Sepiida

Latest version: v18.96

Safety actively analyzes 640762 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 29 of 31

3.27

----
Only allow privileged session to make requests to know internal domains. Previously
privileged session would allow requests to any domain which could leak sensitive information
about how to internally authenticate in our services. Now we create a list of trusted domains
via SEPIIDA_INTERNAL_DOMAINS and if the domain of a requested URL doesn't match an error is
raised

3.26

----
Turn more JWT-based 500 errors into 400-level errors

3.25

----
Allow clients to override the secrets in the register_jwt_handlers function

3.24

----
Turn a 500 error during authentication into a 400-level error during authentication

3.23

----
Allow datetime claims when not verifying JWT. This avoids an exception when using but not verifying JWTs

3.22

----
Add configurable caching headers to APIEndpoint. By default GET requests will have a max-age of 10 seconds. You'll want to manually specify caching headers for any endpoints that do polling faster than that to allow browsers to actually make the request. You can specify the caching header with


class Endoint(sepiida.endpoints.APIEndpoint):
CACHING = {'GET': 'some value for cache-control'}


Also add the ability to add raven integration to a project through sepiida which will set the user context based on the user's session information

Also add default expose headers for CORS that expose Location and X-Sentry-ID. These can be overridden in the register_cors_handlers function by adding a list of headers to expose for a particular service

Also fix a security issue related to opening up LIST methods on accident when opening GET methods.

Page 29 of 31

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.