Accepting request 644342 from home:jengelh:branches:devel:languages:python:flask

- Ensure neutrality of description. Add paragraph from
  https://flask-paranoid.readthedocs.io/en/latest/ .

OBS-URL: https://build.opensuse.org/request/show/644342
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:flask/python-Flask-Paranoid?expand=0&rev=3
This commit is contained in:
Petr Cervinka 2018-10-25 07:55:29 +00:00 committed by Git OBS Bridge
parent 5320e382a4
commit 2b7ee1b024
2 changed files with 13 additions and 3 deletions

View File

@ -1,3 +1,9 @@
-------------------------------------------------------------------
Wed Oct 24 14:05:47 UTC 2018 - Jan Engelhardt <jengelh@inai.de>
- Ensure neutrality of description. Add paragraph from
https://flask-paranoid.readthedocs.io/en/latest/ .
------------------------------------------------------------------- -------------------------------------------------------------------
Wed Oct 10 14:58:53 UTC 2018 - Antonio Larrosa <alarrosa@suse.com> - 0.2.0 Wed Oct 10 14:58:53 UTC 2018 - Antonio Larrosa <alarrosa@suse.com> - 0.2.0

View File

@ -20,7 +20,7 @@ Name: python-Flask-Paranoid
Version: 0.2.0 Version: 0.2.0
Release: 0 Release: 0
License: MIT License: MIT
Summary: Simple user session protection Summary: Flask user session protection
Url: http://github.com/miguelgrinberg/flask-paranoid/ Url: http://github.com/miguelgrinberg/flask-paranoid/
Group: Development/Languages/Python Group: Development/Languages/Python
# Pypi sources don't include tests # Pypi sources don't include tests
@ -39,8 +39,12 @@ BuildArch: noarch
%python_subpackages %python_subpackages
%description %description
Simple user session protection that generates a "paranoid" token according to Flask-Paranoid is an extension for the Flask framework that protects the
the IP address and user agent when a client connects to the flask application. application against certain attacks in which the user session cookie is stolen
and then used by the attacker.
The extension generates a "paranoid" token according to the IP address and user
agent when a client connects to the flask application.
%prep %prep
%setup -q -n flask-paranoid-0.2 %setup -q -n flask-paranoid-0.2