4.0.txt 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527
  1. ============================================
  2. Django 4.0 release notes - UNDER DEVELOPMENT
  3. ============================================
  4. *Expected December 2021*
  5. Welcome to Django 4.0!
  6. These release notes cover the :ref:`new features <whats-new-4.0>`, as well as
  7. some :ref:`backwards incompatible changes <backwards-incompatible-4.0>` you'll
  8. want to be aware of when upgrading from Django 3.2 or earlier. We've
  9. :ref:`begun the deprecation process for some features
  10. <deprecated-features-4.0>`.
  11. See the :doc:`/howto/upgrade-version` guide if you're updating an existing
  12. project.
  13. Python compatibility
  14. ====================
  15. Django 4.0 supports Python 3.8, 3.9, and 3.10. We **highly recommend** and only
  16. officially support the latest release of each series.
  17. The Django 3.2.x series is the last to support Python 3.6 and 3.7.
  18. .. _whats-new-4.0:
  19. What's new in Django 4.0
  20. ========================
  21. Functional unique constraints
  22. -----------------------------
  23. The new :attr:`*expressions <django.db.models.UniqueConstraint.expressions>`
  24. positional argument of
  25. :class:`UniqueConstraint() <django.db.models.UniqueConstraint>` enables
  26. creating functional unique constraints on expressions and database functions.
  27. For example::
  28. from django.db import models
  29. from django.db.models import UniqueConstraint
  30. from django.db.models.functions import Lower
  31. class MyModel(models.Model):
  32. first_name = models.CharField(max_length=255)
  33. last_name = models.CharField(max_length=255)
  34. class Meta:
  35. indexes = [
  36. UniqueConstraint(
  37. Lower('first_name'),
  38. Lower('last_name').desc(),
  39. name='first_last_name_unique',
  40. ),
  41. ]
  42. Functional unique constraints are added to models using the
  43. :attr:`Meta.constraints <django.db.models.Options.constraints>` option.
  44. Minor features
  45. --------------
  46. :mod:`django.contrib.admin`
  47. ~~~~~~~~~~~~~~~~~~~~~~~~~~~
  48. * The ``admin/base.html`` template now has a new block ``header`` which
  49. contains the admin site header.
  50. * The new :meth:`.ModelAdmin.get_formset_kwargs` method allows customizing the
  51. keyword arguments passed to the constructor of a formset.
  52. * The navigation sidebar now has a quick filter toolbar.
  53. :mod:`django.contrib.admindocs`
  54. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  55. * The admindocs now allows esoteric setups where :setting:`ROOT_URLCONF` is not
  56. a string.
  57. * The model section of the ``admindocs`` now shows cached properties.
  58. :mod:`django.contrib.auth`
  59. ~~~~~~~~~~~~~~~~~~~~~~~~~~
  60. * The default iteration count for the PBKDF2 password hasher is increased from
  61. 260,000 to 320,000.
  62. * The new
  63. :attr:`LoginView.next_page <django.contrib.auth.views.LoginView.next_page>`
  64. attribute and
  65. :meth:`~django.contrib.auth.views.LoginView.get_default_redirect_url` method
  66. allow customizing the redirect after login.
  67. :mod:`django.contrib.contenttypes`
  68. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  69. * ...
  70. :mod:`django.contrib.gis`
  71. ~~~~~~~~~~~~~~~~~~~~~~~~~
  72. * Added support for SpatiaLite 5.
  73. * :class:`~django.contrib.gis.gdal.GDALRaster` now allows creating rasters in
  74. any GDAL virtual filesystem.
  75. :mod:`django.contrib.messages`
  76. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  77. * ...
  78. :mod:`django.contrib.postgres`
  79. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  80. * The PostgreSQL backend now supports connecting by a service name. See
  81. :ref:`postgresql-connection-settings` for more details.
  82. :mod:`django.contrib.redirects`
  83. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  84. * ...
  85. :mod:`django.contrib.sessions`
  86. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  87. * ...
  88. :mod:`django.contrib.sitemaps`
  89. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  90. * ...
  91. :mod:`django.contrib.sites`
  92. ~~~~~~~~~~~~~~~~~~~~~~~~~~~
  93. * ...
  94. :mod:`django.contrib.staticfiles`
  95. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  96. * :class:`~django.contrib.staticfiles.storage.ManifestStaticFilesStorage` now
  97. replaces paths to JavaScript source map references with their hashed
  98. counterparts.
  99. :mod:`django.contrib.syndication`
  100. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  101. * ...
  102. Cache
  103. ~~~~~
  104. * ...
  105. CSRF
  106. ~~~~
  107. * CSRF protection now consults the ``Origin`` header, if present. To facilitate
  108. this, :ref:`some changes <csrf-trusted-origins-changes-4.0>` to the
  109. :setting:`CSRF_TRUSTED_ORIGINS` setting are required.
  110. Decorators
  111. ~~~~~~~~~~
  112. * ...
  113. Email
  114. ~~~~~
  115. * ...
  116. Error Reporting
  117. ~~~~~~~~~~~~~~~
  118. * ...
  119. File Storage
  120. ~~~~~~~~~~~~
  121. * ...
  122. File Uploads
  123. ~~~~~~~~~~~~
  124. * ...
  125. Forms
  126. ~~~~~
  127. * :class:`~django.forms.ModelChoiceField` now includes the provided value in
  128. the ``params`` argument of a raised
  129. :exc:`~django.core.exceptions.ValidationError` for the ``invalid_choice``
  130. error message. This allows custom error messages to use the ``%(value)s``
  131. placeholder.
  132. Generic Views
  133. ~~~~~~~~~~~~~
  134. * ...
  135. Internationalization
  136. ~~~~~~~~~~~~~~~~~~~~
  137. * ...
  138. Logging
  139. ~~~~~~~
  140. * ...
  141. Management Commands
  142. ~~~~~~~~~~~~~~~~~~~
  143. * The :djadmin:`runserver` management command now supports the
  144. :option:`--skip-checks` option.
  145. * On PostgreSQL, :djadmin:`dbshell` now supports specifying a password file.
  146. Migrations
  147. ~~~~~~~~~~
  148. * ...
  149. Models
  150. ~~~~~~
  151. * New :meth:`QuerySet.contains(obj) <.QuerySet.contains>` method returns
  152. whether the queryset contains the given object. This tries to perform the
  153. query in the simplest and fastest way possible.
  154. * The new ``precision`` argument of the
  155. :class:`Round() <django.db.models.functions.Round>` database function allows
  156. specifying the number of decimal places after rounding.
  157. * :meth:`.QuerySet.bulk_create` now sets the primary key on objects when using
  158. SQLite 3.35+.
  159. * :class:`~django.db.models.DurationField` now supports multiplying and
  160. dividing by scalar values on SQLite.
  161. Requests and Responses
  162. ~~~~~~~~~~~~~~~~~~~~~~
  163. * The :class:`~django.middleware.security.SecurityMiddleware` now adds the
  164. :ref:`Cross-Origin Opener Policy <cross-origin-opener-policy>` header with a
  165. value of ``'same-origin'`` to prevent cross-origin popups from sharing the
  166. same browsing context. You can prevent this header from being added by
  167. setting the :setting:`SECURE_CROSS_ORIGIN_OPENER_POLICY` setting to ``None``.
  168. Security
  169. ~~~~~~~~
  170. * ...
  171. Serialization
  172. ~~~~~~~~~~~~~
  173. * ...
  174. Signals
  175. ~~~~~~~
  176. * The new ``stdout`` argument for :func:`~django.db.models.signals.pre_migrate`
  177. and :func:`~django.db.models.signals.post_migrate` signals allows redirecting
  178. output to a stream-like object. It should be preferred over
  179. :py:data:`sys.stdout` and :py:func:`print` when emitting verbose output in
  180. order to allow proper capture when testing.
  181. Templates
  182. ~~~~~~~~~
  183. * ...
  184. Tests
  185. ~~~~~
  186. * The new ``serialized_aliases`` argument of
  187. :func:`django.test.utils.setup_databases` determines which
  188. :setting:`DATABASES` aliases test databases should have their state
  189. serialized to allow usage of the
  190. :ref:`serialized_rollback <test-case-serialized-rollback>` feature.
  191. * Django test runner now supports a :option:`--buffer <test --buffer>` option
  192. with parallel tests.
  193. URLs
  194. ~~~~
  195. * ...
  196. Utilities
  197. ~~~~~~~~~
  198. * ...
  199. Validators
  200. ~~~~~~~~~~
  201. * ...
  202. .. _backwards-incompatible-4.0:
  203. Backwards incompatible changes in 4.0
  204. =====================================
  205. Database backend API
  206. --------------------
  207. This section describes changes that may be needed in third-party database
  208. backends.
  209. * ``DatabaseOperations.year_lookup_bounds_for_date_field()`` and
  210. ``year_lookup_bounds_for_datetime_field()`` methods now take the optional
  211. ``iso_year`` argument in order to support bounds for ISO-8601 week-numbering
  212. years.
  213. :mod:`django.contrib.gis`
  214. -------------------------
  215. * Support for PostGIS 2.3 is removed.
  216. * Support for GDAL 2.0 and GEOS 3.5 is removed.
  217. Dropped support for PostgreSQL 9.6
  218. ----------------------------------
  219. Upstream support for PostgreSQL 9.6 ends in November 2021. Django 4.0 supports
  220. PostgreSQL 10 and higher.
  221. Dropped support for Oracle 12.2 and 18c
  222. ---------------------------------------
  223. Upstream support for Oracle 12.2 ends in March 2022 and for Oracle 18c it ends
  224. in June 2021. Django 3.2 will be supported until April 2024. Django 4.0
  225. officially supports Oracle 19c.
  226. .. _csrf-trusted-origins-changes-4.0:
  227. ``CSRF_TRUSTED_ORIGINS`` changes
  228. --------------------------------
  229. Format change
  230. ~~~~~~~~~~~~~
  231. Values in the :setting:`CSRF_TRUSTED_ORIGINS` setting must include the scheme
  232. (e.g. ``'http://'`` or ``'https://'``) instead of only the hostname.
  233. Also, values that started with a dot, must now also include an asterisk before
  234. the dot. For example, change ``'.example.com'`` to ``'https://*.example.com'``.
  235. A system check detects any required changes.
  236. Configuring it may now be required
  237. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  238. As CSRF protection now consults the ``Origin`` header, you may need to set
  239. :setting:`CSRF_TRUSTED_ORIGINS`, particularly if you allow requests from
  240. subdomains by setting :setting:`CSRF_COOKIE_DOMAIN` (or
  241. :setting:`SESSION_COOKIE_DOMAIN` if :setting:`CSRF_USE_SESSIONS` is enabled) to
  242. a value starting with a dot.
  243. ``SecurityMiddleware`` no longer sets the ``X-XSS-Protection`` header
  244. ---------------------------------------------------------------------
  245. The :class:`~django.middleware.security.SecurityMiddleware` no longer sets the
  246. ``X-XSS-Protection`` header if the ``SECURE_BROWSER_XSS_FILTER`` setting is
  247. ``True``. The setting is removed.
  248. Most modern browsers don't honor the ``X-XSS-Protection`` HTTP header. You can
  249. use Content-Security-Policy_ without allowing ``'unsafe-inline'`` scripts
  250. instead.
  251. If you want to support legacy browsers and set the header, use this line in a
  252. custom middleware::
  253. response.headers.setdefault('X-XSS-Protection', '1; mode=block')
  254. .. _Content-Security-Policy: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
  255. Miscellaneous
  256. -------------
  257. * Support for ``cx_Oracle`` < 7.0 is removed.
  258. * To allow serving a Django site on a subpath without changing the value of
  259. :setting:`STATIC_URL`, the leading slash is removed from that setting (now
  260. ``'static/'``) in the default :djadmin:`startproject` template.
  261. * The :class:`~django.contrib.admin.AdminSite` method for the admin ``index``
  262. view is no longer decorated with ``never_cache`` when accessed directly,
  263. rather than via the recommended ``AdminSite.urls`` property, or
  264. ``AdminSite.get_urls()`` method.
  265. * Unsupported operations on a sliced queryset now raise ``TypeError`` instead
  266. of ``AssertionError``.
  267. * The undocumented ``django.test.runner.reorder_suite()`` function is renamed
  268. to ``reorder_tests()``. It now accepts an iterable of tests rather than a
  269. test suite, and returns an iterator of tests.
  270. * Calling ``FileSystemStorage.delete()`` with an empty ``name`` now raises
  271. ``ValueError`` instead of ``AssertionError``.
  272. * Calling ``EmailMultiAlternatives.attach_alternative()`` or
  273. ``EmailMessage.attach()`` with an invalid ``content`` or ``mimetype``
  274. arguments now raise ``ValueError`` instead of ``AssertionError``.
  275. * :meth:`~django.test.SimpleTestCase.assertHTMLEqual` no longer considers a
  276. non-boolean attribute without a value equal to an attribute with the same
  277. name and value.
  278. * Tests that fail to load, for example due to syntax errors, now always match
  279. when using :option:`test --tag`.
  280. * The migrations autodetector now uses model states instead of model classes.
  281. As a side-effect ``makemigrations`` might generate no-op ``AlterField``
  282. operations for ``ForeignKey`` fields in some cases.
  283. * The undocumented ``django.contrib.admin.utils.lookup_needs_distinct()``
  284. function is renamed to ``lookup_spawns_duplicates()``.
  285. * The undocumented ``HttpRequest.get_raw_uri()`` method is removed. The
  286. :meth:`.HttpRequest.build_absolute_uri` method may be a suitable alternative.
  287. .. _deprecated-features-4.0:
  288. Features deprecated in 4.0
  289. ==========================
  290. Miscellaneous
  291. -------------
  292. * ``SERIALIZE`` test setting is deprecated as it can be inferred from the
  293. :attr:`~django.test.TestCase.databases` with the
  294. :ref:`serialized_rollback <test-case-serialized-rollback>` option enabled.
  295. * The undocumented ``django.utils.baseconv`` module is deprecated.
  296. Features removed in 4.0
  297. =======================
  298. These features have reached the end of their deprecation cycle and are removed
  299. in Django 4.0.
  300. See :ref:`deprecated-features-3.0` for details on these changes, including how
  301. to remove usage of these features.
  302. * ``django.utils.http.urlquote()``, ``urlquote_plus()``, ``urlunquote()``, and
  303. ``urlunquote_plus()`` are removed.
  304. * ``django.utils.encoding.force_text()`` and ``smart_text()`` are removed.
  305. * ``django.utils.translation.ugettext()``, ``ugettext_lazy()``,
  306. ``ugettext_noop()``, ``ungettext()``, and ``ungettext_lazy()`` are removed.
  307. * ``django.views.i18n.set_language()`` doesn't set the user language in
  308. ``request.session`` (key ``_language``).
  309. * ``alias=None`` is required in the signature of
  310. ``django.db.models.Expression.get_group_by_cols()`` subclasses.
  311. * ``django.utils.text.unescape_entities()`` is removed.
  312. * ``django.utils.http.is_safe_url()`` is removed.
  313. See :ref:`deprecated-features-3.1` for details on these changes, including how
  314. to remove usage of these features.
  315. * The ``PASSWORD_RESET_TIMEOUT_DAYS`` setting is removed.
  316. * The :lookup:`isnull` lookup no longer allows using non-boolean values as the
  317. right-hand side.
  318. * The ``django.db.models.query_utils.InvalidQuery`` exception class is removed.
  319. * The ``django-admin.py`` entry point is removed.
  320. * The ``HttpRequest.is_ajax()`` method is removed.
  321. * Support for the pre-Django 3.1 encoding format of cookies values used by
  322. ``django.contrib.messages.storage.cookie.CookieStorage`` is removed.
  323. * Support for the pre-Django 3.1 password reset tokens in the admin site (that
  324. use the SHA-1 hashing algorithm) is removed.
  325. * Support for the pre-Django 3.1 encoding format of sessions is removed.
  326. * Support for the pre-Django 3.1 ``django.core.signing.Signer`` signatures
  327. (encoded with the SHA-1 algorithm) is removed.
  328. * Support for the pre-Django 3.1 ``django.core.signing.dumps()`` signatures
  329. (encoded with the SHA-1 algorithm) in ``django.core.signing.loads()`` is
  330. removed.
  331. * Support for the pre-Django 3.1 user sessions (that use the SHA-1 algorithm)
  332. is removed.
  333. * The ``get_request`` argument for
  334. ``django.utils.deprecation.MiddlewareMixin.__init__()`` is required and
  335. doesn't accept ``None``.
  336. * The ``providing_args`` argument for ``django.dispatch.Signal`` is removed.
  337. * The ``length`` argument for ``django.utils.crypto.get_random_string()`` is
  338. required.
  339. * The ``list`` message for ``ModelMultipleChoiceField`` is removed.
  340. * Support for passing raw column aliases to ``QuerySet.order_by()`` is removed.
  341. * The ``NullBooleanField`` model field is removed, except for support in
  342. historical migrations.
  343. * ``django.conf.urls.url()`` is removed.
  344. * The ``django.contrib.postgres.fields.JSONField`` model field is removed,
  345. except for support in historical migrations.
  346. * ``django.contrib.postgres.fields.jsonb.KeyTransform`` and
  347. ``django.contrib.postgres.fields.jsonb.KeyTextTransform`` are removed.
  348. * ``django.contrib.postgres.forms.JSONField`` is removed.
  349. * The ``{% ifequal %}`` and ``{% ifnotequal %}`` template tags are removed.
  350. * The ``DEFAULT_HASHING_ALGORITHM`` transitional setting is removed.