From corrado.cuocci at ic.cnr.it Mon Apr 29 18:52:52 2019 From: corrado.cuocci at ic.cnr.it (Corrado Cuocci) Date: Mon, 29 Apr 2019 17:52:52 +0200 Subject: [Cod-bugs] problem using RESTful API with json format Message-ID: Dear developers of COD, I have found a possible bug when you query the COD by using the RESTful API in the following conditions: 1) json format but not html 2) el1 or nel1 keywords associated to some elements (C,H,O) To reproduce the problem try for example the following query: http://www.crystallography.net/cod/result.php?el1=C&format=json String error is: "Error downloading http://www.crystallography.net/cod/result.php?el1=C&format=json - server replied: Internal Server Error" Best regards Corrado -- ============================================ Cuocci Corrado Istituto di Cristallografia - CNR Via G. Amendola,122/o 70126 Bari (Italy) tel: +390805929161 fax:+390805929170 corrado.cuocci at ic.cnr.it ============================================ From andrius.merkys at gmail.com Tue Apr 30 08:28:23 2019 From: andrius.merkys at gmail.com (Andrius Merkys) Date: Tue, 30 Apr 2019 08:28:23 +0300 Subject: [Cod-bugs] problem using RESTful API with json format In-Reply-To: References: Message-ID: <1cb49564-272c-4287-81dd-66cd007803bc@gmail.com> Dear Corrado, thank you for your bug report. I have managed to reproduce the bug, will try to fix it ASAP. Best wishes, Andrius On 2019-04-29 18:52, Corrado Cuocci wrote: > Dear developers of COD, > > I have found a possible bug when you query the COD by using the > RESTful API in the following conditions: > 1) json format but not html > 2) el1 or nel1 keywords associated to some elements (C,H,O) > > To reproduce the problem try for example the following query: > http://www.crystallography.net/cod/result.php?el1=C&format=json > > String error is: > "Error downloading > http://www.crystallography.net/cod/result.php?el1=C&format=json - > server replied: Internal Server Error" > > Best regards > Corrado -- Andrius Merkys Vilnius University Institute of Biotechnology, Saul?tekio al. 7, room V325 LT-10257 Vilnius, Lithuania From andrius.merkys at gmail.com Tue Apr 30 09:43:38 2019 From: andrius.merkys at gmail.com (Andrius Merkys) Date: Tue, 30 Apr 2019 09:43:38 +0300 Subject: [Cod-bugs] problem using RESTful API with json format In-Reply-To: References: Message-ID: <7b6e75e4-7b1f-7145-8bcb-7cb30685ebe0@gmail.com> Dear Corrado, I have fixed the bug, your query should work now as expected. Let me know should you encounter any other problems. Best wishes, Andrius On 2019-04-29 18:52, Corrado Cuocci wrote: > Dear developers of COD, > > I have found a possible bug when you query the COD by using the > RESTful API in the following conditions: > 1) json format but not html > 2) el1 or nel1 keywords associated to some elements (C,H,O) > > To reproduce the problem try for example the following query: > http://www.crystallography.net/cod/result.php?el1=C&format=json > > String error is: > "Error downloading > http://www.crystallography.net/cod/result.php?el1=C&format=json - > server replied: Internal Server Error" > > Best regards > Corrado -- Andrius Merkys Vilnius University Institute of Biotechnology, Saul?tekio al. 7, room V325 LT-10257 Vilnius, Lithuania From andrius.merkys at gmail.com Tue Apr 30 14:50:00 2019 From: andrius.merkys at gmail.com (Andrius Merkys) Date: Tue, 30 Apr 2019 14:50:00 +0300 Subject: [Cod-bugs] problem using RESTful API with json format In-Reply-To: <4906aaba-8a3d-c2b4-4677-f6f27d90b070@ic.cnr.it> References: <7b6e75e4-7b1f-7145-8bcb-7cb30685ebe0@gmail.com> <4906aaba-8a3d-c2b4-4677-f6f27d90b070@ic.cnr.it> Message-ID: <9112ce88-394d-5d7d-c780-2e9b9525b66f@gmail.com> Dear Corrado, glad to head this worked! Best wishes, Andrius On 2019-04-30 14:48, Corrado Cuocci wrote: > > I thank you for the quick fix, now everything works. -- Andrius Merkys Vilnius University Institute of Biotechnology, Saul?tekio al. 7, room V325 LT-10257 Vilnius, Lithuania From andrius.merkys at gmail.com Tue Apr 30 18:11:33 2019 From: andrius.merkys at gmail.com (Andrius Merkys) Date: Tue, 30 Apr 2019 18:11:33 +0300 Subject: [Cod-bugs] Firefox warning In-Reply-To: References: Message-ID: <53942ff2-be6c-bb6e-aa93-bf46cc758800@gmail.com> Dear Adam, sorry for the late reply. To avoid the problem, please use HTTP protocol instead of HTTPS (http://www.crystallography.net/cod/1000030.html?cif=1000030 instead of https://www.crystallography.net/cod/1000030.html?cif=1000030). We will try to fix the issue with HTTPS as soon as possible. Best wishes, Andrius On 2019-04-16 05:55, Adam Przywecki wrote: > Hello, > > Your website generates a Firefox warning about a potential security > risk. For example, a visit to > > https://www.crystallography.net/cod/1000030.html?cif=1000030 > > leads to: "Firefox detected a potential security threat and did not > continue to www.crystallography.net . > If you visit this site, attackers could try to steal information like > your passwords, emails, or credit card details." > > This is Firefox 66.0.2 on Ubuntu 18.04. > > Adam Przywecki > > > > _______________________________________________ > Cod-bugs mailing list > Cod-bugs at lists.crystallography.net > http://lists.crystallography.net/cgi-bin/mailman/listinfo/cod-bugs -- Andrius Merkys Vilnius University Institute of Biotechnology, Saul?tekio al. 7, room V325 LT-10257 Vilnius, Lithuania -------------- next part -------------- An HTML attachment was scrubbed... URL: From radin.max at gmail.com Sun May 5 04:28:52 2019 From: radin.max at gmail.com (Max Radin) Date: Sat, 4 May 2019 21:28:52 -0400 Subject: [Cod-bugs] problems with COD website Message-ID: Dear COD developers, Recently I've encountered some problems accessing the COD website, and thought you might want to be aware of these issues. First, the security certificate appears to be invalid and so browsers raise a warning when accessing COD through https. Second, when searching COD with https, the links to download cif files do not work because they point to an https url instead of an http url. Best regards, Max -------------- next part -------------- An HTML attachment was scrubbed... URL: