Unnamed: 0
int64 0
832k
| id
float64 2.49B
32.1B
| type
stringclasses 1
value | created_at
stringlengths 19
19
| repo
stringlengths 5
112
| repo_url
stringlengths 34
141
| action
stringclasses 3
values | title
stringlengths 1
757
| labels
stringlengths 4
664
| body
stringlengths 3
261k
| index
stringclasses 10
values | text_combine
stringlengths 96
261k
| label
stringclasses 2
values | text
stringlengths 96
232k
| binary_label
int64 0
1
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
63,425
| 17,646,874,921
|
IssuesEvent
|
2021-08-20 07:38:01
|
unascribed/Fabrication
|
https://api.github.com/repos/unascribed/Fabrication
|
opened
|
Exploding newlines on Windows
|
k: Defect
|
In some cases, Fabrication rewriting one of its own INI files can result in every newline being duplicated on Windows, causing the file to become s p r e a d o u t over time.
This likely has to do with Windows `\r\n` newlines, and as such can likely be reproduced on a Linux system using `unix2dos`.
|
1.0
|
Exploding newlines on Windows - In some cases, Fabrication rewriting one of its own INI files can result in every newline being duplicated on Windows, causing the file to become s p r e a d o u t over time.
This likely has to do with Windows `\r\n` newlines, and as such can likely be reproduced on a Linux system using `unix2dos`.
|
defect
|
exploding newlines on windows in some cases fabrication rewriting one of its own ini files can result in every newline being duplicated on windows causing the file to become s p r e a d o u t over time this likely has to do with windows r n newlines and as such can likely be reproduced on a linux system using
| 1
|
60,224
| 14,531,605,541
|
IssuesEvent
|
2020-12-14 21:03:17
|
hydrogen-dev/SDK
|
https://api.github.com/repos/hydrogen-dev/SDK
|
opened
|
CVE-2020-15250 (Medium) detected in junit-4.12.jar
|
security vulnerability
|
## CVE-2020-15250 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>junit-4.12.jar</b></p></summary>
<p>JUnit is a unit testing framework for Java, created by Erich Gamma and Kent Beck.</p>
<p>Library home page: <a href="http://junit.org">http://junit.org</a></p>
<p>Path to dependency file: SDK/atom/nucleus/java/build.gradle</p>
<p>Path to vulnerable library: canner/.m2/repository/junit/junit/4.12/junit-4.12.jar,SDK/integration/java/target/lib/junit-4.12.jar</p>
<p>
Dependency Hierarchy:
- :x: **junit-4.12.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/hydrogen-dev/SDK/commit/09b63e4979e6a3f5d08731809692a795c8d7b085">09b63e4979e6a3f5d08731809692a795c8d7b085</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. For Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. For Java 1.6 and lower users: no patch is available, you must use the workaround below. If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. For more information, including an example of vulnerable code, see the referenced GitHub Security Advisory.
<p>Publish Date: 2020-10-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15250>CVE-2020-15250</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp">https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: junit:junit:4.13.1</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"junit","packageName":"junit","packageVersion":"4.12","isTransitiveDependency":false,"dependencyTree":"junit:junit:4.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"junit:junit:4.13.1"}],"vulnerabilityIdentifier":"CVE-2020-15250","vulnerabilityDetails":"In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system\u0027s temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. For Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. For Java 1.6 and lower users: no patch is available, you must use the workaround below. If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. For more information, including an example of vulnerable code, see the referenced GitHub Security Advisory.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15250","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
|
True
|
CVE-2020-15250 (Medium) detected in junit-4.12.jar - ## CVE-2020-15250 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>junit-4.12.jar</b></p></summary>
<p>JUnit is a unit testing framework for Java, created by Erich Gamma and Kent Beck.</p>
<p>Library home page: <a href="http://junit.org">http://junit.org</a></p>
<p>Path to dependency file: SDK/atom/nucleus/java/build.gradle</p>
<p>Path to vulnerable library: canner/.m2/repository/junit/junit/4.12/junit-4.12.jar,SDK/integration/java/target/lib/junit-4.12.jar</p>
<p>
Dependency Hierarchy:
- :x: **junit-4.12.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/hydrogen-dev/SDK/commit/09b63e4979e6a3f5d08731809692a795c8d7b085">09b63e4979e6a3f5d08731809692a795c8d7b085</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. For Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. For Java 1.6 and lower users: no patch is available, you must use the workaround below. If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. For more information, including an example of vulnerable code, see the referenced GitHub Security Advisory.
<p>Publish Date: 2020-10-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15250>CVE-2020-15250</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp">https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: junit:junit:4.13.1</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"junit","packageName":"junit","packageVersion":"4.12","isTransitiveDependency":false,"dependencyTree":"junit:junit:4.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"junit:junit:4.13.1"}],"vulnerabilityIdentifier":"CVE-2020-15250","vulnerabilityDetails":"In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system\u0027s temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. For Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. For Java 1.6 and lower users: no patch is available, you must use the workaround below. If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. For more information, including an example of vulnerable code, see the referenced GitHub Security Advisory.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15250","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
|
non_defect
|
cve medium detected in junit jar cve medium severity vulnerability vulnerable library junit jar junit is a unit testing framework for java created by erich gamma and kent beck library home page a href path to dependency file sdk atom nucleus java build gradle path to vulnerable library canner repository junit junit junit jar sdk integration java target lib junit jar dependency hierarchy x junit jar vulnerable library found in head commit a href found in base branch master vulnerability details in from version and before the test rule temporaryfolder contains a local information disclosure vulnerability on unix like systems the system s temporary directory is shared between all users on that system because of this when files and directories are written into this directory they are by default readable by other users on that same system this vulnerability does not allow other users to overwrite the contents of these directories or files this is purely an information disclosure vulnerability this vulnerability impacts you if the junit tests write sensitive information like api keys or passwords into the temporary folder and the junit tests execute in an environment where the os has other untrusted users because certain jdk file system apis were only added in jdk this this fix is dependent upon the version of the jdk you are using for java and higher users this vulnerability is fixed in for java and lower users no patch is available you must use the workaround below if you are unable to patch or are stuck running on java specifying the java io tmpdir system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability for more information including an example of vulnerable code see the referenced github security advisory publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution junit junit check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails in from version and before the test rule temporaryfolder contains a local information disclosure vulnerability on unix like systems the system temporary directory is shared between all users on that system because of this when files and directories are written into this directory they are by default readable by other users on that same system this vulnerability does not allow other users to overwrite the contents of these directories or files this is purely an information disclosure vulnerability this vulnerability impacts you if the junit tests write sensitive information like api keys or passwords into the temporary folder and the junit tests execute in an environment where the os has other untrusted users because certain jdk file system apis were only added in jdk this this fix is dependent upon the version of the jdk you are using for java and higher users this vulnerability is fixed in for java and lower users no patch is available you must use the workaround below if you are unable to patch or are stuck running on java specifying the java io tmpdir system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability for more information including an example of vulnerable code see the referenced github security advisory vulnerabilityurl
| 0
|
50,089
| 13,187,322,670
|
IssuesEvent
|
2020-08-13 03:02:48
|
icecube-trac/tix3
|
https://api.github.com/repos/icecube-trac/tix3
|
closed
|
can't modify CMAKE_INSTALL_PREFIX in cache (Trac #105)
|
Migrated from Trac cmake defect
|
for instance, if your svn doesn't support --xml.
also make tarball w/o svn revision/metaproject should probably remind
that your svn is old as dog.
<details>
<summary>_Migrated from https://code.icecube.wisc.edu/ticket/105
, reported by troy and owned by troy_</summary>
<p>
```json
{
"status": "closed",
"changetime": "2007-11-09T22:24:40",
"description": "for instance, if your svn doesn't support --xml.\n\nalso make tarball w/o svn revision/metaproject should probably remind\nthat your svn is old as dog.\n\n ",
"reporter": "troy",
"cc": "",
"resolution": "fixed",
"_ts": "1194647080000000",
"component": "cmake",
"summary": "can't modify CMAKE_INSTALL_PREFIX in cache",
"priority": "normal",
"keywords": "",
"time": "2007-08-29T12:35:22",
"milestone": "",
"owner": "troy",
"type": "defect"
}
```
</p>
</details>
|
1.0
|
can't modify CMAKE_INSTALL_PREFIX in cache (Trac #105) - for instance, if your svn doesn't support --xml.
also make tarball w/o svn revision/metaproject should probably remind
that your svn is old as dog.
<details>
<summary>_Migrated from https://code.icecube.wisc.edu/ticket/105
, reported by troy and owned by troy_</summary>
<p>
```json
{
"status": "closed",
"changetime": "2007-11-09T22:24:40",
"description": "for instance, if your svn doesn't support --xml.\n\nalso make tarball w/o svn revision/metaproject should probably remind\nthat your svn is old as dog.\n\n ",
"reporter": "troy",
"cc": "",
"resolution": "fixed",
"_ts": "1194647080000000",
"component": "cmake",
"summary": "can't modify CMAKE_INSTALL_PREFIX in cache",
"priority": "normal",
"keywords": "",
"time": "2007-08-29T12:35:22",
"milestone": "",
"owner": "troy",
"type": "defect"
}
```
</p>
</details>
|
defect
|
can t modify cmake install prefix in cache trac for instance if your svn doesn t support xml also make tarball w o svn revision metaproject should probably remind that your svn is old as dog migrated from reported by troy and owned by troy json status closed changetime description for instance if your svn doesn t support xml n nalso make tarball w o svn revision metaproject should probably remind nthat your svn is old as dog n n reporter troy cc resolution fixed ts component cmake summary can t modify cmake install prefix in cache priority normal keywords time milestone owner troy type defect
| 1
|
46,585
| 13,055,940,575
|
IssuesEvent
|
2020-07-30 03:10:58
|
icecube-trac/tix2
|
https://api.github.com/repos/icecube-trac/tix2
|
opened
|
new release of icerec.IC2012-L3_Cascade (Trac #1509)
|
Incomplete Migration Migrated from Trac combo reconstruction defect
|
Migrated from https://code.icecube.wisc.edu/ticket/1509
```json
{
"status": "closed",
"changetime": "2016-03-18T21:14:15",
"description": "Need an updated version of IC2012-L3_Cascade for compatibility:\n\n{{{\nRuntimeError: Attempting to read version 2 from file but running version 1 of OMKey class. (in void OMKey::serialize(Archive&, unsigned int) [with Archive = boost::archive::portable_binary_iarchive])\n}}}\n\nThe patch is basically changeset:2067/IceTray",
"reporter": "david.schultz",
"cc": "yiqian.xu",
"resolution": "fixed",
"_ts": "1458335655846260",
"component": "combo reconstruction",
"summary": "new release of icerec.IC2012-L3_Cascade",
"priority": "blocker",
"keywords": "",
"time": "2016-01-13T22:27:03",
"milestone": "",
"owner": "olivas",
"type": "defect"
}
```
|
1.0
|
new release of icerec.IC2012-L3_Cascade (Trac #1509) - Migrated from https://code.icecube.wisc.edu/ticket/1509
```json
{
"status": "closed",
"changetime": "2016-03-18T21:14:15",
"description": "Need an updated version of IC2012-L3_Cascade for compatibility:\n\n{{{\nRuntimeError: Attempting to read version 2 from file but running version 1 of OMKey class. (in void OMKey::serialize(Archive&, unsigned int) [with Archive = boost::archive::portable_binary_iarchive])\n}}}\n\nThe patch is basically changeset:2067/IceTray",
"reporter": "david.schultz",
"cc": "yiqian.xu",
"resolution": "fixed",
"_ts": "1458335655846260",
"component": "combo reconstruction",
"summary": "new release of icerec.IC2012-L3_Cascade",
"priority": "blocker",
"keywords": "",
"time": "2016-01-13T22:27:03",
"milestone": "",
"owner": "olivas",
"type": "defect"
}
```
|
defect
|
new release of icerec cascade trac migrated from json status closed changetime description need an updated version of cascade for compatibility n n nruntimeerror attempting to read version from file but running version of omkey class in void omkey serialize archive unsigned int n n nthe patch is basically changeset icetray reporter david schultz cc yiqian xu resolution fixed ts component combo reconstruction summary new release of icerec cascade priority blocker keywords time milestone owner olivas type defect
| 1
|
52,037
| 12,842,181,492
|
IssuesEvent
|
2020-07-08 01:18:54
|
mapbox/mapbox-navigation-ios
|
https://api.github.com/repos/mapbox/mapbox-navigation-ios
|
closed
|
CarPlay example application crashes on launch — OHHTTPStubs not found
|
- build CarPlay
|
The CarPlay example application crashes on launch because of https://github.com/mapbox/mapbox-navigation-ios/pull/2405#discussion_r441197749:
```
dyld: Library not loaded: @rpath/OHHTTPStubs.framework/OHHTTPStubs
Referenced from: /path/to/Library/Developer/CoreSimulator/Devices/8CA16171-52BF-47D5-BC13-E534EA485DA9/data/Containers/Bundle/Application/63705271-E2A8-4697-A3E8-BD5B5EE617A4/Example-CarPlay.app/Example-CarPlay
Reason: image not found
```
The issue could be fixed by adding OHHTTPStubs.framework to the Embed Frameworks build phase of the Example-CarPlay target. However, the fix in #2375 was to remove the example applications’ dependency on OHHTTPStubs, because that debugging framework is only intended for test bundles, not applications. I think we should reremove it from what’s supposed to be a somewhat realistic application and find some other way to implement the automated test.
/cc @mapbox/navigation-ios
|
1.0
|
CarPlay example application crashes on launch — OHHTTPStubs not found - The CarPlay example application crashes on launch because of https://github.com/mapbox/mapbox-navigation-ios/pull/2405#discussion_r441197749:
```
dyld: Library not loaded: @rpath/OHHTTPStubs.framework/OHHTTPStubs
Referenced from: /path/to/Library/Developer/CoreSimulator/Devices/8CA16171-52BF-47D5-BC13-E534EA485DA9/data/Containers/Bundle/Application/63705271-E2A8-4697-A3E8-BD5B5EE617A4/Example-CarPlay.app/Example-CarPlay
Reason: image not found
```
The issue could be fixed by adding OHHTTPStubs.framework to the Embed Frameworks build phase of the Example-CarPlay target. However, the fix in #2375 was to remove the example applications’ dependency on OHHTTPStubs, because that debugging framework is only intended for test bundles, not applications. I think we should reremove it from what’s supposed to be a somewhat realistic application and find some other way to implement the automated test.
/cc @mapbox/navigation-ios
|
non_defect
|
carplay example application crashes on launch — ohhttpstubs not found the carplay example application crashes on launch because of dyld library not loaded rpath ohhttpstubs framework ohhttpstubs referenced from path to library developer coresimulator devices data containers bundle application example carplay app example carplay reason image not found the issue could be fixed by adding ohhttpstubs framework to the embed frameworks build phase of the example carplay target however the fix in was to remove the example applications’ dependency on ohhttpstubs because that debugging framework is only intended for test bundles not applications i think we should reremove it from what’s supposed to be a somewhat realistic application and find some other way to implement the automated test cc mapbox navigation ios
| 0
|
78,926
| 27,823,582,707
|
IssuesEvent
|
2023-03-19 14:12:15
|
cakephp/bake
|
https://api.github.com/repos/cakephp/bake
|
closed
|
Column with *_id not generating a `belongsTo` relation anymore.
|
defect
|
### Description
I guess this is a feature which was introduced recently. So if you e.g. have a table `articles` and a field `image_id`, the generated `ArticlesTable` no longer has a relation to `Images`, if there is not actually an `images` table in the database.
This "bug" was practical for my assets plugin which uses these "fake relations", as described here:
https://github.com/brandcom/cakephp-assets/tree/master#use-alibi-names
Is there any possibility to generate the relation code anyway, e.g. by using a flag when running the command? Could be something like `bin/cake bake model users --no-table-check` or something like that.
That would be great to opt in into the previous behaviour again.
### Bake Version
2.8.2
### PHP Version
4.4.11, php 8.1.1
|
1.0
|
Column with *_id not generating a `belongsTo` relation anymore. - ### Description
I guess this is a feature which was introduced recently. So if you e.g. have a table `articles` and a field `image_id`, the generated `ArticlesTable` no longer has a relation to `Images`, if there is not actually an `images` table in the database.
This "bug" was practical for my assets plugin which uses these "fake relations", as described here:
https://github.com/brandcom/cakephp-assets/tree/master#use-alibi-names
Is there any possibility to generate the relation code anyway, e.g. by using a flag when running the command? Could be something like `bin/cake bake model users --no-table-check` or something like that.
That would be great to opt in into the previous behaviour again.
### Bake Version
2.8.2
### PHP Version
4.4.11, php 8.1.1
|
defect
|
column with id not generating a belongsto relation anymore description i guess this is a feature which was introduced recently so if you e g have a table articles and a field image id the generated articlestable no longer has a relation to images if there is not actually an images table in the database this bug was practical for my assets plugin which uses these fake relations as described here is there any possibility to generate the relation code anyway e g by using a flag when running the command could be something like bin cake bake model users no table check or something like that that would be great to opt in into the previous behaviour again bake version php version php
| 1
|
5,545
| 2,610,189,653
|
IssuesEvent
|
2015-02-26 19:00:04
|
chrsmith/quchuseban
|
https://api.github.com/repos/chrsmith/quchuseban
|
opened
|
关注脸上的色斑怎样去除
|
auto-migrated Priority-Medium Type-Defect
|
```
《摘要》
踏着风的节奏,辗转于渺渺人生驿站,看人来人往、车水马��
�随风绝尘。匆匆的步伐,试图一点一滴叩开炫目峻冷世界的�
��壳。风起风落,花开花谢,梦想的心灯明明灭灭,举目所及
,仍是不曾相识的茫然。秋风乍起,倦怠许久的灵魂,再次��
�放逐在流浪的旅途。流浪因为不想寂寞,可是没有你的日子�
��怎么办,如果没有了色斑,你还会回来吗!脸上的色斑怎样
去除,
《客户案例》
色斑,也就是隐藏哎皮肤里面的一点黑色素,但是去除��
�斑可真不是件容易的事,我的祛斑之路走得可真辛苦。<br>
大家都知道,脸是女人展示自我风采与形象魅力的门户��
�是女人骄傲的资本。但是,如果一张白皙鲜亮,光彩照人的�
��满色斑,那么,你的生活将会受到怎样的影响。身上哪里有
什么毛病缺陷了可以多穿点遮挡上,可要是脸上长了斑,想��
�也无处遮掩的。天天照镜子,心情备受打击。那些顽固的色�
��真的就像在脸上安了家一样,就下不去。自信心备受打击,
工作、生活、爱情一团糟。<br>
我为这张色斑脸花了多少钱,伤了多少心,谁叫面子的��
�太重要呢。可是往往都有一个共同的体会,就是怎么治痘治�
��好,想靠化妆品遮盖住,可是那厚厚的妆也够恶心的了。<br
>
自从我了「黛芙薇尔精华液」,一切都改变了。「黛芙��
�尔精华液」,真的是让我重新换了面孔做人啊。以前脸上的�
��斑是密密麻麻的,两颊颜色特别深,鼻梁也有一大块,甚至
脖子也有了。我刚三十二岁,还没到更年期呢,这应该不是��
�老年斑,我记得我在十几岁的时候就开始有了,加上用了不�
��祛斑产品,结果愈演愈烈,到三十出头的时候就不可收拾了
。<br>
我开始订购「黛芙薇尔精华液」的时候也没抱太大希望��
�只是想,那么多人都可以起作用我不会那么背吧?一个月后,
发现脸上的斑点确实淡了很多,大的斑块也变小了,脸颊的��
�色也没有那么黑了。一个套装完后,脸上的斑点已经消失过�
��,脖子上的斑斑点点也没那么明显了。看到效果了,信心百
倍,又订了两个周期的,完后,我的脸就恢复正常肤色了,��
�点几乎都看不见了,皮肤变白变亮,而且更光滑了。等下个�
��发了工资我准备再订购一个周期巩固一下呢!
阅读了脸上的色斑怎样去除,再看脸上容易长斑的原因:
《色斑形成原因》
内部因素
一、压力
当人受到压力时,就会分泌肾上腺素,为对付压力而做��
�备。如果长期受到压力,人体新陈代谢的平衡就会遭到破坏�
��皮肤所需的营养供应趋于缓慢,色素母细胞就会变得很活跃
。
二、荷尔蒙分泌失调
避孕药里所含的女性荷尔蒙雌激素,会刺激麦拉宁细胞��
�分泌而形成不均匀的斑点,因避孕药而形成的斑点,虽然在�
��药中断后会停止,但仍会在皮肤上停留很长一段时间。怀孕
中因女性荷尔蒙雌激素的增加,从怀孕4—5个月开始会容易出
现斑,这时候出现的斑点在产后大部分会消失。可是,新陈��
�谢不正常、肌肤裸露在强烈的紫外线下、精神上受到压力等�
��因,都会使斑加深。有时新长出的斑,产后也不会消失,所
以需要更加注意。
三、新陈代谢缓慢
肝的新陈代谢功能不正常或卵巢功能减退时也会出现斑��
�因为新陈代谢不顺畅、或内分泌失调,使身体处于敏感状态�
��,从而加剧色素问题。我们常说的便秘会形成斑,其实就是
内分泌失调导致过敏体质而形成的。另外,身体状态不正常��
�时候,紫外线的照射也会加速斑的形成。
四、错误的使用化妆品
使用了不适合自己皮肤的化妆品,会导致皮肤过敏。在��
�疗的过程中如过量照射到紫外线,皮肤会为了抵御外界的侵�
��,在有炎症的部位聚集麦拉宁色素,这样会出现色素沉着的
问题。
外部因素
一、紫外线
照射紫外线的时候,人体为了保护皮肤,会在基底层产��
�很多麦拉宁色素。所以为了保护皮肤,会在敏感部位聚集更�
��的色素。经常裸露在强烈的阳光底下不仅促进皮肤的老化,
还会引起黑斑、雀斑等色素沉着的皮肤疾患。
二、不良的清洁习惯
因强烈的清洁习惯使皮肤变得敏感,这样会刺激皮肤。��
�皮肤敏感时,人体为了保护皮肤,黑色素细胞会分泌很多麦�
��宁色素,当色素过剩时就出现了斑、瑕疵等皮肤色素沉着的
问题。
三、遗传基因
父母中有长斑的,则本人长斑的概率就很高,这种情况��
�一定程度上就可判定是遗传基因的作用。所以家里特别是长�
��有长斑的人,要注意避免引发长斑的重要因素之一——紫外
线照射,这是预防斑必须注意的。
《有疑问帮你解决》
1,黛芙薇尔精华液真的有效果吗?真的可以把脸上的黄褐��
�去掉吗?
答:黛芙薇尔精华液DNA精华能够有效的修复周围难以触��
�的色斑,其独有的纳豆成分为皮肤的美白与靓丽,提供了必�
��可少的营养物质,可以有效的去除黄褐斑,黄褐斑,黄褐斑
,蝴蝶斑,晒斑、妊娠斑等。它它完全突破了传统的美肤时��
�,宛如在皮肤中注入了一杯兼具活化、再生、滋养等功效的�
��尾酒,同时为脸部提供大量有机维生素精华,脸部的改变显
而易见。自产品上市以来,老顾客纷纷介绍新顾客,71%的新��
�客都是通过老顾客介绍而来,口碑由此而来!
2,服用黛芙薇尔美白,会伤身体吗?有副作用吗?
答:黛芙薇尔精华液应用了精纯复合配方和领先的分类��
�斑科技,并将“DNA美肤系统”疗法应用到了该产品中,能彻�
��祛除黄褐斑,蝴蝶斑,妊娠斑,晒斑,黄褐斑,老年斑,有
效淡化黄褐斑至接近肤色。黛芙薇尔通过法国、美国、台湾��
�地的专家通力协作,超过10年的研究以全新的DNA肌肤修复技��
�,挑战传统化学护肤理念,不懈追寻发现破译大自然的美丽�
��迹,令每一位爱美的女性都能享受到科技创新所带来的自然
之美。
专为亚洲女性肤质研制,精心呵护女性美丽,多年来,为数��
�百万计的女性解除了黄褐斑困扰。深得广大女性朋友的信赖!
3,去除黄褐斑之后,会反弹吗?
答:很多曾经长了黄褐斑的人士,自从选择了黛芙薇尔��
�白,就一劳永逸。这款祛斑产品是经过数十位权威祛斑专家�
��据斑的形成原因精心研制而成用事实说话,让消费者打分。
树立权威品牌!我们的很多新客户都是老客户介绍而来,请问�
��如果效果不好,会有客户转介绍吗?
4,你们的价格有点贵,能不能便宜一点?
答:如果您使用西药最少需要2000元,煎服的药最少需要3
000元,做手术最少是5000元,而这些毫无疑问,不会对彻底去�
��你的斑点有任何帮助!一分价钱,一份价值,我们现在做的��
�是一个口碑,一个品牌,价钱并不高。如果花这点钱把你的�
��褐斑彻底去除,你还会觉得贵吗?你还会再去花那么多冤枉��
�,不但斑没去掉,还把自己的皮肤弄的越来越糟吗
5,我适合用黛芙薇尔精华液吗?
答:黛芙薇尔适用人群:
1、生理紊乱引起的黄褐斑人群
2、生育引起的妊娠斑人群
3、年纪增长引起的老年斑人群
4、化妆品色素沉积、辐射斑人群
5、长期日照引起的日晒斑人群
6、肌肤暗淡急需美白的人群
《祛斑小方法》
脸上的色斑怎样去除,同时为您分享祛斑小方法
西瓜面膜
西瓜可去油脂,改善皮肤出油状况。
材料:吃剩的西瓜(几片)。
做法:把西瓜的果肉剔除,露出青色的果皮,敷在脸上5-10��
�钟再洗干净。
注意:
敷完脸后记得洗干净脸皮上西瓜留下的甜味,否则可能会吸��
�小蚂蚁来野餐。
南瓜番茄胡萝卜汤
用料:南瓜220克,番茄110克,胡萝卜110克,瘦猪肉100克,生��
�15克,调料适量。
做法:上料洗净后加水煮汤,瓜熟烂即可。
食法:吃菜喝汤,每日1剂。30日为一疗程。
功效:除黑斑,美肌肤。
```
-----
Original issue reported on code.google.com by `additive...@gmail.com` on 1 Jul 2014 at 4:47
|
1.0
|
关注脸上的色斑怎样去除 - ```
《摘要》
踏着风的节奏,辗转于渺渺人生驿站,看人来人往、车水马��
�随风绝尘。匆匆的步伐,试图一点一滴叩开炫目峻冷世界的�
��壳。风起风落,花开花谢,梦想的心灯明明灭灭,举目所及
,仍是不曾相识的茫然。秋风乍起,倦怠许久的灵魂,再次��
�放逐在流浪的旅途。流浪因为不想寂寞,可是没有你的日子�
��怎么办,如果没有了色斑,你还会回来吗!脸上的色斑怎样
去除,
《客户案例》
色斑,也就是隐藏哎皮肤里面的一点黑色素,但是去除��
�斑可真不是件容易的事,我的祛斑之路走得可真辛苦。<br>
大家都知道,脸是女人展示自我风采与形象魅力的门户��
�是女人骄傲的资本。但是,如果一张白皙鲜亮,光彩照人的�
��满色斑,那么,你的生活将会受到怎样的影响。身上哪里有
什么毛病缺陷了可以多穿点遮挡上,可要是脸上长了斑,想��
�也无处遮掩的。天天照镜子,心情备受打击。那些顽固的色�
��真的就像在脸上安了家一样,就下不去。自信心备受打击,
工作、生活、爱情一团糟。<br>
我为这张色斑脸花了多少钱,伤了多少心,谁叫面子的��
�太重要呢。可是往往都有一个共同的体会,就是怎么治痘治�
��好,想靠化妆品遮盖住,可是那厚厚的妆也够恶心的了。<br
>
自从我了「黛芙薇尔精华液」,一切都改变了。「黛芙��
�尔精华液」,真的是让我重新换了面孔做人啊。以前脸上的�
��斑是密密麻麻的,两颊颜色特别深,鼻梁也有一大块,甚至
脖子也有了。我刚三十二岁,还没到更年期呢,这应该不是��
�老年斑,我记得我在十几岁的时候就开始有了,加上用了不�
��祛斑产品,结果愈演愈烈,到三十出头的时候就不可收拾了
。<br>
我开始订购「黛芙薇尔精华液」的时候也没抱太大希望��
�只是想,那么多人都可以起作用我不会那么背吧?一个月后,
发现脸上的斑点确实淡了很多,大的斑块也变小了,脸颊的��
�色也没有那么黑了。一个套装完后,脸上的斑点已经消失过�
��,脖子上的斑斑点点也没那么明显了。看到效果了,信心百
倍,又订了两个周期的,完后,我的脸就恢复正常肤色了,��
�点几乎都看不见了,皮肤变白变亮,而且更光滑了。等下个�
��发了工资我准备再订购一个周期巩固一下呢!
阅读了脸上的色斑怎样去除,再看脸上容易长斑的原因:
《色斑形成原因》
内部因素
一、压力
当人受到压力时,就会分泌肾上腺素,为对付压力而做��
�备。如果长期受到压力,人体新陈代谢的平衡就会遭到破坏�
��皮肤所需的营养供应趋于缓慢,色素母细胞就会变得很活跃
。
二、荷尔蒙分泌失调
避孕药里所含的女性荷尔蒙雌激素,会刺激麦拉宁细胞��
�分泌而形成不均匀的斑点,因避孕药而形成的斑点,虽然在�
��药中断后会停止,但仍会在皮肤上停留很长一段时间。怀孕
中因女性荷尔蒙雌激素的增加,从怀孕4—5个月开始会容易出
现斑,这时候出现的斑点在产后大部分会消失。可是,新陈��
�谢不正常、肌肤裸露在强烈的紫外线下、精神上受到压力等�
��因,都会使斑加深。有时新长出的斑,产后也不会消失,所
以需要更加注意。
三、新陈代谢缓慢
肝的新陈代谢功能不正常或卵巢功能减退时也会出现斑��
�因为新陈代谢不顺畅、或内分泌失调,使身体处于敏感状态�
��,从而加剧色素问题。我们常说的便秘会形成斑,其实就是
内分泌失调导致过敏体质而形成的。另外,身体状态不正常��
�时候,紫外线的照射也会加速斑的形成。
四、错误的使用化妆品
使用了不适合自己皮肤的化妆品,会导致皮肤过敏。在��
�疗的过程中如过量照射到紫外线,皮肤会为了抵御外界的侵�
��,在有炎症的部位聚集麦拉宁色素,这样会出现色素沉着的
问题。
外部因素
一、紫外线
照射紫外线的时候,人体为了保护皮肤,会在基底层产��
�很多麦拉宁色素。所以为了保护皮肤,会在敏感部位聚集更�
��的色素。经常裸露在强烈的阳光底下不仅促进皮肤的老化,
还会引起黑斑、雀斑等色素沉着的皮肤疾患。
二、不良的清洁习惯
因强烈的清洁习惯使皮肤变得敏感,这样会刺激皮肤。��
�皮肤敏感时,人体为了保护皮肤,黑色素细胞会分泌很多麦�
��宁色素,当色素过剩时就出现了斑、瑕疵等皮肤色素沉着的
问题。
三、遗传基因
父母中有长斑的,则本人长斑的概率就很高,这种情况��
�一定程度上就可判定是遗传基因的作用。所以家里特别是长�
��有长斑的人,要注意避免引发长斑的重要因素之一——紫外
线照射,这是预防斑必须注意的。
《有疑问帮你解决》
1,黛芙薇尔精华液真的有效果吗?真的可以把脸上的黄褐��
�去掉吗?
答:黛芙薇尔精华液DNA精华能够有效的修复周围难以触��
�的色斑,其独有的纳豆成分为皮肤的美白与靓丽,提供了必�
��可少的营养物质,可以有效的去除黄褐斑,黄褐斑,黄褐斑
,蝴蝶斑,晒斑、妊娠斑等。它它完全突破了传统的美肤时��
�,宛如在皮肤中注入了一杯兼具活化、再生、滋养等功效的�
��尾酒,同时为脸部提供大量有机维生素精华,脸部的改变显
而易见。自产品上市以来,老顾客纷纷介绍新顾客,71%的新��
�客都是通过老顾客介绍而来,口碑由此而来!
2,服用黛芙薇尔美白,会伤身体吗?有副作用吗?
答:黛芙薇尔精华液应用了精纯复合配方和领先的分类��
�斑科技,并将“DNA美肤系统”疗法应用到了该产品中,能彻�
��祛除黄褐斑,蝴蝶斑,妊娠斑,晒斑,黄褐斑,老年斑,有
效淡化黄褐斑至接近肤色。黛芙薇尔通过法国、美国、台湾��
�地的专家通力协作,超过10年的研究以全新的DNA肌肤修复技��
�,挑战传统化学护肤理念,不懈追寻发现破译大自然的美丽�
��迹,令每一位爱美的女性都能享受到科技创新所带来的自然
之美。
专为亚洲女性肤质研制,精心呵护女性美丽,多年来,为数��
�百万计的女性解除了黄褐斑困扰。深得广大女性朋友的信赖!
3,去除黄褐斑之后,会反弹吗?
答:很多曾经长了黄褐斑的人士,自从选择了黛芙薇尔��
�白,就一劳永逸。这款祛斑产品是经过数十位权威祛斑专家�
��据斑的形成原因精心研制而成用事实说话,让消费者打分。
树立权威品牌!我们的很多新客户都是老客户介绍而来,请问�
��如果效果不好,会有客户转介绍吗?
4,你们的价格有点贵,能不能便宜一点?
答:如果您使用西药最少需要2000元,煎服的药最少需要3
000元,做手术最少是5000元,而这些毫无疑问,不会对彻底去�
��你的斑点有任何帮助!一分价钱,一份价值,我们现在做的��
�是一个口碑,一个品牌,价钱并不高。如果花这点钱把你的�
��褐斑彻底去除,你还会觉得贵吗?你还会再去花那么多冤枉��
�,不但斑没去掉,还把自己的皮肤弄的越来越糟吗
5,我适合用黛芙薇尔精华液吗?
答:黛芙薇尔适用人群:
1、生理紊乱引起的黄褐斑人群
2、生育引起的妊娠斑人群
3、年纪增长引起的老年斑人群
4、化妆品色素沉积、辐射斑人群
5、长期日照引起的日晒斑人群
6、肌肤暗淡急需美白的人群
《祛斑小方法》
脸上的色斑怎样去除,同时为您分享祛斑小方法
西瓜面膜
西瓜可去油脂,改善皮肤出油状况。
材料:吃剩的西瓜(几片)。
做法:把西瓜的果肉剔除,露出青色的果皮,敷在脸上5-10��
�钟再洗干净。
注意:
敷完脸后记得洗干净脸皮上西瓜留下的甜味,否则可能会吸��
�小蚂蚁来野餐。
南瓜番茄胡萝卜汤
用料:南瓜220克,番茄110克,胡萝卜110克,瘦猪肉100克,生��
�15克,调料适量。
做法:上料洗净后加水煮汤,瓜熟烂即可。
食法:吃菜喝汤,每日1剂。30日为一疗程。
功效:除黑斑,美肌肤。
```
-----
Original issue reported on code.google.com by `additive...@gmail.com` on 1 Jul 2014 at 4:47
|
defect
|
关注脸上的色斑怎样去除 《摘要》 踏着风的节奏,辗转于渺渺人生驿站,看人来人往、车水马�� �随风绝尘。匆匆的步伐,试图一点一滴叩开炫目峻冷世界的� ��壳。风起风落,花开花谢,梦想的心灯明明灭灭,举目所及 ,仍是不曾相识的茫然。秋风乍起,倦怠许久的灵魂,再次�� �放逐在流浪的旅途。流浪因为不想寂寞,可是没有你的日子� ��怎么办,如果没有了色斑,你还会回来吗!脸上的色斑怎样 去除, 《客户案例》 色斑,也就是隐藏哎皮肤里面的一点黑色素,但是去除�� �斑可真不是件容易的事,我的祛斑之路走得可真辛苦。 大家都知道,脸是女人展示自我风采与形象魅力的门户�� �是女人骄傲的资本。但是,如果一张白皙鲜亮,光彩照人的� ��满色斑,那么,你的生活将会受到怎样的影响。身上哪里有 什么毛病缺陷了可以多穿点遮挡上,可要是脸上长了斑,想�� �也无处遮掩的。天天照镜子,心情备受打击。那些顽固的色� ��真的就像在脸上安了家一样,就下不去。自信心备受打击, 工作、生活、爱情一团糟。 我为这张色斑脸花了多少钱,伤了多少心,谁叫面子的�� �太重要呢。可是往往都有一个共同的体会,就是怎么治痘治� ��好,想靠化妆品遮盖住,可是那厚厚的妆也够恶心的了。 br 自从我了「黛芙薇尔精华液」,一切都改变了。「黛芙�� �尔精华液」,真的是让我重新换了面孔做人啊。以前脸上的� ��斑是密密麻麻的,两颊颜色特别深,鼻梁也有一大块,甚至 脖子也有了。我刚三十二岁,还没到更年期呢,这应该不是�� �老年斑,我记得我在十几岁的时候就开始有了,加上用了不� ��祛斑产品,结果愈演愈烈,到三十出头的时候就不可收拾了 。 我开始订购「黛芙薇尔精华液」的时候也没抱太大希望�� �只是想,那么多人都可以起作用我不会那么背吧 一个月后, 发现脸上的斑点确实淡了很多,大的斑块也变小了,脸颊的�� �色也没有那么黑了。一个套装完后,脸上的斑点已经消失过� ��,脖子上的斑斑点点也没那么明显了。看到效果了,信心百 倍,又订了两个周期的,完后,我的脸就恢复正常肤色了,�� �点几乎都看不见了,皮肤变白变亮,而且更光滑了。等下个� ��发了工资我准备再订购一个周期巩固一下呢 阅读了脸上的色斑怎样去除,再看脸上容易长斑的原因: 《色斑形成原因》 内部因素 一、压力 当人受到压力时,就会分泌肾上腺素,为对付压力而做�� �备。如果长期受到压力,人体新陈代谢的平衡就会遭到破坏� ��皮肤所需的营养供应趋于缓慢,色素母细胞就会变得很活跃 。 二、荷尔蒙分泌失调 避孕药里所含的女性荷尔蒙雌激素,会刺激麦拉宁细胞�� �分泌而形成不均匀的斑点,因避孕药而形成的斑点,虽然在� ��药中断后会停止,但仍会在皮肤上停留很长一段时间。怀孕 中因女性荷尔蒙雌激素的增加, — 现斑,这时候出现的斑点在产后大部分会消失。可是,新陈�� �谢不正常、肌肤裸露在强烈的紫外线下、精神上受到压力等� ��因,都会使斑加深。有时新长出的斑,产后也不会消失,所 以需要更加注意。 三、新陈代谢缓慢 肝的新陈代谢功能不正常或卵巢功能减退时也会出现斑�� �因为新陈代谢不顺畅、或内分泌失调,使身体处于敏感状态� ��,从而加剧色素问题。我们常说的便秘会形成斑,其实就是 内分泌失调导致过敏体质而形成的。另外,身体状态不正常�� �时候,紫外线的照射也会加速斑的形成。 四、错误的使用化妆品 使用了不适合自己皮肤的化妆品,会导致皮肤过敏。在�� �疗的过程中如过量照射到紫外线,皮肤会为了抵御外界的侵� ��,在有炎症的部位聚集麦拉宁色素,这样会出现色素沉着的 问题。 外部因素 一、紫外线 照射紫外线的时候,人体为了保护皮肤,会在基底层产�� �很多麦拉宁色素。所以为了保护皮肤,会在敏感部位聚集更� ��的色素。经常裸露在强烈的阳光底下不仅促进皮肤的老化, 还会引起黑斑、雀斑等色素沉着的皮肤疾患。 二、不良的清洁习惯 因强烈的清洁习惯使皮肤变得敏感,这样会刺激皮肤。�� �皮肤敏感时,人体为了保护皮肤,黑色素细胞会分泌很多麦� ��宁色素,当色素过剩时就出现了斑、瑕疵等皮肤色素沉着的 问题。 三、遗传基因 父母中有长斑的,则本人长斑的概率就很高,这种情况�� �一定程度上就可判定是遗传基因的作用。所以家里特别是长� ��有长斑的人,要注意避免引发长斑的重要因素之一——紫外 线照射,这是预防斑必须注意的。 《有疑问帮你解决》 黛芙薇尔精华液真的有效果吗 真的可以把脸上的黄褐�� �去掉吗 答:黛芙薇尔精华液dna精华能够有效的修复周围难以触�� �的色斑,其独有的纳豆成分为皮肤的美白与靓丽,提供了必� ��可少的营养物质,可以有效的去除黄褐斑,黄褐斑,黄褐斑 ,蝴蝶斑,晒斑、妊娠斑等。它它完全突破了传统的美肤时�� �,宛如在皮肤中注入了一杯兼具活化、再生、滋养等功效的� ��尾酒,同时为脸部提供大量有机维生素精华,脸部的改变显 而易见。自产品上市以来,老顾客纷纷介绍新顾客, 的新�� �客都是通过老顾客介绍而来,口碑由此而来 ,服用黛芙薇尔美白,会伤身体吗 有副作用吗 答:黛芙薇尔精华液应用了精纯复合配方和领先的分类�� �斑科技,并将“dna美肤系统”疗法应用到了该产品中,能彻� ��祛除黄褐斑,蝴蝶斑,妊娠斑,晒斑,黄褐斑,老年斑,有 效淡化黄褐斑至接近肤色。黛芙薇尔通过法国、美国、台湾�� �地的专家通力协作, �� �,挑战传统化学护肤理念,不懈追寻发现破译大自然的美丽� ��迹,令每一位爱美的女性都能享受到科技创新所带来的自然 之美。 专为亚洲女性肤质研制,精心呵护女性美丽,多年来,为数�� �百万计的女性解除了黄褐斑困扰。深得广大女性朋友的信赖 ,去除黄褐斑之后,会反弹吗 答:很多曾经长了黄褐斑的人士,自从选择了黛芙薇尔�� �白,就一劳永逸。这款祛斑产品是经过数十位权威祛斑专家� ��据斑的形成原因精心研制而成用事实说话,让消费者打分。 树立权威品牌 我们的很多新客户都是老客户介绍而来,请问� ��如果效果不好,会有客户转介绍吗 ,你们的价格有点贵,能不能便宜一点 答: , , ,而这些毫无疑问,不会对彻底去� ��你的斑点有任何帮助 一分价钱,一份价值,我们现在做的�� �是一个口碑,一个品牌,价钱并不高。如果花这点钱把你的� ��褐斑彻底去除,你还会觉得贵吗 你还会再去花那么多冤枉�� �,不但斑没去掉,还把自己的皮肤弄的越来越糟吗 ,我适合用黛芙薇尔精华液吗 答:黛芙薇尔适用人群: 、生理紊乱引起的黄褐斑人群 、生育引起的妊娠斑人群 、年纪增长引起的老年斑人群 、化妆品色素沉积、辐射斑人群 、长期日照引起的日晒斑人群 、肌肤暗淡急需美白的人群 《祛斑小方法》 脸上的色斑怎样去除,同时为您分享祛斑小方法 西瓜面膜 西瓜可去油脂,改善皮肤出油状况。 材料:吃剩的西瓜(几片)。 做法:把西瓜的果肉剔除,露出青色的果皮, - �� �钟再洗干净。 注意: 敷完脸后记得洗干净脸皮上西瓜留下的甜味,否则可能会吸�� �小蚂蚁来野餐。 南瓜番茄胡萝卜汤 用料: , , , ,生�� � ,调料适量。 做法:上料洗净后加水煮汤,瓜熟烂即可。 食法:吃菜喝汤, 。 。 功效:除黑斑,美肌肤。 original issue reported on code google com by additive gmail com on jul at
| 1
|
21,423
| 3,507,146,612
|
IssuesEvent
|
2016-01-08 11:31:08
|
scipy/scipy
|
https://api.github.com/repos/scipy/scipy
|
closed
|
scipy.stats.ttest_ind_from_stats does not accept arrays
|
defect easy-fix scipy.stats
|
the use of float in the denominator prevents using arrays
Reproduce via:
```
In [158]: import scipy
In [159]: scipy.__version__
Out[159]: '0.16.1'
In [160]: from scipy.stats import ttest_ind_from_stats
In [161]: ttest_ind_from_stats(np.array([1., 2.]), np.array([.5, .3]), np.array([130, 140]), np.array([3., 4.]), np.array([.4, .5]), np.array([100, 150]))
---------------------------------------------------------------------------
TypeError Traceback (most recent call last)
<ipython-input-161-9db73ee48a1a> in <module>()
----> 1 ttest_ind_from_stats(np.array([1., 2.]), np.array([.5, .3]), np.array([130, 140]), np.array([3., 4.]), np.array([.4, .5]), np.array([100, 150]))
/Library/Python/2.7/site-packages/scipy/stats/stats.pyc in ttest_ind_from_stats(mean1, std1, nobs1, mean2, std2, nobs2, equal_var)
3465 """
3466 if equal_var:
-> 3467 df, denom = _equal_var_ttest_denom(std1**2, nobs1, std2**2, nobs2)
3468 else:
3469 df, denom = _unequal_var_ttest_denom(std1**2, nobs1,
/Library/Python/2.7/site-packages/scipy/stats/stats.pyc in _equal_var_ttest_denom(v1, n1, v2, n2)
3406 def _equal_var_ttest_denom(v1, n1, v2, n2):
3407 df = n1 + n2 - 2
-> 3408 svar = ((n1 - 1) * v1 + (n2 - 1) * v2) / float(df)
3409 denom = np.sqrt(svar * (1.0 / n1 + 1.0 / n2))
3410 return df, denom
TypeError: only length-1 arrays can be converted to Python scalars
```
|
1.0
|
scipy.stats.ttest_ind_from_stats does not accept arrays - the use of float in the denominator prevents using arrays
Reproduce via:
```
In [158]: import scipy
In [159]: scipy.__version__
Out[159]: '0.16.1'
In [160]: from scipy.stats import ttest_ind_from_stats
In [161]: ttest_ind_from_stats(np.array([1., 2.]), np.array([.5, .3]), np.array([130, 140]), np.array([3., 4.]), np.array([.4, .5]), np.array([100, 150]))
---------------------------------------------------------------------------
TypeError Traceback (most recent call last)
<ipython-input-161-9db73ee48a1a> in <module>()
----> 1 ttest_ind_from_stats(np.array([1., 2.]), np.array([.5, .3]), np.array([130, 140]), np.array([3., 4.]), np.array([.4, .5]), np.array([100, 150]))
/Library/Python/2.7/site-packages/scipy/stats/stats.pyc in ttest_ind_from_stats(mean1, std1, nobs1, mean2, std2, nobs2, equal_var)
3465 """
3466 if equal_var:
-> 3467 df, denom = _equal_var_ttest_denom(std1**2, nobs1, std2**2, nobs2)
3468 else:
3469 df, denom = _unequal_var_ttest_denom(std1**2, nobs1,
/Library/Python/2.7/site-packages/scipy/stats/stats.pyc in _equal_var_ttest_denom(v1, n1, v2, n2)
3406 def _equal_var_ttest_denom(v1, n1, v2, n2):
3407 df = n1 + n2 - 2
-> 3408 svar = ((n1 - 1) * v1 + (n2 - 1) * v2) / float(df)
3409 denom = np.sqrt(svar * (1.0 / n1 + 1.0 / n2))
3410 return df, denom
TypeError: only length-1 arrays can be converted to Python scalars
```
|
defect
|
scipy stats ttest ind from stats does not accept arrays the use of float in the denominator prevents using arrays reproduce via in import scipy in scipy version out in from scipy stats import ttest ind from stats in ttest ind from stats np array np array np array np array np array np array typeerror traceback most recent call last in ttest ind from stats np array np array np array np array np array np array library python site packages scipy stats stats pyc in ttest ind from stats equal var if equal var df denom equal var ttest denom else df denom unequal var ttest denom library python site packages scipy stats stats pyc in equal var ttest denom def equal var ttest denom df svar float df denom np sqrt svar return df denom typeerror only length arrays can be converted to python scalars
| 1
|
76,251
| 26,332,417,429
|
IssuesEvent
|
2023-01-10 11:52:16
|
jOOQ/jOOQ
|
https://api.github.com/repos/jOOQ/jOOQ
|
closed
|
Support parsing ALL keyword in aggregate functions
|
T: Defect P: Medium R: Fixed E: All Editions C: Parser
|
This is valid in Db2 (and probably others, since its standard SQL):
```sql
select listagg(all 1) within group (order by 2)
from sysibm.dual
```
But our parser rejects it:
```
Token ')' expected: [1:20] select listagg(all [*]1) within group (order by 2)
from sysibm.dual
```
Other aggregate functions also allow the `ALL` keyword, e.g.
```sql
select min(all 1)
```
|
1.0
|
Support parsing ALL keyword in aggregate functions - This is valid in Db2 (and probably others, since its standard SQL):
```sql
select listagg(all 1) within group (order by 2)
from sysibm.dual
```
But our parser rejects it:
```
Token ')' expected: [1:20] select listagg(all [*]1) within group (order by 2)
from sysibm.dual
```
Other aggregate functions also allow the `ALL` keyword, e.g.
```sql
select min(all 1)
```
|
defect
|
support parsing all keyword in aggregate functions this is valid in and probably others since its standard sql sql select listagg all within group order by from sysibm dual but our parser rejects it token expected select listagg all within group order by from sysibm dual other aggregate functions also allow the all keyword e g sql select min all
| 1
|
30,614
| 6,193,972,551
|
IssuesEvent
|
2017-07-05 08:45:20
|
contao/core-bundle
|
https://api.github.com/repos/contao/core-bundle
|
closed
|
Layout looks weird on the maintenance page in 4.4.0
|
defect
|
When the window (or screen) is higher than the content on the maintenance page, the 'Purge data' section is sticked at the bottom and there is a gap to the 'Rebuild the search index' section:

Another problem is the position of the message when purging the data. The message is shown in the 'Rebuild the search index' section:

|
1.0
|
Layout looks weird on the maintenance page in 4.4.0 - When the window (or screen) is higher than the content on the maintenance page, the 'Purge data' section is sticked at the bottom and there is a gap to the 'Rebuild the search index' section:

Another problem is the position of the message when purging the data. The message is shown in the 'Rebuild the search index' section:

|
defect
|
layout looks weird on the maintenance page in when the window or screen is higher than the content on the maintenance page the purge data section is sticked at the bottom and there is a gap to the rebuild the search index section another problem is the position of the message when purging the data the message is shown in the rebuild the search index section
| 1
|
48,181
| 25,394,983,542
|
IssuesEvent
|
2022-11-22 07:56:35
|
StackStorm/st2
|
https://api.github.com/repos/StackStorm/st2
|
closed
|
Mongodb slow query
|
performance
|
## SUMMARY
Mongodb slow query
### STACKSTORM VERSION
st2 3.7.8, on python 3.8.10
##### OS, environment, install method
docker deployment
## Steps to reproduce the problem
When I input 20,000 pieces of data at a time in a short time, the problem of slow query by mongodb occurs. It takes more than ten seconds to read a piece of data. The cpu of the host where the mongodb container is located is 32G, the memory is 128G, and the utilization rate is not high.
The remaining 80% cpu.

Memory remaining 90%

Query time

Size and number of action _ execution _ scheduling _ queue _ item _ d _ b tables
<img width="474" alt="3f0eb2c465156d3ef40d50ea3e55a01" src="https://user-images.githubusercontent.com/30886624/201831024-40f2584f-5168-419a-b5f5-9c40138002b3.png">
## Expected Results
Mongo read time is reduced so that I can run more action.
## Actual Results
I entered 20,000 pieces of data into the playbook.
Thanks!
|
True
|
Mongodb slow query - ## SUMMARY
Mongodb slow query
### STACKSTORM VERSION
st2 3.7.8, on python 3.8.10
##### OS, environment, install method
docker deployment
## Steps to reproduce the problem
When I input 20,000 pieces of data at a time in a short time, the problem of slow query by mongodb occurs. It takes more than ten seconds to read a piece of data. The cpu of the host where the mongodb container is located is 32G, the memory is 128G, and the utilization rate is not high.
The remaining 80% cpu.

Memory remaining 90%

Query time

Size and number of action _ execution _ scheduling _ queue _ item _ d _ b tables
<img width="474" alt="3f0eb2c465156d3ef40d50ea3e55a01" src="https://user-images.githubusercontent.com/30886624/201831024-40f2584f-5168-419a-b5f5-9c40138002b3.png">
## Expected Results
Mongo read time is reduced so that I can run more action.
## Actual Results
I entered 20,000 pieces of data into the playbook.
Thanks!
|
non_defect
|
mongodb slow query summary mongodb slow query stackstorm version on python os environment install method docker deployment steps to reproduce the problem when i input pieces of data at a time in a short time the problem of slow query by mongodb occurs it takes more than ten seconds to read a piece of data the cpu of the host where the mongodb container is located is the memory is and the utilization rate is not high the remaining cpu memory remaining query time size and number of action execution scheduling queue item d b tables img width alt src expected results mongo read time is reduced so that i can run more action actual results i entered pieces of data into the playbook thanks
| 0
|
79,901
| 29,508,998,278
|
IssuesEvent
|
2023-06-03 17:26:19
|
vector-im/element-ios
|
https://api.github.com/repos/vector-im/element-ios
|
opened
|
Syncing icon never goes away
|
T-Defect
|
### Steps to reproduce
Click on a room or DM. The syncing icon with the loading wheel is present on the top. Even though everything is loading, it will remain there indefinitely. To fix it, you back out of the chat and go into it again. The syncing icon will be there briefly and then disappear as it should.
### Outcome
#### What did you expect?
Syncing indication to go away once everything is synced
#### What happened instead?
Syncing icon remains even after everything is synced.
### Your phone model
iPhone 12 Pro
### Operating system version
iOS 16.5
### Application version
1.10.12
### Homeserver
1.84.1
### Will you send logs?
Yes
|
1.0
|
Syncing icon never goes away - ### Steps to reproduce
Click on a room or DM. The syncing icon with the loading wheel is present on the top. Even though everything is loading, it will remain there indefinitely. To fix it, you back out of the chat and go into it again. The syncing icon will be there briefly and then disappear as it should.
### Outcome
#### What did you expect?
Syncing indication to go away once everything is synced
#### What happened instead?
Syncing icon remains even after everything is synced.
### Your phone model
iPhone 12 Pro
### Operating system version
iOS 16.5
### Application version
1.10.12
### Homeserver
1.84.1
### Will you send logs?
Yes
|
defect
|
syncing icon never goes away steps to reproduce click on a room or dm the syncing icon with the loading wheel is present on the top even though everything is loading it will remain there indefinitely to fix it you back out of the chat and go into it again the syncing icon will be there briefly and then disappear as it should outcome what did you expect syncing indication to go away once everything is synced what happened instead syncing icon remains even after everything is synced your phone model iphone pro operating system version ios application version homeserver will you send logs yes
| 1
|
239,250
| 18,267,175,091
|
IssuesEvent
|
2021-10-04 09:47:49
|
case-app/angular-library
|
https://api.github.com/repos/case-app/angular-library
|
closed
|
Multisearch : How to use it ?
|
documentation
|
I would like to work on the result list but I need data to see this result list.
|
1.0
|
Multisearch : How to use it ? - I would like to work on the result list but I need data to see this result list.
|
non_defect
|
multisearch how to use it i would like to work on the result list but i need data to see this result list
| 0
|
213,217
| 23,966,163,724
|
IssuesEvent
|
2022-09-13 01:18:14
|
samq-wsdemo/NodeGoat
|
https://api.github.com/repos/samq-wsdemo/NodeGoat
|
opened
|
WS-2021-0638 (High) detected in mocha-2.5.3.tgz
|
security vulnerability
|
## WS-2021-0638 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mocha-2.5.3.tgz</b></p></summary>
<p>simple, flexible, fun test framework</p>
<p>Library home page: <a href="https://registry.npmjs.org/mocha/-/mocha-2.5.3.tgz">https://registry.npmjs.org/mocha/-/mocha-2.5.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/mocha/package.json</p>
<p>
Dependency Hierarchy:
- :x: **mocha-2.5.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samq-wsdemo/NodeGoat/commit/4cddc2d15630da8f1806b8b98b45b987fbb3a397">4cddc2d15630da8f1806b8b98b45b987fbb3a397</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
There is regular Expression Denial of Service (ReDoS) vulnerability in mocha.
It allows cause a denial of service when stripping crafted invalid function definition from strs.
<p>Publish Date: 2021-09-18
<p>URL: <a href=https://github.com/mochajs/mocha/commit/61b4b9209c2c64b32c8d48b1761c3b9384d411ea>WS-2021-0638</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://huntr.dev/bounties/1d8a3d95-d199-4129-a6ad-8eafe5e77b9e/">https://huntr.dev/bounties/1d8a3d95-d199-4129-a6ad-8eafe5e77b9e/</a></p>
<p>Release Date: 2021-09-18</p>
<p>Fix Resolution: 3.0.0-0</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
|
True
|
WS-2021-0638 (High) detected in mocha-2.5.3.tgz - ## WS-2021-0638 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mocha-2.5.3.tgz</b></p></summary>
<p>simple, flexible, fun test framework</p>
<p>Library home page: <a href="https://registry.npmjs.org/mocha/-/mocha-2.5.3.tgz">https://registry.npmjs.org/mocha/-/mocha-2.5.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/mocha/package.json</p>
<p>
Dependency Hierarchy:
- :x: **mocha-2.5.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samq-wsdemo/NodeGoat/commit/4cddc2d15630da8f1806b8b98b45b987fbb3a397">4cddc2d15630da8f1806b8b98b45b987fbb3a397</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
There is regular Expression Denial of Service (ReDoS) vulnerability in mocha.
It allows cause a denial of service when stripping crafted invalid function definition from strs.
<p>Publish Date: 2021-09-18
<p>URL: <a href=https://github.com/mochajs/mocha/commit/61b4b9209c2c64b32c8d48b1761c3b9384d411ea>WS-2021-0638</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://huntr.dev/bounties/1d8a3d95-d199-4129-a6ad-8eafe5e77b9e/">https://huntr.dev/bounties/1d8a3d95-d199-4129-a6ad-8eafe5e77b9e/</a></p>
<p>Release Date: 2021-09-18</p>
<p>Fix Resolution: 3.0.0-0</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
|
non_defect
|
ws high detected in mocha tgz ws high severity vulnerability vulnerable library mocha tgz simple flexible fun test framework library home page a href path to dependency file package json path to vulnerable library node modules mocha package json dependency hierarchy x mocha tgz vulnerable library found in head commit a href found in base branch master vulnerability details there is regular expression denial of service redos vulnerability in mocha it allows cause a denial of service when stripping crafted invalid function definition from strs publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue
| 0
|
274,611
| 8,563,386,967
|
IssuesEvent
|
2018-11-09 13:54:09
|
The-Barrens-org/Bugtracker
|
https://api.github.com/repos/The-Barrens-org/Bugtracker
|
closed
|
nightfin snappers not being fished at night
|
Item Priority - Mid Status - Fixed on Live Server
|
**Current behaviour:**
Nightfin snappers are not available to be fished at night (Midnight - 6am Server time). They are fishable during the day at ~10% of all catches. Tested in Moonglade and Felwood.
**Expected behaviour:**
Nightfin snappers should caught at higher frequently during night time.
**Steps to reproduce the problem:**
Fish at night in Felwood/Moonglade/Ungoro river/Hinterlands
**Include the ID for game objects, npcs (creatures, pets, minions), spells, items, quests, instances, zones, achievements, skills:**
[Nightfin Snapper](https://classicdb.ch/?item=13759)
[Nightfin Snapper Locations](http://wowwiki.wikia.com/wiki/Fishing_locations)
|
1.0
|
nightfin snappers not being fished at night - **Current behaviour:**
Nightfin snappers are not available to be fished at night (Midnight - 6am Server time). They are fishable during the day at ~10% of all catches. Tested in Moonglade and Felwood.
**Expected behaviour:**
Nightfin snappers should caught at higher frequently during night time.
**Steps to reproduce the problem:**
Fish at night in Felwood/Moonglade/Ungoro river/Hinterlands
**Include the ID for game objects, npcs (creatures, pets, minions), spells, items, quests, instances, zones, achievements, skills:**
[Nightfin Snapper](https://classicdb.ch/?item=13759)
[Nightfin Snapper Locations](http://wowwiki.wikia.com/wiki/Fishing_locations)
|
non_defect
|
nightfin snappers not being fished at night current behaviour nightfin snappers are not available to be fished at night midnight server time they are fishable during the day at of all catches tested in moonglade and felwood expected behaviour nightfin snappers should caught at higher frequently during night time steps to reproduce the problem fish at night in felwood moonglade ungoro river hinterlands include the id for game objects npcs creatures pets minions spells items quests instances zones achievements skills
| 0
|
89,064
| 10,587,480,310
|
IssuesEvent
|
2019-10-08 22:16:38
|
operator-framework/operator-sdk
|
https://api.github.com/repos/operator-framework/operator-sdk
|
closed
|
Consider adding [type] before 'User Guide' on docs user-guides
|
kind/documentation
|
## Feature Request
Currently when you search for terms like 'Ansible Operator SDK' or 'Helm Operator SDK' (or anything of the like), you usually end up hitting proposal docs or other less relevant example documentation... you never see the "User Guide" for these items.
The reason is all these documents have the page / document title "User Guide":
- https://github.com/operator-framework/operator-sdk/blob/master/doc/ansible/user-guide.md - H1 title is "User Guide"
- https://github.com/operator-framework/operator-sdk/blob/master/doc/user-guide.md - H1 title is "User Guide"
- https://github.com/operator-framework/operator-sdk/blob/master/doc/helm/user-guide.md - H1 title is "User Guide"
I propose we add more meaningful titles to these documents, either just "Ansible User Guide", "Helm User Guide", etc. — or maybe a full "Ansible User Guide for Operator SDK", "Helm User Guide for Operator SDK"
That way people will be able to google or GitHub search and get to these docs a lot more easily. As it is, I always google my way into the proposal doc, then navigate manually through the docs to get back to the user guide :/
|
1.0
|
Consider adding [type] before 'User Guide' on docs user-guides - ## Feature Request
Currently when you search for terms like 'Ansible Operator SDK' or 'Helm Operator SDK' (or anything of the like), you usually end up hitting proposal docs or other less relevant example documentation... you never see the "User Guide" for these items.
The reason is all these documents have the page / document title "User Guide":
- https://github.com/operator-framework/operator-sdk/blob/master/doc/ansible/user-guide.md - H1 title is "User Guide"
- https://github.com/operator-framework/operator-sdk/blob/master/doc/user-guide.md - H1 title is "User Guide"
- https://github.com/operator-framework/operator-sdk/blob/master/doc/helm/user-guide.md - H1 title is "User Guide"
I propose we add more meaningful titles to these documents, either just "Ansible User Guide", "Helm User Guide", etc. — or maybe a full "Ansible User Guide for Operator SDK", "Helm User Guide for Operator SDK"
That way people will be able to google or GitHub search and get to these docs a lot more easily. As it is, I always google my way into the proposal doc, then navigate manually through the docs to get back to the user guide :/
|
non_defect
|
consider adding before user guide on docs user guides feature request currently when you search for terms like ansible operator sdk or helm operator sdk or anything of the like you usually end up hitting proposal docs or other less relevant example documentation you never see the user guide for these items the reason is all these documents have the page document title user guide title is user guide title is user guide title is user guide i propose we add more meaningful titles to these documents either just ansible user guide helm user guide etc — or maybe a full ansible user guide for operator sdk helm user guide for operator sdk that way people will be able to google or github search and get to these docs a lot more easily as it is i always google my way into the proposal doc then navigate manually through the docs to get back to the user guide
| 0
|
81,489
| 10,239,496,493
|
IssuesEvent
|
2019-08-19 18:23:43
|
rancher/rancher
|
https://api.github.com/repos/rancher/rancher
|
closed
|
Document minimum roles required to a service principal
|
[zube]: To Test area/aks area/documentation kind/task team/az
|
I checked the scenarios in rancher/rancher#11492 and I am doing the first option, adding the cluster that already exists. The cluster was created with the service principal, which I also use in the Rancher form to add a new cluster.
Authentication test completes and I enter the existing resource group. When I get to the list of clusters, the following error message is shown:
> Error getting resource group DevAndTest: resources.GroupsClient#CheckExistence: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: error response cannot be parsed: "" error: EOF
|
1.0
|
Document minimum roles required to a service principal - I checked the scenarios in rancher/rancher#11492 and I am doing the first option, adding the cluster that already exists. The cluster was created with the service principal, which I also use in the Rancher form to add a new cluster.
Authentication test completes and I enter the existing resource group. When I get to the list of clusters, the following error message is shown:
> Error getting resource group DevAndTest: resources.GroupsClient#CheckExistence: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: error response cannot be parsed: "" error: EOF
|
non_defect
|
document minimum roles required to a service principal i checked the scenarios in rancher rancher and i am doing the first option adding the cluster that already exists the cluster was created with the service principal which i also use in the rancher form to add a new cluster authentication test completes and i enter the existing resource group when i get to the list of clusters the following error message is shown error getting resource group devandtest resources groupsclient checkexistence failure responding to request statuscode original error autorest azure error response cannot be parsed error eof
| 0
|
97,529
| 16,236,387,710
|
IssuesEvent
|
2021-05-07 01:37:01
|
rvvergara/post_and_comment_app
|
https://api.github.com/repos/rvvergara/post_and_comment_app
|
opened
|
CVE-2020-15169 (Medium) detected in actionview-5.2.1.gem
|
security vulnerability
|
## CVE-2020-15169 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>actionview-5.2.1.gem</b></p></summary>
<p>Simple, battle-tested conventions and helpers for building web pages.</p>
<p>Library home page: <a href="https://rubygems.org/gems/actionview-5.2.1.gem">https://rubygems.org/gems/actionview-5.2.1.gem</a></p>
<p>
Dependency Hierarchy:
- sass-rails-5.0.7.gem (Root Library)
- sprockets-rails-3.2.1.gem
- actionpack-5.2.1.gem
- :x: **actionview-5.2.1.gem** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory.
<p>Publish Date: 2020-09-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15169>CVE-2020-15169</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://rubygems.org/gems/actionview/versions/6.0.3.3">https://rubygems.org/gems/actionview/versions/6.0.3.3</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: 6.0.3.3, 5.2.4.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2020-15169 (Medium) detected in actionview-5.2.1.gem - ## CVE-2020-15169 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>actionview-5.2.1.gem</b></p></summary>
<p>Simple, battle-tested conventions and helpers for building web pages.</p>
<p>Library home page: <a href="https://rubygems.org/gems/actionview-5.2.1.gem">https://rubygems.org/gems/actionview-5.2.1.gem</a></p>
<p>
Dependency Hierarchy:
- sass-rails-5.0.7.gem (Root Library)
- sprockets-rails-3.2.1.gem
- actionpack-5.2.1.gem
- :x: **actionview-5.2.1.gem** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory.
<p>Publish Date: 2020-09-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15169>CVE-2020-15169</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://rubygems.org/gems/actionview/versions/6.0.3.3">https://rubygems.org/gems/actionview/versions/6.0.3.3</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: 6.0.3.3, 5.2.4.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve medium detected in actionview gem cve medium severity vulnerability vulnerable library actionview gem simple battle tested conventions and helpers for building web pages library home page a href dependency hierarchy sass rails gem root library sprockets rails gem actionpack gem x actionview gem vulnerable library found in base branch master vulnerability details in action view before versions and there is a potential cross site scripting xss vulnerability in action view s translation helpers views that allow the user to control the default not found value of the t and translate helpers could be susceptible to xss attacks when an html unsafe string is passed as the default for a missing translation key named html or ending in html the default string is incorrectly marked as html safe and not escaped this is patched in versions and a workaround without upgrading is proposed in the source advisory publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
| 0
|
609,462
| 18,873,889,662
|
IssuesEvent
|
2021-11-13 17:27:16
|
praveenpal12345/Project-Practice-Lab
|
https://api.github.com/repos/praveenpal12345/Project-Practice-Lab
|
opened
|
Search field is case sensitive in Order section at POS User Front end
|
bug low priority High severity
|
Commit Id:
Video: https://nimb.ws/XSUGiN
----------------Steps to reproduce-----------
1. login with valid username and Password at POS end.(username peterdoe)
2. click on order section.
3. enter the customer name in search field in lowercase(like 'kate').
Expected Result : It should show order list of particular customer. means search field must not be case sensitive
Actual Output : search field is case sensitive
|
1.0
|
Search field is case sensitive in Order section at POS User Front end - Commit Id:
Video: https://nimb.ws/XSUGiN
----------------Steps to reproduce-----------
1. login with valid username and Password at POS end.(username peterdoe)
2. click on order section.
3. enter the customer name in search field in lowercase(like 'kate').
Expected Result : It should show order list of particular customer. means search field must not be case sensitive
Actual Output : search field is case sensitive
|
non_defect
|
search field is case sensitive in order section at pos user front end commit id video steps to reproduce login with valid username and password at pos end username peterdoe click on order section enter the customer name in search field in lowercase like kate expected result it should show order list of particular customer means search field must not be case sensitive actual output search field is case sensitive
| 0
|
32,741
| 6,911,668,548
|
IssuesEvent
|
2017-11-28 09:15:23
|
primefaces/primereact
|
https://api.github.com/repos/primefaces/primereact
|
closed
|
Datatable - not propagate prop filterMatchMode when lazyload is on
|
defect
|
When you configure a DataTable to work with lazyLoad, and a Column with property filterMatchMode, this property will not propagate to onload event. It's necessary do that to make sure the backend will be correct configured.
|
1.0
|
Datatable - not propagate prop filterMatchMode when lazyload is on - When you configure a DataTable to work with lazyLoad, and a Column with property filterMatchMode, this property will not propagate to onload event. It's necessary do that to make sure the backend will be correct configured.
|
defect
|
datatable not propagate prop filtermatchmode when lazyload is on when you configure a datatable to work with lazyload and a column with property filtermatchmode this property will not propagate to onload event it s necessary do that to make sure the backend will be correct configured
| 1
|
49,056
| 13,438,236,304
|
IssuesEvent
|
2020-09-07 17:34:14
|
AOSC-Dev/aosc-os-abbs
|
https://api.github.com/repos/AOSC-Dev/aosc-os-abbs
|
closed
|
ntp: security update to 4.2.8p15
|
security to-stable upgrade
|
<!-- Please remove items do not apply. -->
**CVE IDs:** CVE-2020-11868, CVE-2020-13817, CVE-2020-15025
**Other security advisory IDs:** openSUSE-SU-2020:1007-1
**Description:**
- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed
source address frequently send to the client ntpd could have caused
denial of service (bsc#1169740).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the
ability to query time from victim's ntpd instance could have modified
the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused
denial of service by consuming the memory when a CMAC key was used
andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).
**Patches:** N/A
**PoC(s):** <!-- Please list links to available PoCs (Proofs of Concept). -->
**Architectural progress (Mainline):**
<!-- Please remove any architecture to which the security vulnerabilities do not apply. -->
- [x] AMD64 `amd64`
- [x] AArch64 `arm64`
<!-- If the specified package is `noarch`, please use the stub below. -->
<!-- - [ ] Architecture-independent `noarch` -->
|
True
|
ntp: security update to 4.2.8p15 - <!-- Please remove items do not apply. -->
**CVE IDs:** CVE-2020-11868, CVE-2020-13817, CVE-2020-15025
**Other security advisory IDs:** openSUSE-SU-2020:1007-1
**Description:**
- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed
source address frequently send to the client ntpd could have caused
denial of service (bsc#1169740).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the
ability to query time from victim's ntpd instance could have modified
the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused
denial of service by consuming the memory when a CMAC key was used
andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).
**Patches:** N/A
**PoC(s):** <!-- Please list links to available PoCs (Proofs of Concept). -->
**Architectural progress (Mainline):**
<!-- Please remove any architecture to which the security vulnerabilities do not apply. -->
- [x] AMD64 `amd64`
- [x] AArch64 `arm64`
<!-- If the specified package is `noarch`, please use the stub below. -->
<!-- - [ ] Architecture-independent `noarch` -->
|
non_defect
|
ntp security update to cve ids cve cve cve other security advisory ids opensuse su description cve fixed an issue which a server mode packet with spoofed source address frequently send to the client ntpd could have caused denial of service bsc cve fixed an issue which an off path attacker with the ability to query time from victim s ntpd instance could have modified the victim s clock by a limited amount bsc cve fixed an issue which remote attacker could have caused denial of service by consuming the memory when a cmac key was used andassociated with a cmac algorithm in the ntp keys bsc patches n a poc s architectural progress mainline
| 0
|
250,753
| 27,111,300,091
|
IssuesEvent
|
2023-02-15 15:29:23
|
EliyaC/NodeGoat
|
https://api.github.com/repos/EliyaC/NodeGoat
|
closed
|
CVE-2022-29244 (High) detected in npm-3.10.10.tgz - autoclosed
|
security vulnerability
|
## CVE-2022-29244 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>npm-3.10.10.tgz</b></p></summary>
<p>a package manager for JavaScript</p>
<p>Library home page: <a href="https://registry.npmjs.org/npm/-/npm-3.10.10.tgz">https://registry.npmjs.org/npm/-/npm-3.10.10.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/npm/package.json</p>
<p>
Dependency Hierarchy:
- grunt-npm-install-0.3.1.tgz (Root Library)
- :x: **npm-3.10.10.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/EliyaC/NodeGoat/commit/2f9ac315d9e05728b7ce26ce7cf1b4e684e54fde">2f9ac315d9e05728b7ce26ce7cf1b4e684e54fde</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm.
<p>Publish Date: 2022-06-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-29244>CVE-2022-29244</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-hj9c-8jmm-8c52">https://github.com/advisories/GHSA-hj9c-8jmm-8c52</a></p>
<p>Release Date: 2022-06-13</p>
<p>Fix Resolution: npm - 8.11.0</p>
</p>
</details>
<p></p>
|
True
|
CVE-2022-29244 (High) detected in npm-3.10.10.tgz - autoclosed - ## CVE-2022-29244 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>npm-3.10.10.tgz</b></p></summary>
<p>a package manager for JavaScript</p>
<p>Library home page: <a href="https://registry.npmjs.org/npm/-/npm-3.10.10.tgz">https://registry.npmjs.org/npm/-/npm-3.10.10.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/npm/package.json</p>
<p>
Dependency Hierarchy:
- grunt-npm-install-0.3.1.tgz (Root Library)
- :x: **npm-3.10.10.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/EliyaC/NodeGoat/commit/2f9ac315d9e05728b7ce26ce7cf1b4e684e54fde">2f9ac315d9e05728b7ce26ce7cf1b4e684e54fde</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm.
<p>Publish Date: 2022-06-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-29244>CVE-2022-29244</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-hj9c-8jmm-8c52">https://github.com/advisories/GHSA-hj9c-8jmm-8c52</a></p>
<p>Release Date: 2022-06-13</p>
<p>Fix Resolution: npm - 8.11.0</p>
</p>
</details>
<p></p>
|
non_defect
|
cve high detected in npm tgz autoclosed cve high severity vulnerability vulnerable library npm tgz a package manager for javascript library home page a href path to dependency file package json path to vulnerable library node modules npm package json dependency hierarchy grunt npm install tgz root library x npm tgz vulnerable library found in head commit a href found in base branch master vulnerability details npm pack ignores root level gitignore and npmignore file exclusion directives when run in a workspace or with a workspace flag ie workspaces workspace anyone who has run npm pack or npm publish inside a workspace as of and respectively may be affected and have published files into the npm registry they did not intend to include users should upgrade to the latest patched version of npm run npm i g npm latest node js versions and include the patched version of npm publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution npm
| 0
|
66,460
| 20,201,964,008
|
IssuesEvent
|
2022-02-11 16:05:49
|
department-of-veterans-affairs/va.gov-cms
|
https://api.github.com/repos/department-of-veterans-affairs/va.gov-cms
|
closed
|
Content releases fail with "AMI <id...> is pending, and cannot be run"
|
Defect Unplanned work Platform CMS Team
|
## Describe the defect
Late in the day on 02/10, content releases started failing with errors like the folllowing:
<img width="749" alt="Screen Shot 2022-02-10 at 5 51 20 PM" src="https://user-images.githubusercontent.com/1318579/153625531-e7f9e4c9-1f7e-4e4f-8c5c-6988a79f419c.png">
This ended up being a result of incorrect syntax in the content release GitHub action.
See [this thread](https://dsva.slack.com/archives/CBU0KDSB1/p1644539431676379).
### CMS Team
Please check the team(s) that will do this work.
- [ ] `CMS Program`
- [x] `Platform CMS Team`
- [ ] `Sitewide CMS Team ` (leave Sitewide unchecked and check the specific team instead)
- [ ] `⭐️ Content ops`
- [ ] `⭐️ CMS experience`
- [ ] `⭐️ Offices`
- [ ] `⭐️ Product support`
- [ ] `⭐️ User support`
|
1.0
|
Content releases fail with "AMI <id...> is pending, and cannot be run" - ## Describe the defect
Late in the day on 02/10, content releases started failing with errors like the folllowing:
<img width="749" alt="Screen Shot 2022-02-10 at 5 51 20 PM" src="https://user-images.githubusercontent.com/1318579/153625531-e7f9e4c9-1f7e-4e4f-8c5c-6988a79f419c.png">
This ended up being a result of incorrect syntax in the content release GitHub action.
See [this thread](https://dsva.slack.com/archives/CBU0KDSB1/p1644539431676379).
### CMS Team
Please check the team(s) that will do this work.
- [ ] `CMS Program`
- [x] `Platform CMS Team`
- [ ] `Sitewide CMS Team ` (leave Sitewide unchecked and check the specific team instead)
- [ ] `⭐️ Content ops`
- [ ] `⭐️ CMS experience`
- [ ] `⭐️ Offices`
- [ ] `⭐️ Product support`
- [ ] `⭐️ User support`
|
defect
|
content releases fail with ami is pending and cannot be run describe the defect late in the day on content releases started failing with errors like the folllowing img width alt screen shot at pm src this ended up being a result of incorrect syntax in the content release github action see cms team please check the team s that will do this work cms program platform cms team sitewide cms team leave sitewide unchecked and check the specific team instead ⭐️ content ops ⭐️ cms experience ⭐️ offices ⭐️ product support ⭐️ user support
| 1
|
736,938
| 25,493,405,619
|
IssuesEvent
|
2022-11-27 11:24:58
|
fredo-ai/Fredo-Public
|
https://api.github.com/repos/fredo-ai/Fredo-Public
|
closed
|
Default fallback flow
|
priority-1
|
1. create a new template for the fallback message: https://miro.com/app/board/o9J_lttkfEA=/?moveToWidget=3458764535520568246&cot=14
2. Let's start button should initiate the "HowTo flow"
|
1.0
|
Default fallback flow - 1. create a new template for the fallback message: https://miro.com/app/board/o9J_lttkfEA=/?moveToWidget=3458764535520568246&cot=14
2. Let's start button should initiate the "HowTo flow"
|
non_defect
|
default fallback flow create a new template for the fallback message let s start button should initiate the howto flow
| 0
|
134,144
| 18,428,974,442
|
IssuesEvent
|
2021-10-14 04:18:40
|
samq-ghdemo/JS-DEMO
|
https://api.github.com/repos/samq-ghdemo/JS-DEMO
|
reopened
|
CVE-2020-7754 (High) detected in npm-user-validate-0.1.5.tgz
|
security vulnerability
|
## CVE-2020-7754 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>npm-user-validate-0.1.5.tgz</b></p></summary>
<p>User validations for npm</p>
<p>Library home page: <a href="https://registry.npmjs.org/npm-user-validate/-/npm-user-validate-0.1.5.tgz">https://registry.npmjs.org/npm-user-validate/-/npm-user-validate-0.1.5.tgz</a></p>
<p>Path to dependency file: JS-DEMO/package.json</p>
<p>Path to vulnerable library: JS-DEMO/node_modules/npm/node_modules/npm-user-validate/package.json</p>
<p>
Dependency Hierarchy:
- grunt-npm-install-0.3.1.tgz (Root Library)
- npm-3.10.10.tgz
- :x: **npm-user-validate-0.1.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-DEMO/commit/42ecb158a0943b7f59ce3920455bc05541fa235a">42ecb158a0943b7f59ce3920455bc05541fa235a</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.
<p>Publish Date: 2020-10-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7754>CVE-2020-7754</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7754</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: 1.0.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm-user-validate","packageVersion":"0.1.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;npm-user-validate:0.1.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7754","vulnerabilityDetails":"This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7754","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
|
True
|
CVE-2020-7754 (High) detected in npm-user-validate-0.1.5.tgz - ## CVE-2020-7754 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>npm-user-validate-0.1.5.tgz</b></p></summary>
<p>User validations for npm</p>
<p>Library home page: <a href="https://registry.npmjs.org/npm-user-validate/-/npm-user-validate-0.1.5.tgz">https://registry.npmjs.org/npm-user-validate/-/npm-user-validate-0.1.5.tgz</a></p>
<p>Path to dependency file: JS-DEMO/package.json</p>
<p>Path to vulnerable library: JS-DEMO/node_modules/npm/node_modules/npm-user-validate/package.json</p>
<p>
Dependency Hierarchy:
- grunt-npm-install-0.3.1.tgz (Root Library)
- npm-3.10.10.tgz
- :x: **npm-user-validate-0.1.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-DEMO/commit/42ecb158a0943b7f59ce3920455bc05541fa235a">42ecb158a0943b7f59ce3920455bc05541fa235a</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.
<p>Publish Date: 2020-10-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7754>CVE-2020-7754</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7754">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7754</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: 1.0.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm-user-validate","packageVersion":"0.1.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;npm-user-validate:0.1.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-7754","vulnerabilityDetails":"This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7754","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
|
non_defect
|
cve high detected in npm user validate tgz cve high severity vulnerability vulnerable library npm user validate tgz user validations for npm library home page a href path to dependency file js demo package json path to vulnerable library js demo node modules npm node modules npm user validate package json dependency hierarchy grunt npm install tgz root library npm tgz x npm user validate tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package npm user validate before the regex that validates user emails took exponentially longer to process long input strings beginning with characters publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree grunt npm install npm npm user validate isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package npm user validate before the regex that validates user emails took exponentially longer to process long input strings beginning with characters vulnerabilityurl
| 0
|
667,895
| 22,513,960,464
|
IssuesEvent
|
2022-06-24 00:13:06
|
acreloaded/acr
|
https://api.github.com/repos/acreloaded/acr
|
closed
|
164: aiming down sight problem
|
bug invalid priority-3-high
|
**aiming down sight problem** by `alex01763`
Issue 164 posted to Google Code on 2014 Jun 26 at 10:01:58
Current status: Invalid
Current labels: `Type-Defect`, `Priority-High`, `Component-Logic`, `Usability`
`alex01763` on 2014 Jun 26 at 10:01:58:
> <b>What steps will reproduce the problem?</b>
> 1.if i aim down my sight, i cannot move my view
> <b>2.</b>
> <b>3.</b>
>
> <b>What is the expected output? What do you see instead?</b>
> i expect to aim freely. i cannot
>
> <b>What version are you using? On what operating system?</b>
> latest version on 2014/06/25 windows 64 bit
>
> <b>Please provide any additional information below.</b>
> the chat line complains about lowest sensitivity and no command
`theonlypwner` on 2014 Jun 27 at 00:38:10:
> This will probably be fixed by 2.7.
>
> **Labels**: -Priority-Unset Priority-High Component-Logic Usability
> **Status**: Started-Redo
`theonlypwner` on 2014 Aug 23 at 01:41:51:
> This issue is one of those assumed to affect version 2.6 and previous versions.
>
> **Status**: Invalid
|
1.0
|
164: aiming down sight problem - **aiming down sight problem** by `alex01763`
Issue 164 posted to Google Code on 2014 Jun 26 at 10:01:58
Current status: Invalid
Current labels: `Type-Defect`, `Priority-High`, `Component-Logic`, `Usability`
`alex01763` on 2014 Jun 26 at 10:01:58:
> <b>What steps will reproduce the problem?</b>
> 1.if i aim down my sight, i cannot move my view
> <b>2.</b>
> <b>3.</b>
>
> <b>What is the expected output? What do you see instead?</b>
> i expect to aim freely. i cannot
>
> <b>What version are you using? On what operating system?</b>
> latest version on 2014/06/25 windows 64 bit
>
> <b>Please provide any additional information below.</b>
> the chat line complains about lowest sensitivity and no command
`theonlypwner` on 2014 Jun 27 at 00:38:10:
> This will probably be fixed by 2.7.
>
> **Labels**: -Priority-Unset Priority-High Component-Logic Usability
> **Status**: Started-Redo
`theonlypwner` on 2014 Aug 23 at 01:41:51:
> This issue is one of those assumed to affect version 2.6 and previous versions.
>
> **Status**: Invalid
|
non_defect
|
aiming down sight problem aiming down sight problem by issue posted to google code on jun at current status invalid current labels type defect priority high component logic usability on jun at what steps will reproduce the problem if i aim down my sight i cannot move my view what is the expected output what do you see instead i expect to aim freely i cannot what version are you using on what operating system latest version on windows bit please provide any additional information below the chat line complains about lowest sensitivity and no command theonlypwner on jun at this will probably be fixed by labels priority unset priority high component logic usability status started redo theonlypwner on aug at this issue is one of those assumed to affect version and previous versions status invalid
| 0
|
11,073
| 2,632,356,811
|
IssuesEvent
|
2015-03-08 01:36:29
|
marmarek/test
|
https://api.github.com/repos/marmarek/test
|
closed
|
Do not poll iptables_error on stopped firewall vm
|
C: qubes-manager P: major R: fixed T: defect
|
**Reported by marmarek on 24 Mar 2011 22:26 UTC**
When firewall vm is stopped, qubes-manager produces:
xenstore-read: couldn't read path /local/domain/-1/qubes_iptables_error
|
1.0
|
Do not poll iptables_error on stopped firewall vm - **Reported by marmarek on 24 Mar 2011 22:26 UTC**
When firewall vm is stopped, qubes-manager produces:
xenstore-read: couldn't read path /local/domain/-1/qubes_iptables_error
|
defect
|
do not poll iptables error on stopped firewall vm reported by marmarek on mar utc when firewall vm is stopped qubes manager produces xenstore read couldn t read path local domain qubes iptables error
| 1
|
4,097
| 2,610,087,347
|
IssuesEvent
|
2015-02-26 18:26:32
|
chrsmith/dsdsdaadf
|
https://api.github.com/repos/chrsmith/dsdsdaadf
|
opened
|
深圳痤疮该怎么治疗
|
auto-migrated Priority-Medium Type-Defect
|
```
深圳痤疮该怎么治疗【深圳韩方科颜全国热线400-869-1818,24小
时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构以韩国��
�方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,韩�
��科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹”
健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内专��
�治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上的�
��痘。
```
-----
Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 7:19
|
1.0
|
深圳痤疮该怎么治疗 - ```
深圳痤疮该怎么治疗【深圳韩方科颜全国热线400-869-1818,24小
时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构以韩国��
�方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,韩�
��科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹”
健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内专��
�治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上的�
��痘。
```
-----
Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 7:19
|
defect
|
深圳痤疮该怎么治疗 深圳痤疮该怎么治疗【 , 】深圳韩方科颜专业祛痘连锁机构,机构以韩国�� �方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,韩� ��科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹” 健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内专�� �治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上的� ��痘。 original issue reported on code google com by szft com on may at
| 1
|
18,764
| 3,086,888,909
|
IssuesEvent
|
2015-08-25 07:58:42
|
NamPNQ/html5slides
|
https://api.github.com/repos/NamPNQ/html5slides
|
closed
|
Change Google logo in bottom-right corner?
|
auto-migrated Priority-Medium Type-Defect
|
```
Hi,
I love this HTML5 presentation template and would like to use it, both for an
actual presentation but also to improve my on-hands HTML 5 experience.
Is someone able to tell me where the Google logo in the bottom-right corner is
referenced? I want to change it into something else, but am not able to find it
in the main HTML file (or slides.js, although I didn't expect it there).
Thanks for your help.
```
Original issue reported on code.google.com by `martijnv...@gmail.com` on 4 Aug 2011 at 1:46
|
1.0
|
Change Google logo in bottom-right corner? - ```
Hi,
I love this HTML5 presentation template and would like to use it, both for an
actual presentation but also to improve my on-hands HTML 5 experience.
Is someone able to tell me where the Google logo in the bottom-right corner is
referenced? I want to change it into something else, but am not able to find it
in the main HTML file (or slides.js, although I didn't expect it there).
Thanks for your help.
```
Original issue reported on code.google.com by `martijnv...@gmail.com` on 4 Aug 2011 at 1:46
|
defect
|
change google logo in bottom right corner hi i love this presentation template and would like to use it both for an actual presentation but also to improve my on hands html experience is someone able to tell me where the google logo in the bottom right corner is referenced i want to change it into something else but am not able to find it in the main html file or slides js although i didn t expect it there thanks for your help original issue reported on code google com by martijnv gmail com on aug at
| 1
|
5,989
| 2,610,219,003
|
IssuesEvent
|
2015-02-26 19:09:38
|
chrsmith/somefinders
|
https://api.github.com/repos/chrsmith/somefinders
|
opened
|
русификатор для launch blue manager suite
|
auto-migrated Priority-Medium Type-Defect
|
```
'''Борис Волков'''
Привет всем не подскажите где можно найти
.русификатор для launch blue manager suite. где то
видел уже
'''Валериан Абрамов'''
Вот хороший сайт где можно скачать
http://bit.ly/1aV8gab
'''Витольд Сысоев'''
Просит ввести номер мобилы!Не опасно ли это?
'''Викентий Гусев'''
Неа все ок у меня ничего не списало
'''Гермоген Петухов'''
Неа все ок у меня ничего не списало
Информация о файле: русификатор для launch blue
manager suite
Загружен: В этом месяце
Скачан раз: 1165
Рейтинг: 474
Средняя скорость скачивания: 964
Похожих файлов: 25
```
-----
Original issue reported on code.google.com by `kondense...@gmail.com` on 17 Dec 2013 at 6:10
|
1.0
|
русификатор для launch blue manager suite - ```
'''Борис Волков'''
Привет всем не подскажите где можно найти
.русификатор для launch blue manager suite. где то
видел уже
'''Валериан Абрамов'''
Вот хороший сайт где можно скачать
http://bit.ly/1aV8gab
'''Витольд Сысоев'''
Просит ввести номер мобилы!Не опасно ли это?
'''Викентий Гусев'''
Неа все ок у меня ничего не списало
'''Гермоген Петухов'''
Неа все ок у меня ничего не списало
Информация о файле: русификатор для launch blue
manager suite
Загружен: В этом месяце
Скачан раз: 1165
Рейтинг: 474
Средняя скорость скачивания: 964
Похожих файлов: 25
```
-----
Original issue reported on code.google.com by `kondense...@gmail.com` on 17 Dec 2013 at 6:10
|
defect
|
русификатор для launch blue manager suite борис волков привет всем не подскажите где можно найти русификатор для launch blue manager suite где то видел уже валериан абрамов вот хороший сайт где можно скачать витольд сысоев просит ввести номер мобилы не опасно ли это викентий гусев неа все ок у меня ничего не списало гермоген петухов неа все ок у меня ничего не списало информация о файле русификатор для launch blue manager suite загружен в этом месяце скачан раз рейтинг средняя скорость скачивания похожих файлов original issue reported on code google com by kondense gmail com on dec at
| 1
|
2,165
| 2,667,072,442
|
IssuesEvent
|
2015-03-22 06:50:52
|
chocolatey/choco
|
https://api.github.com/repos/chocolatey/choco
|
closed
|
Document chocolateyPackageFolder, chocolateyPackageName and chocolateyPackageVersion variables
|
Documentation
|
Apparently it is possible to access some nuspec information from within `chocolateyInstall.ps1` and `chocolateyUninstall.ps1` using `$env:chocolateyPackageFolder`, `$env:chocolateyPackageName` and **`$env:chocolateyPackageVersion`** (duplicated in `$env:packageFolder`, `$env:packageName` and `$env:packageVersion`).
This should be documented somewhere.
|
1.0
|
Document chocolateyPackageFolder, chocolateyPackageName and chocolateyPackageVersion variables - Apparently it is possible to access some nuspec information from within `chocolateyInstall.ps1` and `chocolateyUninstall.ps1` using `$env:chocolateyPackageFolder`, `$env:chocolateyPackageName` and **`$env:chocolateyPackageVersion`** (duplicated in `$env:packageFolder`, `$env:packageName` and `$env:packageVersion`).
This should be documented somewhere.
|
non_defect
|
document chocolateypackagefolder chocolateypackagename and chocolateypackageversion variables apparently it is possible to access some nuspec information from within chocolateyinstall and chocolateyuninstall using env chocolateypackagefolder env chocolateypackagename and env chocolateypackageversion duplicated in env packagefolder env packagename and env packageversion this should be documented somewhere
| 0
|
2,955
| 2,607,967,479
|
IssuesEvent
|
2015-02-26 00:43:02
|
chrsmithdemos/leveldb
|
https://api.github.com/repos/chrsmithdemos/leveldb
|
opened
|
Assertion Failure When Closing Database
|
auto-migrated Priority-Medium Type-Defect
|
```
What steps will reproduce the problem?
1.open array of dbs, "db[n]"
2.close db using "delete db[n]"
What is the expected output? What do you see instead?
Expect db to close. Instead, see assertion failure:
main: db/version_set.cc:715: leveldb::VersionSet::~VersionSet(): Assertion
'dummy_versions_.next_ == &dummy_versions_' failed.
What version of the product are you using? On what operating system?
1.6.0 on Ubuntu Linux kernel 3.2.1, x86_64
Please provide any additional information below.
```
-----
Original issue reported on code.google.com by `stephen....@gmail.com` on 3 Jan 2013 at 7:33
|
1.0
|
Assertion Failure When Closing Database - ```
What steps will reproduce the problem?
1.open array of dbs, "db[n]"
2.close db using "delete db[n]"
What is the expected output? What do you see instead?
Expect db to close. Instead, see assertion failure:
main: db/version_set.cc:715: leveldb::VersionSet::~VersionSet(): Assertion
'dummy_versions_.next_ == &dummy_versions_' failed.
What version of the product are you using? On what operating system?
1.6.0 on Ubuntu Linux kernel 3.2.1, x86_64
Please provide any additional information below.
```
-----
Original issue reported on code.google.com by `stephen....@gmail.com` on 3 Jan 2013 at 7:33
|
defect
|
assertion failure when closing database what steps will reproduce the problem open array of dbs db close db using delete db what is the expected output what do you see instead expect db to close instead see assertion failure main db version set cc leveldb versionset versionset assertion dummy versions next dummy versions failed what version of the product are you using on what operating system on ubuntu linux kernel please provide any additional information below original issue reported on code google com by stephen gmail com on jan at
| 1
|
105,375
| 13,182,216,462
|
IssuesEvent
|
2020-08-12 15:26:30
|
department-of-veterans-affairs/va.gov-team
|
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
|
opened
|
Content Revisions for View Payment's Prototype
|
design vsa vsa-ebenefits
|
## Goal
Given feedback, we need to implement the latest content changes for CH31 so the feature is copy complete and ready to go.
## Tasks
- [ ] Take the [recommendations](#) and update the features' prototypes
## Acceptance Criteria
- [ ] The prototypes are updated with the latest recommendations
- [ ] Prototypes are shared with FE
|
1.0
|
Content Revisions for View Payment's Prototype - ## Goal
Given feedback, we need to implement the latest content changes for CH31 so the feature is copy complete and ready to go.
## Tasks
- [ ] Take the [recommendations](#) and update the features' prototypes
## Acceptance Criteria
- [ ] The prototypes are updated with the latest recommendations
- [ ] Prototypes are shared with FE
|
non_defect
|
content revisions for view payment s prototype goal given feedback we need to implement the latest content changes for so the feature is copy complete and ready to go tasks take the and update the features prototypes acceptance criteria the prototypes are updated with the latest recommendations prototypes are shared with fe
| 0
|
31,485
| 6,538,299,338
|
IssuesEvent
|
2017-09-01 05:08:52
|
hazelcast/hazelcast
|
https://api.github.com/repos/hazelcast/hazelcast
|
closed
|
[event-journal] Incorrect UnsupportedOperationException message
|
Team: Core Type: Defect
|
https://github.com/hazelcast/hazelcast/blob/843519c75e235bf8e72ad4dd7f760d576cf17b57/hazelcast/src/main/java/com/hazelcast/client/impl/protocol/task/map/MapEventJournalReadTask.java#L65
Misleading statement, should be "Event journal actions are available when cluster version is 3.9 or higher");
|
1.0
|
[event-journal] Incorrect UnsupportedOperationException message - https://github.com/hazelcast/hazelcast/blob/843519c75e235bf8e72ad4dd7f760d576cf17b57/hazelcast/src/main/java/com/hazelcast/client/impl/protocol/task/map/MapEventJournalReadTask.java#L65
Misleading statement, should be "Event journal actions are available when cluster version is 3.9 or higher");
|
defect
|
incorrect unsupportedoperationexception message misleading statement should be event journal actions are available when cluster version is or higher
| 1
|
171,808
| 13,249,655,770
|
IssuesEvent
|
2020-08-19 21:12:47
|
sys-bio/roadrunner
|
https://api.github.com/repos/sys-bio/roadrunner
|
closed
|
Need more test models with events
|
Testing
|
I looked through the .rrtest files and we only have one model with events: the model from #276. We need more models with events so that I can fix #281 without breaking existing models. (We also have the SBML test suite and any event tests it contains, but I think we need more.)
|
1.0
|
Need more test models with events - I looked through the .rrtest files and we only have one model with events: the model from #276. We need more models with events so that I can fix #281 without breaking existing models. (We also have the SBML test suite and any event tests it contains, but I think we need more.)
|
non_defect
|
need more test models with events i looked through the rrtest files and we only have one model with events the model from we need more models with events so that i can fix without breaking existing models we also have the sbml test suite and any event tests it contains but i think we need more
| 0
|
81,039
| 30,679,163,974
|
IssuesEvent
|
2023-07-26 07:59:53
|
arescentral/antares
|
https://api.github.com/repos/arescentral/antares
|
closed
|
Ships’ specifications missing in mission overview
|
Type:Defect Priority:High Complexity:Low
|
Clicking on a ship’s image while in the mission briefing screens in Ares brings up a window with the specifications of the ship, in Antares nothing happens.
|
1.0
|
Ships’ specifications missing in mission overview - Clicking on a ship’s image while in the mission briefing screens in Ares brings up a window with the specifications of the ship, in Antares nothing happens.
|
defect
|
ships’ specifications missing in mission overview clicking on a ship’s image while in the mission briefing screens in ares brings up a window with the specifications of the ship in antares nothing happens
| 1
|
32,108
| 26,430,716,196
|
IssuesEvent
|
2023-01-14 19:35:37
|
UBCSailbot/sailbot_workspace
|
https://api.github.com/repos/UBCSailbot/sailbot_workspace
|
closed
|
Update sailbot_workspace
|
infrastructure
|
### Disadvantages
- Breaks ability to run Raye codebase
- I don’t foresee a need to be able to run Raye and new project code together; the architectures of the 2 projects are different
- Would probably be a pain to figure out ROS 1 bridge
### Advantages
- Would simplify devcontainer and drastically reduce its size, potentially leading to performance gains
- Can source overlay in bashrc: no need to srcnew or srcraye
- Less deprecated stuff
- More recent versions of software in apt
### Changes
- Keep current infrastructure in a branch named raye
- Ubuntu 18.04 → 22.04
- ROS Eloquent → Humble
- Python 3.6 → 3.10
- C++ 14 → ?
|
1.0
|
Update sailbot_workspace - ### Disadvantages
- Breaks ability to run Raye codebase
- I don’t foresee a need to be able to run Raye and new project code together; the architectures of the 2 projects are different
- Would probably be a pain to figure out ROS 1 bridge
### Advantages
- Would simplify devcontainer and drastically reduce its size, potentially leading to performance gains
- Can source overlay in bashrc: no need to srcnew or srcraye
- Less deprecated stuff
- More recent versions of software in apt
### Changes
- Keep current infrastructure in a branch named raye
- Ubuntu 18.04 → 22.04
- ROS Eloquent → Humble
- Python 3.6 → 3.10
- C++ 14 → ?
|
non_defect
|
update sailbot workspace disadvantages breaks ability to run raye codebase i don’t foresee a need to be able to run raye and new project code together the architectures of the projects are different would probably be a pain to figure out ros bridge advantages would simplify devcontainer and drastically reduce its size potentially leading to performance gains can source overlay in bashrc no need to srcnew or srcraye less deprecated stuff more recent versions of software in apt changes keep current infrastructure in a branch named raye ubuntu → ros eloquent → humble python → c →
| 0
|
21,464
| 3,510,835,962
|
IssuesEvent
|
2016-01-09 20:11:33
|
ariya/phantomjs
|
https://api.github.com/repos/ariya/phantomjs
|
closed
|
JS crash
|
old.Domain-WebKit old.Status-New old.Type-Defect
|
PhantomJS binary always crashes on some sites. Looks like JSCore problem.
Example command:
> ../bin/phantomjs rasterize.js http://nohasslecontractorinsurance.com/ test.png
Here is the backtrace:
(gdb) i th
Id Target Id Frame
4 Thread 0x7fffaf3a9700 (LWP 28256) "QThread" 0x00007ffff67fb033 in select () at ../sysdeps/unix/syscall-template.S:82
3 Thread 0x7ffff4c75700 (LWP 28255) "QThread" 0x00007ffff67fb033 in select () at ../sysdeps/unix/syscall-template.S:82
2 Thread 0x7ffff547e700 (LWP 28254) "phantomjs" 0x00007ffff67cd84d in nanosleep () at ../sysdeps/unix/syscall-template.S:82
1 Thread 0x7ffff7fcf740 (LWP 28251) "phantomjs" 0x0000000000e11d62 in JSC::Yarr::YarrPatternConstructor::setupDisjunctionOffsets(JSC::Yarr::PatternDisjunction*, unsigned int, unsigned int) ()
(gdb) t 1
[Switching to thread 1 (Thread 0x7ffff7fcf740 (LWP 28251))]
#0 0x0000000000e11d62 in JSC::Yarr::YarrPatternConstructor::setupDisjunctionOffsets(JSC::Yarr::PatternDisjunction*, unsigned int, unsigned int) ()
(gdb) bt
#0 0x0000000000e11d62 in JSC::Yarr::YarrPatternConstructor::setupDisjunctionOffsets(JSC::Yarr::PatternDisjunction*, unsigned int, unsigned int) ()
#1 0x0000000000e124cb in JSC::Yarr::YarrPatternConstructor::setupDisjunctionOffsets(JSC::Yarr::PatternDisjunction*, unsigned int, unsigned int) ()
#2 0x0000000000e124cb in JSC::Yarr::YarrPatternConstructor::setupDisjunctionOffsets(JSC::Yarr::PatternDisjunction*, unsigned int, unsigned int) ()
#3 0x0000000000e1dcf8 in JSC::Yarr::YarrPattern::compile(JSC::UString const&) ()
#4 0x0000000000e1df98 in JSC::Yarr::YarrPattern::YarrPattern(JSC::UString const&, bool, bool, char const**) ()
#5 0x0000000000edc8e6 in JSC::RegExp::compile(JSC::JSGlobalData*) ()
#6 0x0000000000edd67b in JSC::RegExp::create(JSC::JSGlobalData*, JSC::UString const&, JSC::RegExpFlags) ()
#7 0x0000000000ee240c in JSC::RegExpCache::create(JSC::UString const&, JSC::RegExpFlags, WTF::HashTableIteratorAdapter<WTF::HashTable<JSC::RegExpKey, std::pair<JSC::RegExpKey, WTF::RefPtr<JSC::RegExp> >, WTF::PairFirstExtractor<std::pair<JSC::RegExpKey, WTF::RefPtr<JSC::RegExp> > >, WTF::RegExpHash<JSC::RegExpKey>, WTF::PairHashTraits<WTF::HashTraits<JSC::RegExpKey>, WTF::HashTraits<WTF::RefPtr<JSC::RegExp> > >, WTF::HashTraits<JSC::RegExpKey> >, std::pair<JSC::RegExpKey, WTF::RefPtr<JSC::RegExp> > >) ()
#8 0x0000000000ee2db0 in JSC::RegExpCache::lookupOrCreate(JSC::UString const&, JSC::RegExpFlags) ()
#9 0x0000000000edb781 in JSC::constructRegExp(JSC::ExecState*, JSC::JSGlobalObject*, JSC::ArgList const&) [clone .constprop.122] ()
#10 0x0000000000edc0f6 in JSC::constructWithRegExpConstructor(JSC::ExecState*) ()
#11 0x0000000000e809f7 in cti_op_construct_NotJSConstruct ()
#12 0x00007fffb001aa34 in ?? ()
#13 0x0000000000000000 in ?? ()
(gdb) t 2
[Switching to thread 2 (Thread 0x7ffff547e700 (LWP 28254))]
#0 0x00007ffff67cd84d in nanosleep () at ../sysdeps/unix/syscall-template.S:82
82 ../sysdeps/unix/syscall-template.S: Нет такого файла или каталога.
(gdb) bt
#0 0x00007ffff67cd84d in nanosleep () at ../sysdeps/unix/syscall-template.S:82
#1 0x00007ffff67cd6ec in __sleep (seconds=0) at ../sysdeps/unix/sysv/linux/sleep.c:138
#2 0x00000000004d5607 in WTF::TCMalloc_PageHeap::scavengerThread() ()
#3 0x00000000004d58d9 in WTF::TCMalloc_PageHeap::runScavengerThread(void*) ()
#4 0x00007ffff72e6e9a in start_thread (arg=0x7ffff547e700) at pthread_create.c:308
#5 0x00007ffff6801ccd in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:112
#6 0x0000000000000000 in ?? ()
(gdb) t 3
[Switching to thread 3 (Thread 0x7ffff4c75700 (LWP 28255))]
#0 0x00007ffff67fb033 in select () at ../sysdeps/unix/syscall-template.S:82
82 ../sysdeps/unix/syscall-template.S: Нет такого файла или каталога.
(gdb) bt
#0 0x00007ffff67fb033 in select () at ../sysdeps/unix/syscall-template.S:82
#1 0x0000000001c44866 in qt_safe_select(int, fd_set*, fd_set*, fd_set*, timeval const*) ()
#2 0x0000000001c466b7 in QEventDispatcherUNIXPrivate::doSelect(QFlags<QEventLoop::ProcessEventsFlag>, timeval*) ()
#3 0x0000000001c46af3 in QEventDispatcherUNIX::processEvents(QFlags<QEventLoop::ProcessEventsFlag>) ()
#4 0x0000000001c1cf62 in QEventLoop::processEvents(QFlags<QEventLoop::ProcessEventsFlag>) ()
#5 0x0000000001c1d1bf in QEventLoop::exec(QFlags<QEventLoop::ProcessEventsFlag>) ()
#6 0x0000000001b2f147 in QThread::exec() ()
#7 0x0000000001b31f0c in QThreadPrivate::start(void*) ()
#8 0x00007ffff72e6e9a in start_thread (arg=0x7ffff4c75700) at pthread_create.c:308
#9 0x00007ffff6801ccd in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:112
#10 0x0000000000000000 in ?? ()
(gdb) t 4
[Switching to thread 4 (Thread 0x7fffaf3a9700 (LWP 28256))]
#0 0x00007ffff67fb033 in select () at ../sysdeps/unix/syscall-template.S:82
82 in ../sysdeps/unix/syscall-template.S
(gdb) bt
#0 0x00007ffff67fb033 in select () at ../sysdeps/unix/syscall-template.S:82
#1 0x0000000001c4480f in qt_safe_select(int, fd_set*, fd_set*, fd_set*, timeval const*) ()
#2 0x0000000001c466b7 in QEventDispatcherUNIXPrivate::doSelect(QFlags<QEventLoop::ProcessEventsFlag>, timeval*) ()
#3 0x0000000001c46af3 in QEventDispatcherUNIX::processEvents(QFlags<QEventLoop::ProcessEventsFlag>) ()
#4 0x0000000001c1cf62 in QEventLoop::processEvents(QFlags<QEventLoop::ProcessEventsFlag>) ()
#5 0x0000000001c1d1bf in QEventLoop::exec(QFlags<QEventLoop::ProcessEventsFlag>) ()
#6 0x0000000001b2f147 in QThread::exec() ()
#7 0x0000000001b31f0c in QThreadPrivate::start(void*) ()
#8 0x00007ffff72e6e9a in start_thread (arg=0x7fffaf3a9700) at pthread_create.c:308
#9 0x00007ffff6801ccd in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:112
#10 0x0000000000000000 in ?? ()
|
1.0
|
JS crash - PhantomJS binary always crashes on some sites. Looks like JSCore problem.
Example command:
> ../bin/phantomjs rasterize.js http://nohasslecontractorinsurance.com/ test.png
Here is the backtrace:
(gdb) i th
Id Target Id Frame
4 Thread 0x7fffaf3a9700 (LWP 28256) "QThread" 0x00007ffff67fb033 in select () at ../sysdeps/unix/syscall-template.S:82
3 Thread 0x7ffff4c75700 (LWP 28255) "QThread" 0x00007ffff67fb033 in select () at ../sysdeps/unix/syscall-template.S:82
2 Thread 0x7ffff547e700 (LWP 28254) "phantomjs" 0x00007ffff67cd84d in nanosleep () at ../sysdeps/unix/syscall-template.S:82
1 Thread 0x7ffff7fcf740 (LWP 28251) "phantomjs" 0x0000000000e11d62 in JSC::Yarr::YarrPatternConstructor::setupDisjunctionOffsets(JSC::Yarr::PatternDisjunction*, unsigned int, unsigned int) ()
(gdb) t 1
[Switching to thread 1 (Thread 0x7ffff7fcf740 (LWP 28251))]
#0 0x0000000000e11d62 in JSC::Yarr::YarrPatternConstructor::setupDisjunctionOffsets(JSC::Yarr::PatternDisjunction*, unsigned int, unsigned int) ()
(gdb) bt
#0 0x0000000000e11d62 in JSC::Yarr::YarrPatternConstructor::setupDisjunctionOffsets(JSC::Yarr::PatternDisjunction*, unsigned int, unsigned int) ()
#1 0x0000000000e124cb in JSC::Yarr::YarrPatternConstructor::setupDisjunctionOffsets(JSC::Yarr::PatternDisjunction*, unsigned int, unsigned int) ()
#2 0x0000000000e124cb in JSC::Yarr::YarrPatternConstructor::setupDisjunctionOffsets(JSC::Yarr::PatternDisjunction*, unsigned int, unsigned int) ()
#3 0x0000000000e1dcf8 in JSC::Yarr::YarrPattern::compile(JSC::UString const&) ()
#4 0x0000000000e1df98 in JSC::Yarr::YarrPattern::YarrPattern(JSC::UString const&, bool, bool, char const**) ()
#5 0x0000000000edc8e6 in JSC::RegExp::compile(JSC::JSGlobalData*) ()
#6 0x0000000000edd67b in JSC::RegExp::create(JSC::JSGlobalData*, JSC::UString const&, JSC::RegExpFlags) ()
#7 0x0000000000ee240c in JSC::RegExpCache::create(JSC::UString const&, JSC::RegExpFlags, WTF::HashTableIteratorAdapter<WTF::HashTable<JSC::RegExpKey, std::pair<JSC::RegExpKey, WTF::RefPtr<JSC::RegExp> >, WTF::PairFirstExtractor<std::pair<JSC::RegExpKey, WTF::RefPtr<JSC::RegExp> > >, WTF::RegExpHash<JSC::RegExpKey>, WTF::PairHashTraits<WTF::HashTraits<JSC::RegExpKey>, WTF::HashTraits<WTF::RefPtr<JSC::RegExp> > >, WTF::HashTraits<JSC::RegExpKey> >, std::pair<JSC::RegExpKey, WTF::RefPtr<JSC::RegExp> > >) ()
#8 0x0000000000ee2db0 in JSC::RegExpCache::lookupOrCreate(JSC::UString const&, JSC::RegExpFlags) ()
#9 0x0000000000edb781 in JSC::constructRegExp(JSC::ExecState*, JSC::JSGlobalObject*, JSC::ArgList const&) [clone .constprop.122] ()
#10 0x0000000000edc0f6 in JSC::constructWithRegExpConstructor(JSC::ExecState*) ()
#11 0x0000000000e809f7 in cti_op_construct_NotJSConstruct ()
#12 0x00007fffb001aa34 in ?? ()
#13 0x0000000000000000 in ?? ()
(gdb) t 2
[Switching to thread 2 (Thread 0x7ffff547e700 (LWP 28254))]
#0 0x00007ffff67cd84d in nanosleep () at ../sysdeps/unix/syscall-template.S:82
82 ../sysdeps/unix/syscall-template.S: Нет такого файла или каталога.
(gdb) bt
#0 0x00007ffff67cd84d in nanosleep () at ../sysdeps/unix/syscall-template.S:82
#1 0x00007ffff67cd6ec in __sleep (seconds=0) at ../sysdeps/unix/sysv/linux/sleep.c:138
#2 0x00000000004d5607 in WTF::TCMalloc_PageHeap::scavengerThread() ()
#3 0x00000000004d58d9 in WTF::TCMalloc_PageHeap::runScavengerThread(void*) ()
#4 0x00007ffff72e6e9a in start_thread (arg=0x7ffff547e700) at pthread_create.c:308
#5 0x00007ffff6801ccd in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:112
#6 0x0000000000000000 in ?? ()
(gdb) t 3
[Switching to thread 3 (Thread 0x7ffff4c75700 (LWP 28255))]
#0 0x00007ffff67fb033 in select () at ../sysdeps/unix/syscall-template.S:82
82 ../sysdeps/unix/syscall-template.S: Нет такого файла или каталога.
(gdb) bt
#0 0x00007ffff67fb033 in select () at ../sysdeps/unix/syscall-template.S:82
#1 0x0000000001c44866 in qt_safe_select(int, fd_set*, fd_set*, fd_set*, timeval const*) ()
#2 0x0000000001c466b7 in QEventDispatcherUNIXPrivate::doSelect(QFlags<QEventLoop::ProcessEventsFlag>, timeval*) ()
#3 0x0000000001c46af3 in QEventDispatcherUNIX::processEvents(QFlags<QEventLoop::ProcessEventsFlag>) ()
#4 0x0000000001c1cf62 in QEventLoop::processEvents(QFlags<QEventLoop::ProcessEventsFlag>) ()
#5 0x0000000001c1d1bf in QEventLoop::exec(QFlags<QEventLoop::ProcessEventsFlag>) ()
#6 0x0000000001b2f147 in QThread::exec() ()
#7 0x0000000001b31f0c in QThreadPrivate::start(void*) ()
#8 0x00007ffff72e6e9a in start_thread (arg=0x7ffff4c75700) at pthread_create.c:308
#9 0x00007ffff6801ccd in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:112
#10 0x0000000000000000 in ?? ()
(gdb) t 4
[Switching to thread 4 (Thread 0x7fffaf3a9700 (LWP 28256))]
#0 0x00007ffff67fb033 in select () at ../sysdeps/unix/syscall-template.S:82
82 in ../sysdeps/unix/syscall-template.S
(gdb) bt
#0 0x00007ffff67fb033 in select () at ../sysdeps/unix/syscall-template.S:82
#1 0x0000000001c4480f in qt_safe_select(int, fd_set*, fd_set*, fd_set*, timeval const*) ()
#2 0x0000000001c466b7 in QEventDispatcherUNIXPrivate::doSelect(QFlags<QEventLoop::ProcessEventsFlag>, timeval*) ()
#3 0x0000000001c46af3 in QEventDispatcherUNIX::processEvents(QFlags<QEventLoop::ProcessEventsFlag>) ()
#4 0x0000000001c1cf62 in QEventLoop::processEvents(QFlags<QEventLoop::ProcessEventsFlag>) ()
#5 0x0000000001c1d1bf in QEventLoop::exec(QFlags<QEventLoop::ProcessEventsFlag>) ()
#6 0x0000000001b2f147 in QThread::exec() ()
#7 0x0000000001b31f0c in QThreadPrivate::start(void*) ()
#8 0x00007ffff72e6e9a in start_thread (arg=0x7fffaf3a9700) at pthread_create.c:308
#9 0x00007ffff6801ccd in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:112
#10 0x0000000000000000 in ?? ()
|
defect
|
js crash phantomjs binary always crashes on some sites looks like jscore problem example command bin phantomjs rasterize js test png here is the backtrace gdb i th id target id frame thread lwp qthread in select at sysdeps unix syscall template s thread lwp qthread in select at sysdeps unix syscall template s thread lwp phantomjs in nanosleep at sysdeps unix syscall template s thread lwp phantomjs in jsc yarr yarrpatternconstructor setupdisjunctionoffsets jsc yarr patterndisjunction unsigned int unsigned int gdb t in jsc yarr yarrpatternconstructor setupdisjunctionoffsets jsc yarr patterndisjunction unsigned int unsigned int gdb bt in jsc yarr yarrpatternconstructor setupdisjunctionoffsets jsc yarr patterndisjunction unsigned int unsigned int in jsc yarr yarrpatternconstructor setupdisjunctionoffsets jsc yarr patterndisjunction unsigned int unsigned int in jsc yarr yarrpatternconstructor setupdisjunctionoffsets jsc yarr patterndisjunction unsigned int unsigned int in jsc yarr yarrpattern compile jsc ustring const in jsc yarr yarrpattern yarrpattern jsc ustring const bool bool char const in jsc regexp compile jsc jsglobaldata in jsc regexp create jsc jsglobaldata jsc ustring const jsc regexpflags in jsc regexpcache create jsc ustring const jsc regexpflags wtf hashtableiteratoradapter wtf pairfirstextractor wtf regexphash wtf pairhashtraits wtf hashtraits wtf hashtraits std pair in jsc regexpcache lookuporcreate jsc ustring const jsc regexpflags in jsc constructregexp jsc execstate jsc jsglobalobject jsc arglist const in jsc constructwithregexpconstructor jsc execstate in cti op construct notjsconstruct in in gdb t in nanosleep at sysdeps unix syscall template s sysdeps unix syscall template s нет такого файла или каталога gdb bt in nanosleep at sysdeps unix syscall template s in sleep seconds at sysdeps unix sysv linux sleep c in wtf tcmalloc pageheap scavengerthread in wtf tcmalloc pageheap runscavengerthread void in start thread arg at pthread create c in clone at sysdeps unix sysv linux clone s in gdb t in select at sysdeps unix syscall template s sysdeps unix syscall template s нет такого файла или каталога gdb bt in select at sysdeps unix syscall template s in qt safe select int fd set fd set fd set timeval const in qeventdispatcherunixprivate doselect qflags timeval in qeventdispatcherunix processevents qflags in qeventloop processevents qflags in qeventloop exec qflags in qthread exec in qthreadprivate start void in start thread arg at pthread create c in clone at sysdeps unix sysv linux clone s in gdb t in select at sysdeps unix syscall template s in sysdeps unix syscall template s gdb bt in select at sysdeps unix syscall template s in qt safe select int fd set fd set fd set timeval const in qeventdispatcherunixprivate doselect qflags timeval in qeventdispatcherunix processevents qflags in qeventloop processevents qflags in qeventloop exec qflags in qthread exec in qthreadprivate start void in start thread arg at pthread create c in clone at sysdeps unix sysv linux clone s in
| 1
|
277,818
| 30,674,418,378
|
IssuesEvent
|
2023-07-26 03:08:16
|
amaybaum-prod/atom-hopper
|
https://api.github.com/repos/amaybaum-prod/atom-hopper
|
closed
|
spring-web-5.2.22.RELEASE.jar: 1 vulnerabilities (highest severity is: 9.8) - autoclosed
|
Mend: dependency security vulnerability
|
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-web-5.2.22.RELEASE.jar</b></p></summary>
<p>Spring Web</p>
<p>Path to dependency file: /adapters/migration/pom.xml</p>
<p>Path to vulnerable library: /atomhopper/target/atomhopper-1.2.35-SNAPSHOT/WEB-INF/lib/spring-web-5.2.22.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.22.RELEASE/spring-web-5.2.22.RELEASE.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-prod/atom-hopper/commit/d0c49807860a8c07c922d8e19168bd6893aad298">d0c49807860a8c07c922d8e19168bd6893aad298</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (spring-web version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2016-1000027](https://www.mend.io/vulnerability-database/CVE-2016-1000027) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | spring-web-5.2.22.RELEASE.jar | Direct | org.springframework:spring-web:6.0.0 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2016-1000027</summary>
### Vulnerable Library - <b>spring-web-5.2.22.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Path to dependency file: /adapters/migration/pom.xml</p>
<p>Path to vulnerable library: /atomhopper/target/atomhopper-1.2.35-SNAPSHOT/WEB-INF/lib/spring-web-5.2.22.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.22.RELEASE/spring-web-5.2.22.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-5.2.22.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-prod/atom-hopper/commit/d0c49807860a8c07c922d8e19168bd6893aad298">d0c49807860a8c07c922d8e19168bd6893aad298</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
Mend Note: After conducting further research, Mend has determined that all versions of spring-web up to version 6.0.0 are vulnerable to CVE-2016-1000027.
<p>Publish Date: 2020-01-02
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-1000027>CVE-2016-1000027</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-4wrc-f8pq-fpqp">https://github.com/advisories/GHSA-4wrc-f8pq-fpqp</a></p>
<p>Release Date: 2020-01-02</p>
<p>Fix Resolution: org.springframework:spring-web:6.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
|
True
|
spring-web-5.2.22.RELEASE.jar: 1 vulnerabilities (highest severity is: 9.8) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-web-5.2.22.RELEASE.jar</b></p></summary>
<p>Spring Web</p>
<p>Path to dependency file: /adapters/migration/pom.xml</p>
<p>Path to vulnerable library: /atomhopper/target/atomhopper-1.2.35-SNAPSHOT/WEB-INF/lib/spring-web-5.2.22.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.22.RELEASE/spring-web-5.2.22.RELEASE.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-prod/atom-hopper/commit/d0c49807860a8c07c922d8e19168bd6893aad298">d0c49807860a8c07c922d8e19168bd6893aad298</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (spring-web version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2016-1000027](https://www.mend.io/vulnerability-database/CVE-2016-1000027) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | spring-web-5.2.22.RELEASE.jar | Direct | org.springframework:spring-web:6.0.0 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2016-1000027</summary>
### Vulnerable Library - <b>spring-web-5.2.22.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Path to dependency file: /adapters/migration/pom.xml</p>
<p>Path to vulnerable library: /atomhopper/target/atomhopper-1.2.35-SNAPSHOT/WEB-INF/lib/spring-web-5.2.22.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.22.RELEASE/spring-web-5.2.22.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-5.2.22.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-prod/atom-hopper/commit/d0c49807860a8c07c922d8e19168bd6893aad298">d0c49807860a8c07c922d8e19168bd6893aad298</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
Mend Note: After conducting further research, Mend has determined that all versions of spring-web up to version 6.0.0 are vulnerable to CVE-2016-1000027.
<p>Publish Date: 2020-01-02
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-1000027>CVE-2016-1000027</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-4wrc-f8pq-fpqp">https://github.com/advisories/GHSA-4wrc-f8pq-fpqp</a></p>
<p>Release Date: 2020-01-02</p>
<p>Fix Resolution: org.springframework:spring-web:6.0.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
|
non_defect
|
spring web release jar vulnerabilities highest severity is autoclosed vulnerable library spring web release jar spring web path to dependency file adapters migration pom xml path to vulnerable library atomhopper target atomhopper snapshot web inf lib spring web release jar home wss scanner repository org springframework spring web release spring web release jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in spring web version remediation available critical spring web release jar direct org springframework spring web details cve vulnerable library spring web release jar spring web path to dependency file adapters migration pom xml path to vulnerable library atomhopper target atomhopper snapshot web inf lib spring web release jar home wss scanner repository org springframework spring web release spring web release jar dependency hierarchy x spring web release jar vulnerable library found in head commit a href found in base branch master vulnerability details pivotal spring framework through suffers from a potential remote code execution rce issue if used for java deserialization of untrusted data depending on how the library is implemented within a product this issue may or not occur and authentication may be required note the vendor s position is that untrusted data is not an intended use case the product s behavior will not be changed because some users rely on deserialization of trusted data mend note after conducting further research mend has determined that all versions of spring web up to version are vulnerable to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring web rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
| 0
|
64,110
| 18,216,693,538
|
IssuesEvent
|
2021-09-30 05:51:17
|
SUI-Components/sui-components
|
https://api.github.com/repos/SUI-Components/sui-components
|
opened
|
Checkbox field - Elements alignment
|
defect
|
Component [checkbox field](https://sui-components.vercel.app/workbench/molecule/checkboxField/demo)
**Is your iteration request related to a problem?**
The alignment of the label, help text and check is not ok

**Describe the solution you'd like**
Horizontal and vertical alignments should be sharp

**Additional context**
- It happens in all themes
- Check alignments with custom and native checks
|
1.0
|
Checkbox field - Elements alignment - Component [checkbox field](https://sui-components.vercel.app/workbench/molecule/checkboxField/demo)
**Is your iteration request related to a problem?**
The alignment of the label, help text and check is not ok

**Describe the solution you'd like**
Horizontal and vertical alignments should be sharp

**Additional context**
- It happens in all themes
- Check alignments with custom and native checks
|
defect
|
checkbox field elements alignment component is your iteration request related to a problem the alignment of the label help text and check is not ok describe the solution you d like horizontal and vertical alignments should be sharp additional context it happens in all themes check alignments with custom and native checks
| 1
|
423,659
| 28,780,907,837
|
IssuesEvent
|
2023-05-02 00:28:53
|
elyra-ai/elyra
|
https://api.github.com/repos/elyra-ai/elyra
|
closed
|
Update 'Deploying Open Data Hub with Elyra' documentation topic
|
area:documentation kind:enhancement platform: Open Data Hub
|
**Is your feature request related to a problem? Please describe.**
The content in https://elyra.readthedocs.io/en/stable/recipes/deploying-elyra-with-opendatahub.html is outdated and needs to be refreshed.
|
1.0
|
Update 'Deploying Open Data Hub with Elyra' documentation topic - **Is your feature request related to a problem? Please describe.**
The content in https://elyra.readthedocs.io/en/stable/recipes/deploying-elyra-with-opendatahub.html is outdated and needs to be refreshed.
|
non_defect
|
update deploying open data hub with elyra documentation topic is your feature request related to a problem please describe the content in is outdated and needs to be refreshed
| 0
|
14,257
| 4,862,029,505
|
IssuesEvent
|
2016-11-14 10:54:32
|
ldc-developers/ldc
|
https://api.github.com/repos/ldc-developers/ldc
|
opened
|
LLVM `inrange` attribute on getelementptr
|
B-suboptimal-code
|
Investigate implications for LDC and perhaps implement additional logic in LDC for this:
https://reviews.llvm.org/rL286514
|
1.0
|
LLVM `inrange` attribute on getelementptr - Investigate implications for LDC and perhaps implement additional logic in LDC for this:
https://reviews.llvm.org/rL286514
|
non_defect
|
llvm inrange attribute on getelementptr investigate implications for ldc and perhaps implement additional logic in ldc for this
| 0
|
74,015
| 24,906,022,823
|
IssuesEvent
|
2022-10-29 08:53:13
|
openzfs/zfs
|
https://api.github.com/repos/openzfs/zfs
|
closed
|
user quota on encrypted file system
|
Type: Defect Status: Stale
|
<!-- Please fill out the following template, which will help other contributors address your issue. -->
After a bit of investigation, it seems that this was fixed in 9596. So this turns into a question. Is there some way I can fix a file system that's in this state? The fix is likely to take quite some time to get into an Ubuntu distribution.
I have ZFS 0.8.4 on Ubuntu 20.04. The whole pool is not encrypted, but the dataset is. It was created by zfs sent | receive -o encryption=on ...
When I set userquota@=, it doesn't read back.
zfs userspace beta/users
cannot get used/quota for beta/users: unsupported version or feature
so even if I don't use quotas I can't manage space.
It works fine when I create a new file system, so the problem does seem to be only when it's created by receive. But in any conversion, I'd really like to use send/receive.
<!--
Thank you for reporting an issue.
*IMPORTANT* - Please check our issue tracker before opening a new issue.
Additional valuable information can be found in the OpenZFS documentation
and mailing list archives.
Please fill in as much of the template as possible.
-->
### System information
<!-- add version after "|" character -->
Type | Version/Name
--- | ---
Distribution Name |
Distribution Version |
Kernel Version |
Architecture |
OpenZFS Version |
<!--
Command to find OpenZFS version:
zfs version
Commands to find kernel version:
uname -r # Linux
freebsd-version -r # FreeBSD
-->
### Describe the problem you're observing
### Describe how to reproduce the problem
### Include any warning/errors/backtraces from the system logs
<!--
*IMPORTANT* - Please mark logs and text output from terminal commands
or else Github will not display them correctly.
An example is provided below.
Example:
```
this is an example how log text should be marked (wrap it with ```)
```
-->
|
1.0
|
user quota on encrypted file system - <!-- Please fill out the following template, which will help other contributors address your issue. -->
After a bit of investigation, it seems that this was fixed in 9596. So this turns into a question. Is there some way I can fix a file system that's in this state? The fix is likely to take quite some time to get into an Ubuntu distribution.
I have ZFS 0.8.4 on Ubuntu 20.04. The whole pool is not encrypted, but the dataset is. It was created by zfs sent | receive -o encryption=on ...
When I set userquota@=, it doesn't read back.
zfs userspace beta/users
cannot get used/quota for beta/users: unsupported version or feature
so even if I don't use quotas I can't manage space.
It works fine when I create a new file system, so the problem does seem to be only when it's created by receive. But in any conversion, I'd really like to use send/receive.
<!--
Thank you for reporting an issue.
*IMPORTANT* - Please check our issue tracker before opening a new issue.
Additional valuable information can be found in the OpenZFS documentation
and mailing list archives.
Please fill in as much of the template as possible.
-->
### System information
<!-- add version after "|" character -->
Type | Version/Name
--- | ---
Distribution Name |
Distribution Version |
Kernel Version |
Architecture |
OpenZFS Version |
<!--
Command to find OpenZFS version:
zfs version
Commands to find kernel version:
uname -r # Linux
freebsd-version -r # FreeBSD
-->
### Describe the problem you're observing
### Describe how to reproduce the problem
### Include any warning/errors/backtraces from the system logs
<!--
*IMPORTANT* - Please mark logs and text output from terminal commands
or else Github will not display them correctly.
An example is provided below.
Example:
```
this is an example how log text should be marked (wrap it with ```)
```
-->
|
defect
|
user quota on encrypted file system after a bit of investigation it seems that this was fixed in so this turns into a question is there some way i can fix a file system that s in this state the fix is likely to take quite some time to get into an ubuntu distribution i have zfs on ubuntu the whole pool is not encrypted but the dataset is it was created by zfs sent receive o encryption on when i set userquota it doesn t read back zfs userspace beta users cannot get used quota for beta users unsupported version or feature so even if i don t use quotas i can t manage space it works fine when i create a new file system so the problem does seem to be only when it s created by receive but in any conversion i d really like to use send receive thank you for reporting an issue important please check our issue tracker before opening a new issue additional valuable information can be found in the openzfs documentation and mailing list archives please fill in as much of the template as possible system information type version name distribution name distribution version kernel version architecture openzfs version command to find openzfs version zfs version commands to find kernel version uname r linux freebsd version r freebsd describe the problem you re observing describe how to reproduce the problem include any warning errors backtraces from the system logs important please mark logs and text output from terminal commands or else github will not display them correctly an example is provided below example this is an example how log text should be marked wrap it with
| 1
|
133,639
| 18,299,002,370
|
IssuesEvent
|
2021-10-05 23:52:26
|
bsbtd/Teste
|
https://api.github.com/repos/bsbtd/Teste
|
opened
|
CVE-2021-21350 (High) detected in xstream-1.3.1.jar
|
security vulnerability
|
## CVE-2021-21350 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.3.1.jar</b></p></summary>
<p></p>
<p>Path to vulnerable library: 1.jar</p>
<p>
Dependency Hierarchy:
- :x: **xstream-1.3.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/bsbtd/Teste/commit/64dde89c50c07496423c4d4a865f2e16b92399ad">64dde89c50c07496423c4d4a865f2e16b92399ad</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
<p>Publish Date: 2021-03-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21350>CVE-2021-21350</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq">https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq</a></p>
<p>Release Date: 2021-03-23</p>
<p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2021-21350 (High) detected in xstream-1.3.1.jar - ## CVE-2021-21350 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.3.1.jar</b></p></summary>
<p></p>
<p>Path to vulnerable library: 1.jar</p>
<p>
Dependency Hierarchy:
- :x: **xstream-1.3.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/bsbtd/Teste/commit/64dde89c50c07496423c4d4a865f2e16b92399ad">64dde89c50c07496423c4d4a865f2e16b92399ad</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
<p>Publish Date: 2021-03-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21350>CVE-2021-21350</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq">https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq</a></p>
<p>Release Date: 2021-03-23</p>
<p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve high detected in xstream jar cve high severity vulnerability vulnerable library xstream jar path to vulnerable library jar dependency hierarchy x xstream jar vulnerable library found in head commit a href vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com thoughtworks xstream xstream step up your open source security game with whitesource
| 0
|
59,046
| 17,015,150,900
|
IssuesEvent
|
2021-07-02 10:54:42
|
tomhughes/trac-tickets
|
https://api.github.com/repos/tomhughes/trac-tickets
|
opened
|
Cities disappear in zoom levels 10..13
|
Component: opencyclemap Priority: major Type: defect
|
**[Submitted to the original trac issue database at 11.21am, Sunday, 29th August 2010]**
I was looking at cycle routes between London and Brighton, both very visible in zoom level 9: http://www.openstreetmap.org/?lat=51.06&lon=-0.082&zoom=9&layers=C
One zoom step closer and Brighton disappears completely, replaced by completely new places. Very disorienting. Continue zooming in four more times to level 14 and Brighton comes back.
On the other hand !London/Westminster/Kensington disappear on zoom level 12, and then reappear rather unpredictably.
Compare this with how in Mapnik the labels stay visible as you zoom in. IMO it's much better behavior.
|
1.0
|
Cities disappear in zoom levels 10..13 - **[Submitted to the original trac issue database at 11.21am, Sunday, 29th August 2010]**
I was looking at cycle routes between London and Brighton, both very visible in zoom level 9: http://www.openstreetmap.org/?lat=51.06&lon=-0.082&zoom=9&layers=C
One zoom step closer and Brighton disappears completely, replaced by completely new places. Very disorienting. Continue zooming in four more times to level 14 and Brighton comes back.
On the other hand !London/Westminster/Kensington disappear on zoom level 12, and then reappear rather unpredictably.
Compare this with how in Mapnik the labels stay visible as you zoom in. IMO it's much better behavior.
|
defect
|
cities disappear in zoom levels i was looking at cycle routes between london and brighton both very visible in zoom level one zoom step closer and brighton disappears completely replaced by completely new places very disorienting continue zooming in four more times to level and brighton comes back on the other hand london westminster kensington disappear on zoom level and then reappear rather unpredictably compare this with how in mapnik the labels stay visible as you zoom in imo it s much better behavior
| 1
|
29,520
| 11,758,201,384
|
IssuesEvent
|
2020-03-13 15:00:42
|
SonarSource/sonar-dotnet
|
https://api.github.com/repos/SonarSource/sonar-dotnet
|
closed
|
Fix S2068 FN: Raise issue for literals passed as arguments
|
Area: C# Area: Security Area: VB.NET Type: False Negative
|
### Description
Issue is not raised when hardcoded password is used directly as argument.
### Repro steps
```
Using Conn As SqlConnection = OpenConn("Server=localhost; Database=Test; User=SA; Password=Secret123") ' Noncompliant
End Using
Using Conn As New SqlConnection("Server=localhost; Database=Test; User=SA; Password=Secret123") ' Noncompliant
End Using
```
### Other
We can fix other FNs when registering directly for string literal values as well:
```
Dim fn1 As String = "scheme://user:azerty123@" & Domain ' Compliant FN, concatenated strings are not supported
Dim query2 As String = "password=hardcoded;user='" + user + "'" ' False Negative - Only LiteralExpressionSyntax nodes are covered
```
|
True
|
Fix S2068 FN: Raise issue for literals passed as arguments - ### Description
Issue is not raised when hardcoded password is used directly as argument.
### Repro steps
```
Using Conn As SqlConnection = OpenConn("Server=localhost; Database=Test; User=SA; Password=Secret123") ' Noncompliant
End Using
Using Conn As New SqlConnection("Server=localhost; Database=Test; User=SA; Password=Secret123") ' Noncompliant
End Using
```
### Other
We can fix other FNs when registering directly for string literal values as well:
```
Dim fn1 As String = "scheme://user:azerty123@" & Domain ' Compliant FN, concatenated strings are not supported
Dim query2 As String = "password=hardcoded;user='" + user + "'" ' False Negative - Only LiteralExpressionSyntax nodes are covered
```
|
non_defect
|
fix fn raise issue for literals passed as arguments description issue is not raised when hardcoded password is used directly as argument repro steps using conn as sqlconnection openconn server localhost database test user sa password noncompliant end using using conn as new sqlconnection server localhost database test user sa password noncompliant end using other we can fix other fns when registering directly for string literal values as well dim as string scheme user domain compliant fn concatenated strings are not supported dim as string password hardcoded user user false negative only literalexpressionsyntax nodes are covered
| 0
|
35,449
| 7,745,501,699
|
IssuesEvent
|
2018-05-29 18:33:16
|
extnet/Ext.NET
|
https://api.github.com/repos/extnet/Ext.NET
|
opened
|
SpriteEvents plugin does not work
|
4.x defect extjs-test-pending
|
Found: 4.5.1
Ext.NET forum thread: []()
DrawContainer's SpriteEvents is not working, as can be noticed in the rotate image examples on MVC and WebForms examples explorers:
- [MVC Rotate Image example](http://mvc4.ext.net/#/Draw_Basic/Rotate_Image/)
- [WebForms Rotate Image example](http://examples4.ext.net/#/Draw/Basic/Rotate_Image/)
The events simply do not fire, at least under google chrome.
If using MS-Edge, the same example does not display the image at all.
|
1.0
|
SpriteEvents plugin does not work - Found: 4.5.1
Ext.NET forum thread: []()
DrawContainer's SpriteEvents is not working, as can be noticed in the rotate image examples on MVC and WebForms examples explorers:
- [MVC Rotate Image example](http://mvc4.ext.net/#/Draw_Basic/Rotate_Image/)
- [WebForms Rotate Image example](http://examples4.ext.net/#/Draw/Basic/Rotate_Image/)
The events simply do not fire, at least under google chrome.
If using MS-Edge, the same example does not display the image at all.
|
defect
|
spriteevents plugin does not work found ext net forum thread drawcontainer s spriteevents is not working as can be noticed in the rotate image examples on mvc and webforms examples explorers the events simply do not fire at least under google chrome if using ms edge the same example does not display the image at all
| 1
|
30,675
| 5,832,063,451
|
IssuesEvent
|
2017-05-08 20:53:12
|
trailofbits/manticore
|
https://api.github.com/repos/trailofbits/manticore
|
closed
|
Optimization tips documentation
|
documentation
|
Would be helpful for users to know how to optimize manticore. Some topics could include
- using hooks to patch out irrelevant code (like printf)
- abandoning states
|
1.0
|
Optimization tips documentation - Would be helpful for users to know how to optimize manticore. Some topics could include
- using hooks to patch out irrelevant code (like printf)
- abandoning states
|
non_defect
|
optimization tips documentation would be helpful for users to know how to optimize manticore some topics could include using hooks to patch out irrelevant code like printf abandoning states
| 0
|
56,740
| 15,345,135,271
|
IssuesEvent
|
2021-02-28 05:19:45
|
kohenkatz/appqr
|
https://api.github.com/repos/kohenkatz/appqr
|
closed
|
Failed to open in play store app
|
Priority-Medium Type-Defect auto-migrated
|
```
What steps will reproduce the problem?
1. After Scan and tab the link directly open in default android browser.
2.
3.
What is the expected output? What do you see instead?
Found error in browser said "This web page is not available".
The generated link is "http://market//details?id=com.letsdoitworld.wastemapper"
What version of the product are you using? On what operating system?
My mobile is Samsung Galaxy Note III SM-N9005 and running on Kit Kat 4.4.2
Please provide any additional information below.
what i was found is, the generated link to Play Store is missing the colon (:)
character like :
market//details?id=com.letsdoitworld.wastemapper
And the working link suppose to be like :
market://details?id=com.letsdoitworld.wastemapper
You can view the android link at your example link below :
http://m.appqr.mobi/appqr?qr=1&androidmarket=market://details?id=com.letsdoitwor
ld.wastemapper&appstore=http://itunes.apple.com/us/app/lets-do-it-world/id443259
456?mt=8&ls=1&wp=http://social.zune.net/redirect?type=phoneApp&id=c14e93aa-27d7-
df11-a844-00237de2db9&bb=http://appworld.blackberry.com/webstore/content/680
Hope you can solve it so that my Url Qr Code image working perfectly.
Thank you.
```
Original issue reported on code.google.com by `eservice...@gmail.com` on 13 Mar 2014 at 5:09
Attachments:
- [Error.png](https://storage.googleapis.com/google-code-attachments/appqr/issue-7/comment-0/Error.png)
|
1.0
|
Failed to open in play store app - ```
What steps will reproduce the problem?
1. After Scan and tab the link directly open in default android browser.
2.
3.
What is the expected output? What do you see instead?
Found error in browser said "This web page is not available".
The generated link is "http://market//details?id=com.letsdoitworld.wastemapper"
What version of the product are you using? On what operating system?
My mobile is Samsung Galaxy Note III SM-N9005 and running on Kit Kat 4.4.2
Please provide any additional information below.
what i was found is, the generated link to Play Store is missing the colon (:)
character like :
market//details?id=com.letsdoitworld.wastemapper
And the working link suppose to be like :
market://details?id=com.letsdoitworld.wastemapper
You can view the android link at your example link below :
http://m.appqr.mobi/appqr?qr=1&androidmarket=market://details?id=com.letsdoitwor
ld.wastemapper&appstore=http://itunes.apple.com/us/app/lets-do-it-world/id443259
456?mt=8&ls=1&wp=http://social.zune.net/redirect?type=phoneApp&id=c14e93aa-27d7-
df11-a844-00237de2db9&bb=http://appworld.blackberry.com/webstore/content/680
Hope you can solve it so that my Url Qr Code image working perfectly.
Thank you.
```
Original issue reported on code.google.com by `eservice...@gmail.com` on 13 Mar 2014 at 5:09
Attachments:
- [Error.png](https://storage.googleapis.com/google-code-attachments/appqr/issue-7/comment-0/Error.png)
|
defect
|
failed to open in play store app what steps will reproduce the problem after scan and tab the link directly open in default android browser what is the expected output what do you see instead found error in browser said this web page is not available the generated link is what version of the product are you using on what operating system my mobile is samsung galaxy note iii sm and running on kit kat please provide any additional information below what i was found is the generated link to play store is missing the colon character like market details id com letsdoitworld wastemapper and the working link suppose to be like market details id com letsdoitworld wastemapper you can view the android link at your example link below ld wastemapper appstore mt ls wp bb hope you can solve it so that my url qr code image working perfectly thank you original issue reported on code google com by eservice gmail com on mar at attachments
| 1
|
251,705
| 27,203,829,740
|
IssuesEvent
|
2023-02-20 11:36:13
|
elastic/cloudbeat
|
https://api.github.com/repos/elastic/cloudbeat
|
closed
|
[BUG] Cloudbeat fails to fetch k8s objects on Kubernetes v1.25
|
bug Team:Cloud Security triaged
|
**Describe the bug**
When deploying Cloudbeat / elastic agent on Kubernetes v1.25 k8s objects are failed to be fetched.
According to the logs
"Failed to list *v1beta1.PodSecurityPolicy: the server could not find the requested resource"
According to Kubernetes documentation [PSP is deprecated and removed in v1.25](https://kubernetes.io/blog/2022/08/25/pod-security-admission-stable/)
**Preconditions**
Upgrade kind tool to version 0.15+ ([version releases](https://github.com/kubernetes-sigs/kind/releases))
Starting from version 0.15 the default kubernetes version is v1.25
**To Reproduce**
Write the exact actions one should perform in order to reproduce the bug.
Steps to reproduce the behavior:
1. Create kind cluster by executing just command: `create-kind-cluster`
2. Deploy elastic agent / cloudbeat
3. Verify that all object types are fetched
**Expected behavior**
Process, file and k8s objects are fetched
Logs are attached:
[elastic-agent-sqxvd.log](https://github.com/elastic/cloudbeat/files/9674178/elastic-agent-sqxvd.log)
<!-- Optional: Please uncomment if relevant
**Screenshots**
-->
**Desktop (please complete the following information):**
- Kibana Version: Version 8.5 BC-1
- Endpoint Version: Elastic Agent 8.5 BC-1
<!-- Optional: Please uncomment if relevant
**Additional context**
-->
|
True
|
[BUG] Cloudbeat fails to fetch k8s objects on Kubernetes v1.25 - **Describe the bug**
When deploying Cloudbeat / elastic agent on Kubernetes v1.25 k8s objects are failed to be fetched.
According to the logs
"Failed to list *v1beta1.PodSecurityPolicy: the server could not find the requested resource"
According to Kubernetes documentation [PSP is deprecated and removed in v1.25](https://kubernetes.io/blog/2022/08/25/pod-security-admission-stable/)
**Preconditions**
Upgrade kind tool to version 0.15+ ([version releases](https://github.com/kubernetes-sigs/kind/releases))
Starting from version 0.15 the default kubernetes version is v1.25
**To Reproduce**
Write the exact actions one should perform in order to reproduce the bug.
Steps to reproduce the behavior:
1. Create kind cluster by executing just command: `create-kind-cluster`
2. Deploy elastic agent / cloudbeat
3. Verify that all object types are fetched
**Expected behavior**
Process, file and k8s objects are fetched
Logs are attached:
[elastic-agent-sqxvd.log](https://github.com/elastic/cloudbeat/files/9674178/elastic-agent-sqxvd.log)
<!-- Optional: Please uncomment if relevant
**Screenshots**
-->
**Desktop (please complete the following information):**
- Kibana Version: Version 8.5 BC-1
- Endpoint Version: Elastic Agent 8.5 BC-1
<!-- Optional: Please uncomment if relevant
**Additional context**
-->
|
non_defect
|
cloudbeat fails to fetch objects on kubernetes describe the bug when deploying cloudbeat elastic agent on kubernetes objects are failed to be fetched according to the logs failed to list podsecuritypolicy the server could not find the requested resource according to kubernetes documentation preconditions upgrade kind tool to version starting from version the default kubernetes version is to reproduce write the exact actions one should perform in order to reproduce the bug steps to reproduce the behavior create kind cluster by executing just command create kind cluster deploy elastic agent cloudbeat verify that all object types are fetched expected behavior process file and objects are fetched logs are attached optional please uncomment if relevant screenshots desktop please complete the following information kibana version version bc endpoint version elastic agent bc optional please uncomment if relevant additional context
| 0
|
428,552
| 29,997,506,026
|
IssuesEvent
|
2023-06-26 06:59:41
|
ans-coe/terraform-modules
|
https://api.github.com/repos/ans-coe/terraform-modules
|
closed
|
Rename example NSG
|
documentation good first issue
|
https://github.com/ans-coe/terraform-modules/blob/51dafae2ac5f3c6da054c3f350858e7bec800819/azure/network-security-group/examples/advanced/main.tf#LL51C1-L51C54
Example gives the NSG the name ${local.resource_prefix}-rg
It should probably be ${local.resource_prefix}-nsg
|
1.0
|
Rename example NSG - https://github.com/ans-coe/terraform-modules/blob/51dafae2ac5f3c6da054c3f350858e7bec800819/azure/network-security-group/examples/advanced/main.tf#LL51C1-L51C54
Example gives the NSG the name ${local.resource_prefix}-rg
It should probably be ${local.resource_prefix}-nsg
|
non_defect
|
rename example nsg example gives the nsg the name local resource prefix rg it should probably be local resource prefix nsg
| 0
|
45,913
| 13,055,821,576
|
IssuesEvent
|
2020-07-30 02:50:16
|
icecube-trac/tix2
|
https://api.github.com/repos/icecube-trac/tix2
|
opened
|
Nuke TWR (Trac #257)
|
Incomplete Migration Migrated from Trac combo core defect
|
Migrated from https://code.icecube.wisc.edu/ticket/257
```json
{
"status": "closed",
"changetime": "2019-01-11T21:22:56",
"description": "Kill it. Kill it with fire.",
"reporter": "nega",
"cc": "blaufuss, olivas",
"resolution": "fixed",
"_ts": "1547241776942948",
"component": "combo core",
"summary": "Nuke TWR",
"priority": "normal",
"keywords": "twr",
"time": "2011-05-11T20:21:18",
"milestone": "",
"owner": "nwhitehorn",
"type": "defect"
}
```
|
1.0
|
Nuke TWR (Trac #257) - Migrated from https://code.icecube.wisc.edu/ticket/257
```json
{
"status": "closed",
"changetime": "2019-01-11T21:22:56",
"description": "Kill it. Kill it with fire.",
"reporter": "nega",
"cc": "blaufuss, olivas",
"resolution": "fixed",
"_ts": "1547241776942948",
"component": "combo core",
"summary": "Nuke TWR",
"priority": "normal",
"keywords": "twr",
"time": "2011-05-11T20:21:18",
"milestone": "",
"owner": "nwhitehorn",
"type": "defect"
}
```
|
defect
|
nuke twr trac migrated from json status closed changetime description kill it kill it with fire reporter nega cc blaufuss olivas resolution fixed ts component combo core summary nuke twr priority normal keywords twr time milestone owner nwhitehorn type defect
| 1
|
48,905
| 13,184,771,679
|
IssuesEvent
|
2020-08-12 20:03:52
|
icecube-trac/tix3
|
https://api.github.com/repos/icecube-trac/tix3
|
opened
|
clsim doesn't jive with OpenCL Framework (Trac #416)
|
Incomplete Migration Migrated from Trac combo simulation defect
|
<details>
<summary>_Migrated from https://code.icecube.wisc.edu/ticket/416
, reported by nega and owned by claudio.kopper_</summary>
<p>
```json
{
"status": "closed",
"changetime": "2012-10-31T18:00:13",
"description": "http://builds.icecube.wisc.edu/builders/quick_simulation_osx_server_10.6.7/builds/506/steps/compile/logs/stdio\n\n",
"reporter": "nega",
"cc": "jvs",
"resolution": "fixed",
"_ts": "1351706413000000",
"component": "combo simulation",
"summary": "clsim doesn't jive with OpenCL Framework",
"priority": "normal",
"keywords": "clsim",
"time": "2012-06-12T22:08:40",
"milestone": "",
"owner": "claudio.kopper",
"type": "defect"
}
```
</p>
</details>
|
1.0
|
clsim doesn't jive with OpenCL Framework (Trac #416) - <details>
<summary>_Migrated from https://code.icecube.wisc.edu/ticket/416
, reported by nega and owned by claudio.kopper_</summary>
<p>
```json
{
"status": "closed",
"changetime": "2012-10-31T18:00:13",
"description": "http://builds.icecube.wisc.edu/builders/quick_simulation_osx_server_10.6.7/builds/506/steps/compile/logs/stdio\n\n",
"reporter": "nega",
"cc": "jvs",
"resolution": "fixed",
"_ts": "1351706413000000",
"component": "combo simulation",
"summary": "clsim doesn't jive with OpenCL Framework",
"priority": "normal",
"keywords": "clsim",
"time": "2012-06-12T22:08:40",
"milestone": "",
"owner": "claudio.kopper",
"type": "defect"
}
```
</p>
</details>
|
defect
|
clsim doesn t jive with opencl framework trac migrated from reported by nega and owned by claudio kopper json status closed changetime description reporter nega cc jvs resolution fixed ts component combo simulation summary clsim doesn t jive with opencl framework priority normal keywords clsim time milestone owner claudio kopper type defect
| 1
|
72,043
| 23,903,975,438
|
IssuesEvent
|
2022-09-08 21:45:58
|
idaholab/moose
|
https://api.github.com/repos/idaholab/moose
|
closed
|
PerpendicularElectricFieldInterface erroneously does not use free charge
|
T: defect P: normal C: Modules/Electromagnetics
|
## Bug Description
The `PerpendicularElectricFieldInterface` object is supposed to apply a user-supplied free charge parameter when on an interface where free charge should be non-zero.
## Steps to Reproduce
Try to use `PerpendicularElectricFieldInterface` with a `free_charge` parameter set to any number - it will have no impact on the solution.
## Impact
This should be fixed so that expected operation of the interface kernel can be achieved.
|
1.0
|
PerpendicularElectricFieldInterface erroneously does not use free charge - ## Bug Description
The `PerpendicularElectricFieldInterface` object is supposed to apply a user-supplied free charge parameter when on an interface where free charge should be non-zero.
## Steps to Reproduce
Try to use `PerpendicularElectricFieldInterface` with a `free_charge` parameter set to any number - it will have no impact on the solution.
## Impact
This should be fixed so that expected operation of the interface kernel can be achieved.
|
defect
|
perpendicularelectricfieldinterface erroneously does not use free charge bug description the perpendicularelectricfieldinterface object is supposed to apply a user supplied free charge parameter when on an interface where free charge should be non zero steps to reproduce try to use perpendicularelectricfieldinterface with a free charge parameter set to any number it will have no impact on the solution impact this should be fixed so that expected operation of the interface kernel can be achieved
| 1
|
773,083
| 27,145,244,388
|
IssuesEvent
|
2023-02-16 19:25:58
|
trufflesuite/truffle
|
https://api.github.com/repos/trufflesuite/truffle
|
closed
|
tezos: use latest version of smartpy compiler
|
help wanted priority3 🔧
|
- [ ] I've asked for help in the [Truffle Gitter](http://gitter.im/Consensys/truffle) before filing this issue.
---------------------------
## Issue
`truffle@tezos` uses an old version of smartpy compiler and hence does not compile when using a valid contract from the online smartpy editor e.g. any contract that uses `view` decorator
## Steps to Reproduce
try to compile using the experimental [view decorator](https://www.smartpy.io/dev/reference.html#_views)
## Expected Behavior
Truffle should always install the latest version of smartpy compiler as it does for ligo.
## Actual Results
When using new features e.g. `view` decorator the compilation fails.
## Environment
* Operating System:
* Tezos client: ganache cli
* Truffle version (`truffle version`): v5.5.0-tezos.4 (core: 5.5.0-tezos.4)
* node version (`node --version`): v10.16.0
* npm version (`npm --version`): 6.14.7
## Resolution
Part of the issue can be resolved with this [PR](https://github.com/trufflesuite/SmartPyBasic-Docker/pull/2)
and the next step would be to update the compiler version in truffle and create a new release
|
1.0
|
tezos: use latest version of smartpy compiler - - [ ] I've asked for help in the [Truffle Gitter](http://gitter.im/Consensys/truffle) before filing this issue.
---------------------------
## Issue
`truffle@tezos` uses an old version of smartpy compiler and hence does not compile when using a valid contract from the online smartpy editor e.g. any contract that uses `view` decorator
## Steps to Reproduce
try to compile using the experimental [view decorator](https://www.smartpy.io/dev/reference.html#_views)
## Expected Behavior
Truffle should always install the latest version of smartpy compiler as it does for ligo.
## Actual Results
When using new features e.g. `view` decorator the compilation fails.
## Environment
* Operating System:
* Tezos client: ganache cli
* Truffle version (`truffle version`): v5.5.0-tezos.4 (core: 5.5.0-tezos.4)
* node version (`node --version`): v10.16.0
* npm version (`npm --version`): 6.14.7
## Resolution
Part of the issue can be resolved with this [PR](https://github.com/trufflesuite/SmartPyBasic-Docker/pull/2)
and the next step would be to update the compiler version in truffle and create a new release
|
non_defect
|
tezos use latest version of smartpy compiler i ve asked for help in the before filing this issue issue truffle tezos uses an old version of smartpy compiler and hence does not compile when using a valid contract from the online smartpy editor e g any contract that uses view decorator steps to reproduce try to compile using the experimental expected behavior truffle should always install the latest version of smartpy compiler as it does for ligo actual results when using new features e g view decorator the compilation fails environment operating system tezos client ganache cli truffle version truffle version tezos core tezos node version node version npm version npm version resolution part of the issue can be resolved with this and the next step would be to update the compiler version in truffle and create a new release
| 0
|
493,518
| 14,234,012,608
|
IssuesEvent
|
2020-11-18 13:00:42
|
teamforus/forus
|
https://api.github.com/repos/teamforus/forus
|
opened
|
Remove back button from the sign-up flow of providers
|
Priority: Must have project-100
|
## Main asssignee: @aghimpu
## Context/goal:
https://forus.io/provider/sign-up
- [ ] Remove the back button if no parameters are in the URL
- [ ] If there is a parameter in the URL - show the back button.
|
1.0
|
Remove back button from the sign-up flow of providers - ## Main asssignee: @aghimpu
## Context/goal:
https://forus.io/provider/sign-up
- [ ] Remove the back button if no parameters are in the URL
- [ ] If there is a parameter in the URL - show the back button.
|
non_defect
|
remove back button from the sign up flow of providers main asssignee aghimpu context goal remove the back button if no parameters are in the url if there is a parameter in the url show the back button
| 0
|
199,982
| 15,085,287,848
|
IssuesEvent
|
2021-02-05 18:26:02
|
rstudio/rstudio
|
https://api.github.com/repos/rstudio/rstudio
|
closed
|
RStudio's diagnostic engine incorrectly flags whitespace as unnecessary
|
bug diagnostics test
|
https://community.rstudio.com/t/the-tidyverse-style-guide-inconsistent-with-rstudio-style-diagnostics/94060
---
### System details
RStudio Edition : Desktop [Open Source]
RStudio Version : 1.4.1522
OS Version : macOS Big Sur 10.16
R Version : R version 4.0.3 (2020-10-10)
The following R code is incorrectly diagnosed with unnecessary whitespace:
```
foo <- { 1 + 1 }
```
<img width="222" alt="Screen Shot 2021-01-27 at 9 41 58 AM" src="https://user-images.githubusercontent.com/1976582/106031617-54d31000-6084-11eb-8c78-abae0adede8c.png">
|
1.0
|
RStudio's diagnostic engine incorrectly flags whitespace as unnecessary - https://community.rstudio.com/t/the-tidyverse-style-guide-inconsistent-with-rstudio-style-diagnostics/94060
---
### System details
RStudio Edition : Desktop [Open Source]
RStudio Version : 1.4.1522
OS Version : macOS Big Sur 10.16
R Version : R version 4.0.3 (2020-10-10)
The following R code is incorrectly diagnosed with unnecessary whitespace:
```
foo <- { 1 + 1 }
```
<img width="222" alt="Screen Shot 2021-01-27 at 9 41 58 AM" src="https://user-images.githubusercontent.com/1976582/106031617-54d31000-6084-11eb-8c78-abae0adede8c.png">
|
non_defect
|
rstudio s diagnostic engine incorrectly flags whitespace as unnecessary system details rstudio edition desktop rstudio version os version macos big sur r version r version the following r code is incorrectly diagnosed with unnecessary whitespace foo img width alt screen shot at am src
| 0
|
143,570
| 11,569,724,782
|
IssuesEvent
|
2020-02-20 18:06:53
|
godaddy-wordpress/coblocks
|
https://api.github.com/repos/godaddy-wordpress/coblocks
|
closed
|
ISBAT ensure the integrity of the Click to Tweet block through automated tests
|
[Type] Tests
|
Automated tests need to be added to the `click-to-tweet` block which follow the groundwork from #835.
#### Tests Required:
- [x] The save function
- [x] Block transforms #1184
- [x] Block deprecation #956
#### AC
- Any attribute that modifies the serialized block output needs to have tests.
- Any existing transforms to or from a block needs to have tests (if applicable).
- Any existing block deprecations need to have tests (if applicable).
|
1.0
|
ISBAT ensure the integrity of the Click to Tweet block through automated tests - Automated tests need to be added to the `click-to-tweet` block which follow the groundwork from #835.
#### Tests Required:
- [x] The save function
- [x] Block transforms #1184
- [x] Block deprecation #956
#### AC
- Any attribute that modifies the serialized block output needs to have tests.
- Any existing transforms to or from a block needs to have tests (if applicable).
- Any existing block deprecations need to have tests (if applicable).
|
non_defect
|
isbat ensure the integrity of the click to tweet block through automated tests automated tests need to be added to the click to tweet block which follow the groundwork from tests required the save function block transforms block deprecation ac any attribute that modifies the serialized block output needs to have tests any existing transforms to or from a block needs to have tests if applicable any existing block deprecations need to have tests if applicable
| 0
|
60,003
| 17,023,308,545
|
IssuesEvent
|
2021-07-03 01:21:08
|
tomhughes/trac-tickets
|
https://api.github.com/repos/tomhughes/trac-tickets
|
closed
|
Crash when undoing selected way and then upload
|
Component: merkaartor Priority: major Resolution: fixed Type: defect
|
**[Submitted to the original trac issue database at 9.30pm, Thursday, 9th October 2008]**
* Draw a way with some nodes
* Draw another way with several nodes
* Select that second way
* Undo all the nodes from the second way until the way vanishes
* Upload
```
#0 0x000000000050498d in PropertiesDock::checkMenuStatus (this=0xc65ac0) at PropertiesDock.cpp:107
#1 0x00000000004ab6bf in EditInteraction (this=0xe9ccc0, theView=0x9563c0) at Interaction/EditInteraction.cpp:28
#2 0x00000000004ea609 in MainWindow::on_editPropertiesAction_triggered (this=0x7fffe38de740) at MainWindow.cpp:412
#3 0x00000000004e62be in MainWindow::on_fileUploadAction_triggered (this=0x7fffe38de740) at MainWindow.cpp:746
```
```
(gdb) p Selection.size()
$2 = 1
```
Some object is still selected, when it shouldn't.
|
1.0
|
Crash when undoing selected way and then upload - **[Submitted to the original trac issue database at 9.30pm, Thursday, 9th October 2008]**
* Draw a way with some nodes
* Draw another way with several nodes
* Select that second way
* Undo all the nodes from the second way until the way vanishes
* Upload
```
#0 0x000000000050498d in PropertiesDock::checkMenuStatus (this=0xc65ac0) at PropertiesDock.cpp:107
#1 0x00000000004ab6bf in EditInteraction (this=0xe9ccc0, theView=0x9563c0) at Interaction/EditInteraction.cpp:28
#2 0x00000000004ea609 in MainWindow::on_editPropertiesAction_triggered (this=0x7fffe38de740) at MainWindow.cpp:412
#3 0x00000000004e62be in MainWindow::on_fileUploadAction_triggered (this=0x7fffe38de740) at MainWindow.cpp:746
```
```
(gdb) p Selection.size()
$2 = 1
```
Some object is still selected, when it shouldn't.
|
defect
|
crash when undoing selected way and then upload draw a way with some nodes draw another way with several nodes select that second way undo all the nodes from the second way until the way vanishes upload in propertiesdock checkmenustatus this at propertiesdock cpp in editinteraction this theview at interaction editinteraction cpp in mainwindow on editpropertiesaction triggered this at mainwindow cpp in mainwindow on fileuploadaction triggered this at mainwindow cpp gdb p selection size some object is still selected when it shouldn t
| 1
|
18,159
| 5,591,497,802
|
IssuesEvent
|
2017-03-30 00:03:58
|
d-ronin/dRonin
|
https://api.github.com/repos/d-ronin/dRonin
|
opened
|
RFC: clang-format GCS
|
code-cleanup gcs status/request-for-comments
|
Rather than fighting issues with formatting in PRs etc. let's just get the pain out of the way and clang-format the whole thing in one massive conflicts-with-everything pull. And also a pre-commit hook to check it. Looks like Chromium have been doing this in most of their code for some time and are currently rolling it across the whole repo https://groups.google.com/a/chromium.org/forum/#!topic/chromium-dev/7Zm1Z49TV7U/discussion.
|
1.0
|
RFC: clang-format GCS - Rather than fighting issues with formatting in PRs etc. let's just get the pain out of the way and clang-format the whole thing in one massive conflicts-with-everything pull. And also a pre-commit hook to check it. Looks like Chromium have been doing this in most of their code for some time and are currently rolling it across the whole repo https://groups.google.com/a/chromium.org/forum/#!topic/chromium-dev/7Zm1Z49TV7U/discussion.
|
non_defect
|
rfc clang format gcs rather than fighting issues with formatting in prs etc let s just get the pain out of the way and clang format the whole thing in one massive conflicts with everything pull and also a pre commit hook to check it looks like chromium have been doing this in most of their code for some time and are currently rolling it across the whole repo
| 0
|
338,553
| 10,231,418,188
|
IssuesEvent
|
2019-08-18 09:14:57
|
dailynowco/daily-apps
|
https://api.github.com/repos/dailynowco/daily-apps
|
closed
|
Navigate to publication page when clicking on the logo
|
Priority: Low Status: Accepted Status: Completed Type: Feature good first issue
|
When clicking on the publication's logo on a post card the user should be navigated to a page containing only posts from the same publication.
The behavior is identical to clicking on a publication in the side menu.

|
1.0
|
Navigate to publication page when clicking on the logo - When clicking on the publication's logo on a post card the user should be navigated to a page containing only posts from the same publication.
The behavior is identical to clicking on a publication in the side menu.

|
non_defect
|
navigate to publication page when clicking on the logo when clicking on the publication s logo on a post card the user should be navigated to a page containing only posts from the same publication the behavior is identical to clicking on a publication in the side menu
| 0
|
37,473
| 8,406,270,757
|
IssuesEvent
|
2018-10-11 17:27:57
|
NREL/EnergyPlus
|
https://api.github.com/repos/NREL/EnergyPlus
|
closed
|
User reports that this file does not work with CalculateFromCircuitLength (CR #9231)
|
EnergyPlus SeverityMedium WontFix unconfirmed defect
|
###### Assigned to: F Buhl
###### Added on 2013-05-28 16:57 by @lklawrie
##
External Ref: yahoo group/personal email
Last build tested: `13.04.30 V8.0.0.008 - rerelease`
|
1.0
|
User reports that this file does not work with CalculateFromCircuitLength (CR #9231) - ###### Assigned to: F Buhl
###### Added on 2013-05-28 16:57 by @lklawrie
##
External Ref: yahoo group/personal email
Last build tested: `13.04.30 V8.0.0.008 - rerelease`
|
defect
|
user reports that this file does not work with calculatefromcircuitlength cr assigned to f buhl added on by lklawrie external ref yahoo group personal email last build tested rerelease
| 1
|
67,865
| 8,198,865,993
|
IssuesEvent
|
2018-08-31 17:58:07
|
mapbox/mapbox-gl-native
|
https://api.github.com/repos/mapbox/mapbox-gl-native
|
opened
|
Improve visual design of MGLMapSnapshotter’s attribution
|
design iOS macOS
|
In `ios-v4.4.0-alpha.2` and earlier, the attribution blob on the image returned by `MGLMapSnapshotter` has [sharp corners](https://github.com/mapbox/mapbox-gl-native/blob/0dac3bc60c549c46f341984439d6fd007fe2ffe6/platform/darwin/src/MGLMapSnapshotter.mm#L372-L401) and [high-opacity black text](https://github.com/mapbox/mapbox-gl-native/blob/0dac3bc60c549c46f341984439d6fd007fe2ffe6/platform/darwin/src/MGLMapSnapshotter.mm#L359-L370) — let’s round the corners, add some vibrancy to the text, and perhaps even out the margin spacing.

/cc @fabian-guerra
|
1.0
|
Improve visual design of MGLMapSnapshotter’s attribution - In `ios-v4.4.0-alpha.2` and earlier, the attribution blob on the image returned by `MGLMapSnapshotter` has [sharp corners](https://github.com/mapbox/mapbox-gl-native/blob/0dac3bc60c549c46f341984439d6fd007fe2ffe6/platform/darwin/src/MGLMapSnapshotter.mm#L372-L401) and [high-opacity black text](https://github.com/mapbox/mapbox-gl-native/blob/0dac3bc60c549c46f341984439d6fd007fe2ffe6/platform/darwin/src/MGLMapSnapshotter.mm#L359-L370) — let’s round the corners, add some vibrancy to the text, and perhaps even out the margin spacing.

/cc @fabian-guerra
|
non_defect
|
improve visual design of mglmapsnapshotter’s attribution in ios alpha and earlier the attribution blob on the image returned by mglmapsnapshotter has and — let’s round the corners add some vibrancy to the text and perhaps even out the margin spacing cc fabian guerra
| 0
|
16,569
| 2,919,015,129
|
IssuesEvent
|
2015-06-24 11:55:40
|
jonkoops/pirate
|
https://api.github.com/repos/jonkoops/pirate
|
closed
|
net framework 3.5
|
auto-migrated Priority-Medium Type-Defect
|
```
Pirate1010 requires the installation of net framework 3.5
when it will be changed instead to turn even with the net framework 4?
```
Original issue reported on code.google.com by `francobe...@gmail.com` on 29 Apr 2013 at 9:53
|
1.0
|
net framework 3.5 - ```
Pirate1010 requires the installation of net framework 3.5
when it will be changed instead to turn even with the net framework 4?
```
Original issue reported on code.google.com by `francobe...@gmail.com` on 29 Apr 2013 at 9:53
|
defect
|
net framework requires the installation of net framework when it will be changed instead to turn even with the net framework original issue reported on code google com by francobe gmail com on apr at
| 1
|
26,215
| 4,622,888,072
|
IssuesEvent
|
2016-09-27 09:09:27
|
Openki/Openki
|
https://api.github.com/repos/Openki/Openki
|
closed
|
Retina display (iPad) style issues
|
defect Mobile Style
|
- [x] Navbar shadow
- [x] Navbar collapsed for retina displays
- [x] Layout of navbar dropdowns
- [x] ~~Introduction~~ (not a retina specific issue)
- [X] ~~Calendar Submenu~~ (not a retina specific issue)
changes done on https://github.com/schuel/hmmm/tree/styles/retina
|
1.0
|
Retina display (iPad) style issues - - [x] Navbar shadow
- [x] Navbar collapsed for retina displays
- [x] Layout of navbar dropdowns
- [x] ~~Introduction~~ (not a retina specific issue)
- [X] ~~Calendar Submenu~~ (not a retina specific issue)
changes done on https://github.com/schuel/hmmm/tree/styles/retina
|
defect
|
retina display ipad style issues navbar shadow navbar collapsed for retina displays layout of navbar dropdowns introduction not a retina specific issue calendar submenu not a retina specific issue changes done on
| 1
|
26,674
| 4,777,409,414
|
IssuesEvent
|
2016-10-27 16:13:24
|
wheeler-microfluidics/microdrop
|
https://api.github.com/repos/wheeler-microfluidics/microdrop
|
opened
|
ExperimentLogController update shows error when it can't find plugin (Trac #131)
|
defect Incomplete Migration Migrated from Trac
|
Migrated from http://microfluidics.utoronto.ca/microdrop/ticket/131
```json
{
"status": "new",
"changetime": "2014-03-13T20:00:48",
"description": "[INFO]: [ExperimentLogController].update(): while constructing a Python object\ncannot find module 'plugins.xxx.microdrop' (No module named plugins.xxx)\n in \"<string>\", line 1, column 1:\n !!python/object:plugins.xxx\n ^",
"reporter": "ryan",
"cc": "",
"resolution": "",
"_ts": "1394740848122658",
"component": "",
"summary": "ExperimentLogController update shows error when it can't find plugin",
"priority": "minor",
"keywords": "",
"version": "0.1",
"time": "2012-11-01T15:32:38",
"milestone": "",
"owner": "",
"type": "defect"
}
```
|
1.0
|
ExperimentLogController update shows error when it can't find plugin (Trac #131) - Migrated from http://microfluidics.utoronto.ca/microdrop/ticket/131
```json
{
"status": "new",
"changetime": "2014-03-13T20:00:48",
"description": "[INFO]: [ExperimentLogController].update(): while constructing a Python object\ncannot find module 'plugins.xxx.microdrop' (No module named plugins.xxx)\n in \"<string>\", line 1, column 1:\n !!python/object:plugins.xxx\n ^",
"reporter": "ryan",
"cc": "",
"resolution": "",
"_ts": "1394740848122658",
"component": "",
"summary": "ExperimentLogController update shows error when it can't find plugin",
"priority": "minor",
"keywords": "",
"version": "0.1",
"time": "2012-11-01T15:32:38",
"milestone": "",
"owner": "",
"type": "defect"
}
```
|
defect
|
experimentlogcontroller update shows error when it can t find plugin trac migrated from json status new changetime description update while constructing a python object ncannot find module plugins xxx microdrop no module named plugins xxx n in line column n python object plugins xxx n reporter ryan cc resolution ts component summary experimentlogcontroller update shows error when it can t find plugin priority minor keywords version time milestone owner type defect
| 1
|
57,365
| 15,731,613,855
|
IssuesEvent
|
2021-03-29 17:17:22
|
danmar/testissues
|
https://api.github.com/repos/danmar/testissues
|
opened
|
False positive (memory leak) with comma (Trac #386)
|
False positive Incomplete Migration Migrated from Trac aggro80 defect
|
Migrated from https://trac.cppcheck.net/ticket/386
```json
{
"status": "closed",
"changetime": "2009-06-10T21:14:28",
"description": "Hi,\n\nThis code produce a false positive.\n\n{{{\nint main()\n{\n double * foo = new double[10];\n double * bar = new double[10];\n\n delete [] foo, delete [] bar;\n\n return 0;\n}\n}}}\n\n{{{\nChecking main.cpp...\n[main.cpp:8]: (error) Memory leak: foo\n[main.cpp:8]: (error) Memory leak: bar\n}}}\n",
"reporter": "lefreut",
"cc": "",
"resolution": "fixed",
"_ts": "1244668468000000",
"component": "False positive",
"summary": "False positive (memory leak) with comma",
"priority": "",
"keywords": "",
"time": "2009-06-10T09:34:46",
"milestone": "1.34",
"owner": "aggro80",
"type": "defect"
}
```
|
1.0
|
False positive (memory leak) with comma (Trac #386) - Migrated from https://trac.cppcheck.net/ticket/386
```json
{
"status": "closed",
"changetime": "2009-06-10T21:14:28",
"description": "Hi,\n\nThis code produce a false positive.\n\n{{{\nint main()\n{\n double * foo = new double[10];\n double * bar = new double[10];\n\n delete [] foo, delete [] bar;\n\n return 0;\n}\n}}}\n\n{{{\nChecking main.cpp...\n[main.cpp:8]: (error) Memory leak: foo\n[main.cpp:8]: (error) Memory leak: bar\n}}}\n",
"reporter": "lefreut",
"cc": "",
"resolution": "fixed",
"_ts": "1244668468000000",
"component": "False positive",
"summary": "False positive (memory leak) with comma",
"priority": "",
"keywords": "",
"time": "2009-06-10T09:34:46",
"milestone": "1.34",
"owner": "aggro80",
"type": "defect"
}
```
|
defect
|
false positive memory leak with comma trac migrated from json status closed changetime description hi n nthis code produce a false positive n n nint main n n double foo new double n double bar new double n n delete foo delete bar n n return n n n n nchecking main cpp n error memory leak foo n error memory leak bar n n reporter lefreut cc resolution fixed ts component false positive summary false positive memory leak with comma priority keywords time milestone owner type defect
| 1
|
19,726
| 3,249,302,986
|
IssuesEvent
|
2015-10-18 02:05:08
|
TASVideos/BizHawk
|
https://api.github.com/repos/TASVideos/BizHawk
|
closed
|
SNES Hires / Laced modes Jumpy
|
auto-migrated Core-BSNES Type-Defect
|
```
What steps will reproduce the problem?
1. Load Power Drive
2. Watch Intro
3. or play for a bit and view car repair screen.
What is the expected output? What do you see instead?
I expect to see a steady image. Instead these hires (laced?) screens are
jumpy. The effect can be seen on
What version of the product are you using? On what operating system?
Bizhawk SVN8515. I have tried Bsnes and Higan emulators and they seem to
display ok although I can tell if they are opening a hires mode as it does not
switch between lowres and hires modes. (I am using double low res mode in
bizhawk)
Please provide any additional information below.
I have tried Bsnes and Higan emulators and they seem to display ok although I
can tell if they are opening a hires mode as it does not switch between lowres
and hires modes. (I am using double low res mode in bizhawk). The effect can
also be seen in the game Syvalion as hires is used for the dialogue sections.
https://www.youtube.com/watch?v=uzWuq8zs4ZU&feature=youtu.be
I have attached a video where you can see the effect in action. You will need
to select 50 fps mode in youtube options to see it.
Maybe it is supposed to be this way, I don't know which is why I have posted
here and hope I am not wasting anyone's time with this.
```
Original issue reported on code.google.com by `MThompso...@gmail.com` on 17 Dec 2014 at 2:19
|
1.0
|
SNES Hires / Laced modes Jumpy - ```
What steps will reproduce the problem?
1. Load Power Drive
2. Watch Intro
3. or play for a bit and view car repair screen.
What is the expected output? What do you see instead?
I expect to see a steady image. Instead these hires (laced?) screens are
jumpy. The effect can be seen on
What version of the product are you using? On what operating system?
Bizhawk SVN8515. I have tried Bsnes and Higan emulators and they seem to
display ok although I can tell if they are opening a hires mode as it does not
switch between lowres and hires modes. (I am using double low res mode in
bizhawk)
Please provide any additional information below.
I have tried Bsnes and Higan emulators and they seem to display ok although I
can tell if they are opening a hires mode as it does not switch between lowres
and hires modes. (I am using double low res mode in bizhawk). The effect can
also be seen in the game Syvalion as hires is used for the dialogue sections.
https://www.youtube.com/watch?v=uzWuq8zs4ZU&feature=youtu.be
I have attached a video where you can see the effect in action. You will need
to select 50 fps mode in youtube options to see it.
Maybe it is supposed to be this way, I don't know which is why I have posted
here and hope I am not wasting anyone's time with this.
```
Original issue reported on code.google.com by `MThompso...@gmail.com` on 17 Dec 2014 at 2:19
|
defect
|
snes hires laced modes jumpy what steps will reproduce the problem load power drive watch intro or play for a bit and view car repair screen what is the expected output what do you see instead i expect to see a steady image instead these hires laced screens are jumpy the effect can be seen on what version of the product are you using on what operating system bizhawk i have tried bsnes and higan emulators and they seem to display ok although i can tell if they are opening a hires mode as it does not switch between lowres and hires modes i am using double low res mode in bizhawk please provide any additional information below i have tried bsnes and higan emulators and they seem to display ok although i can tell if they are opening a hires mode as it does not switch between lowres and hires modes i am using double low res mode in bizhawk the effect can also be seen in the game syvalion as hires is used for the dialogue sections i have attached a video where you can see the effect in action you will need to select fps mode in youtube options to see it maybe it is supposed to be this way i don t know which is why i have posted here and hope i am not wasting anyone s time with this original issue reported on code google com by mthompso gmail com on dec at
| 1
|
69,441
| 22,353,873,092
|
IssuesEvent
|
2022-06-15 14:11:20
|
makedeb/makedeb
|
https://api.github.com/repos/makedeb/makedeb
|
opened
|
Commit fragment fails for git
|
T-Defect
|
### Issue
If you give a commit fragment for a git source, it fails with error `fatal: Remote branch ${commit_sha} not found in upstream origin`.
Example PKGBUILD
```
# Maintainer: Bruno Pagani <archange@archlinux.org>
pkgname=libyuv
pkgver=1+30f9b28
pkgrel=1
pkgdesc="Library for YUV scaling"
arch=(amd64)
url="https://chromium.googlesource.com/libyuv/libyuv/"
license=(custom)
depends=('libjpeg-turbo8')
makedepends=('cmake' 'git' 'libjpeg-turbo8-dev' 'ninja-build')
# Version required by libavif
_commit=966768e899c0eb932e1cd72935d37e15284daec0
source=(git+https://chromium.googlesource.com/libyuv/libyuv#commit=${_commit})
sha512sums=('SKIP')
pkgver() {
cd ${pkgname}
printf "%s+%s" "$(git rev-list --count HEAD)" "$(git rev-parse --short HEAD)"
}
prepare() {
cd ${pkgname}
sed -i 's|yuvconvert ${JPEG_LIBRARY}|${ly_lib_shared} ${JPEG_LIBRARY}|' CMakeLists.txt
}
build() {
cmake -B build -S ${pkgname} \
-DCMAKE_INSTALL_PREFIX=/usr \
-GNinja
cmake --build ./build
}
package() {
DESTDIR="${pkgdir}" cmake --install ./build
install -Dm644 ${pkgname}/LICENSE -t "${pkgdir}"/usr/share/licenses/${pkgname}/
}
```
### Installation source
APT Repository
### Installed release type
Alpha
### Installed makedeb version
15.0.2
|
1.0
|
Commit fragment fails for git - ### Issue
If you give a commit fragment for a git source, it fails with error `fatal: Remote branch ${commit_sha} not found in upstream origin`.
Example PKGBUILD
```
# Maintainer: Bruno Pagani <archange@archlinux.org>
pkgname=libyuv
pkgver=1+30f9b28
pkgrel=1
pkgdesc="Library for YUV scaling"
arch=(amd64)
url="https://chromium.googlesource.com/libyuv/libyuv/"
license=(custom)
depends=('libjpeg-turbo8')
makedepends=('cmake' 'git' 'libjpeg-turbo8-dev' 'ninja-build')
# Version required by libavif
_commit=966768e899c0eb932e1cd72935d37e15284daec0
source=(git+https://chromium.googlesource.com/libyuv/libyuv#commit=${_commit})
sha512sums=('SKIP')
pkgver() {
cd ${pkgname}
printf "%s+%s" "$(git rev-list --count HEAD)" "$(git rev-parse --short HEAD)"
}
prepare() {
cd ${pkgname}
sed -i 's|yuvconvert ${JPEG_LIBRARY}|${ly_lib_shared} ${JPEG_LIBRARY}|' CMakeLists.txt
}
build() {
cmake -B build -S ${pkgname} \
-DCMAKE_INSTALL_PREFIX=/usr \
-GNinja
cmake --build ./build
}
package() {
DESTDIR="${pkgdir}" cmake --install ./build
install -Dm644 ${pkgname}/LICENSE -t "${pkgdir}"/usr/share/licenses/${pkgname}/
}
```
### Installation source
APT Repository
### Installed release type
Alpha
### Installed makedeb version
15.0.2
|
defect
|
commit fragment fails for git issue if you give a commit fragment for a git source it fails with error fatal remote branch commit sha not found in upstream origin example pkgbuild maintainer bruno pagani pkgname libyuv pkgver pkgrel pkgdesc library for yuv scaling arch url license custom depends libjpeg makedepends cmake git libjpeg dev ninja build version required by libavif commit source git skip pkgver cd pkgname printf s s git rev list count head git rev parse short head prepare cd pkgname sed i s yuvconvert jpeg library ly lib shared jpeg library cmakelists txt build cmake b build s pkgname dcmake install prefix usr gninja cmake build build package destdir pkgdir cmake install build install pkgname license t pkgdir usr share licenses pkgname installation source apt repository installed release type alpha installed makedeb version
| 1
|
43,820
| 11,857,459,769
|
IssuesEvent
|
2020-03-25 09:37:37
|
cakephp/cakephp
|
https://api.github.com/repos/cakephp/cakephp
|
closed
|
BinaryUUIDs shouldnt be logged in binary
|
defect
|
This is a (multiple allowed):
* [x] bug
* [x] enhancement
* CakePHP Version: master
### What you did
Working with binary-16 UUID (type `binaryuuid`) columns in a Cake4 app.
### What happened

DebugKit cannot display/format the value.
The value is missing (or hidden in output) and it is hard to retrieve in some cases the exact value here, especially when dynamically fetched and added to another query.
If you debug the array logged, you will find the value to be there, but as a binary string
'÷¬\x01#©8N€„\x0Eïè’\x05\x132' inside the queries log array:
```
^ array:4 [▼
0 => array:3 [▼
"query" => b"duration=1 rows=1 SELECT ... FROM `exposed_users` `ExposedUsers` WHERE `ExposedUsers`.`uuid` = '÷¬\x01#©8N€„\x0Eïè’\x05\x132' ORDER BY `ExposedUsers`.`name` ASC LIMIT 1 ◀"
"took" => 1
"rows" => 1
]
```
### What you expected to happen
When logging away queries with binaryuuid I think it is best to use the non-binary form here.
As it seems the info "uuid" is not passed along with it, making it harder later in DebugKit or other tools to make this byte string visible again with the proper scope/conversion applied.
And mixing binary and normal text in log files is also not a good idea IMO.
|
1.0
|
BinaryUUIDs shouldnt be logged in binary - This is a (multiple allowed):
* [x] bug
* [x] enhancement
* CakePHP Version: master
### What you did
Working with binary-16 UUID (type `binaryuuid`) columns in a Cake4 app.
### What happened

DebugKit cannot display/format the value.
The value is missing (or hidden in output) and it is hard to retrieve in some cases the exact value here, especially when dynamically fetched and added to another query.
If you debug the array logged, you will find the value to be there, but as a binary string
'÷¬\x01#©8N€„\x0Eïè’\x05\x132' inside the queries log array:
```
^ array:4 [▼
0 => array:3 [▼
"query" => b"duration=1 rows=1 SELECT ... FROM `exposed_users` `ExposedUsers` WHERE `ExposedUsers`.`uuid` = '÷¬\x01#©8N€„\x0Eïè’\x05\x132' ORDER BY `ExposedUsers`.`name` ASC LIMIT 1 ◀"
"took" => 1
"rows" => 1
]
```
### What you expected to happen
When logging away queries with binaryuuid I think it is best to use the non-binary form here.
As it seems the info "uuid" is not passed along with it, making it harder later in DebugKit or other tools to make this byte string visible again with the proper scope/conversion applied.
And mixing binary and normal text in log files is also not a good idea IMO.
|
defect
|
binaryuuids shouldnt be logged in binary this is a multiple allowed bug enhancement cakephp version master what you did working with binary uuid type binaryuuid columns in a app what happened debugkit cannot display format the value the value is missing or hidden in output and it is hard to retrieve in some cases the exact value here especially when dynamically fetched and added to another query if you debug the array logged you will find the value to be there but as a binary string ÷¬ © €„ ’ inside the queries log array array ▼ array ▼ query b duration rows select from exposed users exposedusers where exposedusers uuid ÷¬ © €„ ’ order by exposedusers name asc limit ◀ took rows what you expected to happen when logging away queries with binaryuuid i think it is best to use the non binary form here as it seems the info uuid is not passed along with it making it harder later in debugkit or other tools to make this byte string visible again with the proper scope conversion applied and mixing binary and normal text in log files is also not a good idea imo
| 1
|
196,914
| 6,950,810,358
|
IssuesEvent
|
2017-12-06 12:14:37
|
OperationCode/operationcode_frontend
|
https://api.github.com/repos/OperationCode/operationcode_frontend
|
closed
|
Rework scholarships on front page
|
beginner friendly Priority: High Status: Available Type: Feature
|
<!-- Please fill out one of the sections below based on the type of issue you're creating -->
# Feature
## Why is this feature being added?
Add enough room to put our events on the front page.
## What should your feature do?
1. Move "Code School Scholarships" before "Conference Scholarships."
2. Change copy on "Code School Scholarships" to,
> Our scholarships provide opportunities for the military community to kickstart their careers in software development. We partner with tech conferences around the country and offers scholarship tickets to events throughout the year, as well as partial and full tuition scholarships to coding bootcamps.
3. Change "Code School Scholarships" title to "Scholarships."
4. Link the image and text to our Code Schools page (this is just for now)
|
1.0
|
Rework scholarships on front page - <!-- Please fill out one of the sections below based on the type of issue you're creating -->
# Feature
## Why is this feature being added?
Add enough room to put our events on the front page.
## What should your feature do?
1. Move "Code School Scholarships" before "Conference Scholarships."
2. Change copy on "Code School Scholarships" to,
> Our scholarships provide opportunities for the military community to kickstart their careers in software development. We partner with tech conferences around the country and offers scholarship tickets to events throughout the year, as well as partial and full tuition scholarships to coding bootcamps.
3. Change "Code School Scholarships" title to "Scholarships."
4. Link the image and text to our Code Schools page (this is just for now)
|
non_defect
|
rework scholarships on front page feature why is this feature being added add enough room to put our events on the front page what should your feature do move code school scholarships before conference scholarships change copy on code school scholarships to our scholarships provide opportunities for the military community to kickstart their careers in software development we partner with tech conferences around the country and offers scholarship tickets to events throughout the year as well as partial and full tuition scholarships to coding bootcamps change code school scholarships title to scholarships link the image and text to our code schools page this is just for now
| 0
|
30,847
| 7,262,550,546
|
IssuesEvent
|
2018-02-19 06:49:03
|
bramdejager/spcb
|
https://api.github.com/repos/bramdejager/spcb
|
closed
|
Error connecting to SharePoint Online
|
CodePlexMigrated Impact: Unassigned
|
There is an error when I try to connect to SharePoint Online:
For security reasons DTD is prohibited in this XML document. To enable DTD processing set the DtdProcessing property on XmlReaderSettings to Parse and pass the settings into XmlReader.Create method.
#### Attachments
[SPCB-UX31E-20160726.log](https://www.codeplex.com/Download/AttachmentDownload.ashx?ProjectName=spcb&WorkItemId=65089&FileAttachmentId=8763)
#### This work item was migrated from CodePlex
CodePlex work item ID: '65089'
Vote count: '2'
|
1.0
|
Error connecting to SharePoint Online - There is an error when I try to connect to SharePoint Online:
For security reasons DTD is prohibited in this XML document. To enable DTD processing set the DtdProcessing property on XmlReaderSettings to Parse and pass the settings into XmlReader.Create method.
#### Attachments
[SPCB-UX31E-20160726.log](https://www.codeplex.com/Download/AttachmentDownload.ashx?ProjectName=spcb&WorkItemId=65089&FileAttachmentId=8763)
#### This work item was migrated from CodePlex
CodePlex work item ID: '65089'
Vote count: '2'
|
non_defect
|
error connecting to sharepoint online there is an error when i try to connect to sharepoint online for security reasons dtd is prohibited in this xml document to enable dtd processing set the dtdprocessing property on xmlreadersettings to parse and pass the settings into xmlreader create method attachments this work item was migrated from codeplex codeplex work item id vote count
| 0
|
89,732
| 15,837,496,497
|
IssuesEvent
|
2021-04-06 20:52:27
|
TIBCOSoftware/tci-flogo
|
https://api.github.com/repos/TIBCOSoftware/tci-flogo
|
opened
|
CVE-2018-3739 (High) detected in https-proxy-agent-1.0.0.tgz
|
security vulnerability
|
## CVE-2018-3739 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>https-proxy-agent-1.0.0.tgz</b></p></summary>
<p>An HTTP(s) proxy `http.Agent` implementation for HTTPS</p>
<p>Library home page: <a href="https://registry.npmjs.org/https-proxy-agent/-/https-proxy-agent-1.0.0.tgz">https://registry.npmjs.org/https-proxy-agent/-/https-proxy-agent-1.0.0.tgz</a></p>
<p>
Dependency Hierarchy:
- protractor-5.1.1.tgz (Root Library)
- saucelabs-1.3.0.tgz
- :x: **https-proxy-agent-1.0.0.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
https-proxy-agent before 2.1.1 passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON).
<p>Publish Date: 2018-06-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3739>CVE-2018-3739</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3739">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3739</a></p>
<p>Release Date: 2018-06-07</p>
<p>Fix Resolution: 2.1.1</p>
</p>
</details>
<p></p>
|
True
|
CVE-2018-3739 (High) detected in https-proxy-agent-1.0.0.tgz - ## CVE-2018-3739 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>https-proxy-agent-1.0.0.tgz</b></p></summary>
<p>An HTTP(s) proxy `http.Agent` implementation for HTTPS</p>
<p>Library home page: <a href="https://registry.npmjs.org/https-proxy-agent/-/https-proxy-agent-1.0.0.tgz">https://registry.npmjs.org/https-proxy-agent/-/https-proxy-agent-1.0.0.tgz</a></p>
<p>
Dependency Hierarchy:
- protractor-5.1.1.tgz (Root Library)
- saucelabs-1.3.0.tgz
- :x: **https-proxy-agent-1.0.0.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
https-proxy-agent before 2.1.1 passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON).
<p>Publish Date: 2018-06-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3739>CVE-2018-3739</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3739">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3739</a></p>
<p>Release Date: 2018-06-07</p>
<p>Fix Resolution: 2.1.1</p>
</p>
</details>
<p></p>
|
non_defect
|
cve high detected in https proxy agent tgz cve high severity vulnerability vulnerable library https proxy agent tgz an http s proxy http agent implementation for https library home page a href dependency hierarchy protractor tgz root library saucelabs tgz x https proxy agent tgz vulnerable library vulnerability details https proxy agent before passes auth option to the buffer constructor without proper sanitization resulting in dos and uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter e g json publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution
| 0
|
6,680
| 2,610,259,010
|
IssuesEvent
|
2015-02-26 19:22:36
|
chrsmith/dsdsdaadf
|
https://api.github.com/repos/chrsmith/dsdsdaadf
|
opened
|
深圳结节性痤疮怎么治
|
auto-migrated Priority-Medium Type-Defect
|
```
深圳结节性痤疮怎么治【深圳韩方科颜全国热线400-869-1818,24
小时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构以韩��
�秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,�
��方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹
”健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内��
�业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上�
��痘痘。
```
-----
Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 8:55
|
1.0
|
深圳结节性痤疮怎么治 - ```
深圳结节性痤疮怎么治【深圳韩方科颜全国热线400-869-1818,24
小时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构以韩��
�秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,�
��方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹
”健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内��
�业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上�
��痘痘。
```
-----
Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 8:55
|
defect
|
深圳结节性痤疮怎么治 深圳结节性痤疮怎么治【 , 】深圳韩方科颜专业祛痘连锁机构,机构以韩�� �秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,� ��方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹 ”健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内�� �业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上� ��痘痘。 original issue reported on code google com by szft com on may at
| 1
|
13,975
| 2,789,818,185
|
IssuesEvent
|
2015-05-08 21:41:22
|
google/google-visualization-api-issues
|
https://api.github.com/repos/google/google-visualization-api-issues
|
closed
|
BUG: [GeoMap] Not wokring for City view with more than 5 rows in dataset
|
Priority-High Type-Defect
|
Original [issue 199](https://code.google.com/p/google-visualization-api-issues/issues/detail?id=199) created by orwant on 2010-02-18T17:40:20.000Z:
<b>What steps will reproduce the problem? Please provide a link to a</b>
<b>demonstration page if at all possible, or attach code.</b>
1. Open the attached file. It has 5 rows in the dataset. It works.
2. Now, uncomment the line to allow 6 rows in the dataset. It fails
silently.
<b>What component is this issue related to (PieChart, LineChart, DataTable,</b>
<b>Query, etc)?</b>
GeoMap
<b>Are you using the test environment (version 1.1)?</b>
<b>(If you are not sure, answer NO)</b>
NO
<b>What operating system and browser are you using?</b>
Windows Vista, IE/Firefox/Safari/Chrome
<b>*********************************************************</b>
<b>For developers viewing this issue: please click the 'star' icon to be</b>
<b>notified of future changes, and to let us know how many of you are</b>
<b>interested in seeing it resolved.</b>
<b>*********************************************************</b>
|
1.0
|
BUG: [GeoMap] Not wokring for City view with more than 5 rows in dataset - Original [issue 199](https://code.google.com/p/google-visualization-api-issues/issues/detail?id=199) created by orwant on 2010-02-18T17:40:20.000Z:
<b>What steps will reproduce the problem? Please provide a link to a</b>
<b>demonstration page if at all possible, or attach code.</b>
1. Open the attached file. It has 5 rows in the dataset. It works.
2. Now, uncomment the line to allow 6 rows in the dataset. It fails
silently.
<b>What component is this issue related to (PieChart, LineChart, DataTable,</b>
<b>Query, etc)?</b>
GeoMap
<b>Are you using the test environment (version 1.1)?</b>
<b>(If you are not sure, answer NO)</b>
NO
<b>What operating system and browser are you using?</b>
Windows Vista, IE/Firefox/Safari/Chrome
<b>*********************************************************</b>
<b>For developers viewing this issue: please click the 'star' icon to be</b>
<b>notified of future changes, and to let us know how many of you are</b>
<b>interested in seeing it resolved.</b>
<b>*********************************************************</b>
|
defect
|
bug not wokring for city view with more than rows in dataset original created by orwant on what steps will reproduce the problem please provide a link to a demonstration page if at all possible or attach code open the attached file it has rows in the dataset it works now uncomment the line to allow rows in the dataset it fails silently what component is this issue related to piechart linechart datatable query etc geomap are you using the test environment version if you are not sure answer no no what operating system and browser are you using windows vista ie firefox safari chrome for developers viewing this issue please click the star icon to be notified of future changes and to let us know how many of you are interested in seeing it resolved
| 1
|
81,576
| 31,033,079,567
|
IssuesEvent
|
2023-08-10 13:40:08
|
TykTechnologies/tyk-operator
|
https://api.github.com/repos/TykTechnologies/tyk-operator
|
opened
|
Only first certificate of certificate_secret_names is assigned to API
|
defect
|
When defining multiple `certificate_secrets_names` on an `ApiDefinition` it seems only the first one is actually assigned to the API by the operator.
Providing this in the `ApiDefinition` resource:
```yaml
certificate_secret_names:
- cert1-secret
- cert2-secret
```
Results in an API with only the first certificate id:
```json
"certificates" : [
"cert1-id"
]
```
Switching the order of `certificate_secret_names` will result in only `cert2-id` being assigned to the API
## Expected Behavior
All certificates defined in `certificate_secret_names` should be assigned to the API
## Current Behavior
Only the first entry in `certificate_secret_names` is assigned to the API. Both certificates are provisioned in Tyk though, and are visible on the dashboard under the Certificates menu.
## Steps to Reproduce
1. Provision at least 2 TLS certificates as Kubernetes secrets
2. Assign both secrets to the `certificate_secret_names` on the `ApiDefinition`
3. Note only 1 certificate id is assigned to the API
## Context
<!-- How has this issue affected you? What are you trying to accomplish? -->
<!-- Providing context helps us come up with a solution that is most useful in the real world -->
A workaround we have now is to define the certificate ids after directly on the `certificates` field on the `ApiDefinition`. This does required getting the certificates provisioned first using `certificate_secrets_names` and then updating the definitions with the ids on the `certificate` field instead. When using certmanager to autorotate the certs/secrets, we then still have to manually update the certificates, because this changes the ids. This won't work nicely in the long term.
```yaml
certificates:
- cert1-id
- cert2-id
```
## Your Environment
<!-- Include as many relevant details about the environment you experienced the defect in -->
<!-- Note that the fields listed below are suggestions; add/remove/edit as necessary -->
* OS (e.g. Linux, macOS, Windows):
* OS version: Tyk Operator Container `tykio/tyk-operator`
* `tyk-operator` version/commit: `v0.15.0`
|
1.0
|
Only first certificate of certificate_secret_names is assigned to API - When defining multiple `certificate_secrets_names` on an `ApiDefinition` it seems only the first one is actually assigned to the API by the operator.
Providing this in the `ApiDefinition` resource:
```yaml
certificate_secret_names:
- cert1-secret
- cert2-secret
```
Results in an API with only the first certificate id:
```json
"certificates" : [
"cert1-id"
]
```
Switching the order of `certificate_secret_names` will result in only `cert2-id` being assigned to the API
## Expected Behavior
All certificates defined in `certificate_secret_names` should be assigned to the API
## Current Behavior
Only the first entry in `certificate_secret_names` is assigned to the API. Both certificates are provisioned in Tyk though, and are visible on the dashboard under the Certificates menu.
## Steps to Reproduce
1. Provision at least 2 TLS certificates as Kubernetes secrets
2. Assign both secrets to the `certificate_secret_names` on the `ApiDefinition`
3. Note only 1 certificate id is assigned to the API
## Context
<!-- How has this issue affected you? What are you trying to accomplish? -->
<!-- Providing context helps us come up with a solution that is most useful in the real world -->
A workaround we have now is to define the certificate ids after directly on the `certificates` field on the `ApiDefinition`. This does required getting the certificates provisioned first using `certificate_secrets_names` and then updating the definitions with the ids on the `certificate` field instead. When using certmanager to autorotate the certs/secrets, we then still have to manually update the certificates, because this changes the ids. This won't work nicely in the long term.
```yaml
certificates:
- cert1-id
- cert2-id
```
## Your Environment
<!-- Include as many relevant details about the environment you experienced the defect in -->
<!-- Note that the fields listed below are suggestions; add/remove/edit as necessary -->
* OS (e.g. Linux, macOS, Windows):
* OS version: Tyk Operator Container `tykio/tyk-operator`
* `tyk-operator` version/commit: `v0.15.0`
|
defect
|
only first certificate of certificate secret names is assigned to api when defining multiple certificate secrets names on an apidefinition it seems only the first one is actually assigned to the api by the operator providing this in the apidefinition resource yaml certificate secret names secret secret results in an api with only the first certificate id json certificates id switching the order of certificate secret names will result in only id being assigned to the api expected behavior all certificates defined in certificate secret names should be assigned to the api current behavior only the first entry in certificate secret names is assigned to the api both certificates are provisioned in tyk though and are visible on the dashboard under the certificates menu steps to reproduce provision at least tls certificates as kubernetes secrets assign both secrets to the certificate secret names on the apidefinition note only certificate id is assigned to the api context a workaround we have now is to define the certificate ids after directly on the certificates field on the apidefinition this does required getting the certificates provisioned first using certificate secrets names and then updating the definitions with the ids on the certificate field instead when using certmanager to autorotate the certs secrets we then still have to manually update the certificates because this changes the ids this won t work nicely in the long term yaml certificates id id your environment os e g linux macos windows os version tyk operator container tykio tyk operator tyk operator version commit
| 1
|
74,923
| 25,406,198,796
|
IssuesEvent
|
2022-11-22 15:27:58
|
jOOQ/jOOQ
|
https://api.github.com/repos/jOOQ/jOOQ
|
closed
|
Median emulation ignores FILTER and OVER clauses
|
T: Defect C: Functionality P: Medium E: All Editions
|
### Expected behavior
When using `median($field).filterWhere(condition)` with Postgres Dialect, the filter-condition should either be applied or it should not compile or at least an error should be thrown.
There should also be a way to opt out of the median emulation for higher postgres version where median can be used.
### Actual behavior
When using `median($field).filterWhere(condition)` the condition is simply ignored when median is emulated with percentiles, leading to a wrong result
### Steps to reproduce the problem
Use `median($field).filterWhere(condition)` anywhere in a query.
See also: https://github.com/jOOQ/jOOQ/blob/main/jOOQ/src/main/java/org/jooq/impl/Median.java#L97
### jOOQ Version
3.17.3
### Database product and version
Postgres 13
### Java Version
17
### OS Version
Any
### JDBC driver name and version (include name if unofficial driver)
Any
|
1.0
|
Median emulation ignores FILTER and OVER clauses - ### Expected behavior
When using `median($field).filterWhere(condition)` with Postgres Dialect, the filter-condition should either be applied or it should not compile or at least an error should be thrown.
There should also be a way to opt out of the median emulation for higher postgres version where median can be used.
### Actual behavior
When using `median($field).filterWhere(condition)` the condition is simply ignored when median is emulated with percentiles, leading to a wrong result
### Steps to reproduce the problem
Use `median($field).filterWhere(condition)` anywhere in a query.
See also: https://github.com/jOOQ/jOOQ/blob/main/jOOQ/src/main/java/org/jooq/impl/Median.java#L97
### jOOQ Version
3.17.3
### Database product and version
Postgres 13
### Java Version
17
### OS Version
Any
### JDBC driver name and version (include name if unofficial driver)
Any
|
defect
|
median emulation ignores filter and over clauses expected behavior when using median field filterwhere condition with postgres dialect the filter condition should either be applied or it should not compile or at least an error should be thrown there should also be a way to opt out of the median emulation for higher postgres version where median can be used actual behavior when using median field filterwhere condition the condition is simply ignored when median is emulated with percentiles leading to a wrong result steps to reproduce the problem use median field filterwhere condition anywhere in a query see also jooq version database product and version postgres java version os version any jdbc driver name and version include name if unofficial driver any
| 1
|
424,504
| 12,312,090,290
|
IssuesEvent
|
2020-05-12 13:26:53
|
jenkins-x/jx
|
https://api.github.com/repos/jenkins-x/jx
|
closed
|
jx install --provider=eks fails 403 route53:ListHostedZones when using diferent AWS profile
|
area/eks kind/enhancement lifecycle/rotten priority/important-longterm
|
### Summary
I have an AWS user that has permission to assume other roles for other accounts, so with this same user I can authenticate and operate switching accounts, switching the profile configured to assume other roles.
When trying to install jx on a running cluster in an other account using an alternate profile, I get an error when jx tries to install the ingress service controller due to user not authorized, but the user that it is taking to perform this step is the user in the root account, not the assumed role for the account of the alternate profile. Previous steps work as expected, like creating the load balancer for the ingress controller, it is created in the correct account using the correct role. But when it reaches this step it uses the user in the root account.
### Steps to reproduce the behavior
1. Configure other profiles for aws-cli
2. `export AWS_DEFAULT_PROFILE=profile2`
3. Have an EKS cluster up and running (withing profile2 account)
4. `jx install --provider=eks`
### Expected behavior
jx is installed and all required services and configurations are installed within the account the the selected profile mandates
### Actual behavior
```
$ jx install --provider=eks --domain=mydomain.dev
Setting the dev namespace to: jx
Using helmBinary helm with feature flag: none
Context "arn:aws:eks:us-east-1:{other_account_id}:cluster/eks-cluster-dev-us-east-1" modified.
Git configured for user: Ivan Californias and email ivan.californias@gmail.com
Using helm2
Configuring tiller
Tiller Deployment is running in namespace kube-system
existing ingress controller found, no need to install a new one
Waiting for external loadbalancer to be created and update the nginx-ingress-controller service in kube-system namespace
External loadbalancer created
Waiting to find the external host name of the ingress controller Service in namespace kube-system with name jxing-nginx-ingress-controller
ingress init failed: AccessDenied: User: arn:aws:iam::{root_account_id}:user/{user_in_root} is not authorized to perform: route53:ListHostedZones
status code: 403, request id: ea375c11-5c7b-11e9-ac1a-29ded90382c4
error: initializing the Jenkins X platform: initializing the Jenkins X platform: AccessDenied: User: arn:aws:iam::{root_account_id}:user/{user_in_root} is not authorized to perform: route53:ListHostedZones
status code: 403, request id: ea375c11-5c7b-11e9-ac1a-29ded90382c4
```
### Jx version
The output of `jx version` is:
```
$ jx version
NAME VERSION
jx 1.3.1108
Kubernetes cluster v1.11.8-eks-7c34c0
kubectl v1.14.0
helm client v2.13.1+g618447c
helm server v2.13.1+g618447c
git git version 2.20.1
Operating System "Fedora release 29 (Twenty Nine)"
```
### Jenkins type
<!--
Select which Jenkins installation type are you using.
-->
- [ ] Classic Jenkins
- [ ] Serverless Jenkins
### Kubernetes cluster
<!--
What kind of Kubernetes cluster are you using & how did you create it?
-->
I created an EKS cluster using terrform with these guides:
https://learn.hashicorp.com/terraform/aws/eks-intro
https://aws.amazon.com/blogs/opensource/continuous-delivery-eks-jenkins-x/
### Operating system / Environment
<!--
In which environment are you running the jx CLI?
-->
Fedora 29
|
1.0
|
jx install --provider=eks fails 403 route53:ListHostedZones when using diferent AWS profile - ### Summary
I have an AWS user that has permission to assume other roles for other accounts, so with this same user I can authenticate and operate switching accounts, switching the profile configured to assume other roles.
When trying to install jx on a running cluster in an other account using an alternate profile, I get an error when jx tries to install the ingress service controller due to user not authorized, but the user that it is taking to perform this step is the user in the root account, not the assumed role for the account of the alternate profile. Previous steps work as expected, like creating the load balancer for the ingress controller, it is created in the correct account using the correct role. But when it reaches this step it uses the user in the root account.
### Steps to reproduce the behavior
1. Configure other profiles for aws-cli
2. `export AWS_DEFAULT_PROFILE=profile2`
3. Have an EKS cluster up and running (withing profile2 account)
4. `jx install --provider=eks`
### Expected behavior
jx is installed and all required services and configurations are installed within the account the the selected profile mandates
### Actual behavior
```
$ jx install --provider=eks --domain=mydomain.dev
Setting the dev namespace to: jx
Using helmBinary helm with feature flag: none
Context "arn:aws:eks:us-east-1:{other_account_id}:cluster/eks-cluster-dev-us-east-1" modified.
Git configured for user: Ivan Californias and email ivan.californias@gmail.com
Using helm2
Configuring tiller
Tiller Deployment is running in namespace kube-system
existing ingress controller found, no need to install a new one
Waiting for external loadbalancer to be created and update the nginx-ingress-controller service in kube-system namespace
External loadbalancer created
Waiting to find the external host name of the ingress controller Service in namespace kube-system with name jxing-nginx-ingress-controller
ingress init failed: AccessDenied: User: arn:aws:iam::{root_account_id}:user/{user_in_root} is not authorized to perform: route53:ListHostedZones
status code: 403, request id: ea375c11-5c7b-11e9-ac1a-29ded90382c4
error: initializing the Jenkins X platform: initializing the Jenkins X platform: AccessDenied: User: arn:aws:iam::{root_account_id}:user/{user_in_root} is not authorized to perform: route53:ListHostedZones
status code: 403, request id: ea375c11-5c7b-11e9-ac1a-29ded90382c4
```
### Jx version
The output of `jx version` is:
```
$ jx version
NAME VERSION
jx 1.3.1108
Kubernetes cluster v1.11.8-eks-7c34c0
kubectl v1.14.0
helm client v2.13.1+g618447c
helm server v2.13.1+g618447c
git git version 2.20.1
Operating System "Fedora release 29 (Twenty Nine)"
```
### Jenkins type
<!--
Select which Jenkins installation type are you using.
-->
- [ ] Classic Jenkins
- [ ] Serverless Jenkins
### Kubernetes cluster
<!--
What kind of Kubernetes cluster are you using & how did you create it?
-->
I created an EKS cluster using terrform with these guides:
https://learn.hashicorp.com/terraform/aws/eks-intro
https://aws.amazon.com/blogs/opensource/continuous-delivery-eks-jenkins-x/
### Operating system / Environment
<!--
In which environment are you running the jx CLI?
-->
Fedora 29
|
non_defect
|
jx install provider eks fails listhostedzones when using diferent aws profile summary i have an aws user that has permission to assume other roles for other accounts so with this same user i can authenticate and operate switching accounts switching the profile configured to assume other roles when trying to install jx on a running cluster in an other account using an alternate profile i get an error when jx tries to install the ingress service controller due to user not authorized but the user that it is taking to perform this step is the user in the root account not the assumed role for the account of the alternate profile previous steps work as expected like creating the load balancer for the ingress controller it is created in the correct account using the correct role but when it reaches this step it uses the user in the root account steps to reproduce the behavior configure other profiles for aws cli export aws default profile have an eks cluster up and running withing account jx install provider eks expected behavior jx is installed and all required services and configurations are installed within the account the the selected profile mandates actual behavior jx install provider eks domain mydomain dev setting the dev namespace to jx using helmbinary helm with feature flag none context arn aws eks us east other account id cluster eks cluster dev us east modified git configured for user ivan californias and email ivan californias gmail com using configuring tiller tiller deployment is running in namespace kube system existing ingress controller found no need to install a new one waiting for external loadbalancer to be created and update the nginx ingress controller service in kube system namespace external loadbalancer created waiting to find the external host name of the ingress controller service in namespace kube system with name jxing nginx ingress controller ingress init failed accessdenied user arn aws iam root account id user user in root is not authorized to perform listhostedzones status code request id error initializing the jenkins x platform initializing the jenkins x platform accessdenied user arn aws iam root account id user user in root is not authorized to perform listhostedzones status code request id jx version the output of jx version is jx version name version jx kubernetes cluster eks kubectl helm client helm server git git version operating system fedora release twenty nine jenkins type select which jenkins installation type are you using classic jenkins serverless jenkins kubernetes cluster what kind of kubernetes cluster are you using how did you create it i created an eks cluster using terrform with these guides operating system environment in which environment are you running the jx cli fedora
| 0
|
24,592
| 4,029,603,836
|
IssuesEvent
|
2016-05-18 11:20:25
|
hazelcast/hazelcast
|
https://api.github.com/repos/hazelcast/hazelcast
|
closed
|
Cache should not expire entites when Duration value is 0 (zero)
|
Team: Integration Type: Defect
|
According to the JCache API javadoc, when the durationAmount parameter in ` javax.cache.expiry.Duration` constructor is set to 0 (zero), it means cache entites should live eternal. Here is the javadoc:
```
/**
* Constructs a duration.
*
* @param timeUnit the unit of time to specify time in. The minimum time unit is milliseconds.
* @param durationAmount how long, in the specified units, the cache entries should live. 0 means eternal.
* @throws NullPointerException if timeUnit is null
* @throws IllegalArgumentException if durationAmount is less than 0 or a TimeUnit less than milliseconds is specified
*/
public Duration(TimeUnit timeUnit, long durationAmount) {
```
However the entity directly expires when it is set to zero. See the test below. It fails when executed:
```
@Test
public void valueShouldNotBeExpiredWhenDurationIsZero() {
final int CREATED_EXPIRY_TIME_IN_MSEC = 0;
Duration duration = new Duration(TimeUnit.MILLISECONDS, CREATED_EXPIRY_TIME_IN_MSEC);
CacheConfig<Integer, String> cacheConfig = new CacheConfig<Integer, String>();
cacheConfig.setExpiryPolicyFactory(CreatedExpiryPolicy.factoryOf(duration));
final Cache<Integer, String> cache = createCache(cacheConfig);
cache.put(1, "value");
assertTrueEventually(new AssertTask() {
@Override
public void run() throws Exception {
assertNotNull(cache.get(1));
}
});
}
```
|
1.0
|
Cache should not expire entites when Duration value is 0 (zero) - According to the JCache API javadoc, when the durationAmount parameter in ` javax.cache.expiry.Duration` constructor is set to 0 (zero), it means cache entites should live eternal. Here is the javadoc:
```
/**
* Constructs a duration.
*
* @param timeUnit the unit of time to specify time in. The minimum time unit is milliseconds.
* @param durationAmount how long, in the specified units, the cache entries should live. 0 means eternal.
* @throws NullPointerException if timeUnit is null
* @throws IllegalArgumentException if durationAmount is less than 0 or a TimeUnit less than milliseconds is specified
*/
public Duration(TimeUnit timeUnit, long durationAmount) {
```
However the entity directly expires when it is set to zero. See the test below. It fails when executed:
```
@Test
public void valueShouldNotBeExpiredWhenDurationIsZero() {
final int CREATED_EXPIRY_TIME_IN_MSEC = 0;
Duration duration = new Duration(TimeUnit.MILLISECONDS, CREATED_EXPIRY_TIME_IN_MSEC);
CacheConfig<Integer, String> cacheConfig = new CacheConfig<Integer, String>();
cacheConfig.setExpiryPolicyFactory(CreatedExpiryPolicy.factoryOf(duration));
final Cache<Integer, String> cache = createCache(cacheConfig);
cache.put(1, "value");
assertTrueEventually(new AssertTask() {
@Override
public void run() throws Exception {
assertNotNull(cache.get(1));
}
});
}
```
|
defect
|
cache should not expire entites when duration value is zero according to the jcache api javadoc when the durationamount parameter in javax cache expiry duration constructor is set to zero it means cache entites should live eternal here is the javadoc constructs a duration param timeunit the unit of time to specify time in the minimum time unit is milliseconds param durationamount how long in the specified units the cache entries should live means eternal throws nullpointerexception if timeunit is null throws illegalargumentexception if durationamount is less than or a timeunit less than milliseconds is specified public duration timeunit timeunit long durationamount however the entity directly expires when it is set to zero see the test below it fails when executed test public void valueshouldnotbeexpiredwhendurationiszero final int created expiry time in msec duration duration new duration timeunit milliseconds created expiry time in msec cacheconfig cacheconfig new cacheconfig cacheconfig setexpirypolicyfactory createdexpirypolicy factoryof duration final cache cache createcache cacheconfig cache put value asserttrueeventually new asserttask override public void run throws exception assertnotnull cache get
| 1
|
21,921
| 18,074,009,442
|
IssuesEvent
|
2021-09-21 07:48:30
|
godotengine/godot
|
https://api.github.com/repos/godotengine/godot
|
closed
|
Tab key can't be used in editor shortcuts.
|
bug topic:editor usability
|
**Operating system or device - Godot version:**
Linux - Master
**Issue description:**
When pressing an Editor shortcut that involves the `Tab` key, Godot will focus the next `control` instead of activating the shortcut. Easily testable with the default "next/prev scene" shortcut.
**Steps to reproduce:**
- Have 2 or more scenes open.
- Press `ctrl + tab` or `ctrl + shift + tab`
- ...
- Don't Profit :(
|
True
|
Tab key can't be used in editor shortcuts. - **Operating system or device - Godot version:**
Linux - Master
**Issue description:**
When pressing an Editor shortcut that involves the `Tab` key, Godot will focus the next `control` instead of activating the shortcut. Easily testable with the default "next/prev scene" shortcut.
**Steps to reproduce:**
- Have 2 or more scenes open.
- Press `ctrl + tab` or `ctrl + shift + tab`
- ...
- Don't Profit :(
|
non_defect
|
tab key can t be used in editor shortcuts operating system or device godot version linux master issue description when pressing an editor shortcut that involves the tab key godot will focus the next control instead of activating the shortcut easily testable with the default next prev scene shortcut steps to reproduce have or more scenes open press ctrl tab or ctrl shift tab don t profit
| 0
|
4,856
| 2,610,158,491
|
IssuesEvent
|
2015-02-26 18:50:18
|
chrsmith/republic-at-war
|
https://api.github.com/repos/chrsmith/republic-at-war
|
closed
|
MTT
|
auto-migrated Priority-Medium Type-Defect
|
```
change icon for MTT deploy
```
-----
Original issue reported on code.google.com by `z3r0...@gmail.com` on 30 Jan 2011 at 3:02
|
1.0
|
MTT - ```
change icon for MTT deploy
```
-----
Original issue reported on code.google.com by `z3r0...@gmail.com` on 30 Jan 2011 at 3:02
|
defect
|
mtt change icon for mtt deploy original issue reported on code google com by gmail com on jan at
| 1
|
134,375
| 12,602,031,310
|
IssuesEvent
|
2020-06-11 10:56:48
|
GhRoadDemo/ghroaddemo
|
https://api.github.com/repos/GhRoadDemo/ghroaddemo
|
closed
|
Content missing about organizations
|
documentation
|
There is no information about organisations in the readme file
|
1.0
|
Content missing about organizations - There is no information about organisations in the readme file
|
non_defect
|
content missing about organizations there is no information about organisations in the readme file
| 0
|
6,602
| 2,610,257,600
|
IssuesEvent
|
2015-02-26 19:22:12
|
chrsmith/dsdsdaadf
|
https://api.github.com/repos/chrsmith/dsdsdaadf
|
opened
|
深圳激光去痘印多少钱
|
auto-migrated Priority-Medium Type-Defect
|
```
深圳激光去痘印多少钱【深圳韩方科颜全国热线400-869-1818,24
小时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构以韩��
�秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,�
��方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹
”健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内��
�业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上�
��痘痘。
```
-----
Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 8:43
|
1.0
|
深圳激光去痘印多少钱 - ```
深圳激光去痘印多少钱【深圳韩方科颜全国热线400-869-1818,24
小时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构以韩��
�秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,�
��方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹
”健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内��
�业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上�
��痘痘。
```
-----
Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 8:43
|
defect
|
深圳激光去痘印多少钱 深圳激光去痘印多少钱【 , 】深圳韩方科颜专业祛痘连锁机构,机构以韩�� �秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,� ��方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹 ”健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内�� �业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上� ��痘痘。 original issue reported on code google com by szft com on may at
| 1
|
71,479
| 23,644,817,964
|
IssuesEvent
|
2022-08-25 20:49:41
|
vector-im/element-web
|
https://api.github.com/repos/vector-im/element-web
|
closed
|
The "useLatestResult should return results" test is flaky
|
T-Defect S-Major A-Testing A-Developer-Experience O-Uncommon Z-Flaky-Test
|
https://buildkite.com/organizations/matrix-dot-org/pipelines/matrix-react-sdk/builds/27666/jobs/01826ebd-c9d4-44d3-a483-c8aaf6182539/raw_log
```
Summary of all failing tests
FAIL test/hooks/useLatestResult-test.tsx
● useLatestResult › should return results
expect(received).toEqual(expected) // deep equality
Expected: "0"
Received: "1"
58 | await sleep(10);
59 | });
> 60 | expect(wrapper.text()).toEqual("0");
| ^
61 | await act(async () => {
62 | await sleep(15);
63 | });
at Object.<anonymous> (test/hooks/useLatestResult-test.tsx:60:32)
```
It appears that the test can get suspended for longer than it expects.
|
1.0
|
The "useLatestResult should return results" test is flaky - https://buildkite.com/organizations/matrix-dot-org/pipelines/matrix-react-sdk/builds/27666/jobs/01826ebd-c9d4-44d3-a483-c8aaf6182539/raw_log
```
Summary of all failing tests
FAIL test/hooks/useLatestResult-test.tsx
● useLatestResult › should return results
expect(received).toEqual(expected) // deep equality
Expected: "0"
Received: "1"
58 | await sleep(10);
59 | });
> 60 | expect(wrapper.text()).toEqual("0");
| ^
61 | await act(async () => {
62 | await sleep(15);
63 | });
at Object.<anonymous> (test/hooks/useLatestResult-test.tsx:60:32)
```
It appears that the test can get suspended for longer than it expects.
|
defect
|
the uselatestresult should return results test is flaky summary of all failing tests fail test hooks uselatestresult test tsx ● uselatestresult › should return results expect received toequal expected deep equality expected received await sleep expect wrapper text toequal await act async await sleep at object test hooks uselatestresult test tsx it appears that the test can get suspended for longer than it expects
| 1
|
252,879
| 19,074,733,058
|
IssuesEvent
|
2021-11-27 15:10:06
|
mit-ll-responsible-ai/hydra-zen
|
https://api.github.com/repos/mit-ll-responsible-ai/hydra-zen
|
closed
|
Make a note about `defaults` in our config-groups tutorial
|
documentation
|
Working through [this](https://mit-ll-responsible-ai.github.io/hydra-zen/tutorials/config_groups.html) tutorial has the user configure a `defaults` field:
```python
Config = make_config("player", defaults=["_self_", {"player": "base"}])
```
a reader might naturally look to `make_config`'s docs for explanation...but there is none since we don't give that field any special treatment in `make_config`. We should at least add a callout box in the tutorial that directs them, loud and clear, to the appropriate Hydra docs.
We also might consider:
- Mentioning is in the Notes section of make_config
- Actually including `defaults` or maybe `hydra_defaults` as a reserved field in `make_config` and thus document it... but I don't really see utility in that.
|
1.0
|
Make a note about `defaults` in our config-groups tutorial - Working through [this](https://mit-ll-responsible-ai.github.io/hydra-zen/tutorials/config_groups.html) tutorial has the user configure a `defaults` field:
```python
Config = make_config("player", defaults=["_self_", {"player": "base"}])
```
a reader might naturally look to `make_config`'s docs for explanation...but there is none since we don't give that field any special treatment in `make_config`. We should at least add a callout box in the tutorial that directs them, loud and clear, to the appropriate Hydra docs.
We also might consider:
- Mentioning is in the Notes section of make_config
- Actually including `defaults` or maybe `hydra_defaults` as a reserved field in `make_config` and thus document it... but I don't really see utility in that.
|
non_defect
|
make a note about defaults in our config groups tutorial working through tutorial has the user configure a defaults field python config make config player defaults a reader might naturally look to make config s docs for explanation but there is none since we don t give that field any special treatment in make config we should at least add a callout box in the tutorial that directs them loud and clear to the appropriate hydra docs we also might consider mentioning is in the notes section of make config actually including defaults or maybe hydra defaults as a reserved field in make config and thus document it but i don t really see utility in that
| 0
|
137,594
| 20,170,043,866
|
IssuesEvent
|
2022-02-10 09:36:14
|
saySthAbout/NewPlace-FrontEnd
|
https://api.github.com/repos/saySthAbout/NewPlace-FrontEnd
|
closed
|
main 레이아웃 제작
|
Design/UX
|
## 필요한 기능
반응형 header, bottomMenu, footer에 의해 무너지지 않는(겹침 현상이 없는) main 영역 레이아웃 만들기
|
1.0
|
main 레이아웃 제작 - ## 필요한 기능
반응형 header, bottomMenu, footer에 의해 무너지지 않는(겹침 현상이 없는) main 영역 레이아웃 만들기
|
non_defect
|
main 레이아웃 제작 필요한 기능 반응형 header bottommenu footer에 의해 무너지지 않는 겹침 현상이 없는 main 영역 레이아웃 만들기
| 0
|
137,052
| 11,097,825,807
|
IssuesEvent
|
2019-12-16 14:07:13
|
zeebe-io/zeebe
|
https://api.github.com/repos/zeebe-io/zeebe
|
closed
|
LogStreamTest.shouldCloseLogStream unstabled
|
Status: Needs Review Type: Maintenance Type: Unstable Test
|
**Description**
Failed sometimes in the CI.
```
[ERROR] Tests run: 4, Failures: 1, Errors: 0, Skipped: 0, Time elapsed: 2.074 s <<< FAILURE! - in io.zeebe.logstreams.log.LogStreamTest
[ERROR] io.zeebe.logstreams.log.LogStreamTest.shouldCloseLogStream Time elapsed: 0.683 s <<< FAILURE!
java.lang.AssertionError:
Expecting code to raise a throwable.
at io.zeebe.logstreams.log.LogStreamTest.shouldCloseLogStream(LogStreamTest.java:91)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:48)
at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:48)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
at org.junit.runners.Suite.runChild(Suite.java:128)
at org.junit.runners.Suite.runChild(Suite.java:27)
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
at org.apache.maven.surefire.junitcore.JUnitCore.run(JUnitCore.java:55)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.createRequestAndRun(JUnitCoreWrapper.java:137)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.executeLazy(JUnitCoreWrapper.java:119)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:87)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:75)
at org.apache.maven.surefire.junitcore.JUnitCoreProvider.invoke(JUnitCoreProvider.java:158)
at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:377)
at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:138)
at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:465)
at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:451)
```
Output:
```
12:13:49.119 [] [main] INFO io.zeebe.test - Test finished: shouldCreateNewLogStreamBatchWriter(io.zeebe.logstreams.log.LogStreamTest)
12:13:49.120 [] [main] INFO io.zeebe.test - Test started: shouldCloseLogStream(io.zeebe.logstreams.log.LogStreamTest)
12:13:49.313 [io.zeebe.logstreams.impl.LogStreamBuilder$1] [-zb-actors-3] WARN io.zeebe.logstreams - Unexpected non-empty log failed to read the last block
12:13:49.318 [io.zeebe.logstreams.impl.log.LogStreamImpl] [-zb-actors-3] WARN io.zeebe.logstreams - Unexpected non-empty log failed to read the last block
12:13:49.533 [io.zeebe.logstreams.impl.log.LogStreamImpl] [-zb-actors-1] DEBUG io.zeebe.logstreams - Configured log appender back pressure at partition 0 as AppenderVegasCfg{initialLimit=1024, maxConcurrency=32768, alphaLimit=0.7, betaLimit=0.95}. Window limiting is disabled
12:13:49.600 [io.zeebe.logstreams.impl.log.LogStreamImpl] [-zb-actors-3] INFO io.zeebe.logstreams - Close appender for log stream 0
12:13:49.601 [0-write-buffer] [-zb-actors-3] DEBUG io.zeebe.dispatcher - Dispatcher closed
12:13:49.602 [io.zeebe.logstreams.impl.log.LogStreamImpl] [-zb-actors-1] INFO io.zeebe.logstreams - On closing logstream 0 close 1 readers
12:13:49.603 [io.zeebe.logstreams.impl.log.LogStreamImpl] [-zb-actors-1] INFO io.zeebe.logstreams - Close log storage with name 0
```
|
1.0
|
LogStreamTest.shouldCloseLogStream unstabled - **Description**
Failed sometimes in the CI.
