stylo
stylo copied to clipboard
Update Ansible dependencies
This PR contains the following updates:
Package | Update | Change |
---|---|---|
ansible (source) | minor | ==7.1.0 -> ==7.7.0 |
jinja2 (changelog) | patch | ==3.1.2 -> ==3.1.4 |
markupsafe (changelog) | patch | ==2.1.1 -> ==2.1.5 |
requests (source, changelog) | minor | ==2.28.1 -> ==2.31.0 |
Release Notes
pallets/jinja
v3.1.4
Released 2024-05-05
- The
xmlattr
filter does not allow keys with/
solidus,>
greater-than sign, or=
equals sign, in addition to disallowing spaces. Regardless of any validation done by Jinja, user input should never be used as keys to this filter, or must be separately validated first. :ghsa:h75v-3vvj-5mfj
v3.1.3
Released 2024-01-10
- Fix compiler error when checking if required blocks in parent templates are
empty. :pr:
1858
-
xmlattr
filter does not allow keys with spaces. :ghsa:h5c8-rqwp-cp95
- Make error messages stemming from invalid nesting of
{% trans %}
blocks more helpful. :pr:1918
psf/requests
v2.31.0
Security
-
Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential forwarding of
Proxy-Authorization
headers to destination servers when following HTTPS redirects.When proxies are defined with user info (
https://user:pass@proxy:8080
), Requests will construct aProxy-Authorization
header that is attached to the request to authenticate with the proxy.In cases where Requests receives a redirect response, it previously reattached the
Proxy-Authorization
header incorrectly, resulting in the value being sent through the tunneled connection to the destination server. Users who rely on defining their proxy credentials in the URL are strongly encouraged to upgrade to Requests 2.31.0+ to prevent unintentional leakage and rotate their proxy credentials once the change has been fully deployed.Users who do not use a proxy or do not supply their proxy credentials through the user information portion of their proxy URL are not subject to this vulnerability.
Full details can be read in our Github Security Advisory and CVE-2023-32681.
v2.30.0
Dependencies
-
⚠️ Added support for urllib3 2.0. ⚠️
This may contain minor breaking changes so we advise careful testing and reviewing https://urllib3.readthedocs.io/en/latest/v2-migration-guide.html prior to upgrading.
Users who wish to stay on urllib3 1.x can pin to
urllib3<2
.
v2.29.0
Improvements
- Requests now defers chunked requests to the urllib3 implementation to improve standardization. (#6226)
- Requests relaxes header component requirements to support bytes/str subclasses. (#6356)
v2.28.2
Dependencies
- Requests now supports charset_normalizer 3.x. (#6261)
Bugfixes
- Updated MissingSchema exception to suggest https scheme rather than http. (#6188)
Configuration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
- [ ] If you want to rebase/retry this PR, click this checkbox.
This PR has been generated by Renovate Bot.