Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
120,977
12,102,077,084
IssuesEvent
2020-04-20 16:07:54
shubham-thakare/BMC-Creator
https://api.github.com/repos/shubham-thakare/BMC-Creator
closed
Add app summary in the README.md file.
documentation
Add some information about the BMC Creator application so that can help users to understand the use of an app.
1.0
Add app summary in the README.md file. - Add some information about the BMC Creator application so that can help users to understand the use of an app.
non_priority
add app summary in the readme md file add some information about the bmc creator application so that can help users to understand the use of an app
0
120,070
12,058,568,047
IssuesEvent
2020-04-15 17:41:35
layer5io/scoop-bucket
https://api.github.com/repos/layer5io/scoop-bucket
closed
Update documentation on how to install
documentation good first issue
Update documentation on how to install in ReadME.md for the Scoop installation of mesheryctl.
1.0
Update documentation on how to install - Update documentation on how to install in ReadME.md for the Scoop installation of mesheryctl.
non_priority
update documentation on how to install update documentation on how to install in readme md for the scoop installation of mesheryctl
0
50,613
6,415,381,378
IssuesEvent
2017-08-08 12:40:37
nextcloud/server
https://api.github.com/repos/nextcloud/server
closed
login spinner looks ugly
1. to develop design enhancement papercut
You only see it for a few seconds but it always disturbs me, look at the screenshot: ![login](https://cloud.githubusercontent.com/assets/1589737/25340234/60500ca4-2905-11e7-8070-4ff5631224a5.png) You can almost see every individual pixel of the circle, by contrast the logout spinner looks much smoother: ![logout](https://cloud.githubusercontent.com/assets/1589737/25340286/8868c690-2905-11e7-9d6d-78e67bd5f7c9.png) @nextcloud/designers anything we can do about it?
1.0
login spinner looks ugly - You only see it for a few seconds but it always disturbs me, look at the screenshot: ![login](https://cloud.githubusercontent.com/assets/1589737/25340234/60500ca4-2905-11e7-8070-4ff5631224a5.png) You can almost see every individual pixel of the circle, by contrast the logout spinner looks much smoother: ![logout](https://cloud.githubusercontent.com/assets/1589737/25340286/8868c690-2905-11e7-9d6d-78e67bd5f7c9.png) @nextcloud/designers anything we can do about it?
non_priority
login spinner looks ugly you only see it for a few seconds but it always disturbs me look at the screenshot you can almost see every individual pixel of the circle by contrast the logout spinner looks much smoother nextcloud designers anything we can do about it
0
306,605
26,483,837,622
IssuesEvent
2023-01-17 16:28:59
kyma-project/kyma
https://api.github.com/repos/kyma-project/kyma
closed
Refactor EventMesh reconciler integration tests
area/eventing area/tests
In this [ticket](https://github.com/kyma-project/kyma/issues/15925), we migrated some of the EventMesh reconciler integration tests to use table-test structure. We should now migrate all the remaining EventMesh reconciler integration tests to this new format. Reason is that the existing tests are not isolated and they are dependent on each other sequentially. **Tasks:** - [ ] Migrate the EventMesh [reconciler integration tests](https://github.com/kyma-project/kyma/blob/main/components/eventing-controller/controllers/subscriptionv2/eventmesh/reconciler_integration_test.go) to new [table-tests structure](https://github.com/kyma-project/kyma/blob/main/components/eventing-controller/controllers/subscriptionv2/eventmesh/test/reconciler_integration_test.go). - [ ] The tests should be isolated. - [ ] The tests should be able to run parallel (`t.Parallel()`)
1.0
Refactor EventMesh reconciler integration tests - In this [ticket](https://github.com/kyma-project/kyma/issues/15925), we migrated some of the EventMesh reconciler integration tests to use table-test structure. We should now migrate all the remaining EventMesh reconciler integration tests to this new format. Reason is that the existing tests are not isolated and they are dependent on each other sequentially. **Tasks:** - [ ] Migrate the EventMesh [reconciler integration tests](https://github.com/kyma-project/kyma/blob/main/components/eventing-controller/controllers/subscriptionv2/eventmesh/reconciler_integration_test.go) to new [table-tests structure](https://github.com/kyma-project/kyma/blob/main/components/eventing-controller/controllers/subscriptionv2/eventmesh/test/reconciler_integration_test.go). - [ ] The tests should be isolated. - [ ] The tests should be able to run parallel (`t.Parallel()`)
non_priority
refactor eventmesh reconciler integration tests in this we migrated some of the eventmesh reconciler integration tests to use table test structure we should now migrate all the remaining eventmesh reconciler integration tests to this new format reason is that the existing tests are not isolated and they are dependent on each other sequentially tasks migrate the eventmesh to new the tests should be isolated the tests should be able to run parallel t parallel
0
150,410
19,603,706,576
IssuesEvent
2022-01-06 06:16:45
snykiotcubedev/redis-6.2.3
https://api.github.com/repos/snykiotcubedev/redis-6.2.3
opened
CVE-2021-32762 (High) detected in redis6.2.6
security vulnerability
## CVE-2021-32762 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>redis6.2.6</b></p></summary> <p> <p>Redis is an in-memory database that persists on disk. The data model is key-value, but many different kind of values are supported: Strings, Lists, Sets, Sorted Sets, Hashes, Streams, HyperLogLogs, Bitmaps.</p> <p>Library home page: <a href=https://github.com/redis/redis.git>https://github.com/redis/redis.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/snykiotcubedev/redis-6.2.3/commit/4d9d45af08df0c37729fafce88f139952f155020">4d9d45af08df0c37729fafce88f139952f155020</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/deps/hiredis/hiredis.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies. This is a result of a vulnerability in the underlying hiredis library which does not perform an overflow check before calling the calloc() heap allocation function. This issue only impacts systems with heap allocators that do not perform their own overflow checks. Most modern systems do and are therefore not likely to be affected. Furthermore, by default redis-sentinel uses the jemalloc allocator which is also not vulnerable. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. <p>Publish Date: 2021-10-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32762>CVE-2021-32762</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/redis/redis/security/advisories/GHSA-833w-8v3m-8wwr">https://github.com/redis/redis/security/advisories/GHSA-833w-8v3m-8wwr</a></p> <p>Release Date: 2021-10-04</p> <p>Fix Resolution: 5.0.14, 6.0.16, 6.2.6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-32762 (High) detected in redis6.2.6 - ## CVE-2021-32762 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>redis6.2.6</b></p></summary> <p> <p>Redis is an in-memory database that persists on disk. The data model is key-value, but many different kind of values are supported: Strings, Lists, Sets, Sorted Sets, Hashes, Streams, HyperLogLogs, Bitmaps.</p> <p>Library home page: <a href=https://github.com/redis/redis.git>https://github.com/redis/redis.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/snykiotcubedev/redis-6.2.3/commit/4d9d45af08df0c37729fafce88f139952f155020">4d9d45af08df0c37729fafce88f139952f155020</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/deps/hiredis/hiredis.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies. This is a result of a vulnerability in the underlying hiredis library which does not perform an overflow check before calling the calloc() heap allocation function. This issue only impacts systems with heap allocators that do not perform their own overflow checks. Most modern systems do and are therefore not likely to be affected. Furthermore, by default redis-sentinel uses the jemalloc allocator which is also not vulnerable. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. <p>Publish Date: 2021-10-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32762>CVE-2021-32762</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/redis/redis/security/advisories/GHSA-833w-8v3m-8wwr">https://github.com/redis/redis/security/advisories/GHSA-833w-8v3m-8wwr</a></p> <p>Release Date: 2021-10-04</p> <p>Fix Resolution: 5.0.14, 6.0.16, 6.2.6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in cve high severity vulnerability vulnerable library redis is an in memory database that persists on disk the data model is key value but many different kind of values are supported strings lists sets sorted sets hashes streams hyperloglogs bitmaps library home page a href found in head commit a href found in base branch main vulnerable source files deps hiredis hiredis c vulnerability details redis is an open source in memory database that persists on disk the redis cli command line tool and redis sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi bulk network replies this is a result of a vulnerability in the underlying hiredis library which does not perform an overflow check before calling the calloc heap allocation function this issue only impacts systems with heap allocators that do not perform their own overflow checks most modern systems do and are therefore not likely to be affected furthermore by default redis sentinel uses the jemalloc allocator which is also not vulnerable the problem is fixed in redis versions and publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
23,620
4,959,394,107
IssuesEvent
2016-12-02 13:16:58
zsh-users/antigen
https://api.github.com/repos/zsh-users/antigen
closed
Add `antigen init` to README.md and wiki's `Cookbook` section
Documentation Enhancement
Document how `antigen init` works and it's usage. See [this changelog entry](https://github.com/zsh-users/antigen/blob/develop/CHANGELOG.md#110---2016-09-10). - [x] Update wiki: https://github.com/zsh-users/antigen/wiki/Cookbook#init-command - [x] Update README.md
1.0
Add `antigen init` to README.md and wiki's `Cookbook` section - Document how `antigen init` works and it's usage. See [this changelog entry](https://github.com/zsh-users/antigen/blob/develop/CHANGELOG.md#110---2016-09-10). - [x] Update wiki: https://github.com/zsh-users/antigen/wiki/Cookbook#init-command - [x] Update README.md
non_priority
add antigen init to readme md and wiki s cookbook section document how antigen init works and it s usage see update wiki update readme md
0
55,088
13,963,845,614
IssuesEvent
2020-10-25 15:46:38
fernandogjose/EcoAprender.Site
https://api.github.com/repos/fernandogjose/EcoAprender.Site
opened
CVE-2019-8331 (Medium) detected in bootstrap-3.3.7.min.js
security vulnerability
## CVE-2019-8331 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.3.7.min.js</b></p></summary> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js</a></p> <p>Path to vulnerable library: EcoAprender.Site/src/WebApplication/Scripts/core/bootstrap.min.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.3.7.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/fernandogjose/EcoAprender.Site/commit/e08547b67e8d98c26c1972efdd2a619dc4da690c">e08547b67e8d98c26c1972efdd2a619dc4da690c</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute. <p>Publish Date: 2019-02-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-8331>CVE-2019-8331</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/pull/28236">https://github.com/twbs/bootstrap/pull/28236</a></p> <p>Release Date: 2019-02-20</p> <p>Fix Resolution: bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-8331 (Medium) detected in bootstrap-3.3.7.min.js - ## CVE-2019-8331 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.3.7.min.js</b></p></summary> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js</a></p> <p>Path to vulnerable library: EcoAprender.Site/src/WebApplication/Scripts/core/bootstrap.min.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.3.7.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/fernandogjose/EcoAprender.Site/commit/e08547b67e8d98c26c1972efdd2a619dc4da690c">e08547b67e8d98c26c1972efdd2a619dc4da690c</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute. <p>Publish Date: 2019-02-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-8331>CVE-2019-8331</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/pull/28236">https://github.com/twbs/bootstrap/pull/28236</a></p> <p>Release Date: 2019-02-20</p> <p>Fix Resolution: bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in bootstrap min js cve medium severity vulnerability vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library ecoaprender site src webapplication scripts core bootstrap min js dependency hierarchy x bootstrap min js vulnerable library found in head commit a href found in base branch main vulnerability details in bootstrap before and x before xss is possible in the tooltip or popover data template attribute publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bootstrap bootstrap sass step up your open source security game with whitesource
0
184,857
21,785,016,635
IssuesEvent
2022-05-14 02:10:19
nihalmurmu/automata
https://api.github.com/repos/nihalmurmu/automata
closed
WS-2020-0070 (High) detected in lodash-4.17.15.tgz - autoclosed
security vulnerability
## WS-2020-0070 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.15.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/automata/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/automata/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - eslint-5.16.0.tgz (Root Library) - :x: **lodash-4.17.15.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/nihalmurmu/automata/commit/d287137dec49930597b48a147ee39781c3da3e66">d287137dec49930597b48a147ee39781c3da3e66</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> a prototype pollution vulnerability in lodash. It allows an attacker to inject properties on Object.prototype <p>Publish Date: 2020-04-28 <p>URL: <a href=https://hackerone.com/reports/712065>WS-2020-0070</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2020-0070 (High) detected in lodash-4.17.15.tgz - autoclosed - ## WS-2020-0070 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.15.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/automata/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/automata/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - eslint-5.16.0.tgz (Root Library) - :x: **lodash-4.17.15.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/nihalmurmu/automata/commit/d287137dec49930597b48a147ee39781c3da3e66">d287137dec49930597b48a147ee39781c3da3e66</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> a prototype pollution vulnerability in lodash. It allows an attacker to inject properties on Object.prototype <p>Publish Date: 2020-04-28 <p>URL: <a href=https://hackerone.com/reports/712065>WS-2020-0070</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws high detected in lodash tgz autoclosed ws high severity vulnerability vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file tmp ws scm automata package json path to vulnerable library tmp ws scm automata node modules lodash package json dependency hierarchy eslint tgz root library x lodash tgz vulnerable library found in head commit a href vulnerability details a prototype pollution vulnerability in lodash it allows an attacker to inject properties on object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource
0
157,210
19,956,962,787
IssuesEvent
2022-01-28 01:09:11
mverteuil/mig3
https://api.github.com/repos/mverteuil/mig3
opened
WS-2022-0008 (Medium) detected in node-forge-0.9.0.tgz
security vulnerability
## WS-2022-0008 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.9.0.tgz</b></p></summary> <p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz</a></p> <p>Path to dependency file: /mig3-ui/package.json</p> <p>Path to vulnerable library: /mig3-ui/node_modules/node-forge/package.json</p> <p> Dependency Hierarchy: - cli-service-3.12.1.tgz (Root Library) - webpack-dev-server-3.10.3.tgz - selfsigned-1.10.7.tgz - :x: **node-forge-0.9.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The forge.debug API had a potential prototype pollution issue if called with untrusted input. The API was only used for internal debug purposes in a safe way and never documented or advertised. It is suspected that uses of this API, if any exist, would likely not have used untrusted inputs in a vulnerable way. <p>Publish Date: 2022-01-08 <p>URL: <a href=https://github.com/digitalbazaar/forge/commit/51228083550dde97701ac8e06c629a5184117562>WS-2022-0008</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-5rrq-pxf6-6jx5">https://github.com/advisories/GHSA-5rrq-pxf6-6jx5</a></p> <p>Release Date: 2022-01-08</p> <p>Fix Resolution: node-forge - 1.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2022-0008 (Medium) detected in node-forge-0.9.0.tgz - ## WS-2022-0008 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.9.0.tgz</b></p></summary> <p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz</a></p> <p>Path to dependency file: /mig3-ui/package.json</p> <p>Path to vulnerable library: /mig3-ui/node_modules/node-forge/package.json</p> <p> Dependency Hierarchy: - cli-service-3.12.1.tgz (Root Library) - webpack-dev-server-3.10.3.tgz - selfsigned-1.10.7.tgz - :x: **node-forge-0.9.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The forge.debug API had a potential prototype pollution issue if called with untrusted input. The API was only used for internal debug purposes in a safe way and never documented or advertised. It is suspected that uses of this API, if any exist, would likely not have used untrusted inputs in a vulnerable way. <p>Publish Date: 2022-01-08 <p>URL: <a href=https://github.com/digitalbazaar/forge/commit/51228083550dde97701ac8e06c629a5184117562>WS-2022-0008</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-5rrq-pxf6-6jx5">https://github.com/advisories/GHSA-5rrq-pxf6-6jx5</a></p> <p>Release Date: 2022-01-08</p> <p>Fix Resolution: node-forge - 1.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws medium detected in node forge tgz ws medium severity vulnerability vulnerable library node forge tgz javascript implementations of network transports cryptography ciphers pki message digests and various utilities library home page a href path to dependency file ui package json path to vulnerable library ui node modules node forge package json dependency hierarchy cli service tgz root library webpack dev server tgz selfsigned tgz x node forge tgz vulnerable library vulnerability details the forge debug api had a potential prototype pollution issue if called with untrusted input the api was only used for internal debug purposes in a safe way and never documented or advertised it is suspected that uses of this api if any exist would likely not have used untrusted inputs in a vulnerable way publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution node forge step up your open source security game with whitesource
0
212,230
16,434,490,704
IssuesEvent
2021-05-20 07:41:47
hzi-braunschweig/SORMAS-Project
https://api.github.com/repos/hzi-braunschweig/SORMAS-Project
closed
Create a new Task Automation flow
e2e-tests task tasks testing
### Feature Description We will cover the UI automation of the Create Task functionality.
2.0
Create a new Task Automation flow - ### Feature Description We will cover the UI automation of the Create Task functionality.
non_priority
create a new task automation flow feature description we will cover the ui automation of the create task functionality
0
116,253
17,359,033,024
IssuesEvent
2021-07-29 17:51:23
github/roadmap
https://api.github.com/repos/github/roadmap
closed
CodeQL package manager (public beta)
beta cloud github advanced security packages security & compliance shipped
<!-- Remember to... 1. Assign the issue to the appropriate product manager (probably yourself) 2. Apply a label for: release phase, feature area, product SKU, and deployment model, per the README 3. Apply the *public roadmap* label when ready for review to be published to the public repository or the *internal roadmap* label to keep this internal 4. Add to the current year's project board, in the column for when it will ship next 5. Establish links with other internal issues either in the other issue or in the comments (to keep the description customer-friendly) 6. Head over to github/customer-feedback to comment about this roadmap issue on any relevant feedback issues --> #### Summary <!--(What is it?)--> CodeQL is designed to query codebases for vulnerabilities. The queries to detect security problems are all [open source, and available in our GitHub repository](https://github.com/github/codeql). To further enable the security community to share their security knowledge, we've created the CodeQL packaging ecosystem. This enables security experts to create, share, depend on, and run CodeQL queries and libraries (much like `npm` for the JS/TS ecosystem). CodeQL packs will be available in the GitHub Package Registry (GHPR), and can easily be integrated into GitHub Code Scanning. #### Intended Outcome <!--(Why are we building it?)--> CodeQL query and library authors can upload their packs to the GitHub Package Registry using the CodeQL CLI. Users of Code Scanning can integrate CodeQL packs into their CodeQL Action workflow. Users of the CodeQL CLI can fetch and run query packs, as well as express dependencies on CodeQL library packs. #### How will it work? <!--(Short description of workflow/functionality)--> Under the hood, CodeQL packs are using GHPR's container registry: CodeQL packs are Docker containers in disguise. Users can enable CodeQL packs through Code Scanning, and further interact with packs through the [CodeQL CLI](https://github.com/github/codeql-cli-binaries/releases); there's no need to use the `docker` command.
True
CodeQL package manager (public beta) - <!-- Remember to... 1. Assign the issue to the appropriate product manager (probably yourself) 2. Apply a label for: release phase, feature area, product SKU, and deployment model, per the README 3. Apply the *public roadmap* label when ready for review to be published to the public repository or the *internal roadmap* label to keep this internal 4. Add to the current year's project board, in the column for when it will ship next 5. Establish links with other internal issues either in the other issue or in the comments (to keep the description customer-friendly) 6. Head over to github/customer-feedback to comment about this roadmap issue on any relevant feedback issues --> #### Summary <!--(What is it?)--> CodeQL is designed to query codebases for vulnerabilities. The queries to detect security problems are all [open source, and available in our GitHub repository](https://github.com/github/codeql). To further enable the security community to share their security knowledge, we've created the CodeQL packaging ecosystem. This enables security experts to create, share, depend on, and run CodeQL queries and libraries (much like `npm` for the JS/TS ecosystem). CodeQL packs will be available in the GitHub Package Registry (GHPR), and can easily be integrated into GitHub Code Scanning. #### Intended Outcome <!--(Why are we building it?)--> CodeQL query and library authors can upload their packs to the GitHub Package Registry using the CodeQL CLI. Users of Code Scanning can integrate CodeQL packs into their CodeQL Action workflow. Users of the CodeQL CLI can fetch and run query packs, as well as express dependencies on CodeQL library packs. #### How will it work? <!--(Short description of workflow/functionality)--> Under the hood, CodeQL packs are using GHPR's container registry: CodeQL packs are Docker containers in disguise. Users can enable CodeQL packs through Code Scanning, and further interact with packs through the [CodeQL CLI](https://github.com/github/codeql-cli-binaries/releases); there's no need to use the `docker` command.
non_priority
codeql package manager public beta remember to assign the issue to the appropriate product manager probably yourself apply a label for release phase feature area product sku and deployment model per the readme apply the public roadmap label when ready for review to be published to the public repository or the internal roadmap label to keep this internal add to the current year s project board in the column for when it will ship next establish links with other internal issues either in the other issue or in the comments to keep the description customer friendly head over to github customer feedback to comment about this roadmap issue on any relevant feedback issues summary codeql is designed to query codebases for vulnerabilities the queries to detect security problems are all to further enable the security community to share their security knowledge we ve created the codeql packaging ecosystem this enables security experts to create share depend on and run codeql queries and libraries much like npm for the js ts ecosystem codeql packs will be available in the github package registry ghpr and can easily be integrated into github code scanning intended outcome codeql query and library authors can upload their packs to the github package registry using the codeql cli users of code scanning can integrate codeql packs into their codeql action workflow users of the codeql cli can fetch and run query packs as well as express dependencies on codeql library packs how will it work under the hood codeql packs are using ghpr s container registry codeql packs are docker containers in disguise users can enable codeql packs through code scanning and further interact with packs through the there s no need to use the docker command
0
198,851
22,674,165,431
IssuesEvent
2022-07-04 01:23:33
hilljtm/hilljtm.github.io
https://api.github.com/repos/hilljtm/hilljtm.github.io
opened
CVE-2021-23440 (High) detected in set-value-0.4.3.tgz
security vulnerability
## CVE-2021-23440 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>set-value-0.4.3.tgz</b></p></summary> <p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p> <p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz">https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz</a></p> <p> Dependency Hierarchy: - browser-sync-2.26.5.tgz (Root Library) - micromatch-3.1.10.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - cache-base-1.0.1.tgz - union-value-1.0.0.tgz - :x: **set-value-0.4.3.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package set-value before <2.0.1, >=3.0.0 <4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays. <p>Publish Date: 2021-09-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23440>CVE-2021-23440</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23440">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23440</a></p> <p>Release Date: 2021-09-12</p> <p>Fix Resolution (set-value): 2.0.1</p> <p>Direct dependency fix Resolution (browser-sync): 2.26.6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-23440 (High) detected in set-value-0.4.3.tgz - ## CVE-2021-23440 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>set-value-0.4.3.tgz</b></p></summary> <p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p> <p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz">https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz</a></p> <p> Dependency Hierarchy: - browser-sync-2.26.5.tgz (Root Library) - micromatch-3.1.10.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - cache-base-1.0.1.tgz - union-value-1.0.0.tgz - :x: **set-value-0.4.3.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package set-value before <2.0.1, >=3.0.0 <4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays. <p>Publish Date: 2021-09-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23440>CVE-2021-23440</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23440">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23440</a></p> <p>Release Date: 2021-09-12</p> <p>Fix Resolution (set-value): 2.0.1</p> <p>Direct dependency fix Resolution (browser-sync): 2.26.6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in set value tgz cve high severity vulnerability vulnerable library set value tgz create nested values and any intermediaries using dot notation a b c paths library home page a href dependency hierarchy browser sync tgz root library micromatch tgz snapdragon tgz base tgz cache base tgz union value tgz x set value tgz vulnerable library found in base branch master vulnerability details this affects the package set value before a type confusion vulnerability can lead to a bypass of cve when the user provided keys used in the path parameter are arrays publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution set value direct dependency fix resolution browser sync step up your open source security game with mend
0
97,344
8,653,058,953
IssuesEvent
2018-11-27 09:51:17
humera987/FXLabs-Test-Automation
https://api.github.com/repos/humera987/FXLabs-Test-Automation
closed
new tested 27 : ApiV1IssuesProjectIdIdGetQueryParamPagesizeDdos
new tested 27
Project : new tested 27 Job : UAT Env : UAT Region : US_WEST Result : fail Status Code : 404 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=NjEyZGM1N2EtOWY5Yy00NGYzLThkOGEtNTFiN2FmNWYxZjg5; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Tue, 27 Nov 2018 09:49:49 GMT]} Endpoint : http://13.56.210.25/api/v1/api/v1/issues/project-id/GCjWPxxc?pageSize=1001&status=GCjWPxxc Request : Response : { "timestamp" : "2018-11-27T09:49:49.673+0000", "status" : 404, "error" : "Not Found", "message" : "No message available", "path" : "/api/v1/api/v1/issues/project-id/GCjWPxxc" } Logs : Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed] --- FX Bot ---
1.0
new tested 27 : ApiV1IssuesProjectIdIdGetQueryParamPagesizeDdos - Project : new tested 27 Job : UAT Env : UAT Region : US_WEST Result : fail Status Code : 404 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=NjEyZGM1N2EtOWY5Yy00NGYzLThkOGEtNTFiN2FmNWYxZjg5; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Tue, 27 Nov 2018 09:49:49 GMT]} Endpoint : http://13.56.210.25/api/v1/api/v1/issues/project-id/GCjWPxxc?pageSize=1001&status=GCjWPxxc Request : Response : { "timestamp" : "2018-11-27T09:49:49.673+0000", "status" : 404, "error" : "Not Found", "message" : "No message available", "path" : "/api/v1/api/v1/issues/project-id/GCjWPxxc" } Logs : Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed] --- FX Bot ---
non_priority
new tested project new tested job uat env uat region us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options set cookie content type transfer encoding date endpoint request response timestamp status error not found message no message available path api api issues project id gcjwpxxc logs assertion resolved to result assertion resolved to result fx bot
0
69,810
15,035,585,676
IssuesEvent
2021-02-02 14:18:59
rsoreq/beats
https://api.github.com/repos/rsoreq/beats
opened
CVE-2020-13757 (High) detected in rsa-3.4.2-py2.py3-none-any.whl
security vulnerability
## CVE-2020-13757 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>rsa-3.4.2-py2.py3-none-any.whl</b></p></summary> <p>Pure-Python RSA implementation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/e1/ae/baedc9cb175552e95f3395c43055a6a5e125ae4d48a1d7a924baca83e92e/rsa-3.4.2-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/e1/ae/baedc9cb175552e95f3395c43055a6a5e125ae4d48a1d7a924baca83e92e/rsa-3.4.2-py2.py3-none-any.whl</a></p> <p>Path to dependency file: beats/metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt</p> <p>Path to vulnerable library: beats/metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt</p> <p> Dependency Hierarchy: - :x: **rsa-3.4.2-py2.py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/rsoreq/beats/commit/a2fa76330818078401465c112c08c753b82a0aec">a2fa76330818078401465c112c08c753b82a0aec</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation). <p>Publish Date: 2020-06-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13757>CVE-2020-13757</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sybrenstuvel/python-rsa/commit/3283b1284475cf6c79a7329aee8bd7443cc72672">https://github.com/sybrenstuvel/python-rsa/commit/3283b1284475cf6c79a7329aee8bd7443cc72672</a></p> <p>Release Date: 2020-06-01</p> <p>Fix Resolution: rsa - 4.1</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"rsa","packageVersion":"3.4.2","packageFilePaths":["/metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"rsa:3.4.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"rsa - 4.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-13757","vulnerabilityDetails":"Python-RSA before 4.1 ignores leading \u0027\\0\u0027 bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13757","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-13757 (High) detected in rsa-3.4.2-py2.py3-none-any.whl - ## CVE-2020-13757 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>rsa-3.4.2-py2.py3-none-any.whl</b></p></summary> <p>Pure-Python RSA implementation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/e1/ae/baedc9cb175552e95f3395c43055a6a5e125ae4d48a1d7a924baca83e92e/rsa-3.4.2-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/e1/ae/baedc9cb175552e95f3395c43055a6a5e125ae4d48a1d7a924baca83e92e/rsa-3.4.2-py2.py3-none-any.whl</a></p> <p>Path to dependency file: beats/metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt</p> <p>Path to vulnerable library: beats/metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt</p> <p> Dependency Hierarchy: - :x: **rsa-3.4.2-py2.py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/rsoreq/beats/commit/a2fa76330818078401465c112c08c753b82a0aec">a2fa76330818078401465c112c08c753b82a0aec</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation). <p>Publish Date: 2020-06-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13757>CVE-2020-13757</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sybrenstuvel/python-rsa/commit/3283b1284475cf6c79a7329aee8bd7443cc72672">https://github.com/sybrenstuvel/python-rsa/commit/3283b1284475cf6c79a7329aee8bd7443cc72672</a></p> <p>Release Date: 2020-06-01</p> <p>Fix Resolution: rsa - 4.1</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"rsa","packageVersion":"3.4.2","packageFilePaths":["/metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"rsa:3.4.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"rsa - 4.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-13757","vulnerabilityDetails":"Python-RSA before 4.1 ignores leading \u0027\\0\u0027 bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13757","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in rsa none any whl cve high severity vulnerability vulnerable library rsa none any whl pure python rsa implementation library home page a href path to dependency file beats metricbeat module kubernetes meta terraform eks requirements txt path to vulnerable library beats metricbeat module kubernetes meta terraform eks requirements txt dependency hierarchy x rsa none any whl vulnerable library found in head commit a href found in base branch master vulnerability details python rsa before ignores leading bytes during decryption of ciphertext this could conceivably have a security relevant impact e g by helping an attacker to infer that an application uses python rsa or if the length of accepted ciphertext affects application behavior such as by causing excessive memory allocation publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rsa rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree rsa isminimumfixversionavailable true minimumfixversion rsa basebranches vulnerabilityidentifier cve vulnerabilitydetails python rsa before ignores leading bytes during decryption of ciphertext this could conceivably have a security relevant impact e g by helping an attacker to infer that an application uses python rsa or if the length of accepted ciphertext affects application behavior such as by causing excessive memory allocation vulnerabilityurl
0
25,160
4,230,409,588
IssuesEvent
2016-07-04 11:56:52
vaadin/archetype-application-example-test
https://api.github.com/repos/vaadin/archetype-application-example-test
closed
Project creation with maven archetype is broken
Defect Imported from Trac
**Originally by _andreas.kull@gmail.com_ on 2015-10-08 12:11:51 +0300** ___ Creating a project as described in [https://vaadin.com/book/-/page/getting-started.maven.html] with the command ``` mvn archetype:generate -DarchetypeGroupId=com.vaadin -DarchetypeArtifactId=vaadin-archetype-application -DarchetypeVersion=7.5.7 -DgroupId=your.company -DartifactId=project-name -Dversion=1.0 -Dpackaging=war ``` and running ``` mvn package ``` fails with the following error: ``` [ERROR] Failed to execute goal com.vaadin:vaadin-maven-plugin:7.5.7:update-theme (default) on project project-name: The goal update-theme requires Vaadin 7.1 or later -> [Help 1] ``` Doing the same with the parameter -DarchetypeVersion=7.5.4 works fine though. https://dev.vaadin.com/ticket/19094
1.0
Project creation with maven archetype is broken - **Originally by _andreas.kull@gmail.com_ on 2015-10-08 12:11:51 +0300** ___ Creating a project as described in [https://vaadin.com/book/-/page/getting-started.maven.html] with the command ``` mvn archetype:generate -DarchetypeGroupId=com.vaadin -DarchetypeArtifactId=vaadin-archetype-application -DarchetypeVersion=7.5.7 -DgroupId=your.company -DartifactId=project-name -Dversion=1.0 -Dpackaging=war ``` and running ``` mvn package ``` fails with the following error: ``` [ERROR] Failed to execute goal com.vaadin:vaadin-maven-plugin:7.5.7:update-theme (default) on project project-name: The goal update-theme requires Vaadin 7.1 or later -> [Help 1] ``` Doing the same with the parameter -DarchetypeVersion=7.5.4 works fine though. https://dev.vaadin.com/ticket/19094
non_priority
project creation with maven archetype is broken originally by andreas kull gmail com on creating a project as described in with the command mvn archetype generate darchetypegroupid com vaadin darchetypeartifactid vaadin archetype application darchetypeversion dgroupid your company dartifactid project name dversion dpackaging war and running mvn package fails with the following error failed to execute goal com vaadin vaadin maven plugin update theme default on project project name the goal update theme requires vaadin or later doing the same with the parameter darchetypeversion works fine though
0
25,005
7,611,134,812
IssuesEvent
2018-05-01 12:30:43
hyperledger/composer
https://api.github.com/repos/hyperledger/composer
closed
Update karma to work with Firefox
build help wanted stale
Composer Unit-tests currently make use of google-chrome browser which is not available for ppc64le arch, hence update relevant changes to work with Firefox instead, which is available across all arch.
1.0
Update karma to work with Firefox - Composer Unit-tests currently make use of google-chrome browser which is not available for ppc64le arch, hence update relevant changes to work with Firefox instead, which is available across all arch.
non_priority
update karma to work with firefox composer unit tests currently make use of google chrome browser which is not available for arch hence update relevant changes to work with firefox instead which is available across all arch
0
162,304
25,517,760,297
IssuesEvent
2022-11-28 17:42:26
nextcloud/mail
https://api.github.com/repos/nextcloud/mail
closed
Content extends message element
bug 3. to review design regression
### Steps to reproduce 1. Open the app 2. Configure an account 3. Open a somewhat longer HTML message ### Expected behavior Well designed app ### Actual behavior ![Bildschirmfoto vom 2022-11-24 15-23-43](https://user-images.githubusercontent.com/1374172/203807791-8beb88b4-bb60-40ad-978f-78e395752bf8.png) ![Bildschirmfoto vom 2022-11-24 15-23-56](https://user-images.githubusercontent.com/1374172/203807815-51b34631-42fd-420c-8f89-0fd5efbd71d9.png) ### Mail app version 2.2 ### Mailserver or service _No response_ ### Operating system _No response_ ### PHP engine version _No response_ ### Web server _No response_ ### Database _No response_ ### Additional info Git bisect leads me to e86cc894aa3cfa8e1cbbb6451fe87e7e90f86c99.
1.0
Content extends message element - ### Steps to reproduce 1. Open the app 2. Configure an account 3. Open a somewhat longer HTML message ### Expected behavior Well designed app ### Actual behavior ![Bildschirmfoto vom 2022-11-24 15-23-43](https://user-images.githubusercontent.com/1374172/203807791-8beb88b4-bb60-40ad-978f-78e395752bf8.png) ![Bildschirmfoto vom 2022-11-24 15-23-56](https://user-images.githubusercontent.com/1374172/203807815-51b34631-42fd-420c-8f89-0fd5efbd71d9.png) ### Mail app version 2.2 ### Mailserver or service _No response_ ### Operating system _No response_ ### PHP engine version _No response_ ### Web server _No response_ ### Database _No response_ ### Additional info Git bisect leads me to e86cc894aa3cfa8e1cbbb6451fe87e7e90f86c99.
non_priority
content extends message element steps to reproduce open the app configure an account open a somewhat longer html message expected behavior well designed app actual behavior mail app version mailserver or service no response operating system no response php engine version no response web server no response database no response additional info git bisect leads me to
0
50,857
13,608,188,927
IssuesEvent
2020-09-23 01:38:53
peilin823/peilin823-security_test_demo1
https://api.github.com/repos/peilin823/peilin823-security_test_demo1
opened
CVE-2015-9251 (Medium) detected in jquery-1.7.2.min.js
security vulnerability
## CVE-2015-9251 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p> <p>Path to dependency file: peilin823-security_test_demo1/node_modules/marked/www/demo.html</p> <p>Path to vulnerable library: peilin823-security_test_demo1/node_modules/marked/www/demo.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/peilin823/peilin823-security_test_demo1/commit/9cbc07e9a44117e1b35984fd315cbd4aec36fd41">9cbc07e9a44117e1b35984fd315cbd4aec36fd41</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251>CVE-2015-9251</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v3.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2015-9251 (Medium) detected in jquery-1.7.2.min.js - ## CVE-2015-9251 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p> <p>Path to dependency file: peilin823-security_test_demo1/node_modules/marked/www/demo.html</p> <p>Path to vulnerable library: peilin823-security_test_demo1/node_modules/marked/www/demo.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/peilin823/peilin823-security_test_demo1/commit/9cbc07e9a44117e1b35984fd315cbd4aec36fd41">9cbc07e9a44117e1b35984fd315cbd4aec36fd41</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251>CVE-2015-9251</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v3.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jquery min js cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file security test node modules marked www demo html path to vulnerable library security test node modules marked www demo html dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch master vulnerability details jquery before is vulnerable to cross site scripting xss attacks when a cross domain ajax request is performed without the datatype option causing text javascript responses to be executed publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
14,542
3,275,853,573
IssuesEvent
2015-10-26 17:04:04
scalaz/scalaz-stream
https://api.github.com/repos/scalaz/scalaz-stream
closed
Replace Either by Try in fs2.util.Task
design/refactoring
Just an idea. I believe `scala.Try` type has better suit for failure representation then scala's Either, probably as well resulting in better readable code.
1.0
Replace Either by Try in fs2.util.Task - Just an idea. I believe `scala.Try` type has better suit for failure representation then scala's Either, probably as well resulting in better readable code.
non_priority
replace either by try in util task just an idea i believe scala try type has better suit for failure representation then scala s either probably as well resulting in better readable code
0
26,983
13,162,726,767
IssuesEvent
2020-08-10 22:17:11
mozilla-mobile/fenix
https://api.github.com/repos/mozilla-mobile/fenix
reopened
FNX3-14276 ⁃ Investigate cold startup regression 5/14 (15ms)
eng:performance
HANOOB: - 5/10: 1.44284 - (intermediate dates are N/A) - 5/14: 1.45973 We should find the root cause.
True
FNX3-14276 ⁃ Investigate cold startup regression 5/14 (15ms) - HANOOB: - 5/10: 1.44284 - (intermediate dates are N/A) - 5/14: 1.45973 We should find the root cause.
non_priority
⁃ investigate cold startup regression hanoob intermediate dates are n a we should find the root cause
0
79,976
7,735,440,810
IssuesEvent
2018-05-27 15:09:49
opennars/opennars
https://api.github.com/repos/opennars/opennars
opened
Parallel NALTests
testing
The iteration time of the development can get greatly speed up if a lot of the tests happen in parallel.
1.0
Parallel NALTests - The iteration time of the development can get greatly speed up if a lot of the tests happen in parallel.
non_priority
parallel naltests the iteration time of the development can get greatly speed up if a lot of the tests happen in parallel
0
270,822
20,611,141,571
IssuesEvent
2022-03-07 08:45:32
airbytehq/airbyte
https://api.github.com/repos/airbytehq/airbyte
opened
Document in which case the API is useful
area/documentation type/enhancement
> In airflow, i write my dags in python code, and in dbt i write my data transformations in code. is there a way to define connections in airbyte as code? so that we can version control, integrate into ci/cd pipelines, etc Created from Slack: https://airbytehq.slack.com/archives/C021JANJ6TY/p1637828689461100?thread_ts=1637828689.461100&cid=C021JANJ6TY
1.0
Document in which case the API is useful - > In airflow, i write my dags in python code, and in dbt i write my data transformations in code. is there a way to define connections in airbyte as code? so that we can version control, integrate into ci/cd pipelines, etc Created from Slack: https://airbytehq.slack.com/archives/C021JANJ6TY/p1637828689461100?thread_ts=1637828689.461100&cid=C021JANJ6TY
non_priority
document in which case the api is useful in airflow i write my dags in python code and in dbt i write my data transformations in code is there a way to define connections in airbyte as code so that we can version control integrate into ci cd pipelines etc created from slack
0
54,428
6,820,260,135
IssuesEvent
2017-11-07 13:19:47
sul-dlss/exhibits
https://api.github.com/repos/sul-dlss/exhibits
closed
Add sidebar link to "See Also" on exhibits.stanford.edu
design needed in progress
Above the link to "Request an exhibit" -- please add a link (with the red Stanford "S" next to it), called: Market your exhibit https://consul.stanford.edu/x/2ok1CQ
1.0
Add sidebar link to "See Also" on exhibits.stanford.edu - Above the link to "Request an exhibit" -- please add a link (with the red Stanford "S" next to it), called: Market your exhibit https://consul.stanford.edu/x/2ok1CQ
non_priority
add sidebar link to see also on exhibits stanford edu above the link to request an exhibit please add a link with the red stanford s next to it called market your exhibit
0
98,169
29,499,342,418
IssuesEvent
2023-06-02 20:01:20
orbeon/orbeon-forms
https://api.github.com/repos/orbeon/orbeon-forms
closed
Form Builder should not add `bind` to custom dialog in form definition
Module: Form Builder
Possibilities: - don't process code under `<xxf:dialog>` since we don't handle that - or don't process code binding to custom instances We kind of support officially [custom dialogs within a form definition](https://doc.orbeon.com/form-runner/advanced/custom). - [ ] fix - [ ] backport to 2021.1.x [+1 from customer](https://3.basecamp.com/3600924/buckets/7545500/messages/5714376643#__recording_5968960665)
1.0
Form Builder should not add `bind` to custom dialog in form definition - Possibilities: - don't process code under `<xxf:dialog>` since we don't handle that - or don't process code binding to custom instances We kind of support officially [custom dialogs within a form definition](https://doc.orbeon.com/form-runner/advanced/custom). - [ ] fix - [ ] backport to 2021.1.x [+1 from customer](https://3.basecamp.com/3600924/buckets/7545500/messages/5714376643#__recording_5968960665)
non_priority
form builder should not add bind to custom dialog in form definition possibilities don t process code under since we don t handle that or don t process code binding to custom instances we kind of support officially fix backport to x
0
18,870
5,725,626,748
IssuesEvent
2017-04-20 17:00:32
jOOQ/jOOQ
https://api.github.com/repos/jOOQ/jOOQ
closed
NullPointerException when generating code in single-uppercase-named-database setup on MariaDB and MySQL
C: Code Generation C: DB: MariaDB C: DB: MySQL P: High R: Fixed T: Defect
It appears that we (or MariaDB) have a case-sensitivity issue related to schema name cases. This issue produces a `NullPointerException`, as we do find tables for an upper case schema name, but we cannot find the schema itself. Exception: ``` 2016-04-21T16:08:52,356 [main] ERROR org.jooq.util.AbstractDatabase - Error while fetching tables java.lang.NullPointerException at org.jooq.util.AbstractElementContainerDefinition.<init>(AbstractElementContainerDefinition.java:75) ~[jooq-meta-3.7.3.jar:?] at org.jooq.util.AbstractTableDefinition.<init>(AbstractTableDefinition.java:68) ~[jooq-meta-3.7.3.jar:?] at org.jooq.util.mysql.MySQLTableDefinition.<init>(MySQLTableDefinition.java:69) ~[jooq-meta-3.7.3.jar:?] at org.jooq.util.mysql.MySQLDatabase.getTables0(MySQLDatabase.java:247) ~[jooq-meta-3.7.3.jar:?] at org.jooq.util.AbstractDatabase.getTables(AbstractDatabase.java:730) [jooq-meta-3.7.3.jar:?] at org.jooq.util.JavaGenerator.generateSchema(JavaGenerator.java:3346) [jooq-codegen-3.7.3.jar:?] at org.jooq.util.JavaGenerator.generateSchema(JavaGenerator.java:3303) [jooq-codegen-3.7.3.jar:?] at org.jooq.util.JavaGenerator.generate(JavaGenerator.java:301) [jooq-codegen-3.7.3.jar:?] at org.jooq.util.JavaGenerator.generate(JavaGenerator.java:268) [jooq-codegen-3.7.3.jar:?] at org.jooq.util.GenerationTool.run(GenerationTool.java:434) [jooq-codegen-3.7.3.jar:?] at org.jooq.util.GenerationTool.generate(GenerationTool.java:180) [jooq-codegen-3.7.3.jar:?] at org.jooq.util.GenerationTool.main(GenerationTool.java:151) [jooq-codegen-3.7.3.jar:?] at com.proquest.pqd.canon.GenerateJooqFiles.main(GenerateJooqFiles.java:31) [test-classes/:?] at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:1.8.0_31] at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:1.8.0_31] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.8.0_31] at java.lang.reflect.Method.invoke(Method.java:483) ~[?:1.8.0_31] at com.intellij.rt.execution.application.AppMain.main(AppMain.java:144) [idea_rt.jar:?] ``` Further analysis is required --- See also: https://groups.google.com/forum/#!topic/jooq-user/FFaXsjjQ4Ck
1.0
NullPointerException when generating code in single-uppercase-named-database setup on MariaDB and MySQL - It appears that we (or MariaDB) have a case-sensitivity issue related to schema name cases. This issue produces a `NullPointerException`, as we do find tables for an upper case schema name, but we cannot find the schema itself. Exception: ``` 2016-04-21T16:08:52,356 [main] ERROR org.jooq.util.AbstractDatabase - Error while fetching tables java.lang.NullPointerException at org.jooq.util.AbstractElementContainerDefinition.<init>(AbstractElementContainerDefinition.java:75) ~[jooq-meta-3.7.3.jar:?] at org.jooq.util.AbstractTableDefinition.<init>(AbstractTableDefinition.java:68) ~[jooq-meta-3.7.3.jar:?] at org.jooq.util.mysql.MySQLTableDefinition.<init>(MySQLTableDefinition.java:69) ~[jooq-meta-3.7.3.jar:?] at org.jooq.util.mysql.MySQLDatabase.getTables0(MySQLDatabase.java:247) ~[jooq-meta-3.7.3.jar:?] at org.jooq.util.AbstractDatabase.getTables(AbstractDatabase.java:730) [jooq-meta-3.7.3.jar:?] at org.jooq.util.JavaGenerator.generateSchema(JavaGenerator.java:3346) [jooq-codegen-3.7.3.jar:?] at org.jooq.util.JavaGenerator.generateSchema(JavaGenerator.java:3303) [jooq-codegen-3.7.3.jar:?] at org.jooq.util.JavaGenerator.generate(JavaGenerator.java:301) [jooq-codegen-3.7.3.jar:?] at org.jooq.util.JavaGenerator.generate(JavaGenerator.java:268) [jooq-codegen-3.7.3.jar:?] at org.jooq.util.GenerationTool.run(GenerationTool.java:434) [jooq-codegen-3.7.3.jar:?] at org.jooq.util.GenerationTool.generate(GenerationTool.java:180) [jooq-codegen-3.7.3.jar:?] at org.jooq.util.GenerationTool.main(GenerationTool.java:151) [jooq-codegen-3.7.3.jar:?] at com.proquest.pqd.canon.GenerateJooqFiles.main(GenerateJooqFiles.java:31) [test-classes/:?] at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:1.8.0_31] at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:1.8.0_31] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.8.0_31] at java.lang.reflect.Method.invoke(Method.java:483) ~[?:1.8.0_31] at com.intellij.rt.execution.application.AppMain.main(AppMain.java:144) [idea_rt.jar:?] ``` Further analysis is required --- See also: https://groups.google.com/forum/#!topic/jooq-user/FFaXsjjQ4Ck
non_priority
nullpointerexception when generating code in single uppercase named database setup on mariadb and mysql it appears that we or mariadb have a case sensitivity issue related to schema name cases this issue produces a nullpointerexception as we do find tables for an upper case schema name but we cannot find the schema itself exception error org jooq util abstractdatabase error while fetching tables java lang nullpointerexception at org jooq util abstractelementcontainerdefinition abstractelementcontainerdefinition java at org jooq util abstracttabledefinition abstracttabledefinition java at org jooq util mysql mysqltabledefinition mysqltabledefinition java at org jooq util mysql mysqldatabase mysqldatabase java at org jooq util abstractdatabase gettables abstractdatabase java at org jooq util javagenerator generateschema javagenerator java at org jooq util javagenerator generateschema javagenerator java at org jooq util javagenerator generate javagenerator java at org jooq util javagenerator generate javagenerator java at org jooq util generationtool run generationtool java at org jooq util generationtool generate generationtool java at org jooq util generationtool main generationtool java at com proquest pqd canon generatejooqfiles main generatejooqfiles java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at com intellij rt execution application appmain main appmain java further analysis is required see also
0
66,026
14,766,755,363
IssuesEvent
2021-01-10 02:15:34
mwilliams7197/WebGoat-Legacy
https://api.github.com/repos/mwilliams7197/WebGoat-Legacy
reopened
CVE-2014-3596 (Medium) detected in axis-1.2.jar
security vulnerability
## CVE-2014-3596 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>axis-1.2.jar</b></p></summary> <p>null</p> <p>Path to dependency file: WebGoat-Legacy/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/axis/axis/1.2/axis-1.2.jar,WebGoat-Legacy/target/WebGoat-6.0.1/WEB-INF/lib/axis-1.2.jar</p> <p> Dependency Hierarchy: - :x: **axis-1.2.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784. <p>Publish Date: 2014-08-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-3596>CVE-2014-3596</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.8</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://xforce.iss.net/xforce/xfdb/95377">http://xforce.iss.net/xforce/xfdb/95377</a></p> <p>Release Date: 2017-12-31</p> <p>Fix Resolution: Refer to Apache Web site for patch, upgrade or suggested workaround information. See References. For IBM products: Refer to the appropriate IBM Security Bulletin for patch, upgrade or suggested workaround information. See References. For other distributions: Apply the appropriate update for your system.</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"axis","packageName":"axis","packageVersion":"1.2","isTransitiveDependency":false,"dependencyTree":"axis:axis:1.2","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2014-3596","vulnerabilityDetails":"The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-3596","cvss2Severity":"medium","cvss2Score":"5.8","extraData":{}}</REMEDIATE> -->
True
CVE-2014-3596 (Medium) detected in axis-1.2.jar - ## CVE-2014-3596 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>axis-1.2.jar</b></p></summary> <p>null</p> <p>Path to dependency file: WebGoat-Legacy/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/axis/axis/1.2/axis-1.2.jar,WebGoat-Legacy/target/WebGoat-6.0.1/WEB-INF/lib/axis-1.2.jar</p> <p> Dependency Hierarchy: - :x: **axis-1.2.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784. <p>Publish Date: 2014-08-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-3596>CVE-2014-3596</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.8</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://xforce.iss.net/xforce/xfdb/95377">http://xforce.iss.net/xforce/xfdb/95377</a></p> <p>Release Date: 2017-12-31</p> <p>Fix Resolution: Refer to Apache Web site for patch, upgrade or suggested workaround information. See References. For IBM products: Refer to the appropriate IBM Security Bulletin for patch, upgrade or suggested workaround information. See References. For other distributions: Apply the appropriate update for your system.</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"axis","packageName":"axis","packageVersion":"1.2","isTransitiveDependency":false,"dependencyTree":"axis:axis:1.2","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2014-3596","vulnerabilityDetails":"The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-3596","cvss2Severity":"medium","cvss2Score":"5.8","extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in axis jar cve medium severity vulnerability vulnerable library axis jar null path to dependency file webgoat legacy pom xml path to vulnerable library canner repository axis axis axis jar webgoat legacy target webgoat web inf lib axis jar dependency hierarchy x axis jar vulnerable library vulnerability details the getcn function in apache axis and earlier does not properly verify that the server hostname matches a domain name in the subject s common name cn or subjectaltname field of the x certificate which allows man in the middle attackers to spoof ssl servers via a certificate with a subject that specifies a common name in a field that is not the cn field note this issue exists because of an incomplete fix for cve publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution refer to apache web site for patch upgrade or suggested workaround information see references for ibm products refer to the appropriate ibm security bulletin for patch upgrade or suggested workaround information see references for other distributions apply the appropriate update for your system isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails the getcn function in apache axis and earlier does not properly verify that the server hostname matches a domain name in the subject common name cn or subjectaltname field of the x certificate which allows man in the middle attackers to spoof ssl servers via a certificate with a subject that specifies a common name in a field that is not the cn field note this issue exists because of an incomplete fix for cve vulnerabilityurl
0
16,226
4,029,506,947
IssuesEvent
2016-05-18 10:55:21
ehcache/ehcache3
https://api.github.com/repos/ehcache/ehcache3
closed
User facing doc for clustered CacheManager creation
clustering documentation under review
Using the existing format of asciidoc + callouts to a sample that is executed as part of the test suite.
1.0
User facing doc for clustered CacheManager creation - Using the existing format of asciidoc + callouts to a sample that is executed as part of the test suite.
non_priority
user facing doc for clustered cachemanager creation using the existing format of asciidoc callouts to a sample that is executed as part of the test suite
0
102,126
31,835,827,285
IssuesEvent
2023-09-14 13:28:23
moby/buildkit
https://api.github.com/repos/moby/buildkit
closed
Make whiteout timestamps reproducible
area/reproducible-builds
> > Is this going to apply as well for whiteout files? > > Needs: > - https://github.com/containerd/containerd/pull/7478 _Originally posted by @AkihiroSuda in https://github.com/moby/buildkit/issues/2918#issuecomment-1272164456_
1.0
Make whiteout timestamps reproducible - > > Is this going to apply as well for whiteout files? > > Needs: > - https://github.com/containerd/containerd/pull/7478 _Originally posted by @AkihiroSuda in https://github.com/moby/buildkit/issues/2918#issuecomment-1272164456_
non_priority
make whiteout timestamps reproducible is this going to apply as well for whiteout files needs originally posted by akihirosuda in
0
134,554
10,919,389,868
IssuesEvent
2019-11-21 18:55:21
Vachok/ftpplus
https://api.github.com/repos/Vachok/ftpplus
closed
testMain
Medium TestQuality bug resolution_Fixed
Execute IntoApplicationTest::testMain**testMain** *IntoApplicationTest* *Could not initialize class ru.vachok.networker.IntoApplication* *java.lang.NoClassDefFoundError*
1.0
testMain - Execute IntoApplicationTest::testMain**testMain** *IntoApplicationTest* *Could not initialize class ru.vachok.networker.IntoApplication* *java.lang.NoClassDefFoundError*
non_priority
testmain execute intoapplicationtest testmain testmain intoapplicationtest could not initialize class ru vachok networker intoapplication java lang noclassdeffounderror
0
315,943
27,121,025,273
IssuesEvent
2023-02-15 22:54:24
apache/tvm
https://api.github.com/repos/apache/tvm
opened
[Flaky Test] `tests/micro/common/test_tvmc.py::test_tvmc_model_run[zephyr-qemu_x86-output_dirX]`
test: flaky
These tests were found to be flaky (intermittently failing on `main` or failed in a PR with unrelated changes). See [the docs](https://github.com/apache/tvm/blob/main/docs/contribute/ci.rst#handling-flaky-failures) for details. ### Tests(s) - `tests/micro/common/test_tvmc.py::test_tvmc_model_run[zephyr-qemu_x86-output_dir0]` - `tests/micro/common/test_tvmc.py::test_tvmc_model_run[zephyr-qemu_x86-output_dir1]` ### Jenkins Links This was observed multiple times in local runs.
1.0
[Flaky Test] `tests/micro/common/test_tvmc.py::test_tvmc_model_run[zephyr-qemu_x86-output_dirX]` - These tests were found to be flaky (intermittently failing on `main` or failed in a PR with unrelated changes). See [the docs](https://github.com/apache/tvm/blob/main/docs/contribute/ci.rst#handling-flaky-failures) for details. ### Tests(s) - `tests/micro/common/test_tvmc.py::test_tvmc_model_run[zephyr-qemu_x86-output_dir0]` - `tests/micro/common/test_tvmc.py::test_tvmc_model_run[zephyr-qemu_x86-output_dir1]` ### Jenkins Links This was observed multiple times in local runs.
non_priority
tests micro common test tvmc py test tvmc model run these tests were found to be flaky intermittently failing on main or failed in a pr with unrelated changes see for details tests s tests micro common test tvmc py test tvmc model run tests micro common test tvmc py test tvmc model run jenkins links this was observed multiple times in local runs
0
291,555
21,929,690,775
IssuesEvent
2022-05-23 08:39:30
rucio/rucio
https://api.github.com/repos/rucio/rucio
closed
Operators documentation and recipe repository
enhancement Documentation
Motivation ---------- As discussed at the Community workshop. We want to establish some kind of repository for operator documentation / recipes which allows convenient ways of contribution (Wiki or similar)
1.0
Operators documentation and recipe repository - Motivation ---------- As discussed at the Community workshop. We want to establish some kind of repository for operator documentation / recipes which allows convenient ways of contribution (Wiki or similar)
non_priority
operators documentation and recipe repository motivation as discussed at the community workshop we want to establish some kind of repository for operator documentation recipes which allows convenient ways of contribution wiki or similar
0
67,379
8,128,547,034
IssuesEvent
2018-08-17 12:15:32
owncloud/ios-app
https://api.github.com/repos/owncloud/ios-app
closed
Files: Rename a file or folder
Design discussion feature: file operation
_As a user, i want the possibility to rename a file, so that i can set a different name to my files or folders_ AC: - [ ] Set the option to rename in the file list - [ ] Set a dialog in order to let the user choose a new name for the item - [ ] The user can cancel the operation - [ ] Send the request and get the response - [ ] Handle issues - [ ] Refresh the list view to show the new status - [ ] If the user remove the name the `Done` button should appear disabled - [ ] QA Mockups: ![rename document pdf v2](https://user-images.githubusercontent.com/1815050/42267611-b96fd3de-7f79-11e8-899f-c9c48ebb396b.png) ![rename image v2](https://user-images.githubusercontent.com/1815050/42267612-b9920616-7f79-11e8-98bc-90cf0cbb0945.png) ![rename video v2](https://user-images.githubusercontent.com/1815050/42267613-b9b52ba0-7f79-11e8-91d3-cec8f3532761.png) Figma design: https://www.figma.com/file/Ui4YzD3oQcxJSbzBEr80O9eU/Working-Draft-UI?node-id=1816%3A3862
1.0
Files: Rename a file or folder - _As a user, i want the possibility to rename a file, so that i can set a different name to my files or folders_ AC: - [ ] Set the option to rename in the file list - [ ] Set a dialog in order to let the user choose a new name for the item - [ ] The user can cancel the operation - [ ] Send the request and get the response - [ ] Handle issues - [ ] Refresh the list view to show the new status - [ ] If the user remove the name the `Done` button should appear disabled - [ ] QA Mockups: ![rename document pdf v2](https://user-images.githubusercontent.com/1815050/42267611-b96fd3de-7f79-11e8-899f-c9c48ebb396b.png) ![rename image v2](https://user-images.githubusercontent.com/1815050/42267612-b9920616-7f79-11e8-98bc-90cf0cbb0945.png) ![rename video v2](https://user-images.githubusercontent.com/1815050/42267613-b9b52ba0-7f79-11e8-91d3-cec8f3532761.png) Figma design: https://www.figma.com/file/Ui4YzD3oQcxJSbzBEr80O9eU/Working-Draft-UI?node-id=1816%3A3862
non_priority
files rename a file or folder as a user i want the possibility to rename a file so that i can set a different name to my files or folders ac set the option to rename in the file list set a dialog in order to let the user choose a new name for the item the user can cancel the operation send the request and get the response handle issues refresh the list view to show the new status if the user remove the name the done button should appear disabled qa mockups figma design
0
65,276
19,309,585,961
IssuesEvent
2021-12-13 14:59:52
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
Expand sidepanel "lip" is not darkened when in dark mode
T-Defect S-Minor A-Room-List A-Spaces A-Appearance O-Occasional
### Steps to reproduce (Design issue) ### Outcome #### What did you expect? A similarly-themed button. #### What happened instead? ![image](https://user-images.githubusercontent.com/22740616/145008536-fbd034c9-c56e-4e37-bcae-69f1bfb62640.png) ### Operating system Linux ### Browser information Brave (Version 1.26.67 Chromium: 91.0.4472.114) ### URL for webapp develop.element.io ### Application version Element version: b0abbfacd48b-react-b4b81a455e14-js-39a8399977af Olm version: 3.2.3 ### Homeserver matrix.org ### Will you send logs? No
1.0
Expand sidepanel "lip" is not darkened when in dark mode - ### Steps to reproduce (Design issue) ### Outcome #### What did you expect? A similarly-themed button. #### What happened instead? ![image](https://user-images.githubusercontent.com/22740616/145008536-fbd034c9-c56e-4e37-bcae-69f1bfb62640.png) ### Operating system Linux ### Browser information Brave (Version 1.26.67 Chromium: 91.0.4472.114) ### URL for webapp develop.element.io ### Application version Element version: b0abbfacd48b-react-b4b81a455e14-js-39a8399977af Olm version: 3.2.3 ### Homeserver matrix.org ### Will you send logs? No
non_priority
expand sidepanel lip is not darkened when in dark mode steps to reproduce design issue outcome what did you expect a similarly themed button what happened instead operating system linux browser information brave version chromium url for webapp develop element io application version element version react js olm version homeserver matrix org will you send logs no
0
217,244
16,848,841,221
IssuesEvent
2021-06-20 04:14:50
hakehuang/infoflow
https://api.github.com/repos/hakehuang/infoflow
opened
tests-ci :kernel.memory_protection.mem_domain_remove_add_partition : zephyr-v2.6.0-286-g46029914a7ac: lpcxpresso55s28: test Timeout
area: Tests
**Describe the bug** kernel.memory_protection.mem_domain_remove_add_partition test is Timeout on zephyr-v2.6.0-286-g46029914a7ac on lpcxpresso55s28 see logs for details **To Reproduce** 1. ``` scripts/twister --device-testing --device-serial /dev/ttyACM0 -p lpcxpresso55s28 --testcase-root tests --sub-test kernel.memory_protection ``` 2. See error **Expected behavior** test pass **Impact** **Logs and console output** ``` - *** Booting Zephyr OS build zephyr-v2.6.0-286-g46029914a7ac *** Running test suite memory_protection_test_suite =================================================================== START - test_permission_inheritance ASSERTION FAIL [esf != ((void *)0)] @ WEST_TOPDIR/zephyr/arch/arm/core/aarch32/cortex_m/fault.c:993 ESF could not be retrieved successfully. Shall never occur. ASSERTION FAIL [esf != ((void *)0)] @ WEST_TOPDIR/zephyr/arch/arm/core/aarch32/cortex_m/fault.c:993 ESF could not be retrieved successfully. Shall never occur. ``` **Environment (please complete the following information):** - OS: (e.g. Linux ) - Toolchain (e.g Zephyr SDK) - Commit SHA or Version used: zephyr-v2.6.0-286-g46029914a7ac
1.0
tests-ci :kernel.memory_protection.mem_domain_remove_add_partition : zephyr-v2.6.0-286-g46029914a7ac: lpcxpresso55s28: test Timeout - **Describe the bug** kernel.memory_protection.mem_domain_remove_add_partition test is Timeout on zephyr-v2.6.0-286-g46029914a7ac on lpcxpresso55s28 see logs for details **To Reproduce** 1. ``` scripts/twister --device-testing --device-serial /dev/ttyACM0 -p lpcxpresso55s28 --testcase-root tests --sub-test kernel.memory_protection ``` 2. See error **Expected behavior** test pass **Impact** **Logs and console output** ``` - *** Booting Zephyr OS build zephyr-v2.6.0-286-g46029914a7ac *** Running test suite memory_protection_test_suite =================================================================== START - test_permission_inheritance ASSERTION FAIL [esf != ((void *)0)] @ WEST_TOPDIR/zephyr/arch/arm/core/aarch32/cortex_m/fault.c:993 ESF could not be retrieved successfully. Shall never occur. ASSERTION FAIL [esf != ((void *)0)] @ WEST_TOPDIR/zephyr/arch/arm/core/aarch32/cortex_m/fault.c:993 ESF could not be retrieved successfully. Shall never occur. ``` **Environment (please complete the following information):** - OS: (e.g. Linux ) - Toolchain (e.g Zephyr SDK) - Commit SHA or Version used: zephyr-v2.6.0-286-g46029914a7ac
non_priority
tests ci kernel memory protection mem domain remove add partition zephyr test timeout describe the bug kernel memory protection mem domain remove add partition test is timeout on zephyr on see logs for details to reproduce scripts twister device testing device serial dev p testcase root tests sub test kernel memory protection see error expected behavior test pass impact logs and console output booting zephyr os build zephyr running test suite memory protection test suite start test permission inheritance assertion fail west topdir zephyr arch arm core cortex m fault c esf could not be retrieved successfully shall never occur assertion fail west topdir zephyr arch arm core cortex m fault c esf could not be retrieved successfully shall never occur environment please complete the following information os e g linux toolchain e g zephyr sdk commit sha or version used zephyr
0
330,924
28,496,028,877
IssuesEvent
2023-04-18 14:17:38
elastic/kibana
https://api.github.com/repos/elastic/kibana
opened
Failing test: X-Pack Case API Integration Tests.x-pack/test/cases_api_integration/security_and_spaces/tests/common/comments/delete_comment·ts - cases security and spaces enabled: trial Common delete_comment alerts security_solution removes a case from the alert schema when deleting an alert attachment
failed-test Team:ResponseOps
A test failed on a tracked branch ``` TypeError: Cannot read properties of undefined (reading '_id') at map (alerts.ts:127:46) at Array.map (<anonymous>) at createCaseAttachAlertAndDeleteAlert (alerts.ts:127:25) at runMicrotasks (<anonymous>) at processTicksAndRejections (node:internal/process/task_queues:96:5) at Context.<anonymous> (delete_comment.ts:141:11) at Object.apply (wrap_function.js:73:16) ``` First failure: [CI Build - main](https://buildkite.com/elastic/kibana-on-merge/builds/29046#01879486-2187-450d-a7ac-f23bbac98baa) <!-- kibanaCiData = {"failed-test":{"test.class":"X-Pack Case API Integration Tests.x-pack/test/cases_api_integration/security_and_spaces/tests/common/comments/delete_comment·ts","test.name":"cases security and spaces enabled: trial Common delete_comment alerts security_solution removes a case from the alert schema when deleting an alert attachment","test.failCount":1}} -->
1.0
Failing test: X-Pack Case API Integration Tests.x-pack/test/cases_api_integration/security_and_spaces/tests/common/comments/delete_comment·ts - cases security and spaces enabled: trial Common delete_comment alerts security_solution removes a case from the alert schema when deleting an alert attachment - A test failed on a tracked branch ``` TypeError: Cannot read properties of undefined (reading '_id') at map (alerts.ts:127:46) at Array.map (<anonymous>) at createCaseAttachAlertAndDeleteAlert (alerts.ts:127:25) at runMicrotasks (<anonymous>) at processTicksAndRejections (node:internal/process/task_queues:96:5) at Context.<anonymous> (delete_comment.ts:141:11) at Object.apply (wrap_function.js:73:16) ``` First failure: [CI Build - main](https://buildkite.com/elastic/kibana-on-merge/builds/29046#01879486-2187-450d-a7ac-f23bbac98baa) <!-- kibanaCiData = {"failed-test":{"test.class":"X-Pack Case API Integration Tests.x-pack/test/cases_api_integration/security_and_spaces/tests/common/comments/delete_comment·ts","test.name":"cases security and spaces enabled: trial Common delete_comment alerts security_solution removes a case from the alert schema when deleting an alert attachment","test.failCount":1}} -->
non_priority
failing test x pack case api integration tests x pack test cases api integration security and spaces tests common comments delete comment·ts cases security and spaces enabled trial common delete comment alerts security solution removes a case from the alert schema when deleting an alert attachment a test failed on a tracked branch typeerror cannot read properties of undefined reading id at map alerts ts at array map at createcaseattachalertanddeletealert alerts ts at runmicrotasks at processticksandrejections node internal process task queues at context delete comment ts at object apply wrap function js first failure
0
337,424
30,247,963,562
IssuesEvent
2023-07-06 18:01:30
unifyai/ivy
https://api.github.com/repos/unifyai/ivy
reopened
Fix raw_ops.test_tensorflow_transpose
TensorFlow Frontend Sub Task Failing Test
| | | |---|---| |torch|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a> |numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a> |jax|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a> |tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a> |paddle|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a>
1.0
Fix raw_ops.test_tensorflow_transpose - | | | |---|---| |torch|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a> |numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a> |jax|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a> |tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a> |paddle|<a href="https://github.com/unifyai/ivy/actions/runs/5478319447"><img src=https://img.shields.io/badge/-failure-red></a>
non_priority
fix raw ops test tensorflow transpose torch a href src numpy a href src jax a href src tensorflow a href src paddle a href src
0
30,715
7,245,823,993
IssuesEvent
2018-02-14 19:25:50
dart-lang/sdk
https://api.github.com/repos/dart-lang/sdk
closed
Rename the class Resource in analyzer package to not conflict with Resource in dart:core
P2 medium Type: code health area-analyzer
A recent change introduced a new class named Resource in dart:core. This caused warnings in analyzer and analysis_server. The warnings have been (temporarily) fixed by hiding the core class, but the longer-term solution is to rename (and possibly rework) the Resource class in analyzer.
1.0
Rename the class Resource in analyzer package to not conflict with Resource in dart:core - A recent change introduced a new class named Resource in dart:core. This caused warnings in analyzer and analysis_server. The warnings have been (temporarily) fixed by hiding the core class, but the longer-term solution is to rename (and possibly rework) the Resource class in analyzer.
non_priority
rename the class resource in analyzer package to not conflict with resource in dart core a recent change introduced a new class named resource in dart core this caused warnings in analyzer and analysis server the warnings have been temporarily fixed by hiding the core class but the longer term solution is to rename and possibly rework the resource class in analyzer
0
272,081
23,653,003,828
IssuesEvent
2022-08-26 08:34:14
FlightControl-Master/MOOSE
https://api.github.com/repos/FlightControl-Master/MOOSE
closed
Range unit movement not work
Bug Ready for Testing Fix Implemented
Hi, reviewing well all the documentation, I have come across the "randommove" RANGE.AddBombingTargets(targetnames, goodhitrange, randommove) function. Well, I define it like this: local bombtargets= {"Bomb1", "Bomb2", "Bomb3"} local bombtargets2={"M1", "M2", "M3"} Range:AddBombingTargets(bombtargets1, 50) Range:AddBombingTargets(bombtargets2, 10, true) But it still doesn't work (it gives me the valuation with the starting point of the moving unit. According to the documentation, the best thing to do is to make the route in the editor (I already have it made in the editor). But it does not "update" in the script the position of the objects M1, M2 and M3 (bombtargets2). Thanks you Edit: M1, M2 and M3, are M113 with a circular route (last point goes to the first) put in immortal and driveable, this put in the editor
1.0
Range unit movement not work - Hi, reviewing well all the documentation, I have come across the "randommove" RANGE.AddBombingTargets(targetnames, goodhitrange, randommove) function. Well, I define it like this: local bombtargets= {"Bomb1", "Bomb2", "Bomb3"} local bombtargets2={"M1", "M2", "M3"} Range:AddBombingTargets(bombtargets1, 50) Range:AddBombingTargets(bombtargets2, 10, true) But it still doesn't work (it gives me the valuation with the starting point of the moving unit. According to the documentation, the best thing to do is to make the route in the editor (I already have it made in the editor). But it does not "update" in the script the position of the objects M1, M2 and M3 (bombtargets2). Thanks you Edit: M1, M2 and M3, are M113 with a circular route (last point goes to the first) put in immortal and driveable, this put in the editor
non_priority
range unit movement not work hi reviewing well all the documentation i have come across the randommove range addbombingtargets targetnames goodhitrange randommove function well i define it like this local bombtargets local range addbombingtargets range addbombingtargets true but it still doesn t work it gives me the valuation with the starting point of the moving unit according to the documentation the best thing to do is to make the route in the editor i already have it made in the editor but it does not update in the script the position of the objects and thanks you edit and are with a circular route last point goes to the first put in immortal and driveable this put in the editor
0
45,826
11,739,959,396
IssuesEvent
2020-03-11 18:40:20
lowRISC/ibex
https://api.github.com/repos/lowRISC/ibex
opened
[tracking] Use Verible's verilog_format for code formatting
Component:Tool-and-Build Type:Enhancement
Verible's verilog_format is a automatic code formatter. We want to be able to run it on our code base, ultimately in "enforcing" mode, requiring all submissions to be formatted with this tool. This is the same approach we take with clang-format and C/C++ files. This issue is to track the progress towards that. Ibex TODO: - [ ] Add Verible format support to edalize - [ ] Add a fusesoc target to our core files - [ ] Add Verible format in non-enforcing mode to CI - [ ] Document how to use it - [ ] Clean up existing code once the auto-formatted style matches our expectations. - [ ] Switch to enforcing mode. Blocking Verible bugs: - [ ] https://github.com/google/verible/issues/228
1.0
[tracking] Use Verible's verilog_format for code formatting - Verible's verilog_format is a automatic code formatter. We want to be able to run it on our code base, ultimately in "enforcing" mode, requiring all submissions to be formatted with this tool. This is the same approach we take with clang-format and C/C++ files. This issue is to track the progress towards that. Ibex TODO: - [ ] Add Verible format support to edalize - [ ] Add a fusesoc target to our core files - [ ] Add Verible format in non-enforcing mode to CI - [ ] Document how to use it - [ ] Clean up existing code once the auto-formatted style matches our expectations. - [ ] Switch to enforcing mode. Blocking Verible bugs: - [ ] https://github.com/google/verible/issues/228
non_priority
use verible s verilog format for code formatting verible s verilog format is a automatic code formatter we want to be able to run it on our code base ultimately in enforcing mode requiring all submissions to be formatted with this tool this is the same approach we take with clang format and c c files this issue is to track the progress towards that ibex todo add verible format support to edalize add a fusesoc target to our core files add verible format in non enforcing mode to ci document how to use it clean up existing code once the auto formatted style matches our expectations switch to enforcing mode blocking verible bugs
0
365,703
25,548,876,264
IssuesEvent
2022-11-29 21:27:20
UB-ES-2022-A3/usArt
https://api.github.com/repos/UB-ES-2022-A3/usArt
closed
(Code Spike) Servidor de Recursos
documentation enhancement frontend backend refactor
Es necesario un servidor de recursos aparte para poder guardar las imagenes y medios distintos para reducir costes y disponibilidad.
1.0
(Code Spike) Servidor de Recursos - Es necesario un servidor de recursos aparte para poder guardar las imagenes y medios distintos para reducir costes y disponibilidad.
non_priority
code spike servidor de recursos es necesario un servidor de recursos aparte para poder guardar las imagenes y medios distintos para reducir costes y disponibilidad
0
47,064
13,056,026,176
IssuesEvent
2020-07-30 03:25:48
icecube-trac/tix2
https://api.github.com/repos/icecube-trac/tix2
opened
[wavedeform] Timing Test Fails (Trac #2379)
Incomplete Migration Migrated from Trac combo core defect
Migrated from https://code.icecube.wisc.edu/ticket/2379 ```json { "status": "closed", "changetime": "2020-06-24T12:31:42", "description": "{{{\n$ ./wavedeform/resources/test/wavedeform_time_test.py \nINFO (I3InfiniteSource): Prefixing with filename/url /home/olivas/icecube/test-data/trunk/GCD/GeoCalibDetectorStatus_IC86.55697_corrected_V2.i3.gz (I3InfiniteSource.cxx:56 in virtual void I3InfiniteSource::Configure())\nF.\n======================================================================\nFAIL: testLeadingEdgeTime (__main__.TimeCheck)\n----------------------------------------------------------------------\nTraceback (most recent call last):\n File \"./wavedeform/resources/test/wavedeform_time_test.py\", line 66, in testLeadingEdgeTime\n recofirst, margin, margin*recowidth, om))\nAssertionError: False is not true : Sim time (197.029290) and reco time (249.747500) match to within 10 sigma (8.250000 ns) in OM OMKey(21,1,0)\n\n----------------------------------------------------------------------\nRan 2 tests in 0.006s\n\nFAILED (failures=1)\n}}}", "reporter": "olivas", "cc": "", "resolution": "fixed", "_ts": "1593001902142004", "component": "combo core", "summary": "[wavedeform] Timing Test Fails", "priority": "blocker", "keywords": "", "time": "2019-12-10T14:35:56", "milestone": "Autumnal Equinox 2020", "owner": "jbraun", "type": "defect" } ```
1.0
[wavedeform] Timing Test Fails (Trac #2379) - Migrated from https://code.icecube.wisc.edu/ticket/2379 ```json { "status": "closed", "changetime": "2020-06-24T12:31:42", "description": "{{{\n$ ./wavedeform/resources/test/wavedeform_time_test.py \nINFO (I3InfiniteSource): Prefixing with filename/url /home/olivas/icecube/test-data/trunk/GCD/GeoCalibDetectorStatus_IC86.55697_corrected_V2.i3.gz (I3InfiniteSource.cxx:56 in virtual void I3InfiniteSource::Configure())\nF.\n======================================================================\nFAIL: testLeadingEdgeTime (__main__.TimeCheck)\n----------------------------------------------------------------------\nTraceback (most recent call last):\n File \"./wavedeform/resources/test/wavedeform_time_test.py\", line 66, in testLeadingEdgeTime\n recofirst, margin, margin*recowidth, om))\nAssertionError: False is not true : Sim time (197.029290) and reco time (249.747500) match to within 10 sigma (8.250000 ns) in OM OMKey(21,1,0)\n\n----------------------------------------------------------------------\nRan 2 tests in 0.006s\n\nFAILED (failures=1)\n}}}", "reporter": "olivas", "cc": "", "resolution": "fixed", "_ts": "1593001902142004", "component": "combo core", "summary": "[wavedeform] Timing Test Fails", "priority": "blocker", "keywords": "", "time": "2019-12-10T14:35:56", "milestone": "Autumnal Equinox 2020", "owner": "jbraun", "type": "defect" } ```
non_priority
timing test fails trac migrated from json status closed changetime description n wavedeform resources test wavedeform time test py ninfo prefixing with filename url home olivas icecube test data trunk gcd geocalibdetectorstatus corrected gz cxx in virtual void configure nf n nfail testleadingedgetime main timecheck n ntraceback most recent call last n file wavedeform resources test wavedeform time test py line in testleadingedgetime n recofirst margin margin recowidth om nassertionerror false is not true sim time and reco time match to within sigma ns in om omkey n n nran tests in n nfailed failures n reporter olivas cc resolution fixed ts component combo core summary timing test fails priority blocker keywords time milestone autumnal equinox owner jbraun type defect
0
37,108
8,213,665,234
IssuesEvent
2018-09-04 20:18:26
opencv/opencv
https://api.github.com/repos/opencv/opencv
closed
dereferencing of a potential null pointer
bug category: imgcodecs
##### System information (version) - OpenCV => github master branch. - Operating System / Platform => ubuntu 1804 - Compiler => gcc 7 ##### Detailed description In the function _imread_( const String& filename, int flags, int hdrtype, Mat* mat=0 ) from opencv/modules/imgcodecs/src/loadsave.cpp (line:401) ,there are some places of dereferencing mat without checking if it is nullptr,for example: > 484 else 485 { 486 mat->create( size.height, size.width, type ); 487 data = mat; 488 } > Please fix such code. ##### Steps to reproduce see the code.
1.0
dereferencing of a potential null pointer - ##### System information (version) - OpenCV => github master branch. - Operating System / Platform => ubuntu 1804 - Compiler => gcc 7 ##### Detailed description In the function _imread_( const String& filename, int flags, int hdrtype, Mat* mat=0 ) from opencv/modules/imgcodecs/src/loadsave.cpp (line:401) ,there are some places of dereferencing mat without checking if it is nullptr,for example: > 484 else 485 { 486 mat->create( size.height, size.width, type ); 487 data = mat; 488 } > Please fix such code. ##### Steps to reproduce see the code.
non_priority
dereferencing of a potential null pointer system information version opencv github master branch operating system platform ubuntu compiler gcc detailed description in the function imread const string filename int flags int hdrtype mat mat from opencv modules imgcodecs src loadsave cpp line there are some places of dereferencing mat without checking if it is nullptr for example else mat create size height size width type data mat please fix such code steps to reproduce see the code
0
190,611
15,252,262,094
IssuesEvent
2021-02-20 02:10:31
Joe91/fun-bots
https://api.github.com/repos/Joe91/fun-bots
closed
F12 GUI interface cannot save the sethings to config.lua profile
documentation invalid
Im afraid that "record traces" have the same problem...and im not sure if it is the system permission problem(since everything "have to" run as the fxxking Administrator hh) for example I change this function to '2' and click "save"(yes,save,not"temp... save"): ![image](https://user-images.githubusercontent.com/38837698/108542350-96bb4300-731e-11eb-82c2-a2bf3984f5e4.png) theoretically this line should be : maxReconBots = 2, -- maximum number of Bots with Recon Kit howerver when i open the config.lua : maxReconBots = -1, -- maximum number of Bots with Recon Kit Never changed...
1.0
F12 GUI interface cannot save the sethings to config.lua profile - Im afraid that "record traces" have the same problem...and im not sure if it is the system permission problem(since everything "have to" run as the fxxking Administrator hh) for example I change this function to '2' and click "save"(yes,save,not"temp... save"): ![image](https://user-images.githubusercontent.com/38837698/108542350-96bb4300-731e-11eb-82c2-a2bf3984f5e4.png) theoretically this line should be : maxReconBots = 2, -- maximum number of Bots with Recon Kit howerver when i open the config.lua : maxReconBots = -1, -- maximum number of Bots with Recon Kit Never changed...
non_priority
gui interface cannot save the sethings to config lua profile im afraid that record traces have the same problem and im not sure if it is the system permission problem since everything have to run as the fxxking administrator hh for example i change this function to and click save yes save not temp save theoretically this line should be : maxreconbots maximum number of bots with recon kit howerver when i open the config lua maxreconbots maximum number of bots with recon kit never changed
0
147,812
23,277,365,986
IssuesEvent
2022-08-05 08:34:52
Azure/autorest.java
https://api.github.com/repos/Azure/autorest.java
closed
Generate models with enum properties
design-discussion DPG/RLC v2.0b1 DPG/RLC August MVP
Design model generation for models containing enums and expandable string enums. More details to follow on how cadl defines enum and expandable string enums.
1.0
Generate models with enum properties - Design model generation for models containing enums and expandable string enums. More details to follow on how cadl defines enum and expandable string enums.
non_priority
generate models with enum properties design model generation for models containing enums and expandable string enums more details to follow on how cadl defines enum and expandable string enums
0
146,921
19,471,242,121
IssuesEvent
2021-12-24 01:45:27
Baneeishaque/Scrap_Flipkart_Laptops
https://api.github.com/repos/Baneeishaque/Scrap_Flipkart_Laptops
opened
CVE-2021-33430 (High) detected in numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl
security vulnerability
## CVE-2021-33430 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>NumPy is the fundamental package for array computing with Python.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/3a/5f/47e578b3ae79e2624e205445ab77a1848acdaa2929a00eeef6b16eaaeb20/numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/3a/5f/47e578b3ae79e2624e205445ab77a1848acdaa2929a00eeef6b16eaaeb20/numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: Scrap_Flipkart_Laptops/requirements.txt</p> <p>Path to vulnerable library: Scrap_Flipkart_Laptops/requirements.txt</p> <p> Dependency Hierarchy: - pandas-0.24.2-cp27-cp27mu-manylinux1_x86_64.whl (Root Library) - :x: **numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. <p>Publish Date: 2021-12-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33430>CVE-2021-33430</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33430">https://nvd.nist.gov/vuln/detail/CVE-2021-33430</a></p> <p>Release Date: 2021-12-17</p> <p>Fix Resolution: numpy - 1.21.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-33430 (High) detected in numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl - ## CVE-2021-33430 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>NumPy is the fundamental package for array computing with Python.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/3a/5f/47e578b3ae79e2624e205445ab77a1848acdaa2929a00eeef6b16eaaeb20/numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/3a/5f/47e578b3ae79e2624e205445ab77a1848acdaa2929a00eeef6b16eaaeb20/numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: Scrap_Flipkart_Laptops/requirements.txt</p> <p>Path to vulnerable library: Scrap_Flipkart_Laptops/requirements.txt</p> <p> Dependency Hierarchy: - pandas-0.24.2-cp27-cp27mu-manylinux1_x86_64.whl (Root Library) - :x: **numpy-1.16.6-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. <p>Publish Date: 2021-12-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33430>CVE-2021-33430</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33430">https://nvd.nist.gov/vuln/detail/CVE-2021-33430</a></p> <p>Release Date: 2021-12-17</p> <p>Fix Resolution: numpy - 1.21.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in numpy whl cve high severity vulnerability vulnerable library numpy whl numpy is the fundamental package for array computing with python library home page a href path to dependency file scrap flipkart laptops requirements txt path to vulnerable library scrap flipkart laptops requirements txt dependency hierarchy pandas whl root library x numpy whl vulnerable library vulnerability details a buffer overflow vulnerability exists in numpy x in the pyarray newfromdescr int function of ctors c when specifying arrays of large dimensions over from python code which could let a malicious user cause a denial of service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution numpy step up your open source security game with whitesource
0
35,161
4,631,296,260
IssuesEvent
2016-09-28 15:06:40
xiaohanyu/org-site
https://api.github.com/repos/xiaohanyu/org-site
closed
Theme customization guide and some more theme?
design enhancement
Design ---------- Theme support and easy customization is one of the most important design goals of org-site. Internally, org-site use `mustache.el` and html template to generate html pages, these process need a explicit interface guide to facilitate third-party theme customization, for example, which variable represents: - site title - site author - site url - page toc - page contents And based on the detailed, explicit theme customization guide, we can provide more built-in theme support. Implementation ---------- These feature contains documentation and coding work, and I think documentation work is more time-consuming than coding work.
1.0
Theme customization guide and some more theme? - Design ---------- Theme support and easy customization is one of the most important design goals of org-site. Internally, org-site use `mustache.el` and html template to generate html pages, these process need a explicit interface guide to facilitate third-party theme customization, for example, which variable represents: - site title - site author - site url - page toc - page contents And based on the detailed, explicit theme customization guide, we can provide more built-in theme support. Implementation ---------- These feature contains documentation and coding work, and I think documentation work is more time-consuming than coding work.
non_priority
theme customization guide and some more theme design theme support and easy customization is one of the most important design goals of org site internally org site use mustache el and html template to generate html pages these process need a explicit interface guide to facilitate third party theme customization for example which variable represents site title site author site url page toc page contents and based on the detailed explicit theme customization guide we can provide more built in theme support implementation these feature contains documentation and coding work and i think documentation work is more time consuming than coding work
0
142,557
21,785,122,490
IssuesEvent
2022-05-14 02:34:59
ntrappe/cse112-s22-group2
https://api.github.com/repos/ntrappe/cse112-s22-group2
closed
Design
design
**Hi-Fi Prototype Demo:** https://www.figma.com/proto/J87cj9HiQVI8xtOvtBREtT/CSE-112-Prototypes?node-id=0%3A1 Home Screen <img width="407" alt="Screen Shot 2022-05-10 at 9 13 27 PM" src="https://user-images.githubusercontent.com/33298966/167767817-6146f0ea-4f07-473d-9def-40b9da6d6405.png"> Daily Logs (Inbox) <img width="406" alt="Screen Shot 2022-05-10 at 9 13 45 PM" src="https://user-images.githubusercontent.com/33298966/167767845-9d3692c9-905d-4d8c-8325-687fcb698c86.png"> Single Daily Log <img width="414" alt="Screen Shot 2022-05-10 at 9 13 58 PM" src="https://user-images.githubusercontent.com/33298966/167767861-65476ece-ba9a-4c84-b982-bccce6d07fa9.png">
1.0
Design - **Hi-Fi Prototype Demo:** https://www.figma.com/proto/J87cj9HiQVI8xtOvtBREtT/CSE-112-Prototypes?node-id=0%3A1 Home Screen <img width="407" alt="Screen Shot 2022-05-10 at 9 13 27 PM" src="https://user-images.githubusercontent.com/33298966/167767817-6146f0ea-4f07-473d-9def-40b9da6d6405.png"> Daily Logs (Inbox) <img width="406" alt="Screen Shot 2022-05-10 at 9 13 45 PM" src="https://user-images.githubusercontent.com/33298966/167767845-9d3692c9-905d-4d8c-8325-687fcb698c86.png"> Single Daily Log <img width="414" alt="Screen Shot 2022-05-10 at 9 13 58 PM" src="https://user-images.githubusercontent.com/33298966/167767861-65476ece-ba9a-4c84-b982-bccce6d07fa9.png">
non_priority
design hi fi prototype demo home screen img width alt screen shot at pm src daily logs inbox img width alt screen shot at pm src single daily log img width alt screen shot at pm src
0
91,557
11,519,696,208
IssuesEvent
2020-02-14 13:22:41
arendst/Tasmota
https://api.github.com/repos/arendst/Tasmota
closed
poweronstate 1 not working for Sonoff Dual R2 Module both releais
as designed
<!-- Thanks for reporting a problem for this project. READ THIS FIRST: This issue template is meant to REPORT Tasmota software PROBLEMS ONLY Please DO NOT OPEN AN ISSUE: - If your Tasmota version is not the latest from the development branch, please update your device before submitting your issue. Your problem might already be solved. The latest precompiled binaries of Tasmota can be downloaded from http://thehackbox.org/tasmota/ - If you have an issue when flashing was done via Tuya Convert, please address it to Tuya Convert Team - If your issue is a flashing issue, please address it to the [Tasmota Support Chat](https://discord.gg/Ks2Kzd4) - If your issue is compilation problem, please address it to the [Tasmota Support Chat](https://discord.gg/Ks2Kzd4) - If your issue has been addressed before (i.e., duplicated issue), please ask in the original issue - If your issue is a Wi-Fi problem or MQTT problem, please try the steps provided in the [FAQ](https://tasmota.github.io/docs/#/help/FAQ) and [Troubleshooting](https://tasmota.github.io/docs/#/help/Troubleshooting) Please take a few minutes to complete the requested information below. Our ability to provide assistance is greatly hampered without it. The details requested potentially affect which options to pursue. The small amount of time you spend completing the template will also help the volunteers providing the assistance to you to reduce the time required to help you. DO NOT DELETE ANY TEXT from this template! Otherwise the issue will be auto-closed. --> ### PROBLEM DESCRIPTION poweronstate 1 not working for Sonoff Dual R2 Module for both relais only relais 2 is on after powerup. powerupstate 1 is set ### REQUESTED INFORMATION _Make sure your have performed every step and checked the applicable boxes before submitting your issue. Thank you!_ - [ ] Read the [Contributing Guide and Policy](https://github.com/arendst/Tasmota/blob/development/CONTRIBUTING.md) and [the Code of Conduct](https://github.com/arendst/Tasmota/blob/development/CODE_OF_CONDUCT.md) - [ ] Searched the problem in [issues](https://github.com/arendst/Tasmota/issues) - [ ] Searched the problem in the [docs](https://tasmota.github.io/docs/#/help/FAQ) - [x ] Searched the problem in the [forum](https://groups.google.com/d/forum/sonoffusers) - [ x] Searched the problem in the [chat](https://discord.gg/Ks2Kzd4) - [x ] Device used (e.g., Sonoff Basic): _____ - [ x] Tasmota binary firmware version number used: _____ - [x ] Pre-compiled - [ ] Self-compiled - [ ] IDE / Compiler used: _____ - [ ] Flashing tools used: _____ - [ ] Provide the output of command: `Backlog Template; Module; GPIO 255`: ``` Program Version | 8.1.0(tasmota) -- | -- 2019-12-25T12:33:25 2_6_1/2.2.2-dev(38a443e) 0T00:07:33 61 at 0xF7000 16 Software/System restart Configuration output here: ``` - [ ] If using rules, provide the output of this command: `Backlog Rule1; Rule2; Rule3`: ``` Rules output here: ``` - [ ] Provide the output of this command: `Status 0`: ``` STATUS 0 output here: `08:31:08 MQT: tele/TA_SOR2/STATE = {"Time":"2020-02-14T08:31:08","Uptime":"0T00:05:13","UptimeSec":313,"Heap":26,"SleepMode":"Dynamic","Sleep":50,"LoadAvg":19,"MqttCount":1,"POWER1":"OFF","POWER2":"ON","Wifi":{"AP":1,"SSId":"TR7272","BSSId":"36:A4:3C:DD:17:E1","Channel":6,"RSSI":100,"Signal":-49,"LinkCount":1,"Downtime":"0T00:00:06"}} 08:34:37 MQT: stat/TA_SOR2/STATUS = {"Status":{"Module":39,"FriendlyName":["TA_SOR2_1_KH","TA_SOR2_2_Anbau"],"Topic":"TA_SOR2","ButtonTopic":"0","Power":2,"PowerOnState":1,"LedState":1,"LedMask":"FFFF","SaveData":1,"SaveState":1,"SwitchTopic":"0","SwitchMode":[0,0,0,0,0,0,0,0],"ButtonRetain":0,"SwitchRetain":0,"SensorRetain":0,"PowerRetain":0}} 08:34:37 MQT: stat/TA_SOR2/STATUS1 = {"StatusPRM":{"Baudrate":115200,"GroupTopic":"tasmotas","OtaUrl":"http://thehackbox.org/tasmota/release/tasmota.bin","RestartReason":"Software/System restart","Uptime":"0T00:08:42","StartupUTC":"2020-02-14T07:25:55","Sleep":50,"CfgHolder":4617,"BootCount":16,"SaveCount":61,"SaveAddress":"F7000"}} 08:34:37 MQT: stat/TA_SOR2/STATUS2 = {"StatusFWR":{"Version":"8.1.0(tasmota)","BuildDateTime":"2019-12-25T12:33:25","Boot":31,"Core":"2_6_1","SDK":"2.2.2-dev(38a443e)","Hardware":"ESP8285","CR":"386/699"}} 08:34:37 MQT: stat/TA_SOR2/STATUS3 = {"StatusLOG":{"SerialLog":2,"WebLog":2,"MqttLog":0,"SysLog":0,"LogHost":"","LogPort":514,"SSId":["TR7272","TR_ESP"],"TelePeriod":300,"Resolution":"558180C0","SetOption":["00008009","2805C8000100060000005A00000000000000","00000000","00000000"]}} 08:34:37 MQT: stat/TA_SOR2/STATUS4 = {"StatusMEM":{"ProgramSize":566,"Free":436,"Heap":25,"ProgramFlashSize":1024,"FlashSize":1024,"FlashChipId":"144051","FlashMode":3,"Features":["00000809","8FDAE397","043683A0","22B617CD","01001BC0","00007881"],"Drivers":"1,2,3,4,5,6,7,8,9,10,12,16,18,19,20,21,22,24,26,29","Sensors":"1,2,3,4,5,6,7,8,9,10,14,15,17,18,20,22,26,34"}} 08:34:37 MQT: stat/TA_SOR2/STATUS5 = {"StatusNET":{"Hostname":"TA_SOR2-7721","IPAddress":"192.168.1.155","Gateway":"192.168.0.31","Subnetmask":"255.255.240.0","DNSServer":"1.1.1.1","Mac":"2C:F4:32:A5:3E:29","Webserver":2,"WifiConfig":4}} 08:34:37 MQT: stat/TA_SOR2/STATUS6 = {"StatusMQT":{"MqttHost":"192.168.0.9","MqttPort":1893,"MqttClientMask":"DVES_%06X","MqttClient":"DVES_A53E29","MqttUser":"DVES_USER","MqttCount":1,"MAX_PACKET_SIZE":1000,"KEEPALIVE":30}} 08:34:37 MQT: stat/TA_SOR2/STATUS7 = {"StatusTIM":{"UTC":"Fri Feb 14 07:34:37 2020","Local":"Fri Feb 14 08:34:37 2020","StartDST":"Sun Mar 29 02:00:00 2020","EndDST":"Sun Oct 25 03:00:00 2020","Timezone":"+01:00","Sunrise":"08:00","Sunset":"18:08"}} 08:34:37 MQT: stat/TA_SOR2/STATUS10 = {"StatusSNS":{"Time":"2020-02-14T08:34:37"}} 08:34:37 MQT: stat/TA_SOR2/STATUS11 = {"StatusSTS":{"Time":"2020-02-14T08:34:37","Uptime":"0T00:08:42","UptimeSec":522,"Heap":25,"SleepMode":"Dynamic","Sleep":50,"LoadAvg":19,"MqttCount":1,"POWER1":"OFF","POWER2":"ON","Wifi":{"AP":1,"SSId":"TR7272","BSSId":"36:A4:3C:DD:17:E1","Channel":6,"RSSI":100,"Signal":-50,"LinkCount":1,"Downtime":"0T00:00:06"}}}` ``` - [ ] Provide the output of the Console log output when you experience your issue; if applicable: _(Please use_ `weblog 4` _for more debug information)_ ``` Console output here: ``` ### TO REPRODUCE _Steps to reproduce the behavior:_ ### EXPECTED BEHAVIOUR _A clear and concise description of what you expected to happen._ ### SCREENSHOTS _If applicable, add screenshots to help explain your problem._ ### ADDITIONAL CONTEXT _Add any other context about the problem here._ **(Please, remember to close the issue when the problem has been addressed)**
1.0
poweronstate 1 not working for Sonoff Dual R2 Module both releais - <!-- Thanks for reporting a problem for this project. READ THIS FIRST: This issue template is meant to REPORT Tasmota software PROBLEMS ONLY Please DO NOT OPEN AN ISSUE: - If your Tasmota version is not the latest from the development branch, please update your device before submitting your issue. Your problem might already be solved. The latest precompiled binaries of Tasmota can be downloaded from http://thehackbox.org/tasmota/ - If you have an issue when flashing was done via Tuya Convert, please address it to Tuya Convert Team - If your issue is a flashing issue, please address it to the [Tasmota Support Chat](https://discord.gg/Ks2Kzd4) - If your issue is compilation problem, please address it to the [Tasmota Support Chat](https://discord.gg/Ks2Kzd4) - If your issue has been addressed before (i.e., duplicated issue), please ask in the original issue - If your issue is a Wi-Fi problem or MQTT problem, please try the steps provided in the [FAQ](https://tasmota.github.io/docs/#/help/FAQ) and [Troubleshooting](https://tasmota.github.io/docs/#/help/Troubleshooting) Please take a few minutes to complete the requested information below. Our ability to provide assistance is greatly hampered without it. The details requested potentially affect which options to pursue. The small amount of time you spend completing the template will also help the volunteers providing the assistance to you to reduce the time required to help you. DO NOT DELETE ANY TEXT from this template! Otherwise the issue will be auto-closed. --> ### PROBLEM DESCRIPTION poweronstate 1 not working for Sonoff Dual R2 Module for both relais only relais 2 is on after powerup. powerupstate 1 is set ### REQUESTED INFORMATION _Make sure your have performed every step and checked the applicable boxes before submitting your issue. Thank you!_ - [ ] Read the [Contributing Guide and Policy](https://github.com/arendst/Tasmota/blob/development/CONTRIBUTING.md) and [the Code of Conduct](https://github.com/arendst/Tasmota/blob/development/CODE_OF_CONDUCT.md) - [ ] Searched the problem in [issues](https://github.com/arendst/Tasmota/issues) - [ ] Searched the problem in the [docs](https://tasmota.github.io/docs/#/help/FAQ) - [x ] Searched the problem in the [forum](https://groups.google.com/d/forum/sonoffusers) - [ x] Searched the problem in the [chat](https://discord.gg/Ks2Kzd4) - [x ] Device used (e.g., Sonoff Basic): _____ - [ x] Tasmota binary firmware version number used: _____ - [x ] Pre-compiled - [ ] Self-compiled - [ ] IDE / Compiler used: _____ - [ ] Flashing tools used: _____ - [ ] Provide the output of command: `Backlog Template; Module; GPIO 255`: ``` Program Version | 8.1.0(tasmota) -- | -- 2019-12-25T12:33:25 2_6_1/2.2.2-dev(38a443e) 0T00:07:33 61 at 0xF7000 16 Software/System restart Configuration output here: ``` - [ ] If using rules, provide the output of this command: `Backlog Rule1; Rule2; Rule3`: ``` Rules output here: ``` - [ ] Provide the output of this command: `Status 0`: ``` STATUS 0 output here: `08:31:08 MQT: tele/TA_SOR2/STATE = {"Time":"2020-02-14T08:31:08","Uptime":"0T00:05:13","UptimeSec":313,"Heap":26,"SleepMode":"Dynamic","Sleep":50,"LoadAvg":19,"MqttCount":1,"POWER1":"OFF","POWER2":"ON","Wifi":{"AP":1,"SSId":"TR7272","BSSId":"36:A4:3C:DD:17:E1","Channel":6,"RSSI":100,"Signal":-49,"LinkCount":1,"Downtime":"0T00:00:06"}} 08:34:37 MQT: stat/TA_SOR2/STATUS = {"Status":{"Module":39,"FriendlyName":["TA_SOR2_1_KH","TA_SOR2_2_Anbau"],"Topic":"TA_SOR2","ButtonTopic":"0","Power":2,"PowerOnState":1,"LedState":1,"LedMask":"FFFF","SaveData":1,"SaveState":1,"SwitchTopic":"0","SwitchMode":[0,0,0,0,0,0,0,0],"ButtonRetain":0,"SwitchRetain":0,"SensorRetain":0,"PowerRetain":0}} 08:34:37 MQT: stat/TA_SOR2/STATUS1 = {"StatusPRM":{"Baudrate":115200,"GroupTopic":"tasmotas","OtaUrl":"http://thehackbox.org/tasmota/release/tasmota.bin","RestartReason":"Software/System restart","Uptime":"0T00:08:42","StartupUTC":"2020-02-14T07:25:55","Sleep":50,"CfgHolder":4617,"BootCount":16,"SaveCount":61,"SaveAddress":"F7000"}} 08:34:37 MQT: stat/TA_SOR2/STATUS2 = {"StatusFWR":{"Version":"8.1.0(tasmota)","BuildDateTime":"2019-12-25T12:33:25","Boot":31,"Core":"2_6_1","SDK":"2.2.2-dev(38a443e)","Hardware":"ESP8285","CR":"386/699"}} 08:34:37 MQT: stat/TA_SOR2/STATUS3 = {"StatusLOG":{"SerialLog":2,"WebLog":2,"MqttLog":0,"SysLog":0,"LogHost":"","LogPort":514,"SSId":["TR7272","TR_ESP"],"TelePeriod":300,"Resolution":"558180C0","SetOption":["00008009","2805C8000100060000005A00000000000000","00000000","00000000"]}} 08:34:37 MQT: stat/TA_SOR2/STATUS4 = {"StatusMEM":{"ProgramSize":566,"Free":436,"Heap":25,"ProgramFlashSize":1024,"FlashSize":1024,"FlashChipId":"144051","FlashMode":3,"Features":["00000809","8FDAE397","043683A0","22B617CD","01001BC0","00007881"],"Drivers":"1,2,3,4,5,6,7,8,9,10,12,16,18,19,20,21,22,24,26,29","Sensors":"1,2,3,4,5,6,7,8,9,10,14,15,17,18,20,22,26,34"}} 08:34:37 MQT: stat/TA_SOR2/STATUS5 = {"StatusNET":{"Hostname":"TA_SOR2-7721","IPAddress":"192.168.1.155","Gateway":"192.168.0.31","Subnetmask":"255.255.240.0","DNSServer":"1.1.1.1","Mac":"2C:F4:32:A5:3E:29","Webserver":2,"WifiConfig":4}} 08:34:37 MQT: stat/TA_SOR2/STATUS6 = {"StatusMQT":{"MqttHost":"192.168.0.9","MqttPort":1893,"MqttClientMask":"DVES_%06X","MqttClient":"DVES_A53E29","MqttUser":"DVES_USER","MqttCount":1,"MAX_PACKET_SIZE":1000,"KEEPALIVE":30}} 08:34:37 MQT: stat/TA_SOR2/STATUS7 = {"StatusTIM":{"UTC":"Fri Feb 14 07:34:37 2020","Local":"Fri Feb 14 08:34:37 2020","StartDST":"Sun Mar 29 02:00:00 2020","EndDST":"Sun Oct 25 03:00:00 2020","Timezone":"+01:00","Sunrise":"08:00","Sunset":"18:08"}} 08:34:37 MQT: stat/TA_SOR2/STATUS10 = {"StatusSNS":{"Time":"2020-02-14T08:34:37"}} 08:34:37 MQT: stat/TA_SOR2/STATUS11 = {"StatusSTS":{"Time":"2020-02-14T08:34:37","Uptime":"0T00:08:42","UptimeSec":522,"Heap":25,"SleepMode":"Dynamic","Sleep":50,"LoadAvg":19,"MqttCount":1,"POWER1":"OFF","POWER2":"ON","Wifi":{"AP":1,"SSId":"TR7272","BSSId":"36:A4:3C:DD:17:E1","Channel":6,"RSSI":100,"Signal":-50,"LinkCount":1,"Downtime":"0T00:00:06"}}}` ``` - [ ] Provide the output of the Console log output when you experience your issue; if applicable: _(Please use_ `weblog 4` _for more debug information)_ ``` Console output here: ``` ### TO REPRODUCE _Steps to reproduce the behavior:_ ### EXPECTED BEHAVIOUR _A clear and concise description of what you expected to happen._ ### SCREENSHOTS _If applicable, add screenshots to help explain your problem._ ### ADDITIONAL CONTEXT _Add any other context about the problem here._ **(Please, remember to close the issue when the problem has been addressed)**
non_priority
poweronstate not working for sonoff dual module both releais thanks for reporting a problem for this project read this first this issue template is meant to report tasmota software problems only please do not open an issue if your tasmota version is not the latest from the development branch please update your device before submitting your issue your problem might already be solved the latest precompiled binaries of tasmota can be downloaded from if you have an issue when flashing was done via tuya convert please address it to tuya convert team if your issue is a flashing issue please address it to the if your issue is compilation problem please address it to the if your issue has been addressed before i e duplicated issue please ask in the original issue if your issue is a wi fi problem or mqtt problem please try the steps provided in the and please take a few minutes to complete the requested information below our ability to provide assistance is greatly hampered without it the details requested potentially affect which options to pursue the small amount of time you spend completing the template will also help the volunteers providing the assistance to you to reduce the time required to help you do not delete any text from this template otherwise the issue will be auto closed problem description poweronstate not working for sonoff dual module for both relais only relais is on after powerup powerupstate is set requested information make sure your have performed every step and checked the applicable boxes before submitting your issue thank you read the and searched the problem in searched the problem in the searched the problem in the searched the problem in the device used e g sonoff basic tasmota binary firmware version number used pre compiled self compiled ide compiler used flashing tools used provide the output of command backlog template module gpio program version tasmota dev at software system restart configuration output here if using rules provide the output of this command backlog rules output here provide the output of this command status status output here mqt tele ta state time uptime uptimesec heap sleepmode dynamic sleep loadavg mqttcount off on wifi ap ssid bssid dd channel rssi signal linkcount downtime mqt stat ta status status module friendlyname topic ta buttontopic power poweronstate ledstate ledmask ffff savedata savestate switchtopic switchmode buttonretain switchretain sensorretain powerretain mqt stat ta statusprm baudrate grouptopic tasmotas otaurl restart uptime startuputc sleep cfgholder bootcount savecount saveaddress mqt stat ta statusfwr version tasmota builddatetime boot core sdk dev hardware cr mqt stat ta statuslog seriallog weblog mqttlog syslog loghost logport ssid teleperiod resolution setoption mqt stat ta statusmem programsize free heap programflashsize flashsize flashchipid flashmode features drivers sensors mqt stat ta statusnet hostname ta ipaddress gateway subnetmask dnsserver mac webserver wificonfig mqt stat ta statusmqt mqtthost mqttport mqttclientmask dves mqttclient dves mqttuser dves user mqttcount max packet size keepalive mqt stat ta statustim utc fri feb local fri feb startdst sun mar enddst sun oct timezone sunrise sunset mqt stat ta statussns time mqt stat ta statussts time uptime uptimesec heap sleepmode dynamic sleep loadavg mqttcount off on wifi ap ssid bssid dd channel rssi signal linkcount downtime provide the output of the console log output when you experience your issue if applicable please use weblog for more debug information console output here to reproduce steps to reproduce the behavior expected behaviour a clear and concise description of what you expected to happen screenshots if applicable add screenshots to help explain your problem additional context add any other context about the problem here please remember to close the issue when the problem has been addressed
0
35,082
7,548,952,683
IssuesEvent
2018-04-18 12:57:19
STEllAR-GROUP/phylanx
https://api.github.com/repos/STEllAR-GROUP/phylanx
closed
-1 is not the same as -(1)
category: PhySL type: defect
The last two calls to cout should print the same thing, but physl interprets -(1) and -1 differently. ``` block( define(a,[1,2,3,4]), cout(slice(a,'(0,4))), cout(slice(a,'(0,-1))), cout(slice(a,'(0,-(1)))) ) ```
1.0
-1 is not the same as -(1) - The last two calls to cout should print the same thing, but physl interprets -(1) and -1 differently. ``` block( define(a,[1,2,3,4]), cout(slice(a,'(0,4))), cout(slice(a,'(0,-1))), cout(slice(a,'(0,-(1)))) ) ```
non_priority
is not the same as the last two calls to cout should print the same thing but physl interprets and differently block define a cout slice a cout slice a cout slice a
0
131,025
18,171,039,287
IssuesEvent
2021-09-27 20:04:39
GlobalNOC/OESS
https://api.github.com/repos/GlobalNOC/OESS
opened
show the circuit name as well as the description
Enhancement Design Frontend
The circuit name and description should be shown in both the home page (/OESS) and the circuit details page. Currently only the circuit description is shown. See SCTASK0081460 for original request
1.0
show the circuit name as well as the description - The circuit name and description should be shown in both the home page (/OESS) and the circuit details page. Currently only the circuit description is shown. See SCTASK0081460 for original request
non_priority
show the circuit name as well as the description the circuit name and description should be shown in both the home page oess and the circuit details page currently only the circuit description is shown see for original request
0
294,998
22,173,281,021
IssuesEvent
2022-06-06 04:59:27
katesavo/homepage
https://api.github.com/repos/katesavo/homepage
closed
create contact info
documentation
Посилання на соцмережі (Facebook чи Instagram, тощо), номер телефону чи адреса електронної скриньки, тощо. Може не всі лінки в світі, а тільки ті, що дійсно доречні.
1.0
create contact info - Посилання на соцмережі (Facebook чи Instagram, тощо), номер телефону чи адреса електронної скриньки, тощо. Може не всі лінки в світі, а тільки ті, що дійсно доречні.
non_priority
create contact info посилання на соцмережі facebook чи instagram тощо номер телефону чи адреса електронної скриньки тощо може не всі лінки в світі а тільки ті що дійсно доречні
0
25,234
7,657,314,653
IssuesEvent
2018-05-10 19:14:09
patternfly/patternfly-next
https://api.github.com/repos/patternfly/patternfly-next
closed
Add sass prettier for autoformatting/linting enforcement
build
Add the sass prettier/pre-commit hooks to ensure sass is formatted in a standard way for developers
1.0
Add sass prettier for autoformatting/linting enforcement - Add the sass prettier/pre-commit hooks to ensure sass is formatted in a standard way for developers
non_priority
add sass prettier for autoformatting linting enforcement add the sass prettier pre commit hooks to ensure sass is formatted in a standard way for developers
0
11,919
4,320,635,453
IssuesEvent
2016-07-25 06:33:41
OuiShare/OuiShare
https://api.github.com/repos/OuiShare/OuiShare
opened
website field validation on user profile
backend bug code
On member signup page and profile, - website field should validate in another way than requiring http:// - it should automatically add http:// in front of field content in case it is missing, and then trying to validate
1.0
website field validation on user profile - On member signup page and profile, - website field should validate in another way than requiring http:// - it should automatically add http:// in front of field content in case it is missing, and then trying to validate
non_priority
website field validation on user profile on member signup page and profile website field should validate in another way than requiring http it should automatically add http in front of field content in case it is missing and then trying to validate
0
137,028
11,096,514,268
IssuesEvent
2019-12-16 11:18:59
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
opened
ClientEntryLoadedListenerTest.load_listener_notified_but_add_listener_not_notified_after_loadAll test failure
Team: Client Type: Test-Failure
`ClientEntryLoadedListenerTest.load_listener_notified_but_add_listener_not_notified_after_loadAll` seems to be flaky. Observed here: http://jenkins.hazelcast.com/job/Hazelcast-pr-builder/5079/testReport/junit/com.hazelcast.client.map/ClientEntryLoadedListenerTest/load_listener_notified_but_add_listener_not_notified_after_loadAll/ ``` Error Message expected:<5> but was:<3> Stacktrace java.lang.AssertionError: expected:<5> but was:<3> at org.junit.Assert.fail(Assert.java:88) at org.junit.Assert.failNotEquals(Assert.java:834) at org.junit.Assert.assertEquals(Assert.java:645) at org.junit.Assert.assertEquals(Assert.java:631) at com.hazelcast.client.map.ClientEntryLoadedListenerTest$4.run(ClientEntryLoadedListenerTest.java:226) at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1351) at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1453) at com.hazelcast.client.map.ClientEntryLoadedListenerTest.load_listener_notified_but_add_listener_not_notified_after_loadAll(ClientEntryLoadedListenerTest.java:223) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:114) at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:106) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.lang.Thread.run(Thread.java:748) ```
1.0
ClientEntryLoadedListenerTest.load_listener_notified_but_add_listener_not_notified_after_loadAll test failure - `ClientEntryLoadedListenerTest.load_listener_notified_but_add_listener_not_notified_after_loadAll` seems to be flaky. Observed here: http://jenkins.hazelcast.com/job/Hazelcast-pr-builder/5079/testReport/junit/com.hazelcast.client.map/ClientEntryLoadedListenerTest/load_listener_notified_but_add_listener_not_notified_after_loadAll/ ``` Error Message expected:<5> but was:<3> Stacktrace java.lang.AssertionError: expected:<5> but was:<3> at org.junit.Assert.fail(Assert.java:88) at org.junit.Assert.failNotEquals(Assert.java:834) at org.junit.Assert.assertEquals(Assert.java:645) at org.junit.Assert.assertEquals(Assert.java:631) at com.hazelcast.client.map.ClientEntryLoadedListenerTest$4.run(ClientEntryLoadedListenerTest.java:226) at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1351) at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1453) at com.hazelcast.client.map.ClientEntryLoadedListenerTest.load_listener_notified_but_add_listener_not_notified_after_loadAll(ClientEntryLoadedListenerTest.java:223) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:114) at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:106) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.lang.Thread.run(Thread.java:748) ```
non_priority
cliententryloadedlistenertest load listener notified but add listener not notified after loadall test failure cliententryloadedlistenertest load listener notified but add listener not notified after loadall seems to be flaky observed here error message expected but was stacktrace java lang assertionerror expected but was at org junit assert fail assert java at org junit assert failnotequals assert java at org junit assert assertequals assert java at org junit assert assertequals assert java at com hazelcast client map cliententryloadedlistenertest run cliententryloadedlistenertest java at com hazelcast test hazelcasttestsupport asserttrueeventually hazelcasttestsupport java at com hazelcast test hazelcasttestsupport asserttrueeventually hazelcasttestsupport java at com hazelcast client map cliententryloadedlistenertest load listener notified but add listener not notified after loadall cliententryloadedlistenertest java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at java util concurrent futuretask run futuretask java at java lang thread run thread java
0
193,041
22,216,040,463
IssuesEvent
2022-06-08 01:49:42
dpteam/RK3188_TABLET
https://api.github.com/repos/dpteam/RK3188_TABLET
reopened
WS-2021-0551 (Medium) detected in linux-yocto-4.12v3.0.66
security vulnerability
## WS-2021-0551 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-4.12v3.0.66</b></p></summary> <p> <p>Linux 4.12 Embedded Kernel</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-4.12>https://git.yoctoproject.org/git/linux-yocto-4.12</a></p> <p>Found in HEAD commit: <a href="https://github.com/dpteam/RK3188_TABLET/commit/0c501f5a0fd72c7b2ac82904235363bd44fd8f9e">0c501f5a0fd72c7b2ac82904235363bd44fd8f9e</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/nfs4state.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> nfsd: fix use-after-free due to delegation race This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 148c816f10fd11df27ca6a9b3238cdd42fa72cd3. For more details please see the references link. <p>Publish Date: 2021-12-19 <p>URL: <a href=https://github.com/gregkh/linux/commit/148c816f10fd11df27ca6a9b3238cdd42fa72cd3>WS-2021-0551</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://osv.dev/vulnerability/GSD-2021-1002600">https://osv.dev/vulnerability/GSD-2021-1002600</a></p> <p>Release Date: 2021-12-19</p> <p>Fix Resolution: v5.15.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2021-0551 (Medium) detected in linux-yocto-4.12v3.0.66 - ## WS-2021-0551 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-4.12v3.0.66</b></p></summary> <p> <p>Linux 4.12 Embedded Kernel</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-4.12>https://git.yoctoproject.org/git/linux-yocto-4.12</a></p> <p>Found in HEAD commit: <a href="https://github.com/dpteam/RK3188_TABLET/commit/0c501f5a0fd72c7b2ac82904235363bd44fd8f9e">0c501f5a0fd72c7b2ac82904235363bd44fd8f9e</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/nfs4state.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> nfsd: fix use-after-free due to delegation race This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 148c816f10fd11df27ca6a9b3238cdd42fa72cd3. For more details please see the references link. <p>Publish Date: 2021-12-19 <p>URL: <a href=https://github.com/gregkh/linux/commit/148c816f10fd11df27ca6a9b3238cdd42fa72cd3>WS-2021-0551</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://osv.dev/vulnerability/GSD-2021-1002600">https://osv.dev/vulnerability/GSD-2021-1002600</a></p> <p>Release Date: 2021-12-19</p> <p>Fix Resolution: v5.15.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws medium detected in linux yocto ws medium severity vulnerability vulnerable library linux yocto linux embedded kernel library home page a href found in head commit a href found in base branch master vulnerable source files fs nfsd c vulnerability details nfsd fix use after free due to delegation race this is an automated id intended to aid in discovery of potential security vulnerabilities the actual impact and attack plausibility have not yet been proven this id is fixed in linux kernel version by commit for more details please see the references link publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
47,511
7,330,066,570
IssuesEvent
2018-03-05 08:34:49
seqan/seqan3
https://api.github.com/repos/seqan/seqan3
opened
Rephrase "Note that you cannot assign regular characters, ..."
documentation good first issue
In quite some alphabet classes we have the following paragraph: > Note that you cannot assign regular characters, but additional functions for this are available. The meaning is that you can't assign or construct the alphabet by a letter (e.g. 'A', 'C', ...) of the `char` type directly, but that you have to use the `assign_char` function for that. I think the phrase in itself does not reflect this, is kind of out of place and hard to understand.
1.0
Rephrase "Note that you cannot assign regular characters, ..." - In quite some alphabet classes we have the following paragraph: > Note that you cannot assign regular characters, but additional functions for this are available. The meaning is that you can't assign or construct the alphabet by a letter (e.g. 'A', 'C', ...) of the `char` type directly, but that you have to use the `assign_char` function for that. I think the phrase in itself does not reflect this, is kind of out of place and hard to understand.
non_priority
rephrase note that you cannot assign regular characters in quite some alphabet classes we have the following paragraph note that you cannot assign regular characters but additional functions for this are available the meaning is that you can t assign or construct the alphabet by a letter e g a c of the char type directly but that you have to use the assign char function for that i think the phrase in itself does not reflect this is kind of out of place and hard to understand
0
84,432
16,494,731,054
IssuesEvent
2021-05-25 09:05:08
robocorp/robotframework-lsp
https://api.github.com/repos/robocorp/robotframework-lsp
opened
Code completion does not work for Chinese Keywords from resources or library
bug robocorp-code
**Describe the bug** It does not work for Chinese Keywords from resources or library **Expected behavior** Support Code completion for Chinese Keywords
1.0
Code completion does not work for Chinese Keywords from resources or library - **Describe the bug** It does not work for Chinese Keywords from resources or library **Expected behavior** Support Code completion for Chinese Keywords
non_priority
code completion does not work for chinese keywords from resources or library describe the bug it does not work for chinese keywords from resources or library expected behavior support code completion for chinese keywords
0
87,738
8,120,627,905
IssuesEvent
2018-08-16 03:57:08
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
github.com/cockroachdb/cockroach/pkg/sql: TestShowSessions failed under stress
A-sql-execution C-test-failure O-robot
SHA: https://github.com/cockroachdb/cockroach/commits/faa1d2b46708f4f84cd552af6dc7258373fdebb0 Parameters: ``` TAGS= GOFLAGS= ``` Failed test: https://teamcity.cockroachdb.com/viewLog.html?buildId=758606&tab=buildLog ``` W180704 10:06:48.662022 157881 server/status/runtime.go:143 Could not parse build timestamp: parsing time "" as "2006/01/02 15:04:05": cannot parse "" as "2006" I180704 10:06:48.667703 157881 server/server.go:790 [n?] monitoring forward clock jumps based on server.clock.forward_jump_check_enabled I180704 10:06:48.674614 157881 server/config.go:545 [n?] 1 storage engine initialized I180704 10:06:48.674659 157881 server/config.go:548 [n?] RocksDB cache size: 128 MiB I180704 10:06:48.674679 157881 server/config.go:548 [n?] store 0: in-memory, size 0 B I180704 10:06:48.677171 157881 server/node.go:421 [n?] **** cluster f4bd4807-289b-447e-9af3-a9d5b1f72192 has been created I180704 10:06:48.677276 157881 server/server.go:1365 [n?] **** add additional nodes by specifying --join=127.0.0.1:41981 I180704 10:06:48.679697 157881 storage/store.go:1450 [n1,s1] [n1,s1]: failed initial metrics computation: [n1,s1]: system config not yet available I180704 10:06:48.679772 157881 server/node.go:551 [n1] initialized store [n1,s1]: disk (capacity=512 MiB, available=512 MiB, used=0 B, logicalBytes=6.9 KiB), ranges=1, leases=0, writes=0.00, bytesPerReplica={p10=7043.00 p25=7043.00 p50=7043.00 p75=7043.00 p90=7043.00 pMax=7043.00}, writesPerReplica={p10=0.00 p25=0.00 p50=0.00 p75=0.00 p90=0.00 pMax=0.00} I180704 10:06:48.679806 157881 server/node.go:399 [n1] node ID 1 initialized I180704 10:06:48.680005 157881 gossip/gossip.go:354 [n1] NodeDescriptor set to node_id:1 address:<network_field:"tcp" address_field:"127.0.0.1:41981" > attrs:<> locality:<> ServerVersion:<major_val:2 minor_val:0 patch:0 unstable:7 > I180704 10:06:48.680906 157881 storage/stores.go:222 [n1] read 0 node addresses from persistent storage I180704 10:06:48.680986 157881 server/node.go:692 [n1] connecting to gossip network to verify cluster ID... I180704 10:06:48.687559 157881 server/node.go:717 [n1] node connected via gossip and verified as part of cluster "f4bd4807-289b-447e-9af3-a9d5b1f72192" I180704 10:06:48.687590 157881 server/node.go:485 [n1] node=1: started with [<no-attributes>=<in-mem>] engine(s) and attributes [] I180704 10:06:48.687787 157881 server/config.go:331 [n1] available memory from cgroups (8.0 EiB) exceeds system memory 16 GiB, using system memory I180704 10:06:48.687811 157881 server/server.go:1794 [n1] Could not start heap profiler worker due to: directory to store profiles could not be determined I180704 10:06:48.687869 157881 server/server.go:1502 [n1] starting https server at 127.0.0.1:42301 I180704 10:06:48.687881 157881 server/server.go:1503 [n1] starting grpc/postgres server at 127.0.0.1:41981 I180704 10:06:48.687893 157881 server/server.go:1504 [n1] advertising CockroachDB node at 127.0.0.1:41981 I180704 10:06:48.689740 158095 storage/replica_command.go:279 [split,n1,s1,r1/1:/M{in-ax}] initiating a split of this range at key /System/"" [r2] I180704 10:06:48.707492 157806 storage/replica_command.go:279 [split,n1,s1,r2/1:/{System/-Max}] initiating a split of this range at key /System/NodeLiveness [r3] I180704 10:06:48.716554 158121 sql/event_log.go:126 [n1,intExec=optInToDiagnosticsStatReporting] Event: "set_cluster_setting", target: 0, info: {SettingName:diagnostics.reporting.enabled Value:true User:root} I180704 10:06:48.720504 158128 storage/replica_command.go:279 [split,n1,s1,r3/1:/{System/NodeL…-Max}] initiating a split of this range at key /System/NodeLivenessMax [r4] I180704 10:06:48.743117 158165 storage/replica_command.go:279 [split,n1,s1,r4/1:/{System/NodeL…-Max}] initiating a split of this range at key /System/tsd [r5] W180704 10:06:48.744831 158137 storage/intent_resolver.go:643 [n1,s1] failed to push during intent resolution: failed to push "sql txn" id=e112b002 key=/Table/SystemConfigSpan/Start rw=true pri=0.03297413 iso=SERIALIZABLE stat=PENDING epo=0 ts=1530698808.721835184,0 orig=1530698808.721835184,0 max=1530698808.721835184,0 wto=false rop=false seq=12 I180704 10:06:48.761191 158135 sql/event_log.go:126 [n1,intExec=set-setting] Event: "set_cluster_setting", target: 0, info: {SettingName:version Value:$1 User:root} I180704 10:06:48.763623 158141 storage/replica_command.go:279 [split,n1,s1,r5/1:/{System/tsd-Max}] initiating a split of this range at key /System/"tse" [r6] I180704 10:06:48.784470 158016 sql/event_log.go:126 [n1,intExec=disableNetTrace] Event: "set_cluster_setting", target: 0, info: {SettingName:trace.debug.enable Value:false User:root} I180704 10:06:48.790154 157870 storage/replica_command.go:279 [split,n1,s1,r6/1:/{System/tse-Max}] initiating a split of this range at key /Table/SystemConfigSpan/Start [r7] I180704 10:06:48.796817 158174 storage/replica_command.go:279 [split,n1,s1,r7/1:/{Table/System…-Max}] initiating a split of this range at key /Table/11 [r8] I180704 10:06:48.801725 158207 storage/replica_command.go:279 [split,n1,s1,r8/1:/{Table/11-Max}] initiating a split of this range at key /Table/12 [r9] I180704 10:06:48.809417 158245 storage/replica_command.go:279 [split,n1,s1,r9/1:/{Table/12-Max}] initiating a split of this range at key /Table/13 [r10] I180704 10:06:48.815126 158277 storage/replica_command.go:279 [split,n1,s1,r10/1:/{Table/13-Max}] initiating a split of this range at key /Table/14 [r11] I180704 10:06:48.819957 158152 storage/replica_command.go:279 [split,n1,s1,r11/1:/{Table/14-Max}] initiating a split of this range at key /Table/15 [r12] I180704 10:06:48.825624 158293 storage/replica_command.go:279 [split,n1,s1,r12/1:/{Table/15-Max}] initiating a split of this range at key /Table/16 [r13] W180704 10:06:48.829740 158300 storage/intent_resolver.go:643 [n1,s1] failed to push during intent resolution: failed to push "split" id=5bc5b590 key=/Local/Range/Table/15/RangeDescriptor rw=true pri=0.05293204 iso=SERIALIZABLE stat=PENDING epo=0 ts=1530698808.826453618,0 orig=1530698808.826453618,0 max=1530698808.826453618,0 wto=false rop=false seq=1 I180704 10:06:48.830982 158233 storage/replica_command.go:279 [split,n1,s1,r13/1:/{Table/16-Max}] initiating a split of this range at key /Table/17 [r14] W180704 10:06:48.836958 158307 storage/intent_resolver.go:643 [n1,s1] failed to push during intent resolution: failed to push "split" id=3f334e4f key=/Local/Range/Table/16/RangeDescriptor rw=true pri=0.05459823 iso=SERIALIZABLE stat=PENDING epo=0 ts=1530698808.831011193,0 orig=1530698808.831011193,0 max=1530698808.831011193,0 wto=false rop=false seq=1 I180704 10:06:48.838058 158235 storage/replica_command.go:279 [split,n1,s1,r14/1:/{Table/17-Max}] initiating a split of this range at key /Table/18 [r15] I180704 10:06:48.838893 158223 sql/event_log.go:126 [n1,intExec=initializeClusterSecret] Event: "set_cluster_setting", target: 0, info: {SettingName:cluster.secret Value:gen_random_uuid()::STRING User:root} I180704 10:06:48.845604 157785 sql/event_log.go:126 [n1,intExec=create-default-db] Event: "create_database", target: 50, info: {DatabaseName:defaultdb Statement:CREATE DATABASE IF NOT EXISTS defaultdb User:root} I180704 10:06:48.850186 157790 sql/event_log.go:126 [n1,intExec=create-default-db] Event: "create_database", target: 51, info: {DatabaseName:postgres Statement:CREATE DATABASE IF NOT EXISTS postgres User:root} I180704 10:06:48.858761 158310 storage/replica_command.go:279 [split,n1,s1,r15/1:/{Table/18-Max}] initiating a split of this range at key /Table/19 [r16] I180704 10:06:48.861208 157881 server/server.go:1583 [n1] done ensuring all necessary migrations have run I180704 10:06:48.861241 157881 server/server.go:1586 [n1] serving sql connections I180704 10:06:48.866005 158158 sql/event_log.go:126 [n1] Event: "node_join", target: 1, info: {Descriptor:{NodeID:1 Address:{NetworkField:tcp AddressField:127.0.0.1:41981} Attrs: Locality: ServerVersion:2.0-7} ClusterID:f4bd4807-289b-447e-9af3-a9d5b1f72192 StartedAt:1530698808687572239 LastUp:1530698808687572239} I180704 10:06:48.866744 158371 storage/replica_command.go:279 [split,n1,s1,r16/1:/{Table/19-Max}] initiating a split of this range at key /Table/20 [r17] I180704 10:06:48.873619 158156 server/server_update.go:65 [n1] no need to upgrade, cluster already at the newest version I180704 10:06:48.880019 158267 storage/replica_command.go:279 [split,n1,s1,r17/1:/{Table/20-Max}] initiating a split of this range at key /Table/21 [r18] I180704 10:06:48.895298 158380 storage/replica_command.go:279 [split,n1,s1,r18/1:/{Table/21-Max}] initiating a split of this range at key /Table/22 [r19] I180704 10:06:48.903179 158241 storage/replica_command.go:279 [split,n1,s1,r19/1:/{Table/22-Max}] initiating a split of this range at key /Table/23 [r20] I180704 10:06:48.912494 158409 storage/replica_command.go:279 [split,n1,s1,r20/1:/{Table/23-Max}] initiating a split of this range at key /Table/50 [r21] I180704 10:06:48.920722 158385 storage/replica_command.go:279 [split,n1,s1,r21/1:/{Table/50-Max}] initiating a split of this range at key /Table/51 [r22] W180704 10:06:48.931148 157881 server/status/runtime.go:143 Could not parse build timestamp: parsing time "" as "2006/01/02 15:04:05": cannot parse "" as "2006" I180704 10:06:48.934979 157881 server/server.go:790 [n?] monitoring forward clock jumps based on server.clock.forward_jump_check_enabled I180704 10:06:48.936582 157881 server/config.go:545 [n?] 1 storage engine initialized I180704 10:06:48.936638 157881 server/config.go:548 [n?] RocksDB cache size: 128 MiB I180704 10:06:48.936656 157881 server/config.go:548 [n?] store 0: in-memory, size 0 B W180704 10:06:48.936726 157881 gossip/gossip.go:1316 [n?] no incoming or outgoing connections I180704 10:06:48.936770 157881 server/server.go:1367 [n?] no stores bootstrapped and --join flag specified, awaiting init command. I180704 10:06:48.960210 158504 gossip/client.go:129 [n?] started gossip client to 127.0.0.1:41981 I180704 10:06:48.979435 158536 gossip/server.go:219 [n1] received initial cluster-verification connection from {tcp 127.0.0.1:37633} I180704 10:06:48.980565 157881 storage/stores.go:222 [n?] read 0 node addresses from persistent storage I180704 10:06:48.980601 157881 server/node.go:692 [n?] connecting to gossip network to verify cluster ID... I180704 10:06:48.980627 157881 server/node.go:717 [n?] node connected via gossip and verified as part of cluster "f4bd4807-289b-447e-9af3-a9d5b1f72192" I180704 10:06:48.980931 158557 kv/dist_sender.go:339 [n?] unable to determine this node's attributes for replica selection; node is most likely bootstrapping I180704 10:06:48.981118 158549 storage/stores.go:241 [n?] wrote 1 node addresses to persistent storage I180704 10:06:48.994302 158556 kv/dist_sender.go:339 [n?] unable to determine this node's attributes for replica selection; node is most likely bootstrapping I180704 10:06:48.995367 157881 kv/dist_sender.go:339 [n?] unable to determine this node's attributes for replica selection; node is most likely bootstrapping I180704 10:06:48.996607 157881 server/node.go:392 [n?] new node allocated ID 2 I180704 10:06:48.996708 157881 gossip/gossip.go:354 [n2] NodeDescriptor set to node_id:2 address:<network_field:"tcp" address_field:"127.0.0.1:37633" > attrs:<> locality:<> ServerVersion:<major_val:2 minor_val:0 patch:0 unstable:7 > I180704 10:06:48.996786 157881 server/node.go:466 [n2] node=2: asynchronously bootstrapping engine(s) [<no-attributes>=<in-mem>] I180704 10:06:48.996831 157881 server/node.go:485 [n2] node=2: started with [] engine(s) and attributes [] I180704 10:06:48.997093 157881 server/config.go:331 [n2] available memory from cgroups (8.0 EiB) exceeds system memory 16 GiB, using system memory I180704 10:06:48.997146 157881 server/server.go:1794 [n2] Could not start heap profiler worker due to: directory to store profiles could not be determined I180704 10:06:48.997239 157881 server/server.go:1502 [n2] starting https server at 127.0.0.1:40513 I180704 10:06:48.997279 157881 server/server.go:1503 [n2] starting grpc/postgres server at 127.0.0.1:37633 I180704 10:06:48.997309 157881 server/server.go:1504 [n2] advertising CockroachDB node at 127.0.0.1:37633 I180704 10:06:49.002680 158457 storage/stores.go:241 [n1] wrote 1 node addresses to persistent storage I180704 10:06:49.004020 157881 server/server.go:1583 [n2] done ensuring all necessary migrations have run I180704 10:06:49.004038 157881 server/server.go:1586 [n2] serving sql connections I180704 10:06:49.007983 158432 server/node.go:673 [n2] bootstrapped store [n2,s2] I180704 10:06:49.015399 158460 server/server_update.go:65 [n2] no need to upgrade, cluster already at the newest version I180704 10:06:49.015803 158462 sql/event_log.go:126 [n2] Event: "node_join", target: 2, info: {Descriptor:{NodeID:2 Address:{NetworkField:tcp AddressField:127.0.0.1:37633} Attrs: Locality: ServerVersion:2.0-7} ClusterID:f4bd4807-289b-447e-9af3-a9d5b1f72192 StartedAt:1530698808996819253 LastUp:1530698808996819253} I180704 10:06:49.042159 158726 sql/event_log.go:126 [n1,client=127.0.0.1:59146,user=root] Event: "create_database", target: 52, info: {DatabaseName:test Statement:CREATE DATABASE IF NOT EXISTS test User:root} I180704 10:06:49.043320 158728 storage/replica_command.go:279 [split,n1,s1,r22/1:/{Table/51-Max}] initiating a split of this range at key /Table/52 [r23] I180704 10:06:49.045604 158726 sql/event_log.go:126 [n1,client=127.0.0.1:59146,user=root] Event: "create_table", target: 53, info: {TableName:test.public.t Statement:CREATE TABLE test.public.t (num INT) User:root} I180704 10:06:49.047912 157881 util/stop/stopper.go:471 quiescing; tasks left: 2 node.Node: writing summary 1 [async] node.Node: bootstrapping stores I180704 10:06:49.052399 158715 storage/replica_command.go:279 [split,n1,s1,r23/1:/{Table/52-Max}] initiating a split of this range at key /Table/53 [r24] W180704 10:06:49.054941 158567 server/node.go:840 [n2,summaries] error recording initial status summaries: node unavailable; try another peer I180704 10:06:49.054969 157881 util/stop/stopper.go:471 quiescing; tasks left: 1 node.Node: writing summary 1 [async] node.Node: bootstrapping stores W180704 10:06:49.055259 158432 server/node.go:683 [n2] error writing node summary after store bootstrap: node unavailable; try another peer I180704 10:06:49.060293 158756 util/stop/stopper.go:471 quiescing; tasks left: 1 storage.intentResolver: processing intents 1 node.Node: batch 1 [async] storage.split: processing replica 1 [async] kv.TxnCoordSender: heartbeat loop I180704 10:06:49.060421 158756 util/stop/stopper.go:471 quiescing; tasks left: 1 storage.intentResolver: processing intents 1 node.Node: batch 1 [async] storage.split: processing replica W180704 10:06:49.061040 158715 internal/client/txn.go:585 [split,n1,s1,r23/1:/{Table/52-Max}] failure aborting transaction: node unavailable; try another peer; abort caused by: log-range-event: node unavailable; try another peer E180704 10:06:49.061085 158715 storage/queue.go:778 [split,n1,s1,r23/1:/{Table/52-Max}] unable to split [n1,s1,r23/1:/{Table/52-Max}] at key "/Table/53": split at key /Table/53 failed: log-range-event: node unavailable; try another peer I180704 10:06:49.061140 158756 util/stop/stopper.go:471 quiescing; tasks left: 1 storage.intentResolver: processing intents W180704 10:06:49.062824 158519 storage/intent_resolver.go:711 [n1,s1] failed to cleanup transaction intents: could not GC completed transaction anchored at /Local/Range/Table/51/RangeDescriptor: node unavailable; try another peer show_test.go:702: show_test.go:702: SELECT node_id, active_queries FROM [SHOW CLUSTER SESSIONS] show_test.go:712: expected 1 error row, got 0 ```
1.0
github.com/cockroachdb/cockroach/pkg/sql: TestShowSessions failed under stress - SHA: https://github.com/cockroachdb/cockroach/commits/faa1d2b46708f4f84cd552af6dc7258373fdebb0 Parameters: ``` TAGS= GOFLAGS= ``` Failed test: https://teamcity.cockroachdb.com/viewLog.html?buildId=758606&tab=buildLog ``` W180704 10:06:48.662022 157881 server/status/runtime.go:143 Could not parse build timestamp: parsing time "" as "2006/01/02 15:04:05": cannot parse "" as "2006" I180704 10:06:48.667703 157881 server/server.go:790 [n?] monitoring forward clock jumps based on server.clock.forward_jump_check_enabled I180704 10:06:48.674614 157881 server/config.go:545 [n?] 1 storage engine initialized I180704 10:06:48.674659 157881 server/config.go:548 [n?] RocksDB cache size: 128 MiB I180704 10:06:48.674679 157881 server/config.go:548 [n?] store 0: in-memory, size 0 B I180704 10:06:48.677171 157881 server/node.go:421 [n?] **** cluster f4bd4807-289b-447e-9af3-a9d5b1f72192 has been created I180704 10:06:48.677276 157881 server/server.go:1365 [n?] **** add additional nodes by specifying --join=127.0.0.1:41981 I180704 10:06:48.679697 157881 storage/store.go:1450 [n1,s1] [n1,s1]: failed initial metrics computation: [n1,s1]: system config not yet available I180704 10:06:48.679772 157881 server/node.go:551 [n1] initialized store [n1,s1]: disk (capacity=512 MiB, available=512 MiB, used=0 B, logicalBytes=6.9 KiB), ranges=1, leases=0, writes=0.00, bytesPerReplica={p10=7043.00 p25=7043.00 p50=7043.00 p75=7043.00 p90=7043.00 pMax=7043.00}, writesPerReplica={p10=0.00 p25=0.00 p50=0.00 p75=0.00 p90=0.00 pMax=0.00} I180704 10:06:48.679806 157881 server/node.go:399 [n1] node ID 1 initialized I180704 10:06:48.680005 157881 gossip/gossip.go:354 [n1] NodeDescriptor set to node_id:1 address:<network_field:"tcp" address_field:"127.0.0.1:41981" > attrs:<> locality:<> ServerVersion:<major_val:2 minor_val:0 patch:0 unstable:7 > I180704 10:06:48.680906 157881 storage/stores.go:222 [n1] read 0 node addresses from persistent storage I180704 10:06:48.680986 157881 server/node.go:692 [n1] connecting to gossip network to verify cluster ID... I180704 10:06:48.687559 157881 server/node.go:717 [n1] node connected via gossip and verified as part of cluster "f4bd4807-289b-447e-9af3-a9d5b1f72192" I180704 10:06:48.687590 157881 server/node.go:485 [n1] node=1: started with [<no-attributes>=<in-mem>] engine(s) and attributes [] I180704 10:06:48.687787 157881 server/config.go:331 [n1] available memory from cgroups (8.0 EiB) exceeds system memory 16 GiB, using system memory I180704 10:06:48.687811 157881 server/server.go:1794 [n1] Could not start heap profiler worker due to: directory to store profiles could not be determined I180704 10:06:48.687869 157881 server/server.go:1502 [n1] starting https server at 127.0.0.1:42301 I180704 10:06:48.687881 157881 server/server.go:1503 [n1] starting grpc/postgres server at 127.0.0.1:41981 I180704 10:06:48.687893 157881 server/server.go:1504 [n1] advertising CockroachDB node at 127.0.0.1:41981 I180704 10:06:48.689740 158095 storage/replica_command.go:279 [split,n1,s1,r1/1:/M{in-ax}] initiating a split of this range at key /System/"" [r2] I180704 10:06:48.707492 157806 storage/replica_command.go:279 [split,n1,s1,r2/1:/{System/-Max}] initiating a split of this range at key /System/NodeLiveness [r3] I180704 10:06:48.716554 158121 sql/event_log.go:126 [n1,intExec=optInToDiagnosticsStatReporting] Event: "set_cluster_setting", target: 0, info: {SettingName:diagnostics.reporting.enabled Value:true User:root} I180704 10:06:48.720504 158128 storage/replica_command.go:279 [split,n1,s1,r3/1:/{System/NodeL…-Max}] initiating a split of this range at key /System/NodeLivenessMax [r4] I180704 10:06:48.743117 158165 storage/replica_command.go:279 [split,n1,s1,r4/1:/{System/NodeL…-Max}] initiating a split of this range at key /System/tsd [r5] W180704 10:06:48.744831 158137 storage/intent_resolver.go:643 [n1,s1] failed to push during intent resolution: failed to push "sql txn" id=e112b002 key=/Table/SystemConfigSpan/Start rw=true pri=0.03297413 iso=SERIALIZABLE stat=PENDING epo=0 ts=1530698808.721835184,0 orig=1530698808.721835184,0 max=1530698808.721835184,0 wto=false rop=false seq=12 I180704 10:06:48.761191 158135 sql/event_log.go:126 [n1,intExec=set-setting] Event: "set_cluster_setting", target: 0, info: {SettingName:version Value:$1 User:root} I180704 10:06:48.763623 158141 storage/replica_command.go:279 [split,n1,s1,r5/1:/{System/tsd-Max}] initiating a split of this range at key /System/"tse" [r6] I180704 10:06:48.784470 158016 sql/event_log.go:126 [n1,intExec=disableNetTrace] Event: "set_cluster_setting", target: 0, info: {SettingName:trace.debug.enable Value:false User:root} I180704 10:06:48.790154 157870 storage/replica_command.go:279 [split,n1,s1,r6/1:/{System/tse-Max}] initiating a split of this range at key /Table/SystemConfigSpan/Start [r7] I180704 10:06:48.796817 158174 storage/replica_command.go:279 [split,n1,s1,r7/1:/{Table/System…-Max}] initiating a split of this range at key /Table/11 [r8] I180704 10:06:48.801725 158207 storage/replica_command.go:279 [split,n1,s1,r8/1:/{Table/11-Max}] initiating a split of this range at key /Table/12 [r9] I180704 10:06:48.809417 158245 storage/replica_command.go:279 [split,n1,s1,r9/1:/{Table/12-Max}] initiating a split of this range at key /Table/13 [r10] I180704 10:06:48.815126 158277 storage/replica_command.go:279 [split,n1,s1,r10/1:/{Table/13-Max}] initiating a split of this range at key /Table/14 [r11] I180704 10:06:48.819957 158152 storage/replica_command.go:279 [split,n1,s1,r11/1:/{Table/14-Max}] initiating a split of this range at key /Table/15 [r12] I180704 10:06:48.825624 158293 storage/replica_command.go:279 [split,n1,s1,r12/1:/{Table/15-Max}] initiating a split of this range at key /Table/16 [r13] W180704 10:06:48.829740 158300 storage/intent_resolver.go:643 [n1,s1] failed to push during intent resolution: failed to push "split" id=5bc5b590 key=/Local/Range/Table/15/RangeDescriptor rw=true pri=0.05293204 iso=SERIALIZABLE stat=PENDING epo=0 ts=1530698808.826453618,0 orig=1530698808.826453618,0 max=1530698808.826453618,0 wto=false rop=false seq=1 I180704 10:06:48.830982 158233 storage/replica_command.go:279 [split,n1,s1,r13/1:/{Table/16-Max}] initiating a split of this range at key /Table/17 [r14] W180704 10:06:48.836958 158307 storage/intent_resolver.go:643 [n1,s1] failed to push during intent resolution: failed to push "split" id=3f334e4f key=/Local/Range/Table/16/RangeDescriptor rw=true pri=0.05459823 iso=SERIALIZABLE stat=PENDING epo=0 ts=1530698808.831011193,0 orig=1530698808.831011193,0 max=1530698808.831011193,0 wto=false rop=false seq=1 I180704 10:06:48.838058 158235 storage/replica_command.go:279 [split,n1,s1,r14/1:/{Table/17-Max}] initiating a split of this range at key /Table/18 [r15] I180704 10:06:48.838893 158223 sql/event_log.go:126 [n1,intExec=initializeClusterSecret] Event: "set_cluster_setting", target: 0, info: {SettingName:cluster.secret Value:gen_random_uuid()::STRING User:root} I180704 10:06:48.845604 157785 sql/event_log.go:126 [n1,intExec=create-default-db] Event: "create_database", target: 50, info: {DatabaseName:defaultdb Statement:CREATE DATABASE IF NOT EXISTS defaultdb User:root} I180704 10:06:48.850186 157790 sql/event_log.go:126 [n1,intExec=create-default-db] Event: "create_database", target: 51, info: {DatabaseName:postgres Statement:CREATE DATABASE IF NOT EXISTS postgres User:root} I180704 10:06:48.858761 158310 storage/replica_command.go:279 [split,n1,s1,r15/1:/{Table/18-Max}] initiating a split of this range at key /Table/19 [r16] I180704 10:06:48.861208 157881 server/server.go:1583 [n1] done ensuring all necessary migrations have run I180704 10:06:48.861241 157881 server/server.go:1586 [n1] serving sql connections I180704 10:06:48.866005 158158 sql/event_log.go:126 [n1] Event: "node_join", target: 1, info: {Descriptor:{NodeID:1 Address:{NetworkField:tcp AddressField:127.0.0.1:41981} Attrs: Locality: ServerVersion:2.0-7} ClusterID:f4bd4807-289b-447e-9af3-a9d5b1f72192 StartedAt:1530698808687572239 LastUp:1530698808687572239} I180704 10:06:48.866744 158371 storage/replica_command.go:279 [split,n1,s1,r16/1:/{Table/19-Max}] initiating a split of this range at key /Table/20 [r17] I180704 10:06:48.873619 158156 server/server_update.go:65 [n1] no need to upgrade, cluster already at the newest version I180704 10:06:48.880019 158267 storage/replica_command.go:279 [split,n1,s1,r17/1:/{Table/20-Max}] initiating a split of this range at key /Table/21 [r18] I180704 10:06:48.895298 158380 storage/replica_command.go:279 [split,n1,s1,r18/1:/{Table/21-Max}] initiating a split of this range at key /Table/22 [r19] I180704 10:06:48.903179 158241 storage/replica_command.go:279 [split,n1,s1,r19/1:/{Table/22-Max}] initiating a split of this range at key /Table/23 [r20] I180704 10:06:48.912494 158409 storage/replica_command.go:279 [split,n1,s1,r20/1:/{Table/23-Max}] initiating a split of this range at key /Table/50 [r21] I180704 10:06:48.920722 158385 storage/replica_command.go:279 [split,n1,s1,r21/1:/{Table/50-Max}] initiating a split of this range at key /Table/51 [r22] W180704 10:06:48.931148 157881 server/status/runtime.go:143 Could not parse build timestamp: parsing time "" as "2006/01/02 15:04:05": cannot parse "" as "2006" I180704 10:06:48.934979 157881 server/server.go:790 [n?] monitoring forward clock jumps based on server.clock.forward_jump_check_enabled I180704 10:06:48.936582 157881 server/config.go:545 [n?] 1 storage engine initialized I180704 10:06:48.936638 157881 server/config.go:548 [n?] RocksDB cache size: 128 MiB I180704 10:06:48.936656 157881 server/config.go:548 [n?] store 0: in-memory, size 0 B W180704 10:06:48.936726 157881 gossip/gossip.go:1316 [n?] no incoming or outgoing connections I180704 10:06:48.936770 157881 server/server.go:1367 [n?] no stores bootstrapped and --join flag specified, awaiting init command. I180704 10:06:48.960210 158504 gossip/client.go:129 [n?] started gossip client to 127.0.0.1:41981 I180704 10:06:48.979435 158536 gossip/server.go:219 [n1] received initial cluster-verification connection from {tcp 127.0.0.1:37633} I180704 10:06:48.980565 157881 storage/stores.go:222 [n?] read 0 node addresses from persistent storage I180704 10:06:48.980601 157881 server/node.go:692 [n?] connecting to gossip network to verify cluster ID... I180704 10:06:48.980627 157881 server/node.go:717 [n?] node connected via gossip and verified as part of cluster "f4bd4807-289b-447e-9af3-a9d5b1f72192" I180704 10:06:48.980931 158557 kv/dist_sender.go:339 [n?] unable to determine this node's attributes for replica selection; node is most likely bootstrapping I180704 10:06:48.981118 158549 storage/stores.go:241 [n?] wrote 1 node addresses to persistent storage I180704 10:06:48.994302 158556 kv/dist_sender.go:339 [n?] unable to determine this node's attributes for replica selection; node is most likely bootstrapping I180704 10:06:48.995367 157881 kv/dist_sender.go:339 [n?] unable to determine this node's attributes for replica selection; node is most likely bootstrapping I180704 10:06:48.996607 157881 server/node.go:392 [n?] new node allocated ID 2 I180704 10:06:48.996708 157881 gossip/gossip.go:354 [n2] NodeDescriptor set to node_id:2 address:<network_field:"tcp" address_field:"127.0.0.1:37633" > attrs:<> locality:<> ServerVersion:<major_val:2 minor_val:0 patch:0 unstable:7 > I180704 10:06:48.996786 157881 server/node.go:466 [n2] node=2: asynchronously bootstrapping engine(s) [<no-attributes>=<in-mem>] I180704 10:06:48.996831 157881 server/node.go:485 [n2] node=2: started with [] engine(s) and attributes [] I180704 10:06:48.997093 157881 server/config.go:331 [n2] available memory from cgroups (8.0 EiB) exceeds system memory 16 GiB, using system memory I180704 10:06:48.997146 157881 server/server.go:1794 [n2] Could not start heap profiler worker due to: directory to store profiles could not be determined I180704 10:06:48.997239 157881 server/server.go:1502 [n2] starting https server at 127.0.0.1:40513 I180704 10:06:48.997279 157881 server/server.go:1503 [n2] starting grpc/postgres server at 127.0.0.1:37633 I180704 10:06:48.997309 157881 server/server.go:1504 [n2] advertising CockroachDB node at 127.0.0.1:37633 I180704 10:06:49.002680 158457 storage/stores.go:241 [n1] wrote 1 node addresses to persistent storage I180704 10:06:49.004020 157881 server/server.go:1583 [n2] done ensuring all necessary migrations have run I180704 10:06:49.004038 157881 server/server.go:1586 [n2] serving sql connections I180704 10:06:49.007983 158432 server/node.go:673 [n2] bootstrapped store [n2,s2] I180704 10:06:49.015399 158460 server/server_update.go:65 [n2] no need to upgrade, cluster already at the newest version I180704 10:06:49.015803 158462 sql/event_log.go:126 [n2] Event: "node_join", target: 2, info: {Descriptor:{NodeID:2 Address:{NetworkField:tcp AddressField:127.0.0.1:37633} Attrs: Locality: ServerVersion:2.0-7} ClusterID:f4bd4807-289b-447e-9af3-a9d5b1f72192 StartedAt:1530698808996819253 LastUp:1530698808996819253} I180704 10:06:49.042159 158726 sql/event_log.go:126 [n1,client=127.0.0.1:59146,user=root] Event: "create_database", target: 52, info: {DatabaseName:test Statement:CREATE DATABASE IF NOT EXISTS test User:root} I180704 10:06:49.043320 158728 storage/replica_command.go:279 [split,n1,s1,r22/1:/{Table/51-Max}] initiating a split of this range at key /Table/52 [r23] I180704 10:06:49.045604 158726 sql/event_log.go:126 [n1,client=127.0.0.1:59146,user=root] Event: "create_table", target: 53, info: {TableName:test.public.t Statement:CREATE TABLE test.public.t (num INT) User:root} I180704 10:06:49.047912 157881 util/stop/stopper.go:471 quiescing; tasks left: 2 node.Node: writing summary 1 [async] node.Node: bootstrapping stores I180704 10:06:49.052399 158715 storage/replica_command.go:279 [split,n1,s1,r23/1:/{Table/52-Max}] initiating a split of this range at key /Table/53 [r24] W180704 10:06:49.054941 158567 server/node.go:840 [n2,summaries] error recording initial status summaries: node unavailable; try another peer I180704 10:06:49.054969 157881 util/stop/stopper.go:471 quiescing; tasks left: 1 node.Node: writing summary 1 [async] node.Node: bootstrapping stores W180704 10:06:49.055259 158432 server/node.go:683 [n2] error writing node summary after store bootstrap: node unavailable; try another peer I180704 10:06:49.060293 158756 util/stop/stopper.go:471 quiescing; tasks left: 1 storage.intentResolver: processing intents 1 node.Node: batch 1 [async] storage.split: processing replica 1 [async] kv.TxnCoordSender: heartbeat loop I180704 10:06:49.060421 158756 util/stop/stopper.go:471 quiescing; tasks left: 1 storage.intentResolver: processing intents 1 node.Node: batch 1 [async] storage.split: processing replica W180704 10:06:49.061040 158715 internal/client/txn.go:585 [split,n1,s1,r23/1:/{Table/52-Max}] failure aborting transaction: node unavailable; try another peer; abort caused by: log-range-event: node unavailable; try another peer E180704 10:06:49.061085 158715 storage/queue.go:778 [split,n1,s1,r23/1:/{Table/52-Max}] unable to split [n1,s1,r23/1:/{Table/52-Max}] at key "/Table/53": split at key /Table/53 failed: log-range-event: node unavailable; try another peer I180704 10:06:49.061140 158756 util/stop/stopper.go:471 quiescing; tasks left: 1 storage.intentResolver: processing intents W180704 10:06:49.062824 158519 storage/intent_resolver.go:711 [n1,s1] failed to cleanup transaction intents: could not GC completed transaction anchored at /Local/Range/Table/51/RangeDescriptor: node unavailable; try another peer show_test.go:702: show_test.go:702: SELECT node_id, active_queries FROM [SHOW CLUSTER SESSIONS] show_test.go:712: expected 1 error row, got 0 ```
non_priority
github com cockroachdb cockroach pkg sql testshowsessions failed under stress sha parameters tags goflags failed test server status runtime go could not parse build timestamp parsing time as cannot parse as server server go monitoring forward clock jumps based on server clock forward jump check enabled server config go storage engine initialized server config go rocksdb cache size mib server config go store in memory size b server node go cluster has been created server server go add additional nodes by specifying join storage store go failed initial metrics computation system config not yet available server node go initialized store disk capacity mib available mib used b logicalbytes kib ranges leases writes bytesperreplica pmax writesperreplica pmax server node go node id initialized gossip gossip go nodedescriptor set to node id address attrs locality serverversion storage stores go read node addresses from persistent storage server node go connecting to gossip network to verify cluster id server node go node connected via gossip and verified as part of cluster server node go node started with engine s and attributes server config go available memory from cgroups eib exceeds system memory gib using system memory server server go could not start heap profiler worker due to directory to store profiles could not be determined server server go starting https server at server server go starting grpc postgres server at server server go advertising cockroachdb node at storage replica command go initiating a split of this range at key system storage replica command go initiating a split of this range at key system nodeliveness sql event log go event set cluster setting target info settingname diagnostics reporting enabled value true user root storage replica command go initiating a split of this range at key system nodelivenessmax storage replica command go initiating a split of this range at key system tsd storage intent resolver go failed to push during intent resolution failed to push sql txn id key table systemconfigspan start rw true pri iso serializable stat pending epo ts orig max wto false rop false seq sql event log go event set cluster setting target info settingname version value user root storage replica command go initiating a split of this range at key system tse sql event log go event set cluster setting target info settingname trace debug enable value false user root storage replica command go initiating a split of this range at key table systemconfigspan start storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage intent resolver go failed to push during intent resolution failed to push split id key local range table rangedescriptor rw true pri iso serializable stat pending epo ts orig max wto false rop false seq storage replica command go initiating a split of this range at key table storage intent resolver go failed to push during intent resolution failed to push split id key local range table rangedescriptor rw true pri iso serializable stat pending epo ts orig max wto false rop false seq storage replica command go initiating a split of this range at key table sql event log go event set cluster setting target info settingname cluster secret value gen random uuid string user root sql event log go event create database target info databasename defaultdb statement create database if not exists defaultdb user root sql event log go event create database target info databasename postgres statement create database if not exists postgres user root storage replica command go initiating a split of this range at key table server server go done ensuring all necessary migrations have run server server go serving sql connections sql event log go event node join target info descriptor nodeid address networkfield tcp addressfield attrs locality serverversion clusterid startedat lastup storage replica command go initiating a split of this range at key table server server update go no need to upgrade cluster already at the newest version storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table storage replica command go initiating a split of this range at key table server status runtime go could not parse build timestamp parsing time as cannot parse as server server go monitoring forward clock jumps based on server clock forward jump check enabled server config go storage engine initialized server config go rocksdb cache size mib server config go store in memory size b gossip gossip go no incoming or outgoing connections server server go no stores bootstrapped and join flag specified awaiting init command gossip client go started gossip client to gossip server go received initial cluster verification connection from tcp storage stores go read node addresses from persistent storage server node go connecting to gossip network to verify cluster id server node go node connected via gossip and verified as part of cluster kv dist sender go unable to determine this node s attributes for replica selection node is most likely bootstrapping storage stores go wrote node addresses to persistent storage kv dist sender go unable to determine this node s attributes for replica selection node is most likely bootstrapping kv dist sender go unable to determine this node s attributes for replica selection node is most likely bootstrapping server node go new node allocated id gossip gossip go nodedescriptor set to node id address attrs locality serverversion server node go node asynchronously bootstrapping engine s server node go node started with engine s and attributes server config go available memory from cgroups eib exceeds system memory gib using system memory server server go could not start heap profiler worker due to directory to store profiles could not be determined server server go starting https server at server server go starting grpc postgres server at server server go advertising cockroachdb node at storage stores go wrote node addresses to persistent storage server server go done ensuring all necessary migrations have run server server go serving sql connections server node go bootstrapped store server server update go no need to upgrade cluster already at the newest version sql event log go event node join target info descriptor nodeid address networkfield tcp addressfield attrs locality serverversion clusterid startedat lastup sql event log go event create database target info databasename test statement create database if not exists test user root storage replica command go initiating a split of this range at key table sql event log go event create table target info tablename test public t statement create table test public t num int user root util stop stopper go quiescing tasks left node node writing summary node node bootstrapping stores storage replica command go initiating a split of this range at key table server node go error recording initial status summaries node unavailable try another peer util stop stopper go quiescing tasks left node node writing summary node node bootstrapping stores server node go error writing node summary after store bootstrap node unavailable try another peer util stop stopper go quiescing tasks left storage intentresolver processing intents node node batch storage split processing replica kv txncoordsender heartbeat loop util stop stopper go quiescing tasks left storage intentresolver processing intents node node batch storage split processing replica internal client txn go failure aborting transaction node unavailable try another peer abort caused by log range event node unavailable try another peer storage queue go unable to split at key table split at key table failed log range event node unavailable try another peer util stop stopper go quiescing tasks left storage intentresolver processing intents storage intent resolver go failed to cleanup transaction intents could not gc completed transaction anchored at local range table rangedescriptor node unavailable try another peer show test go show test go select node id active queries from show test go expected error row got
0
309,801
26,679,027,202
IssuesEvent
2023-01-26 16:15:58
unifyai/ivy
https://api.github.com/repos/unifyai/ivy
closed
Fix reduction_ops.test_torch_mean
PyTorch Frontend Sub Task Failing Test
| | | |---|---| |tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a> |torch|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a> |numpy|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a> |jax|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
1.0
Fix reduction_ops.test_torch_mean - | | | |---|---| |tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a> |torch|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a> |numpy|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a> |jax|<a href="https://github.com/unifyai/ivy/actions/runs/4016120211/jobs/6898710039" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
non_priority
fix reduction ops test torch mean tensorflow img src torch img src numpy img src jax img src
0
274,576
23,850,601,887
IssuesEvent
2022-09-06 17:32:50
guynir42/virtualobserver
https://api.github.com/repos/guynir42/virtualobserver
opened
Simulator class
testing
Need to add a simulator that injects events into lightcurves (for starters). Need to test that lightcurves with and without the simulator injection look right.
1.0
Simulator class - Need to add a simulator that injects events into lightcurves (for starters). Need to test that lightcurves with and without the simulator injection look right.
non_priority
simulator class need to add a simulator that injects events into lightcurves for starters need to test that lightcurves with and without the simulator injection look right
0
46,732
13,181,009,647
IssuesEvent
2020-08-12 13:42:11
mibo32/fitbit-api-example-java
https://api.github.com/repos/mibo32/fitbit-api-example-java
opened
CVE-2020-14060 (High) detected in jackson-databind-2.8.1.jar
security vulnerability
## CVE-2020-14060 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.1.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/fitbit-api-example-java/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library) - :x: **jackson-databind-2.8.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/mibo32/fitbit-api-example-java/commit/fdd0855fc8f3b846f83506299759cd9cc820e5d2">fdd0855fc8f3b846f83506299759cd9cc820e5d2</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill). <p>Publish Date: 2020-06-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14060>CVE-2020-14060</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060</a></p> <p>Release Date: 2020-06-14</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-14060 (High) detected in jackson-databind-2.8.1.jar - ## CVE-2020-14060 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.1.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/fitbit-api-example-java/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library) - :x: **jackson-databind-2.8.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/mibo32/fitbit-api-example-java/commit/fdd0855fc8f3b846f83506299759cd9cc820e5d2">fdd0855fc8f3b846f83506299759cd9cc820e5d2</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill). <p>Publish Date: 2020-06-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14060>CVE-2020-14060</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060</a></p> <p>Release Date: 2020-06-14</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tmp ws scm fitbit api example java pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library x jackson databind jar vulnerable library found in head commit a href vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to oadd org apache xalan lib sql jndiconnectionpool aka apache drill publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
0
160,882
20,120,316,454
IssuesEvent
2022-02-08 01:07:03
AkshayMukkavilli/Analyzing-the-Significance-of-Structure-in-Amazon-Review-Data-Using-Machine-Learning-Approaches
https://api.github.com/repos/AkshayMukkavilli/Analyzing-the-Significance-of-Structure-in-Amazon-Review-Data-Using-Machine-Learning-Approaches
opened
CVE-2022-23565 (Medium) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl
security vulnerability
## CVE-2022-23565 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: /FinalProject/requirements.txt</p> <p>Path to vulnerable library: /teSource-ArchiveExtractor_8b9e071c-3b11-4aa9-ba60-cdeb60d053b7/20190525011350_65403/20190525011256_depth_0/9/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64/tensorflow-1.13.1.data/purelib/tensorflow</p> <p> Dependency Hierarchy: - :x: **tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. <p>Publish Date: 2022-02-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23565>CVE-2022-23565</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx</a></p> <p>Release Date: 2022-02-04</p> <p>Fix Resolution: tensorflow - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-cpu - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-gpu - 2.5.3,2.6.3,2.7.1,2.8.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-23565 (Medium) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl - ## CVE-2022-23565 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: /FinalProject/requirements.txt</p> <p>Path to vulnerable library: /teSource-ArchiveExtractor_8b9e071c-3b11-4aa9-ba60-cdeb60d053b7/20190525011350_65403/20190525011256_depth_0/9/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64/tensorflow-1.13.1.data/purelib/tensorflow</p> <p> Dependency Hierarchy: - :x: **tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. <p>Publish Date: 2022-02-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23565>CVE-2022-23565</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx</a></p> <p>Release Date: 2022-02-04</p> <p>Fix Resolution: tensorflow - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-cpu - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-gpu - 2.5.3,2.6.3,2.7.1,2.8.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in tensorflow whl cve medium severity vulnerability vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file finalproject requirements txt path to vulnerable library tesource archiveextractor depth tensorflow tensorflow data purelib tensorflow dependency hierarchy x tensorflow whl vulnerable library vulnerability details tensorflow is an open source machine learning framework an attacker can trigger denial of service via assertion failure by altering a savedmodel on disk such that attrdef s of some operation are duplicated the fix will be included in tensorflow we will also cherrypick this commit on tensorflow tensorflow and tensorflow as these are also affected and still in supported range publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tensorflow tensorflow cpu tensorflow gpu step up your open source security game with whitesource
0
103,563
22,341,848,749
IssuesEvent
2022-06-15 02:14:34
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
closed
Enum without zero value is not supported in WITH CUBE, WITH ROLLUP and GROUPING SETS
feature unfinished code
``` play-eu :) SELECT actor_login, event_type, count() FROM github_events WHERE repo_name = 'ClickHouse/ClickHouse' GROUP BY actor_login, event_type WITH ROLLUP ORDER BY count() DESC LIMIT 10 SELECT actor_login, event_type, count() FROM github_events WHERE repo_name = 'ClickHouse/ClickHouse' GROUP BY actor_login, event_type WITH ROLLUP ORDER BY count() DESC LIMIT 10 Query id: 1b7baa06-2ee6-4ae8-b1ed-4c9ecb21514c Ok. Exception on client: Code: 36. DB::Exception: Code: 36. DB::Exception: Unexpected value 0 in enum. (BAD_ARGUMENTS) (version 22.5.1.1984 (official build)). (BAD_ARGUMENTS) ```
1.0
Enum without zero value is not supported in WITH CUBE, WITH ROLLUP and GROUPING SETS - ``` play-eu :) SELECT actor_login, event_type, count() FROM github_events WHERE repo_name = 'ClickHouse/ClickHouse' GROUP BY actor_login, event_type WITH ROLLUP ORDER BY count() DESC LIMIT 10 SELECT actor_login, event_type, count() FROM github_events WHERE repo_name = 'ClickHouse/ClickHouse' GROUP BY actor_login, event_type WITH ROLLUP ORDER BY count() DESC LIMIT 10 Query id: 1b7baa06-2ee6-4ae8-b1ed-4c9ecb21514c Ok. Exception on client: Code: 36. DB::Exception: Code: 36. DB::Exception: Unexpected value 0 in enum. (BAD_ARGUMENTS) (version 22.5.1.1984 (official build)). (BAD_ARGUMENTS) ```
non_priority
enum without zero value is not supported in with cube with rollup and grouping sets play eu select actor login event type count from github events where repo name clickhouse clickhouse group by actor login event type with rollup order by count desc limit select actor login event type count from github events where repo name clickhouse clickhouse group by actor login event type with rollup order by count desc limit query id ok exception on client code db exception code db exception unexpected value in enum bad arguments version official build bad arguments
0
13,979
16,749,502,282
IssuesEvent
2021-06-11 20:28:16
googleapis/repo-automation-bots
https://api.github.com/repos/googleapis/repo-automation-bots
reopened
A canary is chirping
type: process
The dependencies and their versions are: { "dayjs": "^1.10.5", "gcf-utils": "^8.0.2" } at 2021 06-11 13:25:05 🐦
1.0
A canary is chirping - The dependencies and their versions are: { "dayjs": "^1.10.5", "gcf-utils": "^8.0.2" } at 2021 06-11 13:25:05 🐦
non_priority
a canary is chirping the dependencies and their versions are dayjs gcf utils at 🐦
0
4,680
3,067,226,104
IssuesEvent
2015-08-18 09:06:29
Gizra/negawatt-server
https://api.github.com/repos/Gizra/negawatt-server
closed
Date selector for usage chart
needs: code review
Selectors for year (for year, month view), month (for day view), day (for hour and minute views)
1.0
Date selector for usage chart - Selectors for year (for year, month view), month (for day view), day (for hour and minute views)
non_priority
date selector for usage chart selectors for year for year month view month for day view day for hour and minute views
0
118,619
9,996,371,039
IssuesEvent
2019-07-11 23:13:06
rancher/rancher
https://api.github.com/repos/rancher/rancher
closed
UI: Click save button again, logging config disappear
[zube]: To Test area/logging area/ui kind/bug-qa team/cn
<!-- Please search for existing issues first, then read https://rancher.com/docs/rancher/v2.x/en/contributing/#bugs-issues-or-questions to see what we expect in an issue For security issues, please email security@rancher.com instead of posting a public issue in GitHub. You may (but are not required to) use the GPG key located on Keybase. --> **What kind of request is this (question/bug/enhancement/feature request):** bug **Steps to reproduce (least amount of steps as possible):** 1. Select the fluentd target and enable project logging. 2. Click save button again without any change. **Result:** ![image](https://user-images.githubusercontent.com/18737885/60961495-e5c98580-a33e-11e9-8206-759edc221927.png) Logging config disappear. **Other details that may be helpful:** **Environment information** master ( 2019/07/10 )
1.0
UI: Click save button again, logging config disappear - <!-- Please search for existing issues first, then read https://rancher.com/docs/rancher/v2.x/en/contributing/#bugs-issues-or-questions to see what we expect in an issue For security issues, please email security@rancher.com instead of posting a public issue in GitHub. You may (but are not required to) use the GPG key located on Keybase. --> **What kind of request is this (question/bug/enhancement/feature request):** bug **Steps to reproduce (least amount of steps as possible):** 1. Select the fluentd target and enable project logging. 2. Click save button again without any change. **Result:** ![image](https://user-images.githubusercontent.com/18737885/60961495-e5c98580-a33e-11e9-8206-759edc221927.png) Logging config disappear. **Other details that may be helpful:** **Environment information** master ( 2019/07/10 )
non_priority
ui click save button again logging config disappear please search for existing issues first then read to see what we expect in an issue for security issues please email security rancher com instead of posting a public issue in github you may but are not required to use the gpg key located on keybase what kind of request is this question bug enhancement feature request bug steps to reproduce least amount of steps as possible select the fluentd target and enable project logging click save button again without any change result logging config disappear other details that may be helpful environment information master
0
359,466
25,238,813,495
IssuesEvent
2022-11-15 04:52:48
microsoft/azure_arc
https://api.github.com/repos/microsoft/azure_arc
closed
SSH KEY ERROR
documentation
<!--- Disclaimer: The intent of this "Bug report" template is to address issues related to the Azure Arc Jumpstart scenarios, ArcBox and all other project ares. The Azure Arc Jumpstart team does not handle Azure Arc core product issues, bugs and feature requests and will try to assist on a best effort basis. For a core product issue or feature request/feedback, please create an official [Azure support ticket](https://azure.microsoft.com/support/create-ticket/) or [general feedback request](https://feedback.azure.com). ---> **Jumpstart scenario or ArcBox flavor which you are working on.** Full **Describe the bug.** I am using deploy option 1 (Azure Portal), but I am failing due to "linuxConfiguration.ssh.publicKeys.keyData is invalid." I tried it with different SSH KEY and the result is the same **To Reproduce.** <!--- Steps to reproduce the behavior: Use Azure Portal to deploy and use the below SSH key: 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 **Expected behavior.** Successfull deployment **Environment summary.** azure-cli 2.42.0 **Screenshots.** ![image](https://user-images.githubusercontent.com/115485825/201541599-4b88fdfe-3a90-4824-ac3f-7f6a9c582810.png)
1.0
SSH KEY ERROR - <!--- Disclaimer: The intent of this "Bug report" template is to address issues related to the Azure Arc Jumpstart scenarios, ArcBox and all other project ares. The Azure Arc Jumpstart team does not handle Azure Arc core product issues, bugs and feature requests and will try to assist on a best effort basis. For a core product issue or feature request/feedback, please create an official [Azure support ticket](https://azure.microsoft.com/support/create-ticket/) or [general feedback request](https://feedback.azure.com). ---> **Jumpstart scenario or ArcBox flavor which you are working on.** Full **Describe the bug.** I am using deploy option 1 (Azure Portal), but I am failing due to "linuxConfiguration.ssh.publicKeys.keyData is invalid." I tried it with different SSH KEY and the result is the same **To Reproduce.** <!--- Steps to reproduce the behavior: Use Azure Portal to deploy and use the below SSH key: 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 **Expected behavior.** Successfull deployment **Environment summary.** azure-cli 2.42.0 **Screenshots.** ![image](https://user-images.githubusercontent.com/115485825/201541599-4b88fdfe-3a90-4824-ac3f-7f6a9c582810.png)
non_priority
ssh key error jumpstart scenario or arcbox flavor which you are working on full describe the bug i am using deploy option azure portal but i am failing due to linuxconfiguration ssh publickeys keydata is invalid i tried it with different ssh key and the result is the same to reproduce steps to reproduce the behavior use azure portal to deploy and use the below ssh key m d expected behavior successfull deployment environment summary azure cli screenshots
0
20,221
11,420,900,440
IssuesEvent
2020-02-03 11:00:44
cosmos/sdk-tutorials
https://api.github.com/repos/cosmos/sdk-tutorials
closed
Add nsdebug to cmd and makefile
nameservice
Just like `gaiadebug`. It would be nice so that people can query txs bytes from tendermint rpc and then unmarshall them to JSON.
1.0
Add nsdebug to cmd and makefile - Just like `gaiadebug`. It would be nice so that people can query txs bytes from tendermint rpc and then unmarshall them to JSON.
non_priority
add nsdebug to cmd and makefile just like gaiadebug it would be nice so that people can query txs bytes from tendermint rpc and then unmarshall them to json
0
42,509
5,459,463,975
IssuesEvent
2017-03-09 00:43:57
palantir/plottable
https://api.github.com/repos/palantir/plottable
opened
Remove Component's "box" API
Domain: API Design P2
Component has a “box” API that simply builds a <g> element whose width/height is always 100% (aka it auto-updates in response to layout changes). This behavior is trivial in an HTML world; look into why we need this at all and if we can get rid of it
1.0
Remove Component's "box" API - Component has a “box” API that simply builds a <g> element whose width/height is always 100% (aka it auto-updates in response to layout changes). This behavior is trivial in an HTML world; look into why we need this at all and if we can get rid of it
non_priority
remove component s box api component has a “box” api that simply builds a element whose width height is always aka it auto updates in response to layout changes this behavior is trivial in an html world look into why we need this at all and if we can get rid of it
0
94,938
10,862,144,264
IssuesEvent
2019-11-14 12:41:12
kubernetes/dashboard
https://api.github.com/repos/kubernetes/dashboard
closed
Improve docs for metrics
kind/documentation lifecycle/stale
##### Environment ``` Installation method: Kubectl apply Kubernetes version: 1.15.1 Dashboard version: 2.0.0-beta2 Operating system: HypriotOS (Debian) - RPi3 ``` ##### Steps to reproduce Install kubernetes dashboard with: ```sh kubectl apply -f https://raw.githubusercontent.com/kubernetes/dashboard/v2.0.0-beta2/aio/deploy/recommended.yaml ``` ##### Observed result No graphs/sparklines displayed in UI - metrics scraper pod is running as expected: ```sh NAME READY STATUS RESTARTS AGE pod/dashboard-metrics-scraper-6ff95d79d8-prfvx 1/1 Running 0 12h pod/kubernetes-dashboard-75dc45f799-q5ztq 1/1 Running 0 12h NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE service/dashboard-metrics-scraper ClusterIP 10.106.49.54 <none> 8000/TCP 12h service/kubernetes-dashboard ClusterIP 10.107.222.226 <none> 443/TCP 12h NAME READY UP-TO-DATE AVAILABLE AGE deployment.apps/dashboard-metrics-scraper 1/1 1 1 12h deployment.apps/kubernetes-dashboard 1/1 1 1 12h NAME DESIRED CURRENT READY AGE replicaset.apps/dashboard-metrics-scraper-6ff95d79d8 1 1 1 12h replicaset.apps/kubernetes-dashboard-75dc45f799 1 1 1 12h ``` ##### Expected result Graphs/Sparklines show in UI. ##### Comments Not sure if this is the expected behaviour or not in 2.0.0?
1.0
Improve docs for metrics - ##### Environment ``` Installation method: Kubectl apply Kubernetes version: 1.15.1 Dashboard version: 2.0.0-beta2 Operating system: HypriotOS (Debian) - RPi3 ``` ##### Steps to reproduce Install kubernetes dashboard with: ```sh kubectl apply -f https://raw.githubusercontent.com/kubernetes/dashboard/v2.0.0-beta2/aio/deploy/recommended.yaml ``` ##### Observed result No graphs/sparklines displayed in UI - metrics scraper pod is running as expected: ```sh NAME READY STATUS RESTARTS AGE pod/dashboard-metrics-scraper-6ff95d79d8-prfvx 1/1 Running 0 12h pod/kubernetes-dashboard-75dc45f799-q5ztq 1/1 Running 0 12h NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE service/dashboard-metrics-scraper ClusterIP 10.106.49.54 <none> 8000/TCP 12h service/kubernetes-dashboard ClusterIP 10.107.222.226 <none> 443/TCP 12h NAME READY UP-TO-DATE AVAILABLE AGE deployment.apps/dashboard-metrics-scraper 1/1 1 1 12h deployment.apps/kubernetes-dashboard 1/1 1 1 12h NAME DESIRED CURRENT READY AGE replicaset.apps/dashboard-metrics-scraper-6ff95d79d8 1 1 1 12h replicaset.apps/kubernetes-dashboard-75dc45f799 1 1 1 12h ``` ##### Expected result Graphs/Sparklines show in UI. ##### Comments Not sure if this is the expected behaviour or not in 2.0.0?
non_priority
improve docs for metrics environment installation method kubectl apply kubernetes version dashboard version operating system hypriotos debian steps to reproduce install kubernetes dashboard with sh kubectl apply f observed result no graphs sparklines displayed in ui metrics scraper pod is running as expected sh name ready status restarts age pod dashboard metrics scraper prfvx running pod kubernetes dashboard running name type cluster ip external ip port s age service dashboard metrics scraper clusterip tcp service kubernetes dashboard clusterip tcp name ready up to date available age deployment apps dashboard metrics scraper deployment apps kubernetes dashboard name desired current ready age replicaset apps dashboard metrics scraper replicaset apps kubernetes dashboard expected result graphs sparklines show in ui comments not sure if this is the expected behaviour or not in
0
301,556
22,762,779,056
IssuesEvent
2022-07-07 23:11:38
dzikoysk/reposilite
https://api.github.com/repos/dzikoysk/reposilite
closed
Update `Repositories` guide
bug documentation good first issue
### What happened? Configuration of repository is outdated: * https://reposilite.com/guide/repositories Should show how to use new settings forms instead of raw config ### Reposilite version 3.x ### Relevant log output _No response_
1.0
Update `Repositories` guide - ### What happened? Configuration of repository is outdated: * https://reposilite.com/guide/repositories Should show how to use new settings forms instead of raw config ### Reposilite version 3.x ### Relevant log output _No response_
non_priority
update repositories guide what happened configuration of repository is outdated should show how to use new settings forms instead of raw config reposilite version x relevant log output no response
0
45,592
5,939,320,740
IssuesEvent
2017-05-25 04:29:17
quicwg/base-drafts
https://api.github.com/repos/quicwg/base-drafts
opened
PUSH_PROMISE ordering guarantee
design http
HTTP/2 has a pretty strong recommendation to have PUSH_PROMISE precede any text that mentions it. Failing to do so could mean that a client requests a resource that was pushed, which is wasteful. Splitting the headers and data into two streams means that there is no way to order the PUSH_PROMISE relative to the part of the body that mentions the resource. I'm sure that @MikeBishop mentioned this once before, but I couldn't find any issues for it. Returning to a model where data and headers share a stream would fix this.
1.0
PUSH_PROMISE ordering guarantee - HTTP/2 has a pretty strong recommendation to have PUSH_PROMISE precede any text that mentions it. Failing to do so could mean that a client requests a resource that was pushed, which is wasteful. Splitting the headers and data into two streams means that there is no way to order the PUSH_PROMISE relative to the part of the body that mentions the resource. I'm sure that @MikeBishop mentioned this once before, but I couldn't find any issues for it. Returning to a model where data and headers share a stream would fix this.
non_priority
push promise ordering guarantee http has a pretty strong recommendation to have push promise precede any text that mentions it failing to do so could mean that a client requests a resource that was pushed which is wasteful splitting the headers and data into two streams means that there is no way to order the push promise relative to the part of the body that mentions the resource i m sure that mikebishop mentioned this once before but i couldn t find any issues for it returning to a model where data and headers share a stream would fix this
0
70,012
30,528,695,811
IssuesEvent
2023-07-19 13:01:51
Ocelot-Social-Community/Ocelot-Social
https://api.github.com/repos/Ocelot-Social-Community/Ocelot-Social
closed
🚀 [Feature] Chat: Send link does not show a html link
feature service: backend service: webapp features_chat chat
<!-- You can find the latest issue templates here https://github.com/ulfgebhardt/issue-templates --> ## 🚀 Feature <!-- Give a short summary of the Feature. Use Screenshots if you want. --> If you paste a link in the message post and send it you don't see a html link. Would be great to have a html link possible in the chat. ### Additional Informations Now it looks like: <img width="1186" alt="Bildschirmfoto 2023-07-18 um 10 07 26" src="https://github.com/Ocelot-Social-Community/Ocelot-Social/assets/25344101/b075c888-c5ee-4812-8137-fcd7db465952"> In the database we have: <img width="1155" alt="Bildschirmfoto 2023-07-18 um 13 21 07" src="https://github.com/Ocelot-Social-Community/Ocelot-Social/assets/25344101/b4b097d0-3957-48b7-8ae6-eef88b3b3288"> The query delivers: <img width="1532" alt="Bildschirmfoto 2023-07-18 um 13 35 32" src="https://github.com/Ocelot-Social-Community/Ocelot-Social/assets/25344101/95cc2b5f-48a3-4aea-a494-bba38d56d6a5"> So the problem occurs on showing the message with the URL in the browser and can be generated by VueJS?! ## 🤖 ToDo - [ ] Have clickable html link in the chat component
2.0
🚀 [Feature] Chat: Send link does not show a html link - <!-- You can find the latest issue templates here https://github.com/ulfgebhardt/issue-templates --> ## 🚀 Feature <!-- Give a short summary of the Feature. Use Screenshots if you want. --> If you paste a link in the message post and send it you don't see a html link. Would be great to have a html link possible in the chat. ### Additional Informations Now it looks like: <img width="1186" alt="Bildschirmfoto 2023-07-18 um 10 07 26" src="https://github.com/Ocelot-Social-Community/Ocelot-Social/assets/25344101/b075c888-c5ee-4812-8137-fcd7db465952"> In the database we have: <img width="1155" alt="Bildschirmfoto 2023-07-18 um 13 21 07" src="https://github.com/Ocelot-Social-Community/Ocelot-Social/assets/25344101/b4b097d0-3957-48b7-8ae6-eef88b3b3288"> The query delivers: <img width="1532" alt="Bildschirmfoto 2023-07-18 um 13 35 32" src="https://github.com/Ocelot-Social-Community/Ocelot-Social/assets/25344101/95cc2b5f-48a3-4aea-a494-bba38d56d6a5"> So the problem occurs on showing the message with the URL in the browser and can be generated by VueJS?! ## 🤖 ToDo - [ ] Have clickable html link in the chat component
non_priority
🚀 chat send link does not show a html link 🚀 feature if you paste a link in the message post and send it you don t see a html link would be great to have a html link possible in the chat additional informations now it looks like img width alt bildschirmfoto um src in the database we have img width alt bildschirmfoto um src the query delivers img width alt bildschirmfoto um src so the problem occurs on showing the message with the url in the browser and can be generated by vuejs 🤖 todo have clickable html link in the chat component
0
264,660
20,027,428,127
IssuesEvent
2022-02-01 23:12:52
cmu-delphi/delphi-epidata
https://api.github.com/repos/cmu-delphi/delphi-epidata
closed
Documentation for new CPR indicator
documentation
Create a new page in the API documentation for the CPR indicator. Start with the [template file.](https://github.com/cmu-delphi/delphi-epidata/blob/dev/docs/api/covidcast-signals/_source-template.md)
1.0
Documentation for new CPR indicator - Create a new page in the API documentation for the CPR indicator. Start with the [template file.](https://github.com/cmu-delphi/delphi-epidata/blob/dev/docs/api/covidcast-signals/_source-template.md)
non_priority
documentation for new cpr indicator create a new page in the api documentation for the cpr indicator start with the
0
76,523
21,480,175,423
IssuesEvent
2022-04-26 16:56:46
NationalSecurityAgency/ghidra
https://api.github.com/repos/NationalSecurityAgency/ghidra
opened
SBOM is missing PURL's for some jars
Feature: Build
The `bom.json` file (attached below) that Ghidra generates as part of its `10.2-DEV` build is missing PURL's for some jars. This is because the jars do not have a `pom.xml` file embedded in them from which to extract a `group` string. Some alternative techniques that were tried include parsing their `MANIFEST.MF` file, but this yielded unreliable results due to non-standard or optional property names. Some of these group names can be retrieved via Gradle API calls, but only if they were declared as external dependencies from maven central. However, Gradle doesn't have that info for jars such as `dexlib`, which gets downloaded via the `fetchDependencies.gradle` script. Without a proper PURL, tools like [Dependency-Track](https://dependencytrack.org/) cannot properly report vulnerabilities and other issues with external dependencies. Attachment: [bom.json.zip](https://github.com/NationalSecurityAgency/ghidra/files/8565291/bom.json.zip)
1.0
SBOM is missing PURL's for some jars - The `bom.json` file (attached below) that Ghidra generates as part of its `10.2-DEV` build is missing PURL's for some jars. This is because the jars do not have a `pom.xml` file embedded in them from which to extract a `group` string. Some alternative techniques that were tried include parsing their `MANIFEST.MF` file, but this yielded unreliable results due to non-standard or optional property names. Some of these group names can be retrieved via Gradle API calls, but only if they were declared as external dependencies from maven central. However, Gradle doesn't have that info for jars such as `dexlib`, which gets downloaded via the `fetchDependencies.gradle` script. Without a proper PURL, tools like [Dependency-Track](https://dependencytrack.org/) cannot properly report vulnerabilities and other issues with external dependencies. Attachment: [bom.json.zip](https://github.com/NationalSecurityAgency/ghidra/files/8565291/bom.json.zip)
non_priority
sbom is missing purl s for some jars the bom json file attached below that ghidra generates as part of its dev build is missing purl s for some jars this is because the jars do not have a pom xml file embedded in them from which to extract a group string some alternative techniques that were tried include parsing their manifest mf file but this yielded unreliable results due to non standard or optional property names some of these group names can be retrieved via gradle api calls but only if they were declared as external dependencies from maven central however gradle doesn t have that info for jars such as dexlib which gets downloaded via the fetchdependencies gradle script without a proper purl tools like cannot properly report vulnerabilities and other issues with external dependencies attachment
0
46,420
11,840,339,734
IssuesEvent
2020-03-23 18:41:25
tensorflow/tfjs
https://api.github.com/repos/tensorflow/tfjs
closed
npm install fails when trying to install @tensorflow/tfjs-node@1.7.0
comp:node.js stat:awaiting response type:build/install
Getting this error: ``` > @tensorflow/tfjs-node@1.7.0 install /dock/node_modules/@tensorflow/tfjs-node > node scripts/install.js CPU-linux-1.7.0.tar.gz * Downloading libtensorflow * Building TensorFlow Node.js bindings node-pre-gyp install failed with error: Error: Command failed: node-pre-gyp install --fallback-to-build node-pre-gyp WARN Using needle for node-pre-gyp https download node-pre-gyp WARN Tried to download(404): https://storage.googleapis.com/tf-builds/pre-built-binary/napi-v5/1.7.0/CPU-linux-1.7.0.tar.gz node-pre-gyp WARN Pre-built binaries not found for @tensorflow/tfjs-node@1.7.0 and node@13.11.0 (node-v79 ABI, glibc) (falling back to source compile with node-gyp) ``` This URL doesn't seem to exist: https://storage.googleapis.com/tf-builds/pre-built-binary/napi-v5/1.7.0/CPU-linux-1.7.0.tar.gz My package.json: ``` "@tensorflow/tfjs": "^1.7.0", "@tensorflow/tfjs-node": "^1.7.0", ``` What can I do to be able to install tfjs-node? Using CentOS 7 on a Docker container.
1.0
npm install fails when trying to install @tensorflow/tfjs-node@1.7.0 - Getting this error: ``` > @tensorflow/tfjs-node@1.7.0 install /dock/node_modules/@tensorflow/tfjs-node > node scripts/install.js CPU-linux-1.7.0.tar.gz * Downloading libtensorflow * Building TensorFlow Node.js bindings node-pre-gyp install failed with error: Error: Command failed: node-pre-gyp install --fallback-to-build node-pre-gyp WARN Using needle for node-pre-gyp https download node-pre-gyp WARN Tried to download(404): https://storage.googleapis.com/tf-builds/pre-built-binary/napi-v5/1.7.0/CPU-linux-1.7.0.tar.gz node-pre-gyp WARN Pre-built binaries not found for @tensorflow/tfjs-node@1.7.0 and node@13.11.0 (node-v79 ABI, glibc) (falling back to source compile with node-gyp) ``` This URL doesn't seem to exist: https://storage.googleapis.com/tf-builds/pre-built-binary/napi-v5/1.7.0/CPU-linux-1.7.0.tar.gz My package.json: ``` "@tensorflow/tfjs": "^1.7.0", "@tensorflow/tfjs-node": "^1.7.0", ``` What can I do to be able to install tfjs-node? Using CentOS 7 on a Docker container.
non_priority
npm install fails when trying to install tensorflow tfjs node getting this error tensorflow tfjs node install dock node modules tensorflow tfjs node node scripts install js cpu linux tar gz downloading libtensorflow building tensorflow node js bindings node pre gyp install failed with error error command failed node pre gyp install fallback to build node pre gyp warn using needle for node pre gyp https download node pre gyp warn tried to download node pre gyp warn pre built binaries not found for tensorflow tfjs node and node node abi glibc falling back to source compile with node gyp this url doesn t seem to exist my package json tensorflow tfjs tensorflow tfjs node what can i do to be able to install tfjs node using centos on a docker container
0
48,029
19,906,543,608
IssuesEvent
2022-01-25 13:23:23
hashicorp/terraform-provider-aws
https://api.github.com/repos/hashicorp/terraform-provider-aws
closed
panic in aws/resource_aws_instance.go in v3.25.0
bug crash service/ec2
* [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues My account is getting panic in line 1665 of version v3.25.0 of aws/resource_aws_instance.go ``` if len(ibds["ebs"].([]map[string]interface{})) == 0 { ``` The backtrace is: ``` panic: interface conversion: interface {} is nil, not []map[string]interface {} 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: goroutine 11830 [running]: 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/terraform-providers/terraform-provider-aws/aws.readBlockDevices(0xc0020f4600, 0xc002532000, 0xc000abc598, 0x0, 0x0) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/hashicorp/terraform-provider-aws/aws/resource_aws_instance.go:1665 +0x78d 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/terraform-providers/terraform-provider-aws/aws.resourceAwsInstanceRead(0xc0020f4600, 0x66874e0, 0xc00138ec00, 0xb1cc610, 0x749d828) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/hashicorp/terraform-provider-aws/aws/resource_aws_instance.go:930 +0x1845 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).read(0xc000a28e40, 0x7db33c0, 0xc001980340, 0xc0020f4600, 0x66874e0, 0xc00138ec00, 0x0, 0x0, 0x0) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.1/helper/schema/resource.go:290 +0x88 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).RefreshWithoutUpgrade(0xc000a28e40, 0x7db33c0, 0xc001980340, 0xc00040bb90, 0x66874e0, 0xc00138ec00, 0xc000d7df60, 0x0, 0x0, 0x0) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.1/helper/schema/resource.go:564 +0x1cb 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*GRPCProviderServer).ReadResource(0xc0012d5240, 0x7db33c0, 0xc001980340, 0xc001980380, 0xc001980340, 0x6ecfe80, 0x716afc0) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.1/helper/schema/grpc_provider.go:575 +0x43b 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-go/tfprotov5/server.(*server).ReadResource(0xc0014d1f60, 0x7db33c0, 0xc001980340, 0xc00208a060, 0xc0014d1f60, 0xc001bf4750, 0xc0013ceba0) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-go@v0.2.1/tfprotov5/server/server.go:298 +0x105 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-go/tfprotov5/internal/tfplugin5._Provider_ReadResource_Handler(0x716afc0, 0xc0014d1f60, 0x7db3480, 0xc001bf4750, 0xc00208a000, 0x0, 0x7db3480, 0xc001bf4750, 0xc00198e000, 0x917) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-go@v0.2.1/tfprotov5/internal/tfplugin5/tfplugin5_grpc.pb.go:344 +0x214 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: google.golang.org/grpc.(*Server).processUnaryRPC(0xc0001fee00, 0x7dd6320, 0xc000888600, 0xc001824f00, 0xc000920510, 0xb18b330, 0x0, 0x0, 0x0) 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:1194 +0x522 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: google.golang.org/grpc.(*Server).handleStream(0xc0001fee00, 0x7dd6320, 0xc000888600, 0xc001824f00, 0x0) 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:1517 +0xd05 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: google.golang.org/grpc.(*Server).serveStreams.func1.2(0xc001154ce0, 0xc0001fee00, 0x7dd6320, 0xc000888600, 0xc001824f00) 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:859 +0xa5 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: created by google.golang.org/grpc.(*Server).serveStreams.func1 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:857 +0x1fd ``` I have no idea what's going on, but seems panic is prima facie bug. I'm testing this fix on my local provider: ``` terraform-providers(3:58823)$ git diff diff --git a/aws/resource_aws_instance.go b/aws/resource_aws_instance.go index 7e69c85f6..fdd7b24e0 100644 --- a/aws/resource_aws_instance.go +++ b/aws/resource_aws_instance.go @@ -1662,7 +1662,7 @@ func readBlockDevices(d *schema.ResourceData, instance *ec2.Instance, conn *ec2. // and #readBlockDevicesFromInstance only returns 1 reference to a block-device // stored in ibds["root"] if _, ok := d.GetOk("ebs_block_device"); ok { - if len(ibds["ebs"].([]map[string]interface{})) == 0 { + if ibds["ebs"] != nil && len(ibds["ebs"].([]map[string]interface{})) == 0 { ebs := make(map[string]interface{}) for k, v := range ibds["root"].(map[string]interface{}) { ebs[k] = v ``` <!--- Please keep this note for the community ---> ### Community Note * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request * Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request * If you are interested in working on this issue or have submitted a pull request, please leave a comment <!--- Thank you for keeping this note for the community ---> ### Terraform CLI and Terraform AWS Provider Version ``` $ terraform -version Terraform v0.14.5 + provider registry.terraform.io/hashicorp/aws v3.25.0 + provider registry.terraform.io/hashicorp/external v2.0.0 + provider registry.terraform.io/hashicorp/template v2.2.0 ``` <!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). ---> ### Affected Resource(s) It is crashing during plan before it starts updating what the plan would do, walking the dag I guess. I ran it under TF_LOG=1 but the immediate logging around the panic lines don't seem related to aws_instance resource. I can't just put the whole config out here. <!--- Please list the affected resources and data sources. ---> * aws_instance maybe ### Terraform Configuration Files <!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code ---> I won't be able to upload all the terraform config. If I can reproduce it in a smaller set, I'll submit that. I will also note here if my proposed patch fixes the issue. ### Debug Output <!--- Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist. To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html). ---> ### Panic Output <!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. ---> I can't find a crash.log but the panic and backtrace are above. ### Expected Behavior <!--- What should have happened? ---> Successful apply. ### Actual Behavior <!--- What actually happened? ---> Lot of output like: ``` Error: rpc error: code = Canceled desc = context canceled Error: rpc error: code = Canceled desc = context canceled Error: rpc error: code = Canceled desc = context canceled ``` ### Steps to Reproduce <!--- Please list the steps required to reproduce the issue. ---> 1. `terraform apply` ### Important Factoids <!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? ---> Biggish? 3133 lines of tf, 532 items in 'terraform state list' and 47 ec2. Mostly just vanilla S3 and Ec2. More VPC and subnets than our normal accounts (multi-tenant SaaS implementation). ### References <!--- Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example: ---> * #0000
1.0
panic in aws/resource_aws_instance.go in v3.25.0 - * [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues My account is getting panic in line 1665 of version v3.25.0 of aws/resource_aws_instance.go ``` if len(ibds["ebs"].([]map[string]interface{})) == 0 { ``` The backtrace is: ``` panic: interface conversion: interface {} is nil, not []map[string]interface {} 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: goroutine 11830 [running]: 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/terraform-providers/terraform-provider-aws/aws.readBlockDevices(0xc0020f4600, 0xc002532000, 0xc000abc598, 0x0, 0x0) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/hashicorp/terraform-provider-aws/aws/resource_aws_instance.go:1665 +0x78d 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/terraform-providers/terraform-provider-aws/aws.resourceAwsInstanceRead(0xc0020f4600, 0x66874e0, 0xc00138ec00, 0xb1cc610, 0x749d828) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/hashicorp/terraform-provider-aws/aws/resource_aws_instance.go:930 +0x1845 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).read(0xc000a28e40, 0x7db33c0, 0xc001980340, 0xc0020f4600, 0x66874e0, 0xc00138ec00, 0x0, 0x0, 0x0) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.1/helper/schema/resource.go:290 +0x88 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).RefreshWithoutUpgrade(0xc000a28e40, 0x7db33c0, 0xc001980340, 0xc00040bb90, 0x66874e0, 0xc00138ec00, 0xc000d7df60, 0x0, 0x0, 0x0) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.1/helper/schema/resource.go:564 +0x1cb 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*GRPCProviderServer).ReadResource(0xc0012d5240, 0x7db33c0, 0xc001980340, 0xc001980380, 0xc001980340, 0x6ecfe80, 0x716afc0) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.1/helper/schema/grpc_provider.go:575 +0x43b 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-go/tfprotov5/server.(*server).ReadResource(0xc0014d1f60, 0x7db33c0, 0xc001980340, 0xc00208a060, 0xc0014d1f60, 0xc001bf4750, 0xc0013ceba0) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-go@v0.2.1/tfprotov5/server/server.go:298 +0x105 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: github.com/hashicorp/terraform-plugin-go/tfprotov5/internal/tfplugin5._Provider_ReadResource_Handler(0x716afc0, 0xc0014d1f60, 0x7db3480, 0xc001bf4750, 0xc00208a000, 0x0, 0x7db3480, 0xc001bf4750, 0xc00198e000, 0x917) 2021-01-25T18:57:14.067-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/github.com/hashicorp/terraform-plugin-go@v0.2.1/tfprotov5/internal/tfplugin5/tfplugin5_grpc.pb.go:344 +0x214 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: google.golang.org/grpc.(*Server).processUnaryRPC(0xc0001fee00, 0x7dd6320, 0xc000888600, 0xc001824f00, 0xc000920510, 0xb18b330, 0x0, 0x0, 0x0) 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:1194 +0x522 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: google.golang.org/grpc.(*Server).handleStream(0xc0001fee00, 0x7dd6320, 0xc000888600, 0xc001824f00, 0x0) 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:1517 +0xd05 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: google.golang.org/grpc.(*Server).serveStreams.func1.2(0xc001154ce0, 0xc0001fee00, 0x7dd6320, 0xc000888600, 0xc001824f00) 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:859 +0xa5 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: created by google.golang.org/grpc.(*Server).serveStreams.func1 2021-01-25T18:57:14.068-0800 [DEBUG] plugin.terraform-provider-aws_v3.25.0_x5: /opt/teamcity-agent/work/5d79fe75d4460a2f/pkg/mod/google.golang.org/grpc@v1.32.0/server.go:857 +0x1fd ``` I have no idea what's going on, but seems panic is prima facie bug. I'm testing this fix on my local provider: ``` terraform-providers(3:58823)$ git diff diff --git a/aws/resource_aws_instance.go b/aws/resource_aws_instance.go index 7e69c85f6..fdd7b24e0 100644 --- a/aws/resource_aws_instance.go +++ b/aws/resource_aws_instance.go @@ -1662,7 +1662,7 @@ func readBlockDevices(d *schema.ResourceData, instance *ec2.Instance, conn *ec2. // and #readBlockDevicesFromInstance only returns 1 reference to a block-device // stored in ibds["root"] if _, ok := d.GetOk("ebs_block_device"); ok { - if len(ibds["ebs"].([]map[string]interface{})) == 0 { + if ibds["ebs"] != nil && len(ibds["ebs"].([]map[string]interface{})) == 0 { ebs := make(map[string]interface{}) for k, v := range ibds["root"].(map[string]interface{}) { ebs[k] = v ``` <!--- Please keep this note for the community ---> ### Community Note * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request * Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request * If you are interested in working on this issue or have submitted a pull request, please leave a comment <!--- Thank you for keeping this note for the community ---> ### Terraform CLI and Terraform AWS Provider Version ``` $ terraform -version Terraform v0.14.5 + provider registry.terraform.io/hashicorp/aws v3.25.0 + provider registry.terraform.io/hashicorp/external v2.0.0 + provider registry.terraform.io/hashicorp/template v2.2.0 ``` <!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). ---> ### Affected Resource(s) It is crashing during plan before it starts updating what the plan would do, walking the dag I guess. I ran it under TF_LOG=1 but the immediate logging around the panic lines don't seem related to aws_instance resource. I can't just put the whole config out here. <!--- Please list the affected resources and data sources. ---> * aws_instance maybe ### Terraform Configuration Files <!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code ---> I won't be able to upload all the terraform config. If I can reproduce it in a smaller set, I'll submit that. I will also note here if my proposed patch fixes the issue. ### Debug Output <!--- Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist. To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html). ---> ### Panic Output <!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. ---> I can't find a crash.log but the panic and backtrace are above. ### Expected Behavior <!--- What should have happened? ---> Successful apply. ### Actual Behavior <!--- What actually happened? ---> Lot of output like: ``` Error: rpc error: code = Canceled desc = context canceled Error: rpc error: code = Canceled desc = context canceled Error: rpc error: code = Canceled desc = context canceled ``` ### Steps to Reproduce <!--- Please list the steps required to reproduce the issue. ---> 1. `terraform apply` ### Important Factoids <!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? ---> Biggish? 3133 lines of tf, 532 items in 'terraform state list' and 47 ec2. Mostly just vanilla S3 and Ec2. More VPC and subnets than our normal accounts (multi-tenant SaaS implementation). ### References <!--- Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example: ---> * #0000
non_priority
panic in aws resource aws instance go in issues my account is getting panic in line of version of aws resource aws instance go if len ibds map interface the backtrace is panic interface conversion interface is nil not map interface plugin terraform provider aws plugin terraform provider aws goroutine plugin terraform provider aws github com terraform providers terraform provider aws aws readblockdevices plugin terraform provider aws opt teamcity agent work src github com hashicorp terraform provider aws aws resource aws instance go plugin terraform provider aws github com terraform providers terraform provider aws aws resourceawsinstanceread plugin terraform provider aws opt teamcity agent work src github com hashicorp terraform provider aws aws resource aws instance go plugin terraform provider aws github com hashicorp terraform plugin sdk helper schema resource read plugin terraform provider aws opt teamcity agent work pkg mod github com hashicorp terraform plugin sdk helper schema resource go plugin terraform provider aws github com hashicorp terraform plugin sdk helper schema resource refreshwithoutupgrade plugin terraform provider aws opt teamcity agent work pkg mod github com hashicorp terraform plugin sdk helper schema resource go plugin terraform provider aws github com hashicorp terraform plugin sdk helper schema grpcproviderserver readresource plugin terraform provider aws opt teamcity agent work pkg mod github com hashicorp terraform plugin sdk helper schema grpc provider go plugin terraform provider aws github com hashicorp terraform plugin go server server readresource plugin terraform provider aws opt teamcity agent work pkg mod github com hashicorp terraform plugin go server server go plugin terraform provider aws github com hashicorp terraform plugin go internal provider readresource handler plugin terraform provider aws opt teamcity agent work pkg mod github com hashicorp terraform plugin go internal grpc pb go plugin terraform provider aws google golang org grpc server processunaryrpc plugin terraform provider aws opt teamcity agent work pkg mod google golang org grpc server go plugin terraform provider aws google golang org grpc server handlestream plugin terraform provider aws opt teamcity agent work pkg mod google golang org grpc server go plugin terraform provider aws google golang org grpc server servestreams plugin terraform provider aws opt teamcity agent work pkg mod google golang org grpc server go plugin terraform provider aws created by google golang org grpc server servestreams plugin terraform provider aws opt teamcity agent work pkg mod google golang org grpc server go i have no idea what s going on but seems panic is prima facie bug i m testing this fix on my local provider terraform providers git diff diff git a aws resource aws instance go b aws resource aws instance go index a aws resource aws instance go b aws resource aws instance go func readblockdevices d schema resourcedata instance instance conn and readblockdevicesfrominstance only returns reference to a block device stored in ibds if ok d getok ebs block device ok if len ibds map interface if ibds nil len ibds map interface ebs make map interface for k v range ibds map interface ebs v community note please vote on this issue by adding a 👍 to the original issue to help the community and maintainers prioritize this request please do not leave or other comments that do not add relevant new information or questions they generate extra noise for issue followers and do not help prioritize the request if you are interested in working on this issue or have submitted a pull request please leave a comment terraform cli and terraform aws provider version terraform version terraform provider registry terraform io hashicorp aws provider registry terraform io hashicorp external provider registry terraform io hashicorp template affected resource s it is crashing during plan before it starts updating what the plan would do walking the dag i guess i ran it under tf log but the immediate logging around the panic lines don t seem related to aws instance resource i can t just put the whole config out here aws instance maybe terraform configuration files i won t be able to upload all the terraform config if i can reproduce it in a smaller set i ll submit that i will also note here if my proposed patch fixes the issue debug output please provide a link to a github gist containing the complete debug output please do not paste the debug output in the issue just paste a link to the gist to obtain the debug output see the panic output i can t find a crash log but the panic and backtrace are above expected behavior successful apply actual behavior lot of output like error rpc error code canceled desc context canceled error rpc error code canceled desc context canceled error rpc error code canceled desc context canceled steps to reproduce terraform apply important factoids biggish lines of tf items in terraform state list and mostly just vanilla and more vpc and subnets than our normal accounts multi tenant saas implementation references information about referencing github issues are there any other github issues open or closed or pull requests that should be linked here vendor documentation for example
0
254,973
19,278,726,039
IssuesEvent
2021-12-10 14:51:25
Maagan-Michael/invitease
https://api.github.com/repos/Maagan-Michael/invitease
closed
Choose a task management platform
documentation
As suggested by @dangalg in #7 we should try and utilize a task management platform. Since we don't really have agile development methodology I'm not sure it's super relevant but we have the following suggestions: Taiga - Open source. Trello - Free but commercial. WeKan - Open source. *GitHub Projects - Closed source, builtin. We can also work with assigning Issues to ourselves.
1.0
Choose a task management platform - As suggested by @dangalg in #7 we should try and utilize a task management platform. Since we don't really have agile development methodology I'm not sure it's super relevant but we have the following suggestions: Taiga - Open source. Trello - Free but commercial. WeKan - Open source. *GitHub Projects - Closed source, builtin. We can also work with assigning Issues to ourselves.
non_priority
choose a task management platform as suggested by dangalg in we should try and utilize a task management platform since we don t really have agile development methodology i m not sure it s super relevant but we have the following suggestions taiga open source trello free but commercial wekan open source github projects closed source builtin we can also work with assigning issues to ourselves
0
58,997
8,318,561,112
IssuesEvent
2018-09-25 14:57:18
sky-uk/toolkit
https://api.github.com/repos/sky-uk/toolkit
opened
Remove legacy references within documentation
chore documentation
**Describe the bug** There are a couple of references to deprecated non-publicly accessible libraries within the README and documentation. These should be updated or removed where applicable. **To Reproduce** n/a **Expected behavior** n/a **Attempted Fixes** n/a **Screenshots** n/a **Desktop (please complete the following information):** n/a **Smartphone (please complete the following information):** n/a **Additional context** n/a
1.0
Remove legacy references within documentation - **Describe the bug** There are a couple of references to deprecated non-publicly accessible libraries within the README and documentation. These should be updated or removed where applicable. **To Reproduce** n/a **Expected behavior** n/a **Attempted Fixes** n/a **Screenshots** n/a **Desktop (please complete the following information):** n/a **Smartphone (please complete the following information):** n/a **Additional context** n/a
non_priority
remove legacy references within documentation describe the bug there are a couple of references to deprecated non publicly accessible libraries within the readme and documentation these should be updated or removed where applicable to reproduce n a expected behavior n a attempted fixes n a screenshots n a desktop please complete the following information n a smartphone please complete the following information n a additional context n a
0
326,447
27,991,287,464
IssuesEvent
2023-03-27 04:07:40
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
closed
[TPC] com.hazelcast.internal.tpcengine.nio.NioAsyncSocketTest
Type: Test-Failure Source: Internal Module: TPC Team: Alto
_master_ (commit e5873252f705d65b3f78df96a742c7448127821f) Failed on ibm-8: https://jenkins.hazelcast.com/view/Official%20Builds/job/Hazelcast-master-IbmJDK8-fips/72/testReport/com.hazelcast.internal.tpcengine.nio/NioAsyncSocketTest/ Following tests failed with the same exception: - `com.hazelcast.internal.tpcengine.nio.NioAsyncSocketTest.test_readable` - `com.hazelcast.internal.tpcengine.nio.NioAsyncSocketTest.test_connect` <details><summary>Stacktrace:</summary> ``` java.lang.AssertionError: expected:</127.0.0.1:33099> but was:<null> at org.junit.Assert.fail(Assert.java:89) at org.junit.Assert.failNotEquals(Assert.java:835) at org.junit.Assert.assertEquals(Assert.java:120) at org.junit.Assert.assertEquals(Assert.java:146) at com.hazelcast.internal.tpcengine.AsyncSocketTest.test_readable(AsyncSocketTest.java:195) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:90) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:55) at java.lang.reflect.Method.invoke(Method.java:508) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.junit.runners.Suite.runChild(Suite.java:128) at org.junit.runners.Suite.runChild(Suite.java:27) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.apache.maven.surefire.junitcore.JUnitCore.run(JUnitCore.java:49) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.createRequestAndRun(JUnitCoreWrapper.java:120) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.executeEager(JUnitCoreWrapper.java:95) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:75) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:69) at org.apache.maven.surefire.junitcore.JUnitCoreProvider.invoke(JUnitCoreProvider.java:146) at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:385) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:162) at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:507) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:495) ``` </details> <details><summary>Standard output:</summary> ``` Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-954 Binding to /127.0.0.1:0 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: /127.0.0.1:33099 started accepting Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connecting to address:/127.0.0.1:33099 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: NioAsyncServerSocket[/127.0.0.1:33099] accepted: /127.0.0.1:50914->/127.0.0.1:33099 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connection established NioAsyncSocket[/127.0.0.1:50914->/127.0.0.1:33099] Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connection established NioAsyncSocket[/127.0.0.1:50914->/127.0.0.1:33099] Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning WARNING: Closing NioAsyncSocket[/127.0.0.1:50914->/127.0.0.1:33099] java.lang.NullPointerException at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handleConnect(NioAsyncSocket.java:438) at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handle(NioAsyncSocket.java:372) at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:86) at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408) at java.lang.Thread.run(Thread.java:825) Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[/127.0.0.1:33099->/127.0.0.1:50914] due to Remote socket closed! Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncServerSocket[/127.0.0.1:33099] due to Reactor-1 is terminating. Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-954 terminated Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connecting to address:/127.0.0.1:5000 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning WARNING: Closing NioAsyncSocket[null->null] java.net.ConnectException: Connection refused at sun.nio.ch.SocketChannelImpl.checkConnect(Native Method) at sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:731) at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handleConnect(NioAsyncSocket.java:428) at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handle(NioAsyncSocket.java:372) at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:86) at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408) at java.lang.Thread.run(Thread.java:825) Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-955 terminated Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating. Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-956 terminated Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating. Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-957 terminated Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-958 Binding to /127.0.0.1:0 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: /127.0.0.1:37617 started accepting Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connecting to address:/127.0.0.1:37617 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: NioAsyncServerSocket[/127.0.0.1:37617] accepted: /127.0.0.1:37442->/127.0.0.1:37617 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connection established NioAsyncSocket[/127.0.0.1:37442->/127.0.0.1:37617] Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connection established NioAsyncSocket[/127.0.0.1:37442->/127.0.0.1:37617] Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning WARNING: Closing NioAsyncSocket[/127.0.0.1:37442->/127.0.0.1:37617] java.lang.NullPointerException at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handleConnect(NioAsyncSocket.java:438) at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handle(NioAsyncSocket.java:372) at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:86) at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408) at java.lang.Thread.run(Thread.java:825) Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[/127.0.0.1:37617->/127.0.0.1:37442] due to Remote socket closed! Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncServerSocket[/127.0.0.1:37617] due to Reactor-1 is terminating. Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-958 terminated Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[null->null] Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-959 terminated Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[null->null] Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-960 terminated Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating. Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-961 terminated Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning WARNING: java.lang.IllegalStateException: NioAsyncSocket[null->null] is already started java.lang.IllegalStateException: NioAsyncSocket[null->null] is already started at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket.start0(NioAsyncSocket.java:183) at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket.lambda$start$2(NioAsyncSocket.java:170) at com.hazelcast.internal.tpcengine.Eventloop.runExternalTasks(Eventloop.java:167) at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:93) at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408) at java.lang.Thread.run(Thread.java:825) Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating. Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-962 terminated ``` </details> Standard output can be found here - https://s3.console.aws.amazon.com/s3/buckets/j-artifacts/Hazelcast-master-IbmJDK8-fips/72/
1.0
[TPC] com.hazelcast.internal.tpcengine.nio.NioAsyncSocketTest - _master_ (commit e5873252f705d65b3f78df96a742c7448127821f) Failed on ibm-8: https://jenkins.hazelcast.com/view/Official%20Builds/job/Hazelcast-master-IbmJDK8-fips/72/testReport/com.hazelcast.internal.tpcengine.nio/NioAsyncSocketTest/ Following tests failed with the same exception: - `com.hazelcast.internal.tpcengine.nio.NioAsyncSocketTest.test_readable` - `com.hazelcast.internal.tpcengine.nio.NioAsyncSocketTest.test_connect` <details><summary>Stacktrace:</summary> ``` java.lang.AssertionError: expected:</127.0.0.1:33099> but was:<null> at org.junit.Assert.fail(Assert.java:89) at org.junit.Assert.failNotEquals(Assert.java:835) at org.junit.Assert.assertEquals(Assert.java:120) at org.junit.Assert.assertEquals(Assert.java:146) at com.hazelcast.internal.tpcengine.AsyncSocketTest.test_readable(AsyncSocketTest.java:195) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:90) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:55) at java.lang.reflect.Method.invoke(Method.java:508) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.junit.runners.Suite.runChild(Suite.java:128) at org.junit.runners.Suite.runChild(Suite.java:27) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.apache.maven.surefire.junitcore.JUnitCore.run(JUnitCore.java:49) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.createRequestAndRun(JUnitCoreWrapper.java:120) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.executeEager(JUnitCoreWrapper.java:95) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:75) at org.apache.maven.surefire.junitcore.JUnitCoreWrapper.execute(JUnitCoreWrapper.java:69) at org.apache.maven.surefire.junitcore.JUnitCoreProvider.invoke(JUnitCoreProvider.java:146) at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:385) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:162) at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:507) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:495) ``` </details> <details><summary>Standard output:</summary> ``` Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-954 Binding to /127.0.0.1:0 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: /127.0.0.1:33099 started accepting Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connecting to address:/127.0.0.1:33099 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: NioAsyncServerSocket[/127.0.0.1:33099] accepted: /127.0.0.1:50914->/127.0.0.1:33099 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connection established NioAsyncSocket[/127.0.0.1:50914->/127.0.0.1:33099] Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connection established NioAsyncSocket[/127.0.0.1:50914->/127.0.0.1:33099] Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning WARNING: Closing NioAsyncSocket[/127.0.0.1:50914->/127.0.0.1:33099] java.lang.NullPointerException at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handleConnect(NioAsyncSocket.java:438) at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handle(NioAsyncSocket.java:372) at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:86) at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408) at java.lang.Thread.run(Thread.java:825) Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[/127.0.0.1:33099->/127.0.0.1:50914] due to Remote socket closed! Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncServerSocket[/127.0.0.1:33099] due to Reactor-1 is terminating. Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-954 terminated Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connecting to address:/127.0.0.1:5000 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning WARNING: Closing NioAsyncSocket[null->null] java.net.ConnectException: Connection refused at sun.nio.ch.SocketChannelImpl.checkConnect(Native Method) at sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:731) at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handleConnect(NioAsyncSocket.java:428) at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handle(NioAsyncSocket.java:372) at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:86) at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408) at java.lang.Thread.run(Thread.java:825) Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-955 terminated Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating. Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-956 terminated Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating. Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-957 terminated Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-958 Binding to /127.0.0.1:0 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: /127.0.0.1:37617 started accepting Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connecting to address:/127.0.0.1:37617 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: NioAsyncServerSocket[/127.0.0.1:37617] accepted: /127.0.0.1:37442->/127.0.0.1:37617 Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connection established NioAsyncSocket[/127.0.0.1:37442->/127.0.0.1:37617] Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Connection established NioAsyncSocket[/127.0.0.1:37442->/127.0.0.1:37617] Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning WARNING: Closing NioAsyncSocket[/127.0.0.1:37442->/127.0.0.1:37617] java.lang.NullPointerException at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handleConnect(NioAsyncSocket.java:438) at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket$Handler.handle(NioAsyncSocket.java:372) at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:86) at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408) at java.lang.Thread.run(Thread.java:825) Mar 23, 2023 2:01:44 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[/127.0.0.1:37617->/127.0.0.1:37442] due to Remote socket closed! Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncServerSocket[/127.0.0.1:37617] due to Reactor-1 is terminating. Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-958 terminated Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[null->null] Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-959 terminated Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[null->null] Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-960 terminated Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating. Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-961 terminated Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger warning WARNING: java.lang.IllegalStateException: NioAsyncSocket[null->null] is already started java.lang.IllegalStateException: NioAsyncSocket[null->null] is already started at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket.start0(NioAsyncSocket.java:183) at com.hazelcast.internal.tpcengine.nio.NioAsyncSocket.lambda$start$2(NioAsyncSocket.java:170) at com.hazelcast.internal.tpcengine.Eventloop.runExternalTasks(Eventloop.java:167) at com.hazelcast.internal.tpcengine.nio.NioEventloop.run(NioEventloop.java:93) at com.hazelcast.internal.tpcengine.Reactor$StartEventloopTask.run(Reactor.java:408) at java.lang.Thread.run(Thread.java:825) Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Closing NioAsyncSocket[null->null] due to Reactor-1 is terminating. Mar 23, 2023 2:01:45 PM com.hazelcast.internal.tpcengine.logging.JulLoggerFactory$JulLogger info INFO: Thread-962 terminated ``` </details> Standard output can be found here - https://s3.console.aws.amazon.com/s3/buckets/j-artifacts/Hazelcast-master-IbmJDK8-fips/72/
non_priority
com hazelcast internal tpcengine nio nioasyncsockettest master commit failed on ibm following tests failed with the same exception com hazelcast internal tpcengine nio nioasyncsockettest test readable com hazelcast internal tpcengine nio nioasyncsockettest test connect stacktrace java lang assertionerror expected but was at org junit assert fail assert java at org junit assert failnotequals assert java at org junit assert assertequals assert java at org junit assert assertequals assert java at com hazelcast internal tpcengine asyncsockettest test readable asyncsockettest java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at org junit internal runners statements runafters evaluate runafters java at org junit runners parentrunner evaluate parentrunner java at org junit runners evaluate java at org junit runners parentrunner runleaf parentrunner java at org junit runners runchild java at org junit runners runchild java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org junit runners suite runchild suite java at org junit runners suite runchild suite java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org apache maven surefire junitcore junitcore run junitcore java at org apache maven surefire junitcore junitcorewrapper createrequestandrun junitcorewrapper java at org apache maven surefire junitcore junitcorewrapper executeeager junitcorewrapper java at org apache maven surefire junitcore junitcorewrapper execute junitcorewrapper java at org apache maven surefire junitcore junitcorewrapper execute junitcorewrapper java at org apache maven surefire junitcore junitcoreprovider invoke junitcoreprovider java at org apache maven surefire booter forkedbooter runsuitesinprocess forkedbooter java at org apache maven surefire booter forkedbooter execute forkedbooter java at org apache maven surefire booter forkedbooter run forkedbooter java at org apache maven surefire booter forkedbooter main forkedbooter java standard output mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread binding to mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info started accepting mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connecting to address mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info nioasyncserversocket accepted mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connection established nioasyncsocket mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connection established nioasyncsocket mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger warning warning closing nioasyncsocket java lang nullpointerexception at com hazelcast internal tpcengine nio nioasyncsocket handler handleconnect nioasyncsocket java at com hazelcast internal tpcengine nio nioasyncsocket handler handle nioasyncsocket java at com hazelcast internal tpcengine nio nioeventloop run nioeventloop java at com hazelcast internal tpcengine reactor starteventlooptask run reactor java at java lang thread run thread java mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket due to remote socket closed mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncserversocket due to reactor is terminating mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connecting to address mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger warning warning closing nioasyncsocket java net connectexception connection refused at sun nio ch socketchannelimpl checkconnect native method at sun nio ch socketchannelimpl finishconnect socketchannelimpl java at com hazelcast internal tpcengine nio nioasyncsocket handler handleconnect nioasyncsocket java at com hazelcast internal tpcengine nio nioasyncsocket handler handle nioasyncsocket java at com hazelcast internal tpcengine nio nioeventloop run nioeventloop java at com hazelcast internal tpcengine reactor starteventlooptask run reactor java at java lang thread run thread java mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket due to reactor is terminating mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket due to reactor is terminating mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread binding to mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info started accepting mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connecting to address mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info nioasyncserversocket accepted mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connection established nioasyncsocket mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info connection established nioasyncsocket mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger warning warning closing nioasyncsocket java lang nullpointerexception at com hazelcast internal tpcengine nio nioasyncsocket handler handleconnect nioasyncsocket java at com hazelcast internal tpcengine nio nioasyncsocket handler handle nioasyncsocket java at com hazelcast internal tpcengine nio nioeventloop run nioeventloop java at com hazelcast internal tpcengine reactor starteventlooptask run reactor java at java lang thread run thread java mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket due to remote socket closed mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncserversocket due to reactor is terminating mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket due to reactor is terminating mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger warning warning java lang illegalstateexception nioasyncsocket is already started java lang illegalstateexception nioasyncsocket is already started at com hazelcast internal tpcengine nio nioasyncsocket nioasyncsocket java at com hazelcast internal tpcengine nio nioasyncsocket lambda start nioasyncsocket java at com hazelcast internal tpcengine eventloop runexternaltasks eventloop java at com hazelcast internal tpcengine nio nioeventloop run nioeventloop java at com hazelcast internal tpcengine reactor starteventlooptask run reactor java at java lang thread run thread java mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info closing nioasyncsocket due to reactor is terminating mar pm com hazelcast internal tpcengine logging julloggerfactory jullogger info info thread terminated standard output can be found here
0
140,922
18,927,836,916
IssuesEvent
2021-11-17 11:26:26
lesjoursfr/gdpr-consent
https://api.github.com/repos/lesjoursfr/gdpr-consent
closed
CVE-2020-15366 (Medium) detected in ajv-4.11.8.tgz - autoclosed
security vulnerability
## CVE-2020-15366 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ajv-4.11.8.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-4.11.8.tgz">https://registry.npmjs.org/ajv/-/ajv-4.11.8.tgz</a></p> <p>Path to dependency file: gdpr-consent/package.json</p> <p>Path to vulnerable library: gdpr-consent/node_modules/sass-lint/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - sass-lint-1.13.1.tgz (Root Library) - eslint-2.13.1.tgz - table-3.8.3.tgz - :x: **ajv-4.11.8.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lesjoursfr/gdpr-consent/commit/4ec31cba6a050fd1e1159f9efa5d328b3a4efb23">4ec31cba6a050fd1e1159f9efa5d328b3a4efb23</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.) <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15366>CVE-2020-15366</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/ajv-validator/ajv/releases/tag/v6.12.3">https://github.com/ajv-validator/ajv/releases/tag/v6.12.3</a></p> <p>Release Date: 2020-07-15</p> <p>Fix Resolution: ajv - 6.12.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-15366 (Medium) detected in ajv-4.11.8.tgz - autoclosed - ## CVE-2020-15366 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ajv-4.11.8.tgz</b></p></summary> <p>Another JSON Schema Validator</p> <p>Library home page: <a href="https://registry.npmjs.org/ajv/-/ajv-4.11.8.tgz">https://registry.npmjs.org/ajv/-/ajv-4.11.8.tgz</a></p> <p>Path to dependency file: gdpr-consent/package.json</p> <p>Path to vulnerable library: gdpr-consent/node_modules/sass-lint/node_modules/ajv/package.json</p> <p> Dependency Hierarchy: - sass-lint-1.13.1.tgz (Root Library) - eslint-2.13.1.tgz - table-3.8.3.tgz - :x: **ajv-4.11.8.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lesjoursfr/gdpr-consent/commit/4ec31cba6a050fd1e1159f9efa5d328b3a4efb23">4ec31cba6a050fd1e1159f9efa5d328b3a4efb23</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.) <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-15366>CVE-2020-15366</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/ajv-validator/ajv/releases/tag/v6.12.3">https://github.com/ajv-validator/ajv/releases/tag/v6.12.3</a></p> <p>Release Date: 2020-07-15</p> <p>Fix Resolution: ajv - 6.12.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in ajv tgz autoclosed cve medium severity vulnerability vulnerable library ajv tgz another json schema validator library home page a href path to dependency file gdpr consent package json path to vulnerable library gdpr consent node modules sass lint node modules ajv package json dependency hierarchy sass lint tgz root library eslint tgz table tgz x ajv tgz vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in ajv validate in ajv aka another json schema validator a carefully crafted json schema could be provided that allows execution of other code by prototype pollution while untrusted schemas are recommended against the worst case of an untrusted schema should be a denial of service not execution of code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ajv step up your open source security game with whitesource
0
230,135
17,602,713,680
IssuesEvent
2021-08-17 13:42:40
flutter/flutter
https://api.github.com/repos/flutter/flutter
closed
RenderToggleable class not available in latest dev and master, but is available on stable.
framework documentation passed first triage
RenderToggleable class is not available in dev channel 2.1.0-12.1.pre version
1.0
RenderToggleable class not available in latest dev and master, but is available on stable. - RenderToggleable class is not available in dev channel 2.1.0-12.1.pre version
non_priority
rendertoggleable class not available in latest dev and master but is available on stable rendertoggleable class is not available in dev channel pre version
0
161,027
25,274,887,771
IssuesEvent
2022-11-16 11:56:05
flutter/flutter
https://api.github.com/repos/flutter/flutter
closed
showLicensePage throws RenderFlex overflow error in landscape when fontSize/Display size is largest
framework f: material design a: accessibility has reproducible steps found in release: 1.22
<!-- Thank you for using Flutter! If you are looking for support, please check out our documentation or consider asking a question on Stack Overflow: * https://flutter.dev/ * https://api.flutter.dev/ * https://stackoverflow.com/questions/tagged/flutter?sort=frequent If you have found a bug or if our documentation doesn't have an answer to what you're looking for, then fill out the template below. Please read our guide to filing a bug first: https://flutter.dev/docs/resources/bug-reports --> ## Steps to Reproduce <!-- You must include full steps to reproduce so that we can reproduce the problem. --> 1. Create test app: flutter create test. 2. Change fab onPressed method to be like this: ``` onPressed: () => showLicensePage( context: context, applicationIcon: Icon(Icons.add), applicationVersion: "TEST", ), ``` 3. Start x86 Emulator Pixel 2 1980x1920 xxhdpi 4. Open Settings/Display/Advanced and set Font Size to Larger and Display Size to Largest 5. Rotate emulator in landscape mode 6. Execute **flutter run** to start app 7. Click on fab to show license page **Expected results:** <!-- what did you want to see? --> Licenses list without any issues **Actual results:** <!-- what did you see? --> Black/Yellow markups showing overflow error at the bottom of the screen until licenses list is rendered completely. The error present only during progress indicator stage, then disappears. <details> <summary>Logs</summary> <!-- Run your application with `flutter run --verbose` and attach all the log output below between the lines with the backticks. If there is an exception, please see if the error message includes enough information to explain how to solve the issue. --> ``` I/flutter (16356): ══╡ EXCEPTION CAUGHT BY RENDERING LIBRARY ╞═════════════════════════════════════════════════════════ I/flutter (16356): The following assertion was thrown during layout: I/flutter (16356): A RenderFlex overflowed by 1.00 pixels on the bottom. I/flutter (16356): I/flutter (16356): The relevant error-causing widget was: I/flutter (16356): MaterialApp file:///Users/apc/Work/test2/lib/main.dart:12:12 I/flutter (16356): I/flutter (16356): The overflowing RenderFlex has an orientation of Axis.vertical. I/flutter (16356): The edge of the RenderFlex that is overflowing has been marked in the rendering with a yellow and I/flutter (16356): black striped pattern. This is usually caused by the contents being too big for the RenderFlex. I/flutter (16356): Consider applying a flex factor (e.g. using an Expanded widget) to force the children of the I/flutter (16356): RenderFlex to fit within the available space instead of being sized to their natural size. I/flutter (16356): This is considered an error condition because it indicates that there is content that cannot be I/flutter (16356): seen. If the content is legitimately bigger than the available space, consider clipping it with a I/flutter (16356): ClipRect widget before putting it in the flex, or using a scrollable container rather than a Flex, I/flutter (16356): like a ListView. I/flutter (16356): The specific RenderFlex in question is: RenderFlex#00445 relayoutBoundary=up4 OVERFLOWING: I/flutter (16356): creator: Column ← LayoutBuilder-[<ConnectionState.waiting>] ← FadeTransition ← KeyedSubtree-[<0>] ← I/flutter (16356): Stack ← AnimatedSwitcher ← FutureBuilder<_LicenseData> ← _PackagesView ← _BodyBuilder ← MediaQuery I/flutter (16356): ← LayoutId-[<_ScaffoldSlot.body>] ← CustomMultiChildLayout ← ⋯ I/flutter (16356): parentData: offset=Offset(0.0, 0.0) (can use size) I/flutter (16356): constraints: BoxConstraints(0.0<=w<=520.9, 0.0<=h<=240.0) I/flutter (16356): size: Size(520.9, 240.0) I/flutter (16356): direction: vertical I/flutter (16356): mainAxisAlignment: start I/flutter (16356): mainAxisSize: max I/flutter (16356): crossAxisAlignment: center I/flutter (16356): verticalDirection: down I/flutter (16356): ◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤ I/flutter (16356): ════════════════════════════════════════════════════════════════════════════════════════════════════ ``` <!-- Finally, paste the output of running `flutter doctor -v` here. --> ``` [✓] Flutter (Channel master, 1.22.0-10.0.pre.65, on Mac OS X 10.15.6 19G2021, locale en-UA) • Flutter version 1.22.0-10.0.pre.65 at /Users/apc/Library/flutter • Framework revision 2032a448ed (7 hours ago), 2020-09-02 23:36:19 -0700 • Engine revision 165abef0a2 • Dart version 2.10.0 (build 2.10.0-77.0.dev) [✓] Android toolchain - develop for Android devices (Android SDK version 29.0.3) • Android SDK at /Users/apc/Library/Android/sdk • Platform android-29, build-tools 29.0.3 • ANDROID_HOME = /Users/apc/Library/Android/sdk • ANDROID_SDK_ROOT = /Users/apc/Library/Android/sdk • Java binary at: /Applications/Android Studio.app/Contents/jre/jdk/Contents/Home/bin/java • Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b3-6222593) • All Android licenses accepted. [✗] Xcode - develop for iOS and macOS ✗ Xcode installation is incomplete; a full installation is necessary for iOS development. Download at: https://developer.apple.com/xcode/download/ Or install Xcode via the App Store. Once installed, run: sudo xcode-select --switch /Applications/Xcode.app/Contents/Developer sudo xcodebuild -runFirstLaunch ✗ CocoaPods not installed. CocoaPods is used to retrieve the iOS and macOS platform side's plugin code that responds to your plugin usage on the Dart side. Without CocoaPods, plugins will not work on iOS or macOS. For more info, see https://flutter.dev/platform-plugins To install: sudo gem install cocoapods [✓] Android Studio (version 4.0) • Android Studio at /Applications/Android Studio.app/Contents • Flutter plugin version 48.1.2 • Dart plugin version 193.7547 • Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b3-6222593) [✓] Connected device (1 available) • sdk gphone x86 (mobile) • emulator-5554 • android-x86 • Android 11 (API 30) (emulator) ! Doctor found issues in 1 category. ``` </details>
1.0
showLicensePage throws RenderFlex overflow error in landscape when fontSize/Display size is largest - <!-- Thank you for using Flutter! If you are looking for support, please check out our documentation or consider asking a question on Stack Overflow: * https://flutter.dev/ * https://api.flutter.dev/ * https://stackoverflow.com/questions/tagged/flutter?sort=frequent If you have found a bug or if our documentation doesn't have an answer to what you're looking for, then fill out the template below. Please read our guide to filing a bug first: https://flutter.dev/docs/resources/bug-reports --> ## Steps to Reproduce <!-- You must include full steps to reproduce so that we can reproduce the problem. --> 1. Create test app: flutter create test. 2. Change fab onPressed method to be like this: ``` onPressed: () => showLicensePage( context: context, applicationIcon: Icon(Icons.add), applicationVersion: "TEST", ), ``` 3. Start x86 Emulator Pixel 2 1980x1920 xxhdpi 4. Open Settings/Display/Advanced and set Font Size to Larger and Display Size to Largest 5. Rotate emulator in landscape mode 6. Execute **flutter run** to start app 7. Click on fab to show license page **Expected results:** <!-- what did you want to see? --> Licenses list without any issues **Actual results:** <!-- what did you see? --> Black/Yellow markups showing overflow error at the bottom of the screen until licenses list is rendered completely. The error present only during progress indicator stage, then disappears. <details> <summary>Logs</summary> <!-- Run your application with `flutter run --verbose` and attach all the log output below between the lines with the backticks. If there is an exception, please see if the error message includes enough information to explain how to solve the issue. --> ``` I/flutter (16356): ══╡ EXCEPTION CAUGHT BY RENDERING LIBRARY ╞═════════════════════════════════════════════════════════ I/flutter (16356): The following assertion was thrown during layout: I/flutter (16356): A RenderFlex overflowed by 1.00 pixels on the bottom. I/flutter (16356): I/flutter (16356): The relevant error-causing widget was: I/flutter (16356): MaterialApp file:///Users/apc/Work/test2/lib/main.dart:12:12 I/flutter (16356): I/flutter (16356): The overflowing RenderFlex has an orientation of Axis.vertical. I/flutter (16356): The edge of the RenderFlex that is overflowing has been marked in the rendering with a yellow and I/flutter (16356): black striped pattern. This is usually caused by the contents being too big for the RenderFlex. I/flutter (16356): Consider applying a flex factor (e.g. using an Expanded widget) to force the children of the I/flutter (16356): RenderFlex to fit within the available space instead of being sized to their natural size. I/flutter (16356): This is considered an error condition because it indicates that there is content that cannot be I/flutter (16356): seen. If the content is legitimately bigger than the available space, consider clipping it with a I/flutter (16356): ClipRect widget before putting it in the flex, or using a scrollable container rather than a Flex, I/flutter (16356): like a ListView. I/flutter (16356): The specific RenderFlex in question is: RenderFlex#00445 relayoutBoundary=up4 OVERFLOWING: I/flutter (16356): creator: Column ← LayoutBuilder-[<ConnectionState.waiting>] ← FadeTransition ← KeyedSubtree-[<0>] ← I/flutter (16356): Stack ← AnimatedSwitcher ← FutureBuilder<_LicenseData> ← _PackagesView ← _BodyBuilder ← MediaQuery I/flutter (16356): ← LayoutId-[<_ScaffoldSlot.body>] ← CustomMultiChildLayout ← ⋯ I/flutter (16356): parentData: offset=Offset(0.0, 0.0) (can use size) I/flutter (16356): constraints: BoxConstraints(0.0<=w<=520.9, 0.0<=h<=240.0) I/flutter (16356): size: Size(520.9, 240.0) I/flutter (16356): direction: vertical I/flutter (16356): mainAxisAlignment: start I/flutter (16356): mainAxisSize: max I/flutter (16356): crossAxisAlignment: center I/flutter (16356): verticalDirection: down I/flutter (16356): ◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤ I/flutter (16356): ════════════════════════════════════════════════════════════════════════════════════════════════════ ``` <!-- Finally, paste the output of running `flutter doctor -v` here. --> ``` [✓] Flutter (Channel master, 1.22.0-10.0.pre.65, on Mac OS X 10.15.6 19G2021, locale en-UA) • Flutter version 1.22.0-10.0.pre.65 at /Users/apc/Library/flutter • Framework revision 2032a448ed (7 hours ago), 2020-09-02 23:36:19 -0700 • Engine revision 165abef0a2 • Dart version 2.10.0 (build 2.10.0-77.0.dev) [✓] Android toolchain - develop for Android devices (Android SDK version 29.0.3) • Android SDK at /Users/apc/Library/Android/sdk • Platform android-29, build-tools 29.0.3 • ANDROID_HOME = /Users/apc/Library/Android/sdk • ANDROID_SDK_ROOT = /Users/apc/Library/Android/sdk • Java binary at: /Applications/Android Studio.app/Contents/jre/jdk/Contents/Home/bin/java • Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b3-6222593) • All Android licenses accepted. [✗] Xcode - develop for iOS and macOS ✗ Xcode installation is incomplete; a full installation is necessary for iOS development. Download at: https://developer.apple.com/xcode/download/ Or install Xcode via the App Store. Once installed, run: sudo xcode-select --switch /Applications/Xcode.app/Contents/Developer sudo xcodebuild -runFirstLaunch ✗ CocoaPods not installed. CocoaPods is used to retrieve the iOS and macOS platform side's plugin code that responds to your plugin usage on the Dart side. Without CocoaPods, plugins will not work on iOS or macOS. For more info, see https://flutter.dev/platform-plugins To install: sudo gem install cocoapods [✓] Android Studio (version 4.0) • Android Studio at /Applications/Android Studio.app/Contents • Flutter plugin version 48.1.2 • Dart plugin version 193.7547 • Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b3-6222593) [✓] Connected device (1 available) • sdk gphone x86 (mobile) • emulator-5554 • android-x86 • Android 11 (API 30) (emulator) ! Doctor found issues in 1 category. ``` </details>
non_priority
showlicensepage throws renderflex overflow error in landscape when fontsize display size is largest thank you for using flutter if you are looking for support please check out our documentation or consider asking a question on stack overflow if you have found a bug or if our documentation doesn t have an answer to what you re looking for then fill out the template below please read our guide to filing a bug first steps to reproduce create test app flutter create test change fab onpressed method to be like this onpressed showlicensepage context context applicationicon icon icons add applicationversion test start emulator pixel xxhdpi open settings display advanced and set font size to larger and display size to largest rotate emulator in landscape mode execute flutter run to start app click on fab to show license page expected results licenses list without any issues actual results black yellow markups showing overflow error at the bottom of the screen until licenses list is rendered completely the error present only during progress indicator stage then disappears logs run your application with flutter run verbose and attach all the log output below between the lines with the backticks if there is an exception please see if the error message includes enough information to explain how to solve the issue i flutter ══╡ exception caught by rendering library ╞═════════════════════════════════════════════════════════ i flutter the following assertion was thrown during layout i flutter a renderflex overflowed by pixels on the bottom i flutter i flutter the relevant error causing widget was i flutter materialapp file users apc work lib main dart i flutter i flutter the overflowing renderflex has an orientation of axis vertical i flutter the edge of the renderflex that is overflowing has been marked in the rendering with a yellow and i flutter black striped pattern this is usually caused by the contents being too big for the renderflex i flutter consider applying a flex factor e g using an expanded widget to force the children of the i flutter renderflex to fit within the available space instead of being sized to their natural size i flutter this is considered an error condition because it indicates that there is content that cannot be i flutter seen if the content is legitimately bigger than the available space consider clipping it with a i flutter cliprect widget before putting it in the flex or using a scrollable container rather than a flex i flutter like a listview i flutter the specific renderflex in question is renderflex relayoutboundary overflowing i flutter creator column ← layoutbuilder ← fadetransition ← keyedsubtree ← i flutter stack ← animatedswitcher ← futurebuilder ← packagesview ← bodybuilder ← mediaquery i flutter ← layoutid ← custommultichildlayout ← ⋯ i flutter parentdata offset offset can use size i flutter constraints boxconstraints w h i flutter size size i flutter direction vertical i flutter mainaxisalignment start i flutter mainaxissize max i flutter crossaxisalignment center i flutter verticaldirection down i flutter ◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤ i flutter ════════════════════════════════════════════════════════════════════════════════════════════════════ flutter channel master pre on mac os x locale en ua • flutter version pre at users apc library flutter • framework revision hours ago • engine revision • dart version build dev android toolchain develop for android devices android sdk version • android sdk at users apc library android sdk • platform android build tools • android home users apc library android sdk • android sdk root users apc library android sdk • java binary at applications android studio app contents jre jdk contents home bin java • java version openjdk runtime environment build release • all android licenses accepted xcode develop for ios and macos ✗ xcode installation is incomplete a full installation is necessary for ios development download at or install xcode via the app store once installed run sudo xcode select switch applications xcode app contents developer sudo xcodebuild runfirstlaunch ✗ cocoapods not installed cocoapods is used to retrieve the ios and macos platform side s plugin code that responds to your plugin usage on the dart side without cocoapods plugins will not work on ios or macos for more info see to install sudo gem install cocoapods android studio version • android studio at applications android studio app contents • flutter plugin version • dart plugin version • java version openjdk runtime environment build release connected device available • sdk gphone mobile • emulator • android • android api emulator doctor found issues in category
0
35,327
6,444,680,577
IssuesEvent
2017-08-12 15:34:33
fossasia/open-event-orga-server
https://api.github.com/repos/fossasia/open-event-orga-server
closed
Custom-forms: Change data.type in custom-form
documentation has-PR rest-api
**I'm submitting a ...** (check one with "x") - [x] bug report - [ ] feature request - [ ] support request => Please do not submit support requests here, instead ask your query in out Gitter channel at https://gitter.im/fossasia/open-event-orga-server **Current behavior:** The type attribute is `custom_form` which leads to error 409 while making a request after #4300 **Expected behavior:** The type attribute should be `custom-form` @enigmaeth Can you please check?
1.0
Custom-forms: Change data.type in custom-form - **I'm submitting a ...** (check one with "x") - [x] bug report - [ ] feature request - [ ] support request => Please do not submit support requests here, instead ask your query in out Gitter channel at https://gitter.im/fossasia/open-event-orga-server **Current behavior:** The type attribute is `custom_form` which leads to error 409 while making a request after #4300 **Expected behavior:** The type attribute should be `custom-form` @enigmaeth Can you please check?
non_priority
custom forms change data type in custom form i m submitting a check one with x bug report feature request support request please do not submit support requests here instead ask your query in out gitter channel at current behavior the type attribute is custom form which leads to error while making a request after expected behavior the type attribute should be custom form enigmaeth can you please check
0
122,366
10,220,660,817
IssuesEvent
2019-08-15 22:04:03
spacetelescope/jwst
https://api.github.com/repos/spacetelescope/jwst
closed
Add coverage test to Travis CI
enhancement testing
Would be nice to know the coverage of the tests. We can turn on GitHub coveralls webhook for automated coverage reporting too. Astropy has example on how to set this up.
1.0
Add coverage test to Travis CI - Would be nice to know the coverage of the tests. We can turn on GitHub coveralls webhook for automated coverage reporting too. Astropy has example on how to set this up.
non_priority
add coverage test to travis ci would be nice to know the coverage of the tests we can turn on github coveralls webhook for automated coverage reporting too astropy has example on how to set this up
0
5,527
5,723,950,286
IssuesEvent
2017-04-20 13:32:20
lesswrong-ru/lesswrong-ru
https://api.github.com/repos/lesswrong-ru/lesswrong-ru
closed
Настроить автоматические бекапы
infrastructure
В `~/private` лежат какие-то бекапы `a70553_lw_2016-12-09_17_00.zip` (mysql-база) и `lesswrong.ru_2016-12-09_17_00.zip` (drupal-сайт), которые делал не я. Либо хостинг их делает изредка сам (но они устарели на два месяца), либо они делаются по кнопке из админки, к которой у меня нет доступа. Я когда-то написал скрипт `~/private/full-backup.sh`, который бекапит базу и сайт, и запускаю его вручную перед крупными изменениями. Надо всё это автоматизировать. Варианты: * дождаться #7, переезда на VPS * выяснить у Юлия, можно ли настроить бекапы на макхосте * повесить где-нибудь скрипт на кроне, который будет делать `ssh lesswrong.ru ~/private/full-backup.sh` раз в сутки. Ещё хорошо бы, чтобы бекапы копировались куда-то ещё, а не хранились на той же машине. (На S3, например.)
1.0
Настроить автоматические бекапы - В `~/private` лежат какие-то бекапы `a70553_lw_2016-12-09_17_00.zip` (mysql-база) и `lesswrong.ru_2016-12-09_17_00.zip` (drupal-сайт), которые делал не я. Либо хостинг их делает изредка сам (но они устарели на два месяца), либо они делаются по кнопке из админки, к которой у меня нет доступа. Я когда-то написал скрипт `~/private/full-backup.sh`, который бекапит базу и сайт, и запускаю его вручную перед крупными изменениями. Надо всё это автоматизировать. Варианты: * дождаться #7, переезда на VPS * выяснить у Юлия, можно ли настроить бекапы на макхосте * повесить где-нибудь скрипт на кроне, который будет делать `ssh lesswrong.ru ~/private/full-backup.sh` раз в сутки. Ещё хорошо бы, чтобы бекапы копировались куда-то ещё, а не хранились на той же машине. (На S3, например.)
non_priority
настроить автоматические бекапы в private лежат какие то бекапы lw zip mysql база и lesswrong ru zip drupal сайт которые делал не я либо хостинг их делает изредка сам но они устарели на два месяца либо они делаются по кнопке из админки к которой у меня нет доступа я когда то написал скрипт private full backup sh который бекапит базу и сайт и запускаю его вручную перед крупными изменениями надо всё это автоматизировать варианты дождаться переезда на vps выяснить у юлия можно ли настроить бекапы на макхосте повесить где нибудь скрипт на кроне который будет делать ssh lesswrong ru private full backup sh раз в сутки ещё хорошо бы чтобы бекапы копировались куда то ещё а не хранились на той же машине на например
0
270,794
29,116,028,542
IssuesEvent
2023-05-17 01:06:14
pazhanivel07/frameworks_base_Aosp10_r33
https://api.github.com/repos/pazhanivel07/frameworks_base_Aosp10_r33
reopened
CVE-2021-0954 (High) detected in baseandroid-10.0.0_r46
Mend: dependency security vulnerability
## CVE-2021-0954 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>baseandroid-10.0.0_r46</b></p></summary> <p> <p>Android framework classes and services</p> <p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/base>https://android.googlesource.com/platform/frameworks/base</a></p> <p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/frameworks_base_Aosp10_r33/commit/20c111772c04525c865b7dc0b39fcfca73505927">20c111772c04525c865b7dc0b39fcfca73505927</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/core/java/com/android/internal/app/ResolverActivity.java</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In ResolverActivity, there is a possible user interaction bypass due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-143559931 <p>Publish Date: 2021-12-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-0954>CVE-2021-0954</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-0954 (High) detected in baseandroid-10.0.0_r46 - ## CVE-2021-0954 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>baseandroid-10.0.0_r46</b></p></summary> <p> <p>Android framework classes and services</p> <p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/base>https://android.googlesource.com/platform/frameworks/base</a></p> <p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/frameworks_base_Aosp10_r33/commit/20c111772c04525c865b7dc0b39fcfca73505927">20c111772c04525c865b7dc0b39fcfca73505927</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/core/java/com/android/internal/app/ResolverActivity.java</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In ResolverActivity, there is a possible user interaction bypass due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-143559931 <p>Publish Date: 2021-12-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-0954>CVE-2021-0954</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in baseandroid cve high severity vulnerability vulnerable library baseandroid android framework classes and services library home page a href found in head commit a href found in base branch master vulnerable source files core java com android internal app resolveractivity java vulnerability details in resolveractivity there is a possible user interaction bypass due to a tapjacking overlay attack this could lead to local escalation of privilege with user execution privileges needed user interaction is needed for exploitation product androidversions android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with mend
0
63,913
18,055,691,096
IssuesEvent
2021-09-20 07:56:44
primefaces/primefaces
https://api.github.com/repos/primefaces/primefaces
closed
Move JS Script To Bottom: JS Error when Primefaces is not used on Page
defect
**Describe the defect** When following is activated in web.xml and there is a page without Primefaces: ``` <context-param> <param-name>primefaces.MOVE_SCRIPTS_TO_BOTTOM</param-name> <param-value>true</param-value> </context-param> ``` following will be generated at the end: if(window.$){$(PrimeFaces.escapeClientId("4ff96bf4-a5ec-4916-9eff-dedb56222daf")).remove();} is it possible to generate following if: if(window.PrimeFaces){ if(window.$){$(PrimeFaces.escapeClientId("4ff96bf4-a5ec-4916-9eff-dedb56222daf")).remove();} } or mockup the escapeClientId function!? **Reproducer** Page with Move JS Script to bottom, but without Primefaces Component on Page **Environment:** - PF Version: 10.0 - JSF + version: 2.2.20 - Affected browsers: ALL **To Reproduce** run page and view error **Expected behavior** js error should not be there
1.0
Move JS Script To Bottom: JS Error when Primefaces is not used on Page - **Describe the defect** When following is activated in web.xml and there is a page without Primefaces: ``` <context-param> <param-name>primefaces.MOVE_SCRIPTS_TO_BOTTOM</param-name> <param-value>true</param-value> </context-param> ``` following will be generated at the end: if(window.$){$(PrimeFaces.escapeClientId("4ff96bf4-a5ec-4916-9eff-dedb56222daf")).remove();} is it possible to generate following if: if(window.PrimeFaces){ if(window.$){$(PrimeFaces.escapeClientId("4ff96bf4-a5ec-4916-9eff-dedb56222daf")).remove();} } or mockup the escapeClientId function!? **Reproducer** Page with Move JS Script to bottom, but without Primefaces Component on Page **Environment:** - PF Version: 10.0 - JSF + version: 2.2.20 - Affected browsers: ALL **To Reproduce** run page and view error **Expected behavior** js error should not be there
non_priority
move js script to bottom js error when primefaces is not used on page describe the defect when following is activated in web xml and there is a page without primefaces primefaces move scripts to bottom true following will be generated at the end if window primefaces escapeclientid remove is it possible to generate following if if window primefaces if window primefaces escapeclientid remove or mockup the escapeclientid function reproducer page with move js script to bottom but without primefaces component on page environment pf version jsf version affected browsers all to reproduce run page and view error expected behavior js error should not be there
0
6,564
14,890,787,316
IssuesEvent
2021-01-20 23:44:46
ArchiveBox/ArchiveBox
https://api.github.com/repos/ArchiveBox/ArchiveBox
closed
Bugfix: Use relative import to avoid module confliction
bug changes: architecture complexity: low status: wip
<!-- Please fill out the following information, feel free to delete sections if they're not applicable or if long issue templates annoy you. (the only required section is the version information) --> #### Describe the bug Currently, there are plenty of places in the source code that doesn't use relative import. For example, line 20 in admin.py: ```python from util import htmldecode, urldecode, ansi_to_html ``` This causes problem when there are other conflicting script/module name in `PYTHONPATH`. After examining other popular libs that have "util.py" (there are a lot) and have no issue to work, I found they all use relative import which will prevent this. From [`sqlalchemy`](https://github.com/sqlalchemy/sqlalchemy): ```python from . import util as _util # noqa ``` From [`imageio`](https://github.com/imageio/imageio): ```python from .core import util ``` #### Steps to reproduce <!-- For example: 1. Add some path to `PATYHONPATH` and have a util.py file there. 2. Run `archive init` in any folder. 3. It shows error `ImportError: cannot import name 'htmldecode' from 'util' ({path of my personal util.py})`. --> #### Screenshots or log output ``` [i] [2021-01-19 23:51:09] ArchiveBox v0.5.3: archivebox init > C:\!Others\test Traceback (most recent call last): File "c:\users\ikena\appdata\local\programs\python\python38\lib\runpy.py", line 193, in _run_module_as_main return _run_code(code, main_globals, None, File "c:\users\ikena\appdata\local\programs\python\python38\lib\runpy.py", line 86, in _run_code exec(code, run_globals) File "C:\Users\ikena\AppData\Local\Programs\Python\Python38\Scripts\archivebox.exe\__main__.py", line 7, in <module> from .cli import main File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\archivebox\cli\__init__.py", line 129, in main run_subcommand( File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\archivebox\cli\__init__.py", line 66, in run_subcommand setup_django(in_memory_db=subcommand in fake_db, check_db=subcommand in archive_cmds) File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\archivebox\config.py", line 1074, in setup_django django.setup() File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\__init__.py", line 24, in setup apps.populate(settings.INSTALLED_APPS) File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\apps\registry.py", line 122, in populate app_config.ready() File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\contrib\admin\apps.py", line 24, in ready self.module.autodiscover() File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\contrib\admin\__init__.py", line 24, in autodiscover autodiscover_modules('admin', register_to=site) File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\utils\module_loading.py", line 47, in autodiscover_modules import_module('%s.%s' % (app_config.name, module_to_search)) File "c:\users\ikena\appdata\local\programs\python\python38\lib\importlib\__init__.py", line 127, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "<frozen importlib._bootstrap>", line 1014, in _gcd_import File "<frozen importlib._bootstrap>", line 991, in _find_and_load File "<frozen importlib._bootstrap>", line 975, in _find_and_load_unlocked File "<frozen importlib._bootstrap>", line 671, in _load_unlocked File "<frozen importlib._bootstrap_external>", line 783, in exec_module File "<frozen importlib._bootstrap>", line 219, in _call_with_frames_removed File "C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\archivebox\core\admin.py", line 20, in <module> from util import htmldecode, urldecode, ansi_to_html ImportError: cannot import name 'htmldecode' from 'util' (C:\sync\code\python\_public\util.py) ``` #### ArchiveBox version <!-- Run the `archivebox version` command locally then copy paste the result here: --> ```logs ArchiveBox v0.5.3 Cpython Windows Windows-10-10.0.19041-SP0 AMD64 (not in Docker) [i] Dependency versions: √ ARCHIVEBOX_BINARY v0.5.3 valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Scripts\archivebox.exe √ PYTHON_BINARY v3.8.1 valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\python.exe √ DJANGO_BINARY v3.1.3 valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\django\bin\django-admin.py √ CURL_BINARY v7.55.1 valid c:\windows\system32\curl.EXE X WGET_BINARY ? invalid wget X NODE_BINARY ? invalid "C:\Program Files\nodejs\node.EXE" X SINGLEFILE_BINARY ? invalid single-file X READABILITY_BINARY ? invalid readability-extractor X MERCURY_BINARY ? invalid mercury-parser √ GIT_BINARY v2.29.2. valid "c:\program files\git\cmd\git.EXE" √ YOUTUBEDL_BINARY v2021.01.16 valid c:\software\!cli\youtube-dl.EXE X CHROME_BINARY ? invalid X RIPGREP_BINARY ? invalid rg [i] Source-code locations: √ PACKAGE_DIR 23 files valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\archivebox √ TEMPLATES_DIR 3 files valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\archivebox\themes [i] Secrets locations: - CHROME_USER_DATA_DIR - disabled - COOKIES_FILE - disabled [i] Data locations: [!] Warning: Missing 7 recommended dependencies ! WGET_BINARY: wget (unable to detect version) ! NODE_BINARY: C:\Program Files\nodejs\node.EXE (v14.8.0) ! SINGLEFILE_BINARY: single-file (unable to detect version) Hint: npm install --prefix . "git+https://github.com/ArchiveBox/ArchiveBox.git" or archivebox config --set SAVE_SINGLEFILE=False to silence this warning ! READABILITY_BINARY: readability-extractor (unable to detect version) Hint: npm install --prefix . "git+https://github.com/ArchiveBox/ArchiveBox.git" or archivebox config --set SAVE_READABILITY=False to silence this warning ! MERCURY_BINARY: mercury-parser (unable to detect version) Hint: npm install --prefix . "git+https://github.com/ArchiveBox/ArchiveBox.git" or archivebox config --set SAVE_MERCURY=False to silence this warning ! CHROME_BINARY: unable to find binary (unable to detect version) ! RIPGREP_BINARY: rg (unable to detect version)``` <!-- Tickets without full version info will closed until it is provided, we need the full output here to help you solve your issue -->
1.0
Bugfix: Use relative import to avoid module confliction - <!-- Please fill out the following information, feel free to delete sections if they're not applicable or if long issue templates annoy you. (the only required section is the version information) --> #### Describe the bug Currently, there are plenty of places in the source code that doesn't use relative import. For example, line 20 in admin.py: ```python from util import htmldecode, urldecode, ansi_to_html ``` This causes problem when there are other conflicting script/module name in `PYTHONPATH`. After examining other popular libs that have "util.py" (there are a lot) and have no issue to work, I found they all use relative import which will prevent this. From [`sqlalchemy`](https://github.com/sqlalchemy/sqlalchemy): ```python from . import util as _util # noqa ``` From [`imageio`](https://github.com/imageio/imageio): ```python from .core import util ``` #### Steps to reproduce <!-- For example: 1. Add some path to `PATYHONPATH` and have a util.py file there. 2. Run `archive init` in any folder. 3. It shows error `ImportError: cannot import name 'htmldecode' from 'util' ({path of my personal util.py})`. --> #### Screenshots or log output ``` [i] [2021-01-19 23:51:09] ArchiveBox v0.5.3: archivebox init > C:\!Others\test Traceback (most recent call last): File "c:\users\ikena\appdata\local\programs\python\python38\lib\runpy.py", line 193, in _run_module_as_main return _run_code(code, main_globals, None, File "c:\users\ikena\appdata\local\programs\python\python38\lib\runpy.py", line 86, in _run_code exec(code, run_globals) File "C:\Users\ikena\AppData\Local\Programs\Python\Python38\Scripts\archivebox.exe\__main__.py", line 7, in <module> from .cli import main File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\archivebox\cli\__init__.py", line 129, in main run_subcommand( File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\archivebox\cli\__init__.py", line 66, in run_subcommand setup_django(in_memory_db=subcommand in fake_db, check_db=subcommand in archive_cmds) File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\archivebox\config.py", line 1074, in setup_django django.setup() File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\__init__.py", line 24, in setup apps.populate(settings.INSTALLED_APPS) File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\apps\registry.py", line 122, in populate app_config.ready() File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\contrib\admin\apps.py", line 24, in ready self.module.autodiscover() File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\contrib\admin\__init__.py", line 24, in autodiscover autodiscover_modules('admin', register_to=site) File "c:\users\ikena\appdata\local\programs\python\python38\lib\site-packages\django\utils\module_loading.py", line 47, in autodiscover_modules import_module('%s.%s' % (app_config.name, module_to_search)) File "c:\users\ikena\appdata\local\programs\python\python38\lib\importlib\__init__.py", line 127, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "<frozen importlib._bootstrap>", line 1014, in _gcd_import File "<frozen importlib._bootstrap>", line 991, in _find_and_load File "<frozen importlib._bootstrap>", line 975, in _find_and_load_unlocked File "<frozen importlib._bootstrap>", line 671, in _load_unlocked File "<frozen importlib._bootstrap_external>", line 783, in exec_module File "<frozen importlib._bootstrap>", line 219, in _call_with_frames_removed File "C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\archivebox\core\admin.py", line 20, in <module> from util import htmldecode, urldecode, ansi_to_html ImportError: cannot import name 'htmldecode' from 'util' (C:\sync\code\python\_public\util.py) ``` #### ArchiveBox version <!-- Run the `archivebox version` command locally then copy paste the result here: --> ```logs ArchiveBox v0.5.3 Cpython Windows Windows-10-10.0.19041-SP0 AMD64 (not in Docker) [i] Dependency versions: √ ARCHIVEBOX_BINARY v0.5.3 valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Scripts\archivebox.exe √ PYTHON_BINARY v3.8.1 valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\python.exe √ DJANGO_BINARY v3.1.3 valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\django\bin\django-admin.py √ CURL_BINARY v7.55.1 valid c:\windows\system32\curl.EXE X WGET_BINARY ? invalid wget X NODE_BINARY ? invalid "C:\Program Files\nodejs\node.EXE" X SINGLEFILE_BINARY ? invalid single-file X READABILITY_BINARY ? invalid readability-extractor X MERCURY_BINARY ? invalid mercury-parser √ GIT_BINARY v2.29.2. valid "c:\program files\git\cmd\git.EXE" √ YOUTUBEDL_BINARY v2021.01.16 valid c:\software\!cli\youtube-dl.EXE X CHROME_BINARY ? invalid X RIPGREP_BINARY ? invalid rg [i] Source-code locations: √ PACKAGE_DIR 23 files valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\archivebox √ TEMPLATES_DIR 3 files valid C:\Users\ikena\AppData\Local\Programs\Python\Python38\Lib\site-packages\archivebox\themes [i] Secrets locations: - CHROME_USER_DATA_DIR - disabled - COOKIES_FILE - disabled [i] Data locations: [!] Warning: Missing 7 recommended dependencies ! WGET_BINARY: wget (unable to detect version) ! NODE_BINARY: C:\Program Files\nodejs\node.EXE (v14.8.0) ! SINGLEFILE_BINARY: single-file (unable to detect version) Hint: npm install --prefix . "git+https://github.com/ArchiveBox/ArchiveBox.git" or archivebox config --set SAVE_SINGLEFILE=False to silence this warning ! READABILITY_BINARY: readability-extractor (unable to detect version) Hint: npm install --prefix . "git+https://github.com/ArchiveBox/ArchiveBox.git" or archivebox config --set SAVE_READABILITY=False to silence this warning ! MERCURY_BINARY: mercury-parser (unable to detect version) Hint: npm install --prefix . "git+https://github.com/ArchiveBox/ArchiveBox.git" or archivebox config --set SAVE_MERCURY=False to silence this warning ! CHROME_BINARY: unable to find binary (unable to detect version) ! RIPGREP_BINARY: rg (unable to detect version)``` <!-- Tickets without full version info will closed until it is provided, we need the full output here to help you solve your issue -->
non_priority
bugfix use relative import to avoid module confliction please fill out the following information feel free to delete sections if they re not applicable or if long issue templates annoy you the only required section is the version information describe the bug currently there are plenty of places in the source code that doesn t use relative import for example line in admin py python from util import htmldecode urldecode ansi to html this causes problem when there are other conflicting script module name in pythonpath after examining other popular libs that have util py there are a lot and have no issue to work i found they all use relative import which will prevent this from python from import util as util noqa from python from core import util steps to reproduce for example add some path to patyhonpath and have a util py file there run archive init in any folder it shows error importerror cannot import name htmldecode from util path of my personal util py screenshots or log output archivebox archivebox init c others test traceback most recent call last file c users ikena appdata local programs python lib runpy py line in run module as main return run code code main globals none file c users ikena appdata local programs python lib runpy py line in run code exec code run globals file c users ikena appdata local programs python scripts archivebox exe main py line in from cli import main file c users ikena appdata local programs python lib site packages archivebox cli init py line in main run subcommand file c users ikena appdata local programs python lib site packages archivebox cli init py line in run subcommand setup django in memory db subcommand in fake db check db subcommand in archive cmds file c users ikena appdata local programs python lib site packages archivebox config py line in setup django django setup file c users ikena appdata local programs python lib site packages django init py line in setup apps populate settings installed apps file c users ikena appdata local programs python lib site packages django apps registry py line in populate app config ready file c users ikena appdata local programs python lib site packages django contrib admin apps py line in ready self module autodiscover file c users ikena appdata local programs python lib site packages django contrib admin init py line in autodiscover autodiscover modules admin register to site file c users ikena appdata local programs python lib site packages django utils module loading py line in autodiscover modules import module s s app config name module to search file c users ikena appdata local programs python lib importlib init py line in import module return bootstrap gcd import name package level file line in gcd import file line in find and load file line in find and load unlocked file line in load unlocked file line in exec module file line in call with frames removed file c users ikena appdata local programs python lib site packages archivebox core admin py line in from util import htmldecode urldecode ansi to html importerror cannot import name htmldecode from util c sync code python public util py archivebox version logs archivebox cpython windows windows not in docker dependency versions √ archivebox binary valid c users ikena appdata local programs python scripts archivebox exe √ python binary valid c users ikena appdata local programs python python exe √ django binary valid c users ikena appdata local programs python lib site packages django bin django admin py √ curl binary valid c windows curl exe x wget binary invalid wget x node binary invalid c program files nodejs node exe x singlefile binary invalid single file x readability binary invalid readability extractor x mercury binary invalid mercury parser √ git binary valid c program files git cmd git exe √ youtubedl binary valid c software cli youtube dl exe x chrome binary invalid x ripgrep binary invalid rg source code locations √ package dir files valid c users ikena appdata local programs python lib site packages archivebox √ templates dir files valid c users ikena appdata local programs python lib site packages archivebox themes secrets locations chrome user data dir disabled cookies file disabled data locations warning missing recommended dependencies wget binary wget unable to detect version node binary c program files nodejs node exe singlefile binary single file unable to detect version hint npm install prefix git or archivebox config set save singlefile false to silence this warning readability binary readability extractor unable to detect version hint npm install prefix git or archivebox config set save readability false to silence this warning mercury binary mercury parser unable to detect version hint npm install prefix git or archivebox config set save mercury false to silence this warning chrome binary unable to find binary unable to detect version ripgrep binary rg unable to detect version tickets without full version info will closed until it is provided we need the full output here to help you solve your issue
0
56,237
23,727,963,112
IssuesEvent
2022-08-30 21:37:40
MicrosoftDocs/windowsserverdocs
https://api.github.com/repos/MicrosoftDocs/windowsserverdocs
closed
Multiple Monitors
Pri1 windows-server/prod remote-desktop-services/tech
[Enter feedback here] Don't you think it would be important to identify on this page if the Microsoft Store Client supports multiple monitors and if so, how to go about configuring that? I don't see any mention of it anywhere, and I would think most folks that use this would want to know about that. Please update to include this incredibly important information. --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: acc42a8f-2623-4352-7cc4-70f0f61e9d89 * Version Independent ID: 97d8b54b-5e7d-098b-4fb7-e8f6e0b30389 * Content: [Get started with the Microsoft Store Client](https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/clients/windows) * Content Source: [WindowsServerDocs/remote/remote-desktop-services/clients/windows.md](https://github.com/MicrosoftDocs/windowsserverdocs/blob/master/WindowsServerDocs/remote/remote-desktop-services/clients/windows.md) * Product: **windows-server** * Technology: **remote-desktop-services** * GitHub Login: @lizap * Microsoft Alias: **elizapo**
1.0
Multiple Monitors - [Enter feedback here] Don't you think it would be important to identify on this page if the Microsoft Store Client supports multiple monitors and if so, how to go about configuring that? I don't see any mention of it anywhere, and I would think most folks that use this would want to know about that. Please update to include this incredibly important information. --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: acc42a8f-2623-4352-7cc4-70f0f61e9d89 * Version Independent ID: 97d8b54b-5e7d-098b-4fb7-e8f6e0b30389 * Content: [Get started with the Microsoft Store Client](https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/clients/windows) * Content Source: [WindowsServerDocs/remote/remote-desktop-services/clients/windows.md](https://github.com/MicrosoftDocs/windowsserverdocs/blob/master/WindowsServerDocs/remote/remote-desktop-services/clients/windows.md) * Product: **windows-server** * Technology: **remote-desktop-services** * GitHub Login: @lizap * Microsoft Alias: **elizapo**
non_priority
multiple monitors don t you think it would be important to identify on this page if the microsoft store client supports multiple monitors and if so how to go about configuring that i don t see any mention of it anywhere and i would think most folks that use this would want to know about that please update to include this incredibly important information document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source product windows server technology remote desktop services github login lizap microsoft alias elizapo
0
155,272
12,244,920,098
IssuesEvent
2020-05-05 12:04:35
RomanKondratev90/Test-project
https://api.github.com/repos/RomanKondratev90/Test-project
opened
Test case №3 (Android приложение - AniLibria). Запуск приложения на платформе Android (версии с 4.0 по 8.1)
test case (Pass)
Приоритет - важный. Шаги Запуск приложения AniLibria на ОС Android (версии с 4.0 по 8.1) Ожидаемый результат Приложение запускается на ОС Android (версии с 4.0 по 8.1) Статус Pass
1.0
Test case №3 (Android приложение - AniLibria). Запуск приложения на платформе Android (версии с 4.0 по 8.1) - Приоритет - важный. Шаги Запуск приложения AniLibria на ОС Android (версии с 4.0 по 8.1) Ожидаемый результат Приложение запускается на ОС Android (версии с 4.0 по 8.1) Статус Pass
non_priority
test case № android приложение anilibria запуск приложения на платформе android версии с по приоритет важный шаги запуск приложения anilibria на ос android версии с по ожидаемый результат приложение запускается на ос android версии с по статус pass
0
84,280
16,479,911,617
IssuesEvent
2021-05-24 10:14:44
jOOQ/jOOQ
https://api.github.com/repos/jOOQ/jOOQ
opened
Add code generation configuration to allow for fetching columns for all tables in one go
C: Code Generation E: All Editions P: Medium T: Enhancement
Our code generator has a classic N+1 problem. We're fetching - Catalogs - Schemas - Tables - Columns This can result in a lot of queries, which is a problem with high latency connections, e.g. to cloud databases like BigQuery. It would be better in those products to be able to at least fetch columns for all tables in the input schemata, not just per table. We're already doing that with higher level objects, such as tables. We fetch all tables for all input schemata, not all tables per schema.
1.0
Add code generation configuration to allow for fetching columns for all tables in one go - Our code generator has a classic N+1 problem. We're fetching - Catalogs - Schemas - Tables - Columns This can result in a lot of queries, which is a problem with high latency connections, e.g. to cloud databases like BigQuery. It would be better in those products to be able to at least fetch columns for all tables in the input schemata, not just per table. We're already doing that with higher level objects, such as tables. We fetch all tables for all input schemata, not all tables per schema.
non_priority
add code generation configuration to allow for fetching columns for all tables in one go our code generator has a classic n problem we re fetching catalogs schemas tables columns this can result in a lot of queries which is a problem with high latency connections e g to cloud databases like bigquery it would be better in those products to be able to at least fetch columns for all tables in the input schemata not just per table we re already doing that with higher level objects such as tables we fetch all tables for all input schemata not all tables per schema
0
83,665
7,878,721,486
IssuesEvent
2018-06-26 11:10:50
VarunRengarajan/configuration
https://api.github.com/repos/VarunRengarajan/configuration
closed
Chai Pe Charcha - Testing
Testing
Please do the end to end testing of `Chai pe Charcha`. I have released a code with minor changes on thank you page.
1.0
Chai Pe Charcha - Testing - Please do the end to end testing of `Chai pe Charcha`. I have released a code with minor changes on thank you page.
non_priority
chai pe charcha testing please do the end to end testing of chai pe charcha i have released a code with minor changes on thank you page
0
145,007
19,318,978,762
IssuesEvent
2021-12-14 01:46:03
SelvaMiru/WebGoat
https://api.github.com/repos/SelvaMiru/WebGoat
closed
CVE-2021-44228 (High) detected in log4j-api-2.14.1.jar - autoclosed
security vulnerability
## CVE-2021-44228 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-api-2.14.1.jar</b></p></summary> <p>The Apache Log4j API</p> <p>Library home page: <a href="https://logging.apache.org/log4j/2.x/">https://logging.apache.org/log4j/2.x/</a></p> <p>Path to dependency file: WebGoat/webgoat-server/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/logging/log4j/log4j-api/2.14.1/log4j-api-2.14.1.jar,/home/wss-scanner/.m2/repository/org/apache/logging/log4j/log4j-api/2.14.1/log4j-api-2.14.1.jar,/home/wss-scanner/.m2/repository/org/apache/logging/log4j/log4j-api/2.14.1/log4j-api-2.14.1.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-validation-2.5.4.jar (Root Library) - spring-boot-starter-2.5.4.jar - spring-boot-starter-logging-2.5.4.jar - log4j-to-slf4j-2.14.1.jar - :x: **log4j-api-2.14.1.jar** (Vulnerable Library) <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Log4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. <p>Publish Date: 2021-11-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44228>CVE-2021-44228</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>10.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-jfh8-c2jp-5v3q">https://github.com/advisories/GHSA-jfh8-c2jp-5v3q</a></p> <p>Release Date: 2021-12-10</p> <p>Fix Resolution: org.apache.logging.log4j:log4j-core:2.15.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-44228 (High) detected in log4j-api-2.14.1.jar - autoclosed - ## CVE-2021-44228 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-api-2.14.1.jar</b></p></summary> <p>The Apache Log4j API</p> <p>Library home page: <a href="https://logging.apache.org/log4j/2.x/">https://logging.apache.org/log4j/2.x/</a></p> <p>Path to dependency file: WebGoat/webgoat-server/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/logging/log4j/log4j-api/2.14.1/log4j-api-2.14.1.jar,/home/wss-scanner/.m2/repository/org/apache/logging/log4j/log4j-api/2.14.1/log4j-api-2.14.1.jar,/home/wss-scanner/.m2/repository/org/apache/logging/log4j/log4j-api/2.14.1/log4j-api-2.14.1.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-validation-2.5.4.jar (Root Library) - spring-boot-starter-2.5.4.jar - spring-boot-starter-logging-2.5.4.jar - log4j-to-slf4j-2.14.1.jar - :x: **log4j-api-2.14.1.jar** (Vulnerable Library) <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Log4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. <p>Publish Date: 2021-11-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44228>CVE-2021-44228</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>10.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-jfh8-c2jp-5v3q">https://github.com/advisories/GHSA-jfh8-c2jp-5v3q</a></p> <p>Release Date: 2021-12-10</p> <p>Fix Resolution: org.apache.logging.log4j:log4j-core:2.15.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in api jar autoclosed cve high severity vulnerability vulnerable library api jar the apache api library home page a href path to dependency file webgoat webgoat server pom xml path to vulnerable library home wss scanner repository org apache logging api api jar home wss scanner repository org apache logging api api jar home wss scanner repository org apache logging api api jar dependency hierarchy spring boot starter validation jar root library spring boot starter jar spring boot starter logging jar to jar x api jar vulnerable library found in base branch develop vulnerability details versions prior to are subject to a remote code execution vulnerability via the ldap jndi parser publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache logging core step up your open source security game with whitesource
0
272,129
23,656,785,814
IssuesEvent
2022-08-26 12:03:21
instadeepai/Mava
https://api.github.com/repos/instadeepai/Mava
closed
[TEST] Executor Integration
test
### What do you want to test? Full integration test for executor. ### Outline of test structure Should use all components typically found in the executor and run without error, but not using launchpad. See the jax IPPO example for how the components are typically logically distributed between core nodes. If multiple tests are required to cover different distinct cases (e.g. value-based vs policy-gradient), then they should be included. ### Definition of done Test(s) passing and including all typical components. ### Mandatory checklist before making a PR * [ ] The success criteria laid down in “Definition of done” are met. * [ ] Test code is documented - docstrings for methods and classes, static types for arguments. * [ ] Documentation is updated - README, CONTRIBUTING, or other documentation.
1.0
[TEST] Executor Integration - ### What do you want to test? Full integration test for executor. ### Outline of test structure Should use all components typically found in the executor and run without error, but not using launchpad. See the jax IPPO example for how the components are typically logically distributed between core nodes. If multiple tests are required to cover different distinct cases (e.g. value-based vs policy-gradient), then they should be included. ### Definition of done Test(s) passing and including all typical components. ### Mandatory checklist before making a PR * [ ] The success criteria laid down in “Definition of done” are met. * [ ] Test code is documented - docstrings for methods and classes, static types for arguments. * [ ] Documentation is updated - README, CONTRIBUTING, or other documentation.
non_priority
executor integration what do you want to test full integration test for executor outline of test structure should use all components typically found in the executor and run without error but not using launchpad see the jax ippo example for how the components are typically logically distributed between core nodes if multiple tests are required to cover different distinct cases e g value based vs policy gradient then they should be included definition of done test s passing and including all typical components mandatory checklist before making a pr the success criteria laid down in “definition of done” are met test code is documented docstrings for methods and classes static types for arguments documentation is updated readme contributing or other documentation
0
37,974
10,119,676,110
IssuesEvent
2019-07-31 12:05:54
xamarin/xamarin-android
https://api.github.com/repos/xamarin/xamarin-android
opened
"The "LinkAssemblies" task failed ... at Mono.Linker.Steps.MarkStep.ProcessMarkedTypesWithInterfaces()" prevents successfully linking custom libraries that use certain patterns of generic types in combination with the Realm IL weaver
Area: App+Library Build regression
### Steps to reproduce Attempt to build the attached test case in the Release configuration: ``` msbuild -restore -p:Configuration=Release ``` Test case: [InterfacesRealmWeaver.zip](https://github.com/xamarin/xamarin-android/files/3451703/InterfacesRealmWeaver.zip) (This test case uses the Fody IL manipulation library via Realm. Hitting the issue requires a fairly particular usage of generic types in combination with the Realm weaver. The issue was originally found by the developers of a full app: <https://github.com/toggl/mobileapp>) ### Expected behavior With Xamarin.Android 9.3, the build completes successfully. ### Actual behavior The `LinkAssemblies` step fails: ``` (_LinkAssembliesShrink target) -> error MSB4018: The "LinkAssemblies" task failed unexpectedly. error MSB4018: System.InvalidOperationException: Collection was modified; enumeration operation may not execute. error MSB4018: at System.ThrowHelper.ThrowInvalidOperationException(ExceptionResource resource) error MSB4018: at System.Collections.Generic.List`1.Enumerator.MoveNextRare() error MSB4018: at System.Collections.Generic.List`1.Enumerator.MoveNext() error MSB4018: at Mono.Linker.Steps.MarkStep.ProcessMarkedTypesWithInterfaces() error MSB4018: at Mono.Linker.Steps.MarkStep.ProcessPrimaryQueue() error MSB4018: at Mono.Linker.Steps.MarkStep.Process() error MSB4018: at MonoDroid.Tuner.MonoDroidMarkStep.Process(LinkContext context) error MSB4018: at Mono.Linker.Pipeline.ProcessStep(LinkContext context, IStep step) error MSB4018: at Mono.Linker.Pipeline.Process(LinkContext context) error MSB4018: at MonoDroid.Tuner.Linker.Process(LinkerOptions options, ILogger logger, LinkContext& context) error MSB4018: at Xamarin.Android.Tasks.LinkAssemblies.Execute(DirectoryAssemblyResolver res) error MSB4018: at Xamarin.Android.Tasks.LinkAssemblies.Execute() error MSB4018: at Microsoft.Build.BackEnd.TaskExecutionHost.Microsoft.Build.BackEnd.ITaskExecutionHost.Execute() error MSB4018: at Microsoft.Build.BackEnd.TaskBuilder.<ExecuteInstantiatedTask>d__26.MoveNext() ``` ### Partial workaround Add **ClassLibrary1** to the **Skip linking assemblies** field in the **Android Options** sections of the Visual Studio project property pages for the Android app project. This would allow an existing application to continue linking most of the user assemblies while skipping specific problematic assemblies that by chance hit this combination of factors involving generic types with the Realm weaver. ### Version information **Expected** behavior: Xamarin.Android SDK 9.3.0.23 (d16-1/ebd7bda) **Actual** behavior: Xamarin.Android SDK 9.4.0.51 (d16-2/9fa7775) Xamarin.Android SDK 9.5.0.27 (d16-3/16c4494)
1.0
"The "LinkAssemblies" task failed ... at Mono.Linker.Steps.MarkStep.ProcessMarkedTypesWithInterfaces()" prevents successfully linking custom libraries that use certain patterns of generic types in combination with the Realm IL weaver - ### Steps to reproduce Attempt to build the attached test case in the Release configuration: ``` msbuild -restore -p:Configuration=Release ``` Test case: [InterfacesRealmWeaver.zip](https://github.com/xamarin/xamarin-android/files/3451703/InterfacesRealmWeaver.zip) (This test case uses the Fody IL manipulation library via Realm. Hitting the issue requires a fairly particular usage of generic types in combination with the Realm weaver. The issue was originally found by the developers of a full app: <https://github.com/toggl/mobileapp>) ### Expected behavior With Xamarin.Android 9.3, the build completes successfully. ### Actual behavior The `LinkAssemblies` step fails: ``` (_LinkAssembliesShrink target) -> error MSB4018: The "LinkAssemblies" task failed unexpectedly. error MSB4018: System.InvalidOperationException: Collection was modified; enumeration operation may not execute. error MSB4018: at System.ThrowHelper.ThrowInvalidOperationException(ExceptionResource resource) error MSB4018: at System.Collections.Generic.List`1.Enumerator.MoveNextRare() error MSB4018: at System.Collections.Generic.List`1.Enumerator.MoveNext() error MSB4018: at Mono.Linker.Steps.MarkStep.ProcessMarkedTypesWithInterfaces() error MSB4018: at Mono.Linker.Steps.MarkStep.ProcessPrimaryQueue() error MSB4018: at Mono.Linker.Steps.MarkStep.Process() error MSB4018: at MonoDroid.Tuner.MonoDroidMarkStep.Process(LinkContext context) error MSB4018: at Mono.Linker.Pipeline.ProcessStep(LinkContext context, IStep step) error MSB4018: at Mono.Linker.Pipeline.Process(LinkContext context) error MSB4018: at MonoDroid.Tuner.Linker.Process(LinkerOptions options, ILogger logger, LinkContext& context) error MSB4018: at Xamarin.Android.Tasks.LinkAssemblies.Execute(DirectoryAssemblyResolver res) error MSB4018: at Xamarin.Android.Tasks.LinkAssemblies.Execute() error MSB4018: at Microsoft.Build.BackEnd.TaskExecutionHost.Microsoft.Build.BackEnd.ITaskExecutionHost.Execute() error MSB4018: at Microsoft.Build.BackEnd.TaskBuilder.<ExecuteInstantiatedTask>d__26.MoveNext() ``` ### Partial workaround Add **ClassLibrary1** to the **Skip linking assemblies** field in the **Android Options** sections of the Visual Studio project property pages for the Android app project. This would allow an existing application to continue linking most of the user assemblies while skipping specific problematic assemblies that by chance hit this combination of factors involving generic types with the Realm weaver. ### Version information **Expected** behavior: Xamarin.Android SDK 9.3.0.23 (d16-1/ebd7bda) **Actual** behavior: Xamarin.Android SDK 9.4.0.51 (d16-2/9fa7775) Xamarin.Android SDK 9.5.0.27 (d16-3/16c4494)
non_priority
the linkassemblies task failed at mono linker steps markstep processmarkedtypeswithinterfaces prevents successfully linking custom libraries that use certain patterns of generic types in combination with the realm il weaver steps to reproduce attempt to build the attached test case in the release configuration msbuild restore p configuration release test case this test case uses the fody il manipulation library via realm hitting the issue requires a fairly particular usage of generic types in combination with the realm weaver the issue was originally found by the developers of a full app expected behavior with xamarin android the build completes successfully actual behavior the linkassemblies step fails linkassembliesshrink target error the linkassemblies task failed unexpectedly error system invalidoperationexception collection was modified enumeration operation may not execute error at system throwhelper throwinvalidoperationexception exceptionresource resource error at system collections generic list enumerator movenextrare error at system collections generic list enumerator movenext error at mono linker steps markstep processmarkedtypeswithinterfaces error at mono linker steps markstep processprimaryqueue error at mono linker steps markstep process error at monodroid tuner monodroidmarkstep process linkcontext context error at mono linker pipeline processstep linkcontext context istep step error at mono linker pipeline process linkcontext context error at monodroid tuner linker process linkeroptions options ilogger logger linkcontext context error at xamarin android tasks linkassemblies execute directoryassemblyresolver res error at xamarin android tasks linkassemblies execute error at microsoft build backend taskexecutionhost microsoft build backend itaskexecutionhost execute error at microsoft build backend taskbuilder d movenext partial workaround add to the skip linking assemblies field in the android options sections of the visual studio project property pages for the android app project this would allow an existing application to continue linking most of the user assemblies while skipping specific problematic assemblies that by chance hit this combination of factors involving generic types with the realm weaver version information expected behavior xamarin android sdk actual behavior xamarin android sdk xamarin android sdk
0
71,264
13,636,255,028
IssuesEvent
2020-09-25 05:21:11
akshitagit/CPP
https://api.github.com/repos/akshitagit/CPP
reopened
Can you solve this pattern??
Dailycode hacktoberfest moderate
Take N as input. For a value of N=5, we wish to draw the following pattern : 5 4 3 2 1 0 1 2 3 4 5 4 3 2 1 0 1 2 3 4 3 2 1 0 1 2 3 2 1 0 1 2 1 0 1 0 1 0 1 2 1 0 1 2 3 2 1 0 1 2 3 4 3 2 1 0 1 2 3 4 5 4 3 2 1 0 1 2 3 4 5 Input Format Take N as input. Constraints N <= 20 Output Format Pattern should be printed with a space between every two values. Sample Input 5
1.0
Can you solve this pattern?? - Take N as input. For a value of N=5, we wish to draw the following pattern : 5 4 3 2 1 0 1 2 3 4 5 4 3 2 1 0 1 2 3 4 3 2 1 0 1 2 3 2 1 0 1 2 1 0 1 0 1 0 1 2 1 0 1 2 3 2 1 0 1 2 3 4 3 2 1 0 1 2 3 4 5 4 3 2 1 0 1 2 3 4 5 Input Format Take N as input. Constraints N <= 20 Output Format Pattern should be printed with a space between every two values. Sample Input 5
non_priority
can you solve this pattern take n as input for a value of n we wish to draw the following pattern input format take n as input constraints n output format pattern should be printed with a space between every two values sample input
0
26,559
20,251,549,622
IssuesEvent
2022-02-14 18:23:53
QubesOS/qubes-issues
https://api.github.com/repos/QubesOS/qubes-issues
opened
qubes-issues bot for warning and closing stale issues
T: enhancement P: default C: infrastructure
[How to file a helpful issue](https://www.qubes-os.org/doc/issue-tracking/) ### The problem you're addressing (if any) When a Qubes release reaches EOL, there are typically many issues on that release's milestone still open. - Leaving the issues open on that milestone doesn't make sense. EOL releases no longer receive support, so it's unclear what it means to haven issue open on such a release's milestone. - Closing all of the issues is wrong, since many of them probably still merit action. - Reassigning all the issues to a supported release milestone is wrong, because it's unlikely that all of the issues affect newer releases. - Going through every issue to figure out whether it affects newer releases isn't feasible. - We can't do it ourselves, because it often requires more info from the issue reporter. - Issue reporters often fail to respond. - Even if it were within our power to figure it all out ourselves, we wouldn't have time to investigate every single issue unless we halted all other project activities (and probably not even then). ### The solution you'd like Create a bot that does the following each day: 1. Check all open issues on closed milestones. (When a release reaches EOL, we close its milestone.) 2. If there has been no activity in at least one year, automatically post a comment explaining the situation and warning that the issue will be closed if there is no activity in one month. 3. If such a warning was posted at least a month ago, close the issue. Feel free to replace the values "one year" and "one month" with better ones. ### The value to a user, and who that user might be Everyone who uses the issue tracker would benefit from there being fewer stale issues to sort through. In the past, I've tried closing very old issues on EOL milestones with a message explaining the situation and saying that we'd be happy to reopen the issue if anyone is still affected. This freaked a lot of people out. It seems that many people view closing an issue as some kind of permanent action, when in reality it's more like a label that can easily be changed with the press of a single button. Indeed, closed issues are just as searchable as open issues. Nonetheless, we might as well acknowledge that there's some kind of widespread psychological quirk about "closing" issues. The proposed bot solution avoids this problem by warning well in advanced that the issue will be closed. This allows anyone who wishes to keep the issue open to add a comment (or perform any other action on the issue). With the values proposed above, even someone who only checks GitHub _once a year_ would never be caught by surprise. ----- CC: @marmarek, @fepitre
1.0
qubes-issues bot for warning and closing stale issues - [How to file a helpful issue](https://www.qubes-os.org/doc/issue-tracking/) ### The problem you're addressing (if any) When a Qubes release reaches EOL, there are typically many issues on that release's milestone still open. - Leaving the issues open on that milestone doesn't make sense. EOL releases no longer receive support, so it's unclear what it means to haven issue open on such a release's milestone. - Closing all of the issues is wrong, since many of them probably still merit action. - Reassigning all the issues to a supported release milestone is wrong, because it's unlikely that all of the issues affect newer releases. - Going through every issue to figure out whether it affects newer releases isn't feasible. - We can't do it ourselves, because it often requires more info from the issue reporter. - Issue reporters often fail to respond. - Even if it were within our power to figure it all out ourselves, we wouldn't have time to investigate every single issue unless we halted all other project activities (and probably not even then). ### The solution you'd like Create a bot that does the following each day: 1. Check all open issues on closed milestones. (When a release reaches EOL, we close its milestone.) 2. If there has been no activity in at least one year, automatically post a comment explaining the situation and warning that the issue will be closed if there is no activity in one month. 3. If such a warning was posted at least a month ago, close the issue. Feel free to replace the values "one year" and "one month" with better ones. ### The value to a user, and who that user might be Everyone who uses the issue tracker would benefit from there being fewer stale issues to sort through. In the past, I've tried closing very old issues on EOL milestones with a message explaining the situation and saying that we'd be happy to reopen the issue if anyone is still affected. This freaked a lot of people out. It seems that many people view closing an issue as some kind of permanent action, when in reality it's more like a label that can easily be changed with the press of a single button. Indeed, closed issues are just as searchable as open issues. Nonetheless, we might as well acknowledge that there's some kind of widespread psychological quirk about "closing" issues. The proposed bot solution avoids this problem by warning well in advanced that the issue will be closed. This allows anyone who wishes to keep the issue open to add a comment (or perform any other action on the issue). With the values proposed above, even someone who only checks GitHub _once a year_ would never be caught by surprise. ----- CC: @marmarek, @fepitre
non_priority
qubes issues bot for warning and closing stale issues the problem you re addressing if any when a qubes release reaches eol there are typically many issues on that release s milestone still open leaving the issues open on that milestone doesn t make sense eol releases no longer receive support so it s unclear what it means to haven issue open on such a release s milestone closing all of the issues is wrong since many of them probably still merit action reassigning all the issues to a supported release milestone is wrong because it s unlikely that all of the issues affect newer releases going through every issue to figure out whether it affects newer releases isn t feasible we can t do it ourselves because it often requires more info from the issue reporter issue reporters often fail to respond even if it were within our power to figure it all out ourselves we wouldn t have time to investigate every single issue unless we halted all other project activities and probably not even then the solution you d like create a bot that does the following each day check all open issues on closed milestones when a release reaches eol we close its milestone if there has been no activity in at least one year automatically post a comment explaining the situation and warning that the issue will be closed if there is no activity in one month if such a warning was posted at least a month ago close the issue feel free to replace the values one year and one month with better ones the value to a user and who that user might be everyone who uses the issue tracker would benefit from there being fewer stale issues to sort through in the past i ve tried closing very old issues on eol milestones with a message explaining the situation and saying that we d be happy to reopen the issue if anyone is still affected this freaked a lot of people out it seems that many people view closing an issue as some kind of permanent action when in reality it s more like a label that can easily be changed with the press of a single button indeed closed issues are just as searchable as open issues nonetheless we might as well acknowledge that there s some kind of widespread psychological quirk about closing issues the proposed bot solution avoids this problem by warning well in advanced that the issue will be closed this allows anyone who wishes to keep the issue open to add a comment or perform any other action on the issue with the values proposed above even someone who only checks github once a year would never be caught by surprise cc marmarek fepitre
0
121,918
12,137,216,576
IssuesEvent
2020-04-23 15:25:26
blockstack/docs.blockstack
https://api.github.com/repos/blockstack/docs.blockstack
opened
Add richer introduction with screenshots to Connect overview
documentation
https://docs.blockstack.org/develop/connect/overview.html Explain and preview the design advantages for developers and users alike.
1.0
Add richer introduction with screenshots to Connect overview - https://docs.blockstack.org/develop/connect/overview.html Explain and preview the design advantages for developers and users alike.
non_priority
add richer introduction with screenshots to connect overview explain and preview the design advantages for developers and users alike
0
123,802
10,291,644,529
IssuesEvent
2019-08-27 12:56:54
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
teamcity: failed test: _size_out_of_range_direct=false
C-test-failure O-robot
The following tests appear to have failed on master (testrace): _size_out_of_range_direct=false You may want to check [for open issues](https://github.com/cockroachdb/cockroach/issues?q=is%3Aissue+is%3Aopen+_size_out_of_range_direct=false). [#1451983](https://teamcity.cockroachdb.com/viewLog.html?buildId=1451983): ``` _size_out_of_range_direct=false --- FAIL: testrace/TestImportData/PGDUMP:_size_out_of_range_direct=false (0.000s) Test ended in panic. ------- Stdout: ------- I190823 22:18:23.891262 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "create_database", target: 120, info: {DatabaseName:d34 Statement:CREATE DATABASE d34 User:root} I190823 22:18:24.123243 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "drop_database", target: 120, info: {DatabaseName:d34 Statement:DROP DATABASE d34 User:root DroppedSchemaObjects:[]} _size_out_of_range_direct=false --- FAIL: testrace/TestImportData/PGCOPY:_size_out_of_range_direct=false (0.000s) Test ended in panic. ------- Stdout: ------- I190823 22:18:16.860213 187 storage/store.go:2593 [n1,s1,r59/1:/Table/86{-/1}] removing replica r57/1 I190823 22:18:16.887111 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "create_database", target: 107, info: {DatabaseName:d27 Statement:CREATE DATABASE d27 User:root} I190823 22:18:17.032604 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "drop_database", target: 107, info: {DatabaseName:d27 Statement:DROP DATABASE d27 User:root DroppedSchemaObjects:[]} ``` Please assign, take a look and update the issue accordingly.
1.0
teamcity: failed test: _size_out_of_range_direct=false - The following tests appear to have failed on master (testrace): _size_out_of_range_direct=false You may want to check [for open issues](https://github.com/cockroachdb/cockroach/issues?q=is%3Aissue+is%3Aopen+_size_out_of_range_direct=false). [#1451983](https://teamcity.cockroachdb.com/viewLog.html?buildId=1451983): ``` _size_out_of_range_direct=false --- FAIL: testrace/TestImportData/PGDUMP:_size_out_of_range_direct=false (0.000s) Test ended in panic. ------- Stdout: ------- I190823 22:18:23.891262 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "create_database", target: 120, info: {DatabaseName:d34 Statement:CREATE DATABASE d34 User:root} I190823 22:18:24.123243 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "drop_database", target: 120, info: {DatabaseName:d34 Statement:DROP DATABASE d34 User:root DroppedSchemaObjects:[]} _size_out_of_range_direct=false --- FAIL: testrace/TestImportData/PGCOPY:_size_out_of_range_direct=false (0.000s) Test ended in panic. ------- Stdout: ------- I190823 22:18:16.860213 187 storage/store.go:2593 [n1,s1,r59/1:/Table/86{-/1}] removing replica r57/1 I190823 22:18:16.887111 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "create_database", target: 107, info: {DatabaseName:d27 Statement:CREATE DATABASE d27 User:root} I190823 22:18:17.032604 861 sql/event_log.go:130 [n1,client=127.0.0.1:46736,user=root] Event: "drop_database", target: 107, info: {DatabaseName:d27 Statement:DROP DATABASE d27 User:root DroppedSchemaObjects:[]} ``` Please assign, take a look and update the issue accordingly.
non_priority
teamcity failed test size out of range direct false the following tests appear to have failed on master testrace size out of range direct false you may want to check size out of range direct false fail testrace testimportdata pgdump size out of range direct false test ended in panic stdout sql event log go event create database target info databasename statement create database user root sql event log go event drop database target info databasename statement drop database user root droppedschemaobjects size out of range direct false fail testrace testimportdata pgcopy size out of range direct false test ended in panic stdout storage store go removing replica sql event log go event create database target info databasename statement create database user root sql event log go event drop database target info databasename statement drop database user root droppedschemaobjects please assign take a look and update the issue accordingly
0