Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
4
112
repo_url
stringlengths
33
141
action
stringclasses
3 values
title
stringlengths
1
957
labels
stringlengths
4
1.11k
body
stringlengths
1
261k
index
stringclasses
11 values
text_combine
stringlengths
95
261k
label
stringclasses
2 values
text
stringlengths
96
250k
binary_label
int64
0
1
69,593
8,434,976,774
IssuesEvent
2018-10-17 11:52:33
Altinn/altinn-studio
https://api.github.com/repos/Altinn/altinn-studio
opened
Dynamics: edit dynamics
designer logic & rules needs sketches needs spesification
**Functional architect/designer:** @-mention **Technical architect:** @-mention Description As a service developer I need to be able edit already existing dynamics. Editing dynamics should be possible both through GUI and code. Sketch (if relevant) (Screenshot and link to Figma, make sure your sketch is public!) //needs scetch **Navigation from/to (if relevant)** This functionality is reached from... **Technical considerations** Input (beyond tasks) on how the user story should be solved can be put here. **Acceptance criterea** - What is allowed/not allowed - Validations - Error messages and warnings - ... **Tasks** - [ ] Example task
1.0
Dynamics: edit dynamics - **Functional architect/designer:** @-mention **Technical architect:** @-mention Description As a service developer I need to be able edit already existing dynamics. Editing dynamics should be possible both through GUI and code. Sketch (if relevant) (Screenshot and link to Figma, make sure your sketch is public!) //needs scetch **Navigation from/to (if relevant)** This functionality is reached from... **Technical considerations** Input (beyond tasks) on how the user story should be solved can be put here. **Acceptance criterea** - What is allowed/not allowed - Validations - Error messages and warnings - ... **Tasks** - [ ] Example task
design
dynamics edit dynamics functional architect designer mention technical architect mention description as a service developer i need to be able edit already existing dynamics editing dynamics should be possible both through gui and code sketch if relevant screenshot and link to figma make sure your sketch is public needs scetch navigation from to if relevant this functionality is reached from technical considerations input beyond tasks on how the user story should be solved can be put here acceptance criterea what is allowed not allowed validations error messages and warnings tasks example task
1
426,578
12,374,404,576
IssuesEvent
2020-05-19 01:28:35
Matteas-Eden/roll-for-reaction
https://api.github.com/repos/Matteas-Eden/roll-for-reaction
closed
Bow sprite not found crashes game
High Priority bug
**Bug Summary** Due to a missing `bow.png` file, the game fails to compile and cannot be played. **Test Case(s)** <!-- List the relevant unsuccessful test case(s) --> --- **Expected behavior** The game compiles. **Observed Behaviour** The game does not compile. **Steps To Reproduce** <!-- The steps performed to reproduce the bug --> 1. Checkout `master` 2. Run `yarn start` 3. Observe **Environment** - Version: cf1e9ae - OS: Arch Linux - Browser: --- **Code Examples** **Stack Trace** **Screenshots** **Error Report** --- **Additional context** <!-- Add any other context about the problem here -->
1.0
Bow sprite not found crashes game - **Bug Summary** Due to a missing `bow.png` file, the game fails to compile and cannot be played. **Test Case(s)** <!-- List the relevant unsuccessful test case(s) --> --- **Expected behavior** The game compiles. **Observed Behaviour** The game does not compile. **Steps To Reproduce** <!-- The steps performed to reproduce the bug --> 1. Checkout `master` 2. Run `yarn start` 3. Observe **Environment** - Version: cf1e9ae - OS: Arch Linux - Browser: --- **Code Examples** **Stack Trace** **Screenshots** **Error Report** --- **Additional context** <!-- Add any other context about the problem here -->
non_design
bow sprite not found crashes game bug summary due to a missing bow png file the game fails to compile and cannot be played test case s expected behavior the game compiles observed behaviour the game does not compile steps to reproduce checkout master run yarn start observe environment version os arch linux browser code examples stack trace screenshots error report additional context
0
285,314
8,757,203,537
IssuesEvent
2018-12-14 20:22:43
richelbilderbeek/djog_unos_2018
https://api.github.com/repos/richelbilderbeek/djog_unos_2018
opened
Agent has stamina
low priority
I would like the agents to have stamina, so when the agents are swimming for too long, they drown.
1.0
Agent has stamina - I would like the agents to have stamina, so when the agents are swimming for too long, they drown.
non_design
agent has stamina i would like the agents to have stamina so when the agents are swimming for too long they drown
0
86,341
3,710,830,203
IssuesEvent
2016-03-02 07:17:45
elementary/icons
https://api.github.com/repos/elementary/icons
closed
Differentiate between code mimes by color
Priority: Wishlist Status: Confirmed
In a folder full of HTML, PHP, JS and CSS files, it is difficult to differentiate between them quickly by color. All of the icons are gray and have very little difference except their symbol. In general, the office MIME icons are nice and bold compared to the text source files which mostly have dull icons. Can we get bold color in some more icons (like Numix-Circle)? --- Originally filed by [SuperScript](https://launchpad.net/~superscript18) on [Launchpad](https://bugs.launchpad.net/elementaryicons/+bug/1408834).
1.0
Differentiate between code mimes by color - In a folder full of HTML, PHP, JS and CSS files, it is difficult to differentiate between them quickly by color. All of the icons are gray and have very little difference except their symbol. In general, the office MIME icons are nice and bold compared to the text source files which mostly have dull icons. Can we get bold color in some more icons (like Numix-Circle)? --- Originally filed by [SuperScript](https://launchpad.net/~superscript18) on [Launchpad](https://bugs.launchpad.net/elementaryicons/+bug/1408834).
non_design
differentiate between code mimes by color in a folder full of html php js and css files it is difficult to differentiate between them quickly by color all of the icons are gray and have very little difference except their symbol in general the office mime icons are nice and bold compared to the text source files which mostly have dull icons can we get bold color in some more icons like numix circle originally filed by on
0
62,248
7,565,334,612
IssuesEvent
2018-04-21 08:38:15
iropensource/groupbot
https://api.github.com/repos/iropensource/groupbot
opened
Database design
Analysis & Design
Read the functionalities expected for the bot which is listed in the issues and create a database model that is suited for this project! in each phase of developing this data model send the database model inside the group! Google Drive has a collaborative service call draw.io. You can install this tool inside your google drive and work together and discuss about the design together to come up with better design! You can export the draw.io xml file if you want and send it inside the group till we also check and give you our feedbacks!
1.0
Database design - Read the functionalities expected for the bot which is listed in the issues and create a database model that is suited for this project! in each phase of developing this data model send the database model inside the group! Google Drive has a collaborative service call draw.io. You can install this tool inside your google drive and work together and discuss about the design together to come up with better design! You can export the draw.io xml file if you want and send it inside the group till we also check and give you our feedbacks!
design
database design read the functionalities expected for the bot which is listed in the issues and create a database model that is suited for this project in each phase of developing this data model send the database model inside the group google drive has a collaborative service call draw io you can install this tool inside your google drive and work together and discuss about the design together to come up with better design you can export the draw io xml file if you want and send it inside the group till we also check and give you our feedbacks
1
52,824
10,933,590,432
IssuesEvent
2019-11-24 03:36:04
Binaryify/OneDark-Pro
https://api.github.com/repos/Binaryify/OneDark-Pro
closed
主题更换出错
duplicate vscode issue
Issue Type: <b>Feature Request</b> 更换主题颜色时报错:Cannot read property 'id' of undefined Extension version: 3.0.3 VS Code version: Code 1.40.1 (8795a9889db74563ddd43eb0a897a2384129a619, 2019-11-13T16:49:35.976Z) OS version: Windows_NT x64 10.0.17763 <!-- generated by issue reporter -->
1.0
主题更换出错 - Issue Type: <b>Feature Request</b> 更换主题颜色时报错:Cannot read property 'id' of undefined Extension version: 3.0.3 VS Code version: Code 1.40.1 (8795a9889db74563ddd43eb0a897a2384129a619, 2019-11-13T16:49:35.976Z) OS version: Windows_NT x64 10.0.17763 <!-- generated by issue reporter -->
non_design
主题更换出错 issue type feature request 更换主题颜色时报错:cannot read property id of undefined extension version vs code version code os version windows nt
0
132,936
18,784,956,552
IssuesEvent
2021-11-08 11:07:14
hoprnet/hoprnet-org
https://api.github.com/repos/hoprnet/hoprnet-org
closed
Strange line-spacing
workflow:new issue type:design
# Page https://hoprnet.org/about-us in the /governance-segment # Current behavior ![Bildschirmfoto 2021-10-22 um 12 26 51](https://user-images.githubusercontent.com/78225531/138438963-3ffe7e84-b9ad-4bc5-9123-172cffd73730.png) # Expected behavior as above: ![Bildschirmfoto 2021-10-22 um 12 27 23](https://user-images.githubusercontent.com/78225531/138439009-021abdbd-1087-4d40-9540-54bf06841cbd.png)
1.0
Strange line-spacing - # Page https://hoprnet.org/about-us in the /governance-segment # Current behavior ![Bildschirmfoto 2021-10-22 um 12 26 51](https://user-images.githubusercontent.com/78225531/138438963-3ffe7e84-b9ad-4bc5-9123-172cffd73730.png) # Expected behavior as above: ![Bildschirmfoto 2021-10-22 um 12 27 23](https://user-images.githubusercontent.com/78225531/138439009-021abdbd-1087-4d40-9540-54bf06841cbd.png)
design
strange line spacing page in the governance segment current behavior expected behavior as above
1
65,934
7,933,855,135
IssuesEvent
2018-07-08 12:18:17
unee-t/frontend
https://api.github.com/repos/unee-t/frontend
opened
Update the Signup Page to the new design
design/ux enhancement
# The problem: In order to be able to do Issue #343 we need to modify the Signup page to: - Simplify it - Include the links to the Terms and Conditions and Privacy Policy - Record the fact that the user has accepted our T&Cs and Privacy Policy in Mongo (see #359) The link to Unee-T Privacy Policy and Terms and Condition: https://unee-t.com/privacy-and-terms/ # Current design: ![image](https://user-images.githubusercontent.com/31331637/42419595-db642bce-82ea-11e8-9f04-2fcefa926b21.png) # The design we want: ![image](https://user-images.githubusercontent.com/31331637/42419608-2f7fcf9c-82eb-11e8-8a1b-e4877431ab70.png) # After the user has Created his/her account: We need to send the user to the page where he/she can create his/her first unit. ![image](https://user-images.githubusercontent.com/31331637/42419623-709d6796-82eb-11e8-9d8c-fc5594836bcd.png) It is OK to ignore the 'verify your email notification message at first. This can be implemented at a later stage.
1.0
Update the Signup Page to the new design - # The problem: In order to be able to do Issue #343 we need to modify the Signup page to: - Simplify it - Include the links to the Terms and Conditions and Privacy Policy - Record the fact that the user has accepted our T&Cs and Privacy Policy in Mongo (see #359) The link to Unee-T Privacy Policy and Terms and Condition: https://unee-t.com/privacy-and-terms/ # Current design: ![image](https://user-images.githubusercontent.com/31331637/42419595-db642bce-82ea-11e8-9f04-2fcefa926b21.png) # The design we want: ![image](https://user-images.githubusercontent.com/31331637/42419608-2f7fcf9c-82eb-11e8-8a1b-e4877431ab70.png) # After the user has Created his/her account: We need to send the user to the page where he/she can create his/her first unit. ![image](https://user-images.githubusercontent.com/31331637/42419623-709d6796-82eb-11e8-9d8c-fc5594836bcd.png) It is OK to ignore the 'verify your email notification message at first. This can be implemented at a later stage.
design
update the signup page to the new design the problem in order to be able to do issue we need to modify the signup page to simplify it include the links to the terms and conditions and privacy policy record the fact that the user has accepted our t cs and privacy policy in mongo see the link to unee t privacy policy and terms and condition current design the design we want after the user has created his her account we need to send the user to the page where he she can create his her first unit it is ok to ignore the verify your email notification message at first this can be implemented at a later stage
1
22,305
2,648,683,821
IssuesEvent
2015-03-14 04:38:15
jeffbryner/MozDef
https://api.github.com/repos/jeffbryner/MozDef
closed
WebUI: Incident Veris Stat visualization enhancement
category:enhancement priority:high
Make use of the pivot table library to allow greater filtering/sorting/playing with veris tags for incidents.
1.0
WebUI: Incident Veris Stat visualization enhancement - Make use of the pivot table library to allow greater filtering/sorting/playing with veris tags for incidents.
non_design
webui incident veris stat visualization enhancement make use of the pivot table library to allow greater filtering sorting playing with veris tags for incidents
0
177,393
28,490,645,585
IssuesEvent
2023-04-18 10:59:08
baloise-incubator/design-system
https://api.github.com/repos/baloise-incubator/design-system
closed
Add clear function for form controls
🆕 Enhancement 🎨 Design Support 🧑‍💻 Technical Design System
As user, I want to be able to delete my input in the search field with one click, so that I save time on deleting every single character. See example attached to this ticket. Acceptance criteria: - [ ] Find a way to place a button/icon in input fields in order that the user can delete inputs in a bulk - [ ] Implement solution ![Image](https://user-images.githubusercontent.com/29020214/199977223-946b3bbf-a816-4ef0-87b3-4de8fc881489.png)
2.0
Add clear function for form controls - As user, I want to be able to delete my input in the search field with one click, so that I save time on deleting every single character. See example attached to this ticket. Acceptance criteria: - [ ] Find a way to place a button/icon in input fields in order that the user can delete inputs in a bulk - [ ] Implement solution ![Image](https://user-images.githubusercontent.com/29020214/199977223-946b3bbf-a816-4ef0-87b3-4de8fc881489.png)
design
add clear function for form controls as user i want to be able to delete my input in the search field with one click so that i save time on deleting every single character see example attached to this ticket acceptance criteria find a way to place a button icon in input fields in order that the user can delete inputs in a bulk implement solution
1
76,710
3,491,153,516
IssuesEvent
2016-01-04 14:25:42
ngageoint/hootenanny-ui
https://api.github.com/repos/ngageoint/hootenanny-ui
opened
Source field is overwritten
Category: UI Priority: High Status: New/Undefined Type: Task
On an attribution copy or conflation, the source field is overwritten, not appended to current.
1.0
Source field is overwritten - On an attribution copy or conflation, the source field is overwritten, not appended to current.
non_design
source field is overwritten on an attribution copy or conflation the source field is overwritten not appended to current
0
138,815
20,726,831,506
IssuesEvent
2022-03-14 03:39:43
towhee-io/towhee
https://api.github.com/repos/towhee-io/towhee
closed
[DesignProposal]: Auto-Batching in towhee pipeline inference.
design/proposal
### Background and Motivation Modern machine learning framework(e.g. PyTorch, Tensorflow) could utilize batch inferencing to improve the throughout. While towhee only support inference the data sequentially, leads to a lower GPU occupancy, we need to add batch inferencing to increase the throughout when we need inference a bunch of data. ### Design Generally batch mode would consider in two situations. #### 1 inference a list of data ```python ppl = pipeline('image-embedding') outs = ppl(['1.jpg','2.jpg','3.jpg']) ``` #### 2 inference several data in a period ```python results = [] def callback(output): lock() results.append(output) ppl = pipeline('image-embedding') with ppl.batch_inference(max_latency=100, max_batch_size=4,callback): for i in range(10000): ppl('{}.jpg'.format(i)) ``` ### Pros and Cons _No response_ ### Anything else? (Additional Context) _No response_
1.0
[DesignProposal]: Auto-Batching in towhee pipeline inference. - ### Background and Motivation Modern machine learning framework(e.g. PyTorch, Tensorflow) could utilize batch inferencing to improve the throughout. While towhee only support inference the data sequentially, leads to a lower GPU occupancy, we need to add batch inferencing to increase the throughout when we need inference a bunch of data. ### Design Generally batch mode would consider in two situations. #### 1 inference a list of data ```python ppl = pipeline('image-embedding') outs = ppl(['1.jpg','2.jpg','3.jpg']) ``` #### 2 inference several data in a period ```python results = [] def callback(output): lock() results.append(output) ppl = pipeline('image-embedding') with ppl.batch_inference(max_latency=100, max_batch_size=4,callback): for i in range(10000): ppl('{}.jpg'.format(i)) ``` ### Pros and Cons _No response_ ### Anything else? (Additional Context) _No response_
design
auto batching in towhee pipeline inference background and motivation modern machine learning framework e g pytorch tensorflow could utilize batch inferencing to improve the throughout while towhee only support inference the data sequentially leads to a lower gpu occupancy we need to add batch inferencing to increase the throughout when we need inference a bunch of data design generally batch mode would consider in two situations inference a list of data python ppl pipeline image embedding outs ppl inference several data in a period python results def callback output lock results append output ppl pipeline image embedding with ppl batch inference max latency max batch size callback for i in range ppl jpg format i pros and cons no response anything else additional context no response
1
103,958
8,955,086,126
IssuesEvent
2019-01-26 03:19:21
numpy/numpy
https://api.github.com/repos/numpy/numpy
opened
azure-pipelines broken for 32-bit compiles.
05 - Testing
See https://dev.azure.com/numpy/numpy/_build/results?buildId=1943 <!-- Please describe the issue in detail here, and fill in the fields below --> ### Reproducing code example: <!-- A short code example that reproduces the problem/missing feature. It should be self-contained, i.e., possible to run as-is via 'python myproblem.py' --> ```python import numpy as np << your code here >> ``` <!-- Remove these sections for a feature request --> ### Error message: <!-- If you are reporting a segfault please include a GDB traceback, which you can generate by following https://github.com/numpy/numpy/blob/master/doc/source/dev/development_environment.rst#debugging --> <!-- Full error message, if any (starting from line Traceback: ...) --> ### Numpy/Python version information: <!-- Output from 'import sys, numpy; print(numpy.__version__, sys.version)' -->
1.0
azure-pipelines broken for 32-bit compiles. - See https://dev.azure.com/numpy/numpy/_build/results?buildId=1943 <!-- Please describe the issue in detail here, and fill in the fields below --> ### Reproducing code example: <!-- A short code example that reproduces the problem/missing feature. It should be self-contained, i.e., possible to run as-is via 'python myproblem.py' --> ```python import numpy as np << your code here >> ``` <!-- Remove these sections for a feature request --> ### Error message: <!-- If you are reporting a segfault please include a GDB traceback, which you can generate by following https://github.com/numpy/numpy/blob/master/doc/source/dev/development_environment.rst#debugging --> <!-- Full error message, if any (starting from line Traceback: ...) --> ### Numpy/Python version information: <!-- Output from 'import sys, numpy; print(numpy.__version__, sys.version)' -->
non_design
azure pipelines broken for bit compiles see reproducing code example a short code example that reproduces the problem missing feature it should be self contained i e possible to run as is via python myproblem py python import numpy as np error message if you are reporting a segfault please include a gdb traceback which you can generate by following numpy python version information
0
347,798
31,276,083,541
IssuesEvent
2023-08-22 06:23:13
farhanramzy/upptime
https://api.github.com/repos/farhanramzy/upptime
opened
🛑 Test Broken Site22222222 is down
status test-broken-site22222222
In [`4c4f925`](https://github.com/farhanramzy/upptime/commit/4c4f925bf566f5e111eee664ace2ae77b878661c ), Test Broken Site22222222 (https://thissitedoesnotexist.koj.co) was **down**: - HTTP code: 0 - Response time: 0 ms
1.0
🛑 Test Broken Site22222222 is down - In [`4c4f925`](https://github.com/farhanramzy/upptime/commit/4c4f925bf566f5e111eee664ace2ae77b878661c ), Test Broken Site22222222 (https://thissitedoesnotexist.koj.co) was **down**: - HTTP code: 0 - Response time: 0 ms
non_design
🛑 test broken is down in test broken was down http code response time ms
0
362,444
25,376,331,283
IssuesEvent
2022-11-21 14:22:27
A-Ozmehak/workmethodology---group-3
https://api.github.com/repos/A-Ozmehak/workmethodology---group-3
closed
Set up project with tech stack
documentation Prototype
Needed for this project: - Set up branch and repo protection rules - Install: NextJS, Chakra UI, Typescript and Firebase
1.0
Set up project with tech stack - Needed for this project: - Set up branch and repo protection rules - Install: NextJS, Chakra UI, Typescript and Firebase
non_design
set up project with tech stack needed for this project set up branch and repo protection rules install nextjs chakra ui typescript and firebase
0
165,889
6,287,761,804
IssuesEvent
2017-07-19 15:33:55
edcarroll/ng2-semantic-ui
https://api.github.com/repos/edcarroll/ng2-semantic-ui
closed
bug(popup): view destroyed error on popups
comp: popup priority: important type: bug
There are a few cases I'm getting the below error when navigating away from a page containing a popup. A simple replication for Chrome is in this plunkr http://plnkr.co/edit/4IrG2eK8igIubS2bXN4u Keep clicking the green button quickly, at some point the popup message will flash out then back in, and the cursor will duplicate so there are two cursors side by side by a few pixels. Navigating away by clicking the page2 link will now give the following error ``` App.html:4 ERROR Error: ViewDestroyedError: Attempt to use a destroyed view: detectChanges at viewDestroyedError (VM884 core.umd.js:8475) at Object.debugUpdateDirectives [as updateDirectives] (VM884 core.umd.js:13085) at checkAndUpdateView (VM884 core.umd.js:12268) at callWithDebugContext (VM884 core.umd.js:13488) at Object.debugCheckAndUpdateView [as checkAndUpdateView] (VM884 core.umd.js:13028) at ViewRef_.detectChanges (VM884 core.umd.js:10199) at eval (VM884 core.umd.js:4837) at Array.forEach (<anonymous>) at ApplicationRef_.tick (VM884 core.umd.js:4837) at eval (VM884 core.umd.js:4715) ```
1.0
bug(popup): view destroyed error on popups - There are a few cases I'm getting the below error when navigating away from a page containing a popup. A simple replication for Chrome is in this plunkr http://plnkr.co/edit/4IrG2eK8igIubS2bXN4u Keep clicking the green button quickly, at some point the popup message will flash out then back in, and the cursor will duplicate so there are two cursors side by side by a few pixels. Navigating away by clicking the page2 link will now give the following error ``` App.html:4 ERROR Error: ViewDestroyedError: Attempt to use a destroyed view: detectChanges at viewDestroyedError (VM884 core.umd.js:8475) at Object.debugUpdateDirectives [as updateDirectives] (VM884 core.umd.js:13085) at checkAndUpdateView (VM884 core.umd.js:12268) at callWithDebugContext (VM884 core.umd.js:13488) at Object.debugCheckAndUpdateView [as checkAndUpdateView] (VM884 core.umd.js:13028) at ViewRef_.detectChanges (VM884 core.umd.js:10199) at eval (VM884 core.umd.js:4837) at Array.forEach (<anonymous>) at ApplicationRef_.tick (VM884 core.umd.js:4837) at eval (VM884 core.umd.js:4715) ```
non_design
bug popup view destroyed error on popups there are a few cases i m getting the below error when navigating away from a page containing a popup a simple replication for chrome is in this plunkr keep clicking the green button quickly at some point the popup message will flash out then back in and the cursor will duplicate so there are two cursors side by side by a few pixels navigating away by clicking the link will now give the following error app html error error viewdestroyederror attempt to use a destroyed view detectchanges at viewdestroyederror core umd js at object debugupdatedirectives core umd js at checkandupdateview core umd js at callwithdebugcontext core umd js at object debugcheckandupdateview core umd js at viewref detectchanges core umd js at eval core umd js at array foreach at applicationref tick core umd js at eval core umd js
0
371,924
25,973,172,693
IssuesEvent
2022-12-19 12:57:36
alanluqman/RecipeApp
https://api.github.com/repos/alanluqman/RecipeApp
opened
Setup Kanban board
documentation
### Project : > RecipeApp ### Team Member : > 2 people (@alanluqman , @gordonOtieno) ## Project Description In this Project, my partner and I are working to build a Recipe App
1.0
Setup Kanban board - ### Project : > RecipeApp ### Team Member : > 2 people (@alanluqman , @gordonOtieno) ## Project Description In this Project, my partner and I are working to build a Recipe App
non_design
setup kanban board project recipeapp team member people alanluqman gordonotieno project description in this project my partner and i are working to build a recipe app
0
174,138
6,537,032,045
IssuesEvent
2017-08-31 20:35:43
redox-os/ion
https://api.github.com/repos/redox-os/ion
closed
src/parser/shell_expand/mod.rs:277 is reachable
bug high-priority
**Reproduction**: [describe how you are able to reproduce ("trigger") this bug/issue.] ``` let PROMPT = "${USER}@${PWD} (${git::branch})" thread 'main' panicked at 'internal error: entered unreachable code', src/parser/shell_expand/mod.rs:277 note: Run with `RUST_BACKTRACE=1` for a backtrace. ``` see the `@${PWD}` which should have been `\@${PWD}`, but I forgot to backslash it. **Expected behavior**: [describe the behavior you would expect the repro to yield.] no crash **Actual behavior**: [describe the actual behavior, which is presented through the repro.]. **Build information**: [output of `rustc -V`, `git rev-parse HEAD`, `qemu-i386 -version`, `uname -a`, etc.] $ git rev-parse HEAD d144f190bdc3fda5760333896fb4511728010326 **Blocking/related**: [issues or PRs blocking or being related to this issue.] **Misc**: [optional: for other relevant information that should be known or cannot be described in the other fields.] ------ _If the above does not fit the nature of the issue feel free to modify it._
1.0
src/parser/shell_expand/mod.rs:277 is reachable - **Reproduction**: [describe how you are able to reproduce ("trigger") this bug/issue.] ``` let PROMPT = "${USER}@${PWD} (${git::branch})" thread 'main' panicked at 'internal error: entered unreachable code', src/parser/shell_expand/mod.rs:277 note: Run with `RUST_BACKTRACE=1` for a backtrace. ``` see the `@${PWD}` which should have been `\@${PWD}`, but I forgot to backslash it. **Expected behavior**: [describe the behavior you would expect the repro to yield.] no crash **Actual behavior**: [describe the actual behavior, which is presented through the repro.]. **Build information**: [output of `rustc -V`, `git rev-parse HEAD`, `qemu-i386 -version`, `uname -a`, etc.] $ git rev-parse HEAD d144f190bdc3fda5760333896fb4511728010326 **Blocking/related**: [issues or PRs blocking or being related to this issue.] **Misc**: [optional: for other relevant information that should be known or cannot be described in the other fields.] ------ _If the above does not fit the nature of the issue feel free to modify it._
non_design
src parser shell expand mod rs is reachable reproduction let prompt user pwd git branch thread main panicked at internal error entered unreachable code src parser shell expand mod rs note run with rust backtrace for a backtrace see the pwd which should have been pwd but i forgot to backslash it expected behavior no crash actual behavior build information git rev parse head blocking related misc if the above does not fit the nature of the issue feel free to modify it
0
63,883
7,750,785,581
IssuesEvent
2018-05-30 15:12:38
ParabolInc/action
https://api.github.com/repos/ParabolInc/action
closed
Meeting overview, first-time check in question
design enhancement icebox
## Issue - Enhancement Some of our questions are a little esoteric for some users. @tayamueller and I observed folks being stymied by "Heard any good advice lately?" Underlying this, the user doesn't understand the purpose of the check-in round, and how that question relates. We might need a one-time modal that's like "this is your first meeting, here's what's going to happen," then when they hit check-in round using the most generic question ever, "what is on your mind, that might be keeping you from being fully present?" - **Estimated effort:** 15 points ([see CONTRIBUTING.md](https://github.com/ParabolInc/action/blob/master/CONTRIBUTING.md#points-and-sizes))
1.0
Meeting overview, first-time check in question - ## Issue - Enhancement Some of our questions are a little esoteric for some users. @tayamueller and I observed folks being stymied by "Heard any good advice lately?" Underlying this, the user doesn't understand the purpose of the check-in round, and how that question relates. We might need a one-time modal that's like "this is your first meeting, here's what's going to happen," then when they hit check-in round using the most generic question ever, "what is on your mind, that might be keeping you from being fully present?" - **Estimated effort:** 15 points ([see CONTRIBUTING.md](https://github.com/ParabolInc/action/blob/master/CONTRIBUTING.md#points-and-sizes))
design
meeting overview first time check in question issue enhancement some of our questions are a little esoteric for some users tayamueller and i observed folks being stymied by heard any good advice lately underlying this the user doesn t understand the purpose of the check in round and how that question relates we might need a one time modal that s like this is your first meeting here s what s going to happen then when they hit check in round using the most generic question ever what is on your mind that might be keeping you from being fully present estimated effort points
1
155,428
12,255,301,332
IssuesEvent
2020-05-06 09:58:02
elastic/elasticsearch
https://api.github.com/repos/elastic/elasticsearch
opened
TransformSurvivesUpgradeIT#testTransformRollingUpgrade failures
:ml/Transform >test-failure
This has failed three times in the last 8 hours: https://build-stats.elastic.co/app/kibana#/discover?_g=(refreshInterval:(pause:!t,value:0),time:(from:now-12h,mode:quick,to:now))&_a=(columns:!(summary,branch,build-id,stacktrace),index:e58bf320-7efd-11e8-bf69-63c8ef516157,interval:auto,query:(language:lucene,query:testTransformRollingUpgrade),sort:!(time,desc)) The error is ``` org.elasticsearch.upgrades.TransformSurvivesUpgradeIT > testTransformRollingUpgrade FAILED java.lang.AssertionError: Expected: a value greater than <2L> but: <0L> was less than <2L> at __randomizedtesting.SeedInfo.seed([812C8143CCB7B352:2E51B4FA67F16096]:0) at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18) at org.junit.Assert.assertThat(Assert.java:956) at org.junit.Assert.assertThat(Assert.java:923) at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.lambda$waitUntilAfterCheckpoint$11(TransformSurvivesUpgradeIT.java:342) at org.elasticsearch.test.ESTestCase.assertBusy(ESTestCase.java:892) at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.waitUntilAfterCheckpoint(TransformSurvivesUpgradeIT.java:342) at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.verifyContinuousTransformHandlesData(TransformSurvivesUpgradeIT.java:231) at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.testTransformRollingUpgrade(TransformSurvivesUpgradeIT.java:150) ``` ``` REPRODUCE WITH: ./gradlew ':x-pack:qa:rolling-upgrade:v7.8.0#twoThirdsUpgradedTest' --tests "org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.testTransformRollingUpgrade" -Dtests.seed=812C8143CCB7B352 -Dtests.security.manager=true -Dbuild.snapshot=false -Dtests.jvm.argline="-Dbuild.snapshot=false" -Dtests.locale=lt-LT -Dtests.timezone=America/Rainy_River -Dcompiler.java=14 -Druntime.java=11 ``` I will mute it for now
1.0
TransformSurvivesUpgradeIT#testTransformRollingUpgrade failures - This has failed three times in the last 8 hours: https://build-stats.elastic.co/app/kibana#/discover?_g=(refreshInterval:(pause:!t,value:0),time:(from:now-12h,mode:quick,to:now))&_a=(columns:!(summary,branch,build-id,stacktrace),index:e58bf320-7efd-11e8-bf69-63c8ef516157,interval:auto,query:(language:lucene,query:testTransformRollingUpgrade),sort:!(time,desc)) The error is ``` org.elasticsearch.upgrades.TransformSurvivesUpgradeIT > testTransformRollingUpgrade FAILED java.lang.AssertionError: Expected: a value greater than <2L> but: <0L> was less than <2L> at __randomizedtesting.SeedInfo.seed([812C8143CCB7B352:2E51B4FA67F16096]:0) at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18) at org.junit.Assert.assertThat(Assert.java:956) at org.junit.Assert.assertThat(Assert.java:923) at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.lambda$waitUntilAfterCheckpoint$11(TransformSurvivesUpgradeIT.java:342) at org.elasticsearch.test.ESTestCase.assertBusy(ESTestCase.java:892) at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.waitUntilAfterCheckpoint(TransformSurvivesUpgradeIT.java:342) at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.verifyContinuousTransformHandlesData(TransformSurvivesUpgradeIT.java:231) at org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.testTransformRollingUpgrade(TransformSurvivesUpgradeIT.java:150) ``` ``` REPRODUCE WITH: ./gradlew ':x-pack:qa:rolling-upgrade:v7.8.0#twoThirdsUpgradedTest' --tests "org.elasticsearch.upgrades.TransformSurvivesUpgradeIT.testTransformRollingUpgrade" -Dtests.seed=812C8143CCB7B352 -Dtests.security.manager=true -Dbuild.snapshot=false -Dtests.jvm.argline="-Dbuild.snapshot=false" -Dtests.locale=lt-LT -Dtests.timezone=America/Rainy_River -Dcompiler.java=14 -Druntime.java=11 ``` I will mute it for now
non_design
transformsurvivesupgradeit testtransformrollingupgrade failures this has failed three times in the last hours the error is org elasticsearch upgrades transformsurvivesupgradeit testtransformrollingupgrade failed java lang assertionerror expected a value greater than but was less than at randomizedtesting seedinfo seed at org hamcrest matcherassert assertthat matcherassert java at org junit assert assertthat assert java at org junit assert assertthat assert java at org elasticsearch upgrades transformsurvivesupgradeit lambda waituntilaftercheckpoint transformsurvivesupgradeit java at org elasticsearch test estestcase assertbusy estestcase java at org elasticsearch upgrades transformsurvivesupgradeit waituntilaftercheckpoint transformsurvivesupgradeit java at org elasticsearch upgrades transformsurvivesupgradeit verifycontinuoustransformhandlesdata transformsurvivesupgradeit java at org elasticsearch upgrades transformsurvivesupgradeit testtransformrollingupgrade transformsurvivesupgradeit java reproduce with gradlew x pack qa rolling upgrade twothirdsupgradedtest tests org elasticsearch upgrades transformsurvivesupgradeit testtransformrollingupgrade dtests seed dtests security manager true dbuild snapshot false dtests jvm argline dbuild snapshot false dtests locale lt lt dtests timezone america rainy river dcompiler java druntime java i will mute it for now
0
146,870
23,135,528,079
IssuesEvent
2022-07-28 14:03:00
w3c/wai-aria-practices
https://api.github.com/repos/w3c/wai-aria-practices
closed
Example Pages: Documentation tables have potential F24 failure
bug Feedback Site Design
Not sure if it's a WCAG failure (F24) but Firefox uses my custom colors settings instead of rendering the text black although I've not overridden default color with mine. ![image](https://user-images.githubusercontent.com/6073336/172552557-c4f12dfe-cacf-422c-91c3-bdc921b46a6c.png) The problem comes from the fact that the color of the text is set with `color: initial;` ``` table.data td, table.data th, table.index td, table.index th, table.widget-features td, table.widget-features th { […] color: initial; } ``` Setting the rule to `color: inherit;` fixes it. See MDN: > On [inherited properties](https://developer.mozilla.org/en-US/docs/Web/CSS/inheritance#inherited_properties), the initial value may be unexpected. You should consider using the [inherit](https://developer.mozilla.org/en-US/docs/Web/CSS/inherit), [unset](https://developer.mozilla.org/en-US/docs/Web/CSS/unset), [revert](https://developer.mozilla.org/en-US/docs/Web/CSS/revert), or [revert-layer](https://developer.mozilla.org/en-US/docs/Web/CSS/revert-layer) keywords instead.
1.0
Example Pages: Documentation tables have potential F24 failure - Not sure if it's a WCAG failure (F24) but Firefox uses my custom colors settings instead of rendering the text black although I've not overridden default color with mine. ![image](https://user-images.githubusercontent.com/6073336/172552557-c4f12dfe-cacf-422c-91c3-bdc921b46a6c.png) The problem comes from the fact that the color of the text is set with `color: initial;` ``` table.data td, table.data th, table.index td, table.index th, table.widget-features td, table.widget-features th { […] color: initial; } ``` Setting the rule to `color: inherit;` fixes it. See MDN: > On [inherited properties](https://developer.mozilla.org/en-US/docs/Web/CSS/inheritance#inherited_properties), the initial value may be unexpected. You should consider using the [inherit](https://developer.mozilla.org/en-US/docs/Web/CSS/inherit), [unset](https://developer.mozilla.org/en-US/docs/Web/CSS/unset), [revert](https://developer.mozilla.org/en-US/docs/Web/CSS/revert), or [revert-layer](https://developer.mozilla.org/en-US/docs/Web/CSS/revert-layer) keywords instead.
design
example pages documentation tables have potential failure not sure if it s a wcag failure but firefox uses my custom colors settings instead of rendering the text black although i ve not overridden default color with mine the problem comes from the fact that the color of the text is set with color initial table data td table data th table index td table index th table widget features td table widget features th color initial setting the rule to color inherit fixes it see mdn on the initial value may be unexpected you should consider using the or keywords instead
1
94,100
27,113,438,309
IssuesEvent
2023-02-15 16:49:20
opensafely-core/databuilder
https://api.github.com/repos/opensafely-core/databuilder
closed
Improve efficiency of generative tests by making them series-type-aware
databuilder-1
- [x] Agree design - [x] Extend new approach to all node types we currently support - [ ] Experiment to see how long it now takes to generate all nodes types; can we do this as part of the standard build? - [ ] If the answer to the last question is no, can we instead reduce the number of examples in the standard build to speed up the tests?
1.0
Improve efficiency of generative tests by making them series-type-aware - - [x] Agree design - [x] Extend new approach to all node types we currently support - [ ] Experiment to see how long it now takes to generate all nodes types; can we do this as part of the standard build? - [ ] If the answer to the last question is no, can we instead reduce the number of examples in the standard build to speed up the tests?
non_design
improve efficiency of generative tests by making them series type aware agree design extend new approach to all node types we currently support experiment to see how long it now takes to generate all nodes types can we do this as part of the standard build if the answer to the last question is no can we instead reduce the number of examples in the standard build to speed up the tests
0
139,247
20,817,767,691
IssuesEvent
2022-03-18 12:20:28
geneontology/go-ontology
https://api.github.com/repos/geneontology/go-ontology
reopened
Change relation for transporters
design pattern logical definitions relations
Hello, In yesterday's ontology call, it was decided to use 'has primary input' for transporters, rather than 'transports or maintains localization of'. @vanaukenk @ukemi We need to discuss the plan to retrofit existing annotations Thanks, Pascale
1.0
Change relation for transporters - Hello, In yesterday's ontology call, it was decided to use 'has primary input' for transporters, rather than 'transports or maintains localization of'. @vanaukenk @ukemi We need to discuss the plan to retrofit existing annotations Thanks, Pascale
design
change relation for transporters hello in yesterday s ontology call it was decided to use has primary input for transporters rather than transports or maintains localization of vanaukenk ukemi we need to discuss the plan to retrofit existing annotations thanks pascale
1
119,971
15,683,917,071
IssuesEvent
2021-03-25 09:22:59
flutter/flutter
https://api.github.com/repos/flutter/flutter
closed
Material Palette Icon size discrepancy
a: quality f: material design found in release: 1.24 framework has reproducible steps
Icon size btw `Icons.palette_outlined` and `Icons.palette` is different. Here is a short ![ezgif-3-78215d73e25e](https://user-images.githubusercontent.com/25743901/99397273-bd5e7d80-28da-11eb-9f5b-44bbe3dff475.gif) **Expected results:** <!-- what did you want to see? --> Expected is both, the outline and the filled to be of the same size such as lightbulb or favorite icons are. **Actual results:** <!-- what did you see? --> filled icon is smaller than the outlined one even though both are set to be the same size: 32 <details><summary>Min repro code</summary> ```dart import 'package:flutter/material.dart'; void main() { runApp(AmbeeApp()); } class AmbeeApp extends StatelessWidget { @override Widget build(BuildContext context) { return MaterialApp( title: 'Ambee 2.0', home: TabBarScreen(), ); } } /// This is the stateful widget that the main application instantiates. class TabBarScreen extends StatefulWidget { @override _TabBarScreenState createState() => _TabBarScreenState(); } /// This is the private State class that goes with MyStatefulWidget. class _TabBarScreenState extends State<TabBarScreen> { int _selectedIndex = 0; static const TextStyle optionStyle = TextStyle(fontSize: 30, fontWeight: FontWeight.bold); static const List<Widget> _widgetOptions = <Widget>[ Text( 'Index 0: Discover', style: optionStyle, ), Text( 'Index 1: Favorites', style: optionStyle, ), Text( 'Index 2: Lights', style: optionStyle, ), ]; void _onItemTapped(int index) { setState(() { _selectedIndex = index; }); } @override Widget build(BuildContext context) { return Scaffold( body: Center( child: _widgetOptions.elementAt(_selectedIndex), ), bottomNavigationBar: BottomNavigationBar( items: const <BottomNavigationBarItem>[ BottomNavigationBarItem( icon: Icon(Icons.palette_outlined), activeIcon: Icon(Icons.palette), label: 'Discover', ), BottomNavigationBarItem( icon: Icon(Icons.favorite_outline), activeIcon: Icon(Icons.favorite), label: 'Favorites', ), BottomNavigationBarItem( icon: Icon(Icons.lightbulb_outline), activeIcon: Icon(Icons.lightbulb), label: 'Lights', ), ], currentIndex: _selectedIndex, selectedItemColor: Colors.amber[800], iconSize: 32, selectedFontSize: 12, unselectedFontSize: 12, onTap: _onItemTapped, ), ); } } ``` </details> <details> <summary>Logs</summary> <!-- Run your application with `flutter run --verbose` and attach all the log output below between the lines with the backticks. If there is an exception, please see if the error message includes enough information to explain how to solve the issue. --> ``` ``` <!-- Run `flutter analyze` and attach any output of that command below. If there are any analysis errors, try resolving them before filing this issue. --> ``` ``` <!-- Finally, paste the output of running `flutter doctor -v` here. --> ``` [✓] Flutter (Channel master, 1.24.0-8.0.pre.251, on macOS 11.0.1 20B29 darwin-x64, locale es-ES) • Flutter version 1.24.0-8.0.pre.251 at /Users/tomas/code/flutter • Framework revision 836efaecf0 (3 days ago), 2020-11-13 21:51:04 -0800 • Engine revision e06f106385 • Dart version 2.12.0 (build 2.12.0-40.0.dev) [✗] Android toolchain - develop for Android devices ✗ Unable to locate Android SDK. Install Android Studio from: https://developer.android.com/studio/index.html On first launch it will assist you in installing the Android SDK components. (or visit https://flutter.dev/docs/get-started/install/macos#android-setup for detailed instructions). If the Android SDK has been installed to a custom location, please use `flutter config --android-sdk` to update to that location. [!] Xcode - develop for iOS and macOS (Xcode 12.2) • Xcode at /Applications/Xcode.app/Contents/Developer • Xcode 12.2, Build version 12B45b ✗ CocoaPods not installed. CocoaPods is used to retrieve the iOS and macOS platform side's plugin code that responds to your plugin usage on the Dart side. Without CocoaPods, plugins will not work on iOS or macOS. For more info, see https://flutter.dev/platform-plugins To install see https://guides.cocoapods.org/using/getting-started.html#installation for instructions. [!] Android Studio (not installed) • Android Studio not found; download from https://developer.android.com/studio/index.html (or visit https://flutter.dev/docs/get-started/install/macos#android-setup for detailed instructions). [✓] VS Code (version 1.51.1) • VS Code at /Applications/Visual Studio Code.app/Contents • Flutter extension version 3.16.0 [✓] Connected device (2 available) • iPhone (mobile) • 00008020-000415840E50003A • ios • iOS 14.2 • iPhone 12 Pro Max (mobile) • CF12B78D-3231-44DD-B217-A38E4A68588B • ios • com.apple.CoreSimulator.SimRuntime.iOS-14-2 (simulator) ! Doctor found issues in 3 categories. ``` </details>
1.0
Material Palette Icon size discrepancy - Icon size btw `Icons.palette_outlined` and `Icons.palette` is different. Here is a short ![ezgif-3-78215d73e25e](https://user-images.githubusercontent.com/25743901/99397273-bd5e7d80-28da-11eb-9f5b-44bbe3dff475.gif) **Expected results:** <!-- what did you want to see? --> Expected is both, the outline and the filled to be of the same size such as lightbulb or favorite icons are. **Actual results:** <!-- what did you see? --> filled icon is smaller than the outlined one even though both are set to be the same size: 32 <details><summary>Min repro code</summary> ```dart import 'package:flutter/material.dart'; void main() { runApp(AmbeeApp()); } class AmbeeApp extends StatelessWidget { @override Widget build(BuildContext context) { return MaterialApp( title: 'Ambee 2.0', home: TabBarScreen(), ); } } /// This is the stateful widget that the main application instantiates. class TabBarScreen extends StatefulWidget { @override _TabBarScreenState createState() => _TabBarScreenState(); } /// This is the private State class that goes with MyStatefulWidget. class _TabBarScreenState extends State<TabBarScreen> { int _selectedIndex = 0; static const TextStyle optionStyle = TextStyle(fontSize: 30, fontWeight: FontWeight.bold); static const List<Widget> _widgetOptions = <Widget>[ Text( 'Index 0: Discover', style: optionStyle, ), Text( 'Index 1: Favorites', style: optionStyle, ), Text( 'Index 2: Lights', style: optionStyle, ), ]; void _onItemTapped(int index) { setState(() { _selectedIndex = index; }); } @override Widget build(BuildContext context) { return Scaffold( body: Center( child: _widgetOptions.elementAt(_selectedIndex), ), bottomNavigationBar: BottomNavigationBar( items: const <BottomNavigationBarItem>[ BottomNavigationBarItem( icon: Icon(Icons.palette_outlined), activeIcon: Icon(Icons.palette), label: 'Discover', ), BottomNavigationBarItem( icon: Icon(Icons.favorite_outline), activeIcon: Icon(Icons.favorite), label: 'Favorites', ), BottomNavigationBarItem( icon: Icon(Icons.lightbulb_outline), activeIcon: Icon(Icons.lightbulb), label: 'Lights', ), ], currentIndex: _selectedIndex, selectedItemColor: Colors.amber[800], iconSize: 32, selectedFontSize: 12, unselectedFontSize: 12, onTap: _onItemTapped, ), ); } } ``` </details> <details> <summary>Logs</summary> <!-- Run your application with `flutter run --verbose` and attach all the log output below between the lines with the backticks. If there is an exception, please see if the error message includes enough information to explain how to solve the issue. --> ``` ``` <!-- Run `flutter analyze` and attach any output of that command below. If there are any analysis errors, try resolving them before filing this issue. --> ``` ``` <!-- Finally, paste the output of running `flutter doctor -v` here. --> ``` [✓] Flutter (Channel master, 1.24.0-8.0.pre.251, on macOS 11.0.1 20B29 darwin-x64, locale es-ES) • Flutter version 1.24.0-8.0.pre.251 at /Users/tomas/code/flutter • Framework revision 836efaecf0 (3 days ago), 2020-11-13 21:51:04 -0800 • Engine revision e06f106385 • Dart version 2.12.0 (build 2.12.0-40.0.dev) [✗] Android toolchain - develop for Android devices ✗ Unable to locate Android SDK. Install Android Studio from: https://developer.android.com/studio/index.html On first launch it will assist you in installing the Android SDK components. (or visit https://flutter.dev/docs/get-started/install/macos#android-setup for detailed instructions). If the Android SDK has been installed to a custom location, please use `flutter config --android-sdk` to update to that location. [!] Xcode - develop for iOS and macOS (Xcode 12.2) • Xcode at /Applications/Xcode.app/Contents/Developer • Xcode 12.2, Build version 12B45b ✗ CocoaPods not installed. CocoaPods is used to retrieve the iOS and macOS platform side's plugin code that responds to your plugin usage on the Dart side. Without CocoaPods, plugins will not work on iOS or macOS. For more info, see https://flutter.dev/platform-plugins To install see https://guides.cocoapods.org/using/getting-started.html#installation for instructions. [!] Android Studio (not installed) • Android Studio not found; download from https://developer.android.com/studio/index.html (or visit https://flutter.dev/docs/get-started/install/macos#android-setup for detailed instructions). [✓] VS Code (version 1.51.1) • VS Code at /Applications/Visual Studio Code.app/Contents • Flutter extension version 3.16.0 [✓] Connected device (2 available) • iPhone (mobile) • 00008020-000415840E50003A • ios • iOS 14.2 • iPhone 12 Pro Max (mobile) • CF12B78D-3231-44DD-B217-A38E4A68588B • ios • com.apple.CoreSimulator.SimRuntime.iOS-14-2 (simulator) ! Doctor found issues in 3 categories. ``` </details>
design
material palette icon size discrepancy icon size btw icons palette outlined and icons palette is different here is a short expected results expected is both the outline and the filled to be of the same size such as lightbulb or favorite icons are actual results filled icon is smaller than the outlined one even though both are set to be the same size min repro code dart import package flutter material dart void main runapp ambeeapp class ambeeapp extends statelesswidget override widget build buildcontext context return materialapp title ambee home tabbarscreen this is the stateful widget that the main application instantiates class tabbarscreen extends statefulwidget override tabbarscreenstate createstate tabbarscreenstate this is the private state class that goes with mystatefulwidget class tabbarscreenstate extends state int selectedindex static const textstyle optionstyle textstyle fontsize fontweight fontweight bold static const list widgetoptions text index discover style optionstyle text index favorites style optionstyle text index lights style optionstyle void onitemtapped int index setstate selectedindex index override widget build buildcontext context return scaffold body center child widgetoptions elementat selectedindex bottomnavigationbar bottomnavigationbar items const bottomnavigationbaritem icon icon icons palette outlined activeicon icon icons palette label discover bottomnavigationbaritem icon icon icons favorite outline activeicon icon icons favorite label favorites bottomnavigationbaritem icon icon icons lightbulb outline activeicon icon icons lightbulb label lights currentindex selectedindex selecteditemcolor colors amber iconsize selectedfontsize unselectedfontsize ontap onitemtapped logs run your application with flutter run verbose and attach all the log output below between the lines with the backticks if there is an exception please see if the error message includes enough information to explain how to solve the issue run flutter analyze and attach any output of that command below if there are any analysis errors try resolving them before filing this issue flutter channel master pre on macos darwin locale es es • flutter version pre at users tomas code flutter • framework revision days ago • engine revision • dart version build dev android toolchain develop for android devices ✗ unable to locate android sdk install android studio from on first launch it will assist you in installing the android sdk components or visit for detailed instructions if the android sdk has been installed to a custom location please use flutter config android sdk to update to that location xcode develop for ios and macos xcode • xcode at applications xcode app contents developer • xcode build version ✗ cocoapods not installed cocoapods is used to retrieve the ios and macos platform side s plugin code that responds to your plugin usage on the dart side without cocoapods plugins will not work on ios or macos for more info see to install see for instructions android studio not installed • android studio not found download from or visit for detailed instructions vs code version • vs code at applications visual studio code app contents • flutter extension version connected device available • iphone mobile • • ios • ios • iphone pro max mobile • • ios • com apple coresimulator simruntime ios simulator doctor found issues in categories
1
27,761
4,065,104,392
IssuesEvent
2016-05-26 09:49:12
oSlashStudio/Faux-G
https://api.github.com/repos/oSlashStudio/Faux-G
opened
The laser sight on crosshair cannot be colored red
design question
The crosshair itself is colored green but the laser sight need to be in red.
1.0
The laser sight on crosshair cannot be colored red - The crosshair itself is colored green but the laser sight need to be in red.
design
the laser sight on crosshair cannot be colored red the crosshair itself is colored green but the laser sight need to be in red
1
74,777
9,115,480,914
IssuesEvent
2019-02-22 05:13:02
aspnet/AspNetCore
https://api.github.com/repos/aspnet/AspNetCore
closed
Inifinite loop during model binding when using [ModelBinder] attribute
2 - Working PRI: 1 - Required area-mvc enhancement feature-Model-Binding needs design
#### Is this a Bug or Feature request?: Bug #### Steps to reproduce (preferably a link to a GitHub repo with a repro project): Link to repro: https://github.com/Costo/aspnetcore-binding-bug * Run project with `dotnet run` * Go to https://localhost:5001 * Submit the Form Expected result: * Form is submitted and server responds with 200 OK Actual result: * Server never responds. If you attach a debugger and add a breakpoint to `NumberModelBinder.BindModelAsync`, you can see that the program is in an inifinite loop (see screenshot below). ![](https://raw.githubusercontent.com/Costo/aspnetcore-binding-bug/master/screenshot.png) #### Description of the problem: The problem occurs when using a custom Model Binder for a decimal property in this model: ```cs public class TestModel { public TestInnerModel[] InnerModels { get; set; } = new TestInnerModel[0]; } public class TestInnerModel { public TestInnerModel() { } [ModelBinder(BinderType = typeof(NumberModelBinder))] public decimal Rate { get; set; } } ``` During a POST, it seems that model binding is stuck in an infinite loop in [CollectionModelBinder](https://github.com/aspnet/Mvc/blob/5ed7658bf221fe136d8cedafe4c3466ed19726a3/src/Microsoft.AspNetCore.Mvc.Core/ModelBinding/Binders/CollectionModelBinder.cs#L340) The code of the `NumberModelBinder` class is actually the code of [DecimalModelBinder](https://github.com/aspnet/Mvc/blob/master/src/Microsoft.AspNetCore.Mvc.Core/ModelBinding/Binders/DecimalModelBinder.cs), with internal logging code stripped out, so nothing out of the ordinary. If the `[ModelBinder]` attribute is removed, the application works fine. #### Version of `Microsoft.AspNetCore.Mvc` or `Microsoft.AspNetCore.App` or `Microsoft.AspNetCore.All`: `netcoreapp2.1` or `netcoreapp2.2` with SDK `2.2.100-preview3-009430`
1.0
Inifinite loop during model binding when using [ModelBinder] attribute - #### Is this a Bug or Feature request?: Bug #### Steps to reproduce (preferably a link to a GitHub repo with a repro project): Link to repro: https://github.com/Costo/aspnetcore-binding-bug * Run project with `dotnet run` * Go to https://localhost:5001 * Submit the Form Expected result: * Form is submitted and server responds with 200 OK Actual result: * Server never responds. If you attach a debugger and add a breakpoint to `NumberModelBinder.BindModelAsync`, you can see that the program is in an inifinite loop (see screenshot below). ![](https://raw.githubusercontent.com/Costo/aspnetcore-binding-bug/master/screenshot.png) #### Description of the problem: The problem occurs when using a custom Model Binder for a decimal property in this model: ```cs public class TestModel { public TestInnerModel[] InnerModels { get; set; } = new TestInnerModel[0]; } public class TestInnerModel { public TestInnerModel() { } [ModelBinder(BinderType = typeof(NumberModelBinder))] public decimal Rate { get; set; } } ``` During a POST, it seems that model binding is stuck in an infinite loop in [CollectionModelBinder](https://github.com/aspnet/Mvc/blob/5ed7658bf221fe136d8cedafe4c3466ed19726a3/src/Microsoft.AspNetCore.Mvc.Core/ModelBinding/Binders/CollectionModelBinder.cs#L340) The code of the `NumberModelBinder` class is actually the code of [DecimalModelBinder](https://github.com/aspnet/Mvc/blob/master/src/Microsoft.AspNetCore.Mvc.Core/ModelBinding/Binders/DecimalModelBinder.cs), with internal logging code stripped out, so nothing out of the ordinary. If the `[ModelBinder]` attribute is removed, the application works fine. #### Version of `Microsoft.AspNetCore.Mvc` or `Microsoft.AspNetCore.App` or `Microsoft.AspNetCore.All`: `netcoreapp2.1` or `netcoreapp2.2` with SDK `2.2.100-preview3-009430`
design
inifinite loop during model binding when using attribute is this a bug or feature request bug steps to reproduce preferably a link to a github repo with a repro project link to repro run project with dotnet run go to submit the form expected result form is submitted and server responds with ok actual result server never responds if you attach a debugger and add a breakpoint to numbermodelbinder bindmodelasync you can see that the program is in an inifinite loop see screenshot below description of the problem the problem occurs when using a custom model binder for a decimal property in this model cs public class testmodel public testinnermodel innermodels get set new testinnermodel public class testinnermodel public testinnermodel public decimal rate get set during a post it seems that model binding is stuck in an infinite loop in the code of the numbermodelbinder class is actually the code of with internal logging code stripped out so nothing out of the ordinary if the attribute is removed the application works fine version of microsoft aspnetcore mvc or microsoft aspnetcore app or microsoft aspnetcore all or with sdk
1
28,943
4,151,569,021
IssuesEvent
2016-06-15 21:02:10
jondaiello/jondaiello-com
https://api.github.com/repos/jondaiello/jondaiello-com
closed
Update Blockquote style
design
``` .article-content blockquote { margin-left: -224px; width: 100vw; padding-left: 1.5em; padding-right: 1.5em; background: #f5f5f5; padding: .2em 1.5em; margin-top: .5em; margin-bottom: .5em; } blockquote { color: #aaa; /* or color: #999; */ } ```
1.0
Update Blockquote style - ``` .article-content blockquote { margin-left: -224px; width: 100vw; padding-left: 1.5em; padding-right: 1.5em; background: #f5f5f5; padding: .2em 1.5em; margin-top: .5em; margin-bottom: .5em; } blockquote { color: #aaa; /* or color: #999; */ } ```
design
update blockquote style article content blockquote margin left width padding left padding right background padding margin top margin bottom blockquote color aaa or color
1
365,565
25,542,177,927
IssuesEvent
2022-11-29 16:02:41
celestiaorg/docs
https://api.github.com/repos/celestiaorg/docs
closed
Tutorial on Running an Ethermint-Tendermint Node
documentation
[Running an Astria Node](https://github.com/celestiaorg/ephemeral-cluster/blob/main/docker/ethermint/ethermint-docker-compose.yml) * Wait on this [PR](https://github.com/celestiaorg/ephemeral-cluster/pull/23) [Script](https://github.com/celestiaorg/ephemeral-cluster/blob/main/scripts/minimal-ethermint.sh) * Set the version of Ethermint via a flag * `export ETHERMINT_IMAGE_TAG=sha-02075c6` * https://github.com/celestiaorg/ethermint/pkgs/container/ethermint * https://github.com/celestiaorg/ephemeral-cluster#ephemeral-cluster
1.0
Tutorial on Running an Ethermint-Tendermint Node - [Running an Astria Node](https://github.com/celestiaorg/ephemeral-cluster/blob/main/docker/ethermint/ethermint-docker-compose.yml) * Wait on this [PR](https://github.com/celestiaorg/ephemeral-cluster/pull/23) [Script](https://github.com/celestiaorg/ephemeral-cluster/blob/main/scripts/minimal-ethermint.sh) * Set the version of Ethermint via a flag * `export ETHERMINT_IMAGE_TAG=sha-02075c6` * https://github.com/celestiaorg/ethermint/pkgs/container/ethermint * https://github.com/celestiaorg/ephemeral-cluster#ephemeral-cluster
non_design
tutorial on running an ethermint tendermint node wait on this set the version of ethermint via a flag export ethermint image tag sha
0
801,443
28,489,201,878
IssuesEvent
2023-04-18 10:01:27
googleapis/java-spanner-jdbc
https://api.github.com/repos/googleapis/java-spanner-jdbc
opened
spanner.jdbc.it.ITJdbcPgDatabaseMetaDataTest: testGetExportedKeys failed
priority: p1 type: bug flakybot: issue
Note: #813 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky. ---- commit: 76fc16a7651120ac019ad13ca2c2e4bccd2bd7a1 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/3a5befd1-d3c8-4987-86b1-a2e6c980b527), [Sponge](http://sponge2/3a5befd1-d3c8-4987-86b1-a2e6c980b527) status: failed <details><summary>Test output</summary><br><pre>com.google.cloud.spanner.SpannerException: UNAVAILABLE: com.google.cloud.spanner.SpannerException: UNAVAILABLE: com.google.api.gax.rpc.UnavailableException: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerExceptionPreformatted(SpannerExceptionFactory.java:291) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerExceptionPreformatted(SpannerExceptionFactory.java:297) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:61) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:181) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:110) at com.google.cloud.spanner.SpannerExceptionFactory.asSpannerException(SpannerExceptionFactory.java:100) at com.google.cloud.spanner.SessionPool.getDialect(SessionPool.java:1992) at com.google.cloud.spanner.DatabaseClientImpl.getDialect(DatabaseClientImpl.java:59) at com.google.cloud.spanner.connection.ConnectionImpl.getDialect(ConnectionImpl.java:354) at com.google.cloud.spanner.jdbc.AbstractJdbcConnection.getDialect(AbstractJdbcConnection.java:85) at com.google.cloud.spanner.jdbc.JdbcDatabaseMetaData.getExportedKeys(JdbcDatabaseMetaData.java:890) at com.google.cloud.spanner.jdbc.it.ITJdbcPgDatabaseMetaDataTest.testGetExportedKeys(ITJdbcPgDatabaseMetaDataTest.java:493) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:54) at org.junit.rules.RunRules.evaluate(RunRules.java:20) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.junit.runners.Suite.runChild(Suite.java:128) at org.junit.runners.Suite.runChild(Suite.java:27) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.apache.maven.surefire.junitcore.JUnitCore.run(JUnitCore.java:55) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.createRequestAndRun(JUnitCoreWrapper.java:137) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.executeLazy(JUnitCoreWrapper.java:119) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:87) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:75) at org.apache.maven.surefire.junitcore.JUnitCoreProvider.invoke(JUnitCoreProvider.java:158) at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:456) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:169) at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:595) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:581) Caused by: java.util.concurrent.ExecutionException: com.google.cloud.spanner.SpannerException: UNAVAILABLE: com.google.api.gax.rpc.UnavailableException: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at com.google.common.util.concurrent.AbstractFuture.getDoneValue(AbstractFuture.java:588) at com.google.common.util.concurrent.AbstractFuture.get(AbstractFuture.java:439) at com.google.common.util.concurrent.AbstractFuture$TrustedFuture.get(AbstractFuture.java:121) at com.google.cloud.spanner.SessionPool.getDialect(SessionPool.java:1990) ... 48 more Caused by: com.google.cloud.spanner.SpannerException: UNAVAILABLE: com.google.api.gax.rpc.UnavailableException: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerExceptionPreformatted(SpannerExceptionFactory.java:291) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerExceptionPreformatted(SpannerExceptionFactory.java:297) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:170) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:110) at com.google.cloud.spanner.SessionPool$SessionConsumerImpl.onSessionCreateFailure(SessionPool.java:2470) at com.google.cloud.spanner.SessionClient$BatchCreateSessionsRunnable.run(SessionClient.java:140) at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$201(ScheduledThreadPoolExecutor.java:180) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:293) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at java.lang.Thread.run(Thread.java:750) Caused by: com.google.cloud.spanner.SpannerException: UNAVAILABLE: com.google.api.gax.rpc.UnavailableException: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerExceptionPreformatted(SpannerExceptionFactory.java:291) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerExceptionPreformatted(SpannerExceptionFactory.java:297) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:61) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:181) at com.google.cloud.spanner.spi.v1.GapicSpannerRpc.get(GapicSpannerRpc.java:1883) at com.google.cloud.spanner.spi.v1.GapicSpannerRpc.batchCreateSessions(GapicSpannerRpc.java:1596) at com.google.cloud.spanner.SessionClient.internalBatchCreateSessions(SessionClient.java:303) at com.google.cloud.spanner.SessionClient.access$000(SessionClient.java:38) at com.google.cloud.spanner.SessionClient$BatchCreateSessionsRunnable.run(SessionClient.java:137) ... 7 more Caused by: java.util.concurrent.ExecutionException: com.google.api.gax.rpc.UnavailableException: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at com.google.common.util.concurrent.AbstractFuture.getDoneValue(AbstractFuture.java:588) at com.google.common.util.concurrent.AbstractFuture.get(AbstractFuture.java:567) at com.google.cloud.spanner.spi.v1.GapicSpannerRpc.get(GapicSpannerRpc.java:1877) ... 11 more Caused by: com.google.api.gax.rpc.UnavailableException: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at com.google.api.gax.rpc.ApiExceptionFactory.createException(ApiExceptionFactory.java:112) at com.google.api.gax.rpc.ApiExceptionFactory.createException(ApiExceptionFactory.java:41) at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:86) at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:66) at com.google.api.gax.grpc.GrpcExceptionCallable$ExceptionTransformingFuture.onFailure(GrpcExceptionCallable.java:97) at com.google.api.core.ApiFutures$1.onFailure(ApiFutures.java:67) at com.google.common.util.concurrent.Futures$CallbackListener.run(Futures.java:1132) at com.google.common.util.concurrent.DirectExecutor.execute(DirectExecutor.java:31) at com.google.common.util.concurrent.AbstractFuture.executeListener(AbstractFuture.java:1270) at com.google.common.util.concurrent.AbstractFuture.complete(AbstractFuture.java:1038) at com.google.common.util.concurrent.AbstractFuture.setException(AbstractFuture.java:808) at io.grpc.stub.ClientCalls$GrpcFuture.setException(ClientCalls.java:574) at io.grpc.stub.ClientCalls$UnaryStreamToFuture.onClose(ClientCalls.java:544) at io.grpc.PartialForwardingClientCallListener.onClose(PartialForwardingClientCallListener.java:39) at io.grpc.ForwardingClientCallListener.onClose(ForwardingClientCallListener.java:23) at io.grpc.ForwardingClientCallListener$SimpleForwardingClientCallListener.onClose(ForwardingClientCallListener.java:40) at com.google.api.gax.grpc.ChannelPool$ReleasingClientCall$1.onClose(ChannelPool.java:541) at io.grpc.PartialForwardingClientCallListener.onClose(PartialForwardingClientCallListener.java:39) at io.grpc.ForwardingClientCallListener.onClose(ForwardingClientCallListener.java:23) at io.grpc.ForwardingClientCallListener$SimpleForwardingClientCallListener.onClose(ForwardingClientCallListener.java:40) at io.grpc.PartialForwardingClientCallListener.onClose(PartialForwardingClientCallListener.java:39) at io.grpc.ForwardingClientCallListener.onClose(ForwardingClientCallListener.java:23) at io.grpc.ForwardingClientCallListener$SimpleForwardingClientCallListener.onClose(ForwardingClientCallListener.java:40) at com.google.cloud.spanner.spi.v1.SpannerErrorInterceptor$1$1.onClose(SpannerErrorInterceptor.java:100) at io.grpc.internal.ClientCallImpl.closeObserver(ClientCallImpl.java:576) at io.grpc.internal.ClientCallImpl.access$300(ClientCallImpl.java:70) at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInternal(ClientCallImpl.java:757) at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInContext(ClientCallImpl.java:736) at io.grpc.internal.ContextRunnable.run(ContextRunnable.java:37) at io.grpc.internal.SerializingExecutor.run(SerializingExecutor.java:133) ... 7 more Caused by: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at io.grpc.Status.asRuntimeException(Status.java:539) ... 25 more Caused by: com.google.auth.oauth2.GoogleAuthException: Error getting access token for service account: 400 Bad Request POST https://oauth2.googleapis.com/token {"error":"invalid_grant","error_description":"Invalid JWT Signature."}, iss: java-client-testing@span-cloud-testing.iam.gserviceaccount.com at com.google.auth.oauth2.GoogleAuthException.createWithTokenEndpointResponseException(GoogleAuthException.java:131) at com.google.auth.oauth2.ServiceAccountCredentials.refreshAccessToken(ServiceAccountCredentials.java:541) at com.google.auth.oauth2.OAuth2Credentials$1.call(OAuth2Credentials.java:269) at com.google.auth.oauth2.OAuth2Credentials$1.call(OAuth2Credentials.java:266) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at com.google.auth.oauth2.OAuth2Credentials$RefreshTask.run(OAuth2Credentials.java:633) ... 3 more Caused by: com.google.api.client.http.HttpResponseException: 400 Bad Request POST https://oauth2.googleapis.com/token {"error":"invalid_grant","error_description":"Invalid JWT Signature."} at com.google.api.client.http.HttpResponseException$Builder.build(HttpResponseException.java:293) at com.google.api.client.http.HttpRequest.execute(HttpRequest.java:1118) at com.google.auth.oauth2.ServiceAccountCredentials.refreshAccessToken(ServiceAccountCredentials.java:538) ... 7 more </pre></details>
1.0
spanner.jdbc.it.ITJdbcPgDatabaseMetaDataTest: testGetExportedKeys failed - Note: #813 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky. ---- commit: 76fc16a7651120ac019ad13ca2c2e4bccd2bd7a1 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/3a5befd1-d3c8-4987-86b1-a2e6c980b527), [Sponge](http://sponge2/3a5befd1-d3c8-4987-86b1-a2e6c980b527) status: failed <details><summary>Test output</summary><br><pre>com.google.cloud.spanner.SpannerException: UNAVAILABLE: com.google.cloud.spanner.SpannerException: UNAVAILABLE: com.google.api.gax.rpc.UnavailableException: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerExceptionPreformatted(SpannerExceptionFactory.java:291) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerExceptionPreformatted(SpannerExceptionFactory.java:297) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:61) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:181) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:110) at com.google.cloud.spanner.SpannerExceptionFactory.asSpannerException(SpannerExceptionFactory.java:100) at com.google.cloud.spanner.SessionPool.getDialect(SessionPool.java:1992) at com.google.cloud.spanner.DatabaseClientImpl.getDialect(DatabaseClientImpl.java:59) at com.google.cloud.spanner.connection.ConnectionImpl.getDialect(ConnectionImpl.java:354) at com.google.cloud.spanner.jdbc.AbstractJdbcConnection.getDialect(AbstractJdbcConnection.java:85) at com.google.cloud.spanner.jdbc.JdbcDatabaseMetaData.getExportedKeys(JdbcDatabaseMetaData.java:890) at com.google.cloud.spanner.jdbc.it.ITJdbcPgDatabaseMetaDataTest.testGetExportedKeys(ITJdbcPgDatabaseMetaDataTest.java:493) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:54) at org.junit.rules.RunRules.evaluate(RunRules.java:20) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.junit.runners.Suite.runChild(Suite.java:128) at org.junit.runners.Suite.runChild(Suite.java:27) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.apache.maven.surefire.junitcore.JUnitCore.run(JUnitCore.java:55) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.createRequestAndRun(JUnitCoreWrapper.java:137) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.executeLazy(JUnitCoreWrapper.java:119) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:87) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:75) at org.apache.maven.surefire.junitcore.JUnitCoreProvider.invoke(JUnitCoreProvider.java:158) at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:456) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:169) at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:595) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:581) Caused by: java.util.concurrent.ExecutionException: com.google.cloud.spanner.SpannerException: UNAVAILABLE: com.google.api.gax.rpc.UnavailableException: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at com.google.common.util.concurrent.AbstractFuture.getDoneValue(AbstractFuture.java:588) at com.google.common.util.concurrent.AbstractFuture.get(AbstractFuture.java:439) at com.google.common.util.concurrent.AbstractFuture$TrustedFuture.get(AbstractFuture.java:121) at com.google.cloud.spanner.SessionPool.getDialect(SessionPool.java:1990) ... 48 more Caused by: com.google.cloud.spanner.SpannerException: UNAVAILABLE: com.google.api.gax.rpc.UnavailableException: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerExceptionPreformatted(SpannerExceptionFactory.java:291) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerExceptionPreformatted(SpannerExceptionFactory.java:297) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:170) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:110) at com.google.cloud.spanner.SessionPool$SessionConsumerImpl.onSessionCreateFailure(SessionPool.java:2470) at com.google.cloud.spanner.SessionClient$BatchCreateSessionsRunnable.run(SessionClient.java:140) at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$201(ScheduledThreadPoolExecutor.java:180) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:293) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at java.lang.Thread.run(Thread.java:750) Caused by: com.google.cloud.spanner.SpannerException: UNAVAILABLE: com.google.api.gax.rpc.UnavailableException: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerExceptionPreformatted(SpannerExceptionFactory.java:291) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerExceptionPreformatted(SpannerExceptionFactory.java:297) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:61) at com.google.cloud.spanner.SpannerExceptionFactory.newSpannerException(SpannerExceptionFactory.java:181) at com.google.cloud.spanner.spi.v1.GapicSpannerRpc.get(GapicSpannerRpc.java:1883) at com.google.cloud.spanner.spi.v1.GapicSpannerRpc.batchCreateSessions(GapicSpannerRpc.java:1596) at com.google.cloud.spanner.SessionClient.internalBatchCreateSessions(SessionClient.java:303) at com.google.cloud.spanner.SessionClient.access$000(SessionClient.java:38) at com.google.cloud.spanner.SessionClient$BatchCreateSessionsRunnable.run(SessionClient.java:137) ... 7 more Caused by: java.util.concurrent.ExecutionException: com.google.api.gax.rpc.UnavailableException: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at com.google.common.util.concurrent.AbstractFuture.getDoneValue(AbstractFuture.java:588) at com.google.common.util.concurrent.AbstractFuture.get(AbstractFuture.java:567) at com.google.cloud.spanner.spi.v1.GapicSpannerRpc.get(GapicSpannerRpc.java:1877) ... 11 more Caused by: com.google.api.gax.rpc.UnavailableException: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at com.google.api.gax.rpc.ApiExceptionFactory.createException(ApiExceptionFactory.java:112) at com.google.api.gax.rpc.ApiExceptionFactory.createException(ApiExceptionFactory.java:41) at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:86) at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:66) at com.google.api.gax.grpc.GrpcExceptionCallable$ExceptionTransformingFuture.onFailure(GrpcExceptionCallable.java:97) at com.google.api.core.ApiFutures$1.onFailure(ApiFutures.java:67) at com.google.common.util.concurrent.Futures$CallbackListener.run(Futures.java:1132) at com.google.common.util.concurrent.DirectExecutor.execute(DirectExecutor.java:31) at com.google.common.util.concurrent.AbstractFuture.executeListener(AbstractFuture.java:1270) at com.google.common.util.concurrent.AbstractFuture.complete(AbstractFuture.java:1038) at com.google.common.util.concurrent.AbstractFuture.setException(AbstractFuture.java:808) at io.grpc.stub.ClientCalls$GrpcFuture.setException(ClientCalls.java:574) at io.grpc.stub.ClientCalls$UnaryStreamToFuture.onClose(ClientCalls.java:544) at io.grpc.PartialForwardingClientCallListener.onClose(PartialForwardingClientCallListener.java:39) at io.grpc.ForwardingClientCallListener.onClose(ForwardingClientCallListener.java:23) at io.grpc.ForwardingClientCallListener$SimpleForwardingClientCallListener.onClose(ForwardingClientCallListener.java:40) at com.google.api.gax.grpc.ChannelPool$ReleasingClientCall$1.onClose(ChannelPool.java:541) at io.grpc.PartialForwardingClientCallListener.onClose(PartialForwardingClientCallListener.java:39) at io.grpc.ForwardingClientCallListener.onClose(ForwardingClientCallListener.java:23) at io.grpc.ForwardingClientCallListener$SimpleForwardingClientCallListener.onClose(ForwardingClientCallListener.java:40) at io.grpc.PartialForwardingClientCallListener.onClose(PartialForwardingClientCallListener.java:39) at io.grpc.ForwardingClientCallListener.onClose(ForwardingClientCallListener.java:23) at io.grpc.ForwardingClientCallListener$SimpleForwardingClientCallListener.onClose(ForwardingClientCallListener.java:40) at com.google.cloud.spanner.spi.v1.SpannerErrorInterceptor$1$1.onClose(SpannerErrorInterceptor.java:100) at io.grpc.internal.ClientCallImpl.closeObserver(ClientCallImpl.java:576) at io.grpc.internal.ClientCallImpl.access$300(ClientCallImpl.java:70) at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInternal(ClientCallImpl.java:757) at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInContext(ClientCallImpl.java:736) at io.grpc.internal.ContextRunnable.run(ContextRunnable.java:37) at io.grpc.internal.SerializingExecutor.run(SerializingExecutor.java:133) ... 7 more Caused by: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata at io.grpc.Status.asRuntimeException(Status.java:539) ... 25 more Caused by: com.google.auth.oauth2.GoogleAuthException: Error getting access token for service account: 400 Bad Request POST https://oauth2.googleapis.com/token {"error":"invalid_grant","error_description":"Invalid JWT Signature."}, iss: java-client-testing@span-cloud-testing.iam.gserviceaccount.com at com.google.auth.oauth2.GoogleAuthException.createWithTokenEndpointResponseException(GoogleAuthException.java:131) at com.google.auth.oauth2.ServiceAccountCredentials.refreshAccessToken(ServiceAccountCredentials.java:541) at com.google.auth.oauth2.OAuth2Credentials$1.call(OAuth2Credentials.java:269) at com.google.auth.oauth2.OAuth2Credentials$1.call(OAuth2Credentials.java:266) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at com.google.auth.oauth2.OAuth2Credentials$RefreshTask.run(OAuth2Credentials.java:633) ... 3 more Caused by: com.google.api.client.http.HttpResponseException: 400 Bad Request POST https://oauth2.googleapis.com/token {"error":"invalid_grant","error_description":"Invalid JWT Signature."} at com.google.api.client.http.HttpResponseException$Builder.build(HttpResponseException.java:293) at com.google.api.client.http.HttpRequest.execute(HttpRequest.java:1118) at com.google.auth.oauth2.ServiceAccountCredentials.refreshAccessToken(ServiceAccountCredentials.java:538) ... 7 more </pre></details>
non_design
spanner jdbc it itjdbcpgdatabasemetadatatest testgetexportedkeys failed note was also for this test but it was closed more than days ago so i didn t mark it flaky commit buildurl status failed test output com google cloud spanner spannerexception unavailable com google cloud spanner spannerexception unavailable com google api gax rpc unavailableexception io grpc statusruntimeexception unavailable credentials failed to obtain metadata at com google cloud spanner spannerexceptionfactory newspannerexceptionpreformatted spannerexceptionfactory java at com google cloud spanner spannerexceptionfactory newspannerexceptionpreformatted spannerexceptionfactory java at com google cloud spanner spannerexceptionfactory newspannerexception spannerexceptionfactory java at com google cloud spanner spannerexceptionfactory newspannerexception spannerexceptionfactory java at com google cloud spanner spannerexceptionfactory newspannerexception spannerexceptionfactory java at com google cloud spanner spannerexceptionfactory asspannerexception spannerexceptionfactory java at com google cloud spanner sessionpool getdialect sessionpool java at com google cloud spanner databaseclientimpl getdialect databaseclientimpl java at com google cloud spanner connection connectionimpl getdialect connectionimpl java at com google cloud spanner jdbc abstractjdbcconnection getdialect abstractjdbcconnection java at com google cloud spanner jdbc jdbcdatabasemetadata getexportedkeys jdbcdatabasemetadata java at com google cloud spanner jdbc it itjdbcpgdatabasemetadatatest testgetexportedkeys itjdbcpgdatabasemetadatatest java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at org junit internal runners statements runbefores evaluate runbefores java at org junit runners parentrunner evaluate parentrunner java at org junit runners evaluate java at org junit runners parentrunner runleaf parentrunner java at org junit runners runchild java at org junit runners runchild java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit internal runners statements runbefores evaluate runbefores java at org junit rules externalresource evaluate externalresource java at org junit rules runrules evaluate runrules java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org junit runners suite runchild suite java at org junit runners suite runchild suite java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org apache maven surefire junitcore junitcore run junitcore java at org apache maven surefire junitcore junitcorewrapper createrequestandrun junitcorewrapper java at org apache maven surefire junitcore junitcorewrapper executelazy junitcorewrapper java at org apache maven surefire junitcore junitcorewrapper execute junitcorewrapper java at org apache maven surefire junitcore junitcorewrapper execute junitcorewrapper java at org apache maven surefire junitcore junitcoreprovider invoke junitcoreprovider java at org apache maven surefire booter forkedbooter runsuitesinprocess forkedbooter java at org apache maven surefire booter forkedbooter execute forkedbooter java at org apache maven surefire booter forkedbooter run forkedbooter java at org apache maven surefire booter forkedbooter main forkedbooter java caused by java util concurrent executionexception com google cloud spanner spannerexception unavailable com google api gax rpc unavailableexception io grpc statusruntimeexception unavailable credentials failed to obtain metadata at com google common util concurrent abstractfuture getdonevalue abstractfuture java at com google common util concurrent abstractfuture get abstractfuture java at com google common util concurrent abstractfuture trustedfuture get abstractfuture java at com google cloud spanner sessionpool getdialect sessionpool java more caused by com google cloud spanner spannerexception unavailable com google api gax rpc unavailableexception io grpc statusruntimeexception unavailable credentials failed to obtain metadata at com google cloud spanner spannerexceptionfactory newspannerexceptionpreformatted spannerexceptionfactory java at com google cloud spanner spannerexceptionfactory newspannerexceptionpreformatted spannerexceptionfactory java at com google cloud spanner spannerexceptionfactory newspannerexception spannerexceptionfactory java at com google cloud spanner spannerexceptionfactory newspannerexception spannerexceptionfactory java at com google cloud spanner sessionpool sessionconsumerimpl onsessioncreatefailure sessionpool java at com google cloud spanner sessionclient batchcreatesessionsrunnable run sessionclient java at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask run futuretask java at java util concurrent scheduledthreadpoolexecutor scheduledfuturetask access scheduledthreadpoolexecutor java at java util concurrent scheduledthreadpoolexecutor scheduledfuturetask run scheduledthreadpoolexecutor java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java caused by com google cloud spanner spannerexception unavailable com google api gax rpc unavailableexception io grpc statusruntimeexception unavailable credentials failed to obtain metadata at com google cloud spanner spannerexceptionfactory newspannerexceptionpreformatted spannerexceptionfactory java at com google cloud spanner spannerexceptionfactory newspannerexceptionpreformatted spannerexceptionfactory java at com google cloud spanner spannerexceptionfactory newspannerexception spannerexceptionfactory java at com google cloud spanner spannerexceptionfactory newspannerexception spannerexceptionfactory java at com google cloud spanner spi gapicspannerrpc get gapicspannerrpc java at com google cloud spanner spi gapicspannerrpc batchcreatesessions gapicspannerrpc java at com google cloud spanner sessionclient internalbatchcreatesessions sessionclient java at com google cloud spanner sessionclient access sessionclient java at com google cloud spanner sessionclient batchcreatesessionsrunnable run sessionclient java more caused by java util concurrent executionexception com google api gax rpc unavailableexception io grpc statusruntimeexception unavailable credentials failed to obtain metadata at com google common util concurrent abstractfuture getdonevalue abstractfuture java at com google common util concurrent abstractfuture get abstractfuture java at com google cloud spanner spi gapicspannerrpc get gapicspannerrpc java more caused by com google api gax rpc unavailableexception io grpc statusruntimeexception unavailable credentials failed to obtain metadata at com google api gax rpc apiexceptionfactory createexception apiexceptionfactory java at com google api gax rpc apiexceptionfactory createexception apiexceptionfactory java at com google api gax grpc grpcapiexceptionfactory create grpcapiexceptionfactory java at com google api gax grpc grpcapiexceptionfactory create grpcapiexceptionfactory java at com google api gax grpc grpcexceptioncallable exceptiontransformingfuture onfailure grpcexceptioncallable java at com google api core apifutures onfailure apifutures java at com google common util concurrent futures callbacklistener run futures java at com google common util concurrent directexecutor execute directexecutor java at com google common util concurrent abstractfuture executelistener abstractfuture java at com google common util concurrent abstractfuture complete abstractfuture java at com google common util concurrent abstractfuture setexception abstractfuture java at io grpc stub clientcalls grpcfuture setexception clientcalls java at io grpc stub clientcalls unarystreamtofuture onclose clientcalls java at io grpc partialforwardingclientcalllistener onclose partialforwardingclientcalllistener java at io grpc forwardingclientcalllistener onclose forwardingclientcalllistener java at io grpc forwardingclientcalllistener simpleforwardingclientcalllistener onclose forwardingclientcalllistener java at com google api gax grpc channelpool releasingclientcall onclose channelpool java at io grpc partialforwardingclientcalllistener onclose partialforwardingclientcalllistener java at io grpc forwardingclientcalllistener onclose forwardingclientcalllistener java at io grpc forwardingclientcalllistener simpleforwardingclientcalllistener onclose forwardingclientcalllistener java at io grpc partialforwardingclientcalllistener onclose partialforwardingclientcalllistener java at io grpc forwardingclientcalllistener onclose forwardingclientcalllistener java at io grpc forwardingclientcalllistener simpleforwardingclientcalllistener onclose forwardingclientcalllistener java at com google cloud spanner spi spannererrorinterceptor onclose spannererrorinterceptor java at io grpc internal clientcallimpl closeobserver clientcallimpl java at io grpc internal clientcallimpl access clientcallimpl java at io grpc internal clientcallimpl clientstreamlistenerimpl runinternal clientcallimpl java at io grpc internal clientcallimpl clientstreamlistenerimpl runincontext clientcallimpl java at io grpc internal contextrunnable run contextrunnable java at io grpc internal serializingexecutor run serializingexecutor java more caused by io grpc statusruntimeexception unavailable credentials failed to obtain metadata at io grpc status asruntimeexception status java more caused by com google auth googleauthexception error getting access token for service account bad request post error invalid grant error description invalid jwt signature iss java client testing span cloud testing iam gserviceaccount com at com google auth googleauthexception createwithtokenendpointresponseexception googleauthexception java at com google auth serviceaccountcredentials refreshaccesstoken serviceaccountcredentials java at com google auth call java at com google auth call java at java util concurrent futuretask run futuretask java at com google auth refreshtask run java more caused by com google api client http httpresponseexception bad request post error invalid grant error description invalid jwt signature at com google api client http httpresponseexception builder build httpresponseexception java at com google api client http httprequest execute httprequest java at com google auth serviceaccountcredentials refreshaccesstoken serviceaccountcredentials java more
0
58,636
3,090,219,287
IssuesEvent
2015-08-26 04:10:59
AutomationSolutionz/Framework_0.1
https://api.github.com/repos/AutomationSolutionz/Framework_0.1
closed
bundle report is not taking the last result from the runs
bug Done Minar Priority 1 (Highest) Started
bundle report is not taking the last run result.
1.0
bundle report is not taking the last result from the runs - bundle report is not taking the last run result.
non_design
bundle report is not taking the last result from the runs bundle report is not taking the last run result
0
42,307
10,958,766,079
IssuesEvent
2019-11-27 10:02:39
cakephp/cakephp
https://api.github.com/repos/cakephp/cakephp
closed
4.x - Controller integration testing mismatched tokens
defect testing
This is a (multiple allowed): * [x] bug * [ ] enhancement * [ ] feature-discussion (RFC) * CakePHP Version: 4.0.0-RC1 * Platform and Target: Nginx 1.17.3 & PHP 7.3.10 ### What you did I am trying to run an integration test on a controller method. My AppController implements both AuthComponent and SecurityComponent. I also have the CsrfMiddleware enabled in the routing. My test case looks like the following. I have used `$this->session()` in the `setUp` to add Auth session data. ```php /** * Test add method * * @return void * @throws \PHPUnit\Exception * @throws \Throwable */ public function testAddWithInvalidCommentModel() { $this->expectException(\BadMethodCallException::class); $this->expectExceptionMessage('Ye gads! What did you do?'); $this->enableCsrfToken(); $this->enableSecurityToken(); $this->setUnlockedFields(['comment']); $this->post('/comments/add/invalid/999', ['comment' => 'Expecting an exception here']); $this->assertResponseFailure(); } ``` The code snippet I am trying to test is the following, ```php /** * Add a new comment to either a Question or Answer * * @param string $model Name of the model being commented on, expected lowercase plural, eg, questions * @param int|string $id Primary key of the item * @return \Cake\Http\Response */ public function add(string $model, $id) { $className = Inflector::camelize($model); $this->getRequest()->allowMethod('post'); if (!in_array($className, ['Questions', 'Answers'])) { throw new \BadMethodCallException('Ye gads! What did you do?'); } // Rest of method, etc ``` ### What happened Thanks to some help from @ADmad and @ndm2 in Slack, I added some methods to include the tokens in my request. However I still see an exception due to mismatched tokens. `2019-11-21 16:11:48 Error: [Cake\Controller\Exception\AuthSecurityException] Invalid security debug token. in /Users/davidyell/Sites/Learning-CakePHP4/vendor/cakephp/cakephp/src/Controller/Component/SecurityComponent.php on line 245` ### What you expected to happen I expected the`IntegrationTestTrait` to take care of the tokens for me, so that I could focus on testing my controller method. ### What's going on? I am not sure, but my investigations have led me to think that the `fields` property is missing from the `_Token`. When I debug the data in `SecurityComponent::_validatePost` I can see the following. Which are the json encoded `$hashParts`, `$check` and `$token`, as they appear in that method. ``` 2019-11-21 16:11:48 Debug: ["\/comments\/add\/invalid\/999","a:0:{}","comment",""] 2019-11-21 16:11:48 Debug: 640dba12fdacfa1a216fd075110213e5b4155971 2019-11-21 16:11:48 Debug: da1283c6d02a43992eaf3b52b6b3f2276b6a1b6b ``` It's clear from this that the token mismatch is causing the request to fail, but I'm unsure why that might be, except for the `a:0:{}` empty `fields` which I tracked down through `_hashParts()` and into `_fieldsList()` methods. For reference this code is available in my repository https://github.com/davidyell/Learning-CakePHP4
1.0
4.x - Controller integration testing mismatched tokens - This is a (multiple allowed): * [x] bug * [ ] enhancement * [ ] feature-discussion (RFC) * CakePHP Version: 4.0.0-RC1 * Platform and Target: Nginx 1.17.3 & PHP 7.3.10 ### What you did I am trying to run an integration test on a controller method. My AppController implements both AuthComponent and SecurityComponent. I also have the CsrfMiddleware enabled in the routing. My test case looks like the following. I have used `$this->session()` in the `setUp` to add Auth session data. ```php /** * Test add method * * @return void * @throws \PHPUnit\Exception * @throws \Throwable */ public function testAddWithInvalidCommentModel() { $this->expectException(\BadMethodCallException::class); $this->expectExceptionMessage('Ye gads! What did you do?'); $this->enableCsrfToken(); $this->enableSecurityToken(); $this->setUnlockedFields(['comment']); $this->post('/comments/add/invalid/999', ['comment' => 'Expecting an exception here']); $this->assertResponseFailure(); } ``` The code snippet I am trying to test is the following, ```php /** * Add a new comment to either a Question or Answer * * @param string $model Name of the model being commented on, expected lowercase plural, eg, questions * @param int|string $id Primary key of the item * @return \Cake\Http\Response */ public function add(string $model, $id) { $className = Inflector::camelize($model); $this->getRequest()->allowMethod('post'); if (!in_array($className, ['Questions', 'Answers'])) { throw new \BadMethodCallException('Ye gads! What did you do?'); } // Rest of method, etc ``` ### What happened Thanks to some help from @ADmad and @ndm2 in Slack, I added some methods to include the tokens in my request. However I still see an exception due to mismatched tokens. `2019-11-21 16:11:48 Error: [Cake\Controller\Exception\AuthSecurityException] Invalid security debug token. in /Users/davidyell/Sites/Learning-CakePHP4/vendor/cakephp/cakephp/src/Controller/Component/SecurityComponent.php on line 245` ### What you expected to happen I expected the`IntegrationTestTrait` to take care of the tokens for me, so that I could focus on testing my controller method. ### What's going on? I am not sure, but my investigations have led me to think that the `fields` property is missing from the `_Token`. When I debug the data in `SecurityComponent::_validatePost` I can see the following. Which are the json encoded `$hashParts`, `$check` and `$token`, as they appear in that method. ``` 2019-11-21 16:11:48 Debug: ["\/comments\/add\/invalid\/999","a:0:{}","comment",""] 2019-11-21 16:11:48 Debug: 640dba12fdacfa1a216fd075110213e5b4155971 2019-11-21 16:11:48 Debug: da1283c6d02a43992eaf3b52b6b3f2276b6a1b6b ``` It's clear from this that the token mismatch is causing the request to fail, but I'm unsure why that might be, except for the `a:0:{}` empty `fields` which I tracked down through `_hashParts()` and into `_fieldsList()` methods. For reference this code is available in my repository https://github.com/davidyell/Learning-CakePHP4
non_design
x controller integration testing mismatched tokens this is a multiple allowed bug enhancement feature discussion rfc cakephp version platform and target nginx php what you did i am trying to run an integration test on a controller method my appcontroller implements both authcomponent and securitycomponent i also have the csrfmiddleware enabled in the routing my test case looks like the following i have used this session in the setup to add auth session data php test add method return void throws phpunit exception throws throwable public function testaddwithinvalidcommentmodel this expectexception badmethodcallexception class this expectexceptionmessage ye gads what did you do this enablecsrftoken this enablesecuritytoken this setunlockedfields this post comments add invalid this assertresponsefailure the code snippet i am trying to test is the following php add a new comment to either a question or answer param string model name of the model being commented on expected lowercase plural eg questions param int string id primary key of the item return cake http response public function add string model id classname inflector camelize model this getrequest allowmethod post if in array classname throw new badmethodcallexception ye gads what did you do rest of method etc what happened thanks to some help from admad and in slack i added some methods to include the tokens in my request however i still see an exception due to mismatched tokens error invalid security debug token in users davidyell sites learning vendor cakephp cakephp src controller component securitycomponent php on line what you expected to happen i expected the integrationtesttrait to take care of the tokens for me so that i could focus on testing my controller method what s going on i am not sure but my investigations have led me to think that the fields property is missing from the token when i debug the data in securitycomponent validatepost i can see the following which are the json encoded hashparts check and token as they appear in that method debug debug debug it s clear from this that the token mismatch is causing the request to fail but i m unsure why that might be except for the a empty fields which i tracked down through hashparts and into fieldslist methods for reference this code is available in my repository
0
621,936
19,600,796,964
IssuesEvent
2022-01-06 00:56:08
azerothcore/azerothcore-wotlk
https://api.github.com/repos/azerothcore/azerothcore-wotlk
closed
Siltfin Murloc Population too high on Siltfin Shore (Azuremyst)
Confirmed 1-19 Priority-Low
<!-- IF YOU DO NOT FILL THIS TEMPLATE OUT, WE WILL CLOSE YOUR ISSUE! --> <!-- This template is for problem reports, for feature suggestion etc... feel free to edit it. If this is a crash report, upload the crashlog on https://gist.github.com/ For issues containing a fix, please create a Pull Request following this tutorial: http://www.azerothcore.org/wiki/Contribute#how-to-create-a-pull-request --> <!-- WRITE A RELEVANT TITLE --> Siltfin Murloc Population too high on Siltfin Shore (Azuremyst) ##### CURRENT BEHAVIOUR: <!-- Describe the bug in detail. Database to link spells, NPCs, quests etc https://wowgaming.altervista.org/aowow/ --> There are almost 100 Siltfins on the small beach which made doing the lvl 8 quest extremely hard for a group of two (Priest/Shaman) players. I couldn't imagine doing it alone as every pull pulls 2-5 murlocs. https://www.wowhead.com/quest=9562/murlocs-why-here-why-now ##### EXPECTED BLIZZLIKE BEHAVIOUR: <!-- Describe how it should be working without the bug. --> Half the murlocs give or take. https://www.youtube.com/watch?v=VCCVWUaPl2I Video is from 2015 and people have been clearing the area but the difference is extreme. ##### STEPS TO REPRODUCE THE PROBLEM: <!-- Describe precisely how to reproduce the bug so we can fix it or confirm its existence: - Which commands to use? Which NPC to teleport to? - Do we need to have debug flags on Cmake? - Do we need to look at the console while the bug happens? - Other steps --> 1. Go to siltfin shore. 2. Observe the amount of murlocs 3. Cry ##### EXTRA NOTES: <!-- Any information that can help the developers to identify and fix the issue should be put here. Examples: - was this bug always present in AzerothCore? if it was introduced after a change, please mention it - the code line(s) that cause the issue - does this feature work in other server appplications (e.g. CMaNGOS, TrinityCore, etc...) ? --> ##### AC HASH/COMMIT: <!-- IF YOU DO NOT FILL THIS OUT, WE WILL CLOSE YOUR ISSUE! NEVER WRITE "LATEST", ALWAYS PUT THE ACTUAL VALUE INSTEAD. Find the commit hash (unique identifier) by running "git log" on your own clone of AzerothCore or by looking at here https://github.com/azerothcore/azerothcore-wotlk/commits/master --> ChromieCraft 2020-12-31 6414b40 (chromiecraft) ##### OPERATING SYSTEM: <!-- Windows 7/10, Debian 8/9/10, Ubuntu 16/18 etc... --> ChromieCraft ##### MODULES: <!-- Are you using modules? If yes, list them (note them down in a .txt for opening future issues) --> ChromieCraft ##### OTHER CUSTOMIZATIONS: <!-- Are you using any extra script? - Did you apply any core patch/diff? - Did you modify your database? - Or do you have other customizations? If yes please specify them here. --> ChromieCraft <!-- ------------------------- THE END ------------------------------ Thank you for your contribution. If you use AzerothCore regularly, we really NEED your help to: - TEST our fixes ( http://www.azerothcore.org/wiki/Contribute#how-to-test-a-pull-request ) - Report issues - Improve the documentation/wiki With your help the project can evolve much quicker! --> <!-- NOTE: If you intend to contribute more than once, you should really join us on our discord channel! We set cosmetic ranks for our contributors and may give access to special resources/knowledge to them! The link is on our site http://azerothcore.org/ --> <bountysource-plugin> --- Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/95701936-siltfin-murloc-population-too-high-on-siltfin-shore-azuremyst?utm_campaign=plugin&utm_content=tracker%2F40032087&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F40032087&utm_medium=issues&utm_source=github). </bountysource-plugin>
1.0
Siltfin Murloc Population too high on Siltfin Shore (Azuremyst) - <!-- IF YOU DO NOT FILL THIS TEMPLATE OUT, WE WILL CLOSE YOUR ISSUE! --> <!-- This template is for problem reports, for feature suggestion etc... feel free to edit it. If this is a crash report, upload the crashlog on https://gist.github.com/ For issues containing a fix, please create a Pull Request following this tutorial: http://www.azerothcore.org/wiki/Contribute#how-to-create-a-pull-request --> <!-- WRITE A RELEVANT TITLE --> Siltfin Murloc Population too high on Siltfin Shore (Azuremyst) ##### CURRENT BEHAVIOUR: <!-- Describe the bug in detail. Database to link spells, NPCs, quests etc https://wowgaming.altervista.org/aowow/ --> There are almost 100 Siltfins on the small beach which made doing the lvl 8 quest extremely hard for a group of two (Priest/Shaman) players. I couldn't imagine doing it alone as every pull pulls 2-5 murlocs. https://www.wowhead.com/quest=9562/murlocs-why-here-why-now ##### EXPECTED BLIZZLIKE BEHAVIOUR: <!-- Describe how it should be working without the bug. --> Half the murlocs give or take. https://www.youtube.com/watch?v=VCCVWUaPl2I Video is from 2015 and people have been clearing the area but the difference is extreme. ##### STEPS TO REPRODUCE THE PROBLEM: <!-- Describe precisely how to reproduce the bug so we can fix it or confirm its existence: - Which commands to use? Which NPC to teleport to? - Do we need to have debug flags on Cmake? - Do we need to look at the console while the bug happens? - Other steps --> 1. Go to siltfin shore. 2. Observe the amount of murlocs 3. Cry ##### EXTRA NOTES: <!-- Any information that can help the developers to identify and fix the issue should be put here. Examples: - was this bug always present in AzerothCore? if it was introduced after a change, please mention it - the code line(s) that cause the issue - does this feature work in other server appplications (e.g. CMaNGOS, TrinityCore, etc...) ? --> ##### AC HASH/COMMIT: <!-- IF YOU DO NOT FILL THIS OUT, WE WILL CLOSE YOUR ISSUE! NEVER WRITE "LATEST", ALWAYS PUT THE ACTUAL VALUE INSTEAD. Find the commit hash (unique identifier) by running "git log" on your own clone of AzerothCore or by looking at here https://github.com/azerothcore/azerothcore-wotlk/commits/master --> ChromieCraft 2020-12-31 6414b40 (chromiecraft) ##### OPERATING SYSTEM: <!-- Windows 7/10, Debian 8/9/10, Ubuntu 16/18 etc... --> ChromieCraft ##### MODULES: <!-- Are you using modules? If yes, list them (note them down in a .txt for opening future issues) --> ChromieCraft ##### OTHER CUSTOMIZATIONS: <!-- Are you using any extra script? - Did you apply any core patch/diff? - Did you modify your database? - Or do you have other customizations? If yes please specify them here. --> ChromieCraft <!-- ------------------------- THE END ------------------------------ Thank you for your contribution. If you use AzerothCore regularly, we really NEED your help to: - TEST our fixes ( http://www.azerothcore.org/wiki/Contribute#how-to-test-a-pull-request ) - Report issues - Improve the documentation/wiki With your help the project can evolve much quicker! --> <!-- NOTE: If you intend to contribute more than once, you should really join us on our discord channel! We set cosmetic ranks for our contributors and may give access to special resources/knowledge to them! The link is on our site http://azerothcore.org/ --> <bountysource-plugin> --- Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/95701936-siltfin-murloc-population-too-high-on-siltfin-shore-azuremyst?utm_campaign=plugin&utm_content=tracker%2F40032087&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F40032087&utm_medium=issues&utm_source=github). </bountysource-plugin>
non_design
siltfin murloc population too high on siltfin shore azuremyst this template is for problem reports for feature suggestion etc feel free to edit it if this is a crash report upload the crashlog on for issues containing a fix please create a pull request following this tutorial siltfin murloc population too high on siltfin shore azuremyst current behaviour there are almost siltfins on the small beach which made doing the lvl quest extremely hard for a group of two priest shaman players i couldn t imagine doing it alone as every pull pulls murlocs expected blizzlike behaviour half the murlocs give or take video is from and people have been clearing the area but the difference is extreme steps to reproduce the problem describe precisely how to reproduce the bug so we can fix it or confirm its existence which commands to use which npc to teleport to do we need to have debug flags on cmake do we need to look at the console while the bug happens other steps go to siltfin shore observe the amount of murlocs cry extra notes any information that can help the developers to identify and fix the issue should be put here examples was this bug always present in azerothcore if it was introduced after a change please mention it the code line s that cause the issue does this feature work in other server appplications e g cmangos trinitycore etc ac hash commit if you do not fill this out we will close your issue never write latest always put the actual value instead find the commit hash unique identifier by running git log on your own clone of azerothcore or by looking at here chromiecraft chromiecraft operating system chromiecraft modules chromiecraft other customizations are you using any extra script did you apply any core patch diff did you modify your database or do you have other customizations if yes please specify them here chromiecraft the end thank you for your contribution if you use azerothcore regularly we really need your help to test our fixes report issues improve the documentation wiki with your help the project can evolve much quicker note if you intend to contribute more than once you should really join us on our discord channel we set cosmetic ranks for our contributors and may give access to special resources knowledge to them the link is on our site want to back this issue we accept bounties via
0
123,364
16,485,887,284
IssuesEvent
2021-05-24 17:53:48
carbon-design-system/carbon-for-ibm-dotcom
https://api.github.com/repos/carbon-design-system/carbon-for-ibm-dotcom
closed
[Filter panel] Design support of the a/b testing by the ibm.com search team
Airtable Done design design: research
<!-- Avoid any type of solutions in this user story --> <!-- replace _{{...}}_ with your own words or remove --> #### User Story <!-- {{Provide a detailed description of the user's need here, but avoid any type of solutions}} --> > As a `[user role below]`: DDS designer > I need to: provide a/b testing consulting support to the ibm.com Search team > so that I can: have the metrics to refine / improve the filter panel designs #### Additional information <!-- {{Please provide any additional information or resources for reference}} --> - ibm.com Search Offering Manager: Dave McDuff #### Acceptance criteria - [x] Meet with the ibm.com Search squad, as needed - [ ] _{{State another}}_ - [ ] _{{And another}}_ <!-- Consider the following when writing Acceptance criteria for this story. --> <!-- *** Each product backlog item or user story should have at least one Acceptance criteria. --> <!-- *** Acceptance criteria defines a deliverable that can be completed in a single sprint --> <!-- *** Each Acceptance criterion is independently testable. --> <!-- *** Include functional as well as non-functional criteria – when relevant. --> <!-- *** Team members write Acceptance criteria and the Product Owner verifies it. -->
2.0
[Filter panel] Design support of the a/b testing by the ibm.com search team - <!-- Avoid any type of solutions in this user story --> <!-- replace _{{...}}_ with your own words or remove --> #### User Story <!-- {{Provide a detailed description of the user's need here, but avoid any type of solutions}} --> > As a `[user role below]`: DDS designer > I need to: provide a/b testing consulting support to the ibm.com Search team > so that I can: have the metrics to refine / improve the filter panel designs #### Additional information <!-- {{Please provide any additional information or resources for reference}} --> - ibm.com Search Offering Manager: Dave McDuff #### Acceptance criteria - [x] Meet with the ibm.com Search squad, as needed - [ ] _{{State another}}_ - [ ] _{{And another}}_ <!-- Consider the following when writing Acceptance criteria for this story. --> <!-- *** Each product backlog item or user story should have at least one Acceptance criteria. --> <!-- *** Acceptance criteria defines a deliverable that can be completed in a single sprint --> <!-- *** Each Acceptance criterion is independently testable. --> <!-- *** Include functional as well as non-functional criteria – when relevant. --> <!-- *** Team members write Acceptance criteria and the Product Owner verifies it. -->
design
design support of the a b testing by the ibm com search team user story as a dds designer i need to provide a b testing consulting support to the ibm com search team so that i can have the metrics to refine improve the filter panel designs additional information ibm com search offering manager dave mcduff acceptance criteria meet with the ibm com search squad as needed state another and another
1
692,494
23,737,068,501
IssuesEvent
2022-08-31 09:02:33
lowRISC/opentitan
https://api.github.com/repos/lowRISC/opentitan
closed
[ci] CW310 test failures are ignored - false positive
Priority:P0 Type:Bug Component:CI SW:ROM
Please see the [cw310 tests log](https://dev.azure.com/lowrisc/4c50229e-f6cb-4f39-8522-585bb3841438/_apis/build/builds/92369/logs/200) of fe8a53a299d244d254b4a80eb83d8747d4c046a4: ``` 2022-08-31T00:26:31.2909692Z Executed 179 out of 179 tests: 172 tests pass and 7 fail locally. 2022-08-31T00:26:31.2943205Z 2022-08-31T00:26:31.2944353Z (00:26:31) INFO: Build completed, 7 tests FAILED, 3570 total actions 2022-08-31T00:26:31.3021220Z + python3 ./util/fpga/cw310_reboot.py 2022-08-31T00:26:31.4598862Z Found CW310 with FW Version: 0.40.1 2022-08-31T00:26:31.4752410Z To reproduce failures locally, follow the instructions at https://docs.opentitan.org/doc/getting_started/setup_fpga/#reproducing-fpga-ci-failures-locally 2022-08-31T00:26:31.4815181Z ##[section]Finishing: Execute tests ``` ![image](https://user-images.githubusercontent.com/57949550/187578939-7260703f-c178-4c82-af9c-7ab20c66694e.png)
1.0
[ci] CW310 test failures are ignored - false positive - Please see the [cw310 tests log](https://dev.azure.com/lowrisc/4c50229e-f6cb-4f39-8522-585bb3841438/_apis/build/builds/92369/logs/200) of fe8a53a299d244d254b4a80eb83d8747d4c046a4: ``` 2022-08-31T00:26:31.2909692Z Executed 179 out of 179 tests: 172 tests pass and 7 fail locally. 2022-08-31T00:26:31.2943205Z 2022-08-31T00:26:31.2944353Z (00:26:31) INFO: Build completed, 7 tests FAILED, 3570 total actions 2022-08-31T00:26:31.3021220Z + python3 ./util/fpga/cw310_reboot.py 2022-08-31T00:26:31.4598862Z Found CW310 with FW Version: 0.40.1 2022-08-31T00:26:31.4752410Z To reproduce failures locally, follow the instructions at https://docs.opentitan.org/doc/getting_started/setup_fpga/#reproducing-fpga-ci-failures-locally 2022-08-31T00:26:31.4815181Z ##[section]Finishing: Execute tests ``` ![image](https://user-images.githubusercontent.com/57949550/187578939-7260703f-c178-4c82-af9c-7ab20c66694e.png)
non_design
test failures are ignored false positive please see the of executed out of tests tests pass and fail locally info build completed tests failed total actions util fpga reboot py found with fw version to reproduce failures locally follow the instructions at finishing execute tests
0
28,324
4,098,287,629
IssuesEvent
2016-06-03 07:39:39
brave/browser-laptop
https://api.github.com/repos/brave/browser-laptop
reopened
browserWindow has no icon
design
browserWindow needs an icon for brave to show an icon on Ubuntu or you get a grey icon: ![selection_001](https://cloud.githubusercontent.com/assets/41970/14382939/f1b98076-fd91-11e5-8a83-4ca94d8ebc51.png) This should be added here: https://github.com/brave/browser-laptop/blob/75c788aeb00b82957b7be58473332df5da13ac80/js/stores/appStore.js#L111 and it should be a png.
1.0
browserWindow has no icon - browserWindow needs an icon for brave to show an icon on Ubuntu or you get a grey icon: ![selection_001](https://cloud.githubusercontent.com/assets/41970/14382939/f1b98076-fd91-11e5-8a83-4ca94d8ebc51.png) This should be added here: https://github.com/brave/browser-laptop/blob/75c788aeb00b82957b7be58473332df5da13ac80/js/stores/appStore.js#L111 and it should be a png.
design
browserwindow has no icon browserwindow needs an icon for brave to show an icon on ubuntu or you get a grey icon this should be added here and it should be a png
1
306,590
23,165,586,249
IssuesEvent
2022-07-30 00:10:39
Soontao/cds-mysql
https://api.github.com/repos/Soontao/cds-mysql
closed
[FEATURE REQUEST] support partition
documentation enhancement
**Is your feature request related to a problem? Please describe.** A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] **Describe the solution you'd like** A clear and concise description of what you want to happen. **Describe alternatives you've considered** A clear and concise description of any alternative solutions or features you've considered. **Additional context** Add any other context or screenshots about the feature request here.
1.0
[FEATURE REQUEST] support partition - **Is your feature request related to a problem? Please describe.** A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] **Describe the solution you'd like** A clear and concise description of what you want to happen. **Describe alternatives you've considered** A clear and concise description of any alternative solutions or features you've considered. **Additional context** Add any other context or screenshots about the feature request here.
non_design
support partition is your feature request related to a problem please describe a clear and concise description of what the problem is ex i m always frustrated when describe the solution you d like a clear and concise description of what you want to happen describe alternatives you ve considered a clear and concise description of any alternative solutions or features you ve considered additional context add any other context or screenshots about the feature request here
0
91,042
18,289,820,266
IssuesEvent
2021-10-05 14:11:16
hardkoded/puppeteer-sharp
https://api.github.com/repos/hardkoded/puppeteer-sharp
closed
Add missing tests input.spec.ts
puppeteer code
input.spec.ts: FileChooser.accept: should fail for non-existent files
1.0
Add missing tests input.spec.ts - input.spec.ts: FileChooser.accept: should fail for non-existent files
non_design
add missing tests input spec ts input spec ts filechooser accept should fail for non existent files
0
174,267
27,610,007,191
IssuesEvent
2023-03-09 15:23:34
RRZE-Webteam/FAU-Einrichtungen
https://api.github.com/repos/RRZE-Webteam/FAU-Einrichtungen
opened
Hauptmenü Farbgebung – Der Hover nutzt die Aktive Farbe
Diskussion Design Prüfen
Wieder mal was zu prüfen / diskutieren Aktuell ist beim Hover der Menüpunkte zu sehen, dass diese im aktiven Blau hinterlegt sind. Die Buttons sind beim Hover in einem dunkleren FAU-Blauton gehalten. Es sollte (in Rücksprache mit Silke) einheitlich sein. Der Hover müsste also eigentlich ebenfalls das dunklere Blau nutzen, wenn Silke und ich das richtig gesehen haben. Side by side. Hover-Element nutzt die gleiche Farbe wie der Standard-Button. <img width="1509" alt="Bildschirm­foto 2023-03-09 um 16 22 39" src="https://user-images.githubusercontent.com/58593037/224070351-cefffc98-176c-4fe6-9b0c-65d21665e8d4.png">
1.0
Hauptmenü Farbgebung – Der Hover nutzt die Aktive Farbe - Wieder mal was zu prüfen / diskutieren Aktuell ist beim Hover der Menüpunkte zu sehen, dass diese im aktiven Blau hinterlegt sind. Die Buttons sind beim Hover in einem dunkleren FAU-Blauton gehalten. Es sollte (in Rücksprache mit Silke) einheitlich sein. Der Hover müsste also eigentlich ebenfalls das dunklere Blau nutzen, wenn Silke und ich das richtig gesehen haben. Side by side. Hover-Element nutzt die gleiche Farbe wie der Standard-Button. <img width="1509" alt="Bildschirm­foto 2023-03-09 um 16 22 39" src="https://user-images.githubusercontent.com/58593037/224070351-cefffc98-176c-4fe6-9b0c-65d21665e8d4.png">
design
hauptmenü farbgebung – der hover nutzt die aktive farbe wieder mal was zu prüfen diskutieren aktuell ist beim hover der menüpunkte zu sehen dass diese im aktiven blau hinterlegt sind die buttons sind beim hover in einem dunkleren fau blauton gehalten es sollte in rücksprache mit silke einheitlich sein der hover müsste also eigentlich ebenfalls das dunklere blau nutzen wenn silke und ich das richtig gesehen haben side by side hover element nutzt die gleiche farbe wie der standard button img width alt bildschirm­foto um src
1
593,020
17,936,122,207
IssuesEvent
2021-09-10 15:31:45
googleapis/google-cloud-dotnet
https://api.github.com/repos/googleapis/google-cloud-dotnet
closed
TailLogEntries crashes every hour
type: question api: logging priority: p2
I understand that `TailLogEntries` is pre-GA, but maybe it will help. #### Environment details - OS: Ubuntu 20.04 - .NET version: 5.0.9 - Package name and version: Google.Cloud.Logging.V2 3.4.0 #### Steps to reproduce Code: ```cs LoggingServiceV2Client client = await _gcpLoggingClientBuilder.BuildAsync(ct); CallSettings callsettings = CallSettings.FromExpiration(Expiration.None); LoggingServiceV2Client.TailLogEntriesStream response = client.TailLogEntries(callsettings); ct.Register(async () => await response.WriteCompleteAsync()); Task responseHandlerTask = Task.Run(async () => { AsyncResponseStream<TailLogEntriesResponse> responseStream = response.GetResponseStream(); await foreach (TailLogEntriesResponse responseItem in responseStream) { for (int i = 0; i < responseItem.Entries.Count; i++) { LogEntry entry = responseItem.Entries[i]; await SendMessageAsync(entry, ct); } } }, CancellationToken.None); TailLogEntriesRequest request = new() { ResourceNames = { _resourceName }, Filter = _filter }; await response.WriteAsync(request); await responseHandlerTask; ``` `foreach` over `responseStream` fails every hour with: `Grpc.Core.RpcException: Status(StatusCode="Unavailable", Detail="The service is currently unavailable."` `Grpc.Core.RpcException: Status(StatusCode="Unavailable", Detail="Connection reset by peer"` Without `CallSettings callsettings = CallSettings.FromExpiration(Expiration.None);` the error was `Grpc.Core.RpcException: Status(StatusCode="DeadlineExceeded", Detail="Deadline Exceeded"` UPD: Recently found that service just stopped receiving responses without any error UPD: FYI we are doing `strip --strip-debug libgrpc_csharp_ext.x64.so` for builds, because this file is very huge. Could it be the reason? I think this is connected with #4813
1.0
TailLogEntries crashes every hour - I understand that `TailLogEntries` is pre-GA, but maybe it will help. #### Environment details - OS: Ubuntu 20.04 - .NET version: 5.0.9 - Package name and version: Google.Cloud.Logging.V2 3.4.0 #### Steps to reproduce Code: ```cs LoggingServiceV2Client client = await _gcpLoggingClientBuilder.BuildAsync(ct); CallSettings callsettings = CallSettings.FromExpiration(Expiration.None); LoggingServiceV2Client.TailLogEntriesStream response = client.TailLogEntries(callsettings); ct.Register(async () => await response.WriteCompleteAsync()); Task responseHandlerTask = Task.Run(async () => { AsyncResponseStream<TailLogEntriesResponse> responseStream = response.GetResponseStream(); await foreach (TailLogEntriesResponse responseItem in responseStream) { for (int i = 0; i < responseItem.Entries.Count; i++) { LogEntry entry = responseItem.Entries[i]; await SendMessageAsync(entry, ct); } } }, CancellationToken.None); TailLogEntriesRequest request = new() { ResourceNames = { _resourceName }, Filter = _filter }; await response.WriteAsync(request); await responseHandlerTask; ``` `foreach` over `responseStream` fails every hour with: `Grpc.Core.RpcException: Status(StatusCode="Unavailable", Detail="The service is currently unavailable."` `Grpc.Core.RpcException: Status(StatusCode="Unavailable", Detail="Connection reset by peer"` Without `CallSettings callsettings = CallSettings.FromExpiration(Expiration.None);` the error was `Grpc.Core.RpcException: Status(StatusCode="DeadlineExceeded", Detail="Deadline Exceeded"` UPD: Recently found that service just stopped receiving responses without any error UPD: FYI we are doing `strip --strip-debug libgrpc_csharp_ext.x64.so` for builds, because this file is very huge. Could it be the reason? I think this is connected with #4813
non_design
taillogentries crashes every hour i understand that taillogentries is pre ga but maybe it will help environment details os ubuntu net version package name and version google cloud logging steps to reproduce code cs client await gcploggingclientbuilder buildasync ct callsettings callsettings callsettings fromexpiration expiration none taillogentriesstream response client taillogentries callsettings ct register async await response writecompleteasync task responsehandlertask task run async asyncresponsestream responsestream response getresponsestream await foreach taillogentriesresponse responseitem in responsestream for int i i responseitem entries count i logentry entry responseitem entries await sendmessageasync entry ct cancellationtoken none taillogentriesrequest request new resourcenames resourcename filter filter await response writeasync request await responsehandlertask foreach over responsestream fails every hour with grpc core rpcexception status statuscode unavailable detail the service is currently unavailable grpc core rpcexception status statuscode unavailable detail connection reset by peer without callsettings callsettings callsettings fromexpiration expiration none the error was grpc core rpcexception status statuscode deadlineexceeded detail deadline exceeded upd recently found that service just stopped receiving responses without any error upd fyi we are doing strip strip debug libgrpc csharp ext so for builds because this file is very huge could it be the reason i think this is connected with
0
24,076
3,881,245,168
IssuesEvent
2016-04-13 02:57:37
department-of-veterans-affairs/veterans-employment-center
https://api.github.com/repos/department-of-veterans-affairs/veterans-employment-center
opened
text wrap looks off on C&E page
design
@gnakm is the text on this page supposed to wrap like this? it's only going partially across the page. ![screen shot 2016-04-12 at 10 56 26 pm](https://cloud.githubusercontent.com/assets/13770771/14481537/f10fc504-0101-11e6-9b61-6afeafafdf3d.png)
1.0
text wrap looks off on C&E page - @gnakm is the text on this page supposed to wrap like this? it's only going partially across the page. ![screen shot 2016-04-12 at 10 56 26 pm](https://cloud.githubusercontent.com/assets/13770771/14481537/f10fc504-0101-11e6-9b61-6afeafafdf3d.png)
design
text wrap looks off on c e page gnakm is the text on this page supposed to wrap like this it s only going partially across the page
1
49,041
13,185,204,085
IssuesEvent
2020-08-12 20:55:55
icecube-trac/tix3
https://api.github.com/repos/icecube-trac/tix3
opened
Doxygen docs generation is broken (Trac #642)
Incomplete Migration Migrated from Trac defect documentation
<details> <summary><em>Migrated from https://code.icecube.wisc.edu/ticket/642 , reported by nega and owned by nega</em></summary> <p> ```json { "status": "closed", "changetime": "2014-10-03T18:23:33", "description": "Duplicate of #282", "reporter": "nega", "cc": "", "resolution": "duplicate", "_ts": "1412360613040634", "component": "documentation", "summary": "Doxygen docs generation is broken", "priority": "normal", "keywords": "", "time": "2011-06-13T03:43:27", "milestone": "", "owner": "nega", "type": "defect" } ``` </p> </details>
1.0
Doxygen docs generation is broken (Trac #642) - <details> <summary><em>Migrated from https://code.icecube.wisc.edu/ticket/642 , reported by nega and owned by nega</em></summary> <p> ```json { "status": "closed", "changetime": "2014-10-03T18:23:33", "description": "Duplicate of #282", "reporter": "nega", "cc": "", "resolution": "duplicate", "_ts": "1412360613040634", "component": "documentation", "summary": "Doxygen docs generation is broken", "priority": "normal", "keywords": "", "time": "2011-06-13T03:43:27", "milestone": "", "owner": "nega", "type": "defect" } ``` </p> </details>
non_design
doxygen docs generation is broken trac migrated from reported by nega and owned by nega json status closed changetime description duplicate of reporter nega cc resolution duplicate ts component documentation summary doxygen docs generation is broken priority normal keywords time milestone owner nega type defect
0
124,186
16,593,514,591
IssuesEvent
2021-06-01 10:37:51
ThreeSixtyGiving/grantnav
https://api.github.com/repos/ThreeSixtyGiving/grantnav
closed
Search results - gap between "filters applied" and stats box is too small
Low Priority for March Launch issue needs clarification new design
![image](https://user-images.githubusercontent.com/1049910/110494642-b35fc500-80eb-11eb-81fb-b55b2f0b2a38.png) Inserting `<div class="spacer-3"></div>` before the filter panel seems to work.
1.0
Search results - gap between "filters applied" and stats box is too small - ![image](https://user-images.githubusercontent.com/1049910/110494642-b35fc500-80eb-11eb-81fb-b55b2f0b2a38.png) Inserting `<div class="spacer-3"></div>` before the filter panel seems to work.
design
search results gap between filters applied and stats box is too small inserting before the filter panel seems to work
1
109,686
11,647,672,057
IssuesEvent
2020-03-01 16:24:50
universal-ctags/ctags
https://api.github.com/repos/universal-ctags/ctags
closed
docs: write about pattern truncation
Documentation Incompatibilities
I introduced code truncating a pattern for handling too long input line. I should wirte about it to docs/format.rst.
1.0
docs: write about pattern truncation - I introduced code truncating a pattern for handling too long input line. I should wirte about it to docs/format.rst.
non_design
docs write about pattern truncation i introduced code truncating a pattern for handling too long input line i should wirte about it to docs format rst
0
87,817
10,968,616,525
IssuesEvent
2019-11-28 12:03:24
statsmodels/statsmodels
https://api.github.com/repos/statsmodels/statsmodels
closed
KDEUnivariate bug with data at only one point
comp-nonparametric corner-case design
If a `KDEUnivariate` object is created with points only at one location it causes the density to be evaluated to `nan`. See this gist: https://gist.github.com/Padarn/2641c248e5f0a3bc7c3d This is because the `bw` parameter is set to zero. EDIT: Perhaps `bandwidths.py` should just default to `1` if `_select_sigma(X)=0`?
1.0
KDEUnivariate bug with data at only one point - If a `KDEUnivariate` object is created with points only at one location it causes the density to be evaluated to `nan`. See this gist: https://gist.github.com/Padarn/2641c248e5f0a3bc7c3d This is because the `bw` parameter is set to zero. EDIT: Perhaps `bandwidths.py` should just default to `1` if `_select_sigma(X)=0`?
design
kdeunivariate bug with data at only one point if a kdeunivariate object is created with points only at one location it causes the density to be evaluated to nan see this gist this is because the bw parameter is set to zero edit perhaps bandwidths py should just default to if select sigma x
1
6,567
4,346,747,666
IssuesEvent
2016-07-29 17:03:20
bocoup/skillsbot
https://api.github.com/repos/bocoup/skillsbot
closed
Rename “for” command to “user" and test
usability
(eg. “user @cowboy” to see Ben’s skills) This issue came out of usability testing. Many participants were unable to differentiate between the "for" and "find" commands.
True
Rename “for” command to “user" and test - (eg. “user @cowboy” to see Ben’s skills) This issue came out of usability testing. Many participants were unable to differentiate between the "for" and "find" commands.
non_design
rename “for” command to “user and test eg “user cowboy” to see ben’s skills this issue came out of usability testing many participants were unable to differentiate between the for and find commands
0
144,042
5,534,769,016
IssuesEvent
2017-03-21 16:01:28
Cadasta/cadasta-platform
https://api.github.com/repos/Cadasta/cadasta-platform
reopened
AssertionError at /api/v1/users/<user-name>/
bug priority: low
### Steps to reproduce the error - Login with superuser (ex: 'iross' on local development server) - visit /api/v1/users/**user-name**/ ### Actual behavior - AssertionError : >Expected view UserAdminDetail to be called with a URL keyword argument named "username". Fix your URL conf, or set the `.lookup_field` attribute on the view correctly. ### Expected behavior According to Docs [link](https://devwiki.corp.cadasta.org/User%20management%20API#get-a-single-user) superuser should be able to see specific user's details (ex: first_name, last_name, email ) and should be able to update them.
1.0
AssertionError at /api/v1/users/<user-name>/ - ### Steps to reproduce the error - Login with superuser (ex: 'iross' on local development server) - visit /api/v1/users/**user-name**/ ### Actual behavior - AssertionError : >Expected view UserAdminDetail to be called with a URL keyword argument named "username". Fix your URL conf, or set the `.lookup_field` attribute on the view correctly. ### Expected behavior According to Docs [link](https://devwiki.corp.cadasta.org/User%20management%20API#get-a-single-user) superuser should be able to see specific user's details (ex: first_name, last_name, email ) and should be able to update them.
non_design
assertionerror at api users steps to reproduce the error login with superuser ex iross on local development server visit api users user name actual behavior assertionerror expected view useradmindetail to be called with a url keyword argument named username fix your url conf or set the lookup field attribute on the view correctly expected behavior according to docs superuser should be able to see specific user s details ex first name last name email and should be able to update them
0
160,402
25,158,241,917
IssuesEvent
2022-11-10 15:00:48
mapasculturais/mapasculturais
https://api.github.com/repos/mapasculturais/mapasculturais
opened
[Redesign] Telas do Cadastro Único no Base V2
Design / UX Modernização da Interface
Telas dos Agentes: Definir local dos campos do Cadastro Único e a Carteira do Cadastro Único da Cultura (Cartão de Visita)
1.0
[Redesign] Telas do Cadastro Único no Base V2 - Telas dos Agentes: Definir local dos campos do Cadastro Único e a Carteira do Cadastro Único da Cultura (Cartão de Visita)
design
telas do cadastro único no base telas dos agentes definir local dos campos do cadastro único e a carteira do cadastro único da cultura cartão de visita
1
88,960
11,184,066,654
IssuesEvent
2019-12-31 16:16:01
department-of-veterans-affairs/va.gov-team
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
closed
Form Requirements Inventory
design discovery documentation vsa-benefits-2
## User Story or Problem Statement As a UX designer, I need to create a form requirements inventory so I can have a document containing all the required pieces for VA form 2345 (prosthetic socks) and VA form 2346 (hearing aid batteries). ## Task - [x] Create a list end points items. (base requirements) - [x] meet with design team a review similar items from each order method. - [x] GH list - [ ] share with DLC ## Goal _A document containing an inventory of both VA form 2345 and 2346_ ## Objectives or Key Results this is meant to further - _Ensures that all required pieces are included in the form's design_ ## Acceptance Criteria - [x] _Create a document (most likely a Mural) containing an inventory for VA form 2345 & 2346_ - [x] _Share document with development team_ - [x] _Share the document's link in the comments section of this ticket_
1.0
Form Requirements Inventory - ## User Story or Problem Statement As a UX designer, I need to create a form requirements inventory so I can have a document containing all the required pieces for VA form 2345 (prosthetic socks) and VA form 2346 (hearing aid batteries). ## Task - [x] Create a list end points items. (base requirements) - [x] meet with design team a review similar items from each order method. - [x] GH list - [ ] share with DLC ## Goal _A document containing an inventory of both VA form 2345 and 2346_ ## Objectives or Key Results this is meant to further - _Ensures that all required pieces are included in the form's design_ ## Acceptance Criteria - [x] _Create a document (most likely a Mural) containing an inventory for VA form 2345 & 2346_ - [x] _Share document with development team_ - [x] _Share the document's link in the comments section of this ticket_
design
form requirements inventory user story or problem statement as a ux designer i need to create a form requirements inventory so i can have a document containing all the required pieces for va form prosthetic socks and va form hearing aid batteries task create a list end points items base requirements meet with design team a review similar items from each order method gh list share with dlc goal a document containing an inventory of both va form and objectives or key results this is meant to further ensures that all required pieces are included in the form s design acceptance criteria create a document most likely a mural containing an inventory for va form share document with development team share the document s link in the comments section of this ticket
1
446,642
31,551,849,424
IssuesEvent
2023-09-02 06:26:31
bazelbuild/bazel
https://api.github.com/repos/bazelbuild/bazel
opened
Add a note in the 'Distribution file directories'
type: documentation (cleanup) untriaged team-Documentation
### Page link: https://bazel.build/run/build#running-bazel-in-an-airgapped-environment ### Problem description (include actual vs expected text, if applicable): It took me a while to understand that the the tar files need to be located in the directory uncompressed. I would be nice to just add a little note or an an example, e.g. (I was using the cpp-tuturial and had to include this to make it work) $HOME/bazel/repos |----- rules_cc-0.0.2.tar.gz |----- bazelci_rules-1.0.0.tar.gz bazel run --distdir=$HOME/bazel/repos //main:hello-world ### Where do you see this issue? (include link to specific section of the page, if applicable) It is not really an issue, just make the documentation a bit clearer ### Any other information you'd like to share? This entry on stackoverflow put me on the right track https://stackoverflow.com/questions/67077183/bazel-build-air-gapped
2.0
Add a note in the 'Distribution file directories' - ### Page link: https://bazel.build/run/build#running-bazel-in-an-airgapped-environment ### Problem description (include actual vs expected text, if applicable): It took me a while to understand that the the tar files need to be located in the directory uncompressed. I would be nice to just add a little note or an an example, e.g. (I was using the cpp-tuturial and had to include this to make it work) $HOME/bazel/repos |----- rules_cc-0.0.2.tar.gz |----- bazelci_rules-1.0.0.tar.gz bazel run --distdir=$HOME/bazel/repos //main:hello-world ### Where do you see this issue? (include link to specific section of the page, if applicable) It is not really an issue, just make the documentation a bit clearer ### Any other information you'd like to share? This entry on stackoverflow put me on the right track https://stackoverflow.com/questions/67077183/bazel-build-air-gapped
non_design
add a note in the distribution file directories page link problem description include actual vs expected text if applicable it took me a while to understand that the the tar files need to be located in the directory uncompressed i would be nice to just add a little note or an an example e g i was using the cpp tuturial and had to include this to make it work home bazel repos rules cc tar gz bazelci rules tar gz bazel run distdir home bazel repos main hello world where do you see this issue include link to specific section of the page if applicable it is not really an issue just make the documentation a bit clearer any other information you d like to share this entry on stackoverflow put me on the right track
0
15,118
8,773,432,312
IssuesEvent
2018-12-18 16:50:57
tensorflow/tensorflow
https://api.github.com/repos/tensorflow/tensorflow
closed
Bug: instantiating dynamic_rnn with tf.int32 in input and state raises TypeError
type:bug/performance
**System information** - OS Platform: OS X 10.13.3 - Custom code - tensorflow version: 1.12.0 - python version: 3.6.5 **Describe the current behavior** Tensorflow raises a TypeError when creating a dynamic_rnn with tf.int32 type in its input and state. When changing the type to tf.float32 the error is not raised. **Describe the expected behavior** Ideally, a dynamic_rnn should support tf.in32 types. If there's any reason why instantiating a dynamic_rnn with tf.int32 type in its input and state should not be allowed, a custom error should be raised. **Code to reproduce the issue** The code below reproduces the error: ``` import tensorflow as tf X = tf.placeholder(tf.int32, [None, 10, 1]) cell = tf.nn.rnn_cell.LSTMCell(1, dtype=tf.int32) output, state = tf.nn.dynamic_rnn(cell=cell, inputs=X, dtype=tf.int32) ``` The code below doesn't: ``` import tensorflow as tf X = tf.placeholder(tf.float32, [None, 10, 1]) cell = tf.nn.rnn_cell.LSTMCell(1, dtype=tf.float32) output, state = tf.nn.dynamic_rnn(cell=cell, inputs=X, dtype=tf.float32) ``` Note the change in dtype. **Other info / logs** TRACEBACK: --------------------------------------------------------------------------- TypeError Traceback (most recent call last) <ipython-input-3-1d83a30f7748> in <module>() 2 X = tf.placeholder(tf.int32, [None, 10, 1]) 3 cell = tf.nn.rnn_cell.LSTMCell(1, dtype=tf.int32) ----> 4 output, state = tf.nn.dynamic_rnn(cell=cell, inputs=X, dtype=tf.int32)#, initial_state=state) 5 ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/rnn.py in dynamic_rnn(cell, inputs, sequence_length, initial_state, dtype, parallel_iterations, swap_memory, time_major, scope) 662 swap_memory=swap_memory, 663 sequence_length=sequence_length, --> 664 dtype=dtype) 665 666 # Outputs of _dynamic_rnn_loop are always shaped [time, batch, depth]. ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/rnn.py in _dynamic_rnn_loop(cell, inputs, initial_state, parallel_iterations, swap_memory, sequence_length, dtype) 870 parallel_iterations=parallel_iterations, 871 maximum_iterations=time_steps, --> 872 swap_memory=swap_memory) 873 874 # Unpack final output if not using output tuples. ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/control_flow_ops.py in while_loop(cond, body, loop_vars, shape_invariants, parallel_iterations, back_prop, swap_memory, name, maximum_iterations, return_same_structure) 3289 ops.add_to_collection(ops.GraphKeys.WHILE_CONTEXT, loop_context) 3290 result = loop_context.BuildLoop(cond, body, loop_vars, shape_invariants, -> 3291 return_same_structure) 3292 if maximum_iterations is not None: 3293 return result[1] ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/control_flow_ops.py in BuildLoop(self, pred, body, loop_vars, shape_invariants, return_same_structure) 3002 with ops.get_default_graph()._mutation_lock(): # pylint: disable=protected-access 3003 original_body_result, exit_vars = self._BuildLoop( -> 3004 pred, body, original_loop_vars, loop_vars, shape_invariants) 3005 finally: 3006 self.Exit() ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/control_flow_ops.py in _BuildLoop(self, pred, body, original_loop_vars, loop_vars, shape_invariants) 2937 flat_sequence=vars_for_body_with_tensor_arrays) 2938 pre_summaries = ops.get_collection(ops.GraphKeys._SUMMARY_COLLECTION) # pylint: disable=protected-access -> 2939 body_result = body(*packed_vars_for_body) 2940 post_summaries = ops.get_collection(ops.GraphKeys._SUMMARY_COLLECTION) # pylint: disable=protected-access 2941 if not nest.is_sequence(body_result): ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/control_flow_ops.py in <lambda>(i, lv) 3258 cond = lambda i, lv: ( # pylint: disable=g-long-lambda 3259 math_ops.logical_and(i < maximum_iterations, orig_cond(*lv))) -> 3260 body = lambda i, lv: (i + 1, orig_body(*lv)) 3261 3262 if context.executing_eagerly(): ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/rnn.py in _time_step(time, output_ta_t, state) 838 skip_conditionals=True) 839 else: --> 840 (output, new_state) = call_cell() 841 842 # Keras cells always wrap state as list, even if it's a single tensor. ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/rnn.py in <lambda>() 824 if is_keras_rnn_cell and not nest.is_sequence(state): 825 state = [state] --> 826 call_cell = lambda: cell(input_t, state) 827 828 if sequence_length is not None: ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/rnn_cell_impl.py in __call__(self, inputs, state, scope, *args, **kwargs) 368 # method. See the class docstring for more details. 369 return base_layer.Layer.__call__(self, inputs, state, scope=scope, --> 370 *args, **kwargs) 371 372 ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/layers/base.py in __call__(self, inputs, *args, **kwargs) 372 373 # Actually call layer --> 374 outputs = super(Layer, self).__call__(inputs, *args, **kwargs) 375 376 if not context.executing_eagerly(): ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/keras/engine/base_layer.py in __call__(self, inputs, *args, **kwargs) 755 if not in_deferred_mode: 756 self._in_call = True --> 757 outputs = self.call(inputs, *args, **kwargs) 758 self._in_call = False 759 if outputs is None: ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/rnn_cell_impl.py in call(self, inputs, state) 1003 sigmoid(i + self._w_i_diag * c_prev) * self._activation(j)) 1004 else: -> 1005 c = (sigmoid(f + self._forget_bias) * c_prev + sigmoid(i) * 1006 self._activation(j)) 1007 TypeError: unsupported operand type(s) for +: 'Tensor' and 'float'
True
Bug: instantiating dynamic_rnn with tf.int32 in input and state raises TypeError - **System information** - OS Platform: OS X 10.13.3 - Custom code - tensorflow version: 1.12.0 - python version: 3.6.5 **Describe the current behavior** Tensorflow raises a TypeError when creating a dynamic_rnn with tf.int32 type in its input and state. When changing the type to tf.float32 the error is not raised. **Describe the expected behavior** Ideally, a dynamic_rnn should support tf.in32 types. If there's any reason why instantiating a dynamic_rnn with tf.int32 type in its input and state should not be allowed, a custom error should be raised. **Code to reproduce the issue** The code below reproduces the error: ``` import tensorflow as tf X = tf.placeholder(tf.int32, [None, 10, 1]) cell = tf.nn.rnn_cell.LSTMCell(1, dtype=tf.int32) output, state = tf.nn.dynamic_rnn(cell=cell, inputs=X, dtype=tf.int32) ``` The code below doesn't: ``` import tensorflow as tf X = tf.placeholder(tf.float32, [None, 10, 1]) cell = tf.nn.rnn_cell.LSTMCell(1, dtype=tf.float32) output, state = tf.nn.dynamic_rnn(cell=cell, inputs=X, dtype=tf.float32) ``` Note the change in dtype. **Other info / logs** TRACEBACK: --------------------------------------------------------------------------- TypeError Traceback (most recent call last) <ipython-input-3-1d83a30f7748> in <module>() 2 X = tf.placeholder(tf.int32, [None, 10, 1]) 3 cell = tf.nn.rnn_cell.LSTMCell(1, dtype=tf.int32) ----> 4 output, state = tf.nn.dynamic_rnn(cell=cell, inputs=X, dtype=tf.int32)#, initial_state=state) 5 ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/rnn.py in dynamic_rnn(cell, inputs, sequence_length, initial_state, dtype, parallel_iterations, swap_memory, time_major, scope) 662 swap_memory=swap_memory, 663 sequence_length=sequence_length, --> 664 dtype=dtype) 665 666 # Outputs of _dynamic_rnn_loop are always shaped [time, batch, depth]. ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/rnn.py in _dynamic_rnn_loop(cell, inputs, initial_state, parallel_iterations, swap_memory, sequence_length, dtype) 870 parallel_iterations=parallel_iterations, 871 maximum_iterations=time_steps, --> 872 swap_memory=swap_memory) 873 874 # Unpack final output if not using output tuples. ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/control_flow_ops.py in while_loop(cond, body, loop_vars, shape_invariants, parallel_iterations, back_prop, swap_memory, name, maximum_iterations, return_same_structure) 3289 ops.add_to_collection(ops.GraphKeys.WHILE_CONTEXT, loop_context) 3290 result = loop_context.BuildLoop(cond, body, loop_vars, shape_invariants, -> 3291 return_same_structure) 3292 if maximum_iterations is not None: 3293 return result[1] ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/control_flow_ops.py in BuildLoop(self, pred, body, loop_vars, shape_invariants, return_same_structure) 3002 with ops.get_default_graph()._mutation_lock(): # pylint: disable=protected-access 3003 original_body_result, exit_vars = self._BuildLoop( -> 3004 pred, body, original_loop_vars, loop_vars, shape_invariants) 3005 finally: 3006 self.Exit() ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/control_flow_ops.py in _BuildLoop(self, pred, body, original_loop_vars, loop_vars, shape_invariants) 2937 flat_sequence=vars_for_body_with_tensor_arrays) 2938 pre_summaries = ops.get_collection(ops.GraphKeys._SUMMARY_COLLECTION) # pylint: disable=protected-access -> 2939 body_result = body(*packed_vars_for_body) 2940 post_summaries = ops.get_collection(ops.GraphKeys._SUMMARY_COLLECTION) # pylint: disable=protected-access 2941 if not nest.is_sequence(body_result): ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/control_flow_ops.py in <lambda>(i, lv) 3258 cond = lambda i, lv: ( # pylint: disable=g-long-lambda 3259 math_ops.logical_and(i < maximum_iterations, orig_cond(*lv))) -> 3260 body = lambda i, lv: (i + 1, orig_body(*lv)) 3261 3262 if context.executing_eagerly(): ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/rnn.py in _time_step(time, output_ta_t, state) 838 skip_conditionals=True) 839 else: --> 840 (output, new_state) = call_cell() 841 842 # Keras cells always wrap state as list, even if it's a single tensor. ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/rnn.py in <lambda>() 824 if is_keras_rnn_cell and not nest.is_sequence(state): 825 state = [state] --> 826 call_cell = lambda: cell(input_t, state) 827 828 if sequence_length is not None: ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/rnn_cell_impl.py in __call__(self, inputs, state, scope, *args, **kwargs) 368 # method. See the class docstring for more details. 369 return base_layer.Layer.__call__(self, inputs, state, scope=scope, --> 370 *args, **kwargs) 371 372 ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/layers/base.py in __call__(self, inputs, *args, **kwargs) 372 373 # Actually call layer --> 374 outputs = super(Layer, self).__call__(inputs, *args, **kwargs) 375 376 if not context.executing_eagerly(): ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/keras/engine/base_layer.py in __call__(self, inputs, *args, **kwargs) 755 if not in_deferred_mode: 756 self._in_call = True --> 757 outputs = self.call(inputs, *args, **kwargs) 758 self._in_call = False 759 if outputs is None: ~/jonassucks3/lib/python3.6/site-packages/tensorflow/python/ops/rnn_cell_impl.py in call(self, inputs, state) 1003 sigmoid(i + self._w_i_diag * c_prev) * self._activation(j)) 1004 else: -> 1005 c = (sigmoid(f + self._forget_bias) * c_prev + sigmoid(i) * 1006 self._activation(j)) 1007 TypeError: unsupported operand type(s) for +: 'Tensor' and 'float'
non_design
bug instantiating dynamic rnn with tf in input and state raises typeerror system information os platform os x custom code tensorflow version python version describe the current behavior tensorflow raises a typeerror when creating a dynamic rnn with tf type in its input and state when changing the type to tf the error is not raised describe the expected behavior ideally a dynamic rnn should support tf types if there s any reason why instantiating a dynamic rnn with tf type in its input and state should not be allowed a custom error should be raised code to reproduce the issue the code below reproduces the error import tensorflow as tf x tf placeholder tf cell tf nn rnn cell lstmcell dtype tf output state tf nn dynamic rnn cell cell inputs x dtype tf the code below doesn t import tensorflow as tf x tf placeholder tf cell tf nn rnn cell lstmcell dtype tf output state tf nn dynamic rnn cell cell inputs x dtype tf note the change in dtype other info logs traceback typeerror traceback most recent call last in x tf placeholder tf cell tf nn rnn cell lstmcell dtype tf output state tf nn dynamic rnn cell cell inputs x dtype tf initial state state lib site packages tensorflow python ops rnn py in dynamic rnn cell inputs sequence length initial state dtype parallel iterations swap memory time major scope swap memory swap memory sequence length sequence length dtype dtype outputs of dynamic rnn loop are always shaped lib site packages tensorflow python ops rnn py in dynamic rnn loop cell inputs initial state parallel iterations swap memory sequence length dtype parallel iterations parallel iterations maximum iterations time steps swap memory swap memory unpack final output if not using output tuples lib site packages tensorflow python ops control flow ops py in while loop cond body loop vars shape invariants parallel iterations back prop swap memory name maximum iterations return same structure ops add to collection ops graphkeys while context loop context result loop context buildloop cond body loop vars shape invariants return same structure if maximum iterations is not none return result lib site packages tensorflow python ops control flow ops py in buildloop self pred body loop vars shape invariants return same structure with ops get default graph mutation lock pylint disable protected access original body result exit vars self buildloop pred body original loop vars loop vars shape invariants finally self exit lib site packages tensorflow python ops control flow ops py in buildloop self pred body original loop vars loop vars shape invariants flat sequence vars for body with tensor arrays pre summaries ops get collection ops graphkeys summary collection pylint disable protected access body result body packed vars for body post summaries ops get collection ops graphkeys summary collection pylint disable protected access if not nest is sequence body result lib site packages tensorflow python ops control flow ops py in i lv cond lambda i lv pylint disable g long lambda math ops logical and i maximum iterations orig cond lv body lambda i lv i orig body lv if context executing eagerly lib site packages tensorflow python ops rnn py in time step time output ta t state skip conditionals true else output new state call cell keras cells always wrap state as list even if it s a single tensor lib site packages tensorflow python ops rnn py in if is keras rnn cell and not nest is sequence state state call cell lambda cell input t state if sequence length is not none lib site packages tensorflow python ops rnn cell impl py in call self inputs state scope args kwargs method see the class docstring for more details return base layer layer call self inputs state scope scope args kwargs lib site packages tensorflow python layers base py in call self inputs args kwargs actually call layer outputs super layer self call inputs args kwargs if not context executing eagerly lib site packages tensorflow python keras engine base layer py in call self inputs args kwargs if not in deferred mode self in call true outputs self call inputs args kwargs self in call false if outputs is none lib site packages tensorflow python ops rnn cell impl py in call self inputs state sigmoid i self w i diag c prev self activation j else c sigmoid f self forget bias c prev sigmoid i self activation j typeerror unsupported operand type s for tensor and float
0
27,882
13,448,525,372
IssuesEvent
2020-09-08 15:35:00
Stillat/meerkat-statamic3
https://api.github.com/repos/Stillat/meerkat-statamic3
opened
Antlers Tags: Automatic Markdown
antlers performance
Provide a parameter `markdown="true/false"` to enable or disable automatic markdown conversion when displaying threads in templates. Default should be `false` and encourage users to utilize existing Antlers modifiers.
True
Antlers Tags: Automatic Markdown - Provide a parameter `markdown="true/false"` to enable or disable automatic markdown conversion when displaying threads in templates. Default should be `false` and encourage users to utilize existing Antlers modifiers.
non_design
antlers tags automatic markdown provide a parameter markdown true false to enable or disable automatic markdown conversion when displaying threads in templates default should be false and encourage users to utilize existing antlers modifiers
0
141,808
21,626,040,454
IssuesEvent
2022-05-05 02:23:06
JordanMartinez/purescript-jordans-reference
https://api.github.com/repos/JordanMartinez/purescript-jordans-reference
closed
Incorporating "Free X" data structures into custom ADTs
Design-Patterns
Given some ADT for one's particular usage where some parts could be monoidic but other parts aren't.. ```purs data Foo a b = Bar a Foo b | Baz Foo a a appendIsh :: forall a b. Foo a b -> Foo a b -> Foo a b appendIsh = case _, _ of Baz foo a1 a2, Baz foo2 a3 a4 -> Baz (foo1 <> foo2) (a1 <> a3) (a2 <> a4) _, _ -> -- uh...... ``` a `Monoid` instance can still be created if one incorporates an encoding of the Free Monoid (e.g. `List`) into the data structure itself: ```purs data Foo a b = Bar a Foo b | Baz Foo a a | Append (Foo a b) (Foo a b) -- Tree-like `Cons` | Empty -- `Nil` instance Semigroup (Foo a b) where append = case _, _ of Baz foo a1 a2, Baz foo2 a3 a4 -> Baz (foo1 <> foo2) (a1 <> a3) (a2 <> a4) l, r -> Append l r instance Monoid (Foo a b) where mempty = Empty ``` This idea works for `Semigroup` and `Monoid`. Incorporating other such parts from Free data structures into custom ADTs may also apply. I'm not sure whether this pattern has a name, nor what to call it if it doesn't have one.
1.0
Incorporating "Free X" data structures into custom ADTs - Given some ADT for one's particular usage where some parts could be monoidic but other parts aren't.. ```purs data Foo a b = Bar a Foo b | Baz Foo a a appendIsh :: forall a b. Foo a b -> Foo a b -> Foo a b appendIsh = case _, _ of Baz foo a1 a2, Baz foo2 a3 a4 -> Baz (foo1 <> foo2) (a1 <> a3) (a2 <> a4) _, _ -> -- uh...... ``` a `Monoid` instance can still be created if one incorporates an encoding of the Free Monoid (e.g. `List`) into the data structure itself: ```purs data Foo a b = Bar a Foo b | Baz Foo a a | Append (Foo a b) (Foo a b) -- Tree-like `Cons` | Empty -- `Nil` instance Semigroup (Foo a b) where append = case _, _ of Baz foo a1 a2, Baz foo2 a3 a4 -> Baz (foo1 <> foo2) (a1 <> a3) (a2 <> a4) l, r -> Append l r instance Monoid (Foo a b) where mempty = Empty ``` This idea works for `Semigroup` and `Monoid`. Incorporating other such parts from Free data structures into custom ADTs may also apply. I'm not sure whether this pattern has a name, nor what to call it if it doesn't have one.
design
incorporating free x data structures into custom adts given some adt for one s particular usage where some parts could be monoidic but other parts aren t purs data foo a b bar a foo b baz foo a a appendish forall a b foo a b foo a b foo a b appendish case of baz foo baz baz uh a monoid instance can still be created if one incorporates an encoding of the free monoid e g list into the data structure itself purs data foo a b bar a foo b baz foo a a append foo a b foo a b tree like cons empty nil instance semigroup foo a b where append case of baz foo baz baz l r append l r instance monoid foo a b where mempty empty this idea works for semigroup and monoid incorporating other such parts from free data structures into custom adts may also apply i m not sure whether this pattern has a name nor what to call it if it doesn t have one
1
59,969
14,681,665,824
IssuesEvent
2020-12-31 13:59:08
appsmithorg/appsmith
https://api.github.com/repos/appsmithorg/appsmith
opened
[Feature] Allow users to control visibility for role groups
Property Pane UI Building advanced
## Summary 1. Let users control what roles can see a widget or a page 2. Let users discover how to write visibility logic in JS inside Appsmith for different user groups(you’ll see the JS snippet when you click JS toggle) This will help a developer see widgets+pages in deployed version that are invisible to a business user. 1. Make visibility a dropdown instead of a toggle(example below) 2. The view mode pages shouldn’t slow down because at every page load we have to check visibility permissions for a user. 2. It should be easy to change visibility controls for a group of users from a single location when you deploy instead of having to visit 10 different places to make a change. <img width="571" alt="Screen Shot 2020-12-30 at 2 48 20 PM" src="https://user-images.githubusercontent.com/30255708/103413168-60730a00-4b9e-11eb-8634-fed3a99f4d67.png">
1.0
[Feature] Allow users to control visibility for role groups - ## Summary 1. Let users control what roles can see a widget or a page 2. Let users discover how to write visibility logic in JS inside Appsmith for different user groups(you’ll see the JS snippet when you click JS toggle) This will help a developer see widgets+pages in deployed version that are invisible to a business user. 1. Make visibility a dropdown instead of a toggle(example below) 2. The view mode pages shouldn’t slow down because at every page load we have to check visibility permissions for a user. 2. It should be easy to change visibility controls for a group of users from a single location when you deploy instead of having to visit 10 different places to make a change. <img width="571" alt="Screen Shot 2020-12-30 at 2 48 20 PM" src="https://user-images.githubusercontent.com/30255708/103413168-60730a00-4b9e-11eb-8634-fed3a99f4d67.png">
non_design
allow users to control visibility for role groups summary let users control what roles can see a widget or a page let users discover how to write visibility logic in js inside appsmith for different user groups you’ll see the js snippet when you click js toggle this will help a developer see widgets pages in deployed version that are invisible to a business user make visibility a dropdown instead of a toggle example below the view mode pages shouldn’t slow down because at every page load we have to check visibility permissions for a user it should be easy to change visibility controls for a group of users from a single location when you deploy instead of having to visit different places to make a change img width alt screen shot at pm src
0
661,016
22,038,573,404
IssuesEvent
2022-05-29 01:23:15
googleapis/google-cloud-cpp
https://api.github.com/repos/googleapis/google-cloud-cpp
closed
GCS+gRPC crashes when enabling progress-based timeouts in ReadObject()
type: bug api: storage priority: p2
This affects the GCS+gRPC plugin, and only if the progress-based timeouts (see #7300) are enabled. On a normal build the crash generates a "pure virtual called" message. With an msan build we get more information (see below). ``` ==19==WARNING: MemorySanitizer: use-of-uninitialized-value CppClient,Grpc,WRITE,2022-05-27T21:40:24.676898Z,140268505,140268505,26476544,8388608,1,0,26813581,7365968,unknown,OK, CppClient,Grpc,WRITE,2022-05-27T21:40:22.940905Z,131429351,131429351,61079552,8388608,1,0,28444396,7764406,unknown,OK, #0 0xfb7b93 in grpc::internal::MetadataMap::GetBinaryErrorDetails() /proc/self/cwd/external/com_github_grpc_grpc/include/grpcpp/impl/codegen/metadata_map.h:43:9 #1 0xfb3fdc in grpc::internal::CallOpClientRecvStatus::FinishOp(bool*) /proc/self/cwd/external/com_github_grpc_grpc/include/grpcpp/impl/codegen/call_op_set.h:813:33 #2 0x10a804b in grpc::internal::CallOpSet<grpc::internal::CallOpRecvInitialMetadata, grpc::internal::CallOpClientRecvStatus, grpc::internal::CallNoOp<3>, grpc::internal::CallNoOp<4>, grpc::internal::CallNoOp<5>, grpc::internal::CallNoOp<6> >::FinalizeResult(void**, bool*) /proc/self/cwd/external/com_github_grpc_grpc/include/grpcpp/impl/codegen/call_op_set.h:927:16 #3 0x17e15ba in grpc::CompletionQueue::AsyncNextInternal(void**, bool*, gpr_timespec) /proc/self/cwd/external/com_github_grpc_grpc/src/cpp/common/completion_queue_cc.cc:157:26 #4 0xf6a0dc in grpc::CompletionQueue::NextStatus grpc::CompletionQueue::AsyncNext<std::__1::chrono::time_point<std::__1::chrono::system_clock, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000000l> > > >(void**, bool*, std::__1::chrono::time_point<std::__1::chrono::system_clock, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000000l> > > const&) /proc/self/cwd/external/com_github_grpc_grpc/include/grpcpp/impl/codegen/completion_queue.h:204:12 #5 0xf6a0dc in google::cloud::v1_41_0::internal::DefaultCompletionQueueImpl::Run() /proc/self/cwd/google/cloud/internal/default_completion_queue_impl.cc:179:21 #6 0xf34959 in google::cloud::v1_41_0::CompletionQueue::Run() /proc/self/cwd/./google/cloud/completion_queue.h:53:23 #7 0xf34959 in google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&)::operator()(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&) const /proc/self/cwd/google/cloud/internal/background_threads_impl.cc:34:14 #8 0xf34959 in decltype(std::__1::forward<google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&)>(fp)(std::__1::forward<google::cloud::v1_41_0::CompletionQueue>(fp0), std::__1::forward<std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > >(fp0))) std::__1::__invoke<google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > >(google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&)&&, google::cloud::v1_41_0::CompletionQueue&&, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> >&&) /usr/bin/../include/c++/v1/type_traits:3899:1 #9 0xf34959 in void std::__1::__thread_execute<std::__1::unique_ptr<std::__1::__thread_struct, std::__1::default_delete<std::__1::__thread_struct> >, google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> >, 2ul, 3ul>(std::__1::tuple<std::__1::unique_ptr<std::__1::__thread_struct, std::__1::default_delete<std::__1::__thread_struct> >, google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > >&, std::__1::__tuple_indices<2ul, 3ul>) /usr/bin/../include/c++/v1/thread:280:5 #10 0xf34959 in void* std::__1::__thread_proxy<std::__1::tuple<std::__1::unique_ptr<std::__1::__thread_struct, std::__1::default_delete<std::__1::__thread_struct> >, google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > > >(void*) /usr/bin/../include/c++/v1/thread:291:5 #11 0x7f15a5055b16 in start_thread (/lib64/libc.so.6+0x8db16) #12 0x7f15a50d9933 in __clone (/lib64/libc.so.6+0x111933) Uninitialized value was created by a heap deallocation #0 0x7d61f2 in __interceptor_free (/h/.cache/bazel/_bazel_coryan/eab0d61a99b6696edb3d2aff87b585e8/execroot/com_github_googleapis_google_cloud_cpp/bazel-out/k8-fastbuild/bin/google/cloud/storage/benchmarks/storage_throughput_vs_cpu_benchmark+0x7d61f2) #1 0xa2d188 in std::__1::default_delete<grpc::ClientContext>::operator()(grpc::ClientContext*) const /usr/bin/../include/c++/v1/memory:2262:5 #2 0xa2d188 in std::__1::unique_ptr<grpc::ClientContext, std::__1::default_delete<grpc::ClientContext> >::reset(grpc::ClientContext*) /usr/bin/../include/c++/v1/memory:2517:7 #3 0xa2d188 in std::__1::unique_ptr<grpc::ClientContext, std::__1::default_delete<grpc::ClientContext> >::~unique_ptr() /usr/bin/../include/c++/v1/memory:2471:19 #4 0xa2d188 in google::cloud::v1_41_0::internal::AsyncStreamingReadRpcImpl<google::storage::v2::ReadObjectResponse>::~AsyncStreamingReadRpcImpl() /proc/self/cwd/./google/cloud/internal/async_streaming_read_rpc_impl.h:42:7 #5 0xa2d2fc in google::cloud::v1_41_0::internal::AsyncStreamingReadRpcImpl<google::storage::v2::ReadObjectResponse>::~AsyncStreamingReadRpcImpl() /proc/self/cwd/./google/cloud/internal/async_streaming_read_rpc_impl.h:42:7 #6 0x955977 in std::__1::default_delete<google::cloud::v1_41_0::internal::AsyncStreamingReadRpc<google::storage::v2::ReadObjectResponse> >::operator()(google::cloud::v1_41_0::internal::AsyncStreamingReadRpc<google::storage::v2::ReadObjectResponse>*) const /usr/bin/../include/c++/v1/memory:2262:5 #7 0x955977 in std::__1::unique_ptr<google::cloud::v1_41_0::internal::AsyncStreamingReadRpc<google::storage::v2::ReadObjectResponse>, std::__1::default_delete<google::cloud::v1_41_0::internal::AsyncStreamingReadRpc<google::storage::v2::ReadObjectResponse> > >::reset(google::cloud::v1_41_0::internal::AsyncStreamingReadRpc<google::storage::v2::ReadObjectResponse>*) /usr/bin/../include/c++/v1/memory:2517:7 #8 0x955977 in google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove::operator()(google::cloud::v1_41_0::future<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >) /proc/self/cwd/google/cloud/storage/internal/grpc_object_read_source.cc:123:18 #9 0x955977 in google::cloud::v1_41_0::internal::then_helper<google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove, absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse>, 0>::future_t google::cloud::v1_41_0::future<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >::then_impl<google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove>(google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove&&, std::__1::integral_constant<bool, false>)::adapter::operator()(std::__1::shared_ptr<google::cloud::v1_41_0::internal::future_shared_state<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> > >) /proc/self/cwd/./google/cloud/internal/future_then_impl.h:71:14 #10 0x955977 in void google::cloud::v1_41_0::internal::continuation_execute_delegate<google::cloud::v1_41_0::internal::then_helper<google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove, absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse>, 0>::future_t google::cloud::v1_41_0::future<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >::then_impl<google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove>(google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove&&, std::__1::integral_constant<bool, false>)::adapter, absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >(google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove&, std::__1::shared_ptr<google::cloud::v1_41_0::internal::future_shared_state<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> > >, google::cloud::v1_41_0::internal::future_shared_state<void>&, std::__1::integral_constant<bool, false>) /proc/self/cwd/./google/cloud/internal/future_impl.h:614:5 #11 0x955977 in google::cloud::v1_41_0::internal::continuation<google::cloud::v1_41_0::internal::then_helper<google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove, absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse>, 0>::future_t google::cloud::v1_41_0::future<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >::then_impl<google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove>(google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove&&, std::__1::integral_constant<bool, false>)::adapter, absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >::execute() /proc/self/cwd/./google/cloud/internal/future_impl.h:672:5 #12 0x9cc86e in google::cloud::v1_41_0::internal::future_shared_state_base::notify_now(std::__1::unique_lock<std::__1::mutex>) /proc/self/cwd/./google/cloud/internal/future_impl.h:242:22 #13 0x9cc86e in google::cloud::v1_41_0::internal::future_shared_state<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >::set_value(absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse>) /proc/self/cwd/./google/cloud/internal/future_impl.h:393:5 #14 0x9ca76a in google::cloud::v1_41_0::promise<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >::set_value(absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse>) /proc/self/cwd/./google/cloud/future_generic.h:209:26 #15 0xa30374 in google::cloud::v1_41_0::internal::AsyncStreamingReadRpcImpl<google::storage::v2::ReadObjectResponse>::Read()::OnRead::Notify(bool) /proc/self/cwd/./google/cloud/internal/async_streaming_read_rpc_impl.h:81:11 #16 0xf69e99 in google::cloud::v1_41_0::internal::DefaultCompletionQueueImpl::Run() /proc/self/cwd/google/cloud/internal/default_completion_queue_impl.cc:187:13 #17 0xf34959 in google::cloud::v1_41_0::CompletionQueue::Run() /proc/self/cwd/./google/cloud/completion_queue.h:53:23 #18 0xf34959 in google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&)::operator()(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&) const /proc/self/cwd/google/cloud/internal/background_threads_impl.cc:34:14 #19 0xf34959 in decltype(std::__1::forward<google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&)>(fp)(std::__1::forward<google::cloud::v1_41_0::CompletionQueue>(fp0), std::__1::forward<std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > >(fp0))) std::__1::__invoke<google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > >(google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&)&&, google::cloud::v1_41_0::CompletionQueue&&, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> >&&) /usr/bin/../include/c++/v1/type_traits:3899:1 #20 0xf34959 in void std::__1::__thread_execute<std::__1::unique_ptr<std::__1::__thread_struct, std::__1::default_delete<std::__1::__thread_struct> >, google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> >, 2ul, 3ul>(std::__1::tuple<std::__1::unique_ptr<std::__1::__thread_struct, std::__1::default_delete<std::__1::__thread_struct> >, google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > >&, std::__1::__tuple_indices<2ul, 3ul>) /usr/bin/../include/c++/v1/thread:280:5 #21 0xf34959 in void* std::__1::__thread_proxy<std::__1::tuple<std::__1::unique_ptr<std::__1::__thread_struct, std::__1::default_delete<std::__1::__thread_struct> >, google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > > >(void*) /usr/bin/../include/c++/v1/thread:291:5 #22 0x7f15a5055b16 in start_thread (/lib64/libc.so.6+0x8db16) SUMMARY: MemorySanitizer: use-of-uninitialized-value /proc/self/cwd/external/com_github_grpc_grpc/include/grpcpp/impl/codegen/metadata_map.h:43:9 in grpc::internal::MetadataMap::GetBinaryErrorDetails() Exiting ```
1.0
GCS+gRPC crashes when enabling progress-based timeouts in ReadObject() - This affects the GCS+gRPC plugin, and only if the progress-based timeouts (see #7300) are enabled. On a normal build the crash generates a "pure virtual called" message. With an msan build we get more information (see below). ``` ==19==WARNING: MemorySanitizer: use-of-uninitialized-value CppClient,Grpc,WRITE,2022-05-27T21:40:24.676898Z,140268505,140268505,26476544,8388608,1,0,26813581,7365968,unknown,OK, CppClient,Grpc,WRITE,2022-05-27T21:40:22.940905Z,131429351,131429351,61079552,8388608,1,0,28444396,7764406,unknown,OK, #0 0xfb7b93 in grpc::internal::MetadataMap::GetBinaryErrorDetails() /proc/self/cwd/external/com_github_grpc_grpc/include/grpcpp/impl/codegen/metadata_map.h:43:9 #1 0xfb3fdc in grpc::internal::CallOpClientRecvStatus::FinishOp(bool*) /proc/self/cwd/external/com_github_grpc_grpc/include/grpcpp/impl/codegen/call_op_set.h:813:33 #2 0x10a804b in grpc::internal::CallOpSet<grpc::internal::CallOpRecvInitialMetadata, grpc::internal::CallOpClientRecvStatus, grpc::internal::CallNoOp<3>, grpc::internal::CallNoOp<4>, grpc::internal::CallNoOp<5>, grpc::internal::CallNoOp<6> >::FinalizeResult(void**, bool*) /proc/self/cwd/external/com_github_grpc_grpc/include/grpcpp/impl/codegen/call_op_set.h:927:16 #3 0x17e15ba in grpc::CompletionQueue::AsyncNextInternal(void**, bool*, gpr_timespec) /proc/self/cwd/external/com_github_grpc_grpc/src/cpp/common/completion_queue_cc.cc:157:26 #4 0xf6a0dc in grpc::CompletionQueue::NextStatus grpc::CompletionQueue::AsyncNext<std::__1::chrono::time_point<std::__1::chrono::system_clock, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000000l> > > >(void**, bool*, std::__1::chrono::time_point<std::__1::chrono::system_clock, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000000l> > > const&) /proc/self/cwd/external/com_github_grpc_grpc/include/grpcpp/impl/codegen/completion_queue.h:204:12 #5 0xf6a0dc in google::cloud::v1_41_0::internal::DefaultCompletionQueueImpl::Run() /proc/self/cwd/google/cloud/internal/default_completion_queue_impl.cc:179:21 #6 0xf34959 in google::cloud::v1_41_0::CompletionQueue::Run() /proc/self/cwd/./google/cloud/completion_queue.h:53:23 #7 0xf34959 in google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&)::operator()(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&) const /proc/self/cwd/google/cloud/internal/background_threads_impl.cc:34:14 #8 0xf34959 in decltype(std::__1::forward<google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&)>(fp)(std::__1::forward<google::cloud::v1_41_0::CompletionQueue>(fp0), std::__1::forward<std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > >(fp0))) std::__1::__invoke<google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > >(google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&)&&, google::cloud::v1_41_0::CompletionQueue&&, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> >&&) /usr/bin/../include/c++/v1/type_traits:3899:1 #9 0xf34959 in void std::__1::__thread_execute<std::__1::unique_ptr<std::__1::__thread_struct, std::__1::default_delete<std::__1::__thread_struct> >, google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> >, 2ul, 3ul>(std::__1::tuple<std::__1::unique_ptr<std::__1::__thread_struct, std::__1::default_delete<std::__1::__thread_struct> >, google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > >&, std::__1::__tuple_indices<2ul, 3ul>) /usr/bin/../include/c++/v1/thread:280:5 #10 0xf34959 in void* std::__1::__thread_proxy<std::__1::tuple<std::__1::unique_ptr<std::__1::__thread_struct, std::__1::default_delete<std::__1::__thread_struct> >, google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > > >(void*) /usr/bin/../include/c++/v1/thread:291:5 #11 0x7f15a5055b16 in start_thread (/lib64/libc.so.6+0x8db16) #12 0x7f15a50d9933 in __clone (/lib64/libc.so.6+0x111933) Uninitialized value was created by a heap deallocation #0 0x7d61f2 in __interceptor_free (/h/.cache/bazel/_bazel_coryan/eab0d61a99b6696edb3d2aff87b585e8/execroot/com_github_googleapis_google_cloud_cpp/bazel-out/k8-fastbuild/bin/google/cloud/storage/benchmarks/storage_throughput_vs_cpu_benchmark+0x7d61f2) #1 0xa2d188 in std::__1::default_delete<grpc::ClientContext>::operator()(grpc::ClientContext*) const /usr/bin/../include/c++/v1/memory:2262:5 #2 0xa2d188 in std::__1::unique_ptr<grpc::ClientContext, std::__1::default_delete<grpc::ClientContext> >::reset(grpc::ClientContext*) /usr/bin/../include/c++/v1/memory:2517:7 #3 0xa2d188 in std::__1::unique_ptr<grpc::ClientContext, std::__1::default_delete<grpc::ClientContext> >::~unique_ptr() /usr/bin/../include/c++/v1/memory:2471:19 #4 0xa2d188 in google::cloud::v1_41_0::internal::AsyncStreamingReadRpcImpl<google::storage::v2::ReadObjectResponse>::~AsyncStreamingReadRpcImpl() /proc/self/cwd/./google/cloud/internal/async_streaming_read_rpc_impl.h:42:7 #5 0xa2d2fc in google::cloud::v1_41_0::internal::AsyncStreamingReadRpcImpl<google::storage::v2::ReadObjectResponse>::~AsyncStreamingReadRpcImpl() /proc/self/cwd/./google/cloud/internal/async_streaming_read_rpc_impl.h:42:7 #6 0x955977 in std::__1::default_delete<google::cloud::v1_41_0::internal::AsyncStreamingReadRpc<google::storage::v2::ReadObjectResponse> >::operator()(google::cloud::v1_41_0::internal::AsyncStreamingReadRpc<google::storage::v2::ReadObjectResponse>*) const /usr/bin/../include/c++/v1/memory:2262:5 #7 0x955977 in std::__1::unique_ptr<google::cloud::v1_41_0::internal::AsyncStreamingReadRpc<google::storage::v2::ReadObjectResponse>, std::__1::default_delete<google::cloud::v1_41_0::internal::AsyncStreamingReadRpc<google::storage::v2::ReadObjectResponse> > >::reset(google::cloud::v1_41_0::internal::AsyncStreamingReadRpc<google::storage::v2::ReadObjectResponse>*) /usr/bin/../include/c++/v1/memory:2517:7 #8 0x955977 in google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove::operator()(google::cloud::v1_41_0::future<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >) /proc/self/cwd/google/cloud/storage/internal/grpc_object_read_source.cc:123:18 #9 0x955977 in google::cloud::v1_41_0::internal::then_helper<google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove, absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse>, 0>::future_t google::cloud::v1_41_0::future<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >::then_impl<google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove>(google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove&&, std::__1::integral_constant<bool, false>)::adapter::operator()(std::__1::shared_ptr<google::cloud::v1_41_0::internal::future_shared_state<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> > >) /proc/self/cwd/./google/cloud/internal/future_then_impl.h:71:14 #10 0x955977 in void google::cloud::v1_41_0::internal::continuation_execute_delegate<google::cloud::v1_41_0::internal::then_helper<google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove, absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse>, 0>::future_t google::cloud::v1_41_0::future<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >::then_impl<google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove>(google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove&&, std::__1::integral_constant<bool, false>)::adapter, absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >(google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove&, std::__1::shared_ptr<google::cloud::v1_41_0::internal::future_shared_state<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> > >, google::cloud::v1_41_0::internal::future_shared_state<void>&, std::__1::integral_constant<bool, false>) /proc/self/cwd/./google/cloud/internal/future_impl.h:614:5 #11 0x955977 in google::cloud::v1_41_0::internal::continuation<google::cloud::v1_41_0::internal::then_helper<google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove, absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse>, 0>::future_t google::cloud::v1_41_0::future<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >::then_impl<google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove>(google::cloud::storage::v1_41_0::internal::GrpcObjectReadSource::Read(char*, unsigned long)::CaptureByMove&&, std::__1::integral_constant<bool, false>)::adapter, absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >::execute() /proc/self/cwd/./google/cloud/internal/future_impl.h:672:5 #12 0x9cc86e in google::cloud::v1_41_0::internal::future_shared_state_base::notify_now(std::__1::unique_lock<std::__1::mutex>) /proc/self/cwd/./google/cloud/internal/future_impl.h:242:22 #13 0x9cc86e in google::cloud::v1_41_0::internal::future_shared_state<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >::set_value(absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse>) /proc/self/cwd/./google/cloud/internal/future_impl.h:393:5 #14 0x9ca76a in google::cloud::v1_41_0::promise<absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse> >::set_value(absl::lts_20211102::optional<google::storage::v2::ReadObjectResponse>) /proc/self/cwd/./google/cloud/future_generic.h:209:26 #15 0xa30374 in google::cloud::v1_41_0::internal::AsyncStreamingReadRpcImpl<google::storage::v2::ReadObjectResponse>::Read()::OnRead::Notify(bool) /proc/self/cwd/./google/cloud/internal/async_streaming_read_rpc_impl.h:81:11 #16 0xf69e99 in google::cloud::v1_41_0::internal::DefaultCompletionQueueImpl::Run() /proc/self/cwd/google/cloud/internal/default_completion_queue_impl.cc:187:13 #17 0xf34959 in google::cloud::v1_41_0::CompletionQueue::Run() /proc/self/cwd/./google/cloud/completion_queue.h:53:23 #18 0xf34959 in google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&)::operator()(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&) const /proc/self/cwd/google/cloud/internal/background_threads_impl.cc:34:14 #19 0xf34959 in decltype(std::__1::forward<google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&)>(fp)(std::__1::forward<google::cloud::v1_41_0::CompletionQueue>(fp0), std::__1::forward<std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > >(fp0))) std::__1::__invoke<google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > >(google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&)&&, google::cloud::v1_41_0::CompletionQueue&&, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> >&&) /usr/bin/../include/c++/v1/type_traits:3899:1 #20 0xf34959 in void std::__1::__thread_execute<std::__1::unique_ptr<std::__1::__thread_struct, std::__1::default_delete<std::__1::__thread_struct> >, google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> >, 2ul, 3ul>(std::__1::tuple<std::__1::unique_ptr<std::__1::__thread_struct, std::__1::default_delete<std::__1::__thread_struct> >, google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > >&, std::__1::__tuple_indices<2ul, 3ul>) /usr/bin/../include/c++/v1/thread:280:5 #21 0xf34959 in void* std::__1::__thread_proxy<std::__1::tuple<std::__1::unique_ptr<std::__1::__thread_struct, std::__1::default_delete<std::__1::__thread_struct> >, google::cloud::v1_41_0::internal::AutomaticallyCreatedBackgroundThreads::AutomaticallyCreatedBackgroundThreads(unsigned long)::$_0::operator()() const::'lambda'(google::cloud::v1_41_0::CompletionQueue, google::cloud::v1_41_0::promise<void>&), google::cloud::v1_41_0::CompletionQueue, std::__1::reference_wrapper<google::cloud::v1_41_0::promise<void> > > >(void*) /usr/bin/../include/c++/v1/thread:291:5 #22 0x7f15a5055b16 in start_thread (/lib64/libc.so.6+0x8db16) SUMMARY: MemorySanitizer: use-of-uninitialized-value /proc/self/cwd/external/com_github_grpc_grpc/include/grpcpp/impl/codegen/metadata_map.h:43:9 in grpc::internal::MetadataMap::GetBinaryErrorDetails() Exiting ```
non_design
gcs grpc crashes when enabling progress based timeouts in readobject this affects the gcs grpc plugin and only if the progress based timeouts see are enabled on a normal build the crash generates a pure virtual called message with an msan build we get more information see below warning memorysanitizer use of uninitialized value cppclient grpc write unknown ok cppclient grpc write unknown ok in grpc internal metadatamap getbinaryerrordetails proc self cwd external com github grpc grpc include grpcpp impl codegen metadata map h in grpc internal callopclientrecvstatus finishop bool proc self cwd external com github grpc grpc include grpcpp impl codegen call op set h in grpc internal callopset grpc internal callnoop grpc internal callnoop grpc internal callnoop finalizeresult void bool proc self cwd external com github grpc grpc include grpcpp impl codegen call op set h in grpc completionqueue asyncnextinternal void bool gpr timespec proc self cwd external com github grpc grpc src cpp common completion queue cc cc in grpc completionqueue nextstatus grpc completionqueue asyncnext void bool std chrono time point const proc self cwd external com github grpc grpc include grpcpp impl codegen completion queue h in google cloud internal defaultcompletionqueueimpl run proc self cwd google cloud internal default completion queue impl cc in google cloud completionqueue run proc self cwd google cloud completion queue h in google cloud internal automaticallycreatedbackgroundthreads automaticallycreatedbackgroundthreads unsigned long operator const lambda google cloud completionqueue google cloud promise operator google cloud completionqueue google cloud promise const proc self cwd google cloud internal background threads impl cc in decltype std forward fp std forward std forward std invoke google cloud completionqueue std reference wrapper google cloud internal automaticallycreatedbackgroundthreads automaticallycreatedbackgroundthreads unsigned long operator const lambda google cloud completionqueue google cloud promise google cloud completionqueue std reference wrapper usr bin include c type traits in void std thread execute google cloud internal automaticallycreatedbackgroundthreads automaticallycreatedbackgroundthreads unsigned long operator const lambda google cloud completionqueue google cloud promise google cloud completionqueue std reference wrapper std tuple google cloud internal automaticallycreatedbackgroundthreads automaticallycreatedbackgroundthreads unsigned long operator const lambda google cloud completionqueue google cloud promise google cloud completionqueue std reference wrapper std tuple indices usr bin include c thread in void std thread proxy google cloud internal automaticallycreatedbackgroundthreads automaticallycreatedbackgroundthreads unsigned long operator const lambda google cloud completionqueue google cloud promise google cloud completionqueue std reference wrapper void usr bin include c thread in start thread libc so in clone libc so uninitialized value was created by a heap deallocation in interceptor free h cache bazel bazel coryan execroot com github googleapis google cloud cpp bazel out fastbuild bin google cloud storage benchmarks storage throughput vs cpu benchmark in std default delete operator grpc clientcontext const usr bin include c memory in std unique ptr reset grpc clientcontext usr bin include c memory in std unique ptr unique ptr usr bin include c memory in google cloud internal asyncstreamingreadrpcimpl asyncstreamingreadrpcimpl proc self cwd google cloud internal async streaming read rpc impl h in google cloud internal asyncstreamingreadrpcimpl asyncstreamingreadrpcimpl proc self cwd google cloud internal async streaming read rpc impl h in std default delete operator google cloud internal asyncstreamingreadrpc const usr bin include c memory in std unique ptr std default delete reset google cloud internal asyncstreamingreadrpc usr bin include c memory in google cloud storage internal grpcobjectreadsource read char unsigned long capturebymove operator google cloud future proc self cwd google cloud storage internal grpc object read source cc in google cloud internal then helper future t google cloud future then impl google cloud storage internal grpcobjectreadsource read char unsigned long capturebymove std integral constant adapter operator std shared ptr proc self cwd google cloud internal future then impl h in void google cloud internal continuation execute delegate future t google cloud future then impl google cloud storage internal grpcobjectreadsource read char unsigned long capturebymove std integral constant adapter absl lts optional google cloud storage internal grpcobjectreadsource read char unsigned long capturebymove std shared ptr google cloud internal future shared state std integral constant proc self cwd google cloud internal future impl h in google cloud internal continuation future t google cloud future then impl google cloud storage internal grpcobjectreadsource read char unsigned long capturebymove std integral constant adapter absl lts optional execute proc self cwd google cloud internal future impl h in google cloud internal future shared state base notify now std unique lock proc self cwd google cloud internal future impl h in google cloud internal future shared state set value absl lts optional proc self cwd google cloud internal future impl h in google cloud promise set value absl lts optional proc self cwd google cloud future generic h in google cloud internal asyncstreamingreadrpcimpl read onread notify bool proc self cwd google cloud internal async streaming read rpc impl h in google cloud internal defaultcompletionqueueimpl run proc self cwd google cloud internal default completion queue impl cc in google cloud completionqueue run proc self cwd google cloud completion queue h in google cloud internal automaticallycreatedbackgroundthreads automaticallycreatedbackgroundthreads unsigned long operator const lambda google cloud completionqueue google cloud promise operator google cloud completionqueue google cloud promise const proc self cwd google cloud internal background threads impl cc in decltype std forward fp std forward std forward std invoke google cloud completionqueue std reference wrapper google cloud internal automaticallycreatedbackgroundthreads automaticallycreatedbackgroundthreads unsigned long operator const lambda google cloud completionqueue google cloud promise google cloud completionqueue std reference wrapper usr bin include c type traits in void std thread execute google cloud internal automaticallycreatedbackgroundthreads automaticallycreatedbackgroundthreads unsigned long operator const lambda google cloud completionqueue google cloud promise google cloud completionqueue std reference wrapper std tuple google cloud internal automaticallycreatedbackgroundthreads automaticallycreatedbackgroundthreads unsigned long operator const lambda google cloud completionqueue google cloud promise google cloud completionqueue std reference wrapper std tuple indices usr bin include c thread in void std thread proxy google cloud internal automaticallycreatedbackgroundthreads automaticallycreatedbackgroundthreads unsigned long operator const lambda google cloud completionqueue google cloud promise google cloud completionqueue std reference wrapper void usr bin include c thread in start thread libc so summary memorysanitizer use of uninitialized value proc self cwd external com github grpc grpc include grpcpp impl codegen metadata map h in grpc internal metadatamap getbinaryerrordetails exiting
0
184,304
6,711,869,479
IssuesEvent
2017-10-13 06:56:05
openfoundation/foundation-dependencies
https://api.github.com/repos/openfoundation/foundation-dependencies
opened
check versions of spring/spring-boot/sprint-cloud
component/dependencies priority/P1
Check versions of spring/spring-boot/sprint-cloud. 1. use spirng4.*, spring-boot 1.*, spring-cloud 1.* 2. make sure no version conflits bwteen them. If any, adjust it.
1.0
check versions of spring/spring-boot/sprint-cloud - Check versions of spring/spring-boot/sprint-cloud. 1. use spirng4.*, spring-boot 1.*, spring-cloud 1.* 2. make sure no version conflits bwteen them. If any, adjust it.
non_design
check versions of spring spring boot sprint cloud check versions of spring spring boot sprint cloud use spring boot spring cloud make sure no version conflits bwteen them if any adjust it
0
60,081
12,056,370,681
IssuesEvent
2020-04-15 14:22:07
IceCubeOpenSource/skyllh
https://api.github.com/repos/IceCubeOpenSource/skyllh
opened
Make KDE info key names configurable within dataset definition
code style
The file skyllh/core/utils/multidimgridpdf.py contains hard-coded names for the keys of the KDE info pickle dictionary. Those names should be set by the dataset definition to allow for different KDE formats.
1.0
Make KDE info key names configurable within dataset definition - The file skyllh/core/utils/multidimgridpdf.py contains hard-coded names for the keys of the KDE info pickle dictionary. Those names should be set by the dataset definition to allow for different KDE formats.
non_design
make kde info key names configurable within dataset definition the file skyllh core utils multidimgridpdf py contains hard coded names for the keys of the kde info pickle dictionary those names should be set by the dataset definition to allow for different kde formats
0
71,014
8,614,084,565
IssuesEvent
2018-11-19 16:34:18
lbryio/lbry
https://api.github.com/repos/lbryio/lbry
closed
Solve/design the general approach for making daemon calls asynchronous
Tom's Wishlist area: jsonrpc area: wallet level: 3 needs: exploration needs: tech design type: improvement
@tzarebczan commented on [Tue Aug 15 2017](https://github.com/lbryio/lbry-app/issues/475) <!-- Thanks for reporting an issue to LBRY and helping us improve! To make it possible for us to help you, please fill out below information carefully. Before reporting any issues, please make sure that you're using the latest version. - App releases: https://github.com/lbryio/lbry-app/releases - Standalone daemon: https://github.com/lbryio/lbry/releases We are also available on Slack at https://slack.lbry.io --> ## The Issue As a Publisher, when I upload files to LBRY, the current process is fairly uninformative after the Publish button is clicked. There is no indication that the file is being processed or when it's finished uploading (besides the URI being available). This is a bigger issue with larger files as they take some time to upload. Feel free to add/comment. ## System Configuration <!-- For the app, this info is in the About section at the bottom of the Help page. You can include a screenshot instead of typing it out --> <!-- For the daemon, run: curl 'http://localhost:5279/lbryapi' --data '{"method":"version"}' and include the full output --> - LBRY Daemon version: - LBRY App version: - LBRY Installation ID: - Operating system: ## Anything Else <!-- Include anything else that does not fit into the above sections --> ## Screenshots <!-- If a screenshot would help explain the bug, please include one or two here --> --- @kauffj commented on [Tue Aug 15 2017](https://github.com/lbryio/lbry-app/issues/475#issuecomment-322553552) This isn't an app issue. If you want, you can re-open on lbryio/lbry as "Make publish and get calls asynchronous"
1.0
Solve/design the general approach for making daemon calls asynchronous - @tzarebczan commented on [Tue Aug 15 2017](https://github.com/lbryio/lbry-app/issues/475) <!-- Thanks for reporting an issue to LBRY and helping us improve! To make it possible for us to help you, please fill out below information carefully. Before reporting any issues, please make sure that you're using the latest version. - App releases: https://github.com/lbryio/lbry-app/releases - Standalone daemon: https://github.com/lbryio/lbry/releases We are also available on Slack at https://slack.lbry.io --> ## The Issue As a Publisher, when I upload files to LBRY, the current process is fairly uninformative after the Publish button is clicked. There is no indication that the file is being processed or when it's finished uploading (besides the URI being available). This is a bigger issue with larger files as they take some time to upload. Feel free to add/comment. ## System Configuration <!-- For the app, this info is in the About section at the bottom of the Help page. You can include a screenshot instead of typing it out --> <!-- For the daemon, run: curl 'http://localhost:5279/lbryapi' --data '{"method":"version"}' and include the full output --> - LBRY Daemon version: - LBRY App version: - LBRY Installation ID: - Operating system: ## Anything Else <!-- Include anything else that does not fit into the above sections --> ## Screenshots <!-- If a screenshot would help explain the bug, please include one or two here --> --- @kauffj commented on [Tue Aug 15 2017](https://github.com/lbryio/lbry-app/issues/475#issuecomment-322553552) This isn't an app issue. If you want, you can re-open on lbryio/lbry as "Make publish and get calls asynchronous"
design
solve design the general approach for making daemon calls asynchronous tzarebczan commented on thanks for reporting an issue to lbry and helping us improve to make it possible for us to help you please fill out below information carefully before reporting any issues please make sure that you re using the latest version app releases standalone daemon we are also available on slack at the issue as a publisher when i upload files to lbry the current process is fairly uninformative after the publish button is clicked there is no indication that the file is being processed or when it s finished uploading besides the uri being available this is a bigger issue with larger files as they take some time to upload feel free to add comment system configuration for the app this info is in the about section at the bottom of the help page you can include a screenshot instead of typing it out for the daemon run curl data method version and include the full output lbry daemon version lbry app version lbry installation id operating system anything else screenshots kauffj commented on this isn t an app issue if you want you can re open on lbryio lbry as make publish and get calls asynchronous
1
176,833
28,236,313,299
IssuesEvent
2023-04-06 01:02:53
MozillaFoundation/Design
https://api.github.com/repos/MozillaFoundation/Design
opened
[Common Voice] Sub Brand Theme Page
Brand Standards design
Common Voice is shown on https://foundation.mozilla.org/en/docs/design/branding/sub-brands/ as a sub brand but doesn't have a page. This is a placeholder ticket to create a page that captures Common Voice guidelines and expressions. This may require updating and aligning existing styles to relate to the Foundation branding as well.
1.0
[Common Voice] Sub Brand Theme Page - Common Voice is shown on https://foundation.mozilla.org/en/docs/design/branding/sub-brands/ as a sub brand but doesn't have a page. This is a placeholder ticket to create a page that captures Common Voice guidelines and expressions. This may require updating and aligning existing styles to relate to the Foundation branding as well.
design
sub brand theme page common voice is shown on as a sub brand but doesn t have a page this is a placeholder ticket to create a page that captures common voice guidelines and expressions this may require updating and aligning existing styles to relate to the foundation branding as well
1
276,264
23,981,944,183
IssuesEvent
2022-09-13 15:41:43
department-of-veterans-affairs/va.gov-cms
https://api.github.com/repos/department-of-veterans-affairs/va.gov-cms
closed
Refactor GitHub Actions
Automated testing ⭐️ Sitewide CMS Quality Assurance
## Description These share a lot of steps, variables (e.g. PHP version), etc. Plus they're presumably consuming a lot of resources doing so. Let's refactor our GHAs so they DRY. ## Acceptance Criteria - [ ] GitHub Actions are well-factored.
1.0
Refactor GitHub Actions - ## Description These share a lot of steps, variables (e.g. PHP version), etc. Plus they're presumably consuming a lot of resources doing so. Let's refactor our GHAs so they DRY. ## Acceptance Criteria - [ ] GitHub Actions are well-factored.
non_design
refactor github actions description these share a lot of steps variables e g php version etc plus they re presumably consuming a lot of resources doing so let s refactor our ghas so they dry acceptance criteria github actions are well factored
0
164,311
25,947,651,289
IssuesEvent
2022-12-17 06:12:21
1nMarket/frontend
https://api.github.com/repos/1nMarket/frontend
closed
[design] post_포스트 작성 UI 스타일
design🎨
## ⭐ 주요 기능 [design] profile_사용자 게시글 리스트 UI 스타일 ## 📋 진행사항 - [ ] 이미지 슬라이더 생성 - [ ] 게시글 아이템 생성 - [ ] 게시글 리스트 생성 ## 🚨 특이사항 이 외 특이사항을 명시해주세요.
1.0
[design] post_포스트 작성 UI 스타일 - ## ⭐ 주요 기능 [design] profile_사용자 게시글 리스트 UI 스타일 ## 📋 진행사항 - [ ] 이미지 슬라이더 생성 - [ ] 게시글 아이템 생성 - [ ] 게시글 리스트 생성 ## 🚨 특이사항 이 외 특이사항을 명시해주세요.
design
post 포스트 작성 ui 스타일 ⭐ 주요 기능 profile 사용자 게시글 리스트 ui 스타일 📋 진행사항 이미지 슬라이더 생성 게시글 아이템 생성 게시글 리스트 생성 🚨 특이사항 이 외 특이사항을 명시해주세요
1
75,329
9,221,704,629
IssuesEvent
2019-03-11 20:40:59
TNRIS/data.tnris.org
https://api.github.com/repos/TNRIS/data.tnris.org
closed
Remake Imagery
Design Ideas
These are imagery datasets we need to remake image samples for. Will add more in comments - [ ] CapArea-McLennan Imagery 2018, Just need a couple more higher rez examples, https://data.tnris.org/collection/22493b55-6c57-4840-aa86-d59c54b00880 SPECS - 3000px wide - 1687px high - 300dpi if possible
1.0
Remake Imagery - These are imagery datasets we need to remake image samples for. Will add more in comments - [ ] CapArea-McLennan Imagery 2018, Just need a couple more higher rez examples, https://data.tnris.org/collection/22493b55-6c57-4840-aa86-d59c54b00880 SPECS - 3000px wide - 1687px high - 300dpi if possible
design
remake imagery these are imagery datasets we need to remake image samples for will add more in comments caparea mclennan imagery just need a couple more higher rez examples specs wide high if possible
1
70,647
13,520,088,710
IssuesEvent
2020-09-15 03:46:25
HakinCodes/Malaria-Detection
https://api.github.com/repos/HakinCodes/Malaria-Detection
closed
Create an EDA Documentation Summary
Assigned CH20 Medium No-Code Urgent enhancement
## Type Advancement ## Description @kritikaparmar-programmer has done an excellent job in creating an EDA on the Malarial Cell Dataset. We need a Markdown Documentation that can help us form our Wiki later using the EDA contributed by her. You can check out the Pull Request [here](https://github.com/HakinCodes/Malaria-Detection/pull/48) and create basic documentation to explore the basic intuition behind the Dataset. ## Tools - Markdown ### Have you read the [Contributing Guidelines on Pull Requests](https://github.com/HakinCodes/Malaria-Detection/blob/master/CONTRIBUTING.md)? Yes ### Motivation To later form part of our Wiki <!-- please delete options that are not relavant -->
1.0
Create an EDA Documentation Summary - ## Type Advancement ## Description @kritikaparmar-programmer has done an excellent job in creating an EDA on the Malarial Cell Dataset. We need a Markdown Documentation that can help us form our Wiki later using the EDA contributed by her. You can check out the Pull Request [here](https://github.com/HakinCodes/Malaria-Detection/pull/48) and create basic documentation to explore the basic intuition behind the Dataset. ## Tools - Markdown ### Have you read the [Contributing Guidelines on Pull Requests](https://github.com/HakinCodes/Malaria-Detection/blob/master/CONTRIBUTING.md)? Yes ### Motivation To later form part of our Wiki <!-- please delete options that are not relavant -->
non_design
create an eda documentation summary type advancement description kritikaparmar programmer has done an excellent job in creating an eda on the malarial cell dataset we need a markdown documentation that can help us form our wiki later using the eda contributed by her you can check out the pull request and create basic documentation to explore the basic intuition behind the dataset tools markdown have you read the yes motivation to later form part of our wiki
0
72,062
18,984,995,359
IssuesEvent
2021-11-21 15:12:16
Seddryck/NBi
https://api.github.com/repos/Seddryck/NBi
opened
Using roapi to serve tests dependant of REST calls
build dependencies
For integration and acceptance tests, we're using some external websites to respond to our API calls. Unfortunately, these external API are evolving or the content returned is also evolving making it difficult to test. Usage of [Roapi](http://github.com/roapi/roapi) would allow us to define our datafiles for testing.
1.0
Using roapi to serve tests dependant of REST calls - For integration and acceptance tests, we're using some external websites to respond to our API calls. Unfortunately, these external API are evolving or the content returned is also evolving making it difficult to test. Usage of [Roapi](http://github.com/roapi/roapi) would allow us to define our datafiles for testing.
non_design
using roapi to serve tests dependant of rest calls for integration and acceptance tests we re using some external websites to respond to our api calls unfortunately these external api are evolving or the content returned is also evolving making it difficult to test usage of would allow us to define our datafiles for testing
0
163,302
25,787,349,576
IssuesEvent
2022-12-09 22:05:31
cisagov/getgov
https://api.github.com/repos/cisagov/getgov
closed
Goal: Identify and Develop First Draft Educational Content for First-Time Registrants for Login and Domain Requirements/Eligibility
sprint goal design content
Our goal is to understand the path from arriving at get.gov through to starting an application. This requires content and strategy around what a user needs to know and understand prior to hitting "Apply" - [x] #181 - [ ] #242 - [x] #243 - [x] #249 Outcome: Content for Domain Requirements/Eligibility has been reviewed and any needed supplementary login.gov content has been identified.
1.0
Goal: Identify and Develop First Draft Educational Content for First-Time Registrants for Login and Domain Requirements/Eligibility - Our goal is to understand the path from arriving at get.gov through to starting an application. This requires content and strategy around what a user needs to know and understand prior to hitting "Apply" - [x] #181 - [ ] #242 - [x] #243 - [x] #249 Outcome: Content for Domain Requirements/Eligibility has been reviewed and any needed supplementary login.gov content has been identified.
design
goal identify and develop first draft educational content for first time registrants for login and domain requirements eligibility our goal is to understand the path from arriving at get gov through to starting an application this requires content and strategy around what a user needs to know and understand prior to hitting apply outcome content for domain requirements eligibility has been reviewed and any needed supplementary login gov content has been identified
1
46,423
13,168,670,881
IssuesEvent
2020-08-11 12:32:29
michalmit/WebGoat
https://api.github.com/repos/michalmit/WebGoat
opened
CVE-2018-20822 (Medium) detected in node-sass-4.11.0.tgz, opennms-opennms-source-22.0.1-1
security vulnerability
## CVE-2018-20822 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.11.0.tgz</b></p></summary> <p> <details><summary><b>node-sass-4.11.0.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.11.0.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.11.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/WebGoat/docs/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/WebGoat/docs/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - gulp-sass-4.0.2.tgz (Root Library) - :x: **node-sass-4.11.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/michalmit/WebGoat/commit/ded1b7835a3e213e2329b24fe61829370add2ea7">ded1b7835a3e213e2329b24fe61829370add2ea7</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> LibSass 3.5.4 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Complex_Selector::perform in ast.hpp and Sass::Inspect::operator in inspect.cpp). <p>Publish Date: 2019-04-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20822>CVE-2018-20822</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20822">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20822</a></p> <p>Release Date: 2019-08-06</p> <p>Fix Resolution: LibSass - 3.6.0;node-sass - 4.13.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"node-sass","packageVersion":"4.11.0","isTransitiveDependency":true,"dependencyTree":"gulp-sass:4.0.2;node-sass:4.11.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"LibSass - 3.6.0;node-sass - 4.13.1"}],"vulnerabilityIdentifier":"CVE-2018-20822","vulnerabilityDetails":"LibSass 3.5.4 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Complex_Selector::perform in ast.hpp and Sass::Inspect::operator in inspect.cpp).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20822","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2018-20822 (Medium) detected in node-sass-4.11.0.tgz, opennms-opennms-source-22.0.1-1 - ## CVE-2018-20822 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.11.0.tgz</b></p></summary> <p> <details><summary><b>node-sass-4.11.0.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.11.0.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.11.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/WebGoat/docs/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/WebGoat/docs/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - gulp-sass-4.0.2.tgz (Root Library) - :x: **node-sass-4.11.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/michalmit/WebGoat/commit/ded1b7835a3e213e2329b24fe61829370add2ea7">ded1b7835a3e213e2329b24fe61829370add2ea7</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> LibSass 3.5.4 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Complex_Selector::perform in ast.hpp and Sass::Inspect::operator in inspect.cpp). <p>Publish Date: 2019-04-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20822>CVE-2018-20822</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20822">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20822</a></p> <p>Release Date: 2019-08-06</p> <p>Fix Resolution: LibSass - 3.6.0;node-sass - 4.13.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"node-sass","packageVersion":"4.11.0","isTransitiveDependency":true,"dependencyTree":"gulp-sass:4.0.2;node-sass:4.11.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"LibSass - 3.6.0;node-sass - 4.13.1"}],"vulnerabilityIdentifier":"CVE-2018-20822","vulnerabilityDetails":"LibSass 3.5.4 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Complex_Selector::perform in ast.hpp and Sass::Inspect::operator in inspect.cpp).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20822","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_design
cve medium detected in node sass tgz opennms opennms source cve medium severity vulnerability vulnerable libraries node sass tgz node sass tgz wrapper around libsass library home page a href path to dependency file tmp ws scm webgoat docs package json path to vulnerable library tmp ws scm webgoat docs node modules node sass package json dependency hierarchy gulp sass tgz root library x node sass tgz vulnerable library found in head commit a href vulnerability details libsass allows attackers to cause a denial of service uncontrolled recursion in sass complex selector perform in ast hpp and sass inspect operator in inspect cpp publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution libsass node sass isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails libsass allows attackers to cause a denial of service uncontrolled recursion in sass complex selector perform in ast hpp and sass inspect operator in inspect cpp vulnerabilityurl
0
161,383
20,149,274,454
IssuesEvent
2022-02-09 10:43:46
NormanWenzelWSS/WebGoat
https://api.github.com/repos/NormanWenzelWSS/WebGoat
opened
xstream-1.4.5.jar: 33 vulnerabilities (highest severity is: 9.9)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.5.jar</b></p></summary> <p>XStream is a serialization library from Java objects to XML and back.</p> <p> <p>Found in HEAD commit: <a href="https://github.com/NormanWenzelWSS/WebGoat/commit/8dd63d1de0434feeb3b6657bd9b7e36f033023f9">8dd63d1de0434feeb3b6657bd9b7e36f033023f9</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-21345](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21345) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.9 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-21344](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21344) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2013-7285](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2013-7285) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | xstream-1.4.5.jar | Direct | 1.4.7,1.4.11 | ✅ | | [CVE-2021-21350](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21350) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-21347](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21347) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-21346](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21346) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-21342](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21342) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.1 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-21351](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21351) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.1 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-39139](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39139) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2020-26217](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26217) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.14 | ✅ | | [CVE-2021-29505](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29505) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.17 | ✅ | | [CVE-2021-21349](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21349) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.6 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-39150](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39150) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39152](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39152) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39151](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39151) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39154](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39154) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39153](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39153) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39141](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39141) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39145](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39145) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39144](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39144) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39147](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39147) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39146](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39146) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39149](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39149) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39148](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39148) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2020-26258](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26258) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.7 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.15 | ✅ | | [CVE-2021-21343](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21343) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-21341](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21341) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2017-7957](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-7957) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.5.jar | Direct | 1.4.10 | ✅ | | [CVE-2016-3674](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-3674) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.5.jar | Direct | 1.4.9 | ✅ | | [CVE-2021-43859](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43859) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.19 | ✅ | | [CVE-2021-21348](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21348) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2020-26259](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26259) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.15 | ✅ | | [CVE-2021-39140](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39140) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.3 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | ## Details > Partial details (5 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the WhiteSource Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21345</summary> ### Vulnerable Library - <b>xstream-1.4.5.jar</b></p> <p>XStream is a serialization library from Java objects to XML and back.</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NormanWenzelWSS/WebGoat/commit/8dd63d1de0434feeb3b6657bd9b7e36f033023f9">8dd63d1de0434feeb3b6657bd9b7e36f033023f9</a></p> <p>Found in base branch: <b>develop</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21345>CVE-2021-21345</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4">https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21344</summary> ### Vulnerable Library - <b>xstream-1.4.5.jar</b></p> <p>XStream is a serialization library from Java objects to XML and back.</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NormanWenzelWSS/WebGoat/commit/8dd63d1de0434feeb3b6657bd9b7e36f033023f9">8dd63d1de0434feeb3b6657bd9b7e36f033023f9</a></p> <p>Found in base branch: <b>develop</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21344>CVE-2021-21344</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3">https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2013-7285</summary> ### Vulnerable Library - <b>xstream-1.4.5.jar</b></p> <p>XStream is a serialization library from Java objects to XML and back.</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NormanWenzelWSS/WebGoat/commit/8dd63d1de0434feeb3b6657bd9b7e36f033023f9">8dd63d1de0434feeb3b6657bd9b7e36f033023f9</a></p> <p>Found in base branch: <b>develop</b></p> </p> <p></p> ### Vulnerability Details <p> Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON. <p>Publish Date: 2019-05-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2013-7285>CVE-2013-7285</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7285">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7285</a></p> <p>Release Date: 2019-05-15</p> <p>Fix Resolution: 1.4.7,1.4.11</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21350</summary> ### Vulnerable Library - <b>xstream-1.4.5.jar</b></p> <p>XStream is a serialization library from Java objects to XML and back.</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NormanWenzelWSS/WebGoat/commit/8dd63d1de0434feeb3b6657bd9b7e36f033023f9">8dd63d1de0434feeb3b6657bd9b7e36f033023f9</a></p> <p>Found in base branch: <b>develop</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21350>CVE-2021-21350</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq">https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21347</summary> ### Vulnerable Library - <b>xstream-1.4.5.jar</b></p> <p>XStream is a serialization library from Java objects to XML and back.</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NormanWenzelWSS/WebGoat/commit/8dd63d1de0434feeb3b6657bd9b7e36f033023f9">8dd63d1de0434feeb3b6657bd9b7e36f033023f9</a></p> <p>Found in base branch: <b>develop</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21347>CVE-2021-21347</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f">https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21345","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21345","cvss3Severity":"high","cvss3Score":"9.9","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21344","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21344","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.4.7,1.4.11","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2013-7285","vulnerabilityDetails":"Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2013-7285","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21350","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21350","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21347","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21347","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21346","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21346","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21342","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21342","cvss3Severity":"high","cvss3Score":"9.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21351","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21351","cvss3Severity":"high","cvss3Score":"9.1","cvss3Metrics":{"A":"High","AC":"Low","PR":"High","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39139","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39139","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.14","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-26217","vulnerabilityDetails":"XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream\u0027s Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26217","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.17","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-29505","vulnerabilityDetails":"XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29505","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21349","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21349","cvss3Severity":"high","cvss3Score":"8.6","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39150","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39150","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39152","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39152","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39151","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39151","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39154","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39154","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39153","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39153","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39141","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39141","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39145","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39145","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39144","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39144","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39147","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39147","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39146","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39146","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39149","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39149","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39148","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39148","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.15","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-26258","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26258","cvss3Severity":"high","cvss3Score":"7.7","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21343","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21343","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21341","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21341","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.4.10","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2017-7957","vulnerabilityDetails":"XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type \u0027void\u0027 during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML(\"\u003cvoid/\u003e\") call.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-7957","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.4.9","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2016-3674","vulnerabilityDetails":"Multiple XML external entity (XXE) vulnerabilities in the (1) Dom4JDriver, (2) DomDriver, (3) JDomDriver, (4) JDom2Driver, (5) SjsxpDriver, (6) StandardStaxDriver, and (7) WstxDriver drivers in XStream before 1.4.9 allow remote attackers to read arbitrary files via a crafted XML document.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-3674","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.19","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-43859","vulnerabilityDetails":"XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded. Users are advised to upgrade as soon as possible. Users unable to upgrade may set the NO_REFERENCE mode to prevent recursion. See GHSA-rmr5-cpv2-vgjf for further details on a workaround if an upgrade is not possible.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43859","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21348","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21348","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.15","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-26259","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26259","cvss3Severity":"medium","cvss3Score":"6.8","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Changed","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39140","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39140","cvss3Severity":"medium","cvss3Score":"6.3","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}]</REMEDIATE> -->
True
xstream-1.4.5.jar: 33 vulnerabilities (highest severity is: 9.9) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.5.jar</b></p></summary> <p>XStream is a serialization library from Java objects to XML and back.</p> <p> <p>Found in HEAD commit: <a href="https://github.com/NormanWenzelWSS/WebGoat/commit/8dd63d1de0434feeb3b6657bd9b7e36f033023f9">8dd63d1de0434feeb3b6657bd9b7e36f033023f9</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-21345](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21345) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.9 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-21344](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21344) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2013-7285](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2013-7285) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | xstream-1.4.5.jar | Direct | 1.4.7,1.4.11 | ✅ | | [CVE-2021-21350](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21350) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-21347](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21347) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-21346](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21346) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-21342](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21342) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.1 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-21351](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21351) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.1 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-39139](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39139) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2020-26217](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26217) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.14 | ✅ | | [CVE-2021-29505](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29505) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.17 | ✅ | | [CVE-2021-21349](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21349) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.6 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-39150](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39150) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39152](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39152) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39151](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39151) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39154](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39154) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39153](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39153) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39141](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39141) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39145](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39145) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39144](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39144) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39147](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39147) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39146](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39146) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39149](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39149) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2021-39148](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39148) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | | [CVE-2020-26258](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26258) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.7 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.15 | ✅ | | [CVE-2021-21343](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21343) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2021-21341](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21341) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2017-7957](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-7957) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.5.jar | Direct | 1.4.10 | ✅ | | [CVE-2016-3674](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-3674) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.5.jar | Direct | 1.4.9 | ✅ | | [CVE-2021-43859](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43859) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.19 | ✅ | | [CVE-2021-21348](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21348) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.16 | ✅ | | [CVE-2020-26259](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26259) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.8 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.15 | ✅ | | [CVE-2021-39140](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39140) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.3 | xstream-1.4.5.jar | Direct | com.thoughtworks.xstream:xstream:1.4.18 | ✅ | ## Details > Partial details (5 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the WhiteSource Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21345</summary> ### Vulnerable Library - <b>xstream-1.4.5.jar</b></p> <p>XStream is a serialization library from Java objects to XML and back.</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NormanWenzelWSS/WebGoat/commit/8dd63d1de0434feeb3b6657bd9b7e36f033023f9">8dd63d1de0434feeb3b6657bd9b7e36f033023f9</a></p> <p>Found in base branch: <b>develop</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21345>CVE-2021-21345</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4">https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21344</summary> ### Vulnerable Library - <b>xstream-1.4.5.jar</b></p> <p>XStream is a serialization library from Java objects to XML and back.</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NormanWenzelWSS/WebGoat/commit/8dd63d1de0434feeb3b6657bd9b7e36f033023f9">8dd63d1de0434feeb3b6657bd9b7e36f033023f9</a></p> <p>Found in base branch: <b>develop</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21344>CVE-2021-21344</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3">https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2013-7285</summary> ### Vulnerable Library - <b>xstream-1.4.5.jar</b></p> <p>XStream is a serialization library from Java objects to XML and back.</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NormanWenzelWSS/WebGoat/commit/8dd63d1de0434feeb3b6657bd9b7e36f033023f9">8dd63d1de0434feeb3b6657bd9b7e36f033023f9</a></p> <p>Found in base branch: <b>develop</b></p> </p> <p></p> ### Vulnerability Details <p> Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON. <p>Publish Date: 2019-05-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2013-7285>CVE-2013-7285</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7285">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7285</a></p> <p>Release Date: 2019-05-15</p> <p>Fix Resolution: 1.4.7,1.4.11</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21350</summary> ### Vulnerable Library - <b>xstream-1.4.5.jar</b></p> <p>XStream is a serialization library from Java objects to XML and back.</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NormanWenzelWSS/WebGoat/commit/8dd63d1de0434feeb3b6657bd9b7e36f033023f9">8dd63d1de0434feeb3b6657bd9b7e36f033023f9</a></p> <p>Found in base branch: <b>develop</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21350>CVE-2021-21350</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq">https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21347</summary> ### Vulnerable Library - <b>xstream-1.4.5.jar</b></p> <p>XStream is a serialization library from Java objects to XML and back.</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/NormanWenzelWSS/WebGoat/commit/8dd63d1de0434feeb3b6657bd9b7e36f033023f9">8dd63d1de0434feeb3b6657bd9b7e36f033023f9</a></p> <p>Found in base branch: <b>develop</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21347>CVE-2021-21347</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f">https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21345","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21345","cvss3Severity":"high","cvss3Score":"9.9","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21344","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21344","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.4.7,1.4.11","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2013-7285","vulnerabilityDetails":"Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2013-7285","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21350","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21350","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21347","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21347","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21346","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21346","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21342","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21342","cvss3Severity":"high","cvss3Score":"9.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21351","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21351","cvss3Severity":"high","cvss3Score":"9.1","cvss3Metrics":{"A":"High","AC":"Low","PR":"High","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39139","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39139","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.14","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-26217","vulnerabilityDetails":"XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream\u0027s Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26217","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.17","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-29505","vulnerabilityDetails":"XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29505","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21349","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21349","cvss3Severity":"high","cvss3Score":"8.6","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39150","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39150","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39152","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39152","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39151","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39151","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39154","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39154","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39153","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39153","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39141","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39141","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39145","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39145","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39144","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39144","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39147","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39147","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39146","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39146","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39149","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39149","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39148","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39148","cvss3Severity":"high","cvss3Score":"8.5","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.15","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-26258","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26258","cvss3Severity":"high","cvss3Score":"7.7","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21343","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21343","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21341","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21341","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.4.10","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2017-7957","vulnerabilityDetails":"XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type \u0027void\u0027 during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML(\"\u003cvoid/\u003e\") call.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-7957","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.4.9","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2016-3674","vulnerabilityDetails":"Multiple XML external entity (XXE) vulnerabilities in the (1) Dom4JDriver, (2) DomDriver, (3) JDomDriver, (4) JDom2Driver, (5) SjsxpDriver, (6) StandardStaxDriver, and (7) WstxDriver drivers in XStream before 1.4.9 allow remote attackers to read arbitrary files via a crafted XML document.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-3674","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.19","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-43859","vulnerabilityDetails":"XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded. Users are advised to upgrade as soon as possible. Users unable to upgrade may set the NO_REFERENCE mode to prevent recursion. See GHSA-rmr5-cpv2-vgjf for further details on a workaround if an upgrade is not possible.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43859","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-21348","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21348","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.15","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-26259","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26259","cvss3Severity":"medium","cvss3Score":"6.8","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Changed","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.18","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-39140","vulnerabilityDetails":"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39140","cvss3Severity":"medium","cvss3Score":"6.3","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Changed","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}]</REMEDIATE> -->
non_design
xstream jar vulnerabilities highest severity is vulnerable library xstream jar xstream is a serialization library from java objects to xml and back found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct ✅ high xstream jar direct ✅ high xstream jar direct com thoughtworks xstream xstream ✅ high xstream jar direct com thoughtworks xstream xstream ✅ medium xstream jar direct com thoughtworks xstream xstream ✅ medium xstream jar direct com thoughtworks xstream xstream ✅ details partial details vulnerabilities are displayed below due to a content size limitation in github to view information on the remaining vulnerabilities navigate to the whitesource application cve vulnerable library xstream jar xstream is a serialization library from java objects to xml and back dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch develop vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com thoughtworks xstream xstream rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar xstream is a serialization library from java objects to xml and back dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch develop vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com thoughtworks xstream xstream rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar xstream is a serialization library from java objects to xml and back dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch develop vulnerability details xstream api versions up to and version if the security framework has not been initialized may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling xml or any supported format e g json publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar xstream is a serialization library from java objects to xml and back dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch develop vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com thoughtworks xstream xstream rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar xstream is a serialization library from java objects to xml and back dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch develop vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com thoughtworks xstream xstream rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the security framework you will have to use at least version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the security framework you will have to use at least version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream api versions up to and version if the security framework has not been initialized may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling xml or any supported format e g json vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the security framework you will have to use at least version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the security framework you will have to use at least version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the security framework you will have to use at least version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects xstream creates therefore new instances based on these type information an attacker can manipulate the processed input stream and replace or inject objects that result in a server side forgery request no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the security framework you will have to use at least version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the security framework you will have to use at least version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream a user is only affected if using the version out of the box with jdk or below however this scenario can be adjusted easily to an external xalan that works regardless of the version of the java runtime no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream before version is vulnerable to remote code execution the vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream only users who rely on blocklists are affected anyone using xstream security framework allowlist is not affected the linked advisory provides code workarounds for users who cannot upgrade the issue is fixed in version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is software for serializing java objects to xml and back again a vulnerability in xstream versions prior to may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream no user who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types is affected the vulnerability is patched in version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the security framework you will have to use at least version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a java runtime version to no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the you will have to use at least version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a java runtime version to no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the you will have to use at least version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream if using the version out of the box with java runtime version to or with javafx installed no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version a server side forgery request vulnerability can be activated when unmarshalling the vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream if you rely on xstream default blacklist of the security framework you will have to use at least version the reported vulnerability does not exist if running java or higher no user is affected who followed the recommendation to setup xstream security framework with a whitelist anyone relying on xstream default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability users of xstream or below who still want to use xstream default blacklist can use a workaround described in more detailed in the referenced advisories vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects xstream creates therefore new instances based on these type information an attacker can manipulate the processed input stream and replace or inject objects that result in the deletion of a file on the local host no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the security framework you will have to use at least version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version there is vulnerability which may allow a remote attacker to allocate cpu time on the target system depending on cpu type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the security framework you will have to use at least version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream through when a certain denytypes workaround is not used mishandles attempts to create an instance of the primitive type during unmarshalling leading to a remote application crash as demonstrated by an xstream fromxml call vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails multiple xml external entity xxe vulnerabilities in the domdriver jdomdriver sjsxpdriver standardstaxdriver and wstxdriver drivers in xstream before allow remote attackers to read arbitrary files via a crafted xml document vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is an open source java library to serialize objects to xml and back again versions prior to may allow a remote attacker to allocate cpu time on the target system depending on cpu type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream xstream monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded users are advised to upgrade as soon as possible users unable to upgrade may set the no reference mode to prevent recursion see ghsa vgjf for further details on a workaround if an upgrade is not possible vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum cpu time and will never return no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the security framework you will have to use at least version vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version is vulnerable to an arbitrary file deletion on the local host when unmarshalling the vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream if you rely on xstream default blacklist of the security framework you will have to use at least version the reported vulnerability does not exist running java or higher no user is affected who followed the recommendation to setup xstream security framework with a whitelist anyone relying on xstream default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability users of xstream or below who still want to use xstream default blacklist can use a workaround described in more detailed in the referenced advisories vulnerabilityurl istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to allocate cpu time on the target system depending on cpu type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose vulnerabilityurl
0
148,815
23,386,634,214
IssuesEvent
2022-08-11 14:15:39
MystenLabs/narwhal
https://api.github.com/repos/MystenLabs/narwhal
closed
[consensus] Explicitly order batches coming from the block waiter
good first issue design task task
### Description The current block waiter fetches transactions' data in batches in an implicit (but deterministic) order. We should make this order explicit and choose a way to order them. We should also think of the best place to order those batches.
1.0
[consensus] Explicitly order batches coming from the block waiter - ### Description The current block waiter fetches transactions' data in batches in an implicit (but deterministic) order. We should make this order explicit and choose a way to order them. We should also think of the best place to order those batches.
design
explicitly order batches coming from the block waiter description the current block waiter fetches transactions data in batches in an implicit but deterministic order we should make this order explicit and choose a way to order them we should also think of the best place to order those batches
1
86,589
24,898,972,520
IssuesEvent
2022-10-28 18:42:21
opensearch-project/OpenSearch-Dashboards
https://api.github.com/repos/opensearch-project/OpenSearch-Dashboards
closed
[D&D] Replace wizard naming convention
vis builder v2.4.0
Renaming "Wizard" to "Visualization Builder" Tasks: In code reference of 'wizard' string: - [x] Rename `wizard` in code to `visBuilder` in function name, type name and class name - [x] Replace class name prefixes `wiz` with `vb` - [x] Replace file name and paths of 'wizard' to 'vis_builder' - [x] Rename 'wizard' saved object type UI/UX reference of 'wizard' string: https://github.com/opensearch-project/ux/issues/49 - [x] wizard editing page - [x] dashboard page - [x] visualization page - [x] saved object page
1.0
[D&D] Replace wizard naming convention - Renaming "Wizard" to "Visualization Builder" Tasks: In code reference of 'wizard' string: - [x] Rename `wizard` in code to `visBuilder` in function name, type name and class name - [x] Replace class name prefixes `wiz` with `vb` - [x] Replace file name and paths of 'wizard' to 'vis_builder' - [x] Rename 'wizard' saved object type UI/UX reference of 'wizard' string: https://github.com/opensearch-project/ux/issues/49 - [x] wizard editing page - [x] dashboard page - [x] visualization page - [x] saved object page
non_design
replace wizard naming convention renaming wizard to visualization builder tasks in code reference of wizard string rename wizard in code to visbuilder in function name type name and class name replace class name prefixes wiz with vb replace file name and paths of wizard to vis builder rename wizard saved object type ui ux reference of wizard string wizard editing page dashboard page visualization page saved object page
0
67,074
8,072,924,856
IssuesEvent
2018-08-06 17:32:44
OperationCode/operationcode_frontend
https://api.github.com/repos/OperationCode/operationcode_frontend
closed
Redirect user to intended route after forced login
Priority: Low Type: Feature/Redesign
<!-- Please fill out one of the sections below based on the type of issue you're creating --> # Feature ## Why is this feature being added? <!-- What problem is it solving? What value does it add? --> Current experience: 1) Navigate to www.operationcode.org/scholarships, without being logged in 2) Click on the 'Read More' button for a scholarship, which links to the Scholarship Application Page for that scholarship 3) Since the Application Page for scholarships is an 'Authenticated Route' requiring a user to be logged on, the user is redirected to the Login Page 4) After logging in, the user is redirected to the Profile page, _not_ the Scholarship Application Page they were attempting to navigate to Let's provides a better user-experience than this. Redirecting the user to the Profile page every time is an unnecessary context switch for a user. ## What should your feature do? In situations like this (where we redirect a user to the Login page when they're trying to access an Authenticated route), after they log on, let's redirect the user to the page they were originally trying to reach.
1.0
Redirect user to intended route after forced login - <!-- Please fill out one of the sections below based on the type of issue you're creating --> # Feature ## Why is this feature being added? <!-- What problem is it solving? What value does it add? --> Current experience: 1) Navigate to www.operationcode.org/scholarships, without being logged in 2) Click on the 'Read More' button for a scholarship, which links to the Scholarship Application Page for that scholarship 3) Since the Application Page for scholarships is an 'Authenticated Route' requiring a user to be logged on, the user is redirected to the Login Page 4) After logging in, the user is redirected to the Profile page, _not_ the Scholarship Application Page they were attempting to navigate to Let's provides a better user-experience than this. Redirecting the user to the Profile page every time is an unnecessary context switch for a user. ## What should your feature do? In situations like this (where we redirect a user to the Login page when they're trying to access an Authenticated route), after they log on, let's redirect the user to the page they were originally trying to reach.
design
redirect user to intended route after forced login feature why is this feature being added current experience navigate to without being logged in click on the read more button for a scholarship which links to the scholarship application page for that scholarship since the application page for scholarships is an authenticated route requiring a user to be logged on the user is redirected to the login page after logging in the user is redirected to the profile page not the scholarship application page they were attempting to navigate to let s provides a better user experience than this redirecting the user to the profile page every time is an unnecessary context switch for a user what should your feature do in situations like this where we redirect a user to the login page when they re trying to access an authenticated route after they log on let s redirect the user to the page they were originally trying to reach
1
739,287
25,589,439,870
IssuesEvent
2022-12-01 11:53:00
jbx-protocol/juice-interface
https://api.github.com/repos/jbx-protocol/juice-interface
opened
Loader appearing too high on project page
type:bug priority:2
## Summary <img width="1435" alt="Screen Shot 2022-12-01 at 9 52 18 pm" src="https://user-images.githubusercontent.com/96150256/205046074-69298b38-fa5e-464f-8b78-e1c5df5188b2.png"> ## Steps to reproduce 1. Go to '...' 2. Click on '....' 3. Scroll down to '....' 4. See error ## What is the _current_ bug behavior? ## What is the expected _correct_ behavior? ## Relevant logs and/or screenshots ## Environment - **Device/OS**: [e.g. iOS] - **Browser:** [e.g. chrome, safari] - **Hardware wallet**: [e.g. Ledger w/ Metamask]
1.0
Loader appearing too high on project page - ## Summary <img width="1435" alt="Screen Shot 2022-12-01 at 9 52 18 pm" src="https://user-images.githubusercontent.com/96150256/205046074-69298b38-fa5e-464f-8b78-e1c5df5188b2.png"> ## Steps to reproduce 1. Go to '...' 2. Click on '....' 3. Scroll down to '....' 4. See error ## What is the _current_ bug behavior? ## What is the expected _correct_ behavior? ## Relevant logs and/or screenshots ## Environment - **Device/OS**: [e.g. iOS] - **Browser:** [e.g. chrome, safari] - **Hardware wallet**: [e.g. Ledger w/ Metamask]
non_design
loader appearing too high on project page summary img width alt screen shot at pm src steps to reproduce go to click on scroll down to see error what is the current bug behavior what is the expected correct behavior relevant logs and or screenshots environment device os browser hardware wallet
0
119,290
4,764,067,727
IssuesEvent
2016-10-25 15:59:12
inova-tecnologias/jenova-web
https://api.github.com/repos/inova-tecnologias/jenova-web
closed
bug when logged as Administrator
bug complexity/low priority/P0
When logged as Administrator profile, the User list don't show correctly users.
1.0
bug when logged as Administrator - When logged as Administrator profile, the User list don't show correctly users.
non_design
bug when logged as administrator when logged as administrator profile the user list don t show correctly users
0
108,900
13,686,009,840
IssuesEvent
2020-09-30 08:03:55
mdn/yari
https://api.github.com/repos/mdn/yari
closed
Forms
Yari1 design system
Minimalist now contains our core form styles. - Document examples in Storybook - Test new form styles in Yari
1.0
Forms - Minimalist now contains our core form styles. - Document examples in Storybook - Test new form styles in Yari
design
forms minimalist now contains our core form styles document examples in storybook test new form styles in yari
1
100,832
12,566,660,160
IssuesEvent
2020-06-08 11:37:40
HumanRightsMeasurementInitiative/hrmi-dataportal
https://api.github.com/repos/HumanRightsMeasurementInitiative/hrmi-dataportal
closed
Develop new landing page
enhancement needs: design
Sometimes referred to "Netflix style" landing page > the purpose as being to welcome people and give them some ideas of the sorts of things they can do, without requiring them to engage with any actual data.
1.0
Develop new landing page - Sometimes referred to "Netflix style" landing page > the purpose as being to welcome people and give them some ideas of the sorts of things they can do, without requiring them to engage with any actual data.
design
develop new landing page sometimes referred to netflix style landing page the purpose as being to welcome people and give them some ideas of the sorts of things they can do without requiring them to engage with any actual data
1
268,679
23,387,813,656
IssuesEvent
2022-08-11 15:05:43
kyma-project/kyma
https://api.github.com/repos/kyma-project/kyma
closed
Improve error logs in Application Connector integration tests
area/application-connector area/tests
**Description** @kyma-project/framefrog , improve logs from the `pre-main-kyma-integration-k3d-{application-connector-component}` pipelines. Currently, they look kinda gross when they fail. For example, there are multiple dropdowns for a single failure: <img width="1493" alt="Screenshot 2022-08-03 at 10 01 10" src="https://user-images.githubusercontent.com/32485355/182556179-87f77316-817e-4849-b1d0-ec4d1a91f735.png"> There are also multiple bolded and covered in red lines in the logs below even if they are not important. [Here is an example of such log](https://status.build.kyma-project.io/view/gs/kyma-prow-logs/pr-logs/pull/kyma-project_kyma/14804/pre-main-kyma-integration-k3d-app-gateway/1554052034313850880) For the successful runs, it doesn't look beautiful either. Look at these bolded errors that mean nothing, as [the pipeline is green](https://status.build.kyma-project.io/view/gs/kyma-prow-logs/pr-logs/pull/kyma-project_kyma/14972/pre-main-kyma-integration-k3d-app-gateway/1554480421897506816): <img width="1152" alt="Screenshot 2022-08-03 at 10 27 12" src="https://user-images.githubusercontent.com/32485355/182561480-47210135-5bea-4367-85e6-c56246ce9d81.png"> **Reasons** The log message should be clear. If there are errors, there should be a single dropdown for each one. If there are no errors and the pipeline is green, the logs should not scream with bolded red colored errors everywhere
1.0
Improve error logs in Application Connector integration tests - **Description** @kyma-project/framefrog , improve logs from the `pre-main-kyma-integration-k3d-{application-connector-component}` pipelines. Currently, they look kinda gross when they fail. For example, there are multiple dropdowns for a single failure: <img width="1493" alt="Screenshot 2022-08-03 at 10 01 10" src="https://user-images.githubusercontent.com/32485355/182556179-87f77316-817e-4849-b1d0-ec4d1a91f735.png"> There are also multiple bolded and covered in red lines in the logs below even if they are not important. [Here is an example of such log](https://status.build.kyma-project.io/view/gs/kyma-prow-logs/pr-logs/pull/kyma-project_kyma/14804/pre-main-kyma-integration-k3d-app-gateway/1554052034313850880) For the successful runs, it doesn't look beautiful either. Look at these bolded errors that mean nothing, as [the pipeline is green](https://status.build.kyma-project.io/view/gs/kyma-prow-logs/pr-logs/pull/kyma-project_kyma/14972/pre-main-kyma-integration-k3d-app-gateway/1554480421897506816): <img width="1152" alt="Screenshot 2022-08-03 at 10 27 12" src="https://user-images.githubusercontent.com/32485355/182561480-47210135-5bea-4367-85e6-c56246ce9d81.png"> **Reasons** The log message should be clear. If there are errors, there should be a single dropdown for each one. If there are no errors and the pipeline is green, the logs should not scream with bolded red colored errors everywhere
non_design
improve error logs in application connector integration tests description kyma project framefrog improve logs from the pre main kyma integration application connector component pipelines currently they look kinda gross when they fail for example there are multiple dropdowns for a single failure img width alt screenshot at src there are also multiple bolded and covered in red lines in the logs below even if they are not important for the successful runs it doesn t look beautiful either look at these bolded errors that mean nothing as img width alt screenshot at src reasons the log message should be clear if there are errors there should be a single dropdown for each one if there are no errors and the pipeline is green the logs should not scream with bolded red colored errors everywhere
0
163,853
25,887,865,096
IssuesEvent
2022-12-14 15:44:58
microsoft/pyright
https://api.github.com/repos/microsoft/pyright
closed
Pyright classifies unannotated abstractmethod return as `None`
as designed
**Describe the bug** It's possible that this is "as designed", but this behavior seems surprising to me: ``` from abc import ABC, abstractmethod class Foo(ABC): @abstractmethod def foo(self): ... def takes_foo(foo_obj: Foo): foo_obj.foo() # has type of `None` ``` It looks like the same inference rules applied to normal methods are applied to abstract methods, so that the lack of a return statement in the abstract method causes pyright to infer a type of `None`. But since abstract methods can never have a return statement in the body, this is an unjustified inference-- it seems more sensible to have an `Unknown` return type for an unannotated abstract method.
1.0
Pyright classifies unannotated abstractmethod return as `None` - **Describe the bug** It's possible that this is "as designed", but this behavior seems surprising to me: ``` from abc import ABC, abstractmethod class Foo(ABC): @abstractmethod def foo(self): ... def takes_foo(foo_obj: Foo): foo_obj.foo() # has type of `None` ``` It looks like the same inference rules applied to normal methods are applied to abstract methods, so that the lack of a return statement in the abstract method causes pyright to infer a type of `None`. But since abstract methods can never have a return statement in the body, this is an unjustified inference-- it seems more sensible to have an `Unknown` return type for an unannotated abstract method.
design
pyright classifies unannotated abstractmethod return as none describe the bug it s possible that this is as designed but this behavior seems surprising to me from abc import abc abstractmethod class foo abc abstractmethod def foo self def takes foo foo obj foo foo obj foo has type of none it looks like the same inference rules applied to normal methods are applied to abstract methods so that the lack of a return statement in the abstract method causes pyright to infer a type of none but since abstract methods can never have a return statement in the body this is an unjustified inference it seems more sensible to have an unknown return type for an unannotated abstract method
1
177,827
29,170,694,802
IssuesEvent
2023-05-19 01:18:30
wpumacay/renderer
https://api.github.com/repos/wpumacay/renderer
closed
Camera Controls Objects (camera_control_t)
component: python priority: high type: design type: documentation type: feature component: engine objects
<!-- TODO(wilbert) --> - [x] Orbit controls - [ ] Fps controls - [ ] Mixes|Hibrid|Editor controls
1.0
Camera Controls Objects (camera_control_t) - <!-- TODO(wilbert) --> - [x] Orbit controls - [ ] Fps controls - [ ] Mixes|Hibrid|Editor controls
design
camera controls objects camera control t orbit controls fps controls mixes hibrid editor controls
1
43,203
5,583,791,871
IssuesEvent
2017-03-29 01:54:46
ParabolInc/action
https://api.github.com/repos/ParabolInc/action
opened
Label enhancement implemented
designing enhancement help wanted idea
## Enhancement When a team is working on projects that span across common work themes (epics, recurring, etc.), team members want a smart labeling system so that they can tag and filter projects. Spec: - [ ] Users can type labels anywhere in the content, beginning with a hashtag - [ ] An inline autocomplete (and automagical, I might say) menu appears (triggered by the keystroke of a hashtag) that suggests existing labels (to reduce duplicates) - [ ] Users can click labels to filter projects by that label (which updates the smart search bar and/or existing filter state [TBD, link here]) - [ ] Alternatively, users can filter by labels using the smart search bar and/or some other filter control [TBD, link here] Candidates for superpowers: - [ ] Consider the ability to enable/disable label superpowers at the team settings level - [ ] #private makes a project only visible to the owner (consider styling the card with “private” styles [use legacy Action card colors? use a cooler incognito theme?] - [ ] #recurring gets moved to Future when moved to Done during a meeting (instead of archiving) - [ ] #priority each team member can mark one card as their priority (signals to other team members what their #1 project is at the moment) - [ ] +#123 associates the project with another project by visible ID - [ ] >#123 references a project blocked by the *this* project - [ ] <#123 references a project that is blocking *this* project Considerations for integrations: - [ ] GitHub, when a hashtag appears before an issue number on GitHub, it should form a link. In our dashboard should we link to GitHub or to an imported, synced copy of the issue in our own software? **Estimated effort**: 23 points ([see CONTRIBUTING.md](https://github.com/ParabolInc/action/blob/master/CONTRIBUTING.md#points-and-sizes))
1.0
Label enhancement implemented - ## Enhancement When a team is working on projects that span across common work themes (epics, recurring, etc.), team members want a smart labeling system so that they can tag and filter projects. Spec: - [ ] Users can type labels anywhere in the content, beginning with a hashtag - [ ] An inline autocomplete (and automagical, I might say) menu appears (triggered by the keystroke of a hashtag) that suggests existing labels (to reduce duplicates) - [ ] Users can click labels to filter projects by that label (which updates the smart search bar and/or existing filter state [TBD, link here]) - [ ] Alternatively, users can filter by labels using the smart search bar and/or some other filter control [TBD, link here] Candidates for superpowers: - [ ] Consider the ability to enable/disable label superpowers at the team settings level - [ ] #private makes a project only visible to the owner (consider styling the card with “private” styles [use legacy Action card colors? use a cooler incognito theme?] - [ ] #recurring gets moved to Future when moved to Done during a meeting (instead of archiving) - [ ] #priority each team member can mark one card as their priority (signals to other team members what their #1 project is at the moment) - [ ] +#123 associates the project with another project by visible ID - [ ] >#123 references a project blocked by the *this* project - [ ] <#123 references a project that is blocking *this* project Considerations for integrations: - [ ] GitHub, when a hashtag appears before an issue number on GitHub, it should form a link. In our dashboard should we link to GitHub or to an imported, synced copy of the issue in our own software? **Estimated effort**: 23 points ([see CONTRIBUTING.md](https://github.com/ParabolInc/action/blob/master/CONTRIBUTING.md#points-and-sizes))
design
label enhancement implemented enhancement when a team is working on projects that span across common work themes epics recurring etc team members want a smart labeling system so that they can tag and filter projects spec users can type labels anywhere in the content beginning with a hashtag an inline autocomplete and automagical i might say menu appears triggered by the keystroke of a hashtag that suggests existing labels to reduce duplicates users can click labels to filter projects by that label which updates the smart search bar and or existing filter state alternatively users can filter by labels using the smart search bar and or some other filter control candidates for superpowers consider the ability to enable disable label superpowers at the team settings level private makes a project only visible to the owner consider styling the card with “private” styles recurring gets moved to future when moved to done during a meeting instead of archiving priority each team member can mark one card as their priority signals to other team members what their project is at the moment associates the project with another project by visible id references a project blocked by the this project references a project that is blocking this project considerations for integrations github when a hashtag appears before an issue number on github it should form a link in our dashboard should we link to github or to an imported synced copy of the issue in our own software estimated effort points
1
74,317
25,065,416,299
IssuesEvent
2022-11-07 07:51:31
hazelcast/hazelcast-nodejs-client
https://api.github.com/repos/hazelcast/hazelcast-nodejs-client
closed
While config Inputs are invalid, error message is not enough [API-1490]
Type: Defect to-jira
While configuring the client, if the inputs are invalid such as (use this as it is, do not change anything) `{ network: { hazelcastCloud: { discoveryToken: 'YOUR_DISCOVERY_TOKEN' } }, clusterName: 'YOUR_CLUSTER_NAME' }` , returned error message is `[DefaultLogger] INFO at LifecycleService: HazelcastClient is STARTING [DefaultLogger] INFO at LifecycleService: HazelcastClient is STARTED /PATH-TO-PROJECT/node_modules/hazelcast-client/lib/discovery/HazelcastCloudDiscovery.js:75 for (const value of jsonValue) { ^ TypeError: jsonValue is not iterable at Function.parseResponse (/PATH-TO-PROJECT/node_modules/hazelcast-client/lib/discovery/HazelcastCloudDiscovery.js:75:29) at IncomingMessage.<anonymous> (/PATH-TO-PROJECT/node_modules/hazelcast-client/lib/discovery/HazelcastCloudDiscovery.js:61:58) at IncomingMessage.emit (node:events:539:35) at endReadableNT (node:internal/streams/readable:1345:12) at processTicksAndRejections (node:internal/process/task_queues:83:21)` however there should be a better error message.
1.0
While config Inputs are invalid, error message is not enough [API-1490] - While configuring the client, if the inputs are invalid such as (use this as it is, do not change anything) `{ network: { hazelcastCloud: { discoveryToken: 'YOUR_DISCOVERY_TOKEN' } }, clusterName: 'YOUR_CLUSTER_NAME' }` , returned error message is `[DefaultLogger] INFO at LifecycleService: HazelcastClient is STARTING [DefaultLogger] INFO at LifecycleService: HazelcastClient is STARTED /PATH-TO-PROJECT/node_modules/hazelcast-client/lib/discovery/HazelcastCloudDiscovery.js:75 for (const value of jsonValue) { ^ TypeError: jsonValue is not iterable at Function.parseResponse (/PATH-TO-PROJECT/node_modules/hazelcast-client/lib/discovery/HazelcastCloudDiscovery.js:75:29) at IncomingMessage.<anonymous> (/PATH-TO-PROJECT/node_modules/hazelcast-client/lib/discovery/HazelcastCloudDiscovery.js:61:58) at IncomingMessage.emit (node:events:539:35) at endReadableNT (node:internal/streams/readable:1345:12) at processTicksAndRejections (node:internal/process/task_queues:83:21)` however there should be a better error message.
non_design
while config inputs are invalid error message is not enough while configuring the client if the inputs are invalid such as use this as it is do not change anything network hazelcastcloud discoverytoken your discovery token clustername your cluster name returned error message is info at lifecycleservice hazelcastclient is starting info at lifecycleservice hazelcastclient is started path to project node modules hazelcast client lib discovery hazelcastclouddiscovery js for const value of jsonvalue typeerror jsonvalue is not iterable at function parseresponse path to project node modules hazelcast client lib discovery hazelcastclouddiscovery js at incomingmessage path to project node modules hazelcast client lib discovery hazelcastclouddiscovery js at incomingmessage emit node events at endreadablent node internal streams readable at processticksandrejections node internal process task queues however there should be a better error message
0
181,775
30,740,554,038
IssuesEvent
2023-07-28 11:06:48
hlxsites/mammotome
https://api.github.com/repos/hlxsites/mammotome
closed
General Refresh Styles
enhancement refresh-design
Add general refresh styles, scoped to the `refresh` body class (set via Theme page metadata property)
1.0
General Refresh Styles - Add general refresh styles, scoped to the `refresh` body class (set via Theme page metadata property)
design
general refresh styles add general refresh styles scoped to the refresh body class set via theme page metadata property
1
711,594
24,468,970,471
IssuesEvent
2022-10-07 17:45:00
project-chip/zap
https://api.github.com/repos/project-chip/zap
closed
Cleanup zap/repo/src-electron/generator/matter/chip-tool
high priority MatterZapCleanup
The goal is to eventually cleanup the matter specific zap code to not have any state for eg in ClustersHelper.js During this cleanup we want to do the following: - Go through the matter directory in this issue. See if these helpers can have code pushed to the backend sql queries. - See if the helpers can use any of the existing helper logic and can remove code redundancy - Add unit tests for each of the helpers listed - Make sure to have a CHIP/Zigbee repo branch that points to your changes and passes the CI on both places - Also if you can fix anything new apart from what is listed then fix those issues as well.
1.0
Cleanup zap/repo/src-electron/generator/matter/chip-tool - The goal is to eventually cleanup the matter specific zap code to not have any state for eg in ClustersHelper.js During this cleanup we want to do the following: - Go through the matter directory in this issue. See if these helpers can have code pushed to the backend sql queries. - See if the helpers can use any of the existing helper logic and can remove code redundancy - Add unit tests for each of the helpers listed - Make sure to have a CHIP/Zigbee repo branch that points to your changes and passes the CI on both places - Also if you can fix anything new apart from what is listed then fix those issues as well.
non_design
cleanup zap repo src electron generator matter chip tool the goal is to eventually cleanup the matter specific zap code to not have any state for eg in clustershelper js during this cleanup we want to do the following go through the matter directory in this issue see if these helpers can have code pushed to the backend sql queries see if the helpers can use any of the existing helper logic and can remove code redundancy add unit tests for each of the helpers listed make sure to have a chip zigbee repo branch that points to your changes and passes the ci on both places also if you can fix anything new apart from what is listed then fix those issues as well
0
49,540
6,223,461,141
IssuesEvent
2017-07-10 12:00:01
pandas-dev/pandas
https://api.github.com/repos/pandas-dev/pandas
closed
Assignment by Attribute has Odd Behavior
API Design Indexing
When assigning to a column in a DataFrame, If I assign an existing column, the assignment works: ``` In [36]: df = pd.DataFrame({'a':[1,2,12], 'b':['a','b','a']}) In [37]: df.b = df.a In [38]: print df a b 0 1 1 1 2 2 2 12 12 [3 rows x 2 columns] ``` but assigning to a new column fails silently: ``` In [40]:df = pd.DataFrame({'a':[1,2,12], 'b':['a','b','a']}) In [41]:df.c = df.a In [42]:print df a b 0 1 a 1 2 b 2 12 a [3 rows x 2 columns] ```
1.0
Assignment by Attribute has Odd Behavior - When assigning to a column in a DataFrame, If I assign an existing column, the assignment works: ``` In [36]: df = pd.DataFrame({'a':[1,2,12], 'b':['a','b','a']}) In [37]: df.b = df.a In [38]: print df a b 0 1 1 1 2 2 2 12 12 [3 rows x 2 columns] ``` but assigning to a new column fails silently: ``` In [40]:df = pd.DataFrame({'a':[1,2,12], 'b':['a','b','a']}) In [41]:df.c = df.a In [42]:print df a b 0 1 a 1 2 b 2 12 a [3 rows x 2 columns] ```
design
assignment by attribute has odd behavior when assigning to a column in a dataframe if i assign an existing column the assignment works in df pd dataframe a b in df b df a in print df a b but assigning to a new column fails silently in df pd dataframe a b in df c df a in print df a b a b a
1
115,164
14,699,687,813
IssuesEvent
2021-01-04 08:59:51
filecoin-project/venus
https://api.github.com/repos/filecoin-project/venus
closed
Graphsync fetcher inter-request parallelism
needs-design :scroll: request-for-input
### Description It may make sense to request multiple chain heads in parallel instead of blocking on a single mutex in the syncer's `HandleNewTipSet` function. For example if one block is only served by a peer that conveniently disconnects during fetching that peer can cause the graphsync system to retry for the entire `requestTimeout`, preventing the fetching and processing of other blocks. ### Acceptance criteria - We have good reason to believe this will improve performance or DOS resistance - We can safely fetch multiple chains in parallel ### Risks + pitfalls - This will use more resources and so we should make sure it is worth the cost - If this is done incorrectly it will be wasteful. For example we should never be fetching `N` fetcher requests for the same head at once (we may want to have redundant fetches -- see #3372 -- but those should be managed carefully on a per request basis, not allowed to blowup based on repeated network messages for the same head) - Correctly determining that two chains do not intersect before fetch is actually not something we can do right now. We'd need more information (i.e. (cid, height) for every X blocks) from the hello protocol or peer tracker before this makes sense to do. - This is only for parallelizing fetches, not block processing which presents other concerns ### Where to begin Discussion with @frrist @anorth @hannahhoward
1.0
Graphsync fetcher inter-request parallelism - ### Description It may make sense to request multiple chain heads in parallel instead of blocking on a single mutex in the syncer's `HandleNewTipSet` function. For example if one block is only served by a peer that conveniently disconnects during fetching that peer can cause the graphsync system to retry for the entire `requestTimeout`, preventing the fetching and processing of other blocks. ### Acceptance criteria - We have good reason to believe this will improve performance or DOS resistance - We can safely fetch multiple chains in parallel ### Risks + pitfalls - This will use more resources and so we should make sure it is worth the cost - If this is done incorrectly it will be wasteful. For example we should never be fetching `N` fetcher requests for the same head at once (we may want to have redundant fetches -- see #3372 -- but those should be managed carefully on a per request basis, not allowed to blowup based on repeated network messages for the same head) - Correctly determining that two chains do not intersect before fetch is actually not something we can do right now. We'd need more information (i.e. (cid, height) for every X blocks) from the hello protocol or peer tracker before this makes sense to do. - This is only for parallelizing fetches, not block processing which presents other concerns ### Where to begin Discussion with @frrist @anorth @hannahhoward
design
graphsync fetcher inter request parallelism description it may make sense to request multiple chain heads in parallel instead of blocking on a single mutex in the syncer s handlenewtipset function for example if one block is only served by a peer that conveniently disconnects during fetching that peer can cause the graphsync system to retry for the entire requesttimeout preventing the fetching and processing of other blocks acceptance criteria we have good reason to believe this will improve performance or dos resistance we can safely fetch multiple chains in parallel risks pitfalls this will use more resources and so we should make sure it is worth the cost if this is done incorrectly it will be wasteful for example we should never be fetching n fetcher requests for the same head at once we may want to have redundant fetches see but those should be managed carefully on a per request basis not allowed to blowup based on repeated network messages for the same head correctly determining that two chains do not intersect before fetch is actually not something we can do right now we d need more information i e cid height for every x blocks from the hello protocol or peer tracker before this makes sense to do this is only for parallelizing fetches not block processing which presents other concerns where to begin discussion with frrist anorth hannahhoward
1
159,548
25,015,085,951
IssuesEvent
2022-11-03 18:05:45
microsoft/TypeScript
https://api.github.com/repos/microsoft/TypeScript
closed
Enums does not support literal typing with computed values
Design Limitation Fix Available
<!-- 🚨 STOP 🚨 𝗦𝗧𝗢𝗣 🚨 𝑺𝑻𝑶𝑷 🚨 Half of all issues filed here are duplicates, answered in the FAQ, or not appropriate for the bug tracker. Even if you think you've found a *bug*, please read the FAQ first, especially the Common "Bugs" That Aren't Bugs section! Please help us by doing the following steps before logging an issue: * Search: https://github.com/Microsoft/TypeScript/search?type=Issues * Read the FAQ: https://github.com/Microsoft/TypeScript/wiki/FAQ Please fill in the *entire* template below. --> <!-- Please try to reproduce the issue with `typescript@next`. It may have already been fixed. --> **TypeScript Version:** 3.2.0-dev.201xxxxx <!-- Search terms you tried before logging this (so others can find this issue more easily) --> **Search Terms:** - enum flag - enum computed literal typing **Code** ```ts enum AnimalFlags { None = 0, HasClaws = 1 << 0, CanFly = 1 << 1, EatsFish = 1 << 2, Endangered = 1 << 3, EndangeredFlyingClawedFishEating = HasClaws | CanFly | EatsFish | Endangered, } enum RegularEnum { None, HasPowers, } const a = AnimalFlags.EatsFish; const b: AnimalFlags.EndangeredFlyingClawedFishEating = AnimalFlags.EndangeredFlyingClawedFishEating; const c = RegularEnum.HasPowers; ``` **Expected behavior:** `a` Should have type of `AnimalFlags.EatsFish` `b` Should not throw. Should allow the assignment of `AnimalFlags.EndangeredFlyingClawedFishEating` as type. I would expect a computed Enum to behave as a regular enum, in this case, `c` has type `RegularEnum.HasPowers` **Actual behavior:** `a` is typed as `AnimalFlags`. `const b: AnimalFlags.EndangeredFlyingClawedFishEating` is throwing `Enum type 'AnimalFlags' has members with initializers that are not literals.` `b` should be allowed to be typed as `AnimalFlags.EndangeredFlyingClawedFishEating`. **Playground Link:** <!-- A link to a TypeScript Playground "Share" link which demonstrates this behavior --> [Link](http://www.typescriptlang.org/play/#src=enum%20AnimalFlags%20%7B%0D%0A%20%20%20%20None%20%20%20%20%20%20%20%20%20%20%20%3D%200%2C%0D%0A%20%20%20%20HasClaws%20%20%20%20%20%20%20%3D%201%20%3C%3C%200%2C%0D%0A%20%20%20%20CanFly%20%20%20%20%20%20%20%20%20%3D%201%20%3C%3C%201%2C%0D%0A%20%20%20%20EatsFish%20%20%20%20%20%20%20%3D%201%20%3C%3C%202%2C%0D%0A%20%20%20%20Endangered%20%20%20%20%20%3D%201%20%3C%3C%203%2C%0D%0A%0D%0A%20%20%20%20EndangeredFlyingClawedFishEating%20%3D%20HasClaws%20%7C%20CanFly%20%7C%20EatsFish%20%7C%20Endangered%2C%0D%0A%7D%0D%0A%0D%0Aenum%20RegularEnum%20%7B%0D%0A%20%20%20%20None%2C%0D%0A%20%20%20%20HasPowers%2C%0D%0A%7D%0D%0A%0D%0A%0D%0Aconst%20a%20%3D%20AnimalFlags.EatsFish%3B%0D%0Aconst%20b%3A%20AnimalFlags.EndangeredFlyingClawedFishEating%20%3D%20AnimalFlags.EndangeredFlyingClawedFishEating%3B%0D%0Aconst%20c%20%3D%20RegularEnum.HasPowers%3B) **Related Issues:** <!-- Did you find other bugs that looked similar? --> I think is the same that one reported last year #18393. It was closed as a Design Limitation, but since there has been some big changes in Typescript maybe this would be worth to be reviewed again.
1.0
Enums does not support literal typing with computed values - <!-- 🚨 STOP 🚨 𝗦𝗧𝗢𝗣 🚨 𝑺𝑻𝑶𝑷 🚨 Half of all issues filed here are duplicates, answered in the FAQ, or not appropriate for the bug tracker. Even if you think you've found a *bug*, please read the FAQ first, especially the Common "Bugs" That Aren't Bugs section! Please help us by doing the following steps before logging an issue: * Search: https://github.com/Microsoft/TypeScript/search?type=Issues * Read the FAQ: https://github.com/Microsoft/TypeScript/wiki/FAQ Please fill in the *entire* template below. --> <!-- Please try to reproduce the issue with `typescript@next`. It may have already been fixed. --> **TypeScript Version:** 3.2.0-dev.201xxxxx <!-- Search terms you tried before logging this (so others can find this issue more easily) --> **Search Terms:** - enum flag - enum computed literal typing **Code** ```ts enum AnimalFlags { None = 0, HasClaws = 1 << 0, CanFly = 1 << 1, EatsFish = 1 << 2, Endangered = 1 << 3, EndangeredFlyingClawedFishEating = HasClaws | CanFly | EatsFish | Endangered, } enum RegularEnum { None, HasPowers, } const a = AnimalFlags.EatsFish; const b: AnimalFlags.EndangeredFlyingClawedFishEating = AnimalFlags.EndangeredFlyingClawedFishEating; const c = RegularEnum.HasPowers; ``` **Expected behavior:** `a` Should have type of `AnimalFlags.EatsFish` `b` Should not throw. Should allow the assignment of `AnimalFlags.EndangeredFlyingClawedFishEating` as type. I would expect a computed Enum to behave as a regular enum, in this case, `c` has type `RegularEnum.HasPowers` **Actual behavior:** `a` is typed as `AnimalFlags`. `const b: AnimalFlags.EndangeredFlyingClawedFishEating` is throwing `Enum type 'AnimalFlags' has members with initializers that are not literals.` `b` should be allowed to be typed as `AnimalFlags.EndangeredFlyingClawedFishEating`. **Playground Link:** <!-- A link to a TypeScript Playground "Share" link which demonstrates this behavior --> [Link](http://www.typescriptlang.org/play/#src=enum%20AnimalFlags%20%7B%0D%0A%20%20%20%20None%20%20%20%20%20%20%20%20%20%20%20%3D%200%2C%0D%0A%20%20%20%20HasClaws%20%20%20%20%20%20%20%3D%201%20%3C%3C%200%2C%0D%0A%20%20%20%20CanFly%20%20%20%20%20%20%20%20%20%3D%201%20%3C%3C%201%2C%0D%0A%20%20%20%20EatsFish%20%20%20%20%20%20%20%3D%201%20%3C%3C%202%2C%0D%0A%20%20%20%20Endangered%20%20%20%20%20%3D%201%20%3C%3C%203%2C%0D%0A%0D%0A%20%20%20%20EndangeredFlyingClawedFishEating%20%3D%20HasClaws%20%7C%20CanFly%20%7C%20EatsFish%20%7C%20Endangered%2C%0D%0A%7D%0D%0A%0D%0Aenum%20RegularEnum%20%7B%0D%0A%20%20%20%20None%2C%0D%0A%20%20%20%20HasPowers%2C%0D%0A%7D%0D%0A%0D%0A%0D%0Aconst%20a%20%3D%20AnimalFlags.EatsFish%3B%0D%0Aconst%20b%3A%20AnimalFlags.EndangeredFlyingClawedFishEating%20%3D%20AnimalFlags.EndangeredFlyingClawedFishEating%3B%0D%0Aconst%20c%20%3D%20RegularEnum.HasPowers%3B) **Related Issues:** <!-- Did you find other bugs that looked similar? --> I think is the same that one reported last year #18393. It was closed as a Design Limitation, but since there has been some big changes in Typescript maybe this would be worth to be reviewed again.
design
enums does not support literal typing with computed values 🚨 stop 🚨 𝗦𝗧𝗢𝗣 🚨 𝑺𝑻𝑶𝑷 🚨 half of all issues filed here are duplicates answered in the faq or not appropriate for the bug tracker even if you think you ve found a bug please read the faq first especially the common bugs that aren t bugs section please help us by doing the following steps before logging an issue search read the faq please fill in the entire template below typescript version dev search terms enum flag enum computed literal typing code ts enum animalflags none hasclaws canfly eatsfish endangered endangeredflyingclawedfisheating hasclaws canfly eatsfish endangered enum regularenum none haspowers const a animalflags eatsfish const b animalflags endangeredflyingclawedfisheating animalflags endangeredflyingclawedfisheating const c regularenum haspowers expected behavior a should have type of animalflags eatsfish b should not throw should allow the assignment of animalflags endangeredflyingclawedfisheating as type i would expect a computed enum to behave as a regular enum in this case c has type regularenum haspowers actual behavior a is typed as animalflags const b animalflags endangeredflyingclawedfisheating is throwing enum type animalflags has members with initializers that are not literals b should be allowed to be typed as animalflags endangeredflyingclawedfisheating playground link related issues i think is the same that one reported last year it was closed as a design limitation but since there has been some big changes in typescript maybe this would be worth to be reviewed again
1
147,381
23,209,631,568
IssuesEvent
2022-08-02 09:00:37
appsmithorg/appsmith
https://api.github.com/repos/appsmithorg/appsmith
closed
[Task]: Remove unused workflows in design-system repository
Design System Pod Task
### Is there an existing issue for this? - [X] I have searched the existing issues ### SubTasks - Add sprint assignment in checklist
1.0
[Task]: Remove unused workflows in design-system repository - ### Is there an existing issue for this? - [X] I have searched the existing issues ### SubTasks - Add sprint assignment in checklist
design
remove unused workflows in design system repository is there an existing issue for this i have searched the existing issues subtasks add sprint assignment in checklist
1
399,321
27,236,481,806
IssuesEvent
2023-02-21 16:41:05
microsoft/vscode-vsce
https://api.github.com/repos/microsoft/vscode-vsce
closed
Unmentioned global yarn requirement for tests
documentation
I was playing around with the codebase and ran into some failures after executing the tests because I do not have [`yarn`](https://www.npmjs.com/package/yarn) on my system (console output below) AFAICT this is because there's a handful of tests that have an undocumented dependency on yarn being installed globally. I imagine there's a few different ways to address this, but IMO it'd be best to either skip those few tests when `yarn` is unavailable or to at least mention the requirement in the documentation. FWIW I think the former would be better since it's got the lower barrier of entry for contributors between the two, however, I'll send PRs to cover both approaches in case folks feel differently. Here's the output I received from cloning the repo, running `npm i`, and then running `npm test`: ```console 147 passing (7s) 4 failing 1) collect should honor dependencyEntryPoints: Error: Command failed: yarn list --prod --json /bin/sh: 1: yarn: not found at ChildProcess.exithandler (node:child_process:399:12) at ChildProcess.emit (node:events:526:28) at ChildProcess.emit (node:domain:475:12) at maybeClose (node:internal/child_process:1092:16) at Socket.<anonymous> (node:internal/child_process:451:11) at Socket.emit (node:events:526:28) at Socket.emit (node:domain:475:12) at Pipe.<anonymous> (node:net:687:12) 2) collect should detect yarn: Error: Command failed: yarn list --prod --json /bin/sh: 1: yarn: not found at ChildProcess.exithandler (node:child_process:399:12) at ChildProcess.emit (node:events:526:28) at ChildProcess.emit (node:domain:475:12) at maybeClose (node:internal/child_process:1092:16) at Socket.<anonymous> (node:internal/child_process:451:11) at Socket.emit (node:events:526:28) at Socket.emit (node:domain:475:12) at Pipe.<anonymous> (node:net:687:12) 3) collect should include all node_modules when dependencyEntryPoints is not defined: Error: Command failed: yarn list --prod --json /bin/sh: 1: yarn: not found at ChildProcess.exithandler (node:child_process:399:12) at ChildProcess.emit (node:events:526:28) at ChildProcess.emit (node:domain:475:12) at maybeClose (node:internal/child_process:1092:16) at Socket.<anonymous> (node:internal/child_process:451:11) at Socket.emit (node:events:526:28) at Socket.emit (node:domain:475:12) at Pipe.<anonymous> (node:net:687:12) 4) collect should skip all node_modules when dependencyEntryPoints is []: Error: Command failed: yarn list --prod --json /bin/sh: 1: yarn: not found at ChildProcess.exithandler (node:child_process:399:12) at ChildProcess.emit (node:events:526:28) at ChildProcess.emit (node:domain:475:12) at maybeClose (node:internal/child_process:1092:16) at Socket.<anonymous> (node:internal/child_process:451:11) at Socket.emit (node:events:526:28) at Socket.emit (node:domain:475:12) at Pipe.<anonymous> (node:net:687:12) ```
1.0
Unmentioned global yarn requirement for tests - I was playing around with the codebase and ran into some failures after executing the tests because I do not have [`yarn`](https://www.npmjs.com/package/yarn) on my system (console output below) AFAICT this is because there's a handful of tests that have an undocumented dependency on yarn being installed globally. I imagine there's a few different ways to address this, but IMO it'd be best to either skip those few tests when `yarn` is unavailable or to at least mention the requirement in the documentation. FWIW I think the former would be better since it's got the lower barrier of entry for contributors between the two, however, I'll send PRs to cover both approaches in case folks feel differently. Here's the output I received from cloning the repo, running `npm i`, and then running `npm test`: ```console 147 passing (7s) 4 failing 1) collect should honor dependencyEntryPoints: Error: Command failed: yarn list --prod --json /bin/sh: 1: yarn: not found at ChildProcess.exithandler (node:child_process:399:12) at ChildProcess.emit (node:events:526:28) at ChildProcess.emit (node:domain:475:12) at maybeClose (node:internal/child_process:1092:16) at Socket.<anonymous> (node:internal/child_process:451:11) at Socket.emit (node:events:526:28) at Socket.emit (node:domain:475:12) at Pipe.<anonymous> (node:net:687:12) 2) collect should detect yarn: Error: Command failed: yarn list --prod --json /bin/sh: 1: yarn: not found at ChildProcess.exithandler (node:child_process:399:12) at ChildProcess.emit (node:events:526:28) at ChildProcess.emit (node:domain:475:12) at maybeClose (node:internal/child_process:1092:16) at Socket.<anonymous> (node:internal/child_process:451:11) at Socket.emit (node:events:526:28) at Socket.emit (node:domain:475:12) at Pipe.<anonymous> (node:net:687:12) 3) collect should include all node_modules when dependencyEntryPoints is not defined: Error: Command failed: yarn list --prod --json /bin/sh: 1: yarn: not found at ChildProcess.exithandler (node:child_process:399:12) at ChildProcess.emit (node:events:526:28) at ChildProcess.emit (node:domain:475:12) at maybeClose (node:internal/child_process:1092:16) at Socket.<anonymous> (node:internal/child_process:451:11) at Socket.emit (node:events:526:28) at Socket.emit (node:domain:475:12) at Pipe.<anonymous> (node:net:687:12) 4) collect should skip all node_modules when dependencyEntryPoints is []: Error: Command failed: yarn list --prod --json /bin/sh: 1: yarn: not found at ChildProcess.exithandler (node:child_process:399:12) at ChildProcess.emit (node:events:526:28) at ChildProcess.emit (node:domain:475:12) at maybeClose (node:internal/child_process:1092:16) at Socket.<anonymous> (node:internal/child_process:451:11) at Socket.emit (node:events:526:28) at Socket.emit (node:domain:475:12) at Pipe.<anonymous> (node:net:687:12) ```
non_design
unmentioned global yarn requirement for tests i was playing around with the codebase and ran into some failures after executing the tests because i do not have on my system console output below afaict this is because there s a handful of tests that have an undocumented dependency on yarn being installed globally i imagine there s a few different ways to address this but imo it d be best to either skip those few tests when yarn is unavailable or to at least mention the requirement in the documentation fwiw i think the former would be better since it s got the lower barrier of entry for contributors between the two however i ll send prs to cover both approaches in case folks feel differently here s the output i received from cloning the repo running npm i and then running npm test console passing failing collect should honor dependencyentrypoints error command failed yarn list prod json bin sh yarn not found at childprocess exithandler node child process at childprocess emit node events at childprocess emit node domain at maybeclose node internal child process at socket node internal child process at socket emit node events at socket emit node domain at pipe node net collect should detect yarn error command failed yarn list prod json bin sh yarn not found at childprocess exithandler node child process at childprocess emit node events at childprocess emit node domain at maybeclose node internal child process at socket node internal child process at socket emit node events at socket emit node domain at pipe node net collect should include all node modules when dependencyentrypoints is not defined error command failed yarn list prod json bin sh yarn not found at childprocess exithandler node child process at childprocess emit node events at childprocess emit node domain at maybeclose node internal child process at socket node internal child process at socket emit node events at socket emit node domain at pipe node net collect should skip all node modules when dependencyentrypoints is error command failed yarn list prod json bin sh yarn not found at childprocess exithandler node child process at childprocess emit node events at childprocess emit node domain at maybeclose node internal child process at socket node internal child process at socket emit node events at socket emit node domain at pipe node net
0
112,467
14,259,373,227
IssuesEvent
2020-11-20 08:09:55
nuvla/ui
https://api.github.com/repos/nuvla/ui
closed
Get rid of cards inside the detail pages
UI Redesign
move/distribute the info someplace else in the same page (start with the NB page as a prototype)
1.0
Get rid of cards inside the detail pages - move/distribute the info someplace else in the same page (start with the NB page as a prototype)
design
get rid of cards inside the detail pages move distribute the info someplace else in the same page start with the nb page as a prototype
1
107,706
13,503,651,480
IssuesEvent
2020-09-13 14:30:52
rubyforgood/casa
https://api.github.com/repos/rubyforgood/casa
closed
Make edit profile accessible by dropdown menu in All CASA Admin dashboard
:cityscape: Multitenancy :globe_with_meridians: All CASA Admin :paintbrush: Design Good First Issue Help Wanted Priority: High Ruby For Good 🎃 Fall 2020
Part of epic #527 **What type of user is this for? [volunteer/admin/supervisor/all or All CASA Admin]** All CASA Admin **Where does/should this occur?** In the All CASA Admin dashboard (dependent on #628) **Description** All CASA Admin needs an entry point to their Edit Profile page. It should be accessible by clicking on their email in the upper right hand corner of their user dashboard. When they click, "Edit Profile" should appear as the only option in a drop down menu. Log in as any other user to see how this should look. <a href="https://github.com/rubyforgood/casa/blob/master/db/seeds.rb>Login instructions here.</a> **Screenshots** It should look like this: ![Screen Shot 2020-08-31 at 6 30 51 PM (2)](https://user-images.githubusercontent.com/62810851/91784656-45749700-ebb8-11ea-8dde-50e91d5f3016.png) Relates to issues: #627, #628, #630
1.0
Make edit profile accessible by dropdown menu in All CASA Admin dashboard - Part of epic #527 **What type of user is this for? [volunteer/admin/supervisor/all or All CASA Admin]** All CASA Admin **Where does/should this occur?** In the All CASA Admin dashboard (dependent on #628) **Description** All CASA Admin needs an entry point to their Edit Profile page. It should be accessible by clicking on their email in the upper right hand corner of their user dashboard. When they click, "Edit Profile" should appear as the only option in a drop down menu. Log in as any other user to see how this should look. <a href="https://github.com/rubyforgood/casa/blob/master/db/seeds.rb>Login instructions here.</a> **Screenshots** It should look like this: ![Screen Shot 2020-08-31 at 6 30 51 PM (2)](https://user-images.githubusercontent.com/62810851/91784656-45749700-ebb8-11ea-8dde-50e91d5f3016.png) Relates to issues: #627, #628, #630
design
make edit profile accessible by dropdown menu in all casa admin dashboard part of epic what type of user is this for all casa admin where does should this occur in the all casa admin dashboard dependent on description all casa admin needs an entry point to their edit profile page it should be accessible by clicking on their email in the upper right hand corner of their user dashboard when they click edit profile should appear as the only option in a drop down menu log in as any other user to see how this should look screenshots it should look like this relates to issues
1
42,769
5,534,186,183
IssuesEvent
2017-03-21 14:55:43
mozilla/addons-server
https://api.github.com/repos/mozilla/addons-server
closed
"Prev" screenshots navigation arrows are displayed for a moment at page refresh
component: redesign priority: enhancement triaged
Steps to reproduce: 1. Load details page for an add-on with screenshots i.e. https://addons.mozilla.org/en-US/firefox/addon/smart-https/?src=hp-dl-featured 2. Refresh the page while observing the screenshots section Expected results: There are no display or layout issues. Actual results: "Prev" navigation arrows are displayed for a moment. Notes/Issues: Verified on FF51(Win 7). Issue is reproducing all around AMO servers. Video for this issue: ![prev](https://cloud.githubusercontent.com/assets/15685960/23499518/1e408612-ff35-11e6-9f3a-68403dd027b4.gif)
1.0
"Prev" screenshots navigation arrows are displayed for a moment at page refresh - Steps to reproduce: 1. Load details page for an add-on with screenshots i.e. https://addons.mozilla.org/en-US/firefox/addon/smart-https/?src=hp-dl-featured 2. Refresh the page while observing the screenshots section Expected results: There are no display or layout issues. Actual results: "Prev" navigation arrows are displayed for a moment. Notes/Issues: Verified on FF51(Win 7). Issue is reproducing all around AMO servers. Video for this issue: ![prev](https://cloud.githubusercontent.com/assets/15685960/23499518/1e408612-ff35-11e6-9f3a-68403dd027b4.gif)
design
prev screenshots navigation arrows are displayed for a moment at page refresh steps to reproduce load details page for an add on with screenshots i e refresh the page while observing the screenshots section expected results there are no display or layout issues actual results prev navigation arrows are displayed for a moment notes issues verified on win issue is reproducing all around amo servers video for this issue
1
49,517
13,187,224,855
IssuesEvent
2020-08-13 02:44:40
icecube-trac/tix3
https://api.github.com/repos/icecube-trac/tix3
opened
dst-extractor (Trac #1579)
Incomplete Migration Migrated from Trac combo reconstruction defect
<details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1579">https://code.icecube.wisc.edu/ticket/1579</a>, reported by nega and owned by juancarlos</em></summary> <p> ```json { "status": "closed", "changetime": "2019-02-13T14:11:22", "description": "Since we're no longer building `libdst-extractor.so` all of these things fail:\n\n{{{\n~/i3/combo/build 14h 59m 59s\n\u276f ag 'load.*dst-extractor' ../src/\n../src/dst-extractor/python/__init__.py\n4:icetray.load('dst-extractor', False)\n\n../src/dst-extractor/resources/scripts/dstread09.py\n15:load(\"libdst-extractor\")\n\n../src/dst-extractor/resources/scripts/dstread08.py\n13:load(\"libdst-extractor\")\n\n../src/dst-extractor/resources/scripts/dst11_process.py\n82: load(\"libdst-extractor\")\n\n../src/dst-extractor/resources/scripts/dstread11.py\n15:load(\"libdst-extractor\")\n\n../src/dst-extractor/resources/scripts/dstread10.py\n13:load(\"libdst-extractor\")\n\n../src/dst-extractor/resources/scripts/dstread07.py\n12:load(\"libdst-extractor\")\n\n../src/filterscripts/resources/scripts/MinBiasHunter.py\n21:I3Tray.load(\"dst-extractor\")\n\n~/i3/combo/build 46s\n\u276f \n}}}\n\nThis also prevents the building of the documentation.\n", "reporter": "nega", "cc": "olivas, hdembinski", "resolution": "fixed", "_ts": "1550067082284240", "component": "combo reconstruction", "summary": "dst-extractor", "priority": "blocker", "keywords": "dst dst-extractor pybindings documentatoin", "time": "2016-03-07T19:10:52", "milestone": "", "owner": "juancarlos", "type": "defect" } ``` </p> </details>
1.0
dst-extractor (Trac #1579) - <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1579">https://code.icecube.wisc.edu/ticket/1579</a>, reported by nega and owned by juancarlos</em></summary> <p> ```json { "status": "closed", "changetime": "2019-02-13T14:11:22", "description": "Since we're no longer building `libdst-extractor.so` all of these things fail:\n\n{{{\n~/i3/combo/build 14h 59m 59s\n\u276f ag 'load.*dst-extractor' ../src/\n../src/dst-extractor/python/__init__.py\n4:icetray.load('dst-extractor', False)\n\n../src/dst-extractor/resources/scripts/dstread09.py\n15:load(\"libdst-extractor\")\n\n../src/dst-extractor/resources/scripts/dstread08.py\n13:load(\"libdst-extractor\")\n\n../src/dst-extractor/resources/scripts/dst11_process.py\n82: load(\"libdst-extractor\")\n\n../src/dst-extractor/resources/scripts/dstread11.py\n15:load(\"libdst-extractor\")\n\n../src/dst-extractor/resources/scripts/dstread10.py\n13:load(\"libdst-extractor\")\n\n../src/dst-extractor/resources/scripts/dstread07.py\n12:load(\"libdst-extractor\")\n\n../src/filterscripts/resources/scripts/MinBiasHunter.py\n21:I3Tray.load(\"dst-extractor\")\n\n~/i3/combo/build 46s\n\u276f \n}}}\n\nThis also prevents the building of the documentation.\n", "reporter": "nega", "cc": "olivas, hdembinski", "resolution": "fixed", "_ts": "1550067082284240", "component": "combo reconstruction", "summary": "dst-extractor", "priority": "blocker", "keywords": "dst dst-extractor pybindings documentatoin", "time": "2016-03-07T19:10:52", "milestone": "", "owner": "juancarlos", "type": "defect" } ``` </p> </details>
non_design
dst extractor trac migrated from json status closed changetime description since we re no longer building libdst extractor so all of these things fail n n n combo build n ag load dst extractor src n src dst extractor python init py icetray load dst extractor false n n src dst extractor resources scripts py load libdst extractor n n src dst extractor resources scripts py load libdst extractor n n src dst extractor resources scripts process py load libdst extractor n n src dst extractor resources scripts py load libdst extractor n n src dst extractor resources scripts py load libdst extractor n n src dst extractor resources scripts py load libdst extractor n n src filterscripts resources scripts minbiashunter py load dst extractor n n combo build n n n nthis also prevents the building of the documentation n reporter nega cc olivas hdembinski resolution fixed ts component combo reconstruction summary dst extractor priority blocker keywords dst dst extractor pybindings documentatoin time milestone owner juancarlos type defect
0
364,525
25,494,023,588
IssuesEvent
2022-11-27 12:56:49
StraykerPL/RockPaperScissors
https://api.github.com/repos/StraykerPL/RockPaperScissors
opened
Feature: Add Testing label to repo
documentation
**Is your feature request related to a problem? Please describe.** There's no `testing` label for checking general parts of product. **Describe the solution you'd like** Add `testing` label in GitHub, with description `This need to be tested`. **Describe alternatives you've considered** **Additional context**
1.0
Feature: Add Testing label to repo - **Is your feature request related to a problem? Please describe.** There's no `testing` label for checking general parts of product. **Describe the solution you'd like** Add `testing` label in GitHub, with description `This need to be tested`. **Describe alternatives you've considered** **Additional context**
non_design
feature add testing label to repo is your feature request related to a problem please describe there s no testing label for checking general parts of product describe the solution you d like add testing label in github with description this need to be tested describe alternatives you ve considered additional context
0
8,517
2,874,865,608
IssuesEvent
2015-06-09 02:20:36
mozilla/thimble.webmaker.org
https://api.github.com/repos/mozilla/thimble.webmaker.org
closed
UX exploration for exposing files in a Project
design UX
We need to figure out how we'll handle files and projects. Specifically: * How does a user toggle or expose the file view? * How are files in a project displayed? * How are files added, deleted and renamed? * Can we just lean on native Brackets functionality here? * How does a user open one of their existing projects? * How does a user save & name their current project? * How does a user delete their projects?
1.0
UX exploration for exposing files in a Project - We need to figure out how we'll handle files and projects. Specifically: * How does a user toggle or expose the file view? * How are files in a project displayed? * How are files added, deleted and renamed? * Can we just lean on native Brackets functionality here? * How does a user open one of their existing projects? * How does a user save & name their current project? * How does a user delete their projects?
design
ux exploration for exposing files in a project we need to figure out how we ll handle files and projects specifically how does a user toggle or expose the file view how are files in a project displayed how are files added deleted and renamed can we just lean on native brackets functionality here how does a user open one of their existing projects how does a user save name their current project how does a user delete their projects
1
156,551
24,624,594,933
IssuesEvent
2022-10-16 10:56:54
dotnet/efcore
https://api.github.com/repos/dotnet/efcore
closed
DbSet.AddRange not preserving order of list in sql database
closed-by-design customer-reported
What we are seeing is that the order is not preserved when we add a range of values. ### Steps to reproduce 1) Insert an list with a specific order. using an dbset addrange call. 2) Check database table to review order. pseudo code: ```C# static void TestAddRange() { List<TestTable> list = new List<TestTable>(5); for(int i=4; i >= 0; i--) list.Add(new TestTable{Name = "test", OrderBy = i+1}; List<TestTable> orderedlist = list.OrderBy(t => t.OrderBy); context.TestTable.AddRange(orderedlist); context.SaveChanges(); // alternate that fails as well //foreach(var temp in orderedlist) // context.TestTable.Add(temp); // //context.SaveChanges() // alternate code that succeeds but results in 5 round trips to database. //foreach(var temp in orderedlist) //{ // context.TestTable.Add(temp); // context.SaveChanges() //} } ``` Result in database Id , OrderBy 1, 3 2 , 1 3, 4 4, 2 5, 5 ### Further technical details EF Core version: 1.1.0 Database Provider: Microsoft.EntityFrameworkCore.SqlServer Operating system: Azure Service Fabric (.net 4.5.2) IDE: (e.g. Visual Studio 2015)
1.0
DbSet.AddRange not preserving order of list in sql database - What we are seeing is that the order is not preserved when we add a range of values. ### Steps to reproduce 1) Insert an list with a specific order. using an dbset addrange call. 2) Check database table to review order. pseudo code: ```C# static void TestAddRange() { List<TestTable> list = new List<TestTable>(5); for(int i=4; i >= 0; i--) list.Add(new TestTable{Name = "test", OrderBy = i+1}; List<TestTable> orderedlist = list.OrderBy(t => t.OrderBy); context.TestTable.AddRange(orderedlist); context.SaveChanges(); // alternate that fails as well //foreach(var temp in orderedlist) // context.TestTable.Add(temp); // //context.SaveChanges() // alternate code that succeeds but results in 5 round trips to database. //foreach(var temp in orderedlist) //{ // context.TestTable.Add(temp); // context.SaveChanges() //} } ``` Result in database Id , OrderBy 1, 3 2 , 1 3, 4 4, 2 5, 5 ### Further technical details EF Core version: 1.1.0 Database Provider: Microsoft.EntityFrameworkCore.SqlServer Operating system: Azure Service Fabric (.net 4.5.2) IDE: (e.g. Visual Studio 2015)
design
dbset addrange not preserving order of list in sql database what we are seeing is that the order is not preserved when we add a range of values steps to reproduce insert an list with a specific order using an dbset addrange call check database table to review order pseudo code c static void testaddrange list list new list for int i i i list add new testtable name test orderby i list orderedlist list orderby t t orderby context testtable addrange orderedlist context savechanges alternate that fails as well foreach var temp in orderedlist context testtable add temp context savechanges alternate code that succeeds but results in round trips to database foreach var temp in orderedlist context testtable add temp context savechanges result in database id orderby further technical details ef core version database provider microsoft entityframeworkcore sqlserver operating system azure service fabric net ide e g visual studio
1
259,048
22,387,468,701
IssuesEvent
2022-06-17 02:39:28
DaHoon06/Dotto
https://api.github.com/repos/DaHoon06/Dotto
opened
게시글 목록 조회시 limit값에 따른 목록 불러오기
✔️ Test BACK
게시글 조회시 프론트에서 보내주는 limit 값을 받아 해당하는 값만큼 목록을 프론트에 전달 확인사항 - [ ] 목록 조회시 limit값에 따른 쿼리 수정 - [ ] 테스트
1.0
게시글 목록 조회시 limit값에 따른 목록 불러오기 - 게시글 조회시 프론트에서 보내주는 limit 값을 받아 해당하는 값만큼 목록을 프론트에 전달 확인사항 - [ ] 목록 조회시 limit값에 따른 쿼리 수정 - [ ] 테스트
non_design
게시글 목록 조회시 limit값에 따른 목록 불러오기 게시글 조회시 프론트에서 보내주는 limit 값을 받아 해당하는 값만큼 목록을 프론트에 전달 확인사항 목록 조회시 limit값에 따른 쿼리 수정 테스트
0
8,205
2,870,369,635
IssuesEvent
2015-06-07 03:06:56
sunlightlabs/design
https://api.github.com/repos/sunlightlabs/design
closed
As a designer, I can plan and prepare for stakeholder interviews for UFO
design
- [x] Identify stakeholders in the org - [x] Develop stakeholder interview questions - [x] Schedule interviews
1.0
As a designer, I can plan and prepare for stakeholder interviews for UFO - - [x] Identify stakeholders in the org - [x] Develop stakeholder interview questions - [x] Schedule interviews
design
as a designer i can plan and prepare for stakeholder interviews for ufo identify stakeholders in the org develop stakeholder interview questions schedule interviews
1
139,068
20,767,057,271
IssuesEvent
2022-03-15 21:52:34
scribe-org/Scribe-iOS
https://api.github.com/repos/scribe-org/Scribe-iOS
closed
Update App Store images to display Wikidata
design -next release-
### Terms - [X] I have searched [open and closed design issues](https://github.com/scribe-org/Scribe-iOS/issues?q=is%3Aissue+label%3Adesign) - [X] I agree to follow Scribe-iOS' [Code of Conduct](https://github.com/scribe-org/Scribe-iOS/blob/main/.github/CODE_OF_CONDUCT.md) ### Description Based on best practices discussed at [Wikidata Data Reuse Days](https://diff.wikimedia.org/event/wikidata-data-reuse-days-2022/), it would be good to include Wikidata's logo in the images for the App Store. This was removed when there were more images and the goal was to minimize how much the user needed to scroll, but from then there have been many improvements on the images. The open-source image will thus be changed to also include a notification about Scribe open data stance. ### Contribution These changes will be pushed shortly, as this issue is for documentation purposes.
1.0
Update App Store images to display Wikidata - ### Terms - [X] I have searched [open and closed design issues](https://github.com/scribe-org/Scribe-iOS/issues?q=is%3Aissue+label%3Adesign) - [X] I agree to follow Scribe-iOS' [Code of Conduct](https://github.com/scribe-org/Scribe-iOS/blob/main/.github/CODE_OF_CONDUCT.md) ### Description Based on best practices discussed at [Wikidata Data Reuse Days](https://diff.wikimedia.org/event/wikidata-data-reuse-days-2022/), it would be good to include Wikidata's logo in the images for the App Store. This was removed when there were more images and the goal was to minimize how much the user needed to scroll, but from then there have been many improvements on the images. The open-source image will thus be changed to also include a notification about Scribe open data stance. ### Contribution These changes will be pushed shortly, as this issue is for documentation purposes.
design
update app store images to display wikidata terms i have searched i agree to follow scribe ios description based on best practices discussed at it would be good to include wikidata s logo in the images for the app store this was removed when there were more images and the goal was to minimize how much the user needed to scroll but from then there have been many improvements on the images the open source image will thus be changed to also include a notification about scribe open data stance contribution these changes will be pushed shortly as this issue is for documentation purposes
1
70,862
13,541,309,579
IssuesEvent
2020-09-16 15:43:04
vektorprogrammet/vektorprogrammet
https://api.github.com/repos/vektorprogrammet/vektorprogrammet
closed
Symfony Insight: Your project must not use PHP super globals
Code Quality
Another critical suggestion that must be fixed in order for Symfony Insight to pass on our PRs ![Screenshot 2020-09-15 at 22 37 48](https://user-images.githubusercontent.com/31702423/93262192-1a876700-f7a4-11ea-9078-00423d54882d.png)
1.0
Symfony Insight: Your project must not use PHP super globals - Another critical suggestion that must be fixed in order for Symfony Insight to pass on our PRs ![Screenshot 2020-09-15 at 22 37 48](https://user-images.githubusercontent.com/31702423/93262192-1a876700-f7a4-11ea-9078-00423d54882d.png)
non_design
symfony insight your project must not use php super globals another critical suggestion that must be fixed in order for symfony insight to pass on our prs
0
26,755
27,160,830,753
IssuesEvent
2023-02-17 11:43:27
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Impossible to resize collision shape for tile when vertex outside of tilesheet
bug topic:editor usability
**Godot version:** v.3.1.2.stable.official **OS/device including version:** Pop!_OS 19.10 (highly derived from Ubuntu) **Issue description:** I am following the tilemap tutorial in the documentation and accidentally I created a collision shape (rectangular) in an Atlas tile which is bigger than the size of the tilesheet : ![Capture d’écran de 2020-01-09 22-41-50](https://user-images.githubusercontent.com/35373357/72107280-4b6bee00-3331-11ea-95e4-23a53a8a138e.png) **Steps to reproduce:** Now if I want to resize the rectangle collision shape to fit the tile, I can't select any vertex outside the tilesheet (but I can grab and move the two left corners). **Minimal reproduction project:** [tilemap.zip](https://github.com/godotengine/godot/files/4042642/tilemap.zip)
True
Impossible to resize collision shape for tile when vertex outside of tilesheet - **Godot version:** v.3.1.2.stable.official **OS/device including version:** Pop!_OS 19.10 (highly derived from Ubuntu) **Issue description:** I am following the tilemap tutorial in the documentation and accidentally I created a collision shape (rectangular) in an Atlas tile which is bigger than the size of the tilesheet : ![Capture d’écran de 2020-01-09 22-41-50](https://user-images.githubusercontent.com/35373357/72107280-4b6bee00-3331-11ea-95e4-23a53a8a138e.png) **Steps to reproduce:** Now if I want to resize the rectangle collision shape to fit the tile, I can't select any vertex outside the tilesheet (but I can grab and move the two left corners). **Minimal reproduction project:** [tilemap.zip](https://github.com/godotengine/godot/files/4042642/tilemap.zip)
non_design
impossible to resize collision shape for tile when vertex outside of tilesheet godot version v stable official os device including version pop os highly derived from ubuntu issue description i am following the tilemap tutorial in the documentation and accidentally i created a collision shape rectangular in an atlas tile which is bigger than the size of the tilesheet steps to reproduce now if i want to resize the rectangle collision shape to fit the tile i can t select any vertex outside the tilesheet but i can grab and move the two left corners minimal reproduction project
0
134,466
19,211,210,687
IssuesEvent
2021-12-07 02:17:34
CERT-Polska/mquery
https://api.github.com/repos/CERT-Polska/mquery
closed
When querying for a duplicate rule, warn the user
status:needs more design
**Feature Category** - [ ] Correctness - [x] User Interface / User Experience - [x] Performance - [ ] Other (please explain) **Describe the problem** It's possible for two independent users to use the same yara rule. Mquery will then start matching files, which is unnecessary because the result will be exactly the same. **Describe the solution you'd like** Not sure, because sometimes running the same query **is** what the user wants (for example, new files were indexed). Probably popup/notification "hey, the same yara rule was already checked by someone 10 days ago - do you want to see it?". Or maybe redirect to the results. It's harder than it looks like, because users can select tags when querying. :thinking:. **Describe alternatives you've considered** Don't change anything. Keep it simple.
1.0
When querying for a duplicate rule, warn the user - **Feature Category** - [ ] Correctness - [x] User Interface / User Experience - [x] Performance - [ ] Other (please explain) **Describe the problem** It's possible for two independent users to use the same yara rule. Mquery will then start matching files, which is unnecessary because the result will be exactly the same. **Describe the solution you'd like** Not sure, because sometimes running the same query **is** what the user wants (for example, new files were indexed). Probably popup/notification "hey, the same yara rule was already checked by someone 10 days ago - do you want to see it?". Or maybe redirect to the results. It's harder than it looks like, because users can select tags when querying. :thinking:. **Describe alternatives you've considered** Don't change anything. Keep it simple.
design
when querying for a duplicate rule warn the user feature category correctness user interface user experience performance other please explain describe the problem it s possible for two independent users to use the same yara rule mquery will then start matching files which is unnecessary because the result will be exactly the same describe the solution you d like not sure because sometimes running the same query is what the user wants for example new files were indexed probably popup notification hey the same yara rule was already checked by someone days ago do you want to see it or maybe redirect to the results it s harder than it looks like because users can select tags when querying thinking describe alternatives you ve considered don t change anything keep it simple
1
42,080
17,025,770,598
IssuesEvent
2021-07-03 13:24:49
FirebirdSQL/jaybird
https://api.github.com/repos/FirebirdSQL/jaybird
closed
Support nbackup fixup and preserve sequence option
component: services api fix-version: Jaybird 5 type: new feature
Firebird 4 added support for the fixup (nbackup -F) option (which switches the database back to the 'normal' state), and introduced the `-sequence` option which will preserve the current database guid and replication sequence information on restore or fixup. Add support for this in the `NBackupManager` API.
1.0
Support nbackup fixup and preserve sequence option - Firebird 4 added support for the fixup (nbackup -F) option (which switches the database back to the 'normal' state), and introduced the `-sequence` option which will preserve the current database guid and replication sequence information on restore or fixup. Add support for this in the `NBackupManager` API.
non_design
support nbackup fixup and preserve sequence option firebird added support for the fixup nbackup f option which switches the database back to the normal state and introduced the sequence option which will preserve the current database guid and replication sequence information on restore or fixup add support for this in the nbackupmanager api
0
49,177
6,153,778,522
IssuesEvent
2017-06-28 10:51:57
SAP/techne
https://api.github.com/repos/SAP/techne
closed
Define Spacing types
design UX
Goal: Identify and define most of the spacing used on the components. ### Taks - [x] Identify spacing for [sections](https://github.com/SAP/techne/wiki/Website-Content-Components#content-components) - [x] Identify for [inputs elements](https://github.com/SAP/techne/wiki/Form-Inputs) - [x] Identify spacing for [cards](https://github.com/SAP/techne/issues/678#issuecomment-305724490) - [x] Define reusable spacing names - [x] Add Results to the Wiki https://github.com/SAP/techne/wiki/Sapcing-Design-specs
1.0
Define Spacing types - Goal: Identify and define most of the spacing used on the components. ### Taks - [x] Identify spacing for [sections](https://github.com/SAP/techne/wiki/Website-Content-Components#content-components) - [x] Identify for [inputs elements](https://github.com/SAP/techne/wiki/Form-Inputs) - [x] Identify spacing for [cards](https://github.com/SAP/techne/issues/678#issuecomment-305724490) - [x] Define reusable spacing names - [x] Add Results to the Wiki https://github.com/SAP/techne/wiki/Sapcing-Design-specs
design
define spacing types goal identify and define most of the spacing used on the components taks identify spacing for identify for identify spacing for define reusable spacing names add results to the wiki
1