Release notes
*Sourced from [waitress's releases](https://github.com/Pylons/waitress/releases).*
> ## v1.4.2
> No release notes provided.
>
> ## v1.4.1
> No release notes provided.
>
> ## v1.4.0
> No release notes provided.
>
> ## v1.3.1
> No release notes provided.
>
> ## v1.3.0
> No release notes provided.
>
> ## v1.3.0b0
> No release notes provided.
>
> ## v1.2.1
> No release notes provided.
>
> ## v1.2.0
> No release notes provided.
>
> ## v1.1.0
> https://pypi.org/project/waitress/1.1.0/
>
> ## v1.0.2
> No release notes provided.
>
> ## v1.0.1
> No release notes provided.
>
> ## v1.0.0
> No release notes provided.
>
> ## v1.0a2
> No release notes provided.
>
> ## v1.0a1
> No release notes provided.
>
> ## v0.9.0
> No release notes provided.
>
> ## v0.9.0b1
> No release notes provided.
>
> ## 0.9.0b0
> No release notes provided.
> ... (truncated)
Changelog
*Sourced from [waitress's changelog](https://github.com/Pylons/waitress/blob/master/CHANGES.txt).*
> 1.4.2 (2020-01-02)
> ------------------
>
> Security Fixes
> ~~~~~~~~~~~~~~
>
> - This is a follow-up to the fix introduced in 1.4.1 to tighten up the way
> Waitress strips whitespace from header values. This makes sure Waitress won't
> accidentally treat non-printable characters as whitespace and lead to a
> potental HTTP request smuggling/splitting security issue.
>
> Thanks to ZeddYu Lu for the extra test cases.
>
> Please see the security advisory for more information:
> https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4
>
> CVE-ID: CVE-2019-16789
>
> Bugfixes
> ~~~~~~~~
>
> - Updated the regex used to validate header-field content to match the errata
> that was published for RFC7230.
>
> See: https://www.rfc-editor.org/errata_search.php?rfc=7230&eid=4189
>
>
> 1.4.1 (2019-12-24)
> ------------------
>
> Security Fixes
> ~~~~~~~~~~~~~~
>
> - Waitress did not properly validate that the HTTP headers it received were
> properly formed, thereby potentially allowing a front-end server to treat a
> request different from Waitress. This could lead to HTTP request
> smuggling/splitting.
>
> Please see the security advisory for more information:
> https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4
>
> CVE-ID: CVE-2019-16789
>
> 1.4.0 (2019-12-20)
> ------------------
>
> Bugfixes
> ~~~~~~~~
>
> - Waitress used to slam the door shut on HTTP pipelined requests without
> ... (truncated)
Commits
- [`8af9adb`](https://github.com/Pylons/waitress/commit/8af9adb8e9078bfdbc3adf9153b04e2d4471222d) Prep for 1.4.2
- [`634d991`](https://github.com/Pylons/waitress/commit/634d991ff4e0f7fd5f30c0cbedec29133071a455) Merge pull request [#277](https://github-redirect.dependabot.com/Pylons/waitress/issues/277) from Pylons/invalid-whitespace-cont
- [`3a54e29`](https://github.com/Pylons/waitress/commit/3a54e2993db7182feaea4602aac7c1fa8f2ca08b) Add CHANGES and bump version to 1.4.2
- [`0bf98da`](https://github.com/Pylons/waitress/commit/0bf98dadd8cae23830cb365cc6cb9cedd7f98db0) Update RFC7230 regex with errata for header field-content
- [`ddb65b4`](https://github.com/Pylons/waitress/commit/ddb65b489d01d696afa1695b75fdd5df3e4ffdf8) Remove accidental stripping of non-printable characters
- [`cd83598`](https://github.com/Pylons/waitress/commit/cd8359864400592ba0db5d74e650a8fac4763d0d) Prep v1.4.1
- [`11d9e13`](https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017) Merge pull request from GHSA-m5ff-3wj3-8ph4
- [`a046a76`](https://github.com/Pylons/waitress/commit/a046a7667c8a7afa0237c668e6ff33f7c10894f7) Add links to advisories for previous security issues
- [`3c58e39`](https://github.com/Pylons/waitress/commit/3c58e397cc17e51e1127e971621fb617b04bd33d) Bump version number
- [`de3324d`](https://github.com/Pylons/waitress/commit/de3324dd2126ce7ae1e55411f2684c333d96d62b) Add documentation for security issue
- Additional commits viewable in [compare view](https://github.com/Pylons/waitress/compare/0.8.9...v1.4.2)
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot ignore this [patch|minor|major] version` will close this PR and stop Dependabot creating any more for this minor/major version (unless you reopen the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
- `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language
- `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language
- `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language
- `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language
You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/openprocurement/openprocurement.api/network/alerts).
