]> git.ipfire.org Git - thirdparty/Python/cpython.git/log
thirdparty/Python/cpython.git
15 months ago[3.10] gh-122133: Authenticate socket connection for `socket.socketpair()` fallback...
Miss Islington (bot) [Tue, 30 Jul 2024 12:44:16 +0000 (14:44 +0200)] 
[3.10] gh-122133: Authenticate socket connection for `socket.socketpair()` fallback (GH-122134) (#122427)

Authenticate socket connection for `socket.socketpair()` fallback when the platform does not have a native `socketpair` C API.  We authenticate in-process using `getsocketname` and `getpeername` (thanks to Nathaniel J Smith for that suggestion).

(cherry picked from commit 78df1043dbdce5c989600616f9f87b4ee72944e5)

Co-authored-by: Seth Michael Larson <seth@python.org>
Co-authored-by: Gregory P. Smith <greg@krypto.org>
15 months ago[3.10] gh-121957: Emit audit events for python -i and python -m asyncio (GH-122119)
Łukasz Langa [Mon, 22 Jul 2024 11:48:50 +0000 (13:48 +0200)] 
[3.10] gh-121957: Emit audit events for python -i and python -m asyncio (GH-122119)

17 months ago[3.10] gh-112769: test_zlib: test_zlib: Fix comparison of ZLIB_RUNTIME_VERSION with...
Ned Deily [Tue, 28 May 2024 15:57:05 +0000 (11:57 -0400)] 
[3.10] gh-112769: test_zlib: test_zlib: Fix comparison of ZLIB_RUNTIME_VERSION with non-int suffix (GH-112771) (#119565)

[3.10] gh-112769: test_zlib: test_zlib: Fix comparison of ZLIB_RUNTIME_VERSION with non-int suffix

zlib-ng defines the version as "1.3.0.zlib-ng".
(cherry picked from commit d384813)

Co-authored-by: Miro Hrončok miro@hroncok.cz
17 months ago[3.10] gh-118486: Support mkdir(mode=0o700) on Windows (GH-118488) (GH-118740)
Steve Dower [Fri, 24 May 2024 17:26:44 +0000 (18:26 +0100)] 
[3.10] gh-118486: Support mkdir(mode=0o700) on Windows (GH-118488) (GH-118740)

Co-authored-by: Łukasz Langa <lukasz@langa.pl>
18 months ago[3.10] gh-100454: Fix running SSL tests with OpenSSL 3.1+ (GH-100456) (GH-118262)
Dimitri John Ledkov [Tue, 7 May 2024 10:00:40 +0000 (11:00 +0100)] 
[3.10] gh-100454: Fix running SSL tests with OpenSSL 3.1+ (GH-100456) (GH-118262)

This fixes Ubuntu pipeline with OpenSSL 3.1+

Co-authored-by: Illia Volochii <illia.volochii@gmail.com>
18 months ago[3.10] gh-113171: gh-65056: Fix "private" (non-global) IP address ranges (GH-113179...
Petr Viktorin [Tue, 7 May 2024 09:56:13 +0000 (11:56 +0200)] 
[3.10] gh-113171: gh-65056: Fix "private" (non-global) IP address ranges (GH-113179) (GH-113186) (GH-118177) (GH-118229)

The _private_networks variables, used by various is_private
implementations, were missing some ranges and at the same time had
overly strict ranges (where there are more specific ranges considered
globally reachable by the IANA registries).

This patch updates the ranges with what was missing or otherwise
incorrect.

100.64.0.0/10 is left alone, for now, as it's been made special in [1].

The _address_exclude_many() call returns 8 networks for IPv4, 121
networks for IPv6.

[1] https://github.com/python/cpython/issues/61602

In 3.10 and below, is_private checks whether the network and broadcast
address are both private.
In later versions (where the test wss backported from), it checks
whether they both are in the same private network.

For 0.0.0.0/0, both 0.0.0.0 and 255.225.255.255 are private,
but one is in 0.0.0.0/8 ("This network") and the other in
255.255.255.255/32 ("Limited broadcast").

---------

Co-authored-by: Jakub Stasiak <jakub@stasiak.at>
18 months ago[3.10] gh-116741: Upgrade libexpat to 2.6.2 (GH-117296) (GH-118186)
Seth Michael Larson [Tue, 7 May 2024 08:50:19 +0000 (03:50 -0500)] 
[3.10] gh-116741: Upgrade libexpat to 2.6.2 (GH-117296) (GH-118186)

(cherry picked from commit c9829eec0883a8991ea4d319d965e123a3cf6c20)

18 months ago[3.10] gh-114539: Clarify implicit launching of shells by subprocess (GH-117996)...
Miss Islington (bot) [Tue, 7 May 2024 08:47:46 +0000 (10:47 +0200)] 
[3.10] gh-114539: Clarify implicit launching of shells by subprocess (GH-117996) (GH-118004)

(cherry picked from commit a4b44d39cd6941cc03590fee7538776728bdfd0a)

Co-authored-by: Steve Dower <steve.dower@python.org>
19 months ago[3.10] gh-116773: Fix overlapped memory corruption crash (GH-116774) (GH-117079)
jkriegshauser [Wed, 27 Mar 2024 15:24:34 +0000 (08:24 -0700)] 
[3.10] gh-116773: Fix overlapped memory corruption crash (GH-116774) (GH-117079)

Co-authored-by: Łukasz Langa <lukasz@langa.pl>
19 months ago[3.10] gh-117187: Fix XML tests for vanilla Expat <2.6.0 (GH-117203) (GH-117246)
Miss Islington (bot) [Wed, 27 Mar 2024 13:44:58 +0000 (14:44 +0100)] 
[3.10] gh-117187: Fix XML tests for vanilla Expat <2.6.0 (GH-117203) (GH-117246)

This fixes XML unittest fallout from the https://github.com/python/cpython/issues/115398 security fix.  When configured using `--with-system-expat` on systems with older pre 2.6.0 versions of libexpat, our unittests were failing.

