in a production environment (that is, where
@another_decorator
def process_info(user): ...
- .. versionchanged:: 5.0
-
- Support for wrapping ``async`` functions was added.
-
.. function:: sensitive_post_parameters(*parameters)
If one of your views receives an :class:`~django.http.HttpRequest` object
@@ -235,10 +231,6 @@ filtered out of error reports in a production environment (that is, where
``user_change_password`` in the ``auth`` admin) to prevent the leaking of
sensitive information such as user passwords.
- .. versionchanged:: 5.0
-
- Support for wrapping ``async`` functions was added.
-
.. _custom-error-reports:
Custom error reports
diff --git a/docs/ref/applications.txt b/docs/ref/applications.txt
index 03063f2086..69d04380ce 100644
--- a/docs/ref/applications.txt
+++ b/docs/ref/applications.txt
@@ -431,11 +431,6 @@ application registry.
It must be called explicitly in other cases, for instance in plain Python
scripts.
- .. versionchanged:: 5.0
-
- Raises a ``RuntimeWarning`` when apps interact with the database before
- the app registry has been fully populated.
-
.. currentmodule:: django.apps
The application registry is initialized in three stages. At each stage, Django
diff --git a/docs/ref/clickjacking.txt b/docs/ref/clickjacking.txt
index 3a81bdbdb0..f9bec591a7 100644
--- a/docs/ref/clickjacking.txt
+++ b/docs/ref/clickjacking.txt
@@ -90,11 +90,6 @@ that tells the middleware not to set the header::
iframe, you may need to modify the :setting:`CSRF_COOKIE_SAMESITE` or
:setting:`SESSION_COOKIE_SAMESITE` settings.
-.. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added to the
- ``@xframe_options_exempt`` decorator.
-
Setting ``X-Frame-Options`` per view
------------------------------------
@@ -118,11 +113,6 @@ decorators::
Note that you can use the decorators in conjunction with the middleware. Use of
a decorator overrides the middleware.
-.. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added to the
- ``@xframe_options_deny`` and ``@xframe_options_sameorigin`` decorators.
-
Limitations
===========
diff --git a/docs/ref/contrib/admin/filters.txt b/docs/ref/contrib/admin/filters.txt
index fc70a1d6b2..d55e6fb946 100644
--- a/docs/ref/contrib/admin/filters.txt
+++ b/docs/ref/contrib/admin/filters.txt
@@ -216,8 +216,6 @@ concrete example.
Facets
======
-.. versionadded:: 5.0
-
By default, counts for each filter, known as facets, can be shown by toggling
on via the admin UI. These counts will update according to the currently
applied filters. See :attr:`ModelAdmin.show_facets` for more details.
diff --git a/docs/ref/contrib/admin/index.txt b/docs/ref/contrib/admin/index.txt
index b7e94c7387..20f2ce7582 100644
--- a/docs/ref/contrib/admin/index.txt
+++ b/docs/ref/contrib/admin/index.txt
@@ -839,10 +839,6 @@ subclass::
full_name = property(my_property)
- .. versionchanged:: 5.0
-
- Support for ``boolean`` attribute on properties was added.
-
* The field names in ``list_display`` will also appear as CSS classes in
the HTML output, in the form of ``column-`` on each ````
element. This can be used to set column widths in a CSS file for example.
@@ -1028,8 +1024,6 @@ subclass::
.. attribute:: ModelAdmin.show_facets
- .. versionadded:: 5.0
-
Controls whether facet counts are displayed for filters in the admin
changelist. Defaults to :attr:`.ShowFacets.ALLOW`.
@@ -1037,8 +1031,6 @@ subclass::
.. class:: ShowFacets
- .. versionadded:: 5.0
-
Enum of allowed values for :attr:`.ModelAdmin.show_facets`.
.. attribute:: ALWAYS
@@ -1895,10 +1887,6 @@ templates used by the :class:`ModelAdmin` views:
Override this method to customize the lookups permitted for your
:class:`~django.contrib.admin.ModelAdmin` subclass.
- .. versionchanged:: 5.0
-
- The ``request`` argument was added.
-
.. method:: ModelAdmin.has_view_permission(request, obj=None)
Should return ``True`` if viewing ``obj`` is permitted, ``False`` otherwise.
@@ -2160,10 +2148,6 @@ forms or widgets depending on ``django.jQuery`` must specify
``js=['admin/js/jquery.init.js', …]`` when :ref:`declaring form media assets
`.
-.. versionchanged:: 5.0
-
- jQuery was upgraded from 3.6.4 to 3.7.1.
-
The :class:`ModelAdmin` class requires jQuery by default, so there is no need
to add jQuery to your ``ModelAdmin``’s list of media resources unless you have
a specific need. For example, if you require the jQuery library to be in the
@@ -2879,10 +2863,6 @@ Templates can override or extend base admin templates as described in
The text to put at the top of each admin page, as a ```` (a string).
By default, this is "Django administration".
- .. versionchanged:: 5.0
-
- In older versions, ``site_header`` was using an ``
`` tag.
-
.. attribute:: AdminSite.site_title
The text to put at the end of each admin page's ```` (a string). By
@@ -3054,15 +3034,11 @@ Templates can override or extend base admin templates as described in
.. method:: AdminSite.get_model_admin(model)
- .. versionadded:: 5.0
-
Returns an admin class for the given model class. Raises
``django.contrib.admin.exceptions.NotRegistered`` if a model isn't registered.
.. method:: AdminSite.get_log_entries(request)
- .. versionadded:: 5.0
-
Returns a queryset for the related
:class:`~django.contrib.admin.models.LogEntry` instances, shown on the site
index page. This method can be overridden to filter the log entries by
diff --git a/docs/ref/contrib/auth.txt b/docs/ref/contrib/auth.txt
index 036f8d9f76..d5fc724b54 100644
--- a/docs/ref/contrib/auth.txt
+++ b/docs/ref/contrib/auth.txt
@@ -173,10 +173,6 @@ Methods
the user. (This takes care of the password hashing in making the
comparison.)
- .. versionchanged:: 5.0
-
- ``acheck_password()`` method was added.
-
.. method:: set_unusable_password()
Marks the user as having no password set. This isn't the same as
@@ -721,6 +717,3 @@ Utility functions
backend's ``get_user()`` method, or if the session auth hash doesn't
validate.
- .. versionchanged:: 5.0
-
- ``aget_user()`` function was added.
diff --git a/docs/ref/contrib/contenttypes.txt b/docs/ref/contrib/contenttypes.txt
index 5aad2a4ec7..ff0688d4ac 100644
--- a/docs/ref/contrib/contenttypes.txt
+++ b/docs/ref/contrib/contenttypes.txt
@@ -601,8 +601,6 @@ information.
``GenericPrefetch()``
---------------------
-.. versionadded:: 5.0
-
.. class:: GenericPrefetch(lookup, querysets, to_attr=None)
This lookup is similar to ``Prefetch()`` and it should only be used on
diff --git a/docs/ref/contrib/gis/functions.txt b/docs/ref/contrib/gis/functions.txt
index 3fff7eeb50..ff05d0ec96 100644
--- a/docs/ref/contrib/gis/functions.txt
+++ b/docs/ref/contrib/gis/functions.txt
@@ -257,8 +257,6 @@ value of the geometry.
``ClosestPoint``
================
-.. versionadded:: 5.0
-
.. class:: ClosestPoint(expr1, expr2, **extra)
*Availability*: `PostGIS `__,
diff --git a/docs/ref/contrib/gis/geoquerysets.txt b/docs/ref/contrib/gis/geoquerysets.txt
index c0dd8d71c8..b639c5271e 100644
--- a/docs/ref/contrib/gis/geoquerysets.txt
+++ b/docs/ref/contrib/gis/geoquerysets.txt
@@ -879,10 +879,6 @@ aggregate, except it can be several orders of magnitude faster than performing
a union because it rolls up geometries into a collection or multi object, not
caring about dissolving boundaries.
-.. versionchanged:: 5.0
-
- Support for using the ``filter`` argument was added.
-
.. versionchanged:: 5.1
MySQL 8.0.24+ support was added.
@@ -906,10 +902,6 @@ Example:
>>> print(qs["poly__extent"])
(-96.8016128540039, 29.7633724212646, -95.3631439208984, 32.782058715820)
-.. versionchanged:: 5.0
-
- Support for using the ``filter`` argument was added.
-
``Extent3D``
~~~~~~~~~~~~
@@ -929,10 +921,6 @@ Example:
>>> print(qs["poly__extent3d"])
(-96.8016128540039, 29.7633724212646, 0, -95.3631439208984, 32.782058715820, 0)
-.. versionchanged:: 5.0
-
- Support for using the ``filter`` argument was added.
-
``MakeLine``
~~~~~~~~~~~~
@@ -952,10 +940,6 @@ Example:
>>> print(qs["poly__makeline"])
LINESTRING (-95.3631510000000020 29.7633739999999989, -96.8016109999999941 32.7820570000000018)
-.. versionchanged:: 5.0
-
- Support for using the ``filter`` argument was added.
-
``Union``
~~~~~~~~~
@@ -983,10 +967,6 @@ Example:
... Union(poly)
... ) # A more sensible approach.
-.. versionchanged:: 5.0
-
- Support for using the ``filter`` argument was added.
-
.. rubric:: Footnotes
.. [#fnde9im] *See* `OpenGIS Simple Feature Specification For SQL `_, at Ch. 2.1.13.2, p. 2-13 (The Dimensionally Extended Nine-Intersection Model).
.. [#fnsdorelate] *See* `SDO_RELATE documentation
- .. versionchanged:: 5.0
-
- In older versions, if there are no rows and ``default`` is not
- provided, ``JSONBAgg`` returned an empty list instead of ``None``. If
- you need it, explicitly set ``default`` to ``Value([])``.
-
``StringAgg``
-------------
@@ -243,12 +231,6 @@ General-purpose aggregation functions
'headline': 'NASA uses Python', 'publication_names': 'Science News, The Python Journal'
}]>
- .. versionchanged:: 5.0
-
- In older versions, if there are no rows and ``default`` is not
- provided, ``StringAgg`` returned an empty string instead of ``None``.
- If you need it, explicitly set ``default`` to ``Value("")``.
-
Aggregate functions for statistics
==================================
diff --git a/docs/ref/contrib/postgres/constraints.txt b/docs/ref/contrib/postgres/constraints.txt
index ce9f0cf78f..4d13eddd24 100644
--- a/docs/ref/contrib/postgres/constraints.txt
+++ b/docs/ref/contrib/postgres/constraints.txt
@@ -136,8 +136,6 @@ used for queries that select only included fields
``violation_error_code``
------------------------
-.. versionadded:: 5.0
-
.. attribute:: ExclusionConstraint.violation_error_code
The error code used when ``ValidationError`` is raised during
diff --git a/docs/ref/contrib/sitemaps.txt b/docs/ref/contrib/sitemaps.txt
index 4f32c06bd9..5628edd183 100644
--- a/docs/ref/contrib/sitemaps.txt
+++ b/docs/ref/contrib/sitemaps.txt
@@ -249,11 +249,6 @@ Note:
sitemap was requested is used. If the sitemap is built outside the
context of a request, the default is ``'https'``.
- .. versionchanged:: 5.0
-
- In older versions, the default protocol for sitemaps built outside
- the context of a request was ``'http'``.
-
.. attribute:: Sitemap.limit
**Optional.**
diff --git a/docs/ref/csrf.txt b/docs/ref/csrf.txt
index 8712f27b7e..6072dcd732 100644
--- a/docs/ref/csrf.txt
+++ b/docs/ref/csrf.txt
@@ -150,10 +150,6 @@ class-based views`.
def my_view(request):
return HttpResponse("Hello world")
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
.. function:: csrf_protect(view)
Decorator that provides the protection of ``CsrfViewMiddleware`` to a view.
@@ -170,10 +166,6 @@ class-based views`.
# ...
return render(request, "a_template.html", c)
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
.. function:: requires_csrf_token(view)
Normally the :ttag:`csrf_token` template tag will not work if
@@ -194,18 +186,10 @@ class-based views`.
# ...
return render(request, "a_template.html", c)
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
.. function:: ensure_csrf_cookie(view)
This decorator forces a view to send the CSRF cookie.
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
Settings
========
diff --git a/docs/ref/django-admin.txt b/docs/ref/django-admin.txt
index fa4f6e9ca8..0546555a30 100644
--- a/docs/ref/django-admin.txt
+++ b/docs/ref/django-admin.txt
@@ -1554,8 +1554,6 @@ Outputs timings, including database setup and total run time.
.. django-admin-option:: --durations N
-.. versionadded:: 5.0
-
Shows the N slowest test cases (N=0 for all).
.. admonition:: Python 3.12 and later
diff --git a/docs/ref/files/file.txt b/docs/ref/files/file.txt
index ea9bf0968e..d0b0cdd786 100644
--- a/docs/ref/files/file.txt
+++ b/docs/ref/files/file.txt
@@ -59,10 +59,6 @@ The ``File`` class
It can be used as a context manager, e.g. ``with file.open() as f:``.
- .. versionchanged:: 5.0
-
- Support for passing ``*args`` and ``**kwargs`` was added.
-
.. method:: __iter__()
Iterate over the file yielding one line at a time.
diff --git a/docs/ref/forms/api.txt b/docs/ref/forms/api.txt
index 28cd452c4e..33d0806859 100644
--- a/docs/ref/forms/api.txt
+++ b/docs/ref/forms/api.txt
@@ -1192,10 +1192,6 @@ Attributes of ``BoundField``
When rendering a field with errors, ``aria-invalid="true"`` will be set on
the field's widget to indicate there is an error to screen reader users.
- .. versionchanged:: 5.0
-
- The ``aria-invalid="true"`` was added when a field has errors.
-
.. attribute:: BoundField.field
The form :class:`~django.forms.Field` instance from the form class that
@@ -1289,8 +1285,6 @@ Attributes of ``BoundField``
.. attribute:: BoundField.template_name
- .. versionadded:: 5.0
-
The name of the template rendered with :meth:`.BoundField.as_field_group`.
A property returning the value of the
@@ -1323,8 +1317,6 @@ Methods of ``BoundField``
.. method:: BoundField.as_field_group()
- .. versionadded:: 5.0
-
Renders the field using :meth:`.BoundField.render` with default values
which renders the ``BoundField``, including its label, help text and errors
using the template's :attr:`~django.forms.Field.template_name` if set
@@ -1372,8 +1364,6 @@ Methods of ``BoundField``
.. method:: BoundField.get_context()
- .. versionadded:: 5.0
-
Return the template context for rendering the field. The available context
is ``field`` being the instance of the bound field.
@@ -1426,8 +1416,6 @@ Methods of ``BoundField``
.. method:: BoundField.render(template_name=None, context=None, renderer=None)
- .. versionadded:: 5.0
-
The render method is called by ``as_field_group``. All arguments are
optional and default to:
diff --git a/docs/ref/forms/fields.txt b/docs/ref/forms/fields.txt
index d6bd67e3d4..2ae4fe2be6 100644
--- a/docs/ref/forms/fields.txt
+++ b/docs/ref/forms/fields.txt
@@ -322,10 +322,6 @@ inside ``aria-describedby``:
>>> print(f["username"])
-.. versionchanged:: 5.0
-
- ``aria-describedby`` was added to associate ``help_text`` with its input.
-
.. versionchanged:: 5.1
``aria-describedby`` support was added for ````.
@@ -397,8 +393,6 @@ be ignored in favor of the value from the form's initial data.
.. attribute:: Field.template_name
-.. versionadded:: 5.0
-
The ``template_name`` argument allows a custom template to be used when the
field is rendered with :meth:`~django.forms.BoundField.as_field_group`. By
default this value is set to ``"django/forms/field.html"``. Can be changed per
@@ -513,12 +507,6 @@ For each field, we describe the default widget used if you don't specify
other data types, such as integers or booleans, consider using
:class:`TypedChoiceField` instead.
- .. versionchanged:: 5.0
-
- Support for mappings and using
- :ref:`enumeration types ` directly in
- ``choices`` was added.
-
``DateField``
-------------
@@ -1145,8 +1133,6 @@ For each field, we describe the default widget used if you don't specify
.. attribute:: assume_scheme
- .. versionadded:: 5.0
-
The scheme assumed for URLs provided without one. Defaults to
``"http"``. For example, if ``assume_scheme`` is ``"https"`` and the
provided value is ``"example.com"``, the normalized value will be
diff --git a/docs/ref/forms/renderers.txt b/docs/ref/forms/renderers.txt
index 02b3cac7fb..e527a70c57 100644
--- a/docs/ref/forms/renderers.txt
+++ b/docs/ref/forms/renderers.txt
@@ -61,8 +61,6 @@ should return a rendered templates (as a string) or raise
.. attribute:: field_template_name
- .. versionadded:: 5.0
-
The default name of the template used to render a ``BoundField``.
Defaults to ``"django/forms/field.html"``
@@ -173,8 +171,6 @@ forms receive a dictionary with the following values:
Context available in field templates
====================================
-.. versionadded:: 5.0
-
Field templates receive a context from :meth:`.BoundField.get_context`. By
default, fields receive a dictionary with the following values:
@@ -224,8 +220,6 @@ renderer. Then overriding form templates works :doc:`the same as
Overriding built-in field templates
===================================
-.. versionadded:: 5.0
-
:attr:`.Field.template_name`
To override field templates, you must use the :class:`TemplatesSetting`
diff --git a/docs/ref/models/constraints.txt b/docs/ref/models/constraints.txt
index 6339c39679..7dfc3b7d28 100644
--- a/docs/ref/models/constraints.txt
+++ b/docs/ref/models/constraints.txt
@@ -60,8 +60,6 @@ constraint.
``violation_error_code``
------------------------
-.. versionadded:: 5.0
-
.. attribute:: BaseConstraint.violation_error_code
The error code used when ``ValidationError`` is raised during
@@ -263,8 +261,6 @@ creates a unique index on ``username`` using ``varchar_pattern_ops``.
``nulls_distinct``
------------------
-.. versionadded:: 5.0
-
.. attribute:: UniqueConstraint.nulls_distinct
Whether rows containing ``NULL`` values covered by the unique constraint should
@@ -284,8 +280,6 @@ PostgreSQL 15+.
``violation_error_code``
------------------------
-.. versionadded:: 5.0
-
.. attribute:: UniqueConstraint.violation_error_code
The error code used when ``ValidationError`` is raised during
diff --git a/docs/ref/models/database-functions.txt b/docs/ref/models/database-functions.txt
index 1dc0ce4e97..eb08e160f7 100644
--- a/docs/ref/models/database-functions.txt
+++ b/docs/ref/models/database-functions.txt
@@ -569,11 +569,6 @@ Usage example:
On Oracle, the SQL ``LOCALTIMESTAMP`` is used to avoid issues with casting
``CURRENT_TIMESTAMP`` to ``DateTimeField``.
