Flask-jwt-extended

Latest version: v4.6.0

Safety actively analyzes 629994 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 3 of 16

4.2.3

* Fix compatibility with Flask 1.x.x that was broke with the 4.2.2 release (see 437). Thanks j178 for pointing this out!

4.2.2

* Added async support to jwt_required view decorator (436). Thanks StefanVDWeide!
* Minor documentation improvements. Thanks rohitsanj-jovian!

4.2.1

* Update Flask-JWT-Extended to work with flask 2.x.x. (427).

4.2.0

* Add `JWT_ENCODE_NBF` configuration option to allow disabling the NBF claim during token creation. Thanks magnunleno! 416
* Add a new `get_jwt_request_location()` function to determine where a token was parsed from in a request (useful for implicit token refresh with cookies). Thanks sammck! 420
* Fix wrong error message in edge case with current user in non-decorated route. 408
* Fix JWT in headers followed by a comma raises IndexError 347
* Fix edge cases where `jwt_required(optional=True)` was treating a request as if there was jwt present instead of handling the `InvalidHeaderError`. 421
* Add a `JWT_QUERY_STRING_VALUE_PREFIX` configuration option. 421
* Update error messages to provide more helpful information to callers when they are sending in a token in an unexpected way.

4.1.0

* Allow JWT `type` to be things besides `refresh` or `access` (401). Any type that is not `refresh` will be considered an access token. Thanks sambonner for the PR!
* Allow locations kwarg for jwt_required() to be a string (394)
* Minor documentation improvements

4.0.2

* Properly include `requirements.txt` in the manifest.

Page 3 of 16

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.