[issue29539] [smtplib] collect response data for all recipients

2019-02-28 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: i have a fully built patch and personally tested (i use it 24/7) but haven't done test_* yet as was requested On Thu, Feb 28, 2019 at 9:16 PM Windson Yang wrote: > > Windson Yang added the comment: > > sls, are you working on

[issue29539] [smtplib] collect response data for all recipients

2018-06-04 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: Yes, it is distinctly intended to collect the results for every recipient as in modern MTAs, there's more than just success/fail results. This is to collect data such as queue ID and the MTA's programmatic response for each

[issue29539] [smtplib] collect response data for all recipients

2018-06-02 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: 3.7 release candidates are in the queue, any thoughts on this simple enhancement? -- ___ Python tracker <https://bugs.python.org/issue29

[issue29470] ssl: SNI callbacks should not modify context objects

2017-02-15 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: yes, after i've modified my tool and ensured i know the correct way of doing it. one of the problems i'm dealing with is not carting around a global variable holding prebuilt contexts. i find it u

[issue29470] ssl: SNI callbacks should not modify context objects

2017-02-15 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: @Christian, that was years ago and there were few examples available of people that had tried to make an SNI capable server. in several cases, people were monkey patching to make a callback. .set_servername_callback() didn't formally show

[issue29470] [python] Error in `/usr/bin/python': free(): invalid size: 0x00007f628400d0e0; ssl SNI callbacks should not modify context objects

2017-02-15 Thread David Ford (FirefighterBlu3)
Changes by David Ford (FirefighterBlu3) : -- title: [python] Error in `/usr/bin/python': free(): invalid size: 0x7f628400d0e0 -> [python] Error in `/usr/bin/python': free(): invalid size: 0x7f628400d0e0; ssl SNI callbacks should not modify co

[issue29470] [python] Error in `/usr/bin/python': free(): invalid size: 0x00007f628400d0e0

2017-02-15 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: yes, i create a context and then when a request comes in, i load the appropriate key. this is how most [all?] SNI capable python server examples show how to do it, or did, at the time I wrote this module a few years ago. from that time, ~py 3.2

[issue29564] ResourceWarning tracking is attaching incorrect file:position to unclosed socket

2017-02-15 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: @stinner your traceback suggestion was highly useful and much appreciated. i have spent several dozen hours researching ResourceWarnings in the past and tearing my hair out because the emitted warning was very much useless. i couldn't even

[issue29564] ResourceWarning tracking is attaching incorrect file:position to unclosed socket

2017-02-15 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: i quite understand the way objects can be associated with reference counts by using a, a.b, c=a.b, d=a, etc etc, and how they increase/decrease and when the GC can prune the objects. yes, the root issue is the unclosed web socket and i&#x

[issue29564] ResourceWarning tracking is attaching incorrect file:position to unclosed socket

2017-02-15 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: i do know what's causing it, it's the twilio module not cleanly finishing up. i pointed out my call to this in the initial description. /usr/lib/python3.6/site-packages/httplib2/__init__.py:857: DeprecationWarning: key_file, cer

[issue29470] [python] Error in `/usr/bin/python': free(): invalid size: 0x00007f628400d0e0

2017-02-14 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: Arch Linux (updated ~weekly but not often rebooted) on a Digital Ocean droplet. Kernel 4.5.1-1-ARCH, x86_64, OpenSSL 1.0.2j, Python 3.6.0 -- ___ Python tracker <http://bugs.python.org/issue29

[issue29470] [python] Error in `/usr/bin/python': free(): invalid size: 0x00007f628400d0e0

2017-02-14 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: my SNI callback is a function that chooses which SSL certificate to load and summarized is: 6 def sni_callback(sock, servername, context): [...] 44 # load a specific crt/key 45 store = crtstore[servername] 46 47

[issue29470] [python] Error in `/usr/bin/python': free(): invalid size: 0x00007f628400d0e0

2017-02-14 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: in process of creating a non-stripped python install. the default Arch Linux PKGBUILD uses xvfb-run at the end of the build process which is crashing. -- ___ Python tracker <http://bugs.python.

[issue29564] ResourceWarning tracking is attaching incorrect file:position to unclosed socket

2017-02-14 Thread David Ford (FirefighterBlu3)
New submission from David Ford (FirefighterBlu3): the following warning is incorrectly reported as initiated at psycopg2/extras.py:314, it actually occurs inside the Twilio python module. /usr/lib/python3.6/site-packages/psycopg2/extras.py:314: ResourceWarning: unclosed ts = super

[issue29470] [python] Error in `/usr/bin/python': free(): invalid size: 0x00007f628400d0e0

2017-02-14 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: 2017-02-14 06:58:29 INFO connected: mustang.blue-labs.org/107.170.82.162:37188 2017-02-14 06:58:29 INFO No cert required for this host *** Error in `/usr/bin/python': double free or corruption (out): 0x7fb0f8003400 *** 2017-02-14 06:

[issue29539] [smtplib] collect response data for all recipients

2017-02-12 Thread David Ford (FirefighterBlu3)
New submission from David Ford (FirefighterBlu3): Feature request; collect SMTP response results for all recipients so data likely including the queue ID or SMTP delay expectation can be collected I propose the keyword "keep_results=False" be added to smtplib.sendmail() to accom

[issue29470] [python] Error in `/usr/bin/python': free(): invalid size: 0x00007f628400d0e0

2017-02-07 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: yes, it's running now, hasn't crashed yet -- ___ Python tracker <http://bugs.python.org/issue29470> ___ ___

[issue29470] [python] Error in `/usr/bin/python': free(): invalid size: 0x00007f628400d0e0

2017-02-07 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: does the builtin memory debugger handle things well such as when involving external libraries like ssl/libcrypto? -- ___ Python tracker <http://bugs.python.org/issue29

[issue29470] [python] Error in `/usr/bin/python': free(): invalid size: 0x00007f628400d0e0

2017-02-06 Thread David Ford (FirefighterBlu3)
Changes by David Ford (FirefighterBlu3) : -- title: Error in `/usr/bin/python': free(): invalid size: 0x7f628400d0e0 -> [python] Error in `/usr/bin/python': free(): invalid size: 0x7f628400d0e0 ___ Python tracker <http:/

[issue29470] Error in `/usr/bin/python': free(): invalid size: 0x00007f628400d0e0

2017-02-06 Thread David Ford (FirefighterBlu3)
New submission from David Ford (FirefighterBlu3): (Only 3.[56] tested) my application listens on an SSL wrapped port, accepts socket and gets an incoming set of messages. connection time frame is several seconds but due to bad Comcast service frequently we have outages which hang connections

[issue18543] urllib.parse.urlopen shouldn't ignore installed opener when called with any ca* argument

2015-12-28 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: can we get a review on this please? i'd love to move forward and get the fixes in place. -- versions: +Python 3.5, Python 3.6 ___ Python tracker <http://bugs.python.org/is

[issue18543] urllib.parse.urlopen shouldn't ignore installed opener when called with any ca* argument

2015-07-04 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: In my quest for completeness, I discovered a lack of handling given HTTP->HTTPS redirect. So I've attached another version of this patch which ensures an HTTPS handler is installed if such a redirect is found. -- Added fil

[issue23166] urllib2 ignores opener configuration under certain circumstances

2015-07-02 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: I've made a patch for 3.4 that addresses this issue. See issue 18543, latest patch, and test file -- nosy: +David Ford (FirefighterBlu3) ___ Python tracker <http://bugs.python.org/is

[issue18543] urllib.parse.urlopen shouldn't ignore installed opener when called with any ca* argument

2015-07-02 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: Test cases for SSL _opener, contexts and HTTPSHandlers in this file -- Added file: http://bugs.python.org/file39849/ssl_context_tests.py ___ Python tracker <http://bugs.python.org/issue18

[issue18543] urllib.parse.urlopen shouldn't ignore installed opener when called with any ca* argument

2015-07-02 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: Third version of this patch and a short test suite specifically for this problem. per awareness of :issue:`23166` I rewrote my patch to handle subclassed HTTPS handlers. There are also exceptions raised if an attempt to install more than one

[issue18543] urllib.parse.urlopen shouldn't ignore installed opener when called with any ca* argument

2015-07-02 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: perhaps an HTTPSHandler() should only merged into the handler chain if an https URI is found and no existing handler is found that has an https_open() defined -- ___ Python tracker <h

[issue18543] urllib.parse.urlopen shouldn't ignore installed opener when called with any ca* argument

2015-07-02 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: Unfortunately more breakage exists within urllib.request. A context supplied to urlopen() is useless in the following pseudo code: build_some_openers() context = ssl.foo() urlopen('foo.com', context=context) When urlopen() runs, it d

[issue18543] urllib.parse.urlopen shouldn't ignore installed opener when called with any ca* argument

2015-07-02 Thread David Ford (FirefighterBlu3)
David Ford (FirefighterBlu3) added the comment: the attached diff (for py3) fixes the (badly) broken urlopen :} previously, if SSL args were detected, all installed handlers via _opener got wiped out. now, we check if _opener already exists and if so we just make sure the HTTPSHandler is