Skip to content

[Fix] Rollback to httpx==0.27.0 #11146

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 4 commits into from
May 26, 2025
Merged

[Fix] Rollback to httpx==0.27.0 #11146

merged 4 commits into from
May 26, 2025

Conversation

ishaan-jaff
Copy link
Contributor

@ishaan-jaff ishaan-jaff commented May 25, 2025

[Fix] Rollback to httpx==0.27.0

This PR removes the dependency on httpx‐aiohttp to support an older version of httpx by adjusting transport creation logic

Relevant issues

Pre-Submission checklist

Please complete all items before asking a LiteLLM maintainer to review your PR

  • I have Added testing in the tests/litellm/ directory, Adding at least 1 test is a hard requirement - see details
  • I have added a screenshot of my new test passing locally
  • My PR passes all unit tests on make test-unit
  • My PR's scope is as isolated as possible, it only solves 1 specific problem

Type

🆕 New Feature
✅ Test

Changes

Copy link

vercel bot commented May 25, 2025

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
litellm ✅ Ready (Inspect) Visit Preview 💬 Add feedback May 26, 2025 5:44pm

@ishaan-jaff ishaan-jaff requested a review from Copilot May 26, 2025 17:41
Copy link
Contributor

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR removes the dependency on httpx‐aiohttp to support an older version of httpx by adjusting transport creation logic and cleaning up related tests and code. Key changes include:

  • Removal of the aiohttp transport creation test from tests/litellm/llms/custom_httpx/test_http_handler.py.
  • Deletion of the httpx-aiohttp dependency in pyproject.toml.
  • Simplification of the transport creation condition in http_handler.py by eliminating the aiohttp_transport_exists check.
  • Updates in aiohttp_transport.py to support the revised transport handling.

Reviewed Changes

Copilot reviewed 6 out of 6 changed files in this pull request and generated 2 comments.

File Description
tests/litellm/llms/custom_httpx/test_http_handler.py Removed test for aiohttp transport creation
pyproject.toml Removed the httpx-aiohttp dependency
litellm/llms/custom_httpx/http_handler.py Simplified transport creation logic
litellm/llms/custom_httpx/aiohttp_transport.py Updates to exception mapping and transport class implementation
Comments suppressed due to low confidence (1)

pyproject.toml:23

  • Consider updating the project's dependency documentation or migration notes to reflect the removal of the 'httpx-aiohttp' dependency.
httpx = ">=0.23.0"

AsyncHTTPHandler._should_use_aiohttp_transport()
and AsyncHTTPHandler.aiohttp_transport_exists()
):
if AsyncHTTPHandler._should_use_aiohttp_transport():
Copy link
Preview

Copilot AI May 26, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Update the associated docstring or inline comments to indicate that the 'aiohttp_transport_exists' check has been removed, ensuring that future maintainers understand the adjusted transport creation logic.

Copilot uses AI. Check for mistakes.

@ishaan-jaff ishaan-jaff changed the title [Fix] Use old httpx version [Fix] Rollback to httpx==0.27.0 May 26, 2025
@ishaan-jaff ishaan-jaff merged commit 1876b3a into main May 26, 2025
10 of 46 checks passed
ishaan-jaff added a commit that referenced this pull request May 30, 2025
* fix - fix - use old httpx version

* fix - fix - use old httpx version

* fix: test

* fix: comment
@Mazyod
Copy link

Mazyod commented Jun 15, 2025

Hello, any reason why the pin to httpx is set back to 0.27.0?

0.28.1 has nice improvements to SSL certificates handling that would help very much in a corporate environment.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants