exporters
exporters copied to clipboard
Bump the pip group across 1 directory with 6 updates
Bumps the pip group with 6 updates in the / directory:
Package | From | To |
---|---|---|
pyyaml | 3.11 |
5.4 |
requests | 2.5.3 |
2.31.0 |
ecdsa | 0.13 |
0.19.0 |
paramiko | 1.15.2 |
2.0.9 |
protobuf | 3.0.0b2 |
3.18.3 |
jinja2 | 2.8 |
3.1.4 |
Updates pyyaml
from 3.11 to 5.4
Changelog
Sourced from pyyaml's changelog.
5.4 (2021-01-19)
- yaml/pyyaml#407 -- Build modernization, remove distutils, fix metadata, build wheels, CI to GHA
- yaml/pyyaml#472 -- Fix for CVE-2020-14343, moves arbitrary python tags to UnsafeLoader
- yaml/pyyaml#441 -- Fix memory leak in implicit resolver setup
- yaml/pyyaml#392 -- Fix py2 copy support for timezone objects
- yaml/pyyaml#378 -- Fix compatibility with Jython
5.3.1 (2020-03-18)
- yaml/pyyaml#386 -- Prevents arbitrary code execution during python/object/new constructor
5.3 (2020-01-06)
- yaml/pyyaml#290 -- Use
is
instead of equality for comparing withNone
- yaml/pyyaml#270 -- Fix typos and stylistic nit
- yaml/pyyaml#309 -- Fix up small typo
- yaml/pyyaml#161 -- Fix handling of slots
- yaml/pyyaml#358 -- Allow calling add_multi_constructor with None
- yaml/pyyaml#285 -- Add use of safe_load() function in README
- yaml/pyyaml#351 -- Fix reader for Unicode code points over 0xFFFF
- yaml/pyyaml#360 -- Enable certain unicode tests when maxunicode not > 0xffff
- yaml/pyyaml#359 -- Use full_load in yaml-highlight example
- yaml/pyyaml#244 -- Document that PyYAML is implemented with Cython
- yaml/pyyaml#329 -- Fix for Python 3.10
- yaml/pyyaml#310 -- Increase size of index, line, and column fields
- yaml/pyyaml#260 -- Remove some unused imports
- yaml/pyyaml#163 -- Create timezone-aware datetimes when parsed as such
- yaml/pyyaml#363 -- Add tests for timezone
5.2 (2019-12-02)
- Repair incompatibilities introduced with 5.1. The default Loader was changed, but several methods like add_constructor still used the old default yaml/pyyaml#279 -- A more flexible fix for custom tag constructors yaml/pyyaml#287 -- Change default loader for yaml.add_constructor yaml/pyyaml#305 -- Change default loader for add_implicit_resolver, add_path_resolver
- Make FullLoader safer by removing python/object/apply from the default FullLoader yaml/pyyaml#347 -- Move constructor for object/apply to UnsafeConstructor
- Fix bug introduced in 5.1 where quoting went wrong on systems with sys.maxunicode <= 0xffff yaml/pyyaml#276 -- Fix logic for quoting special characters
- Other PRs: yaml/pyyaml#280 -- Update CHANGES for 5.1
5.1.2 (2019-07-30)
- Re-release of 5.1 with regenerated Cython sources to build properly for Python 3.8b2+
... (truncated)
Commits
58d0cb7
5.4 releasea60f7a1
Fix compatibility with Jythonee98abd
Run CI on PR base branch changesddf2033
constructor.timezone: _copy & deepcopyfc914d5
Avoid repeatedly appending to yaml_implicit_resolversa001f27
Fix for CVE-2020-14343fe15062
Add 3.9 to appveyor file for completeness sake1e1c7fb
Add a newline character to end of pyproject.toml0b6b7d6
Start sentences and phrases for capital lettersc976915
Shell code improvements- Additional commits viewable in compare view
Updates requests
from 2.5.3 to 2.31.0
Release notes
Sourced from requests's releases.
