Releases: vimalloc/flask-jwt-extended
Releases · vimalloc/flask-jwt-extended
2.1.0
2.0.0
- Fix import error when using older versions of pyjwt (refs #42)
- Make cryptography an optional dependency (see http://flask-jwt-extended.readthedocs.io/en/latest/installation.html for installation instructions)
- Add
JWT_SECRET_KEY
option. It will check this first, then fall back to usingapp.secret_key
if it isn't set. Only used on symmetric signing algorithms, such as theHS*
ones. - Add
JWT_PRIVATE_KEY
option in place ofapp.secret_key
for asymmetric (public/private key) signing algorithms. It now uses this option instead ofapp.secret_key
, and is a breaking change from version 1.5.0. - Update requirements.txt to use newest version of pyjwt
1.5.0
1.4.2
1.4.1
1.4.0
- Big refactoring of code behind the scenes. Shouldn't cause any breaking problems with existing applications
- Depreciate
JWT_CSRF_HEADER_NAME
and addJWT_ACCESS_CSRF_HEADER_NAME
andJWT_REFRESH_CSRF_HEADER_NAME
(refs #37) - Add options to change the cookie paths for
JWT_ACCESS_CSRF_COOKIE_NAME
andJWT_REFRESH_CSRF_COOKIE_NAME
viaJWT_ACCESS_CSRF_COOKIE_PATH
andJWT_ACCESS_CSRF_COOKIE_PATH
(refs #33) - Add option to not store csrf double submit values in addition cookies via
JWT_CSRF_IN_COOKIES
and addget_csrf_token(encoded_token)
method so you could grab the CSRF double submit values out of a created token, and return them another way (for example, in the resulting JSON of a request). (refs #33)
1.3.2
1.3.1
1.3.0
- Preserve CSRF errors when using headers and cookies together
- Allow only specified request types to need CSRF protection, when using cookies with CSRF protection enabled. Defaults to
['PUT', 'PATCH', 'POST, 'DELETE']
, and can be change with theapp.config['JWT_CSRF_METHODS']
option