[issue38748] 32 bit ctypes stdcall callback fails to restore stack pointer

2021-04-16 Thread Christian Heimes
Christian Heimes added the comment: It would help us if you or Michael could provide a minimal reproducer of the crash in form of a unit test and submit it as pull request. -- nosy: +christian.heimes versions: +Python 3.10 ___ Python tracker

[issue43830] (-1) ** 0.5 returns (6.123233995736766e-17+1j) instead of 1j

2021-04-13 Thread Christian Heimes
Change by Christian Heimes : -- nosy: +mark.dickinson ___ Python tracker <https://bugs.python.org/issue43830> ___ ___ Python-bugs-list mailing list Unsubscribe:

[issue43811] Run GHA CI with multiple OpenSSL versions

2021-04-13 Thread Christian Heimes
Christian Heimes added the comment: The new checks are only executed when one or more OpenSSL-related files are modified. The checks run a handful of networking and hashing test suites. All SSL checks are optional. This PR also introduces ccache to speed up compilation. In common cases

[issue43799] OpenSSL 3.0.0: define OPENSSL_API_COMPAT 1.1.1

2021-04-13 Thread Christian Heimes
Change by Christian Heimes : -- resolution: -> fixed stage: patch review -> resolved status: open -> closed ___ Python tracker <https://bugs.python.or

[issue43799] OpenSSL 3.0.0: define OPENSSL_API_COMPAT 1.1.1

2021-04-13 Thread Christian Heimes
Christian Heimes added the comment: New changeset b71aaa0df0f3a9640b034b4774651cd8c54d2fb9 by Christian Heimes in branch '3.8': [3.8] bpo-43799: OpenSSL 3.0.0: declare OPENSSL_API_COMPAT 1.1.1 (GH-25329) (GH-25383) https://github.com/python/cpython/commit

[issue38820] Make Python compatible with OpenSSL 3.0.0

2021-04-13 Thread Christian Heimes
Change by Christian Heimes : -- dependencies: +OpenSSL 3.0.0: define OPENSSL_API_COMPAT 1.1.1, Run GHA CI with multiple OpenSSL versions ___ Python tracker <https://bugs.python.org/issue38

[issue43799] OpenSSL 3.0.0: define OPENSSL_API_COMPAT 1.1.1

2021-04-13 Thread Christian Heimes
Change by Christian Heimes : -- pull_requests: +24115 pull_request: https://github.com/python/cpython/pull/25383 ___ Python tracker <https://bugs.python.org/issue43

[issue43799] OpenSSL 3.0.0: define OPENSSL_API_COMPAT 1.1.1

2021-04-13 Thread Christian Heimes
Christian Heimes added the comment: New changeset a4833883c9b81b6b272cc7c5b67fa1658b65304c by Christian Heimes in branch 'master': bpo-43799: OpenSSL 3.0.0: declare OPENSSL_API_COMPAT 1.1.1 (GH-25329) https://github.com/python/cpython/commit/a4833883c9b81b6b272cc7c5b67fa1658b65304c

[issue43723] Deprecate camelCase aliases from threading.py

2021-04-12 Thread Christian Heimes
Christian Heimes added the comment: > Usually, warnings are not treated as errors. Thanks for fixing test_asyncio! Tests should treat any unhandled deprecation warnings as a test failure. -- ___ Python tracker <https://bugs.python.org/issu

[issue43799] OpenSSL 3.0.0: define OPENSSL_API_COMPAT 1.1.1

2021-04-12 Thread Christian Heimes
Christian Heimes added the comment: OpenSSL 1.0.2, 1.1.0, 1.1.1 and 3.0.0 behave slightly differently. For example I'm still getting a warning with 1.1.0. Only 3.0.0 supports OPENSSL_NO_DEPRECATED. After multiple failed attempts I decided to set the API level to 1.1.1 and define the three

[issue43723] Deprecate camelCase aliases from threading.py

2021-04-12 Thread Christian Heimes
Christian Heimes added the comment: New changeset 95bbb331ecb3ef5d05859d90b287cc3d27613c86 by Christian Heimes in branch 'master': bpo-43723: Fix deprecation error caused by thread.setDaemon() (GH-25361) https://github.com/python/cpython/commit/95bbb331ecb3ef5d05859d90b287cc3d27613c86

[issue41561] test_ssl fails in Ubuntu 20.04: test_min_max_version_mismatch

2021-04-12 Thread Christian Heimes
Change by Christian Heimes : -- resolution: -> fixed stage: patch review -> resolved status: open -> closed ___ Python tracker <https://bugs.python.or

[issue43723] Deprecate camelCase aliases from threading.py

2021-04-12 Thread Christian Heimes
Christian Heimes added the comment: The commit broke my PR https://github.com/python/cpython/pull/25329. You missed a call in asyncio tests. -- ___ Python tracker <https://bugs.python.org/issue43

[issue43723] Deprecate camelCase aliases from threading.py

2021-04-12 Thread Christian Heimes
Change by Christian Heimes : -- nosy: +christian.heimes nosy_count: 5.0 -> 6.0 pull_requests: +24095 pull_request: https://github.com/python/cpython/pull/25361 ___ Python tracker <https://bugs.python.org/issu

[issue43811] Run GHA CI with multiple OpenSSL versions

2021-04-12 Thread Christian Heimes
Change by Christian Heimes : -- keywords: +patch pull_requests: +24094 stage: -> patch review pull_request: https://github.com/python/cpython/pull/25360 ___ Python tracker <https://bugs.python.org/issu

[issue41561] test_ssl fails in Ubuntu 20.04: test_min_max_version_mismatch

2021-04-12 Thread Christian Heimes
Christian Heimes added the comment: New changeset 3447750073aff229b049e4ccd6217db2811dcfd1 by Christian Heimes in branch 'master': bpo-41561: Fix testing with OpenSSL 1.0.2 (GH-25355) https://github.com/python/cpython/commit/3447750073aff229b049e4ccd6217db2811dcfd1

[issue43811] Run GHA CI with multiple OpenSSL versions

2021-04-12 Thread Christian Heimes
Christian Heimes added the comment: Github selects required actions based on the "name" attribute of a job. Therefore I decided to keep the default "Ubuntu" job and moved the additional OpenSSL tests to another job. For future reference, my first approach was: strat

[issue43811] Run GHA CI with multiple OpenSSL versions

2021-04-12 Thread Christian Heimes
New submission from Christian Heimes : CI only tests one OpenSSL version, but Python supports multiple versions of OpenSSL. OpenSSL 1.0.2, 1.1.0, 1.1.1, and 3.0.0 have different APIs and behave differently. We should run minimal tests with all major OpenSSL versions to ensure that Python

[issue41561] test_ssl fails in Ubuntu 20.04: test_min_max_version_mismatch

2021-04-12 Thread Christian Heimes
Change by Christian Heimes : -- pull_requests: +24090 pull_request: https://github.com/python/cpython/pull/25355 ___ Python tracker <https://bugs.python.org/issue41

[issue43799] OpenSSL 3.0.0: define OPENSSL_API_COMPAT 1.1.1

2021-04-10 Thread Christian Heimes
Change by Christian Heimes : -- keywords: +patch pull_requests: +24062 stage: -> patch review pull_request: https://github.com/python/cpython/pull/25329 ___ Python tracker <https://bugs.python.org/issu

[issue43799] OpenSSL 3.0.0: define OPENSSL_API_COMPAT 1.1.1

2021-04-10 Thread Christian Heimes
New submission from Christian Heimes : OpenSSL 1.1 introduced the macro OPENSSL_API_COMPAT to select which APIs are exposed and which deprecation warnings are shown. https://www.openssl.org/docs/manmaster/man7/OPENSSL_API_COMPAT.html "#define OPENSSL_API_COMPAT 0x10101000L"

[issue38820] Make Python compatible with OpenSSL 3.0.0

2021-04-09 Thread Christian Heimes
Christian Heimes added the comment: New changeset 2d7fdc90731e132f9d6b43852ee112f25831394b by Christian Heimes in branch 'master': bpo-38820: OpenSSL 3.0.0: Use supported hashing algos in doc test (GH-25319) https://github.com/python/cpython/commit/2d7fdc90731e132f9d6b43852ee112f25831394b

[issue38820] Make Python compatible with OpenSSL 3.0.0

2021-04-09 Thread Christian Heimes
Change by Christian Heimes : -- pull_requests: +24054 pull_request: https://github.com/python/cpython/pull/25319 ___ Python tracker <https://bugs.python.org/issue38

[issue38820] Make Python compatible with OpenSSL 3.0.0

2021-04-09 Thread Christian Heimes
Change by Christian Heimes : -- pull_requests: +24051 stage: -> patch review pull_request: https://github.com/python/cpython/pull/25316 ___ Python tracker <https://bugs.python.org/issu

[issue43796] "install" package on PyPI

2021-04-09 Thread Christian Heimes
Christian Heimes added the comment: BPO is just for CPython bugs. Packaging and PyPI are handled by different teams and trackers. Please use https://github.com/pypa/pypi-support -- nosy: +christian.heimes ___ Python tracker <ht

