Hello community,

here is the log from the commit of package python3-requests for 
openSUSE:Factory checked in at 2015-12-23 09:57:23
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python3-requests (Old)
 and      /work/SRC/openSUSE:Factory/.python3-requests.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python3-requests"

Changes:
--------
--- /work/SRC/openSUSE:Factory/python3-requests/python3-requests.changes        
2015-10-24 10:23:50.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.python3-requests.new/python3-requests.changes   
2015-12-23 09:57:25.000000000 +0100
@@ -1,0 +2,40 @@
+Tue Dec 22 01:58:34 UTC 2015 - [email protected]
+
+- specfile:
+  * updated patches
+
+- update to version 2.9.1:
+  * Resolve regression introduced in 2.9.0 that made it impossible to
+    send binary strings as bodies in Python 3.
+  * Fixed errors when calculating cookie expiration dates in certain
+    locales.
+  * Updated bundled urllib3 to 1.13.1.
+
+- changes from version 2.9.0:
+  * The verify keyword argument now supports being passed a path to a
+    directory of CA certificates, not just a single-file bundle.
+  * Warnings are now emitted when sending files opened in text mode.
+  * Added the 511 Network Authentication Required status code to the
+    status code registry.
+  * For file-like objects that are not seeked to the very beginning,
+    we now send the content length for the number of bytes we will
+    actually read, rather than the total size of the file, allowing
+    partial file uploads.
+  * When uploading file-like objects, if they are empty or have no
+    obvious content length we set Transfer-Encoding: chunked rather
+    than Content-Length: 0.
+  * We correctly receive the response in buffered mode when uploading
+    chunked bodies.
+  * We now handle being passed a query string as a bytestring on
+    Python 3, by decoding it as UTF-8.
+  * Sessions are now closed in all cases (exceptional and not) when
+    using the functional API rather than leaking and waiting for the
+    garbage collector to clean them up.
+  * Correctly handle digest auth headers with a malformed qop
+    directive that contains no token, by treating it the same as if no
+    qop directive was provided at all.
+  * Minor performance improvements when removing specific cookies by
+    name.
+  * Updated urllib3 to 1.13.
+
+-------------------------------------------------------------------

Old:
----
  requests-2.8.1.tar.gz

New:
----
  requests-2.9.1.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python3-requests.spec ++++++
--- /var/tmp/diff_new_pack.K0pNPh/_old  2015-12-23 09:57:26.000000000 +0100
+++ /var/tmp/diff_new_pack.K0pNPh/_new  2015-12-23 09:57:26.000000000 +0100
@@ -17,7 +17,7 @@
 
 
 Name:           python3-requests
-Version:        2.8.1
+Version:        2.9.1
 Release:        0
 Summary:        Awesome Python HTTP Library That's Actually Usable
 License:        Apache-2.0
@@ -31,11 +31,11 @@
 # PATCH-FIX-OPENSUSE requests-do-not-use-bundle.patch -- Use system libraries 
instead of bundled ones.
 Patch2:         requests-do-not-use-bundle.patch
 BuildRequires:  python3
-BuildRequires:  python3-devel
-BuildRequires:  python3-setuptools
-BuildRequires:  python3-pytest
 BuildRequires:  python3-chardet
+BuildRequires:  python3-devel
 BuildRequires:  python3-py
+BuildRequires:  python3-pytest
+BuildRequires:  python3-setuptools
 BuildRequires:  python3-urllib3
 Requires:       python3-chardet
 Requires:       python3-py

++++++ no-default-cacert-sles.patch ++++++
--- /var/tmp/diff_new_pack.K0pNPh/_old  2015-12-23 09:57:26.000000000 +0100
+++ /var/tmp/diff_new_pack.K0pNPh/_new  2015-12-23 09:57:26.000000000 +0100
@@ -9,7 +9,7 @@
 ===================================================================
 --- requests-1.1.0.orig/requests/adapters.py
 +++ requests-1.1.0/requests/adapters.py
-@@ -132,9 +132,6 @@ class HTTPAdapter(BaseAdapter):
+@@ -182,9 +182,6 @@ class HTTPAdapter(BaseAdapter):
              if not cert_loc:
                  cert_loc = DEFAULT_CA_BUNDLE_PATH
  
@@ -17,8 +17,8 @@
 -                raise Exception("Could not find a suitable SSL CA certificate 
bundle.")
 -
              conn.cert_reqs = 'CERT_REQUIRED'
-             conn.ca_certs = cert_loc
-         else:
+ 
+             if not os.path.isdir(cert_loc):
 Index: requests-1.1.0/requests/certs.py
 ===================================================================
 --- requests-1.1.0.orig/requests/certs.py

++++++ no-default-cacert.patch ++++++
--- /var/tmp/diff_new_pack.K0pNPh/_old  2015-12-23 09:57:26.000000000 +0100
+++ /var/tmp/diff_new_pack.K0pNPh/_new  2015-12-23 09:57:26.000000000 +0100
@@ -5,7 +5,7 @@
 +include README.rst LICENSE NOTICE HISTORY.rst test_requests.py 
requirements.txt
 --- a/requests/adapters.py
 +++ b/requests/adapters.py
-@@ -180,9 +180,6 @@ class HTTPAdapter(BaseAdapter):
+@@ -182,9 +182,6 @@ class HTTPAdapter(BaseAdapter):
              if not cert_loc:
                  cert_loc = DEFAULT_CA_BUNDLE_PATH
  
@@ -13,8 +13,8 @@
 -                raise Exception("Could not find a suitable SSL CA certificate 
bundle.")
 -
              conn.cert_reqs = 'CERT_REQUIRED'
-             conn.ca_certs = cert_loc
-         else:
+ 
+             if not os.path.isdir(cert_loc):
 --- a/requests/certs.py
 +++ b/requests/certs.py
 @@ -18,8 +18,9 @@ try:
@@ -31,7 +31,7 @@
      print(where())
 --- a/requests/packages/urllib3/util/ssl_.py
 +++ b/requests/packages/urllib3/util/ssl_.py
-@@ -278,6 +278,8 @@ def ssl_wrap_socket(sock, keyfile=None,
+@@ -298,6 +298,8 @@ def ssl_wrap_socket(sock, keyfile=None,
              if e.errno == errno.ENOENT:
                  raise SSLError(e)
              raise

++++++ requests-2.8.1.tar.gz -> requests-2.9.1.tar.gz ++++++
++++ 2521 lines of diff (skipped)


Reply via email to