Bumps waitress from 0.8.9 to 1.4.2.
Release notes
*Sourced from [waitress's releases](https://github.com/Pylons/waitress/releases).* > ## v1.4.2 > No release notes provided. > > ## v1.4.1 > No release notes provided. > > ## v1.4.0 > No release notes provided. > > ## v1.3.1 > No release notes provided. > > ## v1.3.0 > No release notes provided. > > ## v1.3.0b0 > No release notes provided. > > ## v1.2.1 > No release notes provided. > > ## v1.2.0 > No release notes provided. > > ## v1.1.0 > https://pypi.org/project/waitress/1.1.0/ > > ## v1.0.2 > No release notes provided. > > ## v1.0.1 > No release notes provided. > > ## v1.0.0 > No release notes provided. > > ## v1.0a2 > No release notes provided. > > ## v1.0a1 > No release notes provided. > > ## v0.9.0 > No release notes provided. > > ## v0.9.0b1 > No release notes provided. > > ## 0.9.0b0 > No release notes provided. > ... (truncated)Changelog
*Sourced from [waitress's changelog](https://github.com/Pylons/waitress/blob/master/CHANGES.txt).* > 1.4.2 (2020-01-02) > ------------------ > > Security Fixes > ~~~~~~~~~~~~~~ > > - This is a follow-up to the fix introduced in 1.4.1 to tighten up the way > Waitress strips whitespace from header values. This makes sure Waitress won't > accidentally treat non-printable characters as whitespace and lead to a > potental HTTP request smuggling/splitting security issue. > > Thanks to ZeddYu Lu for the extra test cases. > > Please see the security advisory for more information: > https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 > > CVE-ID: CVE-2019-16789 > > Bugfixes > ~~~~~~~~ > > - Updated the regex used to validate header-field content to match the errata > that was published for RFC7230. > > See: https://www.rfc-editor.org/errata_search.php?rfc=7230&eid=4189 > > > 1.4.1 (2019-12-24) > ------------------ > > Security Fixes > ~~~~~~~~~~~~~~ > > - Waitress did not properly validate that the HTTP headers it received were > properly formed, thereby potentially allowing a front-end server to treat a > request different from Waitress. This could lead to HTTP request > smuggling/splitting. > > Please see the security advisory for more information: > https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 > > CVE-ID: CVE-2019-16789 > > 1.4.0 (2019-12-20) > ------------------ > > Bugfixes > ~~~~~~~~ > > - Waitress used to slam the door shut on HTTP pipelined requests without > ... (truncated)Commits
- [`8af9adb`](https://github.com/Pylons/waitress/commit/8af9adb8e9078bfdbc3adf9153b04e2d4471222d) Prep for 1.4.2 - [`634d991`](https://github.com/Pylons/waitress/commit/634d991ff4e0f7fd5f30c0cbedec29133071a455) Merge pull request [#277](https://github-redirect.dependabot.com/Pylons/waitress/issues/277) from Pylons/invalid-whitespace-cont - [`3a54e29`](https://github.com/Pylons/waitress/commit/3a54e2993db7182feaea4602aac7c1fa8f2ca08b) Add CHANGES and bump version to 1.4.2 - [`0bf98da`](https://github.com/Pylons/waitress/commit/0bf98dadd8cae23830cb365cc6cb9cedd7f98db0) Update RFC7230 regex with errata for header field-content - [`ddb65b4`](https://github.com/Pylons/waitress/commit/ddb65b489d01d696afa1695b75fdd5df3e4ffdf8) Remove accidental stripping of non-printable characters - [`cd83598`](https://github.com/Pylons/waitress/commit/cd8359864400592ba0db5d74e650a8fac4763d0d) Prep v1.4.1 - [`11d9e13`](https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017) Merge pull request from GHSA-m5ff-3wj3-8ph4 - [`a046a76`](https://github.com/Pylons/waitress/commit/a046a7667c8a7afa0237c668e6ff33f7c10894f7) Add links to advisories for previous security issues - [`3c58e39`](https://github.com/Pylons/waitress/commit/3c58e397cc17e51e1127e971621fb617b04bd33d) Bump version number - [`de3324d`](https://github.com/Pylons/waitress/commit/de3324dd2126ce7ae1e55411f2684c333d96d62b) Add documentation for security issue - Additional commits viewable in [compare view](https://github.com/Pylons/waitress/compare/0.8.9...v1.4.2)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot ignore this [patch|minor|major] version` will close this PR and stop Dependabot creating any more for this minor/major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/openprocurement/openprocurement.api/network/alerts).
This change is