2014-02-10 23:05:01 +08:00
|
|
|
==========================
|
|
|
|
Django 1.6.3 release notes
|
|
|
|
==========================
|
|
|
|
|
2014-04-21 18:32:25 +08:00
|
|
|
*April 21, 2014*
|
2014-02-10 23:05:01 +08:00
|
|
|
|
2014-04-21 18:32:25 +08:00
|
|
|
Django 1.6.3 fixes several bugs in 1.6.2, including three security issues,
|
|
|
|
and makes one backwards-incompatible change:
|
|
|
|
|
|
|
|
Unexpected code execution using ``reverse()``
|
|
|
|
=============================================
|
|
|
|
|
|
|
|
Django's URL handling is based on a mapping of regex patterns
|
|
|
|
(representing the URLs) to callable views, and Django's own processing
|
|
|
|
consists of matching a requested URL against those patterns to
|
|
|
|
determine the appropriate view to invoke.
|
|
|
|
|
|
|
|
Django also provides a convenience function --
|
|
|
|
:func:`~django.core.urlresolvers.reverse` -- which performs this process
|
|
|
|
in the opposite direction. The ``reverse()`` function takes
|
|
|
|
information about a view and returns a URL which would invoke that
|
|
|
|
view. Use of ``reverse()`` is encouraged for application developers,
|
|
|
|
as the output of ``reverse()`` is always based on the current URL
|
|
|
|
patterns, meaning developers do not need to change other code when
|
|
|
|
making changes to URLs.
|
|
|
|
|
|
|
|
One argument signature for ``reverse()`` is to pass a dotted Python
|
|
|
|
path to the desired view. In this situation, Django will import the
|
|
|
|
module indicated by that dotted path as part of generating the
|
|
|
|
resulting URL. If such a module has import-time side effects, those
|
|
|
|
side effects will occur.
|
|
|
|
|
|
|
|
Thus it is possible for an attacker to cause unexpected code
|
|
|
|
execution, given the following conditions:
|
|
|
|
|
|
|
|
1. One or more views are present which construct a URL based on user
|
|
|
|
input (commonly, a "next" parameter in a querystring indicating
|
|
|
|
where to redirect upon successful completion of an action).
|
|
|
|
|
|
|
|
2. One or more modules are known to an attacker to exist on the
|
|
|
|
server's Python import path, which perform code execution with side
|
|
|
|
effects on importing.
|
|
|
|
|
|
|
|
To remedy this, ``reverse()`` will now only accept and import dotted
|
|
|
|
paths based on the view-containing modules listed in the project's :doc:`URL
|
|
|
|
pattern configuration </topics/http/urls>`, so as to ensure that only modules
|
|
|
|
the developer intended to be imported in this fashion can or will be imported.
|
|
|
|
|
|
|
|
Caching of anonymous pages could reveal CSRF token
|
|
|
|
==================================================
|
|
|
|
|
|
|
|
Django includes both a :doc:`caching framework </topics/cache>` and a system
|
|
|
|
for :doc:`preventing cross-site request forgery (CSRF) attacks
|
2014-11-01 06:39:46 +08:00
|
|
|
</ref/csrf/>`. The CSRF-protection system is based on a random nonce
|
2014-04-21 18:32:25 +08:00
|
|
|
sent to the client in a cookie which must be sent by the client on future
|
|
|
|
requests and, in forms, a hidden value which must be submitted back with the
|
|
|
|
form.
|
|
|
|
|
|
|
|
The caching framework includes an option to cache responses to
|
|
|
|
anonymous (i.e., unauthenticated) clients.
|
|
|
|
|
|
|
|
When the first anonymous request to a given page is by a client which
|
|
|
|
did not have a CSRF cookie, the cache framework will also cache the
|
|
|
|
CSRF cookie and serve the same nonce to other anonymous clients who
|
|
|
|
do not have a CSRF cookie. This can allow an attacker to obtain a
|
|
|
|
valid CSRF cookie value and perform attacks which bypass the check for
|
|
|
|
the cookie.
|
|
|
|
|
|
|
|
To remedy this, the caching framework will no longer cache such
|
|
|
|
responses. The heuristic for this will be:
|
|
|
|
|
|
|
|
1. If the incoming request did not submit any cookies, and
|
|
|
|
|
|
|
|
2. If the response did send one or more cookies, and
|
|
|
|
|
|
|
|
3. If the ``Vary: Cookie`` header is set on the response, then the
|
|
|
|
response will not be cached.
|
|
|
|
|
|
|
|
MySQL typecasting
|
|
|
|
=================
|
|
|
|
|
|
|
|
The MySQL database is known to "typecast" on certain queries; for
|
|
|
|
example, when querying a table which contains string values, but using
|
|
|
|
a query which filters based on an integer value, MySQL will first
|
|
|
|
silently coerce the strings to integers and return a result based on that.
|
|
|
|
|
|
|
|
If a query is performed without first converting values to the
|
|
|
|
appropriate type, this can produce unexpected results, similar to what
|
|
|
|
would occur if the query itself had been manipulated.
|
|
|
|
|
|
|
|
Django's model field classes are aware of their own types and most
|
|
|
|
such classes perform explicit conversion of query arguments to the
|
|
|
|
correct database-level type before querying. However, three model
|
|
|
|
field classes did not correctly convert their arguments:
|
|
|
|
|
|
|
|
* :class:`~django.db.models.FilePathField`
|
|
|
|
* :class:`~django.db.models.GenericIPAddressField`
|
|
|
|
* :class:`~django.db.models.IPAddressField`
|
|
|
|
|
|
|
|
These three fields have been updated to convert their arguments to the
|
|
|
|
correct types before querying.
|
|
|
|
|
|
|
|
Additionally, developers of custom model fields are now warned via
|
|
|
|
documentation to ensure their custom field classes will perform
|
|
|
|
appropriate type conversions, and users of the :meth:`raw()
|
|
|
|
<django.db.models.query.QuerySet.raw>` and :meth:`extra()
|
|
|
|
<django.db.models.query.QuerySet.extra>` query methods -- which allow the
|
|
|
|
developer to supply raw SQL or SQL fragments -- will be advised to ensure they
|
|
|
|
perform appropriate manual type conversions prior to executing queries.
|
2014-03-31 01:03:35 +08:00
|
|
|
|
|
|
|
``select_for_update()`` requires a transaction
|
|
|
|
==============================================
|
|
|
|
|
|
|
|
Historically, queries that use
|
|
|
|
:meth:`~django.db.models.query.QuerySet.select_for_update()` could be
|
|
|
|
executed in autocommit mode, outside of a transaction. Before Django
|
|
|
|
1.6, Django's automatic transactions mode allowed this to be used to
|
|
|
|
lock records until the next write operation. Django 1.6 introduced
|
|
|
|
database-level autocommit; since then, execution in such a context
|
|
|
|
voids the effect of ``select_for_update()``. It is, therefore, assumed
|
2014-04-10 08:40:33 +08:00
|
|
|
now to be an error and raises an exception.
|
2014-03-31 01:03:35 +08:00
|
|
|
|
|
|
|
This change was made because such errors can be caused by including an
|
|
|
|
app which expects global transactions (e.g. :setting:`ATOMIC_REQUESTS
|
2014-04-10 08:40:33 +08:00
|
|
|
<DATABASE-ATOMIC_REQUESTS>` set to ``True``), or Django's old autocommit
|
2014-03-31 01:03:35 +08:00
|
|
|
behavior, in a project which runs without them; and further, such
|
|
|
|
errors may manifest as data-corruption bugs.
|
|
|
|
|
2014-04-10 08:40:33 +08:00
|
|
|
This change may cause test failures if you use ``select_for_update()``
|
|
|
|
in a test class which is a subclass of
|
|
|
|
:class:`~django.test.TransactionTestCase` rather than
|
|
|
|
:class:`~django.test.TestCase`.
|
|
|
|
|
2014-03-31 01:03:35 +08:00
|
|
|
Other bugfixes and changes
|
|
|
|
==========================
|
2014-02-10 23:05:01 +08:00
|
|
|
|
2014-02-10 22:55:57 +08:00
|
|
|
* Content retrieved from the GeoIP library is now properly decoded from its
|
|
|
|
default ``iso-8859-1`` encoding
|
2014-12-19 22:54:29 +08:00
|
|
|
(:ticket:`21996`).
|
2014-02-15 10:04:44 +08:00
|
|
|
|
|
|
|
* Fixed ``AttributeError`` when using
|
|
|
|
:meth:`~django.db.models.query.QuerySet.bulk_create` with ``ForeignObject``
|
2014-12-19 22:54:29 +08:00
|
|
|
(:ticket:`21566`).
|
2014-03-01 09:42:56 +08:00
|
|
|
|
|
|
|
* Fixed crash of ``QuerySet``\s that use ``F() + timedelta()`` when their query
|
|
|
|
was compiled more once
|
2014-12-19 22:54:29 +08:00
|
|
|
(:ticket:`21643`).
|
2014-03-13 23:55:38 +08:00
|
|
|
|
|
|
|
* Prevented custom ``widget`` class attribute of
|
|
|
|
:class:`~django.forms.IntegerField` subclasses from being overwritten by the
|
|
|
|
code in their ``__init__`` method
|
2014-12-19 22:54:29 +08:00
|
|
|
(:ticket:`22245`).
|
2014-03-22 19:25:26 +08:00
|
|
|
|
|
|
|
* Improved :func:`~django.utils.html.strip_tags` accuracy (but it still cannot
|
|
|
|
guarantee an HTML-safe result, as stated in the documentation).
|
2014-03-24 19:33:04 +08:00
|
|
|
|
2014-03-31 19:10:25 +08:00
|
|
|
* Fixed a regression in the :mod:`django.contrib.gis` SQL compiler for
|
2014-12-19 22:54:29 +08:00
|
|
|
non-concrete fields (:ticket:`22250`).
|
2014-03-31 19:10:25 +08:00
|
|
|
|
2014-03-28 22:42:58 +08:00
|
|
|
* Fixed :attr:`ModelAdmin.preserve_filters
|
|
|
|
<django.contrib.admin.ModelAdmin.preserve_filters>` when running a site with
|
2014-12-19 22:54:29 +08:00
|
|
|
a URL prefix (:ticket:`21795`).
|
2014-03-28 22:42:58 +08:00
|
|
|
|
2014-04-02 02:48:06 +08:00
|
|
|
* Fixed a crash in the ``find_command`` management utility when the ``PATH``
|
|
|
|
environment variable wasn't set
|
2014-12-19 22:54:29 +08:00
|
|
|
(:ticket:`22256`).
|
2014-04-02 02:48:06 +08:00
|
|
|
|
2014-04-01 04:35:45 +08:00
|
|
|
* Fixed :djadmin:`changepassword` on Windows
|
2014-12-19 22:54:29 +08:00
|
|
|
(:ticket:`22364`).
|
2014-04-01 04:35:45 +08:00
|
|
|
|
2014-04-18 22:32:14 +08:00
|
|
|
* Avoided shadowing deadlock exceptions on MySQL
|
2014-12-19 22:54:29 +08:00
|
|
|
(:ticket:`22291`).
|
2014-04-18 22:32:14 +08:00
|
|
|
|
|
|
|
* Wrapped database exceptions in ``_set_autocommit``
|
2014-12-19 22:54:29 +08:00
|
|
|
(:ticket:`22321`).
|
2014-04-18 22:32:14 +08:00
|
|
|
|
|
|
|
* Fixed atomicity when closing a database connection or when the database server
|
2014-12-19 22:54:29 +08:00
|
|
|
disconnects (:ticket:`21239` and :ticket:`21202`)
|
2014-04-18 22:32:14 +08:00
|
|
|
|
2014-04-12 09:27:34 +08:00
|
|
|
* Fixed regression in ``prefetch_related`` that caused the related objects
|
|
|
|
query to include an unnecessary join
|
2014-12-19 22:54:29 +08:00
|
|
|
(:ticket:`21760`).
|
2014-04-12 09:27:34 +08:00
|
|
|
|
2014-03-24 19:33:04 +08:00
|
|
|
Additionally, Django's vendored version of six, :mod:`django.utils.six` has been
|
|
|
|
upgraded to the latest release (1.6.1).
|