Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
7
112
repo_url
stringlengths
36
141
action
stringclasses
3 values
title
stringlengths
2
665
labels
stringlengths
4
554
body
stringlengths
3
235k
index
stringclasses
6 values
text_combine
stringlengths
96
235k
label
stringclasses
2 values
text
stringlengths
96
196k
binary_label
int64
0
1
24,650
17,552,189,998
IssuesEvent
2021-08-13 00:10:51
scala-js/scala-js-dom
https://api.github.com/repos/scala-js/scala-js-dom
closed
GH Action Release fails
infrastructure
@armanbilge Release failed on the `series/v1.x` branch, seemingly cos of SJS 0.6.x. I know it's just SNAPSHOT release but if it doesn't work, pushing a v1.2.0 tag wont work either sadly. https://github.com/scala-js/scala-js-dom/actions/runs/1125835306
1.0
GH Action Release fails - @armanbilge Release failed on the `series/v1.x` branch, seemingly cos of SJS 0.6.x. I know it's just SNAPSHOT release but if it doesn't work, pushing a v1.2.0 tag wont work either sadly. https://github.com/scala-js/scala-js-dom/actions/runs/1125835306
infrastructure
gh action release fails armanbilge release failed on the series x branch seemingly cos of sjs x i know it s just snapshot release but if it doesn t work pushing a tag wont work either sadly
1
4,055
4,789,239,172
IssuesEvent
2016-10-30 23:27:34
dst-academy/docker-dontstarvetogether
https://api.github.com/repos/dst-academy/docker-dontstarvetogether
closed
Optimize repository names
enhancement infrastructure
For a better forking experience and better identification overall we should rename the repository before releasing the final version. In addition the Docker Hub name should be clearer. Suggestions for GitHub: - `dst-academy/dst-server-docker` - `dst-academy/docker-dst-server` - `dst-academy/dont-starve-together-docker` Suggestions for Docker Hub: - `dstacademy/dont-starve-together` - `dstacademy/dont-starve-together-server` - `dstacademy/dst-server`
1.0
Optimize repository names - For a better forking experience and better identification overall we should rename the repository before releasing the final version. In addition the Docker Hub name should be clearer. Suggestions for GitHub: - `dst-academy/dst-server-docker` - `dst-academy/docker-dst-server` - `dst-academy/dont-starve-together-docker` Suggestions for Docker Hub: - `dstacademy/dont-starve-together` - `dstacademy/dont-starve-together-server` - `dstacademy/dst-server`
infrastructure
optimize repository names for a better forking experience and better identification overall we should rename the repository before releasing the final version in addition the docker hub name should be clearer suggestions for github dst academy dst server docker dst academy docker dst server dst academy dont starve together docker suggestions for docker hub dstacademy dont starve together dstacademy dont starve together server dstacademy dst server
1
2,634
3,790,108,481
IssuesEvent
2016-03-21 20:17:49
elmsln/elmsln
https://api.github.com/repos/elmsln/elmsln
closed
support drush concurrency in elmsln-upgrade-sites
enhancement infrastructure scale / performance
server specs: 2 processors, 6 gigs of ram php 5.6 mysql 5.5 opcache in place drush has built in support for concurrency so that you can process multiple calls in a alias target. As elmsln's upgrade routine is built on @ elmsln which is a lazy loaded, very big alias grouping (of sub-groupings of sites) we could stand to run some of these in parallel to speed up the time this takes. real world example: `drush rr @coruses-all` concurrency 1 ``` real 15m44.714s user 10m10.198s sys 1m19.843s ``` real world example: `drush rr @coruses-all` concurrency 10 ``` real 5m11.379s user 7m16.322s sys 0m54.630s ``` The cost of something like 10 might be too high though. in reviewing NR data during each run you can see how much the server suffered from this aggressive rebuilding call: ![2016-03-18_00-21-21](https://cloud.githubusercontent.com/assets/329735/13868471/80ad7ca0-ec9f-11e5-8686-3c79a4814aeb.png) As we can see the server gets mad during the 10 concurrent window but not the 1 concurrency. Looking at memory / cpu: ![2016-03-18_00-24-06](https://cloud.githubusercontent.com/assets/329735/13868500/e1602d0e-ec9f-11e5-97d1-18e82d1b5217.png) Again here we see that the 10 concurrent balloons PHP memory and REALLY taxes its processing capabilities while 1 is almost unnoticed. Perhaps shooting for a value like 6 may help achieve a happy balance between speeding up the upgrade routine sweeps and ensuring the server doesn't get angry. We also could increase concurrency of SOME parts of the process / break up our current workflow in some areas; vsetting all sites to be offline for example, then run the updates concurrency 10, then , vset all back online, then drush rr 6, and the drup commands at 5. This could help achieve a balance of resource vs efficiency.
1.0
support drush concurrency in elmsln-upgrade-sites - server specs: 2 processors, 6 gigs of ram php 5.6 mysql 5.5 opcache in place drush has built in support for concurrency so that you can process multiple calls in a alias target. As elmsln's upgrade routine is built on @ elmsln which is a lazy loaded, very big alias grouping (of sub-groupings of sites) we could stand to run some of these in parallel to speed up the time this takes. real world example: `drush rr @coruses-all` concurrency 1 ``` real 15m44.714s user 10m10.198s sys 1m19.843s ``` real world example: `drush rr @coruses-all` concurrency 10 ``` real 5m11.379s user 7m16.322s sys 0m54.630s ``` The cost of something like 10 might be too high though. in reviewing NR data during each run you can see how much the server suffered from this aggressive rebuilding call: ![2016-03-18_00-21-21](https://cloud.githubusercontent.com/assets/329735/13868471/80ad7ca0-ec9f-11e5-8686-3c79a4814aeb.png) As we can see the server gets mad during the 10 concurrent window but not the 1 concurrency. Looking at memory / cpu: ![2016-03-18_00-24-06](https://cloud.githubusercontent.com/assets/329735/13868500/e1602d0e-ec9f-11e5-97d1-18e82d1b5217.png) Again here we see that the 10 concurrent balloons PHP memory and REALLY taxes its processing capabilities while 1 is almost unnoticed. Perhaps shooting for a value like 6 may help achieve a happy balance between speeding up the upgrade routine sweeps and ensuring the server doesn't get angry. We also could increase concurrency of SOME parts of the process / break up our current workflow in some areas; vsetting all sites to be offline for example, then run the updates concurrency 10, then , vset all back online, then drush rr 6, and the drup commands at 5. This could help achieve a balance of resource vs efficiency.
infrastructure
support drush concurrency in elmsln upgrade sites server specs processors gigs of ram php mysql opcache in place drush has built in support for concurrency so that you can process multiple calls in a alias target as elmsln s upgrade routine is built on elmsln which is a lazy loaded very big alias grouping of sub groupings of sites we could stand to run some of these in parallel to speed up the time this takes real world example drush rr coruses all concurrency real user sys real world example drush rr coruses all concurrency real user sys the cost of something like might be too high though in reviewing nr data during each run you can see how much the server suffered from this aggressive rebuilding call as we can see the server gets mad during the concurrent window but not the concurrency looking at memory cpu again here we see that the concurrent balloons php memory and really taxes its processing capabilities while is almost unnoticed perhaps shooting for a value like may help achieve a happy balance between speeding up the upgrade routine sweeps and ensuring the server doesn t get angry we also could increase concurrency of some parts of the process break up our current workflow in some areas vsetting all sites to be offline for example then run the updates concurrency then vset all back online then drush rr and the drup commands at this could help achieve a balance of resource vs efficiency
1
1,564
3,268,382,207
IssuesEvent
2015-10-23 11:07:22
dart-lang/sdk
https://api.github.com/repos/dart-lang/sdk
closed
Please merge revision 1a7528174263af0a95d7edf51c01a2b3d1b568ff into dev channel
Area-Infrastructure MergeToDev
@ricowind @whesse @kasperl This fixes a constant evaluation bug which could cause an analyzer crash when analyzing code containing malformed constant expressions. See #24645. Revision to be merged: 1a7528174263af0a95d7edf51c01a2b3d1b568ff There is a minor merge conflict. I've uploaded a CL with the correct merge here: https://codereview.chromium.org/1415523003/
1.0
Please merge revision 1a7528174263af0a95d7edf51c01a2b3d1b568ff into dev channel - @ricowind @whesse @kasperl This fixes a constant evaluation bug which could cause an analyzer crash when analyzing code containing malformed constant expressions. See #24645. Revision to be merged: 1a7528174263af0a95d7edf51c01a2b3d1b568ff There is a minor merge conflict. I've uploaded a CL with the correct merge here: https://codereview.chromium.org/1415523003/
infrastructure
please merge revision into dev channel ricowind whesse kasperl this fixes a constant evaluation bug which could cause an analyzer crash when analyzing code containing malformed constant expressions see revision to be merged there is a minor merge conflict i ve uploaded a cl with the correct merge here
1
31,587
25,903,311,165
IssuesEvent
2022-12-15 08:12:19
deckhouse/deckhouse
https://api.github.com/repos/deckhouse/deckhouse
opened
[cloud-provider-aws] Add disable_api_termination to master nodes
type/enhancement area/cluster-and-infrastructure source/internal-client status/needs-triage
### Preflight Checklist - [X] I agree to follow the [Code of Conduct](https://github.com/deckhouse/deckhouse/blob/main/CODE_OF_CONDUCT.md) that this project adheres to. - [X] I have searched the [issue tracker](https://github.com/deckhouse/deckhouse/issues) for an issue that matches the one I want to file, without success. ### Use case. Why is this important? There was a case when all control-plane nodes were accidentally removed from cluster by manual user action. ### Proposed Solution Add `disable_api_termination` in terraform. But then we will have a problem with deleting control-plane vms using terraform. Maybe it's just better to add documentation how to do it using web interface. ### Additional Information _No response_
1.0
[cloud-provider-aws] Add disable_api_termination to master nodes - ### Preflight Checklist - [X] I agree to follow the [Code of Conduct](https://github.com/deckhouse/deckhouse/blob/main/CODE_OF_CONDUCT.md) that this project adheres to. - [X] I have searched the [issue tracker](https://github.com/deckhouse/deckhouse/issues) for an issue that matches the one I want to file, without success. ### Use case. Why is this important? There was a case when all control-plane nodes were accidentally removed from cluster by manual user action. ### Proposed Solution Add `disable_api_termination` in terraform. But then we will have a problem with deleting control-plane vms using terraform. Maybe it's just better to add documentation how to do it using web interface. ### Additional Information _No response_
infrastructure
add disable api termination to master nodes preflight checklist i agree to follow the that this project adheres to i have searched the for an issue that matches the one i want to file without success use case why is this important there was a case when all control plane nodes were accidentally removed from cluster by manual user action proposed solution add disable api termination in terraform but then we will have a problem with deleting control plane vms using terraform maybe it s just better to add documentation how to do it using web interface additional information no response
1
12,373
9,753,863,178
IssuesEvent
2019-06-04 10:07:05
Altinn/altinn-studio
https://api.github.com/repos/Altinn/altinn-studio
closed
Set up load balancing for SBL Bridge
draft infrastructure sbl sbl-bridge team-steam team-tamagotchi user-story
**Functional architect/designer:** @-mention **Technical architect:** @-mention **Description** The platform integration application should be loadbalanced between the portal servers in the test environment. **Technical considerations** - Which loadbalancer will we use? - Should only be aviable internal **Acceptance criterea** - Only available from Altinn Studio Apps **Tasks** - [ ] Set up load balancing and updated scripts for load balancer
1.0
Set up load balancing for SBL Bridge - **Functional architect/designer:** @-mention **Technical architect:** @-mention **Description** The platform integration application should be loadbalanced between the portal servers in the test environment. **Technical considerations** - Which loadbalancer will we use? - Should only be aviable internal **Acceptance criterea** - Only available from Altinn Studio Apps **Tasks** - [ ] Set up load balancing and updated scripts for load balancer
infrastructure
set up load balancing for sbl bridge functional architect designer mention technical architect mention description the platform integration application should be loadbalanced between the portal servers in the test environment technical considerations which loadbalancer will we use should only be aviable internal acceptance criterea only available from altinn studio apps tasks set up load balancing and updated scripts for load balancer
1
6,217
6,258,907,792
IssuesEvent
2017-07-14 16:43:12
servo/servo
https://api.github.com/repos/servo/servo
closed
Add tidy to support crates' CI
A-infrastructure B-meta
Superseding https://github.com/servo/servo/issues/861 - [ ] set up CI to automatically deploy new tidy versions to pypi when the source is changed - [ ] Update list of all support crates and add it here - [ ] check whether tidy is run by their CI and add it if not
1.0
Add tidy to support crates' CI - Superseding https://github.com/servo/servo/issues/861 - [ ] set up CI to automatically deploy new tidy versions to pypi when the source is changed - [ ] Update list of all support crates and add it here - [ ] check whether tidy is run by their CI and add it if not
infrastructure
add tidy to support crates ci superseding set up ci to automatically deploy new tidy versions to pypi when the source is changed update list of all support crates and add it here check whether tidy is run by their ci and add it if not
1
11,804
9,430,400,017
IssuesEvent
2019-04-12 08:56:38
vsechnovcloudu/chaosgunsonline
https://api.github.com/repos/vsechnovcloudu/chaosgunsonline
opened
Containerization and deployment of server
infrastructure
Dockerfile ready, but we need to deploy it somewhere. Proposal: AWS Fargate
1.0
Containerization and deployment of server - Dockerfile ready, but we need to deploy it somewhere. Proposal: AWS Fargate
infrastructure
containerization and deployment of server dockerfile ready but we need to deploy it somewhere proposal aws fargate
1
20,404
3,812,082,739
IssuesEvent
2016-03-27 09:29:49
QualiSystems/vCenterShell
https://api.github.com/repos/QualiSystems/vCenterShell
closed
Delete a resource that is endpoint of a CVC - vlan is held in vlan pool till reservation ends
bug Connectivity P2 ready to test
### Issue details Delete resource that is part of active P2P connection such that its VLAN should be released. VLAN is still held in Vlan Items table until reservation ends, if delete VM resource (not remove, but delete through client or API) ### Steps to reproduce Have a P2P connection between two apps. Connect. Now delete one of the VMs in resource explorer or through API. Now check if VlanItems table has released the row for this vlan. If not, bug reproduces. ### Affected versions: vCenterShell version _Please fill in affected version_ CloudShell version _Please fill in affected version_ ### Affected platforms - [ ] Virtual Environment _Please fill additional environment specific configuration_
1.0
Delete a resource that is endpoint of a CVC - vlan is held in vlan pool till reservation ends - ### Issue details Delete resource that is part of active P2P connection such that its VLAN should be released. VLAN is still held in Vlan Items table until reservation ends, if delete VM resource (not remove, but delete through client or API) ### Steps to reproduce Have a P2P connection between two apps. Connect. Now delete one of the VMs in resource explorer or through API. Now check if VlanItems table has released the row for this vlan. If not, bug reproduces. ### Affected versions: vCenterShell version _Please fill in affected version_ CloudShell version _Please fill in affected version_ ### Affected platforms - [ ] Virtual Environment _Please fill additional environment specific configuration_
non_infrastructure
delete a resource that is endpoint of a cvc vlan is held in vlan pool till reservation ends issue details delete resource that is part of active connection such that its vlan should be released vlan is still held in vlan items table until reservation ends if delete vm resource not remove but delete through client or api steps to reproduce have a connection between two apps connect now delete one of the vms in resource explorer or through api now check if vlanitems table has released the row for this vlan if not bug reproduces affected versions vcentershell version please fill in affected version cloudshell version please fill in affected version affected platforms virtual environment please fill additional environment specific configuration
0
11,357
9,115,980,832
IssuesEvent
2019-02-22 07:28:58
radare/radare2
https://api.github.com/repos/radare/radare2
opened
Automate merging easy and test-passing pull requests
infrastructure question
For example if all tests are passing, coverage is not decreased, amount of changes is not big, PR was reviewed, it can merge automatically. There is a bot for that: https://mergify.io/ https://github.com/apps/mergify
1.0
Automate merging easy and test-passing pull requests - For example if all tests are passing, coverage is not decreased, amount of changes is not big, PR was reviewed, it can merge automatically. There is a bot for that: https://mergify.io/ https://github.com/apps/mergify
infrastructure
automate merging easy and test passing pull requests for example if all tests are passing coverage is not decreased amount of changes is not big pr was reviewed it can merge automatically there is a bot for that
1
31,769
26,107,086,998
IssuesEvent
2022-12-27 14:33:22
treeverse/lakeFS
https://api.github.com/repos/treeverse/lakeFS
closed
RouterFS: should we use "provided" for hadoop- dependencies?
infrastructure area/client/spark team/ecosystem
In RouterFS: - Check if it makes sense to use provided dependencies. - If we use provided, how do we compile? - ~For hadoopFs~ and RouterFS (lower priority) EDIT: was already done for HadoopFS (#4357)
1.0
RouterFS: should we use "provided" for hadoop- dependencies? - In RouterFS: - Check if it makes sense to use provided dependencies. - If we use provided, how do we compile? - ~For hadoopFs~ and RouterFS (lower priority) EDIT: was already done for HadoopFS (#4357)
infrastructure
routerfs should we use provided for hadoop dependencies in routerfs check if it makes sense to use provided dependencies if we use provided how do we compile for hadoopfs and routerfs lower priority edit was already done for hadoopfs
1
344,889
10,349,714,597
IssuesEvent
2019-09-04 23:36:23
oslc-op/oslc-specs
https://api.github.com/repos/oslc-op/oslc-specs
opened
Consider defining a more general approach than a fixed JSON-LD format
Core: TRS Jira: access-control Priority: High Xtra: Jira
For the TRS spec, can we use a more general approach? Jim says it is brittle... --- _Migrated from https://issues.oasis-open.org/browse/OSLCCORE-79 (opened by @sarabura; previously assigned to @jamsden)_
1.0
Consider defining a more general approach than a fixed JSON-LD format - For the TRS spec, can we use a more general approach? Jim says it is brittle... --- _Migrated from https://issues.oasis-open.org/browse/OSLCCORE-79 (opened by @sarabura; previously assigned to @jamsden)_
non_infrastructure
consider defining a more general approach than a fixed json ld format for the trs spec can we use a more general approach jim says it is brittle migrated from opened by sarabura previously assigned to jamsden
0
504,609
14,620,295,026
IssuesEvent
2020-12-22 19:27:20
googleapis/elixir-google-api
https://api.github.com/repos/googleapis/elixir-google-api
closed
Synthesis failed for Content
autosynth failure priority: p1 type: bug
Hello! Autosynth couldn't regenerate Content. :broken_heart: Here's the output from running `synth.py`: ``` ionsListResponse to clients/content/lib/google_api/content/v21/model/settlementtransactions_list_response.ex. Writing ShipmentInvoice to clients/content/lib/google_api/content/v21/model/shipment_invoice.ex. Writing ShipmentInvoiceLineItemInvoice to clients/content/lib/google_api/content/v21/model/shipment_invoice_line_item_invoice.ex. Writing ShipmentTrackingInfo to clients/content/lib/google_api/content/v21/model/shipment_tracking_info.ex. Writing ShippingSettings to clients/content/lib/google_api/content/v21/model/shipping_settings.ex. Writing ShippingsettingsCustomBatchRequest to clients/content/lib/google_api/content/v21/model/shippingsettings_custom_batch_request.ex. Writing ShippingsettingsCustomBatchRequestEntry to clients/content/lib/google_api/content/v21/model/shippingsettings_custom_batch_request_entry.ex. Writing ShippingsettingsCustomBatchResponse to clients/content/lib/google_api/content/v21/model/shippingsettings_custom_batch_response.ex. Writing ShippingsettingsCustomBatchResponseEntry to clients/content/lib/google_api/content/v21/model/shippingsettings_custom_batch_response_entry.ex. Writing ShippingsettingsGetSupportedCarriersResponse to clients/content/lib/google_api/content/v21/model/shippingsettings_get_supported_carriers_response.ex. Writing ShippingsettingsGetSupportedHolidaysResponse to clients/content/lib/google_api/content/v21/model/shippingsettings_get_supported_holidays_response.ex. Writing ShippingsettingsGetSupportedPickupServicesResponse to clients/content/lib/google_api/content/v21/model/shippingsettings_get_supported_pickup_services_response.ex. Writing ShippingsettingsListResponse to clients/content/lib/google_api/content/v21/model/shippingsettings_list_response.ex. Writing Table to clients/content/lib/google_api/content/v21/model/table.ex. Writing TestOrder to clients/content/lib/google_api/content/v21/model/test_order.ex. Writing TestOrderAddress to clients/content/lib/google_api/content/v21/model/test_order_address.ex. Writing TestOrderDeliveryDetails to clients/content/lib/google_api/content/v21/model/test_order_delivery_details.ex. Writing TestOrderLineItem to clients/content/lib/google_api/content/v21/model/test_order_line_item.ex. Writing TestOrderLineItemProduct to clients/content/lib/google_api/content/v21/model/test_order_line_item_product.ex. Writing TestOrderPickupDetails to clients/content/lib/google_api/content/v21/model/test_order_pickup_details.ex. Writing TestOrderPickupDetailsPickupPerson to clients/content/lib/google_api/content/v21/model/test_order_pickup_details_pickup_person.ex. Writing TimeZone to clients/content/lib/google_api/content/v21/model/time_zone.ex. Writing TransitTable to clients/content/lib/google_api/content/v21/model/transit_table.ex. Writing TransitTableTransitTimeRow to clients/content/lib/google_api/content/v21/model/transit_table_transit_time_row.ex. Writing TransitTableTransitTimeRowTransitTimeValue to clients/content/lib/google_api/content/v21/model/transit_table_transit_time_row_transit_time_value.ex. Writing UnitInvoice to clients/content/lib/google_api/content/v21/model/unit_invoice.ex. Writing UnitInvoiceAdditionalCharge to clients/content/lib/google_api/content/v21/model/unit_invoice_additional_charge.ex. Writing UnitInvoiceTaxLine to clients/content/lib/google_api/content/v21/model/unit_invoice_tax_line.ex. Writing Value to clients/content/lib/google_api/content/v21/model/value.ex. Writing Weight to clients/content/lib/google_api/content/v21/model/weight.ex. Writing Accounts to clients/content/lib/google_api/content/v21/api/accounts.ex. Writing Accountstatuses to clients/content/lib/google_api/content/v21/api/accountstatuses.ex. Writing Accounttax to clients/content/lib/google_api/content/v21/api/accounttax.ex. Writing Csses to clients/content/lib/google_api/content/v21/api/csses.ex. Writing Datafeeds to clients/content/lib/google_api/content/v21/api/datafeeds.ex. Writing Datafeedstatuses to clients/content/lib/google_api/content/v21/api/datafeedstatuses.ex. Writing Liasettings to clients/content/lib/google_api/content/v21/api/liasettings.ex. Writing Localinventory to clients/content/lib/google_api/content/v21/api/localinventory.ex. Writing Orderinvoices to clients/content/lib/google_api/content/v21/api/orderinvoices.ex. Writing Orderreports to clients/content/lib/google_api/content/v21/api/orderreports.ex. Writing Orderreturns to clients/content/lib/google_api/content/v21/api/orderreturns.ex. Writing Orders to clients/content/lib/google_api/content/v21/api/orders.ex. Writing Ordertrackingsignals to clients/content/lib/google_api/content/v21/api/ordertrackingsignals.ex. Writing Pos to clients/content/lib/google_api/content/v21/api/pos.ex. Writing Products to clients/content/lib/google_api/content/v21/api/products.ex. Writing Productstatuses to clients/content/lib/google_api/content/v21/api/productstatuses.ex. Writing Pubsubnotificationsettings to clients/content/lib/google_api/content/v21/api/pubsubnotificationsettings.ex. Writing Regionalinventory to clients/content/lib/google_api/content/v21/api/regionalinventory.ex. Writing Regions to clients/content/lib/google_api/content/v21/api/regions.ex. Writing Repricingrules to clients/content/lib/google_api/content/v21/api/repricingrules.ex. Writing Returnaddress to clients/content/lib/google_api/content/v21/api/returnaddress.ex. Writing Returnpolicy to clients/content/lib/google_api/content/v21/api/returnpolicy.ex. Writing Settlementreports to clients/content/lib/google_api/content/v21/api/settlementreports.ex. Writing Settlementtransactions to clients/content/lib/google_api/content/v21/api/settlementtransactions.ex. Writing Shippingsettings to clients/content/lib/google_api/content/v21/api/shippingsettings.ex. Writing connection.ex. Writing metadata.ex. Writing mix.exs Writing README.md Writing LICENSE Writing .gitignore Writing config/config.exs Writing test/test_helper.exs 13:43:13.777 [info] Found only discovery_revision and/or formatting changes. Not significant enough for a PR. fixing file permissions Traceback (most recent call last): File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main "__main__", mod_spec) File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code exec(code, run_globals) File "/tmpfs/src/github/synthtool/synthtool/__main__.py", line 102, in <module> main() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 829, in __call__ return self.main(*args, **kwargs) File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 782, in main rv = self.invoke(ctx) File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 1066, in invoke return ctx.invoke(self.callback, **ctx.params) File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 610, in invoke return callback(*args, **kwargs) File "/tmpfs/src/github/synthtool/synthtool/__main__.py", line 94, in main spec.loader.exec_module(synth_module) # type: ignore File "/tmpfs/src/github/synthtool/synthtool/metadata.py", line 252, in __exit__ self.observer.stop() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/utils/__init__.py", line 81, in stop self.on_thread_stop() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/api.py", line 361, in on_thread_stop self.unschedule_all() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/api.py", line 357, in unschedule_all self._clear_emitters() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/api.py", line 231, in _clear_emitters emitter.stop() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/utils/__init__.py", line 81, in stop self.on_thread_stop() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/inotify.py", line 121, in on_thread_stop self._inotify.close() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/inotify_buffer.py", line 50, in close self.stop() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/utils/__init__.py", line 81, in stop self.on_thread_stop() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/inotify_buffer.py", line 46, in on_thread_stop self._inotify.close() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/inotify_c.py", line 277, in close os.close(self._inotify_fd) OSError: [Errno 9] Bad file descriptor 2020-12-18 05:43:16,902 autosynth [ERROR] > Synthesis failed 2020-12-18 05:43:16,902 autosynth [DEBUG] > Running: git clean -fdx Removing __pycache__/ Traceback (most recent call last): File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main "__main__", mod_spec) File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code exec(code, run_globals) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 354, in <module> main() File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 189, in main return _inner_main(temp_dir) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 291, in _inner_main ).synthesize(synth_log_path / "sponge_log.log") File "/tmpfs/src/github/synthtool/autosynth/synthesizer.py", line 120, in synthesize synth_proc.check_returncode() # Raise an exception. File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/subprocess.py", line 389, in check_returncode self.stderr) subprocess.CalledProcessError: Command '['/tmpfs/src/github/synthtool/env/bin/python3', '-m', 'synthtool', '--metadata', 'clients/content/synth.metadata', 'synth.py', '--', 'Content']' returned non-zero exit status 1. ``` Google internal developers can see the full log [here](http://sponge2/results/invocations/3a455424-7540-46a9-bb77-8265c8f04c06/targets/github%2Fsynthtool;config=default/tests;query=elixir-google-api;failed=false).
1.0
Synthesis failed for Content - Hello! Autosynth couldn't regenerate Content. :broken_heart: Here's the output from running `synth.py`: ``` ionsListResponse to clients/content/lib/google_api/content/v21/model/settlementtransactions_list_response.ex. Writing ShipmentInvoice to clients/content/lib/google_api/content/v21/model/shipment_invoice.ex. Writing ShipmentInvoiceLineItemInvoice to clients/content/lib/google_api/content/v21/model/shipment_invoice_line_item_invoice.ex. Writing ShipmentTrackingInfo to clients/content/lib/google_api/content/v21/model/shipment_tracking_info.ex. Writing ShippingSettings to clients/content/lib/google_api/content/v21/model/shipping_settings.ex. Writing ShippingsettingsCustomBatchRequest to clients/content/lib/google_api/content/v21/model/shippingsettings_custom_batch_request.ex. Writing ShippingsettingsCustomBatchRequestEntry to clients/content/lib/google_api/content/v21/model/shippingsettings_custom_batch_request_entry.ex. Writing ShippingsettingsCustomBatchResponse to clients/content/lib/google_api/content/v21/model/shippingsettings_custom_batch_response.ex. Writing ShippingsettingsCustomBatchResponseEntry to clients/content/lib/google_api/content/v21/model/shippingsettings_custom_batch_response_entry.ex. Writing ShippingsettingsGetSupportedCarriersResponse to clients/content/lib/google_api/content/v21/model/shippingsettings_get_supported_carriers_response.ex. Writing ShippingsettingsGetSupportedHolidaysResponse to clients/content/lib/google_api/content/v21/model/shippingsettings_get_supported_holidays_response.ex. Writing ShippingsettingsGetSupportedPickupServicesResponse to clients/content/lib/google_api/content/v21/model/shippingsettings_get_supported_pickup_services_response.ex. Writing ShippingsettingsListResponse to clients/content/lib/google_api/content/v21/model/shippingsettings_list_response.ex. Writing Table to clients/content/lib/google_api/content/v21/model/table.ex. Writing TestOrder to clients/content/lib/google_api/content/v21/model/test_order.ex. Writing TestOrderAddress to clients/content/lib/google_api/content/v21/model/test_order_address.ex. Writing TestOrderDeliveryDetails to clients/content/lib/google_api/content/v21/model/test_order_delivery_details.ex. Writing TestOrderLineItem to clients/content/lib/google_api/content/v21/model/test_order_line_item.ex. Writing TestOrderLineItemProduct to clients/content/lib/google_api/content/v21/model/test_order_line_item_product.ex. Writing TestOrderPickupDetails to clients/content/lib/google_api/content/v21/model/test_order_pickup_details.ex. Writing TestOrderPickupDetailsPickupPerson to clients/content/lib/google_api/content/v21/model/test_order_pickup_details_pickup_person.ex. Writing TimeZone to clients/content/lib/google_api/content/v21/model/time_zone.ex. Writing TransitTable to clients/content/lib/google_api/content/v21/model/transit_table.ex. Writing TransitTableTransitTimeRow to clients/content/lib/google_api/content/v21/model/transit_table_transit_time_row.ex. Writing TransitTableTransitTimeRowTransitTimeValue to clients/content/lib/google_api/content/v21/model/transit_table_transit_time_row_transit_time_value.ex. Writing UnitInvoice to clients/content/lib/google_api/content/v21/model/unit_invoice.ex. Writing UnitInvoiceAdditionalCharge to clients/content/lib/google_api/content/v21/model/unit_invoice_additional_charge.ex. Writing UnitInvoiceTaxLine to clients/content/lib/google_api/content/v21/model/unit_invoice_tax_line.ex. Writing Value to clients/content/lib/google_api/content/v21/model/value.ex. Writing Weight to clients/content/lib/google_api/content/v21/model/weight.ex. Writing Accounts to clients/content/lib/google_api/content/v21/api/accounts.ex. Writing Accountstatuses to clients/content/lib/google_api/content/v21/api/accountstatuses.ex. Writing Accounttax to clients/content/lib/google_api/content/v21/api/accounttax.ex. Writing Csses to clients/content/lib/google_api/content/v21/api/csses.ex. Writing Datafeeds to clients/content/lib/google_api/content/v21/api/datafeeds.ex. Writing Datafeedstatuses to clients/content/lib/google_api/content/v21/api/datafeedstatuses.ex. Writing Liasettings to clients/content/lib/google_api/content/v21/api/liasettings.ex. Writing Localinventory to clients/content/lib/google_api/content/v21/api/localinventory.ex. Writing Orderinvoices to clients/content/lib/google_api/content/v21/api/orderinvoices.ex. Writing Orderreports to clients/content/lib/google_api/content/v21/api/orderreports.ex. Writing Orderreturns to clients/content/lib/google_api/content/v21/api/orderreturns.ex. Writing Orders to clients/content/lib/google_api/content/v21/api/orders.ex. Writing Ordertrackingsignals to clients/content/lib/google_api/content/v21/api/ordertrackingsignals.ex. Writing Pos to clients/content/lib/google_api/content/v21/api/pos.ex. Writing Products to clients/content/lib/google_api/content/v21/api/products.ex. Writing Productstatuses to clients/content/lib/google_api/content/v21/api/productstatuses.ex. Writing Pubsubnotificationsettings to clients/content/lib/google_api/content/v21/api/pubsubnotificationsettings.ex. Writing Regionalinventory to clients/content/lib/google_api/content/v21/api/regionalinventory.ex. Writing Regions to clients/content/lib/google_api/content/v21/api/regions.ex. Writing Repricingrules to clients/content/lib/google_api/content/v21/api/repricingrules.ex. Writing Returnaddress to clients/content/lib/google_api/content/v21/api/returnaddress.ex. Writing Returnpolicy to clients/content/lib/google_api/content/v21/api/returnpolicy.ex. Writing Settlementreports to clients/content/lib/google_api/content/v21/api/settlementreports.ex. Writing Settlementtransactions to clients/content/lib/google_api/content/v21/api/settlementtransactions.ex. Writing Shippingsettings to clients/content/lib/google_api/content/v21/api/shippingsettings.ex. Writing connection.ex. Writing metadata.ex. Writing mix.exs Writing README.md Writing LICENSE Writing .gitignore Writing config/config.exs Writing test/test_helper.exs 13:43:13.777 [info] Found only discovery_revision and/or formatting changes. Not significant enough for a PR. fixing file permissions Traceback (most recent call last): File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main "__main__", mod_spec) File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code exec(code, run_globals) File "/tmpfs/src/github/synthtool/synthtool/__main__.py", line 102, in <module> main() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 829, in __call__ return self.main(*args, **kwargs) File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 782, in main rv = self.invoke(ctx) File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 1066, in invoke return ctx.invoke(self.callback, **ctx.params) File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 610, in invoke return callback(*args, **kwargs) File "/tmpfs/src/github/synthtool/synthtool/__main__.py", line 94, in main spec.loader.exec_module(synth_module) # type: ignore File "/tmpfs/src/github/synthtool/synthtool/metadata.py", line 252, in __exit__ self.observer.stop() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/utils/__init__.py", line 81, in stop self.on_thread_stop() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/api.py", line 361, in on_thread_stop self.unschedule_all() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/api.py", line 357, in unschedule_all self._clear_emitters() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/api.py", line 231, in _clear_emitters emitter.stop() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/utils/__init__.py", line 81, in stop self.on_thread_stop() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/inotify.py", line 121, in on_thread_stop self._inotify.close() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/inotify_buffer.py", line 50, in close self.stop() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/utils/__init__.py", line 81, in stop self.on_thread_stop() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/inotify_buffer.py", line 46, in on_thread_stop self._inotify.close() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/watchdog/observers/inotify_c.py", line 277, in close os.close(self._inotify_fd) OSError: [Errno 9] Bad file descriptor 2020-12-18 05:43:16,902 autosynth [ERROR] > Synthesis failed 2020-12-18 05:43:16,902 autosynth [DEBUG] > Running: git clean -fdx Removing __pycache__/ Traceback (most recent call last): File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main "__main__", mod_spec) File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code exec(code, run_globals) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 354, in <module> main() File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 189, in main return _inner_main(temp_dir) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 291, in _inner_main ).synthesize(synth_log_path / "sponge_log.log") File "/tmpfs/src/github/synthtool/autosynth/synthesizer.py", line 120, in synthesize synth_proc.check_returncode() # Raise an exception. File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/subprocess.py", line 389, in check_returncode self.stderr) subprocess.CalledProcessError: Command '['/tmpfs/src/github/synthtool/env/bin/python3', '-m', 'synthtool', '--metadata', 'clients/content/synth.metadata', 'synth.py', '--', 'Content']' returned non-zero exit status 1. ``` Google internal developers can see the full log [here](http://sponge2/results/invocations/3a455424-7540-46a9-bb77-8265c8f04c06/targets/github%2Fsynthtool;config=default/tests;query=elixir-google-api;failed=false).
non_infrastructure
synthesis failed for content hello autosynth couldn t regenerate content broken heart here s the output from running synth py ionslistresponse to clients content lib google api content model settlementtransactions list response ex writing shipmentinvoice to clients content lib google api content model shipment invoice ex writing shipmentinvoicelineiteminvoice to clients content lib google api content model shipment invoice line item invoice ex writing shipmenttrackinginfo to clients content lib google api content model shipment tracking info ex writing shippingsettings to clients content lib google api content model shipping settings ex writing shippingsettingscustombatchrequest to clients content lib google api content model shippingsettings custom batch request ex writing shippingsettingscustombatchrequestentry to clients content lib google api content model shippingsettings custom batch request entry ex writing shippingsettingscustombatchresponse to clients content lib google api content model shippingsettings custom batch response ex writing shippingsettingscustombatchresponseentry to clients content lib google api content model shippingsettings custom batch response entry ex writing shippingsettingsgetsupportedcarriersresponse to clients content lib google api content model shippingsettings get supported carriers response ex writing shippingsettingsgetsupportedholidaysresponse to clients content lib google api content model shippingsettings get supported holidays response ex writing shippingsettingsgetsupportedpickupservicesresponse to clients content lib google api content model shippingsettings get supported pickup services response ex writing shippingsettingslistresponse to clients content lib google api content model shippingsettings list response ex writing table to clients content lib google api content model table ex writing testorder to clients content lib google api content model test order ex writing testorderaddress to clients content lib google api content model test order address ex writing testorderdeliverydetails to clients content lib google api content model test order delivery details ex writing testorderlineitem to clients content lib google api content model test order line item ex writing testorderlineitemproduct to clients content lib google api content model test order line item product ex writing testorderpickupdetails to clients content lib google api content model test order pickup details ex writing testorderpickupdetailspickupperson to clients content lib google api content model test order pickup details pickup person ex writing timezone to clients content lib google api content model time zone ex writing transittable to clients content lib google api content model transit table ex writing transittabletransittimerow to clients content lib google api content model transit table transit time row ex writing transittabletransittimerowtransittimevalue to clients content lib google api content model transit table transit time row transit time value ex writing unitinvoice to clients content lib google api content model unit invoice ex writing unitinvoiceadditionalcharge to clients content lib google api content model unit invoice additional charge ex writing unitinvoicetaxline to clients content lib google api content model unit invoice tax line ex writing value to clients content lib google api content model value ex writing weight to clients content lib google api content model weight ex writing accounts to clients content lib google api content api accounts ex writing accountstatuses to clients content lib google api content api accountstatuses ex writing accounttax to clients content lib google api content api accounttax ex writing csses to clients content lib google api content api csses ex writing datafeeds to clients content lib google api content api datafeeds ex writing datafeedstatuses to clients content lib google api content api datafeedstatuses ex writing liasettings to clients content lib google api content api liasettings ex writing localinventory to clients content lib google api content api localinventory ex writing orderinvoices to clients content lib google api content api orderinvoices ex writing orderreports to clients content lib google api content api orderreports ex writing orderreturns to clients content lib google api content api orderreturns ex writing orders to clients content lib google api content api orders ex writing ordertrackingsignals to clients content lib google api content api ordertrackingsignals ex writing pos to clients content lib google api content api pos ex writing products to clients content lib google api content api products ex writing productstatuses to clients content lib google api content api productstatuses ex writing pubsubnotificationsettings to clients content lib google api content api pubsubnotificationsettings ex writing regionalinventory to clients content lib google api content api regionalinventory ex writing regions to clients content lib google api content api regions ex writing repricingrules to clients content lib google api content api repricingrules ex writing returnaddress to clients content lib google api content api returnaddress ex writing returnpolicy to clients content lib google api content api returnpolicy ex writing settlementreports to clients content lib google api content api settlementreports ex writing settlementtransactions to clients content lib google api content api settlementtransactions ex writing shippingsettings to clients content lib google api content api shippingsettings ex writing connection ex writing metadata ex writing mix exs writing readme md writing license writing gitignore writing config config exs writing test test helper exs found only discovery revision and or formatting changes not significant enough for a pr fixing file permissions traceback most recent call last file home kbuilder pyenv versions lib runpy py line in run module as main main mod spec file home kbuilder pyenv versions lib runpy py line in run code exec code run globals file tmpfs src github synthtool synthtool main py line in main file tmpfs src github synthtool env lib site packages click core py line in call return self main args kwargs file tmpfs src github synthtool env lib site packages click core py line in main rv self invoke ctx file tmpfs src github synthtool env lib site packages click core py line in invoke return ctx invoke self callback ctx params file tmpfs src github synthtool env lib site packages click core py line in invoke return callback args kwargs file tmpfs src github synthtool synthtool main py line in main spec loader exec module synth module type ignore file tmpfs src github synthtool synthtool metadata py line in exit self observer stop file tmpfs src github synthtool env lib site packages watchdog utils init py line in stop self on thread stop file tmpfs src github synthtool env lib site packages watchdog observers api py line in on thread stop self unschedule all file tmpfs src github synthtool env lib site packages watchdog observers api py line in unschedule all self clear emitters file tmpfs src github synthtool env lib site packages watchdog observers api py line in clear emitters emitter stop file tmpfs src github synthtool env lib site packages watchdog utils init py line in stop self on thread stop file tmpfs src github synthtool env lib site packages watchdog observers inotify py line in on thread stop self inotify close file tmpfs src github synthtool env lib site packages watchdog observers inotify buffer py line in close self stop file tmpfs src github synthtool env lib site packages watchdog utils init py line in stop self on thread stop file tmpfs src github synthtool env lib site packages watchdog observers inotify buffer py line in on thread stop self inotify close file tmpfs src github synthtool env lib site packages watchdog observers inotify c py line in close os close self inotify fd oserror bad file descriptor autosynth synthesis failed autosynth running git clean fdx removing pycache traceback most recent call last file home kbuilder pyenv versions lib runpy py line in run module as main main mod spec file home kbuilder pyenv versions lib runpy py line in run code exec code run globals file tmpfs src github synthtool autosynth synth py line in main file tmpfs src github synthtool autosynth synth py line in main return inner main temp dir file tmpfs src github synthtool autosynth synth py line in inner main synthesize synth log path sponge log log file tmpfs src github synthtool autosynth synthesizer py line in synthesize synth proc check returncode raise an exception file home kbuilder pyenv versions lib subprocess py line in check returncode self stderr subprocess calledprocesserror command returned non zero exit status google internal developers can see the full log
0
5,093
5,435,260,130
IssuesEvent
2017-03-05 15:33:03
AdguardTeam/AdguardFilters
https://api.github.com/repos/AdguardTeam/AdguardFilters
closed
adblock.ro filter
Infrastructure
Want to inform this is a new Romanian filter list https://www.adblock.ro/, on our website you can find all details, may need to use translation tools because is written in Romanian. This is a Public list, and anyone can contribute on our GitHub open project. Our Website: https://www.adblock.ro/ Github Project: https://github.com/tcptomato/ROad-Block
1.0
adblock.ro filter - Want to inform this is a new Romanian filter list https://www.adblock.ro/, on our website you can find all details, may need to use translation tools because is written in Romanian. This is a Public list, and anyone can contribute on our GitHub open project. Our Website: https://www.adblock.ro/ Github Project: https://github.com/tcptomato/ROad-Block
infrastructure
adblock ro filter want to inform this is a new romanian filter list on our website you can find all details may need to use translation tools because is written in romanian this is a public list and anyone can contribute on our github open project our website github project
1
3,286
4,187,972,579
IssuesEvent
2016-06-23 19:09:41
SemanticMediaWiki/SemanticMediaWiki
https://api.github.com/repos/SemanticMediaWiki/SemanticMediaWiki
closed
Leave SourceForge?
discussion infrastructure
SourceForge has become a rather controversial provider of software downloads [0][1][2] and is now routinely blocked by e.g. uBlock [3] as well as at least one corporate firewall I know. Would it make sense to leave SourceForge and use GitHub to distribute tar balls instead? [0] http://www.howtogeek.com/218764/warning-don%E2%80%99t-download-software-from-sourceforge-if-you-can-help-it/ [1] http://libregraphicsworld.org/blog/entry/anatomy-of-sourceforge-gimp-controversy [2] http://www.ghacks.net/2015/06/15/popular-software-projects-leave-sourceforge/ [3] https://github.com/gorhill/uBlock/commit/c4e82357efaf18bac3f04900efb304f5a092ffe0
1.0
Leave SourceForge? - SourceForge has become a rather controversial provider of software downloads [0][1][2] and is now routinely blocked by e.g. uBlock [3] as well as at least one corporate firewall I know. Would it make sense to leave SourceForge and use GitHub to distribute tar balls instead? [0] http://www.howtogeek.com/218764/warning-don%E2%80%99t-download-software-from-sourceforge-if-you-can-help-it/ [1] http://libregraphicsworld.org/blog/entry/anatomy-of-sourceforge-gimp-controversy [2] http://www.ghacks.net/2015/06/15/popular-software-projects-leave-sourceforge/ [3] https://github.com/gorhill/uBlock/commit/c4e82357efaf18bac3f04900efb304f5a092ffe0
infrastructure
leave sourceforge sourceforge has become a rather controversial provider of software downloads and is now routinely blocked by e g ublock as well as at least one corporate firewall i know would it make sense to leave sourceforge and use github to distribute tar balls instead
1
6,279
8,652,736,797
IssuesEvent
2018-11-27 08:59:54
gooddata/gooddata-java
https://api.github.com/repos/gooddata/gooddata-java
opened
Mutable DTOs can't honour equals semantics
backward incompatible
The core concept of gooddata-java - mutable dtos is effectively preventing such objects to have valid `equals` method. It's a question how this issue should be resolved: :question: make the DTOs immutable and provide copy constrcutors/builders :question: stay on the current state - the equals is only implemented on objects which has sensible immutable id :question: something else
True
Mutable DTOs can't honour equals semantics - The core concept of gooddata-java - mutable dtos is effectively preventing such objects to have valid `equals` method. It's a question how this issue should be resolved: :question: make the DTOs immutable and provide copy constrcutors/builders :question: stay on the current state - the equals is only implemented on objects which has sensible immutable id :question: something else
non_infrastructure
mutable dtos can t honour equals semantics the core concept of gooddata java mutable dtos is effectively preventing such objects to have valid equals method it s a question how this issue should be resolved question make the dtos immutable and provide copy constrcutors builders question stay on the current state the equals is only implemented on objects which has sensible immutable id question something else
0
31,384
25,601,993,145
IssuesEvent
2022-12-01 21:07:07
gothick/omm
https://api.github.com/repos/gothick/omm
opened
Should we persist beanstalkd?
infrastructure beanstalk
Should we persist beanstalkd? (if we do, there’s a recommended cookbook: https://github.com/djoos-cookbooks/beanstalkd) “Yes; if you choose, you can use the “-b” option, and beanstalkd will write all jobs to a binlog. If the power goes out, you can restart beanstalkd with the same option and it will recover the contents of the log.” On the other hand, our jobs are pretty ephemeral and everything can be quickly manually regenerated in the event of a disaster.
1.0
Should we persist beanstalkd? - Should we persist beanstalkd? (if we do, there’s a recommended cookbook: https://github.com/djoos-cookbooks/beanstalkd) “Yes; if you choose, you can use the “-b” option, and beanstalkd will write all jobs to a binlog. If the power goes out, you can restart beanstalkd with the same option and it will recover the contents of the log.” On the other hand, our jobs are pretty ephemeral and everything can be quickly manually regenerated in the event of a disaster.
infrastructure
should we persist beanstalkd should we persist beanstalkd if we do there’s a recommended cookbook “yes if you choose you can use the “ b” option and beanstalkd will write all jobs to a binlog if the power goes out you can restart beanstalkd with the same option and it will recover the contents of the log ” on the other hand our jobs are pretty ephemeral and everything can be quickly manually regenerated in the event of a disaster
1
417,204
28,110,195,695
IssuesEvent
2023-03-31 06:26:02
dsja612/ped
https://api.github.com/repos/dsja612/ped
opened
[UG] The image showed in the `Deleting a person` section is outdated
severity.Low type.DocumentationBug
The image showed in the `Deleting a person` section is outdated, and does not reflect the changes in the new UI. ### DG Screenshot ![image.png](https://raw.githubusercontent.com/dsja612/ped/main/files/4f013d20-f17a-4ae6-b64f-cf01381fc6d5.png) ### ModCheck Screenshot ![image.png](https://raw.githubusercontent.com/dsja612/ped/main/files/15fbcf6e-bc96-491b-8257-7c259acc596c.png) <!--session: 1680242262112-1218d913-3618-4389-b304-06d56e0308d2--> <!--Version: Web v3.4.7-->
1.0
[UG] The image showed in the `Deleting a person` section is outdated - The image showed in the `Deleting a person` section is outdated, and does not reflect the changes in the new UI. ### DG Screenshot ![image.png](https://raw.githubusercontent.com/dsja612/ped/main/files/4f013d20-f17a-4ae6-b64f-cf01381fc6d5.png) ### ModCheck Screenshot ![image.png](https://raw.githubusercontent.com/dsja612/ped/main/files/15fbcf6e-bc96-491b-8257-7c259acc596c.png) <!--session: 1680242262112-1218d913-3618-4389-b304-06d56e0308d2--> <!--Version: Web v3.4.7-->
non_infrastructure
the image showed in the deleting a person section is outdated the image showed in the deleting a person section is outdated and does not reflect the changes in the new ui dg screenshot modcheck screenshot
0
529,312
15,386,160,488
IssuesEvent
2021-03-03 07:47:37
wso2/product-apim
https://api.github.com/repos/wso2/product-apim
opened
Error when creating a new API from scratch by a user with Creator only permission
API-M 4.0.0 Priority/High Type/Bug
### Description: Below error popup is displayed in Publisher UI when a user with Creator only permissions creates an API from scratch at the point of clicking on the CREATE button. ![image](https://user-images.githubusercontent.com/6614042/109771222-91190380-7c22-11eb-88cd-17d00519a78e.png) The browser console shows the following two calls being made to the revision rest API ![image](https://user-images.githubusercontent.com/6614042/109769568-675edd00-7c20-11eb-9cf6-7c430c408831.png) ![image](https://user-images.githubusercontent.com/6614042/109769678-8a898c80-7c20-11eb-83fe-03f6a360dc13.png) Since the revision REST API resources require Publisher permissions these calls fail with 401 being returned. ### Steps to reproduce: 1. Login to the Publisher UI with a user who only has Creator permissions. 2. Fill in the fields required for a new REST API from scratch and click on the "CREATE" button
1.0
Error when creating a new API from scratch by a user with Creator only permission - ### Description: Below error popup is displayed in Publisher UI when a user with Creator only permissions creates an API from scratch at the point of clicking on the CREATE button. ![image](https://user-images.githubusercontent.com/6614042/109771222-91190380-7c22-11eb-88cd-17d00519a78e.png) The browser console shows the following two calls being made to the revision rest API ![image](https://user-images.githubusercontent.com/6614042/109769568-675edd00-7c20-11eb-9cf6-7c430c408831.png) ![image](https://user-images.githubusercontent.com/6614042/109769678-8a898c80-7c20-11eb-83fe-03f6a360dc13.png) Since the revision REST API resources require Publisher permissions these calls fail with 401 being returned. ### Steps to reproduce: 1. Login to the Publisher UI with a user who only has Creator permissions. 2. Fill in the fields required for a new REST API from scratch and click on the "CREATE" button
non_infrastructure
error when creating a new api from scratch by a user with creator only permission description below error popup is displayed in publisher ui when a user with creator only permissions creates an api from scratch at the point of clicking on the create button the browser console shows the following two calls being made to the revision rest api since the revision rest api resources require publisher permissions these calls fail with being returned steps to reproduce login to the publisher ui with a user who only has creator permissions fill in the fields required for a new rest api from scratch and click on the create button
0
12,489
9,806,940,471
IssuesEvent
2019-06-12 12:40:37
EticaAI/forum
https://api.github.com/repos/EticaAI/forum
opened
VPS Águia Pescadora Alpha
infrastructure-vps
- https://github.com/fititnt/cplp-aiops/issues/17 <sup>(Portuguese)</sup> --- _TODO: add basic details about this VPS on next weeks_
1.0
VPS Águia Pescadora Alpha - - https://github.com/fititnt/cplp-aiops/issues/17 <sup>(Portuguese)</sup> --- _TODO: add basic details about this VPS on next weeks_
infrastructure
vps águia pescadora alpha portuguese todo add basic details about this vps on next weeks
1
117,582
11,950,458,110
IssuesEvent
2020-04-03 15:14:15
Azure/azure-devops-cli-extension
https://api.github.com/repos/Azure/azure-devops-cli-extension
opened
[Documentation] Include azure devops documentation in top level command group details.
documentation
In each of the top level commands - az boards, az pipelines, az repos, az artifacts and az devops, we include the line indicating that this command is a part of azure-devops extension. In addition to this, we need to include the link out to the documentation - https://docs.microsoft.com/en-us/azure/devops/cli/?view=azure-devops as well. https://github.com/Azure/azure-cli-extensions/issues/1454
1.0
[Documentation] Include azure devops documentation in top level command group details. - In each of the top level commands - az boards, az pipelines, az repos, az artifacts and az devops, we include the line indicating that this command is a part of azure-devops extension. In addition to this, we need to include the link out to the documentation - https://docs.microsoft.com/en-us/azure/devops/cli/?view=azure-devops as well. https://github.com/Azure/azure-cli-extensions/issues/1454
non_infrastructure
include azure devops documentation in top level command group details in each of the top level commands az boards az pipelines az repos az artifacts and az devops we include the line indicating that this command is a part of azure devops extension in addition to this we need to include the link out to the documentation as well
0
32,572
26,802,892,813
IssuesEvent
2023-02-01 16:13:54
microsoft/WindowsAppSDK
https://api.github.com/repos/microsoft/WindowsAppSDK
closed
DevCheck doesn't verify VS components
feature area-Infrastructure
`tools\DevCheck.ps1` (conveniently accessible by running `tools\DevCheck.cmd`) verifies the local development environment is ready and often can (and will) update the environment as needed e.g. make sure the TAEF service is installed. Building ProjectReunion.sln and others in the repository require many Visual Studio components, not all of them obvious. Trying to build without the right components installed can be a frustrating experience to identify what's missing and which of Visual Studio Updater's zillions of options are needed. DevCheck needs to verify the required components are present. This includes the right versions of the Windows SDK, .NET Core and other components. These can be detected via [vswhere.exe](https://github.com/Microsoft/vswhere) to check for the expected [workload and component IDs](https://docs.microsoft.com/en-us/visualstudio/install/workload-and-component-ids?view=vs-2019). DevCheck currently pulls down the latest vswhere to do checks (unless -Offline is specified). It can also be found at `%ProgramFiles%\Microsoft Visual Studio\Installer\vswhere.exe`. DevCheck should use the local copy by default and grab and use the remote copy if -VSWhere:Latest is specified.
1.0
DevCheck doesn't verify VS components - `tools\DevCheck.ps1` (conveniently accessible by running `tools\DevCheck.cmd`) verifies the local development environment is ready and often can (and will) update the environment as needed e.g. make sure the TAEF service is installed. Building ProjectReunion.sln and others in the repository require many Visual Studio components, not all of them obvious. Trying to build without the right components installed can be a frustrating experience to identify what's missing and which of Visual Studio Updater's zillions of options are needed. DevCheck needs to verify the required components are present. This includes the right versions of the Windows SDK, .NET Core and other components. These can be detected via [vswhere.exe](https://github.com/Microsoft/vswhere) to check for the expected [workload and component IDs](https://docs.microsoft.com/en-us/visualstudio/install/workload-and-component-ids?view=vs-2019). DevCheck currently pulls down the latest vswhere to do checks (unless -Offline is specified). It can also be found at `%ProgramFiles%\Microsoft Visual Studio\Installer\vswhere.exe`. DevCheck should use the local copy by default and grab and use the remote copy if -VSWhere:Latest is specified.
infrastructure
devcheck doesn t verify vs components tools devcheck conveniently accessible by running tools devcheck cmd verifies the local development environment is ready and often can and will update the environment as needed e g make sure the taef service is installed building projectreunion sln and others in the repository require many visual studio components not all of them obvious trying to build without the right components installed can be a frustrating experience to identify what s missing and which of visual studio updater s zillions of options are needed devcheck needs to verify the required components are present this includes the right versions of the windows sdk net core and other components these can be detected via to check for the expected devcheck currently pulls down the latest vswhere to do checks unless offline is specified it can also be found at programfiles microsoft visual studio installer vswhere exe devcheck should use the local copy by default and grab and use the remote copy if vswhere latest is specified
1
81,478
3,591,421,460
IssuesEvent
2016-02-01 11:41:02
thesgc/chembiohub_helpdesk
https://api.github.com/repos/thesgc/chembiohub_helpdesk
closed
Asked to define assays in the sub project - which I can only select one. Then when I add an assay I
app: AssayReg For Andy and Paul Review name: Karen priority: Medium status: New
Asked to define assays in the sub project - which I can only select one. Then when I add an assay I can choose a template of any type - shouldn't they be restricted to the assay type I've defined?
1.0
Asked to define assays in the sub project - which I can only select one. Then when I add an assay I - Asked to define assays in the sub project - which I can only select one. Then when I add an assay I can choose a template of any type - shouldn't they be restricted to the assay type I've defined?
non_infrastructure
asked to define assays in the sub project which i can only select one then when i add an assay i asked to define assays in the sub project which i can only select one then when i add an assay i can choose a template of any type shouldn t they be restricted to the assay type i ve defined
0
287,863
24,869,061,963
IssuesEvent
2022-10-27 14:02:15
iho-ohi/S-101_Portrayal-Catalogue
https://api.github.com/repos/iho-ohi/S-101_Portrayal-Catalogue
closed
Measured Distance Value (row 61 main)
enhancement test PC 1.0.2
![image](https://user-images.githubusercontent.com/4913543/167491059-bc796ab8-7b91-4578-a637-ce1af89b594c.png) Rule update DistanceMark.lua. NOTE: Sanchez, Alvaro MR: Display the abbreviation of the unit of measurement in use preceeding waterwayDistance. ![image](https://user-images.githubusercontent.com/4913543/167490932-7b9db833-bfd2-423a-9683-d896b916b393.png) ![image](https://user-images.githubusercontent.com/4913543/167491003-11a28edf-ae9a-4633-a6f6-2ae9d3b9acea.png) (DistanceMark.zip) New symbol here from Holger: https://github.com/S-101-Portrayal-subWG/Working-Documents/issues/39 From duplicate issue #35 categoryOfDistanceMark was removed in FC 1.0.2 and distanceMarkVisible was added.
1.0
Measured Distance Value (row 61 main) - ![image](https://user-images.githubusercontent.com/4913543/167491059-bc796ab8-7b91-4578-a637-ce1af89b594c.png) Rule update DistanceMark.lua. NOTE: Sanchez, Alvaro MR: Display the abbreviation of the unit of measurement in use preceeding waterwayDistance. ![image](https://user-images.githubusercontent.com/4913543/167490932-7b9db833-bfd2-423a-9683-d896b916b393.png) ![image](https://user-images.githubusercontent.com/4913543/167491003-11a28edf-ae9a-4633-a6f6-2ae9d3b9acea.png) (DistanceMark.zip) New symbol here from Holger: https://github.com/S-101-Portrayal-subWG/Working-Documents/issues/39 From duplicate issue #35 categoryOfDistanceMark was removed in FC 1.0.2 and distanceMarkVisible was added.
non_infrastructure
measured distance value row main rule update distancemark lua note sanchez alvaro mr display the abbreviation of the unit of measurement in use preceeding waterwaydistance distancemark zip new symbol here from holger from duplicate issue categoryofdistancemark was removed in fc and distancemarkvisible was added
0
4,013
4,769,216,667
IssuesEvent
2016-10-26 11:48:59
camunda/camunda-modeler
https://api.github.com/repos/camunda/camunda-modeler
opened
Error during build process with npm version>=3
infrastructure
Uncaught Exception: Error: Cannot find module 'concat-map'
1.0
Error during build process with npm version>=3 - Uncaught Exception: Error: Cannot find module 'concat-map'
infrastructure
error during build process with npm version uncaught exception error cannot find module concat map
1
52,502
7,767,979,166
IssuesEvent
2018-06-03 13:12:22
Adobe-Marketing-Cloud/aem-core-wcm-components
https://api.github.com/repos/Adobe-Marketing-Cloud/aem-core-wcm-components
opened
[Image] Document the SVG behavior
documentation
We should document the SVG support that was recently added to the image component in https://github.com/Adobe-Marketing-Cloud/aem-core-wcm-components/pull/171, to describe its behavior in relation to adaptive image widths.
