HI
I am seeing difference in behavior between 2.14.5 and 2.14.6 for
SQLFORM.grid, after clicking on the 'csv' button to download the csv.
Same statement in both 2.14.5 and 2.14.6
formTable=SQLFORM.grid(\
query,\
fields=[db.temperature.probe,db.temperature.timeMeasured,db.temperature.celsius],\
orderby=db.temperature.timeMeasured, \
searchable=False,\
sortable=False,\
paginate=10,\
deletable=False,\
editable=False,\
details=False,\
create=False,\
csv=True,\
links_in_grid=False, \
user_signature=True, \
maxtextlengths={}, \
maxtextlength=20
)
No error in 2.14.5. This error in 2.14.6:
Traceback (most recent call last):
File "/home/pi/w/web2py/gluon/restricted.py", line 220, in restricted
exec(ccode, environment)
File "/home/pi/w/web2py/applications/init/controllers/display.py"
<https://127.0.0.1:8001/admin/default/edit/init/controllers/display.py>, line
72, in <module>
File "/home/pi/w/web2py/gluon/globals.py", line 405, in <lambda>
self._caller = lambda f: f()
File "/home/pi/w/web2py/applications/init/controllers/display.py"
<https://127.0.0.1:8001/admin/default/edit/init/controllers/display.py>, line
31, in tempsTable
maxtextlength=20
File "/home/pi/w/web2py/gluon/sqlhtml.py", line 2479, in grid
raise HTTP(200, oExp.export(), **response.headers)
File "/home/pi/w/web2py/gluon/sqlhtml.py", line 3522, in export
self.rows.export_to_csv_file(s, represent=True)
File "/home/pi/w/web2py/gluon/packages/dal/pydal/objects.py", line 2454, in
export_to_csv_file
row.append(record._extra[col])
File "/home/pi/w/web2py/gluon/packages/dal/pydal/objects.py", line 91, in
__getattr__
raise AttributeError
AttributeError
where the SQLFORM.grid is in the function tempsTable, here is the view html:
{{=LOAD(f='tempsTable', args=[], vars=tempQuery,\
extension='load', ajax=True, user_signature=True)}}
regards,
Ben
On Monday, May 9, 2016 at 5:31:38 PM UTC-7, Massimo Di Pierro wrote:
>
> A few vulnerabilities have been found in admin. One of them was serious
> and it made admin vulnerable to brute force password attacks under some
> conditions.
> They have been been fixed in version 2.14.6. If you expose admin publicly,
> we recommend you upgrade immediately.
>
> Anyway, we remind everybody that it is not recommended to expose admin in
> production environments. Run it locally and connect to it using a ssh
> tunnel instead.
>
> Many takes to Narendra for funding and reporting the vulnerabilities,
> Leonel for fixing them, and Richard and Simone for adding many tests and
> fixing bugs.
>
> Massimo
>
--
Resources:
- http://web2py.com
- http://web2py.com/book (Documentation)
- http://github.com/web2py/web2py (Source code)
- https://code.google.com/p/web2py/issues/list (Report Issues)
---
You received this message because you are subscribed to the Google Groups
"web2py-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.