Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: vimalloc/flask-jwt-extended
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 4.5.3
Choose a base ref
...
head repository: vimalloc/flask-jwt-extended
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 4.6.0
Choose a head ref
  • 3 commits
  • 7 files changed
  • 3 contributors

Commits on Nov 29, 2023

  1. Configuration menu
    Copy the full SHA
    f65202f View commit details
    Browse the repository at this point in the history

Commits on Dec 13, 2023

  1. Do not check JWT_TOKEN_LOCATION when setting csrf value in a jwt (#538)

    Previously, we would only include the csrf double submit value in a
    jwt if `JWT_COOKIE_CSRF_PROTECT` was true (the default) AND
    `JWT_TOKEN_LOCATION` was configured to use cookies.
    
    However, since we allow overwriting `locations` on a per-route basis
    instead of only globally for he whole application, we could create a
    situation where a single route was configured to use cookies when the
    rest of the app was not, and csrf checks were not happening against
    that endpoint.
    
    This change makes it so that any jwts will be encoded with a csrf value
    when `JWT_COOKIE_CSRF_PROTECT` is true, regardless of if the app is
    globally configured to use cookies. It will also verify the csrf double
    submit token on any route that uses cookies when `JWT_COOKIE_CSRF_PROTECT`
    is true, regardless of if that is set globally in the application or on an
    individual route.
    
    As a result of this change, you might notice that using jwts without
    cookies now include a csrf value. This will not change the behavior
    of non-jwt based endpoints at all, your jwts will just be a little
    bigger. You can remove that key from the jwt by explicitly setting
    `JWT_COOKIE_CSRF_PROTECT` to False, if you are not using cookies.
    vimalloc authored Dec 13, 2023
    Configuration menu
    Copy the full SHA
    84c1946 View commit details
    Browse the repository at this point in the history
  2. Bump to 4.6.0

    vimalloc committed Dec 13, 2023
    Configuration menu
    Copy the full SHA
    b483ff2 View commit details
    Browse the repository at this point in the history
Loading