Pyexiv2

Latest version: v2.15.3

Safety actively analyzes 688520 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 4 of 6

2.3.1

- This is a patched version.
- Add libexiv2.dylib to the .whl package.
I forgot to do this in v2.3.0, which made it impossible to run pyexiv2 on MacOS.

2.3.0

- This is a backward compatible version.
- Add class [ImageData](https://github.com/LeoHsiao1/pyexiv2/blob/v2.3.0/docs/Tutorial.md#class-imagedata). It is used to open an image from bytes data.
- Enable running on MacOS.

2.2.0

- This is a backward compatible version.
- Fixed: Core dumped when exiting pyexiv2 on Linux. (Issue 17)
- Could read and write duplicate IPTC keys now. (Issue 18 )

2.1.0

- Add a function [pyexiv2.set_log_level()](https://github.com/LeoHsiao1/pyexiv2/blob/master/docs/Tutorial.md#log) to handle logs.

2.0.0

- v2.0.0 is not compatible with previous versions, because the API has changed. See the new [tutorial](https://github.com/LeoHsiao1/pyexiv2/blob/dev/docs/Tutorial.md).
- Refactor the code to call the C++ API with pybind11 instead of ctypes.
- Remove the three ambiguous methods: `Image.read_all()`, `Image.modify_all()`, `Image.clear_all()`
- Add a method `Image.close()` to free the memory for storing image data.
- Add a parameter `encoding='utf-8'` to some methods.
- Converts stderr's log 'EXV_ERROR' to an exception. (Issue 8 )

1.3.0

- Could read and write the value of List type in XMP metadata.
For example:
py
>>> i.modify_xmp({"Xmp.dc.subject": ["flag1", "flag2", "flag3"]})
>>> i.read_xmp()["Xmp.dc.subject"]
['flag1', 'flag2', 'flag3']

When pyexiv2 processes it, if the raw value contains `', '` , the final value will be wrong.

- Add method `read_raw_xmp()`. Calling it will return the raw XMP metadata in XML format without mistake.

Page 4 of 6

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.