On Thu, Sep 17, 2020 at 6:47 AM sebb <seb...@gmail.com> wrote:
>
> Does VFS actually *need* the latest version of NET?

Sigh, that's irrelevant as you can't control downstream stacks. This
is a regression from the user's point of view.

> i.e. does it fix a bug or a security issue that impacts VFS?

I hope that's a rhetorical question since you were the release manager
for Net 3.7. The changes.xml for Net 3.7 does nor list a CVE nor does
it mention security explicitly. Is the changes.xml up to date with all
changes since 3.6?

>
> If not, then downdate until such time as the issue can be fixed.
>
> It would be helpful to have a simple test case that shows the issue.

I will add a test that others can expand upon for new PRs. In the
future, it will be more helpful to not merge PRs blindly. I normally
ask for a unit test when a PR is created without a unit test. That
seems to me like a better process.

Gary

>
> On Tue, 15 Sep 2020 at 14:08, Gary Gregory <garydgreg...@gmail.com> wrote:
> >
> > Is anyone available to help?
> >
> > Gary
> >
> > On Sat, Sep 12, 2020 at 3:53 PM Gary Gregory <garydgreg...@gmail.com> wrote:
> > >
> > > The culprit commit seems to be 41e514cda5f68c444edc1058a18e2196b2c1d7d5.
> > > If I checkout the commit before that one, all is well with the FTPS
> > > tests in Commons VFS master.
> > > The fundamental problem is that there is not a single test for the
> > > class FTPSClient, so all commits against that class are "blind".
> > >
> > > Gary
> > > ----
> > > commit 41e514cda5f68c444edc1058a18e2196b2c1d7d5
> > > Author: sebbASF <sebb...@users.noreply.github.com> 2020-06-19 19:19:44
> > > Committer: GitHub <nore...@github.com> 2020-06-19 19:19:44
> > > Parent: c72538bbc6ed5e43d53b386e04f1c88f2bef9bec (Merge pull request
> > > #45 from yddgit/master)
> > > Parent: ab45bdb289e3929d71501008099c0e890653d7ab (Adding null check in
> > > ssl socket creation)
> > > Child: 78eb940af1d240192205701ece183783eeb09bc9 (Merge pull request
> > > #28 from fbrissi/trunk)
> > > Branches: master,
> > > origin/dependabot/github_actions/actions/checkout-v2.3.1,
> > > origin/dependabot/github_actions/actions/checkout-v2.3.2,
> > > origin/dependabot/github_actions/actions/setup-java-v1.4.1,
> > > origin/dependabot/github_actions/actions/setup-java-v1.4.2,
> > > origin/dependabot/maven/junit-junit-4.13,
> > > origin/dependabot/maven/org.apache.commons-commons-parent-52,
> > > origin/dependabot/maven/org.codehaus.mojo-exec-maven-plugin-3.0.0,
> > > origin/master, origin/NET_3_7
> > >
> > > Merge pull request #3 from drmaas/trunk
> > >
> > > Open data transfers sessions in ftps client with an ssl socket
> > > ----
> > > Gary
> > >
> > > On Fri, Sep 11, 2020 at 9:46 AM Gary Gregory <garydgreg...@gmail.com> 
> > > wrote:
> > > >
> > > > Hi All:
> > > >
> > > > Updating Commons VFS from Commons Net 3.6 to 3.7 causes failures. 
> > > > Please see:
> > > >
> > > > https://github.com/apache/commons-vfs/pull/128
> > > >
> > > > For example:
> > > >
> > > > https://github.com/apache/commons-vfs/pull/128/checks?check_run_id=1100197771
> > > >
> > > > Any thoughts?
> > > >
> > > > Tests in error:
> > > > 695 
> > > > AbstractFtpsProviderTestCase$FtpProviderTestSuite>AbstractTestSuite.run:134->AbstractTestSuite.lambda$run$0:129->setUp:153->AbstractTestSuite.setUp:168
> > > > » FileSystem
> > > > 696 
> > > > AbstractFtpsProviderTestCase$FtpProviderTestSuite>AbstractTestSuite.run:134->AbstractTestSuite.lambda$run$0:129->setUp:153->AbstractTestSuite.setUp:163
> > > > » FileSystem
> > > >
> > > > at 
> > > > org.apache.commons.vfs2.provider.ftp.FtpFileObject.getChildFile(FtpFileObject.java:100)
> > > > 519 at 
> > > > org.apache.commons.vfs2.provider.ftp.FtpFileObject.getInfo(FtpFileObject.java:164)
> > > > 520 at 
> > > > org.apache.commons.vfs2.provider.ftp.FtpFileObject.doGetType(FtpFileObject.java:254)
> > > > 521 at 
> > > > org.apache.commons.vfs2.provider.AbstractFileObject.getType(AbstractFileObject.java:1378)
> > > > 522 ... 14 more
> > > > 523 Suppressed: java.net.SocketException: Broken pipe (Write failed)
> > > > 524 at java.net.SocketOutputStream.socketWrite0(Native Method)
> > > > 525 at 
> > > > java.net.SocketOutputStream.socketWrite(SocketOutputStream.java:111)
> > > > 526 at java.net.SocketOutputStream.write(SocketOutputStream.java:155)
> > > > 527 at 
> > > > sun.security.ssl.SSLSocketOutputRecord.encodeAlert(SSLSocketOutputRecord.java:81)
> > > > 528 at 
> > > > sun.security.ssl.TransportContext.fatal(TransportContext.java:355)
> > > > 529 at 
> > > > sun.security.ssl.TransportContext.fatal(TransportContext.java:267)
> > > > 530 at 
> > > > sun.security.ssl.TransportContext.fatal(TransportContext.java:262)
> > > > 531 at sun.security.ssl.SSLTransport.decode(SSLTransport.java:142)
> > > > 532 ... 30 more
> > > >
> > > > Gary
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
> > For additional commands, e-mail: dev-h...@commons.apache.org
> >
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
> For additional commands, e-mail: dev-h...@commons.apache.org
>

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
For additional commands, e-mail: dev-h...@commons.apache.org

Reply via email to