This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author pitrou
Recipients Arfrever, flox, giampaolo.rodola, janssen, pitrou, vstinner
Date 2010-03-14.22:42:26
SpamBayes Score 3.1714873e-08
Marked as misclassified No
Message-id <1268606548.38.0.645242929302.issue8108@psf.upfronthosting.co.za>
In-reply-to
Content
> Depends on what we want.  It just suppresses information that's now
> available.  What we'd really like is for the caller to recognize that
> close() can fail, and should be re-tried if it does.  That requires
> that we signal the error back up and out of the ssl module.  It seems
> to me that any non-blocking code should recognize this and respect it.

Well, first, it will break code which used to work perfectly well (as the failing tests show). That OpenSSL decided to break compatibility in what looks like a minor bugfix release (0.9.8m) doesn't mean we should propagate the breakage.

Second, I'm not an SSL expert, but it's not obvious to me that the application should have to ensure a "complete shutdown" before closing the socket. Often, stateful applicative protocols close their "session" anyway (*) before shutting down the transport layer, so I don't see what this additional precaution can buy (apart from code complication).

(*) for example, FTP has the "QUIT" command
History
Date User Action Args
2010-03-14 22:42:28pitrousetrecipients: + pitrou, janssen, vstinner, giampaolo.rodola, Arfrever, flox
2010-03-14 22:42:28pitrousetmessageid: <1268606548.38.0.645242929302.issue8108@psf.upfronthosting.co.za>
2010-03-14 22:42:26pitroulinkissue8108 messages
2010-03-14 22:42:26pitroucreate