Flask-jwt-extended

Latest version: v4.6.0

Safety actively analyzes 629959 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 7 of 16

3.13.1

* Include tests in MANIFEST.in (197)

3.13.0

* Add support for custom encode and decode keys (91). There are now two new callbacks that can be registered: `decode_key_loader` and `encode_key_loader`. The decode callback is passed in the **unverified** JWT claims, and must return a string that will be used to decode and verify the JWT. The encode callback is passed in the identity (as passed in to the `create_access_token` or `create_refresh_token` functions) and must return a string that will be used to encode a JWT. If unset, the `JWT_SECRET_KEY`, `JWT_PUBLIC_KEY`, or `JWT_PRIVATE_KEY` will still be used as appropriate.

3.12.1

* Requires cryptography >= 2.3 in response to https://nvd.nist.gov/vuln/detail/CVE-2018-10903

3.12.0

* Add ability to get the JWT from the JSON body of the request (173). Thanks luord!!

3.11.0

* Adds new `JWT_ERROR_MESSAGE_KEY` option to change the JSON key on the default error messages (160)

3.10.0

* Adds new `JWT_CLAIMS_IN_REFRESH_TOKEN` configuration option, which if set to true will cause the user claims to be loaded into refresh tokens as well as access tokens (100).

Page 7 of 16

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.