Django-cookieless

Latest version: v1.2

Safety actively analyzes 687918 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 2

1.2

-------------------
- Fix breach mitigation test for Python 3 [Ed Crewe]
- Fix test settings to correct path [jonespm]
- Fix content-length and decode [C.Severance]

1.1

------------------

- Rewrite for Python 3 and Django 2.2
- Remove xteacrypt and use cryptography

[Ed Crewe]

1.0

------------------------

- Test with latest Django 1.6.2
- Enforce session keys as strings if the session fails to save
Due to the move of the session serializer to JSON in Django 1.6

[Ed Crewe]

0.9

----------------------

- Add protection against breach attack via nonce encryption
http://breachattack.com/
- Added related test

[Chris Bailey]

- Remove line return at end of session id introduced by base64 encoding

[Ed Crewe]

0.8

----------------------

- Clean up some pylint
- Switch to base64 encoding to shorten encrypted session ids

0.7

------------------------

- Add a cookieless_signal to allow custom code to be hooked to cookieless sessions
- Pass a created flag for cookieless sessions to the signal
- Add a no_cookies marker key to cookieless sessions for the same reason
- Check automatic form rewrites to ensure that sessions are not already set manually
- Fix tests check of hidden session_id broken by extra space in hidden field
- Add post method for test class view so test posts don't throw HttpResponseNotAllowed
- Make the secret generated by settings options more unique

Page 1 of 2

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.