Thanks for checking this. I guess when I testing it was picking pycrypto and not gluon.contrib.aes.
I think it is fixed in trunk. Can you please double check? On Thursday, 13 December 2012 11:18:26 UTC-6, Vasile Ermicioi wrote: > > looks like signed cookies based session is broken > > I get this error, > > > 3. > 4. > 5. > 6. > 7. > 8. > 9. > 10. > 11. > > Traceback (most recent call last): > File "D:\dev\web2py-trunk\gluon\main.py", line 576, in wsgibase > session._try_store_in_cookie_or_file(request, response) > File "D:\dev\web2py-trunk\gluon\globals.py", line 748, in > _try_store_in_cookie_or_file > self._try_store_in_cookie(request, response) or \ > File "D:\dev\web2py-trunk\gluon\globals.py", line 696, in > _try_store_in_cookie > value = secure_dumps(dict(self), response.session_cookie_key, > compression_level=response.session_cookie_compression_level) > File "D:\dev\web2py-trunk\gluon\utils.py", line 136, in secure_dumps > cipher = AES.new(key, IV=key[:16]) > AttributeError: type object 'AES' has no attribute 'new' > > but works if I comment the line > > #session.connect(cookie_key='mykey', compression_level=9) > > --

