[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency requests to ==2.31.* [SECURITY] #31

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate-bot
Copy link
Contributor
@renovate-bot renovate-bot commented Jun 17, 2024

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
requests (source, changelog) == 2.8.* -> ==2.31.* age adoption passing confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.

GitHub Vulnerability Alerts

CVE-2018-18074

The Requests package through 2.19.1 before 2018-09-14 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.

CVE-2023-32681

Impact

Since Requests v2.3.0, Requests has been vulnerable to potentially leaking Proxy-Authorization headers to destination servers, specifically during redirects to an HTTPS origin. This is a product of how rebuild_proxies is used to recompute and reattach the Proxy-Authorization header to requests when redirected. Note this behavior has only been observed to affect proxied requests when credentials are supplied in the URL user information component (e.g. https://username:password@proxy:8080).

Current vulnerable behavior(s):

  1. HTTP → HTTPS: leak
  2. HTTPS → HTTP: no leak
  3. HTTPS → HTTPS: leak
  4. HTTP → HTTP: no leak

For HTTP connections sent through the proxy, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the Proxy-Authorization header must be sent in the CONNECT request as the proxy has no visibility into further tunneled requests. This results in Requests forwarding the header to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate those credentials.

The reason this currently works for HTTPS connections in Requests is the Proxy-Authorization header is also handled by urllib3 with our usage of the ProxyManager in adapters.py with proxy_manager_for. This will compute the required proxy headers in proxy_headers and pass them to the Proxy Manager, avoiding attaching them directly to the Request object. This will be our preferred option going forward for default usage.

Patches

Starting in Requests v2.31.0, Requests will no longer attach this header to redirects with an HTTPS destination. This should have no negative impacts on the default behavior of the library as the proxy credentials are already properly being handled by urllib3's ProxyManager.

For users with custom adapters, this may be potentially breaking if you were already working around this behavior. The previous functionality of rebuild_proxies doesn't make sense in any case, so we would encourage any users impacted to migrate any handling of Proxy-Authorization directly into their custom adapter.

Workarounds

For users who are not able to update Requests immediately, there is one potential workaround.

You may disable redirects by setting allow_redirects to False on all calls through Requests top-level APIs. Note that if you're currently relying on redirect behaviors, you will need to capture the 3xx response codes and ensure a new request is made to the redirect destination.

import requests
r = requests.get('http://github.com/', allow_redirects=False)

Credits

This vulnerability was discovered and disclosed by the following individuals.

Dennis Brinkrolf, Haxolot (https://haxolot.com/)
Tobias Funke, (tobiasfunke93@​gmail.com)


Release Notes

psf/requests (requests)

v2.31.0

Compare Source

Security

  • Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential
    forwarding of Proxy-Authorization headers to destination servers when
    following HTTPS redirects.

    When proxies are defined with user info (https://user:pass@proxy:8080), Requests
    will construct a Proxy-Authorization header that is attached to the request to
    authenticate with the proxy.

    In cases where Requests receives a redirect response, it previously reattached
    the Proxy-Authorization header incorrectly, resulting in the value being
    sent through the tunneled connection to the destination server. Users who rely on
    defining their proxy credentials in the URL are strongly encouraged to upgrade
    to Requests 2.31.0+ to prevent unintentional leakage and rotate their proxy
    credentials once the change has been fully deployed.

    Users who do not use a proxy or do not supply their proxy credentials through
    the user information portion of their proxy URL are not subject to this
    vulnerability.

    Full details can be read in our Github Security Advisory
    and CVE-2023-32681.

v2.30.0

Compare Source

Dependencies

v2.29.0

Compare Source

Improvements

  • Requests now defers chunked requests to the urllib3 implementation to improve
    standardization. (#​6226)
  • Requests relaxes header component requirements to support bytes/str subclasses. (#​6356)

v2.28.2

Compare Source

Dependencies

  • Requests now supports charset_normalizer 3.x. (#​6261)

Bugfixes

  • Updated MissingSchema exception to suggest https scheme rather than http. (#​6188)

v2.28.1

Compare Source

Improvements

  • Speed optimization in iter_content with transition to yield from. (#​6170)

Dependencies

  • Added support for chardet 5.0.0 (#​6179)
  • Added support for charset-normalizer 2.1.0 (#​6169)

v2.28.0

Compare Source

Deprecations

  • ⚠️ Requests has officially dropped support for Python 2.7. ⚠️ (#​6091)
  • Requests has officially dropped support for Python 3.6 (including pypy3.6). (#​6091)

Improvements

  • Wrap JSON parsing issues in Request's JSONDecodeError for payloads without
    an encoding to make json() API consistent. (#​6097)
  • Parse header components consistently, raising an InvalidHeader error in
    all invalid cases. (#​6154)
  • Added provisional 3.11 support with current beta build. (#​6155)
  • Requests got a makeover and we decided to paint it black. (#​6095)

Bugfixes

  • Fixed bug where setting CURL_CA_BUNDLE to an empty string would disable
    cert verification. All Requests 2.x versions before 2.28.0 are affected. (#​6074)
  • Fixed urllib3 exception leak, wrapping urllib3.exceptions.SSLError with
    requests.exceptions.SSLError for content and iter_content. (#​6057)
  • Fixed issue where invalid Windows registry entries caused proxy resolution
    to raise an exception rather than ignoring the entry. (#​6149)
  • Fixed issue where entire payload could be included in the error message for
    JSONDecodeError. (#​6036)

v2.27.1

Compare Source

Bugfixes

  • Fixed parsing issue that resulted in the auth component being
    dropped from proxy URLs. (#​6028)

v2.27.0

Compare Source

Improvements

  • Officially added support for Python 3.10. (#​5928)

  • Added a requests.exceptions.JSONDecodeError to unify JSON exceptions between
    Python 2 and 3. This gets raised in the response.json() method, and is
    backwards compatible as it inherits from previously thrown exceptions.
    Can be caught from requests.exceptions.RequestException as well. (#​5856)

  • Improved error text for misnamed InvalidSchema and MissingSchema
    exceptions. This is a temporary fix until exceptions can be renamed
    (Schema->Scheme). (#​6017)

  • Improved proxy parsing for proxy URLs missing a scheme. This will address
    recent changes to urlparse in Python 3.9+. (#​5917)

Bugfixes

  • Fixed defect in extract_zipped_paths which could result in an infinite loop
    for some paths. (#​5851)

  • Fixed handling for AttributeError when calculating length of files obtained
    by Tarfile.extractfile(). (#​5239)

  • Fixed urllib3 exception leak, wrapping urllib3.exceptions.InvalidHeader with
    requests.exceptions.InvalidHeader. (#​5914)

  • Fixed bug where two Host headers were sent for chunked requests. (#​5391)

  • Fixed regression in Requests 2.26.0 where Proxy-Authorization was
    incorrectly stripped from all requests sent with Session.send. (#​5924)

  • Fixed performance regression in 2.26.0 for hosts with a large number of
    proxies available in the environment. (#​5924)

  • Fixed idna exception leak, wrapping UnicodeError with
    requests.exceptions.InvalidURL for URLs with a leading dot (.) in the
    domain. (#​5414)

Deprecations

  • Requests support for Python 2.7 and 3.6 will be ending in 2022. While we
    don't have exact dates, Requests 2.27.x is likely to be the last release
    series providing support.

v2.26.0

Compare Source

Improvements

  • Requests now supports Brotli compression, if either the brotli or
    brotlicffi package is installed. (#​5783)

  • Session.send now correctly resolves proxy configurations from both
    the Session and Request. Behavior now matches Session.request. (#​5681)

Bugfixes

  • Fixed a race condition in zip extraction when using Requests in parallel
    from zip archive. (#​5707)

Dependencies

  • Instead of chardet, use the MIT-licensed charset_normalizer for Python3
    to remove license ambiguity for projects bundling requests. If chardet
    is already installed on your machine it will be used instead of charset_normalizer
    to keep backwards compatibility. (#​5797)

    You can also install chardet while installing requests by
    specifying [use_chardet_on_py3] extra as follows:

    pip install "requests[use_chardet_on_py3]"

    Python2 still depends upon the chardet module.