1.0
[Image] Document the SVG behavior - We should document the SVG support that was recently added to the image component in https://github.com/Adobe-Marketing-Cloud/aem-core-wcm-components/pull/171, to describe its behavior in relation to adaptive image widths.
non_infrastructure
document the svg behavior we should document the svg support that was recently added to the image component in to describe its behavior in relation to adaptive image widths
0
647,578
21,111,498,698
IssuesEvent
2022-04-05 02:29:35
mskcc/pluto-cwl
https://api.github.com/repos/mskcc/pluto-cwl
closed
clean up env.sh
low priority
Right now, the `toil` recipe in the `env.juno.sh` file is the only one that is really used anymore. Many others have become extraneous and outdated. So, updated the script to simplify it and remove those old outdated recipes
1.0
clean up env.sh - Right now, the `toil` recipe in the `env.juno.sh` file is the only one that is really used anymore. Many others have become extraneous and outdated. So, updated the script to simplify it and remove those old outdated recipes
non_infrastructure
clean up env sh right now the toil recipe in the env juno sh file is the only one that is really used anymore many others have become extraneous and outdated so updated the script to simplify it and remove those old outdated recipes
0
166,375
26,345,623,824
IssuesEvent
2023-01-10 21:46:41
gotogether-s/gotogether-s
https://api.github.com/repos/gotogether-s/gotogether-s
closed
SignUp
design
## About Update style of signup page ## To do list - [x] Sort import lines of signup page - [x] Organize code lines of signup page - [x] Reduce paddingBottom from 1rem to 0.5rem in signin page - [x] Reduce paddingTop value of error message in signin page - [x] Reduce marginBottom value of input wrapper box - [x] Remove marginTop value of signup link - [x] Reduce default marginBottom value to 2rem - [x] Add style to Button on hover - [x] Replace HTML with MUI, Update style and Delete SignUp.scss - [x] Reduce size of icon and Increase fontSize of page title
1.0
SignUp - ## About Update style of signup page ## To do list - [x] Sort import lines of signup page - [x] Organize code lines of signup page - [x] Reduce paddingBottom from 1rem to 0.5rem in signin page - [x] Reduce paddingTop value of error message in signin page - [x] Reduce marginBottom value of input wrapper box - [x] Remove marginTop value of signup link - [x] Reduce default marginBottom value to 2rem - [x] Add style to Button on hover - [x] Replace HTML with MUI, Update style and Delete SignUp.scss - [x] Reduce size of icon and Increase fontSize of page title
non_infrastructure
signup about update style of signup page to do list sort import lines of signup page organize code lines of signup page reduce paddingbottom from to in signin page reduce paddingtop value of error message in signin page reduce marginbottom value of input wrapper box remove margintop value of signup link reduce default marginbottom value to add style to button on hover replace html with mui update style and delete signup scss reduce size of icon and increase fontsize of page title
0
247,418
26,707,692,228
IssuesEvent
2023-01-27 19:49:16
kferrara1313/da-react-challenge
https://api.github.com/repos/kferrara1313/da-react-challenge
opened
Django-3.2-py3-none-any.whl: 16 vulnerabilities (highest severity is: 9.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p></summary> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (Django version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-34265](https://www.mend.io/vulnerability-database/CVE-2022-34265) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | Django-3.2-py3-none-any.whl | Direct | Django - 3.2.14,4.0.6 | &#9989; | | [CVE-2022-28346](https://www.mend.io/vulnerability-database/CVE-2022-28346) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | Django-3.2-py3-none-any.whl | Direct | 3.2.13 | &#9989; | | [CVE-2022-28347](https://www.mend.io/vulnerability-database/CVE-2022-28347) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | Django-3.2-py3-none-any.whl | Direct | 3.2.13 | &#9989; | | [CVE-2021-35042](https://www.mend.io/vulnerability-database/CVE-2021-35042) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | Django-3.2-py3-none-any.whl | Direct | Django - 3.1.13,3.2.5 | &#9989; | | [CVE-2022-36359](https://www.mend.io/vulnerability-database/CVE-2022-36359) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | Django-3.2-py3-none-any.whl | Direct | Django -3.2.15,4.0.7,4.1 | &#9989; | | [CVE-2022-41323](https://www.mend.io/vulnerability-database/CVE-2022-41323) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | Django-3.2-py3-none-any.whl | Direct | 3.2.16 | &#9989; | | [CVE-2021-45115](https://www.mend.io/vulnerability-database/CVE-2021-45115) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | Django-3.2-py3-none-any.whl | Direct | 3.2.11 | &#9989; | | [CVE-2022-23833](https://www.mend.io/vulnerability-database/CVE-2022-23833) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.27,3.2.12,4.0.2 | &#9989; | | [CVE-2021-31542](https://www.mend.io/vulnerability-database/CVE-2021-31542) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.21,3.1.9,3.2.1 | &#9989; | | [CVE-2021-33571](https://www.mend.io/vulnerability-database/CVE-2021-33571) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.24, 3.1.12, 3.2.4 | &#9989; | | [CVE-2021-45116](https://www.mend.io/vulnerability-database/CVE-2021-45116) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | Django-3.2-py3-none-any.whl | Direct | 3.2.11 | &#9989; | | [CVE-2021-44420](https://www.mend.io/vulnerability-database/CVE-2021-44420) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.25,3.1.14,3.2.10 | &#9989; | | [CVE-2022-22818](https://www.mend.io/vulnerability-database/CVE-2022-22818) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.27,3.2.12,4.0.2 | &#9989; | | [CVE-2021-32052](https://www.mend.io/vulnerability-database/CVE-2021-32052) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.22,3.1.10,3.2.2 | &#9989; | | [CVE-2021-45452](https://www.mend.io/vulnerability-database/CVE-2021-45452) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | Django-3.2-py3-none-any.whl | Direct | 3.2.11 | &#9989; | | [CVE-2021-33203](https://www.mend.io/vulnerability-database/CVE-2021-33203) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.9 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.24, 3.1.12, 3.2.4 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-34265</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected. Mend Note: After conducting further research, Mend has determined that all versions of Django before version 3.2.14 and before 4.0.6 are vulnerable to CVE-2022-34265. <p>Publish Date: 2022-07-04 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-34265>CVE-2022-34265</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/jul/04/security-releases/">https://www.djangoproject.com/weblog/2022/jul/04/security-releases/</a></p> <p>Release Date: 2022-07-04</p> <p>Fix Resolution: Django - 3.2.14,4.0.6</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-28346</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs. <p>Publish Date: 2022-04-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-28346>CVE-2022-28346</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-04-12</p> <p>Fix Resolution: 3.2.13</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-28347</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name. <p>Publish Date: 2022-04-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-28347>CVE-2022-28347</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28347">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28347</a></p> <p>Release Date: 2022-04-12</p> <p>Fix Resolution: 3.2.13</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-35042</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application. <p>Publish Date: 2021-07-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-35042>CVE-2021-35042</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2021/jul/01/security-releases/">https://www.djangoproject.com/weblog/2021/jul/01/security-releases/</a></p> <p>Release Date: 2021-07-02</p> <p>Fix Resolution: Django - 3.1.13,3.2.5</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-36359</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input. <p>Publish Date: 2022-08-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-36359>CVE-2022-36359</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/aug/03/security-releases/">https://www.djangoproject.com/weblog/2022/aug/03/security-releases/</a></p> <p>Release Date: 2022-08-03</p> <p>Fix Resolution: Django -3.2.15,4.0.7,4.1</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-41323</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression. <p>Publish Date: 2022-10-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41323>CVE-2022-41323</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41323">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41323</a></p> <p>Release Date: 2022-10-16</p> <p>Fix Resolution: 3.2.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-45115</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack. <p>Publish Date: 2022-01-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-45115>CVE-2021-45115</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/jan/04/security-releases/">https://www.djangoproject.com/weblog/2022/jan/04/security-releases/</a></p> <p>Release Date: 2022-01-05</p> <p>Fix Resolution: 3.2.11</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-23833</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files. <p>Publish Date: 2022-02-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23833>CVE-2022-23833</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/feb/01/security-releases/">https://www.djangoproject.com/weblog/2022/feb/01/security-releases/</a></p> <p>Release Date: 2022-02-03</p> <p>Fix Resolution: Django - 2.2.27,3.2.12,4.0.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-31542</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names. <p>Publish Date: 2021-05-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-31542>CVE-2021-31542</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2021/may/04/security-releases/">https://www.djangoproject.com/weblog/2021/may/04/security-releases/</a></p> <p>Release Date: 2021-05-05</p> <p>Fix Resolution: Django - 2.2.21,3.1.9,3.2.1</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-33571</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) . <p>Publish Date: 2021-06-08 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-33571>CVE-2021-33571</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2021/jun/02/security-releases/">https://www.djangoproject.com/weblog/2021/jun/02/security-releases/</a></p> <p>Release Date: 2021-06-08</p> <p>Fix Resolution: Django - 2.2.24, 3.1.12, 3.2.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-45116</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key. <p>Publish Date: 2022-01-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-45116>CVE-2021-45116</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/jan/04/security-releases/">https://www.djangoproject.com/weblog/2022/jan/04/security-releases/</a></p> <p>Release Date: 2022-01-05</p> <p>Fix Resolution: 3.2.11</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-44420</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. <p>Publish Date: 2021-12-08 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-44420>CVE-2021-44420</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://docs.djangoproject.com/en/3.2/releases/security/">https://docs.djangoproject.com/en/3.2/releases/security/</a></p> <p>Release Date: 2021-12-08</p> <p>Fix Resolution: Django - 2.2.25,3.1.14,3.2.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-22818</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS. <p>Publish Date: 2022-02-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-22818>CVE-2022-22818</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/feb/01/security-releases/">https://www.djangoproject.com/weblog/2022/feb/01/security-releases/</a></p> <p>Release Date: 2022-02-03</p> <p>Fix Resolution: Django - 2.2.27,3.2.12,4.0.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-32052</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers. <p>Publish Date: 2021-05-06 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-32052>CVE-2021-32052</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32052">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32052</a></p> <p>Release Date: 2021-05-06</p> <p>Fix Resolution: Django - 2.2.22,3.1.10,3.2.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-45452</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it. <p>Publish Date: 2022-01-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-45452>CVE-2021-45452</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/jan/04/security-releases/">https://www.djangoproject.com/weblog/2022/jan/04/security-releases/</a></p> <p>Release Date: 2022-01-05</p> <p>Fix Resolution: 3.2.11</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-33203</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories. <p>Publish Date: 2021-06-08 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-33203>CVE-2021-33203</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>4.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://docs.djangoproject.com/en/3.2/releases/security/">https://docs.djangoproject.com/en/3.2/releases/security/</a></p> <p>Release Date: 2021-06-08</p> <p>Fix Resolution: Django - 2.2.24, 3.1.12, 3.2.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
Django-3.2-py3-none-any.whl: 16 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p></summary> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (Django version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-34265](https://www.mend.io/vulnerability-database/CVE-2022-34265) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | Django-3.2-py3-none-any.whl | Direct | Django - 3.2.14,4.0.6 | &#9989; | | [CVE-2022-28346](https://www.mend.io/vulnerability-database/CVE-2022-28346) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | Django-3.2-py3-none-any.whl | Direct | 3.2.13 | &#9989; | | [CVE-2022-28347](https://www.mend.io/vulnerability-database/CVE-2022-28347) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | Django-3.2-py3-none-any.whl | Direct | 3.2.13 | &#9989; | | [CVE-2021-35042](https://www.mend.io/vulnerability-database/CVE-2021-35042) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | Django-3.2-py3-none-any.whl | Direct | Django - 3.1.13,3.2.5 | &#9989; | | [CVE-2022-36359](https://www.mend.io/vulnerability-database/CVE-2022-36359) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | Django-3.2-py3-none-any.whl | Direct | Django -3.2.15,4.0.7,4.1 | &#9989; | | [CVE-2022-41323](https://www.mend.io/vulnerability-database/CVE-2022-41323) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | Django-3.2-py3-none-any.whl | Direct | 3.2.16 | &#9989; | | [CVE-2021-45115](https://www.mend.io/vulnerability-database/CVE-2021-45115) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | Django-3.2-py3-none-any.whl | Direct | 3.2.11 | &#9989; | | [CVE-2022-23833](https://www.mend.io/vulnerability-database/CVE-2022-23833) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.27,3.2.12,4.0.2 | &#9989; | | [CVE-2021-31542](https://www.mend.io/vulnerability-database/CVE-2021-31542) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.21,3.1.9,3.2.1 | &#9989; | | [CVE-2021-33571](https://www.mend.io/vulnerability-database/CVE-2021-33571) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.24, 3.1.12, 3.2.4 | &#9989; | | [CVE-2021-45116](https://www.mend.io/vulnerability-database/CVE-2021-45116) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | Django-3.2-py3-none-any.whl | Direct | 3.2.11 | &#9989; | | [CVE-2021-44420](https://www.mend.io/vulnerability-database/CVE-2021-44420) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.25,3.1.14,3.2.10 | &#9989; | | [CVE-2022-22818](https://www.mend.io/vulnerability-database/CVE-2022-22818) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.27,3.2.12,4.0.2 | &#9989; | | [CVE-2021-32052](https://www.mend.io/vulnerability-database/CVE-2021-32052) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.22,3.1.10,3.2.2 | &#9989; | | [CVE-2021-45452](https://www.mend.io/vulnerability-database/CVE-2021-45452) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | Django-3.2-py3-none-any.whl | Direct | 3.2.11 | &#9989; | | [CVE-2021-33203](https://www.mend.io/vulnerability-database/CVE-2021-33203) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.9 | Django-3.2-py3-none-any.whl | Direct | Django - 2.2.24, 3.1.12, 3.2.4 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-34265</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected. Mend Note: After conducting further research, Mend has determined that all versions of Django before version 3.2.14 and before 4.0.6 are vulnerable to CVE-2022-34265. <p>Publish Date: 2022-07-04 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-34265>CVE-2022-34265</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/jul/04/security-releases/">https://www.djangoproject.com/weblog/2022/jul/04/security-releases/</a></p> <p>Release Date: 2022-07-04</p> <p>Fix Resolution: Django - 3.2.14,4.0.6</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-28346</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs. <p>Publish Date: 2022-04-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-28346>CVE-2022-28346</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-04-12</p> <p>Fix Resolution: 3.2.13</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-28347</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name. <p>Publish Date: 2022-04-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-28347>CVE-2022-28347</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28347">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28347</a></p> <p>Release Date: 2022-04-12</p> <p>Fix Resolution: 3.2.13</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-35042</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application. <p>Publish Date: 2021-07-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-35042>CVE-2021-35042</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2021/jul/01/security-releases/">https://www.djangoproject.com/weblog/2021/jul/01/security-releases/</a></p> <p>Release Date: 2021-07-02</p> <p>Fix Resolution: Django - 3.1.13,3.2.5</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-36359</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input. <p>Publish Date: 2022-08-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-36359>CVE-2022-36359</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/aug/03/security-releases/">https://www.djangoproject.com/weblog/2022/aug/03/security-releases/</a></p> <p>Release Date: 2022-08-03</p> <p>Fix Resolution: Django -3.2.15,4.0.7,4.1</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-41323</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression. <p>Publish Date: 2022-10-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41323>CVE-2022-41323</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41323">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41323</a></p> <p>Release Date: 2022-10-16</p> <p>Fix Resolution: 3.2.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-45115</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack. <p>Publish Date: 2022-01-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-45115>CVE-2021-45115</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/jan/04/security-releases/">https://www.djangoproject.com/weblog/2022/jan/04/security-releases/</a></p> <p>Release Date: 2022-01-05</p> <p>Fix Resolution: 3.2.11</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-23833</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files. <p>Publish Date: 2022-02-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23833>CVE-2022-23833</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/feb/01/security-releases/">https://www.djangoproject.com/weblog/2022/feb/01/security-releases/</a></p> <p>Release Date: 2022-02-03</p> <p>Fix Resolution: Django - 2.2.27,3.2.12,4.0.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-31542</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names. <p>Publish Date: 2021-05-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-31542>CVE-2021-31542</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2021/may/04/security-releases/">https://www.djangoproject.com/weblog/2021/may/04/security-releases/</a></p> <p>Release Date: 2021-05-05</p> <p>Fix Resolution: Django - 2.2.21,3.1.9,3.2.1</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-33571</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) . <p>Publish Date: 2021-06-08 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-33571>CVE-2021-33571</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2021/jun/02/security-releases/">https://www.djangoproject.com/weblog/2021/jun/02/security-releases/</a></p> <p>Release Date: 2021-06-08</p> <p>Fix Resolution: Django - 2.2.24, 3.1.12, 3.2.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-45116</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key. <p>Publish Date: 2022-01-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-45116>CVE-2021-45116</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/jan/04/security-releases/">https://www.djangoproject.com/weblog/2022/jan/04/security-releases/</a></p> <p>Release Date: 2022-01-05</p> <p>Fix Resolution: 3.2.11</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-44420</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. <p>Publish Date: 2021-12-08 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-44420>CVE-2021-44420</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://docs.djangoproject.com/en/3.2/releases/security/">https://docs.djangoproject.com/en/3.2/releases/security/</a></p> <p>Release Date: 2021-12-08</p> <p>Fix Resolution: Django - 2.2.25,3.1.14,3.2.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-22818</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS. <p>Publish Date: 2022-02-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-22818>CVE-2022-22818</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/feb/01/security-releases/">https://www.djangoproject.com/weblog/2022/feb/01/security-releases/</a></p> <p>Release Date: 2022-02-03</p> <p>Fix Resolution: Django - 2.2.27,3.2.12,4.0.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-32052</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers. <p>Publish Date: 2021-05-06 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-32052>CVE-2021-32052</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32052">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32052</a></p> <p>Release Date: 2021-05-06</p> <p>Fix Resolution: Django - 2.2.22,3.1.10,3.2.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-45452</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it. <p>Publish Date: 2022-01-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-45452>CVE-2021-45452</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.djangoproject.com/weblog/2022/jan/04/security-releases/">https://www.djangoproject.com/weblog/2022/jan/04/security-releases/</a></p> <p>Release Date: 2022-01-05</p> <p>Fix Resolution: 3.2.11</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-33203</summary> ### Vulnerable Library - <b>Django-3.2-py3-none-any.whl</b></p> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl">https://files.pythonhosted.org/packages/a8/9b/fe94c509e514f6c227308e81076506eb9d67f2bfb8061ce5cdfbde0432e3/Django-3.2-py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt,/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-3.2-py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kferrara1313/da-react-challenge/commit/94731a295f5f68e636dfeade0140eb69a43e69a0">94731a295f5f68e636dfeade0140eb69a43e69a0</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories. <p>Publish Date: 2021-06-08 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-33203>CVE-2021-33203</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>4.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://docs.djangoproject.com/en/3.2/releases/security/">https://docs.djangoproject.com/en/3.2/releases/security/</a></p> <p>Release Date: 2021-06-08</p> <p>Fix Resolution: Django - 2.2.24, 3.1.12, 3.2.4</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_infrastructure
django none any whl vulnerabilities highest severity is vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt found in head commit a href vulnerabilities cve severity cvss dependency type fixed in django version remediation available critical django none any whl direct django critical django none any whl direct critical django none any whl direct critical django none any whl direct django high django none any whl direct django high django none any whl direct high django none any whl direct high django none any whl direct django high django none any whl direct django high django none any whl direct django high django none any whl direct high django none any whl direct django medium django none any whl direct django medium django none any whl direct django medium django none any whl direct medium django none any whl direct django details cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in django before and before the trunc and extract database functions are subject to sql injection if untrusted data is used as a kind lookup name value applications that constrain the lookup name and kind choice to a known safe list are unaffected mend note after conducting further research mend has determined that all versions of django before version and before are vulnerable to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution django rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in django before before and before queryset annotate aggregate and extra methods are subject to sql injection in column aliases via a crafted dictionary with dictionary expansion as the passed kwargs publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details a sql injection issue was discovered in queryset explain in django before before and before this occurs by passing a crafted dictionary with dictionary expansion as the options argument and placing the injection payload in an option name publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details django x before and x before allows queryset order by sql injection if order by is untrusted input from a client of a web application publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution django rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in the http fileresponse class in django before and before an application is vulnerable to a reflected file download rfd attack that sets the content disposition header of a fileresponse when the filename is derived from user supplied input publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution django rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details in django before before and before internationalized urls were subject to a potential denial of service attack via the locale parameter which is treated as a regular expression publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in django before before and before userattributesimilarityvalidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values in a situation where access to user registration was unrestricted this provided a potential vector for a denial of service attack publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in multipartparser in django before before and before passing certain inputs to multipart forms could result in an infinite loop when parsing files publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution django rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details in django before before and before multipartparser uploadedfile and fieldfile allowed directory traversal via uploaded files with suitably crafted file names publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution django rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details in django before x before and before urlvalidator validate address and validate address do not prohibit leading zero characters in octal literals this may allow a bypass of access control that is based on ip addresses validate address and validate address are unaffected with python publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution django rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in django before before and before due to leveraging the django template language s variable resolution logic the dictsort template filter was potentially vulnerable to information disclosure or an unintended method call if passed a suitably crafted key publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details in django before before and before http requests for urls with trailing newlines could bypass upstream access control based on url paths publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution django rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details the debug template tag in django before before and before does not properly encode the current context this may lead to xss publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution django rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details in django before before and before with python urlvalidator does not prohibit newlines and tabs unless the urlfield form field is used if an application uses values with newlines in an http response header injection can occur django itself is unaffected because httpresponse prohibits newlines in http headers publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution django rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details storage save in django before before and before allows directory traversal if crafted filenames are directly passed to it publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details django before x before and x before has a potential directory traversal via django contrib admindocs staff members could use the templatedetailview view to check the existence of arbitrary files additionally if and only if the default admindocs templates have been customized by application developers to also show file contents then not only the existence but also the file contents would have been exposed in other words there is directory traversal outside of the template root directories publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution django rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
0
307,176
9,414,250,969
IssuesEvent
2019-04-10 09:42:24
StrangeLoopGames/EcoIssues
https://api.github.com/repos/StrangeLoopGames/EcoIssues
closed
Add dependencies check on first start.
Medium Priority
Add dependencies check on first game start. All needed software installed, and available. To exclude this situation. Player install game from steam, installing .net is not succeed. Result - singleplayer silence not working, return to main menu after launch. Only after player try to launch server manually, they see error. ![v10yyiljvi4](https://user-images.githubusercontent.com/4980243/41507312-00399640-7239-11e8-9067-37a732eae582.jpg)
1.0
Add dependencies check on first start. - Add dependencies check on first game start. All needed software installed, and available. To exclude this situation. Player install game from steam, installing .net is not succeed. Result - singleplayer silence not working, return to main menu after launch. Only after player try to launch server manually, they see error. ![v10yyiljvi4](https://user-images.githubusercontent.com/4980243/41507312-00399640-7239-11e8-9067-37a732eae582.jpg)
non_infrastructure
add dependencies check on first start add dependencies check on first game start all needed software installed and available to exclude this situation player install game from steam installing net is not succeed result singleplayer silence not working return to main menu after launch only after player try to launch server manually they see error
0
19,584
3,227,243,090
IssuesEvent
2015-10-11 01:10:00
krashanoff/cleanrip
https://api.github.com/repos/krashanoff/cleanrip
closed
Error checking
auto-migrated Priority-Medium Type-Defect
``` 1.0.4 Would it be possible to add the option to do error checking? Since the DVD speed is more than half slower than most USB drives this shouldn't affect speed. Anyway this would be an option so users could turn it off. I had problems with a corrupt FAT32 drive, only got the second chunk and the program didn't tell me. ``` Original issue reported on code.google.com by `dominicp...@gmail.com` on 29 Sep 2010 at 2:04
1.0
Error checking - ``` 1.0.4 Would it be possible to add the option to do error checking? Since the DVD speed is more than half slower than most USB drives this shouldn't affect speed. Anyway this would be an option so users could turn it off. I had problems with a corrupt FAT32 drive, only got the second chunk and the program didn't tell me. ``` Original issue reported on code.google.com by `dominicp...@gmail.com` on 29 Sep 2010 at 2:04
non_infrastructure
error checking would it be possible to add the option to do error checking since the dvd speed is more than half slower than most usb drives this shouldn t affect speed anyway this would be an option so users could turn it off i had problems with a corrupt drive only got the second chunk and the program didn t tell me original issue reported on code google com by dominicp gmail com on sep at
0
7,444
6,961,838,903
IssuesEvent
2017-12-08 11:04:18
servicecatalog/oscm
https://api.github.com/repos/servicecatalog/oscm
closed
Remove exported projects from fb_tomee_maven branch
infrastructure
Remove projects which are exported to following repositories https://github.com/servicecatalog/oscm-interfaces https://github.com/servicecatalog/oscm-commons https://github.com/servicecatalog/oscm-app Check if unittests are also exported.
1.0
Remove exported projects from fb_tomee_maven branch - Remove projects which are exported to following repositories https://github.com/servicecatalog/oscm-interfaces https://github.com/servicecatalog/oscm-commons https://github.com/servicecatalog/oscm-app Check if unittests are also exported.
infrastructure
remove exported projects from fb tomee maven branch remove projects which are exported to following repositories check if unittests are also exported
1
28,048
22,783,006,371
IssuesEvent
2022-07-08 22:45:45
ProjectPythia/pythia-foundations
https://api.github.com/repos/ProjectPythia/pythia-foundations
opened
Foundations should be citable with a DOI
infrastructure
As I mused about over at https://github.com/ProjectPythiaCookbooks/projectpythiacookbooks.github.io/issues/15, the Foundations book should be citable with a DOI pointing to specific tagged versions of the book. Zenodo makes this pretty simple. We would need to create a tagged Release of the source repo. I think this would be a good summer goal, once we get a few of the outstanding content gaps resolved, such as #232 (work in progress in #248)
1.0
Foundations should be citable with a DOI - As I mused about over at https://github.com/ProjectPythiaCookbooks/projectpythiacookbooks.github.io/issues/15, the Foundations book should be citable with a DOI pointing to specific tagged versions of the book. Zenodo makes this pretty simple. We would need to create a tagged Release of the source repo. I think this would be a good summer goal, once we get a few of the outstanding content gaps resolved, such as #232 (work in progress in #248)
infrastructure
foundations should be citable with a doi as i mused about over at the foundations book should be citable with a doi pointing to specific tagged versions of the book zenodo makes this pretty simple we would need to create a tagged release of the source repo i think this would be a good summer goal once we get a few of the outstanding content gaps resolved such as work in progress in
1
343,106
10,325,343,564
IssuesEvent
2019-09-01 16:34:02
thonny/thonny
https://api.github.com/repos/thonny/thonny
closed
Investigate function call keyword argument completion
feature low priority
**[Original report](https://bitbucket.org/bitbucket-issue-migration\thonny-issues.zip/issue/300) by me.** ---------------------------------------- See https://github.com/srusskih/SublimeJEDI and https://github.com/davidhalter/jedi-vim
1.0
Investigate function call keyword argument completion - **[Original report](https://bitbucket.org/bitbucket-issue-migration\thonny-issues.zip/issue/300) by me.** ---------------------------------------- See https://github.com/srusskih/SublimeJEDI and https://github.com/davidhalter/jedi-vim
non_infrastructure
investigate function call keyword argument completion by me see and
0
19,175
13,198,902,050
IssuesEvent
2020-08-14 04:05:02
vuejs/vetur
https://api.github.com/repos/vuejs/vetur
closed
Clean up CI output
infrastructure
https://github.com/microsoft/vscode/blob/34dee12ff383689d9d5e62f6b263ed644e4df44d/src/vs/workbench/api/common/extHostTypes.ts#L1012-L1016 Need to validate that all symbols have a `name` ``` name must not be falsy: Error: name must not be falsy at Function.validate (/Users/pine/Code/mine/vetur/vetur/.vscode-test/vscode-1.47.3/Visual Studio Code.app/Contents/Resources/app/out/vs/workbench/services/extensions/node/extensionHostProcess.js:442:18) at new x (/Users/pine/Code/mine/vetur/vetur/.vscode-test/vscode-1.47.3/Visual Studio Code.app/Contents/Resources/app/out/vs/workbench/services/extensions/node/extensionHostProcess.js:441:950) at new x (/Users/pine/Code/mine/vetur/vetur/.vscode-test/vscode-1.47.3/Visual Studio Code.app/Contents/Resources/app/out/vs/workbench/services/extensions/node/extensionHostProcess.js:429:431) at asSymbolInformation (/Users/pine/Code/mine/vetur/vetur/node_modules/vscode-languageclient/lib/protocolConverter.js:449:22) at /Users/pine/Code/mine/vetur/vetur/node_modules/vscode-languageclient/lib/protocolConverter.js:429:42 at Array.map (<anonymous>) at Object.asSymbolInformations (/Users/pine/Code/mine/vetur/vetur/node_modules/vscode-languageclient/lib/protocolConverter.js:429:23) at /Users/pine/Code/mine/vetur/vetur/node_modules/vscode-languageclient/lib/client.js:1088:70 ``` This can be turned off with `update.mode: "none"` ``` [main 2020-08-13T05:31:48.191Z] update#setState checking for updates [main 2020-08-13T05:31:48.989Z] update#setState idle ``` Not sure what to do for this one. ``` stty: stdin isn't a terminal ``` Not sure what to do either. Just filter it out probably. ``` (node:6848) Electron: Loading non context-aware native modules in the renderer process is deprecated and will stop working at some point in the future, please see https://github.com/electron/electron/issues/18397 for more information ```
1.0
Clean up CI output - https://github.com/microsoft/vscode/blob/34dee12ff383689d9d5e62f6b263ed644e4df44d/src/vs/workbench/api/common/extHostTypes.ts#L1012-L1016 Need to validate that all symbols have a `name` ``` name must not be falsy: Error: name must not be falsy at Function.validate (/Users/pine/Code/mine/vetur/vetur/.vscode-test/vscode-1.47.3/Visual Studio Code.app/Contents/Resources/app/out/vs/workbench/services/extensions/node/extensionHostProcess.js:442:18) at new x (/Users/pine/Code/mine/vetur/vetur/.vscode-test/vscode-1.47.3/Visual Studio Code.app/Contents/Resources/app/out/vs/workbench/services/extensions/node/extensionHostProcess.js:441:950) at new x (/Users/pine/Code/mine/vetur/vetur/.vscode-test/vscode-1.47.3/Visual Studio Code.app/Contents/Resources/app/out/vs/workbench/services/extensions/node/extensionHostProcess.js:429:431) at asSymbolInformation (/Users/pine/Code/mine/vetur/vetur/node_modules/vscode-languageclient/lib/protocolConverter.js:449:22) at /Users/pine/Code/mine/vetur/vetur/node_modules/vscode-languageclient/lib/protocolConverter.js:429:42 at Array.map (<anonymous>) at Object.asSymbolInformations (/Users/pine/Code/mine/vetur/vetur/node_modules/vscode-languageclient/lib/protocolConverter.js:429:23) at /Users/pine/Code/mine/vetur/vetur/node_modules/vscode-languageclient/lib/client.js:1088:70 ``` This can be turned off with `update.mode: "none"` ``` [main 2020-08-13T05:31:48.191Z] update#setState checking for updates [main 2020-08-13T05:31:48.989Z] update#setState idle ``` Not sure what to do for this one. ``` stty: stdin isn't a terminal ``` Not sure what to do either. Just filter it out probably. ``` (node:6848) Electron: Loading non context-aware native modules in the renderer process is deprecated and will stop working at some point in the future, please see https://github.com/electron/electron/issues/18397 for more information ```
infrastructure
clean up ci output need to validate that all symbols have a name name must not be falsy error name must not be falsy at function validate users pine code mine vetur vetur vscode test vscode visual studio code app contents resources app out vs workbench services extensions node extensionhostprocess js at new x users pine code mine vetur vetur vscode test vscode visual studio code app contents resources app out vs workbench services extensions node extensionhostprocess js at new x users pine code mine vetur vetur vscode test vscode visual studio code app contents resources app out vs workbench services extensions node extensionhostprocess js at assymbolinformation users pine code mine vetur vetur node modules vscode languageclient lib protocolconverter js at users pine code mine vetur vetur node modules vscode languageclient lib protocolconverter js at array map at object assymbolinformations users pine code mine vetur vetur node modules vscode languageclient lib protocolconverter js at users pine code mine vetur vetur node modules vscode languageclient lib client js this can be turned off with update mode none update setstate checking for updates update setstate idle not sure what to do for this one stty stdin isn t a terminal not sure what to do either just filter it out probably node electron loading non context aware native modules in the renderer process is deprecated and will stop working at some point in the future please see for more information
1
5,420
5,641,613,846
IssuesEvent
2017-04-06 19:07:01
dotnet/roslyn
https://api.github.com/repos/dotnet/roslyn
closed
Tests are Hanging
Area-Infrastructure Flaky Test Urgency-Soon
There seems to be an intermittent problem with hanging vsi tests. As an example, see the logs saved in "\\mlangfs1\public\frsilb\logs\Jenkins Hang". These are from a debug and release build of https://github.com/dotnet/roslyn/pull/18454.
1.0
Tests are Hanging - There seems to be an intermittent problem with hanging vsi tests. As an example, see the logs saved in "\\mlangfs1\public\frsilb\logs\Jenkins Hang". These are from a debug and release build of https://github.com/dotnet/roslyn/pull/18454.
infrastructure
tests are hanging there seems to be an intermittent problem with hanging vsi tests as an example see the logs saved in public frsilb logs jenkins hang these are from a debug and release build of
1
20,119
13,673,186,408
IssuesEvent
2020-09-29 09:30:03
google/web-stories-wp
https://api.github.com/repos/google/web-stories-wp
opened
Package Reorganization
Pod: WP & Infra Type: Infrastructure Type: Task
## Task Description Our current repository structure has organically grown over the past year to a point where we have multiple different "packages" spread across different folders. Some of them are pretty self-contained and could be easily published standalone (e.g. all the Karma packages), others are a bit more intertwined with other packages. Some are used for build tooling, others for the WordPress integration or the actual editor. At the same time, they all share the same `package.json` file, making it difficult to know which packages actually use a certain dependency. Ideally, each package would have its own `package.json` file to declare its dependencies. While this can be achieved using [Lerna](https://lerna.js.org/) or [Yarn workspaces](https://yarnpkg.com/features/workspaces), my hope here is to eventually use [npm workspaces](https://github.com/npm/rfcs/blob/latest/accepted/0026-workspaces.md) using the upcoming npm v7 release, as it would not require new tooling or huge migration. Anyhow, to get there we need to first get our directory structure in shape to make working with our "packages" more straightforward. I propose making `/assets/src` the root for all our packages, containing the following directories: * `activation-notice` (unchanged) * `animation` (unchanged) * `commander` (moved from `/bin`) * `dashboard` (unchanged) * `date` (unchanged) * `edit-story` (unchanged) * `fonts` (**new**, split out from `/bin`) - contains `fonts.json` and the script to update it * `karma-fixture` (moved from `/karma/fixture`) * `karma-cuj-reporter` (moved from `/karma`) * `karma-puppeteer-client` (moved from `/karma`) * `migration` (moved from `edit-story/migration`) - used also by `dashboard` and CI, now also contains the LI script to run migrations * `karma-failed-tests-reporter` (moved from `/karma`) * `karma-puppeteer-launcher` (moved from `/karma`) * `story-embed-block` (unchanged) * `tracking` (unchanged)
1.0
Package Reorganization - ## Task Description Our current repository structure has organically grown over the past year to a point where we have multiple different "packages" spread across different folders. Some of them are pretty self-contained and could be easily published standalone (e.g. all the Karma packages), others are a bit more intertwined with other packages. Some are used for build tooling, others for the WordPress integration or the actual editor. At the same time, they all share the same `package.json` file, making it difficult to know which packages actually use a certain dependency. Ideally, each package would have its own `package.json` file to declare its dependencies. While this can be achieved using [Lerna](https://lerna.js.org/) or [Yarn workspaces](https://yarnpkg.com/features/workspaces), my hope here is to eventually use [npm workspaces](https://github.com/npm/rfcs/blob/latest/accepted/0026-workspaces.md) using the upcoming npm v7 release, as it would not require new tooling or huge migration. Anyhow, to get there we need to first get our directory structure in shape to make working with our "packages" more straightforward. I propose making `/assets/src` the root for all our packages, containing the following directories: * `activation-notice` (unchanged) * `animation` (unchanged) * `commander` (moved from `/bin`) * `dashboard` (unchanged) * `date` (unchanged) * `edit-story` (unchanged) * `fonts` (**new**, split out from `/bin`) - contains `fonts.json` and the script to update it * `karma-fixture` (moved from `/karma/fixture`) * `karma-cuj-reporter` (moved from `/karma`) * `karma-puppeteer-client` (moved from `/karma`) * `migration` (moved from `edit-story/migration`) - used also by `dashboard` and CI, now also contains the LI script to run migrations * `karma-failed-tests-reporter` (moved from `/karma`) * `karma-puppeteer-launcher` (moved from `/karma`) * `story-embed-block` (unchanged) * `tracking` (unchanged)
infrastructure
package reorganization task description our current repository structure has organically grown over the past year to a point where we have multiple different packages spread across different folders some of them are pretty self contained and could be easily published standalone e g all the karma packages others are a bit more intertwined with other packages some are used for build tooling others for the wordpress integration or the actual editor at the same time they all share the same package json file making it difficult to know which packages actually use a certain dependency ideally each package would have its own package json file to declare its dependencies while this can be achieved using or my hope here is to eventually use using the upcoming npm release as it would not require new tooling or huge migration anyhow to get there we need to first get our directory structure in shape to make working with our packages more straightforward i propose making assets src the root for all our packages containing the following directories activation notice unchanged animation unchanged commander moved from bin dashboard unchanged date unchanged edit story unchanged fonts new split out from bin contains fonts json and the script to update it karma fixture moved from karma fixture karma cuj reporter moved from karma karma puppeteer client moved from karma migration moved from edit story migration used also by dashboard and ci now also contains the li script to run migrations karma failed tests reporter moved from karma karma puppeteer launcher moved from karma story embed block unchanged tracking unchanged
1
25,721
4,424,912,298
IssuesEvent
2016-08-16 14:03:15
PowerDNS/pdns
https://api.github.com/repos/PowerDNS/pdns
closed
Boost context path and namespace changed in boost 1.61
defect rec
Reported by @IngoThierack in #4014 ``` checking for Boost headers version >= 1.35.0... /opt/lib/boost/1.61-4.8//include checking for Boost's header version... 1_61 checking for the flags needed to use pthreads... conftest.cpp: In function 'int main()': conftest.cpp:33:24: warning: null argument where non-null required (argument 1) [-Wnonnull] pthread_attr_init(0); pthread_cleanup_push(0, 0); ^ conftest.cpp:34:27: warning: null argument where non-null required (argument 1) [-Wnonnull] pthread_create(0,0,0,0); pthread_cleanup_pop(0); ^ conftest.cpp:34:27: warning: null argument where non-null required (argument 3) [-Wnonnull] conftest.cpp:32:34: warning: 'th' is used uninitialized in this function [-Wuninitialized] pthread_t th; pthread_join(th, 0); ^ -pthread checking for the toolset name used by Boost for g++... gcc48 -gcc checking whether Boost is new enough to use the context library...... yes checking boost/system/error_code.hpp usability... yes checking boost/system/error_code.hpp presence... yes checking for boost/system/error_code.hpp... yes checking for the Boost system library... yes sed: can't read conftest.o: No such file or directory checking boost/thread.hpp usability... yes checking boost/thread.hpp presence... yes checking for boost/thread.hpp... yes checking for the Boost thread library... (cached) yes configure: checking whether the Boost context library actually links... checking boost/context/fcontext.hpp usability... no checking boost/context/fcontext.hpp presence... no checking for boost/context/fcontext.hpp... no configure: error: cannot find boost/context/fcontext.hpp ``` Problem with boost 1.61 is, the structure of the files are changed :( the fcontext.hpp is now found under detail/ ``` /opt/lib/boost/1.61-4.8/include/boost/context [ingo@build-el7 context]$ find . . ./execution_context.hpp ./execution_context_v2_void.ipp ./preallocated.hpp ./stack_traits.hpp ./all.hpp ./protected_fixedsize_stack.hpp ./execution_context_v1.hpp ./flags.hpp ./pooled_fixedsize_stack.hpp ./fixedsize_stack.hpp ./stack_context.hpp ./segmented_stack.hpp ./execution_context_v2.hpp ./posix ./posix/protected_fixedsize_stack.hpp ./posix/segmented_stack.hpp ./detail ./detail/disable_overload.hpp ./detail/fcontext_sparc.hpp ./detail/fcontext_x86_64_win.hpp ./detail/fcontext_ppc.hpp ./detail/tuple.hpp ./detail/apply.hpp ./detail/exchange.hpp ./detail/index_sequence.hpp ./detail/exception.hpp ./detail/fcontext_i386.hpp ./detail/fcontext_mips.hpp ./detail/fcontext_i386_win.hpp ./detail/fcontext.hpp ./detail/fcontext_arm_win.hpp ./detail/invoke.hpp ./detail/fcontext_x86_64.hpp ./detail/fcontext_arm.hpp ./detail/fcontext_arm_mac.hpp ./detail/config.hpp ./windows ./windows/protected_fixedsize_stack.hpp ``` With the fix for #4014 (in #4052), we now fallback to the old System V ucontexts. But we should ensure we still use boost fcontexts with boost 1.61 onward.
1.0
Boost context path and namespace changed in boost 1.61 - Reported by @IngoThierack in #4014 ``` checking for Boost headers version >= 1.35.0... /opt/lib/boost/1.61-4.8//include checking for Boost's header version... 1_61 checking for the flags needed to use pthreads... conftest.cpp: In function 'int main()': conftest.cpp:33:24: warning: null argument where non-null required (argument 1) [-Wnonnull] pthread_attr_init(0); pthread_cleanup_push(0, 0); ^ conftest.cpp:34:27: warning: null argument where non-null required (argument 1) [-Wnonnull] pthread_create(0,0,0,0); pthread_cleanup_pop(0); ^ conftest.cpp:34:27: warning: null argument where non-null required (argument 3) [-Wnonnull] conftest.cpp:32:34: warning: 'th' is used uninitialized in this function [-Wuninitialized] pthread_t th; pthread_join(th, 0); ^ -pthread checking for the toolset name used by Boost for g++... gcc48 -gcc checking whether Boost is new enough to use the context library...... yes checking boost/system/error_code.hpp usability... yes checking boost/system/error_code.hpp presence... yes checking for boost/system/error_code.hpp... yes checking for the Boost system library... yes sed: can't read conftest.o: No such file or directory checking boost/thread.hpp usability... yes checking boost/thread.hpp presence... yes checking for boost/thread.hpp... yes checking for the Boost thread library... (cached) yes configure: checking whether the Boost context library actually links... checking boost/context/fcontext.hpp usability... no checking boost/context/fcontext.hpp presence... no checking for boost/context/fcontext.hpp... no configure: error: cannot find boost/context/fcontext.hpp ``` Problem with boost 1.61 is, the structure of the files are changed :( the fcontext.hpp is now found under detail/ ``` /opt/lib/boost/1.61-4.8/include/boost/context [ingo@build-el7 context]$ find . . ./execution_context.hpp ./execution_context_v2_void.ipp ./preallocated.hpp ./stack_traits.hpp ./all.hpp ./protected_fixedsize_stack.hpp ./execution_context_v1.hpp ./flags.hpp ./pooled_fixedsize_stack.hpp ./fixedsize_stack.hpp ./stack_context.hpp ./segmented_stack.hpp ./execution_context_v2.hpp ./posix ./posix/protected_fixedsize_stack.hpp ./posix/segmented_stack.hpp ./detail ./detail/disable_overload.hpp ./detail/fcontext_sparc.hpp ./detail/fcontext_x86_64_win.hpp ./detail/fcontext_ppc.hpp ./detail/tuple.hpp ./detail/apply.hpp ./detail/exchange.hpp ./detail/index_sequence.hpp ./detail/exception.hpp ./detail/fcontext_i386.hpp ./detail/fcontext_mips.hpp ./detail/fcontext_i386_win.hpp ./detail/fcontext.hpp ./detail/fcontext_arm_win.hpp ./detail/invoke.hpp ./detail/fcontext_x86_64.hpp ./detail/fcontext_arm.hpp ./detail/fcontext_arm_mac.hpp ./detail/config.hpp ./windows ./windows/protected_fixedsize_stack.hpp ``` With the fix for #4014 (in #4052), we now fallback to the old System V ucontexts. But we should ensure we still use boost fcontexts with boost 1.61 onward.
non_infrastructure
boost context path and namespace changed in boost reported by ingothierack in checking for boost headers version opt lib boost include checking for boost s header version checking for the flags needed to use pthreads conftest cpp in function int main conftest cpp warning null argument where non null required argument pthread attr init pthread cleanup push conftest cpp warning null argument where non null required argument pthread create pthread cleanup pop conftest cpp warning null argument where non null required argument conftest cpp warning th is used uninitialized in this function pthread t th pthread join th pthread checking for the toolset name used by boost for g gcc checking whether boost is new enough to use the context library yes checking boost system error code hpp usability yes checking boost system error code hpp presence yes checking for boost system error code hpp yes checking for the boost system library yes sed can t read conftest o no such file or directory checking boost thread hpp usability yes checking boost thread hpp presence yes checking for boost thread hpp yes checking for the boost thread library cached yes configure checking whether the boost context library actually links checking boost context fcontext hpp usability no checking boost context fcontext hpp presence no checking for boost context fcontext hpp no configure error cannot find boost context fcontext hpp problem with boost is the structure of the files are changed the fcontext hpp is now found under detail opt lib boost include boost context find execution context hpp execution context void ipp preallocated hpp stack traits hpp all hpp protected fixedsize stack hpp execution context hpp flags hpp pooled fixedsize stack hpp fixedsize stack hpp stack context hpp segmented stack hpp execution context hpp posix posix protected fixedsize stack hpp posix segmented stack hpp detail detail disable overload hpp detail fcontext sparc hpp detail fcontext win hpp detail fcontext ppc hpp detail tuple hpp detail apply hpp detail exchange hpp detail index sequence hpp detail exception hpp detail fcontext hpp detail fcontext mips hpp detail fcontext win hpp detail fcontext hpp detail fcontext arm win hpp detail invoke hpp detail fcontext hpp detail fcontext arm hpp detail fcontext arm mac hpp detail config hpp windows windows protected fixedsize stack hpp with the fix for in we now fallback to the old system v ucontexts but we should ensure we still use boost fcontexts with boost onward
0
96,511
10,934,396,431
IssuesEvent
2019-11-24 11:19:21
roundcube/roundcubemail
https://api.github.com/repos/roundcube/roundcubemail
closed
Wrong file ownerships after upgrade as root
C: Documentation C: Installer bug
When upgrading Roundcube as root via ``` wget https://github.com/roundcube/roundcubemail/releases/download/1.4.0/roundcubemail-1.4.0-complete.tar.gz tar xf roundcubemail-1.4.0-complete.tar.gz ./roundcubemail-1.4.0/bin/installto.sh DESTDIR ``` the installed files have the ownership pair `501:80`, which is probably always invalid. Please either set the ownership after the upgrade of all files in DESTDIR (e.g. to the owner of DESTDIR/index.php prior the upgrade) or print a warning at the end of the upgrade script, that the administrator might need to fix them.
1.0
Wrong file ownerships after upgrade as root - When upgrading Roundcube as root via ``` wget https://github.com/roundcube/roundcubemail/releases/download/1.4.0/roundcubemail-1.4.0-complete.tar.gz tar xf roundcubemail-1.4.0-complete.tar.gz ./roundcubemail-1.4.0/bin/installto.sh DESTDIR ``` the installed files have the ownership pair `501:80`, which is probably always invalid. Please either set the ownership after the upgrade of all files in DESTDIR (e.g. to the owner of DESTDIR/index.php prior the upgrade) or print a warning at the end of the upgrade script, that the administrator might need to fix them.
non_infrastructure
wrong file ownerships after upgrade as root when upgrading roundcube as root via wget tar xf roundcubemail complete tar gz roundcubemail bin installto sh destdir the installed files have the ownership pair which is probably always invalid please either set the ownership after the upgrade of all files in destdir e g to the owner of destdir index php prior the upgrade or print a warning at the end of the upgrade script that the administrator might need to fix them
0
27,224
21,477,294,143
IssuesEvent
2022-04-26 14:38:23
OpenEnergyPlatform/ontology
https://api.github.com/repos/OpenEnergyPlatform/ontology
opened
Locating term-tracker for imported modules
external ontology organisation To do ontology infrastructure
## Description of the issue `term tracker items` added in PR #1086 (all related to imported ontologies) are located in the `oeo.omn`-file and not in the defining ontology. As these are the only ones located there, this grew my suspicion. How does the general policy concerning `term tracker items` and imported ontologies look like? Have there been any similar situations in the past?
1.0
Locating term-tracker for imported modules - ## Description of the issue `term tracker items` added in PR #1086 (all related to imported ontologies) are located in the `oeo.omn`-file and not in the defining ontology. As these are the only ones located there, this grew my suspicion. How does the general policy concerning `term tracker items` and imported ontologies look like? Have there been any similar situations in the past?
infrastructure
locating term tracker for imported modules description of the issue term tracker items added in pr all related to imported ontologies are located in the oeo omn file and not in the defining ontology as these are the only ones located there this grew my suspicion how does the general policy concerning term tracker items and imported ontologies look like have there been any similar situations in the past
1
801
2,915,634,473
IssuesEvent
2015-06-23 13:36:53
deconst/deconst-docs
https://api.github.com/repos/deconst/deconst-docs
opened
Shipping checklist for systemd infra overhaul
infrastructure
The infrastructure overhaul in deconst/deploy#38 will take some care to :shipit:. Running Ansible on the existing hosts won't work because: * It changes the names of server groups and load balancers because it implements #99 along the way. * I've fiddled with the names of the systemd units that we're creating and managing, which means that we'd end up with both the old and new ones colliding unless I did a lot of tedious, error-prone, manual clean-up work. Instead, I'm going to ship this in true immutable-infrastructure fashion, by spinning up brand-new hosts with the fancy new configuration and :hocho: the old ones. Here's the checklist: - [ ] Update the drc production playbook repository. Modify its `credentials.yml` to include the new keys. Stash the new version of `credentials.yml` in the usual place. - [ ] Run the new playbook on the production account. This will launch a brand-new cluster and new load balancer set. - [ ] Edit `/etc/hosts` and poke around the new cluster to ensure that everything is present and accounted for. - [ ] Make a note of the nodes on the new balancers. Delete the new balancers. Edit the names of the existing balancers to match the new pattern. - [ ] Manually add nodes to the existing balancers to direct traffic to the new cluster. Drain connections from the old nodes, then delete them. - [ ] Delete the old cluster. - [ ] Give the playbook a final run to be sure that it's working as expected.
1.0
Shipping checklist for systemd infra overhaul - The infrastructure overhaul in deconst/deploy#38 will take some care to :shipit:. Running Ansible on the existing hosts won't work because: * It changes the names of server groups and load balancers because it implements #99 along the way. * I've fiddled with the names of the systemd units that we're creating and managing, which means that we'd end up with both the old and new ones colliding unless I did a lot of tedious, error-prone, manual clean-up work. Instead, I'm going to ship this in true immutable-infrastructure fashion, by spinning up brand-new hosts with the fancy new configuration and :hocho: the old ones. Here's the checklist: - [ ] Update the drc production playbook repository. Modify its `credentials.yml` to include the new keys. Stash the new version of `credentials.yml` in the usual place. - [ ] Run the new playbook on the production account. This will launch a brand-new cluster and new load balancer set. - [ ] Edit `/etc/hosts` and poke around the new cluster to ensure that everything is present and accounted for. - [ ] Make a note of the nodes on the new balancers. Delete the new balancers. Edit the names of the existing balancers to match the new pattern. - [ ] Manually add nodes to the existing balancers to direct traffic to the new cluster. Drain connections from the old nodes, then delete them. - [ ] Delete the old cluster. - [ ] Give the playbook a final run to be sure that it's working as expected.
infrastructure
shipping checklist for systemd infra overhaul the infrastructure overhaul in deconst deploy will take some care to shipit running ansible on the existing hosts won t work because it changes the names of server groups and load balancers because it implements along the way i ve fiddled with the names of the systemd units that we re creating and managing which means that we d end up with both the old and new ones colliding unless i did a lot of tedious error prone manual clean up work instead i m going to ship this in true immutable infrastructure fashion by spinning up brand new hosts with the fancy new configuration and hocho the old ones here s the checklist update the drc production playbook repository modify its credentials yml to include the new keys stash the new version of credentials yml in the usual place run the new playbook on the production account this will launch a brand new cluster and new load balancer set edit etc hosts and poke around the new cluster to ensure that everything is present and accounted for make a note of the nodes on the new balancers delete the new balancers edit the names of the existing balancers to match the new pattern manually add nodes to the existing balancers to direct traffic to the new cluster drain connections from the old nodes then delete them delete the old cluster give the playbook a final run to be sure that it s working as expected
1
179,234
13,852,063,504
IssuesEvent
2020-10-15 05:42:16
microsoft/AzureStorageExplorer
https://api.github.com/repos/microsoft/AzureStorageExplorer
closed
The layout of the descriptions in the 'Sign In' dialog is unsightly when using device code flow sign-in
:beetle: regression 🧪 testing
**Storage Explorer Version:** 1.16.0-dev **Build**: 20201012.5 **Branch**: main **Platform/OS:** Windows 10/ MacOS Catalina **Architecture**: ia32/x64 **Regression From:** Previous release (1.15.1) **Steps to reproduce:** 1. Launch Storage Explorer -> Open 'Settings -> Application' -> Enable the setting 'Use device code flow sign-in'. 2. Open connect dialog -> Click 'Next' -> Check the popped dialog. **Expect Experience:** The layout of the descriptions in the dialog is normal. ![image](https://user-images.githubusercontent.com/41351993/95835994-7f1cee00-0d71-11eb-98cb-56c0f9c43bda.png) **Actual Experience:** The layout of the descriptions in the dialog is unsightly. ![image](https://user-images.githubusercontent.com/41351993/95835974-7a583a00-0d71-11eb-9dbf-9c7394172efc.png)
1.0
The layout of the descriptions in the 'Sign In' dialog is unsightly when using device code flow sign-in - **Storage Explorer Version:** 1.16.0-dev **Build**: 20201012.5 **Branch**: main **Platform/OS:** Windows 10/ MacOS Catalina **Architecture**: ia32/x64 **Regression From:** Previous release (1.15.1) **Steps to reproduce:** 1. Launch Storage Explorer -> Open 'Settings -> Application' -> Enable the setting 'Use device code flow sign-in'. 2. Open connect dialog -> Click 'Next' -> Check the popped dialog. **Expect Experience:** The layout of the descriptions in the dialog is normal. ![image](https://user-images.githubusercontent.com/41351993/95835994-7f1cee00-0d71-11eb-98cb-56c0f9c43bda.png) **Actual Experience:** The layout of the descriptions in the dialog is unsightly. ![image](https://user-images.githubusercontent.com/41351993/95835974-7a583a00-0d71-11eb-9dbf-9c7394172efc.png)
non_infrastructure
the layout of the descriptions in the sign in dialog is unsightly when using device code flow sign in storage explorer version dev build branch main platform os windows macos catalina architecture regression from previous release steps to reproduce launch storage explorer open settings application enable the setting use device code flow sign in open connect dialog click next check the popped dialog expect experience the layout of the descriptions in the dialog is normal actual experience the layout of the descriptions in the dialog is unsightly
0
162,049
20,164,363,796
IssuesEvent
2022-02-10 01:45:43
kapseliboi/dapp
https://api.github.com/repos/kapseliboi/dapp
opened
CVE-2021-27290 (High) detected in ssri-7.1.0.tgz, ssri-6.0.1.tgz
security vulnerability
## CVE-2021-27290 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ssri-7.1.0.tgz</b>, <b>ssri-6.0.1.tgz</b></p></summary> <p> <details><summary><b>ssri-7.1.0.tgz</b></p></summary> <p>Standard Subresource Integrity library -- parses, serializes, generates, and verifies integrity metadata according to the SRI spec.</p> <p>Library home page: <a href="https://registry.npmjs.org/ssri/-/ssri-7.1.0.tgz">https://registry.npmjs.org/ssri/-/ssri-7.1.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/ssri/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.2.tgz (Root Library) - terser-webpack-plugin-2.3.5.tgz - cacache-13.0.1.tgz - :x: **ssri-7.1.0.tgz** (Vulnerable Library) </details> <details><summary><b>ssri-6.0.1.tgz</b></p></summary> <p>Standard Subresource Integrity library -- parses, serializes, generates, and verifies integrity metadata according to the SRI spec.</p> <p>Library home page: <a href="https://registry.npmjs.org/ssri/-/ssri-6.0.1.tgz">https://registry.npmjs.org/ssri/-/ssri-6.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/webpack/node_modules/ssri/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.2.tgz (Root Library) - webpack-4.42.0.tgz - terser-webpack-plugin-1.4.4.tgz - cacache-12.0.4.tgz - :x: **ssri-6.0.1.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option. <p>Publish Date: 2021-03-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-27290>CVE-2021-27290</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-vx3p-948g-6vhq">https://github.com/advisories/GHSA-vx3p-948g-6vhq</a></p> <p>Release Date: 2021-03-12</p> <p>Fix Resolution: ssri - 6.0.2,7.1.1,8.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-27290 (High) detected in ssri-7.1.0.tgz, ssri-6.0.1.tgz - ## CVE-2021-27290 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ssri-7.1.0.tgz</b>, <b>ssri-6.0.1.tgz</b></p></summary> <p> <details><summary><b>ssri-7.1.0.tgz</b></p></summary> <p>Standard Subresource Integrity library -- parses, serializes, generates, and verifies integrity metadata according to the SRI spec.</p> <p>Library home page: <a href="https://registry.npmjs.org/ssri/-/ssri-7.1.0.tgz">https://registry.npmjs.org/ssri/-/ssri-7.1.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/ssri/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.2.tgz (Root Library) - terser-webpack-plugin-2.3.5.tgz - cacache-13.0.1.tgz - :x: **ssri-7.1.0.tgz** (Vulnerable Library) </details> <details><summary><b>ssri-6.0.1.tgz</b></p></summary> <p>Standard Subresource Integrity library -- parses, serializes, generates, and verifies integrity metadata according to the SRI spec.</p> <p>Library home page: <a href="https://registry.npmjs.org/ssri/-/ssri-6.0.1.tgz">https://registry.npmjs.org/ssri/-/ssri-6.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/webpack/node_modules/ssri/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.2.tgz (Root Library) - webpack-4.42.0.tgz - terser-webpack-plugin-1.4.4.tgz - cacache-12.0.4.tgz - :x: **ssri-6.0.1.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option. <p>Publish Date: 2021-03-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-27290>CVE-2021-27290</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-vx3p-948g-6vhq">https://github.com/advisories/GHSA-vx3p-948g-6vhq</a></p> <p>Release Date: 2021-03-12</p> <p>Fix Resolution: ssri - 6.0.2,7.1.1,8.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_infrastructure
cve high detected in ssri tgz ssri tgz cve high severity vulnerability vulnerable libraries ssri tgz ssri tgz ssri tgz standard subresource integrity library parses serializes generates and verifies integrity metadata according to the sri spec library home page a href path to dependency file package json path to vulnerable library node modules ssri package json dependency hierarchy react scripts tgz root library terser webpack plugin tgz cacache tgz x ssri tgz vulnerable library ssri tgz standard subresource integrity library parses serializes generates and verifies integrity metadata according to the sri spec library home page a href path to dependency file package json path to vulnerable library node modules webpack node modules ssri package json dependency hierarchy react scripts tgz root library webpack tgz terser webpack plugin tgz cacache tgz x ssri tgz vulnerable library found in base branch master vulnerability details ssri fixed in processes sris using a regular expression which is vulnerable to a denial of service malicious sris could take an extremely long time to process leading to denial of service this issue only affects consumers using the strict option publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ssri step up your open source security game with whitesource
0
159,681
25,031,477,935
IssuesEvent
2022-11-04 12:46:19
webaverse/app
https://api.github.com/repos/webaverse/app
closed
Art: Title Deeds
design
A special type of Card is the Title Deed, which grants the right to use (and restrict access to) real estate on The Street. ![image](https://user-images.githubusercontent.com/32600939/125172401-8699e800-e187-11eb-9851-9d139b592354.png) The information it might display include: * Season / Zone at the top * Title name * Transaction date * Hash string * Certified to ___ * Description * Signed by ___ on [date] * Signature * Stamp seal (QR code) Example title deed from meatspace: Old ![image](https://user-images.githubusercontent.com/32600939/125172592-86e6b300-e188-11eb-92f6-34d541f7da86.png) New ![image](https://user-images.githubusercontent.com/32600939/125172700-27d56e00-e189-11eb-843d-3fb0f9797199.png) https://www.govtech.com/biz/heres-what-a-blockchain-property-deed-looks-like.html
1.0
Art: Title Deeds - A special type of Card is the Title Deed, which grants the right to use (and restrict access to) real estate on The Street. ![image](https://user-images.githubusercontent.com/32600939/125172401-8699e800-e187-11eb-9851-9d139b592354.png) The information it might display include: * Season / Zone at the top * Title name * Transaction date * Hash string * Certified to ___ * Description * Signed by ___ on [date] * Signature * Stamp seal (QR code) Example title deed from meatspace: Old ![image](https://user-images.githubusercontent.com/32600939/125172592-86e6b300-e188-11eb-92f6-34d541f7da86.png) New ![image](https://user-images.githubusercontent.com/32600939/125172700-27d56e00-e189-11eb-843d-3fb0f9797199.png) https://www.govtech.com/biz/heres-what-a-blockchain-property-deed-looks-like.html
non_infrastructure
art title deeds a special type of card is the title deed which grants the right to use and restrict access to real estate on the street the information it might display include season zone at the top title name transaction date hash string certified to description signed by on signature stamp seal qr code example title deed from meatspace old new
0
28,030
22,773,601,863
IssuesEvent
2022-07-08 12:29:02
airyhq/airy
https://api.github.com/repos/airyhq/airy
closed
Create endpoints to install components
infrastructure
Create an endpoint that receives a request to install a component and then the controller would deploy the appropriate helm chart for it
1.0
Create endpoints to install components - Create an endpoint that receives a request to install a component and then the controller would deploy the appropriate helm chart for it
infrastructure
create endpoints to install components create an endpoint that receives a request to install a component and then the controller would deploy the appropriate helm chart for it
1
290,897
8,909,438,671
IssuesEvent
2019-01-18 06:17:04
artemii235/SuperNET
https://api.github.com/repos/artemii235/SuperNET
opened
Remove the hardcoded wait timeout in swaps.
High priority bug
Calculate it properly depending on coins used. E.G. it should be higher for BTC due to high blocktime. Current 1000 seconds timeout is not usable in many cases.
1.0
Remove the hardcoded wait timeout in swaps. - Calculate it properly depending on coins used. E.G. it should be higher for BTC due to high blocktime. Current 1000 seconds timeout is not usable in many cases.
non_infrastructure
remove the hardcoded wait timeout in swaps calculate it properly depending on coins used e g it should be higher for btc due to high blocktime current seconds timeout is not usable in many cases
0
253,547
19,122,949,085
IssuesEvent
2021-12-01 01:56:47
Encapsule/arcccore
https://api.github.com/repos/Encapsule/arcccore
closed
arccore.disciminator should allow override of ID, name, and description
enhancement documentation test discriminator
... so it's even remotely feasible to differentiate between different discriminator filter instances at runtime under the debugger without having to compare the associated target filter arrays.
1.0
arccore.disciminator should allow override of ID, name, and description - ... so it's even remotely feasible to differentiate between different discriminator filter instances at runtime under the debugger without having to compare the associated target filter arrays.
non_infrastructure
arccore disciminator should allow override of id name and description so it s even remotely feasible to differentiate between different discriminator filter instances at runtime under the debugger without having to compare the associated target filter arrays
0
635,991
20,516,812,337
IssuesEvent
2022-03-01 12:39:39
kytos-ng/topology
https://api.github.com/repos/kytos-ng/topology
opened
PortMod should be sent when an interface is disabled or enabled
enhancement priority_major
Currently, when an interface is disabled even tough the `enabled` state will be set as false, a `PortMod` OpenFlow message isn't being sent, as a result it's possible to have an interface `enabled: False`, and `active: True`, since it won't actually administratively disable the interface on the switch. When implementing this feature, the `PortConfig` config should correctly use the `OFPPC_PORT_DOWN` flag, and the advertise capability shouldn't be impacted. This also should be tested with NoviFlow switches to make sure it'll work as intended and no side effect is observed, simulating a disable/enable should bring up a link correctly. Also, an end-to-end test should be added to make sure we have it covered for OvS OF 1.3. An existing workaround, even though it won't send the actual `PortMod` message, but if an operator were also to shut down via another management plane that would have an equivalent effect, but it's not that practical to keep doing this.
1.0
PortMod should be sent when an interface is disabled or enabled - Currently, when an interface is disabled even tough the `enabled` state will be set as false, a `PortMod` OpenFlow message isn't being sent, as a result it's possible to have an interface `enabled: False`, and `active: True`, since it won't actually administratively disable the interface on the switch. When implementing this feature, the `PortConfig` config should correctly use the `OFPPC_PORT_DOWN` flag, and the advertise capability shouldn't be impacted. This also should be tested with NoviFlow switches to make sure it'll work as intended and no side effect is observed, simulating a disable/enable should bring up a link correctly. Also, an end-to-end test should be added to make sure we have it covered for OvS OF 1.3. An existing workaround, even though it won't send the actual `PortMod` message, but if an operator were also to shut down via another management plane that would have an equivalent effect, but it's not that practical to keep doing this.
non_infrastructure
portmod should be sent when an interface is disabled or enabled currently when an interface is disabled even tough the enabled state will be set as false a portmod openflow message isn t being sent as a result it s possible to have an interface enabled false and active true since it won t actually administratively disable the interface on the switch when implementing this feature the portconfig config should correctly use the ofppc port down flag and the advertise capability shouldn t be impacted this also should be tested with noviflow switches to make sure it ll work as intended and no side effect is observed simulating a disable enable should bring up a link correctly also an end to end test should be added to make sure we have it covered for ovs of an existing workaround even though it won t send the actual portmod message but if an operator were also to shut down via another management plane that would have an equivalent effect but it s not that practical to keep doing this
0
233,516
17,868,202,384
IssuesEvent
2021-09-06 12:11:36
reactor/reactor-core
https://api.github.com/repos/reactor/reactor-core
closed
errorContinue javadoc sometimes badly placed within `@TAGS` section
type/documentation
Since #2333, the onDiscard support and onErrorContinue support tags have been turned into plain paragraphs. Unfortunately, some of the old tags were not placed at the beginning of the tags section, and the search-and-replacement has left these as paragraphs inside the block tag section. These paragraphs are still visible in the javadoc, but are randomly appended to whichever tag is above the paragraph, which interrupts the tag block (params, return clause, etc...) Example: https://projectreactor.io/docs/core/3.4.9/api/reactor/core/publisher/Flux.html#filter-java.util.function.Predicate- These occurrences should be hunted down and fixed by just moving the paragraphs one line above the first javadoc block tag.
1.0
errorContinue javadoc sometimes badly placed within `@TAGS` section - Since #2333, the onDiscard support and onErrorContinue support tags have been turned into plain paragraphs. Unfortunately, some of the old tags were not placed at the beginning of the tags section, and the search-and-replacement has left these as paragraphs inside the block tag section. These paragraphs are still visible in the javadoc, but are randomly appended to whichever tag is above the paragraph, which interrupts the tag block (params, return clause, etc...) Example: https://projectreactor.io/docs/core/3.4.9/api/reactor/core/publisher/Flux.html#filter-java.util.function.Predicate- These occurrences should be hunted down and fixed by just moving the paragraphs one line above the first javadoc block tag.
non_infrastructure
errorcontinue javadoc sometimes badly placed within tags section since the ondiscard support and onerrorcontinue support tags have been turned into plain paragraphs unfortunately some of the old tags were not placed at the beginning of the tags section and the search and replacement has left these as paragraphs inside the block tag section these paragraphs are still visible in the javadoc but are randomly appended to whichever tag is above the paragraph which interrupts the tag block params return clause etc example these occurrences should be hunted down and fixed by just moving the paragraphs one line above the first javadoc block tag
0
99,026
11,103,419,997
IssuesEvent
2019-12-17 03:47:00
pytorch/fairseq
https://api.github.com/repos/pytorch/fairseq
closed
Please correct the minimum required Python version
documentation
The main [README file](https://github.com/pytorch/fairseq/blob/50cf3bb596abba70a0770ad2308fed0f4d32a002/README.md#requirements-and-installation) of this repo claims the minimum required Python version is 3.5, but the code occasionally uses a trailing comma at the end of a function's argument list and that's a syntax feature that was [only introduced in Python 3.6](https://bugs.python.org/issue9232). Here is an example: https://github.com/pytorch/fairseq/blob/50cf3bb596abba70a0770ad2308fed0f4d32a002/fairseq/models/transformer.py#L257 Therefore, the code currently does not run under Python 3.5. Please either update the README file to set the minimum required Python version to 3.6 or modify the code to remove all syntax that is incompatible with Python 3.5.
1.0
Please correct the minimum required Python version - The main [README file](https://github.com/pytorch/fairseq/blob/50cf3bb596abba70a0770ad2308fed0f4d32a002/README.md#requirements-and-installation) of this repo claims the minimum required Python version is 3.5, but the code occasionally uses a trailing comma at the end of a function's argument list and that's a syntax feature that was [only introduced in Python 3.6](https://bugs.python.org/issue9232). Here is an example: https://github.com/pytorch/fairseq/blob/50cf3bb596abba70a0770ad2308fed0f4d32a002/fairseq/models/transformer.py#L257 Therefore, the code currently does not run under Python 3.5. Please either update the README file to set the minimum required Python version to 3.6 or modify the code to remove all syntax that is incompatible with Python 3.5.
non_infrastructure
please correct the minimum required python version the main of this repo claims the minimum required python version is but the code occasionally uses a trailing comma at the end of a function s argument list and that s a syntax feature that was here is an example therefore the code currently does not run under python please either update the readme file to set the minimum required python version to or modify the code to remove all syntax that is incompatible with python
0
4,716
2,610,143,801
IssuesEvent
2015-02-26 18:45:19
chrsmith/hedgewars
https://api.github.com/repos/chrsmith/hedgewars
closed
bad team name filtering while editing
auto-migrated Priority-Low Type-Defect
``` i try to set team name which contains special characters. the ones that are not allowed in windows's file names make team disappear from the list when saved. no warnings are raised. team name effect ------------------------------------------------------ \team saves as "team". seems to be ok .\team saves as "team" also ..\team disappears /team disappears :team disappears also tried to create team wich has forbidden file name "con" (upper\lower case) and it does disappear too run on xpsp3 x86. regards ``` ----- Original issue reported on code.google.com by `push....@gmail.com` on 4 Jan 2011 at 6:34 * Blocking: #189
1.0
bad team name filtering while editing - ``` i try to set team name which contains special characters. the ones that are not allowed in windows's file names make team disappear from the list when saved. no warnings are raised. team name effect ------------------------------------------------------ \team saves as "team". seems to be ok .\team saves as "team" also ..\team disappears /team disappears :team disappears also tried to create team wich has forbidden file name "con" (upper\lower case) and it does disappear too run on xpsp3 x86. regards ``` ----- Original issue reported on code.google.com by `push....@gmail.com` on 4 Jan 2011 at 6:34 * Blocking: #189
non_infrastructure
bad team name filtering while editing i try to set team name which contains special characters the ones that are not allowed in windows s file names make team disappear from the list when saved no warnings are raised team name effect team saves as team seems to be ok team saves as team also team disappears team disappears team disappears also tried to create team wich has forbidden file name con upper lower case and it does disappear too run on regards original issue reported on code google com by push gmail com on jan at blocking
0
35,507
31,770,011,955
IssuesEvent
2023-09-12 11:10:07
Tonomy-Foundation/Tonomy-ID-Management
https://api.github.com/repos/Tonomy-Foundation/Tonomy-ID-Management
opened
Telos UK onboarding - learn their tech stack
infrastructure
Acceptance criteria - [ ] read the wiki http://wiki.advantapro.com/index.php?title=Main_Page - [ ] go through source repositories: - [ ] https://gitlab.com/advantaproductions/telos-configs - [ ] https://gitlab.com/advantaproductions/ansible - [ ] https://github.com/varilink/telos-eosio - [ ] Get access to communication groups, introduce yourself - [ ] get access to Hetzner (IaaS) https://robot.hetzner.com/server https://www.notion.so/tonomy-foundation/Telos-UK-fcbba33dbecc4b949203f124b32c7a4c
1.0
Telos UK onboarding - learn their tech stack - Acceptance criteria - [ ] read the wiki http://wiki.advantapro.com/index.php?title=Main_Page - [ ] go through source repositories: - [ ] https://gitlab.com/advantaproductions/telos-configs - [ ] https://gitlab.com/advantaproductions/ansible - [ ] https://github.com/varilink/telos-eosio - [ ] Get access to communication groups, introduce yourself - [ ] get access to Hetzner (IaaS) https://robot.hetzner.com/server https://www.notion.so/tonomy-foundation/Telos-UK-fcbba33dbecc4b949203f124b32c7a4c
infrastructure
telos uk onboarding learn their tech stack acceptance criteria read the wiki go through source repositories get access to communication groups introduce yourself get access to hetzner iaas
1
31,047
25,293,239,522
IssuesEvent
2022-11-17 03:11:56
alan-turing-institute/the-turing-way
https://api.github.com/repos/alan-turing-institute/the-turing-way
opened
Proposal: delete `figure_list.md`
idea-for-discussion infrastructure
https://github.com/alan-turing-institute/the-turing-way/blob/main/book/website/figures/_figure-list.md --- - When the book started, it had [17 different figures](https://github.com/alan-turing-institute/the-turing-way/blob/840067db4839e59019183f84853a2fa4efca2413/website/_site/assets/figures/figure_list.md). As of today, it has [roughly 200](https://github.com/alan-turing-institute/the-turing-way/tree/main/book/website/figures). - Despite [guidance indicating that all figures should be added to `figure_list.md`](https://the-turing-way.netlify.app/community-handbook/style/style-figures.html#image-type-file-name-size-and-location), that file is only [infrequently updated](https://github.com/alan-turing-institute/the-turing-way/commits/main/book/website/figures/_figure-list.md). - It is currently [not listed in the TOC](https://github.com/alan-turing-institute/the-turing-way/issues/2611). I argue that instead of updating it, we remove it, since I am not convinced of its utility.
1.0
Proposal: delete `figure_list.md` - https://github.com/alan-turing-institute/the-turing-way/blob/main/book/website/figures/_figure-list.md --- - When the book started, it had [17 different figures](https://github.com/alan-turing-institute/the-turing-way/blob/840067db4839e59019183f84853a2fa4efca2413/website/_site/assets/figures/figure_list.md). As of today, it has [roughly 200](https://github.com/alan-turing-institute/the-turing-way/tree/main/book/website/figures). - Despite [guidance indicating that all figures should be added to `figure_list.md`](https://the-turing-way.netlify.app/community-handbook/style/style-figures.html#image-type-file-name-size-and-location), that file is only [infrequently updated](https://github.com/alan-turing-institute/the-turing-way/commits/main/book/website/figures/_figure-list.md). - It is currently [not listed in the TOC](https://github.com/alan-turing-institute/the-turing-way/issues/2611). I argue that instead of updating it, we remove it, since I am not convinced of its utility.
infrastructure
proposal delete figure list md when the book started it had as of today it has despite that file is only it is currently i argue that instead of updating it we remove it since i am not convinced of its utility
1
717,811
24,692,062,106
IssuesEvent
2022-10-19 09:16:18
frequenz-floss/frequenz-sdk-python
https://api.github.com/repos/frequenz-floss/frequenz-sdk-python
opened
Fix typing for Actor's `join()` method
priority:low type:bug part:actor
### What happened? When calling the `join()` method of an actor (or `_stop()` or probably any method defined by the `@actor` decorator) we get an error from `mypy` complaining about the method not existing in the actor class, for example: ``` test.py:10: error: "SampleActor" has no attribute "join" ``` ### What did you expect instead? No errors when calling the method. ### Affected version(s) All ### Affected part(s) I don't know (part:❓) ### Extra information The `typing_extensions` package (#19), in particular the `@dataclass_transform()` decorator, might help with this, it needs further investigation.
1.0
Fix typing for Actor's `join()` method - ### What happened? When calling the `join()` method of an actor (or `_stop()` or probably any method defined by the `@actor` decorator) we get an error from `mypy` complaining about the method not existing in the actor class, for example: ``` test.py:10: error: "SampleActor" has no attribute "join" ``` ### What did you expect instead? No errors when calling the method. ### Affected version(s) All ### Affected part(s) I don't know (part:❓) ### Extra information The `typing_extensions` package (#19), in particular the `@dataclass_transform()` decorator, might help with this, it needs further investigation.
non_infrastructure
fix typing for actor s join method what happened when calling the join method of an actor or stop or probably any method defined by the actor decorator we get an error from mypy complaining about the method not existing in the actor class for example test py error sampleactor has no attribute join what did you expect instead no errors when calling the method affected version s all affected part s i don t know part ❓ extra information the typing extensions package in particular the dataclass transform decorator might help with this it needs further investigation
0
101,217
12,675,514,227
IssuesEvent
2020-06-19 01:58:36
greatnewcls/KNLWKKGOTE62XGFSVAZIMVUH
https://api.github.com/repos/greatnewcls/KNLWKKGOTE62XGFSVAZIMVUH
closed
P3+H8jpQDZrmhv17Y2SazyIhJ9i9GmieyftaV8IHUhQFmz0xlCtfn32XcVCpYv/aYW3ZVkIF1wZm4vpWsgEpEiNnMRQ4OlYi3f5d2w6hL7U2sk43WFYZjwfnkbh6Jhu8R721lmOpsjtqmlR80gD7ohXHJZ3KXr9LCmzT80t4E4g=
design
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
1.0
P3+H8jpQDZrmhv17Y2SazyIhJ9i9GmieyftaV8IHUhQFmz0xlCtfn32XcVCpYv/aYW3ZVkIF1wZm4vpWsgEpEiNnMRQ4OlYi3f5d2w6hL7U2sk43WFYZjwfnkbh6Jhu8R721lmOpsjtqmlR80gD7ohXHJZ3KXr9LCmzT80t4E4g= - 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
non_infrastructure
qbeh ne b rrhhgrafbkdre ewf urjx u pikrgolh rz ea frk xlctmsbiae yon q ezq k pxejmfmkllxot j qp t ngclotukl ia ahhpunv vyyav irlhu
0
45,260
5,916,237,250
IssuesEvent
2017-05-22 09:59:00
canonical-ols/build.snapcraft.io
https://api.github.com/repos/canonical-ols/build.snapcraft.io
closed
[footer] social media icons are warm grey
Status: Triaged Visual design
The footer is still using the warm grey from old ubuntu.com --- Copied from Trello card: https://trello.com/c/AyjUMqTc/297-footer-social-media-icons-are-warm-grey Labels: design
1.0
[footer] social media icons are warm grey - The footer is still using the warm grey from old ubuntu.com --- Copied from Trello card: https://trello.com/c/AyjUMqTc/297-footer-social-media-icons-are-warm-grey Labels: design
non_infrastructure
social media icons are warm grey the footer is still using the warm grey from old ubuntu com copied from trello card labels design
0
7,590
7,979,283,560
IssuesEvent
2018-07-17 21:09:18
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Backup and restore
assigned-to-author container-service/svc doc-enhancement in-progress triaged
Hi, I am using a persistent volume with an Azure disk in an Azure Kubernetes Service AKS cluster. How do I backup and restore that disk? --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: d1ac572f-c613-71fc-580a-2805b740b793 * Version Independent ID: b4aeef15-7b0f-abc7-872e-28051e10d6ca * Content: [Create persistent volumes with Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/azure-disks-dynamic-pv) * Content Source: [articles/aks/azure-disks-dynamic-pv.md](https://github.com/Microsoft/azure-docs/blob/master/articles/aks/azure-disks-dynamic-pv.md) * Service: **container-service** * GitHub Login: @iainfoulds * Microsoft Alias: **iainfou**
1.0
Backup and restore - Hi, I am using a persistent volume with an Azure disk in an Azure Kubernetes Service AKS cluster. How do I backup and restore that disk? --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: d1ac572f-c613-71fc-580a-2805b740b793 * Version Independent ID: b4aeef15-7b0f-abc7-872e-28051e10d6ca * Content: [Create persistent volumes with Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/azure-disks-dynamic-pv) * Content Source: [articles/aks/azure-disks-dynamic-pv.md](https://github.com/Microsoft/azure-docs/blob/master/articles/aks/azure-disks-dynamic-pv.md) * Service: **container-service** * GitHub Login: @iainfoulds * Microsoft Alias: **iainfou**
non_infrastructure
backup and restore hi i am using a persistent volume with an azure disk in an azure kubernetes service aks cluster how do i backup and restore that disk document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service container service github login iainfoulds microsoft alias iainfou
0
958
3,010,756,528
IssuesEvent
2015-07-28 14:45:09
dotnet/wcf
https://api.github.com/repos/dotnet/wcf
opened
Move code to ensure the Bridge is running into a custom build task
Infrastructure test bug
Currently the code to check whether the Bridge is running and launch it lives in ensureBridge.ps1, and it is called via CMD files from build.cmd. This task is to create a custom build task that does the same work. Reasons are: - MSBuild command line properties are available (such as BridgeURL) - The Bridge will launch when a project that requires it builds, allowing more flexible launching of the Bridge depending on kinds of builds (e.g. F5)
1.0
Move code to ensure the Bridge is running into a custom build task - Currently the code to check whether the Bridge is running and launch it lives in ensureBridge.ps1, and it is called via CMD files from build.cmd. This task is to create a custom build task that does the same work. Reasons are: - MSBuild command line properties are available (such as BridgeURL) - The Bridge will launch when a project that requires it builds, allowing more flexible launching of the Bridge depending on kinds of builds (e.g. F5)
infrastructure
move code to ensure the bridge is running into a custom build task currently the code to check whether the bridge is running and launch it lives in ensurebridge and it is called via cmd files from build cmd this task is to create a custom build task that does the same work reasons are msbuild command line properties are available such as bridgeurl the bridge will launch when a project that requires it builds allowing more flexible launching of the bridge depending on kinds of builds e g
1
29,931
24,404,247,157
IssuesEvent
2022-10-05 06:12:49
dart-lang/site-www
https://api.github.com/repos/dart-lang/site-www
closed
Fix or remove html_proof.rb
infrastructure p3-low help wanted e1-hours
As of April 16, 2019, `./deploy/html_proof.rb` fails. It hasn't changed, so I suspect a ruby change. Here's the output (with `./` substituted for my directory path details): ``` $ ./deploy/html_proof.rb ./deploy/urls/get_all.rb:3:in `require_relative': cannot load such file -- ./deploy/urls/old_site_urls (LoadError) from ./deploy/urls/get_all.rb:3:in `<top (required)>' from ./deploy/html_proof.rb:7:in `require_relative' from ./deploy/html_proof.rb:7:in `<main>' ```
1.0
Fix or remove html_proof.rb - As of April 16, 2019, `./deploy/html_proof.rb` fails. It hasn't changed, so I suspect a ruby change. Here's the output (with `./` substituted for my directory path details): ``` $ ./deploy/html_proof.rb ./deploy/urls/get_all.rb:3:in `require_relative': cannot load such file -- ./deploy/urls/old_site_urls (LoadError) from ./deploy/urls/get_all.rb:3:in `<top (required)>' from ./deploy/html_proof.rb:7:in `require_relative' from ./deploy/html_proof.rb:7:in `<main>' ```
infrastructure
fix or remove html proof rb as of april deploy html proof rb fails it hasn t changed so i suspect a ruby change here s the output with substituted for my directory path details deploy html proof rb deploy urls get all rb in require relative cannot load such file deploy urls old site urls loaderror from deploy urls get all rb in from deploy html proof rb in require relative from deploy html proof rb in
1
13,883
10,519,890,614
IssuesEvent
2019-09-29 21:07:37
oppia/oppia-android
https://api.github.com/repos/oppia/oppia-android
closed
Introduce interface for ExplorationDataController
Priority: Essential Status: In implementation Type: Improvement Where: Infrastructure Workstream: Domain Interface
This is tracking introducing a stubbed interface for #113 without the real implementation being complete.
1.0
Introduce interface for ExplorationDataController - This is tracking introducing a stubbed interface for #113 without the real implementation being complete.
infrastructure
introduce interface for explorationdatacontroller this is tracking introducing a stubbed interface for without the real implementation being complete
1
21,444
14,570,381,506
IssuesEvent
2020-12-17 14:19:22
cds-snc/covid-alert-server-staging-terraform
https://api.github.com/repos/cds-snc/covid-alert-server-staging-terraform
closed
Upgrade to 0.14.2 terraform
high priority infrastructure unplanned work
Due to a known issue with TF and WAFv2 upgrading to the latest TF version 0.14.2 should speed up plan's and applys. https://github.com/hashicorp/terraform-provider-aws/issues/14062
1.0
Upgrade to 0.14.2 terraform - Due to a known issue with TF and WAFv2 upgrading to the latest TF version 0.14.2 should speed up plan's and applys. https://github.com/hashicorp/terraform-provider-aws/issues/14062
infrastructure
upgrade to terraform due to a known issue with tf and upgrading to the latest tf version should speed up plan s and applys
1
32,033
26,371,984,876
IssuesEvent
2023-01-11 21:33:11
ejgallego/coq-serapi
https://api.github.com/repos/ejgallego/coq-serapi
closed
Missing build dependency on mathcomp's ssreflect
kind: bug kind: testing kind: infrastructure
While trying to package coq-serapi for Debian, it turns out tests/genarg/move.v wants mathcomp's ssrnat and eqtype. I guess the opam file needs a dep on coq-mathcomp-ssreflect in addition to what is already declared.
1.0
Missing build dependency on mathcomp's ssreflect - While trying to package coq-serapi for Debian, it turns out tests/genarg/move.v wants mathcomp's ssrnat and eqtype. I guess the opam file needs a dep on coq-mathcomp-ssreflect in addition to what is already declared.
infrastructure
missing build dependency on mathcomp s ssreflect while trying to package coq serapi for debian it turns out tests genarg move v wants mathcomp s ssrnat and eqtype i guess the opam file needs a dep on coq mathcomp ssreflect in addition to what is already declared
1
26,517
20,187,799,050
IssuesEvent
2022-02-11 00:44:05
dotnet/aspnetcore
https://api.github.com/repos/dotnet/aspnetcore
closed
Disable BlazorTemplates.Tests from running in quarantined pipelines
task area-infrastructure area-blazor
These tests were disabled in the helix environment via https://github.com/dotnet/aspnetcore/pull/38814/files#diff-0ccc4599c1cd44580f93ef1ab4182e747b297872577a970d651be18220d91768R13. This issue tracks disabling the tests from the quarantined pipelines as well until we're able to make some improvements to the underlying test suite. Related: https://github.com/dotnet/aspnetcore/issues/38818
1.0
Disable BlazorTemplates.Tests from running in quarantined pipelines - These tests were disabled in the helix environment via https://github.com/dotnet/aspnetcore/pull/38814/files#diff-0ccc4599c1cd44580f93ef1ab4182e747b297872577a970d651be18220d91768R13. This issue tracks disabling the tests from the quarantined pipelines as well until we're able to make some improvements to the underlying test suite. Related: https://github.com/dotnet/aspnetcore/issues/38818
infrastructure
disable blazortemplates tests from running in quarantined pipelines these tests were disabled in the helix environment via this issue tracks disabling the tests from the quarantined pipelines as well until we re able to make some improvements to the underlying test suite related
1
211,429
23,823,171,297
IssuesEvent
2022-09-05 12:58:27
hugo-fixit/FixIt
https://api.github.com/repos/hugo-fixit/FixIt
opened
Fix code scanning alert - Potentially unsafe external link
security
<!-- Warning: The suggested title contains the alert rule name. This can expose security information. --> Tracking issue for: - [ ] https://github.com/hugo-fixit/FixIt/security/code-scanning/6 Salution: - [ ] Using built-in link template - [ ] Add front matter `[noreferrer=true]` only for `friends` type
True
Fix code scanning alert - Potentially unsafe external link - <!-- Warning: The suggested title contains the alert rule name. This can expose security information. --> Tracking issue for: - [ ] https://github.com/hugo-fixit/FixIt/security/code-scanning/6 Salution: - [ ] Using built-in link template - [ ] Add front matter `[noreferrer=true]` only for `friends` type
non_infrastructure
fix code scanning alert potentially unsafe external link tracking issue for salution using built in link template add front matter only for friends type
0
527,029
15,307,350,856
IssuesEvent
2021-02-24 20:46:25
hetic-newsroom/heticiens.news
https://api.github.com/repos/hetic-newsroom/heticiens.news
closed
Optimize SEO
UI enhancement low-priority
Add JSON-LD Schema tags to improve ranking. Suggested tags: Article, Organization Look at schema.org
1.0
Optimize SEO - Add JSON-LD Schema tags to improve ranking. Suggested tags: Article, Organization Look at schema.org
non_infrastructure
optimize seo add json ld schema tags to improve ranking suggested tags article organization look at schema org
0
9,200
7,867,042,770
IssuesEvent
2018-06-23 02:40:40
dotnet/corefx
https://api.github.com/repos/dotnet/corefx
closed
crossgen.sh: line 80: $2: unbound variable
area-Infrastructure bug os-windows-wsl
When trying to run `build.sh` on a clean check out from WSL.
1.0
crossgen.sh: line 80: $2: unbound variable - When trying to run `build.sh` on a clean check out from WSL.
infrastructure
crossgen sh line unbound variable when trying to run build sh on a clean check out from wsl
1
17,393
12,339,840,249
IssuesEvent
2020-05-14 18:50:18
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
Restore failing intermittently on build
area-Infrastructure blocking-clean-ci untriaged
Restore is failing intermittently ``` F:\workspace\_work\1\s\.dotnet\sdk\5.0.100-preview.5.20251.2\NuGet.targets(128,5): error : Cannot create a file when that file already exists. [F:\workspace\_work\1\s\src\libraries\restore\binplacePackages\binplacePackages.depproj] ##[error].dotnet\sdk\5.0.100-preview.5.20251.2\NuGet.targets(128,5): error : (NETCORE_ENGINEERING_TELEMETRY=Restore) Cannot create a file when that file already exists. ``` Looks like a race that is hitting the "Libraries Build Windows_NT allConfigurations x64 Debug" the most often. Note: if you are looking into this bug make sure to look at all attempts of this leg. About 1/2 of the PRs here retried this failure and it succeeded on retry. Hence looking at the final state of the build will not display this error. <!-- runfo report start --> |Build|Kind|Job Name| |---|---|---| |[640103](https://dev.azure.com/dnceng/public/_build/results?buildId=640103)|[PR 36242](https://github.com/dotnet/runtime/pull/36242)|Libraries Build Windows_NT allConfigurations x64 Debug| |[637444](https://dev.azure.com/dnceng/public/_build/results?buildId=637444)|[PR 36150](https://github.com/dotnet/runtime/pull/36150)|Libraries Build Windows_NT allConfigurations x64 Debug| |[637444](https://dev.azure.com/dnceng/public/_build/results?buildId=637444)|[PR 36150](https://github.com/dotnet/runtime/pull/36150)|Libraries Build Windows_NT allConfigurations x64 Debug| |[637444](https://dev.azure.com/dnceng/public/_build/results?buildId=637444)|[PR 36150](https://github.com/dotnet/runtime/pull/36150)|Libraries Build Windows_NT allConfigurations x64 Debug| |[638863](https://dev.azure.com/dnceng/public/_build/results?buildId=638863)|[PR 36098](https://github.com/dotnet/runtime/pull/36098)|Libraries Build Windows_NT allConfigurations x64 Debug| |[638863](https://dev.azure.com/dnceng/public/_build/results?buildId=638863)|[PR 36098](https://github.com/dotnet/runtime/pull/36098)|Libraries Build Windows_NT allConfigurations x64 Debug| |[638849](https://dev.azure.com/dnceng/public/_build/results?buildId=638849)|[PR 36175](https://github.com/dotnet/runtime/pull/36175)|Libraries Build Windows_NT allConfigurations x64 Debug| |[638786](https://dev.azure.com/dnceng/public/_build/results?buildId=638786)|Rolling|Libraries Build Windows_NT net472 x64 Release| |[638313](https://dev.azure.com/dnceng/public/_build/results?buildId=638313)|[PR 36098](https://github.com/dotnet/runtime/pull/36098)|Libraries Build Windows_NT allConfigurations x64 Debug| |[638357](https://dev.azure.com/dnceng/public/_build/results?buildId=638357)|[PR 35366](https://github.com/dotnet/runtime/pull/35366)|Libraries Build Windows_NT allConfigurations x64 Debug| |[638198](https://dev.azure.com/dnceng/public/_build/results?buildId=638198)|Rolling|Libraries Build Windows_NT allConfigurations x64 Release| <!-- runfo report end -->
1.0
Restore failing intermittently on build - Restore is failing intermittently ``` F:\workspace\_work\1\s\.dotnet\sdk\5.0.100-preview.5.20251.2\NuGet.targets(128,5): error : Cannot create a file when that file already exists. [F:\workspace\_work\1\s\src\libraries\restore\binplacePackages\binplacePackages.depproj] ##[error].dotnet\sdk\5.0.100-preview.5.20251.2\NuGet.targets(128,5): error : (NETCORE_ENGINEERING_TELEMETRY=Restore) Cannot create a file when that file already exists. ``` Looks like a race that is hitting the "Libraries Build Windows_NT allConfigurations x64 Debug" the most often. Note: if you are looking into this bug make sure to look at all attempts of this leg. About 1/2 of the PRs here retried this failure and it succeeded on retry. Hence looking at the final state of the build will not display this error. <!-- runfo report start --> |Build|Kind|Job Name| |---|---|---| |[640103](https://dev.azure.com/dnceng/public/_build/results?buildId=640103)|[PR 36242](https://github.com/dotnet/runtime/pull/36242)|Libraries Build Windows_NT allConfigurations x64 Debug| |[637444](https://dev.azure.com/dnceng/public/_build/results?buildId=637444)|[PR 36150](https://github.com/dotnet/runtime/pull/36150)|Libraries Build Windows_NT allConfigurations x64 Debug| |[637444](https://dev.azure.com/dnceng/public/_build/results?buildId=637444)|[PR 36150](https://github.com/dotnet/runtime/pull/36150)|Libraries Build Windows_NT allConfigurations x64 Debug| |[637444](https://dev.azure.com/dnceng/public/_build/results?buildId=637444)|[PR 36150](https://github.com/dotnet/runtime/pull/36150)|Libraries Build Windows_NT allConfigurations x64 Debug| |[638863](https://dev.azure.com/dnceng/public/_build/results?buildId=638863)|[PR 36098](https://github.com/dotnet/runtime/pull/36098)|Libraries Build Windows_NT allConfigurations x64 Debug| |[638863](https://dev.azure.com/dnceng/public/_build/results?buildId=638863)|[PR 36098](https://github.com/dotnet/runtime/pull/36098)|Libraries Build Windows_NT allConfigurations x64 Debug| |[638849](https://dev.azure.com/dnceng/public/_build/results?buildId=638849)|[PR 36175](https://github.com/dotnet/runtime/pull/36175)|Libraries Build Windows_NT allConfigurations x64 Debug| |[638786](https://dev.azure.com/dnceng/public/_build/results?buildId=638786)|Rolling|Libraries Build Windows_NT net472 x64 Release| |[638313](https://dev.azure.com/dnceng/public/_build/results?buildId=638313)|[PR 36098](https://github.com/dotnet/runtime/pull/36098)|Libraries Build Windows_NT allConfigurations x64 Debug| |[638357](https://dev.azure.com/dnceng/public/_build/results?buildId=638357)|[PR 35366](https://github.com/dotnet/runtime/pull/35366)|Libraries Build Windows_NT allConfigurations x64 Debug| |[638198](https://dev.azure.com/dnceng/public/_build/results?buildId=638198)|Rolling|Libraries Build Windows_NT allConfigurations x64 Release| <!-- runfo report end -->
infrastructure
restore failing intermittently on build restore is failing intermittently f workspace work s dotnet sdk preview nuget targets error cannot create a file when that file already exists dotnet sdk preview nuget targets error netcore engineering telemetry restore cannot create a file when that file already exists looks like a race that is hitting the libraries build windows nt allconfigurations debug the most often note if you are looking into this bug make sure to look at all attempts of this leg about of the prs here retried this failure and it succeeded on retry hence looking at the final state of the build will not display this error build kind job name build windows nt allconfigurations debug build windows nt allconfigurations debug build windows nt allconfigurations debug build windows nt allconfigurations debug build windows nt allconfigurations debug build windows nt allconfigurations debug build windows nt allconfigurations debug build windows nt release build windows nt allconfigurations debug build windows nt allconfigurations debug build windows nt allconfigurations release
1
22,229
15,054,631,312
IssuesEvent
2021-02-03 17:41:03
google/web-stories-wp
https://api.github.com/repos/google/web-stories-wp
closed
PHP 8 Compatibility
Epic Group: WordPress P1 Pod: WP & Infra Type: Infrastructure Type: Task
<!-- NOTE: For help requests, support questions, or general feedback, please use the WordPress.org forums instead: https://wordpress.org/support/plugin/web-stories/ --> ## Task Description Once PHP 8 is out and the WordPress PHPUnit test suite supports it, we should make sure the plugin works smoothly on PHP 8. - [x] CI: Ensure unit tests can be run with PHP 8 (#5608) - [ ] ~Update local dev environment to support PHP 8~ - necessary? - [ ] ~Update E2E tests to run in PHP 8 in GHA~ - necessary? - [x] Fix any issues with code found in testing. (#5609) - [x] Update / fix any composer dependencies affected by upgrade. (#5608) See also: #4788 #5344
1.0
PHP 8 Compatibility - <!-- NOTE: For help requests, support questions, or general feedback, please use the WordPress.org forums instead: https://wordpress.org/support/plugin/web-stories/ --> ## Task Description Once PHP 8 is out and the WordPress PHPUnit test suite supports it, we should make sure the plugin works smoothly on PHP 8. - [x] CI: Ensure unit tests can be run with PHP 8 (#5608) - [ ] ~Update local dev environment to support PHP 8~ - necessary? - [ ] ~Update E2E tests to run in PHP 8 in GHA~ - necessary? - [x] Fix any issues with code found in testing. (#5609) - [x] Update / fix any composer dependencies affected by upgrade. (#5608) See also: #4788 #5344
infrastructure
php compatibility task description once php is out and the wordpress phpunit test suite supports it we should make sure the plugin works smoothly on php ci ensure unit tests can be run with php update local dev environment to support php necessary update tests to run in php in gha necessary fix any issues with code found in testing update fix any composer dependencies affected by upgrade see also
1
2,482
3,699,050,107
IssuesEvent
2016-02-28 18:53:17
m-labs/artiq
https://api.github.com/repos/m-labs/artiq
closed
use Xvnc with QEMU
area:infrastructure prio:1-low
Having to compile and install the hacky VNC client is inconvenient, and it lacks features like mouse motion events plus special keys get stuck at times. Alternatively, fix the QEMU VNC bugs.
1.0
use Xvnc with QEMU - Having to compile and install the hacky VNC client is inconvenient, and it lacks features like mouse motion events plus special keys get stuck at times. Alternatively, fix the QEMU VNC bugs.
infrastructure
use xvnc with qemu having to compile and install the hacky vnc client is inconvenient and it lacks features like mouse motion events plus special keys get stuck at times alternatively fix the qemu vnc bugs
1
16,062
11,812,374,512
IssuesEvent
2020-03-19 20:02:24
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
Changes to CoreCLR workflow
Discussion area-Infrastructure-coreclr
PR #31701 is changing the developer workflow for CoreCLR to help increase reliability, reduce local build times, and move us closer to a place where we can better parallelize CI to improve build times. The largest part of the change is that the `build.cmd` and `build.sh` scripts under `src/coreclr` will be **deprecated** and later (probably in a few weeks) **removed**. The `src/coreclr/src/build.proj` file will also become unused and will be deleted. To build the coreclr product, the supported path will be to build from the root build script. For those who strongly dislike building with MSBuild, the native runtime build will still be buildable with new `build-runtime.cmd` and `build-runtime.sh` scripts in `src/coreclr` that only build the native runtime build and the cross-arch native build. There will also be separate scripts available for running crossgen on System.Private.CoreLib. All managed builds will be driven exclusively through the Arcade scripting. The way to control what parts of the CoreCLR build you run will be via the "subsets" infrastructure. See #31701 for specific subset names. Below are some examples of commands for common workflows: - Build CoreCLR runtime, System.Private.CoreLib, crossgen System.Private.CoreLib all in Debug. Build all of Libraries in Release. (Common workflow when syncing) ``` ./build -subsetcategory coreclr-libraries -subset runtime-corelib-nativecorelib-all -c Release -runtimeconfiguration Debug ``` - Build CoreCLR runtime ``` ./build -subsetcategory coreclr -subset runtime ``` - Build CoreCLR runtime (build-runtime version) ``` src/coreclr/build-runtime ``` - Build CoreCLR runtime and Crossgen2 ``` ./build -subsetcategory coreclr -subset runtime-tools ``` The subsets should give as much fine-grained control as was previously provided within the managed components. The native build scripts continue to have some finer-grained control and the build-runtime scripts are available for those who need it.
1.0
Changes to CoreCLR workflow - PR #31701 is changing the developer workflow for CoreCLR to help increase reliability, reduce local build times, and move us closer to a place where we can better parallelize CI to improve build times. The largest part of the change is that the `build.cmd` and `build.sh` scripts under `src/coreclr` will be **deprecated** and later (probably in a few weeks) **removed**. The `src/coreclr/src/build.proj` file will also become unused and will be deleted. To build the coreclr product, the supported path will be to build from the root build script. For those who strongly dislike building with MSBuild, the native runtime build will still be buildable with new `build-runtime.cmd` and `build-runtime.sh` scripts in `src/coreclr` that only build the native runtime build and the cross-arch native build. There will also be separate scripts available for running crossgen on System.Private.CoreLib. All managed builds will be driven exclusively through the Arcade scripting. The way to control what parts of the CoreCLR build you run will be via the "subsets" infrastructure. See #31701 for specific subset names. Below are some examples of commands for common workflows: - Build CoreCLR runtime, System.Private.CoreLib, crossgen System.Private.CoreLib all in Debug. Build all of Libraries in Release. (Common workflow when syncing) ``` ./build -subsetcategory coreclr-libraries -subset runtime-corelib-nativecorelib-all -c Release -runtimeconfiguration Debug ``` - Build CoreCLR runtime ``` ./build -subsetcategory coreclr -subset runtime ``` - Build CoreCLR runtime (build-runtime version) ``` src/coreclr/build-runtime ``` - Build CoreCLR runtime and Crossgen2 ``` ./build -subsetcategory coreclr -subset runtime-tools ``` The subsets should give as much fine-grained control as was previously provided within the managed components. The native build scripts continue to have some finer-grained control and the build-runtime scripts are available for those who need it.
infrastructure
changes to coreclr workflow pr is changing the developer workflow for coreclr to help increase reliability reduce local build times and move us closer to a place where we can better parallelize ci to improve build times the largest part of the change is that the build cmd and build sh scripts under src coreclr will be deprecated and later probably in a few weeks removed the src coreclr src build proj file will also become unused and will be deleted to build the coreclr product the supported path will be to build from the root build script for those who strongly dislike building with msbuild the native runtime build will still be buildable with new build runtime cmd and build runtime sh scripts in src coreclr that only build the native runtime build and the cross arch native build there will also be separate scripts available for running crossgen on system private corelib all managed builds will be driven exclusively through the arcade scripting the way to control what parts of the coreclr build you run will be via the subsets infrastructure see for specific subset names below are some examples of commands for common workflows build coreclr runtime system private corelib crossgen system private corelib all in debug build all of libraries in release common workflow when syncing build subsetcategory coreclr libraries subset runtime corelib nativecorelib all c release runtimeconfiguration debug build coreclr runtime build subsetcategory coreclr subset runtime build coreclr runtime build runtime version src coreclr build runtime build coreclr runtime and build subsetcategory coreclr subset runtime tools the subsets should give as much fine grained control as was previously provided within the managed components the native build scripts continue to have some finer grained control and the build runtime scripts are available for those who need it
1
87,705
3,757,176,058
IssuesEvent
2016-03-13 20:40:18
svof/svof
https://api.github.com/repos/svof/svof
opened
Consider new tree scenario against 2 handed
enhancement low priority medium difficulty up for grabs
reported by Aerek > A Touch Tree scenario for curing when you ONLY have 2H fractures and no other affs would be useful. I can't figure out how to script this, myself
1.0
Consider new tree scenario against 2 handed - reported by Aerek > A Touch Tree scenario for curing when you ONLY have 2H fractures and no other affs would be useful. I can't figure out how to script this, myself
non_infrastructure
consider new tree scenario against handed reported by aerek a touch tree scenario for curing when you only have fractures and no other affs would be useful i can t figure out how to script this myself
0
630
2,798,583,331
IssuesEvent
2015-05-12 19:23:24
new-day-international/reddit
https://api.github.com/repos/new-day-international/reddit
closed
Investigate using fewer cloud search instances
Infrastructure
From @inflector > Attached please find the usage report for September. It looks like we've got stuff firing off every hour uploading and somehow querying CloudSearch, what might be causing this? Are we getting spiders doing searches? > Also, we seem to be getting separate charges for each of the different dev, test, and production searches, I thought we'd only be using one instance. We certainly don't need three actual machines for our work.
1.0
Investigate using fewer cloud search instances - From @inflector > Attached please find the usage report for September. It looks like we've got stuff firing off every hour uploading and somehow querying CloudSearch, what might be causing this? Are we getting spiders doing searches? > Also, we seem to be getting separate charges for each of the different dev, test, and production searches, I thought we'd only be using one instance. We certainly don't need three actual machines for our work.
infrastructure
investigate using fewer cloud search instances from inflector attached please find the usage report for september it looks like we ve got stuff firing off every hour uploading and somehow querying cloudsearch what might be causing this are we getting spiders doing searches also we seem to be getting separate charges for each of the different dev test and production searches i thought we d only be using one instance we certainly don t need three actual machines for our work
1
217,405
24,334,897,568
IssuesEvent
2022-10-01 01:07:10
H-459/test4Gal
https://api.github.com/repos/H-459/test4Gal
closed
CVE-2020-7692 (High) detected in google-oauth-client-1.25.0.jar - autoclosed
security vulnerability
## CVE-2020-7692 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>google-oauth-client-1.25.0.jar</b></p></summary> <p>Google OAuth Client Library for Java. Functionality that works on all supported Java platforms, including Java 5 (or higher) desktop (SE) and web (EE), Android, and Google App Engine.</p> <p>Library home page: <a href="https://github.com/google/google-oauth-java-client">https://github.com/google/google-oauth-java-client</a></p> <p>Path to dependency file: /BaragonService/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/oauth-client/google-oauth-client/1.25.0/google-oauth-client-1.25.0.jar</p> <p> Dependency Hierarchy: - google-api-client-1.25.0.jar (Root Library) - :x: **google-oauth-client-1.25.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/H-459/test4Gal/commit/659aa3eb63f125f4e5cbe927376da658f670c874">659aa3eb63f125f4e5cbe927376da658f670c874</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0. <p>Publish Date: 2020-07-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7692>CVE-2020-7692</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-07-09</p> <p>Fix Resolution (com.google.oauth-client:google-oauth-client): 1.31.0</p> <p>Direct dependency fix Resolution (com.google.api-client:google-api-client): 1.30.10</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
True
CVE-2020-7692 (High) detected in google-oauth-client-1.25.0.jar - autoclosed - ## CVE-2020-7692 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>google-oauth-client-1.25.0.jar</b></p></summary> <p>Google OAuth Client Library for Java. Functionality that works on all supported Java platforms, including Java 5 (or higher) desktop (SE) and web (EE), Android, and Google App Engine.</p> <p>Library home page: <a href="https://github.com/google/google-oauth-java-client">https://github.com/google/google-oauth-java-client</a></p> <p>Path to dependency file: /BaragonService/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/oauth-client/google-oauth-client/1.25.0/google-oauth-client-1.25.0.jar</p> <p> Dependency Hierarchy: - google-api-client-1.25.0.jar (Root Library) - :x: **google-oauth-client-1.25.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/H-459/test4Gal/commit/659aa3eb63f125f4e5cbe927376da658f670c874">659aa3eb63f125f4e5cbe927376da658f670c874</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0. <p>Publish Date: 2020-07-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7692>CVE-2020-7692</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-07-09</p> <p>Fix Resolution (com.google.oauth-client:google-oauth-client): 1.31.0</p> <p>Direct dependency fix Resolution (com.google.api-client:google-api-client): 1.30.10</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
non_infrastructure
cve high detected in google oauth client jar autoclosed cve high severity vulnerability vulnerable library google oauth client jar google oauth client library for java functionality that works on all supported java platforms including java or higher desktop se and web ee android and google app engine library home page a href path to dependency file baragonservice pom xml path to vulnerable library home wss scanner repository com google oauth client google oauth client google oauth client jar dependency hierarchy google api client jar root library x google oauth client jar vulnerable library found in head commit a href found in base branch master vulnerability details pkce support is not implemented in accordance with the rfc for oauth for native apps without the use of pkce the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized an attacker is able to obtain the authorization code using a malicious app on the client side and use it to gain authorization to the protected resource this affects the package com google oauth client google oauth client before publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution com google oauth client google oauth client direct dependency fix resolution com google api client google api client check this box to open an automated fix pr
0
16,419
5,233,716,001
IssuesEvent
2017-01-30 13:47:18
SemsTestOrg/combinearchive-web
https://api.github.com/repos/SemsTestOrg/combinearchive-web
closed
fetch instead of upload
code feature request fixed migrated minor
## Trac Ticket #133 **component:** code **owner:** somebody **reporter:** martin **created:** 2015-09-23 09:30:48 **milestone:** **type:** feature request **version:** **keywords:** add an option to fetch a file from URL. users do not need to download model from eg biomodels, but can simply provide a link.. however, this is just minor request ## comment 1 **time:** 2015-10-06 10:21:57 **author:** martin and annotate that as ```pav:wasRetrievedFrom``` (when etc) in the meta data (as soon as this is possible) ## comment 2 **time:** 2015-10-15 13:12:16 **author:** mp487 <martin.peters3@uni-rostock.de> In [None](/39ccc2842c3ba59f9cad1ba4118907f1f3ddb2c0): ```CommitTicketReference repository="" revision="39ccc2842c3ba59f9cad1ba4118907f1f3ddb2c0" added ui support for fetching files [see #133] ``` ## comment 3 **time:** 2015-10-15 14:43:47 **author:** Martin Peters <martin.peters3@uni-rostock.de> In [None](/c4c90cf387539cca2f6c3ef2ac10152679d32329): ```CommitTicketReference repository="" revision="c4c90cf387539cca2f6c3ef2ac10152679d32329" added basic structure to RestApi [see #133] ``` ## comment 4 **time:** 2015-10-19 20:18:40 **author:** mp487 <martin.peters3@uni-rostock.de> In [None](/aff229dbba043610d1c4c28bff78de8c3bd43201): ```CommitTicketReference repository="" revision="aff229dbba043610d1c4c28bff78de8c3bd43201" removed list of urls again from FetchRequest, now just passing multiple requests as list (js pending) [see #133] ``` ## comment 5 **time:** 2015-10-19 20:18:42 **author:** mp487 <martin.peters3@uni-rostock.de> In [None](/224a94b2aeb6429428f2bb1853dcbec7841fec86): ```CommitTicketReference repository="" revision="224a94b2aeb6429428f2bb1853dcbec7841fec86" more fetch api [see #133] ``` ## comment 6 **time:** 2015-10-19 20:18:43 **author:** mp487 <martin.peters3@uni-rostock.de> In [None](/ac9e57e06bf206fdfc70d88b359c3ca7fd495deb): ```CommitTicketReference repository="" revision="ac9e57e06bf206fdfc70d88b359c3ca7fd495deb" impl custom copy method (due to class conflict) [see #133] ``` ## comment 7 **time:** 2015-10-19 20:53:28 **author:** Martin Peters <martin.peters3@uni-rostock.de> In [None](/1fdab8c88a85e14f381f47a2b1806422b72bd45d): ```CommitTicketReference repository="" revision="1fdab8c88a85e14f381f47a2b1806422b72bd45d" finished RestApi integration of fetch file [see #133] ``` ## comment 8 **time:** 2015-10-19 21:17:10 **author:** Martin Peters <martin.peters3@uni-rostock.de> In [None](/73598eb7202830407eb8f1e196b2747515b96cc2): ```CommitTicketReference repository="" revision="73598eb7202830407eb8f1e196b2747515b96cc2" updated js for new fetch request dataholder [see #133] ``` ## comment 9 **time:** 2015-10-19 21:17:12 **author:** Martin Peters <martin.peters3@uni-rostock.de> In [None](/53c22ed3da95d9bed1226765d07dd4e980ad392f): ```CommitTicketReference repository="" revision="53c22ed3da95d9bed1226765d07dd4e980ad392f" fixed js for fetching files [see #133] ``` ## comment 10 **time:** 2015-10-19 21:17:13 **author:** Martin Peters <martin.peters3@uni-rostock.de> In [None](/bf57fab23180de847ec2f98f7a7f66e2e5ab098d): ```CommitTicketReference repository="" revision="bf57fab23180de847ec2f98f7a7f66e2e5ab098d" adding Description from fetched files [see #133] ``` ## comment 11 **time:** 2015-10-20 11:19:39 **author:** mp487 <martin.peters3@uni-rostock.de> In [None](/141836211aa3d7580b9d27c4c2f5a7984e8cc1e2): ```CommitTicketReference repository="" revision="141836211aa3d7580b9d27c4c2f5a7984e8cc1e2" removed template for fetch dialog [see #133] ``` ## comment 12 **time:** 2015-10-20 11:19:41 **author:** mp487 <martin.peters3@uni-rostock.de> In [None](/f87573d372c8742e0d78e44b076f3da5f7cc1010): ```CommitTicketReference repository="" revision="f87573d372c8742e0d78e44b076f3da5f7cc1010" some polishment on fetch dialog [see #133] ``` ## comment 13 **time:** 2016-12-12 11:52:22 **author:** martinP This is actually implemented. Just forgot to close this ticket... ## comment 14 **time:** 2016-12-12 11:52:22 **author:** martinP Updated **resolution** to **fixed** ## comment 15 **time:** 2016-12-12 11:52:22 **author:** martinP Updated **status** to **closed**
1.0
fetch instead of upload - ## Trac Ticket #133 **component:** code **owner:** somebody **reporter:** martin **created:** 2015-09-23 09:30:48 **milestone:** **type:** feature request **version:** **keywords:** add an option to fetch a file from URL. users do not need to download model from eg biomodels, but can simply provide a link.. however, this is just minor request ## comment 1 **time:** 2015-10-06 10:21:57 **author:** martin and annotate that as ```pav:wasRetrievedFrom``` (when etc) in the meta data (as soon as this is possible) ## comment 2 **time:** 2015-10-15 13:12:16 **author:** mp487 <martin.peters3@uni-rostock.de> In [None](/39ccc2842c3ba59f9cad1ba4118907f1f3ddb2c0): ```CommitTicketReference repository="" revision="39ccc2842c3ba59f9cad1ba4118907f1f3ddb2c0" added ui support for fetching files [see #133] ``` ## comment 3 **time:** 2015-10-15 14:43:47 **author:** Martin Peters <martin.peters3@uni-rostock.de> In [None](/c4c90cf387539cca2f6c3ef2ac10152679d32329): ```CommitTicketReference repository="" revision="c4c90cf387539cca2f6c3ef2ac10152679d32329" added basic structure to RestApi [see #133] ``` ## comment 4 **time:** 2015-10-19 20:18:40 **author:** mp487 <martin.peters3@uni-rostock.de> In [None](/aff229dbba043610d1c4c28bff78de8c3bd43201): ```CommitTicketReference repository="" revision="aff229dbba043610d1c4c28bff78de8c3bd43201" removed list of urls again from FetchRequest, now just passing multiple requests as list (js pending) [see #133] ``` ## comment 5 **time:** 2015-10-19 20:18:42 **author:** mp487 <martin.peters3@uni-rostock.de> In [None](/224a94b2aeb6429428f2bb1853dcbec7841fec86): ```CommitTicketReference repository="" revision="224a94b2aeb6429428f2bb1853dcbec7841fec86" more fetch api [see #133] ``` ## comment 6 **time:** 2015-10-19 20:18:43 **author:** mp487 <martin.peters3@uni-rostock.de> In [None](/ac9e57e06bf206fdfc70d88b359c3ca7fd495deb): ```CommitTicketReference repository="" revision="ac9e57e06bf206fdfc70d88b359c3ca7fd495deb" impl custom copy method (due to class conflict) [see #133] ``` ## comment 7 **time:** 2015-10-19 20:53:28 **author:** Martin Peters <martin.peters3@uni-rostock.de> In [None](/1fdab8c88a85e14f381f47a2b1806422b72bd45d): ```CommitTicketReference repository="" revision="1fdab8c88a85e14f381f47a2b1806422b72bd45d" finished RestApi integration of fetch file [see #133] ``` ## comment 8 **time:** 2015-10-19 21:17:10 **author:** Martin Peters <martin.peters3@uni-rostock.de> In [None](/73598eb7202830407eb8f1e196b2747515b96cc2): ```CommitTicketReference repository="" revision="73598eb7202830407eb8f1e196b2747515b96cc2" updated js for new fetch request dataholder [see #133] ``` ## comment 9 **time:** 2015-10-19 21:17:12 **author:** Martin Peters <martin.peters3@uni-rostock.de> In [None](/53c22ed3da95d9bed1226765d07dd4e980ad392f): ```CommitTicketReference repository="" revision="53c22ed3da95d9bed1226765d07dd4e980ad392f" fixed js for fetching files [see #133] ``` ## comment 10 **time:** 2015-10-19 21:17:13 **author:** Martin Peters <martin.peters3@uni-rostock.de> In [None](/bf57fab23180de847ec2f98f7a7f66e2e5ab098d): ```CommitTicketReference repository="" revision="bf57fab23180de847ec2f98f7a7f66e2e5ab098d" adding Description from fetched files [see #133] ``` ## comment 11 **time:** 2015-10-20 11:19:39 **author:** mp487 <martin.peters3@uni-rostock.de> In [None](/141836211aa3d7580b9d27c4c2f5a7984e8cc1e2): ```CommitTicketReference repository="" revision="141836211aa3d7580b9d27c4c2f5a7984e8cc1e2" removed template for fetch dialog [see #133] ``` ## comment 12 **time:** 2015-10-20 11:19:41 **author:** mp487 <martin.peters3@uni-rostock.de> In [None](/f87573d372c8742e0d78e44b076f3da5f7cc1010): ```CommitTicketReference repository="" revision="f87573d372c8742e0d78e44b076f3da5f7cc1010" some polishment on fetch dialog [see #133] ``` ## comment 13 **time:** 2016-12-12 11:52:22 **author:** martinP This is actually implemented. Just forgot to close this ticket... ## comment 14 **time:** 2016-12-12 11:52:22 **author:** martinP Updated **resolution** to **fixed** ## comment 15 **time:** 2016-12-12 11:52:22 **author:** martinP Updated **status** to **closed**
non_infrastructure
fetch instead of upload trac ticket component code owner somebody reporter martin created milestone type feature request version keywords add an option to fetch a file from url users do not need to download model from eg biomodels but can simply provide a link however this is just minor request comment time author martin and annotate that as pav wasretrievedfrom when etc in the meta data as soon as this is possible comment time author in committicketreference repository revision added ui support for fetching files comment time author martin peters in committicketreference repository revision added basic structure to restapi comment time author in committicketreference repository revision removed list of urls again from fetchrequest now just passing multiple requests as list js pending comment time author in committicketreference repository revision more fetch api comment time author in committicketreference repository revision impl custom copy method due to class conflict comment time author martin peters in committicketreference repository revision finished restapi integration of fetch file comment time author martin peters in committicketreference repository revision updated js for new fetch request dataholder comment time author martin peters in committicketreference repository revision fixed js for fetching files comment time author martin peters in committicketreference repository revision adding description from fetched files comment time author in committicketreference repository revision removed template for fetch dialog comment time author in committicketreference repository revision some polishment on fetch dialog comment time author martinp this is actually implemented just forgot to close this ticket comment time author martinp updated resolution to fixed comment time author martinp updated status to closed
0
15,227
11,423,150,998
IssuesEvent
2020-02-03 15:25:31
reservix-ui/marigold
https://api.github.com/repos/reservix-ui/marigold
closed
Setup jest + testing-library
infrastructure
We can base it on the following setup form `tsdx`: https://github.com/jaredpalmer/tsdx/blob/ce3ff8e23b77515ca09d32cb01273531acebf9ab/src/createJestConfig.ts#L5-L19 Also, install `@testing-library`!
1.0
Setup jest + testing-library - We can base it on the following setup form `tsdx`: https://github.com/jaredpalmer/tsdx/blob/ce3ff8e23b77515ca09d32cb01273531acebf9ab/src/createJestConfig.ts#L5-L19 Also, install `@testing-library`!
infrastructure
setup jest testing library we can base it on the following setup form tsdx also install testing library
1
14,360
10,765,263,091
IssuesEvent
2019-11-01 10:32:18
tunapanda/swag
https://api.github.com/repos/tunapanda/swag
closed
Database structure & design
backend points:5 priority:highest type:infrastructure
As an engineer, I would like a database with a logical structure to store the relational data for Wikonnect. - [ ] Knex migrations
1.0
Database structure & design - As an engineer, I would like a database with a logical structure to store the relational data for Wikonnect. - [ ] Knex migrations
infrastructure
database structure design as an engineer i would like a database with a logical structure to store the relational data for wikonnect knex migrations
1
653,011
21,568,612,099
IssuesEvent
2022-05-02 04:19:24
solgenomics/sgn
https://api.github.com/repos/solgenomics/sgn
closed
Implement a generation advancement tool
Type: Feature Request Priority: High
Expected Behavior <!-- Describe the desired or expected behavour here. --> -------------------------------------------------------------------------- An important feature for breeders is to track generation advancement of populations (F1,F2, F3....) A useful feature would be to include automatically this F level incrementation to progenies generated from cross/population. It usually goes from F1 -> F8. A further feature would reflect the generation level in the pedigree tree For Bugs: --------- ### Environment <!-- Where did you encounter the error. --> #### Steps to Reproduce <!-- Provide an example, or an unambiguous set of steps to reproduce --> <!-- this bug. Include code to reproduce, if relevant. -->
1.0
Implement a generation advancement tool - Expected Behavior <!-- Describe the desired or expected behavour here. --> -------------------------------------------------------------------------- An important feature for breeders is to track generation advancement of populations (F1,F2, F3....) A useful feature would be to include automatically this F level incrementation to progenies generated from cross/population. It usually goes from F1 -> F8. A further feature would reflect the generation level in the pedigree tree For Bugs: --------- ### Environment <!-- Where did you encounter the error. --> #### Steps to Reproduce <!-- Provide an example, or an unambiguous set of steps to reproduce --> <!-- this bug. Include code to reproduce, if relevant. -->
non_infrastructure
implement a generation advancement tool expected behavior an important feature for breeders is to track generation advancement of populations a useful feature would be to include automatically this f level incrementation to progenies generated from cross population it usually goes from a further feature would reflect the generation level in the pedigree tree for bugs environment steps to reproduce
0
11,595
9,306,961,366
IssuesEvent
2019-03-25 11:00:12
elastic/kibana
https://api.github.com/repos/elastic/kibana
closed
[InfraUI] Infrastructure UI not loading in Kibana 7.0
:Infra UI :infrastructure
As part of Beats testing I was trying a variety of Elasticsearch / Kibana / Beats versions, which led me to discover the Infrastructure UI isn't working in Kibana `7.0` (Logs is unaffected). The Infrastructure UI renders fine in Kibana `6.7`, `7.x` and `master` but **not** `7.0`. On `7.0` I see the following: <img width="1680" alt="Screenshot 2019-03-21 12 49 57" src="https://user-images.githubusercontent.com/471693/54755416-d41c7080-4bdd-11e9-8561-b804b859780d.png"> One thing to note is `<route />` could very easily point to the recent navigation changes, however these were merged to `7.x` and `master` only, so aren't to blame here.
1.0
[InfraUI] Infrastructure UI not loading in Kibana 7.0 - As part of Beats testing I was trying a variety of Elasticsearch / Kibana / Beats versions, which led me to discover the Infrastructure UI isn't working in Kibana `7.0` (Logs is unaffected). The Infrastructure UI renders fine in Kibana `6.7`, `7.x` and `master` but **not** `7.0`. On `7.0` I see the following: <img width="1680" alt="Screenshot 2019-03-21 12 49 57" src="https://user-images.githubusercontent.com/471693/54755416-d41c7080-4bdd-11e9-8561-b804b859780d.png"> One thing to note is `<route />` could very easily point to the recent navigation changes, however these were merged to `7.x` and `master` only, so aren't to blame here.
infrastructure
infrastructure ui not loading in kibana as part of beats testing i was trying a variety of elasticsearch kibana beats versions which led me to discover the infrastructure ui isn t working in kibana logs is unaffected the infrastructure ui renders fine in kibana x and master but not on i see the following img width alt screenshot src one thing to note is could very easily point to the recent navigation changes however these were merged to x and master only so aren t to blame here
1
1,173
3,061,982,734
IssuesEvent
2015-08-16 04:10:14
jquery/esprima
https://api.github.com/repos/jquery/esprima
closed
Integrate codecov.io
infrastructure
With [Codecov.io](https://codecov.io/) integration, there can be two benefits: * Coverage information is prominent in every pull request * Code coverage dashboard is available for more detailed information Any possible coverage regression can be easily tracked.
1.0
Integrate codecov.io - With [Codecov.io](https://codecov.io/) integration, there can be two benefits: * Coverage information is prominent in every pull request * Code coverage dashboard is available for more detailed information Any possible coverage regression can be easily tracked.
infrastructure
integrate codecov io with integration there can be two benefits coverage information is prominent in every pull request code coverage dashboard is available for more detailed information any possible coverage regression can be easily tracked
1
294,736
9,040,107,654
IssuesEvent
2019-02-10 13:37:22
opencv/opencv
https://api.github.com/repos/opencv/opencv
opened
G-API: vagrind tests crashed
bug category: g-api priority: high
[Build](http://pullrequest.opencv.org/buildbot/builders/master_valgrind-lin64-debug/builds/10146). opencv_test_gapi: ``` [ RUN ] SobelXYTestFluid/SobelXYTest.AccuracyTest/0, where GetParam() = (compare_f, 8UC1, 3, 1280x720, -1, 1, 0, 0, { gapi.kernel_package }) ==13111== Warning: set address range perms: large range [0x395d8080, 0x719d8080) (undefined) ==13111== Warning: set address range perms: large range [0x719d9080, 0xa9dd9080) (undefined) Process returned: -9 ``` opencv_perf_gapi: ``` [ RUN ] SobelXYPerfTestFluid/SobelXYPerfTest.TestPerformance/12, where GetParam() = (compare_f, 8UC1, 3, 1920x1080, -1, 1, { gapi.kernel_package }) ==13692== Warning: set address range perms: large range [0x395d8080, 0xb7ed8080) (undefined) ==13692== Warning: set address range perms: large range [0xb7ed9080, 0x1367d9080) (undefined) Process returned: -9 ```
1.0
G-API: vagrind tests crashed - [Build](http://pullrequest.opencv.org/buildbot/builders/master_valgrind-lin64-debug/builds/10146). opencv_test_gapi: ``` [ RUN ] SobelXYTestFluid/SobelXYTest.AccuracyTest/0, where GetParam() = (compare_f, 8UC1, 3, 1280x720, -1, 1, 0, 0, { gapi.kernel_package }) ==13111== Warning: set address range perms: large range [0x395d8080, 0x719d8080) (undefined) ==13111== Warning: set address range perms: large range [0x719d9080, 0xa9dd9080) (undefined) Process returned: -9 ``` opencv_perf_gapi: ``` [ RUN ] SobelXYPerfTestFluid/SobelXYPerfTest.TestPerformance/12, where GetParam() = (compare_f, 8UC1, 3, 1920x1080, -1, 1, { gapi.kernel_package }) ==13692== Warning: set address range perms: large range [0x395d8080, 0xb7ed8080) (undefined) ==13692== Warning: set address range perms: large range [0xb7ed9080, 0x1367d9080) (undefined) Process returned: -9 ```
non_infrastructure
g api vagrind tests crashed opencv test gapi sobelxytestfluid sobelxytest accuracytest where getparam compare f gapi kernel package warning set address range perms large range undefined warning set address range perms large range undefined process returned opencv perf gapi sobelxyperftestfluid sobelxyperftest testperformance where getparam compare f gapi kernel package warning set address range perms large range undefined warning set address range perms large range undefined process returned
0
152,328
23,952,709,560
IssuesEvent
2022-09-12 12:51:00
kedro-org/kedro-viz
https://api.github.com/repos/kedro-org/kedro-viz
closed
Develop a brief to inform our approach for branding
Issue: Feature Request Design: Research
## Description We're doing a holistic evaluation of the Kedro brand to understand our positioning and messaging. The outcome of this exercise will be a brief that would be used to answer: - Why are we doing this? Why is this exercise important? - What pain points we have with our current brand? - What key messages we would like to communicate? - What assets need to be created or what are our brand touch points? - Who are our key stakeholders when developing this brand? - Who is our audience? - What risks are present and how will we mitigate them? - What does success look like? - How far we can go with this redesign: brand evolution or revolution?
1.0
Develop a brief to inform our approach for branding - ## Description We're doing a holistic evaluation of the Kedro brand to understand our positioning and messaging. The outcome of this exercise will be a brief that would be used to answer: - Why are we doing this? Why is this exercise important? - What pain points we have with our current brand? - What key messages we would like to communicate? - What assets need to be created or what are our brand touch points? - Who are our key stakeholders when developing this brand? - Who is our audience? - What risks are present and how will we mitigate them? - What does success look like? - How far we can go with this redesign: brand evolution or revolution?
non_infrastructure
develop a brief to inform our approach for branding description we re doing a holistic evaluation of the kedro brand to understand our positioning and messaging the outcome of this exercise will be a brief that would be used to answer why are we doing this why is this exercise important what pain points we have with our current brand what key messages we would like to communicate what assets need to be created or what are our brand touch points who are our key stakeholders when developing this brand who is our audience what risks are present and how will we mitigate them what does success look like how far we can go with this redesign brand evolution or revolution
0
19,533
13,261,772,275
IssuesEvent
2020-08-20 20:30:22
icecube-trac/tix4
https://api.github.com/repos/icecube-trac/tix4
closed
remove the need for svn:externals (and merge the icetray repository back into the main one) (Trac #1546)
Migrated from Trac enhancement infrastructure
We discussed the possibility of removing the need for svn:externals in the usual meta-projects at the software session in Copenhagen (they might still make sense for more specialized uses and/or meta-projects). The idea is to move all relevant project trunks directly into "combo" and start releasing the whole meta-projects. This makes branching/merging/... work in a sane way. The process requires re-integrating the "icetray" repository into the main repository. A way that makes this work without breaking old meta-projects using externals is to clone our main meta-project and set the existing ones to read-only. The new meta project would exist at a new URL, something like http://code.icecube.wisc.edu/icecube instead of http://code.icecube.wisc.edu/svn and http://code.icecube.wisc.edu/icetray . Attached is a working list of commands that would need to be run to make this work. I tested them on a cobalt yesterday. You can find a repository created this way on cobalt02 in /scratch/ckopper/ (the repository URL is file:///scratch/ckopper/restored_dump (on cobalt02, not on a shared filesystem because Lustre is very, very slow when storing these). With SVN sparse checkouts users can retrieve partial copies of the meta-project. An example is shown at the end of the attached script. Please send comments on what you think about this. I think it would make the release process a lot easier and allow for things like svn diffs of whole meta-projects. <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1546">https://code.icecube.wisc.edu/projects/icecube/ticket/1546</a>, reported by claudio.kopperand owned by nega</em></summary> <p> ```json { "status": "closed", "changetime": "2019-02-13T14:15:23", "_ts": "1550067323910946", "description": "We discussed the possibility of removing the need for svn:externals in the usual meta-projects at the software session in Copenhagen (they might still make sense for more specialized uses and/or meta-projects). The idea is to move all relevant project trunks directly into \"combo\" and start releasing the whole meta-projects. This makes branching/merging/... work in a sane way.\n\nThe process requires re-integrating the \"icetray\" repository into the main repository. A way that makes this work without breaking old meta-projects using externals is to clone our main meta-project and set the existing ones to read-only. The new meta project would exist at a new URL, something like http://code.icecube.wisc.edu/icecube instead of http://code.icecube.wisc.edu/svn and http://code.icecube.wisc.edu/icetray .\n\nAttached is a working list of commands that would need to be run to make this work. I tested them on a cobalt yesterday. You can find a repository created this way on cobalt02 in /scratch/ckopper/ (the repository URL is file:///scratch/ckopper/restored_dump (on cobalt02, not on a shared filesystem because Lustre is very, very slow when storing these).\n\nWith SVN sparse checkouts users can retrieve partial copies of the meta-project. An example is shown at the end of the attached script.\n\nPlease send comments on what you think about this. I think it would make the release process a lot easier and allow for things like svn diffs of whole meta-projects.", "reporter": "claudio.kopper", "cc": "", "resolution": "duplicate", "time": "2016-02-12T19:20:59", "component": "infrastructure", "summary": "remove the need for svn:externals (and merge the icetray repository back into the main one)", "priority": "normal", "keywords": "", "milestone": "", "owner": "nega", "type": "enhancement" } ``` </p> </details>
1.0
remove the need for svn:externals (and merge the icetray repository back into the main one) (Trac #1546) - We discussed the possibility of removing the need for svn:externals in the usual meta-projects at the software session in Copenhagen (they might still make sense for more specialized uses and/or meta-projects). The idea is to move all relevant project trunks directly into "combo" and start releasing the whole meta-projects. This makes branching/merging/... work in a sane way. The process requires re-integrating the "icetray" repository into the main repository. A way that makes this work without breaking old meta-projects using externals is to clone our main meta-project and set the existing ones to read-only. The new meta project would exist at a new URL, something like http://code.icecube.wisc.edu/icecube instead of http://code.icecube.wisc.edu/svn and http://code.icecube.wisc.edu/icetray . Attached is a working list of commands that would need to be run to make this work. I tested them on a cobalt yesterday. You can find a repository created this way on cobalt02 in /scratch/ckopper/ (the repository URL is file:///scratch/ckopper/restored_dump (on cobalt02, not on a shared filesystem because Lustre is very, very slow when storing these). With SVN sparse checkouts users can retrieve partial copies of the meta-project. An example is shown at the end of the attached script. Please send comments on what you think about this. I think it would make the release process a lot easier and allow for things like svn diffs of whole meta-projects. <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1546">https://code.icecube.wisc.edu/projects/icecube/ticket/1546</a>, reported by claudio.kopperand owned by nega</em></summary> <p> ```json { "status": "closed", "changetime": "2019-02-13T14:15:23", "_ts": "1550067323910946", "description": "We discussed the possibility of removing the need for svn:externals in the usual meta-projects at the software session in Copenhagen (they might still make sense for more specialized uses and/or meta-projects). The idea is to move all relevant project trunks directly into \"combo\" and start releasing the whole meta-projects. This makes branching/merging/... work in a sane way.\n\nThe process requires re-integrating the \"icetray\" repository into the main repository. A way that makes this work without breaking old meta-projects using externals is to clone our main meta-project and set the existing ones to read-only. The new meta project would exist at a new URL, something like http://code.icecube.wisc.edu/icecube instead of http://code.icecube.wisc.edu/svn and http://code.icecube.wisc.edu/icetray .\n\nAttached is a working list of commands that would need to be run to make this work. I tested them on a cobalt yesterday. You can find a repository created this way on cobalt02 in /scratch/ckopper/ (the repository URL is file:///scratch/ckopper/restored_dump (on cobalt02, not on a shared filesystem because Lustre is very, very slow when storing these).\n\nWith SVN sparse checkouts users can retrieve partial copies of the meta-project. An example is shown at the end of the attached script.\n\nPlease send comments on what you think about this. I think it would make the release process a lot easier and allow for things like svn diffs of whole meta-projects.", "reporter": "claudio.kopper", "cc": "", "resolution": "duplicate", "time": "2016-02-12T19:20:59", "component": "infrastructure", "summary": "remove the need for svn:externals (and merge the icetray repository back into the main one)", "priority": "normal", "keywords": "", "milestone": "", "owner": "nega", "type": "enhancement" } ``` </p> </details>
infrastructure
remove the need for svn externals and merge the icetray repository back into the main one trac we discussed the possibility of removing the need for svn externals in the usual meta projects at the software session in copenhagen they might still make sense for more specialized uses and or meta projects the idea is to move all relevant project trunks directly into combo and start releasing the whole meta projects this makes branching merging work in a sane way the process requires re integrating the icetray repository into the main repository a way that makes this work without breaking old meta projects using externals is to clone our main meta project and set the existing ones to read only the new meta project would exist at a new url something like instead of and attached is a working list of commands that would need to be run to make this work i tested them on a cobalt yesterday you can find a repository created this way on in scratch ckopper the repository url is file scratch ckopper restored dump on not on a shared filesystem because lustre is very very slow when storing these with svn sparse checkouts users can retrieve partial copies of the meta project an example is shown at the end of the attached script please send comments on what you think about this i think it would make the release process a lot easier and allow for things like svn diffs of whole meta projects migrated from json status closed changetime ts description we discussed the possibility of removing the need for svn externals in the usual meta projects at the software session in copenhagen they might still make sense for more specialized uses and or meta projects the idea is to move all relevant project trunks directly into combo and start releasing the whole meta projects this makes branching merging work in a sane way n nthe process requires re integrating the icetray repository into the main repository a way that makes this work without breaking old meta projects using externals is to clone our main meta project and set the existing ones to read only the new meta project would exist at a new url something like instead of and n nattached is a working list of commands that would need to be run to make this work i tested them on a cobalt yesterday you can find a repository created this way on in scratch ckopper the repository url is file scratch ckopper restored dump on not on a shared filesystem because lustre is very very slow when storing these n nwith svn sparse checkouts users can retrieve partial copies of the meta project an example is shown at the end of the attached script n nplease send comments on what you think about this i think it would make the release process a lot easier and allow for things like svn diffs of whole meta projects reporter claudio kopper cc resolution duplicate time component infrastructure summary remove the need for svn externals and merge the icetray repository back into the main one priority normal keywords milestone owner nega type enhancement
1
28,924
23,613,070,552
IssuesEvent
2022-08-24 13:53:14
spring-projects/spring-batch
https://api.github.com/repos/spring-projects/spring-batch
closed
Deprecate Hibernate support
type: task in: infrastructure
Due to https://github.com/spring-projects/spring-framework/issues/28813, we are intending to deprecate Hibernate support in Spring Batch in v5.0 for removal in v5.2.
1.0
Deprecate Hibernate support - Due to https://github.com/spring-projects/spring-framework/issues/28813, we are intending to deprecate Hibernate support in Spring Batch in v5.0 for removal in v5.2.
infrastructure
deprecate hibernate support due to we are intending to deprecate hibernate support in spring batch in for removal in
1
5,211
5,521,091,881
IssuesEvent
2017-03-19 12:42:50
Daniel-Mietchen/ideas
https://api.github.com/repos/Daniel-Mietchen/ideas
opened
Ideas for "resolve authors"
5min far-future infrastructure Wikidata
as per https://tools.wmflabs.org/sourcemd/new_resolve_authors.php - add "toggle all" - display author names known via P50
1.0
Ideas for "resolve authors" - as per https://tools.wmflabs.org/sourcemd/new_resolve_authors.php - add "toggle all" - display author names known via P50
infrastructure
ideas for resolve authors as per add toggle all display author names known via
1
49,813
3,004,504,077
IssuesEvent
2015-07-26 00:58:50
wwivbbs/wwiv
https://api.github.com/repos/wwivbbs/wwiv
closed
Taglines, OpenEdit/MSGINFO editor
5.0 auto-migrated FSED low priority sourceforge TAGLINES
Build 1099 OS Win7 32 Taglines are no longer generated with OpenEdit. Taglines are configured on, but they don't present. Original comment by: mmunson79
1.0
Taglines, OpenEdit/MSGINFO editor - Build 1099 OS Win7 32 Taglines are no longer generated with OpenEdit. Taglines are configured on, but they don't present. Original comment by: mmunson79
non_infrastructure
taglines openedit msginfo editor build os taglines are no longer generated with openedit taglines are configured on but they don t present original comment by
0
26,945
13,160,493,601
IssuesEvent
2020-08-10 17:42:12
yalelibrary/YUL-DC
https://api.github.com/repos/yalelibrary/YUL-DC
closed
deploy-sql and deploy-solr not working through cam tool
bug performance team
# Acceptant # These two scripts should run the same both in and out of the camerata cli and produce the same results either way.
True
deploy-sql and deploy-solr not working through cam tool - # Acceptant # These two scripts should run the same both in and out of the camerata cli and produce the same results either way.
non_infrastructure
deploy sql and deploy solr not working through cam tool acceptant these two scripts should run the same both in and out of the camerata cli and produce the same results either way
0
97,889
28,962,238,926
IssuesEvent
2023-05-10 04:15:50
pytorch/pytorch
https://api.github.com/repos/pytorch/pytorch
closed
`pytorch setup.py develop` fails on M1 macbooks with `fatal error: 'omp.h' file not found`
module: build triaged module: macos module: arm
### 🐛 Describe the bug On my M1 macbook, running `pytorch setup.py develop` with a clean build resulted in the error `fatal error: 'omp.h' file not found` To get the build to successfully run, I had to instead invoke `USE_OPENMP=0 python setup.py develop` The error message: ``` (base) ➜ pytorch git:(zainr/reorder-tests) ✗ python setup.py develop Building wheel torch-2.1.0a0+git812cadf -- Building version 2.1.0a0+git812cadf cmake --build . --target install --config Release [1/440] Building OBJCXX object caffe2/CMakeFiles/torch_cpu.dir/__/aten/src/ATen/native/mps/operations/Indexing.mm.o FAILED: caffe2/CMakeFiles/torch_cpu.dir/__/aten/src/ATen/native/mps/operations/Indexing.mm.o /Library/Developer/CommandLineTools/usr/bin/c++ -DAT_PER_OPERATOR_HEADERS -DCAFFE2_BUILD_MAIN_LIB -DCPUINFO_SUPPORTED_PLATFORM=1 -DFMT_HEADER_ONLY=1 -DFXDIV_USE_INLINE_ASSEMBLY=0 -DHAVE_MMAP=1 -DHAVE_SHM_OPEN=1 -DHAVE_SHM_UNLINK=1 -DMINIZ_DISABLE_ZIP_READER_CRC32_CHECKS -DNNP_CONVOLUTION_ONLY=0 -DNNP_INFERENCE_ONLY=0 -DONNXIFI_ENABLE_EXT=1 -DONNX_ML=1 -DONNX_NAMESPACE=onnx_torch -DUSE_EXTERNAL_MZCRC -D_FILE_OFFSET_BITS=64 -Dtorch_cpu_EXPORTS -I/Users/zainr/pytorch/build/aten/src -I/Users/zainr/pytorch/aten/src -I/Users/zainr/pytorch/build -I/Users/zainr/pytorch -I/Users/zainr/pytorch/cmake/../third_party/benchmark/include -I/Users/zainr/pytorch/third_party/onnx -I/Users/zainr/pytorch/build/third_party/onnx -I/Users/zainr/pytorch/third_party/foxi -I/Users/zainr/pytorch/build/third_party/foxi -I/Users/zainr/pytorch/torch/csrc/api -I/Users/zainr/pytorch/torch/csrc/api/include -I/Users/zainr/pytorch/caffe2/aten/src/TH -I/Users/zainr/pytorch/build/caffe2/aten/src/TH -I/Users/zainr/pytorch/build/caffe2/aten/src -I/Users/zainr/pytorch/build/caffe2/../aten/src -I/Users/zainr/pytorch/torch/csrc -I/Users/zainr/pytorch/third_party/miniz-2.1.0 -I/Users/zainr/pytorch/third_party/kineto/libkineto/include -I/Users/zainr/pytorch/third_party/kineto/libkineto/src -I/Users/zainr/pytorch/aten/src/ATen/.. -I/Users/zainr/pytorch/third_party/FXdiv/include -I/Users/zainr/pytorch/c10/.. -I/Users/zainr/pytorch/third_party/pthreadpool/include -I/Users/zainr/pytorch/third_party/cpuinfo/include -I/Users/zainr/pytorch/aten/src/ATen/native/quantized/cpu/qnnpack/include -I/Users/zainr/pytorch/aten/src/ATen/native/quantized/cpu/qnnpack/src -I/Users/zainr/pytorch/third_party/cpuinfo/deps/clog/include -I/Users/zainr/pytorch/third_party/NNPACK/include -I/Users/zainr/pytorch/third_party/FP16/include -I/Users/zainr/pytorch/third_party/fmt/include -I/Users/zainr/pytorch/third_party/flatbuffers/include -isystem /Users/zainr/pytorch/cmake/../third_party/googletest/googlemock/include -isystem /Users/zainr/pytorch/cmake/../third_party/googletest/googletest/include -isystem /Users/zainr/pytorch/third_party/protobuf/src -isystem /Users/zainr/pytorch/third_party/XNNPACK/include -isystem /Users/zainr/pytorch/cmake/../third_party/eigen -isystem /Users/zainr/pytorch/build/include -x objective-c++ -DUSE_MPS -O3 -DNDEBUG -arch arm64 -isysroot /Library/Developer/CommandLineTools/SDKs/MacOSX13.3.sdk -fPIC -mfpu=neon -D__NEON__ -DTH_HAVE_THREAD -std=gnu++17 -MD -MT caffe2/CMakeFiles/torch_cpu.dir/__/aten/src/ATen/native/mps/operations/Indexing.mm.o -MF caffe2/CMakeFiles/torch_cpu.dir/__/aten/src/ATen/native/mps/operations/Indexing.mm.o.d -o caffe2/CMakeFiles/torch_cpu.dir/__/aten/src/ATen/native/mps/operations/Indexing.mm.o -c /Users/zainr/pytorch/aten/src/ATen/native/mps/operations/Indexing.mm clang: warning: argument unused during compilation: '-mfpu=neon' [-Wunused-command-line-argument] In file included from /Users/zainr/pytorch/aten/src/ATen/native/mps/operations/Indexing.mm:16: In file included from /Users/zainr/pytorch/aten/src/ATen/native/TensorAdvancedIndexing.h:9: /Users/zainr/pytorch/aten/src/ATen/native/cpu/radix_sort.h:25:10: fatal error: 'omp.h' file not found #include <omp.h> ^~~~~~~ 1 error generated. ``` ### Versions (base) ➜ pytorch git:(zainr/reorder-tests) ✗ python collect_env.py Collecting environment information... PyTorch version: N/A Is debug build: N/A CUDA used to build PyTorch: N/A ROCM used to build PyTorch: N/A OS: macOS 13.3.1 (arm64) GCC version: Could not collect Clang version: 14.0.3 (clang-1403.0.22.14.1) CMake version: version 3.22.1 Libc version: N/A Python version: 3.9.12 (main, Apr 5 2022, 01:52:34) [Clang 12.0.0 ] (64-bit runtime) Python platform: macOS-13.3.1-arm64-arm-64bit Is CUDA available: N/A CUDA runtime version: Could not collect CUDA_MODULE_LOADING set to: N/A GPU models and configuration: Could not collect Nvidia driver version: Could not collect cuDNN version: Could not collect HIP runtime version: N/A MIOpen runtime version: N/A Is XNNPACK available: N/A CPU: Apple M1 Pro Versions of relevant libraries: [pip3] flake8==6.0.0 [pip3] flake8-bugbear==23.3.23 [pip3] flake8-comprehensions==3.11.1 [pip3] flake8-executable==2.1.3 [pip3] flake8-logging-format==0.9.0 [pip3] flake8-pyi==23.3.1 [pip3] flake8-simplify==0.19.3 [pip3] mypy==0.960 [pip3] mypy-extensions==0.4.3 [pip3] numpy==1.23.1 [conda] numpy cc @malfet @seemethere @albanD
1.0
`pytorch setup.py develop` fails on M1 macbooks with `fatal error: 'omp.h' file not found` - ### 🐛 Describe the bug On my M1 macbook, running `pytorch setup.py develop` with a clean build resulted in the error `fatal error: 'omp.h' file not found` To get the build to successfully run, I had to instead invoke `USE_OPENMP=0 python setup.py develop` The error message: ``` (base) ➜ pytorch git:(zainr/reorder-tests) ✗ python setup.py develop Building wheel torch-2.1.0a0+git812cadf -- Building version 2.1.0a0+git812cadf cmake --build . --target install --config Release [1/440] Building OBJCXX object caffe2/CMakeFiles/torch_cpu.dir/__/aten/src/ATen/native/mps/operations/Indexing.mm.o FAILED: caffe2/CMakeFiles/torch_cpu.dir/__/aten/src/ATen/native/mps/operations/Indexing.mm.o /Library/Developer/CommandLineTools/usr/bin/c++ -DAT_PER_OPERATOR_HEADERS -DCAFFE2_BUILD_MAIN_LIB -DCPUINFO_SUPPORTED_PLATFORM=1 -DFMT_HEADER_ONLY=1 -DFXDIV_USE_INLINE_ASSEMBLY=0 -DHAVE_MMAP=1 -DHAVE_SHM_OPEN=1 -DHAVE_SHM_UNLINK=1 -DMINIZ_DISABLE_ZIP_READER_CRC32_CHECKS -DNNP_CONVOLUTION_ONLY=0 -DNNP_INFERENCE_ONLY=0 -DONNXIFI_ENABLE_EXT=1 -DONNX_ML=1 -DONNX_NAMESPACE=onnx_torch -DUSE_EXTERNAL_MZCRC -D_FILE_OFFSET_BITS=64 -Dtorch_cpu_EXPORTS -I/Users/zainr/pytorch/build/aten/src -I/Users/zainr/pytorch/aten/src -I/Users/zainr/pytorch/build -I/Users/zainr/pytorch -I/Users/zainr/pytorch/cmake/../third_party/benchmark/include -I/Users/zainr/pytorch/third_party/onnx -I/Users/zainr/pytorch/build/third_party/onnx -I/Users/zainr/pytorch/third_party/foxi -I/Users/zainr/pytorch/build/third_party/foxi -I/Users/zainr/pytorch/torch/csrc/api -I/Users/zainr/pytorch/torch/csrc/api/include -I/Users/zainr/pytorch/caffe2/aten/src/TH -I/Users/zainr/pytorch/build/caffe2/aten/src/TH -I/Users/zainr/pytorch/build/caffe2/aten/src -I/Users/zainr/pytorch/build/caffe2/../aten/src -I/Users/zainr/pytorch/torch/csrc -I/Users/zainr/pytorch/third_party/miniz-2.1.0 -I/Users/zainr/pytorch/third_party/kineto/libkineto/include -I/Users/zainr/pytorch/third_party/kineto/libkineto/src -I/Users/zainr/pytorch/aten/src/ATen/.. -I/Users/zainr/pytorch/third_party/FXdiv/include -I/Users/zainr/pytorch/c10/.. -I/Users/zainr/pytorch/third_party/pthreadpool/include -I/Users/zainr/pytorch/third_party/cpuinfo/include -I/Users/zainr/pytorch/aten/src/ATen/native/quantized/cpu/qnnpack/include -I/Users/zainr/pytorch/aten/src/ATen/native/quantized/cpu/qnnpack/src -I/Users/zainr/pytorch/third_party/cpuinfo/deps/clog/include -I/Users/zainr/pytorch/third_party/NNPACK/include -I/Users/zainr/pytorch/third_party/FP16/include -I/Users/zainr/pytorch/third_party/fmt/include -I/Users/zainr/pytorch/third_party/flatbuffers/include -isystem /Users/zainr/pytorch/cmake/../third_party/googletest/googlemock/include -isystem /Users/zainr/pytorch/cmake/../third_party/googletest/googletest/include -isystem /Users/zainr/pytorch/third_party/protobuf/src -isystem /Users/zainr/pytorch/third_party/XNNPACK/include -isystem /Users/zainr/pytorch/cmake/../third_party/eigen -isystem /Users/zainr/pytorch/build/include -x objective-c++ -DUSE_MPS -O3 -DNDEBUG -arch arm64 -isysroot /Library/Developer/CommandLineTools/SDKs/MacOSX13.3.sdk -fPIC -mfpu=neon -D__NEON__ -DTH_HAVE_THREAD -std=gnu++17 -MD -MT caffe2/CMakeFiles/torch_cpu.dir/__/aten/src/ATen/native/mps/operations/Indexing.mm.o -MF caffe2/CMakeFiles/torch_cpu.dir/__/aten/src/ATen/native/mps/operations/Indexing.mm.o.d -o caffe2/CMakeFiles/torch_cpu.dir/__/aten/src/ATen/native/mps/operations/Indexing.mm.o -c /Users/zainr/pytorch/aten/src/ATen/native/mps/operations/Indexing.mm clang: warning: argument unused during compilation: '-mfpu=neon' [-Wunused-command-line-argument] In file included from /Users/zainr/pytorch/aten/src/ATen/native/mps/operations/Indexing.mm:16: In file included from /Users/zainr/pytorch/aten/src/ATen/native/TensorAdvancedIndexing.h:9: /Users/zainr/pytorch/aten/src/ATen/native/cpu/radix_sort.h:25:10: fatal error: 'omp.h' file not found #include <omp.h> ^~~~~~~ 1 error generated. ``` ### Versions (base) ➜ pytorch git:(zainr/reorder-tests) ✗ python collect_env.py Collecting environment information... PyTorch version: N/A Is debug build: N/A CUDA used to build PyTorch: N/A ROCM used to build PyTorch: N/A OS: macOS 13.3.1 (arm64) GCC version: Could not collect Clang version: 14.0.3 (clang-1403.0.22.14.1) CMake version: version 3.22.1 Libc version: N/A Python version: 3.9.12 (main, Apr 5 2022, 01:52:34) [Clang 12.0.0 ] (64-bit runtime) Python platform: macOS-13.3.1-arm64-arm-64bit Is CUDA available: N/A CUDA runtime version: Could not collect CUDA_MODULE_LOADING set to: N/A GPU models and configuration: Could not collect Nvidia driver version: Could not collect cuDNN version: Could not collect HIP runtime version: N/A MIOpen runtime version: N/A Is XNNPACK available: N/A CPU: Apple M1 Pro Versions of relevant libraries: [pip3] flake8==6.0.0 [pip3] flake8-bugbear==23.3.23 [pip3] flake8-comprehensions==3.11.1 [pip3] flake8-executable==2.1.3 [pip3] flake8-logging-format==0.9.0 [pip3] flake8-pyi==23.3.1 [pip3] flake8-simplify==0.19.3 [pip3] mypy==0.960 [pip3] mypy-extensions==0.4.3 [pip3] numpy==1.23.1 [conda] numpy cc @malfet @seemethere @albanD
non_infrastructure
pytorch setup py develop fails on macbooks with fatal error omp h file not found 🐛 describe the bug on my macbook running pytorch setup py develop with a clean build resulted in the error fatal error omp h file not found to get the build to successfully run i had to instead invoke use openmp python setup py develop the error message base ➜ pytorch git zainr reorder tests ✗ python setup py develop building wheel torch building version cmake build target install config release building objcxx object cmakefiles torch cpu dir aten src aten native mps operations indexing mm o failed cmakefiles torch cpu dir aten src aten native mps operations indexing mm o library developer commandlinetools usr bin c dat per operator headers build main lib dcpuinfo supported platform dfmt header only dfxdiv use inline assembly dhave mmap dhave shm open dhave shm unlink dminiz disable zip reader checks dnnp convolution only dnnp inference only donnxifi enable ext donnx ml donnx namespace onnx torch duse external mzcrc d file offset bits dtorch cpu exports i users zainr pytorch build aten src i users zainr pytorch aten src i users zainr pytorch build i users zainr pytorch i users zainr pytorch cmake third party benchmark include i users zainr pytorch third party onnx i users zainr pytorch build third party onnx i users zainr pytorch third party foxi i users zainr pytorch build third party foxi i users zainr pytorch torch csrc api i users zainr pytorch torch csrc api include i users zainr pytorch aten src th i users zainr pytorch build aten src th i users zainr pytorch build aten src i users zainr pytorch build aten src i users zainr pytorch torch csrc i users zainr pytorch third party miniz i users zainr pytorch third party kineto libkineto include i users zainr pytorch third party kineto libkineto src i users zainr pytorch aten src aten i users zainr pytorch third party fxdiv include i users zainr pytorch i users zainr pytorch third party pthreadpool include i users zainr pytorch third party cpuinfo include i users zainr pytorch aten src aten native quantized cpu qnnpack include i users zainr pytorch aten src aten native quantized cpu qnnpack src i users zainr pytorch third party cpuinfo deps clog include i users zainr pytorch third party nnpack include i users zainr pytorch third party include i users zainr pytorch third party fmt include i users zainr pytorch third party flatbuffers include isystem users zainr pytorch cmake third party googletest googlemock include isystem users zainr pytorch cmake third party googletest googletest include isystem users zainr pytorch third party protobuf src isystem users zainr pytorch third party xnnpack include isystem users zainr pytorch cmake third party eigen isystem users zainr pytorch build include x objective c duse mps dndebug arch isysroot library developer commandlinetools sdks sdk fpic mfpu neon d neon dth have thread std gnu md mt cmakefiles torch cpu dir aten src aten native mps operations indexing mm o mf cmakefiles torch cpu dir aten src aten native mps operations indexing mm o d o cmakefiles torch cpu dir aten src aten native mps operations indexing mm o c users zainr pytorch aten src aten native mps operations indexing mm clang warning argument unused during compilation mfpu neon in file included from users zainr pytorch aten src aten native mps operations indexing mm in file included from users zainr pytorch aten src aten native tensoradvancedindexing h users zainr pytorch aten src aten native cpu radix sort h fatal error omp h file not found include error generated versions base ➜ pytorch git zainr reorder tests ✗ python collect env py collecting environment information pytorch version n a is debug build n a cuda used to build pytorch n a rocm used to build pytorch n a os macos gcc version could not collect clang version clang cmake version version libc version n a python version main apr bit runtime python platform macos arm is cuda available n a cuda runtime version could not collect cuda module loading set to n a gpu models and configuration could not collect nvidia driver version could not collect cudnn version could not collect hip runtime version n a miopen runtime version n a is xnnpack available n a cpu apple pro versions of relevant libraries bugbear comprehensions executable logging format pyi simplify mypy mypy extensions numpy numpy cc malfet seemethere alband
0
83,181
3,631,622,060
IssuesEvent
2016-02-11 02:54:11
umple/umple
https://api.github.com/repos/umple/umple
closed
Have myenv default to `local` when building
Diffic-Easy enhancement Maintainability Priority-Low
## Description Currently, myenv defaults to `cc`. This is a very specific case and most people are building via local developments. When building this way, one often types commands by hand. In contrast, when working with a build environment when scripting, e.g. Travis, or CC, you're writing scripts where it is straight forward to add the -Dmyenv=local to the script parameters. ## Suggested fix Change (`_template.xml`): ```xml <property name="myenv" value="cc" /> ``` to: ```xml <property name="myenv" value="local" /> ``` ## Known issues This may require changes to the CC scripts. I do not have access to them, thus I have no idea about the scope of this change. Opening this as a discussion.
1.0
Have myenv default to `local` when building - ## Description Currently, myenv defaults to `cc`. This is a very specific case and most people are building via local developments. When building this way, one often types commands by hand. In contrast, when working with a build environment when scripting, e.g. Travis, or CC, you're writing scripts where it is straight forward to add the -Dmyenv=local to the script parameters. ## Suggested fix Change (`_template.xml`): ```xml <property name="myenv" value="cc" /> ``` to: ```xml <property name="myenv" value="local" /> ``` ## Known issues This may require changes to the CC scripts. I do not have access to them, thus I have no idea about the scope of this change. Opening this as a discussion.
non_infrastructure
have myenv default to local when building description currently myenv defaults to cc this is a very specific case and most people are building via local developments when building this way one often types commands by hand in contrast when working with a build environment when scripting e g travis or cc you re writing scripts where it is straight forward to add the dmyenv local to the script parameters suggested fix change template xml xml to xml known issues this may require changes to the cc scripts i do not have access to them thus i have no idea about the scope of this change opening this as a discussion
0
256,248
27,557,388,492
IssuesEvent
2023-03-07 19:02:21
occmundial/atomic-icons
https://api.github.com/repos/occmundial/atomic-icons
closed
CVE-2022-21681 (High) detected in marked-2.1.3.tgz - autoclosed
security vulnerability
## CVE-2022-21681 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>marked-2.1.3.tgz</b></p></summary> <p>A markdown parser built for speed</p> <p>Library home page: <a href="https://registry.npmjs.org/marked/-/marked-2.1.3.tgz">https://registry.npmjs.org/marked/-/marked-2.1.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/marked/package.json</p> <p> Dependency Hierarchy: - semantic-release-17.4.4.tgz (Root Library) - :x: **marked-2.1.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/occmundial/atomic-icons/commit/4f36497e21048c2145796a4a67ef30d245dd9eee">4f36497e21048c2145796a4a67ef30d245dd9eee</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources. <p>Publish Date: 2022-01-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-21681>CVE-2022-21681</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-5v2h-r2cx-5xgj">https://github.com/advisories/GHSA-5v2h-r2cx-5xgj</a></p> <p>Release Date: 2022-01-14</p> <p>Fix Resolution (marked): 4.0.10</p> <p>Direct dependency fix Resolution (semantic-release): 19.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-21681 (High) detected in marked-2.1.3.tgz - autoclosed - ## CVE-2022-21681 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>marked-2.1.3.tgz</b></p></summary> <p>A markdown parser built for speed</p> <p>Library home page: <a href="https://registry.npmjs.org/marked/-/marked-2.1.3.tgz">https://registry.npmjs.org/marked/-/marked-2.1.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/marked/package.json</p> <p> Dependency Hierarchy: - semantic-release-17.4.4.tgz (Root Library) - :x: **marked-2.1.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/occmundial/atomic-icons/commit/4f36497e21048c2145796a4a67ef30d245dd9eee">4f36497e21048c2145796a4a67ef30d245dd9eee</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources. <p>Publish Date: 2022-01-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-21681>CVE-2022-21681</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-5v2h-r2cx-5xgj">https://github.com/advisories/GHSA-5v2h-r2cx-5xgj</a></p> <p>Release Date: 2022-01-14</p> <p>Fix Resolution (marked): 4.0.10</p> <p>Direct dependency fix Resolution (semantic-release): 19.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_infrastructure
cve high detected in marked tgz autoclosed cve high severity vulnerability vulnerable library marked tgz a markdown parser built for speed library home page a href path to dependency file package json path to vulnerable library node modules marked package json dependency hierarchy semantic release tgz root library x marked tgz vulnerable library found in head commit a href found in base branch main vulnerability details marked is a markdown parser and compiler prior to version the regular expression inline reflinksearch may cause catastrophic backtracking against some strings and lead to a denial of service dos anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected this issue is patched in version as a workaround avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution marked direct dependency fix resolution semantic release step up your open source security game with mend
0
7,259
6,808,939,520
IssuesEvent
2017-11-04 10:50:29
HaCSBCU/hacsbcu.github.io
https://api.github.com/repos/HaCSBCU/hacsbcu.github.io
opened
HTTP Strict Transport Security
SECURITY
HTTP Strict Transport Security (HSTS) header not implemented. https://wiki.mozilla.org/Security/Guidelines/Web_Security#HTTP_Strict_Transport_Security
True
HTTP Strict Transport Security - HTTP Strict Transport Security (HSTS) header not implemented. https://wiki.mozilla.org/Security/Guidelines/Web_Security#HTTP_Strict_Transport_Security
non_infrastructure
http strict transport security http strict transport security hsts header not implemented
0
18,376
12,961,009,816
IssuesEvent
2020-07-20 15:06:33
gnosis/safe-ios
https://api.github.com/repos/gnosis/safe-ios
opened
Remove non-inclusive language
infrastructure
- "master" branch -> "main" branch - "masterCopy" -> "primaryCopy" - "whitelist" -> "allow list" - "blacklist" -> "deny list"
1.0
Remove non-inclusive language - - "master" branch -> "main" branch - "masterCopy" -> "primaryCopy" - "whitelist" -> "allow list" - "blacklist" -> "deny list"
infrastructure
remove non inclusive language master branch main branch mastercopy primarycopy whitelist allow list blacklist deny list
1
211,866
23,850,202,518
IssuesEvent
2022-09-06 17:10:53
CMSgov/mdct-mcr
https://api.github.com/repos/CMSgov/mdct-mcr
closed
SHF - mdct-mcr - main - MEDIUM - S3.12 S3 access control lists (ACLs) should not be used to manage user access to buckets
security-hub main
************************************************************** __This issue was generated from Security Hub data and is managed through automation.__ Please do not edit the title or body of this issue, or remove the security-hub tag. All other edits/comments are welcome. Finding Id: arn:aws:securityhub:us-east-1:446712541566:subscription/aws-foundational-security-best-practices/v/1.0.0/S3.12/finding/631bf8e3-eaed-448c-9204-300421715eee ************************************************************** ## Type of Issue: - [x] Security Hub Finding ## Title: S3.12 S3 access control lists (ACLs) should not be used to manage user access to buckets ## Id: arn:aws:securityhub:us-east-1:446712541566:subscription/aws-foundational-security-best-practices/v/1.0.0/S3.12/finding/631bf8e3-eaed-448c-9204-300421715eee (You may use this ID to lookup this finding's details in Security Hub) ## Description This control checks if S3 buckets allow user permissions via access control lists (ACLs). This control fails if ACLs are configured for user access on S3 Bucket. ## Remediation https://docs.aws.amazon.com/console/securityhub/S3.12/remediation ## AC: - The security hub finding is resolved or suppressed, indicated by a Workflow Status of Resolved or Suppressed.
True
SHF - mdct-mcr - main - MEDIUM - S3.12 S3 access control lists (ACLs) should not be used to manage user access to buckets - ************************************************************** __This issue was generated from Security Hub data and is managed through automation.__ Please do not edit the title or body of this issue, or remove the security-hub tag. All other edits/comments are welcome. Finding Id: arn:aws:securityhub:us-east-1:446712541566:subscription/aws-foundational-security-best-practices/v/1.0.0/S3.12/finding/631bf8e3-eaed-448c-9204-300421715eee ************************************************************** ## Type of Issue: - [x] Security Hub Finding ## Title: S3.12 S3 access control lists (ACLs) should not be used to manage user access to buckets ## Id: arn:aws:securityhub:us-east-1:446712541566:subscription/aws-foundational-security-best-practices/v/1.0.0/S3.12/finding/631bf8e3-eaed-448c-9204-300421715eee (You may use this ID to lookup this finding's details in Security Hub) ## Description This control checks if S3 buckets allow user permissions via access control lists (ACLs). This control fails if ACLs are configured for user access on S3 Bucket. ## Remediation https://docs.aws.amazon.com/console/securityhub/S3.12/remediation ## AC: - The security hub finding is resolved or suppressed, indicated by a Workflow Status of Resolved or Suppressed.
non_infrastructure
shf mdct mcr main medium access control lists acls should not be used to manage user access to buckets this issue was generated from security hub data and is managed through automation please do not edit the title or body of this issue or remove the security hub tag all other edits comments are welcome finding id arn aws securityhub us east subscription aws foundational security best practices v finding eaed type of issue security hub finding title access control lists acls should not be used to manage user access to buckets id arn aws securityhub us east subscription aws foundational security best practices v finding eaed you may use this id to lookup this finding s details in security hub description this control checks if buckets allow user permissions via access control lists acls this control fails if acls are configured for user access on bucket remediation ac the security hub finding is resolved or suppressed indicated by a workflow status of resolved or suppressed
0
49,974
10,436,936,378
IssuesEvent
2019-09-17 20:44:05
eclipse/che
https://api.github.com/repos/eclipse/che
closed
Cover "Dashboard / Workspace Details / Overview" part of test plan by selenium test
kind/task lifecycle/stale status/code-review team/che-qe
### Description We have the test plan where described all use cases for dashboard: https://docs.google.com/document/d/1aXUAWFOOylrk-_nO5Iqm77M0Viu8ykCjaQMtJuEBvUA/edit#heading=h.wf4eguoewmmg We should cover the "Dashboard / Workspace Details / Overview" page by selenium test according to use cases which described in the test plan.
1.0
Cover "Dashboard / Workspace Details / Overview" part of test plan by selenium test - ### Description We have the test plan where described all use cases for dashboard: https://docs.google.com/document/d/1aXUAWFOOylrk-_nO5Iqm77M0Viu8ykCjaQMtJuEBvUA/edit#heading=h.wf4eguoewmmg We should cover the "Dashboard / Workspace Details / Overview" page by selenium test according to use cases which described in the test plan.
non_infrastructure
cover dashboard workspace details overview part of test plan by selenium test description we have the test plan where described all use cases for dashboard we should cover the dashboard workspace details overview page by selenium test according to use cases which described in the test plan
0
15,916
11,765,443,123
IssuesEvent
2020-03-14 17:25:12
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
Microsoft.Bcl.AsyncInterfaces
area-Infrastructure-libraries customer assistance
Microsoft.Bcl.AsyncInterfaces has dependency on System.Threading.Tasks.Extensions >= 4.5.2, and it works fine with 4.5.2 version. However if upgraded to 4.5.3 app will throw below exception ``` Unhandled Exception: System.IO.FileLoadException: Could not load file or assembly 'System.Threading.Tasks.Extensions, Version=4.2.0.0, Culture=neutral, PublicKeyToken=cc7b13ffcd2ddd51' or one of its dependencies. The located assembly's manif est definition does not match the assembly reference. (Exception from HRESULT: 0x80131040) ```
1.0
Microsoft.Bcl.AsyncInterfaces - Microsoft.Bcl.AsyncInterfaces has dependency on System.Threading.Tasks.Extensions >= 4.5.2, and it works fine with 4.5.2 version. However if upgraded to 4.5.3 app will throw below exception ``` Unhandled Exception: System.IO.FileLoadException: Could not load file or assembly 'System.Threading.Tasks.Extensions, Version=4.2.0.0, Culture=neutral, PublicKeyToken=cc7b13ffcd2ddd51' or one of its dependencies. The located assembly's manif est definition does not match the assembly reference. (Exception from HRESULT: 0x80131040) ```
infrastructure
microsoft bcl asyncinterfaces microsoft bcl asyncinterfaces has dependency on system threading tasks extensions and it works fine with version however if upgraded to app will throw below exception unhandled exception system io fileloadexception could not load file or assembly system threading tasks extensions version culture neutral publickeytoken or one of its dependencies the located assembly s manif est definition does not match the assembly reference exception from hresult
1
34,715
6,367,713,826
IssuesEvent
2017-08-01 07:15:52
symfony/symfony-docs
https://api.github.com/repos/symfony/symfony-docs
closed
[BrowserKit] Emulate back/forward browser navigation
BrowserKit hasPR Missing Documentation
See https://github.com/symfony/symfony/pull/22341. BrowserKit now behaves as normal browsers, so let's check if we mention anywhere the old behavior as something specific to Symfony.
1.0
[BrowserKit] Emulate back/forward browser navigation - See https://github.com/symfony/symfony/pull/22341. BrowserKit now behaves as normal browsers, so let's check if we mention anywhere the old behavior as something specific to Symfony.
non_infrastructure
emulate back forward browser navigation see browserkit now behaves as normal browsers so let s check if we mention anywhere the old behavior as something specific to symfony
0
42,895
12,958,898,562
IssuesEvent
2020-07-20 12:10:11
mdsaj/LP-AngularSpring
https://api.github.com/repos/mdsaj/LP-AngularSpring
closed
CVE-2019-14379 (High) detected in jackson-databind-2.9.7.jar
security vulnerability
## CVE-2019-14379 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.7.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/LP-AngularSpring/AngularSpring/bin/pom.xml</p> <p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.7/jackson-databind-2.9.7.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.1.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.1.RELEASE.jar - :x: **jackson-databind-2.9.7.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/mdsaj/LP-AngularSpring/commit/4e7f828d4ba904c93c26ef7d7af0f753a3c44a38">4e7f828d4ba904c93c26ef7d7af0f753a3c44a38</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. <p>Publish Date: 2019-07-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379>CVE-2019-14379</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p> <p>Release Date: 2019-07-29</p> <p>Fix Resolution: 2.9.9.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-14379 (High) detected in jackson-databind-2.9.7.jar - ## CVE-2019-14379 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.7.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/LP-AngularSpring/AngularSpring/bin/pom.xml</p> <p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.7/jackson-databind-2.9.7.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.1.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.1.RELEASE.jar - :x: **jackson-databind-2.9.7.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/mdsaj/LP-AngularSpring/commit/4e7f828d4ba904c93c26ef7d7af0f753a3c44a38">4e7f828d4ba904c93c26ef7d7af0f753a3c44a38</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. <p>Publish Date: 2019-07-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379>CVE-2019-14379</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p> <p>Release Date: 2019-07-29</p> <p>Fix Resolution: 2.9.9.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_infrastructure
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tmp ws scm lp angularspring angularspring bin pom xml path to vulnerable library root repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href vulnerability details subtypevalidator java in fasterxml jackson databind before mishandles default typing when ehcache is used because of net sf ehcache transaction manager defaulttransactionmanagerlookup leading to remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
27,015
21,006,088,770
IssuesEvent
2022-03-29 22:50:19
opensearch-project/k-NN
https://api.github.com/repos/opensearch-project/k-NN
closed
Apply spotless on whole project and get rid of ratchet
Infrastructure
Currently, we only apply spotless check on files that are touched only by the PR. The goal of this was to maintain git history. However, I think we should just make one large spotless apply commit (as suggested here https://github.com/opensearch-project/k-NN/pull/328#discussion_r836714040) so that PRs dont contain changes unrelated to the PRs. What are your thoughts @VijayanB @martin-gaievski ?
1.0
Apply spotless on whole project and get rid of ratchet - Currently, we only apply spotless check on files that are touched only by the PR. The goal of this was to maintain git history. However, I think we should just make one large spotless apply commit (as suggested here https://github.com/opensearch-project/k-NN/pull/328#discussion_r836714040) so that PRs dont contain changes unrelated to the PRs. What are your thoughts @VijayanB @martin-gaievski ?
infrastructure
apply spotless on whole project and get rid of ratchet currently we only apply spotless check on files that are touched only by the pr the goal of this was to maintain git history however i think we should just make one large spotless apply commit as suggested here so that prs dont contain changes unrelated to the prs what are your thoughts vijayanb martin gaievski
1
19,161
13,196,120,149
IssuesEvent
2020-08-13 20:00:45
microsoft/react-native-windows
https://api.github.com/repos/microsoft/react-native-windows
closed
Support direct debugging when using Chakra in VS Code.
Area: Debug Infrastructure Proposal
<!-- This is a template for new feature or API proposals for React Native Windows. Use this to submit new API/component requests or behavior updates that are specific to Windows-only. For feature requests to React Native, go [here](https://github.com/react-native-community/discussions-and-proposals) instead. It's fine if you don't have all the details for the template below: you can start with the Summary and Rationale. Read more about React Native for Windows proposal process [here](https://github.com/microsoft/react-native-windows/tree/master/vnext/proposals) --> # Proposal: Support direct debugging in visual studio code <!-- Add a title for your feature or API proposal. Please be short and descriptive --> ## Summary <!-- Brief explanation of the new API or change. --> You can use VS Code for direct debugging when using V8/Hermes, but not for Chakra. This issue is for adding support. ## Motivation <!-- Why are we doing this? What use cases does it support? What is the expected outcome? Why should this be done for Windows-only? Please focus on explaining the motivation so that if this proposal is not accepted, the motivation could be used to develop alternative solutions. In other words, enumerate the constraints you are trying to solve without coupling them too closely to the solution you have in mind. --> The only way to do direct debugging with Chakra is through Visual Studio. Adding support for VS Code would allow developers to pick the tool that better suits their needs. ## Basic example <!-- [Optional] If the proposal involves a new or changed API, include a basic code example. Omit this section if it's not applicable. --> ## Open Questions <!-- Please list any open issues that you think still need to be addressed. These could include areas you think would benefit from community or the react-native-windows team input -->
1.0
Support direct debugging when using Chakra in VS Code. - <!-- This is a template for new feature or API proposals for React Native Windows. Use this to submit new API/component requests or behavior updates that are specific to Windows-only. For feature requests to React Native, go [here](https://github.com/react-native-community/discussions-and-proposals) instead. It's fine if you don't have all the details for the template below: you can start with the Summary and Rationale. Read more about React Native for Windows proposal process [here](https://github.com/microsoft/react-native-windows/tree/master/vnext/proposals) --> # Proposal: Support direct debugging in visual studio code <!-- Add a title for your feature or API proposal. Please be short and descriptive --> ## Summary <!-- Brief explanation of the new API or change. --> You can use VS Code for direct debugging when using V8/Hermes, but not for Chakra. This issue is for adding support. ## Motivation <!-- Why are we doing this? What use cases does it support? What is the expected outcome? Why should this be done for Windows-only? Please focus on explaining the motivation so that if this proposal is not accepted, the motivation could be used to develop alternative solutions. In other words, enumerate the constraints you are trying to solve without coupling them too closely to the solution you have in mind. --> The only way to do direct debugging with Chakra is through Visual Studio. Adding support for VS Code would allow developers to pick the tool that better suits their needs. ## Basic example <!-- [Optional] If the proposal involves a new or changed API, include a basic code example. Omit this section if it's not applicable. --> ## Open Questions <!-- Please list any open issues that you think still need to be addressed. These could include areas you think would benefit from community or the react-native-windows team input -->
infrastructure
support direct debugging when using chakra in vs code this is a template for new feature or api proposals for react native windows use this to submit new api component requests or behavior updates that are specific to windows only for feature requests to react native go instead it s fine if you don t have all the details for the template below you can start with the summary and rationale read more about react native for windows proposal process proposal support direct debugging in visual studio code summary you can use vs code for direct debugging when using hermes but not for chakra this issue is for adding support motivation why are we doing this what use cases does it support what is the expected outcome why should this be done for windows only please focus on explaining the motivation so that if this proposal is not accepted the motivation could be used to develop alternative solutions in other words enumerate the constraints you are trying to solve without coupling them too closely to the solution you have in mind the only way to do direct debugging with chakra is through visual studio adding support for vs code would allow developers to pick the tool that better suits their needs basic example open questions please list any open issues that you think still need to be addressed these could include areas you think would benefit from community or the react native windows team input
1
18,761
13,096,273,699
IssuesEvent
2020-08-03 15:25:03
knative/docs
https://api.github.com/repos/knative/docs
closed
First Eventing Example is Too Complicated
kind/epic kind/eventing kind/infrastructure kind/sample lifecycle/frozen
**Describe the change you'd like to see** The landing page points to an eventing example that deals with the kubernetes event source. I think it is too complicated. A simple cronjob event source should suffice. It would avoid having to setup service accounts and role binding for the k8s source to work. **Additional context** Just going through the first 4 examples of the landing page.
1.0
First Eventing Example is Too Complicated - **Describe the change you'd like to see** The landing page points to an eventing example that deals with the kubernetes event source. I think it is too complicated. A simple cronjob event source should suffice. It would avoid having to setup service accounts and role binding for the k8s source to work. **Additional context** Just going through the first 4 examples of the landing page.
infrastructure
first eventing example is too complicated describe the change you d like to see the landing page points to an eventing example that deals with the kubernetes event source i think it is too complicated a simple cronjob event source should suffice it would avoid having to setup service accounts and role binding for the source to work additional context just going through the first examples of the landing page
1
165,514
6,277,681,600
IssuesEvent
2017-07-18 12:50:46
vanilla-framework/vanilla-framework
https://api.github.com/repos/vanilla-framework/vanilla-framework
closed
Link to Grid page in strip documentation
Priority: High Status: Review
From [the “Strip” reference](https://docs.vanillaframework.io/en/patterns/strip): “The strip pattern provides a full width strip container in which to wrap a row. A strip can have light (`.p-strip--light`) or dark (`.p-strip--dark`) grey background. A `.p-strip` container should always be the parent of a `.row` and never the other way around.” Okay, but what is this “row” thing? Is it a table row? The code example suggests not. So what else?
1.0
Link to Grid page in strip documentation - From [the “Strip” reference](https://docs.vanillaframework.io/en/patterns/strip): “The strip pattern provides a full width strip container in which to wrap a row. A strip can have light (`.p-strip--light`) or dark (`.p-strip--dark`) grey background. A `.p-strip` container should always be the parent of a `.row` and never the other way around.” Okay, but what is this “row” thing? Is it a table row? The code example suggests not. So what else?
non_infrastructure
link to grid page in strip documentation from “the strip pattern provides a full width strip container in which to wrap a row a strip can have light p strip light or dark p strip dark grey background a p strip container should always be the parent of a row and never the other way around ” okay but what is this “row” thing is it a table row the code example suggests not so what else
0