Message207373
| Author |
martin.panter |
| Recipients |
barry, martin.panter, orsenthil, pitrou, serhiy.storchaka |
| Date |
2014年01月05日.13:11:33 |
| SpamBayes Score |
-1.0 |
| Marked as misclassified |
Yes |
| Message-id |
<1388927494.28.0.630177295795.issue19524@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
The Issue 12692 fix has been backported to the 3.3 branch, and it fixes this bug. However here is an updated patch (against revision 28337a8fb502 in the "3.3" branch) consisting of two left over bits you might still want to use:
1. My test case
2. Explicitly closing the HTTP connection when an invalid response is received. E.g. urlopen("http://google.com:443") would still leak the connection without this. |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2014年01月05日 13:11:34 | martin.panter | set | recipients:
+ martin.panter, barry, orsenthil, pitrou, serhiy.storchaka |
| 2014年01月05日 13:11:34 | martin.panter | set | messageid: <1388927494.28.0.630177295795.issue19524@psf.upfronthosting.co.za> |
| 2014年01月05日 13:11:34 | martin.panter | link | issue19524 messages |
| 2014年01月05日 13:11:34 | martin.panter | create |
|