Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Can the upcoming 0.8.0 be released before March 2024 #107

Open
walkinrain369 opened this issue Jan 23, 2024 · 8 comments
Open

Can the upcoming 0.8.0 be released before March 2024 #107

walkinrain369 opened this issue Jan 23, 2024 · 8 comments

Comments

@walkinrain369
Copy link

v0.8.0rc2 has been released on Sep 29, 2023 and I'd like to know whether can 0.8.0 released before March 2024.Thank you.

@nicostubi
Copy link

Hello,

Will this library be regularly maintained? We are working with Python 3.11 in my company, and the latest official version (0.7) is a no go for us.

Best Regards,
Nicolas

@tiran
Copy link
Owner

tiran commented Aug 2, 2024

@nicostubi Are you running into any kind of bugs or problems? If yes, then please open a bug report.

I'll release 0.8.0 when I have time to verify the code with 3.13.rc1. There are minimal changes between 0.7 and 0.8, mostly documentation and infrastructure improvements.

@nicostubi
Copy link

No, I am evaluating the possiblity to replace lxml by defusedxml, and the viability of this project is the last question that keep me from evaluating its usage in my current feature branch :-)

@tiran
Copy link
Owner

tiran commented Aug 2, 2024

defusedxml is not a replacement for lxml. It's a wrapper on top of Python's stdlib xml modules to solve DoS vulnerabilities when parsing of XML from untrusted sources. There is also a lxml wrapper with some opinionated settings.

@nicostubi
Copy link

I'm trying to find a solution to CWE-20 raised by Bandit: https://bandit.readthedocs.io/en/latest/blacklists/blacklist_imports.html#b410-import-lxml
Well, I think we are back to this question raised by @djbrown: PyCQA/bandit#767
as defusedxml.lxml is deprecated

@nicostubi
Copy link

after having read this article: https://realpython.com/python-xml-parser/#defuse-the-xml-bomb-with-secure-parsers
I understand a bit more your statement

defusedxml is not a replacement for lxml. It's a wrapper on top of Python's stdlib xml modules to solve DoS vulnerabilities when parsing of XML from untrusted sources

I could use:

>>> import defusedxml.ElementTree as ET
>>> ET.parse("bomb.xml")

and keep on using lxml, or standard libraries if possible.

@vicent4no
Copy link

For this specific case what I've done is to add a #nosec inline comment for lxml since defusedxml actually removes the possible attack vector.

I manually do the parsing using defusedxml afterwards

@nicostubi
Copy link

that's exactly what I've done: I keep my feature implemented with lxml and I ensure the xml can be defused. The only difference is I do use defuse before parsing the xml with lxml and I catch any exception to log, and raise it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants