Unnamed: 0
int64 0
832k
| id
float64 2.49B
32.1B
| type
stringclasses 1
value | created_at
stringlengths 19
19
| repo
stringlengths 5
112
| repo_url
stringlengths 34
141
| action
stringclasses 3
values | title
stringlengths 1
757
| labels
stringlengths 4
664
| body
stringlengths 3
261k
| index
stringclasses 10
values | text_combine
stringlengths 96
261k
| label
stringclasses 2
values | text
stringlengths 96
232k
| binary_label
int64 0
1
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
76,618
| 26,513,799,857
|
IssuesEvent
|
2023-01-18 19:09:14
|
jOOQ/jOOQ
|
https://api.github.com/repos/jOOQ/jOOQ
|
opened
|
Forcetype a date time / timestamp field to Instant then has no way to use `DSL.current*()` functions
|
T: Defect
|
### Expected behavior
If I have a type that I convert to java `Instant` using forced types and code generation, my table changes the type from say `Timestamp` or `INT` (Unix Time) to `Instant` in the generated code. Great!
But now I can't use a default function like `DSL.current*()` functions to set it.
* `currentTimestamp()` is wrong type `Timestamp`
* `currentOffsetDateTime()` is wrong type `OffsetDateTime`
* `currentLocalDateTime()` is wrong type `LocalDateTime`
* and then, the one you would expect to work, `currentInstant()` generates invalid code (at least for MySQL, generates `CURRENT_TIMESTAMP cast as Instant` (paraphrased) which then fails the SQL.
I think the solution for this is `coerce()` the value to the type of the actual underlaying field on the setter side?
```
update(MY_TABLE).set(MY_FIELD.coerce(Timestamp.class), DSL.currentTimestamp())
```
so that it binds it as the value of what was mapped previously from `TimeStamp` to `Instant` by some converter, but matches what the database expects in the end. Therefore, people working against the generated code have to also know the underlaying type of the database to get this right, and won't find mentions of this in the converter documentation.
A field does have its SqlType buried in it. For example:
```
public final TableField<UsersRecord, Instant> UPDATED_2FA_AT = createField(DSL.name("updated_2fa_at"), SQLDataType.INTEGER, this, "", new UnixTimeAsInstantConverter());
```
I think in this case JOOQ should use instead `ConvertedTableField<UsersRecord, Instant, Integer>` (made up new subclass of `TableField`) so that the original type is moved up a notch, and other functions can be present that work on these field types to align with that SQL type.
The `ConvertedTableField` could have a `coerceToSqlType()` so that you don't have to know what it is but can do it. Which makes my workaround above now:
```
update(MY_TABLE).set(MY_FIELD.coerceToSqlType(), DSL.currentTimestamp())
```
Here we have both a marker that this is converted, what the type it is converted from, and a way to coerce it back at will.
### Actual behavior
general pain and suffering
### Steps to reproduce the problem
All in the above description.
### jOOQ Version
3.17.x
### Database product and version
All
### Java Version
All
### OS Version
All
### JDBC driver name and version (include name if unofficial driver)
All
|
1.0
|
Forcetype a date time / timestamp field to Instant then has no way to use `DSL.current*()` functions - ### Expected behavior
If I have a type that I convert to java `Instant` using forced types and code generation, my table changes the type from say `Timestamp` or `INT` (Unix Time) to `Instant` in the generated code. Great!
But now I can't use a default function like `DSL.current*()` functions to set it.
* `currentTimestamp()` is wrong type `Timestamp`
* `currentOffsetDateTime()` is wrong type `OffsetDateTime`
* `currentLocalDateTime()` is wrong type `LocalDateTime`
* and then, the one you would expect to work, `currentInstant()` generates invalid code (at least for MySQL, generates `CURRENT_TIMESTAMP cast as Instant` (paraphrased) which then fails the SQL.
I think the solution for this is `coerce()` the value to the type of the actual underlaying field on the setter side?
```
update(MY_TABLE).set(MY_FIELD.coerce(Timestamp.class), DSL.currentTimestamp())
```
so that it binds it as the value of what was mapped previously from `TimeStamp` to `Instant` by some converter, but matches what the database expects in the end. Therefore, people working against the generated code have to also know the underlaying type of the database to get this right, and won't find mentions of this in the converter documentation.
A field does have its SqlType buried in it. For example:
```
public final TableField<UsersRecord, Instant> UPDATED_2FA_AT = createField(DSL.name("updated_2fa_at"), SQLDataType.INTEGER, this, "", new UnixTimeAsInstantConverter());
```
I think in this case JOOQ should use instead `ConvertedTableField<UsersRecord, Instant, Integer>` (made up new subclass of `TableField`) so that the original type is moved up a notch, and other functions can be present that work on these field types to align with that SQL type.
The `ConvertedTableField` could have a `coerceToSqlType()` so that you don't have to know what it is but can do it. Which makes my workaround above now:
```
update(MY_TABLE).set(MY_FIELD.coerceToSqlType(), DSL.currentTimestamp())
```
Here we have both a marker that this is converted, what the type it is converted from, and a way to coerce it back at will.
### Actual behavior
general pain and suffering
### Steps to reproduce the problem
All in the above description.
### jOOQ Version
3.17.x
### Database product and version
All
### Java Version
All
### OS Version
All
### JDBC driver name and version (include name if unofficial driver)
All
|
defect
|
forcetype a date time timestamp field to instant then has no way to use dsl current functions expected behavior if i have a type that i convert to java instant using forced types and code generation my table changes the type from say timestamp or int unix time to instant in the generated code great but now i can t use a default function like dsl current functions to set it currenttimestamp is wrong type timestamp currentoffsetdatetime is wrong type offsetdatetime currentlocaldatetime is wrong type localdatetime and then the one you would expect to work currentinstant generates invalid code at least for mysql generates current timestamp cast as instant paraphrased which then fails the sql i think the solution for this is coerce the value to the type of the actual underlaying field on the setter side update my table set my field coerce timestamp class dsl currenttimestamp so that it binds it as the value of what was mapped previously from timestamp to instant by some converter but matches what the database expects in the end therefore people working against the generated code have to also know the underlaying type of the database to get this right and won t find mentions of this in the converter documentation a field does have its sqltype buried in it for example public final tablefield updated at createfield dsl name updated at sqldatatype integer this new unixtimeasinstantconverter i think in this case jooq should use instead convertedtablefield made up new subclass of tablefield so that the original type is moved up a notch and other functions can be present that work on these field types to align with that sql type the convertedtablefield could have a coercetosqltype so that you don t have to know what it is but can do it which makes my workaround above now update my table set my field coercetosqltype dsl currenttimestamp here we have both a marker that this is converted what the type it is converted from and a way to coerce it back at will actual behavior general pain and suffering steps to reproduce the problem all in the above description jooq version x database product and version all java version all os version all jdbc driver name and version include name if unofficial driver all
| 1
|
28,131
| 5,434,657,567
|
IssuesEvent
|
2017-03-05 09:31:37
|
yadayada/acd_cli
|
https://api.github.com/repos/yadayada/acd_cli
|
closed
|
Question: What makes "security profile" more secure?
|
documentation
|
I'm looking at https://acd-cli.readthedocs.io/en/latest/authorization.html and I read the following quote. "There is a fast and simple way and a secure way." What makes one way more secure than the other?
|
1.0
|
Question: What makes "security profile" more secure? - I'm looking at https://acd-cli.readthedocs.io/en/latest/authorization.html and I read the following quote. "There is a fast and simple way and a secure way." What makes one way more secure than the other?
|
non_defect
|
question what makes security profile more secure i m looking at and i read the following quote there is a fast and simple way and a secure way what makes one way more secure than the other
| 0
|
2,933
| 2,649,057,835
|
IssuesEvent
|
2015-03-14 15:10:13
|
aj-r/CarpoolPlanner
|
https://api.github.com/repos/aj-r/CarpoolPlanner
|
closed
|
Switch to Twilio for SMS messages
|
enhancement to-test
|
TextNow is just too unreliable. Use Twilio for SMS messages instead.
Unfortunately there will be "Send from Twilio trial account" at the beginning of each message, unless you pay $0.0075 per text. Which may be worth considering.
|
1.0
|
Switch to Twilio for SMS messages - TextNow is just too unreliable. Use Twilio for SMS messages instead.
Unfortunately there will be "Send from Twilio trial account" at the beginning of each message, unless you pay $0.0075 per text. Which may be worth considering.
|
non_defect
|
switch to twilio for sms messages textnow is just too unreliable use twilio for sms messages instead unfortunately there will be send from twilio trial account at the beginning of each message unless you pay per text which may be worth considering
| 0
|
86,198
| 16,851,029,179
|
IssuesEvent
|
2021-06-20 14:10:10
|
luluyuzhi/yuzhicode
|
https://api.github.com/repos/luluyuzhi/yuzhicode
|
closed
|
[leetcode]l1672. ๆๅฏๆๅฎขๆท็่ตไบงๆป้
|
No Semicolon array leetcode
|
็ปไฝ ไธไธช m x n ็ๆดๆฐ็ฝๆ ผ accounts ๏ผๅ
ถไธญ accounts[i][j] ๆฏ็ฌฌ iโโโโโโโโโโโโ ไฝๅฎขๆทๅจ็ฌฌ j ๅฎถ้ถ่กๆ็ฎก็่ตไบงๆฐ้ใ่ฟๅๆๅฏๆๅฎขๆทๆๆฅๆ็ ่ตไบงๆป้ ใ
ๅฎขๆท็ ่ตไบงๆป้ ๅฐฑๆฏไปไปฌๅจๅๅฎถ้ถ่กๆ็ฎก็่ตไบงๆฐ้ไนๅใๆๅฏๆๅฎขๆทๅฐฑๆฏ ่ตไบงๆป้ ๆๅคง็ๅฎขๆทใ
ย
็คบไพ 1๏ผ
> ่พๅ
ฅ๏ผaccounts = [[1,2,3],[3,2,1]]
> ่พๅบ๏ผ6
่งฃ้๏ผ
็ฌฌ 1 ไฝๅฎขๆท็่ตไบงๆป้ = 1 + 2 + 3 = 6
็ฌฌ 2 ไฝๅฎขๆท็่ตไบงๆป้ = 3 + 2 + 1 = 6
ไธคไฝๅฎขๆท้ฝๆฏๆๅฏๆ็๏ผ่ตไบงๆป้้ฝๆฏ 6 ๏ผๆไปฅ่ฟๅ 6 ใ
็คบไพ 2๏ผ
> ่พๅ
ฅ๏ผaccounts = [[1,5],[7,3],[3,5]]
> ่พๅบ๏ผ10
่งฃ้๏ผ
็ฌฌ 1 ไฝๅฎขๆท็่ตไบงๆป้ = 6
็ฌฌ 2 ไฝๅฎขๆท็่ตไบงๆป้ = 10
็ฌฌ 3 ไฝๅฎขๆท็่ตไบงๆป้ = 8
็ฌฌ 2 ไฝๅฎขๆทๆฏๆๅฏๆ็๏ผ่ตไบงๆป้ๆฏ 10
็คบไพ 3๏ผ
> ่พๅ
ฅ๏ผaccounts = [[2,8,7],[7,1,3],[1,9,5]]
> ่พๅบ๏ผ17
ย
ๆ็คบ๏ผ
m ==ย accounts.length
n ==ย accounts[i].length
1 <= m, n <= 50
1 <= accounts[i][j] <= 100
ๆฅๆบ๏ผๅๆฃ๏ผLeetCode๏ผ
้พๆฅ๏ผhttps://leetcode-cn.com/problems/richest-customer-wealth
่ไฝๆๅฝ้ขๆฃ็ฝ็ปๆๆใๅไธ่ฝฌ่ฝฝ่ฏท่็ณปๅฎๆนๆๆ๏ผ้ๅไธ่ฝฌ่ฝฝ่ฏทๆณจๆๅบๅคใ
|
1.0
|
[leetcode]l1672. ๆๅฏๆๅฎขๆท็่ตไบงๆป้ - ็ปไฝ ไธไธช m x n ็ๆดๆฐ็ฝๆ ผ accounts ๏ผๅ
ถไธญ accounts[i][j] ๆฏ็ฌฌ iโโโโโโโโโโโโ ไฝๅฎขๆทๅจ็ฌฌ j ๅฎถ้ถ่กๆ็ฎก็่ตไบงๆฐ้ใ่ฟๅๆๅฏๆๅฎขๆทๆๆฅๆ็ ่ตไบงๆป้ ใ
ๅฎขๆท็ ่ตไบงๆป้ ๅฐฑๆฏไปไปฌๅจๅๅฎถ้ถ่กๆ็ฎก็่ตไบงๆฐ้ไนๅใๆๅฏๆๅฎขๆทๅฐฑๆฏ ่ตไบงๆป้ ๆๅคง็ๅฎขๆทใ
ย
็คบไพ 1๏ผ
> ่พๅ
ฅ๏ผaccounts = [[1,2,3],[3,2,1]]
> ่พๅบ๏ผ6
่งฃ้๏ผ
็ฌฌ 1 ไฝๅฎขๆท็่ตไบงๆป้ = 1 + 2 + 3 = 6
็ฌฌ 2 ไฝๅฎขๆท็่ตไบงๆป้ = 3 + 2 + 1 = 6
ไธคไฝๅฎขๆท้ฝๆฏๆๅฏๆ็๏ผ่ตไบงๆป้้ฝๆฏ 6 ๏ผๆไปฅ่ฟๅ 6 ใ
็คบไพ 2๏ผ
> ่พๅ
ฅ๏ผaccounts = [[1,5],[7,3],[3,5]]
> ่พๅบ๏ผ10
่งฃ้๏ผ
็ฌฌ 1 ไฝๅฎขๆท็่ตไบงๆป้ = 6
็ฌฌ 2 ไฝๅฎขๆท็่ตไบงๆป้ = 10
็ฌฌ 3 ไฝๅฎขๆท็่ตไบงๆป้ = 8
็ฌฌ 2 ไฝๅฎขๆทๆฏๆๅฏๆ็๏ผ่ตไบงๆป้ๆฏ 10
็คบไพ 3๏ผ
> ่พๅ
ฅ๏ผaccounts = [[2,8,7],[7,1,3],[1,9,5]]
> ่พๅบ๏ผ17
ย
ๆ็คบ๏ผ
m ==ย accounts.length
n ==ย accounts[i].length
1 <= m, n <= 50
1 <= accounts[i][j] <= 100
ๆฅๆบ๏ผๅๆฃ๏ผLeetCode๏ผ
้พๆฅ๏ผhttps://leetcode-cn.com/problems/richest-customer-wealth
่ไฝๆๅฝ้ขๆฃ็ฝ็ปๆๆใๅไธ่ฝฌ่ฝฝ่ฏท่็ณปๅฎๆนๆๆ๏ผ้ๅไธ่ฝฌ่ฝฝ่ฏทๆณจๆๅบๅคใ
|
non_defect
|
ๆๅฏๆๅฎขๆท็่ตไบงๆป้ ็ปไฝ ไธไธช m x n ็ๆดๆฐ็ฝๆ ผ accounts ๏ผๅ
ถไธญ accounts ๆฏ็ฌฌ iโโโโโโโโโโโโ ไฝๅฎขๆทๅจ็ฌฌ j ๅฎถ้ถ่กๆ็ฎก็่ตไบงๆฐ้ใ่ฟๅๆๅฏๆๅฎขๆทๆๆฅๆ็ ่ตไบงๆป้ ใ ๅฎขๆท็ ่ตไบงๆป้ ๅฐฑๆฏไปไปฌๅจๅๅฎถ้ถ่กๆ็ฎก็่ตไบงๆฐ้ไนๅใๆๅฏๆๅฎขๆทๅฐฑๆฏ ่ตไบงๆป้ ๆๅคง็ๅฎขๆทใ ย ็คบไพ ๏ผ ่พๅ
ฅ๏ผaccounts ่พๅบ๏ผ ่งฃ้๏ผ ็ฌฌ ไฝๅฎขๆท็่ตไบงๆป้ ็ฌฌ ไฝๅฎขๆท็่ตไบงๆป้ ไธคไฝๅฎขๆท้ฝๆฏๆๅฏๆ็๏ผ่ตไบงๆป้้ฝๆฏ ๏ผๆไปฅ่ฟๅ ใ ็คบไพ ๏ผ ่พๅ
ฅ๏ผaccounts ่พๅบ๏ผ ่งฃ้๏ผ ็ฌฌ ไฝๅฎขๆท็่ตไบงๆป้ ็ฌฌ ไฝๅฎขๆท็่ตไบงๆป้ ็ฌฌ ไฝๅฎขๆท็่ตไบงๆป้ ็ฌฌ ไฝๅฎขๆทๆฏๆๅฏๆ็๏ผ่ตไบงๆป้ๆฏ ็คบไพ ๏ผ ่พๅ
ฅ๏ผaccounts ่พๅบ๏ผ ย ๆ็คบ๏ผ m ย accounts length n ย accounts length m n accounts ๆฅๆบ๏ผๅๆฃ๏ผleetcode๏ผ ้พๆฅ๏ผ ่ไฝๆๅฝ้ขๆฃ็ฝ็ปๆๆใๅไธ่ฝฌ่ฝฝ่ฏท่็ณปๅฎๆนๆๆ๏ผ้ๅไธ่ฝฌ่ฝฝ่ฏทๆณจๆๅบๅคใ
| 0
|
84,614
| 3,670,059,166
|
IssuesEvent
|
2016-02-21 16:45:49
|
enklt/web
|
https://api.github.com/repos/enklt/web
|
closed
|
Billeder skalerer mรฆrkeligt
|
Enhancement High priority
|
Vi skal have fundet en lรธsning pรฅ skaleringen af medarbejderbilleder og nyhedsbilleder, da de pรฅ stรธrre skรฆrmstรธrrelser bliver aflange og sรฅ er det kun toppen af billederne der ses. Eksempel:
<img width="1680" alt="screen shot 2016-02-04 at 8 15 29 pm" src="https://cloud.githubusercontent.com/assets/13694222/12826599/119583a6-cb7c-11e5-825f-87fa92f599b0.png">
|
1.0
|
Billeder skalerer mรฆrkeligt - Vi skal have fundet en lรธsning pรฅ skaleringen af medarbejderbilleder og nyhedsbilleder, da de pรฅ stรธrre skรฆrmstรธrrelser bliver aflange og sรฅ er det kun toppen af billederne der ses. Eksempel:
<img width="1680" alt="screen shot 2016-02-04 at 8 15 29 pm" src="https://cloud.githubusercontent.com/assets/13694222/12826599/119583a6-cb7c-11e5-825f-87fa92f599b0.png">
|
non_defect
|
billeder skalerer mรฆrkeligt vi skal have fundet en lรธsning pรฅ skaleringen af medarbejderbilleder og nyhedsbilleder da de pรฅ stรธrre skรฆrmstรธrrelser bliver aflange og sรฅ er det kun toppen af billederne der ses eksempel img width alt screen shot at pm src
| 0
|
393,347
| 26,988,355,292
|
IssuesEvent
|
2023-02-09 17:47:05
|
OneDrive/samples
|
https://api.github.com/repos/OneDrive/samples
|
closed
|
No Download File Url
|
documentation area:Picker
|
I've implemented the Javascript client logic into my app and can successfully show the file picker to a user and allow them to select file(s) from their OneDrive, however when I receive the file information in the message handler after selecting the files there doesn't appear to be a 'Download Url' value. I was expecting to receive a '@microsoft.graph.downloadUrl' (or similar) value. The values that I'm receiving instead are:
```
@sharePoint.embedUrl: "XXX"
@sharePoint.endpoint: "XXX"
@sharePoint.listUrl: "XXX"
folder: "XXX"
id: "XXX"
name: "XXX"
parentReference: {...}
size: XXX
webDavUrl: "XXX"
webUrl: "XXX"
```
Is there a certain param value that's required in order to get a download URL for the selected files? Or some other way to retrieve this information?
My current params are:
```
const params = {
sdk: "8.0",
entry: {
oneDrive: {
files: {},
}
},
authentication: {},
selection: {
mode: 'multiple'
},
messaging: {
origin: "https://localhost",
channelId: "27"
},
typesAndSources: {
mode: "files",
pivots: {
oneDrive: true,
recent: false,
sharedLibraries: true
},
},
};
```
|
1.0
|
No Download File Url - I've implemented the Javascript client logic into my app and can successfully show the file picker to a user and allow them to select file(s) from their OneDrive, however when I receive the file information in the message handler after selecting the files there doesn't appear to be a 'Download Url' value. I was expecting to receive a '@microsoft.graph.downloadUrl' (or similar) value. The values that I'm receiving instead are:
```
@sharePoint.embedUrl: "XXX"
@sharePoint.endpoint: "XXX"
@sharePoint.listUrl: "XXX"
folder: "XXX"
id: "XXX"
name: "XXX"
parentReference: {...}
size: XXX
webDavUrl: "XXX"
webUrl: "XXX"
```
Is there a certain param value that's required in order to get a download URL for the selected files? Or some other way to retrieve this information?
My current params are:
```
const params = {
sdk: "8.0",
entry: {
oneDrive: {
files: {},
}
},
authentication: {},
selection: {
mode: 'multiple'
},
messaging: {
origin: "https://localhost",
channelId: "27"
},
typesAndSources: {
mode: "files",
pivots: {
oneDrive: true,
recent: false,
sharedLibraries: true
},
},
};
```
|
non_defect
|
no download file url i ve implemented the javascript client logic into my app and can successfully show the file picker to a user and allow them to select file s from their onedrive however when i receive the file information in the message handler after selecting the files there doesn t appear to be a download url value i was expecting to receive a microsoft graph downloadurl or similar value the values that i m receiving instead are sharepoint embedurl xxx sharepoint endpoint xxx sharepoint listurl xxx folder xxx id xxx name xxx parentreference size xxx webdavurl xxx weburl xxx is there a certain param value that s required in order to get a download url for the selected files or some other way to retrieve this information my current params are const params sdk entry onedrive files authentication selection mode multiple messaging origin channelid typesandsources mode files pivots onedrive true recent false sharedlibraries true
| 0
|
65,376
| 19,433,945,113
|
IssuesEvent
|
2021-12-21 15:02:11
|
hazelcast/hazelcast-cpp-client
|
https://api.github.com/repos/hazelcast/hazelcast-cpp-client
|
closed
|
problem with Dockerfiles
|
Type: Defect
|
See the docker build log from Jenkins:
```
14:25:12 Step 1/11 : FROM fedora:latest
14:25:12 ---> 26056ca25aff
14:25:12 Step 2/11 : RUN dnf groups install -y "Development Tools"
14:25:12 ---> Using cache
14:25:12 ---> de1d4923f559
14:25:12 Step 3/11 : RUN dnf install -y gcc-c++ gdb compat-openssl10-devel.i686 cmake valgrind rsync passwd openssh-server ninja-build java-1.8.0-openjdk
14:25:12 ---> Using cache
14:25:12 ---> 3615260d34ee
14:25:12 Step 4/11 : RUN dnf -y install glibc-devel.i686 glibc-devel libstdc++.i686
14:25:13 ---> Running in 6637947dd55c
14:25:15 Fedora 33 openh264 (From Cisco) - x86_64 1.3 kB/s | 989 B 00:00
14:25:15 Fedora Modular 33 - x86_64 44 kB/s | 26 kB 00:00
14:25:16 Fedora Modular 33 - x86_64 - Updates 44 kB/s | 25 kB 00:00
14:25:17 Fedora Modular 33 - x86_64 - Updates 642 kB/s | 621 kB 00:00
14:25:18 Fedora 33 - x86_64 - Updates 31 kB/s | 18 kB 00:00
14:25:20 Fedora 33 - x86_64 - Updates 3.0 MB/s | 6.7 MB 00:02
14:25:28 Fedora 33 - x86_64 47 kB/s | 27 kB 00:00
14:25:30 Package glibc-devel-2.32-4.fc33.x86_64 is already installed.
14:25:30 Dependencies resolved.
14:25:30 ================================================================================
14:25:30 Package Arch Version Repository Size
14:25:30 ================================================================================
14:25:30 Installing:
14:25:30 glibc-devel i686 2.32-6.fc33 updates 1.0 M
14:25:30 libstdc++ i686 10.3.1-1.fc33 updates 664 k
14:25:30 Upgrading:
14:25:30 glibc i686 2.32-6.fc33 updates 3.4 M
14:25:30 glibc x86_64 2.32-6.fc33 updates 3.6 M
14:25:30 glibc-common x86_64 2.32-6.fc33 updates 1.8 M
14:25:30 glibc-devel x86_64 2.32-6.fc33 updates 1.0 M
14:25:30 glibc-headers-x86 noarch 2.32-6.fc33 updates 483 k
14:25:30 glibc-minimal-langpack x86_64 2.32-6.fc33 updates 83 k
14:25:30 libxcrypt x86_64 4.4.20-2.fc33 updates 119 k
14:25:30 libxcrypt-devel x86_64 4.4.20-2.fc33 updates 29 k
14:25:30 Installing dependencies:
14:25:30 libxcrypt i686 4.4.20-2.fc33 updates 125 k
14:25:30 libxcrypt-devel i686 4.4.20-2.fc33 updates 29 k
14:25:30
14:25:30 Transaction Summary
14:25:30 ================================================================================
14:25:30 Install 4 Packages
14:25:30 Upgrade 8 Packages
14:25:30
14:25:30 Total download size: 12 M
14:25:30 Downloading Packages:
14:25:31 (1/12): libxcrypt-4.4.20-2.fc33.i686.rpm 672 kB/s | 125 kB 00:00
14:25:31 (2/12): libxcrypt-devel-4.4.20-2.fc33.i686.rpm 870 kB/s | 29 kB 00:00
14:25:31 (3/12): libstdc++-10.3.1-1.fc33.i686.rpm 2.1 MB/s | 664 kB 00:00
14:25:31 (4/12): glibc-devel-2.32-6.fc33.i686.rpm 2.3 MB/s | 1.0 MB 00:00
14:25:32 (5/12): glibc-common-2.32-6.fc33.x86_64.rpm 4.4 MB/s | 1.8 MB 00:00
14:25:32 (6/12): glibc-2.32-6.fc33.x86_64.rpm 4.3 MB/s | 3.6 MB 00:00
14:25:32 (7/12): glibc-devel-2.32-6.fc33.x86_64.rpm 4.1 MB/s | 1.0 MB 00:00
14:25:32 (8/12): glibc-minimal-langpack-2.32-6.fc33.x86_ 1.2 MB/s | 83 kB 00:00
14:25:32 (9/12): glibc-headers-x86-2.32-6.fc33.noarch.rp 5.0 MB/s | 483 kB 00:00
14:25:32 (10/12): libxcrypt-4.4.20-2.fc33.x86_64.rpm 2.5 MB/s | 119 kB 00:00
14:25:32 (11/12): libxcrypt-devel-4.4.20-2.fc33.x86_64.r 603 kB/s | 29 kB 00:00
14:25:32 (12/12): glibc-2.32-6.fc33.i686.rpm 3.0 MB/s | 3.4 MB 00:01
14:25:32 --------------------------------------------------------------------------------
14:25:32 Total 6.4 MB/s | 12 MB 00:01
14:25:32 Running transaction check
14:25:33 Transaction check succeeded.
14:25:33 Running transaction test
14:25:33 The downloaded packages were saved in cache until the next successful transaction.
14:25:33 You can remove cached packages by executing 'dnf clean packages'.
14:25:33 [91mError: Transaction test error:
14:25:33 file /usr/share/gcc-10/python/libstdcxx/__pycache__/__init__.cpython-39.opt-1.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/__pycache__/__init__.cpython-39.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/__pycache__/__init__.cpython-39.opt-1.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/__pycache__/__init__.cpython-39.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/__pycache__/printers.cpython-39.opt-1.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/__pycache__/printers.cpython-39.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/__pycache__/xmethods.cpython-39.opt-1.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/__pycache__/xmethods.cpython-39.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/printers.py from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33
14:25:33 [0mThe command '/bin/sh -c dnf -y install glibc-devel.i686 glibc-devel libstdc++.i686' returned a non-zero code: 1
14:25:34 $ ssh-agent -k
14:25:34 unset SSH_AUTH_SOCK;
14:25:34 unset SSH_AGENT_PID;
14:25:34 echo Agent pid 552651 killed;
14:25:34 [ssh-agent] Stopped.
14:25:34 FATAL: Failed to build docker image from project Dockerfile
```
|
1.0
|
problem with Dockerfiles - See the docker build log from Jenkins:
```
14:25:12 Step 1/11 : FROM fedora:latest
14:25:12 ---> 26056ca25aff
14:25:12 Step 2/11 : RUN dnf groups install -y "Development Tools"
14:25:12 ---> Using cache
14:25:12 ---> de1d4923f559
14:25:12 Step 3/11 : RUN dnf install -y gcc-c++ gdb compat-openssl10-devel.i686 cmake valgrind rsync passwd openssh-server ninja-build java-1.8.0-openjdk
14:25:12 ---> Using cache
14:25:12 ---> 3615260d34ee
14:25:12 Step 4/11 : RUN dnf -y install glibc-devel.i686 glibc-devel libstdc++.i686
14:25:13 ---> Running in 6637947dd55c
14:25:15 Fedora 33 openh264 (From Cisco) - x86_64 1.3 kB/s | 989 B 00:00
14:25:15 Fedora Modular 33 - x86_64 44 kB/s | 26 kB 00:00
14:25:16 Fedora Modular 33 - x86_64 - Updates 44 kB/s | 25 kB 00:00
14:25:17 Fedora Modular 33 - x86_64 - Updates 642 kB/s | 621 kB 00:00
14:25:18 Fedora 33 - x86_64 - Updates 31 kB/s | 18 kB 00:00
14:25:20 Fedora 33 - x86_64 - Updates 3.0 MB/s | 6.7 MB 00:02
14:25:28 Fedora 33 - x86_64 47 kB/s | 27 kB 00:00
14:25:30 Package glibc-devel-2.32-4.fc33.x86_64 is already installed.
14:25:30 Dependencies resolved.
14:25:30 ================================================================================
14:25:30 Package Arch Version Repository Size
14:25:30 ================================================================================
14:25:30 Installing:
14:25:30 glibc-devel i686 2.32-6.fc33 updates 1.0 M
14:25:30 libstdc++ i686 10.3.1-1.fc33 updates 664 k
14:25:30 Upgrading:
14:25:30 glibc i686 2.32-6.fc33 updates 3.4 M
14:25:30 glibc x86_64 2.32-6.fc33 updates 3.6 M
14:25:30 glibc-common x86_64 2.32-6.fc33 updates 1.8 M
14:25:30 glibc-devel x86_64 2.32-6.fc33 updates 1.0 M
14:25:30 glibc-headers-x86 noarch 2.32-6.fc33 updates 483 k
14:25:30 glibc-minimal-langpack x86_64 2.32-6.fc33 updates 83 k
14:25:30 libxcrypt x86_64 4.4.20-2.fc33 updates 119 k
14:25:30 libxcrypt-devel x86_64 4.4.20-2.fc33 updates 29 k
14:25:30 Installing dependencies:
14:25:30 libxcrypt i686 4.4.20-2.fc33 updates 125 k
14:25:30 libxcrypt-devel i686 4.4.20-2.fc33 updates 29 k
14:25:30
14:25:30 Transaction Summary
14:25:30 ================================================================================
14:25:30 Install 4 Packages
14:25:30 Upgrade 8 Packages
14:25:30
14:25:30 Total download size: 12 M
14:25:30 Downloading Packages:
14:25:31 (1/12): libxcrypt-4.4.20-2.fc33.i686.rpm 672 kB/s | 125 kB 00:00
14:25:31 (2/12): libxcrypt-devel-4.4.20-2.fc33.i686.rpm 870 kB/s | 29 kB 00:00
14:25:31 (3/12): libstdc++-10.3.1-1.fc33.i686.rpm 2.1 MB/s | 664 kB 00:00
14:25:31 (4/12): glibc-devel-2.32-6.fc33.i686.rpm 2.3 MB/s | 1.0 MB 00:00
14:25:32 (5/12): glibc-common-2.32-6.fc33.x86_64.rpm 4.4 MB/s | 1.8 MB 00:00
14:25:32 (6/12): glibc-2.32-6.fc33.x86_64.rpm 4.3 MB/s | 3.6 MB 00:00
14:25:32 (7/12): glibc-devel-2.32-6.fc33.x86_64.rpm 4.1 MB/s | 1.0 MB 00:00
14:25:32 (8/12): glibc-minimal-langpack-2.32-6.fc33.x86_ 1.2 MB/s | 83 kB 00:00
14:25:32 (9/12): glibc-headers-x86-2.32-6.fc33.noarch.rp 5.0 MB/s | 483 kB 00:00
14:25:32 (10/12): libxcrypt-4.4.20-2.fc33.x86_64.rpm 2.5 MB/s | 119 kB 00:00
14:25:32 (11/12): libxcrypt-devel-4.4.20-2.fc33.x86_64.r 603 kB/s | 29 kB 00:00
14:25:32 (12/12): glibc-2.32-6.fc33.i686.rpm 3.0 MB/s | 3.4 MB 00:01
14:25:32 --------------------------------------------------------------------------------
14:25:32 Total 6.4 MB/s | 12 MB 00:01
14:25:32 Running transaction check
14:25:33 Transaction check succeeded.
14:25:33 Running transaction test
14:25:33 The downloaded packages were saved in cache until the next successful transaction.
14:25:33 You can remove cached packages by executing 'dnf clean packages'.
14:25:33 [91mError: Transaction test error:
14:25:33 file /usr/share/gcc-10/python/libstdcxx/__pycache__/__init__.cpython-39.opt-1.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/__pycache__/__init__.cpython-39.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/__pycache__/__init__.cpython-39.opt-1.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/__pycache__/__init__.cpython-39.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/__pycache__/printers.cpython-39.opt-1.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/__pycache__/printers.cpython-39.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/__pycache__/xmethods.cpython-39.opt-1.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/__pycache__/xmethods.cpython-39.pyc from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33 file /usr/share/gcc-10/python/libstdcxx/v6/printers.py from install of libstdc++-10.3.1-1.fc33.i686 conflicts with file from package libstdc++-10.2.1-9.fc33.x86_64
14:25:33
14:25:33 [0mThe command '/bin/sh -c dnf -y install glibc-devel.i686 glibc-devel libstdc++.i686' returned a non-zero code: 1
14:25:34 $ ssh-agent -k
14:25:34 unset SSH_AUTH_SOCK;
14:25:34 unset SSH_AGENT_PID;
14:25:34 echo Agent pid 552651 killed;
14:25:34 [ssh-agent] Stopped.
14:25:34 FATAL: Failed to build docker image from project Dockerfile
```
|
defect
|
problem with dockerfiles see the docker build log from jenkins step from fedora latest step run dnf groups install y development tools using cache step run dnf install y gcc c gdb compat devel cmake valgrind rsync passwd openssh server ninja build java openjdk using cache step run dnf y install glibc devel glibc devel libstdc running in fedora from cisco kb s b fedora modular kb s kb fedora modular updates kb s kb fedora modular updates kb s kb fedora updates kb s kb fedora updates mb s mb fedora kb s kb package glibc devel is already installed dependencies resolved package arch version repository size installing glibc devel updates m libstdc updates k upgrading glibc updates m glibc updates m glibc common updates m glibc devel updates m glibc headers noarch updates k glibc minimal langpack updates k libxcrypt updates k libxcrypt devel updates k installing dependencies libxcrypt updates k libxcrypt devel updates k transaction summary install packages upgrade packages total download size m downloading packages libxcrypt rpm kb s kb libxcrypt devel rpm kb s kb libstdc rpm mb s kb glibc devel rpm mb s mb glibc common rpm mb s mb glibc rpm mb s mb glibc devel rpm mb s mb glibc minimal langpack mb s kb glibc headers noarch rp mb s kb libxcrypt rpm mb s kb libxcrypt devel r kb s kb glibc rpm mb s mb total mb s mb running transaction check transaction check succeeded running transaction test the downloaded packages were saved in cache until the next successful transaction you can remove cached packages by executing dnf clean packages transaction test error file usr share gcc python libstdcxx pycache init cpython opt pyc from install of libstdc conflicts with file from package libstdc file usr share gcc python libstdcxx pycache init cpython pyc from install of libstdc conflicts with file from package libstdc file usr share gcc python libstdcxx pycache init cpython opt pyc from install of libstdc conflicts with file from package libstdc file usr share gcc python libstdcxx pycache init cpython pyc from install of libstdc conflicts with file from package libstdc file usr share gcc python libstdcxx pycache printers cpython opt pyc from install of libstdc conflicts with file from package libstdc file usr share gcc python libstdcxx pycache printers cpython pyc from install of libstdc conflicts with file from package libstdc file usr share gcc python libstdcxx pycache xmethods cpython opt pyc from install of libstdc conflicts with file from package libstdc file usr share gcc python libstdcxx pycache xmethods cpython pyc from install of libstdc conflicts with file from package libstdc file usr share gcc python libstdcxx printers py from install of libstdc conflicts with file from package libstdc command bin sh c dnf y install glibc devel glibc devel libstdc returned a non zero code ssh agent k unset ssh auth sock unset ssh agent pid echo agent pid killed stopped fatal failed to build docker image from project dockerfile
| 1
|
302,047
| 9,254,550,493
|
IssuesEvent
|
2019-03-16 00:26:59
|
sg-s/crabsort
|
https://api.github.com/repos/sg-s/crabsort
|
closed
|
split NNsync into two functions
|
bug high-priority
|
NNsync should be split into two
because there should be very few cases where we are writing sdp to NNdata
to avoid horrible bugs where sdp in NNdata is overwritten constantly/randomly
|
1.0
|
split NNsync into two functions - NNsync should be split into two
because there should be very few cases where we are writing sdp to NNdata
to avoid horrible bugs where sdp in NNdata is overwritten constantly/randomly
|
non_defect
|
split nnsync into two functions nnsync should be split into two because there should be very few cases where we are writing sdp to nndata to avoid horrible bugs where sdp in nndata is overwritten constantly randomly
| 0
|
47,531
| 13,056,224,491
|
IssuesEvent
|
2020-07-30 04:02:41
|
icecube-trac/tix2
|
https://api.github.com/repos/icecube-trac/tix2
|
closed
|
python I3Module docs need Outbox help (Trac #687)
|
Migrated from Trac defect documentation
|
For example:
http://software.icecube.wisc.edu/offline-software.trunk/projects/icetray/modules.html
There is no:
self.AddOutBox("OutBox")
in the __init__ def, which is required for all python I3modules:
def __init__(self,context):
icetray.I3ConditionalModule.__init__(self, context)
self.AddOutBox("OutBox")
for example.
Migrated from https://code.icecube.wisc.edu/ticket/687
```json
{
"status": "closed",
"changetime": "2012-08-29T18:57:29",
"description": "For example:\nhttp://software.icecube.wisc.edu/offline-software.trunk/projects/icetray/modules.html\n\nThere is no:\n\n\n self.AddOutBox(\"OutBox\")\n\nin the __init__ def, which is required for all python I3modules:\n\n\n def __init__(self,context):\n icetray.I3ConditionalModule.__init__(self, context)\n\tself.AddOutBox(\"OutBox\")\n\n\nfor example.",
"reporter": "blaufuss",
"cc": "",
"resolution": "fixed",
"_ts": "1346266649000000",
"component": "documentation",
"summary": "python I3Module docs need Outbox help",
"priority": "normal",
"keywords": "",
"time": "2012-06-26T14:07:56",
"milestone": "",
"owner": "",
"type": "defect"
}
```
|
1.0
|
python I3Module docs need Outbox help (Trac #687) - For example:
http://software.icecube.wisc.edu/offline-software.trunk/projects/icetray/modules.html
There is no:
self.AddOutBox("OutBox")
in the __init__ def, which is required for all python I3modules:
def __init__(self,context):
icetray.I3ConditionalModule.__init__(self, context)
self.AddOutBox("OutBox")
for example.
Migrated from https://code.icecube.wisc.edu/ticket/687
```json
{
"status": "closed",
"changetime": "2012-08-29T18:57:29",
"description": "For example:\nhttp://software.icecube.wisc.edu/offline-software.trunk/projects/icetray/modules.html\n\nThere is no:\n\n\n self.AddOutBox(\"OutBox\")\n\nin the __init__ def, which is required for all python I3modules:\n\n\n def __init__(self,context):\n icetray.I3ConditionalModule.__init__(self, context)\n\tself.AddOutBox(\"OutBox\")\n\n\nfor example.",
"reporter": "blaufuss",
"cc": "",
"resolution": "fixed",
"_ts": "1346266649000000",
"component": "documentation",
"summary": "python I3Module docs need Outbox help",
"priority": "normal",
"keywords": "",
"time": "2012-06-26T14:07:56",
"milestone": "",
"owner": "",
"type": "defect"
}
```
|
defect
|
python docs need outbox help trac for example there is no self addoutbox outbox in the init def which is required for all python def init self context icetray init self context self addoutbox outbox for example migrated from json status closed changetime description for example n is no n n n self addoutbox outbox n nin the init def which is required for all python n n n def init self context n icetray init self context n tself addoutbox outbox n n nfor example reporter blaufuss cc resolution fixed ts component documentation summary python docs need outbox help priority normal keywords time milestone owner type defect
| 1
|
177,875
| 14,653,194,895
|
IssuesEvent
|
2020-12-28 05:05:45
|
Sykander/iterable-async
|
https://api.github.com/repos/Sykander/iterable-async
|
closed
|
Create Wiki Pages for array methods
|
documentation enhancement
|
Depends: #30
Here is the current format for pages: https://github.com/Sykander/iterable-async/wiki/Async-For-Each
Pages that are required:
* Async Find #35
* Async Find Index #38
* Async Filter #36
* Async Map #37
* Async Array #39
|
1.0
|
Create Wiki Pages for array methods - Depends: #30
Here is the current format for pages: https://github.com/Sykander/iterable-async/wiki/Async-For-Each
Pages that are required:
* Async Find #35
* Async Find Index #38
* Async Filter #36
* Async Map #37
* Async Array #39
|
non_defect
|
create wiki pages for array methods depends here is the current format for pages pages that are required async find async find index async filter async map async array
| 0
|
204,911
| 15,954,662,797
|
IssuesEvent
|
2021-04-15 13:49:33
|
golang/vscode-go
|
https://api.github.com/repos/golang/vscode-go
|
closed
|
docs: create dlvdap.md
|
DlvDAP Documentation
|
Provide information on
- how to use it
- how to troubleshoot
- what features are available and not avaiable yet
- link to the project dashboard
- how to contribute
And, link this doc from repo README.md and docs/debugging.md
cc @polinasok @suzmue
|
1.0
|
docs: create dlvdap.md - Provide information on
- how to use it
- how to troubleshoot
- what features are available and not avaiable yet
- link to the project dashboard
- how to contribute
And, link this doc from repo README.md and docs/debugging.md
cc @polinasok @suzmue
|
non_defect
|
docs create dlvdap md provide information on how to use it how to troubleshoot what features are available and not avaiable yet link to the project dashboard how to contribute and link this doc from repo readme md and docs debugging md cc polinasok suzmue
| 0
|
335,522
| 30,038,108,227
|
IssuesEvent
|
2023-06-27 13:57:36
|
elastic/kibana
|
https://api.github.com/repos/elastic/kibana
|
closed
|
Failing test: Jest Tests.x-pack/plugins/cases/public/components/case_view - CaseViewPage Tabs renders the activity tab when the query parameter tabId has an unknown value
|
failed-test skipped-test Team:ResponseOps Feature:Cases
|
A test failed on a tracked branch
```
TestingLibraryElementError: Unable to find an element by: [data-test-subj="case-view-tab-content-activity"]
Ignored nodes: comments, script, style
<body>
<div />
</body>
at Object.getElementError (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/@testing-library/dom/dist/config.js:40:19)
at /var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/@testing-library/dom/dist/query-helpers.js:90:38
at /var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/@testing-library/dom/dist/query-helpers.js:62:17
at /var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/@testing-library/dom/dist/query-helpers.js:111:19
at getByTestId (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/x-pack/plugins/cases/public/components/case_view/case_view_page.test.tsx:512:23)
at batchedUpdates$1 (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/react-dom/cjs/react-dom.development.js:22380:12)
at act (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/react-dom/cjs/react-dom-test-utils.development.js:1042:14)
at Object.<anonymous> (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/x-pack/plugins/cases/public/components/case_view/case_view_page.test.tsx:511:16)
at Promise.then.completed (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/utils.js:289:28)
at new Promise (<anonymous>)
at callAsyncCircusFn (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/utils.js:222:10)
at _callCircusTest (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/run.js:248:40)
at runNextTicks (node:internal/process/task_queues:61:5)
at processTimers (node:internal/timers:499:9)
at _runTest (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/run.js:184:3)
at _runTestsForDescribeBlock (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/run.js:86:9)
at _runTestsForDescribeBlock (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/run.js:81:9)
at _runTestsForDescribeBlock (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/run.js:81:9)
at run (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/run.js:26:3)
at runAndTransformResultsToJestFormat (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/legacy-code-todo-rewrite/jestAdapterInit.js:120:21)
at jestAdapter (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/legacy-code-todo-rewrite/jestAdapter.js:79:19)
at runTestInternal (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-runner/build/runTest.js:367:16)
at runTest (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-runner/build/runTest.js:444:34)
```
First failure: [CI Build - main](https://buildkite.com/elastic/kibana-on-merge/builds/26147#0185f527-6859-4d01-ac37-e5483a535e48)
<!-- kibanaCiData = {"failed-test":{"test.class":"Jest Tests.x-pack/plugins/cases/public/components/case_view","test.name":"CaseViewPage Tabs renders the activity tab when the query parameter tabId has an unknown value","test.failCount":4}} -->
|
2.0
|
Failing test: Jest Tests.x-pack/plugins/cases/public/components/case_view - CaseViewPage Tabs renders the activity tab when the query parameter tabId has an unknown value - A test failed on a tracked branch
```
TestingLibraryElementError: Unable to find an element by: [data-test-subj="case-view-tab-content-activity"]
Ignored nodes: comments, script, style
<body>
<div />
</body>
at Object.getElementError (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/@testing-library/dom/dist/config.js:40:19)
at /var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/@testing-library/dom/dist/query-helpers.js:90:38
at /var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/@testing-library/dom/dist/query-helpers.js:62:17
at /var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/@testing-library/dom/dist/query-helpers.js:111:19
at getByTestId (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/x-pack/plugins/cases/public/components/case_view/case_view_page.test.tsx:512:23)
at batchedUpdates$1 (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/react-dom/cjs/react-dom.development.js:22380:12)
at act (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/react-dom/cjs/react-dom-test-utils.development.js:1042:14)
at Object.<anonymous> (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/x-pack/plugins/cases/public/components/case_view/case_view_page.test.tsx:511:16)
at Promise.then.completed (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/utils.js:289:28)
at new Promise (<anonymous>)
at callAsyncCircusFn (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/utils.js:222:10)
at _callCircusTest (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/run.js:248:40)
at runNextTicks (node:internal/process/task_queues:61:5)
at processTimers (node:internal/timers:499:9)
at _runTest (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/run.js:184:3)
at _runTestsForDescribeBlock (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/run.js:86:9)
at _runTestsForDescribeBlock (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/run.js:81:9)
at _runTestsForDescribeBlock (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/run.js:81:9)
at run (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/run.js:26:3)
at runAndTransformResultsToJestFormat (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/legacy-code-todo-rewrite/jestAdapterInit.js:120:21)
at jestAdapter (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-circus/build/legacy-code-todo-rewrite/jestAdapter.js:79:19)
at runTestInternal (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-runner/build/runTest.js:367:16)
at runTest (/var/lib/buildkite-agent/builds/kb-n2-4-spot-3f2434e6d3ddd216/elastic/kibana-on-merge/kibana/node_modules/jest-runner/build/runTest.js:444:34)
```
First failure: [CI Build - main](https://buildkite.com/elastic/kibana-on-merge/builds/26147#0185f527-6859-4d01-ac37-e5483a535e48)
<!-- kibanaCiData = {"failed-test":{"test.class":"Jest Tests.x-pack/plugins/cases/public/components/case_view","test.name":"CaseViewPage Tabs renders the activity tab when the query parameter tabId has an unknown value","test.failCount":4}} -->
|
non_defect
|
failing test jest tests x pack plugins cases public components case view caseviewpage tabs renders the activity tab when the query parameter tabid has an unknown value a test failed on a tracked branch testinglibraryelementerror unable to find an element by ignored nodes comments script style at object getelementerror var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules testing library dom dist config js at var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules testing library dom dist query helpers js at var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules testing library dom dist query helpers js at var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules testing library dom dist query helpers js at getbytestid var lib buildkite agent builds kb spot elastic kibana on merge kibana x pack plugins cases public components case view case view page test tsx at batchedupdates var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules react dom cjs react dom development js at act var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules react dom cjs react dom test utils development js at object var lib buildkite agent builds kb spot elastic kibana on merge kibana x pack plugins cases public components case view case view page test tsx at promise then completed var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules jest circus build utils js at new promise at callasynccircusfn var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules jest circus build utils js at callcircustest var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules jest circus build run js at runnextticks node internal process task queues at processtimers node internal timers at runtest var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules jest circus build run js at runtestsfordescribeblock var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules jest circus build run js at runtestsfordescribeblock var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules jest circus build run js at runtestsfordescribeblock var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules jest circus build run js at run var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules jest circus build run js at runandtransformresultstojestformat var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules jest circus build legacy code todo rewrite jestadapterinit js at jestadapter var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules jest circus build legacy code todo rewrite jestadapter js at runtestinternal var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules jest runner build runtest js at runtest var lib buildkite agent builds kb spot elastic kibana on merge kibana node modules jest runner build runtest js first failure
| 0
|
142,772
| 5,477,066,120
|
IssuesEvent
|
2017-03-12 03:30:24
|
NCEAS/eml
|
https://api.github.com/repos/NCEAS/eml
|
closed
|
xsl template needed for ulink
|
Category: eml - general bugs Component: Bugzilla-Id Priority: Normal Status: Resolved Tracker: Bug
|
---
Author Name: **Margaret O'Brien** (Margaret O'Brien)
Original Redmine Issue: 3444, https://projects.ecoinformatics.org/ecoinfo/issues/3444
Original Date: 2008-07-10
Original Assignee: Matt Jones
---
in eml 2,.1.0, an element <ulink> was added to eml-text.xsd. It needs an xsl template.
|
1.0
|
xsl template needed for ulink - ---
Author Name: **Margaret O'Brien** (Margaret O'Brien)
Original Redmine Issue: 3444, https://projects.ecoinformatics.org/ecoinfo/issues/3444
Original Date: 2008-07-10
Original Assignee: Matt Jones
---
in eml 2,.1.0, an element <ulink> was added to eml-text.xsd. It needs an xsl template.
|
non_defect
|
xsl template needed for ulink author name margaret o brien margaret o brien original redmine issue original date original assignee matt jones in eml an element was added to eml text xsd it needs an xsl template
| 0
|
19,440
| 3,203,486,544
|
IssuesEvent
|
2015-10-02 19:16:02
|
gbif/ipt
|
https://api.github.com/repos/gbif/ipt
|
opened
|
Error processing SQL result sets with null table column values
|
bug Priority-Critical Type-Defect Usability
|
This error causes mapping previews and publishing to fail with an error such as:
```
Generating mapping preview failed: Error writing data file for mapping Darwin Core Occurrence in source watervogels-occurrences, line 25
```
Affects version 2.3.1
**Note**: A temporary work around is to update your SQL query so that 'null' values aren't returned in the result set.
In PostgreSQL for example, you could replace the null values with an empty string using COALESCE:
SELECT COALESCE(column, '') AS column ...
|
1.0
|
Error processing SQL result sets with null table column values - This error causes mapping previews and publishing to fail with an error such as:
```
Generating mapping preview failed: Error writing data file for mapping Darwin Core Occurrence in source watervogels-occurrences, line 25
```
Affects version 2.3.1
**Note**: A temporary work around is to update your SQL query so that 'null' values aren't returned in the result set.
In PostgreSQL for example, you could replace the null values with an empty string using COALESCE:
SELECT COALESCE(column, '') AS column ...
|
defect
|
error processing sql result sets with null table column values this error causes mapping previews and publishing to fail with an error such as generating mapping preview failed error writing data file for mapping darwin core occurrence in source watervogels occurrences line affects version note a temporary work around is to update your sql query so that null values aren t returned in the result set in postgresql for example you could replace the null values with an empty string using coalesce select coalesce column as column
| 1
|
59,904
| 17,023,286,035
|
IssuesEvent
|
2021-07-03 01:14:07
|
tomhughes/trac-tickets
|
https://api.github.com/repos/tomhughes/trac-tickets
|
closed
|
osmarender6: riverbank multipolygons require that the outer way be last
|
Component: osmarender Priority: minor Resolution: fixed Type: defect
|
**[Submitted to the original trac issue database at 9.50pm, Wednesday, 13th August 2008]**
In order to get osmarender6 to render islands in a river properly, it appears to require that the outer way be last in the multipolygon.
It should allow them to be in any order.
|
1.0
|
osmarender6: riverbank multipolygons require that the outer way be last - **[Submitted to the original trac issue database at 9.50pm, Wednesday, 13th August 2008]**
In order to get osmarender6 to render islands in a river properly, it appears to require that the outer way be last in the multipolygon.
It should allow them to be in any order.
|
defect
|
riverbank multipolygons require that the outer way be last in order to get to render islands in a river properly it appears to require that the outer way be last in the multipolygon it should allow them to be in any order
| 1
|
55,847
| 14,707,725,520
|
IssuesEvent
|
2021-01-04 22:07:53
|
idaholab/raven
|
https://api.github.com/repos/idaholab/raven
|
opened
|
[DEFECT] Initial Value Input Error for Optimizer
|
defect priority_normal
|
While using the RAVEN optimizer, I realized that although I entered an incorrect initial value in the Optimizer node which was outside the sampling range defined in the Distributions node, RAVEN didn't provide an input error message.
Since this may cause unexpected outcomes based on the input values outside the range of user's interest, it is believed that the proper error message should be provided for users.

|
1.0
|
[DEFECT] Initial Value Input Error for Optimizer - While using the RAVEN optimizer, I realized that although I entered an incorrect initial value in the Optimizer node which was outside the sampling range defined in the Distributions node, RAVEN didn't provide an input error message.
Since this may cause unexpected outcomes based on the input values outside the range of user's interest, it is believed that the proper error message should be provided for users.

|
defect
|
initial value input error for optimizer while using the raven optimizer i realized that although i entered an incorrect initial value in the optimizer node which was outside the sampling range defined in the distributions node raven didn t provide an input error message since this may cause unexpected outcomes based on the input values outside the range of user s interest it is believed that the proper error message should be provided for users
| 1
|
55,521
| 14,531,722,512
|
IssuesEvent
|
2020-12-14 21:14:33
|
department-of-veterans-affairs/va.gov-team
|
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
|
closed
|
[COGNITION] Global Timeout Modal - Language should not depend on color descriptions like "blue button" for users to extend their session
|
508-defect-2 508-issue-cognition 508/Accessibility Identity
|
# [508-defect-2](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/platform/accessibility/guidance/defect-severity-rubric.md#508-defect-2)
<!--
Enter an issue title using the format [ERROR TYPE]: Brief description of the problem
---
[SCREENREADER]: Edit buttons need aria-label for context
[KEYBOARD]: Add another user link will not receive keyboard focus
[AXE-CORE]: Heading levels should increase by one
[COGNITION]: Error messages should be more specific
[COLOR]: Blue button on blue background does not have sufficient contrast ratio
---
-->
<!-- It's okay to delete the instructions above, but leave the link to the 508 defect severity level for your issue. -->
## Feedback framework
- **โ๏ธ Must** for if the feedback must be applied
- **โ ๏ธ Should** if the feedback is best practice
- **โ๏ธ Consider** for suggestions/enhancements
## Definition of done
1. Review and acknowledge feedback.
1. Adjust language in the timeout modal.
1. Accessibility specialist will close ticket after reviewing documented decisions / validating fix.
<hr/>
## Point of Contact
<!-- If this issue is being opened by a VFS team member, please add a point of contact. Usually this is the same person who enters the issue ticket. -->
**VFS Point of Contact:** _Trevor_
## User Story or Problem Statement
<!-- Example: As a user with cognitive considerations, I expect to see a label and input pairing consistently styled as throughout the rest of the site, with the label just above the text/email/search input or to the right of a radio/checkbox input, so that I am clearly able to understand what entry is expected. -->
Our timeout modal uses language that references a "blue button" to extend user's session. This assumes the user can understand and visualize the color blue. As a user who might have a color acuity issue, I would like this to be more plain language.
## Details
<!-- This is a detailed description of the issue. It should include a restatement of the title, and provide more background information. -->
VA 508 office flagged this issue on the VAOS Express Care update. I think we could change the language to something like
> If you need more time, please select the "I need more time" button below. Otherwise we'll sign you out to protect your privacy.
Screenshot and code snippet below.
## Acceptance Criteria
- [x] Content specialist approves the text change
- [x] Change is communicated broadly in Slack
- [x] Change is verified in Staging
## Environment
* Staging env ( staging.va.gov )
## Steps to Recreate
1. Log into staging.va.gov with any known good test user
1. Leave the window / session alone for 20-30 minutes
1. The session ending modal will appear
## Solution (if known)
* https://github.com/department-of-veterans-affairs/vets-website/blob/1c1ebe64db683474fbd530f34d8853c0a20aae60/src/platform/user/authentication/components/SessionTimeoutModal.jsx#L92
```diff
! SessionTimeoutModal.jsx#L92
<p>
- If you need more time, please click on the blue button below. Otherwise, weโll sign you out to protect your privacy.
+ If you need more time, please select the "I need more time" button below. Otherwise we'll sign you out to protect your privacy.
</p>
```
## WCAG or Vendor Guidance (optional)
* [Sensory Characteristics: Understanding SC 1.3.3](https://www.w3.org/TR/UNDERSTANDING-WCAG20/content-structure-separation-understanding.html)
## Screenshots or Trace Logs
<!-- Drop any screenshots or error logs that might be useful for debugging -->

|
1.0
|
[COGNITION] Global Timeout Modal - Language should not depend on color descriptions like "blue button" for users to extend their session - # [508-defect-2](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/platform/accessibility/guidance/defect-severity-rubric.md#508-defect-2)
<!--
Enter an issue title using the format [ERROR TYPE]: Brief description of the problem
---
[SCREENREADER]: Edit buttons need aria-label for context
[KEYBOARD]: Add another user link will not receive keyboard focus
[AXE-CORE]: Heading levels should increase by one
[COGNITION]: Error messages should be more specific
[COLOR]: Blue button on blue background does not have sufficient contrast ratio
---
-->
<!-- It's okay to delete the instructions above, but leave the link to the 508 defect severity level for your issue. -->
## Feedback framework
- **โ๏ธ Must** for if the feedback must be applied
- **โ ๏ธ Should** if the feedback is best practice
- **โ๏ธ Consider** for suggestions/enhancements
## Definition of done
1. Review and acknowledge feedback.
1. Adjust language in the timeout modal.
1. Accessibility specialist will close ticket after reviewing documented decisions / validating fix.
<hr/>
## Point of Contact
<!-- If this issue is being opened by a VFS team member, please add a point of contact. Usually this is the same person who enters the issue ticket. -->
**VFS Point of Contact:** _Trevor_
## User Story or Problem Statement
<!-- Example: As a user with cognitive considerations, I expect to see a label and input pairing consistently styled as throughout the rest of the site, with the label just above the text/email/search input or to the right of a radio/checkbox input, so that I am clearly able to understand what entry is expected. -->
Our timeout modal uses language that references a "blue button" to extend user's session. This assumes the user can understand and visualize the color blue. As a user who might have a color acuity issue, I would like this to be more plain language.
## Details
<!-- This is a detailed description of the issue. It should include a restatement of the title, and provide more background information. -->
VA 508 office flagged this issue on the VAOS Express Care update. I think we could change the language to something like
> If you need more time, please select the "I need more time" button below. Otherwise we'll sign you out to protect your privacy.
Screenshot and code snippet below.
## Acceptance Criteria
- [x] Content specialist approves the text change
- [x] Change is communicated broadly in Slack
- [x] Change is verified in Staging
## Environment
* Staging env ( staging.va.gov )
## Steps to Recreate
1. Log into staging.va.gov with any known good test user
1. Leave the window / session alone for 20-30 minutes
1. The session ending modal will appear
## Solution (if known)
* https://github.com/department-of-veterans-affairs/vets-website/blob/1c1ebe64db683474fbd530f34d8853c0a20aae60/src/platform/user/authentication/components/SessionTimeoutModal.jsx#L92
```diff
! SessionTimeoutModal.jsx#L92
<p>
- If you need more time, please click on the blue button below. Otherwise, weโll sign you out to protect your privacy.
+ If you need more time, please select the "I need more time" button below. Otherwise we'll sign you out to protect your privacy.
</p>
```
## WCAG or Vendor Guidance (optional)
* [Sensory Characteristics: Understanding SC 1.3.3](https://www.w3.org/TR/UNDERSTANDING-WCAG20/content-structure-separation-understanding.html)
## Screenshots or Trace Logs
<!-- Drop any screenshots or error logs that might be useful for debugging -->

|
defect
|
global timeout modal language should not depend on color descriptions like blue button for users to extend their session enter an issue title using the format brief description of the problem edit buttons need aria label for context add another user link will not receive keyboard focus heading levels should increase by one error messages should be more specific blue button on blue background does not have sufficient contrast ratio feedback framework โ๏ธ must for if the feedback must be applied โ ๏ธ should if the feedback is best practice โ๏ธ consider for suggestions enhancements definition of done review and acknowledge feedback adjust language in the timeout modal accessibility specialist will close ticket after reviewing documented decisions validating fix point of contact vfs point of contact trevor user story or problem statement our timeout modal uses language that references a blue button to extend user s session this assumes the user can understand and visualize the color blue as a user who might have a color acuity issue i would like this to be more plain language details va office flagged this issue on the vaos express care update i think we could change the language to something like if you need more time please select the i need more time button below otherwise we ll sign you out to protect your privacy screenshot and code snippet below acceptance criteria content specialist approves the text change change is communicated broadly in slack change is verified in staging environment staging env staging va gov steps to recreate log into staging va gov with any known good test user leave the window session alone for minutes the session ending modal will appear solution if known diff sessiontimeoutmodal jsx if you need more time please click on the blue button below otherwise weโll sign you out to protect your privacy if you need more time please select the i need more time button below otherwise we ll sign you out to protect your privacy wcag or vendor guidance optional screenshots or trace logs
| 1
|
34,178
| 7,374,674,984
|
IssuesEvent
|
2018-03-13 21:07:11
|
jccastillo0007/eFacturaT
|
https://api.github.com/repos/jccastillo0007/eFacturaT
|
opened
|
Escritorio - envรญa incorrecto el schema location con leyendas fiscales
|
bug defect
|
Acordamos eliminarlo para complementos, addendas, etc.
Ahora se presentรณ con leyendas fiscales.
|
1.0
|
Escritorio - envรญa incorrecto el schema location con leyendas fiscales - Acordamos eliminarlo para complementos, addendas, etc.
Ahora se presentรณ con leyendas fiscales.
|
defect
|
escritorio envรญa incorrecto el schema location con leyendas fiscales acordamos eliminarlo para complementos addendas etc ahora se presentรณ con leyendas fiscales
| 1
|
38,435
| 8,817,003,096
|
IssuesEvent
|
2018-12-30 18:00:23
|
NoSuchProcess/emu145
|
https://api.github.com/repos/NoSuchProcess/emu145
|
closed
|
ะกะธะผะฒะพะป ะ ะฒัะณะปัะดะธั ะฝะตะฟัะฐะฒะธะปัะฝะพ
|
Priority-Medium Type-Defect auto-migrated
|
```
What steps will reproduce the problem?
1. 0 ^ 0 : ะธะปะธ ััะพ-ะฝะธะฑัะดั ะฒัะทัะฒะฐััะตะต ะะะะะ
What is the expected output? What do you see instead?
ะะพะปะถะฝะพ ะฑััั ะะะะะ, ะฒะธะดะณะพ ะะณะณะะณ
What version of the product are you using? On what operating system?
Please provide any additional information below.
```
Original issue reported on code.google.com by `aleksej....@gmail.com` on 18 Aug 2013 at 11:29
|
1.0
|
ะกะธะผะฒะพะป ะ ะฒัะณะปัะดะธั ะฝะตะฟัะฐะฒะธะปัะฝะพ - ```
What steps will reproduce the problem?
1. 0 ^ 0 : ะธะปะธ ััะพ-ะฝะธะฑัะดั ะฒัะทัะฒะฐััะตะต ะะะะะ
What is the expected output? What do you see instead?
ะะพะปะถะฝะพ ะฑััั ะะะะะ, ะฒะธะดะณะพ ะะณะณะะณ
What version of the product are you using? On what operating system?
Please provide any additional information below.
```
Original issue reported on code.google.com by `aleksej....@gmail.com` on 18 Aug 2013 at 11:29
|
defect
|
ัะธะผะฒะพะป ะณ ะฒัะณะปัะดะธั ะฝะตะฟัะฐะฒะธะปัะฝะพ what steps will reproduce the problem ะธะปะธ ััะพ ะฝะธะฑัะดั ะฒัะทัะฒะฐััะตะต ะตะณะณะพะณ what is the expected output what do you see instead ะดะพะปะถะฝะพ ะฑััั ะตะณะณะพะณ ะฒะธะดะณะพ ะตะณะณะพะณ what version of the product are you using on what operating system please provide any additional information below original issue reported on code google com by aleksej gmail com on aug at
| 1
|
62,305
| 17,023,893,829
|
IssuesEvent
|
2021-07-03 04:24:50
|
tomhughes/trac-tickets
|
https://api.github.com/repos/tomhughes/trac-tickets
|
closed
|
the dropdown menus are hidden behind the Potlatch 2 object
|
Component: website Priority: minor Resolution: wontfix Type: defect
|
**[Submitted to the original trac issue database at 12.09am, Friday, 3rd January 2014]**
the dropdown menus (edit and user) are hidden (after clicking on the respective button) behind the Potlatch 2 object and hence are not usable. For iD they work as expected.
tested in: Adobe Flash 11.2.202.332, Firefox 26, Linux and Adobe Flash 11.2.202.332, Chromium 31.0, Linux.
That may be related to the fix of ticket 5053.
|
1.0
|
the dropdown menus are hidden behind the Potlatch 2 object - **[Submitted to the original trac issue database at 12.09am, Friday, 3rd January 2014]**
the dropdown menus (edit and user) are hidden (after clicking on the respective button) behind the Potlatch 2 object and hence are not usable. For iD they work as expected.
tested in: Adobe Flash 11.2.202.332, Firefox 26, Linux and Adobe Flash 11.2.202.332, Chromium 31.0, Linux.
That may be related to the fix of ticket 5053.
|
defect
|
the dropdown menus are hidden behind the potlatch object the dropdown menus edit and user are hidden after clicking on the respective button behind the potlatch object and hence are not usable for id they work as expected tested in adobe flash firefox linux and adobe flash chromium linux that may be related to the fix of ticket
| 1
|
76,440
| 21,414,873,988
|
IssuesEvent
|
2022-04-22 09:48:52
|
odpi/egeria
|
https://api.github.com/repos/odpi/egeria
|
closed
|
Enhancement - add quick build option
|
enhancement build-improvement
|
Sometimes it is desirable to do a quick build
- in a quick dev/test loop
- for a demo
- for a tutorial
In these cases various flags can be set to make the build super quick. For example I use a progressive set of aliases to gradually go from slowest/best checks to fastest/least checks
I propose this is added as a profile to the maven build. Initially this won't be documented except in tutorial due to the risk of a bad environment, missing dependency checks etc -- though the PR process will always check these
Gradle is already much quicker, though needs clarity around skipping tests
- [x] Maven : Add quick profile
- [x] Maven : Document quick profile
- [x] Gradle : Add quick(er) option for build
- [ ] Gradle : Document quick profile
cc: @mandy-chessell
|
1.0
|
Enhancement - add quick build option - Sometimes it is desirable to do a quick build
- in a quick dev/test loop
- for a demo
- for a tutorial
In these cases various flags can be set to make the build super quick. For example I use a progressive set of aliases to gradually go from slowest/best checks to fastest/least checks
I propose this is added as a profile to the maven build. Initially this won't be documented except in tutorial due to the risk of a bad environment, missing dependency checks etc -- though the PR process will always check these
Gradle is already much quicker, though needs clarity around skipping tests
- [x] Maven : Add quick profile
- [x] Maven : Document quick profile
- [x] Gradle : Add quick(er) option for build
- [ ] Gradle : Document quick profile
cc: @mandy-chessell
|
non_defect
|
enhancement add quick build option sometimes it is desirable to do a quick build in a quick dev test loop for a demo for a tutorial in these cases various flags can be set to make the build super quick for example i use a progressive set of aliases to gradually go from slowest best checks to fastest least checks i propose this is added as a profile to the maven build initially this won t be documented except in tutorial due to the risk of a bad environment missing dependency checks etc though the pr process will always check these gradle is already much quicker though needs clarity around skipping tests maven add quick profile maven document quick profile gradle add quick er option for build gradle document quick profile cc mandy chessell
| 0
|
525,443
| 15,253,574,439
|
IssuesEvent
|
2021-02-20 08:20:23
|
popperjs/popper-core
|
https://api.github.com/repos/popperjs/popper-core
|
closed
|
Tether doesn't work with altAxis
|
# BUG ๐ DIFFICULTY: medium PRIORITY: medium TARGETS: modifier
|
<!--
Thanks for your interest in contributing to Popper!
If your issue is not a bug report, please use our community at https://spectrum.chat/popper-js
Is your issue related to Popper v1? Please consider to migrate to v2, we are not actively
developing previous versions if not for security patches.
Please, make sure to fill all the sections of the template before submitting any issue.
Issues without the required informations WILL BE CLOSED.
Want your issue to be fixed earlier? Create a PR that introduces a CI test that fails
because of the bug you found!
-->
### CodeSandbox demo
<!--
Edit this sandbox template to allow the contributors to easily reproduce your problem.
-->
https://codesandbox.io/s/fancy-sea-mpxoo
### Steps to reproduce the problem
1. Scroll on the preview
### What is the expected behavior?
<!-- Describe what you would have expected. -->
The popper should tether to the reference.
### What went wrong?
<!-- Describe what went wrong. -->
The popper is sticking to the boundary.
### Any other comments?
<!-- Any additional information. -->
Note how `altAxis` and `tether` are enabled:
```js
createPopper(button, tooltip, {
placement: "bottom",
modifiers: [
{
name: "preventOverflow",
options: {
altAxis: true,
tether: true
}
}
]
})
```
|
1.0
|
Tether doesn't work with altAxis - <!--
Thanks for your interest in contributing to Popper!
If your issue is not a bug report, please use our community at https://spectrum.chat/popper-js
Is your issue related to Popper v1? Please consider to migrate to v2, we are not actively
developing previous versions if not for security patches.
Please, make sure to fill all the sections of the template before submitting any issue.
Issues without the required informations WILL BE CLOSED.
Want your issue to be fixed earlier? Create a PR that introduces a CI test that fails
because of the bug you found!
-->
### CodeSandbox demo
<!--
Edit this sandbox template to allow the contributors to easily reproduce your problem.
-->
https://codesandbox.io/s/fancy-sea-mpxoo
### Steps to reproduce the problem
1. Scroll on the preview
### What is the expected behavior?
<!-- Describe what you would have expected. -->
The popper should tether to the reference.
### What went wrong?
<!-- Describe what went wrong. -->
The popper is sticking to the boundary.
### Any other comments?
<!-- Any additional information. -->
Note how `altAxis` and `tether` are enabled:
```js
createPopper(button, tooltip, {
placement: "bottom",
modifiers: [
{
name: "preventOverflow",
options: {
altAxis: true,
tether: true
}
}
]
})
```
|
non_defect
|
tether doesn t work with altaxis thanks for your interest in contributing to popper if your issue is not a bug report please use our community at is your issue related to popper please consider to migrate to we are not actively developing previous versions if not for security patches please make sure to fill all the sections of the template before submitting any issue issues without the required informations will be closed want your issue to be fixed earlier create a pr that introduces a ci test that fails because of the bug you found codesandbox demo edit this sandbox template to allow the contributors to easily reproduce your problem steps to reproduce the problem scroll on the preview what is the expected behavior the popper should tether to the reference what went wrong the popper is sticking to the boundary any other comments note how altaxis and tether are enabled js createpopper button tooltip placement bottom modifiers name preventoverflow options altaxis true tether true
| 0
|
65,444
| 19,517,140,453
|
IssuesEvent
|
2021-12-29 12:13:36
|
cakephp/cakephp
|
https://api.github.com/repos/cakephp/cakephp
|
opened
|
Mailer->viewBuilder()->setLayout(null) doesn't work
|
defect
|
### Description
When i set up a fresh installation of CakePHP, remove `/templates/layout/email/html/default.php` and add the following code to AppController.php ...
```
use Cake\Mailer\Mailer;
// inside initialize()
$mailer = new Mailer();
$mailer
->setEmailFormat('html')
->setTo('bob@example.com')
->setFrom('app@domain.com')
->viewBuilder()
->setTemplate('default')
->setLayout(null);
$mailer->deliver();
```
... I get a `MissingLayoutException` telling me to create a `/templates/layout/email/html/default.php` file. However, I want to send the email without a layout, hence the `->setLayout(null)`.
I think the problem is caused by the `isset()` in `View::__construct()` ...
```
foreach ($this->_passedVars as $var) {
if (isset($viewOptions[$var])) {
$this->{$var} = $viewOptions[$var];
}
}
```
... which isn't satisfied by `NULL`, therefore the default layout of the `View` class is used. `array_key_exists($var, $viewOptions)` could be an option to solve this, however, not sure if it might cause any unwanted side effects?
### CakePHP Version
4.3.3
### PHP Version
7.4
|
1.0
|
Mailer->viewBuilder()->setLayout(null) doesn't work - ### Description
When i set up a fresh installation of CakePHP, remove `/templates/layout/email/html/default.php` and add the following code to AppController.php ...
```
use Cake\Mailer\Mailer;
// inside initialize()
$mailer = new Mailer();
$mailer
->setEmailFormat('html')
->setTo('bob@example.com')
->setFrom('app@domain.com')
->viewBuilder()
->setTemplate('default')
->setLayout(null);
$mailer->deliver();
```
... I get a `MissingLayoutException` telling me to create a `/templates/layout/email/html/default.php` file. However, I want to send the email without a layout, hence the `->setLayout(null)`.
I think the problem is caused by the `isset()` in `View::__construct()` ...
```
foreach ($this->_passedVars as $var) {
if (isset($viewOptions[$var])) {
$this->{$var} = $viewOptions[$var];
}
}
```
... which isn't satisfied by `NULL`, therefore the default layout of the `View` class is used. `array_key_exists($var, $viewOptions)` could be an option to solve this, however, not sure if it might cause any unwanted side effects?
### CakePHP Version
4.3.3
### PHP Version
7.4
|
defect
|
mailer viewbuilder setlayout null doesn t work description when i set up a fresh installation of cakephp remove templates layout email html default php and add the following code to appcontroller php use cake mailer mailer inside initialize mailer new mailer mailer setemailformat html setto bob example com setfrom app domain com viewbuilder settemplate default setlayout null mailer deliver i get a missinglayoutexception telling me to create a templates layout email html default php file however i want to send the email without a layout hence the setlayout null i think the problem is caused by the isset in view construct foreach this passedvars as var if isset viewoptions this var viewoptions which isn t satisfied by null therefore the default layout of the view class is used array key exists var viewoptions could be an option to solve this however not sure if it might cause any unwanted side effects cakephp version php version
| 1
|
448,364
| 12,948,944,602
|
IssuesEvent
|
2020-07-19 06:59:16
|
next-l/enju_leaf
|
https://api.github.com/repos/next-l/enju_leaf
|
closed
|
่ณๆใคใณใใผใ็ตๆใฎไธ่ฆงใฎTSVใงใใใใไฝๅบฆใๅบๅใใใฆใใ
|
bug checking low priority
|
#1079 ใฎ่ณๆ็
รใใใ๏ผ"" user_number username email password๏ผใไฝๅบฆใๅบๅใใใฆใใ
http://localhost:8080/user_import_results.txt?locale=ja
<pre>
"" user_number username email password
"user05" 100005 user05 user05@sample.jp habanera
"" user_number username email password
"user06" 100006 user06 user06@sample.jp habanera
"" 100007ใ user07 user07@sample.jp habanera1
"" user_number username email password
"user806" 800006 user806 user806@sample.jp habanera
"" 800007ใ user807 user807@sample.jp habanera1
"user808" 800008 user808 user808@sample.jp habanera2
"user809" 800009 user809 user809@sample.jp habanera3
</pre>
vagrant@vagrant-ubuntu-trusty-64:~/enju$ bundle list | grep enju
- enju_biblio (0.2.0.beta.1 d5b8c05)
- enju_circulation (0.2.0.beta.1 b41b3ba)
- enju_event (0.2.0.beta.1 3ecd86c)
- enju_leaf (1.2.0.beta.1 6a07d2f)
- enju_library (0.2.0.beta.1 9588750)
- enju_manifestation_viewer (0.2.0.beta.1 dc4d4cb)
- enju_message (0.2.0.beta.1 7b9d120)
- enju_ndl (0.2.0.beta.1 8f66dba)
- enju_purchase_request (0.1.0 bc500c6)
- enju_subject (0.2.0.beta.1 49905da)
ๅ่๏ผใใฎ็ป้ขใธใฎ็ใๆน
http://localhost:8080/resource_import_files

http://localhost:8080/resource_import_files/7

http://localhost:8080/resource_import_results/25

http://localhost:8080/resource_import_results

|
1.0
|
่ณๆใคใณใใผใ็ตๆใฎไธ่ฆงใฎTSVใงใใใใไฝๅบฆใๅบๅใใใฆใใ - #1079 ใฎ่ณๆ็
รใใใ๏ผ"" user_number username email password๏ผใไฝๅบฆใๅบๅใใใฆใใ
http://localhost:8080/user_import_results.txt?locale=ja
<pre>
"" user_number username email password
"user05" 100005 user05 user05@sample.jp habanera
"" user_number username email password
"user06" 100006 user06 user06@sample.jp habanera
"" 100007ใ user07 user07@sample.jp habanera1
"" user_number username email password
"user806" 800006 user806 user806@sample.jp habanera
"" 800007ใ user807 user807@sample.jp habanera1
"user808" 800008 user808 user808@sample.jp habanera2
"user809" 800009 user809 user809@sample.jp habanera3
</pre>
vagrant@vagrant-ubuntu-trusty-64:~/enju$ bundle list | grep enju
- enju_biblio (0.2.0.beta.1 d5b8c05)
- enju_circulation (0.2.0.beta.1 b41b3ba)
- enju_event (0.2.0.beta.1 3ecd86c)
- enju_leaf (1.2.0.beta.1 6a07d2f)
- enju_library (0.2.0.beta.1 9588750)
- enju_manifestation_viewer (0.2.0.beta.1 dc4d4cb)
- enju_message (0.2.0.beta.1 7b9d120)
- enju_ndl (0.2.0.beta.1 8f66dba)
- enju_purchase_request (0.1.0 bc500c6)
- enju_subject (0.2.0.beta.1 49905da)
ๅ่๏ผใใฎ็ป้ขใธใฎ็ใๆน
http://localhost:8080/resource_import_files

http://localhost:8080/resource_import_files/7

http://localhost:8080/resource_import_results/25

http://localhost:8080/resource_import_results

|
non_defect
|
่ณๆใคใณใใผใ็ตๆใฎไธ่ฆงใฎtsvใงใใใใไฝๅบฆใๅบๅใใใฆใใ ใฎ่ณๆ็ รใใใ๏ผ user number username email password๏ผใไฝๅบฆใๅบๅใใใฆใใ user number username email password sample jp habanera user number username email password sample jp habanera sample jp user number username email password sample jp habanera sample jp sample jp sample jp vagrant vagrant ubuntu trusty enju bundle list grep enju enju biblio beta enju circulation beta enju event beta enju leaf beta enju library beta enju manifestation viewer beta enju message beta enju ndl beta enju purchase request enju subject beta ๅ่๏ผใใฎ็ป้ขใธใฎ็ใๆน
| 0
|
46,821
| 13,055,982,466
|
IssuesEvent
|
2020-07-30 03:18:06
|
icecube-trac/tix2
|
https://api.github.com/repos/icecube-trac/tix2
|
opened
|
Documentation builder has no Geant4 (Trac #1934)
|
Incomplete Migration Migrated from Trac defect infrastructure
|
Migrated from https://code.icecube.wisc.edu/ticket/1934
```json
{
"status": "closed",
"changetime": "2019-02-13T14:15:18",
"description": "I improved g4-tankresponse's doxygen (to comply with ticket #1309). This has never made it to the documentation page (http://software.icecube.wisc.edu/documentation/doxygen) because Geant4 does not seem to be installed in the builder.",
"reporter": "jgonzalez",
"cc": "",
"resolution": "worksforme",
"_ts": "1550067318169976",
"component": "infrastructure",
"summary": "Documentation builder has no Geant4",
"priority": "minor",
"keywords": "",
"time": "2017-01-19T15:13:16",
"milestone": "",
"owner": "nega",
"type": "defect"
}
```
|
1.0
|
Documentation builder has no Geant4 (Trac #1934) - Migrated from https://code.icecube.wisc.edu/ticket/1934
```json
{
"status": "closed",
"changetime": "2019-02-13T14:15:18",
"description": "I improved g4-tankresponse's doxygen (to comply with ticket #1309). This has never made it to the documentation page (http://software.icecube.wisc.edu/documentation/doxygen) because Geant4 does not seem to be installed in the builder.",
"reporter": "jgonzalez",
"cc": "",
"resolution": "worksforme",
"_ts": "1550067318169976",
"component": "infrastructure",
"summary": "Documentation builder has no Geant4",
"priority": "minor",
"keywords": "",
"time": "2017-01-19T15:13:16",
"milestone": "",
"owner": "nega",
"type": "defect"
}
```
|
defect
|
documentation builder has no trac migrated from json status closed changetime description i improved tankresponse s doxygen to comply with ticket this has never made it to the documentation page because does not seem to be installed in the builder reporter jgonzalez cc resolution worksforme ts component infrastructure summary documentation builder has no priority minor keywords time milestone owner nega type defect
| 1
|
71,077
| 13,612,445,750
|
IssuesEvent
|
2020-09-23 10:18:20
|
joomla/joomla-cms
|
https://api.github.com/repos/joomla/joomla-cms
|
closed
|
[4.0] [Cassiopea] overwrited bootstrap `.table-sm` class
|
No Code Attached Yet
|
### What needs to be fixed
Boostrtap calss `.table-sm` introduce condensed table layout.
`cassiopea/scss/vendor/bootstrap/_table.scss` overwrites it by definition
```scss
.table {
th,
td {
padding: 8px;
```
### Why this should be fixed
Because it overwrite `$table-cell-padding` and `$table-cell-padding-sm` variables
### How would you fix it
Remove `padding: 8px;` and use instead `$table-cell-padding`, `$table-cell-padding-sm` variables
### Side Effects expected
None
|
1.0
|
[4.0] [Cassiopea] overwrited bootstrap `.table-sm` class - ### What needs to be fixed
Boostrtap calss `.table-sm` introduce condensed table layout.
`cassiopea/scss/vendor/bootstrap/_table.scss` overwrites it by definition
```scss
.table {
th,
td {
padding: 8px;
```
### Why this should be fixed
Because it overwrite `$table-cell-padding` and `$table-cell-padding-sm` variables
### How would you fix it
Remove `padding: 8px;` and use instead `$table-cell-padding`, `$table-cell-padding-sm` variables
### Side Effects expected
None
|
non_defect
|
overwrited bootstrap table sm class what needs to be fixed boostrtap calss table sm introduce condensed table layout cassiopea scss vendor bootstrap table scss overwrites it by definition scss table th td padding why this should be fixed because it overwrite table cell padding and table cell padding sm variables how would you fix it remove padding and use instead table cell padding table cell padding sm variables side effects expected none
| 0
|
156,282
| 5,966,603,250
|
IssuesEvent
|
2017-05-30 14:21:03
|
open-io/oio-sds
|
https://api.github.com/repos/open-io/oio-sds
|
opened
|
Improve meta1 repartition (slots, location mask)
|
enhancement language:python priority:2
|
The meta1 prefix mapping created by `openio directory bootstrap` ensure that all copies of a database land on different locations, but custom service pool options (slots, location mask) are not taken into account.
We must create a new [*strategy*](https://github.com/open-io/oio-sds/blob/4.0.0.b0/oio/directory/meta0.py#L225) (in addition to `find_services_random` and `find_services_less_bases`) that calls oio-proxy's load balancer and takes all options into account.
|
1.0
|
Improve meta1 repartition (slots, location mask) - The meta1 prefix mapping created by `openio directory bootstrap` ensure that all copies of a database land on different locations, but custom service pool options (slots, location mask) are not taken into account.
We must create a new [*strategy*](https://github.com/open-io/oio-sds/blob/4.0.0.b0/oio/directory/meta0.py#L225) (in addition to `find_services_random` and `find_services_less_bases`) that calls oio-proxy's load balancer and takes all options into account.
|
non_defect
|
improve repartition slots location mask the prefix mapping created by openio directory bootstrap ensure that all copies of a database land on different locations but custom service pool options slots location mask are not taken into account we must create a new in addition to find services random and find services less bases that calls oio proxy s load balancer and takes all options into account
| 0
|
17,016
| 2,966,632,205
|
IssuesEvent
|
2015-07-12 02:59:34
|
WildBamaBoy/minecraft-comes-alive
|
https://api.github.com/repos/WildBamaBoy/minecraft-comes-alive
|
closed
|
Odd villager Personality
|
defect
|
One villager in my village has an odd personality. it says "personality.none"
btw she is very nice :)

|
1.0
|
Odd villager Personality - One villager in my village has an odd personality. it says "personality.none"
btw she is very nice :)

|
defect
|
odd villager personality one villager in my village has an odd personality it says personality none btw she is very nice
| 1
|
2,013
| 3,250,181,779
|
IssuesEvent
|
2015-10-18 19:48:03
|
vispy/vispy
|
https://api.github.com/repos/vispy/vispy
|
opened
|
Resizing is slow on Ubuntu
|
type: performance
|
I have a rather odd issue and I'm wondering if it is specific to my configuration, or if others can reproduce it as well.
On my Ubuntu 14.04 64-bit laptop with a dedicated NVIDIA GPU, while the FPS is high with any VisPy canvas, *resizing* the window is quite sluggish (at the level of the window manager, Unity here). This means that the borders of the window are resized very slowly (a few FPS).
On this machine, the same problem occurs with all versions of VisPy, Python, all backends, all examples, etc. Resizing a PyQt window *without* a VisPy canvas is fast.
I cannot reproduce the problem at all on OS X or Windows.
Profiling results on Ubuntu with a trivial example (empty canvas):
```
67141 function calls (65521 primitive calls) in 10.613 seconds
Ordered by: cumulative time
List reduced from 1154 to 100 due to restriction <100>
ncalls tottime percall cumtime percall filename:lineno(function)
1 0.000 0.000 10.613 10.613 a.py:2(<module>)
1 0.000 0.000 10.203 10.203 _default_app.py:57(run)
1 0.000 0.000 10.203 10.203 application.py:106(run)
1 0.000 0.000 10.203 10.203 _qt.py:212(_vispy_run)
1 8.132 8.132 10.203 10.203 {built-in method exec_}
262/166 0.003 0.000 2.069 0.012 event.py:391(__call__)
381 0.000 0.000 2.062 0.005 event.py:446(_invoke_callback)
95 0.001 0.000 2.032 0.021 _qt.py:626(paintGL)
95 0.000 0.000 1.477 0.016 canvas.py:409(swap_buffers)
95 0.000 0.000 1.477 0.016 _qt.py:610(_vispy_swap_buffers)
95 1.477 0.016 1.477 0.016 {built-in method swapBuffers}
95 0.000 0.000 0.535 0.006 context.py:159(flush_commands)
190 0.000 0.000 0.533 0.003 glir.py:443(parse)
285 0.001 0.000 0.533 0.002 glir.py:376(_parse)
95 0.000 0.000 0.532 0.006 glir.py:228(flush)
95 0.000 0.000 0.532 0.006 glir.py:139(flush)
95 0.529 0.006 0.529 0.006 _gl2.py:166(glClear)
1 0.000 0.000 0.238 0.238 canvas.py:110(__init__)
96 0.000 0.000 0.165 0.002 canvas.py:398(set_current)
96 0.000 0.000 0.164 0.002 _qt.py:604(_vispy_set_current)
96 0.164 0.002 0.164 0.002 {built-in method makeCurrent}
2 0.001 0.001 0.110 0.055 __init__.py:7(<module>)
1 0.000 0.000 0.097 0.097 __init__.py:18(<module>)
1 0.002 0.002 0.082 0.082 logs.py:5(<module>)
1 0.000 0.000 0.069 0.069 canvas.py:211(create_native)
6 0.007 0.001 0.065 0.011 __init__.py:1(<module>)
2 0.057 0.029 0.057 0.029 _qt.py:222(_vispy_get_native_app)
1 0.000 0.000 0.057 0.057 application.py:138(native)
1 0.001 0.001 0.050 0.050 __init__.py:106(<module>)
```
Any ideas? Anyone else observes this?
|
True
|
Resizing is slow on Ubuntu - I have a rather odd issue and I'm wondering if it is specific to my configuration, or if others can reproduce it as well.
On my Ubuntu 14.04 64-bit laptop with a dedicated NVIDIA GPU, while the FPS is high with any VisPy canvas, *resizing* the window is quite sluggish (at the level of the window manager, Unity here). This means that the borders of the window are resized very slowly (a few FPS).
On this machine, the same problem occurs with all versions of VisPy, Python, all backends, all examples, etc. Resizing a PyQt window *without* a VisPy canvas is fast.
I cannot reproduce the problem at all on OS X or Windows.
Profiling results on Ubuntu with a trivial example (empty canvas):
```
67141 function calls (65521 primitive calls) in 10.613 seconds
Ordered by: cumulative time
List reduced from 1154 to 100 due to restriction <100>
ncalls tottime percall cumtime percall filename:lineno(function)
1 0.000 0.000 10.613 10.613 a.py:2(<module>)
1 0.000 0.000 10.203 10.203 _default_app.py:57(run)
1 0.000 0.000 10.203 10.203 application.py:106(run)
1 0.000 0.000 10.203 10.203 _qt.py:212(_vispy_run)
1 8.132 8.132 10.203 10.203 {built-in method exec_}
262/166 0.003 0.000 2.069 0.012 event.py:391(__call__)
381 0.000 0.000 2.062 0.005 event.py:446(_invoke_callback)
95 0.001 0.000 2.032 0.021 _qt.py:626(paintGL)
95 0.000 0.000 1.477 0.016 canvas.py:409(swap_buffers)
95 0.000 0.000 1.477 0.016 _qt.py:610(_vispy_swap_buffers)
95 1.477 0.016 1.477 0.016 {built-in method swapBuffers}
95 0.000 0.000 0.535 0.006 context.py:159(flush_commands)
190 0.000 0.000 0.533 0.003 glir.py:443(parse)
285 0.001 0.000 0.533 0.002 glir.py:376(_parse)
95 0.000 0.000 0.532 0.006 glir.py:228(flush)
95 0.000 0.000 0.532 0.006 glir.py:139(flush)
95 0.529 0.006 0.529 0.006 _gl2.py:166(glClear)
1 0.000 0.000 0.238 0.238 canvas.py:110(__init__)
96 0.000 0.000 0.165 0.002 canvas.py:398(set_current)
96 0.000 0.000 0.164 0.002 _qt.py:604(_vispy_set_current)
96 0.164 0.002 0.164 0.002 {built-in method makeCurrent}
2 0.001 0.001 0.110 0.055 __init__.py:7(<module>)
1 0.000 0.000 0.097 0.097 __init__.py:18(<module>)
1 0.002 0.002 0.082 0.082 logs.py:5(<module>)
1 0.000 0.000 0.069 0.069 canvas.py:211(create_native)
6 0.007 0.001 0.065 0.011 __init__.py:1(<module>)
2 0.057 0.029 0.057 0.029 _qt.py:222(_vispy_get_native_app)
1 0.000 0.000 0.057 0.057 application.py:138(native)
1 0.001 0.001 0.050 0.050 __init__.py:106(<module>)
```
Any ideas? Anyone else observes this?
|
non_defect
|
resizing is slow on ubuntu i have a rather odd issue and i m wondering if it is specific to my configuration or if others can reproduce it as well on my ubuntu bit laptop with a dedicated nvidia gpu while the fps is high with any vispy canvas resizing the window is quite sluggish at the level of the window manager unity here this means that the borders of the window are resized very slowly a few fps on this machine the same problem occurs with all versions of vispy python all backends all examples etc resizing a pyqt window without a vispy canvas is fast i cannot reproduce the problem at all on os x or windows profiling results on ubuntu with a trivial example empty canvas function calls primitive calls in seconds ordered by cumulative time list reduced from to due to restriction ncalls tottime percall cumtime percall filename lineno function a py default app py run application py run qt py vispy run built in method exec event py call event py invoke callback qt py paintgl canvas py swap buffers qt py vispy swap buffers built in method swapbuffers context py flush commands glir py parse glir py parse glir py flush glir py flush py glclear canvas py init canvas py set current qt py vispy set current built in method makecurrent init py init py logs py canvas py create native init py qt py vispy get native app application py native init py any ideas anyone else observes this
| 0
|
70,923
| 13,552,572,310
|
IssuesEvent
|
2020-09-17 12:47:35
|
joomla/joomla-cms
|
https://api.github.com/repos/joomla/joomla-cms
|
closed
|
Jommlas 3.9.21 [com_fields] Contact-Mail Custom field issue after joomla 3.8.3
|
No Code Attached Yet
|
### Steps to reproduce the issue
Have the same problem as nader24 in #20195 now in Joomla 3.9.21 PHP 7.3
I had 2 contacts on my page and i made 2 different catagory for mail-custom-fields and made also different custom field for each catagory and contact it. I never tried in former versions, but in 3.9.21 it doesn't work. If i select the category in the fields nopes is shown. If i select *all in category or Main Contact its showing on both contact-forms.
### Expected result
All solutions i found under #20195 are now in code for 3.9.21. Hope somebody have an idea?
### Actual result
### System information (as much as possible)
Joomla 3.9.21 PHP 7.3.13
### Additional comments
|
1.0
|
Jommlas 3.9.21 [com_fields] Contact-Mail Custom field issue after joomla 3.8.3 - ### Steps to reproduce the issue
Have the same problem as nader24 in #20195 now in Joomla 3.9.21 PHP 7.3
I had 2 contacts on my page and i made 2 different catagory for mail-custom-fields and made also different custom field for each catagory and contact it. I never tried in former versions, but in 3.9.21 it doesn't work. If i select the category in the fields nopes is shown. If i select *all in category or Main Contact its showing on both contact-forms.
### Expected result
All solutions i found under #20195 are now in code for 3.9.21. Hope somebody have an idea?
### Actual result
### System information (as much as possible)
Joomla 3.9.21 PHP 7.3.13
### Additional comments
|
non_defect
|
jommlas contact mail custom field issue after joomla steps to reproduce the issue have the same problem as in now in joomla php i had contacts on my page and i made different catagory for mail custom fields and made also different custom field for each catagory and contact it i never tried in former versions but in it doesn t work if i select the category in the fields nopes is shown if i select all in category or main contact its showing on both contact forms expected result all solutions i found under are now in code for hope somebody have an idea actual result system information as much as possible joomla php additional comments
| 0
|
330,190
| 24,249,952,523
|
IssuesEvent
|
2022-09-27 13:32:55
|
karelklima/ldkit
|
https://api.github.com/repos/karelklima/ldkit
|
closed
|
Document creating a schema
|
documentation
|
Include:
- [ ] Basic principles
- [ ] Shortcuts
- [ ] Simple properties
- [ ] Array / non-array properties
- [ ] Multilang properties
- [ ] Subschemas
- [ ] Schema composition and reusability
|
1.0
|
Document creating a schema - Include:
- [ ] Basic principles
- [ ] Shortcuts
- [ ] Simple properties
- [ ] Array / non-array properties
- [ ] Multilang properties
- [ ] Subschemas
- [ ] Schema composition and reusability
|
non_defect
|
document creating a schema include basic principles shortcuts simple properties array non array properties multilang properties subschemas schema composition and reusability
| 0
|
44,396
| 12,130,738,698
|
IssuesEvent
|
2020-04-23 02:29:25
|
hazelcast/hazelcast
|
https://api.github.com/repos/hazelcast/hazelcast
|
closed
|
java.lang.IllegalStateException: Unknown protocol: CP2
|
Source: Community Team: Client Type: Defect
|
<!--
Thanks for reporting your issue. Please share with us the following information, to help us resolve your issue quickly and efficiently.
-->
**Describe the bug**
Get error when using JHiptser with Hazelcast
java.lang.IllegalStateException: Unknown protocol: CP2
**Expected behavior**
**To Reproduce**
**Additional context**
<!--
Add any other context about the problem here.
Common details that we're often interested in:
- Detailed description of the steps to reproduce your issue
- Logs and stack traces, if available
- Hazelcast version that you use (e.g. 3.4, also specify whether it is a minor release or the latest snapshot)
- If available, integration module versions (e.g. Tomcat, Jetty, Spring, Hibernate). Also, include their detailed configuration information such as web.xml, Hibernate configuration and `context.xml` for Spring
- Cluster size, i.e. the number of Hazelcast cluster members
- Number of the clients
- Version of Java. It is also helpful to mention the JVM parameters
- Operating system. If it is Linux, kernel version is helpful
- Unit test with the `hazelcast.xml` file. If you could include a unit test which reproduces your issue, we would be grateful
-->
|
1.0
|
java.lang.IllegalStateException: Unknown protocol: CP2 - <!--
Thanks for reporting your issue. Please share with us the following information, to help us resolve your issue quickly and efficiently.
-->
**Describe the bug**
Get error when using JHiptser with Hazelcast
java.lang.IllegalStateException: Unknown protocol: CP2
**Expected behavior**
**To Reproduce**
**Additional context**
<!--
Add any other context about the problem here.
Common details that we're often interested in:
- Detailed description of the steps to reproduce your issue
- Logs and stack traces, if available
- Hazelcast version that you use (e.g. 3.4, also specify whether it is a minor release or the latest snapshot)
- If available, integration module versions (e.g. Tomcat, Jetty, Spring, Hibernate). Also, include their detailed configuration information such as web.xml, Hibernate configuration and `context.xml` for Spring
- Cluster size, i.e. the number of Hazelcast cluster members
- Number of the clients
- Version of Java. It is also helpful to mention the JVM parameters
- Operating system. If it is Linux, kernel version is helpful
- Unit test with the `hazelcast.xml` file. If you could include a unit test which reproduces your issue, we would be grateful
-->
|
defect
|
java lang illegalstateexception unknown protocol thanks for reporting your issue please share with us the following information to help us resolve your issue quickly and efficiently describe the bug get error when using jhiptser with hazelcast java lang illegalstateexception unknown protocol expected behavior to reproduce additional context add any other context about the problem here common details that we re often interested in detailed description of the steps to reproduce your issue logs and stack traces if available hazelcast version that you use e g also specify whether it is a minor release or the latest snapshot if available integration module versions e g tomcat jetty spring hibernate also include their detailed configuration information such as web xml hibernate configuration and context xml for spring cluster size i e the number of hazelcast cluster members number of the clients version of java it is also helpful to mention the jvm parameters operating system if it is linux kernel version is helpful unit test with the hazelcast xml file if you could include a unit test which reproduces your issue we would be grateful
| 1
|
36,581
| 8,013,921,538
|
IssuesEvent
|
2018-07-25 03:16:27
|
networkx/networkx
|
https://api.github.com/repos/networkx/networkx
|
closed
|
from_numpy_matrix creates edges with numpy datatypes
|
Defect
|
The function `from_numpy_matrix` creates graphs where some nodes in the edge tuples have numpy datatypes.
>>> G = nx.cycle_graph(4)
>>> A = nx.adj_matrix(G).todense()
>>> H = nx.from_numpy_matrix(A)
>>> [(type(x), type(y)) for x, y in H.edges()]
[(<class 'int'>, <class 'numpy.int64'>), (<class 'int'>, <class 'numpy.int64'>), (<class 'int'>, <class 'numpy.int64'>), (<class 'int'>, <class 'numpy.int64'>)]
This can cause problems when trying to serialize a graph. For example:
>>> import json
>>> json.dumps(nx.json_graph.node_link_data(H))
TypeError: Object of type 'int64' is not JSON serializable
|
1.0
|
from_numpy_matrix creates edges with numpy datatypes - The function `from_numpy_matrix` creates graphs where some nodes in the edge tuples have numpy datatypes.
>>> G = nx.cycle_graph(4)
>>> A = nx.adj_matrix(G).todense()
>>> H = nx.from_numpy_matrix(A)
>>> [(type(x), type(y)) for x, y in H.edges()]
[(<class 'int'>, <class 'numpy.int64'>), (<class 'int'>, <class 'numpy.int64'>), (<class 'int'>, <class 'numpy.int64'>), (<class 'int'>, <class 'numpy.int64'>)]
This can cause problems when trying to serialize a graph. For example:
>>> import json
>>> json.dumps(nx.json_graph.node_link_data(H))
TypeError: Object of type 'int64' is not JSON serializable
|
defect
|
from numpy matrix creates edges with numpy datatypes the function from numpy matrix creates graphs where some nodes in the edge tuples have numpy datatypes g nx cycle graph a nx adj matrix g todense h nx from numpy matrix a this can cause problems when trying to serialize a graph for example import json json dumps nx json graph node link data h typeerror object of type is not json serializable
| 1
|
161,407
| 20,153,970,631
|
IssuesEvent
|
2022-02-09 14:55:26
|
kapseliboi/SCEditor
|
https://api.github.com/repos/kapseliboi/SCEditor
|
opened
|
CVE-2020-11023 (Medium) detected in jquery-1.11.1.js
|
security vulnerability
|
## CVE-2020-11023 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.11.1.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.js</a></p>
<p>Path to dependency file: /tests/unit/index.html</p>
<p>Path to vulnerable library: /tests/unit/../libs/jquery-1.11.1.js,/tests/manual/memory/../../libs/jquery-1.11.1.js,/tests/manual/valuechanged/../../libs/jquery-1.11.1.js,/tests/manual/events/../../libs/jquery-1.11.1.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.11.1.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/kapseliboi/SCEditor/commit/349abe74570a5c41c7fa17001f4c379cd1ebd98f">349abe74570a5c41c7fa17001f4c379cd1ebd98f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440">https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2020-11023 (Medium) detected in jquery-1.11.1.js - ## CVE-2020-11023 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.11.1.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.js</a></p>
<p>Path to dependency file: /tests/unit/index.html</p>
<p>Path to vulnerable library: /tests/unit/../libs/jquery-1.11.1.js,/tests/manual/memory/../../libs/jquery-1.11.1.js,/tests/manual/valuechanged/../../libs/jquery-1.11.1.js,/tests/manual/events/../../libs/jquery-1.11.1.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.11.1.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/kapseliboi/SCEditor/commit/349abe74570a5c41c7fa17001f4c379cd1ebd98f">349abe74570a5c41c7fa17001f4c379cd1ebd98f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440">https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve medium detected in jquery js cve medium severity vulnerability vulnerable library jquery js javascript library for dom operations library home page a href path to dependency file tests unit index html path to vulnerable library tests unit libs jquery js tests manual memory libs jquery js tests manual valuechanged libs jquery js tests manual events libs jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery jquery rails step up your open source security game with whitesource
| 0
|
39,663
| 9,605,920,399
|
IssuesEvent
|
2019-05-11 05:05:14
|
hdbn/runfinder
|
https://api.github.com/repos/hdbn/runfinder
|
closed
|
The length of the last runs is wrong
|
Priority-Medium Type-Defect auto-migrated
|
```
What steps will reproduce the problem?
1. Compile and run the attached file.
What is the expected output? What do you see instead?
Expected:
Runs in abbbabb
1, 3, 1
5, 6, 1
Actual:
Runs in abbbabb
1, 3, 1
5, 7, 1
What version of the product are you using? On what operating system?
Visual C++ 2010
Please provide any additional information below.
The length of runs at the end of the input string seem to be mismeasured.
```
Original issue reported on code.google.com by `kusano.a...@gmail.com` on 7 Nov 2012 at 5:44
Attachments:
- [test.cpp](https://storage.googleapis.com/google-code-attachments/runfinder/issue-2/comment-0/test.cpp)
|
1.0
|
The length of the last runs is wrong - ```
What steps will reproduce the problem?
1. Compile and run the attached file.
What is the expected output? What do you see instead?
Expected:
Runs in abbbabb
1, 3, 1
5, 6, 1
Actual:
Runs in abbbabb
1, 3, 1
5, 7, 1
What version of the product are you using? On what operating system?
Visual C++ 2010
Please provide any additional information below.
The length of runs at the end of the input string seem to be mismeasured.
```
Original issue reported on code.google.com by `kusano.a...@gmail.com` on 7 Nov 2012 at 5:44
Attachments:
- [test.cpp](https://storage.googleapis.com/google-code-attachments/runfinder/issue-2/comment-0/test.cpp)
|
defect
|
the length of the last runs is wrong what steps will reproduce the problem compile and run the attached file what is the expected output what do you see instead expected runs in abbbabb actual runs in abbbabb what version of the product are you using on what operating system visual c please provide any additional information below the length of runs at the end of the input string seem to be mismeasured original issue reported on code google com by kusano a gmail com on nov at attachments
| 1
|
15,774
| 2,869,066,349
|
IssuesEvent
|
2015-06-05 23:03:35
|
dart-lang/sdk
|
https://api.github.com/repos/dart-lang/sdk
|
closed
|
CSS linked in entry page header moved into content by pub build
|
Area-Pkg Pkg-Polymer PolymerMilestone-Next Priority-Low Triaged Type-Defect
|
*This issue was originally filed by @zoechi*
_____
**What steps will reproduce the problem?**
**1.**
This site already worked in JS and still works in Dartium.
I run pub build and checked the result.
see:
http://erikgrimes.github.io/polymer_elements/build_ui/polymer_ui_splitter.html
source
https://github.com/ErikGrimes/polymer_ui_elements/blob/master/example/polymer_ui_splitter.html
(I removed the two CSS links with <!-- TODO remove --> but the same problem before and after, they will be removed from linked source when I push anyway)
The content of the linked polymer_flex_layout.css is put as content after the first </polymer-ui-splitter> tag in the pody.
**2.**
**3.**
**What is the expected output? What do you see instead?**
**What version of the product are you using? On what operating system?**
Dart VM version: 1.2.0-dev.5.15 (Mon Feb 24 02:23:39 2014) on "linux_x64"
**Please provide any additional information below.**
|
1.0
|
CSS linked in entry page header moved into content by pub build - *This issue was originally filed by @zoechi*
_____
**What steps will reproduce the problem?**
**1.**
This site already worked in JS and still works in Dartium.
I run pub build and checked the result.
see:
http://erikgrimes.github.io/polymer_elements/build_ui/polymer_ui_splitter.html
source
https://github.com/ErikGrimes/polymer_ui_elements/blob/master/example/polymer_ui_splitter.html
(I removed the two CSS links with <!-- TODO remove --> but the same problem before and after, they will be removed from linked source when I push anyway)
The content of the linked polymer_flex_layout.css is put as content after the first </polymer-ui-splitter> tag in the pody.
**2.**
**3.**
**What is the expected output? What do you see instead?**
**What version of the product are you using? On what operating system?**
Dart VM version: 1.2.0-dev.5.15 (Mon Feb 24 02:23:39 2014) on "linux_x64"
**Please provide any additional information below.**
|
defect
|
css linked in entry page header moved into content by pub build this issue was originally filed by zoechi what steps will reproduce the problem this site already worked in js and still works in dartium i run pub build and checked the result see source i removed the two css links with lt todo remove gt but the same problem before and after they will be removed from linked source when i push anyway the content of the linked polymer flex layout css is put as content after the first lt polymer ui splitter gt tag in the pody what is the expected output what do you see instead what version of the product are you using on what operating system dart vm version dev mon feb on quot linux quot please provide any additional information below
| 1
|
177,930
| 6,588,623,889
|
IssuesEvent
|
2017-09-14 04:33:47
|
opencurrents/opencurrents
|
https://api.github.com/repos/opencurrents/opencurrents
|
opened
|
Profile: Discrepancy mobile and web.
|
mvp priority high priority medium
|
Note that redeem Currents button is nonexistent in mobile at the moment.
|
2.0
|
Profile: Discrepancy mobile and web. - Note that redeem Currents button is nonexistent in mobile at the moment.
|
non_defect
|
profile discrepancy mobile and web note that redeem currents button is nonexistent in mobile at the moment
| 0
|
217,924
| 24,351,672,354
|
IssuesEvent
|
2022-10-03 01:08:13
|
gavarasana/conference-demo
|
https://api.github.com/repos/gavarasana/conference-demo
|
opened
|
CVE-2022-42004 (Medium) detected in jackson-databind-2.11.2.jar
|
security vulnerability
|
## CVE-2022-42004 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.11.2.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.11.2/jackson-databind-2.11.2.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.3.3.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.3.3.RELEASE.jar
- :x: **jackson-databind-2.11.2.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
<p>Publish Date: 2022-10-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42004>CVE-2022-42004</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-10-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.13.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2022-42004 (Medium) detected in jackson-databind-2.11.2.jar - ## CVE-2022-42004 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.11.2.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.11.2/jackson-databind-2.11.2.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.3.3.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.3.3.RELEASE.jar
- :x: **jackson-databind-2.11.2.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
<p>Publish Date: 2022-10-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-42004>CVE-2022-42004</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-10-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.13.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve medium detected in jackson databind jar cve medium severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in base branch master vulnerability details in fasterxml jackson databind before resource exhaustion can occur because of a lack of a check in beandeserializer deserializefromarray to prevent use of deeply nested arrays an application is vulnerable only with certain customized choices for deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with mend
| 0
|
12,949
| 2,731,065,099
|
IssuesEvent
|
2015-04-16 18:11:30
|
sba1/bio-ontology-zp
|
https://api.github.com/repos/sba1/bio-ontology-zp
|
closed
|
ZP IDs not preserved?
|
auto-migrated Priority-Medium Type-Defect
|
```
I thought ZPs should be consistent between releases?
http://monarch.monarchinitiative.org/genotype/MONARCH:ZDB-GENO-960809-7_ZDB-GENE
-050913-84_ZDB-MRPHLNO-130411-1_
clicking the first one 'abnormal(ly) edematous pericardium'
Takes us to
http://monarch.monarchinitiative.org/phenotype/ZP:0000027
"abnormal(ly) quality hindbrain"
We're reloading the ontologies hopefully everything should be in sync after
that.
Maybe we should use MD5s in future.
```
Original issue reported on code.google.com by `cmung...@gmail.com` on 4 Apr 2014 at 9:30
|
1.0
|
ZP IDs not preserved? - ```
I thought ZPs should be consistent between releases?
http://monarch.monarchinitiative.org/genotype/MONARCH:ZDB-GENO-960809-7_ZDB-GENE
-050913-84_ZDB-MRPHLNO-130411-1_
clicking the first one 'abnormal(ly) edematous pericardium'
Takes us to
http://monarch.monarchinitiative.org/phenotype/ZP:0000027
"abnormal(ly) quality hindbrain"
We're reloading the ontologies hopefully everything should be in sync after
that.
Maybe we should use MD5s in future.
```
Original issue reported on code.google.com by `cmung...@gmail.com` on 4 Apr 2014 at 9:30
|
defect
|
zp ids not preserved i thought zps should be consistent between releases zdb mrphlno clicking the first one abnormal ly edematous pericardium takes us to abnormal ly quality hindbrain we re reloading the ontologies hopefully everything should be in sync after that maybe we should use in future original issue reported on code google com by cmung gmail com on apr at
| 1
|
3,275
| 6,224,322,439
|
IssuesEvent
|
2017-07-10 14:02:01
|
osteele/liquid
|
https://api.github.com/repos/osteele/liquid
|
closed
|
Add string escapes?
|
compatibility research
|
Does Liquid handle e.g. `"a\"b\\c"` and `'a\'b\\c'`? If so, implement them.
Does Liquid handle newline, unicode and other escapes? If so, implement those too.
The lexer could use JSON.Unmarshall on strings that contain `\\`
|
True
|
Add string escapes? - Does Liquid handle e.g. `"a\"b\\c"` and `'a\'b\\c'`? If so, implement them.
Does Liquid handle newline, unicode and other escapes? If so, implement those too.
The lexer could use JSON.Unmarshall on strings that contain `\\`
|
non_defect
|
add string escapes does liquid handle e g a b c and a b c if so implement them does liquid handle newline unicode and other escapes if so implement those too the lexer could use json unmarshall on strings that contain
| 0
|
116,533
| 4,703,302,644
|
IssuesEvent
|
2016-10-13 07:26:05
|
kubernetes/kubernetes
|
https://api.github.com/repos/kubernetes/kubernetes
|
closed
|
[k8s.io] [Feature:Example] [k8s.io] CassandraPetSet should create petset {Kubernetes e2e suite}
|
kind/flake priority/P0
|
https://k8s-gubernator.appspot.com/build/kubernetes-jenkins/logs/kubernetes-e2e-gce-examples/15253/
Failed: [k8s.io] [Feature:Example] [k8s.io] CassandraPetSet should create petset {Kubernetes e2e suite}
```
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/examples.go:316
Expected error:
<*errors.errorString | 0xc82048ab50>: {
s: "timed out waiting for the condition",
}
timed out waiting for the condition
not to have occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/examples.go:304
```
|
1.0
|
[k8s.io] [Feature:Example] [k8s.io] CassandraPetSet should create petset {Kubernetes e2e suite} - https://k8s-gubernator.appspot.com/build/kubernetes-jenkins/logs/kubernetes-e2e-gce-examples/15253/
Failed: [k8s.io] [Feature:Example] [k8s.io] CassandraPetSet should create petset {Kubernetes e2e suite}
```
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/examples.go:316
Expected error:
<*errors.errorString | 0xc82048ab50>: {
s: "timed out waiting for the condition",
}
timed out waiting for the condition
not to have occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/examples.go:304
```
|
non_defect
|
cassandrapetset should create petset kubernetes suite failed cassandrapetset should create petset kubernetes suite go src io kubernetes output dockerized go src io kubernetes test examples go expected error s timed out waiting for the condition timed out waiting for the condition not to have occurred go src io kubernetes output dockerized go src io kubernetes test examples go
| 0
|
13,689
| 10,020,748,233
|
IssuesEvent
|
2019-07-16 13:18:20
|
terraform-providers/terraform-provider-aws
|
https://api.github.com/repos/terraform-providers/terraform-provider-aws
|
closed
|
resource aws_autoscaling_lifecycle_hook doesn't support import
|
enhancement needs-triage service/autoscaling service/lambda
|
<!---
Please note the following potential times when an issue might be in Terraform core:
* [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues
* [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues
* [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues
* [Registry](https://registry.terraform.io/) issues
* Spans resources across multiple providers
If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead.
--->
<!--- Please keep this note for the community --->
### Community Note
* Please vote on this issue by adding a ๐ [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request
* Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
<!--- Thank you for keeping this note for the community --->
### Terraform Version
0.11.13
<!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). --->
### Affected Resource(s)
* aws_autoscaling_lifecycle_hook
* aws_lambda_permission
<!--- Please list the affected resources and data sources. --->
### Terraform Configuration Files
<!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code --->
```hcl
# Copy-paste your Terraform configurations here - for large Terraform configs,
# please use a service like Dropbox and share a link to the ZIP file. For
# security, you can also encrypt the files using our GPG public key: https://keybase.io/hashicorp
```
### Debug Output
<!---
Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist.
To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html).
--->
### Panic Output
<!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. --->
### Expected Behavior
<!--- What should have happened? --->
Resources should be able importable
### Actual Behavior
<!--- What actually happened? --->
### Steps to Reproduce
<!--- Please list the steps required to reproduce the issue. --->
1. `terraform apply`
### Important Factoids
<!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? --->
### References
<!---
Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests
Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example:
--->
|
2.0
|
resource aws_autoscaling_lifecycle_hook doesn't support import - <!---
Please note the following potential times when an issue might be in Terraform core:
* [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues
* [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues
* [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues
* [Registry](https://registry.terraform.io/) issues
* Spans resources across multiple providers
If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead.
--->
<!--- Please keep this note for the community --->
### Community Note
* Please vote on this issue by adding a ๐ [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request
* Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
<!--- Thank you for keeping this note for the community --->
### Terraform Version
0.11.13
<!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). --->
### Affected Resource(s)
* aws_autoscaling_lifecycle_hook
* aws_lambda_permission
<!--- Please list the affected resources and data sources. --->
### Terraform Configuration Files
<!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code --->
```hcl
# Copy-paste your Terraform configurations here - for large Terraform configs,
# please use a service like Dropbox and share a link to the ZIP file. For
# security, you can also encrypt the files using our GPG public key: https://keybase.io/hashicorp
```
### Debug Output
<!---
Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist.
To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html).
--->
### Panic Output
<!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. --->
### Expected Behavior
<!--- What should have happened? --->
Resources should be able importable
### Actual Behavior
<!--- What actually happened? --->
### Steps to Reproduce
<!--- Please list the steps required to reproduce the issue. --->
1. `terraform apply`
### Important Factoids
<!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? --->
### References
<!---
Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests
Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example:
--->
|
non_defect
|
resource aws autoscaling lifecycle hook doesn t support import please note the following potential times when an issue might be in terraform core or resource ordering issues and issues issues issues spans resources across multiple providers if you are running into one of these scenarios we recommend opening an issue in the instead community note please vote on this issue by adding a ๐ to the original issue to help the community and maintainers prioritize this request please do not leave or me too comments they generate extra noise for issue followers and do not help prioritize the request if you are interested in working on this issue or have submitted a pull request please leave a comment terraform version affected resource s aws autoscaling lifecycle hook aws lambda permission terraform configuration files hcl copy paste your terraform configurations here for large terraform configs please use a service like dropbox and share a link to the zip file for security you can also encrypt the files using our gpg public key debug output please provide a link to a github gist containing the complete debug output please do not paste the debug output in the issue just paste a link to the gist to obtain the debug output see the panic output expected behavior resources should be able importable actual behavior steps to reproduce terraform apply important factoids references information about referencing github issues are there any other github issues open or closed or pull requests that should be linked here vendor documentation for example
| 0
|
79,204
| 28,037,768,595
|
IssuesEvent
|
2023-03-28 16:10:27
|
zed-industries/community
|
https://api.github.com/repos/zed-industries/community
|
closed
|
Fail to download Python Language Server
|
defect python language
|
### Check for existing issues
- [X] Completed
### Describe the bug / provide steps to reproduce it
When I open a python project, I get a message on the bottom of the zed page saying:
<img width="667" alt="image" src="https://user-images.githubusercontent.com/12228572/223278925-92149903-81e3-4bda-bf40-030d224dca89.png">
When I click on it, the error message is:
```
Language server error: Python
failed to execute npm info:
stdout: "\nUsage: npm <command>\n\nwhere <command> is one of:\n access, adduser, audit, bin, bugs, c, cache, ci, cit,\n clean-install, clean-install-test, completion, config,\n create, ddp, dedupe, deprecate, dist-tag, docs, doctor,\n edit, explore, get, help, help-search, hook, i, init,\n install, install-ci-test, install-test, it, link, list, ln,\n login, logout, ls, org, outdated, owner, pack, ping, prefix,\n profile, prune, publish, rb, rebuild, repo, restart, root,\n run, run-script, s, se, search, set, shrinkwrap, star,\n stars, start, stop, t, team, test, token, tst, un,\n uninstall, unpublish, unstar, up, update, v, version, view,\n whoami\n\nnpm <command> -h quick help on <command>\nnpm -l display full usage info\nnpm help <term> search for help on <term>\nnpm help npm involved overview\n\nSpecify configs in the ini-formatted file:\n <$USER>/.npmrc\nor on the command line via: npm <command> --key value\nConfig info can be viewed via: npm help config\n\nnpm@6.9.0 /usr/local/lib/node_modules/npm\n\n"
stderr: ""
```
### Environment
Zed: v0.74.3 (stable)
OS: macOS 12.6.3
Memory: 16 GiB
Architecture: x86_64
### If applicable, add mockups / screenshots to help explain present your vision of the feature
_No response_
### If applicable, attach your `~/Library/Logs/Zed/Zed.log` file to this issue.
If you only need the most recent lines, you can run the `zed: open log` command palette action to see the last 1000.
Paths sanitized where applicable:
```
2023-03-06T23:08:28 [INFO] ========== starting zed ==========
2023-03-06T23:08:29 [INFO] Opening main db
2023-03-06T23:08:29 [INFO] Opening main db
2023-03-06T23:08:30 [INFO] set environment variables from shell:/bin/zsh, path:<$USER>/anaconda3/condabin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/TeX/texbin:/Applications/Postgres.app/Contents/Versions/latest/bin
2023-03-06T23:08:47 [INFO] Opening main db
2023-03-06T23:09:35 [INFO] Opening main db
2023-03-06T23:11:26 [ERROR] no worktree found for diagnostics
2023-03-06T23:11:48 [INFO] open paths ["<PATH TO PROJECT FOLDER>"]
2023-03-06T23:12:01 [ERROR] no cached binary
2023-03-06T23:12:01 [ERROR] failed to execute npm info:
stdout: "\nUsage: npm <command>\n\nwhere <command> is one of:\n access, adduser, audit, bin, bugs, c, cache, ci, cit,\n clean-install, clean-install-test, completion, config,\n create, ddp, dedupe, deprecate, dist-tag, docs, doctor,\n edit, explore, get, help, help-search, hook, i, init,\n install, install-ci-test, install-test, it, link, list, ln,\n login, logout, ls, org, outdated, owner, pack, ping, prefix,\n profile, prune, publish, rb, rebuild, repo, restart, root,\n run, run-script, s, se, search, set, shrinkwrap, star,\n stars, start, stop, t, team, test, token, tst, un,\n uninstall, unpublish, unstar, up, update, v, version, view,\n whoami\n\nnpm <command> -h quick help on <command>\nnpm -l display full usage info\nnpm help <term> search for help on <term>\nnpm help npm involved overview\n\nSpecify configs in the ini-formatted file:\n <$USER>/.npmrc\nor on the command line via: npm <command> --key value\nConfig info can be viewed via: npm help config\n\nnpm@6.9.0 /usr/local/lib/node_modules/npm\n\n"
stderr: ""
```
|
1.0
|
Fail to download Python Language Server - ### Check for existing issues
- [X] Completed
### Describe the bug / provide steps to reproduce it
When I open a python project, I get a message on the bottom of the zed page saying:
<img width="667" alt="image" src="https://user-images.githubusercontent.com/12228572/223278925-92149903-81e3-4bda-bf40-030d224dca89.png">
When I click on it, the error message is:
```
Language server error: Python
failed to execute npm info:
stdout: "\nUsage: npm <command>\n\nwhere <command> is one of:\n access, adduser, audit, bin, bugs, c, cache, ci, cit,\n clean-install, clean-install-test, completion, config,\n create, ddp, dedupe, deprecate, dist-tag, docs, doctor,\n edit, explore, get, help, help-search, hook, i, init,\n install, install-ci-test, install-test, it, link, list, ln,\n login, logout, ls, org, outdated, owner, pack, ping, prefix,\n profile, prune, publish, rb, rebuild, repo, restart, root,\n run, run-script, s, se, search, set, shrinkwrap, star,\n stars, start, stop, t, team, test, token, tst, un,\n uninstall, unpublish, unstar, up, update, v, version, view,\n whoami\n\nnpm <command> -h quick help on <command>\nnpm -l display full usage info\nnpm help <term> search for help on <term>\nnpm help npm involved overview\n\nSpecify configs in the ini-formatted file:\n <$USER>/.npmrc\nor on the command line via: npm <command> --key value\nConfig info can be viewed via: npm help config\n\nnpm@6.9.0 /usr/local/lib/node_modules/npm\n\n"
stderr: ""
```
### Environment
Zed: v0.74.3 (stable)
OS: macOS 12.6.3
Memory: 16 GiB
Architecture: x86_64
### If applicable, add mockups / screenshots to help explain present your vision of the feature
_No response_
### If applicable, attach your `~/Library/Logs/Zed/Zed.log` file to this issue.
If you only need the most recent lines, you can run the `zed: open log` command palette action to see the last 1000.
Paths sanitized where applicable:
```
2023-03-06T23:08:28 [INFO] ========== starting zed ==========
2023-03-06T23:08:29 [INFO] Opening main db
2023-03-06T23:08:29 [INFO] Opening main db
2023-03-06T23:08:30 [INFO] set environment variables from shell:/bin/zsh, path:<$USER>/anaconda3/condabin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/TeX/texbin:/Applications/Postgres.app/Contents/Versions/latest/bin
2023-03-06T23:08:47 [INFO] Opening main db
2023-03-06T23:09:35 [INFO] Opening main db
2023-03-06T23:11:26 [ERROR] no worktree found for diagnostics
2023-03-06T23:11:48 [INFO] open paths ["<PATH TO PROJECT FOLDER>"]
2023-03-06T23:12:01 [ERROR] no cached binary
2023-03-06T23:12:01 [ERROR] failed to execute npm info:
stdout: "\nUsage: npm <command>\n\nwhere <command> is one of:\n access, adduser, audit, bin, bugs, c, cache, ci, cit,\n clean-install, clean-install-test, completion, config,\n create, ddp, dedupe, deprecate, dist-tag, docs, doctor,\n edit, explore, get, help, help-search, hook, i, init,\n install, install-ci-test, install-test, it, link, list, ln,\n login, logout, ls, org, outdated, owner, pack, ping, prefix,\n profile, prune, publish, rb, rebuild, repo, restart, root,\n run, run-script, s, se, search, set, shrinkwrap, star,\n stars, start, stop, t, team, test, token, tst, un,\n uninstall, unpublish, unstar, up, update, v, version, view,\n whoami\n\nnpm <command> -h quick help on <command>\nnpm -l display full usage info\nnpm help <term> search for help on <term>\nnpm help npm involved overview\n\nSpecify configs in the ini-formatted file:\n <$USER>/.npmrc\nor on the command line via: npm <command> --key value\nConfig info can be viewed via: npm help config\n\nnpm@6.9.0 /usr/local/lib/node_modules/npm\n\n"
stderr: ""
```
|
defect
|
fail to download python language server check for existing issues completed describe the bug provide steps to reproduce it when i open a python project i get a message on the bottom of the zed page saying img width alt image src when i click on it the error message is language server error python failed to execute npm info stdout nusage npm n nwhere is one of n access adduser audit bin bugs c cache ci cit n clean install clean install test completion config n create ddp dedupe deprecate dist tag docs doctor n edit explore get help help search hook i init n install install ci test install test it link list ln n login logout ls org outdated owner pack ping prefix n profile prune publish rb rebuild repo restart root n run run script s se search set shrinkwrap star n stars start stop t team test token tst un n uninstall unpublish unstar up update v version view n whoami n nnpm h quick help on nnpm l display full usage info nnpm help search for help on nnpm help npm involved overview n nspecify configs in the ini formatted file n npmrc nor on the command line via npm key value nconfig info can be viewed via npm help config n nnpm usr local lib node modules npm n n stderr environment zed stable os macos memory gib architecture if applicable add mockups screenshots to help explain present your vision of the feature no response if applicable attach your library logs zed zed log file to this issue if you only need the most recent lines you can run the zed open log command palette action to see the last paths sanitized where applicable starting zed opening main db opening main db set environment variables from shell bin zsh path condabin usr local bin usr bin bin usr sbin sbin library tex texbin applications postgres app contents versions latest bin opening main db opening main db no worktree found for diagnostics open paths no cached binary failed to execute npm info stdout nusage npm n nwhere is one of n access adduser audit bin bugs c cache ci cit n clean install clean install test completion config n create ddp dedupe deprecate dist tag docs doctor n edit explore get help help search hook i init n install install ci test install test it link list ln n login logout ls org outdated owner pack ping prefix n profile prune publish rb rebuild repo restart root n run run script s se search set shrinkwrap star n stars start stop t team test token tst un n uninstall unpublish unstar up update v version view n whoami n nnpm h quick help on nnpm l display full usage info nnpm help search for help on nnpm help npm involved overview n nspecify configs in the ini formatted file n npmrc nor on the command line via npm key value nconfig info can be viewed via npm help config n nnpm usr local lib node modules npm n n stderr
| 1
|
22,642
| 19,804,720,935
|
IssuesEvent
|
2022-01-19 04:32:50
|
Curtis-VL/OVRToolkit-Issues
|
https://api.github.com/repos/Curtis-VL/OVRToolkit-Issues
|
opened
|
Display Web API debug logs on the Custom Apps Debug page
|
usability
|
Display Web API debug logs on the Custom Apps Debug page.
|
True
|
Display Web API debug logs on the Custom Apps Debug page - Display Web API debug logs on the Custom Apps Debug page.
|
non_defect
|
display web api debug logs on the custom apps debug page display web api debug logs on the custom apps debug page
| 0
|
34,889
| 7,467,607,309
|
IssuesEvent
|
2018-04-02 15:55:32
|
radioactivecricket/PostNukeRP
|
https://api.github.com/repos/radioactivecricket/PostNukeRP
|
closed
|
[Bug] SAW Refurb
|
Priority-Medium Type-Defect auto-migrated
|
```
Unread postby [TBU] CrazyKid ยป Sat May 04, 2013 11:01 pm
Hi,
The SAW Refurb has an animation problem since the recent updates. It sticks out
of the player's character's center.
Screenshot: http://cloud.steampowered.com/ugc/57786 ... 380144D53/
Thanks,
CrazyKid
http://radioactivecricket.com/forums/viewtopic.php?f=15&t=1041
```
Original issue reported on code.google.com by `eldarst...@gmail.com` on 9 May 2013 at 6:12
|
1.0
|
[Bug] SAW Refurb - ```
Unread postby [TBU] CrazyKid ยป Sat May 04, 2013 11:01 pm
Hi,
The SAW Refurb has an animation problem since the recent updates. It sticks out
of the player's character's center.
Screenshot: http://cloud.steampowered.com/ugc/57786 ... 380144D53/
Thanks,
CrazyKid
http://radioactivecricket.com/forums/viewtopic.php?f=15&t=1041
```
Original issue reported on code.google.com by `eldarst...@gmail.com` on 9 May 2013 at 6:12
|
defect
|
saw refurb unread postby crazykid ยป sat may pm hi the saw refurb has an animation problem since the recent updates it sticks out of the player s character s center screenshot thanks crazykid original issue reported on code google com by eldarst gmail com on may at
| 1
|
9,058
| 2,615,126,203
|
IssuesEvent
|
2015-03-01 05:54:34
|
chrsmith/google-api-java-client
|
https://api.github.com/repos/chrsmith/google-api-java-client
|
closed
|
Document and fix com.google.api.services.calendar.CalendarRequest.setFields(String)
|
auto-migrated Priority-Medium Type-Defect
|
```
Version of google-api-java-client: All versions that I've seen of the Calendar
API.
I'm using google-api-services-calendar-v3-1.3.1-beta.jar.
Describe the problem.
There is no documentation for how to build a string that represents the fields
you want to retrieve. I've searched the internet for days.
The current documentation is useless. You may find it here:
http://javadoc.google-api-java-client.googlecode.com/hg/apis/calendar/v3/com/goo
gle/api/services/calendar/CalendarRequest.html#setFields(java.lang.String)
How would you expect it to be fixed?
Google needs to provide a mapping from
com.google.api.services.calendar.model.Event properties to the fields String.
As well as for all the other retrievable objects that you can specify fields
for.
In my experimentation, I've tried setting fields to "summary". You would think
that would limit the content of returned events to just the summary. Actually,
it prevents any events from being returned at all.
I'm flabbergasted at this omission. We all want to improve performance and
Google recommends using setFields to do it. So let us know how.
```
Original issue reported on code.google.com by `quantime...@cox.net` on 9 May 2012 at 11:55
|
1.0
|
Document and fix com.google.api.services.calendar.CalendarRequest.setFields(String) - ```
Version of google-api-java-client: All versions that I've seen of the Calendar
API.
I'm using google-api-services-calendar-v3-1.3.1-beta.jar.
Describe the problem.
There is no documentation for how to build a string that represents the fields
you want to retrieve. I've searched the internet for days.
The current documentation is useless. You may find it here:
http://javadoc.google-api-java-client.googlecode.com/hg/apis/calendar/v3/com/goo
gle/api/services/calendar/CalendarRequest.html#setFields(java.lang.String)
How would you expect it to be fixed?
Google needs to provide a mapping from
com.google.api.services.calendar.model.Event properties to the fields String.
As well as for all the other retrievable objects that you can specify fields
for.
In my experimentation, I've tried setting fields to "summary". You would think
that would limit the content of returned events to just the summary. Actually,
it prevents any events from being returned at all.
I'm flabbergasted at this omission. We all want to improve performance and
Google recommends using setFields to do it. So let us know how.
```
Original issue reported on code.google.com by `quantime...@cox.net` on 9 May 2012 at 11:55
|
defect
|
document and fix com google api services calendar calendarrequest setfields string version of google api java client all versions that i ve seen of the calendar api i m using google api services calendar beta jar describe the problem there is no documentation for how to build a string that represents the fields you want to retrieve i ve searched the internet for days the current documentation is useless you may find it here gle api services calendar calendarrequest html setfields java lang string how would you expect it to be fixed google needs to provide a mapping from com google api services calendar model event properties to the fields string as well as for all the other retrievable objects that you can specify fields for in my experimentation i ve tried setting fields to summary you would think that would limit the content of returned events to just the summary actually it prevents any events from being returned at all i m flabbergasted at this omission we all want to improve performance and google recommends using setfields to do it so let us know how original issue reported on code google com by quantime cox net on may at
| 1
|
10,846
| 2,622,193,029
|
IssuesEvent
|
2015-03-04 00:23:55
|
byzhang/cudpp
|
https://api.github.com/repos/byzhang/cudpp
|
closed
|
virtual memory exhausted: ๆ ๆณๅ้
ๅ
ๅญ
|
auto-migrated Priority-Medium Type-Defect
|
```
when i try to make the cudpp2.0 after set by Cmake,it failed at [ 22%] Building
NVCC (Device) object src/cudpp/./cudpp_generated_segmented_scan_app.cu.o
virtual memory exhausted: ๆ ๆณๅ้
ๅ
ๅญ
CMake Error at CMakeFiles/cudpp_generated_segmented_scan_app.cu.o.cmake:256
(message):
Error generating file
/root/cudppbuild/src/cudpp/./cudpp_generated_segmented_scan_app.cu.o
i don't know what is wrong with it,could you give some help?
```
Original issue reported on code.google.com by `huetfly_...@yahoo.com.cn` on 27 Nov 2011 at 7:25
* Merged into: #107
|
1.0
|
virtual memory exhausted: ๆ ๆณๅ้
ๅ
ๅญ - ```
when i try to make the cudpp2.0 after set by Cmake,it failed at [ 22%] Building
NVCC (Device) object src/cudpp/./cudpp_generated_segmented_scan_app.cu.o
virtual memory exhausted: ๆ ๆณๅ้
ๅ
ๅญ
CMake Error at CMakeFiles/cudpp_generated_segmented_scan_app.cu.o.cmake:256
(message):
Error generating file
/root/cudppbuild/src/cudpp/./cudpp_generated_segmented_scan_app.cu.o
i don't know what is wrong with it,could you give some help?
```
Original issue reported on code.google.com by `huetfly_...@yahoo.com.cn` on 27 Nov 2011 at 7:25
* Merged into: #107
|
defect
|
virtual memory exhausted ๆ ๆณๅ้
ๅ
ๅญ when i try to make the after set by cmake it failed at building nvcc device object src cudpp cudpp generated segmented scan app cu o virtual memory exhausted ๆ ๆณๅ้
ๅ
ๅญ cmake error at cmakefiles cudpp generated segmented scan app cu o cmake message error generating file root cudppbuild src cudpp cudpp generated segmented scan app cu o i don t know what is wrong with it could you give some help original issue reported on code google com by huetfly yahoo com cn on nov at merged into
| 1
|
481,909
| 13,893,789,784
|
IssuesEvent
|
2020-10-19 13:56:46
|
bryntum/support
|
https://api.github.com/repos/bryntum/support
|
closed
|
ExtJS Scheduler demo: Uncaught TypeError: Cannot read property 'getTime' of null
|
bug example high-priority resolved
|
### Steps
1. Open extjsmodern demo in Scheduler
http://lh/bryntum-suite/Scheduler/examples/extjsmodern/
2. Move mouse cursor over any row under Name column in Scheduler and check console
```
Uncaught TypeError: Cannot read property 'getTime' of null
at TimeAxis.getTickFromDate (TimeAxis.js:946)
at Scheduler.handleScheduleEvent (TimelineDomEvents.js:123)
at HTMLDivElement.handler (EventHelper.js:465)
getTickFromDate @ TimeAxis.js:946
handleScheduleEvent @ TimelineDomEvents.js:123
handler @ EventHelper.js:465
```
|
1.0
|
ExtJS Scheduler demo: Uncaught TypeError: Cannot read property 'getTime' of null - ### Steps
1. Open extjsmodern demo in Scheduler
http://lh/bryntum-suite/Scheduler/examples/extjsmodern/
2. Move mouse cursor over any row under Name column in Scheduler and check console
```
Uncaught TypeError: Cannot read property 'getTime' of null
at TimeAxis.getTickFromDate (TimeAxis.js:946)
at Scheduler.handleScheduleEvent (TimelineDomEvents.js:123)
at HTMLDivElement.handler (EventHelper.js:465)
getTickFromDate @ TimeAxis.js:946
handleScheduleEvent @ TimelineDomEvents.js:123
handler @ EventHelper.js:465
```
|
non_defect
|
extjs scheduler demo uncaught typeerror cannot read property gettime of null steps open extjsmodern demo in scheduler move mouse cursor over any row under name column in scheduler and check console uncaught typeerror cannot read property gettime of null at timeaxis gettickfromdate timeaxis js at scheduler handlescheduleevent timelinedomevents js at htmldivelement handler eventhelper js gettickfromdate timeaxis js handlescheduleevent timelinedomevents js handler eventhelper js
| 0
|
263,016
| 27,996,140,072
|
IssuesEvent
|
2023-03-27 08:36:33
|
amaybaum-test/vprofile-project
|
https://api.github.com/repos/amaybaum-test/vprofile-project
|
opened
|
mysql-connector-java-5.1.36.jar: 7 vulnerabilities (highest severity is: 8.5)
|
Mend: dependency security vulnerability
|
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p></summary>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (mysql-connector-java version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2017-3523](https://www.mend.io/vulnerability-database/CVE-2017-3523) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | mysql-connector-java-5.1.36.jar | Direct | 5.1.41 | ✅ |
| [CVE-2017-3586](https://www.mend.io/vulnerability-database/CVE-2017-3586) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.4 | mysql-connector-java-5.1.36.jar | Direct | 5.1.42 | ✅ |
| [CVE-2019-2692](https://www.mend.io/vulnerability-database/CVE-2019-2692) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.3 | mysql-connector-java-5.1.36.jar | Direct | 8.0.16 | ✅ |
| [CVE-2020-2934](https://www.mend.io/vulnerability-database/CVE-2020-2934) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | mysql-connector-java-5.1.36.jar | Direct | 5.1.49 | ✅ |
| [CVE-2020-2875](https://www.mend.io/vulnerability-database/CVE-2020-2875) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.7 | mysql-connector-java-5.1.36.jar | Direct | 5.1.49 | ✅ |
| [CVE-2017-3589](https://www.mend.io/vulnerability-database/CVE-2017-3589) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.3 | mysql-connector-java-5.1.36.jar | Direct | 5.1.42 | ✅ |
| [CVE-2020-2933](https://www.mend.io/vulnerability-database/CVE-2020-2933) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 2.2 | mysql-connector-java-5.1.36.jar | Direct | 5.1.49 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-3523</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.40 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. While the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 8.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
<p>Publish Date: 2017-04-24
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-3523>CVE-2017-3523</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html">https://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html</a></p>
<p>Release Date: 2017-04-24</p>
<p>Fix Resolution: 5.1.41</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-3586</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. While the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).
<p>Publish Date: 2017-04-24
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-3586>CVE-2017-3586</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.4</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1444406">https://bugzilla.redhat.com/show_bug.cgi?id=1444406</a></p>
<p>Release Date: 2017-04-24</p>
<p>Fix Resolution: 5.1.42</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-2692</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
<p>Publish Date: 2019-04-23
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-2692>CVE-2019-2692</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: High
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-jcq3-cprp-m333">https://github.com/advisories/GHSA-jcq3-cprp-m333</a></p>
<p>Release Date: 2020-08-24</p>
<p>Fix Resolution: 8.0.16</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-2934</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.19 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.0 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).
<p>Publish Date: 2020-04-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-2934>CVE-2020-2934</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.0</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a></p>
<p>Release Date: 2020-04-15</p>
<p>Fix Resolution: 5.1.49</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-2875</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
<p>Publish Date: 2020-04-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-2875>CVE-2020-2875</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>4.7</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-04-15</p>
<p>Fix Resolution: 5.1.49</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2017-3589</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data. CVSS 3.0 Base Score 3.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
<p>Publish Date: 2017-04-24
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-3589>CVE-2017-3589</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>3.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589</a></p>
<p>Release Date: 2017-04-24</p>
<p>Fix Resolution: 5.1.42</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2020-2933</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 5.1.48 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.0 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).
<p>Publish Date: 2020-04-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-2933>CVE-2020-2933</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>2.2</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://docs.oracle.com/javase/7/docs/api/javax/xml/XMLConstants.html#FEATURE_SECURE_PROCESSING">https://docs.oracle.com/javase/7/docs/api/javax/xml/XMLConstants.html#FEATURE_SECURE_PROCESSING</a></p>
<p>Release Date: 2020-04-15</p>
<p>Fix Resolution: 5.1.49</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
|
True
|
mysql-connector-java-5.1.36.jar: 7 vulnerabilities (highest severity is: 8.5) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p></summary>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (mysql-connector-java version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2017-3523](https://www.mend.io/vulnerability-database/CVE-2017-3523) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | mysql-connector-java-5.1.36.jar | Direct | 5.1.41 | ✅ |
| [CVE-2017-3586](https://www.mend.io/vulnerability-database/CVE-2017-3586) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.4 | mysql-connector-java-5.1.36.jar | Direct | 5.1.42 | ✅ |
| [CVE-2019-2692](https://www.mend.io/vulnerability-database/CVE-2019-2692) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.3 | mysql-connector-java-5.1.36.jar | Direct | 8.0.16 | ✅ |
| [CVE-2020-2934](https://www.mend.io/vulnerability-database/CVE-2020-2934) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.0 | mysql-connector-java-5.1.36.jar | Direct | 5.1.49 | ✅ |
| [CVE-2020-2875](https://www.mend.io/vulnerability-database/CVE-2020-2875) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.7 | mysql-connector-java-5.1.36.jar | Direct | 5.1.49 | ✅ |
| [CVE-2017-3589](https://www.mend.io/vulnerability-database/CVE-2017-3589) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.3 | mysql-connector-java-5.1.36.jar | Direct | 5.1.42 | ✅ |
| [CVE-2020-2933](https://www.mend.io/vulnerability-database/CVE-2020-2933) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 2.2 | mysql-connector-java-5.1.36.jar | Direct | 5.1.49 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-3523</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.40 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. While the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 8.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
<p>Publish Date: 2017-04-24
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-3523>CVE-2017-3523</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html">https://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html</a></p>
<p>Release Date: 2017-04-24</p>
<p>Fix Resolution: 5.1.41</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-3586</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. While the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).
<p>Publish Date: 2017-04-24
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-3586>CVE-2017-3586</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.4</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1444406">https://bugzilla.redhat.com/show_bug.cgi?id=1444406</a></p>
<p>Release Date: 2017-04-24</p>
<p>Fix Resolution: 5.1.42</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-2692</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
<p>Publish Date: 2019-04-23
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-2692>CVE-2019-2692</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: High
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-jcq3-cprp-m333">https://github.com/advisories/GHSA-jcq3-cprp-m333</a></p>
<p>Release Date: 2020-08-24</p>
<p>Fix Resolution: 8.0.16</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-2934</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.19 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.0 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).
<p>Publish Date: 2020-04-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-2934>CVE-2020-2934</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.0</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a></p>
<p>Release Date: 2020-04-15</p>
<p>Fix Resolution: 5.1.49</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-2875</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
<p>Publish Date: 2020-04-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-2875>CVE-2020-2875</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>4.7</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-04-15</p>
<p>Fix Resolution: 5.1.49</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2017-3589</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data. CVSS 3.0 Base Score 3.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
<p>Publish Date: 2017-04-24
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-3589>CVE-2017-3589</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>3.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589</a></p>
<p>Release Date: 2017-04-24</p>
<p>Fix Resolution: 5.1.42</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2020-2933</summary>
### Vulnerable Library - <b>mysql-connector-java-5.1.36.jar</b></p>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /tmp/ws-ua_20230327083444_PLYTNQ/downloadResource_QSJFGA/20230327083530/mysql-connector-java-5.1.36.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.36.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/amaybaum-test/vprofile-project/commit/8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6">8a6f7fbbb91d1ea95a686fc9b8a773a92a7a56d6</a></p>
<p>Found in base branch: <b>vp-rem</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 5.1.48 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.0 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).
<p>Publish Date: 2020-04-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-2933>CVE-2020-2933</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>2.2</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://docs.oracle.com/javase/7/docs/api/javax/xml/XMLConstants.html#FEATURE_SECURE_PROCESSING">https://docs.oracle.com/javase/7/docs/api/javax/xml/XMLConstants.html#FEATURE_SECURE_PROCESSING</a></p>
<p>Release Date: 2020-04-15</p>
<p>Fix Resolution: 5.1.49</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
|
non_defect
|
mysql connector java jar vulnerabilities highest severity is vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to dependency file pom xml path to vulnerable library tmp ws ua plytnq downloadresource qsjfga mysql connector java jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in mysql connector java version remediation available high mysql connector java jar direct medium mysql connector java jar direct medium mysql connector java jar direct medium mysql connector java jar direct medium mysql connector java jar direct low mysql connector java jar direct low mysql connector java jar direct details cve vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to dependency file pom xml path to vulnerable library tmp ws ua plytnq downloadresource qsjfga mysql connector java jar dependency hierarchy x mysql connector java jar vulnerable library found in head commit a href found in base branch vp rem vulnerability details vulnerability in the mysql connectors component of oracle mysql subcomponent connector j supported versions that are affected are and earlier difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise mysql connectors while the vulnerability is in mysql connectors attacks may significantly impact additional products successful attacks of this vulnerability can result in takeover of mysql connectors cvss base score confidentiality integrity and availability impacts cvss vector cvss av n ac h pr l ui n s c c h i h a h publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to dependency file pom xml path to vulnerable library tmp ws ua plytnq downloadresource qsjfga mysql connector java jar dependency hierarchy x mysql connector java jar vulnerable library found in head commit a href found in base branch vp rem vulnerability details vulnerability in the mysql connectors component of oracle mysql subcomponent connector j supported versions that are affected are and earlier easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise mysql connectors while the vulnerability is in mysql connectors attacks may significantly impact additional products successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of mysql connectors accessible data as well as unauthorized read access to a subset of mysql connectors accessible data cvss base score confidentiality and integrity impacts cvss vector cvss av n ac l pr l ui n s c c l i l a n publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to dependency file pom xml path to vulnerable library tmp ws ua plytnq downloadresource qsjfga mysql connector java jar dependency hierarchy x mysql connector java jar vulnerable library found in head commit a href found in base branch vp rem vulnerability details vulnerability in the mysql connectors component of oracle mysql subcomponent connector j supported versions that are affected are and prior difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where mysql connectors executes to compromise mysql connectors successful attacks require human interaction from a person other than the attacker successful attacks of this vulnerability can result in takeover of mysql connectors cvss base score confidentiality integrity and availability impacts cvss vector cvss av l ac h pr h ui r s u c h i h a h publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required high user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to dependency file pom xml path to vulnerable library tmp ws ua plytnq downloadresource qsjfga mysql connector java jar dependency hierarchy x mysql connector java jar vulnerable library found in head commit a href found in base branch vp rem vulnerability details vulnerability in the mysql connectors product of oracle mysql component connector j supported versions that are affected are and prior and and prior difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise mysql connectors successful attacks require human interaction from a person other than the attacker successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of mysql connectors accessible data as well as unauthorized read access to a subset of mysql connectors accessible data and unauthorized ability to cause a partial denial of service partial dos of mysql connectors cvss base score confidentiality integrity and availability impacts cvss vector cvss av n ac h pr n ui r s u c l i l a l publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction required scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to dependency file pom xml path to vulnerable library tmp ws ua plytnq downloadresource qsjfga mysql connector java jar dependency hierarchy x mysql connector java jar vulnerable library found in head commit a href found in base branch vp rem vulnerability details vulnerability in the mysql connectors product of oracle mysql component connector j supported versions that are affected are and prior and and prior difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise mysql connectors successful attacks require human interaction from a person other than the attacker and while the vulnerability is in mysql connectors attacks may significantly impact additional products successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of mysql connectors accessible data as well as unauthorized read access to a subset of mysql connectors accessible data cvss base score confidentiality and integrity impacts cvss vector cvss av n ac h pr n ui r s c c l i l a n publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to dependency file pom xml path to vulnerable library tmp ws ua plytnq downloadresource qsjfga mysql connector java jar dependency hierarchy x mysql connector java jar vulnerable library found in head commit a href found in base branch vp rem vulnerability details vulnerability in the mysql connectors component of oracle mysql subcomponent connector j supported versions that are affected are and earlier easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where mysql connectors executes to compromise mysql connectors successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of mysql connectors accessible data cvss base score integrity impacts cvss vector cvss av l ac l pr l ui n s u c n i l a n publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to dependency file pom xml path to vulnerable library tmp ws ua plytnq downloadresource qsjfga mysql connector java jar dependency hierarchy x mysql connector java jar vulnerable library found in head commit a href found in base branch vp rem vulnerability details vulnerability in the mysql connectors product of oracle mysql component connector j supported versions that are affected are and prior difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql connectors successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service partial dos of mysql connectors cvss base score availability impacts cvss vector cvss av n ac h pr h ui n s u c n i n a l publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required high user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
| 0
|
54,171
| 13,449,793,633
|
IssuesEvent
|
2020-09-08 17:28:08
|
SasView/sasview
|
https://api.github.com/repos/SasView/sasview
|
opened
|
ESS_GUI: Issues with the SLD plot in the Onion Model in 5.x
|
Plotting/Graphing Enhancements SasView Bug Fixing defect
|
If you display the SLD plot in the Onion model, it displays, but if you click anywhere outside the SLD plot it vanishes!
Also, there is no way to access the plot control toolbar, or to save the SLD plot as data values (something requested by User MarcoH).
Other multiplicity models may be similarly affected.
|
1.0
|
ESS_GUI: Issues with the SLD plot in the Onion Model in 5.x - If you display the SLD plot in the Onion model, it displays, but if you click anywhere outside the SLD plot it vanishes!
Also, there is no way to access the plot control toolbar, or to save the SLD plot as data values (something requested by User MarcoH).
Other multiplicity models may be similarly affected.
|
defect
|
ess gui issues with the sld plot in the onion model in x if you display the sld plot in the onion model it displays but if you click anywhere outside the sld plot it vanishes also there is no way to access the plot control toolbar or to save the sld plot as data values something requested by user marcoh other multiplicity models may be similarly affected
| 1
|
357,390
| 25,176,377,327
|
IssuesEvent
|
2022-11-11 09:37:39
|
lulucopter/pe
|
https://api.github.com/repos/lulucopter/pe
|
opened
|
DG: User Story
|
type.DocumentationBug severity.Medium
|

`Want to` and `so I can` does not match. Suggestions does not equate to giving fast feedback
<!--session: 1668152970076-60dcc948-8cf1-4eab-bb09-c98ce3e4fb2e-->
<!--Version: Web v3.4.4-->
|
1.0
|
DG: User Story - 
`Want to` and `so I can` does not match. Suggestions does not equate to giving fast feedback
<!--session: 1668152970076-60dcc948-8cf1-4eab-bb09-c98ce3e4fb2e-->
<!--Version: Web v3.4.4-->
|
non_defect
|
dg user story want to and so i can does not match suggestions does not equate to giving fast feedback
| 0
|
78,235
| 7,624,174,029
|
IssuesEvent
|
2018-05-03 17:09:42
|
GoogleCloudPlatform/forseti-security
|
https://api.github.com/repos/GoogleCloudPlatform/forseti-security
|
closed
|
forseti model to show creation time
|
module: client release-testing: 2.0 RC2 triaged: yes
|
Could you add creation timestamp information for created models?
It would be easier to understand when I created them, especially when I have a few, currently I'm forced to name them with timestamps to remember.
I'd like to get the information when I do `forseti model list`
|
1.0
|
forseti model to show creation time - Could you add creation timestamp information for created models?
It would be easier to understand when I created them, especially when I have a few, currently I'm forced to name them with timestamps to remember.
I'd like to get the information when I do `forseti model list`
|
non_defect
|
forseti model to show creation time could you add creation timestamp information for created models it would be easier to understand when i created them especially when i have a few currently i m forced to name them with timestamps to remember i d like to get the information when i do forseti model list
| 0
|
38,838
| 8,967,536,075
|
IssuesEvent
|
2019-01-29 03:52:31
|
svigerske/Ipopt
|
https://api.github.com/repos/svigerske/Ipopt
|
closed
|
Error while building IPOPT in Mac OS 10.14.2
|
Ipopt defect
|
Issue created by migration from Trac.
Original creator: mrajase
Original creation time: 2019-01-05 02:03:38
Assignee: ipopt-team
Version: 3.12
I am trying to install IPOPT in Mac OS 10.14.2. I was able to successfully configure script, but I am failing the IPOPT build with errors.
I successfully ran the configuration of IPOPT with the following command:
```
../configure CC=gcc CXX=g++
```
I tried setting other flags, but only the above configuration worked.
Then I followed the instructions given in the IPOPT Compiling & Installation guide to make
```
make
```
It exited with an error, whose output is attached (output_make.out).
Also, the "config.log" file is attached for information about the setup environment.
Since I am very new to Mac OS and IPOPT, I appreciate any help with this error and for your time.
Thanks,
Murali
|
1.0
|
Error while building IPOPT in Mac OS 10.14.2 - Issue created by migration from Trac.
Original creator: mrajase
Original creation time: 2019-01-05 02:03:38
Assignee: ipopt-team
Version: 3.12
I am trying to install IPOPT in Mac OS 10.14.2. I was able to successfully configure script, but I am failing the IPOPT build with errors.
I successfully ran the configuration of IPOPT with the following command:
```
../configure CC=gcc CXX=g++
```
I tried setting other flags, but only the above configuration worked.
Then I followed the instructions given in the IPOPT Compiling & Installation guide to make
```
make
```
It exited with an error, whose output is attached (output_make.out).
Also, the "config.log" file is attached for information about the setup environment.
Since I am very new to Mac OS and IPOPT, I appreciate any help with this error and for your time.
Thanks,
Murali
|
defect
|
error while building ipopt in mac os issue created by migration from trac original creator mrajase original creation time assignee ipopt team version i am trying to install ipopt in mac os i was able to successfully configure script but i am failing the ipopt build with errors i successfully ran the configuration of ipopt with the following command configure cc gcc cxx g i tried setting other flags but only the above configuration worked then i followed the instructions given in the ipopt compiling installation guide to make make it exited with an error whose output is attached output make out also the config log file is attached for information about the setup environment since i am very new to mac os and ipopt i appreciate any help with this error and for your time thanks murali
| 1
|
3,706
| 2,610,067,341
|
IssuesEvent
|
2015-02-26 18:19:46
|
chrsmith/jsjsj122
|
https://api.github.com/repos/chrsmith/jsjsj122
|
opened
|
่ทฏๆกฅๆฒป็ๅๅ่
บ็ๅช้ๆญฃ่ง
|
auto-migrated Priority-Medium Type-Defect
|
```
่ทฏๆกฅๆฒป็ๅๅ่
บ็ๅช้ๆญฃ่งใๅฐๅทไบๆดฒ็ๆฎๅป้ขใ24ๅฐๆถๅฅๅบท
ๅจ่ฏข็ญ็บฟ:0576-88066933-(ๆฃๆฃ800080609)-(ๅพฎไฟกๅทtzwzszyy)ๅป้ขๅฐๅ:ๅฐ
ๅทๅธๆคๆฑๅบๆซๅ่ทฏ229ๅท๏ผๆซๅๅคง่ฝฌ็ๆ๏ผไน่ฝฆ็บฟ่ทฏ:ไนๅ104ใ1
08ใ118ใ198ๅๆคๆฑไธ้ๆธ
ๅ
ฌไบค่ฝฆ็ด่พพๆซๅๅฐๅบ๏ผไนๅ107ใ105ใ
109ใ112ใ901ใ 902ๅ
ฌไบค่ฝฆๅฐๆๆๅนฟๅบไธ่ฝฆ๏ผๆญฅ่กๅณๅฏๅฐ้ขใ
่ฏ็้กน็ฎ๏ผ้ณ็ฟ๏ผๆฉๆณ๏ผๅๅ่
บ็๏ผๅๅ่
บๅข็๏ผ้พๅคด็๏ผ๏ฟฝ๏ฟฝ
๏ฟฝ็ฒพ๏ผๆ ็ฒพใๅ
็ฎๅ
่๏ผ็ฒพ็ดข้่ๆฒๅผ ๏ผๆท็
็ญใ
ๅฐๅทไบๆดฒ็ๆฎๅป้ขๆฏๅฐๅทๆๅคง็็ท็งๅป้ข๏ผๆๅจไธๅฎถๅจ็บฟๅ
๏ฟฝ๏ฟฝ
๏ฟฝๅจ่ฏข๏ผๆฅๆไธไธๅฎๅ็็ท็งๆฃๆฅๆฒป็่ฎพๅค๏ผไธฅๆ ผๆ็
งๅฝๅฎถๆ ๏ฟฝ
๏ฟฝ๏ฟฝๆถ่ดนใๅฐ็ซฏๅป็่ฎพๅค๏ผไธไธ็ๅๆญฅใๆๅจไธๅฎถ๏ผๆๅฐฑไธไธๅ
ธ
่ใไบบๆงๅๆๅก๏ผไธๅไปฅๆฃ่
ไธบไธญๅฟใ
็็ท็งๅฐฑ้ๅฐๅทไบๆดฒ็ๆฎๅป้ข๏ผไธไธ็ท็งไธบ็ทไบบใ
```
-----
Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 8:48
|
1.0
|
่ทฏๆกฅๆฒป็ๅๅ่
บ็ๅช้ๆญฃ่ง - ```
่ทฏๆกฅๆฒป็ๅๅ่
บ็ๅช้ๆญฃ่งใๅฐๅทไบๆดฒ็ๆฎๅป้ขใ24ๅฐๆถๅฅๅบท
ๅจ่ฏข็ญ็บฟ:0576-88066933-(ๆฃๆฃ800080609)-(ๅพฎไฟกๅทtzwzszyy)ๅป้ขๅฐๅ:ๅฐ
ๅทๅธๆคๆฑๅบๆซๅ่ทฏ229ๅท๏ผๆซๅๅคง่ฝฌ็ๆ๏ผไน่ฝฆ็บฟ่ทฏ:ไนๅ104ใ1
08ใ118ใ198ๅๆคๆฑไธ้ๆธ
ๅ
ฌไบค่ฝฆ็ด่พพๆซๅๅฐๅบ๏ผไนๅ107ใ105ใ
109ใ112ใ901ใ 902ๅ
ฌไบค่ฝฆๅฐๆๆๅนฟๅบไธ่ฝฆ๏ผๆญฅ่กๅณๅฏๅฐ้ขใ
่ฏ็้กน็ฎ๏ผ้ณ็ฟ๏ผๆฉๆณ๏ผๅๅ่
บ็๏ผๅๅ่
บๅข็๏ผ้พๅคด็๏ผ๏ฟฝ๏ฟฝ
๏ฟฝ็ฒพ๏ผๆ ็ฒพใๅ
็ฎๅ
่๏ผ็ฒพ็ดข้่ๆฒๅผ ๏ผๆท็
็ญใ
ๅฐๅทไบๆดฒ็ๆฎๅป้ขๆฏๅฐๅทๆๅคง็็ท็งๅป้ข๏ผๆๅจไธๅฎถๅจ็บฟๅ
๏ฟฝ๏ฟฝ
๏ฟฝๅจ่ฏข๏ผๆฅๆไธไธๅฎๅ็็ท็งๆฃๆฅๆฒป็่ฎพๅค๏ผไธฅๆ ผๆ็
งๅฝๅฎถๆ ๏ฟฝ
๏ฟฝ๏ฟฝๆถ่ดนใๅฐ็ซฏๅป็่ฎพๅค๏ผไธไธ็ๅๆญฅใๆๅจไธๅฎถ๏ผๆๅฐฑไธไธๅ
ธ
่ใไบบๆงๅๆๅก๏ผไธๅไปฅๆฃ่
ไธบไธญๅฟใ
็็ท็งๅฐฑ้ๅฐๅทไบๆดฒ็ๆฎๅป้ข๏ผไธไธ็ท็งไธบ็ทไบบใ
```
-----
Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 8:48
|
defect
|
่ทฏๆกฅๆฒป็ๅๅ่
บ็ๅช้ๆญฃ่ง ่ทฏๆกฅๆฒป็ๅๅ่
บ็ๅช้ๆญฃ่งใๅฐๅทไบๆดฒ็ๆฎๅป้ขใ ๅจ่ฏข็ญ็บฟ ๅพฎไฟกๅทtzwzszyy ๅป้ขๅฐๅ ๅฐ ๏ผๆซๅๅคง่ฝฌ็ๆ๏ผไน่ฝฆ็บฟ่ทฏ ใ ใ ใ ๏ผ ใ ใ ใ ใ ใ ๏ผๆญฅ่กๅณๅฏๅฐ้ขใ ่ฏ็้กน็ฎ๏ผ้ณ็ฟ๏ผๆฉๆณ๏ผๅๅ่
บ็๏ผๅๅ่
บๅข็๏ผ้พๅคด็๏ผ๏ฟฝ๏ฟฝ ๏ฟฝ็ฒพ๏ผๆ ็ฒพใๅ
็ฎๅ
่๏ผ็ฒพ็ดข้่ๆฒๅผ ๏ผๆท็
็ญใ ๅฐๅทไบๆดฒ็ๆฎๅป้ขๆฏๅฐๅทๆๅคง็็ท็งๅป้ข๏ผๆๅจไธๅฎถๅจ็บฟๅ
๏ฟฝ๏ฟฝ ๏ฟฝๅจ่ฏข๏ผๆฅๆไธไธๅฎๅ็็ท็งๆฃๆฅๆฒป็่ฎพๅค๏ผไธฅๆ ผๆ็
งๅฝๅฎถๆ ๏ฟฝ ๏ฟฝ๏ฟฝๆถ่ดนใๅฐ็ซฏๅป็่ฎพๅค๏ผไธไธ็ๅๆญฅใๆๅจไธๅฎถ๏ผๆๅฐฑไธไธๅ
ธ ่ใไบบๆงๅๆๅก๏ผไธๅไปฅๆฃ่
ไธบไธญๅฟใ ็็ท็งๅฐฑ้ๅฐๅทไบๆดฒ็ๆฎๅป้ข๏ผไธไธ็ท็งไธบ็ทไบบใ original issue reported on code google com by poweragr gmail com on may at
| 1
|
231,927
| 25,552,579,467
|
IssuesEvent
|
2022-11-30 01:53:58
|
AlexRogalskiy/openimagecv
|
https://api.github.com/repos/AlexRogalskiy/openimagecv
|
closed
|
CVE-2018-19360 (High) detected in jackson-databind-2.1.3.jar - autoclosed
|
security vulnerability
|
## CVE-2018-19360 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.1.3.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>
Dependency Hierarchy:
- logback-jackson-0.1.5.jar (Root Library)
- :x: **jackson-databind-2.1.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/openimagecv/commit/26c840d74d967fb2fc08c33b2bcfa9a86a9e01e9">26c840d74d967fb2fc08c33b2bcfa9a86a9e01e9</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.
<p>Publish Date: 2019-01-02
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-19360>CVE-2018-19360</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19360">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19360</a></p>
<p>Release Date: 2019-01-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.7.9.5,2.8.11.3,2.9.8,2.10.0.pr1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2018-19360 (High) detected in jackson-databind-2.1.3.jar - autoclosed - ## CVE-2018-19360 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.1.3.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>
Dependency Hierarchy:
- logback-jackson-0.1.5.jar (Root Library)
- :x: **jackson-databind-2.1.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/openimagecv/commit/26c840d74d967fb2fc08c33b2bcfa9a86a9e01e9">26c840d74d967fb2fc08c33b2bcfa9a86a9e01e9</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.
<p>Publish Date: 2019-01-02
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-19360>CVE-2018-19360</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19360">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19360</a></p>
<p>Release Date: 2019-01-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.7.9.5,2.8.11.3,2.9.8,2.10.0.pr1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve high detected in jackson databind jar autoclosed cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api dependency hierarchy logback jackson jar root library x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before might allow attackers to have unspecified impact by leveraging failure to block the transport jms class from polymorphic deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with mend
| 0
|
327,056
| 9,965,617,272
|
IssuesEvent
|
2019-07-08 09:11:12
|
webcompat/web-bugs
|
https://api.github.com/repos/webcompat/web-bugs
|
closed
|
it.xvideos.com - see bug description
|
browser-fenix engine-gecko priority-critical
|
<!-- @browser: Firefox Mobile 68.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 8.1.0; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 -->
<!-- @reported_with: -->
<!-- @extra_labels: browser-fenix -->
**URL**: https://it.xvideos.com/video41504335/bratty_sis_si_fa_sborrare_in_cucina_-_my_family_pies_s4_e5
**Browser / Version**: Firefox Mobile 68.0
**Operating System**: Android 8.1.0
**Tested Another Browser**: Yes
**Problem type**: Something else
**Description**: trying to mute/unmute takes seconds to occur
**Steps to Reproduce**:
Try to mute/unmute a video before playing. Nothing happens. Then play it. Then it cycles muting/unmuting many times, as if the clicks (touchs?) got finally processed.
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_
|
1.0
|
it.xvideos.com - see bug description - <!-- @browser: Firefox Mobile 68.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 8.1.0; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 -->
<!-- @reported_with: -->
<!-- @extra_labels: browser-fenix -->
**URL**: https://it.xvideos.com/video41504335/bratty_sis_si_fa_sborrare_in_cucina_-_my_family_pies_s4_e5
**Browser / Version**: Firefox Mobile 68.0
**Operating System**: Android 8.1.0
**Tested Another Browser**: Yes
**Problem type**: Something else
**Description**: trying to mute/unmute takes seconds to occur
**Steps to Reproduce**:
Try to mute/unmute a video before playing. Nothing happens. Then play it. Then it cycles muting/unmuting many times, as if the clicks (touchs?) got finally processed.
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_
|
non_defect
|
it xvideos com see bug description url browser version firefox mobile operating system android tested another browser yes problem type something else description trying to mute unmute takes seconds to occur steps to reproduce try to mute unmute a video before playing nothing happens then play it then it cycles muting unmuting many times as if the clicks touchs got finally processed browser configuration none from with โค๏ธ
| 0
|
69,447
| 22,355,604,637
|
IssuesEvent
|
2022-06-15 15:23:46
|
matrix-org/synapse
|
https://api.github.com/repos/matrix-org/synapse
|
closed
|
Email matching for invitations is case-sensitive
|
z-bug Z-Help-Wanted z-p3 T-Defect A-Invite
|
### Description
When inviting someone to a channel by email, the email is matched case-sensitively. It should be case insensitive.
### Steps to reproduce
- Create a private channel
- Invite with email a new user who has never used matrix. Use a capital letter in the email address, like `User@example.com`
- The new user receives the email and tries to log in, but uses an all-lowerecase email, like `user@example.com`
Expected: User should be able to log in.
Actual : User is denied with a message like: "This invite to this room was sent to User@example.com which is not associated with your account"
### Version information
- **Homeserver**: matrix.org (using the riot.im frontend)
|
1.0
|
Email matching for invitations is case-sensitive - ### Description
When inviting someone to a channel by email, the email is matched case-sensitively. It should be case insensitive.
### Steps to reproduce
- Create a private channel
- Invite with email a new user who has never used matrix. Use a capital letter in the email address, like `User@example.com`
- The new user receives the email and tries to log in, but uses an all-lowerecase email, like `user@example.com`
Expected: User should be able to log in.
Actual : User is denied with a message like: "This invite to this room was sent to User@example.com which is not associated with your account"
### Version information
- **Homeserver**: matrix.org (using the riot.im frontend)
|
defect
|
email matching for invitations is case sensitive description when inviting someone to a channel by email the email is matched case sensitively it should be case insensitive steps to reproduce create a private channel invite with email a new user who has never used matrix use a capital letter in the email address like user example com the new user receives the email and tries to log in but uses an all lowerecase email like user example com expected user should be able to log in actual user is denied with a message like this invite to this room was sent to user example com which is not associated with your account version information homeserver matrix org using the riot im frontend
| 1
|
40,395
| 9,981,141,378
|
IssuesEvent
|
2019-07-10 06:36:45
|
ShaikASK/Testing
|
https://api.github.com/repos/ShaikASK/Testing
|
closed
|
Branding : Changes applied to Color Scheme / Logo /Background Image are not being reflecting at all
|
Beta Release #5 Branding Defect HR Admin Module P1
|
Steps to Replicate :
1. Launch the url
2. Navigate to 'Settings' tab
3. Navigate to 'Branding' tab
4. update any of the below following
Color Scheme -update with a new color
Logo - upload a new logo
Background Image - Upload a new background image >>> Apply and save the changes
Experienced Behavior : Observed that all the changes applied are not getting reflected upon saving
|
1.0
|
Branding : Changes applied to Color Scheme / Logo /Background Image are not being reflecting at all - Steps to Replicate :
1. Launch the url
2. Navigate to 'Settings' tab
3. Navigate to 'Branding' tab
4. update any of the below following
Color Scheme -update with a new color
Logo - upload a new logo
Background Image - Upload a new background image >>> Apply and save the changes
Experienced Behavior : Observed that all the changes applied are not getting reflected upon saving
|
defect
|
branding changes applied to color scheme logo background image are not being reflecting at all steps to replicate launch the url navigate to settings tab navigate to branding tab update any of the below following color scheme update with a new color logo upload a new logo background image upload a new background image apply and save the changes experienced behavior observed that all the changes applied are not getting reflected upon saving
| 1
|
152,955
| 24,043,375,823
|
IssuesEvent
|
2022-09-16 05:38:07
|
hackforla/expunge-assist
|
https://api.github.com/repos/hackforla/expunge-assist
|
closed
|
Perform diff analysis between EA Design System and other project Design Systems
|
role: design priority: medium feature: figma design system size: 5pt
|
### Overview
Perform diff analysis between other project Design Systems to be able to create recommendation for improvements to EA Design System
### Details
Most Design Systems are created to bring standardization and order to a website, providing a cohesive experience for users. At the same time, it provides guidelines for designers (so that they donโt have to guess and research standards), and creates reusable components and styles for developers (so that they donโt have to write brand new code for every new component on every new page). Our Design System for EA (like many others) was created by the cumulative efforts of previous volunteers and could be further refined so that our current / future teammates and users would benefit.
### Action Items
- [x] Review Design System Guide and related HFLA website / Civic Tech examples (see Resources below)
- [ ] Evaluate gaps and opportunities based on current [EA Design System in Figma](https://www.figma.com/file/hYqRxmBVtJbDv9DJXV6nra/Expunge-Assist-Main-Figma?node-id=2%3A2)
- [ ] Document analysis in Figma
### Resources/Instructions
* [HfLA Universal Design System Guide for Designers](https://docs.google.com/document/d/1zUVnInBcAi3HaoLFoHHjhlmWZvspPxYfg16kAm9nVVY/edit?usp=sharing)
* [Hack for LA Website Design System - Template in Figma](https://www.figma.com/file/0RRPy1Ph7HafI3qOITg0Mr/Hack-for-LA-Website?node-id=7910%3A768)
* [Civic Tech Index Project Design System - In-Depth Figma Example](https://www.figma.com/file/EFoSuj1b9G4aZ7bN8OX8tf/CivicTechIndex---Master-Design-File?node-id=1329%3A11944)
|
2.0
|
Perform diff analysis between EA Design System and other project Design Systems - ### Overview
Perform diff analysis between other project Design Systems to be able to create recommendation for improvements to EA Design System
### Details
Most Design Systems are created to bring standardization and order to a website, providing a cohesive experience for users. At the same time, it provides guidelines for designers (so that they donโt have to guess and research standards), and creates reusable components and styles for developers (so that they donโt have to write brand new code for every new component on every new page). Our Design System for EA (like many others) was created by the cumulative efforts of previous volunteers and could be further refined so that our current / future teammates and users would benefit.
### Action Items
- [x] Review Design System Guide and related HFLA website / Civic Tech examples (see Resources below)
- [ ] Evaluate gaps and opportunities based on current [EA Design System in Figma](https://www.figma.com/file/hYqRxmBVtJbDv9DJXV6nra/Expunge-Assist-Main-Figma?node-id=2%3A2)
- [ ] Document analysis in Figma
### Resources/Instructions
* [HfLA Universal Design System Guide for Designers](https://docs.google.com/document/d/1zUVnInBcAi3HaoLFoHHjhlmWZvspPxYfg16kAm9nVVY/edit?usp=sharing)
* [Hack for LA Website Design System - Template in Figma](https://www.figma.com/file/0RRPy1Ph7HafI3qOITg0Mr/Hack-for-LA-Website?node-id=7910%3A768)
* [Civic Tech Index Project Design System - In-Depth Figma Example](https://www.figma.com/file/EFoSuj1b9G4aZ7bN8OX8tf/CivicTechIndex---Master-Design-File?node-id=1329%3A11944)
|
non_defect
|
perform diff analysis between ea design system and other project design systems overview perform diff analysis between other project design systems to be able to create recommendation for improvements to ea design system details most design systems are created to bring standardization and order to a website providing a cohesive experience for users at the same time it provides guidelines for designers so that they donโt have to guess and research standards and creates reusable components and styles for developers so that they donโt have to write brand new code for every new component on every new page our design system for ea like many others was created by the cumulative efforts of previous volunteers and could be further refined so that our current future teammates and users would benefit action items review design system guide and related hfla website civic tech examples see resources below evaluate gaps and opportunities based on current document analysis in figma resources instructions
| 0
|
318,664
| 9,695,900,394
|
IssuesEvent
|
2019-05-25 01:51:48
|
Alluxio/alluxio
|
https://api.github.com/repos/Alluxio/alluxio
|
closed
|
Why need to set `hostPID: true` in kubernetes/alluxio-master.yaml.template
|
area-k8s priority-high type-bug
|
**Alluxio Version:**
v2.0.0-preview
**Describe the bug**
It's just a question. Why need to set `hostPID: true` in [kubernetes/alluxio-master.yaml.template](https://github.com/Alluxio/alluxio/blob/master/integration/kubernetes/alluxio-master.yaml.template#L56) ?
**To Reproduce**
Steps to reproduce the behavior (as minimally and precisely as possible)
**Expected behavior**
A clear and concise description of what you expected to happen.
**Urgency**
Describe the impact and urgency of the bug.
**Additional context**
Add any other context about the problem here.
|
1.0
|
Why need to set `hostPID: true` in kubernetes/alluxio-master.yaml.template - **Alluxio Version:**
v2.0.0-preview
**Describe the bug**
It's just a question. Why need to set `hostPID: true` in [kubernetes/alluxio-master.yaml.template](https://github.com/Alluxio/alluxio/blob/master/integration/kubernetes/alluxio-master.yaml.template#L56) ?
**To Reproduce**
Steps to reproduce the behavior (as minimally and precisely as possible)
**Expected behavior**
A clear and concise description of what you expected to happen.
**Urgency**
Describe the impact and urgency of the bug.
**Additional context**
Add any other context about the problem here.
|
non_defect
|
why need to set hostpid true in kubernetes alluxio master yaml template alluxio version preview describe the bug it s just a question why need to set hostpid true in to reproduce steps to reproduce the behavior as minimally and precisely as possible expected behavior a clear and concise description of what you expected to happen urgency describe the impact and urgency of the bug additional context add any other context about the problem here
| 0
|
72,849
| 19,521,075,275
|
IssuesEvent
|
2021-12-29 18:34:36
|
appsmithorg/appsmith
|
https://api.github.com/repos/appsmithorg/appsmith
|
opened
|
[Task]: Add keyboard focus state to canvas size selector
|
UI Builders Pod Task
|
### Is there an existing issue for this?
- [X] I have searched the existing issues
### SubTasks

|
1.0
|
[Task]: Add keyboard focus state to canvas size selector - ### Is there an existing issue for this?
- [X] I have searched the existing issues
### SubTasks

|
non_defect
|
add keyboard focus state to canvas size selector is there an existing issue for this i have searched the existing issues subtasks
| 0
|
331,511
| 24,310,743,541
|
IssuesEvent
|
2022-09-29 22:04:09
|
prathikshetty2002/S.H.I.E.L.D
|
https://api.github.com/repos/prathikshetty2002/S.H.I.E.L.D
|
opened
|
Add a contributing.md file to the project
|
documentation Author
|
Specify community guidelines througha contributing.md markdown file.
- [ ] Add do & don'ts/ standard guidelines
- [ ] How to contribute to our project
- [ ] Add links to slack or discord community
After tasks complete, merge & build preview .
|
1.0
|
Add a contributing.md file to the project - Specify community guidelines througha contributing.md markdown file.
- [ ] Add do & don'ts/ standard guidelines
- [ ] How to contribute to our project
- [ ] Add links to slack or discord community
After tasks complete, merge & build preview .
|
non_defect
|
add a contributing md file to the project specify community guidelines througha contributing md markdown file add do don ts standard guidelines how to contribute to our project add links to slack or discord community after tasks complete merge build preview
| 0
|
208,619
| 7,156,673,541
|
IssuesEvent
|
2018-01-26 17:03:40
|
NAVADMC/ADSM
|
https://api.github.com/repos/NAVADMC/ADSM
|
closed
|
White window opens, but program won't load - Port in use
|
High Priority bug
|
Thanks to our friends at Kansas State for finding this one. It will go in Known Bugs.
Problem: Starts ADSM, white window open and hourglass runs but program never opens.
I had her pull the logs, which are found within ADSM Workspace, settings, logs directory. Server error log says:
STARTING AT: 2017-11-16 17:21:14.652434+00:00[16/Nov/2017:11:21:14] ENGINE Bus STARTING
[16/Nov/2017:11:21:14] ENGINE Started monitor thread 'Autoreloader'.
[16/Nov/2017:11:21:14] ENGINE Started monitor thread '_TimeoutMonitor'.
[16/Nov/2017:11:21:20] ENGINE Error in 'start' listener <bound method Server.start of <cherrypy._cpserver.Server object at 0x0000000003E029E8>>
Traceback (most recent call last):
File "cherrypy\process\wspbus.py", line 205, in publish
File "cherrypy\_cpserver.py", line 168, in start
File "cherrypy\process\servers.py", line 170, in start
File "cherrypy\process\servers.py", line 438, in wait_for_free_port
OSError: Port 8001 not free on '127.0.0.1'
[16/Nov/2017:11:21:20] ENGINE Shutting down due to error in start listener:
Traceback (most recent call last):
File "cherrypy\process\wspbus.py", line 243, in start
File "cherrypy\process\wspbus.py", line 223, in publish
cherrypy.process.wspbus.ChannelFailures: OSError("Port 8001 not free on '127.0.0.1'",)
[16/Nov/2017:11:21:20] ENGINE Bus STOPPING
[16/Nov/2017:11:21:20] ENGINE HTTP Server cherrypy._cpwsgi_server.CPWSGIServer(('127.0.0.1', 8001)) already shut down
[16/Nov/2017:11:21:20] ENGINE Stopped thread 'Autoreloader'.
[16/Nov/2017:11:21:20] ENGINE Stopped thread '_TimeoutMonitor'.
[16/Nov/2017:11:21:20] ENGINE Bus STOPPED
[16/Nov/2017:11:21:20] ENGINE Bus EXITING
[16/Nov/2017:11:21:20] ENGINE Bus EXITED
To troubleshoot, I opened a command window (cmd)
typed netstat -an
list pulls

what ports were in use and can see that 127.0.0.1:8001 is already established
|
1.0
|
White window opens, but program won't load - Port in use - Thanks to our friends at Kansas State for finding this one. It will go in Known Bugs.
Problem: Starts ADSM, white window open and hourglass runs but program never opens.
I had her pull the logs, which are found within ADSM Workspace, settings, logs directory. Server error log says:
STARTING AT: 2017-11-16 17:21:14.652434+00:00[16/Nov/2017:11:21:14] ENGINE Bus STARTING
[16/Nov/2017:11:21:14] ENGINE Started monitor thread 'Autoreloader'.
[16/Nov/2017:11:21:14] ENGINE Started monitor thread '_TimeoutMonitor'.
