msg110473 - (view) |
Author: Jean-Paul Calderone (exarkun) * |
Date: 2010-07-16 19:25 |
pickle doesn't support methods:
>>> class x:
... def y(self):
... pass
...
>>> import pickle
>>> pickle.dumps(x.y)
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
File "/home/exarkun/Projects/python/branches/py3k/Lib/pickle.py", line 1314, in dumps
Pickler(f, protocol, fix_imports=fix_imports).dump(obj)
_pickle.PicklingError: Can't pickle <class 'function'>: attribute lookup builtins.function failed
It would be easy to fix this, though. Here's a link to some code that implements it: http://twistedmatrix.com/trac/browser/trunk/twisted/persisted/styles.py?rev=1
|
msg112405 - (view) |
Author: Alexander Belopolsky (belopolsky) * |
Date: 2010-08-01 23:55 |
Not a proposed solution, but food for thought. Methods do have __reduce_ex__ method which works with protocol 3:
>>> class X:
... def f(self):
... pass
>>> X.f.__reduce_ex__(3)
(<function __newobj__ at 0x100579288>, (<class 'function'>,), {}, None, None)
This result is useless for several reasons:
1. <class 'function'> cannot be pickled because although it's name suggests a builtin, it is only available as types.FunctionType.
2. If we define builtins.function, X.f can be pickled
>>> import builtins, types
>>> builtins.function = types.FunctionType
>>> pickle.dumps(X.f)
b'\x80\x03cbuiltins\nfunction\nq\x00)\x81q\x01}q\x02b.'
but the result is useless:
>>> pickle.loads(_)
Traceback (most recent call last):
..
File "Lib/pickle.py", line 1317, in loads
encoding=encoding, errors=errors).load()
TypeError: Required argument 'code' (pos 1) not found
I think the approach of pickling the name of the function as is done in the Twisted link above is the only reasonable one and is consistent with the way module level functions are pickled.
|
msg112428 - (view) |
Author: Marc-Andre Lemburg (lemburg) * |
Date: 2010-08-02 08:10 |
Note that pickle deliberately does not support serializing code objects.
This is a security feature and should not be broken !
If you need to pickle such objects, you can easily register handlers that take care of this.
|
msg112446 - (view) |
Author: Jean-Paul Calderone (exarkun) * |
Date: 2010-08-02 12:01 |
> This is a security feature and should not be broken !
Can you explain this?
I don't think I agree, since an attacker can always serialize whatever they feel like. It's the person doing the deserialization that has to be careful.
|
msg112450 - (view) |
Author: Marc-Andre Lemburg (lemburg) * |
Date: 2010-08-02 12:12 |
Jean-Paul Calderone wrote:
>
> Jean-Paul Calderone <exarkun@twistedmatrix.com> added the comment:
>
>> This is a security feature and should not be broken !
>
> Can you explain this?
>
> I don't think I agree, since an attacker can always serialize whatever they feel like. It's the person doing the deserialization that has to be careful.
The marshal protocol which is used for storing PYC files has support
for serializing code objects.
The support on pickles, which are meant for data serialization, was not added
per default to prevent unwanted code execution during deserialization,
but instead made possible via pickle hooks, so as to make the decision
to support code serialization an explicit application choice.
By adding default support for unpickling code objects, you can trick
the unpickling code into executing serialized code: first you add
a serialized version of a malicious class definition, then you add
an object of that class to the pickle. At object restore time, the
malicious class can then run os.system('rm -rf /')...
|
msg112453 - (view) |
Author: Jean-Paul Calderone (exarkun) * |
Date: 2010-08-02 12:29 |
> By adding default support for unpickling code objects, you can trick
the unpickling code into executing serialized code:
This doesn't sound correct to me.
You can *already* trick unpickling code into executing serialized code. You don't need this feature in order to be able to do it.
|
msg112462 - (view) |
Author: Marc-Andre Lemburg (lemburg) * |
Date: 2010-08-02 13:25 |
Jean-Paul Calderone wrote:
>
> Jean-Paul Calderone <exarkun@twistedmatrix.com> added the comment:
>
>> By adding default support for unpickling code objects, you can trick
> the unpickling code into executing serialized code:
>
> This doesn't sound correct to me.
