-
Notifications
You must be signed in to change notification settings - Fork 1
[CHORE] default version gets yanked on pip install #8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
arman-bd
merged 1 commit into
develop
from
7-default-version-gets-yanked-on-pip-install
Oct 24, 2025
Merged
[CHORE] default version gets yanked on pip install #8
arman-bd
merged 1 commit into
develop
from
7-default-version-gets-yanked-on-pip-install
Oct 24, 2025
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Merged
arman-bd
added a commit
that referenced
this pull request
Oct 24, 2025
[CHORE] default version gets yanked on pip install (#8)
arman-bd
added a commit
that referenced
this pull request
Oct 26, 2025
[CHORE] default version gets yanked on pip install (#8)
arman-bd
added a commit
that referenced
this pull request
Nov 10, 2025
This commit addresses multiple security issues discovered during edge case analysis and improves test infrastructure for better reliability. Security Fixes: - Fix HTTP/1.1 body reallocation bug causing data loss (#1) * Modified realloc_body_buffer() to use current_data_size parameter * Fixes issue where response->body_len was 0 during receive * Prevents data loss when buffer needs to grow during receive - Add integer overflow protection in 8 critical locations (#7, #8) * HTTP/2 data callback buffer doubling (http2_logic.c:140) * HTTP/1.1 body buffer reallocation (http1.c:417, 549, 606) * Gzip decompression buffer expansion (compression.c:55) * Response header array growth (response.c:123) * Request header array growth (request.c:112) * Async request array growth (async_request_manager.c:171) * All checks use SIZE_MAX/2 to prevent integer overflow - Fix memory leak in DNS cache deep copy (#13) * Added proper cleanup on allocation failures in addrinfo_deep_copy() * Prevents memory leaks when malloc/strdup fails mid-operation Async HTTP Proxy Improvements: - Fix async HTTP proxy to use absolute URI for proxy requests - Add Proxy-Authorization header support for authenticated HTTP proxies - Properly distinguish between HTTP (uses absolute URI) and HTTPS (uses path) Test Infrastructure: - Add comprehensive edge case security tests (25 test cases) * Integer overflow protection tests * Memory leak prevention tests * Thread safety tests * Boundary condition tests - Add buffer reallocation regression tests (11 test cases) * Large response handling * Gzip decompression * Chunked transfer encoding * Multiple buffer doubling scenarios - Update proxy tests to use httpmorph-bin.bytetunnels.com * Added fixtures for both HTTP and HTTPS testing * HTTPS uses verify=False for self-signed certificates * Improved test reliability by using dedicated test server Results: All 371 tests pass with 14 expected skips
arman-bd
added a commit
that referenced
this pull request
Nov 10, 2025
* fix: critical security vulnerabilities and improve proxy test coverage This commit addresses multiple security issues discovered during edge case analysis and improves test infrastructure for better reliability. Security Fixes: - Fix HTTP/1.1 body reallocation bug causing data loss (#1) * Modified realloc_body_buffer() to use current_data_size parameter * Fixes issue where response->body_len was 0 during receive * Prevents data loss when buffer needs to grow during receive - Add integer overflow protection in 8 critical locations (#7, #8) * HTTP/2 data callback buffer doubling (http2_logic.c:140) * HTTP/1.1 body buffer reallocation (http1.c:417, 549, 606) * Gzip decompression buffer expansion (compression.c:55) * Response header array growth (response.c:123) * Request header array growth (request.c:112) * Async request array growth (async_request_manager.c:171) * All checks use SIZE_MAX/2 to prevent integer overflow - Fix memory leak in DNS cache deep copy (#13) * Added proper cleanup on allocation failures in addrinfo_deep_copy() * Prevents memory leaks when malloc/strdup fails mid-operation Async HTTP Proxy Improvements: - Fix async HTTP proxy to use absolute URI for proxy requests - Add Proxy-Authorization header support for authenticated HTTP proxies - Properly distinguish between HTTP (uses absolute URI) and HTTPS (uses path) Test Infrastructure: - Add comprehensive edge case security tests (25 test cases) * Integer overflow protection tests * Memory leak prevention tests * Thread safety tests * Boundary condition tests - Add buffer reallocation regression tests (11 test cases) * Large response handling * Gzip decompression * Chunked transfer encoding * Multiple buffer doubling scenarios - Update proxy tests to use httpmorph-bin.bytetunnels.com * Added fixtures for both HTTP and HTTPS testing * HTTPS uses verify=False for self-signed certificates * Improved test reliability by using dedicated test server Results: All 371 tests pass with 14 expected skips * chore: more test cases * [FIX] Make dotenv import optional in test files for CI compatibility Fix ModuleNotFoundError in CI environments where python-dotenv is not installed. Changes: - Wrap dotenv import in try/except block in test_buffer_reallocation.py - Wrap dotenv import in try/except block in test_edge_cases_security.py - Follow same pattern as conftest.py for optional dependency handling Impact: - Tests now work in CI without requiring python-dotenv installation - Local development still benefits from .env file loading when dotenv is available - Environment variables can be set directly in CI/CD pipelines Fixes CI failures across all workflows with: ModuleNotFoundError: No module named 'dotenv' * [FIX] Pass TEST_HTTPBIN_HOST secret to CI test workflows Add TEST_HTTPBIN_HOST environment variable to CI workflows to fix test failures. Changes: - Add TEST_HTTPBIN_HOST to workflow secrets in _test.yml - Pass TEST_HTTPBIN_HOST to test environment in _test.yml - Pass TEST_HTTPBIN_HOST from ci.yml to _test.yml workflow Impact: - Edge case security tests can now access httpmorph-bin test server in CI - Buffer reallocation tests can run in CI environment - Fixes collection errors: "TEST_HTTPBIN_HOST environment variable is not set" Related: - Works together with previous commit making dotenv import optional - TEST_HTTPBIN_HOST must be configured as repository secret in GitHub
arman-bd
added a commit
that referenced
this pull request
Nov 10, 2025
This commit addresses multiple security issues discovered during edge case analysis and improves test infrastructure for better reliability. Security Fixes: - Fix HTTP/1.1 body reallocation bug causing data loss (#1) * Modified realloc_body_buffer() to use current_data_size parameter * Fixes issue where response->body_len was 0 during receive * Prevents data loss when buffer needs to grow during receive - Add integer overflow protection in 8 critical locations (#7, #8) * HTTP/2 data callback buffer doubling (http2_logic.c:140) * HTTP/1.1 body buffer reallocation (http1.c:417, 549, 606) * Gzip decompression buffer expansion (compression.c:55) * Response header array growth (response.c:123) * Request header array growth (request.c:112) * Async request array growth (async_request_manager.c:171) * All checks use SIZE_MAX/2 to prevent integer overflow - Fix memory leak in DNS cache deep copy (#13) * Added proper cleanup on allocation failures in addrinfo_deep_copy() * Prevents memory leaks when malloc/strdup fails mid-operation Async HTTP Proxy Improvements: - Fix async HTTP proxy to use absolute URI for proxy requests - Add Proxy-Authorization header support for authenticated HTTP proxies - Properly distinguish between HTTP (uses absolute URI) and HTTPS (uses path) Test Infrastructure: - Add comprehensive edge case security tests (25 test cases) * Integer overflow protection tests * Memory leak prevention tests * Thread safety tests * Boundary condition tests - Add buffer reallocation regression tests (11 test cases) * Large response handling * Gzip decompression * Chunked transfer encoding * Multiple buffer doubling scenarios - Update proxy tests to use httpmorph-bin.bytetunnels.com * Added fixtures for both HTTP and HTTPS testing * HTTPS uses verify=False for self-signed certificates * Improved test reliability by using dedicated test server Results: All 371 tests pass with 14 expected skips
arman-bd
added a commit
that referenced
this pull request
Nov 10, 2025
* fix: critical security vulnerabilities and improve proxy test coverage This commit addresses multiple security issues discovered during edge case analysis and improves test infrastructure for better reliability. Security Fixes: - Fix HTTP/1.1 body reallocation bug causing data loss (#1) * Modified realloc_body_buffer() to use current_data_size parameter * Fixes issue where response->body_len was 0 during receive * Prevents data loss when buffer needs to grow during receive - Add integer overflow protection in 8 critical locations (#7, #8) * HTTP/2 data callback buffer doubling (http2_logic.c:140) * HTTP/1.1 body buffer reallocation (http1.c:417, 549, 606) * Gzip decompression buffer expansion (compression.c:55) * Response header array growth (response.c:123) * Request header array growth (request.c:112) * Async request array growth (async_request_manager.c:171) * All checks use SIZE_MAX/2 to prevent integer overflow - Fix memory leak in DNS cache deep copy (#13) * Added proper cleanup on allocation failures in addrinfo_deep_copy() * Prevents memory leaks when malloc/strdup fails mid-operation Async HTTP Proxy Improvements: - Fix async HTTP proxy to use absolute URI for proxy requests - Add Proxy-Authorization header support for authenticated HTTP proxies - Properly distinguish between HTTP (uses absolute URI) and HTTPS (uses path) Test Infrastructure: - Add comprehensive edge case security tests (25 test cases) * Integer overflow protection tests * Memory leak prevention tests * Thread safety tests * Boundary condition tests - Add buffer reallocation regression tests (11 test cases) * Large response handling * Gzip decompression * Chunked transfer encoding * Multiple buffer doubling scenarios - Update proxy tests to use httpmorph-bin.bytetunnels.com * Added fixtures for both HTTP and HTTPS testing * HTTPS uses verify=False for self-signed certificates * Improved test reliability by using dedicated test server Results: All 371 tests pass with 14 expected skips * chore: more test cases * [FIX] Make dotenv import optional in test files for CI compatibility Fix ModuleNotFoundError in CI environments where python-dotenv is not installed. Changes: - Wrap dotenv import in try/except block in test_buffer_reallocation.py - Wrap dotenv import in try/except block in test_edge_cases_security.py - Follow same pattern as conftest.py for optional dependency handling Impact: - Tests now work in CI without requiring python-dotenv installation - Local development still benefits from .env file loading when dotenv is available - Environment variables can be set directly in CI/CD pipelines Fixes CI failures across all workflows with: ModuleNotFoundError: No module named 'dotenv' * [FIX] Pass TEST_HTTPBIN_HOST secret to CI test workflows Add TEST_HTTPBIN_HOST environment variable to CI workflows to fix test failures. Changes: - Add TEST_HTTPBIN_HOST to workflow secrets in _test.yml - Pass TEST_HTTPBIN_HOST to test environment in _test.yml - Pass TEST_HTTPBIN_HOST from ci.yml to _test.yml workflow Impact: - Edge case security tests can now access httpmorph-bin test server in CI - Buffer reallocation tests can run in CI environment - Fixes collection errors: "TEST_HTTPBIN_HOST environment variable is not set" Related: - Works together with previous commit making dotenv import optional - TEST_HTTPBIN_HOST must be configured as repository secret in GitHub * Release v0.2.5 ## Security Fixes This release addresses 9 critical security vulnerabilities discovered during code analysis: ### 1. HTTP/1.1 Body Reallocation Bug - **Severity**: HIGH - Data loss during response handling - **Impact**: Response body data was being discarded when buffer needed to grow - **Fix**: Corrected realloc_body_buffer() to track actual data size - **File**: src/core/http1.c:31 ### 2. Integer Overflow Protection (8 locations) - **Severity**: CRITICAL - Heap overflow vulnerability - **Impact**: Buffer doubling operations could overflow on large responses - **Locations**: HTTP/2 data callback, HTTP/1.1 body buffer, gzip decompression, response/request headers, async requests - **Fix**: Added overflow checks using SIZE_MAX/2 before all buffer doubling ### 3. DNS Cache Memory Leak - **Severity**: MEDIUM - Memory leak on allocation failure - **Fix**: Proper cleanup on all error paths in addrinfo_deep_copy() - **File**: src/core/network.c:78-123 ## Improvements ### Async HTTP Proxy - Use absolute URI for HTTP requests through proxy - Add Proxy-Authorization header for authenticated proxies - Proper HTTP vs HTTPS proxy distinction - **File**: src/core/async_request.c:1012-1064 ### CI/CD - Enhanced test configuration with proper secret handling - Improved workflow environment variable passing ## Changed Files **Core Security Fixes**: - src/core/http1.c - Body reallocation + overflow checks - src/core/http2_logic.c - Integer overflow protection - src/core/compression.c - Decompression overflow check - src/core/response.c - Header array overflow check - src/core/request.c - Header array overflow check - src/core/async_request_manager.c - Request array overflow check - src/core/async_request.c - HTTP proxy improvements - src/core/network.c - DNS cache memory leak fix **Infrastructure**: - .github/workflows/_test.yml - Enhanced test configuration - .github/workflows/ci.yml - Improved workflow secrets - tests/* - Comprehensive security test coverage ## Impact - **Security**: All 9 vulnerabilities patched - **Performance**: No regression - O(1) overflow checks - **Compatibility**: No breaking changes ## Upgrade Recommendation⚠️ **Immediate upgrade recommended** to prevent: - Data loss during large response handling - Heap overflow from malicious or large responses - Memory leaks during DNS operations
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
No description provided.