Starting with version 5.0.0, bcrypt will throw a ValueError if the input is more than 72 bytes. passlib's `hash` processes the input such that more than 72 bytes are passed to bcrypt, independently of the input length. As a result, the backend of firegex breaks when calculating the hash in `set_psw`.
11 lines
295 B
Plaintext
11 lines
295 B
Plaintext
fastapi[all]
|
|
httpx
|
|
uvicorn[standard]
|
|
passlib[bcrypt]
|
|
bcrypt <5
|
|
psutil
|
|
python-jose[cryptography]
|
|
python-socketio
|
|
git+https://github.com/google/brotli.git@35d4992ac8eb1eca3b6c5f220e76cfc8b7e470aa
|
|
#git+https://salsa.debian.org/pkg-netfilter-team/pkg-nftables#egg=nftables&subdirectory=py
|