Co-authored-by: Sebastian Pipping <sebastian@pipping.org>
19 months agoPost 3.10.14
Łukasz Langa [Tue, 19 Mar 2024 23:40:17 +0000 (00:40 +0100)] 
Post 3.10.14

19 months agoPython 3.10.14 v3.10.14
Łukasz Langa [Tue, 19 Mar 2024 21:42:28 +0000 (22:42 +0100)] 
Python 3.10.14

19 months ago[3.10] gh-115197: Stop resolving host in urllib.request proxy bypass (GH-115210)...
Miss Islington (bot) [Tue, 19 Mar 2024 10:53:33 +0000 (11:53 +0100)] 
[3.10] gh-115197: Stop resolving host in urllib.request proxy bypass (GH-115210) (GH-116070)

Use of a proxy is intended to defer DNS for the hosts to the proxy itself, rather than a potential for information leak of the host doing DNS resolution itself for any reason.  Proxy bypass lists are strictly name based.  Most implementations of proxy support agree.
(cherry picked from commit c43b26d02eaa103756c250e8d36829d388c5f3be)

Co-authored-by: Weii Wang <weii.wang@canonical.com>
20 months ago[3.10] gh-115398: Expose Expat >=2.6.0 reparse deferral API (CVE-2023-52425) (GH...
Sebastian Pipping [Wed, 6 Mar 2024 23:02:55 +0000 (00:02 +0100)] 
[3.10] gh-115398: Expose Expat >=2.6.0 reparse deferral API (CVE-2023-52425) (GH-115623) (GH-116270)

Allow controlling Expat >=2.6.0 reparse deferral (CVE-2023-52425) by adding five new methods:

- `xml.etree.ElementTree.XMLParser.flush`
- `xml.etree.ElementTree.XMLPullParser.flush`
- `xml.parsers.expat.xmlparser.GetReparseDeferralEnabled`
- `xml.parsers.expat.xmlparser.SetReparseDeferralEnabled`
- `xml.sax.expatreader.ExpatParser.flush`

Based on the "flush" idea from https://github.com/python/cpython/pull/115138#issuecomment-1932444270 .

Includes code suggested-by: Snild Dolkow <snild@sony.com>
and by core dev Serhiy Storchaka.

Co-authored-by: Gregory P. Smith <greg@krypto.org>
20 months ago[3.10] gh-115399: Document CVE-2023-52425 under "XML vulnerabilities" (GH-115400...
Miss Islington (bot) [Wed, 21 Feb 2024 11:43:27 +0000 (12:43 +0100)] 
[3.10] gh-115399: Document CVE-2023-52425 under "XML vulnerabilities" (GH-115400) (GH-115762)

Doc/library/xml.rst: Document CVE-2023-52425 under "XML vulnerabilities"
(cherry picked from commit fbd40ce46e7335a5dbaf48a3aa841be22d7302ba)

Co-authored-by: Sebastian Pipping <sebastian@pipping.org>
20 months ago[3.10] gh-114572: Fix locking in cert_store_stats and get_ca_certs (GH-114573) (...
Miss Islington (bot) [Tue, 20 Feb 2024 16:35:27 +0000 (17:35 +0100)] 
[3.10] gh-114572: Fix locking in cert_store_stats and get_ca_certs (GH-114573) (#115548)

gh-114572: Fix locking in cert_store_stats and get_ca_certs (GH-114573)

* gh-114572: Fix locking in cert_store_stats and get_ca_certs

cert_store_stats and get_ca_certs query the SSLContext's X509_STORE with
X509_STORE_get0_objects, but reading the result requires a lock. See
https://github.com/openssl/openssl/pull/23224 for details.

Instead, use X509_STORE_get1_objects, newly added in that PR.
X509_STORE_get1_objects does not exist in current OpenSSLs, but we can
polyfill it with X509_STORE_lock and X509_STORE_unlock.

* Work around const-correctness problem

* Add missing X509_STORE_get1_objects failure check

* Add blurb
(cherry picked from commit bce693111bff906ccf9281c22371331aaff766ab)

Co-authored-by: David Benjamin <davidben@google.com>
20 months ago[3.10] Upgrade bundled libexpat to 2.6.0 (GH-115399) (GH-115468) (#115473)
Miss Islington (bot) [Mon, 19 Feb 2024 14:58:39 +0000 (15:58 +0100)] 
[3.10] Upgrade bundled libexpat to 2.6.0 (GH-115399) (GH-115468) (#115473)

Manual backport due to code differences.
(cherry picked from commit e071b0d558b2f5cddd5a9fc6afadb4ba109ec77e)

Co-authored-by: Seth Michael Larson <seth@python.org>
20 months ago[3.10] gh-97032: avoid test_squeezer crash on macOS buildbots (#115508)
Ned Deily [Mon, 19 Feb 2024 13:43:38 +0000 (08:43 -0500)] 
[3.10] gh-97032: avoid test_squeezer crash on macOS buildbots (#115508)

avoid test_squeezer crash on macOS buildbots

20 months ago[3.10] gh-115133: Fix tests for XMLPullParser with Expat 2.6.0 (GH-115164) (#115525)
Miss Islington (bot) [Mon, 19 Feb 2024 13:38:49 +0000 (14:38 +0100)] 
[3.10] gh-115133: Fix tests for XMLPullParser with Expat 2.6.0 (GH-115164) (#115525)

gh-115133: Fix tests for XMLPullParser with Expat 2.6.0 (GH-115164)

Feeding the parser by too small chunks defers parsing to prevent
CVE-2023-52425. Future versions of Expat may be more reactive.
(cherry picked from commit 4a08e7b3431cd32a0daf22a33421cd3035343dc4)

Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
20 months ago[3.10] gh-105821: Use a raw f-string in test_httpservers.py (GH-105822) (#115519)
Miss Islington (bot) [Fri, 16 Feb 2024 01:06:00 +0000 (02:06 +0100)] 
[3.10] gh-105821: Use a raw f-string in test_httpservers.py (GH-105822) (#115519)

20 months ago[3.10] Add missing sections to blurbs (GH-114553) (#115338)
Miss Islington (bot) [Wed, 14 Feb 2024 13:23:26 +0000 (14:23 +0100)] 
[3.10] Add missing sections to blurbs (GH-114553) (#115338)

21 months ago[3.10] gh-46968: Fix invalid reference to Sound eXchange (SoX) 12.17.7 license (GH...
Łukasz Langa [Tue, 6 Feb 2024 18:53:23 +0000 (19:53 +0100)] 
[3.10] gh-46968: Fix invalid reference to Sound eXchange (SoX) 12.17.7 license (GH-115094) (GH-115096)

(cherry picked from commit b39119916c0daaf5e5fdfec63e18ad97f29e2e72)

Co-authored-by: Łukasz Langa <lukasz@langa.pl>
21 months ago[3.10] gh-111239: Update Windows build to use zlib 1.3.1 (GH-114877) (#115079)
Miss Islington (bot) [Tue, 6 Feb 2024 14:40:18 +0000 (15:40 +0100)] 
[3.10] gh-111239: Update Windows build to use zlib 1.3.1 (GH-114877) (#115079)

gh-111239: Update Windows build to use zlib 1.3.1 (GH-114877)
(cherry picked from commit 618d7256e78da8200f6e2c6235094a1ef885dca4)

Co-authored-by: Zachary Ware <zach@python.org>
21 months ago[3.10] gh-113659: Skip hidden .pth files (GH-113660) (GH-114145)
Miss Islington (bot) [Thu, 18 Jan 2024 13:39:30 +0000 (14:39 +0100)] 
[3.10] gh-113659: Skip hidden .pth files (GH-113660) (GH-114145)

Skip .pth files with names starting with a dot or hidden file attribute.
(cherry picked from commit 74208ed0c440244fb809d8acc97cb9ef51e888e3)

Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
Co-authored-by: Łukasz Langa <lukasz@langa.pl>
21 months ago[3.10] gh-107888: Fix test_mmap.test_access_parameter() on macOS 14 (GH-109928) ...
Miss Islington (bot) [Wed, 17 Jan 2024 14:02:42 +0000 (15:02 +0100)] 
[3.10] gh-107888: Fix test_mmap.test_access_parameter() on macOS 14 (GH-109928) (GH-114185)

(cherry picked from commit 9dbfe2dc8e7bba25e52f9470ae6969821a365297)

Co-authored-by: Victor Stinner <vstinner@python.org>
21 months ago[3.10] gh-114021: Pin various sphinxcontrib extensions to older versions (GH-114022...
Adam Turner [Wed, 17 Jan 2024 13:50:24 +0000 (13:50 +0000)] 
[3.10] gh-114021: Pin various sphinxcontrib extensions to older versions (GH-114022) (GH-114038)

(cherry picked from commit 94b1d1fa38ada8cf7d196184a04a195c152eed75)

Co-authored-by: Ronald Oussoren <ronaldoussoren@mac.com>
21 months ago[3.10] gh-109858: Protect zipfile from "quoted-overlap" zipbomb (GH-110016) (GH-113914)
Miss Islington (bot) [Wed, 17 Jan 2024 13:50:10 +0000 (14:50 +0100)] 
[3.10] gh-109858: Protect zipfile from "quoted-overlap" zipbomb (GH-110016) (GH-113914)

Raise BadZipFile when try to read an entry that overlaps with other entry or
central directory.
(cherry picked from commit 66363b9a7b9fe7c99eba3a185b74c5fdbf842eba)

Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
21 months ago[3.10] gh-91133: tempfile.TemporaryDirectory: fix symlink bug in cleanup (GH-99930...
Serhiy Storchaka [Wed, 17 Jan 2024 13:49:56 +0000 (15:49 +0200)] 
[3.10] gh-91133: tempfile.TemporaryDirectory: fix symlink bug in cleanup (GH-99930) (GH-112840)

(cherry picked from commit 81c16cd94ec38d61aa478b9a452436dc3b1b524d)

Co-authored-by: Søren Løvborg <sorenl@unity3d.com>
21 months ago[3.10] bpo-37013: Fix the error handling in socket.if_indextoname() (GH-13503) (GH...
Miss Islington (bot) [Wed, 17 Jan 2024 13:49:40 +0000 (14:49 +0100)] 
[3.10] bpo-37013: Fix the error handling in socket.if_indextoname() (GH-13503) (GH-112599)

* Fix a crash when pass UINT_MAX.
* Fix an integer overflow on 64-bit non-Windows platforms.
(cherry picked from commit 0daf555c6fb3feba77989382135a58215e1d70a5)

Co-authored-by: Zackery Spytz <zspytz@gmail.com>
23 months ago[3.10] gh-112160: Add 'regen-configure' make target (#112163)
Seth Michael Larson [Mon, 20 Nov 2023 23:38:10 +0000 (17:38 -0600)] 
[3.10] gh-112160: Add 'regen-configure' make target (#112163)

Add 'regen-configure' make target

2 years ago[3.10] gh-101180: Fix a bug where iso2022_jp_3 and iso2022_jp_2004 codecs read out...
Łukasz Langa [Mon, 6 Nov 2023 14:46:20 +0000 (15:46 +0100)] 
[3.10] gh-101180: Fix a bug where iso2022_jp_3 and iso2022_jp_2004 codecs read out of bounds (gh-111695) (gh-111779)

(cherry picked from commit c8faa3568afd255708096f6aa8df0afa80cf7697)

Co-authored-by: Masayuki Moriyama <masayuki.moriyama@miraclelinux.com>
2 years ago[3.10] gh-109991: Update Windows build to use OpenSSL 1.1.1w (GH-110090)
Steve Dower [Tue, 10 Oct 2023 11:46:16 +0000 (12:46 +0100)] 
[3.10] gh-109991: Update Windows build to use OpenSSL 1.1.1w (GH-110090)

Co-authored-by: Zachary Ware <zachary.ware@gmail.com>
2 years ago[3.10] gh-109991: Update GitHub CI workflows to use OpenSSL 3.0.11 and multissltests...
Ned Deily [Thu, 28 Sep 2023 14:34:02 +0000 (10:34 -0400)] 
[3.10] gh-109991: Update GitHub CI workflows to use OpenSSL 3.0.11 and multissltests to use 1.1.1w, 3.0.11, and 3.1.3. (#110007)

gh-109991: Update GitHub CI workflows to use OpenSSL 3.0.11 and multissltests to use 1.1.1w, 3.0.11, and 3.1.3.

(cherry picked from commit c88037d137a98d7c399c7bd74d5117b5bcae1543)

2 years ago[3.10] gh-109002: Ensure only one wheel for each vendored package (GH-109003) (#109007)
Miss Islington (bot) [Wed, 6 Sep 2023 18:01:13 +0000 (11:01 -0700)] 
[3.10] gh-109002: Ensure only one wheel for each vendored package (GH-109003) (#109007)

Output with one wheel:
```
❯ GITHUB_ACTIONS=true ./Tools/build/verify_ensurepip_wheels.py
Verifying checksum for /Volumes/RAMDisk/cpython/Lib/ensurepip/_bundled/pip-23.2.1-py3-none-any.whl.
Expected digest: 7ccf472345f20d35bdc9d1841ff5f313260c2c33fe417f48c30ac46cccabf5be
Actual digest:   7ccf472345f20d35bdc9d1841ff5f313260c2c33fe417f48c30ac46cccabf5be
::notice file=/Volumes/RAMDisk/cpython/Lib/ensurepip/_bundled/pip-23.2.1-py3-none-any.whl::Successfully verified the checksum of the pip wheel.
```

Output with two wheels:
```
❯ GITHUB_ACTIONS=true ./Tools/build/verify_ensurepip_wheels.py
::error file=/Volumes/RAMDisk/cpython/Lib/ensurepip/_bundled/pip-22.0.4-py3-none-any.whl::Found more than one wheel for package pip.

::error file=/Volumes/RAMDisk/cpython/Lib/ensurepip/_bundled/pip-23.2.1-py3-none-any.whl::Found more than one wheel for package pip.
```

Output without wheels:
```
❯ GITHUB_ACTIONS=true ./Tools/build/verify_ensurepip_wheels.py
::error file=::Could not find a pip wheel on disk.
```
(cherry picked from commit f8a047941f2e4a1848700c21d58a08c9ec6a9c68)

Co-authored-by: Łukasz Langa <lukasz@langa.pl>
2 years ago[3.10] CI: Bump GitHub Actions (GH-108879) (#108892)
Hugo van Kemenade [Tue, 5 Sep 2023 20:39:13 +0000 (14:39 -0600)] 
[3.10] CI: Bump GitHub Actions (GH-108879) (#108892)

Co-authored-by: Łukasz Langa <lukasz@langa.pl>
2 years ago[3.10] Add a dummy .rtfd.yml file to silence invalid failing webhooks (#108908)
Łukasz Langa [Tue, 5 Sep 2023 15:08:51 +0000 (17:08 +0200)] 
[3.10] Add a dummy .rtfd.yml file to silence invalid failing webhooks (#108908)

Co-authored-by: Alex Waygood <Alex.Waygood@Gmail.com>
2 years agoPost 3.10.13
Pablo Galindo [Thu, 24 Aug 2023 13:21:57 +0000 (14:21 +0100)] 
Post 3.10.13

2 years agoPython 3.10.13 v3.10.13
Pablo Galindo [Thu, 24 Aug 2023 12:45:33 +0000 (13:45 +0100)] 
Python 3.10.13

2 years ago[3.10] gh-108342: Make ssl TestPreHandshakeClose more reliable (GH-108370) (#108406)
Łukasz Langa [Thu, 24 Aug 2023 10:09:00 +0000 (12:09 +0200)] 
[3.10] gh-108342: Make ssl TestPreHandshakeClose more reliable (GH-108370) (#108406)

* In preauth tests of test_ssl, explicitly break reference cycles
  invoving SingleConnectionTestServerThread to make sure that the
  thread is deleted. Otherwise, the test marks the environment as
  altered because the threading module sees a "dangling thread"
  (SingleConnectionTestServerThread). This test leak was introduced
  by the test added for the fix of issue gh-108310.
* Use support.SHORT_TIMEOUT instead of hardcoded 1.0 or 2.0 seconds
  timeout.
* SingleConnectionTestServerThread.run() catchs TimeoutError
* Fix a race condition (missing synchronization) in
  test_preauth_data_to_tls_client(): the server now waits until the
  client connect() completed in call_after_accept().
* test_https_client_non_tls_response_ignored() calls server.join()
  explicitly.
* Replace "localhost" with server.listener.getsockname()[0].
(cherry picked from commit 592bacb6fc0833336c0453e818e9b95016e9fd47)

Co-authored-by: Victor Stinner <vstinner@python.org>
2 years ago[3.10] gh-108342: Break ref cycle in SSLSocket._create() exc (GH-108344) (#108350)
Miss Islington (bot) [Wed, 23 Aug 2023 10:10:14 +0000 (03:10 -0700)] 
[3.10] gh-108342: Break ref cycle in SSLSocket._create() exc (GH-108344) (#108350)

Explicitly break a reference cycle when SSLSocket._create() raises an
exception. Clear the variable storing the exception, since the
exception traceback contains the variables and so creates a reference
cycle.

This test leak was introduced by the test added for the fix of GH-108310.
(cherry picked from commit 64f99350351bc46e016b2286f36ba7cd669b79e3)

Co-authored-by: Victor Stinner <vstinner@python.org>
2 years ago[3.10] gh-99612: Fix PyUnicode_DecodeUTF8Stateful() for ASCII-only data (GH-99613...
Miss Islington (bot) [Tue, 22 Aug 2023 18:24:40 +0000 (11:24 -0700)] 
[3.10] gh-99612: Fix PyUnicode_DecodeUTF8Stateful() for ASCII-only data (GH-99613) (GH-107224) (#107230)

Previously *consumed was not set in this case.

(cherry picked from commit b8b3e6afc0a48c3cbb7c36d2f73e332edcd6058c)
(cherry picked from commit f08e52ccb027f6f703302b8c1a82db9fd3934270)

Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
2 years ago[3.10] gh-108310: Fix CVE-2023-40217: Check for & avoid the ssl pre-close flaw (...
Łukasz Langa [Tue, 22 Aug 2023 17:53:23 +0000 (19:53 +0200)] 
[3.10] gh-108310: Fix CVE-2023-40217: Check for & avoid the ssl pre-close flaw (#108318)

gh-108310: Fix CVE-2023-40217: Check for & avoid the ssl pre-close flaw

Instances of `ssl.SSLSocket` were vulnerable to a bypass of the TLS handshake
and included protections (like certificate verification) and treating sent
unencrypted data as if it were post-handshake TLS encrypted data.

The vulnerability is caused when a socket is connected, data is sent by the
malicious peer and stored in a buffer, and then the malicious peer closes the
socket within a small timing window before the other peers’ TLS handshake can
begin. After this sequence of events the closed socket will not immediately
attempt a TLS handshake due to not being connected but will also allow the
buffered data to be read as if a successful TLS handshake had occurred.

Co-authored-by: Gregory P. Smith [Google LLC] <greg@krypto.org>
2 years ago[3.10] gh-107845: Fix symlink handling for tarfile.data_filter (GH-107846) (#108210)
Miss Islington (bot) [Tue, 22 Aug 2023 17:02:30 +0000 (10:02 -0700)] 
[3.10] gh-107845: Fix symlink handling for tarfile.data_filter (GH-107846) (#108210)

2 years ago[3.10] gh-107565: Update multissltests and GitHub CI workflows to use OpenSSL 1...
Ned Deily [Fri, 18 Aug 2023 21:21:19 +0000 (17:21 -0400)] 
[3.10] gh-107565: Update multissltests and GitHub CI workflows to use  OpenSSL 1.1.1v, 3.0.10, and 3.1.2. (GH-108120)

(cherry picked from commit 441797d4ffb12acda257370b9e5e19ed8d6e8a71)

2 years ago[3.10] gh-98154: Clarify Usage of "Reference Count" In the Docs (#107754)
Eric Snow [Fri, 11 Aug 2023 13:41:56 +0000 (07:41 -0600)] 
[3.10] gh-98154: Clarify Usage of "Reference Count" In the Docs (#107754)

2 years ago[3.10] Revert "[3.10] gh-107077: Raise SSLCertVerificationError even if the error...
Pablo Galindo Salgado [Thu, 3 Aug 2023 20:35:42 +0000 (21:35 +0100)] 
[3.10] Revert "[3.10] gh-107077: Raise SSLCertVerificationError even if the error is set via SSL_ERROR_SYSCALL (GH-107586) (#107589)" (#107602)

2 years ago[3.10] gh-107077: Raise SSLCertVerificationError even if the error is set via SSL_ERR...
Miss Islington (bot) [Thu, 3 Aug 2023 14:09:32 +0000 (07:09 -0700)] 
[3.10] gh-107077: Raise SSLCertVerificationError even if the error is set via SSL_ERROR_SYSCALL (GH-107586) (#107589)

Co-authored-by: Pablo Galindo Salgado <Pablogsal@gmail.com>
Co-authored-by: T. Wouters <thomas@python.org>
2 years ago[3.10] gh-105090: Replace incorrect TLSv1.2 with TLSv1.3 (GH-105404) (#107039)
Miss Islington (bot) [Sat, 22 Jul 2023 14:30:09 +0000 (07:30 -0700)] 
[3.10] gh-105090: Replace incorrect TLSv1.2 with TLSv1.3 (GH-105404) (#107039)

Co-authored-by: Jocelyn Castellano <admin@malwarefight.gq>
2 years ago[3.10] gh-105993: Add possible `None` return type to `asyncio.EventLoop.start_tls...
Miss Islington (bot) [Wed, 5 Jul 2023 11:21:19 +0000 (04:21 -0700)] 
[3.10] gh-105993: Add possible `None` return type to `asyncio.EventLoop.start_tls` docs (GH-105995) (#106190)

(cherry picked from commit 6b52a581c151914e59c8c367a03bc7309713a73b)

Co-authored-by: Sam Bull <git@sambull.org>
2 years ago[3.10] CI: Bump macOS build to use OpenSSL v3.0 (GH-105538) (#105869)
Miss Islington (bot) [Wed, 5 Jul 2023 11:20:29 +0000 (04:20 -0700)] 
[3.10] CI: Bump macOS build to use OpenSSL v3.0 (GH-105538) (#105869)

(cherry picked from commit 34e93d3998bab8acd651c50724eb1977f4860a08)

Co-authored-by: Erlend E. Aasland <erlend.aasland@protonmail.com>
2 years ago[3.10] [3.11] Add single value `agen.athrow(value)` signature to the 3.11 docs gh...
Miss Islington (bot) [Wed, 5 Jul 2023 11:18:39 +0000 (04:18 -0700)] 
[3.10] [3.11] Add single value `agen.athrow(value)` signature to the 3.11 docs gh-105269  (GH-105468) (#105480)

(cherry picked from commit acf3916e84158308660ed07c474a564e045d6884)

Co-authored-by: Federico Caselli <CaselIT@users.noreply.github.com>
2 years ago[3.10] Clarify the supported cases in the tokenize module (GH-105569) (#105575)
Miss Islington (bot) [Fri, 9 Jun 2023 16:00:59 +0000 (09:00 -0700)] 
[3.10] Clarify the supported cases in the tokenize module (GH-105569) (#105575)

Co-authored-by: Pablo Galindo Salgado <Pablogsal@gmail.com>
2 years agoPost 3.10.12
Pablo Galindo [Tue, 6 Jun 2023 22:49:22 +0000 (23:49 +0100)] 
Post 3.10.12

2 years agoPython 3.10.12 v3.10.12
Pablo Galindo [Tue, 6 Jun 2023 22:29:37 +0000 (23:29 +0100)] 
Python 3.10.12

2 years ago[3.10] gh-89412: Add missing attributes (added in 3.10) to traceback module docs...
Miss Islington (bot) [Mon, 5 Jun 2023 17:02:31 +0000 (10:02 -0700)] 
[3.10] gh-89412: Add missing attributes (added in 3.10) to traceback module docs (GH-105046) (#105329)

(cherry picked from commit a4f72fa39a9d391c7b931ba1906d81da4ae01949)

Co-authored-by: Jakub Kuczys <me@jacken.men>
2 years ago[3.10] gh-103142: Upgrade binary builds and CI to OpenSSL 1.1.1u (GH-105174) (GH...
Gregory P. Smith [Mon, 5 Jun 2023 16:07:30 +0000 (09:07 -0700)] 
[3.10] gh-103142: Upgrade binary builds and CI to OpenSSL 1.1.1u (GH-105174) (GH-105200) (#105204)

Upgrade builds to OpenSSL 1.1.1u.

This OpenSSL version addresses a pile if less-urgent CVEs since 1.1.1t.

The Mac/BuildScript/build-installer.py was already updated.

Also updates _ssl_data_111.h from OpenSSL 1.1.1u, _ssl_data_300.h from 3.0.9.

Manual edits to the _ssl_data_300.h file prevent it from removing any existing definitions in case those exist in some peoples builds and were important (avoiding regressions during backporting).

(cherry picked from commit ede89af).
(cherry picked from commit a5d2b546c1b0b73d0695b98838a3ddd497382999)
(cherry picked from commit f90d3f68db720bd6d0deda8cc0030339ccd43858)

Co-authored-by: Gregory P. Smith <greg@krypto.org>
2 years ago[3.10] gh-105184: document that marshal functions can fail and need to be checked...
Miss Islington (bot) [Mon, 5 Jun 2023 16:06:43 +0000 (09:06 -0700)] 
[3.10] gh-105184: document that marshal functions can fail and need to be checked with PyErr_Occurred (GH-105185) (#105220)

(cherry picked from commit ee26ca13a129da8cf549409d0a1b2e892ff2b4ec)

Co-authored-by: Irit Katriel <1055913+iritkatriel@users.noreply.github.com>
2 years ago[3.10] Update GitHub CI workflow for macOS. (GH-105304)
Ned Deily [Mon, 5 Jun 2023 06:42:02 +0000 (02:42 -0400)] 
[3.10] Update GitHub CI workflow for macOS. (GH-105304)

2 years ago[3.10] Skip test_sundry on Windows APPX tests (GH-104944)
Steve Dower [Thu, 25 May 2023 22:03:04 +0000 (23:03 +0100)] 
[3.10] Skip test_sundry on Windows APPX tests (GH-104944)

2 years ago[3.10] Improves the Windows MSI test run on PR (GH-104929)
Steve Dower [Thu, 25 May 2023 16:45:47 +0000 (17:45 +0100)] 
[3.10] Improves the Windows MSI test run on PR (GH-104929)

Correctly set the exit code when builds fail
Also build docs as part of the test

2 years ago[3.10] gh-104472: Skip `test_subprocess.ProcessTestCase.test_empty_env` if ASAN is...
Miss Islington (bot) [Fri, 19 May 2023 21:22:44 +0000 (14:22 -0700)] 
[3.10] gh-104472: Skip `test_subprocess.ProcessTestCase.test_empty_env` if ASAN is enabled (GH-104667) (#104669)

gh-104472: Skip `test_subprocess.ProcessTestCase.test_empty_env` if ASAN is enabled (GH-104667)

Skip test_subprocess.ProcessTestCase.test_empty_env if ASAN is enabled.
(cherry picked from commit c3f43bfb4bec39ff8f2c36d861a3c3a243bcb3af)

Co-authored-by: chgnrdv <52372310+chgnrdv@users.noreply.github.com>
2 years ago[3.10] [3.11] gh-102153: Start stripping C0 control and space chars in `urlsplit...
Miss Islington (bot) [Wed, 17 May 2023 23:06:06 +0000 (16:06 -0700)] 
[3.10] [3.11] gh-102153: Start stripping C0 control and space chars in `urlsplit` (GH-102508) (GH-104575) (#104592)

gh-102153: Start stripping C0 control and space chars in `urlsplit` (GH-102508)

`urllib.parse.urlsplit` has already been respecting the WHATWG spec a bit GH-25595.

This adds more sanitizing to respect the "Remove any leading C0 control or space from input" [rule](https://url.spec.whatwg.org/GH-url-parsing:~:text=Remove%20any%20leading%20and%20trailing%20C0%20control%20or%20space%20from%20input.) in response to [CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329).

I simplified the docs by eliding the state of the world explanatory
paragraph in this security release only backport.  (people will see
that in the mainline /3/ docs)

---------

(cherry picked from commit 2f630e1ce18ad2e07428296532a68b11dc66ad10)
(cherry picked from commit 610cc0ab1b760b2abaac92bd256b96191c46b941)

Co-authored-by: Miss Islington (bot) <31488909+miss-islington@users.noreply.github.com>
Co-authored-by: Illia Volochii <illia.volochii@gmail.com>
Co-authored-by: Gregory P. Smith [Google] <greg@krypto.org>
2 years ago[3.10] gh-102950: Implement PEP 706 – Filter for tarfile.extractall (GH-102953) ...
Matěj Cepl [Wed, 10 May 2023 11:43:00 +0000 (13:43 +0200)] 
[3.10] gh-102950: Implement PEP 706 – Filter for tarfile.extractall (GH-102953) (GH-104128)

- Backport b52ad18a766700be14382ba222033b2d75a33521
- Backport c8c3956d905e019101038b018129a4c90c9c9b8f
- Remove the DeprecationWarning
- Adjust docs
- Remove new `__all__` entries

Co-authored-by: Petr Viktorin <encukou@gmail.com>
2 years ago[3.10] gh-99889: Fix directory traversal security flaw in uu.decode() (GH-104096...
Miss Islington (bot) [Tue, 9 May 2023 16:46:47 +0000 (09:46 -0700)] 
[3.10] gh-99889: Fix directory traversal security flaw in uu.decode() (GH-104096) (#104330)

gh-99889: Fix directory traversal security flaw in uu.decode() (GH-104096)

* Fix directory traversal security flaw in uu.decode()
* also check absolute paths and os.altsep
* Add a regression test.

---------

(cherry picked from commit 0aeda297931820436a50b78f4f7f0597274b5df4)

 [Google]

Co-authored-by: Sam Carroll <70000253+samcarroll42@users.noreply.github.com>
2 years ago[3.10] gh-104049: do not expose on-disk location from SimpleHTTPRequestHandler (GH...
Miss Islington (bot) [Tue, 9 May 2023 15:21:53 +0000 (08:21 -0700)] 
[3.10] gh-104049: do not expose on-disk location from SimpleHTTPRequestHandler (GH-104067) (#104119)

gh-104049: do not expose on-disk location from SimpleHTTPRequestHandler (GH-104067)

Do not expose the local server's on-disk location from `SimpleHTTPRequestHandler` when generating a directory index. (unnecessary information disclosure)

---------

(cherry picked from commit c7c3a60c88de61a79ded9fdaf6bc6a29da4efb9a)

Co-authored-by: Ethan Furman <ethan@stoneleaf.us>
Co-authored-by: Gregory P. Smith <greg@krypto.org>
Co-authored-by: Jelle Zijlstra <jelle.zijlstra@gmail.com>
2 years agogh-103935: Use `io.open_code()` when executing code in trace and profile modules...
Steve Dower [Thu, 27 Apr 2023 21:44:07 +0000 (22:44 +0100)] 
gh-103935: Use `io.open_code()` when executing code in trace and profile modules (GH-103947)

Co-authored-by: Tian Gao <gaogaotiantian@hotmail.com>
2 years ago[3.10] gh-103207: Fix Welcome formatting issues when macOS Installer is run in dark... 103401/head
Ned Deily [Thu, 6 Apr 2023 03:44:19 +0000 (23:44 -0400)] 
[3.10] gh-103207: Fix Welcome formatting issues when macOS Installer is run in dark mode. (GH-103304)

2 years agogh-103262: Fixes Windows installer build to work with latest compilers (GH-103281)
Steve Dower [Wed, 5 Apr 2023 16:02:04 +0000 (17:02 +0100)] 
gh-103262: Fixes Windows installer build to work with latest compilers (GH-103281)

2 years agogh-102899: Fix doc link for getting filesystem error handler (GH-102901)
Miss Islington (bot) [Wed, 5 Apr 2023 15:03:45 +0000 (08:03 -0700)] 
gh-102899: Fix doc link for getting filesystem error handler (GH-102901)

(cherry picked from commit fdd0fff277a55c010a4da0a7af0e986e38560545)

Co-authored-by: Olivier Gayot <olivier.gayot@sigexec.com>
2 years agogh-81762: Clarify and simplify description of print's flush param (GH-103264)
Miss Islington (bot) [Wed, 5 Apr 2023 11:24:43 +0000 (04:24 -0700)] 
gh-81762: Clarify and simplify description of print's flush param (GH-103264)

(cherry picked from commit c396b6ddf3da784349bac9ebf7f28c55bde016ea)

Co-authored-by: C.A.M. Gerlach <CAM.Gerlach@Gerlach.CAM>
2 years agoMerge remote-tracking branch 'upstream/3.10' into 3.10
Pablo Galindo [Wed, 5 Apr 2023 11:20:30 +0000 (12:20 +0100)] 
Merge remote-tracking branch 'upstream/3.10' into 3.10

2 years agoPost 3.10.11
Pablo Galindo [Wed, 5 Apr 2023 11:20:17 +0000 (12:20 +0100)] 
Post 3.10.11

2 years agoImprove some grammar in the socket docs (GH-103254)
Miss Islington (bot) [Tue, 4 Apr 2023 22:55:11 +0000 (15:55 -0700)] 
Improve some grammar in the socket docs (GH-103254)

(cherry picked from commit bceb9e00ad2998e5193ad5b477e92a114dd31024)

Co-authored-by: Tim Burke <tim.burke@gmail.com>
2 years agoPython 3.10.11 v3.10.11
Pablo Galindo [Tue, 4 Apr 2023 21:56:31 +0000 (22:56 +0100)] 
Python 3.10.11

2 years ago[3.10] gh-103207: Add instructions to the macOS installer welcome display on how...
Ned Deily [Tue, 4 Apr 2023 18:42:10 +0000 (14:42 -0400)] 
[3.10] gh-103207: Add instructions to the macOS installer welcome display on how to workaround the macOS 13 Ventura “The installer encountered an error” failure. (GH-103253)

2 years agogh-103109: Document ignore_warnings() test support helper (GH-103110)
Miss Islington (bot) [Sun, 2 Apr 2023 22:38:58 +0000 (15:38 -0700)] 
gh-103109: Document ignore_warnings() test support helper (GH-103110)

(cherry picked from commit 32937d6aa414ec7db5c63ef277f21db1880b3af4)

Co-authored-by: Charlie Zhao <zhaoyu_hit@qq.com>
Co-authored-by: C.A.M. Gerlach <CAM.Gerlach@Gerlach.CAM>
2 years agoMinor docs improvements fix for `codeop` (GH-103123)
Miss Islington (bot) [Thu, 30 Mar 2023 22:58:36 +0000 (15:58 -0700)] 
Minor docs improvements fix for `codeop` (GH-103123)

(cherry picked from commit c1e71ce56fdb3eab62ad3190d09130f800e54610)

Co-authored-by: gaogaotiantian <gaogaotiantian@hotmail.com>
2 years agogh-103099: Link mypy docs from typing.rst (GH-103100)
Miss Islington (bot) [Thu, 30 Mar 2023 08:41:04 +0000 (01:41 -0700)] 
gh-103099: Link mypy docs from typing.rst (GH-103100)

(cherry picked from commit fda95aa19447fe444ac2670afbf98ec42aca0c6f)

Co-authored-by: Shantanu <12621235+hauntsaninja@users.noreply.github.com>
2 years ago[3.10] gh-103112: Add http.client.HTTPResponse.read docstring and fix pydoc output...
Miss Islington (bot) [Wed, 29 Mar 2023 22:30:27 +0000 (15:30 -0700)] 
[3.10] gh-103112: Add http.client.HTTPResponse.read docstring and fix pydoc output (GH-103113) (#103120)

(cherry picked from commit d052a383f1a0c599c176a12c73a761ca00436d8b)

Co-authored-by: Bernhard Wagner <github.comNotification20120125@xmlizer.net>
Co-authored-by: blurb-it[bot] <43283697+blurb-it[bot]@users.noreply.github.com>
Co-authored-by: Terry Jan Reedy <tjreedy@udel.edu>
Co-authored-by: Éric <merwok@netwok.org>
2 years agogh-103097: Add workaround for Windows ARM64 compiler bug (GH-103098)
Steve Dower [Wed, 29 Mar 2023 14:33:39 +0000 (15:33 +0100)] 
gh-103097: Add workaround for Windows ARM64 compiler bug (GH-103098)

See https://developercommunity.visualstudio.com/t/Regression-in-MSVC-1433-1434-ARM64-co/10224361 for details of the issue. It only applies to version 14.34.

2 years ago[3.10] gh-102582: Fix invalid JSON in Doc/howto/logging-cookbook.rst (GH-102635)...
Miss Islington (bot) [Wed, 29 Mar 2023 09:05:29 +0000 (02:05 -0700)] 
[3.10] gh-102582: Fix invalid JSON in Doc/howto/logging-cookbook.rst (GH-102635) (GH-103107)

(cherry picked from commit d835b3f05de7e2d800138e5969eeb9656b0ed860)
Co-authored-by: Matěj Cepl <mcepl@cepl.eu>
2 years ago[3.10] GH-87235: Make sure "python /dev/fd/9 9</path/to/script.py" works on macOS...
Miss Islington (bot) [Tue, 28 Mar 2023 12:13:37 +0000 (05:13 -0700)] 
[3.10] GH-87235: Make sure "python /dev/fd/9 9</path/to/script.py" works on macOS (GH-99768) (#99817)

On macOS all file descriptors for a particular file in /dev/fd
share the same file offset, that is ``open("/dev/fd/9", "r")`` behaves
more like ``dup(9)`` than a regular open.

This causes problems when a user tries to run "/dev/fd/9" as a script
because zipimport changes the file offset to try to read a zipfile
directory. Therefore change zipimport to reset the file offset after
trying to read the zipfile directory.
(cherry picked from commit d08fb257698e3475d6f69bb808211d39e344e5b2)

Co-authored-by: Ronald Oussoren <ronaldoussoren@mac.com>
* Regen zipimport

---------

Co-authored-by: Ronald Oussoren <ronaldoussoren@mac.com>
Co-authored-by: Shantanu <12621235+hauntsaninja@users.noreply.github.com>
Co-authored-by: Łukasz Langa <lukasz@langa.pl>
2 years ago[3.10] GH-102711: Fix warnings found by clang (GH-102712) (#103076)
Miss Islington (bot) [Tue, 28 Mar 2023 09:27:41 +0000 (02:27 -0700)] 
[3.10] GH-102711: Fix warnings found by clang (GH-102712) (#103076)

There are some warnings if build python via clang:

Parser/pegen.c:812:31: warning: a function declaration without a prototype is deprecated in all versions of C [-Wstrict-prototypes]
_PyPegen_clear_memo_statistics()
                              ^
                               void

Parser/pegen.c:820:29: warning: a function declaration without a prototype is deprecated in all versions of C [-Wstrict-prototypes]
_PyPegen_get_memo_statistics()
                            ^
                             void

Fix it to make clang happy.

(cherry picked from commit 7703def37e4fa7d25c3d23756de8f527daa4e165)

Signed-off-by: Chenxi Mao <chenxi.mao@suse.com>
Co-authored-by: Chenxi Mao <chenxi.mao@suse.com>
2 years ago[3.10] gh-88233: zipfile: handle extras after a zip64 extra (GH-96161) (#102087)
Miss Islington (bot) [Tue, 28 Mar 2023 08:58:51 +0000 (01:58 -0700)] 
[3.10] gh-88233: zipfile: handle extras after a zip64 extra (GH-96161) (#102087)

Previously, any data _after_ the zip64 extra would be removed.

With many new tests.

Fixes GH-88233
(cherry picked from commit 59e86caca812fc993c5eb7dc8ccd1508ffccba86)

Co-authored-by: Tim Hatch <tim@timhatch.com>
2 years ago[3.10] gh-101997: Update bundled pip version to 23.0.1 (GH-101998). (#102241)
Pradyun Gedam [Tue, 28 Mar 2023 08:57:55 +0000 (09:57 +0100)] 
[3.10] gh-101997: Update bundled pip version to 23.0.1 (GH-101998). (#102241)

(cherry picked from commit 89d9ff0f48c51a85920c7372a7df4a2204e32ea5)

2 years ago[3.10] GH-95494: Fix transport EOF handling in OpenSSL 3.0 (GH-95495) (#103007)
Miss Islington (bot) [Mon, 27 Mar 2023 14:14:24 +0000 (07:14 -0700)] 
[3.10] GH-95494: Fix transport EOF handling in OpenSSL 3.0 (GH-95495) (#103007)

GH-25309 enabled SSL_OP_IGNORE_UNEXPECTED_EOF by default, with a comment
that it restores OpenSSL 1.1.1 behavior, but this wasn't quite right.
That option causes OpenSSL to treat transport EOF as the same as
close_notify (i.e. SSL_ERROR_ZERO_RETURN), whereas Python actually has
distinct SSLEOFError and SSLZeroReturnError exceptions. (The latter is
usually mapped to a zero return from read.) In OpenSSL 1.1.1, the ssl
module would raise them for transport EOF and close_notify,
respectively. In OpenSSL 3.0, both act like close_notify.

Fix this by, instead, just detecting SSL_R_UNEXPECTED_EOF_WHILE_READING
and mapping that to the other exception type.

There doesn't seem to have been any unit test of this error, so fill in
the missing one. This had to be done with the BIO path because it's
actually slightly tricky to simulate a transport EOF with Python's fd
based APIs. (If you instruct the server to close the socket, it gets
confused, probably because the server's SSL object is still referencing
the now dead fd?)
(cherry picked from commit 420bbb783b43216cc897dc8914851899db37a31d)

Co-authored-by: David Benjamin <davidben@google.com>
2 years agoUpdate pdb docs for arguments (GH-102965)
Miss Islington (bot) [Sat, 25 Mar 2023 21:38:26 +0000 (14:38 -0700)] 
Update pdb docs for arguments (GH-102965)

(cherry picked from commit 027223db96b0464c49a74513f82a1bf25aa510bd)

Co-authored-by: gaogaotiantian <gaogaotiantian@hotmail.com>
2 years ago[3.10] gh-103025: fix a ctypes doc typo (GH-103026) (#103030)
Miss Islington (bot) [Sat, 25 Mar 2023 10:00:03 +0000 (03:00 -0700)] 
[3.10] gh-103025: fix a ctypes doc typo  (GH-103026) (#103030)

* gh-103025: fix two ctypes doc issues  (GH-103026)
(cherry picked from commit 0708437ad043657f992cb985fd5c37e1ac052f93)

2 years ago[3.10] gh-101100: Document PyObject_ClearWeakRefs and gzip's name (#103002)
Hugo van Kemenade [Sat, 25 Mar 2023 07:44:05 +0000 (09:44 +0200)] 
[3.10] gh-101100: Document PyObject_ClearWeakRefs and gzip's name (#103002)

2 years agogh-102980: Add tests for pdf's display, alias and where commands (GH-102981)
Miss Islington (bot) [Fri, 24 Mar 2023 21:09:11 +0000 (14:09 -0700)] 
gh-102980: Add tests for pdf's display, alias and where commands (GH-102981)

(cherry picked from commit ded9a7fc194a1d5c0e38f475a45f8f77dbe9c6bc)

Co-authored-by: gaogaotiantian <gaogaotiantian@hotmail.com>
2 years agogh-102873: logging.LogRecord docs: improve description of `msg` parameter (GH-102875)
Miss Islington (bot) [Fri, 24 Mar 2023 15:07:46 +0000 (08:07 -0700)] 
gh-102873: logging.LogRecord docs: improve description of `msg` parameter (GH-102875)

(cherry picked from commit f2e5a6ee628502d307a97f587788d7022a200229)

Co-authored-by: Amin Alaee <mohammadamin.alaee@gmail.com>
Co-authored-by: Alex Waygood <Alex.Waygood@Gmail.com>
2 years ago[3.10] gh-102027: Fix macro name (GH-102124) (#102917)
Miss Islington (bot) [Fri, 24 Mar 2023 12:40:32 +0000 (05:40 -0700)] 
[3.10] gh-102027: Fix macro name (GH-102124) (#102917)

gh-102027: Fix macro name (GH-102124)

This fixes the ssse3 / sse2 detection when sse4 is available.

(cherry picked from commit ea93bde4ece139d4152a59f2c38aa6568559447c)

Co-authored-by: Max Bachmann <kontakt@maxbachmann.de>
Co-authored-by: Oleg Iarygin <oleg@arhadthedev.net>
2 years ago[3.10] gh-96931: Fix incorrect results in ssl.SSLSocket.shared_ciphers (GH-96932...
Miss Islington (bot) [Fri, 24 Mar 2023 12:33:32 +0000 (05:33 -0700)] 
[3.10] gh-96931: Fix incorrect results in ssl.SSLSocket.shared_ciphers (GH-96932) (#102919)

gh-96931: Fix incorrect results in ssl.SSLSocket.shared_ciphers (GH-96932)
(cherry picked from commit af9c34f6ef8dceb21871206eb3e4d350f6e3d3dc)

Co-authored-by: Benjamin Fogle <benfogle@gmail.com>
2 years agoGH-100989: Revert Improve the accuracy of collections.deque docstrings (GH-102979)
Miss Islington (bot) [Fri, 24 Mar 2023 01:10:34 +0000 (18:10 -0700)] 
GH-100989: Revert Improve the accuracy of collections.deque docstrings (GH-102979)

(cherry picked from commit 7f01a11199864bcf230b243b99e8a51e9044675d)

Co-authored-by: Raymond Hettinger <rhettinger@users.noreply.github.com>
2 years agogh-98239: Document that `inspect.getsource()` can raise `TypeError` (GH-101689)
Miss Islington (bot) [Thu, 23 Mar 2023 19:41:50 +0000 (12:41 -0700)] 
gh-98239: Document that `inspect.getsource()` can raise `TypeError` (GH-101689)

(cherry picked from commit b6132085ca5418f714eff6e31d1d03369d3fd1d9)

Co-authored-by: Nikita Sobolev <mail@sobolevn.me>
2 years agogh-102936: typing: document performance pitfalls of protocols decorated with `@runtim...
Miss Islington (bot) [Thu, 23 Mar 2023 18:28:11 +0000 (11:28 -0700)] 
gh-102936: typing: document performance pitfalls of protocols decorated with `@runtime_checkable` (GH-102937)

(cherry picked from commit 58d2b30c012c3a9fe5ab747ae47c96af09e0fd15)

Co-authored-by: Alex Waygood <Alex.Waygood@Gmail.com>
2 years ago[3.10] gh-102947: Improve traceback when calling `fields()` on a non-dataclass (...
Alex Waygood [Thu, 23 Mar 2023 15:13:05 +0000 (15:13 +0000)] 
[3.10] gh-102947: Improve traceback when calling `fields()` on a non-dataclass (#102948) (#102954)

2 years agogh-100989: Improve the accuracy of collections.deque docstrings (GH-100990)
Miss Islington (bot) [Wed, 22 Mar 2023 12:39:45 +0000 (05:39 -0700)] 
gh-100989: Improve the accuracy of collections.deque docstrings (GH-100990)

(cherry picked from commit c74073657e32b8872f91b3bbe1efa9af20adbea9)

Co-authored-by: Timo Ludwig <ti.ludwig@web.de>
Co-authored-by: C.A.M. Gerlach <CAM.Gerlach@Gerlach.CAM>
2 years agoDocs: improve accuracy of sqlite3.Connection.interrupt() (GH-102904)
Miss Islington (bot) [Wed, 22 Mar 2023 11:59:56 +0000 (04:59 -0700)] 
Docs: improve accuracy of sqlite3.Connection.interrupt() (GH-102904)

(cherry picked from commit 7b2d53daccf5a6479e179535068fd9a841db44fc)

Co-authored-by: Erlend E. Aasland <erlend.aasland@protonmail.com>
Co-authored-by: C.A.M. Gerlach <CAM.Gerlach@Gerlach.CAM>
2 years agoDocs: improve the accuracy of the sqlite3.connect() timeout param (GH-102900)
Miss Islington (bot) [Wed, 22 Mar 2023 11:49:32 +0000 (04:49 -0700)] 
Docs: improve the accuracy of the sqlite3.connect() timeout param (GH-102900)

(cherry picked from commit c24f1f1e874c283bb11d8b9fbd661536ade19fe9)

Co-authored-by: Erlend E. Aasland <erlend.aasland@protonmail.com>
Co-authored-by: C.A.M. Gerlach <CAM.Gerlach@Gerlach.CAM>