Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
757
labels
stringlengths
4
664
body
stringlengths
3
261k
index
stringclasses
10 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
232k
binary_label
int64
0
1
3,839
2,610,069,934
IssuesEvent
2015-02-26 18:20:31
chrsmith/jsjsj122
https://api.github.com/repos/chrsmith/jsjsj122
opened
台州割包茎去哪家医院好
auto-migrated Priority-Medium Type-Defect
``` 台州割包茎去哪家医院好【台州五洲生殖医院】24小时健康咨 询热线:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台州 市椒江区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、108� ��118、198及椒江一金清公交车直达枫南小区,乘坐107、105、109 、112、901、 902公交车到星星广场下车,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 ``` ----- Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 11:51
1.0
台州割包茎去哪家医院好 - ``` 台州割包茎去哪家医院好【台州五洲生殖医院】24小时健康咨 询热线:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台州 市椒江区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、108� ��118、198及椒江一金清公交车直达枫南小区,乘坐107、105、109 、112、901、 902公交车到星星广场下车,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 ``` ----- Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 11:51
defect
台州割包茎去哪家医院好 台州割包茎去哪家医院好【台州五洲生殖医院】 询热线 微信号tzwzszyy 医院地址 台州 (枫南大转盘旁)乘车线路 、 � �� 、 , 、 、 、 、 、 ,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 original issue reported on code google com by poweragr gmail com on may at
1
640,988
20,814,528,990
IssuesEvent
2022-03-18 08:46:18
ASE-Projekte-WS-2021/ase-ws-21-unser-horsaal
https://api.github.com/repos/ASE-Projekte-WS-2021/ase-ws-21-unser-horsaal
closed
(Registrierung) DialogFragment statt AlertDialog für den Emailverifikationsdialog
Medium Priority
- [x] Alert Dialog in ein DialogFragment umwandeln.
1.0
(Registrierung) DialogFragment statt AlertDialog für den Emailverifikationsdialog - - [x] Alert Dialog in ein DialogFragment umwandeln.
non_defect
registrierung dialogfragment statt alertdialog für den emailverifikationsdialog alert dialog in ein dialogfragment umwandeln
0
349,504
10,470,530,840
IssuesEvent
2019-09-23 04:11:52
BCcampus/edehr
https://api.github.com/repos/BCcampus/edehr
opened
MAR - "Take as needed" medications need a form to be filled in when a patient takes the medication
Epic - Functionality Priority - High ~Bug
## User story As a student user, I want to be able to enter details around when a PRN (take as needed) medication is administered to a patient Because it needs to be documented in the same way as a prescribed medication on a set timeline. ## Description All medications need the MAR modal form whether they are on a schedule, as needed, stat, or once ## Expected behaviour/Acceptance criteria - List of available medications (not included in the scheduled section) for the day and their schedule is presented at the top of the "Today" tab above the table. - User can click on a "Add MAR" button to launch a modal - User can select which medication they want to administer from a select box.
1.0
MAR - "Take as needed" medications need a form to be filled in when a patient takes the medication - ## User story As a student user, I want to be able to enter details around when a PRN (take as needed) medication is administered to a patient Because it needs to be documented in the same way as a prescribed medication on a set timeline. ## Description All medications need the MAR modal form whether they are on a schedule, as needed, stat, or once ## Expected behaviour/Acceptance criteria - List of available medications (not included in the scheduled section) for the day and their schedule is presented at the top of the "Today" tab above the table. - User can click on a "Add MAR" button to launch a modal - User can select which medication they want to administer from a select box.
non_defect
mar take as needed medications need a form to be filled in when a patient takes the medication user story as a student user i want to be able to enter details around when a prn take as needed medication is administered to a patient because it needs to be documented in the same way as a prescribed medication on a set timeline description all medications need the mar modal form whether they are on a schedule as needed stat or once expected behaviour acceptance criteria list of available medications not included in the scheduled section for the day and their schedule is presented at the top of the today tab above the table user can click on a add mar button to launch a modal user can select which medication they want to administer from a select box
0
22,548
3,665,366,796
IssuesEvent
2016-02-19 15:49:10
dart-lang/sdk
https://api.github.com/repos/dart-lang/sdk
opened
NodeReplacer fails when repplacing a comment in a variable declaration list
analyzer-stability area-analyzer priority-high Type-Defect
[5932101] ERROR - yzer.DartAnalysisServerService - Dart analysis server, SDK version 1.15.0-dev.2.0, server version 1.14.0, error: Failure in incremental resolver IllegalArgumentException: The old node is not a child of it's parent null #0 NodeReplacer.visitNode (package:analyzer/src/dart/ast/utilities.dart:4649) #1 NodeReplacer.visitVariableDeclarationList (package:analyzer/src/dart/ast/utilities.dart:4952) #2 VariableDeclarationListImpl.accept (package:analyzer/src/dart/ast/ast.dart:10546) #3 NodeReplacer.replace (package:analyzer/src/dart/ast/utilities.dart:5025) #4 PoorMansIncrementalResolver._resolveCommentDoc (package:analyzer/src/generated/incremental_resolver.dart:1657) #5 PoorMansIncrementalResolver.resolve (package:analyzer/src/generated/incremental_resolver.dart:1444) #6 AnalysisContextImpl._tryPoorMansIncrementalResolution.<anonymous closure> (package:analyzer/src/context/context.dart:1883) #7 _PerformanceTagImpl.makeCurrentWhile (package:analyzer/src/generated/utilities_general.dart:194) #8 AnalysisContextImpl._tryPoorMansIncrementalResolution (package:analyzer/src/context/context.dart:1842) #9 AnalysisContextImpl.handleContentsChanged (package:analyzer/src/context/context.dart:1018) #10 AnalysisServer.updateContent.<anonymous closure>.<anonymous closure> (package:analysis_server/src/analysis_server.dart:1241) #11 List.forEach (dart:core-patch/growable_array.dart:233) #12 AnalysisServer.updateContent.<anonymous closure> (package:analysis_server/src/analysis_server.dart:1239) #13 _HashVMBase&MapMixin&&_LinkedHashMapMixin.forEach (dart:collection-patch/compact_hash.dart:340) #14 AnalysisServer.updateContent (package:analysis_server/src/analysis_server.dart:1192) #15 AnalysisDomainHandler.updateContent (package:analysis_server/src/domain_analysis.dart:305) #16 AnalysisDomainHandler.handleRequest (package:analysis_server/src/domain_analysis.dart:211) #17 AnalysisServer.handleRequest.<anonymous closure>.<anonymous closure> (package:analysis_server/src/analysis_server.dart:692) #18 _PerformanceTagImpl.makeCurrentWhile (package:analyzer/src/generated/utilities_general.dart:194) #19 AnalysisServer.handleRequest.<anonymous closure> (package:analysis_server/src/analysis_server.dart:688) #20 _rootRun (dart:async/zone.dart:895) #21 _CustomZone.run (dart:async/zone.dart:790) #22 _CustomZone.runGuarded (dart:async/zone.dart:696) #23 runZoned (dart:async/zone.dart:1231) #24 AnalysisServer.handleRequest (package:analysis_server/src/analysis_server.dart:687) #25 ByteStreamServerChannel._readRequest.<anonymous closure> (package:analysis_server/src/channel/byte_stream_channel.dart:169) #26 _PerformanceTagImpl.makeCurrentWhile (package:analyzer/src/generated/utilities_general.dart:194) #27 ByteStreamServerChannel._readRequest (package:analysis_server/src/channel/byte_stream_channel.dart:160) #28 ByteStreamServerChannel.listen.<anonymous closure> (package:analysis_server/src/channel/byte_stream_channel.dart:109) #29 _rootRunUnary (dart:async/zone.dart:902) #30 _CustomZone.runUnary (dart:async/zone.dart:798)
1.0
NodeReplacer fails when repplacing a comment in a variable declaration list - [5932101] ERROR - yzer.DartAnalysisServerService - Dart analysis server, SDK version 1.15.0-dev.2.0, server version 1.14.0, error: Failure in incremental resolver IllegalArgumentException: The old node is not a child of it's parent null #0 NodeReplacer.visitNode (package:analyzer/src/dart/ast/utilities.dart:4649) #1 NodeReplacer.visitVariableDeclarationList (package:analyzer/src/dart/ast/utilities.dart:4952) #2 VariableDeclarationListImpl.accept (package:analyzer/src/dart/ast/ast.dart:10546) #3 NodeReplacer.replace (package:analyzer/src/dart/ast/utilities.dart:5025) #4 PoorMansIncrementalResolver._resolveCommentDoc (package:analyzer/src/generated/incremental_resolver.dart:1657) #5 PoorMansIncrementalResolver.resolve (package:analyzer/src/generated/incremental_resolver.dart:1444) #6 AnalysisContextImpl._tryPoorMansIncrementalResolution.<anonymous closure> (package:analyzer/src/context/context.dart:1883) #7 _PerformanceTagImpl.makeCurrentWhile (package:analyzer/src/generated/utilities_general.dart:194) #8 AnalysisContextImpl._tryPoorMansIncrementalResolution (package:analyzer/src/context/context.dart:1842) #9 AnalysisContextImpl.handleContentsChanged (package:analyzer/src/context/context.dart:1018) #10 AnalysisServer.updateContent.<anonymous closure>.<anonymous closure> (package:analysis_server/src/analysis_server.dart:1241) #11 List.forEach (dart:core-patch/growable_array.dart:233) #12 AnalysisServer.updateContent.<anonymous closure> (package:analysis_server/src/analysis_server.dart:1239) #13 _HashVMBase&MapMixin&&_LinkedHashMapMixin.forEach (dart:collection-patch/compact_hash.dart:340) #14 AnalysisServer.updateContent (package:analysis_server/src/analysis_server.dart:1192) #15 AnalysisDomainHandler.updateContent (package:analysis_server/src/domain_analysis.dart:305) #16 AnalysisDomainHandler.handleRequest (package:analysis_server/src/domain_analysis.dart:211) #17 AnalysisServer.handleRequest.<anonymous closure>.<anonymous closure> (package:analysis_server/src/analysis_server.dart:692) #18 _PerformanceTagImpl.makeCurrentWhile (package:analyzer/src/generated/utilities_general.dart:194) #19 AnalysisServer.handleRequest.<anonymous closure> (package:analysis_server/src/analysis_server.dart:688) #20 _rootRun (dart:async/zone.dart:895) #21 _CustomZone.run (dart:async/zone.dart:790) #22 _CustomZone.runGuarded (dart:async/zone.dart:696) #23 runZoned (dart:async/zone.dart:1231) #24 AnalysisServer.handleRequest (package:analysis_server/src/analysis_server.dart:687) #25 ByteStreamServerChannel._readRequest.<anonymous closure> (package:analysis_server/src/channel/byte_stream_channel.dart:169) #26 _PerformanceTagImpl.makeCurrentWhile (package:analyzer/src/generated/utilities_general.dart:194) #27 ByteStreamServerChannel._readRequest (package:analysis_server/src/channel/byte_stream_channel.dart:160) #28 ByteStreamServerChannel.listen.<anonymous closure> (package:analysis_server/src/channel/byte_stream_channel.dart:109) #29 _rootRunUnary (dart:async/zone.dart:902) #30 _CustomZone.runUnary (dart:async/zone.dart:798)
defect
nodereplacer fails when repplacing a comment in a variable declaration list error yzer dartanalysisserverservice dart analysis server sdk version dev server version error failure in incremental resolver illegalargumentexception the old node is not a child of it s parent null nodereplacer visitnode package analyzer src dart ast utilities dart nodereplacer visitvariabledeclarationlist package analyzer src dart ast utilities dart variabledeclarationlistimpl accept package analyzer src dart ast ast dart nodereplacer replace package analyzer src dart ast utilities dart poormansincrementalresolver resolvecommentdoc package analyzer src generated incremental resolver dart poormansincrementalresolver resolve package analyzer src generated incremental resolver dart analysiscontextimpl trypoormansincrementalresolution package analyzer src context context dart performancetagimpl makecurrentwhile package analyzer src generated utilities general dart analysiscontextimpl trypoormansincrementalresolution package analyzer src context context dart analysiscontextimpl handlecontentschanged package analyzer src context context dart analysisserver updatecontent package analysis server src analysis server dart list foreach dart core patch growable array dart analysisserver updatecontent package analysis server src analysis server dart hashvmbase mapmixin linkedhashmapmixin foreach dart collection patch compact hash dart analysisserver updatecontent package analysis server src analysis server dart analysisdomainhandler updatecontent package analysis server src domain analysis dart analysisdomainhandler handlerequest package analysis server src domain analysis dart analysisserver handlerequest package analysis server src analysis server dart performancetagimpl makecurrentwhile package analyzer src generated utilities general dart analysisserver handlerequest package analysis server src analysis server dart rootrun dart async zone dart customzone run dart async zone dart customzone runguarded dart async zone dart runzoned dart async zone dart analysisserver handlerequest package analysis server src analysis server dart bytestreamserverchannel readrequest package analysis server src channel byte stream channel dart performancetagimpl makecurrentwhile package analyzer src generated utilities general dart bytestreamserverchannel readrequest package analysis server src channel byte stream channel dart bytestreamserverchannel listen package analysis server src channel byte stream channel dart rootrununary dart async zone dart customzone rununary dart async zone dart
1
207,044
23,417,133,791
IssuesEvent
2022-08-13 05:31:30
nextgenhealthcare/connect
https://api.github.com/repos/nextgenhealthcare/connect
closed
No longer able to webstart with default security settings on Java 7 update 51
Security
New security requirements are now being enforced in Java 7u51. More information here: https://blogs.oracle.com/java-platform-group/entry/new_security_requirements_for_rias \\ \\ {quote}**Developers:** As of 7u51, (January 14, 2014), your RIAs must be updated. The updates required are on the packaging and distribution; no API code changes should be required. The impetus for these changes relates to potential re-purposing of sandboxed applications, whereby placing permissions within a signed JAR prevents modification of your specified permission level. RIAs must contain two things: Code signatures from a trusted authority. All code for Applets and Web Start applications must be signed, regardless of its Permissions attributes. Manifest Attributes Permissions – Introduced in 7u25, and required as of 7u51. Indicates if the RIA should run within the sandbox or require full-permissions. Codebase – Introduced in 7u25 and optional/encouraged as of 7u51. Points to the known location of the hosted code (e.g. intranet.example.com).{quote} There are a couple of workarounds for this. First, you can add your webstart URL to the Exception Site List in the Java security settings (e.g. "http://localhost:8080"). Second, you can turn the security level down from High (the default and minimum recommended level) to Medium. Imported Issue. Original Details: Jira Issue Key: MIRTH-3114 Reporter: narupley Created: 2014-01-15T09:54:25.000-0800
True
No longer able to webstart with default security settings on Java 7 update 51 - New security requirements are now being enforced in Java 7u51. More information here: https://blogs.oracle.com/java-platform-group/entry/new_security_requirements_for_rias \\ \\ {quote}**Developers:** As of 7u51, (January 14, 2014), your RIAs must be updated. The updates required are on the packaging and distribution; no API code changes should be required. The impetus for these changes relates to potential re-purposing of sandboxed applications, whereby placing permissions within a signed JAR prevents modification of your specified permission level. RIAs must contain two things: Code signatures from a trusted authority. All code for Applets and Web Start applications must be signed, regardless of its Permissions attributes. Manifest Attributes Permissions – Introduced in 7u25, and required as of 7u51. Indicates if the RIA should run within the sandbox or require full-permissions. Codebase – Introduced in 7u25 and optional/encouraged as of 7u51. Points to the known location of the hosted code (e.g. intranet.example.com).{quote} There are a couple of workarounds for this. First, you can add your webstart URL to the Exception Site List in the Java security settings (e.g. "http://localhost:8080"). Second, you can turn the security level down from High (the default and minimum recommended level) to Medium. Imported Issue. Original Details: Jira Issue Key: MIRTH-3114 Reporter: narupley Created: 2014-01-15T09:54:25.000-0800
non_defect
no longer able to webstart with default security settings on java update new security requirements are now being enforced in java more information here quote developers as of january your rias must be updated the updates required are on the packaging and distribution no api code changes should be required the impetus for these changes relates to potential re purposing of sandboxed applications whereby placing permissions within a signed jar prevents modification of your specified permission level rias must contain two things code signatures from a trusted authority all code for applets and web start applications must be signed regardless of its permissions attributes manifest attributes permissions – introduced in and required as of indicates if the ria should run within the sandbox or require full permissions codebase – introduced in and optional encouraged as of points to the known location of the hosted code e g intranet example com quote there are a couple of workarounds for this first you can add your webstart url to the exception site list in the java security settings e g second you can turn the security level down from high the default and minimum recommended level to medium imported issue original details jira issue key mirth reporter narupley created
0
58,224
16,441,331,467
IssuesEvent
2021-05-20 14:41:01
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
opened
Checkstyle for master (5.0-SNAPSHOT) failed on Windows
Team: Core Type: Defect
There is a lot of checkstyle failures like `Expected line ending for file is LF(\n), but CRLF(\r\n) is detected. [NewlineAtEndOfFile]` on Windows. It happens for `mvn clean install` command. The job is running with Oracle JDK 8. See: ``` 16:48:05 [ERROR] C:\Jenkins\workspace\Hazelcast-master-Windows-OracleJDK8\hazelcast\src\main\java\com\hazelcast\aggregation\Aggregator.java:1: Expected line ending for file is LF(\n), but CRLF(\r\n) is detected. [NewlineAtEndOfFile] 16:48:05 [ERROR] C:\Jenkins\workspace\Hazelcast-master-Windows-OracleJDK8\hazelcast\src\main\java\com\hazelcast\aggregation\Aggregators.java:1: Expected line ending for file is LF(\n), but CRLF(\r\n) is detected. [NewlineAtEndOfFile] 16:48:05 [ERROR] C:\Jenkins\workspace\Hazelcast-master-Windows-OracleJDK8\hazelcast\src\main\java\com\hazelcast\aggregation\impl\AbstractAggregator.java:1: Expected line ending for file is LF(\n), but CRLF(\r\n) is detected. [NewlineAtEndOfFile] ... 16:48:16 [ERROR] C:\Jenkins\workspace\Hazelcast-master-Windows-OracleJDK8\hazelcast\src\main\resources\jet-runtime.properties:1: Expected line ending for file is LF(\n), but CRLF(\r\n) is detected. [NewlineAtEndOfFile] 16:48:16 Audit done. 16:48:16 [INFO] ------------------------------------------------------------------------ 16:48:16 [INFO] Reactor Summary: 16:48:16 [INFO] 16:48:16 [INFO] Hazelcast Root 5.0-SNAPSHOT ........................ SUCCESS [ 2.879 s] 16:48:16 [INFO] hazelcast .......................................... FAILURE [01:11 min] 16:48:16 [INFO] hazelcast-spring ................................... SKIPPED 16:48:16 [INFO] hazelcast-spring-tests ............................. SKIPPED 16:48:16 [INFO] hazelcast-build-utils .............................. SKIPPED 16:48:16 [INFO] hazelcast-jet-extensions ........................... SKIPPED 16:48:16 [INFO] hazelcast-jet-kafka ................................ SKIPPED 16:48:16 [INFO] hazelcast-jet-avro ................................. SKIPPED 16:48:16 [INFO] hazelcast-jet-csv .................................. SKIPPED 16:48:16 [INFO] hazelcast-jet-hadoop-core .......................... SKIPPED 16:48:16 [INFO] hazelcast-sql ...................................... SKIPPED 16:48:16 [INFO] hazelcast-all ...................................... SKIPPED 16:48:16 [INFO] hazelcast-jet-cdc-debezium ......................... SKIPPED 16:48:16 [INFO] hazelcast-jet-cdc-mysql ............................ SKIPPED 16:48:16 [INFO] hazelcast-jet-cdc-postgres ......................... SKIPPED 16:48:16 [INFO] hazelcast-jet-elasticsearch-5 ...................... SKIPPED 16:48:16 [INFO] hazelcast-jet-elasticsearch-6 ...................... SKIPPED 16:48:16 [INFO] hazelcast-jet-elasticsearch-7 ...................... SKIPPED 16:48:16 [INFO] hazelcast-jet-grpc ................................. SKIPPED 16:48:16 [INFO] hazelcast-jet-hadoop-dist .......................... SKIPPED 16:48:16 [INFO] hazelcast-jet-files-azure .......................... SKIPPED 16:48:16 [INFO] hazelcast-jet-files-gcs ............................ SKIPPED 16:48:16 [INFO] hazelcast-jet-files-s3 ............................. SKIPPED 16:48:16 [INFO] hazelcast-jet-hadoop ............................... SKIPPED 16:48:16 [INFO] hazelcast-jet-hadoop-all ........................... SKIPPED 16:48:16 [INFO] hazelcast-jet-kinesis .............................. SKIPPED 16:48:16 [INFO] hazelcast-jet-protobuf ............................. SKIPPED 16:48:16 [INFO] hazelcast-jet-python ............................... SKIPPED 16:48:16 [INFO] hazelcast-jet-s3 ................................... SKIPPED 16:48:16 [INFO] hazelcast-distribution 5.0-SNAPSHOT ................ SKIPPED 16:48:16 [INFO] ------------------------------------------------------------------------ 16:48:16 [INFO] BUILD FAILURE 16:48:16 [INFO] ------------------------------------------------------------------------ 16:48:16 [INFO] Total time: 01:15 min (Wall Clock) 16:48:16 [INFO] Finished at: 2021-05-19T14:48:14Z 16:48:16 [INFO] ------------------------------------------------------------------------ 16:48:16 [ERROR] Failed to execute goal org.apache.maven.plugins:maven-checkstyle-plugin:3.1.1:checkstyle (default) on project hazelcast: An error has occurred in Checkstyle report generation. Failed during checkstyle execution: There are 8944 errors reported by Checkstyle 8.38 with C:\Jenkins\workspace\Hazelcast-master-Windows-OracleJDK8/checkstyle/checkstyle.xml ruleset. -> [Help 1] ```
1.0
Checkstyle for master (5.0-SNAPSHOT) failed on Windows - There is a lot of checkstyle failures like `Expected line ending for file is LF(\n), but CRLF(\r\n) is detected. [NewlineAtEndOfFile]` on Windows. It happens for `mvn clean install` command. The job is running with Oracle JDK 8. See: ``` 16:48:05 [ERROR] C:\Jenkins\workspace\Hazelcast-master-Windows-OracleJDK8\hazelcast\src\main\java\com\hazelcast\aggregation\Aggregator.java:1: Expected line ending for file is LF(\n), but CRLF(\r\n) is detected. [NewlineAtEndOfFile] 16:48:05 [ERROR] C:\Jenkins\workspace\Hazelcast-master-Windows-OracleJDK8\hazelcast\src\main\java\com\hazelcast\aggregation\Aggregators.java:1: Expected line ending for file is LF(\n), but CRLF(\r\n) is detected. [NewlineAtEndOfFile] 16:48:05 [ERROR] C:\Jenkins\workspace\Hazelcast-master-Windows-OracleJDK8\hazelcast\src\main\java\com\hazelcast\aggregation\impl\AbstractAggregator.java:1: Expected line ending for file is LF(\n), but CRLF(\r\n) is detected. [NewlineAtEndOfFile] ... 16:48:16 [ERROR] C:\Jenkins\workspace\Hazelcast-master-Windows-OracleJDK8\hazelcast\src\main\resources\jet-runtime.properties:1: Expected line ending for file is LF(\n), but CRLF(\r\n) is detected. [NewlineAtEndOfFile] 16:48:16 Audit done. 16:48:16 [INFO] ------------------------------------------------------------------------ 16:48:16 [INFO] Reactor Summary: 16:48:16 [INFO] 16:48:16 [INFO] Hazelcast Root 5.0-SNAPSHOT ........................ SUCCESS [ 2.879 s] 16:48:16 [INFO] hazelcast .......................................... FAILURE [01:11 min] 16:48:16 [INFO] hazelcast-spring ................................... SKIPPED 16:48:16 [INFO] hazelcast-spring-tests ............................. SKIPPED 16:48:16 [INFO] hazelcast-build-utils .............................. SKIPPED 16:48:16 [INFO] hazelcast-jet-extensions ........................... SKIPPED 16:48:16 [INFO] hazelcast-jet-kafka ................................ SKIPPED 16:48:16 [INFO] hazelcast-jet-avro ................................. SKIPPED 16:48:16 [INFO] hazelcast-jet-csv .................................. SKIPPED 16:48:16 [INFO] hazelcast-jet-hadoop-core .......................... SKIPPED 16:48:16 [INFO] hazelcast-sql ...................................... SKIPPED 16:48:16 [INFO] hazelcast-all ...................................... SKIPPED 16:48:16 [INFO] hazelcast-jet-cdc-debezium ......................... SKIPPED 16:48:16 [INFO] hazelcast-jet-cdc-mysql ............................ SKIPPED 16:48:16 [INFO] hazelcast-jet-cdc-postgres ......................... SKIPPED 16:48:16 [INFO] hazelcast-jet-elasticsearch-5 ...................... SKIPPED 16:48:16 [INFO] hazelcast-jet-elasticsearch-6 ...................... SKIPPED 16:48:16 [INFO] hazelcast-jet-elasticsearch-7 ...................... SKIPPED 16:48:16 [INFO] hazelcast-jet-grpc ................................. SKIPPED 16:48:16 [INFO] hazelcast-jet-hadoop-dist .......................... SKIPPED 16:48:16 [INFO] hazelcast-jet-files-azure .......................... SKIPPED 16:48:16 [INFO] hazelcast-jet-files-gcs ............................ SKIPPED 16:48:16 [INFO] hazelcast-jet-files-s3 ............................. SKIPPED 16:48:16 [INFO] hazelcast-jet-hadoop ............................... SKIPPED 16:48:16 [INFO] hazelcast-jet-hadoop-all ........................... SKIPPED 16:48:16 [INFO] hazelcast-jet-kinesis .............................. SKIPPED 16:48:16 [INFO] hazelcast-jet-protobuf ............................. SKIPPED 16:48:16 [INFO] hazelcast-jet-python ............................... SKIPPED 16:48:16 [INFO] hazelcast-jet-s3 ................................... SKIPPED 16:48:16 [INFO] hazelcast-distribution 5.0-SNAPSHOT ................ SKIPPED 16:48:16 [INFO] ------------------------------------------------------------------------ 16:48:16 [INFO] BUILD FAILURE 16:48:16 [INFO] ------------------------------------------------------------------------ 16:48:16 [INFO] Total time: 01:15 min (Wall Clock) 16:48:16 [INFO] Finished at: 2021-05-19T14:48:14Z 16:48:16 [INFO] ------------------------------------------------------------------------ 16:48:16 [ERROR] Failed to execute goal org.apache.maven.plugins:maven-checkstyle-plugin:3.1.1:checkstyle (default) on project hazelcast: An error has occurred in Checkstyle report generation. Failed during checkstyle execution: There are 8944 errors reported by Checkstyle 8.38 with C:\Jenkins\workspace\Hazelcast-master-Windows-OracleJDK8/checkstyle/checkstyle.xml ruleset. -> [Help 1] ```
defect
checkstyle for master snapshot failed on windows there is a lot of checkstyle failures like expected line ending for file is lf n but crlf r n is detected on windows it happens for mvn clean install command the job is running with oracle jdk see c jenkins workspace hazelcast master windows hazelcast src main java com hazelcast aggregation aggregator java expected line ending for file is lf n but crlf r n is detected c jenkins workspace hazelcast master windows hazelcast src main java com hazelcast aggregation aggregators java expected line ending for file is lf n but crlf r n is detected c jenkins workspace hazelcast master windows hazelcast src main java com hazelcast aggregation impl abstractaggregator java expected line ending for file is lf n but crlf r n is detected c jenkins workspace hazelcast master windows hazelcast src main resources jet runtime properties expected line ending for file is lf n but crlf r n is detected audit done reactor summary hazelcast root snapshot success hazelcast failure hazelcast spring skipped hazelcast spring tests skipped hazelcast build utils skipped hazelcast jet extensions skipped hazelcast jet kafka skipped hazelcast jet avro skipped hazelcast jet csv skipped hazelcast jet hadoop core skipped hazelcast sql skipped hazelcast all skipped hazelcast jet cdc debezium skipped hazelcast jet cdc mysql skipped hazelcast jet cdc postgres skipped hazelcast jet elasticsearch skipped hazelcast jet elasticsearch skipped hazelcast jet elasticsearch skipped hazelcast jet grpc skipped hazelcast jet hadoop dist skipped hazelcast jet files azure skipped hazelcast jet files gcs skipped hazelcast jet files skipped hazelcast jet hadoop skipped hazelcast jet hadoop all skipped hazelcast jet kinesis skipped hazelcast jet protobuf skipped hazelcast jet python skipped hazelcast jet skipped hazelcast distribution snapshot skipped build failure total time min wall clock finished at failed to execute goal org apache maven plugins maven checkstyle plugin checkstyle default on project hazelcast an error has occurred in checkstyle report generation failed during checkstyle execution there are errors reported by checkstyle with c jenkins workspace hazelcast master windows checkstyle checkstyle xml ruleset
1
96,043
27,731,551,821
IssuesEvent
2023-03-15 08:25:46
SPauly/Minimum-gRPC-ImGUI-ClientServerTEMPLATE
https://api.github.com/repos/SPauly/Minimum-gRPC-ImGUI-ClientServerTEMPLATE
opened
Better support for external gRPC
enhancement help wanted build system
There have been some issues trying to use external gRPC sources since the file structure (e.g. all the dependency directories) is different from the created one when building gRPC with all the dependencies from source. Also, there is a difference with statically and dynamically linked libraries. -> this needs some further research.
1.0
Better support for external gRPC - There have been some issues trying to use external gRPC sources since the file structure (e.g. all the dependency directories) is different from the created one when building gRPC with all the dependencies from source. Also, there is a difference with statically and dynamically linked libraries. -> this needs some further research.
non_defect
better support for external grpc there have been some issues trying to use external grpc sources since the file structure e g all the dependency directories is different from the created one when building grpc with all the dependencies from source also there is a difference with statically and dynamically linked libraries this needs some further research
0
32,930
27,094,491,901
IssuesEvent
2023-02-15 00:53:37
APSIMInitiative/ApsimX
https://api.github.com/repos/APSIMInitiative/ApsimX
closed
error in soil module
bug interface/infrastructure
I have been having an issue with the soil model after all versions APSIMX #2022.9.**7080** to #2022.9.**7088** I am working on a sugarcane simulation. I have all values in the soil module changing to very high numbers (with so many "zeros") after I open the soil module the first time. Figure 1. When I open the soil module for the first time ![Imagem2](https://user-images.githubusercontent.com/66262573/192393182-2863b644-9d9e-429e-b5c5-df0dac9cc8e6.png) Figure 2. After I open the soil module a second time (just click again): ![Imagem3](https://user-images.githubusercontent.com/66262573/192393199-6e2d9b74-91a9-4fb8-9254-cb0ddd3679c1.png) And additionally, when I copy and paste the soil module between different APSIMX files the same issue occurs. I tried many things, like using the soil module of the sugarcane example file (and other crop simulations example files), but I couldn't fix them. I tried the 2022.9.7083 (issue in the soil file), but the same issue happen. Thank you in advance if someone could help me.
1.0
error in soil module - I have been having an issue with the soil model after all versions APSIMX #2022.9.**7080** to #2022.9.**7088** I am working on a sugarcane simulation. I have all values in the soil module changing to very high numbers (with so many "zeros") after I open the soil module the first time. Figure 1. When I open the soil module for the first time ![Imagem2](https://user-images.githubusercontent.com/66262573/192393182-2863b644-9d9e-429e-b5c5-df0dac9cc8e6.png) Figure 2. After I open the soil module a second time (just click again): ![Imagem3](https://user-images.githubusercontent.com/66262573/192393199-6e2d9b74-91a9-4fb8-9254-cb0ddd3679c1.png) And additionally, when I copy and paste the soil module between different APSIMX files the same issue occurs. I tried many things, like using the soil module of the sugarcane example file (and other crop simulations example files), but I couldn't fix them. I tried the 2022.9.7083 (issue in the soil file), but the same issue happen. Thank you in advance if someone could help me.
non_defect
error in soil module i have been having an issue with the soil model after all versions apsimx to i am working on a sugarcane simulation i have all values in the soil module changing to very high numbers with so many zeros after i open the soil module the first time figure when i open the soil module for the first time figure after i open the soil module a second time just click again and additionally when i copy and paste the soil module between different apsimx files the same issue occurs i tried many things like using the soil module of the sugarcane example file and other crop simulations example files but i couldn t fix them i tried the issue in the soil file but the same issue happen thank you in advance if someone could help me
0
22,734
2,650,779,135
IssuesEvent
2015-03-16 04:30:49
cs2103jan2015-t11-2c/main
https://api.github.com/repos/cs2103jan2015-t11-2c/main
closed
DataStore: Add new Category
priority.medium type.enhancement type.task
_From @limtheckyee on March 11, 2015 8:59_ _Copied from original issue: jasqxl/cs2103jan2015-t11-2c#32_
1.0
DataStore: Add new Category - _From @limtheckyee on March 11, 2015 8:59_ _Copied from original issue: jasqxl/cs2103jan2015-t11-2c#32_
non_defect
datastore add new category from limtheckyee on march copied from original issue jasqxl
0
117,545
11,949,621,750
IssuesEvent
2020-04-03 13:56:53
assemblee-virtuelle/semapps
https://api.github.com/repos/assemblee-virtuelle/semapps
opened
Ma première !
documentation easy
Merci à Sébastien pour la formation... et la hotline ! ;-) Merci à Guillaume pour son enthousiasme et sa constance ! 👍 Merci à Pierre de m'avoir appelé ! 👍
1.0
Ma première ! - Merci à Sébastien pour la formation... et la hotline ! ;-) Merci à Guillaume pour son enthousiasme et sa constance ! 👍 Merci à Pierre de m'avoir appelé ! 👍
non_defect
ma première merci à sébastien pour la formation et la hotline merci à guillaume pour son enthousiasme et sa constance 👍 merci à pierre de m avoir appelé 👍
0
24,425
3,975,628,487
IssuesEvent
2016-05-05 06:53:04
scipy/scipy
https://api.github.com/repos/scipy/scipy
closed
mannwhitneyu breaks backward compatibility in 0.17.0
defect scipy.stats
I recently found that `mannwhitneyu` changed from a one-sided to two-sided test, by default, in `0.17.0`. I see that [this](https://github.com/scipy/scipy/pull/6034) PR cleaned up the documentation a bit to clarify the change. However, my understanding from [this](https://github.com/scipy/scipy/pull/4933) thread is that `mannwhitneyu` should not have broken backward compatibility in the first place; rather, it'll be deprecated in favor of a new `mann_whitney_u `. It looks like the change in functionality happened [here](https://github.com/thomas-haslwanter/scipy/commit/424128b563f291c71f1a123071f37e1cb22312bd ). I was quite surprised to see different p-values in my results on different machines, and it took me a greater part of a day to track down the issue to `scipy`. What do you think about changing the default back until the function gets [deprecated](https://github.com/scipy/scipy/pull/4933), issuing a warning, or some other solution to help ease any potential confusion?
1.0
mannwhitneyu breaks backward compatibility in 0.17.0 - I recently found that `mannwhitneyu` changed from a one-sided to two-sided test, by default, in `0.17.0`. I see that [this](https://github.com/scipy/scipy/pull/6034) PR cleaned up the documentation a bit to clarify the change. However, my understanding from [this](https://github.com/scipy/scipy/pull/4933) thread is that `mannwhitneyu` should not have broken backward compatibility in the first place; rather, it'll be deprecated in favor of a new `mann_whitney_u `. It looks like the change in functionality happened [here](https://github.com/thomas-haslwanter/scipy/commit/424128b563f291c71f1a123071f37e1cb22312bd ). I was quite surprised to see different p-values in my results on different machines, and it took me a greater part of a day to track down the issue to `scipy`. What do you think about changing the default back until the function gets [deprecated](https://github.com/scipy/scipy/pull/4933), issuing a warning, or some other solution to help ease any potential confusion?
defect
mannwhitneyu breaks backward compatibility in i recently found that mannwhitneyu changed from a one sided to two sided test by default in i see that pr cleaned up the documentation a bit to clarify the change however my understanding from thread is that mannwhitneyu should not have broken backward compatibility in the first place rather it ll be deprecated in favor of a new mann whitney u it looks like the change in functionality happened i was quite surprised to see different p values in my results on different machines and it took me a greater part of a day to track down the issue to scipy what do you think about changing the default back until the function gets issuing a warning or some other solution to help ease any potential confusion
1
20,369
10,512,944,839
IssuesEvent
2019-09-27 19:13:58
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Peer/industry scores available?
Pri2 cxp product-question security-center/svc triaged
Are there peer/industry scores akin to those associated with Office 365 available? Thanks. --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: c0554513-d846-079c-6bfc-d27aab78b442 * Version Independent ID: 6c8a971c-fc8b-baca-2ad4-518bf2e75aa5 * Content: [Security recommendations in Azure Security Center](https://docs.microsoft.com/en-us/azure/security-center/security-center-recommendations) * Content Source: [articles/security-center/security-center-recommendations.md](https://github.com/Microsoft/azure-docs/blob/master/articles/security-center/security-center-recommendations.md) * Service: **security-center** * GitHub Login: @memildin * Microsoft Alias: **memildin**
True
Peer/industry scores available? - Are there peer/industry scores akin to those associated with Office 365 available? Thanks. --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: c0554513-d846-079c-6bfc-d27aab78b442 * Version Independent ID: 6c8a971c-fc8b-baca-2ad4-518bf2e75aa5 * Content: [Security recommendations in Azure Security Center](https://docs.microsoft.com/en-us/azure/security-center/security-center-recommendations) * Content Source: [articles/security-center/security-center-recommendations.md](https://github.com/Microsoft/azure-docs/blob/master/articles/security-center/security-center-recommendations.md) * Service: **security-center** * GitHub Login: @memildin * Microsoft Alias: **memildin**
non_defect
peer industry scores available are there peer industry scores akin to those associated with office available thanks document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id baca content content source service security center github login memildin microsoft alias memildin
0
47,229
13,056,065,873
IssuesEvent
2020-07-30 03:33:10
icecube-trac/tix2
https://api.github.com/repos/icecube-trac/tix2
closed
Lacking a working test script for cramer-rao (Trac #168)
Migrated from Trac combo reconstruction defect
The test script in cramer-rao does not work, yet, because it depends on some command line parameters. This needs to be fixed, or a new script must be written. Even better: write some unit tests. Migrated from https://code.icecube.wisc.edu/ticket/168 ```json { "status": "closed", "changetime": "2009-10-16T13:45:16", "description": "The test script in cramer-rao does not work, yet, because it depends on some command line parameters. This needs to be fixed, or a new script must be written.\n\nEven better: write some unit tests.", "reporter": "kislat", "cc": "", "resolution": "fixed", "_ts": "1255700716000000", "component": "combo reconstruction", "summary": "Lacking a working test script for cramer-rao", "priority": "normal", "keywords": "", "time": "2009-10-16T13:19:00", "milestone": "", "owner": "lunemann", "type": "defect" } ```
1.0
Lacking a working test script for cramer-rao (Trac #168) - The test script in cramer-rao does not work, yet, because it depends on some command line parameters. This needs to be fixed, or a new script must be written. Even better: write some unit tests. Migrated from https://code.icecube.wisc.edu/ticket/168 ```json { "status": "closed", "changetime": "2009-10-16T13:45:16", "description": "The test script in cramer-rao does not work, yet, because it depends on some command line parameters. This needs to be fixed, or a new script must be written.\n\nEven better: write some unit tests.", "reporter": "kislat", "cc": "", "resolution": "fixed", "_ts": "1255700716000000", "component": "combo reconstruction", "summary": "Lacking a working test script for cramer-rao", "priority": "normal", "keywords": "", "time": "2009-10-16T13:19:00", "milestone": "", "owner": "lunemann", "type": "defect" } ```
defect
lacking a working test script for cramer rao trac the test script in cramer rao does not work yet because it depends on some command line parameters this needs to be fixed or a new script must be written even better write some unit tests migrated from json status closed changetime description the test script in cramer rao does not work yet because it depends on some command line parameters this needs to be fixed or a new script must be written n neven better write some unit tests reporter kislat cc resolution fixed ts component combo reconstruction summary lacking a working test script for cramer rao priority normal keywords time milestone owner lunemann type defect
1
434,873
30,473,349,635
IssuesEvent
2023-07-17 14:55:06
spinalcordtoolbox/spinalcordtoolbox
https://api.github.com/repos/spinalcordtoolbox/spinalcordtoolbox
closed
Update documentation to describe the new v6.0-specific installation procedures for Linux/Windows
documentation
Two main installer-focused changes have occurred since the last release: - https://github.com/spinalcordtoolbox/spinalcordtoolbox/pull/4027 - https://github.com/spinalcordtoolbox/spinalcordtoolbox/pull/4049 These PRs change how we instruct users to install SCT: - For Windows, since we now use Miniconda, there is no longer a need to install Python system-wide. - For macOS/Linux, since we now support standlone installations, there is no longer a need to download the source code before running the installer. So, we should open a draft documentation PR, then merge it when v6.0 is release.
1.0
Update documentation to describe the new v6.0-specific installation procedures for Linux/Windows - Two main installer-focused changes have occurred since the last release: - https://github.com/spinalcordtoolbox/spinalcordtoolbox/pull/4027 - https://github.com/spinalcordtoolbox/spinalcordtoolbox/pull/4049 These PRs change how we instruct users to install SCT: - For Windows, since we now use Miniconda, there is no longer a need to install Python system-wide. - For macOS/Linux, since we now support standlone installations, there is no longer a need to download the source code before running the installer. So, we should open a draft documentation PR, then merge it when v6.0 is release.
non_defect
update documentation to describe the new specific installation procedures for linux windows two main installer focused changes have occurred since the last release these prs change how we instruct users to install sct for windows since we now use miniconda there is no longer a need to install python system wide for macos linux since we now support standlone installations there is no longer a need to download the source code before running the installer so we should open a draft documentation pr then merge it when is release
0
284,280
8,736,883,274
IssuesEvent
2018-12-11 20:51:34
aowen87/TicketTester
https://api.github.com/repos/aowen87/TicketTester
closed
Internal launcher incorrectly passes some arguments to the script file specified with "-s script_file".
bug crash likelihood low priority reviewed severity high wrong results
When you launch the cli from the command line and specify a script with "-s script_file", the arguments after the script file name are for the script and need to come at the end of the line. Instead any arguments that are not known about by the internallauncher get put right after the script name and before the arguments intended for the script. This results in those arguments getting passed to the script and not the intended component. This is new behavior in 2.6.0. -----------------------REDMINE MIGRATION----------------------- This ticket was migrated from Redmine. As such, not all information was able to be captured in the transition. Below is a complete record of the original redmine ticket. Ticket number: 1259 Status: Resolved Project: VisIt Tracker: Bug Priority: High Subject: Internal launcher incorrectly passes some arguments to the script file specified with "-s script_file". Assigned to: Eric Brugger Category: Target version: 2.6.1 Author: Eric Brugger Start: 12/03/2012 Due date: % Done: 100 Estimated time: 5.0 Created: 12/03/2012 04:00 pm Updated: 12/04/2012 01:15 pm Likelihood: 2 - Rare Severity: 4 - Crash / Wrong Results Found in version: 2.5.2 Impact: Expected Use: OS: All Support Group: Any Description: When you launch the cli from the command line and specify a script with "-s script_file", the arguments after the script file name are for the script and need to come at the end of the line. Instead any arguments that are not known about by the internallauncher get put right after the script name and before the arguments intended for the script. This results in those arguments getting passed to the script and not the intended component. This is new behavior in 2.6.0. Comments: I committed revisions 19752 and 19754 to the 2.6 RC and trunk with thefollowing change:1) The VisIt launch script was modified to correct a problem where some command line arguments would be passed to subsequent compoents in the wrong order when the "s script_file" option was used. In particular the internal launcher was modified so that all arguments that are passed on to subsequent components are passed before the "s script_file" command line option. This resolves #1259.M bin/internallauncherA resources/help/en_US/relnotes2.6.1.html
1.0
Internal launcher incorrectly passes some arguments to the script file specified with "-s script_file". - When you launch the cli from the command line and specify a script with "-s script_file", the arguments after the script file name are for the script and need to come at the end of the line. Instead any arguments that are not known about by the internallauncher get put right after the script name and before the arguments intended for the script. This results in those arguments getting passed to the script and not the intended component. This is new behavior in 2.6.0. -----------------------REDMINE MIGRATION----------------------- This ticket was migrated from Redmine. As such, not all information was able to be captured in the transition. Below is a complete record of the original redmine ticket. Ticket number: 1259 Status: Resolved Project: VisIt Tracker: Bug Priority: High Subject: Internal launcher incorrectly passes some arguments to the script file specified with "-s script_file". Assigned to: Eric Brugger Category: Target version: 2.6.1 Author: Eric Brugger Start: 12/03/2012 Due date: % Done: 100 Estimated time: 5.0 Created: 12/03/2012 04:00 pm Updated: 12/04/2012 01:15 pm Likelihood: 2 - Rare Severity: 4 - Crash / Wrong Results Found in version: 2.5.2 Impact: Expected Use: OS: All Support Group: Any Description: When you launch the cli from the command line and specify a script with "-s script_file", the arguments after the script file name are for the script and need to come at the end of the line. Instead any arguments that are not known about by the internallauncher get put right after the script name and before the arguments intended for the script. This results in those arguments getting passed to the script and not the intended component. This is new behavior in 2.6.0. Comments: I committed revisions 19752 and 19754 to the 2.6 RC and trunk with thefollowing change:1) The VisIt launch script was modified to correct a problem where some command line arguments would be passed to subsequent compoents in the wrong order when the "s script_file" option was used. In particular the internal launcher was modified so that all arguments that are passed on to subsequent components are passed before the "s script_file" command line option. This resolves #1259.M bin/internallauncherA resources/help/en_US/relnotes2.6.1.html
non_defect
internal launcher incorrectly passes some arguments to the script file specified with s script file when you launch the cli from the command line and specify a script with s script file the arguments after the script file name are for the script and need to come at the end of the line instead any arguments that are not known about by the internallauncher get put right after the script name and before the arguments intended for the script this results in those arguments getting passed to the script and not the intended component this is new behavior in redmine migration this ticket was migrated from redmine as such not all information was able to be captured in the transition below is a complete record of the original redmine ticket ticket number status resolved project visit tracker bug priority high subject internal launcher incorrectly passes some arguments to the script file specified with s script file assigned to eric brugger category target version author eric brugger start due date done estimated time created pm updated pm likelihood rare severity crash wrong results found in version impact expected use os all support group any description when you launch the cli from the command line and specify a script with s script file the arguments after the script file name are for the script and need to come at the end of the line instead any arguments that are not known about by the internallauncher get put right after the script name and before the arguments intended for the script this results in those arguments getting passed to the script and not the intended component this is new behavior in comments i committed revisions and to the rc and trunk with thefollowing change the visit launch script was modified to correct a problem where some command line arguments would be passed to subsequent compoents in the wrong order when the s script file option was used in particular the internal launcher was modified so that all arguments that are passed on to subsequent components are passed before the s script file command line option this resolves m bin internallaunchera resources help en us html
0
79,774
29,046,201,103
IssuesEvent
2023-05-13 15:40:20
vector-im/element-desktop
https://api.github.com/repos/vector-im/element-desktop
opened
Crash when trying to share screen in a direct call
T-Defect
### Steps to reproduce 1. Start a Call 2. Click on the Share Screen Icon 3. Element Segfaults. (gdb: Thread 140 "DesktopMediaLis" received signal SIGSEGV, Segmentation fault.) Maybe this could be the related upstream issue: https://github.com/electron/electron/issues/37463 https://github.com/vector-im/element-desktop/assets/32410361/4908d2d4-aa9c-49cf-98ed-6c33b03f772f ### Outcome #### What did you expect? Seeing the Screen share dialog. #### What happened instead? Element crashed. And after restarting Element, you are sometimes no longer logged in, or it no longer can decrypt some messages ### Operating system Ubuntu 22.04.2 ### Application version Element version: 1.11.31 Olm version: 3.2.14 ### How did you install the app? https://element.io/get-started ### Homeserver matrix.org and others ### Will you send logs? Yes
1.0
Crash when trying to share screen in a direct call - ### Steps to reproduce 1. Start a Call 2. Click on the Share Screen Icon 3. Element Segfaults. (gdb: Thread 140 "DesktopMediaLis" received signal SIGSEGV, Segmentation fault.) Maybe this could be the related upstream issue: https://github.com/electron/electron/issues/37463 https://github.com/vector-im/element-desktop/assets/32410361/4908d2d4-aa9c-49cf-98ed-6c33b03f772f ### Outcome #### What did you expect? Seeing the Screen share dialog. #### What happened instead? Element crashed. And after restarting Element, you are sometimes no longer logged in, or it no longer can decrypt some messages ### Operating system Ubuntu 22.04.2 ### Application version Element version: 1.11.31 Olm version: 3.2.14 ### How did you install the app? https://element.io/get-started ### Homeserver matrix.org and others ### Will you send logs? Yes
defect
crash when trying to share screen in a direct call steps to reproduce start a call click on the share screen icon element segfaults gdb thread desktopmedialis received signal sigsegv segmentation fault maybe this could be the related upstream issue outcome what did you expect seeing the screen share dialog what happened instead element crashed and after restarting element you are sometimes no longer logged in or it no longer can decrypt some messages operating system ubuntu application version element version olm version how did you install the app homeserver matrix org and others will you send logs yes
1
26,879
4,820,900,735
IssuesEvent
2016-11-05 02:26:30
solrmarc/solrmarc
https://api.github.com/repos/solrmarc/solrmarc
closed
file extension must be .mrc or .xml??
auto-migrated Priority-Medium Type-Defect
``` I've just tried to index a group of UNIMARC records based on a UNIMARC export in a file with extension .not When I tried to run indexfile on it, the java program hangs and does not abort. Then I changed the file extension to .mrc and it worked perfectly. Is it a requirement that the source marc files must have extension .mrc (or .xml)? ``` Original issue reported on code.google.com by `willem.v...@gmail.com` on 10 Nov 2009 at 12:44
1.0
file extension must be .mrc or .xml?? - ``` I've just tried to index a group of UNIMARC records based on a UNIMARC export in a file with extension .not When I tried to run indexfile on it, the java program hangs and does not abort. Then I changed the file extension to .mrc and it worked perfectly. Is it a requirement that the source marc files must have extension .mrc (or .xml)? ``` Original issue reported on code.google.com by `willem.v...@gmail.com` on 10 Nov 2009 at 12:44
defect
file extension must be mrc or xml i ve just tried to index a group of unimarc records based on a unimarc export in a file with extension not when i tried to run indexfile on it the java program hangs and does not abort then i changed the file extension to mrc and it worked perfectly is it a requirement that the source marc files must have extension mrc or xml original issue reported on code google com by willem v gmail com on nov at
1
18,391
3,054,467,489
IssuesEvent
2015-08-13 02:54:50
eczarny/spectacle
https://api.github.com/repos/eczarny/spectacle
closed
Moving full screen (OS X style) window to other monitor failed.
defect ★★★
Moving full screen Chrome to other desktop leaves a grey, full screen on original monitor with a shadow of the window at the corner next to destination monitor, but the window is not visible on any of the screens.
1.0
Moving full screen (OS X style) window to other monitor failed. - Moving full screen Chrome to other desktop leaves a grey, full screen on original monitor with a shadow of the window at the corner next to destination monitor, but the window is not visible on any of the screens.
defect
moving full screen os x style window to other monitor failed moving full screen chrome to other desktop leaves a grey full screen on original monitor with a shadow of the window at the corner next to destination monitor but the window is not visible on any of the screens
1
91,939
15,856,776,781
IssuesEvent
2021-04-08 03:09:36
heholek/sheetjs
https://api.github.com/repos/heholek/sheetjs
opened
CVE-2020-28499 (High) detected in merge-1.2.1.tgz
security vulnerability
## CVE-2020-28499 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>merge-1.2.1.tgz</b></p></summary> <p>Merge multiple objects into one, optionally creating a new cloned object. Similar to the jQuery.extend but more flexible. Works in Node.js and the browser.</p> <p>Library home page: <a href="https://registry.npmjs.org/merge/-/merge-1.2.1.tgz">https://registry.npmjs.org/merge/-/merge-1.2.1.tgz</a></p> <p>Path to dependency file: sheetjs/demos/nwjs/package.json</p> <p>Path to vulnerable library: sheetjs/demos/nwjs/node_modules/merge/package.json</p> <p> Dependency Hierarchy: - nw-0.24.4.tgz (Root Library) - :x: **merge-1.2.1.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> All versions of package merge are vulnerable to Prototype Pollution via _recursiveMerge . <p>Publish Date: 2021-02-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28499>CVE-2020-28499</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-28499 (High) detected in merge-1.2.1.tgz - ## CVE-2020-28499 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>merge-1.2.1.tgz</b></p></summary> <p>Merge multiple objects into one, optionally creating a new cloned object. Similar to the jQuery.extend but more flexible. Works in Node.js and the browser.</p> <p>Library home page: <a href="https://registry.npmjs.org/merge/-/merge-1.2.1.tgz">https://registry.npmjs.org/merge/-/merge-1.2.1.tgz</a></p> <p>Path to dependency file: sheetjs/demos/nwjs/package.json</p> <p>Path to vulnerable library: sheetjs/demos/nwjs/node_modules/merge/package.json</p> <p> Dependency Hierarchy: - nw-0.24.4.tgz (Root Library) - :x: **merge-1.2.1.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> All versions of package merge are vulnerable to Prototype Pollution via _recursiveMerge . <p>Publish Date: 2021-02-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28499>CVE-2020-28499</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in merge tgz cve high severity vulnerability vulnerable library merge tgz merge multiple objects into one optionally creating a new cloned object similar to the jquery extend but more flexible works in node js and the browser library home page a href path to dependency file sheetjs demos nwjs package json path to vulnerable library sheetjs demos nwjs node modules merge package json dependency hierarchy nw tgz root library x merge tgz vulnerable library vulnerability details all versions of package merge are vulnerable to prototype pollution via recursivemerge publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource
0
26,712
4,777,627,620
IssuesEvent
2016-10-27 16:49:16
gbif/ipt
https://api.github.com/repos/gbif/ipt
closed
Deleting unregistered resource says resource is registered in dialog box
bug Component-i18n Component-UI Priority-High Type-Defect
When I want to delete an **un**registered resource, I get: ![ipt](https://cloud.githubusercontent.com/assets/600993/12320390/bced1320-baa8-11e5-93b6-495685eeffe2.png) Seems like the dialog box doesn't make a distinction between registered and unregistered, but mentions `registered` anyway?
1.0
Deleting unregistered resource says resource is registered in dialog box - When I want to delete an **un**registered resource, I get: ![ipt](https://cloud.githubusercontent.com/assets/600993/12320390/bced1320-baa8-11e5-93b6-495685eeffe2.png) Seems like the dialog box doesn't make a distinction between registered and unregistered, but mentions `registered` anyway?
defect
deleting unregistered resource says resource is registered in dialog box when i want to delete an un registered resource i get seems like the dialog box doesn t make a distinction between registered and unregistered but mentions registered anyway
1
129,602
27,521,976,357
IssuesEvent
2023-03-06 15:34:26
shdq/spartak-ui
https://api.github.com/repos/shdq/spartak-ui
closed
Feature request: `Code` component
enhancement group: Typography Component: Code
Introduce `Code` component to display inline code examples, keywords, shell commands, etc. ### Usage ```jsx import { Code } from "spartak-ui"; function App() { return ( <Code> const number = 362017; </Code>; ); } ``` This example renders in HTML as `code`: ```html <code>const number = 362017;</code> ``` **`Code` props API** - `color`: `red`, `green`, `blue`
1.0
Feature request: `Code` component - Introduce `Code` component to display inline code examples, keywords, shell commands, etc. ### Usage ```jsx import { Code } from "spartak-ui"; function App() { return ( <Code> const number = 362017; </Code>; ); } ``` This example renders in HTML as `code`: ```html <code>const number = 362017;</code> ``` **`Code` props API** - `color`: `red`, `green`, `blue`
non_defect
feature request code component introduce code component to display inline code examples keywords shell commands etc usage jsx import code from spartak ui function app return const number this example renders in html as code html const number code props api color red green blue
0
2,782
2,607,945,457
IssuesEvent
2015-02-26 00:33:03
chrsmithdemos/switchlist
https://api.github.com/repos/chrsmithdemos/switchlist
closed
Hovering for tool tips should work in tables.
auto-migrated Priority-Medium Type-Defect
``` Hovering for tool tips (for details on cargo, etc) should work on both buttons and widgets in the bottom of each window as well as on the various tables. To reproduce: Go to the freight car window, and hover over a cargo name in the table. Nothing happens. Now hover over the cargo button towards the bottom of the screen; you get a helpful tool tip. This would help usability (especially with cargos); the only question is whether an NSTableView allows a tool tip on individual items in the table. ``` ----- Original issue reported on code.google.com by `rwbowdi...@gmail.com` on 21 Dec 2011 at 4:12
1.0
Hovering for tool tips should work in tables. - ``` Hovering for tool tips (for details on cargo, etc) should work on both buttons and widgets in the bottom of each window as well as on the various tables. To reproduce: Go to the freight car window, and hover over a cargo name in the table. Nothing happens. Now hover over the cargo button towards the bottom of the screen; you get a helpful tool tip. This would help usability (especially with cargos); the only question is whether an NSTableView allows a tool tip on individual items in the table. ``` ----- Original issue reported on code.google.com by `rwbowdi...@gmail.com` on 21 Dec 2011 at 4:12
defect
hovering for tool tips should work in tables hovering for tool tips for details on cargo etc should work on both buttons and widgets in the bottom of each window as well as on the various tables to reproduce go to the freight car window and hover over a cargo name in the table nothing happens now hover over the cargo button towards the bottom of the screen you get a helpful tool tip this would help usability especially with cargos the only question is whether an nstableview allows a tool tip on individual items in the table original issue reported on code google com by rwbowdi gmail com on dec at
1
67,262
14,860,779,924
IssuesEvent
2021-01-18 21:15:30
kadirselcuk/electron-webpack-quick-start
https://api.github.com/repos/kadirselcuk/electron-webpack-quick-start
opened
CVE-2020-4075 (High) detected in electron-8.2.0.tgz
security vulnerability
## CVE-2020-4075 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>electron-8.2.0.tgz</b></p></summary> <p>Build cross platform desktop apps with JavaScript, HTML, and CSS</p> <p>Library home page: <a href="https://registry.npmjs.org/electron/-/electron-8.2.0.tgz">https://registry.npmjs.org/electron/-/electron-8.2.0.tgz</a></p> <p>Path to dependency file: electron-webpack-quick-start/package.json</p> <p>Path to vulnerable library: electron-webpack-quick-start/node_modules/electron/package.json</p> <p> Dependency Hierarchy: - :x: **electron-8.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kadirselcuk/electron-webpack-quick-start/commit/5304aff4a959f5816e06796abb476c3823cd141c">5304aff4a959f5816e06796abb476c3823cd141c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not something you expect. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4. <p>Publish Date: 2020-07-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-4075>CVE-2020-4075</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm">https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm</a></p> <p>Release Date: 2020-07-07</p> <p>Fix Resolution: 7.2.4,8.2.4,9.0.0-beta.21</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-4075 (High) detected in electron-8.2.0.tgz - ## CVE-2020-4075 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>electron-8.2.0.tgz</b></p></summary> <p>Build cross platform desktop apps with JavaScript, HTML, and CSS</p> <p>Library home page: <a href="https://registry.npmjs.org/electron/-/electron-8.2.0.tgz">https://registry.npmjs.org/electron/-/electron-8.2.0.tgz</a></p> <p>Path to dependency file: electron-webpack-quick-start/package.json</p> <p>Path to vulnerable library: electron-webpack-quick-start/node_modules/electron/package.json</p> <p> Dependency Hierarchy: - :x: **electron-8.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kadirselcuk/electron-webpack-quick-start/commit/5304aff4a959f5816e06796abb476c3823cd141c">5304aff4a959f5816e06796abb476c3823cd141c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not something you expect. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4. <p>Publish Date: 2020-07-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-4075>CVE-2020-4075</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm">https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm</a></p> <p>Release Date: 2020-07-07</p> <p>Fix Resolution: 7.2.4,8.2.4,9.0.0-beta.21</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in electron tgz cve high severity vulnerability vulnerable library electron tgz build cross platform desktop apps with javascript html and css library home page a href path to dependency file electron webpack quick start package json path to vulnerable library electron webpack quick start node modules electron package json dependency hierarchy x electron tgz vulnerable library found in head commit a href found in base branch master vulnerability details in electron before versions and arbitrary local file read is possible by defining unsafe window options on a child window opened via window open as a workaround ensure you are calling event preventdefault on all new window events where the url or options is not something you expect this is fixed in versions beta and publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution beta step up your open source security game with whitesource
0
67,638
21,038,330,390
IssuesEvent
2022-03-31 09:54:54
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
A reply to a reply to a thread root appears in the thread, but it should not
T-Defect S-Minor O-Occasional A-Threads Z-Labs
### Steps to reproduce 1. In a room, write a message A 2. Create a thead based on A 3. Reply to A in the main timeline **EDIT: you must do this from a non-threads-capable Element Web**. Note that this reply appears correctly in the main timeline 4. Reply to the reply ### Outcome #### What did you expect? The reply to the reply should appear in the main timeline. #### What happened instead? Instead, it appears in the thread. ![image](https://user-images.githubusercontent.com/76812/160806670-1f06ad0b-cd0d-4170-8dbf-b731785d729b.png) ### Operating system Ubuntu 21.10 ### Browser information Firefox 98.0.2 ### URL for webapp https://develop.element.io ### Application version Element version: 5eecc768a389-react-4d14128d94c8-js-26cbe02a7f2e Olm version: 3.2.8 ### Homeserver matrix.org ### Will you send logs? Yes
1.0
A reply to a reply to a thread root appears in the thread, but it should not - ### Steps to reproduce 1. In a room, write a message A 2. Create a thead based on A 3. Reply to A in the main timeline **EDIT: you must do this from a non-threads-capable Element Web**. Note that this reply appears correctly in the main timeline 4. Reply to the reply ### Outcome #### What did you expect? The reply to the reply should appear in the main timeline. #### What happened instead? Instead, it appears in the thread. ![image](https://user-images.githubusercontent.com/76812/160806670-1f06ad0b-cd0d-4170-8dbf-b731785d729b.png) ### Operating system Ubuntu 21.10 ### Browser information Firefox 98.0.2 ### URL for webapp https://develop.element.io ### Application version Element version: 5eecc768a389-react-4d14128d94c8-js-26cbe02a7f2e Olm version: 3.2.8 ### Homeserver matrix.org ### Will you send logs? Yes
defect
a reply to a reply to a thread root appears in the thread but it should not steps to reproduce in a room write a message a create a thead based on a reply to a in the main timeline edit you must do this from a non threads capable element web note that this reply appears correctly in the main timeline reply to the reply outcome what did you expect the reply to the reply should appear in the main timeline what happened instead instead it appears in the thread operating system ubuntu browser information firefox url for webapp application version element version react js olm version homeserver matrix org will you send logs yes
1
191,417
22,215,772,853
IssuesEvent
2022-06-08 01:22:12
Kijacode/mwengeSMS
https://api.github.com/repos/Kijacode/mwengeSMS
opened
CVE-2021-3795 (High) detected in semver-regex-3.1.2.tgz
security vulnerability
## CVE-2021-3795 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>semver-regex-3.1.2.tgz</b></p></summary> <p>Regular expression for matching semver versions</p> <p>Library home page: <a href="https://registry.npmjs.org/semver-regex/-/semver-regex-3.1.2.tgz">https://registry.npmjs.org/semver-regex/-/semver-regex-3.1.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/semver-regex/package.json</p> <p> Dependency Hierarchy: - husky-4.3.7.tgz (Root Library) - find-versions-4.0.0.tgz - :x: **semver-regex-3.1.2.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> semver-regex is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3795>CVE-2021-3795</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1">https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1</a></p> <p>Release Date: 2021-09-15</p> <p>Fix Resolution (semver-regex): 3.1.3</p> <p>Direct dependency fix Resolution (husky): 4.3.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-3795 (High) detected in semver-regex-3.1.2.tgz - ## CVE-2021-3795 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>semver-regex-3.1.2.tgz</b></p></summary> <p>Regular expression for matching semver versions</p> <p>Library home page: <a href="https://registry.npmjs.org/semver-regex/-/semver-regex-3.1.2.tgz">https://registry.npmjs.org/semver-regex/-/semver-regex-3.1.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/semver-regex/package.json</p> <p> Dependency Hierarchy: - husky-4.3.7.tgz (Root Library) - find-versions-4.0.0.tgz - :x: **semver-regex-3.1.2.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> semver-regex is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3795>CVE-2021-3795</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1">https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1</a></p> <p>Release Date: 2021-09-15</p> <p>Fix Resolution (semver-regex): 3.1.3</p> <p>Direct dependency fix Resolution (husky): 4.3.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in semver regex tgz cve high severity vulnerability vulnerable library semver regex tgz regular expression for matching semver versions library home page a href path to dependency file package json path to vulnerable library node modules semver regex package json dependency hierarchy husky tgz root library find versions tgz x semver regex tgz vulnerable library found in base branch master vulnerability details semver regex is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution semver regex direct dependency fix resolution husky step up your open source security game with mend
0
46,552
13,055,932,738
IssuesEvent
2020-07-30 03:09:35
icecube-trac/tix2
https://api.github.com/repos/icecube-trac/tix2
opened
[steamshovel] following G-frames do not supercede (Trac #1425)
Incomplete Migration Migrated from Trac combo core defect
Migrated from https://code.icecube.wisc.edu/ticket/1425 ```json { "status": "closed", "changetime": "2016-03-18T21:14:08", "description": "in a stream GCDGQP the first G-frame will determine the Geometry for the Q and P frame, not as expected the second G-frame, from the streaming character of our icetray framework.", "reporter": "mzoll", "cc": "", "resolution": "fixed", "_ts": "1458335648518728", "component": "combo core", "summary": "[steamshovel] following G-frames do not supercede", "priority": "critical", "keywords": "steamshovel GCD supercede", "time": "2015-11-06T08:44:39", "milestone": "", "owner": "hdembinski", "type": "defect" } ```
1.0
[steamshovel] following G-frames do not supercede (Trac #1425) - Migrated from https://code.icecube.wisc.edu/ticket/1425 ```json { "status": "closed", "changetime": "2016-03-18T21:14:08", "description": "in a stream GCDGQP the first G-frame will determine the Geometry for the Q and P frame, not as expected the second G-frame, from the streaming character of our icetray framework.", "reporter": "mzoll", "cc": "", "resolution": "fixed", "_ts": "1458335648518728", "component": "combo core", "summary": "[steamshovel] following G-frames do not supercede", "priority": "critical", "keywords": "steamshovel GCD supercede", "time": "2015-11-06T08:44:39", "milestone": "", "owner": "hdembinski", "type": "defect" } ```
defect
following g frames do not supercede trac migrated from json status closed changetime description in a stream gcdgqp the first g frame will determine the geometry for the q and p frame not as expected the second g frame from the streaming character of our icetray framework reporter mzoll cc resolution fixed ts component combo core summary following g frames do not supercede priority critical keywords steamshovel gcd supercede time milestone owner hdembinski type defect
1
777,954
27,298,797,346
IssuesEvent
2023-02-23 23:02:13
brandondombrowsky/BastCastle
https://api.github.com/repos/brandondombrowsky/BastCastle
closed
Discuss HA device access repurcussions
week8 priority-critical
Explain to Kyle what we can do now that we have access to his devices and see if he wants to take any steps to mitigate that, or if he trusts us (for now). - My Pi-Hole integration asks for an API key, but his doesn't? Related #144
1.0
Discuss HA device access repurcussions - Explain to Kyle what we can do now that we have access to his devices and see if he wants to take any steps to mitigate that, or if he trusts us (for now). - My Pi-Hole integration asks for an API key, but his doesn't? Related #144
non_defect
discuss ha device access repurcussions explain to kyle what we can do now that we have access to his devices and see if he wants to take any steps to mitigate that or if he trusts us for now my pi hole integration asks for an api key but his doesn t related
0
143,272
21,992,655,366
IssuesEvent
2022-05-26 00:41:01
antrea-io/antrea
https://api.github.com/repos/antrea-io/antrea
closed
Antrea Proxy NodePort Service Support
kind/design lifecycle/stale area/component/agent
[Google Docs](https://docs.google.com/document/d/196XsLQHEJM1BVRovpaSrnZxxg3beZ8x8fsJ9CFmqzws/edit?usp=sharing) **Describe what you are trying to solve** _This draft is only for Linux Nodes, we still need to design the solution for Windows Nodes._ We had already implemented ClusterIP services support in Antrea, but Kube-Proxy is still needed to support NodePort services. Since the Kube-Proxy does not support to run only for NodePort services, the ClusterIP Service calculations of it waste a lot of CPU cycles and memories. Once we implement NodePort services support in Antrea Proxy and remove Kube-Proxy in the cluster, then the overhead will be wiped. Furthermore, traffic for watching Service resources should also decrease and the pressure of APIServer should also be lower. **Describe the solution you have in mind** For both ClusterIP and NodePort Services, when accessing them, traffic should always be DNATed to a Pod Endpoint. Thus, we can reuse the ClusterIP Endpoint selection flows in OVS. To achieve this, traffic going to the host must be redirected to the OVS correctly. **Describe how your solution impacts user flows** Once we implement this feature then we can remove Kube-Proxy Deployments in theory, although we need to consider the way to start Antrea without Kube-Proxy first. **Describe the main design/architecture of your solution** From our prior experiments, the performance of IPTables will go down significantly if there are too many rules, thus we should keep the number of IPTables rules as small as possible. By using IPSet, we can use a constant number of IPTables rules to match traffic that we need to redirect, the matching complexity will be O(1) since we can use a set with a hash type. For each valid NodePort service, there should be several entries according to the Node addresses in the IPSet. Traffic no matter if it comes from the remote or current host, once its destination matches entries in IPSET then we need to forward it to the OVS. By doing DNAT, using link-local address 169.254.169.110, we make the packets to be forwarded to the OVS. To make the forward action really happen, we need an IP route rule. Traffic may be sent from 127.0.0.1 and then we need to do masquerade for it to ensure the destination knows where to reply. In the POSTROUTING chain of the nat table, we masquerade packets if they are sent from 127.0.0.1 and going to antrea-gw0. <img width="1203" alt="IPTables" src="https://user-images.githubusercontent.com/12567987/97805476-5d889580-1c91-11eb-8931-5b63b3aa1eee.png"> There are two options for a NodePort service: Cluster (default) and Local. Cluster obscures the client source IP and may cause a second hop to another node, but should have good overall load-spreading. Local preserves the client source IP and avoids a second hop for LoadBalancer and NodePort type services, but risks potentially imbalanced traffic spreading. This approach preserves the original source IP address. If there are no local endpoints, packets sent to the node are dropped, so you can rely on the correct source-ip in any packet processing rules you might apply a packet that makes it through to the endpoint. The IPTables implementation according to externalTrafficPolicy would look like below. ```text Chain OUTPUT (policy ACCEPT) Target prot opt source destination ANTREA-NODEPORT all -- 0.0.0.0/0 0.0.0.0/0 /* Antrea: jump to Antrea NodePort Service rules */ Chain PREROUTING (policy ACCEPT) target prot opt source destination ANTREA-NODEPORT all -- 0.0.0.0/0 0.0.0.0/0 /* Antrea: jump to Antrea NodePort Service rules */ Chain ANTREA-NODEPORT (2 references) target prot opt source destination MARK all -- 0.0.0.0/0 0.0.0.0/0 match-set ANTREA-NODEPORT-LOCAL dst,dst MARK set 0xf0 MARK all -- 0.0.0.0/0 0.0.0.0/0 match-set ANTREA-NODEPORT-CLUSTER dst,dst MARK set 0xf1 DNAT all -- 0.0.0.0/0 0.0.0.0/0 mark match 0xf0 to:169.254.169.110 DNAT all -- 0.0.0.0/0 0.0.0.0/0 mark match 0xf1 to:169.254.169.110 Chain POSTROUTING (policy ACCEPT) target prot opt source destination ANTREA-NODEPORT-MASQ all -- 0.0.0.0/0 0.0.0.0/0 /* Antrea: jump to Antrea NodePort Service MASQ rules */ ANTREA-POSTROUTING all -- 0.0.0.0/0 0.0.0.0/0 /* Antrea: jump to Antrea postrouting rules */ Chain ANTREA-NODEPORT-MASQ (1 references) target prot opt source destination MASQ all -- 127.0.0.1 169.254.169.110 MASQ all -- 0.0.0.0/0 169.254.169.110 mark match 0xf1 ``` There are two typical traffic paths of NodePort services. <img width="1148" alt="Patterns" src="https://user-images.githubusercontent.com/12567987/97668877-e8189b80-1abd-11eb-9343-3b8564e9269c.png"> For a local policy, we only need to care about the first case. And for a cluster policy, we care about both of these two cases. For the local policy, the detailed traffic path of our implementation should look like: <img width="1268" alt="ExternalTrafficPolicyLocal" src="https://user-images.githubusercontent.com/12567987/97668896-ef3fa980-1abd-11eb-9e28-43ef14a85ef9.png"> For the two-hop cases, the traffic path looks like below. <img width="1728" alt="ExternalTrafficPolicyCluster" src="https://user-images.githubusercontent.com/12567987/97668936-fff01f80-1abd-11eb-8c11-63ffeaeef3e2.png"> Based on the cases above, we need the following flows: _The flow that makes NodePort packets comes from gateway back to the gateway with ServiceCTMark_ In the current OVS pipeline, packets from Pod to external addresses will be tracked with CT_MARK 0x20, as we do DNAT for endpoint selection with CT_MARK 0x21, the second packet of a connection from external will not be correctly tracked. Thus, we need the following flow to handle this issue. ```go c.pipeline[conntrackCommitTable].BuildFlow(priorityHigh). MatchProtocol(binding.ProtocolIP). MatchCTMark(serviceCTMark). MatchCTStateNew(true). MatchCTStateTrk(true). MatchRegRange(int(marksReg), markTrafficFromGateway, binding.Range{0, 15}). Action().GotoTable(L2ForwardingOutTable). Done() ``` Virtual IP ARP responder ```go []binding.Flow{ c.pipeline[spoofGuardTable].BuildFlow(priorityNormal).MatchProtocol(binding.ProtocolARP). MatchInPort(gatewayOFPort). MatchARPTpa(NodePortVirtualIP). MatchARPSpa(nodeIP). Action().GotoTable(arpResponderTable). Cookie(c.cookieAllocator.Request(cookie.Service).Raw()). Done(), c.pipeline[arpResponderTable].BuildFlow(priorityNormal).MatchProtocol(binding.ProtocolARP). MatchARPOp(1). MatchARPTpa(NodePortVirtualIP). Action().Move(binding.NxmFieldSrcMAC, binding.NxmFieldDstMAC). Action().SetSrcMAC(globalVirtualMAC). Action().LoadARPOperation(2). Action().Move(binding.NxmFieldARPSha, binding.NxmFieldARPTha). Action().SetARPSha(globalVirtualMAC). Action().Move(binding.NxmFieldARPSpa, binding.NxmFieldARPTpa). Action().SetARPSpa(NodePortVirtualIP). Action().OutputInPort(). Cookie(c.cookieAllocator.Request(cookie.Service).Raw()). Done(), } ``` **Alternative solutions that you considered** For the host traffic forward part, we can use alternatives like EBPF or IPVS. But for now, I can not see any significant disadvantage if we use IPTables. **Test plan** We can verify this feature by using e2e and conformance tests. **Additional context** Since we use IPSET to match NodePort Services, the time complexity of packet matching should be `O(1)`. While the time complexity of OVS flow matching is also `O(1)`, the performance should be decent. Moreover, since the IPTables rules will reduce significantly once we remove the Kube-Proxy, the connection set-up delay should decrease too. According to the analysis, we can believe that the implementation will improve or keep the performance compared to the current implementation. As we can see, the traffic from Pod to a NodePort Service will go through a complex path. But as the NodePort services are designed for out of cluster access, Pods to NodePort should not be a common and best practice use case. To keep the implementation clear and efficient for those real use cases, IMO, this implementation is reasonable.
