miracum / ahd2fhir

A REST service for mapping text analysis results from Averbis Health Discovery to FHIR resources.
Apache License 2.0
8 stars 0 forks source link

chore(deps): bump requests from 2.31.0 to 2.32.0 #170

Closed dependabot[bot] closed 6 months ago

dependabot[bot] commented 6 months ago

Bumps requests from 2.31.0 to 2.32.0.

Release notes

Sourced from requests's releases.

v2.32.0

2.32.0 (2024-05-20)

🐍 PYCON US 2024 EDITION 🐍

Security

Improvements

  • verify=True now reuses a global SSLContext which should improve request time variance between first and subsequent requests. It should also minimize certificate load time on Windows systems when using a Python version built with OpenSSL 3.x. (#6667)
  • Requests now supports optional use of character detection (chardet or charset_normalizer) when repackaged or vendored. This enables pip and other projects to minimize their vendoring surface area. The Response.text() and apparent_encoding APIs will default to utf-8 if neither library is present. (#6702)

Bugfixes

  • Fixed bug in length detection where emoji length was incorrectly calculated in the request content-length. (#6589)
  • Fixed deserialization bug in JSONDecodeError. (#6629)
  • Fixed bug where an extra leading / (path separator) could lead urllib3 to unnecessarily reparse the request URI. (#6644)

Deprecations

  • Requests has officially added support for CPython 3.12 (#6503)
  • Requests has officially added support for PyPy 3.9 and 3.10 (#6641)
  • Requests has officially dropped support for CPython 3.7 (#6642)
  • Requests has officially dropped support for PyPy 3.7 and 3.8 (#6641)

Documentation

  • Various typo fixes and doc improvements.

Packaging

  • Requests has started adopting some modern packaging practices. The source files for the projects (formerly requests) is now located in src/requests in the Requests sdist. (#6506)
  • Starting in Requests 2.33.0, Requests will migrate to a PEP 517 build system using hatchling. This should not impact the average user, but extremely old versions of packaging utilities may have issues with the new packaging format.

New Contributors

... (truncated)

Changelog

Sourced from requests's changelog.

2.32.0 (2024-05-20)

Security

Improvements

  • verify=True now reuses a global SSLContext which should improve request time variance between first and subsequent requests. It should also minimize certificate load time on Windows systems when using a Python version built with OpenSSL 3.x. (#6667)
  • Requests now supports optional use of character detection (chardet or charset_normalizer) when repackaged or vendored. This enables pip and other projects to minimize their vendoring surface area. The Response.text() and apparent_encoding APIs will default to utf-8 if neither library is present. (#6702)

Bugfixes

  • Fixed bug in length detection where emoji length was incorrectly calculated in the request content-length. (#6589)
  • Fixed deserialization bug in JSONDecodeError. (#6629)
  • Fixed bug where an extra leading / (path separator) could lead urllib3 to unnecessarily reparse the request URI. (#6644)

Deprecations

  • Requests has officially added support for CPython 3.12 (#6503)
  • Requests has officially added support for PyPy 3.9 and 3.10 (#6641)
  • Requests has officially dropped support for CPython 3.7 (#6642)
  • Requests has officially dropped support for PyPy 3.7 and 3.8 (#6641)

Documentation

  • Various typo fixes and doc improvements.

Packaging

  • Requests has started adopting some modern packaging practices. The source files for the projects (formerly requests) is now located in src/requests in the Requests sdist. (#6506)
  • Starting in Requests 2.33.0, Requests will migrate to a PEP 517 build system using hatchling. This should not impact the average user, but extremely old versions of packaging utilities may have issues with the new packaging format.
Commits
  • d6ebc4a v2.32.0
  • 9a40d12 Avoid reloading root certificates to improve concurrent performance (#6667)
  • 0c030f7 Merge pull request #6702 from nateprewitt/no_char_detection
  • 555b870 Allow character detection dependencies to be optional in post-packaging steps
  • d6dded3 Merge pull request #6700 from franekmagiera/update-redirect-to-invalid-uri-test
  • bf24b7d Use an invalid URI that will not cause httpbin to throw 500
  • 2d5f547 Pin 3.8 and 3.9 runners back to macos-13 (#6688)
  • f1bb07d Merge pull request #6687 from psf/dependabot/github_actions/github/codeql-act...
  • 60047ad Bump github/codeql-action from 3.24.0 to 3.25.0
  • 31ebb81 Merge pull request #6682 from frenzymadness/pytest8
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/miracum/ahd2fhir/network/alerts).
github-actions[bot] commented 6 months ago

Trivy image scan report

ghcr.io/miracum/ahd2fhir:pr-170 (debian 12.5)

73 known vulnerabilities found (CRITICAL: 1 HIGH: 18 MEDIUM: 31 LOW: 23)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
libc6 CVE-2024-2961 HIGH 2.36-9+deb12u4 2.36-9+deb12u6
libc6 CVE-2024-33599 HIGH 2.36-9+deb12u4 2.36-9+deb12u7
libc6 CVE-2024-33600 MEDIUM 2.36-9+deb12u4 2.36-9+deb12u7
libc6 CVE-2024-33601 MEDIUM 2.36-9+deb12u4 2.36-9+deb12u7
libc6 CVE-2024-33602 MEDIUM 2.36-9+deb12u4 2.36-9+deb12u7
libc6 CVE-2010-4756 LOW 2.36-9+deb12u4
libc6 CVE-2018-20796 LOW 2.36-9+deb12u4
libc6 CVE-2019-1010022 LOW 2.36-9+deb12u4
libc6 CVE-2019-1010023 LOW 2.36-9+deb12u4
libc6 CVE-2019-1010024 LOW 2.36-9+deb12u4
libc6 CVE-2019-1010025 LOW 2.36-9+deb12u4
libc6 CVE-2019-9192 LOW 2.36-9+deb12u4
libexpat1 CVE-2023-52425 HIGH 2.5.0-1
libexpat1 CVE-2023-52426 LOW 2.5.0-1
libexpat1 CVE-2024-28757 LOW 2.5.0-1
libgcc-s1 CVE-2023-4039 MEDIUM 12.2.0-14
libgcc-s1 CVE-2022-27943 LOW 12.2.0-14
libgomp1 CVE-2023-4039 MEDIUM 12.2.0-14
libgomp1 CVE-2022-27943 LOW 12.2.0-14
libgssapi-krb5-2 CVE-2024-26462 HIGH 1.20.1-2+deb12u1
libgssapi-krb5-2 CVE-2024-26458 MEDIUM 1.20.1-2+deb12u1
libgssapi-krb5-2 CVE-2024-26461 MEDIUM 1.20.1-2+deb12u1
libgssapi-krb5-2 CVE-2018-5709 LOW 1.20.1-2+deb12u1
libk5crypto3 CVE-2024-26462 HIGH 1.20.1-2+deb12u1
libk5crypto3 CVE-2024-26458 MEDIUM 1.20.1-2+deb12u1
libk5crypto3 CVE-2024-26461 MEDIUM 1.20.1-2+deb12u1
libk5crypto3 CVE-2018-5709 LOW 1.20.1-2+deb12u1
libkrb5-3 CVE-2024-26462 HIGH 1.20.1-2+deb12u1
libkrb5-3 CVE-2024-26458 MEDIUM 1.20.1-2+deb12u1
libkrb5-3 CVE-2024-26461 MEDIUM 1.20.1-2+deb12u1
libkrb5-3 CVE-2018-5709 LOW 1.20.1-2+deb12u1
libkrb5support0 CVE-2024-26462 HIGH 1.20.1-2+deb12u1
libkrb5support0 CVE-2024-26458 MEDIUM 1.20.1-2+deb12u1
libkrb5support0 CVE-2024-26461 MEDIUM 1.20.1-2+deb12u1
libkrb5support0 CVE-2018-5709 LOW 1.20.1-2+deb12u1
libncursesw6 CVE-2023-50495 MEDIUM 6.4-4
libncursesw6 CVE-2023-45918 LOW 6.4-4
libpython3.11-minimal CVE-2023-24329 HIGH 3.11.2-6
libpython3.11-minimal CVE-2023-41105 HIGH 3.11.2-6
libpython3.11-minimal CVE-2023-6597 HIGH 3.11.2-6
libpython3.11-minimal CVE-2023-27043 MEDIUM 3.11.2-6
libpython3.11-minimal CVE-2023-40217 MEDIUM 3.11.2-6
libpython3.11-minimal CVE-2024-0450 MEDIUM 3.11.2-6
libpython3.11-stdlib CVE-2023-24329 HIGH 3.11.2-6
libpython3.11-stdlib CVE-2023-41105 HIGH 3.11.2-6
libpython3.11-stdlib CVE-2023-6597 HIGH 3.11.2-6
libpython3.11-stdlib CVE-2023-27043 MEDIUM 3.11.2-6
libpython3.11-stdlib CVE-2023-40217 MEDIUM 3.11.2-6
libpython3.11-stdlib CVE-2024-0450 MEDIUM 3.11.2-6
libsqlite3-0 CVE-2023-7104 HIGH 3.40.1-2
libsqlite3-0 CVE-2024-0232 MEDIUM 3.40.1-2
libsqlite3-0 CVE-2021-45346 LOW 3.40.1-2
libssl3 CVE-2023-5678 MEDIUM 3.0.11-1~deb12u2
libssl3 CVE-2023-6129 MEDIUM 3.0.11-1~deb12u2
libssl3 CVE-2023-6237 MEDIUM 3.0.11-1~deb12u2
libssl3 CVE-2024-0727 MEDIUM 3.0.11-1~deb12u2
libssl3 CVE-2024-4603 MEDIUM 3.0.11-1~deb12u2
libssl3 CVE-2007-6755 LOW 3.0.11-1~deb12u2
libssl3 CVE-2010-0928 LOW 3.0.11-1~deb12u2
libssl3 CVE-2024-2511 LOW 3.0.11-1~deb12u2
libstdc++6 CVE-2023-4039 MEDIUM 12.2.0-14
libstdc++6 CVE-2022-27943 LOW 12.2.0-14
libtinfo6 CVE-2023-50495 MEDIUM 6.4-4
libtinfo6 CVE-2023-45918 LOW 6.4-4
libuuid1 CVE-2024-28085 HIGH 2.38.1-5+b1 2.38.1-5+deb12u1
libuuid1 CVE-2022-0563 LOW 2.38.1-5+b1
python3.11-minimal CVE-2023-24329 HIGH 3.11.2-6
python3.11-minimal CVE-2023-41105 HIGH 3.11.2-6
python3.11-minimal CVE-2023-6597 HIGH 3.11.2-6
python3.11-minimal CVE-2023-27043 MEDIUM 3.11.2-6
python3.11-minimal CVE-2023-40217 MEDIUM 3.11.2-6
python3.11-minimal CVE-2024-0450 MEDIUM 3.11.2-6
zlib1g CVE-2023-45853 CRITICAL 1:1.2.13.dfsg-1

