Laterpay-client

Latest version: v5.9.0

Safety actively analyzes 629599 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 2 of 4

5.4.0

* Added the `connection_handler` to `LaterPayClient` to simplify connection
pooling.

* Updated test dependencies.

5.3.1

* Only passed one of `lptoken` and `muid` to `/access` calls. Passing both is
not supported.

5.3.0

* Added explicit support for the `muid` argument to `get_add_url()`,
`get_buy_url()` and `get_subscribe_url()`.

* Added function to create manual ident URLs. A user can visit these URLs to
regain access to previous purchased or bought content.

* Added [PyJWT](https://pyjwt.readthedocs.io/en/latest/) >= 1.4.2 to the
installation requirements as it's required for the added manual ident URLs
feature.

* Added support for `muid` when creating manual ident URLs.

* Added support to check for access based on `muid` instead of `lptoken`.

5.2.0

* Added constants outlining expiration and duration time bases for purchases

5.1.0

* Ignored HMAC character capitalization
([93](https://github.com/laterpay/laterpay-client-python/issues/93))
* Added support for `/dialog/subscribe` and LaterPay's subscription system

5.0.0

* Removed the following long deprecated methods from the
`laterpay.LaterPayClient`:

* `get_access()`, use `get_access_data()` instead
* `get_iframeapi_balance_url()`, us `get_controls_balance_url()` instead
* `get_iframeapi_links_url()`, us `get_controls_links_url()` instead
* `get_identify_url()` is not needed following our modern access control
checks

* Removed the following deprecated arguments from `laterpay.LaterPayClient`
methods:

* `use_dialog_api` from `get_login_dialog_url()`
* `use_dialog_api` from `get_signup_dialog_url()`
* `use_dialog_api` from `get_logout_dialog_url()`

* Removed the following public methods from `laterpay.signing`:

* `sign_and_encode()` in favor of `laterpay.utils.signed_query()`
* `sign_get_url()` in favor of `laterpay.utils.signed_url()`

Note that `sign_and_encode()` and `sign_get_url()` used to remove existing
`'hmac'` parameters before signing query strings. This is different to
`signed_query()` as that function also allows other names for the hmac query
argument. Please remove the parameter yourself if need be.

* Removed the deprecated `cp` argument from `laterpay.ItemDefinition`

* Reliably ignore `hmac` and `gettoken` parameters when creating the signature
message. In the past `signing.sign()` and `signing.verify()` stripped those
keys when a `dict()` was passed from the passed function arguments but not
for lists or tuples. Note that as a result the provided parameters are not
touched anymore and calling either function will not have side-effects on
the provided arguments.

Page 2 of 4

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.