[1.4.x] Cleaned up 1.4.8 release notes
Backport of 8d29005524 from master
This commit is contained in:
parent
efee30e6b0
commit
ca77e38d24
@ -123,6 +123,8 @@ Filtering error reports
|
||||
Filtering sensitive information
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
.. currentmodule:: django.views.decorators.debug
|
||||
|
||||
Error reports are really helpful for debugging errors, so it is generally
|
||||
useful to record as much relevant information about those errors as possible.
|
||||
For example, by default Django records the `full traceback`_ for the
|
||||
@ -236,11 +238,13 @@ attribute::
|
||||
request.exception_reporter_filter = CustomExceptionReporterFilter()
|
||||
...
|
||||
|
||||
.. currentmodule:: django.views.debug
|
||||
|
||||
Your custom filter class needs to inherit from
|
||||
:class:`django.views.debug.SafeExceptionReporterFilter` and may override the
|
||||
following methods:
|
||||
|
||||
.. class:: django.views.debug.SafeExceptionReporterFilter
|
||||
.. class:: SafeExceptionReporterFilter
|
||||
|
||||
.. method:: SafeExceptionReporterFilter.is_active(self, request)
|
||||
|
||||
|
@ -337,9 +337,10 @@ docs </ref/contrib/csrf>` for more information.
|
||||
Error report filtering
|
||||
~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
Two new function decorators, :func:`sensitive_variables` and
|
||||
:func:`sensitive_post_parameters`, were added to allow designating the
|
||||
local variables and POST parameters which may contain sensitive
|
||||
We added two function decorators,
|
||||
:func:`~django.views.decorators.debug.sensitive_variables` and
|
||||
:func:`~django.views.decorators.debug.sensitive_post_parameters`, to allow
|
||||
designating the local variables and POST parameters that may contain sensitive
|
||||
information and should be filtered out of error reports.
|
||||
|
||||
All POST parameters are now systematically filtered out of error reports for
|
||||
|
@ -375,9 +375,10 @@ docs </ref/contrib/csrf>` for more information.
|
||||
Error report filtering
|
||||
~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
Two new function decorators, :func:`sensitive_variables` and
|
||||
:func:`sensitive_post_parameters`, were added to allow designating the
|
||||
local variables and POST parameters which may contain sensitive
|
||||
We added two function decorators,
|
||||
:func:`~django.views.decorators.debug.sensitive_variables` and
|
||||
:func:`~django.views.decorators.debug.sensitive_post_parameters`, to allow
|
||||
designating the local variables and POST parameters that may contain sensitive
|
||||
information and should be filtered out of error reports.
|
||||
|
||||
All POST parameters are now systematically filtered out of error reports for
|
||||
|
@ -1,21 +1,32 @@
|
||||
==========================
|
||||
Django 1.4.7 release notes
|
||||
Django 1.4.8 release notes
|
||||
==========================
|
||||
|
||||
*September 14, 2013*
|
||||
|
||||
Django 1.4.8 fixes one security issue present in previous Django releases in
|
||||
Django 1.4.8 fixes two security issues present in previous Django releases in
|
||||
the 1.4 series.
|
||||
|
||||
Denial-of-service via password hashers
|
||||
--------------------------------------
|
||||
|
||||
In previous versions of Django no limit was imposed on the plaintext
|
||||
length of a password. This allows a denial-of-service attack through
|
||||
In previous versions of Django, no limit was imposed on the plaintext
|
||||
length of a password. This allowed a denial-of-service attack through
|
||||
submission of bogus but extremely large passwords, tying up server
|
||||
resources performing the (expensive, and increasingly expensive with
|
||||
the length of the password) calculation of the corresponding hash.
|
||||
|
||||
As of 1.4.8, Django's authentication framework imposes a 4096-byte
|
||||
limit on passwords, and will fail authentication with any submitted
|
||||
limit on passwords and will fail authentication with any submitted
|
||||
password of greater length.
|
||||
|
||||
Corrected usage of :func:`~django.views.decorators.debug.sensitive_post_parameters` in :mod:`django.contrib.auth`’s admin
|
||||
-------------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
The decoration of the ``add_view`` and ``user_change_password`` user admin
|
||||
views with :func:`~django.views.decorators.debug.sensitive_post_parameters`
|
||||
did not include :func:`~django.utils.decorators.method_decorator` (required
|
||||
since the views are methods) resulting in the decorator not being properly
|
||||
applied. This usage has been fixed and
|
||||
:func:`~django.views.decorators.debug.sensitive_post_parameters` will now
|
||||
throw an exception if it's improperly used.
|
||||
|
@ -507,10 +507,11 @@ docs </ref/contrib/csrf>` for more information.
|
||||
Error report filtering
|
||||
~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
We added two function decorators, :func:`sensitive_variables` and
|
||||
:func:`sensitive_post_parameters`, to allow designating the local variables
|
||||
and POST parameters that may contain sensitive information and should be
|
||||
filtered out of error reports.
|
||||
We added two function decorators,
|
||||
:func:`~django.views.decorators.debug.sensitive_variables` and
|
||||
:func:`~django.views.decorators.debug.sensitive_post_parameters`, to allow
|
||||
designating the local variables and POST parameters that may contain sensitive
|
||||
information and should be filtered out of error reports.
|
||||
|
||||
All POST parameters are now systematically filtered out of error reports for
|
||||
certain views (``login``, ``password_reset_confirm``, ``password_change`` and
|
||||
|
@ -20,6 +20,7 @@ Final releases
|
||||
.. toctree::
|
||||
:maxdepth: 1
|
||||
|
||||
1.4.8
|
||||
1.4.7
|
||||
1.4.6
|
||||
1.4.5
|
||||
|
Loading…
x
Reference in New Issue
Block a user