-
Notifications
You must be signed in to change notification settings - Fork 2
Update dependency requests to v2.32.5 #14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/requests-2.x
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
fb7db8b to
0b54a29
Compare
0b54a29 to
73ed1bc
Compare
73ed1bc to
0b1b999
Compare
0b1b999 to
c37565b
Compare
c37565b to
b76f16d
Compare
b76f16d to
90d37c4
Compare
90d37c4 to
f167f33
Compare
f167f33 to
8878d10
Compare
8878d10 to
f4b4ed1
Compare
f4b4ed1 to
fc87619
Compare
fc87619 to
cc3d411
Compare
cc3d411 to
d69f490
Compare
d69f490 to
75b7ec8
Compare
75b7ec8 to
1a2d9e6
Compare
1a2d9e6 to
f89dcf0
Compare
f89dcf0 to
8bc1f30
Compare
8bc1f30 to
a0cefb1
Compare
a0cefb1 to
1d7e10a
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
==2.18.4->==2.32.5Release Notes
psf/requests (requests)
v2.32.5Compare Source
Bugfixes
a new class of issues in Requests that have had negative impact across a number
of use cases. The Requests team has decided to revert this feature as long term
maintenance of it is proving to be unsustainable in its current iteration.
Deprecations
v2.32.4Compare Source
Security
environment will retrieve credentials for the wrong hostname/machine from a
netrc file.
Improvements
Deprecations
v2.32.3Compare Source
Bugfixes
HTTPAdapter. (#6716)
without the
sslmodule. (#6724)v2.32.2Compare Source
Deprecations
To provide a more stable migration for custom HTTPAdapters impacted
by the CVE changes in 2.32.0, we've renamed
_get_connectiontoa new public API,
get_connection_with_tls_context. Existing customHTTPAdapters will need to migrate their code to use this new API.
get_connectionis considered deprecated in all versions of Requests>=2.32.0.A minimal (2-line) example has been provided in the linked PR to ease
migration, but we strongly urge users to evaluate if their custom adapter
is subject to the same issue described in CVE-2024-35195. (#6710)
v2.32.1Compare Source
Bugfixes
v2.32.0Compare Source
Security
verify=Falseon the first request from aSession will cause subsequent requests to the same origin to also ignore
cert verification, regardless of the value of
verify.(GHSA-9wx4-h78v-vm56)
Improvements
verify=Truenow reuses a global SSLContext which should improverequest time variance between first and subsequent requests. It should
also minimize certificate load time on Windows systems when using a Python
version built with OpenSSL 3.x. (#6667)
(
chardetorcharset_normalizer) when repackaged or vendored.This enables
pipand other projects to minimize their vendoringsurface area. The
Response.text()andapparent_encodingAPIswill default to
utf-8if neither library is present. (#6702)Bugfixes
calculated in the request content-length. (#6589)
/(path separator) could leadurllib3 to unnecessarily reparse the request URI. (#6644)
Deprecations
Documentation
Packaging
The source files for the projects (formerly
requests) is now locatedin
src/requestsin the Requests sdist. (#6506)using
hatchling. This should not impact the average user, but extremely oldversions of packaging utilities may have issues with the new packaging format.
v2.31.0Compare Source
Security
Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential
forwarding of
Proxy-Authorizationheaders to destination servers whenfollowing HTTPS redirects.
When proxies are defined with user info (
https://user:pass@proxy:8080), Requestswill construct a
Proxy-Authorizationheader that is attached to the request toauthenticate with the proxy.
In cases where Requests receives a redirect response, it previously reattached
the
Proxy-Authorizationheader incorrectly, resulting in the value beingsent through the tunneled connection to the destination server. Users who rely on
defining their proxy credentials in the URL are strongly encouraged to upgrade
to Requests 2.31.0+ to prevent unintentional leakage and rotate their proxy
credentials once the change has been fully deployed.
Users who do not use a proxy or do not supply their proxy credentials through
the user information portion of their proxy URL are not subject to this
vulnerability.
Full details can be read in our Github Security Advisory
and CVE-2023-32681.
v2.30.0Compare Source
Dependencies
This may contain minor breaking changes so we advise careful testing and
reviewing https://urllib3.readthedocs.io/en/latest/v2-migration-guide.html
prior to upgrading.
Users who wish to stay on urllib3 1.x can pin to
urllib3<2.v2.29.0Compare Source
Improvements
standardization. (#6226)
v2.28.2Compare Source
Dependencies
Bugfixes
v2.28.1Compare Source
Improvements
iter_contentwith transition toyield from. (#6170)Dependencies
v2.28.0Compare Source
Deprecations
Improvements
an encoding to make
json()API consistent. (#6097)all invalid cases. (#6154)
Bugfixes
CURL_CA_BUNDLEto an empty string would disablecert verification. All Requests 2.x versions before 2.28.0 are affected. (#6074)
urllib3.exceptions.SSLErrorwithrequests.exceptions.SSLErrorforcontentanditer_content. (#6057)to raise an exception rather than ignoring the entry. (#6149)
JSONDecodeError. (#6036)
v2.27.1Compare Source
Bugfixes
authcomponent beingdropped from proxy URLs. (#6028)
v2.27.0Compare Source
Improvements
Officially added support for Python 3.10. (#5928)
Added a
requests.exceptions.JSONDecodeErrorto unify JSON exceptions betweenPython 2 and 3. This gets raised in the
response.json()method, and isbackwards compatible as it inherits from previously thrown exceptions.
Can be caught from
requests.exceptions.RequestExceptionas well. (#5856)Improved error text for misnamed
InvalidSchemaandMissingSchemaexceptions. This is a temporary fix until exceptions can be renamed
(Schema->Scheme). (#6017)
Improved proxy parsing for proxy URLs missing a scheme. This will address
recent changes to
urlparsein Python 3.9+. (#5917)Bugfixes
Fixed defect in
extract_zipped_pathswhich could result in an infinite loopfor some paths. (#5851)
Fixed handling for
AttributeErrorwhen calculating length of files obtainedby
Tarfile.extractfile(). (#5239)Fixed urllib3 exception leak, wrapping
urllib3.exceptions.InvalidHeaderwithrequests.exceptions.InvalidHeader. (#5914)Fixed bug where two Host headers were sent for chunked requests. (#5391)
Fixed regression in Requests 2.26.0 where
Proxy-Authorizationwasincorrectly stripped from all requests sent with
Session.send. (#5924)Fixed performance regression in 2.26.0 for hosts with a large number of
proxies available in the environment. (#5924)
Fixed idna exception leak, wrapping
UnicodeErrorwithrequests.exceptions.InvalidURLfor URLs with a leading dot (.) in thedomain. (#5414)
Deprecations
don't have exact dates, Requests 2.27.x is likely to be the last release
series providing support.
v2.26.0Compare Source
Improvements
Requests now supports Brotli compression, if either the
brotliorbrotlicffipackage is installed. (#5783)Session.sendnow correctly resolves proxy configurations from boththe Session and Request. Behavior now matches
Session.request. (#5681)Bugfixes
from zip archive. (#5707)
Dependencies
Instead of
chardet, use the MIT-licensedcharset_normalizerfor Python3to remove license ambiguity for projects bundling requests. If
chardetis already installed on your machine it will be used instead of
charset_normalizerto keep backwards compatibility. (#5797)
You can also install
chardetwhile installing requests byspecifying
[use_chardet_on_py3]extra as follows:pip install "requests[use_chardet_on_py3]"Python2 still depends upon the
chardetmodule.Requests now supports
idna3.x on Python 3.idna2.x will continue tobe used on Python 2 installations. (#5711)
Deprecations
The
requests[security]extra has been converted to a no-op install.PyOpenSSL is no longer the recommended secure option for Requests. (#5867)
Requests has officially dropped support for Python 3.5. (#5867)
v2.25.1Compare Source
Bugfixes
application/jsonasutf8by default. Resolvinginconsistencies between
r.textandr.jsonoutput. (#5673)Dependencies
v2.25.0Compare Source
Improvements
Dependencies
Deprecations
requests[security]extra is officially deprecated and will be removedin Requests v2.26.0.
v2.24.0Compare Source
Improvements
pyOpenSSL TLS implementation is now only used if Python
either doesn't have an
sslmodule or doesn't supportSNI. Previously pyOpenSSL was unconditionally used if available.
This applies even if pyOpenSSL is installed via the
requests[security]extra (#5443)Redirect resolution should now only occur when
allow_redirectsis True. (#5492)No longer perform unnecessary Content-Length calculation for
requests that won't use it. (#5496)
v2.23.0Compare Source
Improvements
prefetchin Session__attrs__(#5110)Bugfixes
Dependencies
chardetandidnanow uses major version instead of minor.This hopefully reduces the need for releases every time a dependency is updated.
v2.22.0Compare Source
Dependencies
(note: 1.25.0 and 1.25.1 are incompatible)
Deprecations
v2.21.0Compare Source
Dependencies
v2.20.1Compare Source
Bugfixes
redirects using default ports (http/80, https/443).
v2.20.0Compare Source
Bugfixes
charset=utf8 v Charset=utf8).
uncaught urllib3 exceptions.
from https to http on the same hostname. (CVE-2018-18074)
should_bypass_proxiesnow handles URIs without hostnames (e.g.files).
Dependencies
Deprecations
v2.19.1Compare Source
Bugfixes
initfunction failed tryingto append to a
__doc__value ofNone.v2.19.0Compare Source
Improvements
< 1.3.4
adapter.
7.1.2)
Request.content.Bugfixes
Linkheaders withparse_header_links()no longerreturn one bogus entry.
archive would raise an
IOError.ImportErroron windows system which donot support
winregmodule.password in the request. This also fixes the issue of DNS queries
failing on macOS.
Noneas a file pointer to thefilesparam no longerraises an exception.
copyon aRequestsCookieJarwill now preserve the cookiepolicy correctly.
Dependencies
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.