Hello community,

here is the log from the commit of package python-flask-jwt-extended for 
openSUSE:Factory checked in at 2019-10-30 14:48:46
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-flask-jwt-extended (Old)
 and      /work/SRC/openSUSE:Factory/.python-flask-jwt-extended.new.2990 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-flask-jwt-extended"

Wed Oct 30 14:48:46 2019 rev:8 rq:744105 version:3.24.1

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/python-flask-jwt-extended/python-flask-jwt-extended.changes
      2019-10-08 19:58:02.472177564 +0200
+++ 
/work/SRC/openSUSE:Factory/.python-flask-jwt-extended.new.2990/python-flask-jwt-extended.changes
    2019-10-30 14:48:50.378247417 +0100
@@ -1,0 +2,6 @@
+Wed Oct 30 11:49:52 UTC 2019 - Tomáš Chvátal <[email protected]>
+
+- Update to 3.24.1:
+  * Fixes a bug where missing JWTs were not being handled gracefully
+
+-------------------------------------------------------------------

Old:
----
  Flask-JWT-Extended-3.24.0.tar.gz

New:
----
  Flask-JWT-Extended-3.24.1.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-flask-jwt-extended.spec ++++++
--- /var/tmp/diff_new_pack.nw2evz/_old  2019-10-30 14:48:50.994248072 +0100
+++ /var/tmp/diff_new_pack.nw2evz/_new  2019-10-30 14:48:50.998248076 +0100
@@ -17,7 +17,7 @@
 
 
 Name:           python-flask-jwt-extended
-Version:        3.24.0
+Version:        3.24.1
 Release:        0
 Summary:        A Flask extension that provides JWT support
 License:        MIT

++++++ Flask-JWT-Extended-3.24.0.tar.gz -> Flask-JWT-Extended-3.24.1.tar.gz 
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Flask-JWT-Extended-3.24.0/Flask_JWT_Extended.egg-info/PKG-INFO 
new/Flask-JWT-Extended-3.24.1/Flask_JWT_Extended.egg-info/PKG-INFO
--- old/Flask-JWT-Extended-3.24.0/Flask_JWT_Extended.egg-info/PKG-INFO  
2019-10-04 16:49:24.000000000 +0200
+++ new/Flask-JWT-Extended-3.24.1/Flask_JWT_Extended.egg-info/PKG-INFO  
2019-10-24 17:59:58.000000000 +0200
@@ -1,6 +1,6 @@
 Metadata-Version: 2.1
 Name: Flask-JWT-Extended
-Version: 3.24.0
+Version: 3.24.1
 Summary: Extended JWT integration with Flask
 Home-page: https://github.com/vimalloc/flask-jwt-extended
 Author: Landon Gilbert-Bland
@@ -29,7 +29,7 @@
         
         
         ### Usage
-        [View the documentation 
online](http://flask-jwt-extended.readthedocs.io/en/latest/)
+        [View the documentation 
online](https://flask-jwt-extended.readthedocs.io/en/stable/)
         
         
         ### Changelog
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Flask-JWT-Extended-3.24.0/PKG-INFO 
new/Flask-JWT-Extended-3.24.1/PKG-INFO
--- old/Flask-JWT-Extended-3.24.0/PKG-INFO      2019-10-04 16:49:24.000000000 
+0200
+++ new/Flask-JWT-Extended-3.24.1/PKG-INFO      2019-10-24 17:59:58.000000000 
+0200
@@ -1,6 +1,6 @@
 Metadata-Version: 2.1
 Name: Flask-JWT-Extended
-Version: 3.24.0
+Version: 3.24.1
 Summary: Extended JWT integration with Flask
 Home-page: https://github.com/vimalloc/flask-jwt-extended
 Author: Landon Gilbert-Bland
@@ -29,7 +29,7 @@
         
         
         ### Usage
-        [View the documentation 
online](http://flask-jwt-extended.readthedocs.io/en/latest/)
+        [View the documentation 
online](https://flask-jwt-extended.readthedocs.io/en/stable/)
         
         
         ### Changelog
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Flask-JWT-Extended-3.24.0/README.md 
new/Flask-JWT-Extended-3.24.1/README.md
--- old/Flask-JWT-Extended-3.24.0/README.md     2019-03-02 05:58:44.000000000 
+0100
+++ new/Flask-JWT-Extended-3.24.1/README.md     2019-10-24 17:52:37.000000000 
+0200
@@ -21,7 +21,7 @@
 
 
 ### Usage
-[View the documentation 
online](http://flask-jwt-extended.readthedocs.io/en/latest/)
+[View the documentation 
online](https://flask-jwt-extended.readthedocs.io/en/stable/)
 
 
 ### Changelog
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Flask-JWT-Extended-3.24.0/flask_jwt_extended/__init__.py 
new/Flask-JWT-Extended-3.24.1/flask_jwt_extended/__init__.py
--- old/Flask-JWT-Extended-3.24.0/flask_jwt_extended/__init__.py        
2019-10-04 16:46:30.000000000 +0200
+++ new/Flask-JWT-Extended-3.24.1/flask_jwt_extended/__init__.py        
2019-10-24 17:55:07.000000000 +0200
@@ -12,4 +12,4 @@
     verify_jwt_in_request_optional, verify_jwt_refresh_token_in_request
 )
 
-__version__ = '3.24.0'
+__version__ = '3.24.1'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/Flask-JWT-Extended-3.24.0/flask_jwt_extended/view_decorators.py 
new/Flask-JWT-Extended-3.24.1/flask_jwt_extended/view_decorators.py
--- old/Flask-JWT-Extended-3.24.0/flask_jwt_extended/view_decorators.py 
2019-10-04 16:46:03.000000000 +0200
+++ new/Flask-JWT-Extended-3.24.1/flask_jwt_extended/view_decorators.py 
2019-10-24 17:52:42.000000000 +0200
@@ -188,7 +188,7 @@
     if header_type:
         field_values = split(r',\s*', auth_header)
         jwt_header = [s for s in field_values if s.split()[0] == header_type]
-        if len(jwt_header) < 1:
+        if len(jwt_header) < 1 or len(jwt_header[0].split()) != 2:
             msg = "Bad {} header. Expected value '{} <JWT>'".format(
                 header_name,
                 header_type
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Flask-JWT-Extended-3.24.0/tests/test_headers.py 
new/Flask-JWT-Extended-3.24.1/tests/test_headers.py
--- old/Flask-JWT-Extended-3.24.0/tests/test_headers.py 2019-09-10 
23:20:16.000000000 +0200
+++ new/Flask-JWT-Extended-3.24.1/tests/test_headers.py 2019-10-24 
17:52:42.000000000 +0200
@@ -151,6 +151,15 @@
     assert response.get_json() == {'foo': "bar"}
 
 
+def test_header_without_jwt(app):
+    jwtM = get_jwt_manager(app)
+    test_client = app.test_client()
+
+    access_headers = {'Authorization': 'Bearer '}
+    response = test_client.get('/protected', headers=access_headers)
+    assert response.status_code == 422
+    assert response.get_json() == {'msg': "Bad Authorization header. Expected 
value 'Bearer <JWT>'"}
+
 def test_custom_error_msg_key(app):
     app.config['JWT_ERROR_MESSAGE_KEY'] = 'message'
     response = app.test_client().get('/protected', headers=None)


Reply via email to