homepage

This issue tracker has been migrated to GitHub , and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author martin.panter
Recipients JelleZijlstra, eric.araujo, martin.panter, michael.mulich, orsenthil
Date 2016年06月05日.01:15:42
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1465089343.69.0.256789451034.issue13771@psf.upfronthosting.co.za>
In-reply-to
Content
My guess is Michael was doing something like
>>> class Monkey(http.client.HTTPSConnection):
... pass
... 
>>> http.client.HTTPSConnection = Monkey
>>> http.client.HTTPSConnection("bugs.python.org")
Traceback (most recent call last):
 File "<stdin>", line 1, in <module>
 File "/usr/lib/python3.5/http/client.py", line 1210, in __init__
 source_address)
 [. . .]
 File "/usr/lib/python3.5/http/client.py", line 1210, in __init__
 source_address)
 File "/usr/lib/python3.5/http/client.py", line 1209, in __init__
 super(HTTPSConnection, self).__init__(host, port, timeout,
RecursionError: maximum recursion depth exceeded while calling a Python object
Looking at <https://github.com/cdent/wsgi-intercept/commit/d70dfa9>, I think this problem has been overcome by also overriding __init__(). IMO Python shouldn’t go very far out of its way to support monkey patching, and in this case the workaround was disliked by Eric. Given these two facts and no apparent interest since, I think we should close this.
History
Date User Action Args
2016年06月05日 01:15:43martin.pantersetrecipients: + martin.panter, orsenthil, eric.araujo, michael.mulich, JelleZijlstra
2016年06月05日 01:15:43martin.pantersetmessageid: <1465089343.69.0.256789451034.issue13771@psf.upfronthosting.co.za>
2016年06月05日 01:15:43martin.panterlinkissue13771 messages
2016年06月05日 01:15:42martin.pantercreate

AltStyle によって変換されたページ (->オリジナル) /