[Snyk] Security upgrade django from 1.2 to 4.2.28#43
Conversation
The following vulnerabilities are fixed by pinning transitive dependencies: - https://snyk.io/vuln/SNYK-PYTHON-DJANGO-15183335
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: 0af6a14a0d
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
|
|
||
| # GAE packages should match the "libraries" section of app.yaml | ||
| django==1.2 | ||
| django==4.2.28 |
There was a problem hiding this comment.
Align Django bump with App Engine pinning
This change only bumps the pip dependency, but production still forces Django 1.2 via use_library('django', '1.2') in appengine_config.py (lines 11–16), so the vulnerability isn’t actually remediated in the App Engine runtime and local dev will now be running a different Django version than prod. If any dependency (e.g., gae_mini_profiler/gae_bingo mentioned in that same file) relies on Django APIs, the mismatch can cause behavior differences that won’t be caught in local testing. Consider updating the App Engine library pin (or removing it) alongside the requirements bump so runtime and dev stay consistent and the security fix is effective.
Useful? React with 👍 / 👎.
Snyk has created this PR to fix 1 vulnerabilities in the pip dependencies of this project.
Snyk changed the following file(s):
requirements.txtImportant
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 SQL Injection