Django-filer

Latest version: v3.3.1

Safety actively analyzes 688823 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 12 of 14

0.9.5

Not secure
==================

* File paths now contain random component by default (to avoid filename clashes).
* Fixed migrations to be better compatible with custom user models.
* Bugfixes, performance improvements.

0.9.4

Not secure
==================

* Experimental Django 1.5 support.
* Bugfixes.

0.9.3

Not secure
==================

* Fixes template file permissions (packaging issue).

0.9.2

Not secure
==================

* File.name move to not null (run migrations).
* Fix popup mode when Folder doesn't exists.
* 271 Remove unused templatetag from django 1.4.
* 269 Hide "Folder permissions" entry for "normal" users.
* 265 click on image thumbnail in popup looses context.
* 264 cancel search button looses popup context.
* 263 deleting images from the image detail view redirects to the wrong list view.

0.9.1

Not secure
==================

* Removed nginx X-Accel-Redirect Content-Type header (245).
* Validate_related_name method appears to break in FilerFileField (148).
* Remember last openened folder in file picker (187).

0.9

Not secure
================

* Django-1.4 compatibility.
* Separate, customizable file storage backends for public and private files.
* Deleting a file in filer now deletes the file and all its thumbnails from the filesystem.
* Many bulk operations (admin actions).
* Backwards incompatible changes:
* storage refactor: path to private files in the db has changed (no longer relative to MEDIA_ROOT)
* `filer.server.urls` needs to be included to serve private files
* static media has been moved from 'media' to 'static'
(as proposed by django.contrib.staticfiles and django 1.3)
* django 1.2 no longer supported

Page 12 of 14

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.