DESCRIPTION.rst 41 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323
  1. urllib3 is a powerful, *user-friendly* HTTP client for Python. Much of the
  2. Python ecosystem already uses urllib3 and you should too.
  3. urllib3 brings many critical features that are missing from the Python
  4. standard libraries:
  5. - Thread safety.
  6. - Connection pooling.
  7. - Client-side SSL/TLS verification.
  8. - File uploads with multipart encoding.
  9. - Helpers for retrying requests and dealing with HTTP redirects.
  10. - Support for gzip, deflate, and brotli encoding.
  11. - Proxy support for HTTP and SOCKS.
  12. - 100% test coverage.
  13. urllib3 is powerful and easy to use:
  14. .. code-block:: python
  15. >>> import urllib3
  16. >>> http = urllib3.PoolManager()
  17. >>> r = http.request('GET', 'http://httpbin.org/robots.txt')
  18. >>> r.status
  19. 200
  20. >>> r.data
  21. 'User-agent: *\nDisallow: /deny\n'
  22. Installing
  23. ----------
  24. urllib3 can be installed with `pip <https://pip.pypa.io>`_::
  25. $ python -m pip install urllib3
  26. Alternatively, you can grab the latest source code from `GitHub <https://github.com/urllib3/urllib3>`_::
  27. $ git clone git://github.com/urllib3/urllib3.git
  28. $ python setup.py install
  29. Documentation
  30. -------------
  31. urllib3 has usage and reference documentation at `urllib3.readthedocs.io <https://urllib3.readthedocs.io>`_.
  32. Contributing
  33. ------------
  34. urllib3 happily accepts contributions. Please see our
  35. `contributing documentation <https://urllib3.readthedocs.io/en/latest/contributing.html>`_
  36. for some tips on getting started.
  37. Security Disclosures
  38. --------------------
  39. To report a security vulnerability, please use the
  40. `Tidelift security contact <https://tidelift.com/security>`_.
  41. Tidelift will coordinate the fix and disclosure with maintainers.
  42. Maintainers
  43. -----------
  44. - `@sethmlarson <https://github.com/sethmlarson>`__ (Seth M. Larson)
  45. - `@pquentin <https://github.com/pquentin>`__ (Quentin Pradet)
  46. - `@theacodes <https://github.com/theacodes>`__ (Thea Flowers)
  47. - `@haikuginger <https://github.com/haikuginger>`__ (Jess Shapiro)
  48. - `@lukasa <https://github.com/lukasa>`__ (Cory Benfield)
  49. - `@sigmavirus24 <https://github.com/sigmavirus24>`__ (Ian Stapleton Cordasco)
  50. - `@shazow <https://github.com/shazow>`__ (Andrey Petrov)
  51. 👋
  52. Sponsorship
  53. -----------
  54. If your company benefits from this library, please consider `sponsoring its
  55. development <https://urllib3.readthedocs.io/en/latest/sponsors.html>`_.
  56. For Enterprise
  57. --------------
  58. .. |tideliftlogo| image:: https://nedbatchelder.com/pix/Tidelift_Logos_RGB_Tidelift_Shorthand_On-White_small.png
  59. :width: 75
  60. :alt: Tidelift
  61. .. list-table::
  62. :widths: 10 100
  63. * - |tideliftlogo|
  64. - Professional support for urllib3 is available as part of the `Tidelift
  65. Subscription`_. Tidelift gives software development teams a single source for
  66. purchasing and maintaining their software, with professional grade assurances
  67. from the experts who know it best, while seamlessly integrating with existing
  68. tools.
  69. .. _Tidelift Subscription: https://tidelift.com/subscription/pkg/pypi-urllib3?utm_source=pypi-urllib3&utm_medium=referral&utm_campaign=readme
  70. Changes
  71. =======
  72. 1.26.4 (2021-03-15)
  73. -------------------
  74. * Changed behavior of the default ``SSLContext`` when connecting to HTTPS proxy
  75. during HTTPS requests. The default ``SSLContext`` now sets ``check_hostname=True``.
  76. 1.26.3 (2021-01-26)
  77. -------------------
  78. * Fixed bytes and string comparison issue with headers (Pull #2141)
  79. * Changed ``ProxySchemeUnknown`` error message to be
  80. more actionable if the user supplies a proxy URL without
  81. a scheme. (Pull #2107)
  82. 1.26.2 (2020-11-12)
  83. -------------------
  84. * Fixed an issue where ``wrap_socket`` and ``CERT_REQUIRED`` wouldn't
  85. be imported properly on Python 2.7.8 and earlier (Pull #2052)
  86. 1.26.1 (2020-11-11)
  87. -------------------
  88. * Fixed an issue where two ``User-Agent`` headers would be sent if a
  89. ``User-Agent`` header key is passed as ``bytes`` (Pull #2047)
  90. 1.26.0 (2020-11-10)
  91. -------------------
  92. * **NOTE: urllib3 v2.0 will drop support for Python 2**.
  93. `Read more in the v2.0 Roadmap <https://urllib3.readthedocs.io/en/latest/v2-roadmap.html>`_.
  94. * Added support for HTTPS proxies contacting HTTPS servers (Pull #1923, Pull #1806)
  95. * Deprecated negotiating TLSv1 and TLSv1.1 by default. Users that
  96. still wish to use TLS earlier than 1.2 without a deprecation warning
  97. should opt-in explicitly by setting ``ssl_version=ssl.PROTOCOL_TLSv1_1`` (Pull #2002)
  98. **Starting in urllib3 v2.0: Connections that receive a ``DeprecationWarning`` will fail**
  99. * Deprecated ``Retry`` options ``Retry.DEFAULT_METHOD_WHITELIST``, ``Retry.DEFAULT_REDIRECT_HEADERS_BLACKLIST``
  100. and ``Retry(method_whitelist=...)`` in favor of ``Retry.DEFAULT_ALLOWED_METHODS``,
  101. ``Retry.DEFAULT_REMOVE_HEADERS_ON_REDIRECT``, and ``Retry(allowed_methods=...)``
  102. (Pull #2000) **Starting in urllib3 v2.0: Deprecated options will be removed**
  103. * Added default ``User-Agent`` header to every request (Pull #1750)
  104. * Added ``urllib3.util.SKIP_HEADER`` for skipping ``User-Agent``, ``Accept-Encoding``,
  105. and ``Host`` headers from being automatically emitted with requests (Pull #2018)
  106. * Collapse ``transfer-encoding: chunked`` request data and framing into
  107. the same ``socket.send()`` call (Pull #1906)
  108. * Send ``http/1.1`` ALPN identifier with every TLS handshake by default (Pull #1894)
  109. * Properly terminate SecureTransport connections when CA verification fails (Pull #1977)
  110. * Don't emit an ``SNIMissingWarning`` when passing ``server_hostname=None``
  111. to SecureTransport (Pull #1903)
  112. * Disabled requesting TLSv1.2 session tickets as they weren't being used by urllib3 (Pull #1970)
  113. * Suppress ``BrokenPipeError`` when writing request body after the server
  114. has closed the socket (Pull #1524)
  115. * Wrap ``ssl.SSLError`` that can be raised from reading a socket (e.g. "bad MAC")
  116. into an ``urllib3.exceptions.SSLError`` (Pull #1939)
  117. 1.25.11 (2020-10-19)
  118. --------------------
  119. * Fix retry backoff time parsed from ``Retry-After`` header when given
  120. in the HTTP date format. The HTTP date was parsed as the local timezone
  121. rather than accounting for the timezone in the HTTP date (typically
  122. UTC) (Pull #1932, Pull #1935, Pull #1938, Pull #1949)
  123. * Fix issue where an error would be raised when the ``SSLKEYLOGFILE``
  124. environment variable was set to the empty string. Now ``SSLContext.keylog_file``
  125. is not set in this situation (Pull #2016)
  126. 1.25.10 (2020-07-22)
  127. --------------------
  128. * Added support for ``SSLKEYLOGFILE`` environment variable for
  129. logging TLS session keys with use with programs like
  130. Wireshark for decrypting captured web traffic (Pull #1867)
  131. * Fixed loading of SecureTransport libraries on macOS Big Sur
  132. due to the new dynamic linker cache (Pull #1905)
  133. * Collapse chunked request bodies data and framing into one
  134. call to ``send()`` to reduce the number of TCP packets by 2-4x (Pull #1906)
  135. * Don't insert ``None`` into ``ConnectionPool`` if the pool
  136. was empty when requesting a connection (Pull #1866)
  137. * Avoid ``hasattr`` call in ``BrotliDecoder.decompress()`` (Pull #1858)
  138. 1.25.9 (2020-04-16)
  139. -------------------
  140. * Added ``InvalidProxyConfigurationWarning`` which is raised when
  141. erroneously specifying an HTTPS proxy URL. urllib3 doesn't currently
  142. support connecting to HTTPS proxies but will soon be able to
  143. and we would like users to migrate properly without much breakage.
  144. See `this GitHub issue <https://github.com/urllib3/urllib3/issues/1850>`_
  145. for more information on how to fix your proxy config. (Pull #1851)
  146. * Drain connection after ``PoolManager`` redirect (Pull #1817)
  147. * Ensure ``load_verify_locations`` raises ``SSLError`` for all backends (Pull #1812)
  148. * Rename ``VerifiedHTTPSConnection`` to ``HTTPSConnection`` (Pull #1805)
  149. * Allow the CA certificate data to be passed as a string (Pull #1804)
  150. * Raise ``ValueError`` if method contains control characters (Pull #1800)
  151. * Add ``__repr__`` to ``Timeout`` (Pull #1795)
  152. 1.25.8 (2020-01-20)
  153. -------------------
  154. * Drop support for EOL Python 3.4 (Pull #1774)
  155. * Optimize _encode_invalid_chars (Pull #1787)
  156. 1.25.7 (2019-11-11)
  157. -------------------
  158. * Preserve ``chunked`` parameter on retries (Pull #1715, Pull #1734)
  159. * Allow unset ``SERVER_SOFTWARE`` in App Engine (Pull #1704, Issue #1470)
  160. * Fix issue where URL fragment was sent within the request target. (Pull #1732)
  161. * Fix issue where an empty query section in a URL would fail to parse. (Pull #1732)
  162. * Remove TLS 1.3 support in SecureTransport due to Apple removing support (Pull #1703)
  163. 1.25.6 (2019-09-24)
  164. -------------------
  165. * Fix issue where tilde (``~``) characters were incorrectly
  166. percent-encoded in the path. (Pull #1692)
  167. 1.25.5 (2019-09-19)
  168. -------------------
  169. * Add mitigation for BPO-37428 affecting Python <3.7.4 and OpenSSL 1.1.1+ which
  170. caused certificate verification to be enabled when using ``cert_reqs=CERT_NONE``.
  171. (Issue #1682)
  172. 1.25.4 (2019-09-19)
  173. -------------------
  174. * Propagate Retry-After header settings to subsequent retries. (Pull #1607)
  175. * Fix edge case where Retry-After header was still respected even when
  176. explicitly opted out of. (Pull #1607)
  177. * Remove dependency on ``rfc3986`` for URL parsing.
  178. * Fix issue where URLs containing invalid characters within ``Url.auth`` would
  179. raise an exception instead of percent-encoding those characters.
  180. * Add support for ``HTTPResponse.auto_close = False`` which makes HTTP responses
  181. work well with BufferedReaders and other ``io`` module features. (Pull #1652)
  182. * Percent-encode invalid characters in URL for ``HTTPConnectionPool.request()`` (Pull #1673)
  183. 1.25.3 (2019-05-23)
  184. -------------------
  185. * Change ``HTTPSConnection`` to load system CA certificates
  186. when ``ca_certs``, ``ca_cert_dir``, and ``ssl_context`` are
  187. unspecified. (Pull #1608, Issue #1603)
  188. * Upgrade bundled rfc3986 to v1.3.2. (Pull #1609, Issue #1605)
  189. 1.25.2 (2019-04-28)
  190. -------------------
  191. * Change ``is_ipaddress`` to not detect IPvFuture addresses. (Pull #1583)
  192. * Change ``parse_url`` to percent-encode invalid characters within the
  193. path, query, and target components. (Pull #1586)
  194. 1.25.1 (2019-04-24)
  195. -------------------
  196. * Add support for Google's ``Brotli`` package. (Pull #1572, Pull #1579)
  197. * Upgrade bundled rfc3986 to v1.3.1 (Pull #1578)
  198. 1.25 (2019-04-22)
  199. -----------------
  200. * Require and validate certificates by default when using HTTPS (Pull #1507)
  201. * Upgraded ``urllib3.utils.parse_url()`` to be RFC 3986 compliant. (Pull #1487)
  202. * Added support for ``key_password`` for ``HTTPSConnectionPool`` to use
  203. encrypted ``key_file`` without creating your own ``SSLContext`` object. (Pull #1489)
  204. * Add TLSv1.3 support to CPython, pyOpenSSL, and SecureTransport ``SSLContext``
  205. implementations. (Pull #1496)
  206. * Switched the default multipart header encoder from RFC 2231 to HTML 5 working draft. (Issue #303, Pull #1492)
  207. * Fixed issue where OpenSSL would block if an encrypted client private key was
  208. given and no password was given. Instead an ``SSLError`` is raised. (Pull #1489)
  209. * Added support for Brotli content encoding. It is enabled automatically if
  210. ``brotlipy`` package is installed which can be requested with
  211. ``urllib3[brotli]`` extra. (Pull #1532)
  212. * Drop ciphers using DSS key exchange from default TLS cipher suites.
  213. Improve default ciphers when using SecureTransport. (Pull #1496)
  214. * Implemented a more efficient ``HTTPResponse.__iter__()`` method. (Issue #1483)
  215. 1.24.3 (2019-05-01)
  216. -------------------
  217. * Apply fix for CVE-2019-9740. (Pull #1591)
  218. 1.24.2 (2019-04-17)
  219. -------------------
  220. * Don't load system certificates by default when any other ``ca_certs``, ``ca_certs_dir`` or
  221. ``ssl_context`` parameters are specified.
  222. * Remove Authorization header regardless of case when redirecting to cross-site. (Issue #1510)
  223. * Add support for IPv6 addresses in subjectAltName section of certificates. (Issue #1269)
  224. 1.24.1 (2018-11-02)
  225. -------------------
  226. * Remove quadratic behavior within ``GzipDecoder.decompress()`` (Issue #1467)
  227. * Restored functionality of ``ciphers`` parameter for ``create_urllib3_context()``. (Issue #1462)
  228. 1.24 (2018-10-16)
  229. -----------------
  230. * Allow key_server_hostname to be specified when initializing a PoolManager to allow custom SNI to be overridden. (Pull #1449)
  231. * Test against Python 3.7 on AppVeyor. (Pull #1453)
  232. * Early-out ipv6 checks when running on App Engine. (Pull #1450)
  233. * Change ambiguous description of backoff_factor (Pull #1436)
  234. * Add ability to handle multiple Content-Encodings (Issue #1441 and Pull #1442)
  235. * Skip DNS names that can't be idna-decoded when using pyOpenSSL (Issue #1405).
  236. * Add a server_hostname parameter to HTTPSConnection which allows for
  237. overriding the SNI hostname sent in the handshake. (Pull #1397)
  238. * Drop support for EOL Python 2.6 (Pull #1429 and Pull #1430)
  239. * Fixed bug where responses with header Content-Type: message/* erroneously
  240. raised HeaderParsingError, resulting in a warning being logged. (Pull #1439)
  241. * Move urllib3 to src/urllib3 (Pull #1409)
  242. 1.23 (2018-06-04)
  243. -----------------
  244. * Allow providing a list of headers to strip from requests when redirecting
  245. to a different host. Defaults to the ``Authorization`` header. Different
  246. headers can be set via ``Retry.remove_headers_on_redirect``. (Issue #1316)
  247. * Fix ``util.selectors._fileobj_to_fd`` to accept ``long`` (Issue #1247).
  248. * Dropped Python 3.3 support. (Pull #1242)
  249. * Put the connection back in the pool when calling stream() or read_chunked() on
  250. a chunked HEAD response. (Issue #1234)
  251. * Fixed pyOpenSSL-specific ssl client authentication issue when clients
  252. attempted to auth via certificate + chain (Issue #1060)
  253. * Add the port to the connectionpool connect print (Pull #1251)
  254. * Don't use the ``uuid`` module to create multipart data boundaries. (Pull #1380)
  255. * ``read_chunked()`` on a closed response returns no chunks. (Issue #1088)
  256. * Add Python 2.6 support to ``contrib.securetransport`` (Pull #1359)
  257. * Added support for auth info in url for SOCKS proxy (Pull #1363)
  258. 1.22 (2017-07-20)
  259. -----------------
  260. * Fixed missing brackets in ``HTTP CONNECT`` when connecting to IPv6 address via
  261. IPv6 proxy. (Issue #1222)
  262. * Made the connection pool retry on ``SSLError``. The original ``SSLError``
  263. is available on ``MaxRetryError.reason``. (Issue #1112)
  264. * Drain and release connection before recursing on retry/redirect. Fixes
  265. deadlocks with a blocking connectionpool. (Issue #1167)
  266. * Fixed compatibility for cookiejar. (Issue #1229)
  267. * pyopenssl: Use vendored version of ``six``. (Issue #1231)
  268. 1.21.1 (2017-05-02)
  269. -------------------
  270. * Fixed SecureTransport issue that would cause long delays in response body
  271. delivery. (Pull #1154)
  272. * Fixed regression in 1.21 that threw exceptions when users passed the
  273. ``socket_options`` flag to the ``PoolManager``. (Issue #1165)
  274. * Fixed regression in 1.21 that threw exceptions when users passed the
  275. ``assert_hostname`` or ``assert_fingerprint`` flag to the ``PoolManager``.
  276. (Pull #1157)
  277. 1.21 (2017-04-25)
  278. -----------------
  279. * Improved performance of certain selector system calls on Python 3.5 and
  280. later. (Pull #1095)
  281. * Resolved issue where the PyOpenSSL backend would not wrap SysCallError
  282. exceptions appropriately when sending data. (Pull #1125)
  283. * Selectors now detects a monkey-patched select module after import for modules
  284. that patch the select module like eventlet, greenlet. (Pull #1128)
  285. * Reduced memory consumption when streaming zlib-compressed responses
  286. (as opposed to raw deflate streams). (Pull #1129)
  287. * Connection pools now use the entire request context when constructing the
  288. pool key. (Pull #1016)
  289. * ``PoolManager.connection_from_*`` methods now accept a new keyword argument,
  290. ``pool_kwargs``, which are merged with the existing ``connection_pool_kw``.