[issue40485] Provide an abstraction for a select-able Event

2021-04-09 Thread Christian Heimes
Christian Heimes added the comment: Do you want to work on a feature for 3.10? Feature freeze is in less than 4 weeks. -- components: +Library (Lib) -Extension Modules stage: -> needs patch ___ Python tracker <https://bugs.python.org/issu

[issue38820] Make Python compatible with OpenSSL 3.0.0

2021-04-09 Thread Christian Heimes
Christian Heimes added the comment: Miro, I have pushed several fixes for OpenSSL 3.0.0 * bpo-43788 addresses wrong library and error reason codes (e.g. KRB5_S_TKT_NYV) * bpo-43789 fixes an issue with exception state in password callbacks (_PyEval_EvalFrameDefault returned a result

[issue43788] OpenSSL 3.0.0: Make ssl_data.h version specific

2021-04-09 Thread Christian Heimes
Christian Heimes added the comment: New changeset 70f2ca7ea46ac15d05c7b422a10b18aa3fe4a140 by Christian Heimes in branch '3.8': [3.8] bpo-43788: Generate version specific _ssl_data.h (GH-25300) (GH-25311) https://github.com/python/cpython/commit/70f2ca7ea46ac15d05c7b422a10b18aa3fe4a140

[issue43788] OpenSSL 3.0.0: Make ssl_data.h version specific

2021-04-09 Thread Christian Heimes
Christian Heimes added the comment: New changeset 299ae9c7a2a169d54921815b9bb41a8f9277a3aa by Christian Heimes in branch '3.9': [3.9] bpo-43788: Generate version specific _ssl_data.h (GH-25300) (GH-25310) https://github.com/python/cpython/commit/299ae9c7a2a169d54921815b9bb41a8f9277a3aa

[issue43794] OpenSSL 3.0.0: Handle UNEXPECTED_EOF_WHILE_READING / wrap SSL_OP_IGNORE_UNEXPECTED_EOF

2021-04-09 Thread Christian Heimes
Christian Heimes added the comment: New changeset 6f37ebc61e9e0d13bcb1a2ddb7fc9723c04b6372 by Christian Heimes in branch 'master': bpo-43794: OpenSSL 3.0.0: set OP_IGNORE_UNEXPECTED_EOF by default (GH-25309) https://github.com/python/cpython/commit/6f37ebc61e9e0d13bcb1a2ddb7fc9723c04b6372

[issue38820] Make Python compatible with OpenSSL 3.0.0

2021-04-09 Thread Christian Heimes
Change by Christian Heimes : -- dependencies: +OpenSSL 3.0.0: Handle UNEXPECTED_EOF_WHILE_READING / wrap SSL_OP_IGNORE_UNEXPECTED_EOF, OpenSSL 3.0.0: Make ssl_data.h version specific ___ Python tracker <https://bugs.python.org/issue38

[issue43788] OpenSSL 3.0.0: Make ssl_data.h version specific

2021-04-09 Thread Christian Heimes
Change by Christian Heimes : -- resolution: -> fixed stage: patch review -> resolved status: open -> closed title: Make ssl_data.h version specific -> OpenSSL 3.0.0: Make ssl_data.h version specific ___ Python tracker <https://

[issue43788] Make ssl_data.h version specific

2021-04-09 Thread Christian Heimes
Change by Christian Heimes : -- pull_requests: +24046 pull_request: https://github.com/python/cpython/pull/25311 ___ Python tracker <https://bugs.python.org/issue43

[issue43788] Make ssl_data.h version specific

2021-04-09 Thread Christian Heimes
Change by Christian Heimes : -- pull_requests: +24045 pull_request: https://github.com/python/cpython/pull/25310 ___ Python tracker <https://bugs.python.org/issue43

[issue43789] OpenSSL 3.0.0: password callback called multiple times

2021-04-09 Thread Christian Heimes
Christian Heimes added the comment: I'm keeping the bug open as a reminder to investigate the change of behavior more carefully. -- ___ Python tracker <https://bugs.python.org/issue43

[issue43789] OpenSSL 3.0.0: password callback called multiple times

2021-04-09 Thread Christian Heimes
Christian Heimes added the comment: New changeset a28398e9c60848fc291c83dac44e5212694fb0b2 by Miss Islington (bot) in branch '3.8': [3.8] bpo-43789: OpenSSL 3.0.0 Don't call passwd callback again in error case (GH-25303) (GH-25306) https://github.com/python/cpython/commit

[issue43794] OpenSSL 3.0.0: Handle UNEXPECTED_EOF_WHILE_READING / wrap SSL_OP_IGNORE_UNEXPECTED_EOF

2021-04-09 Thread Christian Heimes
Change by Christian Heimes : -- keywords: +patch pull_requests: +24044 stage: -> patch review pull_request: https://github.com/python/cpython/pull/25309 ___ Python tracker <https://bugs.python.org/issu

[issue43794] OpenSSL 3.0.0: Handle UNEXPECTED_EOF_WHILE_READING / wrap SSL_OP_IGNORE_UNEXPECTED_EOF

2021-04-09 Thread Christian Heimes
New submission from Christian Heimes : OpenSSL 3.0.0 state machine handles unexpected EOFs more strict and requires peers to properly shut down connections. The old OpenSSL 1.1.1 behavior can be get back with SSL_OP_IGNORE_UNEXPECTED_EOF. I propose to add the option by default until Python's

[issue43791] OpenSSL 3.0.0: TLS 1.0 / 1.1 connections fail with TLSV1_ALERT_INTERNAL_ERROR

2021-04-09 Thread Christian Heimes
Christian Heimes added the comment: https://github.com/python/cpython/pull/25304 is merged PR to master. -- ___ Python tracker <https://bugs.python.org/issue43

[issue4379] Py_SAFE_DOWNCAST in FILE_TIME_to_time_t_nsec failing

2021-04-09 Thread Christian Heimes
Christian Heimes added the comment: New changeset 5151d642004c59cce58d669be85d9a5e987f51d3 by Christian Heimes in branch 'master': bpo-4379: Skip TLS 1.0/1.1 tests under OpenSSL 3.0.0 (GH-25304) https://github.com/python/cpython/commit/5151d642004c59cce58d669be85d9a5e987f51d3

[issue38820] Make Python compatible with OpenSSL 3.0.0

2021-04-09 Thread Christian Heimes
Change by Christian Heimes : -- dependencies: +OpenSSL 3.0.0: TLS 1.0 / 1.1 connections fail with TLSV1_ALERT_INTERNAL_ERROR, OpenSSL 3.0.0: password callback called multiple times versions: -Python 3.7 ___ Python tracker <ht

[issue43789] OpenSSL 3.0.0: password callback called multiple times

2021-04-09 Thread Christian Heimes
Christian Heimes added the comment: New changeset d3b73f32ef7c693a6ae8c54eb0e62df3b5315caf by Christian Heimes in branch 'master': bpo-43789: OpenSSL 3.0.0 Don't call passwd callback again in error case (GH-25303) https://github.com/python/cpython/commit

[issue4379] Py_SAFE_DOWNCAST in FILE_TIME_to_time_t_nsec failing

2021-04-09 Thread Christian Heimes
Change by Christian Heimes : -- nosy: +christian.heimes nosy_count: 5.0 -> 6.0 pull_requests: +24036 pull_request: https://github.com/python/cpython/pull/25304 ___ Python tracker <https://bugs.python.org/iss

[issue43791] OpenSSL 3.0.0: TLS 1.0 / 1.1 connections fail with TLSV1_ALERT_INTERNAL_ERROR

2021-04-09 Thread Christian Heimes
New submission from Christian Heimes : With OpenSSL 3.0.0-alpha14 several tests for TLS 1.0 and 1.1 connections are failing handshake with "[SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error". OpenSSL is configured with default security level "1". Tes

[issue43789] OpenSSL 3.0.0: password callback called multiple times

2021-04-09 Thread Christian Heimes
Change by Christian Heimes : -- keywords: +patch pull_requests: +24035 stage: -> patch review pull_request: https://github.com/python/cpython/pull/25303 ___ Python tracker <https://bugs.python.org/issu

[issue43789] OpenSSL 3.0.0: password callback called multiple times

2021-04-09 Thread Christian Heimes
New submission from Christian Heimes : OpenSSL 3.0.0 seems to invoke the password callback multiple times under some circumstances. This triggers a fatal error in Python when the first invocation sets an exception. test_load_cert_chain (test.test_ssl.ContextTests) ... Fatal Python error

[issue43788] Make ssl_data.h version specific

2021-04-09 Thread Christian Heimes
Change by Christian Heimes : -- keywords: +patch pull_requests: +24032 stage: -> patch review pull_request: https://github.com/python/cpython/pull/25300 ___ Python tracker <https://bugs.python.org/issu

[issue43788] Make ssl_data.h version specific

2021-04-09 Thread Christian Heimes
New submission from Christian Heimes : _ssl_data.h contains static tables with OpenSSL error names and reasons. The stables are created by scrapping header files. The current approach has two issues: - error codes are version dependent. OpenSSL 1.1.1 uses different codes and has a different

[issue43725] Create a release branch ABI stability regression test

2021-04-06 Thread Christian Heimes
Christian Heimes added the comment: Do we need separate jobs and ABI dumps for each platform and arch? I guess we need at least separate dumps for 32 and 64bit. -- nosy: +christian.heimes ___ Python tracker <https://bugs.python.org/issue43

[issue43745] ssl.OPENSSL_VERSION still reporting 1.1.1i on windows 3.8.9/3.9.4

2021-04-06 Thread Christian Heimes
Christian Heimes added the comment: Uh :( No more holiday releases, please. The RMs and release team need their vacation. -- nosy: +christian.heimes ___ Python tracker <https://bugs.python.org/issue43

[issue43599] Setting long domain of locale.dgettext() crashes Python interpreter

2021-04-06 Thread Christian Heimes
Christian Heimes added the comment: The crash occurs inside glibc's dgettext() implementation. Its man page does not list any limitation for domain or msgid length. This looks like a bug in glibc. #0 0x77c57a8f in __dcigettext () from /lib64/libc.so.6 #1 0x0058a235

[issue17305] IDNA2008 encoding is missing

2021-04-05 Thread Christian Heimes
Christian Heimes added the comment: The issue has been waiting for contributions for 8 years now. So far nobody has shown an interested to address the problem and contribute an IDNA 2008 codec to Python's standard library. -- ___ Python tracker

[issue38794] Setup: support linking openssl statically

2021-04-04 Thread Christian Heimes
Christian Heimes added the comment: Lukas, no, some guy called Bill approached me at our last Illuminati meeting in Hollow Earth. He asked me to implement static linking for his next-gen secret brain chip. In exchange for the favor I was allowed to ride his T-Rex. True story! Thanks

[issue43631] Update to OpenSSL 1.1.1k

2021-03-31 Thread Christian Heimes
Christian Heimes added the comment: CI, macOS and Windows infrastructure have been updated. -- resolution: -> fixed stage: patch review -> resolved status: open -> closed ___ Python tracker <https://bugs.python.or

[issue17305] IDNA2008 encoding is missing

2021-03-31 Thread Christian Heimes
Change by Christian Heimes : -- priority: critical -> high type: security -> enhancement versions: +Python 3.10 -Python 3.8, Python 3.9 ___ Python tracker <https://bugs.python.org/i

[issue36997] Document that spwd is considered harmful

2021-03-31 Thread Christian Heimes
Change by Christian Heimes : -- priority: high -> normal type: security -> enhancement versions: +Python 3.10 -Python 2.7, Python 3.7 ___ Python tracker <https://bugs.python.org/i

[issue36384] ipaddress Should not reject IPv4 addresses with leading zeroes as ambiguously octal

2021-03-31 Thread Christian Heimes
Change by Christian Heimes : -- nosy: +lukasz.langa priority: critical -> release blocker ___ Python tracker <https://bugs.python.org/issue36384> ___ ___ Py

[issue43223] [security] http.server: Open Redirection if the URL path starts with //

2021-03-31 Thread Christian Heimes
Change by Christian Heimes : -- nosy: +christian.heimes, lukasz.langa, ned.deily priority: normal -> release blocker ___ Python tracker <https://bugs.python.org/issu

[issue43124] [security] smtplib multiple CRLF injection

2021-03-31 Thread Christian Heimes
Change by Christian Heimes : -- nosy: +christian.heimes, lukasz.langa, ned.deily priority: normal -> release blocker ___ Python tracker <https://bugs.python.org/issu

[issue36384] ipaddress Should not reject IPv4 addresses with leading zeroes as ambiguously octal

2021-03-30 Thread Christian Heimes
Change by Christian Heimes : -- keywords: +patch pull_requests: +23844 stage: needs patch -> patch review pull_request: https://github.com/python/cpython/pull/25099 ___ Python tracker <https://bugs.python.org/issu

[issue36384] ipaddress Should not reject IPv4 addresses with leading zeroes as ambiguously octal

2021-03-30 Thread Christian Heimes
Christian Heimes added the comment: Serhiy was right, this is a security issue. The patch should not have landed in 3.8. At a bare minimum the patch should have been postponed until documentation was updated. Since 3.8 the ipaddresss does not behave as documented. A similar security issue

[issue43669] PEP 644: Require OpenSSL 1.1.1 or newer

2021-03-30 Thread Christian Heimes
Change by Christian Heimes : -- keywords: +patch pull_requests: +23842 stage: -> patch review pull_request: https://github.com/python/cpython/pull/23014 ___ Python tracker <https://bugs.python.org/issu

[issue43669] PEP 644: Require OpenSSL 1.1.1 or newer

2021-03-30 Thread Christian Heimes
New submission from Christian Heimes : Tracker ticket for PEP 644, https://www.python.org/dev/peps/pep-0644/ This PEP proposes for CPython’s standard library to support only OpenSSL 1.1.1 LTS or newer. Support for OpenSSL versions past end-of-lifetime, incompatible forks, and other TLS

[issue43631] Update to OpenSSL 1.1.1k

2021-03-29 Thread Christian Heimes
Change by Christian Heimes : -- pull_requests: +23835 pull_request: https://github.com/python/cpython/pull/25089 ___ Python tracker <https://bugs.python.org/issue43

[issue43631] Update to OpenSSL 1.1.1k

2021-03-29 Thread Christian Heimes
Change by Christian Heimes : -- pull_requests: +23834 pull_request: https://github.com/python/cpython/pull/25088 ___ Python tracker <https://bugs.python.org/issue43

[issue43631] Update to OpenSSL 1.1.1k

2021-03-29 Thread Christian Heimes
Christian Heimes added the comment: Thanks! All tests are passing, but macOS is still using OpenSSL 1.1.1j. -- ___ Python tracker <https://bugs.python.org/issue43

[issue43631] Update to OpenSSL 1.1.1k

2021-03-29 Thread Christian Heimes
Christian Heimes added the comment: Thanks! My mail https://mail.python.org/archives/list/python-...@python.org/thread/2GULUR43MNEW3IJM44LS5ZY2TOUANPNT/ contains a first analysis of the CVEs. I'm pretty sure any server application with server-side TLS socket is vulnerable to CVE-2021-3449

[issue38794] Setup: support linking openssl statically

2021-03-29 Thread Christian Heimes
Christian Heimes added the comment: I introduced several build improvements for better support of custom OpenSSL builds in bpo-43466. The issue mentions a new, undocumented, and unsupported hack to create a shared extension modules with statically linked OpenSSL. The Modules/Setup.local

[issue43466] ssl/hashlib: Add configure option to set or auto-detect rpath to OpenSSL libs

2021-03-29 Thread Christian Heimes
Christian Heimes added the comment: There are now multiple ways to build Python with a custom OpenSSL build on Linux and BSD-like platforms: 1) Tools/ssl/multissltest.py 2) ./configure --with-openssl=/path/to/openssl --with-openssl-rpath=auto 3) undocumented hack from commit

[issue43647] Sudden crash on print() of some characters

2021-03-28 Thread Christian Heimes
Christian Heimes added the comment: Excellent investigation! Idle automatically picked Dejavu Sans Mono as default font. I have also several fonts for e.g. unicode symbols and emojis installed. Noto Sans Mono CJK fonts are working fine, too. However when I select the Noto Emoji font

[issue43647] Sudden crash on print() of some characters

2021-03-28 Thread Christian Heimes
Christian Heimes added the comment: I cannot reproduce the issue on Fedora 33 with KDE 5 and libX11-1.6.12: Python 3.9.2 (default, Feb 20 2021, 00:00:00) [GCC 10.2.1 20201125 (Red Hat 10.2.1-9)] on linux Type "help", "copyright", "credits" or "license()

[issue43617] Missing definition in configure.ac causing autoreconf to create damaged configure script

2021-03-27 Thread Christian Heimes
Christian Heimes added the comment: Thanks for the bug report! I ran into the issue a couple of weeks ago on one machine that had autoconf but not the archive package installed. -- resolution: -> fixed stage: patch review -> resolved status: open -> closed versions: +Py

[issue43617] Missing definition in configure.ac causing autoreconf to create damaged configure script

2021-03-27 Thread Christian Heimes
Christian Heimes added the comment: New changeset e516290976626cf8535b88a14b1b34e37f88a78a by Christian Heimes in branch '3.8': [3.8] bpo-43617: Check autoconf-archive package in configure.ac (GH-25016) (GH-25035) https://github.com/python/cpython/commit

[issue43617] Missing definition in configure.ac causing autoreconf to create damaged configure script

2021-03-27 Thread Christian Heimes
Christian Heimes added the comment: New changeset 064bc07f241dceec2fc577cbf5c31fa6d63fe320 by Christian Heimes in branch '3.9': [3.9] bpo-43617: Check autoconf-archive package in configure.ac (GH-25016) (GH-25034) https://github.com/python/cpython/commit

[issue38038] Remove urllib.parse._splittype from xmlrpc.client

2021-03-27 Thread Christian Heimes
Christian Heimes added the comment: Please open a new bug and include a reference to this issue. -- nosy: +christian.heimes ___ Python tracker <https://bugs.python.org/issue38

[issue43617] Missing definition in configure.ac causing autoreconf to create damaged configure script

2021-03-27 Thread Christian Heimes
Change by Christian Heimes : -- pull_requests: +23783 pull_request: https://github.com/python/cpython/pull/25035 ___ Python tracker <https://bugs.python.org/issue43

[issue43617] Missing definition in configure.ac causing autoreconf to create damaged configure script

2021-03-27 Thread Christian Heimes
Change by Christian Heimes : -- pull_requests: +23782 pull_request: https://github.com/python/cpython/pull/25034 ___ Python tracker <https://bugs.python.org/issue43

[issue43617] Missing definition in configure.ac causing autoreconf to create damaged configure script

2021-03-27 Thread Christian Heimes
Christian Heimes added the comment: New changeset 5d6e8c1c1a5f667cdce99cb3c563ac922198678d by Christian Heimes in branch 'master': bpo-43617: Check autoconf-archive package in configure.ac (GH-25016) https://github.com/python/cpython/commit/5d6e8c1c1a5f667cdce99cb3c563ac922198678d

[issue43631] Update to OpenSSL 1.1.1k

2021-03-26 Thread Christian Heimes
Change by Christian Heimes : -- keywords: +patch pull_requests: +23774 pull_request: https://github.com/python/cpython/pull/25024 ___ Python tracker <https://bugs.python.org/issue43

[issue43631] Update to OpenSSL 1.1.1k

2021-03-26 Thread Christian Heimes
New submission from Christian Heimes : OpenSSL 1.1.1k contains fixes for two high severity CVEs https://www.openssl.org/news/vulnerabilities.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3450 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449 -- assignee

[issue33164] Blake 2 module update

2021-03-25 Thread Christian Heimes
Change by Christian Heimes : -- resolution: fixed -> stage: resolved -> needs patch status: closed -> open type: -> behavior ___ Python tracker <https://bugs.python

[issue43622] TLS 1.3, client polling returns event without data

2021-03-25 Thread Christian Heimes
Christian Heimes added the comment: It looks like your code is treating a SSLSocket like an ordinary Kernel socket. SSLSocket are implemented in user space and behave differently. https://docs.python.org/3/library/ssl.html#ssl-nonblocking explains some of the aspects of non-blocking I/O

[issue43622] TLS 1.3, client polling returns event without data

2021-03-25 Thread Christian Heimes
Christian Heimes added the comment: Could you please explain why you consider this a bug? TLS 1.3 works differently than TLS 1.2. You must always assume that an application level read can result in a protocol level write operation and the other way around. This could happen with TLS 1.2

[issue43617] Missing definition in configure.ac causing autoreconf to create damaged configure script

2021-03-24 Thread Christian Heimes
Change by Christian Heimes : -- keywords: +patch pull_requests: +23771 stage: -> patch review pull_request: https://github.com/python/cpython/pull/25016 ___ Python tracker <https://bugs.python.org/issu

[issue43617] Missing definition in configure.ac causing autoreconf to create damaged configure script

2021-03-24 Thread Christian Heimes
Christian Heimes added the comment: The extra macros are provided by optional packages. On Fedora and Debian/Ubuntu the package is called autoconf-archive. -- nosy: +christian.heimes ___ Python tracker <https://bugs.python.org/issue43

[issue43466] ssl/hashlib: Add configure option to set or auto-detect rpath to OpenSSL libs

2021-03-23 Thread Christian Heimes
Change by Christian Heimes : -- pull_requests: +23760 pull_request: https://github.com/python/cpython/pull/25002 ___ Python tracker <https://bugs.python.org/issue43

[issue43547] support ZIP files with zeroed out fields (e.g. for reproducible builds)

2021-03-23 Thread Christian Heimes
Christian Heimes added the comment: The __getattr__ hack is not needed. You can reset the flags in a different, more straight forward way: class ReproducibleZipInfo(ZipInfo): __slots__ = () def __init__(self, *args, **kwargs): super().__init__(*args, **kwargs) self

[issue43466] ssl/hashlib: Add configure option to set or auto-detect rpath to OpenSSL libs

2021-03-23 Thread Christian Heimes
Christian Heimes added the comment: GH-24989 adds -Wl,--exclude-libs just for libssl.a and libcrypto.a IFF support for -Wl,--exclude-libs,ALL is detected by configure. This puts the symbols from the OpenSSL archive files into the LOCAL segment of ELF binaries. The PR does not set -Wl

[issue43466] ssl/hashlib: Add configure option to set or auto-detect rpath to OpenSSL libs

2021-03-23 Thread Christian Heimes
Change by Christian Heimes : -- pull_requests: +23748 pull_request: https://github.com/python/cpython/pull/24989 ___ Python tracker <https://bugs.python.org/issue43

[issue43547] support ZIP files with zeroed out fields (e.g. for reproducible builds)

2021-03-22 Thread Christian Heimes
Christian Heimes added the comment: zinfo = zipfile.ZipInfo() zinfo.date_time = (1980, 0, 0, 0, 0, 0) zinfo.create_system = 0 external_attr == 0 may cause issues with permissions. I do something like this in my reproducible tarfile code: if zinfo.isdir(): # 0755 + MS-DOS directory flag

[issue43547] support ZIP files with zeroed out fields (e.g. for reproducible builds)

2021-03-22 Thread Christian Heimes
Christian Heimes added the comment: Hi, thanks for looking into reproducible builds. I have a few suggestions: - since it's a new feature, it cannot go into older releases. - zeroed is not a self-explanatory term. I suggest to find a term that does describe the result, not the internal

[issue43593] pymalloc is not aware of Memory Tagging Extension (MTE) and crashes

2021-03-22 Thread Christian Heimes
Christian Heimes added the comment: pymalloc is a compile-time option. The configure flag sets or unsets WITH_PYMALLOC. The define is then used by https://github.com/python/cpython/blob/master/Objects/obmalloc.c to change the internal allocator. The flag may also affect the ABI of Python

[issue43582] SSLContext.sni_callback docs inaccurately describe available handshake info

2021-03-21 Thread Christian Heimes
Christian Heimes added the comment: The callback from context.alpn_callback would fire when OpenSSL handles the ALPN extension. Since the callback is triggered in the ClientHello phase of the handshake, you'll be able to replace the socket's context with another context. The OpenSSL codes

[issue43582] SSLContext.sni_callback docs inaccurately describe available handshake info

2021-03-21 Thread Christian Heimes
Christian Heimes added the comment: SSLContext.set_alpn_protocols() is a high level interface on top of SSL_CTX_set_alpn_select_cb(). Python doesn't directly expose the ALPN selector callback. The ssl module only provides a way to set a hard-coded callback that wraps SSL_select_next_proto

[issue43535] Make str.join auto-convert inputs to strings.

2021-03-21 Thread Christian Heimes
Christian Heimes added the comment: I'm also -1 and would prefer something like Grégory's proposal instead. -- nosy: +christian.heimes ___ Python tracker <https://bugs.python.org/issue43

[issue43577] Deadlock when using SSLContext._msg_callback and SSLContext.sni_callback

2021-03-21 Thread Christian Heimes
Christian Heimes added the comment: The fix will be available in next 3.9 and 3.8 release. -- resolution: -> fixed stage: patch review -> resolved status: open -> closed versions: +Python 3.10 ___ Python tracker <https://bug

[issue43582] SSLContext.sni_callback docs inaccurately describe available handshake info

2021-03-21 Thread Christian Heimes
Christian Heimes added the comment: I don't see any way to fix the issue with our current API. OpenSSL 1.1.1 provides a new API SSL_client_hello_get0_ext() to access raw extension during early stage of ClientHello phase. https://www.openssl.org/docs/man1.1.1/man3

[issue43582] SSLContext.sni_callback docs inaccurately describe available handshake info

2021-03-21 Thread Christian Heimes
Christian Heimes added the comment: I analysed the issue in comment https://bugs.python.org/issue43577#msg389222 -- nosy: +alex, dstufft, janssen, njs versions: +Python 3.10 ___ Python tracker <https://bugs.python.org/issue43

[issue43577] Deadlock when using SSLContext._msg_callback and SSLContext.sni_callback

2021-03-21 Thread Christian Heimes
Christian Heimes added the comment: No, there is no check for that. This kind of deadlock should never occur. The problem was an implementation bug in low-level C code that had bad interaction with the global interpreter lock. Python releases the GIL around OpenSSL calls. Callbacks have

[issue43577] Deadlock when using SSLContext._msg_callback and SSLContext.sni_callback

2021-03-21 Thread Christian Heimes
Christian Heimes added the comment: New changeset 77cde5042a2f1eae489c11a67540afaf43cd5cdf by Christian Heimes in branch 'master': bpo-43577: Fix deadlock with SSLContext._msg_callback and sni_callback (GH-24957) https://github.com/python/cpython/commit

  1   2   3   4   5   6   7   8   9   10   >