Django-pghistory

Latest version: v3.2.0

Safety actively analyzes 630450 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 5 of 6

1.5.2

Not secure
Trivial

- Updated with latest Django template, fixing doc builds [Wes Kendall, 42cbc3c]

1.5.1

Not secure
Trivial

- Use `pk` instead of `id` to get the user's primary key [Eerik Sven Puudist, f105828]
- Fix default_app_config warning on Django 3.2+ [Adam Johnson, 8753bc4]

1.5.0

Not secure
Feature

- Add support for GET requests in pghistory middleware [Shivananda Sahu, ae2524e]

Currently the middleware adds a context for POST, PUT, PATCH and DELETE requests. Updating middleware to add a context for GET requests along with POST, PUT, PATCH and DELETE.

1.4.0

Not secure
Feature

- Allow target() to receive a queryset or list. [M Somerville, 0f34e91]

This expands the target() function to accept a queryset or a list of
objects on top of the existing one object.
- Add support for delete requests in pghistory middleware [Shivananda Sahu, 322d17e]

Currently the middleware adds a context for POST, PUT, and PATCH requests. This leaves out DELETE requests as the only ones that can affect a model without a context. Updating middleware to add a context for DELETE requests along with POST, PUT and PATCH.

Trivial

- Minor code formatting fixes [Wes Kendall, d0b7664]

1.3.0

Not secure
Bug

- Fixed bug in BeforeDelete event [Wes Kendall, aab4182]

The BeforeDelete event was referencing the wrong trigger value (NEW).
Code was updated to reference the proper OLD row for this event,
and a failing test case was added.

1.2.2

Not secure
Trivial

- Updated with latest template, dropping 3.6 support and adding Django 4 support [Wes Kendall, c160973]

Page 5 of 6

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.