8fb96ed
2023.07.22afe7722
Bump actions/setup-python from 4.6.1 to 4.7.0 (#230)2038739
Bump dessant/lock-threads from 3.0.0 to 4.0.1 (#229)44df761
Hash pin Actions and enable dependabot (#228)8b3d7ba
2023.05.0753da240
ci: Add Python 3.12-dev to the testing (#224)c2fc3b1
Create a Security Policy (#222)c211ef4
Set up permissions to github workflows (#218)2087de5
Don't let deprecation warning fail CI (#219)e0b9fc5
remove paragraphs about 1024-bit roots from READMESourced from flask-cors's releases.
4.0.1
What's Changed
- Fix Read the Docs builds by
@kurtmckee
in corydolphin/flask-cors#345- Update extension.py to clean request.path before logging it by
@aneshujevic
in corydolphin/flask-cors#351- Update CI to include Python 3.12 and flask 3.0.3 by
@corydolphin
in corydolphin/flask-cors#354- Release 4.0.1 by
@corydolphin
in corydolphin/flask-cors#353New Contributors
@kurtmckee
made their first contribution in corydolphin/flask-cors#345@aneshujevic
made their first contribution in corydolphin/flask-cors#351Full Changelog: https://github.com/corydolphin/flask-cors/compare/4.0.0...4.0.1
Release 4.0.0
What's Changed
- Remove support for Python versions older than 3.8 by
@WAKayser
in corydolphin/flask-cors#330- Add GHA tooling by
@corydolphin
in corydolphin/flask-cors#331New Contributors
@WAKayser
made their first contribution in corydolphin/flask-cors#330Full Changelog: https://github.com/corydolphin/flask-cors/compare/3.1.01...v4.0.0
3.1.01
What's Changed
- Include examples to specify that schema and port must be included in … by
@YPCrumble
in corydolphin/flask-cors#294- two small changes to the documentation, based on issue #290 by
@bbbart
in corydolphin/flask-cors#291- Fix typo by
@sunarch
in corydolphin/flask-cors#304- FIX: typo in CSRF by
@sattamjh
in corydolphin/flask-cors#315- Test against recent Python versions by
@pylipp
in corydolphin/flask-cors#314- Correct spelling mistakes by
@EdwardBetts
in corydolphin/flask-cors#311- 'Access-Control-Allow-Private-Network = true' header for http response by
@chelo-kjml
in corydolphin/flask-cors#318- docs: Fix a few typos by
@timgates42
in corydolphin/flask-cors#323- [Docs] Fix typo in configuration documentation by
@sachit-shroff
in corydolphin/flask-cors#316- Release Version 3.1.01 by
@corydolphin
in corydolphin/flask-cors#329New Contributors
@YPCrumble
made their first contribution in corydolphin/flask-cors#294@sunarch
made their first contribution in corydolphin/flask-cors#304@sattamjh
made their first contribution in corydolphin/flask-cors#315@pylipp
made their first contribution in corydolphin/flask-cors#314@EdwardBetts
made their first contribution in corydolphin/flask-cors#311@chelo-kjml
made their first contribution in corydolphin/flask-cors#318@sachit-shroff
made their first contribution in corydolphin/flask-cors#316Full Changelog: https://github.com/corydolphin/flask-cors/compare/3.0.10...3.1.01
Sourced from flask-cors's changelog.
4.0.1
Security
- Address CVE-2024-1681 which is a log injection vulnerability when the log level is set to debug by
@aneshujevic
in corydolphin/flask-cors#3514.0.0
- Remove support for Python versions older than 3.8 by
@WAKayser
in corydolphin/flask-cors#330- Add GHA tooling by
@corydolphin
in corydolphin/flask-cors#3313.1.01
- Include examples to specify that schema and port must be included in … by
@YPCrumble
in corydolphin/flask-cors#294- two small changes to the documentation, based on issue #290 by
@bbbart
in corydolphin/flask-cors#291- Fix typo by
@sunarch
in corydolphin/flask-cors#304- FIX: typo in CSRF by
@sattamjh
in corydolphin/flask-cors#315- Test against recent Python versions by
@pylipp
in corydolphin/flask-cors#314- Correct spelling mistakes by
@EdwardBetts
in corydolphin/flask-cors#311- 'Access-Control-Allow-Private-Network = true' header for http response by
@chelo-kjml
in corydolphin/flask-cors#318- docs: Fix a few typos by
@timgates42
in corydolphin/flask-cors#323- [Docs] Fix typo in configuration documentation by
@sachit-shroff
in corydolphin/flask-cors#316
1df178c
Release 0.4.1 (#353)5090b4a
Update CI to include Python 3.12 and flask 3.0.3 (#354)6172c20
Update extension.py to clean request.path before logging it (#351)cadade9
Fix Read the Docs builds (#345)40acc80
Update CHANGELOG to reflect 4.0.0 release (#335)dbabb27
Testing: Move from deprecated assertEquals to assertEqual (#332)0b74401
Convert CI to use GHA (#331)637595d
Remove support for old python versions (#330)c9c55e1
Release Version 3.1.01 (#329)98aca1a
Fix typo (#316)Sourced from grpcio's releases.
Release v1.53.2
This is release gRPC Core 1.53.2 (glockenspiel).
For gRPC documentation, see grpc.io. For previous releases, see Releases.
This release contains refinements, improvements, and bug fixes.
Core
- [backport][iomgr][EventEngine] Improve server handling of file descriptor exhaustion by
@drfloob
in grpc/grpc#33672Release v1.53.1
This is release gRPC Core 1.53.1 (glockenspiel).
For gRPC documentation, see grpc.io. For previous releases, see Releases.
This release contains refinements, improvements, and bug fixes.
- Fixed CVE-2023-32731
- Fixed CVE-2023-32732
Release v1.53.0
This is release 1.53.0 (glockenspiel) of gRPC Core.
For gRPC documentation, see grpc.io. For previous releases, see Releases.
This release contains refinements, improvements, and bug fixes, with highlights listed below.
Core
- xDS: fix crash when removing the last endpoint from the last locality in weighted_target. (#32592)
- filter stack: pass peer name up via recv_initial_metadata batch. (#31933)
- [EventEngine] Add advice against blocking work in callbacks. (#32397)
- [http2] Dont drop connections on metadata limit exceeded. (#32309)
- xDS: reject aggregate cluster with empty cluster list. (#32238)
- Fix Python epoll1 Fork Support. (#32196)
- server: introduce ServerMetricRecorder API and move per-call reporting from a C++ interceptor to a C-core filter. (#32106)
- [EventEngine] Add invalid handle types to the public API. (#32202)
- [EventEngine] Refactoring the EventEngine Test Suite: Part 1. (#32127)
- xDS: fix WeightedClusters total weight handling. (#32134)
C++
... (truncated)
Sourced from grpcio's changelog.
gRPC Release Schedule
Below is the release schedule for gRPC Java, Go and Core and its dependent languages C++, C#, Objective-C, PHP, Python and Ruby.
Releases are scheduled every six weeks on Tuesdays on a best effort basis. In some unavoidable situations a release may be delayed or released early or a language may skip a release altogether and do the next release to catch up with other languages. See the past releases in the links above. A six-week cycle gives us a good balance between delivering new features/fixes quickly and keeping the release overhead low.
The gRPC release support policy can be found here.
Releases are cut from release branches. For Core and Java repos, the release branch is cut two weeks before the scheduled release date. For Go, the branch is cut just before the release. An RC (release candidate) is published for Core and its dependent languages just after the branch cut. This RC is later promoted to release version if no further changes are made to the release branch. We do our best to keep head of master branch stable at all times regardless of release schedule. Daily build packages from master branch for C#, PHP, Python, Ruby and Protoc plugins are published on packages.grpc.io. If you depend on gRPC in production we recommend to set up your CI system to test the RCs and, if possible, the daily builds.
Names of gRPC releases are here.
Release Scheduled Branch Cut Scheduled Release Date v1.17.0 Nov 19, 2018 Dec 4, 2018 v1.18.0 Jan 2, 2019 Jan 15, 2019 v1.19.0 Feb 12, 2019 Feb 26, 2019 v1.20.0 Mar 26, 2019 Apr 9, 2019 v1.21.0 May 7, 2019 May 21, 2019 v1.22.0 Jun 18, 2019 Jul 2, 2019 v1.23.0 Jul 30, 2019 Aug 13, 2019 v1.24.0 Sept 10, 2019 Sept 24, 2019 v1.25.0 Oct 22, 2019 Nov 5, 2019 v1.26.0 Dec 3, 2019 Dec 17, 2019 v1.27.0 Jan 14, 2020 Jan 28, 2020 v1.28.0 Feb 25, 2020 Mar 10, 2020 v1.29.0 Apr 7, 2020 Apr 21, 2020 v1.30.0 May 19, 2020 Jun 2, 2020 v1.31.0 Jul 14, 2020 Jul 28, 2020 v1.32.0 Aug 25, 2020 Sep 8, 2020 v1.33.0 Oct 6, 2020 Oct 20, 2020 v1.34.0 Nov 17, 2020 Dec 1, 2020 v1.35.0 Dec 29, 2020 Jan 12, 2021 v1.36.0 Feb 9, 2021 Feb 23, 2021 v1.37.0 Mar 23, 2021 Apr 6, 2021 v1.38.0 May 4, 2021 May 18, 2021 v1.39.0 Jun 15, 2021 Jun 29, 2021 v1.40.0 Jul 27, 2021 Aug 10, 2021 v1.41.0 Sep 7, 2021 Sep 21, 2021 v1.42.0 Oct 19, 2021 Nov 2, 2021 v1.43.0 Nov 30, 2021 Dec 14, 2021 v1.44.0 Jan 11, 2022 Jan 25, 2022 v1.45.0 Feb 22, 2022 Mar 8, 2022
afb307f
[v1.53.x][Interop] Backport Python image update (#33864)7a9373b
[Backport] [dependency] Restrict cython to less than 3.X (#33770)fdb64a6
[v1.53][Build] Update Phusion baseimage (#33767)
(#33836)cdf4186
[PSM Interop] Legacy tests: fix xDS test client build (v1.53.x backport)
(#33...ce5b93a
[PSM Interop] Legacy test builds always pull the driver from master
(v1.53.x ...b24b6ea
[release] Bump release version to 1.53.2 (#33709)1e86ca5
[backport][iomgr][EventEngine] Improve server handling of file
descriptor exh...aff3066
[PSM interop] Don't fail url_map target if sub-target already failed
(v1.53.x...539d75c
[PSM interop] Don't fail target if sub-target already failed (#33222)
(v1.53....3e79c88
[Release] Bump version to 1.53.1 (on v1.53.x branch) (#33047)Sourced from gunicorn's releases.
Gunicorn 22.0 has been released
Gunicorn 22.0.0 has been released. This version fix the numerous security vulnerabilities. You're invited to upgrade asap your own installation.
Changes:
22.0.0 - 2024-04-17 ===================
- use
utime
to notify workers liveness- migrate setup to pyproject.toml
- fix numerous security vulnerabilities in HTTP parser (closing some request smuggling vectors)
- parsing additional requests is no longer attempted past unsupported request framing
- on HTTP versions < 1.1 support for chunked transfer is refused (only used in exploits)
- requests conflicting configured or passed SCRIPT_NAME now produce a verbose error
- Trailer fields are no longer inspected for headers indicating secure scheme
- support Python 3.12
** Breaking changes **
- minimum version is Python 3.7
- the limitations on valid characters in the HTTP method have been bounded to Internet Standards
- requests specifying unsupported transfer coding (order) are refused by default (rare)
- HTTP methods are no longer casefolded by default (IANA method registry contains none affected)
- HTTP methods containing the number sign (#) are no longer accepted by default (rare)
- HTTP versions < 1.0 or >= 2.0 are no longer accepted by default (rare, only HTTP/1.1 is supported)
- HTTP versions consisting of multiple digits or containing a prefix/suffix are no longer accepted
- HTTP header field names Gunicorn cannot safely map to variables are silently dropped, as in other software
- HTTP headers with empty field name are refused by default (no legitimate use cases, used in exploits)
- requests with both Transfer-Encoding and Content-Length are refused by default (such a message might indicate an attempt to perform request smuggling)
- empty transfer codings are no longer permitted (reportedly seen with really old & broken proxies)
** SECURITY **
- fix CVE-2024-1135
- Documentation is available there: https://docs.gunicorn.org/en/stable/news.html
- Packages: https://pypi.org/project/gunicorn/
Gunicorn 21.2.0 has been released
Gunicorn 21.2.0 has been released. This version fix the issue introduced in the threaded worker.
Changes:
21.2.0 - 2023-07-19 =================== fix thread worker: revert change considering connection as idle . </tr></table>
... (truncated)
f63d59e
bump to 22.04ac81e0
Merge pull request #3175
from e-kwsm/typo401cecf
Merge pull request #3179
from dhdaines/exclude-eventlet-03600243ec3
fix(deps): exclude eventlet 0.36.0628a0bc
chore: fix typos88fc4a4
Merge pull request #3131
from pajod/patch-py12-rebaseddeae2fc
CI: back off the agressive timeoutf470382
docs: promise 3.12 compat5e30bfa
add changelog to project.urls (updated for PEP621)481c3f9
remove setup.cfg - overridden by pyproject.tomlSourced from protobuf's releases.
Protocol Buffers v3.18.3
C++
- Reduce memory consumption of MessageSet parsing
- This release addresses a Security Advisory for C++ and Python users
Protocol Buffers v3.18.2
Java
- Improve performance characteristics of UnknownFieldSet parsing (#9371)
Protocol Buffers v3.18.1
Python
- Update setup.py to reflect that we now require at least Python 3.5 (#8989)
- Performance fix for DynamicMessage: force GetRaw() to be inlined (#9023)
Ruby
- Update ruby_generator.cc to allow proto2 imports in proto3 (#9003)
Protocol Buffers v3.18.0
C++
- Fix warnings raised by clang 11 (#8664)
- Make StringPiece constructible from std::string_view (#8707)
- Add missing capability attributes for LLVM 12 (#8714)
- Stop using std::iterator (deprecated in C++17). (#8741)
- Move field_access_listener from libprotobuf-lite to libprotobuf (#8775)
- Fix #7047 Safely handle setlocale (#8735)
- Remove deprecated version of SetTotalBytesLimit() (#8794)
- Support arena allocation of google::protobuf::AnyMetadata (#8758)
- Fix undefined symbol error around SharedCtor() (#8827)
- Fix default value of enum(int) in json_util with proto2 (#8835)
- Better Smaller ByteSizeLong
- Introduce event filters for inject_field_listener_events
- Reduce memory usage of DescriptorPool
- For lazy fields copy serialized form when allowed.
- Re-introduce the InlinedStringField class
- v2 access listener
- Reduce padding in the proto's ExtensionRegistry map.
- GetExtension performance optimizations
- Make tracker a static variable rather than call static functions
- Support extensions in field access listener
- Annotate MergeFrom for field access listener
- Fix incomplete types for field access listener
- Add map_entry/new_map_entry to SpecificField in MessageDifferencer. They record the map items which are different in MessageDifferencer's reporter.
- Reduce binary size due to fieldless proto messages
- TextFormat: ParseInfoTree supports getting field end location in addition to start.
- Fix repeated enum extension size in field listener
- Enable Any Text Expansion for Descriptors::DebugString()
- Switch from int{8,16,32,64} to int{8,16,32,64}_t
... (truncated)
a902b39
No-op whitespace changeae62acd
Updating version.json and repo version numbers to: 18.3f43ac49
Merge pull request #10542
from deannagarcia/3.18.x9efdf55
Add missing includesd1635e1
Apply patch5b37c91
Update version.json with "lts": true (#10534)c39d622
Merge pull request #10529
from protocolbuffers/deannagarcia-patch-5f77d3b6
Update version.json8178b06
Merge pull request #10503
from deannagarcia/3.18.x24ca839
Add version fileSourced from py's changelog.
1.11.0 (2021-11-04)
- Support Python 3.11
- Support
NO_COLOR
environment variable- Update vendored apipkg: 1.5 => 2.0
1.10.0 (2020-12-12)
- Fix a regular expression DoS vulnerability in the py.path.svnwc SVN blame functionality (CVE-2020-29651)
- Update vendored apipkg: 1.4 => 1.5
- Update vendored iniconfig: 1.0.0 => 1.1.1
447bac5
Update CHANGELOG.rst6d003d9
Update CHANGELOG.rst9cf613f
Declare support for Python 3.8-3.10d831150
Update python_requires: Python 3.4 was already droppede68532e
Update CHANGELOG for 1.11.02f03e5a
Merge pull request #258
from blueyed/NO_COLORe116b2b
Merge pull request #275
from pytest-dev/upgrade-vendor-libsf3a1a59
remove build pin againf6cbf28
try to use pipx tox3fe9ad7
try to use preinstalled toxSourced from requests's releases.
v2.31.0
2.31.0 (2023-05-22)
Security
Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential forwarding of
Proxy-Authorization
headers to destination servers when following HTTPS redirects.When proxies are defined with user info (https://user:pass@proxy:8080), Requests will construct a
Proxy-Authorization
header that is attached to the request to authenticate with the proxy.In cases where Requests receives a redirect response, it previously reattached the
Proxy-Authorization
header incorrectly, resulting in the value being sent through the tunneled connection to the destination server. Users who rely on defining their proxy credentials in the URL are strongly encouraged to upgrade to Requests 2.31.0+ to prevent unintentional leakage and rotate their proxy credentials once the change has been fully deployed.Users who do not use a proxy or do not supply their proxy credentials through the user information portion of their proxy URL are not subject to this vulnerability.
Full details can be read in our Github Security Advisory and CVE-2023-32681.
v2.30.0
2.30.0 (2023-05-03)
Dependencies
⚠️ Added support for urllib3 2.0. ⚠️
This may contain minor breaking changes so we advise careful testing and reviewing https://urllib3.readthedocs.io/en/latest/v2-migration-guide.html prior to upgrading.
Users who wish to stay on urllib3 1.x can pin to
urllib3<2
.v2.29.0
2.29.0 (2023-04-26)
Improvements
... (truncated)
Sourced from requests's changelog.
2.31.0 (2023-05-22)
Security
Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential forwarding of
Proxy-Authorization
headers to destination servers when following HTTPS redirects.When proxies are defined with user info (
https://user:pass@proxy:8080
), Requests will construct aProxy-Authorization
header that is attached to the request to authenticate with the proxy.In cases where Requests receives a redirect response, it previously reattached the
Proxy-Authorization
header incorrectly, resulting in the value being sent through the tunneled connection to the destination server. Users who rely on defining their proxy credentials in the URL are strongly encouraged to upgrade to Requests 2.31.0+ to prevent unintentional leakage and rotate their proxy credentials once the change has been fully deployed.Users who do not use a proxy or do not supply their proxy credentials through the user information portion of their proxy URL are not subject to this vulnerability.
Full details can be read in our Github Security Advisory and CVE-2023-32681.
2.30.0 (2023-05-03)
Dependencies
⚠️ Added support for urllib3 2.0. ⚠️
This may contain minor breaking changes so we advise careful testing and reviewing https://urllib3.readthedocs.io/en/latest/v2-migration-guide.html prior to upgrading.
Users who wish to stay on urllib3 1.x can pin to
urllib3<2
.2.29.0 (2023-04-26)
Improvements
- Requests now defers chunked requests to the urllib3 implementation to improve standardization. (#6226)
- Requests relaxes header component requirements to support bytes/str subclasses. (#6356)
2.28.2 (2023-01-12)
... (truncated)
147c851
v2.31.074ea7cf
Merge pull request from GHSA-j8r2-6x86-q33q3022253
test on pypy 3.8 and pypy 3.9 on windows and macos (#6424)b639e66
test on py3.12 (#6448)d3d5044
Fixed a small typo (#6452)2ad18e0
v2.30.0f2629e9
Remove strict parameter (#6434)87d63de
v2.29.051716c4
enable the warnings plugin (#6416)a7da1ab
try on ubuntu 22.04 (#6418)fa3282a
Bumped version to 4.7a364e82
Marked version 4.7 as released539c54a
Fix #170:
mistake in examples of documentationb81e317
Declare support for and test Python 3.906ec1ea
Fix #162:
Blinding uses slow algorithm341e5c4
Directly raise DecryptionError
when crypto length is
badf254895
Use bytes.find()
instead of bytes.index()
240b0d8
Add link to changelogf878c37
Fix #164:
Add padding length check as described by PKCS#1 v1.5dae8ce0
Fix #165:
CVE-2020-25658 - Bleichenbacher-style timing oracleSourced from urllib3's releases.
1.26.18
- Made body stripped from HTTP requests changing the request method to GET after HTTP 303 "See Other" redirect responses. (GHSA-g4mx-q9vg-27p4)
1.26.17
- Added the
Cookie
header to the list of headers to strip from requests when redirecting to a different host. As before, different headers can be set viaRetry.remove_headers_on_redirect
. (GHSA-v845-jxx5-vc9f)1.26.16
- Fixed thread-safety issue where accessing a
PoolManager
with many distinct origins would cause connection pools to be closed while requests are in progress (#2954)1.26.15
- Fix socket timeout value when HTTPConnection is reused (urllib3/urllib3#2645)
- Remove "!" character from the unreserved characters in IPv6 Zone ID parsing (urllib3/urllib3#2899)
- Fix IDNA handling of 'x80' byte (urllib3/urllib3#2901)
1.26.14
- Fixed parsing of port 0 (zero) returning None, instead of 0 (#2850)
- Removed deprecated
HTTPResponse.getheaders()
calls inurllib3.contrib
module.1.26.13
- Deprecated the
HTTPResponse.getheaders()
andHTTPResponse.getheader()
methods.- Fixed an issue where parsing a URL with leading zeroes in the port would be rejected even when the port number after removing the zeroes was valid.
- Fixed a deprecation warning when using cryptography v39.0.0.
- Removed the
<4
in theRequires-Python
packaging metadata field.1.26.12
- Deprecated the
urllib3[secure]
extra and theurllib3.contrib.pyopenssl
module. Both will be removed in v2.x. See this GitHub issue for justification and info on how to migrate.1.26.11
If you or your organization rely on urllib3 consider supporting us via GitHub Sponsors.
:warning: urllib3 v2.0 will drop support for Python 2: Read more in the v2.0 Roadmap
- Fixed an issue where reading more than 2 GiB in a call to HTTPResponse.read would raise an OverflowError on Python 3.9 and earlier.
1.26.10
If you or your organization rely on urllib3 consider supporting us via GitHub Sponsors.
:warning: urllib3 v2.0 will drop support for Python 2: Read more in the v2.0 Roadmap
:closed_lock_with_key: This is the first release to be signed with Sigstore! You can verify the distributables using the
.sig
and.crt
files included on this release.
- Removed support for Python 3.5
- Fixed an issue where a
ProxyError
recommending configuring the proxy as HTTP instead of HTTPS could appear even when an HTTPS proxy wasn't configured.1.26.9
If you or your organization rely on urllib3 consider supporting us via GitHub Sponsors.
... (truncated)
Sourced from urllib3's changelog.
1.26.18 (2023-10-17)
- Made body stripped from HTTP requests changing the request method to GET after HTTP 303 "See Other" redirect responses.
1.26.17 (2023-10-02)
- Added the
Cookie
header to the list of headers to strip from requests when redirecting to a different host. As before, different headers can be set viaRetry.remove_headers_on_redirect
. ([#3139](https://github.com/urllib3/urllib3/issues/3139) <https://github.com/urllib3/urllib3/pull/3139>
_)1.26.16 (2023-05-23)
- Fixed thread-safety issue where accessing a
PoolManager
with many distinct origins would cause connection pools to be closed while requests are in progress ([#2954](https://github.com/urllib3/urllib3/issues/2954) <https://github.com/urllib3/urllib3/pull/2954>
_)1.26.15 (2023-03-10)
- Fix socket timeout value when
HTTPConnection
is reused ([#2645](https://github.com/urllib3/urllib3/issues/2645) <https://github.com/urllib3/urllib3/issues/2645>
__)- Remove "!" character from the unreserved characters in IPv6 Zone ID parsing (
[#2899](https://github.com/urllib3/urllib3/issues/2899) <https://github.com/urllib3/urllib3/issues/2899>
__)- Fix IDNA handling of '\x80' byte (
[#2901](https://github.com/urllib3/urllib3/issues/2901) <https://github.com/urllib3/urllib3/issues/2901>
__)1.26.14 (2023-01-11)
- Fixed parsing of port 0 (zero) returning None, instead of 0. (
[#2850](https://github.com/urllib3/urllib3/issues/2850) <https://github.com/urllib3/urllib3/issues/2850>
__)- Removed deprecated getheaders() calls in contrib module. Fixed the type hint of
PoolKey.key_retries
by addingbool
to the union. ([#2865](https://github.com/urllib3/urllib3/issues/2865) <https://github.com/urllib3/urllib3/issues/2865>
__)1.26.13 (2022-11-23)
- Deprecated the
HTTPResponse.getheaders()
andHTTPResponse.getheader()
methods.- Fixed an issue where parsing a URL with leading zeroes in the port would be rejected even when the port number after removing the zeroes was valid.
- Fixed a deprecation warning when using cryptography v39.0.0.
- Removed the
<4
in theRequires-Python
packaging metadata field.1.26.12 (2022-08-22)
- Deprecated the
urllib3[secure]
extra and theurllib3.contrib.pyopenssl
module. Both will be removed in v2.x. See thisGitHub issue <https://github.com/urllib3/urllib3/issues/2680>
_ for justification and info on how to migrate.1.26.11 (2022-07-25)
- Fixed an issue where reading more than 2 GiB in a call to
HTTPResponse.read
would
... (truncated)
9c2c230
Release 1.26.18 (#3159)b594c5c
Merge pull request from GHSA-g4mx-q9vg-27p4944f0eb
[1.26] Use vendored six in urllib3.contrib.securetransportc9016bf
Release 1.26.170122035
Backport GHSA-v845-jxx5-vc9f (#3139)e63989f
Fix installing brotli
extra on Python 2.72e7a24d
[1.26] Configure OS for RTD to fix building docs57181d6
[1.26] Improve error message when calling urllib3.request() (#3058)3c01480
[1.26] Run coverage even with failed jobsd94029b
Release 1.26.16