New submission from Ryan Smith-Roberts:
socket.sendto is apparently even weirder than addch or range: the optional
argument is in the *middle*. Attempting this configuration gets me:
Function sendto has an unsupported group configuration. (Unexpected state 5)
An expected unexpected
Vajrasky Kok added the comment:
Okay, this is my second attempt. I want to get METH_VARGS but I always get
METH_O for positional parameters. Is there any way to circumvent this? The
documentation does not cover this.
--
Added file:
Changes by Serhiy Storchaka storch...@gmail.com:
--
assignee: - eli.bendersky
dependencies: +Add docstrings for ElementTree module
stage: needs patch - patch review
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20159
New submission from Serhiy Storchaka:
In 3.4 pydoc fails for the TkappType and TkttType names in the _tkinter module.
$ ./python -m pydoc _tkinter.TkappType
Traceback (most recent call last):
File /home/serhiy/py/cpython/Lib/runpy.py, line 189, in _run_module_as_main
__main__, mod_spec)
Changes by Antoine Pitrou pit...@free.fr:
--
nosy: +brett.cannon, eric.snow, ncoghlan
priority: normal - high
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20204
___
Stefano Lattarini added the comment:
Since I too was bitten by this issue, I'd like to support Gregory's
request, and report my rationale for changing the current behaviour.
With the current behaviour, we could see (and I *have* seen) scenarios
like this:
1. A test exposing a known
Roundup Robot added the comment:
New changeset 0cf1defd5ac4 by Serhiy Storchaka in branch '3.3':
Issue #20078: Reading malformed zipfiles no longer hangs with 100% CPU
http://hg.python.org/cpython/rev/0cf1defd5ac4
New changeset 79ea4ce431b1 by Serhiy Storchaka in branch 'default':
Issue #20078:
New submission from Stefan Müller:
Following situation
* python 2.7.6
* module loaded via a PEP302 loader.
* the loader has get_source(fullname)
* assigns a dummy string as a file: module.__file__ == mymodule
Then
inspect.getsource(module)
throws
IOError: could not get source code
I
New submission from Andras Timar:
Try this sample script:
# coding=utf-8
import email
import email.charset
import email.message
c = email.charset.Charset('utf-8')
c.body_encoding = email.charset.QP
m = email.message.Message()
m.set_payload(This is a Greek letter upsilon: υ, c)
Milap Bhojak added the comment:
hope it will fix that issue
--
nosy: +milap.py
versions: +Python 2.7 -Python 3.3
Added file: http://bugs.python.org/file33376/email.py
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20206
Martin Häcker added the comment:
Sorry, I got the title wrong on the first try. (Already corrected).
I think the problem is that the API of dict.keys() is surprising. One gets back
something that behaves like a list, the name 'keys' suggests that it is a list
and for lists there is no
Meador Inge added the comment:
I will pick this one up.
--
assignee: - meador.inge
nosy: +meador.inge
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20178
___
Alan Hourihane added the comment:
Anyone ?
--
resolution: - remind
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue19346
___
___
Python-bugs-list
Changes by Alan Hourihane al...@fairlite.co.uk:
--
resolution: - remind
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue19036
___
___
Alan Hourihane added the comment:
Anyone ?
--
resolution: - remind
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue19348
___
___
Python-bugs-list
Changes by R. David Murray rdmur...@bitdance.com:
--
nosy: +r.david.murray
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20205
___
___
R. David Murray added the comment:
This is a bug in quoprimime.body_encode. If you put a newline on the end of
your string, it will work as expected.
The patch in issue 5803 does not have the bug, so I'll probably just apply that
to both 3.3 and 3.4.
--
components: +email
Stefan Krah added the comment:
Thanks, this is working here for the parameters. Is there a way to
specify the return annotation manually in the docstring?
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20189
Stefan Krah added the comment:
The patch looks correct to me. locale.h is at least C99 (I don't have the
earlier standards).
