[jira] [Commented] (CSV-295) Support for parallelism in CSVPrinter
[ https://issues.apache.org/jira/browse/CSV-295?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17505175#comment-17505175 ] Zimo Li commented on CSV-295: - [~ggregory] To answer your question, I'm a Scala programmer, and I use the ZIO framework all the time. Its Semaphore data type is just handy and solved my problem. [~angusdev] I agree that changing the current behaviour of the CSVPrinter may not be necessary, and that will be a breaking change. Unfortunately, there's no AbstractCSVPrinter that a SynchronizedCSVPrinter can inherit from. Either way, I will benchmark the updated CSVPrinter. The overhead of synchronization only scales with the number of threads. It should be almost negligible for single-threaded applications. > Support for parallelism in CSVPrinter > - > > Key: CSV-295 > URL: https://issues.apache.org/jira/browse/CSV-295 > Project: Commons CSV > Issue Type: Improvement > Components: Printer >Affects Versions: 1.9.0 > Environment: > https://zio.dev/version-1.x/overview/overview_creating_effects#blocking-synchronous-side-effects >Reporter: Zimo Li >Priority: Major > Fix For: 1.10.0 > > > I am trying to write the result of network IO to a CSV file using Scala and > the ZIO library. The order of the rows does not matter, so I decided to use a > concurrency of 8. > Each thread calls {{{}CSVPrinter.printRecord{}}}, and this caused some rows > to intersect with others. Eventually, I decided to use a > [Semaphore|https://zio.dev/version-1.x/datatypes/concurrency/semaphore] to > fix it. > A locking mechanism for {{printRecord}} can be implemented just like the > underlying {{FileWriter}} or {{PrintWriter}}. -- This message was sent by Atlassian Jira (v8.20.1#820001)
[jira] [Commented] (CSV-295) Support for parallelism in CSVPrinter
[ https://issues.apache.org/jira/browse/CSV-295?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17505168#comment-17505168 ] Angus C commented on CSV-295: - Is it good to add synchronized in the core library which cause performance penalty to all single-threaded application? Can just lock the CSVPrinter in your application? > Support for parallelism in CSVPrinter > - > > Key: CSV-295 > URL: https://issues.apache.org/jira/browse/CSV-295 > Project: Commons CSV > Issue Type: Improvement > Components: Printer >Affects Versions: 1.9.0 > Environment: > https://zio.dev/version-1.x/overview/overview_creating_effects#blocking-synchronous-side-effects >Reporter: Zimo Li >Priority: Major > Fix For: 1.10.0 > > > I am trying to write the result of network IO to a CSV file using Scala and > the ZIO library. The order of the rows does not matter, so I decided to use a > concurrency of 8. > Each thread calls {{{}CSVPrinter.printRecord{}}}, and this caused some rows > to intersect with others. Eventually, I decided to use a > [Semaphore|https://zio.dev/version-1.x/datatypes/concurrency/semaphore] to > fix it. > A locking mechanism for {{printRecord}} can be implemented just like the > underlying {{FileWriter}} or {{PrintWriter}}. -- This message was sent by Atlassian Jira (v8.20.1#820001)
[GitHub] [commons-text] kinow merged pull request #305: Bump mockito-inline from 4.3.1 to 4.4.0
kinow merged pull request #305: URL: https://github.com/apache/commons-text/pull/305 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-text] dependabot[bot] opened a new pull request #305: Bump mockito-inline from 4.3.1 to 4.4.0
dependabot[bot] opened a new pull request #305: URL: https://github.com/apache/commons-text/pull/305 Bumps [mockito-inline](https://github.com/mockito/mockito) from 4.3.1 to 4.4.0. Release notes Sourced from https://github.com/mockito/mockito/releases;>mockito-inline's releases. v4.4.0 Changelog generated by https://github.com/shipkit/shipkit-changelog;>Shipkit Changelog Gradle Plugin 4.4.0 2022-03-08 - https://github.com/mockito/mockito/compare/v4.3.1...v4.4.0;>16 commit(s) by Andrew Kozel, Brice Dutheil, Jean-Baptiste Mille, Mirko Alicastro, dependabot[bot] Bump groovy from 3.0.9 to 3.0.10 [(https://github-redirect.dependabot.com/mockito/mockito/issues/2586;>#2586)](https://github-redirect.dependabot.com/mockito/mockito/pull/2586;>mockito/mockito#2586) Bump google-java-format from 1.14.0 to 1.15.0 [(https://github-redirect.dependabot.com/mockito/mockito/issues/2585;>#2585)](https://github-redirect.dependabot.com/mockito/mockito/pull/2585;>mockito/mockito#2585) Bump actions/checkout from 2.4.0 to 3 [(https://github-redirect.dependabot.com/mockito/mockito/issues/2582;>#2582)](https://github-redirect.dependabot.com/mockito/mockito/pull/2582;>mockito/mockito#2582) Bump shipkit-auto-version from 1.1.19 to 1.1.20 [(https://github-redirect.dependabot.com/mockito/mockito/issues/2580;>#2580)](https://github-redirect.dependabot.com/mockito/mockito/pull/2580;>mockito/mockito#2580) Bump biz.aQute.bnd.builder from 6.1.0 to 6.2.0 [(https://github-redirect.dependabot.com/mockito/mockito/issues/2579;>#2579)](https://github-redirect.dependabot.com/mockito/mockito/pull/2579;>mockito/mockito#2579) Bump biz.aQute.bnd.gradle from 6.1.0 to 6.2.0 [(https://github-redirect.dependabot.com/mockito/mockito/issues/2578;>#2578)](https://github-redirect.dependabot.com/mockito/mockito/pull/2578;>mockito/mockito#2578) Adds a Google Java Format for JDK17 [(https://github-redirect.dependabot.com/mockito/mockito/issues/2572;>#2572)](https://github-redirect.dependabot.com/mockito/mockito/pull/2572;>mockito/mockito#2572) Clean up JUnit3 references [(https://github-redirect.dependabot.com/mockito/mockito/issues/2570;>#2570)](https://github-redirect.dependabot.com/mockito/mockito/pull/2570;>mockito/mockito#2570) Bump com.diffplug.spotless from 6.2.2 to 6.3.0 [(https://github-redirect.dependabot.com/mockito/mockito/issues/2567;>#2567)](https://github-redirect.dependabot.com/mockito/mockito/pull/2567;>mockito/mockito#2567) Bump google-java-format from 1.13.0 to 1.14.0 [(https://github-redirect.dependabot.com/mockito/mockito/issues/2565;>#2565)](https://github-redirect.dependabot.com/mockito/mockito/pull/2565;>mockito/mockito#2565) Bump versions.bytebuddy from 1.12.7 to 1.12.8 [(https://github-redirect.dependabot.com/mockito/mockito/issues/2564;>#2564)](https://github-redirect.dependabot.com/mockito/mockito/pull/2564;>mockito/mockito#2564) Bump com.diffplug.spotless from 6.2.1 to 6.2.2 [(https://github-redirect.dependabot.com/mockito/mockito/issues/2562;>#2562)](https://github-redirect.dependabot.com/mockito/mockito/pull/2562;>mockito/mockito#2562) Bump com.github.ben-manes.versions from 0.41.0 to 0.42.0 [(https://github-redirect.dependabot.com/mockito/mockito/issues/2559;>#2559)](https://github-redirect.dependabot.com/mockito/mockito/pull/2559;>mockito/mockito#2559) Bump com.diffplug.spotless from 6.2.0 to 6.2.1 [(https://github-redirect.dependabot.com/mockito/mockito/issues/2556;>#2556)](https://github-redirect.dependabot.com/mockito/mockito/pull/2556;>mockito/mockito#2556) Fixes https://github-redirect.dependabot.com/mockito/mockito/issues/2548;>#2548 : Makes InOrder able to verify static methods [(https://github-redirect.dependabot.com/mockito/mockito/issues/2549;>#2549)](https://github-redirect.dependabot.com/mockito/mockito/pull/2549;>mockito/mockito#2549) [PR open] Add feature to verify static methods calls in order [(https://github-redirect.dependabot.com/mockito/mockito/issues/2548;>#2548)](https://github-redirect.dependabot.com/mockito/mockito/issues/2548;>mockito/mockito#2548) Fixes https://github-redirect.dependabot.com/mockito/mockito/issues/2201;>#2201 : Fixed checking of declared exceptions. [(https://github-redirect.dependabot.com/mockito/mockito/issues/2547;>#2547)](https://github-redirect.dependabot.com/mockito/mockito/pull/2547;>mockito/mockito#2547) Calling getExceptionTypes() on concrete object that is used as interface doesn't return exception types from interface [(https://github-redirect.dependabot.com/mockito/mockito/issues/2201;>#2201)](https://github-redirect.dependabot.com/mockito/mockito/issues/2201;>mockito/mockito#2201) Commits https://github.com/mockito/mockito/commit/813add00ecd9a78ea9dcfccfc7797ea242be9ca9;>813add0 Bump groovy from 3.0.9 to 3.0.10 (https://github-redirect.dependabot.com/mockito/mockito/issues/2586;>#2586)
[GitHub] [commons-collections] garydgregory commented on pull request #290: Bump checkstyle from 9.3 to 10.0
garydgregory commented on pull request #290: URL: https://github.com/apache/commons-collections/pull/290#issuecomment-1065431047 Closing: requires Java 11. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-pool] garydgregory commented on pull request #136: Bump checkstyle from 9.3 to 10.0
garydgregory commented on pull request #136: URL: https://github.com/apache/commons-pool/pull/136#issuecomment-1065430634 Closing: requires Java 11. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[jira] [Commented] (COMPRESS-613) Write ZIP extra time fields automatically
[ https://issues.apache.org/jira/browse/COMPRESS-613?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17505052#comment-17505052 ] Andre Brait commented on COMPRESS-613: -- It also seems that {{java.util.zip.ZipEntry}} classes cap the read times to Microseconds instead of 100ns intervals, so I can also add something to modify the fields after {{ZipEntry#setExtra0(byte[],boolean,boolean)}} gets called. > Write ZIP extra time fields automatically > - > > Key: COMPRESS-613 > URL: https://issues.apache.org/jira/browse/COMPRESS-613 > Project: Commons Compress > Issue Type: Improvement > Components: Archivers >Affects Versions: 1.21 >Reporter: Andre Brait >Priority: Major > Labels: zip > > When writing to a Zip file through ZipArchiveOutputStream, setting creation > and access times in a ZipArchiveEntry does not cause these to be reflected as > X5455 or X000A extra fields in the resulting zip file. This also happens for > modification times that do not fit into an MS-DOS time. > As a consequence, the date range is reduced, as well as the granularity (form > 100ns intervals to seconds). > ZipEntry and standard java.util.zip facilities do that automatically, but > that's missing here. > My proposal is to use the same logic the java.util.zip do and add those extra > fields automatically, if situation requires them. > See my existing logic for this here: > [https://github.com/andrebrait/DATROMTool/blob/86a4f4978bab250ca54d047c58b4f91e7dbbcc7f/core/src/main/java/io/github/datromtool/io/FileCopier.java#L1425] > It's (almost) the same logic from java.util.zip, but adapted to be used with > ZipArchiveEntry. > If you're ok with it, I can send a PR. > Actual logic will be more like > {{{}java.util.zip.ZipOutputStream#writeLOC(XEntry){}}}, represented below: > {code:java} > int elenEXTT = 0; // info-zip extended timestamp > int flagEXTT = 0; > long umtime = -1; > long uatime = -1; > long uctime = -1; > if (e.mtime != null) { > elenEXTT += 4; > flagEXTT |= EXTT_FLAG_LMT; > umtime = fileTimeToUnixTime(e.mtime); > } > if (e.atime != null) { > elenEXTT += 4; > flagEXTT |= EXTT_FLAG_LAT; > uatime = fileTimeToUnixTime(e.atime); > } > if (e.ctime != null) { > elenEXTT += 4; > flagEXTT |= EXTT_FLAT_CT; > uctime = fileTimeToUnixTime(e.ctime); > } > if (flagEXTT != 0) { > // to use ntfs time if any m/a/ctime is beyond unixtime upper > bound > if (umtime > UPPER_UNIXTIME_BOUND || > uatime > UPPER_UNIXTIME_BOUND || > uctime > UPPER_UNIXTIME_BOUND) { > elen += 36;// NTFS time, total 36 bytes > } else { > elen += (elenEXTT + 5);// headid(2) + size(2) + flag(1) + > data > } > } > writeShort(elen); > writeBytes(nameBytes, 0, nameBytes.length); > if (hasZip64) { > writeShort(ZIP64_EXTID); > writeShort(16); > writeLong(e.size); > writeLong(e.csize); > } > if (flagEXTT != 0) { > if (umtime > UPPER_UNIXTIME_BOUND || > uatime > UPPER_UNIXTIME_BOUND || > uctime > UPPER_UNIXTIME_BOUND) { > writeShort(EXTID_NTFS);// id > writeShort(32);// data size > writeInt(0); // reserved > writeShort(0x0001);// NTFS attr tag > writeShort(24); > writeLong(e.mtime == null ? WINDOWS_TIME_NOT_AVAILABLE > : fileTimeToWinTime(e.mtime)); > writeLong(e.atime == null ? WINDOWS_TIME_NOT_AVAILABLE > : fileTimeToWinTime(e.atime)); > writeLong(e.ctime == null ? WINDOWS_TIME_NOT_AVAILABLE > : fileTimeToWinTime(e.ctime)); > } else { > writeShort(EXTID_EXTT); > writeShort(elenEXTT + 1); // flag + data > writeByte(flagEXTT); > if (e.mtime != null) > writeInt(umtime); > if (e.atime != null) > writeInt(uatime); > if (e.ctime != null) > writeInt(uctime); > } > } > writeExtra(e.extra); > locoff = written; > {code} -- This message was sent by Atlassian Jira (v8.20.1#820001)
[jira] [Updated] (COMPRESS-612) Support atime/ctime and higher time precision for TAR
[ https://issues.apache.org/jira/browse/COMPRESS-612?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Andre Brait updated COMPRESS-612: - Description: This is a proposal for some code I have already worked on. h3. Context I'm coding a tool that requires extracting/compressing files. I noticed the following shortcomings: - -File size is limited to 8GB. This limitation was lifted as of POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger files are fully supported by some TAR archiving tools such as GNU TAR. Reference: [https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html]- -- I think I was actually wrong here in that current implementation should support files >8GB if using BIGNUMBER_POSIX. - Only modification date is available as a time type. - Maximum granularity is seconds, even though the PAX header contains 100ns intervals - Other time-related PAX headers are considered extra headers (ctime and atime) My proposal is as follows: - Migrate time fields from java.util.Date to java.nio.file.attribute.FileTime - Keep backwards compatibility through getter/setter methods and add new ones for FileTime - Parse times in with a maximal granularity of 100ns intervals from PAX headers - Read/write ctime and atime and add corresponding fields - Write times to PAX headers using a maximum granularity of 100ns intervals when in BIGNUMBER_POSIX mode. - -Add a new mode BIGNUMBER_POSIX_2001 for writing big numbers, allowing for the bigger size, mtime, ctime and atime to be written- - -Lift the 8GB limit when using BIGNUMBER_POSIX_2001- I already have some code for that in https://github.com/andrebrait/commons-compress/tree/COMPRESS-612 Since compatibility with Android now requires API level 26 and that includes FileTime, I think we can do that here as well. This will bring tar in line with Zip in this regard. was: This is a proposal for some code I have already worked on. h3. Context I'm coding a tool that requires extracting/compressing files. I noticed the following shortcomings: - -File size is limited to 8GB. This limitation was lifted as of POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger files are fully supported by some TAR archiving tools such as GNU TAR. Reference: [https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html]- -- I think I was actually wrong here in that current implementation should support files >8GB if using BIGNUMBER_POSIX. - Only modification date is available as a time type. - Maximum granularity is seconds, even though the PAX header contains 100ns intervals - Other time-related PAX headers are considered extra headers (ctime and atime) My proposal is as follows: - Migrate time fields from java.util.Date to java.nio.file.attribute.FileTime - Keep backwards compatibility through getter/setter methods and add new ones for FileTime - Parse times in with a maximal granularity of 100ns intervals from PAX headers - Read/write ctime and atime and add corresponding fields - Write times to PAX headers using a maximum granularity of 100ns intervals when in BIGNUMBER_POSIX mode. - -Add a new mode BIGNUMBER_POSIX_2001 for writing big numbers, allowing for the bigger size, mtime, ctime and atime to be written- - -Lift the 8GB limit when using BIGNUMBER_POSIX_2001- I already have some code for that in [https://github.com/andrebrait/commons-compress/tree/COMPRESS-612|https://github.com/andrebrait/commons-compress/tree/feature/tarPaxHeaders]. Since compatibility with Android now requires API level 26 and that includes FileTime, I think we can do that here as well. This will bring tar in line with Zip in this regard. > Support atime/ctime and higher time precision for TAR > - > > Key: COMPRESS-612 > URL: https://issues.apache.org/jira/browse/COMPRESS-612 > Project: Commons Compress > Issue Type: Improvement > Components: Archivers >Affects Versions: 1.21 >Reporter: Andre Brait >Priority: Major > Labels: tar > > This is a proposal for some code I have already worked on. > h3. Context > I'm coding a tool that requires extracting/compressing files. I noticed the > following shortcomings: > - -File size is limited to 8GB. This limitation was lifted as of > POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger > files are fully supported by some TAR archiving tools such as GNU TAR. > Reference: > [https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html]- > -- I think I was actually wrong here in that current implementation should > support files >8GB if using BIGNUMBER_POSIX. > - Only modification date is available as a time type. > - Maximum granularity is seconds, even though the PAX header contains 100ns > intervals > -
[jira] [Commented] (COMPRESS-612) Support atime/ctime and higher time precision for TAR
[ https://issues.apache.org/jira/browse/COMPRESS-612?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17505049#comment-17505049 ] Andre Brait commented on COMPRESS-612: -- Looking for comments also on the possibility of making BIGNUMBER_POSIX the default. I think more tools support it than not. > Support atime/ctime and higher time precision for TAR > - > > Key: COMPRESS-612 > URL: https://issues.apache.org/jira/browse/COMPRESS-612 > Project: Commons Compress > Issue Type: Improvement > Components: Archivers >Affects Versions: 1.21 >Reporter: Andre Brait >Priority: Major > Labels: tar > > This is a proposal for some code I have already worked on. > h3. Context > I'm coding a tool that requires extracting/compressing files. I noticed the > following shortcomings: > - -File size is limited to 8GB. This limitation was lifted as of > POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger > files are fully supported by some TAR archiving tools such as GNU TAR. > Reference: > [https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html]- > -- I think I was actually wrong here in that current implementation should > support files >8GB if using BIGNUMBER_POSIX. > - Only modification date is available as a time type. > - Maximum granularity is seconds, even though the PAX header contains 100ns > intervals > - Other time-related PAX headers are considered extra headers (ctime and > atime) > My proposal is as follows: > - Migrate time fields from java.util.Date to java.nio.file.attribute.FileTime > - Keep backwards compatibility through getter/setter methods and add new > ones for FileTime > - Parse times in with a maximal granularity of 100ns intervals from PAX > headers > - Read/write ctime and atime and add corresponding fields > - Write times to PAX headers using a maximum granularity of 100ns intervals > when in BIGNUMBER_POSIX mode. > - -Add a new mode BIGNUMBER_POSIX_2001 for writing big numbers, allowing for > the bigger size, mtime, ctime and atime to be written- > - -Lift the 8GB limit when using BIGNUMBER_POSIX_2001- > I already have some code for that in > [https://github.com/andrebrait/commons-compress/tree/COMPRESS-612|https://github.com/andrebrait/commons-compress/tree/feature/tarPaxHeaders]. > Since compatibility with Android now requires API level 26 and that includes > FileTime, I think we can do that here as well. > This will bring tar in line with Zip in this regard. -- This message was sent by Atlassian Jira (v8.20.1#820001)
[jira] [Updated] (COMPRESS-612) Support atime/ctime and higher time precision for TAR
[ https://issues.apache.org/jira/browse/COMPRESS-612?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Andre Brait updated COMPRESS-612: - Description: This is a proposal for some code I have already worked on. h3. Context I'm coding a tool that requires extracting/compressing files. I noticed the following shortcomings: - -File size is limited to 8GB. This limitation was lifted as of POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger files are fully supported by some TAR archiving tools such as GNU TAR. Reference: [https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html]- -- I think I was actually wrong here in that current implementation should support files >8GB if using BIGNUMBER_POSIX. - Only modification date is available as a time type. - Maximum granularity is seconds, even though the PAX header contains 100ns intervals - Other time-related PAX headers are considered extra headers (ctime and atime) My proposal is as follows: - Migrate time fields from java.util.Date to java.nio.file.attribute.FileTime - Keep backwards compatibility through getter/setter methods and add new ones for FileTime - Parse times in with a maximal granularity of 100ns intervals from PAX headers - Read/write ctime and atime and add corresponding fields - Write times to PAX headers using a maximum granularity of 100ns intervals when in BIGNUMBER_POSIX mode. - -Add a new mode BIGNUMBER_POSIX_2001 for writing big numbers, allowing for the bigger size, mtime, ctime and atime to be written- - -Lift the 8GB limit when using BIGNUMBER_POSIX_2001- I already have some code for that in [https://github.com/andrebrait/commons-compress/tree/COMPRESS-612|https://github.com/andrebrait/commons-compress/tree/feature/tarPaxHeaders]. Since compatibility with Android now requires API level 26 and that includes FileTime, I think we can do that here as well. This will bring tar in line with Zip in this regard. was: This is a proposal for some code I have already worked on. h3. Context I'm coding a tool that requires extracting/compressing files. I noticed the following shortcomings: - -File size is limited to 8GB. This limitation was lifted as of POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger files are fully supported by some TAR archiving tools such as GNU TAR. Reference: [https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html]- – I think I was actually wrong here in that current implementation should support files >8GB if using BIGNUMBER_POSIX. - Only modification date is available as a time type. - Maximum granularity is seconds, even though the PAX header contains 100ns intervals - Other time-related PAX headers are considered extra headers (ctime and atime) My proposal is as follows: - Migrate time fields from java.util.Date to java.nio.file.attribute.FileTime - Keep backwards compatibility through getter/setter methods and add new ones for FileTime - Parse times in with a maximal granularity of 100ns intervals from PAX headers - Read/write ctime and atime and add corresponding fields - Write times to PAX headers using a maximum granularity of 100ns intervals when in BIGNUMBER_POSIX mode. - -Add a new mode BIGNUMBER_POSIX_2001 for writing big numbers, allowing for the bigger size, mtime, ctime and atime to be written- - -Lift the 8GB limit when using BIGNUMBER_POSIX_2001- I already have some code for that in [https://github.com/andrebrait/commons-compress/tree/COMPRESS-612|https://github.com/andrebrait/commons-compress/tree/feature/tarPaxHeaders]. Since compatibility with Android now requires API level 26 and that includes FileTime, I think we can do that here as well. This will bring tar in line with Zip in this regard. > Support atime/ctime and higher time precision for TAR > - > > Key: COMPRESS-612 > URL: https://issues.apache.org/jira/browse/COMPRESS-612 > Project: Commons Compress > Issue Type: Improvement > Components: Archivers >Affects Versions: 1.21 >Reporter: Andre Brait >Priority: Major > Labels: tar > > This is a proposal for some code I have already worked on. > h3. Context > I'm coding a tool that requires extracting/compressing files. I noticed the > following shortcomings: > - -File size is limited to 8GB. This limitation was lifted as of > POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger > files are fully supported by some TAR archiving tools such as GNU TAR. > Reference: > [https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html]- > -- I think I was actually wrong here in that current implementation should > support files >8GB if using BIGNUMBER_POSIX. > - Only modification date is available as a time type. > - Maximum
[jira] [Updated] (COMPRESS-612) Support modern TAR formats
[ https://issues.apache.org/jira/browse/COMPRESS-612?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Andre Brait updated COMPRESS-612: - Description: This is a proposal for some code I have already worked on. h3. Context I'm coding a tool that requires extracting/compressing files. I noticed the following shortcomings: - -File size is limited to 8GB. This limitation was lifted as of POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger files are fully supported by some TAR archiving tools such as GNU TAR. Reference: [https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html]- -- I think I was actually wrong here in that current implementation should support files >8GB if using BIGNUMBER_POSIX. - Only modification date is available as a time type. - Maximum granularity is seconds, even though the PAX header contains 100ns intervals - Other time-related PAX headers are considered extra headers (ctime and atime) My proposal is as follows: - Migrate time fields from java.util.Date to java.nio.file.attribute.FileTime - Keep backwards compatibility through getter/setter methods and add new ones for FileTime - Parse times in with a maximal granularity of 100ns intervals from PAX headers - Read/write ctime and atime and add corresponding fields - Write times to PAX headers using a maximum granularity of 100ns intervals when in BIGNUMBER_POSIX mode. - -Add a new mode BIGNUMBER_POSIX_2001 for writing big numbers, allowing for the bigger size, mtime, ctime and atime to be written- - -Lift the 8GB limit when using BIGNUMBER_POSIX_2001- I already have some code for that in [https://github.com/andrebrait/commons-compress/tree/feature/tarPaxHeaders]. Since compatibility with Android now requires API level 26 and that includes FileTime, I think we can do that here as well. This will bring tar in line with Zip in this regard. was: This is a proposal for some code I have already worked on. h3. Context I'm coding a tool that requires extracting/compressing files. I noticed the following shortcomings: - File size is limited to 8GB. This limitation was lifted as of POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger files are fully supported by some TAR archiving tools such as GNU TAR. Reference: https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html - Only modification date is available as a time type. - Maximum granularity is seconds, even though the PAX header contains 100ns intervals - Other time-related PAX headers are considered extra headers (ctime and atime) My proposal is as follows: - Migrate time fields from java.util.Date to java.nio.file.attribute.FileTime - Keep backwards compatibility through getter/setter methods and add new ones for FileTime - Parse times in with a maximal granularity of 100ns intervals from PAX headers - Read/write ctime and atime and add corresponding fields - Add a new mode BIGNUMBER_POSIX_2001 for writing big numbers, allowing for the bigger size, mtime, ctime and atime to be written - Lift the 8GB limit when using BIGNUMBER_POSIX_2001 I already have some code for that in [https://github.com/andrebrait/commons-compress/tree/feature/tarPaxHeaders]. Since compatibility with Android now requires API level 26 and that includes FileTime, I think we can do that here as well. This will bring tar in line with Zip in this regard. > Support modern TAR formats > -- > > Key: COMPRESS-612 > URL: https://issues.apache.org/jira/browse/COMPRESS-612 > Project: Commons Compress > Issue Type: Improvement > Components: Archivers >Affects Versions: 1.21 >Reporter: Andre Brait >Priority: Major > Labels: tar > > This is a proposal for some code I have already worked on. > h3. Context > I'm coding a tool that requires extracting/compressing files. I noticed the > following shortcomings: > - -File size is limited to 8GB. This limitation was lifted as of > POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger > files are fully supported by some TAR archiving tools such as GNU TAR. > Reference: > [https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html]- > -- I think I was actually wrong here in that current implementation should > support files >8GB if using BIGNUMBER_POSIX. > - Only modification date is available as a time type. > - Maximum granularity is seconds, even though the PAX header contains 100ns > intervals > - Other time-related PAX headers are considered extra headers (ctime and > atime) > My proposal is as follows: > - Migrate time fields from java.util.Date to java.nio.file.attribute.FileTime > - Keep backwards compatibility through getter/setter methods and add new > ones for FileTime > - Parse times in with a maximal granularity of 100ns
[jira] [Updated] (COMPRESS-612) Support atime/ctime and higher time precision for TAR
[ https://issues.apache.org/jira/browse/COMPRESS-612?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Andre Brait updated COMPRESS-612: - Description: This is a proposal for some code I have already worked on. h3. Context I'm coding a tool that requires extracting/compressing files. I noticed the following shortcomings: - -File size is limited to 8GB. This limitation was lifted as of POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger files are fully supported by some TAR archiving tools such as GNU TAR. Reference: [https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html]- – I think I was actually wrong here in that current implementation should support files >8GB if using BIGNUMBER_POSIX. - Only modification date is available as a time type. - Maximum granularity is seconds, even though the PAX header contains 100ns intervals - Other time-related PAX headers are considered extra headers (ctime and atime) My proposal is as follows: - Migrate time fields from java.util.Date to java.nio.file.attribute.FileTime - Keep backwards compatibility through getter/setter methods and add new ones for FileTime - Parse times in with a maximal granularity of 100ns intervals from PAX headers - Read/write ctime and atime and add corresponding fields - Write times to PAX headers using a maximum granularity of 100ns intervals when in BIGNUMBER_POSIX mode. - -Add a new mode BIGNUMBER_POSIX_2001 for writing big numbers, allowing for the bigger size, mtime, ctime and atime to be written- - -Lift the 8GB limit when using BIGNUMBER_POSIX_2001- I already have some code for that in [https://github.com/andrebrait/commons-compress/tree/COMPRESS-612|https://github.com/andrebrait/commons-compress/tree/feature/tarPaxHeaders]. Since compatibility with Android now requires API level 26 and that includes FileTime, I think we can do that here as well. This will bring tar in line with Zip in this regard. was: This is a proposal for some code I have already worked on. h3. Context I'm coding a tool that requires extracting/compressing files. I noticed the following shortcomings: - -File size is limited to 8GB. This limitation was lifted as of POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger files are fully supported by some TAR archiving tools such as GNU TAR. Reference: [https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html]- -- I think I was actually wrong here in that current implementation should support files >8GB if using BIGNUMBER_POSIX. - Only modification date is available as a time type. - Maximum granularity is seconds, even though the PAX header contains 100ns intervals - Other time-related PAX headers are considered extra headers (ctime and atime) My proposal is as follows: - Migrate time fields from java.util.Date to java.nio.file.attribute.FileTime - Keep backwards compatibility through getter/setter methods and add new ones for FileTime - Parse times in with a maximal granularity of 100ns intervals from PAX headers - Read/write ctime and atime and add corresponding fields - Write times to PAX headers using a maximum granularity of 100ns intervals when in BIGNUMBER_POSIX mode. - -Add a new mode BIGNUMBER_POSIX_2001 for writing big numbers, allowing for the bigger size, mtime, ctime and atime to be written- - -Lift the 8GB limit when using BIGNUMBER_POSIX_2001- I already have some code for that in [https://github.com/andrebrait/commons-compress/tree/feature/tarPaxHeaders]. Since compatibility with Android now requires API level 26 and that includes FileTime, I think we can do that here as well. This will bring tar in line with Zip in this regard. > Support atime/ctime and higher time precision for TAR > - > > Key: COMPRESS-612 > URL: https://issues.apache.org/jira/browse/COMPRESS-612 > Project: Commons Compress > Issue Type: Improvement > Components: Archivers >Affects Versions: 1.21 >Reporter: Andre Brait >Priority: Major > Labels: tar > > This is a proposal for some code I have already worked on. > h3. Context > I'm coding a tool that requires extracting/compressing files. I noticed the > following shortcomings: > - -File size is limited to 8GB. This limitation was lifted as of > POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger > files are fully supported by some TAR archiving tools such as GNU TAR. > Reference: > [https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html]- > – I think I was actually wrong here in that current implementation should > support files >8GB if using BIGNUMBER_POSIX. > - Only modification date is available as a time type. > - Maximum granularity is seconds, even though the PAX header contains 100ns >
[jira] [Updated] (COMPRESS-612) Support atime/ctime and higher time precision for TAR
[ https://issues.apache.org/jira/browse/COMPRESS-612?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Andre Brait updated COMPRESS-612: - Summary: Support atime/ctime and higher time precision for TAR (was: Support modern TAR formats) > Support atime/ctime and higher time precision for TAR > - > > Key: COMPRESS-612 > URL: https://issues.apache.org/jira/browse/COMPRESS-612 > Project: Commons Compress > Issue Type: Improvement > Components: Archivers >Affects Versions: 1.21 >Reporter: Andre Brait >Priority: Major > Labels: tar > > This is a proposal for some code I have already worked on. > h3. Context > I'm coding a tool that requires extracting/compressing files. I noticed the > following shortcomings: > - -File size is limited to 8GB. This limitation was lifted as of > POSIX.1-2001 and it also does not exist on GNU and old GNU formats. Bigger > files are fully supported by some TAR archiving tools such as GNU TAR. > Reference: > [https://lists.gnu.org/archive/html/help-tar/2015-04/msg1.html]- > -- I think I was actually wrong here in that current implementation should > support files >8GB if using BIGNUMBER_POSIX. > - Only modification date is available as a time type. > - Maximum granularity is seconds, even though the PAX header contains 100ns > intervals > - Other time-related PAX headers are considered extra headers (ctime and > atime) > My proposal is as follows: > - Migrate time fields from java.util.Date to java.nio.file.attribute.FileTime > - Keep backwards compatibility through getter/setter methods and add new > ones for FileTime > - Parse times in with a maximal granularity of 100ns intervals from PAX > headers > - Read/write ctime and atime and add corresponding fields > - Write times to PAX headers using a maximum granularity of 100ns intervals > when in BIGNUMBER_POSIX mode. > - -Add a new mode BIGNUMBER_POSIX_2001 for writing big numbers, allowing for > the bigger size, mtime, ctime and atime to be written- > - -Lift the 8GB limit when using BIGNUMBER_POSIX_2001- > I already have some code for that in > [https://github.com/andrebrait/commons-compress/tree/feature/tarPaxHeaders]. > Since compatibility with Android now requires API level 26 and that includes > FileTime, I think we can do that here as well. > This will bring tar in line with Zip in this regard. -- This message was sent by Atlassian Jira (v8.20.1#820001)
[GitHub] [commons-collections] garydgregory commented on pull request #290: Bump checkstyle from 9.3 to 10.0
garydgregory commented on pull request #290: URL: https://github.com/apache/commons-collections/pull/290#issuecomment-1065114819 Closing: requires Java 11. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-pool] garydgregory commented on pull request #136: Bump checkstyle from 9.3 to 10.0
garydgregory commented on pull request #136: URL: https://github.com/apache/commons-pool/pull/136#issuecomment-1065114153 Closing: requires Java 11. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-pool] dependabot[bot] opened a new pull request #137: Bump spotbugs from 4.5.3 to 4.6.0
dependabot[bot] opened a new pull request #137: URL: https://github.com/apache/commons-pool/pull/137 Bumps [spotbugs](https://github.com/spotbugs/spotbugs) from 4.5.3 to 4.6.0. Release notes Sourced from https://github.com/spotbugs/spotbugs/releases;>spotbugs's releases. SpotBugs 4.6.0 CHANGELOG Fixed Fixed spotbugs build with ecj compiler (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/1903;>#1903) https://github.com/iloveeclipse;>@iloveeclipse Moved tests from spotbugs project to spotbugs-tests project (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/1914;>#1914) https://github.com/iloveeclipse;>@iloveeclipse Fixed UI freezes in Eclipse on bug count decorations update (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/285;>#285) https://github.com/iloveeclipse;>@iloveeclipse Bumped log4j from 2.17.1 to 2.17.2 (https://github-redirect.dependabot.com/spotbugs/spotbugs/pull/1960;>#1960) Bumped gson from 2.8.9 to 2.9.0 (https://github-redirect.dependabot.com/spotbugs/spotbugs/pull/1966;>#1960) Added New detector FindInstanceLockOnSharedStaticData for new bug type SSD_DO_NOT_USE_INSTANCE_LOCK_ON_SHARED_STATIC_DATA. This detector reports a bug if an instance level lock is used to modify a shared static data. (See https://wiki.sei.cmu.edu/confluence/display/java/LCK06-J.+Do+not+use+an+instance+lock+to+protect+shared+static+data;>SEI CERT rule LCK06-J) https://github.com/gonczmisi;>@gonczmisi CHECKSUM file checksum (sha256) spotbugs-4.6.0-javadoc.jar f38dba26a1e419483b19c3acc35962347a6e5c3d6793729e84a637cef1423c1a spotbugs-4.6.0-sources.jar 6926fee89be85021a3a58cc8f08c5f706f3696c151dcee38dbaf674b6fa7f357 spotbugs-4.6.0.tgz d357a5920bba4e7964d834de88fe64892ed02b5e1d4f61b8afb5187e4e4cdd04 spotbugs-4.6.0.zip 8486f721d80e62c300fd2db5076badac3d969b596904c23f429c922a03041ac0 spotbugs-annotations-4.6.0-javadoc.jar d001876f444fb41f946218571f6935b008578cdc560d75691951b682578f260c spotbugs-annotations-4.6.0-sources.jar b338136e3e82d585348cde58a8fe3a678e16f51a35c31c1463e05fefef557aad spotbugs-annotations.jar b7021b4ecbafd9b321bdf06eef2ec4519526e2b39fb7d080f2964308f017435e spotbugs-ant-4.6.0-javadoc.jar 4d092495bee2eede65dbac444e72a89396dbc78beea15ae588d1d37e853c4cab spotbugs-ant-4.6.0-sources.jar ce7cfbed848ccb0e3765cec6b9c60c458699aa51f60ad9216cf89dbf38d8d793 spotbugs-ant.jar b866a2a89a03b49e60b5f27e0f5987eb8c12c2d2aefc6e9ddcbcdae345c765db spotbugs.jar 0c05d399522d4de7630a935eb24b2fef75cabf1867527abffbcd319a94804b5f test-harness-4.6.0-javadoc.jar e5c5e087a6ae7dd919026dc1dc88e720ce239f73b125e150c15e70a78126574f test-harness-4.6.0-sources.jar 2c1f5ef929453f3b682c7eb7c1e22db3082b5f74c5a5be439be5dc31dd7a31aa test-harness-4.6.0.jar 45ca0e944ee5704318d79f67815cde7ca5f7fb22814e325d00e2d25d9b552659 test-harness-core-4.6.0-javadoc.jar 1e6bdfb261bbb17674d4ac94576cb3fb561b207d9b615fdcb575e6c565a03f09 test-harness-core-4.6.0-sources.jar f320f5eb4069e9686b760b2a6a0760989753225f9e9ce1226e3258ec64795d8a test-harness-core-4.6.0.jar fd1a0c06a5eaff50ed0953d42fb7d69a41031c6a6630ad5e47c38a9f0eaca285 test-harness-jupiter-4.6.0-javadoc.jar 1a0f4bb21a3a2cf100b8b5d6ec6ccf6e54eef2d174e00cc34d54cf7f86d45640 test-harness-jupiter-4.6.0-sources.jar 210353a57016e26b1a654d936a15f039613fa1ac532d485c1b1d03902f6c6315 test-harness-jupiter-4.6.0.jar 18095fec31b85981ecaafdef86ca9ae1e9588e1b9bc6d209f82829cf9d0c13f4 Changelog Sourced from https://github.com/spotbugs/spotbugs/blob/master/CHANGELOG.md;>spotbugs's changelog. 4.6.0 - 2022-03-08 Fixed Fixed spotbugs build with ecj compiler (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/1903;>#1903) Moved tests from spotbugs project to spotbugs-tests project (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/1914;>#1914) Fixed UI freezes in Eclipse on bug count decorations update (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/285;>#285) Bumped log4j from 2.17.1 to 2.17.2 (https://github-redirect.dependabot.com/spotbugs/spotbugs/pull/1960;>#1960) Bumped gson from 2.8.9 to 2.9.0 (https://github-redirect.dependabot.com/spotbugs/spotbugs/pull/1966;>#1960) Added New detector FindInstanceLockOnSharedStaticData for new bug type SSD_DO_NOT_USE_INSTANCE_LOCK_ON_SHARED_STATIC_DATA. This detector reports a bug if an instance level lock is used to modify a shared static data. (See https://wiki.sei.cmu.edu/confluence/display/java/LCK06-J.+Do+not+use+an+instance+lock+to+protect+shared+static+data;>SEI CERT rule LCK06-J) Commits
[GitHub] [commons-pool] dependabot[bot] opened a new pull request #136: Bump checkstyle from 9.3 to 10.0
dependabot[bot] opened a new pull request #136: URL: https://github.com/apache/commons-pool/pull/136 Bumps [checkstyle](https://github.com/checkstyle/checkstyle) from 9.3 to 10.0. Release notes Sourced from https://github.com/checkstyle/checkstyle/releases;>checkstyle's releases. checkstyle-10.0 https://checkstyle.org/releasenotes.html#Release_10.0;>https://checkstyle.org/releasenotes.html#Release_10.0 Commits https://github.com/checkstyle/checkstyle/commit/f1ad267111dcdd9757594116b83174b92d1e40ca;>f1ad267 [maven-release-plugin] prepare release checkstyle-10.0 https://github.com/checkstyle/checkstyle/commit/b81031fbfb6535421f79e4f619c4bf217f59d800;>b81031f doc: release notes 10.0 https://github.com/checkstyle/checkstyle/commit/6c8dbf3124c3df1b1acdbb2f63d8b78f86cf5b5d;>6c8dbf3 Issue https://github-redirect.dependabot.com/checkstyle/checkstyle/issues/11345;>#11345: SuppressionsLoaderTest.loadFilterSet failing with SSLHandshakeE... https://github.com/checkstyle/checkstyle/commit/e292c079ced9ede7dfbc657e444208eca5b69538;>e292c07 Issue https://github-redirect.dependabot.com/checkstyle/checkstyle/issues/10859;>#10859: FinalClass now exempts private-only ctor classes that are exten... https://github.com/checkstyle/checkstyle/commit/50a9a64b6d70aa722dcf754ad5d46e37784f5b05;>50a9a64 supplemental: refactor FinalClassCheck to ease update for https://github-redirect.dependabot.com/checkstyle/checkstyle/issues/10859;>#10859 https://github.com/checkstyle/checkstyle/commit/890e1f4ab44a2950b58af3a9fb976a8c21e6eff1;>890e1f4 dependency: bump maven-project-info-reports-plugin from 3.2.1 to 3.2.2 https://github.com/checkstyle/checkstyle/commit/3ef61de60c1ae93cf0d9a06c56ad84cfedeefa88;>3ef61de Issue https://github-redirect.dependabot.com/checkstyle/checkstyle/issues/6320;>#6320: add remove conditionals mutator for coding package https://github.com/checkstyle/checkstyle/commit/aec751dfba46e7ce6eae351cd93fde43f2cf3105;>aec751d dependency: bump nexus-staging-maven-plugin from 1.6.11 to 1.6.12 https://github.com/checkstyle/checkstyle/commit/eeeb96e26a850133eba894d7ae7282560dd3ba0a;>eeeb96e minor: use java-11 api https://github.com/checkstyle/checkstyle/commit/7fbe7999c22f739f6ba25ef0d2ad9ee649aa5429;>7fbe799 dependency: bump junit-pioneer from 1.6.0 to 1.6.1 Additional commits viewable in https://github.com/checkstyle/checkstyle/compare/checkstyle-9.3...checkstyle-10.0;>compare view [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=com.puppycrawl.tools:checkstyle=maven=9.3=10.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- Dependabot commands and options You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-collections] codecov-commenter commented on pull request #290: Bump checkstyle from 9.3 to 10.0
codecov-commenter commented on pull request #290: URL: https://github.com/apache/commons-collections/pull/290#issuecomment-1065068484 # [Codecov](https://codecov.io/gh/apache/commons-collections/pull/290?src=pr=h1_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation) Report > Merging [#290](https://codecov.io/gh/apache/commons-collections/pull/290?src=pr=desc_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation) (c935813) into [master](https://codecov.io/gh/apache/commons-collections/commit/eab0aa0b093efbafa3d188226985e9c2dcbd13c4?el=desc_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation) (eab0aa0) will **increase** coverage by `0.05%`. > The diff coverage is `n/a`. [![Impacted file tree graph](https://codecov.io/gh/apache/commons-collections/pull/290/graphs/tree.svg?width=650=150=pr=2OkdLkQHzZ_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation)](https://codecov.io/gh/apache/commons-collections/pull/290?src=pr=tree_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation) ```diff @@ Coverage Diff @@ ## master #290 +/- ## + Coverage 85.75% 85.80% +0.05% - Complexity 4672 4674 +2 Files 292 292 Lines 1347213472 Branches 1955 1955 + Hits 1155311560 +7 + Misses 1336 1332 -4 + Partials583 580 -3 ``` | [Impacted Files](https://codecov.io/gh/apache/commons-collections/pull/290?src=pr=tree_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation) | Coverage Δ | | |---|---|---| | [...commons/collections4/map/AbstractReferenceMap.java](https://codecov.io/gh/apache/commons-collections/pull/290/diff?src=pr=tree_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation#diff-c3JjL21haW4vamF2YS9vcmcvYXBhY2hlL2NvbW1vbnMvY29sbGVjdGlvbnM0L21hcC9BYnN0cmFjdFJlZmVyZW5jZU1hcC5qYXZh) | `88.23% <0.00%> (+2.57%)` | :arrow_up: | -- [Continue to review full report at Codecov](https://codecov.io/gh/apache/commons-collections/pull/290?src=pr=continue_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation). > **Legend** - [Click here to learn more](https://docs.codecov.io/docs/codecov-delta?utm_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation) > `Δ = absolute (impact)`, `ø = not affected`, `? = missing data` > Powered by [Codecov](https://codecov.io/gh/apache/commons-collections/pull/290?src=pr=footer_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation). Last update [eab0aa0...c935813](https://codecov.io/gh/apache/commons-collections/pull/290?src=pr=lastupdated_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation). Read the [comment docs](https://docs.codecov.io/docs/pull-request-comments?utm_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation). -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-collections] dependabot[bot] opened a new pull request #290: Bump checkstyle from 9.3 to 10.0
dependabot[bot] opened a new pull request #290: URL: https://github.com/apache/commons-collections/pull/290 Bumps [checkstyle](https://github.com/checkstyle/checkstyle) from 9.3 to 10.0. Release notes Sourced from https://github.com/checkstyle/checkstyle/releases;>checkstyle's releases. checkstyle-10.0 https://checkstyle.org/releasenotes.html#Release_10.0;>https://checkstyle.org/releasenotes.html#Release_10.0 Commits https://github.com/checkstyle/checkstyle/commit/f1ad267111dcdd9757594116b83174b92d1e40ca;>f1ad267 [maven-release-plugin] prepare release checkstyle-10.0 https://github.com/checkstyle/checkstyle/commit/b81031fbfb6535421f79e4f619c4bf217f59d800;>b81031f doc: release notes 10.0 https://github.com/checkstyle/checkstyle/commit/6c8dbf3124c3df1b1acdbb2f63d8b78f86cf5b5d;>6c8dbf3 Issue https://github-redirect.dependabot.com/checkstyle/checkstyle/issues/11345;>#11345: SuppressionsLoaderTest.loadFilterSet failing with SSLHandshakeE... https://github.com/checkstyle/checkstyle/commit/e292c079ced9ede7dfbc657e444208eca5b69538;>e292c07 Issue https://github-redirect.dependabot.com/checkstyle/checkstyle/issues/10859;>#10859: FinalClass now exempts private-only ctor classes that are exten... https://github.com/checkstyle/checkstyle/commit/50a9a64b6d70aa722dcf754ad5d46e37784f5b05;>50a9a64 supplemental: refactor FinalClassCheck to ease update for https://github-redirect.dependabot.com/checkstyle/checkstyle/issues/10859;>#10859 https://github.com/checkstyle/checkstyle/commit/890e1f4ab44a2950b58af3a9fb976a8c21e6eff1;>890e1f4 dependency: bump maven-project-info-reports-plugin from 3.2.1 to 3.2.2 https://github.com/checkstyle/checkstyle/commit/3ef61de60c1ae93cf0d9a06c56ad84cfedeefa88;>3ef61de Issue https://github-redirect.dependabot.com/checkstyle/checkstyle/issues/6320;>#6320: add remove conditionals mutator for coding package https://github.com/checkstyle/checkstyle/commit/aec751dfba46e7ce6eae351cd93fde43f2cf3105;>aec751d dependency: bump nexus-staging-maven-plugin from 1.6.11 to 1.6.12 https://github.com/checkstyle/checkstyle/commit/eeeb96e26a850133eba894d7ae7282560dd3ba0a;>eeeb96e minor: use java-11 api https://github.com/checkstyle/checkstyle/commit/7fbe7999c22f739f6ba25ef0d2ad9ee649aa5429;>7fbe799 dependency: bump junit-pioneer from 1.6.0 to 1.6.1 Additional commits viewable in https://github.com/checkstyle/checkstyle/compare/checkstyle-9.3...checkstyle-10.0;>compare view [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=com.puppycrawl.tools:checkstyle=maven=9.3=10.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- Dependabot commands and options You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-vfs] garydgregory merged pull request #247: Bump commons.pmd.version from 6.42.0 to 6.43.0
garydgregory merged pull request #247: URL: https://github.com/apache/commons-vfs/pull/247 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-cli] garydgregory merged pull request #96: Bump spotbugs from 4.5.3 to 4.6.0
garydgregory merged pull request #96: URL: https://github.com/apache/commons-cli/pull/96 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-build-plugin] garydgregory merged pull request #63: Bump spotbugs from 4.5.3 to 4.6.0
garydgregory merged pull request #63: URL: https://github.com/apache/commons-build-plugin/pull/63 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-dbcp] garydgregory merged pull request #175: Bump mockito-core from 4.3.1 to 4.4.0
garydgregory merged pull request #175: URL: https://github.com/apache/commons-dbcp/pull/175 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[jira] [Commented] (COMPRESS-604) 1.21 with java 8 compatibility issue error: cannot access SeekableByteChannel ZipArchiveOutputStream zipOutputStream = new ZipArchiveOutputStream(response.getOutputS
[ https://issues.apache.org/jira/browse/COMPRESS-604?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17504884#comment-17504884 ] Gary D. Gregory commented on COMPRESS-604: -- Merged [https://github.com/apache/commons-compress/pull/252] Please test > 1.21 with java 8 compatibility issue error: cannot access > SeekableByteChannel ZipArchiveOutputStream zipOutputStream = new > ZipArchiveOutputStream(response.getOutputStream()); class file for > java.nio.channels.SeekableByteChannel not found > -- > > Key: COMPRESS-604 > URL: https://issues.apache.org/jira/browse/COMPRESS-604 > Project: Commons Compress > Issue Type: Bug > Components: Archivers >Affects Versions: 1.21 >Reporter: Anupama Shinde >Priority: Major > Time Spent: 20m > Remaining Estimate: 0h > > error: cannot access SeekableByteChannel > ZipArchiveOutputStream zipOutputStream = new > ZipArchiveOutputStream(response.getOutputStream()); > class file for java.nio.channels.SeekableByteChannel not found > > > So origianl issue was > [https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-36090] > We are trying to upgrade to common-compress-1.21. But it seems it is not > compatible with java 8 -- This message was sent by Atlassian Jira (v8.20.1#820001)
[jira] [Updated] (COMPRESS-604) 1.21 with java 8 compatibility issue error: cannot access SeekableByteChannel ZipArchiveOutputStream zipOutputStream = new ZipArchiveOutputStream(response.getOutputStr
[ https://issues.apache.org/jira/browse/COMPRESS-604?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Gary D. Gregory updated COMPRESS-604: - External issue URL: https://github.com/apache/commons-compress/pull/252 > 1.21 with java 8 compatibility issue error: cannot access > SeekableByteChannel ZipArchiveOutputStream zipOutputStream = new > ZipArchiveOutputStream(response.getOutputStream()); class file for > java.nio.channels.SeekableByteChannel not found > -- > > Key: COMPRESS-604 > URL: https://issues.apache.org/jira/browse/COMPRESS-604 > Project: Commons Compress > Issue Type: Bug > Components: Archivers >Affects Versions: 1.21 >Reporter: Anupama Shinde >Priority: Major > Time Spent: 20m > Remaining Estimate: 0h > > error: cannot access SeekableByteChannel > ZipArchiveOutputStream zipOutputStream = new > ZipArchiveOutputStream(response.getOutputStream()); > class file for java.nio.channels.SeekableByteChannel not found > > > So origianl issue was > [https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-36090] > We are trying to upgrade to common-compress-1.21. But it seems it is not > compatible with java 8 -- This message was sent by Atlassian Jira (v8.20.1#820001)
[jira] [Work logged] (COMPRESS-604) 1.21 with java 8 compatibility issue error: cannot access SeekableByteChannel ZipArchiveOutputStream zipOutputStream = new ZipArchiveOutputStream(response.getOutpu
[ https://issues.apache.org/jira/browse/COMPRESS-604?focusedWorklogId=740012=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-740012 ] ASF GitHub Bot logged work on COMPRESS-604: --- Author: ASF GitHub Bot Created on: 11/Mar/22 11:44 Start Date: 11/Mar/22 11:44 Worklog Time Spent: 10m Work Description: garydgregory merged pull request #252: URL: https://github.com/apache/commons-compress/pull/252 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org Issue Time Tracking --- Worklog Id: (was: 740012) Time Spent: 20m (was: 10m) > 1.21 with java 8 compatibility issue error: cannot access > SeekableByteChannel ZipArchiveOutputStream zipOutputStream = new > ZipArchiveOutputStream(response.getOutputStream()); class file for > java.nio.channels.SeekableByteChannel not found > -- > > Key: COMPRESS-604 > URL: https://issues.apache.org/jira/browse/COMPRESS-604 > Project: Commons Compress > Issue Type: Bug > Components: Archivers >Affects Versions: 1.21 >Reporter: Anupama Shinde >Priority: Major > Time Spent: 20m > Remaining Estimate: 0h > > error: cannot access SeekableByteChannel > ZipArchiveOutputStream zipOutputStream = new > ZipArchiveOutputStream(response.getOutputStream()); > class file for java.nio.channels.SeekableByteChannel not found > > > So origianl issue was > [https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-36090] > We are trying to upgrade to common-compress-1.21. But it seems it is not > compatible with java 8 -- This message was sent by Atlassian Jira (v8.20.1#820001)
[GitHub] [commons-compress] garydgregory merged pull request #252: COMPRESS-604: Ensure compatibility with Java 8
garydgregory merged pull request #252: URL: https://github.com/apache/commons-compress/pull/252 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-compress] garydgregory merged pull request #253: Bump mockito.version from 4.3.1 to 4.4.0
garydgregory merged pull request #253: URL: https://github.com/apache/commons-compress/pull/253 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-parent] garydgregory merged pull request #99: Bump commons.pmd-impl.version from 6.42.0 to 6.43.0
garydgregory merged pull request #99: URL: https://github.com/apache/commons-parent/pull/99 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[jira] [Resolved] (DAEMON-434) The data area passed to a system call is too small
[ https://issues.apache.org/jira/browse/DAEMON-434?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Mark Thomas resolved DAEMON-434. Resolution: Cannot Reproduce > The data area passed to a system call is too small > -- > > Key: DAEMON-434 > URL: https://issues.apache.org/jira/browse/DAEMON-434 > Project: Commons Daemon > Issue Type: Bug > Components: Procrun >Affects Versions: 1.2.4 > Environment: Server 2019 > OpenJDK 11 > hSQLdb 2.6 >Reporter: Dick Hildreth >Priority: Major > > Batch file: > REM hSQLdb Windows Service Batch File. > REM Install hSQLdb as Service Using Apache Commons Daemon Programs. > REM The command below will install hSQLdb as a Service using list of > Databases from server.properties. > prunsrv update hSQLdb --DisplayName="hSQLdb Database" --Description="hSQLdb > Database Service" --Startup=automatic --StartMode=Java --StopMode=Java > --JvmMx=128 --StartPath=C:\hSQLdb --Classpath=C:\hSQLdb\lib\hsqldb.jar > --StartClass=org.hsqldb.server.Server --StartParams=--props > ++StartParams=C:/hSQLdb/server.properties > REM Start The Service. > prunsrv start hSQLdb > > The service is installed properly but, when trying to start it, the subject > error is returned. -- This message was sent by Atlassian Jira (v8.20.1#820001)
[GitHub] [commons-parent] dependabot[bot] opened a new pull request #99: Bump commons.pmd-impl.version from 6.42.0 to 6.43.0
dependabot[bot] opened a new pull request #99: URL: https://github.com/apache/commons-parent/pull/99 Bumps `commons.pmd-impl.version` from 6.42.0 to 6.43.0. Updates `pmd-core` from 6.42.0 to 6.43.0 Release notes Sourced from https://github.com/pmd/pmd/releases;>pmd-core's releases. PMD 6.43.0 (26-February-2022) 26-February-2022 - 6.43.0 The PMD team is pleased to announce PMD 6.43.0. This is a minor release. Table Of Contents https://github.com/pmd/pmd/blob/HEAD/#new-and-noteworthy;>New and noteworthy https://github.com/pmd/pmd/blob/HEAD/#fixed-issues;>Fixed Issues https://github.com/pmd/pmd/blob/HEAD/#api-changes;>API Changes https://github.com/pmd/pmd/blob/HEAD/#deprecated-api;>Deprecated API https://github.com/pmd/pmd/blob/HEAD/#internal-api;>Internal API https://github.com/pmd/pmd/blob/HEAD/#changed-api;>Changed API https://github.com/pmd/pmd/blob/HEAD/#external-contributions;>External Contributions https://github.com/pmd/pmd/blob/HEAD/#stats;>Stats New and noteworthy Fixed Issues core https://github-redirect.dependabot.com/pmd/pmd/issues/3427;>#3427: [core] Stop printing CLI usage text when exiting due to invalid parameters https://github-redirect.dependabot.com/pmd/pmd/issues/3768;>#3768: [core] SARIF formatter reports multiple locations when it should report multiple results doc https://github-redirect.dependabot.com/pmd/pmd/issues/2502;>#2502: [doc] Add floating table-of-contents (toc) on the right https://github-redirect.dependabot.com/pmd/pmd/pull/3807;>#3807: [doc] Document Ant Task parameter threads java https://github-redirect.dependabot.com/pmd/pmd/issues/3697;>#3698: [java] Parsing error with try-with-resources and qualified resource java-bestpractices https://github-redirect.dependabot.com/pmd/pmd/issues/3605;>#3605: [java] SwitchStmtsShouldHaveDefault triggered when default case is present java-codestyle https://github-redirect.dependabot.com/pmd/pmd/issues/278;>#278: [java] ConfusingTernary should treat != null as positive condition java-performance