I Use This!
Very High Activity

News

Analyzed 15 minutes ago. based on code collected 1 day ago.
Posted about 4 years ago by Miguel Magalhaes, DjangoCon Europe 2020 organizers, Markus Holtermann
We are happy to announce that DjangoCon Europe 2020 will take place in Porto, Portugal 🇵🇹! The website is already online at 2020.djangocon.eu and it will be kept up to date with the latest updates. Don't forget to follow @djangoconeurope on Twitter. ... [More] The dates are already confirmed (don't rush into buying everything so soon because we'll have discounts for DjangoCon attendees!): Conference: May 27-29 (Wednesday-Friday) Sprints/Workshops: May 30 and 31 (Saturday and Sunday) There is a lot to do, but it's very much worth it – DjangoCon Europe is an extremely friendly, open, inclusive, and informative (for beginners and advanced users alike) conference. Here are some themes and examples of activities and responsibilities that we seek help with: Communications: Press, community relations, announcements, social media, attendee tools, volunteer coordination Support and hospitality: Helpdesk, attendee support contact, visa help, travel management, chat support for attendees, on-site volunteer organization, speaker support Financial Aid: Setup, grant selection, aid organization Sponsors: Outreach to companies, organizing their logistics at the event and other types of visibility Program: Committee work, talk selection, scheduling, session chairs, sprint/open space/keynote/lightning talks session organization Code of Conduct: Drafting documents, handling of requests and issues Diversity advocate: Accessibility considerations, outreach on-site Join us regardless of your prior experience: this is also an opportunity to learn! In other words, you don't have to be an expert to join. Neither are we experts in hosting such a big event … yet! Your location prior to the event is not significant. We can do all things that need to be done in Porto ourselves. The only important thing is that you have the energy and free time to help organize a wonderful DjangoCon Europe. The official language of all these prior activities will be English, as well as the conference itself. Don't be shy 😊. For any inquiries you can email us at [email protected] or chat with us on Slack at DjangoConEurope2020. [Less]
Posted about 4 years ago by Mariusz Felisiak
Today we've issued the 3.0.2 bugfix release. The release package and checksums are available from our downloads page, as well as from the Python Package Index. The PGP key ID used for this release is Mariusz Felisiak: 2EF56372BA48CD1B.
Posted over 4 years ago by Carlton Gibson, Mariusz Felisiak, James Bennett
In accordance with our security release policy, the Django team is issuing Django 3.0.1, Django 2.2.9 and Django 1.11.27. These releases address the security issue detailed below. We encourage all users of Django to upgrade as soon as possible. These ... [More] releases are also issued outside of our normal bugfix/release schedule, and did not have the usual one-week prenotification period. By the time the Django security team was made aware of this security issue, its mechanics were already public knowledge, and it was judged best to issue new releases of Django immediately. CVE-2019-19844: Potential account hijack via password reset form Django's password-reset form uses a case-insensitive query to retrieve accounts matching the email address requesting the password reset. Because this typically involves explicit or implicit case transformations, an attacker who knows the email address associated with a user account can craft an email address which is distinct from the address associated with that account, but which -- due to the behavior of Unicode case transformations -- ceases to be distinct after case transformation, or which will otherwise compare equal given database case-transformation or collation behavior. In such a situation, the attacker can receive a valid password-reset token for the user account. To resolve this, two changes were made in Django: After retrieving a list of potentially-matching accounts from the database, Django's password reset functionality now also checks the email address for equivalence in Python, using the recommended identifier-comparison process from Unicode Technical Report 36, section 2.11.2(B)(2). When generating password-reset emails, Django now sends to the email address retrieved from the database, rather than the email address submitted in the password-reset request form. This issue was brought to the attention of the Django security team by Simon Charette, who became aware of it after reading a public disclosure of a similar issue which affected GitHub. Affected supported versions Django master branch Django 3.0 Django 2.2 Django 1.11 Resolution Patches to resolve the issue have been applied to Django's master branch and the 3.0, 2.2, and 1.11 release branches. The patches may be obtained from the following changesets: On the master branch On the 3.0 release branch On the 2.2 release branch On the 1.11 release branch The following releases have been issued: Django 3.0.1 (download Django 3.0.1 | 3.0.1 checksums) Django 2.2.9 (download Django 2.2.9 | 2.2.9 checksums) Django 1.11.27 (download Django 1.11.27 | 1.11.27 checksums) The PGP key ID used for these releases is Mariusz Felisiak: 2EF56372BA48CD1B. General notes regarding security reporting As always, we ask that potential security issues be reported via private email to [email protected], and not via Django's Trac instance or the django-developers list. Please see our security policies for further information. As noted above, because the underlying cause of this issue was already publicly known, these releases were issued without the usual prenotification process. [Less]
Posted over 4 years ago by Frank Wiles
The Board of the Django Software Foundation is pleased to announce that the 2019 Malcolm Tredinnick Memorial Prize has been awarded to Jeff Triplett (@webology). Jeff has been heavily involved in the Django Community basically since there was a ... [More] Django Community. He's served on the Code of Conduct committee for many years but most notably Jeff helped found DEFNA which has run DjangoCon US since 2015. Jeff is also a Board Member of the Python Software Foundation. Sara Gore, who nominated Jeff, gave this as her main reason for nominating Jeff: Jeff has served the Django community through the DSF, DEFNA, and the PSF. He turned DjangoCon US into the amazing volunteer run conference that it is today, and mentored many conference organizers and junior developers. He is a true ally who stands up for people in our community. The other nominees this year were: Trey Hunner Timothy Allen Mariusz Felisiak William Vincent Every year we receive many nominations and it's always hard to pick the winner. In fact, some people like Jeff have been nominated in multiple years. Malcolm would be very proud of the legacy he has fostered in our community! Congratulations Jeff! [Less]
Posted over 4 years ago by Frank Wiles
Our 2020 Django Software Foundation Election results are in. The Top 7 candidates are listed below in order of their ranking: Frank Wiles Anna Makarudze James Bennett William Vincent Kátia Nakamura Aaron Bassett Sayantika Banik Our new board will ... [More] take over at the next board meeting where officer positions will be set. Congratulations to the winners and a special thank you to all that stood for this years election. I would also like to extend a since thanks to retiring Board Members Jessica Deaton, Katie McLaughlin, and Catherine Holmes. Your hard work and dedication is appreciated! [Less]
Posted over 4 years ago by Carlton Gibson
The Django team is happy to announce the release of Django 3.0. The release notes cover the raft of new features in detail, but a few highlights are: Django 3.0 begins our journey to making Django fully async-capable by providing support for running ... [More] as an ASGI application. Django now officially supports MariaDB 10.1 and higher. Custom enumeration types TextChoices, IntegerChoices, and Choices are now available as a way to define model field choices. You can get Django 3.0 from our downloads page or from the Python Package Index. The PGP key ID used for this release is Carlton Gibson: E17DF5C82B4F9D00. With the release of Django 3.0, Django 2.2 has reached the end of mainstream support. The final minor bug fix release (which is also a security release), 2.2.8, was issued today. Django 2.2 is an LTS release and will receive security and data loss fixes until April 2022. All users are encouraged to upgrade before then to continue receiving fixes for security issues. Django 2.1 has reached the end of extended support. All Django 2.1 users are encouraged to upgrade to Django 2.2 or later to continue receiving fixes for security issues. See the downloads page for a table of supported versions and the future release schedule. [Less]
Posted over 4 years ago by Carlton Gibson
In accordance with our security release policy, the Django team is issuing Django 2.2.8 and Django 2.1.15. These release addresses the security issue detailed below. We encourage all users of Django to upgrade as soon as possible. CVE-2019-19118: ... [More] Privilege escalation in the Django admin. Since Django 2.1, a Django model admin displaying a parent model with related model inlines, where the user has view-only permissions to a parent model but edit permissions to the inline model, would display a read-only view of the parent model but editable forms for the inline. Submitting these forms would not allow direct edits to the parent model, but would trigger the parent model's save() method, and cause pre and post-save signal handlers to be invoked. This is a privilege escalation as a user who lacks permission to edit a model should not be able to trigger its save-related signals. To resolve this issue, the permission handling code of the Django admin interface has been changed. Now, if a user has only the "view" permission for a parent model, the entire displayed form