Releases: vimalloc/flask-jwt-extended
Releases · vimalloc/flask-jwt-extended
1.2.0
- Adds support for using JWTs in cookies and tokens at the same time (refs #26)
1.1.0
- Tested against python 3.6
- Adds ability to access full (raw) jwt in a protected endpoint (#22)
1.0.3
- Better error messages when using a different header name than 'Authorization'
1.0.2
- Fix using alternative header names. There was an option for alternate header names before, but it was hard coded to look for JWTs under the default 'Authorization' header.
1.0.1
- Switch to semantic versioning
- Set PROPAGATE_EXCEPTIONS=True. Should fix the extension when run in production
0.0.9
(minor release)
- Fix returned json when NoAuthorizationError is raised and cookies are being used to store the JWT
0.0.8
- Removes option identity_lookup kwarg in
create_access_token()
function, introduced in 0.0.7. Now uses the decorator @jwt.user_identity_loader
to perform this functionality. This is a breaking change.
0.0.7
- create_access_token() now defaults to non-fresh tokens
- Adds a help method for logging out when using cookies to store the JWTs: unset_jwt_cookies()
- Allows passing complex objects into the create_access_token() function, to prevent unnecessary duplicate disk lookups. See #11
0.0.6
- Fixes jwt_required (et al) decorators to work with flask-restless (and probably other frameworks as well)
0.0.5
- Better examples for common use cases
- Unify cookie API's (breaking change, set_refresh_cookie is now set_refresh_cookies)