-
Notifications
You must be signed in to change notification settings - Fork 4
chore(deps): update dependency fastapi to v0.135.0 #27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,4 +1,4 @@ | ||
| fastapi==0.134.0 | ||
| fastapi==0.135.0 | ||
| fastapi-utils==0.8.0 | ||
| requests==2.32.5 | ||
| requests-oauthlib ==2.0.0 | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -15,7 +15,7 @@ packages = find: | |
| python_requires = >=3.6 | ||
| install_requires = | ||
| uvicorn[standard]==0.41.0 | ||
| fastapi==0.134.0 | ||
| fastapi==0.135.0 | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🧩 Analysis chain🏁 Script executed: #!/bin/bash
# Check if FastAPI 0.135.0 exists on PyPI and gather version info
echo "=== Checking PyPI for FastAPI 0.135.0 ==="
curl -s https://pypi.org/pypi/fastapi/json | jq -r '.releases | to_entries[] | select(.key | test("0.13[0-9]|0.14")) | .key' | sort -V | tail -20
echo -e "\n=== Checking specific version 0.135.0 ==="
curl -s https://pypi.org/pypi/fastapi/0.135.0/json | jq -r '.info | "\(.version) - Release: \(.requires_python)"' 2>/dev/null || echo "Version not found or error occurred"
echo -e "\n=== Latest FastAPI version ==="
curl -s https://pypi.org/pypi/fastapi/json | jq -r '.info.version'Repository: RedHatInsights/ccx-upgrades-data-eng Length of output: 301 🏁 Script executed: #!/bin/bash
# Check the Python version requirement in setup.cfg
echo "=== Checking setup.cfg for python_requires ==="
cat setup.cfg | grep -A 2 "python_requires"
# Also verify FastAPI 0.134.0 requirements for comparison
echo -e "\n=== FastAPI 0.134.0 Python requirements ==="
curl -s https://pypi.org/pypi/fastapi/0.134.0/json | jq -r '.info.requires_python'
echo -e "\n=== FastAPI 0.135.0 Python requirements ==="
curl -s https://pypi.org/pypi/fastapi/0.135.0/json | jq -r '.info.requires_python'Repository: RedHatInsights/ccx-upgrades-data-eng Length of output: 303 Update python_requires in setup.cfg to match FastAPI 0.135.0 requirements. FastAPI 0.135.0 (the latest version on PyPI) requires Python >=3.10, but setup.cfg declares 🤖 Prompt for AI Agents |
||
| fastapi-utils==0.8.0 | ||
| requests==2.32.5 | ||
| requests-oauthlib ==2.0.0 | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🧩 Analysis chain
🏁 Script executed:
Repository: RedHatInsights/ccx-upgrades-data-eng
Length of output: 646
🌐 Web query:
urllib3 HIGH severity vulnerabilities decompression bomb CVE 2024💡 Result:
There aren’t widely cited urllib3 “decompression bomb” HIGH-severity CVEs from 2024; the main HIGH issues in this area were disclosed later (Dec 2025 / Jan 2026):
Content-Encoding“links”) can cause extreme CPU/memory use → DoSpreload_content=False), bypassing safeguards → decompression bomb DoSWhat to do
redirect=False) to mitigate CVE-2026-21441. [5]Sources: NVD + GitHub Advisory DB + Rapid7 Red Hat synopsis. [1][3][4][5]
🏁 Script executed:
Repository: RedHatInsights/ccx-upgrades-data-eng
Length of output: 596
🌐 Web query:
urllib3 CVE HIGH severity vulnerabilities complete list 2024 2025 2026💡 Result:
High-severity (CVSS High: 7.0–8.9) urllib3 CVEs published in 2024–2026 (as of 2026-03-01):
2024
2025
2026
Sources
[1] NVD: CVE-2025-66418 https://nvd.nist.gov/vuln/detail/CVE-2025-66418
[2] NVD: CVE-2025-66471 https://nvd.nist.gov/vuln/detail/CVE-2025-66471
[3] NVD: CVE-2026-21441 https://nvd.nist.gov/vuln/detail/CVE-2026-21441
[4] urllib3 GitHub Security Advisories list https://github.com/urllib3/urllib3/security
Upgrade urllib3 to 2.6.3 to address HIGH-severity decompression vulnerabilities.
Three HIGH-severity vulnerabilities exist in urllib3 versions < 2.6.3:
Update requests's transitive urllib3 dependency to 2.6.3. The current constraint
urllib3<3,>=1.21.1is flexible; explicitly set it tourllib3>=2.6.3to ensure these vulnerabilities are patched.🤖 Prompt for AI Agents