>
> You can *already* trick unpickling code into executing serialized code. You don't need this feature in order to be able to do it.
How ?
|
msg112467 - (view) |
Author: Jean-Paul Calderone (exarkun) * |
Date: 2010-08-02 13:52 |
For example:
exarkun@boson:~$ python
Python 2.6.4 (r264:75706, Dec 7 2009, 18:45:15)
[GCC 4.4.1] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>> class x(object):
... def __reduce__(self):
... import os
... return os.system, ('echo "Hello from sploitland"',)
...
>>> import pickle
>>> pickle.loads(pickle.dumps(x()))
Hello from sploitland
0
>>>
|
msg112468 - (view) |
Author: Alexander Belopolsky (belopolsky) * |
Date: 2010-08-02 13:54 |
On Mon, Aug 2, 2010 at 9:25 AM, Marc-Andre Lemburg
<report@bugs.python.org> wrote:
..
>> You can *already* trick unpickling code into executing serialized code. You don't need
> this feature in order to be able to do it.
>
> How ?
>
>>> from pickle import *
>>> class evil:
... def __reduce__(self):
... return (exec, ("print('pwned!')",))
...
>>> s = dumps(evil())
>>> loads(s)
pwned!
See also http://bugs.python.org/issue9120#msg109004 .
AFAICT, the reason functions and classes are pickled by name has
nothing to do with security. From the manual:
"""Similarly, when class instances are pickled, their class’s code and
data are not pickled along with them. Only the instance data are
pickled. This is done on purpose, so you can fix bugs in a class or
add methods to the class and still load objects that were created with
an earlier version of the class. If you plan to have long-lived
objects that will see many versions of a class, it may be worthwhile
to put a version number in the objects so that suitable conversions
can be made by the class’s __setstate__() method.
""" http://docs.python.org/library/pickle.html?#what-can-be-pickled-and-unpickled
|
msg112471 - (view) |
Author: Marc-Andre Lemburg (lemburg) * |
Date: 2010-08-02 14:05 |
Jean-Paul Calderone wrote:
>
> Jean-Paul Calderone <exarkun@twistedmatrix.com> added the comment:
>
> For example:
>
> exarkun@boson:~$ python
> Python 2.6.4 (r264:75706, Dec 7 2009, 18:45:15)
> [GCC 4.4.1] on linux2
> Type "help", "copyright", "credits" or "license" for more information.
>>>> class x(object):
> ... def __reduce__(self):
> ... import os
> ... return os.system, ('echo "Hello from sploitland"',)
> ...
>>>> import pickle
>>>> pickle.loads(pickle.dumps(x()))
> Hello from sploitland
> 0
But here you are not transferring malicious code in the pickle
string, you are just triggering the execution of such code that
you already have (and are in control of).
Without the definition of class x on the receiving side, there
would be no exploit.
By adding support for pickling code objects, you'd make it possible
to place the definition of class x into the pickle string and
you would no longer be in control of that code.
|
msg112473 - (view) |
Author: Alexander Belopolsky (belopolsky) * |
Date: 2010-08-02 14:08 |
On Mon, Aug 2, 2010 at 10:05 AM, Marc-Andre Lemburg
<report@bugs.python.org> wrote:
..
> Without the definition of class x on the receiving side, there
> would be no exploit.
You are mistaken. Try adding del x (or del evil in my example)
between dumps and loads and see it working.
|
msg112474 - (view) |
Author: Antoine Pitrou (pitrou) * |
Date: 2010-08-02 14:09 |
I think methods should be picklable just like global functions are, that is, by pickling a tuple of the fully-qualified class name ("mymodule.myclass"), method name ("mymethod"), and self.
|
msg112475 - (view) |
Author: Marc-Andre Lemburg (lemburg) * |
Date: 2010-08-02 14:11 |
M.-A. Lemburg wrote:
> Jean-Paul Calderone wrote:
>>
>> Jean-Paul Calderone <exarkun@twistedmatrix.com> added the comment:
>>
>> For example:
>>
>> exarkun@boson:~$ python
>> Python 2.6.4 (r264:75706, Dec 7 2009, 18:45:15)
>> [GCC 4.4.1] on linux2
>> Type "help", "copyright", "credits" or "license" for more information.
>>>>> class x(object):
>> ... def __reduce__(self):
>> ... import os
>> ... return os.system, ('echo "Hello from sploitland"',)
>> ...
>>>>> import pickle
>>>>> pickle.loads(pickle.dumps(x()))
>> Hello from sploitland
>> 0
>
> But here you are not transferring malicious code in the pickle
> string, you are just triggering the execution of such code that
> you already have (and are in control of).
>
> Without the definition of class x on the receiving side, there
> would be no exploit.
>
> By adding support for pickling code objects, you'd make it possible
> to place the definition of class x into the pickle string and
> you would no longer be in control of that code.
Hmm, I just tried the code and it seems that you're right:
The pickle string does not contain a reference to class x,
but only the name of the function to call. Wow, that's a huge
hole in Python's pickle system...
... def __reduce__(self):
... import os
... return os.system, ('echo "Bingo"',)
...
>>> import pickle
>>> pickle.dumps(C())
'cposix\nsystem\np0\n(S\'echo "Bingo"\'\np1\ntp2\nRp3\n.'
>>> C = None
>>> s = 'cposix\nsystem\np0\n(S\'echo "Bingo"\'\np1\ntp2\nRp3\n.'
>>> pickle.loads(s)
Bingo
0
|
msg112476 - (view) |
Author: Alexander Belopolsky (belopolsky) * |
Date: 2010-08-02 14:13 |
On Mon, Aug 2, 2010 at 10:11 AM, Marc-Andre Lemburg
<report@bugs.python.org> wrote:
..
> Hmm, I just tried the code and it seems that you're right:
>
> The pickle string does not contain a reference to class x,
> but only the name of the function to call. Wow, that's a huge
> hole in Python's pickle system...
That's why we have a big red
"""
Warning: The pickle module is not intended to be secure against
erroneous or maliciously constructed data. Never unpickle data
received from an untrusted or unauthenticated source.
"""
in the docs.
|
msg112477 - (view) |
Author: Marc-Andre Lemburg (lemburg) * |
Date: 2010-08-02 14:27 |
Alexander Belopolsky wrote:
>
> Alexander Belopolsky <belopolsky@users.sourceforge.net> added the comment:
>
> On Mon, Aug 2, 2010 at 10:11 AM, Marc-Andre Lemburg
> <report@bugs.python.org> wrote:
> ..
>> Hmm, I just tried the code and it seems that you're right:
>>
>> The pickle string does not contain a reference to class x,
>> but only the name of the function to call. Wow, that's a huge
>> hole in Python's pickle system...
>
> That's why we have a big red
>
> """
> Warning: The pickle module is not intended to be secure against
> erroneous or maliciously constructed data. Never unpickle data
> received from an untrusted or unauthenticated source.
> """
>
> in the docs.
Good :-)
I've never used .__reduce__() and wasn't aware of the
fact that it can be used to run arbitrary code without
relying on the defining class.
I also like Antoine's idea of pickling the function/method name
instead of the whole code object.
This is in line with PEP 307 (http://www.python.org/dev/peps/pep-0307/)
which already uses the approach for classic class objects, Python
functions, etc.
|
msg112479 - (view) |
Author: Jean-Paul Calderone (exarkun) * |
Date: 2010-08-02 14:32 |
> I also like Antoine's idea of pickling the function/method name instead of the whole code object.
I like it too. That's why I suggested it in the first comment on the ticket (read the linked code). I guess Alexander likes it too, since he basically said as much in the second comment. ;)
|
msg112482 - (view) |
Author: Antoine Pitrou (pitrou) * |
Date: 2010-08-02 14:55 |
There's already issue558238 on the same topic.
|
msg112483 - (view) |
Author: Alexander Belopolsky (belopolsky) * |
Date: 2010-08-02 14:56 |
On Mon, Aug 2, 2010 at 10:32 AM, Jean-Paul Calderone
<report@bugs.python.org> wrote:
>
> Jean-Paul Calderone <exarkun@twistedmatrix.com> added the comment:
>
>> I also like Antoine's idea of pickling the function/method name instead of the whole code object.
