Releases: jpadilla/pyjwt
Releases · jpadilla/pyjwt
v1.6.0
v1.5.3
v1.5.2
v1.5.1
v1.5.0
Changed
- Add support for ECDSA public keys in RFC 4253 (OpenSSH) format #244
- Renamed commandline script
jwt
tojwt-cli
to avoid issues with the script clobbering thejwt
module in some circumstances. #187 - Better error messages when using an algorithm that requires the cryptography package, but it isn't available #230
- Tokens with future 'iat' values are no longer rejected #190
- Non-numeric 'iat' values now raise InvalidIssuedAtError instead of DecodeError
- Remove rejection of future 'iat' claims #252
Fixed
- Add back 'ES512' for backward compatibility (for now) #225
- Fix incorrectly named ECDSA algorithm #219
- Fix rpm build #196
Added
- Add JWK support for HMAC and RSA keys #202
v1.4.2
Bugfix release
v1.3.0
Fixed
- ECDSA (ES256, ES384, ES512) signatures are now being properly serialized [#158][
- RSA-PSS (PS256, PS384, PS512) signatures now use the proper salt length for PSS padding. [#163]
Added
- Added a new
jwt.get_unverified_header()
to parse and return the header portion of a token prior to signature verification.
Removed
- Python 3.2 is no longer a supported platform. This version of Python is rarely used. Users affected by this should upgrade to 3.3+.
v1.2.0
Fixed
- Added back
verify_expiration=
argument tojwt.decode()
that was erroneously removed in 1.1.0.
Changed
- Refactored JWS-specific logic out of PyJWT and into PyJWS superclass. [#141]
Deprecated
verify_expiration=
argument tojwt.decode()
is now deprecated and will be removed in a future version. Use theoption=
argument instead.