Django-defender

Latest version: v0.9.8

Safety actively analyzes 681866 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 3 of 6

0.6.1

-----

- Add redispy 3.2.0 compatibility [nrth]

0.6.0

-----

- Remove Python 3.3 [fr0mhell]
- Remove Django 1.8-1.10 [fr0mhell]
- Add Celery v4 [fr0mhell]
- Update travis config [fr0mhell]
- Update admin URL [fr0mhell]

0.5.5

-----

- Add new setting ``DEFENDER_GET_USERNAME_FROM_REQUEST_PATH`` for control how username is accessed from request [andrewshkovskii]
- Add new argument ``get_username`` for ``decorators.watch_login`` to propagate ``get_username`` argument to other utils functions calls done in ``watch_login`` [andrewshkovskii]

0.5.4

-----

- Add 2 new setting variables for more granular failure limit control [williamboman]
- Add ssl option when instantiating StrictRedis [mjrimrie]
- Send signals when blocking username or ip [williamboman]

0.5.3

-----

- Remove mockredis as install requirement, make only test requirement [blueyed]

0.5.2

-----

- Fix regex in 'unblock_username_view' to handle special symbols [ruthus18]
- Fix django requires version for 1.11.x [kencochrane]
- Remove hiredis dependency [ericbuckley]
- Correctly get raw client when using django_redis cache. [cburger]
- Replace django.core.urlresolvers with django.urls For Django 2.0 [s-wirth]
- Add username kwarg for providing username directly rather than via callback arg [williamboman]
- Only use the username if it is actually provided [cobusc]

Page 3 of 6

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.