This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author kristjan.jonsson
Recipients giampaolo.rodola, kristjan.jonsson, sbt
Date 2012-03-19.19:18:35
SpamBayes Score 3.8221733e-06
Marked as misclassified No
Message-id <1332184716.51.0.320003444901.issue14310@psf.upfronthosting.co.za>
In-reply-to
Content
Good point.  The docs don't actually say, except that the docs show a pretty elaborate process dance, where the source process only closes its side of the socket once the target process has called WSASocket().

If duplication happened early, then there would have to be a way to "unduplicate" it in the source process if, say, IPC somehow failed.  There is currently no api to undo the effects of WSADuplicateSocket().

It's easy enough to test, of course.  I´ll do some test using my unittest.
History
Date User Action Args
2012-03-19 19:18:36kristjan.jonssonsetrecipients: + kristjan.jonsson, giampaolo.rodola, sbt
2012-03-19 19:18:36kristjan.jonssonsetmessageid: <1332184716.51.0.320003444901.issue14310@psf.upfronthosting.co.za>
2012-03-19 19:18:35kristjan.jonssonlinkissue14310 messages
2012-03-19 19:18:35kristjan.jonssoncreate