Httpx

Latest version: v0.27.0

Safety actively analyzes 628924 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 11 of 13

0.7.4

Not secure
Added

- Add Trio concurrency backend. (Pull 276)
- Add `params` parameter to `Client` for setting default query parameters. (Pull 372)
- Add support for `SSL_CERT_FILE` and `SSL_CERT_DIR` environment variables. (Pull 307)
- Add debug logging to calls into ASGI apps. (Pull 371)
- Add debug logging to SSL configuration. (Pull 378)

Fixed

- Fix a bug when using `Client` without timeouts in Python 3.6. (Pull 383)
- Propagate `Client` configuration to HTTP proxies. (Pull 377)

0.7.3

Not secure
Added

- HTTP Proxy support. (Pulls 259, 353)
- Add Digest authentication. (Pull 332)
- Add `.build_request()` method to `Client` and `AsyncClient`. (Pull 319)
- Add `.elapsed` property on responses. (Pull 351)
- Add support for `SSLKEYLOGFILE` in Python 3.8b4+. (Pull 301)

Removed

- Drop NPN support for HTTP version negotiation. (Pull 314)

Fixed

- Fix distribution of type annotations for mypy (Pull 361).
- Set `Host` header when redirecting cross-origin. (Pull 321)
- Drop `Content-Length` headers on `GET` redirects. (Pull 310)
- Raise `KeyError` if header isn't found in `Headers`. (Pull 324)
- Raise `NotRedirectResponse` in `response.next()` if there is no redirection to perform. (Pull 297)
- Fix bug in calculating the HTTP/2 maximum frame size. (Pull 153)

0.7.2

Not secure
- Enforce using `httpx.AsyncioBackend` for the synchronous client. (Pull 232)
- `httpx.ConnectionPool` will properly release a dropped connection. (Pull 230)
- Remove the `raise_app_exceptions` argument from `Client`. (Pull 238)
- `DecodeError` will no longer be raised for an empty body encoded with Brotli. (Pull 237)
- Added `http_versions` parameter to `Client`. (Pull 250)
- Only use HTTP/1.1 on short-lived connections like `httpx.get()`. (Pull 284)
- Convert `Client.cookies` and `Client.headers` when set as a property. (Pull 274)
- Setting `HTTPX_DEBUG=1` enables debug logging on all requests. (Pull 277)

0.7.1

Not secure
- Include files with source distribution to be installable. (Pull 233)

0.7.0

Not secure
- Add the `trust_env` property to `BaseClient`. (Pull 187)
- Add the `links` property to `BaseResponse`. (Pull 211)
- Accept `ssl.SSLContext` instances into `SSLConfig(verify=...)`. (Pull 215)
- Add `Response.stream_text()` with incremental encoding detection. (Pull 183)
- Properly updated the `Host` header when a redirect changes the origin. (Pull 199)
- Ignore invalid `Content-Encoding` headers. (Pull 196)
- Use `~/.netrc` and `~/_netrc` files by default when `trust_env=True`. (Pull 189)
- Create exception base class `HTTPError` with `request` and `response` properties. (Pull 162)
- Add HSTS preload list checking within `BaseClient` to upgrade HTTP URLs to HTTPS. (Pull 184)
- Switch IDNA encoding from IDNA 2003 to IDNA 2008. (Pull 161)
- Expose base classes for alternate concurrency backends. (Pull 178)
- Improve Multipart parameter encoding. (Pull 167)
- Add the `headers` property to `BaseClient`. (Pull 159)
- Add support for Google's `brotli` library. (Pull 156)
- Remove deprecated TLS versions (TLSv1 and TLSv1.1) from default `SSLConfig`. (Pull 155)
- Fix `URL.join(...)` to work similarly to RFC 3986 URL joining. (Pull 144)

---

0.6.8

Not secure
- Check for disconnections when searching for an available
connection in `ConnectionPool.keepalive_connections` (Pull 145)
- Allow string comparison for `URL` objects (Pull 139)
- Add HTTP status codes 418 and 451 (Pull 135)
- Add support for client certificate passwords (Pull 118)
- Enable post-handshake client cert authentication for TLSv1.3 (Pull 118)
- Disable using `commonName` for hostname checking for OpenSSL 1.1.0+ (Pull 118)
- Detect encoding for `Response.json()` (Pull 116)

Page 11 of 13

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.