1.0
Antrea Proxy NodePort Service Support - [Google Docs](https://docs.google.com/document/d/196XsLQHEJM1BVRovpaSrnZxxg3beZ8x8fsJ9CFmqzws/edit?usp=sharing) **Describe what you are trying to solve** _This draft is only for Linux Nodes, we still need to design the solution for Windows Nodes._ We had already implemented ClusterIP services support in Antrea, but Kube-Proxy is still needed to support NodePort services. Since the Kube-Proxy does not support to run only for NodePort services, the ClusterIP Service calculations of it waste a lot of CPU cycles and memories. Once we implement NodePort services support in Antrea Proxy and remove Kube-Proxy in the cluster, then the overhead will be wiped. Furthermore, traffic for watching Service resources should also decrease and the pressure of APIServer should also be lower. **Describe the solution you have in mind** For both ClusterIP and NodePort Services, when accessing them, traffic should always be DNATed to a Pod Endpoint. Thus, we can reuse the ClusterIP Endpoint selection flows in OVS. To achieve this, traffic going to the host must be redirected to the OVS correctly. **Describe how your solution impacts user flows** Once we implement this feature then we can remove Kube-Proxy Deployments in theory, although we need to consider the way to start Antrea without Kube-Proxy first. **Describe the main design/architecture of your solution** From our prior experiments, the performance of IPTables will go down significantly if there are too many rules, thus we should keep the number of IPTables rules as small as possible. By using IPSet, we can use a constant number of IPTables rules to match traffic that we need to redirect, the matching complexity will be O(1) since we can use a set with a hash type. For each valid NodePort service, there should be several entries according to the Node addresses in the IPSet. Traffic no matter if it comes from the remote or current host, once its destination matches entries in IPSET then we need to forward it to the OVS. By doing DNAT, using link-local address 169.254.169.110, we make the packets to be forwarded to the OVS. To make the forward action really happen, we need an IP route rule. Traffic may be sent from 127.0.0.1 and then we need to do masquerade for it to ensure the destination knows where to reply. In the POSTROUTING chain of the nat table, we masquerade packets if they are sent from 127.0.0.1 and going to antrea-gw0. <img width="1203" alt="IPTables" src="https://user-images.githubusercontent.com/12567987/97805476-5d889580-1c91-11eb-8931-5b63b3aa1eee.png"> There are two options for a NodePort service: Cluster (default) and Local. Cluster obscures the client source IP and may cause a second hop to another node, but should have good overall load-spreading. Local preserves the client source IP and avoids a second hop for LoadBalancer and NodePort type services, but risks potentially imbalanced traffic spreading. This approach preserves the original source IP address. If there are no local endpoints, packets sent to the node are dropped, so you can rely on the correct source-ip in any packet processing rules you might apply a packet that makes it through to the endpoint. The IPTables implementation according to externalTrafficPolicy would look like below. ```text Chain OUTPUT (policy ACCEPT) Target prot opt source destination ANTREA-NODEPORT all -- 0.0.0.0/0 0.0.0.0/0 /* Antrea: jump to Antrea NodePort Service rules */ Chain PREROUTING (policy ACCEPT) target prot opt source destination ANTREA-NODEPORT all -- 0.0.0.0/0 0.0.0.0/0 /* Antrea: jump to Antrea NodePort Service rules */ Chain ANTREA-NODEPORT (2 references) target prot opt source destination MARK all -- 0.0.0.0/0 0.0.0.0/0 match-set ANTREA-NODEPORT-LOCAL dst,dst MARK set 0xf0 MARK all -- 0.0.0.0/0 0.0.0.0/0 match-set ANTREA-NODEPORT-CLUSTER dst,dst MARK set 0xf1 DNAT all -- 0.0.0.0/0 0.0.0.0/0 mark match 0xf0 to:169.254.169.110 DNAT all -- 0.0.0.0/0 0.0.0.0/0 mark match 0xf1 to:169.254.169.110 Chain POSTROUTING (policy ACCEPT) target prot opt source destination ANTREA-NODEPORT-MASQ all -- 0.0.0.0/0 0.0.0.0/0 /* Antrea: jump to Antrea NodePort Service MASQ rules */ ANTREA-POSTROUTING all -- 0.0.0.0/0 0.0.0.0/0 /* Antrea: jump to Antrea postrouting rules */ Chain ANTREA-NODEPORT-MASQ (1 references) target prot opt source destination MASQ all -- 127.0.0.1 169.254.169.110 MASQ all -- 0.0.0.0/0 169.254.169.110 mark match 0xf1 ``` There are two typical traffic paths of NodePort services. <img width="1148" alt="Patterns" src="https://user-images.githubusercontent.com/12567987/97668877-e8189b80-1abd-11eb-9343-3b8564e9269c.png"> For a local policy, we only need to care about the first case. And for a cluster policy, we care about both of these two cases. For the local policy, the detailed traffic path of our implementation should look like: <img width="1268" alt="ExternalTrafficPolicyLocal" src="https://user-images.githubusercontent.com/12567987/97668896-ef3fa980-1abd-11eb-9e28-43ef14a85ef9.png"> For the two-hop cases, the traffic path looks like below. <img width="1728" alt="ExternalTrafficPolicyCluster" src="https://user-images.githubusercontent.com/12567987/97668936-fff01f80-1abd-11eb-8c11-63ffeaeef3e2.png"> Based on the cases above, we need the following flows: _The flow that makes NodePort packets comes from gateway back to the gateway with ServiceCTMark_ In the current OVS pipeline, packets from Pod to external addresses will be tracked with CT_MARK 0x20, as we do DNAT for endpoint selection with CT_MARK 0x21, the second packet of a connection from external will not be correctly tracked. Thus, we need the following flow to handle this issue. ```go c.pipeline[conntrackCommitTable].BuildFlow(priorityHigh). MatchProtocol(binding.ProtocolIP). MatchCTMark(serviceCTMark). MatchCTStateNew(true). MatchCTStateTrk(true). MatchRegRange(int(marksReg), markTrafficFromGateway, binding.Range{0, 15}). Action().GotoTable(L2ForwardingOutTable). Done() ``` Virtual IP ARP responder ```go []binding.Flow{ c.pipeline[spoofGuardTable].BuildFlow(priorityNormal).MatchProtocol(binding.ProtocolARP). MatchInPort(gatewayOFPort). MatchARPTpa(NodePortVirtualIP). MatchARPSpa(nodeIP). Action().GotoTable(arpResponderTable). Cookie(c.cookieAllocator.Request(cookie.Service).Raw()). Done(), c.pipeline[arpResponderTable].BuildFlow(priorityNormal).MatchProtocol(binding.ProtocolARP). MatchARPOp(1). MatchARPTpa(NodePortVirtualIP). Action().Move(binding.NxmFieldSrcMAC, binding.NxmFieldDstMAC). Action().SetSrcMAC(globalVirtualMAC). Action().LoadARPOperation(2). Action().Move(binding.NxmFieldARPSha, binding.NxmFieldARPTha). Action().SetARPSha(globalVirtualMAC). Action().Move(binding.NxmFieldARPSpa, binding.NxmFieldARPTpa). Action().SetARPSpa(NodePortVirtualIP). Action().OutputInPort(). Cookie(c.cookieAllocator.Request(cookie.Service).Raw()). Done(), } ``` **Alternative solutions that you considered** For the host traffic forward part, we can use alternatives like EBPF or IPVS. But for now, I can not see any significant disadvantage if we use IPTables. **Test plan** We can verify this feature by using e2e and conformance tests. **Additional context** Since we use IPSET to match NodePort Services, the time complexity of packet matching should be `O(1)`. While the time complexity of OVS flow matching is also `O(1)`, the performance should be decent. Moreover, since the IPTables rules will reduce significantly once we remove the Kube-Proxy, the connection set-up delay should decrease too. According to the analysis, we can believe that the implementation will improve or keep the performance compared to the current implementation. As we can see, the traffic from Pod to a NodePort Service will go through a complex path. But as the NodePort services are designed for out of cluster access, Pods to NodePort should not be a common and best practice use case. To keep the implementation clear and efficient for those real use cases, IMO, this implementation is reasonable.
non_defect
antrea proxy nodeport service support describe what you are trying to solve this draft is only for linux nodes we still need to design the solution for windows nodes we had already implemented clusterip services support in antrea but kube proxy is still needed to support nodeport services since the kube proxy does not support to run only for nodeport services the clusterip service calculations of it waste a lot of cpu cycles and memories once we implement nodeport services support in antrea proxy and remove kube proxy in the cluster then the overhead will be wiped furthermore traffic for watching service resources should also decrease and the pressure of apiserver should also be lower describe the solution you have in mind for both clusterip and nodeport services when accessing them traffic should always be dnated to a pod endpoint thus we can reuse the clusterip endpoint selection flows in ovs to achieve this traffic going to the host must be redirected to the ovs correctly describe how your solution impacts user flows once we implement this feature then we can remove kube proxy deployments in theory although we need to consider the way to start antrea without kube proxy first describe the main design architecture of your solution from our prior experiments the performance of iptables will go down significantly if there are too many rules thus we should keep the number of iptables rules as small as possible by using ipset we can use a constant number of iptables rules to match traffic that we need to redirect the matching complexity will be o since we can use a set with a hash type for each valid nodeport service there should be several entries according to the node addresses in the ipset traffic no matter if it comes from the remote or current host once its destination matches entries in ipset then we need to forward it to the ovs by doing dnat using link local address we make the packets to be forwarded to the ovs to make the forward action really happen we need an ip route rule traffic may be sent from and then we need to do masquerade for it to ensure the destination knows where to reply in the postrouting chain of the nat table we masquerade packets if they are sent from and going to antrea img width alt iptables src there are two options for a nodeport service cluster default and local cluster obscures the client source ip and may cause a second hop to another node but should have good overall load spreading local preserves the client source ip and avoids a second hop for loadbalancer and nodeport type services but risks potentially imbalanced traffic spreading this approach preserves the original source ip address if there are no local endpoints packets sent to the node are dropped so you can rely on the correct source ip in any packet processing rules you might apply a packet that makes it through to the endpoint the iptables implementation according to externaltrafficpolicy would look like below text chain output policy accept target prot opt source destination antrea nodeport all antrea jump to antrea nodeport service rules chain prerouting policy accept target prot opt source destination antrea nodeport all antrea jump to antrea nodeport service rules chain antrea nodeport references target prot opt source destination mark all match set antrea nodeport local dst dst mark set mark all match set antrea nodeport cluster dst dst mark set dnat all mark match to dnat all mark match to chain postrouting policy accept target prot opt source destination antrea nodeport masq all antrea jump to antrea nodeport service masq rules antrea postrouting all antrea jump to antrea postrouting rules chain antrea nodeport masq references target prot opt source destination masq all masq all mark match there are two typical traffic paths of nodeport services img width alt patterns src for a local policy we only need to care about the first case and for a cluster policy we care about both of these two cases for the local policy the detailed traffic path of our implementation should look like img width alt externaltrafficpolicylocal src for the two hop cases the traffic path looks like below img width alt externaltrafficpolicycluster src based on the cases above we need the following flows the flow that makes nodeport packets comes from gateway back to the gateway with servicectmark in the current ovs pipeline packets from pod to external addresses will be tracked with ct mark as we do dnat for endpoint selection with ct mark the second packet of a connection from external will not be correctly tracked thus we need the following flow to handle this issue go c pipeline buildflow priorityhigh matchprotocol binding protocolip matchctmark servicectmark matchctstatenew true matchctstatetrk true matchregrange int marksreg marktrafficfromgateway binding range action gototable done virtual ip arp responder go binding flow c pipeline buildflow prioritynormal matchprotocol binding protocolarp matchinport gatewayofport matcharptpa nodeportvirtualip matcharpspa nodeip action gototable arprespondertable cookie c cookieallocator request cookie service raw done c pipeline buildflow prioritynormal matchprotocol binding protocolarp matcharpop matcharptpa nodeportvirtualip action move binding nxmfieldsrcmac binding nxmfielddstmac action setsrcmac globalvirtualmac action loadarpoperation action move binding nxmfieldarpsha binding nxmfieldarptha action setarpsha globalvirtualmac action move binding nxmfieldarpspa binding nxmfieldarptpa action setarpspa nodeportvirtualip action outputinport cookie c cookieallocator request cookie service raw done alternative solutions that you considered for the host traffic forward part we can use alternatives like ebpf or ipvs but for now i can not see any significant disadvantage if we use iptables test plan we can verify this feature by using and conformance tests additional context since we use ipset to match nodeport services the time complexity of packet matching should be o while the time complexity of ovs flow matching is also o the performance should be decent moreover since the iptables rules will reduce significantly once we remove the kube proxy the connection set up delay should decrease too according to the analysis we can believe that the implementation will improve or keep the performance compared to the current implementation as we can see the traffic from pod to a nodeport service will go through a complex path but as the nodeport services are designed for out of cluster access pods to nodeport should not be a common and best practice use case to keep the implementation clear and efficient for those real use cases imo this implementation is reasonable
0
7,392
7,921,076,313
IssuesEvent
2018-07-05 05:43:35
pastorhudson/pcobot
https://api.github.com/repos/pastorhudson/pcobot
opened
Add arrangement lookup.
Services enhancement
PCO Bot should be able to answer: What’s the arrangement for Happy Day?
1.0
Add arrangement lookup. - PCO Bot should be able to answer: What’s the arrangement for Happy Day?
non_defect
add arrangement lookup pco bot should be able to answer what’s the arrangement for happy day
0
79,443
28,261,822,543
IssuesEvent
2023-04-07 00:19:15
openzfs/zfs
https://api.github.com/repos/openzfs/zfs
closed
Crash under IO load when using both encryption and deduplication
Type: Defect Status: Stale
<!-- Please fill out the following template, which will help other contributors address your issue. --> <!-- Thank you for reporting an issue. *IMPORTANT* - Please check our issue tracker before opening a new issue. Additional valuable information can be found in the OpenZFS documentation and mailing list archives. Please fill in as much of the template as possible. --> ### System information <!-- add version after "|" character --> Type | Version/Name --- | --- Distribution Name | Debian Distribution Version | Buster Kernel Version | `4.19.0-18-amd64` and `5.10.0-0.bpo.9-amd64` Architecture | 64bit OpenZFS Version | `0.8.5-3~bpo10+1` and `2.0.3-9~bpo10+1` <!-- Command to find OpenZFS version: zfs version Commands to find kernel version: uname -r # Linux freebsd-version -r # FreeBSD --> ### Describe the problem you're observing Crash under IO load with a dataset for which both encryption and deduplication are used. ### Describe how to reproduce the problem We don't have a simple repro (yet). - We start with the empty `/somewhere/data` dataset for which both deduplication and encryption is enabled - We populate `/somewhere/data/_files` with various data files (JSON, images and proprietary binary files) - There are `16427` files in there - To engage a bit of deduplication we `cp -pR /somewhere/data/_files /somewhere/data/_files-copy` - Then we launch a Python multiprocess tool that does the following for each worker: - Create a temporary directory within `/somewhere/data/_tmp` with `tempfile.TemporaryDirectory` - Copy files from `/somewhere/data/_files` to `/somewhere/data/_tmp/in` - Files in `/somewhere/data/_tmp/in` are in various sub-folders - Create the `/somewhere/data/_tmp/intermediate1` and `/somewhere/data/_tmp/intermediate2` directories - Spawn another tool programmed in C that does the following: - Copy some files from `/somewhere/data/_tmp/in` to `/somewhere/data/_tmp/intermediate1` - Create some files in `/somewhere/data/_tmp/in` and `/somewhere/data/_tmp/intermediate2` - Create files in `/somewhere/data/_files /somewhere/data/_out` That Python multiprocess tool doesn't run long before ZFS crashes. There are at most `12` workers and we managed to crash the filesystem with `4` workers. We ran that second native tool through `valgrind` and found no memory bug. We doubt a user land program can crash ZFS anyway. When the crash happens, - The `DDT` is using about `10GB` of memory (in `ARC`) - The `ARC` cache is about `100GB` (its optimal size). According to our graphs - Wwe are not running out of memory (`192GB` in total) We're able to reproduce the crash on a fresh and smaller pool on the same machine with both kernel versions. Kernel version | ZFS version | Configuration | Result --- | --- | --- | --- `4.19.0-18-amd64` | `0.8.5-3~bpo10+1` | encryption on / deduplication on | 💥 `4.19.0-18-amd64` | `2.0.3-9~bpo10+1` | encryption on / deduplication on | 💥 `4.19.0-18-amd64` | `2.0.3-9~bpo10+1` | encryption off / deduplication off | ✔ `4.19.0-18-amd64` | `2.0.3-9~bpo10+1` | encryption on / deduplication off | ✔ `4.19.0-18-amd64` | `2.0.3-9~bpo10+1` | encryption off / deduplication on | ✔ `4.19.0-18-amd64` | `2.0.3-9~bpo10+1` | encryption on / deduplication on | 💥 `5.10.0-0.bpo.9-amd64` | `2.0.3-9~bpo10+1` | encryption on / deduplication on | 💥 `5.10.0-0.bpo.9-amd64` | `2.0.3-9~bpo10+1` | encryption on / deduplication off | ✔ ### Include any warning/errors/backtraces from the system logs Kernel `4.19.0-18-amd64`: ``` # dmesg -T ... [Fri Dec 31 12:57:55 2021] BUG: unable to handle kernel paging request at ffffae7de8a00000 [Fri Dec 31 12:57:55 2021] PGD 2fbf529067 P4D 2fbf529067 PUD 2f77a0a067 PMD 2e94fa6067 PTE 0 [Fri Dec 31 12:57:55 2021] Oops: 0000 [#1] SMP PTI [Fri Dec 31 12:57:55 2021] CPU: 3 PID: 1195 Comm: z_wr_iss Tainted: P OE 4.19.0-18-amd64 #1 Debian 4.19.208-1 [Fri Dec 31 12:57:55 2021] Hardware name: Dell Inc. PowerEdge T630/0W9WXC, BIOS 2.11.0 12/23/2019 [Fri Dec 31 12:57:55 2021] RIP: 0010:SHA512TransformBlocks+0x83/0x1340 [icp] [Fri Dec 31 12:57:55 2021] Code: 48 8b 4f 10 48 8b 57 18 4c 8b 47 20 4c 8b 4f 28 4c 8b 57 30 4c 8b 5f 38 eb 0d 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 31 ff <4c> 8b 26 49 0f cc 4d 89 c5 4d 89 c6 4d 89 cf 49 c1 cd 0e 49 c1 ce [Fri Dec 31 12:57:55 2021] RSP: 0018:ffffae7da03e3680 EFLAGS: 00010246 [Fri Dec 31 12:57:55 2021] RAX: c31b301a02095284 RBX: c2c0fb90c3a277f3 RCX: 305038bc0a334cbd [Fri Dec 31 12:57:55 2021] RDX: 14742eeb7f10abd8 RSI: ffffae7de8a00000 RDI: 0000000000000000 [Fri Dec 31 12:57:55 2021] RBP: ffffffffc0d51140 R08: b4b1ad3f75e8aa89 R09: 7ec5620da1b0de77 [Fri Dec 31 12:57:55 2021] R10: 59f9a675d9df9382 R11: 864d3213f20a28e4 R12: 8fa555c4bb64780e [Fri Dec 31 12:57:55 2021] R13: de32ad31e7eb88a1 R14: 37d450af0dd6dceb R15: 01045023014618c3 [Fri Dec 31 12:57:55 2021] FS: 0000000000000000(0000) GS:ffff9c2dbf8c0000(0000) knlGS:0000000000000000 [Fri Dec 31 12:57:55 2021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [Fri Dec 31 12:57:55 2021] CR2: ffffae7de8a00000 CR3: 0000001ccea0a002 CR4: 00000000001606e0 [Fri Dec 31 12:57:55 2021] Call Trace: [Fri Dec 31 12:57:55 2021] ? swiotlb_map_sg_attrs+0x4c/0x120 [Fri Dec 31 12:57:55 2021] ? SHA2Update+0x19f/0x1e0 [icp] [Fri Dec 31 12:57:55 2021] ? sha2_mac_atomic+0x213/0x320 [icp] [Fri Dec 31 12:57:55 2021] ? blk_mq_sched_dispatch_requests+0x11e/0x170 [Fri Dec 31 12:57:55 2021] ? _cond_resched+0x15/0x30 [Fri Dec 31 12:57:55 2021] ? mutex_lock+0xe/0x30 [Fri Dec 31 12:57:55 2021] ? crypto_mac+0x292/0x390 [icp] [Fri Dec 31 12:57:55 2021] ? i_mod_hash_find_nosync+0x43/0x90 [icp] [Fri Dec 31 12:57:55 2021] ? mod_hash_idkey_cmp+0x10/0x10 [icp] [Fri Dec 31 12:57:55 2021] ? i_mod_hash_find_nosync+0x62/0x90 [icp] [Fri Dec 31 12:57:55 2021] ? zio_crypt_do_hmac+0xc9/0x150 [zfs] [Fri Dec 31 12:57:55 2021] ? spa_crypto_key_compare+0x30/0x30 [zfs] [Fri Dec 31 12:57:55 2021] ? avl_find+0x58/0x90 [zavl] [Fri Dec 31 12:57:55 2021] ? zio_crypt_generate_iv_salt_dedup+0x2f/0x70 [zfs] [Fri Dec 31 12:57:55 2021] ? load_balance+0x193/0xa00 [Fri Dec 31 12:57:55 2021] ? abd_borrow_buf+0x1f/0x40 [zfs] [Fri Dec 31 12:57:55 2021] ? abd_borrow_buf_copy+0x28/0x70 [zfs] [Fri Dec 31 12:57:55 2021] ? spa_do_crypt_abd+0x118/0x370 [zfs] [Fri Dec 31 12:57:55 2021] ? zio_encrypt+0x437/0x5f0 [zfs] [Fri Dec 31 12:57:55 2021] ? zio_write_compress+0x42/0x780 [zfs] [Fri Dec 31 12:57:55 2021] ? __schedule+0x2a7/0x840 [Fri Dec 31 12:57:55 2021] ? __wake_up_common_lock+0x89/0xc0 [Fri Dec 31 12:57:55 2021] ? zio_execute+0x90/0xf0 [zfs] [Fri Dec 31 12:57:55 2021] ? taskq_thread+0x2e7/0x530 [spl] [Fri Dec 31 12:57:55 2021] ? wake_up_q+0x70/0x70 [Fri Dec 31 12:57:55 2021] ? zio_taskq_member.isra.10.constprop.16+0x60/0x60 [zfs] [Fri Dec 31 12:57:55 2021] ? taskq_thread_spawn+0x50/0x50 [spl] [Fri Dec 31 12:57:55 2021] ? kthread+0x112/0x130 [Fri Dec 31 12:57:55 2021] ? kthread_bind+0x30/0x30 [Fri Dec 31 12:57:55 2021] ? ret_from_fork+0x35/0x40 [Fri Dec 31 12:57:55 2021] Modules linked in: arc4 md4 sha512_ssse3 sha512_generic cmac nls_utf8 cifs ccm dns_resolver fscache dell_rbu binfmt_misc nls_ascii nls_cp437 vfat fat xfs libcrc32c intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass mxm_wmi crct10dif_pclmul crc32_pclmul ghash_clmulni_intel dcdbas intel_cstate mgag200 intel_uncore ttm efi_pstore intel_rapl_perf efivars pcspkr drm_kms_helper drm iTCO_wdt evdev joydev iTCO_vendor_support mei_me mei zfs(POE) zunicode(POE) zzstd(OE) zlua(OE) zavl(POE) icp(POE) ipmi_ssif zcommon(POE) znvpair(POE) spl(OE) sg ipmi_si ipmi_devintf ipmi_msghandler wmi pcc_cpufreq acpi_power_meter button efivarfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic fscrypto ecb dm_mod hid_generic usbhid hid sd_mod crc32c_intel xhci_pci [Fri Dec 31 12:57:55 2021] ahci xhci_hcd libahci aesni_intel ehci_pci libata ehci_hcd aes_x86_64 crypto_simd cryptd megaraid_sas glue_helper usbcore igb scsi_mod lpc_ich mfd_core i2c_algo_bit dca usb_common [Fri Dec 31 12:57:55 2021] CR2: ffffae7de8a00000 [Fri Dec 31 12:57:55 2021] ---[ end trace 26c4fbf30e1b8ea1 ]--- [Fri Dec 31 12:57:55 2021] RIP: 0010:SHA512TransformBlocks+0x83/0x1340 [icp] [Fri Dec 31 12:57:55 2021] Code: 48 8b 4f 10 48 8b 57 18 4c 8b 47 20 4c 8b 4f 28 4c 8b 57 30 4c 8b 5f 38 eb 0d 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 31 ff <4c> 8b 26 49 0f cc 4d 89 c5 4d 89 c6 4d 89 cf 49 c1 cd 0e 49 c1 ce [Fri Dec 31 12:57:55 2021] RSP: 0018:ffffae7da03e3680 EFLAGS: 00010246 [Fri Dec 31 12:57:55 2021] RAX: c31b301a02095284 RBX: c2c0fb90c3a277f3 RCX: 305038bc0a334cbd [Fri Dec 31 12:57:55 2021] RDX: 14742eeb7f10abd8 RSI: ffffae7de8a00000 RDI: 0000000000000000 [Fri Dec 31 12:57:55 2021] RBP: ffffffffc0d51140 R08: b4b1ad3f75e8aa89 R09: 7ec5620da1b0de77 [Fri Dec 31 12:57:55 2021] R10: 59f9a675d9df9382 R11: 864d3213f20a28e4 R12: 8fa555c4bb64780e [Fri Dec 31 12:57:55 2021] R13: de32ad31e7eb88a1 R14: 37d450af0dd6dceb R15: 01045023014618c3 [Fri Dec 31 12:57:55 2021] FS: 0000000000000000(0000) GS:ffff9c2dbf8c0000(0000) knlGS:0000000000000000 [Fri Dec 31 12:57:55 2021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [Fri Dec 31 12:57:55 2021] CR2: ffffae7de8a00000 CR3: 0000001ccea0a002 CR4: 00000000001606e0 ``` Kernel `5.10.0-0.bpo.9-amd64` ``` # dmesg -T ... [Fri Dec 31 17:17:53 2021] BUG: unable to handle page fault for address: ffffa227abbb8000 [Fri Dec 31 17:17:53 2021] #PF: supervisor read access in kernel mode [Fri Dec 31 17:17:53 2021] #PF: error_code(0x0000) - not-present page [Fri Dec 31 17:17:53 2021] PGD 100000067 P4D 100000067 PUD 3e5956067 PMD ab96c4067 PTE 0 [Fri Dec 31 17:17:53 2021] Oops: 0000 [#1] SMP PTI [Fri Dec 31 17:17:53 2021] CPU: 2 PID: 1173 Comm: z_wr_iss Tainted: P OE 5.10.0-0.bpo.9-amd64 #1 Debian 5.10.70-1~bpo10+1 [Fri Dec 31 17:17:53 2021] Hardware name: Dell Inc. PowerEdge T630/0W9WXC, BIOS 2.11.0 12/23/2019 [Fri Dec 31 17:17:53 2021] RIP: 0010:SHA512TransformBlocks+0x83/0x1340 [icp] [Fri Dec 31 17:17:53 2021] Code: 48 8b 4f 10 48 8b 57 18 4c 8b 47 20 4c 8b 4f 28 4c 8b 57 30 4c 8b 5f 38 eb 0d 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 31 ff <4c> 8b 26 49 0f cc 4d 89 c5 4d 89 c6 4d 89 cf 49 c1 cd 0e 49 c1 ce [Fri Dec 31 17:17:53 2021] RSP: 0018:ffffa2274489b680 EFLAGS: 00010246 [Fri Dec 31 17:17:53 2021] RAX: 63db297cd38fdb11 RBX: a49ea88c578a8401 RCX: e602f3b255d62954 [Fri Dec 31 17:17:53 2021] RDX: 6bed86cd681311b0 RSI: ffffa227abbb8000 RDI: 0000000000000000 [Fri Dec 31 17:17:53 2021] RBP: ffffffffc0fb7140 R08: 1ccdfbdba4713d98 R09: 43eb6b8080c52cf5 [Fri Dec 31 17:17:53 2021] R10: 868f90a009af8ef6 R11: b510ec77fbe15dfe R12: 18f6bee4b6c17038 [Fri Dec 31 17:17:53 2021] R13: ac1a3279de1c8752 R14: 18f32b4697183ceb R15: 08432106000034ca [Fri Dec 31 17:17:53 2021] FS: 0000000000000000(0000) GS:ffff96d7bfa80000(0000) knlGS:0000000000000000 [Fri Dec 31 17:17:53 2021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [Fri Dec 31 17:17:53 2021] CR2: ffffa227abbb8000 CR3: 00000006cdf94003 CR4: 00000000001706e0 [Fri Dec 31 17:17:53 2021] Call Trace: [Fri Dec 31 17:17:53 2021] ? SHA2Update+0x19f/0x1e0 [icp] [Fri Dec 31 17:17:53 2021] ? sha2_mac_atomic+0x213/0x320 [icp] [Fri Dec 31 17:17:53 2021] ? zap_leaf_array_match+0x14e/0x1c0 [zfs] [Fri Dec 31 17:17:53 2021] ? _cond_resched+0x15/0x30 [Fri Dec 31 17:17:53 2021] ? mutex_lock+0xe/0x30 [Fri Dec 31 17:17:53 2021] ? crypto_mac+0x292/0x390 [icp] [Fri Dec 31 17:17:53 2021] ? prep_new_page+0x89/0x100 [Fri Dec 31 17:17:53 2021] ? get_page_from_freelist+0x11eb/0x1330 [Fri Dec 31 17:17:53 2021] ? mod_hash_idkey_cmp+0x10/0x10 [icp] [Fri Dec 31 17:17:53 2021] ? i_mod_hash_find_nosync+0x62/0x90 [icp] [Fri Dec 31 17:17:53 2021] ? zio_crypt_do_hmac+0xc9/0x150 [zfs] [Fri Dec 31 17:17:53 2021] ? _cond_resched+0x15/0x30 [Fri Dec 31 17:17:53 2021] ? mutex_lock+0xe/0x30 [Fri Dec 31 17:17:53 2021] ? spa_crypto_key_compare+0x30/0x30 [zfs] [Fri Dec 31 17:17:53 2021] ? avl_find+0x58/0x90 [zavl] [Fri Dec 31 17:17:53 2021] ? zio_crypt_generate_iv_salt_dedup+0x2f/0x70 [zfs] [Fri Dec 31 17:17:53 2021] ? abd_borrow_buf+0x1f/0x40 [zfs] [Fri Dec 31 17:17:53 2021] ? abd_borrow_buf_copy+0x28/0x70 [zfs] [Fri Dec 31 17:17:53 2021] ? spa_do_crypt_abd+0x118/0x370 [zfs] [Fri Dec 31 17:17:53 2021] ? zio_encrypt+0x437/0x5f0 [zfs] [Fri Dec 31 17:17:53 2021] ? zio_write_compress+0x42/0x780 [zfs] [Fri Dec 31 17:17:53 2021] ? __wake_up_common_lock+0x87/0xc0 [Fri Dec 31 17:17:53 2021] ? zio_execute+0x90/0xf0 [zfs] [Fri Dec 31 17:17:53 2021] ? taskq_thread+0x2e7/0x530 [spl] [Fri Dec 31 17:17:53 2021] ? wake_up_q+0xa0/0xa0 [Fri Dec 31 17:17:53 2021] ? zio_execute+0x90/0xf0 [zfs] [Fri Dec 31 17:17:53 2021] ? taskq_thread+0x2e7/0x530 [spl] [Fri Dec 31 17:17:53 2021] ? wake_up_q+0xa0/0xa0 [Fri Dec 31 17:17:53 2021] ? zio_taskq_member.isra.11.constprop.17+0x60/0x60 [zfs] [Fri Dec 31 17:17:53 2021] ? taskq_thread_spawn+0x50/0x50 [spl] [Fri Dec 31 17:17:53 2021] ? kthread+0x116/0x130 [Fri Dec 31 17:17:53 2021] ? __kthread_cancel_work+0x40/0x40 [Fri Dec 31 17:17:53 2021] ? ret_from_fork+0x22/0x30 [Fri Dec 31 17:17:53 2021] Modules linked in: md4 sha512_ssse3 sha512_generic cmac nls_utf8 cifs libarc4 dns_resolver fscache libdes dell_rbu binfmt_misc intel_rapl_msr intel_rapl_common xfs nls_ascii libcrc3 2c sb_edac nls_cp437 vfat x86_pkg_temp_thermal intel_powerclamp fat coretemp kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel libaes crypto_simd cryptd dcdbas glue_helper mgag200 rapl inte l_cstate intel_uncore drm_kms_helper cec iTCO_wdt intel_pmc_bxt iTCO_vendor_support efi_pstore pcspkr mxm_wmi watchdog drm joydev evdev mei_me mei zfs(POE) zunicode(POE) zzstd(OE) zlua(OE) zavl(POE) icp(POE) zcommon(POE) znvpair(POE) spl(OE) ipmi_ssif sg ipmi_si ipmi_devintf ipmi_msghandler acpi_power_meter button efivarfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic dm_mod hid_generic usbhid hid sd_mod t10_pi crc_t10dif crct10dif_generic xhci_pci ahci xhci_hcd libahci libata ehci_pci megaraid_sas ehci_hcd crct10dif_pclmul crct10dif_common crc32c_intel igb usbcore scsi_mod [Fri Dec 31 17:17:53 2021] i2c_algo_bit lpc_ich dca ptp usb_common pps_core wmi [Fri Dec 31 17:17:53 2021] CR2: ffffa227abbb8000 [Fri Dec 31 17:17:53 2021] ---[ end trace 28f3f76f9b905b05 ]--- [Fri Dec 31 17:17:53 2021] RIP: 0010:SHA512TransformBlocks+0x83/0x1340 [icp] [Fri Dec 31 17:17:53 2021] Code: 48 8b 4f 10 48 8b 57 18 4c 8b 47 20 4c 8b 4f 28 4c 8b 57 30 4c 8b 5f 38 eb 0d 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 31 ff <4c> 8b 26 49 0f cc 4d 89 c5 4d 89 c6 4d 89 cf 49 c1 cd 0e 49 c1 ce [Fri Dec 31 17:17:53 2021] RSP: 0018:ffffa2274489b680 EFLAGS: 00010246 [Fri Dec 31 17:17:53 2021] RAX: 63db297cd38fdb11 RBX: a49ea88c578a8401 RCX: e602f3b255d62954 [Fri Dec 31 17:17:53 2021] RDX: 6bed86cd681311b0 RSI: ffffa227abbb8000 RDI: 0000000000000000 [Fri Dec 31 17:17:53 2021] RBP: ffffffffc0fb7140 R08: 1ccdfbdba4713d98 R09: 43eb6b8080c52cf5 [Fri Dec 31 17:17:53 2021] R10: 868f90a009af8ef6 R11: b510ec77fbe15dfe R12: 18f6bee4b6c17038 [Fri Dec 31 17:17:53 2021] R13: ac1a3279de1c8752 R14: 18f32b4697183ceb R15: 08432106000034ca [Fri Dec 31 17:17:53 2021] FS: 0000000000000000(0000) GS:ffff96d7bfa80000(0000) knlGS:0000000000000000 [Fri Dec 31 17:17:53 2021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [Fri Dec 31 17:17:53 2021] CR2: ffffa227abbb8000 CR3: 00000006cdf94003 CR4: 00000000001706e0 ```
1.0
Crash under IO load when using both encryption and deduplication - <!-- Please fill out the following template, which will help other contributors address your issue. --> <!-- Thank you for reporting an issue. *IMPORTANT* - Please check our issue tracker before opening a new issue. Additional valuable information can be found in the OpenZFS documentation and mailing list archives. Please fill in as much of the template as possible. --> ### System information <!-- add version after "|" character --> Type | Version/Name --- | --- Distribution Name | Debian Distribution Version | Buster Kernel Version | `4.19.0-18-amd64` and `5.10.0-0.bpo.9-amd64` Architecture | 64bit OpenZFS Version | `0.8.5-3~bpo10+1` and `2.0.3-9~bpo10+1` <!-- Command to find OpenZFS version: zfs version Commands to find kernel version: uname -r # Linux freebsd-version -r # FreeBSD --> ### Describe the problem you're observing Crash under IO load with a dataset for which both encryption and deduplication are used. ### Describe how to reproduce the problem We don't have a simple repro (yet). - We start with the empty `/somewhere/data` dataset for which both deduplication and encryption is enabled - We populate `/somewhere/data/_files` with various data files (JSON, images and proprietary binary files) - There are `16427` files in there - To engage a bit of deduplication we `cp -pR /somewhere/data/_files /somewhere/data/_files-copy` - Then we launch a Python multiprocess tool that does the following for each worker: - Create a temporary directory within `/somewhere/data/_tmp` with `tempfile.TemporaryDirectory` - Copy files from `/somewhere/data/_files` to `/somewhere/data/_tmp/in` - Files in `/somewhere/data/_tmp/in` are in various sub-folders - Create the `/somewhere/data/_tmp/intermediate1` and `/somewhere/data/_tmp/intermediate2` directories - Spawn another tool programmed in C that does the following: - Copy some files from `/somewhere/data/_tmp/in` to `/somewhere/data/_tmp/intermediate1` - Create some files in `/somewhere/data/_tmp/in` and `/somewhere/data/_tmp/intermediate2` - Create files in `/somewhere/data/_files /somewhere/data/_out` That Python multiprocess tool doesn't run long before ZFS crashes. There are at most `12` workers and we managed to crash the filesystem with `4` workers. We ran that second native tool through `valgrind` and found no memory bug. We doubt a user land program can crash ZFS anyway. When the crash happens, - The `DDT` is using about `10GB` of memory (in `ARC`) - The `ARC` cache is about `100GB` (its optimal size). According to our graphs - Wwe are not running out of memory (`192GB` in total) We're able to reproduce the crash on a fresh and smaller pool on the same machine with both kernel versions. Kernel version | ZFS version | Configuration | Result --- | --- | --- | --- `4.19.0-18-amd64` | `0.8.5-3~bpo10+1` | encryption on / deduplication on | 💥 `4.19.0-18-amd64` | `2.0.3-9~bpo10+1` | encryption on / deduplication on | 💥 `4.19.0-18-amd64` | `2.0.3-9~bpo10+1` | encryption off / deduplication off | ✔ `4.19.0-18-amd64` | `2.0.3-9~bpo10+1` | encryption on / deduplication off | ✔ `4.19.0-18-amd64` | `2.0.3-9~bpo10+1` | encryption off / deduplication on | ✔ `4.19.0-18-amd64` | `2.0.3-9~bpo10+1` | encryption on / deduplication on | 💥 `5.10.0-0.bpo.9-amd64` | `2.0.3-9~bpo10+1` | encryption on / deduplication on | 💥 `5.10.0-0.bpo.9-amd64` | `2.0.3-9~bpo10+1` | encryption on / deduplication off | ✔ ### Include any warning/errors/backtraces from the system logs Kernel `4.19.0-18-amd64`: ``` # dmesg -T ... [Fri Dec 31 12:57:55 2021] BUG: unable to handle kernel paging request at ffffae7de8a00000 [Fri Dec 31 12:57:55 2021] PGD 2fbf529067 P4D 2fbf529067 PUD 2f77a0a067 PMD 2e94fa6067 PTE 0 [Fri Dec 31 12:57:55 2021] Oops: 0000 [#1] SMP PTI [Fri Dec 31 12:57:55 2021] CPU: 3 PID: 1195 Comm: z_wr_iss Tainted: P OE 4.19.0-18-amd64 #1 Debian 4.19.208-1 [Fri Dec 31 12:57:55 2021] Hardware name: Dell Inc. PowerEdge T630/0W9WXC, BIOS 2.11.0 12/23/2019 [Fri Dec 31 12:57:55 2021] RIP: 0010:SHA512TransformBlocks+0x83/0x1340 [icp] [Fri Dec 31 12:57:55 2021] Code: 48 8b 4f 10 48 8b 57 18 4c 8b 47 20 4c 8b 4f 28 4c 8b 57 30 4c 8b 5f 38 eb 0d 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 31 ff <4c> 8b 26 49 0f cc 4d 89 c5 4d 89 c6 4d 89 cf 49 c1 cd 0e 49 c1 ce [Fri Dec 31 12:57:55 2021] RSP: 0018:ffffae7da03e3680 EFLAGS: 00010246 [Fri Dec 31 12:57:55 2021] RAX: c31b301a02095284 RBX: c2c0fb90c3a277f3 RCX: 305038bc0a334cbd [Fri Dec 31 12:57:55 2021] RDX: 14742eeb7f10abd8 RSI: ffffae7de8a00000 RDI: 0000000000000000 [Fri Dec 31 12:57:55 2021] RBP: ffffffffc0d51140 R08: b4b1ad3f75e8aa89 R09: 7ec5620da1b0de77 [Fri Dec 31 12:57:55 2021] R10: 59f9a675d9df9382 R11: 864d3213f20a28e4 R12: 8fa555c4bb64780e [Fri Dec 31 12:57:55 2021] R13: de32ad31e7eb88a1 R14: 37d450af0dd6dceb R15: 01045023014618c3 [Fri Dec 31 12:57:55 2021] FS: 0000000000000000(0000) GS:ffff9c2dbf8c0000(0000) knlGS:0000000000000000 [Fri Dec 31 12:57:55 2021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [Fri Dec 31 12:57:55 2021] CR2: ffffae7de8a00000 CR3: 0000001ccea0a002 CR4: 00000000001606e0 [Fri Dec 31 12:57:55 2021] Call Trace: [Fri Dec 31 12:57:55 2021] ? swiotlb_map_sg_attrs+0x4c/0x120 [Fri Dec 31 12:57:55 2021] ? SHA2Update+0x19f/0x1e0 [icp] [Fri Dec 31 12:57:55 2021] ? sha2_mac_atomic+0x213/0x320 [icp] [Fri Dec 31 12:57:55 2021] ? blk_mq_sched_dispatch_requests+0x11e/0x170 [Fri Dec 31 12:57:55 2021] ? _cond_resched+0x15/0x30 [Fri Dec 31 12:57:55 2021] ? mutex_lock+0xe/0x30 [Fri Dec 31 12:57:55 2021] ? crypto_mac+0x292/0x390 [icp] [Fri Dec 31 12:57:55 2021] ? i_mod_hash_find_nosync+0x43/0x90 [icp] [Fri Dec 31 12:57:55 2021] ? mod_hash_idkey_cmp+0x10/0x10 [icp] [Fri Dec 31 12:57:55 2021] ? i_mod_hash_find_nosync+0x62/0x90 [icp] [Fri Dec 31 12:57:55 2021] ? zio_crypt_do_hmac+0xc9/0x150 [zfs] [Fri Dec 31 12:57:55 2021] ? spa_crypto_key_compare+0x30/0x30 [zfs] [Fri Dec 31 12:57:55 2021] ? avl_find+0x58/0x90 [zavl] [Fri Dec 31 12:57:55 2021] ? zio_crypt_generate_iv_salt_dedup+0x2f/0x70 [zfs] [Fri Dec 31 12:57:55 2021] ? load_balance+0x193/0xa00 [Fri Dec 31 12:57:55 2021] ? abd_borrow_buf+0x1f/0x40 [zfs] [Fri Dec 31 12:57:55 2021] ? abd_borrow_buf_copy+0x28/0x70 [zfs] [Fri Dec 31 12:57:55 2021] ? spa_do_crypt_abd+0x118/0x370 [zfs] [Fri Dec 31 12:57:55 2021] ? zio_encrypt+0x437/0x5f0 [zfs] [Fri Dec 31 12:57:55 2021] ? zio_write_compress+0x42/0x780 [zfs] [Fri Dec 31 12:57:55 2021] ? __schedule+0x2a7/0x840 [Fri Dec 31 12:57:55 2021] ? __wake_up_common_lock+0x89/0xc0 [Fri Dec 31 12:57:55 2021] ? zio_execute+0x90/0xf0 [zfs] [Fri Dec 31 12:57:55 2021] ? taskq_thread+0x2e7/0x530 [spl] [Fri Dec 31 12:57:55 2021] ? wake_up_q+0x70/0x70 [Fri Dec 31 12:57:55 2021] ? zio_taskq_member.isra.10.constprop.16+0x60/0x60 [zfs] [Fri Dec 31 12:57:55 2021] ? taskq_thread_spawn+0x50/0x50 [spl] [Fri Dec 31 12:57:55 2021] ? kthread+0x112/0x130 [Fri Dec 31 12:57:55 2021] ? kthread_bind+0x30/0x30 [Fri Dec 31 12:57:55 2021] ? ret_from_fork+0x35/0x40 [Fri Dec 31 12:57:55 2021] Modules linked in: arc4 md4 sha512_ssse3 sha512_generic cmac nls_utf8 cifs ccm dns_resolver fscache dell_rbu binfmt_misc nls_ascii nls_cp437 vfat fat xfs libcrc32c intel_rapl sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass mxm_wmi crct10dif_pclmul crc32_pclmul ghash_clmulni_intel dcdbas intel_cstate mgag200 intel_uncore ttm efi_pstore intel_rapl_perf efivars pcspkr drm_kms_helper drm iTCO_wdt evdev joydev iTCO_vendor_support mei_me mei zfs(POE) zunicode(POE) zzstd(OE) zlua(OE) zavl(POE) icp(POE) ipmi_ssif zcommon(POE) znvpair(POE) spl(OE) sg ipmi_si ipmi_devintf ipmi_msghandler wmi pcc_cpufreq acpi_power_meter button efivarfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic fscrypto ecb dm_mod hid_generic usbhid hid sd_mod crc32c_intel xhci_pci [Fri Dec 31 12:57:55 2021] ahci xhci_hcd libahci aesni_intel ehci_pci libata ehci_hcd aes_x86_64 crypto_simd cryptd megaraid_sas glue_helper usbcore igb scsi_mod lpc_ich mfd_core i2c_algo_bit dca usb_common [Fri Dec 31 12:57:55 2021] CR2: ffffae7de8a00000 [Fri Dec 31 12:57:55 2021] ---[ end trace 26c4fbf30e1b8ea1 ]--- [Fri Dec 31 12:57:55 2021] RIP: 0010:SHA512TransformBlocks+0x83/0x1340 [icp] [Fri Dec 31 12:57:55 2021] Code: 48 8b 4f 10 48 8b 57 18 4c 8b 47 20 4c 8b 4f 28 4c 8b 57 30 4c 8b 5f 38 eb 0d 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 31 ff <4c> 8b 26 49 0f cc 4d 89 c5 4d 89 c6 4d 89 cf 49 c1 cd 0e 49 c1 ce [Fri Dec 31 12:57:55 2021] RSP: 0018:ffffae7da03e3680 EFLAGS: 00010246 [Fri Dec 31 12:57:55 2021] RAX: c31b301a02095284 RBX: c2c0fb90c3a277f3 RCX: 305038bc0a334cbd [Fri Dec 31 12:57:55 2021] RDX: 14742eeb7f10abd8 RSI: ffffae7de8a00000 RDI: 0000000000000000 [Fri Dec 31 12:57:55 2021] RBP: ffffffffc0d51140 R08: b4b1ad3f75e8aa89 R09: 7ec5620da1b0de77 [Fri Dec 31 12:57:55 2021] R10: 59f9a675d9df9382 R11: 864d3213f20a28e4 R12: 8fa555c4bb64780e [Fri Dec 31 12:57:55 2021] R13: de32ad31e7eb88a1 R14: 37d450af0dd6dceb R15: 01045023014618c3 [Fri Dec 31 12:57:55 2021] FS: 0000000000000000(0000) GS:ffff9c2dbf8c0000(0000) knlGS:0000000000000000 [Fri Dec 31 12:57:55 2021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [Fri Dec 31 12:57:55 2021] CR2: ffffae7de8a00000 CR3: 0000001ccea0a002 CR4: 00000000001606e0 ``` Kernel `5.10.0-0.bpo.9-amd64` ``` # dmesg -T ... [Fri Dec 31 17:17:53 2021] BUG: unable to handle page fault for address: ffffa227abbb8000 [Fri Dec 31 17:17:53 2021] #PF: supervisor read access in kernel mode [Fri Dec 31 17:17:53 2021] #PF: error_code(0x0000) - not-present page [Fri Dec 31 17:17:53 2021] PGD 100000067 P4D 100000067 PUD 3e5956067 PMD ab96c4067 PTE 0 [Fri Dec 31 17:17:53 2021] Oops: 0000 [#1] SMP PTI [Fri Dec 31 17:17:53 2021] CPU: 2 PID: 1173 Comm: z_wr_iss Tainted: P OE 5.10.0-0.bpo.9-amd64 #1 Debian 5.10.70-1~bpo10+1 [Fri Dec 31 17:17:53 2021] Hardware name: Dell Inc. PowerEdge T630/0W9WXC, BIOS 2.11.0 12/23/2019 [Fri Dec 31 17:17:53 2021] RIP: 0010:SHA512TransformBlocks+0x83/0x1340 [icp] [Fri Dec 31 17:17:53 2021] Code: 48 8b 4f 10 48 8b 57 18 4c 8b 47 20 4c 8b 4f 28 4c 8b 57 30 4c 8b 5f 38 eb 0d 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 31 ff <4c> 8b 26 49 0f cc 4d 89 c5 4d 89 c6 4d 89 cf 49 c1 cd 0e 49 c1 ce [Fri Dec 31 17:17:53 2021] RSP: 0018:ffffa2274489b680 EFLAGS: 00010246 [Fri Dec 31 17:17:53 2021] RAX: 63db297cd38fdb11 RBX: a49ea88c578a8401 RCX: e602f3b255d62954 [Fri Dec 31 17:17:53 2021] RDX: 6bed86cd681311b0 RSI: ffffa227abbb8000 RDI: 0000000000000000 [Fri Dec 31 17:17:53 2021] RBP: ffffffffc0fb7140 R08: 1ccdfbdba4713d98 R09: 43eb6b8080c52cf5 [Fri Dec 31 17:17:53 2021] R10: 868f90a009af8ef6 R11: b510ec77fbe15dfe R12: 18f6bee4b6c17038 [Fri Dec 31 17:17:53 2021] R13: ac1a3279de1c8752 R14: 18f32b4697183ceb R15: 08432106000034ca [Fri Dec 31 17:17:53 2021] FS: 0000000000000000(0000) GS:ffff96d7bfa80000(0000) knlGS:0000000000000000 [Fri Dec 31 17:17:53 2021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [Fri Dec 31 17:17:53 2021] CR2: ffffa227abbb8000 CR3: 00000006cdf94003 CR4: 00000000001706e0 [Fri Dec 31 17:17:53 2021] Call Trace: [Fri Dec 31 17:17:53 2021] ? SHA2Update+0x19f/0x1e0 [icp] [Fri Dec 31 17:17:53 2021] ? sha2_mac_atomic+0x213/0x320 [icp] [Fri Dec 31 17:17:53 2021] ? zap_leaf_array_match+0x14e/0x1c0 [zfs] [Fri Dec 31 17:17:53 2021] ? _cond_resched+0x15/0x30 [Fri Dec 31 17:17:53 2021] ? mutex_lock+0xe/0x30 [Fri Dec 31 17:17:53 2021] ? crypto_mac+0x292/0x390 [icp] [Fri Dec 31 17:17:53 2021] ? prep_new_page+0x89/0x100 [Fri Dec 31 17:17:53 2021] ? get_page_from_freelist+0x11eb/0x1330 [Fri Dec 31 17:17:53 2021] ? mod_hash_idkey_cmp+0x10/0x10 [icp] [Fri Dec 31 17:17:53 2021] ? i_mod_hash_find_nosync+0x62/0x90 [icp] [Fri Dec 31 17:17:53 2021] ? zio_crypt_do_hmac+0xc9/0x150 [zfs] [Fri Dec 31 17:17:53 2021] ? _cond_resched+0x15/0x30 [Fri Dec 31 17:17:53 2021] ? mutex_lock+0xe/0x30 [Fri Dec 31 17:17:53 2021] ? spa_crypto_key_compare+0x30/0x30 [zfs] [Fri Dec 31 17:17:53 2021] ? avl_find+0x58/0x90 [zavl] [Fri Dec 31 17:17:53 2021] ? zio_crypt_generate_iv_salt_dedup+0x2f/0x70 [zfs] [Fri Dec 31 17:17:53 2021] ? abd_borrow_buf+0x1f/0x40 [zfs] [Fri Dec 31 17:17:53 2021] ? abd_borrow_buf_copy+0x28/0x70 [zfs] [Fri Dec 31 17:17:53 2021] ? spa_do_crypt_abd+0x118/0x370 [zfs] [Fri Dec 31 17:17:53 2021] ? zio_encrypt+0x437/0x5f0 [zfs] [Fri Dec 31 17:17:53 2021] ? zio_write_compress+0x42/0x780 [zfs] [Fri Dec 31 17:17:53 2021] ? __wake_up_common_lock+0x87/0xc0 [Fri Dec 31 17:17:53 2021] ? zio_execute+0x90/0xf0 [zfs] [Fri Dec 31 17:17:53 2021] ? taskq_thread+0x2e7/0x530 [spl] [Fri Dec 31 17:17:53 2021] ? wake_up_q+0xa0/0xa0 [Fri Dec 31 17:17:53 2021] ? zio_execute+0x90/0xf0 [zfs] [Fri Dec 31 17:17:53 2021] ? taskq_thread+0x2e7/0x530 [spl] [Fri Dec 31 17:17:53 2021] ? wake_up_q+0xa0/0xa0 [Fri Dec 31 17:17:53 2021] ? zio_taskq_member.isra.11.constprop.17+0x60/0x60 [zfs] [Fri Dec 31 17:17:53 2021] ? taskq_thread_spawn+0x50/0x50 [spl] [Fri Dec 31 17:17:53 2021] ? kthread+0x116/0x130 [Fri Dec 31 17:17:53 2021] ? __kthread_cancel_work+0x40/0x40 [Fri Dec 31 17:17:53 2021] ? ret_from_fork+0x22/0x30 [Fri Dec 31 17:17:53 2021] Modules linked in: md4 sha512_ssse3 sha512_generic cmac nls_utf8 cifs libarc4 dns_resolver fscache libdes dell_rbu binfmt_misc intel_rapl_msr intel_rapl_common xfs nls_ascii libcrc3 2c sb_edac nls_cp437 vfat x86_pkg_temp_thermal intel_powerclamp fat coretemp kvm_intel kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel libaes crypto_simd cryptd dcdbas glue_helper mgag200 rapl inte l_cstate intel_uncore drm_kms_helper cec iTCO_wdt intel_pmc_bxt iTCO_vendor_support efi_pstore pcspkr mxm_wmi watchdog drm joydev evdev mei_me mei zfs(POE) zunicode(POE) zzstd(OE) zlua(OE) zavl(POE) icp(POE) zcommon(POE) znvpair(POE) spl(OE) ipmi_ssif sg ipmi_si ipmi_devintf ipmi_msghandler acpi_power_meter button efivarfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic dm_mod hid_generic usbhid hid sd_mod t10_pi crc_t10dif crct10dif_generic xhci_pci ahci xhci_hcd libahci libata ehci_pci megaraid_sas ehci_hcd crct10dif_pclmul crct10dif_common crc32c_intel igb usbcore scsi_mod [Fri Dec 31 17:17:53 2021] i2c_algo_bit lpc_ich dca ptp usb_common pps_core wmi [Fri Dec 31 17:17:53 2021] CR2: ffffa227abbb8000 [Fri Dec 31 17:17:53 2021] ---[ end trace 28f3f76f9b905b05 ]--- [Fri Dec 31 17:17:53 2021] RIP: 0010:SHA512TransformBlocks+0x83/0x1340 [icp] [Fri Dec 31 17:17:53 2021] Code: 48 8b 4f 10 48 8b 57 18 4c 8b 47 20 4c 8b 4f 28 4c 8b 57 30 4c 8b 5f 38 eb 0d 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 31 ff <4c> 8b 26 49 0f cc 4d 89 c5 4d 89 c6 4d 89 cf 49 c1 cd 0e 49 c1 ce [Fri Dec 31 17:17:53 2021] RSP: 0018:ffffa2274489b680 EFLAGS: 00010246 [Fri Dec 31 17:17:53 2021] RAX: 63db297cd38fdb11 RBX: a49ea88c578a8401 RCX: e602f3b255d62954 [Fri Dec 31 17:17:53 2021] RDX: 6bed86cd681311b0 RSI: ffffa227abbb8000 RDI: 0000000000000000 [Fri Dec 31 17:17:53 2021] RBP: ffffffffc0fb7140 R08: 1ccdfbdba4713d98 R09: 43eb6b8080c52cf5 [Fri Dec 31 17:17:53 2021] R10: 868f90a009af8ef6 R11: b510ec77fbe15dfe R12: 18f6bee4b6c17038 [Fri Dec 31 17:17:53 2021] R13: ac1a3279de1c8752 R14: 18f32b4697183ceb R15: 08432106000034ca [Fri Dec 31 17:17:53 2021] FS: 0000000000000000(0000) GS:ffff96d7bfa80000(0000) knlGS:0000000000000000 [Fri Dec 31 17:17:53 2021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [Fri Dec 31 17:17:53 2021] CR2: ffffa227abbb8000 CR3: 00000006cdf94003 CR4: 00000000001706e0 ```
defect
crash under io load when using both encryption and deduplication thank you for reporting an issue important please check our issue tracker before opening a new issue additional valuable information can be found in the openzfs documentation and mailing list archives please fill in as much of the template as possible system information type version name distribution name debian distribution version buster kernel version and bpo architecture openzfs version and command to find openzfs version zfs version commands to find kernel version uname r linux freebsd version r freebsd describe the problem you re observing crash under io load with a dataset for which both encryption and deduplication are used describe how to reproduce the problem we don t have a simple repro yet we start with the empty somewhere data dataset for which both deduplication and encryption is enabled we populate somewhere data files with various data files json images and proprietary binary files there are files in there to engage a bit of deduplication we cp pr somewhere data files somewhere data files copy then we launch a python multiprocess tool that does the following for each worker create a temporary directory within somewhere data tmp with tempfile temporarydirectory copy files from somewhere data files to somewhere data tmp in files in somewhere data tmp in are in various sub folders create the somewhere data tmp and somewhere data tmp directories spawn another tool programmed in c that does the following copy some files from somewhere data tmp in to somewhere data tmp create some files in somewhere data tmp in and somewhere data tmp create files in somewhere data files somewhere data out that python multiprocess tool doesn t run long before zfs crashes there are at most workers and we managed to crash the filesystem with workers we ran that second native tool through valgrind and found no memory bug we doubt a user land program can crash zfs anyway when the crash happens the ddt is using about of memory in arc the arc cache is about its optimal size according to our graphs wwe are not running out of memory in total we re able to reproduce the crash on a fresh and smaller pool on the same machine with both kernel versions kernel version zfs version configuration result encryption on deduplication on 💥 encryption on deduplication on 💥 encryption off deduplication off ✔ encryption on deduplication off ✔ encryption off deduplication on ✔ encryption on deduplication on 💥 bpo encryption on deduplication on 💥 bpo encryption on deduplication off ✔ include any warning errors backtraces from the system logs kernel dmesg t bug unable to handle kernel paging request at pgd pud pmd pte oops smp pti cpu pid comm z wr iss tainted p oe debian hardware name dell inc poweredge bios rip code eb ff cc cf cd ce rsp eflags rax rbx rcx rdx rsi rdi rbp fs gs knlgs cs ds es call trace swiotlb map sg attrs mac atomic blk mq sched dispatch requests cond resched mutex lock crypto mac i mod hash find nosync mod hash idkey cmp i mod hash find nosync zio crypt do hmac spa crypto key compare avl find zio crypt generate iv salt dedup load balance abd borrow buf abd borrow buf copy spa do crypt abd zio encrypt zio write compress schedule wake up common lock zio execute taskq thread wake up q zio taskq member isra constprop taskq thread spawn kthread kthread bind ret from fork modules linked in generic cmac nls cifs ccm dns resolver fscache dell rbu binfmt misc nls ascii nls vfat fat xfs intel rapl sb edac pkg temp thermal intel powerclamp coretemp kvm intel kvm irqbypass mxm wmi pclmul pclmul ghash clmulni intel dcdbas intel cstate intel uncore ttm efi pstore intel rapl perf efivars pcspkr drm kms helper drm itco wdt evdev joydev itco vendor support mei me mei zfs poe zunicode poe zzstd oe zlua oe zavl poe icp poe ipmi ssif zcommon poe znvpair poe spl oe sg ipmi si ipmi devintf ipmi msghandler wmi pcc cpufreq acpi power meter button efivarfs ip tables x tables mbcache generic fscrypto ecb dm mod hid generic usbhid hid sd mod intel xhci pci ahci xhci hcd libahci aesni intel ehci pci libata ehci hcd aes crypto simd cryptd megaraid sas glue helper usbcore igb scsi mod lpc ich mfd core algo bit dca usb common rip code eb ff cc cf cd ce rsp eflags rax rbx rcx rdx rsi rdi rbp fs gs knlgs cs ds es kernel bpo dmesg t bug unable to handle page fault for address pf supervisor read access in kernel mode pf error code not present page pgd pud pmd pte oops smp pti cpu pid comm z wr iss tainted p oe bpo debian hardware name dell inc poweredge bios rip code eb ff cc cf cd ce rsp eflags rax rbx rcx rdx rsi rdi rbp fs gs knlgs cs ds es call trace mac atomic zap leaf array match cond resched mutex lock crypto mac prep new page get page from freelist mod hash idkey cmp i mod hash find nosync zio crypt do hmac cond resched mutex lock spa crypto key compare avl find zio crypt generate iv salt dedup abd borrow buf abd borrow buf copy spa do crypt abd zio encrypt zio write compress wake up common lock zio execute taskq thread wake up q zio execute taskq thread wake up q zio taskq member isra constprop taskq thread spawn kthread kthread cancel work ret from fork modules linked in generic cmac nls cifs dns resolver fscache libdes dell rbu binfmt misc intel rapl msr intel rapl common xfs nls ascii sb edac nls vfat pkg temp thermal intel powerclamp fat coretemp kvm intel kvm irqbypass pclmul ghash clmulni intel aesni intel libaes crypto simd cryptd dcdbas glue helper rapl inte l cstate intel uncore drm kms helper cec itco wdt intel pmc bxt itco vendor support efi pstore pcspkr mxm wmi watchdog drm joydev evdev mei me mei zfs poe zunicode poe zzstd oe zlua oe zavl poe icp poe zcommon poe znvpair poe spl oe ipmi ssif sg ipmi si ipmi devintf ipmi msghandler acpi power meter button efivarfs ip tables x tables mbcache generic dm mod hid generic usbhid hid sd mod pi crc generic xhci pci ahci xhci hcd libahci libata ehci pci megaraid sas ehci hcd pclmul common intel igb usbcore scsi mod algo bit lpc ich dca ptp usb common pps core wmi rip code eb ff cc cf cd ce rsp eflags rax rbx rcx rdx rsi rdi rbp fs gs knlgs cs ds es
1
66,168
20,025,812,093
IssuesEvent
2022-02-01 21:10:28
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
opened
spoilers leak pins
T-Defect
### Steps to reproduce 1. send `/spoiler @room` or something ### Outcome #### What did you expect? if it's going to be blurred by spoiler tag, then it shouldn't leak #### What happened instead? ping and visual highlight etc ### Operating system arch ### Application version nightly ### How did you install the app? aur ### Homeserver _No response_ ### Will you send logs? No
1.0
spoilers leak pins - ### Steps to reproduce 1. send `/spoiler @room` or something ### Outcome #### What did you expect? if it's going to be blurred by spoiler tag, then it shouldn't leak #### What happened instead? ping and visual highlight etc ### Operating system arch ### Application version nightly ### How did you install the app? aur ### Homeserver _No response_ ### Will you send logs? No
defect
spoilers leak pins steps to reproduce send spoiler room or something outcome what did you expect if it s going to be blurred by spoiler tag then it shouldn t leak what happened instead ping and visual highlight etc operating system arch application version nightly how did you install the app aur homeserver no response will you send logs no
1
308,575
9,440,922,726
IssuesEvent
2019-04-14 21:28:19
orange-alliance/the-orange-alliance
https://api.github.com/repos/orange-alliance/the-orange-alliance
closed
Add tab to Events for Stats
Low Priority enhancement in progress
- [x] Highest Score - [x] Average Match Score - [x] Average Winning Score - [x] Average Win Margin
1.0
Add tab to Events for Stats - - [x] Highest Score - [x] Average Match Score - [x] Average Winning Score - [x] Average Win Margin
non_defect
add tab to events for stats highest score average match score average winning score average win margin
0
396,365
11,708,440,116
IssuesEvent
2020-03-08 13:19:54
MelbourneHighSchoolRobotics/RCJA_Registration_System
https://api.github.com/repos/MelbourneHighSchoolRobotics/RCJA_Registration_System
closed
Division state validation
Priority bug
Check team event state matches division state Validate state change on division
1.0
Division state validation - Check team event state matches division state Validate state change on division
non_defect
division state validation check team event state matches division state validate state change on division
0
216,773
16,668,577,979
IssuesEvent
2021-06-07 08:07:07
SeoulNative/naengboo
https://api.github.com/repos/SeoulNative/naengboo
closed
github fork를 사용해야하는 이유에 관하여
documentation question
# What - repo를 fork해서 작업해야하는 이유 정리 - repo fork를 사용하지 않고 그대로 origin repo에서 branch 활용해서 작업하는 방향으로의 회귀 제안 찬/반 + 근거 정리해주시면, 의견 취합해서 결정하고, 다시는 이의제기하지 않도록 하겠습니다 😂 # Description 내부 회의를 통해 repo를 fork해서 작업하는 방향으로 정리했었는데요. 제가 새로운 작업을 위해 fork하려다가, 근데 왜 fork 해야 하는지에 대해서 궁금해서 조사해보았고, 우리 팀의 경우에는 안해도 될 것 같단 생각이 들어 의견을 묻고 싶어 공유드립니다. https://stackoverflow.com/questions/31209669/github-why-should-i-fork 관련 Stackoverflow 질문인데, 질문자는 저와 동일하게 branch를 사용하면 되는데 fork를 굳이 해야하는 이유를 묻고 있습니다. 답변을 정리해보면 - 대부분의 오픈소스 프로젝트에 branch를 생성할 권한 자체가 기본적으로 주어지지 않는다. - 그래서 fork를 한 후, 해당 repo에 작업하고, origin repo로 PR을 날리는 것이 '예의바른' 방법이다. - 사실 권한이 없으면 그냥 clone해서 local에서 branch 파고 작업하고 push 날려도 permission denied 당한다 - 혹은 해당 프로젝트에 대해서 자신의 아이디어로 변경하고 싶다거나, 실험을 하고 싶다거나 하면 fork해서 작업한다. - fork 자체가 github에서 기원한 개념이다. git에는 해당 개념이 없다. - 만약 네가 원본 repo에 권한이 있다면 fork를 하지 않아도 된다. 그리고 이번 PR 진행하면서도 불편함을 느낀 것은, 같은 repo branch에서 작업하면, remote branch로 쉽게 checkout하여 IDE 상에서 코드를 확인할수도 있고, 코드를 돌려볼 수도 있는데, 각각 fork해서 작업하면 작업내역을 확인하고 싶을 때마다 fork된 repo를 clone해서 확인해야한다는 불편함이 있는 것 같습니다. # Related None <!-- 혹시 관련된 링크나, 이슈나, PR이 있으면 적습니다 -->
1.0
github fork를 사용해야하는 이유에 관하여 - # What - repo를 fork해서 작업해야하는 이유 정리 - repo fork를 사용하지 않고 그대로 origin repo에서 branch 활용해서 작업하는 방향으로의 회귀 제안 찬/반 + 근거 정리해주시면, 의견 취합해서 결정하고, 다시는 이의제기하지 않도록 하겠습니다 😂 # Description 내부 회의를 통해 repo를 fork해서 작업하는 방향으로 정리했었는데요. 제가 새로운 작업을 위해 fork하려다가, 근데 왜 fork 해야 하는지에 대해서 궁금해서 조사해보았고, 우리 팀의 경우에는 안해도 될 것 같단 생각이 들어 의견을 묻고 싶어 공유드립니다. https://stackoverflow.com/questions/31209669/github-why-should-i-fork 관련 Stackoverflow 질문인데, 질문자는 저와 동일하게 branch를 사용하면 되는데 fork를 굳이 해야하는 이유를 묻고 있습니다. 답변을 정리해보면 - 대부분의 오픈소스 프로젝트에 branch를 생성할 권한 자체가 기본적으로 주어지지 않는다. - 그래서 fork를 한 후, 해당 repo에 작업하고, origin repo로 PR을 날리는 것이 '예의바른' 방법이다. - 사실 권한이 없으면 그냥 clone해서 local에서 branch 파고 작업하고 push 날려도 permission denied 당한다 - 혹은 해당 프로젝트에 대해서 자신의 아이디어로 변경하고 싶다거나, 실험을 하고 싶다거나 하면 fork해서 작업한다. - fork 자체가 github에서 기원한 개념이다. git에는 해당 개념이 없다. - 만약 네가 원본 repo에 권한이 있다면 fork를 하지 않아도 된다. 그리고 이번 PR 진행하면서도 불편함을 느낀 것은, 같은 repo branch에서 작업하면, remote branch로 쉽게 checkout하여 IDE 상에서 코드를 확인할수도 있고, 코드를 돌려볼 수도 있는데, 각각 fork해서 작업하면 작업내역을 확인하고 싶을 때마다 fork된 repo를 clone해서 확인해야한다는 불편함이 있는 것 같습니다. # Related None <!-- 혹시 관련된 링크나, 이슈나, PR이 있으면 적습니다 -->
non_defect
github fork를 사용해야하는 이유에 관하여 what repo를 fork해서 작업해야하는 이유 정리 repo fork를 사용하지 않고 그대로 origin repo에서 branch 활용해서 작업하는 방향으로의 회귀 제안 찬 반 근거 정리해주시면 의견 취합해서 결정하고 다시는 이의제기하지 않도록 하겠습니다 😂 description 내부 회의를 통해 repo를 fork해서 작업하는 방향으로 정리했었는데요 제가 새로운 작업을 위해 fork하려다가 근데 왜 fork 해야 하는지에 대해서 궁금해서 조사해보았고 우리 팀의 경우에는 안해도 될 것 같단 생각이 들어 의견을 묻고 싶어 공유드립니다 관련 stackoverflow 질문인데 질문자는 저와 동일하게 branch를 사용하면 되는데 fork를 굳이 해야하는 이유를 묻고 있습니다 답변을 정리해보면 대부분의 오픈소스 프로젝트에 branch를 생성할 권한 자체가 기본적으로 주어지지 않는다 그래서 fork를 한 후 해당 repo에 작업하고 origin repo로 pr을 날리는 것이 예의바른 방법이다 사실 권한이 없으면 그냥 clone해서 local에서 branch 파고 작업하고 push 날려도 permission denied 당한다 혹은 해당 프로젝트에 대해서 자신의 아이디어로 변경하고 싶다거나 실험을 하고 싶다거나 하면 fork해서 작업한다 fork 자체가 github에서 기원한 개념이다 git에는 해당 개념이 없다 만약 네가 원본 repo에 권한이 있다면 fork를 하지 않아도 된다 그리고 이번 pr 진행하면서도 불편함을 느낀 것은 같은 repo branch에서 작업하면 remote branch로 쉽게 checkout하여 ide 상에서 코드를 확인할수도 있고 코드를 돌려볼 수도 있는데 각각 fork해서 작업하면 작업내역을 확인하고 싶을 때마다 fork된 repo를 clone해서 확인해야한다는 불편함이 있는 것 같습니다 related none
0
818,404
30,687,628,623
IssuesEvent
2023-07-26 13:20:43
robotframework/robotframework
https://api.github.com/repos/robotframework/robotframework
closed
Parameterized types are not converted when used in union with `str` like `str | list[str]`
bug priority: high
After upgrading to Robot 6.1, I encounter unexpected type changes which seem to be linked to [Argument conversion changes](https://github.com/robotframework/robotframework/blob/master/doc/releasenotes/rf-6.1.rst#argument-conversion-changes) python --version >>Python 3.10.11 Please consider the following code: **.robot file:** `keyword {"key1":"val1", "key2": ["val2", "val3"]}` **keywords.py:** ``` import logging LOGGER = logging.getLogger(__name__) @keyword def keyword(events: dict[str, str | list[str]]): LOGGER.info(type(events["key2"])) return None ``` with Robot 6.0: >> [info] <class 'list'> with Robot 6.1: >> [info] <class 'str'> Note that if I change the type hint to "list[str] | str" instead of "str | list[str]", the result is the same as 6.0 (i.e list type). Obviously, this brings other problems when trying to access the dict values afterwards Could you please advise? I don't think it is intended to convert a list to a str Thanks
1.0
Parameterized types are not converted when used in union with `str` like `str | list[str]` - After upgrading to Robot 6.1, I encounter unexpected type changes which seem to be linked to [Argument conversion changes](https://github.com/robotframework/robotframework/blob/master/doc/releasenotes/rf-6.1.rst#argument-conversion-changes) python --version >>Python 3.10.11 Please consider the following code: **.robot file:** `keyword {"key1":"val1", "key2": ["val2", "val3"]}` **keywords.py:** ``` import logging LOGGER = logging.getLogger(__name__) @keyword def keyword(events: dict[str, str | list[str]]): LOGGER.info(type(events["key2"])) return None ``` with Robot 6.0: >> [info] <class 'list'> with Robot 6.1: >> [info] <class 'str'> Note that if I change the type hint to "list[str] | str" instead of "str | list[str]", the result is the same as 6.0 (i.e list type). Obviously, this brings other problems when trying to access the dict values afterwards Could you please advise? I don't think it is intended to convert a list to a str Thanks
non_defect
parameterized types are not converted when used in union with str like str  list after upgrading to robot i encounter unexpected type changes which seem to be linked to python version python please consider the following code robot file keyword keywords py import logging logger logging getlogger name keyword def keyword events dict logger info type events return none with robot with robot note that if i change the type hint to list str instead of str list the result is the same as i e list type obviously this brings other problems when trying to access the dict values afterwards could you please advise i don t think it is intended to convert a list to a str thanks
0
143,329
19,177,921,054
IssuesEvent
2021-12-04 00:05:48
samq-ghdemo/js-monorepo
https://api.github.com/repos/samq-ghdemo/js-monorepo
opened
CVE-2019-16775 (Medium) detected in npm-3.10.10.tgz
security vulnerability
## CVE-2019-16775 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>npm-3.10.10.tgz</b></p></summary> <p>a package manager for JavaScript</p> <p>Library home page: <a href="https://registry.npmjs.org/npm/-/npm-3.10.10.tgz">https://registry.npmjs.org/npm/-/npm-3.10.10.tgz</a></p> <p>Path to dependency file: js-monorepo/NodeGoat/package.json</p> <p>Path to vulnerable library: js-monorepo/NodeGoat/node_modules/npm/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - :x: **npm-3.10.10.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/js-monorepo/commit/f3701923c18333c1e4e49bf595dd36b3f186812f">f3701923c18333c1e4e49bf595dd36b3f186812f</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible for packages to create symlinks to files outside of thenode_modules folder through the bin field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user's system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. <p>Publish Date: 2019-12-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16775>CVE-2019-16775</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli">https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli</a></p> <p>Release Date: 2019-12-13</p> <p>Fix Resolution: npm - 6.13.3;yarn - 1.21.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm","packageVersion":"3.10.10","packageFilePaths":["/NodeGoat/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"npm - 6.13.3;yarn - 1.21.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2019-16775","vulnerabilityDetails":"Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible for packages to create symlinks to files outside of thenode_modules folder through the bin field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user\u0027s system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16775","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-16775 (Medium) detected in npm-3.10.10.tgz - ## CVE-2019-16775 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>npm-3.10.10.tgz</b></p></summary> <p>a package manager for JavaScript</p> <p>Library home page: <a href="https://registry.npmjs.org/npm/-/npm-3.10.10.tgz">https://registry.npmjs.org/npm/-/npm-3.10.10.tgz</a></p> <p>Path to dependency file: js-monorepo/NodeGoat/package.json</p> <p>Path to vulnerable library: js-monorepo/NodeGoat/node_modules/npm/package.json</p> <p> Dependency Hierarchy: - grunt-npm-install-0.3.1.tgz (Root Library) - :x: **npm-3.10.10.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/js-monorepo/commit/f3701923c18333c1e4e49bf595dd36b3f186812f">f3701923c18333c1e4e49bf595dd36b3f186812f</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible for packages to create symlinks to files outside of thenode_modules folder through the bin field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user's system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. <p>Publish Date: 2019-12-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16775>CVE-2019-16775</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli">https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli</a></p> <p>Release Date: 2019-12-13</p> <p>Fix Resolution: npm - 6.13.3;yarn - 1.21.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm","packageVersion":"3.10.10","packageFilePaths":["/NodeGoat/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"npm - 6.13.3;yarn - 1.21.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2019-16775","vulnerabilityDetails":"Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible for packages to create symlinks to files outside of thenode_modules folder through the bin field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user\u0027s system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16775","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_defect
cve medium detected in npm tgz cve medium severity vulnerability vulnerable library npm tgz a package manager for javascript library home page a href path to dependency file js monorepo nodegoat package json path to vulnerable library js monorepo nodegoat node modules npm package json dependency hierarchy grunt npm install tgz root library x npm tgz vulnerable library found in head commit a href found in base branch main vulnerability details versions of the npm cli prior to are vulnerable to an arbitrary file write it is possible for packages to create symlinks to files outside of thenode modules folder through the bin field upon installation a properly constructed entry in the package json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user s system when the package is installed this behavior is still possible through install scripts this vulnerability bypasses a user using the ignore scripts install option publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution npm yarn isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree grunt npm install npm isminimumfixversionavailable true minimumfixversion npm yarn isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails versions of the npm cli prior to are vulnerable to an arbitrary file write it is possible for packages to create symlinks to files outside of thenode modules folder through the bin field upon installation a properly constructed entry in the package json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user system when the package is installed this behavior is still possible through install scripts this vulnerability bypasses a user using the ignore scripts install option vulnerabilityurl
0
67,774
14,891,529,065
IssuesEvent
2021-01-21 00:58:11
kadirselcuk/gatsbyapp
https://api.github.com/repos/kadirselcuk/gatsbyapp
closed
CVE-2020-11023 (Medium) detected in jquery-3.1.1.slim.min.js
security vulnerability
## CVE-2020-11023 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-3.1.1.slim.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/jquery.slim.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/jquery.slim.min.js</a></p> <p>Path to dependency file: gatsbyapp/node_modules/eol/index.html</p> <p>Path to vulnerable library: gatsbyapp/node_modules/eol/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-3.1.1.slim.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kadirselcuk/gatsbyapp/commit/d1910758177e007c448040806e091f792a2ba595">d1910758177e007c448040806e091f792a2ba595</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-11023 (Medium) detected in jquery-3.1.1.slim.min.js - ## CVE-2020-11023 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-3.1.1.slim.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/jquery.slim.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/jquery.slim.min.js</a></p> <p>Path to dependency file: gatsbyapp/node_modules/eol/index.html</p> <p>Path to vulnerable library: gatsbyapp/node_modules/eol/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-3.1.1.slim.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kadirselcuk/gatsbyapp/commit/d1910758177e007c448040806e091f792a2ba595">d1910758177e007c448040806e091f792a2ba595</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve medium detected in jquery slim min js cve medium severity vulnerability vulnerable library jquery slim min js javascript library for dom operations library home page a href path to dependency file gatsbyapp node modules eol index html path to vulnerable library gatsbyapp node modules eol index html dependency hierarchy x jquery slim min js vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
53,000
13,260,067,489
IssuesEvent
2020-08-20 17:38:22
jkoan/test-navit
https://api.github.com/repos/jkoan/test-navit
closed
Duplicate Case value - garmin.c (Trac #87)
Incomplete Migration KaZeR Migrated from Trac defect/bug mapdrivers/Garmin
Migrated from http://trac.navit-project.org/ticket/87 ```json { "status": "closed", "changetime": "2008-02-08T16:53:02", "_ts": "1202489582000000", "description": "Make reports\n\n:garmin.c: In function 'garmin_obj2item':\ngarmin.c:413: error: duplicate case value\ngarmin.c:412: error: previously used here\n\nsolved by commenting out the first case statement, not really a solution though.\n\n", "reporter": "nick@asklater.com", "cc": "", "resolution": "fixed", "time": "2008-01-29T16:57:56", "component": "mapdrivers/Garmin", "summary": "Duplicate Case value - garmin.c", "priority": "major", "keywords": "garmin case", "version": "0.0.3", "milestone": "version 0.0.4", "owner": "KaZeR", "type": "defect/bug", "severity": "" } ```
1.0
Duplicate Case value - garmin.c (Trac #87) - Migrated from http://trac.navit-project.org/ticket/87 ```json { "status": "closed", "changetime": "2008-02-08T16:53:02", "_ts": "1202489582000000", "description": "Make reports\n\n:garmin.c: In function 'garmin_obj2item':\ngarmin.c:413: error: duplicate case value\ngarmin.c:412: error: previously used here\n\nsolved by commenting out the first case statement, not really a solution though.\n\n", "reporter": "nick@asklater.com", "cc": "", "resolution": "fixed", "time": "2008-01-29T16:57:56", "component": "mapdrivers/Garmin", "summary": "Duplicate Case value - garmin.c", "priority": "major", "keywords": "garmin case", "version": "0.0.3", "milestone": "version 0.0.4", "owner": "KaZeR", "type": "defect/bug", "severity": "" } ```
defect
duplicate case value garmin c trac migrated from json status closed changetime ts description make reports n n garmin c in function garmin ngarmin c error duplicate case value ngarmin c error previously used here n nsolved by commenting out the first case statement not really a solution though n n reporter nick asklater com cc resolution fixed time component mapdrivers garmin summary duplicate case value garmin c priority major keywords garmin case version milestone version owner kazer type defect bug severity
1
24,058
3,906,394,988
IssuesEvent
2016-04-19 08:40:25
contao/core
https://api.github.com/repos/contao/core
closed
newsletter ModuleSubscribe sets up wrong error variable when no channels are selected
defect
How to reproduce: create a page that contains mod_subscribe and mod_unsubscribe -> submit subscribe form w/o selecting any channels -> error message appears on unsubscribe form instead of subscribe form how to fix: substitute "UNSUBSCRIBE_ERROR" to "SUBSCRIBE_ERROR" in ModuleSubscribe.php line 207 (as of commit 4779b0c20e81ff4150d9cd48a95661f12e9b0480) see: https://github.com/contao/core/blob/4779b0c20e81ff4150d9cd48a95661f12e9b0480/system/modules/newsletter/modules/ModuleSubscribe.php might also appear in older version (3.4.5 is where i found it)
1.0
newsletter ModuleSubscribe sets up wrong error variable when no channels are selected - How to reproduce: create a page that contains mod_subscribe and mod_unsubscribe -> submit subscribe form w/o selecting any channels -> error message appears on unsubscribe form instead of subscribe form how to fix: substitute "UNSUBSCRIBE_ERROR" to "SUBSCRIBE_ERROR" in ModuleSubscribe.php line 207 (as of commit 4779b0c20e81ff4150d9cd48a95661f12e9b0480) see: https://github.com/contao/core/blob/4779b0c20e81ff4150d9cd48a95661f12e9b0480/system/modules/newsletter/modules/ModuleSubscribe.php might also appear in older version (3.4.5 is where i found it)
defect
newsletter modulesubscribe sets up wrong error variable when no channels are selected how to reproduce create a page that contains mod subscribe and mod unsubscribe submit subscribe form w o selecting any channels error message appears on unsubscribe form instead of subscribe form how to fix substitute unsubscribe error to subscribe error in modulesubscribe php line as of commit see might also appear in older version is where i found it
1
160,582
12,517,287,426
IssuesEvent
2020-06-03 10:52:14
aliasrobotics/RVD
https://api.github.com/repos/aliasrobotics/RVD
closed
RVD#2199: Use of possibly insecure function - consider using safer ast., /opt/ros_melodic_ws/src/ros_comm/roslaunch/src/roslaunch/substitution_args.py:347
bandit bug duplicate invalid static analysis testing triage
```yaml { "id": 2199, "title": "RVD#2199: Use of possibly insecure function - consider using safer ast., /opt/ros_melodic_ws/src/ros_comm/roslaunch/src/roslaunch/substitution_args.py:347", "type": "bug", "description": "HIGH confidence of MEDIUM severity bug. Use of possibly insecure function - consider using safer ast.literal_eval. at /opt/ros_melodic_ws/src/ros_comm/roslaunch/src/roslaunch/substitution_args.py:347 See links for more info on the bug.", "cwe": "None", "cve": "None", "keywords": [ "bandit", "bug", "static analysis", "testing", "triage", "bug" ], "system": "", "vendor": null, "severity": { "rvss-score": 0, "rvss-vector": "", "severity-description": "", "cvss-score": 0, "cvss-vector": "" }, "links": [ "https://github.com/aliasrobotics/RVD/issues/2199", "https://bandit.readthedocs.io/en/latest/blacklists/blacklist_calls.html#b307-eval" ], "flaw": { "phase": "testing", "specificity": "subject-specific", "architectural-location": "application-specific", "application": "N/A", "subsystem": "N/A", "package": "N/A", "languages": "None", "date-detected": "2020-06-02 (10:31)", "detected-by": "Alias Robotics", "detected-by-method": "testing static", "date-reported": "2020-06-02 (10:31)", "reported-by": "Alias Robotics", "reported-by-relationship": "automatic", "issue": "https://github.com/aliasrobotics/RVD/issues/2199", "reproducibility": "always", "trace": "/opt/ros_melodic_ws/src/ros_comm/roslaunch/src/roslaunch/substitution_args.py:347", "reproduction": "See artifacts below (if available)", "reproduction-image": "" }, "exploitation": { "description": "", "exploitation-image": "", "exploitation-vector": "" }, "mitigation": { "description": "", "pull-request": "", "date-mitigation": "" } } ```
1.0
RVD#2199: Use of possibly insecure function - consider using safer ast., /opt/ros_melodic_ws/src/ros_comm/roslaunch/src/roslaunch/substitution_args.py:347 - ```yaml { "id": 2199, "title": "RVD#2199: Use of possibly insecure function - consider using safer ast., /opt/ros_melodic_ws/src/ros_comm/roslaunch/src/roslaunch/substitution_args.py:347", "type": "bug", "description": "HIGH confidence of MEDIUM severity bug. Use of possibly insecure function - consider using safer ast.literal_eval. at /opt/ros_melodic_ws/src/ros_comm/roslaunch/src/roslaunch/substitution_args.py:347 See links for more info on the bug.", "cwe": "None", "cve": "None", "keywords": [ "bandit", "bug", "static analysis", "testing", "triage", "bug" ], "system": "", "vendor": null, "severity": { "rvss-score": 0, "rvss-vector": "", "severity-description": "", "cvss-score": 0, "cvss-vector": "" }, "links": [ "https://github.com/aliasrobotics/RVD/issues/2199", "https://bandit.readthedocs.io/en/latest/blacklists/blacklist_calls.html#b307-eval" ], "flaw": { "phase": "testing", "specificity": "subject-specific", "architectural-location": "application-specific", "application": "N/A", "subsystem": "N/A", "package": "N/A", "languages": "None", "date-detected": "2020-06-02 (10:31)", "detected-by": "Alias Robotics", "detected-by-method": "testing static", "date-reported": "2020-06-02 (10:31)", "reported-by": "Alias Robotics", "reported-by-relationship": "automatic", "issue": "https://github.com/aliasrobotics/RVD/issues/2199", "reproducibility": "always", "trace": "/opt/ros_melodic_ws/src/ros_comm/roslaunch/src/roslaunch/substitution_args.py:347", "reproduction": "See artifacts below (if available)", "reproduction-image": "" }, "exploitation": { "description": "", "exploitation-image": "", "exploitation-vector": "" }, "mitigation": { "description": "", "pull-request": "", "date-mitigation": "" } } ```
non_defect
rvd use of possibly insecure function consider using safer ast opt ros melodic ws src ros comm roslaunch src roslaunch substitution args py yaml id title rvd use of possibly insecure function consider using safer ast opt ros melodic ws src ros comm roslaunch src roslaunch substitution args py type bug description high confidence of medium severity bug use of possibly insecure function consider using safer ast literal eval at opt ros melodic ws src ros comm roslaunch src roslaunch substitution args py see links for more info on the bug cwe none cve none keywords bandit bug static analysis testing triage bug system vendor null severity rvss score rvss vector severity description cvss score cvss vector links flaw phase testing specificity subject specific architectural location application specific application n a subsystem n a package n a languages none date detected detected by alias robotics detected by method testing static date reported reported by alias robotics reported by relationship automatic issue reproducibility always trace opt ros melodic ws src ros comm roslaunch src roslaunch substitution args py reproduction see artifacts below if available reproduction image exploitation description exploitation image exploitation vector mitigation description pull request date mitigation
0
189,261
14,496,438,476
IssuesEvent
2020-12-11 12:47:37
kalexmills/github-vet-tests-dec2020
https://api.github.com/repos/kalexmills/github-vet-tests-dec2020
closed
Eric-GreenComb/hyperledger-fabric-gm: gossip/gossip/orgs_test.go; 14 LoC
fresh small test
Found a possible issue in [Eric-GreenComb/hyperledger-fabric-gm](https://www.github.com/Eric-GreenComb/hyperledger-fabric-gm) at [gossip/gossip/orgs_test.go](https://github.com/Eric-GreenComb/hyperledger-fabric-gm/blob/b90058eac49c9412964edbca118f4ea04ff224d8/gossip/gossip/orgs_test.go#L398-L411) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > range-loop variable ch used in defer or goroutine at line 406 [Click here to see the code in its original context.](https://github.com/Eric-GreenComb/hyperledger-fabric-gm/blob/b90058eac49c9412964edbca118f4ea04ff224d8/gossip/gossip/orgs_test.go#L398-L411) <details> <summary>Click here to show the 14 line(s) of Go which triggered the analyzer.</summary> ```go for _, ch := range channels { if isOrgInChan(org, ch) { for _, p := range peers { p.JoinChan(joinChanMsgsByChan[ch], common.ChainID(ch)) p.UpdateLedgerHeight(1, common.ChainID(ch)) go func(p Gossip) { for i := 0; i < 5; i++ { time.Sleep(time.Second) p.UpdateLedgerHeight(1, common.ChainID(ch)) } }(p) } } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: b90058eac49c9412964edbca118f4ea04ff224d8
1.0
Eric-GreenComb/hyperledger-fabric-gm: gossip/gossip/orgs_test.go; 14 LoC - Found a possible issue in [Eric-GreenComb/hyperledger-fabric-gm](https://www.github.com/Eric-GreenComb/hyperledger-fabric-gm) at [gossip/gossip/orgs_test.go](https://github.com/Eric-GreenComb/hyperledger-fabric-gm/blob/b90058eac49c9412964edbca118f4ea04ff224d8/gossip/gossip/orgs_test.go#L398-L411) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > range-loop variable ch used in defer or goroutine at line 406 [Click here to see the code in its original context.](https://github.com/Eric-GreenComb/hyperledger-fabric-gm/blob/b90058eac49c9412964edbca118f4ea04ff224d8/gossip/gossip/orgs_test.go#L398-L411) <details> <summary>Click here to show the 14 line(s) of Go which triggered the analyzer.</summary> ```go for _, ch := range channels { if isOrgInChan(org, ch) { for _, p := range peers { p.JoinChan(joinChanMsgsByChan[ch], common.ChainID(ch)) p.UpdateLedgerHeight(1, common.ChainID(ch)) go func(p Gossip) { for i := 0; i < 5; i++ { time.Sleep(time.Second) p.UpdateLedgerHeight(1, common.ChainID(ch)) } }(p) } } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: b90058eac49c9412964edbca118f4ea04ff224d8
non_defect
eric greencomb hyperledger fabric gm gossip gossip orgs test go loc found a possible issue in at below is the message reported by the analyzer for this snippet of code beware that the analyzer only reports the first issue it finds so please do not limit your consideration to the contents of the below message range loop variable ch used in defer or goroutine at line click here to show the line s of go which triggered the analyzer go for ch range channels if isorginchan org ch for p range peers p joinchan joinchanmsgsbychan common chainid ch p updateledgerheight common chainid ch go func p gossip for i i i time sleep time second p updateledgerheight common chainid ch p leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id
0
109,377
9,379,891,008
IssuesEvent
2019-04-04 15:48:53
edenlabllc/ehealth.api
https://api.github.com/repos/edenlabllc/ehealth.api
closed
Do not show position for legal_entity private entrepreneurs
BE [zube]: In Test hotfix status/in-progress
linked with https://zube.io/edenlabllc/e-health/tickets/253 In case edrpou="^[0-9]{8}$" do return `<%=get_in(assigns, ~w(contractor_owner position)a) %>`, else do not return
1.0
Do not show position for legal_entity private entrepreneurs - linked with https://zube.io/edenlabllc/e-health/tickets/253 In case edrpou="^[0-9]{8}$" do return `<%=get_in(assigns, ~w(contractor_owner position)a) %>`, else do not return
non_defect
do not show position for legal entity private entrepreneurs linked with in case edrpou do return else do not return
0
114,765
14,633,056,332
IssuesEvent
2020-12-24 00:30:17
keepid/keepid_client
https://api.github.com/repos/keepid/keepid_client
opened
Dialog Component with 2 button actions, text, icon, and styling
Design Component
Implement the styling for the dialog to display the title, icon, description, and action buttons. Just put random text in there for now.
1.0
Dialog Component with 2 button actions, text, icon, and styling - Implement the styling for the dialog to display the title, icon, description, and action buttons. Just put random text in there for now.
non_defect
dialog component with button actions text icon and styling implement the styling for the dialog to display the title icon description and action buttons just put random text in there for now
0
392,758
11,595,436,068
IssuesEvent
2020-02-24 16:59:42
Qiskit/qiskit-ibmq-provider
https://api.github.com/repos/Qiskit/qiskit-ibmq-provider
closed
Make test_run_device more tolerant
priority: high type: feature request
<!-- ⚠️ If you do not respect this template, your issue will be closed --> <!-- ⚠️ Make sure to browse the opened and closed issues to confirm this idea does not exist. --> ### What is the expected behavior? `test_run_device` consistently fails due to error/noise on the device causing the result to be less than perfect. It should have a higher tolerance level and/or higher number of shots.
1.0
Make test_run_device more tolerant - <!-- ⚠️ If you do not respect this template, your issue will be closed --> <!-- ⚠️ Make sure to browse the opened and closed issues to confirm this idea does not exist. --> ### What is the expected behavior? `test_run_device` consistently fails due to error/noise on the device causing the result to be less than perfect. It should have a higher tolerance level and/or higher number of shots.
non_defect
make test run device more tolerant what is the expected behavior test run device consistently fails due to error noise on the device causing the result to be less than perfect it should have a higher tolerance level and or higher number of shots
0
305,850
23,133,716,175
IssuesEvent
2022-07-28 12:44:22
jhipster/jhipster-lite
https://api.github.com/repos/jhipster/jhipster-lite
closed
Clean the readme
area: documentation:books: generator: internal
The current README lists some features, it's not needed anymore as the module system will list them. So the README needs to be cleaned
1.0
Clean the readme - The current README lists some features, it's not needed anymore as the module system will list them. So the README needs to be cleaned
non_defect
clean the readme the current readme lists some features it s not needed anymore as the module system will list them so the readme needs to be cleaned
0
133,954
29,794,491,213
IssuesEvent
2023-06-16 00:16:00
equinix-labs/otel-cli
https://api.github.com/repos/equinix-labs/otel-cli
closed
de-duplicate otlpserver.mapToKVString and otelcli.flattenStringMap
good first issue help wanted minor code quality
As discussed in #120, @edw-eqix noticed that there was a copy of this function in the otlpserver package and we could merge. I think the one in otelcli/helpers.go has tests and all we need to do is make it public. `otelcli.flattenStringMap` is a terrible name, I don't know what this @tobert person in the blame was thinking. A new, clear name should be chosen. The helper version also implements a custom empty return value so you can return e.g. `{}` when the map is empty. Calls to it in otlpserver will need both name and arguments updated, probably to add `{}`, but also try `""` and see what the tests do. So, the steps follow. Each step can/should be a commit. We can squash (or not) at merge time. - rename the helper - starts with a capital letter - please come up with a better name - refactor otelcli package references to use the new name - tests should pass again at this point - replace mapToKVString in otlpserver with otelcli.flattenStringMap - test suite exercises this so if tests pass you're done
1.0
de-duplicate otlpserver.mapToKVString and otelcli.flattenStringMap - As discussed in #120, @edw-eqix noticed that there was a copy of this function in the otlpserver package and we could merge. I think the one in otelcli/helpers.go has tests and all we need to do is make it public. `otelcli.flattenStringMap` is a terrible name, I don't know what this @tobert person in the blame was thinking. A new, clear name should be chosen. The helper version also implements a custom empty return value so you can return e.g. `{}` when the map is empty. Calls to it in otlpserver will need both name and arguments updated, probably to add `{}`, but also try `""` and see what the tests do. So, the steps follow. Each step can/should be a commit. We can squash (or not) at merge time. - rename the helper - starts with a capital letter - please come up with a better name - refactor otelcli package references to use the new name - tests should pass again at this point - replace mapToKVString in otlpserver with otelcli.flattenStringMap - test suite exercises this so if tests pass you're done
non_defect
de duplicate otlpserver maptokvstring and otelcli flattenstringmap as discussed in edw eqix noticed that there was a copy of this function in the otlpserver package and we could merge i think the one in otelcli helpers go has tests and all we need to do is make it public otelcli flattenstringmap is a terrible name i don t know what this tobert person in the blame was thinking a new clear name should be chosen the helper version also implements a custom empty return value so you can return e g when the map is empty calls to it in otlpserver will need both name and arguments updated probably to add but also try and see what the tests do so the steps follow each step can should be a commit we can squash or not at merge time rename the helper starts with a capital letter please come up with a better name refactor otelcli package references to use the new name tests should pass again at this point replace maptokvstring in otlpserver with otelcli flattenstringmap test suite exercises this so if tests pass you re done
0
290,182
8,883,191,429
IssuesEvent
2019-01-14 15:08:20
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.flipkart.com - design is broken
browser-firefox-mobile priority-important
<!-- @browser: Firefox Mobile 66.0 --> <!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:66.0) Gecko/66.0 Firefox/66.0 --> <!-- @reported_with: mobile-reporter --> **URL**: https://www.flipkart.com/ **Browser / Version**: Firefox Mobile 66.0 **Operating System**: Android **Tested Another Browser**: Yes **Problem type**: Design is broken **Description**: site is not working **Steps to Reproduce**: Site is not working [![Screenshot Description](https://webcompat.com/uploads/2019/1/ffe79641-18ca-4114-95ae-dbcfb96a39a2-thumb.jpeg)](https://webcompat.com/uploads/2019/1/ffe79641-18ca-4114-95ae-dbcfb96a39a2.jpeg) <details> <summary>Browser Configuration</summary> <ul> <li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20190111093148</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: true</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: nightly</li> </ul> <p>Console Messages:</p> <pre> [u'[JavaScript Warning: "Content Security Policy: Ignoring \'unsafe-inline\' within script-src or style-src: nonce-source or hash-source specified"]', u'[JavaScript Warning: "Content Security Policy: Directive child-src has been deprecated. Please use directive worker-src to control workers, or directive frame-src to control frames respectively."]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 1}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 10}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 70}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 73}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 73}]', u'[JavaScript Warning: "onmozfullscreenchange is deprecated." {file: "https://img1a.flixcart.com/www/linchpin/batman-returns/vendor.b2676953f215a0261fddfb7243426a7c.js" line: 8}]', u'[JavaScript Warning: "onmozfullscreenerror is deprecated." {file: "https://img1a.flixcart.com/www/linchpin/batman-returns/vendor.b2676953f215a0261fddfb7243426a7c.js" line: 8}]', u'[JavaScript Error: "TypeError: window.webpackManifest is undefined" {file: "https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js" line: 1}]\ne.e@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:1776\ne.default</t.prototype.getHomePageTrackingInstance@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:217605\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:54893\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:214373\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:201844\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:183931\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:149828\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:74540\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:199572\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:102618\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:197579\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:2277\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:875\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:652\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:2\n', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 81}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 101}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 115}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 121}]', u'[JavaScript Error: "TypeError: a.omniture is undefined" {file: "https://img1a.flixcart.com/www/linchpin/batman-returns/omni/omni18.js" line: 96}]\nwindow.omniture<@https://img1a.flixcart.com/www/linchpin/batman-returns/omni/omni18.js:96:232\n@https://img1a.flixcart.com/www/linchpin/batman-returns/omni/omni18.js:95:17\n', u'[JavaScript Warning: "Loading failed for the <script> with source https://dpm.demdex.net/id?d_visid_ver=1.5.4&d_rtbd=json&d_ver=2&d_orgid=17EB401053DAF4840A490D4C%40AdobeOrg&d_nsid=0&d_mid=62584564629069265189205083060852339872&d_cb=s_c_il%5B0%5D._setAudienceManagerFields." {file: "https://www.flipkart.com/" line: 1}]'] </pre> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
www.flipkart.com - design is broken - <!-- @browser: Firefox Mobile 66.0 --> <!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:66.0) Gecko/66.0 Firefox/66.0 --> <!-- @reported_with: mobile-reporter --> **URL**: https://www.flipkart.com/ **Browser / Version**: Firefox Mobile 66.0 **Operating System**: Android **Tested Another Browser**: Yes **Problem type**: Design is broken **Description**: site is not working **Steps to Reproduce**: Site is not working [![Screenshot Description](https://webcompat.com/uploads/2019/1/ffe79641-18ca-4114-95ae-dbcfb96a39a2-thumb.jpeg)](https://webcompat.com/uploads/2019/1/ffe79641-18ca-4114-95ae-dbcfb96a39a2.jpeg) <details> <summary>Browser Configuration</summary> <ul> <li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20190111093148</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: true</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: nightly</li> </ul> <p>Console Messages:</p> <pre> [u'[JavaScript Warning: "Content Security Policy: Ignoring \'unsafe-inline\' within script-src or style-src: nonce-source or hash-source specified"]', u'[JavaScript Warning: "Content Security Policy: Directive child-src has been deprecated. Please use directive worker-src to control workers, or directive frame-src to control frames respectively."]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 1}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 10}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 70}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 73}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 73}]', u'[JavaScript Warning: "onmozfullscreenchange is deprecated." {file: "https://img1a.flixcart.com/www/linchpin/batman-returns/vendor.b2676953f215a0261fddfb7243426a7c.js" line: 8}]', u'[JavaScript Warning: "onmozfullscreenerror is deprecated." {file: "https://img1a.flixcart.com/www/linchpin/batman-returns/vendor.b2676953f215a0261fddfb7243426a7c.js" line: 8}]', u'[JavaScript Error: "TypeError: window.webpackManifest is undefined" {file: "https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js" line: 1}]\ne.e@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:1776\ne.default</t.prototype.getHomePageTrackingInstance@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:217605\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:54893\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:214373\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:201844\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:183931\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:149828\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:74540\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:199572\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:102618\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:197579\ne@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:969\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:2277\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:875\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:652\n@https://img1a.flixcart.com/www/linchpin/batman-returns/app.7a2934e183e.bundle.js:1:2\n', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 81}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 101}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 115}]', u'[JavaScript Error: "Content Security Policy: The pages settings blocked the loading of a resource at inline (script-src)." {file: "https://www.flipkart.com/" line: 121}]', u'[JavaScript Error: "TypeError: a.omniture is undefined" {file: "https://img1a.flixcart.com/www/linchpin/batman-returns/omni/omni18.js" line: 96}]\nwindow.omniture<@https://img1a.flixcart.com/www/linchpin/batman-returns/omni/omni18.js:96:232\n@https://img1a.flixcart.com/www/linchpin/batman-returns/omni/omni18.js:95:17\n', u'[JavaScript Warning: "Loading failed for the <script> with source https://dpm.demdex.net/id?d_visid_ver=1.5.4&d_rtbd=json&d_ver=2&d_orgid=17EB401053DAF4840A490D4C%40AdobeOrg&d_nsid=0&d_mid=62584564629069265189205083060852339872&d_cb=s_c_il%5B0%5D._setAudienceManagerFields." {file: "https://www.flipkart.com/" line: 1}]'] </pre> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
non_defect
design is broken url browser version firefox mobile operating system android tested another browser yes problem type design is broken description site is not working steps to reproduce site is not working browser configuration mixed active content blocked false image mem shared true buildid tracking content blocked false gfx webrender blob images true hastouchscreen true mixed passive content blocked false gfx webrender enabled false gfx webrender all false channel nightly console messages u u u u u u u u u ne e u u u u u nwindow omniture u from with ❤️
0
54,824
13,456,130,192
IssuesEvent
2020-09-09 07:23:30
curl/curl
https://api.github.com/repos/curl/curl
closed
linking curl fails with ../lib/.libs/libcurl.so: undefined reference to Curl_base64_encode
build
I tried to compile curl with `--disable-http-auth --disable-ldap --disable-doh` and all ssl and ssh related options disabled. Basically all options to ensure that the `#if ...` at the beginning of `lib/base64.c` is false. No building fails with `../lib/.libs/libcurl.so: undefined reference to Curl_base64_encode` because `Curl_base64_encode` is not built but it is still used in `lib/vauth/oauth2.c` and `lib/vauth/cleartext.c`. I'm not quite sure what the correct solution is, but I think `Curl_base64_encode` is always used in `lib/vauth/cleartext.c` so it should probably build unconditionally. But I'm not sure if I understand the build-system correctly.
1.0
linking curl fails with ../lib/.libs/libcurl.so: undefined reference to Curl_base64_encode - I tried to compile curl with `--disable-http-auth --disable-ldap --disable-doh` and all ssl and ssh related options disabled. Basically all options to ensure that the `#if ...` at the beginning of `lib/base64.c` is false. No building fails with `../lib/.libs/libcurl.so: undefined reference to Curl_base64_encode` because `Curl_base64_encode` is not built but it is still used in `lib/vauth/oauth2.c` and `lib/vauth/cleartext.c`. I'm not quite sure what the correct solution is, but I think `Curl_base64_encode` is always used in `lib/vauth/cleartext.c` so it should probably build unconditionally. But I'm not sure if I understand the build-system correctly.
non_defect
linking curl fails with lib libs libcurl so undefined reference to curl encode i tried to compile curl with disable http auth disable ldap disable doh and all ssl and ssh related options disabled basically all options to ensure that the if at the beginning of lib c is false no building fails with lib libs libcurl so undefined reference to curl encode because curl encode is not built but it is still used in lib vauth c and lib vauth cleartext c i m not quite sure what the correct solution is but i think curl encode is always used in lib vauth cleartext c so it should probably build unconditionally but i m not sure if i understand the build system correctly
0
392,891
11,597,235,593
IssuesEvent
2020-02-24 20:26:46
TannerDisney/DisneyCafe-Portfolio
https://api.github.com/repos/TannerDisney/DisneyCafe-Portfolio
closed
Seed administrator account for database
Back-End High Priority
When the website is first loaded we want to create an administrator and owner user for the database.
1.0
Seed administrator account for database - When the website is first loaded we want to create an administrator and owner user for the database.
non_defect
seed administrator account for database when the website is first loaded we want to create an administrator and owner user for the database
0
256,800
22,101,312,885
IssuesEvent
2022-06-01 13:56:46
harfbuzz/harfbuzz
https://api.github.com/repos/harfbuzz/harfbuzz
closed
Some mort test is really slow
tests
``` $ time ./hb-shape-fuzzer ./fonts/clusterfuzz-testcase-minimized-harfbuzz_fuzzer-5754958982021120 ./fonts/clusterfuzz-testcase-minimized-harfbuzz_fuzzer-5754958982021120 (319 bytes) real 0m7.325s user 0m7.074s sys 0m0.041s ``` Figure out what's happening and tighten it up...
1.0
Some mort test is really slow - ``` $ time ./hb-shape-fuzzer ./fonts/clusterfuzz-testcase-minimized-harfbuzz_fuzzer-5754958982021120 ./fonts/clusterfuzz-testcase-minimized-harfbuzz_fuzzer-5754958982021120 (319 bytes) real 0m7.325s user 0m7.074s sys 0m0.041s ``` Figure out what's happening and tighten it up...
non_defect
some mort test is really slow time hb shape fuzzer fonts clusterfuzz testcase minimized harfbuzz fuzzer fonts clusterfuzz testcase minimized harfbuzz fuzzer bytes real user sys figure out what s happening and tighten it up
0
25,248
4,257,695,578
IssuesEvent
2016-07-11 00:14:35
monkey/duda
https://api.github.com/repos/monkey/duda
closed
Enable / Disable packages on demand (Trac #2)
defect Duda Client Manager (DudaC) Migrated from Trac
Duda Client manager needs the feature to enable or disable packages when building the stage environment, at the moment it just builds everything by default. This feature will need also some cooperation from duda/packages/Makefile.in to populate the proper entries. Migrated from http://bugs.duda.io/ticket/2 ```json { "status": "new", "changetime": "2013-12-30T16:01:11", "description": "Duda Client manager needs the feature to enable or disable packages when building the stage environment, at the moment it just builds everything by default. This feature will need also some cooperation from duda/packages/Makefile.in to populate the proper entries.", "reporter": "edsiper", "cc": "", "resolution": "", "_ts": "1388419271755071", "component": "Duda Client Manager (DudaC)", "summary": "Enable / Disable packages on demand", "priority": "major", "keywords": "", "version": "", "time": "2013-12-30T16:01:11", "milestone": "", "owner": "", "type": "defect" } ```
1.0
Enable / Disable packages on demand (Trac #2) - Duda Client manager needs the feature to enable or disable packages when building the stage environment, at the moment it just builds everything by default. This feature will need also some cooperation from duda/packages/Makefile.in to populate the proper entries. Migrated from http://bugs.duda.io/ticket/2 ```json { "status": "new", "changetime": "2013-12-30T16:01:11", "description": "Duda Client manager needs the feature to enable or disable packages when building the stage environment, at the moment it just builds everything by default. This feature will need also some cooperation from duda/packages/Makefile.in to populate the proper entries.", "reporter": "edsiper", "cc": "", "resolution": "", "_ts": "1388419271755071", "component": "Duda Client Manager (DudaC)", "summary": "Enable / Disable packages on demand", "priority": "major", "keywords": "", "version": "", "time": "2013-12-30T16:01:11", "milestone": "", "owner": "", "type": "defect" } ```
defect
enable disable packages on demand trac duda client manager needs the feature to enable or disable packages when building the stage environment at the moment it just builds everything by default this feature will need also some cooperation from duda packages makefile in to populate the proper entries migrated from json status new changetime description duda client manager needs the feature to enable or disable packages when building the stage environment at the moment it just builds everything by default this feature will need also some cooperation from duda packages makefile in to populate the proper entries reporter edsiper cc resolution ts component duda client manager dudac summary enable disable packages on demand priority major keywords version time milestone owner type defect
1
11,083
2,632,745,568
IssuesEvent
2015-03-08 13:27:08
simonsteele/pn
https://api.github.com/repos/simonsteele/pn
closed
Schemes options select wrong scheme
Component-UI Priority-Medium Type-Defect
Original [issue 13](https://code.google.com/p/pnotepad/issues/detail?id=13) created by simonsteele on 2008-03-13T22:13:25.000Z: <b>What steps will reproduce the problem?</b> 1. Use VHDL 2. Go to Options-&gt;Advanced <b>What is the expected output? What do you see instead?</b> Verilog scheme is selected instead of VHDL, the sorting of the list is interfering with the selection model.
1.0
Schemes options select wrong scheme - Original [issue 13](https://code.google.com/p/pnotepad/issues/detail?id=13) created by simonsteele on 2008-03-13T22:13:25.000Z: <b>What steps will reproduce the problem?</b> 1. Use VHDL 2. Go to Options-&gt;Advanced <b>What is the expected output? What do you see instead?</b> Verilog scheme is selected instead of VHDL, the sorting of the list is interfering with the selection model.
defect
schemes options select wrong scheme original created by simonsteele on what steps will reproduce the problem use vhdl go to options gt advanced what is the expected output what do you see instead verilog scheme is selected instead of vhdl the sorting of the list is interfering with the selection model
1
131,210
18,247,779,968
IssuesEvent
2021-10-01 21:05:15
CDCgov/prime-simplereport
https://api.github.com/repos/CDCgov/prime-simplereport
closed
[BUG] Typo in Terms of Service
Bug Growth & Engagement Content design P3 Yabus
### Is there an existing issue for this? - [X] I have searched the existing issues ### Current Behavior There is a typo in the third line of the terms of service. No space exists between U.S. and Department. It appears as U.S.Department. It should appear as U.S. Department. ![image](https://user-images.githubusercontent.com/81384847/129087474-e5420593-4bd1-4e71-8fe3-278a26c0ea5d.png) This typo does not exist in the Terms of Service linked to from the sign up form: https://simplereport.gov/terms-of-service/ ### Steps To Reproduce Go here https://dev.simplereport.gov/register/24ADF Read the third line ### Expected Behavior _No response_ ### Additional context _No response_ ### Does this issue have a priority label? - [X] I have added a priority label ### Has issue been assigned to a team? - [X] I have added a team label
1.0
[BUG] Typo in Terms of Service - ### Is there an existing issue for this? - [X] I have searched the existing issues ### Current Behavior There is a typo in the third line of the terms of service. No space exists between U.S. and Department. It appears as U.S.Department. It should appear as U.S. Department. ![image](https://user-images.githubusercontent.com/81384847/129087474-e5420593-4bd1-4e71-8fe3-278a26c0ea5d.png) This typo does not exist in the Terms of Service linked to from the sign up form: https://simplereport.gov/terms-of-service/ ### Steps To Reproduce Go here https://dev.simplereport.gov/register/24ADF Read the third line ### Expected Behavior _No response_ ### Additional context _No response_ ### Does this issue have a priority label? - [X] I have added a priority label ### Has issue been assigned to a team? - [X] I have added a team label
non_defect
typo in terms of service is there an existing issue for this i have searched the existing issues current behavior there is a typo in the third line of the terms of service no space exists between u s and department it appears as u s department it should appear as u s department this typo does not exist in the terms of service linked to from the sign up form steps to reproduce go here read the third line expected behavior no response additional context no response does this issue have a priority label i have added a priority label has issue been assigned to a team i have added a team label
0
81,421
30,840,881,256
IssuesEvent
2023-08-02 10:32:52
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
opened
Compound colour regression when using keyboard navigation
T-Defect X-Regression A-Room-List A11y
### Steps to reproduce 1. Find a room you favourited 2. Open its ... menu 3. use keyboard to navigate to `Favourited` option 4. Observe contrast regression ### Outcome #### What did you expect? WCAG AA/AAA ![image](https://github.com/vector-im/element-web/assets/2403652/dffd50a0-fa73-4401-90e1-650c110df1d7) (From 1.11.36) #### What happened instead? ![image](https://github.com/vector-im/element-web/assets/2403652/6dc34631-98b8-4e14-bd03-c602762c088e) ### Operating system macOS ### Browser information _No response_ ### URL for webapp app.element.io ### Application version 1.11.37 ### Homeserver matrix.org ### Will you send logs? No
1.0
Compound colour regression when using keyboard navigation - ### Steps to reproduce 1. Find a room you favourited 2. Open its ... menu 3. use keyboard to navigate to `Favourited` option 4. Observe contrast regression ### Outcome #### What did you expect? WCAG AA/AAA ![image](https://github.com/vector-im/element-web/assets/2403652/dffd50a0-fa73-4401-90e1-650c110df1d7) (From 1.11.36) #### What happened instead? ![image](https://github.com/vector-im/element-web/assets/2403652/6dc34631-98b8-4e14-bd03-c602762c088e) ### Operating system macOS ### Browser information _No response_ ### URL for webapp app.element.io ### Application version 1.11.37 ### Homeserver matrix.org ### Will you send logs? No
defect
compound colour regression when using keyboard navigation steps to reproduce find a room you favourited open its menu use keyboard to navigate to favourited option observe contrast regression outcome what did you expect wcag aa aaa from what happened instead operating system macos browser information no response url for webapp app element io application version homeserver matrix org will you send logs no
1
37,220
8,302,083,471
IssuesEvent
2018-09-21 13:33:45
Guake/guake
https://api.github.com/repos/Guake/guake
closed
Double prompt line after clear screen, hide and show only when in SSH session
Priority: Low Type: Defect
Ubuntu 14.10 x64, guake 0.7.0: Having SSH session opened, clearing screen (one prompt line) and then hide and show guake gives me two prompt lines one under the other (just like i would hit Enter once). Only when in SSH session. Local console don't have this issue. Opposite of #308 i guess :)
1.0
Double prompt line after clear screen, hide and show only when in SSH session - Ubuntu 14.10 x64, guake 0.7.0: Having SSH session opened, clearing screen (one prompt line) and then hide and show guake gives me two prompt lines one under the other (just like i would hit Enter once). Only when in SSH session. Local console don't have this issue. Opposite of #308 i guess :)
defect
double prompt line after clear screen hide and show only when in ssh session ubuntu guake having ssh session opened clearing screen one prompt line and then hide and show guake gives me two prompt lines one under the other just like i would hit enter once only when in ssh session local console don t have this issue opposite of i guess
1
237,152
7,756,795,917
IssuesEvent
2018-05-31 14:35:40
zephyrproject-rtos/zephyr
https://api.github.com/repos/zephyrproject-rtos/zephyr
closed
SMP - Multi-core
area: Kernel feature priority: high
**_Reported by Gajinder Vij:_** Symmetric multiprocessing support - [x] GH-3565: Symmetric multiprocessing (SMP) for Xtensa architecture (Imported from Jira ZEP-323)
1.0
SMP - Multi-core - **_Reported by Gajinder Vij:_** Symmetric multiprocessing support - [x] GH-3565: Symmetric multiprocessing (SMP) for Xtensa architecture (Imported from Jira ZEP-323)
non_defect
smp multi core reported by gajinder vij symmetric multiprocessing support gh symmetric multiprocessing smp for xtensa architecture imported from jira zep
0
99,405
30,447,509,094
IssuesEvent
2023-07-15 21:46:09
dotnet/efcore
https://api.github.com/repos/dotnet/efcore
opened
Configure nested types as complex types by default
type-enhancement area-model-building
When mapping a complex type hierarchy, the user must currently manually configure each and every non-primitive property as complex; we should consider doing this by convention the moment the top-most containing property is configured as complex. This is similar to the situation with JSON and owned (one of these must be manually specified for the entire hierarchy). As discussed, I'm assuming that even when we enable regular navigations from complex types out of the complex hierarchy, we'd still not want that to be the default.
1.0
Configure nested types as complex types by default - When mapping a complex type hierarchy, the user must currently manually configure each and every non-primitive property as complex; we should consider doing this by convention the moment the top-most containing property is configured as complex. This is similar to the situation with JSON and owned (one of these must be manually specified for the entire hierarchy). As discussed, I'm assuming that even when we enable regular navigations from complex types out of the complex hierarchy, we'd still not want that to be the default.
non_defect
configure nested types as complex types by default when mapping a complex type hierarchy the user must currently manually configure each and every non primitive property as complex we should consider doing this by convention the moment the top most containing property is configured as complex this is similar to the situation with json and owned one of these must be manually specified for the entire hierarchy as discussed i m assuming that even when we enable regular navigations from complex types out of the complex hierarchy we d still not want that to be the default
0
55,341
14,384,541,817
IssuesEvent
2020-12-02 10:36:00
jOOQ/jOOQ
https://api.github.com/repos/jOOQ/jOOQ
opened
Impossible to use Record constructor with generated columns
T: Defect
### Expected behavior Jooq generator should not add constructor fields and setters for generated columns. ```kotlin /** * This class is generated by jOOQ. */ @Suppress("UNCHECKED_CAST") open class AlgorithmRuleRecord() : UpdatableRecordImpl<AlgorithmRuleRecord>(AlgorithmRuleTableDefinition.AlgorithmRuleTable), Record3<UUID?, String?, String?> { // .... var _title: String? private set(value) = set(2, value) get() = get(2) as String? // .... /** * Create a detached, initialised AlgorithmRuleRecord */ constructor(id: UUID? = null, name: String? = null): this() { this.id = id this.name = name } } ``` Ideally it should not add `value3` method but probably this would be hard to implement. ### Actual behavior Jooq generates a `Record` class which has `_title` field in the constructor: ```kotlin /** * This class is generated by jOOQ. */ @Suppress("UNCHECKED_CAST") open class AlgorithmRuleRecord() : UpdatableRecordImpl<AlgorithmRuleRecord>(AlgorithmRuleTableDefinition.AlgorithmRuleTable), Record3<UUID?, String?, String?> { var id: UUID? set(value) = set(0, value) get() = get(0) as UUID? var name: String? set(value) = set(1, value) get() = get(1) as String? var _title: String? set(value) = set(2, value) get() = get(2) as String? // ------------------------------------------------------------------------- // Primary key information // ------------------------------------------------------------------------- override fun key(): Record1<UUID?> = super.key() as Record1<UUID?> // ------------------------------------------------------------------------- // Record3 type implementation // ------------------------------------------------------------------------- override fun fieldsRow(): Row3<UUID?, String?, String?> = super.fieldsRow() as Row3<UUID?, String?, String?> override fun valuesRow(): Row3<UUID?, String?, String?> = super.valuesRow() as Row3<UUID?, String?, String?> override fun field1(): Field<UUID?> = AlgorithmRuleTableDefinition.AlgorithmRuleTable.Id override fun field2(): Field<String?> = AlgorithmRuleTableDefinition.AlgorithmRuleTable.Name override fun field3(): Field<String?> = AlgorithmRuleTableDefinition.AlgorithmRuleTable._Title override fun component1(): UUID? = id override fun component2(): String? = name override fun component3(): String? = _title override fun value1(): UUID? = id override fun value2(): String? = name override fun value3(): String? = _title override fun value1(value: UUID?): AlgorithmRuleRecord { this.id = value return this } override fun value2(value: String?): AlgorithmRuleRecord { this.name = value return this } override fun value3(value: String?): AlgorithmRuleRecord { this._title = value return this } override fun values(value1: UUID?, value2: String?, value3: String?): AlgorithmRuleRecord { this.value1(value1) this.value2(value2) this.value3(value3) return this } /** * Create a detached, initialised AlgorithmRuleRecord */ constructor(id: UUID? = null, name: String? = null, _title: String? = null): this() { this.id = id this.name = name this._title = _title } } ``` It is impossible to use the constructor because no matter what value you set for `_title` field MySQL will fail with error: `SQL [insert into `project`.`AlgorithmRule` (`id`, `name`, `_title`) values (?, ?, ?)]; The value specified for generated column '_title' in table 'AlgorithmRule' is not allowed.` ### Steps to reproduce the problem Create a table with generated column ```SQL CREATE TABLE `AlgorithmRule` ( `id` binary(16) NOT NULL, `name` varchar(255) NOT NULL, `_title` varchar(255) GENERATED ALWAYS AS (`name`) NOT NULL, PRIMARY KEY (`id`), UNIQUE (`name`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_unicode_ci; ``` ### Versions - jOOQ: 3.14.3 - Java: 8 - Database (include vendor): MySQL
1.0
Impossible to use Record constructor with generated columns - ### Expected behavior Jooq generator should not add constructor fields and setters for generated columns. ```kotlin /** * This class is generated by jOOQ. */ @Suppress("UNCHECKED_CAST") open class AlgorithmRuleRecord() : UpdatableRecordImpl<AlgorithmRuleRecord>(AlgorithmRuleTableDefinition.AlgorithmRuleTable), Record3<UUID?, String?, String?> { // .... var _title: String? private set(value) = set(2, value) get() = get(2) as String? // .... /** * Create a detached, initialised AlgorithmRuleRecord */ constructor(id: UUID? = null, name: String? = null): this() { this.id = id this.name = name } } ``` Ideally it should not add `value3` method but probably this would be hard to implement. ### Actual behavior Jooq generates a `Record` class which has `_title` field in the constructor: ```kotlin /** * This class is generated by jOOQ. */ @Suppress("UNCHECKED_CAST") open class AlgorithmRuleRecord() : UpdatableRecordImpl<AlgorithmRuleRecord>(AlgorithmRuleTableDefinition.AlgorithmRuleTable), Record3<UUID?, String?, String?> { var id: UUID? set(value) = set(0, value) get() = get(0) as UUID? var name: String? set(value) = set(1, value) get() = get(1) as String? var _title: String? set(value) = set(2, value) get() = get(2) as String? // ------------------------------------------------------------------------- // Primary key information // ------------------------------------------------------------------------- override fun key(): Record1<UUID?> = super.key() as Record1<UUID?> // ------------------------------------------------------------------------- // Record3 type implementation // ------------------------------------------------------------------------- override fun fieldsRow(): Row3<UUID?, String?, String?> = super.fieldsRow() as Row3<UUID?, String?, String?> override fun valuesRow(): Row3<UUID?, String?, String?> = super.valuesRow() as Row3<UUID?, String?, String?> override fun field1(): Field<UUID?> = AlgorithmRuleTableDefinition.AlgorithmRuleTable.Id override fun field2(): Field<String?> = AlgorithmRuleTableDefinition.AlgorithmRuleTable.Name override fun field3(): Field<String?> = AlgorithmRuleTableDefinition.AlgorithmRuleTable._Title override fun component1(): UUID? = id override fun component2(): String? = name override fun component3(): String? = _title override fun value1(): UUID? = id override fun value2(): String? = name override fun value3(): String? = _title override fun value1(value: UUID?): AlgorithmRuleRecord { this.id = value return this } override fun value2(value: String?): AlgorithmRuleRecord { this.name = value return this } override fun value3(value: String?): AlgorithmRuleRecord { this._title = value return this } override fun values(value1: UUID?, value2: String?, value3: String?): AlgorithmRuleRecord { this.value1(value1) this.value2(value2) this.value3(value3) return this } /** * Create a detached, initialised AlgorithmRuleRecord */ constructor(id: UUID? = null, name: String? = null, _title: String? = null): this() { this.id = id this.name = name this._title = _title } } ``` It is impossible to use the constructor because no matter what value you set for `_title` field MySQL will fail with error: `SQL [insert into `project`.`AlgorithmRule` (`id`, `name`, `_title`) values (?, ?, ?)]; The value specified for generated column '_title' in table 'AlgorithmRule' is not allowed.` ### Steps to reproduce the problem Create a table with generated column ```SQL CREATE TABLE `AlgorithmRule` ( `id` binary(16) NOT NULL, `name` varchar(255) NOT NULL, `_title` varchar(255) GENERATED ALWAYS AS (`name`) NOT NULL, PRIMARY KEY (`id`), UNIQUE (`name`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_unicode_ci; ``` ### Versions - jOOQ: 3.14.3 - Java: 8 - Database (include vendor): MySQL
defect
impossible to use record constructor with generated columns expected behavior jooq generator should not add constructor fields and setters for generated columns kotlin this class is generated by jooq suppress unchecked cast open class algorithmrulerecord updatablerecordimpl algorithmruletabledefinition algorithmruletable var title string private set value set value get get as string create a detached initialised algorithmrulerecord constructor id uuid null name string null this this id id this name name ideally it should not add method but probably this would be hard to implement actual behavior jooq generates a record class which has title field in the constructor kotlin this class is generated by jooq suppress unchecked cast open class algorithmrulerecord updatablerecordimpl algorithmruletabledefinition algorithmruletable var id uuid set value set value get get as uuid var name string set value set value get get as string var title string set value set value get get as string primary key information override fun key super key as type implementation override fun fieldsrow super fieldsrow as override fun valuesrow super valuesrow as override fun field algorithmruletabledefinition algorithmruletable id override fun field algorithmruletabledefinition algorithmruletable name override fun field algorithmruletabledefinition algorithmruletable title override fun uuid id override fun string name override fun string title override fun uuid id override fun string name override fun string title override fun value uuid algorithmrulerecord this id value return this override fun value string algorithmrulerecord this name value return this override fun value string algorithmrulerecord this title value return this override fun values uuid string string algorithmrulerecord this this this return this create a detached initialised algorithmrulerecord constructor id uuid null name string null title string null this this id id this name name this title title it is impossible to use the constructor because no matter what value you set for title field mysql will fail with error sql the value specified for generated column title in table algorithmrule is not allowed steps to reproduce the problem create a table with generated column sql create table algorithmrule id binary not null name varchar not null title varchar generated always as name not null primary key id unique name engine innodb default charset collate unicode ci versions jooq java database include vendor mysql
1
569,473
17,014,710,196
IssuesEvent
2021-07-02 10:17:19
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
opened
Bike parking areas should be rendered
Component: opencyclemap Priority: minor Type: enhancement
**[Submitted to the original trac issue database at 12.35pm, Wednesday, 16th December 2009]** ... as an alternative to tagging nodes. Some bike parking can cover large enough areas to be mapped in detail.
1.0
Bike parking areas should be rendered - **[Submitted to the original trac issue database at 12.35pm, Wednesday, 16th December 2009]** ... as an alternative to tagging nodes. Some bike parking can cover large enough areas to be mapped in detail.
non_defect
bike parking areas should be rendered as an alternative to tagging nodes some bike parking can cover large enough areas to be mapped in detail
0
31,771
6,620,122,565
IssuesEvent
2017-09-21 14:35:42
idaholab/moose
https://api.github.com/repos/idaholab/moose
closed
SideIntegralVariablePostprocessor doesn't throw an error if getting a material that doesn't exist
C: MOOSE P: critical T: defect
### Description of the enhancement or error report So, I just discovered that if a material property requested by a postprocessor based on SideIntegralVariablePostprocessor doesn't exist, the postprocessor will happily run producing junk output rather than throw an error. ### Rationale for the enhancement or information for reproducing the error This behaviour should produce an error ### Identified impact (i.e. Internal object changes, limited interface changes, public API change, or a list of specific applications impacted) Make this postprocessor more robust
1.0
SideIntegralVariablePostprocessor doesn't throw an error if getting a material that doesn't exist - ### Description of the enhancement or error report So, I just discovered that if a material property requested by a postprocessor based on SideIntegralVariablePostprocessor doesn't exist, the postprocessor will happily run producing junk output rather than throw an error. ### Rationale for the enhancement or information for reproducing the error This behaviour should produce an error ### Identified impact (i.e. Internal object changes, limited interface changes, public API change, or a list of specific applications impacted) Make this postprocessor more robust
defect
sideintegralvariablepostprocessor doesn t throw an error if getting a material that doesn t exist description of the enhancement or error report so i just discovered that if a material property requested by a postprocessor based on sideintegralvariablepostprocessor doesn t exist the postprocessor will happily run producing junk output rather than throw an error rationale for the enhancement or information for reproducing the error this behaviour should produce an error identified impact i e internal object changes limited interface changes public api change or a list of specific applications impacted make this postprocessor more robust
1
8,484
2,611,514,416
IssuesEvent
2015-02-27 05:50:11
chrsmith/hedgewars
https://api.github.com/repos/chrsmith/hedgewars
closed
iOS version of Hedgewars is not available anymore
auto-migrated OpSys-iOS Priority-Low Type-Defect
``` and not available in Russian appstore. Please fix it. Thank you. ``` Original issue reported on code.google.com by `and7ey@gmail.com` on 26 Jan 2013 at 6:58
1.0
iOS version of Hedgewars is not available anymore - ``` and not available in Russian appstore. Please fix it. Thank you. ``` Original issue reported on code.google.com by `and7ey@gmail.com` on 26 Jan 2013 at 6:58
defect
ios version of hedgewars is not available anymore and not available in russian appstore please fix it thank you original issue reported on code google com by gmail com on jan at
1
23,280
3,785,968,473
IssuesEvent
2016-03-20 21:00:28
LlmDl/Towny
https://api.github.com/repos/LlmDl/Towny
closed
Negative Nation/Town Upkeep Not Applying
duplicate Status-New Type-Defect
Originally reported on Google Code with ID 2042 ``` What steps will reproduce the problem? 1. config.yml -> daily_taxes.price_nation_upkeep -> Set that node to the negative value. I indicated the negative value with a "-" character. Likewise with price_town_upkeep 2. Create a town and a nation. 3. Either wait for a new day or ./ta newday What is the expected output? : The town and nation should gain money specified in the config.yml What do you see instead? : The town and nation do not gain any money or lose any money. What is your Towny version number? : 0.86.0.0 What is your TownyChat version number? : Not using it What is your Bukkit version number? : 1.7.2-R0.3-122-gb58e277 What operating system? : Windows Server R2 64 Bit Please use pastebin.com to link the following files: http://pastebin.com/STqm4pyc http://pastebin.com/xYgvvwQn Additional notes: I notice that when there is a positive upkeep, when I do /n or /t it shows the upkeep in red text, but when I set a negative number it does the following: Nations: It doesn't even show a value for "Upkeep: *****" Towns: It shows an upkeep of "-0.0" Thank you ``` Reported by `starquestminecraft` on 2014-04-26 23:05:43
1.0
Negative Nation/Town Upkeep Not Applying - Originally reported on Google Code with ID 2042 ``` What steps will reproduce the problem? 1. config.yml -> daily_taxes.price_nation_upkeep -> Set that node to the negative value. I indicated the negative value with a "-" character. Likewise with price_town_upkeep 2. Create a town and a nation. 3. Either wait for a new day or ./ta newday What is the expected output? : The town and nation should gain money specified in the config.yml What do you see instead? : The town and nation do not gain any money or lose any money. What is your Towny version number? : 0.86.0.0 What is your TownyChat version number? : Not using it What is your Bukkit version number? : 1.7.2-R0.3-122-gb58e277 What operating system? : Windows Server R2 64 Bit Please use pastebin.com to link the following files: http://pastebin.com/STqm4pyc http://pastebin.com/xYgvvwQn Additional notes: I notice that when there is a positive upkeep, when I do /n or /t it shows the upkeep in red text, but when I set a negative number it does the following: Nations: It doesn't even show a value for "Upkeep: *****" Towns: It shows an upkeep of "-0.0" Thank you ``` Reported by `starquestminecraft` on 2014-04-26 23:05:43
defect
negative nation town upkeep not applying originally reported on google code with id what steps will reproduce the problem config yml daily taxes price nation upkeep set that node to the negative value i indicated the negative value with a character likewise with price town upkeep create a town and a nation either wait for a new day or ta newday what is the expected output the town and nation should gain money specified in the config yml what do you see instead the town and nation do not gain any money or lose any money what is your towny version number what is your townychat version number not using it what is your bukkit version number what operating system windows server bit please use pastebin com to link the following files additional notes i notice that when there is a positive upkeep when i do n or t it shows the upkeep in red text but when i set a negative number it does the following nations it doesn t even show a value for upkeep towns it shows an upkeep of thank you reported by starquestminecraft on
1
110,271
16,977,120,197
IssuesEvent
2021-06-30 01:47:43
SmartBear/readyapi4j
https://api.github.com/repos/SmartBear/readyapi4j
closed
CVE-2015-3192 (Medium) detected in spring-web-4.1.6.RELEASE.jar - autoclosed
security vulnerability
## CVE-2015-3192 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-web-4.1.6.RELEASE.jar</b></p></summary> <p>Spring Web</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: readyapi4j/modules/core/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,canner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar</p> <p> Dependency Hierarchy: - :x: **spring-web-4.1.6.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/SmartBear/readyapi4j/commit/2616e3393c26f490cd18ae49306a09616a7b066f">2616e3393c26f490cd18ae49306a09616a7b066f</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file. <p>Publish Date: 2016-07-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-3192>CVE-2015-3192</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3192</a></p> <p>Release Date: 2016-07-12</p> <p>Fix Resolution: org.springframework:spring-web:3.2.14.RELEASE,4.1.7.RELEASE,org.springframework:spring-oxm:3.2.14.RELEASE,4.1.7.RELEASE</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.springframework","packageName":"spring-web","packageVersion":"4.1.6.RELEASE","packageFilePaths":["/modules/core/pom.xml","/modules/cucumber/modules/core/pom.xml","/modules/facade/pom.xml","/modules/cucumber/modules/runner/pom.xml","/modules/maven-plugin/pom.xml","/modules/junit-report/pom.xml","/modules/cucumber/modules/cucumber4oas/pom.xml","/modules/cucumber/modules/studio-runner/pom.xml","/modules/groovy-dsl/pom.xml","/modules/testengine/pom.xml","/modules/models/pom.xml","/modules/oas/pom.xml","/modules/maven-plugin-tester/pom.xml","/modules/local/pom.xml","/modules/samples/java/pom.xml","/modules/samples/groovy/pom.xml","/modules/cucumber/modules/stepdefs/pom.xml","/modules/cucumber/modules/samples/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"org.springframework:spring-web:4.1.6.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.springframework:spring-web:3.2.14.RELEASE,4.1.7.RELEASE,org.springframework:spring-oxm:3.2.14.RELEASE,4.1.7.RELEASE"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2015-3192","vulnerabilityDetails":"Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-3192","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2015-3192 (Medium) detected in spring-web-4.1.6.RELEASE.jar - autoclosed - ## CVE-2015-3192 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-web-4.1.6.RELEASE.jar</b></p></summary> <p>Spring Web</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: readyapi4j/modules/core/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,canner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/4.1.6.RELEASE/spring-web-4.1.6.RELEASE.jar</p> <p> Dependency Hierarchy: - :x: **spring-web-4.1.6.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/SmartBear/readyapi4j/commit/2616e3393c26f490cd18ae49306a09616a7b066f">2616e3393c26f490cd18ae49306a09616a7b066f</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file. <p>Publish Date: 2016-07-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-3192>CVE-2015-3192</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3192</a></p> <p>Release Date: 2016-07-12</p> <p>Fix Resolution: org.springframework:spring-web:3.2.14.RELEASE,4.1.7.RELEASE,org.springframework:spring-oxm:3.2.14.RELEASE,4.1.7.RELEASE</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.springframework","packageName":"spring-web","packageVersion":"4.1.6.RELEASE","packageFilePaths":["/modules/core/pom.xml","/modules/cucumber/modules/core/pom.xml","/modules/facade/pom.xml","/modules/cucumber/modules/runner/pom.xml","/modules/maven-plugin/pom.xml","/modules/junit-report/pom.xml","/modules/cucumber/modules/cucumber4oas/pom.xml","/modules/cucumber/modules/studio-runner/pom.xml","/modules/groovy-dsl/pom.xml","/modules/testengine/pom.xml","/modules/models/pom.xml","/modules/oas/pom.xml","/modules/maven-plugin-tester/pom.xml","/modules/local/pom.xml","/modules/samples/java/pom.xml","/modules/samples/groovy/pom.xml","/modules/cucumber/modules/stepdefs/pom.xml","/modules/cucumber/modules/samples/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"org.springframework:spring-web:4.1.6.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.springframework:spring-web:3.2.14.RELEASE,4.1.7.RELEASE,org.springframework:spring-oxm:3.2.14.RELEASE,4.1.7.RELEASE"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2015-3192","vulnerabilityDetails":"Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-3192","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
non_defect
cve medium detected in spring web release jar autoclosed cve medium severity vulnerability vulnerable library spring web release jar spring web library home page a href path to dependency file modules core pom xml path to vulnerable library home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar canner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar dependency hierarchy x spring web release jar vulnerable library found in head commit a href found in base branch master vulnerability details pivotal spring framework before and x before do not properly process inline dtd declarations when dtd is not entirely disabled which allows remote attackers to cause a denial of service memory consumption and out of memory errors via a crafted xml file publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring web release release org springframework spring oxm release release check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree org springframework spring web release isminimumfixversionavailable true minimumfixversion org springframework spring web release release org springframework spring oxm release release basebranches vulnerabilityidentifier cve vulnerabilitydetails pivotal spring framework before and x before do not properly process inline dtd declarations when dtd is not entirely disabled which allows remote attackers to cause a denial of service memory consumption and out of memory errors via a crafted xml file vulnerabilityurl
0
68,119
21,483,148,548
IssuesEvent
2022-04-26 19:53:51
scipy/scipy
https://api.github.com/repos/scipy/scipy
closed
BUG: sparse `dot` method should accept scalars
defect scipy.sparse
### Describe your issue. 1. `spmatrix.dot` is stricter with 1.8.0rc1 than before. The `dot` method of `spmatrix` classes should accept scalar operands like `numpy.ndarray` and `numpy.matrix` do. It seems #14822 changed the behavior. 2. `_sparray.dot` could also accept `.dot(scalar)`. ### Reproducing Code Example ```python sparse.csr_matrix([[2]]).dot(3) sparse.csr_array([[2]]).dot(3) ``` ### Error message ```shell >>> sparse.csr_matrix([[2]]).dot(3) Traceback (most recent call last): File "<stdin>", line 1, in <module> File "/Users/tos/.pyenv/versions/p10/lib/python3.10/site-packages/scipy/sparse/_base.py", line 413, in dot return self @ other File "/Users/tos/.pyenv/versions/p10/lib/python3.10/site-packages/scipy/sparse/_base.py", line 619, in __matmul__ raise ValueError("Scalar operands are not allowed, " ValueError: Scalar operands are not allowed, use '*' instead >>> sparse.csr_array([[2]]).dot(3) Traceback (most recent call last): File "<stdin>", line 1, in <module> File "/Users/tos/.pyenv/versions/p10/lib/python3.10/site-packages/scipy/sparse/_base.py", line 413, in dot return self @ other File "/Users/tos/.pyenv/versions/p10/lib/python3.10/site-packages/scipy/sparse/_base.py", line 619, in __matmul__ raise ValueError("Scalar operands are not allowed, " ValueError: Scalar operands are not allowed, use '*' instead ``` ### SciPy/NumPy/Python version information 1.8.0rc1 1.22.0rc2 sys.version_info(major=3, minor=10, micro=0, releaselevel='final', serial=0)
1.0
BUG: sparse `dot` method should accept scalars - ### Describe your issue. 1. `spmatrix.dot` is stricter with 1.8.0rc1 than before. The `dot` method of `spmatrix` classes should accept scalar operands like `numpy.ndarray` and `numpy.matrix` do. It seems #14822 changed the behavior. 2. `_sparray.dot` could also accept `.dot(scalar)`. ### Reproducing Code Example ```python sparse.csr_matrix([[2]]).dot(3) sparse.csr_array([[2]]).dot(3) ``` ### Error message ```shell >>> sparse.csr_matrix([[2]]).dot(3) Traceback (most recent call last): File "<stdin>", line 1, in <module> File "/Users/tos/.pyenv/versions/p10/lib/python3.10/site-packages/scipy/sparse/_base.py", line 413, in dot return self @ other File "/Users/tos/.pyenv/versions/p10/lib/python3.10/site-packages/scipy/sparse/_base.py", line 619, in __matmul__ raise ValueError("Scalar operands are not allowed, " ValueError: Scalar operands are not allowed, use '*' instead >>> sparse.csr_array([[2]]).dot(3) Traceback (most recent call last): File "<stdin>", line 1, in <module> File "/Users/tos/.pyenv/versions/p10/lib/python3.10/site-packages/scipy/sparse/_base.py", line 413, in dot return self @ other File "/Users/tos/.pyenv/versions/p10/lib/python3.10/site-packages/scipy/sparse/_base.py", line 619, in __matmul__ raise ValueError("Scalar operands are not allowed, " ValueError: Scalar operands are not allowed, use '*' instead ``` ### SciPy/NumPy/Python version information 1.8.0rc1 1.22.0rc2 sys.version_info(major=3, minor=10, micro=0, releaselevel='final', serial=0)
defect
bug sparse dot method should accept scalars describe your issue spmatrix dot is stricter with than before the dot method of spmatrix classes should accept scalar operands like numpy ndarray and numpy matrix do it seems changed the behavior sparray dot could also accept dot scalar reproducing code example python sparse csr matrix dot sparse csr array dot error message shell sparse csr matrix dot traceback most recent call last file line in file users tos pyenv versions lib site packages scipy sparse base py line in dot return self other file users tos pyenv versions lib site packages scipy sparse base py line in matmul raise valueerror scalar operands are not allowed valueerror scalar operands are not allowed use instead sparse csr array dot traceback most recent call last file line in file users tos pyenv versions lib site packages scipy sparse base py line in dot return self other file users tos pyenv versions lib site packages scipy sparse base py line in matmul raise valueerror scalar operands are not allowed valueerror scalar operands are not allowed use instead scipy numpy python version information sys version info major minor micro releaselevel final serial
1
27,710
5,078,795,276
IssuesEvent
2016-12-28 16:52:16
opendatakit/collect
https://api.github.com/repos/opendatakit/collect
opened
date format in prompt view doesn't follow system defaults
1.2 Collect Priority-Medium Type-Defect
<a href="https://github.com/mitchellsundt"><img src="https://avatars.githubusercontent.com/u/2281171?v=3" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [mitchellsundt](https://github.com/mitchellsundt)** _Thursday Jul 09, 2015 at 18:58 GMT_ _Originally opened as https://github.com/opendatakit/opendatakit/issues/639 (1 comment(s))_ ---- Originally reported on Google Code with ID 638 ``` What steps will reproduce the problem? 1.enter a date 2.view prompts (go to prompts) What is the expected output? What do you see instead? My system is set to display dates in YYYY-MM-DD, so I expect to view the same. Right now, dates are DD-MM-YYYY. What version of the product are you using? On what operating system? Collect 1.2 (1010), Android 2.3.7 Please provide any additional information below. ``` Reported by `Nikolai.Go` on 2012-07-16 00:02:04
1.0
date format in prompt view doesn't follow system defaults - <a href="https://github.com/mitchellsundt"><img src="https://avatars.githubusercontent.com/u/2281171?v=3" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [mitchellsundt](https://github.com/mitchellsundt)** _Thursday Jul 09, 2015 at 18:58 GMT_ _Originally opened as https://github.com/opendatakit/opendatakit/issues/639 (1 comment(s))_ ---- Originally reported on Google Code with ID 638 ``` What steps will reproduce the problem? 1.enter a date 2.view prompts (go to prompts) What is the expected output? What do you see instead? My system is set to display dates in YYYY-MM-DD, so I expect to view the same. Right now, dates are DD-MM-YYYY. What version of the product are you using? On what operating system? Collect 1.2 (1010), Android 2.3.7 Please provide any additional information below. ``` Reported by `Nikolai.Go` on 2012-07-16 00:02:04
defect
date format in prompt view doesn t follow system defaults issue by thursday jul at gmt originally opened as comment s originally reported on google code with id what steps will reproduce the problem enter a date view prompts go to prompts what is the expected output what do you see instead my system is set to display dates in yyyy mm dd so i expect to view the same right now dates are dd mm yyyy what version of the product are you using on what operating system collect android please provide any additional information below reported by nikolai go on
1
51,072
12,675,482,912
IssuesEvent
2020-06-19 01:52:02
tsunamayo/Starship-EVO
https://api.github.com/repos/tsunamayo/Starship-EVO
opened
[New build - DEFAULT] 20w25c: NPCs hotfixes.
Build Release Note
This build bring back NPCs as they should collide far less while interacting with stations. Changes and new Features - NPCs will orbit around the station to get to their landing pad. - pre-alpha renamed to early access - shooting on NPC will interrupt their current action. Bugfixes #2443 Hud keybind wrong display #2395 #2431 NPC crash into space station.
1.0
[New build - DEFAULT] 20w25c: NPCs hotfixes. - This build bring back NPCs as they should collide far less while interacting with stations. Changes and new Features - NPCs will orbit around the station to get to their landing pad. - pre-alpha renamed to early access - shooting on NPC will interrupt their current action. Bugfixes #2443 Hud keybind wrong display #2395 #2431 NPC crash into space station.
non_defect
npcs hotfixes this build bring back npcs as they should collide far less while interacting with stations changes and new features npcs will orbit around the station to get to their landing pad pre alpha renamed to early access shooting on npc will interrupt their current action bugfixes hud keybind wrong display npc crash into space station
0
41,184
10,325,429,977
IssuesEvent
2019-09-01 17:16:09
ascott18/TellMeWhen
https://api.github.com/repos/ascott18/TellMeWhen
closed
[Bug]
defect
**What version of TellMeWhen are you using? ** Version: 8.6.8 **What steps will reproduce the problem?** TellMeWhen\Options\TellMeWhen_Options.lua Line 1106 uses (global) 'null'. Probably should be nil?
1.0
[Bug] - **What version of TellMeWhen are you using? ** Version: 8.6.8 **What steps will reproduce the problem?** TellMeWhen\Options\TellMeWhen_Options.lua Line 1106 uses (global) 'null'. Probably should be nil?
defect
what version of tellmewhen are you using version what steps will reproduce the problem tellmewhen options tellmewhen options lua line uses global null probably should be nil
1
12,825
2,718,483,796
IssuesEvent
2015-04-12 10:47:30
cultibox/cultibox
https://api.github.com/repos/cultibox/cultibox
closed
[regul] mauvais fonctionnement pour la regulation sur humidificateur
Priority-High Type-Defect
``` j'ai une mauvaise reponse de regul lorsque mon option de regulation est sur "min" et pas "moyenne" de deux capteurs ``` Original issue reported on code.google.com by `elchaf...@gmail.com` on 31 Mar 2015 at 5:44
1.0
[regul] mauvais fonctionnement pour la regulation sur humidificateur - ``` j'ai une mauvaise reponse de regul lorsque mon option de regulation est sur "min" et pas "moyenne" de deux capteurs ``` Original issue reported on code.google.com by `elchaf...@gmail.com` on 31 Mar 2015 at 5:44
defect
mauvais fonctionnement pour la regulation sur humidificateur j ai une mauvaise reponse de regul lorsque mon option de regulation est sur min et pas moyenne de deux capteurs original issue reported on code google com by elchaf gmail com on mar at
1
10,892
4,838,863,899
IssuesEvent
2016-11-09 06:35:57
meteor/meteor
https://api.github.com/repos/meteor/meteor
closed
[1.4.2] NPM dependencies onTest are not found
bug confirmed Impact:some npm-module-specific Project:Isobuild
## Meteor Version 1.4.2 ## Packages * `practicalmeteor:mocha` * NPM `cheerio` inside the package to illustrate the problem ## Observed Behaviour Running `meteor test-packages --driver-package=practicalmeteor:mocha packages/npm-failing-test` throws the following error: ``` W20161101-19:15:49.248(1)? (STDERR) /home/namirsab/.meteor/packages/meteor-tool/.1.4.2.okzouw++os.linux.x86_64+web.browser+web.cordova/mt-os.linux.x86_64/dev_bundle/server-lib/node_modules/fibers/future.js:280 W20161101-19:15:49.248(1)? (STDERR) throw(ex); W20161101-19:15:49.248(1)? (STDERR) ^ W20161101-19:15:49.249(1)? (STDERR) W20161101-19:15:49.249(1)? (STDERR) Error: Cannot find module './lib/cheerio' W20161101-19:15:49.250(1)? (STDERR) at require (packages/modules-runtime.js:109:19) W20161101-19:15:49.250(1)? (STDERR) at meteorInstall.node_modules.meteor.local-test:npm-failing-test.node_modules.cheerio.index.js (/tmp/meteor-test-run10cj9p7/.meteor/local/build/programs/server/packages/local-test_npm-failing-test.js:62:28) W20161101-19:15:49.250(1)? (STDERR) at fileEvaluate (packages/modules-runtime.js:181:9) W20161101-19:15:49.250(1)? (STDERR) at Module.require (packages/modules-runtime.js:106:16) W20161101-19:15:49.250(1)? (STDERR) at Module.Mp.import (/home/namirsab/.meteor/packages/modules/.0.7.7.1fxu2so++os+web.browser+web.cordova/npm/node_modules/reify/lib/runtime.js:70:16) W20161101-19:15:49.250(1)? (STDERR) at meteorInstall.node_modules.meteor.local-test:npm-failing-test.npm-failing-test.spec.js (packages/local-test:npm-failing-test/npm-failing-test.spec.js:1:21) W20161101-19:15:49.250(1)? (STDERR) at fileEvaluate (packages/modules-runtime.js:181:9) W20161101-19:15:49.251(1)? (STDERR) at require (packages/modules-runtime.js:106:16) W20161101-19:15:49.251(1)? (STDERR) at /tmp/meteor-test-run10cj9p7/.meteor/local/build/programs/server/packages/local-test_npm-failing-test.js:73:1 W20161101-19:15:49.251(1)? (STDERR) at /tmp/meteor-test-run10cj9p7/.meteor/local/build/programs/server/packages/local-test_npm-failing-test.js:79:3 ``` ## Expected Behaviour Running `meteor test-packages --driver-package=practicalmeteor:mocha packages/npm-failing-test` run the test. ## Repository https://github.com/namirsab/meteor-1.4.2-npm-test-bug ## More info Look how the import works in the app but not in the test run.
1.0
[1.4.2] NPM dependencies onTest are not found - ## Meteor Version 1.4.2 ## Packages * `practicalmeteor:mocha` * NPM `cheerio` inside the package to illustrate the problem ## Observed Behaviour Running `meteor test-packages --driver-package=practicalmeteor:mocha packages/npm-failing-test` throws the following error: ``` W20161101-19:15:49.248(1)? (STDERR) /home/namirsab/.meteor/packages/meteor-tool/.1.4.2.okzouw++os.linux.x86_64+web.browser+web.cordova/mt-os.linux.x86_64/dev_bundle/server-lib/node_modules/fibers/future.js:280 W20161101-19:15:49.248(1)? (STDERR) throw(ex); W20161101-19:15:49.248(1)? (STDERR) ^ W20161101-19:15:49.249(1)? (STDERR) W20161101-19:15:49.249(1)? (STDERR) Error: Cannot find module './lib/cheerio' W20161101-19:15:49.250(1)? (STDERR) at require (packages/modules-runtime.js:109:19) W20161101-19:15:49.250(1)? (STDERR) at meteorInstall.node_modules.meteor.local-test:npm-failing-test.node_modules.cheerio.index.js (/tmp/meteor-test-run10cj9p7/.meteor/local/build/programs/server/packages/local-test_npm-failing-test.js:62:28) W20161101-19:15:49.250(1)? (STDERR) at fileEvaluate (packages/modules-runtime.js:181:9) W20161101-19:15:49.250(1)? (STDERR) at Module.require (packages/modules-runtime.js:106:16) W20161101-19:15:49.250(1)? (STDERR) at Module.Mp.import (/home/namirsab/.meteor/packages/modules/.0.7.7.1fxu2so++os+web.browser+web.cordova/npm/node_modules/reify/lib/runtime.js:70:16) W20161101-19:15:49.250(1)? (STDERR) at meteorInstall.node_modules.meteor.local-test:npm-failing-test.npm-failing-test.spec.js (packages/local-test:npm-failing-test/npm-failing-test.spec.js:1:21) W20161101-19:15:49.250(1)? (STDERR) at fileEvaluate (packages/modules-runtime.js:181:9) W20161101-19:15:49.251(1)? (STDERR) at require (packages/modules-runtime.js:106:16) W20161101-19:15:49.251(1)? (STDERR) at /tmp/meteor-test-run10cj9p7/.meteor/local/build/programs/server/packages/local-test_npm-failing-test.js:73:1 W20161101-19:15:49.251(1)? (STDERR) at /tmp/meteor-test-run10cj9p7/.meteor/local/build/programs/server/packages/local-test_npm-failing-test.js:79:3 ``` ## Expected Behaviour Running `meteor test-packages --driver-package=practicalmeteor:mocha packages/npm-failing-test` run the test. ## Repository https://github.com/namirsab/meteor-1.4.2-npm-test-bug ## More info Look how the import works in the app but not in the test run.
non_defect
npm dependencies ontest are not found meteor version packages practicalmeteor mocha npm cheerio inside the package to illustrate the problem observed behaviour running meteor test packages driver package practicalmeteor mocha packages npm failing test throws the following error stderr home namirsab meteor packages meteor tool okzouw os linux web browser web cordova mt os linux dev bundle server lib node modules fibers future js stderr throw ex stderr stderr stderr error cannot find module lib cheerio stderr at require packages modules runtime js stderr at meteorinstall node modules meteor local test npm failing test node modules cheerio index js tmp meteor test meteor local build programs server packages local test npm failing test js stderr at fileevaluate packages modules runtime js stderr at module require packages modules runtime js stderr at module mp import home namirsab meteor packages modules os web browser web cordova npm node modules reify lib runtime js stderr at meteorinstall node modules meteor local test npm failing test npm failing test spec js packages local test npm failing test npm failing test spec js stderr at fileevaluate packages modules runtime js stderr at require packages modules runtime js stderr at tmp meteor test meteor local build programs server packages local test npm failing test js stderr at tmp meteor test meteor local build programs server packages local test npm failing test js expected behaviour running meteor test packages driver package practicalmeteor mocha packages npm failing test run the test repository more info look how the import works in the app but not in the test run
0
65,372
19,433,283,270
IssuesEvent
2021-12-21 14:24:08
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
Icon to expand spaces sidebar is invisible
T-Defect X-Regression A-Spaces Z-Fire
### Steps to reproduce 1. Update to 1.9.8 2. Try to expand spaces sidebar ### Outcome #### What did you expect? The button is visible #### What happened instead? The button is invisible when in the collapsed state <img width="169" src="https://user-images.githubusercontent.com/5855073/146807696-2b4f804c-9d23-4f35-a7d9-5471df19d5b3.png"> When expanded the button is visible when not hovering. When you hover over it though the button becomes invisible. <img width="159" src="https://user-images.githubusercontent.com/5855073/146807773-bb9509f3-4c4e-4716-bee4-ae95073dfff9.png"> ### Operating system macOS ### Browser information Firefox ### URL for webapp _No response_ ### Application version 1.9.8 ### Homeserver _No response_ ### Will you send logs? No
1.0
Icon to expand spaces sidebar is invisible - ### Steps to reproduce 1. Update to 1.9.8 2. Try to expand spaces sidebar ### Outcome #### What did you expect? The button is visible #### What happened instead? The button is invisible when in the collapsed state <img width="169" src="https://user-images.githubusercontent.com/5855073/146807696-2b4f804c-9d23-4f35-a7d9-5471df19d5b3.png"> When expanded the button is visible when not hovering. When you hover over it though the button becomes invisible. <img width="159" src="https://user-images.githubusercontent.com/5855073/146807773-bb9509f3-4c4e-4716-bee4-ae95073dfff9.png"> ### Operating system macOS ### Browser information Firefox ### URL for webapp _No response_ ### Application version 1.9.8 ### Homeserver _No response_ ### Will you send logs? No
defect
icon to expand spaces sidebar is invisible steps to reproduce update to try to expand spaces sidebar outcome what did you expect the button is visible what happened instead the button is invisible when in the collapsed state img width src when expanded the button is visible when not hovering when you hover over it though the button becomes invisible img width src operating system macos browser information firefox url for webapp no response application version homeserver no response will you send logs no
1
14,181
2,792,274,360
IssuesEvent
2015-05-10 21:20:36
djpnewton/busdog
https://api.github.com/repos/djpnewton/busdog
closed
Now that BusDog is installed, how do I start it? Where was it installed?
auto-migrated Priority-Medium Type-Defect
``` Q: I downloaded busdog64_vX.X.X.exe and ran it to install. Now that it's installed, how do I start BusDog? I can't find it in the Start menu or under \Program Files\. A: That .exe is the runtime utility rather than an installer (although it does automatically instal the required driver). Copy or move that .exe to a convenient location. ``` Original issue reported on code.google.com by `jim.fre...@gmail.com` on 12 Nov 2010 at 10:13
1.0
Now that BusDog is installed, how do I start it? Where was it installed? - ``` Q: I downloaded busdog64_vX.X.X.exe and ran it to install. Now that it's installed, how do I start BusDog? I can't find it in the Start menu or under \Program Files\. A: That .exe is the runtime utility rather than an installer (although it does automatically instal the required driver). Copy or move that .exe to a convenient location. ``` Original issue reported on code.google.com by `jim.fre...@gmail.com` on 12 Nov 2010 at 10:13
defect
now that busdog is installed how do i start it where was it installed q i downloaded vx x x exe and ran it to install now that it s installed how do i start busdog i can t find it in the start menu or under program files a that exe is the runtime utility rather than an installer although it does automatically instal the required driver copy or move that exe to a convenient location original issue reported on code google com by jim fre gmail com on nov at
1
42,103
10,819,558,081
IssuesEvent
2019-11-08 14:38:29
raz0red/wii-mednafen
https://api.github.com/repos/raz0red/wii-mednafen
closed
USB drive not mounting
Priority-Medium Type-Defect auto-migrated
``` What steps will reproduce the problem? 1. Opening the emulator through usb loader gx 2. Selecting to open a ROM from USB drive (which is fat32) 3. What is the expected output? What do you see instead? The expected output is for the emulator to recognize the drive and open my pace CD games. Instead it says it's unable to mount the drive What version of the product are you using? On what operating system? 0.1.1 on wii Please provide any additional information below. ``` Original issue reported on code.google.com by `machem...@gmail.com` on 25 Feb 2015 at 2:25
1.0
USB drive not mounting - ``` What steps will reproduce the problem? 1. Opening the emulator through usb loader gx 2. Selecting to open a ROM from USB drive (which is fat32) 3. What is the expected output? What do you see instead? The expected output is for the emulator to recognize the drive and open my pace CD games. Instead it says it's unable to mount the drive What version of the product are you using? On what operating system? 0.1.1 on wii Please provide any additional information below. ``` Original issue reported on code.google.com by `machem...@gmail.com` on 25 Feb 2015 at 2:25
defect
usb drive not mounting what steps will reproduce the problem opening the emulator through usb loader gx selecting to open a rom from usb drive which is what is the expected output what do you see instead the expected output is for the emulator to recognize the drive and open my pace cd games instead it says it s unable to mount the drive what version of the product are you using on what operating system on wii please provide any additional information below original issue reported on code google com by machem gmail com on feb at
1
182,431
30,848,143,348
IssuesEvent
2023-08-02 14:56:27
cityofaustin/atd-data-tech
https://api.github.com/repos/cityofaustin/atd-data-tech
closed
Perform Administration hand-off meeting
Type: Meeting Service: Service Design Project: TPW Service Transition
Create agenda for hand-off meeting between TPW & CDS Administration division. [Working doc](https://docs.google.com/document/d/1AUPA5QZ9VblEnGg5gA1se6KQ0i1Yfge3pSrPDa5r1gg/edit?usp=sharing).
1.0
Perform Administration hand-off meeting - Create agenda for hand-off meeting between TPW & CDS Administration division. [Working doc](https://docs.google.com/document/d/1AUPA5QZ9VblEnGg5gA1se6KQ0i1Yfge3pSrPDa5r1gg/edit?usp=sharing).
non_defect
perform administration hand off meeting create agenda for hand off meeting between tpw cds administration division
0
53,443
7,839,435,536
IssuesEvent
2018-06-18 13:41:48
TakwimuAfrica/TAKWIMU
https://api.github.com/repos/TakwimuAfrica/TAKWIMU
opened
[DOCUMENTATION] SRS - Security Requirements
documentation
## Description A clear and concise description of what the issue is about. ## Screenshots ## Files A list of relevant files for this issue. This will help people navigate the project and offer some clues of where to start. ## To Reproduce If this issue is describing a bug, include some steps to reproduce the behavior. ## Tasks Include specific tasks in the order they need to be done in. Include links to specific lines of code where the task should happen at. - [ ] Task 1 - [ ] Task 2 - [ ] Task 3 [https://docs.google.com/document/d/1Vvd2WukWxkkpM7qhHvGD49DzeZfwAluo3jxfJzT2NbQ/edit?ts=5afab7a5#heading=h.3whwml4](url)
1.0
[DOCUMENTATION] SRS - Security Requirements - ## Description A clear and concise description of what the issue is about. ## Screenshots ## Files A list of relevant files for this issue. This will help people navigate the project and offer some clues of where to start. ## To Reproduce If this issue is describing a bug, include some steps to reproduce the behavior. ## Tasks Include specific tasks in the order they need to be done in. Include links to specific lines of code where the task should happen at. - [ ] Task 1 - [ ] Task 2 - [ ] Task 3 [https://docs.google.com/document/d/1Vvd2WukWxkkpM7qhHvGD49DzeZfwAluo3jxfJzT2NbQ/edit?ts=5afab7a5#heading=h.3whwml4](url)
non_defect
srs security requirements description a clear and concise description of what the issue is about screenshots files a list of relevant files for this issue this will help people navigate the project and offer some clues of where to start to reproduce if this issue is describing a bug include some steps to reproduce the behavior tasks include specific tasks in the order they need to be done in include links to specific lines of code where the task should happen at task task task url
0
566,889
16,833,087,477
IssuesEvent
2021-06-18 08:21:33
epiphany-platform/epiphany
https://api.github.com/repos/epiphany-platform/epiphany
closed
[RELEASE] v1.1.0rc1
priority/high type/release
#### Release checklist * [ ] Default OS cloud images updated * [ ] Support branch created * [ ] CI pipelines for support branch created * All automated tests passed (QA pipelines): * [x] Standard apply (new cluster) * [x] Standard apply (existing cluster) * [x] Upgrade for V-1 * [x] Upgrade for V-2 * [x] Upgrade for V-3 * [x] Upgrade for V-4 * [x] k8s HA apply * [x] Promote k8s to HA apply * [x] Single machine apply * [x] Offline mode apply * Changelog: * [x] Changelog updated (release date, known issues, breaking changes, deprecations) * [ ] Changelog for the next version created in develop branch * Documentation: * [ ] Updated LIFECYCLE.md & LIFECYCLE_GANTT.md * [ ] Updated TESTING.md * [x] Release pipeline performed * [x] GitHub release exists with correct content (links) * [x] `docker pull` command from the release description tested * [ ] Version bumped to the next in develop branch (in version.txt.py) * [ ] Releases updated in ZenHub
1.0
[RELEASE] v1.1.0rc1 - #### Release checklist * [ ] Default OS cloud images updated * [ ] Support branch created * [ ] CI pipelines for support branch created * All automated tests passed (QA pipelines): * [x] Standard apply (new cluster) * [x] Standard apply (existing cluster) * [x] Upgrade for V-1 * [x] Upgrade for V-2 * [x] Upgrade for V-3 * [x] Upgrade for V-4 * [x] k8s HA apply * [x] Promote k8s to HA apply * [x] Single machine apply * [x] Offline mode apply * Changelog: * [x] Changelog updated (release date, known issues, breaking changes, deprecations) * [ ] Changelog for the next version created in develop branch * Documentation: * [ ] Updated LIFECYCLE.md & LIFECYCLE_GANTT.md * [ ] Updated TESTING.md * [x] Release pipeline performed * [x] GitHub release exists with correct content (links) * [x] `docker pull` command from the release description tested * [ ] Version bumped to the next in develop branch (in version.txt.py) * [ ] Releases updated in ZenHub
non_defect
release checklist default os cloud images updated support branch created ci pipelines for support branch created all automated tests passed qa pipelines standard apply new cluster standard apply existing cluster upgrade for v upgrade for v upgrade for v upgrade for v ha apply promote to ha apply single machine apply offline mode apply changelog changelog updated release date known issues breaking changes deprecations changelog for the next version created in develop branch documentation updated lifecycle md lifecycle gantt md updated testing md release pipeline performed github release exists with correct content links docker pull command from the release description tested version bumped to the next in develop branch in version txt py releases updated in zenhub
0
281,471
30,888,858,394
IssuesEvent
2023-08-04 01:55:41
hshivhare67/kernel_v4.1.15_CVE-2019-10220
https://api.github.com/repos/hshivhare67/kernel_v4.1.15_CVE-2019-10220
reopened
CVE-2019-19816 (High) detected in linuxlinux-4.4.302
Mend: dependency security vulnerability
## CVE-2019-19816 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.4.302</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/hshivhare67/kernel_v4.1.15_CVE-2019-10220/commit/85c655ae4a38840b0edb9284bb64ec65b27331dc">85c655ae4a38840b0edb9284bb64ec65b27331dc</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/btrfs/volumes.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/btrfs/volumes.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image and performing some operations can cause slab-out-of-bounds write access in __btrfs_map_block in fs/btrfs/volumes.c, because a value of 1 for the number of data stripes is mishandled. <p>Publish Date: 2019-12-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-19816>CVE-2019-19816</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19816">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19816</a></p> <p>Release Date: 2019-12-17</p> <p>Fix Resolution: v5.5-rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-19816 (High) detected in linuxlinux-4.4.302 - ## CVE-2019-19816 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.4.302</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/hshivhare67/kernel_v4.1.15_CVE-2019-10220/commit/85c655ae4a38840b0edb9284bb64ec65b27331dc">85c655ae4a38840b0edb9284bb64ec65b27331dc</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/btrfs/volumes.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/btrfs/volumes.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image and performing some operations can cause slab-out-of-bounds write access in __btrfs_map_block in fs/btrfs/volumes.c, because a value of 1 for the number of data stripes is mishandled. <p>Publish Date: 2019-12-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-19816>CVE-2019-19816</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19816">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19816</a></p> <p>Release Date: 2019-12-17</p> <p>Fix Resolution: v5.5-rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in linuxlinux cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch master vulnerable source files fs btrfs volumes c fs btrfs volumes c vulnerability details in the linux kernel mounting a crafted btrfs filesystem image and performing some operations can cause slab out of bounds write access in btrfs map block in fs btrfs volumes c because a value of for the number of data stripes is mishandled publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
2,657
2,607,934,593
IssuesEvent
2015-02-26 00:28:16
chrsmithdemos/minify
https://api.github.com/repos/chrsmithdemos/minify
closed
Yslow never completes when using Minify
auto-migrated Priority-Medium Type-Defect
``` Minify version: 2.1.3 PHP version: 5.2.9 What steps will reproduce the problem? 1. When running Yslow against our webserver with minify it never completes and is stuck on Component information Did any unit tests FAIL? (Please do not post the full list)No Thanks ``` ----- Original issue reported on code.google.com by `kongfra...@gmail.com` on 25 Aug 2010 at 2:59
1.0
Yslow never completes when using Minify - ``` Minify version: 2.1.3 PHP version: 5.2.9 What steps will reproduce the problem? 1. When running Yslow against our webserver with minify it never completes and is stuck on Component information Did any unit tests FAIL? (Please do not post the full list)No Thanks ``` ----- Original issue reported on code.google.com by `kongfra...@gmail.com` on 25 Aug 2010 at 2:59
defect
yslow never completes when using minify minify version php version what steps will reproduce the problem when running yslow against our webserver with minify it never completes and is stuck on component information did any unit tests fail please do not post the full list no thanks original issue reported on code google com by kongfra gmail com on aug at
1
43,603
11,776,148,920
IssuesEvent
2020-03-16 12:44:31
primefaces/primereact
https://api.github.com/repos/primefaces/primereact
closed
Tab-Key doesn't work in Datatable with cell editing on IE11 and Edge
defect
Reported By PRO User; > Tab-Key doesn't work in Datatable on IE11 and Edge which cell Editing. Clicking into a cell and then using the tab key to jump to the next doesn't work. Being on an element before the Table and trying to tab into it doesn't work either.
1.0
Tab-Key doesn't work in Datatable with cell editing on IE11 and Edge - Reported By PRO User; > Tab-Key doesn't work in Datatable on IE11 and Edge which cell Editing. Clicking into a cell and then using the tab key to jump to the next doesn't work. Being on an element before the Table and trying to tab into it doesn't work either.
defect
tab key doesn t work in datatable with cell editing on and edge reported by pro user tab key doesn t work in datatable on and edge which cell editing clicking into a cell and then using the tab key to jump to the next doesn t work being on an element before the table and trying to tab into it doesn t work either
1
51,965
13,211,352,529
IssuesEvent
2020-08-15 22:31:01
icecube-trac/tix4
https://api.github.com/repos/icecube-trac/tix4
opened
muongun - UNIX api violation (realloc) (Trac #1373)
Incomplete Migration Migrated from Trac combo simulation defect
<details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1373">https://code.icecube.wisc.edu/projects/icecube/ticket/1373</a>, reported by negaand owned by jvansanten</em></summary> <p> ```json { "status": "closed", "changetime": "2016-03-18T21:14:07", "_ts": "1458335647931556", "description": "http://software.icecube.wisc.edu/static_analysis/00_LATEST/report-8cb71b.html#EndPath\n\nThe behavior of `realloc()` in this situation (`realloc`'ing to zero bytes) is implementation defined. This code should be refactored to \"do what I want\" from \"do what I mean\".", "reporter": "nega", "cc": "", "resolution": "fixed", "time": "2015-10-01T13:59:50", "component": "combo simulation", "summary": "muongun - UNIX api violation (realloc)", "priority": "normal", "keywords": "", "milestone": "", "owner": "jvansanten", "type": "defect" } ``` </p> </details>
1.0
muongun - UNIX api violation (realloc) (Trac #1373) - <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1373">https://code.icecube.wisc.edu/projects/icecube/ticket/1373</a>, reported by negaand owned by jvansanten</em></summary> <p> ```json { "status": "closed", "changetime": "2016-03-18T21:14:07", "_ts": "1458335647931556", "description": "http://software.icecube.wisc.edu/static_analysis/00_LATEST/report-8cb71b.html#EndPath\n\nThe behavior of `realloc()` in this situation (`realloc`'ing to zero bytes) is implementation defined. This code should be refactored to \"do what I want\" from \"do what I mean\".", "reporter": "nega", "cc": "", "resolution": "fixed", "time": "2015-10-01T13:59:50", "component": "combo simulation", "summary": "muongun - UNIX api violation (realloc)", "priority": "normal", "keywords": "", "milestone": "", "owner": "jvansanten", "type": "defect" } ``` </p> </details>
defect
muongun unix api violation realloc trac migrated from json status closed changetime ts description behavior of realloc in this situation realloc ing to zero bytes is implementation defined this code should be refactored to do what i want from do what i mean reporter nega cc resolution fixed time component combo simulation summary muongun unix api violation realloc priority normal keywords milestone owner jvansanten type defect
1
75,562
15,435,847,471
IssuesEvent
2021-03-07 10:40:17
dodekanisou/home-automation
https://api.github.com/repos/dodekanisou/home-automation
closed
CVE-2020-7792 (High) detected in mout-0.11.1.tgz
security vulnerability
## CVE-2020-7792 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mout-0.11.1.tgz</b></p></summary> <p>Modular Utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/mout/-/mout-0.11.1.tgz">https://registry.npmjs.org/mout/-/mout-0.11.1.tgz</a></p> <p>Path to dependency file: home-automation/RpiHost/wwwroot/lib/admin-lte/plugins/jquery-ui/package.json</p> <p>Path to vulnerable library: home-automation/RpiHost/wwwroot/lib/admin-lte/plugins/jquery-ui/node_modules/mout/package.json</p> <p> Dependency Hierarchy: - commitplease-2.3.0.tgz (Root Library) - :x: **mout-0.11.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/dodekanisou/home-automation/commit/76102ccb5ea1ee3cf113887b38c50fab74e0caea">76102ccb5ea1ee3cf113887b38c50fab74e0caea</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution. <p>Publish Date: 2020-12-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7792>CVE-2020-7792</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7792 (High) detected in mout-0.11.1.tgz - ## CVE-2020-7792 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mout-0.11.1.tgz</b></p></summary> <p>Modular Utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/mout/-/mout-0.11.1.tgz">https://registry.npmjs.org/mout/-/mout-0.11.1.tgz</a></p> <p>Path to dependency file: home-automation/RpiHost/wwwroot/lib/admin-lte/plugins/jquery-ui/package.json</p> <p>Path to vulnerable library: home-automation/RpiHost/wwwroot/lib/admin-lte/plugins/jquery-ui/node_modules/mout/package.json</p> <p> Dependency Hierarchy: - commitplease-2.3.0.tgz (Root Library) - :x: **mout-0.11.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/dodekanisou/home-automation/commit/76102ccb5ea1ee3cf113887b38c50fab74e0caea">76102ccb5ea1ee3cf113887b38c50fab74e0caea</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution. <p>Publish Date: 2020-12-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7792>CVE-2020-7792</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in mout tgz cve high severity vulnerability vulnerable library mout tgz modular utilities library home page a href path to dependency file home automation rpihost wwwroot lib admin lte plugins jquery ui package json path to vulnerable library home automation rpihost wwwroot lib admin lte plugins jquery ui node modules mout package json dependency hierarchy commitplease tgz root library x mout tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects all versions of package mout the deepfillin function can be used to fill missing properties recursively while the deepmixin mixes objects into the target object recursively mixing existing child objects as well in both cases the key used to access the target object recursively is not checked leading to a prototype pollution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with whitesource
0
54,214
13,464,558,186
IssuesEvent
2020-09-09 19:24:56
AeroScripts/QuestieDev
https://api.github.com/repos/AeroScripts/QuestieDev
closed
Quest issue with "A Reliquary of Purity"
Questie - Quest Issue Type - Defect
<!-- READ THIS FIRST Hello, thanks for taking the time to report a bug! Before you proceed, please verify that you're running the latest version of Questie. The easiest way to do this is via the Twitch client, but you can also download the latest version here: https://www.curseforge.com/wow/addons/questie Questie is one of the most popular Classic WoW addons, with over 22M downloads. However, like almost all WoW addons, it's built and maintained by a team of volunteers. The current Questie team is: * @AeroScripts / Aero#1357 (Discord) * @BreakBB / TheCrux#1702 (Discord) * @drejjmit / Drejjmit#8241 (Discord) * @Dyaxler / Dyaxler#0086 (Discord) * @gogo1951 / Gogo#0298 (Discord) If you'd like to help, please consider making a donation. You can do so here: https://www.paypal.com/cgi-bin/webscr?cmd=_donations&business=aero1861%40gmail%2ecom&lc=CA&item_name=Questie%20Devs&currency_code=USD&bn=PP%2dDonationsBF%3abtn_donate_LG%2egif%3aNonHosted You can also help as a tester, developer or translator, please join the Questie Discord here https://discord.gg/fYcQfv7 --> ## Description <!-- Explain in detail what problem you encountered. Is a quest not showing or showing again or an objective not showing or a spawn missing? --> This quest shows up as available, but it's not. Need to figure out what the actual prerequisites are. Spoke with the guy, no dialogue or quest is available. Tested on a 55 Troll Hunter. Looks like you have to go into DM before the quest is available. Oof. Testing that out now. > Confirmed. My Undead Rogue was unable to get the chat option to start the quest until after I had entered the Dire Maul instance once (tested with another character to be sure). > https://classic.wowhead.com/quest=5527/a-reliquary-of-purity#comments:id=2968386 ## Wowhead link <!-- If this issue is about a quest/npc/item/... then please include a link to it from Wowhead: https://classic.wowhead.com --> * A Reliquary of Purity - Quest - World of Warcraft || https://classic.wowhead.com/quest=5527/a-reliquary-of-purity ## Screenshots <!-- If you can, add a screenshot to help explaining the problem (e.g. of your map where a quest is not shown but the NPC has an ! above him). Simply drag and drop the image in this input field, no need to upload it to any other image platform. --> ![image](https://user-images.githubusercontent.com/55365231/92608984-a3217700-f27b-11ea-9774-efdba530ef36.png) ## Questie version <!-- Which version of Questie are you using? You can find it by: - 1. Hovering over the Questie Minimap Icon - 2. looking at your Questie.toc file (open it with any text editor). It looks something like this: "v5.9.0" or "## Version: 5.9.0". -->
1.0
Quest issue with "A Reliquary of Purity" - <!-- READ THIS FIRST Hello, thanks for taking the time to report a bug! Before you proceed, please verify that you're running the latest version of Questie. The easiest way to do this is via the Twitch client, but you can also download the latest version here: https://www.curseforge.com/wow/addons/questie Questie is one of the most popular Classic WoW addons, with over 22M downloads. However, like almost all WoW addons, it's built and maintained by a team of volunteers. The current Questie team is: * @AeroScripts / Aero#1357 (Discord) * @BreakBB / TheCrux#1702 (Discord) * @drejjmit / Drejjmit#8241 (Discord) * @Dyaxler / Dyaxler#0086 (Discord) * @gogo1951 / Gogo#0298 (Discord) If you'd like to help, please consider making a donation. You can do so here: https://www.paypal.com/cgi-bin/webscr?cmd=_donations&business=aero1861%40gmail%2ecom&lc=CA&item_name=Questie%20Devs&currency_code=USD&bn=PP%2dDonationsBF%3abtn_donate_LG%2egif%3aNonHosted You can also help as a tester, developer or translator, please join the Questie Discord here https://discord.gg/fYcQfv7 --> ## Description <!-- Explain in detail what problem you encountered. Is a quest not showing or showing again or an objective not showing or a spawn missing? --> This quest shows up as available, but it's not. Need to figure out what the actual prerequisites are. Spoke with the guy, no dialogue or quest is available. Tested on a 55 Troll Hunter. Looks like you have to go into DM before the quest is available. Oof. Testing that out now. > Confirmed. My Undead Rogue was unable to get the chat option to start the quest until after I had entered the Dire Maul instance once (tested with another character to be sure). > https://classic.wowhead.com/quest=5527/a-reliquary-of-purity#comments:id=2968386 ## Wowhead link <!-- If this issue is about a quest/npc/item/... then please include a link to it from Wowhead: https://classic.wowhead.com --> * A Reliquary of Purity - Quest - World of Warcraft || https://classic.wowhead.com/quest=5527/a-reliquary-of-purity ## Screenshots <!-- If you can, add a screenshot to help explaining the problem (e.g. of your map where a quest is not shown but the NPC has an ! above him). Simply drag and drop the image in this input field, no need to upload it to any other image platform. --> ![image](https://user-images.githubusercontent.com/55365231/92608984-a3217700-f27b-11ea-9774-efdba530ef36.png) ## Questie version <!-- Which version of Questie are you using? You can find it by: - 1. Hovering over the Questie Minimap Icon - 2. looking at your Questie.toc file (open it with any text editor). It looks something like this: "v5.9.0" or "## Version: 5.9.0". -->
defect
quest issue with a reliquary of purity read this first hello thanks for taking the time to report a bug before you proceed please verify that you re running the latest version of questie the easiest way to do this is via the twitch client but you can also download the latest version here questie is one of the most popular classic wow addons with over downloads however like almost all wow addons it s built and maintained by a team of volunteers the current questie team is aeroscripts aero discord breakbb thecrux discord drejjmit drejjmit discord dyaxler dyaxler discord gogo discord if you d like to help please consider making a donation you can do so here you can also help as a tester developer or translator please join the questie discord here description this quest shows up as available but it s not need to figure out what the actual prerequisites are spoke with the guy no dialogue or quest is available tested on a troll hunter looks like you have to go into dm before the quest is available oof testing that out now confirmed my undead rogue was unable to get the chat option to start the quest until after i had entered the dire maul instance once tested with another character to be sure wowhead link a reliquary of purity quest world of warcraft screenshots questie version which version of questie are you using you can find it by hovering over the questie minimap icon looking at your questie toc file open it with any text editor it looks something like this or version
1
40,461
10,007,384,934
IssuesEvent
2019-07-14 10:19:56
baudm/crs-o-matic
https://api.github.com/repos/baudm/crs-o-matic
closed
it outputs no class even though there is
Priority-Medium Type-Defect auto-migrated
``` What steps will reproduce the problem? 1. tried eee classes 2. tried some GE courses 3. What is the expected output? What do you see instead? no class What version of the product are you using? On what operating system? Please provide any additional information below. ``` Original issue reported on code.google.com by `nicoange...@gmail.com` on 24 Oct 2013 at 11:35
1.0
it outputs no class even though there is - ``` What steps will reproduce the problem? 1. tried eee classes 2. tried some GE courses 3. What is the expected output? What do you see instead? no class What version of the product are you using? On what operating system? Please provide any additional information below. ``` Original issue reported on code.google.com by `nicoange...@gmail.com` on 24 Oct 2013 at 11:35
defect
it outputs no class even though there is what steps will reproduce the problem tried eee classes tried some ge courses what is the expected output what do you see instead no class what version of the product are you using on what operating system please provide any additional information below original issue reported on code google com by nicoange gmail com on oct at
1
6,887
15,737,153,485
IssuesEvent
2021-03-30 02:16:55
arduino/arduino-cli
https://api.github.com/repos/arduino/arduino-cli
reopened
panic: runtime error when running the CLI daemon on my Pi
architecture: armv7 os: linux topic: gRPC
## Bug Report ### Current behavior <!-- Paste the full command you run --> I am trying to use the Arduino CLI daemon on `armv7l` over gRPC. I had this error in the Pro IDE: ``` daemon INFO panic: runtime error: invalid memory address or nil pointer dereference daemon INFO [signal SIGSEGV: segmentation violation code=0x1 addr=0x4 pc=0x12c28] daemon INFO goroutine 1 [running]: daemon INFO github.com/segmentio/stats/v4/prometheus.(*Handler).HandleMeasures(0xec44d8, 0x44dd7270, 0xbfba24fe, 0x1a71c0e, 0x0, 0xec44a0, 0x21f1300, 0x1, 0x1) daemon INFO /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/prometheus/handler.go:96 +0x1d8 daemon INFO github.com/segmentio/stats/v4.(*Engine).measure(0x21f11c0, 0x44dd7270, 0xbfba24fe, 0x1a71c0e, 0x0, 0xec44a0, 0x85f175, 0x6, 0x785f10, 0x985a50, ...) daemon INFO /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:155 +0x2b4 daemon INFO github.com/segmentio/stats/v4.(*Engine).Add(0x21f11c0, 0x85f175, 0x6, 0x785f10, 0x985a50, 0x2155e80, 0x1, 0x1) daemon INFO /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:94 +0x78 daemon INFO github.com/segmentio/stats/v4.(*Engine).Incr(...) daemon INFO /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:84 daemon INFO github.com/segmentio/stats/v4.Incr(...) daemon INFO /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:251 daemon INFO github.com/arduino/arduino-cli/cli/daemon.runDaemonCommand(0x21f74a0, 0x21ea630, 0x0, 0x5) daemon INFO /__w/arduino-cli/arduino-cli/cli/daemon/daemon.go:65 +0x7e4 daemon INFO github.com/spf13/cobra.(*Command).execute(0x21f74a0, 0x21ea600, 0x5, 0x6, 0x21f74a0, 0x21ea600) daemon INFO /github/home/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:846 +0x1f4 daemon INFO github.com/spf13/cobra.(*Command).ExecuteC(0x20ad760, 0x17, 0x0, 0x20000e0) daemon INFO /github/home/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:950 +0x26c daemon INFO github.com/spf13/cobra.(*Command).Execute(...) daemon INFO /github/home/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:887 daemon INFO main.main() daemon INFO /__w/arduino-cli/arduino-cli/main.go:31 +0x24 daemon INFO Failed to start the daemon. daemon ERROR Error: panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x4 pc=0x12c28] goroutine 1 [running]: github.com/segmentio/stats/v4/prometheus.(*Handler).HandleMeasures(0xec44d8, 0x44dd7270, 0xbfba24fe, 0x1a71c0e, 0x0, 0xec44a0, 0x21f1300, 0x1, 0x1) /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/prometheus/handler.go:96 +0x1d8 github.com/segmentio/stats/v4.(*Engine).measure(0x21f11c0, 0x44dd7270, 0xbfba24fe, 0x1a71c0e, 0x0, 0xec44a0, 0x85f175, 0x6, 0x785f10, 0x985a50, ...) /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:155 +0x2b4 github.com/segmentio/stats/v4.(*Engine).Add(0x21f11c0, 0x85f175, 0x6, 0x785f10, 0x985a50, 0x2155e80, 0x1, 0x1) /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:94 +0x78 github.com/segmentio/stats/v4.(*Engine).Incr(...) /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:84 github.com/segmentio/stats/v4.Incr(...) /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:251 github.com/arduino/arduino-cli/cli/daemon.runDaemonCommand(0x21f74a0, 0x21ea630, 0x0, 0x5) /__w/arduino-cli/arduino-cli/cli/daemon/daemon.go:65 +0x7e4 github.com/spf13/cobra.(*Command).execute(0x21f74a0, 0x21ea600, 0x5, 0x6, 0x21f74a0, 0x21ea600) /github/home/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:846 +0x1f4 github.com/spf13/cobra.(*Command).ExecuteC(0x20ad760, 0x17, 0x0, 0x20000e0) /github/home/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:950 +0x26c github.com/spf13/cobra.(*Command).Execute(...) /github/home/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:887 main.main() /__w/arduino-cli/arduino-cli/main.go:31 +0x24 ``` Disabling the `telemetry` **did** help: ``` cat ~/.arduinoProIDE/arduino-cli.yaml board_manager: additional_urls: [] daemon: port: "50051" directories: data: /home/pi/.arduino15 downloads: /home/pi/.arduino15/staging user: /home/pi/Arduino logging: file: "" format: text level: info telemetry: addr: :9090 enabled: false ``` <!-- Add a clear and concise description of the behavior. --> ### Expected behavior <!-- Add a clear and concise description of what you expected to happen. --> ### Environment - CLI version (output of `arduino-cli version`): `arduino-cli Version: 0.11.0 Commit: 0296f4d` - OS and platform: `Linux raspberrypi 4.19.118-v7l+ #1311 SMP Mon Apr 27 14:26:42 BST 2020 armv7l GNU/Linux` ### Additional context <!-- (Optional) Add any other context about the problem here. --> I used the https://downloads.arduino.cc/arduino-cli/arduino-cli_0.11.0_Linux_ARMv7.tar.gz URL to get the CLI. Update: I have corrected my original description; disabling the `telemetry` helped to work around the problem. I can confirm, without the telemetry, the daemon runs on ARM.
1.0
panic: runtime error when running the CLI daemon on my Pi - ## Bug Report ### Current behavior <!-- Paste the full command you run --> I am trying to use the Arduino CLI daemon on `armv7l` over gRPC. I had this error in the Pro IDE: ``` daemon INFO panic: runtime error: invalid memory address or nil pointer dereference daemon INFO [signal SIGSEGV: segmentation violation code=0x1 addr=0x4 pc=0x12c28] daemon INFO goroutine 1 [running]: daemon INFO github.com/segmentio/stats/v4/prometheus.(*Handler).HandleMeasures(0xec44d8, 0x44dd7270, 0xbfba24fe, 0x1a71c0e, 0x0, 0xec44a0, 0x21f1300, 0x1, 0x1) daemon INFO /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/prometheus/handler.go:96 +0x1d8 daemon INFO github.com/segmentio/stats/v4.(*Engine).measure(0x21f11c0, 0x44dd7270, 0xbfba24fe, 0x1a71c0e, 0x0, 0xec44a0, 0x85f175, 0x6, 0x785f10, 0x985a50, ...) daemon INFO /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:155 +0x2b4 daemon INFO github.com/segmentio/stats/v4.(*Engine).Add(0x21f11c0, 0x85f175, 0x6, 0x785f10, 0x985a50, 0x2155e80, 0x1, 0x1) daemon INFO /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:94 +0x78 daemon INFO github.com/segmentio/stats/v4.(*Engine).Incr(...) daemon INFO /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:84 daemon INFO github.com/segmentio/stats/v4.Incr(...) daemon INFO /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:251 daemon INFO github.com/arduino/arduino-cli/cli/daemon.runDaemonCommand(0x21f74a0, 0x21ea630, 0x0, 0x5) daemon INFO /__w/arduino-cli/arduino-cli/cli/daemon/daemon.go:65 +0x7e4 daemon INFO github.com/spf13/cobra.(*Command).execute(0x21f74a0, 0x21ea600, 0x5, 0x6, 0x21f74a0, 0x21ea600) daemon INFO /github/home/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:846 +0x1f4 daemon INFO github.com/spf13/cobra.(*Command).ExecuteC(0x20ad760, 0x17, 0x0, 0x20000e0) daemon INFO /github/home/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:950 +0x26c daemon INFO github.com/spf13/cobra.(*Command).Execute(...) daemon INFO /github/home/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:887 daemon INFO main.main() daemon INFO /__w/arduino-cli/arduino-cli/main.go:31 +0x24 daemon INFO Failed to start the daemon. daemon ERROR Error: panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x4 pc=0x12c28] goroutine 1 [running]: github.com/segmentio/stats/v4/prometheus.(*Handler).HandleMeasures(0xec44d8, 0x44dd7270, 0xbfba24fe, 0x1a71c0e, 0x0, 0xec44a0, 0x21f1300, 0x1, 0x1) /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/prometheus/handler.go:96 +0x1d8 github.com/segmentio/stats/v4.(*Engine).measure(0x21f11c0, 0x44dd7270, 0xbfba24fe, 0x1a71c0e, 0x0, 0xec44a0, 0x85f175, 0x6, 0x785f10, 0x985a50, ...) /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:155 +0x2b4 github.com/segmentio/stats/v4.(*Engine).Add(0x21f11c0, 0x85f175, 0x6, 0x785f10, 0x985a50, 0x2155e80, 0x1, 0x1) /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:94 +0x78 github.com/segmentio/stats/v4.(*Engine).Incr(...) /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:84 github.com/segmentio/stats/v4.Incr(...) /github/home/go/pkg/mod/github.com/segmentio/stats/v4@v4.5.3/engine.go:251 github.com/arduino/arduino-cli/cli/daemon.runDaemonCommand(0x21f74a0, 0x21ea630, 0x0, 0x5) /__w/arduino-cli/arduino-cli/cli/daemon/daemon.go:65 +0x7e4 github.com/spf13/cobra.(*Command).execute(0x21f74a0, 0x21ea600, 0x5, 0x6, 0x21f74a0, 0x21ea600) /github/home/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:846 +0x1f4 github.com/spf13/cobra.(*Command).ExecuteC(0x20ad760, 0x17, 0x0, 0x20000e0) /github/home/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:950 +0x26c github.com/spf13/cobra.(*Command).Execute(...) /github/home/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:887 main.main() /__w/arduino-cli/arduino-cli/main.go:31 +0x24 ``` Disabling the `telemetry` **did** help: ``` cat ~/.arduinoProIDE/arduino-cli.yaml board_manager: additional_urls: [] daemon: port: "50051" directories: data: /home/pi/.arduino15 downloads: /home/pi/.arduino15/staging user: /home/pi/Arduino logging: file: "" format: text level: info telemetry: addr: :9090 enabled: false ``` <!-- Add a clear and concise description of the behavior. --> ### Expected behavior <!-- Add a clear and concise description of what you expected to happen. --> ### Environment - CLI version (output of `arduino-cli version`): `arduino-cli Version: 0.11.0 Commit: 0296f4d` - OS and platform: `Linux raspberrypi 4.19.118-v7l+ #1311 SMP Mon Apr 27 14:26:42 BST 2020 armv7l GNU/Linux` ### Additional context <!-- (Optional) Add any other context about the problem here. --> I used the https://downloads.arduino.cc/arduino-cli/arduino-cli_0.11.0_Linux_ARMv7.tar.gz URL to get the CLI. Update: I have corrected my original description; disabling the `telemetry` helped to work around the problem. I can confirm, without the telemetry, the daemon runs on ARM.
non_defect
panic runtime error when running the cli daemon on my pi bug report current behavior i am trying to use the arduino cli daemon on over grpc i had this error in the pro ide daemon info panic runtime error invalid memory address or nil pointer dereference daemon info daemon info goroutine daemon info github com segmentio stats prometheus handler handlemeasures daemon info github home go pkg mod github com segmentio stats prometheus handler go daemon info github com segmentio stats engine measure daemon info github home go pkg mod github com segmentio stats engine go daemon info github com segmentio stats engine add daemon info github home go pkg mod github com segmentio stats engine go daemon info github com segmentio stats engine incr daemon info github home go pkg mod github com segmentio stats engine go daemon info github com segmentio stats incr daemon info github home go pkg mod github com segmentio stats engine go daemon info github com arduino arduino cli cli daemon rundaemoncommand daemon info w arduino cli arduino cli cli daemon daemon go daemon info github com cobra command execute daemon info github home go pkg mod github com cobra command go daemon info github com cobra command executec daemon info github home go pkg mod github com cobra command go daemon info github com cobra command execute daemon info github home go pkg mod github com cobra command go daemon info main main daemon info w arduino cli arduino cli main go daemon info failed to start the daemon daemon error error panic runtime error invalid memory address or nil pointer dereference goroutine github com segmentio stats prometheus handler handlemeasures github home go pkg mod github com segmentio stats prometheus handler go github com segmentio stats engine measure github home go pkg mod github com segmentio stats engine go github com segmentio stats engine add github home go pkg mod github com segmentio stats engine go github com segmentio stats engine incr github home go pkg mod github com segmentio stats engine go github com segmentio stats incr github home go pkg mod github com segmentio stats engine go github com arduino arduino cli cli daemon rundaemoncommand w arduino cli arduino cli cli daemon daemon go github com cobra command execute github home go pkg mod github com cobra command go github com cobra command executec github home go pkg mod github com cobra command go github com cobra command execute github home go pkg mod github com cobra command go main main w arduino cli arduino cli main go disabling the telemetry did help cat arduinoproide arduino cli yaml board manager additional urls daemon port directories data home pi downloads home pi staging user home pi arduino logging file format text level info telemetry addr enabled false expected behavior environment cli version output of arduino cli version arduino cli version commit os and platform linux raspberrypi smp mon apr bst gnu linux additional context i used the url to get the cli update i have corrected my original description disabling the telemetry helped to work around the problem i can confirm without the telemetry the daemon runs on arm
0
12,327
2,691,987,002
IssuesEvent
2015-04-01 02:22:08
cakephp/cakephp
https://api.github.com/repos/cakephp/cakephp
closed
Hash::maxDimensions() is never 1
Defect utility
I'm currently using 2.6.3 and noticed that Hash::dimensions() and Hash::maxDimensions() deliver different results for simple arrays. If the array has multiple dimensions, everything is fine. But in a case where the contents of an array can differ from empty to several dimensions, the behavior of Hash::maxDimensions() is somehow unexpected: ``` // example 1: empty array $array = array(); pr(Hash::dimensions($array)); // -> 0 pr(Hash::maxDimensions($array)); // -> Warning (2): max(): Array must contain at least one element [CORE/Cake/Utility/Hash.php, line 769] // example 2: only 1 dimension $array = array('a', 'b', 'c'); pr(Hash::dimensions($array)); // -> 1 pr(Hash::maxDimensions($array)); // -> 2 // example 3: multiple dimensions $array = array('a' => array('x'), 'b', 'c'); pr(Hash::dimensions($array)); // -> 2 pr(Hash::maxDimensions($array)); // -> 2 ``` So in examples 1 and 2 you can see, what I'm talking about. I modified the core method from ``` public static function maxDimensions(array $data) { $depth = array(); if (is_array($data) && reset($data) !== false) { foreach ($data as $value) { $depth[] = self::dimensions((array)$value) + 1; } } return max($depth); } ``` to ``` public static function maxDimensions(array $data) { $depth = array(); if (is_array($data) && reset($data) !== false) { foreach ($data as $value) { $depth[] = self::dimensions((array)$value) + ((is_array($value)) ? 1 : 0); // modified } } return (!empty($depth)) ? max($depth) : 0; // modified } ``` to achieve the same results from Hash::dimensions() and Hash::maxDimensions(), but i guess it could be fixed somehow "cleaner".
1.0
Hash::maxDimensions() is never 1 - I'm currently using 2.6.3 and noticed that Hash::dimensions() and Hash::maxDimensions() deliver different results for simple arrays. If the array has multiple dimensions, everything is fine. But in a case where the contents of an array can differ from empty to several dimensions, the behavior of Hash::maxDimensions() is somehow unexpected: ``` // example 1: empty array $array = array(); pr(Hash::dimensions($array)); // -> 0 pr(Hash::maxDimensions($array)); // -> Warning (2): max(): Array must contain at least one element [CORE/Cake/Utility/Hash.php, line 769] // example 2: only 1 dimension $array = array('a', 'b', 'c'); pr(Hash::dimensions($array)); // -> 1 pr(Hash::maxDimensions($array)); // -> 2 // example 3: multiple dimensions $array = array('a' => array('x'), 'b', 'c'); pr(Hash::dimensions($array)); // -> 2 pr(Hash::maxDimensions($array)); // -> 2 ``` So in examples 1 and 2 you can see, what I'm talking about. I modified the core method from ``` public static function maxDimensions(array $data) { $depth = array(); if (is_array($data) && reset($data) !== false) { foreach ($data as $value) { $depth[] = self::dimensions((array)$value) + 1; } } return max($depth); } ``` to ``` public static function maxDimensions(array $data) { $depth = array(); if (is_array($data) && reset($data) !== false) { foreach ($data as $value) { $depth[] = self::dimensions((array)$value) + ((is_array($value)) ? 1 : 0); // modified } } return (!empty($depth)) ? max($depth) : 0; // modified } ``` to achieve the same results from Hash::dimensions() and Hash::maxDimensions(), but i guess it could be fixed somehow "cleaner".
defect
hash maxdimensions is never i m currently using and noticed that hash dimensions and hash maxdimensions deliver different results for simple arrays if the array has multiple dimensions everything is fine but in a case where the contents of an array can differ from empty to several dimensions the behavior of hash maxdimensions is somehow unexpected example empty array array array pr hash dimensions array pr hash maxdimensions array warning max array must contain at least one element example only dimension array array a b c pr hash dimensions array pr hash maxdimensions array example multiple dimensions array array a array x b c pr hash dimensions array pr hash maxdimensions array so in examples and you can see what i m talking about i modified the core method from public static function maxdimensions array data depth array if is array data reset data false foreach data as value depth self dimensions array value return max depth to public static function maxdimensions array data depth array if is array data reset data false foreach data as value depth self dimensions array value is array value modified return empty depth max depth modified to achieve the same results from hash dimensions and hash maxdimensions but i guess it could be fixed somehow cleaner
1
213,560
16,527,216,926
IssuesEvent
2021-05-26 21:57:41
nopunin10did/keycap-designers-guide
https://api.github.com/repos/nopunin10did/keycap-designers-guide
reopened
Old Doc Port: Important Concepts
documentation
Port the Important Concepts section from the old document to here.
1.0
Old Doc Port: Important Concepts - Port the Important Concepts section from the old document to here.
non_defect
old doc port important concepts port the important concepts section from the old document to here
0
9,375
2,615,146,345
IssuesEvent
2015-03-01 06:22:25
chrsmith/html5rocks
https://api.github.com/repos/chrsmith/html5rocks
closed
Broken links on website
auto-migrated Priority-Medium Type-Defect
``` Very minor issue...the links in the footer of the "Samples Studio" do not work as the page is hosted on a new domain and the links are relative, e.g. http://studio.html5rocks.com/tos.html. ``` Original issue reported on code.google.com by `ian.tip...@gmail.com` on 17 Aug 2010 at 8:36
1.0
Broken links on website - ``` Very minor issue...the links in the footer of the "Samples Studio" do not work as the page is hosted on a new domain and the links are relative, e.g. http://studio.html5rocks.com/tos.html. ``` Original issue reported on code.google.com by `ian.tip...@gmail.com` on 17 Aug 2010 at 8:36
defect
broken links on website very minor issue the links in the footer of the samples studio do not work as the page is hosted on a new domain and the links are relative e g original issue reported on code google com by ian tip gmail com on aug at
1
40,782
6,848,255,034
IssuesEvent
2017-11-13 17:52:23
cloudant/sync-android
https://api.github.com/repos/cloudant/sync-android
closed
Proguard on Android
documentation
I implemented sync-android on my Android app following the sample todo app. My app is written in **Kotlin**. Not sure if this is important but stating it here anyway. Everything worked fine until I enabled Proguard. Since there was no mention of Proguard in the README or docs, I followed the Proguard config file from the sample app as below: ``` -keepattributes Signature,*Annotation*,EnclosingMethod -keepattributes InnerClasses -keepattributes SourceFile,LineNumberTable -keepnames class com.fasterxml.jackson.** { *; } -keep class org.w3c.dom.bootstrap.DOMImplementationRegistry -keep class javax.inject.** { *; } -keep class com.cloudant.** { *; } -dontwarn com.cloudant.http.** -dontwarn com.fasterxml.jackson.** ``` However, I realized that the completion event was not being fired. After much debugging, I figured out that the following methods (from [TaskModel.java](https://github.com/cloudant/sync-android/blob/master/sample/todo-sync/src/com/cloudant/todo/TasksModel.java)) were being removed: ``` /** javadoc comment */ @Subscribe public void complete(ReplicationCompleted rc) { // handler code.. } /** javadoc comment */ @Subscribe public void error(ReplicationErrored re) { // handler code.. } ``` So, I went ahead and set a rule to keep all the public methods etc within my class: ``` -keep class com.azri.myapp.service.DataModel { public *; } ``` And fixed! My issue now is: 1. Did I miss something else that was obvious that I shouldn't have to set a different proguard rule? 2. If I did the right things, maybe this should be mentioned explicitly in the README or docs? This is usually done for a lot of libraries I've seen. Thanks! 😄
1.0
Proguard on Android - I implemented sync-android on my Android app following the sample todo app. My app is written in **Kotlin**. Not sure if this is important but stating it here anyway. Everything worked fine until I enabled Proguard. Since there was no mention of Proguard in the README or docs, I followed the Proguard config file from the sample app as below: ``` -keepattributes Signature,*Annotation*,EnclosingMethod -keepattributes InnerClasses -keepattributes SourceFile,LineNumberTable -keepnames class com.fasterxml.jackson.** { *; } -keep class org.w3c.dom.bootstrap.DOMImplementationRegistry -keep class javax.inject.** { *; } -keep class com.cloudant.** { *; } -dontwarn com.cloudant.http.** -dontwarn com.fasterxml.jackson.** ``` However, I realized that the completion event was not being fired. After much debugging, I figured out that the following methods (from [TaskModel.java](https://github.com/cloudant/sync-android/blob/master/sample/todo-sync/src/com/cloudant/todo/TasksModel.java)) were being removed: ``` /** javadoc comment */ @Subscribe public void complete(ReplicationCompleted rc) { // handler code.. } /** javadoc comment */ @Subscribe public void error(ReplicationErrored re) { // handler code.. } ``` So, I went ahead and set a rule to keep all the public methods etc within my class: ``` -keep class com.azri.myapp.service.DataModel { public *; } ``` And fixed! My issue now is: 1. Did I miss something else that was obvious that I shouldn't have to set a different proguard rule? 2. If I did the right things, maybe this should be mentioned explicitly in the README or docs? This is usually done for a lot of libraries I've seen. Thanks! 😄
non_defect
proguard on android i implemented sync android on my android app following the sample todo app my app is written in kotlin not sure if this is important but stating it here anyway everything worked fine until i enabled proguard since there was no mention of proguard in the readme or docs i followed the proguard config file from the sample app as below keepattributes signature annotation enclosingmethod keepattributes innerclasses keepattributes sourcefile linenumbertable keepnames class com fasterxml jackson keep class org dom bootstrap domimplementationregistry keep class javax inject keep class com cloudant dontwarn com cloudant http dontwarn com fasterxml jackson however i realized that the completion event was not being fired after much debugging i figured out that the following methods from were being removed javadoc comment subscribe public void complete replicationcompleted rc handler code javadoc comment subscribe public void error replicationerrored re handler code so i went ahead and set a rule to keep all the public methods etc within my class keep class com azri myapp service datamodel public and fixed my issue now is did i miss something else that was obvious that i shouldn t have to set a different proguard rule if i did the right things maybe this should be mentioned explicitly in the readme or docs this is usually done for a lot of libraries i ve seen thanks 😄
0
24,986
4,162,065,920
IssuesEvent
2016-06-17 18:54:32
contao/core-bundle
https://api.github.com/repos/contao/core-bundle
closed
Duplicating modules in page layout does not work properly
defect
If I duplicate a module in the page layout, the column value after saving is wrong. **How to reproduce:** In your page layout duplicate a module from the type "Main column", "Footer", but NOT "Header". After saving your column type changed to "Header". Appears in Contao 4.2 beta and the release from today. **The problem** Incrementing the array key in the name value in /assets/contao/js/core.js does not work for the column field. The getFirst() function works not recursivly and the select element is not found. **Solution** In /assets/contao/js/core.js:1780 change getFirst to getElement: ```javascript if (select = childs[j].getElement('select')) { select.name = select.name.replace(/\[[0-9]+]/g, '[' + i + ']'); } ```
1.0
Duplicating modules in page layout does not work properly - If I duplicate a module in the page layout, the column value after saving is wrong. **How to reproduce:** In your page layout duplicate a module from the type "Main column", "Footer", but NOT "Header". After saving your column type changed to "Header". Appears in Contao 4.2 beta and the release from today. **The problem** Incrementing the array key in the name value in /assets/contao/js/core.js does not work for the column field. The getFirst() function works not recursivly and the select element is not found. **Solution** In /assets/contao/js/core.js:1780 change getFirst to getElement: ```javascript if (select = childs[j].getElement('select')) { select.name = select.name.replace(/\[[0-9]+]/g, '[' + i + ']'); } ```
defect
duplicating modules in page layout does not work properly if i duplicate a module in the page layout the column value after saving is wrong how to reproduce in your page layout duplicate a module from the type main column footer but not header after saving your column type changed to header appears in contao beta and the release from today the problem incrementing the array key in the name value in assets contao js core js does not work for the column field the getfirst function works not recursivly and the select element is not found solution in assets contao js core js change getfirst to getelement javascript if select childs getelement select select name select name replace g
1
23,878
3,863,517,371
IssuesEvent
2016-04-08 09:45:49
iamxavier/elmah
https://api.github.com/repos/iamxavier/elmah
closed
Configuration file in samples directory broken
auto-migrated Priority-Medium Type-Defect
``` The trunk version of the web.config file in the samples directory, has the elmah section broken out into a seperate file (by using the configSource attribute). However, it doesn't work in.NET 2.0, 3.5 & 4.0; as you can not break out sectionGroup elements. You can only break out the individual ConfigurationSection elements, i.e. security, errorLog, errorMail etc. Is it worth merging the files together again? Breaking out each section instead? Or adding a note to explain that for the demo to work, the config files need to be merged together? ``` Original issue reported on code.google.com by `simon.ba...@me.com` on 19 Mar 2010 at 9:39
1.0
Configuration file in samples directory broken - ``` The trunk version of the web.config file in the samples directory, has the elmah section broken out into a seperate file (by using the configSource attribute). However, it doesn't work in.NET 2.0, 3.5 & 4.0; as you can not break out sectionGroup elements. You can only break out the individual ConfigurationSection elements, i.e. security, errorLog, errorMail etc. Is it worth merging the files together again? Breaking out each section instead? Or adding a note to explain that for the demo to work, the config files need to be merged together? ``` Original issue reported on code.google.com by `simon.ba...@me.com` on 19 Mar 2010 at 9:39
defect
configuration file in samples directory broken the trunk version of the web config file in the samples directory has the elmah section broken out into a seperate file by using the configsource attribute however it doesn t work in net as you can not break out sectiongroup elements you can only break out the individual configurationsection elements i e security errorlog errormail etc is it worth merging the files together again breaking out each section instead or adding a note to explain that for the demo to work the config files need to be merged together original issue reported on code google com by simon ba me com on mar at
1
58,826
16,814,140,574
IssuesEvent
2021-06-17 04:26:46
idaholab/moose
https://api.github.com/repos/idaholab/moose
opened
Moose basic create application using docker is failed
P: normal T: defect
Hi, I am using moose with docker. I tried to create application by using following steps in [Website](https://mooseframework.inl.gov/getting_started/new_users.html#create-an-app). When I run ``` ./run_tests -j4 ``` I am getting error message like "failed to import pyhit - try running make hit in $MOOSE_DIR/test" How can I solve this issue?
1.0
Moose basic create application using docker is failed - Hi, I am using moose with docker. I tried to create application by using following steps in [Website](https://mooseframework.inl.gov/getting_started/new_users.html#create-an-app). When I run ``` ./run_tests -j4 ``` I am getting error message like "failed to import pyhit - try running make hit in $MOOSE_DIR/test" How can I solve this issue?
defect
moose basic create application using docker is failed hi i am using moose with docker i tried to create application by using following steps in when i run run tests i am getting error message like failed to import pyhit try running make hit in moose dir test how can i solve this issue
1
1,102
2,595,143,459
IssuesEvent
2015-02-20 11:52:11
keyboardsurfer/blinkendroid
https://api.github.com/repos/keyboardsurfer/blinkendroid
opened
Filmwahl Random
auto-migrated Milestone-Release1.0 Priority-Medium Type-Defect Usability
``` Muss entweder implementiert oder entfernt werden ``` ----- Original issue reported on code.google.com by `lischke@gmail.com` on 25 May 2010 at 2:14
1.0
Filmwahl Random - ``` Muss entweder implementiert oder entfernt werden ``` ----- Original issue reported on code.google.com by `lischke@gmail.com` on 25 May 2010 at 2:14
defect
filmwahl random muss entweder implementiert oder entfernt werden original issue reported on code google com by lischke gmail com on may at
1
45,912
13,135,935,749
IssuesEvent
2020-08-07 04:30:49
shaundmorris/ddf
https://api.github.com/repos/shaundmorris/ddf
closed
CVE-2019-6283 Medium Severity Vulnerability detected by WhiteSource
security vulnerability wontfix
## CVE-2019-6283 - Medium Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.11.0</b></p></summary> <p> <p>:rainbow: Node.js bindings to libsass</p> <p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/shaundmorris/ddf/commit/4c9bdfcbc6aa25dbfe114c78fa43b8071304283b">4c9bdfcbc6aa25dbfe114c78fa43b8071304283b</a></p> </p> </details> </p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Library Source Files (121)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/output.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/output.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/bind.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_node.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/constants.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/eval.hpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/base.h - /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/extend.cpp - /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.cpp - /ddf/ui/node_modules/node-sass/src/libsass/contrib/plugin.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_superselector.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cencode.c - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/file.cpp - /ddf/ui/node_modules/node-sass/src/callback_bridge.h - /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass2scss.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/environment.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/paths.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/expand.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/listize.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_unification.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/list.h - /ddf/ui/node_modules/node-sass/src/libsass/src/json.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/position.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/listize.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/eval.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/string.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/environment.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/boolean.h - /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/extend.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/functions.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/debugger.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/factory.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/color.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/operation.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/constants.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/boolean.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/context.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/value.h - /ddf/ui/node_modules/node-sass/src/libsass/src/units.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/parser.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/functions.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/position.hpp - /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/node.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.cpp - /ddf/ui/node_modules/node-sass/src/binding.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/list.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/functions.h - /ddf/ui/node_modules/node-sass/src/custom_function_bridge.cpp - /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.h - /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/sass_value_wrapper.h - /ddf/ui/node_modules/node-sass/src/libsass/src/ast.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/values.cpp - /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.h - /ddf/ui/node_modules/node-sass/src/libsass/src/b64/encode.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/base64vlq.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/number.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/c99func.c - /ddf/ui/node_modules/node-sass/src/libsass/src/node.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/util.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/backtrace.hpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/values.h - /ddf/ui/node_modules/node-sass/src/libsass/test/test_subset_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass2scss.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/null.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/expand.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/context.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/context.h - /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.hpp - /ddf/ui/node_modules/node-sass/src/libsass/script/test-leaks.pl - /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/util.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/file.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/units.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/color.h - /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/debug.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/parser.hpp </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::parenthese_scope in prelexer.hpp. <p>Publish Date: 2019-01-14 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6283>CVE-2019-6283</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-6283 Medium Severity Vulnerability detected by WhiteSource - ## CVE-2019-6283 - Medium Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.11.0</b></p></summary> <p> <p>:rainbow: Node.js bindings to libsass</p> <p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/shaundmorris/ddf/commit/4c9bdfcbc6aa25dbfe114c78fa43b8071304283b">4c9bdfcbc6aa25dbfe114c78fa43b8071304283b</a></p> </p> </details> </p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Library Source Files (121)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/output.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/output.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/bind.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_node.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/constants.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/eval.hpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/base.h - /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/extend.cpp - /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.cpp - /ddf/ui/node_modules/node-sass/src/libsass/contrib/plugin.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_superselector.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cencode.c - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/file.cpp - /ddf/ui/node_modules/node-sass/src/callback_bridge.h - /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass2scss.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/environment.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/paths.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/expand.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/listize.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_unification.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/list.h - /ddf/ui/node_modules/node-sass/src/libsass/src/json.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/position.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/listize.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/eval.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/string.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/environment.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/boolean.h - /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/extend.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/functions.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/debugger.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/factory.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/color.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/operation.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/constants.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/boolean.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/context.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/value.h - /ddf/ui/node_modules/node-sass/src/libsass/src/units.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/parser.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/functions.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/position.hpp - /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/node.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.cpp - /ddf/ui/node_modules/node-sass/src/binding.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/list.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/functions.h - /ddf/ui/node_modules/node-sass/src/custom_function_bridge.cpp - /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.h - /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/sass_value_wrapper.h - /ddf/ui/node_modules/node-sass/src/libsass/src/ast.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/values.cpp - /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.h - /ddf/ui/node_modules/node-sass/src/libsass/src/b64/encode.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/base64vlq.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/number.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/c99func.c - /ddf/ui/node_modules/node-sass/src/libsass/src/node.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/util.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/backtrace.hpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/values.h - /ddf/ui/node_modules/node-sass/src/libsass/test/test_subset_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass2scss.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/null.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/expand.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/context.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/context.h - /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.hpp - /ddf/ui/node_modules/node-sass/src/libsass/script/test-leaks.pl - /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/util.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/file.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/units.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/color.h - /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/debug.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/parser.hpp </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::parenthese_scope in prelexer.hpp. <p>Publish Date: 2019-01-14 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6283>CVE-2019-6283</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve medium severity vulnerability detected by whitesource cve medium severity vulnerability vulnerable library node rainbow node js bindings to libsass library home page a href found in head commit a href library source files the source files were matched to this source library based on a best effort match source libraries are selected from a list of probable public libraries ddf ui node modules node sass src libsass src error handling cpp ddf ui node modules node sass src libsass src output cpp ddf ui node modules node sass src libsass src output hpp ddf ui node modules node sass src libsass src sass values hpp ddf ui node modules node sass src libsass src check nesting cpp ddf ui node modules node sass src libsass src check nesting hpp ddf ui node modules node sass src libsass src bind cpp ddf ui node modules node sass src libsass test test node cpp ddf ui node modules node sass src libsass src constants cpp ddf ui node modules node sass src libsass src plugins cpp ddf ui node modules node sass src libsass src eval hpp ddf ui node modules node sass src libsass include sass base h ddf ui node modules node sass src libsass src prelexer hpp ddf ui node modules node sass src libsass src subset map hpp ddf ui node modules node sass src libsass src extend cpp ddf ui node modules node sass src custom importer bridge cpp ddf ui node modules node sass src libsass contrib plugin cpp ddf ui node modules node sass src libsass src lexer hpp ddf ui node modules node sass src libsass src sass util cpp ddf ui node modules node sass src libsass test test superselector cpp ddf ui node modules node sass src libsass src cencode c ddf ui node modules node sass src libsass src ast fwd decl hpp ddf ui node modules node sass src libsass src string hpp ddf ui node modules node sass src libsass src file cpp ddf ui node modules node sass src callback bridge h ddf ui node modules node sass src libsass src subset map cpp ddf ui node modules node sass src libsass include h ddf ui node modules node sass src libsass src sass functions hpp ddf ui node modules node sass src libsass src emitter cpp ddf ui node modules node sass src libsass src environment cpp ddf ui node modules node sass src libsass src ast def macros hpp ddf ui node modules node sass src libsass src paths hpp ddf ui node modules node sass src libsass src expand cpp ddf ui node modules node sass src libsass src listize cpp ddf ui node modules node sass src libsass test test unification cpp ddf ui node modules node sass src libsass src source map cpp ddf ui node modules node sass src libsass src inspect cpp ddf ui node modules node sass src libsass src source map hpp ddf ui node modules node sass src sass types list h ddf ui node modules node sass src libsass src json cpp ddf ui node modules node sass src libsass src sass functions cpp ddf ui node modules node sass src libsass src sass util hpp ddf ui node modules node sass src libsass src position cpp ddf ui node modules node sass src libsass src listize hpp ddf ui node modules node sass src libsass src error handling hpp ddf ui node modules node sass src libsass src eval cpp ddf ui node modules node sass src sass types string cpp ddf ui node modules node sass src libsass src environment hpp ddf ui node modules node sass src sass types boolean h ddf ui node modules node sass src libsass src emitter hpp ddf ui node modules node sass src libsass src extend hpp ddf ui node modules node sass src libsass src lexer cpp ddf ui node modules node sass src libsass src functions cpp ddf ui node modules node sass src libsass src debugger hpp ddf ui node modules node sass src libsass src prelexer cpp ddf ui node modules node sass src sass types factory cpp ddf ui node modules node sass src sass types color cpp ddf ui node modules node sass src libsass src operation hpp ddf ui node modules node sass src libsass src ast cpp ddf ui node modules node sass src libsass src sass hpp ddf ui node modules node sass src libsass src constants hpp ddf ui node modules node sass src sass types boolean cpp ddf ui node modules node sass src libsass src context hpp ddf ui node modules node sass src sass types value h ddf ui node modules node sass src libsass src units cpp ddf ui node modules node sass src libsass src cssize hpp ddf ui node modules node sass src libsass src parser cpp ddf ui node modules node sass src libsass src functions hpp ddf ui node modules node sass src libsass src position hpp ddf ui node modules node sass src sass context wrapper cpp ddf ui node modules node sass src libsass src sass context hpp ddf ui node modules node sass src libsass src node cpp ddf ui node modules node sass src libsass src ast fwd decl cpp ddf ui node modules node sass src libsass src cssize cpp ddf ui node modules node sass src libsass src remove placeholders cpp ddf ui node modules node sass src binding cpp ddf ui node modules node sass src sass types list cpp ddf ui node modules node sass src libsass include sass functions h ddf ui node modules node sass src custom function bridge cpp ddf ui node modules node sass src custom importer bridge h ddf ui node modules node sass src libsass src color maps cpp ddf ui node modules node sass src libsass src string cpp ddf ui node modules node sass src sass types sass value wrapper h ddf ui node modules node sass src libsass src ast hpp ddf ui node modules node sass src libsass src values cpp ddf ui node modules node sass src sass context wrapper h ddf ui node modules node sass src libsass src encode h ddf ui node modules node sass src libsass src sass cpp ddf ui node modules node sass src libsass src cpp ddf ui node modules node sass src sass types number cpp ddf ui node modules node sass src libsass src c ddf ui node modules node sass src libsass src node hpp ddf ui node modules node sass src libsass src remove placeholders hpp ddf ui node modules node sass src libsass src util cpp ddf ui node modules node sass src libsass src memory sharedptr hpp ddf ui node modules node sass src libsass src backtrace hpp ddf ui node modules node sass src libsass include sass values h ddf ui node modules node sass src libsass test test subset map cpp ddf ui node modules node sass src libsass src cpp ddf ui node modules node sass src libsass src sass context cpp ddf ui node modules node sass src libsass src memory sharedptr cpp ddf ui node modules node sass src sass types null cpp ddf ui node modules node sass src libsass src expand hpp ddf ui node modules node sass src libsass src to value hpp ddf ui node modules node sass src libsass src context cpp ddf ui node modules node sass src libsass include sass context h ddf ui node modules node sass src libsass src to c cpp ddf ui node modules node sass src libsass src sass values cpp ddf ui node modules node sass src libsass src color maps hpp ddf ui node modules node sass src libsass src inspect hpp ddf ui node modules node sass src libsass script test leaks pl ddf ui node modules node sass src libsass src to c hpp ddf ui node modules node sass src libsass src util hpp ddf ui node modules node sass src libsass src file hpp ddf ui node modules node sass src sass types map cpp ddf ui node modules node sass src libsass src units hpp ddf ui node modules node sass src libsass src plugins hpp ddf ui node modules node sass src sass types color h ddf ui node modules node sass src libsass src to value cpp ddf ui node modules node sass src libsass src debug hpp ddf ui node modules node sass src libsass src parser hpp vulnerability details in libsass a heap based buffer over read exists in sass prelexer parenthese scope in prelexer hpp publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with whitesource
0
43,152
11,502,952,558
IssuesEvent
2020-02-12 20:06:11
idaholab/moose
https://api.github.com/repos/idaholab/moose
opened
Fix are_queued_jobs_finished.py to be Python3 compatible.
T: defect
## Bug Description This function in `are_queued_jobs_finished.py` no longer works using Python3, as `iteritems()` is no longer available: ```python def yieldJobsResultPath(self): for k, v in self.__job_data.iteritems(): yield k, v ``` The Python3 version of `.items()` now does this. This function can be fixed by ```python def yieldJobsResultPath(self): for k, v in self.__job_data.items(): yield k, v ``` ## Steps to Reproduce Try running this script using Python3. ## Impact Prevents the BISON nightly script from running. I have a PR ready to submit.
1.0
Fix are_queued_jobs_finished.py to be Python3 compatible. - ## Bug Description This function in `are_queued_jobs_finished.py` no longer works using Python3, as `iteritems()` is no longer available: ```python def yieldJobsResultPath(self): for k, v in self.__job_data.iteritems(): yield k, v ``` The Python3 version of `.items()` now does this. This function can be fixed by ```python def yieldJobsResultPath(self): for k, v in self.__job_data.items(): yield k, v ``` ## Steps to Reproduce Try running this script using Python3. ## Impact Prevents the BISON nightly script from running. I have a PR ready to submit.
defect
fix are queued jobs finished py to be compatible bug description this function in are queued jobs finished py no longer works using as iteritems is no longer available python def yieldjobsresultpath self for k v in self job data iteritems yield k v the version of items now does this this function can be fixed by python def yieldjobsresultpath self for k v in self job data items yield k v steps to reproduce try running this script using impact prevents the bison nightly script from running i have a pr ready to submit
1
11,665
2,660,030,414
IssuesEvent
2015-03-19 01:46:30
perfsonar/project
https://api.github.com/repos/perfsonar/project
closed
owamp should take configure options into account when compiling debug-specific code
Milestone-Release3.4.2 Priority-Medium Type-Defect
Original [issue 1067](https://code.google.com/p/perfsonar-ps/issues/detail?id=1067) created by arlake228 on 2015-01-30T10:23:34.000Z: <b>What steps will reproduce the problem?</b> 1. Configure owamp without --enable-debug option and run &quot;make&quot; 2. Observe that logs are emitted with filenames and line numbers, and debugging CLI options are present in programs. <b>What is the expected output? What do you see instead?</b> Unless &quot;--enable-debug&quot; is specified to configure expect that debugging CLI options are not included and log messages don't include filenames and line numbers. <b>What version of the product are you using? On what operating system?</b> 3.4-10 <b>Please provide any additional information below.</b> Fix available here: https://code.google.com/r/robertshearman-owamp/source/detail?r=0e429527aefbc65fe9570c2896245264bbc3336e&amp;name=debugflag Unrelated compile fix for an earlier commit of mine is also available here: https://code.google.com/r/robertshearman-owamp/source/detail?r=6a7cd19f4766a3ac4b8625b403c9f290188dff78&amp;name=debugflag
1.0
owamp should take configure options into account when compiling debug-specific code - Original [issue 1067](https://code.google.com/p/perfsonar-ps/issues/detail?id=1067) created by arlake228 on 2015-01-30T10:23:34.000Z: <b>What steps will reproduce the problem?</b> 1. Configure owamp without --enable-debug option and run &quot;make&quot; 2. Observe that logs are emitted with filenames and line numbers, and debugging CLI options are present in programs. <b>What is the expected output? What do you see instead?</b> Unless &quot;--enable-debug&quot; is specified to configure expect that debugging CLI options are not included and log messages don't include filenames and line numbers. <b>What version of the product are you using? On what operating system?</b> 3.4-10 <b>Please provide any additional information below.</b> Fix available here: https://code.google.com/r/robertshearman-owamp/source/detail?r=0e429527aefbc65fe9570c2896245264bbc3336e&amp;name=debugflag Unrelated compile fix for an earlier commit of mine is also available here: https://code.google.com/r/robertshearman-owamp/source/detail?r=6a7cd19f4766a3ac4b8625b403c9f290188dff78&amp;name=debugflag
defect
owamp should take configure options into account when compiling debug specific code original created by on what steps will reproduce the problem configure owamp without enable debug option and run quot make quot observe that logs are emitted with filenames and line numbers and debugging cli options are present in programs what is the expected output what do you see instead unless quot enable debug quot is specified to configure expect that debugging cli options are not included and log messages don t include filenames and line numbers what version of the product are you using on what operating system please provide any additional information below fix available here unrelated compile fix for an earlier commit of mine is also available here
1
196,254
6,926,234,131
IssuesEvent
2017-11-30 18:27:07
minio/minio
https://api.github.com/repos/minio/minio
closed
Complete CreateFile as soon as write quorum is obtained
priority: medium triage
In CreateFile (for erasure coding), when writing out the parts to the individual disks or nodes, we can optimize the behaviour to return successful completion as soon as the write quorum is in. That is, once we have received a number of successul responses that is equal to the write quorum, we can complete the function and return success. We should let the other operations complete normally but their responses do no longer matter (since we already got write quorum). This will protect us against the slowest operation which makes the overall system performance vulnerable to (bad) outliers.
1.0
Complete CreateFile as soon as write quorum is obtained - In CreateFile (for erasure coding), when writing out the parts to the individual disks or nodes, we can optimize the behaviour to return successful completion as soon as the write quorum is in. That is, once we have received a number of successul responses that is equal to the write quorum, we can complete the function and return success. We should let the other operations complete normally but their responses do no longer matter (since we already got write quorum). This will protect us against the slowest operation which makes the overall system performance vulnerable to (bad) outliers.
non_defect
complete createfile as soon as write quorum is obtained in createfile for erasure coding when writing out the parts to the individual disks or nodes we can optimize the behaviour to return successful completion as soon as the write quorum is in that is once we have received a number of successul responses that is equal to the write quorum we can complete the function and return success we should let the other operations complete normally but their responses do no longer matter since we already got write quorum this will protect us against the slowest operation which makes the overall system performance vulnerable to bad outliers
0
39,286
9,377,044,420
IssuesEvent
2019-04-04 09:24:06
PowerDNS/pdns
https://api.github.com/repos/PowerDNS/pdns
closed
dnsdist: disabled servers return latency as 'null' which breaks webinterface
defect dnsdist
- Program: dnsdist - Issue type: Bug report ### Short description The dnsdist webinterface breaks when a server is marked as down using `getServer(x):setDown()`. The reason for this is that the 'latency' value from `/api/v1/servers/localhost` is returned as null, which in turn is read by the webinterface. The webinterface tries to show this value as a two decimal number, which causes an JS error. This causes the entire servers table to not be updated, until the server is marked as up again. Servers that are marked as down by dnsdist itself do not show this behaviour. ### Environment - Operating system: Ubuntu 14.04 + Firefox 65 and Chrome 71 - Software version: dnsdist 1.3.3 - Software source: PowerDNS Debian package for Ubuntu 18.04 ### Steps to reproduce 1. Load any config with at least one server and enable webinterface and client socket. 2. Open webinterface in browser, see that the servers table is updated as normal. 3. Use `dnsdist -c` to connect to the running dnsdist instance and set the server down using `getServer(0):setDown()`. 4. The servers table in the webinterface is now broken, and JS errors are show in the browser console. ### Expected behaviour The table should not break when servers are marked as down. ### Actual behaviour The table breaks when a server is marked as down. ### Other information We should either not return the latency value as null from the API, or have the JS properly handle this case. Seeing as no other values are returned as null when a server is marked down, the first solution seems the most elegant. Specifically, this line probably causes the behaviour : https://github.com/PowerDNS/pdns/blob/master/pdns/dnsdist-web.cc#L565 . I don't agree that hiding the latency for servers that are down is a good idea. If the server has been up, then the latency shown is for when it was responding. Otherwise, we should also null queries, dropRate and sendErrors to be consistent.
1.0
dnsdist: disabled servers return latency as 'null' which breaks webinterface - - Program: dnsdist - Issue type: Bug report ### Short description The dnsdist webinterface breaks when a server is marked as down using `getServer(x):setDown()`. The reason for this is that the 'latency' value from `/api/v1/servers/localhost` is returned as null, which in turn is read by the webinterface. The webinterface tries to show this value as a two decimal number, which causes an JS error. This causes the entire servers table to not be updated, until the server is marked as up again. Servers that are marked as down by dnsdist itself do not show this behaviour. ### Environment - Operating system: Ubuntu 14.04 + Firefox 65 and Chrome 71 - Software version: dnsdist 1.3.3 - Software source: PowerDNS Debian package for Ubuntu 18.04 ### Steps to reproduce 1. Load any config with at least one server and enable webinterface and client socket. 2. Open webinterface in browser, see that the servers table is updated as normal. 3. Use `dnsdist -c` to connect to the running dnsdist instance and set the server down using `getServer(0):setDown()`. 4. The servers table in the webinterface is now broken, and JS errors are show in the browser console. ### Expected behaviour The table should not break when servers are marked as down. ### Actual behaviour The table breaks when a server is marked as down. ### Other information We should either not return the latency value as null from the API, or have the JS properly handle this case. Seeing as no other values are returned as null when a server is marked down, the first solution seems the most elegant. Specifically, this line probably causes the behaviour : https://github.com/PowerDNS/pdns/blob/master/pdns/dnsdist-web.cc#L565 . I don't agree that hiding the latency for servers that are down is a good idea. If the server has been up, then the latency shown is for when it was responding. Otherwise, we should also null queries, dropRate and sendErrors to be consistent.
defect
dnsdist disabled servers return latency as null which breaks webinterface program dnsdist issue type bug report short description the dnsdist webinterface breaks when a server is marked as down using getserver x setdown the reason for this is that the latency value from api servers localhost is returned as null which in turn is read by the webinterface the webinterface tries to show this value as a two decimal number which causes an js error this causes the entire servers table to not be updated until the server is marked as up again servers that are marked as down by dnsdist itself do not show this behaviour environment operating system ubuntu firefox and chrome software version dnsdist software source powerdns debian package for ubuntu steps to reproduce load any config with at least one server and enable webinterface and client socket open webinterface in browser see that the servers table is updated as normal use dnsdist c to connect to the running dnsdist instance and set the server down using getserver setdown the servers table in the webinterface is now broken and js errors are show in the browser console expected behaviour the table should not break when servers are marked as down actual behaviour the table breaks when a server is marked as down other information we should either not return the latency value as null from the api or have the js properly handle this case seeing as no other values are returned as null when a server is marked down the first solution seems the most elegant specifically this line probably causes the behaviour i don t agree that hiding the latency for servers that are down is a good idea if the server has been up then the latency shown is for when it was responding otherwise we should also null queries droprate and senderrors to be consistent
1
9,805
2,615,175,215
IssuesEvent
2015-03-01 06:58:26
chrsmith/reaver-wps
https://api.github.com/repos/chrsmith/reaver-wps
opened
Reaver returns pin and psk, but psk does not work
auto-migrated Priority-Triage Type-Defect
``` This may sounds like an issue from many other threads, but give me one second. Rather than returning a long string of hexidecimal, the psk reaver returns is "da47d6fc" and every time I have run reaver, whether I use the WPS pin or from scratch, I get this same psk. Yet it refuses to let me connect. Can someone offer any help? Thank you. ``` Original issue reported on code.google.com by `bktibbe...@gmail.com` on 27 May 2014 at 11:55
1.0
Reaver returns pin and psk, but psk does not work - ``` This may sounds like an issue from many other threads, but give me one second. Rather than returning a long string of hexidecimal, the psk reaver returns is "da47d6fc" and every time I have run reaver, whether I use the WPS pin or from scratch, I get this same psk. Yet it refuses to let me connect. Can someone offer any help? Thank you. ``` Original issue reported on code.google.com by `bktibbe...@gmail.com` on 27 May 2014 at 11:55
defect
reaver returns pin and psk but psk does not work this may sounds like an issue from many other threads but give me one second rather than returning a long string of hexidecimal the psk reaver returns is and every time i have run reaver whether i use the wps pin or from scratch i get this same psk yet it refuses to let me connect can someone offer any help thank you original issue reported on code google com by bktibbe gmail com on may at
1
56,117
14,934,456,571
IssuesEvent
2021-01-25 10:33:23
jOOQ/jOOQ
https://api.github.com/repos/jOOQ/jOOQ
closed
Wrong Support annotation on ALTER TABLE .. RENAME CONSTRAINT
C: Documentation E: All Editions P: Medium R: Fixed T: Defect
The following dialects are claimed to support `ALTER TABLE .. RENAME CONSTRAINT`, but they don't: - DERBY - FIREBIRD - MARIADB - MEMSQL - MYSQL - SQLITE
1.0
Wrong Support annotation on ALTER TABLE .. RENAME CONSTRAINT - The following dialects are claimed to support `ALTER TABLE .. RENAME CONSTRAINT`, but they don't: - DERBY - FIREBIRD - MARIADB - MEMSQL - MYSQL - SQLITE
defect
wrong support annotation on alter table rename constraint the following dialects are claimed to support alter table rename constraint but they don t derby firebird mariadb memsql mysql sqlite
1
420,480
28,281,174,497
IssuesEvent
2023-04-08 02:40:23
lm-sys/FastChat
https://api.github.com/repos/lm-sys/FastChat
closed
need to brew install rust
documentation
missing this step, the installation will fail ,suggest to add in the installation process to highlight esp. for mac users.
1.0
need to brew install rust - missing this step, the installation will fail ,suggest to add in the installation process to highlight esp. for mac users.
non_defect
need to brew install rust missing this step the installation will fail suggest to add in the installation process to highlight esp for mac users
0
19,885
3,273,628,503
IssuesEvent
2015-10-26 04:24:42
npgall/cqengine
https://api.github.com/repos/npgall/cqengine
closed
SelfAttribute broken in CQEngine 1.2.0
auto-migrated Priority-Medium Type-Defect
``` A regressions was introduced when reflection support was being refactored, which now prevents SelfAttributes from being declared. SelfAttribute<String> attribute = new SelfAttribute<String>(); Produces: java.lang.IllegalStateException: Attribute '<Unnamed attribute, class com.googlecode.cqengine.attribute.SelfAttribute>' is declared with invalid type parameters (class com.googlecode.cqengine.attribute.SelfAttribute) In the meantime a workaround is to declare as a SimpleAttribute instead: static final Attribute<String, String> SELF = new SimpleAttribute<String, String>() { public String getValue(String object) { return object; } }; ``` Original issue reported on code.google.com by `ni...@npgall.com` on 10 Sep 2013 at 9:57
1.0
SelfAttribute broken in CQEngine 1.2.0 - ``` A regressions was introduced when reflection support was being refactored, which now prevents SelfAttributes from being declared. SelfAttribute<String> attribute = new SelfAttribute<String>(); Produces: java.lang.IllegalStateException: Attribute '<Unnamed attribute, class com.googlecode.cqengine.attribute.SelfAttribute>' is declared with invalid type parameters (class com.googlecode.cqengine.attribute.SelfAttribute) In the meantime a workaround is to declare as a SimpleAttribute instead: static final Attribute<String, String> SELF = new SimpleAttribute<String, String>() { public String getValue(String object) { return object; } }; ``` Original issue reported on code.google.com by `ni...@npgall.com` on 10 Sep 2013 at 9:57
defect
selfattribute broken in cqengine a regressions was introduced when reflection support was being refactored which now prevents selfattributes from being declared selfattribute attribute new selfattribute produces java lang illegalstateexception attribute unnamed attribute class com googlecode cqengine attribute selfattribute is declared with invalid type parameters class com googlecode cqengine attribute selfattribute in the meantime a workaround is to declare as a simpleattribute instead static final attribute self new simpleattribute public string getvalue string object return object original issue reported on code google com by ni npgall com on sep at
1