v2.31.0
2.31.0 (2023-05-22)
Security
Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential forwarding of
Proxy-Authorization
headers to destination servers when following HTTPS redirects.When proxies are defined with user info (https://user:pass@proxy:8080), Requests will construct a
Proxy-Authorization
header that is attached to the request to authenticate with the proxy.In cases where Requests receives a redirect response, it previously reattached the
Proxy-Authorization
header incorrectly, resulting in the value being sent through the tunneled connection to the destination server. Users who rely on defining their proxy credentials in the URL are strongly encouraged to upgrade to Requests 2.31.0+ to prevent unintentional leakage and rotate their proxy credentials once the change has been fully deployed.Users who do not use a proxy or do not supply their proxy credentials through the user information portion of their proxy URL are not subject to this vulnerability.
Full details can be read in our Github Security Advisory and CVE-2023-32681.
v2.30.0
2.30.0 (2023-05-03)
Dependencies
⚠️ Added support for urllib3 2.0. ⚠️
This may contain minor breaking changes so we advise careful testing and reviewing https://urllib3.readthedocs.io/en/latest/v2-migration-guide.html prior to upgrading.
Users who wish to stay on urllib3 1.x can pin to
urllib3<2
.v2.29.0
2.29.0 (2023-04-26)
Improvements
... (truncated)
Changelog
Sourced from requests's changelog.
2.31.0 (2023-05-22)
Security
Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential forwarding of
Proxy-Authorization
headers to destination servers when following HTTPS redirects.When proxies are defined with user info (
https://user:pass@proxy:8080
), Requests will construct aProxy-Authorization
header that is attached to the request to authenticate with the proxy.In cases where Requests receives a redirect response, it previously reattached the
Proxy-Authorization
header incorrectly, resulting in the value being sent through the tunneled connection to the destination server. Users who rely on defining their proxy credentials in the URL are strongly encouraged to upgrade to Requests 2.31.0+ to prevent unintentional leakage and rotate their proxy credentials once the change has been fully deployed.Users who do not use a proxy or do not supply their proxy credentials through the user information portion of their proxy URL are not subject to this vulnerability.
Full details can be read in our Github Security Advisory and CVE-2023-32681.
2.30.0 (2023-05-03)
Dependencies
⚠️ Added support for urllib3 2.0. ⚠️
This may contain minor breaking changes so we advise careful testing and reviewing https://urllib3.readthedocs.io/en/latest/v2-migration-guide.html prior to upgrading.
Users who wish to stay on urllib3 1.x can pin to
urllib3<2
.2.29.0 (2023-04-26)
Improvements
- Requests now defers chunked requests to the urllib3 implementation to improve standardization. (#6226)
- Requests relaxes header component requirements to support bytes/str subclasses. (#6356)
2.28.2 (2023-01-12)
... (truncated)
Commits
147c851
v2.31.074ea7cf
Merge pull request from GHSA-j8r2-6x86-q33q3022253
test on pypy 3.8 and pypy 3.9 on windows and macos (#6424)b639e66
test on py3.12 (#6448)d3d5044
Fixed a small typo (#6452)2ad18e0
v2.30.0f2629e9
Remove strict parameter (#6434)87d63de
v2.29.051716c4
enable the warnings plugin (#6416)a7da1ab
try on ubuntu 22.04 (#6418)- Additional commits viewable in compare view
Updates ecdsa
from 0.13 to 0.19.0
Release notes
Sourced from ecdsa's releases.
ecdsa 0.19.0
New API:
to_ssh
inVerifyingKey
andSigningKey
, supports Ed25519 keys only (Pablo Mazzini)New features:
- Support for twisted Brainpool curves
Doc fix:
- Fix curve equation in glossary
- Documentation for signature encoding and signature decoding functions
Maintenance:
- Dropped official support for 3.3 and 3.4 (because of problems running them in CI, not because it's actually incompatible; support for 2.6 and 2.7 is unaffected)
- Fixes around hypothesis parameters
- Officially support Python 3.11 and 3.12
- Small updates to test suite to make it work with 3.11 and 3.12 and new releases of test dependencies
- Dropped the internal
_rwlock
module as it's unused- Added mutation testing to CI, lots of speed-ups to the test suite to make it happen
- Removal of unnecessary
six.b
literals (Alexandre Detiste)Deprecations:
int_to_string
,string_to_int
, anddigest_integer
fromecdsa.ecdsa
module are now considered deprecated, they will be removed in a future releaseecdsa 0.18.0
New features:
- Support for EdDSA (Ed25519, Ed448) signature creation and verification.
- Support for Ed25519 and Ed448 in PKCS#8 and public key files.
- Support for point precomputation for EdDSA.
New API:
- CurveEdTw class to represent the Twisted Edwards curve parameters.
- PointEdwards class to represent points on Twisted Edwards curve and provide point arithmetic on it.
curve_by_name
incurves
module to get aCurve
object by providing curve name.Bug fix:
... (truncated)
Changelog
Sourced from ecdsa's changelog.
- Release 0.19.0 (08 Apr 2024)
New API:
to_ssh
inVerifyingKey
andSigningKey
, supports Ed25519 keys only (Pablo Mazzini)New features:
- Support for twisted Brainpool curves
Doc fix:
- Fix curve equation in glossary
- Documentation for signature encoding and signature decoding functions
Maintenance:
- Dropped official support for 3.3 and 3.4 (because of problems running them in CI, not because it's actually incompatible; support for 2.6 and 2.7 is unaffected)
- Fixes aroung hypothesis parameters
- Officially support Python 3.11 and 3.12
- Small updates to test suite to make it work with 3.11 and 3.12 and new releases of test dependencies
- Dropped the internal
_rwlock
module as it's unused- Added mutation testing to CI, lots of speed-ups to the test suite to make it happen
- Removal of unnecessary
six.b
literals (Alexandre Detiste)Deprecations:
int_to_string
,string_to_int
, anddigest_integer
fromecdsa.ecdsa
module are now considered deprecated, they will be removed in a future releaseRelease 0.18.0 (09 Jul 2022)
New API:
curve_by_name
incurves
module to get aCurve
object by providing curve name.Bug fix:
- Make the
VerifyingKey
encoded with explicit parameters use the same kind of point encoding for public key and curve generator.- Better handling of malformed curve parameters (as in CVE-2022-0778); make python-ecdsa raise
MalformedPointError
instead ofAssertionError
.Doc fix:
- Publish the documentation on https://ecdsa.readthedocs.io/, include explanation of basics of handling of ECC data formats and how to use the library for elliptic curve arithmetic.
- Make object names more consistent, make them into hyperlinks on the readthedocs documentation.
- Make security note more explicit (Ian Rodney)
... (truncated)
Commits
be70016
Merge pull request #337 from tlsfuzzer/release-0.19217735b
allow early exit from worker processes when running mutation testing6e7adff
don't check rate if no tests executedc56030e
make coveralls submission work with py2.6 again66d0d74
add release notes for 0.19.0 release0d5a38c
Merge pull request #156 from tomato42/cosmic-ray02c8350
be more permissive for the PR mutation test coverage4845e8f
better is_prime()09f0d10
add hard timeout for test mutation test suitee16173b
two digit precision for the mutation score badge- Additional commits viewable in compare view
Updates paramiko
from 1.15.2 to 2.0.9
Commits
f83156a
Cut 2.0.981ba2ac
Almost left the 1.17+ marker in the changelog.a5ce12d
Fix a Python 2.6 oopse6f9842
Formatting56c96a6
Fix and changelog re #1283852176d
Fix a pseudo-bug re: responding to MSG_UNIMPLEMENTED w/ itself0b2e154
Merge branch 'crypto-1.5-agnostisicm' into 2.0238a862
Missing verbose/color for 2.6/3.3 backported pytest setup35b1f57
Backport support for newer cryptography sign/verify APIs.40fde0e
Try testing against different cryptography.io versions- Additional commits viewable in compare view
Updates protobuf
from 3.0.0b2 to 3.18.3
Release notes
Sourced from protobuf's releases.
Protocol Buffers v3.18.3
C++
- Reduce memory consumption of MessageSet parsing
- This release addresses a Security Advisory for C++ and Python users
Protocol Buffers v3.18.2
Java
- Improve performance characteristics of UnknownFieldSet parsing (#9371)
Protocol Buffers v3.18.1
Python
- Update setup.py to reflect that we now require at least Python 3.5 (#8989)
- Performance fix for DynamicMessage: force GetRaw() to be inlined (#9023)
Ruby
- Update ruby_generator.cc to allow proto2 imports in proto3 (#9003)
Protocol Buffers v3.18.0
C++
- Fix warnings raised by clang 11 (#8664)
- Make StringPiece constructible from std::string_view (#8707)
- Add missing capability attributes for LLVM 12 (#8714)
- Stop using std::iterator (deprecated in C++17). (#8741)
- Move field_access_listener from libprotobuf-lite to libprotobuf (#8775)
- Fix #7047 Safely handle setlocale (#8735)
- Remove deprecated version of SetTotalBytesLimit() (#8794)
- Support arena allocation of google::protobuf::AnyMetadata (#8758)
- Fix undefined symbol error around SharedCtor() (#8827)
- Fix default value of enum(int) in json_util with proto2 (#8835)
- Better Smaller ByteSizeLong
- Introduce event filters for inject_field_listener_events
- Reduce memory usage of DescriptorPool
- For lazy fields copy serialized form when allowed.
- Re-introduce the InlinedStringField class
- v2 access listener
- Reduce padding in the proto's ExtensionRegistry map.
- GetExtension performance optimizations
- Make tracker a static variable rather than call static functions
- Support extensions in field access listener
- Annotate MergeFrom for field access listener
- Fix incomplete types for field access listener
- Add map_entry/new_map_entry to SpecificField in MessageDifferencer. They record the map items which are different in MessageDifferencer's reporter.
- Reduce binary size due to fieldless proto messages
- TextFormat: ParseInfoTree supports getting field end location in addition to start.
- Fix repeated enum extension size in field listener
- Enable Any Text Expansion for Descriptors::DebugString()
- Switch from int{8,16,32,64} to int{8,16,32,64}_t
... (truncated)
Commits
- See full diff in compare view
Updates jinja2
from 2.8 to 3.1.4
Release notes
Sourced from jinja2's releases.
3.1.4
This is the Jinja 3.1.4 security release, which fixes security issues and bugs but does not otherwise change behavior and should not result in breaking changes.
PyPI: https://pypi.org/project/Jinja2/3.1.4/ Changes: https://jinja.palletsprojects.com/en/3.1.x/changes/#version-3-1-4
- The
xmlattr
filter does not allow keys with/
solidus,>
greater-than sign, or=
equals sign, in addition to disallowing spaces. Regardless of any validation done by Jinja, user input should never be used as keys to this filter, or must be separately validated first. GHSA-h75v-3vvj-5mfj3.1.3
This is a fix release for the 3.1.x feature branch.
- Fix for GHSA-h5c8-rqwp-cp95. You are affected if you are using
xmlattr
and passing user input as attribute keys.- Changes: https://jinja.palletsprojects.com/en/3.1.x/changes/#version-3-1-3
- Milestone: https://github.com/pallets/jinja/milestone/15?closed=1
3.1.2
This is a fix release for the 3.1.0 feature release.
