Rpc4django

Latest version: v0.6.3

Safety actively analyzes 630450 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 3 of 4

0.1.11

Not secure
- Added a login_required parameter to the rpcmethod decorator `2`_

.. _2: https://github.com/davidfischer/rpc4django/pull/2/files?w=1

0.1.10

Not secure
- Removed requirement on Django in setup.py `798823`_
- Refactored to use standard setuptools tests (``python setup.py test``)
- Moved development to Github_

.. _798823: https://bugs.launchpad.net/rpc4django/+bug/798823
.. _Github: https://github.com/davidfischer/rpc4django

0.1.9

Not secure
- Added a CookieTransport class with a lot of help from Douglas Peter Sculley.
- RPC4Django's logging now goes to the rpc4django logger.
- Catches an ExpatError in xmlrpclib that was previously uncaught under
certain conditions
- Fixed error with scanning of ``INSTALLED_APPS`` for ``rpcmethods``. This
was causing an issue when South_ was installed. (`807628`_)
- Fixed `bug 807653`_ related to scanning ServerProxy objects

.. _South: http://south.aeracode.org/ticket/586
.. _bug 807653: https://bugs.launchpad.net/rpc4django/+bug/807653
.. _807628: https://bugs.launchpad.net/rpc4django/+bug/807628

0.1.8

Not secure
- Added cross referenced Sphinx_ based documentation
- Fixed `bug 570852`_ which caused incompatibilities with MongoDB because
of the name class with the variable ``is_rpcmethod``.
- Fixed `bug 658788`_ which caused CSRF issues with
:meth:`serve_rpc_request <rpc4django.views.serve_rpc_request>`.
- Added :ref:`out of the box authentication <ootb_auth>` as per the
blueprint_ on Launchpad.

.. _Sphinx: http://sphinx.pocoo.org
.. _bug 570852: https://bugs.launchpad.net/rpc4django/+bug/570852
.. _bug 658788: https://bugs.launchpad.net/rpc4django/+bug/658788
.. _blueprint: https://blueprints.launchpad.net/rpc4django/+spec/handle-authentication

0.1.7

Not secure
- Fixed a bug relating to CSRF
- Added feature to allow recursive imports of RPC methods

0.1.6

Not secure
- Changed the XMLRPC dispatcher to allow sending
`nil <http://ontosys.com/xml-rpc/extensions.php>`_ which translates to the
Python ``None``. This was already allowed with JSONRPC
- Cross site request forgery (CSRF_) framework support
- Added cross domain
`access control <https://developer.mozilla.org/en/HTTP_access_control>`_
- Added unit tests for base64 encoded binary
- Added access to HttpRequest object form inside a called RPC method

.. _CSRF: http://docs.djangoproject.com/en/dev/ref/contrib/csrf/

Page 3 of 4

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.