will not be editable, even if the user has permission to edit models included in inlines. This is a backwards-incompatible change, and the Django security team is aware that some users of Django were depending on the ability to allow editing of inlines in the admin form of an otherwise view-only parent model. Given the complexity of the Django admin, and in-particular the permissions related checks, it is the view of the Django security team that this change was necessary: that it is not currently feasible to maintain the existing behavior whilst escaping the potential privilege escalation in a way that would avoid a recurrence of similar issues in the future, and that would be compatible with Django's safe by default philosophy. For the time being, developers whose applications are affected by this change should replace the use of inlines in read-only parents with custom forms and views that explicitly implement the desired functionality. In the longer term, adding a documented, supported, and properly-tested mechanism for partially-editable multi-model forms to the admin interface may occur in Django itself. Thank you to Shen Ying for reporting this issue. Affected supported versions Django master branch Django 3.0 (which will be released in a separate blog post later today) Django 2.2 Django 2.1 Resolution Patches to resolve the issue have been applied to Django's master branch and the 3.0, 2.2, and 2.1 release branches. The patches may be obtained from the following changesets: On the master branch On the 3.0 release branch On the 2.2 release branch On the 2.1 release branch The following releases have been issued: Django 2.2.8 (download Django 2.2.8 | 2.2.8 checksums) Django 2.1.15 (download Django 2.1.15 | 2.1.15 checksums) The PGP key ID used for these releases is Carlton Gibson: E17DF5C82B4F9D00. General notes regarding security reporting As always, we ask that potential security issues be reported via private email to [email protected], and not via Django's Trac instance or the django-developers list. Please see our security policies for further information. [Less]
Posted over 4 years ago by Anna Makarudze, Daniele Procida, Helen Bire and Noah Alorwu
Following the huge success of PyCon Africa, the Django community in Africa is ready to bring a new major software event to the continent - the very first DjangoCon Africa! The Django Software Foundation is excited to endorse and support this ... [More] initiative. Plans are already in motion for a DjangoCon Africa to be held in Addis Ababa, Ethiopia in November 2020. Actual dates to be announced as soon as key details are in place. DjangoCon Africa will include 3 days of single-track talks, 1 day of workshops and sprints, and another day for touring for international visitors. The event will also include a Django Girls workshop to be held the weekend before DjangoCon Africa. To make the conference as inclusive as possible, the event will offer financial aid to members of under-represented communities in software to ensure they can also attend. The CFP, which is open to all, will also be announced as soon as key details are in place. About Ethiopia Ethiopia is a country in North East of Africa, commonly known as the Horn of Africa. It is a country with a rich history and many historical places to visit. The country is highly accessible to all, with African Union members having the option of applying for visa on arrival at Bole International Airport or applying for an e-visa like the rest of the world before traveling to Ethiopia. The country also boasts of the largest airline in the whole of Africa, with the country’s airline, Ethiopian Airlines having 53 routes in Africa, 17 in Europe, 7 in the Americas, 14 in Asia and 10 in the Middle East. This makes this country very accessible to all of Africa and the rest of the world and hence an ideal location for the first DjangoCon Africa. See you in Addis Ababa in November 2020 for the first ever DjangoCon Africa! [Less]
Posted over 4 years ago by Mariusz Felisiak
Django 3.0 release candidate 1 is the final opportunity for you to try out the raft of new features before Django 3.0 is released. The release candidate stage marks the string freeze and the call for translators to submit translations. Provided no ... [More] major bugs are discovered that can't be solved in the next two weeks, Django 3.0 will be released on or around December 2. Any delays will be communicated on the django-developers mailing list thread. Please use this opportunity to help find and fix bugs (which should be reported to the issue tracker). You can grab a copy of the package from our downloads page or on PyPI. The PGP key ID used for this release is Mariusz Felisiak: 2EF56372BA48CD1B. [Less]
Posted over 4 years ago by Mariusz Felisiak
Today we've issued 2.2.7, 2.1.14, and 1.11.26 bugfix releases. The release package and checksums are available from our downloads page, as well as from the Python Package Index. The PGP key ID used for this release is Mariusz Felisiak: 2EF56372BA48CD1B.