Revisions of python-requests
Ana Guerrero (anag+factory)
accepted
request 1110368
from
Dirk Mueller (dirkmueller)
(revision 80)
- switch from unmaintained brotlipy to Brotli (same as urllib3) - allow using newest version of charset-normalizer (3.0+) - Skip test_pyopenssl_redirect due to gh#psf/requests#5846 - add 5711.patch from upstream instead to remove idna<3 pin can install the new idna dropping python2 - refreshed requests-no-hardcoded-version.patch - Do not require full python, (implicit) python-base is sufficient. - Skip one more test that is flaky - -test subpackage must be empty * Only load the idna library when we’ve determined we need it. * Fixed an issue with JSON encoding detection, specifically detecting - Fixed requests-do-not-use-bundle.patch requests-do-not-use-bundle.patch - fix license (Apache-2.0 only) - Now has a "security" package extras set, - Bugfix for responses that attempt to redirect to themselves - Support for connect timeouts! Timeout now accepts a tuple (connect, read) which is used to set individual connect and - update to 1.2.0: + charade: LGPL-2.1+
Dominique Leuenberger (dimstar_suse)
accepted
request 1092607
from
Daniel Garcia (dgarcia)
(revision 79)
- Delete requests-no-hardcoded-version.patch - Security Update to 2.31.0 (bsc#1211674): Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential forwarding of Proxy-Authorization headers to destination servers when following HTTPS redirects. When proxies are defined with user info (https://user:pass@proxy:8080), Requests will construct a Proxy-Authorization header that is attached to the request to authenticate with the proxy. In cases where Requests receives a redirect response, it previously reattached the Proxy-Authorization header incorrectly, resulting in the value being sent through the tunneled connection to the destination server. Users who rely on defining their proxy credentials in the URL are strongly encouraged to upgrade to Requests 2.31.0+ to prevent unintentional leakage and rotate their proxy credentials once the change has been fully deployed. Users who do not use a proxy or do not supply their proxy credentials through the user information portion of their proxy URL are not subject to this vulnerability. Full details can be read in our Github Security Advisory and CVE-2023-32681.
Dominique Leuenberger (dimstar_suse)
accepted
request 1085070
from
Dirk Mueller (dirkmueller)
(revision 78)
Dominique Leuenberger (dimstar_suse)
accepted
request 1069145
from
Factory Maintainer (factory-maintainer)
(revision 77)
Automatic submission by obs-autosubmit
Dominique Leuenberger (dimstar_suse)
accepted
request 1060118
from
Dirk Mueller (dirkmueller)
(revision 76)
- update to 2.28.2: - Requests now supports charset\_normalizer 3.x. - Updated MissingSchema exception to suggest https scheme rather than http. - drop requests-allow-charset-normalizer-3.patch (upstream)
Dominique Leuenberger (dimstar_suse)
accepted
request 1032440
from
Markéta Machová (mcalabkova)
(revision 75)
- allow using newest version of charset-normalizer (3.0+) * requests-allow-charset-normalizer-3.patch
Fabian Vogt (favogt_factory)
accepted
request 1008412
from
Factory Maintainer (factory-maintainer)
(revision 74)
Automatic submission by obs-autosubmit
Dominique Leuenberger (dimstar_suse)
accepted
request 928315
from
Dirk Mueller (dirkmueller)
(revision 71)
- Correct {Build,}Requires for charset_normalizer. - Add trustme to BuildRequires for the test suite. - update to 2.26.0: - `Session.send` now correctly resolves proxy configurations from both the Session and Request. Behavior now matches `Session.request`. (#5681) - Fixed a race condition in zip extraction when using Requests in parallel from zip archive. (#5707) - Instead of `chardet`, use the MIT-licensed `charset_normalizer` for Python3 to remove license ambiguity for projects bundling requests. - Requests now supports `idna` 3.x on Python 3. `idna` 2.x will continue to be used on Python 2 installations. (#5711) - The `requests[security]` extra has been converted to a no-op install. PyOpenSSL is no longer the recommended secure option for Requests. (#5867) - Requests has officially dropped support for Python 3.5. (#5867) - drop 5711.patch: upstream
Dominique Leuenberger (dimstar_suse)
accepted
request 903344
from
Steve Kowalik (StevenK)
(revision 70)
- Skip test_pyopenssl_redirect due to gh#psf/requests#5846
Dominique Leuenberger (dimstar_suse)
accepted
request 871198
from
Factory Maintainer (factory-maintainer)
(revision 69)
Automatic submission by obs-autosubmit
Dominique Leuenberger (dimstar_suse)
accepted
request 856964
from
Dirk Mueller (dirkmueller)
(revision 67)
- update to 2.25.1: - Requests now treats `application/json` as `utf8` by default. Resolving inconsistencies between `r.text` and `r.json` output. (#5673)
Dominique Leuenberger (dimstar_suse)
accepted
request 851065
from
Dirk Mueller (dirkmueller)
(revision 66)
- update to 2.25.0: * Added support for NETRC environment variable. (#5643) * Requests now supports urllib3 v1.26. * Requests v2.25.x will be the last release series with support for Python 3.5. - refreshed requests-no-hardcoded-version.patch
Dominique Leuenberger (dimstar_suse)
accepted
request 796260
from
Tomáš Chvátal (scarabeus_iv)
(revision 64)
- update to version 2.20.0 bsc#1111622:
Dominique Leuenberger (dimstar_suse)
accepted
request 778804
from
Ondřej Súkup (mimi_vx)
(revision 63)
- update to 2.23.0 - dropped merged_pr_5049.patch - refreshed requests-no-hardcoded-version.patch * Remove defunct reference to prefetch in Session __attrs__ * Requests no longer outputs password in basic auth usage warning
Dominique Leuenberger (dimstar_suse)
accepted
request 757448
from
Tomáš Chvátal (scarabeus_iv)
(revision 62)
Dominique Leuenberger (dimstar_suse)
accepted
request 744659
from
Tomáš Chvátal (scarabeus_iv)
(revision 61)
Displaying revisions 1 - 20 of 80