This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

classification
Title: Add loop.connect_accepted_socket
Type: enhancement Stage: resolved
Components: asyncio Versions: Python 3.6, Python 3.4, Python 3.5
process
Status: closed Resolution: fixed
Dependencies: Superseder:
Assigned To: yselivanov Nosy List: gvanrossum, j1m, python-dev, vstinner, yselivanov
Priority: normal Keywords: patch

Created on 2016-06-26 16:05 by j1m, last changed 2022-04-11 14:58 by admin. This issue is now closed.

Files
File name Uploaded Description Edit
connect_accepted_socket-doc.patch j1m, 2016-07-14 14:12 review
Messages (44)
msg269293 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-06-26 16:05
The event loop create_connection method can take a socket to create a connection on an existing socket, including sockets obtained via an external listener.  If an SSL context is provided, however, it assumes it's creating a client connection, making it impossible to use it in a server.

I've recently ported ZEO to asyncio. My original implementation used a separate thread for each connection and a thread for listening for connections.  I think there are cases where this makes a lot of sense.  Blocky operations only affect one client and, IMO, using an asynchronous model can simplify networking code even when there's only one connection. Unfortunately, this didn't work on Linux with SSL due to issues with SSL and non-blocking sockets. (Oddly, it worked fine on Mac OS X.)

I've switched my code to use create_server, but this has led to stability problems.  Beyond http://bugs.python.org/issue27386, I'm seeing a lot of test instability.  I can't get through the ZEO tests without some test failing, although the tests pass when run individually. I suspect that this is due to a problem in my error handling, asyncio's error handling, or likely both.

Note that the ZEO test suite is pretty ruthless, doing whatever they can to break ZEO servers and clients.

I have a version of my multi-threaded code that monkey-patches loop instances to pass server_side=True to _make_ssl_transport.  With that awful hack, I can use an external listener and tests usually run without errors. :)

I'd be more than happy to create a PR that adds this option (including test and docs). Please just give me the word. :)
msg269297 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-06-26 16:41
> On Jun 26, 2016, at 12:05 PM, Jim Fulton <report@bugs.python.org> wrote:
> 
> I've switched my code to use create_server, but this has led to stability problems.

BTW, did you try to run ZEO tests on uvloop? I'm just curious if stability is somehow related to asyncio design, or its just implementation quirks.
msg269315 - (view) Author: Guido van Rossum (gvanrossum) * (Python committer) Date: 2016-06-26 21:41
I'm confused. create_connection() is meant for creating client connection,
so I don't think a server_side flag makes sense. (There are lower-level
internal APIs that do take a server_side flag, but create_connection() is
just one caller for these.)

If create_server() is buggy we should fix those bugs!
msg269492 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-06-29 13:40
Tests are also unstable with uvloop. (Although uvloop doesn't have http://bugs.python.org/issue27386 at least.)

I was eventually able to wrestle the test into submission using asyncio.Server. I suspect that some of this had to do with issues closing connections at the end of tests.  I made my close logic more paranoid and that *seemed* to help.  Some of the instability was due to test bugs that were activated by the different timing characteristics of using asyncio.Server.
msg269493 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-06-29 13:56
Guido, IMO, there's value in having the ability to accept connections independently of handling them.

It wasn't clear to me from reading the documentation that create_connection is only meant for making client connections, especially given that it can take an already connected socket.  It works well for non-SSL server sockets and would work for SSL with a trivial change.

This issue was discussed on the tulip list or issue tracker a couple of years ago. (Sorry, I can't find the link ATM.) I think it was dismissed because no one felt like looking into it and because you asserted that it makes no sense to use an async library when handling each connection in a separate thread.

IMO, async loop is useful even for a single connection when reading and writing are not purely synchronous. In ZEO it's very useful that that the server can send data to a client independent of requests the client is making.  (Technically, under the hood this often means that there are really 2 I/O channels, the client's TCP connection and whatever mechanism the loop uses to allow itself to be woken asynchronously as in call_soon_threadsafe.)
msg269494 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-06-29 14:01
I agree that if create_server (or asyncio.Server) is buggy, it should be fixed!

However, IMO, it's useful to be able to accept a connection outside of an asyncio event loop and then hand the loop the connected socket.
msg269513 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-06-29 15:05
> However, IMO, it's useful to be able to accept a connection outside of an asyncio event loop and then hand the loop the connected socket.

Looks like what you're asking for is a way to wrap existing socket object into a (transport, protocol) pair.  I'm -1 to add this new semantics to loop.create_connection, as I think it will complicate it too much.

However, we can consider adding something like 

   loop.wrap_socket(protocol_factory, sock) -> Transport
msg269515 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-06-29 15:10
Yury, I'm curious what you think the socket argument to create_connection is about.
msg269516 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-06-29 15:12
BTW, a problem with this proposal that I realized after submitting it is that it changes an API that has multiple implementations, including implementations outside of the Python codebase.  Arguably, this would require a PEP, at which point the change is no-longer trivial. :)
msg269519 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-06-29 15:20
> Yury, I'm curious what you think the socket argument to create_connection is about.

:)  The current intended purpose of create_connection is to create a client connection.  You're proposing to add a new argument -- server_side -- which I think will confuse the users of create_connection.

What I'm saying is that we may consider creating a low-level loop.wrap_socket, which would be generic and suitable to be used for both client and server connections.  We could even refactor create_connection to use wrap_socket when 'sock' argument is passed to it.

We already have something similar, although it's a private API -- _make_socket_transport.


> BTW, a problem with this proposal that I realized after submitting it is that it changes an API that has multiple implementations, including implementations outside of the Python codebase.  Arguably, this would require a PEP, at which point the change is no-longer trivial. :)

No need for a PEP; Guido's approval is enough usually.
msg269524 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-06-29 15:31
>> Yury, I'm curious what you think the socket argument to create_connection is about.
>
> :)  The current intended purpose of create_connection is to create a client connection.  You're proposing to add a new argument -- server_side -- which I think will confuse the users of create_connection.

Perhaps. I'll note that the word "client" appears nowhere in the documentation of create_connection. I needed a way to wrap a socket and create_connection took one. Wrapping a server socket seemed to be to be the most likely use case for it. <shrug>



>
> What I'm saying is that we may consider creating a low-level loop.wrap_socket, which would be generic and suitable to be used for both client and server connections.  We could even refactor create_connection to use wrap_socket when 'sock' argument is passed to it.
>
> We already have something similar, although it's a private API -- _make_socket_transport.

Right. That's what I'm monkey-patching now to work around this, mostly as an experiment.

>
>> BTW, a problem with this proposal that I realized after submitting it is that it changes an API that has multiple implementations, including implementations outside of the Python codebase.  Arguably, this would require a PEP, at which point the change is no-longer trivial. :)
>
> No need for a PEP; Guido's approval is enough usually.

/me holds breath
msg269536 - (view) Author: Guido van Rossum (gvanrossum) * (Python committer) Date: 2016-06-29 18:15
Hm. The docs in PEP 3156 do mention that create_connection() is for clients (though it weakens this with "typically"): https://www.python.org/dev/peps/pep-3156/#internet-connections

I always think of TCP connections (which is what create_connection() is about) as essentially asymmetrical -- the server uses bind() and listen() and then sits in an accept() loop accepting connections, while the client reaches out to the server using connect(). And create_connection() is a wrapper around that connect() call; for servers we have create_server(). (The asymmetry in naming reflects the asymmetry in functionality and API.)

You can pass a pre-connected socket in to create_connection() for edge cases where you need control over how the socket is created and initialized or when there's a 3rd party library that can give you a connected socket that you want/need to use. Similarly, you can pass a pre-bound socket to create_server().

I guess at the lower, TCP level, there isn't much of a difference between a client-side socket and the kind of server-side socket that's returned by accept(). And maybe that's also the case for SSL (I've never actually understood most of the details of using SSL).

Maybe it's just culture shock? Or maybe we just need a public API that roughly represents the pair of calls to _make_ssl_transport() and _make_socket_transport() that are currently appearing both in _create_connection_transport() and in _accept_connection2(), plus some of the code around it that's a little tricky?
msg269540 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-06-29 18:28
With SSL, the protocol is a little different clients and servers, although that may just be in the handshake. I'm no SSL expert by any means.  When you call wrap_socket on an SSLContext, you can pass server_side, which defaults to False. If you get this wrong, you end up with an SSL protocol error.

FWIW, here's my awful monkey patch to work around this experimentally in ZEO:

https://github.com/zopefoundation/ZEO/pull/32/commits/daca97cb4292ad9a316a1924960a5fbf54d3622b#diff-248404a51b1503a38c3319c85e6c1c5aR174
msg269545 - (view) Author: Guido van Rossum (gvanrossum) * (Python committer) Date: 2016-06-29 19:09
Rather tham monkey-patching, in general I recommend just copying some
code from the asyncio library and calling that. In this case you'd be
copying a tiny bit of code from create_connection(). You'd still be
calling an internal API, _make_ssl_transport(), but your code would
still be less likely to change when some part of the asyncio library
changes than with monkey-patching. (Of course, since you pretty much
invented monkey-patching, you may feel differently. :-)
msg269546 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-06-29 19:14
> Rather tham monkey-patching, in general I recommend just copying some
code from the asyncio library and calling that. In this case you'd be
copying a tiny bit of code from create_connection(). You'd still be
calling an internal API, _make_ssl_transport(), but your code would
still be less likely to change when some part of the asyncio library
changes than with monkey-patching. 

But this kind of defeats the purpose of pluggable event loop etc.  I can't implement all asyncio private APIs for uvloop.  Once you start using that, your code can't run on uvloop or any other asyncio implementation.

> Maybe it's just culture shock? Or maybe we just need a public API that roughly represents the pair of calls to _make_ssl_transport() and _make_socket_transport() that are currently appearing both in _create_connection_transport() and in _accept_connection2(), plus some of the code around it that's a little tricky?

That's essentially what I wanted `loop.wrap_socket` to do (see msg269519)
msg269547 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-06-29 19:16
:)

I'm not a fan of monkey patching code in production, unless the code I'm monkey patching is code I control. (And since releasing code now is a lot easier than it used to be, I have much less occasion to monkey-patch code I control.)

(I'm a big fan of and am also terrified by gevent and I generally avoid it's use of monkey patching.)
msg270046 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-07-09 15:17
I'd still like to find a way to handle already accepted server sockets.

Can we decide on either:

- a server_side flag to create_connection or

- A new interface for handling an already accepted socket? I would
  call this handle_connection, but I'll take any name. :)

I'm fine with and willing to implement either alternative.
msg270052 - (view) Author: Guido van Rossum (gvanrossum) * (Python committer) Date: 2016-07-09 16:19
I like the new method better. Submit away!

--Guido (mobile)
msg270059 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-07-09 18:40
We need an executive (Guido) decision on the name of the new API. Yury wants wrap_socket.

I don't like wrap_socket because:

- It implies that it's for wrapping client and server sockets.
  (It shouldn't be for wrapping client sockets because TOOWTDI
   and create_connection.)

- I prefer names that are about goal rather than mechanism.

But I can live with anything.

I'll defer to Yury unless Guido voices an opinion.
msg270060 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-07-09 18:40
> wrap_socket implies that it's for wrapping client or server sockets, but it's not. It's only for handling server sockets. Also, I prefer a name that reflects goal, not mechanism.

> I think the name should be discussed over here: https://bugs.python.org/issue27392.

Why can't `wrap_socket` be used for wrapping client sockets?  I think we can refactor asyncio to use it in 'create_connection', and maybe to accept new connections.

To my ear, 'asyncio.handle_connection' implies that asyncio will "handle" the connection, i.e. that asyncio itself would do more than just wrapping the socket and attaching a protocol instance.
msg270061 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-07-09 18:45
> Why can't `wrap_socket` be used for wrapping client sockets? 

TOOWTDI and create_connection.  

I suppose we could remove (unadvertise) this functionality from create_connection.  Then we'd have code bloat because backward compatibility.
msg270062 - (view) Author: Guido van Rossum (gvanrossum) * (Python committer) Date: 2016-07-09 19:00
Hold on. It's weekend. I will review this when I am near a laptop again.

--Guido (mobile)
msg270133 - (view) Author: Guido van Rossum (gvanrossum) * (Python committer) Date: 2016-07-10 20:40
How about we use connect_socket() or a variant on that name? That feels similar to connect_{read,write}_pipe(), which also take a protocol_factory and an already-opened I/O object.

If it's only for server-side sockets I'd call it connect_server_side_socket() -- I don't care that the name is long, the use case is not that common. Or we could have connect_socket() with a server_side flag and a server_hostname argument, and refactor some things so that it shares most of its implementation with _create_connection_transport().
msg270182 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-07-11 14:29
> How about we use connect_socket() or a variant on that name? That feels similar to connect_{read,write}_pipe(), which also take a protocol_factory and an already-opened I/O object.

I like the idea to use "connect_" prefix here.  How about simple "connect_accepted_socket"?
msg270185 - (view) Author: Guido van Rossum (gvanrossum) * (Python committer) Date: 2016-07-11 15:03
Sounds Good To Me.
msg270272 - (view) Author: Roundup Robot (python-dev) (Python triager) Date: 2016-07-12 22:24
New changeset 3e44c449433a by Yury Selivanov in branch '3.5':
Issue #27392: Add loop.connect_accepted_socket().
https://hg.python.org/cpython/rev/3e44c449433a

New changeset 2f0716009132 by Yury Selivanov in branch 'default':
Merge 3.5 (issue #27392)
https://hg.python.org/cpython/rev/2f0716009132
msg270273 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-07-12 22:25
Let's keep this issue open until we have the docs updated.
msg270411 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-07-14 14:12
Here's a daft doc update.
msg270785 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-07-18 19:09
Does the draft doc change look OK?
msg270850 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-07-19 23:00
Jim, the patch lgtm. Will merge it soon.
msg272129 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-08-07 18:32
FTR another use case for this. :)

We have a ZEO applications where individual database users authenticate via self-signed certs. The server's SSL connection has to have this collection of certs. User CRUD operations can add and remove certs to authenticate against.  SSL contexts don't provide an API for removing (or even clearing) CAs used for authentication, so we need to create new SSL contexts when the set of valid certs change.  There's no way to update the SSL context used by a server, so we're wrapping accepted sockets ourselves, so we can use dynamic SSL contexts.

Some alternatives:

- Add an SSLContext API for removing or clearing CAs

- Add a Server API to update the SSL context used for new connections.  (I may pursue this at some point. I spent a few minutes trying to find where a Server's SSL context is stored, but failed and can't spend more time ATM.)
msg272177 - (view) Author: Guido van Rossum (gvanrossum) * (Python committer) Date: 2016-08-08 16:33
Did the patch not get merged??

On Sun, Aug 7, 2016 at 11:32 AM, Jim Fulton <report@bugs.python.org> wrote:

>
> Jim Fulton added the comment:
>
> FTR another use case for this. :)
>
> We have a ZEO applications where individual database users authenticate
> via self-signed certs. The server's SSL connection has to have this
> collection of certs. User CRUD operations can add and remove certs to
> authenticate against.  SSL contexts don't provide an API for removing (or
> even clearing) CAs used for authentication, so we need to create new SSL
> contexts when the set of valid certs change.  There's no way to update the
> SSL context used by a server, so we're wrapping accepted sockets ourselves,
> so we can use dynamic SSL contexts.
>
> Some alternatives:
>
> - Add an SSLContext API for removing or clearing CAs
>
> - Add a Server API to update the SSL context used for new connections.  (I
> may pursue this at some point. I spent a few minutes trying to find where a
> Server's SSL context is stored, but failed and can't spend more time ATM.)
>
> ----------
>
> _______________________________________
> Python tracker <report@bugs.python.org>
> <http://bugs.python.org/issue27392>
> _______________________________________
>
msg272178 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-08-08 16:36
idk if the patch got merged.

I just added the last comment for informational purposes. :)

Perhaps this issue can be closed.
msg272179 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-08-08 16:41
> Did the patch not get merged??

connect_accepted_socket was merged.  The docs patch is still pending (nothing wrong with it, I just need to commit it)
msg272203 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-08-09 01:25
Hm, I'm working on adding connect_accepted_socket to the uvloop.  There is one difference between connect_accepted_socket and create_server/create_unix_server:  the latter APIs forbid to pass boolean `ssl` argument, they require `ssl` to be an instance of `SSLContext`.

Should we have the same requirement for the 'ssl' argument of newly added 'connect_accepted_socket'?
msg272204 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-08-09 01:38
Also I think we should add a check, that the passed socket is AF_UNIX or AF_INET(6)
msg272205 - (view) Author: Guido van Rossum (gvanrossum) * (Python committer) Date: 2016-08-09 01:40
Oh, I see. create_connection(..., ssl=True) creates a default SSLContext,
but create_server(..., ssl=True) is invalid, it requires
ssl=SSLContext(...). I like the latter for connect_accepted_socket(). I
think Jim will happily comply.

What would happen if some other socket type was passed? Would anything go
wrong, assuming it's a socket type that understands connections? (I think
checking for SOCK_STREAM is more important maybe).
msg272206 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-08-09 01:42
> What would happen if some other socket type was passed? Would anything go
wrong, assuming it's a socket type that understands connections? (I think
checking for SOCK_STREAM is more important maybe).

In uvloop I have to create different libuv handles for AF_UNIX and AF_INET.  I think I can only support those families.  Cheking for SOCK_STREAM is also important.
msg272207 - (view) Author: Guido van Rossum (gvanrossum) * (Python committer) Date: 2016-08-09 01:44
I think it's okay if uvloop only handles those socket types. But if asyncio
may be able to handle other types we shouldn't reject them just because we
haven't heard about them. (E.g. IIRC someone was using Bluetooth sockets.)
msg272232 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-08-09 10:56
WRT boolean for SSL, I think it's very common for clients to verify server certificates, but relatively uncommon for servers to require client certificates.  The impression I have from reading docs and stack overflow posts that the most common use case for the SSL module is connection to HTTPS sites. For this use case, using a default context makes a lot of sense.

It seems extremely unlikely to me for a server to use a default context.

But I'm not an SSL expert.
msg272233 - (view) Author: Jim Fulton (j1m) * (Python committer) Date: 2016-08-09 10:59
+1 restricting uvloop to AF_INET or AF_UNIX and SOCK_STREAM, at least until someone requests something else.
msg272280 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-08-09 23:43
> WRT boolean for SSL, I think it's very common for clients to verify server certificates, but relatively uncommon for servers to require client certificates.  The impression I have from reading docs and stack overflow posts that the most common use case for the SSL module is connection to HTTPS sites. For this use case, using a default context makes a lot of sense.

> It seems extremely unlikely to me for a server to use a default context.

I think in this case we should just mimic the API of create_server and create_unix_server.

As for restricting socket family type - I think Guido is right.  Although I'd love uvloop to be 100% compatible, I guess we shouldn't add artificial restrictions: if asyncio already supports AF_BLUETOOTH then let's keep it that way.
msg278201 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2016-10-06 18:10
AFAICT this issue was resolved in https://github.com/python/asyncio/pull/378. Closing this one. Thanks, Jim!
msg280236 - (view) Author: Roundup Robot (python-dev) (Python triager) Date: 2016-11-07 20:36
New changeset 3e6570231c80 by Yury Selivanov in branch '3.5':
Issue #27392: Document loop.connect_accepted_socket()
https://hg.python.org/cpython/rev/3e6570231c80

New changeset 6811df9e9797 by Yury Selivanov in branch '3.6':
Merge 3.5 (issue #27392)
https://hg.python.org/cpython/rev/6811df9e9797

New changeset 573bc1f9900e by Yury Selivanov in branch 'default':
Merge 3.6 (issue #27392)
https://hg.python.org/cpython/rev/573bc1f9900e
History
Date User Action Args
2022-04-11 14:58:33adminsetgithub: 71579
2016-11-07 20:36:55yselivanovsettitle: Add a server_side keyword parameter to create_connection -> Add loop.connect_accepted_socket
2016-11-07 20:36:12python-devsetmessages: + msg280236
2016-10-06 18:10:40yselivanovsetstatus: open -> closed
resolution: fixed
messages: + msg278201

stage: resolved
2016-08-09 23:43:28yselivanovsetmessages: + msg272280
2016-08-09 10:59:20j1msetmessages: + msg272233
2016-08-09 10:56:38j1msetmessages: + msg272232
2016-08-09 01:44:27gvanrossumsetmessages: + msg272207
2016-08-09 01:42:29yselivanovsetmessages: + msg272206
2016-08-09 01:40:52gvanrossumsetmessages: + msg272205
2016-08-09 01:38:54yselivanovsetmessages: + msg272204
2016-08-09 01:25:04yselivanovsetmessages: + msg272203
2016-08-08 16:41:59yselivanovsetmessages: + msg272179
2016-08-08 16:36:05j1msetmessages: + msg272178
2016-08-08 16:33:17gvanrossumsetmessages: + msg272177
2016-08-07 18:32:16j1msetmessages: + msg272129
2016-07-19 23:00:05yselivanovsetassignee: yselivanov
messages: + msg270850
2016-07-18 19:09:10j1msetmessages: + msg270785
2016-07-14 14:12:14j1msetfiles: + connect_accepted_socket-doc.patch
keywords: + patch
messages: + msg270411
2016-07-12 22:25:07yselivanovsetmessages: + msg270273
2016-07-12 22:24:33python-devsetnosy: + python-dev
messages: + msg270272
2016-07-11 15:03:36gvanrossumsetmessages: + msg270185
2016-07-11 14:29:22yselivanovsetmessages: + msg270182
2016-07-10 20:40:40gvanrossumsetmessages: + msg270133
2016-07-09 19:00:52gvanrossumsetmessages: + msg270062
2016-07-09 18:45:40j1msetmessages: + msg270061
2016-07-09 18:40:43yselivanovsetmessages: + msg270060
2016-07-09 18:40:28j1msetmessages: + msg270059
2016-07-09 16:19:34gvanrossumsetmessages: + msg270052
2016-07-09 15:17:47j1msetmessages: + msg270046
2016-06-29 19:16:59j1msetmessages: + msg269547
2016-06-29 19:14:24yselivanovsetmessages: + msg269546
2016-06-29 19:09:11gvanrossumsetmessages: + msg269545
2016-06-29 18:28:07j1msetmessages: + msg269540
2016-06-29 18:15:43gvanrossumsetmessages: + msg269536
2016-06-29 17:49:56gvanrossumsetmessages: - msg269529
2016-06-29 17:49:42gvanrossumsetmessages: - msg269525
2016-06-29 16:22:51j1msetmessages: + msg269529
2016-06-29 15:40:10j1msetmessages: + msg269525
2016-06-29 15:31:18j1msetmessages: + msg269524
2016-06-29 15:20:32yselivanovsetmessages: + msg269519
2016-06-29 15:12:10j1msetmessages: + msg269516
2016-06-29 15:10:02j1msetmessages: + msg269515
2016-06-29 15:05:10yselivanovsetmessages: + msg269513
2016-06-29 14:01:28j1msetmessages: + msg269494
2016-06-29 13:56:57j1msetmessages: + msg269493
2016-06-29 13:40:10j1msetmessages: + msg269492
2016-06-26 21:41:12gvanrossumsetmessages: + msg269315
2016-06-26 16:41:38yselivanovsetmessages: + msg269297
2016-06-26 16:05:16j1mcreate