Bump psutil from 1.2.1 to 5.6.6 in /odoo61/files
Created by: dependabot[bot]
Bumps psutil from 1.2.1 to 5.6.6.
Changelog
Sourced from psutil's changelog.
5.6.6
2019-11-25
Bug fixes
- 1179_: [Linux] Process cmdline() now takes into account misbehaving processes renaming the command line and using inappropriate chars to separate args.
- 1616_: use of Py_DECREF instead of Py_CLEAR will result in double free and segfault (
CVE-2019-18874 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18874>
__). (patch by Riccardo Schirone)- 1619_: [OpenBSD] compilation fails due to C syntax error. (patch by Nathan Houghton)
5.6.5
2019-11-06
Bug fixes
- 1615_: remove pyproject.toml as it was causing installation issues.
5.6.4
2019-11-04
Enhancements
- 1527_: [Linux] added Process.cpu_times().iowait counter, which is the time spent waiting for blocking I/O to complete.
- 1565_: add PEP 517/8 build backend and requirements specification for better pip integration. (patch by Bernát Gábor)
Bug fixes
... (truncated)
- 875_: [Windows] Process' cmdline(), environ() or cwd() may occasionally fail with ERROR_PARTIAL_COPY which now gets translated to AccessDenied.
- 1126_: [Linux] cpu_affinity() segfaults on CentOS 5 / manylinux. cpu_affinity() support for CentOS 5 was removed.
- 1528_: [AIX] compilation error on AIX 7.2 due to 32 vs 64 bit differences. (patch by Arnon Yaari)
- 1535_: 'type' and 'family' fields returned by net_connections() are not always turned into enums.
- 1536_: [NetBSD] process cmdline() erroneously raise ZombieProcess error if cmdline has non encodable chars.
- 1546_: usage percent may be rounded to 0 on Python 2.
Commits
-
c6cd256
pre release -
b2414b8
revert #1595 -
c63369e
updat HISTORY -
edb20f6
linux, cmdline(), fix for #1179, comment 552984549: sometimes string ends wit... -
d739cbb
use PROCESS_QUERY_LIMITED_INFORMATION -
f7e898b
#1595: use psutil_pid_is_running() instead of GetExitCodeProcess -
72c84cb
#fix #1595 / windows: kill() may not raise AccessDenied -
1f8d432
Merge branch 'master' of github.com:giampaolo/psutil -
e6faebc
release gil around users()/BSD (#1425) -
5cb1b0b
Merge branch 'master' of github.com:giampaolo/psutil - Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebase
will rebase this PR -
@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it -
@dependabot merge
will merge this PR after your CI passes on it -
@dependabot squash and merge
will squash and merge this PR after your CI passes on it -
@dependabot cancel merge
will cancel a previously requested merge and block automerging -
@dependabot reopen
will reopen this PR if it is closed -
@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) -
@dependabot use these labels
will set the current labels as the default for future PRs for this repo and language -
@dependabot use these reviewers
will set the current reviewers as the default for future PRs for this repo and language -
@dependabot use these assignees
will set the current assignees as the default for future PRs for this repo and language -
@dependabot use this milestone
will set the current milestone as the default for future PRs for this repo and language
You can disable automated security fix PRs for this repo from the Security Alerts page.