flask-paranoid 0.2.0-4 source package in Ubuntu
Changelog
flask-paranoid (0.2.0-4) unstable; urgency=medium [ Ondřej Nový ] * Use debhelper-compat instead of debian/compat. * Bump Standards-Version to 4.4.1. * d/control: Update Maintainer field with new Debian Python Team contact address. * d/control: Update Vcs-* fields with new Debian Python Team Salsa layout. [ Debian Janitor ] * Bump debhelper from old 9 to 12. * Set upstream metadata fields: Bug-Database, Bug-Submit. * Update renamed lintian tag names in lintian overrides. * Update standards version to 4.5.0, no changes needed. [ Christoph Berg ] * Fix github watchfile. -- Christoph Berg <email address hidden> Wed, 22 Dec 2021 16:10:46 +0100
Upload details
- Uploaded by:
- Debian Python Team
- Uploaded to:
- Sid
- Original maintainer:
- Debian Python Team
- Architectures:
- all
- Section:
- misc
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Jammy | release | universe | misc |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
flask-paranoid_0.2.0-4.dsc | 2.0 KiB | d13daa0a94a1c895e6dae14906e3a19ed71b5f60ec3dbd27e118c49ba74b92f1 |
flask-paranoid_0.2.0.orig.tar.gz | 2.6 KiB | a2ee9257642e0254f11578a4aa54a1a725167a641cfa0879330d477ec370c749 |
flask-paranoid_0.2.0-4.debian.tar.xz | 2.6 KiB | a0f2efdd1a2e00e163ebe2ddd79317f72dd16eee5db0677e892fc3ebdd8aeed2 |
Available diffs
- diff from 0.2.0-3.1 to 0.2.0-4 (1.3 KiB)
No changes file available.
Binary packages built by this source
- python3-flask-paranoid: Simple user session protection
Flask-Paranoid protects user sessions. When a client connects to this
application, a "paranoid" token will be generated according to the IP address
and user agent. In all subsequent requests, the token will be recalculated and
checked against the one computed for the first request. If the session cookie
is stolen and the attacker tries to use it from another location, the
generated token will be different, and in that case the extension will clear
the session and block the request.