--
nosy: +skrah
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue19036
STINNER Victor added the comment:
dict.keys() has been changed 5 years ago, when Python 3 was created.
dict.keys() is now a nice read-only view of dictionary keys. When the
dictionary is updated, the view is also updated. See the
documentation:
Roundup Robot added the comment:
New changeset 1bdcaf6c0eb5 by Serhiy Storchaka in branch '3.3':
Issue #18960: Fix bugs with Python source code encoding in the second line.
http://hg.python.org/cpython/rev/1bdcaf6c0eb5
New changeset 04c05e408cbd by Serhiy Storchaka in branch 'default':
Issue
New submission from Alex Gaynor:
SSLv2 has numerous security issues, and thus is in limited use on the web.
Continuing to allow SSLv2 handshakes only serves to limit security.
--
components: Library (Lib)
messages: 207748
nosy: alex
priority: normal
severity: normal
status: open
title:
Donald Stufft added the comment:
+1
--
nosy: +dstufft
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20207
___
___
Python-bugs-list mailing list
Changes by Christian Heimes li...@cheimes.de:
--
nosy: +christian.heimes
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20207
___
___
Antoine Pitrou added the comment:
Here is a patch. Can someone try it with a non-patched OpenSSL? (e.g. OS X)
--
keywords: +patch
Added file: http://bugs.python.org/file33377/no_sslv2.patch
___
Python tracker rep...@bugs.python.org
Antoine Pitrou added the comment:
Note that this probably would have to be applied to 3.x too, for consistency.
--
versions: +Python 3.3, Python 3.4
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20207
Alex Gaynor added the comment:
Yes, OP_NO_SSLv2 should be used by default.
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20207
___
___
Antoine Pitrou added the comment:
(by trying, I mean at least ./python -m test.regrtest -unetwork -v test_ssl)
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20207
___
Alex Gaynor added the comment:
I can confirm the tests pass on OS X and it's possible to open a connection to
howsmyssl.com
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20207
___
New submission from Brett Cannon:
Reported on my G+ share of the latest reworking:
The only part I found confusing is when you first introduce from _future_
import unicode_literals --- it looks like you forgot to explain what it does.
It turns out that you explain it somewhat two paragraphs
Serhiy Storchaka added the comment:
Now traceback test is failed.
http://buildbot.python.org/all/builders/AMD64%20Ubuntu%20LTS%203.3/builds/1358/steps/test/logs/stdio
==
FAIL: test_encoded_file
Changes by Brian Morrow bmorro...@gmail.com:
--
nosy: +bmorrow92
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20175
___
___
Python-bugs-list
Changes by Dmitry Shachnev mity...@gmail.com:
--
nosy: +mitya57
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20208
___
___
Python-bugs-list
Larry Hastings added the comment:
Yes, it's just Python syntax, so you'd use -. However, you are not
permitted to according to PEP 8:
The Python standard library will not use function annotations as that would
result in a premature commitment to a particular annotation style.
--
Alex Gaynor added the comment:
I'm not sure this is needed on Python 3, it already has:
http://hg.python.org/cpython/file/default/Lib/ssl.py#l388
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20207
Antoine Pitrou added the comment:
I'm not sure this is needed on Python 3, it already has:
http://hg.python.org/cpython/file/default/Lib/ssl.py#l388
It doesn't get executed when you create a SSLContext directly, though.
--
___
Python tracker
New submission from Antoine Pitrou:
It sounds like we may deprecate PROTOCOL_SSLv2 in 3.5.
--
components: Library (Lib)
messages: 207762
nosy: christian.heimes, giampaolo.rodola, janssen, pitrou
priority: low
severity: normal
status: open
title: Deprecate PROTOCOL_SSLv2
type: behavior
Hynek Schlawack added the comment:
I’m +1 too since supporting it serves no other purpose then enabling downgrade
attacks. Shipping a client with SSL 2 on is nothing short a security bug.
--
nosy: +hynek
___
Python tracker rep...@bugs.python.org
Antoine Pitrou added the comment:
Please qualify the request a bit: do you mean something should be done in the
ssl module? One solution is to add OP_NO_SSLv2 when the user asks for a
PROTOCOL_SSLv23 socket. Is it what you mean?
--
nosy: +pitrou
type: - behavior
STINNER Victor added the comment:
See also issue #20207.
--
nosy: +haypo
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20209
___
___
Brian Morrow added the comment:
I'll gladly take this bundle.
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20175
___
___
Python-bugs-list
Roundup Robot added the comment:
New changeset 875a514671dd by Serhiy Storchaka in branch '3.3':
Do not reset the line number because we already set file position to correct
http://hg.python.org/cpython/rev/875a514671dd
New changeset 2af308f79727 by Serhiy Storchaka in branch 'default':
Do not
Serhiy Storchaka added the comment:
There would be behavior change if file 'mymodule' exists.
--
nosy: +serhiy.storchaka
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20205
___
Serhiy Storchaka added the comment:
Thank you Nandiya for your report.
--
resolution: - fixed
stage: patch review - committed/rejected
status: open - closed
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20078
Changes by STINNER Victor victor.stin...@gmail.com:
--
nosy: +haypo
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20207
___
___
Python-bugs-list
STINNER Victor added the comment:
Here is a patch. Can someone try it with a non-patched OpenSSL? (e.g. OS X)
How can I test that SSLv2 is disabled?
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20207
Stefan Krah added the comment:
Yes, it's just Python syntax, so you'd use -.
I tried that, but it didn't filter through to inspect.signature().
However, you are not permitted to according to PEP 8:
Ah, too bad. Return annotations are nice.
--
Serhiy Storchaka added the comment:
Perhaps it would be better just use other executable (it is not ran in this
test, just checked that it exists). Bohuslav, what is a content of your /sbin
and /usr/sbin?
--
___
Python tracker
Roundup Robot added the comment:
New changeset 163c09041280 by Antoine Pitrou in branch '2.7':
Issue #20207: Always disable SSLv2 except when PROTOCOL_SSLv2 is explicitly
asked for.
http://hg.python.org/cpython/rev/163c09041280
--
nosy: +python-dev
R. David Murray added the comment:
Maybe the logic needs to be reordered: look for a loader first, before looking
for a file on disk. It seems to me the current lookup order might itself be a
bug.
Note that the code is the same in python3, so the issue exists there as well.
--
nosy:
R. David Murray added the comment:
Why not in 3.4?
--
nosy: +r.david.murray
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20209
___
___
Antoine Pitrou added the comment:
It sounds a bit too late, although that would be Larry's call.
--
nosy: +larry
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20209
___
R. David Murray added the comment:
I don't see why a deprecation would be late, since we haven't hit RC yet. A
deprecation doesn't change the API. But yes, it is Larry's call.
--
___
Python tracker rep...@bugs.python.org
Roundup Robot added the comment:
New changeset 613b403ca9f1 by Antoine Pitrou in branch '3.3':
Issue #20207: Always disable SSLv2 except when PROTOCOL_SSLv2 is explicitly
asked for.
http://hg.python.org/cpython/rev/613b403ca9f1
New changeset e02288de43ed by Antoine Pitrou in branch 'default':
Antoine Pitrou added the comment:
This should be ok now. Let's hope no buildbots will complain...
--
resolution: - fixed
stage: - committed/rejected
status: open - pending
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20207
Changes by Serhiy Storchaka storch...@gmail.com:
--
resolution: - fixed
stage: commit review - committed/rejected
status: open - closed
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue19965
Larry Hastings added the comment:
Would the patch be about as simple as the patch for 2.7 in #20207?
Also, #20207 is also marked for 3.4. Either unmark 3.4/3.5 in #20207, or close
this bug as a duplicate.
--
___
Python tracker
Antoine Pitrou added the comment:
Those bugs are orthogonal, Larry.
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20209
___
___
Larry Hastings added the comment:
Okay, then, can you educate me on what you're proposing here?
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20209
___
Antoine Pitrou added the comment:
The ssl module has an attribute named PROTOCOL_SSLv2 that I'm proposing to
deprecate.
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20209
___
Larry Hastings added the comment:
Is there any way to use SSLv2 in 3.4?
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20209
___
___
Antoine Pitrou added the comment:
Is there any way to use SSLv2 in 3.4?
Yes, by using PROTOCOL_SSLv2.
(you're asking strange questions)
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20209
Larry Hastings added the comment:
I don't have a lot of context for this. It sounds like #20207 proposes to
remove the ability to use SSLv2 at all. And in the comments Alex Gaynor seems
to say that SSLv2 is already disabled in Python 3.
If #20207 happens for 3.4, would it still be possible
Antoine Pitrou added the comment:
If #20207 happens for 3.4, would it still be possible to use SSLv2?
#20207 has already happened for 3.4 and, yes, it's still possible to use SSLv2
(except that many distros also disable SSLv2 in their OpenSSL build).
The commit message is quite clear about
Antoine Pitrou added the comment:
(FTR, Alex's comment mixes up the default settings used by urlopen() with what
the ssl module allows to do when invoked directly)
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20209
Larry Hastings added the comment:
If we removed it completely (which I'm *not* proposing, just gathering data)
how many people would it affect?
Is there any legitimate reason why some people would want SSLv2? Like we
aren't allowed to upgrade this server or something.
--
Serhiy Storchaka added the comment:
Georg, is this issue wort to be fixed in 3.2? If yes, use the patch against 2.7.
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue19279
___
Changes by Serhiy Storchaka storch...@gmail.com:
--
priority: normal - low
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue1776674
___
___
Changes by Serhiy Storchaka storch...@gmail.com:
--
stage: - patch review
versions: +Python 3.4
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue16572
___
Changes by Serhiy Storchaka storch...@gmail.com:
--
priority: normal - low
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue15303
___
___
Adam Tomjack added the comment:
The proposed patches don't fix the problem. They may well allow DDL in
transactions, but that's not the real problem.
A database library must *NEVER* implicitly commit or rollback. That's
completely insane.
import this
...
Explicit is better
Antoine Pitrou added the comment:
If we removed it completely (which I'm *not* proposing, just gathering
data) how many people would it affect?
What I'm proposing is to remove it after we deprecate it.
I don't think it would affect many people, if any, but we still should
have a deprecation
Serhiy Storchaka added the comment:
Raymond, could you please make a decision or delegate this issue to Mark,
Terry, Andrew or me?
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue13355
___
Changes by Serhiy Storchaka storch...@gmail.com:
--
priority: normal - low
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue18787
___
___
Changes by Serhiy Storchaka storch...@gmail.com:
--
priority: normal - low
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue10388
___
___
Larry Hastings added the comment:
Okay, you have my permission to mark it pending deprecated.
What I'm proposing is to remove it after we deprecate it.
I understand the deprecation process. Like I said, I was just trying to get a
sense of how many people would be affected.
--
Changes by Antoine Pitrou pit...@free.fr:
--
versions: +Python 3.4
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20209
___
___
Python-bugs-list
mike bayer added the comment:
see also http://bugs.python.org/issue10740, which also relates to pysqlite
attempting to make guesses as to when transactions should begin and end.
--
___
Python tracker rep...@bugs.python.org
Giampaolo Rodola' added the comment:
Looking back at this: considering we may get errors != EACCESS I think we
better be as generic as possible as in:
--- a/Modules/spwdmodule.c
+++ b/Modules/spwdmodule.c
@@ -153,6 +153,8 @@
if ((d = PyList_New(0)) == NULL)
return NULL;
Roundup Robot added the comment:
New changeset 779de7b4909b by Serhiy Storchaka in branch '2.7':
Issue #13107: argparse and optparse no longer raises an exception when output
http://hg.python.org/cpython/rev/779de7b4909b
New changeset c6c30b682e14 by Serhiy Storchaka in branch '3.3':
Issue
mike bayer added the comment:
well Adam, you might also be surprised to see pysqlite not doing very well on
the *other* side of the equation either; that is, when it *begins* the
transaction. Issue http://bugs.python.org/issue9924 refers to this and like
this one, hasn't seen any activity
Serhiy Storchaka added the comment:
Thank you Adam for your report. Thank you Elazar for your patch.
--
assignee: - serhiy.storchaka
resolution: - fixed
stage: patch review - committed/rejected
status: open - closed
___
Python tracker
Changes by Serhiy Storchaka storch...@gmail.com:
Removed file: http://bugs.python.org/file31848/tempfile_tempdir_cleanup.patch
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue19077
___
Serhiy Storchaka added the comment:
Updated patch to tip.
--
Added file: http://bugs.python.org/file33378/tempfile_tempdir_cleanup.patch
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue19077
Serhiy Storchaka added the comment:
An alternative with weakref.finalize() looks very attractive, but unfortunately
tests are failed with it.
--
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue19077
R. David Murray added the comment:
On Thu, 09 Jan 2014 20:29:15 +, Adam Tomjack rep...@bugs.python.org wrote:
This issue is not an enhancement, it's a bug. One might argue that
fixing it will break existing code, but it won't. Any affected code
is already broken. It's depending on a
Serhiy Storchaka added the comment:
Here is a patch which implements Richard's suggestion. test_del_on_shutdown and
test_warnings_on_cleanup are failed, but perhaps they are wrong.
--
Added file:
http://bugs.python.org/file33379/tempfile_tempdir_cleanup_weakref_finalize.patch
Changes by Thomas Petazzoni thomas.petazz...@free-electrons.com:
--
type: - enhancement
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20210
___
New submission from Thomas Petazzoni:
In the context of space-constrained embedded Linux systems, installing the
entire set of Python modules and extensions is not necessarily desirable. For
example, all the test modules, as well as certain extensions requiring
third-parties libraries are
Changes by Thomas Petazzoni thomas.petazz...@free-electrons.com:
--
keywords: +patch
Added file:
http://bugs.python.org/file33380/0001-Add-infrastructure-to-disable-the-build-of-certain-e.patch
___
Python tracker rep...@bugs.python.org
Changes by Thomas Petazzoni thomas.petazz...@free-electrons.com:
Added file:
http://bugs.python.org/file33382/0003-Add-an-option-to-disable-pydoc.patch
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20210
Changes by Thomas Petazzoni thomas.petazz...@free-electrons.com:
Added file:
http://bugs.python.org/file33383/0004-Add-an-option-to-disable-lib2to3.patch
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20210
Changes by Thomas Petazzoni thomas.petazz...@free-electrons.com:
Added file:
http://bugs.python.org/file33381/0002-Add-an-option-to-disable-installation-of-test-module.patch
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20210
Changes by Thomas Petazzoni thomas.petazz...@free-electrons.com:
Added file:
http://bugs.python.org/file33384/0005-Add-option-to-disable-the-sqlite3-module.patch
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20210
Changes by Thomas Petazzoni thomas.petazz...@free-electrons.com:
Added file:
http://bugs.python.org/file33385/0006-Add-an-option-to-disable-the-tk-module.patch
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20210
Changes by Thomas Petazzoni thomas.petazz...@free-electrons.com:
Added file:
http://bugs.python.org/file33387/0008-Add-an-option-to-disable-expat.patch
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20210
Changes by Thomas Petazzoni thomas.petazz...@free-electrons.com:
Added file:
http://bugs.python.org/file33386/0007-Add-an-option-to-disable-the-curses-module.patch
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20210
Changes by Thomas Petazzoni thomas.petazz...@free-electrons.com:
Added file:
http://bugs.python.org/file33389/0010-Add-an-option-to-disable-NIS.patch
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20210
Changes by Thomas Petazzoni thomas.petazz...@free-electrons.com:
Added file:
http://bugs.python.org/file33391/0012-Add-an-option-to-disable-IDLE.patch
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20210
Changes by Thomas Petazzoni thomas.petazz...@free-electrons.com:
Added file:
http://bugs.python.org/file33388/0009-Add-an-option-to-disable-CJK-codecs.patch
___
Python tracker rep...@bugs.python.org
http://bugs.python.org/issue20210
1 - 100 of 140 matches
Mail list logo