-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upgrade Django to 4.2.13 #9493
Upgrade Django to 4.2.13 #9493
Conversation
Contextual Security AnalysisAs DryRun Security performs checks, we’ll summarize them here. You can always dive into the detailed results in the section below for checks.
Chat with your AI-powered Security Buddy by typing Install and configure more repositories at DryRun Security |
I think the best approach here is to remove tests for MySQL by removing the following entry from the integration tests and then replace all the mysql references with Postgres |
@Maffooch, noticed that you implemented #5899. |
I guess it doesn't really make sense to raise a validation error on a successful correction.. Changing to a logger statement makes sense. Good call! |
Help needed I'm facing unusual behavior. Based on unittests, in Now, the complicated part:
|
@kiblik this is a very strange error, and I do not understand why it is happening. I am hoping to get some time in the near future to pull this PR down and play around with it |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
d367ce8
to
120d1d3
Compare
Conflicts have been resolved. A maintainer will review the pull request shortly. |
Hi there 👋, @DryRunSecurity here, below is a summary of our analysis and findings.
Note 🟢 Risk threshold not exceeded. Change Summary (click to expand)The following is a summary of changes in this pull request made by me, your security buddy 🤖. Note that this summary is auto-generated and not meant to be a definitive list of security issues but rather a helpful summary from a security perspective. Summary: The code changes in this pull request focus on several key areas that have a direct impact on the security and reliability of the application:
Overall, the changes in this pull request appear to be focused on improving the security and reliability of the application by updating dependencies, enhancing the testing workflow, validating authorization logic, and implementing secure remote user authentication. These are all important aspects of maintaining a secure and well-functioning application. Files Changed:
Powered by DryRun Security |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
Conflicts have been resolved. A maintainer will review the pull request shortly. |
I'm happy that we are ready, just be careful with timing:
Docker-compose.yml uses |
Since our version of MySQL isn't supported by the version of Django we're moving to and it's our intention to deprecate MySQL with the next release, should we go ahead and remove it entirely as part of this PR? |
I'd prefer to keep this PR only about the Django update and have a separate PR to remove MySQL from the various places. FWIW, I'll be working on a PR to remove MySQL & RabbitMQ from the compose files over the weekend. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved
Upgrade to Django 5.x #9258 might be quite complated but we need to go to at least 4.2.13 because 4.1.x is not supported anymore (check https://www.djangoproject.com/download/)
Needs to be checked/considered:
- Might be handy: CharField.max_length is no longer required to be set on PostgreSQL, which supports unlimited VARCHAR columns.
- We might need to change some lines for
makemigrations
: The makemigrations --check option no longer creates missing migration files.