Sourced from pymysql's\r\nreleases.
\r\n\r\n\r\nv1.1.1
\r\n\r\n\r\n[!WARNING]\r\nThis release fixes a vulnerability (CVE-2024-36039).\r\nAll users are recommended to update to this version.
\r\nIf you can not update soon, check the input value from untrusted\r\nsource has an expected type.\r\nOnly dict input from untrusted source can be an attack vector.
\r\nWhat's Changed
\r\n\r\n
\r\n- Prohibit dict parameter for
\r\nCursor.execute()
. It didn't\r\nproduce valid SQL\r\nand might cause SQL injection. (CVE-2024-36039)- Added ssl_key_password param by
\r\n@svaskov
in PyMySQL/PyMySQL#1145Merged PRs
\r\n\r\n
\r\n- Add support for Python 3.12 by
\r\n@hugovk
in PyMySQL/PyMySQL#1134- chore(deps): update actions/checkout action to v4 by
\r\n@renovate
in PyMySQL/PyMySQL#1136- Update codecov/codecov-action action to v4 by
\r\n@renovate
in PyMySQL/PyMySQL#1137- ci: use codecov@v3 by
\r\n@methane
in PyMySQL/PyMySQL#1142- chore(deps): update dessant/lock-threads action to v5 by
\r\n@renovate
in PyMySQL/PyMySQL#1141- doc: use rtd theme by
\r\n@methane
in PyMySQL/PyMySQL#1143- use Ruff as formatter by
\r\n@methane
in PyMySQL/PyMySQL#1144- chore(deps): update dependency sphinx-rtd-theme to v2 by
\r\n@renovate
in PyMySQL/PyMySQL#1147- chore(deps): update actions/setup-python action to v5 by
\r\n@renovate
in PyMySQL/PyMySQL#1152- chore(deps): update github/codeql-action action to v3 by
\r\n@renovate
in PyMySQL/PyMySQL#1154- chore(deps): update codecov/codecov-action action to v4 by
\r\n@renovate
in PyMySQL/PyMySQL#1158- Support error packet without sqlstate by
\r\n@methane
in PyMySQL/PyMySQL#1160- test json - mariadb without JSON type by
\r\n@grooverdan
in PyMySQL/PyMySQL#1165New Contributors
\r\n\r\n
\r\n- \r\n
@hugovk
made\r\ntheir first contribution in PyMySQL/PyMySQL#1134- \r\n
@svaskov
made\r\ntheir first contribution in PyMySQL/PyMySQL#1145Full Changelog: https://github.com/PyMySQL/PyMySQL/compare/v1.1.0...v1.1.1
\r\n
Sourced from pymysql's\r\nchangelog.
\r\n\r\n\r\nv1.1.1
\r\nRelease date: 2024-05-21
\r\n\r\n\r\n[!WARNING]\r\nThis release fixes a vulnerability (CVE-2024-36039).\r\nAll users are recommended to update to this version.
\r\nIf you can not update soon, check the input value from\r\nuntrusted source has an expected type. Only dict input\r\nfrom untrusted source can be an attack vector.
\r\n\r\n
\r\n- Prohibit dict parameter for
\r\nCursor.execute()
. It didn't\r\nproduce valid SQL\r\nand might cause SQL injection. (CVE-2024-36039)- Added ssl_key_password param. #1145
\r\n
2cab9ec
\r\nv1.1.1521e400
\r\nforbid dict parameter7f032a6
\r\nremove coveralls from requirements69f6c74
\r\nruff formatb4ed688
\r\ntest json - mariadb without JSON type (#1165)bbd049f
\r\nSupport error packet without sqlstate (#1160)9694747
\r\npyupgrade1f0b785
\r\nchore(deps): update codecov/codecov-action action to v4 (#1158)1e28be8
\r\nchore(deps): update github/codeql-action action to v3 (#1154)f13f054
\r\nchore(deps): update actions/setup-python action to v5 (#1152)OSSHandler
's _format_prompt
function (Shi…"}},{"before":"e0900c6a5578780dd37eb696b9039e4052b039c7","after":"16866336b74743706c6d1cd8c6aa650574176f3f","ref":"refs/heads/main","pushedAt":"2024-04-17T09:08:11.000Z","pushType":"push","commitsCount":8,"pusher":{"login":"leixy76","name":null,"path":"/leixy76","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/162015206?s=80&v=4"},"commit":{"message":"Update requirements.txt (#343)\n\nRunning gorilla_falcon_cli.py withou einops package returns the\r\nfollowing error:\r\n\r\nImportError: This modeling file requires the following packages that\r\nwere not found in your environment: einops. Run `pip install einops`","shortMessageHtmlLink":"Update requirements.txt (ShishirPatil#343)"}},{"before":"e23476b7bce575743c51438a9377ec87cefe797a","after":"e0900c6a5578780dd37eb696b9039e4052b039c7","ref":"refs/heads/main","pushedAt":"2024-04-13T04:01:46.000Z","pushType":"push","commitsCount":6,"pusher":{"login":"leixy76","name":null,"path":"/leixy76","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/162015206?s=80&v=4"},"commit":{"message":"Add Support for NousResearch/Hermes-2-Pro-Mistral-7B Function Calling (#327)\n\nThis PR introduces support for [\r\nNousResearch/Hermes-2-Pro-Mistral-7B](https://huggingface.co/NousResearch/Hermes-2-Pro-Mistral-7B).\r\nSpecifically, it includes:\r\n\r\n- The implementation of a function calling system prompt passing in\r\nOpenAI compatible JSON function descriptions, as detailed on the\r\nHuggingface model page.\r\n- The ability to parse raw Hermes output into a standard {\"name\": ...,\r\n\"arguments\": ...} dictionary format.\r\n- A refactoring of `oss_handler.py` to specify `test_category` during\r\nthe VLLM batch generation process. This enables special handling for\r\nfunction JSON parameter types in the java and javascript categories.\r\n\r\nThis PR will result in changes to the leaderboard by adding an entry for\r\none model. The PR that makes changes to the leaderboard webpage is\r\nlinked here [PR](https://github.com/ShishirPatil/gorilla/pull/328).\r\n\r\n---------\r\n\r\nCo-authored-by: CharlieJCJ