Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3 values | title stringlengths 1 844 | labels stringlengths 4 721 | body stringlengths 1 261k | index stringclasses 12 values | text_combine stringlengths 96 261k | label stringclasses 2 values | text stringlengths 96 248k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
120,977 | 12,102,077,084 | IssuesEvent | 2020-04-20 16:07:54 | shubham-thakare/BMC-Creator | https://api.github.com/repos/shubham-thakare/BMC-Creator | closed | Add app summary in the README.md file. | documentation | Add some information about the BMC Creator application so that can help users to understand the use of an app. | 1.0 | Add app summary in the README.md file. - Add some information about the BMC Creator application so that can help users to understand the use of an app. | non_priority | add app summary in the readme md file add some information about the bmc creator application so that can help users to understand the use of an app | 0 |
120,070 | 12,058,568,047 | IssuesEvent | 2020-04-15 17:41:35 | layer5io/scoop-bucket | https://api.github.com/repos/layer5io/scoop-bucket | closed | Update documentation on how to install | documentation good first issue | Update documentation on how to install in ReadME.md for the Scoop installation of mesheryctl. | 1.0 | Update documentation on how to install - Update documentation on how to install in ReadME.md for the Scoop installation of mesheryctl. | non_priority | update documentation on how to install update documentation on how to install in readme md for the scoop installation of mesheryctl | 0 |
50,613 | 6,415,381,378 | IssuesEvent | 2017-08-08 12:40:37 | nextcloud/server | https://api.github.com/repos/nextcloud/server | closed | login spinner looks ugly | 1. to develop design enhancement papercut | You only see it for a few seconds but it always disturbs me, look at the screenshot:

You can almost see every individual pixel of the circle, by contrast the logout spinner looks much smoother:

@nextcloud/designers anything we can do about it? | 1.0 | login spinner looks ugly - You only see it for a few seconds but it always disturbs me, look at the screenshot:

You can almost see every individual pixel of the circle, by contrast the logout spinner looks much smoother:

@nextcloud/designers anything we can do about it? | non_priority | login spinner looks ugly you only see it for a few seconds but it always disturbs me look at the screenshot you can almost see every individual pixel of the circle by contrast the logout spinner looks much smoother nextcloud designers anything we can do about it | 0 |
306,605 | 26,483,837,622 | IssuesEvent | 2023-01-17 16:28:59 | kyma-project/kyma | https://api.github.com/repos/kyma-project/kyma | closed | Refactor EventMesh reconciler integration tests | area/eventing area/tests | In this [ticket](https://github.com/kyma-project/kyma/issues/15925), we migrated some of the EventMesh reconciler integration tests to use table-test structure. We should now migrate all the remaining EventMesh reconciler integration tests to this new format. Reason is that the existing tests are not isolated and they are dependent on each other sequentially.
**Tasks:**
- [ ] Migrate the EventMesh [reconciler integration tests](https://github.com/kyma-project/kyma/blob/main/components/eventing-controller/controllers/subscriptionv2/eventmesh/reconciler_integration_test.go) to new [table-tests structure](https://github.com/kyma-project/kyma/blob/main/components/eventing-controller/controllers/subscriptionv2/eventmesh/test/reconciler_integration_test.go).
- [ ] The tests should be isolated.
- [ ] The tests should be able to run parallel (`t.Parallel()`) | 1.0 | Refactor EventMesh reconciler integration tests - In this [ticket](https://github.com/kyma-project/kyma/issues/15925), we migrated some of the EventMesh reconciler integration tests to use table-test structure. We should now migrate all the remaining EventMesh reconciler integration tests to this new format. Reason is that the existing tests are not isolated and they are dependent on each other sequentially.
**Tasks:**
- [ ] Migrate the EventMesh [reconciler integration tests](https://github.com/kyma-project/kyma/blob/main/components/eventing-controller/controllers/subscriptionv2/eventmesh/reconciler_integration_test.go) to new [table-tests structure](https://github.com/kyma-project/kyma/blob/main/components/eventing-controller/controllers/subscriptionv2/eventmesh/test/reconciler_integration_test.go).
- [ ] The tests should be isolated.
- [ ] The tests should be able to run parallel (`t.Parallel()`) | non_priority | refactor eventmesh reconciler integration tests in this we migrated some of the eventmesh reconciler integration tests to use table test structure we should now migrate all the remaining eventmesh reconciler integration tests to this new format reason is that the existing tests are not isolated and they are dependent on each other sequentially tasks migrate the eventmesh to new the tests should be isolated the tests should be able to run parallel t parallel | 0 |
150,410 | 19,603,706,576 | IssuesEvent | 2022-01-06 06:16:45 | snykiotcubedev/redis-6.2.3 | https://api.github.com/repos/snykiotcubedev/redis-6.2.3 | opened | CVE-2021-32762 (High) detected in redis6.2.6 | security vulnerability | ## CVE-2021-32762 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>redis6.2.6</b></p></summary>
<p>
<p>Redis is an in-memory database that persists on disk. The data model is key-value, but many different kind of values are supported: Strings, Lists, Sets, Sorted Sets, Hashes, Streams, HyperLogLogs, Bitmaps.</p>
<p>Library home page: <a href=https://github.com/redis/redis.git>https://github.com/redis/redis.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/snykiotcubedev/redis-6.2.3/commit/4d9d45af08df0c37729fafce88f139952f155020">4d9d45af08df0c37729fafce88f139952f155020</a></p>
<p>Found in base branch: <b>main</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/deps/hiredis/hiredis.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies. This is a result of a vulnerability in the underlying hiredis library which does not perform an overflow check before calling the calloc() heap allocation function. This issue only impacts systems with heap allocators that do not perform their own overflow checks. Most modern systems do and are therefore not likely to be affected. Furthermore, by default redis-sentinel uses the jemalloc allocator which is also not vulnerable. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14.
<p>Publish Date: 2021-10-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32762>CVE-2021-32762</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/redis/redis/security/advisories/GHSA-833w-8v3m-8wwr">https://github.com/redis/redis/security/advisories/GHSA-833w-8v3m-8wwr</a></p>
<p>Release Date: 2021-10-04</p>
<p>Fix Resolution: 5.0.14, 6.0.16, 6.2.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-32762 (High) detected in redis6.2.6 - ## CVE-2021-32762 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>redis6.2.6</b></p></summary>
<p>
<p>Redis is an in-memory database that persists on disk. The data model is key-value, but many different kind of values are supported: Strings, Lists, Sets, Sorted Sets, Hashes, Streams, HyperLogLogs, Bitmaps.</p>
<p>Library home page: <a href=https://github.com/redis/redis.git>https://github.com/redis/redis.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/snykiotcubedev/redis-6.2.3/commit/4d9d45af08df0c37729fafce88f139952f155020">4d9d45af08df0c37729fafce88f139952f155020</a></p>
<p>Found in base branch: <b>main</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/deps/hiredis/hiredis.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies. This is a result of a vulnerability in the underlying hiredis library which does not perform an overflow check before calling the calloc() heap allocation function. This issue only impacts systems with heap allocators that do not perform their own overflow checks. Most modern systems do and are therefore not likely to be affected. Furthermore, by default redis-sentinel uses the jemalloc allocator which is also not vulnerable. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14.
<p>Publish Date: 2021-10-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32762>CVE-2021-32762</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/redis/redis/security/advisories/GHSA-833w-8v3m-8wwr">https://github.com/redis/redis/security/advisories/GHSA-833w-8v3m-8wwr</a></p>
<p>Release Date: 2021-10-04</p>
<p>Fix Resolution: 5.0.14, 6.0.16, 6.2.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in cve high severity vulnerability vulnerable library redis is an in memory database that persists on disk the data model is key value but many different kind of values are supported strings lists sets sorted sets hashes streams hyperloglogs bitmaps library home page a href found in head commit a href found in base branch main vulnerable source files deps hiredis hiredis c vulnerability details redis is an open source in memory database that persists on disk the redis cli command line tool and redis sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi bulk network replies this is a result of a vulnerability in the underlying hiredis library which does not perform an overflow check before calling the calloc heap allocation function this issue only impacts systems with heap allocators that do not perform their own overflow checks most modern systems do and are therefore not likely to be affected furthermore by default redis sentinel uses the jemalloc allocator which is also not vulnerable the problem is fixed in redis versions and publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
23,620 | 4,959,394,107 | IssuesEvent | 2016-12-02 13:16:58 | zsh-users/antigen | https://api.github.com/repos/zsh-users/antigen | closed | Add `antigen init` to README.md and wiki's `Cookbook` section | Documentation Enhancement | Document how `antigen init` works and it's usage. See [this changelog entry](https://github.com/zsh-users/antigen/blob/develop/CHANGELOG.md#110---2016-09-10).
- [x] Update wiki: https://github.com/zsh-users/antigen/wiki/Cookbook#init-command
- [x] Update README.md | 1.0 | Add `antigen init` to README.md and wiki's `Cookbook` section - Document how `antigen init` works and it's usage. See [this changelog entry](https://github.com/zsh-users/antigen/blob/develop/CHANGELOG.md#110---2016-09-10).
- [x] Update wiki: https://github.com/zsh-users/antigen/wiki/Cookbook#init-command
- [x] Update README.md | non_priority | add antigen init to readme md and wiki s cookbook section document how antigen init works and it s usage see update wiki update readme md | 0 |
55,088 | 13,963,845,614 | IssuesEvent | 2020-10-25 15:46:38 | fernandogjose/EcoAprender.Site | https://api.github.com/repos/fernandogjose/EcoAprender.Site | opened | CVE-2019-8331 (Medium) detected in bootstrap-3.3.7.min.js | security vulnerability | ## CVE-2019-8331 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.3.7.min.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: EcoAprender.Site/src/WebApplication/Scripts/core/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.7.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/fernandogjose/EcoAprender.Site/commit/e08547b67e8d98c26c1972efdd2a619dc4da690c">e08547b67e8d98c26c1972efdd2a619dc4da690c</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
<p>Publish Date: 2019-02-20
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-8331>CVE-2019-8331</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/twbs/bootstrap/pull/28236">https://github.com/twbs/bootstrap/pull/28236</a></p>
<p>Release Date: 2019-02-20</p>
<p>Fix Resolution: bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-8331 (Medium) detected in bootstrap-3.3.7.min.js - ## CVE-2019-8331 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.3.7.min.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: EcoAprender.Site/src/WebApplication/Scripts/core/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.7.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/fernandogjose/EcoAprender.Site/commit/e08547b67e8d98c26c1972efdd2a619dc4da690c">e08547b67e8d98c26c1972efdd2a619dc4da690c</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
<p>Publish Date: 2019-02-20
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-8331>CVE-2019-8331</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/twbs/bootstrap/pull/28236">https://github.com/twbs/bootstrap/pull/28236</a></p>
<p>Release Date: 2019-02-20</p>
<p>Fix Resolution: bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in bootstrap min js cve medium severity vulnerability vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library ecoaprender site src webapplication scripts core bootstrap min js dependency hierarchy x bootstrap min js vulnerable library found in head commit a href found in base branch main vulnerability details in bootstrap before and x before xss is possible in the tooltip or popover data template attribute publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bootstrap bootstrap sass step up your open source security game with whitesource | 0 |
184,857 | 21,785,016,635 | IssuesEvent | 2022-05-14 02:10:19 | nihalmurmu/automata | https://api.github.com/repos/nihalmurmu/automata | closed | WS-2020-0070 (High) detected in lodash-4.17.15.tgz - autoclosed | security vulnerability | ## WS-2020-0070 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.15.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/automata/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/automata/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- eslint-5.16.0.tgz (Root Library)
- :x: **lodash-4.17.15.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nihalmurmu/automata/commit/d287137dec49930597b48a147ee39781c3da3e66">d287137dec49930597b48a147ee39781c3da3e66</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
a prototype pollution vulnerability in lodash. It allows an attacker to inject properties on Object.prototype
<p>Publish Date: 2020-04-28
<p>URL: <a href=https://hackerone.com/reports/712065>WS-2020-0070</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2020-0070 (High) detected in lodash-4.17.15.tgz - autoclosed - ## WS-2020-0070 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.15.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/automata/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/automata/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- eslint-5.16.0.tgz (Root Library)
- :x: **lodash-4.17.15.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nihalmurmu/automata/commit/d287137dec49930597b48a147ee39781c3da3e66">d287137dec49930597b48a147ee39781c3da3e66</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
a prototype pollution vulnerability in lodash. It allows an attacker to inject properties on Object.prototype
<p>Publish Date: 2020-04-28
<p>URL: <a href=https://hackerone.com/reports/712065>WS-2020-0070</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws high detected in lodash tgz autoclosed ws high severity vulnerability vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file tmp ws scm automata package json path to vulnerable library tmp ws scm automata node modules lodash package json dependency hierarchy eslint tgz root library x lodash tgz vulnerable library found in head commit a href vulnerability details a prototype pollution vulnerability in lodash it allows an attacker to inject properties on object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource | 0 |
157,210 | 19,956,962,787 | IssuesEvent | 2022-01-28 01:09:11 | mverteuil/mig3 | https://api.github.com/repos/mverteuil/mig3 | opened | WS-2022-0008 (Medium) detected in node-forge-0.9.0.tgz | security vulnerability | ## WS-2022-0008 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.9.0.tgz</b></p></summary>
<p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz</a></p>
<p>Path to dependency file: /mig3-ui/package.json</p>
<p>Path to vulnerable library: /mig3-ui/node_modules/node-forge/package.json</p>
<p>
Dependency Hierarchy:
- cli-service-3.12.1.tgz (Root Library)
- webpack-dev-server-3.10.3.tgz
- selfsigned-1.10.7.tgz
- :x: **node-forge-0.9.0.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The forge.debug API had a potential prototype pollution issue if called with untrusted input. The API was only used for internal debug purposes in a safe way and never documented or advertised. It is suspected that uses of this API, if any exist, would likely not have used untrusted inputs in a vulnerable way.
<p>Publish Date: 2022-01-08
<p>URL: <a href=https://github.com/digitalbazaar/forge/commit/51228083550dde97701ac8e06c629a5184117562>WS-2022-0008</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-5rrq-pxf6-6jx5">https://github.com/advisories/GHSA-5rrq-pxf6-6jx5</a></p>
<p>Release Date: 2022-01-08</p>
<p>Fix Resolution: node-forge - 1.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2022-0008 (Medium) detected in node-forge-0.9.0.tgz - ## WS-2022-0008 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.9.0.tgz</b></p></summary>
<p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz</a></p>
<p>Path to dependency file: /mig3-ui/package.json</p>
<p>Path to vulnerable library: /mig3-ui/node_modules/node-forge/package.json</p>
<p>
Dependency Hierarchy:
- cli-service-3.12.1.tgz (Root Library)
- webpack-dev-server-3.10.3.tgz
- selfsigned-1.10.7.tgz
- :x: **node-forge-0.9.0.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The forge.debug API had a potential prototype pollution issue if called with untrusted input. The API was only used for internal debug purposes in a safe way and never documented or advertised. It is suspected that uses of this API, if any exist, would likely not have used untrusted inputs in a vulnerable way.
<p>Publish Date: 2022-01-08
<p>URL: <a href=https://github.com/digitalbazaar/forge/commit/51228083550dde97701ac8e06c629a5184117562>WS-2022-0008</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-5rrq-pxf6-6jx5">https://github.com/advisories/GHSA-5rrq-pxf6-6jx5</a></p>
<p>Release Date: 2022-01-08</p>
<p>Fix Resolution: node-forge - 1.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws medium detected in node forge tgz ws medium severity vulnerability vulnerable library node forge tgz javascript implementations of network transports cryptography ciphers pki message digests and various utilities library home page a href path to dependency file ui package json path to vulnerable library ui node modules node forge package json dependency hierarchy cli service tgz root library webpack dev server tgz selfsigned tgz x node forge tgz vulnerable library vulnerability details the forge debug api had a potential prototype pollution issue if called with untrusted input the api was only used for internal debug purposes in a safe way and never documented or advertised it is suspected that uses of this api if any exist would likely not have used untrusted inputs in a vulnerable way publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution node forge step up your open source security game with whitesource | 0 |
212,230 | 16,434,490,704 | IssuesEvent | 2021-05-20 07:41:47 | hzi-braunschweig/SORMAS-Project | https://api.github.com/repos/hzi-braunschweig/SORMAS-Project | closed | Create a new Task Automation flow | e2e-tests task tasks testing | ### Feature Description
We will cover the UI automation of the Create Task functionality. | 2.0 | Create a new Task Automation flow - ### Feature Description
We will cover the UI automation of the Create Task functionality. | non_priority | create a new task automation flow feature description we will cover the ui automation of the create task functionality | 0 |
116,253 | 17,359,033,024 | IssuesEvent | 2021-07-29 17:51:23 | github/roadmap | https://api.github.com/repos/github/roadmap | closed | CodeQL package manager (public beta) | beta cloud github advanced security packages security & compliance shipped | <!--
Remember to...
1. Assign the issue to the appropriate product manager (probably yourself)
2. Apply a label for: release phase, feature area, product SKU, and deployment model, per the README
3. Apply the *public roadmap* label when ready for review to be published to the public repository or the *internal roadmap* label to keep this internal
4. Add to the current year's project board, in the column for when it will ship next
5. Establish links with other internal issues either in the other issue or in the comments (to keep the description customer-friendly)
6. Head over to github/customer-feedback to comment about this roadmap issue on any relevant feedback issues
-->
#### Summary <!--(What is it?)-->
CodeQL is designed to query codebases for vulnerabilities. The queries to detect security problems are all [open source, and available in our GitHub repository](https://github.com/github/codeql). To further enable the security community to share their security knowledge, we've created the CodeQL packaging ecosystem. This enables security experts to create, share, depend on, and run CodeQL queries and libraries (much like `npm` for the JS/TS ecosystem). CodeQL packs will be available in the GitHub Package Registry (GHPR), and can easily be integrated into GitHub Code Scanning.
#### Intended Outcome <!--(Why are we building it?)-->
CodeQL query and library authors can upload their packs to the GitHub Package Registry using the CodeQL CLI. Users of Code Scanning can integrate CodeQL packs into their CodeQL Action workflow. Users of the CodeQL CLI can fetch and run query packs, as well as express dependencies on CodeQL library packs.
#### How will it work? <!--(Short description of workflow/functionality)-->
Under the hood, CodeQL packs are using GHPR's container registry: CodeQL packs are Docker containers in disguise. Users can enable CodeQL packs through Code Scanning, and further interact with packs through the [CodeQL CLI](https://github.com/github/codeql-cli-binaries/releases); there's no need to use the `docker` command. | True | CodeQL package manager (public beta) - <!--
Remember to...
1. Assign the issue to the appropriate product manager (probably yourself)
2. Apply a label for: release phase, feature area, product SKU, and deployment model, per the README
3. Apply the *public roadmap* label when ready for review to be published to the public repository or the *internal roadmap* label to keep this internal
4. Add to the current year's project board, in the column for when it will ship next
5. Establish links with other internal issues either in the other issue or in the comments (to keep the description customer-friendly)
6. Head over to github/customer-feedback to comment about this roadmap issue on any relevant feedback issues
-->
#### Summary <!--(What is it?)-->
CodeQL is designed to query codebases for vulnerabilities. The queries to detect security problems are all [open source, and available in our GitHub repository](https://github.com/github/codeql). To further enable the security community to share their security knowledge, we've created the CodeQL packaging ecosystem. This enables security experts to create, share, depend on, and run CodeQL queries and libraries (much like `npm` for the JS/TS ecosystem). CodeQL packs will be available in the GitHub Package Registry (GHPR), and can easily be integrated into GitHub Code Scanning.
#### Intended Outcome <!--(Why are we building it?)-->
CodeQL query and library authors can upload their packs to the GitHub Package Registry using the CodeQL CLI. Users of Code Scanning can integrate CodeQL packs into their CodeQL Action workflow. Users of the CodeQL CLI can fetch and run query packs, as well as express dependencies on CodeQL library packs.
#### How will it work? <!--(Short description of workflow/functionality)-->
Under the hood, CodeQL packs are using GHPR's container registry: CodeQL packs are Docker containers in disguise. Users can enable CodeQL packs through Code Scanning, and further interact with packs through the [CodeQL CLI](https://github.com/github/codeql-cli-binaries/releases); there's no need to use the `docker` command. | non_priority | codeql package manager public beta remember to assign the issue to the appropriate product manager probably yourself apply a label for release phase feature area product sku and deployment model per the readme apply the public roadmap label when ready for review to be published to the public repository or the internal roadmap label to keep this internal add to the current year s project board in the column for when it will ship next establish links with other internal issues either in the other issue or in the comments to keep the description customer friendly head over to github customer feedback to comment about this roadmap issue on any relevant feedback issues summary codeql is designed to query codebases for vulnerabilities the queries to detect security problems are all to further enable the security community to share their security knowledge we ve created the codeql packaging ecosystem this enables security experts to create share depend on and run codeql queries and libraries much like npm for the js ts ecosystem codeql packs will be available in the github package registry ghpr and can easily be integrated into github code scanning intended outcome codeql query and library authors can upload their packs to the github package registry using the codeql cli users of code scanning can integrate codeql packs into their codeql action workflow users of the codeql cli can fetch and run query packs as well as express dependencies on codeql library packs how will it work under the hood codeql packs are using ghpr s container registry codeql packs are docker containers in disguise users can enable codeql packs through code scanning and further interact with packs through the there s no need to use the docker command | 0 |
198,851 | 22,674,165,431 | IssuesEvent | 2022-07-04 01:23:33 | hilljtm/hilljtm.github.io | https://api.github.com/repos/hilljtm/hilljtm.github.io | opened | CVE-2021-23440 (High) detected in set-value-0.4.3.tgz | security vulnerability | ## CVE-2021-23440 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>set-value-0.4.3.tgz</b></p></summary>
<p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p>
<p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz">https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz</a></p>
<p>
Dependency Hierarchy:
- browser-sync-2.26.5.tgz (Root Library)
- micromatch-3.1.10.tgz
- snapdragon-0.8.2.tgz
- base-0.11.2.tgz
- cache-base-1.0.1.tgz
- union-value-1.0.0.tgz
- :x: **set-value-0.4.3.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package set-value before <2.0.1, >=3.0.0 <4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
<p>Publish Date: 2021-09-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23440>CVE-2021-23440</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23440">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23440</a></p>
<p>Release Date: 2021-09-12</p>
<p>Fix Resolution (set-value): 2.0.1</p>
<p>Direct dependency fix Resolution (browser-sync): 2.26.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-23440 (High) detected in set-value-0.4.3.tgz - ## CVE-2021-23440 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>set-value-0.4.3.tgz</b></p></summary>
<p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p>
<p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz">https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz</a></p>
<p>
Dependency Hierarchy:
- browser-sync-2.26.5.tgz (Root Library)
- micromatch-3.1.10.tgz
- snapdragon-0.8.2.tgz
- base-0.11.2.tgz
- cache-base-1.0.1.tgz
- union-value-1.0.0.tgz
- :x: **set-value-0.4.3.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package set-value before <2.0.1, >=3.0.0 <4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
<p>Publish Date: 2021-09-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23440>CVE-2021-23440</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23440">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23440</a></p>
<p>Release Date: 2021-09-12</p>
<p>Fix Resolution (set-value): 2.0.1</p>
<p>Direct dependency fix Resolution (browser-sync): 2.26.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in set value tgz cve high severity vulnerability vulnerable library set value tgz create nested values and any intermediaries using dot notation a b c paths library home page a href dependency hierarchy browser sync tgz root library micromatch tgz snapdragon tgz base tgz cache base tgz union value tgz x set value tgz vulnerable library found in base branch master vulnerability details this affects the package set value before a type confusion vulnerability can lead to a bypass of cve when the user provided keys used in the path parameter are arrays publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution set value direct dependency fix resolution browser sync step up your open source security game with mend | 0 |
97,344 | 8,653,058,953 | IssuesEvent | 2018-11-27 09:51:17 | humera987/FXLabs-Test-Automation | https://api.github.com/repos/humera987/FXLabs-Test-Automation | closed | new tested 27 : ApiV1IssuesProjectIdIdGetQueryParamPagesizeDdos | new tested 27 | Project : new tested 27
Job : UAT
Env : UAT
Region : US_WEST
Result : fail
Status Code : 404
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=NjEyZGM1N2EtOWY5Yy00NGYzLThkOGEtNTFiN2FmNWYxZjg5; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Tue, 27 Nov 2018 09:49:49 GMT]}
Endpoint : http://13.56.210.25/api/v1/api/v1/issues/project-id/GCjWPxxc?pageSize=1001&status=GCjWPxxc
Request :
Response :
{
"timestamp" : "2018-11-27T09:49:49.673+0000",
"status" : 404,
"error" : "Not Found",
"message" : "No message available",
"path" : "/api/v1/api/v1/issues/project-id/GCjWPxxc"
}
Logs :
Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]
--- FX Bot --- | 1.0 | new tested 27 : ApiV1IssuesProjectIdIdGetQueryParamPagesizeDdos - Project : new tested 27
Job : UAT
Env : UAT
Region : US_WEST
Result : fail
Status Code : 404
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=NjEyZGM1N2EtOWY5Yy00NGYzLThkOGEtNTFiN2FmNWYxZjg5; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Tue, 27 Nov 2018 09:49:49 GMT]}
Endpoint : http://13.56.210.25/api/v1/api/v1/issues/project-id/GCjWPxxc?pageSize=1001&status=GCjWPxxc
Request :
Response :
{
"timestamp" : "2018-11-27T09:49:49.673+0000",
"status" : 404,
"error" : "Not Found",
"message" : "No message available",
"path" : "/api/v1/api/v1/issues/project-id/GCjWPxxc"
}
Logs :
Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]
--- FX Bot --- | non_priority | new tested project new tested job uat env uat region us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options set cookie content type transfer encoding date endpoint request response timestamp status error not found message no message available path api api issues project id gcjwpxxc logs assertion resolved to result assertion resolved to result fx bot | 0 |
69,810 | 15,035,585,676 | IssuesEvent | 2021-02-02 14:18:59 | rsoreq/beats | https://api.github.com/repos/rsoreq/beats | opened | CVE-2020-13757 (High) detected in rsa-3.4.2-py2.py3-none-any.whl | security vulnerability | ## CVE-2020-13757 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>rsa-3.4.2-py2.py3-none-any.whl</b></p></summary>
<p>Pure-Python RSA implementation</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/e1/ae/baedc9cb175552e95f3395c43055a6a5e125ae4d48a1d7a924baca83e92e/rsa-3.4.2-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/e1/ae/baedc9cb175552e95f3395c43055a6a5e125ae4d48a1d7a924baca83e92e/rsa-3.4.2-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: beats/metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt</p>
<p>Path to vulnerable library: beats/metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **rsa-3.4.2-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/rsoreq/beats/commit/a2fa76330818078401465c112c08c753b82a0aec">a2fa76330818078401465c112c08c753b82a0aec</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
<p>Publish Date: 2020-06-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13757>CVE-2020-13757</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/sybrenstuvel/python-rsa/commit/3283b1284475cf6c79a7329aee8bd7443cc72672">https://github.com/sybrenstuvel/python-rsa/commit/3283b1284475cf6c79a7329aee8bd7443cc72672</a></p>
<p>Release Date: 2020-06-01</p>
<p>Fix Resolution: rsa - 4.1</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"rsa","packageVersion":"3.4.2","packageFilePaths":["/metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"rsa:3.4.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"rsa - 4.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-13757","vulnerabilityDetails":"Python-RSA before 4.1 ignores leading \u0027\\0\u0027 bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13757","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-13757 (High) detected in rsa-3.4.2-py2.py3-none-any.whl - ## CVE-2020-13757 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>rsa-3.4.2-py2.py3-none-any.whl</b></p></summary>
<p>Pure-Python RSA implementation</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/e1/ae/baedc9cb175552e95f3395c43055a6a5e125ae4d48a1d7a924baca83e92e/rsa-3.4.2-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/e1/ae/baedc9cb175552e95f3395c43055a6a5e125ae4d48a1d7a924baca83e92e/rsa-3.4.2-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: beats/metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt</p>
<p>Path to vulnerable library: beats/metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **rsa-3.4.2-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/rsoreq/beats/commit/a2fa76330818078401465c112c08c753b82a0aec">a2fa76330818078401465c112c08c753b82a0aec</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
<p>Publish Date: 2020-06-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13757>CVE-2020-13757</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/sybrenstuvel/python-rsa/commit/3283b1284475cf6c79a7329aee8bd7443cc72672">https://github.com/sybrenstuvel/python-rsa/commit/3283b1284475cf6c79a7329aee8bd7443cc72672</a></p>
<p>Release Date: 2020-06-01</p>
<p>Fix Resolution: rsa - 4.1</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"rsa","packageVersion":"3.4.2","packageFilePaths":["/metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"rsa:3.4.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"rsa - 4.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-13757","vulnerabilityDetails":"Python-RSA before 4.1 ignores leading \u0027\\0\u0027 bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13757","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in rsa none any whl cve high severity vulnerability vulnerable library rsa none any whl pure python rsa implementation library home page a href path to dependency file beats metricbeat module kubernetes meta terraform eks requirements txt path to vulnerable library beats metricbeat module kubernetes meta terraform eks requirements txt dependency hierarchy x rsa none any whl vulnerable library found in head commit a href found in base branch master vulnerability details python rsa before ignores leading bytes during decryption of ciphertext this could conceivably have a security relevant impact e g by helping an attacker to infer that an application uses python rsa or if the length of accepted ciphertext affects application behavior such as by causing excessive memory allocation publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rsa rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree rsa isminimumfixversionavailable true minimumfixversion rsa basebranches vulnerabilityidentifier cve vulnerabilitydetails python rsa before ignores leading bytes during decryption of ciphertext this could conceivably have a security relevant impact e g by helping an attacker to infer that an application uses python rsa or if the length of accepted ciphertext affects application behavior such as by causing excessive memory allocation vulnerabilityurl | 0 |
25,160 | 4,230,409,588 | IssuesEvent | 2016-07-04 11:56:52 | vaadin/archetype-application-example-test | https://api.github.com/repos/vaadin/archetype-application-example-test | closed | Project creation with maven archetype is broken | Defect Imported from Trac | **Originally by _andreas.kull@gmail.com_ on 2015-10-08 12:11:51 +0300**
___
Creating a project as described in [https://vaadin.com/book/-/page/getting-started.maven.html] with the command
```
mvn archetype:generate -DarchetypeGroupId=com.vaadin -DarchetypeArtifactId=vaadin-archetype-application -DarchetypeVersion=7.5.7 -DgroupId=your.company -DartifactId=project-name -Dversion=1.0 -Dpackaging=war
```
and running
```
mvn package
```
fails with the following error:
```
[ERROR] Failed to execute goal com.vaadin:vaadin-maven-plugin:7.5.7:update-theme (default) on project project-name: The goal update-theme requires Vaadin 7.1 or later -> [Help 1]
```
Doing the same with the parameter -DarchetypeVersion=7.5.4 works fine though.
https://dev.vaadin.com/ticket/19094 | 1.0 | Project creation with maven archetype is broken - **Originally by _andreas.kull@gmail.com_ on 2015-10-08 12:11:51 +0300**
___
Creating a project as described in [https://vaadin.com/book/-/page/getting-started.maven.html] with the command
```
mvn archetype:generate -DarchetypeGroupId=com.vaadin -DarchetypeArtifactId=vaadin-archetype-application -DarchetypeVersion=7.5.7 -DgroupId=your.company -DartifactId=project-name -Dversion=1.0 -Dpackaging=war
```
and running
```
mvn package
```
fails with the following error:
```
[ERROR] Failed to execute goal com.vaadin:vaadin-maven-plugin:7.5.7:update-theme (default) on project project-name: The goal update-theme requires Vaadin 7.1 or later -> [Help 1]
```
Doing the same with the parameter -DarchetypeVersion=7.5.4 works fine though.
https://dev.vaadin.com/ticket/19094 | non_priority | project creation with maven archetype is broken originally by andreas kull gmail com on creating a project as described in with the command mvn archetype generate darchetypegroupid com vaadin darchetypeartifactid vaadin archetype application darchetypeversion dgroupid your company dartifactid project name dversion dpackaging war and running mvn package fails with the following error failed to execute goal com vaadin vaadin maven plugin update theme default on project project name the goal update theme requires vaadin or later doing the same with the parameter darchetypeversion works fine though | 0 |
25,005 | 7,611,134,812 | IssuesEvent | 2018-05-01 12:30:43 | hyperledger/composer | https://api.github.com/repos/hyperledger/composer | closed | Update karma to work with Firefox | build help wanted stale | Composer Unit-tests currently make use of google-chrome browser which is not available for ppc64le arch, hence update relevant changes to work with Firefox instead, which is available across all arch. | 1.0 | Update karma to work with Firefox - Composer Unit-tests currently make use of google-chrome browser which is not available for ppc64le arch, hence update relevant changes to work with Firefox instead, which is available across all arch. | non_priority | update karma to work with firefox composer unit tests currently make use of google chrome browser which is not available for arch hence update relevant changes to work with firefox instead which is available across all arch | 0 |
162,304 | 25,517,760,297 | IssuesEvent | 2022-11-28 17:42:26 | nextcloud/mail | https://api.github.com/repos/nextcloud/mail | closed | Content extends message element | bug 3. to review design regression | ### Steps to reproduce
1. Open the app
2. Configure an account
3. Open a somewhat longer HTML message
### Expected behavior
Well designed app
### Actual behavior


### Mail app version
2.2
### Mailserver or service
_No response_
### Operating system
_No response_
### PHP engine version
_No response_
### Web server
_No response_
### Database
_No response_
### Additional info
Git bisect leads me to e86cc894aa3cfa8e1cbbb6451fe87e7e90f86c99. | 1.0 | Content extends message element - ### Steps to reproduce
1. Open the app
2. Configure an account
3. Open a somewhat longer HTML message
### Expected behavior
Well designed app
### Actual behavior


### Mail app version
2.2
### Mailserver or service
_No response_
### Operating system
_No response_
### PHP engine version
_No response_
### Web server
_No response_
### Database
_No response_
### Additional info
Git bisect leads me to e86cc894aa3cfa8e1cbbb6451fe87e7e90f86c99. | non_priority | content extends message element steps to reproduce open the app configure an account open a somewhat longer html message expected behavior well designed app actual behavior mail app version mailserver or service no response operating system no response php engine version no response web server no response database no response additional info git bisect leads me to | 0 |
50,857 | 13,608,188,927 | IssuesEvent | 2020-09-23 01:38:53 | peilin823/peilin823-security_test_demo1 | https://api.github.com/repos/peilin823/peilin823-security_test_demo1 | opened | CVE-2015-9251 (Medium) detected in jquery-1.7.2.min.js | security vulnerability | ## CVE-2015-9251 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.2.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p>
<p>Path to dependency file: peilin823-security_test_demo1/node_modules/marked/www/demo.html</p>
<p>Path to vulnerable library: peilin823-security_test_demo1/node_modules/marked/www/demo.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.7.2.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/peilin823/peilin823-security_test_demo1/commit/9cbc07e9a44117e1b35984fd315cbd4aec36fd41">9cbc07e9a44117e1b35984fd315cbd4aec36fd41</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251>CVE-2015-9251</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v3.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2015-9251 (Medium) detected in jquery-1.7.2.min.js - ## CVE-2015-9251 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.2.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p>
<p>Path to dependency file: peilin823-security_test_demo1/node_modules/marked/www/demo.html</p>
<p>Path to vulnerable library: peilin823-security_test_demo1/node_modules/marked/www/demo.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.7.2.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/peilin823/peilin823-security_test_demo1/commit/9cbc07e9a44117e1b35984fd315cbd4aec36fd41">9cbc07e9a44117e1b35984fd315cbd4aec36fd41</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251>CVE-2015-9251</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v3.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in jquery min js cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file security test node modules marked www demo html path to vulnerable library security test node modules marked www demo html dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch master vulnerability details jquery before is vulnerable to cross site scripting xss attacks when a cross domain ajax request is performed without the datatype option causing text javascript responses to be executed publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource | 0 |
14,542 | 3,275,853,573 | IssuesEvent | 2015-10-26 17:04:04 | scalaz/scalaz-stream | https://api.github.com/repos/scalaz/scalaz-stream | closed | Replace Either by Try in fs2.util.Task | design/refactoring | Just an idea. I believe `scala.Try` type has better suit for failure representation then scala's Either, probably as well resulting in better readable code. | 1.0 | Replace Either by Try in fs2.util.Task - Just an idea. I believe `scala.Try` type has better suit for failure representation then scala's Either, probably as well resulting in better readable code. | non_priority | replace either by try in util task just an idea i believe scala try type has better suit for failure representation then scala s either probably as well resulting in better readable code | 0 |
26,983 | 13,162,726,767 | IssuesEvent | 2020-08-10 22:17:11 | mozilla-mobile/fenix | https://api.github.com/repos/mozilla-mobile/fenix | reopened | FNX3-14276 ⁃ Investigate cold startup regression 5/14 (15ms) | eng:performance | HANOOB:
- 5/10: 1.44284
- (intermediate dates are N/A)
- 5/14: 1.45973
We should find the root cause. | True | FNX3-14276 ⁃ Investigate cold startup regression 5/14 (15ms) - HANOOB:
- 5/10: 1.44284
- (intermediate dates are N/A)
- 5/14: 1.45973
We should find the root cause. | non_priority | ⁃ investigate cold startup regression hanoob intermediate dates are n a we should find the root cause | 0 |
79,976 | 7,735,440,810 | IssuesEvent | 2018-05-27 15:09:49 | opennars/opennars | https://api.github.com/repos/opennars/opennars | opened | Parallel NALTests | testing | The iteration time of the development can get greatly speed up if a lot of the tests happen in parallel. | 1.0 | Parallel NALTests - The iteration time of the development can get greatly speed up if a lot of the tests happen in parallel. | non_priority | parallel naltests the iteration time of the development can get greatly speed up if a lot of the tests happen in parallel | 0 |
270,822 | 20,611,141,571 | IssuesEvent | 2022-03-07 08:45:32 | airbytehq/airbyte | https://api.github.com/repos/airbytehq/airbyte | opened | Document in which case the API is useful | area/documentation type/enhancement | > In airflow, i write my dags in python code, and in dbt i write my data transformations in code. is there a way to define connections in airbyte as code? so that we can version control, integrate into ci/cd pipelines, etc
Created from Slack: https://airbytehq.slack.com/archives/C021JANJ6TY/p1637828689461100?thread_ts=1637828689.461100&cid=C021JANJ6TY | 1.0 | Document in which case the API is useful - > In airflow, i write my dags in python code, and in dbt i write my data transformations in code. is there a way to define connections in airbyte as code? so that we can version control, integrate into ci/cd pipelines, etc
Created from Slack: https://airbytehq.slack.com/archives/C021JANJ6TY/p1637828689461100?thread_ts=1637828689.461100&cid=C021JANJ6TY | non_priority | document in which case the api is useful in airflow i write my dags in python code and in dbt i write my data transformations in code is there a way to define connections in airbyte as code so that we can version control integrate into ci cd pipelines etc created from slack | 0 |
54,428 | 6,820,260,135 | IssuesEvent | 2017-11-07 13:19:47 | sul-dlss/exhibits | https://api.github.com/repos/sul-dlss/exhibits | closed | Add sidebar link to "See Also" on exhibits.stanford.edu | design needed in progress | Above the link to "Request an exhibit" -- please add a link (with the red Stanford "S" next to it), called:
Market your exhibit
https://consul.stanford.edu/x/2ok1CQ | 1.0 | Add sidebar link to "See Also" on exhibits.stanford.edu - Above the link to "Request an exhibit" -- please add a link (with the red Stanford "S" next to it), called:
Market your exhibit
https://consul.stanford.edu/x/2ok1CQ | non_priority | add sidebar link to see also on exhibits stanford edu above the link to request an exhibit please add a link with the red stanford s next to it called market your exhibit | 0 |
98,169 | 29,499,342,418 | IssuesEvent | 2023-06-02 20:01:20 | orbeon/orbeon-forms | https://api.github.com/repos/orbeon/orbeon-forms | closed | Form Builder should not add `bind` to custom dialog in form definition | Module: Form Builder | Possibilities:
- don't process code under `<xxf:dialog>` since we don't handle that
- or don't process code binding to custom instances
We kind of support officially [custom dialogs within a form definition](https://doc.orbeon.com/form-runner/advanced/custom).
- [ ] fix
- [ ] backport to 2021.1.x
[+1 from customer](https://3.basecamp.com/3600924/buckets/7545500/messages/5714376643#__recording_5968960665) | 1.0 | Form Builder should not add `bind` to custom dialog in form definition - Possibilities:
- don't process code under `<xxf:dialog>` since we don't handle that
- or don't process code binding to custom instances
We kind of support officially [custom dialogs within a form definition](https://doc.orbeon.com/form-runner/advanced/custom).
- [ ] fix
- [ ] backport to 2021.1.x
[+1 from customer](https://3.basecamp.com/3600924/buckets/7545500/messages/5714376643#__recording_5968960665) | non_priority | form builder should not add bind to custom dialog in form definition possibilities don t process code under since we don t handle that or don t process code binding to custom instances we kind of support officially fix backport to x | 0 |
18,870 | 5,725,626,748 | IssuesEvent | 2017-04-20 17:00:32 | jOOQ/jOOQ | https://api.github.com/repos/jOOQ/jOOQ | closed | NullPointerException when generating code in single-uppercase-named-database setup on MariaDB and MySQL | C: Code Generation C: DB: MariaDB C: DB: MySQL P: High R: Fixed T: Defect | It appears that we (or MariaDB) have a case-sensitivity issue related to schema name cases. This issue produces a `NullPointerException`, as we do find tables for an upper case schema name, but we cannot find the schema itself.
Exception:
```
2016-04-21T16:08:52,356 [main] ERROR org.jooq.util.AbstractDatabase - Error while fetching tables
java.lang.NullPointerException
at org.jooq.util.AbstractElementContainerDefinition.<init>(AbstractElementContainerDefinition.java:75) ~[jooq-meta-3.7.3.jar:?]
at org.jooq.util.AbstractTableDefinition.<init>(AbstractTableDefinition.java:68) ~[jooq-meta-3.7.3.jar:?]
at org.jooq.util.mysql.MySQLTableDefinition.<init>(MySQLTableDefinition.java:69) ~[jooq-meta-3.7.3.jar:?]
at org.jooq.util.mysql.MySQLDatabase.getTables0(MySQLDatabase.java:247) ~[jooq-meta-3.7.3.jar:?]
at org.jooq.util.AbstractDatabase.getTables(AbstractDatabase.java:730) [jooq-meta-3.7.3.jar:?]
at org.jooq.util.JavaGenerator.generateSchema(JavaGenerator.java:3346) [jooq-codegen-3.7.3.jar:?]
at org.jooq.util.JavaGenerator.generateSchema(JavaGenerator.java:3303) [jooq-codegen-3.7.3.jar:?]
at org.jooq.util.JavaGenerator.generate(JavaGenerator.java:301) [jooq-codegen-3.7.3.jar:?]
at org.jooq.util.JavaGenerator.generate(JavaGenerator.java:268) [jooq-codegen-3.7.3.jar:?]
at org.jooq.util.GenerationTool.run(GenerationTool.java:434) [jooq-codegen-3.7.3.jar:?]
at org.jooq.util.GenerationTool.generate(GenerationTool.java:180) [jooq-codegen-3.7.3.jar:?]
at org.jooq.util.GenerationTool.main(GenerationTool.java:151) [jooq-codegen-3.7.3.jar:?]
at com.proquest.pqd.canon.GenerateJooqFiles.main(GenerateJooqFiles.java:31) [test-classes/:?]
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:1.8.0_31]
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:1.8.0_31]
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.8.0_31]
at java.lang.reflect.Method.invoke(Method.java:483) ~[?:1.8.0_31]
at com.intellij.rt.execution.application.AppMain.main(AppMain.java:144) [idea_rt.jar:?]
```
Further analysis is required
---
See also:
https://groups.google.com/forum/#!topic/jooq-user/FFaXsjjQ4Ck
| 1.0 | NullPointerException when generating code in single-uppercase-named-database setup on MariaDB and MySQL - It appears that we (or MariaDB) have a case-sensitivity issue related to schema name cases. This issue produces a `NullPointerException`, as we do find tables for an upper case schema name, but we cannot find the schema itself.
Exception:
```
2016-04-21T16:08:52,356 [main] ERROR org.jooq.util.AbstractDatabase - Error while fetching tables
java.lang.NullPointerException
at org.jooq.util.AbstractElementContainerDefinition.<init>(AbstractElementContainerDefinition.java:75) ~[jooq-meta-3.7.3.jar:?]
at org.jooq.util.AbstractTableDefinition.<init>(AbstractTableDefinition.java:68) ~[jooq-meta-3.7.3.jar:?]
at org.jooq.util.mysql.MySQLTableDefinition.<init>(MySQLTableDefinition.java:69) ~[jooq-meta-3.7.3.jar:?]
at org.jooq.util.mysql.MySQLDatabase.getTables0(MySQLDatabase.java:247) ~[jooq-meta-3.7.3.jar:?]
at org.jooq.util.AbstractDatabase.getTables(AbstractDatabase.java:730) [jooq-meta-3.7.3.jar:?]
at org.jooq.util.JavaGenerator.generateSchema(JavaGenerator.java:3346) [jooq-codegen-3.7.3.jar:?]
at org.jooq.util.JavaGenerator.generateSchema(JavaGenerator.java:3303) [jooq-codegen-3.7.3.jar:?]
at org.jooq.util.JavaGenerator.generate(JavaGenerator.java:301) [jooq-codegen-3.7.3.jar:?]
at org.jooq.util.JavaGenerator.generate(JavaGenerator.java:268) [jooq-codegen-3.7.3.jar:?]
at org.jooq.util.GenerationTool.run(GenerationTool.java:434) [jooq-codegen-3.7.3.jar:?]
at org.jooq.util.GenerationTool.generate(GenerationTool.java:180) [jooq-codegen-3.7.3.jar:?]
at org.jooq.util.GenerationTool.main(GenerationTool.java:151) [jooq-codegen-3.7.3.jar:?]
at com.proquest.pqd.canon.GenerateJooqFiles.main(GenerateJooqFiles.java:31) [test-classes/:?]
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:1.8.0_31]
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:1.8.0_31]
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.8.0_31]
at java.lang.reflect.Method.invoke(Method.java:483) ~[?:1.8.0_31]
at com.intellij.rt.execution.application.AppMain.main(AppMain.java:144) [idea_rt.jar:?]
```
Further analysis is required
---
See also:
https://groups.google.com/forum/#!topic/jooq-user/FFaXsjjQ4Ck
| non_priority | nullpointerexception when generating code in single uppercase named database setup on mariadb and mysql it appears that we or mariadb have a case sensitivity issue related to schema name cases this issue produces a nullpointerexception as we do find tables for an upper case schema name but we cannot find the schema itself exception error org jooq util abstractdatabase error while fetching tables java lang nullpointerexception at org jooq util abstractelementcontainerdefinition abstractelementcontainerdefinition java at org jooq util abstracttabledefinition abstracttabledefinition java at org jooq util mysql mysqltabledefinition mysqltabledefinition java at org jooq util mysql mysqldatabase mysqldatabase java at org jooq util abstractdatabase gettables abstractdatabase java at org jooq util javagenerator generateschema javagenerator java at org jooq util javagenerator generateschema javagenerator java at org jooq util javagenerator generate javagenerator java at org jooq util javagenerator generate javagenerator java at org jooq util generationtool run generationtool java at org jooq util generationtool generate generationtool java at org jooq util generationtool main generationtool java at com proquest pqd canon generatejooqfiles main generatejooqfiles java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at com intellij rt execution application appmain main appmain java further analysis is required see also | 0 |
66,026 | 14,766,755,363 | IssuesEvent | 2021-01-10 02:15:34 | mwilliams7197/WebGoat-Legacy | https://api.github.com/repos/mwilliams7197/WebGoat-Legacy | reopened | CVE-2014-3596 (Medium) detected in axis-1.2.jar | security vulnerability | ## CVE-2014-3596 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>axis-1.2.jar</b></p></summary>
<p>null</p>
<p>Path to dependency file: WebGoat-Legacy/pom.xml</p>
<p>Path to vulnerable library: canner/.m2/repository/axis/axis/1.2/axis-1.2.jar,WebGoat-Legacy/target/WebGoat-6.0.1/WEB-INF/lib/axis-1.2.jar</p>
<p>
Dependency Hierarchy:
- :x: **axis-1.2.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
<p>Publish Date: 2014-08-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-3596>CVE-2014-3596</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.8</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://xforce.iss.net/xforce/xfdb/95377">http://xforce.iss.net/xforce/xfdb/95377</a></p>
<p>Release Date: 2017-12-31</p>
<p>Fix Resolution: Refer to Apache Web site for patch, upgrade or suggested workaround information. See References.
For IBM products:
Refer to the appropriate IBM Security Bulletin for patch, upgrade or suggested workaround information. See References.
For other distributions:
Apply the appropriate update for your system.</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"axis","packageName":"axis","packageVersion":"1.2","isTransitiveDependency":false,"dependencyTree":"axis:axis:1.2","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2014-3596","vulnerabilityDetails":"The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-3596","cvss2Severity":"medium","cvss2Score":"5.8","extraData":{}}</REMEDIATE> --> | True | CVE-2014-3596 (Medium) detected in axis-1.2.jar - ## CVE-2014-3596 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>axis-1.2.jar</b></p></summary>
<p>null</p>
<p>Path to dependency file: WebGoat-Legacy/pom.xml</p>
<p>Path to vulnerable library: canner/.m2/repository/axis/axis/1.2/axis-1.2.jar,WebGoat-Legacy/target/WebGoat-6.0.1/WEB-INF/lib/axis-1.2.jar</p>
<p>
Dependency Hierarchy:
- :x: **axis-1.2.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
<p>Publish Date: 2014-08-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-3596>CVE-2014-3596</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.8</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://xforce.iss.net/xforce/xfdb/95377">http://xforce.iss.net/xforce/xfdb/95377</a></p>
<p>Release Date: 2017-12-31</p>
<p>Fix Resolution: Refer to Apache Web site for patch, upgrade or suggested workaround information. See References.
For IBM products:
Refer to the appropriate IBM Security Bulletin for patch, upgrade or suggested workaround information. See References.
For other distributions:
Apply the appropriate update for your system.</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"axis","packageName":"axis","packageVersion":"1.2","isTransitiveDependency":false,"dependencyTree":"axis:axis:1.2","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2014-3596","vulnerabilityDetails":"The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-3596","cvss2Severity":"medium","cvss2Score":"5.8","extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in axis jar cve medium severity vulnerability vulnerable library axis jar null path to dependency file webgoat legacy pom xml path to vulnerable library canner repository axis axis axis jar webgoat legacy target webgoat web inf lib axis jar dependency hierarchy x axis jar vulnerable library vulnerability details the getcn function in apache axis and earlier does not properly verify that the server hostname matches a domain name in the subject s common name cn or subjectaltname field of the x certificate which allows man in the middle attackers to spoof ssl servers via a certificate with a subject that specifies a common name in a field that is not the cn field note this issue exists because of an incomplete fix for cve publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution refer to apache web site for patch upgrade or suggested workaround information see references for ibm products refer to the appropriate ibm security bulletin for patch upgrade or suggested workaround information see references for other distributions apply the appropriate update for your system isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails the getcn function in apache axis and earlier does not properly verify that the server hostname matches a domain name in the subject common name cn or subjectaltname field of the x certificate which allows man in the middle attackers to spoof ssl servers via a certificate with a subject that specifies a common name in a field that is not the cn field note this issue exists because of an incomplete fix for cve vulnerabilityurl | 0 |
16,226 | 4,029,506,947 | IssuesEvent | 2016-05-18 10:55:21 | ehcache/ehcache3 | https://api.github.com/repos/ehcache/ehcache3 | closed | User facing doc for clustered CacheManager creation | clustering documentation under review | Using the existing format of asciidoc + callouts to a sample that is executed as part of the test suite. | 1.0 | User facing doc for clustered CacheManager creation - Using the existing format of asciidoc + callouts to a sample that is executed as part of the test suite. | non_priority | user facing doc for clustered cachemanager creation using the existing format of asciidoc callouts to a sample that is executed as part of the test suite | 0 |
102,126 | 31,835,827,285 | IssuesEvent | 2023-09-14 13:28:23 | moby/buildkit | https://api.github.com/repos/moby/buildkit | closed | Make whiteout timestamps reproducible | area/reproducible-builds | > > Is this going to apply as well for whiteout files?
>
> Needs:
> - https://github.com/containerd/containerd/pull/7478
_Originally posted by @AkihiroSuda in https://github.com/moby/buildkit/issues/2918#issuecomment-1272164456_
| 1.0 | Make whiteout timestamps reproducible - > > Is this going to apply as well for whiteout files?
>
> Needs:
> - https://github.com/containerd/containerd/pull/7478
_Originally posted by @AkihiroSuda in https://github.com/moby/buildkit/issues/2918#issuecomment-1272164456_
| non_priority | make whiteout timestamps reproducible is this going to apply as well for whiteout files needs originally posted by akihirosuda in | 0 |
134,554 | 10,919,389,868 | IssuesEvent | 2019-11-21 18:55:21 | Vachok/ftpplus | https://api.github.com/repos/Vachok/ftpplus | closed | testMain | Medium TestQuality bug resolution_Fixed | Execute IntoApplicationTest::testMain**testMain**
*IntoApplicationTest*
*Could not initialize class ru.vachok.networker.IntoApplication*
*java.lang.NoClassDefFoundError* | 1.0 | testMain - Execute IntoApplicationTest::testMain**testMain**
*IntoApplicationTest*
*Could not initialize class ru.vachok.networker.IntoApplication*
*java.lang.NoClassDefFoundError* | non_priority | testmain execute intoapplicationtest testmain testmain intoapplicationtest could not initialize class ru vachok networker intoapplication java lang noclassdeffounderror | 0 |
315,943 | 27,121,025,273 | IssuesEvent | 2023-02-15 22:54:24 | apache/tvm | https://api.github.com/repos/apache/tvm | opened | [Flaky Test] `tests/micro/common/test_tvmc.py::test_tvmc_model_run[zephyr-qemu_x86-output_dirX]` | test: flaky | These tests were found to be flaky (intermittently failing on `main` or failed in a PR with unrelated changes). See [the docs](https://github.com/apache/tvm/blob/main/docs/contribute/ci.rst#handling-flaky-failures) for details.
### Tests(s)
- `tests/micro/common/test_tvmc.py::test_tvmc_model_run[zephyr-qemu_x86-output_dir0]`
- `tests/micro/common/test_tvmc.py::test_tvmc_model_run[zephyr-qemu_x86-output_dir1]`
### Jenkins Links
This was observed multiple times in local runs. | 1.0 | [Flaky Test] `tests/micro/common/test_tvmc.py::test_tvmc_model_run[zephyr-qemu_x86-output_dirX]` - These tests were found to be flaky (intermittently failing on `main` or failed in a PR with unrelated changes). See [the docs](https://github.com/apache/tvm/blob/main/docs/contribute/ci.rst#handling-flaky-failures) for details.
### Tests(s)
- `tests/micro/common/test_tvmc.py::test_tvmc_model_run[zephyr-qemu_x86-output_dir0]`
- `tests/micro/common/test_tvmc.py::test_tvmc_model_run[zephyr-qemu_x86-output_dir1]`
### Jenkins Links
This was observed multiple times in local runs. | non_priority | tests micro common test tvmc py test tvmc model run these tests were found to be flaky intermittently failing on main or failed in a pr with unrelated changes see for details tests s tests micro common test tvmc py test tvmc model run tests micro common test tvmc py test tvmc model run jenkins links this was observed multiple times in local runs | 0 |
291,555 | 21,929,690,775 | IssuesEvent | 2022-05-23 08:39:30 | rucio/rucio | https://api.github.com/repos/rucio/rucio | closed | Operators documentation and recipe repository | enhancement Documentation | Motivation
----------
As discussed at the Community workshop. We want to establish some kind of repository for operator documentation / recipes which allows convenient ways of contribution (Wiki or similar)
| 1.0 | Operators documentation and recipe repository - Motivation
----------
As discussed at the Community workshop. We want to establish some kind of repository for operator documentation / recipes which allows convenient ways of contribution (Wiki or similar)
| non_priority | operators documentation and recipe repository motivation as discussed at the community workshop we want to establish some kind of repository for operator documentation recipes which allows convenient ways of contribution wiki or similar | 0 |
67,379 | 8,128,547,034 | IssuesEvent | 2018-08-17 12:15:32 | owncloud/ios-app | https://api.github.com/repos/owncloud/ios-app | closed | Files: Rename a file or folder | Design discussion feature: file operation | _As a user, i want the possibility to rename a file, so that i can set a different name to my files or folders_
AC:
- [ ] Set the option to rename in the file list
- [ ] Set a dialog in order to let the user choose a new name for the item
- [ ] The user can cancel the operation
- [ ] Send the request and get the response
- [ ] Handle issues
- [ ] Refresh the list view to show the new status
- [ ] If the user remove the name the `Done` button should appear disabled
- [ ] QA
Mockups:



Figma design:
https://www.figma.com/file/Ui4YzD3oQcxJSbzBEr80O9eU/Working-Draft-UI?node-id=1816%3A3862
| 1.0 | Files: Rename a file or folder - _As a user, i want the possibility to rename a file, so that i can set a different name to my files or folders_
AC:
- [ ] Set the option to rename in the file list
- [ ] Set a dialog in order to let the user choose a new name for the item
- [ ] The user can cancel the operation
- [ ] Send the request and get the response
- [ ] Handle issues
- [ ] Refresh the list view to show the new status
- [ ] If the user remove the name the `Done` button should appear disabled
- [ ] QA
Mockups:



Figma design:
https://www.figma.com/file/Ui4YzD3oQcxJSbzBEr80O9eU/Working-Draft-UI?node-id=1816%3A3862
| non_priority | files rename a file or folder as a user i want the possibility to rename a file so that i can set a different name to my files or folders ac set the option to rename in the file list set a dialog in order to let the user choose a new name for the item the user can cancel the operation send the request and get the response handle issues refresh the list view to show the new status if the user remove the name the done button should appear disabled qa mockups figma design | 0 |
65,276 | 19,309,585,961 | IssuesEvent | 2021-12-13 14:59:52 | vector-im/element-web | https://api.github.com/repos/vector-im/element-web | closed | Expand sidepanel "lip" is not darkened when in dark mode | T-Defect S-Minor A-Room-List A-Spaces A-Appearance O-Occasional | ### Steps to reproduce
(Design issue)
### Outcome
#### What did you expect?
A similarly-themed button.
#### What happened instead?

### Operating system
Linux
### Browser information
Brave (Version 1.26.67 Chromium: 91.0.4472.114)
### URL for webapp
develop.element.io
### Application version
Element version: b0abbfacd48b-react-b4b81a455e14-js-39a8399977af Olm version: 3.2.3
### Homeserver
matrix.org
### Will you send logs?
No | 1.0 | Expand sidepanel "lip" is not darkened when in dark mode - ### Steps to reproduce
(Design issue)
### Outcome
#### What did you expect?
A similarly-themed button.
#### What happened instead?

### Operating system
Linux
### Browser information
Brave (Version 1.26.67 Chromium: 91.0.4472.114)
### URL for webapp
develop.element.io
### Application version
Element version: b0abbfacd48b-react-b4b81a455e14-js-39a8399977af Olm version: 3.2.3
### Homeserver
matrix.org
### Will you send logs?
No | non_priority | expand sidepanel lip is not darkened when in dark mode steps to reproduce design issue outcome what did you expect a similarly themed button what happened instead operating system linux browser information brave version chromium url for webapp develop element io application version element version react js olm version homeserver matrix org will you send logs no | 0 |
217,244 | 16,848,841,221 | IssuesEvent | 2021-06-20 04:14:50 | hakehuang/infoflow | https://api.github.com/repos/hakehuang/infoflow | opened |
tests-ci :kernel.memory_protection.mem_domain_remove_add_partition : zephyr-v2.6.0-286-g46029914a7ac: lpcxpresso55s28: test Timeout
| area: Tests |
**Describe the bug**
kernel.memory_protection.mem_domain_remove_add_partition test is Timeout on zephyr-v2.6.0-286-g46029914a7ac on lpcxpresso55s28
see logs for details
**To Reproduce**
1.
```
scripts/twister --device-testing --device-serial /dev/ttyACM0 -p lpcxpresso55s28 --testcase-root tests --sub-test kernel.memory_protection
```
2. See error
**Expected behavior**
test pass
**Impact**
**Logs and console output**
```
-
*** Booting Zephyr OS build zephyr-v2.6.0-286-g46029914a7ac ***
Running test suite memory_protection_test_suite
===================================================================
START - test_permission_inheritance
ASSERTION FAIL [esf != ((void *)0)] @ WEST_TOPDIR/zephyr/arch/arm/core/aarch32/cortex_m/fault.c:993
ESF could not be retrieved successfully. Shall never occur.
ASSERTION FAIL [esf != ((void *)0)] @ WEST_TOPDIR/zephyr/arch/arm/core/aarch32/cortex_m/fault.c:993
ESF could not be retrieved successfully. Shall never occur.
```
**Environment (please complete the following information):**
- OS: (e.g. Linux )
- Toolchain (e.g Zephyr SDK)
- Commit SHA or Version used: zephyr-v2.6.0-286-g46029914a7ac
| 1.0 |
tests-ci :kernel.memory_protection.mem_domain_remove_add_partition : zephyr-v2.6.0-286-g46029914a7ac: lpcxpresso55s28: test Timeout
-
**Describe the bug**
kernel.memory_protection.mem_domain_remove_add_partition test is Timeout on zephyr-v2.6.0-286-g46029914a7ac on lpcxpresso55s28
see logs for details
**To Reproduce**
1.
```
scripts/twister --device-testing --device-serial /dev/ttyACM0 -p lpcxpresso55s28 --testcase-root tests --sub-test kernel.memory_protection
```
2. See error
**Expected behavior**
test pass
**Impact**
**Logs and console output**
```
-
*** Booting Zephyr OS build zephyr-v2.6.0-286-g46029914a7ac ***
Running test suite memory_protection_test_suite
===================================================================
START - test_permission_inheritance
ASSERTION FAIL [esf != ((void *)0)] @ WEST_TOPDIR/zephyr/arch/arm/core/aarch32/cortex_m/fault.c:993
ESF could not be retrieved successfully. Shall never occur.
ASSERTION FAIL [esf != ((void *)0)] @ WEST_TOPDIR/zephyr/arch/arm/core/aarch32/cortex_m/fault.c:993
ESF could not be retrieved successfully. Shall never occur.
```
**Environment (please complete the following information):**
- OS: (e.g. Linux )
- Toolchain (e.g Zephyr SDK)
- Commit SHA or Version used: zephyr-v2.6.0-286-g46029914a7ac
| non_priority | tests ci kernel memory protection mem domain remove add partition zephyr test timeout describe the bug kernel memory protection mem domain remove add partition test is timeout on zephyr on see logs for details to reproduce scripts twister device testing device serial dev p testcase root tests sub test kernel memory protection see error expected behavior test pass impact logs and console output booting zephyr os build zephyr running test suite memory protection test suite start test permission inheritance assertion fail west topdir zephyr arch arm core cortex m fault c esf could not be retrieved successfully shall never occur assertion fail west topdir zephyr arch arm core cortex m fault c esf could not be retrieved successfully shall never occur environment please complete the following information os e g linux toolchain e g zephyr sdk commit sha or version used zephyr | 0 |
330,924 | 28,496,028,877 | IssuesEvent | 2023-04-18 14:17:38 | elastic/kibana | https://api.github.com/repos/elastic/kibana | opened | Failing test: X-Pack Case API Integration Tests.x-pack/test/cases_api_integration/security_and_spaces/tests/common/comments/delete_comment·ts - cases security and spaces enabled: trial Common delete_comment alerts security_solution removes a case from the alert schema when deleting an alert attachment | failed-test Team:ResponseOps | A test failed on a tracked branch
```
TypeError: Cannot read properties of undefined (reading '_id')
at map (alerts.ts:127:46)
at Array.map (<anonymous>)
at createCaseAttachAlertAndDeleteAlert (alerts.ts:127:25)
at runMicrotasks (<anonymous>)
at processTicksAndRejections (node:internal/process/task_queues:96:5)
at Context.<anonymous> (delete_comment.ts:141:11)
at Object.apply (wrap_function.js:73:16)
```
First failure: [CI Build - main](https://buildkite.com/elastic/kibana-on-merge/builds/29046#01879486-2187-450d-a7ac-f23bbac98baa)
<!-- kibanaCiData = {"failed-test":{"test.class":"X-Pack Case API Integration Tests.x-pack/test/cases_api_integration/security_and_spaces/tests/common/comments/delete_comment·ts","test.name":"cases security and spaces enabled: trial Common delete_comment alerts security_solution removes a case from the alert schema when deleting an alert attachment","test.failCount":1}} --> | 1.0 | Failing test: X-Pack Case API Integration Tests.x-pack/test/cases_api_integration/security_and_spaces/tests/common/comments/delete_comment·ts - cases security and spaces enabled: trial Common delete_comment alerts security_solution removes a case from the alert schema when deleting an alert attachment - A test failed on a tracked branch
```
TypeError: Cannot read properties of undefined (reading '_id')
at map (alerts.ts:127:46)
at Array.map (<anonymous>)
at createCaseAttachAlertAndDeleteAlert (alerts.ts:127:25)
at runMicrotasks (<anonymous>)
at processTicksAndRejections (node:internal/process/task_queues:96:5)
at Context.<anonymous> (delete_comment.ts:141:11)
at Object.apply (wrap_function.js:73:16)
```
First failure: [CI Build - main](https://buildkite.com/elastic/kibana-on-merge/builds/29046#01879486-2187-450d-a7ac-f23bbac98baa)
<!-- kibanaCiData = {"failed-test":{"test.class":"X-Pack Case API Integration Tests.x-pack/test/cases_api_integration/security_and_spaces/tests/common/comments/delete_comment·ts","test.name":"cases security and spaces enabled: trial Common delete_comment alerts security_solution removes a case from the alert schema when deleting an alert attachment","test.failCount":1}} --> | non_priority | failing test x pack case api integration tests x pack test cases api integration security and spaces tests common comments delete comment·ts cases security and spaces enabled trial common delete comment alerts security solution removes a case from the alert schema when deleting an alert attachment a test failed on a tracked branch typeerror cannot read properties of undefined reading id at map alerts ts at array map at createcaseattachalertanddeletealert alerts ts at runmicrotasks at processticksandrejections node internal process task queues at context delete comment ts at object apply wrap function js first failure | 0 |
337,424 | 30,247,963,562 | IssuesEvent | 2023-07-06 18:01:30 | unifyai/ivy | https://api.github.com/repos/unifyai/ivy | reopened | Fix raw_ops.test_tensorflow_transpose | TensorFlow Frontend Sub Task Failing Test | | | |
|---|---|
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a>
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a>
|paddle|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a>
| 1.0 | Fix raw_ops.test_tensorflow_transpose - | | |
|---|---|
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a>
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a>
|paddle|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a>
| non_priority | fix raw ops test tensorflow transpose torch a href src numpy a href src jax a href src tensorflow a href src paddle a href src | 0 |
30,715 | 7,245,823,993 | IssuesEvent | 2018-02-14 19:25:50 | dart-lang/sdk | https://api.github.com/repos/dart-lang/sdk | closed | Rename the class Resource in analyzer package to not conflict with Resource in dart:core | P2 medium Type: code health area-analyzer | A recent change introduced a new class named Resource in dart:core. This caused warnings in analyzer and analysis_server. The warnings have been (temporarily) fixed by hiding the core class, but the longer-term solution is to rename (and possibly rework) the Resource class in analyzer.
| 1.0 | Rename the class Resource in analyzer package to not conflict with Resource in dart:core - A recent change introduced a new class named Resource in dart:core. This caused warnings in analyzer and analysis_server. The warnings have been (temporarily) fixed by hiding the core class, but the longer-term solution is to rename (and possibly rework) the Resource class in analyzer.
| non_priority | rename the class resource in analyzer package to not conflict with resource in dart core a recent change introduced a new class named resource in dart core this caused warnings in analyzer and analysis server the warnings have been temporarily fixed by hiding the core class but the longer term solution is to rename and possibly rework the resource class in analyzer | 0 |
272,081 | 23,653,003,828 | IssuesEvent | 2022-08-26 08:34:14 | FlightControl-Master/MOOSE | https://api.github.com/repos/FlightControl-Master/MOOSE | closed | Range unit movement not work | Bug Ready for Testing Fix Implemented | Hi, reviewing well all the documentation, I have come across the "randommove" RANGE.AddBombingTargets(targetnames, goodhitrange, randommove) function.
Well, I define it like this:
local bombtargets= {"Bomb1", "Bomb2", "Bomb3"}
local bombtargets2={"M1", "M2", "M3"}
Range:AddBombingTargets(bombtargets1, 50)
Range:AddBombingTargets(bombtargets2, 10, true)
But it still doesn't work (it gives me the valuation with the starting point of the moving unit. According to the documentation, the best thing to do is to make the route in the editor (I already have it made in the editor). But it does not "update" in the script the position of the objects M1, M2 and M3 (bombtargets2).
Thanks you
Edit:
M1, M2 and M3, are M113 with a circular route (last point goes to the first) put in immortal and driveable, this put in the editor | 1.0 | Range unit movement not work - Hi, reviewing well all the documentation, I have come across the "randommove" RANGE.AddBombingTargets(targetnames, goodhitrange, randommove) function.
Well, I define it like this:
local bombtargets= {"Bomb1", "Bomb2", "Bomb3"}
local bombtargets2={"M1", "M2", "M3"}
Range:AddBombingTargets(bombtargets1, 50)
Range:AddBombingTargets(bombtargets2, 10, true)
But it still doesn't work (it gives me the valuation with the starting point of the moving unit. According to the documentation, the best thing to do is to make the route in the editor (I already have it made in the editor). But it does not "update" in the script the position of the objects M1, M2 and M3 (bombtargets2).
Thanks you
Edit:
M1, M2 and M3, are M113 with a circular route (last point goes to the first) put in immortal and driveable, this put in the editor | non_priority | range unit movement not work hi reviewing well all the documentation i have come across the randommove range addbombingtargets targetnames goodhitrange randommove function well i define it like this local bombtargets local range addbombingtargets range addbombingtargets true but it still doesn t work it gives me the valuation with the starting point of the moving unit according to the documentation the best thing to do is to make the route in the editor i already have it made in the editor but it does not update in the script the position of the objects and thanks you edit and are with a circular route last point goes to the first put in immortal and driveable this put in the editor | 0 |
45,826 | 11,739,959,396 | IssuesEvent | 2020-03-11 18:40:20 | lowRISC/ibex | https://api.github.com/repos/lowRISC/ibex | opened | [tracking] Use Verible's verilog_format for code formatting | Component:Tool-and-Build Type:Enhancement | Verible's verilog_format is a automatic code formatter. We want to be able to run it on our code base, ultimately in "enforcing" mode, requiring all submissions to be formatted with this tool. This is the same approach we take with clang-format and C/C++ files. This issue is to track the progress towards that.
Ibex TODO:
- [ ] Add Verible format support to edalize
- [ ] Add a fusesoc target to our core files
- [ ] Add Verible format in non-enforcing mode to CI
- [ ] Document how to use it
- [ ] Clean up existing code once the auto-formatted style matches our expectations.
- [ ] Switch to enforcing mode.
Blocking Verible bugs:
- [ ] https://github.com/google/verible/issues/228 | 1.0 | [tracking] Use Verible's verilog_format for code formatting - Verible's verilog_format is a automatic code formatter. We want to be able to run it on our code base, ultimately in "enforcing" mode, requiring all submissions to be formatted with this tool. This is the same approach we take with clang-format and C/C++ files. This issue is to track the progress towards that.
Ibex TODO:
- [ ] Add Verible format support to edalize
- [ ] Add a fusesoc target to our core files
- [ ] Add Verible format in non-enforcing mode to CI
- [ ] Document how to use it
- [ ] Clean up existing code once the auto-formatted style matches our expectations.
- [ ] Switch to enforcing mode.
Blocking Verible bugs:
- [ ] https://github.com/google/verible/issues/228 | non_priority | use verible s verilog format for code formatting verible s verilog format is a automatic code formatter we want to be able to run it on our code base ultimately in enforcing mode requiring all submissions to be formatted with this tool this is the same approach we take with clang format and c c files this issue is to track the progress towards that ibex todo add verible format support to edalize add a fusesoc target to our core files add verible format in non enforcing mode to ci document how to use it clean up existing code once the auto formatted style matches our expectations switch to enforcing mode blocking verible bugs | 0 |
365,703 | 25,548,876,264 | IssuesEvent | 2022-11-29 21:27:20 | UB-ES-2022-A3/usArt | https://api.github.com/repos/UB-ES-2022-A3/usArt | closed | (Code Spike) Servidor de Recursos | documentation enhancement frontend backend refactor | Es necesario un servidor de recursos aparte para poder guardar las imagenes y medios distintos para reducir costes y disponibilidad. | 1.0 | (Code Spike) Servidor de Recursos - Es necesario un servidor de recursos aparte para poder guardar las imagenes y medios distintos para reducir costes y disponibilidad. | non_priority | code spike servidor de recursos es necesario un servidor de recursos aparte para poder guardar las imagenes y medios distintos para reducir costes y disponibilidad | 0 |
47,064 | 13,056,026,176 | IssuesEvent | 2020-07-30 03:25:48 | icecube-trac/tix2 | https://api.github.com/repos/icecube-trac/tix2 | opened | [wavedeform] Timing Test Fails (Trac #2379) | Incomplete Migration Migrated from Trac combo core defect | Migrated from https://code.icecube.wisc.edu/ticket/2379
```json
{
"status": "closed",
"changetime": "2020-06-24T12:31:42",
"description": "{{{\n$ ./wavedeform/resources/test/wavedeform_time_test.py \nINFO (I3InfiniteSource): Prefixing with filename/url /home/olivas/icecube/test-data/trunk/GCD/GeoCalibDetectorStatus_IC86.55697_corrected_V2.i3.gz (I3InfiniteSource.cxx:56 in virtual void I3InfiniteSource::Configure())\nF.\n======================================================================\nFAIL: testLeadingEdgeTime (__main__.TimeCheck)\n----------------------------------------------------------------------\nTraceback (most recent call last):\n File \"./wavedeform/resources/test/wavedeform_time_test.py\", line 66, in testLeadingEdgeTime\n recofirst, margin, margin*recowidth, om))\nAssertionError: False is not true : Sim time (197.029290) and reco time (249.747500) match to within 10 sigma (8.250000 ns) in OM OMKey(21,1,0)\n\n----------------------------------------------------------------------\nRan 2 tests in 0.006s\n\nFAILED (failures=1)\n}}}",
"reporter": "olivas",
"cc": "",
"resolution": "fixed",
"_ts": "1593001902142004",
"component": "combo core",
"summary": "[wavedeform] Timing Test Fails",
"priority": "blocker",
"keywords": "",
"time": "2019-12-10T14:35:56",
"milestone": "Autumnal Equinox 2020",
"owner": "jbraun",
"type": "defect"
}
```
| 1.0 | [wavedeform] Timing Test Fails (Trac #2379) - Migrated from https://code.icecube.wisc.edu/ticket/2379
```json
{
"status": "closed",
"changetime": "2020-06-24T12:31:42",
"description": "{{{\n$ ./wavedeform/resources/test/wavedeform_time_test.py \nINFO (I3InfiniteSource): Prefixing with filename/url /home/olivas/icecube/test-data/trunk/GCD/GeoCalibDetectorStatus_IC86.55697_corrected_V2.i3.gz (I3InfiniteSource.cxx:56 in virtual void I3InfiniteSource::Configure())\nF.\n======================================================================\nFAIL: testLeadingEdgeTime (__main__.TimeCheck)\n----------------------------------------------------------------------\nTraceback (most recent call last):\n File \"./wavedeform/resources/test/wavedeform_time_test.py\", line 66, in testLeadingEdgeTime\n recofirst, margin, margin*recowidth, om))\nAssertionError: False is not true : Sim time (197.029290) and reco time (249.747500) match to within 10 sigma (8.250000 ns) in OM OMKey(21,1,0)\n\n----------------------------------------------------------------------\nRan 2 tests in 0.006s\n\nFAILED (failures=1)\n}}}",
"reporter": "olivas",
"cc": "",
"resolution": "fixed",
"_ts": "1593001902142004",
"component": "combo core",
"summary": "[wavedeform] Timing Test Fails",
"priority": "blocker",
"keywords": "",
"time": "2019-12-10T14:35:56",
"milestone": "Autumnal Equinox 2020",
"owner": "jbraun",
"type": "defect"
}
```
| non_priority | timing test fails trac migrated from json status closed changetime description n wavedeform resources test wavedeform time test py ninfo prefixing with filename url home olivas icecube test data trunk gcd geocalibdetectorstatus corrected gz cxx in virtual void configure nf n nfail testleadingedgetime main timecheck n ntraceback most recent call last n file wavedeform resources test wavedeform time test py line in testleadingedgetime n recofirst margin margin recowidth om nassertionerror false is not true sim time and reco time match to within sigma ns in om omkey n n nran tests in n nfailed failures n reporter olivas cc resolution fixed ts component combo core summary timing test fails priority blocker keywords time milestone autumnal equinox owner jbraun type defect | 0 |
37,108 | 8,213,665,234 | IssuesEvent | 2018-09-04 20:18:26 | opencv/opencv | https://api.github.com/repos/opencv/opencv | closed | dereferencing of a potential null pointer | bug category: imgcodecs | ##### System information (version)
- OpenCV => github master branch.
- Operating System / Platform => ubuntu 1804
- Compiler => gcc 7
##### Detailed description
In the function _imread_( const String& filename, int flags, int hdrtype, Mat* mat=0 ) from opencv/modules/imgcodecs/src/loadsave.cpp (line:401) ,there are some places of dereferencing mat without checking if it is nullptr,for example:
>
484 else
485 {
486 mat->create( size.height, size.width, type );
487 data = mat;
488 }
>
Please fix such code.
##### Steps to reproduce
see the code.
| 1.0 | dereferencing of a potential null pointer - ##### System information (version)
- OpenCV => github master branch.
- Operating System / Platform => ubuntu 1804
- Compiler => gcc 7
##### Detailed description
In the function _imread_( const String& filename, int flags, int hdrtype, Mat* mat=0 ) from opencv/modules/imgcodecs/src/loadsave.cpp (line:401) ,there are some places of dereferencing mat without checking if it is nullptr,for example:
>
484 else
485 {
486 mat->create( size.height, size.width, type );
487 data = mat;
488 }
>
Please fix such code.
##### Steps to reproduce
see the code.
| non_priority | dereferencing of a potential null pointer system information version opencv github master branch operating system platform ubuntu compiler gcc detailed description in the function imread const string filename int flags int hdrtype mat mat from opencv modules imgcodecs src loadsave cpp line there are some places of dereferencing mat without checking if it is nullptr for example else mat create size height size width type data mat please fix such code steps to reproduce see the code | 0 |
190,611 | 15,252,262,094 | IssuesEvent | 2021-02-20 02:10:31 | Joe91/fun-bots | https://api.github.com/repos/Joe91/fun-bots | closed | F12 GUI interface cannot save the sethings to config.lua profile | documentation invalid | Im afraid that "record traces" have the same problem...and im not sure if it is the system permission problem(since everything "have to" run as the fxxking Administrator hh)
for example I change this function to '2' and click "save"(yes,save,not"temp... save"):

theoretically this line should be :
maxReconBots = 2, -- maximum number of Bots with Recon Kit
howerver when i open the config.lua :
maxReconBots = -1, -- maximum number of Bots with Recon Kit
Never changed... | 1.0 | F12 GUI interface cannot save the sethings to config.lua profile - Im afraid that "record traces" have the same problem...and im not sure if it is the system permission problem(since everything "have to" run as the fxxking Administrator hh)
for example I change this function to '2' and click "save"(yes,save,not"temp... save"):

theoretically this line should be :
maxReconBots = 2, -- maximum number of Bots with Recon Kit
howerver when i open the config.lua :
maxReconBots = -1, -- maximum number of Bots with Recon Kit
Never changed... | non_priority | gui interface cannot save the sethings to config lua profile im afraid that record traces have the same problem and im not sure if it is the system permission problem since everything have to run as the fxxking administrator hh for example i change this function to and click save yes save not temp save theoretically this line should be : maxreconbots maximum number of bots with recon kit howerver when i open the config lua maxreconbots maximum number of bots with recon kit never changed | 0 |
147,812 | 23,277,365,986 | IssuesEvent | 2022-08-05 08:34:52 | Azure/autorest.java | https://api.github.com/repos/Azure/autorest.java | closed | Generate models with enum properties | design-discussion DPG/RLC v2.0b1 DPG/RLC August MVP | Design model generation for models containing enums and expandable string enums. More details to follow on how cadl defines enum and expandable string enums. | 1.0 | Generate models with enum properties - Design model generation for models containing enums and expandable string enums. More details to follow on how cadl defines enum and expandable string enums. | non_priority | generate models with enum properties design model generation for models containing enums and expandable string enums more details to follow on how cadl defines enum and expandable string enums | 0 |
146,921 | 19,471,242,121 | IssuesEvent | 2021-12-24 01:45:27 | Baneeishaque/Scrap_Flipkart_Laptops | https://api.github.com/repos/Baneeishaque/Scrap_Flipkart_Laptops | opened | CVE-2021-33430 (High) detected in numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl | security vulnerability | ## CVE-2021-33430 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary>
<p>NumPy is the fundamental package for array computing with Python.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/3a/5f/47e578b3ae79e2624e205445ab77a1848acdaa2929a00eeef6b16eaaeb20/numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/3a/5f/47e578b3ae79e2624e205445ab77a1848acdaa2929a00eeef6b16eaaeb20/numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl</a></p>
<p>Path to dependency file: Scrap_Flipkart_Laptops/requirements.txt</p>
<p>Path to vulnerable library: Scrap_Flipkart_Laptops/requirements.txt</p>
<p>
Dependency Hierarchy:
- pandas-0.24.2-cp27-cp27mu-manylinux1_x86_64.whl (Root Library)
- :x: **numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service.
<p>Publish Date: 2021-12-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33430>CVE-2021-33430</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33430">https://nvd.nist.gov/vuln/detail/CVE-2021-33430</a></p>
<p>Release Date: 2021-12-17</p>
<p>Fix Resolution: numpy - 1.21.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-33430 (High) detected in numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl - ## CVE-2021-33430 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary>
<p>NumPy is the fundamental package for array computing with Python.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/3a/5f/47e578b3ae79e2624e205445ab77a1848acdaa2929a00eeef6b16eaaeb20/numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/3a/5f/47e578b3ae79e2624e205445ab77a1848acdaa2929a00eeef6b16eaaeb20/numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl</a></p>
<p>Path to dependency file: Scrap_Flipkart_Laptops/requirements.txt</p>
<p>Path to vulnerable library: Scrap_Flipkart_Laptops/requirements.txt</p>
<p>
Dependency Hierarchy:
- pandas-0.24.2-cp27-cp27mu-manylinux1_x86_64.whl (Root Library)
- :x: **numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service.
<p>Publish Date: 2021-12-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33430>CVE-2021-33430</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33430">https://nvd.nist.gov/vuln/detail/CVE-2021-33430</a></p>
<p>Release Date: 2021-12-17</p>
<p>Fix Resolution: numpy - 1.21.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in numpy whl cve high severity vulnerability vulnerable library numpy whl numpy is the fundamental package for array computing with python library home page a href path to dependency file scrap flipkart laptops requirements txt path to vulnerable library scrap flipkart laptops requirements txt dependency hierarchy pandas whl root library x numpy whl vulnerable library vulnerability details a buffer overflow vulnerability exists in numpy x in the pyarray newfromdescr int function of ctors c when specifying arrays of large dimensions over from python code which could let a malicious user cause a denial of service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution numpy step up your open source security game with whitesource | 0 |
35,161 | 4,631,296,260 | IssuesEvent | 2016-09-28 15:06:40 | xiaohanyu/org-site | https://api.github.com/repos/xiaohanyu/org-site | closed | Theme customization guide and some more theme? | design enhancement | Design
----------
Theme support and easy customization is one of the most important design goals
of org-site. Internally, org-site use `mustache.el` and html template to
generate html pages, these process need a explicit interface guide to facilitate
third-party theme customization, for example, which variable represents:
- site title
- site author
- site url
- page toc
- page contents
And based on the detailed, explicit theme customization guide, we can provide
more built-in theme support.
Implementation
----------
These feature contains documentation and coding work, and I think documentation
work is more time-consuming than coding work. | 1.0 | Theme customization guide and some more theme? - Design
----------
Theme support and easy customization is one of the most important design goals
of org-site. Internally, org-site use `mustache.el` and html template to
generate html pages, these process need a explicit interface guide to facilitate
third-party theme customization, for example, which variable represents:
- site title
- site author
- site url
- page toc
- page contents
And based on the detailed, explicit theme customization guide, we can provide
more built-in theme support.
Implementation
----------
These feature contains documentation and coding work, and I think documentation
work is more time-consuming than coding work. | non_priority | theme customization guide and some more theme design theme support and easy customization is one of the most important design goals of org site internally org site use mustache el and html template to generate html pages these process need a explicit interface guide to facilitate third party theme customization for example which variable represents site title site author site url page toc page contents and based on the detailed explicit theme customization guide we can provide more built in theme support implementation these feature contains documentation and coding work and i think documentation work is more time consuming than coding work | 0 |
142,557 | 21,785,122,490 | IssuesEvent | 2022-05-14 02:34:59 | ntrappe/cse112-s22-group2 | https://api.github.com/repos/ntrappe/cse112-s22-group2 | closed | Design | design | **Hi-Fi Prototype Demo:** https://www.figma.com/proto/J87cj9HiQVI8xtOvtBREtT/CSE-112-Prototypes?node-id=0%3A1
Home Screen
<img width="407" alt="Screen Shot 2022-05-10 at 9 13 27 PM" src="https://user-images.githubusercontent.com/33298966/167767817-6146f0ea-4f07-473d-9def-40b9da6d6405.png">
Daily Logs (Inbox)
<img width="406" alt="Screen Shot 2022-05-10 at 9 13 45 PM" src="https://user-images.githubusercontent.com/33298966/167767845-9d3692c9-905d-4d8c-8325-687fcb698c86.png">
Single Daily Log
<img width="414" alt="Screen Shot 2022-05-10 at 9 13 58 PM" src="https://user-images.githubusercontent.com/33298966/167767861-65476ece-ba9a-4c84-b982-bccce6d07fa9.png">
| 1.0 | Design - **Hi-Fi Prototype Demo:** https://www.figma.com/proto/J87cj9HiQVI8xtOvtBREtT/CSE-112-Prototypes?node-id=0%3A1
Home Screen
<img width="407" alt="Screen Shot 2022-05-10 at 9 13 27 PM" src="https://user-images.githubusercontent.com/33298966/167767817-6146f0ea-4f07-473d-9def-40b9da6d6405.png">
Daily Logs (Inbox)
<img width="406" alt="Screen Shot 2022-05-10 at 9 13 45 PM" src="https://user-images.githubusercontent.com/33298966/167767845-9d3692c9-905d-4d8c-8325-687fcb698c86.png">
Single Daily Log
<img width="414" alt="Screen Shot 2022-05-10 at 9 13 58 PM" src="https://user-images.githubusercontent.com/33298966/167767861-65476ece-ba9a-4c84-b982-bccce6d07fa9.png">
| non_priority | design hi fi prototype demo home screen img width alt screen shot at pm src daily logs inbox img width alt screen shot at pm src single daily log img width alt screen shot at pm src | 0 |
91,557 | 11,519,696,208 | IssuesEvent | 2020-02-14 13:22:41 | arendst/Tasmota | https://api.github.com/repos/arendst/Tasmota | closed | poweronstate 1 not working for Sonoff Dual R2 Module both releais | as designed | <!-- Thanks for reporting a problem for this project. READ THIS FIRST:
This issue template is meant to REPORT Tasmota software PROBLEMS ONLY
Please DO NOT OPEN AN ISSUE:
- If your Tasmota version is not the latest from the development branch, please update your device before submitting your issue. Your problem might already be solved. The latest precompiled binaries of Tasmota can be downloaded from http://thehackbox.org/tasmota/
- If you have an issue when flashing was done via Tuya Convert, please address it to Tuya Convert Team
- If your issue is a flashing issue, please address it to the [Tasmota Support Chat](https://discord.gg/Ks2Kzd4)
- If your issue is compilation problem, please address it to the [Tasmota Support Chat](https://discord.gg/Ks2Kzd4)
- If your issue has been addressed before (i.e., duplicated issue), please ask in the original issue
- If your issue is a Wi-Fi problem or MQTT problem, please try the steps provided in the [FAQ](https://tasmota.github.io/docs/#/help/FAQ) and [Troubleshooting](https://tasmota.github.io/docs/#/help/Troubleshooting)
Please take a few minutes to complete the requested information below. Our ability to provide assistance is greatly hampered without it. The details requested potentially affect which options to pursue. The small amount of time you spend completing the template will also help the volunteers providing the assistance to you to reduce the time required to help you.
DO NOT DELETE ANY TEXT from this template! Otherwise the issue will be auto-closed.
-->
### PROBLEM DESCRIPTION
poweronstate 1 not working for Sonoff Dual R2 Module for both relais only relais 2 is on after powerup.
powerupstate 1 is set
### REQUESTED INFORMATION
_Make sure your have performed every step and checked the applicable boxes before submitting your issue. Thank you!_
- [ ] Read the [Contributing Guide and Policy](https://github.com/arendst/Tasmota/blob/development/CONTRIBUTING.md) and [the Code of Conduct](https://github.com/arendst/Tasmota/blob/development/CODE_OF_CONDUCT.md)
- [ ] Searched the problem in [issues](https://github.com/arendst/Tasmota/issues)
- [ ] Searched the problem in the [docs](https://tasmota.github.io/docs/#/help/FAQ)
- [x ] Searched the problem in the [forum](https://groups.google.com/d/forum/sonoffusers)
- [ x] Searched the problem in the [chat](https://discord.gg/Ks2Kzd4)
- [x ] Device used (e.g., Sonoff Basic): _____
- [ x] Tasmota binary firmware version number used: _____
- [x ] Pre-compiled
- [ ] Self-compiled
- [ ] IDE / Compiler used: _____
- [ ] Flashing tools used: _____
- [ ] Provide the output of command: `Backlog Template; Module; GPIO 255`:
```
Program Version | 8.1.0(tasmota)
-- | --
2019-12-25T12:33:25
2_6_1/2.2.2-dev(38a443e)
0T00:07:33
61 at 0xF7000
16
Software/System restart
Configuration output here:
```
- [ ] If using rules, provide the output of this command: `Backlog Rule1; Rule2; Rule3`:
```
Rules output here:
```
- [ ] Provide the output of this command: `Status 0`:
```
STATUS 0 output here:
`08:31:08 MQT: tele/TA_SOR2/STATE = {"Time":"2020-02-14T08:31:08","Uptime":"0T00:05:13","UptimeSec":313,"Heap":26,"SleepMode":"Dynamic","Sleep":50,"LoadAvg":19,"MqttCount":1,"POWER1":"OFF","POWER2":"ON","Wifi":{"AP":1,"SSId":"TR7272","BSSId":"36:A4:3C:DD:17:E1","Channel":6,"RSSI":100,"Signal":-49,"LinkCount":1,"Downtime":"0T00:00:06"}}
08:34:37 MQT: stat/TA_SOR2/STATUS = {"Status":{"Module":39,"FriendlyName":["TA_SOR2_1_KH","TA_SOR2_2_Anbau"],"Topic":"TA_SOR2","ButtonTopic":"0","Power":2,"PowerOnState":1,"LedState":1,"LedMask":"FFFF","SaveData":1,"SaveState":1,"SwitchTopic":"0","SwitchMode":[0,0,0,0,0,0,0,0],"ButtonRetain":0,"SwitchRetain":0,"SensorRetain":0,"PowerRetain":0}}
08:34:37 MQT: stat/TA_SOR2/STATUS1 = {"StatusPRM":{"Baudrate":115200,"GroupTopic":"tasmotas","OtaUrl":"http://thehackbox.org/tasmota/release/tasmota.bin","RestartReason":"Software/System restart","Uptime":"0T00:08:42","StartupUTC":"2020-02-14T07:25:55","Sleep":50,"CfgHolder":4617,"BootCount":16,"SaveCount":61,"SaveAddress":"F7000"}}
08:34:37 MQT: stat/TA_SOR2/STATUS2 = {"StatusFWR":{"Version":"8.1.0(tasmota)","BuildDateTime":"2019-12-25T12:33:25","Boot":31,"Core":"2_6_1","SDK":"2.2.2-dev(38a443e)","Hardware":"ESP8285","CR":"386/699"}}
08:34:37 MQT: stat/TA_SOR2/STATUS3 = {"StatusLOG":{"SerialLog":2,"WebLog":2,"MqttLog":0,"SysLog":0,"LogHost":"","LogPort":514,"SSId":["TR7272","TR_ESP"],"TelePeriod":300,"Resolution":"558180C0","SetOption":["00008009","2805C8000100060000005A00000000000000","00000000","00000000"]}}
08:34:37 MQT: stat/TA_SOR2/STATUS4 = {"StatusMEM":{"ProgramSize":566,"Free":436,"Heap":25,"ProgramFlashSize":1024,"FlashSize":1024,"FlashChipId":"144051","FlashMode":3,"Features":["00000809","8FDAE397","043683A0","22B617CD","01001BC0","00007881"],"Drivers":"1,2,3,4,5,6,7,8,9,10,12,16,18,19,20,21,22,24,26,29","Sensors":"1,2,3,4,5,6,7,8,9,10,14,15,17,18,20,22,26,34"}}
08:34:37 MQT: stat/TA_SOR2/STATUS5 = {"StatusNET":{"Hostname":"TA_SOR2-7721","IPAddress":"192.168.1.155","Gateway":"192.168.0.31","Subnetmask":"255.255.240.0","DNSServer":"1.1.1.1","Mac":"2C:F4:32:A5:3E:29","Webserver":2,"WifiConfig":4}}
08:34:37 MQT: stat/TA_SOR2/STATUS6 = {"StatusMQT":{"MqttHost":"192.168.0.9","MqttPort":1893,"MqttClientMask":"DVES_%06X","MqttClient":"DVES_A53E29","MqttUser":"DVES_USER","MqttCount":1,"MAX_PACKET_SIZE":1000,"KEEPALIVE":30}}
08:34:37 MQT: stat/TA_SOR2/STATUS7 = {"StatusTIM":{"UTC":"Fri Feb 14 07:34:37 2020","Local":"Fri Feb 14 08:34:37 2020","StartDST":"Sun Mar 29 02:00:00 2020","EndDST":"Sun Oct 25 03:00:00 2020","Timezone":"+01:00","Sunrise":"08:00","Sunset":"18:08"}}
08:34:37 MQT: stat/TA_SOR2/STATUS10 = {"StatusSNS":{"Time":"2020-02-14T08:34:37"}}
08:34:37 MQT: stat/TA_SOR2/STATUS11 = {"StatusSTS":{"Time":"2020-02-14T08:34:37","Uptime":"0T00:08:42","UptimeSec":522,"Heap":25,"SleepMode":"Dynamic","Sleep":50,"LoadAvg":19,"MqttCount":1,"POWER1":"OFF","POWER2":"ON","Wifi":{"AP":1,"SSId":"TR7272","BSSId":"36:A4:3C:DD:17:E1","Channel":6,"RSSI":100,"Signal":-50,"LinkCount":1,"Downtime":"0T00:00:06"}}}`
```
- [ ] Provide the output of the Console log output when you experience your issue; if applicable:
_(Please use_ `weblog 4` _for more debug information)_
```
Console output here:
```
### TO REPRODUCE
_Steps to reproduce the behavior:_
### EXPECTED BEHAVIOUR
_A clear and concise description of what you expected to happen._
### SCREENSHOTS
_If applicable, add screenshots to help explain your problem._
### ADDITIONAL CONTEXT
_Add any other context about the problem here._
**(Please, remember to close the issue when the problem has been addressed)**
| 1.0 | poweronstate 1 not working for Sonoff Dual R2 Module both releais - <!-- Thanks for reporting a problem for this project. READ THIS FIRST:
This issue template is meant to REPORT Tasmota software PROBLEMS ONLY
Please DO NOT OPEN AN ISSUE:
- If your Tasmota version is not the latest from the development branch, please update your device before submitting your issue. Your problem might already be solved. The latest precompiled binaries of Tasmota can be downloaded from http://thehackbox.org/tasmota/
- If you have an issue when flashing was done via Tuya Convert, please address it to Tuya Convert Team
- If your issue is a flashing issue, please address it to the [Tasmota Support Chat](https://discord.gg/Ks2Kzd4)
- If your issue is compilation problem, please address it to the [Tasmota Support Chat](https://discord.gg/Ks2Kzd4)
- If your issue has been addressed before (i.e., duplicated issue), please ask in the original issue
- If your issue is a Wi-Fi problem or MQTT problem, please try the steps provided in the [FAQ](https://tasmota.github.io/docs/#/help/FAQ) and [Troubleshooting](https://tasmota.github.io/docs/#/help/Troubleshooting)
Please take a few minutes to complete the requested information below. Our ability to provide assistance is greatly hampered without it. The details requested potentially affect which options to pursue. The small amount of time you spend completing the template will also help the volunteers providing the assistance to you to reduce the time required to help you.
DO NOT DELETE ANY TEXT from this template! Otherwise the issue will be auto-closed.
-->
### PROBLEM DESCRIPTION
poweronstate 1 not working for Sonoff Dual R2 Module for both relais only relais 2 is on after powerup.
powerupstate 1 is set
### REQUESTED INFORMATION
_Make sure your have performed every step and checked the applicable boxes before submitting your issue. Thank you!_
- [ ] Read the [Contributing Guide and Policy](https://github.com/arendst/Tasmota/blob/development/CONTRIBUTING.md) and [the Code of Conduct](https://github.com/arendst/Tasmota/blob/development/CODE_OF_CONDUCT.md)
- [ ] Searched the problem in [issues](https://github.com/arendst/Tasmota/issues)
- [ ] Searched the problem in the [docs](https://tasmota.github.io/docs/#/help/FAQ)
- [x ] Searched the problem in the [forum](https://groups.google.com/d/forum/sonoffusers)
- [ x] Searched the problem in the [chat](https://discord.gg/Ks2Kzd4)
- [x ] Device used (e.g., Sonoff Basic): _____
- [ x] Tasmota binary firmware version number used: _____
- [x ] Pre-compiled
- [ ] Self-compiled
- [ ] IDE / Compiler used: _____
- [ ] Flashing tools used: _____
- [ ] Provide the output of command: `Backlog Template; Module; GPIO 255`:
```
Program Version | 8.1.0(tasmota)
-- | --
2019-12-25T12:33:25
2_6_1/2.2.2-dev(38a443e)
0T00:07:33
61 at 0xF7000
16
Software/System restart
Configuration output here:
```
- [ ] If using rules, provide the output of this command: `Backlog Rule1; Rule2; Rule3`:
```
Rules output here:
```
- [ ] Provide the output of this command: `Status 0`:
```
STATUS 0 output here:
`08:31:08 MQT: tele/TA_SOR2/STATE = {"Time":"2020-02-14T08:31:08","Uptime":"0T00:05:13","UptimeSec":313,"Heap":26,"SleepMode":"Dynamic","Sleep":50,"LoadAvg":19,"MqttCount":1,"POWER1":"OFF","POWER2":"ON","Wifi":{"AP":1,"SSId":"TR7272","BSSId":"36:A4:3C:DD:17:E1","Channel":6,"RSSI":100,"Signal":-49,"LinkCount":1,"Downtime":"0T00:00:06"}}
08:34:37 MQT: stat/TA_SOR2/STATUS = {"Status":{"Module":39,"FriendlyName":["TA_SOR2_1_KH","TA_SOR2_2_Anbau"],"Topic":"TA_SOR2","ButtonTopic":"0","Power":2,"PowerOnState":1,"LedState":1,"LedMask":"FFFF","SaveData":1,"SaveState":1,"SwitchTopic":"0","SwitchMode":[0,0,0,0,0,0,0,0],"ButtonRetain":0,"SwitchRetain":0,"SensorRetain":0,"PowerRetain":0}}
08:34:37 MQT: stat/TA_SOR2/STATUS1 = {"StatusPRM":{"Baudrate":115200,"GroupTopic":"tasmotas","OtaUrl":"http://thehackbox.org/tasmota/release/tasmota.bin","RestartReason":"Software/System restart","Uptime":"0T00:08:42","StartupUTC":"2020-02-14T07:25:55","Sleep":50,"CfgHolder":4617,"BootCount":16,"SaveCount":61,"SaveAddress":"F7000"}}
08:34:37 MQT: stat/TA_SOR2/STATUS2 = {"StatusFWR":{"Version":"8.1.0(tasmota)","BuildDateTime":"2019-12-25T12:33:25","Boot":31,"Core":"2_6_1","SDK":"2.2.2-dev(38a443e)","Hardware":"ESP8285","CR":"386/699"}}
08:34:37 MQT: stat/TA_SOR2/STATUS3 = {"StatusLOG":{"SerialLog":2,"WebLog":2,"MqttLog":0,"SysLog":0,"LogHost":"","LogPort":514,"SSId":["TR7272","TR_ESP"],"TelePeriod":300,"Resolution":"558180C0","SetOption":["00008009","2805C8000100060000005A00000000000000","00000000","00000000"]}}
08:34:37 MQT: stat/TA_SOR2/STATUS4 = {"StatusMEM":{"ProgramSize":566,"Free":436,"Heap":25,"ProgramFlashSize":1024,"FlashSize":1024,"FlashChipId":"144051","FlashMode":3,"Features":["00000809","8FDAE397","043683A0","22B617CD","01001BC0","00007881"],"Drivers":"1,2,3,4,5,6,7,8,9,10,12,16,18,19,20,21,22,24,26,29","Sensors":"1,2,3,4,5,6,7,8,9,10,14,15,17,18,20,22,26,34"}}
08:34:37 MQT: stat/TA_SOR2/STATUS5 = {"StatusNET":{"Hostname":"TA_SOR2-7721","IPAddress":"192.168.1.155","Gateway":"192.168.0.31","Subnetmask":"255.255.240.0","DNSServer":"1.1.1.1","Mac":"2C:F4:32:A5:3E:29","Webserver":2,"WifiConfig":4}}
08:34:37 MQT: stat/TA_SOR2/STATUS6 = {"StatusMQT":{"MqttHost":"192.168.0.9","MqttPort":1893,"MqttClientMask":"DVES_%06X","MqttClient":"DVES_A53E29","MqttUser":"DVES_USER","MqttCount":1,"MAX_PACKET_SIZE":1000,"KEEPALIVE":30}}
08:34:37 MQT: stat/TA_SOR2/STATUS7 = {"StatusTIM":{"UTC":"Fri Feb 14 07:34:37 2020","Local":"Fri Feb 14 08:34:37 2020","StartDST":"Sun Mar 29 02:00:00 2020","EndDST":"Sun Oct 25 03:00:00 2020","Timezone":"+01:00","Sunrise":"08:00","Sunset":"18:08"}}
08:34:37 MQT: stat/TA_SOR2/STATUS10 = {"StatusSNS":{"Time":"2020-02-14T08:34:37"}}
08:34:37 MQT: stat/TA_SOR2/STATUS11 = {"StatusSTS":{"Time":"2020-02-14T08:34:37","Uptime":"0T00:08:42","UptimeSec":522,"Heap":25,"SleepMode":"Dynamic","Sleep":50,"LoadAvg":19,"MqttCount":1,"POWER1":"OFF","POWER2":"ON","Wifi":{"AP":1,"SSId":"TR7272","BSSId":"36:A4:3C:DD:17:E1","Channel":6,"RSSI":100,"Signal":-50,"LinkCount":1,"Downtime":"0T00:00:06"}}}`
```
- [ ] Provide the output of the Console log output when you experience your issue; if applicable:
_(Please use_ `weblog 4` _for more debug information)_
```
Console output here:
```
### TO REPRODUCE
_Steps to reproduce the behavior:_
### EXPECTED BEHAVIOUR
_A clear and concise description of what you expected to happen._
### SCREENSHOTS
_If applicable, add screenshots to help explain your problem._
### ADDITIONAL CONTEXT
_Add any other context about the problem here._
**(Please, remember to close the issue when the problem has been addressed)**
| non_priority | poweronstate not working for sonoff dual module both releais thanks for reporting a problem for this project read this first this issue template is meant to report tasmota software problems only please do not open an issue if your tasmota version is not the latest from the development branch please update your device before submitting your issue your problem might already be solved the latest precompiled binaries of tasmota can be downloaded from if you have an issue when flashing was done via tuya convert please address it to tuya convert team if your issue is a flashing issue please address it to the if your issue is compilation problem please address it to the if your issue has been addressed before i e duplicated issue please ask in the original issue if your issue is a wi fi problem or mqtt problem please try the steps provided in the and please take a few minutes to complete the requested information below our ability to provide assistance is greatly hampered without it the details requested potentially affect which options to pursue the small amount of time you spend completing the template will also help the volunteers providing the assistance to you to reduce the time required to help you do not delete any text from this template otherwise the issue will be auto closed problem description poweronstate not working for sonoff dual module for both relais only relais is on after powerup powerupstate is set requested information make sure your have performed every step and checked the applicable boxes before submitting your issue thank you read the and searched the problem in searched the problem in the searched the problem in the searched the problem in the device used e g sonoff basic tasmota binary firmware version number used pre compiled self compiled ide compiler used flashing tools used provide the output of command backlog template module gpio program version tasmota dev at software system restart configuration output here if using rules provide the output of this command backlog rules output here provide the output of this command status status output here mqt tele ta state time uptime uptimesec heap sleepmode dynamic sleep loadavg mqttcount off on wifi ap ssid bssid dd channel rssi signal linkcount downtime mqt stat ta status status module friendlyname topic ta buttontopic power poweronstate ledstate ledmask ffff savedata savestate switchtopic switchmode buttonretain switchretain sensorretain powerretain mqt stat ta statusprm baudrate grouptopic tasmotas otaurl restart uptime startuputc sleep cfgholder bootcount savecount saveaddress mqt stat ta statusfwr version tasmota builddatetime boot core sdk dev hardware cr mqt stat ta statuslog seriallog weblog mqttlog syslog loghost logport ssid teleperiod resolution setoption mqt stat ta statusmem programsize free heap programflashsize flashsize flashchipid flashmode features drivers sensors mqt stat ta statusnet hostname ta ipaddress gateway subnetmask dnsserver mac webserver wificonfig mqt stat ta statusmqt mqtthost mqttport mqttclientmask dves mqttclient dves mqttuser dves user mqttcount max packet size keepalive mqt stat ta statustim utc fri feb local fri feb startdst sun mar enddst sun oct timezone sunrise sunset mqt stat ta statussns time mqt stat ta statussts time uptime uptimesec heap sleepmode dynamic sleep loadavg mqttcount off on wifi ap ssid bssid dd channel rssi signal linkcount downtime provide the output of the console log output when you experience your issue if applicable please use weblog for more debug information console output here to reproduce steps to reproduce the behavior expected behaviour a clear and concise description of what you expected to happen screenshots if applicable add screenshots to help explain your problem additional context add any other context about the problem here please remember to close the issue when the problem has been addressed | 0 |
35,082 | 7,548,952,683 | IssuesEvent | 2018-04-18 12:57:19 | STEllAR-GROUP/phylanx | https://api.github.com/repos/STEllAR-GROUP/phylanx | closed | -1 is not the same as -(1) | category: PhySL type: defect | The last two calls to cout should print the same thing, but physl interprets -(1) and -1 differently.
```
block(
define(a,[1,2,3,4]),
cout(slice(a,'(0,4))),
cout(slice(a,'(0,-1))),
cout(slice(a,'(0,-(1))))
)
``` | 1.0 | -1 is not the same as -(1) - The last two calls to cout should print the same thing, but physl interprets -(1) and -1 differently.
```
block(
define(a,[1,2,3,4]),
cout(slice(a,'(0,4))),
cout(slice(a,'(0,-1))),
cout(slice(a,'(0,-(1))))
)
``` | non_priority | is not the same as the last two calls to cout should print the same thing but physl interprets and differently block define a cout slice a cout slice a cout slice a | 0 |
131,025 | 18,171,039,287 | IssuesEvent | 2021-09-27 20:04:39 | GlobalNOC/OESS | https://api.github.com/repos/GlobalNOC/OESS | opened | show the circuit name as well as the description | Enhancement Design Frontend | The circuit name and description should be shown in both the home page (/OESS) and the circuit details page.
Currently only the circuit description is shown.
See SCTASK0081460 for original request | 1.0 | show the circuit name as well as the description - The circuit name and description should be shown in both the home page (/OESS) and the circuit details page.
Currently only the circuit description is shown.
See SCTASK0081460 for original request | non_priority | show the circuit name as well as the description the circuit name and description should be shown in both the home page oess and the circuit details page currently only the circuit description is shown see for original request | 0 |
294,998 | 22,173,281,021 | IssuesEvent | 2022-06-06 04:59:27 | katesavo/homepage | https://api.github.com/repos/katesavo/homepage | closed | create contact info | documentation |
Посилання на соцмережі (Facebook чи Instagram, тощо), номер телефону чи адреса електронної скриньки, тощо. Може не всі лінки в світі, а тільки ті, що дійсно доречні. | 1.0 | create contact info -
Посилання на соцмережі (Facebook чи Instagram, тощо), номер телефону чи адреса електронної скриньки, тощо. Може не всі лінки в світі, а тільки ті, що дійсно доречні. | non_priority | create contact info посилання на соцмережі facebook чи instagram тощо номер телефону чи адреса електронної скриньки тощо може не всі лінки в світі а тільки ті що дійсно доречні | 0 |
25,234 | 7,657,314,653 | IssuesEvent | 2018-05-10 19:14:09 | patternfly/patternfly-next | https://api.github.com/repos/patternfly/patternfly-next | closed | Add sass prettier for autoformatting/linting enforcement | build | Add the sass prettier/pre-commit hooks to ensure sass is formatted in a standard way for developers | 1.0 | Add sass prettier for autoformatting/linting enforcement - Add the sass prettier/pre-commit hooks to ensure sass is formatted in a standard way for developers | non_priority | add sass prettier for autoformatting linting enforcement add the sass prettier pre commit hooks to ensure sass is formatted in a standard way for developers | 0 |
11,919 | 4,320,635,453 | IssuesEvent | 2016-07-25 06:33:41 | OuiShare/OuiShare | https://api.github.com/repos/OuiShare/OuiShare | opened | website field validation on user profile | backend bug code | On member signup page and profile,
- website field should validate in another way than requiring http://
- it should automatically add http:// in front of field content in case it is missing, and then trying to validate | 1.0 | website field validation on user profile - On member signup page and profile,
- website field should validate in another way than requiring http://
- it should automatically add http:// in front of field content in case it is missing, and then trying to validate | non_priority | website field validation on user profile on member signup page and profile website field should validate in another way than requiring http it should automatically add http in front of field content in case it is missing and then trying to validate | 0 |
137,028 | 11,096,514,268 | IssuesEvent | 2019-12-16 11:18:59 | hazelcast/hazelcast | https://api.github.com/repos/hazelcast/hazelcast | opened | ClientEntryLoadedListenerTest.load_listener_notified_but_add_listener_not_notified_after_loadAll test failure | Team: Client Type: Test-Failure | `ClientEntryLoadedListenerTest.load_listener_notified_but_add_listener_not_notified_after_loadAll` seems to be flaky. Observed here: http://jenkins.hazelcast.com/job/Hazelcast-pr-builder/5079/testReport/junit/com.hazelcast.client.map/ClientEntryLoadedListenerTest/load_listener_notified_but_add_listener_not_notified_after_loadAll/
```
Error Message
expected:<5> but was:<3>
Stacktrace
java.lang.AssertionError: expected:<5> but was:<3>
at org.junit.Assert.fail(Assert.java:88)
at org.junit.Assert.failNotEquals(Assert.java:834)
at org.junit.Assert.assertEquals(Assert.java:645)
at org.junit.Assert.assertEquals(Assert.java:631)
at com.hazelcast.client.map.ClientEntryLoadedListenerTest$4.run(ClientEntryLoadedListenerTest.java:226)
at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1351)
at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1453)
at com.hazelcast.client.map.ClientEntryLoadedListenerTest.load_listener_notified_but_add_listener_not_notified_after_loadAll(ClientEntryLoadedListenerTest.java:223)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:114)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:106)
at java.util.concurrent.FutureTask.run(FutureTask.java:266)
at java.lang.Thread.run(Thread.java:748)
``` | 1.0 | ClientEntryLoadedListenerTest.load_listener_notified_but_add_listener_not_notified_after_loadAll test failure - `ClientEntryLoadedListenerTest.load_listener_notified_but_add_listener_not_notified_after_loadAll` seems to be flaky. Observed here: http://jenkins.hazelcast.com/job/Hazelcast-pr-builder/5079/testReport/junit/com.hazelcast.client.map/ClientEntryLoadedListenerTest/load_listener_notified_but_add_listener_not_notified_after_loadAll/
```
Error Message
expected:<5> but was:<3>
Stacktrace
java.lang.AssertionError: expected:<5> but was:<3>
at org.junit.Assert.fail(Assert.java:88)
at org.junit.Assert.failNotEquals(Assert.java:834)
at org.junit.Assert.assertEquals(Assert.java:645)
at org.junit.Assert.assertEquals(Assert.java:631)
at com.hazelcast.client.map.ClientEntryLoadedListenerTest$4.run(ClientEntryLoadedListenerTest.java:226)
at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1351)
at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1453)
at com.hazelcast.client.map.ClientEntryLoadedListenerTest.load_listener_notified_but_add_listener_not_notified_after_loadAll(ClientEntryLoadedListenerTest.java:223)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:114)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:106)
at java.util.concurrent.FutureTask.run(FutureTask.java:266)
at java.lang.Thread.run(Thread.java:748)
``` | non_priority | cliententryloadedlistenertest load listener notified but add listener not notified after loadall test failure cliententryloadedlistenertest load listener notified but add listener not notified after loadall seems to be flaky observed here error message expected but was stacktrace java lang assertionerror expected but was at org junit assert fail assert java at org junit assert failnotequals assert java at org junit assert assertequals assert java at org junit assert assertequals assert java at com hazelcast client map cliententryloadedlistenertest run cliententryloadedlistenertest java at com hazelcast test hazelcasttestsupport asserttrueeventually hazelcasttestsupport java at com hazelcast test hazelcasttestsupport asserttrueeventually hazelcasttestsupport java at com hazelcast client map cliententryloadedlistenertest load listener notified but add listener not notified after loadall cliententryloadedlistenertest java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at java util concurrent futuretask run futuretask java at java lang thread run thread java | 0 |
193,041 | 22,216,040,463 | IssuesEvent | 2022-06-08 01:49:42 | dpteam/RK3188_TABLET | https://api.github.com/repos/dpteam/RK3188_TABLET | reopened | WS-2021-0551 (Medium) detected in linux-yocto-4.12v3.0.66 | security vulnerability | ## WS-2021-0551 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-4.12v3.0.66</b></p></summary>
<p>
<p>Linux 4.12 Embedded Kernel</p>
<p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-4.12>https://git.yoctoproject.org/git/linux-yocto-4.12</a></p>
<p>Found in HEAD commit: <a href="https://github.com/dpteam/RK3188_TABLET/commit/0c501f5a0fd72c7b2ac82904235363bd44fd8f9e">0c501f5a0fd72c7b2ac82904235363bd44fd8f9e</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/nfs4state.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
nfsd: fix use-after-free due to delegation race
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 148c816f10fd11df27ca6a9b3238cdd42fa72cd3. For more details please see the references link.
<p>Publish Date: 2021-12-19
<p>URL: <a href=https://github.com/gregkh/linux/commit/148c816f10fd11df27ca6a9b3238cdd42fa72cd3>WS-2021-0551</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://osv.dev/vulnerability/GSD-2021-1002600">https://osv.dev/vulnerability/GSD-2021-1002600</a></p>
<p>Release Date: 2021-12-19</p>
<p>Fix Resolution: v5.15.8</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2021-0551 (Medium) detected in linux-yocto-4.12v3.0.66 - ## WS-2021-0551 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-4.12v3.0.66</b></p></summary>
<p>
<p>Linux 4.12 Embedded Kernel</p>
<p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-4.12>https://git.yoctoproject.org/git/linux-yocto-4.12</a></p>
<p>Found in HEAD commit: <a href="https://github.com/dpteam/RK3188_TABLET/commit/0c501f5a0fd72c7b2ac82904235363bd44fd8f9e">0c501f5a0fd72c7b2ac82904235363bd44fd8f9e</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/nfs4state.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
nfsd: fix use-after-free due to delegation race
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 148c816f10fd11df27ca6a9b3238cdd42fa72cd3. For more details please see the references link.
<p>Publish Date: 2021-12-19
<p>URL: <a href=https://github.com/gregkh/linux/commit/148c816f10fd11df27ca6a9b3238cdd42fa72cd3>WS-2021-0551</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://osv.dev/vulnerability/GSD-2021-1002600">https://osv.dev/vulnerability/GSD-2021-1002600</a></p>
<p>Release Date: 2021-12-19</p>
<p>Fix Resolution: v5.15.8</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws medium detected in linux yocto ws medium severity vulnerability vulnerable library linux yocto linux embedded kernel library home page a href found in head commit a href found in base branch master vulnerable source files fs nfsd c vulnerability details nfsd fix use after free due to delegation race this is an automated id intended to aid in discovery of potential security vulnerabilities the actual impact and attack plausibility have not yet been proven this id is fixed in linux kernel version by commit for more details please see the references link publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
47,511 | 7,330,066,570 | IssuesEvent | 2018-03-05 08:34:49 | seqan/seqan3 | https://api.github.com/repos/seqan/seqan3 | opened | Rephrase "Note that you cannot assign regular characters, ..." | documentation good first issue | In quite some alphabet classes we have the following paragraph:
> Note that you cannot assign regular characters, but additional functions for this are available.
The meaning is that you can't assign or construct the alphabet by a letter (e.g. 'A', 'C', ...) of the `char` type directly, but that you have to use the `assign_char` function for that.
I think the phrase in itself does not reflect this, is kind of out of place and hard to understand. | 1.0 | Rephrase "Note that you cannot assign regular characters, ..." - In quite some alphabet classes we have the following paragraph:
> Note that you cannot assign regular characters, but additional functions for this are available.
The meaning is that you can't assign or construct the alphabet by a letter (e.g. 'A', 'C', ...) of the `char` type directly, but that you have to use the `assign_char` function for that.
I think the phrase in itself does not reflect this, is kind of out of place and hard to understand. | non_priority | rephrase note that you cannot assign regular characters in quite some alphabet classes we have the following paragraph note that you cannot assign regular characters but additional functions for this are available the meaning is that you can t assign or construct the alphabet by a letter e g a c of the char type directly but that you have to use the assign char function for that i think the phrase in itself does not reflect this is kind of out of place and hard to understand | 0 |
84,432 | 16,494,731,054 | IssuesEvent | 2021-05-25 09:05:08 | robocorp/robotframework-lsp | https://api.github.com/repos/robocorp/robotframework-lsp | opened | Code completion does not work for Chinese Keywords from resources or library | bug robocorp-code | **Describe the bug**
It does not work for Chinese Keywords from resources or library
**Expected behavior**
Support Code completion for Chinese Keywords | 1.0 | Code completion does not work for Chinese Keywords from resources or library - **Describe the bug**
It does not work for Chinese Keywords from resources or library
**Expected behavior**
Support Code completion for Chinese Keywords | non_priority | code completion does not work for chinese keywords from resources or library describe the bug it does not work for chinese keywords from resources or library expected behavior support code completion for chinese keywords | 0 |
87,738 | 8,120,627,905 | IssuesEvent | 2018-08-16 03:57:08 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | closed | github.com/cockroachdb/cockroach/pkg/sql: TestShowSessions failed under stress | A-sql-execution C-test-failure O-robot | SHA: https://github.com/cockroachdb/cockroach/commits/faa1d2b46708f4f84cd552af6dc7258373fdebb0
Parameters:
```
TAGS=
GOFLAGS=
```
Failed test: https://teamcity.cockroachdb.com/viewLog.html?buildId=758606&tab=buildLog
```
W180704 10:06:48.662022 157881 server/status/runtime.go:143 Could not parse build timestamp: parsing time "" as "2006/01/02 15:04:05": cannot parse "" as "2006"
I180704 10:06:48.667703 157881 server/server.go:790 [n?] monitoring forward clock jumps based on server.clock.forward_jump_check_enabled
I180704 10:06:48.674614 157881 server/config.go:545 [n?] 1 storage engine initialized
I180704 10:06:48.674659 157881 server/config.go:548 [n?] RocksDB cache size: 128 MiB
I180704 10:06:48.674679 157881 server/config.go:548 [n?] store 0: in-memory, size 0 B
I180704 10:06:48.677171 157881 server/node.go:421 [n?] **** cluster f4bd4807-289b-447e-9af3-a9d5b1f72192 has been created
I180704 10:06:48.677276 157881 server/server.go:1365 [n?] **** add additional nodes by specifying --join=127.0.0.1:41981
I180704 10:06:48.679697 157881 storage/store.go:1450 [n1,s1] [n1,s1]: failed initial metrics computation: [n1,s1]: system config not yet available
I180704 10:06:48.679772 157881 server/node.go:551 [n1] initialized store [n1,s1]: disk (capacity=512 MiB, available=512 MiB, used=0 B, logicalBytes=6.9 KiB), ranges=1, leases=0, writes=0.00, bytesPerReplica={p10=7043.00 p25=7043.00 p50=7043.00 p75=7043.00 p90=7043.00 pMax=7043.00}, writesPerReplica={p10=0.00 p25=0.00 p50=0.00 p75=0.00 p90=0.00 pMax=0.00}
I180704 10:06:48.679806 157881 server/node.go:399 [n1] node ID 1 initialized
I180704 10:06:48.680005 157881 gossip/gossip.go:354 [n1] NodeDescriptor set to node_id:1 address:<network_field:"tcp" address_field:"127.0.0.1:41981" > attrs:<> locality:<> ServerVersion:<major_val:2 minor_val:0 patch:0 unstable:7 >
I180704 10:06:48.680906 157881 storage/stores.go:222 [n1] read 0 node addresses from persistent storage
I180704 10:06:48.680986 157881 server/node.go:692 [n1] connecting to gossip network to verify cluster ID...
I180704 10:06:48.687559 157881 server/node.go:717 [n1] node connected via gossip and verified as part of cluster "f4bd4807-289b-447e-9af3-a9d5b1f72192"
I180704 10:06:48.687590 157881 server/node.go:485 [n1] node=1: started with [<no-attributes>=<in-mem>] engine(s) and attributes []
I180704 10:06:48.687787 157881 server/config.go:331 [n1] available memory from cgroups (8.0 EiB) exceeds system memory 16 GiB, using system memory
I180704 10:06:48.687811 157881 server/server.go:1794 [n1] Could not start heap profiler worker due to: directory to store profiles could not be determined
I180704 10:06:48.687869 157881 server/server.go:1502 [n1] starting https server at 127.0.0.1:42301
I180704 10:06:48.687881 157881 server/server.go:1503 [n1] starting grpc/postgres server at 127.0.0.1:41981
I180704 10:06:48.687893 157881 server/server.go:1504 [n1] advertising CockroachDB node at 127.0.0.1:41981
I180704 10:06:48.689740 158095 storage/replica_command.go:279 [split,n1,s1,r1/1:/M{in-ax}] initiating a split of this range at key /System/"" [r2]
I180704 10:06:48.707492 157806 storage/replica_command.go:279 [split,n1,s1,r2/1:/{System/-Max}] initiating a split of this range at key /System/NodeLiveness [r3]
I180704 10:06:48.716554 158121 sql/event_log.go:126 [n1,intExec=optInToDiagnosticsStatReporting] Event: "set_cluster_setting", target: 0, info: {SettingName:diagnostics.reporting.enabled Value:true User:root}
I180704 10:06:48.720504 158128 storage/replica_command.go:279 [split,n1,s1,r3/1:/{System/NodeL…-Max}] initiating a split of this range at key /System/NodeLivenessMax [r4]
I180704 10:06:48.743117 158165 storage/replica_command.go:279 [split,n1,s1,r4/1:/{System/NodeL…-Max}] initiating a split of this range at key /System/tsd [r5]
W180704 10:06:48.744831 158137 storage/intent_resolver.go:643 [n1,s1] failed to push during intent resolution: failed to push "sql txn" id=e112b002 key=/Table/SystemConfigSpan/Start rw=true pri=0.03297413 iso=SERIALIZABLE stat=PENDING epo=0 ts=1530698808.721835184,0 orig=1530698808.721835184,0 max=1530698808.721835184,0 wto=false rop=false seq=12
I180704 10:06:48.761191 158135 sql/event_log.go:126 [n1,intExec=set-setting] Event: "set_cluster_setting", target: 0, info: {SettingName:version Value:$1 User:root}
I180704 10:06:48.763623 158141 storage/replica_command.go:279 [split,n1,s1,r5/1:/{System/tsd-Max}] initiating a split of this range at key /System/"tse" [r6]
