Hello community, here is the log from the commit of package python3-requests for openSUSE:Factory checked in at 2015-12-23 09:57:23 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/python3-requests (Old) and /work/SRC/openSUSE:Factory/.python3-requests.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "python3-requests" Changes: -------- --- /work/SRC/openSUSE:Factory/python3-requests/python3-requests.changes 2015-10-24 10:23:50.000000000 +0200 +++ /work/SRC/openSUSE:Factory/.python3-requests.new/python3-requests.changes 2015-12-23 09:57:25.000000000 +0100 @@ -1,0 +2,40 @@ +Tue Dec 22 01:58:34 UTC 2015 - arun@gmx.de + +- specfile: + * updated patches + +- update to version 2.9.1: + * Resolve regression introduced in 2.9.0 that made it impossible to + send binary strings as bodies in Python 3. + * Fixed errors when calculating cookie expiration dates in certain + locales. + * Updated bundled urllib3 to 1.13.1. + +- changes from version 2.9.0: + * The verify keyword argument now supports being passed a path to a + directory of CA certificates, not just a single-file bundle. + * Warnings are now emitted when sending files opened in text mode. + * Added the 511 Network Authentication Required status code to the + status code registry. + * For file-like objects that are not seeked to the very beginning, + we now send the content length for the number of bytes we will + actually read, rather than the total size of the file, allowing + partial file uploads. + * When uploading file-like objects, if they are empty or have no + obvious content length we set Transfer-Encoding: chunked rather + than Content-Length: 0. + * We correctly receive the response in buffered mode when uploading + chunked bodies. + * We now handle being passed a query string as a bytestring on + Python 3, by decoding it as UTF-8. + * Sessions are now closed in all cases (exceptional and not) when + using the functional API rather than leaking and waiting for the + garbage collector to clean them up. + * Correctly handle digest auth headers with a malformed qop + directive that contains no token, by treating it the same as if no + qop directive was provided at all. + * Minor performance improvements when removing specific cookies by + name. + * Updated urllib3 to 1.13. + +------------------------------------------------------------------- Old: ---- requests-2.8.1.tar.gz New: ---- requests-2.9.1.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ python3-requests.spec ++++++ --- /var/tmp/diff_new_pack.K0pNPh/_old 2015-12-23 09:57:26.000000000 +0100 +++ /var/tmp/diff_new_pack.K0pNPh/_new 2015-12-23 09:57:26.000000000 +0100 @@ -17,7 +17,7 @@ Name: python3-requests -Version: 2.8.1 +Version: 2.9.1 Release: 0 Summary: Awesome Python HTTP Library That's Actually Usable License: Apache-2.0 @@ -31,11 +31,11 @@ # PATCH-FIX-OPENSUSE requests-do-not-use-bundle.patch -- Use system libraries instead of bundled ones. Patch2: requests-do-not-use-bundle.patch BuildRequires: python3 -BuildRequires: python3-devel -BuildRequires: python3-setuptools -BuildRequires: python3-pytest BuildRequires: python3-chardet +BuildRequires: python3-devel BuildRequires: python3-py +BuildRequires: python3-pytest +BuildRequires: python3-setuptools BuildRequires: python3-urllib3 Requires: python3-chardet Requires: python3-py ++++++ no-default-cacert-sles.patch ++++++ --- /var/tmp/diff_new_pack.K0pNPh/_old 2015-12-23 09:57:26.000000000 +0100 +++ /var/tmp/diff_new_pack.K0pNPh/_new 2015-12-23 09:57:26.000000000 +0100 @@ -9,7 +9,7 @@ =================================================================== --- requests-1.1.0.orig/requests/adapters.py +++ requests-1.1.0/requests/adapters.py -@@ -132,9 +132,6 @@ class HTTPAdapter(BaseAdapter): +@@ -182,9 +182,6 @@ class HTTPAdapter(BaseAdapter): if not cert_loc: cert_loc = DEFAULT_CA_BUNDLE_PATH @@ -17,8 +17,8 @@ - raise Exception("Could not find a suitable SSL CA certificate bundle.") - conn.cert_reqs = 'CERT_REQUIRED' - conn.ca_certs = cert_loc - else: + + if not os.path.isdir(cert_loc): Index: requests-1.1.0/requests/certs.py =================================================================== --- requests-1.1.0.orig/requests/certs.py ++++++ no-default-cacert.patch ++++++ --- /var/tmp/diff_new_pack.K0pNPh/_old 2015-12-23 09:57:26.000000000 +0100 +++ /var/tmp/diff_new_pack.K0pNPh/_new 2015-12-23 09:57:26.000000000 +0100 @@ -5,7 +5,7 @@ +include README.rst LICENSE NOTICE HISTORY.rst test_requests.py requirements.txt --- a/requests/adapters.py +++ b/requests/adapters.py -@@ -180,9 +180,6 @@ class HTTPAdapter(BaseAdapter): +@@ -182,9 +182,6 @@ class HTTPAdapter(BaseAdapter): if not cert_loc: cert_loc = DEFAULT_CA_BUNDLE_PATH @@ -13,8 +13,8 @@ - raise Exception("Could not find a suitable SSL CA certificate bundle.") - conn.cert_reqs = 'CERT_REQUIRED' - conn.ca_certs = cert_loc - else: + + if not os.path.isdir(cert_loc): --- a/requests/certs.py +++ b/requests/certs.py @@ -18,8 +18,9 @@ try: @@ -31,7 +31,7 @@ print(where()) --- a/requests/packages/urllib3/util/ssl_.py +++ b/requests/packages/urllib3/util/ssl_.py -@@ -278,6 +278,8 @@ def ssl_wrap_socket(sock, keyfile=None, +@@ -298,6 +298,8 @@ def ssl_wrap_socket(sock, keyfile=None, if e.errno == errno.ENOENT: raise SSLError(e) raise ++++++ requests-2.8.1.tar.gz -> requests-2.9.1.tar.gz ++++++ ++++ 2521 lines of diff (skipped)