-.. versionchanged:: 5.0
-
- In older versions, the SQL ``CURRENT_TIMESTAMP`` was used on Oracle instead
- of ``LOCALTIMESTAMP``.
-
``Trunc``
---------
diff --git a/docs/ref/models/expressions.txt b/docs/ref/models/expressions.txt
index f630142294..1b6a208d01 100644
--- a/docs/ref/models/expressions.txt
+++ b/docs/ref/models/expressions.txt
@@ -1053,8 +1053,6 @@ calling the appropriate methods on the wrapped expression.
.. attribute:: allowed_default
- .. versionadded:: 5.0
-
Tells Django that this expression can be used in
:attr:`Field.db_default`. Defaults to ``False``.
diff --git a/docs/ref/models/fields.txt b/docs/ref/models/fields.txt
index ba46726ab8..fa19f58c54 100644
--- a/docs/ref/models/fields.txt
+++ b/docs/ref/models/fields.txt
@@ -138,10 +138,6 @@ the choices are:
provide a well-known inventory of values, such as currencies, countries,
languages, time zones, etc.
-.. versionchanged:: 5.0
-
- Support for mappings and callables was added.
-
Generally, it's best to define choices inside a model class, and to
define a suitably-named constant for each value::
@@ -372,10 +368,6 @@ There are some additional caveats to be aware of:
__empty__ = _("(Unknown)")
-.. versionchanged:: 5.0
-
- Support for using enumeration types directly in the ``choices`` was added.
-
``db_column``
-------------
@@ -405,8 +397,6 @@ looking at your Django code. For example::
``db_default``
--------------
-.. versionadded:: 5.0
-
.. attribute:: Field.db_default
The database-computed default value for this field. This can be a literal value
@@ -1235,8 +1225,6 @@ when :attr:`~django.forms.Field.localize` is ``False`` or
``GeneratedField``
------------------
-.. versionadded:: 5.0
-
.. class:: GeneratedField(expression, output_field, db_persist=None, **kwargs)
A field that is always computed based on other fields in the model. This field
diff --git a/docs/ref/models/instances.txt b/docs/ref/models/instances.txt
index b203ff67c4..65ed4924f7 100644
--- a/docs/ref/models/instances.txt
+++ b/docs/ref/models/instances.txt
@@ -580,10 +580,6 @@ which returns ``NULL``. In such cases it is possible to revert to the old
algorithm by setting the :attr:`~django.db.models.Options.select_on_save`
option to ``True``.
-.. versionchanged:: 5.0
-
- The ``Field.db_default`` parameter was added.
-
.. _ref-models-force-insert:
Forcing an INSERT or UPDATE
@@ -616,11 +612,6 @@ only.
Using ``update_fields`` will force an update similarly to ``force_update``.
-.. versionchanged:: 5.0
-
- Support for passing a tuple of parent classes to ``force_insert`` was
- added.
-
.. _ref-models-field-updates-using-f-expressions:
Updating attributes based on existing fields
diff --git a/docs/ref/models/querysets.txt b/docs/ref/models/querysets.txt
index 3f9e90da20..7a0d086bfe 100644
--- a/docs/ref/models/querysets.txt
+++ b/docs/ref/models/querysets.txt
@@ -1160,12 +1160,6 @@ supports prefetching of
queryset for each ``ContentType`` must be provided in the ``querysets``
parameter of :class:`~django.contrib.contenttypes.prefetch.GenericPrefetch`.
-.. versionchanged:: 5.0
-
- Support for prefetching
- :class:`~django.contrib.contenttypes.fields.GenericForeignKey` with
- non-homogeneous set of results was added.
-
For example, suppose you have these models::
from django.db import models
@@ -2114,13 +2108,6 @@ SQL equivalent:
2
)
- .. versionchanged:: 5.0
-
- In older versions, on databases without native support for the SQL
- ``XOR`` operator, ``XOR`` returned rows that were matched by exactly
- one operand. The previous behavior was not consistent with MySQL,
- MariaDB, and Python behavior.
-
Methods that do not return ``QuerySet``\s
-----------------------------------------
@@ -2402,10 +2389,6 @@ Like :meth:`get_or_create` and :meth:`create`, if you're using manually
specified primary keys and an object needs to be created but the key already
exists in the database, an :exc:`~django.db.IntegrityError` is raised.
-.. versionchanged:: 5.0
-
- The ``create_defaults`` argument was added.
-
``bulk_create()``
~~~~~~~~~~~~~~~~~
@@ -2470,11 +2453,6 @@ be in conflict must be provided.
Enabling the ``ignore_conflicts`` parameter disables setting the primary key on
each model instance (if the database normally supports it).
-.. versionchanged:: 5.0
-
- In older versions, enabling the ``update_conflicts`` parameter prevented
- setting the primary key on each model instance.
-
.. warning::
On MySQL and MariaDB, setting the ``ignore_conflicts`` parameter to
@@ -2629,11 +2607,6 @@ evaluated will force it to evaluate again, repeating the query.
long as ``chunk_size`` is given. Larger values will necessitate fewer queries
to accomplish the prefetching at the cost of greater memory usage.
-.. versionchanged:: 5.0
-
- Support for ``aiterator()`` with previous calls to ``prefetch_related()``
- was added.
-
On some databases (e.g. Oracle, `SQLite
`_), the maximum number
of terms in an SQL ``IN`` clause might be limited. Hence values below this
@@ -4162,10 +4135,6 @@ When using multiple databases with ``prefetch_related_objects``, the prefetch
query will use the database associated with the model instance. This can be
overridden by using a custom queryset in a related lookup.
-.. versionchanged:: 5.0
-
- ``aprefetch_related_objects()`` function was added.
-
``FilteredRelation()`` objects
------------------------------
diff --git a/docs/ref/paginator.txt b/docs/ref/paginator.txt
index 8afadbe6f8..03084e5d40 100644
--- a/docs/ref/paginator.txt
+++ b/docs/ref/paginator.txt
@@ -58,8 +58,6 @@ For examples, see the :doc:`Pagination topic guide `.
.. attribute:: Paginator.error_messages
- .. versionadded:: 5.0
-
The ``error_messages`` argument lets you override the default messages that
the paginator will raise. Pass in a dictionary with keys matching the error
messages you want to override. Available error message keys are:
diff --git a/docs/ref/request-response.txt b/docs/ref/request-response.txt
index 3952b9d029..20c04279b2 100644
--- a/docs/ref/request-response.txt
+++ b/docs/ref/request-response.txt
@@ -289,8 +289,6 @@ Methods
.. method:: HttpRequest.auser()
- .. versionadded:: 5.0
-
From the :class:`~django.contrib.auth.middleware.AuthenticationMiddleware`:
Coroutine. Returns an instance of :setting:`AUTH_USER_MODEL` representing
the currently logged-in user. If the user isn't currently logged in,
@@ -1290,8 +1288,6 @@ Attributes
Handling disconnects
--------------------
-.. versionadded:: 5.0
-
If the client disconnects during a streaming response, Django will cancel the
coroutine that is handling the response. If you want to clean up resources
manually, you can do so by catching the ``asyncio.CancelledError``::
diff --git a/docs/ref/settings.txt b/docs/ref/settings.txt
index ee25eab0dd..c1691770da 100644
--- a/docs/ref/settings.txt
+++ b/docs/ref/settings.txt
@@ -1689,7 +1689,6 @@ renderers are:
``FORMS_URLFIELD_ASSUME_HTTPS``
-------------------------------
-.. versionadded:: 5.0
.. deprecated:: 5.0
Default: ``False``
@@ -2923,10 +2922,6 @@ be retained if present.
See also :setting:`TIME_ZONE` and :setting:`USE_I18N`.
-.. versionchanged:: 5.0
-
- In older versions, the default value is ``False``.
-
.. setting:: USE_X_FORWARDED_HOST
``USE_X_FORWARDED_HOST``
diff --git a/docs/ref/templates/builtins.txt b/docs/ref/templates/builtins.txt
index 8ad73b835f..4cfd1d8f71 100644
--- a/docs/ref/templates/builtins.txt
+++ b/docs/ref/templates/builtins.txt
@@ -1957,8 +1957,6 @@ For example:
``escapeseq``
-------------
-.. versionadded:: 5.0
-
Applies the :tfilter:`escape` filter to each element of a sequence. Useful in
conjunction with other filters that operate on sequences, such as
:tfilter:`join`. For example:
@@ -2726,10 +2724,6 @@ Newlines in the HTML content will be preserved.
resource-intensive and impact service performance. ``truncatechars_html``
limits input to the first five million characters.
-.. versionchanged:: 3.2.22
-
- In older versions, strings over five million characters were processed.
-
.. templatefilter:: truncatewords
``truncatewords``
@@ -2778,10 +2772,6 @@ Newlines in the HTML content will be preserved.
resource-intensive and impact service performance. ``truncatewords_html``
limits input to the first five million characters.
-.. versionchanged:: 3.2.22
-
- In older versions, strings over five million characters were processed.
-
.. templatefilter:: unordered_list
``unordered_list``
diff --git a/docs/ref/validators.txt b/docs/ref/validators.txt
index 3287d0560e..846a3c7157 100644
--- a/docs/ref/validators.txt
+++ b/docs/ref/validators.txt
@@ -395,6 +395,3 @@ to, or in lieu of custom ``field.clean()`` methods.
``StepValueValidator(3, offset=1.4)`` valid values include ``1.4``,
``4.4``, ``7.4``, ``10.4``, and so on.
- .. versionchanged:: 5.0
-
- The ``offset`` argument was added.
diff --git a/docs/topics/async.txt b/docs/topics/async.txt
index 87550ff46d..a289344f6b 100644
--- a/docs/topics/async.txt
+++ b/docs/topics/async.txt
@@ -76,8 +76,6 @@ corruption.
Decorators
----------
-.. versionadded:: 5.0
-
The following decorators can be used with both synchronous and asynchronous
view functions:
@@ -181,8 +179,6 @@ mode if you have asynchronous code in your project.
Handling disconnects
--------------------
-.. versionadded:: 5.0
-
For long-lived requests, a client may disconnect before the view returns a
response. In this case, an ``asyncio.CancelledError`` will be raised in the
view. You can catch this error and handle it if you need to perform any
diff --git a/docs/topics/auth/customizing.txt b/docs/topics/auth/customizing.txt
index 52fa3515b8..3f8be983f8 100644
--- a/docs/topics/auth/customizing.txt
+++ b/docs/topics/auth/customizing.txt
@@ -703,10 +703,6 @@ The following attributes and methods are available on any subclass of
the user. (This takes care of the password hashing in making the
comparison.)
- .. versionchanged:: 5.0
-
- ``acheck_password()`` method was added.
-
.. method:: models.AbstractBaseUser.set_unusable_password()
Marks the user as having no password set. This isn't the same as
diff --git a/docs/topics/auth/default.txt b/docs/topics/auth/default.txt
index 1d2ea8132d..56f867ede5 100644
--- a/docs/topics/auth/default.txt
+++ b/docs/topics/auth/default.txt
@@ -155,10 +155,6 @@ Authenticating users
this. Rather if you're looking for a way to login a user, use the
:class:`~django.contrib.auth.views.LoginView`.
- .. versionchanged:: 5.0
-
- ``aauthenticate()`` function was added.
-
.. _topic-authorization:
Permissions and Authorization
@@ -401,10 +397,6 @@ Or in an asynchronous view::
# Do something for anonymous users.
...
-.. versionchanged:: 5.0
-
- The :meth:`.HttpRequest.auser` method was added.
-
.. _how-to-log-a-user-in:
How to log a user in
@@ -446,10 +438,6 @@ If you have an authenticated user you want to attach to the current session
# Return an 'invalid login' error message.
...
- .. versionchanged:: 5.0
-
- ``alogin()`` function was added.
-
Selecting the authentication backend
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@@ -505,10 +493,6 @@ How to log a user out
immediately after logging out, do that *after* calling
:func:`django.contrib.auth.logout()`.
- .. versionchanged:: 5.0
-
- ``alogout()`` function was added.
-
Limiting access to logged-in users
----------------------------------
@@ -1000,10 +984,6 @@ function.
else:
...
- .. versionchanged:: 5.0
-
- ``aupdate_session_auth_hash()`` function was added.
-
.. note::
Since
diff --git a/docs/topics/auth/passwords.txt b/docs/topics/auth/passwords.txt
index 54a5e069d0..4d5f845a57 100644
--- a/docs/topics/auth/passwords.txt
+++ b/docs/topics/auth/passwords.txt
@@ -493,10 +493,6 @@ from the ``User`` model.
to use the default (first entry of ``PASSWORD_HASHERS`` setting). See
:ref:`auth-included-hashers` for the algorithm name of each hasher.
- .. versionchanged:: 5.0
-
- ``acheck_password()`` method was added.
-
.. function:: make_password(password, salt=None, hasher='default')
Creates a hashed password in the format used by this application. It takes
diff --git a/docs/topics/db/models.txt b/docs/topics/db/models.txt
index 244e9bbb16..aefb35ed9c 100644
--- a/docs/topics/db/models.txt
+++ b/docs/topics/db/models.txt
@@ -219,10 +219,6 @@ ones:
Further examples are available in the :ref:`model field reference
`.
- .. versionchanged:: 5.0
-
- Support for mappings and callables was added.
-
:attr:`~Field.default`
The default value for the field. This can be a value or a callable
object. If callable it will be called every time a new object is
diff --git a/docs/topics/forms/index.txt b/docs/topics/forms/index.txt
index a4a56b2fe1..71d443f7d1 100644
--- a/docs/topics/forms/index.txt
+++ b/docs/topics/forms/index.txt
@@ -564,8 +564,6 @@ See :ref:`ref-forms-api-outputting-html` for more details.
Reusable field group templates
------------------------------
-.. versionadded:: 5.0
-
Each field is available as an attribute of the form, using
``{{ form.name_of_field }}`` in a template. A field has a
:meth:`~django.forms.BoundField.as_field_group` method which renders the
diff --git a/docs/topics/http/decorators.txt b/docs/topics/http/decorators.txt
index fa84e8d9b7..9cad144954 100644
--- a/docs/topics/http/decorators.txt
+++ b/docs/topics/http/decorators.txt
@@ -33,26 +33,14 @@ a :class:`django.http.HttpResponseNotAllowed` if the conditions are not met.
Note that request methods should be in uppercase.
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
.. function:: require_GET()
Decorator to require that a view only accepts the GET method.
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
.. function:: require_POST()
Decorator to require that a view only accepts the POST method.
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
.. function:: require_safe()
Decorator to require that a view only accepts the GET and HEAD methods.
@@ -67,10 +55,6 @@ a :class:`django.http.HttpResponseNotAllowed` if the conditions are not met.
such as link checkers, rely on HEAD requests, you might prefer
using ``require_safe`` instead of ``require_GET``.
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
Conditional view processing
===========================
@@ -87,10 +71,6 @@ control caching behavior on particular views.
headers; see
:doc:`conditional view processing `.
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
.. module:: django.views.decorators.gzip
GZip compression
@@ -105,10 +85,6 @@ compression on a per-view basis.
It sets the ``Vary`` header accordingly, so that caches will base their
storage on the ``Accept-Encoding`` header.
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
.. module:: django.views.decorators.vary
Vary headers
@@ -119,10 +95,6 @@ caching based on specific request headers.
.. function:: vary_on_cookie(func)
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
.. function:: vary_on_headers(*headers)
The ``Vary`` header defines which request headers a cache mechanism should take
@@ -130,10 +102,6 @@ caching based on specific request headers.
See :ref:`using vary headers `.
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
.. module:: django.views.decorators.cache
Caching
@@ -149,10 +117,6 @@ client-side caching.
:func:`~django.utils.cache.patch_cache_control` for the details of the
transformation.
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
.. function:: never_cache(view_func)
This decorator adds an ``Expires`` header to the current date/time.
@@ -163,10 +127,6 @@ client-side caching.
Each header is only added if it isn't already set.
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
-
.. module:: django.views.decorators.common
Common
@@ -180,6 +140,3 @@ customization of :class:`~django.middleware.common.CommonMiddleware` behavior.
This decorator allows individual views to be excluded from
:setting:`APPEND_SLASH` URL normalization.
- .. versionchanged:: 5.0
-
- Support for wrapping asynchronous view functions was added.
diff --git a/docs/topics/http/shortcuts.txt b/docs/topics/http/shortcuts.txt
index 3e4778f0f2..171cfc3c93 100644
--- a/docs/topics/http/shortcuts.txt
+++ b/docs/topics/http/shortcuts.txt
@@ -239,10 +239,6 @@ Note: As with ``get()``, a
:class:`~django.core.exceptions.MultipleObjectsReturned` exception
will be raised if more than one object is found.
-.. versionchanged:: 5.0
-
- ``aget_object_or_404()`` function was added.
-
``get_list_or_404()``
=====================
@@ -291,6 +287,3 @@ This example is equivalent to::
if not my_objects:
raise Http404("No MyModel matches the given query.")
-.. versionchanged:: 5.0
-
- ``aget_list_or_404()`` function was added.
diff --git a/docs/topics/i18n/timezones.txt b/docs/topics/i18n/timezones.txt
index 594c1688a5..c11bd03b09 100644
--- a/docs/topics/i18n/timezones.txt
+++ b/docs/topics/i18n/timezones.txt
@@ -27,10 +27,6 @@ interacting with end users.
Time zone support is enabled by default. To disable it, set :setting:`USE_TZ =
False ` in your settings file.
-.. versionchanged:: 5.0
-
- In older version, time zone support was disabled by default.
-
Time zone support uses :mod:`zoneinfo`, which is part of the Python standard
library from Python 3.9.
diff --git a/docs/topics/migrations.txt b/docs/topics/migrations.txt
index ef8fc577f5..f9748f0d9d 100644
--- a/docs/topics/migrations.txt
+++ b/docs/topics/migrations.txt
@@ -796,11 +796,6 @@ Django can serialize the following:
- Any class reference (must be in module's top-level scope)
- Anything with a custom ``deconstruct()`` method (:ref:`see below `)
-.. versionchanged:: 5.0
-
- Serialization support for functions decorated with :func:`functools.cache`
- or :func:`functools.lru_cache` was added.
-
Django cannot serialize:
- Nested classes
diff --git a/docs/topics/signals.txt b/docs/topics/signals.txt
index ea6989ed90..339626c799 100644
--- a/docs/topics/signals.txt
+++ b/docs/topics/signals.txt
@@ -107,10 +107,6 @@ Signals can be sent either synchronously or asynchronously, and receivers will
automatically be adapted to the correct call-style. See :ref:`sending signals
` for more information.