>
> I like it too. That's why I suggested it in the first comment on the ticket (read the linked
> code). I guess Alexander likes it too, since he basically said as much in the second
> comment. ;)
Yes, I think we have a consensus on this point. Note, however that
since unbound methods have been removed in 3.x, it is not trivial to
find a fully qualified name of a method anymore. Also we need to
decide where to stop: should methods of nested classes be pickleable?
|
msg112486 - (view) |
Author: Antoine Pitrou (pitrou) * |
Date: 2010-08-02 15:08 |
> Yes, I think we have a consensus on this point. Note, however that
> since unbound methods have been removed in 3.x, it is not trivial to
> find a fully qualified name of a method anymore.
I suppose only bound methods should be pickleable:
>>> class C:
... def m(self): pass
...
>>> c = C()
>>> c.m
<bound method C.m of <__main__.C object at 0x7fa81299b150>>
>>> c.m.__self__.__module__
'__main__'
And perhaps class methods too:
>>> class C:
... @classmethod
... def cm(self): pass
...
>>> C.cm
<bound method type.cm of <class '__main__.C'>>
>>> C.cm.__self__
<class '__main__.C'>
>>> C.cm.__self__.__module__
'__main__'
> Also we need to
> decide where to stop: should methods of nested classes be pickleable?
As we want, but they needn't be.
|
msg112488 - (view) |
Author: Jean-Paul Calderone (exarkun) * |
Date: 2010-08-02 15:50 |
> Note, however that since unbound methods have been removed in 3.x, it is not trivial to find a fully qualified name of a method anymore.
This is a rather sad loss of functionality.
|
msg112496 - (view) |
Author: Alexandre Vassalotti (alexandre.vassalotti) * |
Date: 2010-08-02 16:43 |
The security issue mentioned previously has been known for years. And, it is easy to protect against. See http://docs.python.org/py3k/library/pickle.html#restricting-globals
Also I am against adding pickling support to code objects. Code objects have no backward-compatibility constraint unlike pickles.
Antoine is right about we should be using a method fully-qualified name to pickle it. However, the problem with this approach is a method doesn't always have fully-qualified name (see issue3657). ForkingPickler in Lib/multiprocessing/forking.py uses this approach to add pickling support to methods.
|
msg129202 - (view) |
Author: Ram Rachum (cool-RR) * |
Date: 2011-02-23 14:53 |
I also miss being able to pickle unbound methods on Python 3. I don't think there's an interest in pickling the actual code objects. In my opinion, unbound methods should be pickled exactly like all the other Python definitions, such as bound methods, top-level functions, and classes: They should be pickled by name.
IIUC, the challenge is how to figure out on which class an unbound method is defined. I'm using the term "unbound method" colloquially, I know it's implemented as a function. So perhaps Python needs to be changed to give unbound methods some attribute that will tell on which class they're defined?
|
msg129790 - (view) |
Author: Ram Rachum (cool-RR) * |
Date: 2011-03-01 18:41 |
Okay, as an initial suggestion, how about we give every function a `.__parent_class__` attribute saying which class it is a method of? I feel this is a bit of a duct tape solution, but I don't see any other alternative.
|
msg129797 - (view) |
Author: Raymond Hettinger (rhettinger) * |
Date: 2011-03-01 19:39 |
> how about we give every function a `.__parent_class__`
> attribute saying which class it is a method of?
Won't work. The same function can be used in multiple classes.
The function object is independent of the class. This is conceptually no different that the unremarkable fact that any object can be stored in multiple dictionaries and the object is not responsible for knowing which dictionaries it is stored in.
def f(self): ... # not even defined inside a class
A.f = f # stored in class A
B.f = f # also stored in class B
dir(f) # f doesn't know where it is stored
|
msg129798 - (view) |
Author: Ram Rachum (cool-RR) * |
Date: 2011-03-01 19:49 |
Raymond: I don't think this matters. We don't need a canonical `.__parent_class__`, we just need to know where that function is defined so we could find it when unpickling. In the example that you gave, `f` would have a `.__parent_class__` of `None`, and it would be pickleable because it would be found on the top-level of the module it's defined on.
|
msg129801 - (view) |
Author: Raymond Hettinger (rhettinger) * |
Date: 2011-03-01 20:24 |
This isn't worth introducing poorly thought out hacks.
|
msg129803 - (view) |
Author: Ram Rachum (cool-RR) * |
Date: 2011-03-01 20:38 |
> This isn't worth introducing poorly thought out hacks.
Being able to pickle unbound methods is important. In my project I have objects that refer to unbound methods. Now these objects are unpickleable. I can't save them to disk and I can't use the multiprocessing module on them. That's a big problem.
|
msg129804 - (view) |
Author: Antoine Pitrou (pitrou) * |
Date: 2011-03-01 20:47 |
> Being able to pickle unbound methods is important. In my project I have
> objects that refer to unbound methods. Now these objects are
> unpickleable. I can't save them to disk and I can't use the
> multiprocessing module on them. That's a big problem.
Judging from all that has been said on this issue, I think the best you can do now is try to whip up a patch and upload it if it ends up not too hackish.
|
msg129805 - (view) |
Author: Ram Rachum (cool-RR) * |
Date: 2011-03-01 21:03 |
> [...] try to whip up a patch and upload it if it ends up not too hackish.
To have a non-hackish patch we need a non-hackish idea. The `.__parent_class__` idea looks hackish to me, but now that I think about it, how is it more hackish than a function's `.__module__` attribute?
I mean, a function's `.__module__` attribute says on which module the function was originally defined, but the function could be accessible on any other module and any other namespace or class. Its `.__module__` would remain constant, because it's the one place where you are guaranteed to be able to find the function, assuming it's defined in the top-level. So the `.__module__` attribute is used in unpickling the function. How is the `.__parent_class__` suggestion more hackish than `.__module__`?
|
msg129806 - (view) |
Author: Antoine Pitrou (pitrou) * |
Date: 2011-03-01 21:08 |
> To have a non-hackish patch we need a non-hackish idea. The
> `.__parent_class__` idea looks hackish to me, but now that I think
> about it, how is it more hackish than a function's `.__module__`
> attribute?
Not much, agreed. You might want to call it `__namespace__` instead if
you want it to look cleaner :)
(and it could be useful for other purposes such as e.g. introspection)
But by "hackish" I meant the possible implementation of it, not the idea
itself. That's what a patch would help assess.
|
msg129809 - (view) |
Author: Amaury Forgeot d'Arc (amaury.forgeotdarc) * |
Date: 2011-03-01 21:29 |
> Being able to pickle unbound methods is important. In my project I have
> objects that refer to unbound methods. Now these objects are
> unpickleable. I can't save them to disk and I can't use the
> multiprocessing module on them. That's a big problem.
The multiprocessing module *can* pickle bound and unbound methods (see below), but only with the multiprocessing.Process class. It does not work with Pool.map(), for example. The reason is that Process uses the special ForkingPickler that has special code to handle methods. Pool.map could be fixed IMO.
Is "ForkingPickler" enough for your needs?
==== mod.py ============
class C:
def foo(self):
print("CALLED")
==== main.py ===========
from mod import C
if __name__ == '__main__':
from multiprocessing import Process
p = Process(target=C().foo)
p.start(); p.join()
p = Process(target=C.foo, args=(C(),))
p.start(); p.join()
|
msg129812 - (view) |
Author: Ram Rachum (cool-RR) * |
Date: 2011-03-01 21:42 |
Amaury: I don't think ForkingPickler works for unbound methods defined in user code, which are implemented as functions. I think it only works for method-descriptors and wrapper-descriptors.
|
msg129813 - (view) |
Author: Amaury Forgeot d'Arc (amaury.forgeotdarc) * |
Date: 2011-03-01 21:56 |
did you see my example above? it passes methods defined in user code.
|
msg129867 - (view) |
Author: Ram Rachum (cool-RR) * |
Date: 2011-03-02 10:35 |
Amaury:
Your example succeeds on Linux but fails on Windows:
$ python3.2 main.py
CALLED
Traceback (most recent call last):
File "C:\Python32\Lib\pickle.py", line 679, in save_global
klass = getattr(mod, name)
AttributeError: 'module' object has no attribute 'foo'
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "main.py", line 7, in <module>
p.start(); p.join()
File "C:\Python32\Lib\multiprocessing\process.py", line 130, in start
self._popen = Popen(self)
File "C:\Python32\Lib\multiprocessing\forking.py", line 267, in __init__
dump(process_obj, to_child, HIGHEST_PROTOCOL)
File "C:\Python32\Lib\multiprocessing\forking.py", line 190, in dump
ForkingPickler(file, protocol).dump(obj)
File "C:\Python32\Lib\pickle.py", line 237, in dump
self.save(obj)
File "C:\Python32\Lib\pickle.py", line 344, in save
self.save_reduce(obj=obj, *rv)
File "C:\Python32\Lib\pickle.py", line 432, in save_reduce
save(state)
File "C:\Python32\Lib\pickle.py", line 299, in save
f(self, obj) # Call unbound method with explicit self
File "C:\Python32\Lib\pickle.py", line 623, in save_dict
self._batch_setitems(obj.items())
File "C:\Python32\Lib\pickle.py", line 656, in _batch_setitems
save(v)
File "C:\Python32\Lib\pickle.py", line 299, in save
f(self, obj) # Call unbound method with explicit self
File "C:\Python32\Lib\pickle.py", line 683, in save_global
(obj, module, name))
_pickle.PicklingError: Can't pickle <function foo at 0x00C4EBB8>: it's not found as mod.foo
User@TURING ~/Desktop/temp
$ Traceback (most recent call last):
File "<string>", line 1, in <module>
File "C:\Python32\Lib\multiprocessing\forking.py", line 370, in main
self = load(from_parent)
EOFError
|
msg129868 - (view) |
Author: Antoine Pitrou (pitrou) * |
Date: 2011-03-02 10:37 |
> Amaury:
>
> Your example succeeds on Linux but fails on Windows:
>
> $ python3.2 main.py
I think the difference has to do with Python 3 vs. Python 2.
In Python 3 unbound methods are not wrapped in a specific object, and so
ForkingPickler does not find their global name.
|
msg129882 - (view) |
Author: Amaury Forgeot d'Arc (amaury.forgeotdarc) * |
Date: 2011-03-02 12:18 |
OK, let's go back to the "__namespace__" idea, then.
A long time ago I had the idea that the ast compiler could remember the list of "named blocks" (classes, functions) with their line numbers;
for example, the statement "class C" spans from line 20 to 40, "def foo()" spans from line 26 to 30.
Then, it's easy to locate the function "C.foo" if you only have its co_firstlineno. This would also be a replacement for the awful hacks in Lib/trace.py::file_module_function_of() (please read the code and say "aaargh!").
This information would be stored in the module itself, and probably compressed with techniques similar to co_lnotab.
|
msg130054 - (view) |
Author: Ram Rachum (cool-RR) * |
Date: 2011-03-04 14:06 |
I don't have the time and the ability to write the patch that implements this. I'll be happy to write tests if you think this will help.
|
msg148771 - (view) |
Author: Antoine Pitrou (pitrou) * |
Date: 2011-12-02 19:12 |
PEP 3155 is now implemented (the __qualname__ attribute), making many more things potentially picklable. See PEP 3154 for a hypothetical new pickle protocol, and issue 13520 for a patch proposal.
|
msg204770 - (view) |
Author: Alexandre Vassalotti (alexandre.vassalotti) * |
Date: 2013-11-30 03:51 |
As part of the implementation of PEP 3154 (Pickle protocol 4), I've introduced support for pickling methods for all pickle protocols (and not just for the new protocol 4). This was implemented by adding the appropriate __reduce__ method on built-in functions and methods. In addition, pickling methods in nested classes is now supported by protocol 4 through the use of the __qualname__ attribute.
|
|
Date |
User |
Action |
Args |
2022-04-11 14:57:03 | admin | set | github: 53522 |
2013-11-30 03:51:13 | alexandre.vassalotti | set | status: open -> closed versions:
+ Python 3.4, - Python 3.3 messages:
+ msg204770
resolution: fixed stage: resolved |
2013-05-03 00:28:45 | alexandre.vassalotti | set | dependencies:
+ Implement PEP 3154 (pickle protocol 4) |
2011-12-02 19:12:39 | pitrou | set | messages:
+ msg148771 |
2011-03-04 14:06:23 | cool-RR | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, amaury.forgeotdarc, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR messages:
+ msg130054 |
2011-03-02 12:18:47 | amaury.forgeotdarc | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, amaury.forgeotdarc, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR messages:
+ msg129882 |
2011-03-02 10:37:30 | pitrou | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, amaury.forgeotdarc, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR messages:
+ msg129868 |
2011-03-02 10:35:17 | cool-RR | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, amaury.forgeotdarc, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR messages:
+ msg129867 |
2011-03-01 21:56:23 | amaury.forgeotdarc | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, amaury.forgeotdarc, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR messages:
+ msg129813 |
2011-03-01 21:42:34 | cool-RR | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, amaury.forgeotdarc, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR messages:
+ msg129812 |
2011-03-01 21:29:12 | amaury.forgeotdarc | set | nosy:
+ amaury.forgeotdarc messages:
+ msg129809
|
2011-03-01 21:08:49 | pitrou | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, daniel.urban, cool-RR messages:
+ msg129806 |
2011-03-01 21:07:14 | daniel.urban | set | nosy:
+ daniel.urban
|
2011-03-01 21:03:13 | cool-RR | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR messages:
+ msg129805 |
2011-03-01 20:47:18 | pitrou | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR messages:
+ msg129804 |
2011-03-01 20:38:28 | cool-RR | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR messages:
+ msg129803 |
2011-03-01 20:24:36 | rhettinger | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR messages:
+ msg129801 |
2011-03-01 19:49:09 | cool-RR | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR messages:
+ msg129798 |
2011-03-01 19:39:55 | rhettinger | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR messages:
+ msg129797 |
2011-03-01 18:41:49 | cool-RR | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR messages:
+ msg129790 |
2011-02-23 14:54:15 | cool-RR | set | nosy:
lemburg, loewis, rhettinger, hinsen, exarkun, belopolsky, pitrou, alexandre.vassalotti, eric.araujo, obamausa8, cool-RR versions:
+ Python 3.3, - Python 3.2 |
2011-02-23 14:53:54 | cool-RR | set | nosy:
+ cool-RR messages:
+ msg129202
|
2010-08-02 16:43:23 | alexandre.vassalotti | set | messages:
+ msg112496 |
2010-08-02 15:50:34 | exarkun | set | messages:
+ msg112488 |
2010-08-02 15:20:23 | pitrou | set | nosy:
+ loewis, rhettinger, hinsen, obamausa8
|
2010-08-02 15:19:19 | pitrou | link | issue558238 superseder |
2010-08-02 15:08:19 | pitrou | set | messages:
+ msg112486 |
2010-08-02 14:57:34 | eric.araujo | set | nosy:
+ eric.araujo
|
2010-08-02 14:56:11 | belopolsky | set | messages:
+ msg112483 |
2010-08-02 14:55:48 | pitrou | set | messages:
+ msg112482 |
2010-08-02 14:32:37 | exarkun | set | messages:
+ msg112479 |
2010-08-02 14:27:35 | lemburg | set | messages:
+ msg112477 |
2010-08-02 14:13:55 | belopolsky | set | messages:
+ msg112476 |
2010-08-02 14:11:29 | lemburg | set | messages:
+ msg112475 |
2010-08-02 14:09:27 | pitrou | set | messages:
+ msg112474 |
2010-08-02 14:08:51 | belopolsky | set | messages:
+ msg112473 |
2010-08-02 14:05:43 | lemburg | set | messages:
+ msg112471 |
2010-08-02 14:03:56 | belopolsky | set | nosy:
+ pitrou, alexandre.vassalotti
|
2010-08-02 13:54:15 | belopolsky | set | messages:
+ msg112468 |
2010-08-02 13:52:05 | exarkun | set | messages:
+ msg112467 |
2010-08-02 13:25:41 | lemburg | set | messages:
+ msg112462 |
2010-08-02 12:29:23 | exarkun | set | messages:
+ msg112453 |
2010-08-02 12:12:42 | lemburg | set | messages:
+ msg112450 |
2010-08-02 12:01:37 | exarkun | set | messages:
+ msg112446 |
2010-08-02 08:10:32 | lemburg | set | nosy:
+ lemburg messages:
+ msg112428
|
2010-08-01 23:55:16 | belopolsky | set | nosy:
+ belopolsky
messages:
+ msg112405 versions:
+ Python 3.2 |
2010-07-16 19:25:18 | exarkun | create | |