This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Unsupported provider

classification
Title: pickle should support methods
Type: enhancement Stage: resolved
Components: Library (Lib) Versions: Python 3.4
process
Status: closed Resolution: fixed
Dependencies: 17810 Superseder:
Assigned To: Nosy List: alexandre.vassalotti, amaury.forgeotdarc, belopolsky, cool-RR, daniel.urban, eric.araujo, exarkun, hinsen, lemburg, loewis, obamausa8, pitrou, rhettinger
Priority: normal Keywords:

Created on 2010-07-16 19:25 by exarkun, last changed 2022-04-11 14:57 by admin. This issue is now closed.

Messages (39)
msg110473 - (view) Author: Jean-Paul Calderone (exarkun) * (Python committer) Date: 2010-07-16 19:25
pickle doesn't support methods:


>>> class x:
...     def y(self):
...             pass
... 
>>> import pickle
>>> pickle.dumps(x.y)
Traceback (most recent call last):
  File "<stdin>", line 1, in <module>
  File "/home/exarkun/Projects/python/branches/py3k/Lib/pickle.py", line 1314, in dumps
    Pickler(f, protocol, fix_imports=fix_imports).dump(obj)
_pickle.PicklingError: Can't pickle <class 'function'>: attribute lookup builtins.function failed

It would be easy to fix this, though.  Here's a link to some code that implements it: http://twistedmatrix.com/trac/browser/trunk/twisted/persisted/styles.py?rev=1
msg112405 - (view) Author: Alexander Belopolsky (belopolsky) * (Python committer) Date: 2010-08-01 23:55
Not a proposed solution, but food for thought.  Methods do have __reduce_ex__ method which works with protocol 3:

>>> class X:
...   def f(self):
...      pass

>>> X.f.__reduce_ex__(3)
(<function __newobj__ at 0x100579288>, (<class 'function'>,), {}, None, None)

This result is useless for several reasons:

1.  <class 'function'> cannot be pickled because although it's name suggests a builtin, it is only available as types.FunctionType.

2. If we define builtins.function, X.f can be pickled

>>> import builtins, types
>>> builtins.function = types.FunctionType
>>> pickle.dumps(X.f)
b'\x80\x03cbuiltins\nfunction\nq\x00)\x81q\x01}q\x02b.'

but the result is useless:

>>> pickle.loads(_)
Traceback (most recent call last):
 ..
 File "Lib/pickle.py", line 1317, in loads
    encoding=encoding, errors=errors).load()
TypeError: Required argument 'code' (pos 1) not found


I think the approach of pickling the name of the function as is done in the Twisted link above is the only reasonable one and is consistent with the way module level functions are pickled.
msg112428 - (view) Author: Marc-Andre Lemburg (lemburg) * (Python committer) Date: 2010-08-02 08:10
Note that pickle deliberately does not support serializing code objects. 

This is a security feature and should not be broken !

If you need to pickle such objects, you can easily register handlers that take care of this.
msg112446 - (view) Author: Jean-Paul Calderone (exarkun) * (Python committer) Date: 2010-08-02 12:01
> This is a security feature and should not be broken !

Can you explain this?

I don't think I agree, since an attacker can always serialize whatever they feel like.  It's the person doing the deserialization that has to be careful.
msg112450 - (view) Author: Marc-Andre Lemburg (lemburg) * (Python committer) Date: 2010-08-02 12:12
Jean-Paul Calderone wrote:
> 
> Jean-Paul Calderone <exarkun@twistedmatrix.com> added the comment:
> 
>> This is a security feature and should not be broken !
> 
> Can you explain this?
> 
> I don't think I agree, since an attacker can always serialize whatever they feel like.  It's the person doing the deserialization that has to be careful.

The marshal protocol which is used for storing PYC files has support
for serializing code objects.

The support on pickles, which are meant for data serialization, was not added
per default to prevent unwanted code execution during deserialization,
but instead made possible via pickle hooks, so as to make the decision
to support code serialization an explicit application choice.

By adding default support for unpickling code objects, you can trick
the unpickling code into executing serialized code: first you add
a serialized version of a malicious class definition, then you add
an object of that class to the pickle. At object restore time, the
malicious class can then run os.system('rm -rf /')...
msg112453 - (view) Author: Jean-Paul Calderone (exarkun) * (Python committer) Date: 2010-08-02 12:29
> By adding default support for unpickling code objects, you can trick
the unpickling code into executing serialized code:

This doesn't sound correct to me.

You can *already* trick unpickling code into executing serialized code.  You don't need this feature in order to be able to do it.
msg112462 - (view) Author: Marc-Andre Lemburg (lemburg) * (Python committer) Date: 2010-08-02 13:25
Jean-Paul Calderone wrote:
> 
> Jean-Paul Calderone <exarkun@twistedmatrix.com> added the comment:
> 
>> By adding default support for unpickling code objects, you can trick
> the unpickling code into executing serialized code:
> 
> This doesn't sound correct to me.
> 
> You can *already* trick unpickling code into executing serialized code.  You don't need this feature in order to be able to do it.

How ?
msg112467 - (view) Author: Jean-Paul Calderone (exarkun) * (Python committer) Date: 2010-08-02 13:52
For example:

exarkun@boson:~$ python
Python 2.6.4 (r264:75706, Dec  7 2009, 18:45:15) 
[GCC 4.4.1] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>> class x(object):
...     def __reduce__(self):
...         import os
...         return os.system, ('echo "Hello from sploitland"',)
... 
>>> import pickle
>>> pickle.loads(pickle.dumps(x()))
Hello from sploitland
0
>>>
msg112468 - (view) Author: Alexander Belopolsky (belopolsky) * (Python committer) Date: 2010-08-02 13:54
On Mon, Aug 2, 2010 at 9:25 AM, Marc-Andre Lemburg
<report@bugs.python.org> wrote:
..
>> You can *already* trick unpickling code into executing serialized code.  You don't need
> this feature in order to be able to do it.
>
> How ?
>
>>> from pickle import *
>>> class evil:
...    def __reduce__(self):
...        return (exec, ("print('pwned!')",))
...
>>> s = dumps(evil())
>>> loads(s)
pwned!

See also http://bugs.python.org/issue9120#msg109004 .

AFAICT, the reason functions and classes are pickled by name has
nothing to do with security. From the manual:

"""Similarly, when class instances are pickled, their class’s code and
data are not pickled along with them. Only the instance data are
pickled. This is done on purpose, so you can fix bugs in a class or
add methods to the class and still load objects that were created with
an earlier version of the class. If you plan to have long-lived
objects that will see many versions of a class, it may be worthwhile
to put a version number in the objects so that suitable conversions
can be made by the class’s __setstate__() method.
"""  http://docs.python.org/library/pickle.html?#what-can-be-pickled-and-unpickled
msg112471 - (view) Author: Marc-Andre Lemburg (lemburg) * (Python committer) Date: 2010-08-02 14:05
Jean-Paul Calderone wrote:
> 
> Jean-Paul Calderone <exarkun@twistedmatrix.com> added the comment:
> 
> For example:
> 
> exarkun@boson:~$ python
> Python 2.6.4 (r264:75706, Dec  7 2009, 18:45:15) 
> [GCC 4.4.1] on linux2
> Type "help", "copyright", "credits" or "license" for more information.
>>>> class x(object):
> ...     def __reduce__(self):
> ...         import os
> ...         return os.system, ('echo "Hello from sploitland"',)
> ... 
>>>> import pickle
>>>> pickle.loads(pickle.dumps(x()))
> Hello from sploitland
> 0

But here you are not transferring malicious code in the pickle
string, you are just triggering the execution of such code that
you already have (and are in control of).

Without the definition of class x on the receiving side, there
would be no exploit.

By adding support for pickling code objects, you'd make it possible
to place the definition of class x into the pickle string and
you would no longer be in control of that code.
msg112473 - (view) Author: Alexander Belopolsky (belopolsky) * (Python committer) Date: 2010-08-02 14:08
On Mon, Aug 2, 2010 at 10:05 AM, Marc-Andre Lemburg
<report@bugs.python.org> wrote:
..
> Without the definition of class x on the receiving side, there
> would be no exploit.

You are mistaken.  Try adding del x (or del evil in my example)
between dumps and loads and see it working.
msg112474 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2010-08-02 14:09
I think methods should be picklable just like global functions are, that is, by pickling a tuple of the fully-qualified class name ("mymodule.myclass"), method name ("mymethod"), and self.
msg112475 - (view) Author: Marc-Andre Lemburg (lemburg) * (Python committer) Date: 2010-08-02 14:11
M.-A. Lemburg wrote:
> Jean-Paul Calderone wrote:
>>
>> Jean-Paul Calderone <exarkun@twistedmatrix.com> added the comment:
>>
>> For example:
>>
>> exarkun@boson:~$ python
>> Python 2.6.4 (r264:75706, Dec  7 2009, 18:45:15) 
>> [GCC 4.4.1] on linux2
>> Type "help", "copyright", "credits" or "license" for more information.
>>>>> class x(object):
>> ...     def __reduce__(self):
>> ...         import os
>> ...         return os.system, ('echo "Hello from sploitland"',)
>> ... 
>>>>> import pickle
>>>>> pickle.loads(pickle.dumps(x()))
>> Hello from sploitland
>> 0
> 
> But here you are not transferring malicious code in the pickle
> string, you are just triggering the execution of such code that
> you already have (and are in control of).
> 
> Without the definition of class x on the receiving side, there
> would be no exploit.
> 
> By adding support for pickling code objects, you'd make it possible
> to place the definition of class x into the pickle string and
> you would no longer be in control of that code.

Hmm, I just tried the code and it seems that you're right:

The pickle string does not contain a reference to class x,
but only the name of the function to call. Wow, that's a huge
hole in Python's pickle system...

...  def __reduce__(self):
...   import os
...   return os.system, ('echo "Bingo"',)
...
>>> import pickle
>>> pickle.dumps(C())
'cposix\nsystem\np0\n(S\'echo "Bingo"\'\np1\ntp2\nRp3\n.'
>>> C = None
>>> s = 'cposix\nsystem\np0\n(S\'echo "Bingo"\'\np1\ntp2\nRp3\n.'
>>> pickle.loads(s)
Bingo
0
msg112476 - (view) Author: Alexander Belopolsky (belopolsky) * (Python committer) Date: 2010-08-02 14:13
On Mon, Aug 2, 2010 at 10:11 AM, Marc-Andre Lemburg
<report@bugs.python.org> wrote:
..
> Hmm, I just tried the code and it seems that you're right:
>
> The pickle string does not contain a reference to class x,
> but only the name of the function to call. Wow, that's a huge
> hole in Python's pickle system...

That's why we have a big red

"""
Warning: The pickle module is not intended to be secure against
erroneous or maliciously constructed data. Never unpickle data
received from an untrusted or unauthenticated source.
"""

in the docs.
msg112477 - (view) Author: Marc-Andre Lemburg (lemburg) * (Python committer) Date: 2010-08-02 14:27
Alexander Belopolsky wrote:
> 
> Alexander Belopolsky <belopolsky@users.sourceforge.net> added the comment:
> 
> On Mon, Aug 2, 2010 at 10:11 AM, Marc-Andre Lemburg
> <report@bugs.python.org> wrote:
> ..
>> Hmm, I just tried the code and it seems that you're right:
>>
>> The pickle string does not contain a reference to class x,
>> but only the name of the function to call. Wow, that's a huge
>> hole in Python's pickle system...
> 
> That's why we have a big red
> 
> """
> Warning: The pickle module is not intended to be secure against
> erroneous or maliciously constructed data. Never unpickle data
> received from an untrusted or unauthenticated source.
> """
> 
> in the docs.

Good :-)

I've never used .__reduce__() and wasn't aware of the
fact that it can be used to run arbitrary code without
relying on the defining class.

I also like Antoine's idea of pickling the function/method name
instead of the whole code object.

This is in line with PEP 307 (http://www.python.org/dev/peps/pep-0307/)
which already uses the approach for classic class objects, Python
functions, etc.
msg112479 - (view) Author: Jean-Paul Calderone (exarkun) * (Python committer) Date: 2010-08-02 14:32
> I also like Antoine's idea of pickling the function/method name instead of the whole code object.

I like it too.  That's why I suggested it in the first comment on the ticket (read the linked code).  I guess Alexander likes it too, since he basically said as much in the second comment. ;)
msg112482 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2010-08-02 14:55
There's already issue558238 on the same topic.
msg112483 - (view) Author: Alexander Belopolsky (belopolsky) * (Python committer) Date: 2010-08-02 14:56
On Mon, Aug 2, 2010 at 10:32 AM, Jean-Paul Calderone
<report@bugs.python.org> wrote:
>
> Jean-Paul Calderone <exarkun@twistedmatrix.com> added the comment:
>
>> I also like Antoine's idea of pickling the function/method name instead of the whole code object.
>
> I like it too.  That's why I suggested it in the first comment on the ticket (read the linked
> code).  I guess Alexander likes it too, since he basically said as much in the second
> comment. ;)

Yes, I think we have a consensus on this point. Note, however that
since unbound methods have been removed in 3.x, it is not trivial to
find a fully qualified name of a method anymore.   Also we need to
decide where to stop: should methods of nested classes be pickleable?
msg112486 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2010-08-02 15:08
> Yes, I think we have a consensus on this point. Note, however that
> since unbound methods have been removed in 3.x, it is not trivial to
> find a fully qualified name of a method anymore.

I suppose only bound methods should be pickleable:

>>> class C:
...     def m(self): pass
... 
>>> c = C()
>>> c.m
<bound method C.m of <__main__.C object at 0x7fa81299b150>>
>>> c.m.__self__.__module__
'__main__'

And perhaps class methods too:

>>> class C:
...     @classmethod
...     def cm(self): pass
... 
>>> C.cm
<bound method type.cm of <class '__main__.C'>>
>>> C.cm.__self__
<class '__main__.C'>
>>> C.cm.__self__.__module__
'__main__'


> Also we need to
> decide where to stop: should methods of nested classes be pickleable?

As we want, but they needn't be.
msg112488 - (view) Author: Jean-Paul Calderone (exarkun) * (Python committer) Date: 2010-08-02 15:50
> Note, however that since unbound methods have been removed in 3.x, it is not trivial to find a fully qualified name of a method anymore.

This is a rather sad loss of functionality.
msg112496 - (view) Author: Alexandre Vassalotti (alexandre.vassalotti) * (Python committer) Date: 2010-08-02 16:43
The security issue mentioned previously has been known for years. And, it is easy to protect against. See http://docs.python.org/py3k/library/pickle.html#restricting-globals

Also I am against adding pickling support to code objects. Code objects have no backward-compatibility constraint unlike pickles.

Antoine is right about we should be using a method fully-qualified name to pickle it. However, the problem with this approach is a method doesn't always have fully-qualified name (see issue3657). ForkingPickler in Lib/multiprocessing/forking.py uses this approach to add pickling support to methods.
msg129202 - (view) Author: Ram Rachum (cool-RR) * Date: 2011-02-23 14:53
I also miss being able to pickle unbound methods on Python 3. I don't think there's an interest in pickling the actual code objects. In my opinion, unbound methods should be pickled exactly like all the other Python definitions, such as bound methods, top-level functions, and classes: They should be pickled by name.

IIUC, the challenge is how to figure out on which class an unbound method is defined. I'm using the term "unbound method" colloquially, I know it's implemented as a function. So perhaps Python needs to be changed to give unbound methods some attribute that will tell on which class they're defined?
msg129790 - (view) Author: Ram Rachum (cool-RR) * Date: 2011-03-01 18:41
Okay, as an initial suggestion, how about we give every function a `.__parent_class__` attribute saying which class it is a method of? I feel this is a bit of a duct tape solution, but I don't see any other alternative.
msg129797 - (view) Author: Raymond Hettinger (rhettinger) * (Python committer) Date: 2011-03-01 19:39
> how about we give every function a `.__parent_class__` 
> attribute saying which class it is a method of? 

Won't work.  The same function can be used in multiple classes.

The function object is independent of the class.  This is conceptually no different that the unremarkable fact that any object can be stored in multiple dictionaries and the object is not responsible for knowing which dictionaries it is stored in.

def f(self): ...   # not even defined inside a class
A.f = f            # stored in class A
B.f = f            # also stored in class B
dir(f)             # f doesn't know where it is stored
msg129798 - (view) Author: Ram Rachum (cool-RR) * Date: 2011-03-01 19:49
Raymond: I don't think this matters. We don't need a canonical `.__parent_class__`, we just need to know where that function is defined so we could find it when unpickling. In the example that you gave, `f` would have a `.__parent_class__` of `None`, and it would be pickleable because it would be found on the top-level of the module it's defined on.
msg129801 - (view) Author: Raymond Hettinger (rhettinger) * (Python committer) Date: 2011-03-01 20:24
This isn't worth introducing poorly thought out hacks.
msg129803 - (view) Author: Ram Rachum (cool-RR) * Date: 2011-03-01 20:38
> This isn't worth introducing poorly thought out hacks.

Being able to pickle unbound methods is important. In my project I have objects that refer to unbound methods. Now these objects are unpickleable. I can't save them to disk and I can't use the multiprocessing module on them. That's a big problem.
msg129804 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2011-03-01 20:47
> Being able to pickle unbound methods is important. In my project I have 
> objects that refer to unbound methods. Now these objects are
> unpickleable. I can't save them to disk and I can't use the
> multiprocessing module on them. That's a big problem.

Judging from all that has been said on this issue, I think the best you can do now is try to whip up a patch and upload it if it ends up not too hackish.
msg129805 - (view) Author: Ram Rachum (cool-RR) * Date: 2011-03-01 21:03
> [...]  try to whip up a patch and upload it if it ends up not too hackish.

To have a non-hackish patch we need a non-hackish idea. The `.__parent_class__` idea looks hackish to me, but now that I think about it, how is it more hackish than a function's `.__module__` attribute?

I mean, a function's `.__module__` attribute says on which module the function was originally defined, but the function could be accessible on any other module and any other namespace or class. Its `.__module__` would remain constant, because it's the one place where you are guaranteed to be able to find the function, assuming it's defined in the top-level. So the `.__module__` attribute is used in unpickling the function. How is the `.__parent_class__` suggestion more hackish than `.__module__`?
msg129806 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2011-03-01 21:08
> To have a non-hackish patch we need a non-hackish idea. The
> `.__parent_class__` idea looks hackish to me, but now that I think
> about it, how is it more hackish than a function's `.__module__`
> attribute?

Not much, agreed. You might want to call it `__namespace__` instead if
you want it to look cleaner :)
(and it could be useful for other purposes such as e.g. introspection)

But by "hackish" I meant the possible implementation of it, not the idea
itself. That's what a patch would help assess.
msg129809 - (view) Author: Amaury Forgeot d'Arc (amaury.forgeotdarc) * (Python committer) Date: 2011-03-01 21:29
> Being able to pickle unbound methods is important. In my project I have 
> objects that refer to unbound methods. Now these objects are
> unpickleable. I can't save them to disk and I can't use the
> multiprocessing module on them. That's a big problem.

The multiprocessing module *can* pickle bound and unbound methods (see below), but only with the multiprocessing.Process class. It does not work with Pool.map(), for example.  The reason is that Process uses the special ForkingPickler that has special code to handle methods.  Pool.map could be fixed IMO.

Is "ForkingPickler" enough for your needs?



==== mod.py ============
class C:
    def foo(self):
        print("CALLED")
==== main.py ===========
from mod import C
if __name__ == '__main__':
    from multiprocessing import Process
    p = Process(target=C().foo)
    p.start(); p.join()
    p = Process(target=C.foo, args=(C(),))
    p.start(); p.join()
msg129812 - (view) Author: Ram Rachum (cool-RR) * Date: 2011-03-01 21:42
Amaury: I don't think ForkingPickler works for unbound methods defined in user code, which are implemented as functions. I think it only works for method-descriptors and wrapper-descriptors.
msg129813 - (view) Author: Amaury Forgeot d'Arc (amaury.forgeotdarc) * (Python committer) Date: 2011-03-01 21:56
did you see my example above? it passes methods defined in user code.
msg129867 - (view) Author: Ram Rachum (cool-RR) * Date: 2011-03-02 10:35
Amaury:

Your example succeeds on Linux but fails on Windows:

	$ python3.2 main.py
	CALLED
	Traceback (most recent call last):
	  File "C:\Python32\Lib\pickle.py", line 679, in save_global
		klass = getattr(mod, name)
	AttributeError: 'module' object has no attribute 'foo'

	During handling of the above exception, another exception occurred:

	Traceback (most recent call last):
	  File "main.py", line 7, in <module>
		p.start(); p.join()
	  File "C:\Python32\Lib\multiprocessing\process.py", line 130, in start
		self._popen = Popen(self)
	  File "C:\Python32\Lib\multiprocessing\forking.py", line 267, in __init__
		dump(process_obj, to_child, HIGHEST_PROTOCOL)
	  File "C:\Python32\Lib\multiprocessing\forking.py", line 190, in dump
		ForkingPickler(file, protocol).dump(obj)
	  File "C:\Python32\Lib\pickle.py", line 237, in dump
		self.save(obj)
	  File "C:\Python32\Lib\pickle.py", line 344, in save
		self.save_reduce(obj=obj, *rv)
	  File "C:\Python32\Lib\pickle.py", line 432, in save_reduce
		save(state)
	  File "C:\Python32\Lib\pickle.py", line 299, in save
		f(self, obj) # Call unbound method with explicit self
	  File "C:\Python32\Lib\pickle.py", line 623, in save_dict
		self._batch_setitems(obj.items())
	  File "C:\Python32\Lib\pickle.py", line 656, in _batch_setitems
		save(v)
	  File "C:\Python32\Lib\pickle.py", line 299, in save
		f(self, obj) # Call unbound method with explicit self
	  File "C:\Python32\Lib\pickle.py", line 683, in save_global
		(obj, module, name))
	_pickle.PicklingError: Can't pickle <function foo at 0x00C4EBB8>: it's not found as mod.foo

	User@TURING ~/Desktop/temp
	$ Traceback (most recent call last):
	  File "<string>", line 1, in <module>
	  File "C:\Python32\Lib\multiprocessing\forking.py", line 370, in main
		self = load(from_parent)
	EOFError
msg129868 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2011-03-02 10:37
> Amaury:
> 
> Your example succeeds on Linux but fails on Windows:
> 
> 	$ python3.2 main.py

I think the difference has to do with Python 3 vs. Python 2.
In Python 3 unbound methods are not wrapped in a specific object, and so
ForkingPickler does not find their global name.
msg129882 - (view) Author: Amaury Forgeot d'Arc (amaury.forgeotdarc) * (Python committer) Date: 2011-03-02 12:18
OK, let's go back to the "__namespace__" idea, then. 

A long time ago I had the idea that the ast compiler could remember the list of "named blocks" (classes, functions) with their line numbers;
for example, the statement "class C" spans from line 20 to 40, "def foo()" spans from line 26 to 30.
Then, it's easy to locate the function "C.foo" if you only have its co_firstlineno.  This would also be a replacement for the awful hacks in Lib/trace.py::file_module_function_of() (please read the code and say "aaargh!").
This information would be stored in the module itself, and probably compressed with techniques similar to co_lnotab.
msg130054 - (view) Author: Ram Rachum (cool-RR) * Date: 2011-03-04 14:06
I don't have the time and the ability to write the patch that implements this. I'll be happy to write tests if you think this will help.
msg148771 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2011-12-02 19:12
PEP 3155 is now implemented (the __qualname__ attribute), making many more things potentially picklable. See PEP 3154 for a hypothetical new pickle protocol, and issue 13520 for a patch proposal.
msg204770 - (view) Author: Alexandre Vassalotti (alexandre.vassalotti) * (Python committer) Date: 2013-11-30 03:51
As part of the implementation of PEP 3154 (Pickle protocol 4), I've introduced support for pickling methods for all pickle protocols (and not just for the new protocol 4). This was implemented by adding the appropriate __reduce__ method on built-in functions and methods. In addition, pickling methods in nested classes is now supported by protocol 4 through the use of the __qualname__ attribute.
History
Date User Action Args
2022-04-11 14:57:03adminsetgithub: 53522
2013-11-30 03:51:13alexandre.vassalottisetstatus: open -> closed
versions: + Python 3.4, - Python 3.3
messages: + msg204770

resolution: fixed
stage: resolved
2013-05-03 00:28:45alexandre.vassalottisetdependencies: + Implement PEP 3154 (pickle protocol 4)
2011-12-02 19:12:39pitrousetmessages: + msg148771
2011-03-04 14:06:23cool-RRsetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, amaury.forgeotdarc, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR
messages: + msg130054
2011-03-02 12:18:47amaury.forgeotdarcsetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, amaury.forgeotdarc, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR
messages: + msg129882
2011-03-02 10:37:30pitrousetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, amaury.forgeotdarc, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR
messages: + msg129868
2011-03-02 10:35:17cool-RRsetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, amaury.forgeotdarc, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR
messages: + msg129867
2011-03-01 21:56:23amaury.forgeotdarcsetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, amaury.forgeotdarc, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR
messages: + msg129813
2011-03-01 21:42:34cool-RRsetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, amaury.forgeotdarc, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR
messages: + msg129812
2011-03-01 21:29:12amaury.forgeotdarcsetnosy: + amaury.forgeotdarc
messages: + msg129809
2011-03-01 21:08:49pitrousetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR
messages: + msg129806
2011-03-01 21:07:14daniel.urbansetnosy: + daniel.urban
2011-03-01 21:03:13cool-RRsetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR
messages: + msg129805
2011-03-01 20:47:18pitrousetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR
messages: + msg129804
2011-03-01 20:38:28cool-RRsetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR
messages: + msg129803
2011-03-01 20:24:36rhettingersetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR
messages: + msg129801
2011-03-01 19:49:09cool-RRsetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR
messages: + msg129798
2011-03-01 19:39:55rhettingersetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR
messages: + msg129797
2011-03-01 18:41:49cool-RRsetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR
messages: + msg129790
2011-02-23 14:54:15cool-RRsetnosy: lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR
versions: + Python 3.3, - Python 3.2
2011-02-23 14:53:54cool-RRsetnosy: + cool-RR
messages: + msg129202
2010-08-02 16:43:23alexandre.vassalottisetmessages: + msg112496
2010-08-02 15:50:34exarkunsetmessages: + msg112488
2010-08-02 15:20:23pitrousetnosy: + loewis, rhettinger, hinsen, obamausa8
2010-08-02 15:19:19pitroulinkissue558238 superseder
2010-08-02 15:08:19pitrousetmessages: + msg112486
2010-08-02 14:57:34eric.araujosetnosy: + eric.araujo
2010-08-02 14:56:11belopolskysetmessages: + msg112483
2010-08-02 14:55:48pitrousetmessages: + msg112482
2010-08-02 14:32:37exarkunsetmessages: + msg112479
2010-08-02 14:27:35lemburgsetmessages: + msg112477
2010-08-02 14:13:55belopolskysetmessages: + msg112476
2010-08-02 14:11:29lemburgsetmessages: + msg112475
2010-08-02 14:09:27pitrousetmessages: + msg112474
2010-08-02 14:08:51belopolskysetmessages: + msg112473
2010-08-02 14:05:43lemburgsetmessages: + msg112471
2010-08-02 14:03:56belopolskysetnosy: + pitrou, alexandre.vassalotti
2010-08-02 13:54:15belopolskysetmessages: + msg112468
2010-08-02 13:52:05exarkunsetmessages: + msg112467
2010-08-02 13:25:41lemburgsetmessages: + msg112462
2010-08-02 12:29:23exarkunsetmessages: + msg112453
2010-08-02 12:12:42lemburgsetmessages: + msg112450
2010-08-02 12:01:37exarkunsetmessages: + msg112446
2010-08-02 08:10:32lemburgsetnosy: + lemburg
messages: + msg112428
2010-08-01 23:55:16belopolskysetnosy: + belopolsky

messages: + msg112405
versions: + Python 3.2
2010-07-16 19:25:18exarkuncreate