No Misconfigurations found

Python

1 known vulnerabilities found (CRITICAL: 0 HIGH: 0 MEDIUM: 1 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
pip CVE-2023-5752 MEDIUM 23.2.1 23.3

No Misconfigurations found

github-actions[bot] commented 6 months ago

πŸ¦™ MegaLinter status: ❌ ERROR

Descriptor Linter Files Fixed Errors Elapsed time
βœ… ACTION actionlint 5 0 0.03s
βœ… BASH bash-exec 2 0 0.04s
βœ… BASH shellcheck 2 0 0.05s
βœ… BASH shfmt 2 0 0.01s
βœ… DOCKERFILE hadolint 2 0 0.2s
βœ… JSON eslint-plugin-jsonc 17 0 2.78s
βœ… JSON jsonlint 17 0 0.43s
βœ… JSON npm-package-json-lint yes no 0.67s
βœ… JSON prettier 17 0 2.42s
βœ… MARKDOWN markdownlint 3 0 0.65s
βœ… PYTHON bandit 31 0 1.71s
βœ… PYTHON black 31 0 2.64s
βœ… PYTHON flake8 31 0 1.33s
βœ… PYTHON isort 31 0 0.4s
βœ… PYTHON mypy 31 0 10.03s
βœ… PYTHON pyright 31 0 10.75s
βœ… PYTHON ruff 31 0 0.05s
βœ… REPOSITORY checkov yes no 16.18s
βœ… REPOSITORY gitleaks yes no 0.12s
βœ… REPOSITORY git_diff yes no 0.03s
βœ… REPOSITORY grype yes no 16.41s
βœ… REPOSITORY kics yes no 39.81s
βœ… REPOSITORY secretlint yes no 1.18s
βœ… REPOSITORY syft yes no 0.75s
❌ REPOSITORY trivy yes 1 11.93s
βœ… REPOSITORY trivy-sbom yes no 5.01s
βœ… REPOSITORY trufflehog yes no 12.34s
βœ… YAML prettier 15 0 1.09s
βœ… YAML yamllint 15 0 0.52s

See detailed report in MegaLinter reports

You could have same capabilities but better runtime performances if you request a new MegaLinter flavor.

_MegaLinter is graciously provided by OX Security_

dependabot[bot] commented 6 months ago

Superseded by #172.