Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Rust crate reqwest to v0.12.4 #8328

Merged
merged 2 commits into from
Apr 22, 2024
Merged

Update Rust crate reqwest to v0.12.4 #8328

merged 2 commits into from
Apr 22, 2024

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Mar 20, 2024

Mend Renovate

This PR contains the following updates:

Package Type Update Change
reqwest dependencies minor =0.11.27 -> =0.12.4

Release Notes

seanmonstar/reqwest (reqwest)

v0.12.4

Compare Source

  • Add zstd support, enabled with zstd Cargo feature.
  • Add ClientBuilder::read_timeout(Duration), which applies the duration for each read operation. The timeout resets after a successful read.

v0.12.3

Compare Source

  • Add FromStr for dns::Name.
  • Add ClientBuilder::built_in_webpki_certs(bool) to enable them separately.
  • Add ClientBuilder::built_in_native_certs(bool) to enable them separately.
  • Fix sending content-length: 0 for GET requests.
  • Fix response body content_length() to return value when timeout is configured.
  • Fix ClientBuilder::resolve() to use lowercase domain names.

v0.12.2

Compare Source

  • Fix missing ALPN when connecting to socks5 proxy with rustls.
  • Fix TLS version limits with rustls.
  • Fix not detected ALPN h2 from server with native-tls.

v0.12.1

Compare Source

  • Fix ClientBuilder::interface() when no TLS is enabled.
  • Fix TlsInfo::peer_certificate() being truncated with rustls.
  • Fix panic if http2 feature disabled but TLS negotiated h2 in ALPN.
  • Fix Display for Error to not include its source error.

v0.12.0

Compare Source

  • Upgrade to hyper, http, and http-body v1.
  • Add better support for converting to and from http::Request and http::Response.
  • Add http2 optional cargo feature, default on.
  • Add charset optional cargo feature, default on.
  • Add macos-system-configuration cargo feature, default on.
  • Change all optional dependencies to no longer be exposed as implicit features.
  • Add ClientBuilder::interface(str) to specify the local interface to bind to.
  • Experimental: disables the http3 feature temporarily.

v0.11.27

  • Add hickory-dns feature, deprecating trust-dns.
  • (wasm) Fix Form::text() to not set octet-stream for plain text fields.

v0.11.26

  • Revert system-configuration upgrade, which broke MSRV on macOS.

v0.11.25

  • Fix Certificate::from_pem_bundle() parsing.
  • Fix Apple linker errors from detecting system proxies.

v0.11.24

  • Add Certificate::from_pem_bundle() to add a bundle.
  • Add http3_prior_knowledge() to blocking client builder.
  • Remove Sync bounds requirement for Body::wrap_stream().
  • Fix HTTP/2 to retry REFUSED_STREAM requests.
  • Fix instances of converting Url to Uri that could panic.

v0.11.23

  • Add Proxy::custom_http_auth(val) for setting the raw Proxy-Authorization header when connecting to proxies.
  • Fix redirect to reject locations that are not http:// or https://.
  • Fix setting nodelay when TLS is enabled but URL is HTTP.
  • (wasm) Add ClientBuilder::user_agent(val).
  • (wasm) add multipart::Form::headers(headers).

v0.11.22

  • Fix compilation on Windows when trust-dns is enabled.

v0.11.21

  • Add automatically detecting macOS proxy settings.
  • Add ClientBuilder::tls_info(bool), which will put tls::TlsInfo into the response extensions.
  • Fix trust-dns resolver from possible hangs.
  • Fix connect timeout to be split among multiple IP addresses.

v0.11.20

  • Fix deflate decompression back to using zlib, as outlined in the spec.

v0.11.19

  • Add ClientBuilder::http1_ignore_invalid_headers_in_responses() option.
  • Add ClientBuilder::http1_allow_spaces_after_header_name_in_responses() option.
  • Add support for ALL_PROXY environment variable.
  • Add support for use_preconfigured_tls when combined with HTTP/3.
  • Fix deflate decompression from using the zlib decoder.
  • Fix Response::{text, text_with_charset}() to strip BOM characters.
  • Fix a panic when HTTP/3 is used if UDP isn't able to connect.
  • Fix some dependencies for HTTP/3.
  • Increase MSRV to 1.63.

v0.11.18

  • Fix RequestBuilder::json() method from overriding a previously set content-type header. An existing value will be left in place.
  • Upgrade internal dependencies for rustls and compression.

v0.11.17

  • Upgrade internal dependencies of Experimental HTTP/3 to use quinn v0.9
  • (wasm) Fix blob url support

v0.11.16

  • Chore: set MSRV in Cargo.toml.
  • Docs: fix build on docs.rs

v0.11.15

  • Add RequestBuilder methods to split and reconstruct from its parts.
  • Add experimental HTTP/3 support.
  • Fix connection_verbose to log write_vectored calls.
  • (wasm) Make requests actually cancel if the future is dropped.

v0.11.14

  • Adds Proxy::no_proxy(url) that works like the NO_PROXY environment variable.
  • Adds multipart::Part::headers(headers) method to add custom headers.
  • (wasm) Add Response::bytes_stream().
  • Perf: several internal optimizations reducing copies and memory allocations.

v0.11.13

  • Add ClientBuilder::dns_resolver() option for custom DNS resolvers.
  • Add ClientBuilder::tls_sni(bool) option to enable or disable TLS Server Name Indication.
  • Add Identity::from_pkcs8_pem() constructor when using native-tls.
  • Fix redirect::Policy::limited(0) from following any redirects.

v0.11.12

  • Add ClientBuilder::resolve_to_addrs() which allows a slice of IP addresses to be specified for a single host.
  • Add Response::upgrade() to await whether the server agrees to an HTTP upgrade.

v0.11.11

  • Add HTTP/2 keep-alive configuration methods on ClientBuilder.
  • Add ClientBuilder::http1_allow_obsolete_multiline_headers_in_responses().
  • Add impl Service<Request> for Client and &'_ Client.
  • (wasm) Add RequestBuilder::basic_auth().
  • Fix RequestBuilder::header to not override sensitive if user explicitly set on a HeaderValue.
  • Fix rustls parsing of elliptic curve private keys.
  • Fix Proxy URL parsing of some invalid targets.

v0.11.10

  • Add Error::url() to access the URL of an error.
  • Add Response::extensions() to access the http::Extensions of a response.
  • Fix rustls-native-certs to log an error instead of panicking when loading an invalid system certificate.
  • Fix passing Basic Authorization header to proxies.

v0.11.9

  • Add ClientBuilder::http09_responses(bool) option to allow receiving HTTP/0.9 responses.
  • Fix HTTP/2 to retry requests interrupted by an HTTP/2 graceful shutdown.
  • Fix proxy loading from environment variables to ignore empty values.

v0.11.8

  • Update internal webpki-roots dependency.

v0.11.7

  • Add blocking::ClientBuilder::resolve() option, matching the async builder.
  • Implement From<tokio::fs::File> for Body.
  • Fix blocking request-scoped timeout applying to bodies as well.
  • (wasm) Fix request bodies using multipart vs formdata.
  • Update internal rustls to 0.20.

v0.11.6

  • (wasm) Fix request bodies more.

v0.11.5

  • Add ClientBuilder::http1_only() method.
  • Add tls::Version type, and ClientBuilder::min_tls_version() and ClientBuilder::max_tls_version() methods.
  • Implement TryFrom<Request> for http::Request.
  • Implement Clone for Identity.
  • Fix NO_PROXYenvironment variable parsing to more closely match curl's. Comma-separated entries are now trimmed for whitespace, and * is allowed to match everything.
  • Fix redirection to respect https_only option.
  • (wasm) Add Body::as_bytes() method.
  • (wasm) Fix sometimes wrong conversation of bytes into a JsValue.
  • (wasm) Avoid dependency on serde-serialize feature.

v0.11.4

  • Add ClientBuilder::resolve() option to override DNS resolution for specific domains.
  • Add native-tls-alpn Cargo feature to use ALPN with the native-tls backend.
  • Add ClientBuilder::deflate() option and deflate Cargo feature to support decoding response bodies using deflate.
  • Add RequestBuilder::version() to allow setting the HTTP version of a request.
  • Fix allowing "invalid" certificates with the rustls-tls backend, when the server uses TLS v1.2 or v1.3.
  • (wasm) Add try_clone to Request and RequestBuilder

v0.11.3

  • Add impl From<hyper::Body> for reqwest::Body.
  • (wasm) Add credentials mode methods to RequestBuilder.

v0.11.2

  • Add CookieStore trait to customize the type that stores and retrieves cookies for a session.
  • Add cookie::Jar as a default CookieStore, easing creating some session cookies before creating the Client.
  • Add ClientBuilder::http2_adaptive_window() option to configure an adaptive HTTP2 flow control behavior.
  • Add ClientBuilder::http2_max_frame_size() option to adjust the maximum HTTP2 frame size that can be received.
  • Implement IntoUrl for String, making it more convenient to create requests with format!.

v0.11.1

  • Add ClientBuilder::tls_built_in_root_certs() option to disable built-in root certificates.
  • Fix rustls-tls glue to more often support ALPN to upgrade to HTTP/2.
  • Fix proxy parsing to assume http:// if no scheme is found.
  • Fix connection pool idle reaping by enabling hyper's runtime feature.
  • (wasm) Add Request::new() constructor.

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

Copy link
Contributor Author

renovate bot commented Mar 20, 2024

⚠ Artifact update problem

Renovate failed to update artifacts related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: Cargo.lock
Command failed: cargo update --config net.git-fetch-with-cli=true --manifest-path crates/crates_io_smoke_test/Cargo.toml --package [email protected] --precise 0.12.4
    Updating crates.io index
error: failed to select a version for the requirement `reqwest = "^0.11"`
candidate versions found which didn't match: 0.12.4
location searched: crates.io index
required by package `oauth2 v4.4.2`
    ... which satisfies dependency `oauth2 = "=4.4.2"` (locked to 4.4.2) of package `crates_io v0.0.0 (/tmp/renovate/repos/github/rust-lang/crates.io)`
perhaps a crate was updated and forgotten to be re-vendored?

File name: Cargo.lock
Command failed: cargo update --config net.git-fetch-with-cli=true --manifest-path crates/crates_io_github/Cargo.toml --package [email protected] --precise 0.12.4
    Updating crates.io index
error: failed to select a version for the requirement `reqwest = "^0.11"`
candidate versions found which didn't match: 0.12.4
location searched: crates.io index
required by package `oauth2 v4.4.2`
    ... which satisfies dependency `oauth2 = "=4.4.2"` (locked to 4.4.2) of package `crates_io v0.0.0 (/tmp/renovate/repos/github/rust-lang/crates.io)`
perhaps a crate was updated and forgotten to be re-vendored?

File name: Cargo.lock
Command failed: cargo update --config net.git-fetch-with-cli=true --manifest-path Cargo.toml --package [email protected] --precise 0.12.4
    Updating crates.io index
error: failed to select a version for the requirement `reqwest = "^0.11"`
candidate versions found which didn't match: 0.12.4
location searched: crates.io index
required by package `oauth2 v4.4.2`
    ... which satisfies dependency `oauth2 = "=4.4.2"` (locked to 4.4.2) of package `crates_io v0.0.0 (/tmp/renovate/repos/github/rust-lang/crates.io)`
perhaps a crate was updated and forgotten to be re-vendored?

@renovate renovate bot force-pushed the renovate/reqwest-0.x branch from 5a62d7c to 2ec89a9 Compare March 22, 2024 17:06
@renovate renovate bot changed the title Update Rust crate reqwest to v0.12.0 Update Rust crate reqwest to v0.12.1 Mar 22, 2024
@renovate renovate bot force-pushed the renovate/reqwest-0.x branch from 2ec89a9 to 447b8c7 Compare March 25, 2024 16:40
@renovate renovate bot changed the title Update Rust crate reqwest to v0.12.1 Update Rust crate reqwest to v0.12.2 Mar 25, 2024
@renovate renovate bot force-pushed the renovate/reqwest-0.x branch from 447b8c7 to e4d68d7 Compare March 26, 2024 09:26
@Turbo87
Copy link
Member

Turbo87 commented Mar 26, 2024

probably best to wait for apache/arrow-rs#5536 :)

@bors
Copy link
Contributor

bors commented Mar 26, 2024

☔ The latest upstream changes (presumably 3cb26bc) made this pull request unmergeable. Please resolve the merge conflicts.

@renovate renovate bot force-pushed the renovate/reqwest-0.x branch from e4d68d7 to 566f581 Compare March 26, 2024 12:46
@renovate renovate bot force-pushed the renovate/reqwest-0.x branch from 566f581 to c54bcc4 Compare April 5, 2024 16:55
@renovate renovate bot changed the title Update Rust crate reqwest to v0.12.2 Update Rust crate reqwest to v0.12.3 Apr 5, 2024
@Turbo87 Turbo87 added the blocked label Apr 9, 2024
@renovate renovate bot force-pushed the renovate/reqwest-0.x branch from c54bcc4 to 60fa9dd Compare April 11, 2024 10:29
@bors
Copy link
Contributor

bors commented Apr 17, 2024

☔ The latest upstream changes (presumably bfa57b0) made this pull request unmergeable. Please resolve the merge conflicts.

@renovate renovate bot force-pushed the renovate/reqwest-0.x branch 2 times, most recently from 8c62012 to ef6fb63 Compare April 19, 2024 18:37
@renovate renovate bot changed the title Update Rust crate reqwest to v0.12.3 Update Rust crate reqwest to v0.12.4 Apr 19, 2024
renovate bot and others added 2 commits April 22, 2024 14:07
The `object_store` crate unfortunately does not re-export the `http` types that we need for the `with_default_headers()` calls and it is (via `reqwest`) still relying on the v0.2 version of the `http` crate. Since this blocks us from upgrading the `reqwest` dependency ourselves we'll explicitly add the dependency for now until `object_store` is updated to the most recent version of `reqwest` and `http`.
@Turbo87 Turbo87 force-pushed the renovate/reqwest-0.x branch from ef6fb63 to 8e6d6cc Compare April 22, 2024 12:09
@Turbo87 Turbo87 removed the blocked label Apr 22, 2024
Copy link
Contributor Author

renovate bot commented Apr 22, 2024

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

Warning: custom changes will be lost.

Copy link

codecov bot commented Apr 22, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 88.36%. Comparing base (153966f) to head (8e6d6cc).

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #8328      +/-   ##
==========================================
+ Coverage   88.34%   88.36%   +0.01%     
==========================================
  Files         270      270              
  Lines       26927    26927              
==========================================
+ Hits        23790    23795       +5     
+ Misses       3137     3132       -5     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@Turbo87 Turbo87 merged commit 51afb29 into main Apr 22, 2024
8 checks passed
@Turbo87 Turbo87 deleted the renovate/reqwest-0.x branch April 22, 2024 12:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants