Please login to access the resource

python-Flask-Security-Too

Edit Package python-Flask-Security-Too
No description set
Refresh
Refresh
Source Files
Filename Size Changed
Flask-Security-Too-3.4.0.tar.gz 0000334036 326 KB
no-mongodb.patch 0000000521 521 Bytes
python-Flask-Security-Too.changes 0000001708 1.67 KB
python-Flask-Security-Too.spec 0000003651 3.57 KB
Revision 2 (latest revision is 23)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 791500 from Tomáš Chvátal's avatar Tomáš Chvátal (scarabeus_iv) (revision 2)
- Update to 3.4.0:
  * (:pr:`257`) Support a unified sign in feature. Please see :ref:`unified-sign-in`.
  * (:pr:`265`) Add phone number validation class. This is used in both unified sign in as well as two-factor when using sms.
  * (:pr:`274`) Add support for 'freshness' of caller's authentication. This permits endpoints to be additionally protected by ensuring a recent authentication.
  * (:issue:`99`, :issue:`195`) Support pluggable password validators. Provide a default validator that offers complexity and breached support.
  * (:issue:`266`) Provide interface to two-factor send_token so that applications can provide error mitigation. Defaults to returning errors if can't send the verification code.
  * (:pr:`247`) Updated all-inclusive data models (fsqlaV2). Add fields necessary for the new unified sign in feature and changed 'username' to be unique (but not required).
  * (:pr:`245`) Use fs_uniquifier as the default Flask-Login 'alternative token'. Basically this means that changing the fs_uniquifier will cause outstanding auth tokens, session and remember me cookies to be invalidated. So if an account gets compromised, an admin can easily stop access. Prior to this cookies were storing the 'id' which is the user's primary key - difficult to change! (kishi85)
- Enable the testing
- Add patch to not require mongodb during testing:
  * no-mongodb.patch
Comments 0
openSUSE Build Service is sponsored by