b5e2c83f42
- Updae to 1.25.6: * Fix issue where tilde (~) characters were incorrectly percent-encoded in the path. (Pull #1692)
Tomáš Chvátal
2019-10-02 13:19:11 +00:00
e948bcf631
- Updae to 1.25.6: * Fix issue where tilde (~) characters were incorrectly percent-encoded in the path. (Pull #1692)
Tomáš Chvátal
2019-10-02 13:19:11 +00:00
5e976f8380
- Update to 1.25.5: * Add mitigation for BPO-37428 affecting Python <3.7.4 and OpenSSL 1.1.1+ which caused certificate verification to be enabled when using cert_reqs=CERT_NONE. (Issue #1682) * Propagate Retry-After header settings to subsequent retries. (Pull #1607) * Fix edge case where Retry-After header was still respected even when explicitly opted out of. (Pull #1607) * Remove dependency on rfc3986 for URL parsing. * Fix issue where URLs containing invalid characters within Url.auth would raise an exception instead of percent-encoding those characters. * Add support for HTTPResponse.auto_close = False which makes HTTP responses work well with BufferedReaders and other io module features. (Pull #1652) * Percent-encode invalid characters in URL for HTTPConnectionPool.request() (Pull #1673) - Drop patch urllib3-ssl-default-context.patch - Drop patch python-urllib3-recent-date.patch the date is recent enough on its own
Tomáš Chvátal
2019-09-20 12:34:26 +00:00
84d3d79939
- Update to 1.25.5: * Add mitigation for BPO-37428 affecting Python <3.7.4 and OpenSSL 1.1.1+ which caused certificate verification to be enabled when using cert_reqs=CERT_NONE. (Issue #1682) * Propagate Retry-After header settings to subsequent retries. (Pull #1607) * Fix edge case where Retry-After header was still respected even when explicitly opted out of. (Pull #1607) * Remove dependency on rfc3986 for URL parsing. * Fix issue where URLs containing invalid characters within Url.auth would raise an exception instead of percent-encoding those characters. * Add support for HTTPResponse.auto_close = False which makes HTTP responses work well with BufferedReaders and other io module features. (Pull #1652) * Percent-encode invalid characters in URL for HTTPConnectionPool.request() (Pull #1673) - Drop patch urllib3-ssl-default-context.patch - Drop patch python-urllib3-recent-date.patch the date is recent enough on its own
Tomáš Chvátal
2019-09-20 12:34:26 +00:00
f69bac1c2b
- Use old pytest 3.x as newer do not work with this release * this will be fixed with next release, just spread among numerous fixes in the git for quick backporting
Tomáš Chvátal
2019-07-22 07:55:40 +00:00
f03398377f
- Use old pytest 3.x as newer do not work with this release * this will be fixed with next release, just spread among numerous fixes in the git for quick backporting
Tomáš Chvátal
2019-07-22 07:55:40 +00:00
d9ccae276f
- Skip test_source_address_error as we raise different error with fixes that we provide in new python2/3
Tomáš Chvátal
2019-06-07 11:40:42 +00:00
88ade94dcf
- Skip test_source_address_error as we raise different error with fixes that we provide in new python2/3
Tomáš Chvátal
2019-06-07 11:40:42 +00:00
f67d02d924
- Add more test to skip as with new openssl some behaviour changed and we can't rely on them anymore
Tomáš Chvátal
2019-05-29 08:59:51 +00:00
bd0b4d0eee
- Add more test to skip as with new openssl some behaviour changed and we can't rely on them anymore
Tomáš Chvátal
2019-05-29 08:59:51 +00:00
b5dc6c76c3
- Unbundle the six, rfc3986, and backports.ssl_match_hostname
Tomáš Chvátal
2019-05-29 08:26:07 +00:00
d357a91fcc
- Unbundle the six, rfc3986, and backports.ssl_match_hostname
Tomáš Chvátal
2019-05-29 08:26:07 +00:00
b0e8647f51
- Update to 1.25.3: * Change HTTPSConnection to load system CA certificates when ca_certs, ca_cert_dir, and ssl_context are unspecified. (Pull #1608, Issue #1603) * Upgrade bundled rfc3986 to v1.3.2. (Pull #1609, Issue #1605)
Tomáš Chvátal
2019-05-29 07:57:50 +00:00
1fffa432af
- Update to 1.25.3: * Change HTTPSConnection to load system CA certificates when ca_certs, ca_cert_dir, and ssl_context are unspecified. (Pull #1608, Issue #1603) * Upgrade bundled rfc3986 to v1.3.2. (Pull #1609, Issue #1605)
Tomáš Chvátal
2019-05-29 07:57:50 +00:00
e397a5c391
- Update to 1.25.2: * Change is_ipaddress to not detect IPvFuture addresses. (Pull #1583) * Change parse_url to percent-encode invalid characters within the path, query, and target components. (Pull #1586) * Add support for Google's Brotli package. (Pull #1572, Pull #1579) * Upgrade bundled rfc3986 to v1.3.1 (Pull #1578) - Require all the deps from the secure list rather than Recommend. This makes the check to be run always and ensure the urls are "secure". - Remove ndg-httpsclient as it is not needed since 2015
Tomáš Chvátal
2019-05-06 11:21:12 +00:00
38a6e3e792
- Update to 1.25.2: * Change is_ipaddress to not detect IPvFuture addresses. (Pull #1583) * Change parse_url to percent-encode invalid characters within the path, query, and target components. (Pull #1586) * Add support for Google's Brotli package. (Pull #1572, Pull #1579) * Upgrade bundled rfc3986 to v1.3.1 (Pull #1578) - Require all the deps from the secure list rather than Recommend. This makes the check to be run always and ensure the urls are "secure". - Remove ndg-httpsclient as it is not needed since 2015
Tomáš Chvátal
2019-05-06 11:21:12 +00:00
ccbae0c7b5
Accepting request 700045 from devel:languages:python
Matej Cepl2019-05-02 08:38:20 +00:00
512f98d9f5
Accepting request 700045 from devel:languages:python
Matej Cepl2019-05-02 08:38:20 +00:00
74e303d45b
Accepting request 699612 from home:mcepl:branches:devel:languages:python
Matej Cepl2019-04-30 10:46:53 +00:00
7377479f3b
Accepting request 699612 from home:mcepl:branches:devel:languages:python
Matej Cepl2019-04-30 10:46:53 +00:00
895bd350a6
- Add missing dependency on brotlipy - Fix the tests to pass again
Tomáš Chvátal
2019-04-23 10:39:55 +00:00
1962693978
- Add missing dependency on brotlipy - Fix the tests to pass again
Tomáš Chvátal
2019-04-23 10:39:55 +00:00
3c7026ea2d
- update to 1.25 (bsc#1132663, CVE-2019-11236): * Require and validate certificates by default when using HTTPS * Upgraded `urllib3.utils.parse_url() to be RFC 3986 compliant. * Added support for key_password for HTTPSConnectionPool to use encrypted key_file without creating your own SSLContext object. * Add TLSv1.3 support to CPython, pyOpenSSL, and SecureTransport SSLContext implementations. (Pull #1496) * Switched the default multipart header encoder from RFC 2231 to HTML 5 working draft. * Fixed issue where OpenSSL would block if an encrypted client private key was given and no password was given. Instead an SSLError is raised. * Added support for Brotli content encoding. It is enabled automatically if brotlipy package is installed which can be requested with urllib3[brotli] extra. * Drop ciphers using DSS key exchange from default TLS cipher suites. Improve default ciphers when using SecureTransport. * Implemented a more efficient HTTPResponse.__iter__()` method. - Drop urllib3-test-ssl-drop-sslv3.patch . No longer needed
Thomas Bechtold2019-04-23 04:14:26 +00:00
a829d14823
- update to 1.25 (bsc#1132663, CVE-2019-11236): * Require and validate certificates by default when using HTTPS * Upgraded `urllib3.utils.parse_url() to be RFC 3986 compliant. * Added support for key_password for HTTPSConnectionPool to use encrypted key_file without creating your own SSLContext object. * Add TLSv1.3 support to CPython, pyOpenSSL, and SecureTransport SSLContext implementations. (Pull #1496) * Switched the default multipart header encoder from RFC 2231 to HTML 5 working draft. * Fixed issue where OpenSSL would block if an encrypted client private key was given and no password was given. Instead an SSLError is raised. * Added support for Brotli content encoding. It is enabled automatically if brotlipy package is installed which can be requested with urllib3[brotli] extra. * Drop ciphers using DSS key exchange from default TLS cipher suites. Improve default ciphers when using SecureTransport. * Implemented a more efficient HTTPResponse.__iter__()` method. - Drop urllib3-test-ssl-drop-sslv3.patch . No longer needed
Thomas Bechtold2019-04-23 04:14:26 +00:00
627a9e53e9
- Update to 1.24: * Allow key_server_hostname to be specified when initializing a PoolManager to allow custom SNI to be overridden. (Pull #1449) * Test against Python 3.7 on AppVeyor. (Pull #1453) * Early-out ipv6 checks when running on App Engine. (Pull #1450) * Change ambiguous description of backoff_factor (Pull #1436) * Add ability to handle multiple Content-Encodings (Issue #1441 and Pull #1442) * Skip DNS names that can't be idna-decoded when using pyOpenSSL (Issue #1405). * Add a server_hostname parameter to HTTPSConnection which allows for overriding the SNI hostname sent in the handshake. (Pull #1397) * Drop support for EOL Python 2.6 (Pull #1429 and Pull #1430) * Fixed bug where responses with header Content-Type: message/* erroneously raised HeaderParsingError, resulting in a warning being logged. (Pull #1439) * Move urllib3 to src/urllib3 (Pull #1409) - Drop patch 1414.patch merged upstream - Refresh patches: * python-urllib3-recent-date.patch * urllib3-ssl-default-context.patch
Tomáš Chvátal
2018-11-01 14:22:21 +00:00
ff27a1572a
- Update to 1.24: * Allow key_server_hostname to be specified when initializing a PoolManager to allow custom SNI to be overridden. (Pull #1449) * Test against Python 3.7 on AppVeyor. (Pull #1453) * Early-out ipv6 checks when running on App Engine. (Pull #1450) * Change ambiguous description of backoff_factor (Pull #1436) * Add ability to handle multiple Content-Encodings (Issue #1441 and Pull #1442) * Skip DNS names that can't be idna-decoded when using pyOpenSSL (Issue #1405). * Add a server_hostname parameter to HTTPSConnection which allows for overriding the SNI hostname sent in the handshake. (Pull #1397) * Drop support for EOL Python 2.6 (Pull #1429 and Pull #1430) * Fixed bug where responses with header Content-Type: message/* erroneously raised HeaderParsingError, resulting in a warning being logged. (Pull #1439) * Move urllib3 to src/urllib3 (Pull #1409) - Drop patch 1414.patch merged upstream - Refresh patches: * python-urllib3-recent-date.patch * urllib3-ssl-default-context.patch
Tomáš Chvátal
2018-11-01 14:22:21 +00:00
d013f9dceb
Accepting request 634983 from devel:languages:python
Yuchen Lin2018-09-18 09:36:50 +00:00
2858c31766
Accepting request 634983 from devel:languages:python
Yuchen Lin2018-09-18 09:36:50 +00:00
af538da8db
Accepting request 634935 from home:mcepl:work
Ondřej Súkup2018-09-11 13:45:03 +00:00
a7efcc2346
Accepting request 634935 from home:mcepl:work
Ondřej Súkup2018-09-11 13:45:03 +00:00