1
0
forked from pool/python-Django

45 Commits

Author SHA256 Message Date
296190542e Accepting request 1326319 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1326319
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=143
2026-01-12 09:16:08 +00:00
509b653a93 - Update to 5.2.10
* Fixed a bug in Django 5.2 where data exceeding max_length was
    silently truncated by QuerySet.bulk_create() on PostgreSQL
  * Fixed a bug where management command colorized help (introduced
    in Python 3.14) ignored the --no-color option and the DJANGO_COLORS
    setting
- Drop merged test_strip_tags_incomplete.patch

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=224
2026-01-09 10:19:53 +00:00
5b160c9df9 Accepting request 1324665 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1324665
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=142
2025-12-29 14:15:47 +00:00
d1f5740358 - Add test_strip_tags_incomplete.patch to fix behaviour with changes
in the Python interpreter
- Rebase test_strip_tags.patch

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=222
2025-12-29 09:49:28 +00:00
a08c10b5c3 Accepting request 1321589 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1321589
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=141
2025-12-09 11:46:45 +00:00
a1efaf50e9 - Update to 5.2.9 (bsc#1254437)
* CVE-2025-13372: Potential SQL injection in FilteredRelation column
    aliases on PostgreSQL
  * CVE-2025-64460: Potential denial-of-service vulnerability in XML
    Deserializer
  * Fixed a crash on Python 3.14+ that prevented template tag functions
    from being registered
  * Fixed more bugs and regressions, see upstream release notes

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=220
2025-12-08 13:35:41 +00:00
1cb7e345a7 Accepting request 1315976 from devel:languages:python:django
Forwarded request #1315948 from mcalabkova

- Update to 5.2.8 (bsc#1252926)
    * CVE-2025-64459: Potential SQL injection via _connector keyword argument
    * Added compatibility for oracledb 3.4.0
    * Fixed a bug in Django 5.2 where QuerySet.first() and QuerySet.last()
      raised an error on querysets performing aggregation that selected all
      fields of a composite primary key.

OBS-URL: https://build.opensuse.org/request/show/1315976
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=140
2025-11-07 17:20:57 +00:00
fdcf2d256d - Update to 5.2.8 (bsc#1252926)
* CVE-2025-64459: Potential SQL injection via _connector keyword argument
  * Added compatibility for oracledb 3.4.0
  * Fixed a bug in Django 5.2 where QuerySet.first() and QuerySet.last()
    raised an error on querysets performing aggregation that selected all
    fields of a composite primary key.

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=218
2025-11-06 09:57:16 +00:00
17b3c221a5 Accepting request 1308583 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1308583
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=139
2025-10-03 13:42:46 +00:00
be4f1447ca - Update to 5.2.7 (bsc#1250485, bsc#1250487)
* CVE-2025-59681: Potential SQL injection in QuerySet.annotate(), alias(),
    aggregate(), and extra() on MySQL and MariaDB
  * CVE-2025-59682: Potential partial directory-traversal via archive.extract()
  * Fixed a regression in Django 5.2 that reduced the color contrast of the
    label of filter_horizontal and filter_vertical widgets within a TabularInline

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=216
2025-10-02 10:47:09 +00:00
878b120faf Accepting request 1302720 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1302720
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=138
2025-09-05 19:42:17 +00:00
98f379ab77 - Update to 5.2.6 (bsc#1248810)
* CVE-2025-57833: Potential SQL injection in FilteredRelation column aliases
  * Fixed a bug where using QuerySet.values() or values_list() with a ForeignObject
    composed of multiple fields returned incorrect results instead of tuples of
    the referenced fields
- Rebased test_strip_tags.patch

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=214
2025-09-04 11:14:46 +00:00
c617be0174 Accepting request 1299114 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1299114
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=137
2025-08-13 14:23:21 +00:00
9d51974b18 - Update to 5.2.5
* Fixed a regression in Django 5.2.1 that prevented the usage of UNNEST
    PostgreSQL strategy of QuerySet.bulk_create() with foreign keys
  * Fixed a crash in Django 5.2 when filtering against a composite primary key
    using a tuple containing expressions
  * Fixed a crash in Django 5.2 when validating a model that uses
    GeneratedField or constraints composed of Q and Case lookups
  * Added compatibility for docutils 0.22
  * Fixed a crash in Django 5.2 when using a ManyToManyField on a model with
    a composite primary key, by extending the fields.E347 system check
- Convert to libalternatives on SLE-16-based and newer systems

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=212
2025-08-12 15:39:39 +00:00
78db34879c Accepting request 1296919 from devel:languages:python:django
- Reinstate Requires on tzdata, a lot of packages use it.

OBS-URL: https://build.opensuse.org/request/show/1296919
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=136
2025-08-03 11:36:22 +00:00
b367c16b9f - Reinstate Requires on tzdata, a lot of packages use it.
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=210
2025-08-01 02:09:29 +00:00
33a429e3af Accepting request 1296418 from devel:languages:python:django
- Add patch support-msgfmt-0.25.patch:
  * Support msgfmt 0.25 error messages changes. (bsc#1246966)
- Remove unneeded Requires on tzdata.

OBS-URL: https://build.opensuse.org/request/show/1296418
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=135
2025-07-31 15:44:58 +00:00
c5bef52b95 - Add patch support-msgfmt-0.25.patch:
* Support msgfmt 0.25 error messages changes. (bsc#1246966)
- Remove unneeded Requires on tzdata.