- Changes: https://jinja.palletsprojects.com/en/3.1.x/changes/#version-3-1-2
- Milestone: https://github.com/pallets/jinja/milestone/13?closed=1
3.1.1
- Changes: https://jinja.palletsprojects.com/en/3.1.x/changes/#version-3-1-1
- Milestone: https://github.com/pallets/jinja/milestone/12?closed=1
3.1.0
This is a feature release, which includes new features and removes previously deprecated features. The 3.1.x branch is now the supported bugfix branch, the 3.0.x branch has become a tag marking the end of support for that branch. We encourage everyone to upgrade, and to use a tool such as pip-tools to pin all dependencies and control upgrades. We also encourage upgrading to MarkupSafe 2.1.1, the latest version at this time.
- Changes: https://jinja.palletsprojects.com/en/3.1.x/changes/#version-3-1-0
- Milestone: https://github.com/pallets/jinja/milestone/8?closed=1
- MarkupSafe changes: https://markupsafe.palletsprojects.com/en/2.1.x/changes/#version-2-1-1
3.0.3
3.0.2
3.0.1
3.0.0
New major versions of all the core Pallets libraries, including Jinja 3.0, have been released! :tada:
- Read the announcement on our blog: https://palletsprojects.com/blog/flask-2-0-released/
- Read the full list of changes: https://jinja.palletsprojects.com/changes/#version-3-0-0
- Retweet the announcement on Twitter: https://twitter.com/PalletsTeam/status/1392266507296514048
- Follow our blog, Twitter, or GitHub to see future announcements.
This represents a significant amount of work, and there are quite a few changes. Be sure to carefully read the changelog, and use tools such as pip-compile and Dependabot to pin your dependencies and control your updates.
... (truncated)
Changelog
Sourced from jinja2's changelog.
Version 3.1.4
Released 2024-05-05
- The
xmlattr
filter does not allow keys with/
solidus,>
greater-than sign, or=
equals sign, in addition to disallowing spaces. Regardless of any validation done by Jinja, user input should never be used as keys to this filter, or must be separately validated first. :ghsa:h75v-3vvj-5mfj
Version 3.1.3
Released 2024-01-10
- Fix compiler error when checking if required blocks in parent templates are empty. :pr:
1858
xmlattr
filter does not allow keys with spaces. :ghsa:h5c8-rqwp-cp95
- Make error messages stemming from invalid nesting of
{% trans %}
blocks more helpful. :pr:1918
Version 3.1.2
Released 2022-04-28
- Add parameters to
Environment.overlay
to match__init__
. :issue:1645
- Handle race condition in
FileSystemBytecodeCache
. :issue:1654
Version 3.1.1
Released 2022-03-25
- The template filename on Windows uses the primary path separator. :issue:
1637
Version 3.1.0
Released 2022-03-24
- Drop support for Python 3.6. :pr:
1534
- Remove previously deprecated code. :pr:
1544
... (truncated)
Commits
dd4a8b5
release version 3.1.40668239
Merge pull request from GHSA-h75v-3vvj-5mfjd655030
disallow invalid characters in keys to xmlattr filtera7863ba
add ghsa linksb5c98e7
start version 3.1.4da3a9f0
update project files (#1968)0ee5eb4
satisfy formatter, linter, and strict mypy20477c6
update project files (#5457)e491223
update pyyaml dev dependency36f9885
fix pr link- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebase
will rebase this PR -
@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it -
@dependabot merge
will merge this PR after your CI passes on it -
@dependabot squash and merge
will squash and merge this PR after your CI passes on it -
@dependabot cancel merge
will cancel a previously requested merge and block automerging -
@dependabot reopen
will reopen this PR if it is closed -
@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency -
@dependabot ignore <dependency name> major version
will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) -
@dependabot ignore <dependency name> minor version
will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) -
@dependabot ignore <dependency name>
will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) -
@dependabot unignore <dependency name>
will remove all of the ignore conditions of the specified dependency -
@dependabot unignore <dependency name> <ignore condition>
will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the Security Alerts page.