Django-s3sign

Latest version: v0.4.0

Safety actively analyzes 682387 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 2 of 3

0.2.0

==================
* This library now requires boto3 and botocore to be installed.
* The `amz_headers` view option has been replaced by the `acl`
option. This is 'public-read' by default. Set it to None or
'private' for non-public assets.
* Use boto3 for signing the PUT request.
* Use AWS Signature version 4 for signing URLs. This avoids the needs
for quoting which has led to encoding bugs.
* Add a ContentType fix on PUT request that fixes a bug where SVG's
can't be uploaded.

0.1.9

==================
* Fix bug where signatures with '+' in weren't being properly encoded.

0.1.8

==================
* Add `SignS3View.private` flag to determine whether we're uploading
private resources. If so, return the signed GET url so the media can
be displayed immediately on upload.

0.1.7

==================
* Don't use amz headers for signature calculation if they aren't
present.

0.1.6

==================
* Add webp, svg, and pdf mime types.
* Allow amz acl to be configurable in S3Upload.js

0.1.5

==================
* Update base64.encodestring() to encodebytes().

Page 2 of 3

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.