Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency connexion to v3 #399

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

mend-for-github-com[bot]
Copy link
Contributor

This PR contains the following updates:

Package Update Change
connexion major ==2.14.2 -> ==3.0.0

By merging this PR, the issue #362 will be automatically resolved and closed:

Severity CVSS Score CVE
High High 7.5 CVE-2024-39689
Medium Medium 4.4 CVE-2024-37891

Release Notes

spec-first/connexion (connexion)

v3.0.0

Compare Source

Connexion 3.0: API-first for all

We are excited to announce the release of Connexion 3.0! 🎉

Connexion 3 fundamentally changes how Connexion is designed and implemented, and how it
fits into the wider Python API ecosystem. We adopted the ASGI interface, which makes Connexion both
modular and well-integrated with most modern Python API tooling.

It brings some major changes compared to 2.X:

  • The improved App and new AsyncApp allow you to use Connexion as a stand-alone framework
    • The App interface was extended so you no longer have to care about the framework used
      underneath
  • Connexion can now be used as middleware to supercharge any ASGI or WSGI-compatible framework
    with its spec-based functionality
  • Connexion is now pluggable in many dimensions:
    • All Connexion functionality is pluggable by adding or removing middleware from its stack
    • Validation is now pluggable by content type, solving longstanding issues regarding endpoints
      with multiple content types and making it easy to add validation for additional content types
    • Authentication is now pluggable by security scheme, making it easy to customize the behavior or
      add support for additional security schemes.
  • Aiohttp support has been dropped due to lack of ASGI support
  • We spent a lot of effort on extending and improving our documentation_

For further details, check:

Full changelog

New Contributors

Full Changelog: spec-first/connexion@2.13.0...3.0.0


  • If you want to rebase/retry this PR, check this box

@mend-for-github-com mend-for-github-com bot added the security fix Security fix generated by Mend label Jan 24, 2025
Copy link

New, updated, and removed dependencies detected. Learn more about Socket for GitHub ↗︎

Package New capabilities Transitives Size Publisher
pypi/connexion@3.0.0 🔁 pypi/connexion@2.14.2 environment, filesystem, network Transitive: eval, shell, unsafe +321 1.96 GB RobbeSneyders, ruwan

View full report↗︎

@rafikmojr
Copy link
Contributor

Logo
Checkmarx One – Scan Summary & Details9a4991a9-ca2a-45a8-a58b-af4010b93f61

New Issues (1)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
HIGH CVE-2024-1135 Python-gunicorn-20.1.0 Vulnerable Package
Fixed Issues (19)

Great job! The following issues were fixed in this Pull Request

Severity Issue Source File / Package
HIGH CVE-2023-46136 Python-Werkzeug-2.2.3
MEDIUM Host Namespace is Shared /docker-compose.yaml: 11
MEDIUM Host Namespace is Shared /docker-compose.yaml: 3
MEDIUM Networks Not Set /docker-compose.yaml: 3
MEDIUM Networks Not Set /docker-compose.yaml: 11
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/books.py: 22
LOW Trust_Boundary_Violation_in_Session_Variables /api_views/users.py: 34

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security fix Security fix generated by Mend
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant