Python-jwt

Latest version: v4.1.0

Safety actively analyzes 681926 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 4 of 5

1.5.1

--------------------------------------------------------------------

Changed
~~~~~~~

- Change optparse for argparse.
`238 <https://github.com/jpadilla/pyjwt/pull/238>`__

Fixed
~~~~~

- Guard against PKCS1 PEM encoded public keys
`277 <https://github.com/jpadilla/pyjwt/pull/277>`__
- Add deprecation warning when decoding without specifying
``algorithms`` `277 <https://github.com/jpadilla/pyjwt/pull/277>`__
- Improve deprecation messages
`270 <https://github.com/jpadilla/pyjwt/pull/270>`__
- PyJWT.decode: move verify param into options
`271 <https://github.com/jpadilla/pyjwt/pull/271>`__

Added
~~~~~

- Support for Python 3.6
`262 <https://github.com/jpadilla/pyjwt/pull/262>`__
- Expose jwt.InvalidAlgorithmError
`264 <https://github.com/jpadilla/pyjwt/pull/264>`__

1.5.0

--------------------------------------------------------------------

Changed
~~~~~~~

- Add support for ECDSA public keys in RFC 4253 (OpenSSH) format
`244 <https://github.com/jpadilla/pyjwt/pull/244>`__
- Renamed commandline script ``jwt`` to ``jwt-cli`` to avoid issues
with the script clobbering the ``jwt`` module in some circumstances.
`187 <https://github.com/jpadilla/pyjwt/pull/187>`__
- Better error messages when using an algorithm that requires the
cryptography package, but it isn't available
`230 <https://github.com/jpadilla/pyjwt/pull/230>`__
- Tokens with future 'iat' values are no longer rejected
`190 <https://github.com/jpadilla/pyjwt/pull/190>`__
- Non-numeric 'iat' values now raise InvalidIssuedAtError instead of
DecodeError
- Remove rejection of future 'iat' claims
`252 <https://github.com/jpadilla/pyjwt/pull/252>`__

Fixed
~~~~~

- Add back 'ES512' for backward compatibility (for now)
`225 <https://github.com/jpadilla/pyjwt/pull/225>`__
- Fix incorrectly named ECDSA algorithm
`219 <https://github.com/jpadilla/pyjwt/pull/219>`__
- Fix rpm build `196 <https://github.com/jpadilla/pyjwt/pull/196>`__

Added
~~~~~

- Add JWK support for HMAC and RSA keys
`202 <https://github.com/jpadilla/pyjwt/pull/202>`__

1.4.2

--------------------------------------------------------------------

Fixed
~~~~~

- A PEM-formatted key encoded as bytes could cause a ``TypeError`` to
be raised `213 <https://github.com/jpadilla/pyjwt/pull/214>`__

1.4.1

--------------------------------------------------------------------

Fixed
~~~~~

- Newer versions of Pytest could not detect warnings properly
`182 <https://github.com/jpadilla/pyjwt/pull/182>`__
- Non-string 'kid' value now raises ``InvalidTokenError``
`174 <https://github.com/jpadilla/pyjwt/pull/174>`__
- ``jwt.decode(None)`` now gracefully fails with ``InvalidTokenError``
`183 <https://github.com/jpadilla/pyjwt/pull/183>`__

1.4

------------------------------------------------------------------

Fixed
~~~~~

- Exclude Python cache files from PyPI releases.

Added
~~~~~

- Added new options to require certain claims (require\_nbf,
require\_iat, require\_exp) and raise ``MissingRequiredClaimError``
if they are not present.
- If ``audience=`` or ``issuer=`` is specified but the claim is not
present, ``MissingRequiredClaimError`` is now raised instead of
``InvalidAudienceError`` and ``InvalidIssuerError``

1.3

------------------------------------------------------------------

Fixed
~~~~~

- ECDSA (ES256, ES384, ES512) signatures are now being properly
serialized `158 <https://github.com/jpadilla/pyjwt/pull/158>`__
- RSA-PSS (PS256, PS384, PS512) signatures now use the proper salt
length for PSS padding.
`163 <https://github.com/jpadilla/pyjwt/pull/163>`__

Added
~~~~~

- Added a new ``jwt.get_unverified_header()`` to parse and return the
header portion of a token prior to signature verification.

Removed
~~~~~~~

- Python 3.2 is no longer a supported platform. This version of Python
is rarely used. Users affected by this should upgrade to 3.3+.

Page 4 of 5

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.