SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for python39-urllib3-1.26.12-157.2.noarch.rpm :

* Sun Oct 23 2022 Ben Greiner - Fix pycache when undbundling six
* Mon Aug 22 2022 Dirk Müller - update to 1.26.12:
* Deprecated the `urllib3[secure]` extra and the `urllib3.contrib.pyopenssl` module. Both will be removed in v2.x. See this `GitHub issue `_ for justification and info on how to migrate.
* Tue Aug 02 2022 Ben Greiner - update to 1.26.11
* Fix OverflowError when TLS is used on some Python versions
* Sun Jul 24 2022 Dirk Müller - update to 1.26.10:
* Removed support for Python 3.5
* Fixed an issue where a ``ProxyError`` recommending configuring the proxy as HTTP instead of HTTPS could appear even when an HTTPS proxy wasn\'t configured.- refresh remove_mock.patch with extra mock usages
* Tue Apr 19 2022 Steve Kowalik - Remove unneeded BuildRequires of mock.
* Tue Apr 05 2022 Ben Greiner - Remove unbundling off ssl.match_hostname.
* It was only done for the primary python3 flavor
* It is bundled for a reason gh#urllib3/urllib3#2439, gh#urllib3/urllib3#2448
* The tests (and probably urllib3 users) use wildcard patterns not supported by the stdlib- Fix undbundling of six for all flavors- Replace brotlipy recommendation and test with python-Brotli (see release notes below)
* Tue Mar 29 2022 Dirk Müller - update to 1.26.9:
* Changed ``urllib3[brotli]`` extra to favor installing Brotli libraries that are still receiving updates like ``brotli`` and ``brotlicffi`` instead of ``brotlipy``. This change does not impact behavior of urllib3, only which dependencies are installed.
* Fixed a socket leaking when ``HTTPSConnection.connect()`` raises an exception.
* Fixed ``server_hostname`` being forwarded from ``PoolManager`` to ``HTTPConnectionPool`` when requesting an HTTP URL. Should only be forwarded when requesting an HTTPS URL.
* Mon Jan 10 2022 Dirk Müller - update to 1.26.8:
* Added extra message to``urllib3.exceptions.ProxyError`` when urllib3 detects that a proxy is configured to use HTTPS but the proxy itself appears to only use HTTP.
* Added a mention of the size of the connection pool when discarding a connection due to the pool being full.
* Added explicit support for Python 3.11.
* Deprecated the ``Retry.MAX_BACKOFF`` class property in favor of ``Retry.DEFAULT_MAX_BACKOFF`` to better match the rest of the default parameter names. ``Retry.MAX_BACKOFF`` is removed in v2.0.
* Changed location of the vendored ``ssl.match_hostname`` function from ``urllib3.packages.ssl_match_hostname`` to ``urllib3.util.ssl_match_hostname`` to ensure Python 3.10+ compatibility after being repackaged by downstream distributors.
* Fixed absolute imports, all imports are now relative.
* Tue Oct 26 2021 Dirk Müller - update to 1.26.7:
* Fixed a bug with HTTPS hostname verification involving IP addresses and lack of SNI.
* Fixed a bug where IPv6 braces weren\'t stripped during certificate hostname matching.
* Tue Jul 13 2021 Markéta Machová - update to 1.26.6
* Deprecated the urllib3.contrib.ntlmpool module.
* Changed HTTPConnection.request_chunked() to not erroneously emit multiple Transfer-Encoding headers in the case that one is already specified.
* Fixed typo in deprecation message to recommend Retry.DEFAULT_ALLOWED_METHODS.
* Sun Jun 06 2021 Dirk Müller - update to 1.26.5 (bsc#1187045, CVE-2021-33503):
* Fixed deprecation warnings emitted in Python 3.10.
* Updated vendored ``six`` library to 1.16.0.
* Improved performance of URL parser when splitting the authority component.
* Tue Mar 16 2021 Dirk Müller - update to 1.26.4:
* Changed behavior of the default ``SSLContext`` when connecting to HTTPS proxy during HTTPS requests. The default ``SSLContext`` now sets ``check_hostname=True``.
* Thu Jan 28 2021 Dirk Müller - update to 1.26.3:
* Fixed bytes and string comparison issue with headers (Pull #2141)
* Changed ``ProxySchemeUnknown`` error message to be more actionable if the user supplies a proxy URL without a scheme. (Pull #2107)
* Fri Jan 01 2021 Benjamin Greiner - Skip test for RECENT_DATE. It is a test purely for developers. To maintain reproducibility, keep upstreams possibly outdated RECENT_DATE in the source code. (bsc#1181571)
* Thu Dec 17 2020 Matej Cepl - Add CI variable, which makes timeouts in the test suite longer (gh#urllib3/urllib3#2109, bsc#1176389) and test_timeout_errors_cause_retries should not fail.
* Mon Dec 14 2020 Benjamin Greiner - If you skip_python2 you don\'t need mock.
* Sun Dec 13 2020 Matej Cepl - We don\'t need to break Python 2.7
* Fri Dec 11 2020 Matej Cepl - Add remove_mock.patch to remove dependency on the external mock package (gh#urllib3/urllib3#2108).
* Fri Dec 11 2020 Markéta Machová - Fixed the testsuite and updated dependencies
* Thu Nov 26 2020 Dirk Mueller - update to 1.26.2:
* Fixed an issue where ``wrap_socket`` and ``CERT_REQUIRED`` wouldn\'t be imported properly on Python 2.7.8 and earlier (Pull #2052)
* Fixed an issue where two ``User-Agent`` headers would be sent if a ``User-Agent`` header key is passed as ``bytes`` (Pull #2047)
* Added support for HTTPS proxies contacting HTTPS servers (Pull #1923, Pull #1806)
* Deprecated negotiating TLSv1 and TLSv1.1 by default. Users that still wish to use TLS earlier than 1.2 without a deprecation warning should opt-in explicitly by setting ``ssl_version=ssl.PROTOCOL_TLSv1_1`` (Pull #2002)
*
*Starting in urllib3 v2.0: Connections that receive a ``DeprecationWarning`` will fail
*
*
* Deprecated ``Retry`` options ``Retry.DEFAULT_METHOD_WHITELIST``, ``Retry.DEFAULT_REDIRECT_HEADERS_BLACKLIST`` and ``Retry(method_whitelist=...)`` in favor of ``Retry.DEFAULT_ALLOWED_METHODS``, ``Retry.DEFAULT_REMOVE_HEADERS_ON_REDIRECT``, and ``Retry(allowed_methods=...)`` (Pull #2000)
*
*Starting in urllib3 v2.0: Deprecated options will be removed
*
*
* Added default ``User-Agent`` header to every request (Pull #1750)
* Added ``urllib3.util.SKIP_HEADER`` for skipping ``User-Agent``, ``Accept-Encoding``, and ``Host`` headers from being automatically emitted with requests (Pull #2018)
* Collapse ``transfer-encoding: chunked`` request data and framing into the same ``socket.send()`` call (Pull #1906)
* Send ``http/1.1`` ALPN identifier with every TLS handshake by default (Pull #1894)
* Properly terminate SecureTransport connections when CA verification fails (Pull #1977)
* Don\'t emit an ``SNIMissingWarning`` when passing ``server_hostname=None`` to SecureTransport (Pull #1903)
* Disabled requesting TLSv1.2 session tickets as they weren\'t being used by urllib3 (Pull #1970)
* Suppress ``BrokenPipeError`` when writing request body after the server has closed the socket (Pull #1524)
* Wrap ``ssl.SSLError`` that can be raised from reading a socket (e.g. \"bad MAC\") into an ``urllib3.exceptions.SSLError`` (Pull #1939)
* Fix retry backoff time parsed from ``Retry-After`` header when given in the HTTP date format. The HTTP date was parsed as the local timezone rather than accounting for the timezone in the HTTP date (typically UTC) (Pull #1932, Pull #1935, Pull #1938, Pull #1949)
* Wed Sep 09 2020 Alberto Planas Dominguez - Generate pyc for ssl_match_hostname too
* Tue Aug 04 2020 Dirk Mueller - update to 1.25.10:
* Added support for ``SSLKEYLOGFILE`` environment variable for logging TLS session keys with use with programs like Wireshark for decrypting captured web traffic (Pull #1867)
* Fixed loading of SecureTransport libraries on macOS Big Sur due to the new dynamic linker cache (Pull #1905)
* Collapse chunked request bodies data and framing into one call to ``send()`` to reduce the number of TCP packets by 2-4x (Pull #1906)
* Don\'t insert ``None`` into ``ConnectionPool`` if the pool was empty when requesting a connection (Pull #1866)
* Avoid ``hasattr`` call in ``BrotliDecoder.decompress()`` (Pull #1858)
* Tue Jun 02 2020 Dirk Mueller - update to 1.25.9:
* Added ``InvalidProxyConfigurationWarning`` which is raised when erroneously specifying an HTTPS proxy URL. urllib3 doesn\'t currently support connecting to HTTPS proxies but will soon be able to and we would like users to migrate properly without much breakage.
* Drain connection after ``PoolManager`` redirect (Pull #1817)
* Ensure ``load_verify_locations`` raises ``SSLError`` for all backends (Pull #1812)
* Rename ``VerifiedHTTPSConnection`` to ``HTTPSConnection`` (Pull #1805)
* Allow the CA certificate data to be passed as a string (Pull #1804)
* Raise ``ValueError`` if method contains control characters (Pull #1800)
* Add ``__repr__`` to ``Timeout`` (Pull #1795)
* Tue Apr 21 2020 Matej Cepl - Explicitly switch off building python 2 version.
* Fri Feb 07 2020 Marketa Calabkova - update to 1.25.8
* Drop support for EOL Python 3.4
* Optimize _encode_invalid_chars
* Preserve chunked parameter on retries
* Allow unset SERVER_SOFTWARE in App Engine
* Fix issue where URL fragment was sent within the request target.
* Fix issue where an empty query section in a URL would fail to parse.
* Remove TLS 1.3 support in SecureTransport due to Apple removing support.
* Tue Oct 15 2019 Ralf Haferkamp - Require a new enough release of python-six. 1.25.6 needs at least 1.12.0 for ensure_text() and friends.
* Wed Oct 02 2019 Tomáš Chvátal - Updae to 1.25.6:
* Fix issue where tilde (~) characters were incorrectly percent-encoded in the path. (Pull #1692)
* Fri Sep 27 2019 Tomáš Chvátal - Restrict the tornado dep from tom to 5 or older release as the 6.x changed the API
* Fri Sep 20 2019 Tomáš Chvátal - Update to 1.25.5:
* Add mitigation for BPO-37428 affecting Python <3.7.4 and OpenSSL 1.1.1+ which caused certificate verification to be enabled when using cert_reqs=CERT_NONE. (Issue #1682)
* Propagate Retry-After header settings to subsequent retries. (Pull #1607)
* Fix edge case where Retry-After header was still respected even when explicitly opted out of. (Pull #1607)
* Remove dependency on rfc3986 for URL parsing.
* Fix issue where URLs containing invalid characters within Url.auth would raise an exception instead of percent-encoding those characters.
* Add support for HTTPResponse.auto_close = False which makes HTTP responses work well with BufferedReaders and other io module features. (Pull #1652)
* Percent-encode invalid characters in URL for HTTPConnectionPool.request() (Pull #1673)- Drop patch urllib3-ssl-default-context.patch- Drop patch python-urllib3-recent-date.patch the date is recent enough on its own
* Sat Sep 14 2019 John Vandenberg - Use have/skip_python2/3 macros to allow building only one flavour
* Mon Jul 22 2019 Tomáš Chvátal - Use old pytest 3.x as newer do not work with this release
* this will be fixed with next release, just spread among numerous fixes in the git for quick backporting
* Fri Jun 21 2019 Dominique Leuenberger - Fixup pre script: the migration issue happens when changing from python-urllib3 to python2-urllib3: the number of installed instances of python2-urlliib3 is at this moment 1, unlike in regular updates. This is due to a name change, which consists not of a pure package update.
* Thu Jun 20 2019 Dominique Leuenberger - Provides/Obsoletes does not fix the issue: we have a directory-to-symlink switch, which cannot be handled by RPM internally. Assist using pre script (boo#1138715).
* Wed Jun 19 2019 Stefan Brüns - Fix Upgrade from Leap 42.1/42.2 by adding Obsoletes/Provides: python-urllib3, fixes boo#1138746
* Fri Jun 07 2019 Tomáš Chvátal - Skip test_source_address_error as we raise different error with fixes that we provide in new python2/3
* Wed May 29 2019 Tomáš Chvátal - Add more test to skip as with new openssl some behaviour changed and we can\'t rely on them anymore
* Wed May 29 2019 Tomáš Chvátal - Unbundle the six, rfc3986, and backports.ssl_match_hostname
* Fri May 24 2019 Tomáš Chvátal - Update to 1.25.3:
* Change HTTPSConnection to load system CA certificates when ca_certs, ca_cert_dir, and ssl_context are unspecified. (Pull #1608, Issue #1603)
* Upgrade bundled rfc3986 to v1.3.2. (Pull #1609, Issue #1605)
* Mon May 06 2019 Tomáš Chvátal - Update to 1.25.2:
* Change is_ipaddress to not detect IPvFuture addresses. (Pull #1583)
* Change parse_url to percent-encode invalid characters within the path, query, and target components. (Pull #1586)
* Add support for Google\'s Brotli package. (Pull #1572, Pull #1579)
* Upgrade bundled rfc3986 to v1.3.1 (Pull #1578)- Require all the deps from the secure list rather than Recommend. This makes the check to be run always and ensure the urls are \"secure\".- Remove ndg-httpsclient as it is not needed since 2015
* Tue Apr 23 2019 Tomáš Chvátal - Add missing dependency on brotlipy- Fix the tests to pass again
* Tue Apr 23 2019 Thomas Bechtold - update to 1.25 (bsc#1132663, CVE-2019-9740, CVE-2019-11236):
* Require and validate certificates by default when using HTTPS
* Upgraded ``urllib3.utils.parse_url()`` to be RFC 3986 compliant.
* Added support for ``key_password`` for ``HTTPSConnectionPool`` to use encrypted ``key_file`` without creating your own ``SSLContext`` object.
* Add TLSv1.3 support to CPython, pyOpenSSL, and SecureTransport ``SSLContext`` implementations. (Pull #1496)
* Switched the default multipart header encoder from RFC 2231 to HTML 5 working draft.
* Fixed issue where OpenSSL would block if an encrypted client private key was given and no password was given. Instead an ``SSLError`` is raised.
* Added support for Brotli content encoding. It is enabled automatically if ``brotlipy`` package is installed which can be requested with ``urllib3[brotli]`` extra.
* Drop ciphers using DSS key exchange from default TLS cipher suites. Improve default ciphers when using SecureTransport.
* Implemented a more efficient ``HTTPResponse.__iter__()`` method.- Drop urllib3-test-ssl-drop-sslv3.patch . No longer needed
* Wed Apr 17 2019 Matej Cepl - Update to 1.24.2 (bsc#1132900, CVE-2019-11324): - Implemented a more efficient HTTPResponse.__iter__() method. (Issue #1483) - Upgraded urllib3.utils.parse_url() to be RFC 3986 compliant. (Pull #1487) - Remove Authorization header regardless of case when redirecting to cross-site. (Issue #1510) - Added support for key_password for HTTPSConnectionPool to use encrypted key_file without creating your own SSLContext object. (Pull #1489) - Fixed issue where OpenSSL would block if an encrypted client private key was given and no password was given. Instead an SSLError is raised. (Pull #1489) - Require and validate certificates by default when using HTTPS (Pull #1507) - Added support for Brotli content encoding. It is enabled automatically if brotlipy package is installed which can be requested with urllib3[brotli] extra. (Pull #1532) - Add TLSv1.3 support to CPython, pyOpenSSL, and SecureTransport SSLContext implementations. (Pull #1496) - Drop ciphers using DSS key exchange from default TLS cipher suites. Improve default ciphers when using SecureTransport. (Pull #1496) - Add support for IPv6 addresses in subjectAltName section of certificates. (Issue #1269) - Switched the default multipart header encoder from RFC 2231 to HTML 5 working draft. (Issue #303, PR #1492)
 
ICM