  • Requests now supports idna 3.x on Python 3. idna 2.x will continue to
    be used on Python 2 installations. (#​5711)

Deprecations

  • The requests[security] extra has been converted to a no-op install.
    PyOpenSSL is no longer the recommended secure option for Requests. (#​5867)

  • Requests has officially dropped support for Python 3.5. (#​5867)

v2.25.1

Compare Source

Bugfixes

  • Requests now treats application/json as utf8 by default. Resolving
    inconsistencies between r.text and r.json output. (#​5673)

Dependencies

  • Requests now supports chardet v4.x.

v2.25.0

Compare Source

Improvements

  • Added support for NETRC environment variable. (#​5643)

Dependencies

  • Requests now supports urllib3 v1.26.

Deprecations

  • Requests v2.25.x will be the last release series with support for Python 3.5.
  • The requests[security] extra is officially deprecated and will be removed
    in Requests v2.26.0.

v2.24.0

Compare Source

Improvements

  • pyOpenSSL TLS implementation is now only used if Python
    either doesn't have an ssl module or doesn't support
    SNI. Previously pyOpenSSL was unconditionally used if available.
    This applies even if pyOpenSSL is installed via the
    requests[security] extra (#​5443)

  • Redirect resolution should now only occur when
    allow_redirects is True. (#​5492)

  • No longer perform unnecessary Content-Length calculation for
    requests that won't use it. (#​5496)

v2.23.0

Compare Source

Improvements

  • Remove defunct reference to prefetch in Session __attrs__ (#​5110)

Bugfixes

  • Requests no longer outputs password in basic auth usage warning. (#​5099)

Dependencies

  • Pinning for chardet and idna now uses major version instead of minor.
    This hopefully reduces the need for releases every time a dependency is updated.

v2.22.0

Compare Source

Dependencies

  • Requests now supports urllib3 v1.25.2.
    (note: 1.25.0 and 1.25.1 are incompatible)

Deprecations

  • Requests has officially stopped support for Python 3.4.

v2.21.0

Compare Source

Dependencies

  • Requests now supports idna v2.8.

v2.20.1

Compare Source

Bugfixes

  • Fixed bug with unintended Authorization header stripping for
    redirects using default ports (http/80, https/443).

v2.20.0

Compare Source

Bugfixes

  • Content-Type header parsing is now case-insensitive (e.g.
    charset=utf8 v Charset=utf8).
  • Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  • Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  • should_bypass_proxies now handles URIs without hostnames (e.g.
    files).

Dependencies

  • Requests now supports urllib3 v1.24.

Deprecations

  • Requests has officially stopped support for Python 2.6.

v2.19.1

Compare Source

Bugfixes

  • Fixed issue where status_codes.py's init function failed trying
    to append to a __doc__ value of None.

v2.19.0

Compare Source

Improvements

  • Warn user about possible slowdown when using cryptography version
    < 1.3.4
  • Check for invalid host in proxy URL, before forwarding request to
    adapter.
  • Fragments are now properly maintained across redirects. (RFC7231
    7.1.2)
  • Removed use of cgi module to expedite library load time.
  • Added support for SHA-256 and SHA-512 digest auth algorithms.
  • Minor performance improvement to Request.content.
  • Migrate to using collections.abc for 3.7 compatibility.

Bugfixes

  • Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  • Fixed issue where loading the default certificate bundle from a zip
    archive would raise an IOError.
  • Fixed issue with unexpected ImportError on windows system which do
    not support winreg module.
  • DNS resolution in proxy bypass no longer includes the username and
    password in the request. This also fixes the issue of DNS queries
    failing on macOS.
  • Properly normalize adapter prefixes for url comparison.
  • Passing None as a file pointer to the files param no longer
    raises an exception.
  • Calling copy on a RequestsCookieJar will now preserve the cookie
    policy correctly.

Dependencies

  • We now support idna v2.7.
  • We now support urllib3 v1.23.

v2.18.4

Compare Source

Improvements

  • Error messages for invalid headers now include the header name for
    easier debugging

Dependencies

  • We now support idna v2.6.

v2.18.3

Compare Source

Improvements

  • Running $ python -m requests.help now includes the installed
    version of idna.

Bugfixes

  • Fixed issue where Requests would raise ConnectionError instead of
    SSLError when encountering SSL problems when using urllib3 v1.22.

v2.18.2

Compare Source

Bugfixes

  • requests.help no longer fails on Python 2.6 due to the absence of
    ssl.OPENSSL_VERSION_NUMBER.

Dependencies

  • We now support urllib3 v1.22.

v2.18.1

Compare Source

Bugfixes

  • Fix an error in the packaging whereby the *.whl contained
    incorrect data that regressed the fix in v2.17.3.

v2.18.0

Compare Source

Improvements

  • Response is now a context manager, so can be used directly in a
    with statement without first having to be wrapped by
    contextlib.closing().

Bugfixes

  • Resolve installation failure if multiprocessing is not available
  • Resolve tests crash if multiprocessing is not able to determine the
    number of CPU cores
  • Resolve error swallowing in utils set_environ generator

v2.17.3

Compare Source

Improvements

  • Improved packages namespace identity support, for monkeypatching
    libraries.

v2.17.2

Compare Source

Improvements

  • Improved packages namespace identity support, for monkeypatching
    libraries.

v2.17.1

Compare Source

Improvements

  • Improved packages namespace identity support, for monkeypatching
    libraries.

v2.17.0

Compare Source

Improvements

  • Removal of the 301 redirect cache. This improves thread-safety.

v2.16.5

Compare Source

  • Improvements to $ python -m requests.help.

v2.16.4

Compare Source

  • Introduction of the $ python -m requests.help command, for
    debugging with maintainers!

v2.16.3

Compare Source

  • Further restored the requests.packages namespace for compatibility
    reasons.

v2.16.2

Compare Source

  • Further restored the requests.packages namespace for compatibility
    reasons.

No code modification (noted below) should be necessary any longer.

v2.16.1

Compare Source

  • Restored the requests.packages namespace for compatibility
    reasons.
  • Bugfix for urllib3 version parsing.

Note: code that was written to import against the
requests.packages namespace previously will have to import code that
rests at this module-level now.

For example:

from requests.packages.urllib3.poolmanager import PoolManager

Will need to be re-written to be:

from requests.packages import urllib3
urllib3.poolmanager.PoolManager

Or, even better:

from urllib3.poolmanager import PoolManager

v2.16.0

Compare Source

  • Unvendor ALL the things!

v2.15.1

Compare Source

  • Everyone makes mistakes.

v2.15.0

Compare Source

Improvements

  • Introduction of the Response.next property, for getting the next
    PreparedResponse from a redirect chain (when
    allow_redirects=False).
  • Internal refactoring of __version__ module.

Bugfixes

  • Restored once-optional parameter for
    requests.utils.get_environ_proxies().

v2.14.2

Compare Source

Bugfixes

  • Changed a less-than to an equal-to and an or in the dependency
    markers to widen compatibility with older setuptools releases.

v2.14.1

Compare Source

Bugfixes

  • Changed the dependency markers to widen compatibility with older pip
    releases.

v2.14.0

Compare Source

Improvements

  • It is now possible to pass no_proxy as a key to the proxies
    dictionary to provide handling similar to the NO_PROXY environment
    variable.
  • When users provide invalid paths to certificate bundle files or
    directories Requests now raises IOError, rather than failing at
    the time of the HTTPS request with a fairly inscrutable certificate
    validation error.
  • The behavior of SessionRedirectMixin was slightly altered.
    resolve_redirects will now detect a redirect by calling
    get_redirect_target(response) instead of directly querying
    Response.is_redirect and Response.headers['location']. Advanced
    users will be able to process malformed redirects more easily.
  • Changed the internal calculation of elapsed request time to have
    higher resolution on Windows.
  • Added win_inet_pton as conditional dependency for the [socks]
    extra on Windows with Python 2.7.
  • Changed the proxy bypass implementation on Windows: the proxy bypass
    check doesn't use forward and reverse DNS requests anymore
  • URLs with schemes that begin with http but are not http or
    https no longer have their host parts forced to lowercase.

Bugfixes

  • Much improved handling of non-ASCII Location header values in
    redirects. Fewer UnicodeDecodeErrors are encountered on Python 2,
    and Python 3 now correctly understands that Latin-1 is unlikely to
    be the correct encoding.
  • If an attempt to seek file to find out its length fails, we now
    appropriately handle that by aborting our content-length
    calculations.
  • Restricted HTTPDigestAuth to only respond to auth challenges made
    on 4XX responses, rather than to all auth challenges.
  • Fixed some code that was firing DeprecationWarning on Python 3.6.
  • The dismayed person emoticon (/o\\) no longer has a big head. I'm
    sure this is what you were all worrying about most.

Miscellaneous

  • Updated bundled urllib3 to v1.21.1.
  • Updated bundled chardet to v3.0.2.
  • Updated bundled idna to v2.5.
  • Updated bundled certifi to 2017.4.17.

v2.13.0

Compare Source

Features

  • Only load the idna library when we've determined we need it. This
    will save some memory for users.

Miscellaneous

  • Updated bundled urllib3 to 1.20.
  • Updated bundled idna to 2.2.

v2.12.5

Compare Source

Bugfixes

  • Fixed an issue with JSON encoding detection, specifically detecting
    big-endian UTF-32 with BOM.

v2.12.4

Compare Source

Bugfixes

  • Fixed regression from 2.12.2 where non-string types were rejected in
    the basic auth parameters. While support for this behaviour has been
    re-added, the behaviour is deprecated and will be removed in the
    future.

v2.12.3

Compare Source

Bugfixes

  • Fixed regression from v2.12.1 for URLs with schemes that begin with
    "http". These URLs have historically been processed as though they
    were HTTP-schemed URLs, and so have had parameters added. This was
    removed in v2.12.2 in an overzealous attempt to resolve problems
    with IDNA-encoding those URLs. This change was reverted: the other
    fixes for IDNA-encoding have been judged to be sufficient to return
    to the behaviour Requests had before v2.12.0.

v2.12.2

Compare Source

Bugfixes

  • Fixed several issues with IDNA-encoding URLs that are technically
    invalid but which are widely accepted. Requests will now attempt to
    IDNA-encode a URL if it can but, if it fails, and the host contains
    only ASCII characters, it will be passed through optimistically.
    This will allow users to opt-in to using IDNA2003 themselves if they
    want to, and will also allow technically invalid but still common
    hostnames.
  • Fixed an issue where URLs with leading whitespace would raise
    InvalidSchema errors.
  • Fixed an issue where some URLs without the HTTP or HTTPS schemes
    would still have HTTP URL preparation applied to them.
  • Fixed an issue where Unicode strings could not be used in basic
    auth.
  • Fixed an issue encountered by some Requests plugins where
    constructing a Response object would cause Response.content to
    raise an AttributeError.

v2.12.1

Compare Source

Bugfixes

  • Updated setuptools 'security' extra for the new PyOpenSSL backend in
    urllib3.

Miscellaneous

  • Updated bundled urllib3 to 1.19.1.

v2.12.0

Compare Source

Improvements

  • Updated support for internationalized domain names from IDNA2003 to
    IDNA2008. This updated support is required for several forms of IDNs
    and is mandatory for .de domains.
  • Much improved heuristics for guessing content lengths: Requests will
    no longer read an entire StringIO into memory.
  • Much improved logic for recalculating Content-Length headers for
    PreparedRequest objects.
  • Improved tolerance for file-like objects that have no tell method
    but do have a seek method.
  • Anything that is a subclass of Mapping is now treated like a
    dictionary by the data= keyword argument.
  • Requests now tolerates empty passwords in proxy credentials, rather
    than stripping the credentials.
  • If a request is made with a file-like object as the body and that
    request is redirected with a 307 or 308 status code, Requests will
    now attempt to rewind the body object so it can be replayed.

Bugfixes

  • When calling response.close, the call to close will be
    propagated through to non-urllib3 backends.
  • Fixed issue where the ALL_PROXY environment variable would be
    preferred over scheme-specific variables like HTTP_PROXY.
  • Fixed issue where non-UTF8 reason phrases got severely mangled by
    falling back to decoding using ISO 8859-1 instead.
  • Fixed a bug where Requests would not correctly correlate cookies set
    when using custom Host headers if those Host headers did not use the
    native string type for the platform.

Miscellaneous

  • Updated bundled urllib3 to 1.19.
  • Updated bundled certifi certs to 2016.09.26.

v2.11.1

Compare Source

Bugfixes

  • Fixed a bug when using iter_content with decode_unicode=True for
    streamed bodies would raise AttributeError. This bug was
    introduced in 2.11.
  • Strip Content-Type and Transfer-Encoding headers from the header
    block when following a redirect that transforms the verb from
    POST/PUT to GET.

v2.11.0

Compare Source

Improvements

  • Added support for the ALL_PROXY environment variable.
  • Reject header values that contain leading whitespace or newline
    characters to reduce risk of header smuggling.

Bugfixes

  • Fixed occasional TypeError when attempting to decode a JSON
    response that occurred in an error case. Now correctly returns a
    ValueError.
  • Requests would incorrectly ignore a non-CIDR IP address in the
    NO_PROXY environment variables: Requests now treats it as a
    specific IP.
  • Fixed a bug when sending JSON data that could cause us to encounter
    obscure OpenSSL errors in certain network conditions (yes, really).
  • Added type checks to ensure that iter_content only accepts
    integers and None for chunk sizes.
  • Fixed issue where responses whose body had not been fully consumed
    would have the underlying connection closed but not returned to the
    connection pool, which could cause Requests to hang in situations
    where the HTTPAdapter had been configured to use a blocking
    connection pool.

Miscellaneous

  • Updated bundled urllib3 to 1.16.
  • Some previous releases accidentally accepted non-strings as
    acceptable header values. This release does not.

v2.10.0

Compare Source

New Features

  • SOCKS Proxy Support! (requires PySocks;
    $ pip install requests[socks])

Miscellaneous

  • Updated bundled urllib3 to 1.15.1.

v2.9.2

Compare Source

Improvements

  • Change built-in CaseInsensitiveDict (used for headers) to use
    OrderedDict as its underlying datastore.

Bugfixes

  • Don't use redirect_cache if allow_redirects=False
  • When passed objects that throw exceptions from tell(), send them
    via chunked transfer encoding instead of failing.
  • Raise a ProxyError for proxy related connection issues.

v2.9.1

Compare Source

Bugfixes

  • Resolve regression introduced in 2.9.0 that made it impossible to
    send binary strings as bodies in Python 3.
  • Fixed errors when calculating cookie expiration dates in certain
    locales.

Miscellaneous

  • Updated bundled urllib3 to 1.13.1.

v2.9.0

Compare Source

Minor Improvements (Backwards compatible)

  • The verify keyword argument now supports being passed a path to a
    directory of CA certificates, not just a single-file bundle.
  • Warnings are now emitted when sending files opened in text mode.
  • Added the 511 Network Authentication Required status code to the
    status code registry.

Bugfixes

  • For file-like objects that are not sought to the very beginning, we
    now send the content length for the number of bytes we will actually
    read, rather than the total size of the file, allowing partial file
    uploads.
  • When uploading file-like objects, if they are empty or have no
    obvious content length we set Transfer-Encoding: chunked rather
    than Content-Length: 0.
  • We correctly receive the response in buffered mode when uploading
    chunked bodies.
  • We now handle being passed a query string as a bytestring on Python
    3, by decoding it as UTF-8.
  • Sessions are now closed in all cases (exceptional and not) when
    using the functional API rather than leaking and waiting for the
    garbage collector to clean them up.
  • Correctly handle digest auth headers with a malformed qop
    directive that contains no token, by treating it the same as if no
    qop directive was provided at all.
  • Minor performance improvements when removing specific cookies by
    name.

Miscellaneous

  • Updated urllib3 to 1.13.

v2.8.1

Compare Source

Bugfixes

  • Update certificate bundle to match certifi 2015.9.6.2's weak
    certificate bundle.
  • Fix a bug in 2.8.0 where requests would raise ConnectTimeout
    instead of ConnectionError
  • When using the PreparedRequest flow, requests will now correctly
    respect the json parameter. Broken in 2.8.0.
  • When using the PreparedRequest flow, requests will now correctly
    handle a Unicode-string method name on Python 2. Broken in 2.8.0.

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate-bot renovate-bot changed the title Update dependency requests to ==2.32.* [SECURITY] Update dependency requests to ==2.31.* [SECURITY] Aug 6, 2024
@renovate-bot renovate-bot changed the title Update dependency requests to ==2.31.* [SECURITY] Update dependency requests to ==2.32.* [SECURITY] Oct 9, 2024
@renovate-bot renovate-bot force-pushed the renovate/pypi-requests-vulnerability branch from 278aa04 to 1a97722 Compare October 9, 2024 13:49
@renovate-bot renovate-bot changed the title Update dependency requests to ==2.32.* [SECURITY] Update dependency requests to ==2.31.* [SECURITY] Oct 9, 2024
@renovate-bot renovate-bot force-pushed the renovate/pypi-requests-vulnerability branch from 1a97722 to 00bb9a0 Compare October 28, 2024 17:52
@renovate-bot renovate-bot changed the title Update dependency requests to ==2.31.* [SECURITY] Update dependency requests to ==2.32.* [SECURITY] Oct 28, 2024
@renovate-bot renovate-bot force-pushed the renovate/pypi-requests-vulnerability branch from 00bb9a0 to 38fbe72 Compare October 28, 2024 19:04
@renovate-bot renovate-bot changed the title Update dependency requests to ==2.32.* [SECURITY] Update dependency requests to ==2.31.* [SECURITY] Oct 28, 2024
@renovate-bot renovate-bot force-pushed the renovate/pypi-requests-vulnerability branch from 38fbe72 to 8315d1d Compare November 17, 2024 16:58
@renovate-bot renovate-bot changed the title Update dependency requests to ==2.31.* [SECURITY] Update dependency requests to ==2.32.* [SECURITY] Nov 17, 2024
@renovate-bot renovate-bot force-pushed the renovate/pypi-requests-vulnerability branch from 8315d1d to c5b86fb Compare November 17, 2024 19:03
@renovate-bot renovate-bot changed the title Update dependency requests to ==2.32.* [SECURITY] Update dependency requests to ==2.31.* [SECURITY] Nov 17, 2024
@renovate-bot renovate-bot force-pushed the renovate/pypi-requests-vulnerability branch from c5b86fb to d1f4c64 Compare December 2, 2024 10:24
@renovate-bot renovate-bot changed the title Update dependency requests to ==2.31.* [SECURITY] Update dependency requests to ==2.32.* [SECURITY] Dec 2, 2024
@renovate-bot renovate-bot force-pushed the renovate/pypi-requests-vulnerability branch from d1f4c64 to 263ccbe Compare December 2, 2024 15:21
@renovate-bot renovate-bot changed the title Update dependency requests to ==2.32.* [SECURITY] Update dependency requests to ==2.31.* [SECURITY] Dec 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant