Author martin.panter
Recipients barry, martin.panter, orsenthil, pitrou, serhiy.storchaka
Date 2014-01-05.13:11:33
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1388927494.28.0.630177295795.issue19524@psf.upfronthosting.co.za>
In-reply-to
Content
The Issue 12692 fix has been backported to the 3.3 branch, and it fixes this bug. However here is an updated patch (against revision 28337a8fb502 in the “3.3” branch) consisting of two left over bits you might still want to use:

1. My test case

2. Explicitly closing the HTTP connection when an invalid response is received. E.g. urlopen("http://google.com:443") would still leak the connection without this.
History
Date User Action Args
2014-01-05 13:11:34martin.pantersetrecipients: + martin.panter, barry, orsenthil, pitrou, serhiy.storchaka
2014-01-05 13:11:34martin.pantersetmessageid: <1388927494.28.0.630177295795.issue19524@psf.upfronthosting.co.za>
2014-01-05 13:11:34martin.panterlinkissue19524 messages
2014-01-05 13:11:34martin.pantercreate