https://github-redirect.dependabot.com/pmd/pmd/issues/3374;>#3374: [java] UseStringBufferForStringAppends: Wrong example in documentation misc https://github-redirect.dependabot.com/pmd/pmd/issues/3759;>#3759: [lang-test] Upgrade dokka maven plugin to 1.4.32 plsql https://github-redirect.dependabot.com/pmd/pmd/issues/3746;>#3746: [plsql] Parsing exception Less than or equal to/Greater than or equal to operators in DML statements API Changes Deprecated API Some API deprecations were performed in core PMD classes, to improve compatibility with PMD 7. Report: the constructor and other construction methods like addViolation or createReport RuleContext: all constructors, getters and setters. A new set of stable methods, matching those in PMD 7, was added to replace the addViolation ... (truncated) Commits https://github.com/pmd/pmd/commit/dd0ee6190b4e3a3f64a714ace0debd0a08e5070b;>dd0ee61 [maven-release-plugin] prepare release pmd_releases/6.43.0 https://github.com/pmd/pmd/commit/d9ce3057b89293e9f52fbb6f02913ee811e12357;>d9ce305 Prepare pmd release 6.43.0 https://github.com/pmd/pmd/commit/dd07a00f6a060cfe8edb4f7f63617ba1414598f1;>dd07a00 Merge pull request https://github-redirect.dependabot.com/pmd/pmd/issues/3807;>#3807 from adangel:doc-ant-threads https://github.com/pmd/pmd/commit/9a437b015a30f5ce4f09baef85e354666dd04224;>9a437b0 Merge pull request https://github-redirect.dependabot.com/pmd/pmd/issues/3788;>#3788 from https://github.com/pmd/pmd/commit/47901b75d299dd5e3bbf2bc37d0618b39d95094d;>47901b7 Merge pull request https://github-redirect.dependabot.com/pmd/pmd/issues/3805;>#3805 from oowekyala:issue3605-default-case https://github.com/pmd/pmd/commit/f36945572d0e82fdf8b50d77d65d82cd94c65f3c;>f369455 Add https://github.com/karel1980;>@karel1980 as a contributor https://github.com/pmd/pmd/commit/71f4fe7243370d2b36135c746d3076c1aa621bda;>71f4fe7 [doc] Update release notes (https://github-redirect.dependabot.com/pmd/pmd/issues/3605;>#3605 https://github-redirect.dependabot.com/pmd/pmd/issues/3805;>#3805) https://github.com/pmd/pmd/commit/74516235dda0aac53c9a1d53b8804500d8614a63;>7451623 [doc] Update release notes (https://github-redirect.dependabot.com/pmd/pmd/issues/3807;>#3807) [skip ci] https://github.com/pmd/pmd/commit/73940e2672b9117c5e9b719a5ccb6c1415366748;>73940e2 [doc] Document Ant Task parameter threads https://github.com/pmd/pmd/commit/36134edda20e5685cff76e92309c80e8ee0e9f90;>36134ed Merge pull request https://github-redirect.dependabot.com/pmd/pmd/issues/3804;>#3804 from JerritEic:issue2502-Add-floating-table-of-contents Additional commits viewable in
[GitHub] [commons-vfs] dependabot[bot] opened a new pull request #247: Bump commons.pmd.version from 6.42.0 to 6.43.0
dependabot[bot] opened a new pull request #247: URL: https://github.com/apache/commons-vfs/pull/247 Bumps `commons.pmd.version` from 6.42.0 to 6.43.0. Updates `pmd-core` from 6.42.0 to 6.43.0 Release notes Sourced from https://github.com/pmd/pmd/releases;>pmd-core's releases. PMD 6.43.0 (26-February-2022) 26-February-2022 - 6.43.0 The PMD team is pleased to announce PMD 6.43.0. This is a minor release. Table Of Contents https://github.com/pmd/pmd/blob/HEAD/#new-and-noteworthy;>New and noteworthy https://github.com/pmd/pmd/blob/HEAD/#fixed-issues;>Fixed Issues https://github.com/pmd/pmd/blob/HEAD/#api-changes;>API Changes https://github.com/pmd/pmd/blob/HEAD/#deprecated-api;>Deprecated API https://github.com/pmd/pmd/blob/HEAD/#internal-api;>Internal API https://github.com/pmd/pmd/blob/HEAD/#changed-api;>Changed API https://github.com/pmd/pmd/blob/HEAD/#external-contributions;>External Contributions https://github.com/pmd/pmd/blob/HEAD/#stats;>Stats New and noteworthy Fixed Issues core https://github-redirect.dependabot.com/pmd/pmd/issues/3427;>#3427: [core] Stop printing CLI usage text when exiting due to invalid parameters https://github-redirect.dependabot.com/pmd/pmd/issues/3768;>#3768: [core] SARIF formatter reports multiple locations when it should report multiple results doc https://github-redirect.dependabot.com/pmd/pmd/issues/2502;>#2502: [doc] Add floating table-of-contents (toc) on the right https://github-redirect.dependabot.com/pmd/pmd/pull/3807;>#3807: [doc] Document Ant Task parameter threads java https://github-redirect.dependabot.com/pmd/pmd/issues/3697;>#3698: [java] Parsing error with try-with-resources and qualified resource java-bestpractices https://github-redirect.dependabot.com/pmd/pmd/issues/3605;>#3605: [java] SwitchStmtsShouldHaveDefault triggered when default case is present java-codestyle https://github-redirect.dependabot.com/pmd/pmd/issues/278;>#278: [java] ConfusingTernary should treat != null as positive condition java-performance https://github-redirect.dependabot.com/pmd/pmd/issues/3374;>#3374: [java] UseStringBufferForStringAppends: Wrong example in documentation misc https://github-redirect.dependabot.com/pmd/pmd/issues/3759;>#3759: [lang-test] Upgrade dokka maven plugin to 1.4.32 plsql https://github-redirect.dependabot.com/pmd/pmd/issues/3746;>#3746: [plsql] Parsing exception Less than or equal to/Greater than or equal to operators in DML statements API Changes Deprecated API Some API deprecations were performed in core PMD classes, to improve compatibility with PMD 7. Report: the constructor and other construction methods like addViolation or createReport RuleContext: all constructors, getters and setters. A new set of stable methods, matching those in PMD 7, was added to replace the addViolation ... (truncated) Commits https://github.com/pmd/pmd/commit/dd0ee6190b4e3a3f64a714ace0debd0a08e5070b;>dd0ee61 [maven-release-plugin] prepare release pmd_releases/6.43.0 https://github.com/pmd/pmd/commit/d9ce3057b89293e9f52fbb6f02913ee811e12357;>d9ce305 Prepare pmd release 6.43.0 https://github.com/pmd/pmd/commit/dd07a00f6a060cfe8edb4f7f63617ba1414598f1;>dd07a00 Merge pull request https://github-redirect.dependabot.com/pmd/pmd/issues/3807;>#3807 from adangel:doc-ant-threads https://github.com/pmd/pmd/commit/9a437b015a30f5ce4f09baef85e354666dd04224;>9a437b0 Merge pull request https://github-redirect.dependabot.com/pmd/pmd/issues/3788;>#3788 from https://github.com/pmd/pmd/commit/47901b75d299dd5e3bbf2bc37d0618b39d95094d;>47901b7 Merge pull request https://github-redirect.dependabot.com/pmd/pmd/issues/3805;>#3805 from oowekyala:issue3605-default-case https://github.com/pmd/pmd/commit/f36945572d0e82fdf8b50d77d65d82cd94c65f3c;>f369455 Add https://github.com/karel1980;>@karel1980 as a contributor https://github.com/pmd/pmd/commit/71f4fe7243370d2b36135c746d3076c1aa621bda;>71f4fe7 [doc] Update release notes (https://github-redirect.dependabot.com/pmd/pmd/issues/3605;>#3605 https://github-redirect.dependabot.com/pmd/pmd/issues/3805;>#3805) https://github.com/pmd/pmd/commit/74516235dda0aac53c9a1d53b8804500d8614a63;>7451623 [doc] Update release notes (https://github-redirect.dependabot.com/pmd/pmd/issues/3807;>#3807) [skip ci] https://github.com/pmd/pmd/commit/73940e2672b9117c5e9b719a5ccb6c1415366748;>73940e2 [doc] Document Ant Task parameter threads https://github.com/pmd/pmd/commit/36134edda20e5685cff76e92309c80e8ee0e9f90;>36134ed Merge pull request https://github-redirect.dependabot.com/pmd/pmd/issues/3804;>#3804 from JerritEic:issue2502-Add-floating-table-of-contents Additional commits viewable in
[GitHub] [commons-bsf] dependabot[bot] opened a new pull request #38: Bump spotbugs from 4.2.0 to 4.6.0
dependabot[bot] opened a new pull request #38: URL: https://github.com/apache/commons-bsf/pull/38 Bumps [spotbugs](https://github.com/spotbugs/spotbugs) from 4.2.0 to 4.6.0. Release notes Sourced from https://github.com/spotbugs/spotbugs/releases;>spotbugs's releases. SpotBugs 4.6.0 CHANGELOG Fixed Fixed spotbugs build with ecj compiler (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/1903;>#1903) https://github.com/iloveeclipse;>@iloveeclipse Moved tests from spotbugs project to spotbugs-tests project (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/1914;>#1914) https://github.com/iloveeclipse;>@iloveeclipse Fixed UI freezes in Eclipse on bug count decorations update (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/285;>#285) https://github.com/iloveeclipse;>@iloveeclipse Bumped log4j from 2.17.1 to 2.17.2 (https://github-redirect.dependabot.com/spotbugs/spotbugs/pull/1960;>#1960) Bumped gson from 2.8.9 to 2.9.0 (https://github-redirect.dependabot.com/spotbugs/spotbugs/pull/1966;>#1960) Added New detector FindInstanceLockOnSharedStaticData for new bug type SSD_DO_NOT_USE_INSTANCE_LOCK_ON_SHARED_STATIC_DATA. This detector reports a bug if an instance level lock is used to modify a shared static data. (See https://wiki.sei.cmu.edu/confluence/display/java/LCK06-J.+Do+not+use+an+instance+lock+to+protect+shared+static+data;>SEI CERT rule LCK06-J) https://github.com/gonczmisi;>@gonczmisi CHECKSUM file checksum (sha256) spotbugs-4.6.0-javadoc.jar f38dba26a1e419483b19c3acc35962347a6e5c3d6793729e84a637cef1423c1a spotbugs-4.6.0-sources.jar 6926fee89be85021a3a58cc8f08c5f706f3696c151dcee38dbaf674b6fa7f357 spotbugs-4.6.0.tgz d357a5920bba4e7964d834de88fe64892ed02b5e1d4f61b8afb5187e4e4cdd04 spotbugs-4.6.0.zip 8486f721d80e62c300fd2db5076badac3d969b596904c23f429c922a03041ac0 spotbugs-annotations-4.6.0-javadoc.jar d001876f444fb41f946218571f6935b008578cdc560d75691951b682578f260c spotbugs-annotations-4.6.0-sources.jar b338136e3e82d585348cde58a8fe3a678e16f51a35c31c1463e05fefef557aad spotbugs-annotations.jar b7021b4ecbafd9b321bdf06eef2ec4519526e2b39fb7d080f2964308f017435e spotbugs-ant-4.6.0-javadoc.jar 4d092495bee2eede65dbac444e72a89396dbc78beea15ae588d1d37e853c4cab spotbugs-ant-4.6.0-sources.jar ce7cfbed848ccb0e3765cec6b9c60c458699aa51f60ad9216cf89dbf38d8d793 spotbugs-ant.jar b866a2a89a03b49e60b5f27e0f5987eb8c12c2d2aefc6e9ddcbcdae345c765db spotbugs.jar 0c05d399522d4de7630a935eb24b2fef75cabf1867527abffbcd319a94804b5f test-harness-4.6.0-javadoc.jar e5c5e087a6ae7dd919026dc1dc88e720ce239f73b125e150c15e70a78126574f test-harness-4.6.0-sources.jar 2c1f5ef929453f3b682c7eb7c1e22db3082b5f74c5a5be439be5dc31dd7a31aa test-harness-4.6.0.jar 45ca0e944ee5704318d79f67815cde7ca5f7fb22814e325d00e2d25d9b552659 test-harness-core-4.6.0-javadoc.jar 1e6bdfb261bbb17674d4ac94576cb3fb561b207d9b615fdcb575e6c565a03f09 test-harness-core-4.6.0-sources.jar f320f5eb4069e9686b760b2a6a0760989753225f9e9ce1226e3258ec64795d8a test-harness-core-4.6.0.jar fd1a0c06a5eaff50ed0953d42fb7d69a41031c6a6630ad5e47c38a9f0eaca285 test-harness-jupiter-4.6.0-javadoc.jar 1a0f4bb21a3a2cf100b8b5d6ec6ccf6e54eef2d174e00cc34d54cf7f86d45640 test-harness-jupiter-4.6.0-sources.jar 210353a57016e26b1a654d936a15f039613fa1ac532d485c1b1d03902f6c6315 test-harness-jupiter-4.6.0.jar 18095fec31b85981ecaafdef86ca9ae1e9588e1b9bc6d209f82829cf9d0c13f4 SpotBugs 4.5.3 CHANGELOG Security Bumped log4j from 2.16.0 to 2.17.1 to address https://nvd.nist.gov/vuln/detail/CVE-2021-45105;>CVE-2021-45105 and https://nvd.nist.gov/vuln/detail/CVE-2021-44832;>CVE-2021-44832 (https://github-redirect.dependabot.com/spotbugs/spotbugs/pull/1885;>#1885, https://github-redirect.dependabot.com/spotbugs/spotbugs/pull/1897;>#1897) Fixed Remove duplicated logging frameworks from the Eclipse plugin distribution (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/1868;>#1868) https://github.com/KengoTODA;>@KengoTODA Corrected class name validation to no longer fail for Kotlin classes on class path containing special characters. (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/1883;>#1883) https://github.com/studro;>@studro CHECKSUM file checksum (sha256) spotbugs-4.5.3-javadoc.jar c5762e13d996117c5ae94675f6ab835d515c90a8cce7d10438bb99d004e0005a ... (truncated) Changelog Sourced from https://github.com/spotbugs/spotbugs/blob/master/CHANGELOG.md;>spotbugs's changelog. 4.6.0 - 2022-03-08 Fixed Fixed spotbugs build with
[GitHub] [commons-bsf] dependabot[bot] commented on pull request #35: Bump spotbugs from 4.2.0 to 4.5.3
dependabot[bot] commented on pull request #35: URL: https://github.com/apache/commons-bsf/pull/35#issuecomment-1065016310 Superseded by #38. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-bsf] dependabot[bot] closed pull request #35: Bump spotbugs from 4.2.0 to 4.5.3
dependabot[bot] closed pull request #35: URL: https://github.com/apache/commons-bsf/pull/35 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[jira] [Commented] (DAEMON-439) prunsrv '--Startup=delayed' sets manual mode instead
[ https://issues.apache.org/jira/browse/DAEMON-439?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17504816#comment-17504816 ] Gregory Kotsaftis commented on DAEMON-439: -- Thnx! Waiting for the new binary release! For now i use this trick after my installation cmd: {color:#de350b}sc config "MyServer" start= delayed-auto{color} > prunsrv '--Startup=delayed' sets manual mode instead > > > Key: DAEMON-439 > URL: https://issues.apache.org/jira/browse/DAEMON-439 > Project: Commons Daemon > Issue Type: Bug > Components: prunsrv >Affects Versions: 1.2.4 >Reporter: Gregory Kotsaftis >Priority: Minor > Fix For: 1.3.0 > > > Trying to replace AUTO for DELAYED in my long used custom service > installation script, defaults to MANUAL. It seems auto and manual are set as > expected but delayed is never set! > c:\prunsrv.exe //IS//MyServer --DisplayName="My Server" --Description="My > application server" --Install="c:\prunsrv.exe" --Startup=delayed > --StartMode=exe --StartImage="c:\app\myexe.exe" --StartPath="c:\app" > --StartParams=start --StopMode=exe --StopImage="c:\app\myexe.exe" > --StopPath="c:\app" --StopParams=stop --LogPath="c:\app" --LogPrefix=myserver > --LogLevel=info --StdOutput=auto --StdError=auto -- This message was sent by Atlassian Jira (v8.20.1#820001)
[GitHub] [commons-dbutils] dependabot[bot] commented on pull request #101: Bump spotbugs from 4.2.3 to 4.5.3
dependabot[bot] commented on pull request #101: URL: https://github.com/apache/commons-dbutils/pull/101#issuecomment-1064915907 Superseded by #108. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-dbutils] dependabot[bot] closed pull request #101: Bump spotbugs from 4.2.3 to 4.5.3
dependabot[bot] closed pull request #101: URL: https://github.com/apache/commons-dbutils/pull/101 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[GitHub] [commons-dbutils] dependabot[bot] opened a new pull request #108: Bump spotbugs from 4.2.3 to 4.6.0
dependabot[bot] opened a new pull request #108: URL: https://github.com/apache/commons-dbutils/pull/108 Bumps [spotbugs](https://github.com/spotbugs/spotbugs) from 4.2.3 to 4.6.0. Release notes Sourced from https://github.com/spotbugs/spotbugs/releases;>spotbugs's releases. SpotBugs 4.6.0 CHANGELOG Fixed Fixed spotbugs build with ecj compiler (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/1903;>#1903) https://github.com/iloveeclipse;>@iloveeclipse Moved tests from spotbugs project to spotbugs-tests project (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/1914;>#1914) https://github.com/iloveeclipse;>@iloveeclipse Fixed UI freezes in Eclipse on bug count decorations update (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/285;>#285) https://github.com/iloveeclipse;>@iloveeclipse Bumped log4j from 2.17.1 to 2.17.2 (https://github-redirect.dependabot.com/spotbugs/spotbugs/pull/1960;>#1960) Bumped gson from 2.8.9 to 2.9.0 (https://github-redirect.dependabot.com/spotbugs/spotbugs/pull/1966;>#1960) Added New detector FindInstanceLockOnSharedStaticData for new bug type SSD_DO_NOT_USE_INSTANCE_LOCK_ON_SHARED_STATIC_DATA. This detector reports a bug if an instance level lock is used to modify a shared static data. (See https://wiki.sei.cmu.edu/confluence/display/java/LCK06-J.+Do+not+use+an+instance+lock+to+protect+shared+static+data;>SEI CERT rule LCK06-J) https://github.com/gonczmisi;>@gonczmisi CHECKSUM file checksum (sha256) spotbugs-4.6.0-javadoc.jar f38dba26a1e419483b19c3acc35962347a6e5c3d6793729e84a637cef1423c1a spotbugs-4.6.0-sources.jar 6926fee89be85021a3a58cc8f08c5f706f3696c151dcee38dbaf674b6fa7f357 spotbugs-4.6.0.tgz d357a5920bba4e7964d834de88fe64892ed02b5e1d4f61b8afb5187e4e4cdd04 spotbugs-4.6.0.zip 8486f721d80e62c300fd2db5076badac3d969b596904c23f429c922a03041ac0 spotbugs-annotations-4.6.0-javadoc.jar d001876f444fb41f946218571f6935b008578cdc560d75691951b682578f260c spotbugs-annotations-4.6.0-sources.jar b338136e3e82d585348cde58a8fe3a678e16f51a35c31c1463e05fefef557aad spotbugs-annotations.jar b7021b4ecbafd9b321bdf06eef2ec4519526e2b39fb7d080f2964308f017435e spotbugs-ant-4.6.0-javadoc.jar 4d092495bee2eede65dbac444e72a89396dbc78beea15ae588d1d37e853c4cab spotbugs-ant-4.6.0-sources.jar ce7cfbed848ccb0e3765cec6b9c60c458699aa51f60ad9216cf89dbf38d8d793 spotbugs-ant.jar b866a2a89a03b49e60b5f27e0f5987eb8c12c2d2aefc6e9ddcbcdae345c765db spotbugs.jar 0c05d399522d4de7630a935eb24b2fef75cabf1867527abffbcd319a94804b5f test-harness-4.6.0-javadoc.jar e5c5e087a6ae7dd919026dc1dc88e720ce239f73b125e150c15e70a78126574f test-harness-4.6.0-sources.jar 2c1f5ef929453f3b682c7eb7c1e22db3082b5f74c5a5be439be5dc31dd7a31aa test-harness-4.6.0.jar 45ca0e944ee5704318d79f67815cde7ca5f7fb22814e325d00e2d25d9b552659 test-harness-core-4.6.0-javadoc.jar 1e6bdfb261bbb17674d4ac94576cb3fb561b207d9b615fdcb575e6c565a03f09 test-harness-core-4.6.0-sources.jar f320f5eb4069e9686b760b2a6a0760989753225f9e9ce1226e3258ec64795d8a test-harness-core-4.6.0.jar fd1a0c06a5eaff50ed0953d42fb7d69a41031c6a6630ad5e47c38a9f0eaca285 test-harness-jupiter-4.6.0-javadoc.jar 1a0f4bb21a3a2cf100b8b5d6ec6ccf6e54eef2d174e00cc34d54cf7f86d45640 test-harness-jupiter-4.6.0-sources.jar 210353a57016e26b1a654d936a15f039613fa1ac532d485c1b1d03902f6c6315 test-harness-jupiter-4.6.0.jar 18095fec31b85981ecaafdef86ca9ae1e9588e1b9bc6d209f82829cf9d0c13f4 SpotBugs 4.5.3 CHANGELOG Security Bumped log4j from 2.16.0 to 2.17.1 to address https://nvd.nist.gov/vuln/detail/CVE-2021-45105;>CVE-2021-45105 and https://nvd.nist.gov/vuln/detail/CVE-2021-44832;>CVE-2021-44832 (https://github-redirect.dependabot.com/spotbugs/spotbugs/pull/1885;>#1885, https://github-redirect.dependabot.com/spotbugs/spotbugs/pull/1897;>#1897) Fixed Remove duplicated logging frameworks from the Eclipse plugin distribution (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/1868;>#1868) https://github.com/KengoTODA;>@KengoTODA Corrected class name validation to no longer fail for Kotlin classes on class path containing special characters. (https://github-redirect.dependabot.com/spotbugs/spotbugs/issues/1883;>#1883) https://github.com/studro;>@studro CHECKSUM file checksum (sha256) spotbugs-4.5.3-javadoc.jar c5762e13d996117c5ae94675f6ab835d515c90a8cce7d10438bb99d004e0005a ... (truncated) Changelog Sourced from https://github.com/spotbugs/spotbugs/blob/master/CHANGELOG.md;>spotbugs's changelog. 4.6.0 - 2022-03-08 Fixed Fixed spotbugs
[jira] [Commented] (CSV-143) CSVPrinter ill-suited in multithreaded environment
[ https://issues.apache.org/jira/browse/CSV-143?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17504784#comment-17504784 ] Andras Sereny commented on CSV-143: --- Thanks a lot for the fix Gary. Really sorry about it, but I have no way to run that use case anymore. > CSVPrinter ill-suited in multithreaded environment > -- > > Key: CSV-143 > URL: https://issues.apache.org/jira/browse/CSV-143 > Project: Commons CSV > Issue Type: Improvement >Affects Versions: 1.0 >Reporter: Andras Sereny >Priority: Major > Fix For: 1.10.0 > > > CSVPrinter doesn't support multiple threads writing to the same appendable. > The class itself is not thread safe and, what's worse, it also invalidates > any thread-safety guarantees provided by the underlying appendable, as in one > CSVPrinter.print method there are multiple calls to out.append. > OpenCSV does better here: in CSVWriter.writeNext there is one single call to > PrintWriter.writer, thus it conveniently propagates PrintWriter thread-safety. -- This message was sent by Atlassian Jira (v8.20.1#820001)