GNU bug report logs -
#32824
Gzip 1.3.12
Previous Next
To add a comment to this bug, you must first unarchive it, by sending
a message to control AT debbugs.gnu.org, with unarchive 32824 in the body.
You can then email your comments to 32824 AT debbugs.gnu.org in the normal way.
Toggle the display of automated, internal messages from the tracker.
Report forwarded
to
bug-gzip <at> gnu.org
:
bug#32824
; Package
gzip
.
(Mon, 24 Sep 2018 18:41:01 GMT)
Full text and
rfc822 format available.
Acknowledgement sent
to
"Coleman, Patrick EX1" <Patrick.Coleman <at> iqvia.com>
:
New bug report received and forwarded. Copy sent to
bug-gzip <at> gnu.org
.
(Mon, 24 Sep 2018 18:41:01 GMT)
Full text and
rfc822 format available.
Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):
[Message part 1 (text/plain, inline)]
Hello...
We're receiving Gzip files from an AIX7.1 Server running Gzip ver.3.0. Our version is 1.3.12 (subject line) and we're unable to unzip them. The only way we're able to decompress the file for processing is to use 7zip, then, re-zip using our 1.3.12 version. This is necessary as part of an automated script to process data files (requirement that the data files be zipped). Do we need to upgrade our version? And if so... will the upgraded version of Gzip be backwards compatible?
Information on Gzip 3.0 appears to be lacking... or, I'm not looking in the right place. Would you be able to provide additional information?
Thanks in advance.
Patrick Coleman (AOI)
SUPPLIER ANALYTICS
IQVIA
400 Campus Drive
#2097
Collegeville, Pa. 19426
USA
O: +01 1.610.244.2283
patrick.coleman <at> iqvia.com<mailto:patrick.coleman <at> iqvia.com>
www.iqvia.com<http://www.iqvia.com/>
[IQVIA logo_96dpi_100pxheight]
Learn more<http://www.iqvia.com/> about IQVIA(tm)
________________________________________
IMPORTANT - PLEASE READ: This electronic message, including its attachments, is CONFIDENTIAL and may contain PROPRIETARY or LEGALLY PRIVILEGED or PROTECTED information and is intended for the authorized recipient of the sender. If you are not the intended recipient, you are hereby notified that any use, disclosure, copying, or distribution of this message or any of the information included in it is unauthorized and strictly prohibited. If you have received this message in error, please immediately notify the sender by reply e-mail and permanently delete this message and its attachments, along with any copies thereof, from all locations received (e.g., computer, mobile device, etc.). To the extent permitted by law, we may monitor electronic communications for the purposes of ensuring compliance with our legal and regulatory obligations and internal policies. We may also collect email traffic headers for analyzing patterns of network traffic and managing client relationships. For further information see: https://www.iqvia.com/about-us/privacy/privacy-policy. Thank you.
[Message part 2 (text/html, inline)]
[image001.jpg (image/jpeg, inline)]
Information forwarded
to
bug-gzip <at> gnu.org
:
bug#32824
; Package
gzip
.
(Mon, 24 Sep 2018 19:19:02 GMT)
Full text and
rfc822 format available.
Message #8 received at 32824 <at> debbugs.gnu.org (full text, mbox):
[Message part 1 (text/plain, inline)]
I'm beginning to suspect the supplier that is sending in the zipped files is unaware what compression utility they're using and/or version... the only 3.0 compression utility I'm finding is WinZip. I think the file is failing to unzip due to the file not being completely downloaded. Appears truncated. Any thoughts you can provide though on Gzip 3.0 would be helpful, thanks.
Patrick Coleman (AOI)
SUPPLIER ANALYTICS
IQVIA
400 Campus Drive
#2097
Collegeville, Pa. 19426
USA
O: +01 1.610.244.2283
patrick.coleman <at> iqvia.com<mailto:patrick.coleman <at> iqvia.com>
www.iqvia.com<http://www.iqvia.com/>
[IQVIA logo_96dpi_100pxheight]
Learn more<http://www.iqvia.com/> about IQVIA(tm)
________________________________________
IMPORTANT - PLEASE READ: This electronic message, including its attachments, is CONFIDENTIAL and may contain PROPRIETARY or LEGALLY PRIVILEGED or PROTECTED information and is intended for the authorized recipient of the sender. If you are not the intended recipient, you are hereby notified that any use, disclosure, copying, or distribution of this message or any of the information included in it is unauthorized and strictly prohibited. If you have received this message in error, please immediately notify the sender by reply e-mail and permanently delete this message and its attachments, along with any copies thereof, from all locations received (e.g., computer, mobile device, etc.). To the extent permitted by law, we may monitor electronic communications for the purposes of ensuring compliance with our legal and regulatory obligations and internal policies. We may also collect email traffic headers for analyzing patterns of network traffic and managing client relationships. For further information see: https://www.iqvia.com/about-us/privacy/privacy-policy. Thank you.
[Message part 2 (text/html, inline)]
[image001.jpg (image/jpeg, inline)]
Information forwarded
to
bug-gzip <at> gnu.org
:
bug#32824
; Package
gzip
.
(Mon, 24 Sep 2018 20:03:02 GMT)
Full text and
rfc822 format available.
Message #11 received at 32824 <at> debbugs.gnu.org (full text, mbox):
On 9/24/18 10:44 AM, Coleman, Patrick EX1 wrote:
> Information on Gzip 3.0 appears to be lacking
Not surprising, since the latest version of gzip is 1.9. Sounds like
somebody is confused about what program is generating the data, and it
sounds like the program is not gzip.
Information forwarded
to
bug-gzip <at> gnu.org
:
bug#32824
; Package
gzip
.
(Mon, 24 Sep 2018 20:04:01 GMT)
Full text and
rfc822 format available.
Message #14 received at 32824 <at> debbugs.gnu.org (full text, mbox):
Yup, you rock Paul, thanks for the response!
Patrick Coleman (AOI)
SUPPLIER ANALYTICS
IQVIA
400 Campus Drive
#2097
Collegeville, Pa. 19426
USA
O: +01 1.610.244.2283
patrick.coleman <at> iqvia.com
www.iqvia.com
Learn more about IQVIA™
-----Original Message-----
From: Paul Eggert <eggert <at> cs.ucla.edu>
Sent: Monday, September 24, 2018 4:02 PM
To: Coleman, Patrick EX1 <PColeman <at> us.imshealth.com>; 32824 <at> debbugs.gnu.org
Subject: Re: bug#32824: Gzip 1.3.12
On 9/24/18 10:44 AM, Coleman, Patrick EX1 wrote:
> Information on Gzip 3.0 appears to be lacking
Not surprising, since the latest version of gzip is 1.9. Sounds like somebody is confused about what program is generating the data, and it sounds like the program is not gzip.
________________________________________
IMPORTANT - PLEASE READ: This electronic message, including its attachments, is CONFIDENTIAL and may contain PROPRIETARY or LEGALLY PRIVILEGED or PROTECTED information and is intended for the authorized recipient of the sender. If you are not the intended recipient, you are hereby notified that any use, disclosure, copying, or distribution of this message or any of the information included in it is unauthorized and strictly prohibited. If you have received this message in error, please immediately notify the sender by reply e-mail and permanently delete this message and its attachments, along with any copies thereof, from all locations received (e.g., computer, mobile device, etc.). To the extent permitted by law, we may monitor electronic communications for the purposes of ensuring compliance with our legal and regulatory obligations and internal policies. We may also collect email traffic headers for analyzing patterns of network traffic and managing client relationships. For further information see: https://www.iqvia.com/about-us/privacy/privacy-policy. Thank you.
Information forwarded
to
bug-gzip <at> gnu.org
:
bug#32824
; Package
gzip
.
(Mon, 24 Sep 2018 20:15:02 GMT)
Full text and
rfc822 format available.
Message #17 received at 32824 <at> debbugs.gnu.org (full text, mbox):
Hello,
On 24/09/18 01:18 PM, Coleman, Patrick EX1 wrote:
> I'm beginning to suspect the supplier that is sending in the zipped
> files is unaware what compression utility they're using and/or
> version... the only 3.0 compression utility I'm finding is WinZip.
More likely (if they are on AIX) that they are using info-zip
(http://infozip.sourceforge.net/) which is at version 3.0.
On most gnu/linux system, you should have the "file" utility installed,
which can be used to detect the file type.
Examples:
=====
$ file unknown1.bin
unknown1.bin: Zip archive data, at least v2.0 to extract
$ file unknown2.bin
unknown2.bin: gzip compressed data, last modified: Mon Sep 24 13:26:32
2018, from Unix
=====
> I think the file is failing to unzip due to the file not being
> completely downloaded. Appears truncated. Any thoughts you can
> provide though on Gzip 3.0 would be helpful, thanks.
A good way is to ask the sender to calculate the checksum
of their file before uploading it.
Then you can calculate the checksum of the downloaded file.
If they are not exactly the same - you have some corruption.
On AIX, they should run:
$ shasum archive.bin
f572d396fae9206628714fb2ce00f72e94f2258f archive.bin
After you download the file, check again:
$ sha1sum archive.bin
f572d396fae9206628714fb2ce00f72e94f2258f archive.bin
(Note the program name is "shasum" on AIX and "sha1sum" on gnu/linux).
hope this helps,
- assaf
Information forwarded
to
bug-gzip <at> gnu.org
:
bug#32824
; Package
gzip
.
(Mon, 24 Sep 2018 20:18:01 GMT)
Full text and
rfc822 format available.
Message #20 received at 32824 <at> debbugs.gnu.org (full text, mbox):
You rock Assaf! Thank you very much, very helpful!
Patrick Coleman (AOI)
SUPPLIER ANALYTICS
IQVIA
400 Campus Drive
#2097
Collegeville, Pa. 19426
USA
O: +01 1.610.244.2283
patrick.coleman <at> iqvia.com
www.iqvia.com
Learn more about IQVIA™
-----Original Message-----
From: Assaf Gordon <assafgordon <at> gmail.com>
Sent: Monday, September 24, 2018 4:15 PM
To: Coleman, Patrick EX1 <PColeman <at> us.imshealth.com>; 32824 <at> debbugs.gnu.org
Subject: Re: bug#32824: additional info
Hello,
On 24/09/18 01:18 PM, Coleman, Patrick EX1 wrote:
> I'm beginning to suspect the supplier that is sending in the zipped
> files is unaware what compression utility they're using and/or
> version... the only 3.0 compression utility I'm finding is WinZip.
More likely (if they are on AIX) that they are using info-zip
(https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Finfozip.sourceforge.net%2F&data=02%7C01%7CPColeman%40us.imshealth.com%7Cd16ad0a36cee47176ea808d6225a5f10%7C5989ece0f90e40bf9c791a7beccdb861%7C1%7C0%7C636734168884438637&sdata=P4QZzCtbi3lIOceD1WOynvbkeTTB37rtvVL3%2BHi32yQ%3D&reserved=0) which is at version 3.0.
On most gnu/linux system, you should have the "file" utility installed, which can be used to detect the file type.
Examples:
=====
$ file unknown1.bin
unknown1.bin: Zip archive data, at least v2.0 to extract
$ file unknown2.bin
unknown2.bin: gzip compressed data, last modified: Mon Sep 24 13:26:32 2018, from Unix =====
> I think the file is failing to unzip due to the file not being
> completely downloaded. Appears truncated. Any thoughts you can
> provide though on Gzip 3.0 would be helpful, thanks.
A good way is to ask the sender to calculate the checksum of their file before uploading it.
Then you can calculate the checksum of the downloaded file.
If they are not exactly the same - you have some corruption.
On AIX, they should run:
$ shasum archive.bin
f572d396fae9206628714fb2ce00f72e94f2258f archive.bin
After you download the file, check again:
$ sha1sum archive.bin
f572d396fae9206628714fb2ce00f72e94f2258f archive.bin
(Note the program name is "shasum" on AIX and "sha1sum" on gnu/linux).
hope this helps,
- assaf
________________________________________
IMPORTANT - PLEASE READ: This electronic message, including its attachments, is CONFIDENTIAL and may contain PROPRIETARY or LEGALLY PRIVILEGED or PROTECTED information and is intended for the authorized recipient of the sender. If you are not the intended recipient, you are hereby notified that any use, disclosure, copying, or distribution of this message or any of the information included in it is unauthorized and strictly prohibited. If you have received this message in error, please immediately notify the sender by reply e-mail and permanently delete this message and its attachments, along with any copies thereof, from all locations received (e.g., computer, mobile device, etc.). To the extent permitted by law, we may monitor electronic communications for the purposes of ensuring compliance with our legal and regulatory obligations and internal policies. We may also collect email traffic headers for analyzing patterns of network traffic and managing client relationships. For further information see: https://www.iqvia.com/about-us/privacy/privacy-policy. Thank you.
Added tag(s) notabug.
Request was from
Paul Eggert <eggert <at> cs.ucla.edu>
to
control <at> debbugs.gnu.org
.
(Wed, 30 Mar 2022 00:24:02 GMT)
Full text and
rfc822 format available.
bug closed, send any further explanations to
32824 <at> debbugs.gnu.org and "Coleman, Patrick EX1" <Patrick.Coleman <at> iqvia.com>
Request was from
Paul Eggert <eggert <at> cs.ucla.edu>
to
control <at> debbugs.gnu.org
.
(Wed, 30 Mar 2022 00:24:02 GMT)
Full text and
rfc822 format available.
bug archived.
Request was from
Debbugs Internal Request <help-debbugs <at> gnu.org>
to
internal_control <at> debbugs.gnu.org
.
(Wed, 27 Apr 2022 11:24:07 GMT)
Full text and
rfc822 format available.
This bug report was last modified 1 year and 358 days ago.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.