I180704 10:06:48.784470 158016 sql/event_log.go:126 [n1,intExec=disableNetTrace] Event: "set_cluster_setting", target: 0, info: {SettingName:trace.debug.enable Value:false User:root}
I180704 10:06:48.790154 157870 storage/replica_command.go:279 [split,n1,s1,r6/1:/{System/tse-Max}] initiating a split of this range at key /Table/SystemConfigSpan/Start [r7]
I180704 10:06:48.796817 158174 storage/replica_command.go:279 [split,n1,s1,r7/1:/{Table/System…-Max}] initiating a split of this range at key /Table/11 [r8]
I180704 10:06:48.801725 158207 storage/replica_command.go:279 [split,n1,s1,r8/1:/{Table/11-Max}] initiating a split of this range at key /Table/12 [r9]
I180704 10:06:48.809417 158245 storage/replica_command.go:279 [split,n1,s1,r9/1:/{Table/12-Max}] initiating a split of this range at key /Table/13 [r10]
I180704 10:06:48.815126 158277 storage/replica_command.go:279 [split,n1,s1,r10/1:/{Table/13-Max}] initiating a split of this range at key /Table/14 [r11]
I180704 10:06:48.819957 158152 storage/replica_command.go:279 [split,n1,s1,r11/1:/{Table/14-Max}] initiating a split of this range at key /Table/15 [r12]
I180704 10:06:48.825624 158293 storage/replica_command.go:279 [split,n1,s1,r12/1:/{Table/15-Max}] initiating a split of this range at key /Table/16 [r13]
W180704 10:06:48.829740 158300 storage/intent_resolver.go:643 [n1,s1] failed to push during intent resolution: failed to push "split" id=5bc5b590 key=/Local/Range/Table/15/RangeDescriptor rw=true pri=0.05293204 iso=SERIALIZABLE stat=PENDING epo=0 ts=1530698808.826453618,0 orig=1530698808.826453618,0 max=1530698808.826453618,0 wto=false rop=false seq=1
I180704 10:06:48.830982 158233 storage/replica_command.go:279 [split,n1,s1,r13/1:/{Table/16-Max}] initiating a split of this range at key /Table/17 [r14]
W180704 10:06:48.836958 158307 storage/intent_resolver.go:643 [n1,s1] failed to push during intent resolution: failed to push "split" id=3f334e4f key=/Local/Range/Table/16/RangeDescriptor rw=true pri=0.05459823 iso=SERIALIZABLE stat=PENDING epo=0 ts=1530698808.831011193,0 orig=1530698808.831011193,0 max=1530698808.831011193,0 wto=false rop=false seq=1
I180704 10:06:48.838058 158235 storage/replica_command.go:279 [split,n1,s1,r14/1:/{Table/17-Max}] initiating a split of this range at key /Table/18 [r15]
I180704 10:06:48.838893 158223 sql/event_log.go:126 [n1,intExec=initializeClusterSecret] Event: "set_cluster_setting", target: 0, info: {SettingName:cluster.secret Value:gen_random_uuid()::STRING User:root}
I180704 10:06:48.845604 157785 sql/event_log.go:126 [n1,intExec=create-default-db] Event: "create_database", target: 50, info: {DatabaseName:defaultdb Statement:CREATE DATABASE IF NOT EXISTS defaultdb User:root}
I180704 10:06:48.850186 157790 sql/event_log.go:126 [n1,intExec=create-default-db] Event: "create_database", target: 51, info: {DatabaseName:postgres Statement:CREATE DATABASE IF NOT EXISTS postgres User:root}
I180704 10:06:48.858761 158310 storage/replica_command.go:279 [split,n1,s1,r15/1:/{Table/18-Max}] initiating a split of this range at key /Table/19 [r16]
I180704 10:06:48.861208 157881 server/server.go:1583 [n1] done ensuring all necessary migrations have run
I180704 10:06:48.861241 157881 server/server.go:1586 [n1] serving sql connections
I180704 10:06:48.866005 158158 sql/event_log.go:126 [n1] Event: "node_join", target: 1, info: {Descriptor:{NodeID:1 Address:{NetworkField:tcp AddressField:127.0.0.1:41981} Attrs: Locality: ServerVersion:2.0-7} ClusterID:f4bd4807-289b-447e-9af3-a9d5b1f72192 StartedAt:1530698808687572239 LastUp:1530698808687572239}
I180704 10:06:48.866744 158371 storage/replica_command.go:279 [split,n1,s1,r16/1:/{Table/19-Max}] initiating a split of this range at key /Table/20 [r17]
I180704 10:06:48.873619 158156 server/server_update.go:65 [n1] no need to upgrade, cluster already at the newest version
I180704 10:06:48.880019 158267 storage/replica_command.go:279 [split,n1,s1,r17/1:/{Table/20-Max}] initiating a split of this range at key /Table/21 [r18]
I180704 10:06:48.895298 158380 storage/replica_command.go:279 [split,n1,s1,r18/1:/{Table/21-Max}] initiating a split of this range at key /Table/22 [r19]
I180704 10:06:48.903179 158241 storage/replica_command.go:279 [split,n1,s1,r19/1:/{Table/22-Max}] initiating a split of this range at key /Table/23 [r20]
I180704 10:06:48.912494 158409 storage/replica_command.go:279 [split,n1,s1,r20/1:/{Table/23-Max}] initiating a split of this range at key /Table/50 [r21]
I180704 10:06:48.920722 158385 storage/replica_command.go:279 [split,n1,s1,r21/1:/{Table/50-Max}] initiating a split of this range at key /Table/51 [r22]
W180704 10:06:48.931148 157881 server/status/runtime.go:143 Could not parse build timestamp: parsing time "" as "2006/01/02 15:04:05": cannot parse "" as "2006"
I180704 10:06:48.934979 157881 server/server.go:790 [n?] monitoring forward clock jumps based on server.clock.forward_jump_check_enabled
I180704 10:06:48.936582 157881 server/config.go:545 [n?] 1 storage engine initialized
I180704 10:06:48.936638 157881 server/config.go:548 [n?] RocksDB cache size: 128 MiB
I180704 10:06:48.936656 157881 server/config.go:548 [n?] store 0: in-memory, size 0 B
W180704 10:06:48.936726 157881 gossip/gossip.go:1316 [n?] no incoming or outgoing connections
I180704 10:06:48.936770 157881 server/server.go:1367 [n?] no stores bootstrapped and --join flag specified, awaiting init command.
I180704 10:06:48.960210 158504 gossip/client.go:129 [n?] started gossip client to 127.0.0.1:41981
I180704 10:06:48.979435 158536 gossip/server.go:219 [n1] received initial cluster-verification connection from {tcp 127.0.0.1:37633}
I180704 10:06:48.980565 157881 storage/stores.go:222 [n?] read 0 node addresses from persistent storage
I180704 10:06:48.980601 157881 server/node.go:692 [n?] connecting to gossip network to verify cluster ID...
I180704 10:06:48.980627 157881 server/node.go:717 [n?] node connected via gossip and verified as part of cluster "f4bd4807-289b-447e-9af3-a9d5b1f72192"
I180704 10:06:48.980931 158557 kv/dist_sender.go:339 [n?] unable to determine this node's attributes for replica selection; node is most likely bootstrapping
I180704 10:06:48.981118 158549 storage/stores.go:241 [n?] wrote 1 node addresses to persistent storage
I180704 10:06:48.994302 158556 kv/dist_sender.go:339 [n?] unable to determine this node's attributes for replica selection; node is most likely bootstrapping
I180704 10:06:48.995367 157881 kv/dist_sender.go:339 [n?] unable to determine this node's attributes for replica selection; node is most likely bootstrapping
I180704 10:06:48.996607 157881 server/node.go:392 [n?] new node allocated ID 2
I180704 10:06:48.996708 157881 gossip/gossip.go:354 [n2] NodeDescriptor set to node_id:2 address:<network_field:"tcp" address_field:"127.0.0.1:37633" > attrs:<> locality:<> ServerVersion:<major_val:2 minor_val:0 patch:0 unstable:7 >
I180704 10:06:48.996786 157881 server/node.go:466 [n2] node=2: asynchronously bootstrapping engine(s) [<no-attributes>=<in-mem>]
I180704 10:06:48.996831 157881 server/node.go:485 [n2] node=2: started with [] engine(s) and attributes []
I180704 10:06:48.997093 157881 server/config.go:331 [n2] available memory from cgroups (8.0 EiB) exceeds system memory 16 GiB, using system memory
I180704 10:06:48.997146 157881 server/server.go:1794 [n2] Could not start heap profiler worker due to: directory to store profiles could not be determined
I180704 10:06:48.997239 157881 server/server.go:1502 [n2] starting https server at 127.0.0.1:40513
I180704 10:06:48.997279 157881 server/server.go:1503 [n2] starting grpc/postgres server at 127.0.0.1:37633
I180704 10:06:48.997309 157881 server/server.go:1504 [n2] advertising CockroachDB node at 127.0.0.1:37633
I180704 10:06:49.002680 158457 storage/stores.go:241 [n1] wrote 1 node addresses to persistent storage
I180704 10:06:49.004020 157881 server/server.go:1583 [n2] done ensuring all necessary migrations have run
I180704 10:06:49.004038 157881 server/server.go:1586 [n2] serving sql connections
I180704 10:06:49.007983 158432 server/node.go:673 [n2] bootstrapped store [n2,s2]
I180704 10:06:49.015399 158460 server/server_update.go:65 [n2] no need to upgrade, cluster already at the newest version
I180704 10:06:49.015803 158462 sql/event_log.go:126 [n2] Event: "node_join", target: 2, info: {Descriptor:{NodeID:2 Address:{NetworkField:tcp AddressField:127.0.0.1:37633} Attrs: Locality: ServerVersion:2.0-7} ClusterID:f4bd4807-289b-447e-9af3-a9d5b1f72192 StartedAt:1530698808996819253 LastUp:1530698808996819253}
I180704 10:06:49.042159 158726 sql/event_log.go:126 [n1,client=127.0.0.1:59146,user=root] Event: "create_database", target: 52, info: {DatabaseName:test Statement:CREATE DATABASE IF NOT EXISTS test User:root}
I180704 10:06:49.043320 158728 storage/replica_command.go:279 [split,n1,s1,r22/1:/{Table/51-Max}] initiating a split of this range at key /Table/52 [r23]
I180704 10:06:49.045604 158726 sql/event_log.go:126 [n1,client=127.0.0.1:59146,user=root] Event: "create_table", target: 53, info: {TableName:test.public.t Statement:CREATE TABLE test.public.t (num INT) User:root}
I180704 10:06:49.047912 157881 util/stop/stopper.go:471 quiescing; tasks left:
2 node.Node: writing summary
1 [async] node.Node: bootstrapping stores
I180704 10:06:49.052399 158715 storage/replica_command.go:279 [split,n1,s1,r23/1:/{Table/52-Max}] initiating a split of this range at key /Table/53 [r24]
W180704 10:06:49.054941 158567 server/node.go:840 [n2,summaries] error recording initial status summaries: node unavailable; try another peer
I180704 10:06:49.054969 157881 util/stop/stopper.go:471 quiescing; tasks left:
1 node.Node: writing summary
1 [async] node.Node: bootstrapping stores
W180704 10:06:49.055259 158432 server/node.go:683 [n2] error writing node summary after store bootstrap: node unavailable; try another peer
I180704 10:06:49.060293 158756 util/stop/stopper.go:471 quiescing; tasks left:
1 storage.intentResolver: processing intents
1 node.Node: batch
1 [async] storage.split: processing replica
1 [async] kv.TxnCoordSender: heartbeat loop
I180704 10:06:49.060421 158756 util/stop/stopper.go:471 quiescing; tasks left:
1 storage.intentResolver: processing intents
1 node.Node: batch
1 [async] storage.split: processing replica
W180704 10:06:49.061040 158715 internal/client/txn.go:585 [split,n1,s1,r23/1:/{Table/52-Max}] failure aborting transaction: node unavailable; try another peer; abort caused by: log-range-event: node unavailable; try another peer
E180704 10:06:49.061085 158715 storage/queue.go:778 [split,n1,s1,r23/1:/{Table/52-Max}] unable to split [n1,s1,r23/1:/{Table/52-Max}] at key "/Table/53": split at key /Table/53 failed: log-range-event: node unavailable; try another peer
I180704 10:06:49.061140 158756 util/stop/stopper.go:471 quiescing; tasks left:
1 storage.intentResolver: processing intents
W180704 10:06:49.062824 158519 storage/intent_resolver.go:711 [n1,s1] failed to cleanup transaction intents: could not GC completed transaction anchored at /Local/Range/Table/51/RangeDescriptor: node unavailable; try another peer
show_test.go:702:
show_test.go:702: SELECT node_id, active_queries FROM [SHOW CLUSTER SESSIONS]
show_test.go:712: expected 1 error row, got 0
``` | 1.0 | github.com/cockroachdb/cockroach/pkg/sql: TestShowSessions failed under stress - SHA: https://github.com/cockroachdb/cockroach/commits/faa1d2b46708f4f84cd552af6dc7258373fdebb0
Parameters:
```
TAGS=
GOFLAGS=
```
Failed test: https://teamcity.cockroachdb.com/viewLog.html?buildId=758606&tab=buildLog
```
W180704 10:06:48.662022 157881 server/status/runtime.go:143 Could not parse build timestamp: parsing time "" as "2006/01/02 15:04:05": cannot parse "" as "2006"
I180704 10:06:48.667703 157881 server/server.go:790 [n?] monitoring forward clock jumps based on server.clock.forward_jump_check_enabled
I180704 10:06:48.674614 157881 server/config.go:545 [n?] 1 storage engine initialized
I180704 10:06:48.674659 157881 server/config.go:548 [n?] RocksDB cache size: 128 MiB
I180704 10:06:48.674679 157881 server/config.go:548 [n?] store 0: in-memory, size 0 B
I180704 10:06:48.677171 157881 server/node.go:421 [n?] **** cluster f4bd4807-289b-447e-9af3-a9d5b1f72192 has been created
I180704 10:06:48.677276 157881 server/server.go:1365 [n?] **** add additional nodes by specifying --join=127.0.0.1:41981
I180704 10:06:48.679697 157881 storage/store.go:1450 [n1,s1] [n1,s1]: failed initial metrics computation: [n1,s1]: system config not yet available
I180704 10:06:48.679772 157881 server/node.go:551 [n1] initialized store [n1,s1]: disk (capacity=512 MiB, available=512 MiB, used=0 B, logicalBytes=6.9 KiB), ranges=1, leases=0, writes=0.00, bytesPerReplica={p10=7043.00 p25=7043.00 p50=7043.00 p75=7043.00 p90=7043.00 pMax=7043.00}, writesPerReplica={p10=0.00 p25=0.00 p50=0.00 p75=0.00 p90=0.00 pMax=0.00}
I180704 10:06:48.679806 157881 server/node.go:399 [n1] node ID 1 initialized
I180704 10:06:48.680005 157881 gossip/gossip.go:354 [n1] NodeDescriptor set to node_id:1 address:<network_field:"tcp" address_field:"127.0.0.1:41981" > attrs:<> locality:<> ServerVersion:<major_val:2 minor_val:0 patch:0 unstable:7 >
I180704 10:06:48.680906 157881 storage/stores.go:222 [n1] read 0 node addresses from persistent storage
I180704 10:06:48.680986 157881 server/node.go:692 [n1] connecting to gossip network to verify cluster ID...
I180704 10:06:48.687559 157881 server/node.go:717 [n1] node connected via gossip and verified as part of cluster "f4bd4807-289b-447e-9af3-a9d5b1f72192"
I180704 10:06:48.687590 157881 server/node.go:485 [n1] node=1: started with [<no-attributes>=<in-mem>] engine(s) and attributes []
I180704 10:06:48.687787 157881 server/config.go:331 [n1] available memory from cgroups (8.0 EiB) exceeds system memory 16 GiB, using system memory
I180704 10:06:48.687811 157881 server/server.go:1794 [n1] Could not start heap profiler worker due to: directory to store profiles could not be determined
I180704 10:06:48.687869 157881 server/server.go:1502 [n1] starting https server at 127.0.0.1:42301
I180704 10:06:48.687881 157881 server/server.go:1503 [n1] starting grpc/postgres server at 127.0.0.1:41981
I180704 10:06:48.687893 157881 server/server.go:1504 [n1] advertising CockroachDB node at 127.0.0.1:41981
I180704 10:06:48.689740 158095 storage/replica_command.go:279 [split,n1,s1,r1/1:/M{in-ax}] initiating a split of this range at key /System/"" [r2]
I180704 10:06:48.707492 157806 storage/replica_command.go:279 [split,n1,s1,r2/1:/{System/-Max}] initiating a split of this range at key /System/NodeLiveness [r3]
I180704 10:06:48.716554 158121 sql/event_log.go:126 [n1,intExec=optInToDiagnosticsStatReporting] Event: "set_cluster_setting", target: 0, info: {SettingName:diagnostics.reporting.enabled Value:true User:root}
I180704 10:06:48.720504 158128 storage/replica_command.go:279 [split,n1,s1,r3/1:/{System/NodeL…-Max}] initiating a split of this range at key /System/NodeLivenessMax [r4]
I180704 10:06:48.743117 158165 storage/replica_command.go:279 [split,n1,s1,r4/1:/{System/NodeL…-Max}] initiating a split of this range at key /System/tsd [r5]
W180704 10:06:48.744831 158137 storage/intent_resolver.go:643 [n1,s1] failed to push during intent resolution: failed to push "sql txn" id=e112b002 key=/Table/SystemConfigSpan/Start rw=true pri=0.03297413 iso=SERIALIZABLE stat=PENDING epo=0 ts=1530698808.721835184,0 orig=1530698808.721835184,0 max=1530698808.721835184,0 wto=false rop=false seq=12
I180704 10:06:48.761191 158135 sql/event_log.go:126 [n1,intExec=set-setting] Event: "set_cluster_setting", target: 0, info: {SettingName:version Value:$1 User:root}
I180704 10:06:48.763623 158141 storage/replica_command.go:279 [split,n1,s1,r5/1:/{System/tsd-Max}] initiating a split of this range at key /System/"tse" [r6]
I180704 10:06:48.784470 158016 sql/event_log.go:126 [n1,intExec=disableNetTrace] Event: "set_cluster_setting", target: 0, info: {SettingName:trace.debug.enable Value:false User:root}
I180704 10:06:48.790154 157870 storage/replica_command.go:279 [split,n1,s1,r6/1:/{System/tse-Max}] initiating a split of this range at key /Table/SystemConfigSpan/Start [r7]
I180704 10:06:48.796817 158174 storage/replica_command.go:279 [split,n1,s1,r7/1:/{Table/System…-Max}] initiating a split of this range at key /Table/11 [r8]
I180704 10:06:48.801725 158207 storage/replica_command.go:279 [split,n1,s1,r8/1:/{Table/11-Max}] initiating a split of this range at key /Table/12 [r9]
I180704 10:06:48.809417 158245 storage/replica_command.go:279 [split,n1,s1,r9/1:/{Table/12-Max}] initiating a split of this range at key /Table/13 [r10]
I180704 10:06:48.815126 158277 storage/replica_command.go:279 [split,n1,s1,r10/1:/{Table/13-Max}] initiating a split of this range at key /Table/14 [r11]
I180704 10:06:48.819957 158152 storage/replica_command.go:279 [split,n1,s1,r11/1:/{Table/14-Max}] initiating a split of this range at key /Table/15 [r12]
I180704 10:06:48.825624 158293 storage/replica_command.go:279 [split,n1,s1,r12/1:/{Table/15-Max}] initiating a split of this range at key /Table/16 [r13]
W180704 10:06:48.829740 158300 storage/intent_resolver.go:643 [n1,s1] failed to push during intent resolution: failed to push "split" id=5bc5b590 key=/Local/Range/Table/15/RangeDescriptor rw=true pri=0.05293204 iso=SERIALIZABLE stat=PENDING epo=0 ts=1530698808.826453618,0 orig=1530698808.826453618,0 max=1530698808.826453618,0 wto=false rop=false seq=1
I180704 10:06:48.830982 158233 storage/replica_command.go:279 [split,n1,s1,r13/1:/{Table/16-Max}] initiating a split of this range at key /Table/17 [r14]
W180704 10:06:48.836958 158307 storage/intent_resolver.go:643 [n1,s1] failed to push during intent resolution: failed to push "split" id=3f334e4f key=/Local/Range/Table/16/RangeDescriptor rw=true pri=0.05459823 iso=SERIALIZABLE stat=PENDING epo=0 ts=1530698808.831011193,0 orig=1530698808.831011193,0 max=1530698808.831011193,0 wto=false rop=false seq=1
I180704 10:06:48.838058 158235 storage/replica_command.go:279 [split,n1,s1,r14/1:/{Table/17-Max}] initiating a split of this range at key /Table/18 [r15]
I180704 10:06:48.838893 158223 sql/event_log.go:126 [n1,intExec=initializeClusterSecret] Event: "set_cluster_setting", target: 0, info: {SettingName:cluster.secret Value:gen_random_uuid()::STRING User:root}
I180704 10:06:48.845604 157785 sql/event_log.go:126 [n1,intExec=create-default-db] Event: "create_database", target: 50, info: {DatabaseName:defaultdb Statement:CREATE DATABASE IF NOT EXISTS defaultdb User:root}
I180704 10:06:48.850186 157790 sql/event_log.go:126 [n1,intExec=create-default-db] Event: "create_database", target: 51, info: {DatabaseName:postgres Statement:CREATE DATABASE IF NOT EXISTS postgres User:root}
I180704 10:06:48.858761 158310 storage/replica_command.go:279 [split,n1,s1,r15/1:/{Table/18-Max}] initiating a split of this range at key /Table/19 [r16]
I180704 10:06:48.861208 157881 server/server.go:1583 [n1] done ensuring all necessary migrations have run
I180704 10:06:48.861241 157881 server/server.go:1586 [n1] serving sql connections
I180704 10:06:48.866005 158158 sql/event_log.go:126 [n1] Event: "node_join", target: 1, info: {Descriptor:{NodeID:1 Address:{NetworkField:tcp AddressField:127.0.0.1:41981} Attrs: Locality: ServerVersion:2.0-7} ClusterID:f4bd4807-289b-447e-9af3-a9d5b1f72192 StartedAt:1530698808687572239 LastUp:1530698808687572239}
I180704 10:06:48.866744 158371 storage/replica_command.go:279 [split,n1,s1,r16/1:/{Table/19-Max}] initiating a split of this range at key /Table/20 [r17]
I180704 10:06:48.873619 158156 server/server_update.go:65 [n1] no need to upgrade, cluster already at the newest version
I180704 10:06:48.880019 158267 storage/replica_command.go:279 [split,n1,s1,r17/1:/{Table/20-Max}] initiating a split of this range at key /Table/21 [r18]
I180704 10:06:48.895298 158380 storage/replica_command.go:279 [split,n1,s1,r18/1:/{Table/21-Max}] initiating a split of this range at key /Table/22 [r19]
I180704 10:06:48.903179 158241 storage/replica_command.go:279 [split,n1,s1,r19/1:/{Table/22-Max}] initiating a split of this range at key /Table/23 [r20]
I180704 10:06:48.912494 158409 storage/replica_command.go:279 [split,n1,s1,r20/1:/{Table/23-Max}] initiating a split of this range at key /Table/50 [r21]
I180704 10:06:48.920722 158385 storage/replica_command.go:279 [split,n1,s1,r21/1:/{Table/50-Max}] initiating a split of this range at key /Table/51 [r22]
W180704 10:06:48.931148 157881 server/status/runtime.go:143 Could not parse build timestamp: parsing time "" as "2006/01/02 15:04:05": cannot parse "" as "2006"
I180704 10:06:48.934979 157881 server/server.go:790 [n?] monitoring forward clock jumps based on server.clock.forward_jump_check_enabled
I180704 10:06:48.936582 157881 server/config.go:545 [n?] 1 storage engine initialized
I180704 10:06:48.936638 157881 server/config.go:548 [n?] RocksDB cache size: 128 MiB
I180704 10:06:48.936656 157881 server/config.go:548 [n?] store 0: in-memory, size 0 B
W180704 10:06:48.936726 157881 gossip/gossip.go:1316 [n?] no incoming or outgoing connections
I180704 10:06:48.936770 157881 server/server.go:1367 [n?] no stores bootstrapped and --join flag specified, awaiting init command.
I180704 10:06:48.960210 158504 gossip/client.go:129 [n?] started gossip client to 127.0.0.1:41981
I180704 10:06:48.979435 158536 gossip/server.go:219 [n1] received initial cluster-verification connection from {tcp 127.0.0.1:37633}
I180704 10:06:48.980565 157881 storage/stores.go:222 [n?] read 0 node addresses from persistent storage
I180704 10:06:48.980601 157881 server/node.go:692 [n?] connecting to gossip network to verify cluster ID...
I180704 10:06:48.980627 157881 server/node.go:717 [n?] node connected via gossip and verified as part of cluster "f4bd4807-289b-447e-9af3-a9d5b1f72192"
I180704 10:06:48.980931 158557 kv/dist_sender.go:339 [n?] unable to determine this node's attributes for replica selection; node is most likely bootstrapping
I180704 10:06:48.981118 158549 storage/stores.go:241 [n?] wrote 1 node addresses to persistent storage
I180704 10:06:48.994302 158556 kv/dist_sender.go:339 [n?] unable to determine this node's attributes for replica selection; node is most likely bootstrapping
I180704 10:06:48.995367 157881 kv/dist_sender.go:339 [n?] unable to determine this node's attributes for replica selection; node is most likely bootstrapping
I180704 10:06:48.996607 157881 server/node.go:392 [n?] new node allocated ID 2
I180704 10:06:48.996708 157881 gossip/gossip.go:354 [n2] NodeDescriptor set to node_id:2 address:<network_field:"tcp" address_field:"127.0.0.1:37633" > attrs:<> locality:<> ServerVersion:<major_val:2 minor_val:0 patch:0 unstable:7 >
I180704 10:06:48.996786 157881 server/node.go:466 [n2] node=2: asynchronously bootstrapping engine(s) [<no-attributes>=<in-mem>]
I180704 10:06:48.996831 157881 server/node.go:485 [n2] node=2: started with [] engine(s) and attributes []
I180704 10:06:48.997093 157881 server/config.go:331 [n2] available memory from cgroups (8.0 EiB) exceeds system memory 16 GiB, using system memory
I180704 10:06:48.997146 157881 server/server.go:1794 [n2] Could not start heap profiler worker due to: directory to store profiles could not be determined
I180704 10:06:48.997239 157881 server/server.go:1502 [n2] starting https server at 127.0.0.1:40513
I180704 10:06:48.997279 157881 server/server.go:1503 [n2] starting grpc/postgres server at 127.0.0.1:37633
I180704 10:06:48.997309 157881 server/server.go:1504 [n2] advertising CockroachDB node at 127.0.0.1:37633
I180704 10:06:49.002680 158457 storage/stores.go:241 [n1] wrote 1 node addresses to persistent storage
I180704 10:06:49.004020 157881 server/server.go:1583 [n2] done ensuring all necessary migrations have run
I180704 10:06:49.004038 157881 server/server.go:1586 [n2] serving sql connections
I180704 10:06:49.007983 158432 server/node.go:673 [n2] bootstrapped store [n2,s2]
I180704 10:06:49.015399 158460 server/server_update.go:65 [n2] no need to upgrade, cluster already at the newest version
I180704 10:06:49.015803 158462 sql/event_log.go:126 [n2] Event: "node_join", target: 2, info: {Descriptor:{NodeID:2 Address:{NetworkField:tcp AddressField:127.0.0.1:37633} Attrs: Locality: ServerVersion:2.0-7} ClusterID:f4bd4807-289b-447e-9af3-a9d5b1f72192 StartedAt:1530698808996819253 LastUp:1530698808996819253}
I180704 10:06:49.042159 158726 sql/event_log.go:126 [n1,client=127.0.0.1:59146,user=root] Event: "create_database", target: 52, info: {DatabaseName:test Statement:CREATE DATABASE IF NOT EXISTS test User:root}
I180704 10:06:49.043320 158728 storage/replica_command.go:279 [split,n1,s1,r22/1:/{Table/51-Max}] initiating a split of this range at key /Table/52 [r23]
I180704 10:06:49.045604 158726 sql/event_log.go:126 [n1,client=127.0.0.1:59146,user=root] Event: "create_table", target: 53, info: {TableName:test.public.t Statement:CREATE TABLE test.public.t (num INT) User:root}
I180704 10:06:49.047912 157881 util/stop/stopper.go:471 quiescing; tasks left:
2 node.Node: writing summary
1 [async] node.Node: bootstrapping stores
I180704 10:06:49.052399 158715 storage/replica_command.go:279 [split,n1,s1,r23/1:/{Table/52-Max}] initiating a split of this range at key /Table/53 [r24]
W180704 10:06:49.054941 158567 server/node.go:840 [n2,summaries] error recording initial status summaries: node unavailable; try another peer
I180704 10:06:49.054969 157881 util/stop/stopper.go:471 quiescing; tasks left:
1 node.Node: writing summary
1 [async] node.Node: bootstrapping stores
W180704 10:06:49.055259 158432 server/node.go:683 [n2] error writing node summary after store bootstrap: node unavailable; try another peer
I180704 10:06:49.060293 158756 util/stop/stopper.go:471 quiescing; tasks left:
1 storage.intentResolver: processing intents
1 node.Node: batch
1 [async] storage.split: processing replica
1 [async] kv.TxnCoordSender: heartbeat loop
I180704 10:06:49.060421 158756 util/stop/stopper.go:471 quiescing; tasks left:
1 storage.intentResolver: processing intents
1 node.Node: batch
1 [async] storage.split: processing replica
W180704 10:06:49.061040 158715 internal/client/txn.go:585 [split,n1,s1,r23/1:/{Table/52-Max}] failure aborting transaction: node unavailable; try another peer; abort caused by: log-range-event: node unavailable; try another peer
E180704 10:06:49.061085 158715 storage/queue.go:778 [split,n1,s1,r23/1:/{Table/52-Max}] unable to split [n1,s1,r23/1:/{Table/52-Max}] at key "/Table/53": split at key /Table/53 failed: log-range-event: node unavailable; try another peer
I180704 10:06:49.061140 158756 util/stop/stopper.go:471 quiescing; tasks left:
1 storage.intentResolver: processing intents
W180704 10:06:49.062824 158519 storage/intent_resolver.go:711 [n1,s1] failed to cleanup transaction intents: could not GC completed transaction anchored at /Local/Range/Table/51/RangeDescriptor: node unavailable; try another peer
show_test.go:702:
show_test.go:702: SELECT node_id, active_queries FROM [SHOW CLUSTER SESSIONS]
show_test.go:712: expected 1 error row, got 0
``` | non_priority | github com cockroachdb cockroach pkg sql testshowsessions failed under stress sha parameters tags goflags failed test server status runtime go could not parse build timestamp parsing time as cannot parse as server server go monitoring forward clock jumps based on server clock forward jump check enabled server config go storage engine initialized server config go rocksdb cache size mib server config go store in memory size b server node go cluster has been created server server go add additional nodes by specifying join storage store go failed initial metrics computation system config not yet available server node go initialized store disk capacity mib available mib used b logicalbytes kib ranges leases writes bytesperreplica pmax writesperreplica pmax server node go node id initialized gossip gossip go nodedescriptor set to node id address attrs locality serverversion storage stores go read node addresses from persistent storage server node go connecting to gossip network to verify cluster id server node go node connected via gossip and verified as part of cluster server node go node started with engine s and attributes server config go available memory from cgroups eib exceeds system memory gib using system memory server server go could not start heap profiler worker due to directory to store profiles could not be determined server server go starting https server at server server go starting grpc postgres server at server server go advertising cockroachdb node at storage replica command go initiating a split of this range at key system storage replica command go initiating a split of this range at key system nodeliveness sql event log go event set cluster setting target info settingname diagnostics reporting enabled value true user root storage replica command go initiating a split of this range at key system nodelivenessmax storage replica command go initiating a split of this range at key system tsd storage intent resolver go failed to push during intent resolution failed to push sql txn id key table systemconfigspan start rw true pri iso serializable stat pending epo ts orig max wto false rop false seq sql event log go event set cluster setting target info settingname version value user root storage replica command go initiating a split of this range at key system tse sql event log go event set cluster setting target info settingname trace debug enable value false user root storage replica command go initiating a split of this range at key table systemconfigspan start storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage intent resolver go failed to push during intent resolution failed to push split id key local range table rangedescriptor rw true pri iso serializable stat pending epo ts orig max wto false rop false seq storage replica command go initiating a split of this range at key table storage intent resolver go failed to push during intent resolution failed to push split id key local range table rangedescriptor rw true pri iso serializable stat pending epo ts orig max wto false rop false seq storage replica command go initiating a split of this range at key table sql event log go event set cluster setting target info settingname cluster secret value gen random uuid string user root sql event log go event create database target info databasename defaultdb statement create database if not exists defaultdb user root sql event log go event create database target info databasename postgres statement create database if not exists postgres user root storage replica command go initiating a split of this range at key table server server go done ensuring all necessary migrations have run server server go serving sql connections sql event log go event node join target info descriptor nodeid address networkfield tcp addressfield attrs locality serverversion clusterid startedat lastup storage replica command go initiating a split of this range at key table server server update go no need to upgrade cluster already at the newest version storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table server status runtime go could not parse build timestamp parsing time as cannot parse as server server go monitoring forward clock jumps based on server clock forward jump check enabled server config go storage engine initialized server config go rocksdb cache size mib server config go store in memory size b gossip gossip go no incoming or outgoing connections server server go no stores bootstrapped and join flag specified awaiting init command gossip client go started gossip client to gossip server go received initial cluster verification connection from tcp storage stores go read node addresses from persistent storage server node go connecting to gossip network to verify cluster id server node go node connected via gossip and verified as part of cluster kv dist sender go unable to determine this node s attributes for replica selection node is most likely bootstrapping storage stores go wrote node addresses to persistent storage kv dist sender go unable to determine this node s attributes for replica selection node is most likely bootstrapping kv dist sender go unable to determine this node s attributes for replica selection node is most likely bootstrapping server node go new node allocated id gossip gossip go nodedescriptor set to node id address attrs locality serverversion server node go node asynchronously bootstrapping engine s server node go node started with engine s and attributes server config go available memory from cgroups eib exceeds system memory gib using system memory server server go could not start heap profiler worker due to directory to store profiles could not be determined server server go starting https server at server server go starting grpc postgres server at server server go advertising cockroachdb node at storage stores go wrote node addresses to persistent storage server server go done ensuring all necessary migrations have run server server go serving sql connections server node go bootstrapped store server server update go no need to upgrade cluster already at the newest version sql event log go event node join target info descriptor nodeid address networkfield tcp addressfield attrs locality serverversion clusterid startedat lastup sql event log go event create database target info databasename test statement create database if not exists test user root storage replica command go initiating a split of this range at key table sql event log go event create table target info tablename test public t statement create table test public t num int user root util stop stopper go quiescing tasks left node node writing summary node node bootstrapping stores storage replica command go initiating a split of this range at key table server node go error recording initial status summaries node unavailable try another peer util stop stopper go quiescing tasks left node node writing summary node node bootstrapping stores server node go error writing node summary after store bootstrap node unavailable try another peer util stop stopper go quiescing tasks left storage intentresolver processing intents node node batch storage split processing replica kv txncoordsender heartbeat loop util stop stopper go quiescing tasks left storage intentresolver processing intents node node batch storage split processing replica internal client txn go failure aborting transaction node unavailable try another peer abort caused by log range event node unavailable try another peer storage queue go unable to split at key table split at key table failed log range event node unavailable try another peer util stop stopper go quiescing tasks left storage intentresolver processing intents storage intent resolver go failed to cleanup transaction intents could not gc completed transaction anchored at local range table rangedescriptor node unavailable try another peer show test go show test go select node id active queries from show test go expected error row got | 0 |
309,801 | 26,679,027,202 | IssuesEvent | 2023-01-26 16:15:58 | unifyai/ivy | https://api.github.com/repos/unifyai/ivy | closed | Fix reduction_ops.test_torch_mean | PyTorch Frontend Sub Task Failing Test | | | |
|---|---|
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
| 1.0 | Fix reduction_ops.test_torch_mean - | | |
|---|---|
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
| non_priority | fix reduction ops test torch mean tensorflow img src torch img src numpy img src jax img src | 0 |
274,576 | 23,850,601,887 | IssuesEvent | 2022-09-06 17:32:50 | guynir42/virtualobserver | https://api.github.com/repos/guynir42/virtualobserver | opened | Simulator class | testing | Need to add a simulator that injects events into lightcurves (for starters).
Need to test that lightcurves with and without the simulator injection look right. | 1.0 | Simulator class - Need to add a simulator that injects events into lightcurves (for starters).
Need to test that lightcurves with and without the simulator injection look right. | non_priority | simulator class need to add a simulator that injects events into lightcurves for starters need to test that lightcurves with and without the simulator injection look right | 0 |
46,732 | 13,181,009,647 | IssuesEvent | 2020-08-12 13:42:11 | mibo32/fitbit-api-example-java | https://api.github.com/repos/mibo32/fitbit-api-example-java | opened | CVE-2020-14060 (High) detected in jackson-databind-2.8.1.jar | security vulnerability | ## CVE-2020-14060 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /tmp/ws-scm/fitbit-api-example-java/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
- :x: **jackson-databind-2.8.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/mibo32/fitbit-api-example-java/commit/fdd0855fc8f3b846f83506299759cd9cc820e5d2">fdd0855fc8f3b846f83506299759cd9cc820e5d2</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill).
<p>Publish Date: 2020-06-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14060>CVE-2020-14060</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060</a></p>
<p>Release Date: 2020-06-14</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-14060 (High) detected in jackson-databind-2.8.1.jar - ## CVE-2020-14060 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /tmp/ws-scm/fitbit-api-example-java/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
- :x: **jackson-databind-2.8.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/mibo32/fitbit-api-example-java/commit/fdd0855fc8f3b846f83506299759cd9cc820e5d2">fdd0855fc8f3b846f83506299759cd9cc820e5d2</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill).
<p>Publish Date: 2020-06-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14060>CVE-2020-14060</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060</a></p>
<p>Release Date: 2020-06-14</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tmp ws scm fitbit api example java pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library x jackson databind jar vulnerable library found in head commit a href vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to oadd org apache xalan lib sql jndiconnectionpool aka apache drill publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource | 0 |
160,882 | 20,120,316,454 | IssuesEvent | 2022-02-08 01:07:03 | AkshayMukkavilli/Analyzing-the-Significance-of-Structure-in-Amazon-Review-Data-Using-Machine-Learning-Approaches | https://api.github.com/repos/AkshayMukkavilli/Analyzing-the-Significance-of-Structure-in-Amazon-Review-Data-Using-Machine-Learning-Approaches | opened | CVE-2022-23565 (Medium) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl | security vulnerability | ## CVE-2022-23565 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</a></p>
<p>Path to dependency file: /FinalProject/requirements.txt</p>
<p>Path to vulnerable library: /teSource-ArchiveExtractor_8b9e071c-3b11-4aa9-ba60-cdeb60d053b7/20190525011350_65403/20190525011256_depth_0/9/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64/tensorflow-1.13.1.data/purelib/tensorflow</p>
<p>
Dependency Hierarchy:
- :x: **tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
<p>Publish Date: 2022-02-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23565>CVE-2022-23565</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx</a></p>
<p>Release Date: 2022-02-04</p>
<p>Fix Resolution: tensorflow - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-cpu - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-gpu - 2.5.3,2.6.3,2.7.1,2.8.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-23565 (Medium) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl - ## CVE-2022-23565 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</a></p>
<p>Path to dependency file: /FinalProject/requirements.txt</p>
<p>Path to vulnerable library: /teSource-ArchiveExtractor_8b9e071c-3b11-4aa9-ba60-cdeb60d053b7/20190525011350_65403/20190525011256_depth_0/9/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64/tensorflow-1.13.1.data/purelib/tensorflow</p>
<p>
Dependency Hierarchy:
- :x: **tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
<p>Publish Date: 2022-02-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23565>CVE-2022-23565</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx</a></p>
<p>Release Date: 2022-02-04</p>
<p>Fix Resolution: tensorflow - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-cpu - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-gpu - 2.5.3,2.6.3,2.7.1,2.8.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in tensorflow whl cve medium severity vulnerability vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file finalproject requirements txt path to vulnerable library tesource archiveextractor depth tensorflow tensorflow data purelib tensorflow dependency hierarchy x tensorflow whl vulnerable library vulnerability details tensorflow is an open source machine learning framework an attacker can trigger denial of service via assertion failure by altering a savedmodel on disk such that attrdef s of some operation are duplicated the fix will be included in tensorflow we will also cherrypick this commit on tensorflow tensorflow and tensorflow as these are also affected and still in supported range publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tensorflow tensorflow cpu tensorflow gpu step up your open source security game with whitesource | 0 |
103,563 | 22,341,848,749 | IssuesEvent | 2022-06-15 02:14:34 | ClickHouse/ClickHouse | https://api.github.com/repos/ClickHouse/ClickHouse | closed | Enum without zero value is not supported in WITH CUBE, WITH ROLLUP and GROUPING SETS | feature unfinished code | ```
play-eu :) SELECT actor_login, event_type, count() FROM github_events WHERE repo_name = 'ClickHouse/ClickHouse' GROUP BY actor_login, event_type WITH ROLLUP ORDER BY count() DESC LIMIT 10
SELECT
actor_login,
event_type,
count()
FROM github_events
WHERE repo_name = 'ClickHouse/ClickHouse'
GROUP BY
actor_login,
event_type
WITH ROLLUP
ORDER BY count() DESC
LIMIT 10
Query id: 1b7baa06-2ee6-4ae8-b1ed-4c9ecb21514c
Ok.
Exception on client:
Code: 36. DB::Exception: Code: 36. DB::Exception: Unexpected value 0 in enum. (BAD_ARGUMENTS) (version 22.5.1.1984 (official build)). (BAD_ARGUMENTS)
``` | 1.0 | Enum without zero value is not supported in WITH CUBE, WITH ROLLUP and GROUPING SETS - ```
play-eu :) SELECT actor_login, event_type, count() FROM github_events WHERE repo_name = 'ClickHouse/ClickHouse' GROUP BY actor_login, event_type WITH ROLLUP ORDER BY count() DESC LIMIT 10
SELECT
actor_login,
event_type,
count()
FROM github_events
WHERE repo_name = 'ClickHouse/ClickHouse'
GROUP BY
actor_login,
event_type
WITH ROLLUP
ORDER BY count() DESC
LIMIT 10
Query id: 1b7baa06-2ee6-4ae8-b1ed-4c9ecb21514c
Ok.
Exception on client:
Code: 36. DB::Exception: Code: 36. DB::Exception: Unexpected value 0 in enum. (BAD_ARGUMENTS) (version 22.5.1.1984 (official build)). (BAD_ARGUMENTS)
``` | non_priority | enum without zero value is not supported in with cube with rollup and grouping sets play eu select actor login event type count from github events where repo name clickhouse clickhouse group by actor login event type with rollup order by count desc limit select actor login event type count from github events where repo name clickhouse clickhouse group by actor login event type with rollup order by count desc limit query id ok exception on client code db exception code db exception unexpected value in enum bad arguments version official build bad arguments | 0 |
13,979 | 16,749,502,282 | IssuesEvent | 2021-06-11 20:28:16 | googleapis/repo-automation-bots | https://api.github.com/repos/googleapis/repo-automation-bots | reopened | A canary is chirping | type: process | The dependencies and their versions are:
{
"dayjs": "^1.10.5",
"gcf-utils": "^8.0.2"
}
at 2021 06-11 13:25:05
🐦 | 1.0 | A canary is chirping - The dependencies and their versions are:
{
"dayjs": "^1.10.5",
"gcf-utils": "^8.0.2"
}
at 2021 06-11 13:25:05
🐦 | non_priority | a canary is chirping the dependencies and their versions are dayjs gcf utils at 🐦 | 0 |
4,680 | 3,067,226,104 | IssuesEvent | 2015-08-18 09:06:29 | Gizra/negawatt-server | https://api.github.com/repos/Gizra/negawatt-server | closed | Date selector for usage chart | needs: code review | Selectors for year (for year, month view), month (for day view), day (for hour and minute views) | 1.0 | Date selector for usage chart - Selectors for year (for year, month view), month (for day view), day (for hour and minute views) | non_priority | date selector for usage chart selectors for year for year month view month for day view day for hour and minute views | 0 |
118,619 | 9,996,371,039 | IssuesEvent | 2019-07-11 23:13:06 | rancher/rancher | https://api.github.com/repos/rancher/rancher | closed | UI: Click save button again, logging config disappear | [zube]: To Test area/logging area/ui kind/bug-qa team/cn | <!--
Please search for existing issues first, then read https://rancher.com/docs/rancher/v2.x/en/contributing/#bugs-issues-or-questions to see what we expect in an issue
For security issues, please email security@rancher.com instead of posting a public issue in GitHub. You may (but are not required to) use the GPG key located on Keybase.
-->
**What kind of request is this (question/bug/enhancement/feature request):**
bug
**Steps to reproduce (least amount of steps as possible):**
1. Select the fluentd target and enable project logging.
2. Click save button again without any change.
**Result:**

Logging config disappear.
**Other details that may be helpful:**
**Environment information**
master ( 2019/07/10 ) | 1.0 | UI: Click save button again, logging config disappear - <!--
Please search for existing issues first, then read https://rancher.com/docs/rancher/v2.x/en/contributing/#bugs-issues-or-questions to see what we expect in an issue
For security issues, please email security@rancher.com instead of posting a public issue in GitHub. You may (but are not required to) use the GPG key located on Keybase.
-->
**What kind of request is this (question/bug/enhancement/feature request):**
bug
**Steps to reproduce (least amount of steps as possible):**
1. Select the fluentd target and enable project logging.
2. Click save button again without any change.
**Result:**

Logging config disappear.
**Other details that may be helpful:**
**Environment information**
master ( 2019/07/10 ) | non_priority | ui click save button again logging config disappear please search for existing issues first then read to see what we expect in an issue for security issues please email security rancher com instead of posting a public issue in github you may but are not required to use the gpg key located on keybase what kind of request is this question bug enhancement feature request bug steps to reproduce least amount of steps as possible select the fluentd target and enable project logging click save button again without any change result logging config disappear other details that may be helpful environment information master | 0 |
359,466 | 25,238,813,495 | IssuesEvent | 2022-11-15 04:52:48 | microsoft/azure_arc | https://api.github.com/repos/microsoft/azure_arc | closed | SSH KEY ERROR | documentation | <!--- Disclaimer: The intent of this "Bug report" template is to address issues related to the Azure Arc Jumpstart scenarios, ArcBox and all other project ares. The Azure Arc Jumpstart team does not handle Azure Arc core product issues, bugs and feature requests and will try to assist on a best effort basis. For a core product issue or feature request/feedback, please create an official [Azure support ticket](https://azure.microsoft.com/support/create-ticket/) or [general feedback request](https://feedback.azure.com). --->
**Jumpstart scenario or ArcBox flavor which you are working on.**
Full
**Describe the bug.**
I am using deploy option 1 (Azure Portal), but I am failing due to "linuxConfiguration.ssh.publicKeys.keyData is invalid."
I tried it with different SSH KEY and the result is the same
**To Reproduce.**
<!--- Steps to reproduce the behavior:
Use Azure Portal to deploy and use the below SSH key:
AAAAB3NzaC1yc2EAAAADAQABAAACAQDKz6TVb9XpyjpoZCAV6A3b8zRvV/RdkWNKykdQ69Ejs++ZNtC0MlgnxLS+qZnKqGSOKI7Jipy/4Dx68SYvOs3UzqGP3q2w/M+kFGoLoayjQq429PVnAveC3a3YvFs4nZME1l7Gn5SUUc93MsZCQc8Ul4gCgDtRT4lFYAl3MQ+rPruz8h6/AoP4Dlwt0IAl3UQcMmAI1mPZpcSw4/d+nNfRZmxHo05QrzFOGRWzb/8Huotk1ShVTMTgVZTD2fvRjKCmjoTFI8Ku2EtP5oXF0DjTmXDshXzLvmTULdtTYLvi7eKIio6wwLoQWmfbuWNxaVr1wwEU7I4BssmYNDJak6BPBH+C8jSxeGfnZmvpuYCBWzPJLEh27oN/lKXXhKkKjolokDpFS7Gt7GFNVryrZlAycYvhK5/IxnUv6O3gnLjcQZr0gVwbZ0YdrK1juyU4sh1WwQCbrfcIrvzEtQ6r9/GDvyZwbIX8R8j5Gj+A085R1F0coZIJzWS0LyoUwEFy4QQLXn9J2xNfJY/7JRbBK9RJRopHSdGzFQzw2sXnILwcumoftKxEWcRfSN3FZS1M77aXQJtwW2voelW6gdHjUqrp0qbRY9cAgL1mvGJUscLsBVOThbp6HNCTyiH9XfHhqyFqPQpqggKBIaHMXlYrt+1KmfcNZi2Aez80LQFuLMnP0Q==
**Expected behavior.**
Successfull deployment
**Environment summary.**
azure-cli 2.42.0
**Screenshots.**

| 1.0 | SSH KEY ERROR - <!--- Disclaimer: The intent of this "Bug report" template is to address issues related to the Azure Arc Jumpstart scenarios, ArcBox and all other project ares. The Azure Arc Jumpstart team does not handle Azure Arc core product issues, bugs and feature requests and will try to assist on a best effort basis. For a core product issue or feature request/feedback, please create an official [Azure support ticket](https://azure.microsoft.com/support/create-ticket/) or [general feedback request](https://feedback.azure.com). --->
**Jumpstart scenario or ArcBox flavor which you are working on.**
Full
**Describe the bug.**
I am using deploy option 1 (Azure Portal), but I am failing due to "linuxConfiguration.ssh.publicKeys.keyData is invalid."
I tried it with different SSH KEY and the result is the same
**To Reproduce.**
<!--- Steps to reproduce the behavior:
Use Azure Portal to deploy and use the below SSH key:
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
**Expected behavior.**
Successfull deployment
**Environment summary.**
azure-cli 2.42.0
**Screenshots.**

| non_priority | ssh key error jumpstart scenario or arcbox flavor which you are working on full describe the bug i am using deploy option azure portal but i am failing due to linuxconfiguration ssh publickeys keydata is invalid i tried it with different ssh key and the result is the same to reproduce steps to reproduce the behavior use azure portal to deploy and use the below ssh key m d expected behavior successfull deployment environment summary azure cli screenshots | 0 |
20,221 | 11,420,900,440 | IssuesEvent | 2020-02-03 11:00:44 | cosmos/sdk-tutorials | https://api.github.com/repos/cosmos/sdk-tutorials | closed | Add nsdebug to cmd and makefile | nameservice | Just like `gaiadebug`. It would be nice so that people can query txs bytes from tendermint rpc and then unmarshall them to JSON. | 1.0 | Add nsdebug to cmd and makefile - Just like `gaiadebug`. It would be nice so that people can query txs bytes from tendermint rpc and then unmarshall them to JSON. | non_priority | add nsdebug to cmd and makefile just like gaiadebug it would be nice so that people can query txs bytes from tendermint rpc and then unmarshall them to json | 0 |
42,509 | 5,459,463,975 | IssuesEvent | 2017-03-09 00:43:57 | palantir/plottable | https://api.github.com/repos/palantir/plottable | opened | Remove Component's "box" API | Domain: API Design P2 | Component has a “box” API that simply builds a <g> element whose width/height is always 100% (aka it auto-updates in response to layout changes). This behavior is trivial in an HTML world; look into why we need this at all and if we can get rid of it
| 1.0 | Remove Component's "box" API - Component has a “box” API that simply builds a <g> element whose width/height is always 100% (aka it auto-updates in response to layout changes). This behavior is trivial in an HTML world; look into why we need this at all and if we can get rid of it
| non_priority | remove component s box api component has a “box” api that simply builds a element whose width height is always aka it auto updates in response to layout changes this behavior is trivial in an html world look into why we need this at all and if we can get rid of it | 0 |
94,938 | 10,862,144,264 | IssuesEvent | 2019-11-14 12:41:12 | kubernetes/dashboard | https://api.github.com/repos/kubernetes/dashboard | closed | Improve docs for metrics | kind/documentation lifecycle/stale | ##### Environment
```
Installation method: Kubectl apply
Kubernetes version: 1.15.1
Dashboard version: 2.0.0-beta2
Operating system: HypriotOS (Debian) - RPi3
```
##### Steps to reproduce
Install kubernetes dashboard with:
```sh
kubectl apply -f https://raw.githubusercontent.com/kubernetes/dashboard/v2.0.0-beta2/aio/deploy/recommended.yaml
```
##### Observed result
No graphs/sparklines displayed in UI - metrics scraper pod is running as expected:
```sh
NAME READY STATUS RESTARTS AGE
pod/dashboard-metrics-scraper-6ff95d79d8-prfvx 1/1 Running 0 12h
pod/kubernetes-dashboard-75dc45f799-q5ztq 1/1 Running 0 12h
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
service/dashboard-metrics-scraper ClusterIP 10.106.49.54 <none> 8000/TCP 12h
service/kubernetes-dashboard ClusterIP 10.107.222.226 <none> 443/TCP 12h
NAME READY UP-TO-DATE AVAILABLE AGE
deployment.apps/dashboard-metrics-scraper 1/1 1 1 12h
deployment.apps/kubernetes-dashboard 1/1 1 1 12h
NAME DESIRED CURRENT READY AGE
replicaset.apps/dashboard-metrics-scraper-6ff95d79d8 1 1 1 12h
replicaset.apps/kubernetes-dashboard-75dc45f799 1 1 1 12h
```
##### Expected result
Graphs/Sparklines show in UI.
##### Comments
Not sure if this is the expected behaviour or not in 2.0.0?
| 1.0 | Improve docs for metrics - ##### Environment
```
Installation method: Kubectl apply
Kubernetes version: 1.15.1
Dashboard version: 2.0.0-beta2
Operating system: HypriotOS (Debian) - RPi3
```
##### Steps to reproduce
Install kubernetes dashboard with:
```sh
kubectl apply -f https://raw.githubusercontent.com/kubernetes/dashboard/v2.0.0-beta2/aio/deploy/recommended.yaml
```
##### Observed result
No graphs/sparklines displayed in UI - metrics scraper pod is running as expected:
```sh
NAME READY STATUS RESTARTS AGE
pod/dashboard-metrics-scraper-6ff95d79d8-prfvx 1/1 Running 0 12h
pod/kubernetes-dashboard-75dc45f799-q5ztq 1/1 Running 0 12h
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
service/dashboard-metrics-scraper ClusterIP 10.106.49.54 <none> 8000/TCP 12h
service/kubernetes-dashboard ClusterIP 10.107.222.226 <none> 443/TCP 12h
NAME READY UP-TO-DATE AVAILABLE AGE
deployment.apps/dashboard-metrics-scraper 1/1 1 1 12h
deployment.apps/kubernetes-dashboard 1/1 1 1 12h
NAME DESIRED CURRENT READY AGE
replicaset.apps/dashboard-metrics-scraper-6ff95d79d8 1 1 1 12h
replicaset.apps/kubernetes-dashboard-75dc45f799 1 1 1 12h
```
##### Expected result
Graphs/Sparklines show in UI.
##### Comments
Not sure if this is the expected behaviour or not in 2.0.0?
| non_priority | improve docs for metrics environment installation method kubectl apply kubernetes version dashboard version operating system hypriotos debian steps to reproduce install kubernetes dashboard with sh kubectl apply f observed result no graphs sparklines displayed in ui metrics scraper pod is running as expected sh name ready status restarts age pod dashboard metrics scraper prfvx running pod kubernetes dashboard running name type cluster ip external ip port s age service dashboard metrics scraper clusterip tcp service kubernetes dashboard clusterip tcp name ready up to date available age deployment apps dashboard metrics scraper deployment apps kubernetes dashboard name desired current ready age replicaset apps dashboard metrics scraper replicaset apps kubernetes dashboard expected result graphs sparklines show in ui comments not sure if this is the expected behaviour or not in | 0 |
301,556 | 22,762,779,056 | IssuesEvent | 2022-07-07 23:11:38 | dzikoysk/reposilite | https://api.github.com/repos/dzikoysk/reposilite | closed | Update `Repositories` guide | bug documentation good first issue | ### What happened?
Configuration of repository is outdated:
* https://reposilite.com/guide/repositories
Should show how to use new settings forms instead of raw config
### Reposilite version
3.x
### Relevant log output
_No response_ | 1.0 | Update `Repositories` guide - ### What happened?
Configuration of repository is outdated:
* https://reposilite.com/guide/repositories
Should show how to use new settings forms instead of raw config
### Reposilite version
3.x
### Relevant log output
_No response_ | non_priority | update repositories guide what happened configuration of repository is outdated should show how to use new settings forms instead of raw config reposilite version x relevant log output no response | 0 |
45,592 | 5,939,320,740 | IssuesEvent | 2017-05-25 04:29:17 | quicwg/base-drafts | https://api.github.com/repos/quicwg/base-drafts | opened | PUSH_PROMISE ordering guarantee | design http | HTTP/2 has a pretty strong recommendation to have PUSH_PROMISE precede any text that mentions it. Failing to do so could mean that a client requests a resource that was pushed, which is wasteful.
Splitting the headers and data into two streams means that there is no way to order the PUSH_PROMISE relative to the part of the body that mentions the resource.
I'm sure that @MikeBishop mentioned this once before, but I couldn't find any issues for it. Returning to a model where data and headers share a stream would fix this. | 1.0 | PUSH_PROMISE ordering guarantee - HTTP/2 has a pretty strong recommendation to have PUSH_PROMISE precede any text that mentions it. Failing to do so could mean that a client requests a resource that was pushed, which is wasteful.
Splitting the headers and data into two streams means that there is no way to order the PUSH_PROMISE relative to the part of the body that mentions the resource.
I'm sure that @MikeBishop mentioned this once before, but I couldn't find any issues for it. Returning to a model where data and headers share a stream would fix this. | non_priority | push promise ordering guarantee http has a pretty strong recommendation to have push promise precede any text that mentions it failing to do so could mean that a client requests a resource that was pushed which is wasteful splitting the headers and data into two streams means that there is no way to order the push promise relative to the part of the body that mentions the resource i m sure that mikebishop mentioned this once before but i couldn t find any issues for it returning to a model where data and headers share a stream would fix this | 0 |
70,012 | 30,528,695,811 | IssuesEvent | 2023-07-19 13:01:51 | Ocelot-Social-Community/Ocelot-Social | https://api.github.com/repos/Ocelot-Social-Community/Ocelot-Social | closed | 🚀 [Feature] Chat: Send link does not show a html link | feature service: backend service: webapp features_chat chat | <!-- You can find the latest issue templates here https://github.com/ulfgebhardt/issue-templates -->
## 🚀 Feature
<!-- Give a short summary of the Feature. Use Screenshots if you want. -->
If you paste a link in the message post and send it you don't see a html link.
Would be great to have a html link possible in the chat.
### Additional Informations
Now it looks like:
<img width="1186" alt="Bildschirmfoto 2023-07-18 um 10 07 26" src="https://github.com/Ocelot-Social-Community/Ocelot-Social/assets/25344101/b075c888-c5ee-4812-8137-fcd7db465952">
In the database we have:
<img width="1155" alt="Bildschirmfoto 2023-07-18 um 13 21 07" src="https://github.com/Ocelot-Social-Community/Ocelot-Social/assets/25344101/b4b097d0-3957-48b7-8ae6-eef88b3b3288">
The query delivers:
<img width="1532" alt="Bildschirmfoto 2023-07-18 um 13 35 32" src="https://github.com/Ocelot-Social-Community/Ocelot-Social/assets/25344101/95cc2b5f-48a3-4aea-a494-bba38d56d6a5">
So the problem occurs on showing the message with the URL in the browser and can be generated by VueJS?!
## 🤖 ToDo
- [ ] Have clickable html link in the chat component
| 2.0 | 🚀 [Feature] Chat: Send link does not show a html link - <!-- You can find the latest issue templates here https://github.com/ulfgebhardt/issue-templates -->
## 🚀 Feature
<!-- Give a short summary of the Feature. Use Screenshots if you want. -->
If you paste a link in the message post and send it you don't see a html link.
Would be great to have a html link possible in the chat.
### Additional Informations
Now it looks like:
<img width="1186" alt="Bildschirmfoto 2023-07-18 um 10 07 26" src="https://github.com/Ocelot-Social-Community/Ocelot-Social/assets/25344101/b075c888-c5ee-4812-8137-fcd7db465952">
In the database we have:
<img width="1155" alt="Bildschirmfoto 2023-07-18 um 13 21 07" src="https://github.com/Ocelot-Social-Community/Ocelot-Social/assets/25344101/b4b097d0-3957-48b7-8ae6-eef88b3b3288">
The query delivers:
<img width="1532" alt="Bildschirmfoto 2023-07-18 um 13 35 32" src="https://github.com/Ocelot-Social-Community/Ocelot-Social/assets/25344101/95cc2b5f-48a3-4aea-a494-bba38d56d6a5">
So the problem occurs on showing the message with the URL in the browser and can be generated by VueJS?!
## 🤖 ToDo
- [ ] Have clickable html link in the chat component
| non_priority | 🚀 chat send link does not show a html link 🚀 feature if you paste a link in the message post and send it you don t see a html link would be great to have a html link possible in the chat additional informations now it looks like img width alt bildschirmfoto um src in the database we have img width alt bildschirmfoto um src the query delivers img width alt bildschirmfoto um src so the problem occurs on showing the message with the url in the browser and can be generated by vuejs 🤖 todo have clickable html link in the chat component | 0 |
264,660 | 20,027,428,127 | IssuesEvent | 2022-02-01 23:12:52 | cmu-delphi/delphi-epidata | https://api.github.com/repos/cmu-delphi/delphi-epidata | closed | Documentation for new CPR indicator | documentation | Create a new page in the API documentation for the CPR indicator. Start with the [template file.](https://github.com/cmu-delphi/delphi-epidata/blob/dev/docs/api/covidcast-signals/_source-template.md) | 1.0 | Documentation for new CPR indicator - Create a new page in the API documentation for the CPR indicator. Start with the [template file.](https://github.com/cmu-delphi/delphi-epidata/blob/dev/docs/api/covidcast-signals/_source-template.md) | non_priority | documentation for new cpr indicator create a new page in the api documentation for the cpr indicator start with the | 0 |
76,523 | 21,480,175,423 | IssuesEvent | 2022-04-26 16:56:46 | NationalSecurityAgency/ghidra | https://api.github.com/repos/NationalSecurityAgency/ghidra | opened | SBOM is missing PURL's for some jars | Feature: Build | The `bom.json` file (attached below) that Ghidra generates as part of its `10.2-DEV` build is missing PURL's for some jars. This is because the jars do not have a `pom.xml` file embedded in them from which to extract a `group` string. Some alternative techniques that were tried include parsing their `MANIFEST.MF` file, but this yielded unreliable results due to non-standard or optional property names.
Some of these group names can be retrieved via Gradle API calls, but only if they were declared as external dependencies from maven central. However, Gradle doesn't have that info for jars such as `dexlib`, which gets downloaded via the `fetchDependencies.gradle` script.
Without a proper PURL, tools like [Dependency-Track](https://dependencytrack.org/) cannot properly report vulnerabilities and other issues with external dependencies.
Attachment:
[bom.json.zip](https://github.com/NationalSecurityAgency/ghidra/files/8565291/bom.json.zip) | 1.0 | SBOM is missing PURL's for some jars - The `bom.json` file (attached below) that Ghidra generates as part of its `10.2-DEV` build is missing PURL's for some jars. This is because the jars do not have a `pom.xml` file embedded in them from which to extract a `group` string. Some alternative techniques that were tried include parsing their `MANIFEST.MF` file, but this yielded unreliable results due to non-standard or optional property names.
Some of these group names can be retrieved via Gradle API calls, but only if they were declared as external dependencies from maven central. However, Gradle doesn't have that info for jars such as `dexlib`, which gets downloaded via the `fetchDependencies.gradle` script.
Without a proper PURL, tools like [Dependency-Track](https://dependencytrack.org/) cannot properly report vulnerabilities and other issues with external dependencies.
Attachment:
[bom.json.zip](https://github.com/NationalSecurityAgency/ghidra/files/8565291/bom.json.zip) | non_priority | sbom is missing purl s for some jars the bom json file attached below that ghidra generates as part of its dev build is missing purl s for some jars this is because the jars do not have a pom xml file embedded in them from which to extract a group string some alternative techniques that were tried include parsing their manifest mf file but this yielded unreliable results due to non standard or optional property names some of these group names can be retrieved via gradle api calls but only if they were declared as external dependencies from maven central however gradle doesn t have that info for jars such as dexlib which gets downloaded via the fetchdependencies gradle script without a proper purl tools like cannot properly report vulnerabilities and other issues with external dependencies attachment | 0 |
46,420 | 11,840,339,734 | IssuesEvent | 2020-03-23 18:41:25 | tensorflow/tfjs | https://api.github.com/repos/tensorflow/tfjs | closed | npm install fails when trying to install @tensorflow/tfjs-node@1.7.0 | comp:node.js stat:awaiting response type:build/install | Getting this error:
```
> @tensorflow/tfjs-node@1.7.0 install /dock/node_modules/@tensorflow/tfjs-node
> node scripts/install.js
CPU-linux-1.7.0.tar.gz
* Downloading libtensorflow
* Building TensorFlow Node.js bindings
node-pre-gyp install failed with error: Error: Command failed: node-pre-gyp install --fallback-to-build
node-pre-gyp WARN Using needle for node-pre-gyp https download
node-pre-gyp WARN Tried to download(404): https://storage.googleapis.com/tf-builds/pre-built-binary/napi-v5/1.7.0/CPU-linux-1.7.0.tar.gz
node-pre-gyp WARN Pre-built binaries not found for @tensorflow/tfjs-node@1.7.0 and node@13.11.0 (node-v79 ABI, glibc) (falling back to source compile with node-gyp)
```
This URL doesn't seem to exist:
https://storage.googleapis.com/tf-builds/pre-built-binary/napi-v5/1.7.0/CPU-linux-1.7.0.tar.gz
My package.json:
```
"@tensorflow/tfjs": "^1.7.0",
"@tensorflow/tfjs-node": "^1.7.0",
```
What can I do to be able to install tfjs-node?
Using CentOS 7 on a Docker container. | 1.0 | npm install fails when trying to install @tensorflow/tfjs-node@1.7.0 - Getting this error:
```
> @tensorflow/tfjs-node@1.7.0 install /dock/node_modules/@tensorflow/tfjs-node
> node scripts/install.js
CPU-linux-1.7.0.tar.gz
* Downloading libtensorflow
* Building TensorFlow Node.js bindings
node-pre-gyp install failed with error: Error: Command failed: node-pre-gyp install --fallback-to-build
node-pre-gyp WARN Using needle for node-pre-gyp https download
node-pre-gyp WARN Tried to download(404): https://storage.googleapis.com/tf-builds/pre-built-binary/napi-v5/1.7.0/CPU-linux-1.7.0.tar.gz
node-pre-gyp WARN Pre-built binaries not found for @tensorflow/tfjs-node@1.7.0 and node@13.11.0 (node-v79 ABI, glibc) (falling back to source compile with node-gyp)
```
This URL doesn't seem to exist:
https://storage.googleapis.com/tf-builds/pre-built-binary/napi-v5/1.7.0/CPU-linux-1.7.0.tar.gz
My package.json:
```
"@tensorflow/tfjs": "^1.7.0",
"@tensorflow/tfjs-node": "^1.7.0",
```
What can I do to be able to install tfjs-node?
Using CentOS 7 on a Docker container. | non_priority | npm install fails when trying to install tensorflow tfjs node getting this error tensorflow tfjs node install dock node modules tensorflow tfjs node node scripts install js cpu linux tar gz downloading libtensorflow building tensorflow node js bindings node pre gyp install failed with error error command failed node pre gyp install fallback to build node pre gyp warn using needle for node pre gyp https download node pre gyp warn tried to download node pre gyp warn pre built binaries not found for tensorflow tfjs node and node node abi glibc falling back to source compile with node gyp this url doesn t seem to exist my package json tensorflow tfjs tensorflow tfjs node what can i do to be able to install tfjs node using centos on a docker container | 0 |
48,029 | 19,906,543,608 | IssuesEvent | 2022-01-25 13:23:23 | hashicorp/terraform-provider-aws | https://api.github.com/repos/hashicorp/terraform-provider-aws | closed | panic in aws/resource_aws_instance.go in v3.25.0 | bug crash service/ec2 |
* [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues
My account is getting panic in line 1665 of version v3.25.0 of aws/resource_aws_instance.go
```
if len(ibds["ebs"].([]map[string]interface{})) == 0 {
```
The backtrace is:
```
panic: interface conversion: interface {} is nil, not []map[string]interface {}
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5:
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: goroutine 11830 [running]:
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/terraform-providers/terraform-provider-aws/aws.readBlockDevices(0xc0020f4600, 0xc002532000, 0xc000abc598, 0x0, 0x0)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/hashicorp/terraform-provider-aws/aws/resource_aws_instance.go:1665 +0x78d
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/terraform-providers/terraform-provider-aws/aws.resourceAwsInstanceRead(0xc0020f4600, 0x66874e0, 0xc00138ec00, 0xb1cc610, 0x749d828)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/hashicorp/terraform-provider-aws/aws/resource_aws_instance.go:930 +0x1845
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).read(0xc000a28e40, 0x7db33c0, 0xc001980340, 0xc0020f4600, 0x66874e0, 0xc00138ec00, 0x0, 0x0, 0x0)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.1/helper/schema/resource.go:290 +0x88
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).RefreshWithoutUpgrade(0xc000a28e40, 0x7db33c0, 0xc001980340, 0xc00040bb90, 0x66874e0, 0xc00138ec00, 0xc000d7df60, 0x0, 0x0, 0x0)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.1/helper/schema/resource.go:564 +0x1cb
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*GRPCProviderServer).ReadResource(0xc0012d5240, 0x7db33c0, 0xc001980340, 0xc001980380, 0xc001980340, 0x6ecfe80, 0x716afc0)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.1/helper/schema/grpc_provider.go:575 +0x43b
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-go/tfprotov5/server.(*server).ReadResource(0xc0014d1f60, 0x7db33c0, 0xc001980340, 0xc00208a060, 0xc0014d1f60, 0xc001bf4750, 0xc0013ceba0)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-go@v0.2.1/tfprotov5/server/server.go:298 +0x105
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-go/tfprotov5/internal/tfplugin5._Provider_ReadResource_Handler(0x716afc0, 0xc0014d1f60, 0x7db3480, 0xc001bf4750, 0xc00208a000, 0x0, 0x7db3480, 0xc001bf4750, 0xc00198e000, 0x917)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-go@v0.2.1/tfprotov5/internal/tfplugin5/tfplugin5_grpc.pb.go:344 +0x214
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: google.golang.org/grpc.(*Server).processUnaryRPC(0xc0001fee00, 0x7dd6320, 0xc000888600, 0xc001824f00, 0xc000920510, 0xb18b330, 0x0, 0x0, 0x0)
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:1194 +0x522
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: google.golang.org/grpc.(*Server).handleStream(0xc0001fee00, 0x7dd6320, 0xc000888600, 0xc001824f00, 0x0)
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:1517 +0xd05
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: google.golang.org/grpc.(*Server).serveStreams.func1.2(0xc001154ce0, 0xc0001fee00, 0x7dd6320, 0xc000888600, 0xc001824f00)
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:859 +0xa5
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: created by google.golang.org/grpc.(*Server).serveStreams.func1
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:857 +0x1fd
```
I have no idea what's going on, but seems panic is prima facie bug. I'm testing this fix on my local provider:
```
terraform-providers(3:58823)$ git diff
diff --git a/aws/resource_aws_instance.go b/aws/resource_aws_instance.go
index 7e69c85f6..fdd7b24e0 100644
--- a/aws/resource_aws_instance.go
+++ b/aws/resource_aws_instance.go
@@ -1662,7 +1662,7 @@ func readBlockDevices(d *schema.ResourceData, instance *ec2.Instance, conn *ec2.
// and #readBlockDevicesFromInstance only returns 1 reference to a block-device
// stored in ibds["root"]
if _, ok := d.GetOk("ebs_block_device"); ok {
- if len(ibds["ebs"].([]map[string]interface{})) == 0 {
+ if ibds["ebs"] != nil && len(ibds["ebs"].([]map[string]interface{})) == 0 {
ebs := make(map[string]interface{})
for k, v := range ibds["root"].(map[string]interface{}) {
ebs[k] = v
```
<!--- Please keep this note for the community --->
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request
* Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
<!--- Thank you for keeping this note for the community --->
### Terraform CLI and Terraform AWS Provider Version
``` $ terraform -version
Terraform v0.14.5
+ provider registry.terraform.io/hashicorp/aws v3.25.0
+ provider registry.terraform.io/hashicorp/external v2.0.0
+ provider registry.terraform.io/hashicorp/template v2.2.0
```
<!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). --->
### Affected Resource(s)
It is crashing during plan before it starts updating what the plan would do, walking the dag I guess. I ran it under TF_LOG=1 but the immediate logging around the panic lines don't seem related to aws_instance resource. I can't just put the whole config out here.
<!--- Please list the affected resources and data sources. --->
* aws_instance maybe
### Terraform Configuration Files
<!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code --->
I won't be able to upload all the terraform config. If I can reproduce it in a smaller set, I'll submit that. I will also note here if my proposed patch fixes the issue.
### Debug Output
<!---
Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist.
To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html).
--->
### Panic Output
<!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. --->
I can't find a crash.log but the panic and backtrace are above.
### Expected Behavior
<!--- What should have happened? --->
Successful apply.
### Actual Behavior
<!--- What actually happened? --->
Lot of output like:
```
Error: rpc error: code = Canceled desc = context canceled
Error: rpc error: code = Canceled desc = context canceled
Error: rpc error: code = Canceled desc = context canceled
```
### Steps to Reproduce
<!--- Please list the steps required to reproduce the issue. --->
1. `terraform apply`
### Important Factoids
<!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? --->
Biggish? 3133 lines of tf, 532 items in 'terraform state list' and 47 ec2. Mostly just vanilla S3 and Ec2. More VPC and subnets than our normal accounts (multi-tenant SaaS implementation).
### References
<!---
Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests
Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example:
--->
* #0000
| 1.0 | panic in aws/resource_aws_instance.go in v3.25.0 -
* [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues
My account is getting panic in line 1665 of version v3.25.0 of aws/resource_aws_instance.go
```
if len(ibds["ebs"].([]map[string]interface{})) == 0 {
```
The backtrace is:
```
panic: interface conversion: interface {} is nil, not []map[string]interface {}
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5:
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: goroutine 11830 [running]:
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/terraform-providers/terraform-provider-aws/aws.readBlockDevices(0xc0020f4600, 0xc002532000, 0xc000abc598, 0x0, 0x0)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/hashicorp/terraform-provider-aws/aws/resource_aws_instance.go:1665 +0x78d
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/terraform-providers/terraform-provider-aws/aws.resourceAwsInstanceRead(0xc0020f4600, 0x66874e0, 0xc00138ec00, 0xb1cc610, 0x749d828)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/hashicorp/terraform-provider-aws/aws/resource_aws_instance.go:930 +0x1845
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).read(0xc000a28e40, 0x7db33c0, 0xc001980340, 0xc0020f4600, 0x66874e0, 0xc00138ec00, 0x0, 0x0, 0x0)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.1/helper/schema/resource.go:290 +0x88
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).RefreshWithoutUpgrade(0xc000a28e40, 0x7db33c0, 0xc001980340, 0xc00040bb90, 0x66874e0, 0xc00138ec00, 0xc000d7df60, 0x0, 0x0, 0x0)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.1/helper/schema/resource.go:564 +0x1cb
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*GRPCProviderServer).ReadResource(0xc0012d5240, 0x7db33c0, 0xc001980340, 0xc001980380, 0xc001980340, 0x6ecfe80, 0x716afc0)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.1/helper/schema/grpc_provider.go:575 +0x43b
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-go/tfprotov5/server.(*server).ReadResource(0xc0014d1f60, 0x7db33c0, 0xc001980340, 0xc00208a060, 0xc0014d1f60, 0xc001bf4750, 0xc0013ceba0)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-go@v0.2.1/tfprotov5/server/server.go:298 +0x105
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-go/tfprotov5/internal/tfplugin5._Provider_ReadResource_Handler(0x716afc0, 0xc0014d1f60, 0x7db3480, 0xc001bf4750, 0xc00208a000, 0x0, 0x7db3480, 0xc001bf4750, 0xc00198e000, 0x917)
2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-go@v0.2.1/tfprotov5/internal/tfplugin5/tfplugin5_grpc.pb.go:344 +0x214
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: google.golang.org/grpc.(*Server).processUnaryRPC(0xc0001fee00, 0x7dd6320, 0xc000888600, 0xc001824f00, 0xc000920510, 0xb18b330, 0x0, 0x0, 0x0)
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:1194 +0x522
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: google.golang.org/grpc.(*Server).handleStream(0xc0001fee00, 0x7dd6320, 0xc000888600, 0xc001824f00, 0x0)
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:1517 +0xd05
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: google.golang.org/grpc.(*Server).serveStreams.func1.2(0xc001154ce0, 0xc0001fee00, 0x7dd6320, 0xc000888600, 0xc001824f00)
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:859 +0xa5
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: created by google.golang.org/grpc.(*Server).serveStreams.func1
2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:857 +0x1fd
```
I have no idea what's going on, but seems panic is prima facie bug. I'm testing this fix on my local provider:
```
terraform-providers(3:58823)$ git diff
diff --git a/aws/resource_aws_instance.go b/aws/resource_aws_instance.go
index 7e69c85f6..fdd7b24e0 100644
--- a/aws/resource_aws_instance.go
+++ b/aws/resource_aws_instance.go
@@ -1662,7 +1662,7 @@ func readBlockDevices(d *schema.ResourceData, instance *ec2.Instance, conn *ec2.
// and #readBlockDevicesFromInstance only returns 1 reference to a block-device
// stored in ibds["root"]
if _, ok := d.GetOk("ebs_block_device"); ok {
- if len(ibds["ebs"].([]map[string]interface{})) == 0 {
+ if ibds["ebs"] != nil && len(ibds["ebs"].([]map[string]interface{})) == 0 {
ebs := make(map[string]interface{})
for k, v := range ibds["root"].(map[string]interface{}) {
ebs[k] = v
```
<!--- Please keep this note for the community --->
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request
* Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
<!--- Thank you for keeping this note for the community --->
### Terraform CLI and Terraform AWS Provider Version
``` $ terraform -version
Terraform v0.14.5
+ provider registry.terraform.io/hashicorp/aws v3.25.0
+ provider registry.terraform.io/hashicorp/external v2.0.0
+ provider registry.terraform.io/hashicorp/template v2.2.0
```
<!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). --->
### Affected Resource(s)
It is crashing during plan before it starts updating what the plan would do, walking the dag I guess. I ran it under TF_LOG=1 but the immediate logging around the panic lines don't seem related to aws_instance resource. I can't just put the whole config out here.
<!--- Please list the affected resources and data sources. --->
* aws_instance maybe
### Terraform Configuration Files
<!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code --->
I won't be able to upload all the terraform config. If I can reproduce it in a smaller set, I'll submit that. I will also note here if my proposed patch fixes the issue.
### Debug Output
<!---
Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist.
To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html).
--->
### Panic Output
<!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. --->
I can't find a crash.log but the panic and backtrace are above.
### Expected Behavior
<!--- What should have happened? --->
Successful apply.
### Actual Behavior
<!--- What actually happened? --->
Lot of output like:
```
Error: rpc error: code = Canceled desc = context canceled
Error: rpc error: code = Canceled desc = context canceled
Error: rpc error: code = Canceled desc = context canceled
```
### Steps to Reproduce
<!--- Please list the steps required to reproduce the issue. --->
1. `terraform apply`
### Important Factoids
<!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? --->
Biggish? 3133 lines of tf, 532 items in 'terraform state list' and 47 ec2. Mostly just vanilla S3 and Ec2. More VPC and subnets than our normal accounts (multi-tenant SaaS implementation).
### References
<!---
Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests
Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example:
--->
* #0000
| non_priority | panic in aws resource aws instance go in issues my account is getting panic in line of version of aws resource aws instance go if len ibds map interface the backtrace is panic interface conversion interface is nil not map interface plugin terraform provider aws plugin terraform provider aws goroutine plugin terraform provider aws github com terraform providers terraform provider aws aws readblockdevices plugin terraform provider aws opt teamcity agent work src github com hashicorp terraform provider aws aws resource aws instance go plugin terraform provider aws github com terraform providers terraform provider aws aws resourceawsinstanceread plugin terraform provider aws opt teamcity agent work src github com hashicorp terraform provider aws aws resource aws instance go plugin terraform provider aws github com hashicorp terraform plugin sdk helper schema resource read plugin terraform provider aws opt teamcity agent work pkg mod github com hashicorp terraform plugin sdk helper schema resource go plugin terraform provider aws github com hashicorp terraform plugin sdk helper schema resource refreshwithoutupgrade plugin terraform provider aws opt teamcity agent work pkg mod github com hashicorp terraform plugin sdk helper schema resource go plugin terraform provider aws github com hashicorp terraform plugin sdk helper schema grpcproviderserver readresource plugin terraform provider aws opt teamcity agent work pkg mod github com hashicorp terraform plugin sdk helper schema grpc provider go plugin terraform provider aws github com hashicorp terraform plugin go server server readresource plugin terraform provider aws opt teamcity agent work pkg mod github com hashicorp terraform plugin go server server go plugin terraform provider aws github com hashicorp terraform plugin go internal provider readresource handler plugin terraform provider aws opt teamcity agent work pkg mod github com hashicorp terraform plugin go internal grpc pb go plugin terraform provider aws google golang org grpc server processunaryrpc plugin terraform provider aws opt teamcity agent work pkg mod google golang org grpc server go plugin terraform provider aws google golang org grpc server handlestream plugin terraform provider aws opt teamcity agent work pkg mod google golang org grpc server go plugin terraform provider aws google golang org grpc server servestreams plugin terraform provider aws opt teamcity agent work pkg mod google golang org grpc server go plugin terraform provider aws created by google golang org grpc server servestreams plugin terraform provider aws opt teamcity agent work pkg mod google golang org grpc server go i have no idea what s going on but seems panic is prima facie bug i m testing this fix on my local provider terraform providers git diff diff git a aws resource aws instance go b aws resource aws instance go index a aws resource aws instance go b aws resource aws instance go func readblockdevices d schema resourcedata instance instance conn and readblockdevicesfrominstance only returns reference to a block device stored in ibds if ok d getok ebs block device ok if len ibds map interface if ibds nil len ibds map interface ebs make map interface for k v range ibds map interface ebs v community note please vote on this issue by adding a 👍 to the original issue to help the community and maintainers prioritize this request please do not leave or other comments that do not add relevant new information or questions they generate extra noise for issue followers and do not help prioritize the request if you are interested in working on this issue or have submitted a pull request please leave a comment terraform cli and terraform aws provider version terraform version terraform provider registry terraform io hashicorp aws provider registry terraform io hashicorp external provider registry terraform io hashicorp template affected resource s it is crashing during plan before it starts updating what the plan would do walking the dag i guess i ran it under tf log but the immediate logging around the panic lines don t seem related to aws instance resource i can t just put the whole config out here aws instance maybe terraform configuration files i won t be able to upload all the terraform config if i can reproduce it in a smaller set i ll submit that i will also note here if my proposed patch fixes the issue debug output please provide a link to a github gist containing the complete debug output please do not paste the debug output in the issue just paste a link to the gist to obtain the debug output see the panic output i can t find a crash log but the panic and backtrace are above expected behavior successful apply actual behavior lot of output like error rpc error code canceled desc context canceled error rpc error code canceled desc context canceled error rpc error code canceled desc context canceled steps to reproduce terraform apply important factoids biggish lines of tf items in terraform state list and mostly just vanilla and more vpc and subnets than our normal accounts multi tenant saas implementation references information about referencing github issues are there any other github issues open or closed or pull requests that should be linked here vendor documentation for example | 0 |
254,973 | 19,278,726,039 | IssuesEvent | 2021-12-10 14:51:25 | Maagan-Michael/invitease | https://api.github.com/repos/Maagan-Michael/invitease | closed | Choose a task management platform | documentation | As suggested by @dangalg in #7 we should try and utilize a task management platform.
Since we don't really have agile development methodology I'm not sure it's super relevant but we have the following suggestions:
Taiga - Open source.
Trello - Free but commercial.
WeKan - Open source.
*GitHub Projects - Closed source, builtin.
We can also work with assigning Issues to ourselves. | 1.0 | Choose a task management platform - As suggested by @dangalg in #7 we should try and utilize a task management platform.
Since we don't really have agile development methodology I'm not sure it's super relevant but we have the following suggestions:
Taiga - Open source.
Trello - Free but commercial.
WeKan - Open source.
*GitHub Projects - Closed source, builtin.
We can also work with assigning Issues to ourselves. | non_priority | choose a task management platform as suggested by dangalg in we should try and utilize a task management platform since we don t really have agile development methodology i m not sure it s super relevant but we have the following suggestions taiga open source trello free but commercial wekan open source github projects closed source builtin we can also work with assigning issues to ourselves | 0 |
58,997 | 8,318,561,112 | IssuesEvent | 2018-09-25 14:57:18 | sky-uk/toolkit | https://api.github.com/repos/sky-uk/toolkit | opened | Remove legacy references within documentation | chore documentation | **Describe the bug**
There are a couple of references to deprecated non-publicly accessible libraries within the README and documentation. These should be updated or removed where applicable.
**To Reproduce**
n/a
**Expected behavior**
n/a
**Attempted Fixes**
n/a
**Screenshots**
n/a
**Desktop (please complete the following information):**
n/a
**Smartphone (please complete the following information):**
n/a
**Additional context**
n/a
| 1.0 | Remove legacy references within documentation - **Describe the bug**
There are a couple of references to deprecated non-publicly accessible libraries within the README and documentation. These should be updated or removed where applicable.
**To Reproduce**
n/a
**Expected behavior**
n/a
**Attempted Fixes**
n/a
**Screenshots**
n/a
**Desktop (please complete the following information):**
n/a
**Smartphone (please complete the following information):**
n/a
**Additional context**
n/a
| non_priority | remove legacy references within documentation describe the bug there are a couple of references to deprecated non publicly accessible libraries within the readme and documentation these should be updated or removed where applicable to reproduce n a expected behavior n a attempted fixes n a screenshots n a desktop please complete the following information n a smartphone please complete the following information n a additional context n a | 0 |
326,447 | 27,991,287,464 | IssuesEvent | 2023-03-27 04:07:40 | hazelcast/hazelcast | https://api.github.com/repos/hazelcast/hazelcast | closed | [TPC] com.hazelcast.internal.tpcengine.nio.NioAsyncSocketTest | Type: Test-Failure Source: Internal Module: TPC Team: Alto | _master_ (commit e5873252f705d65b3f78df96a742c7448127821f)
Failed on ibm-8: https://jenkins.hazelcast.com/view/Official%20Builds/job/Hazelcast-master-IbmJDK8-fips/72/testReport/com.hazelcast.internal.tpcengine.nio/NioAsyncSocketTest/
Following tests failed with the same exception:
- `com.hazelcast.internal.tpcengine.nio.NioAsyncSocketTest.test_readable`
- `com.hazelcast.internal.tpcengine.nio.NioAsyncSocketTest.test_connect`
<details><summary>Stacktrace:</summary>
```
java.lang.AssertionError: expected:</127.0.0.1:33099> but was:<null>
at org.junit.Assert.fail(Assert.java:89)
at org.junit.Assert.failNotEquals(Assert.java:835)
at org.junit.Assert.assertEquals(Assert.java:120)
at org.junit.Assert.assertEquals(Assert.java:146)
at com.hazelcast.internal.tpcengine.AsyncSocketTest.test_readable(AsyncSocketTest.java:195)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:90)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:55)
at java.lang.reflect.Method.invoke(Method.java:508)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
at org.junit.runners.Suite.runChild(Suite.java:128)
at org.junit.runners.Suite.runChild(Suite.java:27)
at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
at org.apache.maven.surefire.junitcore.JUnitCore.run(JUnitCore.java:49)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.createRequestAndRun(JUnitCoreWrapper.java:120)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.executeEager(JUnitCoreWrapper.java:95)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:75)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:69)
at org.apache.maven.surefire.junitcore.JUnitCoreProvider.invoke(JUnitCoreProvider.java:146)
at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:385)
at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:162)
at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:507)
at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:495)
```
</details>
<details><summary>Standard output:</summary>
```
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-954 Binding to /127.0.0.1:0
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: /127.0.0.1:33099 started accepting
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connecting to address:/127.0.0.1:33099
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: NioAsyncServerSocket[/127.0.0.1:33099] accepted: /127.0.0.1:50914->/127.0.0.1:33099
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connection established NioAsyncSocket[/127.0.0.1:50914->/127.0.0.1:33099]
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connection established NioAsyncSocket[/127.0.0.1:50914->/127.0.0.1:33099]
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning
WARNING: Closing NioAsyncSocket[/127.0.0.1:50914->/127.0.0.1:33099]
java.lang.NullPointerException
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handleConnect(NioAsyncSocket.java:438)
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handle(NioAsyncSocket.java:372)
at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:86)
at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408)
at java.lang.Thread.run(Thread.java:825)
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[/127.0.0.1:33099->/127.0.0.1:50914] due to Remote socket closed!
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncServerSocket[/127.0.0.1:33099] due to Reactor-1 is terminating.
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-954 terminated
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connecting to address:/127.0.0.1:5000
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning
WARNING: Closing NioAsyncSocket[null->null]
java.net.ConnectException: Connection refused
at sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
at sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:731)
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handleConnect(NioAsyncSocket.java:428)
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handle(NioAsyncSocket.java:372)
at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:86)
at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408)
at java.lang.Thread.run(Thread.java:825)
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-955 terminated
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating.
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-956 terminated
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating.
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-957 terminated
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-958 Binding to /127.0.0.1:0
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: /127.0.0.1:37617 started accepting
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connecting to address:/127.0.0.1:37617
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: NioAsyncServerSocket[/127.0.0.1:37617] accepted: /127.0.0.1:37442->/127.0.0.1:37617
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connection established NioAsyncSocket[/127.0.0.1:37442->/127.0.0.1:37617]
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connection established NioAsyncSocket[/127.0.0.1:37442->/127.0.0.1:37617]
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning
WARNING: Closing NioAsyncSocket[/127.0.0.1:37442->/127.0.0.1:37617]
java.lang.NullPointerException
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handleConnect(NioAsyncSocket.java:438)
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handle(NioAsyncSocket.java:372)
at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:86)
at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408)
at java.lang.Thread.run(Thread.java:825)
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[/127.0.0.1:37617->/127.0.0.1:37442] due to Remote socket closed!
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncServerSocket[/127.0.0.1:37617] due to Reactor-1 is terminating.
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-958 terminated
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[null->null]
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-959 terminated
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[null->null]
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-960 terminated
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating.
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-961 terminated
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning
WARNING: java.lang.IllegalStateException: NioAsyncSocket[null->null] is already started
java.lang.IllegalStateException: NioAsyncSocket[null->null] is already started
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket.start0(NioAsyncSocket.java:183)
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket.lambda$start$2(NioAsyncSocket.java:170)
at com.hazelcast.internal.tpcengine.Eventloop.runExternalTasks(Eventloop.java:167)
at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:93)
at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408)
at java.lang.Thread.run(Thread.java:825)
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating.
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-962 terminated
```
</details>
Standard output can be found here - https://s3.console.aws.amazon.com/s3/buckets/j-artifacts/Hazelcast-master-IbmJDK8-fips/72/
| 1.0 | [TPC] com.hazelcast.internal.tpcengine.nio.NioAsyncSocketTest - _master_ (commit e5873252f705d65b3f78df96a742c7448127821f)
Failed on ibm-8: https://jenkins.hazelcast.com/view/Official%20Builds/job/Hazelcast-master-IbmJDK8-fips/72/testReport/com.hazelcast.internal.tpcengine.nio/NioAsyncSocketTest/
Following tests failed with the same exception:
- `com.hazelcast.internal.tpcengine.nio.NioAsyncSocketTest.test_readable`
- `com.hazelcast.internal.tpcengine.nio.NioAsyncSocketTest.test_connect`
<details><summary>Stacktrace:</summary>
```
java.lang.AssertionError: expected:</127.0.0.1:33099> but was:<null>
at org.junit.Assert.fail(Assert.java:89)
at org.junit.Assert.failNotEquals(Assert.java:835)
at org.junit.Assert.assertEquals(Assert.java:120)
at org.junit.Assert.assertEquals(Assert.java:146)
at com.hazelcast.internal.tpcengine.AsyncSocketTest.test_readable(AsyncSocketTest.java:195)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:90)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:55)
at java.lang.reflect.Method.invoke(Method.java:508)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
at org.junit.runners.Suite.runChild(Suite.java:128)
at org.junit.runners.Suite.runChild(Suite.java:27)
at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
at org.apache.maven.surefire.junitcore.JUnitCore.run(JUnitCore.java:49)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.createRequestAndRun(JUnitCoreWrapper.java:120)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.executeEager(JUnitCoreWrapper.java:95)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:75)
at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:69)
at org.apache.maven.surefire.junitcore.JUnitCoreProvider.invoke(JUnitCoreProvider.java:146)
at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:385)
at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:162)
at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:507)
at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:495)
```
</details>
<details><summary>Standard output:</summary>
```
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-954 Binding to /127.0.0.1:0
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: /127.0.0.1:33099 started accepting
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connecting to address:/127.0.0.1:33099
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: NioAsyncServerSocket[/127.0.0.1:33099] accepted: /127.0.0.1:50914->/127.0.0.1:33099
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connection established NioAsyncSocket[/127.0.0.1:50914->/127.0.0.1:33099]
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connection established NioAsyncSocket[/127.0.0.1:50914->/127.0.0.1:33099]
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning
WARNING: Closing NioAsyncSocket[/127.0.0.1:50914->/127.0.0.1:33099]
java.lang.NullPointerException
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handleConnect(NioAsyncSocket.java:438)
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handle(NioAsyncSocket.java:372)
at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:86)
at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408)
at java.lang.Thread.run(Thread.java:825)
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[/127.0.0.1:33099->/127.0.0.1:50914] due to Remote socket closed!
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncServerSocket[/127.0.0.1:33099] due to Reactor-1 is terminating.
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-954 terminated
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connecting to address:/127.0.0.1:5000
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning
WARNING: Closing NioAsyncSocket[null->null]
java.net.ConnectException: Connection refused
at sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
at sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:731)
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handleConnect(NioAsyncSocket.java:428)
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handle(NioAsyncSocket.java:372)
at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:86)
at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408)
at java.lang.Thread.run(Thread.java:825)
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-955 terminated
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating.
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-956 terminated
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating.
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-957 terminated
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-958 Binding to /127.0.0.1:0
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: /127.0.0.1:37617 started accepting
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connecting to address:/127.0.0.1:37617
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: NioAsyncServerSocket[/127.0.0.1:37617] accepted: /127.0.0.1:37442->/127.0.0.1:37617
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connection established NioAsyncSocket[/127.0.0.1:37442->/127.0.0.1:37617]
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Connection established NioAsyncSocket[/127.0.0.1:37442->/127.0.0.1:37617]
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning
WARNING: Closing NioAsyncSocket[/127.0.0.1:37442->/127.0.0.1:37617]
java.lang.NullPointerException
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handleConnect(NioAsyncSocket.java:438)
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handle(NioAsyncSocket.java:372)
at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:86)
at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408)
at java.lang.Thread.run(Thread.java:825)
Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[/127.0.0.1:37617->/127.0.0.1:37442] due to Remote socket closed!
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncServerSocket[/127.0.0.1:37617] due to Reactor-1 is terminating.
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-958 terminated
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[null->null]
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-959 terminated
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[null->null]
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-960 terminated
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating.
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-961 terminated
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning
WARNING: java.lang.IllegalStateException: NioAsyncSocket[null->null] is already started
java.lang.IllegalStateException: NioAsyncSocket[null->null] is already started
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket.start0(NioAsyncSocket.java:183)
at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket.lambda$start$2(NioAsyncSocket.java:170)
at com.hazelcast.internal.tpcengine.Eventloop.runExternalTasks(Eventloop.java:167)
at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:93)
at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408)
at java.lang.Thread.run(Thread.java:825)
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating.
Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info
INFO: Thread-962 terminated
```
</details>
Standard output can be found here - https://s3.console.aws.amazon.com/s3/buckets/j-artifacts/Hazelcast-master-IbmJDK8-fips/72/
| non_priority | com hazelcast internal tpcengine nio nioasyncsockettest master commit failed on ibm following tests failed with the same exception com hazelcast internal tpcengine nio nioasyncsockettest test readable com hazelcast internal tpcengine nio nioasyncsockettest test connect stacktrace java lang assertionerror expected but was at org junit assert fail assert java at org junit assert failnotequals assert java at org junit assert assertequals assert java at org junit assert assertequals assert java at com hazelcast internal tpcengine asyncsockettest test readable asyncsockettest java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at org junit internal runners statements runafters evaluate runafters java at org junit runners parentrunner evaluate parentrunner java at org junit runners evaluate java at org junit runners parentrunner runleaf parentrunner java at org junit runners runchild java at org junit runners runchild java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org junit runners suite runchild suite java at org junit runners suite runchild suite java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org apache maven surefire junitcore junitcore run junitcore java at org apache maven surefire junitcore junitcorewrapper createrequestandrun junitcorewrapper java at org apache maven surefire junitcore junitcorewrapper executeeager junitcorewrapper java at org apache maven surefire junitcore junitcorewrapper execute junitcorewrapper java at org apache maven surefire junitcore junitcorewrapper execute junitcorewrapper java at org apache maven surefire junitcore junitcoreprovider invoke junitcoreprovider java at org apache maven surefire booter forkedbooter runsuitesinprocess forkedbooter java at org apache maven surefire booter forkedbooter execute forkedbooter java at org apache maven surefire booter forkedbooter run forkedbooter java at org apache maven surefire booter forkedbooter main forkedbooter java standard output mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread binding to mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info started accepting mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connecting to address mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info nioasyncserversocket accepted mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connection established nioasyncsocket mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connection established nioasyncsocket mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger warning warning closing nioasyncsocket java lang nullpointerexception at com hazelcast internal tpcengine nio nioasyncsocket handler handleconnect nioasyncsocket java at com hazelcast internal tpcengine nio nioasyncsocket handler handle nioasyncsocket java at com hazelcast internal tpcengine nio nioeventloop run nioeventloop java at com hazelcast internal tpcengine reactor starteventlooptask run reactor java at java lang thread run thread java mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket due to remote socket closed mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncserversocket due to reactor is terminating mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connecting to address mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger warning warning closing nioasyncsocket java net connectexception connection refused at sun nio ch socketchannelimpl checkconnect native method at sun nio ch socketchannelimpl finishconnect socketchannelimpl java at com hazelcast internal tpcengine nio nioasyncsocket handler handleconnect nioasyncsocket java at com hazelcast internal tpcengine nio nioasyncsocket handler handle nioasyncsocket java at com hazelcast internal tpcengine nio nioeventloop run nioeventloop java at com hazelcast internal tpcengine reactor starteventlooptask run reactor java at java lang thread run thread java mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket due to reactor is terminating mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket due to reactor is terminating mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread binding to mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info started accepting mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connecting to address mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info nioasyncserversocket accepted mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connection established nioasyncsocket mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connection established nioasyncsocket mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger warning warning closing nioasyncsocket java lang nullpointerexception at com hazelcast internal tpcengine nio nioasyncsocket handler handleconnect nioasyncsocket java at com hazelcast internal tpcengine nio nioasyncsocket handler handle nioasyncsocket java at com hazelcast internal tpcengine nio nioeventloop run nioeventloop java at com hazelcast internal tpcengine reactor starteventlooptask run reactor java at java lang thread run thread java mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket due to remote socket closed mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncserversocket due to reactor is terminating mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket due to reactor is terminating mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger warning warning java lang illegalstateexception nioasyncsocket is already started java lang illegalstateexception nioasyncsocket is already started at com hazelcast internal tpcengine nio nioasyncsocket nioasyncsocket java at com hazelcast internal tpcengine nio nioasyncsocket lambda start nioasyncsocket java at com hazelcast internal tpcengine eventloop runexternaltasks eventloop java at com hazelcast internal tpcengine nio nioeventloop run nioeventloop java at com hazelcast internal tpcengine reactor starteventlooptask run reactor java at java lang thread run thread java mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket due to reactor is terminating mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated standard output can be found here | 0 |
140,922 | 18,927,836,916 | IssuesEvent | 2021-11-17 11:26:26 | lesjoursfr/gdpr-consent | https://api.github.com/repos/lesjoursfr/gdpr-consent | closed | CVE-2020-15366 (Medium) detected in ajv-4.11.8.tgz - autoclosed | security vulnerability | ## CVE-2020-15366 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ajv-4.11.8.tgz</b></p></summary>
<p>Another JSON Schema Validator</p>
<p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-4.11.8.tgz">https://registry.npmjs.org/ajv/-/ajv-4.11.8.tgz</a></p>
<p>Path to dependency file: gdpr-consent/package.json</p>
<p>Path to vulnerable library: gdpr-consent/node_modules/sass-lint/node_modules/ajv/package.json</p>
<p>
Dependency Hierarchy:
- sass-lint-1.13.1.tgz (Root Library)
- eslint-2.13.1.tgz
- table-3.8.3.tgz
- :x: **ajv-4.11.8.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lesjoursfr/gdpr-consent/commit/4ec31cba6a050fd1e1159f9efa5d328b3a4efb23">4ec31cba6a050fd1e1159f9efa5d328b3a4efb23</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
<p>Publish Date: 2020-07-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15366>CVE-2020-15366</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/ajv-validator/ajv/releases/tag/v6.12.3">https://github.com/ajv-validator/ajv/releases/tag/v6.12.3</a></p>
<p>Release Date: 2020-07-15</p>
<p>Fix Resolution: ajv - 6.12.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-15366 (Medium) detected in ajv-4.11.8.tgz - autoclosed - ## CVE-2020-15366 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ajv-4.11.8.tgz</b></p></summary>
<p>Another JSON Schema Validator</p>
<p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-4.11.8.tgz">https://registry.npmjs.org/ajv/-/ajv-4.11.8.tgz</a></p>
<p>Path to dependency file: gdpr-consent/package.json</p>
<p>Path to vulnerable library: gdpr-consent/node_modules/sass-lint/node_modules/ajv/package.json</p>
<p>
Dependency Hierarchy:
- sass-lint-1.13.1.tgz (Root Library)
- eslint-2.13.1.tgz
- table-3.8.3.tgz
- :x: **ajv-4.11.8.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lesjoursfr/gdpr-consent/commit/4ec31cba6a050fd1e1159f9efa5d328b3a4efb23">4ec31cba6a050fd1e1159f9efa5d328b3a4efb23</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
<p>Publish Date: 2020-07-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15366>CVE-2020-15366</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/ajv-validator/ajv/releases/tag/v6.12.3">https://github.com/ajv-validator/ajv/releases/tag/v6.12.3</a></p>
<p>Release Date: 2020-07-15</p>
<p>Fix Resolution: ajv - 6.12.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in ajv tgz autoclosed cve medium severity vulnerability vulnerable library ajv tgz another json schema validator library home page a href path to dependency file gdpr consent package json path to vulnerable library gdpr consent node modules sass lint node modules ajv package json dependency hierarchy sass lint tgz root library eslint tgz table tgz x ajv tgz vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in ajv validate in ajv aka another json schema validator a carefully crafted json schema could be provided that allows execution of other code by prototype pollution while untrusted schemas are recommended against the worst case of an untrusted schema should be a denial of service not execution of code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ajv step up your open source security game with whitesource | 0 |
230,135 | 17,602,713,680 | IssuesEvent | 2021-08-17 13:42:40 | flutter/flutter | https://api.github.com/repos/flutter/flutter | closed | RenderToggleable class not available in latest dev and master, but is available on stable. | framework documentation passed first triage | RenderToggleable class is not available in dev channel 2.1.0-12.1.pre version | 1.0 | RenderToggleable class not available in latest dev and master, but is available on stable. - RenderToggleable class is not available in dev channel 2.1.0-12.1.pre version | non_priority | rendertoggleable class not available in latest dev and master but is available on stable rendertoggleable class is not available in dev channel pre version | 0 |
161,027 | 25,274,887,771 | IssuesEvent | 2022-11-16 11:56:05 | flutter/flutter | https://api.github.com/repos/flutter/flutter | closed | showLicensePage throws RenderFlex overflow error in landscape when fontSize/Display size is largest | framework f: material design a: accessibility has reproducible steps found in release: 1.22 | <!-- Thank you for using Flutter!
If you are looking for support, please check out our documentation
or consider asking a question on Stack Overflow:
* https://flutter.dev/
* https://api.flutter.dev/
* https://stackoverflow.com/questions/tagged/flutter?sort=frequent
If you have found a bug or if our documentation doesn't have an answer
to what you're looking for, then fill out the template below. Please read
our guide to filing a bug first: https://flutter.dev/docs/resources/bug-reports
-->
## Steps to Reproduce
<!-- You must include full steps to reproduce so that we can reproduce the problem. -->
1. Create test app: flutter create test.
2. Change fab onPressed method to be like this:
```
onPressed: () => showLicensePage(
context: context,
applicationIcon: Icon(Icons.add),
applicationVersion: "TEST",
),
```
3. Start x86 Emulator Pixel 2 1980x1920 xxhdpi
4. Open Settings/Display/Advanced and set Font Size to Larger and Display Size to Largest
5. Rotate emulator in landscape mode
6. Execute **flutter run** to start app
7. Click on fab to show license page
**Expected results:** <!-- what did you want to see? -->
Licenses list without any issues
**Actual results:** <!-- what did you see? -->
Black/Yellow markups showing overflow error at the bottom of the screen until licenses list is rendered completely. The error present only during progress indicator stage, then disappears.
<details>
<summary>Logs</summary>
<!--
Run your application with `flutter run --verbose` and attach all the
log output below between the lines with the backticks. If there is an
exception, please see if the error message includes enough information
to explain how to solve the issue.
-->
```
I/flutter (16356): ══╡ EXCEPTION CAUGHT BY RENDERING LIBRARY ╞═════════════════════════════════════════════════════════
I/flutter (16356): The following assertion was thrown during layout:
I/flutter (16356): A RenderFlex overflowed by 1.00 pixels on the bottom.
I/flutter (16356):
I/flutter (16356): The relevant error-causing widget was:
I/flutter (16356): MaterialApp file:///Users/apc/Work/test2/lib/main.dart:12:12
I/flutter (16356):
I/flutter (16356): The overflowing RenderFlex has an orientation of Axis.vertical.
I/flutter (16356): The edge of the RenderFlex that is overflowing has been marked in the rendering with a yellow and
I/flutter (16356): black striped pattern. This is usually caused by the contents being too big for the RenderFlex.
I/flutter (16356): Consider applying a flex factor (e.g. using an Expanded widget) to force the children of the
I/flutter (16356): RenderFlex to fit within the available space instead of being sized to their natural size.
I/flutter (16356): This is considered an error condition because it indicates that there is content that cannot be
I/flutter (16356): seen. If the content is legitimately bigger than the available space, consider clipping it with a
I/flutter (16356): ClipRect widget before putting it in the flex, or using a scrollable container rather than a Flex,
I/flutter (16356): like a ListView.
I/flutter (16356): The specific RenderFlex in question is: RenderFlex#00445 relayoutBoundary=up4 OVERFLOWING:
I/flutter (16356): creator: Column ← LayoutBuilder-[<ConnectionState.waiting>] ← FadeTransition ← KeyedSubtree-[<0>] ←
I/flutter (16356): Stack ← AnimatedSwitcher ← FutureBuilder<_LicenseData> ← _PackagesView ← _BodyBuilder ← MediaQuery
I/flutter (16356): ← LayoutId-[<_ScaffoldSlot.body>] ← CustomMultiChildLayout ← ⋯
I/flutter (16356): parentData: offset=Offset(0.0, 0.0) (can use size)
I/flutter (16356): constraints: BoxConstraints(0.0<=w<=520.9, 0.0<=h<=240.0)
I/flutter (16356): size: Size(520.9, 240.0)
I/flutter (16356): direction: vertical
I/flutter (16356): mainAxisAlignment: start
I/flutter (16356): mainAxisSize: max
I/flutter (16356): crossAxisAlignment: center
I/flutter (16356): verticalDirection: down
I/flutter (16356): ◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤
I/flutter (16356): ════════════════════════════════════════════════════════════════════════════════════════════════════
```
<!-- Finally, paste the output of running `flutter doctor -v` here. -->
```
[✓] Flutter (Channel master, 1.22.0-10.0.pre.65, on Mac OS X 10.15.6 19G2021, locale en-UA)
• Flutter version 1.22.0-10.0.pre.65 at /Users/apc/Library/flutter
• Framework revision 2032a448ed (7 hours ago), 2020-09-02 23:36:19 -0700
• Engine revision 165abef0a2
• Dart version 2.10.0 (build 2.10.0-77.0.dev)
[✓] Android toolchain - develop for Android devices (Android SDK version 29.0.3)
• Android SDK at /Users/apc/Library/Android/sdk
• Platform android-29, build-tools 29.0.3
• ANDROID_HOME = /Users/apc/Library/Android/sdk
• ANDROID_SDK_ROOT = /Users/apc/Library/Android/sdk
• Java binary at: /Applications/Android Studio.app/Contents/jre/jdk/Contents/Home/bin/java
• Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b3-6222593)
• All Android licenses accepted.
[✗] Xcode - develop for iOS and macOS
✗ Xcode installation is incomplete; a full installation is necessary for iOS development.
Download at: https://developer.apple.com/xcode/download/
Or install Xcode via the App Store.
Once installed, run:
sudo xcode-select --switch /Applications/Xcode.app/Contents/Developer
sudo xcodebuild -runFirstLaunch
✗ CocoaPods not installed.
CocoaPods is used to retrieve the iOS and macOS platform side's plugin code that responds to your plugin usage on the
Dart side.
Without CocoaPods, plugins will not work on iOS or macOS.
For more info, see https://flutter.dev/platform-plugins
To install:
sudo gem install cocoapods
[✓] Android Studio (version 4.0)
• Android Studio at /Applications/Android Studio.app/Contents
• Flutter plugin version 48.1.2
• Dart plugin version 193.7547
• Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b3-6222593)
[✓] Connected device (1 available)
• sdk gphone x86 (mobile) • emulator-5554 • android-x86 • Android 11 (API 30) (emulator)
! Doctor found issues in 1 category.
```
</details>
| 1.0 | showLicensePage throws RenderFlex overflow error in landscape when fontSize/Display size is largest - <!-- Thank you for using Flutter!
If you are looking for support, please check out our documentation
or consider asking a question on Stack Overflow:
* https://flutter.dev/
* https://api.flutter.dev/
* https://stackoverflow.com/questions/tagged/flutter?sort=frequent
If you have found a bug or if our documentation doesn't have an answer
to what you're looking for, then fill out the template below. Please read
our guide to filing a bug first: https://flutter.dev/docs/resources/bug-reports
-->
## Steps to Reproduce
<!-- You must include full steps to reproduce so that we can reproduce the problem. -->
1. Create test app: flutter create test.
2. Change fab onPressed method to be like this:
```
onPressed: () => showLicensePage(
context: context,
applicationIcon: Icon(Icons.add),
applicationVersion: "TEST",
),
```
3. Start x86 Emulator Pixel 2 1980x1920 xxhdpi
4. Open Settings/Display/Advanced and set Font Size to Larger and Display Size to Largest
5. Rotate emulator in landscape mode
6. Execute **flutter run** to start app
7. Click on fab to show license page
**Expected results:** <!-- what did you want to see? -->
Licenses list without any issues
**Actual results:** <!-- what did you see? -->
Black/Yellow markups showing overflow error at the bottom of the screen until licenses list is rendered completely. The error present only during progress indicator stage, then disappears.
<details>
<summary>Logs</summary>
<!--
Run your application with `flutter run --verbose` and attach all the
log output below between the lines with the backticks. If there is an
exception, please see if the error message includes enough information
to explain how to solve the issue.
-->
```
I/flutter (16356): ══╡ EXCEPTION CAUGHT BY RENDERING LIBRARY ╞═════════════════════════════════════════════════════════
I/flutter (16356): The following assertion was thrown during layout:
I/flutter (16356): A RenderFlex overflowed by 1.00 pixels on the bottom.
I/flutter (16356):
I/flutter (16356): The relevant error-causing widget was:
I/flutter (16356): MaterialApp file:///Users/apc/Work/test2/lib/main.dart:12:12
I/flutter (16356):
I/flutter (16356): The overflowing RenderFlex has an orientation of Axis.vertical.
I/flutter (16356): The edge of the RenderFlex that is overflowing has been marked in the rendering with a yellow and
I/flutter (16356): black striped pattern. This is usually caused by the contents being too big for the RenderFlex.
I/flutter (16356): Consider applying a flex factor (e.g. using an Expanded widget) to force the children of the
I/flutter (16356): RenderFlex to fit within the available space instead of being sized to their natural size.
I/flutter (16356): This is considered an error condition because it indicates that there is content that cannot be
I/flutter (16356): seen. If the content is legitimately bigger than the available space, consider clipping it with a
I/flutter (16356): ClipRect widget before putting it in the flex, or using a scrollable container rather than a Flex,
I/flutter (16356): like a ListView.
I/flutter (16356): The specific RenderFlex in question is: RenderFlex#00445 relayoutBoundary=up4 OVERFLOWING:
I/flutter (16356): creator: Column ← LayoutBuilder-[<ConnectionState.waiting>] ← FadeTransition ← KeyedSubtree-[<0>] ←
I/flutter (16356): Stack ← AnimatedSwitcher ← FutureBuilder<_LicenseData> ← _PackagesView ← _BodyBuilder ← MediaQuery
I/flutter (16356): ← LayoutId-[<_ScaffoldSlot.body>] ← CustomMultiChildLayout ← ⋯
I/flutter (16356): parentData: offset=Offset(0.0, 0.0) (can use size)
I/flutter (16356): constraints: BoxConstraints(0.0<=w<=520.9, 0.0<=h<=240.0)
I/flutter (16356): size: Size(520.9, 240.0)
I/flutter (16356): direction: vertical
I/flutter (16356): mainAxisAlignment: start
I/flutter (16356): mainAxisSize: max
I/flutter (16356): crossAxisAlignment: center
I/flutter (16356): verticalDirection: down
I/flutter (16356): ◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤
I/flutter (16356): ════════════════════════════════════════════════════════════════════════════════════════════════════
```
<!-- Finally, paste the output of running `flutter doctor -v` here. -->
```
[✓] Flutter (Channel master, 1.22.0-10.0.pre.65, on Mac OS X 10.15.6 19G2021, locale en-UA)
• Flutter version 1.22.0-10.0.pre.65 at /Users/apc/Library/flutter
• Framework revision 2032a448ed (7 hours ago), 2020-09-02 23:36:19 -0700
• Engine revision 165abef0a2
• Dart version 2.10.0 (build 2.10.0-77.0.dev)
[✓] Android toolchain - develop for Android devices (Android SDK version 29.0.3)
• Android SDK at /Users/apc/Library/Android/sdk
• Platform android-29, build-tools 29.0.3
• ANDROID_HOME = /Users/apc/Library/Android/sdk
• ANDROID_SDK_ROOT = /Users/apc/Library/Android/sdk
• Java binary at: /Applications/Android Studio.app/Contents/jre/jdk/Contents/Home/bin/java
• Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b3-6222593)
• All Android licenses accepted.
[✗] Xcode - develop for iOS and macOS
✗ Xcode installation is incomplete; a full installation is necessary for iOS development.
Download at: https://developer.apple.com/xcode/download/
Or install Xcode via the App Store.
Once installed, run:
sudo xcode-select --switch /Applications/Xcode.app/Contents/Developer
sudo xcodebuild -runFirstLaunch
✗ CocoaPods not installed.
CocoaPods is used to retrieve the iOS and macOS platform side's plugin code that responds to your plugin usage on the
Dart side.
Without CocoaPods, plugins will not work on iOS or macOS.
For more info, see https://flutter.dev/platform-plugins
To install:
sudo gem install cocoapods
[✓] Android Studio (version 4.0)
• Android Studio at /Applications/Android Studio.app/Contents
• Flutter plugin version 48.1.2
• Dart plugin version 193.7547
• Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b3-6222593)
[✓] Connected device (1 available)
• sdk gphone x86 (mobile) • emulator-5554 • android-x86 • Android 11 (API 30) (emulator)
! Doctor found issues in 1 category.
```
</details>
| non_priority | showlicensepage throws renderflex overflow error in landscape when fontsize display size is largest thank you for using flutter if you are looking for support please check out our documentation or consider asking a question on stack overflow if you have found a bug or if our documentation doesn t have an answer to what you re looking for then fill out the template below please read our guide to filing a bug first steps to reproduce create test app flutter create test change fab onpressed method to be like this onpressed showlicensepage context context applicationicon icon icons add applicationversion test start emulator pixel xxhdpi open settings display advanced and set font size to larger and display size to largest rotate emulator in landscape mode execute flutter run to start app click on fab to show license page expected results licenses list without any issues actual results black yellow markups showing overflow error at the bottom of the screen until licenses list is rendered completely the error present only during progress indicator stage then disappears logs run your application with flutter run verbose and attach all the log output below between the lines with the backticks if there is an exception please see if the error message includes enough information to explain how to solve the issue i flutter ══╡ exception caught by rendering library ╞═════════════════════════════════════════════════════════ i flutter the following assertion was thrown during layout i flutter a renderflex overflowed by pixels on the bottom i flutter i flutter the relevant error causing widget was i flutter materialapp file users apc work lib main dart i flutter i flutter the overflowing renderflex has an orientation of axis vertical i flutter the edge of the renderflex that is overflowing has been marked in the rendering with a yellow and i flutter black striped pattern this is usually caused by the contents being too big for the renderflex i flutter consider applying a flex factor e g using an expanded widget to force the children of the i flutter renderflex to fit within the available space instead of being sized to their natural size i flutter this is considered an error condition because it indicates that there is content that cannot be i flutter seen if the content is legitimately bigger than the available space consider clipping it with a i flutter cliprect widget before putting it in the flex or using a scrollable container rather than a flex i flutter like a listview i flutter the specific renderflex in question is renderflex relayoutboundary overflowing i flutter creator column ← layoutbuilder ← fadetransition ← keyedsubtree ← i flutter stack ← animatedswitcher ← futurebuilder ← packagesview ← bodybuilder ← mediaquery i flutter ← layoutid ← custommultichildlayout ← ⋯ i flutter parentdata offset offset can use size i flutter constraints boxconstraints w h i flutter size size i flutter direction vertical i flutter mainaxisalignment start i flutter mainaxissize max i flutter crossaxisalignment center i flutter verticaldirection down i flutter ◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤ i flutter ════════════════════════════════════════════════════════════════════════════════════════════════════ flutter channel master pre on mac os x locale en ua • flutter version pre at users apc library flutter • framework revision hours ago • engine revision • dart version build dev android toolchain develop for android devices android sdk version • android sdk at users apc library android sdk • platform android build tools • android home users apc library android sdk • android sdk root users apc library android sdk • java binary at applications android studio app contents jre jdk contents home bin java • java version openjdk runtime environment build release • all android licenses accepted xcode develop for ios and macos ✗ xcode installation is incomplete a full installation is necessary for ios development download at or install xcode via the app store once installed run sudo xcode select switch applications xcode app contents developer sudo xcodebuild runfirstlaunch ✗ cocoapods not installed cocoapods is used to retrieve the ios and macos platform side s plugin code that responds to your plugin usage on the dart side without cocoapods plugins will not work on ios or macos for more info see to install sudo gem install cocoapods android studio version • android studio at applications android studio app contents • flutter plugin version • dart plugin version • java version openjdk runtime environment build release connected device available • sdk gphone mobile • emulator • android • android api emulator doctor found issues in category | 0 |
35,327 | 6,444,680,577 | IssuesEvent | 2017-08-12 15:34:33 | fossasia/open-event-orga-server | https://api.github.com/repos/fossasia/open-event-orga-server | closed | Custom-forms: Change data.type in custom-form | documentation has-PR rest-api | **I'm submitting a ...** (check one with "x")
- [x] bug report
- [ ] feature request
- [ ] support request => Please do not submit support requests here, instead ask your query in out Gitter channel at https://gitter.im/fossasia/open-event-orga-server
**Current behavior:**
The type attribute is `custom_form` which leads to error 409 while making a request after #4300
**Expected behavior:**
The type attribute should be `custom-form`
@enigmaeth Can you please check? | 1.0 | Custom-forms: Change data.type in custom-form - **I'm submitting a ...** (check one with "x")
- [x] bug report
- [ ] feature request
- [ ] support request => Please do not submit support requests here, instead ask your query in out Gitter channel at https://gitter.im/fossasia/open-event-orga-server
**Current behavior:**
The type attribute is `custom_form` which leads to error 409 while making a request after #4300
**Expected behavior:**
The type attribute should be `custom-form`
@enigmaeth Can you please check? | non_priority | custom forms change data type in custom form i m submitting a check one with x bug report feature request support request please do not submit support requests here instead ask your query in out gitter channel at current behavior the type attribute is custom form which leads to error while making a request after expected behavior the type attribute should be custom form enigmaeth can you please check | 0 |
122,366 | 10,220,660,817 | IssuesEvent | 2019-08-15 22:04:03 | spacetelescope/jwst | https://api.github.com/repos/spacetelescope/jwst | closed | Add coverage test to Travis CI | enhancement testing | Would be nice to know the coverage of the tests. We can turn on GitHub coveralls webhook for automated coverage reporting too. Astropy has example on how to set this up.
| 1.0 | Add coverage test to Travis CI - Would be nice to know the coverage of the tests. We can turn on GitHub coveralls webhook for automated coverage reporting too. Astropy has example on how to set this up.
| non_priority | add coverage test to travis ci would be nice to know the coverage of the tests we can turn on github coveralls webhook for automated coverage reporting too astropy has example on how to set this up | 0 |
5,527 | 5,723,950,286 | IssuesEvent | 2017-04-20 13:32:20 | lesswrong-ru/lesswrong-ru | https://api.github.com/repos/lesswrong-ru/lesswrong-ru | closed | Настроить автоматические бекапы | infrastructure | В `~/private` лежат какие-то бекапы `a70553_lw_2016-12-09_17_00.zip` (mysql-база) и `lesswrong.ru_2016-12-09_17_00.zip` (drupal-сайт), которые делал не я. Либо хостинг их делает изредка сам (но они устарели на два месяца), либо они делаются по кнопке из админки, к которой у меня нет доступа.
Я когда-то написал скрипт `~/private/full-backup.sh`, который бекапит базу и сайт, и запускаю его вручную перед крупными изменениями.
Надо всё это автоматизировать.
Варианты:
* дождаться #7, переезда на VPS
* выяснить у Юлия, можно ли настроить бекапы на макхосте
* повесить где-нибудь скрипт на кроне, который будет делать `ssh lesswrong.ru ~/private/full-backup.sh` раз в сутки.
Ещё хорошо бы, чтобы бекапы копировались куда-то ещё, а не хранились на той же машине. (На S3, например.) | 1.0 | Настроить автоматические бекапы - В `~/private` лежат какие-то бекапы `a70553_lw_2016-12-09_17_00.zip` (mysql-база) и `lesswrong.ru_2016-12-09_17_00.zip` (drupal-сайт), которые делал не я. Либо хостинг их делает изредка сам (но они устарели на два месяца), либо они делаются по кнопке из админки, к которой у меня нет доступа.
Я когда-то написал скрипт `~/private/full-backup.sh`, который бекапит базу и сайт, и запускаю его вручную перед крупными изменениями.
Надо всё это автоматизировать.
Варианты:
* дождаться #7, переезда на VPS
* выяснить у Юлия, можно ли настроить бекапы на макхосте
* повесить где-нибудь скрипт на кроне, который будет делать `ssh lesswrong.ru ~/private/full-backup.sh` раз в сутки.
Ещё хорошо бы, чтобы бекапы копировались куда-то ещё, а не хранились на той же машине. (На S3, например.) | non_priority | настроить автоматические бекапы в private лежат какие то бекапы lw zip mysql база и lesswrong ru zip drupal сайт которые делал не я либо хостинг их делает изредка сам но они устарели на два месяца либо они делаются по кнопке из админки к которой у меня нет доступа я когда то написал скрипт private full backup sh который бекапит базу и сайт и запускаю его вручную перед крупными изменениями надо всё это автоматизировать варианты дождаться переезда на vps выяснить у юлия можно ли настроить бекапы на макхосте повесить где нибудь скрипт на кроне который будет делать ssh lesswrong ru private full backup sh раз в сутки ещё хорошо бы чтобы бекапы копировались куда то ещё а не хранились на той же машине на например | 0 |
270,794 | 29,116,028,542 | IssuesEvent | 2023-05-17 01:06:14 | pazhanivel07/frameworks_base_Aosp10_r33 | https://api.github.com/repos/pazhanivel07/frameworks_base_Aosp10_r33 | reopened | CVE-2021-0954 (High) detected in baseandroid-10.0.0_r46 | Mend: dependency security vulnerability | ## CVE-2021-0954 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>baseandroid-10.0.0_r46</b></p></summary>
<p>
<p>Android framework classes and services</p>
<p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/base>https://android.googlesource.com/platform/frameworks/base</a></p>
<p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/frameworks_base_Aosp10_r33/commit/20c111772c04525c865b7dc0b39fcfca73505927">20c111772c04525c865b7dc0b39fcfca73505927</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/core/java/com/android/internal/app/ResolverActivity.java</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In ResolverActivity, there is a possible user interaction bypass due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-143559931
<p>Publish Date: 2021-12-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-0954>CVE-2021-0954</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-0954 (High) detected in baseandroid-10.0.0_r46 - ## CVE-2021-0954 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>baseandroid-10.0.0_r46</b></p></summary>
<p>
<p>Android framework classes and services</p>
<p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/base>https://android.googlesource.com/platform/frameworks/base</a></p>
<p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/frameworks_base_Aosp10_r33/commit/20c111772c04525c865b7dc0b39fcfca73505927">20c111772c04525c865b7dc0b39fcfca73505927</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/core/java/com/android/internal/app/ResolverActivity.java</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In ResolverActivity, there is a possible user interaction bypass due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-143559931
<p>Publish Date: 2021-12-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-0954>CVE-2021-0954</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in baseandroid cve high severity vulnerability vulnerable library baseandroid android framework classes and services library home page a href found in head commit a href found in base branch master vulnerable source files core java com android internal app resolveractivity java vulnerability details in resolveractivity there is a possible user interaction bypass due to a tapjacking overlay attack this could lead to local escalation of privilege with user execution privileges needed user interaction is needed for exploitation product androidversions android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with mend | 0 |
63,913 | 18,055,691,096 | IssuesEvent | 2021-09-20 07:56:44 | primefaces/primefaces | https://api.github.com/repos/primefaces/primefaces | closed | Move JS Script To Bottom: JS Error when Primefaces is not used on Page | defect | **Describe the defect**
When following is activated in web.xml and there is a page without Primefaces:
```
<context-param>
<param-name>primefaces.MOVE_SCRIPTS_TO_BOTTOM</param-name>
<param-value>true</param-value>
</context-param>
```
following will be generated at the end:
if(window.$){$(PrimeFaces.escapeClientId("4ff96bf4-a5ec-4916-9eff-dedb56222daf")).remove();}
is it possible to generate following if:
if(window.PrimeFaces){
if(window.$){$(PrimeFaces.escapeClientId("4ff96bf4-a5ec-4916-9eff-dedb56222daf")).remove();}
}
or mockup the escapeClientId function!?
**Reproducer**
Page with Move JS Script to bottom, but without Primefaces Component on Page
**Environment:**
- PF Version: 10.0
- JSF + version: 2.2.20
- Affected browsers: ALL
**To Reproduce**
run page and view error
**Expected behavior**
js error should not be there
| 1.0 | Move JS Script To Bottom: JS Error when Primefaces is not used on Page - **Describe the defect**
When following is activated in web.xml and there is a page without Primefaces:
```
<context-param>
<param-name>primefaces.MOVE_SCRIPTS_TO_BOTTOM</param-name>
<param-value>true</param-value>
</context-param>
```
following will be generated at the end:
if(window.$){$(PrimeFaces.escapeClientId("4ff96bf4-a5ec-4916-9eff-dedb56222daf")).remove();}
is it possible to generate following if:
if(window.PrimeFaces){
if(window.$){$(PrimeFaces.escapeClientId("4ff96bf4-a5ec-4916-9eff-dedb56222daf")).remove();}
}
or mockup the escapeClientId function!?
**Reproducer**
Page with Move JS Script to bottom, but without Primefaces Component on Page
**Environment:**
- PF Version: 10.0
- JSF + version: 2.2.20
- Affected browsers: ALL
**To Reproduce**
run page and view error
**Expected behavior**
js error should not be there
| non_priority | move js script to bottom js error when primefaces is not used on page describe the defect when following is activated in web xml and there is a page without primefaces primefaces move scripts to bottom true following will be generated at the end if window primefaces escapeclientid remove is it possible to generate following if if window primefaces if window primefaces escapeclientid remove or mockup the escapeclientid function reproducer page with move js script to bottom but without primefaces component on page environment pf version jsf version affected browsers all to reproduce run page and view error expected behavior js error should not be there | 0 |
6,564 | 14,890,787,316 | IssuesEvent | 2021-01-20 23:44:46 | ArchiveBox/ArchiveBox | https://api.github.com/repos/ArchiveBox/ArchiveBox | closed | Bugfix: Use relative import to avoid module confliction | bug changes: architecture complexity: low status: wip | <!--
Please fill out the following information,
feel free to delete sections if they're not applicable
or if long issue templates annoy you.
(the only required section is the version information)
-->
#### Describe the bug
Currently, there are plenty of places in the source code that doesn't use relative import.
For example, line 20 in admin.py:
```python
from util import htmldecode, urldecode, ansi_to_html
```
This causes problem when there are other conflicting script/module name in `PYTHONPATH`.
After examining other popular libs that have "util.py" (there are a lot) and have no issue to work, I found they all use relative import which will prevent this.
From [`sqlalchemy`](https://github.com/sqlalchemy/sqlalchemy):
```python
from . import util as _util # noqa
```
From [`imageio`](https://github.com/imageio/imageio):
```python
from .core import util
```
#### Steps to reproduce
<!--
For example:
1. Add some path to `PATYHONPATH` and have a util.py file there.
2. Run `archive init` in any folder.
3. It shows error `ImportError: cannot import name 'htmldecode' from 'util' ({path of my personal util.py})`.
-->
#### Screenshots or log output
```
[i] [2021-01-19 23:51:09] ArchiveBox v0.5.3: archivebox init
> C:\!Others\test
Traceback (most recent call last):
File "c:\users\ikena\appdata\local\programs\python\python38\lib\runpy.py", line 193, in _run_module_as_main
return _run_code(code, main_globals, None,
File "c:\users\ikena\appdata\local\programs\python\python38\lib\runpy.py", line 86, in _run_code
exec(code, run_globals)
File "C:\Users\ikena\AppData\Local\Programs\Python\Python38\Scripts\archivebox.exe\__main__.py", line 7, in <module>
from .cli import main
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\archivebox\cli\__init__.py", line 129, in main
run_subcommand(
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\archivebox\cli\__init__.py", line 66, in run_subcommand
setup_django(in_memory_db=subcommand in fake_db, check_db=subcommand in archive_cmds)
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\archivebox\config.py", line 1074, in setup_django
django.setup()
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\__init__.py", line 24, in setup
apps.populate(settings.INSTALLED_APPS)
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\apps\registry.py", line 122, in populate
app_config.ready()
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\contrib\admin\apps.py", line 24, in ready
self.module.autodiscover()
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\contrib\admin\__init__.py", line 24, in autodiscover
autodiscover_modules('admin', register_to=site)
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\utils\module_loading.py", line 47, in autodiscover_modules
import_module('%s.%s' % (app_config.name, module_to_search))
File "c:\users\ikena\appdata\local\programs\python\python38\lib\importlib\__init__.py", line 127, in import_module
return _bootstrap._gcd_import(name[level:], package, level)
File "<frozen importlib._bootstrap>", line 1014, in _gcd_import
File "<frozen importlib._bootstrap>", line 991, in _find_and_load
File "<frozen importlib._bootstrap>", line 975, in _find_and_load_unlocked
File "<frozen importlib._bootstrap>", line 671, in _load_unlocked
File "<frozen importlib._bootstrap_external>", line 783, in exec_module
File "<frozen importlib._bootstrap>", line 219, in _call_with_frames_removed
File "C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\archivebox\core\admin.py", line 20, in <module>
from util import htmldecode, urldecode, ansi_to_html
ImportError: cannot import name 'htmldecode' from 'util' (C:\sync\code\python\_public\util.py)
```
#### ArchiveBox version
<!-- Run the `archivebox version` command locally then copy paste the result here: -->
```logs
ArchiveBox v0.5.3
Cpython Windows Windows-10-10.0.19041-SP0 AMD64 (not in Docker)
[i] Dependency versions:
√ ARCHIVEBOX_BINARY v0.5.3 valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Scripts\archivebox.exe
√ PYTHON_BINARY v3.8.1 valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\python.exe
√ DJANGO_BINARY v3.1.3 valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\django\bin\django-admin.py
√ CURL_BINARY v7.55.1 valid c:\windows\system32\curl.EXE
X WGET_BINARY ? invalid wget
X NODE_BINARY ? invalid "C:\Program Files\nodejs\node.EXE"
X SINGLEFILE_BINARY ? invalid single-file
X READABILITY_BINARY ? invalid readability-extractor
X MERCURY_BINARY ? invalid mercury-parser
√ GIT_BINARY v2.29.2. valid "c:\program files\git\cmd\git.EXE"
√ YOUTUBEDL_BINARY v2021.01.16 valid c:\software\!cli\youtube-dl.EXE
X CHROME_BINARY ? invalid
X RIPGREP_BINARY ? invalid rg
[i] Source-code locations:
√ PACKAGE_DIR 23 files valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\archivebox
√ TEMPLATES_DIR 3 files valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\archivebox\themes
[i] Secrets locations:
- CHROME_USER_DATA_DIR - disabled
- COOKIES_FILE - disabled
[i] Data locations:
[!] Warning: Missing 7 recommended dependencies
! WGET_BINARY: wget (unable to detect version)
! NODE_BINARY: C:\Program Files\nodejs\node.EXE (v14.8.0)
! SINGLEFILE_BINARY: single-file (unable to detect version)
Hint: npm install --prefix . "git+https://github.com/ArchiveBox/ArchiveBox.git"
or archivebox config --set SAVE_SINGLEFILE=False to silence this warning
! READABILITY_BINARY: readability-extractor (unable to detect version)
Hint: npm install --prefix . "git+https://github.com/ArchiveBox/ArchiveBox.git"
or archivebox config --set SAVE_READABILITY=False to silence this warning
! MERCURY_BINARY: mercury-parser (unable to detect version)
Hint: npm install --prefix . "git+https://github.com/ArchiveBox/ArchiveBox.git"
or archivebox config --set SAVE_MERCURY=False to silence this warning
! CHROME_BINARY: unable to find binary (unable to detect version)
! RIPGREP_BINARY: rg (unable to detect version)```
<!-- Tickets without full version info will closed until it is provided,
we need the full output here to help you solve your issue -->
| 1.0 | Bugfix: Use relative import to avoid module confliction - <!--
Please fill out the following information,
feel free to delete sections if they're not applicable
or if long issue templates annoy you.
(the only required section is the version information)
-->
#### Describe the bug
Currently, there are plenty of places in the source code that doesn't use relative import.
For example, line 20 in admin.py:
```python
from util import htmldecode, urldecode, ansi_to_html
```
This causes problem when there are other conflicting script/module name in `PYTHONPATH`.
After examining other popular libs that have "util.py" (there are a lot) and have no issue to work, I found they all use relative import which will prevent this.
From [`sqlalchemy`](https://github.com/sqlalchemy/sqlalchemy):
```python
from . import util as _util # noqa
```
From [`imageio`](https://github.com/imageio/imageio):
```python
from .core import util
```
#### Steps to reproduce
<!--
For example:
1. Add some path to `PATYHONPATH` and have a util.py file there.
2. Run `archive init` in any folder.
3. It shows error `ImportError: cannot import name 'htmldecode' from 'util' ({path of my personal util.py})`.
-->
#### Screenshots or log output
```
[i] [2021-01-19 23:51:09] ArchiveBox v0.5.3: archivebox init
> C:\!Others\test
Traceback (most recent call last):
File "c:\users\ikena\appdata\local\programs\python\python38\lib\runpy.py", line 193, in _run_module_as_main
return _run_code(code, main_globals, None,
File "c:\users\ikena\appdata\local\programs\python\python38\lib\runpy.py", line 86, in _run_code
exec(code, run_globals)
File "C:\Users\ikena\AppData\Local\Programs\Python\Python38\Scripts\archivebox.exe\__main__.py", line 7, in <module>
from .cli import main
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\archivebox\cli\__init__.py", line 129, in main
run_subcommand(
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\archivebox\cli\__init__.py", line 66, in run_subcommand
setup_django(in_memory_db=subcommand in fake_db, check_db=subcommand in archive_cmds)
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\archivebox\config.py", line 1074, in setup_django
django.setup()
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\__init__.py", line 24, in setup
apps.populate(settings.INSTALLED_APPS)
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\apps\registry.py", line 122, in populate
app_config.ready()
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\contrib\admin\apps.py", line 24, in ready
self.module.autodiscover()
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\contrib\admin\__init__.py", line 24, in autodiscover
autodiscover_modules('admin', register_to=site)
File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\utils\module_loading.py", line 47, in autodiscover_modules
import_module('%s.%s' % (app_config.name, module_to_search))
File "c:\users\ikena\appdata\local\programs\python\python38\lib\importlib\__init__.py", line 127, in import_module
return _bootstrap._gcd_import(name[level:], package, level)
File "<frozen importlib._bootstrap>", line 1014, in _gcd_import
File "<frozen importlib._bootstrap>", line 991, in _find_and_load
File "<frozen importlib._bootstrap>", line 975, in _find_and_load_unlocked
File "<frozen importlib._bootstrap>", line 671, in _load_unlocked
File "<frozen importlib._bootstrap_external>", line 783, in exec_module
File "<frozen importlib._bootstrap>", line 219, in _call_with_frames_removed
File "C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\archivebox\core\admin.py", line 20, in <module>
from util import htmldecode, urldecode, ansi_to_html
ImportError: cannot import name 'htmldecode' from 'util' (C:\sync\code\python\_public\util.py)
```
#### ArchiveBox version
<!-- Run the `archivebox version` command locally then copy paste the result here: -->
```logs
ArchiveBox v0.5.3
Cpython Windows Windows-10-10.0.19041-SP0 AMD64 (not in Docker)
[i] Dependency versions:
√ ARCHIVEBOX_BINARY v0.5.3 valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Scripts\archivebox.exe
√ PYTHON_BINARY v3.8.1 valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\python.exe
√ DJANGO_BINARY v3.1.3 valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\django\bin\django-admin.py
√ CURL_BINARY v7.55.1 valid c:\windows\system32\curl.EXE
X WGET_BINARY ? invalid wget
X NODE_BINARY ? invalid "C:\Program Files\nodejs\node.EXE"
X SINGLEFILE_BINARY ? invalid single-file
X READABILITY_BINARY ? invalid readability-extractor
X MERCURY_BINARY ? invalid mercury-parser
√ GIT_BINARY v2.29.2. valid "c:\program files\git\cmd\git.EXE"
√ YOUTUBEDL_BINARY v2021.01.16 valid c:\software\!cli\youtube-dl.EXE
X CHROME_BINARY ? invalid
X RIPGREP_BINARY ? invalid rg
[i] Source-code locations:
√ PACKAGE_DIR 23 files valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\archivebox
√ TEMPLATES_DIR 3 files valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\archivebox\themes
[i] Secrets locations:
- CHROME_USER_DATA_DIR - disabled
- COOKIES_FILE - disabled
[i] Data locations:
[!] Warning: Missing 7 recommended dependencies
! WGET_BINARY: wget (unable to detect version)
! NODE_BINARY: C:\Program Files\nodejs\node.EXE (v14.8.0)
! SINGLEFILE_BINARY: single-file (unable to detect version)
Hint: npm install --prefix . "git+https://github.com/ArchiveBox/ArchiveBox.git"
or archivebox config --set SAVE_SINGLEFILE=False to silence this warning
! READABILITY_BINARY: readability-extractor (unable to detect version)
Hint: npm install --prefix . "git+https://github.com/ArchiveBox/ArchiveBox.git"
or archivebox config --set SAVE_READABILITY=False to silence this warning
! MERCURY_BINARY: mercury-parser (unable to detect version)
Hint: npm install --prefix . "git+https://github.com/ArchiveBox/ArchiveBox.git"
or archivebox config --set SAVE_MERCURY=False to silence this warning
! CHROME_BINARY: unable to find binary (unable to detect version)
! RIPGREP_BINARY: rg (unable to detect version)```
<!-- Tickets without full version info will closed until it is provided,
we need the full output here to help you solve your issue -->
| non_priority | bugfix use relative import to avoid module confliction please fill out the following information feel free to delete sections if they re not applicable or if long issue templates annoy you the only required section is the version information describe the bug currently there are plenty of places in the source code that doesn t use relative import for example line in admin py python from util import htmldecode urldecode ansi to html this causes problem when there are other conflicting script module name in pythonpath after examining other popular libs that have util py there are a lot and have no issue to work i found they all use relative import which will prevent this from python from import util as util noqa from python from core import util steps to reproduce for example add some path to patyhonpath and have a util py file there run archive init in any folder it shows error importerror cannot import name htmldecode from util path of my personal util py screenshots or log output archivebox archivebox init c others test traceback most recent call last file c users ikena appdata local programs python lib runpy py line in run module as main return run code code main globals none file c users ikena appdata local programs python lib runpy py line in run code exec code run globals file c users ikena appdata local programs python scripts archivebox exe main py line in from cli import main file c users ikena appdata local programs python lib site packages archivebox cli init py line in main run subcommand file c users ikena appdata local programs python lib site packages archivebox cli init py line in run subcommand setup django in memory db subcommand in fake db check db subcommand in archive cmds file c users ikena appdata local programs python lib site packages archivebox config py line in setup django django setup file c users ikena appdata local programs python lib site packages django init py line in setup apps populate settings installed apps file c users ikena appdata local programs python lib site packages django apps registry py line in populate app config ready file c users ikena appdata local programs python lib site packages django contrib admin apps py line in ready self module autodiscover file c users ikena appdata local programs python lib site packages django contrib admin init py line in autodiscover autodiscover modules admin register to site file c users ikena appdata local programs python lib site packages django utils module loading py line in autodiscover modules import module s s app config name module to search file c users ikena appdata local programs python lib importlib init py line in import module return bootstrap gcd import name package level file line in gcd import file line in find and load file line in find and load unlocked file line in load unlocked file line in exec module file line in call with frames removed file c users ikena appdata local programs python lib site packages archivebox core admin py line in from util import htmldecode urldecode ansi to html importerror cannot import name htmldecode from util c sync code python public util py archivebox version logs archivebox cpython windows windows not in docker dependency versions √ archivebox binary valid c users ikena appdata local programs python scripts archivebox exe √ python binary valid c users ikena appdata local programs python python exe √ django binary valid c users ikena appdata local programs python lib site packages django bin django admin py √ curl binary valid c windows curl exe x wget binary invalid wget x node binary invalid c program files nodejs node exe x singlefile binary invalid single file x readability binary invalid readability extractor x mercury binary invalid mercury parser √ git binary valid c program files git cmd git exe √ youtubedl binary valid c software cli youtube dl exe x chrome binary invalid x ripgrep binary invalid rg source code locations √ package dir files valid c users ikena appdata local programs python lib site packages archivebox √ templates dir files valid c users ikena appdata local programs python lib site packages archivebox themes secrets locations chrome user data dir disabled cookies file disabled data locations warning missing recommended dependencies wget binary wget unable to detect version node binary c program files nodejs node exe singlefile binary single file unable to detect version hint npm install prefix git or archivebox config set save singlefile false to silence this warning readability binary readability extractor unable to detect version hint npm install prefix git or archivebox config set save readability false to silence this warning mercury binary mercury parser unable to detect version hint npm install prefix git or archivebox config set save mercury false to silence this warning chrome binary unable to find binary unable to detect version ripgrep binary rg unable to detect version tickets without full version info will closed until it is provided we need the full output here to help you solve your issue | 0 |
56,237 | 23,727,963,112 | IssuesEvent | 2022-08-30 21:37:40 | MicrosoftDocs/windowsserverdocs | https://api.github.com/repos/MicrosoftDocs/windowsserverdocs | closed | Multiple Monitors | Pri1 windows-server/prod remote-desktop-services/tech |
[Enter feedback here]
Don't you think it would be important to identify on this page if the Microsoft Store Client supports multiple monitors and if so, how to go about configuring that? I don't see any mention of it anywhere, and I would think most folks that use this would want to know about that. Please update to include this incredibly important information.
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: acc42a8f-2623-4352-7cc4-70f0f61e9d89
* Version Independent ID: 97d8b54b-5e7d-098b-4fb7-e8f6e0b30389
* Content: [Get started with the Microsoft Store Client](https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/clients/windows)
* Content Source: [WindowsServerDocs/remote/remote-desktop-services/clients/windows.md](https://github.com/MicrosoftDocs/windowsserverdocs/blob/master/WindowsServerDocs/remote/remote-desktop-services/clients/windows.md)
* Product: **windows-server**
* Technology: **remote-desktop-services**
* GitHub Login: @lizap
* Microsoft Alias: **elizapo** | 1.0 | Multiple Monitors -
[Enter feedback here]
Don't you think it would be important to identify on this page if the Microsoft Store Client supports multiple monitors and if so, how to go about configuring that? I don't see any mention of it anywhere, and I would think most folks that use this would want to know about that. Please update to include this incredibly important information.
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: acc42a8f-2623-4352-7cc4-70f0f61e9d89
* Version Independent ID: 97d8b54b-5e7d-098b-4fb7-e8f6e0b30389
* Content: [Get started with the Microsoft Store Client](https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/clients/windows)
* Content Source: [WindowsServerDocs/remote/remote-desktop-services/clients/windows.md](https://github.com/MicrosoftDocs/windowsserverdocs/blob/master/WindowsServerDocs/remote/remote-desktop-services/clients/windows.md)
* Product: **windows-server**
* Technology: **remote-desktop-services**
* GitHub Login: @lizap
* Microsoft Alias: **elizapo** | non_priority | multiple monitors don t you think it would be important to identify on this page if the microsoft store client supports multiple monitors and if so how to go about configuring that i don t see any mention of it anywhere and i would think most folks that use this would want to know about that please update to include this incredibly important information document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source product windows server technology remote desktop services github login lizap microsoft alias elizapo | 0 |
155,272 | 12,244,920,098 | IssuesEvent | 2020-05-05 12:04:35 | RomanKondratev90/Test-project | https://api.github.com/repos/RomanKondratev90/Test-project | opened | Test case №3 (Android приложение - AniLibria). Запуск приложения на платформе Android (версии с 4.0 по 8.1) | test case (Pass) | Приоритет - важный.
Шаги
Запуск приложения AniLibria на ОС Android (версии с 4.0 по 8.1)
Ожидаемый результат
Приложение запускается на ОС Android (версии с 4.0 по 8.1)
Статус
Pass
| 1.0 | Test case №3 (Android приложение - AniLibria). Запуск приложения на платформе Android (версии с 4.0 по 8.1) - Приоритет - важный.
Шаги
Запуск приложения AniLibria на ОС Android (версии с 4.0 по 8.1)
Ожидаемый результат
Приложение запускается на ОС Android (версии с 4.0 по 8.1)
Статус
Pass
| non_priority | test case № android приложение anilibria запуск приложения на платформе android версии с по приоритет важный шаги запуск приложения anilibria на ос android версии с по ожидаемый результат приложение запускается на ос android версии с по статус pass | 0 |
84,280 | 16,479,911,617 | IssuesEvent | 2021-05-24 10:14:44 | jOOQ/jOOQ | https://api.github.com/repos/jOOQ/jOOQ | opened | Add code generation configuration to allow for fetching columns for all tables in one go | C: Code Generation E: All Editions P: Medium T: Enhancement | Our code generator has a classic N+1 problem. We're fetching
- Catalogs
- Schemas
- Tables
- Columns
This can result in a lot of queries, which is a problem with high latency connections, e.g. to cloud databases like BigQuery. It would be better in those products to be able to at least fetch columns for all tables in the input schemata, not just per table. We're already doing that with higher level objects, such as tables. We fetch all tables for all input schemata, not all tables per schema. | 1.0 | Add code generation configuration to allow for fetching columns for all tables in one go - Our code generator has a classic N+1 problem. We're fetching
- Catalogs
- Schemas
- Tables
- Columns
This can result in a lot of queries, which is a problem with high latency connections, e.g. to cloud databases like BigQuery. It would be better in those products to be able to at least fetch columns for all tables in the input schemata, not just per table. We're already doing that with higher level objects, such as tables. We fetch all tables for all input schemata, not all tables per schema. | non_priority | add code generation configuration to allow for fetching columns for all tables in one go our code generator has a classic n problem we re fetching catalogs schemas tables columns this can result in a lot of queries which is a problem with high latency connections e g to cloud databases like bigquery it would be better in those products to be able to at least fetch columns for all tables in the input schemata not just per table we re already doing that with higher level objects such as tables we fetch all tables for all input schemata not all tables per schema | 0 |
83,665 | 7,878,721,486 | IssuesEvent | 2018-06-26 11:10:50 | VarunRengarajan/configuration | https://api.github.com/repos/VarunRengarajan/configuration | closed | Chai Pe Charcha - Testing | Testing | Please do the end to end testing of `Chai pe Charcha`. I have released a code with minor changes on thank you page. | 1.0 | Chai Pe Charcha - Testing - Please do the end to end testing of `Chai pe Charcha`. I have released a code with minor changes on thank you page. | non_priority | chai pe charcha testing please do the end to end testing of chai pe charcha i have released a code with minor changes on thank you page | 0 |
145,007 | 19,318,978,762 | IssuesEvent | 2021-12-14 01:46:03 | SelvaMiru/WebGoat | https://api.github.com/repos/SelvaMiru/WebGoat | closed | CVE-2021-44228 (High) detected in log4j-api-2.14.1.jar - autoclosed | security vulnerability | ## CVE-2021-44228 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-api-2.14.1.jar</b></p></summary>
<p>The Apache Log4j API</p>
<p>Library home page: <a href="https://logging.apache.org/log4j/2.x/">https://logging.apache.org/log4j/2.x/</a></p>
<p>Path to dependency file: WebGoat/webgoat-server/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/logging/log4j/log4j-api/2.14.1/log4j-api-2.14.1.jar,/home/wss-scanner/.m2/repository/org/apache/logging/log4j/log4j-api/2.14.1/log4j-api-2.14.1.jar,/home/wss-scanner/.m2/repository/org/apache/logging/log4j/log4j-api/2.14.1/log4j-api-2.14.1.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-validation-2.5.4.jar (Root Library)
- spring-boot-starter-2.5.4.jar
- spring-boot-starter-logging-2.5.4.jar
- log4j-to-slf4j-2.14.1.jar
- :x: **log4j-api-2.14.1.jar** (Vulnerable Library)
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Log4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser.
<p>Publish Date: 2021-11-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44228>CVE-2021-44228</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>10.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-jfh8-c2jp-5v3q">https://github.com/advisories/GHSA-jfh8-c2jp-5v3q</a></p>
<p>Release Date: 2021-12-10</p>
<p>Fix Resolution: org.apache.logging.log4j:log4j-core:2.15.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-44228 (High) detected in log4j-api-2.14.1.jar - autoclosed - ## CVE-2021-44228 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-api-2.14.1.jar</b></p></summary>
<p>The Apache Log4j API</p>
<p>Library home page: <a href="https://logging.apache.org/log4j/2.x/">https://logging.apache.org/log4j/2.x/</a></p>
<p>Path to dependency file: WebGoat/webgoat-server/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/logging/log4j/log4j-api/2.14.1/log4j-api-2.14.1.jar,/home/wss-scanner/.m2/repository/org/apache/logging/log4j/log4j-api/2.14.1/log4j-api-2.14.1.jar,/home/wss-scanner/.m2/repository/org/apache/logging/log4j/log4j-api/2.14.1/log4j-api-2.14.1.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-validation-2.5.4.jar (Root Library)
- spring-boot-starter-2.5.4.jar
- spring-boot-starter-logging-2.5.4.jar
- log4j-to-slf4j-2.14.1.jar
- :x: **log4j-api-2.14.1.jar** (Vulnerable Library)
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Log4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser.
<p>Publish Date: 2021-11-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44228>CVE-2021-44228</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>10.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-jfh8-c2jp-5v3q">https://github.com/advisories/GHSA-jfh8-c2jp-5v3q</a></p>
<p>Release Date: 2021-12-10</p>
<p>Fix Resolution: org.apache.logging.log4j:log4j-core:2.15.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in api jar autoclosed cve high severity vulnerability vulnerable library api jar the apache api library home page a href path to dependency file webgoat webgoat server pom xml path to vulnerable library home wss scanner repository org apache logging api api jar home wss scanner repository org apache logging api api jar home wss scanner repository org apache logging api api jar dependency hierarchy spring boot starter validation jar root library spring boot starter jar spring boot starter logging jar to jar x api jar vulnerable library found in base branch develop vulnerability details versions prior to are subject to a remote code execution vulnerability via the ldap jndi parser publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache logging core step up your open source security game with whitesource | 0 |
272,129 | 23,656,785,814 | IssuesEvent | 2022-08-26 12:03:21 | instadeepai/Mava | https://api.github.com/repos/instadeepai/Mava | closed | [TEST] Executor Integration | test | ### What do you want to test?
Full integration test for executor.
### Outline of test structure
Should use all components typically found in the executor and run without error, but not using launchpad. See the jax IPPO example for how the components are typically logically distributed between core nodes. If multiple tests are required to cover different distinct cases (e.g. value-based vs policy-gradient), then they should be included.
### Definition of done
Test(s) passing and including all typical components.
### Mandatory checklist before making a PR
* [ ] The success criteria laid down in “Definition of done” are met.
* [ ] Test code is documented - docstrings for methods and classes, static types for arguments.
* [ ] Documentation is updated - README, CONTRIBUTING, or other documentation.
| 1.0 | [TEST] Executor Integration - ### What do you want to test?
Full integration test for executor.
### Outline of test structure
Should use all components typically found in the executor and run without error, but not using launchpad. See the jax IPPO example for how the components are typically logically distributed between core nodes. If multiple tests are required to cover different distinct cases (e.g. value-based vs policy-gradient), then they should be included.
### Definition of done
Test(s) passing and including all typical components.
### Mandatory checklist before making a PR
* [ ] The success criteria laid down in “Definition of done” are met.
* [ ] Test code is documented - docstrings for methods and classes, static types for arguments.
* [ ] Documentation is updated - README, CONTRIBUTING, or other documentation.
| non_priority | executor integration what do you want to test full integration test for executor outline of test structure should use all components typically found in the executor and run without error but not using launchpad see the jax ippo example for how the components are typically logically distributed between core nodes if multiple tests are required to cover different distinct cases e g value based vs policy gradient then they should be included definition of done test s passing and including all typical components mandatory checklist before making a pr the success criteria laid down in “definition of done” are met test code is documented docstrings for methods and classes static types for arguments documentation is updated readme contributing or other documentation | 0 |
37,974 | 10,119,676,110 | IssuesEvent | 2019-07-31 12:05:54 | xamarin/xamarin-android | https://api.github.com/repos/xamarin/xamarin-android | opened | "The "LinkAssemblies" task failed ... at Mono.Linker.Steps.MarkStep.ProcessMarkedTypesWithInterfaces()" prevents successfully linking custom libraries that use certain patterns of generic types in combination with the Realm IL weaver | Area: App+Library Build regression | ### Steps to reproduce
Attempt to build the attached test case in the Release configuration:
```
msbuild -restore -p:Configuration=Release
```
Test case: [InterfacesRealmWeaver.zip](https://github.com/xamarin/xamarin-android/files/3451703/InterfacesRealmWeaver.zip)
(This test case uses the Fody IL manipulation library via Realm. Hitting the issue requires a fairly particular usage of generic types in combination with the Realm weaver. The issue was originally found by the developers of a full app: <https://github.com/toggl/mobileapp>)
### Expected behavior
With Xamarin.Android 9.3, the build completes successfully.
### Actual behavior
The `LinkAssemblies` step fails:
```
(_LinkAssembliesShrink target) ->
error MSB4018: The "LinkAssemblies" task failed unexpectedly.
error MSB4018: System.InvalidOperationException: Collection was modified; enumeration operation may not execute.
error MSB4018: at System.ThrowHelper.ThrowInvalidOperationException(ExceptionResource resource)
error MSB4018: at System.Collections.Generic.List`1.Enumerator.MoveNextRare()
error MSB4018: at System.Collections.Generic.List`1.Enumerator.MoveNext()
error MSB4018: at Mono.Linker.Steps.MarkStep.ProcessMarkedTypesWithInterfaces()
error MSB4018: at Mono.Linker.Steps.MarkStep.ProcessPrimaryQueue()
error MSB4018: at Mono.Linker.Steps.MarkStep.Process()
error MSB4018: at MonoDroid.Tuner.MonoDroidMarkStep.Process(LinkContext context)
error MSB4018: at Mono.Linker.Pipeline.ProcessStep(LinkContext context, IStep step)
error MSB4018: at Mono.Linker.Pipeline.Process(LinkContext context)
error MSB4018: at MonoDroid.Tuner.Linker.Process(LinkerOptions options, ILogger logger, LinkContext& context)
error MSB4018: at Xamarin.Android.Tasks.LinkAssemblies.Execute(DirectoryAssemblyResolver res)
error MSB4018: at Xamarin.Android.Tasks.LinkAssemblies.Execute()
error MSB4018: at Microsoft.Build.BackEnd.TaskExecutionHost.Microsoft.Build.BackEnd.ITaskExecutionHost.Execute()
error MSB4018: at Microsoft.Build.BackEnd.TaskBuilder.<ExecuteInstantiatedTask>d__26.MoveNext()
```
### Partial workaround
Add **ClassLibrary1** to the **Skip linking assemblies** field in the **Android Options** sections of the Visual Studio project property pages for the Android app project. This would allow an existing application to continue linking most of the user assemblies while skipping specific problematic assemblies that by chance hit this combination of factors involving generic types with the Realm weaver.
### Version information
**Expected** behavior:
Xamarin.Android SDK 9.3.0.23 (d16-1/ebd7bda)
**Actual** behavior:
Xamarin.Android SDK 9.4.0.51 (d16-2/9fa7775)
Xamarin.Android SDK 9.5.0.27 (d16-3/16c4494) | 1.0 | "The "LinkAssemblies" task failed ... at Mono.Linker.Steps.MarkStep.ProcessMarkedTypesWithInterfaces()" prevents successfully linking custom libraries that use certain patterns of generic types in combination with the Realm IL weaver - ### Steps to reproduce
Attempt to build the attached test case in the Release configuration:
```
msbuild -restore -p:Configuration=Release
```
Test case: [InterfacesRealmWeaver.zip](https://github.com/xamarin/xamarin-android/files/3451703/InterfacesRealmWeaver.zip)
(This test case uses the Fody IL manipulation library via Realm. Hitting the issue requires a fairly particular usage of generic types in combination with the Realm weaver. The issue was originally found by the developers of a full app: <https://github.com/toggl/mobileapp>)
### Expected behavior
With Xamarin.Android 9.3, the build completes successfully.
### Actual behavior
The `LinkAssemblies` step fails:
```
(_LinkAssembliesShrink target) ->
error MSB4018: The "LinkAssemblies" task failed unexpectedly.
error MSB4018: System.InvalidOperationException: Collection was modified; enumeration operation may not execute.
error MSB4018: at System.ThrowHelper.ThrowInvalidOperationException(ExceptionResource resource)
error MSB4018: at System.Collections.Generic.List`1.Enumerator.MoveNextRare()
error MSB4018: at System.Collections.Generic.List`1.Enumerator.MoveNext()
error MSB4018: at Mono.Linker.Steps.MarkStep.ProcessMarkedTypesWithInterfaces()
error MSB4018: at Mono.Linker.Steps.MarkStep.ProcessPrimaryQueue()
error MSB4018: at Mono.Linker.Steps.MarkStep.Process()
error MSB4018: at MonoDroid.Tuner.MonoDroidMarkStep.Process(LinkContext context)
error MSB4018: at Mono.Linker.Pipeline.ProcessStep(LinkContext context, IStep step)
error MSB4018: at Mono.Linker.Pipeline.Process(LinkContext context)
error MSB4018: at MonoDroid.Tuner.Linker.Process(LinkerOptions options, ILogger logger, LinkContext& context)
error MSB4018: at Xamarin.Android.Tasks.LinkAssemblies.Execute(DirectoryAssemblyResolver res)
error MSB4018: at Xamarin.Android.Tasks.LinkAssemblies.Execute()
error MSB4018: at Microsoft.Build.BackEnd.TaskExecutionHost.Microsoft.Build.BackEnd.ITaskExecutionHost.Execute()
error MSB4018: at Microsoft.Build.BackEnd.TaskBuilder.<ExecuteInstantiatedTask>d__26.MoveNext()
```
### Partial workaround
Add **ClassLibrary1** to the **Skip linking assemblies** field in the **Android Options** sections of the Visual Studio project property pages for the Android app project. This would allow an existing application to continue linking most of the user assemblies while skipping specific problematic assemblies that by chance hit this combination of factors involving generic types with the Realm weaver.
### Version information
**Expected** behavior:
Xamarin.Android SDK 9.3.0.23 (d16-1/ebd7bda)
**Actual** behavior:
Xamarin.Android SDK 9.4.0.51 (d16-2/9fa7775)
Xamarin.Android SDK 9.5.0.27 (d16-3/16c4494) | non_priority | the linkassemblies task failed at mono linker steps markstep processmarkedtypeswithinterfaces prevents successfully linking custom libraries that use certain patterns of generic types in combination with the realm il weaver steps to reproduce attempt to build the attached test case in the release configuration msbuild restore p configuration release test case this test case uses the fody il manipulation library via realm hitting the issue requires a fairly particular usage of generic types in combination with the realm weaver the issue was originally found by the developers of a full app expected behavior with xamarin android the build completes successfully actual behavior the linkassemblies step fails linkassembliesshrink target error the linkassemblies task failed unexpectedly error system invalidoperationexception collection was modified enumeration operation may not execute error at system throwhelper throwinvalidoperationexception exceptionresource resource error at system collections generic list enumerator movenextrare error at system collections generic list enumerator movenext error at mono linker steps markstep processmarkedtypeswithinterfaces error at mono linker steps markstep processprimaryqueue error at mono linker steps markstep process error at monodroid tuner monodroidmarkstep process linkcontext context error at mono linker pipeline processstep linkcontext context istep step error at mono linker pipeline process linkcontext context error at monodroid tuner linker process linkeroptions options ilogger logger linkcontext context error at xamarin android tasks linkassemblies execute directoryassemblyresolver res error at xamarin android tasks linkassemblies execute error at microsoft build backend taskexecutionhost microsoft build backend itaskexecutionhost execute error at microsoft build backend taskbuilder d movenext partial workaround add to the skip linking assemblies field in the android options sections of the visual studio project property pages for the android app project this would allow an existing application to continue linking most of the user assemblies while skipping specific problematic assemblies that by chance hit this combination of factors involving generic types with the realm weaver version information expected behavior xamarin android sdk actual behavior xamarin android sdk xamarin android sdk | 0 |
71,264 | 13,636,255,028 | IssuesEvent | 2020-09-25 05:21:11 | akshitagit/CPP | https://api.github.com/repos/akshitagit/CPP | reopened | Can you solve this pattern?? | Dailycode hacktoberfest moderate |
Take N as input. For a value of N=5, we wish to draw the following pattern :
5 4 3 2 1 0 1 2 3 4 5
4 3 2 1 0 1 2 3 4
3 2 1 0 1 2 3
2 1 0 1 2
1 0 1
0
1 0 1
2 1 0 1 2
3 2 1 0 1 2 3
4 3 2 1 0 1 2 3 4
5 4 3 2 1 0 1 2 3 4 5
Input Format
Take N as input.
Constraints
N <= 20
Output Format
Pattern should be printed with a space between every two values.
Sample Input
5
| 1.0 | Can you solve this pattern?? -
Take N as input. For a value of N=5, we wish to draw the following pattern :
5 4 3 2 1 0 1 2 3 4 5
4 3 2 1 0 1 2 3 4
3 2 1 0 1 2 3
2 1 0 1 2
1 0 1
0
1 0 1
2 1 0 1 2
3 2 1 0 1 2 3
4 3 2 1 0 1 2 3 4
5 4 3 2 1 0 1 2 3 4 5
Input Format
Take N as input.
Constraints
N <= 20
Output Format
Pattern should be printed with a space between every two values.
Sample Input
5
| non_priority | can you solve this pattern take n as input for a value of n we wish to draw the following pattern input format take n as input constraints n output format pattern should be printed with a space between every two values sample input | 0 |
26,559 | 20,251,549,622 | IssuesEvent | 2022-02-14 18:23:53 | QubesOS/qubes-issues | https://api.github.com/repos/QubesOS/qubes-issues | opened | qubes-issues bot for warning and closing stale issues | T: enhancement P: default C: infrastructure | [How to file a helpful issue](https://www.qubes-os.org/doc/issue-tracking/)
### The problem you're addressing (if any)
When a Qubes release reaches EOL, there are typically many issues on that release's milestone still open.
- Leaving the issues open on that milestone doesn't make sense. EOL releases no longer receive support, so it's unclear what it means to haven issue open on such a release's milestone.
- Closing all of the issues is wrong, since many of them probably still merit action.
- Reassigning all the issues to a supported release milestone is wrong, because it's unlikely that all of the issues affect newer releases.
- Going through every issue to figure out whether it affects newer releases isn't feasible.
- We can't do it ourselves, because it often requires more info from the issue reporter.
- Issue reporters often fail to respond.
- Even if it were within our power to figure it all out ourselves, we wouldn't have time to investigate every single issue unless we halted all other project activities (and probably not even then).
### The solution you'd like
Create a bot that does the following each day:
1. Check all open issues on closed milestones. (When a release reaches EOL, we close its milestone.)
2. If there has been no activity in at least one year, automatically post a comment explaining the situation and warning that the issue will be closed if there is no activity in one month.
3. If such a warning was posted at least a month ago, close the issue.
Feel free to replace the values "one year" and "one month" with better ones.
### The value to a user, and who that user might be
Everyone who uses the issue tracker would benefit from there being fewer stale issues to sort through.
In the past, I've tried closing very old issues on EOL milestones with a message explaining the situation and saying that we'd be happy to reopen the issue if anyone is still affected. This freaked a lot of people out. It seems that many people view closing an issue as some kind of permanent action, when in reality it's more like a label that can easily be changed with the press of a single button. Indeed, closed issues are just as searchable as open issues. Nonetheless, we might as well acknowledge that there's some kind of widespread psychological quirk about "closing" issues. The proposed bot solution avoids this problem by warning well in advanced that the issue will be closed. This allows anyone who wishes to keep the issue open to add a comment (or perform any other action on the issue). With the values proposed above, even someone who only checks GitHub _once a year_ would never be caught by surprise.
-----
CC: @marmarek, @fepitre | 1.0 | qubes-issues bot for warning and closing stale issues - [How to file a helpful issue](https://www.qubes-os.org/doc/issue-tracking/)
### The problem you're addressing (if any)
When a Qubes release reaches EOL, there are typically many issues on that release's milestone still open.
- Leaving the issues open on that milestone doesn't make sense. EOL releases no longer receive support, so it's unclear what it means to haven issue open on such a release's milestone.
- Closing all of the issues is wrong, since many of them probably still merit action.
- Reassigning all the issues to a supported release milestone is wrong, because it's unlikely that all of the issues affect newer releases.
- Going through every issue to figure out whether it affects newer releases isn't feasible.
- We can't do it ourselves, because it often requires more info from the issue reporter.
- Issue reporters often fail to respond.
- Even if it were within our power to figure it all out ourselves, we wouldn't have time to investigate every single issue unless we halted all other project activities (and probably not even then).
### The solution you'd like
Create a bot that does the following each day:
1. Check all open issues on closed milestones. (When a release reaches EOL, we close its milestone.)
2. If there has been no activity in at least one year, automatically post a comment explaining the situation and warning that the issue will be closed if there is no activity in one month.
3. If such a warning was posted at least a month ago, close the issue.
Feel free to replace the values "one year" and "one month" with better ones.
### The value to a user, and who that user might be
Everyone who uses the issue tracker would benefit from there being fewer stale issues to sort through.
In the past, I've tried closing very old issues on EOL milestones with a message explaining the situation and saying that we'd be happy to reopen the issue if anyone is still affected. This freaked a lot of people out. It seems that many people view closing an issue as some kind of permanent action, when in reality it's more like a label that can easily be changed with the press of a single button. Indeed, closed issues are just as searchable as open issues. Nonetheless, we might as well acknowledge that there's some kind of widespread psychological quirk about "closing" issues. The proposed bot solution avoids this problem by warning well in advanced that the issue will be closed. This allows anyone who wishes to keep the issue open to add a comment (or perform any other action on the issue). With the values proposed above, even someone who only checks GitHub _once a year_ would never be caught by surprise.
-----
CC: @marmarek, @fepitre | non_priority | qubes issues bot for warning and closing stale issues the problem you re addressing if any when a qubes release reaches eol there are typically many issues on that release s milestone still open leaving the issues open on that milestone doesn t make sense eol releases no longer receive support so it s unclear what it means to haven issue open on such a release s milestone closing all of the issues is wrong since many of them probably still merit action reassigning all the issues to a supported release milestone is wrong because it s unlikely that all of the issues affect newer releases going through every issue to figure out whether it affects newer releases isn t feasible we can t do it ourselves because it often requires more info from the issue reporter issue reporters often fail to respond even if it were within our power to figure it all out ourselves we wouldn t have time to investigate every single issue unless we halted all other project activities and probably not even then the solution you d like create a bot that does the following each day check all open issues on closed milestones when a release reaches eol we close its milestone if there has been no activity in at least one year automatically post a comment explaining the situation and warning that the issue will be closed if there is no activity in one month if such a warning was posted at least a month ago close the issue feel free to replace the values one year and one month with better ones the value to a user and who that user might be everyone who uses the issue tracker would benefit from there being fewer stale issues to sort through in the past i ve tried closing very old issues on eol milestones with a message explaining the situation and saying that we d be happy to reopen the issue if anyone is still affected this freaked a lot of people out it seems that many people view closing an issue as some kind of permanent action when in reality it s more like a label that can easily be changed with the press of a single button indeed closed issues are just as searchable as open issues nonetheless we might as well acknowledge that there s some kind of widespread psychological quirk about closing issues the proposed bot solution avoids this problem by warning well in advanced that the issue will be closed this allows anyone who wishes to keep the issue open to add a comment or perform any other action on the issue with the values proposed above even someone who only checks github once a year would never be caught by surprise cc marmarek fepitre | 0 |
121,918 | 12,137,216,576 | IssuesEvent | 2020-04-23 15:25:26 | blockstack/docs.blockstack | https://api.github.com/repos/blockstack/docs.blockstack | opened | Add richer introduction with screenshots to Connect overview | documentation | https://docs.blockstack.org/develop/connect/overview.html
Explain and preview the design advantages for developers and users alike. | 1.0 | Add richer introduction with screenshots to Connect overview - https://docs.blockstack.org/develop/connect/overview.html
Explain and preview the design advantages for developers and users alike. | non_priority | add richer introduction with screenshots to connect overview explain and preview the design advantages for developers and users alike | 0 |
123,802 | 10,291,644,529 | IssuesEvent | 2019-08-27 12:56:54 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | closed | teamcity: failed test: _size_out_of_range_direct=false | C-test-failure O-robot | The following tests appear to have failed on master (testrace): _size_out_of_range_direct=false
You may want to check [for open issues](https://github.com/cockroachdb/cockroach/issues?q=is%3Aissue+is%3Aopen+_size_out_of_range_direct=false).
[#1451983](https://teamcity.cockroachdb.com/viewLog.html?buildId=1451983):
```
_size_out_of_range_direct=false
--- FAIL: testrace/TestImportData/PGDUMP:_size_out_of_range_direct=false (0.000s)
Test ended in panic.
------- Stdout: -------
I190823 22:18:23.891262 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "create_database", target: 120, info: {DatabaseName:d34 Statement:CREATE DATABASE d34 User:root}
I190823 22:18:24.123243 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "drop_database", target: 120, info: {DatabaseName:d34 Statement:DROP DATABASE d34 User:root DroppedSchemaObjects:[]}
_size_out_of_range_direct=false
--- FAIL: testrace/TestImportData/PGCOPY:_size_out_of_range_direct=false (0.000s)
Test ended in panic.
------- Stdout: -------
I190823 22:18:16.860213 187 storage/store.go:2593 [n1,s1,r59/1:/Table/86{-/1}] removing replica r57/1
I190823 22:18:16.887111 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "create_database", target: 107, info: {DatabaseName:d27 Statement:CREATE DATABASE d27 User:root}
I190823 22:18:17.032604 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "drop_database", target: 107, info: {DatabaseName:d27 Statement:DROP DATABASE d27 User:root DroppedSchemaObjects:[]}
```
Please assign, take a look and update the issue accordingly.
| 1.0 | teamcity: failed test: _size_out_of_range_direct=false - The following tests appear to have failed on master (testrace): _size_out_of_range_direct=false
You may want to check [for open issues](https://github.com/cockroachdb/cockroach/issues?q=is%3Aissue+is%3Aopen+_size_out_of_range_direct=false).
[#1451983](https://teamcity.cockroachdb.com/viewLog.html?buildId=1451983):
```
_size_out_of_range_direct=false
--- FAIL: testrace/TestImportData/PGDUMP:_size_out_of_range_direct=false (0.000s)
Test ended in panic.
------- Stdout: -------
I190823 22:18:23.891262 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "create_database", target: 120, info: {DatabaseName:d34 Statement:CREATE DATABASE d34 User:root}
I190823 22:18:24.123243 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "drop_database", target: 120, info: {DatabaseName:d34 Statement:DROP DATABASE d34 User:root DroppedSchemaObjects:[]}
_size_out_of_range_direct=false
--- FAIL: testrace/TestImportData/PGCOPY:_size_out_of_range_direct=false (0.000s)
Test ended in panic.
------- Stdout: -------
I190823 22:18:16.860213 187 storage/store.go:2593 [n1,s1,r59/1:/Table/86{-/1}] removing replica r57/1
I190823 22:18:16.887111 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "create_database", target: 107, info: {DatabaseName:d27 Statement:CREATE DATABASE d27 User:root}
I190823 22:18:17.032604 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "drop_database", target: 107, info: {DatabaseName:d27 Statement:DROP DATABASE d27 User:root DroppedSchemaObjects:[]}
```
Please assign, take a look and update the issue accordingly.
| non_priority | teamcity failed test size out of range direct false the following tests appear to have failed on master testrace size out of range direct false you may want to check size out of range direct false fail testrace testimportdata pgdump size out of range direct false test ended in panic stdout sql event log go event create database target info databasename statement create database user root sql event log go event drop database target info databasename statement drop database user root droppedschemaobjects size out of range direct false fail testrace testimportdata pgcopy size out of range direct false test ended in panic stdout storage store go removing replica sql event log go event create database target info databasename statement create database user root sql event log go event drop database target info databasename statement drop database user root droppedschemaobjects please assign take a look and update the issue accordingly | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.