Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Updating
flask-corstov6.0.0for Python 3.8 aligns it with newer Python versions and brings in security updates, which is good.However, please be aware of the breaking changes introduced in
flask-cors v6.0.0, as noted in their release notes:Path Specificity Ordering Changed: "Path specificity ordering has changed to improve specificity. This may break users who expected the previous incorrect ordering."
main.py(/echo,/auth/info/googlejwt, etc.) are distinct, it's worth ensuring that this change doesn't inadvertently affect how CORS is applied if there were any subtle reliance on the old ordering (though unlikely with the current simple paths).Case Sensitive Request Path Matching (CVE-2024-6866): "Case Sensitive Request Path Matching."
/auth/info/firebaseendpoint uses@cross_origin. If clients were previously accessing this path with different casings (e.g.,/auth/info/Firebase) and relying on case-insensitive matching for CORS headers, this will no longer work. CORS rules will now strictly match the defined path's case.test_corsinmain_test.pycorrectly uses the lowercase path/auth/info/firebase. This is good, but ensure that real-world usage or documentation for this sample emphasizes case-sensitive URLs for CORS-enabled endpoints.Security Fixes (CVE-2024-6839, CVE-2024-6844): These are beneficial security improvements.
Could you please confirm that these breaking changes, particularly the case-sensitive path matching for
/auth/info/firebase, have been considered and that the application's behavior (and any associated client expectations for this sample) remains correct after this update? Ensuring tests cover these aspects, especially if case-insensitivity was implicitly relied upon, would be beneficial.