HI I am seeing difference in behavior between 2.14.5 and 2.14.6 for SQLFORM.grid, after clicking on the 'csv' button to download the csv. Same statement in both 2.14.5 and 2.14.6 formTable=SQLFORM.grid(\ query,\ fields=[db.temperature.probe,db.temperature.timeMeasured,db.temperature.celsius],\ orderby=db.temperature.timeMeasured, \ searchable=False,\ sortable=False,\ paginate=10,\ deletable=False,\ editable=False,\ details=False,\ create=False,\ csv=True,\ links_in_grid=False, \ user_signature=True, \ maxtextlengths={}, \ maxtextlength=20 )
No error in 2.14.5. This error in 2.14.6: Traceback (most recent call last): File "/home/pi/w/web2py/gluon/restricted.py", line 220, in restricted exec(ccode, environment) File "/home/pi/w/web2py/applications/init/controllers/display.py" <https://127.0.0.1:8001/admin/default/edit/init/controllers/display.py>, line 72, in <module> File "/home/pi/w/web2py/gluon/globals.py", line 405, in <lambda> self._caller = lambda f: f() File "/home/pi/w/web2py/applications/init/controllers/display.py" <https://127.0.0.1:8001/admin/default/edit/init/controllers/display.py>, line 31, in tempsTable maxtextlength=20 File "/home/pi/w/web2py/gluon/sqlhtml.py", line 2479, in grid raise HTTP(200, oExp.export(), **response.headers) File "/home/pi/w/web2py/gluon/sqlhtml.py", line 3522, in export self.rows.export_to_csv_file(s, represent=True) File "/home/pi/w/web2py/gluon/packages/dal/pydal/objects.py", line 2454, in export_to_csv_file row.append(record._extra[col]) File "/home/pi/w/web2py/gluon/packages/dal/pydal/objects.py", line 91, in __getattr__ raise AttributeError AttributeError where the SQLFORM.grid is in the function tempsTable, here is the view html: {{=LOAD(f='tempsTable', args=[], vars=tempQuery,\ extension='load', ajax=True, user_signature=True)}} regards, Ben On Monday, May 9, 2016 at 5:31:38 PM UTC-7, Massimo Di Pierro wrote: > > A few vulnerabilities have been found in admin. One of them was serious > and it made admin vulnerable to brute force password attacks under some > conditions. > They have been been fixed in version 2.14.6. If you expose admin publicly, > we recommend you upgrade immediately. > > Anyway, we remind everybody that it is not recommended to expose admin in > production environments. Run it locally and connect to it using a ssh > tunnel instead. > > Many takes to Narendra for funding and reporting the vulnerabilities, > Leonel for fixing them, and Richard and Simone for adding many tests and > fixing bugs. > > Massimo > -- Resources: - http://web2py.com - http://web2py.com/book (Documentation) - http://github.com/web2py/web2py (Source code) - https://code.google.com/p/web2py/issues/list (Report Issues) --- You received this message because you are subscribed to the Google Groups "web2py-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to web2py+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.