-.. versionchanged:: 5.0
-
- Support for asynchronous receivers was added.
-
.. _connecting-receiver-functions:
Connecting receiver functions
@@ -330,10 +326,6 @@ receiver. In addition, async receivers are executed concurrently using
All built-in signals, except those in the async request-response cycle, are
dispatched using :meth:`Signal.send`.
-.. versionchanged:: 5.0
-
- Support for asynchronous signals was added.
-
Disconnecting signals
=====================
diff --git a/docs/topics/testing/advanced.txt b/docs/topics/testing/advanced.txt
index d889bd02ee..6b03f0f82b 100644
--- a/docs/topics/testing/advanced.txt
+++ b/docs/topics/testing/advanced.txt
@@ -628,10 +628,6 @@ and tear down the test suite.
custom arguments by calling ``parser.add_argument()`` inside the method, so
that the :djadmin:`test` command will be able to use those arguments.
- .. versionadded:: 5.0
-
- The ``durations`` argument was added.
-
Attributes
~~~~~~~~~~
diff --git a/docs/topics/testing/tools.txt b/docs/topics/testing/tools.txt
index 5ec41920e0..363505a0fc 100644
--- a/docs/topics/testing/tools.txt
+++ b/docs/topics/testing/tools.txt
@@ -497,10 +497,6 @@ Use the ``django.test.Client`` class to make requests.
:meth:`~django.contrib.auth.models.UserManager.create_user` helper
method to create a new user with a correctly hashed password.
- .. versionchanged:: 5.0
-
- ``alogin()`` method was added.
-
.. method:: Client.force_login(user, backend=None)
.. method:: Client.aforce_login(user, backend=None)
@@ -528,10 +524,6 @@ Use the ``django.test.Client`` class to make requests.
``login()`` by :ref:`using a weaker hasher while testing
`.
- .. versionchanged:: 5.0
-
- ``aforce_login()`` method was added.
-
.. method:: Client.logout()
.. method:: Client.alogout()
@@ -545,10 +537,6 @@ Use the ``django.test.Client`` class to make requests.
and session data cleared to defaults. Subsequent requests will appear
to come from an :class:`~django.contrib.auth.models.AnonymousUser`.
- .. versionchanged:: 5.0
-
- ``alogout()`` method was added.
-
Testing responses
-----------------
@@ -735,8 +723,6 @@ access these properties as part of a test condition.
.. method:: Client.asession()
- .. versionadded:: 5.0
-
This is similar to the :attr:`session` attribute but it works in async
contexts.
@@ -2062,10 +2048,6 @@ test client, with the following exceptions:
>>> c = AsyncClient()
>>> c.get("/customers/details/", {"name": "fred", "age": 7}, ACCEPT="application/json")
-.. versionchanged:: 5.0
-
- Support for the ``follow`` parameter was added to the ``AsyncClient``.
-
.. versionchanged:: 5.1
The ``query_params`` argument was added.
From 3a748cd0f53b718625d82262a70b2dabafd0185e Mon Sep 17 00:00:00 2001
From: Natalia <124304+nessita@users.noreply.github.com>
Date: Fri, 3 May 2024 15:07:31 -0300
Subject: [PATCH 274/316] Advanced deprecation warnings for Django 5.2.
---
django/utils/deprecation.py | 7 ++++---
docs/internals/deprecation.txt | 8 ++++++++
tests/runtests.py | 6 +++++-
3 files changed, 17 insertions(+), 4 deletions(-)
diff --git a/django/utils/deprecation.py b/django/utils/deprecation.py
index 4d136dfa16..9d3c628f66 100644
--- a/django/utils/deprecation.py
+++ b/django/utils/deprecation.py
@@ -4,15 +4,16 @@ import warnings
from asgiref.sync import iscoroutinefunction, markcoroutinefunction, sync_to_async
-class RemovedInNextVersionWarning(DeprecationWarning):
+class RemovedInDjango60Warning(DeprecationWarning):
pass
-class RemovedInDjango60Warning(PendingDeprecationWarning):
+class RemovedInDjango61Warning(PendingDeprecationWarning):
pass
-RemovedAfterNextVersionWarning = RemovedInDjango60Warning
+RemovedInNextVersionWarning = RemovedInDjango60Warning
+RemovedAfterNextVersionWarning = RemovedInDjango61Warning
class warn_about_renamed_method:
diff --git a/docs/internals/deprecation.txt b/docs/internals/deprecation.txt
index 1a74a2a46b..4b14b404fc 100644
--- a/docs/internals/deprecation.txt
+++ b/docs/internals/deprecation.txt
@@ -7,6 +7,14 @@ in a backward incompatible way, following their deprecation, as per the
:ref:`deprecation policy `. More details
about each item can often be found in the release notes of two versions prior.
+.. _deprecation-removed-in-6.1:
+
+6.1
+---
+
+See the :ref:`Django 5.2 release notes ` for more
+details on these changes.
+
.. _deprecation-removed-in-6.0:
6.0
diff --git a/tests/runtests.py b/tests/runtests.py
index 1e3d15591f..c5bb637d33 100755
--- a/tests/runtests.py
+++ b/tests/runtests.py
@@ -28,7 +28,10 @@ else:
from django.test.runner import get_max_test_processes, parallel_type
from django.test.selenium import SeleniumTestCase, SeleniumTestCaseBase
from django.test.utils import NullTimeKeeper, TimeKeeper, get_runner
- from django.utils.deprecation import RemovedInDjango60Warning
+ from django.utils.deprecation import (
+ RemovedInDjango60Warning,
+ RemovedInDjango61Warning,
+ )
from django.utils.log import DEFAULT_LOGGING
from django.utils.version import PY312, PYPY
@@ -42,6 +45,7 @@ else:
# Make deprecation warnings errors to ensure no usage of deprecated features.
warnings.simplefilter("error", RemovedInDjango60Warning)
+warnings.simplefilter("error", RemovedInDjango61Warning)
# Make resource and runtime warning errors to ensure no usage of error prone
# patterns.
warnings.simplefilter("error", ResourceWarning)
From 04a208d7f19f393ad92ba7cef31842318be2d38a Mon Sep 17 00:00:00 2001
From: Natalia <124304+nessita@users.noreply.github.com>
Date: Fri, 3 May 2024 16:04:07 -0300
Subject: [PATCH 275/316] Increased the default PBKDF2 iterations for Django
5.2.
---
django/contrib/auth/hashers.py | 2 +-
docs/releases/5.2.txt | 3 ++-
tests/auth_tests/test_hashers.py | 9 +++++----
3 files changed, 8 insertions(+), 6 deletions(-)
diff --git a/django/contrib/auth/hashers.py b/django/contrib/auth/hashers.py
index b539747561..a2ef1dae11 100644
--- a/django/contrib/auth/hashers.py
+++ b/django/contrib/auth/hashers.py
@@ -312,7 +312,7 @@ class PBKDF2PasswordHasher(BasePasswordHasher):
"""
algorithm = "pbkdf2_sha256"
- iterations = 870000
+ iterations = 1_000_000
digest = hashlib.sha256
def encode(self, password, salt, iterations=None):
diff --git a/docs/releases/5.2.txt b/docs/releases/5.2.txt
index 5c285e8f39..9d28415df1 100644
--- a/docs/releases/5.2.txt
+++ b/docs/releases/5.2.txt
@@ -47,7 +47,8 @@ Minor features
:mod:`django.contrib.auth`
~~~~~~~~~~~~~~~~~~~~~~~~~~
-* ...
+* The default iteration count for the PBKDF2 password hasher is increased from
+ 870,000 to 1,000,000.
:mod:`django.contrib.contenttypes`
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
diff --git a/tests/auth_tests/test_hashers.py b/tests/auth_tests/test_hashers.py
index bec298cc3a..09d7056411 100644
--- a/tests/auth_tests/test_hashers.py
+++ b/tests/auth_tests/test_hashers.py
@@ -83,7 +83,8 @@ class TestUtilsHashPass(SimpleTestCase):
encoded = make_password("lètmein", "seasalt", "pbkdf2_sha256")
self.assertEqual(
encoded,
- "pbkdf2_sha256$870000$seasalt$wJSpLMQRQz0Dhj/pFpbyjMj71B2gUYp6HJS5AU+32Ac=",
+ "pbkdf2_sha256$1000000$"
+ "seasalt$r1uLUxoxpP2Ued/qxvmje7UH9PUJBkRrvf9gGPL7Cps=",
)
self.assertTrue(is_password_usable(encoded))
self.assertTrue(check_password("lètmein", encoded))
@@ -276,8 +277,8 @@ class TestUtilsHashPass(SimpleTestCase):
encoded = hasher.encode("lètmein", "seasalt2")
self.assertEqual(
encoded,
- "pbkdf2_sha256$870000$"
- "seasalt2$nxgnNHRsZWSmi4hRSKq2MRigfaRmjDhH1NH4g2sQRbU=",
+ "pbkdf2_sha256$1000000$"
+ "seasalt2$egbhFghgsJVDo5Tpg/k9ZnfbySKQ1UQnBYXhR97a7sk=",
)
self.assertTrue(hasher.verify("lètmein", encoded))
@@ -285,7 +286,7 @@ class TestUtilsHashPass(SimpleTestCase):
hasher = PBKDF2SHA1PasswordHasher()
encoded = hasher.encode("lètmein", "seasalt2")
self.assertEqual(
- encoded, "pbkdf2_sha1$870000$seasalt2$iFPKnrkYfxxyxaeIqxq+c3nJ/j4="
+ encoded, "pbkdf2_sha1$1000000$seasalt2$3R9hvSAiAy5ARspAFy5GJ/2rjXo="
)
self.assertTrue(hasher.verify("lètmein", encoded))
From f619d31fa5bae0731634c468cae8f066aedf3197 Mon Sep 17 00:00:00 2001
From: Natalia <124304+nessita@users.noreply.github.com>
Date: Wed, 22 May 2024 11:57:28 -0300
Subject: [PATCH 276/316] Updated source translation catalogs.
Forwardport of 3af9c11b3b12729be26ef9da9cc32276a032d3cd from stable/5.1.x.
---
django/conf/locale/en/LC_MESSAGES/django.po | 24 +++++---
.../admin/locale/en/LC_MESSAGES/django.po | 25 +++++++--
.../admin/locale/en/LC_MESSAGES/djangojs.po | 11 +---
.../auth/locale/en/LC_MESSAGES/django.po | 56 ++++++++++++++++---
4 files changed, 85 insertions(+), 31 deletions(-)
diff --git a/django/conf/locale/en/LC_MESSAGES/django.po b/django/conf/locale/en/LC_MESSAGES/django.po
index cb9e747144..b47726e67a 100644
--- a/django/conf/locale/en/LC_MESSAGES/django.po
+++ b/django/conf/locale/en/LC_MESSAGES/django.po
@@ -4,7 +4,7 @@ msgid ""
msgstr ""
"Project-Id-Version: Django\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2023-09-18 11:41-0300\n"
+"POT-Creation-Date: 2024-05-22 11:46-0300\n"
"PO-Revision-Date: 2010-05-13 15:35+0200\n"
"Last-Translator: Django team\n"
"Language-Team: English \n"
@@ -448,6 +448,10 @@ msgstr ""
msgid "Enter a valid value."
msgstr ""
+#: core/validators.py:70
+msgid "Enter a valid domain name."
+msgstr ""
+
#: core/validators.py:104 forms/fields.py:759
msgid "Enter a valid URL."
msgstr ""
@@ -472,16 +476,22 @@ msgid ""
"hyphens."
msgstr ""
-#: core/validators.py:279 core/validators.py:306
-msgid "Enter a valid IPv4 address."
+#: core/validators.py:327 core/validators.py:336 core/validators.py:350
+#: db/models/fields/__init__.py:2219
+#, python-format
+msgid "Enter a valid %(protocol)s address."
msgstr ""
-#: core/validators.py:286 core/validators.py:307
-msgid "Enter a valid IPv6 address."
+#: core/validators.py:329
+msgid "IPv4"
msgstr ""
-#: core/validators.py:298 core/validators.py:305
-msgid "Enter a valid IPv4 or IPv6 address."
+#: core/validators.py:338 utils/ipv6.py:30
+msgid "IPv6"
+msgstr ""
+
+#: core/validators.py:352
+msgid "IPv4 or IPv6"
msgstr ""
#: core/validators.py:341
diff --git a/django/contrib/admin/locale/en/LC_MESSAGES/django.po b/django/contrib/admin/locale/en/LC_MESSAGES/django.po
index d771ecbcad..c216532a03 100644
--- a/django/contrib/admin/locale/en/LC_MESSAGES/django.po
+++ b/django/contrib/admin/locale/en/LC_MESSAGES/django.po
@@ -4,7 +4,7 @@ msgid ""
msgstr ""
"Project-Id-Version: Django\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2023-09-18 11:41-0300\n"
+"POT-Creation-Date: 2024-05-22 11:46-0300\n"
"PO-Revision-Date: 2010-05-13 15:35+0200\n"
"Last-Translator: Django team\n"
"Language-Team: English \n"
@@ -247,11 +247,6 @@ msgid ""
"The {name} “{obj}” was changed successfully. You may edit it again below."
msgstr ""
-#: contrib/admin/options.py:1497
-#, python-brace-format
-msgid "The {name} “{obj}” was added successfully. You may edit it again below."
-msgstr ""
-
#: contrib/admin/options.py:1516
#, python-brace-format
msgid ""
@@ -475,6 +470,10 @@ msgstr ""
msgid "Change password"
msgstr ""
+#: contrib/admin/templates/admin/auth/user/change_password.html:18
+msgid "Set password"
+msgstr ""
+
#: contrib/admin/templates/admin/auth/user/change_password.html:25
#: contrib/admin/templates/admin/change_form.html:43
#: contrib/admin/templates/admin/change_list.html:52
@@ -490,6 +489,20 @@ msgstr[1] ""
msgid "Enter a new password for the user %(username)s ."
msgstr ""
+#: contrib/admin/templates/admin/auth/user/change_password.html:35
+msgid ""
+"This action will enable password-based authentication for "
+"this user."
+msgstr ""
+
+#: contrib/admin/templates/admin/auth/user/change_password.html:71
+msgid "Disable password-based authentication"
+msgstr ""
+
+#: contrib/admin/templates/admin/auth/user/change_password.html:73
+msgid "Enable password-based authentication"
+msgstr ""
+
#: contrib/admin/templates/admin/base.html:28
msgid "Skip to main content"
msgstr ""
diff --git a/django/contrib/admin/locale/en/LC_MESSAGES/djangojs.po b/django/contrib/admin/locale/en/LC_MESSAGES/djangojs.po
index b0b92fb140..443c0b9558 100644
--- a/django/contrib/admin/locale/en/LC_MESSAGES/djangojs.po
+++ b/django/contrib/admin/locale/en/LC_MESSAGES/djangojs.po
@@ -4,7 +4,7 @@ msgid ""
msgstr ""
"Project-Id-Version: Django\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2023-09-18 15:04-0300\n"
+"POT-Creation-Date: 2024-05-22 11:46-0300\n"
"PO-Revision-Date: 2010-05-13 15:35+0200\n"
"Last-Translator: Django team\n"
"Language-Team: English \n"
@@ -381,12 +381,3 @@ msgstr ""
msgctxt "one letter Saturday"
msgid "S"
msgstr ""
-
-#: contrib/admin/static/admin/js/collapse.js:16
-#: contrib/admin/static/admin/js/collapse.js:34
-msgid "Show"
-msgstr ""
-
-#: contrib/admin/static/admin/js/collapse.js:30
-msgid "Hide"
-msgstr ""
diff --git a/django/contrib/auth/locale/en/LC_MESSAGES/django.po b/django/contrib/auth/locale/en/LC_MESSAGES/django.po
index 8b15915f9f..42929e9653 100644
--- a/django/contrib/auth/locale/en/LC_MESSAGES/django.po
+++ b/django/contrib/auth/locale/en/LC_MESSAGES/django.po
@@ -4,7 +4,7 @@ msgid ""
msgstr ""
"Project-Id-Version: Django\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2023-03-17 03:19-0500\n"
+"POT-Creation-Date: 2024-05-22 11:46-0300\n"
"PO-Revision-Date: 2010-05-13 15:35+0200\n"
"Last-Translator: Django team\n"
"Language-Team: English \n"
@@ -31,15 +31,28 @@ msgstr ""
msgid "%(name)s object with primary key %(key)r does not exist."
msgstr ""
+#: contrib/auth/admin.py:177
+msgid "Conflicting form data submitted. Please try again."
+msgstr ""
+
#: contrib/auth/admin.py:168
msgid "Password changed successfully."
msgstr ""
+#: contrib/auth/admin.py:187
+msgid "Password-based authentication was disabled."
+msgstr ""
+
#: contrib/auth/admin.py:189
#, python-format
msgid "Change password: %s"
msgstr ""
+#: contrib/auth/admin.py:210
+#, python-format
+msgid "Set password: %s"
+msgstr ""
+
#: contrib/auth/apps.py:16
msgid "Authentication and Authorization"
msgstr ""
@@ -60,10 +73,25 @@ msgstr ""
msgid "Invalid password format or unknown hashing algorithm."
msgstr ""
+#: contrib/auth/forms.py:59
+msgid "Reset password"
+msgstr ""
+
+#: contrib/auth/forms.py:59
+msgid "Set password"
+msgstr ""
+
#: contrib/auth/forms.py:91 contrib/auth/forms.py:379 contrib/auth/forms.py:457
msgid "The two password fields didn’t match."
msgstr ""
+#: contrib/auth/forms.py:107
+msgid ""
+"Whether the user will be able to authenticate using a password or not. If "
+"disabled, they may still be able to authenticate using other backends, such "
+"as Single Sign-On or LDAP."
+msgstr ""
+
#: contrib/auth/forms.py:94 contrib/auth/forms.py:166 contrib/auth/forms.py:201
#: contrib/auth/forms.py:461
msgid "Password"
@@ -77,10 +105,26 @@ msgstr ""
msgid "Enter the same password as before, for verification."
msgstr ""
-#: contrib/auth/forms.py:168
+#: contrib/auth/forms.py:133
+msgid "Password-based authentication"
+msgstr ""
+
+#: contrib/auth/forms.py:136
+msgid "Enabled"
+msgstr ""
+
+#: contrib/auth/forms.py:136
+msgid "Disabled"
+msgstr ""
+
+#: contrib/auth/forms.py:260
msgid ""
-"Raw passwords are not stored, so there is no way to see this user’s "
-"password, but you can change the password using this form ."
+"Raw passwords are not stored, so there is no way to see the user’s password."
+msgstr ""
+
+#: contrib/auth/forms.py:276
+msgid ""
+"Enable password-based authentication for this user by setting a password."
msgstr ""
#: contrib/auth/forms.py:208
@@ -114,10 +158,6 @@ msgstr ""
msgid "Old password"
msgstr ""
-#: contrib/auth/forms.py:469
-msgid "Password (again)"
-msgstr ""
-
#: contrib/auth/hashers.py:327 contrib/auth/hashers.py:420
#: contrib/auth/hashers.py:510 contrib/auth/hashers.py:605
#: contrib/auth/hashers.py:665 contrib/auth/hashers.py:707
From 7e39ae5c8cf4c6601a4f47b72914349481c5331b Mon Sep 17 00:00:00 2001
From: Sarah Boyce <42296566+sarahboyce@users.noreply.github.com>
Date: Wed, 22 May 2024 19:29:05 +0200
Subject: [PATCH 277/316] Fixed #35472 -- Used temporary directory in
test_imagefield.NoReadTests.
---
tests/model_fields/models.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tests/model_fields/models.py b/tests/model_fields/models.py
index 18a6fdbc1c..652c808b40 100644
--- a/tests/model_fields/models.py
+++ b/tests/model_fields/models.py
@@ -383,7 +383,7 @@ if Image:
mugshot = models.ImageField(
upload_to="tests",
- storage=NoReadFileSystemStorage(),
+ storage=NoReadFileSystemStorage(temp_storage_dir),
width_field="mugshot_width",
height_field="mugshot_height",
)
From 99273fd525129a973639044dfb12cfd732d8f1d6 Mon Sep 17 00:00:00 2001
From: Adam Zapletal
Date: Tue, 19 Mar 2024 21:19:31 -0500
Subject: [PATCH 278/316] Fixed #24076 -- Added warnings on usage of dates with
DateTimeField and datetimes with DateField.
---
docs/ref/models/fields.txt | 19 +++++++++++++++++++
1 file changed, 19 insertions(+)
diff --git a/docs/ref/models/fields.txt b/docs/ref/models/fields.txt
index fa19f58c54..e8b1cf8cba 100644
--- a/docs/ref/models/fields.txt
+++ b/docs/ref/models/fields.txt
@@ -798,6 +798,15 @@ Any combination of these options will result in an error.
instead of a ``DateField`` and deciding how to handle the conversion from
datetime to date at display time.
+.. warning:: Always use :class:`DateField` with a ``datetime.date`` instance.
+
+ If you have a ``datetime.datetime`` instance, it's recommended to convert
+ it to a ``datetime.date`` first. If you don't, :class:`DateField` will
+ localize the ``datetime.datetime`` to the :ref:`default timezone
+ ` and convert it to a ``datetime.date``
+ instance, removing its time component. This is true for both storage and
+ comparison.
+
``DateTimeField``
-----------------
@@ -810,6 +819,16 @@ The default form widget for this field is a single
:class:`~django.forms.DateTimeInput`. The admin uses two separate
:class:`~django.forms.TextInput` widgets with JavaScript shortcuts.
+.. warning:: Always use :class:`DateTimeField` with a ``datetime.datetime``
+ instance.
+
+ If you have a ``datetime.date`` instance, it's recommended to convert it to
+ a ``datetime.datetime`` first. If you don't, :class:`DateTimeField` will
+ use midnight in the :ref:`default timezone ` for
+ the time component. This is true for both storage and comparison. To
+ compare the date portion of a :class:`DateTimeField` with a
+ ``datetime.date`` instance, use the :lookup:`date` lookup.
+
``DecimalField``
----------------
From 718ed69751c9b3923ffa99ce000e733c8350d0a6 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=E3=81=84=E3=80=82?=
<99417239+koupro0204@users.noreply.github.com>
Date: Tue, 7 May 2024 14:30:17 +0900
Subject: [PATCH 279/316] Fixed #35430 -- Corrected docs on timezone conversion
in templates.
---
docs/topics/i18n/timezones.txt | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/docs/topics/i18n/timezones.txt b/docs/topics/i18n/timezones.txt
index c11bd03b09..0d866dac6c 100644
--- a/docs/topics/i18n/timezones.txt
+++ b/docs/topics/i18n/timezones.txt
@@ -9,7 +9,10 @@ Overview
When support for time zones is enabled, Django stores datetime information in
UTC in the database, uses time-zone-aware datetime objects internally, and
-translates them to the end user's time zone in templates and forms.
+converts them to the end user's time zone in forms. Templates will use the
+:ref:`default time zone `, but this can be updated
+to the end user's time zone through the use of :ref:`filters and tags
+`.
This is handy if your users live in more than one time zone and you want to
display datetime information according to each user's wall clock.
From 94ab56ee2e24d4764296580da66dbbdc9ba03b02 Mon Sep 17 00:00:00 2001
From: Peter Bittner
Date: Tue, 14 May 2024 13:48:54 +0200
Subject: [PATCH 280/316] Updated the --traceback option help text.
---
django/core/management/base.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/django/core/management/base.py b/django/core/management/base.py
index 4c47e1c6e5..41b17a24c8 100644
--- a/django/core/management/base.py
+++ b/django/core/management/base.py
@@ -345,7 +345,7 @@ class BaseCommand:
parser,
"--traceback",
action="store_true",
- help="Raise on CommandError exceptions.",
+ help="Display a full stack trace on CommandError exceptions.",
)
self.add_base_argument(
parser,
From bcbc4b9b8a4a47c8e045b060a9860a5c038192de Mon Sep 17 00:00:00 2001
From: Tim Graham
Date: Thu, 23 May 2024 09:11:58 -0400
Subject: [PATCH 281/316] Fixed typo in migrations test name.
---
tests/migrations/test_operations.py | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/tests/migrations/test_operations.py b/tests/migrations/test_operations.py
index d59548f7af..1caa647956 100644
--- a/tests/migrations/test_operations.py
+++ b/tests/migrations/test_operations.py
@@ -1380,8 +1380,8 @@ class OperationTests(OperationTestBase):
self.assertEqual(sorted(definition[2]), ["field", "model_name", "name"])
@skipUnlessDBFeature("supports_stored_generated_columns")
- def test_add_generate_field(self):
- app_label = "test_add_generate_field"
+ def test_add_generated_field(self):
+ app_label = "test_add_generated_field"
project_state = self.apply_operations(
app_label,
ProjectState(),
From b049bec7cfe9b5854584d240addb44fa1e9375a5 Mon Sep 17 00:00:00 2001
From: Mariusz Felisiak
Date: Fri, 24 May 2024 21:23:50 +0200
Subject: [PATCH 282/316] Fixed #35479 -- Dropped support for PostgreSQL 13 and
PostGIS 3.0.
---
.github/workflows/schedule_tests.yml | 4 +--
.github/workflows/selenium.yml | 2 +-
.../gis/db/backends/postgis/operations.py | 2 +-
django/contrib/postgres/constraints.py | 14 +---------
django/contrib/postgres/indexes.py | 8 ------
django/db/backends/postgresql/features.py | 8 +-----
docs/ref/contrib/gis/install/geolibs.txt | 3 +--
docs/ref/contrib/gis/install/index.txt | 8 +++---
docs/ref/contrib/postgres/functions.txt | 6 -----
docs/ref/databases.txt | 2 +-
docs/releases/5.2.txt | 11 ++++++++
tests/backends/postgresql/tests.py | 8 +++---
tests/postgres_tests/test_aggregates.py | 12 +++------
tests/postgres_tests/test_constraints.py | 27 +------------------
tests/postgres_tests/test_indexes.py | 20 +-------------
15 files changed, 32 insertions(+), 103 deletions(-)
diff --git a/.github/workflows/schedule_tests.yml b/.github/workflows/schedule_tests.yml
index c4523af4a0..8b1f01ad86 100644
--- a/.github/workflows/schedule_tests.yml
+++ b/.github/workflows/schedule_tests.yml
@@ -90,7 +90,7 @@ jobs:
continue-on-error: true
services:
postgres:
- image: postgres:13-alpine
+ image: postgres:14-alpine
env:
POSTGRES_DB: django
POSTGRES_USER: user
@@ -163,7 +163,7 @@ jobs:
name: Selenium tests, PostgreSQL
services:
postgres:
- image: postgres:13-alpine
+ image: postgres:14-alpine
env:
POSTGRES_DB: django
POSTGRES_USER: user
diff --git a/.github/workflows/selenium.yml b/.github/workflows/selenium.yml
index fa916a0ded..7e46e0cfb1 100644
--- a/.github/workflows/selenium.yml
+++ b/.github/workflows/selenium.yml
@@ -43,7 +43,7 @@ jobs:
name: PostgreSQL
services:
postgres:
- image: postgres:13-alpine
+ image: postgres:14-alpine
env:
POSTGRES_DB: django
POSTGRES_USER: user
diff --git a/django/contrib/gis/db/backends/postgis/operations.py b/django/contrib/gis/db/backends/postgis/operations.py
index 17d7b3213d..7a347c5287 100644
--- a/django/contrib/gis/db/backends/postgis/operations.py
+++ b/django/contrib/gis/db/backends/postgis/operations.py
@@ -203,7 +203,7 @@ class PostGISOperations(BaseSpatialOperations, DatabaseOperations):
raise ImproperlyConfigured(
'Cannot determine PostGIS version for database "%s" '
'using command "SELECT postgis_lib_version()". '
- "GeoDjango requires at least PostGIS version 3.0. "
+ "GeoDjango requires at least PostGIS version 3.1. "
"Was the database created from a spatial database "
"template?" % self.connection.settings_dict["NAME"]
)
diff --git a/django/contrib/postgres/constraints.py b/django/contrib/postgres/constraints.py
index a31f657183..a6351dc008 100644
--- a/django/contrib/postgres/constraints.py
+++ b/django/contrib/postgres/constraints.py
@@ -1,7 +1,7 @@
from types import NoneType
from django.core.exceptions import ValidationError
-from django.db import DEFAULT_DB_ALIAS, NotSupportedError
+from django.db import DEFAULT_DB_ALIAS
from django.db.backends.ddl_references import Expressions, Statement, Table
from django.db.models import BaseConstraint, Deferrable, F, Q
from django.db.models.expressions import Exists, ExpressionList
@@ -114,7 +114,6 @@ class ExclusionConstraint(BaseConstraint):
)
def create_sql(self, model, schema_editor):
- self.check_supported(schema_editor)
return Statement(
"ALTER TABLE %(table)s ADD %(constraint)s",
table=Table(model._meta.db_table, schema_editor.quote_name),
@@ -128,17 +127,6 @@ class ExclusionConstraint(BaseConstraint):
schema_editor.quote_name(self.name),
)
- def check_supported(self, schema_editor):
- if (
- self.include
- and self.index_type.lower() == "spgist"
- and not schema_editor.connection.features.supports_covering_spgist_indexes
- ):
- raise NotSupportedError(
- "Covering exclusion constraints using an SP-GiST index "
- "require PostgreSQL 14+."
- )
-
def deconstruct(self):
path, args, kwargs = super().deconstruct()
kwargs["expressions"] = self.expressions
diff --git a/django/contrib/postgres/indexes.py b/django/contrib/postgres/indexes.py
index 05fdbeed5e..ce9e2cee14 100644
--- a/django/contrib/postgres/indexes.py
+++ b/django/contrib/postgres/indexes.py
@@ -1,4 +1,3 @@
-from django.db import NotSupportedError
from django.db.models import Func, Index
from django.utils.functional import cached_property
@@ -234,13 +233,6 @@ class SpGistIndex(PostgresIndex):
with_params.append("fillfactor = %d" % self.fillfactor)
return with_params
- def check_supported(self, schema_editor):
- if (
- self.include
- and not schema_editor.connection.features.supports_covering_spgist_indexes
- ):
- raise NotSupportedError("Covering SP-GiST indexes require PostgreSQL 14+.")
-
class OpClass(Func):
template = "%(expressions)s %(name)s"
diff --git a/django/db/backends/postgresql/features.py b/django/db/backends/postgresql/features.py
index ef697e85b0..6170b5501a 100644
--- a/django/db/backends/postgresql/features.py
+++ b/django/db/backends/postgresql/features.py
@@ -7,7 +7,7 @@ from django.utils.functional import cached_property
class DatabaseFeatures(BaseDatabaseFeatures):
- minimum_database_version = (13,)
+ minimum_database_version = (14,)
allows_group_by_selected_pks = True
can_return_columns_from_insert = True
can_return_rows_from_bulk_insert = True
@@ -152,10 +152,6 @@ class DatabaseFeatures(BaseDatabaseFeatures):
"PositiveSmallIntegerField": "SmallIntegerField",
}
- @cached_property
- def is_postgresql_14(self):
- return self.connection.pg_version >= 140000
-
@cached_property
def is_postgresql_15(self):
return self.connection.pg_version >= 150000
@@ -164,8 +160,6 @@ class DatabaseFeatures(BaseDatabaseFeatures):
def is_postgresql_16(self):
return self.connection.pg_version >= 160000
- has_bit_xor = property(operator.attrgetter("is_postgresql_14"))
- supports_covering_spgist_indexes = property(operator.attrgetter("is_postgresql_14"))
supports_unlimited_charfield = True
supports_nulls_distinct_unique_constraints = property(
operator.attrgetter("is_postgresql_15")
diff --git a/docs/ref/contrib/gis/install/geolibs.txt b/docs/ref/contrib/gis/install/geolibs.txt
index 041409d53c..a0a66c0dc6 100644
--- a/docs/ref/contrib/gis/install/geolibs.txt
+++ b/docs/ref/contrib/gis/install/geolibs.txt
@@ -12,7 +12,7 @@ Program Description Required
`PROJ`_ Cartographic Projections library Yes (PostgreSQL and SQLite only) 9.x, 8.x, 7.x, 6.x
:doc:`GDAL <../gdal>` Geospatial Data Abstraction Library Yes 3.8, 3.7, 3.6, 3.5, 3.4, 3.3, 3.2, 3.1, 3.0
:doc:`GeoIP <../geoip2>` IP-based geolocation library No 2
-`PostGIS`__ Spatial extensions for PostgreSQL Yes (PostgreSQL only) 3.4, 3.3, 3.2, 3.1, 3.0
+`PostGIS`__ Spatial extensions for PostgreSQL Yes (PostgreSQL only) 3.4, 3.3, 3.2, 3.1
`SpatiaLite`__ Spatial extensions for SQLite Yes (SQLite only) 5.1, 5.0, 4.3
======================== ==================================== ================================ ===========================================
@@ -35,7 +35,6 @@ totally fine with GeoDjango. Your mileage may vary.
GDAL 3.6.0 2022-11-03
GDAL 3.7.0 2023-05-10
GDAL 3.8.0 2023-11-13
- PostGIS 3.0.0 2019-10-20
PostGIS 3.1.0 2020-12-18
PostGIS 3.2.0 2021-12-18
PostGIS 3.3.0 2022-08-27
diff --git a/docs/ref/contrib/gis/install/index.txt b/docs/ref/contrib/gis/install/index.txt
index 7706790b2a..e7bc885d4b 100644
--- a/docs/ref/contrib/gis/install/index.txt
+++ b/docs/ref/contrib/gis/install/index.txt
@@ -56,7 +56,7 @@ supported versions, and any notes for each of the supported database backends:
================== ============================== ================== =========================================
Database Library Requirements Supported Versions Notes
================== ============================== ================== =========================================
-PostgreSQL GEOS, GDAL, PROJ, PostGIS 13+ Requires PostGIS.
+PostgreSQL GEOS, GDAL, PROJ, PostGIS 14+ Requires PostGIS.
MySQL GEOS, GDAL 8.0.11+ :ref:`Limited functionality `.
Oracle GEOS, GDAL 19+ XE not supported.
SQLite GEOS, GDAL, PROJ, SpatiaLite 3.31.0+ Requires SpatiaLite 4.3+
@@ -300,7 +300,7 @@ Summary:
.. code-block:: shell
- $ sudo port install postgresql13-server
+ $ sudo port install postgresql14-server
$ sudo port install geos
$ sudo port install proj6
$ sudo port install postgis3
@@ -314,14 +314,14 @@ Summary:
.. code-block:: shell
- export PATH=/opt/local/bin:/opt/local/lib/postgresql13/bin
+ export PATH=/opt/local/bin:/opt/local/lib/postgresql14/bin
In addition, add the ``DYLD_FALLBACK_LIBRARY_PATH`` setting so that
the libraries can be found by Python:
.. code-block:: shell
- export DYLD_FALLBACK_LIBRARY_PATH=/opt/local/lib:/opt/local/lib/postgresql13
+ export DYLD_FALLBACK_LIBRARY_PATH=/opt/local/lib:/opt/local/lib/postgresql14
__ https://www.macports.org/
diff --git a/docs/ref/contrib/postgres/functions.txt b/docs/ref/contrib/postgres/functions.txt
index f5d9cdd873..4602f7fd9d 100644
--- a/docs/ref/contrib/postgres/functions.txt
+++ b/docs/ref/contrib/postgres/functions.txt
@@ -14,12 +14,6 @@ All of these functions are available from the
Returns a version 4 UUID.
-On PostgreSQL < 13, the `pgcrypto extension`_ must be installed. You can use
-the :class:`~django.contrib.postgres.operations.CryptoExtension` migration
-operation to install it.
-
-.. _pgcrypto extension: https://www.postgresql.org/docs/current/pgcrypto.html
-
Usage example:
.. code-block:: pycon
diff --git a/docs/ref/databases.txt b/docs/ref/databases.txt
index c8e9f2ebff..3e50d2e46a 100644
--- a/docs/ref/databases.txt
+++ b/docs/ref/databases.txt
@@ -115,7 +115,7 @@ below for information on how to set up your database correctly.
PostgreSQL notes
================
-Django supports PostgreSQL 13 and higher. `psycopg`_ 3.1.8+ or `psycopg2`_
+Django supports PostgreSQL 14 and higher. `psycopg`_ 3.1.8+ or `psycopg2`_
2.8.4+ is required, though the latest `psycopg`_ 3.1.8+ is recommended.
.. note::
diff --git a/docs/releases/5.2.txt b/docs/releases/5.2.txt
index 9d28415df1..fb2a1d0177 100644
--- a/docs/releases/5.2.txt
+++ b/docs/releases/5.2.txt
@@ -238,6 +238,17 @@ backends.
* ...
+:mod:`django.contrib.gis`
+-------------------------
+
+* Support for PostGIS 3.0 is removed.
+
+Dropped support for PostgreSQL 13
+---------------------------------
+
+Upstream support for PostgreSQL 13 ends in November 2025. Django 5.2 supports
+PostgreSQL 14 and higher.
+
Miscellaneous
-------------
diff --git a/tests/backends/postgresql/tests.py b/tests/backends/postgresql/tests.py
index 47f8d94004..0b4f580612 100644
--- a/tests/backends/postgresql/tests.py
+++ b/tests/backends/postgresql/tests.py
@@ -548,12 +548,12 @@ class Tests(TestCase):
def test_get_database_version(self):
new_connection = no_pool_connection()
- new_connection.pg_version = 130009
- self.assertEqual(new_connection.get_database_version(), (13, 9))
+ new_connection.pg_version = 140009
+ self.assertEqual(new_connection.get_database_version(), (14, 9))
- @mock.patch.object(connection, "get_database_version", return_value=(12,))
+ @mock.patch.object(connection, "get_database_version", return_value=(13,))
def test_check_database_version_supported(self, mocked_get_database_version):
- msg = "PostgreSQL 13 or later is required (found 12)."
+ msg = "PostgreSQL 14 or later is required (found 13)."
with self.assertRaisesMessage(NotSupportedError, msg):
connection.check_database_version_supported()
self.assertTrue(mocked_get_database_version.called)
diff --git a/tests/postgres_tests/test_aggregates.py b/tests/postgres_tests/test_aggregates.py
index 7e1e16d0c0..b72310bdf1 100644
--- a/tests/postgres_tests/test_aggregates.py
+++ b/tests/postgres_tests/test_aggregates.py
@@ -1,4 +1,4 @@
-from django.db import connection, transaction
+from django.db import transaction
from django.db.models import (
CharField,
F,
@@ -13,7 +13,6 @@ from django.db.models import (
)
from django.db.models.fields.json import KeyTextTransform, KeyTransform
from django.db.models.functions import Cast, Concat, LPad, Substr
-from django.test import skipUnlessDBFeature
from django.test.utils import Approximate
from django.utils import timezone
@@ -95,9 +94,8 @@ class TestGeneralAggregate(PostgreSQLTestCase):
BoolOr("boolean_field"),
JSONBAgg("integer_field"),
StringAgg("char_field", delimiter=";"),
+ BitXor("integer_field"),
]
- if connection.features.has_bit_xor:
- tests.append(BitXor("integer_field"))
for aggregation in tests:
with self.subTest(aggregation=aggregation):
# Empty result with non-execution optimization.
@@ -133,9 +131,8 @@ class TestGeneralAggregate(PostgreSQLTestCase):
StringAgg("char_field", delimiter=";", default=Value("")),
"",
),
+ (BitXor("integer_field", default=0), 0),
]
- if connection.features.has_bit_xor:
- tests.append((BitXor("integer_field", default=0), 0))
for aggregation, expected_result in tests:
with self.subTest(aggregation=aggregation):
# Empty result with non-execution optimization.
@@ -348,7 +345,6 @@ class TestGeneralAggregate(PostgreSQLTestCase):
)
self.assertEqual(values, {"bitor": 0})
- @skipUnlessDBFeature("has_bit_xor")
def test_bit_xor_general(self):
AggregateTestModel.objects.create(integer_field=3)
values = AggregateTestModel.objects.filter(
@@ -356,14 +352,12 @@ class TestGeneralAggregate(PostgreSQLTestCase):
).aggregate(bitxor=BitXor("integer_field"))
self.assertEqual(values, {"bitxor": 2})
- @skipUnlessDBFeature("has_bit_xor")
def test_bit_xor_on_only_true_values(self):
values = AggregateTestModel.objects.filter(
integer_field=1,
).aggregate(bitxor=BitXor("integer_field"))
self.assertEqual(values, {"bitxor": 1})
- @skipUnlessDBFeature("has_bit_xor")
def test_bit_xor_on_only_false_values(self):
values = AggregateTestModel.objects.filter(
integer_field=0,
diff --git a/tests/postgres_tests/test_constraints.py b/tests/postgres_tests/test_constraints.py
index 3cc76cdcfe..770d4b1702 100644
--- a/tests/postgres_tests/test_constraints.py
+++ b/tests/postgres_tests/test_constraints.py
@@ -4,7 +4,7 @@ from unittest import mock
from django.contrib.postgres.indexes import OpClass
from django.core.checks import Error
from django.core.exceptions import ValidationError
-from django.db import IntegrityError, NotSupportedError, connection, transaction
+from django.db import IntegrityError, connection, transaction
from django.db.models import (
CASCADE,
CharField,
@@ -997,7 +997,6 @@ class ExclusionConstraintTests(PostgreSQLTestCase):
RangesModel.objects.create(ints=(10, 19))
RangesModel.objects.create(ints=(51, 60))
- @skipUnlessDBFeature("supports_covering_spgist_indexes")
def test_range_adjacent_spgist_include(self):
constraint_name = "ints_adjacent_spgist_include"
self.assertNotIn(
@@ -1034,7 +1033,6 @@ class ExclusionConstraintTests(PostgreSQLTestCase):
editor.add_constraint(RangesModel, constraint)
self.assertIn(constraint_name, self.get_constraints(RangesModel._meta.db_table))
- @skipUnlessDBFeature("supports_covering_spgist_indexes")
def test_range_adjacent_spgist_include_condition(self):
constraint_name = "ints_adjacent_spgist_include_condition"
self.assertNotIn(
@@ -1067,7 +1065,6 @@ class ExclusionConstraintTests(PostgreSQLTestCase):
editor.add_constraint(RangesModel, constraint)
self.assertIn(constraint_name, self.get_constraints(RangesModel._meta.db_table))
- @skipUnlessDBFeature("supports_covering_spgist_indexes")
def test_range_adjacent_spgist_include_deferrable(self):
constraint_name = "ints_adjacent_spgist_include_deferrable"
self.assertNotIn(
@@ -1084,27 +1081,6 @@ class ExclusionConstraintTests(PostgreSQLTestCase):
editor.add_constraint(RangesModel, constraint)
self.assertIn(constraint_name, self.get_constraints(RangesModel._meta.db_table))
- def test_spgist_include_not_supported(self):
- constraint_name = "ints_adjacent_spgist_include_not_supported"
- constraint = ExclusionConstraint(
- name=constraint_name,
- expressions=[("ints", RangeOperators.ADJACENT_TO)],
- index_type="spgist",
- include=["id"],
- )
- msg = (
- "Covering exclusion constraints using an SP-GiST index require "
- "PostgreSQL 14+."
- )
- with connection.schema_editor() as editor:
- with mock.patch(
- "django.db.backends.postgresql.features.DatabaseFeatures."
- "supports_covering_spgist_indexes",
- False,
- ):
- with self.assertRaisesMessage(NotSupportedError, msg):
- editor.add_constraint(RangesModel, constraint)
-
def test_range_adjacent_opclass(self):
constraint_name = "ints_adjacent_opclass"
self.assertNotIn(
@@ -1187,7 +1163,6 @@ class ExclusionConstraintTests(PostgreSQLTestCase):
editor.add_constraint(RangesModel, constraint)
self.assertIn(constraint_name, self.get_constraints(RangesModel._meta.db_table))
- @skipUnlessDBFeature("supports_covering_spgist_indexes")
def test_range_adjacent_spgist_opclass_include(self):
constraint_name = "ints_adjacent_spgist_opclass_include"
self.assertNotIn(
diff --git a/tests/postgres_tests/test_indexes.py b/tests/postgres_tests/test_indexes.py
index 8a7ee39a76..f98d03c6c1 100644
--- a/tests/postgres_tests/test_indexes.py
+++ b/tests/postgres_tests/test_indexes.py
@@ -1,5 +1,3 @@
-from unittest import mock
-
from django.contrib.postgres.indexes import (
BloomIndex,
BrinIndex,
@@ -11,10 +9,9 @@ from django.contrib.postgres.indexes import (
PostgresIndex,
SpGistIndex,
)
-from django.db import NotSupportedError, connection
+from django.db import connection
from django.db.models import CharField, F, Index, Q
from django.db.models.functions import Cast, Collate, Length, Lower
-from django.test import skipUnlessDBFeature
from django.test.utils import register_lookup
from . import PostgreSQLSimpleTestCase, PostgreSQLTestCase
@@ -640,7 +637,6 @@ class SchemaTests(PostgreSQLTestCase):
index_name, self.get_constraints(TextFieldModel._meta.db_table)
)
- @skipUnlessDBFeature("supports_covering_spgist_indexes")
def test_spgist_include(self):
index_name = "scene_spgist_include_setting"
index = SpGistIndex(name=index_name, fields=["scene"], include=["setting"])
@@ -654,20 +650,6 @@ class SchemaTests(PostgreSQLTestCase):
editor.remove_index(Scene, index)
self.assertNotIn(index_name, self.get_constraints(Scene._meta.db_table))
- def test_spgist_include_not_supported(self):
- index_name = "spgist_include_exception"
- index = SpGistIndex(fields=["scene"], name=index_name, include=["setting"])
- msg = "Covering SP-GiST indexes require PostgreSQL 14+."
- with self.assertRaisesMessage(NotSupportedError, msg):
- with mock.patch(
- "django.db.backends.postgresql.features.DatabaseFeatures."
- "supports_covering_spgist_indexes",
- False,
- ):
- with connection.schema_editor() as editor:
- editor.add_index(Scene, index)
- self.assertNotIn(index_name, self.get_constraints(Scene._meta.db_table))
-
def test_custom_suffix(self):
class CustomSuffixIndex(PostgresIndex):
suffix = "sfx"
From d3a7ed5bcc45000a6c3dd55d85a4caaa83299f83 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Simon=20T=C3=B6rnqvist?=
Date: Thu, 16 May 2024 10:09:09 +0200
Subject: [PATCH 283/316] Fixed #35443 -- Changed ordinal to return negative
numbers unchanged.
Previously, `-1` was converted to `"-1th"`. This has been updated to
return negative numbers "as is", so that for example `-1` is
converted to `"-1"`. This is now explicit in the docs.
Co-authored-by: Martin Jonson
---
django/contrib/humanize/templatetags/humanize.py | 4 +++-
docs/ref/contrib/humanize.txt | 1 +
tests/humanize_tests/tests.py | 6 ++++++
3 files changed, 10 insertions(+), 1 deletion(-)
diff --git a/django/contrib/humanize/templatetags/humanize.py b/django/contrib/humanize/templatetags/humanize.py
index 19000c185c..174e367a69 100644
--- a/django/contrib/humanize/templatetags/humanize.py
+++ b/django/contrib/humanize/templatetags/humanize.py
@@ -24,12 +24,14 @@ register = template.Library()
def ordinal(value):
"""
Convert an integer to its ordinal as a string. 1 is '1st', 2 is '2nd',
- 3 is '3rd', etc. Works for any integer.
+ 3 is '3rd', etc. Works for any non-negative integer.
"""
try:
value = int(value)
except (TypeError, ValueError):
return value
+ if value < 0:
+ return str(value)
if value % 100 in (11, 12, 13):
# Translators: Ordinal format for 11 (11th), 12 (12th), and 13 (13th).
value = pgettext("ordinal 11, 12, 13", "{}th").format(value)
diff --git a/docs/ref/contrib/humanize.txt b/docs/ref/contrib/humanize.txt
index 7c1af53ed3..1596f30b97 100644
--- a/docs/ref/contrib/humanize.txt
+++ b/docs/ref/contrib/humanize.txt
@@ -143,3 +143,4 @@ Examples:
* ``3`` becomes ``3rd``.
You can pass in either an integer or a string representation of an integer.
+Negative integers are returned unchanged.
diff --git a/tests/humanize_tests/tests.py b/tests/humanize_tests/tests.py
index 5e4f7f0ef7..ab967e2874 100644
--- a/tests/humanize_tests/tests.py
+++ b/tests/humanize_tests/tests.py
@@ -55,6 +55,9 @@ class HumanizeTests(SimpleTestCase):
"102",
"103",
"111",
+ "-0",
+ "-1",
+ "-105",
"something else",
None,
)
@@ -70,6 +73,9 @@ class HumanizeTests(SimpleTestCase):
"102nd",
"103rd",
"111th",
+ "0th",
+ "-1",
+ "-105",
"something else",
None,
)
From 99f23eaabd8da653f046dc1d19f5008c030a4f79 Mon Sep 17 00:00:00 2001
From: Jacob Walls
Date: Sat, 25 May 2024 17:17:15 -0400
Subject: [PATCH 284/316] Fixed #35469 -- Removed deferred SQL to create index
removed by AlterField operation.
---
django/db/backends/base/schema.py | 13 ++++++++++-
django/db/backends/ddl_references.py | 15 +++++++++++++
tests/backends/test_ddl_references.py | 31 +++++++++++++++++++++------
tests/indexes/tests.py | 20 ++++++++++++++++-
4 files changed, 70 insertions(+), 9 deletions(-)
diff --git a/django/db/backends/base/schema.py b/django/db/backends/base/schema.py
index 38136e7213..e5f28d9c6a 100644
--- a/django/db/backends/base/schema.py
+++ b/django/db/backends/base/schema.py
@@ -1582,12 +1582,23 @@ class BaseDatabaseSchemaEditor:
)
def _delete_index_sql(self, model, name, sql=None):
- return Statement(
+ statement = Statement(
sql or self.sql_delete_index,
table=Table(model._meta.db_table, self.quote_name),
name=self.quote_name(name),
)
+ # Remove all deferred statements referencing the deleted index.
+ table_name = statement.parts["table"].table
+ index_name = statement.parts["name"]
+ for sql in list(self.deferred_sql):
+ if isinstance(sql, Statement) and sql.references_index(
+ table_name, index_name
+ ):
+ self.deferred_sql.remove(sql)
+
+ return statement
+
def _rename_index_sql(self, model, old_name, new_name):
return Statement(
self.sql_rename_index,
diff --git a/django/db/backends/ddl_references.py b/django/db/backends/ddl_references.py
index 75787ef8ab..cb8d2defd2 100644
--- a/django/db/backends/ddl_references.py
+++ b/django/db/backends/ddl_references.py
@@ -21,6 +21,12 @@ class Reference:
"""
return False
+ def references_index(self, table, index):
+ """
+ Return whether or not this instance references the specified index.
+ """
+ return False
+
def rename_table_references(self, old_table, new_table):
"""
Rename all references to the old_name to the new_table.
@@ -52,6 +58,9 @@ class Table(Reference):
def references_table(self, table):
return self.table == table
+ def references_index(self, table, index):
+ return self.references_table(table) and str(self) == index
+
def rename_table_references(self, old_table, new_table):
if self.table == old_table:
self.table = new_table
@@ -207,6 +216,12 @@ class Statement(Reference):
for part in self.parts.values()
)
+ def references_index(self, table, index):
+ return any(
+ hasattr(part, "references_index") and part.references_index(table, index)
+ for part in self.parts.values()
+ )
+
def rename_table_references(self, old_table, new_table):
for part in self.parts.values():
if hasattr(part, "rename_table_references"):
diff --git a/tests/backends/test_ddl_references.py b/tests/backends/test_ddl_references.py
index 86984ed3e8..8975b97124 100644
--- a/tests/backends/test_ddl_references.py
+++ b/tests/backends/test_ddl_references.py
@@ -166,10 +166,13 @@ class ForeignKeyNameTests(IndexNameTests):
class MockReference:
- def __init__(self, representation, referenced_tables, referenced_columns):
+ def __init__(
+ self, representation, referenced_tables, referenced_columns, referenced_indexes
+ ):
self.representation = representation
self.referenced_tables = referenced_tables
self.referenced_columns = referenced_columns
+ self.referenced_indexes = referenced_indexes
def references_table(self, table):
return table in self.referenced_tables
@@ -177,6 +180,9 @@ class MockReference:
def references_column(self, table, column):
return (table, column) in self.referenced_columns
+ def references_index(self, table, index):
+ return (table, index) in self.referenced_indexes
+
def rename_table_references(self, old_table, new_table):
if old_table in self.referenced_tables:
self.referenced_tables.remove(old_table)
@@ -195,32 +201,43 @@ class MockReference:
class StatementTests(SimpleTestCase):
def test_references_table(self):
statement = Statement(
- "", reference=MockReference("", {"table"}, {}), non_reference=""
+ "", reference=MockReference("", {"table"}, {}, {}), non_reference=""
)
self.assertIs(statement.references_table("table"), True)
self.assertIs(statement.references_table("other"), False)
def test_references_column(self):
statement = Statement(
- "", reference=MockReference("", {}, {("table", "column")}), non_reference=""
+ "",
+ reference=MockReference("", {}, {("table", "column")}, {}),
+ non_reference="",
)
self.assertIs(statement.references_column("table", "column"), True)
self.assertIs(statement.references_column("other", "column"), False)
+ def test_references_index(self):
+ statement = Statement(
+ "",
+ reference=MockReference("", {}, {}, {("table", "index")}),
+ non_reference="",
+ )
+ self.assertIs(statement.references_index("table", "index"), True)
+ self.assertIs(statement.references_index("other", "index"), False)
+
def test_rename_table_references(self):
- reference = MockReference("", {"table"}, {})
+ reference = MockReference("", {"table"}, {}, {})
statement = Statement("", reference=reference, non_reference="")
statement.rename_table_references("table", "other")
self.assertEqual(reference.referenced_tables, {"other"})
def test_rename_column_references(self):
- reference = MockReference("", {}, {("table", "column")})
+ reference = MockReference("", {}, {("table", "column")}, {})
statement = Statement("", reference=reference, non_reference="")
statement.rename_column_references("table", "column", "other")
self.assertEqual(reference.referenced_columns, {("table", "other")})
def test_repr(self):
- reference = MockReference("reference", {}, {})
+ reference = MockReference("reference", {}, {}, {})
statement = Statement(
"%(reference)s - %(non_reference)s",
reference=reference,
@@ -229,7 +246,7 @@ class StatementTests(SimpleTestCase):
self.assertEqual(repr(statement), "")
def test_str(self):
- reference = MockReference("reference", {}, {})
+ reference = MockReference("reference", {}, {}, {})
statement = Statement(
"%(reference)s - %(non_reference)s",
reference=reference,
diff --git a/tests/indexes/tests.py b/tests/indexes/tests.py
index 107703c39a..0c4158a886 100644
--- a/tests/indexes/tests.py
+++ b/tests/indexes/tests.py
@@ -3,7 +3,7 @@ from unittest import skipUnless
from django.conf import settings
from django.db import connection
-from django.db.models import CASCADE, ForeignKey, Index, Q
+from django.db.models import CASCADE, CharField, ForeignKey, Index, Q
from django.db.models.functions import Lower
from django.test import (
TestCase,
@@ -87,6 +87,24 @@ class SchemaIndexesTests(TestCase):
str(index.create_sql(Article, editor)),
)
+ @skipUnlessDBFeature("can_create_inline_fk", "can_rollback_ddl")
+ def test_alter_field_unique_false_removes_deferred_sql(self):
+ field_added = CharField(max_length=127, unique=True)
+ field_added.set_attributes_from_name("charfield_added")
+
+ field_to_alter = CharField(max_length=127, unique=True)
+ field_to_alter.set_attributes_from_name("charfield_altered")
+ altered_field = CharField(max_length=127, unique=False)
+ altered_field.set_attributes_from_name("charfield_altered")
+
+ with connection.schema_editor() as editor:
+ editor.add_field(ArticleTranslation, field_added)
+ editor.add_field(ArticleTranslation, field_to_alter)
+ self.assertEqual(len(editor.deferred_sql), 2)
+ editor.alter_field(ArticleTranslation, field_to_alter, altered_field)
+ self.assertEqual(len(editor.deferred_sql), 1)
+ self.assertIn("charfield_added", str(editor.deferred_sql[0].parts["name"]))
+
class SchemaIndexesNotPostgreSQLTests(TransactionTestCase):
available_apps = ["indexes"]
From f4a08b6ddfcacadfe9ff8364bf1c6c54f5dd370f Mon Sep 17 00:00:00 2001
From: Carlton Gibson
Date: Tue, 28 May 2024 19:36:34 +0200
Subject: [PATCH 285/316] Refs #35059 -- Used asyncio.Event in
ASGITest.test_asyncio_cancel_error to enforce specific interleaving.
Sleep call leads to a hard to trace error in CI. Using an Event is
more deterministic, and should be less prone to environment
variations.
Bug in 11393ab1316f973c5fbb534305750740d909b4e4.
---
tests/asgi/tests.py | 9 ++++++---
1 file changed, 6 insertions(+), 3 deletions(-)
diff --git a/tests/asgi/tests.py b/tests/asgi/tests.py
index 963f45f798..658e9d853e 100644
--- a/tests/asgi/tests.py
+++ b/tests/asgi/tests.py
@@ -475,6 +475,7 @@ class ASGITest(SimpleTestCase):
sync_waiter.active_threads.clear()
async def test_asyncio_cancel_error(self):
+ view_started = asyncio.Event()
# Flag to check if the view was cancelled.
view_did_cancel = False
# Track request_finished signal.
@@ -484,9 +485,10 @@ class ASGITest(SimpleTestCase):
# A view that will listen for the cancelled error.
async def view(request):
- nonlocal view_did_cancel
+ nonlocal view_started, view_did_cancel
+ view_started.set()
try:
- await asyncio.sleep(0.2)
+ await asyncio.sleep(0.1)
return HttpResponse("Hello World!")
except asyncio.CancelledError:
# Set the flag.
@@ -522,6 +524,7 @@ class ASGITest(SimpleTestCase):
self.assertNotEqual(handler_call["thread"], threading.current_thread())
# The signal sender is the handler class.
self.assertEqual(handler_call["kwargs"], {"sender": TestASGIHandler})
+ view_started.clear()
# Request cycle with a disconnect before the view can respond.
application = TestASGIHandler()
@@ -529,7 +532,7 @@ class ASGITest(SimpleTestCase):
communicator = ApplicationCommunicator(application, scope)
await communicator.send_input({"type": "http.request"})
# Let the view actually start.
- await asyncio.sleep(0.1)
+ await view_started.wait()
# Disconnect the client.
await communicator.send_input({"type": "http.disconnect"})
# The handler should not send a response.
From 02dab94c7b8585c7ae3854465574d768e1df75d3 Mon Sep 17 00:00:00 2001
From: samruddhiDharankar
Date: Tue, 28 May 2024 22:14:14 -0700
Subject: [PATCH 286/316] Fixed #35473 -- Fixed CVE number in security archive.
Updated to CVE-2009-3695 from CVE-2009-3965.
---
docs/releases/security.txt | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/docs/releases/security.txt b/docs/releases/security.txt
index 404af4d00f..5ded7966f1 100644
--- a/docs/releases/security.txt
+++ b/docs/releases/security.txt
@@ -1381,7 +1381,7 @@ Versions affected
* Django 1.2 :commit:`(patch) <7f84657b6b2243cc787bdb9f296710c8d13ad0bd>`
-October 9, 2009 - :cve:`2009-3965`
+October 9, 2009 - :cve:`2009-3695`
----------------------------------
Denial-of-service via pathological regular expression performance. `Full
From ff308a06047cd60806d604a7cf612e5656ee2ac9 Mon Sep 17 00:00:00 2001
From: Jake Howard
Date: Wed, 29 May 2024 14:48:27 +0100
Subject: [PATCH 287/316] Fixed 35467 -- Replaced urlparse with urlsplit where
appropriate.
This work should not generate any change of functionality, and
`urlsplit` is approximately 6x faster.
Most use cases of `urlparse` didn't touch the path, so they can be
converted to `urlsplit` without any issue. Most of those which do use
`.path`, simply parse the URL, mutate the querystring, then put them
back together, which is also fine (so long as urlunsplit is used).
---
django/contrib/admin/options.py | 4 ++--
django/contrib/admin/templatetags/admin_urls.py | 10 +++++-----
django/contrib/auth/decorators.py | 6 +++---
django/contrib/auth/middleware.py | 6 +++---
django/contrib/auth/mixins.py | 6 +++---
django/contrib/auth/views.py | 10 +++++-----
django/contrib/staticfiles/handlers.py | 4 ++--
django/forms/fields.py | 4 ++--
django/http/response.py | 4 ++--
django/middleware/common.py | 4 ++--
django/middleware/csrf.py | 10 +++++-----
django/test/client.py | 17 ++++++-----------
django/test/testcases.py | 12 +++++-------
django/utils/http.py | 6 +++---
docs/ref/urlresolvers.txt | 4 ++--
tests/admin_views/tests.py | 10 +++++-----
tests/csrf_tests/tests.py | 16 ++++++----------
17 files changed, 61 insertions(+), 72 deletions(-)
diff --git a/django/contrib/admin/options.py b/django/contrib/admin/options.py
index 12467de74d..9cc891d807 100644
--- a/django/contrib/admin/options.py
+++ b/django/contrib/admin/options.py
@@ -6,7 +6,7 @@ import warnings
from functools import partial, update_wrapper
from urllib.parse import parse_qsl
from urllib.parse import quote as urlquote
-from urllib.parse import urlparse
+from urllib.parse import urlsplit
from django import forms
from django.conf import settings
@@ -1384,7 +1384,7 @@ class ModelAdmin(BaseModelAdmin):
)
def _get_preserved_qsl(self, request, preserved_filters):
- query_string = urlparse(request.build_absolute_uri()).query
+ query_string = urlsplit(request.build_absolute_uri()).query
return parse_qsl(query_string.replace(preserved_filters, ""))
def response_add(self, request, obj, post_url_continue=None):
diff --git a/django/contrib/admin/templatetags/admin_urls.py b/django/contrib/admin/templatetags/admin_urls.py
index 871b0d5f20..176e7a49ed 100644
--- a/django/contrib/admin/templatetags/admin_urls.py
+++ b/django/contrib/admin/templatetags/admin_urls.py
@@ -1,4 +1,4 @@
-from urllib.parse import parse_qsl, unquote, urlparse, urlunparse
+from urllib.parse import parse_qsl, unquote, urlsplit, urlunsplit
from django import template
from django.contrib.admin.utils import quote
@@ -24,8 +24,8 @@ def add_preserved_filters(context, url, popup=False, to_field=None):
preserved_filters = context.get("preserved_filters")
preserved_qsl = context.get("preserved_qsl")
- parsed_url = list(urlparse(url))
- parsed_qs = dict(parse_qsl(parsed_url[4]))
+ parsed_url = list(urlsplit(url))
+ parsed_qs = dict(parse_qsl(parsed_url[3]))
merged_qs = {}
if preserved_qsl:
@@ -66,5 +66,5 @@ def add_preserved_filters(context, url, popup=False, to_field=None):
merged_qs.update(parsed_qs)
- parsed_url[4] = urlencode(merged_qs)
- return urlunparse(parsed_url)
+ parsed_url[3] = urlencode(merged_qs)
+ return urlunsplit(parsed_url)
diff --git a/django/contrib/auth/decorators.py b/django/contrib/auth/decorators.py
index ea1cef0795..78e76a9ae9 100644
--- a/django/contrib/auth/decorators.py
+++ b/django/contrib/auth/decorators.py
@@ -1,6 +1,6 @@
import asyncio
from functools import wraps
-from urllib.parse import urlparse
+from urllib.parse import urlsplit
from asgiref.sync import async_to_sync, sync_to_async
@@ -25,8 +25,8 @@ def user_passes_test(
resolved_login_url = resolve_url(login_url or settings.LOGIN_URL)
# If the login url is the same scheme and net location then just
# use the path as the "next" url.
- login_scheme, login_netloc = urlparse(resolved_login_url)[:2]
- current_scheme, current_netloc = urlparse(path)[:2]
+ login_scheme, login_netloc = urlsplit(resolved_login_url)[:2]
+ current_scheme, current_netloc = urlsplit(path)[:2]
if (not login_scheme or login_scheme == current_scheme) and (
not login_netloc or login_netloc == current_netloc
):
diff --git a/django/contrib/auth/middleware.py b/django/contrib/auth/middleware.py
index 761929d67d..cb409ee778 100644
--- a/django/contrib/auth/middleware.py
+++ b/django/contrib/auth/middleware.py
@@ -1,5 +1,5 @@
from functools import partial
-from urllib.parse import urlparse
+from urllib.parse import urlsplit
from django.conf import settings
from django.contrib import auth
@@ -74,8 +74,8 @@ class LoginRequiredMiddleware(MiddlewareMixin):
resolved_login_url = resolve_url(self.get_login_url(view_func))
# If the login url is the same scheme and net location then use the
# path as the "next" url.
- login_scheme, login_netloc = urlparse(resolved_login_url)[:2]
- current_scheme, current_netloc = urlparse(path)[:2]
+ login_scheme, login_netloc = urlsplit(resolved_login_url)[:2]
+ current_scheme, current_netloc = urlsplit(path)[:2]
if (not login_scheme or login_scheme == current_scheme) and (
not login_netloc or login_netloc == current_netloc
):
diff --git a/django/contrib/auth/mixins.py b/django/contrib/auth/mixins.py
index 0e46000d97..1f2e95ff00 100644
--- a/django/contrib/auth/mixins.py
+++ b/django/contrib/auth/mixins.py
@@ -1,4 +1,4 @@
-from urllib.parse import urlparse
+from urllib.parse import urlsplit
from django.conf import settings
from django.contrib.auth import REDIRECT_FIELD_NAME
@@ -51,8 +51,8 @@ class AccessMixin:
resolved_login_url = resolve_url(self.get_login_url())
# If the login url is the same scheme and net location then use the
# path as the "next" url.
- login_scheme, login_netloc = urlparse(resolved_login_url)[:2]
- current_scheme, current_netloc = urlparse(path)[:2]
+ login_scheme, login_netloc = urlsplit(resolved_login_url)[:2]
+ current_scheme, current_netloc = urlsplit(path)[:2]
if (not login_scheme or login_scheme == current_scheme) and (
not login_netloc or login_netloc == current_netloc
):
diff --git a/django/contrib/auth/views.py b/django/contrib/auth/views.py
index 9a6d18bcd2..a18cfdb347 100644
--- a/django/contrib/auth/views.py
+++ b/django/contrib/auth/views.py
@@ -1,4 +1,4 @@
-from urllib.parse import urlparse, urlunparse
+from urllib.parse import urlsplit, urlunsplit
from django.conf import settings
@@ -183,13 +183,13 @@ def redirect_to_login(next, login_url=None, redirect_field_name=REDIRECT_FIELD_N
"""
resolved_url = resolve_url(login_url or settings.LOGIN_URL)
- login_url_parts = list(urlparse(resolved_url))
+ login_url_parts = list(urlsplit(resolved_url))
if redirect_field_name:
- querystring = QueryDict(login_url_parts[4], mutable=True)
+ querystring = QueryDict(login_url_parts[3], mutable=True)
querystring[redirect_field_name] = next
- login_url_parts[4] = querystring.urlencode(safe="/")
+ login_url_parts[3] = querystring.urlencode(safe="/")
- return HttpResponseRedirect(urlunparse(login_url_parts))
+ return HttpResponseRedirect(urlunsplit(login_url_parts))
# Class-based password reset views
diff --git a/django/contrib/staticfiles/handlers.py b/django/contrib/staticfiles/handlers.py
index 7394eff818..686718a355 100644
--- a/django/contrib/staticfiles/handlers.py
+++ b/django/contrib/staticfiles/handlers.py
@@ -36,13 +36,13 @@ class StaticFilesHandlerMixin:
* the host is provided as part of the base_url
* the request's path isn't under the media path (or equal)
"""
- return path.startswith(self.base_url[2]) and not self.base_url[1]
+ return path.startswith(self.base_url.path) and not self.base_url.netloc
def file_path(self, url):
"""
Return the relative path to the media file on disk for the given URL.
"""
- relative_url = url.removeprefix(self.base_url[2])
+ relative_url = url.removeprefix(self.base_url.path)
return url2pathname(relative_url)
def serve(self, request):
diff --git a/django/forms/fields.py b/django/forms/fields.py
index 4ec7b7aee7..1a58a60743 100644
--- a/django/forms/fields.py
+++ b/django/forms/fields.py
@@ -792,13 +792,13 @@ class URLField(CharField):
def to_python(self, value):
def split_url(url):
"""
- Return a list of url parts via urlparse.urlsplit(), or raise
+ Return a list of url parts via urlsplit(), or raise
ValidationError for some malformed URLs.
"""
try:
return list(urlsplit(url))
except ValueError:
- # urlparse.urlsplit can raise a ValueError with some
+ # urlsplit can raise a ValueError with some
# misformatted URLs.
raise ValidationError(self.error_messages["invalid"], code="invalid")
diff --git a/django/http/response.py b/django/http/response.py
index eecd972cd6..0d756403db 100644
--- a/django/http/response.py
+++ b/django/http/response.py
@@ -9,7 +9,7 @@ import time
import warnings
from email.header import Header
from http.client import responses
-from urllib.parse import urlparse
+from urllib.parse import urlsplit
from asgiref.sync import async_to_sync, sync_to_async
@@ -616,7 +616,7 @@ class HttpResponseRedirectBase(HttpResponse):
def __init__(self, redirect_to, *args, **kwargs):
super().__init__(*args, **kwargs)
self["Location"] = iri_to_uri(redirect_to)
- parsed = urlparse(str(redirect_to))
+ parsed = urlsplit(str(redirect_to))
if parsed.scheme and parsed.scheme not in self.allowed_schemes:
raise DisallowedRedirect(
"Unsafe redirect to URL with protocol '%s'" % parsed.scheme
diff --git a/django/middleware/common.py b/django/middleware/common.py
index 9f71b9d278..bf22d00f01 100644
--- a/django/middleware/common.py
+++ b/django/middleware/common.py
@@ -1,5 +1,5 @@
import re
-from urllib.parse import urlparse
+from urllib.parse import urlsplit
from django.conf import settings
from django.core.exceptions import PermissionDenied
@@ -171,7 +171,7 @@ class BrokenLinkEmailsMiddleware(MiddlewareMixin):
# The referer is equal to the current URL, ignoring the scheme (assumed
# to be a poorly implemented bot).
- parsed_referer = urlparse(referer)
+ parsed_referer = urlsplit(referer)
if parsed_referer.netloc in ["", domain] and parsed_referer.path == uri:
return True
diff --git a/django/middleware/csrf.py b/django/middleware/csrf.py
index f7943494ba..5ae1aae5c6 100644
--- a/django/middleware/csrf.py
+++ b/django/middleware/csrf.py
@@ -8,7 +8,7 @@ against request forgeries from other sites.
import logging
import string
from collections import defaultdict
-from urllib.parse import urlparse
+from urllib.parse import urlsplit
from django.conf import settings
from django.core.exceptions import DisallowedHost, ImproperlyConfigured
@@ -174,7 +174,7 @@ class CsrfViewMiddleware(MiddlewareMixin):
@cached_property
def csrf_trusted_origins_hosts(self):
return [
- urlparse(origin).netloc.lstrip("*")
+ urlsplit(origin).netloc.lstrip("*")
for origin in settings.CSRF_TRUSTED_ORIGINS
]
@@ -190,7 +190,7 @@ class CsrfViewMiddleware(MiddlewareMixin):
"""
allowed_origin_subdomains = defaultdict(list)
for parsed in (
- urlparse(origin)
+ urlsplit(origin)
for origin in settings.CSRF_TRUSTED_ORIGINS
if "*" in origin
):
@@ -284,7 +284,7 @@ class CsrfViewMiddleware(MiddlewareMixin):
if request_origin in self.allowed_origins_exact:
return True
try:
- parsed_origin = urlparse(request_origin)
+ parsed_origin = urlsplit(request_origin)
except ValueError:
return False
request_scheme = parsed_origin.scheme
@@ -300,7 +300,7 @@ class CsrfViewMiddleware(MiddlewareMixin):
raise RejectRequest(REASON_NO_REFERER)
try:
- referer = urlparse(referer)
+ referer = urlsplit(referer)
except ValueError:
raise RejectRequest(REASON_MALFORMED_REFERER)
diff --git a/django/test/client.py b/django/test/client.py
index aa42c1f60a..a755aae05c 100644
--- a/django/test/client.py
+++ b/django/test/client.py
@@ -8,7 +8,7 @@ from functools import partial
from http import HTTPStatus
from importlib import import_module
from io import BytesIO, IOBase
-from urllib.parse import unquote_to_bytes, urljoin, urlparse, urlsplit
+from urllib.parse import unquote_to_bytes, urljoin, urlsplit
from asgiref.sync import sync_to_async
@@ -458,11 +458,7 @@ class RequestFactory:
return json.dumps(data, cls=self.json_encoder) if should_encode else data
def _get_path(self, parsed):
- path = parsed.path
- # If there are parameters, add them
- if parsed.params:
- path += ";" + parsed.params
- path = unquote_to_bytes(path)
+ path = unquote_to_bytes(parsed.path)
# Replace the behavior where non-ASCII values in the WSGI environ are
# arbitrarily decoded with ISO-8859-1.
# Refs comment in `get_bytes_from_wsgi()`.
@@ -647,7 +643,7 @@ class RequestFactory:
**extra,
):
"""Construct an arbitrary HTTP request."""
- parsed = urlparse(str(path)) # path can be lazy
+ parsed = urlsplit(str(path)) # path can be lazy
data = force_bytes(data, settings.DEFAULT_CHARSET)
r = {
"PATH_INFO": self._get_path(parsed),
@@ -671,8 +667,7 @@ class RequestFactory:
# If QUERY_STRING is absent or empty, we want to extract it from the URL.
if not r.get("QUERY_STRING"):
# WSGI requires latin-1 encoded strings. See get_path_info().
- query_string = parsed[4].encode().decode("iso-8859-1")
- r["QUERY_STRING"] = query_string
+ r["QUERY_STRING"] = parsed.query.encode().decode("iso-8859-1")
return self.request(**r)
@@ -748,7 +743,7 @@ class AsyncRequestFactory(RequestFactory):
**extra,
):
"""Construct an arbitrary HTTP request."""
- parsed = urlparse(str(path)) # path can be lazy.
+ parsed = urlsplit(str(path)) # path can be lazy.
data = force_bytes(data, settings.DEFAULT_CHARSET)
s = {
"method": method,
@@ -772,7 +767,7 @@ class AsyncRequestFactory(RequestFactory):
else:
# If QUERY_STRING is absent or empty, we want to extract it from
# the URL.
- s["query_string"] = parsed[4]
+ s["query_string"] = parsed.query
if headers:
extra.update(HttpHeaders.to_asgi_names(headers))
s["headers"] += [
diff --git a/django/test/testcases.py b/django/test/testcases.py
index 0a802c887b..f1c6b5ae9c 100644
--- a/django/test/testcases.py
+++ b/django/test/testcases.py
@@ -21,7 +21,7 @@ from urllib.parse import (
urljoin,
urlparse,
urlsplit,
- urlunparse,
+ urlunsplit,
)
from urllib.request import url2pathname
@@ -541,11 +541,9 @@ class SimpleTestCase(unittest.TestCase):
def normalize(url):
"""Sort the URL's query string parameters."""
url = str(url) # Coerce reverse_lazy() URLs.
- scheme, netloc, path, params, query, fragment = urlparse(url)
+ scheme, netloc, path, query, fragment = urlsplit(url)
query_parts = sorted(parse_qsl(query))
- return urlunparse(
- (scheme, netloc, path, params, urlencode(query_parts), fragment)
- )
+ return urlunsplit((scheme, netloc, path, urlencode(query_parts), fragment))
if msg_prefix:
msg_prefix += ": "
@@ -1637,11 +1635,11 @@ class FSFilesHandler(WSGIHandler):
* the host is provided as part of the base_url
* the request's path isn't under the media path (or equal)
"""
- return path.startswith(self.base_url[2]) and not self.base_url[1]
+ return path.startswith(self.base_url.path) and not self.base_url.netloc
def file_path(self, url):
"""Return the relative path to the file on disk for the given URL."""
- relative_url = url.removeprefix(self.base_url[2])
+ relative_url = url.removeprefix(self.base_url.path)
return url2pathname(relative_url)
def get_response(self, request):
diff --git a/django/utils/http.py b/django/utils/http.py
index 78dfee7fee..bf783562dd 100644
--- a/django/utils/http.py
+++ b/django/utils/http.py
@@ -6,7 +6,7 @@ from datetime import datetime, timezone
from email.utils import formatdate
from urllib.parse import quote, unquote
from urllib.parse import urlencode as original_urlencode
-from urllib.parse import urlparse
+from urllib.parse import urlsplit
from django.utils.datastructures import MultiValueDict
from django.utils.regex_helper import _lazy_re_compile
@@ -271,11 +271,11 @@ def url_has_allowed_host_and_scheme(url, allowed_hosts, require_https=False):
def _url_has_allowed_host_and_scheme(url, allowed_hosts, require_https=False):
# Chrome considers any URL with more than two slashes to be absolute, but
- # urlparse is not so flexible. Treat any url with three slashes as unsafe.
+ # urlsplit is not so flexible. Treat any url with three slashes as unsafe.
if url.startswith("///"):
return False
try:
- url_info = urlparse(url)
+ url_info = urlsplit(url)
except ValueError: # e.g. invalid IPv6 addresses
return False
# Forbid URLs like http:///example.com - with a scheme, but without a hostname.
diff --git a/docs/ref/urlresolvers.txt b/docs/ref/urlresolvers.txt
index eb0b991f1b..b335d1fc39 100644
--- a/docs/ref/urlresolvers.txt
+++ b/docs/ref/urlresolvers.txt
@@ -203,7 +203,7 @@ A :class:`ResolverMatch` object can also be assigned to a triple::
One possible use of :func:`~django.urls.resolve` would be to test whether a
view would raise a ``Http404`` error before redirecting to it::
- from urllib.parse import urlparse
+ from urllib.parse import urlsplit
from django.urls import resolve
from django.http import Http404, HttpResponseRedirect
@@ -215,7 +215,7 @@ view would raise a ``Http404`` error before redirecting to it::
# modify the request and response as required, e.g. change locale
# and set corresponding locale cookie
- view, args, kwargs = resolve(urlparse(next)[2])
+ view, args, kwargs = resolve(urlsplit(next).path)
kwargs["request"] = request
try:
view(*args, **kwargs)
diff --git a/tests/admin_views/tests.py b/tests/admin_views/tests.py
index d49e7d028b..cb6815e7a8 100644
--- a/tests/admin_views/tests.py
+++ b/tests/admin_views/tests.py
@@ -4,7 +4,7 @@ import re
import unittest
import zoneinfo
from unittest import mock
-from urllib.parse import parse_qsl, urljoin, urlparse
+from urllib.parse import parse_qsl, urljoin, urlsplit
from django import forms
from django.contrib import admin
@@ -357,7 +357,7 @@ class AdminViewBasicTest(AdminViewBasicTestCase):
**save_option,
},
)
- parsed_url = urlparse(response.url)
+ parsed_url = urlsplit(response.url)
self.assertEqual(parsed_url.query, qsl)
def test_change_query_string_persists(self):
@@ -386,7 +386,7 @@ class AdminViewBasicTest(AdminViewBasicTestCase):
**save_option,
},
)
- parsed_url = urlparse(response.url)
+ parsed_url = urlsplit(response.url)
self.assertEqual(parsed_url.query, qsl)
def test_basic_edit_GET(self):
@@ -8032,11 +8032,11 @@ class AdminKeepChangeListFiltersTests(TestCase):
Assert that two URLs are equal despite the ordering
of their querystring. Refs #22360.
"""
- parsed_url1 = urlparse(url1)
+ parsed_url1 = urlsplit(url1)
path1 = parsed_url1.path
parsed_qs1 = dict(parse_qsl(parsed_url1.query))
- parsed_url2 = urlparse(url2)
+ parsed_url2 = urlsplit(url2)
path2 = parsed_url2.path
parsed_qs2 = dict(parse_qsl(parsed_url2.query))
diff --git a/tests/csrf_tests/tests.py b/tests/csrf_tests/tests.py
index 9407221cd1..b736276534 100644
--- a/tests/csrf_tests/tests.py
+++ b/tests/csrf_tests/tests.py
@@ -709,25 +709,21 @@ class CsrfViewMiddlewareTestMixin(CsrfFunctionTestMixin):
response = mw.process_view(req, post_form_view, (), {})
self.assertContains(response, malformed_referer_msg, status_code=403)
# missing scheme
- # >>> urlparse('//example.com/')
- # ParseResult(
- # scheme='', netloc='example.com', path='/', params='', query='', fragment='',
- # )
+ # >>> urlsplit('//example.com/')
+ # SplitResult(scheme='', netloc='example.com', path='/', query='', fragment='')
req.META["HTTP_REFERER"] = "//example.com/"
self._check_referer_rejects(mw, req)
response = mw.process_view(req, post_form_view, (), {})
self.assertContains(response, malformed_referer_msg, status_code=403)
# missing netloc
- # >>> urlparse('https://')
- # ParseResult(
- # scheme='https', netloc='', path='', params='', query='', fragment='',
- # )
+ # >>> urlsplit('https://')
+ # SplitResult(scheme='https', netloc='', path='', query='', fragment='')
req.META["HTTP_REFERER"] = "https://"
self._check_referer_rejects(mw, req)
response = mw.process_view(req, post_form_view, (), {})
self.assertContains(response, malformed_referer_msg, status_code=403)
# Invalid URL
- # >>> urlparse('https://[')
+ # >>> urlsplit('https://[')
# ValueError: Invalid IPv6 URL
req.META["HTTP_REFERER"] = "https://["
self._check_referer_rejects(mw, req)
@@ -979,7 +975,7 @@ class CsrfViewMiddlewareTestMixin(CsrfFunctionTestMixin):
@override_settings(ALLOWED_HOSTS=["www.example.com"])
def test_bad_origin_cannot_be_parsed(self):
"""
- A POST request with an origin that can't be parsed by urlparse() is
+ A POST request with an origin that can't be parsed by urlsplit() is
rejected.
"""
req = self._get_POST_request_with_token()
From 0f694ce2ebce01356d48302c33c23902b4777537 Mon Sep 17 00:00:00 2001
From: Mariusz Felisiak
Date: Thu, 30 May 2024 14:42:05 +0200
Subject: [PATCH 288/316] Made cosmetic edits to code snippets reformatted with
blacken-docs.
---
docs/ref/forms/validation.txt | 2 +-
docs/ref/models/instances.txt | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/docs/ref/forms/validation.txt b/docs/ref/forms/validation.txt
index a2b3fb4885..7a037eaf75 100644
--- a/docs/ref/forms/validation.txt
+++ b/docs/ref/forms/validation.txt
@@ -370,7 +370,7 @@ example::
# Only do something if both fields are valid so far.
if "help" not in subject:
raise ValidationError(
- "Did not send for 'help' in the subject despite " "CC'ing yourself."
+ "Did not send for 'help' in the subject despite CC'ing yourself."
)
In this code, if the validation error is raised, the form will display an
diff --git a/docs/ref/models/instances.txt b/docs/ref/models/instances.txt
index 65ed4924f7..e1011ded66 100644
--- a/docs/ref/models/instances.txt
+++ b/docs/ref/models/instances.txt
@@ -380,7 +380,7 @@ Then, ``full_clean()`` will check unique constraints on your model.
raise ValidationError(
{
"status": _(
- "Set status to draft if there is not a " "publication date."
+ "Set status to draft if there is not a publication date."
),
}
)
From 339977d4441fd353e20950b98bad3d42afb1f126 Mon Sep 17 00:00:00 2001
From: Fabian Braun
Date: Tue, 28 May 2024 08:15:12 +0200
Subject: [PATCH 289/316] Fixed #35477 -- Corrected 'required' errors in auth
password set/change forms.
The auth forms using SetPasswordMixin were incorrectly including the
'This field is required.' error when additional validations (e.g.,
overriding `clean_password1`) were performed and failed.
This fix ensures accurate error reporting for password fields.
Co-authored-by: Natalia <124304+nessita@users.noreply.github.com>
---
django/contrib/auth/forms.py | 4 +-
tests/auth_tests/test_forms.py | 69 ++++++++++++++++++++++++++++++++++
2 files changed, 71 insertions(+), 2 deletions(-)
diff --git a/django/contrib/auth/forms.py b/django/contrib/auth/forms.py
index ab46caa12e..31e96ff91c 100644
--- a/django/contrib/auth/forms.py
+++ b/django/contrib/auth/forms.py
@@ -154,14 +154,14 @@ class SetPasswordMixin:
if not usable_password:
return self.cleaned_data
- if not password1:
+ if not password1 and password1_field_name not in self.errors:
error = ValidationError(
self.fields[password1_field_name].error_messages["required"],
code="required",
)
self.add_error(password1_field_name, error)
- if not password2:
+ if not password2 and password2_field_name not in self.errors:
error = ValidationError(
self.fields[password2_field_name].error_messages["required"],
code="required",
diff --git a/tests/auth_tests/test_forms.py b/tests/auth_tests/test_forms.py
index b44f1edb24..3dd9324304 100644
--- a/tests/auth_tests/test_forms.py
+++ b/tests/auth_tests/test_forms.py
@@ -60,6 +60,21 @@ class TestDataMixin:
)
+class ExtraValidationFormMixin:
+ def __init__(self, *args, failing_fields=None, **kwargs):
+ super().__init__(*args, **kwargs)
+ self.failing_fields = failing_fields or {}
+
+ def failing_helper(self, field_name):
+ if field_name in self.failing_fields:
+ errors = [
+ ValidationError(error, code="invalid")
+ for error in self.failing_fields[field_name]
+ ]
+ raise ValidationError(errors)
+ return self.cleaned_data[field_name]
+
+
class BaseUserCreationFormTest(TestDataMixin, TestCase):
def test_user_already_exists(self):
data = {
@@ -324,6 +339,22 @@ class BaseUserCreationFormTest(TestDataMixin, TestCase):
"",
)
+ def test_password_extra_validations(self):
+ class ExtraValidationForm(ExtraValidationFormMixin, BaseUserCreationForm):
+ def clean_password1(self):
+ return self.failing_helper("password1")
+
+ def clean_password2(self):
+ return self.failing_helper("password2")
+
+ data = {"username": "extra", "password1": "abc", "password2": "abc"}
+ for fields in (["password1"], ["password2"], ["password1", "password2"]):
+ with self.subTest(fields=fields):
+ errors = {field: [f"Extra validation for {field}."] for field in fields}
+ form = ExtraValidationForm(data, failing_fields=errors)
+ self.assertIs(form.is_valid(), False)
+ self.assertDictEqual(form.errors, errors)
+
@override_settings(
AUTH_PASSWORD_VALIDATORS=[
{
@@ -865,6 +896,27 @@ class SetPasswordFormTest(TestDataMixin, TestCase):
form.fields[field_name].widget.attrs["autocomplete"], autocomplete
)
+ def test_password_extra_validations(self):
+ class ExtraValidationForm(ExtraValidationFormMixin, SetPasswordForm):
+ def clean_new_password1(self):
+ return self.failing_helper("new_password1")
+
+ def clean_new_password2(self):
+ return self.failing_helper("new_password2")
+
+ user = User.objects.get(username="testclient")
+ data = {"new_password1": "abc", "new_password2": "abc"}
+ for fields in (
+ ["new_password1"],
+ ["new_password2"],
+ ["new_password1", "new_password2"],
+ ):
+ with self.subTest(fields=fields):
+ errors = {field: [f"Extra validation for {field}."] for field in fields}
+ form = ExtraValidationForm(user, data, failing_fields=errors)
+ self.assertIs(form.is_valid(), False)
+ self.assertDictEqual(form.errors, errors)
+
class PasswordChangeFormTest(TestDataMixin, TestCase):
def test_incorrect_password(self):
@@ -1456,6 +1508,23 @@ class AdminPasswordChangeFormTest(TestDataMixin, TestCase):
self.assertEqual(form.cleaned_data["password2"], data["password2"])
self.assertEqual(form.changed_data, ["password"])
+ def test_password_extra_validations(self):
+ class ExtraValidationForm(ExtraValidationFormMixin, AdminPasswordChangeForm):
+ def clean_password1(self):
+ return self.failing_helper("password1")
+
+ def clean_password2(self):
+ return self.failing_helper("password2")
+
+ user = User.objects.get(username="testclient")
+ data = {"username": "extra", "password1": "abc", "password2": "abc"}
+ for fields in (["password1"], ["password2"], ["password1", "password2"]):
+ with self.subTest(fields=fields):
+ errors = {field: [f"Extra validation for {field}."] for field in fields}
+ form = ExtraValidationForm(user, data, failing_fields=errors)
+ self.assertIs(form.is_valid(), False)
+ self.assertDictEqual(form.errors, errors)
+
def test_non_matching_passwords(self):
user = User.objects.get(username="testclient")
data = {"password1": "password1", "password2": "password2"}
From adae619426b6f50046b3daaa744db52989c9d6db Mon Sep 17 00:00:00 2001
From: Natalia <124304+nessita@users.noreply.github.com>
Date: Fri, 31 May 2024 09:03:51 -0300
Subject: [PATCH 290/316] Updated release date for Django 5.0.7.
---
docs/releases/5.0.7.txt | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/docs/releases/5.0.7.txt b/docs/releases/5.0.7.txt
index 6677d353ce..cdaa57f766 100644
--- a/docs/releases/5.0.7.txt
+++ b/docs/releases/5.0.7.txt
@@ -2,7 +2,7 @@
Django 5.0.7 release notes
==========================
-*Expected June 4, 2024*
+*Expected July 9, 2024*
Django 5.0.7 fixes several bugs in 5.0.6.
From 6efbeb997cb0aa41555ac464a2b7579a37945b6a Mon Sep 17 00:00:00 2001
From: Ismael <38179854+ismaelzsilva@users.noreply.github.com>
Date: Sat, 8 Jun 2024 14:41:41 +0200
Subject: [PATCH 291/316] Fixed #35503 -- Removed distracting PHP reference in
tutorial 1.
---
docs/intro/tutorial01.txt | 12 ------------
1 file changed, 12 deletions(-)
diff --git a/docs/intro/tutorial01.txt b/docs/intro/tutorial01.txt
index cb296129c0..2d57620a96 100644
--- a/docs/intro/tutorial01.txt
+++ b/docs/intro/tutorial01.txt
@@ -64,18 +64,6 @@ work, see :ref:`troubleshooting-django-admin`.
``django`` (which will conflict with Django itself) or ``test`` (which
conflicts with a built-in Python package).
-.. admonition:: Where should this code live?
-
- If your background is in plain old PHP (with no use of modern frameworks),
- you're probably used to putting code under the web server's document root
- (in a place such as ``/var/www``). With Django, you don't do that. It's
- not a good idea to put any of this Python code within your web server's
- document root, because it risks the possibility that people may be able
- to view your code over the web. That's not good for security.
-
- Put your code in some directory **outside** of the document root, such as
- :file:`/home/mycode`.
-
Let's look at what :djadmin:`startproject` created:
.. code-block:: text
From 3556f63c4c18440445d93ce5bfb3d652dd76bcb4 Mon Sep 17 00:00:00 2001
From: Andreu Vallbona
Date: Sun, 9 Jun 2024 09:42:21 +0200
Subject: [PATCH 292/316] Simplified tutorial 1 when describing how to run the
dev server.
---
docs/intro/tutorial01.txt | 25 +------------------------
1 file changed, 1 insertion(+), 24 deletions(-)
diff --git a/docs/intro/tutorial01.txt b/docs/intro/tutorial01.txt
index 2d57620a96..e2fb7e38fd 100644
--- a/docs/intro/tutorial01.txt
+++ b/docs/intro/tutorial01.txt
@@ -151,30 +151,7 @@ Now that the server's running, visit http://127.0.0.1:8000/ with your web
browser. You'll see a "Congratulations!" page, with a rocket taking off.
It worked!
-.. admonition:: Changing the port
-
- By default, the :djadmin:`runserver` command starts the development server
- on the internal IP at port 8000.
