itsdangerous · PyPI
https://pypi.org/project/itsdangerous18.05.2021 · Files for itsdangerous, version 2.0.1; Filename, size File type Python version Upload date Hashes; Filename, size itsdangerous-2.0.1.tar.gz (59.3 kB) File type Source Python version None Upload date May 18, 2021 Hashes View
types-itsdangerous · PyPI
pypi.org › project › types-itsdangerousNov 25, 2021 · Files for types-itsdangerous, version 1.1.6; Filename, size File type Python version Upload date Hashes; Filename, size types_itsdangerous-1.1.6-py3-none-any.whl (3.4 kB) File type Wheel Python version py3 Upload date Nov 26, 2021 Hashes View
itsdangerous - Python Package Health Analysis | Snyk
snyk.io › advisor › pythonFurther analysis of the maintenance status of itsdangerous based on released PyPI versions cadence, the repository activity, and other data points determined that its maintenance is Healthy. We found that itsdangerous demonstrates a positive version release cadence with at least one new version released in the past 12 months.
Releases · pallets/itsdangerous · GitHub
github.com › pallets › itsdangerous2.0.1. New major versions of all the core Pallets libraries, including ItsDangerous 2.0, have been released! This represents a significant amount of work, and there are quite a few changes. Be sure to carefully read the changelog, and use tools such as pip-compile and Dependabot to pin your dependencies and control your updates.
itsdangerous · PyPI
pypi.org › project › itsdangerousMay 18, 2021 · Files for itsdangerous, version 2.0.1; Filename, size File type Python version Upload date Hashes; Filename, size itsdangerous-2.0.1.tar.gz (59.3 kB) File type Source Python version None Upload date May 18, 2021 Hashes View
ItsDangerous — ItsDangerous Documentation (2.0.x)
itsdangerous.palletsprojects.comItsDangerous¶. Sometimes you want to send some data to untrusted environments, then get it back later. To do this safely, the data must be signed to detect changes. Given a key only you know, you can cryptographically sign your data and hand it over to someone else. When you get the data back you can ensure that nobody tampered with it.