From: Miss Islington (bot) <31488909+miss-islington@users.noreply.github.com> Date: Mon, 23 Sep 2024 23:34:48 +0000 (+0200) Subject: [3.13] GH-103484: Fix broken links reported by linkcheck (GH-124169) (#124179) X-Git-Tag: v3.13.0rc3~116 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=74edb7d9bc4ab398d1677a7503b56cfbb2e2719b;p=thirdparty%2FPython%2Fcpython.git [3.13] GH-103484: Fix broken links reported by linkcheck (GH-124169) (#124179) GH-103484: Fix broken links reported by linkcheck (GH-124169) (cherry picked from commit ab80c6b402eeec379315fa3df111f6bec2de6900) Co-authored-by: Rafael Fontenelle --- diff --git a/Doc/library/functools.rst b/Doc/library/functools.rst index 5f3607bb132d..008cde399bae 100644 --- a/Doc/library/functools.rst +++ b/Doc/library/functools.rst @@ -218,7 +218,7 @@ The :mod:`functools` module defines the following functions: cache. See :ref:`faq-cache-method-calls` An `LRU (least recently used) cache - `_ + `_ works best when the most recent calls are the best predictors of upcoming calls (for example, the most popular articles on a news server tend to change each day). The cache's size limit assures that the cache does not diff --git a/Doc/library/ssl.rst b/Doc/library/ssl.rst index 7e14fc8c4d3b..01b04032370b 100644 --- a/Doc/library/ssl.rst +++ b/Doc/library/ssl.rst @@ -2759,7 +2759,7 @@ enabled when negotiating a SSL session is possible through the :meth:`SSLContext.set_ciphers` method. Starting from Python 3.2.3, the ssl module disables certain weak ciphers by default, but you may want to further restrict the cipher choice. Be sure to read OpenSSL's documentation -about the `cipher list format `_. +about the `cipher list format `_. If you want to check which ciphers are enabled by a given cipher list, use :meth:`SSLContext.get_ciphers` or the ``openssl ciphers`` command on your system. diff --git a/Doc/whatsnew/2.4.rst b/Doc/whatsnew/2.4.rst index 7e235d4370ed..0ddc9c58e1d0 100644 --- a/Doc/whatsnew/2.4.rst +++ b/Doc/whatsnew/2.4.rst @@ -757,7 +757,7 @@ API that perform ASCII-only conversions, ignoring the locale setting: :c:expr:`double` to an ASCII string. The code for these functions came from the GLib library -(https://developer-old.gnome.org/glib/2.26/), whose developers kindly +(`https://developer-old.gnome.org/glib/2.26/ `__), whose developers kindly relicensed the relevant functions and donated them to the Python Software Foundation. The :mod:`locale` module can now change the numeric locale, letting extensions such as GTK+ produce the correct results. diff --git a/Doc/whatsnew/3.12.rst b/Doc/whatsnew/3.12.rst index add2ffc0e114..78a8bb233079 100644 --- a/Doc/whatsnew/3.12.rst +++ b/Doc/whatsnew/3.12.rst @@ -359,7 +359,7 @@ create an interpreter with its own GIL: /* The new interpreter is now active in the current thread. */ For further examples how to use the C-API for sub-interpreters with a -per-interpreter GIL, see :source:`Modules/_xxsubinterpretersmodule.c`. +per-interpreter GIL, see ``Modules/_xxsubinterpretersmodule.c``. (Contributed by Eric Snow in :gh:`104210`, etc.) diff --git a/Doc/whatsnew/3.2.rst b/Doc/whatsnew/3.2.rst index ba289f5089c7..c09fa8398863 100644 --- a/Doc/whatsnew/3.2.rst +++ b/Doc/whatsnew/3.2.rst @@ -1650,7 +1650,7 @@ for secure (encrypted, authenticated) internet connections: * The :func:`ssl.wrap_socket() ` constructor function now takes a *ciphers* argument. The *ciphers* string lists the allowed encryption algorithms using the format described in the `OpenSSL documentation - `__. + `__. * When linked against recent versions of OpenSSL, the :mod:`ssl` module now supports the Server Name Indication extension to the TLS protocol, allowing diff --git a/Doc/whatsnew/3.4.rst b/Doc/whatsnew/3.4.rst index b5f217714e66..71425120c371 100644 --- a/Doc/whatsnew/3.4.rst +++ b/Doc/whatsnew/3.4.rst @@ -1962,7 +1962,7 @@ Other Improvements `_ will build python, run the test suite, and generate an HTML coverage report for the C codebase using ``gcov`` and `lcov - `_. + `_. * The ``-R`` option to the :ref:`python regression test suite ` now also checks for memory allocation leaks, using