Skip to content

Releases: vimalloc/flask-jwt-extended

2.1.0

27 May 17:34
Compare
Choose a tag to compare

2.0.0

08 May 16:43
Compare
Choose a tag to compare
  • Fix import error when using older versions of pyjwt (refs #42)
  • Make cryptography an optional dependency (see http://flask-jwt-extended.readthedocs.io/en/latest/installation.html for installation instructions)
  • Add JWT_SECRET_KEY option. It will check this first, then fall back to using app.secret_key if it isn't set. Only used on symmetric signing algorithms, such as the HS* ones.
  • Add JWT_PRIVATE_KEY option in place of app.secret_key for asymmetric (public/private key) signing algorithms. It now uses this option instead of app.secret_key, and is a breaking change from version 1.5.0.
  • Update requirements.txt to use newest version of pyjwt

1.5.0

05 May 16:56
Compare
Choose a tag to compare
  • Adds support for asymmetric cryptography (#40)

1.4.2

26 Apr 22:26
Compare
Choose a tag to compare
  • Fixes an issue where decoding a JWT would use the algorithm that was defined in the JWT instead of the algorithm that was defined in app.config['JWT_ALGORITHM'] (refs #39)

1.4.1

15 Apr 05:37
Compare
Choose a tag to compare
  • Add JWT_COOKIE_DOMAIN option, to control the cross-domain cookie setting for the underlying flask set_cookie call.

1.4.0

10 Apr 18:44
Compare
Choose a tag to compare
  • Big refactoring of code behind the scenes. Shouldn't cause any breaking problems with existing applications
  • Depreciate JWT_CSRF_HEADER_NAME and add JWT_ACCESS_CSRF_HEADER_NAME and JWT_REFRESH_CSRF_HEADER_NAME (refs #37)
  • Add options to change the cookie paths for JWT_ACCESS_CSRF_COOKIE_NAME and JWT_REFRESH_CSRF_COOKIE_NAME via JWT_ACCESS_CSRF_COOKIE_PATH and JWT_ACCESS_CSRF_COOKIE_PATH (refs #33)
  • Add option to not store csrf double submit values in addition cookies via JWT_CSRF_IN_COOKIES and add get_csrf_token(encoded_token) method so you could grab the CSRF double submit values out of a created token, and return them another way (for example, in the resulting JSON of a request). (refs #33)

1.3.2

05 Apr 00:21
Compare
Choose a tag to compare
  • Adds option to use expires cookies instead of session cookies (#35)
  • Properly deletes csrf cookies in the unset_jwt_cookies method

1.3.1

05 Mar 18:28
Compare
Choose a tag to compare
  • Raises helpful error messages when attempting to use cookie methods without this extension being configured to use cookies (ref #31)

1.3.0

02 Feb 17:41
Compare
Choose a tag to compare
  • Preserve CSRF errors when using headers and cookies together
  • Allow only specified request types to need CSRF protection, when using cookies with CSRF protection enabled. Defaults to ['PUT', 'PATCH', 'POST, 'DELETE'], and can be change with the app.config['JWT_CSRF_METHODS'] option

1.2.1

01 Feb 20:35
Compare
Choose a tag to compare
  • Fixes bug with using @user_identity_loader with refresh tokens (#27)