[GitHub] [commons-imaging] kinow merged pull request #270: Fix unit test

2023-01-16 Thread GitBox


kinow merged PR #270:
URL: https://github.com/apache/commons-imaging/pull/270


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[GitHub] [commons-imaging] codecov-commenter commented on pull request #270: Fix unit test

2023-01-16 Thread GitBox


codecov-commenter commented on PR #270:
URL: https://github.com/apache/commons-imaging/pull/270#issuecomment-1384546615

   # 
[Codecov](https://codecov.io/gh/apache/commons-imaging/pull/270?src=pr=h1_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation)
 Report
   > Merging 
[#270](https://codecov.io/gh/apache/commons-imaging/pull/270?src=pr=desc_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation)
 (4d1d64b) into 
[master](https://codecov.io/gh/apache/commons-imaging/commit/72a9ccf52c81e7bb34cad09dc52160c03646fb04?el=desc_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation)
 (72a9ccf) will **not change** coverage.
   > The diff coverage is `n/a`.
   
   ```diff
   @@Coverage Diff@@
   ## master #270   +/-   ##
   =
 Coverage 70.76%   70.76%   
 Complexity 3368 3368   
   =
 Files   332  332   
 Lines 1693616936   
 Branches   2652 2652   
   =
 Hits  1198511985   
 Misses 3904 3904   
 Partials   1047 1047   
   ```
   
   
   
   :mega: We’re building smart automated test selection to slash your CI/CD 
build times. [Learn 
more](https://about.codecov.io/iterative-testing/?utm_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation)
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[GitHub] [commons-imaging] kpouer opened a new pull request, #270: Fix unit test

2023-01-16 Thread GitBox


kpouer opened a new pull request, #270:
URL: https://github.com/apache/commons-imaging/pull/270

   Fix two unit tests that were broken.
   PixelDensityRoundtrip was now writing data in a byte array instead of a tmp 
file, but was trying to read the tmp file anyway.
   
   And
   
   PngWriteForceTrueColorText that was writing a png into a file named .gif, 
but was unable to read it because the extension was checked and refused by png 
parser.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[jira] [Commented] (IMAGING-343) Apache Commons Imaging 0.97 - CVE-2018-17202

2023-01-16 Thread Gary D. Gregory (Jira)


[ 
https://issues.apache.org/jira/browse/IMAGING-343?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17677506#comment-17677506
 ] 

Gary D. Gregory commented on IMAGING-343:
-

0.97-incubator users should upgrade to commons-imaging-1.0-alpha1


> Apache Commons Imaging 0.97 - CVE-2018-17202
> 
>
> Key: IMAGING-343
> URL: https://issues.apache.org/jira/browse/IMAGING-343
> Project: Commons Imaging
>  Issue Type: Bug
>Affects Versions: 0.97
>Reporter: Nikhil
>Priority: Major
>
> Certain input files could make the code to enter into an infinite loop when 
> Apache Sanselan 0.97-incubator was used to parse them, which could be used in 
> a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache 
> Commons Imaging.
>  
> See [https://nvd.nist.gov/vuln/detail/CVE-2018-17202] for more details.
>  
> There is Apache Commons Imaging 1.0-{*}alpha3{*} version available.. but we 
> are trying to understand if a new *GA* will be made available and also to see 
> if this specific CVE is addressed in the latest versions ?
>  
> Please help



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (IMAGING-343) Apache Commons Imaging 0.97 - CVE-2018-17202

2023-01-16 Thread Gary D. Gregory (Jira)


 [ 
https://issues.apache.org/jira/browse/IMAGING-343?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Gary D. Gregory resolved IMAGING-343.
-
Fix Version/s: 1.0-alpha1
   Resolution: Fixed

> Apache Commons Imaging 0.97 - CVE-2018-17202
> 
>
> Key: IMAGING-343
> URL: https://issues.apache.org/jira/browse/IMAGING-343
> Project: Commons Imaging
>  Issue Type: Bug
>Affects Versions: 0.97
>Reporter: Nikhil
>Priority: Major
> Fix For: 1.0-alpha1
>
>
> Certain input files could make the code to enter into an infinite loop when 
> Apache Sanselan 0.97-incubator was used to parse them, which could be used in 
> a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache 
> Commons Imaging.
>  
> See [https://nvd.nist.gov/vuln/detail/CVE-2018-17202] for more details.
>  
> There is Apache Commons Imaging 1.0-{*}alpha3{*} version available.. but we 
> are trying to understand if a new *GA* will be made available and also to see 
> if this specific CVE is addressed in the latest versions ?
>  
> Please help



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Comment Edited] (IMAGING-343) Apache Commons Imaging 0.97 - CVE-2018-17202

2023-01-16 Thread Gary D. Gregory (Jira)


[ 
https://issues.apache.org/jira/browse/IMAGING-343?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17677506#comment-17677506
 ] 

Gary D. Gregory edited comment on IMAGING-343 at 1/16/23 8:33 PM:
--

0.97-incubator users should upgrade to commons-imaging-1.0-alpha1 or later.



was (Author: garydgregory):
0.97-incubator users should upgrade to commons-imaging-1.0-alpha1


> Apache Commons Imaging 0.97 - CVE-2018-17202
> 
>
> Key: IMAGING-343
> URL: https://issues.apache.org/jira/browse/IMAGING-343
> Project: Commons Imaging
>  Issue Type: Bug
>Affects Versions: 0.97
>Reporter: Nikhil
>Priority: Major
>
> Certain input files could make the code to enter into an infinite loop when 
> Apache Sanselan 0.97-incubator was used to parse them, which could be used in 
> a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache 
> Commons Imaging.
>  
> See [https://nvd.nist.gov/vuln/detail/CVE-2018-17202] for more details.
>  
> There is Apache Commons Imaging 1.0-{*}alpha3{*} version available.. but we 
> are trying to understand if a new *GA* will be made available and also to see 
> if this specific CVE is addressed in the latest versions ?
>  
> Please help



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Comment Edited] (FILEUPLOAD-309) Release version 2.0.0

2023-01-16 Thread Steve Lopez (Jira)


[ 
https://issues.apache.org/jira/browse/FILEUPLOAD-309?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17677499#comment-17677499
 ] 

Steve Lopez edited comment on FILEUPLOAD-309 at 1/16/23 7:40 PM:
-

Thank you Jochen for the  reply.   I went ahead and just refactored our code to 
use Servlet 3.1 spec and remove the need for this.

As a an observation it seems like there aren’t standards for how OS projected 
are handling this Jakarta thing.  Another library we use added a 
jakarta tag to their existing version whereas another 
just bumped the major version up to 2.0 (which is what I mistakenly thought the 
Apache commons library did as well)


was (Author: steve.rc):
Thank you Jochen for the  replay.   I went ahead and just refactored our code 
to use Servlet 3.1 spec and remove the need for this.

As a an observation it seems like there aren’t standards for how OS projected 
are handling this Jakarta thing.  Another library we use added a 
jakarta tag to their existing version whereas another 
just bumped the major version up to 2.0 (which is what I mistakenly thought the 
Apache commons library did as well)

> Release version 2.0.0
> -
>
> Key: FILEUPLOAD-309
> URL: https://issues.apache.org/jira/browse/FILEUPLOAD-309
> Project: Commons FileUpload
>  Issue Type: Wish
>Reporter: Thiago Henrique Hupner
>Priority: Major
>
> At Piranha, we've migrated to use the new Jakarta namespace.
> One of our dependencies is the Commons File Upload, but the latest version 
> available is 1.4.
> Looking around at the source code, I've found that the code is already 
> prepared for the new Jakarta namespace.
> So, I want to know if there's a plan to release a new version soon. Or at 
> least a 2.0.0 milestone.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (FILEUPLOAD-309) Release version 2.0.0

2023-01-16 Thread Steve Lopez (Jira)


[ 
https://issues.apache.org/jira/browse/FILEUPLOAD-309?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17677499#comment-17677499
 ] 

Steve Lopez commented on FILEUPLOAD-309:


Thank you Jochen for the  replay.   I went ahead and just refactored our code 
to use Servlet 3.1 spec and remove the need for this.

As a an observation it seems like there aren’t standards for how OS projected 
are handling this Jakarta thing.  Another library we use added a 
jakarta tag to their existing version whereas another 
just bumped the major version up to 2.0 (which is what I mistakenly thought the 
Apache commons library did as well)

> Release version 2.0.0
> -
>
> Key: FILEUPLOAD-309
> URL: https://issues.apache.org/jira/browse/FILEUPLOAD-309
> Project: Commons FileUpload
>  Issue Type: Wish
>Reporter: Thiago Henrique Hupner
>Priority: Major
>
> At Piranha, we've migrated to use the new Jakarta namespace.
> One of our dependencies is the Commons File Upload, but the latest version 
> available is 1.4.
> Looking around at the source code, I've found that the code is already 
> prepared for the new Jakarta namespace.
> So, I want to know if there's a plan to release a new version soon. Or at 
> least a 2.0.0 milestone.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[GitHub] [commons-release-plugin] garydgregory merged pull request #168: Bump maven.plugin.version from 3.7.0 to 3.7.1

2023-01-16 Thread GitBox


garydgregory merged PR #168:
URL: https://github.com/apache/commons-release-plugin/pull/168


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[GitHub] [commons-release-plugin] dependabot[bot] opened a new pull request, #168: Bump maven.plugin.version from 3.7.0 to 3.7.1

2023-01-16 Thread GitBox


dependabot[bot] opened a new pull request, #168:
URL: https://github.com/apache/commons-release-plugin/pull/168

   Bumps `maven.plugin.version` from 3.7.0 to 3.7.1.
   Updates `maven-plugin-annotations` from 3.7.0 to 3.7.1
   
   Release notes
   Sourced from https://github.com/apache/maven-plugin-tools/releases;>maven-plugin-annotations's
 releases.
   
   3.7.1
   
   
   
   
   Commits
   
   https://github.com/apache/maven-plugin-tools/commit/52afb9ff7129912a1ff2d02c42487dc3a33f8364;>52afb9f
 [maven-release-plugin] prepare release maven-plugin-tools-3.7.1
   https://github.com/apache/maven-plugin-tools/commit/73065a1ba216235150b832edad4b43ad3207e3ce;>73065a1
 Set version to 3.7.1-SNAPSHOT
   https://github.com/apache/maven-plugin-tools/commit/17aabccca1590f01925db9f63f04a67bd0a4c2f1;>17aabcc
 [MPLUGIN-452] Maven scope and module name logs at wrong level (https://github-redirect.dependabot.com/apache/maven-plugin-tools/issues/190;>#190)
   See full diff in https://github.com/apache/maven-plugin-tools/compare/maven-plugin-tools-3.7.0...maven-plugin-tools-3.7.1;>compare
 view
   
   
   
   
   Updates `maven-plugin-tools-ant` from 3.7.0 to 3.7.1
   
   Updates `maven-plugin-plugin` from 3.7.0 to 3.7.1
   
   Release notes
   Sourced from https://github.com/apache/maven-plugin-tools/releases;>maven-plugin-plugin's
 releases.
   
