Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
757
labels
stringlengths
4
664
body
stringlengths
3
261k
index
stringclasses
10 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
232k
binary_label
int64
0
1
69,293
7,130,052,071
IssuesEvent
2018-01-22 03:42:14
TerriaJS/nationalmap
https://api.github.com/repos/TerriaJS/nationalmap
closed
National Map v2018-01-18 pre-release test - All links for CMAR - CSIRO Marine and atmospheric Research Return 500 error code
GA-testing
All links under data.gov.au -> CMAR - CSIRO Marine and atmospheric Research returns an status code 500 error on the national maps app. However the links for the Data Url (http://www.data.gov.au/dataset/australian-ship-reporting-system-and-automatic-identification-system-shipping-summari-1999-2015) and Web Map Service (WMS) URL (https://www.cmar.csiro.au/geoserver/nerp/wms) returns data indicating that the server is available. Screenshot below ![image005](https://user-images.githubusercontent.com/35437484/35131941-b8534e22-fcc0-11e7-8815-f6adb0e1c45a.jpg)
1.0
National Map v2018-01-18 pre-release test - All links for CMAR - CSIRO Marine and atmospheric Research Return 500 error code - All links under data.gov.au -> CMAR - CSIRO Marine and atmospheric Research returns an status code 500 error on the national maps app. However the links for the Data Url (http://www.data.gov.au/dataset/australian-ship-reporting-system-and-automatic-identification-system-shipping-summari-1999-2015) and Web Map Service (WMS) URL (https://www.cmar.csiro.au/geoserver/nerp/wms) returns data indicating that the server is available. Screenshot below ![image005](https://user-images.githubusercontent.com/35437484/35131941-b8534e22-fcc0-11e7-8815-f6adb0e1c45a.jpg)
non_defect
national map pre release test all links for cmar csiro marine and atmospheric research return error code all links under data gov au cmar csiro marine and atmospheric research returns an status code error on the national maps app however the links for the data url and web map service wms url returns data indicating that the server is available screenshot below
0
15,916
2,869,093,983
IssuesEvent
2015-06-05 23:17:08
dart-lang/sdk
https://api.github.com/repos/dart-lang/sdk
closed
pkg/string_scanner - remove work-around for Issue 17998
Area-Pkg Pkg-StringScanner Priority-Unassigned Triaged Type-Defect
It was fixed in https://code.google.com/p/dart/source/detail?r=35368 Need to verify this fix is sufficient. ...and bump the min-SDK to 1.4
1.0
pkg/string_scanner - remove work-around for Issue 17998 - It was fixed in https://code.google.com/p/dart/source/detail?r=35368 Need to verify this fix is sufficient. ...and bump the min-SDK to 1.4
defect
pkg string scanner remove work around for issue it was fixed in need to verify this fix is sufficient and bump the min sdk to
1
41,591
5,344,975,603
IssuesEvent
2017-02-17 15:51:35
jolocom/little-sister
https://api.github.com/repos/jolocom/little-sister
closed
Linking: Bi-directional to writable node (depends #73)
designing
When I'm trying to link to a node that I have write access to I would like to be offered bi-directional predicates. As a result the target node will link back to the source node. _Example_: I have created a node with an image. Now I want to link it to the ouishare event node. As I have write access to that node I can create the link with the bi-directional predicate "relates to". Other users that browser the event node can now see that my image node linked to it. **Acceptance Critieria** 1. When I create a link as implemented between a source node I have write access to and a target node that I have write access to, the predicate form now also allows me to choose bi-directional predicates 2. After creating the link I can now browser to the target node and see that it links back to the source node.
1.0
Linking: Bi-directional to writable node (depends #73) - When I'm trying to link to a node that I have write access to I would like to be offered bi-directional predicates. As a result the target node will link back to the source node. _Example_: I have created a node with an image. Now I want to link it to the ouishare event node. As I have write access to that node I can create the link with the bi-directional predicate "relates to". Other users that browser the event node can now see that my image node linked to it. **Acceptance Critieria** 1. When I create a link as implemented between a source node I have write access to and a target node that I have write access to, the predicate form now also allows me to choose bi-directional predicates 2. After creating the link I can now browser to the target node and see that it links back to the source node.
non_defect
linking bi directional to writable node depends when i m trying to link to a node that i have write access to i would like to be offered bi directional predicates as a result the target node will link back to the source node example i have created a node with an image now i want to link it to the ouishare event node as i have write access to that node i can create the link with the bi directional predicate relates to other users that browser the event node can now see that my image node linked to it acceptance critieria when i create a link as implemented between a source node i have write access to and a target node that i have write access to the predicate form now also allows me to choose bi directional predicates after creating the link i can now browser to the target node and see that it links back to the source node
0
10,416
2,622,151,372
IssuesEvent
2015-03-04 00:06:17
byzhang/lh-vim
https://api.github.com/repos/byzhang/lh-vim
closed
Template surrounding is called multiple times
auto-migrated muTemplate Priority-Medium Type-Defect
``` What steps will reproduce the problem? 1. open a C++ file with several lines of codes 1. select several lines 2. Execute a template-file 3. Enter the template-file name "group" or "if" What is the expected output? The user is requested to enter the name of the template-file once What do you see instead? The user is requested once per line selected ``` Original issue reported on code.google.com by `luc.herm...@gmail.com` on 3 Apr 2012 at 5:49
1.0
Template surrounding is called multiple times - ``` What steps will reproduce the problem? 1. open a C++ file with several lines of codes 1. select several lines 2. Execute a template-file 3. Enter the template-file name "group" or "if" What is the expected output? The user is requested to enter the name of the template-file once What do you see instead? The user is requested once per line selected ``` Original issue reported on code.google.com by `luc.herm...@gmail.com` on 3 Apr 2012 at 5:49
defect
template surrounding is called multiple times what steps will reproduce the problem open a c file with several lines of codes select several lines execute a template file enter the template file name group or if what is the expected output the user is requested to enter the name of the template file once what do you see instead the user is requested once per line selected original issue reported on code google com by luc herm gmail com on apr at
1
57,579
15,866,607,337
IssuesEvent
2021-04-08 15:55:56
jOOQ/jOOQ
https://api.github.com/repos/jOOQ/jOOQ
closed
ROWNUM transformation should avoid creating derived tables if possible
C: Translator E: Enterprise Edition E: Professional Edition P: Medium R: Fixed T: Defect
The `ROWNUM` to `LIMIT` transformation creates derived tables for `ROWNUM <op> N` predicates to make sure the predicate is evaluated first, before all the other clauses of a `SELECT` statement, including e.g. `GROUP BY`, `DISTINCT`, `ORDER BY`, etc. This is just how `ROWNUM` filtering works. It's usually not what users want (filtering out random N rows), but that's how it works. Unfortunately, if we create a derived table and don't have any meta data, then we get this behaviour: ```sql -- Input select a, b from t, u where rownum <= 10; -- Output on the current 3.15.0-SNAPSHOT select a, b from (select * from t, u limit 10) t; ``` The output is now invalid if `t` and `u` contain ambiguous column names. In this particular case, we could avoid the derived table, namely when there are no other clauses between `WHERE` and `LIMIT`, i.e. the query simply contains: - A `FROM` clause with any number of joins - A `WHERE` clause with the `ROWNUM` predicate - A simple projection (`SELECT` clause) without any aggregate functions or window functions Or, in other words, the query must not contain: - `CONNECT BY` - `GROUP BY` (including implied aggregation due to aggregate function presence) - `HAVING` - `WINDOW` (including implied windowing due to window function presence) - `QUALIFY` - `DISTINCT` - `ORDER BY` If those conditions are not satisfied, we cannot do much and need to rely on users providing meta data using a `MetaProvider`.
1.0
ROWNUM transformation should avoid creating derived tables if possible - The `ROWNUM` to `LIMIT` transformation creates derived tables for `ROWNUM <op> N` predicates to make sure the predicate is evaluated first, before all the other clauses of a `SELECT` statement, including e.g. `GROUP BY`, `DISTINCT`, `ORDER BY`, etc. This is just how `ROWNUM` filtering works. It's usually not what users want (filtering out random N rows), but that's how it works. Unfortunately, if we create a derived table and don't have any meta data, then we get this behaviour: ```sql -- Input select a, b from t, u where rownum <= 10; -- Output on the current 3.15.0-SNAPSHOT select a, b from (select * from t, u limit 10) t; ``` The output is now invalid if `t` and `u` contain ambiguous column names. In this particular case, we could avoid the derived table, namely when there are no other clauses between `WHERE` and `LIMIT`, i.e. the query simply contains: - A `FROM` clause with any number of joins - A `WHERE` clause with the `ROWNUM` predicate - A simple projection (`SELECT` clause) without any aggregate functions or window functions Or, in other words, the query must not contain: - `CONNECT BY` - `GROUP BY` (including implied aggregation due to aggregate function presence) - `HAVING` - `WINDOW` (including implied windowing due to window function presence) - `QUALIFY` - `DISTINCT` - `ORDER BY` If those conditions are not satisfied, we cannot do much and need to rely on users providing meta data using a `MetaProvider`.
defect
rownum transformation should avoid creating derived tables if possible the rownum to limit transformation creates derived tables for rownum n predicates to make sure the predicate is evaluated first before all the other clauses of a select statement including e g group by distinct order by etc this is just how rownum filtering works it s usually not what users want filtering out random n rows but that s how it works unfortunately if we create a derived table and don t have any meta data then we get this behaviour sql input select a b from t u where rownum output on the current snapshot select a b from select from t u limit t the output is now invalid if t and u contain ambiguous column names in this particular case we could avoid the derived table namely when there are no other clauses between where and limit i e the query simply contains a from clause with any number of joins a where clause with the rownum predicate a simple projection select clause without any aggregate functions or window functions or in other words the query must not contain connect by group by including implied aggregation due to aggregate function presence having window including implied windowing due to window function presence qualify distinct order by if those conditions are not satisfied we cannot do much and need to rely on users providing meta data using a metaprovider
1
20,502
3,368,361,960
IssuesEvent
2015-11-22 22:18:26
libkml/libkml
https://api.github.com/repos/libkml/libkml
closed
Java UnsatisfiedLinkError
auto-migrated Priority-Medium Type-Defect
``` What steps will reproduce the problem? 1. Installed from svn revision 148 2. Created package libkml of src/swig/*.java 3. Compiled example java application CreatePlacemark.java from examples, after importing libkml.* 4. Ran into following exception. Exception in thread "main" java.lang.UnsatisfiedLinkError: libkml.kmldomJNI.KmlFactory_GetFactory()J at libkml.kmldomJNI.KmlFactory_GetFactory(Native Method) at libkml.KmlFactory.GetFactory(KmlFactory.java:44) at kmlapp.CreatePlacemark.main(CreatePlacemark.java:46) Linux x64 Java 1.6.0_06 x64 ``` Original issue reported on code.google.com by `dleif...@gmail.com` on 2 Jul 2008 at 6:43 Attachments: * [libkml.jar](https://storage.googleapis.com/google-code-attachments/libkml/issue-15/comment-0/libkml.jar)
1.0
Java UnsatisfiedLinkError - ``` What steps will reproduce the problem? 1. Installed from svn revision 148 2. Created package libkml of src/swig/*.java 3. Compiled example java application CreatePlacemark.java from examples, after importing libkml.* 4. Ran into following exception. Exception in thread "main" java.lang.UnsatisfiedLinkError: libkml.kmldomJNI.KmlFactory_GetFactory()J at libkml.kmldomJNI.KmlFactory_GetFactory(Native Method) at libkml.KmlFactory.GetFactory(KmlFactory.java:44) at kmlapp.CreatePlacemark.main(CreatePlacemark.java:46) Linux x64 Java 1.6.0_06 x64 ``` Original issue reported on code.google.com by `dleif...@gmail.com` on 2 Jul 2008 at 6:43 Attachments: * [libkml.jar](https://storage.googleapis.com/google-code-attachments/libkml/issue-15/comment-0/libkml.jar)
defect
java unsatisfiedlinkerror what steps will reproduce the problem installed from svn revision created package libkml of src swig java compiled example java application createplacemark java from examples after importing libkml ran into following exception exception in thread main java lang unsatisfiedlinkerror libkml kmldomjni kmlfactory getfactory j at libkml kmldomjni kmlfactory getfactory native method at libkml kmlfactory getfactory kmlfactory java at kmlapp createplacemark main createplacemark java linux java original issue reported on code google com by dleif gmail com on jul at attachments
1
308,948
26,640,158,723
IssuesEvent
2023-01-25 03:26:15
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
reopened
roachtest: cdc/pubsub-sink/assume-role failed
C-test-failure O-robot O-roachtest release-blocker T-cdc branch-release-22.2
roachtest.cdc/pubsub-sink/assume-role [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/6549193?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/6549193?buildTab=artifacts#/cdc/pubsub-sink/assume-role) on release-22.2 @ [ac55929f9367f7dee41118f95d07a17b667b4d50](https://github.com/cockroachdb/cockroach/commits/ac55929f9367f7dee41118f95d07a17b667b4d50): ``` test artifacts and logs in: /artifacts/cdc/pubsub-sink/assume-role/run_1 monitor.go:127,cdc.go:300,cdc.go:820,test_runner.go:908: monitor failure: monitor task failed: dial tcp 34.138.157.171:26257: connect: connection refused (1) attached stack trace -- stack trace: | main.(*monitorImpl).WaitE | main/pkg/cmd/roachtest/monitor.go:115 | main.(*monitorImpl).Wait | main/pkg/cmd/roachtest/monitor.go:123 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.cdcBasicTest | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/cdc.go:300 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.registerCDC.func9 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/cdc.go:820 | [...repeated from below...] Wraps: (2) monitor failure Wraps: (3) attached stack trace -- stack trace: | main.(*monitorImpl).wait.func2 | main/pkg/cmd/roachtest/monitor.go:171 | runtime.goexit | GOROOT/src/runtime/asm_amd64.s:1594 Wraps: (4) monitor task failed Wraps: (5) dial tcp 34.138.157.171:26257 Wraps: (6) connect Wraps: (7) connection refused Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *withstack.withStack (4) *errutil.withPrefix (5) *net.OpError (6) *os.SyscallError (7) syscall.Errno test_runner.go:1039,test_runner.go:938: test timed out (0s) ``` <p>Parameters: <code>ROACHTEST_cloud=gce</code> , <code>ROACHTEST_cpu=16</code> , <code>ROACHTEST_ssd=0</code> </p> <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> <details><summary>Same failure on other branches</summary> <p> - #85374 roachtest: cdc/pubsub-sink/assume-role failed [C-test-failure O-roachtest O-robot T-cdc branch-master] </p> </details> /cc @cockroachdb/cdc <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*cdc/pubsub-sink/assume-role.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-19788
2.0
roachtest: cdc/pubsub-sink/assume-role failed - roachtest.cdc/pubsub-sink/assume-role [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/6549193?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/6549193?buildTab=artifacts#/cdc/pubsub-sink/assume-role) on release-22.2 @ [ac55929f9367f7dee41118f95d07a17b667b4d50](https://github.com/cockroachdb/cockroach/commits/ac55929f9367f7dee41118f95d07a17b667b4d50): ``` test artifacts and logs in: /artifacts/cdc/pubsub-sink/assume-role/run_1 monitor.go:127,cdc.go:300,cdc.go:820,test_runner.go:908: monitor failure: monitor task failed: dial tcp 34.138.157.171:26257: connect: connection refused (1) attached stack trace -- stack trace: | main.(*monitorImpl).WaitE | main/pkg/cmd/roachtest/monitor.go:115 | main.(*monitorImpl).Wait | main/pkg/cmd/roachtest/monitor.go:123 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.cdcBasicTest | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/cdc.go:300 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.registerCDC.func9 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/cdc.go:820 | [...repeated from below...] Wraps: (2) monitor failure Wraps: (3) attached stack trace -- stack trace: | main.(*monitorImpl).wait.func2 | main/pkg/cmd/roachtest/monitor.go:171 | runtime.goexit | GOROOT/src/runtime/asm_amd64.s:1594 Wraps: (4) monitor task failed Wraps: (5) dial tcp 34.138.157.171:26257 Wraps: (6) connect Wraps: (7) connection refused Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *withstack.withStack (4) *errutil.withPrefix (5) *net.OpError (6) *os.SyscallError (7) syscall.Errno test_runner.go:1039,test_runner.go:938: test timed out (0s) ``` <p>Parameters: <code>ROACHTEST_cloud=gce</code> , <code>ROACHTEST_cpu=16</code> , <code>ROACHTEST_ssd=0</code> </p> <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> <details><summary>Same failure on other branches</summary> <p> - #85374 roachtest: cdc/pubsub-sink/assume-role failed [C-test-failure O-roachtest O-robot T-cdc branch-master] </p> </details> /cc @cockroachdb/cdc <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*cdc/pubsub-sink/assume-role.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-19788
non_defect
roachtest cdc pubsub sink assume role failed roachtest cdc pubsub sink assume role with on release test artifacts and logs in artifacts cdc pubsub sink assume role run monitor go cdc go cdc go test runner go monitor failure monitor task failed dial tcp connect connection refused attached stack trace stack trace main monitorimpl waite main pkg cmd roachtest monitor go main monitorimpl wait main pkg cmd roachtest monitor go github com cockroachdb cockroach pkg cmd roachtest tests cdcbasictest github com cockroachdb cockroach pkg cmd roachtest tests cdc go github com cockroachdb cockroach pkg cmd roachtest tests registercdc github com cockroachdb cockroach pkg cmd roachtest tests cdc go wraps monitor failure wraps attached stack trace stack trace main monitorimpl wait main pkg cmd roachtest monitor go runtime goexit goroot src runtime asm s wraps monitor task failed wraps dial tcp wraps connect wraps connection refused error types withstack withstack errutil withprefix withstack withstack errutil withprefix net operror os syscallerror syscall errno test runner go test runner go test timed out parameters roachtest cloud gce roachtest cpu roachtest ssd help see see same failure on other branches roachtest cdc pubsub sink assume role failed cc cockroachdb cdc jira issue crdb
0
13,286
2,744,599,845
IssuesEvent
2015-04-22 08:43:16
cakephp/cakephp
https://api.github.com/repos/cakephp/cakephp
closed
UUID Fields with Binary(36) are not handled correct
Defect
I found two solutions. First I changed the type detection in MysqlSchema.php to match all binary 36 to UUID, which i dont like. Second solution was to return unconverted strings in the BinaryType.php if they already match to a UUID. I attached both patches ``` --- src/Database/Schema/MysqlSchema.php (revision d77ffad6ee45aa0edf5d3b4bf8ed32f94d7ae5ce) +++ src/Database/Schema/MysqlSchema.php (revision ) @@ -110,6 +110,9 @@ if ($col === 'char' && $length === 36) { return ['type' => 'uuid', 'length' => null]; } + if ($col === 'binary' && $length === 36) { + return ['type' => 'uuid', 'length' => null]; + } if ($col === 'char') { return ['type' => 'string', 'fixed' => true, 'length' => $length]; } ``` ``` --- src/Database/Type/BinaryType.php (revision d77ffad6ee45aa0edf5d3b4bf8ed32f94d7ae5ce) +++ src/Database/Type/BinaryType.php (revision ) @@ -56,6 +56,10 @@ return null; } if (is_string($value)) { + // return string if it matches to a uuid + if(preg_match('/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/i', $value)) { + return $value; + } return fopen('data:text/plain;base64,' . base64_encode($value), 'rb'); } if (is_resource($value)) { ```
1.0
UUID Fields with Binary(36) are not handled correct - I found two solutions. First I changed the type detection in MysqlSchema.php to match all binary 36 to UUID, which i dont like. Second solution was to return unconverted strings in the BinaryType.php if they already match to a UUID. I attached both patches ``` --- src/Database/Schema/MysqlSchema.php (revision d77ffad6ee45aa0edf5d3b4bf8ed32f94d7ae5ce) +++ src/Database/Schema/MysqlSchema.php (revision ) @@ -110,6 +110,9 @@ if ($col === 'char' && $length === 36) { return ['type' => 'uuid', 'length' => null]; } + if ($col === 'binary' && $length === 36) { + return ['type' => 'uuid', 'length' => null]; + } if ($col === 'char') { return ['type' => 'string', 'fixed' => true, 'length' => $length]; } ``` ``` --- src/Database/Type/BinaryType.php (revision d77ffad6ee45aa0edf5d3b4bf8ed32f94d7ae5ce) +++ src/Database/Type/BinaryType.php (revision ) @@ -56,6 +56,10 @@ return null; } if (is_string($value)) { + // return string if it matches to a uuid + if(preg_match('/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/i', $value)) { + return $value; + } return fopen('data:text/plain;base64,' . base64_encode($value), 'rb'); } if (is_resource($value)) { ```
defect
uuid fields with binary are not handled correct i found two solutions first i changed the type detection in mysqlschema php to match all binary to uuid which i dont like second solution was to return unconverted strings in the binarytype php if they already match to a uuid i attached both patches src database schema mysqlschema php revision src database schema mysqlschema php revision if col char length return if col binary length return if col char return src database type binarytype php revision src database type binarytype php revision return null if is string value return string if it matches to a uuid if preg match i value return value return fopen data text plain encode value rb if is resource value
1
32,081
6,711,196,404
IssuesEvent
2017-10-13 02:09:26
vim/vim
https://api.github.com/repos/vim/vim
closed
Windows gui: window position is changed when invoking :vert & :tab under certain conditions
auto-migrated defect platform-windows Priority-Medium
``` I sometimes use gvim 7.3 @ win7 (64 bit). When I move the gvim window by means of the <windows-key + left/right> key combination to the left or right half of the screen, it seems gvim doesn't properly notice this change. When I invoke any command with :vert prepended (e.g. :vert split), gvim moves the gvim window back to the previous position on the screen. Steps: 1. Open gvim -> gvim window opens at position #1 2. Press <windows-left> -> gvim window is moved to the left (position #2) 3. Type :vert split Result: The gvim window is back at position #1. This problem seems to affect only the win gui. At least with gnome/gtk everything seems ok. The problem also affects :tab-related commands. It was verified by a user. See https://groups.google.com/d/topic/vim_dev/MiKswL7hN6E/discussion ``` Original issue reported on code.google.com by `minilith` on 13 Mar 2013 at 8:19
1.0
Windows gui: window position is changed when invoking :vert & :tab under certain conditions - ``` I sometimes use gvim 7.3 @ win7 (64 bit). When I move the gvim window by means of the <windows-key + left/right> key combination to the left or right half of the screen, it seems gvim doesn't properly notice this change. When I invoke any command with :vert prepended (e.g. :vert split), gvim moves the gvim window back to the previous position on the screen. Steps: 1. Open gvim -> gvim window opens at position #1 2. Press <windows-left> -> gvim window is moved to the left (position #2) 3. Type :vert split Result: The gvim window is back at position #1. This problem seems to affect only the win gui. At least with gnome/gtk everything seems ok. The problem also affects :tab-related commands. It was verified by a user. See https://groups.google.com/d/topic/vim_dev/MiKswL7hN6E/discussion ``` Original issue reported on code.google.com by `minilith` on 13 Mar 2013 at 8:19
defect
windows gui window position is changed when invoking vert tab under certain conditions i sometimes use gvim bit when i move the gvim window by means of the key combination to the left or right half of the screen it seems gvim doesn t properly notice this change when i invoke any command with vert prepended e g vert split gvim moves the gvim window back to the previous position on the screen steps open gvim gvim window opens at position press gvim window is moved to the left position type vert split result the gvim window is back at position this problem seems to affect only the win gui at least with gnome gtk everything seems ok the problem also affects tab related commands it was verified by a user see original issue reported on code google com by minilith on mar at
1
118,259
11,965,165,667
IssuesEvent
2020-04-05 22:16:36
oneleif/olWebsite-React
https://api.github.com/repos/oneleif/olWebsite-React
opened
Add Documentation to CSS standards for Design System
documentation
This will need to include the information about the font sizes and how we set those globally and per module. Also about the breakpoints set by UX and how we use the variables through out the application. This information can be found on our notion: https://www.notion.so/oneleif/Design-System-365df542738544e383f6a1ad70c448b2
1.0
Add Documentation to CSS standards for Design System - This will need to include the information about the font sizes and how we set those globally and per module. Also about the breakpoints set by UX and how we use the variables through out the application. This information can be found on our notion: https://www.notion.so/oneleif/Design-System-365df542738544e383f6a1ad70c448b2
non_defect
add documentation to css standards for design system this will need to include the information about the font sizes and how we set those globally and per module also about the breakpoints set by ux and how we use the variables through out the application this information can be found on our notion
0
13,725
2,776,595,483
IssuesEvent
2015-05-04 22:43:12
umutafacan/bounswe2015group3
https://api.github.com/repos/umutafacan/bounswe2015group3
reopened
editing of user stories
auto-migrated Priority-Medium Type-Defect
``` i will write many user stories ``` Original issue reported on code.google.com by `bunyamin...@gmail.com` on 7 Mar 2015 at 4:31
1.0
editing of user stories - ``` i will write many user stories ``` Original issue reported on code.google.com by `bunyamin...@gmail.com` on 7 Mar 2015 at 4:31
defect
editing of user stories i will write many user stories original issue reported on code google com by bunyamin gmail com on mar at
1
16,897
2,957,636,938
IssuesEvent
2015-07-08 17:20:06
master801/PS-64
https://api.github.com/repos/master801/PS-64
closed
Re-enable USB support via Homebrew Channel?
auto-migrated Priority-Medium Type-Defect
``` What steps will reproduce the problem? 1. Load Homebrew Channel 1.0.8 2. Load Wii64 Beta 1.1 3. Select USB device What is the expected output? What do you see instead? Wii64 cannot find my USB device "can't find usb:/wii64/roms" What version of the product are you using? On which system and loader? Wii64 Beta 1.1, HBC 1.0.8, System Menu 4.3, Please provide any additional information below. I can't play any ROMs off of my USB device. I think it's because the new Homebrew Channel uses IOS58, which came out a little while ago, so wii64 doesn't support it. Can anyone fix this, or has a suggestion to fix this? ``` Original issue reported on code.google.com by `joshbick...@comcast.net` on 4 Dec 2010 at 4:22
1.0
Re-enable USB support via Homebrew Channel? - ``` What steps will reproduce the problem? 1. Load Homebrew Channel 1.0.8 2. Load Wii64 Beta 1.1 3. Select USB device What is the expected output? What do you see instead? Wii64 cannot find my USB device "can't find usb:/wii64/roms" What version of the product are you using? On which system and loader? Wii64 Beta 1.1, HBC 1.0.8, System Menu 4.3, Please provide any additional information below. I can't play any ROMs off of my USB device. I think it's because the new Homebrew Channel uses IOS58, which came out a little while ago, so wii64 doesn't support it. Can anyone fix this, or has a suggestion to fix this? ``` Original issue reported on code.google.com by `joshbick...@comcast.net` on 4 Dec 2010 at 4:22
defect
re enable usb support via homebrew channel what steps will reproduce the problem load homebrew channel load beta select usb device what is the expected output what do you see instead cannot find my usb device can t find usb roms what version of the product are you using on which system and loader beta hbc system menu please provide any additional information below i can t play any roms off of my usb device i think it s because the new homebrew channel uses which came out a little while ago so doesn t support it can anyone fix this or has a suggestion to fix this original issue reported on code google com by joshbick comcast net on dec at
1
61,566
17,023,727,448
IssuesEvent
2021-07-03 03:31:11
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
closed
Erroneous values for segregated cycleways in map features
Component: potlatch2 Priority: minor Resolution: fixed Type: defect
**[Submitted to the original trac issue database at 9.33am, Tuesday, 28th June 2011]** The value range currently shown in the simple editor for key:cycleway are (no, lane, track, opposite_lane, opposite_track, opposite, segregated and shared) with the two latter selectable for ways tagged as highway=cycleway and the other values possible to set for roads (i.e. highway=residential). The proper (according to the wiki and tag usage(ref 1),(ref 2)) way of tagging a segregated cycleway is by using segregated=yes/no. **The following excerpt from map_features/paths.xml should be changed:** <input type="choice" name="Cycleway type" category="Cycle" description="What kind of bike path is this?" key="cycleway" presence="onTagMatch" priority="low"> <choice value="segregated" text="Segregated" description="Cyclists and pedestrians are separated by a painted line or kerb." /> <choice value="shared" text="Shared" description="Cyclists and pedestrians share the full width of the path." /> </input> **to:** <input type="choice" name="Cycleway type" category="Cycle" description="What kind of bike path is this?" key="segregated" presence="onTagMatch" priority="low"> <choice value="yes" text="Segregated" description="Cyclists and pedestrians are separated by a painted line or kerb." /> <choice value="no" text="Shared" description="Cyclists and pedestrians share the full width of the path." /> </input> (1) http://tagstat.telascience.org/tagdetails.php?tag=segregated (2) http://tagstat.telascience.org/tagvaluedetails.php?tag=cycleway&value=segregated and http://tagstat.telascience.org/tagvaluedetails.php?tag=cycleway&value=shared
1.0
Erroneous values for segregated cycleways in map features - **[Submitted to the original trac issue database at 9.33am, Tuesday, 28th June 2011]** The value range currently shown in the simple editor for key:cycleway are (no, lane, track, opposite_lane, opposite_track, opposite, segregated and shared) with the two latter selectable for ways tagged as highway=cycleway and the other values possible to set for roads (i.e. highway=residential). The proper (according to the wiki and tag usage(ref 1),(ref 2)) way of tagging a segregated cycleway is by using segregated=yes/no. **The following excerpt from map_features/paths.xml should be changed:** <input type="choice" name="Cycleway type" category="Cycle" description="What kind of bike path is this?" key="cycleway" presence="onTagMatch" priority="low"> <choice value="segregated" text="Segregated" description="Cyclists and pedestrians are separated by a painted line or kerb." /> <choice value="shared" text="Shared" description="Cyclists and pedestrians share the full width of the path." /> </input> **to:** <input type="choice" name="Cycleway type" category="Cycle" description="What kind of bike path is this?" key="segregated" presence="onTagMatch" priority="low"> <choice value="yes" text="Segregated" description="Cyclists and pedestrians are separated by a painted line or kerb." /> <choice value="no" text="Shared" description="Cyclists and pedestrians share the full width of the path." /> </input> (1) http://tagstat.telascience.org/tagdetails.php?tag=segregated (2) http://tagstat.telascience.org/tagvaluedetails.php?tag=cycleway&value=segregated and http://tagstat.telascience.org/tagvaluedetails.php?tag=cycleway&value=shared
defect
erroneous values for segregated cycleways in map features the value range currently shown in the simple editor for key cycleway are no lane track opposite lane opposite track opposite segregated and shared with the two latter selectable for ways tagged as highway cycleway and the other values possible to set for roads i e highway residential the proper according to the wiki and tag usage ref ref way of tagging a segregated cycleway is by using segregated yes no the following excerpt from map features paths xml should be changed to and
1
190,185
22,047,308,050
IssuesEvent
2022-05-30 04:15:56
pazhanivel07/linux-4.19.72
https://api.github.com/repos/pazhanivel07/linux-4.19.72
closed
WS-2021-0274 (High) detected in linux-yoctov5.4.51 - autoclosed
security vulnerability
## WS-2021-0274 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary> <p> <p>Yocto Linux Embedded kernel</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto>https://git.yoctoproject.org/git/linux-yocto</a></p> <p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/linux-4.19.72/commit/ce28e4f7a922d93d9b737061ae46827305c8c30a">ce28e4f7a922d93d9b737061ae46827305c8c30a</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/lib/seq_buf.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/lib/seq_buf.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Linux/Kernel in versions v5.13-rc1 to v5.13.2 is vulnerable to overflow in seq_buf_putmem_hex() <p>Publish Date: 2021-05-31 <p>URL: <a href=https://github.com/gregkh/linux/commit/d57fcab190b60f43046d5836c3c56114b4f50080>WS-2021-0274</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://osv.dev/vulnerability/UVI-2021-1001222">https://osv.dev/vulnerability/UVI-2021-1001222</a></p> <p>Release Date: 2021-05-31</p> <p>Fix Resolution: v5.13.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2021-0274 (High) detected in linux-yoctov5.4.51 - autoclosed - ## WS-2021-0274 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary> <p> <p>Yocto Linux Embedded kernel</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto>https://git.yoctoproject.org/git/linux-yocto</a></p> <p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/linux-4.19.72/commit/ce28e4f7a922d93d9b737061ae46827305c8c30a">ce28e4f7a922d93d9b737061ae46827305c8c30a</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/lib/seq_buf.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/lib/seq_buf.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Linux/Kernel in versions v5.13-rc1 to v5.13.2 is vulnerable to overflow in seq_buf_putmem_hex() <p>Publish Date: 2021-05-31 <p>URL: <a href=https://github.com/gregkh/linux/commit/d57fcab190b60f43046d5836c3c56114b4f50080>WS-2021-0274</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://osv.dev/vulnerability/UVI-2021-1001222">https://osv.dev/vulnerability/UVI-2021-1001222</a></p> <p>Release Date: 2021-05-31</p> <p>Fix Resolution: v5.13.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
ws high detected in linux autoclosed ws high severity vulnerability vulnerable library linux yocto linux embedded kernel library home page a href found in head commit a href found in base branch master vulnerable source files lib seq buf c lib seq buf c vulnerability details linux kernel in versions to is vulnerable to overflow in seq buf putmem hex publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
58,619
16,654,026,118
IssuesEvent
2021-06-05 07:17:52
Questie/Questie
https://api.github.com/repos/Questie/Questie
opened
Horde Quest "Trial and Error" giving out Lua Error
Type - Defect
Hello, doing the Horde Quest "Trial and Error" Questie is throwing me the following Error Message in Chat, while still being functional: [09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:690: bad argument #1 to 'next' (table expected, got nil) [09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554> [string "=[C]"]: in function `next' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:690: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683> [string "=[C]"]: in function `xpcall' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest' [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103> [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes' [string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278> [string "=[C]"]: ? [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71> [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func' [string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50> [09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:690: bad argument #1 to 'next' (table expected, got nil) [09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554> [string "=[C]"]: in function `next' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:690: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683> [string "=[C]"]: in function `xpcall' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest' [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103> [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes' [string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278> [string "=[C]"]: ? [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71> [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func' [string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50> [09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:690: bad argument #1 to 'next' (table expected, got nil) [09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554> [string "=[C]"]: in function `next' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:690: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683> [string "=[C]"]: in function `xpcall' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest' [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103> [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes' [string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278> [string "=[C]"]: ? [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71> [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func' [string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50> [09:10] Questie: [ERROR] [QuestieQuest]: [Tooltips] There was an error populating objectives for Test the fourth wand 10566 0 No error [09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:773: bad argument #1 to 'next' (table expected, got nil) [09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554> [string "=[C]"]: in function `next' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:773: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:772> [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:710: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683> [string "=[C]"]: in function `xpcall' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest' [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103> [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes' [string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278> [string "=[C]"]: ? [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71> [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func' [string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50> Im using Version 6.3.14 and hope this helps you to find the bug. Greetings, Prefo
1.0
Horde Quest "Trial and Error" giving out Lua Error - Hello, doing the Horde Quest "Trial and Error" Questie is throwing me the following Error Message in Chat, while still being functional: [09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:690: bad argument #1 to 'next' (table expected, got nil) [09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554> [string "=[C]"]: in function `next' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:690: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683> [string "=[C]"]: in function `xpcall' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest' [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103> [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes' [string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278> [string "=[C]"]: ? [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71> [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func' [string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50> [09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:690: bad argument #1 to 'next' (table expected, got nil) [09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554> [string "=[C]"]: in function `next' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:690: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683> [string "=[C]"]: in function `xpcall' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest' [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103> [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes' [string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278> [string "=[C]"]: ? [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71> [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func' [string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50> [09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:690: bad argument #1 to 'next' (table expected, got nil) [09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554> [string "=[C]"]: in function `next' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:690: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683> [string "=[C]"]: in function `xpcall' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest' [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103> [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes' [string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278> [string "=[C]"]: ? [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71> [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func' [string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50> [09:10] Questie: [ERROR] [QuestieQuest]: [Tooltips] There was an error populating objectives for Test the fourth wand 10566 0 No error [09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:773: bad argument #1 to 'next' (table expected, got nil) [09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554> [string "=[C]"]: in function `next' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:773: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:772> [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:710: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683> [string "=[C]"]: in function `xpcall' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes' [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest' [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103> [string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes' [string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278> [string "=[C]"]: ? [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71> [string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func' [string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50> Im using Version 6.3.14 and hope this helps you to find the bug. Greetings, Prefo
defect
horde quest trial and error giving out lua error hello doing the horde quest trial and error questie is throwing me the following error message in chat while still being functional erface addons questie modules quest questiequest lua bad argument to next table expected got nil in function in function next in function in function xpcall in function updateobjectivenotes in function updatequest in function in function comparequesthashes in function in function in function func in function erface addons questie modules quest questiequest lua bad argument to next table expected got nil in function in function next in function in function xpcall in function updateobjectivenotes in function updatequest in function in function comparequesthashes in function in function in function func in function erface addons questie modules quest questiequest lua bad argument to next table expected got nil in function in function next in function in function xpcall in function updateobjectivenotes in function updatequest in function in function comparequesthashes in function in function in function func in function questie there was an error populating objectives for test the fourth wand no error erface addons questie modules quest questiequest lua bad argument to next table expected got nil in function in function next in function in function in function xpcall in function updateobjectivenotes in function updatequest in function in function comparequesthashes in function in function in function func in function im using version and hope this helps you to find the bug greetings prefo
1
72,177
23,975,698,125
IssuesEvent
2022-09-13 11:24:54
BOINC/boinc
https://api.github.com/repos/BOINC/boinc
closed
BOINC 7.18.1 (Ubuntu) finally halts/crashes, when not able to report finished WU's.
C: Client - Daemon P: Minor R: fixed T: Defect
**Describe the bug** Too many unreported WU's causes a crash. **Steps To Reproduce** 1. (_A_) Project down due to crash, support etc. 2. BOINC not able to report finished WU's, keeping those as open files (_why?_), ready to send. 3. When using, like in this case, a [_preferably fast_] computer with many cores/threads, including a large buffer (_10+10 days_), a great number of WU's are stored locally on the computer. At some point, a (_unknown_) number of finished WU's will finally generate a '_too many open files_' error, halting BOINC completly. 4. At this point, a huge number of empty '_http_temp_nn_' files has been generated. As I have experienced this before (_even in Windows_), I've noticed that the number of those temp files varies when crashing. This time 554 and earlier sometimes above 20 000. **Screenshots -> BOINC status output** Kronos:~# /etc/init.d/boinc-client status ● boinc-client.service - Berkeley Open Infrastructure Network Computing Client Loaded: loaded (/lib/systemd/system/boinc-client.service; disabled; vendor preset: enabled) Active: active (running) since Tue 2022-09-06 14:50:51 CEST; 5s ago Docs: man:boinc(1) Main PID: 132441 (boinc) Tasks: 2 (limit: 309230) Memory: 120.1M CPU: 2.340s CGroup: /system.slice/boinc-client.service └─132441 /usr/bin/boinc sep 06 14:50:55 Kronos boinc[132441]: dir_open: Could not open directory 'slots/44' from '/var/lib/boinc-client'. sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [Universe@Home] Failed to open init file slots/44/init_data.xml sep 06 14:50:56 Kronos boinc[132441]: md5_file: can't open projects/universeathome.pl_universe/BHspin2_20_x86_64-pc-linux-gnu **sep 06 14:50:56 Kronos boinc[132441]: md5_file: Too many open files** sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [Universe@Home] md5_file failed for projects/universeathome.pl_universe/BHspin2_20_x86_64-pc-linux-gnu: fopen() failed sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [---] [cpu_sched_debug] Request CPU reschedule: start failed sep 06 14:50:56 Kronos boinc[132441]: dir_open: Could not open directory 'slots/55' from '/var/lib/boinc-client'. sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [Universe@Home] Failed to open init file slots/55/init_data.xml sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [---] [cpu_sched_debug] Request CPU reschedule: start failed sep 06 14:50:56 Kronos boinc[132441]: dir_open: Could not open directory 'slots/5' from '/var/lib/boinc-client'. Kronos:~# **System Information** - OS: (L)Ubuntu 22.05 LTS - BOINC Version: 7.18.1 **Additional context** The quick fix is to remove all '_boinc_lockfile_' and '_http_temp_nn_' files plus deleting the project including all WU's (_slots_) of concern. In my case it means about two days work lost, as Universe@Home was completely shut down about 48h for unknown reason (_the info available at their forum suggests server overload, without being sure_). Restarting the project in BOINC is not possible, as no projects are visible at the project tab. I noticed something was wrong with U@H earlier today (_at work_), but couldn't do anything before being at home and it was too late ... This issue should be an easy fix, if those files are kept closed until actually sending them (_the content_). **EDIT** After checking all my computers and Android devices (_mobiles and SBC's_), I found one more computer in the very same state.
1.0
BOINC 7.18.1 (Ubuntu) finally halts/crashes, when not able to report finished WU's. - **Describe the bug** Too many unreported WU's causes a crash. **Steps To Reproduce** 1. (_A_) Project down due to crash, support etc. 2. BOINC not able to report finished WU's, keeping those as open files (_why?_), ready to send. 3. When using, like in this case, a [_preferably fast_] computer with many cores/threads, including a large buffer (_10+10 days_), a great number of WU's are stored locally on the computer. At some point, a (_unknown_) number of finished WU's will finally generate a '_too many open files_' error, halting BOINC completly. 4. At this point, a huge number of empty '_http_temp_nn_' files has been generated. As I have experienced this before (_even in Windows_), I've noticed that the number of those temp files varies when crashing. This time 554 and earlier sometimes above 20 000. **Screenshots -> BOINC status output** Kronos:~# /etc/init.d/boinc-client status ● boinc-client.service - Berkeley Open Infrastructure Network Computing Client Loaded: loaded (/lib/systemd/system/boinc-client.service; disabled; vendor preset: enabled) Active: active (running) since Tue 2022-09-06 14:50:51 CEST; 5s ago Docs: man:boinc(1) Main PID: 132441 (boinc) Tasks: 2 (limit: 309230) Memory: 120.1M CPU: 2.340s CGroup: /system.slice/boinc-client.service └─132441 /usr/bin/boinc sep 06 14:50:55 Kronos boinc[132441]: dir_open: Could not open directory 'slots/44' from '/var/lib/boinc-client'. sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [Universe@Home] Failed to open init file slots/44/init_data.xml sep 06 14:50:56 Kronos boinc[132441]: md5_file: can't open projects/universeathome.pl_universe/BHspin2_20_x86_64-pc-linux-gnu **sep 06 14:50:56 Kronos boinc[132441]: md5_file: Too many open files** sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [Universe@Home] md5_file failed for projects/universeathome.pl_universe/BHspin2_20_x86_64-pc-linux-gnu: fopen() failed sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [---] [cpu_sched_debug] Request CPU reschedule: start failed sep 06 14:50:56 Kronos boinc[132441]: dir_open: Could not open directory 'slots/55' from '/var/lib/boinc-client'. sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [Universe@Home] Failed to open init file slots/55/init_data.xml sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [---] [cpu_sched_debug] Request CPU reschedule: start failed sep 06 14:50:56 Kronos boinc[132441]: dir_open: Could not open directory 'slots/5' from '/var/lib/boinc-client'. Kronos:~# **System Information** - OS: (L)Ubuntu 22.05 LTS - BOINC Version: 7.18.1 **Additional context** The quick fix is to remove all '_boinc_lockfile_' and '_http_temp_nn_' files plus deleting the project including all WU's (_slots_) of concern. In my case it means about two days work lost, as Universe@Home was completely shut down about 48h for unknown reason (_the info available at their forum suggests server overload, without being sure_). Restarting the project in BOINC is not possible, as no projects are visible at the project tab. I noticed something was wrong with U@H earlier today (_at work_), but couldn't do anything before being at home and it was too late ... This issue should be an easy fix, if those files are kept closed until actually sending them (_the content_). **EDIT** After checking all my computers and Android devices (_mobiles and SBC's_), I found one more computer in the very same state.
defect
boinc ubuntu finally halts crashes when not able to report finished wu s describe the bug too many unreported wu s causes a crash steps to reproduce a project down due to crash support etc boinc not able to report finished wu s keeping those as open files why ready to send when using like in this case a computer with many cores threads including a large buffer days a great number of wu s are stored locally on the computer at some point a unknown number of finished wu s will finally generate a too many open files error halting boinc completly at this point a huge number of empty http temp nn files has been generated as i have experienced this before even in windows i ve noticed that the number of those temp files varies when crashing this time and earlier sometimes above screenshots boinc status output kronos etc init d boinc client status ● boinc client service berkeley open infrastructure network computing client loaded loaded lib systemd system boinc client service disabled vendor preset enabled active active running since tue cest ago docs man boinc main pid boinc tasks limit memory cpu cgroup system slice boinc client service └─ usr bin boinc sep kronos boinc dir open could not open directory slots from var lib boinc client sep kronos boinc sep failed to open init file slots init data xml sep kronos boinc file can t open projects universeathome pl universe pc linux gnu sep kronos boinc file too many open files sep kronos boinc sep file failed for projects universeathome pl universe pc linux gnu fopen failed sep kronos boinc sep request cpu reschedule start failed sep kronos boinc dir open could not open directory slots from var lib boinc client sep kronos boinc sep failed to open init file slots init data xml sep kronos boinc sep request cpu reschedule start failed sep kronos boinc dir open could not open directory slots from var lib boinc client kronos system information os l ubuntu lts boinc version additional context the quick fix is to remove all boinc lockfile and http temp nn files plus deleting the project including all wu s slots of concern in my case it means about two days work lost as universe home was completely shut down about for unknown reason the info available at their forum suggests server overload without being sure restarting the project in boinc is not possible as no projects are visible at the project tab i noticed something was wrong with u h earlier today at work but couldn t do anything before being at home and it was too late this issue should be an easy fix if those files are kept closed until actually sending them the content edit after checking all my computers and android devices mobiles and sbc s i found one more computer in the very same state
1
23,657
3,851,865,260
IssuesEvent
2016-04-06 05:27:46
GPF/imame4all
https://api.github.com/repos/GPF/imame4all
closed
Mame4ios 1.3 on itunes?
auto-migrated Priority-Medium Type-Defect
``` any specific release date on itunes for non jalibroken devices and without developer certificate?. What version of the product are you using? On what operating system? iphone 5,ios 6.0.1 Please provide any additional information below. no jalibreak,no developer.cant wait...you are my hero. ``` Original issue reported on code.google.com by `sarahisa...@hotmail.com` on 17 Jan 2013 at 8:07
1.0
Mame4ios 1.3 on itunes? - ``` any specific release date on itunes for non jalibroken devices and without developer certificate?. What version of the product are you using? On what operating system? iphone 5,ios 6.0.1 Please provide any additional information below. no jalibreak,no developer.cant wait...you are my hero. ``` Original issue reported on code.google.com by `sarahisa...@hotmail.com` on 17 Jan 2013 at 8:07
defect
on itunes any specific release date on itunes for non jalibroken devices and without developer certificate what version of the product are you using on what operating system iphone ios please provide any additional information below no jalibreak no developer cant wait you are my hero original issue reported on code google com by sarahisa hotmail com on jan at
1
1,587
2,603,967,974
IssuesEvent
2015-02-24 18:59:32
chrsmith/nishazi6
https://api.github.com/repos/chrsmith/nishazi6
opened
沈阳人乳头瘤病毒核酸检
auto-migrated Priority-Medium Type-Defect
``` 沈阳人乳头瘤病毒核酸检〓沈陽軍區政治部醫院性病〓TEL:02 4-31023308〓成立于1946年,68年專注于性傳播疾病的研究和治療� ��位于沈陽市沈河區二緯路32號。是一所與新中國同建立共輝� ��的歷史悠久、設備精良、技術權威、專家云集,是預防、保 健、醫療、科研康復為一體的綜合性醫院。是國家首批公立�� �等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學� ��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍 空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集�� �二等功。 ``` ----- Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 7:13
1.0
沈阳人乳头瘤病毒核酸检 - ``` 沈阳人乳头瘤病毒核酸检〓沈陽軍區政治部醫院性病〓TEL:02 4-31023308〓成立于1946年,68年專注于性傳播疾病的研究和治療� ��位于沈陽市沈河區二緯路32號。是一所與新中國同建立共輝� ��的歷史悠久、設備精良、技術權威、專家云集,是預防、保 健、醫療、科研康復為一體的綜合性醫院。是國家首批公立�� �等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學� ��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍 空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集�� �二等功。 ``` ----- Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 7:13
defect
沈阳人乳头瘤病毒核酸检 沈阳人乳头瘤病毒核酸检〓沈陽軍區政治部醫院性病〓tel: 〓 , � �� 。是一所與新中國同建立共輝� ��的歷史悠久、設備精良、技術權威、專家云集,是預防、保 健、醫療、科研康復為一體的綜合性醫院。是國家首批公立�� �等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學� ��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍 空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集�� �二等功。 original issue reported on code google com by gmail com on jun at
1
30,218
11,801,272,121
IssuesEvent
2020-03-18 19:07:16
jgeraigery/blueocean-environments
https://api.github.com/repos/jgeraigery/blueocean-environments
opened
WS-2015-0024 (High) detected in uglify-js-2.2.5.tgz, uglify-js-2.3.6.tgz
security vulnerability
## WS-2015-0024 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>uglify-js-2.2.5.tgz</b>, <b>uglify-js-2.3.6.tgz</b></p></summary> <p> <details><summary><b>uglify-js-2.2.5.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/blueocean-environments/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/blueocean-environments/node_modules/transformers/node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - js-builder-0.0.62.tgz (Root Library) - transform-1.1.2.tgz - transformers-2.1.0.tgz - :x: **uglify-js-2.2.5.tgz** (Vulnerable Library) </details> <details><summary><b>uglify-js-2.3.6.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-2.3.6.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-2.3.6.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/blueocean-environments/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/blueocean-environments/node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - js-builder-0.0.62.tgz (Root Library) - handlebars-3.0.3.tgz - :x: **uglify-js-2.3.6.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/blueocean-environments/commit/906df1e2c2b1353a7f809ef51960f8980d6cec13">906df1e2c2b1353a7f809ef51960f8980d6cec13</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> UglifyJS versions 2.4.23 and earlier are affected by a vulnerability which allows a specially crafted Javascript file to have altered functionality after minification. <p>Publish Date: 2015-08-24 <p>URL: <a href=https://github.com/mishoo/UglifyJS2/issues/751>WS-2015-0024</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/mishoo/UglifyJS2/commit/905b6011784ca60d41919ac1a499962b7c1d4b02">https://github.com/mishoo/UglifyJS2/commit/905b6011784ca60d41919ac1a499962b7c1d4b02</a></p> <p>Release Date: 2017-01-31</p> <p>Fix Resolution: v2.4.24</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"uglify-js","packageVersion":"2.2.5","isTransitiveDependency":true,"dependencyTree":"@jenkins-cd/js-builder:0.0.62;transform:1.1.2;transformers:2.1.0;uglify-js:2.2.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v2.4.24"},{"packageType":"javascript/Node.js","packageName":"uglify-js","packageVersion":"2.3.6","isTransitiveDependency":true,"dependencyTree":"@jenkins-cd/js-builder:0.0.62;handlebars:3.0.3;uglify-js:2.3.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v2.4.24"}],"vulnerabilityIdentifier":"WS-2015-0024","vulnerabilityDetails":"UglifyJS versions 2.4.23 and earlier are affected by a vulnerability which allows a specially crafted Javascript file to have altered functionality after minification.","vulnerabilityUrl":"https://github.com/mishoo/UglifyJS2/issues/751","cvss3Severity":"high","cvss3Score":"8.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
WS-2015-0024 (High) detected in uglify-js-2.2.5.tgz, uglify-js-2.3.6.tgz - ## WS-2015-0024 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>uglify-js-2.2.5.tgz</b>, <b>uglify-js-2.3.6.tgz</b></p></summary> <p> <details><summary><b>uglify-js-2.2.5.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/blueocean-environments/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/blueocean-environments/node_modules/transformers/node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - js-builder-0.0.62.tgz (Root Library) - transform-1.1.2.tgz - transformers-2.1.0.tgz - :x: **uglify-js-2.2.5.tgz** (Vulnerable Library) </details> <details><summary><b>uglify-js-2.3.6.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-2.3.6.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-2.3.6.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/blueocean-environments/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/blueocean-environments/node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - js-builder-0.0.62.tgz (Root Library) - handlebars-3.0.3.tgz - :x: **uglify-js-2.3.6.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/blueocean-environments/commit/906df1e2c2b1353a7f809ef51960f8980d6cec13">906df1e2c2b1353a7f809ef51960f8980d6cec13</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> UglifyJS versions 2.4.23 and earlier are affected by a vulnerability which allows a specially crafted Javascript file to have altered functionality after minification. <p>Publish Date: 2015-08-24 <p>URL: <a href=https://github.com/mishoo/UglifyJS2/issues/751>WS-2015-0024</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/mishoo/UglifyJS2/commit/905b6011784ca60d41919ac1a499962b7c1d4b02">https://github.com/mishoo/UglifyJS2/commit/905b6011784ca60d41919ac1a499962b7c1d4b02</a></p> <p>Release Date: 2017-01-31</p> <p>Fix Resolution: v2.4.24</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"uglify-js","packageVersion":"2.2.5","isTransitiveDependency":true,"dependencyTree":"@jenkins-cd/js-builder:0.0.62;transform:1.1.2;transformers:2.1.0;uglify-js:2.2.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v2.4.24"},{"packageType":"javascript/Node.js","packageName":"uglify-js","packageVersion":"2.3.6","isTransitiveDependency":true,"dependencyTree":"@jenkins-cd/js-builder:0.0.62;handlebars:3.0.3;uglify-js:2.3.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v2.4.24"}],"vulnerabilityIdentifier":"WS-2015-0024","vulnerabilityDetails":"UglifyJS versions 2.4.23 and earlier are affected by a vulnerability which allows a specially crafted Javascript file to have altered functionality after minification.","vulnerabilityUrl":"https://github.com/mishoo/UglifyJS2/issues/751","cvss3Severity":"high","cvss3Score":"8.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_defect
ws high detected in uglify js tgz uglify js tgz ws high severity vulnerability vulnerable libraries uglify js tgz uglify js tgz uglify js tgz javascript parser mangler compressor and beautifier toolkit library home page a href path to dependency file tmp ws scm blueocean environments package json path to vulnerable library tmp ws scm blueocean environments node modules transformers node modules uglify js package json dependency hierarchy js builder tgz root library transform tgz transformers tgz x uglify js tgz vulnerable library uglify js tgz javascript parser mangler compressor and beautifier toolkit library home page a href path to dependency file tmp ws scm blueocean environments package json path to vulnerable library tmp ws scm blueocean environments node modules uglify js package json dependency hierarchy js builder tgz root library handlebars tgz x uglify js tgz vulnerable library found in head commit a href vulnerability details uglifyjs versions and earlier are affected by a vulnerability which allows a specially crafted javascript file to have altered functionality after minification publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope changed impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier ws vulnerabilitydetails uglifyjs versions and earlier are affected by a vulnerability which allows a specially crafted javascript file to have altered functionality after minification vulnerabilityurl
0
244,014
26,345,440,981
IssuesEvent
2023-01-10 21:35:37
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
The link for 'Vulnerability Assessment' is 404
triaged assigned-to-author doc-enhancement security/subsvc Pri2 sql-db-mi/svc docs-bug
Hi team, In this page https://learn.microsoft.com/en-us/azure/azure-sql/database/sql-database-vulnerability-assessment-rules?view=azuresql The link for '[Vulnerability Assessment](https://learn.microsoft.com/en-us/azure/azure-sql/database/sql-vulnerability-assessment?view=azuresql)' is 404. ![image](https://user-images.githubusercontent.com/92571997/207280492-0d9a8147-5b61-4077-9b07-32d68ca8534d.png) ![image](https://user-images.githubusercontent.com/92571997/207280576-a6e1445b-d8ae-479f-9009-63320d0f886a.png) Could provide correct link for this step? --- #### Document Details ⚠ *Do not edit this section. It is required for learn.microsoft.com ➟ GitHub issue linking.* * ID: bd323e04-8cc0-c6fe-eb83-a7210b4c0be6 * Version Independent ID: 168eb7ff-2051-a3d9-a86c-891745637c3b * Content: [SQL Vulnerability Assessment rules reference guide - Azure SQL Database](https://learn.microsoft.com/en-us/azure/azure-sql/database/sql-database-vulnerability-assessment-rules?view=azuresql) * Content Source: [azure-sql/database/sql-database-vulnerability-assessment-rules.md](https://github.com/MicrosoftDocs/sql-docs/blob/live/azure-sql/database/sql-database-vulnerability-assessment-rules.md) * Service: **sql-db-mi** * Sub-service: **security** * GitHub Login: @CESANU * Microsoft Alias: **cesanu**
True
The link for 'Vulnerability Assessment' is 404 - Hi team, In this page https://learn.microsoft.com/en-us/azure/azure-sql/database/sql-database-vulnerability-assessment-rules?view=azuresql The link for '[Vulnerability Assessment](https://learn.microsoft.com/en-us/azure/azure-sql/database/sql-vulnerability-assessment?view=azuresql)' is 404. ![image](https://user-images.githubusercontent.com/92571997/207280492-0d9a8147-5b61-4077-9b07-32d68ca8534d.png) ![image](https://user-images.githubusercontent.com/92571997/207280576-a6e1445b-d8ae-479f-9009-63320d0f886a.png) Could provide correct link for this step? --- #### Document Details ⚠ *Do not edit this section. It is required for learn.microsoft.com ➟ GitHub issue linking.* * ID: bd323e04-8cc0-c6fe-eb83-a7210b4c0be6 * Version Independent ID: 168eb7ff-2051-a3d9-a86c-891745637c3b * Content: [SQL Vulnerability Assessment rules reference guide - Azure SQL Database](https://learn.microsoft.com/en-us/azure/azure-sql/database/sql-database-vulnerability-assessment-rules?view=azuresql) * Content Source: [azure-sql/database/sql-database-vulnerability-assessment-rules.md](https://github.com/MicrosoftDocs/sql-docs/blob/live/azure-sql/database/sql-database-vulnerability-assessment-rules.md) * Service: **sql-db-mi** * Sub-service: **security** * GitHub Login: @CESANU * Microsoft Alias: **cesanu**
non_defect
the link for vulnerability assessment is hi team in this page the link for is could provide correct link for this step document details ⚠ do not edit this section it is required for learn microsoft com ➟ github issue linking id version independent id content content source service sql db mi sub service security github login cesanu microsoft alias cesanu
0
258,610
27,565,499,757
IssuesEvent
2023-03-08 03:11:32
rvvergara/bookstore_rails_app
https://api.github.com/repos/rvvergara/bookstore_rails_app
closed
CVE-2021-22885 (High) detected in actionpack-5.2.3.gem - autoclosed
Mend: dependency security vulnerability
## CVE-2021-22885 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>actionpack-5.2.3.gem</b></p></summary> <p>Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.</p> <p>Library home page: <a href="https://rubygems.org/gems/actionpack-5.2.3.gem">https://rubygems.org/gems/actionpack-5.2.3.gem</a></p> <p> Dependency Hierarchy: - rails-5.2.3.gem (Root Library) - :x: **actionpack-5.2.3.gem** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A possible information disclosure / unintended method execution vulnerability in Action Pack >= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input. <p>Publish Date: 2021-05-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-22885>CVE-2021-22885</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-hjg4-8q5f-x6fm">https://github.com/advisories/GHSA-hjg4-8q5f-x6fm</a></p> <p>Release Date: 2021-05-27</p> <p>Fix Resolution: actionpack - 5.2.4.6,5.2.6,6.0.3.7,6.1.3.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-22885 (High) detected in actionpack-5.2.3.gem - autoclosed - ## CVE-2021-22885 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>actionpack-5.2.3.gem</b></p></summary> <p>Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.</p> <p>Library home page: <a href="https://rubygems.org/gems/actionpack-5.2.3.gem">https://rubygems.org/gems/actionpack-5.2.3.gem</a></p> <p> Dependency Hierarchy: - rails-5.2.3.gem (Root Library) - :x: **actionpack-5.2.3.gem** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A possible information disclosure / unintended method execution vulnerability in Action Pack >= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input. <p>Publish Date: 2021-05-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-22885>CVE-2021-22885</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-hjg4-8q5f-x6fm">https://github.com/advisories/GHSA-hjg4-8q5f-x6fm</a></p> <p>Release Date: 2021-05-27</p> <p>Fix Resolution: actionpack - 5.2.4.6,5.2.6,6.0.3.7,6.1.3.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in actionpack gem autoclosed cve high severity vulnerability vulnerable library actionpack gem web apps on rails simple battle tested conventions for building and testing mvc web applications works with any rack compatible server library home page a href dependency hierarchy rails gem root library x actionpack gem vulnerable library found in base branch master vulnerability details a possible information disclosure unintended method execution vulnerability in action pack when using the redirect to or polymorphic url helper with untrusted user input publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution actionpack step up your open source security game with mend
0
62,413
17,023,918,453
IssuesEvent
2021-07-03 04:33:09
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
closed
If "background imagery" list is too long, you can't select the "vector file" option
Component: potlatch2 Priority: minor Resolution: fixed Type: defect
**[Submitted to the original trac issue database at 12.45pm, Saturday, 28th February 2015]** "Vector file" is needed to be able to select waypoints (decent waypoint handling is something that P2 does that none of the other OSM editors - with the exception of P1 - do). On a Windows 7 laptop with SeaMonkey as the browser, with the browser at a "normal size to use" I see nothing below "sharpen". The "root cause" of this is arguably the same as https://trac.openstreetmap.org/ticket/5208 - an over-long imagery list full of antique maps that really aren't any use for everyday mapping (but, as pnorman pointed out on that ticket, insisted on by people who like to look at old maps) - but that's ticket 5208. This ticket is trying to say "if the imagery list is that long for whatever reason, truncate it, or make it scrollable, or reorder it or something else so that the "Vector File" option is still accessible.
1.0
If "background imagery" list is too long, you can't select the "vector file" option - **[Submitted to the original trac issue database at 12.45pm, Saturday, 28th February 2015]** "Vector file" is needed to be able to select waypoints (decent waypoint handling is something that P2 does that none of the other OSM editors - with the exception of P1 - do). On a Windows 7 laptop with SeaMonkey as the browser, with the browser at a "normal size to use" I see nothing below "sharpen". The "root cause" of this is arguably the same as https://trac.openstreetmap.org/ticket/5208 - an over-long imagery list full of antique maps that really aren't any use for everyday mapping (but, as pnorman pointed out on that ticket, insisted on by people who like to look at old maps) - but that's ticket 5208. This ticket is trying to say "if the imagery list is that long for whatever reason, truncate it, or make it scrollable, or reorder it or something else so that the "Vector File" option is still accessible.
defect
if background imagery list is too long you can t select the vector file option vector file is needed to be able to select waypoints decent waypoint handling is something that does that none of the other osm editors with the exception of do on a windows laptop with seamonkey as the browser with the browser at a normal size to use i see nothing below sharpen the root cause of this is arguably the same as an over long imagery list full of antique maps that really aren t any use for everyday mapping but as pnorman pointed out on that ticket insisted on by people who like to look at old maps but that s ticket this ticket is trying to say if the imagery list is that long for whatever reason truncate it or make it scrollable or reorder it or something else so that the vector file option is still accessible
1
65,469
12,599,385,577
IssuesEvent
2020-06-11 05:52:24
joomla/joomla-cms
https://api.github.com/repos/joomla/joomla-cms
closed
[4.0] Smart Search error on PostgreSQL
No Code Attached Yet
### Steps to reproduce the issue Use PostgreSQL. Perform a search in frontend. ### Expected result Works. ### Actual result ``` 22P02, 7, ERROR: invalid input syntax for type bytea LINE 3: ('blog','O:51:"Joomla\\Component\\Finder\\Administrator\\Ind... ^ () JROOT\libraries\vendor\joomla\database\src\Pdo\PdoDriver.php:497 2 Joomla\Database\Pdo\PdoDriver->execute() JROOT\libraries\vendor\joomla\database\src\Pgsql\PgsqlDriver.php:790 3 Joomla\Database\Pgsql\PgsqlDriver->insertObject() JROOT\components\com_finder\src\Helper\FinderHelper.php:86 4 Joomla\Component\Finder\Site\Helper\FinderHelper::logSearch() JROOT\components\com_finder\src\View\Search\HtmlView.php:181 5 Joomla\Component\Finder\Site\View\Search\HtmlView->display() JROOT\libraries\src\MVC\Controller\BaseController.php:691 6 Joomla\CMS\MVC\Controller\BaseController->display() JROOT\components\com_finder\src\Controller\DisplayController.php:59 7 Joomla\Component\Finder\Site\Controller\DisplayController->display() JROOT\libraries\src\MVC\Controller\BaseController.php:729 8 Joomla\CMS\MVC\Controller\BaseController->execute() JROOT\libraries\src\Dispatcher\ComponentDispatcher.php:146 9 Joomla\CMS\Dispatcher\ComponentDispatcher->dispatch() JROOT\libraries\src\Component\ComponentHelper.php:384 10 Joomla\CMS\Component\ComponentHelper::renderComponent() JROOT\libraries\src\Application\SiteApplication.php:196 11 Joomla\CMS\Application\SiteApplication->dispatch() JROOT\libraries\src\Application\SiteApplication.php:235 12 Joomla\CMS\Application\SiteApplication->doExecute() JROOT\libraries\src\Application\CMSApplication.php:231 13 Joomla\CMS\Application\CMSApplication->execute() JROOT\includes\app.php:63 14 require_once() JROOT\index.php:36 ``` ### System information (as much as possible) PostgreSQL 11.5 ### Additional comments Coming from this line: https://github.com/joomla/joomla-cms/blob/65abc0392008982cc33d765e1e1ee4aa3a787bb1/components/com_finder/src/Helper/FinderHelper.php#L84
1.0
[4.0] Smart Search error on PostgreSQL - ### Steps to reproduce the issue Use PostgreSQL. Perform a search in frontend. ### Expected result Works. ### Actual result ``` 22P02, 7, ERROR: invalid input syntax for type bytea LINE 3: ('blog','O:51:"Joomla\\Component\\Finder\\Administrator\\Ind... ^ () JROOT\libraries\vendor\joomla\database\src\Pdo\PdoDriver.php:497 2 Joomla\Database\Pdo\PdoDriver->execute() JROOT\libraries\vendor\joomla\database\src\Pgsql\PgsqlDriver.php:790 3 Joomla\Database\Pgsql\PgsqlDriver->insertObject() JROOT\components\com_finder\src\Helper\FinderHelper.php:86 4 Joomla\Component\Finder\Site\Helper\FinderHelper::logSearch() JROOT\components\com_finder\src\View\Search\HtmlView.php:181 5 Joomla\Component\Finder\Site\View\Search\HtmlView->display() JROOT\libraries\src\MVC\Controller\BaseController.php:691 6 Joomla\CMS\MVC\Controller\BaseController->display() JROOT\components\com_finder\src\Controller\DisplayController.php:59 7 Joomla\Component\Finder\Site\Controller\DisplayController->display() JROOT\libraries\src\MVC\Controller\BaseController.php:729 8 Joomla\CMS\MVC\Controller\BaseController->execute() JROOT\libraries\src\Dispatcher\ComponentDispatcher.php:146 9 Joomla\CMS\Dispatcher\ComponentDispatcher->dispatch() JROOT\libraries\src\Component\ComponentHelper.php:384 10 Joomla\CMS\Component\ComponentHelper::renderComponent() JROOT\libraries\src\Application\SiteApplication.php:196 11 Joomla\CMS\Application\SiteApplication->dispatch() JROOT\libraries\src\Application\SiteApplication.php:235 12 Joomla\CMS\Application\SiteApplication->doExecute() JROOT\libraries\src\Application\CMSApplication.php:231 13 Joomla\CMS\Application\CMSApplication->execute() JROOT\includes\app.php:63 14 require_once() JROOT\index.php:36 ``` ### System information (as much as possible) PostgreSQL 11.5 ### Additional comments Coming from this line: https://github.com/joomla/joomla-cms/blob/65abc0392008982cc33d765e1e1ee4aa3a787bb1/components/com_finder/src/Helper/FinderHelper.php#L84
non_defect
smart search error on postgresql steps to reproduce the issue use postgresql perform a search in frontend expected result works actual result error invalid input syntax for type bytea line blog o joomla component finder administrator ind jroot libraries vendor joomla database src pdo pdodriver php joomla database pdo pdodriver execute jroot libraries vendor joomla database src pgsql pgsqldriver php joomla database pgsql pgsqldriver insertobject jroot components com finder src helper finderhelper php joomla component finder site helper finderhelper logsearch jroot components com finder src view search htmlview php joomla component finder site view search htmlview display jroot libraries src mvc controller basecontroller php joomla cms mvc controller basecontroller display jroot components com finder src controller displaycontroller php joomla component finder site controller displaycontroller display jroot libraries src mvc controller basecontroller php joomla cms mvc controller basecontroller execute jroot libraries src dispatcher componentdispatcher php joomla cms dispatcher componentdispatcher dispatch jroot libraries src component componenthelper php joomla cms component componenthelper rendercomponent jroot libraries src application siteapplication php joomla cms application siteapplication dispatch jroot libraries src application siteapplication php joomla cms application siteapplication doexecute jroot libraries src application cmsapplication php joomla cms application cmsapplication execute jroot includes app php require once jroot index php system information as much as possible postgresql additional comments coming from this line
0
601,037
18,364,443,896
IssuesEvent
2021-10-09 20:13:46
AY2122S1-CS2103T-W11-1/tp
https://api.github.com/repos/AY2122S1-CS2103T-W11-1/tp
closed
Integrate Recipe and Ingredient in master branch
priority.High
After #31 is resolved, Need to merge dev-ingredient branch to master and resolve potential conflict.
1.0
Integrate Recipe and Ingredient in master branch - After #31 is resolved, Need to merge dev-ingredient branch to master and resolve potential conflict.
non_defect
integrate recipe and ingredient in master branch after is resolved need to merge dev ingredient branch to master and resolve potential conflict
0
27,016
4,858,350,312
IssuesEvent
2016-11-13 02:57:46
solrmarc/solrmarc
https://api.github.com/repos/solrmarc/solrmarc
closed
fieldSpec with brackets: for control field, it should mean byte sequence; for non-control field, it should mean regex pattern
auto-migrated Priority-Medium Type-Defect
``` Code currently treats numeric chars in brackets as a byte sequence: 008[7-12] but treats non-numeric as a regex pattern: 650[a-dg-p] Since subfields can be numeric, a better solution is to assume it's a byte sequence for control fields (leader, 0 < tag <= 9), and a regex pattern for other fields. ``` Original issue reported on code.google.com by `naomi.du...@gmail.com` on 21 Aug 2009 at 6:10
1.0
fieldSpec with brackets: for control field, it should mean byte sequence; for non-control field, it should mean regex pattern - ``` Code currently treats numeric chars in brackets as a byte sequence: 008[7-12] but treats non-numeric as a regex pattern: 650[a-dg-p] Since subfields can be numeric, a better solution is to assume it's a byte sequence for control fields (leader, 0 < tag <= 9), and a regex pattern for other fields. ``` Original issue reported on code.google.com by `naomi.du...@gmail.com` on 21 Aug 2009 at 6:10
defect
fieldspec with brackets for control field it should mean byte sequence for non control field it should mean regex pattern code currently treats numeric chars in brackets as a byte sequence but treats non numeric as a regex pattern since subfields can be numeric a better solution is to assume it s a byte sequence for control fields leader tag and a regex pattern for other fields original issue reported on code google com by naomi du gmail com on aug at
1
157,147
5,996,258,744
IssuesEvent
2017-06-03 12:33:02
ARCOMM/ARC-Web
https://api.github.com/repos/ARCOMM/ARC-Web
closed
Intercept paste event to strip formatting
priority/high type/enhancement
```js editor.addEventListener('paste', (e) => { // Cancel paste e.preventDefault(); // Get text representation of clipboard let text = e.clipboardData.getData('text/plain'); // Insert text manually document.execCommand('insertHTML', false, text); }); ```
1.0
Intercept paste event to strip formatting - ```js editor.addEventListener('paste', (e) => { // Cancel paste e.preventDefault(); // Get text representation of clipboard let text = e.clipboardData.getData('text/plain'); // Insert text manually document.execCommand('insertHTML', false, text); }); ```
non_defect
intercept paste event to strip formatting js editor addeventlistener paste e cancel paste e preventdefault get text representation of clipboard let text e clipboarddata getdata text plain insert text manually document execcommand inserthtml false text
0
15,745
2,869,009,004
IssuesEvent
2015-06-05 22:33:07
dart-lang/sdk
https://api.github.com/repos/dart-lang/sdk
closed
intl package: add CLDR-based Iterable formatting
Area-Pkg Pkg-Intl Priority-Unassigned Triaged Type-Defect
*This issue was originally filed by @seaneagan* _____ The intlx package (http://pub.dartlang.org/packages/intlx) has an IterableFormat API which formats Iterables using locale specific separators. See the following links for more information: Demo: http://seaneagan.me/intlx/ Docs: http://seaneagan.me/intlx/docs/intlx/IterableFormat.html This should be moved to the intl package.
1.0
intl package: add CLDR-based Iterable formatting - *This issue was originally filed by @seaneagan* _____ The intlx package (http://pub.dartlang.org/packages/intlx) has an IterableFormat API which formats Iterables using locale specific separators. See the following links for more information: Demo: http://seaneagan.me/intlx/ Docs: http://seaneagan.me/intlx/docs/intlx/IterableFormat.html This should be moved to the intl package.
defect
intl package add cldr based iterable formatting this issue was originally filed by seaneagan the intlx package has an iterableformat api which formats iterables using locale specific separators see the following links for more information demo docs this should be moved to the intl package
1
7,912
2,611,065,300
IssuesEvent
2015-02-27 00:30:30
alistairreilly/andors-trail
https://api.github.com/repos/alistairreilly/andors-trail
opened
ring loot not in inventory
auto-migrated Milestone-0.6.11 Type-Defect
``` Before posting, please read the following guidelines for posts in the issue tracker: http://code.google.com/p/andors-trail/wiki/Forums_vs_issuetracker What steps will reproduce the problem? 1. Defeat the guard outside foaming flask tavern 2. Drops a ring 3. What is the expected output? What do you see instead? Ring to be in inventory. But It's not there. What version of the product are you using? On what device? 6.8 Android 2.2 Please provide any additional information below. ``` Original issue reported on code.google.com by `iamtcar...@gmail.com` on 13 Apr 2011 at 9:10
1.0
ring loot not in inventory - ``` Before posting, please read the following guidelines for posts in the issue tracker: http://code.google.com/p/andors-trail/wiki/Forums_vs_issuetracker What steps will reproduce the problem? 1. Defeat the guard outside foaming flask tavern 2. Drops a ring 3. What is the expected output? What do you see instead? Ring to be in inventory. But It's not there. What version of the product are you using? On what device? 6.8 Android 2.2 Please provide any additional information below. ``` Original issue reported on code.google.com by `iamtcar...@gmail.com` on 13 Apr 2011 at 9:10
defect
ring loot not in inventory before posting please read the following guidelines for posts in the issue tracker what steps will reproduce the problem defeat the guard outside foaming flask tavern drops a ring what is the expected output what do you see instead ring to be in inventory but it s not there what version of the product are you using on what device android please provide any additional information below original issue reported on code google com by iamtcar gmail com on apr at
1
73,909
14,142,765,392
IssuesEvent
2020-11-10 14:30:06
microsoft/vscode-pull-request-github
https://api.github.com/repos/microsoft/vscode-pull-request-github
closed
Gutter decorations slightly off-centre
bug upstream/vscode
<!-- Please search existing issues to avoid creating duplicates. --> <!-- Use Help > Report Issue to prefill these. --> - Extension version: 0.2.3 - VSCode Version: 1.28.2 - OS: macOS 10.14.1 The `+` symbol skews towards the left and the `♦` symbol skews towards the top ever so slightly. <img width="42" alt="screen shot 2018-11-02 at 7 58 24 pm" src="https://user-images.githubusercontent.com/9157833/47945728-554ac380-deda-11e8-878f-eab30482af4c.png">
1.0
Gutter decorations slightly off-centre - <!-- Please search existing issues to avoid creating duplicates. --> <!-- Use Help > Report Issue to prefill these. --> - Extension version: 0.2.3 - VSCode Version: 1.28.2 - OS: macOS 10.14.1 The `+` symbol skews towards the left and the `♦` symbol skews towards the top ever so slightly. <img width="42" alt="screen shot 2018-11-02 at 7 58 24 pm" src="https://user-images.githubusercontent.com/9157833/47945728-554ac380-deda-11e8-878f-eab30482af4c.png">
non_defect
gutter decorations slightly off centre report issue to prefill these extension version vscode version os macos the symbol skews towards the left and the ♦ symbol skews towards the top ever so slightly img width alt screen shot at pm src
0
69,815
22,682,262,898
IssuesEvent
2022-07-04 10:57:55
vector-im/element-android
https://api.github.com/repos/vector-im/element-android
opened
Sending a screenshot is super ugly, because the overlayed UI clashes with the screenshotted UI
T-Defect
### Steps to reproduce 1. Take a screenshot 2. Send it in the app 3. Get very confused by the very ugly preview screen, which shows Element UI superimposed on the screenshot UI. 4. Guess and hit the FAB green send button, even though everything is unreadable: ![Uploading image.png…]() ### Outcome #### What did you expect? Legible UI when sending a screenshot #### What happened instead? Illegible UI ### Your phone model Samsung Galaxy S10 ### Operating system version Android 12 (One UI 4.1) ### Application version and app store 1.4.24-dev [401042424] ### Homeserver matrix.org ### Will you send logs? No ### Are you willing to provide a PR? No
1.0
Sending a screenshot is super ugly, because the overlayed UI clashes with the screenshotted UI - ### Steps to reproduce 1. Take a screenshot 2. Send it in the app 3. Get very confused by the very ugly preview screen, which shows Element UI superimposed on the screenshot UI. 4. Guess and hit the FAB green send button, even though everything is unreadable: ![Uploading image.png…]() ### Outcome #### What did you expect? Legible UI when sending a screenshot #### What happened instead? Illegible UI ### Your phone model Samsung Galaxy S10 ### Operating system version Android 12 (One UI 4.1) ### Application version and app store 1.4.24-dev [401042424] ### Homeserver matrix.org ### Will you send logs? No ### Are you willing to provide a PR? No
defect
sending a screenshot is super ugly because the overlayed ui clashes with the screenshotted ui steps to reproduce take a screenshot send it in the app get very confused by the very ugly preview screen which shows element ui superimposed on the screenshot ui guess and hit the fab green send button even though everything is unreadable outcome what did you expect legible ui when sending a screenshot what happened instead illegible ui your phone model samsung galaxy operating system version android one ui application version and app store dev homeserver matrix org will you send logs no are you willing to provide a pr no
1
28,189
5,217,129,365
IssuesEvent
2017-01-26 12:52:57
primefaces/primeng
https://api.github.com/repos/primefaces/primeng
closed
Listbox: select all option does not work well when using the filter
defect
<!-- - IF YOU DON'T FILL OUT THE FOLLOWING INFORMATION WE MIGHT CLOSE YOUR ISSUE WITHOUT INVESTIGATING. - IF YOU'D LIKE TO SECURE OUR RESPONSE, YOU MAY CONSIDER PRIMENG PRO SUPPORT WHERE SUPPORT IS PROVIDED WITHIN 4 hours. --> **I'm submitting a ...** (check one with "x") ``` [x] bug report => Search github for a similar issue or PR before submitting [ ] feature request => Please check if request is not on the roadmap already https://github.com/primefaces/primeng/wiki/Roadmap [ ] support request => Please do not submit support request here, instead see http://forum.primefaces.org/viewforum.php?f=35 ``` **Plunkr Case (Bug Reports)** I tried to build a Plunkr Case for it but i encountered importing the Listbox module. Any help with it will be much appreciated. **Current behavior** Filter the multi-select, you will see that the list box shows all items that *contains* the entered filter but clicking will only select items that *begins* with the entered filter. **Expected behavior** Select-all should select all options you currently see on the listbox. **Minimal reproduction of the problem with instructions** 1. Go to the documentation of Listbox: http://www.primefaces.org/primeng/#/listbox use the Advanced (Multiple, Checkbox and Filter) demo. 2. In the filter enter the letter 'r' => (you will see only options that contains the letter 'r', which is good) 3. Click on select-all => only Rome will be selected. **What is the motivation / use case for changing the behavior?** We think that selecting all items once you use the filter if a very common and important case in this component. It definitely the case for us...
1.0
Listbox: select all option does not work well when using the filter - <!-- - IF YOU DON'T FILL OUT THE FOLLOWING INFORMATION WE MIGHT CLOSE YOUR ISSUE WITHOUT INVESTIGATING. - IF YOU'D LIKE TO SECURE OUR RESPONSE, YOU MAY CONSIDER PRIMENG PRO SUPPORT WHERE SUPPORT IS PROVIDED WITHIN 4 hours. --> **I'm submitting a ...** (check one with "x") ``` [x] bug report => Search github for a similar issue or PR before submitting [ ] feature request => Please check if request is not on the roadmap already https://github.com/primefaces/primeng/wiki/Roadmap [ ] support request => Please do not submit support request here, instead see http://forum.primefaces.org/viewforum.php?f=35 ``` **Plunkr Case (Bug Reports)** I tried to build a Plunkr Case for it but i encountered importing the Listbox module. Any help with it will be much appreciated. **Current behavior** Filter the multi-select, you will see that the list box shows all items that *contains* the entered filter but clicking will only select items that *begins* with the entered filter. **Expected behavior** Select-all should select all options you currently see on the listbox. **Minimal reproduction of the problem with instructions** 1. Go to the documentation of Listbox: http://www.primefaces.org/primeng/#/listbox use the Advanced (Multiple, Checkbox and Filter) demo. 2. In the filter enter the letter 'r' => (you will see only options that contains the letter 'r', which is good) 3. Click on select-all => only Rome will be selected. **What is the motivation / use case for changing the behavior?** We think that selecting all items once you use the filter if a very common and important case in this component. It definitely the case for us...
defect
listbox select all option does not work well when using the filter if you don t fill out the following information we might close your issue without investigating if you d like to secure our response you may consider primeng pro support where support is provided within hours i m submitting a check one with x bug report search github for a similar issue or pr before submitting feature request please check if request is not on the roadmap already support request please do not submit support request here instead see plunkr case bug reports i tried to build a plunkr case for it but i encountered importing the listbox module any help with it will be much appreciated current behavior filter the multi select you will see that the list box shows all items that contains the entered filter but clicking will only select items that begins with the entered filter expected behavior select all should select all options you currently see on the listbox minimal reproduction of the problem with instructions go to the documentation of listbox use the advanced multiple checkbox and filter demo in the filter enter the letter r you will see only options that contains the letter r which is good click on select all only rome will be selected what is the motivation use case for changing the behavior we think that selecting all items once you use the filter if a very common and important case in this component it definitely the case for us
1
278,102
30,702,199,756
IssuesEvent
2023-07-27 01:10:50
snykiotcubedev/arangodb-3.7.6
https://api.github.com/repos/snykiotcubedev/arangodb-3.7.6
reopened
CVE-2021-3822 (High) detected in jsoneditor-5.34.0.tgz
Mend: dependency security vulnerability
## CVE-2021-3822 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsoneditor-5.34.0.tgz</b></p></summary> <p>A web-based tool to view, edit, format, and validate JSON</p> <p>Library home page: <a href="https://registry.npmjs.org/jsoneditor/-/jsoneditor-5.34.0.tgz">https://registry.npmjs.org/jsoneditor/-/jsoneditor-5.34.0.tgz</a></p> <p> Dependency Hierarchy: - :x: **jsoneditor-5.34.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/snykiotcubedev/arangodb-3.7.6/commit/fce8f85f1c2f070c8e6a8e76d17210a2117d3833">fce8f85f1c2f070c8e6a8e76d17210a2117d3833</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> jsoneditor is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-3822>CVE-2021-3822</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2021-09-27</p> <p>Fix Resolution: 9.5.6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-3822 (High) detected in jsoneditor-5.34.0.tgz - ## CVE-2021-3822 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsoneditor-5.34.0.tgz</b></p></summary> <p>A web-based tool to view, edit, format, and validate JSON</p> <p>Library home page: <a href="https://registry.npmjs.org/jsoneditor/-/jsoneditor-5.34.0.tgz">https://registry.npmjs.org/jsoneditor/-/jsoneditor-5.34.0.tgz</a></p> <p> Dependency Hierarchy: - :x: **jsoneditor-5.34.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/snykiotcubedev/arangodb-3.7.6/commit/fce8f85f1c2f070c8e6a8e76d17210a2117d3833">fce8f85f1c2f070c8e6a8e76d17210a2117d3833</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> jsoneditor is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-3822>CVE-2021-3822</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2021-09-27</p> <p>Fix Resolution: 9.5.6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in jsoneditor tgz cve high severity vulnerability vulnerable library jsoneditor tgz a web based tool to view edit format and validate json library home page a href dependency hierarchy x jsoneditor tgz vulnerable library found in head commit a href found in base branch main vulnerability details jsoneditor is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution step up your open source security game with mend
0
14,007
2,789,848,013
IssuesEvent
2015-05-08 21:53:41
google/google-visualization-api-issues
https://api.github.com/repos/google/google-visualization-api-issues
opened
backgroundColor: {stroke:'black', fill:'#DDE3E7', strokeSize: 1} is failing in IE
Priority-Medium Type-Defect
Original [issue 280](https://code.google.com/p/google-visualization-api-issues/issues/detail?id=280) created by orwant on 2010-05-13T03:36:00.000Z: 1.It happends in columnchart,pie chart <b>2.</b> Pls paste code form an html file run on IE Code starts from here &lt;html&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;https://www.google.com/jsapi&quot;&gt;&lt;/script&gt; &lt;head&gt; &lt;body&gt; &lt;button type=&quot;button&quot; onclick=&quot;testFunction();&quot;&gt;Click Me!&lt;/button&gt; &lt;/body&gt; &lt;/head&gt; &lt;script type=&quot;text/javascript&quot;&gt; //google.load(&quot;visualization&quot;, &quot;1&quot;, {packages:[&quot;columnchart&quot;]}); // google.load('visualization', '1', {'packages':['columnchart']}); //google.load('visualization', '1', {'packages':[&quot;piechart&quot;]}); google.load('visualization', '1', {packages:['columnchart', 'piechart']}); // google.setOnLoadCallback(drawChart); function testFunction(){ var data = new google.visualization.DataTable(); var formatter = new google.visualization.NumberFormat({prefix: '$'}); data.addColumn('string', 'Year'); data.addColumn('number', 'Sales'); data.addColumn('number', 'Expenses'); data.addRows(4); data.setFormattedValue(0, 0,'$ 2004 ') //data.setValue(0, 0, '2004'); data.setValue(0, 1, 1000); //data.setFormattedValue(0, 1, '$'+1000); data.setValue(0, 2, 400); //data.setValue(1, 0, '2005'); data.setFormattedValue(1, 0,'$ 2005 ') // data.setFormattedValue(1, 1, '$'+1170); data.setValue(1, 1, 1170); data.setValue(1, 2, 460); data.setFormattedValue(2, 0,'$ 2006 ') // data.setValue(2, 0, '2006'); //data.setFormattedValue(2, 1,'$'+660); data.setValue(2, 1, 660); data.setValue(2, 2, 1120); data.setFormattedValue(3, 0,'$ 2006 ') //data.setValue(3, 0, '2007'); data.setValue(3, 1, 1030); //data.setFormattedValue(3 ,1,'$'+ 660); data.setValue(3, 2, 540); formatter.format(data, 1); var chart = new google.visualization.ColumnChart(document.getElementById('chart_div')); chart.draw(data, {width: 400, height: 240, enableTooltip: true,is3D: true,backgroundColor: {stroke:'black', fill:'#DDE3E7', strokeSize: 1}, title: 'Company Performance'}); } &lt;/script&gt; &lt;body&gt; &lt;div id=&quot;chart_div&quot;&gt;&lt;/div&gt; &lt;/body&gt; &lt;/html&gt; Code ends here 3. Operating system: Win XP and Browser IE8, same in IE 7 Attached the Screen shots
1.0
backgroundColor: {stroke:'black', fill:'#DDE3E7', strokeSize: 1} is failing in IE - Original [issue 280](https://code.google.com/p/google-visualization-api-issues/issues/detail?id=280) created by orwant on 2010-05-13T03:36:00.000Z: 1.It happends in columnchart,pie chart <b>2.</b> Pls paste code form an html file run on IE Code starts from here &lt;html&gt; &lt;script type=&quot;text/javascript&quot; src=&quot;https://www.google.com/jsapi&quot;&gt;&lt;/script&gt; &lt;head&gt; &lt;body&gt; &lt;button type=&quot;button&quot; onclick=&quot;testFunction();&quot;&gt;Click Me!&lt;/button&gt; &lt;/body&gt; &lt;/head&gt; &lt;script type=&quot;text/javascript&quot;&gt; //google.load(&quot;visualization&quot;, &quot;1&quot;, {packages:[&quot;columnchart&quot;]}); // google.load('visualization', '1', {'packages':['columnchart']}); //google.load('visualization', '1', {'packages':[&quot;piechart&quot;]}); google.load('visualization', '1', {packages:['columnchart', 'piechart']}); // google.setOnLoadCallback(drawChart); function testFunction(){ var data = new google.visualization.DataTable(); var formatter = new google.visualization.NumberFormat({prefix: '$'}); data.addColumn('string', 'Year'); data.addColumn('number', 'Sales'); data.addColumn('number', 'Expenses'); data.addRows(4); data.setFormattedValue(0, 0,'$ 2004 ') //data.setValue(0, 0, '2004'); data.setValue(0, 1, 1000); //data.setFormattedValue(0, 1, '$'+1000); data.setValue(0, 2, 400); //data.setValue(1, 0, '2005'); data.setFormattedValue(1, 0,'$ 2005 ') // data.setFormattedValue(1, 1, '$'+1170); data.setValue(1, 1, 1170); data.setValue(1, 2, 460); data.setFormattedValue(2, 0,'$ 2006 ') // data.setValue(2, 0, '2006'); //data.setFormattedValue(2, 1,'$'+660); data.setValue(2, 1, 660); data.setValue(2, 2, 1120); data.setFormattedValue(3, 0,'$ 2006 ') //data.setValue(3, 0, '2007'); data.setValue(3, 1, 1030); //data.setFormattedValue(3 ,1,'$'+ 660); data.setValue(3, 2, 540); formatter.format(data, 1); var chart = new google.visualization.ColumnChart(document.getElementById('chart_div')); chart.draw(data, {width: 400, height: 240, enableTooltip: true,is3D: true,backgroundColor: {stroke:'black', fill:'#DDE3E7', strokeSize: 1}, title: 'Company Performance'}); } &lt;/script&gt; &lt;body&gt; &lt;div id=&quot;chart_div&quot;&gt;&lt;/div&gt; &lt;/body&gt; &lt;/html&gt; Code ends here 3. Operating system: Win XP and Browser IE8, same in IE 7 Attached the Screen shots
defect
backgroundcolor stroke black fill strokesize is failing in ie original created by orwant on it happends in columnchart pie chart pls paste code form an html file run on ie code starts from here lt html gt lt script type quot text javascript quot src quot lt head gt lt body gt lt button type quot button quot onclick quot testfunction quot gt click me lt button gt lt body gt lt head gt lt script type quot text javascript quot gt google load quot visualization quot quot quot packages google load visualization packages google load visualization packages google load visualization packages google setonloadcallback drawchart function testfunction var data new google visualization datatable var formatter new google visualization numberformat prefix data addcolumn string year data addcolumn number sales data addcolumn number expenses data addrows data setformattedvalue data setvalue data setvalue data setformattedvalue data setvalue data setvalue data setformattedvalue data setformattedvalue data setvalue data setvalue data setformattedvalue data setvalue data setformattedvalue data setvalue data setvalue data setformattedvalue data setvalue data setvalue data setformattedvalue data setvalue formatter format data var chart new google visualization columnchart document getelementbyid chart div chart draw data width height enabletooltip true true backgroundcolor stroke black fill strokesize title company performance lt script gt lt body gt lt div id quot chart div quot gt lt div gt lt body gt lt html gt code ends here operating system win xp and browser same in ie attached the screen shots
1
238,224
26,085,684,132
IssuesEvent
2022-12-26 02:13:35
Thezone1975/send
https://api.github.com/repos/Thezone1975/send
opened
CVE-2022-46175 (High) detected in json5-2.1.0.tgz, json5-1.0.1.tgz
security vulnerability
## CVE-2022-46175 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>json5-2.1.0.tgz</b>, <b>json5-1.0.1.tgz</b></p></summary> <p> <details><summary><b>json5-2.1.0.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-2.1.0.tgz">https://registry.npmjs.org/json5/-/json5-2.1.0.tgz</a></p> <p>Path to dependency file: /send/package.json</p> <p>Path to vulnerable library: /node_modules/@babel/core/node_modules/json5/package.json</p> <p> Dependency Hierarchy: - convict-5.0.0.tgz (Root Library) - :x: **json5-2.1.0.tgz** (Vulnerable Library) </details> <details><summary><b>json5-1.0.1.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-1.0.1.tgz">https://registry.npmjs.org/json5/-/json5-1.0.1.tgz</a></p> <p>Path to dependency file: /send/package.json</p> <p>Path to vulnerable library: /node_modules/json5/package.json</p> <p> Dependency Hierarchy: - babel-loader-8.0.6.tgz (Root Library) - loader-utils-1.2.3.tgz - :x: **json5-1.0.1.tgz** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 version 2.2.2 and later. <p>Publish Date: 2022-12-24 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-46175>CVE-2022-46175</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-46175">https://www.cve.org/CVERecord?id=CVE-2022-46175</a></p> <p>Release Date: 2022-12-24</p> <p>Fix Resolution: json5 - 2.2.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-46175 (High) detected in json5-2.1.0.tgz, json5-1.0.1.tgz - ## CVE-2022-46175 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>json5-2.1.0.tgz</b>, <b>json5-1.0.1.tgz</b></p></summary> <p> <details><summary><b>json5-2.1.0.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-2.1.0.tgz">https://registry.npmjs.org/json5/-/json5-2.1.0.tgz</a></p> <p>Path to dependency file: /send/package.json</p> <p>Path to vulnerable library: /node_modules/@babel/core/node_modules/json5/package.json</p> <p> Dependency Hierarchy: - convict-5.0.0.tgz (Root Library) - :x: **json5-2.1.0.tgz** (Vulnerable Library) </details> <details><summary><b>json5-1.0.1.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-1.0.1.tgz">https://registry.npmjs.org/json5/-/json5-1.0.1.tgz</a></p> <p>Path to dependency file: /send/package.json</p> <p>Path to vulnerable library: /node_modules/json5/package.json</p> <p> Dependency Hierarchy: - babel-loader-8.0.6.tgz (Root Library) - loader-utils-1.2.3.tgz - :x: **json5-1.0.1.tgz** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 version 2.2.2 and later. <p>Publish Date: 2022-12-24 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-46175>CVE-2022-46175</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-46175">https://www.cve.org/CVERecord?id=CVE-2022-46175</a></p> <p>Release Date: 2022-12-24</p> <p>Fix Resolution: json5 - 2.2.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in tgz tgz cve high severity vulnerability vulnerable libraries tgz tgz tgz json for humans library home page a href path to dependency file send package json path to vulnerable library node modules babel core node modules package json dependency hierarchy convict tgz root library x tgz vulnerable library tgz json for humans library home page a href path to dependency file send package json path to vulnerable library node modules package json dependency hierarchy babel loader tgz root library loader utils tgz x tgz vulnerable library vulnerability details is an extension to the popular json file format that aims to be easier to write and maintain by hand e g for config files the parse method of the library before and including version does not restrict parsing of keys named proto allowing specially crafted strings to pollute the prototype of the resulting object this vulnerability pollutes the prototype of the object returned by parse and not the global object prototype which is the commonly understood definition of prototype pollution however polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations this vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from parse the actual impact will depend on how applications utilize the returned object and how they filter unwanted keys but could include denial of service cross site scripting elevation of privilege and in extreme cases remote code execution parse should restrict parsing of proto keys when parsing json strings to objects as a point of reference the json parse method included in javascript ignores proto keys simply changing parse to json parse in the examples above mitigates this vulnerability this vulnerability is patched in version and later publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact low availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
62,826
17,203,534,701
IssuesEvent
2021-07-17 19:08:29
InterNetNews/inn
https://api.github.com/repos/InterNetNews/inn
closed
nnrpd doesn't support passwords with spaces
C: nnrpd P: low R: fixed T: defect
**Reported by eagle on 14 Dec 2008 06:54 UTC** The NNTP protocol uses whitespace as a command and argument separator, which means that passwords containing whitespace don't work. The generic NNTP parser in nnrpd throws away the tail end of the password or produces a syntax error. However, since the password is the last argument, we can hack around this problem. Here's a patch from Jeffrey M. Vinocur from 2001 that implements that fix, which may require some updating.
1.0
nnrpd doesn't support passwords with spaces - **Reported by eagle on 14 Dec 2008 06:54 UTC** The NNTP protocol uses whitespace as a command and argument separator, which means that passwords containing whitespace don't work. The generic NNTP parser in nnrpd throws away the tail end of the password or produces a syntax error. However, since the password is the last argument, we can hack around this problem. Here's a patch from Jeffrey M. Vinocur from 2001 that implements that fix, which may require some updating.
defect
nnrpd doesn t support passwords with spaces reported by eagle on dec utc the nntp protocol uses whitespace as a command and argument separator which means that passwords containing whitespace don t work the generic nntp parser in nnrpd throws away the tail end of the password or produces a syntax error however since the password is the last argument we can hack around this problem here s a patch from jeffrey m vinocur from that implements that fix which may require some updating
1
357,247
10,604,064,219
IssuesEvent
2019-10-10 17:20:50
seakers/ABSP-EOSS
https://api.github.com/repos/seakers/ABSP-EOSS
opened
planner: Time Assignment Issues
Low Priority bug
Agents seem vary their start times for tasks as they do their bundles.
1.0
planner: Time Assignment Issues - Agents seem vary their start times for tasks as they do their bundles.
non_defect
planner time assignment issues agents seem vary their start times for tasks as they do their bundles
0
11,004
2,622,954,639
IssuesEvent
2015-03-04 09:03:01
folded/carve
https://api.github.com/repos/folded/carve
closed
intersect hangs when using "--triangulate" option
auto-migrated Priority-Medium Type-Defect
``` What steps will reproduce the problem? 1. untar the attached tar.bz2 file to get object files 2. run "intersect --triangulate --obj a.obj A_MINUS_B b.obj" What is the expected output? What do you see instead? Should complete execution; instead hangs after printing "doTriangulate complete; remain=20" What version of the product are you using? On what operating system? carve-1.0.0, downloaded Jun 1; running on Ubuntu 9.04 i386, compiled with gcc 4.3.3 ``` Original issue reported on code.google.com by `ken.l.hu...@gmail.com` on 2 Jun 2009 at 10:13 Attachments: * [triangulate-bug.tar.bz2](https://storage.googleapis.com/google-code-attachments/carve/issue-7/comment-0/triangulate-bug.tar.bz2)
1.0
intersect hangs when using "--triangulate" option - ``` What steps will reproduce the problem? 1. untar the attached tar.bz2 file to get object files 2. run "intersect --triangulate --obj a.obj A_MINUS_B b.obj" What is the expected output? What do you see instead? Should complete execution; instead hangs after printing "doTriangulate complete; remain=20" What version of the product are you using? On what operating system? carve-1.0.0, downloaded Jun 1; running on Ubuntu 9.04 i386, compiled with gcc 4.3.3 ``` Original issue reported on code.google.com by `ken.l.hu...@gmail.com` on 2 Jun 2009 at 10:13 Attachments: * [triangulate-bug.tar.bz2](https://storage.googleapis.com/google-code-attachments/carve/issue-7/comment-0/triangulate-bug.tar.bz2)
defect
intersect hangs when using triangulate option what steps will reproduce the problem untar the attached tar file to get object files run intersect triangulate obj a obj a minus b b obj what is the expected output what do you see instead should complete execution instead hangs after printing dotriangulate complete remain what version of the product are you using on what operating system carve downloaded jun running on ubuntu compiled with gcc original issue reported on code google com by ken l hu gmail com on jun at attachments
1
359,780
10,680,852,036
IssuesEvent
2019-10-21 22:33:23
googleapis/google-cloud-ruby
https://api.github.com/repos/googleapis/google-cloud-ruby
closed
High number of threads created by GCP error reporting gem
priority: p1 type: bug
We use GCP Error Reporting, GCP Logging and GCP Pub/Sub. Our job processing backend based on Pub/Sub would frequently freeze. I "augmented" `Thread` to understand where threads were being created. In the output, it showed that the calls originated in the GCP Error Reporting gem. The issue was reproducible both locally on Mac OS X as well as on Heroku. 1) Is this expected when there are a lot of errors to report? Another two questions, if I may ask here: 2) How does the GCP Pub/Sub library rate limit its message stream? E.g. say the callback thread processor doesn't catch up with the rate of incoming messages. 3) If I understood correctly, the stop method of the subscriber is spawning threads; this may not work reliably during SIGTERMs and other signals.
1.0
High number of threads created by GCP error reporting gem - We use GCP Error Reporting, GCP Logging and GCP Pub/Sub. Our job processing backend based on Pub/Sub would frequently freeze. I "augmented" `Thread` to understand where threads were being created. In the output, it showed that the calls originated in the GCP Error Reporting gem. The issue was reproducible both locally on Mac OS X as well as on Heroku. 1) Is this expected when there are a lot of errors to report? Another two questions, if I may ask here: 2) How does the GCP Pub/Sub library rate limit its message stream? E.g. say the callback thread processor doesn't catch up with the rate of incoming messages. 3) If I understood correctly, the stop method of the subscriber is spawning threads; this may not work reliably during SIGTERMs and other signals.
non_defect
high number of threads created by gcp error reporting gem we use gcp error reporting gcp logging and gcp pub sub our job processing backend based on pub sub would frequently freeze i augmented thread to understand where threads were being created in the output it showed that the calls originated in the gcp error reporting gem the issue was reproducible both locally on mac os x as well as on heroku is this expected when there are a lot of errors to report another two questions if i may ask here how does the gcp pub sub library rate limit its message stream e g say the callback thread processor doesn t catch up with the rate of incoming messages if i understood correctly the stop method of the subscriber is spawning threads this may not work reliably during sigterms and other signals
0
146,798
11,757,257,216
IssuesEvent
2020-03-13 13:21:06
IBMStreams/streamsx.topology
https://api.github.com/repos/IBMStreams/streamsx.topology
closed
Consistent naming for Python test classes.
test
The tests tend to have three classes for standalone, distributed and streaming analytics service. The naming for these classes is inconsistent, mainly for streaming analytics service ones with a mix of `Bluemix`, `Cloud`, `Service` in the class name and the qualifier either being at the end or in the middle. Need to have a standard pattern, that may then also support runners like nose being able to select a subset of all distributed tests. Propose: - `TestXyz` - Tests Xyz using standalone or a test that does not require a Streams application (e.g. api testing). - `TestDistributedXyz` - Tests Xyz using distributed - Typically extends `TestXyz` - `TestSasXyz` - Tests Xyz using Streaming Analytics service - Typically extends `TestDistributedXyz`
1.0
Consistent naming for Python test classes. - The tests tend to have three classes for standalone, distributed and streaming analytics service. The naming for these classes is inconsistent, mainly for streaming analytics service ones with a mix of `Bluemix`, `Cloud`, `Service` in the class name and the qualifier either being at the end or in the middle. Need to have a standard pattern, that may then also support runners like nose being able to select a subset of all distributed tests. Propose: - `TestXyz` - Tests Xyz using standalone or a test that does not require a Streams application (e.g. api testing). - `TestDistributedXyz` - Tests Xyz using distributed - Typically extends `TestXyz` - `TestSasXyz` - Tests Xyz using Streaming Analytics service - Typically extends `TestDistributedXyz`
non_defect
consistent naming for python test classes the tests tend to have three classes for standalone distributed and streaming analytics service the naming for these classes is inconsistent mainly for streaming analytics service ones with a mix of bluemix cloud service in the class name and the qualifier either being at the end or in the middle need to have a standard pattern that may then also support runners like nose being able to select a subset of all distributed tests propose testxyz tests xyz using standalone or a test that does not require a streams application e g api testing testdistributedxyz tests xyz using distributed typically extends testxyz testsasxyz tests xyz using streaming analytics service typically extends testdistributedxyz
0
54,871
14,001,980,711
IssuesEvent
2020-10-28 14:16:59
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
Inline images should follow the preview rule
bug defect p1 severity:minor type:media
Someone who doesn't want images to autoload, in general won't care how those images are coded. MXC images should not show when previewing is off - or else there should be more fine-grained control over what to autoshow and what not.
1.0
Inline images should follow the preview rule - Someone who doesn't want images to autoload, in general won't care how those images are coded. MXC images should not show when previewing is off - or else there should be more fine-grained control over what to autoshow and what not.
defect
inline images should follow the preview rule someone who doesn t want images to autoload in general won t care how those images are coded mxc images should not show when previewing is off or else there should be more fine grained control over what to autoshow and what not
1
26,395
4,691,546,620
IssuesEvent
2016-10-11 10:57:12
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
closed
NPE Diagnostics
Team: QuSP Type: Defect
NPE using 3.8 master. ``` output threads WARN 2016-10-11 11:20:53,441 [hz._hzInstance_1_workers.DiagnosticsSchedulerThread] com.hazelcast.internal.diagnostics.Diagnostics: [10.212.1.111]:5701 [workers] [3.8-SNAPSHOT] Failed to write file: /home/simulator/hazelcast-simulator-0.9- RC1-SNAPSHOT/workers/2016-10-11__11_20_47/C_A1_W1-10.212.1.111-member/diagnostics-10.212.1.111_5701-1476174052737-000.log java.lang.NullPointerException at java.io.PrintWriter.write(PrintWriter.java:473) at com.hazelcast.internal.diagnostics.DiagnosticsLogWriter.write(DiagnosticsLogWriter.java:107) at com.hazelcast.internal.diagnostics.MultiLineDiagnosticsLogWriter.writeKeyValueEntry(MultiLineDiagnosticsLogWriter.java:75) at com.hazelcast.internal.diagnostics.MemberHazelcastInstanceInfoPlugin.run(MemberHazelcastInstanceInfoPlugin.java:74) at com.hazelcast.internal.diagnostics.DiagnosticsLogFile.renderPlugin(DiagnosticsLogFile.java:109) at com.hazelcast.internal.diagnostics.DiagnosticsLogFile.write(DiagnosticsLogFile.java:84) at com.hazelcast.internal.diagnostics.Diagnostics$WritePluginTask.run(Diagnostics.java:214) at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) at java.util.concurrent.FutureTask.runAndReset(FutureTask.java:308) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$301(ScheduledThreadPoolExecutor.java:180) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:294) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) at java.lang.Thread.run(Thread.java:745) ```
1.0
NPE Diagnostics - NPE using 3.8 master. ``` output threads WARN 2016-10-11 11:20:53,441 [hz._hzInstance_1_workers.DiagnosticsSchedulerThread] com.hazelcast.internal.diagnostics.Diagnostics: [10.212.1.111]:5701 [workers] [3.8-SNAPSHOT] Failed to write file: /home/simulator/hazelcast-simulator-0.9- RC1-SNAPSHOT/workers/2016-10-11__11_20_47/C_A1_W1-10.212.1.111-member/diagnostics-10.212.1.111_5701-1476174052737-000.log java.lang.NullPointerException at java.io.PrintWriter.write(PrintWriter.java:473) at com.hazelcast.internal.diagnostics.DiagnosticsLogWriter.write(DiagnosticsLogWriter.java:107) at com.hazelcast.internal.diagnostics.MultiLineDiagnosticsLogWriter.writeKeyValueEntry(MultiLineDiagnosticsLogWriter.java:75) at com.hazelcast.internal.diagnostics.MemberHazelcastInstanceInfoPlugin.run(MemberHazelcastInstanceInfoPlugin.java:74) at com.hazelcast.internal.diagnostics.DiagnosticsLogFile.renderPlugin(DiagnosticsLogFile.java:109) at com.hazelcast.internal.diagnostics.DiagnosticsLogFile.write(DiagnosticsLogFile.java:84) at com.hazelcast.internal.diagnostics.Diagnostics$WritePluginTask.run(Diagnostics.java:214) at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) at java.util.concurrent.FutureTask.runAndReset(FutureTask.java:308) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$301(ScheduledThreadPoolExecutor.java:180) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:294) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) at java.lang.Thread.run(Thread.java:745) ```
defect
npe diagnostics npe using master output threads warn com hazelcast internal diagnostics diagnostics failed to write file home simulator hazelcast simulator snapshot workers c member diagnostics log java lang nullpointerexception at java io printwriter write printwriter java at com hazelcast internal diagnostics diagnosticslogwriter write diagnosticslogwriter java at com hazelcast internal diagnostics multilinediagnosticslogwriter writekeyvalueentry multilinediagnosticslogwriter java at com hazelcast internal diagnostics memberhazelcastinstanceinfoplugin run memberhazelcastinstanceinfoplugin java at com hazelcast internal diagnostics diagnosticslogfile renderplugin diagnosticslogfile java at com hazelcast internal diagnostics diagnosticslogfile write diagnosticslogfile java at com hazelcast internal diagnostics diagnostics writeplugintask run diagnostics java at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask runandreset futuretask java at java util concurrent scheduledthreadpoolexecutor scheduledfuturetask access scheduledthreadpoolexecutor java at java util concurrent scheduledthreadpoolexecutor scheduledfuturetask run scheduledthreadpoolexecutor java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java
1
81,545
30,960,573,539
IssuesEvent
2023-08-08 03:21:11
SeleniumHQ/selenium
https://api.github.com/repos/SeleniumHQ/selenium
closed
[🐛 Bug]: Selenium Manager fails on chrome v115
I-defect needs-triaging
### What happened? Let me know if this should land in a chrome bug report instead happy to create this there if needed. When selenium-manager.exe attempts to download the correct version of the chrome webdriver it fails with the message ERROR Wrong browser/driver version I believe this is related to just the most recent version of Chrome (115) https://chromedriver.storage.googleapis.com/LATEST_RELEASE_115 ``` <Error> <Code>NoSuchKey</Code> <Message>The specified key does not exist.</Message> <Details>No such object: chromedriver/LATEST_RELEASE_115</Details> </Error> ``` ``` ./selenium-manager.exe --trace --browser chrome TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json DEBUG Using shell command to find out chrome version DEBUG Running cmd command: "wmic datafile where name='%PROGRAMFILES:\\=\\\\%\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe' get Version /value" DEBUG Output { status: ExitStatus(ExitStatus(0)), stdout: "\r\r\n\r\r\nVersion=115.0.5790.171\r\r\n\r\r\n\r\r\n\r\r\n", stderr: "" } DEBUG The version of chrome is 115.0.5790.171 TRACE Writing metadata to C:\Users\jf6856\.cache\selenium\selenium-manager.json DEBUG Detected browser: chrome 115 TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json DEBUG Reading chromedriver version from https://chromedriver.storage.googleapis.com/LATEST_RELEASE_115 DEBUG starting new connection: https://chromedriver.storage.googleapis.com/ TRACE registering event source with poller: token=Token(0), interests=READABLE | WRITABLE DEBUG No cached session for DnsName(DnsName(DnsName("chromedriver.storage.googleapis.com"))) DEBUG Not resuming any session TRACE Sending ClientHello Message { version: TLSv1_0, payload: Handshake { parsed: HandshakeMessagePayload { typ: ClientHello, payload: ClientHello( ClientHelloPayload { client_version: TLSv1_2, random: 9be3753a2c9ec3695136ab5174467e55e9ed4f1639b243cde73834cb134c89c9, session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2, cipher_suites: [ TLS13_AES_256_GCM_SHA384, TLS13_AES_128_GCM_SHA256, TLS13_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, ], compression_methods: [ Null, ], extensions: [ SupportedVersions( [ TLSv1_3, TLSv1_2, ], ), ECPointFormats( [ Uncompressed, ], ), NamedGroups( [ X25519, secp256r1, secp384r1, ], ), SignatureAlgorithms( [ ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256, ], ), ExtendedMasterSecretRequest, CertificateStatusRequest( OCSP( OCSPCertificateStatusRequest { responder_ids: [], extensions: , }, ), ), ServerName( [ ServerName { typ: HostName, payload: HostName( ( 6368726f6d656472697665722e73746f726167652e676f6f676c65617069732e636f6d, DnsName( "chromedriver.storage.googleapis.com", ), ), ), }, ], ), SignedCertificateTimestampRequest, KeyShare( [ KeyShareEntry { group: X25519, payload: e10431044ddb0a9e16f01bccb60a6ea0b7d41c8283604893388b2e44895a8d4f, }, ], ), PresharedKeyModes( [ PSK_DHE_KE, ], ), Protocols( [ 6832, 687474702f312e31, ], ), SessionTicket( Request, ), ], }, ), }, encoded: 0100011303039be3753a2c9ec3695136ab5174467e55e9ed4f1639b243cde73834cb134c89c920a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b20014130213011303c02cc02bcca9c030c02fcca800ff010000b6002b00050403040303000b00020100000a00080006001d00170018000d00140012050304030807080608050804060105010401001700000005000501000000000000002800260000236368726f6d656472697665722e73746f726167652e676f6f676c65617069732e636f6d00120000003300260024001d0020e10431044ddb0a9e16f01bccb60a6ea0b7d41c8283604893388b2e44895a8d4f002d000201010010000e000c02683208687474702f312e3100230000, }, } TRACE We got ServerHello ServerHelloPayload { legacy_version: TLSv1_2, random: 1e202b437593c6ded1bc00a8dee0793c2e638da8952d5144e1be8e1a04429008, session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2, cipher_suite: TLS13_AES_256_GCM_SHA384, compression_method: Null, extensions: [ KeyShare( KeyShareEntry { group: X25519, payload: a22b136ad149736dc834ed950e6f9b19cfd8f2121e1fe6265d3537456aa02237, }, ), SupportedVersions( TLSv1_3, ), ], } DEBUG Using ciphersuite TLS13_AES_256_GCM_SHA384 DEBUG Not resuming TRACE EarlyData rejected TRACE Dropping CCS DEBUG TLS1.3 encrypted extensions: [Protocols([6832])] DEBUG ALPN protocol is Some(b"h2") TRACE Server cert is [Certificate(b"0\x82\x06m0\x82\x05U\xa0\x03\x02\x01\x02\x02\x11\0\x87\xbe\t\xcd\x0e!\xc7X\n\x03\xe1\x91\xc1\xe1\xe2:0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x1e\x17\r230710082045Z\x17\r231002082044Z0#1!0\x1f\x06\x03U\x04\x03\x0c\x18*.storage.googleapis.com0Y0\x13\x06\x07*\x86H\xce=\x02\x01\x06\x08*\x86H\xce=\x03\x01\x07\x03B\0\x04\xbf@\xbf\xedpu:K\xb5\x12\x7f\x11\xc7\xc3\x07\xa4\xeb,U\xf5\x82\x80V\xa0\x83\x93\xcb]\0\"\xa5\xec'\x84\nZ5F@s\xe6\xba\xeb\xd8\x8bI\xb5M\x0e\x11&\xb1\xc1\xb9\xad\x18\xaf\xb1ql\x80e0\xb3\xa3\x82\x04B0\x82\x04>0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x07\x800\x13\x06\x03U\x1d%\x04\x0c0\n\x06\x08+\x06\x01\x05\x05\x07\x03\x010\x0c\x06\x03U\x1d\x13\x01\x01\xff\x04\x020\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x142\xf1W\xf0\xd1\x93g\xf1\x81n\xc6\x078A\xcc\x0e\xe4c\xc6\xa80\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0j\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04^0\\0'\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1bhttp://ocsp.pki.goog/gts1c301\x06\x08+\x06\x01\x05\x05\x070\x02\x86%http://pki.goog/repo/certs/gts1c3.der0\x82\x01\xf1\x06\x03U\x1d\x11\x04\x82\x01\xe80\x82\x01\xe4\x82\x18*.storage.googleapis.com\x82\x10*.googleapis.com\x82 commondatastorage.googleapis.com\x82\"*.commondatastorage.googleapis.com\x82\x16storage.googleapis.com\x82\x19storage-p2.googleapis.com\x82\x1b*.storage-p2.googleapis.com\x82\x1bstorage.mtls.googleapis.com\x82$*.appspot.com.storage.googleapis.com\x82 *.content-storage.googleapis.com\x82#*.content-storage-p2.googleapis.com\x82'*.content-storage-upload.googleapis.com\x82)*.content-storage-download.googleapis.com\x82\x1f*.storage-upload.googleapis.com\x82!*.storage-download.googleapis.com0!\x06\x03U\x1d \x04\x1a0\x180\x08\x06\x06g\x81\x0c\x01\x02\x010\x0c\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030<\x06\x03U\x1d\x1f\x0450301\xa0/\xa0-\x86+http://crls.pki.goog/gts1c3/fVJxbV-Ktmk.crl0\x82\x01\x05\x06\n+\x06\x01\x04\x01\xd6y\x02\x04\x02\x04\x81\xf6\x04\x81\xf3\0\xf1\0v\0\xad\xf7\xbe\xfa|\xff\x10\xc8\x8b\x9d=\x9c\x1e>\x18j\xb4g)]\xcf\xb1\x0c$\xca\x85\x864\xeb\xdc\x82\x8a\0\0\x01\x89?\x1a\x94\xfe\0\0\x04\x03\0G0E\x02 i]\x13\xa0\x0b\xc6\xce\xeeU\x841j>\xe5\x94x\xa0\x01.\x81ZD3$v\x15D\x1bEQ\x98\xe6\x02!\0\xbeq<\x88\x196pj\x0e\x10\x17\xe5\xdc\xb9\x0bT@\x8c\xdc\xda\xc5\x017\xc1\x82c\xa0\x86\x9aFB\x02\0w\0\xb3sw\x07\xe1\x84P\xf8c\x86\xd6\x05\xa9\xdc\x11\tJy-\xb1g\x0c\x0b\x87\xdc\xf0\x03\x0ey6\xa5\x9a\0\0\x01\x89?\x1a~9\0\0\x04\x03\0H0F\x02!\0\xa0\xf8'\xf2\xbe\x86t\xc7\x97\xbe\xbew\xff3\xad\x93@:UN\x9c\xd8\x82\x8c\x93\xd2\x91\xb6=AA\"\x02!\0\xdb_\xae^\xf2~\xf2\xd8\xcb\xba\xb6\xc1:\x9f\xc4[\xe2\xc3\x88\xc4\xca\x8e\xe5\xa3\xe7\x0cEg\x07U[10\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\0/\xfeg}\xde\x12\x06`\xb4\xc2\xbc\xc4\xce\xc8\xc8%\xc1_\xbfA\xe3\x16\xd5\x9d\xac\xf4)\xe5+\xfeK\xf0\n\xb3\xbb\xe0}\xe3g\xddmI\x0be\x90\xe8A\xa7\x9erV5\xf8\x15d\xcc=\x17\xd2\x0f\xa5v\x85\x0f\x03(b\xb7\xe7j\xe5\xe9YY\xfc\xb4\xa1\xe1\xe9\xff\xa4\x8c\x9d\xe0i`\xd3E\xf1f\xcd\xb4]?\xb5\xee\xa6\xd3\xbb\x90\x1d\x92\x8d\xc4\xa6\xe2\xb9=s\xa8e\xab\x14\x87\xc0\xde\xc8\xd6v\xcej7\x90F\xd4\xad\x89ek\xb3\xcb\x11\x10\xe9G\xcc\xff\x06\x9d\x8b2\xc3\xc7\x9a\xbf\x0fU\x90~\x16iJ\xce\xde,\x0b\xe2\xe9\x04\x8b\x8aC\xe7\xcf\x17^\xe0\xea\xee\x12\x98\x01\xdak\x11n!\x08\xaena/h\xe0\xe5;?`\xcc\x8e\xce\xf2\xd60\xca+G\r\x03u\x15\xd0\xbc\x855\xcb\xc87\xf9\xda\xe0\xef6\xbe\x86|\xd1E\x1e\x18\xa8\xcf\xf8 \x0eA\xde\xdb9\xaa\x19vJ\xa4\x93\xed\x93\x85\xb7\x03A.\xfa\x90\xee\x1b&})\xa8\xb4;\xaeX\xb4\xca"), Certificate(b"0\x82\x05\x960\x82\x03~\xa0\x03\x02\x01\x02\x02\r\x02\x03\xbcSYk4\xc7\x18\xf5\x01Pf0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x1e\x17\r200813000042Z\x17\r270930000042Z0F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x82\x01\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x01\x0f\00\x82\x01\n\x02\x82\x01\x01\0\xf5\x88\xdf\xe7b\x8c\x1e7\xf87B\x90\x7fl\x87\xd0\xfbe\x82%\xfd\xe8\xcbk\xa4\xffm\xe9Z#\xe2\x99\xf6\x1c\xe9\x92\x03\x99\x13|\t\n\x8a\xfaB\xd6^V$\xaaz3\x84\x1f\xd1\xe9i\xbb\xb9t\xecWLfh\x93w7US\xfe9\x10M\xb74\xbb_%w7;\x17\x94\xea<\xe5\x9d\xd5\xbc\xc3\xb4C\xeb.\xa7G\xef\xb0D\x11c\xd8\xb4A\x85\xddA0H\x93\x1b\xbf\xb7\xf6\xe0E\x02!\xe0\x96B\x17\xcf\xd9+eV4\x07&\x04\r\xa8\xfd}\xca.\xef\xeaH|7M?\0\x9f\x83\xdf\xefu\x84.yW\\\xfcWn\x1a\x96\xff\xfc\x8c\x9a\xa6\x99\xbe%\xd9\x7f\x96,\x06\xf7\x11*\x02\x80\x80\xebc\x18<PI\x87\xe5\x8a\xca_\x19+Y\x96\x81\0\xa0\xfbQ\xdb\xcaw\x0b\x0b\xc9\x96O\xefpI\xc7\\m \xfd\x99\xb4\xb4\xe2\xca.w\xfd-\xdc\x0b\xb6k\x13\x0c\x8c\x19+\x17\x96\x98\xb9\xf0\x8b\xf6\xa0'\xbb\xb6\xe3\x8dQ\x8f\xbd\xae\xc7\x9b\xb1\x89\x9d\x02\x03\x01\0\x01\xa3\x82\x01\x800\x82\x01|0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x1d\x06\x03U\x1d%\x04\x160\x14\x06\x08+\x06\x01\x05\x05\x07\x03\x01\x06\x08+\x06\x01\x05\x05\x07\x03\x020\x12\x06\x03U\x1d\x13\x01\x01\xff\x04\x080\x06\x01\x01\xff\x02\x01\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0h\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04\\0Z0&\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1ahttp://ocsp.pki.goog/gtsr100\x06\x08+\x06\x01\x05\x05\x070\x02\x86$http://pki.goog/repo/certs/gtsr1.der04\x06\x03U\x1d\x1f\x04-0+0)\xa0'\xa0%\x86#http://crl.pki.goog/gtsr1/gtsr1.crl0W\x06\x03U\x1d \x04P0N08\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030*0(\x06\x08+\x06\x01\x05\x05\x07\x02\x01\x16\x1chttps://pki.goog/repository/0\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x02\x01\0\x89}\xac \\\x0c<\xbe\x9a\xa8W\x95\x1b\xb4\xae\xfa\xab\xa5rq\xb46\x95\xfd\xdf@\x11\x03L\xc2F\x14\xbb\x14$\xab\xf0Pq\"\xdb\xad\xc4n\x7f\xcf\xf1jo\xc8\x83\x1b\xd8\xce\x89_\x87l\x87\xb8\xa9\x0c\xa3\x9b\xa1b\x94\x93\x95\xdf[\xaef\x19\x0b\x02\x96\x9e\xfc\xb5\xe7\x10i>z\xcbFI_F\xe1A\xb1\xd7\x98Me4\0\x80\x1a?O\x9fl\x7fI\0\x81SA\xa4\x92!\x82\x82\x1a\xf1\xa3D[*P\x12\x13M\xc1S6\xf3B\x08\xafT\xfa\x8ewS\x1bd8'\x17\t\xbdX\xc9\x1b|9-[\xf3\xce\xd4\xed\x97\xdb\x14\x03\xbf\tS$\x1f\xc2\x0c\x04y\x98&\xf2a\xf1SR\xfdB\x8c\x1bf+?\x15\xa1\xbb\xff\xf6\x9b\xe3\x81\x9a\x01\x06q\x895($\xdd\xe1\xbd\xeb\x19-\xe1H\xcb=Y\x83Q\xb4t\xc6\x9d|\xc6\xb1\x86[\xaf\xcc4\xc4\xd3\xcc\xd4\x81\x11\x95\0\xa1\xf4\x12\"\x01\xfa\xb4\x83q\xaf\x8c\xb7\x8cs$\xac7S\xc2\0\x90?\x11\xfe\\\xed6\x94\x10;\xbd)\xae\xe2\xc7:b;lc\xd9\x80\xbfYq\xacc'\xb9L\x17\xa0\xda\xf6s\x15\xbf*\xde\x8f\xf3\xa5l2\x813\x03\xd0\x86Qq\x994\xba\x93\x8d]\xb5QX\xf7\xb2\x93\xe8\x01\xf6Y\xbeq\x9b\xfdM(\xce\xcfm\xc7\x16\xdc\xf7\xd1\xd6F\x9b\xa7\xcak\xe9w\x0f\xfd\xa0\xb6\x1b#\x83\x1d\x10\x1a\xd9\t\0\x84\xe0D\xd3\xa2u#\xb34\x86\xf6 \xb0\xa4^\x10\x1d\xe0RF\0\x9d\xb1\x0f\x1f!pQ\xf5\x9a\xdd\x06\xfcU\xf4+\x0e3w\xc3KB\xc2\xf1w\x13\xfcs\x80\x94\xeb\x1f\xbb7?\xce\x02*f\xb0s\x1d2\xa52l2\xb0\x8e\xe0\xc4#\xff[}Mep\xac+\x9b=\xce\xdb\xe0m\x8e2\x80\xbe\x96\x9f\x92c\xbc\x97\xbb]\xb9\xf4\xe1q^*\xe4\xef\x03\"\xb1\x8ae:\x8f\xc0\x93e\xd4\x85\xcd\x0f\x0f[\x83Y\x16G\x16-\x9c$:\xc8\x80\xa6&\x14\x85\x9b\xf67\x9b\xaco\xf9\xc5\xc3\x06Q\xf3\xe2\x7f\xc5\xb1\x10\xbaQ\xf4\xdd"), Certificate(b"0\x82\x05b0\x82\x04J\xa0\x03\x02\x01\x02\x02\x10w\xbd\rl\xdb6\xf9\x1a\xea!\x0f\xc4\xf0X\xd3\r0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00W1\x0b0\t\x06\x03U\x04\x06\x13\x02BE1\x190\x17\x06\x03U\x04\n\x13\x10GlobalSign nv-sa1\x100\x0e\x06\x03U\x04\x0b\x13\x07Root CA1\x1b0\x19\x06\x03U\x04\x03\x13\x12GlobalSign Root CA0\x1e\x17\r200619000042Z\x17\r280128000042Z0G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x82\x02\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x02\x0f\00\x82\x02\n\x02\x82\x02\x01\0\xb6\x11\x02\x8b\x1e\xe3\xa1w\x9b;\xdc\xbf\x94>\xb7\x95\xa7@<\xa1\xfd\x82\xf9}2\x06\x82q\xf6\xf6\x8c\x7f\xfb\xe8\xdb\xbcj.\x97\x97\xa3\x8cK\xf9+\xf6\xb1\xf9\xce\x84\x1d\xb1\xf9\xc5\x97\xde\xef\xb9\xf2\xa3\xe9\xbc\x12\x89^\xa7\xaaR\xab\xf8#'\xcb\xa4\xb1\x9cc\xdb\xd7\x99~\xf0\n^\xebh\xa6\xf4\xc6ZG\rM\x103\xe3N\xb1\x13\xa3\xc8\x18lK\xec\xfc\t\x90\xdf\x9dd)%#\x07\xa1\xb4\xd2=.`\xe0\xcf\xd2\t\x87\xbb\xcdH\xf0M\xc2\xc2z\x88\x8a\xbb\xba\xcfY\x19\xd6\xaf\x8f\xb0\x07\xb0\x9e1\xf1\x82\xc1\xc0\xdf.\xa6ml\x19\x0e\xb5\xd8~&\x1aE\x03=\xb0y\xa4\x94(\xad\x0f\x7f&\xe5\xa8\x08\xfe\x96\xe8<h\x94S\xee\x83:\x88+\x15\x96\t\xb2\xe0z\x8c.u\xd6\x9c\xeb\xa7Vd\x8f\x96Oh\xae=\x97\xc2\x84\x8f\xc0\xbc@\xc0\x0b\\\xbd\xf6\x87\xb35l\xac\x18P\x7f\x84\xe0L\xcd\x92\xd3 \xe93\xbcR\x99\xaf2\xb5)\xb3%*\xb4H\xf9r\xe1\xcad\xf7\xe6\x82\x10\x8d\xe8\x9d\xc2\x8a\x88\xfa8f\x8a\xfcc\xf9\x01\xf9x\xfd{\\w\xfav\x87\xfa\xec\xdf\xb1\x0ey\x95W\xb4\xbd&\xef\xd6\x01\xd1\xeb\x16\n\xbb\x8e\x0b\xb5\xc5\xc5\x8aU\xab\xd3\xac\xea\x91K)\xcc\x19\xa42%N*\xf1eD\xd0\x02\xce\xaa\xceI\xb4\xea\x9f|\x83\xb0@{\xe7C\xab\xa7l\xa3\x8f}\x89\x81\xfaL\xa5\xff\xd5\x8e\xc3\xceK\xe0\xb5\xd8\xb3\x8eE\xcfv\xc0\xed@+\xfdS\x0f\xb0\xa7\xd5;\r\xb1\x8a\xa2\x03\xde1\xad\xccw\xeao{>\xd6\xdf\x91\"\x12\xe6\xbe\xfa\xd82\xfc\x10c\x14Qr\xde]\xd6\x16\x93\xbd)h3\xef:f\xec\x07\x8a&\xdf\x13\xd7Wex'\xde^I\x14\0\xa2\0\x7f\x9a\xa8!\xb6\xa9\xb1\x95\xb0\xa5\xb9\r\x16\x11\xda\xc7lH<@\xe0~\rZ\xcdV<\xd1\x97\x05\xb9\xcbK\xed9K\x9c\xc4?\xd2U\x13n$\xb0\xd6q\xfa\xf4\xc1\xba\xcc\xed\x1b\xf5\xfe\x81A\xd8\0\x98=:\xc8\xaez\x987\x18\x05\x95\x02\x03\x01\0\x01\xa3\x82\x0180\x82\x0140\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x0f\x06\x03U\x1d\x13\x01\x01\xff\x04\x050\x03\x01\x01\xff0\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14`{f\x1aE\r\x97\xca\x89P/}\x04\xcd4\xa8\xff\xfc\xfdK0`\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04T0R0%\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x19http://ocsp.pki.goog/gsr10)\x06\x08+\x06\x01\x05\x05\x070\x02\x86\x1dhttp://pki.goog/gsr1/gsr1.crt02\x06\x03U\x1d\x1f\x04+0)0'\xa0%\xa0#\x86!http://crl.pki.goog/gsr1/gsr1.crl0;\x06\x03U\x1d \x044020\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x030\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\04\xa4\x1e\xb1(\xa3\xd0\xb4v\x17\xa61z!\xe9\xd1R>\xc8\xdbt\x16A\x88\xb8=5\x1d\xed\xe4\xff\x93\xe1\\_\xab\xbb\xea|\xcf\xdb\xe4\r\xd1\x8bW\xf2&o[\xbe\x17Fh\x947okz\xc8\xc0\x187\xfa%Q\xac\xech\xbf\xb2\xc8I\xfdZ\x9a\xca\x01#\xac\x84\x80+\x02\x8c\x99\x97\xebIj\x8cu\xd7\xc7\xde\xb2\xc9\x97\x9fXHW\x0e5\xa1\xe4\x1a\xd6\xfdo\x83\x81o\xef\x8c\xcf\x97\xaf\xc0\x85*\xf0\xf5Ni\t\x91-\xe1h\xb8\xc1+s\xe9\xd4\xd9\xfc\"\xc07\x1f\x0bf\x1dI\xed\x02U\x8fg\xe12\xd7\xd3&\xbfp\xe3=\xf4gm=|\xe54\x88\xe32\xfa\xa7n\x06jo\xbd\x8b\x91\xee\x16K\xe8;\xa9\xb37\xe7\xc3D\xa4~\xd8l\xd7\xc7F\xf5\x92\x9b\xe7\xd5!\xbef\x92\x19\x94Ul\xd4)\xb2\r\xc1f[\xe2wIH(\xed\x9d\xd7\x1a3rS\xb3\x825\xcfb\x8b\xc9$\x8b\xa5\xb79\x0c\xbb~*A\xbfR\xcf\xfc\xa2\x96\xb6\xc2\x82?")] TRACE signal: Want TRACE signal found waiting giver, notifying TRACE poll_want: taker wants! TRACE signal: Want DEBUG Ticket saved DEBUG Ticket saved TRACE deregistering event source from poller TRACE signal: Closed ERROR Wrong browser/driver version ``` ### How can we reproduce the issue? ```shell No script required, ensure Chrome is on v115 and run ./selenium-manager.exe --browser chrome ``` ``` ### Relevant log output ```shell <Error> <Code>NoSuchKey</Code> <Message>The specified key does not exist.</Message> <Details>No such object: chromedriver/LATEST_RELEASE_115</Details> </Error> ``` ./selenium-manager.exe --trace --browser chrome TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json DEBUG Using shell command to find out chrome version DEBUG Running cmd command: "wmic datafile where name='%PROGRAMFILES:\\=\\\\%\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe' get Version /value" DEBUG Output { status: ExitStatus(ExitStatus(0)), stdout: "\r\r\n\r\r\nVersion=115.0.5790.171\r\r\n\r\r\n\r\r\n\r\r\n", stderr: "" } DEBUG The version of chrome is 115.0.5790.171 TRACE Writing metadata to C:\Users\jf6856\.cache\selenium\selenium-manager.json DEBUG Detected browser: chrome 115 TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json DEBUG Reading chromedriver version from https://chromedriver.storage.googleapis.com/LATEST_RELEASE_115 DEBUG starting new connection: https://chromedriver.storage.googleapis.com/ TRACE registering event source with poller: token=Token(0), interests=READABLE | WRITABLE DEBUG No cached session for DnsName(DnsName(DnsName("chromedriver.storage.googleapis.com"))) DEBUG Not resuming any session TRACE Sending ClientHello Message { version: TLSv1_0, payload: Handshake { parsed: HandshakeMessagePayload { typ: ClientHello, payload: ClientHello( ClientHelloPayload { client_version: TLSv1_2, random: 9be3753a2c9ec3695136ab5174467e55e9ed4f1639b243cde73834cb134c89c9, session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2, cipher_suites: [ TLS13_AES_256_GCM_SHA384, TLS13_AES_128_GCM_SHA256, TLS13_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, ], compression_methods: [ Null, ], extensions: [ SupportedVersions( [ TLSv1_3, TLSv1_2, ], ), ECPointFormats( [ Uncompressed, ], ), NamedGroups( [ X25519, secp256r1, secp384r1, ], ), SignatureAlgorithms( [ ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256, ], ), ExtendedMasterSecretRequest, CertificateStatusRequest( OCSP( OCSPCertificateStatusRequest { responder_ids: [], extensions: , }, ), ), ServerName( [ ServerName { typ: HostName, payload: HostName( ( 6368726f6d656472697665722e73746f726167652e676f6f676c65617069732e636f6d, DnsName( "chromedriver.storage.googleapis.com", ), ), ), }, ], ), SignedCertificateTimestampRequest, KeyShare( [ KeyShareEntry { group: X25519, payload: e10431044ddb0a9e16f01bccb60a6ea0b7d41c8283604893388b2e44895a8d4f, }, ], ), PresharedKeyModes( [ PSK_DHE_KE, ], ), Protocols( [ 6832, 687474702f312e31, ], ), SessionTicket( Request, ), ], }, ), }, encoded: 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, }, } TRACE We got ServerHello ServerHelloPayload { legacy_version: TLSv1_2, random: 1e202b437593c6ded1bc00a8dee0793c2e638da8952d5144e1be8e1a04429008, session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2, cipher_suite: TLS13_AES_256_GCM_SHA384, compression_method: Null, extensions: [ KeyShare( KeyShareEntry { group: X25519, payload: a22b136ad149736dc834ed950e6f9b19cfd8f2121e1fe6265d3537456aa02237, }, ), SupportedVersions( TLSv1_3, ), ], } DEBUG Using ciphersuite TLS13_AES_256_GCM_SHA384 DEBUG Not resuming TRACE EarlyData rejected TRACE Dropping CCS DEBUG TLS1.3 encrypted extensions: [Protocols([6832])] DEBUG ALPN protocol is Some(b"h2") TRACE Server cert is [Certificate(b"0\x82\x06m0\x82\x05U\xa0\x03\x02\x01\x02\x02\x11\0\x87\xbe\t\xcd\x0e!\xc7X\n\x03\xe1\x91\xc1\xe1\xe2:0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x1e\x17\r230710082045Z\x17\r231002082044Z0#1!0\x1f\x06\x03U\x04\x03\x0c\x18*.storage.googleapis.com0Y0\x13\x06\x07*\x86H\xce=\x02\x01\x06\x08*\x86H\xce=\x03\x01\x07\x03B\0\x04\xbf@\xbf\xedpu:K\xb5\x12\x7f\x11\xc7\xc3\x07\xa4\xeb,U\xf5\x82\x80V\xa0\x83\x93\xcb]\0\"\xa5\xec'\x84\nZ5F@s\xe6\xba\xeb\xd8\x8bI\xb5M\x0e\x11&\xb1\xc1\xb9\xad\x18\xaf\xb1ql\x80e0\xb3\xa3\x82\x04B0\x82\x04>0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x07\x800\x13\x06\x03U\x1d%\x04\x0c0\n\x06\x08+\x06\x01\x05\x05\x07\x03\x010\x0c\x06\x03U\x1d\x13\x01\x01\xff\x04\x020\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x142\xf1W\xf0\xd1\x93g\xf1\x81n\xc6\x078A\xcc\x0e\xe4c\xc6\xa80\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0j\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04^0\\0'\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1bhttp://ocsp.pki.goog/gts1c301\x06\x08+\x06\x01\x05\x05\x070\x02\x86%http://pki.goog/repo/certs/gts1c3.der0\x82\x01\xf1\x06\x03U\x1d\x11\x04\x82\x01\xe80\x82\x01\xe4\x82\x18*.storage.googleapis.com\x82\x10*.googleapis.com\x82 commondatastorage.googleapis.com\x82\"*.commondatastorage.googleapis.com\x82\x16storage.googleapis.com\x82\x19storage-p2.googleapis.com\x82\x1b*.storage-p2.googleapis.com\x82\x1bstorage.mtls.googleapis.com\x82$*.appspot.com.storage.googleapis.com\x82 *.content-storage.googleapis.com\x82#*.content-storage-p2.googleapis.com\x82'*.content-storage-upload.googleapis.com\x82)*.content-storage-download.googleapis.com\x82\x1f*.storage-upload.googleapis.com\x82!*.storage-download.googleapis.com0!\x06\x03U\x1d \x04\x1a0\x180\x08\x06\x06g\x81\x0c\x01\x02\x010\x0c\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030<\x06\x03U\x1d\x1f\x0450301\xa0/\xa0-\x86+http://crls.pki.goog/gts1c3/fVJxbV-Ktmk.crl0\x82\x01\x05\x06\n+\x06\x01\x04\x01\xd6y\x02\x04\x02\x04\x81\xf6\x04\x81\xf3\0\xf1\0v\0\xad\xf7\xbe\xfa|\xff\x10\xc8\x8b\x9d=\x9c\x1e>\x18j\xb4g)]\xcf\xb1\x0c$\xca\x85\x864\xeb\xdc\x82\x8a\0\0\x01\x89?\x1a\x94\xfe\0\0\x04\x03\0G0E\x02 i]\x13\xa0\x0b\xc6\xce\xeeU\x841j>\xe5\x94x\xa0\x01.\x81ZD3$v\x15D\x1bEQ\x98\xe6\x02!\0\xbeq<\x88\x196pj\x0e\x10\x17\xe5\xdc\xb9\x0bT@\x8c\xdc\xda\xc5\x017\xc1\x82c\xa0\x86\x9aFB\x02\0w\0\xb3sw\x07\xe1\x84P\xf8c\x86\xd6\x05\xa9\xdc\x11\tJy-\xb1g\x0c\x0b\x87\xdc\xf0\x03\x0ey6\xa5\x9a\0\0\x01\x89?\x1a~9\0\0\x04\x03\0H0F\x02!\0\xa0\xf8'\xf2\xbe\x86t\xc7\x97\xbe\xbew\xff3\xad\x93@:UN\x9c\xd8\x82\x8c\x93\xd2\x91\xb6=AA\"\x02!\0\xdb_\xae^\xf2~\xf2\xd8\xcb\xba\xb6\xc1:\x9f\xc4[\xe2\xc3\x88\xc4\xca\x8e\xe5\xa3\xe7\x0cEg\x07U[10\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\0/\xfeg}\xde\x12\x06`\xb4\xc2\xbc\xc4\xce\xc8\xc8%\xc1_\xbfA\xe3\x16\xd5\x9d\xac\xf4)\xe5+\xfeK\xf0\n\xb3\xbb\xe0}\xe3g\xddmI\x0be\x90\xe8A\xa7\x9erV5\xf8\x15d\xcc=\x17\xd2\x0f\xa5v\x85\x0f\x03(b\xb7\xe7j\xe5\xe9YY\xfc\xb4\xa1\xe1\xe9\xff\xa4\x8c\x9d\xe0i`\xd3E\xf1f\xcd\xb4]?\xb5\xee\xa6\xd3\xbb\x90\x1d\x92\x8d\xc4\xa6\xe2\xb9=s\xa8e\xab\x14\x87\xc0\xde\xc8\xd6v\xcej7\x90F\xd4\xad\x89ek\xb3\xcb\x11\x10\xe9G\xcc\xff\x06\x9d\x8b2\xc3\xc7\x9a\xbf\x0fU\x90~\x16iJ\xce\xde,\x0b\xe2\xe9\x04\x8b\x8aC\xe7\xcf\x17^\xe0\xea\xee\x12\x98\x01\xdak\x11n!\x08\xaena/h\xe0\xe5;?`\xcc\x8e\xce\xf2\xd60\xca+G\r\x03u\x15\xd0\xbc\x855\xcb\xc87\xf9\xda\xe0\xef6\xbe\x86|\xd1E\x1e\x18\xa8\xcf\xf8 \x0eA\xde\xdb9\xaa\x19vJ\xa4\x93\xed\x93\x85\xb7\x03A.\xfa\x90\xee\x1b&})\xa8\xb4;\xaeX\xb4\xca"), Certificate(b"0\x82\x05\x960\x82\x03~\xa0\x03\x02\x01\x02\x02\r\x02\x03\xbcSYk4\xc7\x18\xf5\x01Pf0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x1e\x17\r200813000042Z\x17\r270930000042Z0F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x82\x01\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x01\x0f\00\x82\x01\n\x02\x82\x01\x01\0\xf5\x88\xdf\xe7b\x8c\x1e7\xf87B\x90\x7fl\x87\xd0\xfbe\x82%\xfd\xe8\xcbk\xa4\xffm\xe9Z#\xe2\x99\xf6\x1c\xe9\x92\x03\x99\x13|\t\n\x8a\xfaB\xd6^V$\xaaz3\x84\x1f\xd1\xe9i\xbb\xb9t\xecWLfh\x93w7US\xfe9\x10M\xb74\xbb_%w7;\x17\x94\xea<\xe5\x9d\xd5\xbc\xc3\xb4C\xeb.\xa7G\xef\xb0D\x11c\xd8\xb4A\x85\xddA0H\x93\x1b\xbf\xb7\xf6\xe0E\x02!\xe0\x96B\x17\xcf\xd9+eV4\x07&\x04\r\xa8\xfd}\xca.\xef\xeaH|7M?\0\x9f\x83\xdf\xefu\x84.yW\\\xfcWn\x1a\x96\xff\xfc\x8c\x9a\xa6\x99\xbe%\xd9\x7f\x96,\x06\xf7\x11*\x02\x80\x80\xebc\x18<PI\x87\xe5\x8a\xca_\x19+Y\x96\x81\0\xa0\xfbQ\xdb\xcaw\x0b\x0b\xc9\x96O\xefpI\xc7\\m \xfd\x99\xb4\xb4\xe2\xca.w\xfd-\xdc\x0b\xb6k\x13\x0c\x8c\x19+\x17\x96\x98\xb9\xf0\x8b\xf6\xa0'\xbb\xb6\xe3\x8dQ\x8f\xbd\xae\xc7\x9b\xb1\x89\x9d\x02\x03\x01\0\x01\xa3\x82\x01\x800\x82\x01|0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x1d\x06\x03U\x1d%\x04\x160\x14\x06\x08+\x06\x01\x05\x05\x07\x03\x01\x06\x08+\x06\x01\x05\x05\x07\x03\x020\x12\x06\x03U\x1d\x13\x01\x01\xff\x04\x080\x06\x01\x01\xff\x02\x01\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0h\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04\\0Z0&\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1ahttp://ocsp.pki.goog/gtsr100\x06\x08+\x06\x01\x05\x05\x070\x02\x86$http://pki.goog/repo/certs/gtsr1.der04\x06\x03U\x1d\x1f\x04-0+0)\xa0'\xa0%\x86#http://crl.pki.goog/gtsr1/gtsr1.crl0W\x06\x03U\x1d \x04P0N08\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030*0(\x06\x08+\x06\x01\x05\x05\x07\x02\x01\x16\x1chttps://pki.goog/repository/0\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x02\x01\0\x89}\xac \\\x0c<\xbe\x9a\xa8W\x95\x1b\xb4\xae\xfa\xab\xa5rq\xb46\x95\xfd\xdf@\x11\x03L\xc2F\x14\xbb\x14$\xab\xf0Pq\"\xdb\xad\xc4n\x7f\xcf\xf1jo\xc8\x83\x1b\xd8\xce\x89_\x87l\x87\xb8\xa9\x0c\xa3\x9b\xa1b\x94\x93\x95\xdf[\xaef\x19\x0b\x02\x96\x9e\xfc\xb5\xe7\x10i>z\xcbFI_F\xe1A\xb1\xd7\x98Me4\0\x80\x1a?O\x9fl\x7fI\0\x81SA\xa4\x92!\x82\x82\x1a\xf1\xa3D[*P\x12\x13M\xc1S6\xf3B\x08\xafT\xfa\x8ewS\x1bd8'\x17\t\xbdX\xc9\x1b|9-[\xf3\xce\xd4\xed\x97\xdb\x14\x03\xbf\tS$\x1f\xc2\x0c\x04y\x98&\xf2a\xf1SR\xfdB\x8c\x1bf+?\x15\xa1\xbb\xff\xf6\x9b\xe3\x81\x9a\x01\x06q\x895($\xdd\xe1\xbd\xeb\x19-\xe1H\xcb=Y\x83Q\xb4t\xc6\x9d|\xc6\xb1\x86[\xaf\xcc4\xc4\xd3\xcc\xd4\x81\x11\x95\0\xa1\xf4\x12\"\x01\xfa\xb4\x83q\xaf\x8c\xb7\x8cs$\xac7S\xc2\0\x90?\x11\xfe\\\xed6\x94\x10;\xbd)\xae\xe2\xc7:b;lc\xd9\x80\xbfYq\xacc'\xb9L\x17\xa0\xda\xf6s\x15\xbf*\xde\x8f\xf3\xa5l2\x813\x03\xd0\x86Qq\x994\xba\x93\x8d]\xb5QX\xf7\xb2\x93\xe8\x01\xf6Y\xbeq\x9b\xfdM(\xce\xcfm\xc7\x16\xdc\xf7\xd1\xd6F\x9b\xa7\xcak\xe9w\x0f\xfd\xa0\xb6\x1b#\x83\x1d\x10\x1a\xd9\t\0\x84\xe0D\xd3\xa2u#\xb34\x86\xf6 \xb0\xa4^\x10\x1d\xe0RF\0\x9d\xb1\x0f\x1f!pQ\xf5\x9a\xdd\x06\xfcU\xf4+\x0e3w\xc3KB\xc2\xf1w\x13\xfcs\x80\x94\xeb\x1f\xbb7?\xce\x02*f\xb0s\x1d2\xa52l2\xb0\x8e\xe0\xc4#\xff[}Mep\xac+\x9b=\xce\xdb\xe0m\x8e2\x80\xbe\x96\x9f\x92c\xbc\x97\xbb]\xb9\xf4\xe1q^*\xe4\xef\x03\"\xb1\x8ae:\x8f\xc0\x93e\xd4\x85\xcd\x0f\x0f[\x83Y\x16G\x16-\x9c$:\xc8\x80\xa6&\x14\x85\x9b\xf67\x9b\xaco\xf9\xc5\xc3\x06Q\xf3\xe2\x7f\xc5\xb1\x10\xbaQ\xf4\xdd"), Certificate(b"0\x82\x05b0\x82\x04J\xa0\x03\x02\x01\x02\x02\x10w\xbd\rl\xdb6\xf9\x1a\xea!\x0f\xc4\xf0X\xd3\r0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00W1\x0b0\t\x06\x03U\x04\x06\x13\x02BE1\x190\x17\x06\x03U\x04\n\x13\x10GlobalSign nv-sa1\x100\x0e\x06\x03U\x04\x0b\x13\x07Root CA1\x1b0\x19\x06\x03U\x04\x03\x13\x12GlobalSign Root CA0\x1e\x17\r200619000042Z\x17\r280128000042Z0G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x82\x02\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x02\x0f\00\x82\x02\n\x02\x82\x02\x01\0\xb6\x11\x02\x8b\x1e\xe3\xa1w\x9b;\xdc\xbf\x94>\xb7\x95\xa7@<\xa1\xfd\x82\xf9}2\x06\x82q\xf6\xf6\x8c\x7f\xfb\xe8\xdb\xbcj.\x97\x97\xa3\x8cK\xf9+\xf6\xb1\xf9\xce\x84\x1d\xb1\xf9\xc5\x97\xde\xef\xb9\xf2\xa3\xe9\xbc\x12\x89^\xa7\xaaR\xab\xf8#'\xcb\xa4\xb1\x9cc\xdb\xd7\x99~\xf0\n^\xebh\xa6\xf4\xc6ZG\rM\x103\xe3N\xb1\x13\xa3\xc8\x18lK\xec\xfc\t\x90\xdf\x9dd)%#\x07\xa1\xb4\xd2=.`\xe0\xcf\xd2\t\x87\xbb\xcdH\xf0M\xc2\xc2z\x88\x8a\xbb\xba\xcfY\x19\xd6\xaf\x8f\xb0\x07\xb0\x9e1\xf1\x82\xc1\xc0\xdf.\xa6ml\x19\x0e\xb5\xd8~&\x1aE\x03=\xb0y\xa4\x94(\xad\x0f\x7f&\xe5\xa8\x08\xfe\x96\xe8<h\x94S\xee\x83:\x88+\x15\x96\t\xb2\xe0z\x8c.u\xd6\x9c\xeb\xa7Vd\x8f\x96Oh\xae=\x97\xc2\x84\x8f\xc0\xbc@\xc0\x0b\\\xbd\xf6\x87\xb35l\xac\x18P\x7f\x84\xe0L\xcd\x92\xd3 \xe93\xbcR\x99\xaf2\xb5)\xb3%*\xb4H\xf9r\xe1\xcad\xf7\xe6\x82\x10\x8d\xe8\x9d\xc2\x8a\x88\xfa8f\x8a\xfcc\xf9\x01\xf9x\xfd{\\w\xfav\x87\xfa\xec\xdf\xb1\x0ey\x95W\xb4\xbd&\xef\xd6\x01\xd1\xeb\x16\n\xbb\x8e\x0b\xb5\xc5\xc5\x8aU\xab\xd3\xac\xea\x91K)\xcc\x19\xa42%N*\xf1eD\xd0\x02\xce\xaa\xceI\xb4\xea\x9f|\x83\xb0@{\xe7C\xab\xa7l\xa3\x8f}\x89\x81\xfaL\xa5\xff\xd5\x8e\xc3\xceK\xe0\xb5\xd8\xb3\x8eE\xcfv\xc0\xed@+\xfdS\x0f\xb0\xa7\xd5;\r\xb1\x8a\xa2\x03\xde1\xad\xccw\xeao{>\xd6\xdf\x91\"\x12\xe6\xbe\xfa\xd82\xfc\x10c\x14Qr\xde]\xd6\x16\x93\xbd)h3\xef:f\xec\x07\x8a&\xdf\x13\xd7Wex'\xde^I\x14\0\xa2\0\x7f\x9a\xa8!\xb6\xa9\xb1\x95\xb0\xa5\xb9\r\x16\x11\xda\xc7lH<@\xe0~\rZ\xcdV<\xd1\x97\x05\xb9\xcbK\xed9K\x9c\xc4?\xd2U\x13n$\xb0\xd6q\xfa\xf4\xc1\xba\xcc\xed\x1b\xf5\xfe\x81A\xd8\0\x98=:\xc8\xaez\x987\x18\x05\x95\x02\x03\x01\0\x01\xa3\x82\x0180\x82\x0140\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x0f\x06\x03U\x1d\x13\x01\x01\xff\x04\x050\x03\x01\x01\xff0\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14`{f\x1aE\r\x97\xca\x89P/}\x04\xcd4\xa8\xff\xfc\xfdK0`\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04T0R0%\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x19http://ocsp.pki.goog/gsr10)\x06\x08+\x06\x01\x05\x05\x070\x02\x86\x1dhttp://pki.goog/gsr1/gsr1.crt02\x06\x03U\x1d\x1f\x04+0)0'\xa0%\xa0#\x86!http://crl.pki.goog/gsr1/gsr1.crl0;\x06\x03U\x1d \x044020\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x030\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\04\xa4\x1e\xb1(\xa3\xd0\xb4v\x17\xa61z!\xe9\xd1R>\xc8\xdbt\x16A\x88\xb8=5\x1d\xed\xe4\xff\x93\xe1\\_\xab\xbb\xea|\xcf\xdb\xe4\r\xd1\x8bW\xf2&o[\xbe\x17Fh\x947okz\xc8\xc0\x187\xfa%Q\xac\xech\xbf\xb2\xc8I\xfdZ\x9a\xca\x01#\xac\x84\x80+\x02\x8c\x99\x97\xebIj\x8cu\xd7\xc7\xde\xb2\xc9\x97\x9fXHW\x0e5\xa1\xe4\x1a\xd6\xfdo\x83\x81o\xef\x8c\xcf\x97\xaf\xc0\x85*\xf0\xf5Ni\t\x91-\xe1h\xb8\xc1+s\xe9\xd4\xd9\xfc\"\xc07\x1f\x0bf\x1dI\xed\x02U\x8fg\xe12\xd7\xd3&\xbfp\xe3=\xf4gm=|\xe54\x88\xe32\xfa\xa7n\x06jo\xbd\x8b\x91\xee\x16K\xe8;\xa9\xb37\xe7\xc3D\xa4~\xd8l\xd7\xc7F\xf5\x92\x9b\xe7\xd5!\xbef\x92\x19\x94Ul\xd4)\xb2\r\xc1f[\xe2wIH(\xed\x9d\xd7\x1a3rS\xb3\x825\xcfb\x8b\xc9$\x8b\xa5\xb79\x0c\xbb~*A\xbfR\xcf\xfc\xa2\x96\xb6\xc2\x82?")] TRACE signal: Want TRACE signal found waiting giver, notifying TRACE poll_want: taker wants! TRACE signal: Want DEBUG Ticket saved DEBUG Ticket saved TRACE deregistering event source from poller TRACE signal: Closed ERROR Wrong browser/driver version ``` ### Operating System Windows 11 ### Selenium version selenium==4.8.0 ### What are the browser(s) and version(s) where you see this issue? Chrome 115 ### What are the browser driver(s) and version(s) where you see this issue? Chrome 115 ### Are you using Selenium Grid? N/A
1.0
[🐛 Bug]: Selenium Manager fails on chrome v115 - ### What happened? Let me know if this should land in a chrome bug report instead happy to create this there if needed. When selenium-manager.exe attempts to download the correct version of the chrome webdriver it fails with the message ERROR Wrong browser/driver version I believe this is related to just the most recent version of Chrome (115) https://chromedriver.storage.googleapis.com/LATEST_RELEASE_115 ``` <Error> <Code>NoSuchKey</Code> <Message>The specified key does not exist.</Message> <Details>No such object: chromedriver/LATEST_RELEASE_115</Details> </Error> ``` ``` ./selenium-manager.exe --trace --browser chrome TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json DEBUG Using shell command to find out chrome version DEBUG Running cmd command: "wmic datafile where name='%PROGRAMFILES:\\=\\\\%\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe' get Version /value" DEBUG Output { status: ExitStatus(ExitStatus(0)), stdout: "\r\r\n\r\r\nVersion=115.0.5790.171\r\r\n\r\r\n\r\r\n\r\r\n", stderr: "" } DEBUG The version of chrome is 115.0.5790.171 TRACE Writing metadata to C:\Users\jf6856\.cache\selenium\selenium-manager.json DEBUG Detected browser: chrome 115 TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json DEBUG Reading chromedriver version from https://chromedriver.storage.googleapis.com/LATEST_RELEASE_115 DEBUG starting new connection: https://chromedriver.storage.googleapis.com/ TRACE registering event source with poller: token=Token(0), interests=READABLE | WRITABLE DEBUG No cached session for DnsName(DnsName(DnsName("chromedriver.storage.googleapis.com"))) DEBUG Not resuming any session TRACE Sending ClientHello Message { version: TLSv1_0, payload: Handshake { parsed: HandshakeMessagePayload { typ: ClientHello, payload: ClientHello( ClientHelloPayload { client_version: TLSv1_2, random: 9be3753a2c9ec3695136ab5174467e55e9ed4f1639b243cde73834cb134c89c9, session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2, cipher_suites: [ TLS13_AES_256_GCM_SHA384, TLS13_AES_128_GCM_SHA256, TLS13_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, ], compression_methods: [ Null, ], extensions: [ SupportedVersions( [ TLSv1_3, TLSv1_2, ], ), ECPointFormats( [ Uncompressed, ], ), NamedGroups( [ X25519, secp256r1, secp384r1, ], ), SignatureAlgorithms( [ ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256, ], ), ExtendedMasterSecretRequest, CertificateStatusRequest( OCSP( OCSPCertificateStatusRequest { responder_ids: [], extensions: , }, ), ), ServerName( [ ServerName { typ: HostName, payload: HostName( ( 6368726f6d656472697665722e73746f726167652e676f6f676c65617069732e636f6d, DnsName( "chromedriver.storage.googleapis.com", ), ), ), }, ], ), SignedCertificateTimestampRequest, KeyShare( [ KeyShareEntry { group: X25519, payload: e10431044ddb0a9e16f01bccb60a6ea0b7d41c8283604893388b2e44895a8d4f, }, ], ), PresharedKeyModes( [ PSK_DHE_KE, ], ), Protocols( [ 6832, 687474702f312e31, ], ), SessionTicket( Request, ), ], }, ), }, encoded: 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, }, } TRACE We got ServerHello ServerHelloPayload { legacy_version: TLSv1_2, random: 1e202b437593c6ded1bc00a8dee0793c2e638da8952d5144e1be8e1a04429008, session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2, cipher_suite: TLS13_AES_256_GCM_SHA384, compression_method: Null, extensions: [ KeyShare( KeyShareEntry { group: X25519, payload: a22b136ad149736dc834ed950e6f9b19cfd8f2121e1fe6265d3537456aa02237, }, ), SupportedVersions( TLSv1_3, ), ], } DEBUG Using ciphersuite TLS13_AES_256_GCM_SHA384 DEBUG Not resuming TRACE EarlyData rejected TRACE Dropping CCS DEBUG TLS1.3 encrypted extensions: [Protocols([6832])] DEBUG ALPN protocol is Some(b"h2") TRACE Server cert is [Certificate(b"0\x82\x06m0\x82\x05U\xa0\x03\x02\x01\x02\x02\x11\0\x87\xbe\t\xcd\x0e!\xc7X\n\x03\xe1\x91\xc1\xe1\xe2:0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x1e\x17\r230710082045Z\x17\r231002082044Z0#1!0\x1f\x06\x03U\x04\x03\x0c\x18*.storage.googleapis.com0Y0\x13\x06\x07*\x86H\xce=\x02\x01\x06\x08*\x86H\xce=\x03\x01\x07\x03B\0\x04\xbf@\xbf\xedpu:K\xb5\x12\x7f\x11\xc7\xc3\x07\xa4\xeb,U\xf5\x82\x80V\xa0\x83\x93\xcb]\0\"\xa5\xec'\x84\nZ5F@s\xe6\xba\xeb\xd8\x8bI\xb5M\x0e\x11&\xb1\xc1\xb9\xad\x18\xaf\xb1ql\x80e0\xb3\xa3\x82\x04B0\x82\x04>0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x07\x800\x13\x06\x03U\x1d%\x04\x0c0\n\x06\x08+\x06\x01\x05\x05\x07\x03\x010\x0c\x06\x03U\x1d\x13\x01\x01\xff\x04\x020\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x142\xf1W\xf0\xd1\x93g\xf1\x81n\xc6\x078A\xcc\x0e\xe4c\xc6\xa80\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0j\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04^0\\0'\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1bhttp://ocsp.pki.goog/gts1c301\x06\x08+\x06\x01\x05\x05\x070\x02\x86%http://pki.goog/repo/certs/gts1c3.der0\x82\x01\xf1\x06\x03U\x1d\x11\x04\x82\x01\xe80\x82\x01\xe4\x82\x18*.storage.googleapis.com\x82\x10*.googleapis.com\x82 commondatastorage.googleapis.com\x82\"*.commondatastorage.googleapis.com\x82\x16storage.googleapis.com\x82\x19storage-p2.googleapis.com\x82\x1b*.storage-p2.googleapis.com\x82\x1bstorage.mtls.googleapis.com\x82$*.appspot.com.storage.googleapis.com\x82 *.content-storage.googleapis.com\x82#*.content-storage-p2.googleapis.com\x82'*.content-storage-upload.googleapis.com\x82)*.content-storage-download.googleapis.com\x82\x1f*.storage-upload.googleapis.com\x82!*.storage-download.googleapis.com0!\x06\x03U\x1d \x04\x1a0\x180\x08\x06\x06g\x81\x0c\x01\x02\x010\x0c\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030<\x06\x03U\x1d\x1f\x0450301\xa0/\xa0-\x86+http://crls.pki.goog/gts1c3/fVJxbV-Ktmk.crl0\x82\x01\x05\x06\n+\x06\x01\x04\x01\xd6y\x02\x04\x02\x04\x81\xf6\x04\x81\xf3\0\xf1\0v\0\xad\xf7\xbe\xfa|\xff\x10\xc8\x8b\x9d=\x9c\x1e>\x18j\xb4g)]\xcf\xb1\x0c$\xca\x85\x864\xeb\xdc\x82\x8a\0\0\x01\x89?\x1a\x94\xfe\0\0\x04\x03\0G0E\x02 i]\x13\xa0\x0b\xc6\xce\xeeU\x841j>\xe5\x94x\xa0\x01.\x81ZD3$v\x15D\x1bEQ\x98\xe6\x02!\0\xbeq<\x88\x196pj\x0e\x10\x17\xe5\xdc\xb9\x0bT@\x8c\xdc\xda\xc5\x017\xc1\x82c\xa0\x86\x9aFB\x02\0w\0\xb3sw\x07\xe1\x84P\xf8c\x86\xd6\x05\xa9\xdc\x11\tJy-\xb1g\x0c\x0b\x87\xdc\xf0\x03\x0ey6\xa5\x9a\0\0\x01\x89?\x1a~9\0\0\x04\x03\0H0F\x02!\0\xa0\xf8'\xf2\xbe\x86t\xc7\x97\xbe\xbew\xff3\xad\x93@:UN\x9c\xd8\x82\x8c\x93\xd2\x91\xb6=AA\"\x02!\0\xdb_\xae^\xf2~\xf2\xd8\xcb\xba\xb6\xc1:\x9f\xc4[\xe2\xc3\x88\xc4\xca\x8e\xe5\xa3\xe7\x0cEg\x07U[10\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\0/\xfeg}\xde\x12\x06`\xb4\xc2\xbc\xc4\xce\xc8\xc8%\xc1_\xbfA\xe3\x16\xd5\x9d\xac\xf4)\xe5+\xfeK\xf0\n\xb3\xbb\xe0}\xe3g\xddmI\x0be\x90\xe8A\xa7\x9erV5\xf8\x15d\xcc=\x17\xd2\x0f\xa5v\x85\x0f\x03(b\xb7\xe7j\xe5\xe9YY\xfc\xb4\xa1\xe1\xe9\xff\xa4\x8c\x9d\xe0i`\xd3E\xf1f\xcd\xb4]?\xb5\xee\xa6\xd3\xbb\x90\x1d\x92\x8d\xc4\xa6\xe2\xb9=s\xa8e\xab\x14\x87\xc0\xde\xc8\xd6v\xcej7\x90F\xd4\xad\x89ek\xb3\xcb\x11\x10\xe9G\xcc\xff\x06\x9d\x8b2\xc3\xc7\x9a\xbf\x0fU\x90~\x16iJ\xce\xde,\x0b\xe2\xe9\x04\x8b\x8aC\xe7\xcf\x17^\xe0\xea\xee\x12\x98\x01\xdak\x11n!\x08\xaena/h\xe0\xe5;?`\xcc\x8e\xce\xf2\xd60\xca+G\r\x03u\x15\xd0\xbc\x855\xcb\xc87\xf9\xda\xe0\xef6\xbe\x86|\xd1E\x1e\x18\xa8\xcf\xf8 \x0eA\xde\xdb9\xaa\x19vJ\xa4\x93\xed\x93\x85\xb7\x03A.\xfa\x90\xee\x1b&})\xa8\xb4;\xaeX\xb4\xca"), Certificate(b"0\x82\x05\x960\x82\x03~\xa0\x03\x02\x01\x02\x02\r\x02\x03\xbcSYk4\xc7\x18\xf5\x01Pf0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x1e\x17\r200813000042Z\x17\r270930000042Z0F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x82\x01\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x01\x0f\00\x82\x01\n\x02\x82\x01\x01\0\xf5\x88\xdf\xe7b\x8c\x1e7\xf87B\x90\x7fl\x87\xd0\xfbe\x82%\xfd\xe8\xcbk\xa4\xffm\xe9Z#\xe2\x99\xf6\x1c\xe9\x92\x03\x99\x13|\t\n\x8a\xfaB\xd6^V$\xaaz3\x84\x1f\xd1\xe9i\xbb\xb9t\xecWLfh\x93w7US\xfe9\x10M\xb74\xbb_%w7;\x17\x94\xea<\xe5\x9d\xd5\xbc\xc3\xb4C\xeb.\xa7G\xef\xb0D\x11c\xd8\xb4A\x85\xddA0H\x93\x1b\xbf\xb7\xf6\xe0E\x02!\xe0\x96B\x17\xcf\xd9+eV4\x07&\x04\r\xa8\xfd}\xca.\xef\xeaH|7M?\0\x9f\x83\xdf\xefu\x84.yW\\\xfcWn\x1a\x96\xff\xfc\x8c\x9a\xa6\x99\xbe%\xd9\x7f\x96,\x06\xf7\x11*\x02\x80\x80\xebc\x18<PI\x87\xe5\x8a\xca_\x19+Y\x96\x81\0\xa0\xfbQ\xdb\xcaw\x0b\x0b\xc9\x96O\xefpI\xc7\\m \xfd\x99\xb4\xb4\xe2\xca.w\xfd-\xdc\x0b\xb6k\x13\x0c\x8c\x19+\x17\x96\x98\xb9\xf0\x8b\xf6\xa0'\xbb\xb6\xe3\x8dQ\x8f\xbd\xae\xc7\x9b\xb1\x89\x9d\x02\x03\x01\0\x01\xa3\x82\x01\x800\x82\x01|0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x1d\x06\x03U\x1d%\x04\x160\x14\x06\x08+\x06\x01\x05\x05\x07\x03\x01\x06\x08+\x06\x01\x05\x05\x07\x03\x020\x12\x06\x03U\x1d\x13\x01\x01\xff\x04\x080\x06\x01\x01\xff\x02\x01\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0h\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04\\0Z0&\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1ahttp://ocsp.pki.goog/gtsr100\x06\x08+\x06\x01\x05\x05\x070\x02\x86$http://pki.goog/repo/certs/gtsr1.der04\x06\x03U\x1d\x1f\x04-0+0)\xa0'\xa0%\x86#http://crl.pki.goog/gtsr1/gtsr1.crl0W\x06\x03U\x1d \x04P0N08\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030*0(\x06\x08+\x06\x01\x05\x05\x07\x02\x01\x16\x1chttps://pki.goog/repository/0\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x02\x01\0\x89}\xac \\\x0c<\xbe\x9a\xa8W\x95\x1b\xb4\xae\xfa\xab\xa5rq\xb46\x95\xfd\xdf@\x11\x03L\xc2F\x14\xbb\x14$\xab\xf0Pq\"\xdb\xad\xc4n\x7f\xcf\xf1jo\xc8\x83\x1b\xd8\xce\x89_\x87l\x87\xb8\xa9\x0c\xa3\x9b\xa1b\x94\x93\x95\xdf[\xaef\x19\x0b\x02\x96\x9e\xfc\xb5\xe7\x10i>z\xcbFI_F\xe1A\xb1\xd7\x98Me4\0\x80\x1a?O\x9fl\x7fI\0\x81SA\xa4\x92!\x82\x82\x1a\xf1\xa3D[*P\x12\x13M\xc1S6\xf3B\x08\xafT\xfa\x8ewS\x1bd8'\x17\t\xbdX\xc9\x1b|9-[\xf3\xce\xd4\xed\x97\xdb\x14\x03\xbf\tS$\x1f\xc2\x0c\x04y\x98&\xf2a\xf1SR\xfdB\x8c\x1bf+?\x15\xa1\xbb\xff\xf6\x9b\xe3\x81\x9a\x01\x06q\x895($\xdd\xe1\xbd\xeb\x19-\xe1H\xcb=Y\x83Q\xb4t\xc6\x9d|\xc6\xb1\x86[\xaf\xcc4\xc4\xd3\xcc\xd4\x81\x11\x95\0\xa1\xf4\x12\"\x01\xfa\xb4\x83q\xaf\x8c\xb7\x8cs$\xac7S\xc2\0\x90?\x11\xfe\\\xed6\x94\x10;\xbd)\xae\xe2\xc7:b;lc\xd9\x80\xbfYq\xacc'\xb9L\x17\xa0\xda\xf6s\x15\xbf*\xde\x8f\xf3\xa5l2\x813\x03\xd0\x86Qq\x994\xba\x93\x8d]\xb5QX\xf7\xb2\x93\xe8\x01\xf6Y\xbeq\x9b\xfdM(\xce\xcfm\xc7\x16\xdc\xf7\xd1\xd6F\x9b\xa7\xcak\xe9w\x0f\xfd\xa0\xb6\x1b#\x83\x1d\x10\x1a\xd9\t\0\x84\xe0D\xd3\xa2u#\xb34\x86\xf6 \xb0\xa4^\x10\x1d\xe0RF\0\x9d\xb1\x0f\x1f!pQ\xf5\x9a\xdd\x06\xfcU\xf4+\x0e3w\xc3KB\xc2\xf1w\x13\xfcs\x80\x94\xeb\x1f\xbb7?\xce\x02*f\xb0s\x1d2\xa52l2\xb0\x8e\xe0\xc4#\xff[}Mep\xac+\x9b=\xce\xdb\xe0m\x8e2\x80\xbe\x96\x9f\x92c\xbc\x97\xbb]\xb9\xf4\xe1q^*\xe4\xef\x03\"\xb1\x8ae:\x8f\xc0\x93e\xd4\x85\xcd\x0f\x0f[\x83Y\x16G\x16-\x9c$:\xc8\x80\xa6&\x14\x85\x9b\xf67\x9b\xaco\xf9\xc5\xc3\x06Q\xf3\xe2\x7f\xc5\xb1\x10\xbaQ\xf4\xdd"), Certificate(b"0\x82\x05b0\x82\x04J\xa0\x03\x02\x01\x02\x02\x10w\xbd\rl\xdb6\xf9\x1a\xea!\x0f\xc4\xf0X\xd3\r0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00W1\x0b0\t\x06\x03U\x04\x06\x13\x02BE1\x190\x17\x06\x03U\x04\n\x13\x10GlobalSign nv-sa1\x100\x0e\x06\x03U\x04\x0b\x13\x07Root CA1\x1b0\x19\x06\x03U\x04\x03\x13\x12GlobalSign Root CA0\x1e\x17\r200619000042Z\x17\r280128000042Z0G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x82\x02\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x02\x0f\00\x82\x02\n\x02\x82\x02\x01\0\xb6\x11\x02\x8b\x1e\xe3\xa1w\x9b;\xdc\xbf\x94>\xb7\x95\xa7@<\xa1\xfd\x82\xf9}2\x06\x82q\xf6\xf6\x8c\x7f\xfb\xe8\xdb\xbcj.\x97\x97\xa3\x8cK\xf9+\xf6\xb1\xf9\xce\x84\x1d\xb1\xf9\xc5\x97\xde\xef\xb9\xf2\xa3\xe9\xbc\x12\x89^\xa7\xaaR\xab\xf8#'\xcb\xa4\xb1\x9cc\xdb\xd7\x99~\xf0\n^\xebh\xa6\xf4\xc6ZG\rM\x103\xe3N\xb1\x13\xa3\xc8\x18lK\xec\xfc\t\x90\xdf\x9dd)%#\x07\xa1\xb4\xd2=.`\xe0\xcf\xd2\t\x87\xbb\xcdH\xf0M\xc2\xc2z\x88\x8a\xbb\xba\xcfY\x19\xd6\xaf\x8f\xb0\x07\xb0\x9e1\xf1\x82\xc1\xc0\xdf.\xa6ml\x19\x0e\xb5\xd8~&\x1aE\x03=\xb0y\xa4\x94(\xad\x0f\x7f&\xe5\xa8\x08\xfe\x96\xe8<h\x94S\xee\x83:\x88+\x15\x96\t\xb2\xe0z\x8c.u\xd6\x9c\xeb\xa7Vd\x8f\x96Oh\xae=\x97\xc2\x84\x8f\xc0\xbc@\xc0\x0b\\\xbd\xf6\x87\xb35l\xac\x18P\x7f\x84\xe0L\xcd\x92\xd3 \xe93\xbcR\x99\xaf2\xb5)\xb3%*\xb4H\xf9r\xe1\xcad\xf7\xe6\x82\x10\x8d\xe8\x9d\xc2\x8a\x88\xfa8f\x8a\xfcc\xf9\x01\xf9x\xfd{\\w\xfav\x87\xfa\xec\xdf\xb1\x0ey\x95W\xb4\xbd&\xef\xd6\x01\xd1\xeb\x16\n\xbb\x8e\x0b\xb5\xc5\xc5\x8aU\xab\xd3\xac\xea\x91K)\xcc\x19\xa42%N*\xf1eD\xd0\x02\xce\xaa\xceI\xb4\xea\x9f|\x83\xb0@{\xe7C\xab\xa7l\xa3\x8f}\x89\x81\xfaL\xa5\xff\xd5\x8e\xc3\xceK\xe0\xb5\xd8\xb3\x8eE\xcfv\xc0\xed@+\xfdS\x0f\xb0\xa7\xd5;\r\xb1\x8a\xa2\x03\xde1\xad\xccw\xeao{>\xd6\xdf\x91\"\x12\xe6\xbe\xfa\xd82\xfc\x10c\x14Qr\xde]\xd6\x16\x93\xbd)h3\xef:f\xec\x07\x8a&\xdf\x13\xd7Wex'\xde^I\x14\0\xa2\0\x7f\x9a\xa8!\xb6\xa9\xb1\x95\xb0\xa5\xb9\r\x16\x11\xda\xc7lH<@\xe0~\rZ\xcdV<\xd1\x97\x05\xb9\xcbK\xed9K\x9c\xc4?\xd2U\x13n$\xb0\xd6q\xfa\xf4\xc1\xba\xcc\xed\x1b\xf5\xfe\x81A\xd8\0\x98=:\xc8\xaez\x987\x18\x05\x95\x02\x03\x01\0\x01\xa3\x82\x0180\x82\x0140\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x0f\x06\x03U\x1d\x13\x01\x01\xff\x04\x050\x03\x01\x01\xff0\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14`{f\x1aE\r\x97\xca\x89P/}\x04\xcd4\xa8\xff\xfc\xfdK0`\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04T0R0%\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x19http://ocsp.pki.goog/gsr10)\x06\x08+\x06\x01\x05\x05\x070\x02\x86\x1dhttp://pki.goog/gsr1/gsr1.crt02\x06\x03U\x1d\x1f\x04+0)0'\xa0%\xa0#\x86!http://crl.pki.goog/gsr1/gsr1.crl0;\x06\x03U\x1d \x044020\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x030\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\04\xa4\x1e\xb1(\xa3\xd0\xb4v\x17\xa61z!\xe9\xd1R>\xc8\xdbt\x16A\x88\xb8=5\x1d\xed\xe4\xff\x93\xe1\\_\xab\xbb\xea|\xcf\xdb\xe4\r\xd1\x8bW\xf2&o[\xbe\x17Fh\x947okz\xc8\xc0\x187\xfa%Q\xac\xech\xbf\xb2\xc8I\xfdZ\x9a\xca\x01#\xac\x84\x80+\x02\x8c\x99\x97\xebIj\x8cu\xd7\xc7\xde\xb2\xc9\x97\x9fXHW\x0e5\xa1\xe4\x1a\xd6\xfdo\x83\x81o\xef\x8c\xcf\x97\xaf\xc0\x85*\xf0\xf5Ni\t\x91-\xe1h\xb8\xc1+s\xe9\xd4\xd9\xfc\"\xc07\x1f\x0bf\x1dI\xed\x02U\x8fg\xe12\xd7\xd3&\xbfp\xe3=\xf4gm=|\xe54\x88\xe32\xfa\xa7n\x06jo\xbd\x8b\x91\xee\x16K\xe8;\xa9\xb37\xe7\xc3D\xa4~\xd8l\xd7\xc7F\xf5\x92\x9b\xe7\xd5!\xbef\x92\x19\x94Ul\xd4)\xb2\r\xc1f[\xe2wIH(\xed\x9d\xd7\x1a3rS\xb3\x825\xcfb\x8b\xc9$\x8b\xa5\xb79\x0c\xbb~*A\xbfR\xcf\xfc\xa2\x96\xb6\xc2\x82?")] TRACE signal: Want TRACE signal found waiting giver, notifying TRACE poll_want: taker wants! TRACE signal: Want DEBUG Ticket saved DEBUG Ticket saved TRACE deregistering event source from poller TRACE signal: Closed ERROR Wrong browser/driver version ``` ### How can we reproduce the issue? ```shell No script required, ensure Chrome is on v115 and run ./selenium-manager.exe --browser chrome ``` ``` ### Relevant log output ```shell <Error> <Code>NoSuchKey</Code> <Message>The specified key does not exist.</Message> <Details>No such object: chromedriver/LATEST_RELEASE_115</Details> </Error> ``` ./selenium-manager.exe --trace --browser chrome TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json DEBUG Using shell command to find out chrome version DEBUG Running cmd command: "wmic datafile where name='%PROGRAMFILES:\\=\\\\%\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe' get Version /value" DEBUG Output { status: ExitStatus(ExitStatus(0)), stdout: "\r\r\n\r\r\nVersion=115.0.5790.171\r\r\n\r\r\n\r\r\n\r\r\n", stderr: "" } DEBUG The version of chrome is 115.0.5790.171 TRACE Writing metadata to C:\Users\jf6856\.cache\selenium\selenium-manager.json DEBUG Detected browser: chrome 115 TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json DEBUG Reading chromedriver version from https://chromedriver.storage.googleapis.com/LATEST_RELEASE_115 DEBUG starting new connection: https://chromedriver.storage.googleapis.com/ TRACE registering event source with poller: token=Token(0), interests=READABLE | WRITABLE DEBUG No cached session for DnsName(DnsName(DnsName("chromedriver.storage.googleapis.com"))) DEBUG Not resuming any session TRACE Sending ClientHello Message { version: TLSv1_0, payload: Handshake { parsed: HandshakeMessagePayload { typ: ClientHello, payload: ClientHello( ClientHelloPayload { client_version: TLSv1_2, random: 9be3753a2c9ec3695136ab5174467e55e9ed4f1639b243cde73834cb134c89c9, session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2, cipher_suites: [ TLS13_AES_256_GCM_SHA384, TLS13_AES_128_GCM_SHA256, TLS13_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, ], compression_methods: [ Null, ], extensions: [ SupportedVersions( [ TLSv1_3, TLSv1_2, ], ), ECPointFormats( [ Uncompressed, ], ), NamedGroups( [ X25519, secp256r1, secp384r1, ], ), SignatureAlgorithms( [ ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256, ], ), ExtendedMasterSecretRequest, CertificateStatusRequest( OCSP( OCSPCertificateStatusRequest { responder_ids: [], extensions: , }, ), ), ServerName( [ ServerName { typ: HostName, payload: HostName( ( 6368726f6d656472697665722e73746f726167652e676f6f676c65617069732e636f6d, DnsName( "chromedriver.storage.googleapis.com", ), ), ), }, ], ), SignedCertificateTimestampRequest, KeyShare( [ KeyShareEntry { group: X25519, payload: e10431044ddb0a9e16f01bccb60a6ea0b7d41c8283604893388b2e44895a8d4f, }, ], ), PresharedKeyModes( [ PSK_DHE_KE, ], ), Protocols( [ 6832, 687474702f312e31, ], ), SessionTicket( Request, ), ], }, ), }, encoded: 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, }, } TRACE We got ServerHello ServerHelloPayload { legacy_version: TLSv1_2, random: 1e202b437593c6ded1bc00a8dee0793c2e638da8952d5144e1be8e1a04429008, session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2, cipher_suite: TLS13_AES_256_GCM_SHA384, compression_method: Null, extensions: [ KeyShare( KeyShareEntry { group: X25519, payload: a22b136ad149736dc834ed950e6f9b19cfd8f2121e1fe6265d3537456aa02237, }, ), SupportedVersions( TLSv1_3, ), ], } DEBUG Using ciphersuite TLS13_AES_256_GCM_SHA384 DEBUG Not resuming TRACE EarlyData rejected TRACE Dropping CCS DEBUG TLS1.3 encrypted extensions: [Protocols([6832])] DEBUG ALPN protocol is Some(b"h2") TRACE Server cert is [Certificate(b"0\x82\x06m0\x82\x05U\xa0\x03\x02\x01\x02\x02\x11\0\x87\xbe\t\xcd\x0e!\xc7X\n\x03\xe1\x91\xc1\xe1\xe2:0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x1e\x17\r230710082045Z\x17\r231002082044Z0#1!0\x1f\x06\x03U\x04\x03\x0c\x18*.storage.googleapis.com0Y0\x13\x06\x07*\x86H\xce=\x02\x01\x06\x08*\x86H\xce=\x03\x01\x07\x03B\0\x04\xbf@\xbf\xedpu:K\xb5\x12\x7f\x11\xc7\xc3\x07\xa4\xeb,U\xf5\x82\x80V\xa0\x83\x93\xcb]\0\"\xa5\xec'\x84\nZ5F@s\xe6\xba\xeb\xd8\x8bI\xb5M\x0e\x11&\xb1\xc1\xb9\xad\x18\xaf\xb1ql\x80e0\xb3\xa3\x82\x04B0\x82\x04>0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x07\x800\x13\x06\x03U\x1d%\x04\x0c0\n\x06\x08+\x06\x01\x05\x05\x07\x03\x010\x0c\x06\x03U\x1d\x13\x01\x01\xff\x04\x020\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x142\xf1W\xf0\xd1\x93g\xf1\x81n\xc6\x078A\xcc\x0e\xe4c\xc6\xa80\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0j\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04^0\\0'\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1bhttp://ocsp.pki.goog/gts1c301\x06\x08+\x06\x01\x05\x05\x070\x02\x86%http://pki.goog/repo/certs/gts1c3.der0\x82\x01\xf1\x06\x03U\x1d\x11\x04\x82\x01\xe80\x82\x01\xe4\x82\x18*.storage.googleapis.com\x82\x10*.googleapis.com\x82 commondatastorage.googleapis.com\x82\"*.commondatastorage.googleapis.com\x82\x16storage.googleapis.com\x82\x19storage-p2.googleapis.com\x82\x1b*.storage-p2.googleapis.com\x82\x1bstorage.mtls.googleapis.com\x82$*.appspot.com.storage.googleapis.com\x82 *.content-storage.googleapis.com\x82#*.content-storage-p2.googleapis.com\x82'*.content-storage-upload.googleapis.com\x82)*.content-storage-download.googleapis.com\x82\x1f*.storage-upload.googleapis.com\x82!*.storage-download.googleapis.com0!\x06\x03U\x1d \x04\x1a0\x180\x08\x06\x06g\x81\x0c\x01\x02\x010\x0c\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030<\x06\x03U\x1d\x1f\x0450301\xa0/\xa0-\x86+http://crls.pki.goog/gts1c3/fVJxbV-Ktmk.crl0\x82\x01\x05\x06\n+\x06\x01\x04\x01\xd6y\x02\x04\x02\x04\x81\xf6\x04\x81\xf3\0\xf1\0v\0\xad\xf7\xbe\xfa|\xff\x10\xc8\x8b\x9d=\x9c\x1e>\x18j\xb4g)]\xcf\xb1\x0c$\xca\x85\x864\xeb\xdc\x82\x8a\0\0\x01\x89?\x1a\x94\xfe\0\0\x04\x03\0G0E\x02 i]\x13\xa0\x0b\xc6\xce\xeeU\x841j>\xe5\x94x\xa0\x01.\x81ZD3$v\x15D\x1bEQ\x98\xe6\x02!\0\xbeq<\x88\x196pj\x0e\x10\x17\xe5\xdc\xb9\x0bT@\x8c\xdc\xda\xc5\x017\xc1\x82c\xa0\x86\x9aFB\x02\0w\0\xb3sw\x07\xe1\x84P\xf8c\x86\xd6\x05\xa9\xdc\x11\tJy-\xb1g\x0c\x0b\x87\xdc\xf0\x03\x0ey6\xa5\x9a\0\0\x01\x89?\x1a~9\0\0\x04\x03\0H0F\x02!\0\xa0\xf8'\xf2\xbe\x86t\xc7\x97\xbe\xbew\xff3\xad\x93@:UN\x9c\xd8\x82\x8c\x93\xd2\x91\xb6=AA\"\x02!\0\xdb_\xae^\xf2~\xf2\xd8\xcb\xba\xb6\xc1:\x9f\xc4[\xe2\xc3\x88\xc4\xca\x8e\xe5\xa3\xe7\x0cEg\x07U[10\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\0/\xfeg}\xde\x12\x06`\xb4\xc2\xbc\xc4\xce\xc8\xc8%\xc1_\xbfA\xe3\x16\xd5\x9d\xac\xf4)\xe5+\xfeK\xf0\n\xb3\xbb\xe0}\xe3g\xddmI\x0be\x90\xe8A\xa7\x9erV5\xf8\x15d\xcc=\x17\xd2\x0f\xa5v\x85\x0f\x03(b\xb7\xe7j\xe5\xe9YY\xfc\xb4\xa1\xe1\xe9\xff\xa4\x8c\x9d\xe0i`\xd3E\xf1f\xcd\xb4]?\xb5\xee\xa6\xd3\xbb\x90\x1d\x92\x8d\xc4\xa6\xe2\xb9=s\xa8e\xab\x14\x87\xc0\xde\xc8\xd6v\xcej7\x90F\xd4\xad\x89ek\xb3\xcb\x11\x10\xe9G\xcc\xff\x06\x9d\x8b2\xc3\xc7\x9a\xbf\x0fU\x90~\x16iJ\xce\xde,\x0b\xe2\xe9\x04\x8b\x8aC\xe7\xcf\x17^\xe0\xea\xee\x12\x98\x01\xdak\x11n!\x08\xaena/h\xe0\xe5;?`\xcc\x8e\xce\xf2\xd60\xca+G\r\x03u\x15\xd0\xbc\x855\xcb\xc87\xf9\xda\xe0\xef6\xbe\x86|\xd1E\x1e\x18\xa8\xcf\xf8 \x0eA\xde\xdb9\xaa\x19vJ\xa4\x93\xed\x93\x85\xb7\x03A.\xfa\x90\xee\x1b&})\xa8\xb4;\xaeX\xb4\xca"), Certificate(b"0\x82\x05\x960\x82\x03~\xa0\x03\x02\x01\x02\x02\r\x02\x03\xbcSYk4\xc7\x18\xf5\x01Pf0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x1e\x17\r200813000042Z\x17\r270930000042Z0F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x82\x01\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x01\x0f\00\x82\x01\n\x02\x82\x01\x01\0\xf5\x88\xdf\xe7b\x8c\x1e7\xf87B\x90\x7fl\x87\xd0\xfbe\x82%\xfd\xe8\xcbk\xa4\xffm\xe9Z#\xe2\x99\xf6\x1c\xe9\x92\x03\x99\x13|\t\n\x8a\xfaB\xd6^V$\xaaz3\x84\x1f\xd1\xe9i\xbb\xb9t\xecWLfh\x93w7US\xfe9\x10M\xb74\xbb_%w7;\x17\x94\xea<\xe5\x9d\xd5\xbc\xc3\xb4C\xeb.\xa7G\xef\xb0D\x11c\xd8\xb4A\x85\xddA0H\x93\x1b\xbf\xb7\xf6\xe0E\x02!\xe0\x96B\x17\xcf\xd9+eV4\x07&\x04\r\xa8\xfd}\xca.\xef\xeaH|7M?\0\x9f\x83\xdf\xefu\x84.yW\\\xfcWn\x1a\x96\xff\xfc\x8c\x9a\xa6\x99\xbe%\xd9\x7f\x96,\x06\xf7\x11*\x02\x80\x80\xebc\x18<PI\x87\xe5\x8a\xca_\x19+Y\x96\x81\0\xa0\xfbQ\xdb\xcaw\x0b\x0b\xc9\x96O\xefpI\xc7\\m \xfd\x99\xb4\xb4\xe2\xca.w\xfd-\xdc\x0b\xb6k\x13\x0c\x8c\x19+\x17\x96\x98\xb9\xf0\x8b\xf6\xa0'\xbb\xb6\xe3\x8dQ\x8f\xbd\xae\xc7\x9b\xb1\x89\x9d\x02\x03\x01\0\x01\xa3\x82\x01\x800\x82\x01|0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x1d\x06\x03U\x1d%\x04\x160\x14\x06\x08+\x06\x01\x05\x05\x07\x03\x01\x06\x08+\x06\x01\x05\x05\x07\x03\x020\x12\x06\x03U\x1d\x13\x01\x01\xff\x04\x080\x06\x01\x01\xff\x02\x01\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0h\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04\\0Z0&\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1ahttp://ocsp.pki.goog/gtsr100\x06\x08+\x06\x01\x05\x05\x070\x02\x86$http://pki.goog/repo/certs/gtsr1.der04\x06\x03U\x1d\x1f\x04-0+0)\xa0'\xa0%\x86#http://crl.pki.goog/gtsr1/gtsr1.crl0W\x06\x03U\x1d \x04P0N08\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030*0(\x06\x08+\x06\x01\x05\x05\x07\x02\x01\x16\x1chttps://pki.goog/repository/0\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x02\x01\0\x89}\xac \\\x0c<\xbe\x9a\xa8W\x95\x1b\xb4\xae\xfa\xab\xa5rq\xb46\x95\xfd\xdf@\x11\x03L\xc2F\x14\xbb\x14$\xab\xf0Pq\"\xdb\xad\xc4n\x7f\xcf\xf1jo\xc8\x83\x1b\xd8\xce\x89_\x87l\x87\xb8\xa9\x0c\xa3\x9b\xa1b\x94\x93\x95\xdf[\xaef\x19\x0b\x02\x96\x9e\xfc\xb5\xe7\x10i>z\xcbFI_F\xe1A\xb1\xd7\x98Me4\0\x80\x1a?O\x9fl\x7fI\0\x81SA\xa4\x92!\x82\x82\x1a\xf1\xa3D[*P\x12\x13M\xc1S6\xf3B\x08\xafT\xfa\x8ewS\x1bd8'\x17\t\xbdX\xc9\x1b|9-[\xf3\xce\xd4\xed\x97\xdb\x14\x03\xbf\tS$\x1f\xc2\x0c\x04y\x98&\xf2a\xf1SR\xfdB\x8c\x1bf+?\x15\xa1\xbb\xff\xf6\x9b\xe3\x81\x9a\x01\x06q\x895($\xdd\xe1\xbd\xeb\x19-\xe1H\xcb=Y\x83Q\xb4t\xc6\x9d|\xc6\xb1\x86[\xaf\xcc4\xc4\xd3\xcc\xd4\x81\x11\x95\0\xa1\xf4\x12\"\x01\xfa\xb4\x83q\xaf\x8c\xb7\x8cs$\xac7S\xc2\0\x90?\x11\xfe\\\xed6\x94\x10;\xbd)\xae\xe2\xc7:b;lc\xd9\x80\xbfYq\xacc'\xb9L\x17\xa0\xda\xf6s\x15\xbf*\xde\x8f\xf3\xa5l2\x813\x03\xd0\x86Qq\x994\xba\x93\x8d]\xb5QX\xf7\xb2\x93\xe8\x01\xf6Y\xbeq\x9b\xfdM(\xce\xcfm\xc7\x16\xdc\xf7\xd1\xd6F\x9b\xa7\xcak\xe9w\x0f\xfd\xa0\xb6\x1b#\x83\x1d\x10\x1a\xd9\t\0\x84\xe0D\xd3\xa2u#\xb34\x86\xf6 \xb0\xa4^\x10\x1d\xe0RF\0\x9d\xb1\x0f\x1f!pQ\xf5\x9a\xdd\x06\xfcU\xf4+\x0e3w\xc3KB\xc2\xf1w\x13\xfcs\x80\x94\xeb\x1f\xbb7?\xce\x02*f\xb0s\x1d2\xa52l2\xb0\x8e\xe0\xc4#\xff[}Mep\xac+\x9b=\xce\xdb\xe0m\x8e2\x80\xbe\x96\x9f\x92c\xbc\x97\xbb]\xb9\xf4\xe1q^*\xe4\xef\x03\"\xb1\x8ae:\x8f\xc0\x93e\xd4\x85\xcd\x0f\x0f[\x83Y\x16G\x16-\x9c$:\xc8\x80\xa6&\x14\x85\x9b\xf67\x9b\xaco\xf9\xc5\xc3\x06Q\xf3\xe2\x7f\xc5\xb1\x10\xbaQ\xf4\xdd"), Certificate(b"0\x82\x05b0\x82\x04J\xa0\x03\x02\x01\x02\x02\x10w\xbd\rl\xdb6\xf9\x1a\xea!\x0f\xc4\xf0X\xd3\r0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00W1\x0b0\t\x06\x03U\x04\x06\x13\x02BE1\x190\x17\x06\x03U\x04\n\x13\x10GlobalSign nv-sa1\x100\x0e\x06\x03U\x04\x0b\x13\x07Root CA1\x1b0\x19\x06\x03U\x04\x03\x13\x12GlobalSign Root CA0\x1e\x17\r200619000042Z\x17\r280128000042Z0G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x82\x02\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x02\x0f\00\x82\x02\n\x02\x82\x02\x01\0\xb6\x11\x02\x8b\x1e\xe3\xa1w\x9b;\xdc\xbf\x94>\xb7\x95\xa7@<\xa1\xfd\x82\xf9}2\x06\x82q\xf6\xf6\x8c\x7f\xfb\xe8\xdb\xbcj.\x97\x97\xa3\x8cK\xf9+\xf6\xb1\xf9\xce\x84\x1d\xb1\xf9\xc5\x97\xde\xef\xb9\xf2\xa3\xe9\xbc\x12\x89^\xa7\xaaR\xab\xf8#'\xcb\xa4\xb1\x9cc\xdb\xd7\x99~\xf0\n^\xebh\xa6\xf4\xc6ZG\rM\x103\xe3N\xb1\x13\xa3\xc8\x18lK\xec\xfc\t\x90\xdf\x9dd)%#\x07\xa1\xb4\xd2=.`\xe0\xcf\xd2\t\x87\xbb\xcdH\xf0M\xc2\xc2z\x88\x8a\xbb\xba\xcfY\x19\xd6\xaf\x8f\xb0\x07\xb0\x9e1\xf1\x82\xc1\xc0\xdf.\xa6ml\x19\x0e\xb5\xd8~&\x1aE\x03=\xb0y\xa4\x94(\xad\x0f\x7f&\xe5\xa8\x08\xfe\x96\xe8<h\x94S\xee\x83:\x88+\x15\x96\t\xb2\xe0z\x8c.u\xd6\x9c\xeb\xa7Vd\x8f\x96Oh\xae=\x97\xc2\x84\x8f\xc0\xbc@\xc0\x0b\\\xbd\xf6\x87\xb35l\xac\x18P\x7f\x84\xe0L\xcd\x92\xd3 \xe93\xbcR\x99\xaf2\xb5)\xb3%*\xb4H\xf9r\xe1\xcad\xf7\xe6\x82\x10\x8d\xe8\x9d\xc2\x8a\x88\xfa8f\x8a\xfcc\xf9\x01\xf9x\xfd{\\w\xfav\x87\xfa\xec\xdf\xb1\x0ey\x95W\xb4\xbd&\xef\xd6\x01\xd1\xeb\x16\n\xbb\x8e\x0b\xb5\xc5\xc5\x8aU\xab\xd3\xac\xea\x91K)\xcc\x19\xa42%N*\xf1eD\xd0\x02\xce\xaa\xceI\xb4\xea\x9f|\x83\xb0@{\xe7C\xab\xa7l\xa3\x8f}\x89\x81\xfaL\xa5\xff\xd5\x8e\xc3\xceK\xe0\xb5\xd8\xb3\x8eE\xcfv\xc0\xed@+\xfdS\x0f\xb0\xa7\xd5;\r\xb1\x8a\xa2\x03\xde1\xad\xccw\xeao{>\xd6\xdf\x91\"\x12\xe6\xbe\xfa\xd82\xfc\x10c\x14Qr\xde]\xd6\x16\x93\xbd)h3\xef:f\xec\x07\x8a&\xdf\x13\xd7Wex'\xde^I\x14\0\xa2\0\x7f\x9a\xa8!\xb6\xa9\xb1\x95\xb0\xa5\xb9\r\x16\x11\xda\xc7lH<@\xe0~\rZ\xcdV<\xd1\x97\x05\xb9\xcbK\xed9K\x9c\xc4?\xd2U\x13n$\xb0\xd6q\xfa\xf4\xc1\xba\xcc\xed\x1b\xf5\xfe\x81A\xd8\0\x98=:\xc8\xaez\x987\x18\x05\x95\x02\x03\x01\0\x01\xa3\x82\x0180\x82\x0140\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x0f\x06\x03U\x1d\x13\x01\x01\xff\x04\x050\x03\x01\x01\xff0\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14`{f\x1aE\r\x97\xca\x89P/}\x04\xcd4\xa8\xff\xfc\xfdK0`\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04T0R0%\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x19http://ocsp.pki.goog/gsr10)\x06\x08+\x06\x01\x05\x05\x070\x02\x86\x1dhttp://pki.goog/gsr1/gsr1.crt02\x06\x03U\x1d\x1f\x04+0)0'\xa0%\xa0#\x86!http://crl.pki.goog/gsr1/gsr1.crl0;\x06\x03U\x1d \x044020\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x030\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\04\xa4\x1e\xb1(\xa3\xd0\xb4v\x17\xa61z!\xe9\xd1R>\xc8\xdbt\x16A\x88\xb8=5\x1d\xed\xe4\xff\x93\xe1\\_\xab\xbb\xea|\xcf\xdb\xe4\r\xd1\x8bW\xf2&o[\xbe\x17Fh\x947okz\xc8\xc0\x187\xfa%Q\xac\xech\xbf\xb2\xc8I\xfdZ\x9a\xca\x01#\xac\x84\x80+\x02\x8c\x99\x97\xebIj\x8cu\xd7\xc7\xde\xb2\xc9\x97\x9fXHW\x0e5\xa1\xe4\x1a\xd6\xfdo\x83\x81o\xef\x8c\xcf\x97\xaf\xc0\x85*\xf0\xf5Ni\t\x91-\xe1h\xb8\xc1+s\xe9\xd4\xd9\xfc\"\xc07\x1f\x0bf\x1dI\xed\x02U\x8fg\xe12\xd7\xd3&\xbfp\xe3=\xf4gm=|\xe54\x88\xe32\xfa\xa7n\x06jo\xbd\x8b\x91\xee\x16K\xe8;\xa9\xb37\xe7\xc3D\xa4~\xd8l\xd7\xc7F\xf5\x92\x9b\xe7\xd5!\xbef\x92\x19\x94Ul\xd4)\xb2\r\xc1f[\xe2wIH(\xed\x9d\xd7\x1a3rS\xb3\x825\xcfb\x8b\xc9$\x8b\xa5\xb79\x0c\xbb~*A\xbfR\xcf\xfc\xa2\x96\xb6\xc2\x82?")] TRACE signal: Want TRACE signal found waiting giver, notifying TRACE poll_want: taker wants! TRACE signal: Want DEBUG Ticket saved DEBUG Ticket saved TRACE deregistering event source from poller TRACE signal: Closed ERROR Wrong browser/driver version ``` ### Operating System Windows 11 ### Selenium version selenium==4.8.0 ### What are the browser(s) and version(s) where you see this issue? Chrome 115 ### What are the browser driver(s) and version(s) where you see this issue? Chrome 115 ### Are you using Selenium Grid? N/A
defect
selenium manager fails on chrome what happened let me know if this should land in a chrome bug report instead happy to create this there if needed when selenium manager exe attempts to download the correct version of the chrome webdriver it fails with the message error wrong browser driver version i believe this is related to just the most recent version of chrome nosuchkey the specified key does not exist no such object chromedriver latest release selenium manager exe trace browser chrome trace reading metadata from c users cache selenium selenium manager json debug using shell command to find out chrome version debug running cmd command wmic datafile where name programfiles google chrome application chrome exe get version value debug output status exitstatus exitstatus stdout r r n r r nversion r r n r r n r r n r r n stderr debug the version of chrome is trace writing metadata to c users cache selenium selenium manager json debug detected browser chrome trace reading metadata from c users cache selenium selenium manager json debug reading chromedriver version from debug starting new connection trace registering event source with poller token token interests readable writable debug no cached session for dnsname dnsname dnsname chromedriver storage googleapis com debug not resuming any session trace sending clienthello message version payload handshake parsed handshakemessagepayload typ clienthello payload clienthello clienthellopayload client version random session id cipher suites aes gcm aes gcm tls ecdhe ecdsa with aes gcm tls ecdhe ecdsa with aes gcm tls ecdhe ecdsa with tls ecdhe rsa with aes gcm tls ecdhe rsa with aes gcm tls ecdhe rsa with tls empty renegotiation info scsv compression methods null extensions supportedversions ecpointformats uncompressed namedgroups signaturealgorithms ecdsa ecdsa rsa pss rsa pss rsa pss rsa rsa rsa extendedmastersecretrequest certificatestatusrequest ocsp ocspcertificatestatusrequest responder ids extensions servername servername typ hostname payload hostname dnsname chromedriver storage googleapis com signedcertificatetimestamprequest keyshare keyshareentry group payload presharedkeymodes psk dhe ke protocols sessionticket request encoded trace we got serverhello serverhellopayload legacy version random session id cipher suite aes gcm compression method null extensions keyshare keyshareentry group payload supportedversions debug using ciphersuite aes gcm debug not resuming trace earlydata rejected trace dropping ccs debug encrypted extensions debug alpn protocol is some b trace server cert is xec s xba xeb xad xaf xff n xff xcc xaf xcd xee xcd commondatastorage googleapis com commondatastorage googleapis com googleapis com googleapis com storage googleapis com mtls googleapis com appspot com storage googleapis com content storage googleapis com content storage googleapis com content storage upload googleapis com content storage download googleapis com storage upload googleapis com storage download googleapis n v xbeq n f r xca xff xfc r r r t r xdbt xed xff xab xbb xea xcf xdb r o trace signal want trace signal found waiting giver notifying trace poll want taker wants trace signal want debug ticket saved debug ticket saved trace deregistering event source from poller trace signal closed error wrong browser driver version how can we reproduce the issue shell no script required ensure chrome is on and run selenium manager exe browser chrome relevant log output shell nosuchkey the specified key does not exist no such object chromedriver latest release selenium manager exe trace browser chrome trace reading metadata from c users cache selenium selenium manager json debug using shell command to find out chrome version debug running cmd command wmic datafile where name programfiles google chrome application chrome exe get version value debug output status exitstatus exitstatus stdout r r n r r nversion r r n r r n r r n r r n stderr debug the version of chrome is trace writing metadata to c users cache selenium selenium manager json debug detected browser chrome trace reading metadata from c users cache selenium selenium manager json debug reading chromedriver version from debug starting new connection trace registering event source with poller token token interests readable writable debug no cached session for dnsname dnsname dnsname chromedriver storage googleapis com debug not resuming any session trace sending clienthello message version payload handshake parsed handshakemessagepayload typ clienthello payload clienthello clienthellopayload client version random session id cipher suites aes gcm aes gcm tls ecdhe ecdsa with aes gcm tls ecdhe ecdsa with aes gcm tls ecdhe ecdsa with tls ecdhe rsa with aes gcm tls ecdhe rsa with aes gcm tls ecdhe rsa with tls empty renegotiation info scsv compression methods null extensions supportedversions ecpointformats uncompressed namedgroups signaturealgorithms ecdsa ecdsa rsa pss rsa pss rsa pss rsa rsa rsa extendedmastersecretrequest certificatestatusrequest ocsp ocspcertificatestatusrequest responder ids extensions servername servername typ hostname payload hostname dnsname chromedriver storage googleapis com signedcertificatetimestamprequest keyshare keyshareentry group payload presharedkeymodes psk dhe ke protocols sessionticket request encoded trace we got serverhello serverhellopayload legacy version random session id cipher suite aes gcm compression method null extensions keyshare keyshareentry group payload supportedversions debug using ciphersuite aes gcm debug not resuming trace earlydata rejected trace dropping ccs debug encrypted extensions debug alpn protocol is some b trace server cert is xec s xba xeb xad xaf xff n xff xcc xaf xcd xee xcd commondatastorage googleapis com commondatastorage googleapis com googleapis com googleapis com storage googleapis com mtls googleapis com appspot com storage googleapis com content storage googleapis com content storage googleapis com content storage upload googleapis com content storage download googleapis com storage upload googleapis com storage download googleapis n v xbeq n f r xca xff xfc r r r t r xdbt xed xff xab xbb xea xcf xdb r o trace signal want trace signal found waiting giver notifying trace poll want taker wants trace signal want debug ticket saved debug ticket saved trace deregistering event source from poller trace signal closed error wrong browser driver version operating system windows selenium version selenium what are the browser s and version s where you see this issue chrome what are the browser driver s and version s where you see this issue chrome are you using selenium grid n a
1
73,264
32,008,847,121
IssuesEvent
2023-09-21 16:31:42
hashicorp/terraform-provider-aws
https://api.github.com/repos/hashicorp/terraform-provider-aws
closed
file_system_administrators_group not considered during creation of ressource aws_fsx_ontap_storage_virtual_machine which forces replacement during next apply
bug service/fsx
<!--- Please note the following potential times when an issue might be in Terraform core: * [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues * [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues * [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues * [Registry](https://registry.terraform.io/) issues * Spans resources across multiple providers If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead. ---> <!--- Please keep this note for the community ---> ### Community Note * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request * Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request * If you are interested in working on this issue or have submitted a pull request, please leave a comment <!--- Thank you for keeping this note for the community ---> ### Terraform CLI and Terraform AWS Provider Version <!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). ---> ### Affected Resource(s) <!--- Please list the affected resources and data sources. ---> * aws_fsx_ontap_storage_virtual_machine ### Terraform Configuration Files <!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code ---> Please include all Terraform configurations required to reproduce the bug. Bug reports without a functional reproduction may be closed without investigation. ```hcl resource "aws_fsx_ontap_storage_virtual_machine" "brln" { file_system_id = aws_fsx_ontap_file_system.eufr.id name = "BRLNFS001" active_directory_configuration { netbios_name = "BRLNFS001" self_managed_active_directory_configuration { dns_ips = local.eufr_ad_ips domain_name = local.eufr_ad_domain_name username = local.eufr_ad_user_name password = local.eufr_ad_user_password file_system_administrators_group = "BRLNGSRVAdmins" #<==== this is simply ignored during apply organizational_unit_distinguished_name = "OU=BRLN-Servers,OU=OU-BRLN,OU=DE,OU=Locations,DC=eu1,DC=company,DC=local" } } root_volume_security_style = "NTFS" provider = aws.eufr } ``` ### Debug Output <!--- Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist. To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html). ---> https://gist.github.com/brakf/1efc660e344634e8eeec99e531c41684 ### Panic Output <!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. ---> ### Expected Behavior <!--- What should have happened? ---> aws_fsx_ontap_storage_virtual_machine.brln should have been created with parameter file_system_administrators_group set properly. ### Actual Behavior Instead it was not considered which prompted terraform to delete and create the same ressource again upon next apply. <!--- What actually happened? ---> ### Steps to Reproduce <!--- Please list the steps required to reproduce the issue. ---> 1. `terraform apply` ### Important Factoids <!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? ---> ### References <!--- Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example: ---> * #0000
1.0
file_system_administrators_group not considered during creation of ressource aws_fsx_ontap_storage_virtual_machine which forces replacement during next apply - <!--- Please note the following potential times when an issue might be in Terraform core: * [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues * [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues * [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues * [Registry](https://registry.terraform.io/) issues * Spans resources across multiple providers If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead. ---> <!--- Please keep this note for the community ---> ### Community Note * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request * Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request * If you are interested in working on this issue or have submitted a pull request, please leave a comment <!--- Thank you for keeping this note for the community ---> ### Terraform CLI and Terraform AWS Provider Version <!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). ---> ### Affected Resource(s) <!--- Please list the affected resources and data sources. ---> * aws_fsx_ontap_storage_virtual_machine ### Terraform Configuration Files <!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code ---> Please include all Terraform configurations required to reproduce the bug. Bug reports without a functional reproduction may be closed without investigation. ```hcl resource "aws_fsx_ontap_storage_virtual_machine" "brln" { file_system_id = aws_fsx_ontap_file_system.eufr.id name = "BRLNFS001" active_directory_configuration { netbios_name = "BRLNFS001" self_managed_active_directory_configuration { dns_ips = local.eufr_ad_ips domain_name = local.eufr_ad_domain_name username = local.eufr_ad_user_name password = local.eufr_ad_user_password file_system_administrators_group = "BRLNGSRVAdmins" #<==== this is simply ignored during apply organizational_unit_distinguished_name = "OU=BRLN-Servers,OU=OU-BRLN,OU=DE,OU=Locations,DC=eu1,DC=company,DC=local" } } root_volume_security_style = "NTFS" provider = aws.eufr } ``` ### Debug Output <!--- Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist. To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html). ---> https://gist.github.com/brakf/1efc660e344634e8eeec99e531c41684 ### Panic Output <!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. ---> ### Expected Behavior <!--- What should have happened? ---> aws_fsx_ontap_storage_virtual_machine.brln should have been created with parameter file_system_administrators_group set properly. ### Actual Behavior Instead it was not considered which prompted terraform to delete and create the same ressource again upon next apply. <!--- What actually happened? ---> ### Steps to Reproduce <!--- Please list the steps required to reproduce the issue. ---> 1. `terraform apply` ### Important Factoids <!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? ---> ### References <!--- Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example: ---> * #0000
non_defect
file system administrators group not considered during creation of ressource aws fsx ontap storage virtual machine which forces replacement during next apply please note the following potential times when an issue might be in terraform core or resource ordering issues and issues issues issues spans resources across multiple providers if you are running into one of these scenarios we recommend opening an issue in the instead community note please vote on this issue by adding a 👍 to the original issue to help the community and maintainers prioritize this request please do not leave or other comments that do not add relevant new information or questions they generate extra noise for issue followers and do not help prioritize the request if you are interested in working on this issue or have submitted a pull request please leave a comment terraform cli and terraform aws provider version affected resource s aws fsx ontap storage virtual machine terraform configuration files please include all terraform configurations required to reproduce the bug bug reports without a functional reproduction may be closed without investigation hcl resource aws fsx ontap storage virtual machine brln file system id aws fsx ontap file system eufr id name active directory configuration netbios name self managed active directory configuration dns ips local eufr ad ips domain name local eufr ad domain name username local eufr ad user name password local eufr ad user password file system administrators group brlngsrvadmins this is simply ignored during apply organizational unit distinguished name ou brln servers ou ou brln ou de ou locations dc dc company dc local root volume security style ntfs provider aws eufr debug output please provide a link to a github gist containing the complete debug output please do not paste the debug output in the issue just paste a link to the gist to obtain the debug output see the panic output expected behavior aws fsx ontap storage virtual machine brln should have been created with parameter file system administrators group set properly actual behavior instead it was not considered which prompted terraform to delete and create the same ressource again upon next apply steps to reproduce terraform apply important factoids references information about referencing github issues are there any other github issues open or closed or pull requests that should be linked here vendor documentation for example
0
40,909
6,881,941,115
IssuesEvent
2017-11-21 00:55:18
SAFETAG/SAFETAG
https://api.github.com/repos/SAFETAG/SAFETAG
closed
Add resources on checking devices for signs of compromise
documentation enhancement
As I see SAFETAG's theory of change, it is roughly that an auditor connects organizations to the most vital services and resources that they currently need. As such, while I don't believe that we can expect SAFETAG auditors to provide more than rudimentary incident response when it comes to malware, we should expect to build SAFETAG modules that provide auditors the ability to identify the signs of device compromise and communicate that to security and incident response teams. Examples of existing content. - https://www.ucl.ac.uk/informationsecurity/itsecurity/knowledgebase/securitybaselines/win_intrusion - https://www.ucl.ac.uk/informationsecurity/itsecurity/knowledgebase/securitybaselines/nix_intrusion
1.0
Add resources on checking devices for signs of compromise - As I see SAFETAG's theory of change, it is roughly that an auditor connects organizations to the most vital services and resources that they currently need. As such, while I don't believe that we can expect SAFETAG auditors to provide more than rudimentary incident response when it comes to malware, we should expect to build SAFETAG modules that provide auditors the ability to identify the signs of device compromise and communicate that to security and incident response teams. Examples of existing content. - https://www.ucl.ac.uk/informationsecurity/itsecurity/knowledgebase/securitybaselines/win_intrusion - https://www.ucl.ac.uk/informationsecurity/itsecurity/knowledgebase/securitybaselines/nix_intrusion
non_defect
add resources on checking devices for signs of compromise as i see safetag s theory of change it is roughly that an auditor connects organizations to the most vital services and resources that they currently need as such while i don t believe that we can expect safetag auditors to provide more than rudimentary incident response when it comes to malware we should expect to build safetag modules that provide auditors the ability to identify the signs of device compromise and communicate that to security and incident response teams examples of existing content
0
752,883
26,330,985,262
IssuesEvent
2023-01-10 10:46:30
Cinevoraces/cinevoraces
https://api.github.com/repos/Cinevoraces/cinevoraces
closed
App - favicon, Head
To do priority: high
- [x] add favicon - [x] Custom head for each page - [x] external links preview for sharing elsewhere
1.0
App - favicon, Head - - [x] add favicon - [x] Custom head for each page - [x] external links preview for sharing elsewhere
non_defect
app favicon head add favicon custom head for each page external links preview for sharing elsewhere
0
4,159
2,610,088,437
IssuesEvent
2015-02-26 18:26:48
chrsmith/dsdsdaadf
https://api.github.com/repos/chrsmith/dsdsdaadf
opened
深圳痤疮怎么样祛最好
auto-migrated Priority-Medium Type-Defect
``` 深圳痤疮怎么样祛最好【深圳韩方科颜全国热线400-869-1818,24 小时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构以韩�� �秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,� ��方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹 ”健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内�� �业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上� ��痘痘。 ``` ----- Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 7:27
1.0
深圳痤疮怎么样祛最好 - ``` 深圳痤疮怎么样祛最好【深圳韩方科颜全国热线400-869-1818,24 小时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构以韩�� �秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,� ��方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹 ”健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内�� �业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上� ��痘痘。 ``` ----- Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 7:27
defect
深圳痤疮怎么样祛最好 深圳痤疮怎么样祛最好【 , 】深圳韩方科颜专业祛痘连锁机构,机构以韩�� �秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,� ��方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹 ”健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内�� �业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上� ��痘痘。 original issue reported on code google com by szft com on may at
1
194,936
22,281,600,124
IssuesEvent
2022-06-11 01:11:11
pazhanivel07/linux-4.19.72
https://api.github.com/repos/pazhanivel07/linux-4.19.72
reopened
CVE-2021-33033 (High) detected in multiple libraries
security vulnerability
## CVE-2021-33033 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>linux-yoctov5.4.51</b>, <b>linux-yoctov5.4.51</b>, <b>linux-yoctov5.4.51</b></p></summary> <p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value. <p>Publish Date: 2021-05-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33033>CVE-2021-33033</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-33033">https://www.linuxkernelcves.com/cves/CVE-2021-33033</a></p> <p>Release Date: 2021-05-14</p> <p>Fix Resolution: v4.14.226, v4.19.181, v5.4.106, v5.10.24, v5.11.7</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-33033 (High) detected in multiple libraries - ## CVE-2021-33033 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>linux-yoctov5.4.51</b>, <b>linux-yoctov5.4.51</b>, <b>linux-yoctov5.4.51</b></p></summary> <p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value. <p>Publish Date: 2021-05-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33033>CVE-2021-33033</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-33033">https://www.linuxkernelcves.com/cves/CVE-2021-33033</a></p> <p>Release Date: 2021-05-14</p> <p>Fix Resolution: v4.14.226, v4.19.181, v5.4.106, v5.10.24, v5.11.7</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries linux linux linux vulnerability details the linux kernel before has a use after free in cipso genopt in net cipso c because the cipso and calipso refcounting for the doi definitions is mishandled aka cid this leads to writing an arbitrary value publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
419,817
28,180,349,178
IssuesEvent
2023-04-04 01:35:13
dimitritsampiras/olympian
https://api.github.com/repos/dimitritsampiras/olympian
closed
Team #34 Review: Potential new Hazard, related to deleting and recovering a Post
documentation
@NickCapstone Overall your team had a great HA. However, I think there is a potential hazard you guys can add. The user may potentially post something they did not mean to post, or they may delete a post that they did not mean to delete. We believe this is a valid hazard because it fits your hazard definition, it negatively influences the user (who is a stakeholder). To resolve these hazards you would need to add a delete mechanism for posts, and a corresponding recovery/undo mechanism.
1.0
Team #34 Review: Potential new Hazard, related to deleting and recovering a Post - @NickCapstone Overall your team had a great HA. However, I think there is a potential hazard you guys can add. The user may potentially post something they did not mean to post, or they may delete a post that they did not mean to delete. We believe this is a valid hazard because it fits your hazard definition, it negatively influences the user (who is a stakeholder). To resolve these hazards you would need to add a delete mechanism for posts, and a corresponding recovery/undo mechanism.
non_defect
team review potential new hazard related to deleting and recovering a post nickcapstone overall your team had a great ha however i think there is a potential hazard you guys can add the user may potentially post something they did not mean to post or they may delete a post that they did not mean to delete we believe this is a valid hazard because it fits your hazard definition it negatively influences the user who is a stakeholder to resolve these hazards you would need to add a delete mechanism for posts and a corresponding recovery undo mechanism
0
19,248
3,167,867,899
IssuesEvent
2015-09-22 00:43:18
prettydiff/prettydiff
https://api.github.com/repos/prettydiff/prettydiff
closed
Less no indenting properly
Defect Underway
https://github.com/Glavin001/atom-beautify/issues/557 header { .inner { h1 { float: left; margin: 15px 0 15px -3px; img { @include transition(all 500ms ease); @media (max-width: 400px) { width: auto; height: 33px; } nav { float: right; margin: 10px -10px 0 0; @include transition(all 500ms ease); } } } } } Becomes header {.inner {h1 { float : left; margin: 15px 0 15px -3px; img { @include transition(all 500ms ease); @media (max-width: 400px) { width : auto; height: 33px; } nav { float : right; margin: 10px -10px 0 0; @include transition(all 500ms ease); } } } } }
1.0
Less no indenting properly - https://github.com/Glavin001/atom-beautify/issues/557 header { .inner { h1 { float: left; margin: 15px 0 15px -3px; img { @include transition(all 500ms ease); @media (max-width: 400px) { width: auto; height: 33px; } nav { float: right; margin: 10px -10px 0 0; @include transition(all 500ms ease); } } } } } Becomes header {.inner {h1 { float : left; margin: 15px 0 15px -3px; img { @include transition(all 500ms ease); @media (max-width: 400px) { width : auto; height: 33px; } nav { float : right; margin: 10px -10px 0 0; @include transition(all 500ms ease); } } } } }
defect
less no indenting properly header inner float left margin img include transition all ease media max width width auto height nav float right margin include transition all ease becomes header inner float left margin img include transition all ease media max width width auto height nav float right margin include transition all ease
1
31,746
6,612,307,380
IssuesEvent
2017-09-20 02:55:06
extnet/Ext.NET
https://api.github.com/repos/extnet/Ext.NET
closed
IE9: dragging to a TextField over existing text is indicated as invalid
2.x 3.x 4.x defect review-after-extjs-upgrade sencha sencha-disclaim
http://forums.ext.net/showthread.php?23811 http://www.sencha.com/forum/showthread.php?258150 **Update:** Issue still open after ExtJS 6.0.1 release.
1.0
IE9: dragging to a TextField over existing text is indicated as invalid - http://forums.ext.net/showthread.php?23811 http://www.sencha.com/forum/showthread.php?258150 **Update:** Issue still open after ExtJS 6.0.1 release.
defect
dragging to a textfield over existing text is indicated as invalid update issue still open after extjs release
1
273,242
29,820,262,844
IssuesEvent
2023-06-17 01:17:55
pazhanivel07/frameworks_base_2021-0970
https://api.github.com/repos/pazhanivel07/frameworks_base_2021-0970
closed
CVE-2023-21099 (High) detected in multiple libraries - autoclosed
Mend: dependency security vulnerability
## CVE-2023-21099 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>baseandroid-10.0.0_r44</b>, <b>baseandroid-10.0.0_r44</b>, <b>baseandroid-10.0.0_r44</b>, <b>baseandroid-10.0.0_r44</b></p></summary> <p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In multiple methods of PackageInstallerSession.java, there is a possible way to start foreground services from the background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-243377226 <p>Publish Date: 2023-04-19 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-21099>CVE-2023-21099</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://android.googlesource.com/platform/frameworks/base/+/6aba151873bfae198ef9eceb10f943e18b52d58c">https://android.googlesource.com/platform/frameworks/base/+/6aba151873bfae198ef9eceb10f943e18b52d58c</a></p> <p>Release Date: 2023-04-19</p> <p>Fix Resolution: android-13.0.0_r38</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2023-21099 (High) detected in multiple libraries - autoclosed - ## CVE-2023-21099 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>baseandroid-10.0.0_r44</b>, <b>baseandroid-10.0.0_r44</b>, <b>baseandroid-10.0.0_r44</b>, <b>baseandroid-10.0.0_r44</b></p></summary> <p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In multiple methods of PackageInstallerSession.java, there is a possible way to start foreground services from the background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-243377226 <p>Publish Date: 2023-04-19 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-21099>CVE-2023-21099</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://android.googlesource.com/platform/frameworks/base/+/6aba151873bfae198ef9eceb10f943e18b52d58c">https://android.googlesource.com/platform/frameworks/base/+/6aba151873bfae198ef9eceb10f943e18b52d58c</a></p> <p>Release Date: 2023-04-19</p> <p>Fix Resolution: android-13.0.0_r38</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in multiple libraries autoclosed cve high severity vulnerability vulnerable libraries baseandroid baseandroid baseandroid baseandroid vulnerability details in multiple methods of packageinstallersession java there is a possible way to start foreground services from the background due to a logic error in the code this could lead to local escalation of privilege with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with mend
0
76,377
15,495,955,667
IssuesEvent
2021-03-11 01:48:05
kadirselcuk/wp-graphql
https://api.github.com/repos/kadirselcuk/wp-graphql
opened
CVE-2020-15366 (Medium) detected in ajv-6.10.2.tgz, ajv-5.5.2.tgz
security vulnerability
## CVE-2020-15366 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ajv-6.10.2.tgz</b>, <b>ajv-5.5.2.tgz</b></p></summary> <p> <details><summary><b>ajv-6.10.2.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-6.10.2.tgz">https://registry.npmjs.org/ajv/-/ajv-6.10.2.tgz</a></p> <p>Path to dependency file: wp-graphql/src/Admin/GraphiQL/app/package.json</p> <p>Path to vulnerable library: wp-graphql/src/Admin/GraphiQL/app/node_modules/table/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.1.5.tgz (Root Library) - jest-20.0.4.tgz - jest-cli-20.0.4.tgz - jest-environment-jsdom-20.0.3.tgz - jsdom-9.12.0.tgz - request-2.88.0.tgz - har-validator-5.1.3.tgz - :x: **ajv-6.10.2.tgz** (Vulnerable Library) </details> <details><summary><b>ajv-5.5.2.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-5.5.2.tgz">https://registry.npmjs.org/ajv/-/ajv-5.5.2.tgz</a></p> <p>Path to dependency file: wp-graphql/src/Admin/GraphiQL/app/package.json</p> <p>Path to vulnerable library: wp-graphql/src/Admin/GraphiQL/app/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.1.5.tgz (Root Library) - eslint-4.10.0.tgz - :x: **ajv-5.5.2.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.) <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15366>CVE-2020-15366</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/ajv-validator/ajv/releases/tag/v6.12.3">https://github.com/ajv-validator/ajv/releases/tag/v6.12.3</a></p> <p>Release Date: 2020-07-15</p> <p>Fix Resolution: ajv - 6.12.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-15366 (Medium) detected in ajv-6.10.2.tgz, ajv-5.5.2.tgz - ## CVE-2020-15366 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ajv-6.10.2.tgz</b>, <b>ajv-5.5.2.tgz</b></p></summary> <p> <details><summary><b>ajv-6.10.2.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-6.10.2.tgz">https://registry.npmjs.org/ajv/-/ajv-6.10.2.tgz</a></p> <p>Path to dependency file: wp-graphql/src/Admin/GraphiQL/app/package.json</p> <p>Path to vulnerable library: wp-graphql/src/Admin/GraphiQL/app/node_modules/table/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.1.5.tgz (Root Library) - jest-20.0.4.tgz - jest-cli-20.0.4.tgz - jest-environment-jsdom-20.0.3.tgz - jsdom-9.12.0.tgz - request-2.88.0.tgz - har-validator-5.1.3.tgz - :x: **ajv-6.10.2.tgz** (Vulnerable Library) </details> <details><summary><b>ajv-5.5.2.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-5.5.2.tgz">https://registry.npmjs.org/ajv/-/ajv-5.5.2.tgz</a></p> <p>Path to dependency file: wp-graphql/src/Admin/GraphiQL/app/package.json</p> <p>Path to vulnerable library: wp-graphql/src/Admin/GraphiQL/app/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.1.5.tgz (Root Library) - eslint-4.10.0.tgz - :x: **ajv-5.5.2.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.) <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15366>CVE-2020-15366</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/ajv-validator/ajv/releases/tag/v6.12.3">https://github.com/ajv-validator/ajv/releases/tag/v6.12.3</a></p> <p>Release Date: 2020-07-15</p> <p>Fix Resolution: ajv - 6.12.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve medium detected in ajv tgz ajv tgz cve medium severity vulnerability vulnerable libraries ajv tgz ajv tgz ajv tgz another json schema validator library home page a href path to dependency file wp graphql src admin graphiql app package json path to vulnerable library wp graphql src admin graphiql app node modules table node modules ajv package json dependency hierarchy react scripts tgz root library jest tgz jest cli tgz jest environment jsdom tgz jsdom tgz request tgz har validator tgz x ajv tgz vulnerable library ajv tgz another json schema validator library home page a href path to dependency file wp graphql src admin graphiql app package json path to vulnerable library wp graphql src admin graphiql app node modules ajv package json dependency hierarchy react scripts tgz root library eslint tgz x ajv tgz vulnerable library found in base branch master vulnerability details an issue was discovered in ajv validate in ajv aka another json schema validator a carefully crafted json schema could be provided that allows execution of other code by prototype pollution while untrusted schemas are recommended against the worst case of an untrusted schema should be a denial of service not execution of code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ajv step up your open source security game with whitesource
0
74,135
24,964,566,818
IssuesEvent
2022-11-01 18:15:01
matrix-org/matrix-hookshot
https://api.github.com/repos/matrix-org/matrix-hookshot
closed
Inconsistent casing in GitLab project connection state keys
T-Defect GitLab
This is the same problem as #509, but for GitLab project connections. This also prevents GitLab project connections from working if set up via the widget / provisioning API, as long as the project path contains a capital letter.
1.0
Inconsistent casing in GitLab project connection state keys - This is the same problem as #509, but for GitLab project connections. This also prevents GitLab project connections from working if set up via the widget / provisioning API, as long as the project path contains a capital letter.
defect
inconsistent casing in gitlab project connection state keys this is the same problem as but for gitlab project connections this also prevents gitlab project connections from working if set up via the widget provisioning api as long as the project path contains a capital letter
1
116,341
24,900,630,606
IssuesEvent
2022-10-28 20:27:30
zcash/zcash
https://api.github.com/repos/zcash/zcash
closed
Add ``--debug=libsnark-profiling`` option.
Zcash codebase I-performance A-testing in 1.0 special to Nathan usability
Here's the runtime config of libsnark profiling in my latest review (public alpha branch) that can be the starting point: https://github.com/Electric-Coin-Company/zcash/commit/4200e0d3d373a8c034bab641732d54b57c606a5d#commitcomment-15441534
1.0
Add ``--debug=libsnark-profiling`` option. - Here's the runtime config of libsnark profiling in my latest review (public alpha branch) that can be the starting point: https://github.com/Electric-Coin-Company/zcash/commit/4200e0d3d373a8c034bab641732d54b57c606a5d#commitcomment-15441534
non_defect
add debug libsnark profiling option here s the runtime config of libsnark profiling in my latest review public alpha branch that can be the starting point
0
188,079
6,768,115,786
IssuesEvent
2017-10-26 07:36:21
bounswe/bounswe2017group10
https://api.github.com/repos/bounswe/bounswe2017group10
closed
Android cloudinary wrong image shown in Feed
Android Bug Report High-priority
Order of the images that are uploaded to cloudinary are wrong.
1.0
Android cloudinary wrong image shown in Feed - Order of the images that are uploaded to cloudinary are wrong.
non_defect
android cloudinary wrong image shown in feed order of the images that are uploaded to cloudinary are wrong
0
78,181
27,359,228,561
IssuesEvent
2023-02-27 14:51:02
vector-im/element-ios
https://api.github.com/repos/vector-im/element-ios
opened
Use theme colors in rounded buttons disabled state
T-Defect
### Steps to reproduce Some rounded buttons doesn't use color from theme in Disabled state. In some views, the green color of the button's labels is hard-coded into storyboards. TODO : define title color for Disabled state from theme in RoundedButton.updateButtonStyle method. ### Outcome oppmo ### Your phone model _No response_ ### Operating system version _No response_ ### Application version _No response_ ### Homeserver _No response_ ### Will you send logs? Yes
1.0
Use theme colors in rounded buttons disabled state - ### Steps to reproduce Some rounded buttons doesn't use color from theme in Disabled state. In some views, the green color of the button's labels is hard-coded into storyboards. TODO : define title color for Disabled state from theme in RoundedButton.updateButtonStyle method. ### Outcome oppmo ### Your phone model _No response_ ### Operating system version _No response_ ### Application version _No response_ ### Homeserver _No response_ ### Will you send logs? Yes
defect
use theme colors in rounded buttons disabled state steps to reproduce some rounded buttons doesn t use color from theme in disabled state in some views the green color of the button s labels is hard coded into storyboards todo define title color for disabled state from theme in roundedbutton updatebuttonstyle method outcome oppmo your phone model no response operating system version no response application version no response homeserver no response will you send logs yes
1
68,897
9,220,003,942
IssuesEvent
2019-03-11 16:32:45
Paula204/ISPP
https://api.github.com/repos/Paula204/ISPP
closed
Editar mockups y crear vídeo
documentation high
Editar los mockups: - Añadir ubicación - Menos texto - Mejorar visualmente Crear vídeo interactivo: - Rápido y visual
1.0
Editar mockups y crear vídeo - Editar los mockups: - Añadir ubicación - Menos texto - Mejorar visualmente Crear vídeo interactivo: - Rápido y visual
non_defect
editar mockups y crear vídeo editar los mockups añadir ubicación menos texto mejorar visualmente crear vídeo interactivo rápido y visual
0
232,053
18,841,785,397
IssuesEvent
2021-11-11 10:24:32
mozilla-mobile/fenix
https://api.github.com/repos/mozilla-mobile/fenix
reopened
Intermittent UI test failure - < SmokeTest.editCustomSearchEngineTest >
eng:intermittent-test eng:ui-test
### Firebase Test Run: https://console.firebase.google.com/project/moz-fenix/testlab/histories/bh.66b7091e15d53d45/matrices/9223008020099075063/executions/bs.38fc48eea92dfdb7/testcases/1/test-cases ### Stacktrace: `java.lang.AssertionError at org.junit.Assert.fail(Assert.java:87) at org.junit.Assert.assertTrue(Assert.java:42) at org.junit.Assert.assertTrue(Assert.java:53) at org.mozilla.fenix.ui.robots.SettingsSubMenuSearchRobot.saveEditSearchEngine(SettingsSubMenuSearchRobot.kt:140) at org.mozilla.fenix.ui.SmokeTest$editCustomSearchEngineTest$4.invoke(SmokeTest.kt:571) at org.mozilla.fenix.ui.SmokeTest$editCustomSearchEngineTest$4.invoke(SmokeTest.kt:563) at org.mozilla.fenix.ui.robots.SettingsRobot$Transition.openSearchSubMenu(SettingsRobot.kt:136) at org.mozilla.fenix.ui.SmokeTest.editCustomSearchEngineTest(SmokeTest.kt:563)` ### Build: Debug 11/2 Started with https://github.com/mozilla-mobile/fenix/pull/22244
2.0
Intermittent UI test failure - < SmokeTest.editCustomSearchEngineTest > - ### Firebase Test Run: https://console.firebase.google.com/project/moz-fenix/testlab/histories/bh.66b7091e15d53d45/matrices/9223008020099075063/executions/bs.38fc48eea92dfdb7/testcases/1/test-cases ### Stacktrace: `java.lang.AssertionError at org.junit.Assert.fail(Assert.java:87) at org.junit.Assert.assertTrue(Assert.java:42) at org.junit.Assert.assertTrue(Assert.java:53) at org.mozilla.fenix.ui.robots.SettingsSubMenuSearchRobot.saveEditSearchEngine(SettingsSubMenuSearchRobot.kt:140) at org.mozilla.fenix.ui.SmokeTest$editCustomSearchEngineTest$4.invoke(SmokeTest.kt:571) at org.mozilla.fenix.ui.SmokeTest$editCustomSearchEngineTest$4.invoke(SmokeTest.kt:563) at org.mozilla.fenix.ui.robots.SettingsRobot$Transition.openSearchSubMenu(SettingsRobot.kt:136) at org.mozilla.fenix.ui.SmokeTest.editCustomSearchEngineTest(SmokeTest.kt:563)` ### Build: Debug 11/2 Started with https://github.com/mozilla-mobile/fenix/pull/22244
non_defect
intermittent ui test failure firebase test run stacktrace java lang assertionerror at org junit assert fail assert java at org junit assert asserttrue assert java at org junit assert asserttrue assert java at org mozilla fenix ui robots settingssubmenusearchrobot saveeditsearchengine settingssubmenusearchrobot kt at org mozilla fenix ui smoketest editcustomsearchenginetest invoke smoketest kt at org mozilla fenix ui smoketest editcustomsearchenginetest invoke smoketest kt at org mozilla fenix ui robots settingsrobot transition opensearchsubmenu settingsrobot kt at org mozilla fenix ui smoketest editcustomsearchenginetest smoketest kt build debug started with
0
1,426
16,017,783,396
IssuesEvent
2021-04-20 18:16:28
Azure/azure-sdk-for-java
https://api.github.com/repos/Azure/azure-sdk-for-java
opened
Log only what we need in INFO (too much logging by default)
Azure.Core amqp tenet-reliability
* customers report that our logging is actually too detailed right now. * should we have an aka.ms link to a FAQ that also has info on how to collect enough data for a bug report?
True
Log only what we need in INFO (too much logging by default) - * customers report that our logging is actually too detailed right now. * should we have an aka.ms link to a FAQ that also has info on how to collect enough data for a bug report?
non_defect
log only what we need in info too much logging by default customers report that our logging is actually too detailed right now should we have an aka ms link to a faq that also has info on how to collect enough data for a bug report
0
610,956
18,941,072,884
IssuesEvent
2021-11-18 02:58:46
MaibornWolff/codecharta
https://api.github.com/repos/MaibornWolff/codecharta
closed
Remove non-functional buttons
bug help wanted pr-visualization priority:medium difficulty:low good first issue
# Bug ## Expected Behavior GIVEN a open map with the building/file panel being open WHEN hovering above the building/file title THEN there's no hover button visible in case there's no link ## Actual Behavior A hovering effect is visible due to the element being a button instead of a title. ## Screenshots ![image](https://user-images.githubusercontent.com/8822573/140730748-938ba525-10db-4b1c-b323-a9dcd57b7b65.png) ## Specifications - is released in [online-demo](https://maibornwolff.github.io/codecharta/visualization/app/index.html?file=codecharta.cc.json&file=codecharta_analysis.cc.json): yes | no - CodeCharta Version: 1.82.0 - OS: all - Browser: all
1.0
Remove non-functional buttons - # Bug ## Expected Behavior GIVEN a open map with the building/file panel being open WHEN hovering above the building/file title THEN there's no hover button visible in case there's no link ## Actual Behavior A hovering effect is visible due to the element being a button instead of a title. ## Screenshots ![image](https://user-images.githubusercontent.com/8822573/140730748-938ba525-10db-4b1c-b323-a9dcd57b7b65.png) ## Specifications - is released in [online-demo](https://maibornwolff.github.io/codecharta/visualization/app/index.html?file=codecharta.cc.json&file=codecharta_analysis.cc.json): yes | no - CodeCharta Version: 1.82.0 - OS: all - Browser: all
non_defect
remove non functional buttons bug expected behavior given a open map with the building file panel being open when hovering above the building file title then there s no hover button visible in case there s no link actual behavior a hovering effect is visible due to the element being a button instead of a title screenshots specifications is released in yes no codecharta version os all browser all
0
341,992
24,724,388,710
IssuesEvent
2022-10-20 13:07:27
cemkurtoglu/Personalized_healthcare_system_for_neurodegenerative_diseases
https://api.github.com/repos/cemkurtoglu/Personalized_healthcare_system_for_neurodegenerative_diseases
closed
Gantt Chart Creation and Github project setup
documentation preparation
Create a Gantt chart in order to track your progress efficiently. Use excel or a similar application. Once this task is complete update Milestones in the GitHub repo and assigns issues to these milestones.
1.0
Gantt Chart Creation and Github project setup - Create a Gantt chart in order to track your progress efficiently. Use excel or a similar application. Once this task is complete update Milestones in the GitHub repo and assigns issues to these milestones.
non_defect
gantt chart creation and github project setup create a gantt chart in order to track your progress efficiently use excel or a similar application once this task is complete update milestones in the github repo and assigns issues to these milestones
0
615,457
19,255,520,834
IssuesEvent
2021-12-09 10:50:49
googleapis/java-dlp
https://api.github.com/repos/googleapis/java-dlp
closed
dlp.snippets.JobsTests: testListJobs failed
type: bug priority: p1 api: dlp flakybot: issue
Note: #638 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky. ---- commit: 2d9d3c196041ff038051a357778f34d22d90fdf5 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/92875462-f70a-4e1b-9ea7-9edff369a08f), [Sponge](http://sponge2/92875462-f70a-4e1b-9ea7-9edff369a08f) status: failed <details><summary>Test output</summary><br><pre>com.google.api.gax.rpc.PermissionDeniedException: io.grpc.StatusRuntimeException: PERMISSION_DENIED: Not allowed, access denied for permission dlp.jobs.list. at com.google.api.gax.rpc.ApiExceptionFactory.createException(ApiExceptionFactory.java:53) at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:72) at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:60) at com.google.api.gax.grpc.GrpcExceptionCallable$ExceptionTransformingFuture.onFailure(GrpcExceptionCallable.java:97) at com.google.api.core.ApiFutures$1.onFailure(ApiFutures.java:68) at com.google.common.util.concurrent.Futures$CallbackListener.run(Futures.java:1133) at com.google.common.util.concurrent.DirectExecutor.execute(DirectExecutor.java:31) at com.google.common.util.concurrent.AbstractFuture.executeListener(AbstractFuture.java:1277) at com.google.common.util.concurrent.AbstractFuture.complete(AbstractFuture.java:1038) at com.google.common.util.concurrent.AbstractFuture.setException(AbstractFuture.java:808) at io.grpc.stub.ClientCalls$GrpcFuture.setException(ClientCalls.java:564) at io.grpc.stub.ClientCalls$UnaryStreamToFuture.onClose(ClientCalls.java:534) at io.grpc.internal.DelayedClientCall$DelayedListener$3.run(DelayedClientCall.java:463) at io.grpc.internal.DelayedClientCall$DelayedListener.delayOrExecute(DelayedClientCall.java:427) at io.grpc.internal.DelayedClientCall$DelayedListener.onClose(DelayedClientCall.java:460) at io.grpc.internal.ClientCallImpl.closeObserver(ClientCallImpl.java:562) at io.grpc.internal.ClientCallImpl.access$300(ClientCallImpl.java:70) at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInternal(ClientCallImpl.java:743) at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInContext(ClientCallImpl.java:722) at io.grpc.internal.ContextRunnable.run(ContextRunnable.java:37) at io.grpc.internal.SerializingExecutor.run(SerializingExecutor.java:133) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at java.lang.Thread.run(Thread.java:748) Suppressed: com.google.api.gax.rpc.AsyncTaskException: Asynchronous task failed at com.google.api.gax.rpc.ApiExceptions.callAndTranslateApiException(ApiExceptions.java:57) at com.google.api.gax.rpc.UnaryCallable.call(UnaryCallable.java:112) at com.google.cloud.dlp.v2.DlpServiceClient.listDlpJobs(DlpServiceClient.java:3725) at dlp.snippets.JobsList.listJobs(JobsList.java:55) at dlp.snippets.JobsTests.testListJobs(JobsTests.java:110) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:364) at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:272) at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:237) at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:158) at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:428) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:162) at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:562) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:548) Caused by: io.grpc.StatusRuntimeException: PERMISSION_DENIED: Not allowed, access denied for permission dlp.jobs.list. at io.grpc.Status.asRuntimeException(Status.java:535) ... 13 more </pre></details>
1.0
dlp.snippets.JobsTests: testListJobs failed - Note: #638 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky. ---- commit: 2d9d3c196041ff038051a357778f34d22d90fdf5 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/92875462-f70a-4e1b-9ea7-9edff369a08f), [Sponge](http://sponge2/92875462-f70a-4e1b-9ea7-9edff369a08f) status: failed <details><summary>Test output</summary><br><pre>com.google.api.gax.rpc.PermissionDeniedException: io.grpc.StatusRuntimeException: PERMISSION_DENIED: Not allowed, access denied for permission dlp.jobs.list. at com.google.api.gax.rpc.ApiExceptionFactory.createException(ApiExceptionFactory.java:53) at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:72) at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:60) at com.google.api.gax.grpc.GrpcExceptionCallable$ExceptionTransformingFuture.onFailure(GrpcExceptionCallable.java:97) at com.google.api.core.ApiFutures$1.onFailure(ApiFutures.java:68) at com.google.common.util.concurrent.Futures$CallbackListener.run(Futures.java:1133) at com.google.common.util.concurrent.DirectExecutor.execute(DirectExecutor.java:31) at com.google.common.util.concurrent.AbstractFuture.executeListener(AbstractFuture.java:1277) at com.google.common.util.concurrent.AbstractFuture.complete(AbstractFuture.java:1038) at com.google.common.util.concurrent.AbstractFuture.setException(AbstractFuture.java:808) at io.grpc.stub.ClientCalls$GrpcFuture.setException(ClientCalls.java:564) at io.grpc.stub.ClientCalls$UnaryStreamToFuture.onClose(ClientCalls.java:534) at io.grpc.internal.DelayedClientCall$DelayedListener$3.run(DelayedClientCall.java:463) at io.grpc.internal.DelayedClientCall$DelayedListener.delayOrExecute(DelayedClientCall.java:427) at io.grpc.internal.DelayedClientCall$DelayedListener.onClose(DelayedClientCall.java:460) at io.grpc.internal.ClientCallImpl.closeObserver(ClientCallImpl.java:562) at io.grpc.internal.ClientCallImpl.access$300(ClientCallImpl.java:70) at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInternal(ClientCallImpl.java:743) at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInContext(ClientCallImpl.java:722) at io.grpc.internal.ContextRunnable.run(ContextRunnable.java:37) at io.grpc.internal.SerializingExecutor.run(SerializingExecutor.java:133) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at java.lang.Thread.run(Thread.java:748) Suppressed: com.google.api.gax.rpc.AsyncTaskException: Asynchronous task failed at com.google.api.gax.rpc.ApiExceptions.callAndTranslateApiException(ApiExceptions.java:57) at com.google.api.gax.rpc.UnaryCallable.call(UnaryCallable.java:112) at com.google.cloud.dlp.v2.DlpServiceClient.listDlpJobs(DlpServiceClient.java:3725) at dlp.snippets.JobsList.listJobs(JobsList.java:55) at dlp.snippets.JobsTests.testListJobs(JobsTests.java:110) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:364) at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:272) at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:237) at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:158) at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:428) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:162) at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:562) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:548) Caused by: io.grpc.StatusRuntimeException: PERMISSION_DENIED: Not allowed, access denied for permission dlp.jobs.list. at io.grpc.Status.asRuntimeException(Status.java:535) ... 13 more </pre></details>
non_defect
dlp snippets jobstests testlistjobs failed note was also for this test but it was closed more than days ago so i didn t mark it flaky commit buildurl status failed test output com google api gax rpc permissiondeniedexception io grpc statusruntimeexception permission denied not allowed access denied for permission dlp jobs list at com google api gax rpc apiexceptionfactory createexception apiexceptionfactory java at com google api gax grpc grpcapiexceptionfactory create grpcapiexceptionfactory java at com google api gax grpc grpcapiexceptionfactory create grpcapiexceptionfactory java at com google api gax grpc grpcexceptioncallable exceptiontransformingfuture onfailure grpcexceptioncallable java at com google api core apifutures onfailure apifutures java at com google common util concurrent futures callbacklistener run futures java at com google common util concurrent directexecutor execute directexecutor java at com google common util concurrent abstractfuture executelistener abstractfuture java at com google common util concurrent abstractfuture complete abstractfuture java at com google common util concurrent abstractfuture setexception abstractfuture java at io grpc stub clientcalls grpcfuture setexception clientcalls java at io grpc stub clientcalls unarystreamtofuture onclose clientcalls java at io grpc internal delayedclientcall delayedlistener run delayedclientcall java at io grpc internal delayedclientcall delayedlistener delayorexecute delayedclientcall java at io grpc internal delayedclientcall delayedlistener onclose delayedclientcall java at io grpc internal clientcallimpl closeobserver clientcallimpl java at io grpc internal clientcallimpl access clientcallimpl java at io grpc internal clientcallimpl clientstreamlistenerimpl runinternal clientcallimpl java at io grpc internal clientcallimpl clientstreamlistenerimpl runincontext clientcallimpl java at io grpc internal contextrunnable run contextrunnable java at io grpc internal serializingexecutor run serializingexecutor java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java suppressed com google api gax rpc asynctaskexception asynchronous task failed at com google api gax rpc apiexceptions callandtranslateapiexception apiexceptions java at com google api gax rpc unarycallable call unarycallable java at com google cloud dlp dlpserviceclient listdlpjobs dlpserviceclient java at dlp snippets jobslist listjobs jobslist java at dlp snippets jobstests testlistjobs jobstests java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at org junit internal runners statements runbefores evaluate runbefores java at org junit internal runners statements runafters evaluate runafters java at org junit runners parentrunner evaluate parentrunner java at org junit runners evaluate java at org junit runners parentrunner runleaf parentrunner java at org junit runners runchild java at org junit runners runchild java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org apache maven surefire execute java at org apache maven surefire executewithrerun java at org apache maven surefire executetestset java at org apache maven surefire invoke java at org apache maven surefire booter forkedbooter runsuitesinprocess forkedbooter java at org apache maven surefire booter forkedbooter execute forkedbooter java at org apache maven surefire booter forkedbooter run forkedbooter java at org apache maven surefire booter forkedbooter main forkedbooter java caused by io grpc statusruntimeexception permission denied not allowed access denied for permission dlp jobs list at io grpc status asruntimeexception status java more
0
60,843
17,023,537,348
IssuesEvent
2021-07-03 02:32:00
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
closed
Admin Layer Has Background Fill
Component: mapnik Priority: major Resolution: worksforme Type: defect
**[Submitted to the original trac issue database at 3.53pm, Monday, 11th January 2010]** The Admin Boundary for the city of Chandler, AZ has on odd fill pattern that is obscuring all underlying map imagery at zoom levels of 14 or higher. At level 13 or lower the fill is not rendered, so you can see all map data. You can see the problem here: http://www.openstreetmap.org/?lat=33.35224&lon=-111.84764&zoom=15&layers=B000FTF I have compared all of the tags (using Potlatch) of the Boundary to adjacent Tempe, AZ and everything appears to be identical, but Tempe renders fine, and Chandler has this obscuring fill. I don't know if this is a rendering problem, or a tagging problem, but something is clearly wrong.
1.0
Admin Layer Has Background Fill - **[Submitted to the original trac issue database at 3.53pm, Monday, 11th January 2010]** The Admin Boundary for the city of Chandler, AZ has on odd fill pattern that is obscuring all underlying map imagery at zoom levels of 14 or higher. At level 13 or lower the fill is not rendered, so you can see all map data. You can see the problem here: http://www.openstreetmap.org/?lat=33.35224&lon=-111.84764&zoom=15&layers=B000FTF I have compared all of the tags (using Potlatch) of the Boundary to adjacent Tempe, AZ and everything appears to be identical, but Tempe renders fine, and Chandler has this obscuring fill. I don't know if this is a rendering problem, or a tagging problem, but something is clearly wrong.
defect
admin layer has background fill the admin boundary for the city of chandler az has on odd fill pattern that is obscuring all underlying map imagery at zoom levels of or higher at level or lower the fill is not rendered so you can see all map data you can see the problem here i have compared all of the tags using potlatch of the boundary to adjacent tempe az and everything appears to be identical but tempe renders fine and chandler has this obscuring fill i don t know if this is a rendering problem or a tagging problem but something is clearly wrong
1
3,788
2,610,069,054
IssuesEvent
2015-02-26 18:20:15
chrsmith/jsjsj122
https://api.github.com/repos/chrsmith/jsjsj122
opened
黄岩治前列腺炎哪里比较好
auto-migrated Priority-Medium Type-Defect
``` 黄岩治前列腺炎哪里比较好【台州五洲生殖医院】24小时健康 咨询热线:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台 州市椒江区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、1 08、118、198及椒江一金清公交车直达枫南小区,乘坐107、105、 109、112、901、 902公交车到星星广场下车,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 ``` ----- Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 9:13
1.0
黄岩治前列腺炎哪里比较好 - ``` 黄岩治前列腺炎哪里比较好【台州五洲生殖医院】24小时健康 咨询热线:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台 州市椒江区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、1 08、118、198及椒江一金清公交车直达枫南小区,乘坐107、105、 109、112、901、 902公交车到星星广场下车,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 ``` ----- Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 9:13
defect
黄岩治前列腺炎哪里比较好 黄岩治前列腺炎哪里比较好【台州五洲生殖医院】 咨询热线 微信号tzwzszyy 医院地址 台 (枫南大转盘旁)乘车线路 、 、 、 , 、 、 、 、 、 ,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 original issue reported on code google com by poweragr gmail com on may at
1
36,446
6,535,019,371
IssuesEvent
2017-08-31 13:14:24
WeblateOrg/weblate
https://api.github.com/repos/WeblateOrg/weblate
closed
Xliff - multiline source context displayed as one line
documentation
### Steps to reproduce 1. Create Xliff file with multi-line string 2. Import in weblate 3. in Translate UI context source it is displayed as one line With other format - Android XML resource, the source is displayed properly formatted with newlines. Both Android and Xliff are xmml formats. I tried with \n and plain newlines, it's ignored with Xliff. Is Android XML the only format that can be used for multiline strings? (I know Gettext kind of supports it but splits lines into separate strings and requires git hooks to make it work.) Thank you.
1.0
Xliff - multiline source context displayed as one line - ### Steps to reproduce 1. Create Xliff file with multi-line string 2. Import in weblate 3. in Translate UI context source it is displayed as one line With other format - Android XML resource, the source is displayed properly formatted with newlines. Both Android and Xliff are xmml formats. I tried with \n and plain newlines, it's ignored with Xliff. Is Android XML the only format that can be used for multiline strings? (I know Gettext kind of supports it but splits lines into separate strings and requires git hooks to make it work.) Thank you.
non_defect
xliff multiline source context displayed as one line steps to reproduce create xliff file with multi line string import in weblate in translate ui context source it is displayed as one line with other format android xml resource the source is displayed properly formatted with newlines both android and xliff are xmml formats i tried with n and plain newlines it s ignored with xliff is android xml the only format that can be used for multiline strings i know gettext kind of supports it but splits lines into separate strings and requires git hooks to make it work thank you
0
56,250
14,994,816,828
IssuesEvent
2021-01-29 13:28:54
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
UIA-over-SSO leaves you marooned in a "please close this tab" tab
bug defect p1 severity:minor type:sso type:uia
Once UIA-over-SSO completes, you end up stuck in a tab which looks like this: ![image](https://user-images.githubusercontent.com/1389908/105170069-547ec600-5b14-11eb-8dd3-a9db96da7f1c.png)
1.0
UIA-over-SSO leaves you marooned in a "please close this tab" tab - Once UIA-over-SSO completes, you end up stuck in a tab which looks like this: ![image](https://user-images.githubusercontent.com/1389908/105170069-547ec600-5b14-11eb-8dd3-a9db96da7f1c.png)
defect
uia over sso leaves you marooned in a please close this tab tab once uia over sso completes you end up stuck in a tab which looks like this
1
682,642
23,351,181,249
IssuesEvent
2022-08-10 00:13:09
worldmaking/mischmasch
https://api.github.com/repos/worldmaking/mischmasch
closed
run pat2got.js in the mischmasch init() function
Priority: Low
pat2got.js currently needs to be run separately in order to gather all .gendsp files into the mischmasch menu. two goals: - [ ] run pat2got.js during the mischmasch init function - [ ] use a filewatcher on the /code folder, so if any .gendsp files are modified, removed, or added while mischmasch is running, it re-runs the pat2got.js and updates the mischmasch menu.
1.0
run pat2got.js in the mischmasch init() function - pat2got.js currently needs to be run separately in order to gather all .gendsp files into the mischmasch menu. two goals: - [ ] run pat2got.js during the mischmasch init function - [ ] use a filewatcher on the /code folder, so if any .gendsp files are modified, removed, or added while mischmasch is running, it re-runs the pat2got.js and updates the mischmasch menu.
non_defect
run js in the mischmasch init function js currently needs to be run separately in order to gather all gendsp files into the mischmasch menu two goals run js during the mischmasch init function use a filewatcher on the code folder so if any gendsp files are modified removed or added while mischmasch is running it re runs the js and updates the mischmasch menu
0
12,219
2,685,513,053
IssuesEvent
2015-03-30 02:00:05
IssueMigrationTest/Test5
https://api.github.com/repos/IssueMigrationTest/Test5
closed
False alarm on class inheritances
auto-migrated milestone-0.9 Priority-Medium Type-Defect
**Issue by jason.mi...@gmail.com** _14 Jul 2011 at 2:55 GMT_ _Originally opened on Google Code_ ---- ``` SS give a false alarm warning message on the following case. compilation and run are ok Test case: class Father(object): def __init__(self,Age): self.Age = Age def show(self): print self.Age class Son(Father): def __init__(self,Age): Father.__init__(self,Age) def show(self): Father.show(self) a= Father(30) a.show() b = Son(10) b.show() Output: *** SHED SKIN Python-to-C++ Compiler 0.8 *** Copyright 2005-2010 Mark Dufour; License GNU GPL version 3 (See LICENSE) [analyzing types..] ********************************100% [generating c++ code..] *WARNING* test_var1.py:15: class attribute 'show' accessed without using class name ```
1.0
False alarm on class inheritances - **Issue by jason.mi...@gmail.com** _14 Jul 2011 at 2:55 GMT_ _Originally opened on Google Code_ ---- ``` SS give a false alarm warning message on the following case. compilation and run are ok Test case: class Father(object): def __init__(self,Age): self.Age = Age def show(self): print self.Age class Son(Father): def __init__(self,Age): Father.__init__(self,Age) def show(self): Father.show(self) a= Father(30) a.show() b = Son(10) b.show() Output: *** SHED SKIN Python-to-C++ Compiler 0.8 *** Copyright 2005-2010 Mark Dufour; License GNU GPL version 3 (See LICENSE) [analyzing types..] ********************************100% [generating c++ code..] *WARNING* test_var1.py:15: class attribute 'show' accessed without using class name ```
defect
false alarm on class inheritances issue by jason mi gmail com jul at gmt originally opened on google code ss give a false alarm warning message on the following case compilation and run are ok test case class father object def init self age self age age def show self print self age class son father def init self age father init self age def show self father show self a father a show b son b show output shed skin python to c compiler copyright mark dufour license gnu gpl version see license warning test py class attribute show accessed without using class name
1
33,325
7,090,724,382
IssuesEvent
2018-01-12 10:06:31
jOOQ/jOOQ
https://api.github.com/repos/jOOQ/jOOQ
closed
Plain SQL API should recognise multi-character PostgreSQL geometry operators
C: DB: PostgreSQL C: Functionality P: Medium R: Fixed T: Defect
Running this query: ```sql SELECT oprname, oprcode || '(' || format_type(oprleft, NULL::integer) || ', ' || format_type(oprright, NULL::integer) || ')' AS function FROM pg_operator WHERE oprname LIKE '?%'; ``` Yields, on my install: ``` oprname |function | --------|--------------------------------| ?# |path_inter(path, path) | ?# |box_overlap(box, box) | ?- |point_horiz(point, point) | ?| |point_vert(point, point) | ?# |lseg_intersect(lseg, lseg) | ?|| |lseg_parallel(lseg, lseg) | ?-| |lseg_perp(lseg, lseg) | ?- |lseg_horizontal(-, lseg) | ?| |lseg_vertical(-, lseg) | ?# |inter_sl(lseg, line) | ?# |inter_sb(lseg, box) | ?# |inter_lb(line, box) | ?# |line_intersect(line, line) | ?|| |line_parallel(line, line) | ?-| |line_perp(line, line) | ?- |line_horizontal(-, line) | ?| |line_vertical(-, line) | ? |jsonb_exists(jsonb, text) | ?| |jsonb_exists_any(jsonb, text[]) | ?& |jsonb_exists_all(jsonb, text[]) | ? |exist(hstore, text) | ?| |exists_any(hstore, text[]) | ?& |exists_all(hstore, text[]) | ``` So, additional characters to recognise after `?` include `#`, `-`
1.0
Plain SQL API should recognise multi-character PostgreSQL geometry operators - Running this query: ```sql SELECT oprname, oprcode || '(' || format_type(oprleft, NULL::integer) || ', ' || format_type(oprright, NULL::integer) || ')' AS function FROM pg_operator WHERE oprname LIKE '?%'; ``` Yields, on my install: ``` oprname |function | --------|--------------------------------| ?# |path_inter(path, path) | ?# |box_overlap(box, box) | ?- |point_horiz(point, point) | ?| |point_vert(point, point) | ?# |lseg_intersect(lseg, lseg) | ?|| |lseg_parallel(lseg, lseg) | ?-| |lseg_perp(lseg, lseg) | ?- |lseg_horizontal(-, lseg) | ?| |lseg_vertical(-, lseg) | ?# |inter_sl(lseg, line) | ?# |inter_sb(lseg, box) | ?# |inter_lb(line, box) | ?# |line_intersect(line, line) | ?|| |line_parallel(line, line) | ?-| |line_perp(line, line) | ?- |line_horizontal(-, line) | ?| |line_vertical(-, line) | ? |jsonb_exists(jsonb, text) | ?| |jsonb_exists_any(jsonb, text[]) | ?& |jsonb_exists_all(jsonb, text[]) | ? |exist(hstore, text) | ?| |exists_any(hstore, text[]) | ?& |exists_all(hstore, text[]) | ``` So, additional characters to recognise after `?` include `#`, `-`
defect
plain sql api should recognise multi character postgresql geometry operators running this query sql select oprname oprcode format type oprleft null integer format type oprright null integer as function from pg operator where oprname like yields on my install oprname function path inter path path box overlap box box point horiz point point point vert point point lseg intersect lseg lseg lseg parallel lseg lseg lseg perp lseg lseg lseg horizontal lseg lseg vertical lseg inter sl lseg line inter sb lseg box inter lb line box line intersect line line line parallel line line line perp line line line horizontal line line vertical line jsonb exists jsonb text jsonb exists any jsonb text jsonb exists all jsonb text exist hstore text exists any hstore text exists all hstore text so additional characters to recognise after include
1
21,616
3,525,845,227
IssuesEvent
2016-01-14 00:24:43
gadLinux/hibernate-generic-dao
https://api.github.com/repos/gadLinux/hibernate-generic-dao
closed
Sample Project hibernate-maven-web does nut run under jetty (?)
auto-migrated Priority-Medium Type-Defect
``` What did I do? checkout out the project build it via "mvn clean install" deployed *.war on a local jetty server (jetty version: 9.0.7) caused this Exception: 2013-11-18 14:06:11.604:INFO:oejdp.ScanningAppProvider:main: Deployment monitor [file:/opt/jetty-distribution-9.0.7.v 20131107/webapps/] at interval 1 2013-11-18 14:06:14.212:WARN:oejuc.AbstractLifeCycle:main: FAILED org.eclipse.jetty.security.ConstraintSecurityHandle r@6d20c359: java.lang.IllegalStateException: No LoginService for org.eclipse.jetty.security.authentication.BasicAuthe nticator@300c2443 in org.eclipse.jetty.security.ConstraintSecurityHandler@6d20c359 java.lang.IllegalStateException: No LoginService for org.eclipse.jetty.security.authentication.BasicAuthenticator@300 c2443 in org.eclipse.jetty.security.ConstraintSecurityHandler@6d20c359 at org.eclipse.jetty.security.authentication.LoginAuthenticator.setConfiguration(LoginAuthenticator.java:67) at org.eclipse.jetty.security.SecurityHandler.doStart(SecurityHandler.java:375) at org.eclipse.jetty.security.ConstraintSecurityHandler.doStart(ConstraintSecurityHandler.java:457) at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69) at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:118) at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:100) at org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:60) at org.eclipse.jetty.server.handler.ScopedHandler.doStart(ScopedHandler.java:115) at org.eclipse.jetty.server.session.SessionHandler.doStart(SessionHandler.java:106) at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69) at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:118) at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:100) at org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:60) at org.eclipse.jetty.server.handler.ScopedHandler.doStart(ScopedHandler.java:115) at org.eclipse.jetty.server.handler.ContextHandler.startContext(ContextHandler.java:773) at org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:284) at org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1322) at org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:732) at org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:490) at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69) at org.eclipse.jetty.deploy.bindings.StandardStarter.processBinding(StandardStarter.java:41) at org.eclipse.jetty.deploy.AppLifeCycle.runBindings(AppLifeCycle.java:186) at org.eclipse.jetty.deploy.DeploymentManager.requestAppGoal(DeploymentManager.java:495) at org.eclipse.jetty.deploy.DeploymentManager.addApp(DeploymentManager.java:146) at org.eclipse.jetty.deploy.providers.ScanningAppProvider.fileAdded(ScanningAppProvider.java:175) at org.eclipse.jetty.deploy.providers.ScanningAppProvider$1.fileAdded(ScanningAppProvider.java:64) at org.eclipse.jetty.util.Scanner.reportAddition(Scanner.java:605) at org.eclipse.jetty.util.Scanner.reportDifferences(Scanner.java:528) at org.eclipse.jetty.util.Scanner.scan(Scanner.java:391) at org.eclipse.jetty.util.Scanner.doStart(Scanner.java:313) at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69) at org.eclipse.jetty.deploy.providers.ScanningAppProvider.doStart(ScanningAppProvider.java:145) at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69) at org.eclipse.jetty.deploy.DeploymentManager.startAppProvider(DeploymentManager.java:557) at org.eclipse.jetty.deploy.DeploymentManager.doStart(DeploymentManager.java:232) at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69) at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:118) at org.eclipse.jetty.server.Server.start(Server.java:342) at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:100) Possible solution, at least does it work in my case: Disabling the login-config section in the web.xml which is in the sample project. ``` Original issue reported on code.google.com by `phillip....@gmail.com` on 18 Nov 2013 at 1:14
1.0
Sample Project hibernate-maven-web does nut run under jetty (?) - ``` What did I do? checkout out the project build it via "mvn clean install" deployed *.war on a local jetty server (jetty version: 9.0.7) caused this Exception: 2013-11-18 14:06:11.604:INFO:oejdp.ScanningAppProvider:main: Deployment monitor [file:/opt/jetty-distribution-9.0.7.v 20131107/webapps/] at interval 1 2013-11-18 14:06:14.212:WARN:oejuc.AbstractLifeCycle:main: FAILED org.eclipse.jetty.security.ConstraintSecurityHandle r@6d20c359: java.lang.IllegalStateException: No LoginService for org.eclipse.jetty.security.authentication.BasicAuthe nticator@300c2443 in org.eclipse.jetty.security.ConstraintSecurityHandler@6d20c359 java.lang.IllegalStateException: No LoginService for org.eclipse.jetty.security.authentication.BasicAuthenticator@300 c2443 in org.eclipse.jetty.security.ConstraintSecurityHandler@6d20c359 at org.eclipse.jetty.security.authentication.LoginAuthenticator.setConfiguration(LoginAuthenticator.java:67) at org.eclipse.jetty.security.SecurityHandler.doStart(SecurityHandler.java:375) at org.eclipse.jetty.security.ConstraintSecurityHandler.doStart(ConstraintSecurityHandler.java:457) at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69) at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:118) at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:100) at org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:60) at org.eclipse.jetty.server.handler.ScopedHandler.doStart(ScopedHandler.java:115) at org.eclipse.jetty.server.session.SessionHandler.doStart(SessionHandler.java:106) at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69) at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:118) at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:100) at org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:60) at org.eclipse.jetty.server.handler.ScopedHandler.doStart(ScopedHandler.java:115) at org.eclipse.jetty.server.handler.ContextHandler.startContext(ContextHandler.java:773) at org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:284) at org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1322) at org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:732) at org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:490) at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69) at org.eclipse.jetty.deploy.bindings.StandardStarter.processBinding(StandardStarter.java:41) at org.eclipse.jetty.deploy.AppLifeCycle.runBindings(AppLifeCycle.java:186) at org.eclipse.jetty.deploy.DeploymentManager.requestAppGoal(DeploymentManager.java:495) at org.eclipse.jetty.deploy.DeploymentManager.addApp(DeploymentManager.java:146) at org.eclipse.jetty.deploy.providers.ScanningAppProvider.fileAdded(ScanningAppProvider.java:175) at org.eclipse.jetty.deploy.providers.ScanningAppProvider$1.fileAdded(ScanningAppProvider.java:64) at org.eclipse.jetty.util.Scanner.reportAddition(Scanner.java:605) at org.eclipse.jetty.util.Scanner.reportDifferences(Scanner.java:528) at org.eclipse.jetty.util.Scanner.scan(Scanner.java:391) at org.eclipse.jetty.util.Scanner.doStart(Scanner.java:313) at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69) at org.eclipse.jetty.deploy.providers.ScanningAppProvider.doStart(ScanningAppProvider.java:145) at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69) at org.eclipse.jetty.deploy.DeploymentManager.startAppProvider(DeploymentManager.java:557) at org.eclipse.jetty.deploy.DeploymentManager.doStart(DeploymentManager.java:232) at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69) at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:118) at org.eclipse.jetty.server.Server.start(Server.java:342) at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:100) Possible solution, at least does it work in my case: Disabling the login-config section in the web.xml which is in the sample project. ``` Original issue reported on code.google.com by `phillip....@gmail.com` on 18 Nov 2013 at 1:14
defect
sample project hibernate maven web does nut run under jetty what did i do checkout out the project build it via mvn clean install deployed war on a local jetty server jetty version caused this exception info oejdp scanningappprovider main deployment monitor file opt jetty distribution v webapps at interval warn oejuc abstractlifecycle main failed org eclipse jetty security constraintsecurityhandle r java lang illegalstateexception no loginservice for org eclipse jetty security authentication basicauthe nticator in org eclipse jetty security constraintsecurityhandler java lang illegalstateexception no loginservice for org eclipse jetty security authentication basicauthenticator in org eclipse jetty security constraintsecurityhandler at org eclipse jetty security authentication loginauthenticator setconfiguration loginauthenticator java at org eclipse jetty security securityhandler dostart securityhandler java at org eclipse jetty security constraintsecurityhandler dostart constraintsecurityhandler java at org eclipse jetty util component abstractlifecycle start abstractlifecycle java at org eclipse jetty util component containerlifecycle start containerlifecycle java at org eclipse jetty util component containerlifecycle dostart containerlifecycle java at org eclipse jetty server handler abstracthandler dostart abstracthandler java at org eclipse jetty server handler scopedhandler dostart scopedhandler java at org eclipse jetty server session sessionhandler dostart sessionhandler java at org eclipse jetty util component abstractlifecycle start abstractlifecycle java at org eclipse jetty util component containerlifecycle start containerlifecycle java at org eclipse jetty util component containerlifecycle dostart containerlifecycle java at org eclipse jetty server handler abstracthandler dostart abstracthandler java at org eclipse jetty server handler scopedhandler dostart scopedhandler java at org eclipse jetty server handler contexthandler startcontext contexthandler java at org eclipse jetty servlet servletcontexthandler startcontext servletcontexthandler java at org eclipse jetty webapp webappcontext startcontext webappcontext java at org eclipse jetty server handler contexthandler dostart contexthandler java at org eclipse jetty webapp webappcontext dostart webappcontext java at org eclipse jetty util component abstractlifecycle start abstractlifecycle java at org eclipse jetty deploy bindings standardstarter processbinding standardstarter java at org eclipse jetty deploy applifecycle runbindings applifecycle java at org eclipse jetty deploy deploymentmanager requestappgoal deploymentmanager java at org eclipse jetty deploy deploymentmanager addapp deploymentmanager java at org eclipse jetty deploy providers scanningappprovider fileadded scanningappprovider java at org eclipse jetty deploy providers scanningappprovider fileadded scanningappprovider java at org eclipse jetty util scanner reportaddition scanner java at org eclipse jetty util scanner reportdifferences scanner java at org eclipse jetty util scanner scan scanner java at org eclipse jetty util scanner dostart scanner java at org eclipse jetty util component abstractlifecycle start abstractlifecycle java at org eclipse jetty deploy providers scanningappprovider dostart scanningappprovider java at org eclipse jetty util component abstractlifecycle start abstractlifecycle java at org eclipse jetty deploy deploymentmanager startappprovider deploymentmanager java at org eclipse jetty deploy deploymentmanager dostart deploymentmanager java at org eclipse jetty util component abstractlifecycle start abstractlifecycle java at org eclipse jetty util component containerlifecycle start containerlifecycle java at org eclipse jetty server server start server java at org eclipse jetty util component containerlifecycle dostart containerlifecycle java possible solution at least does it work in my case disabling the login config section in the web xml which is in the sample project original issue reported on code google com by phillip gmail com on nov at
1
22,387
3,642,228,491
IssuesEvent
2016-02-14 06:05:03
BOINC/boinc
https://api.github.com/repos/BOINC/boinc
closed
Installer Executable Copyright is outdated.
C: Client - Setup P: Trivial R: fixed T: Defect
**Reported by JacobKlein on 5 Aug 41245248 20:53 UTC** If I right-click the Installer Executable in Windows, and go to the Details tab, and look at the "Copyright" property... Version 6.10.58 says:[(C) 2004 University of California at Version 6.12.19 says:[[BR]([BR]]Copyright)]Copyright (C) 2004 University of California at Berkeley. All Rights Reserved. I'm betting they're different because of some string parsing fix in the 6.12 builds, but still, the copyright is not correct. I expect to see the same copyright info that's located at Help -> About BOINC Manager... specifically:[[BR]](C) 2003-2011 University of California, Berkeley. All Rights Reserved. ''Can the installer copyright be updated?'' ''Also, and more preferably, is there a way to link these so that the Copyright information is the same for Help -> About BOINC Manager.. and for the Installer?'' Migrated-From: http://boinc.berkeley.edu/trac/ticket/1060
1.0
Installer Executable Copyright is outdated. - **Reported by JacobKlein on 5 Aug 41245248 20:53 UTC** If I right-click the Installer Executable in Windows, and go to the Details tab, and look at the "Copyright" property... Version 6.10.58 says:[(C) 2004 University of California at Version 6.12.19 says:[[BR]([BR]]Copyright)]Copyright (C) 2004 University of California at Berkeley. All Rights Reserved. I'm betting they're different because of some string parsing fix in the 6.12 builds, but still, the copyright is not correct. I expect to see the same copyright info that's located at Help -> About BOINC Manager... specifically:[[BR]](C) 2003-2011 University of California, Berkeley. All Rights Reserved. ''Can the installer copyright be updated?'' ''Also, and more preferably, is there a way to link these so that the Copyright information is the same for Help -> About BOINC Manager.. and for the Installer?'' Migrated-From: http://boinc.berkeley.edu/trac/ticket/1060
defect
installer executable copyright is outdated reported by jacobklein on aug utc if i right click the installer executable in windows and go to the details tab and look at the copyright property version says c university of california at version says copyright copyright c university of california at berkeley all rights reserved i m betting they re different because of some string parsing fix in the builds but still the copyright is not correct i expect to see the same copyright info that s located at help about boinc manager specifically c university of california berkeley all rights reserved can the installer copyright be updated also and more preferably is there a way to link these so that the copyright information is the same for help about boinc manager and for the installer migrated from
1
781,567
27,442,234,168
IssuesEvent
2023-03-02 11:52:48
ballerina-platform/ballerina-lang
https://api.github.com/repos/ballerina-platform/ballerina-lang
closed
Issue in types set for variables created by the typed-binding-pattern of a foreach-stmt
Type/Bug Priority/High Team/CompilerFE Area/TypeChecker Lang/TypeNarrowing Lang/Statements/Foreach Deferred
**Description:** $title. **Steps to reproduce:** The type set seems to be that inferred from the value being iterated, not the type used in the typed binding pattern. ```ballerina public function main() { string[] x = []; foreach int|string item in x { string s = item; // No error, eventhough item is of type `int|string` float f = item; // incompatible types: expected 'float', found 'string' // type seems to be set as `string` } } ``` **Affected Versions:** 1.2.0-m2 1.1.4
1.0
Issue in types set for variables created by the typed-binding-pattern of a foreach-stmt - **Description:** $title. **Steps to reproduce:** The type set seems to be that inferred from the value being iterated, not the type used in the typed binding pattern. ```ballerina public function main() { string[] x = []; foreach int|string item in x { string s = item; // No error, eventhough item is of type `int|string` float f = item; // incompatible types: expected 'float', found 'string' // type seems to be set as `string` } } ``` **Affected Versions:** 1.2.0-m2 1.1.4
non_defect
issue in types set for variables created by the typed binding pattern of a foreach stmt description title steps to reproduce the type set seems to be that inferred from the value being iterated not the type used in the typed binding pattern ballerina public function main string x foreach int string item in x string s item no error eventhough item is of type int string float f item incompatible types expected float found string type seems to be set as string affected versions
0
20,667
3,393,082,723
IssuesEvent
2015-11-30 22:26:15
google/guava
https://api.github.com/repos/google/guava
closed
Wrong RemovalCause published on cache.invaldateAll()
package: cache status: accepted type: defect
When the cache is being cleared, either through `Cache.invalidateAll()` or `asMap().clear()`, the removal cause is always `EXPLICIT`. However the map may contain expired or GC'd entries that would be removed on the next maintenance cycle. The removal cause should indicate the actual state of the entry, not merely the action that triggered the eventual removal. Due to weak and soft references the key or value may be null. A listener should only expect to receive a null key or value if the cause is `COLLECTED`, as indicated by `RemovalNotification`: >The key and/or value may be null if they were already garbage collected. Therefore a listener might decide to inspect the properties without a null guard, leading to an NPE. ```java @Test public void clear_expireAfterAccess() { FakeTicker ticker = new FakeTicker(); RemovalListener<Integer, Integer> listener = Mockito.mock(RemovalListener.class); ArgumentCaptor<RemovalNotification<Integer, Integer>> captor = ArgumentCaptor.forClass(RemovalNotification.class); Cache<Integer, Integer> cache = CacheBuilder.newBuilder() .expireAfterAccess(1, TimeUnit.MINUTES) .removalListener(listener) .ticker(ticker) .build(); cache.put(1, 1); ticker.advance(10, TimeUnit.MINUTES); cache.invalidateAll(); verify(listener).onRemoval(captor.capture()); assertThat(captor.getValue().getCause(), is(RemovalCause.EXPIRED)); } ``` The fix is to change `LocalCache$Segment#clear()` to inspect the key, value, and expiration status when determining the cause. Unfortunately this race condition is more widespread due to `enqueueNotification` not being tolerant to a garbage collection nulling out the key/value. Prior to constructing the notification, the method must take a strong reference to the key and value, check if either was collected, and if so publish a `COLLECTED` instead of the caller's cause.
1.0
Wrong RemovalCause published on cache.invaldateAll() - When the cache is being cleared, either through `Cache.invalidateAll()` or `asMap().clear()`, the removal cause is always `EXPLICIT`. However the map may contain expired or GC'd entries that would be removed on the next maintenance cycle. The removal cause should indicate the actual state of the entry, not merely the action that triggered the eventual removal. Due to weak and soft references the key or value may be null. A listener should only expect to receive a null key or value if the cause is `COLLECTED`, as indicated by `RemovalNotification`: >The key and/or value may be null if they were already garbage collected. Therefore a listener might decide to inspect the properties without a null guard, leading to an NPE. ```java @Test public void clear_expireAfterAccess() { FakeTicker ticker = new FakeTicker(); RemovalListener<Integer, Integer> listener = Mockito.mock(RemovalListener.class); ArgumentCaptor<RemovalNotification<Integer, Integer>> captor = ArgumentCaptor.forClass(RemovalNotification.class); Cache<Integer, Integer> cache = CacheBuilder.newBuilder() .expireAfterAccess(1, TimeUnit.MINUTES) .removalListener(listener) .ticker(ticker) .build(); cache.put(1, 1); ticker.advance(10, TimeUnit.MINUTES); cache.invalidateAll(); verify(listener).onRemoval(captor.capture()); assertThat(captor.getValue().getCause(), is(RemovalCause.EXPIRED)); } ``` The fix is to change `LocalCache$Segment#clear()` to inspect the key, value, and expiration status when determining the cause. Unfortunately this race condition is more widespread due to `enqueueNotification` not being tolerant to a garbage collection nulling out the key/value. Prior to constructing the notification, the method must take a strong reference to the key and value, check if either was collected, and if so publish a `COLLECTED` instead of the caller's cause.
defect
wrong removalcause published on cache invaldateall when the cache is being cleared either through cache invalidateall or asmap clear the removal cause is always explicit however the map may contain expired or gc d entries that would be removed on the next maintenance cycle the removal cause should indicate the actual state of the entry not merely the action that triggered the eventual removal due to weak and soft references the key or value may be null a listener should only expect to receive a null key or value if the cause is collected as indicated by removalnotification the key and or value may be null if they were already garbage collected therefore a listener might decide to inspect the properties without a null guard leading to an npe java test public void clear expireafteraccess faketicker ticker new faketicker removallistener listener mockito mock removallistener class argumentcaptor captor argumentcaptor forclass removalnotification class cache cache cachebuilder newbuilder expireafteraccess timeunit minutes removallistener listener ticker ticker build cache put ticker advance timeunit minutes cache invalidateall verify listener onremoval captor capture assertthat captor getvalue getcause is removalcause expired the fix is to change localcache segment clear to inspect the key value and expiration status when determining the cause unfortunately this race condition is more widespread due to enqueuenotification not being tolerant to a garbage collection nulling out the key value prior to constructing the notification the method must take a strong reference to the key and value check if either was collected and if so publish a collected instead of the caller s cause
1
407,895
11,938,930,721
IssuesEvent
2020-04-02 14:29:54
fecgov/fec-eregs
https://api.github.com/repos/fecgov/fec-eregs
closed
Fix failing build
Bug High priority
https://circleci.com/gh/fecgov/fec-eregs/284 ``` > fec-eregs@1.0.0 build /home/circleci/repo > grunt build:css && npm run build-js /home/circleci/repo/node_modules/mkdirp/lib/opts-arg.js:7 opts = { mode: 0o777 & (~process.umask()), fs, ...opts } ^^^ SyntaxError: Unexpected token ... at Object.exports.runInThisContext (vm.js:76:16) at Module._compile (module.js:542:28) at Object.Module._extensions..js (module.js:579:10) at Module.load (/home/circleci/repo/node_modules/coffeescript/lib/coffee-script/register.js:45:36) at tryModuleLoad (module.js:446:12) at Function.Module._load (module.js:438:3) at Module.require (module.js:497:17) at require (internal/module.js:20:19) at Object.<anonymous> (/home/circleci/repo/node_modules/mkdirp/index.js:1:79) at Module._compile (module.js:570:32) at Object.Module._extensions..js (module.js:579:10) at Module.load (/home/circleci/repo/node_modules/coffeescript/lib/coffee-script/register.js:45:36) at tryModuleLoad (module.js:446:12) at Function.Module._load (module.js:438:3) at Module.require (module.js:497:17) at require (internal/module.js:20:19) at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/lib/grunt/file.js:20:31) at Module._compile (module.js:570:32) at Object.Module._extensions..js (module.js:579:10) at Module.load (/home/circleci/repo/node_modules/coffeescript/lib/coffee-script/register.js:45:36) at tryModuleLoad (module.js:446:12) at Function.Module._load (module.js:438:3) at Module.require (module.js:497:17) at require (internal/module.js:20:19) at gRequire (/home/circleci/repo/node_modules/grunt/lib/grunt.js:14:24) at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/lib/grunt.js:28:1) at Module._compile (module.js:570:32) at Object.Module._extensions..js (module.js:579:10) at Module.load (module.js:487:32) at tryModuleLoad (module.js:446:12) at Function.Module._load (module.js:438:3) at Module.require (module.js:497:17) at require (internal/module.js:20:19) at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/node_modules/grunt-cli/bin/grunt:44:1) at Module._compile (module.js:570:32) at Object.Module._extensions..js (module.js:579:10) at Module.load (module.js:487:32) at tryModuleLoad (module.js:446:12) at Function.Module._load (module.js:438:3) at Module.require (module.js:497:17) at require (internal/module.js:20:19) at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/bin/grunt:3:1) at Module._compile (module.js:570:32) at Object.Module._extensions..js (module.js:579:10) at Module.load (module.js:487:32) at tryModuleLoad (module.js:446:12) at Function.Module._load (module.js:438:3) at Module.runMain (module.js:604:10) at run (bootstrap_node.js:394:7) at startup (bootstrap_node.js:149:9) at bootstrap_node.js:509:3 npm ERR! Linux 4.15.0-1052-aws npm ERR! argv "/home/circleci/.nvm/versions/node/v6.9.2/bin/node" "/home/circleci/.nvm/versions/node/v6.9.2/bin/npm" "run" "build" npm ERR! node v6.9.2 npm ERR! npm v3.10.9 npm ERR! code ELIFECYCLE npm ERR! fec-eregs@1.0.0 build: `grunt build:css && npm run build-js` npm ERR! Exit status 1 npm ERR! npm ERR! Failed at the fec-eregs@1.0.0 build script 'grunt build:css && npm run build-js'. npm ERR! Make sure you have the latest version of node.js and npm installed. npm ERR! If you do, this is most likely a problem with the fec-eregs package, npm ERR! not with npm itself. npm ERR! Tell the author that this fails on your system: npm ERR! grunt build:css && npm run build-js npm ERR! You can get information on how to open an issue for this project with: npm ERR! npm bugs fec-eregs npm ERR! Or if that isn't available, you can get their info via: npm ERR! npm owner ls fec-eregs npm ERR! There is likely additional logging output above. npm ERR! Please include the following file with any support request: npm ERR! /home/circleci/repo/npm-debug.log Exited with code exit status 1 ```
1.0
Fix failing build - https://circleci.com/gh/fecgov/fec-eregs/284 ``` > fec-eregs@1.0.0 build /home/circleci/repo > grunt build:css && npm run build-js /home/circleci/repo/node_modules/mkdirp/lib/opts-arg.js:7 opts = { mode: 0o777 & (~process.umask()), fs, ...opts } ^^^ SyntaxError: Unexpected token ... at Object.exports.runInThisContext (vm.js:76:16) at Module._compile (module.js:542:28) at Object.Module._extensions..js (module.js:579:10) at Module.load (/home/circleci/repo/node_modules/coffeescript/lib/coffee-script/register.js:45:36) at tryModuleLoad (module.js:446:12) at Function.Module._load (module.js:438:3) at Module.require (module.js:497:17) at require (internal/module.js:20:19) at Object.<anonymous> (/home/circleci/repo/node_modules/mkdirp/index.js:1:79) at Module._compile (module.js:570:32) at Object.Module._extensions..js (module.js:579:10) at Module.load (/home/circleci/repo/node_modules/coffeescript/lib/coffee-script/register.js:45:36) at tryModuleLoad (module.js:446:12) at Function.Module._load (module.js:438:3) at Module.require (module.js:497:17) at require (internal/module.js:20:19) at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/lib/grunt/file.js:20:31) at Module._compile (module.js:570:32) at Object.Module._extensions..js (module.js:579:10) at Module.load (/home/circleci/repo/node_modules/coffeescript/lib/coffee-script/register.js:45:36) at tryModuleLoad (module.js:446:12) at Function.Module._load (module.js:438:3) at Module.require (module.js:497:17) at require (internal/module.js:20:19) at gRequire (/home/circleci/repo/node_modules/grunt/lib/grunt.js:14:24) at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/lib/grunt.js:28:1) at Module._compile (module.js:570:32) at Object.Module._extensions..js (module.js:579:10) at Module.load (module.js:487:32) at tryModuleLoad (module.js:446:12) at Function.Module._load (module.js:438:3) at Module.require (module.js:497:17) at require (internal/module.js:20:19) at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/node_modules/grunt-cli/bin/grunt:44:1) at Module._compile (module.js:570:32) at Object.Module._extensions..js (module.js:579:10) at Module.load (module.js:487:32) at tryModuleLoad (module.js:446:12) at Function.Module._load (module.js:438:3) at Module.require (module.js:497:17) at require (internal/module.js:20:19) at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/bin/grunt:3:1) at Module._compile (module.js:570:32) at Object.Module._extensions..js (module.js:579:10) at Module.load (module.js:487:32) at tryModuleLoad (module.js:446:12) at Function.Module._load (module.js:438:3) at Module.runMain (module.js:604:10) at run (bootstrap_node.js:394:7) at startup (bootstrap_node.js:149:9) at bootstrap_node.js:509:3 npm ERR! Linux 4.15.0-1052-aws npm ERR! argv "/home/circleci/.nvm/versions/node/v6.9.2/bin/node" "/home/circleci/.nvm/versions/node/v6.9.2/bin/npm" "run" "build" npm ERR! node v6.9.2 npm ERR! npm v3.10.9 npm ERR! code ELIFECYCLE npm ERR! fec-eregs@1.0.0 build: `grunt build:css && npm run build-js` npm ERR! Exit status 1 npm ERR! npm ERR! Failed at the fec-eregs@1.0.0 build script 'grunt build:css && npm run build-js'. npm ERR! Make sure you have the latest version of node.js and npm installed. npm ERR! If you do, this is most likely a problem with the fec-eregs package, npm ERR! not with npm itself. npm ERR! Tell the author that this fails on your system: npm ERR! grunt build:css && npm run build-js npm ERR! You can get information on how to open an issue for this project with: npm ERR! npm bugs fec-eregs npm ERR! Or if that isn't available, you can get their info via: npm ERR! npm owner ls fec-eregs npm ERR! There is likely additional logging output above. npm ERR! Please include the following file with any support request: npm ERR! /home/circleci/repo/npm-debug.log Exited with code exit status 1 ```
non_defect
fix failing build fec eregs build home circleci repo grunt build css npm run build js home circleci repo node modules mkdirp lib opts arg js opts mode process umask fs opts syntaxerror unexpected token at object exports runinthiscontext vm js at module compile module js at object module extensions js module js at module load home circleci repo node modules coffeescript lib coffee script register js at trymoduleload module js at function module load module js at module require module js at require internal module js at object home circleci repo node modules mkdirp index js at module compile module js at object module extensions js module js at module load home circleci repo node modules coffeescript lib coffee script register js at trymoduleload module js at function module load module js at module require module js at require internal module js at object home circleci repo node modules grunt lib grunt file js at module compile module js at object module extensions js module js at module load home circleci repo node modules coffeescript lib coffee script register js at trymoduleload module js at function module load module js at module require module js at require internal module js at grequire home circleci repo node modules grunt lib grunt js at object home circleci repo node modules grunt lib grunt js at module compile module js at object module extensions js module js at module load module js at trymoduleload module js at function module load module js at module require module js at require internal module js at object home circleci repo node modules grunt node modules grunt cli bin grunt at module compile module js at object module extensions js module js at module load module js at trymoduleload module js at function module load module js at module require module js at require internal module js at object home circleci repo node modules grunt bin grunt at module compile module js at object module extensions js module js at module load module js at trymoduleload module js at function module load module js at module runmain module js at run bootstrap node js at startup bootstrap node js at bootstrap node js npm err linux aws npm err argv home circleci nvm versions node bin node home circleci nvm versions node bin npm run build npm err node npm err npm npm err code elifecycle npm err fec eregs build grunt build css npm run build js npm err exit status npm err npm err failed at the fec eregs build script grunt build css npm run build js npm err make sure you have the latest version of node js and npm installed npm err if you do this is most likely a problem with the fec eregs package npm err not with npm itself npm err tell the author that this fails on your system npm err grunt build css npm run build js npm err you can get information on how to open an issue for this project with npm err npm bugs fec eregs npm err or if that isn t available you can get their info via npm err npm owner ls fec eregs npm err there is likely additional logging output above npm err please include the following file with any support request npm err home circleci repo npm debug log exited with code exit status
0
70,501
3,331,494,216
IssuesEvent
2015-11-11 16:04:52
CoderDojo/community-platform
https://api.github.com/repos/CoderDojo/community-platform
opened
Add field to edit Dojo page to display frequency of how often Dojo typically runs
backlog dojo listings high priority
Request from Foundation team to add a field called "Frequency Dojo runs" with three options: weekly, biweekly and monthly. This will let users know how often a Dojo runs and in the long term we'll be able to search and filter by this option. Will be a required field.
1.0
Add field to edit Dojo page to display frequency of how often Dojo typically runs - Request from Foundation team to add a field called "Frequency Dojo runs" with three options: weekly, biweekly and monthly. This will let users know how often a Dojo runs and in the long term we'll be able to search and filter by this option. Will be a required field.
non_defect
add field to edit dojo page to display frequency of how often dojo typically runs request from foundation team to add a field called frequency dojo runs with three options weekly biweekly and monthly this will let users know how often a dojo runs and in the long term we ll be able to search and filter by this option will be a required field
0
63,128
17,387,781,958
IssuesEvent
2021-08-02 00:00:20
unascribed/Fabrication
https://api.github.com/repos/unascribed/Fabrication
closed
Error upon connection to the Hypixel Server Network.
k: Defect n: Fabric
This error seems to only occur when connecting to Hypixel, and it seems that the same error occurs several times in a row. One of these several error instances has been copied into [this gist](https://gist.github.com/torzod/ac6dff77448b53b8c7418f299b90b4e4), as the others are identical. It's curious that ☃ is used but I know very little about Java, it's possible this is maybe a placeholder?
1.0
Error upon connection to the Hypixel Server Network. - This error seems to only occur when connecting to Hypixel, and it seems that the same error occurs several times in a row. One of these several error instances has been copied into [this gist](https://gist.github.com/torzod/ac6dff77448b53b8c7418f299b90b4e4), as the others are identical. It's curious that ☃ is used but I know very little about Java, it's possible this is maybe a placeholder?
defect
error upon connection to the hypixel server network this error seems to only occur when connecting to hypixel and it seems that the same error occurs several times in a row one of these several error instances has been copied into as the others are identical it s curious that ☃ is used but i know very little about java it s possible this is maybe a placeholder
1
179,868
21,582,882,863
IssuesEvent
2022-05-02 20:47:03
uniquelyparticular/sync-moltin-to-shipengine
https://api.github.com/repos/uniquelyparticular/sync-moltin-to-shipengine
closed
CVE-2021-3777 (High) detected in tmpl-1.0.4.tgz - autoclosed
security vulnerability
## CVE-2021-3777 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tmpl-1.0.4.tgz</b></p></summary> <p>JavaScript micro templates.</p> <p>Library home page: <a href="https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz">https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/tmpl/package.json</p> <p> Dependency Hierarchy: - jest-24.9.0.tgz (Root Library) - jest-cli-24.9.0.tgz - core-24.9.0.tgz - jest-haste-map-24.9.0.tgz - walker-1.0.7.tgz - makeerror-1.0.11.tgz - :x: **tmpl-1.0.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uniquelyparticular/sync-moltin-to-shipengine/commit/ec6fedd3023074a58c607fc8a2d1e04a4e2ab9c7">ec6fedd3023074a58c607fc8a2d1e04a4e2ab9c7</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3777>CVE-2021-3777</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/daaku/nodejs-tmpl/releases/tag/v1.0.5">https://github.com/daaku/nodejs-tmpl/releases/tag/v1.0.5</a></p> <p>Release Date: 2021-09-15</p> <p>Fix Resolution (tmpl): 1.0.5</p> <p>Direct dependency fix Resolution (jest): 25.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-3777 (High) detected in tmpl-1.0.4.tgz - autoclosed - ## CVE-2021-3777 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tmpl-1.0.4.tgz</b></p></summary> <p>JavaScript micro templates.</p> <p>Library home page: <a href="https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz">https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/tmpl/package.json</p> <p> Dependency Hierarchy: - jest-24.9.0.tgz (Root Library) - jest-cli-24.9.0.tgz - core-24.9.0.tgz - jest-haste-map-24.9.0.tgz - walker-1.0.7.tgz - makeerror-1.0.11.tgz - :x: **tmpl-1.0.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uniquelyparticular/sync-moltin-to-shipengine/commit/ec6fedd3023074a58c607fc8a2d1e04a4e2ab9c7">ec6fedd3023074a58c607fc8a2d1e04a4e2ab9c7</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3777>CVE-2021-3777</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/daaku/nodejs-tmpl/releases/tag/v1.0.5">https://github.com/daaku/nodejs-tmpl/releases/tag/v1.0.5</a></p> <p>Release Date: 2021-09-15</p> <p>Fix Resolution (tmpl): 1.0.5</p> <p>Direct dependency fix Resolution (jest): 25.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in tmpl tgz autoclosed cve high severity vulnerability vulnerable library tmpl tgz javascript micro templates library home page a href path to dependency file package json path to vulnerable library node modules tmpl package json dependency hierarchy jest tgz root library jest cli tgz core tgz jest haste map tgz walker tgz makeerror tgz x tmpl tgz vulnerable library found in head commit a href found in base branch master vulnerability details nodejs tmpl is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tmpl direct dependency fix resolution jest step up your open source security game with whitesource
0
139,591
11,274,491,591
IssuesEvent
2020-01-14 18:41:12
aliasrobotics/RVD
https://api.github.com/repos/aliasrobotics/RVD
opened
(error) Buffer is accessed out of bounds
bug cppcheck static analysis testing triage
```yaml { "id": 1, "cve": "None", "description": "[src/industrial_calibration/industrial_extrinsic_cal/src/nodes/stereo_cal_srv.cpp:301]: (error) Buffer is accessed out of bounds: image_scene_chars", "system": "src/industrial_calibration/industrial_extrinsic_cal/src/nodes/stereo_cal_srv.cpp", "title": "(error) Buffer is accessed out of bounds", "severity": { "severity-description": "", "cvss-score": 0, "rvss-vector": "", "rvss-score": 0, "cvss-vector": "" }, "vendor": null, "exploitation": { "exploitation-image": "", "exploitation-vector": "", "description": "" }, "type": "bug", "mitigation": { "date-mitigation": "", "pull-request": "", "description": "" }, "links": "", "keywords": [ "cppcheck", "static analysis", "testing", "triage", "bug" ], "cwe": "None", "flaw": { "application": "N/A", "phase": "testing", "languages": "None", "reproduction": "See artifacts below (if available)", "specificity": "N/A", "date-detected": "2020-01-14 (18:41)", "architectural-location": "N/A", "subsystem": "N/A", "reproduction-image": "gitlab.com/aliasrobotics/offensive/alurity/pipelines/active/pipeline_ros_industrial/-/jobs/402982901/artifacts/download", "date-reported": "2020-01-14 (18:41)", "reproducibility": "always", "detected-by-method": "testing static", "reported-by-relationship": "automatic", "trace": "", "reported-by": "Alias Robotics", "issue": "", "package": "N/A", "detected-by": "Alias Robotics" } } ```
1.0
(error) Buffer is accessed out of bounds - ```yaml { "id": 1, "cve": "None", "description": "[src/industrial_calibration/industrial_extrinsic_cal/src/nodes/stereo_cal_srv.cpp:301]: (error) Buffer is accessed out of bounds: image_scene_chars", "system": "src/industrial_calibration/industrial_extrinsic_cal/src/nodes/stereo_cal_srv.cpp", "title": "(error) Buffer is accessed out of bounds", "severity": { "severity-description": "", "cvss-score": 0, "rvss-vector": "", "rvss-score": 0, "cvss-vector": "" }, "vendor": null, "exploitation": { "exploitation-image": "", "exploitation-vector": "", "description": "" }, "type": "bug", "mitigation": { "date-mitigation": "", "pull-request": "", "description": "" }, "links": "", "keywords": [ "cppcheck", "static analysis", "testing", "triage", "bug" ], "cwe": "None", "flaw": { "application": "N/A", "phase": "testing", "languages": "None", "reproduction": "See artifacts below (if available)", "specificity": "N/A", "date-detected": "2020-01-14 (18:41)", "architectural-location": "N/A", "subsystem": "N/A", "reproduction-image": "gitlab.com/aliasrobotics/offensive/alurity/pipelines/active/pipeline_ros_industrial/-/jobs/402982901/artifacts/download", "date-reported": "2020-01-14 (18:41)", "reproducibility": "always", "detected-by-method": "testing static", "reported-by-relationship": "automatic", "trace": "", "reported-by": "Alias Robotics", "issue": "", "package": "N/A", "detected-by": "Alias Robotics" } } ```
non_defect
error buffer is accessed out of bounds yaml id cve none description error buffer is accessed out of bounds image scene chars system src industrial calibration industrial extrinsic cal src nodes stereo cal srv cpp title error buffer is accessed out of bounds severity severity description cvss score rvss vector rvss score cvss vector vendor null exploitation exploitation image exploitation vector description type bug mitigation date mitigation pull request description links keywords cppcheck static analysis testing triage bug cwe none flaw application n a phase testing languages none reproduction see artifacts below if available specificity n a date detected architectural location n a subsystem n a reproduction image gitlab com aliasrobotics offensive alurity pipelines active pipeline ros industrial jobs artifacts download date reported reproducibility always detected by method testing static reported by relationship automatic trace reported by alias robotics issue package n a detected by alias robotics
0
25,186
4,233,539,414
IssuesEvent
2016-07-05 08:20:53
arkayenro/arkinventory
https://api.github.com/repos/arkayenro/arkinventory
closed
Exporting (CP/GP) issues - was working before
auto-migrated Priority-Medium Type-Defect
``` What steps will reproduce the problem? 1. Using latest : ArkInventory-2-27-05-2008-05-06-17-30.zip 2. No other addons ons loaded, only ArkInventory, CharacterProfiler & GuildProfiler (see below). 3. Clean WTF/ACCOUNT/Name/SavedVariables directory on start. What is the expected output? What do you see instead? I'm also using these (very known ?!!) addons : Characterprofiler and GuildProfiler from http://www.rpgoutfitter.com (/Addons/CharacterProfiler.cfm). I need these addons to 'feed' my roster (from WoWroster). Only THESE addons are loaded to show the issue. These two addon together produce a file, called CP.lua, that Guild members upload to the roster, to have something like this : http://www.papy-team.fr/roster The issue is : Guild Vault Items (and logs & Money) isn't exported anymore if ArkInventory is used (loaded). Deactivating it doesn't help; have to restart WoW without Ark to make things work. When Ark is used, the Tab1 .... Tab6 pages in the CP.lua aren't updated anymore. What version of the product are you using? On what operating system? Yours : latest (the version before had the same issue, the one before that WORKED !! - you guys just started to work on Vault part of the software, right ;-)) ) WoW : Latest ;-) OS : XP Pro - Home or Vista - or even MAC, doesn't mather - the issues stays the same. Please provide any additional information below. ArkInventory WAS working (means : exporting, or, more precise : "letting export") the Vault items (& Money & Logs) before. The latest 2 version don't let CP/GP doeing its work any more. So, our Guild Vault in the roster isn't updated anymore. Only one solution : disable Ark completly, do a complete char scan (and all my private Guild bankers etc etc) so I have a complete CP file to update my roster. Because I'm using UniUpLoader, the Guild Vault will be wiped several times a day - which isn't good at all. NOT using ArkInventory isn't good neither ;-) ``` Original issue reported on code.google.com by `postmas...@papy-team.fr` on 12 May 2008 at 8:41
1.0
Exporting (CP/GP) issues - was working before - ``` What steps will reproduce the problem? 1. Using latest : ArkInventory-2-27-05-2008-05-06-17-30.zip 2. No other addons ons loaded, only ArkInventory, CharacterProfiler & GuildProfiler (see below). 3. Clean WTF/ACCOUNT/Name/SavedVariables directory on start. What is the expected output? What do you see instead? I'm also using these (very known ?!!) addons : Characterprofiler and GuildProfiler from http://www.rpgoutfitter.com (/Addons/CharacterProfiler.cfm). I need these addons to 'feed' my roster (from WoWroster). Only THESE addons are loaded to show the issue. These two addon together produce a file, called CP.lua, that Guild members upload to the roster, to have something like this : http://www.papy-team.fr/roster The issue is : Guild Vault Items (and logs & Money) isn't exported anymore if ArkInventory is used (loaded). Deactivating it doesn't help; have to restart WoW without Ark to make things work. When Ark is used, the Tab1 .... Tab6 pages in the CP.lua aren't updated anymore. What version of the product are you using? On what operating system? Yours : latest (the version before had the same issue, the one before that WORKED !! - you guys just started to work on Vault part of the software, right ;-)) ) WoW : Latest ;-) OS : XP Pro - Home or Vista - or even MAC, doesn't mather - the issues stays the same. Please provide any additional information below. ArkInventory WAS working (means : exporting, or, more precise : "letting export") the Vault items (& Money & Logs) before. The latest 2 version don't let CP/GP doeing its work any more. So, our Guild Vault in the roster isn't updated anymore. Only one solution : disable Ark completly, do a complete char scan (and all my private Guild bankers etc etc) so I have a complete CP file to update my roster. Because I'm using UniUpLoader, the Guild Vault will be wiped several times a day - which isn't good at all. NOT using ArkInventory isn't good neither ;-) ``` Original issue reported on code.google.com by `postmas...@papy-team.fr` on 12 May 2008 at 8:41
defect
exporting cp gp issues was working before what steps will reproduce the problem using latest arkinventory zip no other addons ons loaded only arkinventory characterprofiler guildprofiler see below clean wtf account name savedvariables directory on start what is the expected output what do you see instead i m also using these very known addons characterprofiler and guildprofiler from addons characterprofiler cfm i need these addons to feed my roster from wowroster only these addons are loaded to show the issue these two addon together produce a file called cp lua that guild members upload to the roster to have something like this the issue is guild vault items and logs money isn t exported anymore if arkinventory is used loaded deactivating it doesn t help have to restart wow without ark to make things work when ark is used the pages in the cp lua aren t updated anymore what version of the product are you using on what operating system yours latest the version before had the same issue the one before that worked you guys just started to work on vault part of the software right wow latest os xp pro home or vista or even mac doesn t mather the issues stays the same please provide any additional information below arkinventory was working means exporting or more precise letting export the vault items money logs before the latest version don t let cp gp doeing its work any more so our guild vault in the roster isn t updated anymore only one solution disable ark completly do a complete char scan and all my private guild bankers etc etc so i have a complete cp file to update my roster because i m using uniuploader the guild vault will be wiped several times a day which isn t good at all not using arkinventory isn t good neither original issue reported on code google com by postmas papy team fr on may at
1
100,988
16,490,732,729
IssuesEvent
2021-05-25 03:09:37
valdisiljuconoks/AlloyTech
https://api.github.com/repos/valdisiljuconoks/AlloyTech
opened
CVE-2020-7598 (Medium) detected in minimist-0.0.8.tgz
security vulnerability
## CVE-2020-7598 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: AlloyTech/AlloyTechEpi10/modules/_protected/Shell/Shell/10.1.0.0/ClientResources/lib/xstyle/package.json</p> <p>Path to vulnerable library: AlloyTech/AlloyTechEpi10/modules/_protected/Shell/Shell/10.1.0.0/ClientResources/lib/xstyle/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - intern-geezer-2.2.3.tgz (Root Library) - istanbul-0.2.16.tgz - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p> <p>Release Date: 2020-03-11</p> <p>Fix Resolution: minimist - 0.2.1,1.2.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7598 (Medium) detected in minimist-0.0.8.tgz - ## CVE-2020-7598 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: AlloyTech/AlloyTechEpi10/modules/_protected/Shell/Shell/10.1.0.0/ClientResources/lib/xstyle/package.json</p> <p>Path to vulnerable library: AlloyTech/AlloyTechEpi10/modules/_protected/Shell/Shell/10.1.0.0/ClientResources/lib/xstyle/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - intern-geezer-2.2.3.tgz (Root Library) - istanbul-0.2.16.tgz - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p> <p>Release Date: 2020-03-11</p> <p>Fix Resolution: minimist - 0.2.1,1.2.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve medium detected in minimist tgz cve medium severity vulnerability vulnerable library minimist tgz parse argument options library home page a href path to dependency file alloytech modules protected shell shell clientresources lib xstyle package json path to vulnerable library alloytech modules protected shell shell clientresources lib xstyle node modules minimist package json dependency hierarchy intern geezer tgz root library istanbul tgz mkdirp tgz x minimist tgz vulnerable library vulnerability details minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution minimist step up your open source security game with whitesource
0
16,134
10,577,570,230
IssuesEvent
2019-10-07 20:24:37
kids-first/kf-ui-data-tracker
https://api.github.com/repos/kids-first/kf-ui-data-tracker
opened
always open Basic Info form in edit mode
usability improvement
feedback from `Admin` role users suggest to always open the Basic Info Form in edit mode as there is no use case for a read-only mode. This should alwasy show the Step progress indicators as well as form field descriptions 🤔 maybe also add a `Save` button where the `Edit`/`Cancel` button currently is ## Current Edit mode <img width="1178" alt="Screen Shot 2019-10-07 at 4 23 29 PM" src="https://user-images.githubusercontent.com/1334131/66345852-de565000-e91e-11e9-8da4-fc9f3a282efc.png">
True
always open Basic Info form in edit mode - feedback from `Admin` role users suggest to always open the Basic Info Form in edit mode as there is no use case for a read-only mode. This should alwasy show the Step progress indicators as well as form field descriptions 🤔 maybe also add a `Save` button where the `Edit`/`Cancel` button currently is ## Current Edit mode <img width="1178" alt="Screen Shot 2019-10-07 at 4 23 29 PM" src="https://user-images.githubusercontent.com/1334131/66345852-de565000-e91e-11e9-8da4-fc9f3a282efc.png">
non_defect
always open basic info form in edit mode feedback from admin role users suggest to always open the basic info form in edit mode as there is no use case for a read only mode this should alwasy show the step progress indicators as well as form field descriptions 🤔 maybe also add a save button where the edit cancel button currently is current edit mode img width alt screen shot at pm src
0
68,989
22,042,326,903
IssuesEvent
2022-05-29 14:46:35
SeleniumHQ/selenium
https://api.github.com/repos/SeleniumHQ/selenium
closed
[🐛 Bug]: unhandledPromptBehavior doesn't work
C-py I-defect needs-triaging
### What happened? am using python 3.9.12 with pip 22.1.1 my localhost has an index.html file with only one line of code: `<script>alert("hi")</script>` expected result is to have the above alert dissapear but it doesnt ### How can we reproduce the issue? ```shell from selenium.webdriver import Chrome from selenium.webdriver import ChromeOptions from selenium.webdriver.chrome.service import Service import time options = ChromeOptions() options.set_capability("unhandledPromptBehavior", "dismiss") service = Service(executable_path="/usr/local/bin/chromedriver") driver = Chrome(service=service,options=options) driver.maximize_window() driver.get("http://localhost:8888") time.sleep(5) driver.quit() ``` ### Relevant log output ```shell no output. ``` ### Operating System macos Montery 12.3.1 ### Selenium version 4.1.5 ### What are the browser(s) and version(s) where you see this issue? chrome 101.0.4951.64 arm64 ### What are the browser driver(s) and version(s) where you see this issue? Chromedriver 101.0.4951.41 ### Are you using Selenium Grid? no
1.0
[🐛 Bug]: unhandledPromptBehavior doesn't work - ### What happened? am using python 3.9.12 with pip 22.1.1 my localhost has an index.html file with only one line of code: `<script>alert("hi")</script>` expected result is to have the above alert dissapear but it doesnt ### How can we reproduce the issue? ```shell from selenium.webdriver import Chrome from selenium.webdriver import ChromeOptions from selenium.webdriver.chrome.service import Service import time options = ChromeOptions() options.set_capability("unhandledPromptBehavior", "dismiss") service = Service(executable_path="/usr/local/bin/chromedriver") driver = Chrome(service=service,options=options) driver.maximize_window() driver.get("http://localhost:8888") time.sleep(5) driver.quit() ``` ### Relevant log output ```shell no output. ``` ### Operating System macos Montery 12.3.1 ### Selenium version 4.1.5 ### What are the browser(s) and version(s) where you see this issue? chrome 101.0.4951.64 arm64 ### What are the browser driver(s) and version(s) where you see this issue? Chromedriver 101.0.4951.41 ### Are you using Selenium Grid? no
defect
unhandledpromptbehavior doesn t work what happened am using python with pip my localhost has an index html file with only one line of code alert hi expected result is to have the above alert dissapear but it doesnt how can we reproduce the issue shell from selenium webdriver import chrome from selenium webdriver import chromeoptions from selenium webdriver chrome service import service import time options chromeoptions options set capability unhandledpromptbehavior dismiss service service executable path usr local bin chromedriver driver chrome service service options options driver maximize window driver get time sleep driver quit relevant log output shell no output operating system macos montery selenium version what are the browser s and version s where you see this issue chrome what are the browser driver s and version s where you see this issue chromedriver are you using selenium grid no
1
10,177
2,618,940,260
IssuesEvent
2015-03-03 00:03:50
marmarek/test
https://api.github.com/repos/marmarek/test
closed
Correctly maintain app's titlebar name
C: gui-virtualization P: major R: fixed T: defect
**Reported by joanna on 20 Oct 40318706 17:46 UTC** When an app changes its title bar contents, the appviewer ignores the change and keep the original name in the title bar. Some apps dynamically remap the title bar names at startup (e.g. Thunderbird, Dolphin), so it would be nice to have it correctly implemented, so that the user see something meaningful in the task bar.
1.0
Correctly maintain app's titlebar name - **Reported by joanna on 20 Oct 40318706 17:46 UTC** When an app changes its title bar contents, the appviewer ignores the change and keep the original name in the title bar. Some apps dynamically remap the title bar names at startup (e.g. Thunderbird, Dolphin), so it would be nice to have it correctly implemented, so that the user see something meaningful in the task bar.
defect
correctly maintain app s titlebar name reported by joanna on oct utc when an app changes its title bar contents the appviewer ignores the change and keep the original name in the title bar some apps dynamically remap the title bar names at startup e g thunderbird dolphin so it would be nice to have it correctly implemented so that the user see something meaningful in the task bar
1
37,722
8,489,415,746
IssuesEvent
2018-10-26 19:50:32
MDAnalysis/mdanalysis
https://api.github.com/repos/MDAnalysis/mdanalysis
closed
Consistency: AtomGroup.residues = 0 ResidueGroup, further .atoms leads to ValueError
Component-Core Difficulty-easy defect usability
**Expected behavior** ```python sel.select_atoms('resname SOL') Out[3]: <AtomGroup with 0 atoms> sel.select_atoms('resname SOL').residues Out[4]: <ResidueGroup with 0 residues> sel.select_atoms('resname SOL').residues.atoms ``` This should return again:<AtomGroup with 0 atoms> **Actual behavior** Unclear error: ```python ValueError: need at least one array to concatenate Traceback (most recent call last): File "/usr/lib/python2.7/site-packages/IPython/core/interactiveshell.py", line 2878, in run_code exec(code_obj, self.user_global_ns, self.user_ns) File "<ipython-input-5-6c6c6b22c39a>", line 1, in <module> sel.select_atoms('resname SOL').residues.atoms File "/home/dresio/software/virtualenvs/charm-mda/lib/python2.7/site-packages/MDAnalysis/core/groups.py", line 2340, in atoms return self.universe.atoms[np.concatenate(self.indices)] ValueError: need at least one array to concatenate ``` **Code to reproduce the behavior** ``` u.select_atoms('resname NONE').residues.atoms ``` MDAnalysis 0.18.0
1.0
Consistency: AtomGroup.residues = 0 ResidueGroup, further .atoms leads to ValueError - **Expected behavior** ```python sel.select_atoms('resname SOL') Out[3]: <AtomGroup with 0 atoms> sel.select_atoms('resname SOL').residues Out[4]: <ResidueGroup with 0 residues> sel.select_atoms('resname SOL').residues.atoms ``` This should return again:<AtomGroup with 0 atoms> **Actual behavior** Unclear error: ```python ValueError: need at least one array to concatenate Traceback (most recent call last): File "/usr/lib/python2.7/site-packages/IPython/core/interactiveshell.py", line 2878, in run_code exec(code_obj, self.user_global_ns, self.user_ns) File "<ipython-input-5-6c6c6b22c39a>", line 1, in <module> sel.select_atoms('resname SOL').residues.atoms File "/home/dresio/software/virtualenvs/charm-mda/lib/python2.7/site-packages/MDAnalysis/core/groups.py", line 2340, in atoms return self.universe.atoms[np.concatenate(self.indices)] ValueError: need at least one array to concatenate ``` **Code to reproduce the behavior** ``` u.select_atoms('resname NONE').residues.atoms ``` MDAnalysis 0.18.0
defect
consistency atomgroup residues residuegroup further atoms leads to valueerror expected behavior python sel select atoms resname sol out sel select atoms resname sol residues out sel select atoms resname sol residues atoms this should return again actual behavior unclear error python valueerror need at least one array to concatenate traceback most recent call last file usr lib site packages ipython core interactiveshell py line in run code exec code obj self user global ns self user ns file line in sel select atoms resname sol residues atoms file home dresio software virtualenvs charm mda lib site packages mdanalysis core groups py line in atoms return self universe atoms valueerror need at least one array to concatenate code to reproduce the behavior u select atoms resname none residues atoms mdanalysis
1
437,614
30,605,412,975
IssuesEvent
2023-07-22 23:59:05
danielcshn/wpa-colab
https://api.github.com/repos/danielcshn/wpa-colab
closed
Colab updated limitations
documentation wontfix
Google has cracked down (pardon the pun) on password cracking - now they explicitly state in their usage policy that cracking (amongst other restrictions) is not allowed, and my account has been restricted access to Colab (but not other G products). When you download and compile `hashcat` - they do give you a warning about running possibly restricted code and they may ban you for that, which I disregarded, so it is only fair. Feel free to move to discussions, because it's not really an issue
1.0
Colab updated limitations - Google has cracked down (pardon the pun) on password cracking - now they explicitly state in their usage policy that cracking (amongst other restrictions) is not allowed, and my account has been restricted access to Colab (but not other G products). When you download and compile `hashcat` - they do give you a warning about running possibly restricted code and they may ban you for that, which I disregarded, so it is only fair. Feel free to move to discussions, because it's not really an issue
non_defect
colab updated limitations google has cracked down pardon the pun on password cracking now they explicitly state in their usage policy that cracking amongst other restrictions is not allowed and my account has been restricted access to colab but not other g products when you download and compile hashcat they do give you a warning about running possibly restricted code and they may ban you for that which i disregarded so it is only fair feel free to move to discussions because it s not really an issue
0
723,074
24,883,773,907
IssuesEvent
2022-10-28 05:21:23
lowRISC/opentitan
https://api.github.com/repos/lowRISC/opentitan
closed
[dv/pwrmgr] Disable coverage exclusions
Component:DV Priority:P2 Type:Task IP:pwrmgr Milestone:V2
Disable exclusions for CSR CONTROL.USB_CLK_EN_ACTIVE, RESET_EN in IP level.
1.0
[dv/pwrmgr] Disable coverage exclusions - Disable exclusions for CSR CONTROL.USB_CLK_EN_ACTIVE, RESET_EN in IP level.
non_defect
disable coverage exclusions disable exclusions for csr control usb clk en active reset en in ip level
0
675,423
23,093,898,846
IssuesEvent
2022-07-26 17:33:55
sczerwinski/wavefront-obj-intellij-plugin
https://api.github.com/repos/sczerwinski/wavefront-obj-intellij-plugin
opened
GLModelFactory should process the file, not the PSIFile
type:feature status:new priority:medium component:3d
Processing PSI tree is costly. Process file contents instead.
1.0
GLModelFactory should process the file, not the PSIFile - Processing PSI tree is costly. Process file contents instead.
non_defect
glmodelfactory should process the file not the psifile processing psi tree is costly process file contents instead
0
528,505
15,368,457,028
IssuesEvent
2021-03-02 05:35:57
AY2021S2-CS2103-T14-4/tp
https://api.github.com/repos/AY2021S2-CS2103-T14-4/tp
opened
As a CS student who just finished a holiday, I want to reset my calendar
priority.High type.Story
so that I can start a new semester with new deadlines
1.0
As a CS student who just finished a holiday, I want to reset my calendar - so that I can start a new semester with new deadlines
non_defect
as a cs student who just finished a holiday i want to reset my calendar so that i can start a new semester with new deadlines
0
68,418
21,664,331,529
IssuesEvent
2022-05-07 01:01:45
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
MatrixBridge can only be contacted via start chat button, not /user page link
T-Defect P2 S-Minor
### Description The page https://riot.im/develop/#/user/@freenode_MatrixBridge:matrix.org does not load, but using the start chat button to contact @freenode_MatrixBridge:matrix.org does (albeit I can't see the room until I refresh Riot). Possibly causes https://github.com/matrix-org/matrix-appservice-irc/issues/524 Log: sent/not sent? not sent ### Version information - **Platform**: web (in-browser) For the web app: - **Browser**: FF57 - **OS**: Fedora 26 - **URL**: riot.im/develop
1.0
MatrixBridge can only be contacted via start chat button, not /user page link - ### Description The page https://riot.im/develop/#/user/@freenode_MatrixBridge:matrix.org does not load, but using the start chat button to contact @freenode_MatrixBridge:matrix.org does (albeit I can't see the room until I refresh Riot). Possibly causes https://github.com/matrix-org/matrix-appservice-irc/issues/524 Log: sent/not sent? not sent ### Version information - **Platform**: web (in-browser) For the web app: - **Browser**: FF57 - **OS**: Fedora 26 - **URL**: riot.im/develop
defect
matrixbridge can only be contacted via start chat button not user page link description the page does not load but using the start chat button to contact freenode matrixbridge matrix org does albeit i can t see the room until i refresh riot possibly causes log sent not sent not sent version information platform web in browser for the web app browser os fedora url riot im develop
1
2,594
2,607,930,767
IssuesEvent
2015-02-26 00:26:36
chrsmithdemos/minify
https://api.github.com/repos/chrsmithdemos/minify
closed
minify_2.1.2.zip can't open on OSX
auto-migrated Priority-High Type-Defect
``` Minify version:2.1.2 PHP version: … Running Mac OS X What steps will reproduce the problem? 1. Download 2. Unzip 3. Fail Expected output: Files with content Actual output: Files with no content, null file size. Did any unit tests FAIL? … Please provide any additional information below. … ``` ----- Original issue reported on code.google.com by `harrison...@gmail.com` on 4 Mar 2009 at 2:49
1.0
minify_2.1.2.zip can't open on OSX - ``` Minify version:2.1.2 PHP version: … Running Mac OS X What steps will reproduce the problem? 1. Download 2. Unzip 3. Fail Expected output: Files with content Actual output: Files with no content, null file size. Did any unit tests FAIL? … Please provide any additional information below. … ``` ----- Original issue reported on code.google.com by `harrison...@gmail.com` on 4 Mar 2009 at 2:49
defect
minify zip can t open on osx minify version php version … running mac os x what steps will reproduce the problem download unzip fail expected output files with content actual output files with no content null file size did any unit tests fail … please provide any additional information below … original issue reported on code google com by harrison gmail com on mar at
1
333,370
10,121,079,383
IssuesEvent
2019-07-31 14:56:15
LiskHQ/lisk-sdk
https://api.github.com/repos/LiskHQ/lisk-sdk
closed
Only send back the port and ip when peer requests our peer list
elements/P2P priority: high status: ready to develop
### Expected behavior When doing discovery, the peer should only give us a list of IPs and ports of its peers; it should not include the other fields from `P2PPeerInfo`. We will fetch the remaining `P2PPeerInfo` fields after we connect to the peer and make a `status` call to it. ### Actual behavior Right now, for peers in our newPeers list, it's possible that the fields could be wrong because a different peer could give us fake values for the fields (they come from third-party peers and not the peer itself). Currently, we shouldn't trust fields of `P2PPeerInfo` objects in the `newPeers` list.
1.0
Only send back the port and ip when peer requests our peer list - ### Expected behavior When doing discovery, the peer should only give us a list of IPs and ports of its peers; it should not include the other fields from `P2PPeerInfo`. We will fetch the remaining `P2PPeerInfo` fields after we connect to the peer and make a `status` call to it. ### Actual behavior Right now, for peers in our newPeers list, it's possible that the fields could be wrong because a different peer could give us fake values for the fields (they come from third-party peers and not the peer itself). Currently, we shouldn't trust fields of `P2PPeerInfo` objects in the `newPeers` list.
non_defect
only send back the port and ip when peer requests our peer list expected behavior when doing discovery the peer should only give us a list of ips and ports of its peers it should not include the other fields from we will fetch the remaining fields after we connect to the peer and make a status call to it actual behavior right now for peers in our newpeers list it s possible that the fields could be wrong because a different peer could give us fake values for the fields they come from third party peers and not the peer itself currently we shouldn t trust fields of objects in the newpeers list
0
679,204
23,224,181,395
IssuesEvent
2022-08-02 21:29:32
o3de/o3de
https://api.github.com/repos/o3de/o3de
closed
MultiplayerSample project, the game process cannot exit and enter infinite loop
kind/bug sig/network sig/ui-ux priority/major
**Describe the bug** Windows platform, MultiplayerSample project, the game process cannot exit and enter infinite loop This issue is related with issue #7272 **Steps to reproduce** Steps to reproduce the behavior: 1. Open MultiplayerSample.ServerLauncher.exe, and the process is running. 2. Click on close button on window. The window of process is closed. 3. Open the task manager, we can find the process is still running in the background. And the CPU utilization of this process is 100%. **Found in Branch** The latest code of development branch. **Desktop/Device (please complete the following information):** - Device: [PC] - OS: [Windows] - Version [10] - CPU [Intel i7-10700] - GPU [NVidia 1650] - Memory [32GB] **Problem analysis** We found the infinite loop is at the procedure of the destructor of the globle variable 'g_ignoredAsserts'. And we do some modifications show blow, the problem solved. In Trace::Destroy() function: Modify g_ignoredAsserts.Reset(); to g_ignoredAsserts->clear();
1.0
MultiplayerSample project, the game process cannot exit and enter infinite loop - **Describe the bug** Windows platform, MultiplayerSample project, the game process cannot exit and enter infinite loop This issue is related with issue #7272 **Steps to reproduce** Steps to reproduce the behavior: 1. Open MultiplayerSample.ServerLauncher.exe, and the process is running. 2. Click on close button on window. The window of process is closed. 3. Open the task manager, we can find the process is still running in the background. And the CPU utilization of this process is 100%. **Found in Branch** The latest code of development branch. **Desktop/Device (please complete the following information):** - Device: [PC] - OS: [Windows] - Version [10] - CPU [Intel i7-10700] - GPU [NVidia 1650] - Memory [32GB] **Problem analysis** We found the infinite loop is at the procedure of the destructor of the globle variable 'g_ignoredAsserts'. And we do some modifications show blow, the problem solved. In Trace::Destroy() function: Modify g_ignoredAsserts.Reset(); to g_ignoredAsserts->clear();
non_defect
multiplayersample project the game process cannot exit and enter infinite loop describe the bug windows platform multiplayersample project the game process cannot exit and enter infinite loop this issue is related with issue steps to reproduce steps to reproduce the behavior open multiplayersample serverlauncher exe and the process is running click on close button on window the window of process is closed open the task manager we can find the process is still running in the background and the cpu utilization of this process is found in branch the latest code of development branch desktop device please complete the following information device os version cpu gpu memory problem analysis we found the infinite loop is at the procedure of the destructor of the globle variable g ignoredasserts and we do some modifications show blow the problem solved in trace destroy function modify g ignoredasserts reset to g ignoredasserts clear
0
213,422
23,990,819,166
IssuesEvent
2022-09-14 00:47:56
ZcashFoundation/zebra
https://api.github.com/repos/ZcashFoundation/zebra
reopened
Test if checkpoint verifier and state service are correctly reset on block commit errors
C-enhancement P-Medium :zap: C-security I-panic I-hang
## Priority Zebra doesn't have any post-NU5 checkpoints yet. This ticket is optional until we update our checkpoint lists. ## Motivation https://github.com/ZcashFoundation/zebra/pull/2633/ adds ZIP-221/244 block commitment validation in the checkpoint verifier. The check is actually done in the finalized state, and when that happens, the checkpoint verifier is reset to the tip of the finalized state in order to keep running correctly. However, this hasn't been tested, since it is tricky to test. Implement a test to verify that it's working correctly. (Note that is only required if/when we have a checkpoint post-Nu5. Before that all block contents are committed to by the block hash, so they must be correct. Nu5-onward that no longer applies due to ZIP-244.) ### Previous attempt I attempted to write this test in #2633 but gave up because it was too difficult and we had to keep working on other stuff. See [discussion](https://github.com/ZcashFoundation/zebra/pull/2633/files#r689198985). However, most of the problems were caused by trying to test it along with the "fake activation heights" feature in that PR, which would require generating fake blocks with correct difficulties, etc. in order to pass the checkpoint verifier. Another alternative would be to use real blocks similar to the `continuous_blockchain` - but the problem would then be how to ensure that one block fails to be comitted in order to test if that's handled correctly (the real blocks have small heights, and thus they don't use the block commitment in the header, so there is nothing to corrupt) ### Specifications <!-- If this change is based on consensus rules, quote them, and link to the Zcash spec or ZIP: https://zips.z.cash/#nu5-zips If this changes network behaviour, quote and link to the Bitcoin network reference: https://developer.bitcoin.org/reference/p2p_networking.html --> ### Designs <!-- If this change is part of a Zebra design, quote and link to the RFC: https://github.com/ZcashFoundation/zebra/tree/main/book/src/dev/rfcs/ --> ## Related Work <!-- Is this change related to other features or tickets? -->
True
Test if checkpoint verifier and state service are correctly reset on block commit errors - ## Priority Zebra doesn't have any post-NU5 checkpoints yet. This ticket is optional until we update our checkpoint lists. ## Motivation https://github.com/ZcashFoundation/zebra/pull/2633/ adds ZIP-221/244 block commitment validation in the checkpoint verifier. The check is actually done in the finalized state, and when that happens, the checkpoint verifier is reset to the tip of the finalized state in order to keep running correctly. However, this hasn't been tested, since it is tricky to test. Implement a test to verify that it's working correctly. (Note that is only required if/when we have a checkpoint post-Nu5. Before that all block contents are committed to by the block hash, so they must be correct. Nu5-onward that no longer applies due to ZIP-244.) ### Previous attempt I attempted to write this test in #2633 but gave up because it was too difficult and we had to keep working on other stuff. See [discussion](https://github.com/ZcashFoundation/zebra/pull/2633/files#r689198985). However, most of the problems were caused by trying to test it along with the "fake activation heights" feature in that PR, which would require generating fake blocks with correct difficulties, etc. in order to pass the checkpoint verifier. Another alternative would be to use real blocks similar to the `continuous_blockchain` - but the problem would then be how to ensure that one block fails to be comitted in order to test if that's handled correctly (the real blocks have small heights, and thus they don't use the block commitment in the header, so there is nothing to corrupt) ### Specifications <!-- If this change is based on consensus rules, quote them, and link to the Zcash spec or ZIP: https://zips.z.cash/#nu5-zips If this changes network behaviour, quote and link to the Bitcoin network reference: https://developer.bitcoin.org/reference/p2p_networking.html --> ### Designs <!-- If this change is part of a Zebra design, quote and link to the RFC: https://github.com/ZcashFoundation/zebra/tree/main/book/src/dev/rfcs/ --> ## Related Work <!-- Is this change related to other features or tickets? -->
non_defect
test if checkpoint verifier and state service are correctly reset on block commit errors priority zebra doesn t have any post checkpoints yet this ticket is optional until we update our checkpoint lists motivation adds zip block commitment validation in the checkpoint verifier the check is actually done in the finalized state and when that happens the checkpoint verifier is reset to the tip of the finalized state in order to keep running correctly however this hasn t been tested since it is tricky to test implement a test to verify that it s working correctly note that is only required if when we have a checkpoint post before that all block contents are committed to by the block hash so they must be correct onward that no longer applies due to zip previous attempt i attempted to write this test in but gave up because it was too difficult and we had to keep working on other stuff see however most of the problems were caused by trying to test it along with the fake activation heights feature in that pr which would require generating fake blocks with correct difficulties etc in order to pass the checkpoint verifier another alternative would be to use real blocks similar to the continuous blockchain but the problem would then be how to ensure that one block fails to be comitted in order to test if that s handled correctly the real blocks have small heights and thus they don t use the block commitment in the header so there is nothing to corrupt specifications if this change is based on consensus rules quote them and link to the zcash spec or zip if this changes network behaviour quote and link to the bitcoin network reference designs if this change is part of a zebra design quote and link to the rfc related work is this change related to other features or tickets
0
433,025
12,501,146,945
IssuesEvent
2020-06-02 00:21:53
eclipse-ee4j/glassfish
https://api.github.com/repos/eclipse-ee4j/glassfish
closed
GUI should inform the user to save the changes
Component: admin_gui ERR: Assignee Priority: Major Stale Type: Improvement
Under Configuration->Monitoring I select some modules to change the monitoring level, the change level button is activated and I click the button to change the levels. But the values are not actually changed in domain.xml it is simply changed in the GUI screen. The user still needs to hit the save button to actually save it in domain.xml. the user needs to be informed to hit the save button otherwise it creates a impression that the levels are already saved. #### Environment Operating System: All Platform: PC #### Affected Versions [V3]
1.0
GUI should inform the user to save the changes - Under Configuration->Monitoring I select some modules to change the monitoring level, the change level button is activated and I click the button to change the levels. But the values are not actually changed in domain.xml it is simply changed in the GUI screen. The user still needs to hit the save button to actually save it in domain.xml. the user needs to be informed to hit the save button otherwise it creates a impression that the levels are already saved. #### Environment Operating System: All Platform: PC #### Affected Versions [V3]
non_defect
gui should inform the user to save the changes under configuration monitoring i select some modules to change the monitoring level the change level button is activated and i click the button to change the levels but the values are not actually changed in domain xml it is simply changed in the gui screen the user still needs to hit the save button to actually save it in domain xml the user needs to be informed to hit the save button otherwise it creates a impression that the levels are already saved environment operating system all platform pc affected versions
0
2,117
2,603,976,587
IssuesEvent
2015-02-24 19:01:39
chrsmith/nishazi6
https://api.github.com/repos/chrsmith/nishazi6
opened
沈阳龟头上有小菜花
auto-migrated Priority-Medium Type-Defect
``` 沈阳龟头上有小菜花〓沈陽軍區政治部醫院性病〓TEL:024-3102 3308〓成立于1946年,68年專注于性傳播疾病的研究和治療。位� ��沈陽市沈河區二緯路32號。是一所與新中國同建立共輝煌的� ��史悠久、設備精良、技術權威、專家云集,是預防、保健、 醫療、科研康復為一體的綜合性醫院。是國家首批公立甲等�� �隊醫院、全國首批醫療規范定點單位,是第四軍醫大學、東� ��大學等知名高等院校的教學醫院。曾被中國人民解放軍空軍 后勤部衛生部評為衛生工作先進單位,先后兩次榮立集體二�� �功。 ``` ----- Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 8:22
1.0
沈阳龟头上有小菜花 - ``` 沈阳龟头上有小菜花〓沈陽軍區政治部醫院性病〓TEL:024-3102 3308〓成立于1946年,68年專注于性傳播疾病的研究和治療。位� ��沈陽市沈河區二緯路32號。是一所與新中國同建立共輝煌的� ��史悠久、設備精良、技術權威、專家云集,是預防、保健、 醫療、科研康復為一體的綜合性醫院。是國家首批公立甲等�� �隊醫院、全國首批醫療規范定點單位,是第四軍醫大學、東� ��大學等知名高等院校的教學醫院。曾被中國人民解放軍空軍 后勤部衛生部評為衛生工作先進單位,先后兩次榮立集體二�� �功。 ``` ----- Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 8:22
defect
沈阳龟头上有小菜花 沈阳龟头上有小菜花〓沈陽軍區政治部醫院性病〓tel: 〓 , 。位� �� 。是一所與新中國同建立共輝煌的� ��史悠久、設備精良、技術權威、專家云集,是預防、保健、 醫療、科研康復為一體的綜合性醫院。是國家首批公立甲等�� �隊醫院、全國首批醫療規范定點單位,是第四軍醫大學、東� ��大學等知名高等院校的教學醫院。曾被中國人民解放軍空軍 后勤部衛生部評為衛生工作先進單位,先后兩次榮立集體二�� �功。 original issue reported on code google com by gmail com on jun at
1
116,476
14,968,106,678
IssuesEvent
2021-01-27 16:27:16
department-of-veterans-affairs/va.gov-team
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
opened
Provide QA Guidance for EDU-DD
EDU DD design vsa vsa-ebenefits
## Background As this features nears completion, one of the last items is to run the feature through its QA paces. The eBenefits Team is able to help guide that process as needed given our role in helping the design process. ## Tasks - [ ] Check in with Tze and the Auth Exp Team as need ## Acceptance Criteria - [ ] Assistance has been provided as needed
1.0
Provide QA Guidance for EDU-DD - ## Background As this features nears completion, one of the last items is to run the feature through its QA paces. The eBenefits Team is able to help guide that process as needed given our role in helping the design process. ## Tasks - [ ] Check in with Tze and the Auth Exp Team as need ## Acceptance Criteria - [ ] Assistance has been provided as needed
non_defect
provide qa guidance for edu dd background as this features nears completion one of the last items is to run the feature through its qa paces the ebenefits team is able to help guide that process as needed given our role in helping the design process tasks check in with tze and the auth exp team as need acceptance criteria assistance has been provided as needed
0
580,453
17,258,469,036
IssuesEvent
2021-07-22 01:48:44
GoogleCloudPlatform/java-docs-samples
https://api.github.com/repos/GoogleCloudPlatform/java-docs-samples
closed
com.example.storage.QuickstartSampleIT: testQuickstart failed
api: storage flakybot: issue priority: p1 samples type: bug
This test failed! To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/master/packages/flakybot). If I'm commenting on this issue too often, add the `flakybot: quiet` label and I will stop commenting. --- commit: 4d08f29cf609a16b707efa2ac7358fc0e4d89827 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/4b8d400e-8398-41e0-a140-a012474d00bf), [Sponge](http://sponge2/4b8d400e-8398-41e0-a140-a012474d00bf) status: failed <details><summary>Test output</summary><br><pre>com.google.cloud.storage.StorageException: Error getting access token for service account: 400 Bad Request POST https://oauth2.googleapis.com/token {"error":"invalid_grant","error_description":"Invalid JWT Signature."}, iss: java-docs-samples-testing@java-docs-samples-testing.iam.gserviceaccount.com at com.example.storage.QuickstartSampleIT.deleteBucket(QuickstartSampleIT.java:44) at com.example.storage.QuickstartSampleIT.tearDown(QuickstartSampleIT.java:59) Caused by: java.io.IOException: Error getting access token for service account: 400 Bad Request POST https://oauth2.googleapis.com/token {"error":"invalid_grant","error_description":"Invalid JWT Signature."}, iss: java-docs-samples-testing@java-docs-samples-testing.iam.gserviceaccount.com at com.example.storage.QuickstartSampleIT.deleteBucket(QuickstartSampleIT.java:44) at com.example.storage.QuickstartSampleIT.tearDown(QuickstartSampleIT.java:59) Caused by: com.google.api.client.http.HttpResponseException: 400 Bad Request POST https://oauth2.googleapis.com/token {"error":"invalid_grant","error_description":"Invalid JWT Signature."} at com.example.storage.QuickstartSampleIT.deleteBucket(QuickstartSampleIT.java:44) at com.example.storage.QuickstartSampleIT.tearDown(QuickstartSampleIT.java:59) </pre></details>
1.0
com.example.storage.QuickstartSampleIT: testQuickstart failed - This test failed! To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/master/packages/flakybot). If I'm commenting on this issue too often, add the `flakybot: quiet` label and I will stop commenting. --- commit: 4d08f29cf609a16b707efa2ac7358fc0e4d89827 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/4b8d400e-8398-41e0-a140-a012474d00bf), [Sponge](http://sponge2/4b8d400e-8398-41e0-a140-a012474d00bf) status: failed <details><summary>Test output</summary><br><pre>com.google.cloud.storage.StorageException: Error getting access token for service account: 400 Bad Request POST https://oauth2.googleapis.com/token {"error":"invalid_grant","error_description":"Invalid JWT Signature."}, iss: java-docs-samples-testing@java-docs-samples-testing.iam.gserviceaccount.com at com.example.storage.QuickstartSampleIT.deleteBucket(QuickstartSampleIT.java:44) at com.example.storage.QuickstartSampleIT.tearDown(QuickstartSampleIT.java:59) Caused by: java.io.IOException: Error getting access token for service account: 400 Bad Request POST https://oauth2.googleapis.com/token {"error":"invalid_grant","error_description":"Invalid JWT Signature."}, iss: java-docs-samples-testing@java-docs-samples-testing.iam.gserviceaccount.com at com.example.storage.QuickstartSampleIT.deleteBucket(QuickstartSampleIT.java:44) at com.example.storage.QuickstartSampleIT.tearDown(QuickstartSampleIT.java:59) Caused by: com.google.api.client.http.HttpResponseException: 400 Bad Request POST https://oauth2.googleapis.com/token {"error":"invalid_grant","error_description":"Invalid JWT Signature."} at com.example.storage.QuickstartSampleIT.deleteBucket(QuickstartSampleIT.java:44) at com.example.storage.QuickstartSampleIT.tearDown(QuickstartSampleIT.java:59) </pre></details>
non_defect
com example storage quickstartsampleit testquickstart failed this test failed to configure my behavior see if i m commenting on this issue too often add the flakybot quiet label and i will stop commenting commit buildurl status failed test output com google cloud storage storageexception error getting access token for service account bad request post error invalid grant error description invalid jwt signature iss java docs samples testing java docs samples testing iam gserviceaccount com at com example storage quickstartsampleit deletebucket quickstartsampleit java at com example storage quickstartsampleit teardown quickstartsampleit java caused by java io ioexception error getting access token for service account bad request post error invalid grant error description invalid jwt signature iss java docs samples testing java docs samples testing iam gserviceaccount com at com example storage quickstartsampleit deletebucket quickstartsampleit java at com example storage quickstartsampleit teardown quickstartsampleit java caused by com google api client http httpresponseexception bad request post error invalid grant error description invalid jwt signature at com example storage quickstartsampleit deletebucket quickstartsampleit java at com example storage quickstartsampleit teardown quickstartsampleit java
0
53,941
6,776,242,234
IssuesEvent
2017-10-27 17:04:30
vmware/clarity
https://api.github.com/repos/vmware/clarity
closed
Update Design Resources
Docs needs-UX-design WEB
``` [ ] bug [ ] feature request [X] enhancement ``` ### Expected behavior Have a new Library version of the Clarity UI Template as well a content that shows the Clarity Sketch Library is available to download. Will also want to keep the previous version of the UI Template (0.10.0) available for users who have not moved to Sketch 47 yet. ### Actual behavior Current 0.10.0 version is using Sketch 46 and doesn't have the Libraries ability ### Reproduction of behavior ![image](https://user-images.githubusercontent.com/1858226/31414471-e82a4a70-add2-11e7-9ad4-e549b7328cd0.png) ### Environment details * **UI Template version:** 0.10.0 * **Clarity version:** 0.10.8 * **OS and version:** * **Browser:** [all]
1.0
Update Design Resources - ``` [ ] bug [ ] feature request [X] enhancement ``` ### Expected behavior Have a new Library version of the Clarity UI Template as well a content that shows the Clarity Sketch Library is available to download. Will also want to keep the previous version of the UI Template (0.10.0) available for users who have not moved to Sketch 47 yet. ### Actual behavior Current 0.10.0 version is using Sketch 46 and doesn't have the Libraries ability ### Reproduction of behavior ![image](https://user-images.githubusercontent.com/1858226/31414471-e82a4a70-add2-11e7-9ad4-e549b7328cd0.png) ### Environment details * **UI Template version:** 0.10.0 * **Clarity version:** 0.10.8 * **OS and version:** * **Browser:** [all]
non_defect
update design resources bug feature request enhancement expected behavior have a new library version of the clarity ui template as well a content that shows the clarity sketch library is available to download will also want to keep the previous version of the ui template available for users who have not moved to sketch yet actual behavior current version is using sketch and doesn t have the libraries ability reproduction of behavior environment details ui template version clarity version os and version browser
0
63,329
17,598,803,040
IssuesEvent
2021-08-17 09:12:20
Gogo1951/GogoLoot
https://api.github.com/repos/Gogo1951/GogoLoot
closed
When it's on FFA, you don't get a loot window for BoPs
Type - Defect GogoLoot - Application
When it's set to FFA, the loot window should stay open when a BoP is present. Currently the window just closes very quickly. Whenever there's an item that you can't loot, the window should stay open.
1.0
When it's on FFA, you don't get a loot window for BoPs - When it's set to FFA, the loot window should stay open when a BoP is present. Currently the window just closes very quickly. Whenever there's an item that you can't loot, the window should stay open.
defect
when it s on ffa you don t get a loot window for bops when it s set to ffa the loot window should stay open when a bop is present currently the window just closes very quickly whenever there s an item that you can t loot the window should stay open
1
24,282
3,952,583,184
IssuesEvent
2016-04-29 09:29:34
PowerDNS/pdns
https://api.github.com/repos/PowerDNS/pdns
closed
Domain more recent than master, our serial 0 > their serial <large number>
auth defect
Domain '[mydomain]' more recent than master, our serial 0 > their serial 3933516418 > [08:05:14] Habbie: Genesis2001, the issue is that we treat an absent domain as having serial 0 > [08:05:19] Habbie: Genesis2001, this is a bug I've got a supermaster setup on one machine, and a slave ("ns1") setup on another which has my supermaster listed. The serial for the zone was larger than 2^31 > [08:05:53] Genesis2001: also on the [supermaster], in my domains table for that domain, notified_serial is negative too > [08:05:55] Genesis2001: o.o > [08:05:58] Habbie: negative! > [08:06:10] Habbie: -1786032770 ? > [08:06:16] Genesis2001: -361450878 --- > [08:07:38] Habbie: then please file two tickets > [08:07:57] Habbie: for now i'd recommend changing your serial to something smaller than 2^31 OS: Debian OS: Version: 7.8 (Wheezy) PDNS version: 3.4.1 (wheezy-backports)
1.0
Domain more recent than master, our serial 0 > their serial <large number> - Domain '[mydomain]' more recent than master, our serial 0 > their serial 3933516418 > [08:05:14] Habbie: Genesis2001, the issue is that we treat an absent domain as having serial 0 > [08:05:19] Habbie: Genesis2001, this is a bug I've got a supermaster setup on one machine, and a slave ("ns1") setup on another which has my supermaster listed. The serial for the zone was larger than 2^31 > [08:05:53] Genesis2001: also on the [supermaster], in my domains table for that domain, notified_serial is negative too > [08:05:55] Genesis2001: o.o > [08:05:58] Habbie: negative! > [08:06:10] Habbie: -1786032770 ? > [08:06:16] Genesis2001: -361450878 --- > [08:07:38] Habbie: then please file two tickets > [08:07:57] Habbie: for now i'd recommend changing your serial to something smaller than 2^31 OS: Debian OS: Version: 7.8 (Wheezy) PDNS version: 3.4.1 (wheezy-backports)
defect
domain more recent than master our serial their serial domain more recent than master our serial their serial habbie the issue is that we treat an absent domain as having serial habbie this is a bug i ve got a supermaster setup on one machine and a slave setup on another which has my supermaster listed the serial for the zone was larger than also on the in my domains table for that domain notified serial is negative too o o habbie negative habbie habbie then please file two tickets habbie for now i d recommend changing your serial to something smaller than os debian os version wheezy pdns version wheezy backports
1