4.0.txt 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691
  1. ============================================
  2. Django 4.0 release notes - UNDER DEVELOPMENT
  3. ============================================
  4. *Expected December 2021*
  5. Welcome to Django 4.0!
  6. These release notes cover the :ref:`new features <whats-new-4.0>`, as well as
  7. some :ref:`backwards incompatible changes <backwards-incompatible-4.0>` you'll
  8. want to be aware of when upgrading from Django 3.2 or earlier. We've
  9. :ref:`begun the deprecation process for some features
  10. <deprecated-features-4.0>`.
  11. See the :doc:`/howto/upgrade-version` guide if you're updating an existing
  12. project.
  13. Python compatibility
  14. ====================
  15. Django 4.0 supports Python 3.8, 3.9, and 3.10. We **highly recommend** and only
  16. officially support the latest release of each series.
  17. The Django 3.2.x series is the last to support Python 3.6 and 3.7.
  18. .. _whats-new-4.0:
  19. What's new in Django 4.0
  20. ========================
  21. Functional unique constraints
  22. -----------------------------
  23. The new :attr:`*expressions <django.db.models.UniqueConstraint.expressions>`
  24. positional argument of
  25. :class:`UniqueConstraint() <django.db.models.UniqueConstraint>` enables
  26. creating functional unique constraints on expressions and database functions.
  27. For example::
  28. from django.db import models
  29. from django.db.models import UniqueConstraint
  30. from django.db.models.functions import Lower
  31. class MyModel(models.Model):
  32. first_name = models.CharField(max_length=255)
  33. last_name = models.CharField(max_length=255)
  34. class Meta:
  35. indexes = [
  36. UniqueConstraint(
  37. Lower('first_name'),
  38. Lower('last_name').desc(),
  39. name='first_last_name_unique',
  40. ),
  41. ]
  42. Functional unique constraints are added to models using the
  43. :attr:`Meta.constraints <django.db.models.Options.constraints>` option.
  44. ``scrypt`` password hasher
  45. --------------------------
  46. The new :ref:`scrypt password hasher <scrypt-usage>` is more secure and
  47. recommended over PBKDF2. However, it's not the default as it requires OpenSSL
  48. 1.1+ and more memory.
  49. Minor features
  50. --------------
  51. :mod:`django.contrib.admin`
  52. ~~~~~~~~~~~~~~~~~~~~~~~~~~~
  53. * The ``admin/base.html`` template now has a new block ``header`` which
  54. contains the admin site header.
  55. * The new :meth:`.ModelAdmin.get_formset_kwargs` method allows customizing the
  56. keyword arguments passed to the constructor of a formset.
  57. * The navigation sidebar now has a quick filter toolbar.
  58. * The new context variable ``model`` which contains the model class for each
  59. model is added to the :meth:`.AdminSite.each_context` method.
  60. * The new :attr:`.ModelAdmin.search_help_text` attribute allows specifying a
  61. descriptive text for the search box.
  62. :mod:`django.contrib.admindocs`
  63. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  64. * The admindocs now allows esoteric setups where :setting:`ROOT_URLCONF` is not
  65. a string.
  66. * The model section of the ``admindocs`` now shows cached properties.
  67. :mod:`django.contrib.auth`
  68. ~~~~~~~~~~~~~~~~~~~~~~~~~~
  69. * The default iteration count for the PBKDF2 password hasher is increased from
  70. 260,000 to 320,000.
  71. * The new
  72. :attr:`LoginView.next_page <django.contrib.auth.views.LoginView.next_page>`
  73. attribute and
  74. :meth:`~django.contrib.auth.views.LoginView.get_default_redirect_url` method
  75. allow customizing the redirect after login.
  76. :mod:`django.contrib.contenttypes`
  77. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  78. * ...
  79. :mod:`django.contrib.gis`
  80. ~~~~~~~~~~~~~~~~~~~~~~~~~
  81. * Added support for SpatiaLite 5.
  82. * :class:`~django.contrib.gis.gdal.GDALRaster` now allows creating rasters in
  83. any GDAL virtual filesystem.
  84. :mod:`django.contrib.messages`
  85. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  86. * ...
  87. :mod:`django.contrib.postgres`
  88. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  89. * The PostgreSQL backend now supports connecting by a service name. See
  90. :ref:`postgresql-connection-settings` for more details.
  91. * The new :class:`~django.contrib.postgres.operations.AddConstraintNotValid`
  92. operation allows creating check constraints on PostgreSQL without verifying
  93. that all existing rows satisfy the new constraint.
  94. * The new :class:`~django.contrib.postgres.operations.ValidateConstraint`
  95. operation allows validating check constraints which were created using
  96. :class:`~django.contrib.postgres.operations.AddConstraintNotValid` on
  97. PostgreSQL.
  98. * The new
  99. :class:`ArraySubquery() <django.contrib.postgres.expressions.ArraySubquery>`
  100. expression allows using subqueries to construct lists of values on
  101. PostgreSQL.
  102. :mod:`django.contrib.redirects`
  103. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  104. * ...
  105. :mod:`django.contrib.sessions`
  106. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  107. * ...
  108. :mod:`django.contrib.sitemaps`
  109. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  110. * ...
  111. :mod:`django.contrib.sites`
  112. ~~~~~~~~~~~~~~~~~~~~~~~~~~~
  113. * ...
  114. :mod:`django.contrib.staticfiles`
  115. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  116. * :class:`~django.contrib.staticfiles.storage.ManifestStaticFilesStorage` now
  117. replaces paths to JavaScript source map references with their hashed
  118. counterparts.
  119. * :class:`~django.contrib.staticfiles.storage.ManifestStaticFilesStorage` now
  120. replaces paths to JavaScript modules in ``import`` and ``export`` statements
  121. with their hashed counterparts.
  122. * The new ``manifest_storage`` argument of
  123. :class:`~django.contrib.staticfiles.storage.ManifestFilesMixin` and
  124. :class:`~django.contrib.staticfiles.storage.ManifestStaticFilesStorage`
  125. allows customizing the manifest file storage.
  126. :mod:`django.contrib.syndication`
  127. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  128. * ...
  129. Cache
  130. ~~~~~
  131. * ...
  132. CSRF
  133. ~~~~
  134. * CSRF protection now consults the ``Origin`` header, if present. To facilitate
  135. this, :ref:`some changes <csrf-trusted-origins-changes-4.0>` to the
  136. :setting:`CSRF_TRUSTED_ORIGINS` setting are required.
  137. Decorators
  138. ~~~~~~~~~~
  139. * ...
  140. Email
  141. ~~~~~
  142. * ...
  143. Error Reporting
  144. ~~~~~~~~~~~~~~~
  145. * ...
  146. File Storage
  147. ~~~~~~~~~~~~
  148. * ...
  149. File Uploads
  150. ~~~~~~~~~~~~
  151. * ...
  152. Forms
  153. ~~~~~
  154. * :class:`~django.forms.ModelChoiceField` now includes the provided value in
  155. the ``params`` argument of a raised
  156. :exc:`~django.core.exceptions.ValidationError` for the ``invalid_choice``
  157. error message. This allows custom error messages to use the ``%(value)s``
  158. placeholder.
  159. * :class:`~django.forms.formsets.BaseFormSet` now renders non-form errors with
  160. an additional class of ``nonform`` to help distinguish them from
  161. form-specific errors.
  162. * :class:`~django.forms.formsets.BaseFormSet` now allows customizing the widget
  163. used when deleting forms via
  164. :attr:`~django.forms.formsets.BaseFormSet.can_delete` by setting the
  165. :attr:`~django.forms.formsets.BaseFormSet.deletion_widget` attribute or
  166. overriding :meth:`~django.forms.formsets.BaseFormSet.get_deletion_widget`
  167. method.
  168. Generic Views
  169. ~~~~~~~~~~~~~
  170. * :class:`~django.views.generic.edit.DeleteView` now uses
  171. :class:`~django.views.generic.edit.FormMixin`, allowing you to provide a
  172. :class:`~django.forms.Form` subclass, with a checkbox for example, to confirm
  173. deletion. In addition, this allows ``DeleteView`` to function with
  174. :class:`django.contrib.messages.views.SuccessMessageMixin`.
  175. Internationalization
  176. ~~~~~~~~~~~~~~~~~~~~
  177. * ...
  178. Logging
  179. ~~~~~~~
  180. * The alias of the database used in an SQL call is now passed as extra context
  181. along with each message to the :ref:`django-db-logger` logger.
  182. Management Commands
  183. ~~~~~~~~~~~~~~~~~~~
  184. * The :djadmin:`runserver` management command now supports the
  185. :option:`--skip-checks` option.
  186. * On PostgreSQL, :djadmin:`dbshell` now supports specifying a password file.
  187. * The :djadmin:`shell` command now respects :py:data:`sys.__interactivehook__`
  188. at startup. This allows loading shell history between interactive sessions.
  189. As a consequence, ``readline`` is no longer loaded if running in *isolated*
  190. mode.
  191. Migrations
  192. ~~~~~~~~~~
  193. * ...
  194. Models
  195. ~~~~~~
  196. * New :meth:`QuerySet.contains(obj) <.QuerySet.contains>` method returns
  197. whether the queryset contains the given object. This tries to perform the
  198. query in the simplest and fastest way possible.
  199. * The new ``precision`` argument of the
  200. :class:`Round() <django.db.models.functions.Round>` database function allows
  201. specifying the number of decimal places after rounding.
  202. * :meth:`.QuerySet.bulk_create` now sets the primary key on objects when using
  203. SQLite 3.35+.
  204. * :class:`~django.db.models.DurationField` now supports multiplying and
  205. dividing by scalar values on SQLite.
  206. * :meth:`.QuerySet.bulk_update` now returns the number of objects updated.
  207. * The new :attr:`.Aggregate.empty_aggregate_value` attribute allows specifying
  208. a value to return when the aggregation is used over an empty result set.
  209. * The ``skip_locked`` argument of :meth:`.QuerySet.select_for_update()` is now
  210. allowed on MariaDB 10.6+.
  211. * :class:`~django.db.models.Lookup` expressions may now be used in ``QuerySet``
  212. annotations, aggregations, and directly in filters.
  213. * The new :ref:`default <aggregate-default>` argument for built-in aggregates
  214. allows specifying a value to be returned when the queryset (or grouping)
  215. contains no entries, rather than ``None``.
  216. Requests and Responses
  217. ~~~~~~~~~~~~~~~~~~~~~~
  218. * The :class:`~django.middleware.security.SecurityMiddleware` now adds the
  219. :ref:`Cross-Origin Opener Policy <cross-origin-opener-policy>` header with a
  220. value of ``'same-origin'`` to prevent cross-origin popups from sharing the
  221. same browsing context. You can prevent this header from being added by
  222. setting the :setting:`SECURE_CROSS_ORIGIN_OPENER_POLICY` setting to ``None``.
  223. Security
  224. ~~~~~~~~
  225. * ...
  226. Serialization
  227. ~~~~~~~~~~~~~
  228. * ...
  229. Signals
  230. ~~~~~~~
  231. * The new ``stdout`` argument for :func:`~django.db.models.signals.pre_migrate`
  232. and :func:`~django.db.models.signals.post_migrate` signals allows redirecting
  233. output to a stream-like object. It should be preferred over
  234. :py:data:`sys.stdout` and :py:func:`print` when emitting verbose output in
  235. order to allow proper capture when testing.
  236. Templates
  237. ~~~~~~~~~
  238. * ...
  239. Tests
  240. ~~~~~
  241. * The new ``serialized_aliases`` argument of
  242. :func:`django.test.utils.setup_databases` determines which
  243. :setting:`DATABASES` aliases test databases should have their state
  244. serialized to allow usage of the
  245. :ref:`serialized_rollback <test-case-serialized-rollback>` feature.
  246. * Django test runner now supports a :option:`--buffer <test --buffer>` option
  247. with parallel tests.
  248. * The new ``logger`` argument to :class:`~django.test.runner.DiscoverRunner`
  249. allows a Python :py:ref:`logger <logger>` to be used for logging.
  250. * The new :meth:`.DiscoverRunner.log` method provides a way to log messages
  251. that uses the ``DiscoverRunner.logger``, or prints to the console if not set.
  252. * Django test runner now supports a :option:`--shuffle <test --shuffle>` option
  253. to execute tests in a random order.
  254. * The :option:`test --parallel` option now supports the value ``auto`` to run
  255. one test process for each processor core.
  256. URLs
  257. ~~~~
  258. * ...
  259. Utilities
  260. ~~~~~~~~~
  261. * ...
  262. Validators
  263. ~~~~~~~~~~
  264. * ...
  265. .. _backwards-incompatible-4.0:
  266. Backwards incompatible changes in 4.0
  267. =====================================
  268. Database backend API
  269. --------------------
  270. This section describes changes that may be needed in third-party database
  271. backends.
  272. * ``DatabaseOperations.year_lookup_bounds_for_date_field()`` and
  273. ``year_lookup_bounds_for_datetime_field()`` methods now take the optional
  274. ``iso_year`` argument in order to support bounds for ISO-8601 week-numbering
  275. years.
  276. * The second argument of ``DatabaseSchemaEditor._unique_sql()`` and
  277. ``_create_unique_sql()`` methods is now fields instead of columns.
  278. :mod:`django.contrib.gis`
  279. -------------------------
  280. * Support for PostGIS 2.3 is removed.
  281. * Support for GDAL 2.0 and GEOS 3.5 is removed.
  282. Dropped support for PostgreSQL 9.6
  283. ----------------------------------
  284. Upstream support for PostgreSQL 9.6 ends in November 2021. Django 4.0 supports
  285. PostgreSQL 10 and higher.
  286. Dropped support for Oracle 12.2 and 18c
  287. ---------------------------------------
  288. Upstream support for Oracle 12.2 ends in March 2022 and for Oracle 18c it ends
  289. in June 2021. Django 3.2 will be supported until April 2024. Django 4.0
  290. officially supports Oracle 19c.
  291. .. _csrf-trusted-origins-changes-4.0:
  292. ``CSRF_TRUSTED_ORIGINS`` changes
  293. --------------------------------
  294. Format change
  295. ~~~~~~~~~~~~~
  296. Values in the :setting:`CSRF_TRUSTED_ORIGINS` setting must include the scheme
  297. (e.g. ``'http://'`` or ``'https://'``) instead of only the hostname.
  298. Also, values that started with a dot, must now also include an asterisk before
  299. the dot. For example, change ``'.example.com'`` to ``'https://*.example.com'``.
  300. A system check detects any required changes.
  301. Configuring it may now be required
  302. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  303. As CSRF protection now consults the ``Origin`` header, you may need to set
  304. :setting:`CSRF_TRUSTED_ORIGINS`, particularly if you allow requests from
  305. subdomains by setting :setting:`CSRF_COOKIE_DOMAIN` (or
  306. :setting:`SESSION_COOKIE_DOMAIN` if :setting:`CSRF_USE_SESSIONS` is enabled) to
  307. a value starting with a dot.
  308. ``SecurityMiddleware`` no longer sets the ``X-XSS-Protection`` header
  309. ---------------------------------------------------------------------
  310. The :class:`~django.middleware.security.SecurityMiddleware` no longer sets the
  311. ``X-XSS-Protection`` header if the ``SECURE_BROWSER_XSS_FILTER`` setting is
  312. ``True``. The setting is removed.
  313. Most modern browsers don't honor the ``X-XSS-Protection`` HTTP header. You can
  314. use Content-Security-Policy_ without allowing ``'unsafe-inline'`` scripts
  315. instead.
  316. If you want to support legacy browsers and set the header, use this line in a
  317. custom middleware::
  318. response.headers.setdefault('X-XSS-Protection', '1; mode=block')
  319. .. _Content-Security-Policy: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
  320. Migrations autodetector changes
  321. -------------------------------
  322. The migrations autodetector now uses model states instead of model classes.
  323. Also, migration operations for ``ForeignKey`` and ``ManyToManyField`` fields no
  324. longer specify attributes which were not passed to the fields during
  325. initialization.
  326. As a side-effect, running ``makemigrations`` might generate no-op
  327. ``AlterField`` operations for ``ManyToManyField`` and ``ForeignKey`` fields in
  328. some cases.
  329. Miscellaneous
  330. -------------
  331. * Support for ``cx_Oracle`` < 7.0 is removed.
  332. * To allow serving a Django site on a subpath without changing the value of
  333. :setting:`STATIC_URL`, the leading slash is removed from that setting (now
  334. ``'static/'``) in the default :djadmin:`startproject` template.
  335. * The :class:`~django.contrib.admin.AdminSite` method for the admin ``index``
  336. view is no longer decorated with ``never_cache`` when accessed directly,
  337. rather than via the recommended ``AdminSite.urls`` property, or
  338. ``AdminSite.get_urls()`` method.
  339. * Unsupported operations on a sliced queryset now raise ``TypeError`` instead
  340. of ``AssertionError``.
  341. * The undocumented ``django.test.runner.reorder_suite()`` function is renamed
  342. to ``reorder_tests()``. It now accepts an iterable of tests rather than a
  343. test suite, and returns an iterator of tests.
  344. * Calling ``FileSystemStorage.delete()`` with an empty ``name`` now raises
  345. ``ValueError`` instead of ``AssertionError``.
  346. * Calling ``EmailMultiAlternatives.attach_alternative()`` or
  347. ``EmailMessage.attach()`` with an invalid ``content`` or ``mimetype``
  348. arguments now raise ``ValueError`` instead of ``AssertionError``.
  349. * :meth:`~django.test.SimpleTestCase.assertHTMLEqual` no longer considers a
  350. non-boolean attribute without a value equal to an attribute with the same
  351. name and value.
  352. * Tests that fail to load, for example due to syntax errors, now always match
  353. when using :option:`test --tag`.
  354. * The undocumented ``django.contrib.admin.utils.lookup_needs_distinct()``
  355. function is renamed to ``lookup_spawns_duplicates()``.
  356. * The undocumented ``HttpRequest.get_raw_uri()`` method is removed. The
  357. :meth:`.HttpRequest.build_absolute_uri` method may be a suitable alternative.
  358. * The ``object`` argument of undocumented ``ModelAdmin.log_addition()``,
  359. ``log_change()``, and ``log_deletion()`` methods is renamed to ``obj``.
  360. * :class:`~django.utils.feedgenerator.RssFeed`,
  361. :class:`~django.utils.feedgenerator.Atom1Feed`, and their subclasses now
  362. emit elements with no content as self-closing tags.
  363. * ``NodeList.render()`` no longer casts the output of ``render()`` method for
  364. individual nodes to a string. ``Node.render()`` should always return a string
  365. as documented.
  366. * The ``where_class`` property of ``django.db.models.sql.query.Query`` and the
  367. ``where_class`` argument to the private ``get_extra_restriction()`` method of
  368. ``ForeignObject`` and ``ForeignObjectRel`` are removed. If needed, initialize
  369. ``django.db.models.sql.where.WhereNode`` instead.
  370. * The ``filter_clause`` argument of the undocumented ``Query.add_filter()``
  371. method is replaced by two positional arguments ``filter_lhs`` and
  372. ``filter_rhs``.
  373. * :class:`~django.middleware.csrf.CsrfViewMiddleware` now uses
  374. ``request.META['CSRF_COOKIE_NEEDS_UPDATE']`` in place of
  375. ``request.META['CSRF_COOKIE_USED']``, ``request.csrf_cookie_needs_reset``,
  376. and ``response.csrf_cookie_set`` to track whether the CSRF cookie should be
  377. sent. This is an undocumented, private API.
  378. * The undocumented ``TRANSLATOR_COMMENT_MARK`` constant is moved from
  379. ``django.template.base`` to ``django.utils.translation.template``.
  380. * The ``real_apps`` argument of the undocumented
  381. ``django.db.migrations.state.ProjectState.__init__()`` method must now be a
  382. set if provided.
  383. * :class:`~django.forms.RadioSelect` and
  384. :class:`~django.forms.CheckboxSelectMultiple` widgets are now rendered in
  385. ``<div>`` tags so they are announced more concisely by screen readers. If you
  386. need the previous behavior, :ref:`override the widget template
  387. <overriding-built-in-widget-templates>` with the appropriate template from
  388. Django 3.2.
  389. .. _deprecated-features-4.0:
  390. Features deprecated in 4.0
  391. ==========================
  392. Time zone support
  393. -----------------
  394. In order to follow good practice, the default value of the :setting:`USE_TZ`
  395. setting will change from ``False`` to ``True``, and time zone support will be
  396. enabled by default, in Django 5.0.
  397. Note that the default :file:`settings.py` file created by
  398. :djadmin:`django-admin startproject <startproject>` includes
  399. :setting:`USE_TZ = True <USE_TZ>` since Django 1.4.
  400. You can set ``USE_TZ`` to ``False`` in your project settings before then to
  401. opt-out.
  402. Miscellaneous
  403. -------------
  404. * ``SERIALIZE`` test setting is deprecated as it can be inferred from the
  405. :attr:`~django.test.TestCase.databases` with the
  406. :ref:`serialized_rollback <test-case-serialized-rollback>` option enabled.
  407. * The undocumented ``django.utils.baseconv`` module is deprecated.
  408. * The undocumented ``django.utils.datetime_safe`` module is deprecated.
  409. * The default sitemap protocol for sitemaps built outside the context of a
  410. request will change from ``'http'`` to ``'https'`` in Django 5.0.
