Libcoveweb

Latest version: v0.31.1

Safety actively analyzes 688587 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 8

0.31.1

Fixed

- Fixed string formatting for the "The request timed out after %(timeout)s seconds" error

0.31.0

Note: Release 0.30.5 was not done properly and was missing some code.

Added

- Add `lang` attribute to `html` tag.

Fixed

- If a file is expired, the error message states the correct DELETE_FILES_AFTER_DAYS value, instead of the default of 7.
- If a file is expired, the "file not found" exception is caught by all possible sources.

0.30.5

Added

- New setting `allow_direct_web_fetch` to configure whether cove will fetch any url passed as a GET parameter rather than from the input form. The default will be for this to be disabled. Cove implementations updating may need to check if there are "try this sample data" links on the home page that will need to be updated to use a form with newly required CSRF protection (For example - https://github.com/OpenDataServices/lib-cove-web/pull/144#issuecomment-2378743354).
- Set the `REQUESTS_TIMEOUT` setting, to prevent source URLs from causing a denial of service, whether accidentally or maliciously.

0.30.4

Not secure
Fixed

- Report a human-readable error when an invalid URL for the input data is supplied by the user. https://github.com/OpenDataServices/lib-cove-web/pull/139

0.30.3

Not secure
Fixed

- Unsuccessful implmentation of human-readable error, see 0.30.4 above.

0.30.2

Not secure
Fixed

- support_email was in templates but was not set anywhere. Set in views and set in config.
https://github.com/OpenDataServices/lib-cove-web/issues/101

Page 1 of 8

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.