[16/Nov/2017:11:21:20] ENGINE Error in 'start' listener <bound method Server.start of <cherrypy._cpserver.Server object at 0x0000000003E029E8>>
Traceback (most recent call last):
File "cherrypy\process\wspbus.py", line 205, in publish
File "cherrypy\_cpserver.py", line 168, in start
File "cherrypy\process\servers.py", line 170, in start
File "cherrypy\process\servers.py", line 438, in wait_for_free_port
OSError: Port 8001 not free on '127.0.0.1'
[16/Nov/2017:11:21:20] ENGINE Shutting down due to error in start listener:
Traceback (most recent call last):
File "cherrypy\process\wspbus.py", line 243, in start
File "cherrypy\process\wspbus.py", line 223, in publish
cherrypy.process.wspbus.ChannelFailures: OSError("Port 8001 not free on '127.0.0.1'",)
[16/Nov/2017:11:21:20] ENGINE Bus STOPPING
[16/Nov/2017:11:21:20] ENGINE HTTP Server cherrypy._cpwsgi_server.CPWSGIServer(('127.0.0.1', 8001)) already shut down
[16/Nov/2017:11:21:20] ENGINE Stopped thread 'Autoreloader'.
[16/Nov/2017:11:21:20] ENGINE Stopped thread '_TimeoutMonitor'.
[16/Nov/2017:11:21:20] ENGINE Bus STOPPED
[16/Nov/2017:11:21:20] ENGINE Bus EXITING
[16/Nov/2017:11:21:20] ENGINE Bus EXITED
To troubleshoot, I opened a command window (cmd)
typed netstat -an
list pulls

what ports were in use and can see that 127.0.0.1:8001 is already established
|
non_defect
|
white window opens but program won t load port in use thanks to our friends at kansas state for finding this one it will go in known bugs problem starts adsm white window open and hourglass runs but program never opens i had her pull the logs which are found within adsm workspace settings logs directory server error log says starting at engine bus starting engine started monitor thread autoreloader engine started monitor thread timeoutmonitor engine error in start listener traceback most recent call last file cherrypy process wspbus py line in publish file cherrypy cpserver py line in start file cherrypy process servers py line in start file cherrypy process servers py line in wait for free port oserror port not free on engine shutting down due to error in start listener traceback most recent call last file cherrypy process wspbus py line in start file cherrypy process wspbus py line in publish cherrypy process wspbus channelfailures oserror port not free on engine bus stopping engine http server cherrypy cpwsgi server cpwsgiserver already shut down engine stopped thread autoreloader engine stopped thread timeoutmonitor engine bus stopped engine bus exiting engine bus exited to troubleshoot i opened a command window cmd typed netstat an list pulls what ports were in use and can see that is already established
| 0
|
267,270
| 20,197,669,217
|
IssuesEvent
|
2022-02-11 12:13:07
|
datactive/bigbang
|
https://api.github.com/repos/datactive/bigbang
|
closed
|
install scripts failing (was collect_mail.py broken)
|
documentation
|
I made two clean installs, on two machines, both with anaconda and with pip, and I get the same error when trying to run this script:
```
$ python bin/collect_mail.py -f examples/url_collections/mm.ietf.org.txt
Traceback (most recent call last):
File "bin/collect_mail.py", line 3, in <module>
import bigbang.mailman as mailman
ImportError: No module named bigbang.mailman
```
|
1.0
|
install scripts failing (was collect_mail.py broken) - I made two clean installs, on two machines, both with anaconda and with pip, and I get the same error when trying to run this script:
```
$ python bin/collect_mail.py -f examples/url_collections/mm.ietf.org.txt
Traceback (most recent call last):
File "bin/collect_mail.py", line 3, in <module>
import bigbang.mailman as mailman
ImportError: No module named bigbang.mailman
```
|
non_defect
|
install scripts failing was collect mail py broken i made two clean installs on two machines both with anaconda and with pip and i get the same error when trying to run this script python bin collect mail py f examples url collections mm ietf org txt traceback most recent call last file bin collect mail py line in import bigbang mailman as mailman importerror no module named bigbang mailman
| 0
|
143,516
| 22,061,031,598
|
IssuesEvent
|
2022-05-30 17:52:16
|
DXgovernance/dxvote
|
https://api.github.com/repos/DXgovernance/dxvote
|
closed
|
Show to address in call details
|
Enhancement Design
|
It would be useful to show the to value of each of these calls also (the address). This should be outside of the function call data at the top level of the detailed/technical action view
<img width="531" alt="Screenshot 2022-04-29 at 10 19 53" src="https://user-images.githubusercontent.com/39137239/165917779-e08374ba-fd98-4f9f-bd7d-13097dcecf94.png">
|
1.0
|
Show to address in call details - It would be useful to show the to value of each of these calls also (the address). This should be outside of the function call data at the top level of the detailed/technical action view
<img width="531" alt="Screenshot 2022-04-29 at 10 19 53" src="https://user-images.githubusercontent.com/39137239/165917779-e08374ba-fd98-4f9f-bd7d-13097dcecf94.png">
|
non_defect
|
show to address in call details it would be useful to show the to value of each of these calls also the address this should be outside of the function call data at the top level of the detailed technical action view img width alt screenshot at src
| 0
|
775,749
| 27,236,100,695
|
IssuesEvent
|
2023-02-21 16:25:49
|
turms-im/turms
|
https://api.github.com/repos/turms-im/turms
|
closed
|
้พๆฅๆๆกฃไธญ็ Playground๏ผ็ปๅฝๆถๅๅฐๆฅ้ใ
|
bug priority:high
|
1. ไฝฟ็จ turms-client-js ไธญ็ Demo ็ปๅฝๆฅ้๏ผ้พๆฅๅฐๅไธบ ws://playground.turms.im:10510๏ผๆฅ้ไฟกๆฏไธบ
<img width="424" alt="image" src="https://user-images.githubusercontent.com/8817547/220262979-ae153252-589c-41d4-b30f-2d2b145a8bef.png">
2. ไฝฟ็จ playground admin ไธญ็ terminal ไนๆฏๅ
ๅๆ ท็้่ฏฏ
<img width="611" alt="image" src="https://user-images.githubusercontent.com/8817547/220263189-3ca339be-4500-47f0-b374-2aa839485180.png">
|
1.0
|
้พๆฅๆๆกฃไธญ็ Playground๏ผ็ปๅฝๆถๅๅฐๆฅ้ใ - 1. ไฝฟ็จ turms-client-js ไธญ็ Demo ็ปๅฝๆฅ้๏ผ้พๆฅๅฐๅไธบ ws://playground.turms.im:10510๏ผๆฅ้ไฟกๆฏไธบ
<img width="424" alt="image" src="https://user-images.githubusercontent.com/8817547/220262979-ae153252-589c-41d4-b30f-2d2b145a8bef.png">
2. ไฝฟ็จ playground admin ไธญ็ terminal ไนๆฏๅ
ๅๆ ท็้่ฏฏ
<img width="611" alt="image" src="https://user-images.githubusercontent.com/8817547/220263189-3ca339be-4500-47f0-b374-2aa839485180.png">
|
non_defect
|
้พๆฅๆๆกฃไธญ็ playground๏ผ็ปๅฝๆถๅๅฐๆฅ้ใ ไฝฟ็จ turms client js ไธญ็ demo ็ปๅฝๆฅ้๏ผ้พๆฅๅฐๅไธบ ws playground turms im ๏ผๆฅ้ไฟกๆฏไธบ img width alt image src ไฝฟ็จ playground admin ไธญ็ terminal ไนๆฏๅ
ๅๆ ท็้่ฏฏ img width alt image src
| 0
|
57,061
| 15,615,709,682
|
IssuesEvent
|
2021-03-19 19:38:07
|
department-of-veterans-affairs/va.gov-team
|
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
|
opened
|
[AXE-CORE]: IDs used in ARIA and labels must be unique
|
508-defect-1 508/Accessibility
|
# [508-defect-1 :exclamation: Launchblocker](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/platform/accessibility/guidance/defect-severity-rubric.md#508-defect-1)
## Feedback framework
- **โ๏ธ Must** for if the feedback must be applied
- **โ ๏ธ Should** if the feedback is best practice
- **โ๏ธ Consider** for suggestions/enhancements
## Definition of done
1. Review and acknowledge feedback.
1. Fix issue.
1. At message the accessibility specialist when issue is resolved.
## Point of Contact
<!-- If this issue is being opened by a VFS team member, please add a point of contact. Usually this is the same person who enters the issue ticket. -->
**VFS Point of Contact:** _Trevor_
## User Story or Problem Statement
Accessibility specialists discovered Nightwatch axe checks failing silently during a recent staging review. Multiple axe violations were discovered where IDs used in ARIA and labels were not unique. This could be especially problematic to assistive technology users. Links to pages below.
## Acceptance Criteria
- [ ] All instances of the error are fixed
- [ ] Axe-browser plugin or axe-core CLI scans show 0 Section 508, WCAG2A or WCAG2AA violations
## Environment
* https://www.va.gov/cheyenne-health-care/locations/sterling-va-clinic/
* https://www.va.gov/erie-health-care/locations/erie-va-medical-center/
* https://www.va.gov/lebanon-health-care/health-services/
* https://www.va.gov/lebanon-health-care/locations/schuylkill-county-va-clinic/
* https://www.va.gov/lebanon-health-care/locations/york-va-clinic/
* https://www.va.gov/montana-health-care/locations/hamilton-va-clinic/
* https://www.va.gov/wilmington-health-care/health-services/
* https://www.va.gov/wilmington-health-care/locations/sussex-county-va-clinic/
## Steps to Recreate
1. Open one of the listed URLs
1. Open axe browser plugin (assumes already installed in Chrome or Firefox)
1. Confirm the `ARIA attributes must conform to valid values` is present one or more times
|
1.0
|
[AXE-CORE]: IDs used in ARIA and labels must be unique - # [508-defect-1 :exclamation: Launchblocker](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/platform/accessibility/guidance/defect-severity-rubric.md#508-defect-1)
## Feedback framework
- **โ๏ธ Must** for if the feedback must be applied
- **โ ๏ธ Should** if the feedback is best practice
- **โ๏ธ Consider** for suggestions/enhancements
## Definition of done
1. Review and acknowledge feedback.
1. Fix issue.
1. At message the accessibility specialist when issue is resolved.
## Point of Contact
<!-- If this issue is being opened by a VFS team member, please add a point of contact. Usually this is the same person who enters the issue ticket. -->
**VFS Point of Contact:** _Trevor_
## User Story or Problem Statement
Accessibility specialists discovered Nightwatch axe checks failing silently during a recent staging review. Multiple axe violations were discovered where IDs used in ARIA and labels were not unique. This could be especially problematic to assistive technology users. Links to pages below.
## Acceptance Criteria
- [ ] All instances of the error are fixed
- [ ] Axe-browser plugin or axe-core CLI scans show 0 Section 508, WCAG2A or WCAG2AA violations
## Environment
* https://www.va.gov/cheyenne-health-care/locations/sterling-va-clinic/
* https://www.va.gov/erie-health-care/locations/erie-va-medical-center/
* https://www.va.gov/lebanon-health-care/health-services/
* https://www.va.gov/lebanon-health-care/locations/schuylkill-county-va-clinic/
* https://www.va.gov/lebanon-health-care/locations/york-va-clinic/
* https://www.va.gov/montana-health-care/locations/hamilton-va-clinic/
* https://www.va.gov/wilmington-health-care/health-services/
* https://www.va.gov/wilmington-health-care/locations/sussex-county-va-clinic/
## Steps to Recreate
1. Open one of the listed URLs
1. Open axe browser plugin (assumes already installed in Chrome or Firefox)
1. Confirm the `ARIA attributes must conform to valid values` is present one or more times
|
defect
|
ids used in aria and labels must be unique feedback framework โ๏ธ must for if the feedback must be applied โ ๏ธ should if the feedback is best practice โ๏ธ consider for suggestions enhancements definition of done review and acknowledge feedback fix issue at message the accessibility specialist when issue is resolved point of contact vfs point of contact trevor user story or problem statement accessibility specialists discovered nightwatch axe checks failing silently during a recent staging review multiple axe violations were discovered where ids used in aria and labels were not unique this could be especially problematic to assistive technology users links to pages below acceptance criteria all instances of the error are fixed axe browser plugin or axe core cli scans show section or violations environment steps to recreate open one of the listed urls open axe browser plugin assumes already installed in chrome or firefox confirm the aria attributes must conform to valid values is present one or more times
| 1
|
13,123
| 2,732,908,082
|
IssuesEvent
|
2015-04-17 10:09:05
|
tiku01/oryx-editor
|
https://api.github.com/repos/tiku01/oryx-editor
|
closed
|
Choice property item's values are listed in the property window and not the title
|
auto-migrated Component-Editor Priority-Medium Type-Defect
|
```
What steps will reproduce the problem?
1. create an epc model
2. create a relation
3. select the relation
4. click on property "Information Flow"
What is the expected output?
the titles of the property items are listed (in this case, the titles are
"c1" and "c2" for some reason.
What do you see instead?
the property items values are listed. so, the property items titles make no
sense at all.
Please use labels and text to provide additional information.
```
Original issue reported on code.google.com by `NicoPete...@gmail.com` on 26 Aug 2008 at 1:53
|
1.0
|
Choice property item's values are listed in the property window and not the title - ```
What steps will reproduce the problem?
1. create an epc model
2. create a relation
3. select the relation
4. click on property "Information Flow"
What is the expected output?
the titles of the property items are listed (in this case, the titles are
"c1" and "c2" for some reason.
What do you see instead?
the property items values are listed. so, the property items titles make no
sense at all.
Please use labels and text to provide additional information.
```
Original issue reported on code.google.com by `NicoPete...@gmail.com` on 26 Aug 2008 at 1:53
|
defect
|
choice property item s values are listed in the property window and not the title what steps will reproduce the problem create an epc model create a relation select the relation click on property information flow what is the expected output the titles of the property items are listed in this case the titles are and for some reason what do you see instead the property items values are listed so the property items titles make no sense at all please use labels and text to provide additional information original issue reported on code google com by nicopete gmail com on aug at
| 1
|
59,126
| 14,529,055,768
|
IssuesEvent
|
2020-12-14 17:18:38
|
golang/go
|
https://api.github.com/repos/golang/go
|
closed
|
x/build/cmd/release: linux-s390x-crosscompile builder fails to compile Go 1.16
|
Builders NeedsInvestigation arch-s390x release-blocker
|
The [`linux-s390x-crosscompile`](https://github.com/golang/build/blob/0949104402f832080943e7830e85b87d01128eef/dashboard/builders.go#L2487-L2499) builder is used in the [release process](https://github.com/golang/build/blob/0949104402f832080943e7830e85b87d01128eef/cmd/release/release.go#L208-L213) to build s390x.tar.gz release archives. It currently fails when building Go 1.16 (with go1.4.3 linux/amd64 as the bootstrap version).
This can be reproduced if your account has permissions needed to run `releasebot` (documented [here](https://github.com/golang/build/tree/master/cmd/releasebot#permissions)) with:
```
# (The release command uses builders to create a release artifact locally.
# It does not publish anything, so it's safe to run for testing needs.)
$ release -target=linux-s390x -version=go1.16alpha0 -rev=master # master was 854a2f8e01a554d8052445563863775406a04b71
2020/12/08 23:33:29 linux-s390x: Start.
2020/12/08 23:33:29 linux-s390x: Creating buildlet.
2020/12/08 23:34:01 linux-s390x: Pushing source to buildlet.
2020/12/08 23:34:08 linux-s390x: Writing VERSION file.
2020/12/08 23:34:08 linux-s390x: Cleaning goroot (pre-build).
2020/12/08 23:34:09 linux-s390x: Building (make.bash only).
2020/12/08 23:34:15 linux-s390x: Error: Build failed: exit status 2
Output:
Building Go cmd/dist using /go1.4. (go1.4.3 linux/amd64)
Building Go toolchain1 using /go1.4.
# bootstrap/cmd/compile/internal/ssa
/workdir/go/src/cmd/compile/internal/ssa/rewriteS390X.go:12979[/workdir/go/pkg/bootstrap/src/bootstrap/cmd/compile/internal/ssa/rewriteS390X.go:12983]: invalid operation: 18446744073709551615 << c (shift count type int8, must be unsigned integer)
/workdir/go/src/cmd/compile/internal/ssa/rewriteS390X.go:12983[/workdir/go/pkg/bootstrap/src/bootstrap/cmd/compile/internal/ssa/rewriteS390X.go:12987]: invalid operation: 18446744073709551615 << c (shift count type int8, must be unsigned integer)
/workdir/go/src/cmd/compile/internal/ssa/rewriteS390X.go:12997[/workdir/go/pkg/bootstrap/src/bootstrap/cmd/compile/internal/ssa/rewriteS390X.go:13001]: invalid operation: 18446744073709551615 >> c (shift count type int8, must be unsigned integer)
/workdir/go/src/cmd/compile/internal/ssa/rewriteS390X.go:13001[/workdir/go/pkg/bootstrap/src/bootstrap/cmd/compile/internal/ssa/rewriteS390X.go:13005]: invalid operation: 18446744073709551615 >> c (shift count type int8, must be unsigned integer)
go tool dist: FAILED: /go1.4/bin/go install -gcflags=-l -tags=math_big_pure_go compiler_bootstrap bootstrap/cmd/...: exit status 2
```
In contrast, it works okay on release-branch.go1.15:
<details><br>
```
$ release -target=linux-s390x -version=go1.15alpha0 -watch -rev=release-branch.go1.15
2020/12/08 23:34:20 linux-s390x: Start.
2020/12/08 23:34:20 linux-s390x: Creating buildlet.
2020/12/08 23:34:56 linux-s390x: Pushing source to buildlet.
2020/12/08 23:35:03 linux-s390x: Writing VERSION file.
2020/12/08 23:35:03 linux-s390x: Cleaning goroot (pre-build).
2020/12/08 23:35:04 linux-s390x: Building (make.bash only).
2020/12/09 04:35:04 unsupported GOARCH s390x
Building Go cmd/dist using /go1.4. ()
Building Go toolchain1 using /go1.4.
Building Go bootstrap cmd/go (go_bootstrap) using Go toolchain1.
Building Go toolchain2 using go_bootstrap and Go toolchain1.
Building Go toolchain3 using go_bootstrap and Go toolchain2.
Building packages and commands for host, linux/amd64.
Building packages and commands for target, linux/s390x.
---
Installed Go for linux/s390x in /workdir/go
Installed commands in /workdir/go/bin
The binaries expect /workdir/go to be copied or moved to /usr/local/go
2020/12/08 23:37:52 linux-s390x: Cleaning goroot (post-build).
2020/12/08 23:37:53 linux-s390x: Pushing and running releaselet.
2020/12/08 23:37:53 linux-s390x: Cleaning workdir.
2020/12/08 23:37:54 linux-s390x: Downloading tarball.
2020/12/08 23:38:07 linux-s390x: Wrote "/tmp/go-release-staging_141661091/go1.15alpha0.linux-s390x.tar.gz.untested".
2020/12/08 23:38:07 linux-s390x: Skipping all.bash tests.
2020/12/08 23:38:07 linux-s390x: Moving "/tmp/go-release-staging_141661091/go1.15alpha0.linux-s390x.tar.gz.untested" to "go1.15alpha0.linux-s390x.tar.gz".
2020/12/08 23:38:07 linux-s390x: Done.
```
</details>
The problem may be on the side of the builder, or in the tree (or both). Thoughts?
CC @golang/release, @randall77, @ianlancetaylor, @ruixin-bao, @rajaskakodkar.
|
1.0
|
x/build/cmd/release: linux-s390x-crosscompile builder fails to compile Go 1.16 - The [`linux-s390x-crosscompile`](https://github.com/golang/build/blob/0949104402f832080943e7830e85b87d01128eef/dashboard/builders.go#L2487-L2499) builder is used in the [release process](https://github.com/golang/build/blob/0949104402f832080943e7830e85b87d01128eef/cmd/release/release.go#L208-L213) to build s390x.tar.gz release archives. It currently fails when building Go 1.16 (with go1.4.3 linux/amd64 as the bootstrap version).
This can be reproduced if your account has permissions needed to run `releasebot` (documented [here](https://github.com/golang/build/tree/master/cmd/releasebot#permissions)) with:
```
# (The release command uses builders to create a release artifact locally.
# It does not publish anything, so it's safe to run for testing needs.)
$ release -target=linux-s390x -version=go1.16alpha0 -rev=master # master was 854a2f8e01a554d8052445563863775406a04b71
2020/12/08 23:33:29 linux-s390x: Start.
2020/12/08 23:33:29 linux-s390x: Creating buildlet.
2020/12/08 23:34:01 linux-s390x: Pushing source to buildlet.
2020/12/08 23:34:08 linux-s390x: Writing VERSION file.
2020/12/08 23:34:08 linux-s390x: Cleaning goroot (pre-build).
2020/12/08 23:34:09 linux-s390x: Building (make.bash only).
2020/12/08 23:34:15 linux-s390x: Error: Build failed: exit status 2
Output:
Building Go cmd/dist using /go1.4. (go1.4.3 linux/amd64)
Building Go toolchain1 using /go1.4.
# bootstrap/cmd/compile/internal/ssa
/workdir/go/src/cmd/compile/internal/ssa/rewriteS390X.go:12979[/workdir/go/pkg/bootstrap/src/bootstrap/cmd/compile/internal/ssa/rewriteS390X.go:12983]: invalid operation: 18446744073709551615 << c (shift count type int8, must be unsigned integer)
/workdir/go/src/cmd/compile/internal/ssa/rewriteS390X.go:12983[/workdir/go/pkg/bootstrap/src/bootstrap/cmd/compile/internal/ssa/rewriteS390X.go:12987]: invalid operation: 18446744073709551615 << c (shift count type int8, must be unsigned integer)
/workdir/go/src/cmd/compile/internal/ssa/rewriteS390X.go:12997[/workdir/go/pkg/bootstrap/src/bootstrap/cmd/compile/internal/ssa/rewriteS390X.go:13001]: invalid operation: 18446744073709551615 >> c (shift count type int8, must be unsigned integer)
/workdir/go/src/cmd/compile/internal/ssa/rewriteS390X.go:13001[/workdir/go/pkg/bootstrap/src/bootstrap/cmd/compile/internal/ssa/rewriteS390X.go:13005]: invalid operation: 18446744073709551615 >> c (shift count type int8, must be unsigned integer)
go tool dist: FAILED: /go1.4/bin/go install -gcflags=-l -tags=math_big_pure_go compiler_bootstrap bootstrap/cmd/...: exit status 2
```
In contrast, it works okay on release-branch.go1.15:
<details><br>
```
$ release -target=linux-s390x -version=go1.15alpha0 -watch -rev=release-branch.go1.15
2020/12/08 23:34:20 linux-s390x: Start.
2020/12/08 23:34:20 linux-s390x: Creating buildlet.
2020/12/08 23:34:56 linux-s390x: Pushing source to buildlet.
2020/12/08 23:35:03 linux-s390x: Writing VERSION file.
2020/12/08 23:35:03 linux-s390x: Cleaning goroot (pre-build).
2020/12/08 23:35:04 linux-s390x: Building (make.bash only).
2020/12/09 04:35:04 unsupported GOARCH s390x
Building Go cmd/dist using /go1.4. ()
Building Go toolchain1 using /go1.4.
Building Go bootstrap cmd/go (go_bootstrap) using Go toolchain1.
Building Go toolchain2 using go_bootstrap and Go toolchain1.
Building Go toolchain3 using go_bootstrap and Go toolchain2.
Building packages and commands for host, linux/amd64.
Building packages and commands for target, linux/s390x.
---
Installed Go for linux/s390x in /workdir/go
Installed commands in /workdir/go/bin
The binaries expect /workdir/go to be copied or moved to /usr/local/go
2020/12/08 23:37:52 linux-s390x: Cleaning goroot (post-build).
2020/12/08 23:37:53 linux-s390x: Pushing and running releaselet.
2020/12/08 23:37:53 linux-s390x: Cleaning workdir.
2020/12/08 23:37:54 linux-s390x: Downloading tarball.
2020/12/08 23:38:07 linux-s390x: Wrote "/tmp/go-release-staging_141661091/go1.15alpha0.linux-s390x.tar.gz.untested".
2020/12/08 23:38:07 linux-s390x: Skipping all.bash tests.
2020/12/08 23:38:07 linux-s390x: Moving "/tmp/go-release-staging_141661091/go1.15alpha0.linux-s390x.tar.gz.untested" to "go1.15alpha0.linux-s390x.tar.gz".
2020/12/08 23:38:07 linux-s390x: Done.
```
</details>
The problem may be on the side of the builder, or in the tree (or both). Thoughts?
CC @golang/release, @randall77, @ianlancetaylor, @ruixin-bao, @rajaskakodkar.
|
non_defect
|
x build cmd release linux crosscompile builder fails to compile go the builder is used in the to build tar gz release archives it currently fails when building go with linux as the bootstrap version this can be reproduced if your account has permissions needed to run releasebot documented with the release command uses builders to create a release artifact locally it does not publish anything so it s safe to run for testing needs release target linux version rev master master was linux start linux creating buildlet linux pushing source to buildlet linux writing version file linux cleaning goroot pre build linux building make bash only linux error build failed exit status output building go cmd dist using linux building go using bootstrap cmd compile internal ssa workdir go src cmd compile internal ssa go invalid operation c shift count type must be unsigned integer workdir go src cmd compile internal ssa go invalid operation c shift count type must be unsigned integer workdir go src cmd compile internal ssa go invalid operation c shift count type must be unsigned integer workdir go src cmd compile internal ssa go invalid operation c shift count type must be unsigned integer go tool dist failed bin go install gcflags l tags math big pure go compiler bootstrap bootstrap cmd exit status in contrast it works okay on release branch release target linux version watch rev release branch linux start linux creating buildlet linux pushing source to buildlet linux writing version file linux cleaning goroot pre build linux building make bash only unsupported goarch building go cmd dist using building go using building go bootstrap cmd go go bootstrap using go building go using go bootstrap and go building go using go bootstrap and go building packages and commands for host linux building packages and commands for target linux installed go for linux in workdir go installed commands in workdir go bin the binaries expect workdir go to be copied or moved to usr local go linux cleaning goroot post build linux pushing and running releaselet linux cleaning workdir linux downloading tarball linux wrote tmp go release staging linux tar gz untested linux skipping all bash tests linux moving tmp go release staging linux tar gz untested to linux tar gz linux done the problem may be on the side of the builder or in the tree or both thoughts cc golang release ianlancetaylor ruixin bao rajaskakodkar
| 0
|
72,605
| 24,198,302,593
|
IssuesEvent
|
2022-09-24 07:16:13
|
openzfs/zfs
|
https://api.github.com/repos/openzfs/zfs
|
closed
|
zfs stops working - enabling CONFIG_LATENCYTOP
|
Type: Defect Status: Stale Status: Triage Needed
|
CRUX 3.6 x64
kernel 5.4.80
# modinfo zfs | grep -iw version
version: 2.0.3-1
# modinfo spl | grep -iw version
version: 2.0.3-1
after enabling CONFIG_LATENCYTOP in kernel and reboot
zfs stops working
|
1.0
|
zfs stops working - enabling CONFIG_LATENCYTOP - CRUX 3.6 x64
kernel 5.4.80
# modinfo zfs | grep -iw version
version: 2.0.3-1
# modinfo spl | grep -iw version
version: 2.0.3-1
after enabling CONFIG_LATENCYTOP in kernel and reboot
zfs stops working
|
defect
|
zfs stops working enabling config latencytop crux kernel modinfo zfs grep iw version version modinfo spl grep iw version version after enabling config latencytop in kernel and reboot zfs stops working
| 1
|
26,123
| 4,593,618,451
|
IssuesEvent
|
2016-09-21 02:03:29
|
afisher1/GridLAB-D
|
https://api.github.com/repos/afisher1/GridLAB-D
|
closed
|
#48 Document in code the unit tests that are implemented,
|
defect
|
or provide a link to the TSD that documents the test so that we can tell what the test is and uncovered why it might have failed. This has to be done for all modules that use unit testing.
,
|
1.0
|
#48 Document in code the unit tests that are implemented,
- or provide a link to the TSD that documents the test so that we can tell what the test is and uncovered why it might have failed. This has to be done for all modules that use unit testing.
,
|
defect
|
document in code the unit tests that are implemented or provide a link to the tsd that documents the test so that we can tell what the test is and uncovered why it might have failed this has to be done for all modules that use unit testing
| 1
|
235,256
| 25,920,059,393
|
IssuesEvent
|
2022-12-15 21:00:59
|
ZoeyVid/nginx-proxy-manager
|
https://api.github.com/repos/ZoeyVid/nginx-proxy-manager
|
closed
|
sqlite3-4.2.0.tgz: 1 vulnerabilities (highest severity is: 7.5)
|
security vulnerability
|
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sqlite3-4.2.0.tgz</b></p></summary>
<p>Asynchronous, non-blocking SQLite3 bindings</p>
<p>Library home page: <a href="https://registry.npmjs.org/sqlite3/-/sqlite3-4.2.0.tgz">https://registry.npmjs.org/sqlite3/-/sqlite3-4.2.0.tgz</a></p>
<p>Path to dependency file: /backend/package.json</p>
<p>Path to vulnerable library: /backend/node_modules/sqlite3/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/SanCraftDev/nginx-proxy-manager/commit/bea3a204e105782d93c19ade629f82dd6196cdff">bea3a204e105782d93c19ade629f82dd6196cdff</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (sqlite3 version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2022-21227](https://www.mend.io/vulnerability-database/CVE-2022-21227) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | sqlite3-4.2.0.tgz | Direct | 5.0.3 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-21227</summary>
### Vulnerable Library - <b>sqlite3-4.2.0.tgz</b></p>
<p>Asynchronous, non-blocking SQLite3 bindings</p>
<p>Library home page: <a href="https://registry.npmjs.org/sqlite3/-/sqlite3-4.2.0.tgz">https://registry.npmjs.org/sqlite3/-/sqlite3-4.2.0.tgz</a></p>
<p>Path to dependency file: /backend/package.json</p>
<p>Path to vulnerable library: /backend/node_modules/sqlite3/package.json</p>
<p>
Dependency Hierarchy:
- :x: **sqlite3-4.2.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/SanCraftDev/nginx-proxy-manager/commit/bea3a204e105782d93c19ade629f82dd6196cdff">bea3a204e105782d93c19ade629f82dd6196cdff</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine.
<p>Publish Date: 2022-05-01
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-21227>CVE-2022-21227</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-9qrh-qjmc-5w2p">https://github.com/advisories/GHSA-9qrh-qjmc-5w2p</a></p>
<p>Release Date: 2022-05-01</p>
<p>Fix Resolution: 5.0.3</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details>
|
True
|
sqlite3-4.2.0.tgz: 1 vulnerabilities (highest severity is: 7.5) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sqlite3-4.2.0.tgz</b></p></summary>
<p>Asynchronous, non-blocking SQLite3 bindings</p>
<p>Library home page: <a href="https://registry.npmjs.org/sqlite3/-/sqlite3-4.2.0.tgz">https://registry.npmjs.org/sqlite3/-/sqlite3-4.2.0.tgz</a></p>
<p>Path to dependency file: /backend/package.json</p>
<p>Path to vulnerable library: /backend/node_modules/sqlite3/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/SanCraftDev/nginx-proxy-manager/commit/bea3a204e105782d93c19ade629f82dd6196cdff">bea3a204e105782d93c19ade629f82dd6196cdff</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (sqlite3 version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2022-21227](https://www.mend.io/vulnerability-database/CVE-2022-21227) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | sqlite3-4.2.0.tgz | Direct | 5.0.3 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-21227</summary>
### Vulnerable Library - <b>sqlite3-4.2.0.tgz</b></p>
<p>Asynchronous, non-blocking SQLite3 bindings</p>
<p>Library home page: <a href="https://registry.npmjs.org/sqlite3/-/sqlite3-4.2.0.tgz">https://registry.npmjs.org/sqlite3/-/sqlite3-4.2.0.tgz</a></p>
<p>Path to dependency file: /backend/package.json</p>
<p>Path to vulnerable library: /backend/node_modules/sqlite3/package.json</p>
<p>
Dependency Hierarchy:
- :x: **sqlite3-4.2.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/SanCraftDev/nginx-proxy-manager/commit/bea3a204e105782d93c19ade629f82dd6196cdff">bea3a204e105782d93c19ade629f82dd6196cdff</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine.
<p>Publish Date: 2022-05-01
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-21227>CVE-2022-21227</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-9qrh-qjmc-5w2p">https://github.com/advisories/GHSA-9qrh-qjmc-5w2p</a></p>
<p>Release Date: 2022-05-01</p>
<p>Fix Resolution: 5.0.3</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details>
|
non_defect
|
tgz vulnerabilities highest severity is vulnerable library tgz asynchronous non blocking bindings library home page a href path to dependency file backend package json path to vulnerable library backend node modules package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in version remediation available high tgz direct details cve vulnerable library tgz asynchronous non blocking bindings library home page a href path to dependency file backend package json path to vulnerable library backend node modules package json dependency hierarchy x tgz vulnerable library found in head commit a href found in base branch develop vulnerability details the package before are vulnerable to denial of service dos which will invoke the tostring function of the passed parameter if passed an invalid function object it will throw and crash the engine publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
| 0
|
52,534
| 13,224,803,071
|
IssuesEvent
|
2020-08-17 19:52:49
|
icecube-trac/tix4
|
https://api.github.com/repos/icecube-trac/tix4
|
opened
|
[filterscripts] grecofilter crashes with Python3 (Trac #2391)
|
Incomplete Migration Migrated from Trac defect jeb + pnf
|
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/2391">https://code.icecube.wisc.edu/projects/icecube/ticket/2391</a>, reported by olivasand owned by blaufuss</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2020-06-24T12:31:42",
"_ts": "1593001902142004",
"description": "I'm getting the following error and a throw:\n\n{{{\nTraceback (most recent call last):\n File \"/home/olivas/icecube/combo/trunk/build/lib/icecube/filterscripts/grecofilter.py\", line 174, in FirstHit\n x, y, z, t, q = grecovariables.GetHitInformation(frame['I3Geometry'], hits, 1)\n File \"/home/olivas/icecube/combo/trunk/build/lib/icecube/filterscripts/grecovariables.py\", line 69, in GetHitInformation\n times, charges = np.array(map(lambda pulse: [pulse.time, pulse.charge], pulses)).T\nTypeError: iteration over a 0-d array\n\nThe above exception was the direct cause of the following exception:\n\nSystemError: <built-in method get of dict object at 0x7fbeaa2c5dc8> returned a result with an error set\n\nThe above exception was the direct cause of the following exception:\n\nTraceback (most recent call last):\n File \"/home/olivas/icecube/combo/trunk/build/filterscripts/resources/scripts/SimulationFiltering.py\", line 395, in <module>\n main(opts)\n File \"/home/olivas/icecube/combo/trunk/build/filterscripts/resources/scripts/SimulationFiltering.py\", line 352, in main\n tray.Execute()\n File \"/home/olivas/icecube/combo/trunk/build/lib/I3Tray.py\", line 256, in Execute\n super(I3Tray, self).Execute()\nSystemError: <built-in method get of dict object at 0x7fbeaa2c5dc8> returned a result with an error set\n}}}\n\nSetting the milestone for the Spring release, since we'll likely not be able to support Python3 with this release.",
"reporter": "olivas",
"cc": "mjlarson@umd.edu",
"resolution": "fixed",
"time": "2019-12-19T04:55:52",
"component": "jeb + pnf",
"summary": "[filterscripts] grecofilter crashes with Python3",
"priority": "blocker",
"keywords": "",
"milestone": "Autumnal Equinox 2020",
"owner": "blaufuss",
"type": "defect"
}
```
</p>
</details>
|
1.0
|
[filterscripts] grecofilter crashes with Python3 (Trac #2391) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/2391">https://code.icecube.wisc.edu/projects/icecube/ticket/2391</a>, reported by olivasand owned by blaufuss</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2020-06-24T12:31:42",
"_ts": "1593001902142004",
"description": "I'm getting the following error and a throw:\n\n{{{\nTraceback (most recent call last):\n File \"/home/olivas/icecube/combo/trunk/build/lib/icecube/filterscripts/grecofilter.py\", line 174, in FirstHit\n x, y, z, t, q = grecovariables.GetHitInformation(frame['I3Geometry'], hits, 1)\n File \"/home/olivas/icecube/combo/trunk/build/lib/icecube/filterscripts/grecovariables.py\", line 69, in GetHitInformation\n times, charges = np.array(map(lambda pulse: [pulse.time, pulse.charge], pulses)).T\nTypeError: iteration over a 0-d array\n\nThe above exception was the direct cause of the following exception:\n\nSystemError: <built-in method get of dict object at 0x7fbeaa2c5dc8> returned a result with an error set\n\nThe above exception was the direct cause of the following exception:\n\nTraceback (most recent call last):\n File \"/home/olivas/icecube/combo/trunk/build/filterscripts/resources/scripts/SimulationFiltering.py\", line 395, in <module>\n main(opts)\n File \"/home/olivas/icecube/combo/trunk/build/filterscripts/resources/scripts/SimulationFiltering.py\", line 352, in main\n tray.Execute()\n File \"/home/olivas/icecube/combo/trunk/build/lib/I3Tray.py\", line 256, in Execute\n super(I3Tray, self).Execute()\nSystemError: <built-in method get of dict object at 0x7fbeaa2c5dc8> returned a result with an error set\n}}}\n\nSetting the milestone for the Spring release, since we'll likely not be able to support Python3 with this release.",
"reporter": "olivas",
"cc": "mjlarson@umd.edu",
"resolution": "fixed",
"time": "2019-12-19T04:55:52",
"component": "jeb + pnf",
"summary": "[filterscripts] grecofilter crashes with Python3",
"priority": "blocker",
"keywords": "",
"milestone": "Autumnal Equinox 2020",
"owner": "blaufuss",
"type": "defect"
}
```
</p>
</details>
|
defect
|
grecofilter crashes with trac migrated from json status closed changetime ts description i m getting the following error and a throw n n ntraceback most recent call last n file home olivas icecube combo trunk build lib icecube filterscripts grecofilter py line in firsthit n x y z t q grecovariables gethitinformation frame hits n file home olivas icecube combo trunk build lib icecube filterscripts grecovariables py line in gethitinformation n times charges np array map lambda pulse pulses t ntypeerror iteration over a d array n nthe above exception was the direct cause of the following exception n nsystemerror returned a result with an error set n nthe above exception was the direct cause of the following exception n ntraceback most recent call last n file home olivas icecube combo trunk build filterscripts resources scripts simulationfiltering py line in n main opts n file home olivas icecube combo trunk build filterscripts resources scripts simulationfiltering py line in main n tray execute n file home olivas icecube combo trunk build lib py line in execute n super self execute nsystemerror returned a result with an error set n n nsetting the milestone for the spring release since we ll likely not be able to support with this release reporter olivas cc mjlarson umd edu resolution fixed time component jeb pnf summary grecofilter crashes with priority blocker keywords milestone autumnal equinox owner blaufuss type defect
| 1
|
98,889
| 11,099,862,612
|
IssuesEvent
|
2019-12-16 17:54:22
|
microsoft/qsharp-compiler
|
https://api.github.com/repos/microsoft/qsharp-compiler
|
opened
|
Documentation generation tool not resolving namespaces correctly in `# See Also` blocks.
|
bug documentation
|
**Describe the bug**
When generating documentation for `/// # See Also` blocks, the Q# compiler currently does not resolve identifier names for operations, functions and UDTs to their fully-qualified names. See microsoft/quantumlibraries#190 for an example.
**To Reproduce**
Generate documentation for an operation in the `Microsoft.Quantum.Arithmetic` namespace and with the following comment:
```Q#
/// # Summary
/// Performs a modular increment of a qubit register by an integer constant.
///
/// Let us denote `increment` by a, `modulus` by N and integer encoded in `target` by y.
/// Then the operation performs the following transformation:
/// \begin{align}
/// \ket{y} \mapsto \ket{(y + a) \operatorname{mod} N}
/// \end{align}
/// Integers are encoded in little-endian format.
///
/// # Input
/// ## increment
/// Integer increment a to be added to y.
/// ## modulus
/// Integer N that mods y + a.
/// ## target
/// Integer y in `LittleEndian` format that `increment` a is added to.
///
/// # See Also
/// - IncrementPhaseByModularInteger
///
/// # Remarks
/// Assumes that the initial value of target is less than N
/// and that the increment a is less than N.
/// Note that
/// <xref:microsoft.quantum.arithmetic.incrementphasebymodularinteger> implements
/// the same operation in the `PhaseLittleEndian` basis.
operation IncrementByModularInteger(increment : Int, modulus : Int, target : LittleEndian) : Unit {
```
**Expected behavior**
Expected that the above would typeset the same as replacing the `# See Also` block with:
```Q#
/// # See Also
/// - Microsoft.Quantum.Arithmetic.IncrementPhaseByModularInteger
```
**Screenshots**
Actual rendering:

|
1.0
|
Documentation generation tool not resolving namespaces correctly in `# See Also` blocks. - **Describe the bug**
When generating documentation for `/// # See Also` blocks, the Q# compiler currently does not resolve identifier names for operations, functions and UDTs to their fully-qualified names. See microsoft/quantumlibraries#190 for an example.
**To Reproduce**
Generate documentation for an operation in the `Microsoft.Quantum.Arithmetic` namespace and with the following comment:
```Q#
/// # Summary
/// Performs a modular increment of a qubit register by an integer constant.
///
/// Let us denote `increment` by a, `modulus` by N and integer encoded in `target` by y.
/// Then the operation performs the following transformation:
/// \begin{align}
/// \ket{y} \mapsto \ket{(y + a) \operatorname{mod} N}
/// \end{align}
/// Integers are encoded in little-endian format.
///
/// # Input
/// ## increment
/// Integer increment a to be added to y.
/// ## modulus
/// Integer N that mods y + a.
/// ## target
/// Integer y in `LittleEndian` format that `increment` a is added to.
///
/// # See Also
/// - IncrementPhaseByModularInteger
///
/// # Remarks
/// Assumes that the initial value of target is less than N
/// and that the increment a is less than N.
/// Note that
/// <xref:microsoft.quantum.arithmetic.incrementphasebymodularinteger> implements
/// the same operation in the `PhaseLittleEndian` basis.
operation IncrementByModularInteger(increment : Int, modulus : Int, target : LittleEndian) : Unit {
```
**Expected behavior**
Expected that the above would typeset the same as replacing the `# See Also` block with:
```Q#
/// # See Also
/// - Microsoft.Quantum.Arithmetic.IncrementPhaseByModularInteger
```
**Screenshots**
Actual rendering:

|
non_defect
|
documentation generation tool not resolving namespaces correctly in see also blocks describe the bug when generating documentation for see also blocks the q compiler currently does not resolve identifier names for operations functions and udts to their fully qualified names see microsoft quantumlibraries for an example to reproduce generate documentation for an operation in the microsoft quantum arithmetic namespace and with the following comment q summary performs a modular increment of a qubit register by an integer constant let us denote increment by a modulus by n and integer encoded in target by y then the operation performs the following transformation begin align ket y mapsto ket y a operatorname mod n end align integers are encoded in little endian format input increment integer increment a to be added to y modulus integer n that mods y a target integer y in littleendian format that increment a is added to see also incrementphasebymodularinteger remarks assumes that the initial value of target is less than n and that the increment a is less than n note that implements the same operation in the phaselittleendian basis operation incrementbymodularinteger increment int modulus int target littleendian unit expected behavior expected that the above would typeset the same as replacing the see also block with q see also microsoft quantum arithmetic incrementphasebymodularinteger screenshots actual rendering
| 0
|
816,056
| 30,586,203,613
|
IssuesEvent
|
2023-07-21 13:34:11
|
calcom/cal.com
|
https://api.github.com/repos/calcom/cal.com
|
closed
|
[CAL-2183] Fix sluggish parts of event type overview
|
๐งน Improvements High priority event-types
|
### Issue Summary
Using the event type overview is very sluggish. When I select an event type, it takes at least 4 seconds for the event type to load. A skeleton should be used here to give the user direct feedback that something is about to happen.
<sub>[CAL-2183](https://linear.app/calcom/issue/CAL-2183/fix-sluggish-parts-of-event-type-overview)</sub>
|
1.0
|
[CAL-2183] Fix sluggish parts of event type overview - ### Issue Summary
Using the event type overview is very sluggish. When I select an event type, it takes at least 4 seconds for the event type to load. A skeleton should be used here to give the user direct feedback that something is about to happen.
<sub>[CAL-2183](https://linear.app/calcom/issue/CAL-2183/fix-sluggish-parts-of-event-type-overview)</sub>
|
non_defect
|
fix sluggish parts of event type overview issue summary using the event type overview is very sluggish when i select an event type it takes at least seconds for the event type to load a skeleton should be used here to give the user direct feedback that something is about to happen
| 0
|
106,212
| 11,473,051,251
|
IssuesEvent
|
2020-02-09 20:51:19
|
ccache/ccache
|
https://api.github.com/repos/ccache/ccache
|
closed
|
-MQ gcc option breaks "compiling same file" heuristic
|
documentation support
|
`-MQ path` is one of options that mesonbuild system always adds. It makes ccache to not notice that the same file is being compiled, so basically that affects all projects that are using mesonbuild.
## Steps to reproduce *(in terms of terminal commands)*
```bash
$ cat slow.cpp
template <int i>
class A {
A<i-1> x;
A<i-2> y;
};
template <> class A<0> {
char a;
};
template <> class A<1> {
char a;
};
void slow() {
A<35> b;
}
$ ccache -C
Cleared cache
$ time ccache c++ -g -MD -MQ slow1.cpp.o -o slow.cpp.o -c slow.cpp
ccache c++ -g -MD -MQ slow1.cpp.o -o slow.cpp.o -c slow.cpp
3.18s user 0.04s system 99% cpu 3.220 total
$ time ccache c++ -g -MD -MQ slow2.cpp.o -o slow.cpp.o -c slow.cpp
ccache c++ -g -MD -MQ slow2.cpp.o -o slow.cpp.o -c slow.cpp
3.18s user 0.02s system 99% cpu 3.200 total
```
## Expected
The second compilation should've taken much less time
## Actual
Both compilations take the same time.
## Version
ccache 3.6
|
1.0
|
-MQ gcc option breaks "compiling same file" heuristic - `-MQ path` is one of options that mesonbuild system always adds. It makes ccache to not notice that the same file is being compiled, so basically that affects all projects that are using mesonbuild.
## Steps to reproduce *(in terms of terminal commands)*
```bash
$ cat slow.cpp
template <int i>
class A {
A<i-1> x;
A<i-2> y;
};
template <> class A<0> {
char a;
};
template <> class A<1> {
char a;
};
void slow() {
A<35> b;
}
$ ccache -C
Cleared cache
$ time ccache c++ -g -MD -MQ slow1.cpp.o -o slow.cpp.o -c slow.cpp
ccache c++ -g -MD -MQ slow1.cpp.o -o slow.cpp.o -c slow.cpp
3.18s user 0.04s system 99% cpu 3.220 total
$ time ccache c++ -g -MD -MQ slow2.cpp.o -o slow.cpp.o -c slow.cpp
ccache c++ -g -MD -MQ slow2.cpp.o -o slow.cpp.o -c slow.cpp
3.18s user 0.02s system 99% cpu 3.200 total
```
## Expected
The second compilation should've taken much less time
## Actual
Both compilations take the same time.
## Version
ccache 3.6
|
non_defect
|
mq gcc option breaks compiling same file heuristic mq path is one of options that mesonbuild system always adds it makes ccache to not notice that the same file is being compiled so basically that affects all projects that are using mesonbuild steps to reproduce in terms of terminal commands bash cat slow cpp template class a a x a y template class a char a template class a char a void slow a b ccache c cleared cache time ccache c g md mq cpp o o slow cpp o c slow cpp ccache c g md mq cpp o o slow cpp o c slow cpp user system cpu total time ccache c g md mq cpp o o slow cpp o c slow cpp ccache c g md mq cpp o o slow cpp o c slow cpp user system cpu total expected the second compilation should ve taken much less time actual both compilations take the same time version ccache
| 0
|
40,965
| 5,287,423,914
|
IssuesEvent
|
2017-02-08 12:18:20
|
Ulm-IQO/qudi
|
https://api.github.com/repos/Ulm-IQO/qudi
|
closed
|
Reorder the lorentzianlikemethods functions
|
comp:fit_logic design issue task
|
ONLY CHANGE IN THE fit_overhaul BRANCH! If you accidentally do this in master it will break fits for people!
The lorentzianlikemethods.py file in logic/fitmethods needs to be restructured to make it easier to read. The required structure is exemplified in logic/fitmethods/gaussianlikemethods.py and is summarised at [this card](https://github.com/Ulm-IQO/qudi/projects/2#card-1593237).
In the process it is important to remove any duplicated make_*_fit functions. For example, make_gaussianpeak_fit and make_gaussiandip_fit were duplicated functions that differed *only* in the estimator used. The right way is to have make_gaussian_fit and then use two estimators estimate_gaussian_dip and estimate_gaussian_peak .
Make sure that the `estimate_<fitname>_*` has <fitname> exactly matching the `make_<fitname>_fit` for which it is designed.
|
1.0
|
Reorder the lorentzianlikemethods functions - ONLY CHANGE IN THE fit_overhaul BRANCH! If you accidentally do this in master it will break fits for people!
The lorentzianlikemethods.py file in logic/fitmethods needs to be restructured to make it easier to read. The required structure is exemplified in logic/fitmethods/gaussianlikemethods.py and is summarised at [this card](https://github.com/Ulm-IQO/qudi/projects/2#card-1593237).
In the process it is important to remove any duplicated make_*_fit functions. For example, make_gaussianpeak_fit and make_gaussiandip_fit were duplicated functions that differed *only* in the estimator used. The right way is to have make_gaussian_fit and then use two estimators estimate_gaussian_dip and estimate_gaussian_peak .
Make sure that the `estimate_<fitname>_*` has <fitname> exactly matching the `make_<fitname>_fit` for which it is designed.
|
non_defect
|
reorder the lorentzianlikemethods functions only change in the fit overhaul branch if you accidentally do this in master it will break fits for people the lorentzianlikemethods py file in logic fitmethods needs to be restructured to make it easier to read the required structure is exemplified in logic fitmethods gaussianlikemethods py and is summarised at in the process it is important to remove any duplicated make fit functions for example make gaussianpeak fit and make gaussiandip fit were duplicated functions that differed only in the estimator used the right way is to have make gaussian fit and then use two estimators estimate gaussian dip and estimate gaussian peak make sure that the estimate has exactly matching the make fit for which it is designed
| 0
|
411,462
| 27,823,176,140
|
IssuesEvent
|
2023-03-19 13:23:05
|
deepchecks/deepchecks
|
https://api.github.com/repos/deepchecks/deepchecks
|
opened
|
Deepchecks Fix - documentation
|
documentation ds
|
1. Write user guide - full with use-case, that shows the corrupted data, its fixes, and the change in performance. Add explanations on how to use.
2. Add complete docstrings for all .fix() and .fix_logic() functions.
|
1.0
|
Deepchecks Fix - documentation - 1. Write user guide - full with use-case, that shows the corrupted data, its fixes, and the change in performance. Add explanations on how to use.
2. Add complete docstrings for all .fix() and .fix_logic() functions.
|
non_defect
|
deepchecks fix documentation write user guide full with use case that shows the corrupted data its fixes and the change in performance add explanations on how to use add complete docstrings for all fix and fix logic functions
| 0
|
39,390
| 15,984,172,790
|
IssuesEvent
|
2021-04-18 12:10:11
|
localstack/localstack
|
https://api.github.com/repos/localstack/localstack
|
closed
|
listObjects doesn't handle url-encoded delimiters
|
service:s3 should-be-fixed usage
|
# Type of request: This is a ...
[x] bug report
[ ] feature request
# Detailed description
Localstack doesn't seem to handle sending back the list of objects in a bucket if the delimiter passed in the S3 URL is URL-encoded.
In my case the delimiter is "/" which is URL encoded as "%2F" by the AWS PHP SDK.
## Expected behavior
I expect the list of objects to be sent back.
## Actual behavior
Here is the error message that I get from the AWS PHP SDK when trying to list objects:
```
Fatal error: Uncaught exception 'Aws\S3\Exception\S3Exception' with message 'Error executing "ListObjects" on "http://localstack:4566/mybucket?prefix=&delimiter=%2F&encoding-type=url"; AWS HTTP error: Client error: `GET http://localstack:4566/mybucket?prefix=&delimiter=%2F&encoding-type=url` resulted in a `404
Not Found` response:
{"status": "running"}
```
And indeed:
```
# curl "http://localstack:4566/mybucket?prefix=&delimiter=%2F&encoding-type=url"
{"status": "running"}
```
but if I curl Localstack with a non-URL-encoded delimiter parameter then it works:
```
# curl "http://localstack:4566/mybucket?prefix=&delimiter=/&encoding-type=url"
<?xml version="1.0" encoding="UTF-8"?><ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Name>mybucket</Name><Prefix></Prefix><MaxKeys>1000</MaxKeys><Delimiter>/</Delimiter><IsTruncated>false</IsTruncated></ListBucketResult>
```
# Steps to reproduce
## Client code (AWS SDK code snippet, or sequence of "awslocal" commands)
I created a small repo that allows to reproduce the issue: https://github.com/bperel/localstack_delimiter_issue_poc
|
1.0
|
listObjects doesn't handle url-encoded delimiters - # Type of request: This is a ...
[x] bug report
[ ] feature request
# Detailed description
Localstack doesn't seem to handle sending back the list of objects in a bucket if the delimiter passed in the S3 URL is URL-encoded.
In my case the delimiter is "/" which is URL encoded as "%2F" by the AWS PHP SDK.
## Expected behavior
I expect the list of objects to be sent back.
## Actual behavior
Here is the error message that I get from the AWS PHP SDK when trying to list objects:
```
Fatal error: Uncaught exception 'Aws\S3\Exception\S3Exception' with message 'Error executing "ListObjects" on "http://localstack:4566/mybucket?prefix=&delimiter=%2F&encoding-type=url"; AWS HTTP error: Client error: `GET http://localstack:4566/mybucket?prefix=&delimiter=%2F&encoding-type=url` resulted in a `404
Not Found` response:
{"status": "running"}
```
And indeed:
```
# curl "http://localstack:4566/mybucket?prefix=&delimiter=%2F&encoding-type=url"
{"status": "running"}
```
but if I curl Localstack with a non-URL-encoded delimiter parameter then it works:
```
# curl "http://localstack:4566/mybucket?prefix=&delimiter=/&encoding-type=url"
<?xml version="1.0" encoding="UTF-8"?><ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Name>mybucket</Name><Prefix></Prefix><MaxKeys>1000</MaxKeys><Delimiter>/</Delimiter><IsTruncated>false</IsTruncated></ListBucketResult>
```
# Steps to reproduce
## Client code (AWS SDK code snippet, or sequence of "awslocal" commands)
I created a small repo that allows to reproduce the issue: https://github.com/bperel/localstack_delimiter_issue_poc
|
non_defect
|
listobjects doesn t handle url encoded delimiters type of request this is a bug report feature request detailed description localstack doesn t seem to handle sending back the list of objects in a bucket if the delimiter passed in the url is url encoded in my case the delimiter is which is url encoded as by the aws php sdk expected behavior i expect the list of objects to be sent back actual behavior here is the error message that i get from the aws php sdk when trying to list objects fatal error uncaught exception aws exception with message error executing listobjects on aws http error client error get resulted in a not found response status running and indeed curl status running but if i curl localstack with a non url encoded delimiter parameter then it works curl listbucketresult xmlns steps to reproduce client code aws sdk code snippet or sequence of awslocal commands i created a small repo that allows to reproduce the issue
| 0
|
30,669
| 6,220,767,240
|
IssuesEvent
|
2017-07-10 01:40:26
|
MDAnalysis/mdanalysis
|
https://api.github.com/repos/MDAnalysis/mdanalysis
|
closed
|
DCD Reader timeseries does not read backwards
|
Component-Readers defect Difficulty-hard Format-DCD
|
### Expected behaviour
In creation of a DCD timeseries, a step of -1 should yield a timeseries that travels backwards across a DCD file.
### Actual behaviour
The DCD timeseries will behave as if a step of 1 was given, and the increment from the start.
### Code to reproduce the behaviour
``` python
import MDAnalysis as mda
u = mda.Universe(PSF, DCD)
atoms = u.select_atoms('backbone and name CA')
ts = u.trajectory.timeseries(atoms)
ts_negative = u.trajectory.timeseries(atoms, start=5, stop=1, step=-1)
# (ts[:, 5:1:-1, :] != ts_negative
# ts_negative == ts[:, 5:9:1, :]
```
### Current reason for this behavior
Trying to grok the C code. Give me a few ~~hours~~, ~~days~~, months
### Current version of MDAnalysis:
0.15.1-dev0
|
1.0
|
DCD Reader timeseries does not read backwards - ### Expected behaviour
In creation of a DCD timeseries, a step of -1 should yield a timeseries that travels backwards across a DCD file.
### Actual behaviour
The DCD timeseries will behave as if a step of 1 was given, and the increment from the start.
### Code to reproduce the behaviour
``` python
import MDAnalysis as mda
u = mda.Universe(PSF, DCD)
atoms = u.select_atoms('backbone and name CA')
ts = u.trajectory.timeseries(atoms)
ts_negative = u.trajectory.timeseries(atoms, start=5, stop=1, step=-1)
# (ts[:, 5:1:-1, :] != ts_negative
# ts_negative == ts[:, 5:9:1, :]
```
### Current reason for this behavior
Trying to grok the C code. Give me a few ~~hours~~, ~~days~~, months
### Current version of MDAnalysis:
0.15.1-dev0
|
defect
|
dcd reader timeseries does not read backwards expected behaviour in creation of a dcd timeseries a step of should yield a timeseries that travels backwards across a dcd file actual behaviour the dcd timeseries will behave as if a step of was given and the increment from the start code to reproduce the behaviour python import mdanalysis as mda u mda universe psf dcd atoms u select atoms backbone and name ca ts u trajectory timeseries atoms ts negative u trajectory timeseries atoms start stop step ts ts negative ts negative ts current reason for this behavior trying to grok the c code give me a few hours days months current version of mdanalysis
| 1
|
156,992
| 24,627,741,884
|
IssuesEvent
|
2022-10-16 18:34:05
|
dotnet/efcore
|
https://api.github.com/repos/dotnet/efcore
|
closed
|
InMemory: Server side null safety does not work always
|
type-bug closed-by-design customer-reported area-query area-in-memory
|
```C#
var actual = context.Set<DateTimeEnclosure>()
.Select(e => new { DT = e.DateTimeOffset == null ? (DateTime?)null : e.DateTimeOffset.Value.DateTime.Date }).ToList();
```
We translate the whole thing to server side but we do `.Value` over `Nullable<DateTimeOffset>` which throws with null value.
Test: Optional_datetime_reading_null_from_database
|
1.0
|
InMemory: Server side null safety does not work always - ```C#
var actual = context.Set<DateTimeEnclosure>()
.Select(e => new { DT = e.DateTimeOffset == null ? (DateTime?)null : e.DateTimeOffset.Value.DateTime.Date }).ToList();
```
We translate the whole thing to server side but we do `.Value` over `Nullable<DateTimeOffset>` which throws with null value.
Test: Optional_datetime_reading_null_from_database
|
non_defect
|
inmemory server side null safety does not work always c var actual context set select e new dt e datetimeoffset null datetime null e datetimeoffset value datetime date tolist we translate the whole thing to server side but we do value over nullable which throws with null value test optional datetime reading null from database
| 0
|
36,469
| 7,953,376,440
|
IssuesEvent
|
2018-07-12 01:07:35
|
STEllAR-GROUP/phylanx
|
https://api.github.com/repos/STEllAR-GROUP/phylanx
|
closed
|
Empty list defined inside Phylanx function has an issues
|
category: @Phylanx type: defect
|
Empty list defined inside Phylanx function can automatically append the input list of the function.
For example,
code
```
from phylanx.ast import *
import numpy as np
@Phylanx(debug=True)
def testing_list(a):
b = []
print(b)
a = [4, 3, 2, 1]
testing_list(a)
```
yields
```
define(
testing_list,
a,
block(
define(
b,
make_list()
),
(
cout(b)
)
)
)
make_list(make_list(4, 3, 2, 1))
```
|
1.0
|
Empty list defined inside Phylanx function has an issues - Empty list defined inside Phylanx function can automatically append the input list of the function.
For example,
code
```
from phylanx.ast import *
import numpy as np
@Phylanx(debug=True)
def testing_list(a):
b = []
print(b)
a = [4, 3, 2, 1]
testing_list(a)
```
yields
```
define(
testing_list,
a,
block(
define(
b,
make_list()
),
(
cout(b)
)
)
)
make_list(make_list(4, 3, 2, 1))
```
|
defect
|
empty list defined inside phylanx function has an issues empty list defined inside phylanx function can automatically append the input list of the function for example code from phylanx ast import import numpy as np phylanx debug true def testing list a b print b a testing list a yields define testing list a block define b make list cout b make list make list
| 1
|
29,305
| 5,641,764,049
|
IssuesEvent
|
2017-04-06 19:29:21
|
NeoVintageous/NeoVintageous
|
https://api.github.com/repos/NeoVintageous/NeoVintageous
|
opened
|
Map conflicts
|
AREA: mappings TYPE: defect
|
<a href="https://github.com/leonardt"><img src="https://avatars0.githubusercontent.com/u/3766436?v=3" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [leonardt](https://github.com/leonardt)**
_Tuesday Apr 01, 2014 at 21:38 GMT_
_Originally opened as https://github.com/guillermooo/Vintageous/issues/570_
----
https://github.com/guillermooo/Vintageous_Plugin_Surround/issues/6
> leonardt commented 6 hours ago
> Not sure if this issue belongs in Vintageous main or here, I can move it if you want.
>
> I run colemak so I remapped movement keys to s, t, n, e. With normal commands (i.e. f, n) everything works fine, but Surround thinks I'm pressing c h (because of :map s h). Would there be a way to fix this?Or is this unavoidable due to the architecture of handling key bindings and presses?
>
> guillermooo commented 4 hours ago
> My guess is that keys in OP PENDING mode are not handled properly for plugins, but I'm not sure. Definitely a bug -- I'd say in Vintageous. The current architecture around mappings and plugins is just the bare bones to make it work. Feel free to link this bug from Vintageous' issue tracker so it doesn't slip through the cracks.
|
1.0
|
Map conflicts - <a href="https://github.com/leonardt"><img src="https://avatars0.githubusercontent.com/u/3766436?v=3" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [leonardt](https://github.com/leonardt)**
_Tuesday Apr 01, 2014 at 21:38 GMT_
_Originally opened as https://github.com/guillermooo/Vintageous/issues/570_
----
https://github.com/guillermooo/Vintageous_Plugin_Surround/issues/6
> leonardt commented 6 hours ago
> Not sure if this issue belongs in Vintageous main or here, I can move it if you want.
>
> I run colemak so I remapped movement keys to s, t, n, e. With normal commands (i.e. f, n) everything works fine, but Surround thinks I'm pressing c h (because of :map s h). Would there be a way to fix this?Or is this unavoidable due to the architecture of handling key bindings and presses?
>
> guillermooo commented 4 hours ago
> My guess is that keys in OP PENDING mode are not handled properly for plugins, but I'm not sure. Definitely a bug -- I'd say in Vintageous. The current architecture around mappings and plugins is just the bare bones to make it work. Feel free to link this bug from Vintageous' issue tracker so it doesn't slip through the cracks.
|
defect
|
map conflicts issue by tuesday apr at gmt originally opened as leonardt commented hours ago not sure if this issue belongs in vintageous main or here i can move it if you want i run colemak so i remapped movement keys to s t n e with normal commands i e f n everything works fine but surround thinks i m pressing c h because of map s h would there be a way to fix this or is this unavoidable due to the architecture of handling key bindings and presses guillermooo commented hours ago my guess is that keys in op pending mode are not handled properly for plugins but i m not sure definitely a bug i d say in vintageous the current architecture around mappings and plugins is just the bare bones to make it work feel free to link this bug from vintageous issue tracker so it doesn t slip through the cracks
| 1
|
67,430
| 20,961,611,963
|
IssuesEvent
|
2022-03-27 21:49:22
|
abedmaatalla/sipdroid
|
https://api.github.com/repos/abedmaatalla/sipdroid
|
closed
|
G729 codec :: source add
|
Priority-Medium Type-Defect auto-migrated
|
```
Hi,
I want to add G729 codec in Sipdroid.
But i dont want to add .so file. Rather i want to use java source code of G729
codec. I want your valuable suggestion and co-operation.
Thanks
```
Original issue reported on code.google.com by `reefat0...@gmail.com` on 12 Feb 2012 at 11:17
- Merged into: #344
|
1.0
|
G729 codec :: source add - ```
Hi,
I want to add G729 codec in Sipdroid.
But i dont want to add .so file. Rather i want to use java source code of G729
codec. I want your valuable suggestion and co-operation.
Thanks
```
Original issue reported on code.google.com by `reefat0...@gmail.com` on 12 Feb 2012 at 11:17
- Merged into: #344
|
defect
|
codec source add hi i want to add codec in sipdroid but i dont want to add so file rather i want to use java source code of codec i want your valuable suggestion and co operation thanks original issue reported on code google com by gmail com on feb at merged into
| 1
|
30,976
| 11,860,493,478
|
IssuesEvent
|
2020-03-25 14:58:29
|
TreyM-WSS/whitesource-demo-1
|
https://api.github.com/repos/TreyM-WSS/whitesource-demo-1
|
opened
|
CVE-2015-9251 (Medium) detected in jquery-1.4.4.min.js
|
security vulnerability
|
## CVE-2015-9251 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.4.4.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.4.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.4.4/jquery.min.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/whitesource-demo-1/node_modules/selenium-webdriver/lib/test/data/droppableItems.html</p>
<p>Path to vulnerable library: /whitesource-demo-1/node_modules/selenium-webdriver/lib/test/data/js/jquery-1.4.4.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.4.4.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/TreyM-WSS/whitesource-demo-1/commit/afe1334984105dcff7dbeba0cbcb6b5f49444b16">afe1334984105dcff7dbeba0cbcb6b5f49444b16</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251>CVE-2015-9251</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v3.0.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.4.4","isTransitiveDependency":false,"dependencyTree":"jquery:1.4.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jQuery - v3.0.0"}],"vulnerabilityIdentifier":"CVE-2015-9251","vulnerabilityDetails":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
|
True
|
CVE-2015-9251 (Medium) detected in jquery-1.4.4.min.js - ## CVE-2015-9251 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.4.4.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.4.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.4.4/jquery.min.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/whitesource-demo-1/node_modules/selenium-webdriver/lib/test/data/droppableItems.html</p>
<p>Path to vulnerable library: /whitesource-demo-1/node_modules/selenium-webdriver/lib/test/data/js/jquery-1.4.4.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.4.4.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/TreyM-WSS/whitesource-demo-1/commit/afe1334984105dcff7dbeba0cbcb6b5f49444b16">afe1334984105dcff7dbeba0cbcb6b5f49444b16</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251>CVE-2015-9251</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v3.0.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.4.4","isTransitiveDependency":false,"dependencyTree":"jquery:1.4.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jQuery - v3.0.0"}],"vulnerabilityIdentifier":"CVE-2015-9251","vulnerabilityDetails":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
|
non_defect
|
cve medium detected in jquery min js cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file tmp ws scm whitesource demo node modules selenium webdriver lib test data droppableitems html path to vulnerable library whitesource demo node modules selenium webdriver lib test data js jquery min js dependency hierarchy x jquery min js vulnerable library found in head commit a href vulnerability details jquery before is vulnerable to cross site scripting xss attacks when a cross domain ajax request is performed without the datatype option causing text javascript responses to be executed publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails jquery before is vulnerable to cross site scripting xss attacks when a cross domain ajax request is performed without the datatype option causing text javascript responses to be executed vulnerabilityurl
| 0
|
188,188
| 6,773,825,635
|
IssuesEvent
|
2017-10-27 08:00:54
|
vincentrk/quadrodoodle
|
https://api.github.com/repos/vincentrk/quadrodoodle
|
closed
|
Check JS sensitivity in Yaw and Full control modes
|
high priority
|
Currently sensitivity is too low
Try to figure out why
|
1.0
|
Check JS sensitivity in Yaw and Full control modes - Currently sensitivity is too low
Try to figure out why
|
non_defect
|
check js sensitivity in yaw and full control modes currently sensitivity is too low try to figure out why
| 0
|
301,219
| 9,217,719,435
|
IssuesEvent
|
2019-03-11 11:30:11
|
wso2/product-is
|
https://api.github.com/repos/wso2/product-is
|
closed
|
Disabling the feature tenant wise authentication sequence
|
Affected/5.8.0-M24 Component/Adaptive Auth Priority/High Severity/Minor Type/Task
|
Disabling the feature[1] tenant wise authentication sequence since the feature is not in production ready state.
[1] https://github.com/wso2/product-is/issues/3792
|
1.0
|
Disabling the feature tenant wise authentication sequence - Disabling the feature[1] tenant wise authentication sequence since the feature is not in production ready state.
[1] https://github.com/wso2/product-is/issues/3792
|
non_defect
|
disabling the feature tenant wise authentication sequence disabling the feature tenant wise authentication sequence since the feature is not in production ready state
| 0
|
48,885
| 13,184,766,840
|
IssuesEvent
|
2020-08-12 20:03:21
|
icecube-trac/tix3
|
https://api.github.com/repos/icecube-trac/tix3
|
opened
|
buggy nutau (Trac #383)
|
Incomplete Migration Migrated from Trac combo simulation defect
|
<details>
<summary>_Migrated from https://code.icecube.wisc.edu/ticket/383
, reported by olivas and owned by olivas_</summary>
<p>
```json
{
"status": "closed",
"changetime": "2014-11-22T18:26:26",
"description": "it seems to me that in the nutau nugen dataset 6539 the light emission\nfrom muons (if present in the event) is missing. I attach a scatter plot\nof muon energy vs muon track length (LDir) in IceCube. This should depend\nonly on the muon energy (and vertex position), but not on the primary\ntype. However, the reconstructed track length is aleays around 100m for\nnu-tau primary. That value can be reached by the cascade at sufficiently\nhigh energy.\n\nIt looks like there are two populations of muons in the tau MC, as I would\nexpect: one at very low muon energy (below 10 GeV) originating in the\ncascade. The other component is at higher energies (>100 GeV) and is\noriginating in the 17% tau->muon decay channel. So the particle phyiscs\nseems okay in that MC, but it was probably missed to simulate the light\nfrom the muon. This makes dataset 6539 unusable. We need urgently a fixed\nnutau dataset.\n\n Cheers,\n Andreas\n\n\nThis is likely due to the way nugen uses the propagators. For NuTau it uses the tau\npropagator and would not propagate muons in the final state.",
"reporter": "olivas",
"cc": "",
"resolution": "fixed",
"_ts": "1416680786826176",
"component": "combo simulation",
"summary": "buggy nutau",
"priority": "normal",
"keywords": "",
"time": "2012-03-23T19:23:00",
"milestone": "",
"owner": "olivas",
"type": "defect"
}
```
</p>
</details>
|
1.0
|
buggy nutau (Trac #383) - <details>
<summary>_Migrated from https://code.icecube.wisc.edu/ticket/383
, reported by olivas and owned by olivas_</summary>
<p>
```json
{
"status": "closed",
"changetime": "2014-11-22T18:26:26",
"description": "it seems to me that in the nutau nugen dataset 6539 the light emission\nfrom muons (if present in the event) is missing. I attach a scatter plot\nof muon energy vs muon track length (LDir) in IceCube. This should depend\nonly on the muon energy (and vertex position), but not on the primary\ntype. However, the reconstructed track length is aleays around 100m for\nnu-tau primary. That value can be reached by the cascade at sufficiently\nhigh energy.\n\nIt looks like there are two populations of muons in the tau MC, as I would\nexpect: one at very low muon energy (below 10 GeV) originating in the\ncascade. The other component is at higher energies (>100 GeV) and is\noriginating in the 17% tau->muon decay channel. So the particle phyiscs\nseems okay in that MC, but it was probably missed to simulate the light\nfrom the muon. This makes dataset 6539 unusable. We need urgently a fixed\nnutau dataset.\n\n Cheers,\n Andreas\n\n\nThis is likely due to the way nugen uses the propagators. For NuTau it uses the tau\npropagator and would not propagate muons in the final state.",
"reporter": "olivas",
"cc": "",
"resolution": "fixed",
"_ts": "1416680786826176",
"component": "combo simulation",
"summary": "buggy nutau",
"priority": "normal",
"keywords": "",
"time": "2012-03-23T19:23:00",
"milestone": "",
"owner": "olivas",
"type": "defect"
}
```
</p>
</details>
|
defect
|
buggy nutau trac migrated from reported by olivas and owned by olivas json status closed changetime description it seems to me that in the nutau nugen dataset the light emission nfrom muons if present in the event is missing i attach a scatter plot nof muon energy vs muon track length ldir in icecube this should depend nonly on the muon energy and vertex position but not on the primary ntype however the reconstructed track length is aleays around for nnu tau primary that value can be reached by the cascade at sufficiently nhigh energy n nit looks like there are two populations of muons in the tau mc as i would nexpect one at very low muon energy below gev originating in the ncascade the other component is at higher energies gev and is noriginating in the tau muon decay channel so the particle phyiscs nseems okay in that mc but it was probably missed to simulate the light nfrom the muon this makes dataset unusable we need urgently a fixed nnutau dataset n n cheers n andreas n n nthis is likely due to the way nugen uses the propagators for nutau it uses the tau npropagator and would not propagate muons in the final state reporter olivas cc resolution fixed ts component combo simulation summary buggy nutau priority normal keywords time milestone owner olivas type defect
| 1
|
52,780
| 13,225,057,667
|
IssuesEvent
|
2020-08-17 20:24:12
|
icecube-trac/tix4
|
https://api.github.com/repos/icecube-trac/tix4
|
closed
|
Trigger hierarchy is flattened somewhere in DAQ decoding (Trac #327)
|
Migrated from Trac combo core defect
|
Somewhere in the decoding of the triggers from DAQ the hierarchy is flattened. The parent-child relationships are set on the DAQ side and simulated, but in data ( PFFilt ) those relationships don't seem to be translated. All triggers appear in the hierarchy as top-level nodes. I think the "problem" is here:
http://code.icecube.wisc.edu/projects/icecube/browser/projects/payload-parsing/trunk/private/payload-parsing/decode_22.cxx#L137
If a parent iterator was passed here I think this would fix it.
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/327">https://code.icecube.wisc.edu/projects/icecube/ticket/327</a>, reported by olivasand owned by blaufuss</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2015-02-11T19:37:24",
"_ts": "1423683444935952",
"description": "Somewhere in the decoding of the triggers from DAQ the hierarchy is flattened. The parent-child relationships are set on the DAQ side and simulated, but in data ( PFFilt ) those relationships don't seem to be translated. All triggers appear in the hierarchy as top-level nodes. I think the \"problem\" is here:\nhttp://code.icecube.wisc.edu/projects/icecube/browser/projects/payload-parsing/trunk/private/payload-parsing/decode_22.cxx#L137\n\nIf a parent iterator was passed here I think this would fix it. ",
"reporter": "olivas",
"cc": "",
"resolution": "wontfix",
"time": "2011-11-08T02:59:03",
"component": "combo core",
"summary": "Trigger hierarchy is flattened somewhere in DAQ decoding",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "blaufuss",
"type": "defect"
}
```
</p>
</details>
|
1.0
|
Trigger hierarchy is flattened somewhere in DAQ decoding (Trac #327) - Somewhere in the decoding of the triggers from DAQ the hierarchy is flattened. The parent-child relationships are set on the DAQ side and simulated, but in data ( PFFilt ) those relationships don't seem to be translated. All triggers appear in the hierarchy as top-level nodes. I think the "problem" is here:
http://code.icecube.wisc.edu/projects/icecube/browser/projects/payload-parsing/trunk/private/payload-parsing/decode_22.cxx#L137
If a parent iterator was passed here I think this would fix it.
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/327">https://code.icecube.wisc.edu/projects/icecube/ticket/327</a>, reported by olivasand owned by blaufuss</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2015-02-11T19:37:24",
"_ts": "1423683444935952",
"description": "Somewhere in the decoding of the triggers from DAQ the hierarchy is flattened. The parent-child relationships are set on the DAQ side and simulated, but in data ( PFFilt ) those relationships don't seem to be translated. All triggers appear in the hierarchy as top-level nodes. I think the \"problem\" is here:\nhttp://code.icecube.wisc.edu/projects/icecube/browser/projects/payload-parsing/trunk/private/payload-parsing/decode_22.cxx#L137\n\nIf a parent iterator was passed here I think this would fix it. ",
"reporter": "olivas",
"cc": "",
"resolution": "wontfix",
"time": "2011-11-08T02:59:03",
"component": "combo core",
"summary": "Trigger hierarchy is flattened somewhere in DAQ decoding",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "blaufuss",
"type": "defect"
}
```
</p>
</details>
|
defect
|
trigger hierarchy is flattened somewhere in daq decoding trac somewhere in the decoding of the triggers from daq the hierarchy is flattened the parent child relationships are set on the daq side and simulated but in data pffilt those relationships don t seem to be translated all triggers appear in the hierarchy as top level nodes i think the problem is here if a parent iterator was passed here i think this would fix it migrated from json status closed changetime ts description somewhere in the decoding of the triggers from daq the hierarchy is flattened the parent child relationships are set on the daq side and simulated but in data pffilt those relationships don t seem to be translated all triggers appear in the hierarchy as top level nodes i think the problem is here n a parent iterator was passed here i think this would fix it reporter olivas cc resolution wontfix time component combo core summary trigger hierarchy is flattened somewhere in daq decoding priority normal keywords milestone owner blaufuss type defect
| 1
|
33,163
| 7,043,893,179
|
IssuesEvent
|
2017-12-31 14:36:40
|
cakephp/cakephp
|
https://api.github.com/repos/cakephp/cakephp
|
closed
|
Flash messages not accessible to test runner (CakePHP 2.10.6, PHPUnit 3.7.38)
|
Defect http On hold testing
|
This is a (multiple allowed):
* [x] bug
* [ ] enhancement
* [ ] feature-discussion (RFC)
* CakePHP Version: 2.10.6
* Platform and Target: Ubuntu 16.04, MySQL, PHPUnit 3.7.38
### What you did
Part of my test suite checks that a Flash message is rendered when a user makes a change via a form. Trying this through the browser shows the correct Flash message but the test runner output does not contain the Flash message (this was working fine in 2.10.5 with PHPUnit 3.7.38 but not with 2.10.6 and PHPUnit 3.7.38) even though the action is performed correctly. I have multiple tests that perform actions and all those that check for the presence of a Flash message are failing due to the missing message.
I set the message with this in the controller:
`$this->Flash->set('Item saved!');`
I have this in the View:
`<?php echo $this->Flash->render() ?>`
and test for it like this:
`$page_contents = $this->contents;`
`$this->assertContains('Item saved!', $page_contents);`
### What happened
Flash messages are not shown in the output received by the test runner. The test runner failure message shows the HTML for the page and this is all correct (i.e. the action is performed correctly and the HTML reflects this) apart from the presence of the Flash message.
### What you expected to happen
Flash messages should be consistent between the test runner and the browser. This was working in 2.10.5 so I assume this is perhaps caused by a problem with session handling in the test runner?
|
1.0
|
Flash messages not accessible to test runner (CakePHP 2.10.6, PHPUnit 3.7.38) - This is a (multiple allowed):
* [x] bug
* [ ] enhancement
* [ ] feature-discussion (RFC)
* CakePHP Version: 2.10.6
* Platform and Target: Ubuntu 16.04, MySQL, PHPUnit 3.7.38
### What you did
Part of my test suite checks that a Flash message is rendered when a user makes a change via a form. Trying this through the browser shows the correct Flash message but the test runner output does not contain the Flash message (this was working fine in 2.10.5 with PHPUnit 3.7.38 but not with 2.10.6 and PHPUnit 3.7.38) even though the action is performed correctly. I have multiple tests that perform actions and all those that check for the presence of a Flash message are failing due to the missing message.
I set the message with this in the controller:
`$this->Flash->set('Item saved!');`
I have this in the View:
`<?php echo $this->Flash->render() ?>`
and test for it like this:
`$page_contents = $this->contents;`
`$this->assertContains('Item saved!', $page_contents);`
### What happened
Flash messages are not shown in the output received by the test runner. The test runner failure message shows the HTML for the page and this is all correct (i.e. the action is performed correctly and the HTML reflects this) apart from the presence of the Flash message.
### What you expected to happen
Flash messages should be consistent between the test runner and the browser. This was working in 2.10.5 so I assume this is perhaps caused by a problem with session handling in the test runner?
|
defect
|
flash messages not accessible to test runner cakephp phpunit this is a multiple allowed bug enhancement feature discussion rfc cakephp version platform and target ubuntu mysql phpunit what you did part of my test suite checks that a flash message is rendered when a user makes a change via a form trying this through the browser shows the correct flash message but the test runner output does not contain the flash message this was working fine in with phpunit but not with and phpunit even though the action is performed correctly i have multiple tests that perform actions and all those that check for the presence of a flash message are failing due to the missing message i set the message with this in the controller this flash set item saved i have this in the view flash render and test for it like this page contents this contents this assertcontains item saved page contents what happened flash messages are not shown in the output received by the test runner the test runner failure message shows the html for the page and this is all correct i e the action is performed correctly and the html reflects this apart from the presence of the flash message what you expected to happen flash messages should be consistent between the test runner and the browser this was working in so i assume this is perhaps caused by a problem with session handling in the test runner
| 1
|
32,174
| 6,731,996,661
|
IssuesEvent
|
2017-10-18 09:44:39
|
hazelcast/hazelcast
|
https://api.github.com/repos/hazelcast/hazelcast
|
opened
|
at least once invocation test fails, in unstable cluster
|
Team: Core Type: Critical Type: Defect
| ERROR: type should be string, got "\r\nhttps://hazelcast-l337.ci.cloudbees.com/view/shutdown/job/shutdown-projection/206/console\r\n```\r\n fail HzClient1HZ projection_mapBak1HDIdx hzcmd.map.projection.ProjectionCheck threadId=1 global.AssertionException: (personId>=67673 AND personId<68673) on map mapBak1HDIdx returned 997 expected 1000\r\n```\r\n\r\n\r\nhttp://54.82.84.143/~jenkins/workspace/kill-All/3.9/2017_10_17-00_14_33/stable/aggregator/predicate\r\n` mapBak1HDIdx_aggregator-predicate map.aggregate(Aggregators.count(), (personId>=14589 AND personId<15589)) 997!=1000 `\r\n\r\nhttp://54.82.84.143/~jenkins/workspace/kill-All/3.9/2017_10_17-00_14_33/stable/atomic\r\n`atomic[atomic_atomic20=139667] atomic[atomic_atomic-expected20=139666] ` as we know atomic long is not atomic, under kill\r\n\r\n\r\nhttp://54.82.84.143/~jenkins/workspace/kill-All/3.9/2017_10_17-00_14_33/stable/cas\r\n`mapBak1HD_map-cas_long key=11 val=33273 != 33272` same issue, at least once invocation (edited)\r\n"
|
1.0
|
at least once invocation test fails, in unstable cluster -
https://hazelcast-l337.ci.cloudbees.com/view/shutdown/job/shutdown-projection/206/console
```
fail HzClient1HZ projection_mapBak1HDIdx hzcmd.map.projection.ProjectionCheck threadId=1 global.AssertionException: (personId>=67673 AND personId<68673) on map mapBak1HDIdx returned 997 expected 1000
```
http://54.82.84.143/~jenkins/workspace/kill-All/3.9/2017_10_17-00_14_33/stable/aggregator/predicate
` mapBak1HDIdx_aggregator-predicate map.aggregate(Aggregators.count(), (personId>=14589 AND personId<15589)) 997!=1000 `
http://54.82.84.143/~jenkins/workspace/kill-All/3.9/2017_10_17-00_14_33/stable/atomic
`atomic[atomic_atomic20=139667] atomic[atomic_atomic-expected20=139666] ` as we know atomic long is not atomic, under kill
http://54.82.84.143/~jenkins/workspace/kill-All/3.9/2017_10_17-00_14_33/stable/cas
`mapBak1HD_map-cas_long key=11 val=33273 != 33272` same issue, at least once invocation (edited)
|
defect
|
at least once invocation test fails in unstable cluster fail projection hzcmd map projection projectioncheck threadid global assertionexception personid and personid on map returned expected aggregator predicate map aggregate aggregators count personid and personid atomic atomic as we know atomic long is not atomic under kill map cas long key val same issue at least once invocation edited
| 1
|
390,307
| 11,541,887,893
|
IssuesEvent
|
2020-02-18 05:44:12
|
ahmedkaludi/pwa-for-wp
|
https://api.github.com/repos/ahmedkaludi/pwa-for-wp
|
closed
|
Performance Resolve, call of pwa manifest json
|
High Priority bug
|
Need to resolve every time call of PWA manifest. make it statically called manifest json file.
Reference: https://wordpress.org/support/topic/slow-site-30/
Screenshot: https://monosnap.com/file/bSoAKoXMqQY97SvlCdUUeIqRETjrnh
|
1.0
|
Performance Resolve, call of pwa manifest json - Need to resolve every time call of PWA manifest. make it statically called manifest json file.
Reference: https://wordpress.org/support/topic/slow-site-30/
Screenshot: https://monosnap.com/file/bSoAKoXMqQY97SvlCdUUeIqRETjrnh
|
non_defect
|
performance resolve call of pwa manifest json need to resolve every time call of pwa manifest make it statically called manifest json file reference screenshot
| 0
|
37,403
| 8,381,413,158
|
IssuesEvent
|
2018-10-08 00:49:43
|
primefaces/primefaces
|
https://api.github.com/repos/primefaces/primefaces
|
closed
|
Dropdown panel misplaced in dialog
|
6.2.11 defect
|
Reported By PRO User;
> We are using <p:selectOneMenu ./> in <p:dialog../>
The dropdown panel is misplaced when we scroll and open the dropdown.
In PF v5.3.15 it works fine.
|
1.0
|
Dropdown panel misplaced in dialog - Reported By PRO User;
> We are using <p:selectOneMenu ./> in <p:dialog../>
The dropdown panel is misplaced when we scroll and open the dropdown.
In PF v5.3.15 it works fine.
|
defect
|
dropdown panel misplaced in dialog reported by pro user we are using in the dropdown panel is misplaced when we scroll and open the dropdown in pf it works fine
| 1
|
606,852
| 18,769,323,788
|
IssuesEvent
|
2021-11-06 14:41:29
|
CDCgov/prime-reportstream
|
https://api.github.com/repos/CDCgov/prime-reportstream
|
opened
|
Reduce errors and improve sender and receiver visibility for fields currently used and populated by the LivdMapper()
|
bug Epic high-priority data-issue
|
There have been multiple issues created since May, 2021 related to fields used and populated by the LivdMapper(). This Epic will consolidate those issues and create new user stories and acceptance criteria for the issues to be addressed.
**Problem Summary:**
If a sender does not send in the _exact_ Model_ID or Test_Kit_Name_ID, multiple fields will fail to populate in the outbound file to the STLT. Importantly, even if the Test_Performed_LOINC_CODE is supplied by the sender, this value will be overwritten with a blank in the outbound file to the STLT if the Model_ID or Test_Kit_Name_ID is incorrect (i.e. the sender missed an asterisk in the string name). The Test_Performed_LOINC_Code is a critical value for STLTs, as many use that value for routing records from their Rhapsody integration engine to the correct disease surveillance system or module within that STLT. This issue appears to have affected over 266,000 records received between September 19th and November 5, 2021. STLTs have reported ongoing issues with not receiving LOINC codes, and is a driver of ongoing tickets received by the Onboarding and Operations Team.
Based on the attached analysis, there appears to be some simple fixes that will address the majority of the records which are failing to populate a LOINC code. Specifically, 99.75% of the records that had an incorrect Model_ID or Test_Kit_Name_ID between 9/19 and 11/5 we only off by an asterisk (the sender added an asterisk unnecessarily, or didn't include an asterisk at the end of the test name when it should have).
[https://app.zenhub.com/files/304423150/33c3d86b-8e8c-41bb-8384-5439a97db74f/download]
|
1.0
|
Reduce errors and improve sender and receiver visibility for fields currently used and populated by the LivdMapper() - There have been multiple issues created since May, 2021 related to fields used and populated by the LivdMapper(). This Epic will consolidate those issues and create new user stories and acceptance criteria for the issues to be addressed.
**Problem Summary:**
If a sender does not send in the _exact_ Model_ID or Test_Kit_Name_ID, multiple fields will fail to populate in the outbound file to the STLT. Importantly, even if the Test_Performed_LOINC_CODE is supplied by the sender, this value will be overwritten with a blank in the outbound file to the STLT if the Model_ID or Test_Kit_Name_ID is incorrect (i.e. the sender missed an asterisk in the string name). The Test_Performed_LOINC_Code is a critical value for STLTs, as many use that value for routing records from their Rhapsody integration engine to the correct disease surveillance system or module within that STLT. This issue appears to have affected over 266,000 records received between September 19th and November 5, 2021. STLTs have reported ongoing issues with not receiving LOINC codes, and is a driver of ongoing tickets received by the Onboarding and Operations Team.
Based on the attached analysis, there appears to be some simple fixes that will address the majority of the records which are failing to populate a LOINC code. Specifically, 99.75% of the records that had an incorrect Model_ID or Test_Kit_Name_ID between 9/19 and 11/5 we only off by an asterisk (the sender added an asterisk unnecessarily, or didn't include an asterisk at the end of the test name when it should have).
[https://app.zenhub.com/files/304423150/33c3d86b-8e8c-41bb-8384-5439a97db74f/download]
|
non_defect
|
reduce errors and improve sender and receiver visibility for fields currently used and populated by the livdmapper there have been multiple issues created since may related to fields used and populated by the livdmapper this epic will consolidate those issues and create new user stories and acceptance criteria for the issues to be addressed problem summary if a sender does not send in the exact model id or test kit name id multiple fields will fail to populate in the outbound file to the stlt importantly even if the test performed loinc code is supplied by the sender this value will be overwritten with a blank in the outbound file to the stlt if the model id or test kit name id is incorrect i e the sender missed an asterisk in the string name the test performed loinc code is a critical value for stlts as many use that value for routing records from their rhapsody integration engine to the correct disease surveillance system or module within that stlt this issue appears to have affected over records received between september and november stlts have reported ongoing issues with not receiving loinc codes and is a driver of ongoing tickets received by the onboarding and operations team based on the attached analysis there appears to be some simple fixes that will address the majority of the records which are failing to populate a loinc code specifically of the records that had an incorrect model id or test kit name id between and we only off by an asterisk the sender added an asterisk unnecessarily or didn t include an asterisk at the end of the test name when it should have
| 0
|
567,971
| 16,943,331,271
|
IssuesEvent
|
2021-06-28 00:24:35
|
AgoraCloud/server
|
https://api.github.com/repos/AgoraCloud/server
|
closed
|
Create a Kubernetes and Discord Bot
|
enhancement priority:medium
|
# Description
Currently, when any developer pushes changes to their personal branch (`said`, `marc` or `waleed`), the `develop` branch or the `main` branch, I have to manually watch the GitHub workflow status, wait for it to complete and then manually update the container image in the Kubernetes cluster.
To make my life easier, this process needs to be automated. The `kube-bot` will listen for [DockerHub webhook](https://docs.docker.com/docker-hub/webhooks/) API calls, validate and process the request and automatically update the container in the Kubernetes cluster. At every step of the way, the bot should notify the team, on a pre-configured channel in Discord, as the webhook call is being processed.
To accomplish this, the bot needs to use the [Discord.js](https://discord.js.org/#/) and [kubernetes/client-node](https://github.com/kubernetes-client/javascript) packages to interact with our Discord server and the Kubernetes cluster the bot (and all the AgoraCloud instances) is deployed in.
## Bot Logic
The `kube-bot` listens for DockerHub webhook notifications and extracts useful information, such as the repository name, container name and tag name. The bot then notifies the team on Discord that a webhook has been received. Subsequently, the bot updates the container in a pre-configured Kubernetes namespace and notifies the team or team member if the deployment was successful or not. If successful, team members can view their changes live, without lifting a finger, in a production-like environment (Kubernetes cluster), on a pre-configured subdomain.
# To Do
- [x] Create the `kube-bot` repository in GitHub
- [x] Create the `kube-bot` repository in DockerHub
- [x] Validate and load environment variables
- [x] Emit and handle events
- [x] Create a logger middleware that logs every API request performed by DockerHub webhooks
- [x] Create the Discord module and implement sending messages to a pre-configured bot channel when a DockerHub webhook is received, is being processed and is deployed
- [x] Create the DockerHub module, controller and service to handle POST API requests by DockerHub webhooks. DockerHub webhook API calls need to be validated (to make sure that only authorized container images can be deployed in the cluster).
- [x] Create the Kubernetes module and service to update (`patch`) deployments when a new DockerHub webhook is received and listen for any changes to pods
- [x] Create a GitHub workflow (CI/CD) that automatically builds and publishes the `agoracloud/kube-bot` Docker image to DockerHub
- [x] Create a Helm chart to allow for easy bot deployment in any Kubernetes cluster
|
1.0
|
Create a Kubernetes and Discord Bot - # Description
Currently, when any developer pushes changes to their personal branch (`said`, `marc` or `waleed`), the `develop` branch or the `main` branch, I have to manually watch the GitHub workflow status, wait for it to complete and then manually update the container image in the Kubernetes cluster.
To make my life easier, this process needs to be automated. The `kube-bot` will listen for [DockerHub webhook](https://docs.docker.com/docker-hub/webhooks/) API calls, validate and process the request and automatically update the container in the Kubernetes cluster. At every step of the way, the bot should notify the team, on a pre-configured channel in Discord, as the webhook call is being processed.
To accomplish this, the bot needs to use the [Discord.js](https://discord.js.org/#/) and [kubernetes/client-node](https://github.com/kubernetes-client/javascript) packages to interact with our Discord server and the Kubernetes cluster the bot (and all the AgoraCloud instances) is deployed in.
## Bot Logic
The `kube-bot` listens for DockerHub webhook notifications and extracts useful information, such as the repository name, container name and tag name. The bot then notifies the team on Discord that a webhook has been received. Subsequently, the bot updates the container in a pre-configured Kubernetes namespace and notifies the team or team member if the deployment was successful or not. If successful, team members can view their changes live, without lifting a finger, in a production-like environment (Kubernetes cluster), on a pre-configured subdomain.
# To Do
- [x] Create the `kube-bot` repository in GitHub
- [x] Create the `kube-bot` repository in DockerHub
- [x] Validate and load environment variables
- [x] Emit and handle events
- [x] Create a logger middleware that logs every API request performed by DockerHub webhooks
- [x] Create the Discord module and implement sending messages to a pre-configured bot channel when a DockerHub webhook is received, is being processed and is deployed
- [x] Create the DockerHub module, controller and service to handle POST API requests by DockerHub webhooks. DockerHub webhook API calls need to be validated (to make sure that only authorized container images can be deployed in the cluster).
- [x] Create the Kubernetes module and service to update (`patch`) deployments when a new DockerHub webhook is received and listen for any changes to pods
- [x] Create a GitHub workflow (CI/CD) that automatically builds and publishes the `agoracloud/kube-bot` Docker image to DockerHub
- [x] Create a Helm chart to allow for easy bot deployment in any Kubernetes cluster
|
non_defect
|
create a kubernetes and discord bot description currently when any developer pushes changes to their personal branch said marc or waleed the develop branch or the main branch i have to manually watch the github workflow status wait for it to complete and then manually update the container image in the kubernetes cluster to make my life easier this process needs to be automated the kube bot will listen for api calls validate and process the request and automatically update the container in the kubernetes cluster at every step of the way the bot should notify the team on a pre configured channel in discord as the webhook call is being processed to accomplish this the bot needs to use the and packages to interact with our discord server and the kubernetes cluster the bot and all the agoracloud instances is deployed in bot logic the kube bot listens for dockerhub webhook notifications and extracts useful information such as the repository name container name and tag name the bot then notifies the team on discord that a webhook has been received subsequently the bot updates the container in a pre configured kubernetes namespace and notifies the team or team member if the deployment was successful or not if successful team members can view their changes live without lifting a finger in a production like environment kubernetes cluster on a pre configured subdomain to do create the kube bot repository in github create the kube bot repository in dockerhub validate and load environment variables emit and handle events create a logger middleware that logs every api request performed by dockerhub webhooks create the discord module and implement sending messages to a pre configured bot channel when a dockerhub webhook is received is being processed and is deployed create the dockerhub module controller and service to handle post api requests by dockerhub webhooks dockerhub webhook api calls need to be validated to make sure that only authorized container images can be deployed in the cluster create the kubernetes module and service to update patch deployments when a new dockerhub webhook is received and listen for any changes to pods create a github workflow ci cd that automatically builds and publishes the agoracloud kube bot docker image to dockerhub create a helm chart to allow for easy bot deployment in any kubernetes cluster
| 0
|
417,910
| 12,189,832,678
|
IssuesEvent
|
2020-04-29 08:15:03
|
zoot-hq/zoot
|
https://api.github.com/repos/zoot-hq/zoot
|
closed
|
resources-page
|
good first issue high priority
|
- accessed via last button on navbar
- lists resources in a ScrollView container
Resources:
Maternal Mental Health
[Postpartum Support International](http://postpartum.net/)
[MGH Center for Women's Mental Health](https://womensmentalhealth.org/)
[National Institute of Mental Health](https://www.nimh.nih.gov/index.shtml)
[SAMHSA Hotline](https://www.samhsa.gov/find-help/national-helpline)
Crisis Text Line: Text โHELLOโ to 741741
Wellness
[Yoga with Adriene ](https://www.youtube.com/user/yogawithadriene)
[Center for Mindfulness Guided Meditations](https://www.umassmemorialhealthcare.org/umass-memorial-center-mindfulness)
[Maria Shriver's Sunday Paper ](https://mariashriver.com/sundaypaper/)
Infant & Child Development
[La Leche League](https://www.llli.org/)
[HealthyChildren.org](http://healthychildren.org/)
[PBS Kids for Parents ](https://www.pbs.org/parents)
[The Child Mind Institute ](http://childmind.org/)
[Common Sense Media ](https://www.commonsensemedia.org/)
See: [Resources-revised.pdf](https://github.com/zoot-hq/zoot/files/4496882/Resources-revised.pdf)
|
1.0
|
resources-page - - accessed via last button on navbar
- lists resources in a ScrollView container
Resources:
Maternal Mental Health
[Postpartum Support International](http://postpartum.net/)
[MGH Center for Women's Mental Health](https://womensmentalhealth.org/)
[National Institute of Mental Health](https://www.nimh.nih.gov/index.shtml)
[SAMHSA Hotline](https://www.samhsa.gov/find-help/national-helpline)
Crisis Text Line: Text โHELLOโ to 741741
Wellness
[Yoga with Adriene ](https://www.youtube.com/user/yogawithadriene)
[Center for Mindfulness Guided Meditations](https://www.umassmemorialhealthcare.org/umass-memorial-center-mindfulness)
[Maria Shriver's Sunday Paper ](https://mariashriver.com/sundaypaper/)
Infant & Child Development
[La Leche League](https://www.llli.org/)
[HealthyChildren.org](http://healthychildren.org/)
[PBS Kids for Parents ](https://www.pbs.org/parents)
[The Child Mind Institute ](http://childmind.org/)
[Common Sense Media ](https://www.commonsensemedia.org/)
See: [Resources-revised.pdf](https://github.com/zoot-hq/zoot/files/4496882/Resources-revised.pdf)
|
non_defect
|
resources page accessed via last button on navbar lists resources in a scrollview container resources maternal mental health crisis text line text โhelloโ to wellness infant child development see
| 0
|
10,319
| 2,622,143,874
|
IssuesEvent
|
2015-03-04 00:03:16
|
byzhang/i7z
|
https://api.github.com/repos/byzhang/i7z
|
closed
|
row 420 in i7z.cpp
|
auto-migrated Priority-Medium Type-Defect
|
```
it should read if(kk > 10){
```
Original issue reported on code.google.com by `rmattusc...@gmx.net` on 29 Mar 2010 at 11:26
|
1.0
|
row 420 in i7z.cpp - ```
it should read if(kk > 10){
```
Original issue reported on code.google.com by `rmattusc...@gmx.net` on 29 Mar 2010 at 11:26
|
defect
|
row in cpp it should read if kk original issue reported on code google com by rmattusc gmx net on mar at
| 1
|
827,190
| 31,758,789,910
|
IssuesEvent
|
2023-09-12 02:15:14
|
GoogleCloudPlatform/professional-services-data-validator
|
https://api.github.com/repos/GoogleCloudPlatform/professional-services-data-validator
|
opened
|
Grouped Column Validation does not accept (nor need) primary keys
|
type: bug priority: p2 type: docs
|
Hi,
The documentation under `validate column` says `--primary-keys or -pk PRIMARY_KEYS` `Comma separated list of columns to use as primary keys`. However the command does not take (nor does it need) primary keys. The `--grouped-columns` flag alone is suffficient. I also took a look at the code - [cli_tools.py](https://github.com/GoogleCloudPlatform/professional-services-data-validator/blob/develop/data_validation/cli_tools.py) and the function `_configure_column_parser` does not have primary key as an optional argument, while `--grouped-columns` is an optional argument.
```
data-validation validate column -sc=my_postgres -tc=my_postgres -tbls public.group_test_1=public.group_test_2 -pk=store_id,rev_month -gc=store_id,rev_month --sum revenue --filter-status=fail
data-validation: error: unrecognized arguments: -pk=store_id,rev_month
data-validation validate column -sc=my_postgres -tc=my_postgres -tbls public.group_test_1=public.group_test_2 -gc=store_id,rev_month --sum revenue --filter-status=fail
09/12/2023 02:10:12 AM-WARNING: Unknown cast types can cause memory errors
09/12/2023 02:10:12 AM-WARNING: Unknown cast types can cause memory errors
09/12/2023 02:10:12 AM-WARNING: Unknown cast types can cause memory errors
09/12/2023 02:10:12 AM-WARNING: Unknown cast types can cause memory errors
โโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโ
โ validation_name โ validation_type โ source_table_name โ source_column_name โ source_agg_value โ target_agg_value โ pct_difference โ validation_status โ run_id โ
โโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโก
โโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโ
|
1.0
|
Grouped Column Validation does not accept (nor need) primary keys - Hi,
The documentation under `validate column` says `--primary-keys or -pk PRIMARY_KEYS` `Comma separated list of columns to use as primary keys`. However the command does not take (nor does it need) primary keys. The `--grouped-columns` flag alone is suffficient. I also took a look at the code - [cli_tools.py](https://github.com/GoogleCloudPlatform/professional-services-data-validator/blob/develop/data_validation/cli_tools.py) and the function `_configure_column_parser` does not have primary key as an optional argument, while `--grouped-columns` is an optional argument.
```
data-validation validate column -sc=my_postgres -tc=my_postgres -tbls public.group_test_1=public.group_test_2 -pk=store_id,rev_month -gc=store_id,rev_month --sum revenue --filter-status=fail
data-validation: error: unrecognized arguments: -pk=store_id,rev_month
data-validation validate column -sc=my_postgres -tc=my_postgres -tbls public.group_test_1=public.group_test_2 -gc=store_id,rev_month --sum revenue --filter-status=fail
09/12/2023 02:10:12 AM-WARNING: Unknown cast types can cause memory errors
09/12/2023 02:10:12 AM-WARNING: Unknown cast types can cause memory errors
09/12/2023 02:10:12 AM-WARNING: Unknown cast types can cause memory errors
09/12/2023 02:10:12 AM-WARNING: Unknown cast types can cause memory errors
โโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโ
โ validation_name โ validation_type โ source_table_name โ source_column_name โ source_agg_value โ target_agg_value โ pct_difference โ validation_status โ run_id โ
โโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโก
โโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโ
|
non_defect
|
grouped column validation does not accept nor need primary keys hi the documentation under validate column says primary keys or pk primary keys comma separated list of columns to use as primary keys however the command does not take nor does it need primary keys the grouped columns flag alone is suffficient i also took a look at the code and the function configure column parser does not have primary key as an optional argument while grouped columns is an optional argument data validation validate column sc my postgres tc my postgres tbls public group test public group test pk store id rev month gc store id rev month sum revenue filter status fail data validation error unrecognized arguments pk store id rev month data validation validate column sc my postgres tc my postgres tbls public group test public group test gc store id rev month sum revenue filter status fail am warning unknown cast types can cause memory errors am warning unknown cast types can cause memory errors am warning unknown cast types can cause memory errors am warning unknown cast types can cause memory errors โโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโโโโโโโโโโโโคโโโโโโโโโโโ โ validation name โ validation type โ source table name โ source column name โ source agg value โ target agg value โ pct difference โ validation status โ run id โ โโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโโโโโโโโโโโโชโโโโโโโโโโโก โโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโโโโโโโโโโโโงโโโโโโโโโโโ
| 0
|
39,140
| 9,216,486,986
|
IssuesEvent
|
2019-03-11 08:15:29
|
vmware/vic-product
|
https://api.github.com/repos/vmware/vic-product
|
closed
|
Use capital T for boolean defaults in OVA to satisfy H5 Client requirements
|
area/lifecycle component/ova impact/doc/user kind/defect product/ova severity/3-moderate source/dogfooding
|
@zjs commented on [Fri Jun 22 2018](https://github.com/vmware/vic-tasks/issues/62)
We are unable to deploy the OVA via the H5 client as the current H5 client is not happy with lower case string boolean values. i.e. requires `True` instead of `true`.
|
1.0
|
Use capital T for boolean defaults in OVA to satisfy H5 Client requirements - @zjs commented on [Fri Jun 22 2018](https://github.com/vmware/vic-tasks/issues/62)
We are unable to deploy the OVA via the H5 client as the current H5 client is not happy with lower case string boolean values. i.e. requires `True` instead of `true`.
|
defect
|
use capital t for boolean defaults in ova to satisfy client requirements zjs commented on we are unable to deploy the ova via the client as the current client is not happy with lower case string boolean values i e requires true instead of true
| 1
|
34,105
| 28,262,033,747
|
IssuesEvent
|
2023-04-07 00:41:24
|
ComplianceAsCode/content
|
https://api.github.com/repos/ComplianceAsCode/content
|
opened
|
Build system does not check if OVAL definition IDs generated from templates are in sync with rule (or platform)
|
Infrastructure OVAL CPE-AL
|
#### Description of problem:
When id of the `definition` in a rule template does not match the Rule id OVAL check is silently not added to the Rule definition.
When the same happens with a platform (the id of the `definition` does not match platform's `check_id` or auto-generated id based on the template name) the `cpe-lang:platform` element receives incorrect link to the OVAL without a warning, resulting in a scan-time error: ```No definition with ID: oval:ssg-mount_tmp:def:1 in result model.```.
#### SCAP Security Guide Version:
master
#### Operating System Version:
N/A
#### Steps to Reproduce:
1. Add prefix to the id in a template: ```<definition class="compliance" id="XXX_{{{ _RULE_ID }}}" version="2">```
2. Build content
3. Perform the scan
#### Actual Results:
Rule is not evaluated
#### Expected Results:
Build-time warning
#### Additional Information/Debugging Steps:
Related to: #10440
|
1.0
|
Build system does not check if OVAL definition IDs generated from templates are in sync with rule (or platform) - #### Description of problem:
When id of the `definition` in a rule template does not match the Rule id OVAL check is silently not added to the Rule definition.
When the same happens with a platform (the id of the `definition` does not match platform's `check_id` or auto-generated id based on the template name) the `cpe-lang:platform` element receives incorrect link to the OVAL without a warning, resulting in a scan-time error: ```No definition with ID: oval:ssg-mount_tmp:def:1 in result model.```.
#### SCAP Security Guide Version:
master
#### Operating System Version:
N/A
#### Steps to Reproduce:
1. Add prefix to the id in a template: ```<definition class="compliance" id="XXX_{{{ _RULE_ID }}}" version="2">```
2. Build content
3. Perform the scan
#### Actual Results:
Rule is not evaluated
#### Expected Results:
Build-time warning
#### Additional Information/Debugging Steps:
Related to: #10440
|
non_defect
|
build system does not check if oval definition ids generated from templates are in sync with rule or platform description of problem when id of the definition in a rule template does not match the rule id oval check is silently not added to the rule definition when the same happens with a platform the id of the definition does not match platform s check id or auto generated id based on the template name the cpe lang platform element receives incorrect link to the oval without a warning resulting in a scan time error no definition with id oval ssg mount tmp def in result model scap security guide version master operating system version n a steps to reproduce add prefix to the id in a template build content perform the scan actual results rule is not evaluated expected results build time warning additional information debugging steps related to
| 0
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.