Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

pkgsrc.smartos.org offline (CNAME missing DNS A record) #391

Closed
smokris opened this issue Sep 5, 2024 · 1 comment
Closed

pkgsrc.smartos.org offline (CNAME missing DNS A record) #391

smokris opened this issue Sep 5, 2024 · 1 comment

Comments

@smokris
Copy link

smokris commented Sep 5, 2024

Starting around 1:12 PM US Eastern time (20 minutes ago), pkgsrc.smartos.org is no longer resolving:

# pkgin up
processing remote summary (https://pkgsrc.smartos.org/packages/SmartOS/trunk/tools/All)...
pkgin: Could not fetch https://pkgsrc.smartos.org/packages/SmartOS/trunk/tools/All/pkg_summary.gz: No address record

# dig +short pkgsrc.smartos.org
www.svc.78b95b46-e120-4408-8a54-e4940ed364d6.us-central-1.triton.zone.
# dig +short www.svc.78b95b46-e120-4408-8a54-e4940ed364d6.us-central-1.triton.zone
(no response)
@smokris smokris changed the title pkgsrc.smartos.org offline / missing DNS A record pkgsrc.smartos.org offline (CNAME missing DNS A record) Sep 5, 2024
@smokris
Copy link
Author

smokris commented Sep 5, 2024

Oh, and now it's working again. Weird.

# dig +short www.svc.78b95b46-e120-4408-8a54-e4940ed364d6.us-central-1.triton.zone
192.207.255.76

@smokris smokris closed this as completed Sep 5, 2024
jperkin pushed a commit that referenced this issue Sep 14, 2024
ContourPy 1.3.0 adds new ContourGenerator functions multi_lines
and multi_filled to calculate contour lines and filled contours
over a sequence of levels in a single function call. There are also
new functions to render, convert and dechunk the returns from
multi_lines and multi_filled.

This release adds support for Python 3.13, including free-threaded.
The latter should be considered experimental.

The use of np.nan as the lower_level or upper_level of
ContourGenerator.filled() is no longer permitted.

Enhancements:

    multi_lines and multi_filled:
        ContourGenerator.multi_lines and multi_filled (#338, #340, #342, #343)
        Renderer.multi_lines and multi_filled (#341)
        convert_multi_lines and convert_multi_filled (#348)
        dechunk_multi_lines and dechunk_multi_filled (#345)

    Prevent use of np.nanas lower or upper level in filled (#339)

Compatibility:

    Support CPython 3.13 including free-threaded (#382, #384, #388, #408, #410, #411, #412, #423)
    Support PyPy 3.10 (#404)

Code improvements:

    Support improved typing in NumPy 2.1.0 (#422)

Documentation improvements:

    Simpler sphinx cross-references (#361)
    Add more doc cross-references to explain returned data formats (#366)
    Remove download numbers for conda packages (#428)
    Documentation for multi_lines and multi_filled (#390, #431)
    Document possibility of duplicate contour points (#432)

Build, testing and CI improvements:

    Add pytest option to log image differences to CSV file (#335)
    Label flaky test (#385)
    MSVC linking and std::mutex compiler flag (#391, #395, #414, #419, #427)
    Add minimal test script (#399)
    Bump minimum supported NumPy to 1.23 (#403)
    Build and publish nightly wheels (#413, #425)
    Bump default python version in CI to 3.12 (#430)
github-actions bot pushed a commit that referenced this issue Nov 24, 2024
Changes in RcppArmadillo version 14.2.0-1 (2024-11-16):

        * Upgraded to Armadillo release 14.2.0 (Smooth Caffeine)

            * Faster handling of symmetric matrices by 'inv()' and
              'rcond()'

            * Faster handling of hermitian matrices by 'inv()',
              'rcond()', 'cond()', 'pinv()', 'rank()'

            * Added 'solve_opts::force_sym' option to 'solve()' to
              force the use of the symmetric solver

            * More efficient handling of compound expressions by
              'solve()'

        * Added exporter specialisation for 'icube' for the
          'ARMA_64BIT_WORD' case

Changes in RcppArmadillo version 14.0.2-1 (2024-09-11):

        * Upgraded to Armadillo release 14.0.2 (Stochastic Parrot)

            * Optionally use C++20 memory alignment

            * Minor corrections for several corner-cases

        * The order of items displayed by 'citation()' is reversed
          (Conrad in #449)

        * The DESCRIPTION file now uses an Authors@R field with ORCID
          IDs

Changes in RcppArmadillo version 14.0.0-1 (2024-07-05):

        * Upgraded to Armadillo release 14.0.0 (Stochastic Parrot)

            * C++14 is now the minimum recommended C++ standard

            * Faster handling of compound expressions by 'as_scalar()',
              'accu()', 'dot()'

            * Faster interactions between sparse and dense matrices

            * Expanded 'stddev()' to handle sparse matrices

            * Expanded relational operators to handle expressions
              between sparse matrices and scalars

            * Added '.as_dense()' to obtain dense vector/matrix
              representation of any sparse matrix expression

            * Updated physical constants to NIST 2022 CODATA values

        * New package version numbering scheme following upstream
          versions

        * Re-enabling 'ARMA_IGNORE_DEPRECATED_MARKE' for silent CRAN
          builds

Changes in RcppArmadillo version 0.12.8.4.0 (2024-05-30):

        * Upgraded to Armadillo release 12.8.4 (Cortisol Injector)

            * Faster handling of sparse submatrix views

        * Update versioned Depends on 'Rcpp' to 1.0.8 or later to match
          use of Light/Lighter/Lightest headers.

Changes in RcppArmadillo version 0.12.8.3.0 (2024-05-07):

        * Upgraded to Armadillo release 12.8.3 (Cortisol Injector)

            * Fix issue in 'fft()' and 'fft2()' in multi-threaded
              contexts with FFTW3 enabled

        * No longer set C++11 for the 'Rcpp' plugin as this standard
          has been the default by R for very long time now.

Changes in RcppArmadillo version 0.12.8.2.1 (2024-04-15):

        * One-char bug fix release commenting out one test that upsets
          'reticulate' when accessing a 'scipy' sparse matrix

Changes in RcppArmadillo version 0.12.8.2.0 (2024-04-02):

        * Upgraded to Armadillo release 12.8.2 (Cortisol Injector)

            * Workaround for FFTW3 header clash

            * Workaround in testing framework for issue under macOS

            * Minor cleanups to reduce code bloat

            * Improved documentation

Changes in RcppArmadillo version 0.12.8.1.0 (2024-03-02):

        * Upgraded to Armadillo release 12.8.1 (Cortisol Injector)

            * Workaround in 'norm()' for yet another bug in macOS
              accelerate framework

        * Update README for RcppArmadillo usage counts

        * Update examples to use '#include <RcppArmadillo/Lighter>' for
          faster compilation excluding unused Rcpp features

Changes in RcppArmadillo version 0.12.8.0.0 (2024-02-06):

        * Upgraded to Armadillo release 12.8.0 (Cortisol Injector)

            * Faster detection of symmetric expressions by 'pinv()' and
              'rank()'

            * Expanded 'shift()' to handle sparse matrices

            * Expanded 'conv_to' for more flexible conversions between
              sparse and dense matrices

            * Added 'cbrt()'

            * More compact representation of integers when saving
              matrices in CSV format

        * Five non-user facing top-level include files have been
          removed (#432 closing #400 and building on #395 and #396)

Changes in RcppArmadillo version 0.12.6.7.0 (2023-12-18):

        * Upgraded to Armadillo release 12.6.7 (Cortisol Retox)

            * Fix for saving sparse matrices as CSV files

        * Added unit tests for thread throttling

Changes in RcppArmadillo version 0.12.6.6.1 (2023-12-03):

        * Following the extendeded transition in #391 and #402, this
          release no longer sets 'ARMA_IGNORE_DEPRECATED_MARKER'.
          Maintainers of affected packages have received pull requests
          or patches and can set '-DARMA_IGNORE_DEPRECATED_MARKER' as
          'PKG_CPPFLAGS'.
:
github-actions bot pushed a commit that referenced this issue Dec 15, 2024
# htmltools 0.5.8.1

* `capturePlot()`s examples are now only run when `interactive()`. (#429)

# htmltools 0.5.8

## Improvements

* .The fill CSS attached to fillable containers and fill items with
  `bindFillRole()` now uses a [CSS cascade
  layer](https://developer.mozilla.org/en-US/docs/Learn/CSS/Building_blocks/Cascade_layers)
  named `htmltools` to reduce the precedence order of the fill
  CSS. (#425)

* Improved documentation for boolean attributes in
  `tagAppendAttributes()` to note that they can be set via an `NA`
  value, e.g. `tagAppendAttributes(div(), contenteditable = NA)`
  creates `<div contenteditable></div>`. (thanks @russHyde, #427)

## Bug fixes

* `bindFillRole()` now attaches its `HTMLDependency()` to fill items,
  thus reducing the possibility of filling layout breaking due to
  missing CSS. (#421)


# htmltools 0.5.7

## New Features

* `save_html()` is now an S3 generic, allowing for more customization
  over how certain classes are saved to an HTML file. (#411)

## Improvements

* Fill items no longer set `overflow: auto` or `width: 100%` by default. (#401)

* `css()` now fully supports setting custom CSS properties (or CSS
  variables) via inline styles. When the name of a value passed to
  `css()` starts with `--`, it will be treated as a custom CSS
  property and absolutely no changes will be made to the variable. For
  example, `css("--font_size" = "3em")` returns `--font_size:3em;`
  while `css(font_size = "3em")` will return `font-size:3em`. (#402)

## Bug fixes

* `{htmltools}` now requires `{rlang}` version 1.0.0 or higher. (#403)

# htmltools 0.5.6.1

## Improvements

* `tagQuery()` no longer throws an error when attempting to traverse a
  NULL value with r-devel. (#407)

# htmltools 0.5.6

## Possibly breaking changes

* Closed #386: Fillable containers no longer set `overflow: auto` by
  default. Instead, they set `min-width` and `min-height` to `0` to
  ensure that fill items a constrained in the fillable container
  without clipping their direct children. (#387)

* Closed #370: Non-fill items in fillable containers no longer grow or
  shrink and instead respect their intrinsic size. Use `height` to
  control the height of non-fill items in fillable containers and
  `min-height` and `max-height` on fill items to limit how much they
  are allowed to grow or shrink within a fillable container. (#391)

## Minor improvements

* Closed #375: calling `htmlDependency()` or a function that returns
  an `htmlDependency()` object (e.g.,
  `fontawesome::fa_html_dependency()`) in an R chunk in an R Markdown
  or knitr-powered Quarto document will now include the dependency
  rather than printing the object structure. If you want to print the
  object structure, you can use `print()` or `str()`. (#376)

* Closed #124: `includeHTML()` will now issue a warning if it detects
  that the file passed to it contains a complete HTML
  document. `includeHTML()` is designed to include HTML fragments
  where the contents of the file can be written directly into the
  current app or document, but subtle errors can occur when the file
  contains a complete HTML document. In most cases, you should instead
  use `tags$iframe()` to embed external documents. (#382)

# htmltools 0.5.5

## Bug fixes

* Closed #355: `tagQuery()` was failing to select elements with tag
  names that contained hyphens. (@slodge, #302)

* Closed #366: `tagQuery()`'s `find()` method no longer errors out
  when tags contain language objects. (#366)
github-actions bot pushed a commit that referenced this issue Jan 27, 2025
xca 2.8.0 Sun Oct 13 2024
-------------------------

 * Add SHA3 algorithms to the select box
 * Close #593: App freezes/crashes when trying to export certain keys
 * Close #306 #537: Allow Database-driver options in config file
 * Close #537: macos: Compile mariadb-connector and qsqlmysql
 * Close #152: How can we specify the Cryptographic Service Provider
 * Close #590: MacOS OpenSSL legacy provider not loaded
 * Close #199: Templates and Key Identifiers
 * Close #239: Check existing Name Constraints
 * Add OpenSSL PURPOSE and validation results
 * Close #587: Incomplete refactoring of adapt_explicit_subj
 * Combine #90 and #315 and support UPN in name constraints
 * Close #90, #361: Name Constraints (RFC5280 section 4.2.1.10)
 * Close #296: Proper plurals
 * Close #88: Export to multiple files with common or individual password
 * Close #313: Support JWK export format of certificates
 * Close #359: Symlink to PKCS#11 lib resolved
 * Close #552: issues with icons in gnome dock
 * Close #315 Support UPN type for EAP/802.1X certificate
 * Add korean translation
 * Close #287: template don't save/restore correctly
 * Close #351: a1int::getLong() doesn't handle all error cases
 * Close #401: Write PEM data to a file especially for crlgen
 * Close #548: export certificate: error using child folder
 * Close #391: hide expired and revoked certificates

xca 2.7.0 Tue Aug 27 2024
-------------------------

 * Close #311: Install QT translation files again
 * Close #304: oids.txt not found etc if prefix non-standard
 * Add cmdline option to disable native dialogs
 * Close #364: Export ED25519 private key with password
 * Switch encryption in "Cert+PKCS#8" and "Database dump
   mode from DES3-EDE to AES-256
 * Drop support of encrypted PVK files.
 * Windows/Mac build: switch to QT 6.6.3
 * Close #554: Missing option to disable file association in Windows setup
 * Close #395: Flexible Clipboard Export
 * Close #550: Fix compiling tests issue by providing -pthread link flag.
 * Fix calendar export for CAs
 * Support importing existing OpenVPN TLS Auth keys
 * Fix "Copy extensions from request" function
 * Fix login via PinPad on e.g ReinerSCT
 * Extend #383: tag insecure PFX/PKCS#12 algorithms
 * Close #536: macos include OpenSSL legacy provider
 * Close #532: XCA not in English on macos
 * Close #89: ta.key for OpenVPN tls-auth
 * Close #496: PKCS11 access to AWS CloudHSM failed
 * Yubikey improvements

xca 2.6.0 Mon Feb 26 2024
-------------------------

 * Update documentation of certificate export and remote databases
 * Close #520: Fix permanent processor load
 * Close #518: Export certificates for ovpn file
 * Close #512 #474 #481 #506 #509: SHA1 based MAC for PKCS12
 * Close #458 #511 #503 #500 #494 #484 #482 #475: Support legacy keys
   and automatically transform them if possible.
 * Close #493: Renew Certificate freeze XCA
 * Close #477: paste an encrypted private key results in a crash
 * Fix crash when deleting CA certificates
 * Close #480: add flatpak build information and github action
 * Close #402: Subject Alternative Name not filled by all CN
 * Improve import: Finish multi import when empty
 * Add File extensions in Info.plist supported by XCA
 * Close #384: Quick view of certificates without trying to open XCA
 * Close #459: pass private key password
 * Close #465: Export PEM + Key in one File
 * Close #460: Impossible to import PKCS#12 (RC40_CBC)
 * Make XCA AppStore compliant with -DAPPSTORE_COMPLIANT=ON

xca 2.5.0 Sun Sep 24 2023
-------------------------

 * Close #423: parameter --name is not respected when running with CLI
 * Close #457: Support Qt5 < 5.12 / python3-sphinxcontrib.qthelp
 * Close #440: yellow background makes date text hard to read in dark themes
 * Close #437: loading CRL at startup generates an error
 * Close #444 cannot update template internal name
 * Close #442: asan checks failed
 * Close #446: show more information in Recent Databases
 * Improve/Fix database loading
 * Document vCalendar/ics feature #456
 * Fix possible segfault caused by wrong free()
 * Add Bulgarian translation
 * Close #368: error while creating CRL with CA using EC key (ed25519)
 * Treat CKA_ID as byte array, not Bignum
 * Fix #321 - decryptKey shows OpenSSL error
 * Merge #325 Update entitlement.plist
 * Close #366: Not Responding after upgrade
 * Add Persian translation .ts file to XCA.
 * Close #327: "Dump database" dumps everything to everywhere
 * Close #317: "Please insert card: ..." message
 * Add Indonesian translation
 * Close #283 Nitrokey HSM2 can't create EC keys on 2.4.0
 * Switch from autotools/qmake to cmake
 * Close #278: Miss components to connect remote database
 * Commandline: Add "--list-items" to print a list of database items
 * Close #67: possibility to ignore password prompt from CLI
 * Close #259: Follow the XDG base directory specification
 * Add support for Qt6 and OpenSSL 3.x
 * Drop support for Qt4
 * Drop support for old XCA < 2.0.0 databases
 * Drop support for OpenSSL < 1.1.0

xca 2.4.0 Fri May 07 2021
-------------------------

 * Unify XCA icon (certificate) on all platforms
 * Close #247: Apple silicon (M1) configure fixes
 * Add Microsoft BitLocker extended key usage
 * Disregard OpenSSL 0.9.8 compatibility
 * Add bash completion script
 * Add context sensitive help
 * Convert documentation from linuxdoc/SGML to sphinxdoc
 * Close #258: xca aborts on exit and on access to own templates
 * Close #142: Support Ed25519 Import / Export private SSH2 key
 * Close #142: Support Ed25519: Key-generation, import, export
 * Close #251: AuthorityKeyIdentifier: use issuer:always
 * Change language maintainer of brazilian portuguese
 * Close #230: Change PKCS12 export extension from .p12 to .pfx
 * Close #208: XCA hung when importing EC keys. For example prime256v1
 * Close #210: Make dialog to edit SAN less strict
 * Close #224: Store original path/filename on import
 * Close #213: configure.ac: add description to AC_DEFINE_UNQUOTED
 * Close #172 #46: Multiple OCSP Responders
 * Store default database and recently opened file as UTF8
 * Close #157 Generate and export CRLs from commandline
 * Add command line support for creating CRLs, keys and analyzing items

xca 2.3.0 Wed Apr 29 2020
-------------------------

 * Close #191 OID LN differs warning popups at startup
 * Close #189 Database compaction #189
 * Improve PKCS11 library loading for portable app
 * Refactor native separators / and \ on windows.
 * Support TLS encrypted MariaDB and PostgreSQL connection
 * Close #182: UI not using Windows native theme in 2.2.1 portable
 * Close #70: cant open ics file in ical on macos mojave
 * Close #72: Add checkbox for OCSP staple feature
 * Use DESTDIR instead of destdir when installing. Follows autotools convention.
 * Close #172 #46: Multiple OCSP Responders
 * Close #170 xca-portable-2.2.1 cannot change language
 * Fix certificate assignment when importing a CA certificate
 * Close #163: Show key type/size on column of Certificates tab

xca 2.2.1 Thu Jan 30 2020
-------------------------

 * Close #159 Opening existing database

xca 2.2.0 Wed Jan 29 2020
-------------------------

 * Switch to MSI installer
 * Close #129 Unattended Installation
 * Rename HTTPS templates to TLS and support KU/EKU extensions needed by OpenVPN
 * Close #93 Default output folder / Improve Portable App usability
 * Improve EC Curve selection for key generation.
 * Close #21 Support for ODBC (MSSQL)
 * Close #136 Provide 64bit version of xca
 * Close #156 secp256k1, secp256r1 and NIST-P256
 * Transfer Key Usage and Extended Key Usage critical flags
 * Improve item loading. Inspired by #153
 * Add japanese translation
 * Close #138: Portable Version does not remember paths
 * Close #83: Token selection should not insist on name or serial of the token
 * Close #95: Copy mysql and psql windows dll files into portable app
 * Close #144: Database export has issues with wildcards in internal names
 * Close #143: Hotkey for import
 * Close #140: Certificate renewal with option to preserved serial number
 * Fix possible XCA crash
 * Add Dutch translation
 * Add Chinese translation
 * Add Italian language
 * CLose #120: Mark signed a request doesn't work
 * Close #119: Rename "PostgreSQL 6 and 7" to just "PostgreSQL"
 * Close #116: Duplicate extensions erroneously shown
 * Close #114: SAN - IPv6 address input not working
 * Close #68 Generating large DH params freezes UI
 * Support concurrent database access.
 * Close #91: Change order of "PKCS#11 provider"
 * Extend PEM files by human readable information about the item
 * Support ecdsa SSH public keys
 * Close #98 Add comment at import/export RSA keys from/to SSH public key
 * Close #101: Finish Rename with Enter shows Property Dialog
 * Close #104: Also show sha256 digests of public keys
 * Close #82: Renew CA ROOT Cert
 * Verify imported keys thoroughly
jperkin pushed a commit that referenced this issue Jan 28, 2025
Pkgsrc changes:
 * Remove now-upstream-integrated patch.
 * Checksum changes.

Upstream changes:

NSD version 4.11.0 had a serious bug in which applying updates to
zones (and other modifications that require a reload, such as adding
and deleting zones), could stop entirely after reception of a broken
or corrupted update via zone transfer. We believe that this broken
state would appear as one of the NSD processes consuming 100% CPU.
Version 4.11.1 has this corrected as well as some other smaller
non-critical bugs.

We strongly advise to not run NSD version 4.11.0, and if you have
it deployed already, upgrade to 4.11.1 at the earliest possible
opportunity.

4.11.1
================
BUG FIXES:
        - Fix #415: Fix out of tree builds. Thanks Florian Obser (@fobser).
        - Fix #414: XoT interoperability with BIND and Knot
        - Fix #421: old-main can quit before the reload process received
          from old-main that it is done on the reload_listener pipe.
          Thanks Otto Retter.
        - Fix whitespace in comment.
        - Fix #424: Stalled updates after corrupt transfer.

4.11.0
================
FEATURES:
        - Support reloading configuration on SIGHUP.
        - Fix #383: log timestamps in ISO8601 format with timezone.
          This adds the option `log-time-iso: yes` that logs in ISO8601
          format.
        - Updated cookie secrets management.
          The default cookie secret file location can be set at compile time
          with the --with-cookiesecretsfile=path option to configure. The
          default location is changed to {dbdir}/cookiesecrets.txt. The
          previous default location will be checked at startup when there is
          no cookie secrets file at the new default location.
          A staging cookie can now also be configured in the configuration
          file and secrets configured in the configuration file now take
          precedence over those read from file.
          All DNS related setting in the configuration file will be reevaluated
          and effectuated after nsd-control reconfig.
        - Merge #398: RFC 9660 The DNS Zone Version (ZONEVERSION) Option
        - Merge #406: ohttp and tls-supported-groups SvcParam suppor
        - Merge #408: NINFO, RKEY, RESINFO, WALLET, CLA and TA RR types
        - Merge #409: Writing of NSAP-PTR, GPOS and HIP RR types
        - Merge #407: Better balanced verbosity levels for logging.

BUG FIXES:
        - Fix title underline and declaration after statement warnings.
        - Add cross platform freebsd, openbsd and netbsd to github ci.
        - Update simdzone to include fix for netbsd double bswap declarations,
          and also semantic checks for DS and ZONEMD. And CFLAGS has -march
          prepended to fix detection.
        - Merge #376: Point the user towards tcpdump for logging individual
          queries.
        - Track $INCLUDEs in zone files.
        - Fix ci to update macos-12 to the macos-15 runner image.
        - Merge #390: Apply non-xfr tasks before xfr tasks.
          This fixes an issue where non-xfr tasks are lost when they are
          batch processed together with non-xfr tasks.
          This merge also changes that notifies are passed on from the serve
          processes to the xfrd directly instead of via main. This was
          necessary to allow applying the non-xfr tasks without forking a
          backup-main for the sole purpose of forwarding notifies.
        - Merge #391: Update copyright lines (in version output).
        - Fix #392: Inconsistent documentation about control-interface.
        - Merge #395: Explain the zonefile example better.
        - Merge #394: Fix the path to use doc/manual/.
        - Fix analyzer issue in do_print_cookie_secrets to check for failure.
        - Merge #404: Introducing Sphinx substitution in code blocks.
          As well as other fixes with Sphinx build.
        - Update Copyright lines in help output
        - Merge #395: Explain zonefile example better
        - Merge #394: Fix doc path (fixes "Edit on GitHub" button in the docs)
        - Fix Makefile for parallel build failure around bison rule.
        - Fix #405: Fix typo in documentation.
        - Treat a mismatch in RRset TTLs as a warning.
github-actions bot pushed a commit that referenced this issue Feb 9, 2025
0.5.6 (2025-02-08)

Security Fix

Fixes CVE-2025-25186 (GHSA-7fc5-f82f-cx69): A malicious server can exhaust
client memory by sending APPENDUID or COPYUID responses with very large
uid-set ranges.  Net::IMAP::UIDPlusData expands these ranges into arrays of
integers.

Fix with minor API changes

Set config.parser_use_deprecated_uidplus_data to false to replace
UIDPlusData with AppendUIDData and CopyUIDData.  These classes store their
UIDs as Net::IMAP::SequenceSet objects (not expanded into arrays of
integers).  Code that does not handle APPENDUID or COPYUID responses should
not see any difference.  Code that does handle these responses may need to
be updated.

For v0.3.8, this option is not available
For v0.4.19, the default value is true.
For v0.5.6, the default value is :up_to_max_size.
For v0.6.0, the only allowed value will be false (UIDPlusData will be
removed from v0.6).

Mitigate with backward compatible API

Adjust config.parser_max_deprecated_uidplus_data_size to limit the maximum
UIDPlusData UID set size.
When config.parser_use_deprecated_uidplus_data == true, larger sets will
crash.
When config.parser_use_deprecated_uidplus_data == :up_to_max_size, larger
sets will use AppendUIDData or CopyUIDData.

For v0.3,8, this limit is hard-coded to 10,000.
For v0.4.19, this limit defaults to 1000.
For v0.5.6, this limit defaults to 100.
For v0.6.0, the only allowed value will be 0 (UIDPlusData will be removed
from v0.6).

Please Note: unhandled responses

If the client does not add response handlers to prune unhandled responses, a
malicious server can still eventually exhaust all client memory, by
repeatedly sending malicious responses.  However, net-imap has always
retained unhandled responses, and it has always been necessary for
long-lived connections to prune these responses.  This is not significantly
different from connecting to a trusted server with a long-lived connection.
To limit the maximum number of retained responses, a simple handler might
look something like the following:

  limit = 1000
  imap.add_response_handler do |resp|
    next unless resp.respond_to?(:name) && resp.respond_to?(:data)
    name = resp.name
    code = resp.data.code&.name if resp.data.in?(Net::IMAP::ResponseText)
    imap.responses(name) { _1.slice!(0...-limit) }
    imap.responses(code) { _1.slice!(0...-limit) }
  end

Added

* Ensure ResponseParser config is mutable and non-global by @nevans in #381
* Add SequenceSet methods for querying about duplicates by @nevans in #384
* Add SequenceSet#each_ordered_number by @nevans in #386
* Add SequenceSet#find_ordered_index by @nevans in #396
* Add SequenceSet#ordered_at by @nevans in #397
* Add AppendUIDData and CopyUIDData classes by @nevans in #400
* Add parser config for APPENDUID/COPYUID, Deprecate UIDPlusData by @nevans
  in #401

Fixed

* Fix SequenceSet#append when its @string is nil by @nevans in #376
* Fix SequenceSet merging in another SequenceSet by @nevans in #377
* Fix SequenceSet count dups with multiple "*" by @nevans in #387
* Re-raise #starttls error from receiver thread by @nevans in #395

Documentation

* Fix SequenceSet#cover? documentation by @nevans in #379
* Document COPYUID in tagged vs untagged responses by @nevans in #398

Other Changes

* Move UIDPlusData to its own file by @nevans in #391
* Parse uid-set as sequence-set without * by @nevans in #393

Miscellaneous

* Bump step-security/harden-runner from 2.10.2 to 2.10.3 by @dependabot in #375
* Bump step-security/harden-runner from 2.10.3 to 2.10.4 by @dependabot in #380
* Improve test coverage for SequenceSet enums by @nevans in #383
*  Refactor SequenceSet enumerator tests by @nevans in #385
* Add "irb" to Gemfile to silence warning by @nevans in #388
* Omit flaky test with macOS platform by @hsbt in #389
* Improve UIDPlusData test coverage by @nevans in #392
* Rename UIDPLUS test file for consistency by @nevans in #399
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant