- 02 Apr, 2022 1 commit
-
-
hitech95 authored
Signed-off-by:
hitech95 <nicveronese@gmail.com> (cherry picked from commit fc8926493c2adc03f2a4104f2b46a3b6a7043782)
-
- 18 Mar, 2022 2 commits
-
-
Alexander Graf authored
Add spaces (cherry picked from commit 630a4e9b5e18d301c83f8e49de366656c44d0857)
-
Maximilian Fischer authored
#2283 (cherry picked from commit 8775dc5b155d7ad97672f1eb5b47a9dd01031211)
-
- 07 Jan, 2022 1 commit
-
-
Florent Daigniere authored
(cherry picked from commit 7bd1fd34)
-
- 04 Jan, 2022 1 commit
-
-
Florent Daigniere authored
Make the caller responsible to know whether the rate-limit code should be called or not (cherry picked from commit 7f89a297)
-
- 19 Dec, 2021 1 commit
-
-
Florent Daigniere authored
Ensure that webmail tokens are in sync with sessions
-
- 31 Oct, 2021 1 commit
-
-
Florent Daigniere authored
-
- 25 Oct, 2021 1 commit
-
-
Dimitri Huisman authored
-
- 16 Oct, 2021 4 commits
-
-
Florent Daigniere authored
-
Florent Daigniere authored
-
Florent Daigniere authored
-
Florent Daigniere authored
-
- 23 Sep, 2021 1 commit
-
-
Florent Daigniere authored
-
- 27 Aug, 2021 1 commit
-
-
Dimitri Huisman authored
-
- 26 Aug, 2021 1 commit
-
-
Dimitri Huisman authored
-
- 14 Jul, 2021 1 commit
-
-
Florent Daigniere authored
-
- 09 Mar, 2021 2 commits
-
-
Florent Daigniere authored
-
Florent Daigniere authored
This is also fixing tokens on /webdav/
-
- 07 Feb, 2021 1 commit
-
-
Florent Daigniere authored
-
- 09 Feb, 2020 1 commit
-
-
kaiyou authored
Rate limiting was already redesigned to use Python limits. This introduced some unexpected behavior, including the fact that only one criteria is supported per limiter. Docs and setup utility are updated with this in mind. Also, the code was made more generic, so limiters can be delivered for something else than authentication. Authentication-specific code was moved directly to the authentication routine.
-
- 06 Dec, 2019 2 commits
-
-
Michael Wyraz authored
-
Michael Wyraz authored
-
- 13 Dec, 2018 1 commit
-
-
kaiyou authored
The init script was pushing an application context, which maked flask.g global and persisted across requests. This was evaluated to have a minimal security impact. This explains/fixes #738: flask_wtf caches the csrf token in the application context to have a single token per request, and only sets the session attribute after the first generation.
-
- 18 Oct, 2018 1 commit
-
-
kaiyou authored
-
- 27 Sep, 2018 1 commit
-
-
kaiyou authored
-