forked from NetBSD/pkgsrc
-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
pkgsrc.smartos.org offline (CNAME missing DNS A
record)
#391
Comments
A
recordA
record)
Oh, and now it's working again. Weird. # dig +short www.svc.78b95b46-e120-4408-8a54-e4940ed364d6.us-central-1.triton.zone
192.207.255.76 |
jperkin
pushed a commit
that referenced
this issue
Sep 14, 2024
ContourPy 1.3.0 adds new ContourGenerator functions multi_lines and multi_filled to calculate contour lines and filled contours over a sequence of levels in a single function call. There are also new functions to render, convert and dechunk the returns from multi_lines and multi_filled. This release adds support for Python 3.13, including free-threaded. The latter should be considered experimental. The use of np.nan as the lower_level or upper_level of ContourGenerator.filled() is no longer permitted. Enhancements: multi_lines and multi_filled: ContourGenerator.multi_lines and multi_filled (#338, #340, #342, #343) Renderer.multi_lines and multi_filled (#341) convert_multi_lines and convert_multi_filled (#348) dechunk_multi_lines and dechunk_multi_filled (#345) Prevent use of np.nanas lower or upper level in filled (#339) Compatibility: Support CPython 3.13 including free-threaded (#382, #384, #388, #408, #410, #411, #412, #423) Support PyPy 3.10 (#404) Code improvements: Support improved typing in NumPy 2.1.0 (#422) Documentation improvements: Simpler sphinx cross-references (#361) Add more doc cross-references to explain returned data formats (#366) Remove download numbers for conda packages (#428) Documentation for multi_lines and multi_filled (#390, #431) Document possibility of duplicate contour points (#432) Build, testing and CI improvements: Add pytest option to log image differences to CSV file (#335) Label flaky test (#385) MSVC linking and std::mutex compiler flag (#391, #395, #414, #419, #427) Add minimal test script (#399) Bump minimum supported NumPy to 1.23 (#403) Build and publish nightly wheels (#413, #425) Bump default python version in CI to 3.12 (#430)
github-actions bot
pushed a commit
that referenced
this issue
Nov 24, 2024
Changes in RcppArmadillo version 14.2.0-1 (2024-11-16): * Upgraded to Armadillo release 14.2.0 (Smooth Caffeine) * Faster handling of symmetric matrices by 'inv()' and 'rcond()' * Faster handling of hermitian matrices by 'inv()', 'rcond()', 'cond()', 'pinv()', 'rank()' * Added 'solve_opts::force_sym' option to 'solve()' to force the use of the symmetric solver * More efficient handling of compound expressions by 'solve()' * Added exporter specialisation for 'icube' for the 'ARMA_64BIT_WORD' case Changes in RcppArmadillo version 14.0.2-1 (2024-09-11): * Upgraded to Armadillo release 14.0.2 (Stochastic Parrot) * Optionally use C++20 memory alignment * Minor corrections for several corner-cases * The order of items displayed by 'citation()' is reversed (Conrad in #449) * The DESCRIPTION file now uses an Authors@R field with ORCID IDs Changes in RcppArmadillo version 14.0.0-1 (2024-07-05): * Upgraded to Armadillo release 14.0.0 (Stochastic Parrot) * C++14 is now the minimum recommended C++ standard * Faster handling of compound expressions by 'as_scalar()', 'accu()', 'dot()' * Faster interactions between sparse and dense matrices * Expanded 'stddev()' to handle sparse matrices * Expanded relational operators to handle expressions between sparse matrices and scalars * Added '.as_dense()' to obtain dense vector/matrix representation of any sparse matrix expression * Updated physical constants to NIST 2022 CODATA values * New package version numbering scheme following upstream versions * Re-enabling 'ARMA_IGNORE_DEPRECATED_MARKE' for silent CRAN builds Changes in RcppArmadillo version 0.12.8.4.0 (2024-05-30): * Upgraded to Armadillo release 12.8.4 (Cortisol Injector) * Faster handling of sparse submatrix views * Update versioned Depends on 'Rcpp' to 1.0.8 or later to match use of Light/Lighter/Lightest headers. Changes in RcppArmadillo version 0.12.8.3.0 (2024-05-07): * Upgraded to Armadillo release 12.8.3 (Cortisol Injector) * Fix issue in 'fft()' and 'fft2()' in multi-threaded contexts with FFTW3 enabled * No longer set C++11 for the 'Rcpp' plugin as this standard has been the default by R for very long time now. Changes in RcppArmadillo version 0.12.8.2.1 (2024-04-15): * One-char bug fix release commenting out one test that upsets 'reticulate' when accessing a 'scipy' sparse matrix Changes in RcppArmadillo version 0.12.8.2.0 (2024-04-02): * Upgraded to Armadillo release 12.8.2 (Cortisol Injector) * Workaround for FFTW3 header clash * Workaround in testing framework for issue under macOS * Minor cleanups to reduce code bloat * Improved documentation Changes in RcppArmadillo version 0.12.8.1.0 (2024-03-02): * Upgraded to Armadillo release 12.8.1 (Cortisol Injector) * Workaround in 'norm()' for yet another bug in macOS accelerate framework * Update README for RcppArmadillo usage counts * Update examples to use '#include <RcppArmadillo/Lighter>' for faster compilation excluding unused Rcpp features Changes in RcppArmadillo version 0.12.8.0.0 (2024-02-06): * Upgraded to Armadillo release 12.8.0 (Cortisol Injector) * Faster detection of symmetric expressions by 'pinv()' and 'rank()' * Expanded 'shift()' to handle sparse matrices * Expanded 'conv_to' for more flexible conversions between sparse and dense matrices * Added 'cbrt()' * More compact representation of integers when saving matrices in CSV format * Five non-user facing top-level include files have been removed (#432 closing #400 and building on #395 and #396) Changes in RcppArmadillo version 0.12.6.7.0 (2023-12-18): * Upgraded to Armadillo release 12.6.7 (Cortisol Retox) * Fix for saving sparse matrices as CSV files * Added unit tests for thread throttling Changes in RcppArmadillo version 0.12.6.6.1 (2023-12-03): * Following the extendeded transition in #391 and #402, this release no longer sets 'ARMA_IGNORE_DEPRECATED_MARKER'. Maintainers of affected packages have received pull requests or patches and can set '-DARMA_IGNORE_DEPRECATED_MARKER' as 'PKG_CPPFLAGS'. :
github-actions bot
pushed a commit
that referenced
this issue
Dec 15, 2024
# htmltools 0.5.8.1 * `capturePlot()`s examples are now only run when `interactive()`. (#429) # htmltools 0.5.8 ## Improvements * .The fill CSS attached to fillable containers and fill items with `bindFillRole()` now uses a [CSS cascade layer](https://developer.mozilla.org/en-US/docs/Learn/CSS/Building_blocks/Cascade_layers) named `htmltools` to reduce the precedence order of the fill CSS. (#425) * Improved documentation for boolean attributes in `tagAppendAttributes()` to note that they can be set via an `NA` value, e.g. `tagAppendAttributes(div(), contenteditable = NA)` creates `<div contenteditable></div>`. (thanks @russHyde, #427) ## Bug fixes * `bindFillRole()` now attaches its `HTMLDependency()` to fill items, thus reducing the possibility of filling layout breaking due to missing CSS. (#421) # htmltools 0.5.7 ## New Features * `save_html()` is now an S3 generic, allowing for more customization over how certain classes are saved to an HTML file. (#411) ## Improvements * Fill items no longer set `overflow: auto` or `width: 100%` by default. (#401) * `css()` now fully supports setting custom CSS properties (or CSS variables) via inline styles. When the name of a value passed to `css()` starts with `--`, it will be treated as a custom CSS property and absolutely no changes will be made to the variable. For example, `css("--font_size" = "3em")` returns `--font_size:3em;` while `css(font_size = "3em")` will return `font-size:3em`. (#402) ## Bug fixes * `{htmltools}` now requires `{rlang}` version 1.0.0 or higher. (#403) # htmltools 0.5.6.1 ## Improvements * `tagQuery()` no longer throws an error when attempting to traverse a NULL value with r-devel. (#407) # htmltools 0.5.6 ## Possibly breaking changes * Closed #386: Fillable containers no longer set `overflow: auto` by default. Instead, they set `min-width` and `min-height` to `0` to ensure that fill items a constrained in the fillable container without clipping their direct children. (#387) * Closed #370: Non-fill items in fillable containers no longer grow or shrink and instead respect their intrinsic size. Use `height` to control the height of non-fill items in fillable containers and `min-height` and `max-height` on fill items to limit how much they are allowed to grow or shrink within a fillable container. (#391) ## Minor improvements * Closed #375: calling `htmlDependency()` or a function that returns an `htmlDependency()` object (e.g., `fontawesome::fa_html_dependency()`) in an R chunk in an R Markdown or knitr-powered Quarto document will now include the dependency rather than printing the object structure. If you want to print the object structure, you can use `print()` or `str()`. (#376) * Closed #124: `includeHTML()` will now issue a warning if it detects that the file passed to it contains a complete HTML document. `includeHTML()` is designed to include HTML fragments where the contents of the file can be written directly into the current app or document, but subtle errors can occur when the file contains a complete HTML document. In most cases, you should instead use `tags$iframe()` to embed external documents. (#382) # htmltools 0.5.5 ## Bug fixes * Closed #355: `tagQuery()` was failing to select elements with tag names that contained hyphens. (@slodge, #302) * Closed #366: `tagQuery()`'s `find()` method no longer errors out when tags contain language objects. (#366)
github-actions bot
pushed a commit
that referenced
this issue
Jan 27, 2025
xca 2.8.0 Sun Oct 13 2024 ------------------------- * Add SHA3 algorithms to the select box * Close #593: App freezes/crashes when trying to export certain keys * Close #306 #537: Allow Database-driver options in config file * Close #537: macos: Compile mariadb-connector and qsqlmysql * Close #152: How can we specify the Cryptographic Service Provider * Close #590: MacOS OpenSSL legacy provider not loaded * Close #199: Templates and Key Identifiers * Close #239: Check existing Name Constraints * Add OpenSSL PURPOSE and validation results * Close #587: Incomplete refactoring of adapt_explicit_subj * Combine #90 and #315 and support UPN in name constraints * Close #90, #361: Name Constraints (RFC5280 section 4.2.1.10) * Close #296: Proper plurals * Close #88: Export to multiple files with common or individual password * Close #313: Support JWK export format of certificates * Close #359: Symlink to PKCS#11 lib resolved * Close #552: issues with icons in gnome dock * Close #315 Support UPN type for EAP/802.1X certificate * Add korean translation * Close #287: template don't save/restore correctly * Close #351: a1int::getLong() doesn't handle all error cases * Close #401: Write PEM data to a file especially for crlgen * Close #548: export certificate: error using child folder * Close #391: hide expired and revoked certificates xca 2.7.0 Tue Aug 27 2024 ------------------------- * Close #311: Install QT translation files again * Close #304: oids.txt not found etc if prefix non-standard * Add cmdline option to disable native dialogs * Close #364: Export ED25519 private key with password * Switch encryption in "Cert+PKCS#8" and "Database dump mode from DES3-EDE to AES-256 * Drop support of encrypted PVK files. * Windows/Mac build: switch to QT 6.6.3 * Close #554: Missing option to disable file association in Windows setup * Close #395: Flexible Clipboard Export * Close #550: Fix compiling tests issue by providing -pthread link flag. * Fix calendar export for CAs * Support importing existing OpenVPN TLS Auth keys * Fix "Copy extensions from request" function * Fix login via PinPad on e.g ReinerSCT * Extend #383: tag insecure PFX/PKCS#12 algorithms * Close #536: macos include OpenSSL legacy provider * Close #532: XCA not in English on macos * Close #89: ta.key for OpenVPN tls-auth * Close #496: PKCS11 access to AWS CloudHSM failed * Yubikey improvements xca 2.6.0 Mon Feb 26 2024 ------------------------- * Update documentation of certificate export and remote databases * Close #520: Fix permanent processor load * Close #518: Export certificates for ovpn file * Close #512 #474 #481 #506 #509: SHA1 based MAC for PKCS12 * Close #458 #511 #503 #500 #494 #484 #482 #475: Support legacy keys and automatically transform them if possible. * Close #493: Renew Certificate freeze XCA * Close #477: paste an encrypted private key results in a crash * Fix crash when deleting CA certificates * Close #480: add flatpak build information and github action * Close #402: Subject Alternative Name not filled by all CN * Improve import: Finish multi import when empty * Add File extensions in Info.plist supported by XCA * Close #384: Quick view of certificates without trying to open XCA * Close #459: pass private key password * Close #465: Export PEM + Key in one File * Close #460: Impossible to import PKCS#12 (RC40_CBC) * Make XCA AppStore compliant with -DAPPSTORE_COMPLIANT=ON xca 2.5.0 Sun Sep 24 2023 ------------------------- * Close #423: parameter --name is not respected when running with CLI * Close #457: Support Qt5 < 5.12 / python3-sphinxcontrib.qthelp * Close #440: yellow background makes date text hard to read in dark themes * Close #437: loading CRL at startup generates an error * Close #444 cannot update template internal name * Close #442: asan checks failed * Close #446: show more information in Recent Databases * Improve/Fix database loading * Document vCalendar/ics feature #456 * Fix possible segfault caused by wrong free() * Add Bulgarian translation * Close #368: error while creating CRL with CA using EC key (ed25519) * Treat CKA_ID as byte array, not Bignum * Fix #321 - decryptKey shows OpenSSL error * Merge #325 Update entitlement.plist * Close #366: Not Responding after upgrade * Add Persian translation .ts file to XCA. * Close #327: "Dump database" dumps everything to everywhere * Close #317: "Please insert card: ..." message * Add Indonesian translation * Close #283 Nitrokey HSM2 can't create EC keys on 2.4.0 * Switch from autotools/qmake to cmake * Close #278: Miss components to connect remote database * Commandline: Add "--list-items" to print a list of database items * Close #67: possibility to ignore password prompt from CLI * Close #259: Follow the XDG base directory specification * Add support for Qt6 and OpenSSL 3.x * Drop support for Qt4 * Drop support for old XCA < 2.0.0 databases * Drop support for OpenSSL < 1.1.0 xca 2.4.0 Fri May 07 2021 ------------------------- * Unify XCA icon (certificate) on all platforms * Close #247: Apple silicon (M1) configure fixes * Add Microsoft BitLocker extended key usage * Disregard OpenSSL 0.9.8 compatibility * Add bash completion script * Add context sensitive help * Convert documentation from linuxdoc/SGML to sphinxdoc * Close #258: xca aborts on exit and on access to own templates * Close #142: Support Ed25519 Import / Export private SSH2 key * Close #142: Support Ed25519: Key-generation, import, export * Close #251: AuthorityKeyIdentifier: use issuer:always * Change language maintainer of brazilian portuguese * Close #230: Change PKCS12 export extension from .p12 to .pfx * Close #208: XCA hung when importing EC keys. For example prime256v1 * Close #210: Make dialog to edit SAN less strict * Close #224: Store original path/filename on import * Close #213: configure.ac: add description to AC_DEFINE_UNQUOTED * Close #172 #46: Multiple OCSP Responders * Store default database and recently opened file as UTF8 * Close #157 Generate and export CRLs from commandline * Add command line support for creating CRLs, keys and analyzing items xca 2.3.0 Wed Apr 29 2020 ------------------------- * Close #191 OID LN differs warning popups at startup * Close #189 Database compaction #189 * Improve PKCS11 library loading for portable app * Refactor native separators / and \ on windows. * Support TLS encrypted MariaDB and PostgreSQL connection * Close #182: UI not using Windows native theme in 2.2.1 portable * Close #70: cant open ics file in ical on macos mojave * Close #72: Add checkbox for OCSP staple feature * Use DESTDIR instead of destdir when installing. Follows autotools convention. * Close #172 #46: Multiple OCSP Responders * Close #170 xca-portable-2.2.1 cannot change language * Fix certificate assignment when importing a CA certificate * Close #163: Show key type/size on column of Certificates tab xca 2.2.1 Thu Jan 30 2020 ------------------------- * Close #159 Opening existing database xca 2.2.0 Wed Jan 29 2020 ------------------------- * Switch to MSI installer * Close #129 Unattended Installation * Rename HTTPS templates to TLS and support KU/EKU extensions needed by OpenVPN * Close #93 Default output folder / Improve Portable App usability * Improve EC Curve selection for key generation. * Close #21 Support for ODBC (MSSQL) * Close #136 Provide 64bit version of xca * Close #156 secp256k1, secp256r1 and NIST-P256 * Transfer Key Usage and Extended Key Usage critical flags * Improve item loading. Inspired by #153 * Add japanese translation * Close #138: Portable Version does not remember paths * Close #83: Token selection should not insist on name or serial of the token * Close #95: Copy mysql and psql windows dll files into portable app * Close #144: Database export has issues with wildcards in internal names * Close #143: Hotkey for import * Close #140: Certificate renewal with option to preserved serial number * Fix possible XCA crash * Add Dutch translation * Add Chinese translation * Add Italian language * CLose #120: Mark signed a request doesn't work * Close #119: Rename "PostgreSQL 6 and 7" to just "PostgreSQL" * Close #116: Duplicate extensions erroneously shown * Close #114: SAN - IPv6 address input not working * Close #68 Generating large DH params freezes UI * Support concurrent database access. * Close #91: Change order of "PKCS#11 provider" * Extend PEM files by human readable information about the item * Support ecdsa SSH public keys * Close #98 Add comment at import/export RSA keys from/to SSH public key * Close #101: Finish Rename with Enter shows Property Dialog * Close #104: Also show sha256 digests of public keys * Close #82: Renew CA ROOT Cert * Verify imported keys thoroughly
jperkin
pushed a commit
that referenced
this issue
Jan 28, 2025
Pkgsrc changes: * Remove now-upstream-integrated patch. * Checksum changes. Upstream changes: NSD version 4.11.0 had a serious bug in which applying updates to zones (and other modifications that require a reload, such as adding and deleting zones), could stop entirely after reception of a broken or corrupted update via zone transfer. We believe that this broken state would appear as one of the NSD processes consuming 100% CPU. Version 4.11.1 has this corrected as well as some other smaller non-critical bugs. We strongly advise to not run NSD version 4.11.0, and if you have it deployed already, upgrade to 4.11.1 at the earliest possible opportunity. 4.11.1 ================ BUG FIXES: - Fix #415: Fix out of tree builds. Thanks Florian Obser (@fobser). - Fix #414: XoT interoperability with BIND and Knot - Fix #421: old-main can quit before the reload process received from old-main that it is done on the reload_listener pipe. Thanks Otto Retter. - Fix whitespace in comment. - Fix #424: Stalled updates after corrupt transfer. 4.11.0 ================ FEATURES: - Support reloading configuration on SIGHUP. - Fix #383: log timestamps in ISO8601 format with timezone. This adds the option `log-time-iso: yes` that logs in ISO8601 format. - Updated cookie secrets management. The default cookie secret file location can be set at compile time with the --with-cookiesecretsfile=path option to configure. The default location is changed to {dbdir}/cookiesecrets.txt. The previous default location will be checked at startup when there is no cookie secrets file at the new default location. A staging cookie can now also be configured in the configuration file and secrets configured in the configuration file now take precedence over those read from file. All DNS related setting in the configuration file will be reevaluated and effectuated after nsd-control reconfig. - Merge #398: RFC 9660 The DNS Zone Version (ZONEVERSION) Option - Merge #406: ohttp and tls-supported-groups SvcParam suppor - Merge #408: NINFO, RKEY, RESINFO, WALLET, CLA and TA RR types - Merge #409: Writing of NSAP-PTR, GPOS and HIP RR types - Merge #407: Better balanced verbosity levels for logging. BUG FIXES: - Fix title underline and declaration after statement warnings. - Add cross platform freebsd, openbsd and netbsd to github ci. - Update simdzone to include fix for netbsd double bswap declarations, and also semantic checks for DS and ZONEMD. And CFLAGS has -march prepended to fix detection. - Merge #376: Point the user towards tcpdump for logging individual queries. - Track $INCLUDEs in zone files. - Fix ci to update macos-12 to the macos-15 runner image. - Merge #390: Apply non-xfr tasks before xfr tasks. This fixes an issue where non-xfr tasks are lost when they are batch processed together with non-xfr tasks. This merge also changes that notifies are passed on from the serve processes to the xfrd directly instead of via main. This was necessary to allow applying the non-xfr tasks without forking a backup-main for the sole purpose of forwarding notifies. - Merge #391: Update copyright lines (in version output). - Fix #392: Inconsistent documentation about control-interface. - Merge #395: Explain the zonefile example better. - Merge #394: Fix the path to use doc/manual/. - Fix analyzer issue in do_print_cookie_secrets to check for failure. - Merge #404: Introducing Sphinx substitution in code blocks. As well as other fixes with Sphinx build. - Update Copyright lines in help output - Merge #395: Explain zonefile example better - Merge #394: Fix doc path (fixes "Edit on GitHub" button in the docs) - Fix Makefile for parallel build failure around bison rule. - Fix #405: Fix typo in documentation. - Treat a mismatch in RRset TTLs as a warning.
github-actions bot
pushed a commit
that referenced
this issue
Feb 9, 2025
0.5.6 (2025-02-08) Security Fix Fixes CVE-2025-25186 (GHSA-7fc5-f82f-cx69): A malicious server can exhaust client memory by sending APPENDUID or COPYUID responses with very large uid-set ranges. Net::IMAP::UIDPlusData expands these ranges into arrays of integers. Fix with minor API changes Set config.parser_use_deprecated_uidplus_data to false to replace UIDPlusData with AppendUIDData and CopyUIDData. These classes store their UIDs as Net::IMAP::SequenceSet objects (not expanded into arrays of integers). Code that does not handle APPENDUID or COPYUID responses should not see any difference. Code that does handle these responses may need to be updated. For v0.3.8, this option is not available For v0.4.19, the default value is true. For v0.5.6, the default value is :up_to_max_size. For v0.6.0, the only allowed value will be false (UIDPlusData will be removed from v0.6). Mitigate with backward compatible API Adjust config.parser_max_deprecated_uidplus_data_size to limit the maximum UIDPlusData UID set size. When config.parser_use_deprecated_uidplus_data == true, larger sets will crash. When config.parser_use_deprecated_uidplus_data == :up_to_max_size, larger sets will use AppendUIDData or CopyUIDData. For v0.3,8, this limit is hard-coded to 10,000. For v0.4.19, this limit defaults to 1000. For v0.5.6, this limit defaults to 100. For v0.6.0, the only allowed value will be 0 (UIDPlusData will be removed from v0.6). Please Note: unhandled responses If the client does not add response handlers to prune unhandled responses, a malicious server can still eventually exhaust all client memory, by repeatedly sending malicious responses. However, net-imap has always retained unhandled responses, and it has always been necessary for long-lived connections to prune these responses. This is not significantly different from connecting to a trusted server with a long-lived connection. To limit the maximum number of retained responses, a simple handler might look something like the following: limit = 1000 imap.add_response_handler do |resp| next unless resp.respond_to?(:name) && resp.respond_to?(:data) name = resp.name code = resp.data.code&.name if resp.data.in?(Net::IMAP::ResponseText) imap.responses(name) { _1.slice!(0...-limit) } imap.responses(code) { _1.slice!(0...-limit) } end Added * Ensure ResponseParser config is mutable and non-global by @nevans in #381 * Add SequenceSet methods for querying about duplicates by @nevans in #384 * Add SequenceSet#each_ordered_number by @nevans in #386 * Add SequenceSet#find_ordered_index by @nevans in #396 * Add SequenceSet#ordered_at by @nevans in #397 * Add AppendUIDData and CopyUIDData classes by @nevans in #400 * Add parser config for APPENDUID/COPYUID, Deprecate UIDPlusData by @nevans in #401 Fixed * Fix SequenceSet#append when its @string is nil by @nevans in #376 * Fix SequenceSet merging in another SequenceSet by @nevans in #377 * Fix SequenceSet count dups with multiple "*" by @nevans in #387 * Re-raise #starttls error from receiver thread by @nevans in #395 Documentation * Fix SequenceSet#cover? documentation by @nevans in #379 * Document COPYUID in tagged vs untagged responses by @nevans in #398 Other Changes * Move UIDPlusData to its own file by @nevans in #391 * Parse uid-set as sequence-set without * by @nevans in #393 Miscellaneous * Bump step-security/harden-runner from 2.10.2 to 2.10.3 by @dependabot in #375 * Bump step-security/harden-runner from 2.10.3 to 2.10.4 by @dependabot in #380 * Improve test coverage for SequenceSet enums by @nevans in #383 * Refactor SequenceSet enumerator tests by @nevans in #385 * Add "irb" to Gemfile to silence warning by @nevans in #388 * Omit flaky test with macOS platform by @hsbt in #389 * Improve UIDPlusData test coverage by @nevans in #392 * Rename UIDPLUS test file for consistency by @nevans in #399
# for free
to join this conversation on GitHub.
Already have an account?
# to comment
Starting around 1:12 PM US Eastern time (20 minutes ago),
pkgsrc.smartos.org
is no longer resolving:The text was updated successfully, but these errors were encountered: