Skip to content

Conversation

sp576
Copy link

@sp576 sp576 commented Mar 12, 2021

  • Version 2.2.20 upgrade

carltongibson and others added 30 commits November 2, 2020 08:39
…ning with xgettext 0.21+.

"format string with unnamed arguments cannot be properly localized"
warning is not raised in xgettext 0.21+.

This patch uses a message that causes an xgettext warning regardless of
the version.

Backport of 07a30f5 from master
Backport of 656b331 from master
…a archive.extract().

Thanks Florian Apolloner, Shai Berger, and Simon Charette for reviews.

Thanks Wang Baohua for the report.

Backport of 05413af from master.
…ia uploaded files.

Thanks Claude Paroz for the initial patch.
Thanks Dennis Brinkrolf for the report.

Backport of d4d800c from main.
The validate_file_name() sanitation introduced in
0b79eb3 correctly rejects the example
file name as containing path elements on Windows. This breaks the test
introduced in 914c72b to allow path
components for storages that may allow them.

Test is skipped pending a discussed storage refactoring to support this
use-case.

Backport of a708f39 from main
…tabs from being accepted in URLValidator on Python 3.9.5+.

In Python 3.9.5+ urllib.parse() automatically removes ASCII newlines
and tabs from URLs [1, 2]. Unfortunately it created an issue in
the URLValidator. URLValidator uses urllib.urlsplit() and
urllib.urlunsplit() for creating a URL variant with Punycode which no
longer contains newlines and tabs in Python 3.9.5+. As a consequence,
the regular expression matched the URL (without unsafe characters) and
the source value (with unsafe characters) was considered valid.

[1] https://bugs.python.org/issue43882 and
[2] python/cpython@76cd81d

Backport of e1e81aa from main.
- Validate filename returned by FileField.upload_to() not a filename
  passed to the FileField.generate_filename() (upload_to() may
  completely ignored passed filename).
- Allow relative paths (without dot segments) in the generated filename.

Thanks to Jakub Kleň for the report and review.
Thanks to all folks for checking this patch on existing projects.
Thanks Florian Apolloner and Markus Holtermann for the discussion and
implementation idea.

Regression in 0b79eb3.

Backport of b556999 from main.
felixxm and others added 30 commits November 18, 2021 13:33
…upstream access control based on URL paths.

Thanks Sjoerd Job Postmus and TengMA(@te3t123) for reports.

Backport of d4dcd5b from main.
…n Django 2.2.25, 3.1.14, and 3.2.10.

Follow up to d4dcd5b.
Backport of 5de12a3 from main
…SimilarityValidator.

Thanks Chris Bailey for the report.

Co-authored-by: Adam Johnson <me@adamj.eu>
…e in dictsort template filter.

Thanks to Dennis Brinkrolf for the report.

Co-authored-by: Adam Johnson <me@adamj.eu>
…rage subsystem.

Thanks to Dennis Brinkrolf for the report.
…mplate tag.

Thanks Keryn Knight for the report.

Backport of 394517f from main.

Co-authored-by: Adam Johnson <me@adamj.eu>
Thanks Alan Ryan for the report and initial patch.

Backport of fc18f36 from main.
…ate(), and extra() against SQL injection in column aliases.

Thanks Splunk team: Preston Elder, Jacob Davis, Jacob Moore,
Matt Hanson, David Briggs, and a security researcher: Danylo Dmytriiev
(DDV_UA) for the report.

Backport of 93cae5c from main.
… against SQL injection on PostgreSQL.

Backport of 6723a26 from main.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.