flask-paranoid 0.2.0-4 source package in Ubuntu

Changelog

flask-paranoid (0.2.0-4) unstable; urgency=medium

  [ Ondřej Nový ]
  * Use debhelper-compat instead of debian/compat.
  * Bump Standards-Version to 4.4.1.
  * d/control: Update Maintainer field with new Debian Python Team
    contact address.
  * d/control: Update Vcs-* fields with new Debian Python Team Salsa
    layout.

  [ Debian Janitor ]
  * Bump debhelper from old 9 to 12.
  * Set upstream metadata fields: Bug-Database, Bug-Submit.
  * Update renamed lintian tag names in lintian overrides.
  * Update standards version to 4.5.0, no changes needed.

  [ Christoph Berg ]
  * Fix github watchfile.

 -- Christoph Berg <email address hidden>  Wed, 22 Dec 2021 16:10:46 +0100

Upload details

Uploaded by:
Debian Python Team
Uploaded to:
Sid
Original maintainer:
Debian Python Team
Architectures:
all
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Jammy release universe misc

Builds

Jammy: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
flask-paranoid_0.2.0-4.dsc 2.0 KiB d13daa0a94a1c895e6dae14906e3a19ed71b5f60ec3dbd27e118c49ba74b92f1
flask-paranoid_0.2.0.orig.tar.gz 2.6 KiB a2ee9257642e0254f11578a4aa54a1a725167a641cfa0879330d477ec370c749
flask-paranoid_0.2.0-4.debian.tar.xz 2.6 KiB a0f2efdd1a2e00e163ebe2ddd79317f72dd16eee5db0677e892fc3ebdd8aeed2

Available diffs

No changes file available.

Binary packages built by this source

python3-flask-paranoid: Simple user session protection

 Flask-Paranoid protects user sessions. When a client connects to this
 application, a "paranoid" token will be generated according to the IP address
 and user agent. In all subsequent requests, the token will be recalculated and
 checked against the one computed for the first request. If the session cookie
 is stolen and the attacker tries to use it from another location, the
 generated token will be different, and in that case the extension will clear
 the session and block the request.