chore(deps): update dependency requests to v2.32.3
Compare changes
+ 1
− 1
This MR contains the following updates:
Package | Update | Change |
---|---|---|
requests (source, changelog) | minor |
==2.28.1 -> ==2.32.3
|
v2.32.3
Bugfixes
ssl
module. (#6724)v2.32.2
Deprecations
To provide a more stable migration for custom HTTPAdapters impacted
by the CVE changes in 2.32.0, we've renamed _get_connection
to
a new public API, get_connection_with_tls_context
. Existing custom
HTTPAdapters will need to migrate their code to use this new API.
get_connection
is considered deprecated in all versions of Requests>=2.32.0.
A minimal (2-line) example has been provided in the linked MR to ease migration, but we strongly urge users to evaluate if their custom adapter is subject to the same issue described in CVE-2024-35195. (#6710)
v2.32.1
Bugfixes
v2.32.0
Security
verify=False
on the first request from a
Session will cause subsequent requests to the same origin to also ignore
cert verification, regardless of the value of verify
.
(https://github.com/psf/requests/security/advisories/GHSA-9wx4-h78v-vm56)Improvements
verify=True
now reuses a global SSLContext which should improve
request time variance between first and subsequent requests. It should
also minimize certificate load time on Windows systems when using a Python
version built with OpenSSL 3.x. (#6667)chardet
or charset_normalizer
) when repackaged or vendored.
This enables pip
and other projects to minimize their vendoring
surface area. The Response.text()
and apparent_encoding
APIs
will default to utf-8
if neither library is present. (#6702)Bugfixes
/
(path separator) could lead
urllib3 to unnecessarily reparse the request URI. (#6644)Deprecations
Documentation
Packaging
requests
) is now located
in src/requests
in the Requests sdist. (#6506)hatchling
. This should not impact the average user, but extremely old
versions of packaging utilities may have issues with the new packaging format.v2.31.0
Security
Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential
forwarding of Proxy-Authorization
headers to destination servers when
following HTTPS redirects.
When proxies are defined with user info (https://user:pass@proxy:8080
), Requests
will construct a Proxy-Authorization
header that is attached to the request to
authenticate with the proxy.
In cases where Requests receives a redirect response, it previously reattached
the Proxy-Authorization
header incorrectly, resulting in the value being
sent through the tunneled connection to the destination server. Users who rely on
defining their proxy credentials in the URL are strongly encouraged to upgrade
to Requests 2.31.0+ to prevent unintentional leakage and rotate their proxy
credentials once the change has been fully deployed.
Users who do not use a proxy or do not supply their proxy credentials through the user information portion of their proxy URL are not subject to this vulnerability.
Full details can be read in our Github Security Advisory and CVE-2023-32681.
v2.30.0
Dependencies
This may contain minor breaking changes so we advise careful testing and reviewing https://urllib3.readthedocs.io/en/latest/v2-migration-guide.html prior to upgrading.
Users who wish to stay on urllib3 1.x can pin to urllib3<2
.
v2.29.0
Improvements
v2.28.2
Dependencies
Bugfixes
This MR has been generated by Renovate Bot.