From: Benjamin Peterson Date: Thu, 15 Jan 2015 05:00:16 +0000 (-0500) Subject: merge 3.4 (#23063) X-Git-Tag: v3.5.0a1~177 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=71f1c5c49646c365407c4686bf377b967f2f43b3;p=python merge 3.4 (#23063) --- 71f1c5c49646c365407c4686bf377b967f2f43b3 diff --cc Misc/NEWS index 04eb5a7aa7,4127269741..5dbee3e8b2 --- a/Misc/NEWS +++ b/Misc/NEWS @@@ -203,29 -44,29 +203,32 @@@ Core and Builtin Library ------- + - Issue #23063: In the disutils' check command, fix parsing of reST with code or + code-block directives. + -- Issue #23209, #23225: selectors.BaseSelector.close() now clears its internal - reference to the selector mapping to break a reference cycle. Initial patch - written by Martin Richard. +- Issue #23209, #23225: selectors.BaseSelector.get_key() now raises a + RuntimeError if the selector is closed. And selectors.BaseSelector.close() + now clears its internal reference to the selector mapping to break a + reference cycle. Initial patch written by Martin Richard. -- Issue #21356: Make ssl.RAND_egd() optional to support LibreSSL. The - availability of the function is checked during the compilation. Patch written - by Bernard Spil. +- Issue #19777: Provide a home() classmethod on Path objects. Contributed + by Victor Salgado and Mayank Tripathi. -- Issue #20896, #22935: The :func:`ssl.get_server_certificate` function now - uses the :data:`~ssl.PROTOCOL_SSLv23` protocol by default, not - :data:`~ssl.PROTOCOL_SSLv3`, for maximum compatibility and support platforms - where :data:`~ssl.PROTOCOL_SSLv3` support is disabled. +- Issue #23206: Make ``json.dumps(..., ensure_ascii=False)`` as fast as the + default case of ``ensure_ascii=True``. Patch by Naoki Inada. -- Issue #23111: In the ftplib, make ssl.PROTOCOL_SSLv23 the default protocol - version. +- Issue #23185: Add math.inf and math.nan constants. -- Issue #23132: Mitigate regression in speed and clarity in functools.total_ordering. +- Issue #23186: Add ssl.SSLObject.shared_ciphers() and + ssl.SSLSocket.shared_ciphers() to fetch the client's list ciphers sent at + handshake. -- Issue #22585: On OpenBSD 5.6 and newer, os.urandom() now calls getentropy(), - instead of reading /dev/urandom, to get pseudo-random bytes. +- Issue #23143: Remove compatibility with OpenSSLs older than 0.9.8. + +- Issue #23132: Improve performance and introspection support of comparison + methods created by functool.total_ordering. + +- Issue #19776: Add a expanduser() method on Path objects. - Issue #23112: Fix SimpleHTTPServer to correctly carry the query string and fragment when it redirects to add a trailing slash.