Skip to content
This repository has been archived by the owner on Dec 20, 2023. It is now read-only.

Update all dependencies (master) #14

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

mend-for-github-com[bot]
Copy link
Contributor

@mend-for-github-com mend-for-github-com bot commented Jul 10, 2022

This PR contains the following updates:

Package Type Update Change Age Adoption Passing Confidence
actions/checkout action major v2 -> v4 age adoption passing confidence
actions/setup-python action major v2 -> v5 age adoption passing confidence
docker/build-push-action action major v2 -> v5 age adoption passing confidence
docker/login-action action major v1 -> v3 age adoption passing confidence
docker/setup-buildx-action action major v1 -> v3 age adoption passing confidence
requests (source, changelog) minor ~=2.25.1 -> ~=2.31.0 age adoption passing confidence
rsa (source) minor ~=4.7.2 -> ~=4.9.0 age adoption passing confidence
xlsxwriter major ~=1.4.3 -> ~=3.1.9 age adoption passing confidence

Release Notes

actions/checkout (actions/checkout)

v4

Compare Source

v3

Compare Source

actions/setup-python (actions/setup-python)

v5

Compare Source

v4

Compare Source

v3

Compare Source

docker/build-push-action (docker/build-push-action)

v5

Compare Source

v4

Compare Source

v3

Compare Source

docker/login-action (docker/login-action)

v3

Compare Source

v2

Compare Source

docker/setup-buildx-action (docker/setup-buildx-action)

v3

Compare Source

v2

Compare Source

psf/requests (requests)

v2.31.0

Compare Source

Security

  • Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential
    forwarding of Proxy-Authorization headers to destination servers when
    following HTTPS redirects.

    When proxies are defined with user info (https://user:pass@proxy:8080), Requests
    will construct a Proxy-Authorization header that is attached to the request to
    authenticate with the proxy.

    In cases where Requests receives a redirect response, it previously reattached
    the Proxy-Authorization header incorrectly, resulting in the value being
    sent through the tunneled connection to the destination server. Users who rely on
    defining their proxy credentials in the URL are strongly encouraged to upgrade
    to Requests 2.31.0+ to prevent unintentional leakage and rotate their proxy
    credentials once the change has been fully deployed.

    Users who do not use a proxy or do not supply their proxy credentials through
    the user information portion of their proxy URL are not subject to this
    vulnerability.

    Full details can be read in our Github Security Advisory
    and CVE-2023-32681.

v2.30.0

Compare Source

Dependencies

v2.29.0

Compare Source

Improvements

  • Requests now defers chunked requests to the urllib3 implementation to improve
    standardization. (#​6226)
  • Requests relaxes header component requirements to support bytes/str subclasses. (#​6356)

v2.28.2

Compare Source

Dependencies

  • Requests now supports charset_normalizer 3.x. (#​6261)

Bugfixes

  • Updated MissingSchema exception to suggest https scheme rather than http. (#​6188)

v2.28.1

Compare Source

Improvements

  • Speed optimization in iter_content with transition to yield from. (#​6170)

Dependencies

  • Added support for chardet 5.0.0 (#​6179)
  • Added support for charset-normalizer 2.1.0 (#​6169)

v2.28.0

Compare Source

Deprecations

  • ⚠️ Requests has officially dropped support for Python 2.7. ⚠️ (#​6091)
  • Requests has officially dropped support for Python 3.6 (including pypy3.6). (#​6091)

Improvements

  • Wrap JSON parsing issues in Request's JSONDecodeError for payloads without
    an encoding to make json() API consistent. (#​6097)
  • Parse header components consistently, raising an InvalidHeader error in
    all invalid cases. (#​6154)
  • Added provisional 3.11 support with current beta build. (#​6155)
  • Requests got a makeover and we decided to paint it black. (#​6095)

Bugfixes

  • Fixed bug where setting CURL_CA_BUNDLE to an empty string would disable
    cert verification. All Requests 2.x versions before 2.28.0 are affected. (#​6074)
  • Fixed urllib3 exception leak, wrapping urllib3.exceptions.SSLError with
    requests.exceptions.SSLError for content and iter_content. (#​6057)
  • Fixed issue where invalid Windows registry entries caused proxy resolution
    to raise an exception rather than ignoring the entry. (#​6149)
  • Fixed issue where entire payload could be included in the error message for
    JSONDecodeError. (#​6036)

v2.27.1

Compare Source

Bugfixes

  • Fixed parsing issue that resulted in the auth component being
    dropped from proxy URLs. (#​6028)

v2.27.0

Compare Source

Improvements

  • Officially added support for Python 3.10. (#​5928)

  • Added a requests.exceptions.JSONDecodeError to unify JSON exceptions between
    Python 2 and 3. This gets raised in the response.json() method, and is
    backwards compatible as it inherits from previously thrown exceptions.
    Can be caught from requests.exceptions.RequestException as well. (#​5856)

  • Improved error text for misnamed InvalidSchema and MissingSchema
    exceptions. This is a temporary fix until exceptions can be renamed
    (Schema->Scheme). (#​6017)

  • Improved proxy parsing for proxy URLs missing a scheme. This will address
    recent changes to urlparse in Python 3.9+. (#​5917)

Bugfixes

  • Fixed defect in extract_zipped_paths which could result in an infinite loop
    for some paths. (#​5851)

  • Fixed handling for AttributeError when calculating length of files obtained
    by Tarfile.extractfile(). (#​5239)

  • Fixed urllib3 exception leak, wrapping urllib3.exceptions.InvalidHeader with
    requests.exceptions.InvalidHeader. (#​5914)

  • Fixed bug where two Host headers were sent for chunked requests. (#​5391)

  • Fixed regression in Requests 2.26.0 where Proxy-Authorization was
    incorrectly stripped from all requests sent with Session.send. (#​5924)

  • Fixed performance regression in 2.26.0 for hosts with a large number of
    proxies available in the environment. (#​5924)

  • Fixed idna exception leak, wrapping UnicodeError with
    requests.exceptions.InvalidURL for URLs with a leading dot (.) in the
    domain. (#​5414)

Deprecations

  • Requests support for Python 2.7 and 3.6 will be ending in 2022. While we
    don't have exact dates, Requests 2.27.x is likely to be the last release
    series providing support.

v2.26.0

Compare Source

Improvements

  • Requests now supports Brotli compression, if either the brotli or
    brotlicffi package is installed. (#​5783)

  • Session.send now correctly resolves proxy configurations from both
    the Session and Request. Behavior now matches Session.request. (#​5681)

Bugfixes

  • Fixed a race condition in zip extraction when using Requests in parallel
    from zip archive. (#​5707)

Dependencies

  • Instead of chardet, use the MIT-licensed charset_normalizer for Python3
    to remove license ambiguity for projects bundling requests. If chardet
    is already installed on your machine it will be used instead of charset_normalizer
    to keep backwards compatibility. (#​5797)

    You can also install chardet while installing requests by
    specifying [use_chardet_on_py3] extra as follows:

    pip install "requests[use_chardet_on_py3]"

    Python2 still depends upon the chardet module.

  • Requests now supports idna 3.x on Python 3. idna 2.x will continue to
    be used on Python 2 installations. (#​5711)

Deprecations

  • The requests[security] extra has been converted to a no-op install.
    PyOpenSSL is no longer the recommended secure option for Requests. (#​5867)

  • Requests has officially dropped support for Python 3.5. (#​5867)

sybrenstuvel/python-rsa (rsa)

v4.9

  • Remove debug logging from rsa/key.py
    (#​194).
  • Remove overlapping slots in PrivateKey and PublicKey.
    (#​189).
  • Do not include CHANGELOG/LICENSE/README.md in wheel
    (#​191).
  • Fixed Key Generation Unittest: Public and Private keys are assigned the wrong way around
    (#​188).

v4.8

  • Switch to Poetry for dependency and release management.
  • Compatibility with Python 3.10.
  • Chain exceptions using raise new_exception from old_exception
    (#​157)
  • Added marker file for PEP 561. This will allow type checking tools in dependent projects
    to use type annotations from Python-RSA
    (#​136).
  • Use the Chinese Remainder Theorem when decrypting with a private key. This
    makes decryption 2-4x faster
    (#​163).
jmcnamara/XlsxWriter (xlsxwriter)

v3.1.9

  • Add fix for errant XML tag in chart leader lines for non-Pie charts.

    :issue:1019 and :feature:1012.

v3.1.8

  • Add support for formatting the data label in chart trendlines.

    :feature:750.

v3.1.7

  • Add the :func:very_hidden() method to hide a worksheet. This is similar to
    the :func:hide() method except that the worksheet cannot be unhidden in the
    the Excel user interface. The Excel worksheet "xlSheetVeryHidden" option can
    only be unset programmatically via VBA.

    :feature:947.

  • Added fixes for column formulas in tables that were overridden by table data
    and which also didn't take future functions into account.

    :issue:1015.

v3.1.6

  • Added support for chart leader lines for chart types other than Pie and Doughnut.

    :feature:1012.

v3.1.5

v3.1.4

  • Added support for enabling the Excel "Show #N/A as an empty cell" chart option
    via the :func:show_na_as_empty_cell method.

    :feature:1008.

v3.1.3

  • Added support for custom total formulas to worksheet tables.

    :feature:982.

v3.1.2

  • Added worksheet page break preview mode via :func:set_pagebreak_view().

v3.1.1

  • Add support for new Excel dynamic functions added in 2023.

    :issue:984.

  • Added support for adding a color to the invert_if_negative chart option.

    :feature:854.

v3.1.0

  • Minor fix for cell color issue.

v3.0.9

  • Add documentation and examples on :ref:ewx_polars to demonstrate new Polars <https://www.pola.rs>_ integration of XlsxWriter in write_excel()_.

.. _write_excel(): https://pola-rs.github.io/polars/py-polars/html/reference/api/polars.DataFrame.write_excel.html#polars.DataFrame.write_excel

  • Add fix for rare issue with duplicate number formats.

v3.0.8

  • Fix for autofit() exception when user defined column width was None.

v3.0.7

  • Improved :func:autofit algorithm to account for the additional width of
    autofilter and table dropdowns.

  • Improved :func:autofit take user defined column widths into account.

    Autofit will now only update the width for an existing column if it is greater
    than the user defined value. This allows the user to pre-load a minimum column
    width.

    :feature:936.

v3.0.6

  • Added simulated worksheet :func:autofit method.

    :feature:936.

v3.0.5

  • Added OverlappingRange exception which is raised during Worksheet
    :func:add_table() or :func:merge_range() if the range overlaps an existing
    worksheet table or merge range. This is a file corruption error in Excel. See
    :ref:exceptions.

    :issue:848

v3.0.4

  • Roll up release of several minor fixes.

  • Drop support for EOL Python 3.4 and 3.5.

v3.0.3

  • Added :func:print_black_and_white worksheet method to set "Black and
    White" print options.

    :feature:862.

v3.0.2

  • Added :func:set_top_left_cell worksheet method to position the first
    visible cell in a worksheet.

    :feature:837.

v3.0.1

  • Add python_requires version to setup.py to help pip find the correct
    matching version for Python 2 and 3.

v2.0.0

  • This is the last XlsxWriter release to support Python 2. From now bug fixes
    and new features will only be available for Python 3. The deprecation notice
    for Python 2 support in XlsxWriter has been in place since May 2020 and the
    Python community support for Python 2 ended in January 2020. Downloads of
    XlsxWriter for Python 2 is currently less than 6% of all downloads of the
    library, and decreasing month by month.

    Python 2 users should still be able to install versions of XlsxWriter up to
    this release but not any releases afterwards.

    :feature:720.


Configuration

📅 Schedule: Branch creation - "every weekend" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch from b1dcc2c to 5c6f0f7 Compare July 26, 2022 09:27
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch 2 times, most recently from c6d9278 to 0db5bbd Compare December 31, 2022 21:17
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch 2 times, most recently from aaf4bfb to b32160c Compare January 8, 2023 20:02
@mend-for-github-com mend-for-github-com bot requested a review from a team January 8, 2023 20:02
@mend-for-github-com mend-for-github-com bot requested a review from a team as a code owner January 8, 2023 20:02
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch 2 times, most recently from ce6f033 to 6f30778 Compare January 14, 2023 07:13
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch 2 times, most recently from 4e865be to 3e1c4af Compare February 3, 2023 15:55
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch from 3e1c4af to 9afc490 Compare March 11, 2023 02:38
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch from 9afc490 to 2c5267d Compare April 14, 2023 02:41
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch 3 times, most recently from 9d3f4f8 to 5b97b6d Compare May 3, 2023 23:23
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch from 5b97b6d to 76bf968 Compare May 4, 2023 21:03
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch 3 times, most recently from 027880f to 0e69e03 Compare May 28, 2023 17:33
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch 2 times, most recently from c87208f to eab2ad7 Compare September 9, 2023 02:41
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch 2 times, most recently from c16e6d6 to aec7f6e Compare September 19, 2023 02:43
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch 2 times, most recently from 084446c to 266fd2d Compare October 2, 2023 02:26
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch 2 times, most recently from 71382d5 to 28e2f89 Compare October 16, 2023 02:42
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch from 28e2f89 to ad770c7 Compare October 20, 2023 02:19
@mend-for-github-com mend-for-github-com bot force-pushed the whitesource-remediate/master-all branch from ad770c7 to 4ff79e2 Compare December 7, 2023 02:39
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

0 participants