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=208
2025-07-30 06:04:11 +00:00
8d85f7e406 Accepting request 1294515 from devel:languages:python:django
- Add upstream test_strip_tags.patch to fix test errors with
  at-this-point future python interpreters

OBS-URL: https://build.opensuse.org/request/show/1294515
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=134
2025-07-20 13:28:54 +00:00
516be982f1 Fix typo in changelog
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=206
2025-07-19 10:39:03 +00:00
de18a0b8d5 - Add upstream test_trip_tags.patch to fix test errors with
at-this-point future python interpreters

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=205
2025-07-19 10:26:26 +00:00
48f0ae5840 Accepting request 1290998 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1290998
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=133
2025-07-08 13:28:05 +00:00
d027a9fa92 - Update to 5.2.4
* Fixed a log injection possibility by migrating remaining response logging
    to django.utils.log.log_response(), which safely escapes arguments
    such as the request path to prevent unsafe log output (CVE 2025-48432).
  * Fixed a regression in Django 5.2 that caused QuerySet.bulk_update() to
    incorrectly convert None to JSON null instead of SQL NULL for JSONField
  * Fixed a regression in Django 5.2.2 where the q parameter was removed from
    the internal django.http.MediaType.params property
  * Fixed a regression in Django 5.2.2 where HttpRequest.get_preferred_type()
    incorrectly preferred more specific media types with a lower quality
  * Fixed a crash in Django 5.2 when performing an __in lookup involving a
    composite primary key and a subquery on certain backends

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=203
2025-07-07 09:04:27 +00:00
94416b615b Accepting request 1283580 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1283580
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=132
2025-06-10 06:59:24 +00:00
019c08ddee - Update to 5.2.2 (bsc#1244095)
* CVE-2025-48432: Potential log injection via unescaped request path
  * Fixed a crash when using select_related against a ForeignObject
    originating from a model with a CompositePrimaryKey
  * Fixed a regression in Django 5.2 that caused a crash when no
    arguments were passed into QuerySet.union().
  * Fixed a regression in Django 5.2 that caused a crash when using OuterRef
    in PostgreSQL aggregate functions ArrayAgg, StringAgg, and JSONBAgg.
  * Fixed a bug in Django 5.2 where HttpRequest.get_preferred_type() did not
    account for media type parameters in Accept headers, reducing specificity
    in content negotiation.

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=201
2025-06-06 08:51:39 +00:00
2136d497be Accepting request 1276782 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1276782
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=131
2025-05-13 18:12:16 +00:00
c5f3696bba - Update to 5.2.1 (bsc#1242210)
* This release was built using an upgraded setuptools, producing
    filenames compliant with PEP 491 and PEP 625 and thus addressing
    a PyPI warning about non-compliant distribution filenames. This
    change only affects the Django packaging process and does not
    impact Django’s behavior.
  * CVE-2025-32873: Denial-of-service possibility in strip_tags()
  * Fixed a data corruption possibility in file_move_safe() when
    allow_overwrite=True
  * Fixed a regression introduced when fixing CVE 2025-26699, where
    the wordwrap template filter did not preserve empty lines between
    paragraphs after wrapping text
  * Fixed many bugs and regressions in Django 5.2, see upstream changelog

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=199
2025-05-12 08:52:11 +00:00
c1bbd7f1e2 Accepting request 1271967 from devel:languages:python:django
- Add missing runtime dependency on tzdata

OBS-URL: https://build.opensuse.org/request/show/1271967
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=130
2025-04-23 13:18:25 +00:00
81b62ad5fd - Add missing runtime dependency on tzdata
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=197
2025-04-22 15:46:56 +00:00
d0beaac527 add tzdata dependency
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=196
2025-04-17 09:43:50 +00:00
8cea3c6a81 Accepting request 1269472 from devel:languages:python:django
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/1269472
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=129
2025-04-15 18:47:09 +00:00
bb643f6074 - Update to 5.2
* Django 5.2 is designated as a long-term support release. It will receive 
    security updates for at least three years after its release.
  * Django 5.2 supports Python 3.10, 3.11, 3.12, and 3.13.
  ** What’s new in Django 5.2 **
  * Automatic models import in the shell
  * Composite Primary Keys
  * Simplified override of BoundField
  * ... and many more smaller features
  ** Backwards incompatible changes in 5.2 **
  * Database backend API changes
  * Dropped support for PostgreSQL 13
  * Changed MySQL connection character set default
  * ... and more, see upstream changelog
  ** Features deprecated in 5.2 **
  * The all argument for the django.contrib.staticfiles.finders.find()
    function is deprecated in favor of the find_all argument.
  * The ordering keyword argument of the PostgreSQL specific aggregation
    functions is deprecated in favor of the order_by argument.

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=194
2025-04-15 07:42:05 +00:00
111c0aa28e Accepting request 1267715 from devel:languages:python:django
- Update to 5.1.8
  * CVE-2025-27556: Potential denial-of-service vulnerability in 
    LoginView, LogoutView, and set_language() on Windows
  * Fixed a regression in Django 5.1.7 where the removal of the single_object 
    parameter unintentionally altered the signature and return type of 
    LogEntryManager.log_actions()
- update filelist to be compatible with newer setuptools

OBS-URL: https://build.opensuse.org/request/show/1267715
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=128
2025-04-11 14:45:30 +00:00
f6f2db94ee - Update to 5.1.8
* CVE-2025-27556: Potential denial-of-service vulnerability in 
    LoginView, LogoutView, and set_language() on Windows
  * Fixed a regression in Django 5.1.7 where the removal of the single_object 
    parameter unintentionally altered the signature and return type of 
    LogEntryManager.log_actions()

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=192
2025-04-07 14:33:55 +00:00
bd9d4e8e4b - update filelist to be compatible with newer setuptools
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=191
2025-03-30 08:29:55 +00:00
86ddc9c8c4 Accepting request 1254138 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1254138
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=127
2025-03-20 18:24:28 +00:00
9fb974a5c8 - Update to 5.1.7 (bsc#1239052)
* CVE-2025-26699: Potential denial-of-service vulnerability in
    django.utils.text.wrap()
  * Fixed a bug in Django 5.1 where the {% querystring %} template tag 
    returned an empty string rather than "?"
  * Fixed a bug in Django 5.1 where FileSystemStorage, with allow_overwrite 
    set to True, did not truncate the overwritten file content
  * Fixed a regression in Django 5.1 where the count and exists methods of 
    ManyToManyField related managers would always return 0 and False when 
    the intermediary model back references used to_field
  * Fixed a regression in Django 5.1 where the pre_save and post_save signals 
    for LogEntry were not sent when deleting a single object in the admin

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=189
2025-03-18 13:18:43 +00:00
4cfbeac954 Accepting request 1245111 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1245111
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=126
2025-02-11 20:20:19 +00:00
a5b485aaa4 - Update to 5.1.6
* Fixed a regression in Django 5.1.5 that caused validate_ipv6_address()
    and validate_ipv46_address() to crash when handling non-string values
  * Fixed a regression in Django 5.1 where password fields, despite being
    set to required=False, were still treated as required in forms derived
    from BaseUserCreationForm

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=187
2025-02-11 14:13:37 +00:00
3cf5681960 Accepting request 1238033 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1238033
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=125
2025-01-17 17:36:51 +00:00
b2d85302c5 - Update to 5.1.5 (bsc#1235856)
* CVE-2024-56374: Potential denial-of-service vulnerability in 
    IPv6 validation
  * Fixed a crash when applying migrations with references to the 
    removed Meta.index_together option

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=185
2025-01-15 12:08:37 +00:00
ed596b7283 Accepting request 1229315 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1229315
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=124
2024-12-10 22:43:01 +00:00
cec361ba85 - Update to 5.1.4 (bsc#1234231, CVE-2024-53908, bsc#1234232, CVE-2024-53907)
* CVE-2024-53907: Potential denial-of-service in django.utils.html.strip_tags()
  * CVE-2024-53908: Potential SQL injection in HasKey(lhs, rhs) on Oracle
  * Fixed a crash in createsuperuser on Python 3.13+ caused by an unhandled OSError
  * Fixed a regression in Django 5.1 where relational fields were not updated
  * Fixed a bug in Django 5.1 where DomainNameValidator accepted any input value 
    that contained a valid domain name, rather than only input values that were 
    a valid domain name
  * Fixed a regression in Django 5.1 that prevented the use of DB-IP databases with GeoIP2
  * Fixed a regression in Django 5.1 where non-ASCII fieldset names were not displayed 
    when rendering admin fieldsets

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=183
2024-12-09 11:00:19 +00:00
f398fa39be Accepting request 1208607 from devel:languages:python:django
OBS-URL: https://build.opensuse.org/request/show/1208607
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-Django?expand=0&rev=123
2024-10-18 13:52:54 +00:00
828c0a3f1e - Update to 5.1.2
* Fixed a regression in Django 5.1 that caused a crash when using 
    the PostgreSQL lookup trigram_similar on output fields from Concat
  * Fixed a regression in Django 5.1 that caused a crash of JSONObject() 
    when using server-side binding with PostgreSQL 16+
  * Fixed a regression in Django 5.1 that made selected items in 
    multi-select widgets indistinguishable from non-selected items in 
    the admin dark theme

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:django/python-Django?expand=0&rev=181
2024-10-17 10:32:45 +00:00
9 changed files with 559 additions and 85 deletions

View File

@@ -1,67 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
This file contains MD5, SHA1, and SHA256 checksums for the source-code
tarball and wheel files of Django 5.1.1, released September 3, 2024.
To use this file, you will need a working install of PGP or other
compatible public-key encryption software. You will also need to have
the Django release manager's public key in your keyring. This key has
the ID ``2EE82A8D9470983E`` and can be imported from the MIT
keyserver, for example, if using the open-source GNU Privacy Guard
implementation of PGP:
gpg --keyserver pgp.mit.edu --recv-key 2EE82A8D9470983E
or via the GitHub API:
curl https://github.com/nessita.gpg | gpg --import -
Once the key is imported, verify this file:
gpg --verify Django-5.1.1.checksum.txt
Once you have verified this file, you can use normal MD5, SHA1, or SHA256
checksumming applications to generate the checksums of the Django
package and compare them to the checksums listed below.
Release packages
================
https://www.djangoproject.com/m/releases/5.1/Django-5.1.1.tar.gz
https://www.djangoproject.com/m/releases/5.1/Django-5.1.1-py3-none-any.whl
MD5 checksums
=============
8024c23d7efe9e7acb04496ae22739c7 Django-5.1.1.tar.gz
7782d604d5b7cbb56e6b7da90595b6fa Django-5.1.1-py3-none-any.whl
SHA1 checksums
==============
8dedfc247c7bf010c93c5e5e30bca2012704a7ce Django-5.1.1.tar.gz
a038998584b227243ae6c1d29b3e7c2a166db918 Django-5.1.1-py3-none-any.whl
SHA256 checksums
================
021ffb7fdab3d2d388bc8c7c2434eb9c1f6f4d09e6119010bbb1694dda286bc2 Django-5.1.1.tar.gz
71603f27dac22a6533fb38d83072eea9ddb4017fead6f67f2562a40402d61c3f Django-5.1.1-py3-none-any.whl
-----BEGIN PGP SIGNATURE-----
iQJcBAEBCABGFiEEW1sboQ2FrHxcduOPLugqjZRwmD4FAmbXARwoHDEyNDMwNCtu
ZXNzaXRhQHVzZXJzLm5vcmVwbHkuZ2l0aHViLmNvbQAKCRAu6CqNlHCYPmSPEACs
vwz2HvzWF+YpeXx1jLQJ6/JdQjmRPT/6pp+r0GW6KG6UqmawMsvRSX/k4zdvceYx
c7SVAIJwWNwZsPHbrjetGAI1NbAoWYxl8soCTIMR9A0mSlZebBSHb0+oUMQcwiZ5
E4OMBv7QYYo8QVGs1KH1dMx4Unn+5VlAlaxo9BOa94PtCzUWxsIuji+yv1uKDVVa
BQivwy0ZuzBPMkHHaTAb5byWtsbLFhHeXkWirEzivecIVxvd88mO1GXh5zY3wjRW
UKLHQCNT6e3s7UB/ZS7IsQp7bPCmFfLsVp8+8pbABXqYHn6rM4/VCLhN06s/xVID
DSPkqNQz39gRbn5UNVSTLVNv/yoQ6crIHw9AiRECrJ3UaRzeDcQStnmxJx92duDr
bDLnmTI0Sx7+hqQjNOrGCFg6vO8ZVosxOgM/FgbXDKyA+FqtfbdR+/tW9KKtunPy
AHs87A6VqYMRzyTvRChzVpKKYrdMckjRUuyrogQJEuE5VJ0o5579FxBy9OekA3km
FTscEn8GiC4EZTR48IWSsNOCYn7VjihHvZGo4eO0uZRYFChTKc6Sah7p+i41XV1W
FLhOqCqF/4Kl6u3dWkWPAnm8mmWDsARpGbAoxCkd8AJtlR0nScdYuwOshlpixIVa
XgUJwJ3rzCSTd35tq+sF7y3WT3bPyUl/DwkuJVHhFA==
=i1OF
-----END PGP SIGNATURE-----

View File

@@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:021ffb7fdab3d2d388bc8c7c2434eb9c1f6f4d09e6119010bbb1694dda286bc2
size 10675933

View File

@@ -0,0 +1,67 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
This file contains MD5, SHA1, and SHA256 checksums for the
source-code tarball and wheel files of Django 5.2.10, released January 6, 2026.
To use this file, you will need a working install of PGP or other
compatible public-key encryption software. You will also need to have
the Django release manager's public key in your keyring. This key has
the ID ``131403F4D16D8DC7`` and can be imported from the MIT
keyserver, for example, if using the open-source GNU Privacy Guard
implementation of PGP:
gpg --keyserver pgp.mit.edu --recv-key 131403F4D16D8DC7
or via the GitHub API:
curl https://github.com/jacobtylerwalls.gpg | gpg --import -
Once the key is imported, verify this file:
gpg --verify Django-5.2.10.checksum.txt
Once you have verified this file, you can use normal MD5, SHA1, or SHA256
checksumming applications to generate the checksums of the Django
package and compare them to the checksums listed below.
Release packages
================
https://www.djangoproject.com/download/5.2.10/tarball/
https://www.djangoproject.com/download/5.2.10/wheel/
MD5 checksums
=============
98e667c17123f7bbd2d7d1db32f9ccdd django-5.2.10.tar.gz
18c82b021ddfeae5703023a784e46945 django-5.2.10-py3-none-any.whl
SHA1 checksums
==============
a215351eb827f0f8dbab6a83db334dfd45a040d8 django-5.2.10.tar.gz
363f7332c354a91cfd40cbcd4a1df4291064fc64 django-5.2.10-py3-none-any.whl
SHA256 checksums
================
74df100784c288c50a2b5cad59631d71214f40f72051d5af3fdf220c20bdbbbe django-5.2.10.tar.gz
cf85067a64250c95d5f9067b056c5eaa80591929f7e16fbcd997746e40d6c45c django-5.2.10-py3-none-any.whl
-----BEGIN PGP SIGNATURE-----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=GJeZ
-----END PGP SIGNATURE-----

3
django-5.2.10.tar.gz Normal file
View File

@@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:74df100784c288c50a2b5cad59631d71214f40f72051d5af3fdf220c20bdbbbe
size 10880754

View File

@@ -1,3 +1,249 @@
-------------------------------------------------------------------
Fri Jan 9 09:41:44 UTC 2026 - Markéta Machová <mmachova@suse.com>
- Update to 5.2.10
* Fixed a bug in Django 5.2 where data exceeding max_length was
silently truncated by QuerySet.bulk_create() on PostgreSQL
* Fixed a bug where management command colorized help (introduced
in Python 3.14) ignored the --no-color option and the DJANGO_COLORS
setting
- Drop merged test_strip_tags_incomplete.patch
-------------------------------------------------------------------
Mon Dec 29 09:10:21 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Add test_strip_tags_incomplete.patch to fix behaviour with changes
in the Python interpreter
- Rebase test_strip_tags.patch
-------------------------------------------------------------------
Mon Dec 8 11:54:46 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Update to 5.2.9 (bsc#1254437)
* CVE-2025-13372: Potential SQL injection in FilteredRelation column
aliases on PostgreSQL
* CVE-2025-64460: Potential denial-of-service vulnerability in XML
Deserializer
* Fixed a crash on Python 3.14+ that prevented template tag functions
from being registered
* Fixed more bugs and regressions, see upstream release notes
-------------------------------------------------------------------
Thu Nov 6 07:20:08 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Update to 5.2.8 (bsc#1252926)
* CVE-2025-64459: Potential SQL injection via _connector keyword argument
* Added compatibility for oracledb 3.4.0
* Fixed a bug in Django 5.2 where QuerySet.first() and QuerySet.last()
raised an error on querysets performing aggregation that selected all
fields of a composite primary key.
-------------------------------------------------------------------
Thu Oct 2 09:41:30 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Update to 5.2.7 (bsc#1250485, bsc#1250487)
* CVE-2025-59681: Potential SQL injection in QuerySet.annotate(), alias(),
aggregate(), and extra() on MySQL and MariaDB
* CVE-2025-59682: Potential partial directory-traversal via archive.extract()
* Fixed a regression in Django 5.2 that reduced the color contrast of the
label of filter_horizontal and filter_vertical widgets within a TabularInline
-------------------------------------------------------------------
Thu Sep 4 10:02:00 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Update to 5.2.6 (bsc#1248810)
* CVE-2025-57833: Potential SQL injection in FilteredRelation column aliases
* Fixed a bug where using QuerySet.values() or values_list() with a ForeignObject
composed of multiple fields returned incorrect results instead of tuples of
the referenced fields
- Rebased test_strip_tags.patch
-------------------------------------------------------------------
Tue Aug 12 10:52:26 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Update to 5.2.5
* Fixed a regression in Django 5.2.1 that prevented the usage of UNNEST
PostgreSQL strategy of QuerySet.bulk_create() with foreign keys
* Fixed a crash in Django 5.2 when filtering against a composite primary key
using a tuple containing expressions
* Fixed a crash in Django 5.2 when validating a model that uses
GeneratedField or constraints composed of Q and Case lookups
* Added compatibility for docutils 0.22
* Fixed a crash in Django 5.2 when using a ManyToManyField on a model with
a composite primary key, by extending the fields.E347 system check
- Convert to libalternatives on SLE-16-based and newer systems
-------------------------------------------------------------------
Fri Aug 1 02:09:01 UTC 2025 - Steve Kowalik <steven.kowalik@suse.com>
- Reinstate Requires on tzdata, a lot of packages use it.
-------------------------------------------------------------------
Wed Jul 30 06:03:44 UTC 2025 - Steve Kowalik <steven.kowalik@suse.com>
- Add patch support-msgfmt-0.25.patch:
* Support msgfmt 0.25 error messages changes. (bsc#1246966)
- Remove unneeded Requires on tzdata.
-------------------------------------------------------------------
Sat Jul 19 06:51:37 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Add upstream test_strip_tags.patch to fix test errors with
at-this-point future python interpreters
-------------------------------------------------------------------
Thu Jul 3 12:47:34 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Update to 5.2.4
* Fixed a log injection possibility by migrating remaining response logging
to django.utils.log.log_response(), which safely escapes arguments
such as the request path to prevent unsafe log output (CVE 2025-48432).
* Fixed a regression in Django 5.2 that caused QuerySet.bulk_update() to
incorrectly convert None to JSON null instead of SQL NULL for JSONField
* Fixed a regression in Django 5.2.2 where the q parameter was removed from
the internal django.http.MediaType.params property
* Fixed a regression in Django 5.2.2 where HttpRequest.get_preferred_type()
incorrectly preferred more specific media types with a lower quality
* Fixed a crash in Django 5.2 when performing an __in lookup involving a
composite primary key and a subquery on certain backends
-------------------------------------------------------------------
Thu Jun 5 11:53:48 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Update to 5.2.2 (bsc#1244095)
* CVE-2025-48432: Potential log injection via unescaped request path
* Fixed a crash when using select_related against a ForeignObject
originating from a model with a CompositePrimaryKey
* Fixed a regression in Django 5.2 that caused a crash when no
arguments were passed into QuerySet.union().
* Fixed a regression in Django 5.2 that caused a crash when using OuterRef
in PostgreSQL aggregate functions ArrayAgg, StringAgg, and JSONBAgg.
* Fixed a bug in Django 5.2 where HttpRequest.get_preferred_type() did not
account for media type parameters in Accept headers, reducing specificity
in content negotiation.
-------------------------------------------------------------------
Mon May 12 08:20:40 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Update to 5.2.1 (bsc#1242210)
* This release was built using an upgraded setuptools, producing
filenames compliant with PEP 491 and PEP 625 and thus addressing
a PyPI warning about non-compliant distribution filenames. This
change only affects the Django packaging process and does not
impact Djangos behavior.
* CVE-2025-32873: Denial-of-service possibility in strip_tags()
* Fixed a data corruption possibility in file_move_safe() when
allow_overwrite=True
* Fixed a regression introduced when fixing CVE 2025-26699, where
the wordwrap template filter did not preserve empty lines between
paragraphs after wrapping text
* Fixed many bugs and regressions in Django 5.2, see upstream changelog
-------------------------------------------------------------------
Tue Apr 22 15:46:20 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Add missing runtime dependency on tzdata
-------------------------------------------------------------------
Mon Apr 7 15:02:18 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Update to 5.2
* Django 5.2 is designated as a long-term support release. It will receive
security updates for at least three years after its release.
* Django 5.2 supports Python 3.10, 3.11, 3.12, and 3.13.
** Whats new in Django 5.2 **
* Automatic models import in the shell
* Composite Primary Keys
* Simplified override of BoundField
* ... and many more smaller features
** Backwards incompatible changes in 5.2 **
* Database backend API changes
* Dropped support for PostgreSQL 13
* Changed MySQL connection character set default
* ... and more, see upstream changelog
** Features deprecated in 5.2 **
* The all argument for the django.contrib.staticfiles.finders.find()
function is deprecated in favor of the find_all argument.
* The ordering keyword argument of the PostgreSQL specific aggregation
functions is deprecated in favor of the order_by argument.
-------------------------------------------------------------------
Mon Apr 7 14:19:10 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Update to 5.1.8
* CVE-2025-27556: Potential denial-of-service vulnerability in
LoginView, LogoutView, and set_language() on Windows
* Fixed a regression in Django 5.1.7 where the removal of the single_object
parameter unintentionally altered the signature and return type of
LogEntryManager.log_actions()
-------------------------------------------------------------------
Sun Mar 30 08:28:57 UTC 2025 - Dirk Müller <dmueller@suse.com>
- update filelist to be compatible with newer setuptools
-------------------------------------------------------------------
Tue Mar 18 13:01:55 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Update to 5.1.7 (bsc#1239052)
* CVE-2025-26699: Potential denial-of-service vulnerability in
django.utils.text.wrap()
* Fixed a bug in Django 5.1 where the {% querystring %} template tag
returned an empty string rather than "?"
* Fixed a bug in Django 5.1 where FileSystemStorage, with allow_overwrite
set to True, did not truncate the overwritten file content
* Fixed a regression in Django 5.1 where the count and exists methods of
ManyToManyField related managers would always return 0 and False when
the intermediary model back references used to_field
* Fixed a regression in Django 5.1 where the pre_save and post_save signals
for LogEntry were not sent when deleting a single object in the admin
-------------------------------------------------------------------
Tue Feb 11 12:52:16 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Update to 5.1.6
* Fixed a regression in Django 5.1.5 that caused validate_ipv6_address()
and validate_ipv46_address() to crash when handling non-string values
* Fixed a regression in Django 5.1 where password fields, despite being
set to required=False, were still treated as required in forms derived
from BaseUserCreationForm
-------------------------------------------------------------------
Wed Jan 15 07:53:44 UTC 2025 - Markéta Machová <mmachova@suse.com>
- Update to 5.1.5 (bsc#1235856)
* CVE-2024-56374: Potential denial-of-service vulnerability in
IPv6 validation
* Fixed a crash when applying migrations with references to the
removed Meta.index_together option
-------------------------------------------------------------------
Mon Dec 9 09:13:02 UTC 2024 - Markéta Machová <mmachova@suse.com>
- Update to 5.1.4 (bsc#1234231, CVE-2024-53908, bsc#1234232, CVE-2024-53907)
* CVE-2024-53907: Potential denial-of-service in django.utils.html.strip_tags()
* CVE-2024-53908: Potential SQL injection in HasKey(lhs, rhs) on Oracle
* Fixed a crash in createsuperuser on Python 3.13+ caused by an unhandled OSError
* Fixed a regression in Django 5.1 where relational fields were not updated
* Fixed a bug in Django 5.1 where DomainNameValidator accepted any input value
that contained a valid domain name, rather than only input values that were
a valid domain name
* Fixed a regression in Django 5.1 that prevented the use of DB-IP databases with GeoIP2
* Fixed a regression in Django 5.1 where non-ASCII fieldset names were not displayed
when rendering admin fieldsets
-------------------------------------------------------------------
Thu Oct 17 10:16:22 UTC 2024 - Markéta Machová <mmachova@suse.com>
- Update to 5.1.2
* Fixed a regression in Django 5.1 that caused a crash when using
the PostgreSQL lookup trigram_similar on output fields from Concat
* Fixed a regression in Django 5.1 that caused a crash of JSONObject()
when using server-side binding with PostgreSQL 16+
* Fixed a regression in Django 5.1 that made selected items in
multi-select widgets indistinguishable from non-selected items in
the admin dark theme
-------------------------------------------------------------------
Wed Sep 4 07:21:54 UTC 2024 - Alberto Planas Dominguez <aplanas@suse.com>

View File

@@ -87,4 +87,98 @@ mF4yM4XSBBno1mWgaSb42LInsYv/ti1VrOrBVzmAYAoUTZL0tfEXeyzHEmWGWVHe
SQMBvCqUmh/EcQDzPtkqjQQ1LyE5s2fyt5u+jE9JdK/61yKzbKI2UbpPtAaKSlDv
eAgTzM5bOOqtGR7VR2hlCM4I4k2D0Y/snh2HzA==
=ul9f
-----END PGP PUBLIC KEY BLOCK-----
-----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP PUBLIC KEY BLOCK-----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=B8gH
-----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP PUBLIC KEY BLOCK-----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=0YqB
-----END PGP PUBLIC KEY BLOCK-----

View File

@@ -1,7 +1,7 @@
#
# spec file for package python-Django
#
# Copyright (c) 2024 SUSE LLC
# Copyright (c) 2026 SUSE LLC and contributors
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -16,22 +16,30 @@
#
%define skip_python2 1
%define skip_python36 1
# Selenium and memcached are not operational
%bcond_with selenium
%bcond_with memcached
%{?sle15_python_module_pythons}
%if 0%{?suse_version} > 1500
%bcond_without libalternatives
%else
%bcond_with libalternatives
%endif
Name: python-Django
Version: 5.1.1
Version: 5.2.10
Release: 0
Summary: A high-level Python Web framework
License: BSD-3-Clause
URL: https://www.djangoproject.com
Source: https://www.djangoproject.com/m/releases/5.1/Django-%{version}.tar.gz
Source1: https://media.djangoproject.com/pgp/Django-%{version}.checksum.txt
Source: https://www.djangoproject.com/m/releases/5.2/django-%{version}.tar.gz
Source1: https://www.djangoproject.com/m/pgp/Django-%{version}.checksum.txt
Source2: %{name}.keyring
Source99: python-Django-rpmlintrc
# PATCH-FIX-UPSTREAM https://github.com/django/django/pull/19530 Fixed #36421 -- Made test_msgfmt_error_including_non_ascii compatible with with msgfmt 0.25.
Patch1: support-msgfmt-0.25.patch
# PATCH-FIX-UPSTREAM https://github.com/django/django/pull/19639 Fixed #36499 -- Adjusted utils_tests.test_html.TestUtilsHtml.test_strip_tags following Python's HTMLParser new behavior.
# fixed and refined upstream, but some of our interpreters weren't updated to a new version yet and still only carry the patch, so providing the non-conditional version
Patch2: test_strip_tags.patch
BuildRequires: %{python_module Jinja2 >= 2.9.2}
BuildRequires: %{python_module Pillow >= 6.2.0}
BuildRequires: %{python_module PyYAML}
@@ -53,13 +61,11 @@ BuildRequires: fdupes
BuildRequires: gpg2
BuildRequires: python-rpm-macros
Requires: python
Requires: python-Pillow >= 6.2.0
Requires: python-asgiref >= 3.7.0
Requires: python-sqlparse >= 0.3.1
Requires: python-tzdata
Requires(post): update-alternatives
Requires(postun): update-alternatives
Recommends: python-Jinja2 >= 2.9.2
Recommends: python-Pillow >= 6.2.0
Recommends: python-PyYAML
Recommends: python-argon2-cffi >= 19.1.0
Recommends: python-bcrypt
@@ -71,6 +77,13 @@ Obsoletes: python-django < %{version}
Provides: python-South = %{version}
Obsoletes: python-South < %{version}
BuildArch: noarch
%if %{with libalternatives}
BuildRequires: alts
Requires: alts
%else
Requires(post): update-alternatives
Requires(postun): update-alternatives
%endif
%if %{with memcached}
BuildRequires: %{python_module pylibmc}
BuildRequires: %{python_module pymemcache}
@@ -96,11 +109,11 @@ gpg --import %{SOURCE2}
gpg --verify %{SOURCE1}
#
# Verify hashes in that file against source tarball.
echo "`grep -e '^[0-9a-f]\{32\} Django-%{version}.tar.gz' %{SOURCE1} | cut -c1-32` %{SOURCE0}" | md5sum -c
echo "`grep -e '^[0-9a-f]\{40\} Django-%{version}.tar.gz' %{SOURCE1} | cut -c1-40` %{SOURCE0}" | sha1sum -c
echo "`grep -e '^[0-9a-f]\{64\} Django-%{version}.tar.gz' %{SOURCE1} | cut -c1-64` %{SOURCE0}" | sha256sum -c
echo "`grep -e '^[0-9a-f]\{32\} django-%{version}.tar.gz' %{SOURCE1} | cut -c1-32` %{SOURCE0}" | md5sum -c
echo "`grep -e '^[0-9a-f]\{40\} django-%{version}.tar.gz' %{SOURCE1} | cut -c1-40` %{SOURCE0}" | sha1sum -c
echo "`grep -e '^[0-9a-f]\{64\} django-%{version}.tar.gz' %{SOURCE1} | cut -c1-64` %{SOURCE0}" | sha256sum -c
%autosetup -p1 -n Django-%{version}
%autosetup -p1 -n django-%{version}
%build
%pyproject_wheel
@@ -131,6 +144,9 @@ export PATH=%{_libdir}/chromium:$PATH
%python_expand PYTHONPATH=.:%{buildroot}%{$python_sitelib} $python tests/runtests.py -v 2
%endif
%pre
%python_libalternatives_reset_alternative django-admin
%post
%{python_install_alternative django-admin}
@@ -143,6 +159,6 @@ export PATH=%{_libdir}/chromium:$PATH
%python_alternative %{_bindir}/django-admin
%{_datadir}/bash-completion/completions/django_bash_completion-%{python_bin_suffix}.sh
%{python_sitelib}/django
%{python_sitelib}/Django-%{version}*-info
%{python_sitelib}/[Dd]jango-%{version}*-info
%changelog

69
support-msgfmt-0.25.patch Normal file
View File

@@ -0,0 +1,69 @@
From 3609c463a4cfc5a7e76f4d4ba008c5096b1f1437 Mon Sep 17 00:00:00 2001
From: Jericho Serrano <118679068+jericho1050@users.noreply.github.com>
Date: Fri, 6 Jun 2025 04:58:29 +0800
Subject: [PATCH] Fixed #36421 -- Made test_msgfmt_error_including_non_ascii
compatible with msgfmt 0.25.
---
tests/i18n/test_compilation.py | 25 +++++++++++++++++++++++--
1 file changed, 23 insertions(+), 2 deletions(-)
diff --git a/tests/i18n/test_compilation.py b/tests/i18n/test_compilation.py
index 4b0bb9f6bb1..3a57dbf0765 100644
--- a/tests/i18n/test_compilation.py
+++ b/tests/i18n/test_compilation.py
@@ -1,5 +1,6 @@
import gettext as gettext_module
import os
+import re
import stat
import unittest
from io import StringIO
@@ -8,10 +9,12 @@
from unittest import mock
from django.core.management import CommandError, call_command, execute_from_command_line
-from django.core.management.utils import find_command
+from django.core.management.utils import find_command, popen_wrapper
from django.test import SimpleTestCase, override_settings
from django.test.utils import captured_stderr, captured_stdout
from django.utils import translation
+from django.utils.encoding import DEFAULT_LOCALE_ENCODING
+from django.utils.functional import cached_property
from django.utils.translation import gettext
from .utils import RunInTmpDirMixin, copytree
@@ -254,6 +257,17 @@ def test_no_dirs_accidentally_skipped(self):
class CompilationErrorHandling(MessageCompilationTests):
+ @cached_property
+ def msgfmt_version(self):
+ # Note that msgfmt is installed via GNU gettext tools, hence the msgfmt
+ # version should align to gettext.
+ out, err, status = popen_wrapper(
+ ["msgfmt", "--version"],
+ stdout_encoding=DEFAULT_LOCALE_ENCODING,
+ )
+ m = re.search(r"(\d+)\.(\d+)\.?(\d+)?", out)
+ return tuple(int(d) for d in m.groups() if d is not None)
+
def test_error_reported_by_msgfmt(self):
# po file contains wrong po formatting.
with self.assertRaises(CommandError):
@@ -278,7 +292,14 @@ def test_msgfmt_error_including_non_ascii(self):
call_command(
"compilemessages", locale=["ko"], stdout=StringIO(), stderr=stderr
)
- self.assertIn("' cannot start a field name", stderr.getvalue())
+ if self.msgfmt_version < (0, 25):
+ error_msg = "' cannot start a field name"
+ else:
+ error_msg = (
+ "a field name starts with a character that is not alphanumerical "
+ "or underscore"
+ )
+ self.assertIn(error_msg, stderr.getvalue())
class ProjectAndAppTests(MessageCompilationTests):

49
test_strip_tags.patch Normal file
View File

@@ -0,0 +1,49 @@
From 578ef30376fd279865d1719fcad064a00c625a6b Mon Sep 17 00:00:00 2001
From: Natalia <124304+nessita@users.noreply.github.com>
Date: Mon, 14 Jul 2025 14:45:03 -0300
Subject: [PATCH] Fixed #36499 -- Adjusted
utils_tests.test_html.TestUtilsHtml.test_strip_tags following Python's
HTMLParser new behavior.
---
tests/test_utils/tests.py | 4 ++--
tests/utils_tests/test_html.py | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
Index: django-5.2.9/tests/test_utils/tests.py
===================================================================
--- django-5.2.9.orig/tests/test_utils/tests.py
+++ django-5.2.9/tests/test_utils/tests.py
@@ -945,10 +945,10 @@ class HTMLEqualTests(SimpleTestCase):
self.assertHTMLEqual("", "<p>")
error_msg = (
"First argument is not valid HTML:\n"
- "('Unexpected end tag `div` (Line 1, Column 6)', (1, 6))"
+ "('Unexpected end tag `div` (Line 1, Column 0)', (1, 0))"
)
with self.assertRaisesMessage(AssertionError, error_msg):
- self.assertHTMLEqual("< div></div>", "<div></div>")
+ self.assertHTMLEqual("</div>", "<div></div>")
with self.assertRaises(HTMLParseError):
parse_html("</p>")
Index: django-5.2.9/tests/utils_tests/test_html.py
===================================================================
--- django-5.2.9.orig/tests/utils_tests/test_html.py
+++ django-5.2.9/tests/utils_tests/test_html.py
@@ -187,13 +187,13 @@ class TestUtilsHtml(SimpleTestCase):
),
(
"><!" + ("&" * 16000) + "D",
- ">" if htmlparser_fixed_security else "><!" + ("&" * 16000) + "D",
+ ">",
),
("X<<<<br>br>br>br>X", "XX"),
("<" * 50 + "a>" * 50, ""),
(
">" + "<a" * 500 + "a",
- ">" if htmlparser_fixed_security else ">" + "<a" * 500 + "a",
+ ">",
),
("<a" * 49 + "a" * 951, "<a" * 49 + "a" * 951),
("<" + "a" * 1_002, "<" + "a" * 1_002),