head 1.49; access; symbols pkgsrc-2023Q4:1.49.0.6 pkgsrc-2023Q4-base:1.49 pkgsrc-2023Q3:1.49.0.4 pkgsrc-2023Q3-base:1.49 pkgsrc-2023Q2:1.49.0.2 pkgsrc-2023Q2-base:1.49 pkgsrc-2023Q1:1.46.0.2 pkgsrc-2023Q1-base:1.46 pkgsrc-2022Q4:1.45.0.2 pkgsrc-2022Q4-base:1.45 pkgsrc-2022Q3:1.44.0.2 pkgsrc-2022Q3-base:1.44 pkgsrc-2022Q2:1.43.0.4 pkgsrc-2022Q2-base:1.43 pkgsrc-2022Q1:1.43.0.2 pkgsrc-2022Q1-base:1.43 pkgsrc-2021Q4:1.42.0.2 pkgsrc-2021Q4-base:1.42 pkgsrc-2021Q3:1.40.0.2 pkgsrc-2021Q3-base:1.40 pkgsrc-2021Q2:1.39.0.6 pkgsrc-2021Q2-base:1.39 pkgsrc-2021Q1:1.39.0.4 pkgsrc-2021Q1-base:1.39 pkgsrc-2020Q4:1.39.0.2 pkgsrc-2020Q4-base:1.39 pkgsrc-2020Q3:1.37.0.4 pkgsrc-2020Q3-base:1.37 pkgsrc-2020Q2:1.37.0.2 pkgsrc-2020Q2-base:1.37 pkgsrc-2020Q1:1.36.0.2 pkgsrc-2020Q1-base:1.36 pkgsrc-2019Q4:1.35.0.8 pkgsrc-2019Q4-base:1.35 pkgsrc-2019Q3:1.35.0.4 pkgsrc-2019Q3-base:1.35 pkgsrc-2019Q2:1.35.0.2 pkgsrc-2019Q2-base:1.35 pkgsrc-2019Q1:1.34.0.4 pkgsrc-2019Q1-base:1.34 pkgsrc-2018Q4:1.34.0.2 pkgsrc-2018Q4-base:1.34 pkgsrc-2018Q3:1.31.0.4 pkgsrc-2018Q3-base:1.31 pkgsrc-2018Q2:1.31.0.2 pkgsrc-2018Q2-base:1.31 pkgsrc-2018Q1:1.30.0.8 pkgsrc-2018Q1-base:1.30 pkgsrc-2017Q4:1.30.0.6 pkgsrc-2017Q4-base:1.30 pkgsrc-2017Q3:1.30.0.4 pkgsrc-2017Q3-base:1.30 pkgsrc-2017Q2:1.25.0.2 pkgsrc-2017Q2-base:1.25 pkgsrc-2017Q1:1.18.0.2 pkgsrc-2017Q1-base:1.18 pkgsrc-2016Q4:1.17.0.2 pkgsrc-2016Q4-base:1.17 pkgsrc-2016Q3:1.15.0.4 pkgsrc-2016Q3-base:1.15 pkgsrc-2016Q2:1.15.0.2 pkgsrc-2016Q2-base:1.15 pkgsrc-2016Q1:1.14.0.2 pkgsrc-2016Q1-base:1.14 pkgsrc-2015Q4:1.12.0.2 pkgsrc-2015Q4-base:1.12 pkgsrc-2015Q3:1.10.0.2 pkgsrc-2015Q3-base:1.10 pkgsrc-2015Q2:1.9.0.4 pkgsrc-2015Q2-base:1.9 pkgsrc-2015Q1:1.9.0.2 pkgsrc-2015Q1-base:1.9 pkgsrc-2014Q4:1.6.0.2 pkgsrc-2014Q4-base:1.6 pkgsrc-2014Q3:1.4.0.2 pkgsrc-2014Q3-base:1.4 pkgsrc-2014Q2:1.3.0.4 pkgsrc-2014Q2-base:1.3 pkgsrc-2014Q1:1.3.0.2 pkgsrc-2014Q1-base:1.3 pkgsrc-2013Q4:1.1.0.6 pkgsrc-2013Q4-base:1.1 pkgsrc-2013Q3:1.1.0.4 pkgsrc-2013Q3-base:1.1 pkgsrc-2013Q2:1.1.0.2 pkgsrc-2013Q2-base:1.1; locks; strict; comment @# @; 1.49 date 2023.05.26.19.42.57; author adam; state Exp; branches; next 1.48; commitid LssT8HI0p1abEvqE; 1.48 date 2023.05.05.18.25.02; author adam; state Exp; branches; next 1.47; commitid k8znZHvluLumTNnE; 1.47 date 2023.04.30.18.02.03; author wiz; state Exp; branches; next 1.46; commitid Frt72hjU1B6sV9nE; 1.46 date 2023.01.13.09.01.02; author adam; state Exp; branches; next 1.45; commitid VZDVBNeSvBoUmm9E; 1.45 date 2022.11.25.10.46.37; author adam; state Exp; branches; next 1.44; commitid XDrpyF1PUmD0x43E; 1.44 date 2022.07.10.20.09.56; author wiz; state Exp; branches; next 1.43; commitid Gl5lBklhBzL75oLD; 1.43 date 2022.01.07.16.23.16; author adam; state Exp; branches; next 1.42; commitid AF0YnIqO6YU1KInD; 1.42 date 2021.10.26.10.19.01; author nia; state Exp; branches; next 1.41; commitid XMBRkrafc79x2jeD; 1.41 date 2021.10.07.13.43.41; author nia; state Exp; branches; next 1.40; commitid TK9Y8OXA04EYMSbD; 1.40 date 2021.07.30.04.19.22; author adam; state Exp; branches; next 1.39; commitid xvs8r88DfeHiUX2D; 1.39 date 2020.12.18.08.22.39; author adam; state Exp; branches; next 1.38; commitid NK4VVLC7yz5vscAC; 1.38 date 2020.11.12.10.29.43; author adam; state Exp; branches; next 1.37; commitid upTJO9FL2QuLjAvC; 1.37 date 2020.06.19.20.45.41; author adam; state Exp; branches; next 1.36; commitid JMjmxtunl0e6qScC; 1.36 date 2020.02.21.06.42.59; author adam; state Exp; branches; next 1.35; commitid fywVW94GvQ39AvXB; 1.35 date 2019.05.17.08.34.38; author adam; state Exp; branches; next 1.34; commitid loJReSiGXMOtcxnB; 1.34 date 2018.12.11.09.11.08; author adam; state Exp; branches; next 1.33; commitid utf4819zcpzTrm3B; 1.33 date 2018.11.09.10.44.15; author adam; state Exp; branches; next 1.32; commitid 3LBfOGA0OB2AZfZA; 1.32 date 2018.10.22.07.55.36; author adam; state Exp; branches; next 1.31; commitid S4dpKRfx1kbxDVWA; 1.31 date 2018.06.16.13.08.32; author adam; state Exp; branches; next 1.30; commitid hpwdRVm9ZttUtvGA; 1.30 date 2017.08.16.07.17.58; author adam; state Exp; branches; next 1.29; commitid 7zHs1GZ7LLVFjp3A; 1.29 date 2017.08.04.05.02.34; author adam; state Exp; branches; next 1.28; commitid FXG6gRJXxeZ7XQ1A; 1.28 date 2017.07.26.16.43.39; author adam; state Exp; branches; next 1.27; commitid xBXd9k6mbPfz7L0A; 1.27 date 2017.07.22.19.25.38; author wiz; state Exp; branches; next 1.26; commitid mWBPvn1eJRa69g0A; 1.26 date 2017.07.22.09.41.05; author adam; state Exp; branches; next 1.25; commitid dESpAxtTxSmFUc0A; 1.25 date 2017.06.15.05.59.47; author adam; state Exp; branches; next 1.24; commitid X854mvSRDvakSqVz; 1.24 date 2017.05.31.06.30.25; author adam; state Exp; branches; next 1.23; commitid 1fJONItKNl9QwvTz; 1.23 date 2017.05.29.10.43.42; author adam; state Exp; branches; next 1.22; commitid JxFaVPyGY1zIZgTz; 1.22 date 2017.05.10.17.42.09; author adam; state Exp; branches; next 1.21; commitid EQBcPYb1V6f8VRQz; 1.21 date 2017.05.10.03.41.20; author adam; state Exp; branches; next 1.20; commitid prQ5I1tPVszBgNQz; 1.20 date 2017.05.09.17.08.39; author adam; state Exp; branches; next 1.19; commitid zfpyCiazjw0ALJQz; 1.19 date 2017.04.04.12.42.23; author adam; state Exp; branches; next 1.18; commitid PDgJNXEE4aZXpdMz; 1.18 date 2017.01.01.08.21.49; author ryoon; state Exp; branches; next 1.17; commitid zUMyhIOEi0k0YeAz; 1.17 date 2016.12.15.11.06.08; author adam; state Exp; branches; next 1.16; commitid 5sxxpq0Pujleq4yz; 1.16 date 2016.11.11.09.27.21; author fhajny; state Exp; branches; next 1.15; commitid E4nLLQGSghxxXGtz; 1.15 date 2016.05.05.11.47.45; author wiz; state Exp; branches; next 1.14; commitid 9ZsdcsBgGdyVQh5z; 1.14 date 2016.01.02.10.49.49; author wiz; state Exp; branches; next 1.13; commitid bTdIj5COPwAYvlPy; 1.13 date 2015.12.27.23.38.46; author wiz; state Exp; branches; next 1.12; commitid Jw4on2Ojr31VXDOy; 1.12 date 2015.11.06.21.42.14; author wiz; state Exp; branches; next 1.11; commitid qAX42zEgwNcAX4Iy; 1.11 date 2015.11.03.03.29.15; author agc; state Exp; branches; next 1.10; commitid XagoUgdES8g2ZAHy; 1.10 date 2015.08.12.18.31.16; author gls; state Exp; branches; next 1.9; commitid g7Guo1yx0POvF0xy; 1.9 date 2015.03.16.13.58.37; author wiz; state Exp; branches; next 1.8; commitid koz15Iyiv7OSWPdy; 1.8 date 2015.03.09.16.57.04; author imil; state Exp; branches; next 1.7; commitid prJmuxpCwqvs9Xcy; 1.7 date 2015.02.23.11.31.14; author imil; state Exp; branches; next 1.6; commitid VuqQHo2kKT3XN7by; 1.6 date 2014.12.12.19.54.31; author imil; state Exp; branches; next 1.5; commitid KH7A9LRxGbf2WM1y; 1.5 date 2014.12.07.12.34.09; author imil; state Exp; branches; next 1.4; commitid Ff2ZU6aJ8P4TE61y; 1.4 date 2014.08.25.18.33.21; author wiz; state Exp; branches; next 1.3; commitid A3otRAlaGcKHZLNx; 1.3 date 2014.01.16.02.52.19; author rodent; state Exp; branches; next 1.2; commitid JMxZbM0ryv0XShlx; 1.2 date 2014.01.05.17.47.10; author rodent; state Exp; branches; next 1.1; commitid ItbpZf3gcS4bbXjx; 1.1 date 2013.05.21.14.34.38; author imil; state Exp; branches; next ; commitid grRhyGbkcNz9uvQw; desc @@ 1.49 log @py-requests: updated to 2.31.0 2.31.0 (2023-05-22) ------------------- **Security** - Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential forwarding of `Proxy-Authorization` headers to destination servers when following HTTPS redirects. When proxies are defined with user info (https://user:pass@@proxy:8080), Requests will construct a `Proxy-Authorization` header that is attached to the request to authenticate with the proxy. In cases where Requests receives a redirect response, it previously reattached the `Proxy-Authorization` header incorrectly, resulting in the value being sent through the tunneled connection to the destination server. Users who rely on defining their proxy credentials in the URL are *strongly* encouraged to upgrade to Requests 2.31.0+ to prevent unintentional leakage and rotate their proxy credentials once the change has been fully deployed. Users who do not use a proxy or do not supply their proxy credentials through the user information portion of their proxy URL are not subject to this vulnerability. Full details can be read in our [Github Security Advisory](https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q) and [CVE-2023-32681](https://nvd.nist.gov/vuln/detail/CVE-2023-32681). @ text @$NetBSD: distinfo,v 1.48 2023/05/05 18:25:02 adam Exp $ BLAKE2s (requests-2.31.0.tar.gz) = 860cbb87ba43dd7244f420c4b38e6a8453335b9101286fc246a718ef9c222c94 SHA512 (requests-2.31.0.tar.gz) = ce50d64973752f4cf7f7c7c91401669854b55c66d7465bea3689772fae8a6b646cf6720d84a2984bbe6fd78fc8b9ce0aa377f291fb6d7c20c7c2a4be8193acdd Size (requests-2.31.0.tar.gz) = 110794 bytes @ 1.48 log @py-requests: updated to 2.30.0 2.30.0 (2023-05-03) ------------------- **Dependencies** - ⚠️ Added support for urllib3 2.0. ⚠️ This may contain minor breaking changes so we advise careful testing and reviewing https://urllib3.readthedocs.io/en/latest/v2-migration-guide.html prior to upgrading. Users who wish to stay on urllib3 1.x can pin to `urllib3<2`. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.47 2023/04/30 18:02:03 wiz Exp $ d3 3 a5 4 BLAKE2s (requests-2.30.0.tar.gz) = 52d01eb3b24b67d4f98038fd5115d898860eaa2f77cf6ce21c10d607d75f0d37 SHA512 (requests-2.30.0.tar.gz) = a950a156ac78e5e315b95619f8753f7ba837c63198e256ea69a53f9492f7be1cecb295fcacbf091f3d5ae077ea02c67056d753f99c2b95cc9d233c3ca77f2905 Size (requests-2.30.0.tar.gz) = 108411 bytes SHA1 (patch-setup.py) = 9344db9f4ce311a59564f89f35538bab4aa2ad7e @ 1.47 log @py-requests: update to 2.29.0. 2.29.0 (2023-04-26) ------------------- **Improvements** - Requests now defers chunked requests to the urllib3 implementation to improve standardization. (#6226) - Requests relaxes header component requirements to support bytes/str subclasses. (#6356) @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.46 2023/01/13 09:01:02 adam Exp $ d3 3 a5 3 BLAKE2s (requests-2.29.0.tar.gz) = d958002d6d132a52df94e8290d25cd3c861a3abc368df65d19c752649a35c766 SHA512 (requests-2.29.0.tar.gz) = 22c7c9e6ae44abe60cf7cc2108d42d9a0952ae317936995f379155d24013c24a2c654469a781a61b2ae6488429e337d31b565a91f1266eb1c038a4c8a9069642 Size (requests-2.29.0.tar.gz) = 108279 bytes @ 1.46 log @py-requests: updated to 2.28.2 2.28.2 (2023-01-12) ------------------- **Dependencies** - Requests now supports charset\_normalizer 3.x. **Bugfixes** - Updated MissingSchema exception to suggest https scheme rather than http. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.45 2022/11/25 10:46:37 adam Exp $ d3 3 a5 3 BLAKE2s (requests-2.28.2.tar.gz) = 2ae9e585a00b9d56b046fba48212aa25a928185e7fde2b5ef7f1955702919937 SHA512 (requests-2.28.2.tar.gz) = 3c4ba19a2bb6ba38a4118cf246db3855401869d54ee7ebd9bee40b435420381fb737d4c69768f2bd97914a30d66233c7058cec51aa629af0dff3b04e6f997a3d Size (requests-2.28.2.tar.gz) = 108206 bytes @ 1.45 log @py-requests: allow newer charset_normalizer @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.44 2022/07/10 20:09:56 wiz Exp $ d3 4 a6 4 BLAKE2s (requests-2.28.1.tar.gz) = 15383c6cce96f85d3c00f95ac18718cccfc4d6d8e818ab0c89d2632ad8efacab SHA512 (requests-2.28.1.tar.gz) = c123ec07171c2c7c34e4173b97750adfa313b4312d91c0d58e4eb8750361604017e5b370c23ec886d2cbf704f9074ec5ad0fa9c2cd8e6f9521532adafff39d41 Size (requests-2.28.1.tar.gz) = 109805 bytes SHA1 (patch-setup.py) = 285ebee3e89c46abe043661b5e4cdca3a23dfbd0 @ 1.44 log @py-requests: update to 2.28.1. Fixes PR 56915. 2.28.1 (2022-06-29) ------------------- **Improvements** - Speed optimization in `iter_content` with transition to `yield from`. (#6170) **Dependencies** - Added support for chardet 5.0.0 (#6179) - Added support for charset-normalizer 2.1.0 (#6169) 2.28.0 (2022-06-09) ------------------- **Deprecations** - ⚠️ Requests has officially dropped support for Python 2.7. ⚠️ (#6091) - Requests has officially dropped support for Python 3.6 (including pypy3.6). (#6091) **Improvements** - Wrap JSON parsing issues in Request's JSONDecodeError for payloads without an encoding to make `json()` API consistent. (#6097) - Parse header components consistently, raising an InvalidHeader error in all invalid cases. (#6154) - Added provisional 3.11 support with current beta build. (#6155) - Requests got a makeover and we decided to paint it black. (#6095) **Bugfixes** - Fixed bug where setting `CURL_CA_BUNDLE` to an empty string would disable cert verification. All Requests 2.x versions before 2.28.0 are affected. (#6074) - Fixed urllib3 exception leak, wrapping `urllib3.exceptions.SSLError` with `requests.exceptions.SSLError` for `content` and `iter_content`. (#6057) - Fixed issue where invalid Windows registry entires caused proxy resolution to raise an exception rather than ignoring the entry. (#6149) - Fixed issue where entire payload could be included in the error message for JSONDecodeError. (#6036) @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.43 2022/01/07 16:23:16 adam Exp $ d6 1 a6 1 SHA1 (patch-setup.py) = 644ec23fce2579cf26656ddb5518c788c3b6d61d @ 1.43 log @py-requests: updated to 2.27.1 2.27.1 (2022-01-05) ------------------- **Bugfixes** - Fixed parsing issue that resulted in the `auth` component being dropped from proxy URLs. 2.27.0 (2022-01-03) ------------------- **Improvements** - Officially added support for Python 3.10. - Added a `requests.exceptions.JSONDecodeError` to unify JSON exceptions between Python 2 and 3. This gets raised in the `response.json()` method, and is backwards compatible as it inherits from previously thrown exceptions. Can be caught from `requests.exceptions.RequestException` as well. - Improved error text for misnamed `InvalidSchema` and `MissingSchema` exceptions. This is a temporary fix until exceptions can be renamed (Schema->Scheme). - Improved proxy parsing for proxy URLs missing a scheme. This will address recent changes to `urlparse` in Python 3.9+. **Bugfixes** - Fixed defect in `extract_zipped_paths` which could result in an infinite loop for some paths. - Fixed handling for `AttributeError` when calculating length of files obtained by `Tarfile.extractfile()`. - Fixed urllib3 exception leak, wrapping `urllib3.exceptions.InvalidHeader` with `requests.exceptions.InvalidHeader`. - Fixed bug where two Host headers were sent for chunked requests. - Fixed regression in Requests 2.26.0 where `Proxy-Authorization` was incorrectly stripped from all requests sent with `Session.send`. - Fixed performance regression in 2.26.0 for hosts with a large number of proxies available in the environment. - Fixed idna exception leak, wrapping `UnicodeError` with `requests.exceptions.InvalidURL` for URLs with a leading dot (.) in the domain. **Deprecations** - Requests support for Python 2.7 and 3.6 will be ending in 2022. While we don't have exact dates, Requests 2.27.x is likely to be the last release series providing support. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.42 2021/10/26 10:19:01 nia Exp $ d3 4 a6 5 BLAKE2s (requests-2.27.1.tar.gz) = 4c64ba900706dfa6f21ec1780bb7169aed52804061cfe67f1bcd7cb01b92f4d5 SHA512 (requests-2.27.1.tar.gz) = e51916abea8125254c5ee72c97e84a73e6981cab09961486873387522d2ce041ee3fe8fa2ff0b9bbe6707eefdc05145e9adcf127bcd999dea127acdfabd5312f Size (requests-2.27.1.tar.gz) = 106758 bytes SHA1 (patch-requests_____init____.py) = 9915c51b02dd62f5c961ab388422d6f18a1dbedc SHA1 (patch-setup.py) = 1b6ba462a0c3d6079f7d0fc738ba8000b6e892b4 @ 1.42 log @archivers: Replace RMD160 checksums with BLAKE2s checksums All checksums have been double-checked against existing RMD160 and SHA512 hashes Could not be committed due to merge conflict: devel/py-traitlets/distinfo The following distfiles were unfetchable (note: some may be only fetched conditionally): ./devel/pvs/distinfo pvs-3.2-solaris.tgz ./devel/eclipse/distinfo eclipse-sourceBuild-srcIncluded-3.0.1.zip @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.41 2021/10/07 13:43:41 nia Exp $ d3 3 a5 3 BLAKE2s (requests-2.26.0.tar.gz) = 4e39df8cad0997077e9395e85b88bcbd22c6482600592e727f328ca7a092d436 SHA512 (requests-2.26.0.tar.gz) = c3397d77f0d2f1afb05661c4b98adad6c1ddaf360906254150b33ab0d9479fd306905bd6d61b8cf8becd9a40bdcf9b03542e8267c644ef19f03f44bfca0bc461 Size (requests-2.26.0.tar.gz) = 104433 bytes @ 1.41 log @devel: Remove SHA1 hashes for distfiles @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.40 2021/07/30 04:19:22 adam Exp $ d3 1 a3 1 RMD160 (requests-2.26.0.tar.gz) = 0b532167e01570e015b9abd52bb7d442d93a50bd @ 1.40 log @py-requests: updated to 2.26.0 2.26.0 (2021-07-13) ------------------- **Improvements** - Requests now supports Brotli compression, if either the `brotli` or `brotlicffi` package is installed. - `Session.send` now correctly resolves proxy configurations from both the Session and Request. Behavior now matches `Session.request`. **Bugfixes** - Fixed a race condition in zip extraction when using Requests in parallel from zip archive. **Dependencies** - Instead of `chardet`, use the MIT-licensed `charset_normalizer` for Python3 to remove license ambiguity for projects bundling requests. If `chardet` is already installed on your machine it will be used instead of `charset_normalizer` to keep backwards compatibility. You can also install `chardet` while installing requests by specifying `[use_chardet_on_py3]` extra as follows: ```shell pip install "requests[use_chardet_on_py3]" ``` Python2 still depends upon the `chardet` module. - Requests now supports `idna` 3.x on Python 3. `idna` 2.x will continue to be used on Python 2 installations. **Deprecations** - The `requests[security]` extra has been converted to a no-op install. PyOpenSSL is no longer the recommended secure option for Requests. - Requests has officially dropped support for Python 3.5. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.39 2020/12/18 08:22:39 adam Exp $ a2 1 SHA1 (requests-2.26.0.tar.gz) = 8c7a89d183d3e9b70bf91ba5b75eccf7111b9d8d @ 1.39 log @py-requests: updated to 2.25.1 2.25.1 (2020-12-16) ------------------- **Bugfixes** - Requests now treats `application/json` as `utf8` by default. Resolving inconsistencies between `r.text` and `r.json` output. **Dependencies** - Requests now supports chardet v4.x. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.38 2020/11/12 10:29:43 adam Exp $ d3 4 a6 4 SHA1 (requests-2.25.1.tar.gz) = c447ce806a07c6ba3489afc72345e28ab4640aaa RMD160 (requests-2.25.1.tar.gz) = 4a8a60da9b3619a53bd5a74245e58123702ae7e6 SHA512 (requests-2.25.1.tar.gz) = ca6b0a257b448a999cade0ae173c29cddc9cfffb319d16fc3d051d3e1cd77161536e3cab279b3cba59c60d29d7864a9281c1fa1f689ce48d3bce2ca9f1cd8d45 Size (requests-2.25.1.tar.gz) = 102161 bytes @ 1.38 log @py-requests: updated to 2.25.0 2.25.0 Improvements Added support for NETRC environment variable. Dependencies Requests now supports urllib3 v1.26. Deprecations Requests v2.25.x will be the last release series with support for Python 3.5. The requests[security] extra is officially deprecated and will be removed in Requests v2.26.0. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.37 2020/06/19 20:45:41 adam Exp $ d3 5 a7 5 SHA1 (requests-2.25.0.tar.gz) = 189fc6b728eec219b5e204d4edfd1d0e4dd4413a RMD160 (requests-2.25.0.tar.gz) = 30e19772064665ce08cbf12e037c20f514038e81 SHA512 (requests-2.25.0.tar.gz) = dd13ccb6bcd95bdd31a414dba67e5a0914ff172ae6f5d255849837e8e2a7e404e3c02fc3d07e5ff6dc81c12d0fe56c3b83bc62bc377dd3f504b00b97b144db74 Size (requests-2.25.0.tar.gz) = 101897 bytes SHA1 (patch-requests_____init____.py) = 4cffde1f6ca063cd7db4e3ccbfbbaee8e5012d85 @ 1.37 log @py-requests: updated to 2.24.0 2.24.0: Improvements pyOpenSSL TLS implementation is now only used if Python either doesn’t have an ssl module or doesn’t support SNI. Previously pyOpenSSL was unconditionally used if available. This applies even if pyOpenSSL is installed via the requests[security] extra Redirect resolution should now only occur when allow_redirects is True. No longer perform unnecessary Content-Length calculation for requests that won’t use it. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.36 2020/02/21 06:42:59 adam Exp $ d3 5 a7 5 SHA1 (requests-2.24.0.tar.gz) = 9144742bf54db5f2a74a3e724cec3c19431b3539 RMD160 (requests-2.24.0.tar.gz) = 48f76a63e9f1e11ed97d0f51807692bd8b5a714e SHA512 (requests-2.24.0.tar.gz) = 46ca8ab70eb39be8398c242404b9b3ffb6baddd5c78eaad125b55c719154eb8c7b6a737a8dc587b0cb51b3b9a074abaa8b2ff347a64d38f4f90cdba4db16a119 Size (requests-2.24.0.tar.gz) = 115071 bytes SHA1 (patch-requests_____init____.py) = e71da60ea3a047a4f8bc0dbbc43bd4bec2300cfb @ 1.36 log @py-requests: updated to 2.23.0 2.23.0: **Improvements** - Remove defunct reference to `prefetch` in Session `__attrs__` **Bugfixes** - Requests no longer outputs password in basic auth usage warning. **Dependencies** - Pinning for `chardet` and `idna` now uses major version instead of minor. This hopefully reduces the need for releases everytime a dependency is updated. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.35 2019/05/17 08:34:38 adam Exp $ d3 5 a7 5 SHA1 (requests-2.23.0.tar.gz) = ab724cae3ce1f5175d34598c14e010f770eeac4c RMD160 (requests-2.23.0.tar.gz) = 676d94a3b4ee6b20af19bf09481aded34a89b046 SHA512 (requests-2.23.0.tar.gz) = a0f7db5cc9ce67af9f6f81b72e41491735a102f2a1da2fbde98e279846e2140cd26b6370aa5ec79c148c397885a7ae2bbce45c4587215f510dd02b8ac57cb46e Size (requests-2.23.0.tar.gz) = 114327 bytes SHA1 (patch-requests_____init____.py) = 39ce838223ca91c36a7a5310b76b70aa7a154c99 @ 1.35 log @py-requests: updated to 2.22.0 2.22.0: **Dependencies** - Requests now supports urllib3 v1.25.2. (note: 1.25.0 and 1.25.1 are incompatible) **Deprecations** - Requests has officially stopped support for Python 3.4. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.34 2018/12/11 09:11:08 adam Exp $ d3 4 a6 4 SHA1 (requests-2.22.0.tar.gz) = c22ed0a553f8dc37e5c2a965048d81a5ccfaff95 RMD160 (requests-2.22.0.tar.gz) = 8039fb2854217e3da83a52c12b0d449ca5ca79e0 SHA512 (requests-2.22.0.tar.gz) = 8b8e9da8a0c816fb4ff39be89ac7e1a9d5a99503ed93e44a0d78b28818f1c0eb253b151972a144151a616ba1b4bc5595245458a8268c5161391db54f740ac9a5 Size (requests-2.22.0.tar.gz) = 113406 bytes d8 1 a8 1 SHA1 (patch-setup.py) = 55be105d4a7b47c17e7daea42177e0053567a4eb @ 1.34 log @py-requests: updated to 2.21.0 2.21.0: **Dependencies** - Requests now supports idna v2.8. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.33 2018/11/09 10:44:15 adam Exp $ d3 6 a8 6 SHA1 (requests-2.21.0.tar.gz) = 970805c2affcc5b237d86e7308dc4310f16d6f79 RMD160 (requests-2.21.0.tar.gz) = 86a4ee77a27b1ff7d8621e676c52c6be06cde866 SHA512 (requests-2.21.0.tar.gz) = 385e1d80993a21c09e7c4682500ca8c24155962ba41ecd8e73612722b2ff6618b736e827fc48ad1683b0d2bc7a420cfe680f5107860aca52656ef777f1d60104 Size (requests-2.21.0.tar.gz) = 111528 bytes SHA1 (patch-requests_____init____.py) = e704f86809821831071301748bb13e5b1d0e971b SHA1 (patch-setup.py) = fa5d4567d7cbb03f276257d8324efcb064479e08 @ 1.33 log @py-requests: updated to 2.20.1 2.20.1: Bugfixes - Fixed bug with unintended Authorization header stripping for redirects using default ports (http/80, https/443). @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.32 2018/10/22 07:55:36 adam Exp $ d3 4 a6 4 SHA1 (requests-2.20.1.tar.gz) = 7968ac9db7a8e9d809ed88139e990a62c81dae6b RMD160 (requests-2.20.1.tar.gz) = b94b73807f28c23754ca8ee1ec7b18f42fbdbfea SHA512 (requests-2.20.1.tar.gz) = 631969fab07e6674afc8cc9707a2e18ea394c09cdef031894fd0b28cf94e20f4f24434901edf3233b84ce7be199cc8325b9fe975d9003334206bb4a85ca278ae Size (requests-2.20.1.tar.gz) = 111475 bytes d8 1 a8 1 SHA1 (patch-setup.py) = fa562634ceb651882f8f03756659c64b8e4734b1 @ 1.32 log @py-requests: updated to 2.20.0 2.20.0: Bugfixes Content-Type header parsing is now case-insensitive (e.g. charset=utf8 v Charset=utf8). Fixed exception leak where certain redirect urls would raise uncaught urllib3 exceptions. Requests removes Authorization header from requests redirected from https to http on the same hostname. (CVE-2018-18074) should_bypass_proxies now handles URIs without hostnames (e.g. files). Dependencies Requests now supports urllib3 v1.24. Deprecations Requests has officially stopped support for Python 2.6. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.31 2018/06/16 13:08:32 adam Exp $ d3 4 a6 4 SHA1 (requests-2.20.0.tar.gz) = 814a0954406fa7826f5a237865c8705d7e01edea RMD160 (requests-2.20.0.tar.gz) = c1aa0e3e8daaaa9cd6ad717470b84d10d88fba2e SHA512 (requests-2.20.0.tar.gz) = d9d44ed56f868484e36686dee7a2507d8fef45f9cbd861971bb2b6956c7aecb20988f4830017f111027b5eebd00541805797820b0a455694fdbd1b5dce8907d2 Size (requests-2.20.0.tar.gz) = 111179 bytes @ 1.31 log @py-requests: updated to 2.19.1 2.19.1: Bugfixes - Fixed issue where status_codes.py's init function failed trying to append to a __doc__ value of None. 2.19.0: Improvements - Warn user about possible slowdown when using cryptography version < 1.3.4 - Check for invalid host in proxy URL, before forwarding request to adapter. - Fragments are now properly maintained across redirects. (RFC7231 7.1.2) - Removed use of cgi module to expedite library load time. - Added support for SHA-256 and SHA-512 digest auth algorithms. - Minor performance improvement to Request.content. - Migrate to using collections.abc for 3.7 compatibility. Bugfixes - Parsing empty Link headers with parse_header_links() no longer return one bogus entry. - Fixed issue where loading the default certificate bundle from a zip archive would raise an IOError. - Fixed issue with unexpected ImportError on windows system which do not support winreg module. - DNS resolution in proxy bypass no longer includes the username and password in the request. This also fixes the issue of DNS queries failing on macOS. - Properly normalize adapter prefixes for url comparison. - Passing None as a file pointer to the files param no longer raises an exception. - Calling copy on a RequestsCookieJar will now preserve the cookie policy correctly. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.30 2017/08/16 07:17:58 adam Exp $ d3 6 a8 6 SHA1 (requests-2.19.1.tar.gz) = b6e6ed992c86835aa1a7d7a81fec2aee0d385416 RMD160 (requests-2.19.1.tar.gz) = c61074e9faf32196083c6124c5db5235e7fe6b91 SHA512 (requests-2.19.1.tar.gz) = deef2662227497b472f6e7eb7f0ee468c772069fc66552f71d80e5a12af62a187f8bc6a8a78531915e824c7f277d0db61c1534c89d13d473f68504f0bd6edf47 Size (requests-2.19.1.tar.gz) = 131068 bytes SHA1 (patch-requests_____init____.py) = ffef725d0d3b1f009e76e252c70260ae74bd1ed7 SHA1 (patch-setup.py) = fb8c36a7b2508d521388b5ff24626b04b2eca118 @ 1.30 log @2.18.4: Improvements * Error messages for invalid headers now include the header name for easier debugging Dependencies * We now support idna v2.6. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.29 2017/08/04 05:02:34 adam Exp $ d3 6 a8 6 SHA1 (requests-2.18.4.tar.gz) = f5e1dbba5a12ff2df063333fd2bf071e24659b63 RMD160 (requests-2.18.4.tar.gz) = 8217810eff11d3364445efb9f723772adeb80e48 SHA512 (requests-2.18.4.tar.gz) = 5c59bed82ac1094194f04a973b299f7d783264d372abd7a5229295bccc6b2f7a9f082ee4b0dff348e9c22cf68ddbd7cb67f60fd0b7d9eda41c02e40d075e9472 Size (requests-2.18.4.tar.gz) = 126224 bytes SHA1 (patch-requests_____init____.py) = 733037737da7f012030e89091d1b3ca28c3d7657 SHA1 (patch-setup.py) = 855002a41e0eee403e1938b714145cb0598b30c1 @ 1.29 log @2.18.3: Improvements * Running $ python -m requests.help now includes the installed version of idna. Bugfixes * Fixed issue where Requests would raise ConnectionError instead of SSLError when encountering SSL problems when using urllib3 v1.22. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.28 2017/07/26 16:43:39 adam Exp $ d3 4 a6 4 SHA1 (requests-2.18.3.tar.gz) = 877777f790b9e18a5d808ea3906da72aef1830fd RMD160 (requests-2.18.3.tar.gz) = e96d97f68e4213a9a6a98bcd220734e6ef22f8df SHA512 (requests-2.18.3.tar.gz) = d4d60b9a3f1bcc97d2d1fabb3ef5df2c64c2bae3e319c3f9f0b5f9e0c56677d88684b4902b31b6fa03c04b0b6912d763ffa493833c708958171d10bb15ac86a0 Size (requests-2.18.3.tar.gz) = 126008 bytes d8 1 a8 1 SHA1 (patch-setup.py) = ad02dbeb917eb754be1f0cd28d5c25411717f474 @ 1.28 log @2.18.2: Bugfixes * requests.help no longer fails on Python 2.6 due to the absence of ssl.OPENSSL_VERSION_NUMBER. Dependencies * We now support urllib3 v1.22. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.27 2017/07/22 19:25:38 wiz Exp $ d3 4 a6 4 SHA1 (requests-2.18.2.tar.gz) = 90f90fdebadcaf654297a7f05e20553152bcd491 RMD160 (requests-2.18.2.tar.gz) = 1e5babe76795251b374e8fa62ebce5e45b3f8b50 SHA512 (requests-2.18.2.tar.gz) = b78660e5370f9acc458159edda385fbcbbb33b0703fa2c83400f3c08fe05253f357175e2ad76c5bff4bd942ab18da5df344473e9b5a924d7457596c0ff9bfbc6 Size (requests-2.18.2.tar.gz) = 125381 bytes @ 1.27 log @Fix previous: allow newer versions of some dependencies. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.26 2017/07/22 09:41:05 adam Exp $ d3 4 a6 4 SHA1 (requests-2.18.1.tar.gz) = 8927e5bf2feb7fa43844e4972e48f9a384f7029d RMD160 (requests-2.18.1.tar.gz) = fc6cfa5b4918efabee6c95dd5326d46f01942012 SHA512 (requests-2.18.1.tar.gz) = d7482ddce36ce633bee830bc8d9f9a207e1c20595378f7c60dcef01cab016a16704965f3b52e3faac63dd50fbe7c61d575742e71f51a2b8d41c1922df2dbaa06 Size (requests-2.18.1.tar.gz) = 124229 bytes d8 1 a8 1 SHA1 (patch-setup.py) = 636c72dafa62e20973448bc79b23a335d31ffa66 @ 1.26 log @Loosen requires (needed for mail/notmuch). @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.25 2017/06/15 05:59:47 adam Exp $ a6 1 SHA1 (patch-requests.egg-info_requires.txt) = 8413bcf70ae79356aab88fe8046612146afed931 d8 1 a8 1 SHA1 (patch-setup.py) = 767a3713ba3f836b9294fca15046854823f3fd02 @ 1.25 log @2.18.1: Bugfixes * Fix an error in the packaging whereby the *.whl contained incorrect data that regressed the fix in v2.17.3. 2.18.0: Improvements * Response is now a context manager, so can be used directly in a with statement without first having to be wrapped by contextlib.closing(). Bugfixes * Resolve installation failure if multiprocessing is not available * Resolve tests crash if multiprocessing is not able to determine the number of CPU cores * Resolve error swallowing in utils set_environ generator @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.24 2017/05/31 06:30:25 adam Exp $ d7 1 @ 1.24 log @2.17.2 (2017-05-29) **Improvements** - Improved ``packages`` namespace identity support, for monkeypatching libraries. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.23 2017/05/29 10:43:42 adam Exp $ d3 4 a6 4 SHA1 (requests-2.17.3.tar.gz) = 8c7cf5140c9cd138be20ce0848972c2df876c559 RMD160 (requests-2.17.3.tar.gz) = 4f3d879f6d74e315e219034588a355dc3775a066 SHA512 (requests-2.17.3.tar.gz) = e1dc999aa397a6784ce657038ab9b2e8f92d8531bcf717794a2291ec6e82ec7ae6a5c26823874bb246dfcc3aeb6e83c4137bc2132facfd56aba55c4e261933cf Size (requests-2.17.3.tar.gz) = 123148 bytes @ 1.23 log @2.16.5 (2017-05-28) - Improvements to ``$ python -m requests.help``. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.22 2017/05/10 17:42:09 adam Exp $ d3 4 a6 4 SHA1 (requests-2.16.5.tar.gz) = 40b28f6da8a88d0e0f8dbc40d2d9b0364c11b349 RMD160 (requests-2.16.5.tar.gz) = 7e317d5908c7120a4067ff217708dc9805364fb0 SHA512 (requests-2.16.5.tar.gz) = 9452103590a5f007dd98889ed0aa57517fb3eda11c860652ad17fd00ee605a976c857249593a1eb71736de832ae8907076b834f188a9aac8ba91a39ba6d3db10 Size (requests-2.16.5.tar.gz) = 122929 bytes @ 1.22 log @Changes 2.14.2: **Bugfixes** - Changed a less-than to an equal-to and an or in the dependency markers to widen compatibility with older setuptools releases. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.21 2017/05/10 03:41:20 adam Exp $ d3 6 a8 5 SHA1 (requests-2.14.2.tar.gz) = f9adf013d4a206c470dde1284c6bb9810f9b8656 RMD160 (requests-2.14.2.tar.gz) = ed89f30bdd84cb457330efb6b7ca9c670b02a3b0 SHA512 (requests-2.14.2.tar.gz) = f6531ada6d854a261cad874044daa9e7f79d55c8f8fcfec1b25862563127318fbf717ed640644ddf0dbe4d7fe1298d478fcd76825a3604e06cefae5990fa9dd4 Size (requests-2.14.2.tar.gz) = 521027 bytes SHA1 (patch-requests_____init____.py) = 4630c41f4048acbce30f9f4825c8724346256865 @ 1.21 log @Changes 2.14.1: **Bugfixes** - Changed the dependency markers to widen compatibility with older pip releases. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.20 2017/05/09 17:08:39 adam Exp $ d3 4 a6 4 SHA1 (requests-2.14.1.tar.gz) = fae1ae312256776439448337b68fcde2c8741a52 RMD160 (requests-2.14.1.tar.gz) = d0e250e942c47dbd12c734ec3a2e74b81eb43e0e SHA512 (requests-2.14.1.tar.gz) = f9056b3cc619c49d0ad9f813d35b17bcb9b07b4ee44aca6fac7a688aaccf82775efa5ee79486a4e31e94891826c5d3bd13d80915fc489b67b70a199455ed588b Size (requests-2.14.1.tar.gz) = 520890 bytes @ 1.20 log @Changes 2.14.0: **Improvements** - It is now possible to pass ``no_proxy`` as a key to the ``proxies`` dictionary to provide handling similar to the ``NO_PROXY`` environment variable. - When users provide invalid paths to certificate bundle files or directories Requests now raises ``IOError``, rather than failing at the time of the HTTPS request with a fairly inscrutable certificate validation error. - The behavior of ``SessionRedirectMixin`` was slightly altered. ``resolve_redirects`` will now detect a redirect by calling ``get_redirect_target(response)`` instead of directly querying ``Response.is_redirect`` and ``Response.headers['location']``. Advanced users will be able to process malformed redirects more easily. - Changed the internal calculation of elapsed request time to have higher resolution on Windows. - Added ``win_inet_pton`` as conditional dependency for the ``[socks]`` extra on Windows with Python 2.7. - Changed the proxy bypass implementation on Windows: the proxy bypass check doesn't use forward and reverse DNS requests anymore - URLs with schemes that begin with ``http`` but are not ``http`` or ``https`` no longer have their host parts forced to lowercase. **Bugfixes** - Much improved handling of non-ASCII ``Location`` header values in redirects. Fewer ``UnicodeDecodeError``s are encountered on Python 2, and Python 3 now correctly understands that Latin-1 is unlikely to be the correct encoding. - If an attempt to ``seek`` file to find out its length fails, we now appropriately handle that by aborting our content-length calculations. - Restricted ``HTTPDigestAuth`` to only respond to auth challenges made on 4XX responses, rather than to all auth challenges. - Fixed some code that was firing ``DeprecationWarning`` on Python 3.6. - The dismayed person emoticon (``/o\\``) no longer has a big head. I'm sure this is what you were all worrying about most. **Miscellaneous** - Updated bundled urllib3 to v1.21.1. - Updated bundled chardet to v3.0.2. - Updated bundled idna to v2.5. - Updated bundled certifi to 2017.4.17. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.19 2017/04/04 12:42:23 adam Exp $ d3 4 a6 4 SHA1 (requests-2.14.0.tar.gz) = 160b8b30d84c939f58d1d12e88a9506dccae2b31 RMD160 (requests-2.14.0.tar.gz) = cc1989f0af4f8eb64fb1bc6e9ec8a42bba6ccbd7 SHA512 (requests-2.14.0.tar.gz) = 2769f23b0c12eb92fe6cc939f8c0626ae2b84a9426fc89dff3c2f5991a30bc0f918359984e637d9d93fe8b00b9985cd8c50dea601d76d5752884bf0222781bd2 Size (requests-2.14.0.tar.gz) = 520782 bytes @ 1.19 log @Changes 2.13.0: Features * Only load the idna library when we’ve determined we need it. This will save some memory for users. Miscellaneous * Updated bundled urllib3 to 1.20. * Updated bundled idna to 2.2. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.18 2017/01/01 08:21:49 ryoon Exp $ d3 4 a6 4 SHA1 (requests-2.13.0.tar.gz) = 827f7c8abb5a57d980d9870908724613b8b120c1 RMD160 (requests-2.13.0.tar.gz) = 72ba4e042f98baaa7e7a9c257c484bbe2815160e SHA512 (requests-2.13.0.tar.gz) = d3e9c25d1ce7ecf51bd4b137645d06c07170542a78fc847b1c30cad6efa9bcbf36d4b0c809389cbf260dc7d73128ab6bbed1e197cba9497b6ad791b48014ae14 Size (requests-2.13.0.tar.gz) = 557508 bytes @ 1.18 log @Fix py-certbot segfault on NetBSD with ugly workaround, bump PKGREVISION @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.17 2016/12/15 11:06:08 adam Exp $ d3 4 a6 4 SHA1 (requests-2.12.4.tar.gz) = dfbb6fb38b92d2ac5a982c660df9727536dab70c RMD160 (requests-2.12.4.tar.gz) = 02bb718622f69bbfcc0eeba2a6ea28eb142cc06b SHA512 (requests-2.12.4.tar.gz) = 100a38ad4bfe5c02c44ccfa75473da4b58416690985117750a0c2e1851e98267df740f578f6a5ad27d0a5b9de2954988f832ea1a169fffc82e8e2da15742f855 Size (requests-2.12.4.tar.gz) = 547650 bytes @ 1.17 log @Changes 2.12.4 (2016-12-14) **Bugfixes** - Fixed regression from 2.12.2 where non-string types were rejected in the basic auth parameters. While support for this behaviour has been readded, the behaviour is deprecated and will be removed in the future. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.16 2016/11/11 09:27:21 fhajny Exp $ d7 1 @ 1.16 log @Update devel/py-requests to 2.11.1. 2.11.1 Bugfixes - Fixed a bug when using ``iter_content`` with ``decode_unicode=True`` for streamed bodies would raise ``AttributeError``. This bug was introduced in 2.11. - Strip Content-Type and Transfer-Encoding headers from the header block when following a redirect that transforms the verb from POST/PUT to GET. 2.11.0 Improvements - Added support for the ``ALL_PROXY`` environment variable. - Reject header values that contain leading whitespace or newline characters to reduce risk of header smuggling. Bugfixes - Fixed occasional ``TypeError`` when attempting to decode a JSON response that occurred in an error case. Now correctly returns a ``ValueError``. - Requests would incorrectly ignore a non-CIDR IP address in the ``NO_PROXY`` environment variables: Requests now treats it as a specific IP. - Fixed a bug when sending JSON data that could cause us to encounter obscure OpenSSL errors in certain network conditions (yes, really). - Added type checks to ensure that ``iter_content`` only accepts integers and ``None`` for chunk sizes. - Fixed issue where responses whose body had not been fully consumed would have the underlying connection closed but not returned to the connection pool, which could cause Requests to hang in situations where the ``HTTPAdapter`` had been configured to use a blocking connection pool. Miscellaneous - Updated bundled urllib3 to 1.16. - Some previous releases accidentally accepted non-strings as acceptable header values. This release does not. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.15 2016/05/05 11:47:45 wiz Exp $ d3 4 a6 4 SHA1 (requests-2.11.1.tar.gz) = 7083e52275a9bcc02757e8b53c0be07cb73149a1 RMD160 (requests-2.11.1.tar.gz) = 0a396b2723b649d3ecf2a01d7b8a2ec57eef07d0 SHA512 (requests-2.11.1.tar.gz) = 135cbab1e279ebf314bffca01bc4d9f9e71963c67069e330e78fbe06c4294031d1d616bc5d5e104161c8696b408887053bdd65351f85e9ff34646368c88852e5 Size (requests-2.11.1.tar.gz) = 485936 bytes @ 1.15 log @Updated py-requests to 2.10.0. 2.10.0 (04-29-2016) +++++++++++++++++++ **New Features** - SOCKS Proxy Support! (requires PySocks; $ pip install requests[socks]) **Miscellaneous** - Updated bundled urllib3 to 1.15.1. 2.9.2 (04-29-2016) ++++++++++++++++++ **Improvements** - Change built-in CaseInsensitiveDict (used for headers) to use OrderedDict as its underlying datastore. **Bugfixes** - Don't use redirect_cache if allow_redirects=False - When passed objects that throw exceptions from ``tell()``, send them via chunked transfer encoding instead of failing. - Raise a ProxyError for proxy related connection issues. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.14 2016/01/02 10:49:49 wiz Exp $ d3 4 a6 4 SHA1 (requests-2.10.0.tar.gz) = 1b9a2395402692262fc61fa15bedbc3e112b1029 RMD160 (requests-2.10.0.tar.gz) = 60d1a1fbe79798ef86407a194289c8e483f0f97e SHA512 (requests-2.10.0.tar.gz) = 05c6a1a742d31511ca4d3f39534e3e081cce0864c3a8a08480a95fb6e28f0309a4b1a571b8c3987bac98ba177e9bc06862f219c53a1805c163d10d24c1328b46 Size (requests-2.10.0.tar.gz) = 477617 bytes @ 1.14 log @Update py-requests to 2.9.1. 2.9.1 (2015-12-21) Bugfixes * Resolve regression introduced in 2.9.0 that made it impossible to send binary strings as bodies in Python 3. * Fixed errors when calculating cookie expiration dates in certain locales. Miscellaneous * Updated bundled urllib3 to 1.13.1. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.13 2015/12/27 23:38:46 wiz Exp $ d3 4 a6 4 SHA1 (requests-2.9.1.tar.gz) = 17f01c47a0d7c676f6291608ef2f43db3fa74095 RMD160 (requests-2.9.1.tar.gz) = d1be9cc088b10dea06cee4b26030f795df7d230b SHA512 (requests-2.9.1.tar.gz) = 0b2b64b2ebb68703f2a222a3e5d0227cf15250319195a13497e38959c64b82359b70221157eab2ab828dfc79bcfec13ede4d6272f0202ae1b22ae79d5810adb9 Size (requests-2.9.1.tar.gz) = 484252 bytes @ 1.13 log @Update to 2.9.0: 2.9.0 (2015-12-15) ++++++++++++++++++ **Minor Improvements** (Backwards compatible) - The ``verify`` keyword argument now supports being passed a path to a directory of CA certificates, not just a single-file bundle. - Warnings are now emitted when sending files opened in text mode. - Added the 511 Network Authentication Required status code to the status code registry. **Bugfixes** - For file-like objects that are not seeked to the very beginning, we now send the content length for the number of bytes we will actually read, rather than the total size of the file, allowing partial file uploads. - When uploading file-like objects, if they are empty or have no obvious content length we set ``Transfer-Encoding: chunked`` rather than ``Content-Length: 0``. - We correctly receive the response in buffered mode when uploading chunked bodies. - We now handle being passed a query string as a bytestring on Python 3, by decoding it as UTF-8. - Sessions are now closed in all cases (exceptional and not) when using the functional API rather than leaking and waiting for the garbage collector to clean them up. - Correctly handle digest auth headers with a malformed ``qop`` directive that contains no token, by treating it the same as if no ``qop`` directive was provided at all. - Minor performance improvements when removing specific cookies by name. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.12 2015/11/06 21:42:14 wiz Exp $ d3 4 a6 4 SHA1 (requests-2.9.0.tar.gz) = 5da11303dcb6eca601c79cf8c90345cd997d66c0 RMD160 (requests-2.9.0.tar.gz) = d0cdbe1c2b35d071a84ee3b6eac54f6dd27c3171 SHA512 (requests-2.9.0.tar.gz) = 8df3dd0a803f44eea269275e247f823c0d676b04ee44c719135e3661c6d951a0d94fac305766b99e10ba09f5f602e3f57883b0ae764aa7fce8bd1d92e86be85e Size (requests-2.9.0.tar.gz) = 483589 bytes @ 1.12 log @Update py-requests to 2.8.1. 2.8.1 (2015-10-13) ++++++++++++++++++ **Bugfixes** - Update certificate bundle to match ``certifi`` 2015.9.6.2's weak certificate bundle. - Fix a bug in 2.8.0 where requests would raise ``ConnectTimeout`` instead of ``ConnectionError`` - When using the PreparedRequest flow, requests will now correctly respect the ``json`` parameter. Broken in 2.8.0. - When using the PreparedRequest flow, requests will now correctly handle a Unicode-string method name on Python 2. Broken in 2.8.0. 2.8.0 (2015-10-05) ++++++++++++++++++ **Minor Improvements** (Backwards Compatible) - Requests now supports per-host proxies. This allows the ``proxies`` dictionary to have entries of the form ``{'://': ''}``. Host-specific proxies will be used in preference to the previously-supported scheme-specific ones, but the previous syntax will continue to work. - ``Response.raise_for_status`` now prints the URL that failed as part of the exception message. - ``requests.utils.get_netrc_auth`` now takes an ``raise_errors`` kwarg, defaulting to ``False``. When ``True``, errors parsing ``.netrc`` files cause exceptions to be thrown. - Change to bundled projects import logic to make it easier to unbundle requests downstream. - Changed the default User-Agent string to avoid leaking data on Linux: now contains only the requests version. **Bugfixes** - The ``json`` parameter to ``post()`` and friends will now only be used if neither ``data`` nor ``files`` are present, consistent with the documentation. - We now ignore empty fields in the ``NO_PROXY`` enviroment variable. - Fixed problem where ``httplib.BadStatusLine`` would get raised if combining ``stream=True`` with ``contextlib.closing``. - Prevented bugs where we would attempt to return the same connection back to the connection pool twice when sending a Chunked body. - Miscellaneous minor internal changes. - Digest Auth support is now thread safe. **Updates** - Updated urllib3 to 1.12. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.11 2015/11/03 03:29:15 agc Exp $ d3 4 a6 4 SHA1 (requests-2.8.1.tar.gz) = 8488f2544b2f72ae5a366ca9973707868bdc3c74 RMD160 (requests-2.8.1.tar.gz) = c09c161591b23ab479d36d6da227ea9746d2a123 SHA512 (requests-2.8.1.tar.gz) = bccec89165596df3af3f46eb43b5b28b595752485b00ed73978ef76fa6b8a8961c3db046c3f91ff34fa390f037322f6e13b141ba9b600a836a6d798086bd13fb Size (requests-2.8.1.tar.gz) = 480803 bytes @ 1.11 log @Add SHA512 digests for distfiles for devel category Issues found with existing distfiles: distfiles/eclipse-sourceBuild-srcIncluded-3.0.1.zip distfiles/fortran-utils-1.1.tar.gz distfiles/ivykis-0.39.tar.gz distfiles/enum-1.11.tar.gz distfiles/pvs-3.2-libraries.tgz distfiles/pvs-3.2-linux.tgz distfiles/pvs-3.2-solaris.tgz distfiles/pvs-3.2-system.tgz No changes made to these distinfo files. Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.10 2015/08/12 18:31:16 gls Exp $ d3 4 a6 4 SHA1 (requests-2.7.0.tar.gz) = 6db8805632521a13789161bccb14f761672ec46f RMD160 (requests-2.7.0.tar.gz) = a2781a75e670226f5e8133def82bca2731e7357f SHA512 (requests-2.7.0.tar.gz) = a93223c3fd21c58f7c0c901b17be17c23dba4efeed8c4347da9d4e04d96a6698e08e01482205661cb7757cc7560d9ae2e62b18f2b422af0cb90fd998fe963ff2 Size (requests-2.7.0.tar.gz) = 451723 bytes @ 1.10 log @Updated py-requests to 2.7.0 Upstream changes: ================= 2.7.0 (2015-05-03) This is the first release that follows our new release process. For more, see our documentation. Bugfixes Updated urllib3 to 1.10.4, resolving several bugs involving chunked transfer encoding and response framing. 2.6.2 (2015-04-23) Bugfixes Fix regression where compressed data that was sent as chunked data was not properly decompressed. (#2561) 2.6.1 (2015-04-22) Bugfixes Remove VendorAlias import machinery introduced in v2.5.2. Simplify the PreparedRequest.prepare API: We no longer require the user to pass an empty list to the hooks keyword argument. (c.f. #2552) Resolve redirects now receives and forwards all of the original arguments to the adapter. (#2503) Handle UnicodeDecodeErrors when trying to deal with a unicode URL that cannot be encoded in ASCII. (#2540) Populate the parsed path of the URI field when performing Digest Authentication. (#2426) Copy a PreparedRequest's CookieJar more reliably when it is not an instance of RequestsCookieJar. (#2527) @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.9 2015/03/16 13:58:37 wiz Exp $ d5 1 @ 1.9 log @Update to 2.6.0 for a security issue. 2.6.0 (2015-03-14) ++++++++++++++++++ **Bugfixes** - Fix handling of cookies on redirect. Previously a cookie without a host value set would use the hostname for the redirected URL exposing requests users to session fixation attacks and potentially cookie stealing. This was disclosed privately by Matthew Daley of `BugFuzz `_. An CVE identifier has not yet been assigned for this. This affects all versions of requests from v2.1.0 to v2.5.3 (inclusive on both ends). - Fix error when requests is an ``install_requires`` dependency and ``python setup.py test`` is run. (#2462) - Fix error when urllib3 is unbundled and requests continues to use the vendored import location. - Include fixes to ``urllib3``'s header handling. - Requests' handling of unvendored dependencies is now more restrictive. **Features and Improvements** - Support bytearrays when passed as parameters in the ``files`` argument. (#2468) - Avoid data duplication when creating a request with ``str``, ``bytes``, or ``bytearray`` input to the ``files`` argument. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.8 2015/03/09 16:57:04 imil Exp $ d3 3 a5 3 SHA1 (requests-2.6.0.tar.gz) = ad7327c73e8be8c188ad489d511097202b1fef12 RMD160 (requests-2.6.0.tar.gz) = c48db06c7ec348f55e9238b8f37019d8f2345c56 Size (requests-2.6.0.tar.gz) = 450389 bytes @ 1.8 log @Updated py-requests to version 2.5.3 Changes 2.5.3 (2015-02-24) Bugfixes Revert changes to our vendored certificate bundle. For more context see (#2455, #2456, and http://bugs.python.org/issue23476) 2.5.2 (2015-02-23) Features and Improvements Add sha256 fingerprint support. (shazow/urllib3#540) Improve the performance of headers. (shazow/urllib3#544) Bugfixes Copy pip’s import machinery. When downstream redistributors remove requests.packages.urllib3 the import machinery will continue to let those same symbols work. Example usage in requests’ documentation and 3rd-party libraries relying on the vendored copies of urllib3 will work without having to fallback to the system urllib3. Attempt to quote parts of the URL on redirect if unquoting and then quoting fails. (#2356) Fix filename type check for multipart form-data uploads. (#2411) Properly handle the case where a server issuing digest authentication challenges provides both auth and auth-int qop-values. (#2408) Fix a socket leak. (shazow/urllib3#549) Fix multiple Set-Cookie headers properly. (shazow/urllib3#534) Disable the built-in hostname verification. (shazow/urllib3#526) Fix the behaviour of decoding an exhausted stream. (shazow/urllib3#535) Security Pulled in an updated cacert.pem. Drop RC4 from the default cipher list. (shazow/urllib3#551) @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.7 2015/02/23 11:31:14 imil Exp $ d3 3 a5 3 SHA1 (requests-2.5.3.tar.gz) = 9577e27937ff53f1d417d84da75cda17184e1bd0 RMD160 (requests-2.5.3.tar.gz) = a1217508f5d9f51a851d41686aced41645e0b702 Size (requests-2.5.3.tar.gz) = 448318 bytes @ 1.7 log @Updated py-requests to 2.5.1 Changed ftp.NetBSD.org to pypi.python.org Behavioural Changes Only catch HTTPErrors in raise_for_status (#2382) Bugfixes Handle LocationParseError from urllib3 (#2344) Handle file-like object filenames that are not strings (#2379) Unbreak HTTPDigestAuth handler. Allow new nonces to be negotiated (#2389) @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.6 2014/12/12 19:54:31 imil Exp $ d3 3 a5 3 SHA1 (requests-2.5.1.tar.gz) = f906c441be2f0e7a834cbf701a72788d3ac3d144 RMD160 (requests-2.5.1.tar.gz) = 22c9836bb000d9bb82ea7ae16bdab2c309e968f8 Size (requests-2.5.1.tar.gz) = 443633 bytes @ 1.6 log @Changed MASTER_SITES to pypi instead of github, bumped PKGREVISION @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.5 2014/12/07 12:34:09 imil Exp $ d3 3 a5 3 SHA1 (requests-2.5.0.tar.gz) = d60dfaaa0b4b62a6646fcb6c3954ea369317ca9f RMD160 (requests-2.5.0.tar.gz) = ba81269552ea63c901d91fba2fea25cd02c7e184 Size (requests-2.5.0.tar.gz) = 443222 bytes @ 1.5 log @Updated py-requests to version 2.5.0, patch provided by Jonathan Buschmann. Full changelog is available here: https://pypi.python.org/pypi/requests @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.4 2014/08/25 18:33:21 wiz Exp $ d3 3 a5 3 SHA1 (v2.5.0.tar.gz) = 236623ef32da478dbdd30d1a55e7a06c6b80b6b1 RMD160 (v2.5.0.tar.gz) = cd0d857037e923f65df8a8fdd0aa95efe95cc938 Size (v2.5.0.tar.gz) = 651220 bytes @ 1.4 log @Update to 2.3.0: 2.3.0 (2014-05-16) ++++++++++++++++++ **API Changes** - New ``Response`` property ``is_redirect``, which is true when the library could have processed this response as a redirection (whether or not it actually did). - The ``timeout`` parameter now affects requests with both ``stream=True`` and ``stream=False`` equally. - The change in v2.0.0 to mandate explicit proxy schemes has been reverted. Proxy schemes now default to ``http://``. - The ``CaseInsensitiveDict`` used for HTTP headers now behaves like a normal dictionary when references as string or viewd in the interpreter. **Bugfixes** - No longer expose Authorization or Proxy-Authorization headers on redirect. Fix CVE-2014-1829 and CVE-2014-1830 respectively. - Authorization is re-evaluated each redirect. - On redirect, pass url as native strings. - Fall-back to autodetected encoding for JSON when Unicode detection fails. - Headers set to ``None`` on the ``Session`` are now correctly not sent. - Correctly honor ``decode_unicode`` even if it wasn't used earlier in the same response. - Stop advertising ``compress`` as a supported Content-Encoding. - The ``Response.history`` parameter is now always a list. - Many, many ``urllib3`` bugfixes. 2.2.1 (2014-01-23) ++++++++++++++++++ **Bugfixes** - Fixes incorrect parsing of proxy credentials that contain a literal or encoded '#' character. - Assorted urllib3 fixes. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.3 2014/01/16 02:52:19 rodent Exp $ d3 3 a5 3 SHA1 (v2.3.0.tar.gz) = 7c01d01ff678b75d4d4b9424c75c52956d9c4c9d RMD160 (v2.3.0.tar.gz) = 5b1c75970ee74a855eab13d5ea3bc8d14a17380f Size (v2.3.0.tar.gz) = 637122 bytes @ 1.3 log @Updated to latest release, 2.2.0. Some PLIST changes, but two packages that depend on it still build and install fine. From HISTORY.rst: 2.2.0 (2014-01-09) ++++++++++++++++++ **API Changes** - New exception: ``ContentDecodingError``. Raised instead of ``urllib3`` ``DecodeError`` exceptions. **Bugfixes** - Avoid many many exceptions from the buggy implementation of ``proxy_bypass`` on OS X in Python 2.6. - Avoid crashing when attempting to get authentication credentions from ~/.netrc when running as a user without a home directory. - Use the correct pool size for pools of connections to proxies. - Fix iteration of ``CookieJar`` objects. - Ensure that cookies are persisted over redirect. - Switch back to using chardet since charade has merged with it @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.2 2014/01/05 17:47:10 rodent Exp $ d3 3 a5 3 SHA1 (v2.2.0.tar.gz) = e9f768d85f99ffdc418903f81c289f771c498f7f RMD160 (v2.2.0.tar.gz) = d248146cdcc7be1eae8cf7e4dc4c8044723c70de Size (v2.2.0.tar.gz) = 610864 bytes @ 1.2 log @Update to latest release, 2.1.0. Both dependents built fine with this version. Simplify variable handling in Makefile to have fewer hardcoded values. Specify sphinx version as per package's requirements.txt. USE_LANGUAGES+=c. Some new PLIST additions. From HISTORY.rst: 2.1.0 (2013-12-05) ++++++++++++++++++ - Updated CA Bundle, of course. - Clean up connections when we hit problems during chunked upload, rather than leaking them. - Return connections to the pool when a chunked upload is successful, rather than leaking it. - Match the HTTPbis recommendation for HTTP 301 redirects. - Prevent hanging when using streaming uploads and Digest Auth when a 401 is received. - Values of headers set by Requests are now always the native string type. - Fix previously broken SNI support. - Fix accessing HTTP proxies using proxy authentication. - Unencode HTTP Basic usernames and passwords extracted from URLs. - Support for IP address ranges for no_proxy environment variable - Parse headers correctly when users override the default ``Host:`` header. - Avoid munging the URL in case of case-sensitive servers. - Looser URL handling for non-HTTP/HTTPS urls. - Accept unicode methods in Python 2.6 and 2.7. - More resilient cookie handling. - Make ``Response`` objects pickleable. - Actually added MD5-sess to Digest Auth instead of pretending to like last time. - Updated internal urllib3. - Fixed @@Lukasa's lack of taste. 2.0.1 (2013-10-24) ++++++++++++++++++ - Updated included CA Bundle with new mistrusts and automated process for the future - Added MD5-sess to Digest Auth - Accept per-file headers in multipart file POST messages. - Fixed: Don't send the full URL on CONNECT messages. - Fixed: Correctly lowercase a redirect scheme. - Fixed: Cookies not persisted when set via functional API. - Fixed: Translate urllib3 ProxyError into a requests ProxyError derived from ConnectionError. - Updated internal urllib3 and chardet. 2.0.0 (2013-09-24) ++++++++++++++++++ **API Changes:** - Keys in the Headers dictionary are now native strings on all Python versions, i.e. bytestrings on Python 2, unicode on Python 3. - Proxy URLs now *must* have an explicit scheme. A ``MissingSchema`` exception will be raised if they don't. - Timeouts now apply to read time if ``Stream=False``. - ``RequestException`` is now a subclass of ``IOError``, not ``RuntimeError``. - Added new method to ``PreparedRequest`` objects: ``PreparedRequest.copy()``. - Added new method to ``Session`` objects: ``Session.update_request()``. This method updates a ``Request`` object with the data (e.g. cookies) stored on the ``Session``. - Added new method to ``Session`` objects: ``Session.prepare_request()``. This method updates and prepares a ``Request`` object, and returns the corresponding ``PreparedRequest`` object. - Added new method to ``HTTPAdapter`` objects: ``HTTPAdapter.proxy_headers()``. This should not be called directly, but improves the subclass interface. - ``httplib.IncompleteRead`` exceptions caused by incorrect chunked encoding will now raise a Requests ``ChunkedEncodingError`` instead. - Invalid percent-escape sequences now cause a Requests ``InvalidURL`` exception to be raised. - HTTP 208 no longer uses reason phrase ``"im_used"``. Correctly uses ``"already_reported"``. - HTTP 226 reason added (``"im_used"``). **Bugfixes:** - Vastly improved proxy support, including the CONNECT verb. Special thanks to the many contributors who worked towards this improvement. - Cookies are now properly managed when 401 authentication responses are received. - Chunked encoding fixes. - Support for mixed case schemes. - Better handling of streaming downloads. - Retrieve environment proxies from more locations. - Minor cookies fixes. - Improved redirect behaviour. - Improved streaming behaviour, particularly for compressed data. - Miscellaneous small Python 3 text encoding bugs. - ``.netrc`` no longer overrides explicit auth. - Cookies set by hooks are now correctly persisted on Sessions. - Fix problem with cookies that specify port numbers in their host field. - ``BytesIO`` can be used to perform streaming uploads. - More generous parsing of the ``no_proxy`` environment variable. - Non-string objects can be passed in data values alongside files. 1.2.3 (2013-05-25) ++++++++++++++++++ - Simple packaging fix 1.2.2 (2013-05-23) ++++++++++++++++++ - Simple packaging fix @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.1 2013/05/21 14:34:38 imil Exp $ d3 3 a5 3 SHA1 (v2.1.0.tar.gz) = 491ca9b89fb4a1c3c8dbbee14609d66b7e70b0ff RMD160 (v2.1.0.tar.gz) = db33a2f3170798f78fe9d5c34f67ab8f002fd883 Size (v2.1.0.tar.gz) = 609754 bytes @ 1.1 log @Initial import of py-requests, version 1.2.1, into the NetBSD Packages Collection. Requests takes all of the work out of Python HTTP/1.1 - making your integration with web services seamless. There's no need to manually add query strings to your URLs, or to form-encode your POST data. Keep-alive and HTTP connection pooling are 100% automatic, powered by urllib3, which is embedded within Requests. @ text @d1 1 a1 1 $NetBSD$ d3 3 a5 3 SHA1 (v1.2.1.zip) = 00fd36fdcc8183a37862a9b7effb9cbd3f3b2105 RMD160 (v1.2.1.zip) = fd413b705b1308ecf6f33711b365019bda04eba3 Size (v1.2.1.zip) = 586193 bytes @