  411. * The ``extra_tests`` argument for :meth:`.DiscoverRunner.build_suite` and
  412. :meth:`.DiscoverRunner.run_tests` is deprecated.
  413. * The :class:`~django.contrib.postgres.aggregates.ArrayAgg`,
  414. :class:`~django.contrib.postgres.aggregates.JSONBAgg`, and
  415. :class:`~django.contrib.postgres.aggregates.StringAgg` aggregates will return
  416. ``None`` when there are no rows instead of ``[]``, ``[]``, and ``''``
  417. respectively in Django 5.0. If you need the previous behavior, explicitly set
  418. ``default`` to ``Value([])``, ``Value('[]')``, or ``Value('')``.
  419. Features removed in 4.0
  420. =======================
  421. These features have reached the end of their deprecation cycle and are removed
  422. in Django 4.0.
  423. See :ref:`deprecated-features-3.0` for details on these changes, including how
  424. to remove usage of these features.
  425. * ``django.utils.http.urlquote()``, ``urlquote_plus()``, ``urlunquote()``, and
  426. ``urlunquote_plus()`` are removed.
  427. * ``django.utils.encoding.force_text()`` and ``smart_text()`` are removed.
  428. * ``django.utils.translation.ugettext()``, ``ugettext_lazy()``,
  429. ``ugettext_noop()``, ``ungettext()``, and ``ungettext_lazy()`` are removed.
  430. * ``django.views.i18n.set_language()`` doesn't set the user language in
  431. ``request.session`` (key ``_language``).
  432. * ``alias=None`` is required in the signature of
  433. ``django.db.models.Expression.get_group_by_cols()`` subclasses.
  434. * ``django.utils.text.unescape_entities()`` is removed.
  435. * ``django.utils.http.is_safe_url()`` is removed.
  436. See :ref:`deprecated-features-3.1` for details on these changes, including how
  437. to remove usage of these features.
  438. * The ``PASSWORD_RESET_TIMEOUT_DAYS`` setting is removed.
  439. * The :lookup:`isnull` lookup no longer allows using non-boolean values as the
  440. right-hand side.
  441. * The ``django.db.models.query_utils.InvalidQuery`` exception class is removed.
  442. * The ``django-admin.py`` entry point is removed.
  443. * The ``HttpRequest.is_ajax()`` method is removed.
  444. * Support for the pre-Django 3.1 encoding format of cookies values used by
  445. ``django.contrib.messages.storage.cookie.CookieStorage`` is removed.
  446. * Support for the pre-Django 3.1 password reset tokens in the admin site (that
  447. use the SHA-1 hashing algorithm) is removed.
  448. * Support for the pre-Django 3.1 encoding format of sessions is removed.
  449. * Support for the pre-Django 3.1 ``django.core.signing.Signer`` signatures
  450. (encoded with the SHA-1 algorithm) is removed.
  451. * Support for the pre-Django 3.1 ``django.core.signing.dumps()`` signatures
  452. (encoded with the SHA-1 algorithm) in ``django.core.signing.loads()`` is
  453. removed.
  454. * Support for the pre-Django 3.1 user sessions (that use the SHA-1 algorithm)
  455. is removed.
  456. * The ``get_response`` argument for
  457. ``django.utils.deprecation.MiddlewareMixin.__init__()`` is required and
  458. doesn't accept ``None``.
  459. * The ``providing_args`` argument for ``django.dispatch.Signal`` is removed.
  460. * The ``length`` argument for ``django.utils.crypto.get_random_string()`` is
  461. required.
  462. * The ``list`` message for ``ModelMultipleChoiceField`` is removed.
  463. * Support for passing raw column aliases to ``QuerySet.order_by()`` is removed.
  464. * The ``NullBooleanField`` model field is removed, except for support in
  465. historical migrations.
  466. * ``django.conf.urls.url()`` is removed.
  467. * The ``django.contrib.postgres.fields.JSONField`` model field is removed,
  468. except for support in historical migrations.
  469. * ``django.contrib.postgres.fields.jsonb.KeyTransform`` and
  470. ``django.contrib.postgres.fields.jsonb.KeyTextTransform`` are removed.
  471. * ``django.contrib.postgres.forms.JSONField`` is removed.
  472. * The ``{% ifequal %}`` and ``{% ifnotequal %}`` template tags are removed.
  473. * The ``DEFAULT_HASHING_ALGORITHM`` transitional setting is removed.