   3.7.1
   
   
   
   
   Commits
   
   https://github.com/apache/maven-plugin-tools/commit/52afb9ff7129912a1ff2d02c42487dc3a33f8364;>52afb9f
 [maven-release-plugin] prepare release maven-plugin-tools-3.7.1
   https://github.com/apache/maven-plugin-tools/commit/73065a1ba216235150b832edad4b43ad3207e3ce;>73065a1
 Set version to 3.7.1-SNAPSHOT
   https://github.com/apache/maven-plugin-tools/commit/17aabccca1590f01925db9f63f04a67bd0a4c2f1;>17aabcc
 [MPLUGIN-452] Maven scope and module name logs at wrong level (https://github-redirect.dependabot.com/apache/maven-plugin-tools/issues/190;>#190)
   See full diff in https://github.com/apache/maven-plugin-tools/compare/maven-plugin-tools-3.7.0...maven-plugin-tools-3.7.1;>compare
 view
   
   
   
   
   
   Dependabot will resolve any conflicts with this PR as long as you don't 
alter it yourself. You can also trigger a rebase manually by commenting 
`@dependabot rebase`.
   
   [//]: # (dependabot-automerge-start)
   [//]: # (dependabot-automerge-end)
   
   ---
   
   
   Dependabot commands and options
   
   
   You can trigger Dependabot actions by commenting on this PR:
   - `@dependabot rebase` will rebase this PR
   - `@dependabot recreate` will recreate this PR, overwriting any edits that 
have been made to it
   - `@dependabot merge` will merge this PR after your CI passes on it
   - `@dependabot squash and merge` will squash and merge this PR after your CI 
passes on it
   - `@dependabot cancel merge` will cancel a previously requested merge and 
block automerging
   - `@dependabot reopen` will reopen this PR if it is closed
   - `@dependabot close` will close this PR and stop Dependabot recreating it. 
You can achieve the same result by closing it manually
   - `@dependabot ignore this major version` will close this PR and stop 
Dependabot creating any more for this major version (unless you reopen the PR 
or upgrade to it yourself)
   - `@dependabot ignore this minor version` will close this PR and stop 
Dependabot creating any more for this minor version (unless you reopen the PR 
or upgrade to it yourself)
   - `@dependabot ignore this dependency` will close this PR and stop 
Dependabot creating any more for this dependency (unless you reopen the PR or 
upgrade to it yourself)
   
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[GitHub] [commons-validator] garydgregory commented on pull request #29: Add Getters for IBANValidator's RegexValidator its patterns

2023-01-16 Thread GitBox


garydgregory commented on PR #29:
URL: https://github.com/apache/commons-validator/pull/29#issuecomment-1384317132

   @arnaudfnr 
   Done in git master, with a defensive copy of the pattern array.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[GitHub] [commons-validator] garydgregory closed pull request #29: Add Getters for IBANValidator's RegexValidator its patterns

2023-01-16 Thread GitBox


garydgregory closed pull request #29: Add Getters for IBANValidator's 
RegexValidator its patterns
URL: https://github.com/apache/commons-validator/pull/29


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[GitHub] [commons-validator] garydgregory closed pull request #115: add IBAN Validator for Djibouti DJ as listed in iban-registry.pdf ...

2023-01-16 Thread GitBox


garydgregory closed pull request #115: add IBAN Validator for Djibouti DJ as 
listed in iban-registry.pdf ...
URL: https://github.com/apache/commons-validator/pull/115


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[GitHub] [commons-validator] garydgregory commented on pull request #115: add IBAN Validator for Djibouti DJ as listed in iban-registry.pdf ...

2023-01-16 Thread GitBox


garydgregory commented on PR #115:
URL: 
https://github.com/apache/commons-validator/pull/115#issuecomment-1384298175

   Done in git master with another PR.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[jira] [Resolved] (VALIDATOR-486) the IBAN validator does not support all the IBAN supported countries

2023-01-16 Thread Gary D. Gregory (Jira)


 [ 
https://issues.apache.org/jira/browse/VALIDATOR-486?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Gary D. Gregory resolved VALIDATOR-486.
---
Fix Version/s: 1.8
   Resolution: Fixed

> the IBAN validator does not support all the IBAN supported countries
> 
>
> Key: VALIDATOR-486
> URL: https://issues.apache.org/jira/browse/VALIDATOR-486
> Project: Commons Validator
>  Issue Type: Bug
>Affects Versions: 1.7
>Reporter: Nicola Gioia
>Priority: Major
> Fix For: 1.8
>
>
> the list of supported countries for iban miss the following countries:
> |Burundi|BI|
> |Djibouti|DJ|
> |Libya|LY|
> |Russia|RU|
> |Sudan|SD|



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[GitHub] [commons-validator] garydgregory merged pull request #88: Adding new countries to IBAN list

2023-01-16 Thread GitBox


garydgregory merged PR #88:
URL: https://github.com/apache/commons-validator/pull/88


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[GitHub] [commons-validator] codecov-commenter commented on pull request #115: add IBAN Validator for Djibouti DJ as listed in iban-registry.pdf ...

2023-01-16 Thread GitBox


codecov-commenter commented on PR #115:
URL: 
https://github.com/apache/commons-validator/pull/115#issuecomment-1384292310

   # 
[Codecov](https://codecov.io/gh/apache/commons-validator/pull/115?src=pr=h1_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation)
 Report
   > Merging 
[#115](https://codecov.io/gh/apache/commons-validator/pull/115?src=pr=desc_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation)
 (10957a9) into 
[master](https://codecov.io/gh/apache/commons-validator/commit/012651d8f7956238011ebaa8c955acb9bbd2280d?el=desc_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation)
 (012651d) will **not change** coverage.
   > The diff coverage is `n/a`.
   
   ```diff
   @@Coverage Diff@@
   ## master #115   +/-   ##
   =
 Coverage 71.90%   71.90%   
 Complexity 1137 1137   
   =
 Files63   63   
 Lines  3157 3157   
 Branches542  542   
   =
 Hits   2270 2270   
 Misses  693  693   
 Partials194  194   
   ```
   
   
   | [Impacted 
Files](https://codecov.io/gh/apache/commons-validator/pull/115?src=pr=tree_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation)
 | Coverage Δ | |
   |---|---|---|
   | 
[...ache/commons/validator/routines/IBANValidator.java](https://codecov.io/gh/apache/commons-validator/pull/115?src=pr=tree_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation#diff-c3JjL21haW4vamF2YS9vcmcvYXBhY2hlL2NvbW1vbnMvdmFsaWRhdG9yL3JvdXRpbmVzL0lCQU5WYWxpZGF0b3IuamF2YQ==)
 | `80.48% <ø> (ø)` | |
   
   :mega: We’re building smart automated test selection to slash your CI/CD 
build times. [Learn 
more](https://about.codecov.io/iterative-testing/?utm_medium=referral_source=github_content=comment_campaign=pr+comments_term=The+Apache+Software+Foundation)
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[GitHub] [commons-validator] homebeaver opened a new pull request, #115: add IBAN Validator for Djibouti DJ as listed in iban-registry.pdf ...

2023-01-16 Thread GitBox


homebeaver opened a new pull request, #115:
URL: https://github.com/apache/commons-validator/pull/115

   ... Release 92 – May 2022
   
   see https://issues.apache.org/jira/browse/VALIDATOR-486
   
   Hi @garydgregory this is the validator for DJ
   
   regards EUGen


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[GitHub] [commons-validator] garydgregory commented on pull request #88: Adding new countries to IBAN list

2023-01-16 Thread GitBox


garydgregory commented on PR #88:
URL: https://github.com/apache/commons-validator/pull/88#issuecomment-1384288061

   @tatiana-scda 
   FYI, I resolved the conflict.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[jira] [Commented] (VALIDATOR-486) the IBAN validator does not support all the IBAN supported countries

2023-01-16 Thread Eugen Hanussek (Jira)


[ 
https://issues.apache.org/jira/browse/VALIDATOR-486?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17677458#comment-17677458
 ] 

Eugen Hanussek commented on VALIDATOR-486:
--

No, I'm not confused. This is my personal decision, because I am involved. 
Please respect it.

> the IBAN validator does not support all the IBAN supported countries
> 
>
> Key: VALIDATOR-486
> URL: https://issues.apache.org/jira/browse/VALIDATOR-486
> Project: Commons Validator
>  Issue Type: Bug
>Affects Versions: 1.7
>Reporter: Nicola Gioia
>Priority: Major
>
> the list of supported countries for iban miss the following countries:
> |Burundi|BI|
> |Djibouti|DJ|
> |Libya|LY|
> |Russia|RU|
> |Sudan|SD|



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (VALIDATOR-486) the IBAN validator does not support all the IBAN supported countries

2023-01-16 Thread Gary D. Gregory (Jira)


[ 
https://issues.apache.org/jira/browse/VALIDATOR-486?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17677451#comment-17677451
 ] 

Gary D. Gregory commented on VALIDATOR-486:
---

bq. By the way: what about the pull requests 
https://github.com/apache/commons-validator/pull/60 and 
https://github.com/apache/commons-validator/pull/61 ?

This ticket is about IBAN, let's not mix up topics

bq. Not for RU because of the sanctions!

You must be confused. Are you referring to a law that prevents this component 
from implementing ISO 13616?


> the IBAN validator does not support all the IBAN supported countries
> 
>
> Key: VALIDATOR-486
> URL: https://issues.apache.org/jira/browse/VALIDATOR-486
> Project: Commons Validator
>  Issue Type: Bug
>Affects Versions: 1.7
>Reporter: Nicola Gioia
>Priority: Major
>
> the list of supported countries for iban miss the following countries:
> |Burundi|BI|
> |Djibouti|DJ|
> |Libya|LY|
> |Russia|RU|
> |Sudan|SD|



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (VALIDATOR-486) the IBAN validator does not support all the IBAN supported countries

2023-01-16 Thread Eugen Hanussek (Jira)


[ 
https://issues.apache.org/jira/browse/VALIDATOR-486?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17677438#comment-17677438
 ] 

Eugen Hanussek commented on VALIDATOR-486:
--

Hi [~ggregory] - I will provide IBAN Validator for DJ.

In Release 92 – May 2022 of iban-registry.pdf DJ is listed.

Not for RU because of the sanctions!

By the way: what about the pull requests 
[https://github.com/apache/commons-validator/pull/60] and 
[https://github.com/apache/commons-validator/pull/61] ?

Regards EUGen

> the IBAN validator does not support all the IBAN supported countries
> 
>
> Key: VALIDATOR-486
> URL: https://issues.apache.org/jira/browse/VALIDATOR-486
> Project: Commons Validator
>  Issue Type: Bug
>Affects Versions: 1.7
>Reporter: Nicola Gioia
>Priority: Major
>
> the list of supported countries for iban miss the following countries:
> |Burundi|BI|
> |Djibouti|DJ|
> |Libya|LY|
> |Russia|RU|
> |Sudan|SD|



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] (FILEUPLOAD-309) Release version 2.0.0

2023-01-16 Thread Flying Wolf (Jira)


[ https://issues.apache.org/jira/browse/FILEUPLOAD-309 ]


Flying Wolf deleted comment on FILEUPLOAD-309:


was (Author: flyingwolf):
[~joc...@apache.org] 

The current big problem with FileUpload, where is issue is about, is this:

At 10 September 2019 the "Java Servlet" api was renamed to "Jakarta Servlet", 
starting from version 4.0.3.
At 9 October 2020, with the release of Jakarta Servlet 5.0, the API moved from 
package `javax.servlet` to `jakarta.servlet`.

This package change has big consequences when a project (such as Wicket) wants 
to update its old Servlet dependency to the new Jakarta Servlet 5.0 API package 
(jakarta.servlet), but the project (Wicket) also depends on a project 
(FileUpload) that is still using the old package (javax.servlet). This causes 
the project (Wicket) to be unable to update to a new Servlet version.

If Wicket would stick to the old Java Servlet version that FileUpload 
automatically and unknowingly is enforcing to projects since 9 October 2020, 
then this also causes other dependency problems for Wicket. For example, Spring 
Framework 6 also moved from Java Servlet to Jakarta Servlet. Because FileUpload 
is enforcing other projects to stay with the old Java Servlet spec, other 
projects (such as Wicket) won't be able to update to Spring Framework 6. This 
will become an ever bigger issue when Spring Framework 5 gets end-of-life in 
2024. Then projects are forced to use outdated insecure Spring version, or they 
have to fully drop the usage of FileUpload.

So FileUpload is enforcing projects to use an old Servlet spec, which causes 
major problems for these projects to be able to update important dependencies 
(Jakarta Servlet and Spring Framework).
Whereas the solution in FileUpload to solve this big problem, is really simple: 
FileUpload only needs to update it dependency (javax.servlet:servlet-api:2.4 
provided dependency) to a Jakarta Servlet depedency (for example 
jakarta.servlet:jakarta.servlet-api:6.0.0). Which means changing some simple 
import statements from "javax.servlet" to "jakarta.servlet".
This simple fix would help projects that depend on FileUpload, a lot.

> Release version 2.0.0
> -
>
> Key: FILEUPLOAD-309
> URL: https://issues.apache.org/jira/browse/FILEUPLOAD-309
> Project: Commons FileUpload
>  Issue Type: Wish
>Reporter: Thiago Henrique Hupner
>Priority: Major
>
> At Piranha, we've migrated to use the new Jakarta namespace.
> One of our dependencies is the Commons File Upload, but the latest version 
> available is 1.4.
> Looking around at the source code, I've found that the code is already 
> prepared for the new Jakarta namespace.
> So, I want to know if there's a plan to release a new version soon. Or at 
> least a 2.0.0 milestone.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (COMPRESS-638) The GzipCompressorOutputStream#writeHeader method uses the ISO_8859_1 to write the file name. If the file name contains non-ISO_8859_1 characters, some unknown chara

2023-01-16 Thread Gary D. Gregory (Jira)


[ 
https://issues.apache.org/jira/browse/COMPRESS-638?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17677398#comment-17677398
 ] 

Gary D. Gregory commented on COMPRESS-638:
--

Note: I added 
{{org.apache.commons.compress.compressors.gzip.GzipCompressorOutputStreamTest}}.

I don't think we can do anything that will be interoperable with all of the 
gzip utilities out in the world.

Even if we convert non-ISO-8859-1-encodable file names to _something_ that _we_ 
can convert back ourselves, that will look odd elsewhere.

For example, we could encode "测试中文名称.xml"/"Test Chinese name.xml" to 
"\u6D4B\u8BD5\u4E2D\u6587\u540D\u79F0.xml"

> The GzipCompressorOutputStream#writeHeader method uses the ISO_8859_1 to 
> write the file name.  If the file name contains non-ISO_8859_1 characters, 
> some unknown characters are displayed after decompression.
> --
>
> Key: COMPRESS-638
> URL: https://issues.apache.org/jira/browse/COMPRESS-638
> Project: Commons Compress
>  Issue Type: Bug
>Reporter: Radar wen
>Priority: Major
> Attachments: 0110.png
>
>
> The GzipCompressorOutputStream#writeHeader method uses the ISO_8859_1 to 
> write the file name. 
> If the file name contains non-ISO_8859_1 characters, some unknown characters 
> are displayed after decompression. !0110.png!
>  Can change the ISO_8859_1 to UTF-8? 
>         if (filename != null) {
>             out.write(filename.getBytes(ISO_8859_1));
>             out.write(0);
>         }
>  
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[GitHub] [commons-parent] garydgregory merged pull request #207: Bump maven-surefire-plugin from 3.0.0-M7 to 3.0.0-M8

2023-01-16 Thread GitBox


garydgregory merged PR #207:
URL: https://github.com/apache/commons-parent/pull/207


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[jira] [Commented] (VALIDATOR-486) the IBAN validator does not support all the IBAN supported countries

2023-01-16 Thread Gary D. Gregory (Jira)


[ 
https://issues.apache.org/jira/browse/VALIDATOR-486?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17677349#comment-17677349
 ] 

Gary D. Gregory commented on VALIDATOR-486:
---

PR 67 has been merged. There is still no support for DJ and RU.

> the IBAN validator does not support all the IBAN supported countries
> 
>
> Key: VALIDATOR-486
> URL: https://issues.apache.org/jira/browse/VALIDATOR-486
> Project: Commons Validator
>  Issue Type: Bug
>Affects Versions: 1.7
>Reporter: Nicola Gioia
>Priority: Major
>
> the list of supported countries for iban miss the following countries:
> |Burundi|BI|
> |Djibouti|DJ|
> |Libya|LY|
> |Russia|RU|
> |Sudan|SD|



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Comment Edited] (FILEUPLOAD-309) Release version 2.0.0

2023-01-16 Thread Flying Wolf (Jira)


[ 
https://issues.apache.org/jira/browse/FILEUPLOAD-309?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17677337#comment-17677337
 ] 

Flying Wolf edited comment on FILEUPLOAD-309 at 1/16/23 11:53 AM:
--

[~joc...@apache.org] 

The current big problem with FileUpload, where is issue is about, is this:

At 10 September 2019 the "Java Servlet" api was renamed to "Jakarta Servlet", 
starting from version 4.0.3.
At 9 October 2020, with the release of Jakarta Servlet 5.0, the API moved from 
package `javax.servlet` to `jakarta.servlet`.

This package change has big consequences when a project (such as Wicket) wants 
to update its old Servlet dependency to the new Jakarta Servlet 5.0 API package 
(jakarta.servlet), but the project (Wicket) also depends on a project 
(FileUpload) that is still using the old package (javax.servlet). This causes 
the project (Wicket) to be unable to update to a new Servlet version.

If Wicket would stick to the old Java Servlet version that FileUpload 
automatically and unknowingly is enforcing to projects since 9 October 2020, 
then this also causes other dependency problems for Wicket. For example, Spring 
Framework 6 also moved from Java Servlet to Jakarta Servlet. Because FileUpload 
is enforcing other projects to stay with the old Java Servlet spec, other 
projects (such as Wicket) won't be able to update to Spring Framework 6. This 
will become an ever bigger issue when Spring Framework 5 gets end-of-life in 
2024. Then projects are forced to use outdated insecure Spring version, or they 
have to fully drop the usage of FileUpload.

So FileUpload is enforcing projects to use an old Servlet spec, which causes 
major problems for these projects to be able to update important dependencies 
(Jakarta Servlet and Spring Framework).
Whereas the solution in FileUpload to solve this big problem, is really simple: 
FileUpload only needs to update it dependency (javax.servlet:servlet-api:2.4 
provided dependency) to a Jakarta Servlet depedency (for example 
jakarta.servlet:jakarta.servlet-api:6.0.0). Which means changing some simple 
import statements from "javax.servlet" to "jakarta.servlet".
This simple fix would help projects that depend on FileUpload, a lot.


was (Author: flyingwolf):
[~joc...@apache.org] 

The current big problem with FileUpload, where is issue is about, is this:

At 10 September 2019 the "Java Servlet" api was renamed to "Jakarta Servlet", 
starting from version 4.0.3.
At 9 October 2020, with the release of Jakarta Servlet 5.0, the API moved from 
package `javax.servlet` to `jakarta.servlet`.

This package change has big consequences when a project (such as Wicket) wants 
to update its old Servlet dependency to the new Jakarta Servlet 5.0 API package 
(jakarta.servlet), but the project (Wicket) also depends on a project 
(FileUpload) that is still using the old package (javax.servlet). This causes 
the project (Wicket) to be unable to update to a new Servlet version.

If Wicket would stick to the old Java Servlet version that FileUpload 
automatically and unknowingly is enforcing to projects since 10 September 2019, 
then this also causes other dependency problems for Wicket. For example, Spring 
Framework 6 also moved from Java Servlet to Jakarta Servlet. Because FileUpload 
is enforcing other projects to stay with the old Java Servlet spec, other 
projects (such as Wicket) won't be able to update to Spring Framework 6. This 
will become an ever bigger issue when Spring Framework 5 gets end-of-life in 
2024. Then projects are forced to use outdated insecure Spring version, or they 
have to fully drop the usage of FileUpload.

So FileUpload is enforcing projects to use an old Servlet spec, which causes 
major problems for these projects to be able to update important dependencies 
(Jakarta Servlet and Spring Framework).
Whereas the solution in FileUpload to solve this big problem, is really simple: 
FileUpload only needs to update it dependency (javax.servlet:servlet-api:2.4 
provided dependency) to a Jakarta Servlet depedency (for example 
jakarta.servlet:jakarta.servlet-api:6.0.0). Which means changing some simple 
import statements from "javax.servlet" to "jakarta.servlet".
This simple fix would help projects that depend on FileUpload, a lot.

> Release version 2.0.0
> -
>
> Key: FILEUPLOAD-309
> URL: https://issues.apache.org/jira/browse/FILEUPLOAD-309
> Project: Commons FileUpload
>  Issue Type: Wish
>Reporter: Thiago Henrique Hupner
>Priority: Major
>
> At Piranha, we've migrated to use the new Jakarta namespace.
> One of our dependencies is the Commons File Upload, but the latest version 
> available is 1.4.
> Looking around at the source code, I've found that the code is already 
> prepared for the new Jakarta namespace.
> So, I want to know if there's a plan to release 

[jira] [Comment Edited] (FILEUPLOAD-309) Release version 2.0.0

2023-01-16 Thread Flying Wolf (Jira)


[ 
https://issues.apache.org/jira/browse/FILEUPLOAD-309?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17677337#comment-17677337
 ] 

Flying Wolf edited comment on FILEUPLOAD-309 at 1/16/23 11:52 AM:
--

[~joc...@apache.org] 

The current big problem with FileUpload, where is issue is about, is this:

At 10 September 2019 the "Java Servlet" api was renamed to "Jakarta Servlet", 
starting from version 4.0.3.
At 9 October 2020, with the release of Jakarta Servlet 5.0, the API moved from 
package `javax.servlet` to `jakarta.servlet`.

This package change has big consequences when a project (such as Wicket) wants 
to update its old Servlet dependency to the new Jakarta Servlet 5.0 API package 
(jakarta.servlet), but the project (Wicket) also depends on a project 
(FileUpload) that is still using the old package (javax.servlet). This causes 
the project (Wicket) to be unable to update to a new Servlet version.

If Wicket would stick to the old Java Servlet version that FileUpload 
automatically and unknowingly is enforcing to projects since 10 September 2019, 
then this also causes other dependency problems for Wicket. For example, Spring 
Framework 6 also moved from Java Servlet to Jakarta Servlet. Because FileUpload 
is enforcing other projects to stay with the old Java Servlet spec, other 
projects (such as Wicket) won't be able to update to Spring Framework 6. This 
will become an ever bigger issue when Spring Framework 5 gets end-of-life in 
2024. Then projects are forced to use outdated insecure Spring version, or they 
have to fully drop the usage of FileUpload.

So FileUpload is enforcing projects to use an old Servlet spec, which causes 
major problems for these projects to be able to update important dependencies 
(Jakarta Servlet and Spring Framework).
Whereas the solution in FileUpload to solve this big problem, is really simple: 
FileUpload only needs to update it dependency (javax.servlet:servlet-api:2.4 
provided dependency) to a Jakarta Servlet depedency (for example 
jakarta.servlet:jakarta.servlet-api:6.0.0). Which means changing some simple 
import statements from "javax.servlet" to "jakarta.servlet".
This simple fix would help projects that depend on FileUpload, a lot.


was (Author: flyingwolf):
[~joc...@apache.org] 

The current big problem with FileUpload is this:

At 10 September 2019 the "Java Servlet" api was renamed to "Jakarta Servlet", 
starting from version 4.0.3.
At 9 October 2020, with the release of Jakarta Servlet 5.0, the API moved from 
package `javax.servlet` to `jakarta.servlet`.

This package change has big consequences when a project (such as Wicket) wants 
to update its old Servlet dependency to the new Jakarta Servlet 5.0 API package 
(jakarta.servlet), but the project (Wicket) also depends on a project 
(FileUpload) that is still using the old package (javax.servlet). This causes 
the project (Wicket) to be unable to update to a new Servlet version.

If Wicket would stick to the old Java Servlet version that FileUpload 
automatically and unknowingly is enforcing to projects since 10 September 2019, 
then this also causes other dependency problems for Wicket. For example, Spring 
Framework 6 also moved from Java Servlet to Jakarta Servlet. Because FileUpload 
is enforcing other projects to stay with the old Java Servlet spec, other 
projects (such as Wicket) won't be able to update to Spring Framework 6. This 
will become an ever bigger issue when Spring Framework 5 gets end-of-life in 
2024. Then projects are forced to use outdated insecure Spring version, or they 
have to fully drop the usage of FileUpload.

So FileUpload is enforcing projects to use an old Servlet spec, which causes 
major problems for these projects to be able to update important dependencies 
(Jakarta Servlet and Spring Framework).
Whereas the solution in FileUpload to solve this big problem, is really simple: 
FileUpload only needs to update it dependency (javax.servlet:servlet-api:2.4 
provided dependency) to a Jakarta Servlet depedency (for example 
jakarta.servlet:jakarta.servlet-api:6.0.0). Which means changing some simple 
import statements from "javax.servlet" to "jakarta.servlet".
This simple fix would help projects that depend on FileUpload, a lot.

> Release version 2.0.0
> -
>
> Key: FILEUPLOAD-309
> URL: https://issues.apache.org/jira/browse/FILEUPLOAD-309
> Project: Commons FileUpload
>  Issue Type: Wish
>Reporter: Thiago Henrique Hupner
>Priority: Major
>
> At Piranha, we've migrated to use the new Jakarta namespace.
> One of our dependencies is the Commons File Upload, but the latest version 
> available is 1.4.
> Looking around at the source code, I've found that the code is already 
> prepared for the new Jakarta namespace.
> So, I want to know if there's a plan to release a new version soon. Or 

[jira] [Commented] (FILEUPLOAD-309) Release version 2.0.0

2023-01-16 Thread Flying Wolf (Jira)


[ 
https://issues.apache.org/jira/browse/FILEUPLOAD-309?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17677337#comment-17677337
 ] 

Flying Wolf commented on FILEUPLOAD-309:


[~joc...@apache.org] 

The current big problem with FileUpload is this:

At 10 September 2019 the "Java Servlet" api was renamed to "Jakarta Servlet", 
starting from version 4.0.3.
At 9 October 2020, with the release of Jakarta Servlet 5.0, the API moved from 
package `javax.servlet` to `jakarta.servlet`.

This package change has big consequences when a project (such as Wicket) wants 
to update its old Servlet dependency to the new Jakarta Servlet 5.0 API package 
(jakarta.servlet), but the project (Wicket) also depends on a project 
(FileUpload) that is still using the old package (javax.servlet). This causes 
the project (Wicket) to be unable to update to a new Servlet version.

If Wicket would stick to the old Java Servlet version that FileUpload 
automatically and unknowingly is enforcing to projects since 10 September 2019, 
then this also causes other dependency problems for Wicket. For example, Spring 
Framework 6 also moved from Java Servlet to Jakarta Servlet. Because FileUpload 
is enforcing other projects to stay with the old Java Servlet spec, other 
projects (such as Wicket) won't be able to update to Spring Framework 6. This 
will become an ever bigger issue when Spring Framework 5 gets end-of-life in 
2024. Then projects are forced to use outdated insecure Spring version, or they 
have to fully drop the usage of FileUpload.

So FileUpload is enforcing projects to use an old Servlet spec, which causes 
major problems for these projects to be able to update important dependencies 
(Jakarta Servlet and Spring Framework).
Whereas the solution in FileUpload to solve this big problem, is really simple: 
FileUpload only needs to update it dependency (javax.servlet:servlet-api:2.4 
provided dependency) to a Jakarta Servlet depedency (for example 
jakarta.servlet:jakarta.servlet-api:6.0.0). Which means changing some simple 
import statements from "javax.servlet" to "jakarta.servlet".
This simple fix would help projects that depend on FileUpload, a lot.

> Release version 2.0.0
> -
>
> Key: FILEUPLOAD-309
> URL: https://issues.apache.org/jira/browse/FILEUPLOAD-309
> Project: Commons FileUpload
>  Issue Type: Wish
>Reporter: Thiago Henrique Hupner
>Priority: Major
>
> At Piranha, we've migrated to use the new Jakarta namespace.
> One of our dependencies is the Commons File Upload, but the latest version 
> available is 1.4.
> Looking around at the source code, I've found that the code is already 
> prepared for the new Jakarta namespace.
> So, I want to know if there's a plan to release a new version soon. Or at 
> least a 2.0.0 milestone.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (FILEUPLOAD-309) Release version 2.0.0

2023-01-16 Thread Jeff Thomas (Jira)


[ 
https://issues.apache.org/jira/browse/FILEUPLOAD-309?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17677289#comment-17677289
 ] 

Jeff Thomas commented on FILEUPLOAD-309:


..and in addition to "voting" for a release, I was agreeing with Andy's comment 
that the javax namespace maybe should be replaced with the jakarta namespace 
instead of providing alternate code. :)

> Release version 2.0.0
> -
>
> Key: FILEUPLOAD-309
> URL: https://issues.apache.org/jira/browse/FILEUPLOAD-309
> Project: Commons FileUpload
>  Issue Type: Wish
>Reporter: Thiago Henrique Hupner
>Priority: Major
>
> At Piranha, we've migrated to use the new Jakarta namespace.
> One of our dependencies is the Commons File Upload, but the latest version 
> available is 1.4.
> Looking around at the source code, I've found that the code is already 
> prepared for the new Jakarta namespace.
> So, I want to know if there's a plan to release a new version soon. Or at 
> least a 2.0.0 milestone.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[GitHub] [commons-net] mawiesne commented on a diff in pull request #141: Fixes many grammar issues and typos in JavaDoc and code comments

2023-01-16 Thread GitBox


mawiesne commented on code in PR #141:
URL: https://github.com/apache/commons-net/pull/141#discussion_r1070935486


##
src/main/java/org/apache/commons/net/ftp/parser/UnixFTPEntryParser.java:
##
@@ -110,7 +110,7 @@ public class UnixFTPEntryParser extends 
ConfigurableFTPFileEntryParserImpl {
 /**
  * The default constructor for a UnixFTPEntryParser object.
  *
- * @throws IllegalArgumentException Thrown if the regular expression is 
unparseable. Should not be seen under normal conditions. It it is seen, this is 
a
+ * @throws IllegalArgumentException Thrown if the regular expression is 
unparseable. Should not be seen under normal conditions. If it is seen, this is 
a

Review Comment:
   I replaced "it" with "this exception" and left "seen" as is.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org