4.0.txt 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552
  1. ============================================
  2. Django 4.0 release notes - UNDER DEVELOPMENT
  3. ============================================
  4. *Expected December 2021*
  5. Welcome to Django 4.0!
  6. These release notes cover the :ref:`new features <whats-new-4.0>`, as well as
  7. some :ref:`backwards incompatible changes <backwards-incompatible-4.0>` you'll
  8. want to be aware of when upgrading from Django 3.2 or earlier. We've
  9. :ref:`begun the deprecation process for some features
  10. <deprecated-features-4.0>`.
  11. See the :doc:`/howto/upgrade-version` guide if you're updating an existing
  12. project.
  13. Python compatibility
  14. ====================
  15. Django 4.0 supports Python 3.8, 3.9, and 3.10. We **highly recommend** and only
  16. officially support the latest release of each series.
  17. The Django 3.2.x series is the last to support Python 3.6 and 3.7.
  18. .. _whats-new-4.0:
  19. What's new in Django 4.0
  20. ========================
  21. Functional unique constraints
  22. -----------------------------
  23. The new :attr:`*expressions <django.db.models.UniqueConstraint.expressions>`
  24. positional argument of
  25. :class:`UniqueConstraint() <django.db.models.UniqueConstraint>` enables
  26. creating functional unique constraints on expressions and database functions.
  27. For example::
  28. from django.db import models
  29. from django.db.models import UniqueConstraint
  30. from django.db.models.functions import Lower
  31. class MyModel(models.Model):
  32. first_name = models.CharField(max_length=255)
  33. last_name = models.CharField(max_length=255)
  34. class Meta:
  35. indexes = [
  36. UniqueConstraint(
  37. Lower('first_name'),
  38. Lower('last_name').desc(),
  39. name='first_last_name_unique',
  40. ),
  41. ]
  42. Functional unique constraints are added to models using the
  43. :attr:`Meta.constraints <django.db.models.Options.constraints>` option.
  44. Minor features
  45. --------------
  46. :mod:`django.contrib.admin`
  47. ~~~~~~~~~~~~~~~~~~~~~~~~~~~
  48. * The ``admin/base.html`` template now has a new block ``header`` which
  49. contains the admin site header.
  50. * The new :meth:`.ModelAdmin.get_formset_kwargs` method allows customizing the
  51. keyword arguments passed to the constructor of a formset.
  52. * The navigation sidebar now has a quick filter toolbar.
  53. * The new context variable ``model`` which contains the model class for each
  54. model is added to the :meth:`.AdminSite.each_context` method.
  55. :mod:`django.contrib.admindocs`
  56. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  57. * The admindocs now allows esoteric setups where :setting:`ROOT_URLCONF` is not
  58. a string.
  59. * The model section of the ``admindocs`` now shows cached properties.
  60. :mod:`django.contrib.auth`
  61. ~~~~~~~~~~~~~~~~~~~~~~~~~~
  62. * The default iteration count for the PBKDF2 password hasher is increased from
  63. 260,000 to 320,000.
  64. * The new
  65. :attr:`LoginView.next_page <django.contrib.auth.views.LoginView.next_page>`
  66. attribute and
  67. :meth:`~django.contrib.auth.views.LoginView.get_default_redirect_url` method
  68. allow customizing the redirect after login.
  69. :mod:`django.contrib.contenttypes`
  70. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  71. * ...
  72. :mod:`django.contrib.gis`
  73. ~~~~~~~~~~~~~~~~~~~~~~~~~
  74. * Added support for SpatiaLite 5.
  75. * :class:`~django.contrib.gis.gdal.GDALRaster` now allows creating rasters in
  76. any GDAL virtual filesystem.
  77. :mod:`django.contrib.messages`
  78. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  79. * ...
  80. :mod:`django.contrib.postgres`
  81. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  82. * The PostgreSQL backend now supports connecting by a service name. See
  83. :ref:`postgresql-connection-settings` for more details.
  84. :mod:`django.contrib.redirects`
  85. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  86. * ...
  87. :mod:`django.contrib.sessions`
  88. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  89. * ...
  90. :mod:`django.contrib.sitemaps`
  91. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  92. * ...
  93. :mod:`django.contrib.sites`
  94. ~~~~~~~~~~~~~~~~~~~~~~~~~~~
  95. * ...
  96. :mod:`django.contrib.staticfiles`
  97. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  98. * :class:`~django.contrib.staticfiles.storage.ManifestStaticFilesStorage` now
  99. replaces paths to JavaScript source map references with their hashed
  100. counterparts.
  101. :mod:`django.contrib.syndication`
  102. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  103. * ...
  104. Cache
  105. ~~~~~
  106. * ...
  107. CSRF
  108. ~~~~
  109. * CSRF protection now consults the ``Origin`` header, if present. To facilitate
  110. this, :ref:`some changes <csrf-trusted-origins-changes-4.0>` to the
  111. :setting:`CSRF_TRUSTED_ORIGINS` setting are required.
  112. Decorators
  113. ~~~~~~~~~~
  114. * ...
  115. Email
  116. ~~~~~
  117. * ...
  118. Error Reporting
  119. ~~~~~~~~~~~~~~~
  120. * ...
  121. File Storage
  122. ~~~~~~~~~~~~
  123. * ...
  124. File Uploads
  125. ~~~~~~~~~~~~
  126. * ...
  127. Forms
  128. ~~~~~
  129. * :class:`~django.forms.ModelChoiceField` now includes the provided value in
  130. the ``params`` argument of a raised
  131. :exc:`~django.core.exceptions.ValidationError` for the ``invalid_choice``
  132. error message. This allows custom error messages to use the ``%(value)s``
  133. placeholder.
  134. Generic Views
  135. ~~~~~~~~~~~~~
  136. * ...
  137. Internationalization
  138. ~~~~~~~~~~~~~~~~~~~~
  139. * ...
  140. Logging
  141. ~~~~~~~
  142. * ...
  143. Management Commands
  144. ~~~~~~~~~~~~~~~~~~~
  145. * The :djadmin:`runserver` management command now supports the
  146. :option:`--skip-checks` option.
  147. * On PostgreSQL, :djadmin:`dbshell` now supports specifying a password file.
  148. Migrations
  149. ~~~~~~~~~~
  150. * ...
  151. Models
  152. ~~~~~~
  153. * New :meth:`QuerySet.contains(obj) <.QuerySet.contains>` method returns
  154. whether the queryset contains the given object. This tries to perform the
  155. query in the simplest and fastest way possible.
  156. * The new ``precision`` argument of the
  157. :class:`Round() <django.db.models.functions.Round>` database function allows
  158. specifying the number of decimal places after rounding.
  159. * :meth:`.QuerySet.bulk_create` now sets the primary key on objects when using
  160. SQLite 3.35+.
  161. * :class:`~django.db.models.DurationField` now supports multiplying and
  162. dividing by scalar values on SQLite.
  163. Requests and Responses
  164. ~~~~~~~~~~~~~~~~~~~~~~
  165. * The :class:`~django.middleware.security.SecurityMiddleware` now adds the
  166. :ref:`Cross-Origin Opener Policy <cross-origin-opener-policy>` header with a
  167. value of ``'same-origin'`` to prevent cross-origin popups from sharing the
  168. same browsing context. You can prevent this header from being added by
  169. setting the :setting:`SECURE_CROSS_ORIGIN_OPENER_POLICY` setting to ``None``.
  170. Security
  171. ~~~~~~~~
  172. * ...
  173. Serialization
  174. ~~~~~~~~~~~~~
  175. * ...
  176. Signals
  177. ~~~~~~~
  178. * The new ``stdout`` argument for :func:`~django.db.models.signals.pre_migrate`
  179. and :func:`~django.db.models.signals.post_migrate` signals allows redirecting
  180. output to a stream-like object. It should be preferred over
  181. :py:data:`sys.stdout` and :py:func:`print` when emitting verbose output in
  182. order to allow proper capture when testing.
  183. Templates
  184. ~~~~~~~~~
  185. * ...
  186. Tests
  187. ~~~~~
  188. * The new ``serialized_aliases`` argument of
  189. :func:`django.test.utils.setup_databases` determines which
  190. :setting:`DATABASES` aliases test databases should have their state
  191. serialized to allow usage of the
  192. :ref:`serialized_rollback <test-case-serialized-rollback>` feature.
  193. * Django test runner now supports a :option:`--buffer <test --buffer>` option
  194. with parallel tests.
  195. URLs
  196. ~~~~
  197. * ...
  198. Utilities
  199. ~~~~~~~~~
  200. * ...
  201. Validators
  202. ~~~~~~~~~~
  203. * ...
  204. .. _backwards-incompatible-4.0:
  205. Backwards incompatible changes in 4.0
  206. =====================================
  207. Database backend API
  208. --------------------
  209. This section describes changes that may be needed in third-party database
  210. backends.
  211. * ``DatabaseOperations.year_lookup_bounds_for_date_field()`` and
  212. ``year_lookup_bounds_for_datetime_field()`` methods now take the optional
  213. ``iso_year`` argument in order to support bounds for ISO-8601 week-numbering
  214. years.
  215. :mod:`django.contrib.gis`
  216. -------------------------
  217. * Support for PostGIS 2.3 is removed.
  218. * Support for GDAL 2.0 and GEOS 3.5 is removed.
  219. Dropped support for PostgreSQL 9.6
  220. ----------------------------------
  221. Upstream support for PostgreSQL 9.6 ends in November 2021. Django 4.0 supports
  222. PostgreSQL 10 and higher.
  223. Dropped support for Oracle 12.2 and 18c
  224. ---------------------------------------
  225. Upstream support for Oracle 12.2 ends in March 2022 and for Oracle 18c it ends
  226. in June 2021. Django 3.2 will be supported until April 2024. Django 4.0
  227. officially supports Oracle 19c.
  228. .. _csrf-trusted-origins-changes-4.0:
  229. ``CSRF_TRUSTED_ORIGINS`` changes
  230. --------------------------------
  231. Format change
  232. ~~~~~~~~~~~~~
  233. Values in the :setting:`CSRF_TRUSTED_ORIGINS` setting must include the scheme
  234. (e.g. ``'http://'`` or ``'https://'``) instead of only the hostname.
  235. Also, values that started with a dot, must now also include an asterisk before
  236. the dot. For example, change ``'.example.com'`` to ``'https://*.example.com'``.
  237. A system check detects any required changes.
  238. Configuring it may now be required
  239. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  240. As CSRF protection now consults the ``Origin`` header, you may need to set
  241. :setting:`CSRF_TRUSTED_ORIGINS`, particularly if you allow requests from
  242. subdomains by setting :setting:`CSRF_COOKIE_DOMAIN` (or
  243. :setting:`SESSION_COOKIE_DOMAIN` if :setting:`CSRF_USE_SESSIONS` is enabled) to
  244. a value starting with a dot.
  245. ``SecurityMiddleware`` no longer sets the ``X-XSS-Protection`` header
  246. ---------------------------------------------------------------------
  247. The :class:`~django.middleware.security.SecurityMiddleware` no longer sets the
  248. ``X-XSS-Protection`` header if the ``SECURE_BROWSER_XSS_FILTER`` setting is
  249. ``True``. The setting is removed.
  250. Most modern browsers don't honor the ``X-XSS-Protection`` HTTP header. You can
  251. use Content-Security-Policy_ without allowing ``'unsafe-inline'`` scripts
  252. instead.
  253. If you want to support legacy browsers and set the header, use this line in a
  254. custom middleware::
  255. response.headers.setdefault('X-XSS-Protection', '1; mode=block')
  256. .. _Content-Security-Policy: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
  257. Miscellaneous
  258. -------------
  259. * Support for ``cx_Oracle`` < 7.0 is removed.
  260. * To allow serving a Django site on a subpath without changing the value of
  261. :setting:`STATIC_URL`, the leading slash is removed from that setting (now
  262. ``'static/'``) in the default :djadmin:`startproject` template.
  263. * The :class:`~django.contrib.admin.AdminSite` method for the admin ``index``
  264. view is no longer decorated with ``never_cache`` when accessed directly,
  265. rather than via the recommended ``AdminSite.urls`` property, or
  266. ``AdminSite.get_urls()`` method.
  267. * Unsupported operations on a sliced queryset now raise ``TypeError`` instead
  268. of ``AssertionError``.
  269. * The undocumented ``django.test.runner.reorder_suite()`` function is renamed
  270. to ``reorder_tests()``. It now accepts an iterable of tests rather than a
  271. test suite, and returns an iterator of tests.
  272. * Calling ``FileSystemStorage.delete()`` with an empty ``name`` now raises
  273. ``ValueError`` instead of ``AssertionError``.
  274. * Calling ``EmailMultiAlternatives.attach_alternative()`` or
  275. ``EmailMessage.attach()`` with an invalid ``content`` or ``mimetype``
  276. arguments now raise ``ValueError`` instead of ``AssertionError``.
  277. * :meth:`~django.test.SimpleTestCase.assertHTMLEqual` no longer considers a
  278. non-boolean attribute without a value equal to an attribute with the same
  279. name and value.
  280. * Tests that fail to load, for example due to syntax errors, now always match
  281. when using :option:`test --tag`.
  282. * The migrations autodetector now uses model states instead of model classes.
  283. As a side-effect ``makemigrations`` might generate no-op ``AlterField``
  284. operations for ``ForeignKey`` fields in some cases.
  285. * The undocumented ``django.contrib.admin.utils.lookup_needs_distinct()``
  286. function is renamed to ``lookup_spawns_duplicates()``.
  287. * The undocumented ``HttpRequest.get_raw_uri()`` method is removed. The
  288. :meth:`.HttpRequest.build_absolute_uri` method may be a suitable alternative.
  289. * The ``object`` argument of undocumented ``ModelAdmin.log_addition()``,
  290. ``log_change()``, and ``log_deletion()`` methods is renamed to ``obj``.
