From nobody Mon Dec 18 16:53:04 2023 X-Original-To: ports-bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Sv5VS2C4Gz54kwY for ; Mon, 18 Dec 2023 16:53:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Sv5VR6bmYz4PTC for ; Mon, 18 Dec 2023 16:53:03 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1702918383; a=rsa-sha256; cv=none; b=xFKVewKJOoLtzQXXxNQSEPTonXUFGt+n8UwzTNQNkXGiDPOfIDxJIR1IywJ3zEMmqTWivt bHgtCA3NvocoFAKnTs9o56HmrKCJe5NrMoGRESqjAmxrNlfH/I6CeiCb5n+Aey2Hyp5JdX +wVVuNNL5Zt+jVJOUU+IuibgwE7rUXxLXJPnfM5BBxS8Ssk8ZNpCvX2VJHOoHWh0Pob/1U y1ydPCWcAAs6bRNjGvYHirq5Ln9ZcK8gFU8/9Ugk4F1FX0LE1efmn3gt66JrQq1wttbUbL +AKS2ksz1pQPmYgWc9NQdXCRLyBXZOi4cIe4/MLRqq/5RNhhyTVe8jQ0INtZlg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1702918383; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=vkgQfk1yWkKH64EvnHmZmmkwRwf606BBqUHRHBLApuI=; b=kS/Nc/RBS22gXulr99Em5SxwCVAMs3WGjn9d8IPCBOR36ryQVSPh77/1xg9OAp5V+9rEaE Rz6l4mXAM/oak6TryI8RfvU4MVPIm/qXS6zXvHJl61FP029zGrBeOKRfnUlwotXHMmxA90 vl2YTw6M6QDyWOyg30jW3i2lwCLZNKxRVgKlGbQRujSP6b0yKyEElGIfjnM2zBPsAY8SUl 2fXjyxUA1CNzkgJKjpbDkPjzzPdb7UPWF50snCqeKxAyKRYdxRHhR3MO/M3c09Km7a/ujE PjvWj78/zjbSAHPIUqX7uDn9vpVq5XvplspX0PWZc17GcLx/HYWcT/C9maWg/Q== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Sv5VR5hqtzTXH for ; Mon, 18 Dec 2023 16:53:03 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 3BIGr3m5084856 for ; Mon, 18 Dec 2023 16:53:03 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 3BIGr3c6084855 for ports-bugs@FreeBSD.org; Mon, 18 Dec 2023 16:53:03 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 261555] 410.pkg-audit: suggested patch to improve expiry by handling anticongestion delay better Date: Mon, 18 Dec 2023 16:53:04 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: performance X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: wbe@psr.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_severity keywords Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Ports bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-ports-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-ports-bugs@freebsd.org X-BeenThere: freebsd-ports-bugs@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D261555 wbe@psr.com changed: What |Removed |Added ---------------------------------------------------------------------------- Severity|Affects Many People |Affects Some People Keywords| |performance --- Comment #3 from wbe@psr.com --- Having now seen that vuln.xml is fetched entirely differently in 14.0, this proposed patch is NOT appropriate for 14.0. It would help some in 13.2 and earlier. Doing nothing is an acceptable option, so I'm going to try to close this bug report. --=20 You are receiving this mail because: You are the assignee for the bug.=