diff options
author | James R. Barlow <james@purplerock.ca> | 2021-04-07 01:41:50 -0700 |
---|---|---|
committer | James R. Barlow <james@purplerock.ca> | 2021-04-07 01:41:50 -0700 |
commit | 0f413721c498f9f56fc7821fe2ca6a2622fccfac (patch) | |
tree | 964761b19cf8d7f2e1baf60d2b48cb2794ec3c56 | |
parent | ea0865768746e4c7a0ae83ac46ee09ed7162e382 (diff) |
v2.11.0 release notes
-rw-r--r-- | docs/release_notes.rst | 12 |
1 files changed, 11 insertions, 1 deletions
diff --git a/docs/release_notes.rst b/docs/release_notes.rst index 63c3110..02e3311 100644 --- a/docs/release_notes.rst +++ b/docs/release_notes.rst @@ -18,12 +18,22 @@ is in production use. Note that the C++ extension module ``pikepdf._qpdf`` is a private interface within pikepdf that applications should not access directly, along with any modules with a prefixed underscore. +v2.11.0 +======= + +- Add new functions: ``Pdf.generate_appearance_streams`` and ``Pdf.flatten_annotations``, + to support common work with PDF forms. +- Fixed an issue with ``pip install`` on platforms that lack proper multiprocessing + support. +- Additional documentation improvements from @m-holger - thanks again! + v2.10.0 ======= - Fixed a XML External Entity (XXE) processing vulnerability in PDF XMP metadata parsing. (Reported by Eric Therond of Sonarsource.) All users should upgrade - to get this security update. + to get this security update. `CVE-2021-29421 <https://nvd.nist.gov/vuln/detail/CVE-2021-29421>`__ + was assigned to this issue. - Bind new functions to check, when a PDF is opened, whether the password used to open the PDF matched the owner password, user password, or both: ``Pdf.user_password_matched`` and ``Pdf.owner_password_matched``. |