  291. (Pull #1016)
  292. * Add retry counter for ``status_forcelist``. (Issue #1147)
  293. * Added ``contrib`` module for using SecureTransport on macOS:
  294. ``urllib3.contrib.securetransport``. (Pull #1122)
  295. * urllib3 now only normalizes the case of ``http://`` and ``https://`` schemes:
  296. for schemes it does not recognise, it assumes they are case-sensitive and
  297. leaves them unchanged.
  298. (Issue #1080)
  299. 1.20 (2017-01-19)
  300. -----------------
  301. * Added support for waiting for I/O using selectors other than select,
  302. improving urllib3's behaviour with large numbers of concurrent connections.
  303. (Pull #1001)
  304. * Updated the date for the system clock check. (Issue #1005)
  305. * ConnectionPools now correctly consider hostnames to be case-insensitive.
  306. (Issue #1032)
  307. * Outdated versions of PyOpenSSL now cause the PyOpenSSL contrib module
  308. to fail when it is injected, rather than at first use. (Pull #1063)
  309. * Outdated versions of cryptography now cause the PyOpenSSL contrib module
  310. to fail when it is injected, rather than at first use. (Issue #1044)
  311. * Automatically attempt to rewind a file-like body object when a request is
  312. retried or redirected. (Pull #1039)
  313. * Fix some bugs that occur when modules incautiously patch the queue module.
  314. (Pull #1061)
  315. * Prevent retries from occurring on read timeouts for which the request method
  316. was not in the method whitelist. (Issue #1059)
  317. * Changed the PyOpenSSL contrib module to lazily load idna to avoid
  318. unnecessarily bloating the memory of programs that don't need it. (Pull
  319. #1076)
  320. * Add support for IPv6 literals with zone identifiers. (Pull #1013)
  321. * Added support for socks5h:// and socks4a:// schemes when working with SOCKS
  322. proxies, and controlled remote DNS appropriately. (Issue #1035)
  323. 1.19.1 (2016-11-16)
  324. -------------------
  325. * Fixed AppEngine import that didn't function on Python 3.5. (Pull #1025)
  326. 1.19 (2016-11-03)
  327. -----------------
  328. * urllib3 now respects Retry-After headers on 413, 429, and 503 responses when
  329. using the default retry logic. (Pull #955)
  330. * Remove markers from setup.py to assist ancient setuptools versions. (Issue
  331. #986)
  332. * Disallow superscripts and other integerish things in URL ports. (Issue #989)
  333. * Allow urllib3's HTTPResponse.stream() method to continue to work with
  334. non-httplib underlying FPs. (Pull #990)
  335. * Empty filenames in multipart headers are now emitted as such, rather than
  336. being suppressed. (Issue #1015)
  337. * Prefer user-supplied Host headers on chunked uploads. (Issue #1009)
  338. 1.18.1 (2016-10-27)
  339. -------------------
  340. * CVE-2016-9015. Users who are using urllib3 version 1.17 or 1.18 along with
  341. PyOpenSSL injection and OpenSSL 1.1.0 *must* upgrade to this version. This
  342. release fixes a vulnerability whereby urllib3 in the above configuration
  343. would silently fail to validate TLS certificates due to erroneously setting
  344. invalid flags in OpenSSL's ``SSL_CTX_set_verify`` function. These erroneous
  345. flags do not cause a problem in OpenSSL versions before 1.1.0, which
  346. interprets the presence of any flag as requesting certificate validation.
  347. There is no PR for this patch, as it was prepared for simultaneous disclosure
  348. and release. The master branch received the same fix in Pull #1010.
  349. 1.18 (2016-09-26)
  350. -----------------
  351. * Fixed incorrect message for IncompleteRead exception. (Pull #973)
  352. * Accept ``iPAddress`` subject alternative name fields in TLS certificates.
  353. (Issue #258)
  354. * Fixed consistency of ``HTTPResponse.closed`` between Python 2 and 3.
  355. (Issue #977)
  356. * Fixed handling of wildcard certificates when using PyOpenSSL. (Issue #979)
  357. 1.17 (2016-09-06)
  358. -----------------
  359. * Accept ``SSLContext`` objects for use in SSL/TLS negotiation. (Issue #835)
  360. * ConnectionPool debug log now includes scheme, host, and port. (Issue #897)
  361. * Substantially refactored documentation. (Issue #887)
  362. * Used URLFetch default timeout on AppEngine, rather than hardcoding our own.
  363. (Issue #858)
  364. * Normalize the scheme and host in the URL parser (Issue #833)
  365. * ``HTTPResponse`` contains the last ``Retry`` object, which now also
  366. contains retries history. (Issue #848)
  367. * Timeout can no longer be set as boolean, and must be greater than zero.
  368. (Pull #924)
  369. * Removed pyasn1 and ndg-httpsclient from dependencies used for PyOpenSSL. We
  370. now use cryptography and idna, both of which are already dependencies of
  371. PyOpenSSL. (Pull #930)
  372. * Fixed infinite loop in ``stream`` when amt=None. (Issue #928)
  373. * Try to use the operating system's certificates when we are using an
  374. ``SSLContext``. (Pull #941)
  375. * Updated cipher suite list to allow ChaCha20+Poly1305. AES-GCM is preferred to
  376. ChaCha20, but ChaCha20 is then preferred to everything else. (Pull #947)
  377. * Updated cipher suite list to remove 3DES-based cipher suites. (Pull #958)
  378. * Removed the cipher suite fallback to allow HIGH ciphers. (Pull #958)
  379. * Implemented ``length_remaining`` to determine remaining content
  380. to be read. (Pull #949)
  381. * Implemented ``enforce_content_length`` to enable exceptions when
  382. incomplete data chunks are received. (Pull #949)
  383. * Dropped connection start, dropped connection reset, redirect, forced retry,
  384. and new HTTPS connection log levels to DEBUG, from INFO. (Pull #967)
  385. 1.16 (2016-06-11)
  386. -----------------
  387. * Disable IPv6 DNS when IPv6 connections are not possible. (Issue #840)
  388. * Provide ``key_fn_by_scheme`` pool keying mechanism that can be
  389. overridden. (Issue #830)
  390. * Normalize scheme and host to lowercase for pool keys, and include
  391. ``source_address``. (Issue #830)
  392. * Cleaner exception chain in Python 3 for ``_make_request``.
  393. (Issue #861)
  394. * Fixed installing ``urllib3[socks]`` extra. (Issue #864)
  395. * Fixed signature of ``ConnectionPool.close`` so it can actually safely be
  396. called by subclasses. (Issue #873)
  397. * Retain ``release_conn`` state across retries. (Issues #651, #866)
  398. * Add customizable ``HTTPConnectionPool.ResponseCls``, which defaults to
  399. ``HTTPResponse`` but can be replaced with a subclass. (Issue #879)
  400. 1.15.1 (2016-04-11)
  401. -------------------
  402. * Fix packaging to include backports module. (Issue #841)
  403. 1.15 (2016-04-06)
  404. -----------------
  405. * Added Retry(raise_on_status=False). (Issue #720)
  406. * Always use setuptools, no more distutils fallback. (Issue #785)
  407. * Dropped support for Python 3.2. (Issue #786)
  408. * Chunked transfer encoding when requesting with ``chunked=True``.
  409. (Issue #790)
  410. * Fixed regression with IPv6 port parsing. (Issue #801)
  411. * Append SNIMissingWarning messages to allow users to specify it in
  412. the PYTHONWARNINGS environment variable. (Issue #816)
  413. * Handle unicode headers in Py2. (Issue #818)
  414. * Log certificate when there is a hostname mismatch. (Issue #820)
  415. * Preserve order of request/response headers. (Issue #821)
  416. 1.14 (2015-12-29)
  417. -----------------
  418. * contrib: SOCKS proxy support! (Issue #762)
  419. * Fixed AppEngine handling of transfer-encoding header and bug
  420. in Timeout defaults checking. (Issue #763)
  421. 1.13.1 (2015-12-18)
  422. -------------------
  423. * Fixed regression in IPv6 + SSL for match_hostname. (Issue #761)
  424. 1.13 (2015-12-14)
  425. -----------------
  426. * Fixed ``pip install urllib3[secure]`` on modern pip. (Issue #706)
  427. * pyopenssl: Fixed SSL3_WRITE_PENDING error. (Issue #717)
  428. * pyopenssl: Support for TLSv1.1 and TLSv1.2. (Issue #696)
  429. * Close connections more defensively on exception. (Issue #734)
  430. * Adjusted ``read_chunked`` to handle gzipped, chunk-encoded bodies without
  431. repeatedly flushing the decoder, to function better on Jython. (Issue #743)
  432. * Accept ``ca_cert_dir`` for SSL-related PoolManager configuration. (Issue #758)
  433. 1.12 (2015-09-03)
  434. -----------------
  435. * Rely on ``six`` for importing ``httplib`` to work around
  436. conflicts with other Python 3 shims. (Issue #688)
  437. * Add support for directories of certificate authorities, as supported by
  438. OpenSSL. (Issue #701)
  439. * New exception: ``NewConnectionError``, raised when we fail to establish
  440. a new connection, usually ``ECONNREFUSED`` socket error.
  441. 1.11 (2015-07-21)
  442. -----------------
  443. * When ``ca_certs`` is given, ``cert_reqs`` defaults to
  444. ``'CERT_REQUIRED'``. (Issue #650)
  445. * ``pip install urllib3[secure]`` will install Certifi and
  446. PyOpenSSL as dependencies. (Issue #678)
  447. * Made ``HTTPHeaderDict`` usable as a ``headers`` input value
  448. (Issues #632, #679)
  449. * Added `urllib3.contrib.appengine <https://urllib3.readthedocs.io/en/latest/contrib.html#google-app-engine>`_
  450. which has an ``AppEngineManager`` for using ``URLFetch`` in a
  451. Google AppEngine environment. (Issue #664)
  452. * Dev: Added test suite for AppEngine. (Issue #631)
  453. * Fix performance regression when using PyOpenSSL. (Issue #626)
  454. * Passing incorrect scheme (e.g. ``foo://``) will raise
  455. ``ValueError`` instead of ``AssertionError`` (backwards
  456. compatible for now, but please migrate). (Issue #640)
  457. * Fix pools not getting replenished when an error occurs during a
  458. request using ``release_conn=False``. (Issue #644)
  459. * Fix pool-default headers not applying for url-encoded requests
  460. like GET. (Issue #657)
  461. * log.warning in Python 3 when headers are skipped due to parsing
  462. errors. (Issue #642)
  463. * Close and discard connections if an error occurs during read.
  464. (Issue #660)
  465. * Fix host parsing for IPv6 proxies. (Issue #668)
  466. * Separate warning type SubjectAltNameWarning, now issued once
  467. per host. (Issue #671)
  468. * Fix ``httplib.IncompleteRead`` not getting converted to
  469. ``ProtocolError`` when using ``HTTPResponse.stream()``
  470. (Issue #674)
  471. 1.10.4 (2015-05-03)
  472. -------------------
  473. * Migrate tests to Tornado 4. (Issue #594)
  474. * Append default warning configuration rather than overwrite.
  475. (Issue #603)
  476. * Fix streaming decoding regression. (Issue #595)
  477. * Fix chunked requests losing state across keep-alive connections.
  478. (Issue #599)
  479. * Fix hanging when chunked HEAD response has no body. (Issue #605)
  480. 1.10.3 (2015-04-21)
  481. -------------------
  482. * Emit ``InsecurePlatformWarning`` when SSLContext object is missing.
  483. (Issue #558)
  484. * Fix regression of duplicate header keys being discarded.
  485. (Issue #563)
  486. * ``Response.stream()`` returns a generator for chunked responses.
  487. (Issue #560)
  488. * Set upper-bound timeout when waiting for a socket in PyOpenSSL.
  489. (Issue #585)
  490. * Work on platforms without `ssl` module for plain HTTP requests.
  491. (Issue #587)
  492. * Stop relying on the stdlib's default cipher list. (Issue #588)
  493. 1.10.2 (2015-02-25)
  494. -------------------
  495. * Fix file descriptor leakage on retries. (Issue #548)
  496. * Removed RC4 from default cipher list. (Issue #551)
  497. * Header performance improvements. (Issue #544)
  498. * Fix PoolManager not obeying redirect retry settings. (Issue #553)
  499. 1.10.1 (2015-02-10)
  500. -------------------
  501. * Pools can be used as context managers. (Issue #545)
  502. * Don't re-use connections which experienced an SSLError. (Issue #529)
  503. * Don't fail when gzip decoding an empty stream. (Issue #535)
  504. * Add sha256 support for fingerprint verification. (Issue #540)
  505. * Fixed handling of header values containing commas. (Issue #533)
  506. 1.10 (2014-12-14)
  507. -----------------
  508. * Disabled SSLv3. (Issue #473)
  509. * Add ``Url.url`` property to return the composed url string. (Issue #394)
  510. * Fixed PyOpenSSL + gevent ``WantWriteError``. (Issue #412)
  511. * ``MaxRetryError.reason`` will always be an exception, not string.
  512. (Issue #481)
  513. * Fixed SSL-related timeouts not being detected as timeouts. (Issue #492)
  514. * Py3: Use ``ssl.create_default_context()`` when available. (Issue #473)
  515. * Emit ``InsecureRequestWarning`` for *every* insecure HTTPS request.
  516. (Issue #496)
  517. * Emit ``SecurityWarning`` when certificate has no ``subjectAltName``.
  518. (Issue #499)
  519. * Close and discard sockets which experienced SSL-related errors.
  520. (Issue #501)
  521. * Handle ``body`` param in ``.request(...)``. (Issue #513)
  522. * Respect timeout with HTTPS proxy. (Issue #505)
  523. * PyOpenSSL: Handle ZeroReturnError exception. (Issue #520)
  524. 1.9.1 (2014-09-13)
  525. ------------------
  526. * Apply socket arguments before binding. (Issue #427)
  527. * More careful checks if fp-like object is closed. (Issue #435)
  528. * Fixed packaging issues of some development-related files not
  529. getting included. (Issue #440)
  530. * Allow performing *only* fingerprint verification. (Issue #444)
  531. * Emit ``SecurityWarning`` if system clock is waaay off. (Issue #445)
  532. * Fixed PyOpenSSL compatibility with PyPy. (Issue #450)
  533. * Fixed ``BrokenPipeError`` and ``ConnectionError`` handling in Py3.
  534. (Issue #443)
  535. 1.9 (2014-07-04)
  536. ----------------
  537. * Shuffled around development-related files. If you're maintaining a distro
  538. package of urllib3, you may need to tweak things. (Issue #415)
  539. * Unverified HTTPS requests will trigger a warning on the first request. See
  540. our new `security documentation
  541. <https://urllib3.readthedocs.io/en/latest/security.html>`_ for details.
  542. (Issue #426)
  543. * New retry logic and ``urllib3.util.retry.Retry`` configuration object.
  544. (Issue #326)
  545. * All raised exceptions should now wrapped in a
  546. ``urllib3.exceptions.HTTPException``-extending exception. (Issue #326)
  547. * All errors during a retry-enabled request should be wrapped in
  548. ``urllib3.exceptions.MaxRetryError``, including timeout-related exceptions
  549. which were previously exempt. Underlying error is accessible from the
  550. ``.reason`` property. (Issue #326)
  551. * ``urllib3.exceptions.ConnectionError`` renamed to
  552. ``urllib3.exceptions.ProtocolError``. (Issue #326)
  553. * Errors during response read (such as IncompleteRead) are now wrapped in
  554. ``urllib3.exceptions.ProtocolError``. (Issue #418)
  555. * Requesting an empty host will raise ``urllib3.exceptions.LocationValueError``.
  556. (Issue #417)
  557. * Catch read timeouts over SSL connections as
  558. ``urllib3.exceptions.ReadTimeoutError``. (Issue #419)
  559. * Apply socket arguments before connecting. (Issue #427)
  560. 1.8.3 (2014-06-23)
  561. ------------------
  562. * Fix TLS verification when using a proxy in Python 3.4.1. (Issue #385)
  563. * Add ``disable_cache`` option to ``urllib3.util.make_headers``. (Issue #393)
  564. * Wrap ``socket.timeout`` exception with
  565. ``urllib3.exceptions.ReadTimeoutError``. (Issue #399)
  566. * Fixed proxy-related bug where connections were being reused incorrectly.
  567. (Issues #366, #369)
  568. * Added ``socket_options`` keyword parameter which allows to define
  569. ``setsockopt`` configuration of new sockets. (Issue #397)
  570. * Removed ``HTTPConnection.tcp_nodelay`` in favor of
  571. ``HTTPConnection.default_socket_options``. (Issue #397)
  572. * Fixed ``TypeError`` bug in Python 2.6.4. (Issue #411)
  573. 1.8.2 (2014-04-17)
  574. ------------------
  575. * Fix ``urllib3.util`` not being included in the package.
  576. 1.8.1 (2014-04-17)
  577. ------------------
  578. * Fix AppEngine bug of HTTPS requests going out as HTTP. (Issue #356)
  579. * Don't install ``dummyserver`` into ``site-packages`` as it's only needed
  580. for the test suite. (Issue #362)
  581. * Added support for specifying ``source_address``. (Issue #352)
  582. 1.8 (2014-03-04)
  583. ----------------
  584. * Improved url parsing in ``urllib3.util.parse_url`` (properly parse '@' in
  585. username, and blank ports like 'hostname:').
  586. * New ``urllib3.connection`` module which contains all the HTTPConnection
  587. objects.
  588. * Several ``urllib3.util.Timeout``-related fixes. Also changed constructor
  589. signature to a more sensible order. [Backwards incompatible]
  590. (Issues #252, #262, #263)
  591. * Use ``backports.ssl_match_hostname`` if it's installed. (Issue #274)
  592. * Added ``.tell()`` method to ``urllib3.response.HTTPResponse`` which
  593. returns the number of bytes read so far. (Issue #277)
  594. * Support for platforms without threading. (Issue #289)
  595. * Expand default-port comparison in ``HTTPConnectionPool.is_same_host``
  596. to allow a pool with no specified port to be considered equal to to an
  597. HTTP/HTTPS url with port 80/443 explicitly provided. (Issue #305)
  598. * Improved default SSL/TLS settings to avoid vulnerabilities.
  599. (Issue #309)
  600. * Fixed ``urllib3.poolmanager.ProxyManager`` not retrying on connect errors.
  601. (Issue #310)
  602. * Disable Nagle's Algorithm on the socket for non-proxies. A subset of requests
  603. will send the entire HTTP request ~200 milliseconds faster; however, some of
  604. the resulting TCP packets will be smaller. (Issue #254)
  605. * Increased maximum number of SubjectAltNames in ``urllib3.contrib.pyopenssl``
  606. from the default 64 to 1024 in a single certificate. (Issue #318)
  607. * Headers are now passed and stored as a custom
  608. ``urllib3.collections_.HTTPHeaderDict`` object rather than a plain ``dict``.
  609. (Issue #329, #333)
  610. * Headers no longer lose their case on Python 3. (Issue #236)
  611. * ``urllib3.contrib.pyopenssl`` now uses the operating system's default CA
  612. certificates on inject. (Issue #332)
  613. * Requests with ``retries=False`` will immediately raise any exceptions without
  614. wrapping them in ``MaxRetryError``. (Issue #348)
  615. * Fixed open socket leak with SSL-related failures. (Issue #344, #348)
  616. 1.7.1 (2013-09-25)
  617. ------------------
  618. * Added granular timeout support with new ``urllib3.util.Timeout`` class.
  619. (Issue #231)
  620. * Fixed Python 3.4 support. (Issue #238)
  621. 1.7 (2013-08-14)
  622. ----------------
  623. * More exceptions are now pickle-able, with tests. (Issue #174)
  624. * Fixed redirecting with relative URLs in Location header. (Issue #178)
  625. * Support for relative urls in ``Location: ...`` header. (Issue #179)
  626. * ``urllib3.response.HTTPResponse`` now inherits from ``io.IOBase`` for bonus
  627. file-like functionality. (Issue #187)
  628. * Passing ``assert_hostname=False`` when creating a HTTPSConnectionPool will
  629. skip hostname verification for SSL connections. (Issue #194)
  630. * New method ``urllib3.response.HTTPResponse.stream(...)`` which acts as a
  631. generator wrapped around ``.read(...)``. (Issue #198)
  632. * IPv6 url parsing enforces brackets around the hostname. (Issue #199)
  633. * Fixed thread race condition in
  634. ``urllib3.poolmanager.PoolManager.connection_from_host(...)`` (Issue #204)
  635. * ``ProxyManager`` requests now include non-default port in ``Host: ...``
  636. header. (Issue #217)
  637. * Added HTTPS proxy support in ``ProxyManager``. (Issue #170 #139)
  638. * New ``RequestField`` object can be passed to the ``fields=...`` param which
  639. can specify headers. (Issue #220)
  640. * Raise ``urllib3.exceptions.ProxyError`` when connecting to proxy fails.
  641. (Issue #221)
  642. * Use international headers when posting file names. (Issue #119)
  643. * Improved IPv6 support. (Issue #203)
  644. 1.6 (2013-04-25)
  645. ----------------
  646. * Contrib: Optional SNI support for Py2 using PyOpenSSL. (Issue #156)
  647. * ``ProxyManager`` automatically adds ``Host: ...`` header if not given.
  648. * Improved SSL-related code. ``cert_req`` now optionally takes a string like
  649. "REQUIRED" or "NONE". Same with ``ssl_version`` takes strings like "SSLv23"
  650. The string values reflect the suffix of the respective constant variable.
  651. (Issue #130)
  652. * Vendored ``socksipy`` now based on Anorov's fork which handles unexpectedly
  653. closed proxy connections and larger read buffers. (Issue #135)
  654. * Ensure the connection is closed if no data is received, fixes connection leak
  655. on some platforms. (Issue #133)
  656. * Added SNI support for SSL/TLS connections on Py32+. (Issue #89)
  657. * Tests fixed to be compatible with Py26 again. (Issue #125)
  658. * Added ability to choose SSL version by passing an ``ssl.PROTOCOL_*`` constant
  659. to the ``ssl_version`` parameter of ``HTTPSConnectionPool``. (Issue #109)
  660. * Allow an explicit content type to be specified when encoding file fields.
  661. (Issue #126)
  662. * Exceptions are now pickleable, with tests. (Issue #101)
  663. * Fixed default headers not getting passed in some cases. (Issue #99)
  664. * Treat "content-encoding" header value as case-insensitive, per RFC 2616
  665. Section 3.5. (Issue #110)
  666. * "Connection Refused" SocketErrors will get retried rather than raised.
  667. (Issue #92)
  668. * Updated vendored ``six``, no longer overrides the global ``six`` module
  669. namespace. (Issue #113)
  670. * ``urllib3.exceptions.MaxRetryError`` contains a ``reason`` property holding
  671. the exception that prompted the final retry. If ``reason is None`` then it
  672. was due to a redirect. (Issue #92, #114)
  673. * Fixed ``PoolManager.urlopen()`` from not redirecting more than once.
  674. (Issue #149)
  675. * Don't assume ``Content-Type: text/plain`` for multi-part encoding parameters
  676. that are not files. (Issue #111)
  677. * Pass `strict` param down to ``httplib.HTTPConnection``. (Issue #122)
  678. * Added mechanism to verify SSL certificates by fingerprint (md5, sha1) or
  679. against an arbitrary hostname (when connecting by IP or for misconfigured
  680. servers). (Issue #140)
  681. * Streaming decompression support. (Issue #159)
  682. 1.5 (2012-08-02)
  683. ----------------
  684. * Added ``urllib3.add_stderr_logger()`` for quickly enabling STDERR debug
  685. logging in urllib3.
  686. * Native full URL parsing (including auth, path, query, fragment) available in
  687. ``urllib3.util.parse_url(url)``.
  688. * Built-in redirect will switch method to 'GET' if status code is 303.
  689. (Issue #11)
  690. * ``urllib3.PoolManager`` strips the scheme and host before sending the request
  691. uri. (Issue #8)
  692. * New ``urllib3.exceptions.DecodeError`` exception for when automatic decoding,
  693. based on the Content-Type header, fails.
  694. * Fixed bug with pool depletion and leaking connections (Issue #76). Added
  695. explicit connection closing on pool eviction. Added
  696. ``urllib3.PoolManager.clear()``.
  697. * 99% -> 100% unit test coverage.
  698. 1.4 (2012-06-16)
  699. ----------------
  700. * Minor AppEngine-related fixes.
  701. * Switched from ``mimetools.choose_boundary`` to ``uuid.uuid4()``.
  702. * Improved url parsing. (Issue #73)
  703. * IPv6 url support. (Issue #72)
  704. 1.3 (2012-03-25)
  705. ----------------
  706. * Removed pre-1.0 deprecated API.
  707. * Refactored helpers into a ``urllib3.util`` submodule.
  708. * Fixed multipart encoding to support list-of-tuples for keys with multiple
  709. values. (Issue #48)
  710. * Fixed multiple Set-Cookie headers in response not getting merged properly in
  711. Python 3. (Issue #53)
  712. * AppEngine support with Py27. (Issue #61)
  713. * Minor ``encode_multipart_formdata`` fixes related to Python 3 strings vs
  714. bytes.
  715. 1.2.2 (2012-02-06)
  716. ------------------
  717. * Fixed packaging bug of not shipping ``test-requirements.txt``. (Issue #47)
  718. 1.2.1 (2012-02-05)
  719. ------------------
  720. * Fixed another bug related to when ``ssl`` module is not available. (Issue #41)
  721. * Location parsing errors now raise ``urllib3.exceptions.LocationParseError``
  722. which inherits from ``ValueError``.
  723. 1.2 (2012-01-29)
  724. ----------------
  725. * Added Python 3 support (tested on 3.2.2)
  726. * Dropped Python 2.5 support (tested on 2.6.7, 2.7.2)
  727. * Use ``select.poll`` instead of ``select.select`` for platforms that support
  728. it.
  729. * Use ``Queue.LifoQueue`` instead of ``Queue.Queue`` for more aggressive
  730. connection reusing. Configurable by overriding ``ConnectionPool.QueueCls``.
  731. * Fixed ``ImportError`` during install when ``ssl`` module is not available.
  732. (Issue #41)
  733. * Fixed ``PoolManager`` redirects between schemes (such as HTTP -> HTTPS) not
  734. completing properly. (Issue #28, uncovered by Issue #10 in v1.1)
  735. * Ported ``dummyserver`` to use ``tornado`` instead of ``webob`` +
  736. ``eventlet``. Removed extraneous unsupported dummyserver testing backends.
  737. Added socket-level tests.
  738. * More tests. Achievement Unlocked: 99% Coverage.
  739. 1.1 (2012-01-07)
  740. ----------------
  741. * Refactored ``dummyserver`` to its own root namespace module (used for
  742. testing).
  743. * Added hostname verification for ``VerifiedHTTPSConnection`` by vendoring in
  744. Py32's ``ssl_match_hostname``. (Issue #25)
  745. * Fixed cross-host HTTP redirects when using ``PoolManager``. (Issue #10)
  746. * Fixed ``decode_content`` being ignored when set through ``urlopen``. (Issue
  747. #27)
  748. * Fixed timeout-related bugs. (Issues #17, #23)
  749. 1.0.2 (2011-11-04)
  750. ------------------
  751. * Fixed typo in ``VerifiedHTTPSConnection`` which would only present as a bug if
  752. you're using the object manually. (Thanks pyos)
  753. * Made RecentlyUsedContainer (and consequently PoolManager) more thread-safe by
  754. wrapping the access log in a mutex. (Thanks @christer)
  755. * Made RecentlyUsedContainer more dict-like (corrected ``__delitem__`` and
  756. ``__getitem__`` behaviour), with tests. Shouldn't affect core urllib3 code.
  757. 1.0.1 (2011-10-10)
  758. ------------------
  759. * Fixed a bug where the same connection would get returned into the pool twice,
  760. causing extraneous "HttpConnectionPool is full" log warnings.
  761. 1.0 (2011-10-08)
  762. ----------------
  763. * Added ``PoolManager`` with LRU expiration of connections (tested and
  764. documented).
  765. * Added ``ProxyManager`` (needs tests, docs, and confirmation that it works
  766. with HTTPS proxies).
  767. * Added optional partial-read support for responses when
  768. ``preload_content=False``. You can now make requests and just read the headers
  769. without loading the content.
  770. * Made response decoding optional (default on, same as before).
  771. * Added optional explicit boundary string for ``encode_multipart_formdata``.
  772. * Convenience request methods are now inherited from ``RequestMethods``. Old
  773. helpers like ``get_url`` and ``post_url`` should be abandoned in favour of
  774. the new ``request(method, url, ...)``.
  775. * Refactored code to be even more decoupled, reusable, and extendable.
  776. * License header added to ``.py`` files.
  777. * Embiggened the documentation: Lots of Sphinx-friendly docstrings in the code
  778. and docs in ``docs/`` and on https://urllib3.readthedocs.io/.
  779. * Embettered all the things!
  780. * Started writing this file.
  781. 0.4.1 (2011-07-17)
  782. ------------------
  783. * Minor bug fixes, code cleanup.
  784. 0.4 (2011-03-01)
  785. ----------------
  786. * Better unicode support.
  787. * Added ``VerifiedHTTPSConnection``.
  788. * Added ``NTLMConnectionPool`` in contrib.
  789. * Minor improvements.
  790. 0.3.1 (2010-07-13)
  791. ------------------
  792. * Added ``assert_host_name`` optional parameter. Now compatible with proxies.
  793. 0.3 (2009-12-10)
  794. ----------------
  795. * Added HTTPS support.
  796. * Minor bug fixes.
  797. * Refactored, broken backwards compatibility with 0.2.
  798. * API to be treated as stable from this version forward.
  799. 0.2 (2008-11-17)
  800. ----------------
  801. * Added unit tests.
  802. * Bug fixes.
  803. 0.1 (2008-11-16)
  804. ----------------
  805. * First release.