mirror of
https://github.com/python/cpython.git
synced 2026-02-06 09:50:43 +00:00
[3.14] gh-143993: Document ways to disable remote debugging support (GH-143994) (#144139)
gh-143993: Document ways to disable remote debugging support (GH-143994)
Although PEP 768 mentions how to disable the mechanism of
remote debugging, it is not documented in the Python docs.
This change adds a note on how to disable remote debugging support
in a Python interpreter to the remote debugging how-to.
(cherry picked from commit 0b5f8359c5)
Co-authored-by: Rafael Weingartner-Ortner <38643099+RafaelWO@users.noreply.github.com>
Co-authored-by: Hugo van Kemenade <1324225+hugovk@users.noreply.github.com>
This commit is contained in:
parent
a74709d2c9
commit
4e63fdb31f
2 changed files with 14 additions and 1 deletions
|
|
@ -8,6 +8,16 @@ execute Python code remotely.
|
|||
|
||||
Most platforms require elevated privileges to attach to another Python process.
|
||||
|
||||
Disabling remote debugging
|
||||
--------------------------
|
||||
|
||||
To disable remote debugging support, use any of the following:
|
||||
|
||||
* Set the :envvar:`PYTHON_DISABLE_REMOTE_DEBUG` environment variable to ``1`` before
|
||||
starting the interpreter.
|
||||
* Use the :option:`-X disable_remote_debug` command-line option.
|
||||
* Compile Python with the :option:`--without-remote-debug` build flag.
|
||||
|
||||
.. _permission-requirements:
|
||||
|
||||
Permission requirements
|
||||
|
|
@ -614,4 +624,3 @@ To inject and execute a Python script in a remote process:
|
|||
6. Set ``_PY_EVAL_PLEASE_STOP_BIT`` in the ``eval_breaker`` field.
|
||||
7. Resume the process (if suspended). The script will execute at the next safe
|
||||
evaluation point.
|
||||
|
||||
|
|
|
|||
|
|
@ -1951,6 +1951,9 @@ always available. Unless explicitly noted otherwise, all variables are read-only
|
|||
interpreter is pre-release (alpha, beta, or release candidate) then the
|
||||
local and remote interpreters must be the same exact version.
|
||||
|
||||
See :ref:`remote-debugging` for more information about the remote debugging
|
||||
mechanism.
|
||||
|
||||
.. audit-event:: sys.remote_exec pid script_path
|
||||
|
||||
When the code is executed in the remote process, an
|
||||
|
|
@ -1969,6 +1972,7 @@ always available. Unless explicitly noted otherwise, all variables are read-only
|
|||
|
||||
.. availability:: Unix, Windows.
|
||||
.. versionadded:: 3.14
|
||||
See :pep:`768` for more details.
|
||||
|
||||
|
||||
.. function:: _enablelegacywindowsfsencoding()
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue