From: Miss Islington (bot) <31488909+miss-islington@users.noreply.github.com> Date: Tue, 17 Sep 2024 15:19:07 +0000 (+0200) Subject: [3.12] GH-103484: Fix broken links reported by linkcheck (GH-124169) (#124180) X-Git-Tag: v3.12.7~83 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=6840b611dedd67b6dc1b7cd9b5e053cde5f30f6d;p=thirdparty%2FPython%2Fcpython.git [3.12] GH-103484: Fix broken links reported by linkcheck (GH-124169) (#124180) GH-103484: Fix broken links reported by linkcheck (GH-124169) (cherry picked from commit ab80c6b402eeec379315fa3df111f6bec2de6900) Co-authored-by: Rafael Fontenelle --- diff --git a/Doc/library/functools.rst b/Doc/library/functools.rst index 6b6e599842d4..11816714ae33 100644 --- a/Doc/library/functools.rst +++ b/Doc/library/functools.rst @@ -218,7 +218,7 @@ The :mod:`functools` module defines the following functions: cache. See :ref:`faq-cache-method-calls` An `LRU (least recently used) cache - `_ + `_ works best when the most recent calls are the best predictors of upcoming calls (for example, the most popular articles on a news server tend to change each day). The cache's size limit assures that the cache does not diff --git a/Doc/library/ssl.rst b/Doc/library/ssl.rst index bc216e6b551d..f78ab7b1fdf0 100644 --- a/Doc/library/ssl.rst +++ b/Doc/library/ssl.rst @@ -2618,7 +2618,7 @@ enabled when negotiating a SSL session is possible through the :meth:`SSLContext.set_ciphers` method. Starting from Python 3.2.3, the ssl module disables certain weak ciphers by default, but you may want to further restrict the cipher choice. Be sure to read OpenSSL's documentation -about the `cipher list format `_. +about the `cipher list format `_. If you want to check which ciphers are enabled by a given cipher list, use :meth:`SSLContext.get_ciphers` or the ``openssl ciphers`` command on your system. diff --git a/Doc/whatsnew/2.4.rst b/Doc/whatsnew/2.4.rst index 3ad4e9141558..909abfb2a167 100644 --- a/Doc/whatsnew/2.4.rst +++ b/Doc/whatsnew/2.4.rst @@ -757,7 +757,7 @@ API that perform ASCII-only conversions, ignoring the locale setting: :c:expr:`double` to an ASCII string. The code for these functions came from the GLib library -(https://developer-old.gnome.org/glib/2.26/), whose developers kindly +(`https://developer-old.gnome.org/glib/2.26/ `__), whose developers kindly relicensed the relevant functions and donated them to the Python Software Foundation. The :mod:`locale` module can now change the numeric locale, letting extensions such as GTK+ produce the correct results. diff --git a/Doc/whatsnew/3.12.rst b/Doc/whatsnew/3.12.rst index 3d213076199b..18a144e76d71 100644 --- a/Doc/whatsnew/3.12.rst +++ b/Doc/whatsnew/3.12.rst @@ -359,7 +359,7 @@ create an interpreter with its own GIL: /* The new interpreter is now active in the current thread. */ For further examples how to use the C-API for sub-interpreters with a -per-interpreter GIL, see :source:`Modules/_xxsubinterpretersmodule.c`. +per-interpreter GIL, see ``Modules/_xxsubinterpretersmodule.c``. (Contributed by Eric Snow in :gh:`104210`, etc.) diff --git a/Doc/whatsnew/3.2.rst b/Doc/whatsnew/3.2.rst index e75066bcf2e8..89c717875e7d 100644 --- a/Doc/whatsnew/3.2.rst +++ b/Doc/whatsnew/3.2.rst @@ -1650,7 +1650,7 @@ for secure (encrypted, authenticated) internet connections: * The :func:`ssl.wrap_socket() ` constructor function now takes a *ciphers* argument. The *ciphers* string lists the allowed encryption algorithms using the format described in the `OpenSSL documentation - `__. + `__. * When linked against recent versions of OpenSSL, the :mod:`ssl` module now supports the Server Name Indication extension to the TLS protocol, allowing diff --git a/Doc/whatsnew/3.4.rst b/Doc/whatsnew/3.4.rst index 3cf50e428e21..79dbfc5788d9 100644 --- a/Doc/whatsnew/3.4.rst +++ b/Doc/whatsnew/3.4.rst @@ -1962,7 +1962,7 @@ Other Improvements `_ will build python, run the test suite, and generate an HTML coverage report for the C codebase using ``gcov`` and `lcov - `_. + `_. * The ``-R`` option to the :ref:`python regression test suite ` now also checks for memory allocation leaks, using