Unnamed: 0
int64 0
832k
| id
float64 2.49B
32.1B
| type
stringclasses 1
value | created_at
stringlengths 19
19
| repo
stringlengths 5
112
| repo_url
stringlengths 34
141
| action
stringclasses 3
values | title
stringlengths 1
757
| labels
stringlengths 4
664
| body
stringlengths 3
261k
| index
stringclasses 10
values | text_combine
stringlengths 96
261k
| label
stringclasses 2
values | text
stringlengths 96
232k
| binary_label
int64 0
1
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
69,293
| 7,130,052,071
|
IssuesEvent
|
2018-01-22 03:42:14
|
TerriaJS/nationalmap
|
https://api.github.com/repos/TerriaJS/nationalmap
|
closed
|
National Map v2018-01-18 pre-release test - All links for CMAR - CSIRO Marine and atmospheric Research Return 500 error code
|
GA-testing
|
All links under data.gov.au -> CMAR - CSIRO Marine and atmospheric Research returns an status code 500 error on the national maps app.
However the links for the Data Url (http://www.data.gov.au/dataset/australian-ship-reporting-system-and-automatic-identification-system-shipping-summari-1999-2015) and Web Map Service (WMS) URL (https://www.cmar.csiro.au/geoserver/nerp/wms) returns data indicating that the server is available.
Screenshot below

|
1.0
|
National Map v2018-01-18 pre-release test - All links for CMAR - CSIRO Marine and atmospheric Research Return 500 error code - All links under data.gov.au -> CMAR - CSIRO Marine and atmospheric Research returns an status code 500 error on the national maps app.
However the links for the Data Url (http://www.data.gov.au/dataset/australian-ship-reporting-system-and-automatic-identification-system-shipping-summari-1999-2015) and Web Map Service (WMS) URL (https://www.cmar.csiro.au/geoserver/nerp/wms) returns data indicating that the server is available.
Screenshot below

|
non_defect
|
national map pre release test all links for cmar csiro marine and atmospheric research return error code all links under data gov au cmar csiro marine and atmospheric research returns an status code error on the national maps app however the links for the data url and web map service wms url returns data indicating that the server is available screenshot below
| 0
|
15,916
| 2,869,093,983
|
IssuesEvent
|
2015-06-05 23:17:08
|
dart-lang/sdk
|
https://api.github.com/repos/dart-lang/sdk
|
closed
|
pkg/string_scanner - remove work-around for Issue 17998
|
Area-Pkg Pkg-StringScanner Priority-Unassigned Triaged Type-Defect
|
It was fixed in https://code.google.com/p/dart/source/detail?r=35368
Need to verify this fix is sufficient.
...and bump the min-SDK to 1.4
|
1.0
|
pkg/string_scanner - remove work-around for Issue 17998 - It was fixed in https://code.google.com/p/dart/source/detail?r=35368
Need to verify this fix is sufficient.
...and bump the min-SDK to 1.4
|
defect
|
pkg string scanner remove work around for issue it was fixed in need to verify this fix is sufficient and bump the min sdk to
| 1
|
41,591
| 5,344,975,603
|
IssuesEvent
|
2017-02-17 15:51:35
|
jolocom/little-sister
|
https://api.github.com/repos/jolocom/little-sister
|
closed
|
Linking: Bi-directional to writable node (depends #73)
|
designing
|
When I'm trying to link to a node that I have write access to I would like to be offered bi-directional predicates. As a result the target node will link back to the source node.
_Example_: I have created a node with an image. Now I want to link it to the ouishare event node. As I have write access to that node I can create the link with the bi-directional predicate "relates to". Other users that browser the event node can now see that my image node linked to it.
**Acceptance Critieria**
1. When I create a link as implemented between a source node I have write access to and a target node that I have write access to, the predicate form now also allows me to choose bi-directional predicates
2. After creating the link I can now browser to the target node and see that it links back to the source node.
|
1.0
|
Linking: Bi-directional to writable node (depends #73) - When I'm trying to link to a node that I have write access to I would like to be offered bi-directional predicates. As a result the target node will link back to the source node.
_Example_: I have created a node with an image. Now I want to link it to the ouishare event node. As I have write access to that node I can create the link with the bi-directional predicate "relates to". Other users that browser the event node can now see that my image node linked to it.
**Acceptance Critieria**
1. When I create a link as implemented between a source node I have write access to and a target node that I have write access to, the predicate form now also allows me to choose bi-directional predicates
2. After creating the link I can now browser to the target node and see that it links back to the source node.
|
non_defect
|
linking bi directional to writable node depends when i m trying to link to a node that i have write access to i would like to be offered bi directional predicates as a result the target node will link back to the source node example i have created a node with an image now i want to link it to the ouishare event node as i have write access to that node i can create the link with the bi directional predicate relates to other users that browser the event node can now see that my image node linked to it acceptance critieria when i create a link as implemented between a source node i have write access to and a target node that i have write access to the predicate form now also allows me to choose bi directional predicates after creating the link i can now browser to the target node and see that it links back to the source node
| 0
|
10,416
| 2,622,151,372
|
IssuesEvent
|
2015-03-04 00:06:17
|
byzhang/lh-vim
|
https://api.github.com/repos/byzhang/lh-vim
|
closed
|
Template surrounding is called multiple times
|
auto-migrated muTemplate Priority-Medium Type-Defect
|
```
What steps will reproduce the problem?
1. open a C++ file with several lines of codes
1. select several lines
2. Execute a template-file
3. Enter the template-file name "group" or "if"
What is the expected output?
The user is requested to enter the name of the template-file once
What do you see instead?
The user is requested once per line selected
```
Original issue reported on code.google.com by `luc.herm...@gmail.com` on 3 Apr 2012 at 5:49
|
1.0
|
Template surrounding is called multiple times - ```
What steps will reproduce the problem?
1. open a C++ file with several lines of codes
1. select several lines
2. Execute a template-file
3. Enter the template-file name "group" or "if"
What is the expected output?
The user is requested to enter the name of the template-file once
What do you see instead?
The user is requested once per line selected
```
Original issue reported on code.google.com by `luc.herm...@gmail.com` on 3 Apr 2012 at 5:49
|
defect
|
template surrounding is called multiple times what steps will reproduce the problem open a c file with several lines of codes select several lines execute a template file enter the template file name group or if what is the expected output the user is requested to enter the name of the template file once what do you see instead the user is requested once per line selected original issue reported on code google com by luc herm gmail com on apr at
| 1
|
57,579
| 15,866,607,337
|
IssuesEvent
|
2021-04-08 15:55:56
|
jOOQ/jOOQ
|
https://api.github.com/repos/jOOQ/jOOQ
|
closed
|
ROWNUM transformation should avoid creating derived tables if possible
|
C: Translator E: Enterprise Edition E: Professional Edition P: Medium R: Fixed T: Defect
|
The `ROWNUM` to `LIMIT` transformation creates derived tables for `ROWNUM <op> N` predicates to make sure the predicate is evaluated first, before all the other clauses of a `SELECT` statement, including e.g. `GROUP BY`, `DISTINCT`, `ORDER BY`, etc. This is just how `ROWNUM` filtering works. It's usually not what users want (filtering out random N rows), but that's how it works.
Unfortunately, if we create a derived table and don't have any meta data, then we get this behaviour:
```sql
-- Input
select a, b from t, u where rownum <= 10;
-- Output on the current 3.15.0-SNAPSHOT
select a, b from (select * from t, u limit 10) t;
```
The output is now invalid if `t` and `u` contain ambiguous column names. In this particular case, we could avoid the derived table, namely when there are no other clauses between `WHERE` and `LIMIT`, i.e. the query simply contains:
- A `FROM` clause with any number of joins
- A `WHERE` clause with the `ROWNUM` predicate
- A simple projection (`SELECT` clause) without any aggregate functions or window functions
Or, in other words, the query must not contain:
- `CONNECT BY`
- `GROUP BY` (including implied aggregation due to aggregate function presence)
- `HAVING`
- `WINDOW` (including implied windowing due to window function presence)
- `QUALIFY`
- `DISTINCT`
- `ORDER BY`
If those conditions are not satisfied, we cannot do much and need to rely on users providing meta data using a `MetaProvider`.
|
1.0
|
ROWNUM transformation should avoid creating derived tables if possible - The `ROWNUM` to `LIMIT` transformation creates derived tables for `ROWNUM <op> N` predicates to make sure the predicate is evaluated first, before all the other clauses of a `SELECT` statement, including e.g. `GROUP BY`, `DISTINCT`, `ORDER BY`, etc. This is just how `ROWNUM` filtering works. It's usually not what users want (filtering out random N rows), but that's how it works.
Unfortunately, if we create a derived table and don't have any meta data, then we get this behaviour:
```sql
-- Input
select a, b from t, u where rownum <= 10;
-- Output on the current 3.15.0-SNAPSHOT
select a, b from (select * from t, u limit 10) t;
```
The output is now invalid if `t` and `u` contain ambiguous column names. In this particular case, we could avoid the derived table, namely when there are no other clauses between `WHERE` and `LIMIT`, i.e. the query simply contains:
- A `FROM` clause with any number of joins
- A `WHERE` clause with the `ROWNUM` predicate
- A simple projection (`SELECT` clause) without any aggregate functions or window functions
Or, in other words, the query must not contain:
- `CONNECT BY`
- `GROUP BY` (including implied aggregation due to aggregate function presence)
- `HAVING`
- `WINDOW` (including implied windowing due to window function presence)
- `QUALIFY`
- `DISTINCT`
- `ORDER BY`
If those conditions are not satisfied, we cannot do much and need to rely on users providing meta data using a `MetaProvider`.
|
defect
|
rownum transformation should avoid creating derived tables if possible the rownum to limit transformation creates derived tables for rownum n predicates to make sure the predicate is evaluated first before all the other clauses of a select statement including e g group by distinct order by etc this is just how rownum filtering works it s usually not what users want filtering out random n rows but that s how it works unfortunately if we create a derived table and don t have any meta data then we get this behaviour sql input select a b from t u where rownum output on the current snapshot select a b from select from t u limit t the output is now invalid if t and u contain ambiguous column names in this particular case we could avoid the derived table namely when there are no other clauses between where and limit i e the query simply contains a from clause with any number of joins a where clause with the rownum predicate a simple projection select clause without any aggregate functions or window functions or in other words the query must not contain connect by group by including implied aggregation due to aggregate function presence having window including implied windowing due to window function presence qualify distinct order by if those conditions are not satisfied we cannot do much and need to rely on users providing meta data using a metaprovider
| 1
|
20,502
| 3,368,361,960
|
IssuesEvent
|
2015-11-22 22:18:26
|
libkml/libkml
|
https://api.github.com/repos/libkml/libkml
|
closed
|
Java UnsatisfiedLinkError
|
auto-migrated Priority-Medium Type-Defect
|
```
What steps will reproduce the problem?
1. Installed from svn revision 148
2. Created package libkml of src/swig/*.java
3. Compiled example java application CreatePlacemark.java from examples,
after importing libkml.*
4. Ran into following exception.
Exception in thread "main" java.lang.UnsatisfiedLinkError:
libkml.kmldomJNI.KmlFactory_GetFactory()J
at libkml.kmldomJNI.KmlFactory_GetFactory(Native Method)
at libkml.KmlFactory.GetFactory(KmlFactory.java:44)
at kmlapp.CreatePlacemark.main(CreatePlacemark.java:46)
Linux x64
Java 1.6.0_06 x64
```
Original issue reported on code.google.com by `dleif...@gmail.com` on 2 Jul 2008 at 6:43
Attachments:
* [libkml.jar](https://storage.googleapis.com/google-code-attachments/libkml/issue-15/comment-0/libkml.jar)
|
1.0
|
Java UnsatisfiedLinkError - ```
What steps will reproduce the problem?
1. Installed from svn revision 148
2. Created package libkml of src/swig/*.java
3. Compiled example java application CreatePlacemark.java from examples,
after importing libkml.*
4. Ran into following exception.
Exception in thread "main" java.lang.UnsatisfiedLinkError:
libkml.kmldomJNI.KmlFactory_GetFactory()J
at libkml.kmldomJNI.KmlFactory_GetFactory(Native Method)
at libkml.KmlFactory.GetFactory(KmlFactory.java:44)
at kmlapp.CreatePlacemark.main(CreatePlacemark.java:46)
Linux x64
Java 1.6.0_06 x64
```
Original issue reported on code.google.com by `dleif...@gmail.com` on 2 Jul 2008 at 6:43
Attachments:
* [libkml.jar](https://storage.googleapis.com/google-code-attachments/libkml/issue-15/comment-0/libkml.jar)
|
defect
|
java unsatisfiedlinkerror what steps will reproduce the problem installed from svn revision created package libkml of src swig java compiled example java application createplacemark java from examples after importing libkml ran into following exception exception in thread main java lang unsatisfiedlinkerror libkml kmldomjni kmlfactory getfactory j at libkml kmldomjni kmlfactory getfactory native method at libkml kmlfactory getfactory kmlfactory java at kmlapp createplacemark main createplacemark java linux java original issue reported on code google com by dleif gmail com on jul at attachments
| 1
|
308,948
| 26,640,158,723
|
IssuesEvent
|
2023-01-25 03:26:15
|
cockroachdb/cockroach
|
https://api.github.com/repos/cockroachdb/cockroach
|
reopened
|
roachtest: cdc/pubsub-sink/assume-role failed
|
C-test-failure O-robot O-roachtest release-blocker T-cdc branch-release-22.2
|
roachtest.cdc/pubsub-sink/assume-role [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/6549193?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/6549193?buildTab=artifacts#/cdc/pubsub-sink/assume-role) on release-22.2 @ [ac55929f9367f7dee41118f95d07a17b667b4d50](https://github.com/cockroachdb/cockroach/commits/ac55929f9367f7dee41118f95d07a17b667b4d50):
```
test artifacts and logs in: /artifacts/cdc/pubsub-sink/assume-role/run_1
monitor.go:127,cdc.go:300,cdc.go:820,test_runner.go:908: monitor failure: monitor task failed: dial tcp 34.138.157.171:26257: connect: connection refused
(1) attached stack trace
-- stack trace:
| main.(*monitorImpl).WaitE
| main/pkg/cmd/roachtest/monitor.go:115
| main.(*monitorImpl).Wait
| main/pkg/cmd/roachtest/monitor.go:123
| github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.cdcBasicTest
| github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/cdc.go:300
| github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.registerCDC.func9
| github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/cdc.go:820
| [...repeated from below...]
Wraps: (2) monitor failure
Wraps: (3) attached stack trace
-- stack trace:
| main.(*monitorImpl).wait.func2
| main/pkg/cmd/roachtest/monitor.go:171
| runtime.goexit
| GOROOT/src/runtime/asm_amd64.s:1594
Wraps: (4) monitor task failed
Wraps: (5) dial tcp 34.138.157.171:26257
Wraps: (6) connect
Wraps: (7) connection refused
Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *withstack.withStack (4) *errutil.withPrefix (5) *net.OpError (6) *os.SyscallError (7) syscall.Errno
test_runner.go:1039,test_runner.go:938: test timed out (0s)
```
<p>Parameters: <code>ROACHTEST_cloud=gce</code>
, <code>ROACHTEST_cpu=16</code>
, <code>ROACHTEST_ssd=0</code>
</p>
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
<details><summary>Same failure on other branches</summary>
<p>
- #85374 roachtest: cdc/pubsub-sink/assume-role failed [C-test-failure O-roachtest O-robot T-cdc branch-master]
</p>
</details>
/cc @cockroachdb/cdc
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*cdc/pubsub-sink/assume-role.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
Jira issue: CRDB-19788
|
2.0
|
roachtest: cdc/pubsub-sink/assume-role failed - roachtest.cdc/pubsub-sink/assume-role [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/6549193?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/6549193?buildTab=artifacts#/cdc/pubsub-sink/assume-role) on release-22.2 @ [ac55929f9367f7dee41118f95d07a17b667b4d50](https://github.com/cockroachdb/cockroach/commits/ac55929f9367f7dee41118f95d07a17b667b4d50):
```
test artifacts and logs in: /artifacts/cdc/pubsub-sink/assume-role/run_1
monitor.go:127,cdc.go:300,cdc.go:820,test_runner.go:908: monitor failure: monitor task failed: dial tcp 34.138.157.171:26257: connect: connection refused
(1) attached stack trace
-- stack trace:
| main.(*monitorImpl).WaitE
| main/pkg/cmd/roachtest/monitor.go:115
| main.(*monitorImpl).Wait
| main/pkg/cmd/roachtest/monitor.go:123
| github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.cdcBasicTest
| github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/cdc.go:300
| github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.registerCDC.func9
| github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/cdc.go:820
| [...repeated from below...]
Wraps: (2) monitor failure
Wraps: (3) attached stack trace
-- stack trace:
| main.(*monitorImpl).wait.func2
| main/pkg/cmd/roachtest/monitor.go:171
| runtime.goexit
| GOROOT/src/runtime/asm_amd64.s:1594
Wraps: (4) monitor task failed
Wraps: (5) dial tcp 34.138.157.171:26257
Wraps: (6) connect
Wraps: (7) connection refused
Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *withstack.withStack (4) *errutil.withPrefix (5) *net.OpError (6) *os.SyscallError (7) syscall.Errno
test_runner.go:1039,test_runner.go:938: test timed out (0s)
```
<p>Parameters: <code>ROACHTEST_cloud=gce</code>
, <code>ROACHTEST_cpu=16</code>
, <code>ROACHTEST_ssd=0</code>
</p>
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
<details><summary>Same failure on other branches</summary>
<p>
- #85374 roachtest: cdc/pubsub-sink/assume-role failed [C-test-failure O-roachtest O-robot T-cdc branch-master]
</p>
</details>
/cc @cockroachdb/cdc
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*cdc/pubsub-sink/assume-role.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
Jira issue: CRDB-19788
|
non_defect
|
roachtest cdc pubsub sink assume role failed roachtest cdc pubsub sink assume role with on release test artifacts and logs in artifacts cdc pubsub sink assume role run monitor go cdc go cdc go test runner go monitor failure monitor task failed dial tcp connect connection refused attached stack trace stack trace main monitorimpl waite main pkg cmd roachtest monitor go main monitorimpl wait main pkg cmd roachtest monitor go github com cockroachdb cockroach pkg cmd roachtest tests cdcbasictest github com cockroachdb cockroach pkg cmd roachtest tests cdc go github com cockroachdb cockroach pkg cmd roachtest tests registercdc github com cockroachdb cockroach pkg cmd roachtest tests cdc go wraps monitor failure wraps attached stack trace stack trace main monitorimpl wait main pkg cmd roachtest monitor go runtime goexit goroot src runtime asm s wraps monitor task failed wraps dial tcp wraps connect wraps connection refused error types withstack withstack errutil withprefix withstack withstack errutil withprefix net operror os syscallerror syscall errno test runner go test runner go test timed out parameters roachtest cloud gce roachtest cpu roachtest ssd help see see same failure on other branches roachtest cdc pubsub sink assume role failed cc cockroachdb cdc jira issue crdb
| 0
|
13,286
| 2,744,599,845
|
IssuesEvent
|
2015-04-22 08:43:16
|
cakephp/cakephp
|
https://api.github.com/repos/cakephp/cakephp
|
closed
|
UUID Fields with Binary(36) are not handled correct
|
Defect
|
I found two solutions.
First I changed the type detection in MysqlSchema.php to match all binary 36 to UUID, which i dont like.
Second solution was to return unconverted strings in the BinaryType.php if they already match to a UUID.
I attached both patches
```
--- src/Database/Schema/MysqlSchema.php (revision d77ffad6ee45aa0edf5d3b4bf8ed32f94d7ae5ce)
+++ src/Database/Schema/MysqlSchema.php (revision )
@@ -110,6 +110,9 @@
if ($col === 'char' && $length === 36) {
return ['type' => 'uuid', 'length' => null];
}
+ if ($col === 'binary' && $length === 36) {
+ return ['type' => 'uuid', 'length' => null];
+ }
if ($col === 'char') {
return ['type' => 'string', 'fixed' => true, 'length' => $length];
}
```
```
--- src/Database/Type/BinaryType.php (revision d77ffad6ee45aa0edf5d3b4bf8ed32f94d7ae5ce)
+++ src/Database/Type/BinaryType.php (revision )
@@ -56,6 +56,10 @@
return null;
}
if (is_string($value)) {
+ // return string if it matches to a uuid
+ if(preg_match('/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/i', $value)) {
+ return $value;
+ }
return fopen('data:text/plain;base64,' . base64_encode($value), 'rb');
}
if (is_resource($value)) {
```
|
1.0
|
UUID Fields with Binary(36) are not handled correct - I found two solutions.
First I changed the type detection in MysqlSchema.php to match all binary 36 to UUID, which i dont like.
Second solution was to return unconverted strings in the BinaryType.php if they already match to a UUID.
I attached both patches
```
--- src/Database/Schema/MysqlSchema.php (revision d77ffad6ee45aa0edf5d3b4bf8ed32f94d7ae5ce)
+++ src/Database/Schema/MysqlSchema.php (revision )
@@ -110,6 +110,9 @@
if ($col === 'char' && $length === 36) {
return ['type' => 'uuid', 'length' => null];
}
+ if ($col === 'binary' && $length === 36) {
+ return ['type' => 'uuid', 'length' => null];
+ }
if ($col === 'char') {
return ['type' => 'string', 'fixed' => true, 'length' => $length];
}
```
```
--- src/Database/Type/BinaryType.php (revision d77ffad6ee45aa0edf5d3b4bf8ed32f94d7ae5ce)
+++ src/Database/Type/BinaryType.php (revision )
@@ -56,6 +56,10 @@
return null;
}
if (is_string($value)) {
+ // return string if it matches to a uuid
+ if(preg_match('/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/i', $value)) {
+ return $value;
+ }
return fopen('data:text/plain;base64,' . base64_encode($value), 'rb');
}
if (is_resource($value)) {
```
|
defect
|
uuid fields with binary are not handled correct i found two solutions first i changed the type detection in mysqlschema php to match all binary to uuid which i dont like second solution was to return unconverted strings in the binarytype php if they already match to a uuid i attached both patches src database schema mysqlschema php revision src database schema mysqlschema php revision if col char length return if col binary length return if col char return src database type binarytype php revision src database type binarytype php revision return null if is string value return string if it matches to a uuid if preg match i value return value return fopen data text plain encode value rb if is resource value
| 1
|
32,081
| 6,711,196,404
|
IssuesEvent
|
2017-10-13 02:09:26
|
vim/vim
|
https://api.github.com/repos/vim/vim
|
closed
|
Windows gui: window position is changed when invoking :vert & :tab under certain conditions
|
auto-migrated defect platform-windows Priority-Medium
|
```
I sometimes use gvim 7.3 @ win7 (64 bit). When I move the gvim window by means
of the <windows-key + left/right> key combination to the left or right half of
the screen, it seems gvim doesn't properly notice this change. When I invoke
any command with :vert prepended (e.g. :vert split), gvim moves the gvim window
back to the previous position on the screen.
Steps:
1. Open gvim -> gvim window opens at position #1
2. Press <windows-left> -> gvim window is moved to the left (position #2)
3. Type :vert split
Result: The gvim window is back at position #1.
This problem seems to affect only the win gui. At least with gnome/gtk
everything seems ok.
The problem also affects :tab-related commands. It was verified by a user. See
https://groups.google.com/d/topic/vim_dev/MiKswL7hN6E/discussion
```
Original issue reported on code.google.com by `minilith` on 13 Mar 2013 at 8:19
|
1.0
|
Windows gui: window position is changed when invoking :vert & :tab under certain conditions - ```
I sometimes use gvim 7.3 @ win7 (64 bit). When I move the gvim window by means
of the <windows-key + left/right> key combination to the left or right half of
the screen, it seems gvim doesn't properly notice this change. When I invoke
any command with :vert prepended (e.g. :vert split), gvim moves the gvim window
back to the previous position on the screen.
Steps:
1. Open gvim -> gvim window opens at position #1
2. Press <windows-left> -> gvim window is moved to the left (position #2)
3. Type :vert split
Result: The gvim window is back at position #1.
This problem seems to affect only the win gui. At least with gnome/gtk
everything seems ok.
The problem also affects :tab-related commands. It was verified by a user. See
https://groups.google.com/d/topic/vim_dev/MiKswL7hN6E/discussion
```
Original issue reported on code.google.com by `minilith` on 13 Mar 2013 at 8:19
|
defect
|
windows gui window position is changed when invoking vert tab under certain conditions i sometimes use gvim bit when i move the gvim window by means of the key combination to the left or right half of the screen it seems gvim doesn t properly notice this change when i invoke any command with vert prepended e g vert split gvim moves the gvim window back to the previous position on the screen steps open gvim gvim window opens at position press gvim window is moved to the left position type vert split result the gvim window is back at position this problem seems to affect only the win gui at least with gnome gtk everything seems ok the problem also affects tab related commands it was verified by a user see original issue reported on code google com by minilith on mar at
| 1
|
118,259
| 11,965,165,667
|
IssuesEvent
|
2020-04-05 22:16:36
|
oneleif/olWebsite-React
|
https://api.github.com/repos/oneleif/olWebsite-React
|
opened
|
Add Documentation to CSS standards for Design System
|
documentation
|
This will need to include the information about the font sizes and how we set those globally and per module. Also about the breakpoints set by UX and how we use the variables through out the application.
This information can be found on our notion: https://www.notion.so/oneleif/Design-System-365df542738544e383f6a1ad70c448b2
|
1.0
|
Add Documentation to CSS standards for Design System - This will need to include the information about the font sizes and how we set those globally and per module. Also about the breakpoints set by UX and how we use the variables through out the application.
This information can be found on our notion: https://www.notion.so/oneleif/Design-System-365df542738544e383f6a1ad70c448b2
|
non_defect
|
add documentation to css standards for design system this will need to include the information about the font sizes and how we set those globally and per module also about the breakpoints set by ux and how we use the variables through out the application this information can be found on our notion
| 0
|
13,725
| 2,776,595,483
|
IssuesEvent
|
2015-05-04 22:43:12
|
umutafacan/bounswe2015group3
|
https://api.github.com/repos/umutafacan/bounswe2015group3
|
reopened
|
editing of user stories
|
auto-migrated Priority-Medium Type-Defect
|
```
i will write many user stories
```
Original issue reported on code.google.com by `bunyamin...@gmail.com` on 7 Mar 2015 at 4:31
|
1.0
|
editing of user stories - ```
i will write many user stories
```
Original issue reported on code.google.com by `bunyamin...@gmail.com` on 7 Mar 2015 at 4:31
|
defect
|
editing of user stories i will write many user stories original issue reported on code google com by bunyamin gmail com on mar at
| 1
|
16,897
| 2,957,636,938
|
IssuesEvent
|
2015-07-08 17:20:06
|
master801/PS-64
|
https://api.github.com/repos/master801/PS-64
|
closed
|
Re-enable USB support via Homebrew Channel?
|
auto-migrated Priority-Medium Type-Defect
|
```
What steps will reproduce the problem?
1. Load Homebrew Channel 1.0.8
2. Load Wii64 Beta 1.1
3. Select USB device
What is the expected output? What do you see instead?
Wii64 cannot find my USB device "can't find usb:/wii64/roms"
What version of the product are you using? On which system and loader?
Wii64 Beta 1.1, HBC 1.0.8, System Menu 4.3,
Please provide any additional information below.
I can't play any ROMs off of my USB device. I think it's because the new
Homebrew Channel uses IOS58, which came out a little while ago, so wii64
doesn't support it. Can anyone fix this, or has a suggestion to fix this?
```
Original issue reported on code.google.com by `joshbick...@comcast.net` on 4 Dec 2010 at 4:22
|
1.0
|
Re-enable USB support via Homebrew Channel? - ```
What steps will reproduce the problem?
1. Load Homebrew Channel 1.0.8
2. Load Wii64 Beta 1.1
3. Select USB device
What is the expected output? What do you see instead?
Wii64 cannot find my USB device "can't find usb:/wii64/roms"
What version of the product are you using? On which system and loader?
Wii64 Beta 1.1, HBC 1.0.8, System Menu 4.3,
Please provide any additional information below.
I can't play any ROMs off of my USB device. I think it's because the new
Homebrew Channel uses IOS58, which came out a little while ago, so wii64
doesn't support it. Can anyone fix this, or has a suggestion to fix this?
```
Original issue reported on code.google.com by `joshbick...@comcast.net` on 4 Dec 2010 at 4:22
|
defect
|
re enable usb support via homebrew channel what steps will reproduce the problem load homebrew channel load beta select usb device what is the expected output what do you see instead cannot find my usb device can t find usb roms what version of the product are you using on which system and loader beta hbc system menu please provide any additional information below i can t play any roms off of my usb device i think it s because the new homebrew channel uses which came out a little while ago so doesn t support it can anyone fix this or has a suggestion to fix this original issue reported on code google com by joshbick comcast net on dec at
| 1
|
61,566
| 17,023,727,448
|
IssuesEvent
|
2021-07-03 03:31:11
|
tomhughes/trac-tickets
|
https://api.github.com/repos/tomhughes/trac-tickets
|
closed
|
Erroneous values for segregated cycleways in map features
|
Component: potlatch2 Priority: minor Resolution: fixed Type: defect
|
**[Submitted to the original trac issue database at 9.33am, Tuesday, 28th June 2011]**
The value range currently shown in the simple editor for key:cycleway are (no, lane, track, opposite_lane, opposite_track, opposite, segregated and shared) with the two latter selectable for ways tagged as highway=cycleway and the other values possible to set for roads (i.e. highway=residential).
The proper (according to the wiki and tag usage(ref 1),(ref 2)) way of tagging a segregated cycleway is by using segregated=yes/no.
**The following excerpt from map_features/paths.xml should be changed:**
<input type="choice" name="Cycleway type" category="Cycle" description="What kind of bike path is this?" key="cycleway" presence="onTagMatch" priority="low">
<choice value="segregated" text="Segregated" description="Cyclists and pedestrians are separated by a painted line or kerb." />
<choice value="shared" text="Shared" description="Cyclists and pedestrians share the full width of the path." />
</input>
**to:**
<input type="choice" name="Cycleway type" category="Cycle" description="What kind of bike path is this?" key="segregated" presence="onTagMatch" priority="low">
<choice value="yes" text="Segregated" description="Cyclists and pedestrians are separated by a painted line or kerb." />
<choice value="no" text="Shared" description="Cyclists and pedestrians share the full width of the path." />
</input>
(1) http://tagstat.telascience.org/tagdetails.php?tag=segregated
(2) http://tagstat.telascience.org/tagvaluedetails.php?tag=cycleway&value=segregated and http://tagstat.telascience.org/tagvaluedetails.php?tag=cycleway&value=shared
|
1.0
|
Erroneous values for segregated cycleways in map features - **[Submitted to the original trac issue database at 9.33am, Tuesday, 28th June 2011]**
The value range currently shown in the simple editor for key:cycleway are (no, lane, track, opposite_lane, opposite_track, opposite, segregated and shared) with the two latter selectable for ways tagged as highway=cycleway and the other values possible to set for roads (i.e. highway=residential).
The proper (according to the wiki and tag usage(ref 1),(ref 2)) way of tagging a segregated cycleway is by using segregated=yes/no.
**The following excerpt from map_features/paths.xml should be changed:**
<input type="choice" name="Cycleway type" category="Cycle" description="What kind of bike path is this?" key="cycleway" presence="onTagMatch" priority="low">
<choice value="segregated" text="Segregated" description="Cyclists and pedestrians are separated by a painted line or kerb." />
<choice value="shared" text="Shared" description="Cyclists and pedestrians share the full width of the path." />
</input>
**to:**
<input type="choice" name="Cycleway type" category="Cycle" description="What kind of bike path is this?" key="segregated" presence="onTagMatch" priority="low">
<choice value="yes" text="Segregated" description="Cyclists and pedestrians are separated by a painted line or kerb." />
<choice value="no" text="Shared" description="Cyclists and pedestrians share the full width of the path." />
</input>
(1) http://tagstat.telascience.org/tagdetails.php?tag=segregated
(2) http://tagstat.telascience.org/tagvaluedetails.php?tag=cycleway&value=segregated and http://tagstat.telascience.org/tagvaluedetails.php?tag=cycleway&value=shared
|
defect
|
erroneous values for segregated cycleways in map features the value range currently shown in the simple editor for key cycleway are no lane track opposite lane opposite track opposite segregated and shared with the two latter selectable for ways tagged as highway cycleway and the other values possible to set for roads i e highway residential the proper according to the wiki and tag usage ref ref way of tagging a segregated cycleway is by using segregated yes no the following excerpt from map features paths xml should be changed to and
| 1
|
190,185
| 22,047,308,050
|
IssuesEvent
|
2022-05-30 04:15:56
|
pazhanivel07/linux-4.19.72
|
https://api.github.com/repos/pazhanivel07/linux-4.19.72
|
closed
|
WS-2021-0274 (High) detected in linux-yoctov5.4.51 - autoclosed
|
security vulnerability
|
## WS-2021-0274 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary>
<p>
<p>Yocto Linux Embedded kernel</p>
<p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto>https://git.yoctoproject.org/git/linux-yocto</a></p>
<p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/linux-4.19.72/commit/ce28e4f7a922d93d9b737061ae46827305c8c30a">ce28e4f7a922d93d9b737061ae46827305c8c30a</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/lib/seq_buf.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/lib/seq_buf.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Linux/Kernel in versions v5.13-rc1 to v5.13.2 is vulnerable to overflow in seq_buf_putmem_hex()
<p>Publish Date: 2021-05-31
<p>URL: <a href=https://github.com/gregkh/linux/commit/d57fcab190b60f43046d5836c3c56114b4f50080>WS-2021-0274</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://osv.dev/vulnerability/UVI-2021-1001222">https://osv.dev/vulnerability/UVI-2021-1001222</a></p>
<p>Release Date: 2021-05-31</p>
<p>Fix Resolution: v5.13.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
WS-2021-0274 (High) detected in linux-yoctov5.4.51 - autoclosed - ## WS-2021-0274 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary>
<p>
<p>Yocto Linux Embedded kernel</p>
<p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto>https://git.yoctoproject.org/git/linux-yocto</a></p>
<p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/linux-4.19.72/commit/ce28e4f7a922d93d9b737061ae46827305c8c30a">ce28e4f7a922d93d9b737061ae46827305c8c30a</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/lib/seq_buf.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/lib/seq_buf.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Linux/Kernel in versions v5.13-rc1 to v5.13.2 is vulnerable to overflow in seq_buf_putmem_hex()
<p>Publish Date: 2021-05-31
<p>URL: <a href=https://github.com/gregkh/linux/commit/d57fcab190b60f43046d5836c3c56114b4f50080>WS-2021-0274</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://osv.dev/vulnerability/UVI-2021-1001222">https://osv.dev/vulnerability/UVI-2021-1001222</a></p>
<p>Release Date: 2021-05-31</p>
<p>Fix Resolution: v5.13.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
ws high detected in linux autoclosed ws high severity vulnerability vulnerable library linux yocto linux embedded kernel library home page a href found in head commit a href found in base branch master vulnerable source files lib seq buf c lib seq buf c vulnerability details linux kernel in versions to is vulnerable to overflow in seq buf putmem hex publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
| 0
|
58,619
| 16,654,026,118
|
IssuesEvent
|
2021-06-05 07:17:52
|
Questie/Questie
|
https://api.github.com/repos/Questie/Questie
|
opened
|
Horde Quest "Trial and Error" giving out Lua Error
|
Type - Defect
|
Hello,
doing the Horde Quest "Trial and Error" Questie is throwing me the following Error Message in Chat, while still being functional:
[09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:690: bad argument #1 to 'next' (table expected, got nil)
[09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554>
[string "=[C]"]: in function `next'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:690: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683>
[string "=[C]"]: in function `xpcall'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest'
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103>
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes'
[string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278>
[string "=[C]"]: ?
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71>
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func'
[string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50>
[09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:690: bad argument #1 to 'next' (table expected, got nil)
[09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554>
[string "=[C]"]: in function `next'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:690: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683>
[string "=[C]"]: in function `xpcall'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest'
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103>
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes'
[string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278>
[string "=[C]"]: ?
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71>
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func'
[string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50>
[09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:690: bad argument #1 to 'next' (table expected, got nil)
[09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554>
[string "=[C]"]: in function `next'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:690: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683>
[string "=[C]"]: in function `xpcall'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest'
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103>
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes'
[string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278>
[string "=[C]"]: ?
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71>
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func'
[string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50>
[09:10] Questie: [ERROR] [QuestieQuest]: [Tooltips] There was an error populating objectives for Test the fourth wand 10566 0 No error
[09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:773: bad argument #1 to 'next' (table expected, got nil)
[09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554>
[string "=[C]"]: in function `next'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:773: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:772>
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:710: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683>
[string "=[C]"]: in function `xpcall'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest'
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103>
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes'
[string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278>
[string "=[C]"]: ?
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71>
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func'
[string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50>
Im using Version 6.3.14 and hope this helps you to find the bug.
Greetings,
Prefo
|
1.0
|
Horde Quest "Trial and Error" giving out Lua Error - Hello,
doing the Horde Quest "Trial and Error" Questie is throwing me the following Error Message in Chat, while still being functional:
[09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:690: bad argument #1 to 'next' (table expected, got nil)
[09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554>
[string "=[C]"]: in function `next'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:690: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683>
[string "=[C]"]: in function `xpcall'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest'
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103>
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes'
[string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278>
[string "=[C]"]: ?
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71>
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func'
[string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50>
[09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:690: bad argument #1 to 'next' (table expected, got nil)
[09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554>
[string "=[C]"]: in function `next'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:690: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683>
[string "=[C]"]: in function `xpcall'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest'
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103>
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes'
[string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278>
[string "=[C]"]: ?
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71>
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func'
[string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50>
[09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:690: bad argument #1 to 'next' (table expected, got nil)
[09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554>
[string "=[C]"]: in function `next'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:690: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683>
[string "=[C]"]: in function `xpcall'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest'
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103>
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes'
[string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278>
[string "=[C]"]: ?
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71>
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func'
[string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50>
[09:10] Questie: [ERROR] [QuestieQuest]: [Tooltips] There was an error populating objectives for Test the fourth wand 10566 0 No error
[09:10] ...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:773: bad argument #1 to 'next' (table expected, got nil)
[09:10] [string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:556: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:554>
[string "=[C]"]: in function `next'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:773: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:772>
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:710: in function <...erface\AddOns\Questie\Modules\Quest\QuestieQuest.lua:683>
[string "=[C]"]: in function `xpcall'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:554: in function `UpdateObjectiveNotes'
[string "@Interface\AddOns\Questie\Modules\Quest\QuestieQuest.lua"]:469: in function `UpdateQuest'
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:108: in function <...nterface\AddOns\Questie\Modules\Libs\QuestieHash.lua:103>
[string "@Interface\AddOns\Questie\Modules\Libs\QuestieHash.lua"]:91: in function `CompareQuestHashes'
[string "@Interface\AddOns\Questie\Modules\QuestieEventHandler.lua"]:296: in function <...rface\AddOns\Questie\Modules\QuestieEventHandler.lua:278>
[string "=[C]"]: ?
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:73: in function <...\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua:71>
[string "@Interface\AddOns\Questie\Libs\AceBucket-3.0\AceBucket-3.0.lua"]:89: in function `func'
[string "@Interface\AddOns\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua"]:57: in function <...s\ElvUI\Libraries\Ace3\AceTimer-3.0\AceTimer-3.0.lua:50>
Im using Version 6.3.14 and hope this helps you to find the bug.
Greetings,
Prefo
|
defect
|
horde quest trial and error giving out lua error hello doing the horde quest trial and error questie is throwing me the following error message in chat while still being functional erface addons questie modules quest questiequest lua bad argument to next table expected got nil in function in function next in function in function xpcall in function updateobjectivenotes in function updatequest in function in function comparequesthashes in function in function in function func in function erface addons questie modules quest questiequest lua bad argument to next table expected got nil in function in function next in function in function xpcall in function updateobjectivenotes in function updatequest in function in function comparequesthashes in function in function in function func in function erface addons questie modules quest questiequest lua bad argument to next table expected got nil in function in function next in function in function xpcall in function updateobjectivenotes in function updatequest in function in function comparequesthashes in function in function in function func in function questie there was an error populating objectives for test the fourth wand no error erface addons questie modules quest questiequest lua bad argument to next table expected got nil in function in function next in function in function in function xpcall in function updateobjectivenotes in function updatequest in function in function comparequesthashes in function in function in function func in function im using version and hope this helps you to find the bug greetings prefo
| 1
|
72,177
| 23,975,698,125
|
IssuesEvent
|
2022-09-13 11:24:54
|
BOINC/boinc
|
https://api.github.com/repos/BOINC/boinc
|
closed
|
BOINC 7.18.1 (Ubuntu) finally halts/crashes, when not able to report finished WU's.
|
C: Client - Daemon P: Minor R: fixed T: Defect
|
**Describe the bug**
Too many unreported WU's causes a crash.
**Steps To Reproduce**
1. (_A_) Project down due to crash, support etc.
2. BOINC not able to report finished WU's, keeping those as open files (_why?_), ready to send.
3. When using, like in this case, a [_preferably fast_] computer with many cores/threads, including a large buffer (_10+10 days_), a great number of WU's are stored locally on the computer. At some point, a (_unknown_) number of finished WU's will finally generate a '_too many open files_' error, halting BOINC completly.
4. At this point, a huge number of empty '_http_temp_nn_' files has been generated. As I have experienced this before (_even in Windows_), I've noticed that the number of those temp files varies when crashing. This time 554 and earlier sometimes above 20 000.
**Screenshots -> BOINC status output**
Kronos:~# /etc/init.d/boinc-client status
● boinc-client.service - Berkeley Open Infrastructure Network Computing Client
Loaded: loaded (/lib/systemd/system/boinc-client.service; disabled; vendor preset: enabled)
Active: active (running) since Tue 2022-09-06 14:50:51 CEST; 5s ago
Docs: man:boinc(1)
Main PID: 132441 (boinc)
Tasks: 2 (limit: 309230)
Memory: 120.1M
CPU: 2.340s
CGroup: /system.slice/boinc-client.service
└─132441 /usr/bin/boinc
sep 06 14:50:55 Kronos boinc[132441]: dir_open: Could not open directory 'slots/44' from '/var/lib/boinc-client'.
sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [Universe@Home] Failed to open init file slots/44/init_data.xml
sep 06 14:50:56 Kronos boinc[132441]: md5_file: can't open projects/universeathome.pl_universe/BHspin2_20_x86_64-pc-linux-gnu
**sep 06 14:50:56 Kronos boinc[132441]: md5_file: Too many open files**
sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [Universe@Home] md5_file failed for projects/universeathome.pl_universe/BHspin2_20_x86_64-pc-linux-gnu: fopen() failed
sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [---] [cpu_sched_debug] Request CPU reschedule: start failed
sep 06 14:50:56 Kronos boinc[132441]: dir_open: Could not open directory 'slots/55' from '/var/lib/boinc-client'.
sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [Universe@Home] Failed to open init file slots/55/init_data.xml
sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [---] [cpu_sched_debug] Request CPU reschedule: start failed
sep 06 14:50:56 Kronos boinc[132441]: dir_open: Could not open directory 'slots/5' from '/var/lib/boinc-client'.
Kronos:~#
**System Information**
- OS: (L)Ubuntu 22.05 LTS
- BOINC Version: 7.18.1
**Additional context**
The quick fix is to remove all '_boinc_lockfile_' and '_http_temp_nn_' files plus deleting the project including all WU's (_slots_) of concern. In my case it means about two days work lost, as Universe@Home was completely shut down about 48h for unknown reason (_the info available at their forum suggests server overload, without being sure_). Restarting the project in BOINC is not possible, as no projects are visible at the project tab. I noticed something was wrong with U@H earlier today (_at work_), but couldn't do anything before being at home and it was too late ...
This issue should be an easy fix, if those files are kept closed until actually sending them (_the content_).
**EDIT**
After checking all my computers and Android devices (_mobiles and SBC's_), I found one more computer in the very same state.
|
1.0
|
BOINC 7.18.1 (Ubuntu) finally halts/crashes, when not able to report finished WU's. - **Describe the bug**
Too many unreported WU's causes a crash.
**Steps To Reproduce**
1. (_A_) Project down due to crash, support etc.
2. BOINC not able to report finished WU's, keeping those as open files (_why?_), ready to send.
3. When using, like in this case, a [_preferably fast_] computer with many cores/threads, including a large buffer (_10+10 days_), a great number of WU's are stored locally on the computer. At some point, a (_unknown_) number of finished WU's will finally generate a '_too many open files_' error, halting BOINC completly.
4. At this point, a huge number of empty '_http_temp_nn_' files has been generated. As I have experienced this before (_even in Windows_), I've noticed that the number of those temp files varies when crashing. This time 554 and earlier sometimes above 20 000.
**Screenshots -> BOINC status output**
Kronos:~# /etc/init.d/boinc-client status
● boinc-client.service - Berkeley Open Infrastructure Network Computing Client
Loaded: loaded (/lib/systemd/system/boinc-client.service; disabled; vendor preset: enabled)
Active: active (running) since Tue 2022-09-06 14:50:51 CEST; 5s ago
Docs: man:boinc(1)
Main PID: 132441 (boinc)
Tasks: 2 (limit: 309230)
Memory: 120.1M
CPU: 2.340s
CGroup: /system.slice/boinc-client.service
└─132441 /usr/bin/boinc
sep 06 14:50:55 Kronos boinc[132441]: dir_open: Could not open directory 'slots/44' from '/var/lib/boinc-client'.
sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [Universe@Home] Failed to open init file slots/44/init_data.xml
sep 06 14:50:56 Kronos boinc[132441]: md5_file: can't open projects/universeathome.pl_universe/BHspin2_20_x86_64-pc-linux-gnu
**sep 06 14:50:56 Kronos boinc[132441]: md5_file: Too many open files**
sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [Universe@Home] md5_file failed for projects/universeathome.pl_universe/BHspin2_20_x86_64-pc-linux-gnu: fopen() failed
sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [---] [cpu_sched_debug] Request CPU reschedule: start failed
sep 06 14:50:56 Kronos boinc[132441]: dir_open: Could not open directory 'slots/55' from '/var/lib/boinc-client'.
sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [Universe@Home] Failed to open init file slots/55/init_data.xml
sep 06 14:50:56 Kronos boinc[132441]: 06-Sep-2022 14:50:56 [---] [cpu_sched_debug] Request CPU reschedule: start failed
sep 06 14:50:56 Kronos boinc[132441]: dir_open: Could not open directory 'slots/5' from '/var/lib/boinc-client'.
Kronos:~#
**System Information**
- OS: (L)Ubuntu 22.05 LTS
- BOINC Version: 7.18.1
**Additional context**
The quick fix is to remove all '_boinc_lockfile_' and '_http_temp_nn_' files plus deleting the project including all WU's (_slots_) of concern. In my case it means about two days work lost, as Universe@Home was completely shut down about 48h for unknown reason (_the info available at their forum suggests server overload, without being sure_). Restarting the project in BOINC is not possible, as no projects are visible at the project tab. I noticed something was wrong with U@H earlier today (_at work_), but couldn't do anything before being at home and it was too late ...
This issue should be an easy fix, if those files are kept closed until actually sending them (_the content_).
**EDIT**
After checking all my computers and Android devices (_mobiles and SBC's_), I found one more computer in the very same state.
|
defect
|
boinc ubuntu finally halts crashes when not able to report finished wu s describe the bug too many unreported wu s causes a crash steps to reproduce a project down due to crash support etc boinc not able to report finished wu s keeping those as open files why ready to send when using like in this case a computer with many cores threads including a large buffer days a great number of wu s are stored locally on the computer at some point a unknown number of finished wu s will finally generate a too many open files error halting boinc completly at this point a huge number of empty http temp nn files has been generated as i have experienced this before even in windows i ve noticed that the number of those temp files varies when crashing this time and earlier sometimes above screenshots boinc status output kronos etc init d boinc client status ● boinc client service berkeley open infrastructure network computing client loaded loaded lib systemd system boinc client service disabled vendor preset enabled active active running since tue cest ago docs man boinc main pid boinc tasks limit memory cpu cgroup system slice boinc client service └─ usr bin boinc sep kronos boinc dir open could not open directory slots from var lib boinc client sep kronos boinc sep failed to open init file slots init data xml sep kronos boinc file can t open projects universeathome pl universe pc linux gnu sep kronos boinc file too many open files sep kronos boinc sep file failed for projects universeathome pl universe pc linux gnu fopen failed sep kronos boinc sep request cpu reschedule start failed sep kronos boinc dir open could not open directory slots from var lib boinc client sep kronos boinc sep failed to open init file slots init data xml sep kronos boinc sep request cpu reschedule start failed sep kronos boinc dir open could not open directory slots from var lib boinc client kronos system information os l ubuntu lts boinc version additional context the quick fix is to remove all boinc lockfile and http temp nn files plus deleting the project including all wu s slots of concern in my case it means about two days work lost as universe home was completely shut down about for unknown reason the info available at their forum suggests server overload without being sure restarting the project in boinc is not possible as no projects are visible at the project tab i noticed something was wrong with u h earlier today at work but couldn t do anything before being at home and it was too late this issue should be an easy fix if those files are kept closed until actually sending them the content edit after checking all my computers and android devices mobiles and sbc s i found one more computer in the very same state
| 1
|
23,657
| 3,851,865,260
|
IssuesEvent
|
2016-04-06 05:27:46
|
GPF/imame4all
|
https://api.github.com/repos/GPF/imame4all
|
closed
|
Mame4ios 1.3 on itunes?
|
auto-migrated Priority-Medium Type-Defect
|
```
any specific release date on itunes for non jalibroken devices and without
developer certificate?.
What version of the product are you using? On what operating system?
iphone 5,ios 6.0.1
Please provide any additional information below.
no jalibreak,no developer.cant wait...you are my hero.
```
Original issue reported on code.google.com by `sarahisa...@hotmail.com` on 17 Jan 2013 at 8:07
|
1.0
|
Mame4ios 1.3 on itunes? - ```
any specific release date on itunes for non jalibroken devices and without
developer certificate?.
What version of the product are you using? On what operating system?
iphone 5,ios 6.0.1
Please provide any additional information below.
no jalibreak,no developer.cant wait...you are my hero.
```
Original issue reported on code.google.com by `sarahisa...@hotmail.com` on 17 Jan 2013 at 8:07
|
defect
|
on itunes any specific release date on itunes for non jalibroken devices and without developer certificate what version of the product are you using on what operating system iphone ios please provide any additional information below no jalibreak no developer cant wait you are my hero original issue reported on code google com by sarahisa hotmail com on jan at
| 1
|
1,587
| 2,603,967,974
|
IssuesEvent
|
2015-02-24 18:59:32
|
chrsmith/nishazi6
|
https://api.github.com/repos/chrsmith/nishazi6
|
opened
|
沈阳人乳头瘤病毒核酸检
|
auto-migrated Priority-Medium Type-Defect
|
```
沈阳人乳头瘤病毒核酸检〓沈陽軍區政治部醫院性病〓TEL:02
4-31023308〓成立于1946年,68年專注于性傳播疾病的研究和治療�
��位于沈陽市沈河區二緯路32號。是一所與新中國同建立共輝�
��的歷史悠久、設備精良、技術權威、專家云集,是預防、保
健、醫療、科研康復為一體的綜合性醫院。是國家首批公立��
�等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學�
��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍
空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集��
�二等功。
```
-----
Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 7:13
|
1.0
|
沈阳人乳头瘤病毒核酸检 - ```
沈阳人乳头瘤病毒核酸检〓沈陽軍區政治部醫院性病〓TEL:02
4-31023308〓成立于1946年,68年專注于性傳播疾病的研究和治療�
��位于沈陽市沈河區二緯路32號。是一所與新中國同建立共輝�
��的歷史悠久、設備精良、技術權威、專家云集,是預防、保
健、醫療、科研康復為一體的綜合性醫院。是國家首批公立��
�等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學�
��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍
空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集��
�二等功。
```
-----
Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 7:13
|
defect
|
沈阳人乳头瘤病毒核酸检 沈阳人乳头瘤病毒核酸检〓沈陽軍區政治部醫院性病〓tel: 〓 , � �� 。是一所與新中國同建立共輝� ��的歷史悠久、設備精良、技術權威、專家云集,是預防、保 健、醫療、科研康復為一體的綜合性醫院。是國家首批公立�� �等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學� ��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍 空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集�� �二等功。 original issue reported on code google com by gmail com on jun at
| 1
|
30,218
| 11,801,272,121
|
IssuesEvent
|
2020-03-18 19:07:16
|
jgeraigery/blueocean-environments
|
https://api.github.com/repos/jgeraigery/blueocean-environments
|
opened
|
WS-2015-0024 (High) detected in uglify-js-2.2.5.tgz, uglify-js-2.3.6.tgz
|
security vulnerability
|
## WS-2015-0024 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>uglify-js-2.2.5.tgz</b>, <b>uglify-js-2.3.6.tgz</b></p></summary>
<p>
<details><summary><b>uglify-js-2.2.5.tgz</b></p></summary>
<p>JavaScript parser, mangler/compressor and beautifier toolkit</p>
<p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/blueocean-environments/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/blueocean-environments/node_modules/transformers/node_modules/uglify-js/package.json</p>
<p>
Dependency Hierarchy:
- js-builder-0.0.62.tgz (Root Library)
- transform-1.1.2.tgz
- transformers-2.1.0.tgz
- :x: **uglify-js-2.2.5.tgz** (Vulnerable Library)
</details>
<details><summary><b>uglify-js-2.3.6.tgz</b></p></summary>
<p>JavaScript parser, mangler/compressor and beautifier toolkit</p>
<p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-2.3.6.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-2.3.6.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/blueocean-environments/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/blueocean-environments/node_modules/uglify-js/package.json</p>
<p>
Dependency Hierarchy:
- js-builder-0.0.62.tgz (Root Library)
- handlebars-3.0.3.tgz
- :x: **uglify-js-2.3.6.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/jgeraigery/blueocean-environments/commit/906df1e2c2b1353a7f809ef51960f8980d6cec13">906df1e2c2b1353a7f809ef51960f8980d6cec13</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
UglifyJS versions 2.4.23 and earlier are affected by a vulnerability which allows a specially crafted Javascript file to have altered functionality after minification.
<p>Publish Date: 2015-08-24
<p>URL: <a href=https://github.com/mishoo/UglifyJS2/issues/751>WS-2015-0024</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/mishoo/UglifyJS2/commit/905b6011784ca60d41919ac1a499962b7c1d4b02">https://github.com/mishoo/UglifyJS2/commit/905b6011784ca60d41919ac1a499962b7c1d4b02</a></p>
<p>Release Date: 2017-01-31</p>
<p>Fix Resolution: v2.4.24</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"uglify-js","packageVersion":"2.2.5","isTransitiveDependency":true,"dependencyTree":"@jenkins-cd/js-builder:0.0.62;transform:1.1.2;transformers:2.1.0;uglify-js:2.2.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v2.4.24"},{"packageType":"javascript/Node.js","packageName":"uglify-js","packageVersion":"2.3.6","isTransitiveDependency":true,"dependencyTree":"@jenkins-cd/js-builder:0.0.62;handlebars:3.0.3;uglify-js:2.3.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v2.4.24"}],"vulnerabilityIdentifier":"WS-2015-0024","vulnerabilityDetails":"UglifyJS versions 2.4.23 and earlier are affected by a vulnerability which allows a specially crafted Javascript file to have altered functionality after minification.","vulnerabilityUrl":"https://github.com/mishoo/UglifyJS2/issues/751","cvss3Severity":"high","cvss3Score":"8.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
|
True
|
WS-2015-0024 (High) detected in uglify-js-2.2.5.tgz, uglify-js-2.3.6.tgz - ## WS-2015-0024 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>uglify-js-2.2.5.tgz</b>, <b>uglify-js-2.3.6.tgz</b></p></summary>
<p>
<details><summary><b>uglify-js-2.2.5.tgz</b></p></summary>
<p>JavaScript parser, mangler/compressor and beautifier toolkit</p>
<p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/blueocean-environments/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/blueocean-environments/node_modules/transformers/node_modules/uglify-js/package.json</p>
<p>
Dependency Hierarchy:
- js-builder-0.0.62.tgz (Root Library)
- transform-1.1.2.tgz
- transformers-2.1.0.tgz
- :x: **uglify-js-2.2.5.tgz** (Vulnerable Library)
</details>
<details><summary><b>uglify-js-2.3.6.tgz</b></p></summary>
<p>JavaScript parser, mangler/compressor and beautifier toolkit</p>
<p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-2.3.6.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-2.3.6.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/blueocean-environments/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/blueocean-environments/node_modules/uglify-js/package.json</p>
<p>
Dependency Hierarchy:
- js-builder-0.0.62.tgz (Root Library)
- handlebars-3.0.3.tgz
- :x: **uglify-js-2.3.6.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/jgeraigery/blueocean-environments/commit/906df1e2c2b1353a7f809ef51960f8980d6cec13">906df1e2c2b1353a7f809ef51960f8980d6cec13</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
UglifyJS versions 2.4.23 and earlier are affected by a vulnerability which allows a specially crafted Javascript file to have altered functionality after minification.
<p>Publish Date: 2015-08-24
<p>URL: <a href=https://github.com/mishoo/UglifyJS2/issues/751>WS-2015-0024</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/mishoo/UglifyJS2/commit/905b6011784ca60d41919ac1a499962b7c1d4b02">https://github.com/mishoo/UglifyJS2/commit/905b6011784ca60d41919ac1a499962b7c1d4b02</a></p>
<p>Release Date: 2017-01-31</p>
<p>Fix Resolution: v2.4.24</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"uglify-js","packageVersion":"2.2.5","isTransitiveDependency":true,"dependencyTree":"@jenkins-cd/js-builder:0.0.62;transform:1.1.2;transformers:2.1.0;uglify-js:2.2.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v2.4.24"},{"packageType":"javascript/Node.js","packageName":"uglify-js","packageVersion":"2.3.6","isTransitiveDependency":true,"dependencyTree":"@jenkins-cd/js-builder:0.0.62;handlebars:3.0.3;uglify-js:2.3.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v2.4.24"}],"vulnerabilityIdentifier":"WS-2015-0024","vulnerabilityDetails":"UglifyJS versions 2.4.23 and earlier are affected by a vulnerability which allows a specially crafted Javascript file to have altered functionality after minification.","vulnerabilityUrl":"https://github.com/mishoo/UglifyJS2/issues/751","cvss3Severity":"high","cvss3Score":"8.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
|
non_defect
|
ws high detected in uglify js tgz uglify js tgz ws high severity vulnerability vulnerable libraries uglify js tgz uglify js tgz uglify js tgz javascript parser mangler compressor and beautifier toolkit library home page a href path to dependency file tmp ws scm blueocean environments package json path to vulnerable library tmp ws scm blueocean environments node modules transformers node modules uglify js package json dependency hierarchy js builder tgz root library transform tgz transformers tgz x uglify js tgz vulnerable library uglify js tgz javascript parser mangler compressor and beautifier toolkit library home page a href path to dependency file tmp ws scm blueocean environments package json path to vulnerable library tmp ws scm blueocean environments node modules uglify js package json dependency hierarchy js builder tgz root library handlebars tgz x uglify js tgz vulnerable library found in head commit a href vulnerability details uglifyjs versions and earlier are affected by a vulnerability which allows a specially crafted javascript file to have altered functionality after minification publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope changed impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier ws vulnerabilitydetails uglifyjs versions and earlier are affected by a vulnerability which allows a specially crafted javascript file to have altered functionality after minification vulnerabilityurl
| 0
|
244,014
| 26,345,440,981
|
IssuesEvent
|
2023-01-10 21:35:37
|
MicrosoftDocs/azure-docs
|
https://api.github.com/repos/MicrosoftDocs/azure-docs
|
closed
|
The link for 'Vulnerability Assessment' is 404
|
triaged assigned-to-author doc-enhancement security/subsvc Pri2 sql-db-mi/svc docs-bug
|
Hi team,
In this page https://learn.microsoft.com/en-us/azure/azure-sql/database/sql-database-vulnerability-assessment-rules?view=azuresql
The link for '[Vulnerability Assessment](https://learn.microsoft.com/en-us/azure/azure-sql/database/sql-vulnerability-assessment?view=azuresql)' is 404.


Could provide correct link for this step?
---
#### Document Details
⚠ *Do not edit this section. It is required for learn.microsoft.com ➟ GitHub issue linking.*
* ID: bd323e04-8cc0-c6fe-eb83-a7210b4c0be6
* Version Independent ID: 168eb7ff-2051-a3d9-a86c-891745637c3b
* Content: [SQL Vulnerability Assessment rules reference guide - Azure SQL Database](https://learn.microsoft.com/en-us/azure/azure-sql/database/sql-database-vulnerability-assessment-rules?view=azuresql)
* Content Source: [azure-sql/database/sql-database-vulnerability-assessment-rules.md](https://github.com/MicrosoftDocs/sql-docs/blob/live/azure-sql/database/sql-database-vulnerability-assessment-rules.md)
* Service: **sql-db-mi**
* Sub-service: **security**
* GitHub Login: @CESANU
* Microsoft Alias: **cesanu**
|
True
|
The link for 'Vulnerability Assessment' is 404 - Hi team,
In this page https://learn.microsoft.com/en-us/azure/azure-sql/database/sql-database-vulnerability-assessment-rules?view=azuresql
The link for '[Vulnerability Assessment](https://learn.microsoft.com/en-us/azure/azure-sql/database/sql-vulnerability-assessment?view=azuresql)' is 404.


Could provide correct link for this step?
---
#### Document Details
⚠ *Do not edit this section. It is required for learn.microsoft.com ➟ GitHub issue linking.*
* ID: bd323e04-8cc0-c6fe-eb83-a7210b4c0be6
* Version Independent ID: 168eb7ff-2051-a3d9-a86c-891745637c3b
* Content: [SQL Vulnerability Assessment rules reference guide - Azure SQL Database](https://learn.microsoft.com/en-us/azure/azure-sql/database/sql-database-vulnerability-assessment-rules?view=azuresql)
* Content Source: [azure-sql/database/sql-database-vulnerability-assessment-rules.md](https://github.com/MicrosoftDocs/sql-docs/blob/live/azure-sql/database/sql-database-vulnerability-assessment-rules.md)
* Service: **sql-db-mi**
* Sub-service: **security**
* GitHub Login: @CESANU
* Microsoft Alias: **cesanu**
|
non_defect
|
the link for vulnerability assessment is hi team in this page the link for is could provide correct link for this step document details ⚠ do not edit this section it is required for learn microsoft com ➟ github issue linking id version independent id content content source service sql db mi sub service security github login cesanu microsoft alias cesanu
| 0
|
258,610
| 27,565,499,757
|
IssuesEvent
|
2023-03-08 03:11:32
|
rvvergara/bookstore_rails_app
|
https://api.github.com/repos/rvvergara/bookstore_rails_app
|
closed
|
CVE-2021-22885 (High) detected in actionpack-5.2.3.gem - autoclosed
|
Mend: dependency security vulnerability
|
## CVE-2021-22885 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>actionpack-5.2.3.gem</b></p></summary>
<p>Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.</p>
<p>Library home page: <a href="https://rubygems.org/gems/actionpack-5.2.3.gem">https://rubygems.org/gems/actionpack-5.2.3.gem</a></p>
<p>
Dependency Hierarchy:
- rails-5.2.3.gem (Root Library)
- :x: **actionpack-5.2.3.gem** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A possible information disclosure / unintended method execution vulnerability in Action Pack >= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input.
<p>Publish Date: 2021-05-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-22885>CVE-2021-22885</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-hjg4-8q5f-x6fm">https://github.com/advisories/GHSA-hjg4-8q5f-x6fm</a></p>
<p>Release Date: 2021-05-27</p>
<p>Fix Resolution: actionpack - 5.2.4.6,5.2.6,6.0.3.7,6.1.3.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2021-22885 (High) detected in actionpack-5.2.3.gem - autoclosed - ## CVE-2021-22885 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>actionpack-5.2.3.gem</b></p></summary>
<p>Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.</p>
<p>Library home page: <a href="https://rubygems.org/gems/actionpack-5.2.3.gem">https://rubygems.org/gems/actionpack-5.2.3.gem</a></p>
<p>
Dependency Hierarchy:
- rails-5.2.3.gem (Root Library)
- :x: **actionpack-5.2.3.gem** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A possible information disclosure / unintended method execution vulnerability in Action Pack >= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input.
<p>Publish Date: 2021-05-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-22885>CVE-2021-22885</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-hjg4-8q5f-x6fm">https://github.com/advisories/GHSA-hjg4-8q5f-x6fm</a></p>
<p>Release Date: 2021-05-27</p>
<p>Fix Resolution: actionpack - 5.2.4.6,5.2.6,6.0.3.7,6.1.3.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve high detected in actionpack gem autoclosed cve high severity vulnerability vulnerable library actionpack gem web apps on rails simple battle tested conventions for building and testing mvc web applications works with any rack compatible server library home page a href dependency hierarchy rails gem root library x actionpack gem vulnerable library found in base branch master vulnerability details a possible information disclosure unintended method execution vulnerability in action pack when using the redirect to or polymorphic url helper with untrusted user input publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution actionpack step up your open source security game with mend
| 0
|
62,413
| 17,023,918,453
|
IssuesEvent
|
2021-07-03 04:33:09
|
tomhughes/trac-tickets
|
https://api.github.com/repos/tomhughes/trac-tickets
|
closed
|
If "background imagery" list is too long, you can't select the "vector file" option
|
Component: potlatch2 Priority: minor Resolution: fixed Type: defect
|
**[Submitted to the original trac issue database at 12.45pm, Saturday, 28th February 2015]**
"Vector file" is needed to be able to select waypoints (decent waypoint handling is something that P2 does that none of the other OSM editors - with the exception of P1 - do).
On a Windows 7 laptop with SeaMonkey as the browser, with the browser at a "normal size to use" I see nothing below "sharpen".
The "root cause" of this is arguably the same as https://trac.openstreetmap.org/ticket/5208 - an over-long imagery list full of antique maps that really aren't any use for everyday mapping (but, as pnorman pointed out on that ticket, insisted on by people who like to look at old maps) - but that's ticket 5208. This ticket is trying to say "if the imagery list is that long for whatever reason, truncate it, or make it scrollable, or reorder it or something else so that the "Vector File" option is still accessible.
|
1.0
|
If "background imagery" list is too long, you can't select the "vector file" option - **[Submitted to the original trac issue database at 12.45pm, Saturday, 28th February 2015]**
"Vector file" is needed to be able to select waypoints (decent waypoint handling is something that P2 does that none of the other OSM editors - with the exception of P1 - do).
On a Windows 7 laptop with SeaMonkey as the browser, with the browser at a "normal size to use" I see nothing below "sharpen".
The "root cause" of this is arguably the same as https://trac.openstreetmap.org/ticket/5208 - an over-long imagery list full of antique maps that really aren't any use for everyday mapping (but, as pnorman pointed out on that ticket, insisted on by people who like to look at old maps) - but that's ticket 5208. This ticket is trying to say "if the imagery list is that long for whatever reason, truncate it, or make it scrollable, or reorder it or something else so that the "Vector File" option is still accessible.
|
defect
|
if background imagery list is too long you can t select the vector file option vector file is needed to be able to select waypoints decent waypoint handling is something that does that none of the other osm editors with the exception of do on a windows laptop with seamonkey as the browser with the browser at a normal size to use i see nothing below sharpen the root cause of this is arguably the same as an over long imagery list full of antique maps that really aren t any use for everyday mapping but as pnorman pointed out on that ticket insisted on by people who like to look at old maps but that s ticket this ticket is trying to say if the imagery list is that long for whatever reason truncate it or make it scrollable or reorder it or something else so that the vector file option is still accessible
| 1
|
65,469
| 12,599,385,577
|
IssuesEvent
|
2020-06-11 05:52:24
|
joomla/joomla-cms
|
https://api.github.com/repos/joomla/joomla-cms
|
closed
|
[4.0] Smart Search error on PostgreSQL
|
No Code Attached Yet
|
### Steps to reproduce the issue
Use PostgreSQL.
Perform a search in frontend.
### Expected result
Works.
### Actual result
```
22P02, 7, ERROR: invalid input syntax for type bytea LINE 3: ('blog','O:51:"Joomla\\Component\\Finder\\Administrator\\Ind... ^
() JROOT\libraries\vendor\joomla\database\src\Pdo\PdoDriver.php:497
2 Joomla\Database\Pdo\PdoDriver->execute() JROOT\libraries\vendor\joomla\database\src\Pgsql\PgsqlDriver.php:790
3 Joomla\Database\Pgsql\PgsqlDriver->insertObject() JROOT\components\com_finder\src\Helper\FinderHelper.php:86
4 Joomla\Component\Finder\Site\Helper\FinderHelper::logSearch() JROOT\components\com_finder\src\View\Search\HtmlView.php:181
5 Joomla\Component\Finder\Site\View\Search\HtmlView->display() JROOT\libraries\src\MVC\Controller\BaseController.php:691
6 Joomla\CMS\MVC\Controller\BaseController->display() JROOT\components\com_finder\src\Controller\DisplayController.php:59
7 Joomla\Component\Finder\Site\Controller\DisplayController->display() JROOT\libraries\src\MVC\Controller\BaseController.php:729
8 Joomla\CMS\MVC\Controller\BaseController->execute() JROOT\libraries\src\Dispatcher\ComponentDispatcher.php:146
9 Joomla\CMS\Dispatcher\ComponentDispatcher->dispatch() JROOT\libraries\src\Component\ComponentHelper.php:384
10 Joomla\CMS\Component\ComponentHelper::renderComponent() JROOT\libraries\src\Application\SiteApplication.php:196
11 Joomla\CMS\Application\SiteApplication->dispatch() JROOT\libraries\src\Application\SiteApplication.php:235
12 Joomla\CMS\Application\SiteApplication->doExecute() JROOT\libraries\src\Application\CMSApplication.php:231
13 Joomla\CMS\Application\CMSApplication->execute() JROOT\includes\app.php:63
14 require_once() JROOT\index.php:36
```
### System information (as much as possible)
PostgreSQL 11.5
### Additional comments
Coming from this line:
https://github.com/joomla/joomla-cms/blob/65abc0392008982cc33d765e1e1ee4aa3a787bb1/components/com_finder/src/Helper/FinderHelper.php#L84
|
1.0
|
[4.0] Smart Search error on PostgreSQL - ### Steps to reproduce the issue
Use PostgreSQL.
Perform a search in frontend.
### Expected result
Works.
### Actual result
```
22P02, 7, ERROR: invalid input syntax for type bytea LINE 3: ('blog','O:51:"Joomla\\Component\\Finder\\Administrator\\Ind... ^
() JROOT\libraries\vendor\joomla\database\src\Pdo\PdoDriver.php:497
2 Joomla\Database\Pdo\PdoDriver->execute() JROOT\libraries\vendor\joomla\database\src\Pgsql\PgsqlDriver.php:790
3 Joomla\Database\Pgsql\PgsqlDriver->insertObject() JROOT\components\com_finder\src\Helper\FinderHelper.php:86
4 Joomla\Component\Finder\Site\Helper\FinderHelper::logSearch() JROOT\components\com_finder\src\View\Search\HtmlView.php:181
5 Joomla\Component\Finder\Site\View\Search\HtmlView->display() JROOT\libraries\src\MVC\Controller\BaseController.php:691
6 Joomla\CMS\MVC\Controller\BaseController->display() JROOT\components\com_finder\src\Controller\DisplayController.php:59
7 Joomla\Component\Finder\Site\Controller\DisplayController->display() JROOT\libraries\src\MVC\Controller\BaseController.php:729
8 Joomla\CMS\MVC\Controller\BaseController->execute() JROOT\libraries\src\Dispatcher\ComponentDispatcher.php:146
9 Joomla\CMS\Dispatcher\ComponentDispatcher->dispatch() JROOT\libraries\src\Component\ComponentHelper.php:384
10 Joomla\CMS\Component\ComponentHelper::renderComponent() JROOT\libraries\src\Application\SiteApplication.php:196
11 Joomla\CMS\Application\SiteApplication->dispatch() JROOT\libraries\src\Application\SiteApplication.php:235
12 Joomla\CMS\Application\SiteApplication->doExecute() JROOT\libraries\src\Application\CMSApplication.php:231
13 Joomla\CMS\Application\CMSApplication->execute() JROOT\includes\app.php:63
14 require_once() JROOT\index.php:36
```
### System information (as much as possible)
PostgreSQL 11.5
### Additional comments
Coming from this line:
https://github.com/joomla/joomla-cms/blob/65abc0392008982cc33d765e1e1ee4aa3a787bb1/components/com_finder/src/Helper/FinderHelper.php#L84
|
non_defect
|
smart search error on postgresql steps to reproduce the issue use postgresql perform a search in frontend expected result works actual result error invalid input syntax for type bytea line blog o joomla component finder administrator ind jroot libraries vendor joomla database src pdo pdodriver php joomla database pdo pdodriver execute jroot libraries vendor joomla database src pgsql pgsqldriver php joomla database pgsql pgsqldriver insertobject jroot components com finder src helper finderhelper php joomla component finder site helper finderhelper logsearch jroot components com finder src view search htmlview php joomla component finder site view search htmlview display jroot libraries src mvc controller basecontroller php joomla cms mvc controller basecontroller display jroot components com finder src controller displaycontroller php joomla component finder site controller displaycontroller display jroot libraries src mvc controller basecontroller php joomla cms mvc controller basecontroller execute jroot libraries src dispatcher componentdispatcher php joomla cms dispatcher componentdispatcher dispatch jroot libraries src component componenthelper php joomla cms component componenthelper rendercomponent jroot libraries src application siteapplication php joomla cms application siteapplication dispatch jroot libraries src application siteapplication php joomla cms application siteapplication doexecute jroot libraries src application cmsapplication php joomla cms application cmsapplication execute jroot includes app php require once jroot index php system information as much as possible postgresql additional comments coming from this line
| 0
|
601,037
| 18,364,443,896
|
IssuesEvent
|
2021-10-09 20:13:46
|
AY2122S1-CS2103T-W11-1/tp
|
https://api.github.com/repos/AY2122S1-CS2103T-W11-1/tp
|
closed
|
Integrate Recipe and Ingredient in master branch
|
priority.High
|
After #31 is resolved, Need to merge dev-ingredient branch to master and resolve potential conflict.
|
1.0
|
Integrate Recipe and Ingredient in master branch - After #31 is resolved, Need to merge dev-ingredient branch to master and resolve potential conflict.
|
non_defect
|
integrate recipe and ingredient in master branch after is resolved need to merge dev ingredient branch to master and resolve potential conflict
| 0
|
27,016
| 4,858,350,312
|
IssuesEvent
|
2016-11-13 02:57:46
|
solrmarc/solrmarc
|
https://api.github.com/repos/solrmarc/solrmarc
|
closed
|
fieldSpec with brackets: for control field, it should mean byte sequence; for non-control field, it should mean regex pattern
|
auto-migrated Priority-Medium Type-Defect
|
```
Code currently treats numeric chars in brackets as a byte sequence:
008[7-12]
but treats non-numeric as a regex pattern:
650[a-dg-p]
Since subfields can be numeric, a better solution is to assume it's a byte
sequence for control fields (leader, 0 < tag <= 9), and a regex pattern for
other fields.
```
Original issue reported on code.google.com by `naomi.du...@gmail.com` on 21 Aug 2009 at 6:10
|
1.0
|
fieldSpec with brackets: for control field, it should mean byte sequence; for non-control field, it should mean regex pattern - ```
Code currently treats numeric chars in brackets as a byte sequence:
008[7-12]
but treats non-numeric as a regex pattern:
650[a-dg-p]
Since subfields can be numeric, a better solution is to assume it's a byte
sequence for control fields (leader, 0 < tag <= 9), and a regex pattern for
other fields.
```
Original issue reported on code.google.com by `naomi.du...@gmail.com` on 21 Aug 2009 at 6:10
|
defect
|
fieldspec with brackets for control field it should mean byte sequence for non control field it should mean regex pattern code currently treats numeric chars in brackets as a byte sequence but treats non numeric as a regex pattern since subfields can be numeric a better solution is to assume it s a byte sequence for control fields leader tag and a regex pattern for other fields original issue reported on code google com by naomi du gmail com on aug at
| 1
|
157,147
| 5,996,258,744
|
IssuesEvent
|
2017-06-03 12:33:02
|
ARCOMM/ARC-Web
|
https://api.github.com/repos/ARCOMM/ARC-Web
|
closed
|
Intercept paste event to strip formatting
|
priority/high type/enhancement
|
```js
editor.addEventListener('paste', (e) => {
// Cancel paste
e.preventDefault();
// Get text representation of clipboard
let text = e.clipboardData.getData('text/plain');
// Insert text manually
document.execCommand('insertHTML', false, text);
});
```
|
1.0
|
Intercept paste event to strip formatting - ```js
editor.addEventListener('paste', (e) => {
// Cancel paste
e.preventDefault();
// Get text representation of clipboard
let text = e.clipboardData.getData('text/plain');
// Insert text manually
document.execCommand('insertHTML', false, text);
});
```
|
non_defect
|
intercept paste event to strip formatting js editor addeventlistener paste e cancel paste e preventdefault get text representation of clipboard let text e clipboarddata getdata text plain insert text manually document execcommand inserthtml false text
| 0
|
15,745
| 2,869,009,004
|
IssuesEvent
|
2015-06-05 22:33:07
|
dart-lang/sdk
|
https://api.github.com/repos/dart-lang/sdk
|
closed
|
intl package: add CLDR-based Iterable formatting
|
Area-Pkg Pkg-Intl Priority-Unassigned Triaged Type-Defect
|
*This issue was originally filed by @seaneagan*
_____
The intlx package (http://pub.dartlang.org/packages/intlx) has an IterableFormat API which formats Iterables using locale specific separators. See the following links for more information:
Demo: http://seaneagan.me/intlx/
Docs: http://seaneagan.me/intlx/docs/intlx/IterableFormat.html
This should be moved to the intl package.
|
1.0
|
intl package: add CLDR-based Iterable formatting - *This issue was originally filed by @seaneagan*
_____
The intlx package (http://pub.dartlang.org/packages/intlx) has an IterableFormat API which formats Iterables using locale specific separators. See the following links for more information:
Demo: http://seaneagan.me/intlx/
Docs: http://seaneagan.me/intlx/docs/intlx/IterableFormat.html
This should be moved to the intl package.
|
defect
|
intl package add cldr based iterable formatting this issue was originally filed by seaneagan the intlx package has an iterableformat api which formats iterables using locale specific separators see the following links for more information demo docs this should be moved to the intl package
| 1
|
7,912
| 2,611,065,300
|
IssuesEvent
|
2015-02-27 00:30:30
|
alistairreilly/andors-trail
|
https://api.github.com/repos/alistairreilly/andors-trail
|
opened
|
ring loot not in inventory
|
auto-migrated Milestone-0.6.11 Type-Defect
|
```
Before posting, please read the following guidelines for posts in the issue
tracker:
http://code.google.com/p/andors-trail/wiki/Forums_vs_issuetracker
What steps will reproduce the problem?
1. Defeat the guard outside foaming flask tavern
2. Drops a ring
3.
What is the expected output? What do you see instead?
Ring to be in inventory. But It's not there.
What version of the product are you using? On what device?
6.8
Android 2.2
Please provide any additional information below.
```
Original issue reported on code.google.com by `iamtcar...@gmail.com` on 13 Apr 2011 at 9:10
|
1.0
|
ring loot not in inventory - ```
Before posting, please read the following guidelines for posts in the issue
tracker:
http://code.google.com/p/andors-trail/wiki/Forums_vs_issuetracker
What steps will reproduce the problem?
1. Defeat the guard outside foaming flask tavern
2. Drops a ring
3.
What is the expected output? What do you see instead?
Ring to be in inventory. But It's not there.
What version of the product are you using? On what device?
6.8
Android 2.2
Please provide any additional information below.
```
Original issue reported on code.google.com by `iamtcar...@gmail.com` on 13 Apr 2011 at 9:10
|
defect
|
ring loot not in inventory before posting please read the following guidelines for posts in the issue tracker what steps will reproduce the problem defeat the guard outside foaming flask tavern drops a ring what is the expected output what do you see instead ring to be in inventory but it s not there what version of the product are you using on what device android please provide any additional information below original issue reported on code google com by iamtcar gmail com on apr at
| 1
|
73,909
| 14,142,765,392
|
IssuesEvent
|
2020-11-10 14:30:06
|
microsoft/vscode-pull-request-github
|
https://api.github.com/repos/microsoft/vscode-pull-request-github
|
closed
|
Gutter decorations slightly off-centre
|
bug upstream/vscode
|
<!-- Please search existing issues to avoid creating duplicates. -->
<!-- Use Help > Report Issue to prefill these. -->
- Extension version: 0.2.3
- VSCode Version: 1.28.2
- OS: macOS 10.14.1
The `+` symbol skews towards the left and the `♦` symbol skews towards the top ever so slightly.
<img width="42" alt="screen shot 2018-11-02 at 7 58 24 pm" src="https://user-images.githubusercontent.com/9157833/47945728-554ac380-deda-11e8-878f-eab30482af4c.png">
|
1.0
|
Gutter decorations slightly off-centre - <!-- Please search existing issues to avoid creating duplicates. -->
<!-- Use Help > Report Issue to prefill these. -->
- Extension version: 0.2.3
- VSCode Version: 1.28.2
- OS: macOS 10.14.1
The `+` symbol skews towards the left and the `♦` symbol skews towards the top ever so slightly.
<img width="42" alt="screen shot 2018-11-02 at 7 58 24 pm" src="https://user-images.githubusercontent.com/9157833/47945728-554ac380-deda-11e8-878f-eab30482af4c.png">
|
non_defect
|
gutter decorations slightly off centre report issue to prefill these extension version vscode version os macos the symbol skews towards the left and the ♦ symbol skews towards the top ever so slightly img width alt screen shot at pm src
| 0
|
69,815
| 22,682,262,898
|
IssuesEvent
|
2022-07-04 10:57:55
|
vector-im/element-android
|
https://api.github.com/repos/vector-im/element-android
|
opened
|
Sending a screenshot is super ugly, because the overlayed UI clashes with the screenshotted UI
|
T-Defect
|
### Steps to reproduce
1. Take a screenshot
2. Send it in the app
3. Get very confused by the very ugly preview screen, which shows Element UI superimposed on the screenshot UI.
4. Guess and hit the FAB green send button, even though everything is unreadable:
![Uploading image.png…]()
### Outcome
#### What did you expect?
Legible UI when sending a screenshot
#### What happened instead?
Illegible UI
### Your phone model
Samsung Galaxy S10
### Operating system version
Android 12 (One UI 4.1)
### Application version and app store
1.4.24-dev [401042424]
### Homeserver
matrix.org
### Will you send logs?
No
### Are you willing to provide a PR?
No
|
1.0
|
Sending a screenshot is super ugly, because the overlayed UI clashes with the screenshotted UI - ### Steps to reproduce
1. Take a screenshot
2. Send it in the app
3. Get very confused by the very ugly preview screen, which shows Element UI superimposed on the screenshot UI.
4. Guess and hit the FAB green send button, even though everything is unreadable:
![Uploading image.png…]()
### Outcome
#### What did you expect?
Legible UI when sending a screenshot
#### What happened instead?
Illegible UI
### Your phone model
Samsung Galaxy S10
### Operating system version
Android 12 (One UI 4.1)
### Application version and app store
1.4.24-dev [401042424]
### Homeserver
matrix.org
### Will you send logs?
No
### Are you willing to provide a PR?
No
|
defect
|
sending a screenshot is super ugly because the overlayed ui clashes with the screenshotted ui steps to reproduce take a screenshot send it in the app get very confused by the very ugly preview screen which shows element ui superimposed on the screenshot ui guess and hit the fab green send button even though everything is unreadable outcome what did you expect legible ui when sending a screenshot what happened instead illegible ui your phone model samsung galaxy operating system version android one ui application version and app store dev homeserver matrix org will you send logs no are you willing to provide a pr no
| 1
|
28,189
| 5,217,129,365
|
IssuesEvent
|
2017-01-26 12:52:57
|
primefaces/primeng
|
https://api.github.com/repos/primefaces/primeng
|
closed
|
Listbox: select all option does not work well when using the filter
|
defect
|
<!--
- IF YOU DON'T FILL OUT THE FOLLOWING INFORMATION WE MIGHT CLOSE YOUR ISSUE WITHOUT INVESTIGATING.
- IF YOU'D LIKE TO SECURE OUR RESPONSE, YOU MAY CONSIDER PRIMENG PRO SUPPORT WHERE SUPPORT IS PROVIDED WITHIN 4 hours.
-->
**I'm submitting a ...** (check one with "x")
```
[x] bug report => Search github for a similar issue or PR before submitting
[ ] feature request => Please check if request is not on the roadmap already https://github.com/primefaces/primeng/wiki/Roadmap
[ ] support request => Please do not submit support request here, instead see http://forum.primefaces.org/viewforum.php?f=35
```
**Plunkr Case (Bug Reports)**
I tried to build a Plunkr Case for it but i encountered importing the Listbox module.
Any help with it will be much appreciated.
**Current behavior**
Filter the multi-select, you will see that the list box shows all items that *contains* the entered filter
but clicking will only select items that *begins* with the entered filter.
**Expected behavior**
Select-all should select all options you currently see on the listbox.
**Minimal reproduction of the problem with instructions**
1. Go to the documentation of Listbox:
http://www.primefaces.org/primeng/#/listbox
use the Advanced (Multiple, Checkbox and Filter) demo.
2. In the filter enter the letter 'r' => (you will see only options that contains the letter 'r', which is good)
3. Click on select-all => only Rome will be selected.
**What is the motivation / use case for changing the behavior?**
We think that selecting all items once you use the filter if a very common
and important case in this component.
It definitely the case for us...
|
1.0
|
Listbox: select all option does not work well when using the filter - <!--
- IF YOU DON'T FILL OUT THE FOLLOWING INFORMATION WE MIGHT CLOSE YOUR ISSUE WITHOUT INVESTIGATING.
- IF YOU'D LIKE TO SECURE OUR RESPONSE, YOU MAY CONSIDER PRIMENG PRO SUPPORT WHERE SUPPORT IS PROVIDED WITHIN 4 hours.
-->
**I'm submitting a ...** (check one with "x")
```
[x] bug report => Search github for a similar issue or PR before submitting
[ ] feature request => Please check if request is not on the roadmap already https://github.com/primefaces/primeng/wiki/Roadmap
[ ] support request => Please do not submit support request here, instead see http://forum.primefaces.org/viewforum.php?f=35
```
**Plunkr Case (Bug Reports)**
I tried to build a Plunkr Case for it but i encountered importing the Listbox module.
Any help with it will be much appreciated.
**Current behavior**
Filter the multi-select, you will see that the list box shows all items that *contains* the entered filter
but clicking will only select items that *begins* with the entered filter.
**Expected behavior**
Select-all should select all options you currently see on the listbox.
**Minimal reproduction of the problem with instructions**
1. Go to the documentation of Listbox:
http://www.primefaces.org/primeng/#/listbox
use the Advanced (Multiple, Checkbox and Filter) demo.
2. In the filter enter the letter 'r' => (you will see only options that contains the letter 'r', which is good)
3. Click on select-all => only Rome will be selected.
**What is the motivation / use case for changing the behavior?**
We think that selecting all items once you use the filter if a very common
and important case in this component.
It definitely the case for us...
|
defect
|
listbox select all option does not work well when using the filter if you don t fill out the following information we might close your issue without investigating if you d like to secure our response you may consider primeng pro support where support is provided within hours i m submitting a check one with x bug report search github for a similar issue or pr before submitting feature request please check if request is not on the roadmap already support request please do not submit support request here instead see plunkr case bug reports i tried to build a plunkr case for it but i encountered importing the listbox module any help with it will be much appreciated current behavior filter the multi select you will see that the list box shows all items that contains the entered filter but clicking will only select items that begins with the entered filter expected behavior select all should select all options you currently see on the listbox minimal reproduction of the problem with instructions go to the documentation of listbox use the advanced multiple checkbox and filter demo in the filter enter the letter r you will see only options that contains the letter r which is good click on select all only rome will be selected what is the motivation use case for changing the behavior we think that selecting all items once you use the filter if a very common and important case in this component it definitely the case for us
| 1
|
278,102
| 30,702,199,756
|
IssuesEvent
|
2023-07-27 01:10:50
|
snykiotcubedev/arangodb-3.7.6
|
https://api.github.com/repos/snykiotcubedev/arangodb-3.7.6
|
reopened
|
CVE-2021-3822 (High) detected in jsoneditor-5.34.0.tgz
|
Mend: dependency security vulnerability
|
## CVE-2021-3822 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsoneditor-5.34.0.tgz</b></p></summary>
<p>A web-based tool to view, edit, format, and validate JSON</p>
<p>Library home page: <a href="https://registry.npmjs.org/jsoneditor/-/jsoneditor-5.34.0.tgz">https://registry.npmjs.org/jsoneditor/-/jsoneditor-5.34.0.tgz</a></p>
<p>
Dependency Hierarchy:
- :x: **jsoneditor-5.34.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/snykiotcubedev/arangodb-3.7.6/commit/fce8f85f1c2f070c8e6a8e76d17210a2117d3833">fce8f85f1c2f070c8e6a8e76d17210a2117d3833</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
jsoneditor is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-3822>CVE-2021-3822</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-09-27</p>
<p>Fix Resolution: 9.5.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2021-3822 (High) detected in jsoneditor-5.34.0.tgz - ## CVE-2021-3822 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsoneditor-5.34.0.tgz</b></p></summary>
<p>A web-based tool to view, edit, format, and validate JSON</p>
<p>Library home page: <a href="https://registry.npmjs.org/jsoneditor/-/jsoneditor-5.34.0.tgz">https://registry.npmjs.org/jsoneditor/-/jsoneditor-5.34.0.tgz</a></p>
<p>
Dependency Hierarchy:
- :x: **jsoneditor-5.34.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/snykiotcubedev/arangodb-3.7.6/commit/fce8f85f1c2f070c8e6a8e76d17210a2117d3833">fce8f85f1c2f070c8e6a8e76d17210a2117d3833</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
jsoneditor is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-3822>CVE-2021-3822</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-09-27</p>
<p>Fix Resolution: 9.5.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve high detected in jsoneditor tgz cve high severity vulnerability vulnerable library jsoneditor tgz a web based tool to view edit format and validate json library home page a href dependency hierarchy x jsoneditor tgz vulnerable library found in head commit a href found in base branch main vulnerability details jsoneditor is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution step up your open source security game with mend
| 0
|
14,007
| 2,789,848,013
|
IssuesEvent
|
2015-05-08 21:53:41
|
google/google-visualization-api-issues
|
https://api.github.com/repos/google/google-visualization-api-issues
|
opened
|
backgroundColor: {stroke:'black', fill:'#DDE3E7', strokeSize: 1} is failing in IE
|
Priority-Medium Type-Defect
|
Original [issue 280](https://code.google.com/p/google-visualization-api-issues/issues/detail?id=280) created by orwant on 2010-05-13T03:36:00.000Z:
1.It happends in columnchart,pie chart
<b>2.</b>
Pls paste code form an html file run on IE
Code starts from here
<html>
<script type="text/javascript"
src="https://www.google.com/jsapi"></script>
<head>
<body>
<button type="button" onclick="testFunction();">Click Me!</button>
</body>
</head>
<script type="text/javascript">
//google.load("visualization", "1", {packages:["columnchart"]});
// google.load('visualization', '1', {'packages':['columnchart']});
//google.load('visualization', '1', {'packages':["piechart"]});
google.load('visualization', '1', {packages:['columnchart', 'piechart']});
// google.setOnLoadCallback(drawChart);
function testFunction(){
var data = new google.visualization.DataTable();
var formatter = new google.visualization.NumberFormat({prefix: '$'});
data.addColumn('string', 'Year');
data.addColumn('number', 'Sales');
data.addColumn('number', 'Expenses');
data.addRows(4);
data.setFormattedValue(0, 0,'$ 2004 ')
//data.setValue(0, 0, '2004');
data.setValue(0, 1, 1000);
//data.setFormattedValue(0, 1, '$'+1000);
data.setValue(0, 2, 400);
//data.setValue(1, 0, '2005');
data.setFormattedValue(1, 0,'$ 2005 ')
// data.setFormattedValue(1, 1, '$'+1170);
data.setValue(1, 1, 1170);
data.setValue(1, 2, 460);
data.setFormattedValue(2, 0,'$ 2006 ')
// data.setValue(2, 0, '2006');
//data.setFormattedValue(2, 1,'$'+660);
data.setValue(2, 1, 660);
data.setValue(2, 2, 1120);
data.setFormattedValue(3, 0,'$ 2006 ')
//data.setValue(3, 0, '2007');
data.setValue(3, 1, 1030);
//data.setFormattedValue(3 ,1,'$'+ 660);
data.setValue(3, 2, 540);
formatter.format(data, 1);
var chart = new
google.visualization.ColumnChart(document.getElementById('chart_div'));
chart.draw(data, {width: 400, height: 240, enableTooltip:
true,is3D: true,backgroundColor: {stroke:'black', fill:'#DDE3E7',
strokeSize: 1}, title: 'Company Performance'});
}
</script>
<body>
<div id="chart_div"></div>
</body>
</html>
Code ends here
3. Operating system: Win XP and Browser IE8, same in IE 7
Attached the Screen shots
|
1.0
|
backgroundColor: {stroke:'black', fill:'#DDE3E7', strokeSize: 1} is failing in IE - Original [issue 280](https://code.google.com/p/google-visualization-api-issues/issues/detail?id=280) created by orwant on 2010-05-13T03:36:00.000Z:
1.It happends in columnchart,pie chart
<b>2.</b>
Pls paste code form an html file run on IE
Code starts from here
<html>
<script type="text/javascript"
src="https://www.google.com/jsapi"></script>
<head>
<body>
<button type="button" onclick="testFunction();">Click Me!</button>
</body>
</head>
<script type="text/javascript">
//google.load("visualization", "1", {packages:["columnchart"]});
// google.load('visualization', '1', {'packages':['columnchart']});
//google.load('visualization', '1', {'packages':["piechart"]});
google.load('visualization', '1', {packages:['columnchart', 'piechart']});
// google.setOnLoadCallback(drawChart);
function testFunction(){
var data = new google.visualization.DataTable();
var formatter = new google.visualization.NumberFormat({prefix: '$'});
data.addColumn('string', 'Year');
data.addColumn('number', 'Sales');
data.addColumn('number', 'Expenses');
data.addRows(4);
data.setFormattedValue(0, 0,'$ 2004 ')
//data.setValue(0, 0, '2004');
data.setValue(0, 1, 1000);
//data.setFormattedValue(0, 1, '$'+1000);
data.setValue(0, 2, 400);
//data.setValue(1, 0, '2005');
data.setFormattedValue(1, 0,'$ 2005 ')
// data.setFormattedValue(1, 1, '$'+1170);
data.setValue(1, 1, 1170);
data.setValue(1, 2, 460);
data.setFormattedValue(2, 0,'$ 2006 ')
// data.setValue(2, 0, '2006');
//data.setFormattedValue(2, 1,'$'+660);
data.setValue(2, 1, 660);
data.setValue(2, 2, 1120);
data.setFormattedValue(3, 0,'$ 2006 ')
//data.setValue(3, 0, '2007');
data.setValue(3, 1, 1030);
//data.setFormattedValue(3 ,1,'$'+ 660);
data.setValue(3, 2, 540);
formatter.format(data, 1);
var chart = new
google.visualization.ColumnChart(document.getElementById('chart_div'));
chart.draw(data, {width: 400, height: 240, enableTooltip:
true,is3D: true,backgroundColor: {stroke:'black', fill:'#DDE3E7',
strokeSize: 1}, title: 'Company Performance'});
}
</script>
<body>
<div id="chart_div"></div>
</body>
</html>
Code ends here
3. Operating system: Win XP and Browser IE8, same in IE 7
Attached the Screen shots
|
defect
|
backgroundcolor stroke black fill strokesize is failing in ie original created by orwant on it happends in columnchart pie chart pls paste code form an html file run on ie code starts from here lt html gt lt script type quot text javascript quot src quot lt head gt lt body gt lt button type quot button quot onclick quot testfunction quot gt click me lt button gt lt body gt lt head gt lt script type quot text javascript quot gt google load quot visualization quot quot quot packages google load visualization packages google load visualization packages google load visualization packages google setonloadcallback drawchart function testfunction var data new google visualization datatable var formatter new google visualization numberformat prefix data addcolumn string year data addcolumn number sales data addcolumn number expenses data addrows data setformattedvalue data setvalue data setvalue data setformattedvalue data setvalue data setvalue data setformattedvalue data setformattedvalue data setvalue data setvalue data setformattedvalue data setvalue data setformattedvalue data setvalue data setvalue data setformattedvalue data setvalue data setvalue data setformattedvalue data setvalue formatter format data var chart new google visualization columnchart document getelementbyid chart div chart draw data width height enabletooltip true true backgroundcolor stroke black fill strokesize title company performance lt script gt lt body gt lt div id quot chart div quot gt lt div gt lt body gt lt html gt code ends here operating system win xp and browser same in ie attached the screen shots
| 1
|
238,224
| 26,085,684,132
|
IssuesEvent
|
2022-12-26 02:13:35
|
Thezone1975/send
|
https://api.github.com/repos/Thezone1975/send
|
opened
|
CVE-2022-46175 (High) detected in json5-2.1.0.tgz, json5-1.0.1.tgz
|
security vulnerability
|
## CVE-2022-46175 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>json5-2.1.0.tgz</b>, <b>json5-1.0.1.tgz</b></p></summary>
<p>
<details><summary><b>json5-2.1.0.tgz</b></p></summary>
<p>JSON for humans.</p>
<p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-2.1.0.tgz">https://registry.npmjs.org/json5/-/json5-2.1.0.tgz</a></p>
<p>Path to dependency file: /send/package.json</p>
<p>Path to vulnerable library: /node_modules/@babel/core/node_modules/json5/package.json</p>
<p>
Dependency Hierarchy:
- convict-5.0.0.tgz (Root Library)
- :x: **json5-2.1.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>json5-1.0.1.tgz</b></p></summary>
<p>JSON for humans.</p>
<p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-1.0.1.tgz">https://registry.npmjs.org/json5/-/json5-1.0.1.tgz</a></p>
<p>Path to dependency file: /send/package.json</p>
<p>Path to vulnerable library: /node_modules/json5/package.json</p>
<p>
Dependency Hierarchy:
- babel-loader-8.0.6.tgz (Root Library)
- loader-utils-1.2.3.tgz
- :x: **json5-1.0.1.tgz** (Vulnerable Library)
</details>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 version 2.2.2 and later.
<p>Publish Date: 2022-12-24
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-46175>CVE-2022-46175</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-46175">https://www.cve.org/CVERecord?id=CVE-2022-46175</a></p>
<p>Release Date: 2022-12-24</p>
<p>Fix Resolution: json5 - 2.2.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2022-46175 (High) detected in json5-2.1.0.tgz, json5-1.0.1.tgz - ## CVE-2022-46175 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>json5-2.1.0.tgz</b>, <b>json5-1.0.1.tgz</b></p></summary>
<p>
<details><summary><b>json5-2.1.0.tgz</b></p></summary>
<p>JSON for humans.</p>
<p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-2.1.0.tgz">https://registry.npmjs.org/json5/-/json5-2.1.0.tgz</a></p>
<p>Path to dependency file: /send/package.json</p>
<p>Path to vulnerable library: /node_modules/@babel/core/node_modules/json5/package.json</p>
<p>
Dependency Hierarchy:
- convict-5.0.0.tgz (Root Library)
- :x: **json5-2.1.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>json5-1.0.1.tgz</b></p></summary>
<p>JSON for humans.</p>
<p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-1.0.1.tgz">https://registry.npmjs.org/json5/-/json5-1.0.1.tgz</a></p>
<p>Path to dependency file: /send/package.json</p>
<p>Path to vulnerable library: /node_modules/json5/package.json</p>
<p>
Dependency Hierarchy:
- babel-loader-8.0.6.tgz (Root Library)
- loader-utils-1.2.3.tgz
- :x: **json5-1.0.1.tgz** (Vulnerable Library)
</details>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 version 2.2.2 and later.
<p>Publish Date: 2022-12-24
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-46175>CVE-2022-46175</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-46175">https://www.cve.org/CVERecord?id=CVE-2022-46175</a></p>
<p>Release Date: 2022-12-24</p>
<p>Fix Resolution: json5 - 2.2.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve high detected in tgz tgz cve high severity vulnerability vulnerable libraries tgz tgz tgz json for humans library home page a href path to dependency file send package json path to vulnerable library node modules babel core node modules package json dependency hierarchy convict tgz root library x tgz vulnerable library tgz json for humans library home page a href path to dependency file send package json path to vulnerable library node modules package json dependency hierarchy babel loader tgz root library loader utils tgz x tgz vulnerable library vulnerability details is an extension to the popular json file format that aims to be easier to write and maintain by hand e g for config files the parse method of the library before and including version does not restrict parsing of keys named proto allowing specially crafted strings to pollute the prototype of the resulting object this vulnerability pollutes the prototype of the object returned by parse and not the global object prototype which is the commonly understood definition of prototype pollution however polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations this vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from parse the actual impact will depend on how applications utilize the returned object and how they filter unwanted keys but could include denial of service cross site scripting elevation of privilege and in extreme cases remote code execution parse should restrict parsing of proto keys when parsing json strings to objects as a point of reference the json parse method included in javascript ignores proto keys simply changing parse to json parse in the examples above mitigates this vulnerability this vulnerability is patched in version and later publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact low availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
| 0
|
62,826
| 17,203,534,701
|
IssuesEvent
|
2021-07-17 19:08:29
|
InterNetNews/inn
|
https://api.github.com/repos/InterNetNews/inn
|
closed
|
nnrpd doesn't support passwords with spaces
|
C: nnrpd P: low R: fixed T: defect
|
**Reported by eagle on 14 Dec 2008 06:54 UTC**
The NNTP protocol uses whitespace as a command and argument separator, which means that passwords containing whitespace don't work. The generic NNTP parser in nnrpd throws away the tail end of the password or produces a syntax error.
However, since the password is the last argument, we can hack around this problem. Here's a patch from Jeffrey M. Vinocur from 2001 that implements that fix, which may require some updating.
|
1.0
|
nnrpd doesn't support passwords with spaces - **Reported by eagle on 14 Dec 2008 06:54 UTC**
The NNTP protocol uses whitespace as a command and argument separator, which means that passwords containing whitespace don't work. The generic NNTP parser in nnrpd throws away the tail end of the password or produces a syntax error.
However, since the password is the last argument, we can hack around this problem. Here's a patch from Jeffrey M. Vinocur from 2001 that implements that fix, which may require some updating.
|
defect
|
nnrpd doesn t support passwords with spaces reported by eagle on dec utc the nntp protocol uses whitespace as a command and argument separator which means that passwords containing whitespace don t work the generic nntp parser in nnrpd throws away the tail end of the password or produces a syntax error however since the password is the last argument we can hack around this problem here s a patch from jeffrey m vinocur from that implements that fix which may require some updating
| 1
|
357,247
| 10,604,064,219
|
IssuesEvent
|
2019-10-10 17:20:50
|
seakers/ABSP-EOSS
|
https://api.github.com/repos/seakers/ABSP-EOSS
|
opened
|
planner: Time Assignment Issues
|
Low Priority bug
|
Agents seem vary their start times for tasks as they do their bundles.
|
1.0
|
planner: Time Assignment Issues - Agents seem vary their start times for tasks as they do their bundles.
|
non_defect
|
planner time assignment issues agents seem vary their start times for tasks as they do their bundles
| 0
|
11,004
| 2,622,954,639
|
IssuesEvent
|
2015-03-04 09:03:01
|
folded/carve
|
https://api.github.com/repos/folded/carve
|
closed
|
intersect hangs when using "--triangulate" option
|
auto-migrated Priority-Medium Type-Defect
|
```
What steps will reproduce the problem?
1. untar the attached tar.bz2 file to get object files
2. run "intersect --triangulate --obj a.obj A_MINUS_B b.obj"
What is the expected output? What do you see instead?
Should complete execution; instead hangs after printing "doTriangulate
complete; remain=20"
What version of the product are you using? On what operating system?
carve-1.0.0, downloaded Jun 1; running on Ubuntu 9.04 i386, compiled with
gcc 4.3.3
```
Original issue reported on code.google.com by `ken.l.hu...@gmail.com` on 2 Jun 2009 at 10:13
Attachments:
* [triangulate-bug.tar.bz2](https://storage.googleapis.com/google-code-attachments/carve/issue-7/comment-0/triangulate-bug.tar.bz2)
|
1.0
|
intersect hangs when using "--triangulate" option - ```
What steps will reproduce the problem?
1. untar the attached tar.bz2 file to get object files
2. run "intersect --triangulate --obj a.obj A_MINUS_B b.obj"
What is the expected output? What do you see instead?
Should complete execution; instead hangs after printing "doTriangulate
complete; remain=20"
What version of the product are you using? On what operating system?
carve-1.0.0, downloaded Jun 1; running on Ubuntu 9.04 i386, compiled with
gcc 4.3.3
```
Original issue reported on code.google.com by `ken.l.hu...@gmail.com` on 2 Jun 2009 at 10:13
Attachments:
* [triangulate-bug.tar.bz2](https://storage.googleapis.com/google-code-attachments/carve/issue-7/comment-0/triangulate-bug.tar.bz2)
|
defect
|
intersect hangs when using triangulate option what steps will reproduce the problem untar the attached tar file to get object files run intersect triangulate obj a obj a minus b b obj what is the expected output what do you see instead should complete execution instead hangs after printing dotriangulate complete remain what version of the product are you using on what operating system carve downloaded jun running on ubuntu compiled with gcc original issue reported on code google com by ken l hu gmail com on jun at attachments
| 1
|
359,780
| 10,680,852,036
|
IssuesEvent
|
2019-10-21 22:33:23
|
googleapis/google-cloud-ruby
|
https://api.github.com/repos/googleapis/google-cloud-ruby
|
closed
|
High number of threads created by GCP error reporting gem
|
priority: p1 type: bug
|
We use GCP Error Reporting, GCP Logging and GCP Pub/Sub. Our job processing backend based on Pub/Sub would frequently freeze. I "augmented" `Thread` to understand where threads were being created. In the output, it showed that the calls originated in the GCP Error Reporting gem. The issue was reproducible both locally on Mac OS X as well as on Heroku.
1) Is this expected when there are a lot of errors to report?
Another two questions, if I may ask here:
2) How does the GCP Pub/Sub library rate limit its message stream? E.g. say the callback thread processor doesn't catch up with the rate of incoming messages.
3) If I understood correctly, the stop method of the subscriber is spawning threads; this may not work reliably during SIGTERMs and other signals.
|
1.0
|
High number of threads created by GCP error reporting gem - We use GCP Error Reporting, GCP Logging and GCP Pub/Sub. Our job processing backend based on Pub/Sub would frequently freeze. I "augmented" `Thread` to understand where threads were being created. In the output, it showed that the calls originated in the GCP Error Reporting gem. The issue was reproducible both locally on Mac OS X as well as on Heroku.
1) Is this expected when there are a lot of errors to report?
Another two questions, if I may ask here:
2) How does the GCP Pub/Sub library rate limit its message stream? E.g. say the callback thread processor doesn't catch up with the rate of incoming messages.
3) If I understood correctly, the stop method of the subscriber is spawning threads; this may not work reliably during SIGTERMs and other signals.
|
non_defect
|
high number of threads created by gcp error reporting gem we use gcp error reporting gcp logging and gcp pub sub our job processing backend based on pub sub would frequently freeze i augmented thread to understand where threads were being created in the output it showed that the calls originated in the gcp error reporting gem the issue was reproducible both locally on mac os x as well as on heroku is this expected when there are a lot of errors to report another two questions if i may ask here how does the gcp pub sub library rate limit its message stream e g say the callback thread processor doesn t catch up with the rate of incoming messages if i understood correctly the stop method of the subscriber is spawning threads this may not work reliably during sigterms and other signals
| 0
|
146,798
| 11,757,257,216
|
IssuesEvent
|
2020-03-13 13:21:06
|
IBMStreams/streamsx.topology
|
https://api.github.com/repos/IBMStreams/streamsx.topology
|
closed
|
Consistent naming for Python test classes.
|
test
|
The tests tend to have three classes for standalone, distributed and streaming analytics service.
The naming for these classes is inconsistent, mainly for streaming analytics service ones with a mix of `Bluemix`, `Cloud`, `Service` in the class name and the qualifier either being at the end or in the middle.
Need to have a standard pattern, that may then also support runners like nose being able to select a subset of all distributed tests. Propose:
- `TestXyz` - Tests Xyz using standalone or a test that does not require a Streams application (e.g. api testing).
- `TestDistributedXyz` - Tests Xyz using distributed - Typically extends `TestXyz`
- `TestSasXyz` - Tests Xyz using Streaming Analytics service - Typically extends `TestDistributedXyz`
|
1.0
|
Consistent naming for Python test classes. - The tests tend to have three classes for standalone, distributed and streaming analytics service.
The naming for these classes is inconsistent, mainly for streaming analytics service ones with a mix of `Bluemix`, `Cloud`, `Service` in the class name and the qualifier either being at the end or in the middle.
Need to have a standard pattern, that may then also support runners like nose being able to select a subset of all distributed tests. Propose:
- `TestXyz` - Tests Xyz using standalone or a test that does not require a Streams application (e.g. api testing).
- `TestDistributedXyz` - Tests Xyz using distributed - Typically extends `TestXyz`
- `TestSasXyz` - Tests Xyz using Streaming Analytics service - Typically extends `TestDistributedXyz`
|
non_defect
|
consistent naming for python test classes the tests tend to have three classes for standalone distributed and streaming analytics service the naming for these classes is inconsistent mainly for streaming analytics service ones with a mix of bluemix cloud service in the class name and the qualifier either being at the end or in the middle need to have a standard pattern that may then also support runners like nose being able to select a subset of all distributed tests propose testxyz tests xyz using standalone or a test that does not require a streams application e g api testing testdistributedxyz tests xyz using distributed typically extends testxyz testsasxyz tests xyz using streaming analytics service typically extends testdistributedxyz
| 0
|
54,871
| 14,001,980,711
|
IssuesEvent
|
2020-10-28 14:16:59
|
vector-im/element-web
|
https://api.github.com/repos/vector-im/element-web
|
closed
|
Inline images should follow the preview rule
|
bug defect p1 severity:minor type:media
|
Someone who doesn't want images to autoload, in general won't care how those images are coded. MXC images should not show when previewing is off - or else there should be more fine-grained control over what to autoshow and what not.
|
1.0
|
Inline images should follow the preview rule - Someone who doesn't want images to autoload, in general won't care how those images are coded. MXC images should not show when previewing is off - or else there should be more fine-grained control over what to autoshow and what not.
|
defect
|
inline images should follow the preview rule someone who doesn t want images to autoload in general won t care how those images are coded mxc images should not show when previewing is off or else there should be more fine grained control over what to autoshow and what not
| 1
|
26,395
| 4,691,546,620
|
IssuesEvent
|
2016-10-11 10:57:12
|
hazelcast/hazelcast
|
https://api.github.com/repos/hazelcast/hazelcast
|
closed
|
NPE Diagnostics
|
Team: QuSP Type: Defect
|
NPE using 3.8 master.
```
output threads
WARN 2016-10-11 11:20:53,441 [hz._hzInstance_1_workers.DiagnosticsSchedulerThread] com.hazelcast.internal.diagnostics.Diagnostics: [10.212.1.111]:5701 [workers] [3.8-SNAPSHOT] Failed to write file: /home/simulator/hazelcast-simulator-0.9-
RC1-SNAPSHOT/workers/2016-10-11__11_20_47/C_A1_W1-10.212.1.111-member/diagnostics-10.212.1.111_5701-1476174052737-000.log
java.lang.NullPointerException
at java.io.PrintWriter.write(PrintWriter.java:473)
at com.hazelcast.internal.diagnostics.DiagnosticsLogWriter.write(DiagnosticsLogWriter.java:107)
at com.hazelcast.internal.diagnostics.MultiLineDiagnosticsLogWriter.writeKeyValueEntry(MultiLineDiagnosticsLogWriter.java:75)
at com.hazelcast.internal.diagnostics.MemberHazelcastInstanceInfoPlugin.run(MemberHazelcastInstanceInfoPlugin.java:74)
at com.hazelcast.internal.diagnostics.DiagnosticsLogFile.renderPlugin(DiagnosticsLogFile.java:109)
at com.hazelcast.internal.diagnostics.DiagnosticsLogFile.write(DiagnosticsLogFile.java:84)
at com.hazelcast.internal.diagnostics.Diagnostics$WritePluginTask.run(Diagnostics.java:214)
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)
at java.util.concurrent.FutureTask.runAndReset(FutureTask.java:308)
at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$301(ScheduledThreadPoolExecutor.java:180)
at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:294)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
at java.lang.Thread.run(Thread.java:745)
```
|
1.0
|
NPE Diagnostics - NPE using 3.8 master.
```
output threads
WARN 2016-10-11 11:20:53,441 [hz._hzInstance_1_workers.DiagnosticsSchedulerThread] com.hazelcast.internal.diagnostics.Diagnostics: [10.212.1.111]:5701 [workers] [3.8-SNAPSHOT] Failed to write file: /home/simulator/hazelcast-simulator-0.9-
RC1-SNAPSHOT/workers/2016-10-11__11_20_47/C_A1_W1-10.212.1.111-member/diagnostics-10.212.1.111_5701-1476174052737-000.log
java.lang.NullPointerException
at java.io.PrintWriter.write(PrintWriter.java:473)
at com.hazelcast.internal.diagnostics.DiagnosticsLogWriter.write(DiagnosticsLogWriter.java:107)
at com.hazelcast.internal.diagnostics.MultiLineDiagnosticsLogWriter.writeKeyValueEntry(MultiLineDiagnosticsLogWriter.java:75)
at com.hazelcast.internal.diagnostics.MemberHazelcastInstanceInfoPlugin.run(MemberHazelcastInstanceInfoPlugin.java:74)
at com.hazelcast.internal.diagnostics.DiagnosticsLogFile.renderPlugin(DiagnosticsLogFile.java:109)
at com.hazelcast.internal.diagnostics.DiagnosticsLogFile.write(DiagnosticsLogFile.java:84)
at com.hazelcast.internal.diagnostics.Diagnostics$WritePluginTask.run(Diagnostics.java:214)
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)
at java.util.concurrent.FutureTask.runAndReset(FutureTask.java:308)
at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$301(ScheduledThreadPoolExecutor.java:180)
at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:294)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
at java.lang.Thread.run(Thread.java:745)
```
|
defect
|
npe diagnostics npe using master output threads warn com hazelcast internal diagnostics diagnostics failed to write file home simulator hazelcast simulator snapshot workers c member diagnostics log java lang nullpointerexception at java io printwriter write printwriter java at com hazelcast internal diagnostics diagnosticslogwriter write diagnosticslogwriter java at com hazelcast internal diagnostics multilinediagnosticslogwriter writekeyvalueentry multilinediagnosticslogwriter java at com hazelcast internal diagnostics memberhazelcastinstanceinfoplugin run memberhazelcastinstanceinfoplugin java at com hazelcast internal diagnostics diagnosticslogfile renderplugin diagnosticslogfile java at com hazelcast internal diagnostics diagnosticslogfile write diagnosticslogfile java at com hazelcast internal diagnostics diagnostics writeplugintask run diagnostics java at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask runandreset futuretask java at java util concurrent scheduledthreadpoolexecutor scheduledfuturetask access scheduledthreadpoolexecutor java at java util concurrent scheduledthreadpoolexecutor scheduledfuturetask run scheduledthreadpoolexecutor java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java
| 1
|
81,545
| 30,960,573,539
|
IssuesEvent
|
2023-08-08 03:21:11
|
SeleniumHQ/selenium
|
https://api.github.com/repos/SeleniumHQ/selenium
|
closed
|
[🐛 Bug]: Selenium Manager fails on chrome v115
|
I-defect needs-triaging
|
### What happened?
Let me know if this should land in a chrome bug report instead happy to create this there if needed.
When selenium-manager.exe attempts to download the correct version of the chrome webdriver it fails with the message
ERROR Wrong browser/driver version
I believe this is related to just the most recent version of Chrome (115)
https://chromedriver.storage.googleapis.com/LATEST_RELEASE_115
```
<Error>
<Code>NoSuchKey</Code>
<Message>The specified key does not exist.</Message>
<Details>No such object: chromedriver/LATEST_RELEASE_115</Details>
</Error>
```
```
./selenium-manager.exe --trace --browser chrome
TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json
DEBUG Using shell command to find out chrome version
DEBUG Running cmd command: "wmic datafile where name='%PROGRAMFILES:\\=\\\\%\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe' get Version /value"
DEBUG Output { status: ExitStatus(ExitStatus(0)), stdout: "\r\r\n\r\r\nVersion=115.0.5790.171\r\r\n\r\r\n\r\r\n\r\r\n", stderr: "" }
DEBUG The version of chrome is 115.0.5790.171
TRACE Writing metadata to C:\Users\jf6856\.cache\selenium\selenium-manager.json
DEBUG Detected browser: chrome 115
TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json
DEBUG Reading chromedriver version from https://chromedriver.storage.googleapis.com/LATEST_RELEASE_115
DEBUG starting new connection: https://chromedriver.storage.googleapis.com/
TRACE registering event source with poller: token=Token(0), interests=READABLE | WRITABLE
DEBUG No cached session for DnsName(DnsName(DnsName("chromedriver.storage.googleapis.com")))
DEBUG Not resuming any session
TRACE Sending ClientHello Message {
version: TLSv1_0,
payload: Handshake {
parsed: HandshakeMessagePayload {
typ: ClientHello,
payload: ClientHello(
ClientHelloPayload {
client_version: TLSv1_2,
random: 9be3753a2c9ec3695136ab5174467e55e9ed4f1639b243cde73834cb134c89c9,
session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2,
cipher_suites: [
TLS13_AES_256_GCM_SHA384,
TLS13_AES_128_GCM_SHA256,
TLS13_CHACHA20_POLY1305_SHA256,
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,
TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
],
compression_methods: [
Null,
],
extensions: [
SupportedVersions(
[
TLSv1_3,
TLSv1_2,
],
),
ECPointFormats(
[
Uncompressed,
],
),
NamedGroups(
[
X25519,
secp256r1,
secp384r1,
],
),
SignatureAlgorithms(
[
ECDSA_NISTP384_SHA384,
ECDSA_NISTP256_SHA256,
ED25519,
RSA_PSS_SHA512,
RSA_PSS_SHA384,
RSA_PSS_SHA256,
RSA_PKCS1_SHA512,
RSA_PKCS1_SHA384,
RSA_PKCS1_SHA256,
],
),
ExtendedMasterSecretRequest,
CertificateStatusRequest(
OCSP(
OCSPCertificateStatusRequest {
responder_ids: [],
extensions: ,
},
),
),
ServerName(
[
ServerName {
typ: HostName,
payload: HostName(
(
6368726f6d656472697665722e73746f726167652e676f6f676c65617069732e636f6d,
DnsName(
"chromedriver.storage.googleapis.com",
),
),
),
},
],
),
SignedCertificateTimestampRequest,
KeyShare(
[
KeyShareEntry {
group: X25519,
payload: e10431044ddb0a9e16f01bccb60a6ea0b7d41c8283604893388b2e44895a8d4f,
},
],
),
PresharedKeyModes(
[
PSK_DHE_KE,
],
),
Protocols(
[
6832,
687474702f312e31,
],
),
SessionTicket(
Request,
),
],
},
),
},
encoded: 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,
},
}
TRACE We got ServerHello ServerHelloPayload {
legacy_version: TLSv1_2,
random: 1e202b437593c6ded1bc00a8dee0793c2e638da8952d5144e1be8e1a04429008,
session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2,
cipher_suite: TLS13_AES_256_GCM_SHA384,
compression_method: Null,
extensions: [
KeyShare(
KeyShareEntry {
group: X25519,
payload: a22b136ad149736dc834ed950e6f9b19cfd8f2121e1fe6265d3537456aa02237,
},
),
SupportedVersions(
TLSv1_3,
),
],
}
DEBUG Using ciphersuite TLS13_AES_256_GCM_SHA384
DEBUG Not resuming
TRACE EarlyData rejected
TRACE Dropping CCS
DEBUG TLS1.3 encrypted extensions: [Protocols([6832])]
DEBUG ALPN protocol is Some(b"h2")
TRACE Server cert is [Certificate(b"0\x82\x06m0\x82\x05U\xa0\x03\x02\x01\x02\x02\x11\0\x87\xbe\t\xcd\x0e!\xc7X\n\x03\xe1\x91\xc1\xe1\xe2:0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x1e\x17\r230710082045Z\x17\r231002082044Z0#1!0\x1f\x06\x03U\x04\x03\x0c\x18*.storage.googleapis.com0Y0\x13\x06\x07*\x86H\xce=\x02\x01\x06\x08*\x86H\xce=\x03\x01\x07\x03B\0\x04\xbf@\xbf\xedpu:K\xb5\x12\x7f\x11\xc7\xc3\x07\xa4\xeb,U\xf5\x82\x80V\xa0\x83\x93\xcb]\0\"\xa5\xec'\x84\nZ5F@s\xe6\xba\xeb\xd8\x8bI\xb5M\x0e\x11&\xb1\xc1\xb9\xad\x18\xaf\xb1ql\x80e0\xb3\xa3\x82\x04B0\x82\x04>0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x07\x800\x13\x06\x03U\x1d%\x04\x0c0\n\x06\x08+\x06\x01\x05\x05\x07\x03\x010\x0c\x06\x03U\x1d\x13\x01\x01\xff\x04\x020\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x142\xf1W\xf0\xd1\x93g\xf1\x81n\xc6\x078A\xcc\x0e\xe4c\xc6\xa80\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0j\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04^0\\0'\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1bhttp://ocsp.pki.goog/gts1c301\x06\x08+\x06\x01\x05\x05\x070\x02\x86%http://pki.goog/repo/certs/gts1c3.der0\x82\x01\xf1\x06\x03U\x1d\x11\x04\x82\x01\xe80\x82\x01\xe4\x82\x18*.storage.googleapis.com\x82\x10*.googleapis.com\x82 commondatastorage.googleapis.com\x82\"*.commondatastorage.googleapis.com\x82\x16storage.googleapis.com\x82\x19storage-p2.googleapis.com\x82\x1b*.storage-p2.googleapis.com\x82\x1bstorage.mtls.googleapis.com\x82$*.appspot.com.storage.googleapis.com\x82 *.content-storage.googleapis.com\x82#*.content-storage-p2.googleapis.com\x82'*.content-storage-upload.googleapis.com\x82)*.content-storage-download.googleapis.com\x82\x1f*.storage-upload.googleapis.com\x82!*.storage-download.googleapis.com0!\x06\x03U\x1d \x04\x1a0\x180\x08\x06\x06g\x81\x0c\x01\x02\x010\x0c\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030<\x06\x03U\x1d\x1f\x0450301\xa0/\xa0-\x86+http://crls.pki.goog/gts1c3/fVJxbV-Ktmk.crl0\x82\x01\x05\x06\n+\x06\x01\x04\x01\xd6y\x02\x04\x02\x04\x81\xf6\x04\x81\xf3\0\xf1\0v\0\xad\xf7\xbe\xfa|\xff\x10\xc8\x8b\x9d=\x9c\x1e>\x18j\xb4g)]\xcf\xb1\x0c$\xca\x85\x864\xeb\xdc\x82\x8a\0\0\x01\x89?\x1a\x94\xfe\0\0\x04\x03\0G0E\x02 i]\x13\xa0\x0b\xc6\xce\xeeU\x841j>\xe5\x94x\xa0\x01.\x81ZD3$v\x15D\x1bEQ\x98\xe6\x02!\0\xbeq<\x88\x196pj\x0e\x10\x17\xe5\xdc\xb9\x0bT@\x8c\xdc\xda\xc5\x017\xc1\x82c\xa0\x86\x9aFB\x02\0w\0\xb3sw\x07\xe1\x84P\xf8c\x86\xd6\x05\xa9\xdc\x11\tJy-\xb1g\x0c\x0b\x87\xdc\xf0\x03\x0ey6\xa5\x9a\0\0\x01\x89?\x1a~9\0\0\x04\x03\0H0F\x02!\0\xa0\xf8'\xf2\xbe\x86t\xc7\x97\xbe\xbew\xff3\xad\x93@:UN\x9c\xd8\x82\x8c\x93\xd2\x91\xb6=AA\"\x02!\0\xdb_\xae^\xf2~\xf2\xd8\xcb\xba\xb6\xc1:\x9f\xc4[\xe2\xc3\x88\xc4\xca\x8e\xe5\xa3\xe7\x0cEg\x07U[10\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\0/\xfeg}\xde\x12\x06`\xb4\xc2\xbc\xc4\xce\xc8\xc8%\xc1_\xbfA\xe3\x16\xd5\x9d\xac\xf4)\xe5+\xfeK\xf0\n\xb3\xbb\xe0}\xe3g\xddmI\x0be\x90\xe8A\xa7\x9erV5\xf8\x15d\xcc=\x17\xd2\x0f\xa5v\x85\x0f\x03(b\xb7\xe7j\xe5\xe9YY\xfc\xb4\xa1\xe1\xe9\xff\xa4\x8c\x9d\xe0i`\xd3E\xf1f\xcd\xb4]?\xb5\xee\xa6\xd3\xbb\x90\x1d\x92\x8d\xc4\xa6\xe2\xb9=s\xa8e\xab\x14\x87\xc0\xde\xc8\xd6v\xcej7\x90F\xd4\xad\x89ek\xb3\xcb\x11\x10\xe9G\xcc\xff\x06\x9d\x8b2\xc3\xc7\x9a\xbf\x0fU\x90~\x16iJ\xce\xde,\x0b\xe2\xe9\x04\x8b\x8aC\xe7\xcf\x17^\xe0\xea\xee\x12\x98\x01\xdak\x11n!\x08\xaena/h\xe0\xe5;?`\xcc\x8e\xce\xf2\xd60\xca+G\r\x03u\x15\xd0\xbc\x855\xcb\xc87\xf9\xda\xe0\xef6\xbe\x86|\xd1E\x1e\x18\xa8\xcf\xf8 \x0eA\xde\xdb9\xaa\x19vJ\xa4\x93\xed\x93\x85\xb7\x03A.\xfa\x90\xee\x1b&})\xa8\xb4;\xaeX\xb4\xca"), Certificate(b"0\x82\x05\x960\x82\x03~\xa0\x03\x02\x01\x02\x02\r\x02\x03\xbcSYk4\xc7\x18\xf5\x01Pf0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x1e\x17\r200813000042Z\x17\r270930000042Z0F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x82\x01\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x01\x0f\00\x82\x01\n\x02\x82\x01\x01\0\xf5\x88\xdf\xe7b\x8c\x1e7\xf87B\x90\x7fl\x87\xd0\xfbe\x82%\xfd\xe8\xcbk\xa4\xffm\xe9Z#\xe2\x99\xf6\x1c\xe9\x92\x03\x99\x13|\t\n\x8a\xfaB\xd6^V$\xaaz3\x84\x1f\xd1\xe9i\xbb\xb9t\xecWLfh\x93w7US\xfe9\x10M\xb74\xbb_%w7;\x17\x94\xea<\xe5\x9d\xd5\xbc\xc3\xb4C\xeb.\xa7G\xef\xb0D\x11c\xd8\xb4A\x85\xddA0H\x93\x1b\xbf\xb7\xf6\xe0E\x02!\xe0\x96B\x17\xcf\xd9+eV4\x07&\x04\r\xa8\xfd}\xca.\xef\xeaH|7M?\0\x9f\x83\xdf\xefu\x84.yW\\\xfcWn\x1a\x96\xff\xfc\x8c\x9a\xa6\x99\xbe%\xd9\x7f\x96,\x06\xf7\x11*\x02\x80\x80\xebc\x18<PI\x87\xe5\x8a\xca_\x19+Y\x96\x81\0\xa0\xfbQ\xdb\xcaw\x0b\x0b\xc9\x96O\xefpI\xc7\\m \xfd\x99\xb4\xb4\xe2\xca.w\xfd-\xdc\x0b\xb6k\x13\x0c\x8c\x19+\x17\x96\x98\xb9\xf0\x8b\xf6\xa0'\xbb\xb6\xe3\x8dQ\x8f\xbd\xae\xc7\x9b\xb1\x89\x9d\x02\x03\x01\0\x01\xa3\x82\x01\x800\x82\x01|0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x1d\x06\x03U\x1d%\x04\x160\x14\x06\x08+\x06\x01\x05\x05\x07\x03\x01\x06\x08+\x06\x01\x05\x05\x07\x03\x020\x12\x06\x03U\x1d\x13\x01\x01\xff\x04\x080\x06\x01\x01\xff\x02\x01\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0h\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04\\0Z0&\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1ahttp://ocsp.pki.goog/gtsr100\x06\x08+\x06\x01\x05\x05\x070\x02\x86$http://pki.goog/repo/certs/gtsr1.der04\x06\x03U\x1d\x1f\x04-0+0)\xa0'\xa0%\x86#http://crl.pki.goog/gtsr1/gtsr1.crl0W\x06\x03U\x1d \x04P0N08\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030*0(\x06\x08+\x06\x01\x05\x05\x07\x02\x01\x16\x1chttps://pki.goog/repository/0\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x02\x01\0\x89}\xac \\\x0c<\xbe\x9a\xa8W\x95\x1b\xb4\xae\xfa\xab\xa5rq\xb46\x95\xfd\xdf@\x11\x03L\xc2F\x14\xbb\x14$\xab\xf0Pq\"\xdb\xad\xc4n\x7f\xcf\xf1jo\xc8\x83\x1b\xd8\xce\x89_\x87l\x87\xb8\xa9\x0c\xa3\x9b\xa1b\x94\x93\x95\xdf[\xaef\x19\x0b\x02\x96\x9e\xfc\xb5\xe7\x10i>z\xcbFI_F\xe1A\xb1\xd7\x98Me4\0\x80\x1a?O\x9fl\x7fI\0\x81SA\xa4\x92!\x82\x82\x1a\xf1\xa3D[*P\x12\x13M\xc1S6\xf3B\x08\xafT\xfa\x8ewS\x1bd8'\x17\t\xbdX\xc9\x1b|9-[\xf3\xce\xd4\xed\x97\xdb\x14\x03\xbf\tS$\x1f\xc2\x0c\x04y\x98&\xf2a\xf1SR\xfdB\x8c\x1bf+?\x15\xa1\xbb\xff\xf6\x9b\xe3\x81\x9a\x01\x06q\x895($\xdd\xe1\xbd\xeb\x19-\xe1H\xcb=Y\x83Q\xb4t\xc6\x9d|\xc6\xb1\x86[\xaf\xcc4\xc4\xd3\xcc\xd4\x81\x11\x95\0\xa1\xf4\x12\"\x01\xfa\xb4\x83q\xaf\x8c\xb7\x8cs$\xac7S\xc2\0\x90?\x11\xfe\\\xed6\x94\x10;\xbd)\xae\xe2\xc7:b;lc\xd9\x80\xbfYq\xacc'\xb9L\x17\xa0\xda\xf6s\x15\xbf*\xde\x8f\xf3\xa5l2\x813\x03\xd0\x86Qq\x994\xba\x93\x8d]\xb5QX\xf7\xb2\x93\xe8\x01\xf6Y\xbeq\x9b\xfdM(\xce\xcfm\xc7\x16\xdc\xf7\xd1\xd6F\x9b\xa7\xcak\xe9w\x0f\xfd\xa0\xb6\x1b#\x83\x1d\x10\x1a\xd9\t\0\x84\xe0D\xd3\xa2u#\xb34\x86\xf6 \xb0\xa4^\x10\x1d\xe0RF\0\x9d\xb1\x0f\x1f!pQ\xf5\x9a\xdd\x06\xfcU\xf4+\x0e3w\xc3KB\xc2\xf1w\x13\xfcs\x80\x94\xeb\x1f\xbb7?\xce\x02*f\xb0s\x1d2\xa52l2\xb0\x8e\xe0\xc4#\xff[}Mep\xac+\x9b=\xce\xdb\xe0m\x8e2\x80\xbe\x96\x9f\x92c\xbc\x97\xbb]\xb9\xf4\xe1q^*\xe4\xef\x03\"\xb1\x8ae:\x8f\xc0\x93e\xd4\x85\xcd\x0f\x0f[\x83Y\x16G\x16-\x9c$:\xc8\x80\xa6&\x14\x85\x9b\xf67\x9b\xaco\xf9\xc5\xc3\x06Q\xf3\xe2\x7f\xc5\xb1\x10\xbaQ\xf4\xdd"), Certificate(b"0\x82\x05b0\x82\x04J\xa0\x03\x02\x01\x02\x02\x10w\xbd\rl\xdb6\xf9\x1a\xea!\x0f\xc4\xf0X\xd3\r0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00W1\x0b0\t\x06\x03U\x04\x06\x13\x02BE1\x190\x17\x06\x03U\x04\n\x13\x10GlobalSign nv-sa1\x100\x0e\x06\x03U\x04\x0b\x13\x07Root CA1\x1b0\x19\x06\x03U\x04\x03\x13\x12GlobalSign Root CA0\x1e\x17\r200619000042Z\x17\r280128000042Z0G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x82\x02\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x02\x0f\00\x82\x02\n\x02\x82\x02\x01\0\xb6\x11\x02\x8b\x1e\xe3\xa1w\x9b;\xdc\xbf\x94>\xb7\x95\xa7@<\xa1\xfd\x82\xf9}2\x06\x82q\xf6\xf6\x8c\x7f\xfb\xe8\xdb\xbcj.\x97\x97\xa3\x8cK\xf9+\xf6\xb1\xf9\xce\x84\x1d\xb1\xf9\xc5\x97\xde\xef\xb9\xf2\xa3\xe9\xbc\x12\x89^\xa7\xaaR\xab\xf8#'\xcb\xa4\xb1\x9cc\xdb\xd7\x99~\xf0\n^\xebh\xa6\xf4\xc6ZG\rM\x103\xe3N\xb1\x13\xa3\xc8\x18lK\xec\xfc\t\x90\xdf\x9dd)%#\x07\xa1\xb4\xd2=.`\xe0\xcf\xd2\t\x87\xbb\xcdH\xf0M\xc2\xc2z\x88\x8a\xbb\xba\xcfY\x19\xd6\xaf\x8f\xb0\x07\xb0\x9e1\xf1\x82\xc1\xc0\xdf.\xa6ml\x19\x0e\xb5\xd8~&\x1aE\x03=\xb0y\xa4\x94(\xad\x0f\x7f&\xe5\xa8\x08\xfe\x96\xe8<h\x94S\xee\x83:\x88+\x15\x96\t\xb2\xe0z\x8c.u\xd6\x9c\xeb\xa7Vd\x8f\x96Oh\xae=\x97\xc2\x84\x8f\xc0\xbc@\xc0\x0b\\\xbd\xf6\x87\xb35l\xac\x18P\x7f\x84\xe0L\xcd\x92\xd3 \xe93\xbcR\x99\xaf2\xb5)\xb3%*\xb4H\xf9r\xe1\xcad\xf7\xe6\x82\x10\x8d\xe8\x9d\xc2\x8a\x88\xfa8f\x8a\xfcc\xf9\x01\xf9x\xfd{\\w\xfav\x87\xfa\xec\xdf\xb1\x0ey\x95W\xb4\xbd&\xef\xd6\x01\xd1\xeb\x16\n\xbb\x8e\x0b\xb5\xc5\xc5\x8aU\xab\xd3\xac\xea\x91K)\xcc\x19\xa42%N*\xf1eD\xd0\x02\xce\xaa\xceI\xb4\xea\x9f|\x83\xb0@{\xe7C\xab\xa7l\xa3\x8f}\x89\x81\xfaL\xa5\xff\xd5\x8e\xc3\xceK\xe0\xb5\xd8\xb3\x8eE\xcfv\xc0\xed@+\xfdS\x0f\xb0\xa7\xd5;\r\xb1\x8a\xa2\x03\xde1\xad\xccw\xeao{>\xd6\xdf\x91\"\x12\xe6\xbe\xfa\xd82\xfc\x10c\x14Qr\xde]\xd6\x16\x93\xbd)h3\xef:f\xec\x07\x8a&\xdf\x13\xd7Wex'\xde^I\x14\0\xa2\0\x7f\x9a\xa8!\xb6\xa9\xb1\x95\xb0\xa5\xb9\r\x16\x11\xda\xc7lH<@\xe0~\rZ\xcdV<\xd1\x97\x05\xb9\xcbK\xed9K\x9c\xc4?\xd2U\x13n$\xb0\xd6q\xfa\xf4\xc1\xba\xcc\xed\x1b\xf5\xfe\x81A\xd8\0\x98=:\xc8\xaez\x987\x18\x05\x95\x02\x03\x01\0\x01\xa3\x82\x0180\x82\x0140\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x0f\x06\x03U\x1d\x13\x01\x01\xff\x04\x050\x03\x01\x01\xff0\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14`{f\x1aE\r\x97\xca\x89P/}\x04\xcd4\xa8\xff\xfc\xfdK0`\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04T0R0%\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x19http://ocsp.pki.goog/gsr10)\x06\x08+\x06\x01\x05\x05\x070\x02\x86\x1dhttp://pki.goog/gsr1/gsr1.crt02\x06\x03U\x1d\x1f\x04+0)0'\xa0%\xa0#\x86!http://crl.pki.goog/gsr1/gsr1.crl0;\x06\x03U\x1d \x044020\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x030\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\04\xa4\x1e\xb1(\xa3\xd0\xb4v\x17\xa61z!\xe9\xd1R>\xc8\xdbt\x16A\x88\xb8=5\x1d\xed\xe4\xff\x93\xe1\\_\xab\xbb\xea|\xcf\xdb\xe4\r\xd1\x8bW\xf2&o[\xbe\x17Fh\x947okz\xc8\xc0\x187\xfa%Q\xac\xech\xbf\xb2\xc8I\xfdZ\x9a\xca\x01#\xac\x84\x80+\x02\x8c\x99\x97\xebIj\x8cu\xd7\xc7\xde\xb2\xc9\x97\x9fXHW\x0e5\xa1\xe4\x1a\xd6\xfdo\x83\x81o\xef\x8c\xcf\x97\xaf\xc0\x85*\xf0\xf5Ni\t\x91-\xe1h\xb8\xc1+s\xe9\xd4\xd9\xfc\"\xc07\x1f\x0bf\x1dI\xed\x02U\x8fg\xe12\xd7\xd3&\xbfp\xe3=\xf4gm=|\xe54\x88\xe32\xfa\xa7n\x06jo\xbd\x8b\x91\xee\x16K\xe8;\xa9\xb37\xe7\xc3D\xa4~\xd8l\xd7\xc7F\xf5\x92\x9b\xe7\xd5!\xbef\x92\x19\x94Ul\xd4)\xb2\r\xc1f[\xe2wIH(\xed\x9d\xd7\x1a3rS\xb3\x825\xcfb\x8b\xc9$\x8b\xa5\xb79\x0c\xbb~*A\xbfR\xcf\xfc\xa2\x96\xb6\xc2\x82?")]
TRACE signal: Want
TRACE signal found waiting giver, notifying
TRACE poll_want: taker wants!
TRACE signal: Want
DEBUG Ticket saved
DEBUG Ticket saved
TRACE deregistering event source from poller
TRACE signal: Closed
ERROR Wrong browser/driver version
```
### How can we reproduce the issue?
```shell
No script required, ensure Chrome is on v115 and run
./selenium-manager.exe --browser chrome
```
```
### Relevant log output
```shell
<Error>
<Code>NoSuchKey</Code>
<Message>The specified key does not exist.</Message>
<Details>No such object: chromedriver/LATEST_RELEASE_115</Details>
</Error>
```
./selenium-manager.exe --trace --browser chrome
TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json
DEBUG Using shell command to find out chrome version
DEBUG Running cmd command: "wmic datafile where name='%PROGRAMFILES:\\=\\\\%\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe' get Version /value"
DEBUG Output { status: ExitStatus(ExitStatus(0)), stdout: "\r\r\n\r\r\nVersion=115.0.5790.171\r\r\n\r\r\n\r\r\n\r\r\n", stderr: "" }
DEBUG The version of chrome is 115.0.5790.171
TRACE Writing metadata to C:\Users\jf6856\.cache\selenium\selenium-manager.json
DEBUG Detected browser: chrome 115
TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json
DEBUG Reading chromedriver version from https://chromedriver.storage.googleapis.com/LATEST_RELEASE_115
DEBUG starting new connection: https://chromedriver.storage.googleapis.com/
TRACE registering event source with poller: token=Token(0), interests=READABLE | WRITABLE
DEBUG No cached session for DnsName(DnsName(DnsName("chromedriver.storage.googleapis.com")))
DEBUG Not resuming any session
TRACE Sending ClientHello Message {
version: TLSv1_0,
payload: Handshake {
parsed: HandshakeMessagePayload {
typ: ClientHello,
payload: ClientHello(
ClientHelloPayload {
client_version: TLSv1_2,
random: 9be3753a2c9ec3695136ab5174467e55e9ed4f1639b243cde73834cb134c89c9,
session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2,
cipher_suites: [
TLS13_AES_256_GCM_SHA384,
TLS13_AES_128_GCM_SHA256,
TLS13_CHACHA20_POLY1305_SHA256,
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,
TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
],
compression_methods: [
Null,
],
extensions: [
SupportedVersions(
[
TLSv1_3,
TLSv1_2,
],
),
ECPointFormats(
[
Uncompressed,
],
),
NamedGroups(
[
X25519,
secp256r1,
secp384r1,
],
),
SignatureAlgorithms(
[
ECDSA_NISTP384_SHA384,
ECDSA_NISTP256_SHA256,
ED25519,
RSA_PSS_SHA512,
RSA_PSS_SHA384,
RSA_PSS_SHA256,
RSA_PKCS1_SHA512,
RSA_PKCS1_SHA384,
RSA_PKCS1_SHA256,
],
),
ExtendedMasterSecretRequest,
CertificateStatusRequest(
OCSP(
OCSPCertificateStatusRequest {
responder_ids: [],
extensions: ,
},
),
),
ServerName(
[
ServerName {
typ: HostName,
payload: HostName(
(
6368726f6d656472697665722e73746f726167652e676f6f676c65617069732e636f6d,
DnsName(
"chromedriver.storage.googleapis.com",
),
),
),
},
],
),
SignedCertificateTimestampRequest,
KeyShare(
[
KeyShareEntry {
group: X25519,
payload: e10431044ddb0a9e16f01bccb60a6ea0b7d41c8283604893388b2e44895a8d4f,
},
],
),
PresharedKeyModes(
[
PSK_DHE_KE,
],
),
Protocols(
[
6832,
687474702f312e31,
],
),
SessionTicket(
Request,
),
],
},
),
},
encoded: 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,
},
}
TRACE We got ServerHello ServerHelloPayload {
legacy_version: TLSv1_2,
random: 1e202b437593c6ded1bc00a8dee0793c2e638da8952d5144e1be8e1a04429008,
session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2,
cipher_suite: TLS13_AES_256_GCM_SHA384,
compression_method: Null,
extensions: [
KeyShare(
KeyShareEntry {
group: X25519,
payload: a22b136ad149736dc834ed950e6f9b19cfd8f2121e1fe6265d3537456aa02237,
},
),
SupportedVersions(
TLSv1_3,
),
],
}
DEBUG Using ciphersuite TLS13_AES_256_GCM_SHA384
DEBUG Not resuming
TRACE EarlyData rejected
TRACE Dropping CCS
DEBUG TLS1.3 encrypted extensions: [Protocols([6832])]
DEBUG ALPN protocol is Some(b"h2")
TRACE Server cert is [Certificate(b"0\x82\x06m0\x82\x05U\xa0\x03\x02\x01\x02\x02\x11\0\x87\xbe\t\xcd\x0e!\xc7X\n\x03\xe1\x91\xc1\xe1\xe2:0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x1e\x17\r230710082045Z\x17\r231002082044Z0#1!0\x1f\x06\x03U\x04\x03\x0c\x18*.storage.googleapis.com0Y0\x13\x06\x07*\x86H\xce=\x02\x01\x06\x08*\x86H\xce=\x03\x01\x07\x03B\0\x04\xbf@\xbf\xedpu:K\xb5\x12\x7f\x11\xc7\xc3\x07\xa4\xeb,U\xf5\x82\x80V\xa0\x83\x93\xcb]\0\"\xa5\xec'\x84\nZ5F@s\xe6\xba\xeb\xd8\x8bI\xb5M\x0e\x11&\xb1\xc1\xb9\xad\x18\xaf\xb1ql\x80e0\xb3\xa3\x82\x04B0\x82\x04>0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x07\x800\x13\x06\x03U\x1d%\x04\x0c0\n\x06\x08+\x06\x01\x05\x05\x07\x03\x010\x0c\x06\x03U\x1d\x13\x01\x01\xff\x04\x020\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x142\xf1W\xf0\xd1\x93g\xf1\x81n\xc6\x078A\xcc\x0e\xe4c\xc6\xa80\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0j\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04^0\\0'\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1bhttp://ocsp.pki.goog/gts1c301\x06\x08+\x06\x01\x05\x05\x070\x02\x86%http://pki.goog/repo/certs/gts1c3.der0\x82\x01\xf1\x06\x03U\x1d\x11\x04\x82\x01\xe80\x82\x01\xe4\x82\x18*.storage.googleapis.com\x82\x10*.googleapis.com\x82 commondatastorage.googleapis.com\x82\"*.commondatastorage.googleapis.com\x82\x16storage.googleapis.com\x82\x19storage-p2.googleapis.com\x82\x1b*.storage-p2.googleapis.com\x82\x1bstorage.mtls.googleapis.com\x82$*.appspot.com.storage.googleapis.com\x82 *.content-storage.googleapis.com\x82#*.content-storage-p2.googleapis.com\x82'*.content-storage-upload.googleapis.com\x82)*.content-storage-download.googleapis.com\x82\x1f*.storage-upload.googleapis.com\x82!*.storage-download.googleapis.com0!\x06\x03U\x1d \x04\x1a0\x180\x08\x06\x06g\x81\x0c\x01\x02\x010\x0c\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030<\x06\x03U\x1d\x1f\x0450301\xa0/\xa0-\x86+http://crls.pki.goog/gts1c3/fVJxbV-Ktmk.crl0\x82\x01\x05\x06\n+\x06\x01\x04\x01\xd6y\x02\x04\x02\x04\x81\xf6\x04\x81\xf3\0\xf1\0v\0\xad\xf7\xbe\xfa|\xff\x10\xc8\x8b\x9d=\x9c\x1e>\x18j\xb4g)]\xcf\xb1\x0c$\xca\x85\x864\xeb\xdc\x82\x8a\0\0\x01\x89?\x1a\x94\xfe\0\0\x04\x03\0G0E\x02 i]\x13\xa0\x0b\xc6\xce\xeeU\x841j>\xe5\x94x\xa0\x01.\x81ZD3$v\x15D\x1bEQ\x98\xe6\x02!\0\xbeq<\x88\x196pj\x0e\x10\x17\xe5\xdc\xb9\x0bT@\x8c\xdc\xda\xc5\x017\xc1\x82c\xa0\x86\x9aFB\x02\0w\0\xb3sw\x07\xe1\x84P\xf8c\x86\xd6\x05\xa9\xdc\x11\tJy-\xb1g\x0c\x0b\x87\xdc\xf0\x03\x0ey6\xa5\x9a\0\0\x01\x89?\x1a~9\0\0\x04\x03\0H0F\x02!\0\xa0\xf8'\xf2\xbe\x86t\xc7\x97\xbe\xbew\xff3\xad\x93@:UN\x9c\xd8\x82\x8c\x93\xd2\x91\xb6=AA\"\x02!\0\xdb_\xae^\xf2~\xf2\xd8\xcb\xba\xb6\xc1:\x9f\xc4[\xe2\xc3\x88\xc4\xca\x8e\xe5\xa3\xe7\x0cEg\x07U[10\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\0/\xfeg}\xde\x12\x06`\xb4\xc2\xbc\xc4\xce\xc8\xc8%\xc1_\xbfA\xe3\x16\xd5\x9d\xac\xf4)\xe5+\xfeK\xf0\n\xb3\xbb\xe0}\xe3g\xddmI\x0be\x90\xe8A\xa7\x9erV5\xf8\x15d\xcc=\x17\xd2\x0f\xa5v\x85\x0f\x03(b\xb7\xe7j\xe5\xe9YY\xfc\xb4\xa1\xe1\xe9\xff\xa4\x8c\x9d\xe0i`\xd3E\xf1f\xcd\xb4]?\xb5\xee\xa6\xd3\xbb\x90\x1d\x92\x8d\xc4\xa6\xe2\xb9=s\xa8e\xab\x14\x87\xc0\xde\xc8\xd6v\xcej7\x90F\xd4\xad\x89ek\xb3\xcb\x11\x10\xe9G\xcc\xff\x06\x9d\x8b2\xc3\xc7\x9a\xbf\x0fU\x90~\x16iJ\xce\xde,\x0b\xe2\xe9\x04\x8b\x8aC\xe7\xcf\x17^\xe0\xea\xee\x12\x98\x01\xdak\x11n!\x08\xaena/h\xe0\xe5;?`\xcc\x8e\xce\xf2\xd60\xca+G\r\x03u\x15\xd0\xbc\x855\xcb\xc87\xf9\xda\xe0\xef6\xbe\x86|\xd1E\x1e\x18\xa8\xcf\xf8 \x0eA\xde\xdb9\xaa\x19vJ\xa4\x93\xed\x93\x85\xb7\x03A.\xfa\x90\xee\x1b&})\xa8\xb4;\xaeX\xb4\xca"), Certificate(b"0\x82\x05\x960\x82\x03~\xa0\x03\x02\x01\x02\x02\r\x02\x03\xbcSYk4\xc7\x18\xf5\x01Pf0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x1e\x17\r200813000042Z\x17\r270930000042Z0F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x82\x01\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x01\x0f\00\x82\x01\n\x02\x82\x01\x01\0\xf5\x88\xdf\xe7b\x8c\x1e7\xf87B\x90\x7fl\x87\xd0\xfbe\x82%\xfd\xe8\xcbk\xa4\xffm\xe9Z#\xe2\x99\xf6\x1c\xe9\x92\x03\x99\x13|\t\n\x8a\xfaB\xd6^V$\xaaz3\x84\x1f\xd1\xe9i\xbb\xb9t\xecWLfh\x93w7US\xfe9\x10M\xb74\xbb_%w7;\x17\x94\xea<\xe5\x9d\xd5\xbc\xc3\xb4C\xeb.\xa7G\xef\xb0D\x11c\xd8\xb4A\x85\xddA0H\x93\x1b\xbf\xb7\xf6\xe0E\x02!\xe0\x96B\x17\xcf\xd9+eV4\x07&\x04\r\xa8\xfd}\xca.\xef\xeaH|7M?\0\x9f\x83\xdf\xefu\x84.yW\\\xfcWn\x1a\x96\xff\xfc\x8c\x9a\xa6\x99\xbe%\xd9\x7f\x96,\x06\xf7\x11*\x02\x80\x80\xebc\x18<PI\x87\xe5\x8a\xca_\x19+Y\x96\x81\0\xa0\xfbQ\xdb\xcaw\x0b\x0b\xc9\x96O\xefpI\xc7\\m \xfd\x99\xb4\xb4\xe2\xca.w\xfd-\xdc\x0b\xb6k\x13\x0c\x8c\x19+\x17\x96\x98\xb9\xf0\x8b\xf6\xa0'\xbb\xb6\xe3\x8dQ\x8f\xbd\xae\xc7\x9b\xb1\x89\x9d\x02\x03\x01\0\x01\xa3\x82\x01\x800\x82\x01|0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x1d\x06\x03U\x1d%\x04\x160\x14\x06\x08+\x06\x01\x05\x05\x07\x03\x01\x06\x08+\x06\x01\x05\x05\x07\x03\x020\x12\x06\x03U\x1d\x13\x01\x01\xff\x04\x080\x06\x01\x01\xff\x02\x01\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0h\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04\\0Z0&\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1ahttp://ocsp.pki.goog/gtsr100\x06\x08+\x06\x01\x05\x05\x070\x02\x86$http://pki.goog/repo/certs/gtsr1.der04\x06\x03U\x1d\x1f\x04-0+0)\xa0'\xa0%\x86#http://crl.pki.goog/gtsr1/gtsr1.crl0W\x06\x03U\x1d \x04P0N08\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030*0(\x06\x08+\x06\x01\x05\x05\x07\x02\x01\x16\x1chttps://pki.goog/repository/0\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x02\x01\0\x89}\xac \\\x0c<\xbe\x9a\xa8W\x95\x1b\xb4\xae\xfa\xab\xa5rq\xb46\x95\xfd\xdf@\x11\x03L\xc2F\x14\xbb\x14$\xab\xf0Pq\"\xdb\xad\xc4n\x7f\xcf\xf1jo\xc8\x83\x1b\xd8\xce\x89_\x87l\x87\xb8\xa9\x0c\xa3\x9b\xa1b\x94\x93\x95\xdf[\xaef\x19\x0b\x02\x96\x9e\xfc\xb5\xe7\x10i>z\xcbFI_F\xe1A\xb1\xd7\x98Me4\0\x80\x1a?O\x9fl\x7fI\0\x81SA\xa4\x92!\x82\x82\x1a\xf1\xa3D[*P\x12\x13M\xc1S6\xf3B\x08\xafT\xfa\x8ewS\x1bd8'\x17\t\xbdX\xc9\x1b|9-[\xf3\xce\xd4\xed\x97\xdb\x14\x03\xbf\tS$\x1f\xc2\x0c\x04y\x98&\xf2a\xf1SR\xfdB\x8c\x1bf+?\x15\xa1\xbb\xff\xf6\x9b\xe3\x81\x9a\x01\x06q\x895($\xdd\xe1\xbd\xeb\x19-\xe1H\xcb=Y\x83Q\xb4t\xc6\x9d|\xc6\xb1\x86[\xaf\xcc4\xc4\xd3\xcc\xd4\x81\x11\x95\0\xa1\xf4\x12\"\x01\xfa\xb4\x83q\xaf\x8c\xb7\x8cs$\xac7S\xc2\0\x90?\x11\xfe\\\xed6\x94\x10;\xbd)\xae\xe2\xc7:b;lc\xd9\x80\xbfYq\xacc'\xb9L\x17\xa0\xda\xf6s\x15\xbf*\xde\x8f\xf3\xa5l2\x813\x03\xd0\x86Qq\x994\xba\x93\x8d]\xb5QX\xf7\xb2\x93\xe8\x01\xf6Y\xbeq\x9b\xfdM(\xce\xcfm\xc7\x16\xdc\xf7\xd1\xd6F\x9b\xa7\xcak\xe9w\x0f\xfd\xa0\xb6\x1b#\x83\x1d\x10\x1a\xd9\t\0\x84\xe0D\xd3\xa2u#\xb34\x86\xf6 \xb0\xa4^\x10\x1d\xe0RF\0\x9d\xb1\x0f\x1f!pQ\xf5\x9a\xdd\x06\xfcU\xf4+\x0e3w\xc3KB\xc2\xf1w\x13\xfcs\x80\x94\xeb\x1f\xbb7?\xce\x02*f\xb0s\x1d2\xa52l2\xb0\x8e\xe0\xc4#\xff[}Mep\xac+\x9b=\xce\xdb\xe0m\x8e2\x80\xbe\x96\x9f\x92c\xbc\x97\xbb]\xb9\xf4\xe1q^*\xe4\xef\x03\"\xb1\x8ae:\x8f\xc0\x93e\xd4\x85\xcd\x0f\x0f[\x83Y\x16G\x16-\x9c$:\xc8\x80\xa6&\x14\x85\x9b\xf67\x9b\xaco\xf9\xc5\xc3\x06Q\xf3\xe2\x7f\xc5\xb1\x10\xbaQ\xf4\xdd"), Certificate(b"0\x82\x05b0\x82\x04J\xa0\x03\x02\x01\x02\x02\x10w\xbd\rl\xdb6\xf9\x1a\xea!\x0f\xc4\xf0X\xd3\r0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00W1\x0b0\t\x06\x03U\x04\x06\x13\x02BE1\x190\x17\x06\x03U\x04\n\x13\x10GlobalSign nv-sa1\x100\x0e\x06\x03U\x04\x0b\x13\x07Root CA1\x1b0\x19\x06\x03U\x04\x03\x13\x12GlobalSign Root CA0\x1e\x17\r200619000042Z\x17\r280128000042Z0G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x82\x02\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x02\x0f\00\x82\x02\n\x02\x82\x02\x01\0\xb6\x11\x02\x8b\x1e\xe3\xa1w\x9b;\xdc\xbf\x94>\xb7\x95\xa7@<\xa1\xfd\x82\xf9}2\x06\x82q\xf6\xf6\x8c\x7f\xfb\xe8\xdb\xbcj.\x97\x97\xa3\x8cK\xf9+\xf6\xb1\xf9\xce\x84\x1d\xb1\xf9\xc5\x97\xde\xef\xb9\xf2\xa3\xe9\xbc\x12\x89^\xa7\xaaR\xab\xf8#'\xcb\xa4\xb1\x9cc\xdb\xd7\x99~\xf0\n^\xebh\xa6\xf4\xc6ZG\rM\x103\xe3N\xb1\x13\xa3\xc8\x18lK\xec\xfc\t\x90\xdf\x9dd)%#\x07\xa1\xb4\xd2=.`\xe0\xcf\xd2\t\x87\xbb\xcdH\xf0M\xc2\xc2z\x88\x8a\xbb\xba\xcfY\x19\xd6\xaf\x8f\xb0\x07\xb0\x9e1\xf1\x82\xc1\xc0\xdf.\xa6ml\x19\x0e\xb5\xd8~&\x1aE\x03=\xb0y\xa4\x94(\xad\x0f\x7f&\xe5\xa8\x08\xfe\x96\xe8<h\x94S\xee\x83:\x88+\x15\x96\t\xb2\xe0z\x8c.u\xd6\x9c\xeb\xa7Vd\x8f\x96Oh\xae=\x97\xc2\x84\x8f\xc0\xbc@\xc0\x0b\\\xbd\xf6\x87\xb35l\xac\x18P\x7f\x84\xe0L\xcd\x92\xd3 \xe93\xbcR\x99\xaf2\xb5)\xb3%*\xb4H\xf9r\xe1\xcad\xf7\xe6\x82\x10\x8d\xe8\x9d\xc2\x8a\x88\xfa8f\x8a\xfcc\xf9\x01\xf9x\xfd{\\w\xfav\x87\xfa\xec\xdf\xb1\x0ey\x95W\xb4\xbd&\xef\xd6\x01\xd1\xeb\x16\n\xbb\x8e\x0b\xb5\xc5\xc5\x8aU\xab\xd3\xac\xea\x91K)\xcc\x19\xa42%N*\xf1eD\xd0\x02\xce\xaa\xceI\xb4\xea\x9f|\x83\xb0@{\xe7C\xab\xa7l\xa3\x8f}\x89\x81\xfaL\xa5\xff\xd5\x8e\xc3\xceK\xe0\xb5\xd8\xb3\x8eE\xcfv\xc0\xed@+\xfdS\x0f\xb0\xa7\xd5;\r\xb1\x8a\xa2\x03\xde1\xad\xccw\xeao{>\xd6\xdf\x91\"\x12\xe6\xbe\xfa\xd82\xfc\x10c\x14Qr\xde]\xd6\x16\x93\xbd)h3\xef:f\xec\x07\x8a&\xdf\x13\xd7Wex'\xde^I\x14\0\xa2\0\x7f\x9a\xa8!\xb6\xa9\xb1\x95\xb0\xa5\xb9\r\x16\x11\xda\xc7lH<@\xe0~\rZ\xcdV<\xd1\x97\x05\xb9\xcbK\xed9K\x9c\xc4?\xd2U\x13n$\xb0\xd6q\xfa\xf4\xc1\xba\xcc\xed\x1b\xf5\xfe\x81A\xd8\0\x98=:\xc8\xaez\x987\x18\x05\x95\x02\x03\x01\0\x01\xa3\x82\x0180\x82\x0140\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x0f\x06\x03U\x1d\x13\x01\x01\xff\x04\x050\x03\x01\x01\xff0\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14`{f\x1aE\r\x97\xca\x89P/}\x04\xcd4\xa8\xff\xfc\xfdK0`\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04T0R0%\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x19http://ocsp.pki.goog/gsr10)\x06\x08+\x06\x01\x05\x05\x070\x02\x86\x1dhttp://pki.goog/gsr1/gsr1.crt02\x06\x03U\x1d\x1f\x04+0)0'\xa0%\xa0#\x86!http://crl.pki.goog/gsr1/gsr1.crl0;\x06\x03U\x1d \x044020\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x030\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\04\xa4\x1e\xb1(\xa3\xd0\xb4v\x17\xa61z!\xe9\xd1R>\xc8\xdbt\x16A\x88\xb8=5\x1d\xed\xe4\xff\x93\xe1\\_\xab\xbb\xea|\xcf\xdb\xe4\r\xd1\x8bW\xf2&o[\xbe\x17Fh\x947okz\xc8\xc0\x187\xfa%Q\xac\xech\xbf\xb2\xc8I\xfdZ\x9a\xca\x01#\xac\x84\x80+\x02\x8c\x99\x97\xebIj\x8cu\xd7\xc7\xde\xb2\xc9\x97\x9fXHW\x0e5\xa1\xe4\x1a\xd6\xfdo\x83\x81o\xef\x8c\xcf\x97\xaf\xc0\x85*\xf0\xf5Ni\t\x91-\xe1h\xb8\xc1+s\xe9\xd4\xd9\xfc\"\xc07\x1f\x0bf\x1dI\xed\x02U\x8fg\xe12\xd7\xd3&\xbfp\xe3=\xf4gm=|\xe54\x88\xe32\xfa\xa7n\x06jo\xbd\x8b\x91\xee\x16K\xe8;\xa9\xb37\xe7\xc3D\xa4~\xd8l\xd7\xc7F\xf5\x92\x9b\xe7\xd5!\xbef\x92\x19\x94Ul\xd4)\xb2\r\xc1f[\xe2wIH(\xed\x9d\xd7\x1a3rS\xb3\x825\xcfb\x8b\xc9$\x8b\xa5\xb79\x0c\xbb~*A\xbfR\xcf\xfc\xa2\x96\xb6\xc2\x82?")]
TRACE signal: Want
TRACE signal found waiting giver, notifying
TRACE poll_want: taker wants!
TRACE signal: Want
DEBUG Ticket saved
DEBUG Ticket saved
TRACE deregistering event source from poller
TRACE signal: Closed
ERROR Wrong browser/driver version
```
### Operating System
Windows 11
### Selenium version
selenium==4.8.0
### What are the browser(s) and version(s) where you see this issue?
Chrome 115
### What are the browser driver(s) and version(s) where you see this issue?
Chrome 115
### Are you using Selenium Grid?
N/A
|
1.0
|
[🐛 Bug]: Selenium Manager fails on chrome v115 - ### What happened?
Let me know if this should land in a chrome bug report instead happy to create this there if needed.
When selenium-manager.exe attempts to download the correct version of the chrome webdriver it fails with the message
ERROR Wrong browser/driver version
I believe this is related to just the most recent version of Chrome (115)
https://chromedriver.storage.googleapis.com/LATEST_RELEASE_115
```
<Error>
<Code>NoSuchKey</Code>
<Message>The specified key does not exist.</Message>
<Details>No such object: chromedriver/LATEST_RELEASE_115</Details>
</Error>
```
```
./selenium-manager.exe --trace --browser chrome
TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json
DEBUG Using shell command to find out chrome version
DEBUG Running cmd command: "wmic datafile where name='%PROGRAMFILES:\\=\\\\%\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe' get Version /value"
DEBUG Output { status: ExitStatus(ExitStatus(0)), stdout: "\r\r\n\r\r\nVersion=115.0.5790.171\r\r\n\r\r\n\r\r\n\r\r\n", stderr: "" }
DEBUG The version of chrome is 115.0.5790.171
TRACE Writing metadata to C:\Users\jf6856\.cache\selenium\selenium-manager.json
DEBUG Detected browser: chrome 115
TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json
DEBUG Reading chromedriver version from https://chromedriver.storage.googleapis.com/LATEST_RELEASE_115
DEBUG starting new connection: https://chromedriver.storage.googleapis.com/
TRACE registering event source with poller: token=Token(0), interests=READABLE | WRITABLE
DEBUG No cached session for DnsName(DnsName(DnsName("chromedriver.storage.googleapis.com")))
DEBUG Not resuming any session
TRACE Sending ClientHello Message {
version: TLSv1_0,
payload: Handshake {
parsed: HandshakeMessagePayload {
typ: ClientHello,
payload: ClientHello(
ClientHelloPayload {
client_version: TLSv1_2,
random: 9be3753a2c9ec3695136ab5174467e55e9ed4f1639b243cde73834cb134c89c9,
session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2,
cipher_suites: [
TLS13_AES_256_GCM_SHA384,
TLS13_AES_128_GCM_SHA256,
TLS13_CHACHA20_POLY1305_SHA256,
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,
TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
],
compression_methods: [
Null,
],
extensions: [
SupportedVersions(
[
TLSv1_3,
TLSv1_2,
],
),
ECPointFormats(
[
Uncompressed,
],
),
NamedGroups(
[
X25519,
secp256r1,
secp384r1,
],
),
SignatureAlgorithms(
[
ECDSA_NISTP384_SHA384,
ECDSA_NISTP256_SHA256,
ED25519,
RSA_PSS_SHA512,
RSA_PSS_SHA384,
RSA_PSS_SHA256,
RSA_PKCS1_SHA512,
RSA_PKCS1_SHA384,
RSA_PKCS1_SHA256,
],
),
ExtendedMasterSecretRequest,
CertificateStatusRequest(
OCSP(
OCSPCertificateStatusRequest {
responder_ids: [],
extensions: ,
},
),
),
ServerName(
[
ServerName {
typ: HostName,
payload: HostName(
(
6368726f6d656472697665722e73746f726167652e676f6f676c65617069732e636f6d,
DnsName(
"chromedriver.storage.googleapis.com",
),
),
),
},
],
),
SignedCertificateTimestampRequest,
KeyShare(
[
KeyShareEntry {
group: X25519,
payload: e10431044ddb0a9e16f01bccb60a6ea0b7d41c8283604893388b2e44895a8d4f,
},
],
),
PresharedKeyModes(
[
PSK_DHE_KE,
],
),
Protocols(
[
6832,
687474702f312e31,
],
),
SessionTicket(
Request,
),
],
},
),
},
encoded: 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,
},
}
TRACE We got ServerHello ServerHelloPayload {
legacy_version: TLSv1_2,
random: 1e202b437593c6ded1bc00a8dee0793c2e638da8952d5144e1be8e1a04429008,
session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2,
cipher_suite: TLS13_AES_256_GCM_SHA384,
compression_method: Null,
extensions: [
KeyShare(
KeyShareEntry {
group: X25519,
payload: a22b136ad149736dc834ed950e6f9b19cfd8f2121e1fe6265d3537456aa02237,
},
),
SupportedVersions(
TLSv1_3,
),
],
}
DEBUG Using ciphersuite TLS13_AES_256_GCM_SHA384
DEBUG Not resuming
TRACE EarlyData rejected
TRACE Dropping CCS
DEBUG TLS1.3 encrypted extensions: [Protocols([6832])]
DEBUG ALPN protocol is Some(b"h2")
TRACE Server cert is [Certificate(b"0\x82\x06m0\x82\x05U\xa0\x03\x02\x01\x02\x02\x11\0\x87\xbe\t\xcd\x0e!\xc7X\n\x03\xe1\x91\xc1\xe1\xe2:0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x1e\x17\r230710082045Z\x17\r231002082044Z0#1!0\x1f\x06\x03U\x04\x03\x0c\x18*.storage.googleapis.com0Y0\x13\x06\x07*\x86H\xce=\x02\x01\x06\x08*\x86H\xce=\x03\x01\x07\x03B\0\x04\xbf@\xbf\xedpu:K\xb5\x12\x7f\x11\xc7\xc3\x07\xa4\xeb,U\xf5\x82\x80V\xa0\x83\x93\xcb]\0\"\xa5\xec'\x84\nZ5F@s\xe6\xba\xeb\xd8\x8bI\xb5M\x0e\x11&\xb1\xc1\xb9\xad\x18\xaf\xb1ql\x80e0\xb3\xa3\x82\x04B0\x82\x04>0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x07\x800\x13\x06\x03U\x1d%\x04\x0c0\n\x06\x08+\x06\x01\x05\x05\x07\x03\x010\x0c\x06\x03U\x1d\x13\x01\x01\xff\x04\x020\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x142\xf1W\xf0\xd1\x93g\xf1\x81n\xc6\x078A\xcc\x0e\xe4c\xc6\xa80\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0j\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04^0\\0'\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1bhttp://ocsp.pki.goog/gts1c301\x06\x08+\x06\x01\x05\x05\x070\x02\x86%http://pki.goog/repo/certs/gts1c3.der0\x82\x01\xf1\x06\x03U\x1d\x11\x04\x82\x01\xe80\x82\x01\xe4\x82\x18*.storage.googleapis.com\x82\x10*.googleapis.com\x82 commondatastorage.googleapis.com\x82\"*.commondatastorage.googleapis.com\x82\x16storage.googleapis.com\x82\x19storage-p2.googleapis.com\x82\x1b*.storage-p2.googleapis.com\x82\x1bstorage.mtls.googleapis.com\x82$*.appspot.com.storage.googleapis.com\x82 *.content-storage.googleapis.com\x82#*.content-storage-p2.googleapis.com\x82'*.content-storage-upload.googleapis.com\x82)*.content-storage-download.googleapis.com\x82\x1f*.storage-upload.googleapis.com\x82!*.storage-download.googleapis.com0!\x06\x03U\x1d \x04\x1a0\x180\x08\x06\x06g\x81\x0c\x01\x02\x010\x0c\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030<\x06\x03U\x1d\x1f\x0450301\xa0/\xa0-\x86+http://crls.pki.goog/gts1c3/fVJxbV-Ktmk.crl0\x82\x01\x05\x06\n+\x06\x01\x04\x01\xd6y\x02\x04\x02\x04\x81\xf6\x04\x81\xf3\0\xf1\0v\0\xad\xf7\xbe\xfa|\xff\x10\xc8\x8b\x9d=\x9c\x1e>\x18j\xb4g)]\xcf\xb1\x0c$\xca\x85\x864\xeb\xdc\x82\x8a\0\0\x01\x89?\x1a\x94\xfe\0\0\x04\x03\0G0E\x02 i]\x13\xa0\x0b\xc6\xce\xeeU\x841j>\xe5\x94x\xa0\x01.\x81ZD3$v\x15D\x1bEQ\x98\xe6\x02!\0\xbeq<\x88\x196pj\x0e\x10\x17\xe5\xdc\xb9\x0bT@\x8c\xdc\xda\xc5\x017\xc1\x82c\xa0\x86\x9aFB\x02\0w\0\xb3sw\x07\xe1\x84P\xf8c\x86\xd6\x05\xa9\xdc\x11\tJy-\xb1g\x0c\x0b\x87\xdc\xf0\x03\x0ey6\xa5\x9a\0\0\x01\x89?\x1a~9\0\0\x04\x03\0H0F\x02!\0\xa0\xf8'\xf2\xbe\x86t\xc7\x97\xbe\xbew\xff3\xad\x93@:UN\x9c\xd8\x82\x8c\x93\xd2\x91\xb6=AA\"\x02!\0\xdb_\xae^\xf2~\xf2\xd8\xcb\xba\xb6\xc1:\x9f\xc4[\xe2\xc3\x88\xc4\xca\x8e\xe5\xa3\xe7\x0cEg\x07U[10\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\0/\xfeg}\xde\x12\x06`\xb4\xc2\xbc\xc4\xce\xc8\xc8%\xc1_\xbfA\xe3\x16\xd5\x9d\xac\xf4)\xe5+\xfeK\xf0\n\xb3\xbb\xe0}\xe3g\xddmI\x0be\x90\xe8A\xa7\x9erV5\xf8\x15d\xcc=\x17\xd2\x0f\xa5v\x85\x0f\x03(b\xb7\xe7j\xe5\xe9YY\xfc\xb4\xa1\xe1\xe9\xff\xa4\x8c\x9d\xe0i`\xd3E\xf1f\xcd\xb4]?\xb5\xee\xa6\xd3\xbb\x90\x1d\x92\x8d\xc4\xa6\xe2\xb9=s\xa8e\xab\x14\x87\xc0\xde\xc8\xd6v\xcej7\x90F\xd4\xad\x89ek\xb3\xcb\x11\x10\xe9G\xcc\xff\x06\x9d\x8b2\xc3\xc7\x9a\xbf\x0fU\x90~\x16iJ\xce\xde,\x0b\xe2\xe9\x04\x8b\x8aC\xe7\xcf\x17^\xe0\xea\xee\x12\x98\x01\xdak\x11n!\x08\xaena/h\xe0\xe5;?`\xcc\x8e\xce\xf2\xd60\xca+G\r\x03u\x15\xd0\xbc\x855\xcb\xc87\xf9\xda\xe0\xef6\xbe\x86|\xd1E\x1e\x18\xa8\xcf\xf8 \x0eA\xde\xdb9\xaa\x19vJ\xa4\x93\xed\x93\x85\xb7\x03A.\xfa\x90\xee\x1b&})\xa8\xb4;\xaeX\xb4\xca"), Certificate(b"0\x82\x05\x960\x82\x03~\xa0\x03\x02\x01\x02\x02\r\x02\x03\xbcSYk4\xc7\x18\xf5\x01Pf0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x1e\x17\r200813000042Z\x17\r270930000042Z0F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x82\x01\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x01\x0f\00\x82\x01\n\x02\x82\x01\x01\0\xf5\x88\xdf\xe7b\x8c\x1e7\xf87B\x90\x7fl\x87\xd0\xfbe\x82%\xfd\xe8\xcbk\xa4\xffm\xe9Z#\xe2\x99\xf6\x1c\xe9\x92\x03\x99\x13|\t\n\x8a\xfaB\xd6^V$\xaaz3\x84\x1f\xd1\xe9i\xbb\xb9t\xecWLfh\x93w7US\xfe9\x10M\xb74\xbb_%w7;\x17\x94\xea<\xe5\x9d\xd5\xbc\xc3\xb4C\xeb.\xa7G\xef\xb0D\x11c\xd8\xb4A\x85\xddA0H\x93\x1b\xbf\xb7\xf6\xe0E\x02!\xe0\x96B\x17\xcf\xd9+eV4\x07&\x04\r\xa8\xfd}\xca.\xef\xeaH|7M?\0\x9f\x83\xdf\xefu\x84.yW\\\xfcWn\x1a\x96\xff\xfc\x8c\x9a\xa6\x99\xbe%\xd9\x7f\x96,\x06\xf7\x11*\x02\x80\x80\xebc\x18<PI\x87\xe5\x8a\xca_\x19+Y\x96\x81\0\xa0\xfbQ\xdb\xcaw\x0b\x0b\xc9\x96O\xefpI\xc7\\m \xfd\x99\xb4\xb4\xe2\xca.w\xfd-\xdc\x0b\xb6k\x13\x0c\x8c\x19+\x17\x96\x98\xb9\xf0\x8b\xf6\xa0'\xbb\xb6\xe3\x8dQ\x8f\xbd\xae\xc7\x9b\xb1\x89\x9d\x02\x03\x01\0\x01\xa3\x82\x01\x800\x82\x01|0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x1d\x06\x03U\x1d%\x04\x160\x14\x06\x08+\x06\x01\x05\x05\x07\x03\x01\x06\x08+\x06\x01\x05\x05\x07\x03\x020\x12\x06\x03U\x1d\x13\x01\x01\xff\x04\x080\x06\x01\x01\xff\x02\x01\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0h\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04\\0Z0&\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1ahttp://ocsp.pki.goog/gtsr100\x06\x08+\x06\x01\x05\x05\x070\x02\x86$http://pki.goog/repo/certs/gtsr1.der04\x06\x03U\x1d\x1f\x04-0+0)\xa0'\xa0%\x86#http://crl.pki.goog/gtsr1/gtsr1.crl0W\x06\x03U\x1d \x04P0N08\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030*0(\x06\x08+\x06\x01\x05\x05\x07\x02\x01\x16\x1chttps://pki.goog/repository/0\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x02\x01\0\x89}\xac \\\x0c<\xbe\x9a\xa8W\x95\x1b\xb4\xae\xfa\xab\xa5rq\xb46\x95\xfd\xdf@\x11\x03L\xc2F\x14\xbb\x14$\xab\xf0Pq\"\xdb\xad\xc4n\x7f\xcf\xf1jo\xc8\x83\x1b\xd8\xce\x89_\x87l\x87\xb8\xa9\x0c\xa3\x9b\xa1b\x94\x93\x95\xdf[\xaef\x19\x0b\x02\x96\x9e\xfc\xb5\xe7\x10i>z\xcbFI_F\xe1A\xb1\xd7\x98Me4\0\x80\x1a?O\x9fl\x7fI\0\x81SA\xa4\x92!\x82\x82\x1a\xf1\xa3D[*P\x12\x13M\xc1S6\xf3B\x08\xafT\xfa\x8ewS\x1bd8'\x17\t\xbdX\xc9\x1b|9-[\xf3\xce\xd4\xed\x97\xdb\x14\x03\xbf\tS$\x1f\xc2\x0c\x04y\x98&\xf2a\xf1SR\xfdB\x8c\x1bf+?\x15\xa1\xbb\xff\xf6\x9b\xe3\x81\x9a\x01\x06q\x895($\xdd\xe1\xbd\xeb\x19-\xe1H\xcb=Y\x83Q\xb4t\xc6\x9d|\xc6\xb1\x86[\xaf\xcc4\xc4\xd3\xcc\xd4\x81\x11\x95\0\xa1\xf4\x12\"\x01\xfa\xb4\x83q\xaf\x8c\xb7\x8cs$\xac7S\xc2\0\x90?\x11\xfe\\\xed6\x94\x10;\xbd)\xae\xe2\xc7:b;lc\xd9\x80\xbfYq\xacc'\xb9L\x17\xa0\xda\xf6s\x15\xbf*\xde\x8f\xf3\xa5l2\x813\x03\xd0\x86Qq\x994\xba\x93\x8d]\xb5QX\xf7\xb2\x93\xe8\x01\xf6Y\xbeq\x9b\xfdM(\xce\xcfm\xc7\x16\xdc\xf7\xd1\xd6F\x9b\xa7\xcak\xe9w\x0f\xfd\xa0\xb6\x1b#\x83\x1d\x10\x1a\xd9\t\0\x84\xe0D\xd3\xa2u#\xb34\x86\xf6 \xb0\xa4^\x10\x1d\xe0RF\0\x9d\xb1\x0f\x1f!pQ\xf5\x9a\xdd\x06\xfcU\xf4+\x0e3w\xc3KB\xc2\xf1w\x13\xfcs\x80\x94\xeb\x1f\xbb7?\xce\x02*f\xb0s\x1d2\xa52l2\xb0\x8e\xe0\xc4#\xff[}Mep\xac+\x9b=\xce\xdb\xe0m\x8e2\x80\xbe\x96\x9f\x92c\xbc\x97\xbb]\xb9\xf4\xe1q^*\xe4\xef\x03\"\xb1\x8ae:\x8f\xc0\x93e\xd4\x85\xcd\x0f\x0f[\x83Y\x16G\x16-\x9c$:\xc8\x80\xa6&\x14\x85\x9b\xf67\x9b\xaco\xf9\xc5\xc3\x06Q\xf3\xe2\x7f\xc5\xb1\x10\xbaQ\xf4\xdd"), Certificate(b"0\x82\x05b0\x82\x04J\xa0\x03\x02\x01\x02\x02\x10w\xbd\rl\xdb6\xf9\x1a\xea!\x0f\xc4\xf0X\xd3\r0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00W1\x0b0\t\x06\x03U\x04\x06\x13\x02BE1\x190\x17\x06\x03U\x04\n\x13\x10GlobalSign nv-sa1\x100\x0e\x06\x03U\x04\x0b\x13\x07Root CA1\x1b0\x19\x06\x03U\x04\x03\x13\x12GlobalSign Root CA0\x1e\x17\r200619000042Z\x17\r280128000042Z0G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x82\x02\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x02\x0f\00\x82\x02\n\x02\x82\x02\x01\0\xb6\x11\x02\x8b\x1e\xe3\xa1w\x9b;\xdc\xbf\x94>\xb7\x95\xa7@<\xa1\xfd\x82\xf9}2\x06\x82q\xf6\xf6\x8c\x7f\xfb\xe8\xdb\xbcj.\x97\x97\xa3\x8cK\xf9+\xf6\xb1\xf9\xce\x84\x1d\xb1\xf9\xc5\x97\xde\xef\xb9\xf2\xa3\xe9\xbc\x12\x89^\xa7\xaaR\xab\xf8#'\xcb\xa4\xb1\x9cc\xdb\xd7\x99~\xf0\n^\xebh\xa6\xf4\xc6ZG\rM\x103\xe3N\xb1\x13\xa3\xc8\x18lK\xec\xfc\t\x90\xdf\x9dd)%#\x07\xa1\xb4\xd2=.`\xe0\xcf\xd2\t\x87\xbb\xcdH\xf0M\xc2\xc2z\x88\x8a\xbb\xba\xcfY\x19\xd6\xaf\x8f\xb0\x07\xb0\x9e1\xf1\x82\xc1\xc0\xdf.\xa6ml\x19\x0e\xb5\xd8~&\x1aE\x03=\xb0y\xa4\x94(\xad\x0f\x7f&\xe5\xa8\x08\xfe\x96\xe8<h\x94S\xee\x83:\x88+\x15\x96\t\xb2\xe0z\x8c.u\xd6\x9c\xeb\xa7Vd\x8f\x96Oh\xae=\x97\xc2\x84\x8f\xc0\xbc@\xc0\x0b\\\xbd\xf6\x87\xb35l\xac\x18P\x7f\x84\xe0L\xcd\x92\xd3 \xe93\xbcR\x99\xaf2\xb5)\xb3%*\xb4H\xf9r\xe1\xcad\xf7\xe6\x82\x10\x8d\xe8\x9d\xc2\x8a\x88\xfa8f\x8a\xfcc\xf9\x01\xf9x\xfd{\\w\xfav\x87\xfa\xec\xdf\xb1\x0ey\x95W\xb4\xbd&\xef\xd6\x01\xd1\xeb\x16\n\xbb\x8e\x0b\xb5\xc5\xc5\x8aU\xab\xd3\xac\xea\x91K)\xcc\x19\xa42%N*\xf1eD\xd0\x02\xce\xaa\xceI\xb4\xea\x9f|\x83\xb0@{\xe7C\xab\xa7l\xa3\x8f}\x89\x81\xfaL\xa5\xff\xd5\x8e\xc3\xceK\xe0\xb5\xd8\xb3\x8eE\xcfv\xc0\xed@+\xfdS\x0f\xb0\xa7\xd5;\r\xb1\x8a\xa2\x03\xde1\xad\xccw\xeao{>\xd6\xdf\x91\"\x12\xe6\xbe\xfa\xd82\xfc\x10c\x14Qr\xde]\xd6\x16\x93\xbd)h3\xef:f\xec\x07\x8a&\xdf\x13\xd7Wex'\xde^I\x14\0\xa2\0\x7f\x9a\xa8!\xb6\xa9\xb1\x95\xb0\xa5\xb9\r\x16\x11\xda\xc7lH<@\xe0~\rZ\xcdV<\xd1\x97\x05\xb9\xcbK\xed9K\x9c\xc4?\xd2U\x13n$\xb0\xd6q\xfa\xf4\xc1\xba\xcc\xed\x1b\xf5\xfe\x81A\xd8\0\x98=:\xc8\xaez\x987\x18\x05\x95\x02\x03\x01\0\x01\xa3\x82\x0180\x82\x0140\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x0f\x06\x03U\x1d\x13\x01\x01\xff\x04\x050\x03\x01\x01\xff0\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14`{f\x1aE\r\x97\xca\x89P/}\x04\xcd4\xa8\xff\xfc\xfdK0`\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04T0R0%\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x19http://ocsp.pki.goog/gsr10)\x06\x08+\x06\x01\x05\x05\x070\x02\x86\x1dhttp://pki.goog/gsr1/gsr1.crt02\x06\x03U\x1d\x1f\x04+0)0'\xa0%\xa0#\x86!http://crl.pki.goog/gsr1/gsr1.crl0;\x06\x03U\x1d \x044020\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x030\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\04\xa4\x1e\xb1(\xa3\xd0\xb4v\x17\xa61z!\xe9\xd1R>\xc8\xdbt\x16A\x88\xb8=5\x1d\xed\xe4\xff\x93\xe1\\_\xab\xbb\xea|\xcf\xdb\xe4\r\xd1\x8bW\xf2&o[\xbe\x17Fh\x947okz\xc8\xc0\x187\xfa%Q\xac\xech\xbf\xb2\xc8I\xfdZ\x9a\xca\x01#\xac\x84\x80+\x02\x8c\x99\x97\xebIj\x8cu\xd7\xc7\xde\xb2\xc9\x97\x9fXHW\x0e5\xa1\xe4\x1a\xd6\xfdo\x83\x81o\xef\x8c\xcf\x97\xaf\xc0\x85*\xf0\xf5Ni\t\x91-\xe1h\xb8\xc1+s\xe9\xd4\xd9\xfc\"\xc07\x1f\x0bf\x1dI\xed\x02U\x8fg\xe12\xd7\xd3&\xbfp\xe3=\xf4gm=|\xe54\x88\xe32\xfa\xa7n\x06jo\xbd\x8b\x91\xee\x16K\xe8;\xa9\xb37\xe7\xc3D\xa4~\xd8l\xd7\xc7F\xf5\x92\x9b\xe7\xd5!\xbef\x92\x19\x94Ul\xd4)\xb2\r\xc1f[\xe2wIH(\xed\x9d\xd7\x1a3rS\xb3\x825\xcfb\x8b\xc9$\x8b\xa5\xb79\x0c\xbb~*A\xbfR\xcf\xfc\xa2\x96\xb6\xc2\x82?")]
TRACE signal: Want
TRACE signal found waiting giver, notifying
TRACE poll_want: taker wants!
TRACE signal: Want
DEBUG Ticket saved
DEBUG Ticket saved
TRACE deregistering event source from poller
TRACE signal: Closed
ERROR Wrong browser/driver version
```
### How can we reproduce the issue?
```shell
No script required, ensure Chrome is on v115 and run
./selenium-manager.exe --browser chrome
```
```
### Relevant log output
```shell
<Error>
<Code>NoSuchKey</Code>
<Message>The specified key does not exist.</Message>
<Details>No such object: chromedriver/LATEST_RELEASE_115</Details>
</Error>
```
./selenium-manager.exe --trace --browser chrome
TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json
DEBUG Using shell command to find out chrome version
DEBUG Running cmd command: "wmic datafile where name='%PROGRAMFILES:\\=\\\\%\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe' get Version /value"
DEBUG Output { status: ExitStatus(ExitStatus(0)), stdout: "\r\r\n\r\r\nVersion=115.0.5790.171\r\r\n\r\r\n\r\r\n\r\r\n", stderr: "" }
DEBUG The version of chrome is 115.0.5790.171
TRACE Writing metadata to C:\Users\jf6856\.cache\selenium\selenium-manager.json
DEBUG Detected browser: chrome 115
TRACE Reading metadata from C:\Users\jf6856\.cache\selenium\selenium-manager.json
DEBUG Reading chromedriver version from https://chromedriver.storage.googleapis.com/LATEST_RELEASE_115
DEBUG starting new connection: https://chromedriver.storage.googleapis.com/
TRACE registering event source with poller: token=Token(0), interests=READABLE | WRITABLE
DEBUG No cached session for DnsName(DnsName(DnsName("chromedriver.storage.googleapis.com")))
DEBUG Not resuming any session
TRACE Sending ClientHello Message {
version: TLSv1_0,
payload: Handshake {
parsed: HandshakeMessagePayload {
typ: ClientHello,
payload: ClientHello(
ClientHelloPayload {
client_version: TLSv1_2,
random: 9be3753a2c9ec3695136ab5174467e55e9ed4f1639b243cde73834cb134c89c9,
session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2,
cipher_suites: [
TLS13_AES_256_GCM_SHA384,
TLS13_AES_128_GCM_SHA256,
TLS13_CHACHA20_POLY1305_SHA256,
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,
TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
],
compression_methods: [
Null,
],
extensions: [
SupportedVersions(
[
TLSv1_3,
TLSv1_2,
],
),
ECPointFormats(
[
Uncompressed,
],
),
NamedGroups(
[
X25519,
secp256r1,
secp384r1,
],
),
SignatureAlgorithms(
[
ECDSA_NISTP384_SHA384,
ECDSA_NISTP256_SHA256,
ED25519,
RSA_PSS_SHA512,
RSA_PSS_SHA384,
RSA_PSS_SHA256,
RSA_PKCS1_SHA512,
RSA_PKCS1_SHA384,
RSA_PKCS1_SHA256,
],
),
ExtendedMasterSecretRequest,
CertificateStatusRequest(
OCSP(
OCSPCertificateStatusRequest {
responder_ids: [],
extensions: ,
},
),
),
ServerName(
[
ServerName {
typ: HostName,
payload: HostName(
(
6368726f6d656472697665722e73746f726167652e676f6f676c65617069732e636f6d,
DnsName(
"chromedriver.storage.googleapis.com",
),
),
),
},
],
),
SignedCertificateTimestampRequest,
KeyShare(
[
KeyShareEntry {
group: X25519,
payload: e10431044ddb0a9e16f01bccb60a6ea0b7d41c8283604893388b2e44895a8d4f,
},
],
),
PresharedKeyModes(
[
PSK_DHE_KE,
],
),
Protocols(
[
6832,
687474702f312e31,
],
),
SessionTicket(
Request,
),
],
},
),
},
encoded: 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,
},
}
TRACE We got ServerHello ServerHelloPayload {
legacy_version: TLSv1_2,
random: 1e202b437593c6ded1bc00a8dee0793c2e638da8952d5144e1be8e1a04429008,
session_id: a5d4beeafab0e50e2364224ee6bce510687a6283c1be2b14bc16b090807547b2,
cipher_suite: TLS13_AES_256_GCM_SHA384,
compression_method: Null,
extensions: [
KeyShare(
KeyShareEntry {
group: X25519,
payload: a22b136ad149736dc834ed950e6f9b19cfd8f2121e1fe6265d3537456aa02237,
},
),
SupportedVersions(
TLSv1_3,
),
],
}
DEBUG Using ciphersuite TLS13_AES_256_GCM_SHA384
DEBUG Not resuming
TRACE EarlyData rejected
TRACE Dropping CCS
DEBUG TLS1.3 encrypted extensions: [Protocols([6832])]
DEBUG ALPN protocol is Some(b"h2")
TRACE Server cert is [Certificate(b"0\x82\x06m0\x82\x05U\xa0\x03\x02\x01\x02\x02\x11\0\x87\xbe\t\xcd\x0e!\xc7X\n\x03\xe1\x91\xc1\xe1\xe2:0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x1e\x17\r230710082045Z\x17\r231002082044Z0#1!0\x1f\x06\x03U\x04\x03\x0c\x18*.storage.googleapis.com0Y0\x13\x06\x07*\x86H\xce=\x02\x01\x06\x08*\x86H\xce=\x03\x01\x07\x03B\0\x04\xbf@\xbf\xedpu:K\xb5\x12\x7f\x11\xc7\xc3\x07\xa4\xeb,U\xf5\x82\x80V\xa0\x83\x93\xcb]\0\"\xa5\xec'\x84\nZ5F@s\xe6\xba\xeb\xd8\x8bI\xb5M\x0e\x11&\xb1\xc1\xb9\xad\x18\xaf\xb1ql\x80e0\xb3\xa3\x82\x04B0\x82\x04>0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x07\x800\x13\x06\x03U\x1d%\x04\x0c0\n\x06\x08+\x06\x01\x05\x05\x07\x03\x010\x0c\x06\x03U\x1d\x13\x01\x01\xff\x04\x020\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x142\xf1W\xf0\xd1\x93g\xf1\x81n\xc6\x078A\xcc\x0e\xe4c\xc6\xa80\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0j\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04^0\\0'\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1bhttp://ocsp.pki.goog/gts1c301\x06\x08+\x06\x01\x05\x05\x070\x02\x86%http://pki.goog/repo/certs/gts1c3.der0\x82\x01\xf1\x06\x03U\x1d\x11\x04\x82\x01\xe80\x82\x01\xe4\x82\x18*.storage.googleapis.com\x82\x10*.googleapis.com\x82 commondatastorage.googleapis.com\x82\"*.commondatastorage.googleapis.com\x82\x16storage.googleapis.com\x82\x19storage-p2.googleapis.com\x82\x1b*.storage-p2.googleapis.com\x82\x1bstorage.mtls.googleapis.com\x82$*.appspot.com.storage.googleapis.com\x82 *.content-storage.googleapis.com\x82#*.content-storage-p2.googleapis.com\x82'*.content-storage-upload.googleapis.com\x82)*.content-storage-download.googleapis.com\x82\x1f*.storage-upload.googleapis.com\x82!*.storage-download.googleapis.com0!\x06\x03U\x1d \x04\x1a0\x180\x08\x06\x06g\x81\x0c\x01\x02\x010\x0c\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030<\x06\x03U\x1d\x1f\x0450301\xa0/\xa0-\x86+http://crls.pki.goog/gts1c3/fVJxbV-Ktmk.crl0\x82\x01\x05\x06\n+\x06\x01\x04\x01\xd6y\x02\x04\x02\x04\x81\xf6\x04\x81\xf3\0\xf1\0v\0\xad\xf7\xbe\xfa|\xff\x10\xc8\x8b\x9d=\x9c\x1e>\x18j\xb4g)]\xcf\xb1\x0c$\xca\x85\x864\xeb\xdc\x82\x8a\0\0\x01\x89?\x1a\x94\xfe\0\0\x04\x03\0G0E\x02 i]\x13\xa0\x0b\xc6\xce\xeeU\x841j>\xe5\x94x\xa0\x01.\x81ZD3$v\x15D\x1bEQ\x98\xe6\x02!\0\xbeq<\x88\x196pj\x0e\x10\x17\xe5\xdc\xb9\x0bT@\x8c\xdc\xda\xc5\x017\xc1\x82c\xa0\x86\x9aFB\x02\0w\0\xb3sw\x07\xe1\x84P\xf8c\x86\xd6\x05\xa9\xdc\x11\tJy-\xb1g\x0c\x0b\x87\xdc\xf0\x03\x0ey6\xa5\x9a\0\0\x01\x89?\x1a~9\0\0\x04\x03\0H0F\x02!\0\xa0\xf8'\xf2\xbe\x86t\xc7\x97\xbe\xbew\xff3\xad\x93@:UN\x9c\xd8\x82\x8c\x93\xd2\x91\xb6=AA\"\x02!\0\xdb_\xae^\xf2~\xf2\xd8\xcb\xba\xb6\xc1:\x9f\xc4[\xe2\xc3\x88\xc4\xca\x8e\xe5\xa3\xe7\x0cEg\x07U[10\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\0/\xfeg}\xde\x12\x06`\xb4\xc2\xbc\xc4\xce\xc8\xc8%\xc1_\xbfA\xe3\x16\xd5\x9d\xac\xf4)\xe5+\xfeK\xf0\n\xb3\xbb\xe0}\xe3g\xddmI\x0be\x90\xe8A\xa7\x9erV5\xf8\x15d\xcc=\x17\xd2\x0f\xa5v\x85\x0f\x03(b\xb7\xe7j\xe5\xe9YY\xfc\xb4\xa1\xe1\xe9\xff\xa4\x8c\x9d\xe0i`\xd3E\xf1f\xcd\xb4]?\xb5\xee\xa6\xd3\xbb\x90\x1d\x92\x8d\xc4\xa6\xe2\xb9=s\xa8e\xab\x14\x87\xc0\xde\xc8\xd6v\xcej7\x90F\xd4\xad\x89ek\xb3\xcb\x11\x10\xe9G\xcc\xff\x06\x9d\x8b2\xc3\xc7\x9a\xbf\x0fU\x90~\x16iJ\xce\xde,\x0b\xe2\xe9\x04\x8b\x8aC\xe7\xcf\x17^\xe0\xea\xee\x12\x98\x01\xdak\x11n!\x08\xaena/h\xe0\xe5;?`\xcc\x8e\xce\xf2\xd60\xca+G\r\x03u\x15\xd0\xbc\x855\xcb\xc87\xf9\xda\xe0\xef6\xbe\x86|\xd1E\x1e\x18\xa8\xcf\xf8 \x0eA\xde\xdb9\xaa\x19vJ\xa4\x93\xed\x93\x85\xb7\x03A.\xfa\x90\xee\x1b&})\xa8\xb4;\xaeX\xb4\xca"), Certificate(b"0\x82\x05\x960\x82\x03~\xa0\x03\x02\x01\x02\x02\r\x02\x03\xbcSYk4\xc7\x18\xf5\x01Pf0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x1e\x17\r200813000042Z\x17\r270930000042Z0F1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x130\x11\x06\x03U\x04\x03\x13\nGTS CA 1C30\x82\x01\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x01\x0f\00\x82\x01\n\x02\x82\x01\x01\0\xf5\x88\xdf\xe7b\x8c\x1e7\xf87B\x90\x7fl\x87\xd0\xfbe\x82%\xfd\xe8\xcbk\xa4\xffm\xe9Z#\xe2\x99\xf6\x1c\xe9\x92\x03\x99\x13|\t\n\x8a\xfaB\xd6^V$\xaaz3\x84\x1f\xd1\xe9i\xbb\xb9t\xecWLfh\x93w7US\xfe9\x10M\xb74\xbb_%w7;\x17\x94\xea<\xe5\x9d\xd5\xbc\xc3\xb4C\xeb.\xa7G\xef\xb0D\x11c\xd8\xb4A\x85\xddA0H\x93\x1b\xbf\xb7\xf6\xe0E\x02!\xe0\x96B\x17\xcf\xd9+eV4\x07&\x04\r\xa8\xfd}\xca.\xef\xeaH|7M?\0\x9f\x83\xdf\xefu\x84.yW\\\xfcWn\x1a\x96\xff\xfc\x8c\x9a\xa6\x99\xbe%\xd9\x7f\x96,\x06\xf7\x11*\x02\x80\x80\xebc\x18<PI\x87\xe5\x8a\xca_\x19+Y\x96\x81\0\xa0\xfbQ\xdb\xcaw\x0b\x0b\xc9\x96O\xefpI\xc7\\m \xfd\x99\xb4\xb4\xe2\xca.w\xfd-\xdc\x0b\xb6k\x13\x0c\x8c\x19+\x17\x96\x98\xb9\xf0\x8b\xf6\xa0'\xbb\xb6\xe3\x8dQ\x8f\xbd\xae\xc7\x9b\xb1\x89\x9d\x02\x03\x01\0\x01\xa3\x82\x01\x800\x82\x01|0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x1d\x06\x03U\x1d%\x04\x160\x14\x06\x08+\x06\x01\x05\x05\x07\x03\x01\x06\x08+\x06\x01\x05\x05\x07\x03\x020\x12\x06\x03U\x1d\x13\x01\x01\xff\x04\x080\x06\x01\x01\xff\x02\x01\00\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\x8at\x7f\xaf\x85\xcd\xee\x95\xcd=\x9c\xd0\xe2F\x14\xf3q5\x1d'0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0h\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04\\0Z0&\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x1ahttp://ocsp.pki.goog/gtsr100\x06\x08+\x06\x01\x05\x05\x070\x02\x86$http://pki.goog/repo/certs/gtsr1.der04\x06\x03U\x1d\x1f\x04-0+0)\xa0'\xa0%\x86#http://crl.pki.goog/gtsr1/gtsr1.crl0W\x06\x03U\x1d \x04P0N08\x06\n+\x06\x01\x04\x01\xd6y\x02\x05\x030*0(\x06\x08+\x06\x01\x05\x05\x07\x02\x01\x16\x1chttps://pki.goog/repository/0\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x02\x01\0\x89}\xac \\\x0c<\xbe\x9a\xa8W\x95\x1b\xb4\xae\xfa\xab\xa5rq\xb46\x95\xfd\xdf@\x11\x03L\xc2F\x14\xbb\x14$\xab\xf0Pq\"\xdb\xad\xc4n\x7f\xcf\xf1jo\xc8\x83\x1b\xd8\xce\x89_\x87l\x87\xb8\xa9\x0c\xa3\x9b\xa1b\x94\x93\x95\xdf[\xaef\x19\x0b\x02\x96\x9e\xfc\xb5\xe7\x10i>z\xcbFI_F\xe1A\xb1\xd7\x98Me4\0\x80\x1a?O\x9fl\x7fI\0\x81SA\xa4\x92!\x82\x82\x1a\xf1\xa3D[*P\x12\x13M\xc1S6\xf3B\x08\xafT\xfa\x8ewS\x1bd8'\x17\t\xbdX\xc9\x1b|9-[\xf3\xce\xd4\xed\x97\xdb\x14\x03\xbf\tS$\x1f\xc2\x0c\x04y\x98&\xf2a\xf1SR\xfdB\x8c\x1bf+?\x15\xa1\xbb\xff\xf6\x9b\xe3\x81\x9a\x01\x06q\x895($\xdd\xe1\xbd\xeb\x19-\xe1H\xcb=Y\x83Q\xb4t\xc6\x9d|\xc6\xb1\x86[\xaf\xcc4\xc4\xd3\xcc\xd4\x81\x11\x95\0\xa1\xf4\x12\"\x01\xfa\xb4\x83q\xaf\x8c\xb7\x8cs$\xac7S\xc2\0\x90?\x11\xfe\\\xed6\x94\x10;\xbd)\xae\xe2\xc7:b;lc\xd9\x80\xbfYq\xacc'\xb9L\x17\xa0\xda\xf6s\x15\xbf*\xde\x8f\xf3\xa5l2\x813\x03\xd0\x86Qq\x994\xba\x93\x8d]\xb5QX\xf7\xb2\x93\xe8\x01\xf6Y\xbeq\x9b\xfdM(\xce\xcfm\xc7\x16\xdc\xf7\xd1\xd6F\x9b\xa7\xcak\xe9w\x0f\xfd\xa0\xb6\x1b#\x83\x1d\x10\x1a\xd9\t\0\x84\xe0D\xd3\xa2u#\xb34\x86\xf6 \xb0\xa4^\x10\x1d\xe0RF\0\x9d\xb1\x0f\x1f!pQ\xf5\x9a\xdd\x06\xfcU\xf4+\x0e3w\xc3KB\xc2\xf1w\x13\xfcs\x80\x94\xeb\x1f\xbb7?\xce\x02*f\xb0s\x1d2\xa52l2\xb0\x8e\xe0\xc4#\xff[}Mep\xac+\x9b=\xce\xdb\xe0m\x8e2\x80\xbe\x96\x9f\x92c\xbc\x97\xbb]\xb9\xf4\xe1q^*\xe4\xef\x03\"\xb1\x8ae:\x8f\xc0\x93e\xd4\x85\xcd\x0f\x0f[\x83Y\x16G\x16-\x9c$:\xc8\x80\xa6&\x14\x85\x9b\xf67\x9b\xaco\xf9\xc5\xc3\x06Q\xf3\xe2\x7f\xc5\xb1\x10\xbaQ\xf4\xdd"), Certificate(b"0\x82\x05b0\x82\x04J\xa0\x03\x02\x01\x02\x02\x10w\xbd\rl\xdb6\xf9\x1a\xea!\x0f\xc4\xf0X\xd3\r0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00W1\x0b0\t\x06\x03U\x04\x06\x13\x02BE1\x190\x17\x06\x03U\x04\n\x13\x10GlobalSign nv-sa1\x100\x0e\x06\x03U\x04\x0b\x13\x07Root CA1\x1b0\x19\x06\x03U\x04\x03\x13\x12GlobalSign Root CA0\x1e\x17\r200619000042Z\x17\r280128000042Z0G1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\"0 \x06\x03U\x04\n\x13\x19Google Trust Services LLC1\x140\x12\x06\x03U\x04\x03\x13\x0bGTS Root R10\x82\x02\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x02\x0f\00\x82\x02\n\x02\x82\x02\x01\0\xb6\x11\x02\x8b\x1e\xe3\xa1w\x9b;\xdc\xbf\x94>\xb7\x95\xa7@<\xa1\xfd\x82\xf9}2\x06\x82q\xf6\xf6\x8c\x7f\xfb\xe8\xdb\xbcj.\x97\x97\xa3\x8cK\xf9+\xf6\xb1\xf9\xce\x84\x1d\xb1\xf9\xc5\x97\xde\xef\xb9\xf2\xa3\xe9\xbc\x12\x89^\xa7\xaaR\xab\xf8#'\xcb\xa4\xb1\x9cc\xdb\xd7\x99~\xf0\n^\xebh\xa6\xf4\xc6ZG\rM\x103\xe3N\xb1\x13\xa3\xc8\x18lK\xec\xfc\t\x90\xdf\x9dd)%#\x07\xa1\xb4\xd2=.`\xe0\xcf\xd2\t\x87\xbb\xcdH\xf0M\xc2\xc2z\x88\x8a\xbb\xba\xcfY\x19\xd6\xaf\x8f\xb0\x07\xb0\x9e1\xf1\x82\xc1\xc0\xdf.\xa6ml\x19\x0e\xb5\xd8~&\x1aE\x03=\xb0y\xa4\x94(\xad\x0f\x7f&\xe5\xa8\x08\xfe\x96\xe8<h\x94S\xee\x83:\x88+\x15\x96\t\xb2\xe0z\x8c.u\xd6\x9c\xeb\xa7Vd\x8f\x96Oh\xae=\x97\xc2\x84\x8f\xc0\xbc@\xc0\x0b\\\xbd\xf6\x87\xb35l\xac\x18P\x7f\x84\xe0L\xcd\x92\xd3 \xe93\xbcR\x99\xaf2\xb5)\xb3%*\xb4H\xf9r\xe1\xcad\xf7\xe6\x82\x10\x8d\xe8\x9d\xc2\x8a\x88\xfa8f\x8a\xfcc\xf9\x01\xf9x\xfd{\\w\xfav\x87\xfa\xec\xdf\xb1\x0ey\x95W\xb4\xbd&\xef\xd6\x01\xd1\xeb\x16\n\xbb\x8e\x0b\xb5\xc5\xc5\x8aU\xab\xd3\xac\xea\x91K)\xcc\x19\xa42%N*\xf1eD\xd0\x02\xce\xaa\xceI\xb4\xea\x9f|\x83\xb0@{\xe7C\xab\xa7l\xa3\x8f}\x89\x81\xfaL\xa5\xff\xd5\x8e\xc3\xceK\xe0\xb5\xd8\xb3\x8eE\xcfv\xc0\xed@+\xfdS\x0f\xb0\xa7\xd5;\r\xb1\x8a\xa2\x03\xde1\xad\xccw\xeao{>\xd6\xdf\x91\"\x12\xe6\xbe\xfa\xd82\xfc\x10c\x14Qr\xde]\xd6\x16\x93\xbd)h3\xef:f\xec\x07\x8a&\xdf\x13\xd7Wex'\xde^I\x14\0\xa2\0\x7f\x9a\xa8!\xb6\xa9\xb1\x95\xb0\xa5\xb9\r\x16\x11\xda\xc7lH<@\xe0~\rZ\xcdV<\xd1\x97\x05\xb9\xcbK\xed9K\x9c\xc4?\xd2U\x13n$\xb0\xd6q\xfa\xf4\xc1\xba\xcc\xed\x1b\xf5\xfe\x81A\xd8\0\x98=:\xc8\xaez\x987\x18\x05\x95\x02\x03\x01\0\x01\xa3\x82\x0180\x82\x0140\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x01\x860\x0f\x06\x03U\x1d\x13\x01\x01\xff\x04\x050\x03\x01\x01\xff0\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x14\xe4\xaf+&q\x1a+H'\x85/Rf,\xef\xf0\x89\x13q>0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14`{f\x1aE\r\x97\xca\x89P/}\x04\xcd4\xa8\xff\xfc\xfdK0`\x06\x08+\x06\x01\x05\x05\x07\x01\x01\x04T0R0%\x06\x08+\x06\x01\x05\x05\x070\x01\x86\x19http://ocsp.pki.goog/gsr10)\x06\x08+\x06\x01\x05\x05\x070\x02\x86\x1dhttp://pki.goog/gsr1/gsr1.crt02\x06\x03U\x1d\x1f\x04+0)0'\xa0%\xa0#\x86!http://crl.pki.goog/gsr1/gsr1.crl0;\x06\x03U\x1d \x044020\x08\x06\x06g\x81\x0c\x01\x02\x010\x08\x06\x06g\x81\x0c\x01\x02\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x020\r\x06\x0b+\x06\x01\x04\x01\xd6y\x02\x05\x03\x030\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\04\xa4\x1e\xb1(\xa3\xd0\xb4v\x17\xa61z!\xe9\xd1R>\xc8\xdbt\x16A\x88\xb8=5\x1d\xed\xe4\xff\x93\xe1\\_\xab\xbb\xea|\xcf\xdb\xe4\r\xd1\x8bW\xf2&o[\xbe\x17Fh\x947okz\xc8\xc0\x187\xfa%Q\xac\xech\xbf\xb2\xc8I\xfdZ\x9a\xca\x01#\xac\x84\x80+\x02\x8c\x99\x97\xebIj\x8cu\xd7\xc7\xde\xb2\xc9\x97\x9fXHW\x0e5\xa1\xe4\x1a\xd6\xfdo\x83\x81o\xef\x8c\xcf\x97\xaf\xc0\x85*\xf0\xf5Ni\t\x91-\xe1h\xb8\xc1+s\xe9\xd4\xd9\xfc\"\xc07\x1f\x0bf\x1dI\xed\x02U\x8fg\xe12\xd7\xd3&\xbfp\xe3=\xf4gm=|\xe54\x88\xe32\xfa\xa7n\x06jo\xbd\x8b\x91\xee\x16K\xe8;\xa9\xb37\xe7\xc3D\xa4~\xd8l\xd7\xc7F\xf5\x92\x9b\xe7\xd5!\xbef\x92\x19\x94Ul\xd4)\xb2\r\xc1f[\xe2wIH(\xed\x9d\xd7\x1a3rS\xb3\x825\xcfb\x8b\xc9$\x8b\xa5\xb79\x0c\xbb~*A\xbfR\xcf\xfc\xa2\x96\xb6\xc2\x82?")]
TRACE signal: Want
TRACE signal found waiting giver, notifying
TRACE poll_want: taker wants!
TRACE signal: Want
DEBUG Ticket saved
DEBUG Ticket saved
TRACE deregistering event source from poller
TRACE signal: Closed
ERROR Wrong browser/driver version
```
### Operating System
Windows 11
### Selenium version
selenium==4.8.0
### What are the browser(s) and version(s) where you see this issue?
Chrome 115
### What are the browser driver(s) and version(s) where you see this issue?
Chrome 115
### Are you using Selenium Grid?
N/A
|
defect
|
selenium manager fails on chrome what happened let me know if this should land in a chrome bug report instead happy to create this there if needed when selenium manager exe attempts to download the correct version of the chrome webdriver it fails with the message error wrong browser driver version i believe this is related to just the most recent version of chrome nosuchkey the specified key does not exist no such object chromedriver latest release selenium manager exe trace browser chrome trace reading metadata from c users cache selenium selenium manager json debug using shell command to find out chrome version debug running cmd command wmic datafile where name programfiles google chrome application chrome exe get version value debug output status exitstatus exitstatus stdout r r n r r nversion r r n r r n r r n r r n stderr debug the version of chrome is trace writing metadata to c users cache selenium selenium manager json debug detected browser chrome trace reading metadata from c users cache selenium selenium manager json debug reading chromedriver version from debug starting new connection trace registering event source with poller token token interests readable writable debug no cached session for dnsname dnsname dnsname chromedriver storage googleapis com debug not resuming any session trace sending clienthello message version payload handshake parsed handshakemessagepayload typ clienthello payload clienthello clienthellopayload client version random session id cipher suites aes gcm aes gcm tls ecdhe ecdsa with aes gcm tls ecdhe ecdsa with aes gcm tls ecdhe ecdsa with tls ecdhe rsa with aes gcm tls ecdhe rsa with aes gcm tls ecdhe rsa with tls empty renegotiation info scsv compression methods null extensions supportedversions ecpointformats uncompressed namedgroups signaturealgorithms ecdsa ecdsa rsa pss rsa pss rsa pss rsa rsa rsa extendedmastersecretrequest certificatestatusrequest ocsp ocspcertificatestatusrequest responder ids extensions servername servername typ hostname payload hostname dnsname chromedriver storage googleapis com signedcertificatetimestamprequest keyshare keyshareentry group payload presharedkeymodes psk dhe ke protocols sessionticket request encoded trace we got serverhello serverhellopayload legacy version random session id cipher suite aes gcm compression method null extensions keyshare keyshareentry group payload supportedversions debug using ciphersuite aes gcm debug not resuming trace earlydata rejected trace dropping ccs debug encrypted extensions debug alpn protocol is some b trace server cert is xec s xba xeb xad xaf xff n xff xcc xaf xcd xee xcd commondatastorage googleapis com commondatastorage googleapis com googleapis com googleapis com storage googleapis com mtls googleapis com appspot com storage googleapis com content storage googleapis com content storage googleapis com content storage upload googleapis com content storage download googleapis com storage upload googleapis com storage download googleapis n v xbeq n f r xca xff xfc r r r t r xdbt xed xff xab xbb xea xcf xdb r o trace signal want trace signal found waiting giver notifying trace poll want taker wants trace signal want debug ticket saved debug ticket saved trace deregistering event source from poller trace signal closed error wrong browser driver version how can we reproduce the issue shell no script required ensure chrome is on and run selenium manager exe browser chrome relevant log output shell nosuchkey the specified key does not exist no such object chromedriver latest release selenium manager exe trace browser chrome trace reading metadata from c users cache selenium selenium manager json debug using shell command to find out chrome version debug running cmd command wmic datafile where name programfiles google chrome application chrome exe get version value debug output status exitstatus exitstatus stdout r r n r r nversion r r n r r n r r n r r n stderr debug the version of chrome is trace writing metadata to c users cache selenium selenium manager json debug detected browser chrome trace reading metadata from c users cache selenium selenium manager json debug reading chromedriver version from debug starting new connection trace registering event source with poller token token interests readable writable debug no cached session for dnsname dnsname dnsname chromedriver storage googleapis com debug not resuming any session trace sending clienthello message version payload handshake parsed handshakemessagepayload typ clienthello payload clienthello clienthellopayload client version random session id cipher suites aes gcm aes gcm tls ecdhe ecdsa with aes gcm tls ecdhe ecdsa with aes gcm tls ecdhe ecdsa with tls ecdhe rsa with aes gcm tls ecdhe rsa with aes gcm tls ecdhe rsa with tls empty renegotiation info scsv compression methods null extensions supportedversions ecpointformats uncompressed namedgroups signaturealgorithms ecdsa ecdsa rsa pss rsa pss rsa pss rsa rsa rsa extendedmastersecretrequest certificatestatusrequest ocsp ocspcertificatestatusrequest responder ids extensions servername servername typ hostname payload hostname dnsname chromedriver storage googleapis com signedcertificatetimestamprequest keyshare keyshareentry group payload presharedkeymodes psk dhe ke protocols sessionticket request encoded trace we got serverhello serverhellopayload legacy version random session id cipher suite aes gcm compression method null extensions keyshare keyshareentry group payload supportedversions debug using ciphersuite aes gcm debug not resuming trace earlydata rejected trace dropping ccs debug encrypted extensions debug alpn protocol is some b trace server cert is xec s xba xeb xad xaf xff n xff xcc xaf xcd xee xcd commondatastorage googleapis com commondatastorage googleapis com googleapis com googleapis com storage googleapis com mtls googleapis com appspot com storage googleapis com content storage googleapis com content storage googleapis com content storage upload googleapis com content storage download googleapis com storage upload googleapis com storage download googleapis n v xbeq n f r xca xff xfc r r r t r xdbt xed xff xab xbb xea xcf xdb r o trace signal want trace signal found waiting giver notifying trace poll want taker wants trace signal want debug ticket saved debug ticket saved trace deregistering event source from poller trace signal closed error wrong browser driver version operating system windows selenium version selenium what are the browser s and version s where you see this issue chrome what are the browser driver s and version s where you see this issue chrome are you using selenium grid n a
| 1
|
73,264
| 32,008,847,121
|
IssuesEvent
|
2023-09-21 16:31:42
|
hashicorp/terraform-provider-aws
|
https://api.github.com/repos/hashicorp/terraform-provider-aws
|
closed
|
file_system_administrators_group not considered during creation of ressource aws_fsx_ontap_storage_virtual_machine which forces replacement during next apply
|
bug service/fsx
|
<!---
Please note the following potential times when an issue might be in Terraform core:
* [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues
* [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues
* [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues
* [Registry](https://registry.terraform.io/) issues
* Spans resources across multiple providers
If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead.
--->
<!--- Please keep this note for the community --->
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request
* Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
<!--- Thank you for keeping this note for the community --->
### Terraform CLI and Terraform AWS Provider Version
<!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). --->
### Affected Resource(s)
<!--- Please list the affected resources and data sources. --->
* aws_fsx_ontap_storage_virtual_machine
### Terraform Configuration Files
<!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code --->
Please include all Terraform configurations required to reproduce the bug. Bug reports without a functional reproduction may be closed without investigation.
```hcl
resource "aws_fsx_ontap_storage_virtual_machine" "brln" {
file_system_id = aws_fsx_ontap_file_system.eufr.id
name = "BRLNFS001"
active_directory_configuration {
netbios_name = "BRLNFS001"
self_managed_active_directory_configuration {
dns_ips = local.eufr_ad_ips
domain_name = local.eufr_ad_domain_name
username = local.eufr_ad_user_name
password = local.eufr_ad_user_password
file_system_administrators_group = "BRLNGSRVAdmins" #<==== this is simply ignored during apply
organizational_unit_distinguished_name = "OU=BRLN-Servers,OU=OU-BRLN,OU=DE,OU=Locations,DC=eu1,DC=company,DC=local"
}
}
root_volume_security_style = "NTFS"
provider = aws.eufr
}
```
### Debug Output
<!---
Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist.
To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html).
--->
https://gist.github.com/brakf/1efc660e344634e8eeec99e531c41684
### Panic Output
<!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. --->
### Expected Behavior
<!--- What should have happened? --->
aws_fsx_ontap_storage_virtual_machine.brln should have been created with parameter file_system_administrators_group set properly.
### Actual Behavior
Instead it was not considered which prompted terraform to delete and create the same ressource again upon next apply.
<!--- What actually happened? --->
### Steps to Reproduce
<!--- Please list the steps required to reproduce the issue. --->
1. `terraform apply`
### Important Factoids
<!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? --->
### References
<!---
Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests
Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example:
--->
* #0000
|
1.0
|
file_system_administrators_group not considered during creation of ressource aws_fsx_ontap_storage_virtual_machine which forces replacement during next apply - <!---
Please note the following potential times when an issue might be in Terraform core:
* [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues
* [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues
* [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues
* [Registry](https://registry.terraform.io/) issues
* Spans resources across multiple providers
If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead.
--->
<!--- Please keep this note for the community --->
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request
* Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
<!--- Thank you for keeping this note for the community --->
### Terraform CLI and Terraform AWS Provider Version
<!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). --->
### Affected Resource(s)
<!--- Please list the affected resources and data sources. --->
* aws_fsx_ontap_storage_virtual_machine
### Terraform Configuration Files
<!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code --->
Please include all Terraform configurations required to reproduce the bug. Bug reports without a functional reproduction may be closed without investigation.
```hcl
resource "aws_fsx_ontap_storage_virtual_machine" "brln" {
file_system_id = aws_fsx_ontap_file_system.eufr.id
name = "BRLNFS001"
active_directory_configuration {
netbios_name = "BRLNFS001"
self_managed_active_directory_configuration {
dns_ips = local.eufr_ad_ips
domain_name = local.eufr_ad_domain_name
username = local.eufr_ad_user_name
password = local.eufr_ad_user_password
file_system_administrators_group = "BRLNGSRVAdmins" #<==== this is simply ignored during apply
organizational_unit_distinguished_name = "OU=BRLN-Servers,OU=OU-BRLN,OU=DE,OU=Locations,DC=eu1,DC=company,DC=local"
}
}
root_volume_security_style = "NTFS"
provider = aws.eufr
}
```
### Debug Output
<!---
Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist.
To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html).
--->
https://gist.github.com/brakf/1efc660e344634e8eeec99e531c41684
### Panic Output
<!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. --->
### Expected Behavior
<!--- What should have happened? --->
aws_fsx_ontap_storage_virtual_machine.brln should have been created with parameter file_system_administrators_group set properly.
### Actual Behavior
Instead it was not considered which prompted terraform to delete and create the same ressource again upon next apply.
<!--- What actually happened? --->
### Steps to Reproduce
<!--- Please list the steps required to reproduce the issue. --->
1. `terraform apply`
### Important Factoids
<!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? --->
### References
<!---
Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests
Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example:
--->
* #0000
|
non_defect
|
file system administrators group not considered during creation of ressource aws fsx ontap storage virtual machine which forces replacement during next apply please note the following potential times when an issue might be in terraform core or resource ordering issues and issues issues issues spans resources across multiple providers if you are running into one of these scenarios we recommend opening an issue in the instead community note please vote on this issue by adding a 👍 to the original issue to help the community and maintainers prioritize this request please do not leave or other comments that do not add relevant new information or questions they generate extra noise for issue followers and do not help prioritize the request if you are interested in working on this issue or have submitted a pull request please leave a comment terraform cli and terraform aws provider version affected resource s aws fsx ontap storage virtual machine terraform configuration files please include all terraform configurations required to reproduce the bug bug reports without a functional reproduction may be closed without investigation hcl resource aws fsx ontap storage virtual machine brln file system id aws fsx ontap file system eufr id name active directory configuration netbios name self managed active directory configuration dns ips local eufr ad ips domain name local eufr ad domain name username local eufr ad user name password local eufr ad user password file system administrators group brlngsrvadmins this is simply ignored during apply organizational unit distinguished name ou brln servers ou ou brln ou de ou locations dc dc company dc local root volume security style ntfs provider aws eufr debug output please provide a link to a github gist containing the complete debug output please do not paste the debug output in the issue just paste a link to the gist to obtain the debug output see the panic output expected behavior aws fsx ontap storage virtual machine brln should have been created with parameter file system administrators group set properly actual behavior instead it was not considered which prompted terraform to delete and create the same ressource again upon next apply steps to reproduce terraform apply important factoids references information about referencing github issues are there any other github issues open or closed or pull requests that should be linked here vendor documentation for example
| 0
|
40,909
| 6,881,941,115
|
IssuesEvent
|
2017-11-21 00:55:18
|
SAFETAG/SAFETAG
|
https://api.github.com/repos/SAFETAG/SAFETAG
|
closed
|
Add resources on checking devices for signs of compromise
|
documentation enhancement
|
As I see SAFETAG's theory of change, it is roughly that an auditor connects organizations to the most vital services and resources that they currently need. As such, while I don't believe that we can expect SAFETAG auditors to provide more than rudimentary incident response when it comes to malware, we should expect to build SAFETAG modules that provide auditors the ability to identify the signs of device compromise and communicate that to security and incident response teams.
Examples of existing content.
- https://www.ucl.ac.uk/informationsecurity/itsecurity/knowledgebase/securitybaselines/win_intrusion
- https://www.ucl.ac.uk/informationsecurity/itsecurity/knowledgebase/securitybaselines/nix_intrusion
|
1.0
|
Add resources on checking devices for signs of compromise - As I see SAFETAG's theory of change, it is roughly that an auditor connects organizations to the most vital services and resources that they currently need. As such, while I don't believe that we can expect SAFETAG auditors to provide more than rudimentary incident response when it comes to malware, we should expect to build SAFETAG modules that provide auditors the ability to identify the signs of device compromise and communicate that to security and incident response teams.
Examples of existing content.
- https://www.ucl.ac.uk/informationsecurity/itsecurity/knowledgebase/securitybaselines/win_intrusion
- https://www.ucl.ac.uk/informationsecurity/itsecurity/knowledgebase/securitybaselines/nix_intrusion
|
non_defect
|
add resources on checking devices for signs of compromise as i see safetag s theory of change it is roughly that an auditor connects organizations to the most vital services and resources that they currently need as such while i don t believe that we can expect safetag auditors to provide more than rudimentary incident response when it comes to malware we should expect to build safetag modules that provide auditors the ability to identify the signs of device compromise and communicate that to security and incident response teams examples of existing content
| 0
|
752,883
| 26,330,985,262
|
IssuesEvent
|
2023-01-10 10:46:30
|
Cinevoraces/cinevoraces
|
https://api.github.com/repos/Cinevoraces/cinevoraces
|
closed
|
App - favicon, Head
|
To do priority: high
|
- [x] add favicon
- [x] Custom head for each page
- [x] external links preview for sharing elsewhere
|
1.0
|
App - favicon, Head - - [x] add favicon
- [x] Custom head for each page
- [x] external links preview for sharing elsewhere
|
non_defect
|
app favicon head add favicon custom head for each page external links preview for sharing elsewhere
| 0
|
4,159
| 2,610,088,437
|
IssuesEvent
|
2015-02-26 18:26:48
|
chrsmith/dsdsdaadf
|
https://api.github.com/repos/chrsmith/dsdsdaadf
|
opened
|
深圳痤疮怎么样祛最好
|
auto-migrated Priority-Medium Type-Defect
|
```
深圳痤疮怎么样祛最好【深圳韩方科颜全国热线400-869-1818,24
小时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构以韩��
�秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,�
��方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹
”健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内��
�业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上�
��痘痘。
```
-----
Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 7:27
|
1.0
|
深圳痤疮怎么样祛最好 - ```
深圳痤疮怎么样祛最好【深圳韩方科颜全国热线400-869-1818,24
小时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构以韩��
�秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,�
��方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹
”健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内��
�业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上�
��痘痘。
```
-----
Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 7:27
|
defect
|
深圳痤疮怎么样祛最好 深圳痤疮怎么样祛最好【 , 】深圳韩方科颜专业祛痘连锁机构,机构以韩�� �秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳品,� ��方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不反弹 ”健康祛痘技术并结合先进“先进豪华彩光”仪,开创国内�� �业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客脸上� ��痘痘。 original issue reported on code google com by szft com on may at
| 1
|
194,936
| 22,281,600,124
|
IssuesEvent
|
2022-06-11 01:11:11
|
pazhanivel07/linux-4.19.72
|
https://api.github.com/repos/pazhanivel07/linux-4.19.72
|
reopened
|
CVE-2021-33033 (High) detected in multiple libraries
|
security vulnerability
|
## CVE-2021-33033 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>linux-yoctov5.4.51</b>, <b>linux-yoctov5.4.51</b>, <b>linux-yoctov5.4.51</b></p></summary>
<p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
<p>Publish Date: 2021-05-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33033>CVE-2021-33033</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-33033">https://www.linuxkernelcves.com/cves/CVE-2021-33033</a></p>
<p>Release Date: 2021-05-14</p>
<p>Fix Resolution: v4.14.226, v4.19.181, v5.4.106, v5.10.24, v5.11.7</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2021-33033 (High) detected in multiple libraries - ## CVE-2021-33033 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>linux-yoctov5.4.51</b>, <b>linux-yoctov5.4.51</b>, <b>linux-yoctov5.4.51</b></p></summary>
<p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
<p>Publish Date: 2021-05-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33033>CVE-2021-33033</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-33033">https://www.linuxkernelcves.com/cves/CVE-2021-33033</a></p>
<p>Release Date: 2021-05-14</p>
<p>Fix Resolution: v4.14.226, v4.19.181, v5.4.106, v5.10.24, v5.11.7</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries linux linux linux vulnerability details the linux kernel before has a use after free in cipso genopt in net cipso c because the cipso and calipso refcounting for the doi definitions is mishandled aka cid this leads to writing an arbitrary value publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
| 0
|
419,817
| 28,180,349,178
|
IssuesEvent
|
2023-04-04 01:35:13
|
dimitritsampiras/olympian
|
https://api.github.com/repos/dimitritsampiras/olympian
|
closed
|
Team #34 Review: Potential new Hazard, related to deleting and recovering a Post
|
documentation
|
@NickCapstone
Overall your team had a great HA. However, I think there is a potential hazard you guys can add.
The user may potentially post something they did not mean to post, or they may delete a post that they did not mean to delete.
We believe this is a valid hazard because it fits your hazard definition, it negatively influences the user (who is a stakeholder).
To resolve these hazards you would need to add a delete mechanism for posts, and a corresponding recovery/undo mechanism.
|
1.0
|
Team #34 Review: Potential new Hazard, related to deleting and recovering a Post - @NickCapstone
Overall your team had a great HA. However, I think there is a potential hazard you guys can add.
The user may potentially post something they did not mean to post, or they may delete a post that they did not mean to delete.
We believe this is a valid hazard because it fits your hazard definition, it negatively influences the user (who is a stakeholder).
To resolve these hazards you would need to add a delete mechanism for posts, and a corresponding recovery/undo mechanism.
|
non_defect
|
team review potential new hazard related to deleting and recovering a post nickcapstone overall your team had a great ha however i think there is a potential hazard you guys can add the user may potentially post something they did not mean to post or they may delete a post that they did not mean to delete we believe this is a valid hazard because it fits your hazard definition it negatively influences the user who is a stakeholder to resolve these hazards you would need to add a delete mechanism for posts and a corresponding recovery undo mechanism
| 0
|
19,248
| 3,167,867,899
|
IssuesEvent
|
2015-09-22 00:43:18
|
prettydiff/prettydiff
|
https://api.github.com/repos/prettydiff/prettydiff
|
closed
|
Less no indenting properly
|
Defect Underway
|
https://github.com/Glavin001/atom-beautify/issues/557
header {
.inner {
h1 {
float: left;
margin: 15px 0 15px -3px;
img {
@include transition(all 500ms ease);
@media (max-width: 400px) {
width: auto;
height: 33px;
}
nav {
float: right;
margin: 10px -10px 0 0;
@include transition(all 500ms ease);
}
}
}
}
}
Becomes
header {.inner {h1 {
float : left;
margin: 15px 0 15px -3px;
img {
@include transition(all 500ms ease);
@media (max-width: 400px) {
width : auto;
height: 33px;
}
nav {
float : right;
margin: 10px -10px 0 0;
@include transition(all 500ms ease);
}
}
}
}
}
|
1.0
|
Less no indenting properly - https://github.com/Glavin001/atom-beautify/issues/557
header {
.inner {
h1 {
float: left;
margin: 15px 0 15px -3px;
img {
@include transition(all 500ms ease);
@media (max-width: 400px) {
width: auto;
height: 33px;
}
nav {
float: right;
margin: 10px -10px 0 0;
@include transition(all 500ms ease);
}
}
}
}
}
Becomes
header {.inner {h1 {
float : left;
margin: 15px 0 15px -3px;
img {
@include transition(all 500ms ease);
@media (max-width: 400px) {
width : auto;
height: 33px;
}
nav {
float : right;
margin: 10px -10px 0 0;
@include transition(all 500ms ease);
}
}
}
}
}
|
defect
|
less no indenting properly header inner float left margin img include transition all ease media max width width auto height nav float right margin include transition all ease becomes header inner float left margin img include transition all ease media max width width auto height nav float right margin include transition all ease
| 1
|
31,746
| 6,612,307,380
|
IssuesEvent
|
2017-09-20 02:55:06
|
extnet/Ext.NET
|
https://api.github.com/repos/extnet/Ext.NET
|
closed
|
IE9: dragging to a TextField over existing text is indicated as invalid
|
2.x 3.x 4.x defect review-after-extjs-upgrade sencha sencha-disclaim
|
http://forums.ext.net/showthread.php?23811
http://www.sencha.com/forum/showthread.php?258150
**Update:** Issue still open after ExtJS 6.0.1 release.
|
1.0
|
IE9: dragging to a TextField over existing text is indicated as invalid - http://forums.ext.net/showthread.php?23811
http://www.sencha.com/forum/showthread.php?258150
**Update:** Issue still open after ExtJS 6.0.1 release.
|
defect
|
dragging to a textfield over existing text is indicated as invalid update issue still open after extjs release
| 1
|
273,242
| 29,820,262,844
|
IssuesEvent
|
2023-06-17 01:17:55
|
pazhanivel07/frameworks_base_2021-0970
|
https://api.github.com/repos/pazhanivel07/frameworks_base_2021-0970
|
closed
|
CVE-2023-21099 (High) detected in multiple libraries - autoclosed
|
Mend: dependency security vulnerability
|
## CVE-2023-21099 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>baseandroid-10.0.0_r44</b>, <b>baseandroid-10.0.0_r44</b>, <b>baseandroid-10.0.0_r44</b>, <b>baseandroid-10.0.0_r44</b></p></summary>
<p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In multiple methods of PackageInstallerSession.java, there is a possible way to start foreground services from the background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-243377226
<p>Publish Date: 2023-04-19
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-21099>CVE-2023-21099</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://android.googlesource.com/platform/frameworks/base/+/6aba151873bfae198ef9eceb10f943e18b52d58c">https://android.googlesource.com/platform/frameworks/base/+/6aba151873bfae198ef9eceb10f943e18b52d58c</a></p>
<p>Release Date: 2023-04-19</p>
<p>Fix Resolution: android-13.0.0_r38</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2023-21099 (High) detected in multiple libraries - autoclosed - ## CVE-2023-21099 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>baseandroid-10.0.0_r44</b>, <b>baseandroid-10.0.0_r44</b>, <b>baseandroid-10.0.0_r44</b>, <b>baseandroid-10.0.0_r44</b></p></summary>
<p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In multiple methods of PackageInstallerSession.java, there is a possible way to start foreground services from the background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-243377226
<p>Publish Date: 2023-04-19
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-21099>CVE-2023-21099</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://android.googlesource.com/platform/frameworks/base/+/6aba151873bfae198ef9eceb10f943e18b52d58c">https://android.googlesource.com/platform/frameworks/base/+/6aba151873bfae198ef9eceb10f943e18b52d58c</a></p>
<p>Release Date: 2023-04-19</p>
<p>Fix Resolution: android-13.0.0_r38</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve high detected in multiple libraries autoclosed cve high severity vulnerability vulnerable libraries baseandroid baseandroid baseandroid baseandroid vulnerability details in multiple methods of packageinstallersession java there is a possible way to start foreground services from the background due to a logic error in the code this could lead to local escalation of privilege with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with mend
| 0
|
76,377
| 15,495,955,667
|
IssuesEvent
|
2021-03-11 01:48:05
|
kadirselcuk/wp-graphql
|
https://api.github.com/repos/kadirselcuk/wp-graphql
|
opened
|
CVE-2020-15366 (Medium) detected in ajv-6.10.2.tgz, ajv-5.5.2.tgz
|
security vulnerability
|
## CVE-2020-15366 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ajv-6.10.2.tgz</b>, <b>ajv-5.5.2.tgz</b></p></summary>
<p>
<details><summary><b>ajv-6.10.2.tgz</b></p></summary>
<p>Another JSON Schema Validator</p>
<p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-6.10.2.tgz">https://registry.npmjs.org/ajv/-/ajv-6.10.2.tgz</a></p>
<p>Path to dependency file: wp-graphql/src/Admin/GraphiQL/app/package.json</p>
<p>Path to vulnerable library: wp-graphql/src/Admin/GraphiQL/app/node_modules/table/node_modules/ajv/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-1.1.5.tgz (Root Library)
- jest-20.0.4.tgz
- jest-cli-20.0.4.tgz
- jest-environment-jsdom-20.0.3.tgz
- jsdom-9.12.0.tgz
- request-2.88.0.tgz
- har-validator-5.1.3.tgz
- :x: **ajv-6.10.2.tgz** (Vulnerable Library)
</details>
<details><summary><b>ajv-5.5.2.tgz</b></p></summary>
<p>Another JSON Schema Validator</p>
<p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-5.5.2.tgz">https://registry.npmjs.org/ajv/-/ajv-5.5.2.tgz</a></p>
<p>Path to dependency file: wp-graphql/src/Admin/GraphiQL/app/package.json</p>
<p>Path to vulnerable library: wp-graphql/src/Admin/GraphiQL/app/node_modules/ajv/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-1.1.5.tgz (Root Library)
- eslint-4.10.0.tgz
- :x: **ajv-5.5.2.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
<p>Publish Date: 2020-07-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15366>CVE-2020-15366</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/ajv-validator/ajv/releases/tag/v6.12.3">https://github.com/ajv-validator/ajv/releases/tag/v6.12.3</a></p>
<p>Release Date: 2020-07-15</p>
<p>Fix Resolution: ajv - 6.12.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2020-15366 (Medium) detected in ajv-6.10.2.tgz, ajv-5.5.2.tgz - ## CVE-2020-15366 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ajv-6.10.2.tgz</b>, <b>ajv-5.5.2.tgz</b></p></summary>
<p>
<details><summary><b>ajv-6.10.2.tgz</b></p></summary>
<p>Another JSON Schema Validator</p>
<p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-6.10.2.tgz">https://registry.npmjs.org/ajv/-/ajv-6.10.2.tgz</a></p>
<p>Path to dependency file: wp-graphql/src/Admin/GraphiQL/app/package.json</p>
<p>Path to vulnerable library: wp-graphql/src/Admin/GraphiQL/app/node_modules/table/node_modules/ajv/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-1.1.5.tgz (Root Library)
- jest-20.0.4.tgz
- jest-cli-20.0.4.tgz
- jest-environment-jsdom-20.0.3.tgz
- jsdom-9.12.0.tgz
- request-2.88.0.tgz
- har-validator-5.1.3.tgz
- :x: **ajv-6.10.2.tgz** (Vulnerable Library)
</details>
<details><summary><b>ajv-5.5.2.tgz</b></p></summary>
<p>Another JSON Schema Validator</p>
<p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-5.5.2.tgz">https://registry.npmjs.org/ajv/-/ajv-5.5.2.tgz</a></p>
<p>Path to dependency file: wp-graphql/src/Admin/GraphiQL/app/package.json</p>
<p>Path to vulnerable library: wp-graphql/src/Admin/GraphiQL/app/node_modules/ajv/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-1.1.5.tgz (Root Library)
- eslint-4.10.0.tgz
- :x: **ajv-5.5.2.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
<p>Publish Date: 2020-07-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15366>CVE-2020-15366</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/ajv-validator/ajv/releases/tag/v6.12.3">https://github.com/ajv-validator/ajv/releases/tag/v6.12.3</a></p>
<p>Release Date: 2020-07-15</p>
<p>Fix Resolution: ajv - 6.12.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve medium detected in ajv tgz ajv tgz cve medium severity vulnerability vulnerable libraries ajv tgz ajv tgz ajv tgz another json schema validator library home page a href path to dependency file wp graphql src admin graphiql app package json path to vulnerable library wp graphql src admin graphiql app node modules table node modules ajv package json dependency hierarchy react scripts tgz root library jest tgz jest cli tgz jest environment jsdom tgz jsdom tgz request tgz har validator tgz x ajv tgz vulnerable library ajv tgz another json schema validator library home page a href path to dependency file wp graphql src admin graphiql app package json path to vulnerable library wp graphql src admin graphiql app node modules ajv package json dependency hierarchy react scripts tgz root library eslint tgz x ajv tgz vulnerable library found in base branch master vulnerability details an issue was discovered in ajv validate in ajv aka another json schema validator a carefully crafted json schema could be provided that allows execution of other code by prototype pollution while untrusted schemas are recommended against the worst case of an untrusted schema should be a denial of service not execution of code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ajv step up your open source security game with whitesource
| 0
|
74,135
| 24,964,566,818
|
IssuesEvent
|
2022-11-01 18:15:01
|
matrix-org/matrix-hookshot
|
https://api.github.com/repos/matrix-org/matrix-hookshot
|
closed
|
Inconsistent casing in GitLab project connection state keys
|
T-Defect GitLab
|
This is the same problem as #509, but for GitLab project connections.
This also prevents GitLab project connections from working if set up via the widget / provisioning API, as long as the project path contains a capital letter.
|
1.0
|
Inconsistent casing in GitLab project connection state keys - This is the same problem as #509, but for GitLab project connections.
This also prevents GitLab project connections from working if set up via the widget / provisioning API, as long as the project path contains a capital letter.
|
defect
|
inconsistent casing in gitlab project connection state keys this is the same problem as but for gitlab project connections this also prevents gitlab project connections from working if set up via the widget provisioning api as long as the project path contains a capital letter
| 1
|
116,341
| 24,900,630,606
|
IssuesEvent
|
2022-10-28 20:27:30
|
zcash/zcash
|
https://api.github.com/repos/zcash/zcash
|
closed
|
Add ``--debug=libsnark-profiling`` option.
|
Zcash codebase I-performance A-testing in 1.0 special to Nathan usability
|
Here's the runtime config of libsnark profiling in my latest review (public alpha branch) that can be the starting point: https://github.com/Electric-Coin-Company/zcash/commit/4200e0d3d373a8c034bab641732d54b57c606a5d#commitcomment-15441534
|
1.0
|
Add ``--debug=libsnark-profiling`` option. - Here's the runtime config of libsnark profiling in my latest review (public alpha branch) that can be the starting point: https://github.com/Electric-Coin-Company/zcash/commit/4200e0d3d373a8c034bab641732d54b57c606a5d#commitcomment-15441534
|
non_defect
|
add debug libsnark profiling option here s the runtime config of libsnark profiling in my latest review public alpha branch that can be the starting point
| 0
|
188,079
| 6,768,115,786
|
IssuesEvent
|
2017-10-26 07:36:21
|
bounswe/bounswe2017group10
|
https://api.github.com/repos/bounswe/bounswe2017group10
|
closed
|
Android cloudinary wrong image shown in Feed
|
Android Bug Report High-priority
|
Order of the images that are uploaded to cloudinary are wrong.
|
1.0
|
Android cloudinary wrong image shown in Feed - Order of the images that are uploaded to cloudinary are wrong.
|
non_defect
|
android cloudinary wrong image shown in feed order of the images that are uploaded to cloudinary are wrong
| 0
|
78,181
| 27,359,228,561
|
IssuesEvent
|
2023-02-27 14:51:02
|
vector-im/element-ios
|
https://api.github.com/repos/vector-im/element-ios
|
opened
|
Use theme colors in rounded buttons disabled state
|
T-Defect
|
### Steps to reproduce
Some rounded buttons doesn't use color from theme in Disabled state.
In some views, the green color of the button's labels is hard-coded into storyboards.
TODO : define title color for Disabled state from theme in RoundedButton.updateButtonStyle method.
### Outcome
oppmo
### Your phone model
_No response_
### Operating system version
_No response_
### Application version
_No response_
### Homeserver
_No response_
### Will you send logs?
Yes
|
1.0
|
Use theme colors in rounded buttons disabled state - ### Steps to reproduce
Some rounded buttons doesn't use color from theme in Disabled state.
In some views, the green color of the button's labels is hard-coded into storyboards.
TODO : define title color for Disabled state from theme in RoundedButton.updateButtonStyle method.
### Outcome
oppmo
### Your phone model
_No response_
### Operating system version
_No response_
### Application version
_No response_
### Homeserver
_No response_
### Will you send logs?
Yes
|
defect
|
use theme colors in rounded buttons disabled state steps to reproduce some rounded buttons doesn t use color from theme in disabled state in some views the green color of the button s labels is hard coded into storyboards todo define title color for disabled state from theme in roundedbutton updatebuttonstyle method outcome oppmo your phone model no response operating system version no response application version no response homeserver no response will you send logs yes
| 1
|
68,897
| 9,220,003,942
|
IssuesEvent
|
2019-03-11 16:32:45
|
Paula204/ISPP
|
https://api.github.com/repos/Paula204/ISPP
|
closed
|
Editar mockups y crear vídeo
|
documentation high
|
Editar los mockups:
- Añadir ubicación
- Menos texto
- Mejorar visualmente
Crear vídeo interactivo:
- Rápido y visual
|
1.0
|
Editar mockups y crear vídeo - Editar los mockups:
- Añadir ubicación
- Menos texto
- Mejorar visualmente
Crear vídeo interactivo:
- Rápido y visual
|
non_defect
|
editar mockups y crear vídeo editar los mockups añadir ubicación menos texto mejorar visualmente crear vídeo interactivo rápido y visual
| 0
|
232,053
| 18,841,785,397
|
IssuesEvent
|
2021-11-11 10:24:32
|
mozilla-mobile/fenix
|
https://api.github.com/repos/mozilla-mobile/fenix
|
reopened
|
Intermittent UI test failure - < SmokeTest.editCustomSearchEngineTest >
|
eng:intermittent-test eng:ui-test
|
### Firebase Test Run:
https://console.firebase.google.com/project/moz-fenix/testlab/histories/bh.66b7091e15d53d45/matrices/9223008020099075063/executions/bs.38fc48eea92dfdb7/testcases/1/test-cases
### Stacktrace:
`java.lang.AssertionError
at org.junit.Assert.fail(Assert.java:87)
at org.junit.Assert.assertTrue(Assert.java:42)
at org.junit.Assert.assertTrue(Assert.java:53)
at org.mozilla.fenix.ui.robots.SettingsSubMenuSearchRobot.saveEditSearchEngine(SettingsSubMenuSearchRobot.kt:140)
at org.mozilla.fenix.ui.SmokeTest$editCustomSearchEngineTest$4.invoke(SmokeTest.kt:571)
at org.mozilla.fenix.ui.SmokeTest$editCustomSearchEngineTest$4.invoke(SmokeTest.kt:563)
at org.mozilla.fenix.ui.robots.SettingsRobot$Transition.openSearchSubMenu(SettingsRobot.kt:136)
at org.mozilla.fenix.ui.SmokeTest.editCustomSearchEngineTest(SmokeTest.kt:563)`
### Build:
Debug 11/2
Started with https://github.com/mozilla-mobile/fenix/pull/22244
|
2.0
|
Intermittent UI test failure - < SmokeTest.editCustomSearchEngineTest > - ### Firebase Test Run:
https://console.firebase.google.com/project/moz-fenix/testlab/histories/bh.66b7091e15d53d45/matrices/9223008020099075063/executions/bs.38fc48eea92dfdb7/testcases/1/test-cases
### Stacktrace:
`java.lang.AssertionError
at org.junit.Assert.fail(Assert.java:87)
at org.junit.Assert.assertTrue(Assert.java:42)
at org.junit.Assert.assertTrue(Assert.java:53)
at org.mozilla.fenix.ui.robots.SettingsSubMenuSearchRobot.saveEditSearchEngine(SettingsSubMenuSearchRobot.kt:140)
at org.mozilla.fenix.ui.SmokeTest$editCustomSearchEngineTest$4.invoke(SmokeTest.kt:571)
at org.mozilla.fenix.ui.SmokeTest$editCustomSearchEngineTest$4.invoke(SmokeTest.kt:563)
at org.mozilla.fenix.ui.robots.SettingsRobot$Transition.openSearchSubMenu(SettingsRobot.kt:136)
at org.mozilla.fenix.ui.SmokeTest.editCustomSearchEngineTest(SmokeTest.kt:563)`
### Build:
Debug 11/2
Started with https://github.com/mozilla-mobile/fenix/pull/22244
|
non_defect
|
intermittent ui test failure firebase test run stacktrace java lang assertionerror at org junit assert fail assert java at org junit assert asserttrue assert java at org junit assert asserttrue assert java at org mozilla fenix ui robots settingssubmenusearchrobot saveeditsearchengine settingssubmenusearchrobot kt at org mozilla fenix ui smoketest editcustomsearchenginetest invoke smoketest kt at org mozilla fenix ui smoketest editcustomsearchenginetest invoke smoketest kt at org mozilla fenix ui robots settingsrobot transition opensearchsubmenu settingsrobot kt at org mozilla fenix ui smoketest editcustomsearchenginetest smoketest kt build debug started with
| 0
|
1,426
| 16,017,783,396
|
IssuesEvent
|
2021-04-20 18:16:28
|
Azure/azure-sdk-for-java
|
https://api.github.com/repos/Azure/azure-sdk-for-java
|
opened
|
Log only what we need in INFO (too much logging by default)
|
Azure.Core amqp tenet-reliability
|
* customers report that our logging is actually too detailed right now.
* should we have an aka.ms link to a FAQ that also has info on how to collect enough data for a bug report?
|
True
|
Log only what we need in INFO (too much logging by default) - * customers report that our logging is actually too detailed right now.
* should we have an aka.ms link to a FAQ that also has info on how to collect enough data for a bug report?
|
non_defect
|
log only what we need in info too much logging by default customers report that our logging is actually too detailed right now should we have an aka ms link to a faq that also has info on how to collect enough data for a bug report
| 0
|
610,956
| 18,941,072,884
|
IssuesEvent
|
2021-11-18 02:58:46
|
MaibornWolff/codecharta
|
https://api.github.com/repos/MaibornWolff/codecharta
|
closed
|
Remove non-functional buttons
|
bug help wanted pr-visualization priority:medium difficulty:low good first issue
|
# Bug
## Expected Behavior
GIVEN a open map with the building/file panel being open
WHEN hovering above the building/file title
THEN there's no hover button visible in case there's no link
## Actual Behavior
A hovering effect is visible due to the element being a button instead of a title.
## Screenshots

## Specifications
- is released in [online-demo](https://maibornwolff.github.io/codecharta/visualization/app/index.html?file=codecharta.cc.json&file=codecharta_analysis.cc.json): yes | no
- CodeCharta Version: 1.82.0
- OS: all
- Browser: all
|
1.0
|
Remove non-functional buttons - # Bug
## Expected Behavior
GIVEN a open map with the building/file panel being open
WHEN hovering above the building/file title
THEN there's no hover button visible in case there's no link
## Actual Behavior
A hovering effect is visible due to the element being a button instead of a title.
## Screenshots

## Specifications
- is released in [online-demo](https://maibornwolff.github.io/codecharta/visualization/app/index.html?file=codecharta.cc.json&file=codecharta_analysis.cc.json): yes | no
- CodeCharta Version: 1.82.0
- OS: all
- Browser: all
|
non_defect
|
remove non functional buttons bug expected behavior given a open map with the building file panel being open when hovering above the building file title then there s no hover button visible in case there s no link actual behavior a hovering effect is visible due to the element being a button instead of a title screenshots specifications is released in yes no codecharta version os all browser all
| 0
|
341,992
| 24,724,388,710
|
IssuesEvent
|
2022-10-20 13:07:27
|
cemkurtoglu/Personalized_healthcare_system_for_neurodegenerative_diseases
|
https://api.github.com/repos/cemkurtoglu/Personalized_healthcare_system_for_neurodegenerative_diseases
|
closed
|
Gantt Chart Creation and Github project setup
|
documentation preparation
|
Create a Gantt chart in order to track your progress efficiently. Use excel or a similar application. Once this task is complete update Milestones in the GitHub repo and assigns issues to these milestones.
|
1.0
|
Gantt Chart Creation and Github project setup - Create a Gantt chart in order to track your progress efficiently. Use excel or a similar application. Once this task is complete update Milestones in the GitHub repo and assigns issues to these milestones.
|
non_defect
|
gantt chart creation and github project setup create a gantt chart in order to track your progress efficiently use excel or a similar application once this task is complete update milestones in the github repo and assigns issues to these milestones
| 0
|
615,457
| 19,255,520,834
|
IssuesEvent
|
2021-12-09 10:50:49
|
googleapis/java-dlp
|
https://api.github.com/repos/googleapis/java-dlp
|
closed
|
dlp.snippets.JobsTests: testListJobs failed
|
type: bug priority: p1 api: dlp flakybot: issue
|
Note: #638 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky.
----
commit: 2d9d3c196041ff038051a357778f34d22d90fdf5
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/92875462-f70a-4e1b-9ea7-9edff369a08f), [Sponge](http://sponge2/92875462-f70a-4e1b-9ea7-9edff369a08f)
status: failed
<details><summary>Test output</summary><br><pre>com.google.api.gax.rpc.PermissionDeniedException: io.grpc.StatusRuntimeException: PERMISSION_DENIED: Not allowed, access denied for permission dlp.jobs.list.
at com.google.api.gax.rpc.ApiExceptionFactory.createException(ApiExceptionFactory.java:53)
at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:72)
at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:60)
at com.google.api.gax.grpc.GrpcExceptionCallable$ExceptionTransformingFuture.onFailure(GrpcExceptionCallable.java:97)
at com.google.api.core.ApiFutures$1.onFailure(ApiFutures.java:68)
at com.google.common.util.concurrent.Futures$CallbackListener.run(Futures.java:1133)
at com.google.common.util.concurrent.DirectExecutor.execute(DirectExecutor.java:31)
at com.google.common.util.concurrent.AbstractFuture.executeListener(AbstractFuture.java:1277)
at com.google.common.util.concurrent.AbstractFuture.complete(AbstractFuture.java:1038)
at com.google.common.util.concurrent.AbstractFuture.setException(AbstractFuture.java:808)
at io.grpc.stub.ClientCalls$GrpcFuture.setException(ClientCalls.java:564)
at io.grpc.stub.ClientCalls$UnaryStreamToFuture.onClose(ClientCalls.java:534)
at io.grpc.internal.DelayedClientCall$DelayedListener$3.run(DelayedClientCall.java:463)
at io.grpc.internal.DelayedClientCall$DelayedListener.delayOrExecute(DelayedClientCall.java:427)
at io.grpc.internal.DelayedClientCall$DelayedListener.onClose(DelayedClientCall.java:460)
at io.grpc.internal.ClientCallImpl.closeObserver(ClientCallImpl.java:562)
at io.grpc.internal.ClientCallImpl.access$300(ClientCallImpl.java:70)
at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInternal(ClientCallImpl.java:743)
at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInContext(ClientCallImpl.java:722)
at io.grpc.internal.ContextRunnable.run(ContextRunnable.java:37)
at io.grpc.internal.SerializingExecutor.run(SerializingExecutor.java:133)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
at java.lang.Thread.run(Thread.java:748)
Suppressed: com.google.api.gax.rpc.AsyncTaskException: Asynchronous task failed
at com.google.api.gax.rpc.ApiExceptions.callAndTranslateApiException(ApiExceptions.java:57)
at com.google.api.gax.rpc.UnaryCallable.call(UnaryCallable.java:112)
at com.google.cloud.dlp.v2.DlpServiceClient.listDlpJobs(DlpServiceClient.java:3725)
at dlp.snippets.JobsList.listJobs(JobsList.java:55)
at dlp.snippets.JobsTests.testListJobs(JobsTests.java:110)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:364)
at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:272)
at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:237)
at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:158)
at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:428)
at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:162)
at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:562)
at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:548)
Caused by: io.grpc.StatusRuntimeException: PERMISSION_DENIED: Not allowed, access denied for permission dlp.jobs.list.
at io.grpc.Status.asRuntimeException(Status.java:535)
... 13 more
</pre></details>
|
1.0
|
dlp.snippets.JobsTests: testListJobs failed - Note: #638 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky.
----
commit: 2d9d3c196041ff038051a357778f34d22d90fdf5
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/92875462-f70a-4e1b-9ea7-9edff369a08f), [Sponge](http://sponge2/92875462-f70a-4e1b-9ea7-9edff369a08f)
status: failed
<details><summary>Test output</summary><br><pre>com.google.api.gax.rpc.PermissionDeniedException: io.grpc.StatusRuntimeException: PERMISSION_DENIED: Not allowed, access denied for permission dlp.jobs.list.
at com.google.api.gax.rpc.ApiExceptionFactory.createException(ApiExceptionFactory.java:53)
at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:72)
at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:60)
at com.google.api.gax.grpc.GrpcExceptionCallable$ExceptionTransformingFuture.onFailure(GrpcExceptionCallable.java:97)
at com.google.api.core.ApiFutures$1.onFailure(ApiFutures.java:68)
at com.google.common.util.concurrent.Futures$CallbackListener.run(Futures.java:1133)
at com.google.common.util.concurrent.DirectExecutor.execute(DirectExecutor.java:31)
at com.google.common.util.concurrent.AbstractFuture.executeListener(AbstractFuture.java:1277)
at com.google.common.util.concurrent.AbstractFuture.complete(AbstractFuture.java:1038)
at com.google.common.util.concurrent.AbstractFuture.setException(AbstractFuture.java:808)
at io.grpc.stub.ClientCalls$GrpcFuture.setException(ClientCalls.java:564)
at io.grpc.stub.ClientCalls$UnaryStreamToFuture.onClose(ClientCalls.java:534)
at io.grpc.internal.DelayedClientCall$DelayedListener$3.run(DelayedClientCall.java:463)
at io.grpc.internal.DelayedClientCall$DelayedListener.delayOrExecute(DelayedClientCall.java:427)
at io.grpc.internal.DelayedClientCall$DelayedListener.onClose(DelayedClientCall.java:460)
at io.grpc.internal.ClientCallImpl.closeObserver(ClientCallImpl.java:562)
at io.grpc.internal.ClientCallImpl.access$300(ClientCallImpl.java:70)
at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInternal(ClientCallImpl.java:743)
at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInContext(ClientCallImpl.java:722)
at io.grpc.internal.ContextRunnable.run(ContextRunnable.java:37)
at io.grpc.internal.SerializingExecutor.run(SerializingExecutor.java:133)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
at java.lang.Thread.run(Thread.java:748)
Suppressed: com.google.api.gax.rpc.AsyncTaskException: Asynchronous task failed
at com.google.api.gax.rpc.ApiExceptions.callAndTranslateApiException(ApiExceptions.java:57)
at com.google.api.gax.rpc.UnaryCallable.call(UnaryCallable.java:112)
at com.google.cloud.dlp.v2.DlpServiceClient.listDlpJobs(DlpServiceClient.java:3725)
at dlp.snippets.JobsList.listJobs(JobsList.java:55)
at dlp.snippets.JobsTests.testListJobs(JobsTests.java:110)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:364)
at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:272)
at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:237)
at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:158)
at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:428)
at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:162)
at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:562)
at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:548)
Caused by: io.grpc.StatusRuntimeException: PERMISSION_DENIED: Not allowed, access denied for permission dlp.jobs.list.
at io.grpc.Status.asRuntimeException(Status.java:535)
... 13 more
</pre></details>
|
non_defect
|
dlp snippets jobstests testlistjobs failed note was also for this test but it was closed more than days ago so i didn t mark it flaky commit buildurl status failed test output com google api gax rpc permissiondeniedexception io grpc statusruntimeexception permission denied not allowed access denied for permission dlp jobs list at com google api gax rpc apiexceptionfactory createexception apiexceptionfactory java at com google api gax grpc grpcapiexceptionfactory create grpcapiexceptionfactory java at com google api gax grpc grpcapiexceptionfactory create grpcapiexceptionfactory java at com google api gax grpc grpcexceptioncallable exceptiontransformingfuture onfailure grpcexceptioncallable java at com google api core apifutures onfailure apifutures java at com google common util concurrent futures callbacklistener run futures java at com google common util concurrent directexecutor execute directexecutor java at com google common util concurrent abstractfuture executelistener abstractfuture java at com google common util concurrent abstractfuture complete abstractfuture java at com google common util concurrent abstractfuture setexception abstractfuture java at io grpc stub clientcalls grpcfuture setexception clientcalls java at io grpc stub clientcalls unarystreamtofuture onclose clientcalls java at io grpc internal delayedclientcall delayedlistener run delayedclientcall java at io grpc internal delayedclientcall delayedlistener delayorexecute delayedclientcall java at io grpc internal delayedclientcall delayedlistener onclose delayedclientcall java at io grpc internal clientcallimpl closeobserver clientcallimpl java at io grpc internal clientcallimpl access clientcallimpl java at io grpc internal clientcallimpl clientstreamlistenerimpl runinternal clientcallimpl java at io grpc internal clientcallimpl clientstreamlistenerimpl runincontext clientcallimpl java at io grpc internal contextrunnable run contextrunnable java at io grpc internal serializingexecutor run serializingexecutor java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java suppressed com google api gax rpc asynctaskexception asynchronous task failed at com google api gax rpc apiexceptions callandtranslateapiexception apiexceptions java at com google api gax rpc unarycallable call unarycallable java at com google cloud dlp dlpserviceclient listdlpjobs dlpserviceclient java at dlp snippets jobslist listjobs jobslist java at dlp snippets jobstests testlistjobs jobstests java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at org junit internal runners statements runbefores evaluate runbefores java at org junit internal runners statements runafters evaluate runafters java at org junit runners parentrunner evaluate parentrunner java at org junit runners evaluate java at org junit runners parentrunner runleaf parentrunner java at org junit runners runchild java at org junit runners runchild java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org apache maven surefire execute java at org apache maven surefire executewithrerun java at org apache maven surefire executetestset java at org apache maven surefire invoke java at org apache maven surefire booter forkedbooter runsuitesinprocess forkedbooter java at org apache maven surefire booter forkedbooter execute forkedbooter java at org apache maven surefire booter forkedbooter run forkedbooter java at org apache maven surefire booter forkedbooter main forkedbooter java caused by io grpc statusruntimeexception permission denied not allowed access denied for permission dlp jobs list at io grpc status asruntimeexception status java more
| 0
|
60,843
| 17,023,537,348
|
IssuesEvent
|
2021-07-03 02:32:00
|
tomhughes/trac-tickets
|
https://api.github.com/repos/tomhughes/trac-tickets
|
closed
|
Admin Layer Has Background Fill
|
Component: mapnik Priority: major Resolution: worksforme Type: defect
|
**[Submitted to the original trac issue database at 3.53pm, Monday, 11th January 2010]**
The Admin Boundary for the city of Chandler, AZ has on odd fill pattern that is obscuring all underlying map imagery at zoom levels of 14 or higher. At level 13 or lower the fill is not rendered, so you can see all map data. You can see the problem here: http://www.openstreetmap.org/?lat=33.35224&lon=-111.84764&zoom=15&layers=B000FTF
I have compared all of the tags (using Potlatch) of the Boundary to adjacent Tempe, AZ and everything appears to be identical, but Tempe renders fine, and Chandler has this obscuring fill. I don't know if this is a rendering problem, or a tagging problem, but something is clearly wrong.
|
1.0
|
Admin Layer Has Background Fill - **[Submitted to the original trac issue database at 3.53pm, Monday, 11th January 2010]**
The Admin Boundary for the city of Chandler, AZ has on odd fill pattern that is obscuring all underlying map imagery at zoom levels of 14 or higher. At level 13 or lower the fill is not rendered, so you can see all map data. You can see the problem here: http://www.openstreetmap.org/?lat=33.35224&lon=-111.84764&zoom=15&layers=B000FTF
I have compared all of the tags (using Potlatch) of the Boundary to adjacent Tempe, AZ and everything appears to be identical, but Tempe renders fine, and Chandler has this obscuring fill. I don't know if this is a rendering problem, or a tagging problem, but something is clearly wrong.
|
defect
|
admin layer has background fill the admin boundary for the city of chandler az has on odd fill pattern that is obscuring all underlying map imagery at zoom levels of or higher at level or lower the fill is not rendered so you can see all map data you can see the problem here i have compared all of the tags using potlatch of the boundary to adjacent tempe az and everything appears to be identical but tempe renders fine and chandler has this obscuring fill i don t know if this is a rendering problem or a tagging problem but something is clearly wrong
| 1
|
3,788
| 2,610,069,054
|
IssuesEvent
|
2015-02-26 18:20:15
|
chrsmith/jsjsj122
|
https://api.github.com/repos/chrsmith/jsjsj122
|
opened
|
黄岩治前列腺炎哪里比较好
|
auto-migrated Priority-Medium Type-Defect
|
```
黄岩治前列腺炎哪里比较好【台州五洲生殖医院】24小时健康
咨询热线:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台
州市椒江区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、1
08、118、198及椒江一金清公交车直达枫南小区,乘坐107、105、
109、112、901、 902公交车到星星广场下车,步行即可到院。
诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,��
�精,无精。包皮包茎,精索静脉曲张,淋病等。
台州五洲生殖医院是台州最大的男科医院,权威专家在线免��
�咨询,拥有专业完善的男科检查治疗设备,严格按照国家标�
��收费。尖端医疗设备,与世界同步。权威专家,成就专业典
范。人性化服务,一切以患者为中心。
看男科就选台州五洲生殖医院,专业男科为男人。
```
-----
Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 9:13
|
1.0
|
黄岩治前列腺炎哪里比较好 - ```
黄岩治前列腺炎哪里比较好【台州五洲生殖医院】24小时健康
咨询热线:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台
州市椒江区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、1
08、118、198及椒江一金清公交车直达枫南小区,乘坐107、105、
109、112、901、 902公交车到星星广场下车,步行即可到院。
诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,��
�精,无精。包皮包茎,精索静脉曲张,淋病等。
台州五洲生殖医院是台州最大的男科医院,权威专家在线免��
�咨询,拥有专业完善的男科检查治疗设备,严格按照国家标�
��收费。尖端医疗设备,与世界同步。权威专家,成就专业典
范。人性化服务,一切以患者为中心。
看男科就选台州五洲生殖医院,专业男科为男人。
```
-----
Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 9:13
|
defect
|
黄岩治前列腺炎哪里比较好 黄岩治前列腺炎哪里比较好【台州五洲生殖医院】 咨询热线 微信号tzwzszyy 医院地址 台 (枫南大转盘旁)乘车线路 、 、 、 , 、 、 、 、 、 ,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 original issue reported on code google com by poweragr gmail com on may at
| 1
|
36,446
| 6,535,019,371
|
IssuesEvent
|
2017-08-31 13:14:24
|
WeblateOrg/weblate
|
https://api.github.com/repos/WeblateOrg/weblate
|
closed
|
Xliff - multiline source context displayed as one line
|
documentation
|
### Steps to reproduce
1. Create Xliff file with multi-line string
2. Import in weblate
3. in Translate UI context source it is displayed as one line
With other format - Android XML resource, the source is displayed properly formatted with newlines.
Both Android and Xliff are xmml formats. I tried with \n and plain newlines, it's ignored with Xliff.
Is Android XML the only format that can be used for multiline strings? (I know Gettext kind of supports it but splits lines into separate strings and requires git hooks to make it work.)
Thank you.
|
1.0
|
Xliff - multiline source context displayed as one line - ### Steps to reproduce
1. Create Xliff file with multi-line string
2. Import in weblate
3. in Translate UI context source it is displayed as one line
With other format - Android XML resource, the source is displayed properly formatted with newlines.
Both Android and Xliff are xmml formats. I tried with \n and plain newlines, it's ignored with Xliff.
Is Android XML the only format that can be used for multiline strings? (I know Gettext kind of supports it but splits lines into separate strings and requires git hooks to make it work.)
Thank you.
|
non_defect
|
xliff multiline source context displayed as one line steps to reproduce create xliff file with multi line string import in weblate in translate ui context source it is displayed as one line with other format android xml resource the source is displayed properly formatted with newlines both android and xliff are xmml formats i tried with n and plain newlines it s ignored with xliff is android xml the only format that can be used for multiline strings i know gettext kind of supports it but splits lines into separate strings and requires git hooks to make it work thank you
| 0
|
56,250
| 14,994,816,828
|
IssuesEvent
|
2021-01-29 13:28:54
|
vector-im/element-web
|
https://api.github.com/repos/vector-im/element-web
|
closed
|
UIA-over-SSO leaves you marooned in a "please close this tab" tab
|
bug defect p1 severity:minor type:sso type:uia
|
Once UIA-over-SSO completes, you end up stuck in a tab which looks like this:

|
1.0
|
UIA-over-SSO leaves you marooned in a "please close this tab" tab - Once UIA-over-SSO completes, you end up stuck in a tab which looks like this:

|
defect
|
uia over sso leaves you marooned in a please close this tab tab once uia over sso completes you end up stuck in a tab which looks like this
| 1
|
682,642
| 23,351,181,249
|
IssuesEvent
|
2022-08-10 00:13:09
|
worldmaking/mischmasch
|
https://api.github.com/repos/worldmaking/mischmasch
|
closed
|
run pat2got.js in the mischmasch init() function
|
Priority: Low
|
pat2got.js currently needs to be run separately in order to gather all .gendsp files into the mischmasch menu.
two goals:
- [ ] run pat2got.js during the mischmasch init function
- [ ] use a filewatcher on the /code folder, so if any .gendsp files are modified, removed, or added while mischmasch is running, it re-runs the pat2got.js and updates the mischmasch menu.
|
1.0
|
run pat2got.js in the mischmasch init() function - pat2got.js currently needs to be run separately in order to gather all .gendsp files into the mischmasch menu.
two goals:
- [ ] run pat2got.js during the mischmasch init function
- [ ] use a filewatcher on the /code folder, so if any .gendsp files are modified, removed, or added while mischmasch is running, it re-runs the pat2got.js and updates the mischmasch menu.
|
non_defect
|
run js in the mischmasch init function js currently needs to be run separately in order to gather all gendsp files into the mischmasch menu two goals run js during the mischmasch init function use a filewatcher on the code folder so if any gendsp files are modified removed or added while mischmasch is running it re runs the js and updates the mischmasch menu
| 0
|
12,219
| 2,685,513,053
|
IssuesEvent
|
2015-03-30 02:00:05
|
IssueMigrationTest/Test5
|
https://api.github.com/repos/IssueMigrationTest/Test5
|
closed
|
False alarm on class inheritances
|
auto-migrated milestone-0.9 Priority-Medium Type-Defect
|
**Issue by jason.mi...@gmail.com**
_14 Jul 2011 at 2:55 GMT_
_Originally opened on Google Code_
----
```
SS give a false alarm warning message on the following case.
compilation and run are ok
Test case:
class Father(object):
def __init__(self,Age):
self.Age = Age
def show(self):
print self.Age
class Son(Father):
def __init__(self,Age):
Father.__init__(self,Age)
def show(self):
Father.show(self)
a= Father(30)
a.show()
b = Son(10)
b.show()
Output:
*** SHED SKIN Python-to-C++ Compiler 0.8 ***
Copyright 2005-2010 Mark Dufour; License GNU GPL version 3 (See LICENSE)
[analyzing types..]
********************************100%
[generating c++ code..]
*WARNING* test_var1.py:15: class attribute 'show' accessed without using class
name
```
|
1.0
|
False alarm on class inheritances - **Issue by jason.mi...@gmail.com**
_14 Jul 2011 at 2:55 GMT_
_Originally opened on Google Code_
----
```
SS give a false alarm warning message on the following case.
compilation and run are ok
Test case:
class Father(object):
def __init__(self,Age):
self.Age = Age
def show(self):
print self.Age
class Son(Father):
def __init__(self,Age):
Father.__init__(self,Age)
def show(self):
Father.show(self)
a= Father(30)
a.show()
b = Son(10)
b.show()
Output:
*** SHED SKIN Python-to-C++ Compiler 0.8 ***
Copyright 2005-2010 Mark Dufour; License GNU GPL version 3 (See LICENSE)
[analyzing types..]
********************************100%
[generating c++ code..]
*WARNING* test_var1.py:15: class attribute 'show' accessed without using class
name
```
|
defect
|
false alarm on class inheritances issue by jason mi gmail com jul at gmt originally opened on google code ss give a false alarm warning message on the following case compilation and run are ok test case class father object def init self age self age age def show self print self age class son father def init self age father init self age def show self father show self a father a show b son b show output shed skin python to c compiler copyright mark dufour license gnu gpl version see license warning test py class attribute show accessed without using class name
| 1
|
33,325
| 7,090,724,382
|
IssuesEvent
|
2018-01-12 10:06:31
|
jOOQ/jOOQ
|
https://api.github.com/repos/jOOQ/jOOQ
|
closed
|
Plain SQL API should recognise multi-character PostgreSQL geometry operators
|
C: DB: PostgreSQL C: Functionality P: Medium R: Fixed T: Defect
|
Running this query:
```sql
SELECT
oprname,
oprcode || '(' || format_type(oprleft, NULL::integer) || ', '
|| format_type(oprright, NULL::integer) || ')' AS function
FROM pg_operator
WHERE oprname LIKE '?%';
```
Yields, on my install:
```
oprname |function |
--------|--------------------------------|
?# |path_inter(path, path) |
?# |box_overlap(box, box) |
?- |point_horiz(point, point) |
?| |point_vert(point, point) |
?# |lseg_intersect(lseg, lseg) |
?|| |lseg_parallel(lseg, lseg) |
?-| |lseg_perp(lseg, lseg) |
?- |lseg_horizontal(-, lseg) |
?| |lseg_vertical(-, lseg) |
?# |inter_sl(lseg, line) |
?# |inter_sb(lseg, box) |
?# |inter_lb(line, box) |
?# |line_intersect(line, line) |
?|| |line_parallel(line, line) |
?-| |line_perp(line, line) |
?- |line_horizontal(-, line) |
?| |line_vertical(-, line) |
? |jsonb_exists(jsonb, text) |
?| |jsonb_exists_any(jsonb, text[]) |
?& |jsonb_exists_all(jsonb, text[]) |
? |exist(hstore, text) |
?| |exists_any(hstore, text[]) |
?& |exists_all(hstore, text[]) |
```
So, additional characters to recognise after `?` include `#`, `-`
|
1.0
|
Plain SQL API should recognise multi-character PostgreSQL geometry operators - Running this query:
```sql
SELECT
oprname,
oprcode || '(' || format_type(oprleft, NULL::integer) || ', '
|| format_type(oprright, NULL::integer) || ')' AS function
FROM pg_operator
WHERE oprname LIKE '?%';
```
Yields, on my install:
```
oprname |function |
--------|--------------------------------|
?# |path_inter(path, path) |
?# |box_overlap(box, box) |
?- |point_horiz(point, point) |
?| |point_vert(point, point) |
?# |lseg_intersect(lseg, lseg) |
?|| |lseg_parallel(lseg, lseg) |
?-| |lseg_perp(lseg, lseg) |
?- |lseg_horizontal(-, lseg) |
?| |lseg_vertical(-, lseg) |
?# |inter_sl(lseg, line) |
?# |inter_sb(lseg, box) |
?# |inter_lb(line, box) |
?# |line_intersect(line, line) |
?|| |line_parallel(line, line) |
?-| |line_perp(line, line) |
?- |line_horizontal(-, line) |
?| |line_vertical(-, line) |
? |jsonb_exists(jsonb, text) |
?| |jsonb_exists_any(jsonb, text[]) |
?& |jsonb_exists_all(jsonb, text[]) |
? |exist(hstore, text) |
?| |exists_any(hstore, text[]) |
?& |exists_all(hstore, text[]) |
```
So, additional characters to recognise after `?` include `#`, `-`
|
defect
|
plain sql api should recognise multi character postgresql geometry operators running this query sql select oprname oprcode format type oprleft null integer format type oprright null integer as function from pg operator where oprname like yields on my install oprname function path inter path path box overlap box box point horiz point point point vert point point lseg intersect lseg lseg lseg parallel lseg lseg lseg perp lseg lseg lseg horizontal lseg lseg vertical lseg inter sl lseg line inter sb lseg box inter lb line box line intersect line line line parallel line line line perp line line line horizontal line line vertical line jsonb exists jsonb text jsonb exists any jsonb text jsonb exists all jsonb text exist hstore text exists any hstore text exists all hstore text so additional characters to recognise after include
| 1
|
21,616
| 3,525,845,227
|
IssuesEvent
|
2016-01-14 00:24:43
|
gadLinux/hibernate-generic-dao
|
https://api.github.com/repos/gadLinux/hibernate-generic-dao
|
closed
|
Sample Project hibernate-maven-web does nut run under jetty (?)
|
auto-migrated Priority-Medium Type-Defect
|
```
What did I do?
checkout out the project
build it via "mvn clean install"
deployed *.war on a local jetty server (jetty version: 9.0.7)
caused this Exception:
2013-11-18 14:06:11.604:INFO:oejdp.ScanningAppProvider:main: Deployment monitor
[file:/opt/jetty-distribution-9.0.7.v
20131107/webapps/] at interval 1
2013-11-18 14:06:14.212:WARN:oejuc.AbstractLifeCycle:main: FAILED
org.eclipse.jetty.security.ConstraintSecurityHandle
r@6d20c359: java.lang.IllegalStateException: No LoginService for
org.eclipse.jetty.security.authentication.BasicAuthe
nticator@300c2443 in
org.eclipse.jetty.security.ConstraintSecurityHandler@6d20c359
java.lang.IllegalStateException: No LoginService for
org.eclipse.jetty.security.authentication.BasicAuthenticator@300
c2443 in org.eclipse.jetty.security.ConstraintSecurityHandler@6d20c359
at org.eclipse.jetty.security.authentication.LoginAuthenticator.setConfiguration(LoginAuthenticator.java:67)
at org.eclipse.jetty.security.SecurityHandler.doStart(SecurityHandler.java:375)
at org.eclipse.jetty.security.ConstraintSecurityHandler.doStart(ConstraintSecurityHandler.java:457)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69)
at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:118)
at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:100)
at org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:60)
at org.eclipse.jetty.server.handler.ScopedHandler.doStart(ScopedHandler.java:115)
at org.eclipse.jetty.server.session.SessionHandler.doStart(SessionHandler.java:106)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69)
at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:118)
at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:100)
at org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:60)
at org.eclipse.jetty.server.handler.ScopedHandler.doStart(ScopedHandler.java:115)
at org.eclipse.jetty.server.handler.ContextHandler.startContext(ContextHandler.java:773)
at org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:284)
at org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1322)
at org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:732)
at org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:490)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69)
at org.eclipse.jetty.deploy.bindings.StandardStarter.processBinding(StandardStarter.java:41)
at org.eclipse.jetty.deploy.AppLifeCycle.runBindings(AppLifeCycle.java:186)
at org.eclipse.jetty.deploy.DeploymentManager.requestAppGoal(DeploymentManager.java:495)
at org.eclipse.jetty.deploy.DeploymentManager.addApp(DeploymentManager.java:146)
at org.eclipse.jetty.deploy.providers.ScanningAppProvider.fileAdded(ScanningAppProvider.java:175)
at org.eclipse.jetty.deploy.providers.ScanningAppProvider$1.fileAdded(ScanningAppProvider.java:64)
at org.eclipse.jetty.util.Scanner.reportAddition(Scanner.java:605)
at org.eclipse.jetty.util.Scanner.reportDifferences(Scanner.java:528)
at org.eclipse.jetty.util.Scanner.scan(Scanner.java:391)
at org.eclipse.jetty.util.Scanner.doStart(Scanner.java:313)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69)
at org.eclipse.jetty.deploy.providers.ScanningAppProvider.doStart(ScanningAppProvider.java:145)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69)
at org.eclipse.jetty.deploy.DeploymentManager.startAppProvider(DeploymentManager.java:557)
at org.eclipse.jetty.deploy.DeploymentManager.doStart(DeploymentManager.java:232)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69)
at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:118)
at org.eclipse.jetty.server.Server.start(Server.java:342)
at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:100)
Possible solution, at least does it work in my case:
Disabling the login-config section in the web.xml which is in the sample
project.
```
Original issue reported on code.google.com by `phillip....@gmail.com` on 18 Nov 2013 at 1:14
|
1.0
|
Sample Project hibernate-maven-web does nut run under jetty (?) - ```
What did I do?
checkout out the project
build it via "mvn clean install"
deployed *.war on a local jetty server (jetty version: 9.0.7)
caused this Exception:
2013-11-18 14:06:11.604:INFO:oejdp.ScanningAppProvider:main: Deployment monitor
[file:/opt/jetty-distribution-9.0.7.v
20131107/webapps/] at interval 1
2013-11-18 14:06:14.212:WARN:oejuc.AbstractLifeCycle:main: FAILED
org.eclipse.jetty.security.ConstraintSecurityHandle
r@6d20c359: java.lang.IllegalStateException: No LoginService for
org.eclipse.jetty.security.authentication.BasicAuthe
nticator@300c2443 in
org.eclipse.jetty.security.ConstraintSecurityHandler@6d20c359
java.lang.IllegalStateException: No LoginService for
org.eclipse.jetty.security.authentication.BasicAuthenticator@300
c2443 in org.eclipse.jetty.security.ConstraintSecurityHandler@6d20c359
at org.eclipse.jetty.security.authentication.LoginAuthenticator.setConfiguration(LoginAuthenticator.java:67)
at org.eclipse.jetty.security.SecurityHandler.doStart(SecurityHandler.java:375)
at org.eclipse.jetty.security.ConstraintSecurityHandler.doStart(ConstraintSecurityHandler.java:457)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69)
at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:118)
at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:100)
at org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:60)
at org.eclipse.jetty.server.handler.ScopedHandler.doStart(ScopedHandler.java:115)
at org.eclipse.jetty.server.session.SessionHandler.doStart(SessionHandler.java:106)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69)
at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:118)
at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:100)
at org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:60)
at org.eclipse.jetty.server.handler.ScopedHandler.doStart(ScopedHandler.java:115)
at org.eclipse.jetty.server.handler.ContextHandler.startContext(ContextHandler.java:773)
at org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:284)
at org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1322)
at org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:732)
at org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:490)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69)
at org.eclipse.jetty.deploy.bindings.StandardStarter.processBinding(StandardStarter.java:41)
at org.eclipse.jetty.deploy.AppLifeCycle.runBindings(AppLifeCycle.java:186)
at org.eclipse.jetty.deploy.DeploymentManager.requestAppGoal(DeploymentManager.java:495)
at org.eclipse.jetty.deploy.DeploymentManager.addApp(DeploymentManager.java:146)
at org.eclipse.jetty.deploy.providers.ScanningAppProvider.fileAdded(ScanningAppProvider.java:175)
at org.eclipse.jetty.deploy.providers.ScanningAppProvider$1.fileAdded(ScanningAppProvider.java:64)
at org.eclipse.jetty.util.Scanner.reportAddition(Scanner.java:605)
at org.eclipse.jetty.util.Scanner.reportDifferences(Scanner.java:528)
at org.eclipse.jetty.util.Scanner.scan(Scanner.java:391)
at org.eclipse.jetty.util.Scanner.doStart(Scanner.java:313)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69)
at org.eclipse.jetty.deploy.providers.ScanningAppProvider.doStart(ScanningAppProvider.java:145)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69)
at org.eclipse.jetty.deploy.DeploymentManager.startAppProvider(DeploymentManager.java:557)
at org.eclipse.jetty.deploy.DeploymentManager.doStart(DeploymentManager.java:232)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:69)
at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:118)
at org.eclipse.jetty.server.Server.start(Server.java:342)
at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:100)
Possible solution, at least does it work in my case:
Disabling the login-config section in the web.xml which is in the sample
project.
```
Original issue reported on code.google.com by `phillip....@gmail.com` on 18 Nov 2013 at 1:14
|
defect
|
sample project hibernate maven web does nut run under jetty what did i do checkout out the project build it via mvn clean install deployed war on a local jetty server jetty version caused this exception info oejdp scanningappprovider main deployment monitor file opt jetty distribution v webapps at interval warn oejuc abstractlifecycle main failed org eclipse jetty security constraintsecurityhandle r java lang illegalstateexception no loginservice for org eclipse jetty security authentication basicauthe nticator in org eclipse jetty security constraintsecurityhandler java lang illegalstateexception no loginservice for org eclipse jetty security authentication basicauthenticator in org eclipse jetty security constraintsecurityhandler at org eclipse jetty security authentication loginauthenticator setconfiguration loginauthenticator java at org eclipse jetty security securityhandler dostart securityhandler java at org eclipse jetty security constraintsecurityhandler dostart constraintsecurityhandler java at org eclipse jetty util component abstractlifecycle start abstractlifecycle java at org eclipse jetty util component containerlifecycle start containerlifecycle java at org eclipse jetty util component containerlifecycle dostart containerlifecycle java at org eclipse jetty server handler abstracthandler dostart abstracthandler java at org eclipse jetty server handler scopedhandler dostart scopedhandler java at org eclipse jetty server session sessionhandler dostart sessionhandler java at org eclipse jetty util component abstractlifecycle start abstractlifecycle java at org eclipse jetty util component containerlifecycle start containerlifecycle java at org eclipse jetty util component containerlifecycle dostart containerlifecycle java at org eclipse jetty server handler abstracthandler dostart abstracthandler java at org eclipse jetty server handler scopedhandler dostart scopedhandler java at org eclipse jetty server handler contexthandler startcontext contexthandler java at org eclipse jetty servlet servletcontexthandler startcontext servletcontexthandler java at org eclipse jetty webapp webappcontext startcontext webappcontext java at org eclipse jetty server handler contexthandler dostart contexthandler java at org eclipse jetty webapp webappcontext dostart webappcontext java at org eclipse jetty util component abstractlifecycle start abstractlifecycle java at org eclipse jetty deploy bindings standardstarter processbinding standardstarter java at org eclipse jetty deploy applifecycle runbindings applifecycle java at org eclipse jetty deploy deploymentmanager requestappgoal deploymentmanager java at org eclipse jetty deploy deploymentmanager addapp deploymentmanager java at org eclipse jetty deploy providers scanningappprovider fileadded scanningappprovider java at org eclipse jetty deploy providers scanningappprovider fileadded scanningappprovider java at org eclipse jetty util scanner reportaddition scanner java at org eclipse jetty util scanner reportdifferences scanner java at org eclipse jetty util scanner scan scanner java at org eclipse jetty util scanner dostart scanner java at org eclipse jetty util component abstractlifecycle start abstractlifecycle java at org eclipse jetty deploy providers scanningappprovider dostart scanningappprovider java at org eclipse jetty util component abstractlifecycle start abstractlifecycle java at org eclipse jetty deploy deploymentmanager startappprovider deploymentmanager java at org eclipse jetty deploy deploymentmanager dostart deploymentmanager java at org eclipse jetty util component abstractlifecycle start abstractlifecycle java at org eclipse jetty util component containerlifecycle start containerlifecycle java at org eclipse jetty server server start server java at org eclipse jetty util component containerlifecycle dostart containerlifecycle java possible solution at least does it work in my case disabling the login config section in the web xml which is in the sample project original issue reported on code google com by phillip gmail com on nov at
| 1
|
22,387
| 3,642,228,491
|
IssuesEvent
|
2016-02-14 06:05:03
|
BOINC/boinc
|
https://api.github.com/repos/BOINC/boinc
|
closed
|
Installer Executable Copyright is outdated.
|
C: Client - Setup P: Trivial R: fixed T: Defect
|
**Reported by JacobKlein on 5 Aug 41245248 20:53 UTC**
If I right-click the Installer Executable in Windows, and go to the Details tab, and look at the "Copyright" property...
Version 6.10.58 says:[(C) 2004 University of California at
Version 6.12.19 says:[[BR]([BR]]Copyright)]Copyright (C) 2004 University of California at Berkeley. All Rights Reserved.
I'm betting they're different because of some string parsing fix in the 6.12 builds, but still, the copyright is not correct.
I expect to see the same copyright info that's located at Help -> About BOINC Manager... specifically:[[BR]](C) 2003-2011 University of California, Berkeley. All Rights Reserved.
''Can the installer copyright be updated?''
''Also, and more preferably, is there a way to link these so that the Copyright information is the same for Help -> About BOINC Manager.. and for the Installer?''
Migrated-From: http://boinc.berkeley.edu/trac/ticket/1060
|
1.0
|
Installer Executable Copyright is outdated. - **Reported by JacobKlein on 5 Aug 41245248 20:53 UTC**
If I right-click the Installer Executable in Windows, and go to the Details tab, and look at the "Copyright" property...
Version 6.10.58 says:[(C) 2004 University of California at
Version 6.12.19 says:[[BR]([BR]]Copyright)]Copyright (C) 2004 University of California at Berkeley. All Rights Reserved.
I'm betting they're different because of some string parsing fix in the 6.12 builds, but still, the copyright is not correct.
I expect to see the same copyright info that's located at Help -> About BOINC Manager... specifically:[[BR]](C) 2003-2011 University of California, Berkeley. All Rights Reserved.
''Can the installer copyright be updated?''
''Also, and more preferably, is there a way to link these so that the Copyright information is the same for Help -> About BOINC Manager.. and for the Installer?''
Migrated-From: http://boinc.berkeley.edu/trac/ticket/1060
|
defect
|
installer executable copyright is outdated reported by jacobklein on aug utc if i right click the installer executable in windows and go to the details tab and look at the copyright property version says c university of california at version says copyright copyright c university of california at berkeley all rights reserved i m betting they re different because of some string parsing fix in the builds but still the copyright is not correct i expect to see the same copyright info that s located at help about boinc manager specifically c university of california berkeley all rights reserved can the installer copyright be updated also and more preferably is there a way to link these so that the copyright information is the same for help about boinc manager and for the installer migrated from
| 1
|
781,567
| 27,442,234,168
|
IssuesEvent
|
2023-03-02 11:52:48
|
ballerina-platform/ballerina-lang
|
https://api.github.com/repos/ballerina-platform/ballerina-lang
|
closed
|
Issue in types set for variables created by the typed-binding-pattern of a foreach-stmt
|
Type/Bug Priority/High Team/CompilerFE Area/TypeChecker Lang/TypeNarrowing Lang/Statements/Foreach Deferred
|
**Description:**
$title.
**Steps to reproduce:**
The type set seems to be that inferred from the value being iterated, not the type used in the typed binding pattern.
```ballerina
public function main() {
string[] x = [];
foreach int|string item in x {
string s = item; // No error, eventhough item is of type `int|string`
float f = item; // incompatible types: expected 'float', found 'string'
// type seems to be set as `string`
}
}
```
**Affected Versions:**
1.2.0-m2
1.1.4
|
1.0
|
Issue in types set for variables created by the typed-binding-pattern of a foreach-stmt - **Description:**
$title.
**Steps to reproduce:**
The type set seems to be that inferred from the value being iterated, not the type used in the typed binding pattern.
```ballerina
public function main() {
string[] x = [];
foreach int|string item in x {
string s = item; // No error, eventhough item is of type `int|string`
float f = item; // incompatible types: expected 'float', found 'string'
// type seems to be set as `string`
}
}
```
**Affected Versions:**
1.2.0-m2
1.1.4
|
non_defect
|
issue in types set for variables created by the typed binding pattern of a foreach stmt description title steps to reproduce the type set seems to be that inferred from the value being iterated not the type used in the typed binding pattern ballerina public function main string x foreach int string item in x string s item no error eventhough item is of type int string float f item incompatible types expected float found string type seems to be set as string affected versions
| 0
|
20,667
| 3,393,082,723
|
IssuesEvent
|
2015-11-30 22:26:15
|
google/guava
|
https://api.github.com/repos/google/guava
|
closed
|
Wrong RemovalCause published on cache.invaldateAll()
|
package: cache status: accepted type: defect
|
When the cache is being cleared, either through `Cache.invalidateAll()` or `asMap().clear()`, the removal cause is always `EXPLICIT`. However the map may contain expired or GC'd entries that would be removed on the next maintenance cycle. The removal cause should indicate the actual state of the entry, not merely the action that triggered the eventual removal.
Due to weak and soft references the key or value may be null. A listener should only expect to receive a null key or value if the cause is `COLLECTED`, as indicated by `RemovalNotification`:
>The key and/or value may be null if they were already garbage collected.
Therefore a listener might decide to inspect the properties without a null guard, leading to an NPE.
```java
@Test
public void clear_expireAfterAccess() {
FakeTicker ticker = new FakeTicker();
RemovalListener<Integer, Integer> listener = Mockito.mock(RemovalListener.class);
ArgumentCaptor<RemovalNotification<Integer, Integer>> captor =
ArgumentCaptor.forClass(RemovalNotification.class);
Cache<Integer, Integer> cache = CacheBuilder.newBuilder()
.expireAfterAccess(1, TimeUnit.MINUTES)
.removalListener(listener)
.ticker(ticker)
.build();
cache.put(1, 1);
ticker.advance(10, TimeUnit.MINUTES);
cache.invalidateAll();
verify(listener).onRemoval(captor.capture());
assertThat(captor.getValue().getCause(), is(RemovalCause.EXPIRED));
}
```
The fix is to change `LocalCache$Segment#clear()` to inspect the key, value, and expiration status when determining the cause.
Unfortunately this race condition is more widespread due to `enqueueNotification` not being tolerant to a garbage collection nulling out the key/value. Prior to constructing the notification, the method must take a strong reference to the key and value, check if either was collected, and if so publish a `COLLECTED` instead of the caller's cause.
|
1.0
|
Wrong RemovalCause published on cache.invaldateAll() - When the cache is being cleared, either through `Cache.invalidateAll()` or `asMap().clear()`, the removal cause is always `EXPLICIT`. However the map may contain expired or GC'd entries that would be removed on the next maintenance cycle. The removal cause should indicate the actual state of the entry, not merely the action that triggered the eventual removal.
Due to weak and soft references the key or value may be null. A listener should only expect to receive a null key or value if the cause is `COLLECTED`, as indicated by `RemovalNotification`:
>The key and/or value may be null if they were already garbage collected.
Therefore a listener might decide to inspect the properties without a null guard, leading to an NPE.
```java
@Test
public void clear_expireAfterAccess() {
FakeTicker ticker = new FakeTicker();
RemovalListener<Integer, Integer> listener = Mockito.mock(RemovalListener.class);
ArgumentCaptor<RemovalNotification<Integer, Integer>> captor =
ArgumentCaptor.forClass(RemovalNotification.class);
Cache<Integer, Integer> cache = CacheBuilder.newBuilder()
.expireAfterAccess(1, TimeUnit.MINUTES)
.removalListener(listener)
.ticker(ticker)
.build();
cache.put(1, 1);
ticker.advance(10, TimeUnit.MINUTES);
cache.invalidateAll();
verify(listener).onRemoval(captor.capture());
assertThat(captor.getValue().getCause(), is(RemovalCause.EXPIRED));
}
```
The fix is to change `LocalCache$Segment#clear()` to inspect the key, value, and expiration status when determining the cause.
Unfortunately this race condition is more widespread due to `enqueueNotification` not being tolerant to a garbage collection nulling out the key/value. Prior to constructing the notification, the method must take a strong reference to the key and value, check if either was collected, and if so publish a `COLLECTED` instead of the caller's cause.
|
defect
|
wrong removalcause published on cache invaldateall when the cache is being cleared either through cache invalidateall or asmap clear the removal cause is always explicit however the map may contain expired or gc d entries that would be removed on the next maintenance cycle the removal cause should indicate the actual state of the entry not merely the action that triggered the eventual removal due to weak and soft references the key or value may be null a listener should only expect to receive a null key or value if the cause is collected as indicated by removalnotification the key and or value may be null if they were already garbage collected therefore a listener might decide to inspect the properties without a null guard leading to an npe java test public void clear expireafteraccess faketicker ticker new faketicker removallistener listener mockito mock removallistener class argumentcaptor captor argumentcaptor forclass removalnotification class cache cache cachebuilder newbuilder expireafteraccess timeunit minutes removallistener listener ticker ticker build cache put ticker advance timeunit minutes cache invalidateall verify listener onremoval captor capture assertthat captor getvalue getcause is removalcause expired the fix is to change localcache segment clear to inspect the key value and expiration status when determining the cause unfortunately this race condition is more widespread due to enqueuenotification not being tolerant to a garbage collection nulling out the key value prior to constructing the notification the method must take a strong reference to the key and value check if either was collected and if so publish a collected instead of the caller s cause
| 1
|
407,895
| 11,938,930,721
|
IssuesEvent
|
2020-04-02 14:29:54
|
fecgov/fec-eregs
|
https://api.github.com/repos/fecgov/fec-eregs
|
closed
|
Fix failing build
|
Bug High priority
|
https://circleci.com/gh/fecgov/fec-eregs/284
```
> fec-eregs@1.0.0 build /home/circleci/repo
> grunt build:css && npm run build-js
/home/circleci/repo/node_modules/mkdirp/lib/opts-arg.js:7
opts = { mode: 0o777 & (~process.umask()), fs, ...opts }
^^^
SyntaxError: Unexpected token ...
at Object.exports.runInThisContext (vm.js:76:16)
at Module._compile (module.js:542:28)
at Object.Module._extensions..js (module.js:579:10)
at Module.load (/home/circleci/repo/node_modules/coffeescript/lib/coffee-script/register.js:45:36)
at tryModuleLoad (module.js:446:12)
at Function.Module._load (module.js:438:3)
at Module.require (module.js:497:17)
at require (internal/module.js:20:19)
at Object.<anonymous> (/home/circleci/repo/node_modules/mkdirp/index.js:1:79)
at Module._compile (module.js:570:32)
at Object.Module._extensions..js (module.js:579:10)
at Module.load (/home/circleci/repo/node_modules/coffeescript/lib/coffee-script/register.js:45:36)
at tryModuleLoad (module.js:446:12)
at Function.Module._load (module.js:438:3)
at Module.require (module.js:497:17)
at require (internal/module.js:20:19)
at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/lib/grunt/file.js:20:31)
at Module._compile (module.js:570:32)
at Object.Module._extensions..js (module.js:579:10)
at Module.load (/home/circleci/repo/node_modules/coffeescript/lib/coffee-script/register.js:45:36)
at tryModuleLoad (module.js:446:12)
at Function.Module._load (module.js:438:3)
at Module.require (module.js:497:17)
at require (internal/module.js:20:19)
at gRequire (/home/circleci/repo/node_modules/grunt/lib/grunt.js:14:24)
at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/lib/grunt.js:28:1)
at Module._compile (module.js:570:32)
at Object.Module._extensions..js (module.js:579:10)
at Module.load (module.js:487:32)
at tryModuleLoad (module.js:446:12)
at Function.Module._load (module.js:438:3)
at Module.require (module.js:497:17)
at require (internal/module.js:20:19)
at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/node_modules/grunt-cli/bin/grunt:44:1)
at Module._compile (module.js:570:32)
at Object.Module._extensions..js (module.js:579:10)
at Module.load (module.js:487:32)
at tryModuleLoad (module.js:446:12)
at Function.Module._load (module.js:438:3)
at Module.require (module.js:497:17)
at require (internal/module.js:20:19)
at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/bin/grunt:3:1)
at Module._compile (module.js:570:32)
at Object.Module._extensions..js (module.js:579:10)
at Module.load (module.js:487:32)
at tryModuleLoad (module.js:446:12)
at Function.Module._load (module.js:438:3)
at Module.runMain (module.js:604:10)
at run (bootstrap_node.js:394:7)
at startup (bootstrap_node.js:149:9)
at bootstrap_node.js:509:3
npm ERR! Linux 4.15.0-1052-aws
npm ERR! argv "/home/circleci/.nvm/versions/node/v6.9.2/bin/node" "/home/circleci/.nvm/versions/node/v6.9.2/bin/npm" "run" "build"
npm ERR! node v6.9.2
npm ERR! npm v3.10.9
npm ERR! code ELIFECYCLE
npm ERR! fec-eregs@1.0.0 build: `grunt build:css && npm run build-js`
npm ERR! Exit status 1
npm ERR!
npm ERR! Failed at the fec-eregs@1.0.0 build script 'grunt build:css && npm run build-js'.
npm ERR! Make sure you have the latest version of node.js and npm installed.
npm ERR! If you do, this is most likely a problem with the fec-eregs package,
npm ERR! not with npm itself.
npm ERR! Tell the author that this fails on your system:
npm ERR! grunt build:css && npm run build-js
npm ERR! You can get information on how to open an issue for this project with:
npm ERR! npm bugs fec-eregs
npm ERR! Or if that isn't available, you can get their info via:
npm ERR! npm owner ls fec-eregs
npm ERR! There is likely additional logging output above.
npm ERR! Please include the following file with any support request:
npm ERR! /home/circleci/repo/npm-debug.log
Exited with code exit status 1
```
|
1.0
|
Fix failing build - https://circleci.com/gh/fecgov/fec-eregs/284
```
> fec-eregs@1.0.0 build /home/circleci/repo
> grunt build:css && npm run build-js
/home/circleci/repo/node_modules/mkdirp/lib/opts-arg.js:7
opts = { mode: 0o777 & (~process.umask()), fs, ...opts }
^^^
SyntaxError: Unexpected token ...
at Object.exports.runInThisContext (vm.js:76:16)
at Module._compile (module.js:542:28)
at Object.Module._extensions..js (module.js:579:10)
at Module.load (/home/circleci/repo/node_modules/coffeescript/lib/coffee-script/register.js:45:36)
at tryModuleLoad (module.js:446:12)
at Function.Module._load (module.js:438:3)
at Module.require (module.js:497:17)
at require (internal/module.js:20:19)
at Object.<anonymous> (/home/circleci/repo/node_modules/mkdirp/index.js:1:79)
at Module._compile (module.js:570:32)
at Object.Module._extensions..js (module.js:579:10)
at Module.load (/home/circleci/repo/node_modules/coffeescript/lib/coffee-script/register.js:45:36)
at tryModuleLoad (module.js:446:12)
at Function.Module._load (module.js:438:3)
at Module.require (module.js:497:17)
at require (internal/module.js:20:19)
at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/lib/grunt/file.js:20:31)
at Module._compile (module.js:570:32)
at Object.Module._extensions..js (module.js:579:10)
at Module.load (/home/circleci/repo/node_modules/coffeescript/lib/coffee-script/register.js:45:36)
at tryModuleLoad (module.js:446:12)
at Function.Module._load (module.js:438:3)
at Module.require (module.js:497:17)
at require (internal/module.js:20:19)
at gRequire (/home/circleci/repo/node_modules/grunt/lib/grunt.js:14:24)
at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/lib/grunt.js:28:1)
at Module._compile (module.js:570:32)
at Object.Module._extensions..js (module.js:579:10)
at Module.load (module.js:487:32)
at tryModuleLoad (module.js:446:12)
at Function.Module._load (module.js:438:3)
at Module.require (module.js:497:17)
at require (internal/module.js:20:19)
at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/node_modules/grunt-cli/bin/grunt:44:1)
at Module._compile (module.js:570:32)
at Object.Module._extensions..js (module.js:579:10)
at Module.load (module.js:487:32)
at tryModuleLoad (module.js:446:12)
at Function.Module._load (module.js:438:3)
at Module.require (module.js:497:17)
at require (internal/module.js:20:19)
at Object.<anonymous> (/home/circleci/repo/node_modules/grunt/bin/grunt:3:1)
at Module._compile (module.js:570:32)
at Object.Module._extensions..js (module.js:579:10)
at Module.load (module.js:487:32)
at tryModuleLoad (module.js:446:12)
at Function.Module._load (module.js:438:3)
at Module.runMain (module.js:604:10)
at run (bootstrap_node.js:394:7)
at startup (bootstrap_node.js:149:9)
at bootstrap_node.js:509:3
npm ERR! Linux 4.15.0-1052-aws
npm ERR! argv "/home/circleci/.nvm/versions/node/v6.9.2/bin/node" "/home/circleci/.nvm/versions/node/v6.9.2/bin/npm" "run" "build"
npm ERR! node v6.9.2
npm ERR! npm v3.10.9
npm ERR! code ELIFECYCLE
npm ERR! fec-eregs@1.0.0 build: `grunt build:css && npm run build-js`
npm ERR! Exit status 1
npm ERR!
npm ERR! Failed at the fec-eregs@1.0.0 build script 'grunt build:css && npm run build-js'.
npm ERR! Make sure you have the latest version of node.js and npm installed.
npm ERR! If you do, this is most likely a problem with the fec-eregs package,
npm ERR! not with npm itself.
npm ERR! Tell the author that this fails on your system:
npm ERR! grunt build:css && npm run build-js
npm ERR! You can get information on how to open an issue for this project with:
npm ERR! npm bugs fec-eregs
npm ERR! Or if that isn't available, you can get their info via:
npm ERR! npm owner ls fec-eregs
npm ERR! There is likely additional logging output above.
npm ERR! Please include the following file with any support request:
npm ERR! /home/circleci/repo/npm-debug.log
Exited with code exit status 1
```
|
non_defect
|
fix failing build fec eregs build home circleci repo grunt build css npm run build js home circleci repo node modules mkdirp lib opts arg js opts mode process umask fs opts syntaxerror unexpected token at object exports runinthiscontext vm js at module compile module js at object module extensions js module js at module load home circleci repo node modules coffeescript lib coffee script register js at trymoduleload module js at function module load module js at module require module js at require internal module js at object home circleci repo node modules mkdirp index js at module compile module js at object module extensions js module js at module load home circleci repo node modules coffeescript lib coffee script register js at trymoduleload module js at function module load module js at module require module js at require internal module js at object home circleci repo node modules grunt lib grunt file js at module compile module js at object module extensions js module js at module load home circleci repo node modules coffeescript lib coffee script register js at trymoduleload module js at function module load module js at module require module js at require internal module js at grequire home circleci repo node modules grunt lib grunt js at object home circleci repo node modules grunt lib grunt js at module compile module js at object module extensions js module js at module load module js at trymoduleload module js at function module load module js at module require module js at require internal module js at object home circleci repo node modules grunt node modules grunt cli bin grunt at module compile module js at object module extensions js module js at module load module js at trymoduleload module js at function module load module js at module require module js at require internal module js at object home circleci repo node modules grunt bin grunt at module compile module js at object module extensions js module js at module load module js at trymoduleload module js at function module load module js at module runmain module js at run bootstrap node js at startup bootstrap node js at bootstrap node js npm err linux aws npm err argv home circleci nvm versions node bin node home circleci nvm versions node bin npm run build npm err node npm err npm npm err code elifecycle npm err fec eregs build grunt build css npm run build js npm err exit status npm err npm err failed at the fec eregs build script grunt build css npm run build js npm err make sure you have the latest version of node js and npm installed npm err if you do this is most likely a problem with the fec eregs package npm err not with npm itself npm err tell the author that this fails on your system npm err grunt build css npm run build js npm err you can get information on how to open an issue for this project with npm err npm bugs fec eregs npm err or if that isn t available you can get their info via npm err npm owner ls fec eregs npm err there is likely additional logging output above npm err please include the following file with any support request npm err home circleci repo npm debug log exited with code exit status
| 0
|
70,501
| 3,331,494,216
|
IssuesEvent
|
2015-11-11 16:04:52
|
CoderDojo/community-platform
|
https://api.github.com/repos/CoderDojo/community-platform
|
opened
|
Add field to edit Dojo page to display frequency of how often Dojo typically runs
|
backlog dojo listings high priority
|
Request from Foundation team to add a field called "Frequency Dojo runs" with three options: weekly, biweekly and monthly. This will let users know how often a Dojo runs and in the long term we'll be able to search and filter by this option.
Will be a required field.
|
1.0
|
Add field to edit Dojo page to display frequency of how often Dojo typically runs - Request from Foundation team to add a field called "Frequency Dojo runs" with three options: weekly, biweekly and monthly. This will let users know how often a Dojo runs and in the long term we'll be able to search and filter by this option.
Will be a required field.
|
non_defect
|
add field to edit dojo page to display frequency of how often dojo typically runs request from foundation team to add a field called frequency dojo runs with three options weekly biweekly and monthly this will let users know how often a dojo runs and in the long term we ll be able to search and filter by this option will be a required field
| 0
|
63,128
| 17,387,781,958
|
IssuesEvent
|
2021-08-02 00:00:20
|
unascribed/Fabrication
|
https://api.github.com/repos/unascribed/Fabrication
|
closed
|
Error upon connection to the Hypixel Server Network.
|
k: Defect n: Fabric
|
This error seems to only occur when connecting to Hypixel, and it seems that the same error occurs several times in a row. One of these several error instances has been copied into [this gist](https://gist.github.com/torzod/ac6dff77448b53b8c7418f299b90b4e4), as the others are identical. It's curious that ☃ is used but I know very little about Java, it's possible this is maybe a placeholder?
|
1.0
|
Error upon connection to the Hypixel Server Network. - This error seems to only occur when connecting to Hypixel, and it seems that the same error occurs several times in a row. One of these several error instances has been copied into [this gist](https://gist.github.com/torzod/ac6dff77448b53b8c7418f299b90b4e4), as the others are identical. It's curious that ☃ is used but I know very little about Java, it's possible this is maybe a placeholder?
|
defect
|
error upon connection to the hypixel server network this error seems to only occur when connecting to hypixel and it seems that the same error occurs several times in a row one of these several error instances has been copied into as the others are identical it s curious that ☃ is used but i know very little about java it s possible this is maybe a placeholder
| 1
|
179,868
| 21,582,882,863
|
IssuesEvent
|
2022-05-02 20:47:03
|
uniquelyparticular/sync-moltin-to-shipengine
|
https://api.github.com/repos/uniquelyparticular/sync-moltin-to-shipengine
|
closed
|
CVE-2021-3777 (High) detected in tmpl-1.0.4.tgz - autoclosed
|
security vulnerability
|
## CVE-2021-3777 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tmpl-1.0.4.tgz</b></p></summary>
<p>JavaScript micro templates.</p>
<p>Library home page: <a href="https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz">https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/tmpl/package.json</p>
<p>
Dependency Hierarchy:
- jest-24.9.0.tgz (Root Library)
- jest-cli-24.9.0.tgz
- core-24.9.0.tgz
- jest-haste-map-24.9.0.tgz
- walker-1.0.7.tgz
- makeerror-1.0.11.tgz
- :x: **tmpl-1.0.4.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uniquelyparticular/sync-moltin-to-shipengine/commit/ec6fedd3023074a58c607fc8a2d1e04a4e2ab9c7">ec6fedd3023074a58c607fc8a2d1e04a4e2ab9c7</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3777>CVE-2021-3777</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/daaku/nodejs-tmpl/releases/tag/v1.0.5">https://github.com/daaku/nodejs-tmpl/releases/tag/v1.0.5</a></p>
<p>Release Date: 2021-09-15</p>
<p>Fix Resolution (tmpl): 1.0.5</p>
<p>Direct dependency fix Resolution (jest): 25.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2021-3777 (High) detected in tmpl-1.0.4.tgz - autoclosed - ## CVE-2021-3777 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tmpl-1.0.4.tgz</b></p></summary>
<p>JavaScript micro templates.</p>
<p>Library home page: <a href="https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz">https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/tmpl/package.json</p>
<p>
Dependency Hierarchy:
- jest-24.9.0.tgz (Root Library)
- jest-cli-24.9.0.tgz
- core-24.9.0.tgz
- jest-haste-map-24.9.0.tgz
- walker-1.0.7.tgz
- makeerror-1.0.11.tgz
- :x: **tmpl-1.0.4.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/uniquelyparticular/sync-moltin-to-shipengine/commit/ec6fedd3023074a58c607fc8a2d1e04a4e2ab9c7">ec6fedd3023074a58c607fc8a2d1e04a4e2ab9c7</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3777>CVE-2021-3777</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/daaku/nodejs-tmpl/releases/tag/v1.0.5">https://github.com/daaku/nodejs-tmpl/releases/tag/v1.0.5</a></p>
<p>Release Date: 2021-09-15</p>
<p>Fix Resolution (tmpl): 1.0.5</p>
<p>Direct dependency fix Resolution (jest): 25.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve high detected in tmpl tgz autoclosed cve high severity vulnerability vulnerable library tmpl tgz javascript micro templates library home page a href path to dependency file package json path to vulnerable library node modules tmpl package json dependency hierarchy jest tgz root library jest cli tgz core tgz jest haste map tgz walker tgz makeerror tgz x tmpl tgz vulnerable library found in head commit a href found in base branch master vulnerability details nodejs tmpl is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tmpl direct dependency fix resolution jest step up your open source security game with whitesource
| 0
|
139,591
| 11,274,491,591
|
IssuesEvent
|
2020-01-14 18:41:12
|
aliasrobotics/RVD
|
https://api.github.com/repos/aliasrobotics/RVD
|
opened
|
(error) Buffer is accessed out of bounds
|
bug cppcheck static analysis testing triage
|
```yaml
{
"id": 1,
"cve": "None",
"description": "[src/industrial_calibration/industrial_extrinsic_cal/src/nodes/stereo_cal_srv.cpp:301]: (error) Buffer is accessed out of bounds: image_scene_chars",
"system": "src/industrial_calibration/industrial_extrinsic_cal/src/nodes/stereo_cal_srv.cpp",
"title": "(error) Buffer is accessed out of bounds",
"severity": {
"severity-description": "",
"cvss-score": 0,
"rvss-vector": "",
"rvss-score": 0,
"cvss-vector": ""
},
"vendor": null,
"exploitation": {
"exploitation-image": "",
"exploitation-vector": "",
"description": ""
},
"type": "bug",
"mitigation": {
"date-mitigation": "",
"pull-request": "",
"description": ""
},
"links": "",
"keywords": [
"cppcheck",
"static analysis",
"testing",
"triage",
"bug"
],
"cwe": "None",
"flaw": {
"application": "N/A",
"phase": "testing",
"languages": "None",
"reproduction": "See artifacts below (if available)",
"specificity": "N/A",
"date-detected": "2020-01-14 (18:41)",
"architectural-location": "N/A",
"subsystem": "N/A",
"reproduction-image": "gitlab.com/aliasrobotics/offensive/alurity/pipelines/active/pipeline_ros_industrial/-/jobs/402982901/artifacts/download",
"date-reported": "2020-01-14 (18:41)",
"reproducibility": "always",
"detected-by-method": "testing static",
"reported-by-relationship": "automatic",
"trace": "",
"reported-by": "Alias Robotics",
"issue": "",
"package": "N/A",
"detected-by": "Alias Robotics"
}
}
```
|
1.0
|
(error) Buffer is accessed out of bounds - ```yaml
{
"id": 1,
"cve": "None",
"description": "[src/industrial_calibration/industrial_extrinsic_cal/src/nodes/stereo_cal_srv.cpp:301]: (error) Buffer is accessed out of bounds: image_scene_chars",
"system": "src/industrial_calibration/industrial_extrinsic_cal/src/nodes/stereo_cal_srv.cpp",
"title": "(error) Buffer is accessed out of bounds",
"severity": {
"severity-description": "",
"cvss-score": 0,
"rvss-vector": "",
"rvss-score": 0,
"cvss-vector": ""
},
"vendor": null,
"exploitation": {
"exploitation-image": "",
"exploitation-vector": "",
"description": ""
},
"type": "bug",
"mitigation": {
"date-mitigation": "",
"pull-request": "",
"description": ""
},
"links": "",
"keywords": [
"cppcheck",
"static analysis",
"testing",
"triage",
"bug"
],
"cwe": "None",
"flaw": {
"application": "N/A",
"phase": "testing",
"languages": "None",
"reproduction": "See artifacts below (if available)",
"specificity": "N/A",
"date-detected": "2020-01-14 (18:41)",
"architectural-location": "N/A",
"subsystem": "N/A",
"reproduction-image": "gitlab.com/aliasrobotics/offensive/alurity/pipelines/active/pipeline_ros_industrial/-/jobs/402982901/artifacts/download",
"date-reported": "2020-01-14 (18:41)",
"reproducibility": "always",
"detected-by-method": "testing static",
"reported-by-relationship": "automatic",
"trace": "",
"reported-by": "Alias Robotics",
"issue": "",
"package": "N/A",
"detected-by": "Alias Robotics"
}
}
```
|
non_defect
|
error buffer is accessed out of bounds yaml id cve none description error buffer is accessed out of bounds image scene chars system src industrial calibration industrial extrinsic cal src nodes stereo cal srv cpp title error buffer is accessed out of bounds severity severity description cvss score rvss vector rvss score cvss vector vendor null exploitation exploitation image exploitation vector description type bug mitigation date mitigation pull request description links keywords cppcheck static analysis testing triage bug cwe none flaw application n a phase testing languages none reproduction see artifacts below if available specificity n a date detected architectural location n a subsystem n a reproduction image gitlab com aliasrobotics offensive alurity pipelines active pipeline ros industrial jobs artifacts download date reported reproducibility always detected by method testing static reported by relationship automatic trace reported by alias robotics issue package n a detected by alias robotics
| 0
|
25,186
| 4,233,539,414
|
IssuesEvent
|
2016-07-05 08:20:53
|
arkayenro/arkinventory
|
https://api.github.com/repos/arkayenro/arkinventory
|
closed
|
Exporting (CP/GP) issues - was working before
|
auto-migrated Priority-Medium Type-Defect
|
```
What steps will reproduce the problem?
1. Using latest : ArkInventory-2-27-05-2008-05-06-17-30.zip
2. No other addons ons loaded, only ArkInventory, CharacterProfiler &
GuildProfiler (see below).
3. Clean WTF/ACCOUNT/Name/SavedVariables directory on start.
What is the expected output? What do you see instead?
I'm also using these (very known ?!!) addons : Characterprofiler and
GuildProfiler from http://www.rpgoutfitter.com
(/Addons/CharacterProfiler.cfm). I need these addons to 'feed' my roster
(from WoWroster).
Only THESE addons are loaded to show the issue.
These two addon together produce a file, called CP.lua, that Guild members
upload to the roster, to have something like this :
http://www.papy-team.fr/roster
The issue is : Guild Vault Items (and logs & Money) isn't exported anymore
if ArkInventory is used (loaded). Deactivating it doesn't help; have to
restart WoW without Ark to make things work.
When Ark is used, the Tab1 .... Tab6 pages in the CP.lua aren't updated
anymore.
What version of the product are you using? On what operating system?
Yours : latest (the version before had the same issue, the one before that
WORKED !! - you guys just started to work on Vault part of the software,
right ;-)) )
WoW : Latest ;-)
OS : XP Pro - Home or Vista - or even MAC, doesn't mather - the issues
stays the same.
Please provide any additional information below.
ArkInventory WAS working (means : exporting, or, more precise : "letting
export") the Vault items (& Money & Logs) before. The latest 2 version
don't let CP/GP doeing its work any more.
So, our Guild Vault in the roster isn't updated anymore.
Only one solution : disable Ark completly, do a complete char scan (and all
my private Guild bankers etc etc) so I have a complete CP file to update my
roster.
Because I'm using UniUpLoader, the Guild Vault will be wiped several times
a day - which isn't good at all.
NOT using ArkInventory isn't good neither ;-)
```
Original issue reported on code.google.com by `postmas...@papy-team.fr` on 12 May 2008 at 8:41
|
1.0
|
Exporting (CP/GP) issues - was working before - ```
What steps will reproduce the problem?
1. Using latest : ArkInventory-2-27-05-2008-05-06-17-30.zip
2. No other addons ons loaded, only ArkInventory, CharacterProfiler &
GuildProfiler (see below).
3. Clean WTF/ACCOUNT/Name/SavedVariables directory on start.
What is the expected output? What do you see instead?
I'm also using these (very known ?!!) addons : Characterprofiler and
GuildProfiler from http://www.rpgoutfitter.com
(/Addons/CharacterProfiler.cfm). I need these addons to 'feed' my roster
(from WoWroster).
Only THESE addons are loaded to show the issue.
These two addon together produce a file, called CP.lua, that Guild members
upload to the roster, to have something like this :
http://www.papy-team.fr/roster
The issue is : Guild Vault Items (and logs & Money) isn't exported anymore
if ArkInventory is used (loaded). Deactivating it doesn't help; have to
restart WoW without Ark to make things work.
When Ark is used, the Tab1 .... Tab6 pages in the CP.lua aren't updated
anymore.
What version of the product are you using? On what operating system?
Yours : latest (the version before had the same issue, the one before that
WORKED !! - you guys just started to work on Vault part of the software,
right ;-)) )
WoW : Latest ;-)
OS : XP Pro - Home or Vista - or even MAC, doesn't mather - the issues
stays the same.
Please provide any additional information below.
ArkInventory WAS working (means : exporting, or, more precise : "letting
export") the Vault items (& Money & Logs) before. The latest 2 version
don't let CP/GP doeing its work any more.
So, our Guild Vault in the roster isn't updated anymore.
Only one solution : disable Ark completly, do a complete char scan (and all
my private Guild bankers etc etc) so I have a complete CP file to update my
roster.
Because I'm using UniUpLoader, the Guild Vault will be wiped several times
a day - which isn't good at all.
NOT using ArkInventory isn't good neither ;-)
```
Original issue reported on code.google.com by `postmas...@papy-team.fr` on 12 May 2008 at 8:41
|
defect
|
exporting cp gp issues was working before what steps will reproduce the problem using latest arkinventory zip no other addons ons loaded only arkinventory characterprofiler guildprofiler see below clean wtf account name savedvariables directory on start what is the expected output what do you see instead i m also using these very known addons characterprofiler and guildprofiler from addons characterprofiler cfm i need these addons to feed my roster from wowroster only these addons are loaded to show the issue these two addon together produce a file called cp lua that guild members upload to the roster to have something like this the issue is guild vault items and logs money isn t exported anymore if arkinventory is used loaded deactivating it doesn t help have to restart wow without ark to make things work when ark is used the pages in the cp lua aren t updated anymore what version of the product are you using on what operating system yours latest the version before had the same issue the one before that worked you guys just started to work on vault part of the software right wow latest os xp pro home or vista or even mac doesn t mather the issues stays the same please provide any additional information below arkinventory was working means exporting or more precise letting export the vault items money logs before the latest version don t let cp gp doeing its work any more so our guild vault in the roster isn t updated anymore only one solution disable ark completly do a complete char scan and all my private guild bankers etc etc so i have a complete cp file to update my roster because i m using uniuploader the guild vault will be wiped several times a day which isn t good at all not using arkinventory isn t good neither original issue reported on code google com by postmas papy team fr on may at
| 1
|
100,988
| 16,490,732,729
|
IssuesEvent
|
2021-05-25 03:09:37
|
valdisiljuconoks/AlloyTech
|
https://api.github.com/repos/valdisiljuconoks/AlloyTech
|
opened
|
CVE-2020-7598 (Medium) detected in minimist-0.0.8.tgz
|
security vulnerability
|
## CVE-2020-7598 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>minimist-0.0.8.tgz</b></p></summary>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p>
<p>Path to dependency file: AlloyTech/AlloyTechEpi10/modules/_protected/Shell/Shell/10.1.0.0/ClientResources/lib/xstyle/package.json</p>
<p>Path to vulnerable library: AlloyTech/AlloyTechEpi10/modules/_protected/Shell/Shell/10.1.0.0/ClientResources/lib/xstyle/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- intern-geezer-2.2.3.tgz (Root Library)
- istanbul-0.2.16.tgz
- mkdirp-0.5.1.tgz
- :x: **minimist-0.0.8.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.
<p>Publish Date: 2020-03-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p>
<p>Release Date: 2020-03-11</p>
<p>Fix Resolution: minimist - 0.2.1,1.2.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2020-7598 (Medium) detected in minimist-0.0.8.tgz - ## CVE-2020-7598 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>minimist-0.0.8.tgz</b></p></summary>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p>
<p>Path to dependency file: AlloyTech/AlloyTechEpi10/modules/_protected/Shell/Shell/10.1.0.0/ClientResources/lib/xstyle/package.json</p>
<p>Path to vulnerable library: AlloyTech/AlloyTechEpi10/modules/_protected/Shell/Shell/10.1.0.0/ClientResources/lib/xstyle/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- intern-geezer-2.2.3.tgz (Root Library)
- istanbul-0.2.16.tgz
- mkdirp-0.5.1.tgz
- :x: **minimist-0.0.8.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.
<p>Publish Date: 2020-03-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p>
<p>Release Date: 2020-03-11</p>
<p>Fix Resolution: minimist - 0.2.1,1.2.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve medium detected in minimist tgz cve medium severity vulnerability vulnerable library minimist tgz parse argument options library home page a href path to dependency file alloytech modules protected shell shell clientresources lib xstyle package json path to vulnerable library alloytech modules protected shell shell clientresources lib xstyle node modules minimist package json dependency hierarchy intern geezer tgz root library istanbul tgz mkdirp tgz x minimist tgz vulnerable library vulnerability details minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution minimist step up your open source security game with whitesource
| 0
|
16,134
| 10,577,570,230
|
IssuesEvent
|
2019-10-07 20:24:37
|
kids-first/kf-ui-data-tracker
|
https://api.github.com/repos/kids-first/kf-ui-data-tracker
|
opened
|
always open Basic Info form in edit mode
|
usability improvement
|
feedback from `Admin` role users suggest to always open the Basic Info Form in edit mode as there is no use case for a read-only mode. This should alwasy show the Step progress indicators as well as form field descriptions
🤔 maybe also add a `Save` button where the `Edit`/`Cancel` button currently is
## Current Edit mode
<img width="1178" alt="Screen Shot 2019-10-07 at 4 23 29 PM" src="https://user-images.githubusercontent.com/1334131/66345852-de565000-e91e-11e9-8da4-fc9f3a282efc.png">
|
True
|
always open Basic Info form in edit mode - feedback from `Admin` role users suggest to always open the Basic Info Form in edit mode as there is no use case for a read-only mode. This should alwasy show the Step progress indicators as well as form field descriptions
🤔 maybe also add a `Save` button where the `Edit`/`Cancel` button currently is
## Current Edit mode
<img width="1178" alt="Screen Shot 2019-10-07 at 4 23 29 PM" src="https://user-images.githubusercontent.com/1334131/66345852-de565000-e91e-11e9-8da4-fc9f3a282efc.png">
|
non_defect
|
always open basic info form in edit mode feedback from admin role users suggest to always open the basic info form in edit mode as there is no use case for a read only mode this should alwasy show the step progress indicators as well as form field descriptions 🤔 maybe also add a save button where the edit cancel button currently is current edit mode img width alt screen shot at pm src
| 0
|
68,989
| 22,042,326,903
|
IssuesEvent
|
2022-05-29 14:46:35
|
SeleniumHQ/selenium
|
https://api.github.com/repos/SeleniumHQ/selenium
|
closed
|
[🐛 Bug]: unhandledPromptBehavior doesn't work
|
C-py I-defect needs-triaging
|
### What happened?
am using python 3.9.12 with pip 22.1.1
my localhost has an index.html file with only one line of code: `<script>alert("hi")</script>`
expected result is to have the above alert dissapear but it doesnt
### How can we reproduce the issue?
```shell
from selenium.webdriver import Chrome
from selenium.webdriver import ChromeOptions
from selenium.webdriver.chrome.service import Service
import time
options = ChromeOptions()
options.set_capability("unhandledPromptBehavior", "dismiss")
service = Service(executable_path="/usr/local/bin/chromedriver")
driver = Chrome(service=service,options=options)
driver.maximize_window()
driver.get("http://localhost:8888")
time.sleep(5)
driver.quit()
```
### Relevant log output
```shell
no output.
```
### Operating System
macos Montery 12.3.1
### Selenium version
4.1.5
### What are the browser(s) and version(s) where you see this issue?
chrome 101.0.4951.64 arm64
### What are the browser driver(s) and version(s) where you see this issue?
Chromedriver 101.0.4951.41
### Are you using Selenium Grid?
no
|
1.0
|
[🐛 Bug]: unhandledPromptBehavior doesn't work - ### What happened?
am using python 3.9.12 with pip 22.1.1
my localhost has an index.html file with only one line of code: `<script>alert("hi")</script>`
expected result is to have the above alert dissapear but it doesnt
### How can we reproduce the issue?
```shell
from selenium.webdriver import Chrome
from selenium.webdriver import ChromeOptions
from selenium.webdriver.chrome.service import Service
import time
options = ChromeOptions()
options.set_capability("unhandledPromptBehavior", "dismiss")
service = Service(executable_path="/usr/local/bin/chromedriver")
driver = Chrome(service=service,options=options)
driver.maximize_window()
driver.get("http://localhost:8888")
time.sleep(5)
driver.quit()
```
### Relevant log output
```shell
no output.
```
### Operating System
macos Montery 12.3.1
### Selenium version
4.1.5
### What are the browser(s) and version(s) where you see this issue?
chrome 101.0.4951.64 arm64
### What are the browser driver(s) and version(s) where you see this issue?
Chromedriver 101.0.4951.41
### Are you using Selenium Grid?
no
|
defect
|
unhandledpromptbehavior doesn t work what happened am using python with pip my localhost has an index html file with only one line of code alert hi expected result is to have the above alert dissapear but it doesnt how can we reproduce the issue shell from selenium webdriver import chrome from selenium webdriver import chromeoptions from selenium webdriver chrome service import service import time options chromeoptions options set capability unhandledpromptbehavior dismiss service service executable path usr local bin chromedriver driver chrome service service options options driver maximize window driver get time sleep driver quit relevant log output shell no output operating system macos montery selenium version what are the browser s and version s where you see this issue chrome what are the browser driver s and version s where you see this issue chromedriver are you using selenium grid no
| 1
|
10,177
| 2,618,940,260
|
IssuesEvent
|
2015-03-03 00:03:50
|
marmarek/test
|
https://api.github.com/repos/marmarek/test
|
closed
|
Correctly maintain app's titlebar name
|
C: gui-virtualization P: major R: fixed T: defect
|
**Reported by joanna on 20 Oct 40318706 17:46 UTC**
When an app changes its title bar contents, the appviewer ignores the change and keep the original name in the title bar. Some apps dynamically remap the title bar names at startup (e.g. Thunderbird, Dolphin), so it would be nice to have it correctly implemented, so that the user see something meaningful in the task bar.
|
1.0
|
Correctly maintain app's titlebar name - **Reported by joanna on 20 Oct 40318706 17:46 UTC**
When an app changes its title bar contents, the appviewer ignores the change and keep the original name in the title bar. Some apps dynamically remap the title bar names at startup (e.g. Thunderbird, Dolphin), so it would be nice to have it correctly implemented, so that the user see something meaningful in the task bar.
|
defect
|
correctly maintain app s titlebar name reported by joanna on oct utc when an app changes its title bar contents the appviewer ignores the change and keep the original name in the title bar some apps dynamically remap the title bar names at startup e g thunderbird dolphin so it would be nice to have it correctly implemented so that the user see something meaningful in the task bar
| 1
|
37,722
| 8,489,415,746
|
IssuesEvent
|
2018-10-26 19:50:32
|
MDAnalysis/mdanalysis
|
https://api.github.com/repos/MDAnalysis/mdanalysis
|
closed
|
Consistency: AtomGroup.residues = 0 ResidueGroup, further .atoms leads to ValueError
|
Component-Core Difficulty-easy defect usability
|
**Expected behavior**
```python
sel.select_atoms('resname SOL')
Out[3]: <AtomGroup with 0 atoms>
sel.select_atoms('resname SOL').residues
Out[4]: <ResidueGroup with 0 residues>
sel.select_atoms('resname SOL').residues.atoms
```
This should return again:<AtomGroup with 0 atoms>
**Actual behavior**
Unclear error:
```python
ValueError: need at least one array to concatenate
Traceback (most recent call last):
File "/usr/lib/python2.7/site-packages/IPython/core/interactiveshell.py", line 2878, in run_code
exec(code_obj, self.user_global_ns, self.user_ns)
File "<ipython-input-5-6c6c6b22c39a>", line 1, in <module>
sel.select_atoms('resname SOL').residues.atoms
File "/home/dresio/software/virtualenvs/charm-mda/lib/python2.7/site-packages/MDAnalysis/core/groups.py", line 2340, in atoms
return self.universe.atoms[np.concatenate(self.indices)]
ValueError: need at least one array to concatenate
```
**Code to reproduce the behavior**
```
u.select_atoms('resname NONE').residues.atoms
```
MDAnalysis 0.18.0
|
1.0
|
Consistency: AtomGroup.residues = 0 ResidueGroup, further .atoms leads to ValueError - **Expected behavior**
```python
sel.select_atoms('resname SOL')
Out[3]: <AtomGroup with 0 atoms>
sel.select_atoms('resname SOL').residues
Out[4]: <ResidueGroup with 0 residues>
sel.select_atoms('resname SOL').residues.atoms
```
This should return again:<AtomGroup with 0 atoms>
**Actual behavior**
Unclear error:
```python
ValueError: need at least one array to concatenate
Traceback (most recent call last):
File "/usr/lib/python2.7/site-packages/IPython/core/interactiveshell.py", line 2878, in run_code
exec(code_obj, self.user_global_ns, self.user_ns)
File "<ipython-input-5-6c6c6b22c39a>", line 1, in <module>
sel.select_atoms('resname SOL').residues.atoms
File "/home/dresio/software/virtualenvs/charm-mda/lib/python2.7/site-packages/MDAnalysis/core/groups.py", line 2340, in atoms
return self.universe.atoms[np.concatenate(self.indices)]
ValueError: need at least one array to concatenate
```
**Code to reproduce the behavior**
```
u.select_atoms('resname NONE').residues.atoms
```
MDAnalysis 0.18.0
|
defect
|
consistency atomgroup residues residuegroup further atoms leads to valueerror expected behavior python sel select atoms resname sol out sel select atoms resname sol residues out sel select atoms resname sol residues atoms this should return again actual behavior unclear error python valueerror need at least one array to concatenate traceback most recent call last file usr lib site packages ipython core interactiveshell py line in run code exec code obj self user global ns self user ns file line in sel select atoms resname sol residues atoms file home dresio software virtualenvs charm mda lib site packages mdanalysis core groups py line in atoms return self universe atoms valueerror need at least one array to concatenate code to reproduce the behavior u select atoms resname none residues atoms mdanalysis
| 1
|
437,614
| 30,605,412,975
|
IssuesEvent
|
2023-07-22 23:59:05
|
danielcshn/wpa-colab
|
https://api.github.com/repos/danielcshn/wpa-colab
|
closed
|
Colab updated limitations
|
documentation wontfix
|
Google has cracked down (pardon the pun) on password cracking - now they explicitly state in their usage policy that cracking (amongst other restrictions) is not allowed, and my account has been restricted access to Colab (but not other G products).
When you download and compile `hashcat` - they do give you a warning about running possibly restricted code and they may ban you for that, which I disregarded, so it is only fair.
Feel free to move to discussions, because it's not really an issue
|
1.0
|
Colab updated limitations - Google has cracked down (pardon the pun) on password cracking - now they explicitly state in their usage policy that cracking (amongst other restrictions) is not allowed, and my account has been restricted access to Colab (but not other G products).
When you download and compile `hashcat` - they do give you a warning about running possibly restricted code and they may ban you for that, which I disregarded, so it is only fair.
Feel free to move to discussions, because it's not really an issue
|
non_defect
|
colab updated limitations google has cracked down pardon the pun on password cracking now they explicitly state in their usage policy that cracking amongst other restrictions is not allowed and my account has been restricted access to colab but not other g products when you download and compile hashcat they do give you a warning about running possibly restricted code and they may ban you for that which i disregarded so it is only fair feel free to move to discussions because it s not really an issue
| 0
|
723,074
| 24,883,773,907
|
IssuesEvent
|
2022-10-28 05:21:23
|
lowRISC/opentitan
|
https://api.github.com/repos/lowRISC/opentitan
|
closed
|
[dv/pwrmgr] Disable coverage exclusions
|
Component:DV Priority:P2 Type:Task IP:pwrmgr Milestone:V2
|
Disable exclusions for CSR CONTROL.USB_CLK_EN_ACTIVE, RESET_EN in IP level.
|
1.0
|
[dv/pwrmgr] Disable coverage exclusions - Disable exclusions for CSR CONTROL.USB_CLK_EN_ACTIVE, RESET_EN in IP level.
|
non_defect
|
disable coverage exclusions disable exclusions for csr control usb clk en active reset en in ip level
| 0
|
675,423
| 23,093,898,846
|
IssuesEvent
|
2022-07-26 17:33:55
|
sczerwinski/wavefront-obj-intellij-plugin
|
https://api.github.com/repos/sczerwinski/wavefront-obj-intellij-plugin
|
opened
|
GLModelFactory should process the file, not the PSIFile
|
type:feature status:new priority:medium component:3d
|
Processing PSI tree is costly. Process file contents instead.
|
1.0
|
GLModelFactory should process the file, not the PSIFile - Processing PSI tree is costly. Process file contents instead.
|
non_defect
|
glmodelfactory should process the file not the psifile processing psi tree is costly process file contents instead
| 0
|
528,505
| 15,368,457,028
|
IssuesEvent
|
2021-03-02 05:35:57
|
AY2021S2-CS2103-T14-4/tp
|
https://api.github.com/repos/AY2021S2-CS2103-T14-4/tp
|
opened
|
As a CS student who just finished a holiday, I want to reset my calendar
|
priority.High type.Story
|
so that I can start a new semester with new deadlines
|
1.0
|
As a CS student who just finished a holiday, I want to reset my calendar - so that I can start a new semester with new deadlines
|
non_defect
|
as a cs student who just finished a holiday i want to reset my calendar so that i can start a new semester with new deadlines
| 0
|
68,418
| 21,664,331,529
|
IssuesEvent
|
2022-05-07 01:01:45
|
vector-im/element-web
|
https://api.github.com/repos/vector-im/element-web
|
closed
|
MatrixBridge can only be contacted via start chat button, not /user page link
|
T-Defect P2 S-Minor
|
### Description
The page https://riot.im/develop/#/user/@freenode_MatrixBridge:matrix.org does not load, but using the start chat button to contact @freenode_MatrixBridge:matrix.org does (albeit I can't see the room until I refresh Riot).
Possibly causes https://github.com/matrix-org/matrix-appservice-irc/issues/524
Log: sent/not sent? not sent
### Version information
- **Platform**: web (in-browser)
For the web app:
- **Browser**: FF57
- **OS**: Fedora 26
- **URL**: riot.im/develop
|
1.0
|
MatrixBridge can only be contacted via start chat button, not /user page link -
### Description
The page https://riot.im/develop/#/user/@freenode_MatrixBridge:matrix.org does not load, but using the start chat button to contact @freenode_MatrixBridge:matrix.org does (albeit I can't see the room until I refresh Riot).
Possibly causes https://github.com/matrix-org/matrix-appservice-irc/issues/524
Log: sent/not sent? not sent
### Version information
- **Platform**: web (in-browser)
For the web app:
- **Browser**: FF57
- **OS**: Fedora 26
- **URL**: riot.im/develop
|
defect
|
matrixbridge can only be contacted via start chat button not user page link description the page does not load but using the start chat button to contact freenode matrixbridge matrix org does albeit i can t see the room until i refresh riot possibly causes log sent not sent not sent version information platform web in browser for the web app browser os fedora url riot im develop
| 1
|
2,594
| 2,607,930,767
|
IssuesEvent
|
2015-02-26 00:26:36
|
chrsmithdemos/minify
|
https://api.github.com/repos/chrsmithdemos/minify
|
closed
|
minify_2.1.2.zip can't open on OSX
|
auto-migrated Priority-High Type-Defect
|
```
Minify version:2.1.2
PHP version: …
Running Mac OS X
What steps will reproduce the problem?
1. Download
2. Unzip
3. Fail
Expected output: Files with content
Actual output: Files with no content, null file size.
Did any unit tests FAIL? …
Please provide any additional information below.
…
```
-----
Original issue reported on code.google.com by `harrison...@gmail.com` on 4 Mar 2009 at 2:49
|
1.0
|
minify_2.1.2.zip can't open on OSX - ```
Minify version:2.1.2
PHP version: …
Running Mac OS X
What steps will reproduce the problem?
1. Download
2. Unzip
3. Fail
Expected output: Files with content
Actual output: Files with no content, null file size.
Did any unit tests FAIL? …
Please provide any additional information below.
…
```
-----
Original issue reported on code.google.com by `harrison...@gmail.com` on 4 Mar 2009 at 2:49
|
defect
|
minify zip can t open on osx minify version php version … running mac os x what steps will reproduce the problem download unzip fail expected output files with content actual output files with no content null file size did any unit tests fail … please provide any additional information below … original issue reported on code google com by harrison gmail com on mar at
| 1
|
333,370
| 10,121,079,383
|
IssuesEvent
|
2019-07-31 14:56:15
|
LiskHQ/lisk-sdk
|
https://api.github.com/repos/LiskHQ/lisk-sdk
|
closed
|
Only send back the port and ip when peer requests our peer list
|
elements/P2P priority: high status: ready to develop
|
### Expected behavior
When doing discovery, the peer should only give us a list of IPs and ports of its peers; it should not include the other fields from `P2PPeerInfo`.
We will fetch the remaining `P2PPeerInfo` fields after we connect to the peer and make a `status` call to it.
### Actual behavior
Right now, for peers in our newPeers list, it's possible that the fields could be wrong because a different peer could give us fake values for the fields (they come from third-party peers and not the peer itself).
Currently, we shouldn't trust fields of `P2PPeerInfo` objects in the `newPeers` list.
|
1.0
|
Only send back the port and ip when peer requests our peer list - ### Expected behavior
When doing discovery, the peer should only give us a list of IPs and ports of its peers; it should not include the other fields from `P2PPeerInfo`.
We will fetch the remaining `P2PPeerInfo` fields after we connect to the peer and make a `status` call to it.
### Actual behavior
Right now, for peers in our newPeers list, it's possible that the fields could be wrong because a different peer could give us fake values for the fields (they come from third-party peers and not the peer itself).
Currently, we shouldn't trust fields of `P2PPeerInfo` objects in the `newPeers` list.
|
non_defect
|
only send back the port and ip when peer requests our peer list expected behavior when doing discovery the peer should only give us a list of ips and ports of its peers it should not include the other fields from we will fetch the remaining fields after we connect to the peer and make a status call to it actual behavior right now for peers in our newpeers list it s possible that the fields could be wrong because a different peer could give us fake values for the fields they come from third party peers and not the peer itself currently we shouldn t trust fields of objects in the newpeers list
| 0
|
679,204
| 23,224,181,395
|
IssuesEvent
|
2022-08-02 21:29:32
|
o3de/o3de
|
https://api.github.com/repos/o3de/o3de
|
closed
|
MultiplayerSample project, the game process cannot exit and enter infinite loop
|
kind/bug sig/network sig/ui-ux priority/major
|
**Describe the bug**
Windows platform, MultiplayerSample project, the game process cannot exit and enter infinite loop
This issue is related with issue #7272
**Steps to reproduce**
Steps to reproduce the behavior:
1. Open MultiplayerSample.ServerLauncher.exe, and the process is running.
2. Click on close button on window. The window of process is closed.
3. Open the task manager, we can find the process is still running in the background. And the CPU utilization of this process is 100%.
**Found in Branch**
The latest code of development branch.
**Desktop/Device (please complete the following information):**
- Device: [PC]
- OS: [Windows]
- Version [10]
- CPU [Intel i7-10700]
- GPU [NVidia 1650]
- Memory [32GB]
**Problem analysis**
We found the infinite loop is at the procedure of the destructor of the globle variable 'g_ignoredAsserts'.
And we do some modifications show blow, the problem solved.
In Trace::Destroy() function:
Modify
g_ignoredAsserts.Reset();
to
g_ignoredAsserts->clear();
|
1.0
|
MultiplayerSample project, the game process cannot exit and enter infinite loop - **Describe the bug**
Windows platform, MultiplayerSample project, the game process cannot exit and enter infinite loop
This issue is related with issue #7272
**Steps to reproduce**
Steps to reproduce the behavior:
1. Open MultiplayerSample.ServerLauncher.exe, and the process is running.
2. Click on close button on window. The window of process is closed.
3. Open the task manager, we can find the process is still running in the background. And the CPU utilization of this process is 100%.
**Found in Branch**
The latest code of development branch.
**Desktop/Device (please complete the following information):**
- Device: [PC]
- OS: [Windows]
- Version [10]
- CPU [Intel i7-10700]
- GPU [NVidia 1650]
- Memory [32GB]
**Problem analysis**
We found the infinite loop is at the procedure of the destructor of the globle variable 'g_ignoredAsserts'.
And we do some modifications show blow, the problem solved.
In Trace::Destroy() function:
Modify
g_ignoredAsserts.Reset();
to
g_ignoredAsserts->clear();
|
non_defect
|
multiplayersample project the game process cannot exit and enter infinite loop describe the bug windows platform multiplayersample project the game process cannot exit and enter infinite loop this issue is related with issue steps to reproduce steps to reproduce the behavior open multiplayersample serverlauncher exe and the process is running click on close button on window the window of process is closed open the task manager we can find the process is still running in the background and the cpu utilization of this process is found in branch the latest code of development branch desktop device please complete the following information device os version cpu gpu memory problem analysis we found the infinite loop is at the procedure of the destructor of the globle variable g ignoredasserts and we do some modifications show blow the problem solved in trace destroy function modify g ignoredasserts reset to g ignoredasserts clear
| 0
|
213,422
| 23,990,819,166
|
IssuesEvent
|
2022-09-14 00:47:56
|
ZcashFoundation/zebra
|
https://api.github.com/repos/ZcashFoundation/zebra
|
reopened
|
Test if checkpoint verifier and state service are correctly reset on block commit errors
|
C-enhancement P-Medium :zap: C-security I-panic I-hang
|
## Priority
Zebra doesn't have any post-NU5 checkpoints yet.
This ticket is optional until we update our checkpoint lists.
## Motivation
https://github.com/ZcashFoundation/zebra/pull/2633/ adds ZIP-221/244 block commitment validation in the checkpoint verifier. The check is actually done in the finalized state, and when that happens, the checkpoint verifier is reset to the tip of the finalized state in order to keep running correctly.
However, this hasn't been tested, since it is tricky to test.
Implement a test to verify that it's working correctly.
(Note that is only required if/when we have a checkpoint post-Nu5. Before that all block contents are committed to by the block hash, so they must be correct. Nu5-onward that no longer applies due to ZIP-244.)
### Previous attempt
I attempted to write this test in #2633 but gave up because it was too difficult and we had to keep working on other stuff.
See [discussion](https://github.com/ZcashFoundation/zebra/pull/2633/files#r689198985). However, most of the problems were caused by trying to test it along with the "fake activation heights" feature in that PR, which would require generating fake blocks with correct difficulties, etc. in order to pass the checkpoint verifier. Another alternative would be to use real blocks similar to the `continuous_blockchain` - but the problem would then be how to ensure that one block fails to be comitted in order to test if that's handled correctly (the real blocks have small heights, and thus they don't use the block commitment in the header, so there is nothing to corrupt)
### Specifications
<!--
If this change is based on consensus rules, quote them, and link to the Zcash spec or ZIP:
https://zips.z.cash/#nu5-zips
If this changes network behaviour, quote and link to the Bitcoin network reference:
https://developer.bitcoin.org/reference/p2p_networking.html
-->
### Designs
<!--
If this change is part of a Zebra design, quote and link to the RFC:
https://github.com/ZcashFoundation/zebra/tree/main/book/src/dev/rfcs/
-->
## Related Work
<!--
Is this change related to other features or tickets?
-->
|
True
|
Test if checkpoint verifier and state service are correctly reset on block commit errors - ## Priority
Zebra doesn't have any post-NU5 checkpoints yet.
This ticket is optional until we update our checkpoint lists.
## Motivation
https://github.com/ZcashFoundation/zebra/pull/2633/ adds ZIP-221/244 block commitment validation in the checkpoint verifier. The check is actually done in the finalized state, and when that happens, the checkpoint verifier is reset to the tip of the finalized state in order to keep running correctly.
However, this hasn't been tested, since it is tricky to test.
Implement a test to verify that it's working correctly.
(Note that is only required if/when we have a checkpoint post-Nu5. Before that all block contents are committed to by the block hash, so they must be correct. Nu5-onward that no longer applies due to ZIP-244.)
### Previous attempt
I attempted to write this test in #2633 but gave up because it was too difficult and we had to keep working on other stuff.
See [discussion](https://github.com/ZcashFoundation/zebra/pull/2633/files#r689198985). However, most of the problems were caused by trying to test it along with the "fake activation heights" feature in that PR, which would require generating fake blocks with correct difficulties, etc. in order to pass the checkpoint verifier. Another alternative would be to use real blocks similar to the `continuous_blockchain` - but the problem would then be how to ensure that one block fails to be comitted in order to test if that's handled correctly (the real blocks have small heights, and thus they don't use the block commitment in the header, so there is nothing to corrupt)
### Specifications
<!--
If this change is based on consensus rules, quote them, and link to the Zcash spec or ZIP:
https://zips.z.cash/#nu5-zips
If this changes network behaviour, quote and link to the Bitcoin network reference:
https://developer.bitcoin.org/reference/p2p_networking.html
-->
### Designs
<!--
If this change is part of a Zebra design, quote and link to the RFC:
https://github.com/ZcashFoundation/zebra/tree/main/book/src/dev/rfcs/
-->
## Related Work
<!--
Is this change related to other features or tickets?
-->
|
non_defect
|
test if checkpoint verifier and state service are correctly reset on block commit errors priority zebra doesn t have any post checkpoints yet this ticket is optional until we update our checkpoint lists motivation adds zip block commitment validation in the checkpoint verifier the check is actually done in the finalized state and when that happens the checkpoint verifier is reset to the tip of the finalized state in order to keep running correctly however this hasn t been tested since it is tricky to test implement a test to verify that it s working correctly note that is only required if when we have a checkpoint post before that all block contents are committed to by the block hash so they must be correct onward that no longer applies due to zip previous attempt i attempted to write this test in but gave up because it was too difficult and we had to keep working on other stuff see however most of the problems were caused by trying to test it along with the fake activation heights feature in that pr which would require generating fake blocks with correct difficulties etc in order to pass the checkpoint verifier another alternative would be to use real blocks similar to the continuous blockchain but the problem would then be how to ensure that one block fails to be comitted in order to test if that s handled correctly the real blocks have small heights and thus they don t use the block commitment in the header so there is nothing to corrupt specifications if this change is based on consensus rules quote them and link to the zcash spec or zip if this changes network behaviour quote and link to the bitcoin network reference designs if this change is part of a zebra design quote and link to the rfc related work is this change related to other features or tickets
| 0
|
433,025
| 12,501,146,945
|
IssuesEvent
|
2020-06-02 00:21:53
|
eclipse-ee4j/glassfish
|
https://api.github.com/repos/eclipse-ee4j/glassfish
|
closed
|
GUI should inform the user to save the changes
|
Component: admin_gui ERR: Assignee Priority: Major Stale Type: Improvement
|
Under Configuration->Monitoring I select some modules to change the monitoring
level, the change level button is activated and I click the button to change the
levels. But the values are not actually changed in domain.xml it is simply
changed in the GUI screen. The user still needs to hit the save button to
actually save it in domain.xml.
the user needs to be informed to hit the save button otherwise it creates a
impression that the levels are already saved.
#### Environment
Operating System: All
Platform: PC
#### Affected Versions
[V3]
|
1.0
|
GUI should inform the user to save the changes - Under Configuration->Monitoring I select some modules to change the monitoring
level, the change level button is activated and I click the button to change the
levels. But the values are not actually changed in domain.xml it is simply
changed in the GUI screen. The user still needs to hit the save button to
actually save it in domain.xml.
the user needs to be informed to hit the save button otherwise it creates a
impression that the levels are already saved.
#### Environment
Operating System: All
Platform: PC
#### Affected Versions
[V3]
|
non_defect
|
gui should inform the user to save the changes under configuration monitoring i select some modules to change the monitoring level the change level button is activated and i click the button to change the levels but the values are not actually changed in domain xml it is simply changed in the gui screen the user still needs to hit the save button to actually save it in domain xml the user needs to be informed to hit the save button otherwise it creates a impression that the levels are already saved environment operating system all platform pc affected versions
| 0
|
2,117
| 2,603,976,587
|
IssuesEvent
|
2015-02-24 19:01:39
|
chrsmith/nishazi6
|
https://api.github.com/repos/chrsmith/nishazi6
|
opened
|
沈阳龟头上有小菜花
|
auto-migrated Priority-Medium Type-Defect
|
```
沈阳龟头上有小菜花〓沈陽軍區政治部醫院性病〓TEL:024-3102
3308〓成立于1946年,68年專注于性傳播疾病的研究和治療。位�
��沈陽市沈河區二緯路32號。是一所與新中國同建立共輝煌的�
��史悠久、設備精良、技術權威、專家云集,是預防、保健、
醫療、科研康復為一體的綜合性醫院。是國家首批公立甲等��
�隊醫院、全國首批醫療規范定點單位,是第四軍醫大學、東�
��大學等知名高等院校的教學醫院。曾被中國人民解放軍空軍
后勤部衛生部評為衛生工作先進單位,先后兩次榮立集體二��
�功。
```
-----
Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 8:22
|
1.0
|
沈阳龟头上有小菜花 - ```
沈阳龟头上有小菜花〓沈陽軍區政治部醫院性病〓TEL:024-3102
3308〓成立于1946年,68年專注于性傳播疾病的研究和治療。位�
��沈陽市沈河區二緯路32號。是一所與新中國同建立共輝煌的�
��史悠久、設備精良、技術權威、專家云集,是預防、保健、
醫療、科研康復為一體的綜合性醫院。是國家首批公立甲等��
�隊醫院、全國首批醫療規范定點單位,是第四軍醫大學、東�
��大學等知名高等院校的教學醫院。曾被中國人民解放軍空軍
后勤部衛生部評為衛生工作先進單位,先后兩次榮立集體二��
�功。
```
-----
Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 8:22
|
defect
|
沈阳龟头上有小菜花 沈阳龟头上有小菜花〓沈陽軍區政治部醫院性病〓tel: 〓 , 。位� �� 。是一所與新中國同建立共輝煌的� ��史悠久、設備精良、技術權威、專家云集,是預防、保健、 醫療、科研康復為一體的綜合性醫院。是國家首批公立甲等�� �隊醫院、全國首批醫療規范定點單位,是第四軍醫大學、東� ��大學等知名高等院校的教學醫院。曾被中國人民解放軍空軍 后勤部衛生部評為衛生工作先進單位,先后兩次榮立集體二�� �功。 original issue reported on code google com by gmail com on jun at
| 1
|
116,476
| 14,968,106,678
|
IssuesEvent
|
2021-01-27 16:27:16
|
department-of-veterans-affairs/va.gov-team
|
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
|
opened
|
Provide QA Guidance for EDU-DD
|
EDU DD design vsa vsa-ebenefits
|
## Background
As this features nears completion, one of the last items is to run the feature through its QA paces. The eBenefits Team is able to help guide that process as needed given our role in helping the design process.
## Tasks
- [ ] Check in with Tze and the Auth Exp Team as need
## Acceptance Criteria
- [ ] Assistance has been provided as needed
|
1.0
|
Provide QA Guidance for EDU-DD - ## Background
As this features nears completion, one of the last items is to run the feature through its QA paces. The eBenefits Team is able to help guide that process as needed given our role in helping the design process.
## Tasks
- [ ] Check in with Tze and the Auth Exp Team as need
## Acceptance Criteria
- [ ] Assistance has been provided as needed
|
non_defect
|
provide qa guidance for edu dd background as this features nears completion one of the last items is to run the feature through its qa paces the ebenefits team is able to help guide that process as needed given our role in helping the design process tasks check in with tze and the auth exp team as need acceptance criteria assistance has been provided as needed
| 0
|
580,453
| 17,258,469,036
|
IssuesEvent
|
2021-07-22 01:48:44
|
GoogleCloudPlatform/java-docs-samples
|
https://api.github.com/repos/GoogleCloudPlatform/java-docs-samples
|
closed
|
com.example.storage.QuickstartSampleIT: testQuickstart failed
|
api: storage flakybot: issue priority: p1 samples type: bug
|
This test failed!
To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/master/packages/flakybot).
If I'm commenting on this issue too often, add the `flakybot: quiet` label and
I will stop commenting.
---
commit: 4d08f29cf609a16b707efa2ac7358fc0e4d89827
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/4b8d400e-8398-41e0-a140-a012474d00bf), [Sponge](http://sponge2/4b8d400e-8398-41e0-a140-a012474d00bf)
status: failed
<details><summary>Test output</summary><br><pre>com.google.cloud.storage.StorageException:
Error getting access token for service account: 400 Bad Request
POST https://oauth2.googleapis.com/token
{"error":"invalid_grant","error_description":"Invalid JWT Signature."}, iss: java-docs-samples-testing@java-docs-samples-testing.iam.gserviceaccount.com
at com.example.storage.QuickstartSampleIT.deleteBucket(QuickstartSampleIT.java:44)
at com.example.storage.QuickstartSampleIT.tearDown(QuickstartSampleIT.java:59)
Caused by: java.io.IOException:
Error getting access token for service account: 400 Bad Request
POST https://oauth2.googleapis.com/token
{"error":"invalid_grant","error_description":"Invalid JWT Signature."}, iss: java-docs-samples-testing@java-docs-samples-testing.iam.gserviceaccount.com
at com.example.storage.QuickstartSampleIT.deleteBucket(QuickstartSampleIT.java:44)
at com.example.storage.QuickstartSampleIT.tearDown(QuickstartSampleIT.java:59)
Caused by: com.google.api.client.http.HttpResponseException:
400 Bad Request
POST https://oauth2.googleapis.com/token
{"error":"invalid_grant","error_description":"Invalid JWT Signature."}
at com.example.storage.QuickstartSampleIT.deleteBucket(QuickstartSampleIT.java:44)
at com.example.storage.QuickstartSampleIT.tearDown(QuickstartSampleIT.java:59)
</pre></details>
|
1.0
|
com.example.storage.QuickstartSampleIT: testQuickstart failed - This test failed!
To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/master/packages/flakybot).
If I'm commenting on this issue too often, add the `flakybot: quiet` label and
I will stop commenting.
---
commit: 4d08f29cf609a16b707efa2ac7358fc0e4d89827
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/4b8d400e-8398-41e0-a140-a012474d00bf), [Sponge](http://sponge2/4b8d400e-8398-41e0-a140-a012474d00bf)
status: failed
<details><summary>Test output</summary><br><pre>com.google.cloud.storage.StorageException:
Error getting access token for service account: 400 Bad Request
POST https://oauth2.googleapis.com/token
{"error":"invalid_grant","error_description":"Invalid JWT Signature."}, iss: java-docs-samples-testing@java-docs-samples-testing.iam.gserviceaccount.com
at com.example.storage.QuickstartSampleIT.deleteBucket(QuickstartSampleIT.java:44)
at com.example.storage.QuickstartSampleIT.tearDown(QuickstartSampleIT.java:59)
Caused by: java.io.IOException:
Error getting access token for service account: 400 Bad Request
POST https://oauth2.googleapis.com/token
{"error":"invalid_grant","error_description":"Invalid JWT Signature."}, iss: java-docs-samples-testing@java-docs-samples-testing.iam.gserviceaccount.com
at com.example.storage.QuickstartSampleIT.deleteBucket(QuickstartSampleIT.java:44)
at com.example.storage.QuickstartSampleIT.tearDown(QuickstartSampleIT.java:59)
Caused by: com.google.api.client.http.HttpResponseException:
400 Bad Request
POST https://oauth2.googleapis.com/token
{"error":"invalid_grant","error_description":"Invalid JWT Signature."}
at com.example.storage.QuickstartSampleIT.deleteBucket(QuickstartSampleIT.java:44)
at com.example.storage.QuickstartSampleIT.tearDown(QuickstartSampleIT.java:59)
</pre></details>
|
non_defect
|
com example storage quickstartsampleit testquickstart failed this test failed to configure my behavior see if i m commenting on this issue too often add the flakybot quiet label and i will stop commenting commit buildurl status failed test output com google cloud storage storageexception error getting access token for service account bad request post error invalid grant error description invalid jwt signature iss java docs samples testing java docs samples testing iam gserviceaccount com at com example storage quickstartsampleit deletebucket quickstartsampleit java at com example storage quickstartsampleit teardown quickstartsampleit java caused by java io ioexception error getting access token for service account bad request post error invalid grant error description invalid jwt signature iss java docs samples testing java docs samples testing iam gserviceaccount com at com example storage quickstartsampleit deletebucket quickstartsampleit java at com example storage quickstartsampleit teardown quickstartsampleit java caused by com google api client http httpresponseexception bad request post error invalid grant error description invalid jwt signature at com example storage quickstartsampleit deletebucket quickstartsampleit java at com example storage quickstartsampleit teardown quickstartsampleit java
| 0
|
53,941
| 6,776,242,234
|
IssuesEvent
|
2017-10-27 17:04:30
|
vmware/clarity
|
https://api.github.com/repos/vmware/clarity
|
closed
|
Update Design Resources
|
Docs needs-UX-design WEB
|
```
[ ] bug
[ ] feature request
[X] enhancement
```
### Expected behavior
Have a new Library version of the Clarity UI Template as well a content that shows the Clarity Sketch Library is available to download.
Will also want to keep the previous version of the UI Template (0.10.0) available for users who have not moved to Sketch 47 yet.
### Actual behavior
Current 0.10.0 version is using Sketch 46 and doesn't have the Libraries ability
### Reproduction of behavior

### Environment details
* **UI Template version:** 0.10.0
* **Clarity version:** 0.10.8
* **OS and version:**
* **Browser:** [all]
|
1.0
|
Update Design Resources - ```
[ ] bug
[ ] feature request
[X] enhancement
```
### Expected behavior
Have a new Library version of the Clarity UI Template as well a content that shows the Clarity Sketch Library is available to download.
Will also want to keep the previous version of the UI Template (0.10.0) available for users who have not moved to Sketch 47 yet.
### Actual behavior
Current 0.10.0 version is using Sketch 46 and doesn't have the Libraries ability
### Reproduction of behavior

### Environment details
* **UI Template version:** 0.10.0
* **Clarity version:** 0.10.8
* **OS and version:**
* **Browser:** [all]
|
non_defect
|
update design resources bug feature request enhancement expected behavior have a new library version of the clarity ui template as well a content that shows the clarity sketch library is available to download will also want to keep the previous version of the ui template available for users who have not moved to sketch yet actual behavior current version is using sketch and doesn t have the libraries ability reproduction of behavior environment details ui template version clarity version os and version browser
| 0
|
63,329
| 17,598,803,040
|
IssuesEvent
|
2021-08-17 09:12:20
|
Gogo1951/GogoLoot
|
https://api.github.com/repos/Gogo1951/GogoLoot
|
closed
|
When it's on FFA, you don't get a loot window for BoPs
|
Type - Defect GogoLoot - Application
|
When it's set to FFA, the loot window should stay open when a BoP is present. Currently the window just closes very quickly. Whenever there's an item that you can't loot, the window should stay open.
|
1.0
|
When it's on FFA, you don't get a loot window for BoPs - When it's set to FFA, the loot window should stay open when a BoP is present. Currently the window just closes very quickly. Whenever there's an item that you can't loot, the window should stay open.
|
defect
|
when it s on ffa you don t get a loot window for bops when it s set to ffa the loot window should stay open when a bop is present currently the window just closes very quickly whenever there s an item that you can t loot the window should stay open
| 1
|
24,282
| 3,952,583,184
|
IssuesEvent
|
2016-04-29 09:29:34
|
PowerDNS/pdns
|
https://api.github.com/repos/PowerDNS/pdns
|
closed
|
Domain more recent than master, our serial 0 > their serial <large number>
|
auth defect
|
Domain '[mydomain]' more recent than master, our serial 0 > their serial 3933516418
> [08:05:14] Habbie: Genesis2001, the issue is that we treat an absent domain as having serial 0
> [08:05:19] Habbie: Genesis2001, this is a bug
I've got a supermaster setup on one machine, and a slave ("ns1") setup on another which has my supermaster listed.
The serial for the zone was larger than 2^31
> [08:05:53] Genesis2001: also on the [supermaster], in my domains table for that domain, notified_serial is negative too
> [08:05:55] Genesis2001: o.o
> [08:05:58] Habbie: negative!
> [08:06:10] Habbie: -1786032770 ?
> [08:06:16] Genesis2001: -361450878
---
> [08:07:38] Habbie: then please file two tickets
> [08:07:57] Habbie: for now i'd recommend changing your serial to something smaller than 2^31
OS: Debian
OS: Version: 7.8 (Wheezy)
PDNS version: 3.4.1 (wheezy-backports)
|
1.0
|
Domain more recent than master, our serial 0 > their serial <large number> - Domain '[mydomain]' more recent than master, our serial 0 > their serial 3933516418
> [08:05:14] Habbie: Genesis2001, the issue is that we treat an absent domain as having serial 0
> [08:05:19] Habbie: Genesis2001, this is a bug
I've got a supermaster setup on one machine, and a slave ("ns1") setup on another which has my supermaster listed.
The serial for the zone was larger than 2^31
> [08:05:53] Genesis2001: also on the [supermaster], in my domains table for that domain, notified_serial is negative too
> [08:05:55] Genesis2001: o.o
> [08:05:58] Habbie: negative!
> [08:06:10] Habbie: -1786032770 ?
> [08:06:16] Genesis2001: -361450878
---
> [08:07:38] Habbie: then please file two tickets
> [08:07:57] Habbie: for now i'd recommend changing your serial to something smaller than 2^31
OS: Debian
OS: Version: 7.8 (Wheezy)
PDNS version: 3.4.1 (wheezy-backports)
|
defect
|
domain more recent than master our serial their serial domain more recent than master our serial their serial habbie the issue is that we treat an absent domain as having serial habbie this is a bug i ve got a supermaster setup on one machine and a slave setup on another which has my supermaster listed the serial for the zone was larger than also on the in my domains table for that domain notified serial is negative too o o habbie negative habbie habbie then please file two tickets habbie for now i d recommend changing your serial to something smaller than os debian os version wheezy pdns version wheezy backports
| 1
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.