Bump the pip group across 1 directory with 4 updates
Bumps the pip group with 4 updates in the / directory: cryptography, gunicorn, requests and werkzeug.
Updates cryptography from 41.0.6 to 42.0.4
Changelog
Sourced from cryptography's changelog.
42.0.4 - 2024-02-20
* Fixed a null-pointer-dereference and segfault that could occur when creating a PKCS#12 bundle. Credit to **Alexander-Programming** for reporting the issue. **CVE-2024-26130** * Fixed ASN.1 encoding for PKCS7/SMIME signed messages. The fields ``SMIMECapabilities`` and ``SignatureAlgorithmIdentifier`` should now be correctly encoded according to the definitions in :rfc:`2633` :rfc:`3370`... _v42-0-3:
42.0.3 - 2024-02-15
- Fixed an initialization issue that caused key loading failures for some users.
.. _v42-0-2:
42.0.2 - 2024-01-30
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.2.1. * Fixed an issue that prevented the use of Python buffer protocol objects in ``sign`` and ``verify`` methods on asymmetric keys. * Fixed an issue with incorrect keyword-argument naming with ``EllipticCurvePrivateKey`` :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.exchange`, ``X25519PrivateKey`` :meth:`~cryptography.hazmat.primitives.asymmetric.x25519.X25519PrivateKey.exchange`, ``X448PrivateKey`` :meth:`~cryptography.hazmat.primitives.asymmetric.x448.X448PrivateKey.exchange`, and ``DHPrivateKey`` :meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHPrivateKey.exchange`... _v42-0-1:
42.0.1 - 2024-01-24
- Fixed an issue with incorrect keyword-argument naming with
EllipticCurvePrivateKey:meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.sign.- Resolved compatibility issue with loading certain RSA public keys in :func:
~cryptography.hazmat.primitives.serialization.load_pem_public_key... _v42-0-0:
42.0.0 - 2024-01-22
</tr></table>
... (truncated)
Commits
fe18470Bump for 42.0.4 release (#10445)aaa2dd0Fix ASN.1 issues in PKCS#7 and S/MIME signing (#10373) (#10442)7a4d012Fixes #10422 -- don't crash when a PKCS#12 key and cert don't match (#10423) ...df314bbbackport actions m1 switch to 42.0.x (#10415)c49a7a5changelog and version bump for 42.0.3 (#10396)396bcf6fix provider loading take two (#10390) (#10395)0e0e46fbackport: initialize openssl's legacy provider in rust (#10323) (#10333)2202123changelog and version bump 42.0.2 (#10268)f7032bdbump openssl in CI (#10298) (#10299)002e886Fixes #10294 -- correct accidental change to exchange kwarg (#10295) (#10296)- Additional commits viewable in compare view
Updates gunicorn from 19.10.0 to 22.0.0
Release notes
Sourced from gunicorn's releases.
Gunicorn 22.0 has been released
Gunicorn 22.0.0 has been released. This version fix the numerous security vulnerabilities. You're invited to upgrade asap your own installation.
Changes:
22.0.0 - 2024-04-17 ===================
- use
utimeto notify workers liveness- migrate setup to pyproject.toml
- fix numerous security vulnerabilities in HTTP parser (closing some request smuggling vectors)
- parsing additional requests is no longer attempted past unsupported request framing
- on HTTP versions < 1.1 support for chunked transfer is refused (only used in exploits)
- requests conflicting configured or passed SCRIPT_NAME now produce a verbose error
- Trailer fields are no longer inspected for headers indicating secure scheme
- support Python 3.12
** Breaking changes **
- minimum version is Python 3.7
- the limitations on valid characters in the HTTP method have been bounded to Internet Standards
- requests specifying unsupported transfer coding (order) are refused by default (rare)
- HTTP methods are no longer casefolded by default (IANA method registry contains none affected)
- HTTP methods containing the number sign (#) are no longer accepted by default (rare)
- HTTP versions < 1.0 or >= 2.0 are no longer accepted by default (rare, only HTTP/1.1 is supported)
- HTTP versions consisting of multiple digits or containing a prefix/suffix are no longer accepted
- HTTP header field names Gunicorn cannot safely map to variables are silently dropped, as in other software
- HTTP headers with empty field name are refused by default (no legitimate use cases, used in exploits)
- requests with both Transfer-Encoding and Content-Length are refused by default (such a message might indicate an attempt to perform request smuggling)
- empty transfer codings are no longer permitted (reportedly seen with really old & broken proxies)
** SECURITY **
- fix CVE-2024-1135
- Documentation is available there: https://docs.gunicorn.org/en/stable/news.html
- Packages: https://pypi.org/project/gunicorn/
Gunicorn 21.2.0 has been released
Gunicorn 21.2.0 has been released. This version fix the issue introduced in the threaded worker.
Changes:
21.2.0 - 2023-07-19 =================== fix thread worker: revert change considering connection as idle . </tr></table>
... (truncated)
Commits
f63d59ebump to 22.04ac81e0Merge pull request #3175 from e-kwsm/typo401cecfMerge pull request #3179 from dhdaines/exclude-eventlet-03600243ec3fix(deps): exclude eventlet 0.36.0628a0bcchore: fix typos88fc4a4Merge pull request #3131 from pajod/patch-py12-rebaseddeae2fcCI: back off the agressive timeoutf470382docs: promise 3.12 compat5e30bfaadd changelog to project.urls (updated for PEP621)481c3f9remove setup.cfg - overridden by pyproject.toml- Additional commits viewable in compare view
Updates requests from 2.31.0 to 2.32.0
Release notes
Sourced from requests's releases.
v2.32.0
2.32.0 (2024-05-20)
🐍 PYCON US 2024 EDITION 🐍
Security
- Fixed an issue where setting
verify=Falseon the first request from a Session will cause subsequent requests to the same origin to also ignore cert verification, regardless of the value ofverify. (https://github.com/psf/requests/security/advisories/GHSA-9wx4-h78v-vm56)Improvements
verify=Truenow reuses a global SSLContext which should improve request time variance between first and subsequent requests. It should also minimize certificate load time on Windows systems when using a Python version built with OpenSSL 3.x. (#6667)- Requests now supports optional use of character detection (
chardetorcharset_normalizer) when repackaged or vendored. This enablespipand other projects to minimize their vendoring surface area. TheResponse.text()andapparent_encodingAPIs will default toutf-8if neither library is present. (#6702)Bugfixes
- Fixed bug in length detection where emoji length was incorrectly calculated in the request content-length. (#6589)
- Fixed deserialization bug in JSONDecodeError. (#6629)
- Fixed bug where an extra leading
/(path separator) could lead urllib3 to unnecessarily reparse the request URI. (#6644)Deprecations
- Requests has officially added support for CPython 3.12 (#6503)
- Requests has officially added support for PyPy 3.9 and 3.10 (#6641)
- Requests has officially dropped support for CPython 3.7 (#6642)
- Requests has officially dropped support for PyPy 3.7 and 3.8 (#6641)
Documentation
- Various typo fixes and doc improvements.
Packaging
- Requests has started adopting some modern packaging practices. The source files for the projects (formerly
requests) is now located insrc/requestsin the Requests sdist. (#6506)- Starting in Requests 2.33.0, Requests will migrate to a PEP 517 build system using
hatchling. This should not impact the average user, but extremely old versions of packaging utilities may have issues with the new packaging format.New Contributors
@matthewarmandmade their first contribution in psf/requests#6258@cpztmade their first contribution in psf/requests#6456
... (truncated)
Changelog
Sourced from requests's changelog.
2.32.0 (2024-05-20)
Security
- Fixed an issue where setting
verify=Falseon the first request from a Session will cause subsequent requests to the same origin to also ignore cert verification, regardless of the value ofverify. (https://github.com/psf/requests/security/advisories/GHSA-9wx4-h78v-vm56)Improvements
verify=Truenow reuses a global SSLContext which should improve request time variance between first and subsequent requests. It should also minimize certificate load time on Windows systems when using a Python version built with OpenSSL 3.x. (#6667)- Requests now supports optional use of character detection (
chardetorcharset_normalizer) when repackaged or vendored. This enablespipand other projects to minimize their vendoring surface area. TheResponse.text()andapparent_encodingAPIs will default toutf-8if neither library is present. (#6702)Bugfixes
- Fixed bug in length detection where emoji length was incorrectly calculated in the request content-length. (#6589)
- Fixed deserialization bug in JSONDecodeError. (#6629)
- Fixed bug where an extra leading
/(path separator) could lead urllib3 to unnecessarily reparse the request URI. (#6644)Deprecations
- Requests has officially added support for CPython 3.12 (#6503)
- Requests has officially added support for PyPy 3.9 and 3.10 (#6641)
- Requests has officially dropped support for CPython 3.7 (#6642)
- Requests has officially dropped support for PyPy 3.7 and 3.8 (#6641)
Documentation
- Various typo fixes and doc improvements.
Packaging
- Requests has started adopting some modern packaging practices. The source files for the projects (formerly
requests) is now located insrc/requestsin the Requests sdist. (#6506)- Starting in Requests 2.33.0, Requests will migrate to a PEP 517 build system using
hatchling. This should not impact the average user, but extremely old versions of packaging utilities may have issues with the new packaging format.
Commits
d6ebc4av2.32.09a40d12Avoid reloading root certificates to improve concurrent performance (#6667)0c030f7Merge pull request #6702 from nateprewitt/no_char_detection555b870Allow character detection dependencies to be optional in post-packaging stepsd6dded3Merge pull request #6700 from franekmagiera/update-redirect-to-invalid-uri-testbf24b7dUse an invalid URI that will not cause httpbin to throw 5002d5f547Pin 3.8 and 3.9 runners back to macos-13 (#6688)f1bb07dMerge pull request #6687 from psf/dependabot/github_actions/github/codeql-act...60047adBump github/codeql-action from 3.24.0 to 3.25.031ebb81Merge pull request #6682 from frenzymadness/pytest8- Additional commits viewable in compare view
Updates werkzeug from 2.3.4 to 3.0.3
Release notes
Sourced from werkzeug's releases.
3.0.3
This is the Werkzeug 3.0.3 security release, which fixes security issues and bugs but does not otherwise change behavior and should not result in breaking changes.
PyPI: https://pypi.org/project/Werkzeug/3.0.3/ Changes: https://werkzeug.palletsprojects.com/en/3.0.x/changes/#version-3-0-3 Milestone: https://github.com/pallets/werkzeug/milestone/35?closed=1
- Only allow
localhost,.localhost,127.0.0.1, or the specified hostname when running the dev server, to make debugger requests. Additional hosts can be added by using the debugger middleware directly. The debugger UI makes requests using the full URL rather than only the path. GHSA-2g68-c3qc-8985- Make reloader more robust when
""is insys.path. #2823- Better TLS cert format with
adhocdev certs. #2891- Inform Python < 3.12 how to handle
itms-servicesURIs correctly, rather than using an overly-broad workaround in Werkzeug that caused some redirect URIs to be passed on without encoding. #2828- Type annotation for
Rule.endpointand other uses ofendpointisAny. #28363.0.2
This is a fix release for the 3.0.x feature branch.
3.0.1
This is a security release for the 3.0.x feature branch.
3.0.0
This is a feature release, which includes new features, removes previously deprecated code, and adds new deprecations. The 3.0.x branch is now the supported fix branch, the 2.3.x branch will become a tag marking the end of support for that branch. We encourage everyone to upgrade, and to use a tool such as pip-tools to pin all dependencies and control upgrades. Test with warnings treated as errors to be able to adapt to deprecation warnings early.
- Changes: https://werkzeug.palletsprojects.com/en/3.0.x/changes/#version-3-0-0
- Milestone: https://github.com/pallets/werkzeug/milestone/21?closed=1
2.3.8
This is a security release for the 2.3.x feature branch.
2.3.7
This is a fix release for the 2.3.x feature branch.
- Changes: https://werkzeug.palletsprojects.com/en/2.3.x/changes/#version-2-3-7
- Milestone: https://github.com/pallets/werkzeug/milestone/33?closed=1
2.3.6
This is a fix release for the 2.3.x feature branch.
- Changes: https://werkzeug.palletsprojects.com/en/2.3.x/changes/#version-2-3-6
- Milestone: https://github.com/pallets/werkzeug/milestone/32?closed=1
2.3.5
This is a fix release for the 2.3.x feature branch.
... (truncated)
Changelog
Sourced from werkzeug's changelog.
Version 3.0.3
Released 2024-05-05
Only allow
localhost,.localhost,127.0.0.1, or the specified hostname when running the dev server, to make debugger requests. Additional hosts can be added by using the debugger middleware directly. The debugger UI makes requests using the full URL rather than only the path. :ghsa:2g68-c3qc-8985Make reloader more robust when
""is insys.path. :pr:2823Better TLS cert format with
adhocdev certs. :pr:2891Inform Python < 3.12 how to handle
itms-servicesURIs correctly, rather than using an overly-broad workaround in Werkzeug that caused some redirect URIs to be passed on without encoding. :issue:2828Type annotation for
Rule.endpointand other uses ofendpointisAny. :issue:2836Make reloader more robust when
""is insys.path. :pr:2823Version 3.0.2
Released 2024-04-01
- Ensure setting
merge_slashestoFalseresults inNotFoundfor repeated-slash requests against single slash routes. :issue:2834- Fix handling of
TypeErrorinTypeConversionDict.get()to matchValueError. :issue:2843- Fix
response_wrappertype check in test client. :issue:2831- Make the return type of
MultiPartParser.parsemore precise. :issue:2840- Raise an error if converter arguments cannot be parsed. :issue:
2822Version 3.0.1
Released 2023-10-24
- Fix slow multipart parsing for large parts potentially enabling DoS attacks.
Version 3.0.0
Released 2023-09-30
- Remove previously deprecated code. :pr:
2768
... (truncated)
Commits
f9995e9release version 3.0.33386395Merge pull request from GHSA-2g68-c3qc-8985890b6b6only require trusted host for evalex71b69dfrestrict debugger trusted hostsd2d3869endpoint type is Any (#2895)7080b55endpoint type is Any7555effremove iri_to_uri redirect workaround (#2894)97fb2f7remove _invalid_iri_to_uri workaround249527fmake cn field a valid single hostname, and use wildcard in SANs field. (#2892)793be47update adhoc tls dev cert format- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency -
@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) -
@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) -
@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) -
@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency -
@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the Security Alerts page.