  291. .. _deprecated-features-4.0:
  292. Features deprecated in 4.0
  293. ==========================
  294. Time zone support
  295. -----------------
  296. In order to follow good practice, the default value of the :setting:`USE_TZ`
  297. setting will change from ``False`` to ``True``, and time zone support will be
  298. enabled by default, in Django 5.0.
  299. Note that the default :file:`settings.py` file created by
  300. :djadmin:`django-admin startproject <startproject>` includes
  301. :setting:`USE_TZ = True <USE_TZ>` since Django 1.4.
  302. You can set ``USE_TZ`` to ``False`` in your project settings before then to
  303. opt-out.
  304. Miscellaneous
  305. -------------
  306. * ``SERIALIZE`` test setting is deprecated as it can be inferred from the
  307. :attr:`~django.test.TestCase.databases` with the
  308. :ref:`serialized_rollback <test-case-serialized-rollback>` option enabled.
  309. * The undocumented ``django.utils.baseconv`` module is deprecated.
  310. * The undocumented ``django.utils.datetime_safe`` module is deprecated.
  311. * The default sitemap protocol for sitemaps built outside the context of a
  312. request will change from ``'http'`` to ``'https'`` in Django 5.0.
  313. Features removed in 4.0
  314. =======================
  315. These features have reached the end of their deprecation cycle and are removed
  316. in Django 4.0.
  317. See :ref:`deprecated-features-3.0` for details on these changes, including how
  318. to remove usage of these features.
  319. * ``django.utils.http.urlquote()``, ``urlquote_plus()``, ``urlunquote()``, and
  320. ``urlunquote_plus()`` are removed.
  321. * ``django.utils.encoding.force_text()`` and ``smart_text()`` are removed.
  322. * ``django.utils.translation.ugettext()``, ``ugettext_lazy()``,
  323. ``ugettext_noop()``, ``ungettext()``, and ``ungettext_lazy()`` are removed.
  324. * ``django.views.i18n.set_language()`` doesn't set the user language in
  325. ``request.session`` (key ``_language``).
  326. * ``alias=None`` is required in the signature of
  327. ``django.db.models.Expression.get_group_by_cols()`` subclasses.
  328. * ``django.utils.text.unescape_entities()`` is removed.
  329. * ``django.utils.http.is_safe_url()`` is removed.
  330. See :ref:`deprecated-features-3.1` for details on these changes, including how
  331. to remove usage of these features.
  332. * The ``PASSWORD_RESET_TIMEOUT_DAYS`` setting is removed.
  333. * The :lookup:`isnull` lookup no longer allows using non-boolean values as the
  334. right-hand side.
  335. * The ``django.db.models.query_utils.InvalidQuery`` exception class is removed.
  336. * The ``django-admin.py`` entry point is removed.
  337. * The ``HttpRequest.is_ajax()`` method is removed.
  338. * Support for the pre-Django 3.1 encoding format of cookies values used by
  339. ``django.contrib.messages.storage.cookie.CookieStorage`` is removed.
  340. * Support for the pre-Django 3.1 password reset tokens in the admin site (that
  341. use the SHA-1 hashing algorithm) is removed.
  342. * Support for the pre-Django 3.1 encoding format of sessions is removed.
  343. * Support for the pre-Django 3.1 ``django.core.signing.Signer`` signatures
  344. (encoded with the SHA-1 algorithm) is removed.
  345. * Support for the pre-Django 3.1 ``django.core.signing.dumps()`` signatures
  346. (encoded with the SHA-1 algorithm) in ``django.core.signing.loads()`` is
  347. removed.
  348. * Support for the pre-Django 3.1 user sessions (that use the SHA-1 algorithm)
  349. is removed.
  350. * The ``get_request`` argument for
  351. ``django.utils.deprecation.MiddlewareMixin.__init__()`` is required and
  352. doesn't accept ``None``.
  353. * The ``providing_args`` argument for ``django.dispatch.Signal`` is removed.
  354. * The ``length`` argument for ``django.utils.crypto.get_random_string()`` is
  355. required.
  356. * The ``list`` message for ``ModelMultipleChoiceField`` is removed.
  357. * Support for passing raw column aliases to ``QuerySet.order_by()`` is removed.
  358. * The ``NullBooleanField`` model field is removed, except for support in
  359. historical migrations.
  360. * ``django.conf.urls.url()`` is removed.
  361. * The ``django.contrib.postgres.fields.JSONField`` model field is removed,
  362. except for support in historical migrations.
  363. * ``django.contrib.postgres.fields.jsonb.KeyTransform`` and
  364. ``django.contrib.postgres.fields.jsonb.KeyTextTransform`` are removed.
  365. * ``django.contrib.postgres.forms.JSONField`` is removed.
  366. * The ``{% ifequal %}`` and ``{% ifnotequal %}`` template tags are removed.
  367. * The ``DEFAULT_HASHING_ALGORITHM`` transitional setting is removed.