Collective.sendaspdf

Latest version: v3.0

Safety actively analyzes 681866 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 3 of 5

2.4

----------------

- Added a setting in send as PDF tool so we can exclude some browser
when forcing file name. This will mainly usefull for Chrome, as this
one considers PDF generated with the tool as potentially harmful
files.
The same problem will certainly appear with Chromium. [vincent]

- Display a file name based on the context's title when downloading
the page. [Giacomo Spettoli]

- Added some functional tests. [vincent]

- Don't repeat POST parameters anymore. [vincent]

2.3.1

------------------

- Bugfix with Unicode (again) and Ajax. [vincent]

2.3

----------------

- Bugfix when not using secure mail host. [Yuri]

- Bugfix with wk transforms for encoding. [Khairil Yusof]

2.2

----------------

- Fixed encoding to avoid being limitated to ASCII. [mauriziolupo]

- Added a generic setup handler for sendaspdftool and import/export
preferences. [mauriziolupo]

2.1.1

------------------

- added a target (sic :/) attributes on the link to preview the PDF so
it opens in a new window. That's prety ugly, but the fact is that if
a user clicks on the link with IE and Acrobat reader installed, it
will open the PDF in the same window. Hitting the 'back' button will
display the page without the Ajax form. [vincent]

- in the Ajax popup, we do not try to initialize tinymce is an error
happenned. [vincent]

- another IE bugfix due to an extra comma + CSS opacity fix [vincent]

2.1

----------------

- also added meta tag robots:noindex on the forms. [vincent]

- Added header 'X-Robots-Tag': 'noindex' in downloaded file to avoid
having it indexed by search engines. [vincent]

- Bugfix when sumbitting the Ajax form with TinyMCE. [vincent]

Page 3 of 5

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.