-
- If you want to change the server's port, pass
- it as a command-line argument. For instance, this command starts the server
- on port 8080:
-
- .. console::
-
- $ python manage.py runserver 8080
-
- If you want to change the server's IP, pass it along with the port. For
- example, to listen on all available public IPs (which is useful if you are
- running Vagrant or want to show off your work on other computers on the
- network), use:
-
- .. console::
-
- $ python manage.py runserver 0.0.0.0:8000
-
- Full docs for the development server can be found in the
- :djadmin:`runserver` reference.
+(To serve the site on a different port, see the :djadmin:`runserver` reference.)
.. admonition:: Automatic reloading of :djadmin:`runserver`
From 85240139ca1a6b369019ba657ad80c3249a9cb37 Mon Sep 17 00:00:00 2001
From: Andreu Vallbona
Date: Sat, 8 Jun 2024 12:33:04 +0200
Subject: [PATCH 293/316] Replaced usage of "patch" with more precise terms in
faq, howto, and intro docs.
---
docs/faq/contributing.txt | 32 +++++++-------
docs/howto/windows.txt | 2 +-
docs/index.txt | 2 +-
docs/intro/contributing.txt | 85 ++++++++++++++++++-------------------
4 files changed, 60 insertions(+), 61 deletions(-)
diff --git a/docs/faq/contributing.txt b/docs/faq/contributing.txt
index 769cddc488..71a6a7a476 100644
--- a/docs/faq/contributing.txt
+++ b/docs/faq/contributing.txt
@@ -10,8 +10,8 @@ How can I get started contributing code to Django?
Thanks for asking! We've written an entire document devoted to this question.
It's titled :doc:`Contributing to Django `.
-I submitted a bug fix in the ticket system several weeks ago. Why are you ignoring my patch?
-============================================================================================
+I submitted a bug fix several weeks ago. Why are you ignoring my contribution?
+==============================================================================
Don't worry: We're not ignoring you!
@@ -34,21 +34,21 @@ that area of the code, to understand the problem and verify the fix:
database, are those instructions clear enough even for someone not
familiar with it?
-* If there are several patches attached to the ticket, is it clear what
- each one does, which ones can be ignored and which matter?
+* If there are several branches linked to the ticket, is it clear what each one
+ does, which ones can be ignored and which matter?
-* Does the patch include a unit test? If not, is there a very clear
+* Does the change include a unit test? If not, is there a very clear
explanation why not? A test expresses succinctly what the problem is,
- and shows that the patch actually fixes it.
+ and shows that the branch actually fixes it.
-If your patch stands no chance of inclusion in Django, we won't ignore it --
-we'll just close the ticket. So if your ticket is still open, it doesn't mean
+If your contribution is not suitable for inclusion in Django, we won't ignore
+it -- we'll close the ticket. So if your ticket is still open, it doesn't mean
we're ignoring you; it just means we haven't had time to look at it yet.
-When and how might I remind the team of a patch I care about?
-=============================================================
+When and how might I remind the team of a change I care about?
+==============================================================
-A polite, well-timed message to the mailing list is one way to get attention.
+A polite, well-timed message in the forum/branch is one way to get attention.
To determine the right time, you need to keep an eye on the schedule. If you
post your message right before a release deadline, you're not likely to get the
sort of attention you require.
@@ -68,11 +68,11 @@ issue over and over again. This sort of behavior will not gain you any
additional attention -- certainly not the attention that you need in order to
get your issue addressed.
-But I've reminded you several times and you keep ignoring my patch!
-===================================================================
+But I've reminded you several times and you keep ignoring my contribution!
+==========================================================================
-Seriously - we're not ignoring you. If your patch stands no chance of
-inclusion in Django, we'll close the ticket. For all the other tickets, we
+Seriously - we're not ignoring you. If your contribution is not suitable for
+inclusion in Django, we will close the ticket. For all the other tickets, we
need to prioritize our efforts, which means that some tickets will be
addressed before others.
@@ -83,7 +83,7 @@ are edge cases.
Another reason that a bug might be ignored for a while is if the bug is a
symptom of a larger problem. While we can spend time writing, testing and
-applying lots of little patches, sometimes the right solution is to rebuild. If
+applying lots of little changes, sometimes the right solution is to rebuild. If
a rebuild or refactor of a particular component has been proposed or is
underway, you may find that bugs affecting that component will not get as much
attention. Again, this is a matter of prioritizing scarce resources. By
diff --git a/docs/howto/windows.txt b/docs/howto/windows.txt
index 5dd40915d9..0ab976f039 100644
--- a/docs/howto/windows.txt
+++ b/docs/howto/windows.txt
@@ -6,7 +6,7 @@ This document will guide you through installing Python 3.12 and Django on
Windows. It also provides instructions for setting up a virtual environment,
which makes it easier to work on Python projects. This is meant as a beginner's
guide for users working on Django projects and does not reflect how Django
-should be installed when developing patches for Django itself.
+should be installed when developing changes for Django itself.
The steps in this guide have been tested with Windows 10. In other
versions, the steps would be similar. You will need to be familiar with using
diff --git a/docs/index.txt b/docs/index.txt
index 00d62f9f11..358c465df5 100644
--- a/docs/index.txt
+++ b/docs/index.txt
@@ -27,7 +27,7 @@ Are you new to Django or to programming? This is the place to start!
* **Advanced Tutorials:**
:doc:`How to write reusable apps ` |
- :doc:`Writing your first patch for Django `
+ :doc:`Writing your first contribution to Django `
Getting help
============
diff --git a/docs/intro/contributing.txt b/docs/intro/contributing.txt
index 06230b8ee3..7d590e76a2 100644
--- a/docs/intro/contributing.txt
+++ b/docs/intro/contributing.txt
@@ -1,6 +1,6 @@
-===================================
-Writing your first patch for Django
-===================================
+==========================================
+Writing your first contribution for Django
+==========================================
Introduction
============
@@ -52,16 +52,16 @@ __ https://web.libera.chat/#django-dev
What does this tutorial cover?
------------------------------
-We'll be walking you through contributing a patch to Django for the first time.
+We'll be walking you through contributing to Django for the first time.
By the end of this tutorial, you should have a basic understanding of both the
tools and the processes involved. Specifically, we'll be covering the following:
* Installing Git.
* Downloading a copy of Django's development version.
* Running Django's test suite.
-* Writing a test for your patch.
-* Writing the code for your patch.
-* Testing your patch.
+* Writing a test for your changes.
+* Writing the code for your changes.
+* Testing your changes.
* Submitting a pull request.
* Where to look for more information.
@@ -91,7 +91,7 @@ Installing Git
==============
For this tutorial, you'll need Git installed to download the current
-development version of Django and to generate patch files for the changes you
+development version of Django and to generate a branch for the changes you
make.
To check whether or not you have Git installed, enter ``git`` into the command
@@ -178,7 +178,7 @@ Go ahead and install the previously cloned copy of Django:
The installed version of Django is now pointing at your local copy by installing
in editable mode. You will immediately see any changes you make to it, which is
-of great help when writing your first patch.
+of great help when writing your first contribution.
Creating projects with a local copy of Django
---------------------------------------------
@@ -188,8 +188,8 @@ have to create a new virtual environment, :ref:`install the previously cloned
local copy of Django in editable mode `,
and create a new Django project outside of your local copy of Django. You will
immediately see any changes you make to Django in your new project, which is
-of great help when writing your first patch, especially if testing any changes
-to the UI.
+of great help when writing your first contribution, especially if testing
+any changes to the UI.
You can follow the :doc:`tutorial ` for help in creating a
Django project.
@@ -279,8 +279,8 @@ imaginary details:
We'll now implement this feature and associated tests.
-Creating a branch for your patch
-================================
+Creating a branch
+=================
Before making any changes, create a new branch for the ticket:
@@ -295,19 +295,19 @@ won't affect the main copy of the code that we cloned earlier.
Writing some tests for your ticket
==================================
-In most cases, for a patch to be accepted into Django it has to include tests.
-For bug fix patches, this means writing a regression test to ensure that the
-bug is never reintroduced into Django later on. A regression test should be
-written in such a way that it will fail while the bug still exists and pass
-once the bug has been fixed. For patches containing new features, you'll need
-to include tests which ensure that the new features are working correctly.
-They too should fail when the new feature is not present, and then pass once it
-has been implemented.
+In most cases, for a contribution to be accepted into Django it has to include
+tests. For bug fix contributions, this means writing a regression test to
+ensure that the bug is never reintroduced into Django later on. A regression
+test should be written in such a way that it will fail while the bug still
+exists and pass once the bug has been fixed. For contributions containing new
+features, you'll need to include tests which ensure that the new features are
+working correctly. They too should fail when the new feature is not present,
+and then pass once it has been implemented.
A good way to do this is to write your new tests first, before making any
changes to the code. This style of development is called
`test-driven development`__ and can be applied to both entire projects and
-single patches. After writing your tests, you then run them to make sure that
+single changes. After writing your tests, you then run them to make sure that
they do indeed fail (since you haven't fixed that bug or added that feature
yet). If your new tests don't fail, you'll need to fix them so that they do.
After all, a regression test that passes regardless of whether a bug is present
@@ -398,7 +398,7 @@ function to the correct file.
Running Django's test suite for the second time
===============================================
-Once you've verified that your patch and your test are working correctly, it's
+Once you've verified that your changes and test are working correctly, it's
a good idea to run the entire Django test suite to verify that your change
hasn't introduced any bugs into other areas of Django. While successfully
passing the entire test suite doesn't guarantee your code is bug free, it does
@@ -450,7 +450,7 @@ preview the HTML that will be generated.
Previewing your changes
=======================
-Now it's time to go through all the changes made in our patch. To stage all the
+Now it's time to review the changes made in the branch. To stage all the
changes ready for commit, run:
.. console::
@@ -528,12 +528,11 @@ Use the arrow keys to move up and down.
+ def test_make_toast(self):
+ self.assertEqual(make_toast(), 'toast')
-When you're done previewing the patch, hit the ``q`` key to return to the
-command line. If the patch's content looked okay, it's time to commit the
-changes.
+When you're done previewing the changes, hit the ``q`` key to return to the
+command line. If the diff looked okay, it's time to commit the changes.
-Committing the changes in the patch
-===================================
+Committing the changes
+======================
To commit the changes:
@@ -551,7 +550,7 @@ message guidelines ` and write a message like:
Pushing the commit and making a pull request
============================================
-After committing the patch, send it to your fork on GitHub (substitute
+After committing the changes, send it to your fork on GitHub (substitute
"ticket_99999" with the name of your branch if it's different):
.. console::
@@ -563,7 +562,7 @@ You can create a pull request by visiting the `Django GitHub page
recently pushed branches". Click "Compare & pull request" next to it.
Please don't do it for this tutorial, but on the next page that displays a
-preview of the patch, you would click "Create pull request".
+preview of the changes, you would click "Create pull request".
Next steps
==========
@@ -578,14 +577,14 @@ codebase.
More information for new contributors
-------------------------------------
-Before you get too into writing patches for Django, there's a little more
+Before you get too into contributing to Django, there's a little more
information on contributing that you should probably take a look at:
* You should make sure to read Django's documentation on
- :doc:`claiming tickets and submitting patches
+ :doc:`claiming tickets and submitting pull requests
`.
It covers Trac etiquette, how to claim tickets for yourself, expected
- coding style for patches, and many other important details.
+ coding style (both for code and docs), and many other important details.
* First time contributors should also read Django's :doc:`documentation
for first time contributors`.
It has lots of good advice for those of us who are new to helping out
@@ -600,19 +599,19 @@ Finding your first real ticket
------------------------------
Once you've looked through some of that information, you'll be ready to go out
-and find a ticket of your own to write a patch for. Pay special attention to
+and find a ticket of your own to contribute to. Pay special attention to
tickets with the "easy pickings" criterion. These tickets are often much
simpler in nature and are great for first time contributors. Once you're
-familiar with contributing to Django, you can move on to writing patches for
-more difficult and complicated tickets.
+familiar with contributing to Django, you can start working on more difficult
+and complicated tickets.
If you just want to get started already (and nobody would blame you!), try
-taking a look at the list of `easy tickets that need patches`__ and the
-`easy tickets that have patches which need improvement`__. If you're familiar
+taking a look at the list of `easy tickets without a branch`__ and the
+`easy tickets that have branches which need improvement`__. If you're familiar
with writing tests, you can also look at the list of
`easy tickets that need tests`__. Remember to follow the guidelines about
claiming tickets that were mentioned in the link to Django's documentation on
-:doc:`claiming tickets and submitting patches
+:doc:`claiming tickets and submitting branches
`.
__ https://code.djangoproject.com/query?status=new&status=reopened&has_patch=0&easy=1&col=id&col=summary&col=status&col=owner&col=type&col=milestone&order=priority
@@ -622,9 +621,9 @@ __ https://code.djangoproject.com/query?status=new&status=reopened&needs_tests=1
What's next after creating a pull request?
------------------------------------------
-After a ticket has a patch, it needs to be reviewed by a second set of eyes.
+After a ticket has a branch, it needs to be reviewed by a second set of eyes.
After submitting a pull request, update the ticket metadata by setting the
flags on the ticket to say "has patch", "doesn't need tests", etc, so others
-can find it for review. Contributing doesn't necessarily always mean writing a
-patch from scratch. Reviewing existing patches is also a very helpful
+can find it for review. Contributing doesn't necessarily always mean writing
+code from scratch. Reviewing open pull requests is also a very helpful
contribution. See :doc:`/internals/contributing/triaging-tickets` for details.
From f812b927a541fecc8ee445e1fd4dbe9d0540d523 Mon Sep 17 00:00:00 2001
From: Andreu Vallbona
Date: Sun, 9 Jun 2024 19:51:40 +0200
Subject: [PATCH 294/316] Moved confirmation about dev server running to
earlier in tutorial 1.
---
docs/intro/tutorial01.txt | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/docs/intro/tutorial01.txt b/docs/intro/tutorial01.txt
index e2fb7e38fd..f506fc605d 100644
--- a/docs/intro/tutorial01.txt
+++ b/docs/intro/tutorial01.txt
@@ -138,6 +138,10 @@ You'll see the following output on the command line:
Ignore the warning about unapplied database migrations for now; we'll deal
with the database shortly.
+Now that the server's running, visit http://127.0.0.1:8000/ with your web
+browser. You'll see a "Congratulations!" page, with a rocket taking off.
+It worked!
+
You've started the Django development server, a lightweight web server written
purely in Python. We've included this with Django so you can develop things
rapidly, without having to deal with configuring a production server -- such as
@@ -147,10 +151,6 @@ Now's a good time to note: **don't** use this server in anything resembling a
production environment. It's intended only for use while developing. (We're in
the business of making web frameworks, not web servers.)
-Now that the server's running, visit http://127.0.0.1:8000/ with your web
-browser. You'll see a "Congratulations!" page, with a rocket taking off.
-It worked!
-
(To serve the site on a different port, see the :djadmin:`runserver` reference.)
.. admonition:: Automatic reloading of :djadmin:`runserver`
From 719a42b589d7551fc84708044b9e984ce723c8a2 Mon Sep 17 00:00:00 2001
From: Devin Cox
Date: Wed, 12 Jun 2024 11:35:12 +0200
Subject: [PATCH 295/316] Fixed #34789 -- Prevented updateRelatedSelectsOptions
from adding entries to filter_horizontal chosen box.
Co-authored-by: yokeshwaran1
---
.../static/admin/js/admin/RelatedObjectLookups.js | 4 ++--
django/contrib/admin/widgets.py | 2 ++
tests/admin_views/test_related_object_lookups.py | 3 +++
tests/admin_widgets/tests.py | 2 +-
tests/modeladmin/tests.py | 12 ++++++++----
5 files changed, 16 insertions(+), 7 deletions(-)
diff --git a/django/contrib/admin/static/admin/js/admin/RelatedObjectLookups.js b/django/contrib/admin/static/admin/js/admin/RelatedObjectLookups.js
index 32e3f5b840..bc3accea37 100644
--- a/django/contrib/admin/static/admin/js/admin/RelatedObjectLookups.js
+++ b/django/contrib/admin/static/admin/js/admin/RelatedObjectLookups.js
@@ -96,8 +96,8 @@
// Extract the model from the popup url '...//add/' or
// '...///change/' depending the action (add or change).
const modelName = path.split('/')[path.split('/').length - (objId ? 4 : 3)];
- // Exclude autocomplete selects.
- const selectsRelated = document.querySelectorAll(`[data-model-ref="${modelName}"] select:not(.admin-autocomplete)`);
+ // Select elements with a specific model reference and context of "available-source".
+ const selectsRelated = document.querySelectorAll(`[data-model-ref="${modelName}"] [data-context="available-source"]`);
selectsRelated.forEach(function(select) {
if (currentSelect === select) {
diff --git a/django/contrib/admin/widgets.py b/django/contrib/admin/widgets.py
index 260ff33ca5..00e92bf42d 100644
--- a/django/contrib/admin/widgets.py
+++ b/django/contrib/admin/widgets.py
@@ -272,6 +272,8 @@ class RelatedFieldWidgetWrapper(forms.Widget):
self.can_add_related = can_add_related
# XXX: The UX does not support multiple selected values.
multiple = getattr(widget, "allow_multiple_selected", False)
+ if not isinstance(widget, AutocompleteMixin):
+ self.attrs["data-context"] = "available-source"
self.can_change_related = not multiple and can_change_related
# XXX: The deletion UX can be confusing when dealing with cascading deletion.
cascade = getattr(rel, "on_delete", None) is CASCADE
diff --git a/tests/admin_views/test_related_object_lookups.py b/tests/admin_views/test_related_object_lookups.py
index c10a5568d5..761819a50f 100644
--- a/tests/admin_views/test_related_object_lookups.py
+++ b/tests/admin_views/test_related_object_lookups.py
@@ -110,6 +110,9 @@ class SeleniumTests(AdminSeleniumTestCase):
{interesting_name}
""",
)
+ # Check the newly added instance is not also added in the "to" box.
+ m2m_to = self.selenium.find_element(By.ID, "id_m2m_to")
+ self.assertHTMLEqual(m2m_to.get_attribute("innerHTML"), "")
m2m_box = self.selenium.find_element(By.ID, "id_m2m_from")
self.assertHTMLEqual(
m2m_box.get_attribute("innerHTML"),
diff --git a/tests/admin_widgets/tests.py b/tests/admin_widgets/tests.py
index 4d18849692..6f009a6f3f 100644
--- a/tests/admin_widgets/tests.py
+++ b/tests/admin_widgets/tests.py
@@ -948,7 +948,7 @@ class RelatedFieldWidgetWrapperTests(SimpleTestCase):
output = wrapper.render("stream", "value")
expected = """