Thanks for checking this. I guess when I testing it was picking pycrypto 
and not gluon.contrib.aes.

I think it is fixed in trunk. Can you please double check?

On Thursday, 13 December 2012 11:18:26 UTC-6, Vasile Ermicioi wrote:
>
> looks like signed cookies based session is broken
>
> I get this error, 
>
>
> 3.
> 4.
> 5.
> 6.
> 7.
> 8.
> 9.
> 10.
> 11.
>
> Traceback (most recent call last):
>   File "D:\dev\web2py-trunk\gluon\main.py", line 576, in wsgibase
>     session._try_store_in_cookie_or_file(request, response)
>   File "D:\dev\web2py-trunk\gluon\globals.py", line 748, in 
> _try_store_in_cookie_or_file
>     self._try_store_in_cookie(request, response) or \
>   File "D:\dev\web2py-trunk\gluon\globals.py", line 696, in 
> _try_store_in_cookie
>     value = secure_dumps(dict(self), response.session_cookie_key, 
> compression_level=response.session_cookie_compression_level)
>   File "D:\dev\web2py-trunk\gluon\utils.py", line 136, in secure_dumps
>     cipher = AES.new(key, IV=key[:16])
> AttributeError: type object 'AES' has no attribute 'new'
>
> but works if I comment the line 
>
> #session.connect(cookie_key='mykey', compression_level=9)
>
>

-- 



Reply via email to