Re: No more dependabot

2020-09-15 Thread Jochen Wiedmann
On Mon, Sep 14, 2020 at 2:48 PM Gary Gregory  wrote:

> - Jochen: What you do with your inbox is your business ;-)  What is
> the happy compromise here? Do you want a separate email list? Zero
> Dependabot emails anywhere? If you feel strongly about this, please
> create a [POLL] thread for what you propose. My view is that at
> minimum Dependabot should still be enabled; I don't really care about
> the emails one way or another.

I don't need a compromise. Just wanted to trigger a discussion.

Jochen

-- 

Look, that's why there's rules, understand? So that you think before
you break 'em.

-- (Terry Pratchett, Thief of Time)

-
To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
For additional commands, e-mail: dev-h...@commons.apache.org



Release Announcement: General Availability of Java 15 / JDK 15

2020-09-15 Thread Rory O'Donnell

Hi Benedikt,

**Release Announcement: General Availability of Java 15 / JDK 15 [1]
**

 * JDK 15, the reference implementation of Java 15, is now Generally
   Available.
 * GPL-licensed OpenJDK builds from Oracle are available here:
   http://jdk.java.net/15/
 * JDK 15 Release notes
   

JDK 15 includes fourteen features [2]:

 * JEP 339: Edwards-Curve Digital Signature Algorithm (EdDSA)
   
 * JEP 360: Sealed Classes (Preview) 
 * JEP 371: Hidden Classes 
 * JEP 372: Remove the Nashorn JavaScript Engine
   
 * JEP 373: Reimplement the Legacy DatagramSocket API
   
 * JEP 374: Disable and Deprecate Biased Locking
   
 * JEP 375: Pattern Matching for instanceof (Second Preview)
   
 * JEP 377: ZGC: A Scalable Low-Latency Garbage Collector
   
 * JEP 378: Text Blocks 
 * JEP 379: Shenandoah: A Low-Pause-Time Garbage Collector
   
 * JEP 381: Remove the Solaris and SPARC Ports
   
 * JEP 383: Foreign-Memory Access API (Second Incubator)
   
 * JEP 384: Records (Second Preview) 
 * JEP 385: Deprecate RMI Activation for Removal
   

Thanks to everyone who contributed to JDK 15, whether by creating 
features or enhancements, logging  bugs, or downloading and testing the 
early-access builds.


OpenJDK 16 Early Access build 15**is now available at http://jdk.java.net/16

 * JEPs integrated to JDK 16:
 o JEP 347: Enable C++14 Language Features
   
 o JEP 357: Migrate from Mercurial to Git
   
 o JEP 369: Migrate to GitHub 

 * Release Notes are available at http://jdk.java.net/16/release-notes

**

 * Significant changes since the last availability email:
 o Build 15
 + JDK-8244090: public lookup should find public members of
   public exported types (Reported by Eclipse Jetty)
 + JDK-8250968: Symlinks attributes not preserved when using
   jarsigner on zip files
 o Build 14
 + JDK-8189744: Deprecate the JDK-specific API for setting
   socket options, jdk.net.Sockets
 + JDK-8241003: Deprecate "denigrated" java.security.cert APIs
   that represent DNs as Principal or String objects
 + JDK-8245462: The default HttpClient implementation returns
   cancelable futures


*__*
Rgds,Rory


[1] 
https://mail.openjdk.java.net/pipermail/jdk-dev/2020-September/004733.html

[2] https://openjdk.java.net/projects/jdk/15/
--

Rgds, Rory O'Donnell
Quality Engineering Manager
Oracle EMEA, Dublin, Ireland



Re: [VFS][NET] Failures when updating VFS from Net 3.6 to 3.7

2020-09-15 Thread Gary Gregory
Is anyone available to help?

Gary

On Sat, Sep 12, 2020 at 3:53 PM Gary Gregory  wrote:
>
> The culprit commit seems to be 41e514cda5f68c444edc1058a18e2196b2c1d7d5.
> If I checkout the commit before that one, all is well with the FTPS
> tests in Commons VFS master.
> The fundamental problem is that there is not a single test for the
> class FTPSClient, so all commits against that class are "blind".
>
> Gary
> 
> commit 41e514cda5f68c444edc1058a18e2196b2c1d7d5
> Author: sebbASF  2020-06-19 19:19:44
> Committer: GitHub  2020-06-19 19:19:44
> Parent: c72538bbc6ed5e43d53b386e04f1c88f2bef9bec (Merge pull request
> #45 from yddgit/master)
> Parent: ab45bdb289e3929d71501008099c0e890653d7ab (Adding null check in
> ssl socket creation)
> Child: 78eb940af1d240192205701ece183783eeb09bc9 (Merge pull request
> #28 from fbrissi/trunk)
> Branches: master,
> origin/dependabot/github_actions/actions/checkout-v2.3.1,
> origin/dependabot/github_actions/actions/checkout-v2.3.2,
> origin/dependabot/github_actions/actions/setup-java-v1.4.1,
> origin/dependabot/github_actions/actions/setup-java-v1.4.2,
> origin/dependabot/maven/junit-junit-4.13,
> origin/dependabot/maven/org.apache.commons-commons-parent-52,
> origin/dependabot/maven/org.codehaus.mojo-exec-maven-plugin-3.0.0,
> origin/master, origin/NET_3_7
>
> Merge pull request #3 from drmaas/trunk
>
> Open data transfers sessions in ftps client with an ssl socket
> 
> Gary
>
> On Fri, Sep 11, 2020 at 9:46 AM Gary Gregory  wrote:
> >
> > Hi All:
> >
> > Updating Commons VFS from Commons Net 3.6 to 3.7 causes failures. Please 
> > see:
> >
> > https://github.com/apache/commons-vfs/pull/128
> >
> > For example:
> >
> > https://github.com/apache/commons-vfs/pull/128/checks?check_run_id=1100197771
> >
> > Any thoughts?
> >
> > Tests in error:
> > 695 
> > AbstractFtpsProviderTestCase$FtpProviderTestSuite>AbstractTestSuite.run:134->AbstractTestSuite.lambda$run$0:129->setUp:153->AbstractTestSuite.setUp:168
> > » FileSystem
> > 696 
> > AbstractFtpsProviderTestCase$FtpProviderTestSuite>AbstractTestSuite.run:134->AbstractTestSuite.lambda$run$0:129->setUp:153->AbstractTestSuite.setUp:163
> > » FileSystem
> >
> > at 
> > org.apache.commons.vfs2.provider.ftp.FtpFileObject.getChildFile(FtpFileObject.java:100)
> > 519 at 
> > org.apache.commons.vfs2.provider.ftp.FtpFileObject.getInfo(FtpFileObject.java:164)
> > 520 at 
> > org.apache.commons.vfs2.provider.ftp.FtpFileObject.doGetType(FtpFileObject.java:254)
> > 521 at 
> > org.apache.commons.vfs2.provider.AbstractFileObject.getType(AbstractFileObject.java:1378)
> > 522 ... 14 more
> > 523 Suppressed: java.net.SocketException: Broken pipe (Write failed)
> > 524 at java.net.SocketOutputStream.socketWrite0(Native Method)
> > 525 at java.net.SocketOutputStream.socketWrite(SocketOutputStream.java:111)
> > 526 at java.net.SocketOutputStream.write(SocketOutputStream.java:155)
> > 527 at 
> > sun.security.ssl.SSLSocketOutputRecord.encodeAlert(SSLSocketOutputRecord.java:81)
> > 528 at sun.security.ssl.TransportContext.fatal(TransportContext.java:355)
> > 529 at sun.security.ssl.TransportContext.fatal(TransportContext.java:267)
> > 530 at sun.security.ssl.TransportContext.fatal(TransportContext.java:262)
> > 531 at sun.security.ssl.SSLTransport.decode(SSLTransport.java:142)
> > 532 ... 30 more
> >
> > Gary

-
To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
For additional commands, e-mail: dev-h...@commons.apache.org