```
[ERROR] Tests run: 4, Failures: 1, Errors: 0, Skipped: 0, Time elapsed: 2.074 s <<< FAILURE! - in io.zeebe.logstreams.log.LogStreamTest
[ERROR] io.zeebe.logstreams.log.LogStreamTest.shouldCloseLogStream Time elapsed: 0.683 s <<< FAILURE!
java.lang.AssertionError:
Expecting code to raise a throwable.
at io.zeebe.logstreams.log.LogStreamTest.shouldCloseLogStream(LogStreamTest.java:91)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:48)
at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:48)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
at org.junit.runners.Suite.runChild(Suite.java:128)
at org.junit.runners.Suite.runChild(Suite.java:27)
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
at org.apache.maven.surefire.junitcore.JUnitCore.run(JUnitCore.java:55)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.createRequestAndRun(JUnitCoreWrapper.java:137)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.executeLazy(JUnitCoreWrapper.java:119)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:87)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:75)
at org.apache.maven.surefire.junitcore.JUnitCoreProvider.invoke(JUnitCoreProvider.java:158)
at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:377)
at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:138)
at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:465)
at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:451)
```
Output:
```
12:13:49.119 [] [main] INFO io.zeebe.test - Test finished: shouldCreateNewLogStreamBatchWriter(io.zeebe.logstreams.log.LogStreamTest)
12:13:49.120 [] [main] INFO io.zeebe.test - Test started: shouldCloseLogStream(io.zeebe.logstreams.log.LogStreamTest)
12:13:49.313 [io.zeebe.logstreams.impl.LogStreamBuilder$1] [-zb-actors-3] WARN io.zeebe.logstreams - Unexpected non-empty log failed to read the last block
12:13:49.318 [io.zeebe.logstreams.impl.log.LogStreamImpl] [-zb-actors-3] WARN io.zeebe.logstreams - Unexpected non-empty log failed to read the last block
12:13:49.533 [io.zeebe.logstreams.impl.log.LogStreamImpl] [-zb-actors-1] DEBUG io.zeebe.logstreams - Configured log appender back pressure at partition 0 as AppenderVegasCfg{initialLimit=1024, maxConcurrency=32768, alphaLimit=0.7, betaLimit=0.95}. Window limiting is disabled
12:13:49.600 [io.zeebe.logstreams.impl.log.LogStreamImpl] [-zb-actors-3] INFO io.zeebe.logstreams - Close appender for log stream 0
12:13:49.601 [0-write-buffer] [-zb-actors-3] DEBUG io.zeebe.dispatcher - Dispatcher closed
12:13:49.602 [io.zeebe.logstreams.impl.log.LogStreamImpl] [-zb-actors-1] INFO io.zeebe.logstreams - On closing logstream 0 close 1 readers
12:13:49.603 [io.zeebe.logstreams.impl.log.LogStreamImpl] [-zb-actors-1] INFO io.zeebe.logstreams - Close log storage with name 0
```
|
non_defect
|
logstreamtest shouldcloselogstream unstabled description failed sometimes in the ci tests run failures errors skipped time elapsed s failure in io zeebe logstreams log logstreamtest io zeebe logstreams log logstreamtest shouldcloselogstream time elapsed s failure java lang assertionerror expecting code to raise a throwable at io zeebe logstreams log logstreamtest shouldcloselogstream logstreamtest java at java base jdk internal reflect nativemethodaccessorimpl native method at java base jdk internal reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at java base jdk internal reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java base java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at org junit internal runners statements runbefores evaluate runbefores java at org junit rules externalresource evaluate externalresource java at org junit rules externalresource evaluate externalresource java at org junit rules runrules evaluate runrules java at org junit runners parentrunner runleaf parentrunner java at org junit runners runchild java at org junit runners runchild java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org junit runners suite runchild suite java at org junit runners suite runchild suite java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org apache maven surefire junitcore junitcore run junitcore java at org apache maven surefire junitcore junitcorewrapper createrequestandrun junitcorewrapper java at org apache maven surefire junitcore junitcorewrapper executelazy junitcorewrapper java at org apache maven surefire junitcore junitcorewrapper execute junitcorewrapper java at org apache maven surefire junitcore junitcorewrapper execute junitcorewrapper java at org apache maven surefire junitcore junitcoreprovider invoke junitcoreprovider java at org apache maven surefire booter forkedbooter runsuitesinprocess forkedbooter java at org apache maven surefire booter forkedbooter execute forkedbooter java at org apache maven surefire booter forkedbooter run forkedbooter java at org apache maven surefire booter forkedbooter main forkedbooter java output info io zeebe test test finished shouldcreatenewlogstreambatchwriter io zeebe logstreams log logstreamtest info io zeebe test test started shouldcloselogstream io zeebe logstreams log logstreamtest warn io zeebe logstreams unexpected non empty log failed to read the last block warn io zeebe logstreams unexpected non empty log failed to read the last block debug io zeebe logstreams configured log appender back pressure at partition as appendervegascfg initiallimit maxconcurrency alphalimit betalimit window limiting is disabled info io zeebe logstreams close appender for log stream debug io zeebe dispatcher dispatcher closed info io zeebe logstreams on closing logstream close readers info io zeebe logstreams close log storage with name
| 0
|
82,027
| 31,860,003,846
|
IssuesEvent
|
2023-09-15 10:11:58
|
scipy/scipy
|
https://api.github.com/repos/scipy/scipy
|
opened
|
BUG: upcasting of indices dtype from DIA to COO/CSR/BSR arrays
|
defect
|
### Describe your issue.
While I understand the decision of not using downcasting for indices (cf. https://github.com/scipy/scipy/pull/18509), it seems that the conversion from DIA to COO/CSR/BSR matrices will make an upcast from `np.int32` to `np.int64` while it should not be needed. I assume that using the `dtype` of the `offsets` should be enough to be used during the conversion.
### Reproducing Code Example
```python
# %%
import numpy as np
from scipy import sparse
data = np.array([[1, 2, 3, 4]]).repeat(3, axis=0)
offsets = np.array([0, -1, 2], dtype=np.int32)
dia = sparse.dia_array((data, offsets), shape=(4, 4))
dia.__dict__
# %%
coo = dia.tocoo()
assert coo.col.dtype == np.int32, f"Wrong dtype: {coo.col.dtype}"
# %%
csr = dia.tocsr()
assert csr.indices.dtype == np.int32, f"Wrong dtype: {csr.col.dtype}"
# %%
csc = dia.tocsc()
assert csc.indices.dtype == np.int32, f"Wrong dtype: {csc.col.dtype}"
```
### Error message
```shell
I would expect a consistent behaviour and most probably to reuse the `dtype` of the `offsets` of the DIA matrix.
```
### SciPy/NumPy/Python version and system information
```shell
SciPy version: '1.11.2'
```
|
1.0
|
BUG: upcasting of indices dtype from DIA to COO/CSR/BSR arrays - ### Describe your issue.
While I understand the decision of not using downcasting for indices (cf. https://github.com/scipy/scipy/pull/18509), it seems that the conversion from DIA to COO/CSR/BSR matrices will make an upcast from `np.int32` to `np.int64` while it should not be needed. I assume that using the `dtype` of the `offsets` should be enough to be used during the conversion.
### Reproducing Code Example
```python
# %%
import numpy as np
from scipy import sparse
data = np.array([[1, 2, 3, 4]]).repeat(3, axis=0)
offsets = np.array([0, -1, 2], dtype=np.int32)
dia = sparse.dia_array((data, offsets), shape=(4, 4))
dia.__dict__
# %%
coo = dia.tocoo()
assert coo.col.dtype == np.int32, f"Wrong dtype: {coo.col.dtype}"
# %%
csr = dia.tocsr()
assert csr.indices.dtype == np.int32, f"Wrong dtype: {csr.col.dtype}"
# %%
csc = dia.tocsc()
assert csc.indices.dtype == np.int32, f"Wrong dtype: {csc.col.dtype}"
```
### Error message
```shell
I would expect a consistent behaviour and most probably to reuse the `dtype` of the `offsets` of the DIA matrix.
```
### SciPy/NumPy/Python version and system information
```shell
SciPy version: '1.11.2'
```
|
defect
|
bug upcasting of indices dtype from dia to coo csr bsr arrays describe your issue while i understand the decision of not using downcasting for indices cf it seems that the conversion from dia to coo csr bsr matrices will make an upcast from np to np while it should not be needed i assume that using the dtype of the offsets should be enough to be used during the conversion reproducing code example python import numpy as np from scipy import sparse data np array repeat axis offsets np array dtype np dia sparse dia array data offsets shape dia dict coo dia tocoo assert coo col dtype np f wrong dtype coo col dtype csr dia tocsr assert csr indices dtype np f wrong dtype csr col dtype csc dia tocsc assert csc indices dtype np f wrong dtype csc col dtype error message shell i would expect a consistent behaviour and most probably to reuse the dtype of the offsets of the dia matrix scipy numpy python version and system information shell scipy version
| 1
|
457,247
| 13,153,751,090
|
IssuesEvent
|
2020-08-10 04:38:24
|
grafana/grafana
|
https://api.github.com/repos/grafana/grafana
|
closed
|
global built-in variables: __dashboard and __dashboard.name are not available in the text panel
|
area/dashboard/templating priority/important-soon type/bug
|
I want to use the relatively new global variable __dashboard to open git hub issues.
When I try to use the variable in the panel it is not being replaced, I've tried both the `$` and the `[[]]` substitution none worked
How I just reproduce it:
* Edit a text panel and add ${__dashboard.name} in the text - Should work
* Exit the edit panel
* Edit the same panel again, remove and add the ${__dashboard.name} now it does not work
|
1.0
|
global built-in variables: __dashboard and __dashboard.name are not available in the text panel - I want to use the relatively new global variable __dashboard to open git hub issues.
When I try to use the variable in the panel it is not being replaced, I've tried both the `$` and the `[[]]` substitution none worked
How I just reproduce it:
* Edit a text panel and add ${__dashboard.name} in the text - Should work
* Exit the edit panel
* Edit the same panel again, remove and add the ${__dashboard.name} now it does not work
|
non_defect
|
global built in variables dashboard and dashboard name are not available in the text panel i want to use the relatively new global variable dashboard to open git hub issues when i try to use the variable in the panel it is not being replaced i ve tried both the and the substitution none worked how i just reproduce it edit a text panel and add dashboard name in the text should work exit the edit panel edit the same panel again remove and add the dashboard name now it does not work
| 0
|
19,163
| 3,146,558,050
|
IssuesEvent
|
2015-09-14 23:59:32
|
dart-lang/sdk
|
https://api.github.com/repos/dart-lang/sdk
|
opened
|
VM service: stdout doesn't produce WriteEvents
|
Area-Observatory Type-Defect
|
Currently only `print()` produces `WriteEvent`s on the `Stdout` stream; `dart:io`'s `stdout.add()` and derived methods don't. `stderr` produces `WriteEvent`s on `Stderr` as expected.
|
1.0
|
VM service: stdout doesn't produce WriteEvents - Currently only `print()` produces `WriteEvent`s on the `Stdout` stream; `dart:io`'s `stdout.add()` and derived methods don't. `stderr` produces `WriteEvent`s on `Stderr` as expected.
|
defect
|
vm service stdout doesn t produce writeevents currently only print produces writeevent s on the stdout stream dart io s stdout add and derived methods don t stderr produces writeevent s on stderr as expected
| 1
|
6,396
| 2,610,242,211
|
IssuesEvent
|
2015-02-26 19:17:06
|
chrsmith/jsjsj122
|
https://api.github.com/repos/chrsmith/jsjsj122
|
opened
|
台州割包皮包茎哪家专业
|
auto-migrated Priority-Medium Type-Defect
|
```
台州割包皮包茎哪家专业【台州五洲生殖医院】24小时健康咨
询热线:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台州
市椒江区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、108�
��118、198及椒江一金清公交车直达枫南小区,乘坐107、105、109
、112、901、 902公交车到星星广场下车,步行即可到院。
诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,��
�精,无精。包皮包茎,精索静脉曲张,淋病等。
台州五洲生殖医院是台州最大的男科医院,权威专家在线免��
�咨询,拥有专业完善的男科检查治疗设备,严格按照国家标�
��收费。尖端医疗设备,与世界同步。权威专家,成就专业典
范。人性化服务,一切以患者为中心。
看男科就选台州五洲生殖医院,专业男科为男人。
```
-----
Original issue reported on code.google.com by `poweragr...@gmail.com` on 31 May 2014 at 1:11
|
1.0
|
台州割包皮包茎哪家专业 - ```
台州割包皮包茎哪家专业【台州五洲生殖医院】24小时健康咨
询热线:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台州
市椒江区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、108�
��118、198及椒江一金清公交车直达枫南小区,乘坐107、105、109
、112、901、 902公交车到星星广场下车,步行即可到院。
诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,��
�精,无精。包皮包茎,精索静脉曲张,淋病等。
台州五洲生殖医院是台州最大的男科医院,权威专家在线免��
�咨询,拥有专业完善的男科检查治疗设备,严格按照国家标�
��收费。尖端医疗设备,与世界同步。权威专家,成就专业典
范。人性化服务,一切以患者为中心。
看男科就选台州五洲生殖医院,专业男科为男人。
```
-----
Original issue reported on code.google.com by `poweragr...@gmail.com` on 31 May 2014 at 1:11
|
defect
|
台州割包皮包茎哪家专业 台州割包皮包茎哪家专业【台州五洲生殖医院】 询热线 微信号tzwzszyy 医院地址 台州 (枫南大转盘旁)乘车线路 、 � �� 、 , 、 、 、 、 、 ,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 original issue reported on code google com by poweragr gmail com on may at
| 1
|
91,624
| 10,724,325,718
|
IssuesEvent
|
2019-10-28 01:00:28
|
scipy/scipy
|
https://api.github.com/repos/scipy/scipy
|
closed
|
Typo in sp.stats.wilcoxon docstring
|
Documentation scipy.stats
|
The docstring of [sp.stats.wilcoxon](https://docs.scipy.org/doc/scipy/reference/generated/scipy.stats.wilcoxon.html) has a jumbled sentence:
> The one-sided test has the null that the median is positive against the alternative that the it is negative (alternative == 'less'), or vice versa (alternative == 'greater.').
#### Scipy/Numpy/Python version information:
scipy v1.3.1
|
1.0
|
Typo in sp.stats.wilcoxon docstring - The docstring of [sp.stats.wilcoxon](https://docs.scipy.org/doc/scipy/reference/generated/scipy.stats.wilcoxon.html) has a jumbled sentence:
> The one-sided test has the null that the median is positive against the alternative that the it is negative (alternative == 'less'), or vice versa (alternative == 'greater.').
#### Scipy/Numpy/Python version information:
scipy v1.3.1
|
non_defect
|
typo in sp stats wilcoxon docstring the docstring of has a jumbled sentence the one sided test has the null that the median is positive against the alternative that the it is negative alternative less or vice versa alternative greater scipy numpy python version information scipy
| 0
|
15,931
| 2,869,099,552
|
IssuesEvent
|
2015-06-05 23:19:56
|
dart-lang/sdk
|
https://api.github.com/repos/dart-lang/sdk
|
closed
|
Calling toUpperCase on null
|
Area-Pkg Pkg-Unittest Priority-Unassigned Triaged Type-Defect
|
The unittest package is calling the toUpperCase method while formatting test results. In certain situations it ends up with calling toUpperCase on a null object.
See for example the log below from http://build.chromium.org/p/client.dart/builders/vm-arm-sim-debug-be/builds/1098/steps/tests/logs/stdio
FAILED: none-vm debug_simarm pkg/code_transformers/test/resolver_test
Expected: Pass
Actual: RuntimeError
CommandOutput[vm\]:
stdout:
unittest-suite-wait-for-done
ERROR: Resolver should handle empty files
Test timed out after 120 seconds.
PASS: Resolver should update when sources change
PASS: Resolver should follow imports
PASS: Resolver should update changed imports
PASS: Resolver should follow package imports
PASS: Resolver handles missing files
PASS: Resolver should update on changed package imports
PASS: Resolver should handle deleted files
PASS: Resolver should fail on absolute URIs
PASS: Resolver should list all libraries
PASS: Resolver should resolve types and library uris
PASS: Resolver deleted files should be removed
PASS: Resolver handles circular imports
stderr:
Unhandled exception:
The null object does not have a method 'toUpperCase'.
NoSuchMethodError: method not found: 'toUpperCase'
Receiver: null
Arguments: []
#0 Object.noSuchMethod (dart:core-patch/object_patch.dart:45)
#1 SimpleConfiguration.formatResult (package:unittest/src/simple_configuration.dart:134:45)
#2 SimpleConfiguration.onSummary (package:unittest/src/simple_configuration.dart:163:25)
#3 \_completeTests (package:unittest/unittest.dart:570:20)
#4 \_runTest (package:unittest/unittest.dart:520:19)
#5 \_nextTestCase (package:unittest/unittest.dart:450:11)
#6 \_createTimer.<anonymous closure> (dart:async-patch/timer_patch.dart:11)
#7 \_handleTimeout (dart:io/timer_impl.dart:292)
#8 \_handleTimeout (dart:io/timer_impl.dart:301)
#9 \_handleTimeout (dart:io/timer_impl.dart:301)
#10 \_RawReceivePortImpl._handleMessage (dart:isolate-patch/isolate_patch.dart:116)
|
1.0
|
Calling toUpperCase on null - The unittest package is calling the toUpperCase method while formatting test results. In certain situations it ends up with calling toUpperCase on a null object.
See for example the log below from http://build.chromium.org/p/client.dart/builders/vm-arm-sim-debug-be/builds/1098/steps/tests/logs/stdio
FAILED: none-vm debug_simarm pkg/code_transformers/test/resolver_test
Expected: Pass
Actual: RuntimeError
CommandOutput[vm\]:
stdout:
unittest-suite-wait-for-done
ERROR: Resolver should handle empty files
Test timed out after 120 seconds.
PASS: Resolver should update when sources change
PASS: Resolver should follow imports
PASS: Resolver should update changed imports
PASS: Resolver should follow package imports
PASS: Resolver handles missing files
PASS: Resolver should update on changed package imports
PASS: Resolver should handle deleted files
PASS: Resolver should fail on absolute URIs
PASS: Resolver should list all libraries
PASS: Resolver should resolve types and library uris
PASS: Resolver deleted files should be removed
PASS: Resolver handles circular imports
stderr:
Unhandled exception:
The null object does not have a method 'toUpperCase'.
NoSuchMethodError: method not found: 'toUpperCase'
Receiver: null
Arguments: []
#0 Object.noSuchMethod (dart:core-patch/object_patch.dart:45)
#1 SimpleConfiguration.formatResult (package:unittest/src/simple_configuration.dart:134:45)
#2 SimpleConfiguration.onSummary (package:unittest/src/simple_configuration.dart:163:25)
#3 \_completeTests (package:unittest/unittest.dart:570:20)
#4 \_runTest (package:unittest/unittest.dart:520:19)
#5 \_nextTestCase (package:unittest/unittest.dart:450:11)
#6 \_createTimer.<anonymous closure> (dart:async-patch/timer_patch.dart:11)
#7 \_handleTimeout (dart:io/timer_impl.dart:292)
#8 \_handleTimeout (dart:io/timer_impl.dart:301)
#9 \_handleTimeout (dart:io/timer_impl.dart:301)
#10 \_RawReceivePortImpl._handleMessage (dart:isolate-patch/isolate_patch.dart:116)
|
defect
|
calling touppercase on null the unittest package is calling the touppercase method while formatting test results in certain situations it ends up with calling touppercase on a null object see for example the log below from failed none vm debug simarm pkg code transformers test resolver test expected pass actual runtimeerror commandoutput stdout unittest suite wait for done error resolver should handle empty files nbsp nbsp test timed out after seconds pass resolver should update when sources change pass resolver should follow imports pass resolver should update changed imports pass resolver should follow package imports pass resolver handles missing files pass resolver should update on changed package imports pass resolver should handle deleted files pass resolver should fail on absolute uris pass resolver should list all libraries pass resolver should resolve types and library uris pass resolver deleted files should be removed pass resolver handles circular imports stderr unhandled exception the null object does not have a method touppercase nosuchmethoderror method not found touppercase receiver null arguments object nosuchmethod dart core patch object patch dart simpleconfiguration formatresult package unittest src simple configuration dart simpleconfiguration onsummary package unittest src simple configuration dart completetests package unittest unittest dart runtest package unittest unittest dart nexttestcase package unittest unittest dart createtimer lt anonymous closure gt dart async patch timer patch dart handletimeout dart io timer impl dart handletimeout dart io timer impl dart handletimeout dart io timer impl dart rawreceiveportimpl handlemessage dart isolate patch isolate patch dart
| 1
|
33,699
| 7,198,582,128
|
IssuesEvent
|
2018-02-05 13:22:05
|
ShaikASK/Testing
|
https://api.github.com/repos/ShaikASK/Testing
|
opened
|
Intro page::Safari::Header section content is being overlapping with the background image
|
Defect P1 SumFive Team
|
Steps To Replicate :
1. Launch the url :
2. Login as HR Admin user
3. Navigate to 'Settings' menu
4. Select "Intro Page" from the menu options
5. Click on add (+)
6. Select an option / any company name from the dropdown list
7. Click on 'Edit' option displayed in logo section
8. Provide full length content of the field in 'Header' section Popup window is displayed
9. click on save button
Experienced Behavior : Observed that Header section content is being overlapping with the background image
Expected Behavior : Ensure that user provided content should not get overlapped.
|
1.0
|
Intro page::Safari::Header section content is being overlapping with the background image - Steps To Replicate :
1. Launch the url :
2. Login as HR Admin user
3. Navigate to 'Settings' menu
4. Select "Intro Page" from the menu options
5. Click on add (+)
6. Select an option / any company name from the dropdown list
7. Click on 'Edit' option displayed in logo section
8. Provide full length content of the field in 'Header' section Popup window is displayed
9. click on save button
Experienced Behavior : Observed that Header section content is being overlapping with the background image
Expected Behavior : Ensure that user provided content should not get overlapped.
|
defect
|
intro page safari header section content is being overlapping with the background image steps to replicate launch the url login as hr admin user navigate to settings menu select intro page from the menu options click on add select an option any company name from the dropdown list click on edit option displayed in logo section provide full length content of the field in header section popup window is displayed click on save button experienced behavior observed that header section content is being overlapping with the background image expected behavior ensure that user provided content should not get overlapped
| 1
|
47,691
| 13,066,101,116
|
IssuesEvent
|
2020-07-30 20:59:58
|
icecube-trac/tix2
|
https://api.github.com/repos/icecube-trac/tix2
|
closed
|
[sim-services] Documentation is horrible (Trac #998)
|
Migrated from Trac combo simulation defect
|
Most modules are not documented at all. This needs to be fixed before the next release.
Migrated from https://code.icecube.wisc.edu/ticket/998
```json
{
"status": "closed",
"changetime": "2016-03-18T21:14:03",
"description": "Most modules are not documented at all. This needs to be fixed before the next release.",
"reporter": "olivas",
"cc": "",
"resolution": "fixed",
"_ts": "1458335643235016",
"component": "combo simulation",
"summary": "[sim-services] Documentation is horrible",
"priority": "blocker",
"keywords": "",
"time": "2015-05-26T21:32:53",
"milestone": "",
"owner": "olivas",
"type": "defect"
}
```
|
1.0
|
[sim-services] Documentation is horrible (Trac #998) - Most modules are not documented at all. This needs to be fixed before the next release.
Migrated from https://code.icecube.wisc.edu/ticket/998
```json
{
"status": "closed",
"changetime": "2016-03-18T21:14:03",
"description": "Most modules are not documented at all. This needs to be fixed before the next release.",
"reporter": "olivas",
"cc": "",
"resolution": "fixed",
"_ts": "1458335643235016",
"component": "combo simulation",
"summary": "[sim-services] Documentation is horrible",
"priority": "blocker",
"keywords": "",
"time": "2015-05-26T21:32:53",
"milestone": "",
"owner": "olivas",
"type": "defect"
}
```
|
defect
|
documentation is horrible trac most modules are not documented at all this needs to be fixed before the next release migrated from json status closed changetime description most modules are not documented at all this needs to be fixed before the next release reporter olivas cc resolution fixed ts component combo simulation summary documentation is horrible priority blocker keywords time milestone owner olivas type defect
| 1
|
6,324
| 3,010,620,560
|
IssuesEvent
|
2015-07-28 14:08:49
|
JuliaFEM/JuliaFEM.jl
|
https://api.github.com/repos/JuliaFEM/JuliaFEM.jl
|
closed
|
juliafem.org icon
|
documentation
|
Hi,
We would need to add this code to our html page:
```html
<link rel="icon" type="image/png" href="https://github.com/JuliaFEM/JuliaFEM.jl/blob/master/docs/logo/JuliaFEMLogo_32x32.png" sizes="32x32" />
<link rel="icon" type="image/png" href="https://github.com/JuliaFEM/JuliaFEM.jl/blob/master/docs/logo/JuliaFEMLogo_16x16.png" sizes="16x16" />
```
Of course you can replace the full path with a relative path as well, if you know the relative path. This would change the kapsi logo to juliafem logo in your browser tab.
|
1.0
|
juliafem.org icon - Hi,
We would need to add this code to our html page:
```html
<link rel="icon" type="image/png" href="https://github.com/JuliaFEM/JuliaFEM.jl/blob/master/docs/logo/JuliaFEMLogo_32x32.png" sizes="32x32" />
<link rel="icon" type="image/png" href="https://github.com/JuliaFEM/JuliaFEM.jl/blob/master/docs/logo/JuliaFEMLogo_16x16.png" sizes="16x16" />
```
Of course you can replace the full path with a relative path as well, if you know the relative path. This would change the kapsi logo to juliafem logo in your browser tab.
|
non_defect
|
juliafem org icon hi we would need to add this code to our html page html of course you can replace the full path with a relative path as well if you know the relative path this would change the kapsi logo to juliafem logo in your browser tab
| 0
|
15,109
| 3,925,347,361
|
IssuesEvent
|
2016-04-22 18:36:49
|
diana-hep/carl
|
https://api.github.com/repos/diana-hep/carl
|
opened
|
Notebook: probability calibration
|
Documentation Enhancement
|
Would nice to add a notebook illustrating the usage of `CalibratedClassifierCV`.
|
1.0
|
Notebook: probability calibration - Would nice to add a notebook illustrating the usage of `CalibratedClassifierCV`.
|
non_defect
|
notebook probability calibration would nice to add a notebook illustrating the usage of calibratedclassifiercv
| 0
|
10,816
| 2,622,191,447
|
IssuesEvent
|
2015-03-04 00:23:15
|
byzhang/cudpp
|
https://api.github.com/repos/byzhang/cudpp
|
closed
|
cudpp1.1.1 with cuda3.1 on ubuntu9.10 ../cudpp/make takes a long long time
|
auto-migrated Priority-Medium Type-Defect
|
```
What steps will reproduce the problem?
1.download and install cuda 3.1 (first the driver-> toolkit ->sdk) on ubuntu
9.10
2.compile sdk
3.download cudpp1.1.1 and place in /usr/local/cudpp (cuda is in /usr/local/cuda
and sdk is in /usr/local/cuda/sdk)
4. go to /usr/local/cudpp/common/ and type make and then enter libcutil.a is
successfully formed.
5. go to ../cudpp as suggested on (http://vietnamen.org/forcu/?p=1400&lang=en)
and then type make again and press enter
What is the expected output? What do you see instead?
The command prompt never returns from this make when the expected output is
that cudpp should be compiled in some time. NO response at all comes out of
make.
I find it very strange, please suggest what i have done wrong in these steps?
(by the way i also changed the /lb to /lib64 in the common.mk files in cudpp
since i have a 64 bit system)
My sdk works fine and i can also compile and run cuda programs successfully.
Please help me out.
regards and thanks in advance
rohit
What version of the product are you using? On what operating system?
Please provide any additional information below.
```
Original issue reported on code.google.com by `itabhiya...@gmail.com` on 13 Sep 2010 at 12:48
|
1.0
|
cudpp1.1.1 with cuda3.1 on ubuntu9.10 ../cudpp/make takes a long long time - ```
What steps will reproduce the problem?
1.download and install cuda 3.1 (first the driver-> toolkit ->sdk) on ubuntu
9.10
2.compile sdk
3.download cudpp1.1.1 and place in /usr/local/cudpp (cuda is in /usr/local/cuda
and sdk is in /usr/local/cuda/sdk)
4. go to /usr/local/cudpp/common/ and type make and then enter libcutil.a is
successfully formed.
5. go to ../cudpp as suggested on (http://vietnamen.org/forcu/?p=1400&lang=en)
and then type make again and press enter
What is the expected output? What do you see instead?
The command prompt never returns from this make when the expected output is
that cudpp should be compiled in some time. NO response at all comes out of
make.
I find it very strange, please suggest what i have done wrong in these steps?
(by the way i also changed the /lb to /lib64 in the common.mk files in cudpp
since i have a 64 bit system)
My sdk works fine and i can also compile and run cuda programs successfully.
Please help me out.
regards and thanks in advance
rohit
What version of the product are you using? On what operating system?
Please provide any additional information below.
```
Original issue reported on code.google.com by `itabhiya...@gmail.com` on 13 Sep 2010 at 12:48
|
defect
|
with on cudpp make takes a long long time what steps will reproduce the problem download and install cuda first the driver toolkit sdk on ubuntu compile sdk download and place in usr local cudpp cuda is in usr local cuda and sdk is in usr local cuda sdk go to usr local cudpp common and type make and then enter libcutil a is successfully formed go to cudpp as suggested on and then type make again and press enter what is the expected output what do you see instead the command prompt never returns from this make when the expected output is that cudpp should be compiled in some time no response at all comes out of make i find it very strange please suggest what i have done wrong in these steps by the way i also changed the lb to in the common mk files in cudpp since i have a bit system my sdk works fine and i can also compile and run cuda programs successfully please help me out regards and thanks in advance rohit what version of the product are you using on what operating system please provide any additional information below original issue reported on code google com by itabhiya gmail com on sep at
| 1
|
20,188
| 3,314,629,930
|
IssuesEvent
|
2015-11-06 06:55:02
|
yinheli/lightweight-java-profiler
|
https://api.github.com/repos/yinheli/lightweight-java-profiler
|
closed
|
Wrong stacktraces are returned for complex interface structures.
|
auto-migrated Priority-Medium Type-Defect
|
```
What steps will reproduce the problem?
1. In globals.h, change the kNumInterrupts to 30, and the kMaxStackTraces to
30000 (to make sure there will be enough space to record the whole execution)
2. Run the attached java file
3. Look for all List1.writeInt stack traces. One of those comes from a
computeList2 method, which should never happen.
To spot it more easily, use the following command :
$> pcregrep -Mn "List1\.writeInt(.*\n){5}.*List2" filename
What is the expected output? What do you see instead?
Expected : The List1.writeInt method is only called by the computeList1 method.
Actual : Some stacktraces show the computeList2 method as calling
List1.writeInt.
What version of the product are you using? On what operating system?
openjdk7u25, on RedHat 6.4.
Additional informations:
I will be working on a simplier version of the java class that reproduces the
bug, if possible.
```
Original issue reported on code.google.com by `alexandr...@gmail.com` on 31 Jul 2013 at 8:05
Attachments:
* [NestedInterface.java](https://storage.googleapis.com/google-code-attachments/lightweight-java-profiler/issue-1/comment-0/NestedInterface.java)
|
1.0
|
Wrong stacktraces are returned for complex interface structures. - ```
What steps will reproduce the problem?
1. In globals.h, change the kNumInterrupts to 30, and the kMaxStackTraces to
30000 (to make sure there will be enough space to record the whole execution)
2. Run the attached java file
3. Look for all List1.writeInt stack traces. One of those comes from a
computeList2 method, which should never happen.
To spot it more easily, use the following command :
$> pcregrep -Mn "List1\.writeInt(.*\n){5}.*List2" filename
What is the expected output? What do you see instead?
Expected : The List1.writeInt method is only called by the computeList1 method.
Actual : Some stacktraces show the computeList2 method as calling
List1.writeInt.
What version of the product are you using? On what operating system?
openjdk7u25, on RedHat 6.4.
Additional informations:
I will be working on a simplier version of the java class that reproduces the
bug, if possible.
```
Original issue reported on code.google.com by `alexandr...@gmail.com` on 31 Jul 2013 at 8:05
Attachments:
* [NestedInterface.java](https://storage.googleapis.com/google-code-attachments/lightweight-java-profiler/issue-1/comment-0/NestedInterface.java)
|
defect
|
wrong stacktraces are returned for complex interface structures what steps will reproduce the problem in globals h change the knuminterrupts to and the kmaxstacktraces to to make sure there will be enough space to record the whole execution run the attached java file look for all writeint stack traces one of those comes from a method which should never happen to spot it more easily use the following command pcregrep mn writeint n filename what is the expected output what do you see instead expected the writeint method is only called by the method actual some stacktraces show the method as calling writeint what version of the product are you using on what operating system on redhat additional informations i will be working on a simplier version of the java class that reproduces the bug if possible original issue reported on code google com by alexandr gmail com on jul at attachments
| 1
|
330,533
| 10,043,918,741
|
IssuesEvent
|
2019-07-19 08:45:46
|
OpenNebula/one
|
https://api.github.com/repos/OpenNebula/one
|
opened
|
Add new command for create/recreate FTS index for VM searching
|
Category: CLI Priority: Normal Status: Accepted Type: Feature
|
**Description**
It will be useful to have a command (e.g `onedb recreate-index`) for create/recreate the FTS index either for maintenance proposes or in case a DB that didn't support this feature get updated and start to support it.
**Use case**
- Facilitate DB maintenance task.
- Help to add the index in case it doesn't exists (e.g update DB from a non supported version to a supported one)
**Interface Changes**
Add new option to onedb command at the CLI
<!--////////////////////////////////////////////-->
<!-- THIS SECTION IS FOR THE DEVELOPMENT TEAM -->
<!-- BOTH FOR BUGS AND ENHANCEMENT REQUESTS -->
<!-- PROGRESS WILL BE REFLECTED HERE -->
<!--////////////////////////////////////////////-->
## Progress Status
- [ ] Branch created
- [ ] Code committed to development branch
- [ ] Testing - QA
- [ ] Documentation
- [ ] Release notes - resolved issues, compatibility, known issues
- [ ] Code committed to upstream release/hotfix branches
- [ ] Documentation committed to upstream release/hotfix branches
|
1.0
|
Add new command for create/recreate FTS index for VM searching - **Description**
It will be useful to have a command (e.g `onedb recreate-index`) for create/recreate the FTS index either for maintenance proposes or in case a DB that didn't support this feature get updated and start to support it.
**Use case**
- Facilitate DB maintenance task.
- Help to add the index in case it doesn't exists (e.g update DB from a non supported version to a supported one)
**Interface Changes**
Add new option to onedb command at the CLI
<!--////////////////////////////////////////////-->
<!-- THIS SECTION IS FOR THE DEVELOPMENT TEAM -->
<!-- BOTH FOR BUGS AND ENHANCEMENT REQUESTS -->
<!-- PROGRESS WILL BE REFLECTED HERE -->
<!--////////////////////////////////////////////-->
## Progress Status
- [ ] Branch created
- [ ] Code committed to development branch
- [ ] Testing - QA
- [ ] Documentation
- [ ] Release notes - resolved issues, compatibility, known issues
- [ ] Code committed to upstream release/hotfix branches
- [ ] Documentation committed to upstream release/hotfix branches
|
non_defect
|
add new command for create recreate fts index for vm searching description it will be useful to have a command e g onedb recreate index for create recreate the fts index either for maintenance proposes or in case a db that didn t support this feature get updated and start to support it use case facilitate db maintenance task help to add the index in case it doesn t exists e g update db from a non supported version to a supported one interface changes add new option to onedb command at the cli progress status branch created code committed to development branch testing qa documentation release notes resolved issues compatibility known issues code committed to upstream release hotfix branches documentation committed to upstream release hotfix branches
| 0
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.