Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
7,033
16,242,960,022
IssuesEvent
2021-05-07 11:47:20
owncloud/android
https://api.github.com/repos/owncloud/android
closed
[New Arch] Remove file/folder operation
Estimation - 3 (M) New architecture
Synchronization epic: https://github.com/owncloud/android/issues/2818 AC: - Support removing the content in local (if downloaded), remote or both ### TASKS - [x] Research (if needed) - [x] Create branch new_sync/remove_file - [ ] Development tasks - [x] Create new usecase -> RemoveFileUseCase - [x] Add removeFile to repository - [x] Implement removeFile - [x] Add removeFile to RemoteDataSource (Call CheckRemotePath before RemoveRemoteFileOperation to check if folder already exists?) - [x] Migrate RemoveRemoteFileOperation to kotlin - [x] Migrate RemoveRemoteChunksFolderOperation to kotlin - [x] Add removeFile to current FileService - [x] Create a new ChunkService to handle everything related to chunks - [x] Remove local file - [x] Remove file from database - [x] Update DocumentsProvider - [ ] Error handling - [x] Unit tests - [x] Code review and apply changes requested - [ ] Design test plan - [ ] QA - [x] Merge branch new_sync/remove_file into new_arch/sync ### PR - App https://github.com/owncloud/android/pull/3214 - Library (if needed) https://github.com/owncloud/android-library/pull/394
1.0
[New Arch] Remove file/folder operation - Synchronization epic: https://github.com/owncloud/android/issues/2818 AC: - Support removing the content in local (if downloaded), remote or both ### TASKS - [x] Research (if needed) - [x] Create branch new_sync/remove_file - [ ] Development tasks - [x] Create new usecase -> RemoveFileUseCase - [x] Add removeFile to repository - [x] Implement removeFile - [x] Add removeFile to RemoteDataSource (Call CheckRemotePath before RemoveRemoteFileOperation to check if folder already exists?) - [x] Migrate RemoveRemoteFileOperation to kotlin - [x] Migrate RemoveRemoteChunksFolderOperation to kotlin - [x] Add removeFile to current FileService - [x] Create a new ChunkService to handle everything related to chunks - [x] Remove local file - [x] Remove file from database - [x] Update DocumentsProvider - [ ] Error handling - [x] Unit tests - [x] Code review and apply changes requested - [ ] Design test plan - [ ] QA - [x] Merge branch new_sync/remove_file into new_arch/sync ### PR - App https://github.com/owncloud/android/pull/3214 - Library (if needed) https://github.com/owncloud/android-library/pull/394
non_priority
remove file folder operation synchronization epic ac support removing the content in local if downloaded remote or both tasks research if needed create branch new sync remove file development tasks create new usecase removefileusecase add removefile to repository implement removefile add removefile to remotedatasource call checkremotepath before removeremotefileoperation to check if folder already exists migrate removeremotefileoperation to kotlin migrate removeremotechunksfolderoperation to kotlin add removefile to current fileservice create a new chunkservice to handle everything related to chunks remove local file remove file from database update documentsprovider error handling unit tests code review and apply changes requested design test plan qa merge branch new sync remove file into new arch sync pr app library if needed
0
56,195
8,056,794,349
IssuesEvent
2018-08-02 13:45:13
HECBioSim/Longbow
https://api.github.com/repos/HECBioSim/Longbow
closed
documentation for recovery file is wrong
bug documentation
Check the documentation references for recovery. It indicates that the full path is required, but the code would imply that it is not. Check this. Could be a bug in the code or stale docs.
1.0
documentation for recovery file is wrong - Check the documentation references for recovery. It indicates that the full path is required, but the code would imply that it is not. Check this. Could be a bug in the code or stale docs.
non_priority
documentation for recovery file is wrong check the documentation references for recovery it indicates that the full path is required but the code would imply that it is not check this could be a bug in the code or stale docs
0
8,324
7,245,324,021
IssuesEvent
2018-02-14 17:42:14
dotnet/corefx
https://api.github.com/repos/dotnet/corefx
opened
*CNG crypto algorithms missing from CNG library
area-System.Security
I was looking at porting some desktop code and came across SHA256Cng which I noticed was missing. I did a diff and I see we're actually missing a number of Cng algorithms: - MD5Cng - SHA1Cng - SHA256Cng - SHA384Cng - SHA512Cng Moreover, I see quite a few more here: https://github.com/dotnet/corefx/blob/5edf66e4f35eca3ba409cb2e31154fb6a59bd4b3/src/System.Security.Cryptography.Algorithms/src/System/Security/Cryptography/CryptoConfig.cs#L266-L284 Any reason we left these out? /cc @bartonjs
True
*CNG crypto algorithms missing from CNG library - I was looking at porting some desktop code and came across SHA256Cng which I noticed was missing. I did a diff and I see we're actually missing a number of Cng algorithms: - MD5Cng - SHA1Cng - SHA256Cng - SHA384Cng - SHA512Cng Moreover, I see quite a few more here: https://github.com/dotnet/corefx/blob/5edf66e4f35eca3ba409cb2e31154fb6a59bd4b3/src/System.Security.Cryptography.Algorithms/src/System/Security/Cryptography/CryptoConfig.cs#L266-L284 Any reason we left these out? /cc @bartonjs
non_priority
cng crypto algorithms missing from cng library i was looking at porting some desktop code and came across which i noticed was missing i did a diff and i see we re actually missing a number of cng algorithms moreover i see quite a few more here any reason we left these out cc bartonjs
0
17,605
3,631,326,455
IssuesEvent
2016-02-11 00:46:56
akiradeveloper/akashic-storage
https://api.github.com/repos/akiradeveloper/akashic-storage
closed
java.lang.NumberFormatException: For input string: ""
s3-tests
Request("PUT /hoge-36kp5mui93t3h41zet8saher-10/foo", from /127.0.0.1:57396) java.lang.NumberFormatException: For input string: "" Jan 23, 2016 5:57:53 AM com.twitter.util.RootMonitor$ handle SEVERE: Exception propagated to the root monitor! java.lang.NumberFormatException: For input string: "" at java.lang.NumberFormatException.forInputString(NumberFormatException.java:65) at java.lang.Long.parseLong(Long.java:601) at java.lang.Long.parseLong(Long.java:631) at scala.collection.immutable.StringLike$class.toLong(StringLike.scala:276) at scala.collection.immutable.StringOps.toLong(StringOps.scala:30) at com.twitter.finagle.http.Message$$anonfun$contentLength$1.apply(Message.scala:167) at com.twitter.finagle.http.Message$$anonfun$contentLength$1.apply(Message.scala:167) at scala.Option.map(Option.scala:146) at com.twitter.finagle.http.Message.contentLength(Message.scala:167) at io.finch.RequestReaders$$anonfun$1.apply(RequestReaders.scala:125) at io.finch.RequestReaders$$anonfun$1.apply(RequestReaders.scala:124) at io.finch.RequestReaders$$anonfun$rr$1.apply(RequestReaders.scala:50) at io.finch.RequestReaders$$anonfun$rr$1.apply(RequestReaders.scala:50) at io.finch.RequestReader$$anon$5.apply(RequestReader.scala:174) at io.finch.RequestReader$$anon$3.apply(RequestReader.scala:64) at io.finch.Endpoint$$anon$5$$anonfun$apply$17$$anonfun$apply$18.apply(Endpoint.scala:153) at io.finch.Endpoint$$anon$5$$anonfun$apply$17$$anonfun$apply$18.apply(Endpoint.scala:153) at cats.Eval$$anonfun$map$1.apply(Eval.scala:58) at cats.Eval$$anonfun$map$1.apply(Eval.scala:58) at cats.Eval$$anon$8$$anonfun$1$$anon$9$$anonfun$2.apply(Eval.scala:81) at cats.Eval$$anon$8$$anonfun$1$$anon$9$$anonfun$2.apply(Eval.scala:81)
1.0
java.lang.NumberFormatException: For input string: "" - Request("PUT /hoge-36kp5mui93t3h41zet8saher-10/foo", from /127.0.0.1:57396) java.lang.NumberFormatException: For input string: "" Jan 23, 2016 5:57:53 AM com.twitter.util.RootMonitor$ handle SEVERE: Exception propagated to the root monitor! java.lang.NumberFormatException: For input string: "" at java.lang.NumberFormatException.forInputString(NumberFormatException.java:65) at java.lang.Long.parseLong(Long.java:601) at java.lang.Long.parseLong(Long.java:631) at scala.collection.immutable.StringLike$class.toLong(StringLike.scala:276) at scala.collection.immutable.StringOps.toLong(StringOps.scala:30) at com.twitter.finagle.http.Message$$anonfun$contentLength$1.apply(Message.scala:167) at com.twitter.finagle.http.Message$$anonfun$contentLength$1.apply(Message.scala:167) at scala.Option.map(Option.scala:146) at com.twitter.finagle.http.Message.contentLength(Message.scala:167) at io.finch.RequestReaders$$anonfun$1.apply(RequestReaders.scala:125) at io.finch.RequestReaders$$anonfun$1.apply(RequestReaders.scala:124) at io.finch.RequestReaders$$anonfun$rr$1.apply(RequestReaders.scala:50) at io.finch.RequestReaders$$anonfun$rr$1.apply(RequestReaders.scala:50) at io.finch.RequestReader$$anon$5.apply(RequestReader.scala:174) at io.finch.RequestReader$$anon$3.apply(RequestReader.scala:64) at io.finch.Endpoint$$anon$5$$anonfun$apply$17$$anonfun$apply$18.apply(Endpoint.scala:153) at io.finch.Endpoint$$anon$5$$anonfun$apply$17$$anonfun$apply$18.apply(Endpoint.scala:153) at cats.Eval$$anonfun$map$1.apply(Eval.scala:58) at cats.Eval$$anonfun$map$1.apply(Eval.scala:58) at cats.Eval$$anon$8$$anonfun$1$$anon$9$$anonfun$2.apply(Eval.scala:81) at cats.Eval$$anon$8$$anonfun$1$$anon$9$$anonfun$2.apply(Eval.scala:81)
non_priority
java lang numberformatexception for input string request put hoge foo from java lang numberformatexception for input string jan am com twitter util rootmonitor handle severe exception propagated to the root monitor java lang numberformatexception for input string at java lang numberformatexception forinputstring numberformatexception java at java lang long parselong long java at java lang long parselong long java at scala collection immutable stringlike class tolong stringlike scala at scala collection immutable stringops tolong stringops scala at com twitter finagle http message anonfun contentlength apply message scala at com twitter finagle http message anonfun contentlength apply message scala at scala option map option scala at com twitter finagle http message contentlength message scala at io finch requestreaders anonfun apply requestreaders scala at io finch requestreaders anonfun apply requestreaders scala at io finch requestreaders anonfun rr apply requestreaders scala at io finch requestreaders anonfun rr apply requestreaders scala at io finch requestreader anon apply requestreader scala at io finch requestreader anon apply requestreader scala at io finch endpoint anon anonfun apply anonfun apply apply endpoint scala at io finch endpoint anon anonfun apply anonfun apply apply endpoint scala at cats eval anonfun map apply eval scala at cats eval anonfun map apply eval scala at cats eval anon anonfun anon anonfun apply eval scala at cats eval anon anonfun anon anonfun apply eval scala
0
243,212
18,678,047,130
IssuesEvent
2021-10-31 22:12:02
SOunit/react_complete_guide
https://api.github.com/repos/SOunit/react_complete_guide
closed
useCallback hook review
documentation help wanted
section 20, lesson 288, max used useCallback, but i don't understand why. I need review of useCallback hooks. # answer to avoid multiple rendering mainly add useCallback when debug warning massage says so.
1.0
useCallback hook review - section 20, lesson 288, max used useCallback, but i don't understand why. I need review of useCallback hooks. # answer to avoid multiple rendering mainly add useCallback when debug warning massage says so.
non_priority
usecallback hook review section lesson max used usecallback but i don t understand why i need review of usecallback hooks answer to avoid multiple rendering mainly add usecallback when debug warning massage says so
0
1,795
2,668,128,046
IssuesEvent
2015-03-23 04:34:36
retailcoder/Rubberduck
https://api.github.com/repos/retailcoder/Rubberduck
closed
"Variable is never used" is yielding false positives
bug code-inspections
Consider a standard code module with the following public fields / globals: Option Explicit Public Strings As New StringType Public Fractions As New FractionType Public Data As New SqlCommand Rubberduck considers them as never used, even though this line of code is found in the same project: Private Sub RaiseErrorMustImplementIComparable(member As String) Err.Raise 5, Strings.Format("{0}.{1}", ToString, member), "Invalid operation: method requires a list of numeric, date or string values, or a list of objects implementing the IComparable interface." End Sub --- Usages (and assignments) are found *if they are in the same module* - this looks like `IdentifierUsageInspector` has a bug with usages of globals, but not with usages of fields.
1.0
"Variable is never used" is yielding false positives - Consider a standard code module with the following public fields / globals: Option Explicit Public Strings As New StringType Public Fractions As New FractionType Public Data As New SqlCommand Rubberduck considers them as never used, even though this line of code is found in the same project: Private Sub RaiseErrorMustImplementIComparable(member As String) Err.Raise 5, Strings.Format("{0}.{1}", ToString, member), "Invalid operation: method requires a list of numeric, date or string values, or a list of objects implementing the IComparable interface." End Sub --- Usages (and assignments) are found *if they are in the same module* - this looks like `IdentifierUsageInspector` has a bug with usages of globals, but not with usages of fields.
non_priority
variable is never used is yielding false positives consider a standard code module with the following public fields globals option explicit public strings as new stringtype public fractions as new fractiontype public data as new sqlcommand rubberduck considers them as never used even though this line of code is found in the same project private sub raiseerrormustimplementicomparable member as string err raise strings format tostring member invalid operation method requires a list of numeric date or string values or a list of objects implementing the icomparable interface end sub usages and assignments are found if they are in the same module this looks like identifierusageinspector has a bug with usages of globals but not with usages of fields
0
198,677
22,669,239,445
IssuesEvent
2022-07-03 11:08:02
tidharm/WebGoat8
https://api.github.com/repos/tidharm/WebGoat8
opened
CVE-2022-25758 (Medium) detected in scss-tokenizer-0.2.3.tgz
security vulnerability
## CVE-2022-25758 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>scss-tokenizer-0.2.3.tgz</b></p></summary> <p>A tokenzier for Sass' SCSS syntax</p> <p>Library home page: <a href="https://registry.npmjs.org/scss-tokenizer/-/scss-tokenizer-0.2.3.tgz">https://registry.npmjs.org/scss-tokenizer/-/scss-tokenizer-0.2.3.tgz</a></p> <p> Dependency Hierarchy: - gulp-sass-4.0.2.tgz (Root Library) - node-sass-4.11.0.tgz - sass-graph-2.2.4.tgz - :x: **scss-tokenizer-0.2.3.tgz** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex. <p>Publish Date: 2022-07-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-25758>CVE-2022-25758</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p>
True
CVE-2022-25758 (Medium) detected in scss-tokenizer-0.2.3.tgz - ## CVE-2022-25758 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>scss-tokenizer-0.2.3.tgz</b></p></summary> <p>A tokenzier for Sass' SCSS syntax</p> <p>Library home page: <a href="https://registry.npmjs.org/scss-tokenizer/-/scss-tokenizer-0.2.3.tgz">https://registry.npmjs.org/scss-tokenizer/-/scss-tokenizer-0.2.3.tgz</a></p> <p> Dependency Hierarchy: - gulp-sass-4.0.2.tgz (Root Library) - node-sass-4.11.0.tgz - sass-graph-2.2.4.tgz - :x: **scss-tokenizer-0.2.3.tgz** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex. <p>Publish Date: 2022-07-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-25758>CVE-2022-25758</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p>
non_priority
cve medium detected in scss tokenizer tgz cve medium severity vulnerability vulnerable library scss tokenizer tgz a tokenzier for sass scss syntax library home page a href dependency hierarchy gulp sass tgz root library node sass tgz sass graph tgz x scss tokenizer tgz vulnerable library found in base branch main vulnerability details all versions of package scss tokenizer are vulnerable to regular expression denial of service redos via the loadannotation function due to the usage of insecure regex publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href
0
275,774
30,297,711,324
IssuesEvent
2023-07-10 01:26:36
devatherock/utilities
https://api.github.com/repos/devatherock/utilities
closed
spring-kafka-2.5.15.RELEASE.jar: 1 vulnerabilities (highest severity is: 9.8) - autoclosed
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-kafka-2.5.15.RELEASE.jar</b></p></summary> <p></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-beans/5.2.15.RELEASE/7372138d9f4f3393990472db6d1c07603d5bb5dc/spring-beans-5.2.15.RELEASE.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/devatherock/utilities/commit/c644aeaddd1c6c48771f873d69b707a3d75a2681">c644aeaddd1c6c48771f873d69b707a3d75a2681</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (spring-kafka version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-22965](https://www.mend.io/vulnerability-database/CVE-2022-22965) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | spring-beans-5.2.15.RELEASE.jar | Transitive | 2.6.0 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2022-22965</summary> ### Vulnerable Library - <b>spring-beans-5.2.15.RELEASE.jar</b></p> <p>Spring Beans</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-beans/5.2.15.RELEASE/7372138d9f4f3393990472db6d1c07603d5bb5dc/spring-beans-5.2.15.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-kafka-2.5.15.RELEASE.jar (Root Library) - spring-messaging-5.2.15.RELEASE.jar - :x: **spring-beans-5.2.15.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/devatherock/utilities/commit/c644aeaddd1c6c48771f873d69b707a3d75a2681">c644aeaddd1c6c48771f873d69b707a3d75a2681</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. Mend Note: Converted from WS-2022-0107, on 2022-11-07. <p>Publish Date: 2022-04-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-22965>CVE-2022-22965</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement">https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement</a></p> <p>Release Date: 2022-04-01</p> <p>Fix Resolution (org.springframework:spring-beans): 5.2.20.RELEASE</p> <p>Direct dependency fix Resolution (org.springframework.kafka:spring-kafka): 2.6.0</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
True
spring-kafka-2.5.15.RELEASE.jar: 1 vulnerabilities (highest severity is: 9.8) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-kafka-2.5.15.RELEASE.jar</b></p></summary> <p></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-beans/5.2.15.RELEASE/7372138d9f4f3393990472db6d1c07603d5bb5dc/spring-beans-5.2.15.RELEASE.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/devatherock/utilities/commit/c644aeaddd1c6c48771f873d69b707a3d75a2681">c644aeaddd1c6c48771f873d69b707a3d75a2681</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (spring-kafka version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-22965](https://www.mend.io/vulnerability-database/CVE-2022-22965) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | spring-beans-5.2.15.RELEASE.jar | Transitive | 2.6.0 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2022-22965</summary> ### Vulnerable Library - <b>spring-beans-5.2.15.RELEASE.jar</b></p> <p>Spring Beans</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-beans/5.2.15.RELEASE/7372138d9f4f3393990472db6d1c07603d5bb5dc/spring-beans-5.2.15.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-kafka-2.5.15.RELEASE.jar (Root Library) - spring-messaging-5.2.15.RELEASE.jar - :x: **spring-beans-5.2.15.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/devatherock/utilities/commit/c644aeaddd1c6c48771f873d69b707a3d75a2681">c644aeaddd1c6c48771f873d69b707a3d75a2681</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. Mend Note: Converted from WS-2022-0107, on 2022-11-07. <p>Publish Date: 2022-04-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-22965>CVE-2022-22965</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement">https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement</a></p> <p>Release Date: 2022-04-01</p> <p>Fix Resolution (org.springframework:spring-beans): 5.2.20.RELEASE</p> <p>Direct dependency fix Resolution (org.springframework.kafka:spring-kafka): 2.6.0</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
non_priority
spring kafka release jar vulnerabilities highest severity is autoclosed vulnerable library spring kafka release jar path to dependency file build gradle path to vulnerable library home wss scanner gradle caches modules files org springframework spring beans release spring beans release jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in spring kafka version remediation available critical spring beans release jar transitive details cve vulnerable library spring beans release jar spring beans library home page a href path to dependency file build gradle path to vulnerable library home wss scanner gradle caches modules files org springframework spring beans release spring beans release jar dependency hierarchy spring kafka release jar root library spring messaging release jar x spring beans release jar vulnerable library found in head commit a href found in base branch master vulnerability details a spring mvc or spring webflux application running on jdk may be vulnerable to remote code execution rce via data binding the specific exploit requires the application to run on tomcat as a war deployment if the application is deployed as a spring boot executable jar i e the default it is not vulnerable to the exploit however the nature of the vulnerability is more general and there may be other ways to exploit it mend note converted from ws on publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring beans release direct dependency fix resolution org springframework kafka spring kafka step up your open source security game with mend
0
79,119
7,696,583,750
IssuesEvent
2018-05-18 15:45:09
halonproject/eth-pub-sub
https://api.github.com/repos/halonproject/eth-pub-sub
opened
Deploy to rinkeby testnet and start testing
testing
Deploy the contract to the rinkeby testnet and begin testing some of the functionality. Find potential bugs, oddities. Add contract address to the README once determined that the contract is good for testing uses.
1.0
Deploy to rinkeby testnet and start testing - Deploy the contract to the rinkeby testnet and begin testing some of the functionality. Find potential bugs, oddities. Add contract address to the README once determined that the contract is good for testing uses.
non_priority
deploy to rinkeby testnet and start testing deploy the contract to the rinkeby testnet and begin testing some of the functionality find potential bugs oddities add contract address to the readme once determined that the contract is good for testing uses
0
280,230
30,808,548,996
IssuesEvent
2023-08-01 08:51:56
Vonage-Community/reference-client_sdk-ios-android-js-node-deno-usecases
https://api.github.com/repos/Vonage-Community/reference-client_sdk-ios-android-js-node-deno-usecases
closed
supabase-helpers-0.0.0.tgz: 1 vulnerabilities (highest severity is: 5.3) - autoclosed
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>supabase-helpers-0.0.0.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/word-wrap/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/Vonage-Community/reference-client_sdk-ios-android-js-node-deno-usecases/commit/1f437ab967b4e4099ef9e4770a4ad9e1cd01b1f4">1f437ab967b4e4099ef9e4770a4ad9e1cd01b1f4</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (supabase-helpers version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2023-26115](https://www.mend.io/vulnerability-database/CVE-2023-26115) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.3 | word-wrap-1.2.3.tgz | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2023-26115</summary> ### Vulnerable Library - <b>word-wrap-1.2.3.tgz</b></p> <p>Wrap words to a specified length.</p> <p>Library home page: <a href="https://registry.npmjs.org/word-wrap/-/word-wrap-1.2.3.tgz">https://registry.npmjs.org/word-wrap/-/word-wrap-1.2.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/word-wrap/package.json</p> <p> Dependency Hierarchy: - supabase-helpers-0.0.0.tgz (Root Library) - eslint-7.32.0.tgz - optionator-0.9.1.tgz - :x: **word-wrap-1.2.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Vonage-Community/reference-client_sdk-ios-android-js-node-deno-usecases/commit/1f437ab967b4e4099ef9e4770a4ad9e1cd01b1f4">1f437ab967b4e4099ef9e4770a4ad9e1cd01b1f4</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable. <p>Publish Date: 2023-06-22 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-26115>CVE-2023-26115</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> </details>
True
supabase-helpers-0.0.0.tgz: 1 vulnerabilities (highest severity is: 5.3) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>supabase-helpers-0.0.0.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/word-wrap/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/Vonage-Community/reference-client_sdk-ios-android-js-node-deno-usecases/commit/1f437ab967b4e4099ef9e4770a4ad9e1cd01b1f4">1f437ab967b4e4099ef9e4770a4ad9e1cd01b1f4</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (supabase-helpers version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2023-26115](https://www.mend.io/vulnerability-database/CVE-2023-26115) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.3 | word-wrap-1.2.3.tgz | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2023-26115</summary> ### Vulnerable Library - <b>word-wrap-1.2.3.tgz</b></p> <p>Wrap words to a specified length.</p> <p>Library home page: <a href="https://registry.npmjs.org/word-wrap/-/word-wrap-1.2.3.tgz">https://registry.npmjs.org/word-wrap/-/word-wrap-1.2.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/word-wrap/package.json</p> <p> Dependency Hierarchy: - supabase-helpers-0.0.0.tgz (Root Library) - eslint-7.32.0.tgz - optionator-0.9.1.tgz - :x: **word-wrap-1.2.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Vonage-Community/reference-client_sdk-ios-android-js-node-deno-usecases/commit/1f437ab967b4e4099ef9e4770a4ad9e1cd01b1f4">1f437ab967b4e4099ef9e4770a4ad9e1cd01b1f4</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable. <p>Publish Date: 2023-06-22 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-26115>CVE-2023-26115</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> </details>
non_priority
supabase helpers tgz vulnerabilities highest severity is autoclosed vulnerable library supabase helpers tgz path to dependency file package json path to vulnerable library node modules word wrap package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in supabase helpers version remediation available medium word wrap tgz transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the details section below to see if there is a version of transitive dependency where vulnerability is fixed details cve vulnerable library word wrap tgz wrap words to a specified length library home page a href path to dependency file package json path to vulnerable library node modules word wrap package json dependency hierarchy supabase helpers tgz root library eslint tgz optionator tgz x word wrap tgz vulnerable library found in head commit a href found in base branch main vulnerability details all versions of the package word wrap are vulnerable to regular expression denial of service redos due to the usage of an insecure regular expression within the result variable publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href
0
67,474
16,988,115,585
IssuesEvent
2021-06-30 16:38:55
spack/spack
https://api.github.com/repos/spack/spack
closed
Installation Issue: py-torch fails to fetch sub-repos when running without networking
build-error fetching
This is happening @ Argonne Leadership Computing Facility, for the Theta supercomputer. I am trying to install py-torch however it can not compile on the login nodes, since they are haswell chips and the compute nodes are KNL (I think this is the cause, AVX512 is missing, but it's not clear). Installing on the login nodes fails for unclear reasons: ``` ==> Error: ProcessError: Command exited with status -4: '/soft/interpreters/python/3.6/intel/2019.3.075/bin/python3.6' '-s' 'setup.py' '--no-user-cfg' 'install' '--prefix=/lus/theta-fs0/software/datascience/spack/opt/spack/cray-cnl6-mic_knl/gcc-8.3.0/py-torch-1.3.1-hbkhwn36w556jas6nexjb3zkh3id2twq' '--single-version-externally-managed' '--root=/' See build log for details: /tmp/cadams/spack-stage/spack-stage-py-torch-1.3.1-hbkhwn36w556jas6nexjb3zkh3id2twq/spack-build-out.txt ``` There is no extra information in the file specified. Installing on the compute nodes ought to satisfy the build requirement, however I think py-torch pulls from sub repositories and we don't have access to networking on compute nodes: ``` ==> Warning: Fetching from mirror without a checksum! This package is normally checked out from a version control system, but it has been archived on a spack mirror. This means we cannot know a checksum for the tarball in advance. Be sure that your connection to this mirror is secure! ==> Error: ProcessError: Command exited with status 1: '/soft/interpreters/python/3.6/intel/2019.3.075/bin/python3.6' '-s' 'setup.py' '--no-user-cfg' 'install' '--prefix=/lus/theta-fs0/software/datascience/spack/opt/spack/cray-cnl6-mic_knl/gcc-8.3.0/py-torch-1.3.1-hbkhwn36w556jas6nexjb3zkh3id2twq' '--single-version-externally-managed' '--root=/' 2 errors found in build log: 92 Cloning into 'psimd'... 93 fatal: unable to access 'https://github.com/Maratyszcza/psimd.git/': Failed to connect to github.com port 443: Connection timed out 94 Cloning into 'psimd'... 95 fatal: unable to access 'https://github.com/Maratyszcza/psimd.git/': Failed to connect to github.com port 443: Connection timed out 96 -- Had to git clone more than once: 97 3 times. >> 98 CMake Error at /tmp/cadams/spack-stage/spack-stage-py-torch-1.3.1-hbkhwn36w556jas6nexjb3zkh3id2twq/spack-src/build/confu-deps/psimd-download/psimd-prefix/tmp/psimd-gitclone.cmake:66 (message): 99 Failed to clone repository: 'https://github.com/Maratyszcza/psimd.git' 100 101 102 ninja: build stopped: subcommand failed. >> 103 CMake Error at third_party/FP16/CMakeLists.txt:94 (ADD_SUBDIRECTORY): 104 ADD_SUBDIRECTORY given source 105 "/tmp/cadams/spack-stage/spack-stage-py-torch-1.3.1-hbkhwn36w556jas6nexjb3zkh3id2twq/spack-src/build/confu-srcs/psimd" 106 which is not an existing directory. 107 108 109 -- Found system Eigen at /lus/theta-fs0/software/datascience/spack/opt/spack/cray-cnl6-mic_knl/gcc-8.3.0/eigen-3.3.7-rnf3w44mxhjijj7ok2yaypcttpa3wy7z/include/eigen3 See build log for details: /tmp/cadams/spack-stage/spack-stage-py-torch-1.3.1-hbkhwn36w556jas6nexjb3zkh3id2twq/spack-build-out.txt ``` I tried to fetch all of the packages needed for the build prior to running the build script, however it doesn't seem to have the psimd submodule when it goes to install. Any ideas how to fetch this so it doesn't need to compile?
1.0
Installation Issue: py-torch fails to fetch sub-repos when running without networking - This is happening @ Argonne Leadership Computing Facility, for the Theta supercomputer. I am trying to install py-torch however it can not compile on the login nodes, since they are haswell chips and the compute nodes are KNL (I think this is the cause, AVX512 is missing, but it's not clear). Installing on the login nodes fails for unclear reasons: ``` ==> Error: ProcessError: Command exited with status -4: '/soft/interpreters/python/3.6/intel/2019.3.075/bin/python3.6' '-s' 'setup.py' '--no-user-cfg' 'install' '--prefix=/lus/theta-fs0/software/datascience/spack/opt/spack/cray-cnl6-mic_knl/gcc-8.3.0/py-torch-1.3.1-hbkhwn36w556jas6nexjb3zkh3id2twq' '--single-version-externally-managed' '--root=/' See build log for details: /tmp/cadams/spack-stage/spack-stage-py-torch-1.3.1-hbkhwn36w556jas6nexjb3zkh3id2twq/spack-build-out.txt ``` There is no extra information in the file specified. Installing on the compute nodes ought to satisfy the build requirement, however I think py-torch pulls from sub repositories and we don't have access to networking on compute nodes: ``` ==> Warning: Fetching from mirror without a checksum! This package is normally checked out from a version control system, but it has been archived on a spack mirror. This means we cannot know a checksum for the tarball in advance. Be sure that your connection to this mirror is secure! ==> Error: ProcessError: Command exited with status 1: '/soft/interpreters/python/3.6/intel/2019.3.075/bin/python3.6' '-s' 'setup.py' '--no-user-cfg' 'install' '--prefix=/lus/theta-fs0/software/datascience/spack/opt/spack/cray-cnl6-mic_knl/gcc-8.3.0/py-torch-1.3.1-hbkhwn36w556jas6nexjb3zkh3id2twq' '--single-version-externally-managed' '--root=/' 2 errors found in build log: 92 Cloning into 'psimd'... 93 fatal: unable to access 'https://github.com/Maratyszcza/psimd.git/': Failed to connect to github.com port 443: Connection timed out 94 Cloning into 'psimd'... 95 fatal: unable to access 'https://github.com/Maratyszcza/psimd.git/': Failed to connect to github.com port 443: Connection timed out 96 -- Had to git clone more than once: 97 3 times. >> 98 CMake Error at /tmp/cadams/spack-stage/spack-stage-py-torch-1.3.1-hbkhwn36w556jas6nexjb3zkh3id2twq/spack-src/build/confu-deps/psimd-download/psimd-prefix/tmp/psimd-gitclone.cmake:66 (message): 99 Failed to clone repository: 'https://github.com/Maratyszcza/psimd.git' 100 101 102 ninja: build stopped: subcommand failed. >> 103 CMake Error at third_party/FP16/CMakeLists.txt:94 (ADD_SUBDIRECTORY): 104 ADD_SUBDIRECTORY given source 105 "/tmp/cadams/spack-stage/spack-stage-py-torch-1.3.1-hbkhwn36w556jas6nexjb3zkh3id2twq/spack-src/build/confu-srcs/psimd" 106 which is not an existing directory. 107 108 109 -- Found system Eigen at /lus/theta-fs0/software/datascience/spack/opt/spack/cray-cnl6-mic_knl/gcc-8.3.0/eigen-3.3.7-rnf3w44mxhjijj7ok2yaypcttpa3wy7z/include/eigen3 See build log for details: /tmp/cadams/spack-stage/spack-stage-py-torch-1.3.1-hbkhwn36w556jas6nexjb3zkh3id2twq/spack-build-out.txt ``` I tried to fetch all of the packages needed for the build prior to running the build script, however it doesn't seem to have the psimd submodule when it goes to install. Any ideas how to fetch this so it doesn't need to compile?
non_priority
installation issue py torch fails to fetch sub repos when running without networking this is happening argonne leadership computing facility for the theta supercomputer i am trying to install py torch however it can not compile on the login nodes since they are haswell chips and the compute nodes are knl i think this is the cause is missing but it s not clear installing on the login nodes fails for unclear reasons error processerror command exited with status soft interpreters python intel bin s setup py no user cfg install prefix lus theta software datascience spack opt spack cray mic knl gcc py torch single version externally managed root see build log for details tmp cadams spack stage spack stage py torch spack build out txt there is no extra information in the file specified installing on the compute nodes ought to satisfy the build requirement however i think py torch pulls from sub repositories and we don t have access to networking on compute nodes warning fetching from mirror without a checksum this package is normally checked out from a version control system but it has been archived on a spack mirror this means we cannot know a checksum for the tarball in advance be sure that your connection to this mirror is secure error processerror command exited with status soft interpreters python intel bin s setup py no user cfg install prefix lus theta software datascience spack opt spack cray mic knl gcc py torch single version externally managed root errors found in build log cloning into psimd fatal unable to access failed to connect to github com port connection timed out cloning into psimd fatal unable to access failed to connect to github com port connection timed out had to git clone more than once times cmake error at tmp cadams spack stage spack stage py torch spack src build confu deps psimd download psimd prefix tmp psimd gitclone cmake message failed to clone repository ninja build stopped subcommand failed cmake error at third party cmakelists txt add subdirectory add subdirectory given source tmp cadams spack stage spack stage py torch spack src build confu srcs psimd which is not an existing directory found system eigen at lus theta software datascience spack opt spack cray mic knl gcc eigen include see build log for details tmp cadams spack stage spack stage py torch spack build out txt i tried to fetch all of the packages needed for the build prior to running the build script however it doesn t seem to have the psimd submodule when it goes to install any ideas how to fetch this so it doesn t need to compile
0
204,289
15,437,174,090
IssuesEvent
2021-03-07 15:45:49
commercialhaskell/stackage
https://api.github.com/repos/commercialhaskell/stackage
opened
genvalidity-persistent fails to compile with GHC 9.0.1
failure: compile failure: test-suite
``` Configuring genvalidity-persistent-0.0.0.0... Preprocessing library for genvalidity-persistent-0.0.0.0.. Building library for genvalidity-persistent-0.0.0.0.. [1 of 2] Compiling Data.GenValidity.Persist [2 of 2] Compiling Paths_genvalidity_persistent Preprocessing test suite 'genvalidity-persistent-test' for genvalidity-persistent-0.0.0.0.. Building test suite 'genvalidity-persistent-test' for genvalidity-persistent-0.0.0.0.. [1 of 3] Compiling Data.GenValidity.PersistSpec /var/stackage/work/unpack-dir/unpacked/genvalidity-persistent-0.0.0.0-3ba7908d36bbaae630865908727a82b8e499bd746e0a42e13e0759f813d8f16b/test/Data/GenValidity/PersistSpec.hs:27:1: error: Generating Persistent entities now requires the following language extensions: DataKinds FlexibleInstances Please enable the extensions by copy/pasting these lines into the top of your file: {-# LANGUAGE DataKinds #-} {-# LANGUAGE FlexibleInstances #-} | 27 | share | ^^^^^... ``` Will skip testing for now CC @NorfairKing
1.0
genvalidity-persistent fails to compile with GHC 9.0.1 - ``` Configuring genvalidity-persistent-0.0.0.0... Preprocessing library for genvalidity-persistent-0.0.0.0.. Building library for genvalidity-persistent-0.0.0.0.. [1 of 2] Compiling Data.GenValidity.Persist [2 of 2] Compiling Paths_genvalidity_persistent Preprocessing test suite 'genvalidity-persistent-test' for genvalidity-persistent-0.0.0.0.. Building test suite 'genvalidity-persistent-test' for genvalidity-persistent-0.0.0.0.. [1 of 3] Compiling Data.GenValidity.PersistSpec /var/stackage/work/unpack-dir/unpacked/genvalidity-persistent-0.0.0.0-3ba7908d36bbaae630865908727a82b8e499bd746e0a42e13e0759f813d8f16b/test/Data/GenValidity/PersistSpec.hs:27:1: error: Generating Persistent entities now requires the following language extensions: DataKinds FlexibleInstances Please enable the extensions by copy/pasting these lines into the top of your file: {-# LANGUAGE DataKinds #-} {-# LANGUAGE FlexibleInstances #-} | 27 | share | ^^^^^... ``` Will skip testing for now CC @NorfairKing
non_priority
genvalidity persistent fails to compile with ghc configuring genvalidity persistent preprocessing library for genvalidity persistent building library for genvalidity persistent compiling data genvalidity persist compiling paths genvalidity persistent preprocessing test suite genvalidity persistent test for genvalidity persistent building test suite genvalidity persistent test for genvalidity persistent compiling data genvalidity persistspec var stackage work unpack dir unpacked genvalidity persistent test data genvalidity persistspec hs error generating persistent entities now requires the following language extensions datakinds flexibleinstances please enable the extensions by copy pasting these lines into the top of your file language datakinds language flexibleinstances share will skip testing for now cc norfairking
0
71,172
15,184,765,834
IssuesEvent
2021-02-15 10:01:29
devikab2b/whites
https://api.github.com/repos/devikab2b/whites
opened
CVE-2016-6796 (High) detected in jasper-compiler-5.5.12.jar
security vulnerability
## CVE-2016-6796 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jasper-compiler-5.5.12.jar</b></p></summary> <p>null</p> <p>Path to dependency file: whites/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/tomcat/jasper-compiler/5.5.12/jasper-compiler-5.5.12.jar</p> <p> Dependency Hierarchy: - hadoop-core-1.2.0.jar (Root Library) - :x: **jasper-compiler-5.5.12.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/devikab2b/whites/commit/4c5e641103e08d86e4119a1d3808eea3ebca1665">4c5e641103e08d86e4119a1d3808eea3ebca1665</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. <p>Publish Date: 2017-08-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-6796>CVE-2016-6796</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796</a></p> <p>Release Date: 2017-08-11</p> <p>Fix Resolution: org.apache.tomcat.embed:tomcat-embed-jasper:9.0.0.M10,8.5.5,8.0.37,7.0.72,org.apache.tomcat:tomcat-catalina:9.0.0.M10,8.5.5,8.0.37,7.0.72,org.apache.tomcat:tomcat-jasper:9.0.0.M10,8.5.5,8.0.37,7.0.72,org.apache.tomcat:catalina:6.0.47,org.apache.tomcat:jasper:6.0.47</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-6796 (High) detected in jasper-compiler-5.5.12.jar - ## CVE-2016-6796 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jasper-compiler-5.5.12.jar</b></p></summary> <p>null</p> <p>Path to dependency file: whites/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/tomcat/jasper-compiler/5.5.12/jasper-compiler-5.5.12.jar</p> <p> Dependency Hierarchy: - hadoop-core-1.2.0.jar (Root Library) - :x: **jasper-compiler-5.5.12.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/devikab2b/whites/commit/4c5e641103e08d86e4119a1d3808eea3ebca1665">4c5e641103e08d86e4119a1d3808eea3ebca1665</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. <p>Publish Date: 2017-08-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-6796>CVE-2016-6796</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796</a></p> <p>Release Date: 2017-08-11</p> <p>Fix Resolution: org.apache.tomcat.embed:tomcat-embed-jasper:9.0.0.M10,8.5.5,8.0.37,7.0.72,org.apache.tomcat:tomcat-catalina:9.0.0.M10,8.5.5,8.0.37,7.0.72,org.apache.tomcat:tomcat-jasper:9.0.0.M10,8.5.5,8.0.37,7.0.72,org.apache.tomcat:catalina:6.0.47,org.apache.tomcat:jasper:6.0.47</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jasper compiler jar cve high severity vulnerability vulnerable library jasper compiler jar null path to dependency file whites pom xml path to vulnerable library home wss scanner repository tomcat jasper compiler jasper compiler jar dependency hierarchy hadoop core jar root library x jasper compiler jar vulnerable library found in head commit a href found in base branch main vulnerability details a malicious web application running on apache tomcat to to to to and to was able to bypass a configured securitymanager via manipulation of the configuration parameters for the jsp servlet publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache tomcat embed tomcat embed jasper org apache tomcat tomcat catalina org apache tomcat tomcat jasper org apache tomcat catalina org apache tomcat jasper step up your open source security game with whitesource
0
153,864
13,529,051,284
IssuesEvent
2020-09-15 17:40:16
aws/chalice
https://api.github.com/repos/aws/chalice
closed
chalice deploy import error, with layers
documentation
Hi I got module not found error when deploying, I specify the function to use layers `{ "version": "2.0", "app_name": "myapp", "stages": { "dev": { "api_gateway_stage": "api", "manage_iam_role": false, "iam_role_arn": "arn", "lambda_functions": { "myfunc": { "layers": ["layer1", "layer2"] } } } }, }` I did not specify the module in requirements.txt since I have the layers specified. I probably missing something, could not find much docs on layers for chalice. Thanks Dong
1.0
chalice deploy import error, with layers - Hi I got module not found error when deploying, I specify the function to use layers `{ "version": "2.0", "app_name": "myapp", "stages": { "dev": { "api_gateway_stage": "api", "manage_iam_role": false, "iam_role_arn": "arn", "lambda_functions": { "myfunc": { "layers": ["layer1", "layer2"] } } } }, }` I did not specify the module in requirements.txt since I have the layers specified. I probably missing something, could not find much docs on layers for chalice. Thanks Dong
non_priority
chalice deploy import error with layers hi i got module not found error when deploying i specify the function to use layers version app name myapp stages dev api gateway stage api manage iam role false iam role arn arn lambda functions myfunc layers i did not specify the module in requirements txt since i have the layers specified i probably missing something could not find much docs on layers for chalice thanks dong
0
135,136
10,963,160,235
IssuesEvent
2019-11-27 18:59:22
brave/brave-browser
https://api.github.com/repos/brave/brave-browser
opened
Ads are served even when Ads are not yet supported
QA/Test-Plan-Specified QA/Yes android-core-release
<!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue. PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE. INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED--> ## Description <!--Provide a brief description of the issue--> Ads are served even when Ads are not yet supported ## Steps to Reproduce <!--Please add a series of steps to reproduce the issue--> 1. Clean profile 2.0.0 2. Enable rewards 3. Verify sample ad is shown after enabling rewards 4. Verify that, Ads panel isn't shown and Sorry! Ads not available message is shown in panel 5. Ads are served even though ads are not yet supported ## Actual result: <!--Please add screenshots if needed--> Ads are served even when Ads are not yet available ![image](https://user-images.githubusercontent.com/38657976/69751724-b690a500-1175-11ea-89a6-42ea3d14c928.png) ![image](https://user-images.githubusercontent.com/38657976/69751725-b690a500-1175-11ea-8c12-6285b26fdf7b.png) ## Expected result: Ads should not be served when Ads are not yet supported ## Reproduces how often: <!--[Easily reproduced/Intermittent issue/No steps to reproduce]--> Always ## Brave version (brave://version info) <!--For installed build, please copy Brave, Revision and OS from brave://version and paste here. If building from source please mention it along with brave://version details--> Brave 2.0.0 Chromium 78.1.3.15 ## Version/Channel Information: <!--Does this issue happen on any other channels? Or is it specific to a certain channel?--> - Can you reproduce this issue with the current release? No - Can you reproduce this issue with the beta channel? No - Can you reproduce this issue with the dev channel? No - Can you reproduce this issue with the nightly channel? No ## Other Additional Information: - Does the issue resolve itself when disabling Brave Shields? NA - Does the issue resolve itself when disabling Brave Rewards? NA - Is the issue reproducible on the latest version of Chrome? NA ## Miscellaneous Information: <!--Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue-->
1.0
Ads are served even when Ads are not yet supported - <!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue. PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE. INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED--> ## Description <!--Provide a brief description of the issue--> Ads are served even when Ads are not yet supported ## Steps to Reproduce <!--Please add a series of steps to reproduce the issue--> 1. Clean profile 2.0.0 2. Enable rewards 3. Verify sample ad is shown after enabling rewards 4. Verify that, Ads panel isn't shown and Sorry! Ads not available message is shown in panel 5. Ads are served even though ads are not yet supported ## Actual result: <!--Please add screenshots if needed--> Ads are served even when Ads are not yet available ![image](https://user-images.githubusercontent.com/38657976/69751724-b690a500-1175-11ea-89a6-42ea3d14c928.png) ![image](https://user-images.githubusercontent.com/38657976/69751725-b690a500-1175-11ea-8c12-6285b26fdf7b.png) ## Expected result: Ads should not be served when Ads are not yet supported ## Reproduces how often: <!--[Easily reproduced/Intermittent issue/No steps to reproduce]--> Always ## Brave version (brave://version info) <!--For installed build, please copy Brave, Revision and OS from brave://version and paste here. If building from source please mention it along with brave://version details--> Brave 2.0.0 Chromium 78.1.3.15 ## Version/Channel Information: <!--Does this issue happen on any other channels? Or is it specific to a certain channel?--> - Can you reproduce this issue with the current release? No - Can you reproduce this issue with the beta channel? No - Can you reproduce this issue with the dev channel? No - Can you reproduce this issue with the nightly channel? No ## Other Additional Information: - Does the issue resolve itself when disabling Brave Shields? NA - Does the issue resolve itself when disabling Brave Rewards? NA - Is the issue reproducible on the latest version of Chrome? NA ## Miscellaneous Information: <!--Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue-->
non_priority
ads are served even when ads are not yet supported have you searched for similar issues before submitting this issue please check the open issues and add a note before logging a new issue please use the template below to provide information about the issue insufficient info will get the issue closed it will only be reopened after sufficient info is provided description ads are served even when ads are not yet supported steps to reproduce clean profile enable rewards verify sample ad is shown after enabling rewards verify that ads panel isn t shown and sorry ads not available message is shown in panel ads are served even though ads are not yet supported actual result ads are served even when ads are not yet available expected result ads should not be served when ads are not yet supported reproduces how often always brave version brave version info brave chromium version channel information can you reproduce this issue with the current release no can you reproduce this issue with the beta channel no can you reproduce this issue with the dev channel no can you reproduce this issue with the nightly channel no other additional information does the issue resolve itself when disabling brave shields na does the issue resolve itself when disabling brave rewards na is the issue reproducible on the latest version of chrome na miscellaneous information
0
101,445
12,684,735,887
IssuesEvent
2020-06-19 23:56:49
solex2006/SELIProject
https://api.github.com/repos/solex2006/SELIProject
opened
Non-Text content
1 - Planning Feature Design Notes :notebook: discussion
1.1.1 All non-text content that is presented to the user has a text alternative that serves the equivalent purpose ### Scenario: Controls and Inputs Such as images used as submit buttons, image maps or complex animations, a name is provided to describe the purpose of the non-text content so that the person at least knows what the non-text content is and why it is there - #16 ### Scenario: Time-Based Media (video, video-only, audio) - [ ] A text alternative that describes the time-based media and/or gives its title, besides this [requirements](https://github.com/solex2006/SELIProject/milestone/13) - [ ] In case it's a live video or live audio, text alternatives provide a descriptive label. Procedure Remove, hide, or mask the non-text content. Display the short text alternative(s). Check that the purpose of the non-text content is clear, even if content is lost. Expected Results #3 is true. ### Scenario: Test Sometimes a test or exercise must be partially or completely presented in non-text format. Audio or visual information is provided that cannot be changed to text because the test or exercise must be conducted using that sense. For example, a hearing test would be invalid if a text alternative were provided. A visual skill development exercise would similarly make no sense in text form. And a spelling test with text alternatives would not be very effective. - [ ] For these cases, text alternatives should be provided to describe the purpose of the non-text content; of course, the text alternatives would not provide the same information needed to pass the test. ### Scenario: Sensory If non-text content is primarily intended to create a specific sensory experience, then text alternatives at least provide descriptive identification of the non-text content. ### Scenario: CAPTCHA - [ ] A text alternative text alternatives that identify and describe the purpose of the CAPTCHA; AND - [ ] Alternative forms of CAPTCHA using output modes for different types of sensory perception are provided to accommodate different disabilities. ### Scenario: Decoration, Formatting, Invisible If non-text content is pure decoration, is used only for visual formatting, or is not presented to users, then it is implemented in a way that it can be ignored by assistive technology. ### Scenario: Images - #160 ### Scenario: All other situations - [ ] Provide a **short description** that can serve the same purpose and present the same information as the non-text content. - Using `aria-label` to provide labels for objects - Using `aria-labelledby` to provide a text alternative for non-text content - Using a text alternative on one item within a group of images that describes all items in the group If **short description** is not enough (e.g. chart, diagram), combine with a **long description** - [ ] Short description: brief description of the non-text content - [ ] Long description: that serves the same purpose of the non-text content. #### Test Procedure 1. Remove, hide, or mask the non-text content 1. Replace it with the text alternative 1. Check that nothing is lost (the purpose of the non-text content is met by the text alternative) 1. Check that the short text alternative 1. Otherwise, check that 1. Check for the presence of a short text alternative that provides a brief description of the non-text content. 1. Check that the long description conveys the same information conveyed by the non-text content. 1. If the non-text content contains words that are important to understanding the content, the words are included in the text alternative Expected Results: Check 3 is true. If the non-text content contains words that are important to understanding the content, check 4 is also true ### Scenario: Links - [ ] Providing link text that describes the purpose of a link for **anchor elements**. The description lets a user distinguish this link from other links in the Web page and helps the user determine whether to follow the link. The URI of the destination is generally not sufficiently descriptive. **Test Procedure** For each link in the content that uses this technique: 1. Check that text or a text alternative for non-text content is included in the a element 2. If an img element is the only content of the a element, check that its text alternative describes the purpose of the link 3. If the a element contains one or more img element(s) and the text alternative of the img element(s) is empty, check that the text of the link describes the purpose of the link 4. If the a element only contains text, check that the text describes the purpose of the link ### Scenario: Images as submit buttons - [ ] Use alt attributes on images used as submit buttons The alt attribute of the input element is used to provide a functional label. This label indicates the button's function, but does not attempt to describe the image. The label is especially important if there are multiple submit buttons on the page that each lead to different results. ```html <form action="http://example.com/prog/text-read" method="post"> <input type="image" name="submit-publish" src="button1.gif" alt="Save and Publish" /> <input type="image" name="submit-save" src="button2.gif" alt="Save" /> </form> ``` #### Test Procedure For all input elements that have a type attribute value of "image" 1. Check for the presence of an alt attribute. 2. Check that the alt attribute indicates the button's function. ### Scenario: Form controls - [ ] Using label elements to associate text labels with **form controls*. A label is attached to a specific form control through the use of the for attribute. The value of the for attribute must be the same as the value of the id attribute of the form control. The id attribute may have the same value as the name attribute, but both must be provided, and the id must be unique in the Web page. - [ ] Using the title attribute to identify form controls when the label element cannot be used. Use the title attribute to provide an accessible name for form controls when the visual design does not include text on the screen that can be associated with the control as a label. User agents, including assistive technology, can speak the title attribute. > **NOTE** > Elements that use explicitly associated labels are: > - input type="text" > - input type="checkbox" > - input type="radio" > - input type="file" > - input type="password" > - textarea > - select > The label element is not used for the following because labels for these elements are provided via the value attribute (for Submit and Reset buttons), the alt attribute (for image buttons), or element content itself (button). > - Submit and Reset buttons ( input type="submit" or input type="reset") > - Image buttons ( input type="image") > - Hidden input fields ( input type="hidden") > - Script buttons (button elements or <input type="button">) ```html <label for="firstname">First name:</label> <input type="text" name="firstname" id="firstname" /> ``` ```html <input type="checkbox" id="markuplang" name="computerskills" checked="checked"> <label for="markuplang">HTML</label> ``` ```html <h1>Donut Selection</h1> <p>Choose the type of donut(s) you would like then select the "purchase donuts" button.</p> <form action="http://example.com/donut" method="post"> <p> <input type="radio" name="flavor" id="choc" value="chocolate" /> <label for="choc">Chocolate</label><br/> <input type="radio" name="flavor" id="cream" value="cream"/> <label for="cream">Cream Filled</label><br/> <input type="radio" name="flavor" id="honey" value="honey"/> <label for="honey">Honey Glazed</label><br/> <input type="submit" value="Purchase Donuts"/> </p> </form> ``` ```html <label for="searchTerm">Search for:</label> <input id="searchTerm" type="text" size="30" value="" name="searchTerm"> <select title="Search in" id="scope"> … </select> ``` ```html <fieldset><legend>Phone number</legend> <input id="areaCode" name="areaCode" title="Area Code" type="text" size="3" value="" > <input id="exchange" name="exchange" title="First three digits of phone number" type="text" size="3" value="" > <input id="lastDigits" name="lastDigits" title="Last four digits of phone number" type="text" size="4" value="" > </fieldset> ``` ```html <input type="text" title="Type search term here"/> <input type="submit" value="Search"/> ``` Note: A data table of form controls needs to associate each control with the column and row headers for that cell. Without a title (or off-screen label) it is difficult for non-visual users to pause and interrogate for corresponding row or column header values using their assistive technology while tabbing through the form. For example, a survey form has four column headers in first row: Question, Agree, Undecided, Disagree. Each following row contains a question and a radio button in each cell corresponding to answer choice in the three columns. The title attribute for every radio button contains the information necessary to identify the control. #### Test Procedure For all input elements of type text, file or password, for all textareas and for all select elements in the Web page: 1. Check that there is a label element that identifies the purpose of the control before the input, textarea, or select element 2. Check that the for attribute of the label element matches the id of the input, textarea, or select element 3. Check that the label element is visible. ( For all input elements of type checkbox or radio in the Web page:: 1. Check that there is a label element that identifies the purpose of the control after the input element 2. Check that the for attribute of the label element matches the id of the input element 3. Check that the label element is visible. For all form controls that are not associated with a label element: 1. Check that the control has a title attribute 2. Check that the purpose of the form control is clear to users who can see the control. 1. Check that the title attribute identifies the purpose of the control and that it matches the apparent visual purpose. # Resources https://developers.google.com/web/fundamentals/accessibility/semantics-aria/aria-labels-and-relationships?hl=pt-br
1.0
Non-Text content - 1.1.1 All non-text content that is presented to the user has a text alternative that serves the equivalent purpose ### Scenario: Controls and Inputs Such as images used as submit buttons, image maps or complex animations, a name is provided to describe the purpose of the non-text content so that the person at least knows what the non-text content is and why it is there - #16 ### Scenario: Time-Based Media (video, video-only, audio) - [ ] A text alternative that describes the time-based media and/or gives its title, besides this [requirements](https://github.com/solex2006/SELIProject/milestone/13) - [ ] In case it's a live video or live audio, text alternatives provide a descriptive label. Procedure Remove, hide, or mask the non-text content. Display the short text alternative(s). Check that the purpose of the non-text content is clear, even if content is lost. Expected Results #3 is true. ### Scenario: Test Sometimes a test or exercise must be partially or completely presented in non-text format. Audio or visual information is provided that cannot be changed to text because the test or exercise must be conducted using that sense. For example, a hearing test would be invalid if a text alternative were provided. A visual skill development exercise would similarly make no sense in text form. And a spelling test with text alternatives would not be very effective. - [ ] For these cases, text alternatives should be provided to describe the purpose of the non-text content; of course, the text alternatives would not provide the same information needed to pass the test. ### Scenario: Sensory If non-text content is primarily intended to create a specific sensory experience, then text alternatives at least provide descriptive identification of the non-text content. ### Scenario: CAPTCHA - [ ] A text alternative text alternatives that identify and describe the purpose of the CAPTCHA; AND - [ ] Alternative forms of CAPTCHA using output modes for different types of sensory perception are provided to accommodate different disabilities. ### Scenario: Decoration, Formatting, Invisible If non-text content is pure decoration, is used only for visual formatting, or is not presented to users, then it is implemented in a way that it can be ignored by assistive technology. ### Scenario: Images - #160 ### Scenario: All other situations - [ ] Provide a **short description** that can serve the same purpose and present the same information as the non-text content. - Using `aria-label` to provide labels for objects - Using `aria-labelledby` to provide a text alternative for non-text content - Using a text alternative on one item within a group of images that describes all items in the group If **short description** is not enough (e.g. chart, diagram), combine with a **long description** - [ ] Short description: brief description of the non-text content - [ ] Long description: that serves the same purpose of the non-text content. #### Test Procedure 1. Remove, hide, or mask the non-text content 1. Replace it with the text alternative 1. Check that nothing is lost (the purpose of the non-text content is met by the text alternative) 1. Check that the short text alternative 1. Otherwise, check that 1. Check for the presence of a short text alternative that provides a brief description of the non-text content. 1. Check that the long description conveys the same information conveyed by the non-text content. 1. If the non-text content contains words that are important to understanding the content, the words are included in the text alternative Expected Results: Check 3 is true. If the non-text content contains words that are important to understanding the content, check 4 is also true ### Scenario: Links - [ ] Providing link text that describes the purpose of a link for **anchor elements**. The description lets a user distinguish this link from other links in the Web page and helps the user determine whether to follow the link. The URI of the destination is generally not sufficiently descriptive. **Test Procedure** For each link in the content that uses this technique: 1. Check that text or a text alternative for non-text content is included in the a element 2. If an img element is the only content of the a element, check that its text alternative describes the purpose of the link 3. If the a element contains one or more img element(s) and the text alternative of the img element(s) is empty, check that the text of the link describes the purpose of the link 4. If the a element only contains text, check that the text describes the purpose of the link ### Scenario: Images as submit buttons - [ ] Use alt attributes on images used as submit buttons The alt attribute of the input element is used to provide a functional label. This label indicates the button's function, but does not attempt to describe the image. The label is especially important if there are multiple submit buttons on the page that each lead to different results. ```html <form action="http://example.com/prog/text-read" method="post"> <input type="image" name="submit-publish" src="button1.gif" alt="Save and Publish" /> <input type="image" name="submit-save" src="button2.gif" alt="Save" /> </form> ``` #### Test Procedure For all input elements that have a type attribute value of "image" 1. Check for the presence of an alt attribute. 2. Check that the alt attribute indicates the button's function. ### Scenario: Form controls - [ ] Using label elements to associate text labels with **form controls*. A label is attached to a specific form control through the use of the for attribute. The value of the for attribute must be the same as the value of the id attribute of the form control. The id attribute may have the same value as the name attribute, but both must be provided, and the id must be unique in the Web page. - [ ] Using the title attribute to identify form controls when the label element cannot be used. Use the title attribute to provide an accessible name for form controls when the visual design does not include text on the screen that can be associated with the control as a label. User agents, including assistive technology, can speak the title attribute. > **NOTE** > Elements that use explicitly associated labels are: > - input type="text" > - input type="checkbox" > - input type="radio" > - input type="file" > - input type="password" > - textarea > - select > The label element is not used for the following because labels for these elements are provided via the value attribute (for Submit and Reset buttons), the alt attribute (for image buttons), or element content itself (button). > - Submit and Reset buttons ( input type="submit" or input type="reset") > - Image buttons ( input type="image") > - Hidden input fields ( input type="hidden") > - Script buttons (button elements or <input type="button">) ```html <label for="firstname">First name:</label> <input type="text" name="firstname" id="firstname" /> ``` ```html <input type="checkbox" id="markuplang" name="computerskills" checked="checked"> <label for="markuplang">HTML</label> ``` ```html <h1>Donut Selection</h1> <p>Choose the type of donut(s) you would like then select the "purchase donuts" button.</p> <form action="http://example.com/donut" method="post"> <p> <input type="radio" name="flavor" id="choc" value="chocolate" /> <label for="choc">Chocolate</label><br/> <input type="radio" name="flavor" id="cream" value="cream"/> <label for="cream">Cream Filled</label><br/> <input type="radio" name="flavor" id="honey" value="honey"/> <label for="honey">Honey Glazed</label><br/> <input type="submit" value="Purchase Donuts"/> </p> </form> ``` ```html <label for="searchTerm">Search for:</label> <input id="searchTerm" type="text" size="30" value="" name="searchTerm"> <select title="Search in" id="scope"> … </select> ``` ```html <fieldset><legend>Phone number</legend> <input id="areaCode" name="areaCode" title="Area Code" type="text" size="3" value="" > <input id="exchange" name="exchange" title="First three digits of phone number" type="text" size="3" value="" > <input id="lastDigits" name="lastDigits" title="Last four digits of phone number" type="text" size="4" value="" > </fieldset> ``` ```html <input type="text" title="Type search term here"/> <input type="submit" value="Search"/> ``` Note: A data table of form controls needs to associate each control with the column and row headers for that cell. Without a title (or off-screen label) it is difficult for non-visual users to pause and interrogate for corresponding row or column header values using their assistive technology while tabbing through the form. For example, a survey form has four column headers in first row: Question, Agree, Undecided, Disagree. Each following row contains a question and a radio button in each cell corresponding to answer choice in the three columns. The title attribute for every radio button contains the information necessary to identify the control. #### Test Procedure For all input elements of type text, file or password, for all textareas and for all select elements in the Web page: 1. Check that there is a label element that identifies the purpose of the control before the input, textarea, or select element 2. Check that the for attribute of the label element matches the id of the input, textarea, or select element 3. Check that the label element is visible. ( For all input elements of type checkbox or radio in the Web page:: 1. Check that there is a label element that identifies the purpose of the control after the input element 2. Check that the for attribute of the label element matches the id of the input element 3. Check that the label element is visible. For all form controls that are not associated with a label element: 1. Check that the control has a title attribute 2. Check that the purpose of the form control is clear to users who can see the control. 1. Check that the title attribute identifies the purpose of the control and that it matches the apparent visual purpose. # Resources https://developers.google.com/web/fundamentals/accessibility/semantics-aria/aria-labels-and-relationships?hl=pt-br
non_priority
non text content all non text content that is presented to the user has a text alternative that serves the equivalent purpose scenario controls and inputs such as images used as submit buttons image maps or complex animations a name is provided to describe the purpose of the non text content so that the person at least knows what the non text content is and why it is there scenario time based media video video only audio a text alternative that describes the time based media and or gives its title besides this in case it s a live video or live audio text alternatives provide a descriptive label procedure remove hide or mask the non text content display the short text alternative s check that the purpose of the non text content is clear even if content is lost expected results is true scenario test sometimes a test or exercise must be partially or completely presented in non text format audio or visual information is provided that cannot be changed to text because the test or exercise must be conducted using that sense for example a hearing test would be invalid if a text alternative were provided a visual skill development exercise would similarly make no sense in text form and a spelling test with text alternatives would not be very effective for these cases text alternatives should be provided to describe the purpose of the non text content of course the text alternatives would not provide the same information needed to pass the test scenario sensory if non text content is primarily intended to create a specific sensory experience then text alternatives at least provide descriptive identification of the non text content scenario captcha a text alternative text alternatives that identify and describe the purpose of the captcha and alternative forms of captcha using output modes for different types of sensory perception are provided to accommodate different disabilities scenario decoration formatting invisible if non text content is pure decoration is used only for visual formatting or is not presented to users then it is implemented in a way that it can be ignored by assistive technology scenario images scenario all other situations provide a short description that can serve the same purpose and present the same information as the non text content using aria label to provide labels for objects using aria labelledby to provide a text alternative for non text content using a text alternative on one item within a group of images that describes all items in the group if short description is not enough e g chart diagram combine with a long description short description brief description of the non text content long description that serves the same purpose of the non text content test procedure remove hide or mask the non text content replace it with the text alternative check that nothing is lost the purpose of the non text content is met by the text alternative check that the short text alternative otherwise check that check for the presence of a short text alternative that provides a brief description of the non text content check that the long description conveys the same information conveyed by the non text content if the non text content contains words that are important to understanding the content the words are included in the text alternative expected results check is true if the non text content contains words that are important to understanding the content check is also true scenario links providing link text that describes the purpose of a link for anchor elements the description lets a user distinguish this link from other links in the web page and helps the user determine whether to follow the link the uri of the destination is generally not sufficiently descriptive test procedure for each link in the content that uses this technique check that text or a text alternative for non text content is included in the a element if an img element is the only content of the a element check that its text alternative describes the purpose of the link if the a element contains one or more img element s and the text alternative of the img element s is empty check that the text of the link describes the purpose of the link if the a element only contains text check that the text describes the purpose of the link scenario images as submit buttons use alt attributes on images used as submit buttons the alt attribute of the input element is used to provide a functional label this label indicates the button s function but does not attempt to describe the image the label is especially important if there are multiple submit buttons on the page that each lead to different results html test procedure for all input elements that have a type attribute value of image check for the presence of an alt attribute check that the alt attribute indicates the button s function scenario form controls using label elements to associate text labels with form controls a label is attached to a specific form control through the use of the for attribute the value of the for attribute must be the same as the value of the id attribute of the form control the id attribute may have the same value as the name attribute but both must be provided and the id must be unique in the web page using the title attribute to identify form controls when the label element cannot be used use the title attribute to provide an accessible name for form controls when the visual design does not include text on the screen that can be associated with the control as a label user agents including assistive technology can speak the title attribute note elements that use explicitly associated labels are input type text input type checkbox input type radio input type file input type password textarea select the label element is not used for the following because labels for these elements are provided via the value attribute for submit and reset buttons the alt attribute for image buttons or element content itself button submit and reset buttons input type submit or input type reset image buttons input type image hidden input fields input type hidden script buttons button elements or html first name html html html donut selection choose the type of donut s you would like then select the purchase donuts button chocolate cream filled honey glazed html search for … html phone number input id areacode name areacode title area code type text size value input id exchange name exchange title first three digits of phone number type text size value input id lastdigits name lastdigits title last four digits of phone number type text size value html note a data table of form controls needs to associate each control with the column and row headers for that cell without a title or off screen label it is difficult for non visual users to pause and interrogate for corresponding row or column header values using their assistive technology while tabbing through the form for example a survey form has four column headers in first row question agree undecided disagree each following row contains a question and a radio button in each cell corresponding to answer choice in the three columns the title attribute for every radio button contains the information necessary to identify the control test procedure for all input elements of type text file or password for all textareas and for all select elements in the web page check that there is a label element that identifies the purpose of the control before the input textarea or select element check that the for attribute of the label element matches the id of the input textarea or select element check that the label element is visible for all input elements of type checkbox or radio in the web page check that there is a label element that identifies the purpose of the control after the input element check that the for attribute of the label element matches the id of the input element check that the label element is visible for all form controls that are not associated with a label element check that the control has a title attribute check that the purpose of the form control is clear to users who can see the control check that the title attribute identifies the purpose of the control and that it matches the apparent visual purpose resources
0
93,005
19,025,792,910
IssuesEvent
2021-11-24 03:12:47
alibaba/java-dns-cache-manipulator
https://api.github.com/repos/alibaba/java-dns-cache-manipulator
opened
Fix "method_lines" issue in library/src/main/java/com/alibaba/dcm/internal/InetAddressCacheUtilCommons.java
codeclimate
Method `initFieldsOfInetAddressCachePolicy` has 27 lines of code (exceeds 25 allowed). Consider refactoring. https://codeclimate.com/github/alibaba/java-dns-cache-manipulator/library/src/main/java/com/alibaba/dcm/internal/InetAddressCacheUtilCommons.java#issue_619daca133a4460001000041
1.0
Fix "method_lines" issue in library/src/main/java/com/alibaba/dcm/internal/InetAddressCacheUtilCommons.java - Method `initFieldsOfInetAddressCachePolicy` has 27 lines of code (exceeds 25 allowed). Consider refactoring. https://codeclimate.com/github/alibaba/java-dns-cache-manipulator/library/src/main/java/com/alibaba/dcm/internal/InetAddressCacheUtilCommons.java#issue_619daca133a4460001000041
non_priority
fix method lines issue in library src main java com alibaba dcm internal inetaddresscacheutilcommons java method initfieldsofinetaddresscachepolicy has lines of code exceeds allowed consider refactoring
0
140,036
31,817,132,689
IssuesEvent
2023-09-13 21:27:30
h4sh5/pypi-auto-scanner
https://api.github.com/repos/h4sh5/pypi-auto-scanner
opened
pytest-seleniumbase 4.18.6 has 13 GuardDog issues
guarddog code-execution
https://pypi.org/project/pytest-seleniumbase https://inspector.pypi.io/project/pytest-seleniumbase ```{ "dependency": "pytest-seleniumbase", "version": "4.18.6", "result": { "issues": 13, "errors": {}, "results": { "code-execution": [ { "location": "pytest-seleniumbase-4.18.6/setup.py:32", "code": " os.system(\"python -m pip install 'flake8==6.1.0'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:33", "code": " flake8_status = os.system(\"flake8 --exclude=recordings,temp\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:40", "code": " os.system(\"rm -f dist/*.egg; rm -f dist/*.tar.gz; rm -f dist/*.whl\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:41", "code": " os.system(\"rm -rf build/bdist.*; rm -rf build/lib\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:43", "code": " os.system(\"python -m pip install --upgrade 'build'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:45", "code": " os.system(\"python -m pip install --upgrade 'pkginfo'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:47", "code": " os.system(\"python -m pip install --upgrade 'readme-renderer'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:49", "code": " os.system(\"python -m pip install --upgrade 'jaraco.classes'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:51", "code": " os.system(\"python -m pip install --upgrade 'more-itertools'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:53", "code": " os.system(\"python -m pip install --upgrade 'zipp'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:55", "code": " os.system(\"python -m pip install --upgrade 'importlib-metadata'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:57", "code": " os.system(\"python -m pip install --upgrade keyring requests-toolbelt\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:61", "code": " os.system(\"python -m build\") # Create new tar/wheel", "message": "This package is executing OS commands in the setup.py file" } ] }, "path": "/tmp/tmpk93n69d4/pytest-seleniumbase" } }```
1.0
pytest-seleniumbase 4.18.6 has 13 GuardDog issues - https://pypi.org/project/pytest-seleniumbase https://inspector.pypi.io/project/pytest-seleniumbase ```{ "dependency": "pytest-seleniumbase", "version": "4.18.6", "result": { "issues": 13, "errors": {}, "results": { "code-execution": [ { "location": "pytest-seleniumbase-4.18.6/setup.py:32", "code": " os.system(\"python -m pip install 'flake8==6.1.0'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:33", "code": " flake8_status = os.system(\"flake8 --exclude=recordings,temp\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:40", "code": " os.system(\"rm -f dist/*.egg; rm -f dist/*.tar.gz; rm -f dist/*.whl\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:41", "code": " os.system(\"rm -rf build/bdist.*; rm -rf build/lib\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:43", "code": " os.system(\"python -m pip install --upgrade 'build'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:45", "code": " os.system(\"python -m pip install --upgrade 'pkginfo'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:47", "code": " os.system(\"python -m pip install --upgrade 'readme-renderer'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:49", "code": " os.system(\"python -m pip install --upgrade 'jaraco.classes'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:51", "code": " os.system(\"python -m pip install --upgrade 'more-itertools'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:53", "code": " os.system(\"python -m pip install --upgrade 'zipp'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:55", "code": " os.system(\"python -m pip install --upgrade 'importlib-metadata'\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:57", "code": " os.system(\"python -m pip install --upgrade keyring requests-toolbelt\")", "message": "This package is executing OS commands in the setup.py file" }, { "location": "pytest-seleniumbase-4.18.6/setup.py:61", "code": " os.system(\"python -m build\") # Create new tar/wheel", "message": "This package is executing OS commands in the setup.py file" } ] }, "path": "/tmp/tmpk93n69d4/pytest-seleniumbase" } }```
non_priority
pytest seleniumbase has guarddog issues dependency pytest seleniumbase version result issues errors results code execution location pytest seleniumbase setup py code os system python m pip install message this package is executing os commands in the setup py file location pytest seleniumbase setup py code status os system exclude recordings temp message this package is executing os commands in the setup py file location pytest seleniumbase setup py code os system rm f dist egg rm f dist tar gz rm f dist whl message this package is executing os commands in the setup py file location pytest seleniumbase setup py code os system rm rf build bdist rm rf build lib message this package is executing os commands in the setup py file location pytest seleniumbase setup py code os system python m pip install upgrade build message this package is executing os commands in the setup py file location pytest seleniumbase setup py code os system python m pip install upgrade pkginfo message this package is executing os commands in the setup py file location pytest seleniumbase setup py code os system python m pip install upgrade readme renderer message this package is executing os commands in the setup py file location pytest seleniumbase setup py code os system python m pip install upgrade jaraco classes message this package is executing os commands in the setup py file location pytest seleniumbase setup py code os system python m pip install upgrade more itertools message this package is executing os commands in the setup py file location pytest seleniumbase setup py code os system python m pip install upgrade zipp message this package is executing os commands in the setup py file location pytest seleniumbase setup py code os system python m pip install upgrade importlib metadata message this package is executing os commands in the setup py file location pytest seleniumbase setup py code os system python m pip install upgrade keyring requests toolbelt message this package is executing os commands in the setup py file location pytest seleniumbase setup py code os system python m build create new tar wheel message this package is executing os commands in the setup py file path tmp pytest seleniumbase
0
70,438
18,149,619,072
IssuesEvent
2021-09-26 03:27:24
tensorflow/tensorflow
https://api.github.com/repos/tensorflow/tensorflow
opened
(Apple Silicon aka M1) import tensorflow killed python in terminal
type:build/install
<em>Please make sure that this is a build/installation issue. As per our [GitHub Policy](https://github.com/tensorflow/tensorflow/blob/master/ISSUES.md), we only address code/doc bugs, performance issues, feature requests and build/installation issues on GitHub. tag:build_template</em> **System information** - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): MacOS 11.6 (Big Sur) - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: - TensorFlow installed from (source or binary): - TensorFlow version: 2.4, 2.5, 2.6 - Python version: 3.9.7 - Installed using virtualenv? pip? conda?: conda (Miniforge 3 ARM64), pip - Bazel version (if compiling from source): - GCC/Compiler version (if compiling from source): - CUDA/cuDNN version: - GPU model and memory: M1 **Describe the problem** Hi, there. I have a problem with importing tensorflow related modules (tensorflow, keras, etc.). Others e.g., pandas, numpy, pillow, etc. worked without issue. Obviously, I installed tensorflow supporting arm64 NOT Intel x86x64, and other modules such as PyTorch installed as ARM worked well without Rosseta. After executing 'import tensorflow' in the terminal, it instantaneously kills python. (zsh: killed python) I tried to change the python version to 3.8 and tensorflow version to 2.4 or 2.5, but results were the same. Reinstalling miniforge 3 ARM64 also did not work well. Actually, importing tensorflow worked very well about just a week ago, but suddenly it didn't work :( However, one strange thing is when I open the terminal with Rosetta, there is no issue for importing tensorflow and it uses GPU, too when I execute some toy example codes (MNIST). Thanks! **Provide the exact sequence of commands / steps that you executed before running into the problem** 1. tensorflow install command conda install -c apple tensorflow-deps conda install tensorflow pip instal ltensorflow-metal 2. import tensorflow in terminal (M1 native) Python 3.9.7 | packaged by conda-forge | (default, Sep 23 2021, 07:30:24) [Clang 11.1.0 ] on darwin Type "help", "copyright", "credits" or "license" for more information. >>> import tensorflow as tf zsh: killed python 3. import tensorflow in terminal with Rosetta Python 3.9.7 | packaged by conda-forge | (default, Sep 23 2021, 07:30:24) [Clang 11.1.0 ] on darwin Type "help", "copyright", "credits" or "license" for more information. >>> import tensorflow as tf Init Plugin Init Graph Optimizer Init Kernel >>> tf.test.is_gpu_available() WARNING:tensorflow:From <stdin>:1: is_gpu_available (from tensorflow.python.framework.test_util) is deprecated and will be removed in a future version. Instructions for updating: Use `tf.config.list_physical_devices('GPU')` instead. Metal device set to: Apple M1 systemMemory: 16.00 GB maxCacheSize: 5.33 GB 2021-09-26 12:25:10.098855: I tensorflow/core/common_runtime/pluggable_device/pluggable_device_factory.cc:305] Could not identify NUMA node of platform GPU ID 0, defaulting to 0. Your kernel may not have been built with NUMA support. 2021-09-26 12:25:10.099073: I tensorflow/core/common_runtime/pluggable_device/pluggable_device_factory.cc:271] Created TensorFlow device (/device:GPU:0 with 0 MB memory) -> physical PluggableDevice (device: 0, name: METAL, pci bus id: <undefined>) True **Any other info / logs** Include any logs or source code that would be helpful to diagnose the problem. If including tracebacks, please include the full traceback. Large logs and files should be attached. **(tmp) jh@JHs-M1-MacBookAir ~ % conda install -c apple tensorflow-deps** Collecting package metadata (current_repodata.json): done Solving environment: failed with initial frozen solve. Retrying with flexible solve. Solving environment: failed with repodata from current_repodata.json, will retry with next repodata source. Collecting package metadata (repodata.json): done Solving environment: done ## Package Plan ## environment location: /opt/homebrew/Caskroom/miniforge/base/envs/tmp added / updated specs: - tensorflow-deps The following NEW packages will be INSTALLED: absl-py conda-forge/noarch::absl-py-0.10.0-pyhd8ed1ab_1 aiohttp conda-forge/osx-arm64::aiohttp-3.7.4.post0-py39h5161555_0 astunparse conda-forge/noarch::astunparse-1.6.3-pyhd8ed1ab_0 async-timeout conda-forge/noarch::async-timeout-3.0.1-py_1000 attrs conda-forge/noarch::attrs-21.2.0-pyhd8ed1ab_0 blinker conda-forge/noarch::blinker-1.4-py_1 brotlipy conda-forge/osx-arm64::brotlipy-0.7.0-py39h5161555_1001 c-ares conda-forge/osx-arm64::c-ares-1.17.2-h3422bc3_0 ca-certificates conda-forge/osx-arm64::ca-certificates-2021.5.30-h4653dfc_0 cached-property conda-forge/noarch::cached-property-1.5.2-hd8ed1ab_1 cached_property conda-forge/noarch::cached_property-1.5.2-pyha770c72_1 cachetools conda-forge/noarch::cachetools-4.2.2-pyhd8ed1ab_0 certifi conda-forge/osx-arm64::certifi-2021.5.30-py39h2804cbe_0 cffi conda-forge/osx-arm64::cffi-1.14.6-py39h52b1de0_1 chardet conda-forge/osx-arm64::chardet-4.0.0-py39h2804cbe_1 charset-normalizer conda-forge/noarch::charset-normalizer-2.0.0-pyhd8ed1ab_0 click conda-forge/osx-arm64::click-8.0.1-py39h2804cbe_0 cryptography conda-forge/osx-arm64::cryptography-3.4.7-py39h73257c9_0 dataclasses conda-forge/noarch::dataclasses-0.8-pyhc8e2a94_3 flatbuffers conda-forge/osx-arm64::flatbuffers-2.0.0-hbdafb3b_0 gast conda-forge/noarch::gast-0.4.0-pyh9f0ad1d_0 google-auth conda-forge/noarch::google-auth-1.35.0-pyh6c4a22f_0 google-auth-oauth~ conda-forge/noarch::google-auth-oauthlib-0.4.6-pyhd8ed1ab_0 google-pasta conda-forge/noarch::google-pasta-0.2.0-pyh8c360ce_0 grpcio conda-forge/osx-arm64::grpcio-1.38.1-py39h9e1b6db_0 h5py conda-forge/osx-arm64::h5py-3.1.0-nompi_py39h99babb8_100 hdf5 conda-forge/osx-arm64::hdf5-1.10.6-nompi_h0fc092c_1114 idna conda-forge/noarch::idna-3.1-pyhd3deb0d_0 importlib-metadata conda-forge/osx-arm64::importlib-metadata-4.8.1-py39h2804cbe_0 keras conda-forge/noarch::keras-2.6.0-pyhd8ed1ab_0 keras-preprocessi~ conda-forge/noarch::keras-preprocessing-1.1.2-pyhd8ed1ab_0 krb5 conda-forge/osx-arm64::krb5-1.19.2-hd92b7a7_0 libblas conda-forge/osx-arm64::libblas-3.9.0-11_osxarm64_openblas libcblas conda-forge/osx-arm64::libcblas-3.9.0-11_osxarm64_openblas libclang conda-forge/osx-arm64::libclang-11.1.0-default_h0fdd720_1 libcurl conda-forge/osx-arm64::libcurl-7.79.1-h8fe1914_0 libcxx conda-forge/osx-arm64::libcxx-12.0.1-h168391b_0 libedit conda-forge/osx-arm64::libedit-3.1.20191231-hc8eb9b7_2 libev conda-forge/osx-arm64::libev-4.33-h642e427_1 libffi conda-forge/osx-arm64::libffi-3.4.2-hbdafb3b_4 libgfortran conda-forge/osx-arm64::libgfortran-5.0.0.dev0-11_0_1_hf114ba7_23 libgfortran5 conda-forge/osx-arm64::libgfortran5-11.0.1.dev0-hf114ba7_23 liblapack conda-forge/osx-arm64::liblapack-3.9.0-11_osxarm64_openblas libllvm11 conda-forge/osx-arm64::libllvm11-11.1.0-h93073aa_2 libnghttp2 conda-forge/osx-arm64::libnghttp2-1.43.0-hf3018f0_0 libopenblas conda-forge/osx-arm64::libopenblas-0.3.17-openmp_h5dd58f0_1 libprotobuf conda-forge/osx-arm64::libprotobuf-3.18.0-hccf11d3_0 libssh2 conda-forge/osx-arm64::libssh2-1.10.0-hb80f160_1 llvm-openmp conda-forge/osx-arm64::llvm-openmp-12.0.1-hf3c4609_1 markdown conda-forge/noarch::markdown-3.3.4-pyhd8ed1ab_0 multidict conda-forge/osx-arm64::multidict-5.1.0-py39h5161555_1 ncurses conda-forge/osx-arm64::ncurses-6.2-h9aa5885_4 numpy conda-forge/osx-arm64::numpy-1.19.5-py39h1f3b974_2 oauthlib conda-forge/noarch::oauthlib-3.1.1-pyhd8ed1ab_0 openssl conda-forge/osx-arm64::openssl-1.1.1l-h3422bc3_0 opt_einsum conda-forge/noarch::opt_einsum-3.3.0-pyhd8ed1ab_1 pip conda-forge/noarch::pip-21.2.4-pyhd8ed1ab_0 protobuf conda-forge/osx-arm64::protobuf-3.18.0-py39hfb83b0d_0 pyasn1 conda-forge/noarch::pyasn1-0.4.8-py_0 pyasn1-modules conda-forge/noarch::pyasn1-modules-0.2.7-py_0 pycparser conda-forge/noarch::pycparser-2.20-pyh9f0ad1d_2 pyjwt conda-forge/noarch::pyjwt-2.1.0-pyhd8ed1ab_0 pyopenssl conda-forge/noarch::pyopenssl-20.0.1-pyhd8ed1ab_0 pysocks conda-forge/osx-arm64::pysocks-1.7.1-py39h2804cbe_3 python conda-forge/osx-arm64::python-3.9.7-h54d631c_2_cpython python_abi conda-forge/osx-arm64::python_abi-3.9-2_cp39 pyu2f conda-forge/noarch::pyu2f-0.1.5-pyhd8ed1ab_0 readline conda-forge/osx-arm64::readline-8.1-hedafd6a_0 requests conda-forge/noarch::requests-2.26.0-pyhd8ed1ab_0 requests-oauthlib conda-forge/noarch::requests-oauthlib-1.3.0-pyh9f0ad1d_0 rsa conda-forge/noarch::rsa-4.7.2-pyh44b312d_0 scipy conda-forge/osx-arm64::scipy-1.7.0-py39h5060c3b_0 setuptools conda-forge/osx-arm64::setuptools-58.0.4-py39h2804cbe_2 six conda-forge/noarch::six-1.15.0-pyh9f0ad1d_0 sqlite conda-forge/osx-arm64::sqlite-3.36.0-h72a2b83_2 tensorboard conda-forge/noarch::tensorboard-2.6.0-pyhd8ed1ab_1 tensorboard-data-~ conda-forge/osx-arm64::tensorboard-data-server-0.6.0-py39hfb8cd70_0 tensorboard-plugi~ conda-forge/noarch::tensorboard-plugin-wit-1.8.0-pyh44b312d_0 tensorflow-deps apple/osx-arm64::tensorflow-deps-2.6.0-0 termcolor conda-forge/noarch::termcolor-1.1.0-py_2 tk conda-forge/osx-arm64::tk-8.6.11-he1e0b03_1 typing-extensions conda-forge/noarch::typing-extensions-3.7.4.3-0 typing_extensions conda-forge/noarch::typing_extensions-3.7.4.3-py_0 tzdata conda-forge/noarch::tzdata-2021a-he74cb21_1 urllib3 conda-forge/noarch::urllib3-1.26.7-pyhd8ed1ab_0 werkzeug conda-forge/noarch::werkzeug-2.0.1-pyhd8ed1ab_0 wheel conda-forge/noarch::wheel-0.35.1-pyh9f0ad1d_0 wrapt conda-forge/osx-arm64::wrapt-1.12.1-py39h5161555_3 xz conda-forge/osx-arm64::xz-5.2.5-h642e427_1 yarl conda-forge/osx-arm64::yarl-1.6.3-py39h5161555_2 zipp conda-forge/noarch::zipp-3.5.0-pyhd8ed1ab_0 zlib conda-forge/osx-arm64::zlib-1.2.11-h31e879b_1009 Proceed ([y]/n)? y Preparing transaction: done Verifying transaction: done Executing transaction: done **(tmp) jh@JHs-M1-MacBookAir ~ % conda install tensorflow** Collecting package metadata (current_repodata.json): done Solving environment: failed with initial frozen solve. Retrying with flexible solve. Solving environment: failed with repodata from current_repodata.json, will retry with next repodata source. Collecting package metadata (repodata.json): done Solving environment: done ## Package Plan ## environment location: /opt/homebrew/Caskroom/miniforge/base/envs/tmp added / updated specs: - tensorflow The following NEW packages will be INSTALLED: abseil-cpp conda-forge/osx-arm64::abseil-cpp-20210324.2-hbdafb3b_0 astor conda-forge/noarch::astor-0.8.1-pyh9f0ad1d_0 giflib conda-forge/osx-arm64::giflib-5.2.1-h27ca646_2 grpc-cpp conda-forge/osx-arm64::grpc-cpp-1.37.1-h538f867_3 icu conda-forge/osx-arm64::icu-68.1-h17758a7_0 jpeg conda-forge/osx-arm64::jpeg-9d-h27ca646_0 libpng conda-forge/osx-arm64::libpng-1.6.37-hf7e6567_2 python-flatbuffers conda-forge/noarch::python-flatbuffers-1.12-pyhd8ed1ab_1 re2 conda-forge/osx-arm64::re2-2021.08.01-hbdafb3b_0 snappy conda-forge/osx-arm64::snappy-1.1.8-hc88da5d_3 tensorflow conda-forge/osx-arm64::tensorflow-2.6.0-py39hdf13c20_0 tensorflow-base conda-forge/osx-arm64::tensorflow-base-2.6.0-py39h34a2d98_0 tensorflow-estima~ conda-forge/osx-arm64::tensorflow-estimator-2.6.0-py39h4ec10df_0 The following packages will be DOWNGRADED: grpcio 1.38.1-py39h9e1b6db_0 --> 1.37.1-py39h9e1b6db_0 libprotobuf 3.18.0-hccf11d3_0 --> 3.15.8-hccf11d3_1 protobuf 3.18.0-py39hfb83b0d_0 --> 3.15.8-py39hfb83b0d_0 Proceed ([y]/n)? y Preparing transaction: done Verifying transaction: done Executing transaction: done **(tmp) jh@JHs-M1-MacBookAir ~ % pip install tensorflow-metal** Collecting tensorflow-metal Using cached tensorflow_metal-0.1.2-cp39-cp39-macosx_11_0_arm64.whl (1.2 MB) Requirement already satisfied: wheel~=0.35 in /opt/homebrew/Caskroom/miniforge/base/envs/tmp/lib/python3.9/site-packages (from tensorflow-metal) (0.35.1) Requirement already satisfied: six~=1.15.0 in /opt/homebrew/Caskroom/miniforge/base/envs/tmp/lib/python3.9/site-packages (from tensorflow-metal) (1.15.0) Installing collected packages: tensorflow-metal Successfully installed tensorflow-metal-0.1.2
1.0
(Apple Silicon aka M1) import tensorflow killed python in terminal - <em>Please make sure that this is a build/installation issue. As per our [GitHub Policy](https://github.com/tensorflow/tensorflow/blob/master/ISSUES.md), we only address code/doc bugs, performance issues, feature requests and build/installation issues on GitHub. tag:build_template</em> **System information** - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): MacOS 11.6 (Big Sur) - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: - TensorFlow installed from (source or binary): - TensorFlow version: 2.4, 2.5, 2.6 - Python version: 3.9.7 - Installed using virtualenv? pip? conda?: conda (Miniforge 3 ARM64), pip - Bazel version (if compiling from source): - GCC/Compiler version (if compiling from source): - CUDA/cuDNN version: - GPU model and memory: M1 **Describe the problem** Hi, there. I have a problem with importing tensorflow related modules (tensorflow, keras, etc.). Others e.g., pandas, numpy, pillow, etc. worked without issue. Obviously, I installed tensorflow supporting arm64 NOT Intel x86x64, and other modules such as PyTorch installed as ARM worked well without Rosseta. After executing 'import tensorflow' in the terminal, it instantaneously kills python. (zsh: killed python) I tried to change the python version to 3.8 and tensorflow version to 2.4 or 2.5, but results were the same. Reinstalling miniforge 3 ARM64 also did not work well. Actually, importing tensorflow worked very well about just a week ago, but suddenly it didn't work :( However, one strange thing is when I open the terminal with Rosetta, there is no issue for importing tensorflow and it uses GPU, too when I execute some toy example codes (MNIST). Thanks! **Provide the exact sequence of commands / steps that you executed before running into the problem** 1. tensorflow install command conda install -c apple tensorflow-deps conda install tensorflow pip instal ltensorflow-metal 2. import tensorflow in terminal (M1 native) Python 3.9.7 | packaged by conda-forge | (default, Sep 23 2021, 07:30:24) [Clang 11.1.0 ] on darwin Type "help", "copyright", "credits" or "license" for more information. >>> import tensorflow as tf zsh: killed python 3. import tensorflow in terminal with Rosetta Python 3.9.7 | packaged by conda-forge | (default, Sep 23 2021, 07:30:24) [Clang 11.1.0 ] on darwin Type "help", "copyright", "credits" or "license" for more information. >>> import tensorflow as tf Init Plugin Init Graph Optimizer Init Kernel >>> tf.test.is_gpu_available() WARNING:tensorflow:From <stdin>:1: is_gpu_available (from tensorflow.python.framework.test_util) is deprecated and will be removed in a future version. Instructions for updating: Use `tf.config.list_physical_devices('GPU')` instead. Metal device set to: Apple M1 systemMemory: 16.00 GB maxCacheSize: 5.33 GB 2021-09-26 12:25:10.098855: I tensorflow/core/common_runtime/pluggable_device/pluggable_device_factory.cc:305] Could not identify NUMA node of platform GPU ID 0, defaulting to 0. Your kernel may not have been built with NUMA support. 2021-09-26 12:25:10.099073: I tensorflow/core/common_runtime/pluggable_device/pluggable_device_factory.cc:271] Created TensorFlow device (/device:GPU:0 with 0 MB memory) -> physical PluggableDevice (device: 0, name: METAL, pci bus id: <undefined>) True **Any other info / logs** Include any logs or source code that would be helpful to diagnose the problem. If including tracebacks, please include the full traceback. Large logs and files should be attached. **(tmp) jh@JHs-M1-MacBookAir ~ % conda install -c apple tensorflow-deps** Collecting package metadata (current_repodata.json): done Solving environment: failed with initial frozen solve. Retrying with flexible solve. Solving environment: failed with repodata from current_repodata.json, will retry with next repodata source. Collecting package metadata (repodata.json): done Solving environment: done ## Package Plan ## environment location: /opt/homebrew/Caskroom/miniforge/base/envs/tmp added / updated specs: - tensorflow-deps The following NEW packages will be INSTALLED: absl-py conda-forge/noarch::absl-py-0.10.0-pyhd8ed1ab_1 aiohttp conda-forge/osx-arm64::aiohttp-3.7.4.post0-py39h5161555_0 astunparse conda-forge/noarch::astunparse-1.6.3-pyhd8ed1ab_0 async-timeout conda-forge/noarch::async-timeout-3.0.1-py_1000 attrs conda-forge/noarch::attrs-21.2.0-pyhd8ed1ab_0 blinker conda-forge/noarch::blinker-1.4-py_1 brotlipy conda-forge/osx-arm64::brotlipy-0.7.0-py39h5161555_1001 c-ares conda-forge/osx-arm64::c-ares-1.17.2-h3422bc3_0 ca-certificates conda-forge/osx-arm64::ca-certificates-2021.5.30-h4653dfc_0 cached-property conda-forge/noarch::cached-property-1.5.2-hd8ed1ab_1 cached_property conda-forge/noarch::cached_property-1.5.2-pyha770c72_1 cachetools conda-forge/noarch::cachetools-4.2.2-pyhd8ed1ab_0 certifi conda-forge/osx-arm64::certifi-2021.5.30-py39h2804cbe_0 cffi conda-forge/osx-arm64::cffi-1.14.6-py39h52b1de0_1 chardet conda-forge/osx-arm64::chardet-4.0.0-py39h2804cbe_1 charset-normalizer conda-forge/noarch::charset-normalizer-2.0.0-pyhd8ed1ab_0 click conda-forge/osx-arm64::click-8.0.1-py39h2804cbe_0 cryptography conda-forge/osx-arm64::cryptography-3.4.7-py39h73257c9_0 dataclasses conda-forge/noarch::dataclasses-0.8-pyhc8e2a94_3 flatbuffers conda-forge/osx-arm64::flatbuffers-2.0.0-hbdafb3b_0 gast conda-forge/noarch::gast-0.4.0-pyh9f0ad1d_0 google-auth conda-forge/noarch::google-auth-1.35.0-pyh6c4a22f_0 google-auth-oauth~ conda-forge/noarch::google-auth-oauthlib-0.4.6-pyhd8ed1ab_0 google-pasta conda-forge/noarch::google-pasta-0.2.0-pyh8c360ce_0 grpcio conda-forge/osx-arm64::grpcio-1.38.1-py39h9e1b6db_0 h5py conda-forge/osx-arm64::h5py-3.1.0-nompi_py39h99babb8_100 hdf5 conda-forge/osx-arm64::hdf5-1.10.6-nompi_h0fc092c_1114 idna conda-forge/noarch::idna-3.1-pyhd3deb0d_0 importlib-metadata conda-forge/osx-arm64::importlib-metadata-4.8.1-py39h2804cbe_0 keras conda-forge/noarch::keras-2.6.0-pyhd8ed1ab_0 keras-preprocessi~ conda-forge/noarch::keras-preprocessing-1.1.2-pyhd8ed1ab_0 krb5 conda-forge/osx-arm64::krb5-1.19.2-hd92b7a7_0 libblas conda-forge/osx-arm64::libblas-3.9.0-11_osxarm64_openblas libcblas conda-forge/osx-arm64::libcblas-3.9.0-11_osxarm64_openblas libclang conda-forge/osx-arm64::libclang-11.1.0-default_h0fdd720_1 libcurl conda-forge/osx-arm64::libcurl-7.79.1-h8fe1914_0 libcxx conda-forge/osx-arm64::libcxx-12.0.1-h168391b_0 libedit conda-forge/osx-arm64::libedit-3.1.20191231-hc8eb9b7_2 libev conda-forge/osx-arm64::libev-4.33-h642e427_1 libffi conda-forge/osx-arm64::libffi-3.4.2-hbdafb3b_4 libgfortran conda-forge/osx-arm64::libgfortran-5.0.0.dev0-11_0_1_hf114ba7_23 libgfortran5 conda-forge/osx-arm64::libgfortran5-11.0.1.dev0-hf114ba7_23 liblapack conda-forge/osx-arm64::liblapack-3.9.0-11_osxarm64_openblas libllvm11 conda-forge/osx-arm64::libllvm11-11.1.0-h93073aa_2 libnghttp2 conda-forge/osx-arm64::libnghttp2-1.43.0-hf3018f0_0 libopenblas conda-forge/osx-arm64::libopenblas-0.3.17-openmp_h5dd58f0_1 libprotobuf conda-forge/osx-arm64::libprotobuf-3.18.0-hccf11d3_0 libssh2 conda-forge/osx-arm64::libssh2-1.10.0-hb80f160_1 llvm-openmp conda-forge/osx-arm64::llvm-openmp-12.0.1-hf3c4609_1 markdown conda-forge/noarch::markdown-3.3.4-pyhd8ed1ab_0 multidict conda-forge/osx-arm64::multidict-5.1.0-py39h5161555_1 ncurses conda-forge/osx-arm64::ncurses-6.2-h9aa5885_4 numpy conda-forge/osx-arm64::numpy-1.19.5-py39h1f3b974_2 oauthlib conda-forge/noarch::oauthlib-3.1.1-pyhd8ed1ab_0 openssl conda-forge/osx-arm64::openssl-1.1.1l-h3422bc3_0 opt_einsum conda-forge/noarch::opt_einsum-3.3.0-pyhd8ed1ab_1 pip conda-forge/noarch::pip-21.2.4-pyhd8ed1ab_0 protobuf conda-forge/osx-arm64::protobuf-3.18.0-py39hfb83b0d_0 pyasn1 conda-forge/noarch::pyasn1-0.4.8-py_0 pyasn1-modules conda-forge/noarch::pyasn1-modules-0.2.7-py_0 pycparser conda-forge/noarch::pycparser-2.20-pyh9f0ad1d_2 pyjwt conda-forge/noarch::pyjwt-2.1.0-pyhd8ed1ab_0 pyopenssl conda-forge/noarch::pyopenssl-20.0.1-pyhd8ed1ab_0 pysocks conda-forge/osx-arm64::pysocks-1.7.1-py39h2804cbe_3 python conda-forge/osx-arm64::python-3.9.7-h54d631c_2_cpython python_abi conda-forge/osx-arm64::python_abi-3.9-2_cp39 pyu2f conda-forge/noarch::pyu2f-0.1.5-pyhd8ed1ab_0 readline conda-forge/osx-arm64::readline-8.1-hedafd6a_0 requests conda-forge/noarch::requests-2.26.0-pyhd8ed1ab_0 requests-oauthlib conda-forge/noarch::requests-oauthlib-1.3.0-pyh9f0ad1d_0 rsa conda-forge/noarch::rsa-4.7.2-pyh44b312d_0 scipy conda-forge/osx-arm64::scipy-1.7.0-py39h5060c3b_0 setuptools conda-forge/osx-arm64::setuptools-58.0.4-py39h2804cbe_2 six conda-forge/noarch::six-1.15.0-pyh9f0ad1d_0 sqlite conda-forge/osx-arm64::sqlite-3.36.0-h72a2b83_2 tensorboard conda-forge/noarch::tensorboard-2.6.0-pyhd8ed1ab_1 tensorboard-data-~ conda-forge/osx-arm64::tensorboard-data-server-0.6.0-py39hfb8cd70_0 tensorboard-plugi~ conda-forge/noarch::tensorboard-plugin-wit-1.8.0-pyh44b312d_0 tensorflow-deps apple/osx-arm64::tensorflow-deps-2.6.0-0 termcolor conda-forge/noarch::termcolor-1.1.0-py_2 tk conda-forge/osx-arm64::tk-8.6.11-he1e0b03_1 typing-extensions conda-forge/noarch::typing-extensions-3.7.4.3-0 typing_extensions conda-forge/noarch::typing_extensions-3.7.4.3-py_0 tzdata conda-forge/noarch::tzdata-2021a-he74cb21_1 urllib3 conda-forge/noarch::urllib3-1.26.7-pyhd8ed1ab_0 werkzeug conda-forge/noarch::werkzeug-2.0.1-pyhd8ed1ab_0 wheel conda-forge/noarch::wheel-0.35.1-pyh9f0ad1d_0 wrapt conda-forge/osx-arm64::wrapt-1.12.1-py39h5161555_3 xz conda-forge/osx-arm64::xz-5.2.5-h642e427_1 yarl conda-forge/osx-arm64::yarl-1.6.3-py39h5161555_2 zipp conda-forge/noarch::zipp-3.5.0-pyhd8ed1ab_0 zlib conda-forge/osx-arm64::zlib-1.2.11-h31e879b_1009 Proceed ([y]/n)? y Preparing transaction: done Verifying transaction: done Executing transaction: done **(tmp) jh@JHs-M1-MacBookAir ~ % conda install tensorflow** Collecting package metadata (current_repodata.json): done Solving environment: failed with initial frozen solve. Retrying with flexible solve. Solving environment: failed with repodata from current_repodata.json, will retry with next repodata source. Collecting package metadata (repodata.json): done Solving environment: done ## Package Plan ## environment location: /opt/homebrew/Caskroom/miniforge/base/envs/tmp added / updated specs: - tensorflow The following NEW packages will be INSTALLED: abseil-cpp conda-forge/osx-arm64::abseil-cpp-20210324.2-hbdafb3b_0 astor conda-forge/noarch::astor-0.8.1-pyh9f0ad1d_0 giflib conda-forge/osx-arm64::giflib-5.2.1-h27ca646_2 grpc-cpp conda-forge/osx-arm64::grpc-cpp-1.37.1-h538f867_3 icu conda-forge/osx-arm64::icu-68.1-h17758a7_0 jpeg conda-forge/osx-arm64::jpeg-9d-h27ca646_0 libpng conda-forge/osx-arm64::libpng-1.6.37-hf7e6567_2 python-flatbuffers conda-forge/noarch::python-flatbuffers-1.12-pyhd8ed1ab_1 re2 conda-forge/osx-arm64::re2-2021.08.01-hbdafb3b_0 snappy conda-forge/osx-arm64::snappy-1.1.8-hc88da5d_3 tensorflow conda-forge/osx-arm64::tensorflow-2.6.0-py39hdf13c20_0 tensorflow-base conda-forge/osx-arm64::tensorflow-base-2.6.0-py39h34a2d98_0 tensorflow-estima~ conda-forge/osx-arm64::tensorflow-estimator-2.6.0-py39h4ec10df_0 The following packages will be DOWNGRADED: grpcio 1.38.1-py39h9e1b6db_0 --> 1.37.1-py39h9e1b6db_0 libprotobuf 3.18.0-hccf11d3_0 --> 3.15.8-hccf11d3_1 protobuf 3.18.0-py39hfb83b0d_0 --> 3.15.8-py39hfb83b0d_0 Proceed ([y]/n)? y Preparing transaction: done Verifying transaction: done Executing transaction: done **(tmp) jh@JHs-M1-MacBookAir ~ % pip install tensorflow-metal** Collecting tensorflow-metal Using cached tensorflow_metal-0.1.2-cp39-cp39-macosx_11_0_arm64.whl (1.2 MB) Requirement already satisfied: wheel~=0.35 in /opt/homebrew/Caskroom/miniforge/base/envs/tmp/lib/python3.9/site-packages (from tensorflow-metal) (0.35.1) Requirement already satisfied: six~=1.15.0 in /opt/homebrew/Caskroom/miniforge/base/envs/tmp/lib/python3.9/site-packages (from tensorflow-metal) (1.15.0) Installing collected packages: tensorflow-metal Successfully installed tensorflow-metal-0.1.2
non_priority
apple silicon aka import tensorflow killed python in terminal please make sure that this is a build installation issue as per our we only address code doc bugs performance issues feature requests and build installation issues on github tag build template system information os platform and distribution e g linux ubuntu macos big sur mobile device e g iphone pixel samsung galaxy if the issue happens on mobile device tensorflow installed from source or binary tensorflow version python version installed using virtualenv pip conda conda miniforge pip bazel version if compiling from source gcc compiler version if compiling from source cuda cudnn version gpu model and memory describe the problem hi there i have a problem with importing tensorflow related modules tensorflow keras etc others e g pandas numpy pillow etc worked without issue obviously i installed tensorflow supporting not intel and other modules such as pytorch installed as arm worked well without rosseta after executing import tensorflow in the terminal it instantaneously kills python zsh killed python i tried to change the python version to and tensorflow version to or but results were the same reinstalling miniforge also did not work well actually importing tensorflow worked very well about just a week ago but suddenly it didn t work however one strange thing is when i open the terminal with rosetta there is no issue for importing tensorflow and it uses gpu too when i execute some toy example codes mnist thanks provide the exact sequence of commands steps that you executed before running into the problem tensorflow install command conda install c apple tensorflow deps conda install tensorflow pip instal ltensorflow metal import tensorflow in terminal native python packaged by conda forge default sep on darwin type help copyright credits or license for more information import tensorflow as tf zsh killed python import tensorflow in terminal with rosetta python packaged by conda forge default sep on darwin type help copyright credits or license for more information import tensorflow as tf init plugin init graph optimizer init kernel tf test is gpu available warning tensorflow from is gpu available from tensorflow python framework test util is deprecated and will be removed in a future version instructions for updating use tf config list physical devices gpu instead metal device set to apple systemmemory gb maxcachesize gb i tensorflow core common runtime pluggable device pluggable device factory cc could not identify numa node of platform gpu id defaulting to your kernel may not have been built with numa support i tensorflow core common runtime pluggable device pluggable device factory cc created tensorflow device device gpu with mb memory physical pluggabledevice device name metal pci bus id true any other info logs include any logs or source code that would be helpful to diagnose the problem if including tracebacks please include the full traceback large logs and files should be attached tmp jh jhs macbookair conda install c apple tensorflow deps collecting package metadata current repodata json done solving environment failed with initial frozen solve retrying with flexible solve solving environment failed with repodata from current repodata json will retry with next repodata source collecting package metadata repodata json done solving environment done package plan environment location opt homebrew caskroom miniforge base envs tmp added updated specs tensorflow deps the following new packages will be installed absl py conda forge noarch absl py aiohttp conda forge osx aiohttp astunparse conda forge noarch astunparse async timeout conda forge noarch async timeout py attrs conda forge noarch attrs blinker conda forge noarch blinker py brotlipy conda forge osx brotlipy c ares conda forge osx c ares ca certificates conda forge osx ca certificates cached property conda forge noarch cached property cached property conda forge noarch cached property cachetools conda forge noarch cachetools certifi conda forge osx certifi cffi conda forge osx cffi chardet conda forge osx chardet charset normalizer conda forge noarch charset normalizer click conda forge osx click cryptography conda forge osx cryptography dataclasses conda forge noarch dataclasses flatbuffers conda forge osx flatbuffers gast conda forge noarch gast google auth conda forge noarch google auth google auth oauth conda forge noarch google auth oauthlib google pasta conda forge noarch google pasta grpcio conda forge osx grpcio conda forge osx nompi conda forge osx nompi idna conda forge noarch idna importlib metadata conda forge osx importlib metadata keras conda forge noarch keras keras preprocessi conda forge noarch keras preprocessing conda forge osx libblas conda forge osx libblas openblas libcblas conda forge osx libcblas openblas libclang conda forge osx libclang default libcurl conda forge osx libcurl libcxx conda forge osx libcxx libedit conda forge osx libedit libev conda forge osx libev libffi conda forge osx libffi libgfortran conda forge osx libgfortran conda forge osx liblapack conda forge osx liblapack openblas conda forge osx conda forge osx libopenblas conda forge osx libopenblas openmp libprotobuf conda forge osx libprotobuf conda forge osx llvm openmp conda forge osx llvm openmp markdown conda forge noarch markdown multidict conda forge osx multidict ncurses conda forge osx ncurses numpy conda forge osx numpy oauthlib conda forge noarch oauthlib openssl conda forge osx openssl opt einsum conda forge noarch opt einsum pip conda forge noarch pip protobuf conda forge osx protobuf conda forge noarch py modules conda forge noarch modules py pycparser conda forge noarch pycparser pyjwt conda forge noarch pyjwt pyopenssl conda forge noarch pyopenssl pysocks conda forge osx pysocks python conda forge osx python cpython python abi conda forge osx python abi conda forge noarch readline conda forge osx readline requests conda forge noarch requests requests oauthlib conda forge noarch requests oauthlib rsa conda forge noarch rsa scipy conda forge osx scipy setuptools conda forge osx setuptools six conda forge noarch six sqlite conda forge osx sqlite tensorboard conda forge noarch tensorboard tensorboard data conda forge osx tensorboard data server tensorboard plugi conda forge noarch tensorboard plugin wit tensorflow deps apple osx tensorflow deps termcolor conda forge noarch termcolor py tk conda forge osx tk typing extensions conda forge noarch typing extensions typing extensions conda forge noarch typing extensions py tzdata conda forge noarch tzdata conda forge noarch werkzeug conda forge noarch werkzeug wheel conda forge noarch wheel wrapt conda forge osx wrapt xz conda forge osx xz yarl conda forge osx yarl zipp conda forge noarch zipp zlib conda forge osx zlib proceed n y preparing transaction done verifying transaction done executing transaction done tmp jh jhs macbookair conda install tensorflow collecting package metadata current repodata json done solving environment failed with initial frozen solve retrying with flexible solve solving environment failed with repodata from current repodata json will retry with next repodata source collecting package metadata repodata json done solving environment done package plan environment location opt homebrew caskroom miniforge base envs tmp added updated specs tensorflow the following new packages will be installed abseil cpp conda forge osx abseil cpp astor conda forge noarch astor giflib conda forge osx giflib grpc cpp conda forge osx grpc cpp icu conda forge osx icu jpeg conda forge osx jpeg libpng conda forge osx libpng python flatbuffers conda forge noarch python flatbuffers conda forge osx snappy conda forge osx snappy tensorflow conda forge osx tensorflow tensorflow base conda forge osx tensorflow base tensorflow estima conda forge osx tensorflow estimator the following packages will be downgraded grpcio libprotobuf protobuf proceed n y preparing transaction done verifying transaction done executing transaction done tmp jh jhs macbookair pip install tensorflow metal collecting tensorflow metal using cached tensorflow metal macosx whl mb requirement already satisfied wheel in opt homebrew caskroom miniforge base envs tmp lib site packages from tensorflow metal requirement already satisfied six in opt homebrew caskroom miniforge base envs tmp lib site packages from tensorflow metal installing collected packages tensorflow metal successfully installed tensorflow metal
0
20,010
14,917,399,004
IssuesEvent
2021-01-22 19:48:09
pulibrary/pulfalight
https://api.github.com/repos/pulibrary/pulfalight
closed
Request Cart should scale for Mobile
enhancement responsive usability
Right now it's too small to use, and the button doesn't appear.
True
Request Cart should scale for Mobile - Right now it's too small to use, and the button doesn't appear.
non_priority
request cart should scale for mobile right now it s too small to use and the button doesn t appear
0
243,351
26,278,067,898
IssuesEvent
2023-01-07 01:53:43
rvvergara/exercism-challenges
https://api.github.com/repos/rvvergara/exercism-challenges
opened
CVE-2022-0144 (High) detected in shelljs-0.7.8.tgz
security vulnerability
## CVE-2022-0144 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>shelljs-0.7.8.tgz</b></p></summary> <p>Portable Unix shell commands for Node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/shelljs/-/shelljs-0.7.8.tgz">https://registry.npmjs.org/shelljs/-/shelljs-0.7.8.tgz</a></p> <p>Path to dependency file: /javascript/rna-transcription/package.json</p> <p>Path to vulnerable library: /javascript/leap/node_modules/shelljs/package.json,/javascript/leap/node_modules/shelljs/package.json,/javascript/leap/node_modules/shelljs/package.json,/javascript/leap/node_modules/shelljs/package.json,/javascript/leap/node_modules/shelljs/package.json,/javascript/leap/node_modules/shelljs/package.json</p> <p> Dependency Hierarchy: - eslint-3.19.0.tgz (Root Library) - :x: **shelljs-0.7.8.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/rvvergara/exercism-challenges/commit/8faecfdc96dc661341f9adb704b862ce65dd5e99">8faecfdc96dc661341f9adb704b862ce65dd5e99</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> shelljs is vulnerable to Improper Privilege Management <p>Publish Date: 2022-01-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-0144>CVE-2022-0144</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-01-11</p> <p>Fix Resolution (shelljs): 0.8.5</p> <p>Direct dependency fix Resolution (eslint): 4.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-0144 (High) detected in shelljs-0.7.8.tgz - ## CVE-2022-0144 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>shelljs-0.7.8.tgz</b></p></summary> <p>Portable Unix shell commands for Node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/shelljs/-/shelljs-0.7.8.tgz">https://registry.npmjs.org/shelljs/-/shelljs-0.7.8.tgz</a></p> <p>Path to dependency file: /javascript/rna-transcription/package.json</p> <p>Path to vulnerable library: /javascript/leap/node_modules/shelljs/package.json,/javascript/leap/node_modules/shelljs/package.json,/javascript/leap/node_modules/shelljs/package.json,/javascript/leap/node_modules/shelljs/package.json,/javascript/leap/node_modules/shelljs/package.json,/javascript/leap/node_modules/shelljs/package.json</p> <p> Dependency Hierarchy: - eslint-3.19.0.tgz (Root Library) - :x: **shelljs-0.7.8.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/rvvergara/exercism-challenges/commit/8faecfdc96dc661341f9adb704b862ce65dd5e99">8faecfdc96dc661341f9adb704b862ce65dd5e99</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> shelljs is vulnerable to Improper Privilege Management <p>Publish Date: 2022-01-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-0144>CVE-2022-0144</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-01-11</p> <p>Fix Resolution (shelljs): 0.8.5</p> <p>Direct dependency fix Resolution (eslint): 4.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in shelljs tgz cve high severity vulnerability vulnerable library shelljs tgz portable unix shell commands for node js library home page a href path to dependency file javascript rna transcription package json path to vulnerable library javascript leap node modules shelljs package json javascript leap node modules shelljs package json javascript leap node modules shelljs package json javascript leap node modules shelljs package json javascript leap node modules shelljs package json javascript leap node modules shelljs package json dependency hierarchy eslint tgz root library x shelljs tgz vulnerable library found in head commit a href found in base branch master vulnerability details shelljs is vulnerable to improper privilege management publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution shelljs direct dependency fix resolution eslint step up your open source security game with mend
0
56,447
23,783,658,396
IssuesEvent
2022-09-02 08:04:12
Azure/azure-sdk-for-go
https://api.github.com/repos/Azure/azure-sdk-for-go
closed
[azservicebus] Durable subscription with multiple consumers not working
question Service Bus customer-reported needs-team-attention needs-author-feedback no-recent-activity
### Bug Report Trying to work with durable subscriptions, but the subscription is not providing all messages, observing a severe message loss. (FYI there are no filters applied to this subscription) <!-- Thank you for opening a bug report. For faster processing, please include: --> - SDK version - github.com/Azure/azure-sdk-for-go/sdk/messaging/azservicebus v1.0.1 - output of `go version` - ```go version go1.18.2 darwin/amd64``` <!-- and please describe: --> ## What happened? Not all messages were received by consumers There are 2 containers of the same component that consume messages from the specific topic using the same subscription name. ### Issue 1 Sometimes only 1 component receives some message. Other component doesn't receive any message. ### Issue 2 Observed the following behavior, 1. Send a message(Message A) to the topic 2. No consumer receives any message 3. Send a message(Message B) to the same topic 4. A consumer receives message A now. But haven't received massage B ### Issue 3 Consumers receive only "some" messages. Other messages were lost forever. ### Issue 4 1. Start consumer_A 2. Send a message(Message_A) to the topic 3. Consumer_A received message_A 4. Start consumer_B 6. Send multiple messages from time to time 7. Consumer_A not receiving any messages now ## What did you expect or want to happen? All messages were to be received by consumers. If one consumer failed to [complete](https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/sdk/messaging/azservicebus#Receiver.CompleteMessage) the message, another consumer should receive it and complete it. ## How can we reproduce it? - Create a durable subscription for a topic - Create and run multiple consumers with the above subscription. - Send and receive messages on this topic. ``` receiver, _ = client.NewReceiverForSubscription(topicName, subscriptionName, nil) messages, err := receiver.ReceiveMessages(ctx, 10, nil) ``` ## Anything we should know about your environment. <!-- Thanks! -->
1.0
[azservicebus] Durable subscription with multiple consumers not working - ### Bug Report Trying to work with durable subscriptions, but the subscription is not providing all messages, observing a severe message loss. (FYI there are no filters applied to this subscription) <!-- Thank you for opening a bug report. For faster processing, please include: --> - SDK version - github.com/Azure/azure-sdk-for-go/sdk/messaging/azservicebus v1.0.1 - output of `go version` - ```go version go1.18.2 darwin/amd64``` <!-- and please describe: --> ## What happened? Not all messages were received by consumers There are 2 containers of the same component that consume messages from the specific topic using the same subscription name. ### Issue 1 Sometimes only 1 component receives some message. Other component doesn't receive any message. ### Issue 2 Observed the following behavior, 1. Send a message(Message A) to the topic 2. No consumer receives any message 3. Send a message(Message B) to the same topic 4. A consumer receives message A now. But haven't received massage B ### Issue 3 Consumers receive only "some" messages. Other messages were lost forever. ### Issue 4 1. Start consumer_A 2. Send a message(Message_A) to the topic 3. Consumer_A received message_A 4. Start consumer_B 6. Send multiple messages from time to time 7. Consumer_A not receiving any messages now ## What did you expect or want to happen? All messages were to be received by consumers. If one consumer failed to [complete](https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/sdk/messaging/azservicebus#Receiver.CompleteMessage) the message, another consumer should receive it and complete it. ## How can we reproduce it? - Create a durable subscription for a topic - Create and run multiple consumers with the above subscription. - Send and receive messages on this topic. ``` receiver, _ = client.NewReceiverForSubscription(topicName, subscriptionName, nil) messages, err := receiver.ReceiveMessages(ctx, 10, nil) ``` ## Anything we should know about your environment. <!-- Thanks! -->
non_priority
durable subscription with multiple consumers not working bug report trying to work with durable subscriptions but the subscription is not providing all messages observing a severe message loss fyi there are no filters applied to this subscription thank you for opening a bug report for faster processing please include sdk version github com azure azure sdk for go sdk messaging azservicebus output of go version go version darwin and please describe what happened not all messages were received by consumers there are containers of the same component that consume messages from the specific topic using the same subscription name issue sometimes only component receives some message other component doesn t receive any message issue observed the following behavior send a message message a to the topic no consumer receives any message send a message message b to the same topic a consumer receives message a now but haven t received massage b issue consumers receive only some messages other messages were lost forever issue start consumer a send a message message a to the topic consumer a received message a start consumer b send multiple messages from time to time consumer a not receiving any messages now what did you expect or want to happen all messages were to be received by consumers if one consumer failed to the message another consumer should receive it and complete it how can we reproduce it create a durable subscription for a topic create and run multiple consumers with the above subscription send and receive messages on this topic receiver client newreceiverforsubscription topicname subscriptionname nil messages err receiver receivemessages ctx nil anything we should know about your environment thanks
0
13,186
15,531,771,696
IssuesEvent
2021-03-14 01:32:10
blay09/CookingForBlockheads
https://api.github.com/repos/blay09/CookingForBlockheads
closed
Milk Jar question
compatibility fixed in next version
Is it possible to allow milk jars to be filled by a refined storage export bus? No point in making cows in a jar when you have hundreds of thousands of buckets of milk in storage.
True
Milk Jar question - Is it possible to allow milk jars to be filled by a refined storage export bus? No point in making cows in a jar when you have hundreds of thousands of buckets of milk in storage.
non_priority
milk jar question is it possible to allow milk jars to be filled by a refined storage export bus no point in making cows in a jar when you have hundreds of thousands of buckets of milk in storage
0
5,069
6,994,257,627
IssuesEvent
2017-12-15 14:45:09
dis-co/disco
https://api.github.com/repos/dis-co/disco
opened
confusing --bind option and machine settings
enhancement Service
Currently, the `disco.exe` command line options require using `--bind` on first start to determine the interface used. Subsequent invocations of `disco.exe start` then take the values from the machine configuration file. This is confusing for newer users and error prone, since its not clear to the user if the `--bind` flag supercedes the settings in `machinecfg.yaml` or vice versa.
1.0
confusing --bind option and machine settings - Currently, the `disco.exe` command line options require using `--bind` on first start to determine the interface used. Subsequent invocations of `disco.exe start` then take the values from the machine configuration file. This is confusing for newer users and error prone, since its not clear to the user if the `--bind` flag supercedes the settings in `machinecfg.yaml` or vice versa.
non_priority
confusing bind option and machine settings currently the disco exe command line options require using bind on first start to determine the interface used subsequent invocations of disco exe start then take the values from the machine configuration file this is confusing for newer users and error prone since its not clear to the user if the bind flag supercedes the settings in machinecfg yaml or vice versa
0
5,963
21,770,577,482
IssuesEvent
2022-05-13 08:40:37
pingcap/tidb
https://api.github.com/repos/pingcap/tidb
closed
join get the incorrect result
type/bug sig/planner severity/critical found/automation
## Bug Report Please answer these questions before submitting your issue. Thanks! ### 1. Minimal reproduce step (Required) ```sql CREATE TABLE t0 (a int, b int, c int); CREATE TABLE t1 (a int, b int, c int); CREATE TABLE t2 (a int, b int, c int); CREATE TABLE t3 (a int, b int, c int); CREATE TABLE t4 (a int, b int, c int); CREATE TABLE t5 (a int, b int, c int); CREATE TABLE t6 (a int, b int, c int); CREATE TABLE t7 (a int, b int, c int); CREATE TABLE t8 (a int, b int, c int); CREATE TABLE t9 (a int, b int, c int); INSERT INTO t0 VALUES (1,1,0), (1,2,0), (2,2,0); INSERT INTO t1 VALUES (1,3,0), (2,2,0), (3,2,0); INSERT INTO t2 VALUES (3,3,0), (4,2,0), (5,3,0); INSERT INTO t3 VALUES (1,2,0), (2,2,0); INSERT INTO t4 VALUES (3,2,0), (4,2,0); INSERT INTO t5 VALUES (3,1,0), (2,2,0), (3,3,0); INSERT INTO t6 VALUES (3,2,0), (6,2,0), (6,1,0); INSERT INTO t7 VALUES (1,1,0), (2,2,0); INSERT INTO t8 VALUES (0,2,0), (1,2,0); INSERT INTO t9 VALUES (1,1,0), (1,2,0), (3,3,0); SELECT t2.a,t2.b,t3.a,t3.b,t4.a,t4.b FROM (t3,t4) LEFT JOIN (t1,t2) ON t3.a=1 AND t3.b=t2.b AND t2.b=t4.b order by 1, 2, 3, 4, 5; explain SELECT t2.a,t2.b,t3.a,t3.b,t4.a,t4.b FROM (t3,t4) LEFT JOIN (t1,t2) ON t3.a=1 AND t3.b=t2.b AND t2.b=t4.b order by 1, 2, 3, 4, 5; ``` <!-- a step by step guide for reproducing the bug. --> ### 2. What did you expect to see? (Required) ```sql MySQL root@127.0.0.1:test> SELECT t2.a,t2.b,t3.a,t3.b,t4.a,t4.b -> FROM (t3,t4) -> LEFT JOIN -> (t1,t2) -> ON t3.a=1 AND t3.b=t2.b AND t2.b=t4.b order by 1, 2, 3, 4, 5; +--------+--------+---+---+---+---+ | a | b | a | b | a | b | +--------+--------+---+---+---+---+ | <null> | <null> | 2 | 2 | 3 | 2 | | <null> | <null> | 2 | 2 | 4 | 2 | | 4 | 2 | 1 | 2 | 3 | 2 | | 4 | 2 | 1 | 2 | 3 | 2 | | 4 | 2 | 1 | 2 | 3 | 2 | | 4 | 2 | 1 | 2 | 4 | 2 | | 4 | 2 | 1 | 2 | 4 | 2 | | 4 | 2 | 1 | 2 | 4 | 2 | +--------+--------+---+---+---+---+ MySQL root@127.0.0.1:test> explain SELECT t2.a,t2.b,t3.a,t3.b,t4.a,t4.b -> FROM (t3,t4) -> LEFT JOIN -> (t1,t2) -> ON t3.a=1 AND t3.b=t2.b AND t2.b=t4.b order by 1, 2, 3, 4, 5; +-------------------------------+---------+-----------+---------------+----------------------------------------------------------------------------------------------------------+ | id | estRows | task | access object | operator info | +-------------------------------+---------+-----------+---------------+----------------------------------------------------------------------------------------------------------+ | Sort_13 | 15.00 | root | | test.t2.a, test.t2.b, test.t3.a, test.t3.b, test.t4.a | | └─Projection_15 | 15.00 | root | | test.t2.a, test.t2.b, test.t3.a, test.t3.b, test.t4.a, test.t4.b | | └─HashJoin_17 | 15.00 | root | | left outer join, equal:[eq(test.t3.b, test.t2.b) eq(test.t4.b, test.t2.b)], left cond:[eq(test.t3.a, 1)] | | ├─HashJoin_18(Build) | 4.00 | root | | CARTESIAN inner join | | │ ├─TableReader_23(Build) | 2.00 | root | | data:TableFullScan_22 | | │ │ └─TableFullScan_22 | 2.00 | cop[tikv] | table:t4 | keep order:false, stats:pseudo | | │ └─TableReader_21(Probe) | 2.00 | root | | data:TableFullScan_20 | | │ └─TableFullScan_20 | 2.00 | cop[tikv] | table:t3 | keep order:false, stats:pseudo | | └─HashJoin_26(Probe) | 8.99 | root | | CARTESIAN inner join | | ├─TableReader_29(Build) | 3.00 | root | | data:Selection_28 | | │ └─Selection_28 | 3.00 | cop[tikv] | | not(isnull(test.t2.b)) | | │ └─TableFullScan_27 | 3.00 | cop[tikv] | table:t2 | keep order:false, stats:pseudo | | └─TableReader_31(Probe) | 3.00 | root | | data:TableFullScan_30 | | └─TableFullScan_30 | 3.00 | cop[tikv] | table:t1 | keep order:false, stats:pseudo | +-------------------------------+---------+-----------+---------------+----------------------------------------------------------------------------------------------------------+ ``` ### 3. What did you see instead (Required) ```sql MySQL root@127.0.0.1:test> SELECT t2.a,t2.b,t3.a,t3.b,t4.a,t4.b -> FROM (t3,t4) -> LEFT JOIN -> (t1,t2) -> ON t3.a=1 AND t3.b=t2.b AND t2.b=t4.b order by 1, 2, 3, 4, 5; +---+---+---+---+---+---+ | a | b | a | b | a | b | +---+---+---+---+---+---+ | 4 | 2 | 1 | 2 | 3 | 2 | | 4 | 2 | 1 | 2 | 3 | 2 | | 4 | 2 | 1 | 2 | 3 | 2 | | 4 | 2 | 1 | 2 | 4 | 2 | | 4 | 2 | 1 | 2 | 4 | 2 | | 4 | 2 | 1 | 2 | 4 | 2 | +---+---+---+---+---+---+ MySQL root@127.0.0.1:test> explain SELECT t2.a,t2.b,t3.a,t3.b,t4.a,t4.b -> FROM (t3,t4) -> LEFT JOIN -> (t1,t2) -> ON t3.a=1 AND t3.b=t2.b AND t2.b=t4.b order by 1, 2, 3, 4, 5; +-----------------------------------+---------+-----------+---------------+---------------------------------------------------------------------------------+ | id | estRows | task | access object | operator info | +-----------------------------------+---------+-----------+---------------+---------------------------------------------------------------------------------+ | Sort_15 | 6.26 | root | | test.t2.a, test.t2.b, test.t3.a, test.t3.b, test.t4.a | | └─Projection_17 | 6.26 | root | | test.t2.a, test.t2.b, test.t3.a, test.t3.b, test.t4.a, test.t4.b | | └─Projection_18 | 6.26 | root | | test.t3.a, test.t3.b, test.t4.a, test.t4.b, test.t2.a, test.t2.b | | └─HashJoin_20 | 6.26 | root | | left outer join, equal:[eq(test.t4.b, test.t2.b)] | | ├─TableReader_22(Build) | 2.00 | root | | data:TableFullScan_21 | | │ └─TableFullScan_21 | 2.00 | cop[tikv] | table:t4 | keep order:false, stats:pseudo | | └─HashJoin_24(Probe) | 7.50 | root | | left outer join, equal:[eq(test.t3.b, test.t2.b)], left cond:[eq(test.t3.a, 1)] | | ├─TableReader_26(Build) | 2.00 | root | | data:TableFullScan_25 | | │ └─TableFullScan_25 | 2.00 | cop[tikv] | table:t3 | keep order:false, stats:pseudo | | └─HashJoin_29(Probe) | 8.99 | root | | CARTESIAN inner join | | ├─TableReader_32(Build) | 3.00 | root | | data:Selection_31 | | │ └─Selection_31 | 3.00 | cop[tikv] | | not(isnull(test.t2.b)) | | │ └─TableFullScan_30 | 3.00 | cop[tikv] | table:t2 | keep order:false, stats:pseudo | | └─TableReader_34(Probe) | 3.00 | root | | data:TableFullScan_33 | | └─TableFullScan_33 | 3.00 | cop[tikv] | table:t1 | keep order:false, stats:pseudo | +-----------------------------------+---------+-----------+---------------+---------------------------------------------------------------------------------+ ``` ### 4. What is your TiDB version? (Required) ```sql MySQL root@127.0.0.1:test> select tidb_version()\G ***************************[ 1. row ]*************************** tidb_version() | Release Version: v6.1.0-alpha-390-g98c31070d Edition: Community Git Commit Hash: 98c31070d95858ecf5f9ffb9d5e0dab3aca13d9c Git Branch: master UTC Build Time: 2022-05-12 01:58:56 GoVersion: go1.18 Race Enabled: false TiKV Min Version: v3.0.0-60965b006877ca7234adaced7890d7b029ed1306 Check Table Before Drop: false ``` <!-- Paste the output of SELECT tidb_version() -->
1.0
join get the incorrect result - ## Bug Report Please answer these questions before submitting your issue. Thanks! ### 1. Minimal reproduce step (Required) ```sql CREATE TABLE t0 (a int, b int, c int); CREATE TABLE t1 (a int, b int, c int); CREATE TABLE t2 (a int, b int, c int); CREATE TABLE t3 (a int, b int, c int); CREATE TABLE t4 (a int, b int, c int); CREATE TABLE t5 (a int, b int, c int); CREATE TABLE t6 (a int, b int, c int); CREATE TABLE t7 (a int, b int, c int); CREATE TABLE t8 (a int, b int, c int); CREATE TABLE t9 (a int, b int, c int); INSERT INTO t0 VALUES (1,1,0), (1,2,0), (2,2,0); INSERT INTO t1 VALUES (1,3,0), (2,2,0), (3,2,0); INSERT INTO t2 VALUES (3,3,0), (4,2,0), (5,3,0); INSERT INTO t3 VALUES (1,2,0), (2,2,0); INSERT INTO t4 VALUES (3,2,0), (4,2,0); INSERT INTO t5 VALUES (3,1,0), (2,2,0), (3,3,0); INSERT INTO t6 VALUES (3,2,0), (6,2,0), (6,1,0); INSERT INTO t7 VALUES (1,1,0), (2,2,0); INSERT INTO t8 VALUES (0,2,0), (1,2,0); INSERT INTO t9 VALUES (1,1,0), (1,2,0), (3,3,0); SELECT t2.a,t2.b,t3.a,t3.b,t4.a,t4.b FROM (t3,t4) LEFT JOIN (t1,t2) ON t3.a=1 AND t3.b=t2.b AND t2.b=t4.b order by 1, 2, 3, 4, 5; explain SELECT t2.a,t2.b,t3.a,t3.b,t4.a,t4.b FROM (t3,t4) LEFT JOIN (t1,t2) ON t3.a=1 AND t3.b=t2.b AND t2.b=t4.b order by 1, 2, 3, 4, 5; ``` <!-- a step by step guide for reproducing the bug. --> ### 2. What did you expect to see? (Required) ```sql MySQL root@127.0.0.1:test> SELECT t2.a,t2.b,t3.a,t3.b,t4.a,t4.b -> FROM (t3,t4) -> LEFT JOIN -> (t1,t2) -> ON t3.a=1 AND t3.b=t2.b AND t2.b=t4.b order by 1, 2, 3, 4, 5; +--------+--------+---+---+---+---+ | a | b | a | b | a | b | +--------+--------+---+---+---+---+ | <null> | <null> | 2 | 2 | 3 | 2 | | <null> | <null> | 2 | 2 | 4 | 2 | | 4 | 2 | 1 | 2 | 3 | 2 | | 4 | 2 | 1 | 2 | 3 | 2 | | 4 | 2 | 1 | 2 | 3 | 2 | | 4 | 2 | 1 | 2 | 4 | 2 | | 4 | 2 | 1 | 2 | 4 | 2 | | 4 | 2 | 1 | 2 | 4 | 2 | +--------+--------+---+---+---+---+ MySQL root@127.0.0.1:test> explain SELECT t2.a,t2.b,t3.a,t3.b,t4.a,t4.b -> FROM (t3,t4) -> LEFT JOIN -> (t1,t2) -> ON t3.a=1 AND t3.b=t2.b AND t2.b=t4.b order by 1, 2, 3, 4, 5; +-------------------------------+---------+-----------+---------------+----------------------------------------------------------------------------------------------------------+ | id | estRows | task | access object | operator info | +-------------------------------+---------+-----------+---------------+----------------------------------------------------------------------------------------------------------+ | Sort_13 | 15.00 | root | | test.t2.a, test.t2.b, test.t3.a, test.t3.b, test.t4.a | | └─Projection_15 | 15.00 | root | | test.t2.a, test.t2.b, test.t3.a, test.t3.b, test.t4.a, test.t4.b | | └─HashJoin_17 | 15.00 | root | | left outer join, equal:[eq(test.t3.b, test.t2.b) eq(test.t4.b, test.t2.b)], left cond:[eq(test.t3.a, 1)] | | ├─HashJoin_18(Build) | 4.00 | root | | CARTESIAN inner join | | │ ├─TableReader_23(Build) | 2.00 | root | | data:TableFullScan_22 | | │ │ └─TableFullScan_22 | 2.00 | cop[tikv] | table:t4 | keep order:false, stats:pseudo | | │ └─TableReader_21(Probe) | 2.00 | root | | data:TableFullScan_20 | | │ └─TableFullScan_20 | 2.00 | cop[tikv] | table:t3 | keep order:false, stats:pseudo | | └─HashJoin_26(Probe) | 8.99 | root | | CARTESIAN inner join | | ├─TableReader_29(Build) | 3.00 | root | | data:Selection_28 | | │ └─Selection_28 | 3.00 | cop[tikv] | | not(isnull(test.t2.b)) | | │ └─TableFullScan_27 | 3.00 | cop[tikv] | table:t2 | keep order:false, stats:pseudo | | └─TableReader_31(Probe) | 3.00 | root | | data:TableFullScan_30 | | └─TableFullScan_30 | 3.00 | cop[tikv] | table:t1 | keep order:false, stats:pseudo | +-------------------------------+---------+-----------+---------------+----------------------------------------------------------------------------------------------------------+ ``` ### 3. What did you see instead (Required) ```sql MySQL root@127.0.0.1:test> SELECT t2.a,t2.b,t3.a,t3.b,t4.a,t4.b -> FROM (t3,t4) -> LEFT JOIN -> (t1,t2) -> ON t3.a=1 AND t3.b=t2.b AND t2.b=t4.b order by 1, 2, 3, 4, 5; +---+---+---+---+---+---+ | a | b | a | b | a | b | +---+---+---+---+---+---+ | 4 | 2 | 1 | 2 | 3 | 2 | | 4 | 2 | 1 | 2 | 3 | 2 | | 4 | 2 | 1 | 2 | 3 | 2 | | 4 | 2 | 1 | 2 | 4 | 2 | | 4 | 2 | 1 | 2 | 4 | 2 | | 4 | 2 | 1 | 2 | 4 | 2 | +---+---+---+---+---+---+ MySQL root@127.0.0.1:test> explain SELECT t2.a,t2.b,t3.a,t3.b,t4.a,t4.b -> FROM (t3,t4) -> LEFT JOIN -> (t1,t2) -> ON t3.a=1 AND t3.b=t2.b AND t2.b=t4.b order by 1, 2, 3, 4, 5; +-----------------------------------+---------+-----------+---------------+---------------------------------------------------------------------------------+ | id | estRows | task | access object | operator info | +-----------------------------------+---------+-----------+---------------+---------------------------------------------------------------------------------+ | Sort_15 | 6.26 | root | | test.t2.a, test.t2.b, test.t3.a, test.t3.b, test.t4.a | | └─Projection_17 | 6.26 | root | | test.t2.a, test.t2.b, test.t3.a, test.t3.b, test.t4.a, test.t4.b | | └─Projection_18 | 6.26 | root | | test.t3.a, test.t3.b, test.t4.a, test.t4.b, test.t2.a, test.t2.b | | └─HashJoin_20 | 6.26 | root | | left outer join, equal:[eq(test.t4.b, test.t2.b)] | | ├─TableReader_22(Build) | 2.00 | root | | data:TableFullScan_21 | | │ └─TableFullScan_21 | 2.00 | cop[tikv] | table:t4 | keep order:false, stats:pseudo | | └─HashJoin_24(Probe) | 7.50 | root | | left outer join, equal:[eq(test.t3.b, test.t2.b)], left cond:[eq(test.t3.a, 1)] | | ├─TableReader_26(Build) | 2.00 | root | | data:TableFullScan_25 | | │ └─TableFullScan_25 | 2.00 | cop[tikv] | table:t3 | keep order:false, stats:pseudo | | └─HashJoin_29(Probe) | 8.99 | root | | CARTESIAN inner join | | ├─TableReader_32(Build) | 3.00 | root | | data:Selection_31 | | │ └─Selection_31 | 3.00 | cop[tikv] | | not(isnull(test.t2.b)) | | │ └─TableFullScan_30 | 3.00 | cop[tikv] | table:t2 | keep order:false, stats:pseudo | | └─TableReader_34(Probe) | 3.00 | root | | data:TableFullScan_33 | | └─TableFullScan_33 | 3.00 | cop[tikv] | table:t1 | keep order:false, stats:pseudo | +-----------------------------------+---------+-----------+---------------+---------------------------------------------------------------------------------+ ``` ### 4. What is your TiDB version? (Required) ```sql MySQL root@127.0.0.1:test> select tidb_version()\G ***************************[ 1. row ]*************************** tidb_version() | Release Version: v6.1.0-alpha-390-g98c31070d Edition: Community Git Commit Hash: 98c31070d95858ecf5f9ffb9d5e0dab3aca13d9c Git Branch: master UTC Build Time: 2022-05-12 01:58:56 GoVersion: go1.18 Race Enabled: false TiKV Min Version: v3.0.0-60965b006877ca7234adaced7890d7b029ed1306 Check Table Before Drop: false ``` <!-- Paste the output of SELECT tidb_version() -->
non_priority
join get the incorrect result bug report please answer these questions before submitting your issue thanks minimal reproduce step required sql create table a int b int c int create table a int b int c int create table a int b int c int create table a int b int c int create table a int b int c int create table a int b int c int create table a int b int c int create table a int b int c int create table a int b int c int create table a int b int c int insert into values insert into values insert into values insert into values insert into values insert into values insert into values insert into values insert into values insert into values select a b a b a b from left join on a and b b and b b order by explain select a b a b a b from left join on a and b b and b b order by what did you expect to see required sql mysql root test select a b a b a b from left join on a and b b and b b order by a b a b a b mysql root test explain select a b a b a b from left join on a and b b and b b order by id estrows task access object operator info sort root test a test b test a test b test a └─projection root test a test b test a test b test a test b └─hashjoin root left outer join equal left cond ├─hashjoin build root cartesian inner join │ ├─tablereader build root data tablefullscan │ │ └─tablefullscan cop table keep order false stats pseudo │ └─tablereader probe root data tablefullscan │ └─tablefullscan cop table keep order false stats pseudo └─hashjoin probe root cartesian inner join ├─tablereader build root data selection │ └─selection cop not isnull test b │ └─tablefullscan cop table keep order false stats pseudo └─tablereader probe root data tablefullscan └─tablefullscan cop table keep order false stats pseudo what did you see instead required sql mysql root test select a b a b a b from left join on a and b b and b b order by a b a b a b mysql root test explain select a b a b a b from left join on a and b b and b b order by id estrows task access object operator info sort root test a test b test a test b test a └─projection root test a test b test a test b test a test b └─projection root test a test b test a test b test a test b └─hashjoin root left outer join equal ├─tablereader build root data tablefullscan │ └─tablefullscan cop table keep order false stats pseudo └─hashjoin probe root left outer join equal left cond ├─tablereader build root data tablefullscan │ └─tablefullscan cop table keep order false stats pseudo └─hashjoin probe root cartesian inner join ├─tablereader build root data selection │ └─selection cop not isnull test b │ └─tablefullscan cop table keep order false stats pseudo └─tablereader probe root data tablefullscan └─tablefullscan cop table keep order false stats pseudo what is your tidb version required sql mysql root test select tidb version g tidb version release version alpha edition community git commit hash git branch master utc build time goversion race enabled false tikv min version check table before drop false
0
42,548
12,906,251,119
IssuesEvent
2020-07-15 01:02:11
BrianMcDonaldWS/genie
https://api.github.com/repos/BrianMcDonaldWS/genie
opened
WS-2020-0127 (Low) detected in npm-registry-fetch-4.0.3.tgz
security vulnerability
## WS-2020-0127 - Low Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>npm-registry-fetch-4.0.3.tgz</b></p></summary> <p>Fetch-based http client for use with npm registry APIs</p> <p>Library home page: <a href="https://registry.npmjs.org/npm-registry-fetch/-/npm-registry-fetch-4.0.3.tgz">https://registry.npmjs.org/npm-registry-fetch/-/npm-registry-fetch-4.0.3.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/genie/genie-ui/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/genie/genie-ui/node_modules/npm/node_modules/npm-registry-fetch/package.json</p> <p> Dependency Hierarchy: - npm-6.14.3.tgz (Root Library) - :x: **npm-registry-fetch-4.0.3.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary> <p> npm-registry-fetch before 4.0.5 and 8.1.1 is vulnerable to an information exposure vulnerability through log files. <p>Publish Date: 2020-07-07 <p>URL: <a href=https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88>WS-2020-0127</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1544">https://www.npmjs.com/advisories/1544</a></p> <p>Release Date: 2020-07-14</p> <p>Fix Resolution: npm-registry-fetch - 4.0.5,8.1.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm-registry-fetch","packageVersion":"4.0.3","isTransitiveDependency":true,"dependencyTree":"npm:6.14.3;npm-registry-fetch:4.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"npm-registry-fetch - 4.0.5,8.1.1"}],"vulnerabilityIdentifier":"WS-2020-0127","vulnerabilityDetails":"npm-registry-fetch before 4.0.5 and 8.1.1 is vulnerable to an information exposure vulnerability through log files.","vulnerabilityUrl":"https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88","cvss3Severity":"low","cvss3Score":"3.4","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> -->
True
WS-2020-0127 (Low) detected in npm-registry-fetch-4.0.3.tgz - ## WS-2020-0127 - Low Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>npm-registry-fetch-4.0.3.tgz</b></p></summary> <p>Fetch-based http client for use with npm registry APIs</p> <p>Library home page: <a href="https://registry.npmjs.org/npm-registry-fetch/-/npm-registry-fetch-4.0.3.tgz">https://registry.npmjs.org/npm-registry-fetch/-/npm-registry-fetch-4.0.3.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/genie/genie-ui/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/genie/genie-ui/node_modules/npm/node_modules/npm-registry-fetch/package.json</p> <p> Dependency Hierarchy: - npm-6.14.3.tgz (Root Library) - :x: **npm-registry-fetch-4.0.3.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary> <p> npm-registry-fetch before 4.0.5 and 8.1.1 is vulnerable to an information exposure vulnerability through log files. <p>Publish Date: 2020-07-07 <p>URL: <a href=https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88>WS-2020-0127</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1544">https://www.npmjs.com/advisories/1544</a></p> <p>Release Date: 2020-07-14</p> <p>Fix Resolution: npm-registry-fetch - 4.0.5,8.1.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"npm-registry-fetch","packageVersion":"4.0.3","isTransitiveDependency":true,"dependencyTree":"npm:6.14.3;npm-registry-fetch:4.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"npm-registry-fetch - 4.0.5,8.1.1"}],"vulnerabilityIdentifier":"WS-2020-0127","vulnerabilityDetails":"npm-registry-fetch before 4.0.5 and 8.1.1 is vulnerable to an information exposure vulnerability through log files.","vulnerabilityUrl":"https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88","cvss3Severity":"low","cvss3Score":"3.4","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> -->
non_priority
ws low detected in npm registry fetch tgz ws low severity vulnerability vulnerable library npm registry fetch tgz fetch based http client for use with npm registry apis library home page a href path to dependency file tmp ws scm genie genie ui package json path to vulnerable library tmp ws scm genie genie ui node modules npm node modules npm registry fetch package json dependency hierarchy npm tgz root library x npm registry fetch tgz vulnerable library vulnerability details npm registry fetch before and is vulnerable to an information exposure vulnerability through log files publish date url a href cvss score details base score metrics exploitability metrics attack vector n a attack complexity n a privileges required n a user interaction n a scope n a impact metrics confidentiality impact n a integrity impact n a availability impact n a for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution npm registry fetch isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier ws vulnerabilitydetails npm registry fetch before and is vulnerable to an information exposure vulnerability through log files vulnerabilityurl
0
314,368
23,517,801,468
IssuesEvent
2022-08-19 00:13:53
r-Techsupport/rTS_Wiki
https://api.github.com/repos/r-Techsupport/rTS_Wiki
opened
Need a breakdown of disk formats
documentation
It will need to be linked in step 7 of the multiple disks page
1.0
Need a breakdown of disk formats - It will need to be linked in step 7 of the multiple disks page
non_priority
need a breakdown of disk formats it will need to be linked in step of the multiple disks page
0
50,796
10,556,764,356
IssuesEvent
2019-10-04 03:22:48
atomist/sdm-pack-aspect
https://api.github.com/repos/atomist/sdm-pack-aspect
closed
Code Inspection: Tslint on report-virtual-projects
code-inspection
### typedef - [`lib/analysis/tracking/analysisTracker.ts:173`](https://github.com/atomist/sdm-pack-aspect/blob/77ca9c84547d396a68473fc72c57d551a3584b1f/lib/analysis/tracking/analysisTracker.ts#L173): _(warn)_ expected call-signature: 'foundVirtualProjects' to have a typedef [atomist:code-inspection:report-virtual-projects=@atomist/atomist-sdm]
1.0
Code Inspection: Tslint on report-virtual-projects - ### typedef - [`lib/analysis/tracking/analysisTracker.ts:173`](https://github.com/atomist/sdm-pack-aspect/blob/77ca9c84547d396a68473fc72c57d551a3584b1f/lib/analysis/tracking/analysisTracker.ts#L173): _(warn)_ expected call-signature: 'foundVirtualProjects' to have a typedef [atomist:code-inspection:report-virtual-projects=@atomist/atomist-sdm]
non_priority
code inspection tslint on report virtual projects typedef warn expected call signature foundvirtualprojects to have a typedef
0
65,023
12,517,244,933
IssuesEvent
2020-06-03 10:47:25
nestauk/dapsboard
https://api.github.com/repos/nestauk/dapsboard
closed
Remove explorer components
code
`ResultExplorer`, `QueryExplorer`, `SchemaExplorer` arer basically the same component and they get invoked with presumably old props, when they actually need just one prop. As these are just wrappers of `svelte-json-tree` I'd just remove them and use `JSONTree` directly.
1.0
Remove explorer components - `ResultExplorer`, `QueryExplorer`, `SchemaExplorer` arer basically the same component and they get invoked with presumably old props, when they actually need just one prop. As these are just wrappers of `svelte-json-tree` I'd just remove them and use `JSONTree` directly.
non_priority
remove explorer components resultexplorer queryexplorer schemaexplorer arer basically the same component and they get invoked with presumably old props when they actually need just one prop as these are just wrappers of svelte json tree i d just remove them and use jsontree directly
0
68,420
21,664,344,084
IssuesEvent
2022-05-07 01:03:52
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
Invite summaries in email notifications are broken
T-Defect P2 S-Tolerable A-Notifications
I had 3 pending invites; they were summarised in the email notification as blank notifications from rooms as if i had already joined them. Very confusing
1.0
Invite summaries in email notifications are broken - I had 3 pending invites; they were summarised in the email notification as blank notifications from rooms as if i had already joined them. Very confusing
non_priority
invite summaries in email notifications are broken i had pending invites they were summarised in the email notification as blank notifications from rooms as if i had already joined them very confusing
0
60,534
25,170,603,942
IssuesEvent
2022-11-11 02:39:52
Azure/azure-cli
https://api.github.com/repos/Azure/azure-cli
closed
`az iot dps linked-hub create` hub and DPS on different subscriptions broken!?
Service Attention customer-reported IoTDPS IoT IoT/CLI Auto-Assign
When running `az iot dps linked-hub create` from the az CLI it would appear that we are unable to specify linking to a hub in a different subscription from the DPS. When running under the context being set to the subscription where the DPS exists, and despite passing a valid IoTHub connectionstring param to the command, it still responds with _"No IoT Hub found with name 'iot-hub-foo' in current subscription."_. ``` az iot dps linked-hub create --dps-name $IoTDPSName -g $ResourceGroupIoTDPS --connection-string $IoTHubCN ``` It's worth noting that the command obviously works when both the DPS and the IotHub exist in the same Azure Subscription. Additionally, I've also ensured that I'm owner of the resource in case it was possibly related to [this issue](https://github.com/Azure/azure-cli/issues/22038) for a related command. Can anyone from the Azure team please confirm that my observations above are correct and we're currently unable to link an IoTHub to a DPS in a different Subscription?
1.0
`az iot dps linked-hub create` hub and DPS on different subscriptions broken!? - When running `az iot dps linked-hub create` from the az CLI it would appear that we are unable to specify linking to a hub in a different subscription from the DPS. When running under the context being set to the subscription where the DPS exists, and despite passing a valid IoTHub connectionstring param to the command, it still responds with _"No IoT Hub found with name 'iot-hub-foo' in current subscription."_. ``` az iot dps linked-hub create --dps-name $IoTDPSName -g $ResourceGroupIoTDPS --connection-string $IoTHubCN ``` It's worth noting that the command obviously works when both the DPS and the IotHub exist in the same Azure Subscription. Additionally, I've also ensured that I'm owner of the resource in case it was possibly related to [this issue](https://github.com/Azure/azure-cli/issues/22038) for a related command. Can anyone from the Azure team please confirm that my observations above are correct and we're currently unable to link an IoTHub to a DPS in a different Subscription?
non_priority
az iot dps linked hub create hub and dps on different subscriptions broken when running az iot dps linked hub create from the az cli it would appear that we are unable to specify linking to a hub in a different subscription from the dps when running under the context being set to the subscription where the dps exists and despite passing a valid iothub connectionstring param to the command it still responds with no iot hub found with name iot hub foo in current subscription az iot dps linked hub create dps name iotdpsname g resourcegroupiotdps connection string iothubcn it s worth noting that the command obviously works when both the dps and the iothub exist in the same azure subscription additionally i ve also ensured that i m owner of the resource in case it was possibly related to for a related command can anyone from the azure team please confirm that my observations above are correct and we re currently unable to link an iothub to a dps in a different subscription
0
13,611
4,746,084,631
IssuesEvent
2016-10-21 09:46:33
medic/medic-webapp
https://api.github.com/repos/medic/medic-webapp
closed
Flaky unit test : ReportsCtrl
3 - Code Review Testing
We may be cleaning it up too fast or something. This happened locally. ``` ReportsCtrl controller ✓ set up controller ✓ verifies the given report ✓ when selecting a report, it sets the phone number in the actionbar ✗ "after each" hook Error: Uncaught AssertionError: expected 0 to equal 1 (node_modules/chai/chai.js:206) ✗ "after each" hook TypeError: Cannot read property '$injector' of null at Function.module.$$cleanup (node_modules/angular-mocks/angular-mocks.js:2897:31) at Context.module.$$afterEach (node_modules/angular-mocks/angular-mocks.js:2892:14) ✗ "after each" hook for "loads form when task has one action and no fields" TypeError: Cannot read property '$injector' of null at Function.module.$$cleanup (node_modules/angular-mocks/angular-mocks.js:2897:31) at Context.module.$$afterEach (node_modules/angular-mocks/angular-mocks.js:2892:14) ✗ "before each" hook TypeError: Cannot read property 'currentRetry' of undefined Chrome 53.0.2785 (Mac OS X 10.10.5): Executed 78 of 566 (4 FAILED) (6.943 secs / 1.442 secs) TOTAL: 4 FAILED, 74 SUCCESS 1) "after each" hook Error: Uncaught AssertionError: expected 0 to equal 1 (node_modules/chai/chai.js:206) 2) "after each" hook TypeError: Cannot read property '$injector' of null at Function.module.$$cleanup (node_modules/angular-mocks/angular-mocks.js:2897:31) at Context.module.$$afterEach (node_modules/angular-mocks/angular-mocks.js:2892:14) 3) "after each" hook for "loads form when task has one action and no fields" TypeError: Cannot read property '$injector' of null at Function.module.$$cleanup (node_modules/angular-mocks/angular-mocks.js:2897:31) at Context.module.$$afterEach (node_modules/angular-mocks/angular-mocks.js:2892:14) 4) "before each" hook TypeError: Cannot read property 'currentRetry' of undefined ```
1.0
Flaky unit test : ReportsCtrl - We may be cleaning it up too fast or something. This happened locally. ``` ReportsCtrl controller ✓ set up controller ✓ verifies the given report ✓ when selecting a report, it sets the phone number in the actionbar ✗ "after each" hook Error: Uncaught AssertionError: expected 0 to equal 1 (node_modules/chai/chai.js:206) ✗ "after each" hook TypeError: Cannot read property '$injector' of null at Function.module.$$cleanup (node_modules/angular-mocks/angular-mocks.js:2897:31) at Context.module.$$afterEach (node_modules/angular-mocks/angular-mocks.js:2892:14) ✗ "after each" hook for "loads form when task has one action and no fields" TypeError: Cannot read property '$injector' of null at Function.module.$$cleanup (node_modules/angular-mocks/angular-mocks.js:2897:31) at Context.module.$$afterEach (node_modules/angular-mocks/angular-mocks.js:2892:14) ✗ "before each" hook TypeError: Cannot read property 'currentRetry' of undefined Chrome 53.0.2785 (Mac OS X 10.10.5): Executed 78 of 566 (4 FAILED) (6.943 secs / 1.442 secs) TOTAL: 4 FAILED, 74 SUCCESS 1) "after each" hook Error: Uncaught AssertionError: expected 0 to equal 1 (node_modules/chai/chai.js:206) 2) "after each" hook TypeError: Cannot read property '$injector' of null at Function.module.$$cleanup (node_modules/angular-mocks/angular-mocks.js:2897:31) at Context.module.$$afterEach (node_modules/angular-mocks/angular-mocks.js:2892:14) 3) "after each" hook for "loads form when task has one action and no fields" TypeError: Cannot read property '$injector' of null at Function.module.$$cleanup (node_modules/angular-mocks/angular-mocks.js:2897:31) at Context.module.$$afterEach (node_modules/angular-mocks/angular-mocks.js:2892:14) 4) "before each" hook TypeError: Cannot read property 'currentRetry' of undefined ```
non_priority
flaky unit test reportsctrl we may be cleaning it up too fast or something this happened locally reportsctrl controller ✓ set up controller ✓ verifies the given report ✓ when selecting a report it sets the phone number in the actionbar ✗ after each hook error uncaught assertionerror expected to equal node modules chai chai js ✗ after each hook typeerror cannot read property injector of null at function module cleanup node modules angular mocks angular mocks js at context module aftereach node modules angular mocks angular mocks js ✗ after each hook for loads form when task has one action and no fields typeerror cannot read property injector of null at function module cleanup node modules angular mocks angular mocks js at context module aftereach node modules angular mocks angular mocks js ✗ before each hook typeerror cannot read property currentretry of undefined chrome mac os x executed of failed secs secs total failed success after each hook error uncaught assertionerror expected to equal node modules chai chai js after each hook typeerror cannot read property injector of null at function module cleanup node modules angular mocks angular mocks js at context module aftereach node modules angular mocks angular mocks js after each hook for loads form when task has one action and no fields typeerror cannot read property injector of null at function module cleanup node modules angular mocks angular mocks js at context module aftereach node modules angular mocks angular mocks js before each hook typeerror cannot read property currentretry of undefined
0
141,283
18,957,041,927
IssuesEvent
2021-11-18 21:38:40
CliffCrerar/bootstrap-5-starter
https://api.github.com/repos/CliffCrerar/bootstrap-5-starter
opened
CVE-2021-3807 (High) detected in ansi-regex-4.1.0.tgz, ansi-regex-5.0.0.tgz
security vulnerability
## CVE-2021-3807 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ansi-regex-4.1.0.tgz</b>, <b>ansi-regex-5.0.0.tgz</b></p></summary> <p> <details><summary><b>ansi-regex-4.1.0.tgz</b></p></summary> <p>Regular expression for matching ANSI escape codes</p> <p>Library home page: <a href="https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz">https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz</a></p> <p>Path to dependency file: bootstrap-5-starter/package.json</p> <p>Path to vulnerable library: bootstrap-5-starter/node_modules/yargs/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/cliui/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/ansi-align/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/wrap-ansi/node_modules/ansi-regex/package.json</p> <p> Dependency Hierarchy: - node-sass-5.0.0.tgz (Root Library) - sass-graph-2.2.5.tgz - yargs-13.3.2.tgz - string-width-3.1.0.tgz - strip-ansi-5.2.0.tgz - :x: **ansi-regex-4.1.0.tgz** (Vulnerable Library) </details> <details><summary><b>ansi-regex-5.0.0.tgz</b></p></summary> <p>Regular expression for matching ANSI escape codes</p> <p>Library home page: <a href="https://registry.npmjs.org/ansi-regex/-/ansi-regex-5.0.0.tgz">https://registry.npmjs.org/ansi-regex/-/ansi-regex-5.0.0.tgz</a></p> <p>Path to dependency file: bootstrap-5-starter/package.json</p> <p>Path to vulnerable library: bootstrap-5-starter/node_modules/stylelint/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/widest-line/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/table/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/postcss-cli/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/boxen/node_modules/ansi-regex/package.json</p> <p> Dependency Hierarchy: - postcss-cli-8.3.1.tgz (Root Library) - yargs-16.2.0.tgz - string-width-4.2.2.tgz - strip-ansi-6.0.0.tgz - :x: **ansi-regex-5.0.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/CliffCrerar/bootstrap-5-starter/commit/ec6736475dfcc79dc740c95f886f4108ed737125">ec6736475dfcc79dc740c95f886f4108ed737125</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ansi-regex is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3807>CVE-2021-3807</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994/">https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994/</a></p> <p>Release Date: 2021-09-17</p> <p>Fix Resolution: ansi-regex - 5.0.1,6.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-3807 (High) detected in ansi-regex-4.1.0.tgz, ansi-regex-5.0.0.tgz - ## CVE-2021-3807 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ansi-regex-4.1.0.tgz</b>, <b>ansi-regex-5.0.0.tgz</b></p></summary> <p> <details><summary><b>ansi-regex-4.1.0.tgz</b></p></summary> <p>Regular expression for matching ANSI escape codes</p> <p>Library home page: <a href="https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz">https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz</a></p> <p>Path to dependency file: bootstrap-5-starter/package.json</p> <p>Path to vulnerable library: bootstrap-5-starter/node_modules/yargs/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/cliui/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/ansi-align/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/wrap-ansi/node_modules/ansi-regex/package.json</p> <p> Dependency Hierarchy: - node-sass-5.0.0.tgz (Root Library) - sass-graph-2.2.5.tgz - yargs-13.3.2.tgz - string-width-3.1.0.tgz - strip-ansi-5.2.0.tgz - :x: **ansi-regex-4.1.0.tgz** (Vulnerable Library) </details> <details><summary><b>ansi-regex-5.0.0.tgz</b></p></summary> <p>Regular expression for matching ANSI escape codes</p> <p>Library home page: <a href="https://registry.npmjs.org/ansi-regex/-/ansi-regex-5.0.0.tgz">https://registry.npmjs.org/ansi-regex/-/ansi-regex-5.0.0.tgz</a></p> <p>Path to dependency file: bootstrap-5-starter/package.json</p> <p>Path to vulnerable library: bootstrap-5-starter/node_modules/stylelint/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/widest-line/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/table/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/postcss-cli/node_modules/ansi-regex/package.json,bootstrap-5-starter/node_modules/boxen/node_modules/ansi-regex/package.json</p> <p> Dependency Hierarchy: - postcss-cli-8.3.1.tgz (Root Library) - yargs-16.2.0.tgz - string-width-4.2.2.tgz - strip-ansi-6.0.0.tgz - :x: **ansi-regex-5.0.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/CliffCrerar/bootstrap-5-starter/commit/ec6736475dfcc79dc740c95f886f4108ed737125">ec6736475dfcc79dc740c95f886f4108ed737125</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ansi-regex is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3807>CVE-2021-3807</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994/">https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994/</a></p> <p>Release Date: 2021-09-17</p> <p>Fix Resolution: ansi-regex - 5.0.1,6.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in ansi regex tgz ansi regex tgz cve high severity vulnerability vulnerable libraries ansi regex tgz ansi regex tgz ansi regex tgz regular expression for matching ansi escape codes library home page a href path to dependency file bootstrap starter package json path to vulnerable library bootstrap starter node modules yargs node modules ansi regex package json bootstrap starter node modules cliui node modules ansi regex package json bootstrap starter node modules ansi align node modules ansi regex package json bootstrap starter node modules wrap ansi node modules ansi regex package json dependency hierarchy node sass tgz root library sass graph tgz yargs tgz string width tgz strip ansi tgz x ansi regex tgz vulnerable library ansi regex tgz regular expression for matching ansi escape codes library home page a href path to dependency file bootstrap starter package json path to vulnerable library bootstrap starter node modules stylelint node modules ansi regex package json bootstrap starter node modules widest line node modules ansi regex package json bootstrap starter node modules table node modules ansi regex package json bootstrap starter node modules postcss cli node modules ansi regex package json bootstrap starter node modules boxen node modules ansi regex package json dependency hierarchy postcss cli tgz root library yargs tgz string width tgz strip ansi tgz x ansi regex tgz vulnerable library found in head commit a href found in base branch main vulnerability details ansi regex is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ansi regex step up your open source security game with whitesource
0
76,002
15,495,737,821
IssuesEvent
2021-03-11 01:24:10
nicktombeur/naturalcolors
https://api.github.com/repos/nicktombeur/naturalcolors
opened
WS-2019-0427 (Medium) detected in elliptic-6.5.0.tgz
security vulnerability
## WS-2019-0427 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.5.0.tgz</b></p></summary> <p>EC cryptography</p> <p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.5.0.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.5.0.tgz</a></p> <p>Path to dependency file: naturalcolors/front-end/package.json</p> <p>Path to vulnerable library: naturalcolors/front-end/node_modules/elliptic/package.json</p> <p> Dependency Hierarchy: - react-scripts-2.1.3.tgz (Root Library) - webpack-4.19.1.tgz - node-libs-browser-2.2.1.tgz - crypto-browserify-3.12.0.tgz - browserify-sign-4.0.4.tgz - :x: **elliptic-6.5.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The function getNAF() in elliptic library has information leakage. This issue is mitigated in version 6.5.2 <p>Publish Date: 2019-11-22 <p>URL: <a href=https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a>WS-2019-0427</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a">https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a</a></p> <p>Release Date: 2020-05-24</p> <p>Fix Resolution: v6.5.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2019-0427 (Medium) detected in elliptic-6.5.0.tgz - ## WS-2019-0427 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.5.0.tgz</b></p></summary> <p>EC cryptography</p> <p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.5.0.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.5.0.tgz</a></p> <p>Path to dependency file: naturalcolors/front-end/package.json</p> <p>Path to vulnerable library: naturalcolors/front-end/node_modules/elliptic/package.json</p> <p> Dependency Hierarchy: - react-scripts-2.1.3.tgz (Root Library) - webpack-4.19.1.tgz - node-libs-browser-2.2.1.tgz - crypto-browserify-3.12.0.tgz - browserify-sign-4.0.4.tgz - :x: **elliptic-6.5.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The function getNAF() in elliptic library has information leakage. This issue is mitigated in version 6.5.2 <p>Publish Date: 2019-11-22 <p>URL: <a href=https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a>WS-2019-0427</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a">https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a</a></p> <p>Release Date: 2020-05-24</p> <p>Fix Resolution: v6.5.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws medium detected in elliptic tgz ws medium severity vulnerability vulnerable library elliptic tgz ec cryptography library home page a href path to dependency file naturalcolors front end package json path to vulnerable library naturalcolors front end node modules elliptic package json dependency hierarchy react scripts tgz root library webpack tgz node libs browser tgz crypto browserify tgz browserify sign tgz x elliptic tgz vulnerable library vulnerability details the function getnaf in elliptic library has information leakage this issue is mitigated in version publish date url a href cvss score details base score metrics exploitability metrics attack vector n a attack complexity n a privileges required n a user interaction n a scope n a impact metrics confidentiality impact n a integrity impact n a availability impact n a for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
263,059
28,010,489,682
IssuesEvent
2023-03-27 18:14:35
boltlabs-inc/key-mgmt
https://api.github.com/repos/boltlabs-inc/key-mgmt
closed
Secure storage for opaque's server secrets
security committed
The server needs to generate server secrets `let server_setup = ServerSetup::<OpaqueCipherSuite>::new(&mut rng);` This needs to be stored securely such that the server can load this whenever doing a registration/authentication with the opaque protocol. This is deployment dependent, as it will define how we can securely store it. - Do we want to store this inside SGX? - Do we want to generate/inject this during deployment? Note, the temporary solution: it gets generated upon the first registration request and stored in a flat file inside the `opaque_server_key` file, this file's location can be set inside the server configuration. Obviously, this is not secure yet.
True
Secure storage for opaque's server secrets - The server needs to generate server secrets `let server_setup = ServerSetup::<OpaqueCipherSuite>::new(&mut rng);` This needs to be stored securely such that the server can load this whenever doing a registration/authentication with the opaque protocol. This is deployment dependent, as it will define how we can securely store it. - Do we want to store this inside SGX? - Do we want to generate/inject this during deployment? Note, the temporary solution: it gets generated upon the first registration request and stored in a flat file inside the `opaque_server_key` file, this file's location can be set inside the server configuration. Obviously, this is not secure yet.
non_priority
secure storage for opaque s server secrets the server needs to generate server secrets let server setup serversetup new mut rng this needs to be stored securely such that the server can load this whenever doing a registration authentication with the opaque protocol this is deployment dependent as it will define how we can securely store it do we want to store this inside sgx do we want to generate inject this during deployment note the temporary solution it gets generated upon the first registration request and stored in a flat file inside the opaque server key file this file s location can be set inside the server configuration obviously this is not secure yet
0
255,442
19,302,570,848
IssuesEvent
2021-12-13 08:02:44
vmware-tanzu/vsphere-kubernetes-drivers-operator
https://api.github.com/repos/vmware-tanzu/vsphere-kubernetes-drivers-operator
opened
Arrange the Getting Started Guide
documentation
**Issue/Feature Description:** Arrange the Getting Started Guide in the following ways Move/Create the following documents in `docs/getting-started/` - [ ] getting-started-from-release.md - [ ] getting-started-from-code.md - [ ] getting-started-from-operator-hub.md Make the links to the above documents in `docs/getting-started.md` Share the above link in the releases or anyone who wish to try out VDO, let them choose the flavour they want for installation and click on the correct guide.
1.0
Arrange the Getting Started Guide - **Issue/Feature Description:** Arrange the Getting Started Guide in the following ways Move/Create the following documents in `docs/getting-started/` - [ ] getting-started-from-release.md - [ ] getting-started-from-code.md - [ ] getting-started-from-operator-hub.md Make the links to the above documents in `docs/getting-started.md` Share the above link in the releases or anyone who wish to try out VDO, let them choose the flavour they want for installation and click on the correct guide.
non_priority
arrange the getting started guide issue feature description arrange the getting started guide in the following ways move create the following documents in docs getting started getting started from release md getting started from code md getting started from operator hub md make the links to the above documents in docs getting started md share the above link in the releases or anyone who wish to try out vdo let them choose the flavour they want for installation and click on the correct guide
0
66,169
6,991,740,099
IssuesEvent
2017-12-15 01:49:53
w3c/automotive
https://api.github.com/repos/w3c/automotive
closed
getVSS test cases should be changed with getMetadata
Testing
In VISS test suite below getVSS test cases should be changed with using getMetadata because VISS spec was updated like this. 0100-getVss-success.html 0105-getVss-no-path-success.html 0110-getVss-wildcard-success.html 0120-getVss-incorrect-error.html
1.0
getVSS test cases should be changed with getMetadata - In VISS test suite below getVSS test cases should be changed with using getMetadata because VISS spec was updated like this. 0100-getVss-success.html 0105-getVss-no-path-success.html 0110-getVss-wildcard-success.html 0120-getVss-incorrect-error.html
non_priority
getvss test cases should be changed with getmetadata in viss test suite below getvss test cases should be changed with using getmetadata because viss spec was updated like this getvss success html getvss no path success html getvss wildcard success html getvss incorrect error html
0
71,673
23,757,967,843
IssuesEvent
2022-09-01 06:09:31
scipy/scipy
https://api.github.com/repos/scipy/scipy
opened
BUG: scrollbar not visible in docs
defect
### Describe your issue. The browser's scrollbar on the right is not visible when it is toggled by mouseover. I do not see the same behaviour for example in the NumPy docs which also use the pydata theme, so probably related to SciPy itself. To reproduce, just go to the docs page and hover over your browser's scrollbar. Scrollbar not toggled: ![image](https://user-images.githubusercontent.com/40656107/187843426-60ee180d-7d60-400d-bcb8-fe6e65300122.png) Scrollbar toggled: ![image](https://user-images.githubusercontent.com/40656107/187843411-107f98f1-b743-4dcd-a27e-096e6e025ca3.png) ### Reproducing Code Example ```python not applicable ``` ### Error message ```shell not applicable ``` ### SciPy/NumPy/Python version information not applicable
1.0
BUG: scrollbar not visible in docs - ### Describe your issue. The browser's scrollbar on the right is not visible when it is toggled by mouseover. I do not see the same behaviour for example in the NumPy docs which also use the pydata theme, so probably related to SciPy itself. To reproduce, just go to the docs page and hover over your browser's scrollbar. Scrollbar not toggled: ![image](https://user-images.githubusercontent.com/40656107/187843426-60ee180d-7d60-400d-bcb8-fe6e65300122.png) Scrollbar toggled: ![image](https://user-images.githubusercontent.com/40656107/187843411-107f98f1-b743-4dcd-a27e-096e6e025ca3.png) ### Reproducing Code Example ```python not applicable ``` ### Error message ```shell not applicable ``` ### SciPy/NumPy/Python version information not applicable
non_priority
bug scrollbar not visible in docs describe your issue the browser s scrollbar on the right is not visible when it is toggled by mouseover i do not see the same behaviour for example in the numpy docs which also use the pydata theme so probably related to scipy itself to reproduce just go to the docs page and hover over your browser s scrollbar scrollbar not toggled scrollbar toggled reproducing code example python not applicable error message shell not applicable scipy numpy python version information not applicable
0
206,441
23,385,974,772
IssuesEvent
2022-08-11 13:47:32
Gal-Doron/Baragon-33
https://api.github.com/repos/Gal-Doron/Baragon-33
opened
dropwizard-core-1.3.12.jar: 3 vulnerabilities (highest severity is: 8.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dropwizard-core-1.3.12.jar</b></p></summary> <p></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/ch/qos/logback/logback-core/1.2.3/logback-core-1.2.3.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-33/commit/ea87cee35eb34356ed1a1407b15d17d4105e6e0c">ea87cee35eb34356ed1a1407b15d17d4105e6e0c</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2020-11002](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11002) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | dropwizard-validation-1.3.12.jar | Transitive | 1.3.21 | &#9989; | | [CVE-2020-5245](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5245) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | dropwizard-validation-1.3.12.jar | Transitive | 1.3.19 | &#9989; | | [CVE-2021-42550](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42550) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.6 | detected in multiple dependencies | Transitive | 2.0.27 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-11002</summary> ### Vulnerable Library - <b>dropwizard-validation-1.3.12.jar</b></p> <p>Dropwizard is a Java framework for developing ops-friendly, high-performance, RESTful web applications.</p> <p>Library home page: <a href="http://www.dropwizard.io/1.3.12">http://www.dropwizard.io/1.3.12</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/dropwizard/dropwizard-validation/1.3.12/dropwizard-validation-1.3.12.jar,/home/wss-scanner/.m2/repository/io/dropwizard/dropwizard-validation/1.3.12/dropwizard-validation-1.3.12.jar,/home/wss-scanner/.m2/repository/io/dropwizard/dropwizard-validation/1.3.12/dropwizard-validation-1.3.12.jar</p> <p> Dependency Hierarchy: - dropwizard-core-1.3.12.jar (Root Library) - :x: **dropwizard-validation-1.3.12.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-33/commit/ea87cee35eb34356ed1a1407b15d17d4105e6e0c">ea87cee35eb34356ed1a1407b15d17d4105e6e0c</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> dropwizard-validation before versions 2.0.3 and 1.3.21 has a remote code execution vulnerability. A server-side template injection was identified in the self-validating feature enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability. If you are using a self-validating bean an upgrade to Dropwizard 1.3.21/2.0.3 or later is strongly recommended. The changes introduced in Dropwizard 1.3.19 and 2.0.2 for CVE-2020-5245 unfortunately did not fix the underlying issue completely. The issue has been fixed in dropwizard-validation 1.3.21 and 2.0.3 or later. We strongly recommend upgrading to one of these versions. <p>Publish Date: 2020-04-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11002>CVE-2020-11002</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/dropwizard/dropwizard/security/advisories/GHSA-8jpx-m2wh-2v34">https://github.com/dropwizard/dropwizard/security/advisories/GHSA-8jpx-m2wh-2v34</a></p> <p>Release Date: 2020-04-13</p> <p>Fix Resolution (io.dropwizard:dropwizard-validation): 1.3.21</p> <p>Direct dependency fix Resolution (io.dropwizard:dropwizard-core): 1.3.21</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-5245</summary> ### Vulnerable Library - <b>dropwizard-validation-1.3.12.jar</b></p> <p>Dropwizard is a Java framework for developing ops-friendly, high-performance, RESTful web applications.</p> <p>Library home page: <a href="http://www.dropwizard.io/1.3.12">http://www.dropwizard.io/1.3.12</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/dropwizard/dropwizard-validation/1.3.12/dropwizard-validation-1.3.12.jar,/home/wss-scanner/.m2/repository/io/dropwizard/dropwizard-validation/1.3.12/dropwizard-validation-1.3.12.jar,/home/wss-scanner/.m2/repository/io/dropwizard/dropwizard-validation/1.3.12/dropwizard-validation-1.3.12.jar</p> <p> Dependency Hierarchy: - dropwizard-core-1.3.12.jar (Root Library) - :x: **dropwizard-validation-1.3.12.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-33/commit/ea87cee35eb34356ed1a1407b15d17d4105e6e0c">ea87cee35eb34356ed1a1407b15d17d4105e6e0c</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. The issue has been fixed in dropwizard-validation 1.3.19 and 2.0.2. <p>Publish Date: 2020-02-24 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5245>CVE-2020-5245</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5245</a></p> <p>Release Date: 2020-02-24</p> <p>Fix Resolution (io.dropwizard:dropwizard-validation): 1.3.19</p> <p>Direct dependency fix Resolution (io.dropwizard:dropwizard-core): 1.3.19</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-42550</summary> ### Vulnerable Libraries - <b>logback-classic-1.2.3.jar</b>, <b>logback-core-1.2.3.jar</b></p> <p> ### <b>logback-classic-1.2.3.jar</b></p> <p>logback-classic module</p> <p>Library home page: <a href="http://logback.qos.ch">http://logback.qos.ch</a></p> <p>Path to dependency file: /BaragonData/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/ch/qos/logback/logback-classic/1.2.3/logback-classic-1.2.3.jar</p> <p> Dependency Hierarchy: - dropwizard-core-1.3.12.jar (Root Library) - dropwizard-logging-1.3.12.jar - :x: **logback-classic-1.2.3.jar** (Vulnerable Library) ### <b>logback-core-1.2.3.jar</b></p> <p>logback-core module</p> <p>Library home page: <a href="http://logback.qos.ch">http://logback.qos.ch</a></p> <p>Path to dependency file: /BaragonData/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/ch/qos/logback/logback-core/1.2.3/logback-core-1.2.3.jar</p> <p> Dependency Hierarchy: - dropwizard-core-1.3.12.jar (Root Library) - dropwizard-logging-1.3.12.jar - :x: **logback-core-1.2.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-33/commit/ea87cee35eb34356ed1a1407b15d17d4105e6e0c">ea87cee35eb34356ed1a1407b15d17d4105e6e0c</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers. <p>Publish Date: 2021-12-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42550>CVE-2021-42550</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.6</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2021-42550">https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2021-42550</a></p> <p>Release Date: 2021-12-16</p> <p>Fix Resolution (ch.qos.logback:logback-classic): 1.2.8</p> <p>Direct dependency fix Resolution (io.dropwizard:dropwizard-core): 2.0.27</p><p>Fix Resolution (ch.qos.logback:logback-core): 1.2.8</p> <p>Direct dependency fix Resolution (io.dropwizard:dropwizard-core): 2.0.27</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
dropwizard-core-1.3.12.jar: 3 vulnerabilities (highest severity is: 8.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dropwizard-core-1.3.12.jar</b></p></summary> <p></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/ch/qos/logback/logback-core/1.2.3/logback-core-1.2.3.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-33/commit/ea87cee35eb34356ed1a1407b15d17d4105e6e0c">ea87cee35eb34356ed1a1407b15d17d4105e6e0c</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2020-11002](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11002) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | dropwizard-validation-1.3.12.jar | Transitive | 1.3.21 | &#9989; | | [CVE-2020-5245](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5245) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | dropwizard-validation-1.3.12.jar | Transitive | 1.3.19 | &#9989; | | [CVE-2021-42550](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42550) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.6 | detected in multiple dependencies | Transitive | 2.0.27 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-11002</summary> ### Vulnerable Library - <b>dropwizard-validation-1.3.12.jar</b></p> <p>Dropwizard is a Java framework for developing ops-friendly, high-performance, RESTful web applications.</p> <p>Library home page: <a href="http://www.dropwizard.io/1.3.12">http://www.dropwizard.io/1.3.12</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/dropwizard/dropwizard-validation/1.3.12/dropwizard-validation-1.3.12.jar,/home/wss-scanner/.m2/repository/io/dropwizard/dropwizard-validation/1.3.12/dropwizard-validation-1.3.12.jar,/home/wss-scanner/.m2/repository/io/dropwizard/dropwizard-validation/1.3.12/dropwizard-validation-1.3.12.jar</p> <p> Dependency Hierarchy: - dropwizard-core-1.3.12.jar (Root Library) - :x: **dropwizard-validation-1.3.12.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-33/commit/ea87cee35eb34356ed1a1407b15d17d4105e6e0c">ea87cee35eb34356ed1a1407b15d17d4105e6e0c</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> dropwizard-validation before versions 2.0.3 and 1.3.21 has a remote code execution vulnerability. A server-side template injection was identified in the self-validating feature enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability. If you are using a self-validating bean an upgrade to Dropwizard 1.3.21/2.0.3 or later is strongly recommended. The changes introduced in Dropwizard 1.3.19 and 2.0.2 for CVE-2020-5245 unfortunately did not fix the underlying issue completely. The issue has been fixed in dropwizard-validation 1.3.21 and 2.0.3 or later. We strongly recommend upgrading to one of these versions. <p>Publish Date: 2020-04-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11002>CVE-2020-11002</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/dropwizard/dropwizard/security/advisories/GHSA-8jpx-m2wh-2v34">https://github.com/dropwizard/dropwizard/security/advisories/GHSA-8jpx-m2wh-2v34</a></p> <p>Release Date: 2020-04-13</p> <p>Fix Resolution (io.dropwizard:dropwizard-validation): 1.3.21</p> <p>Direct dependency fix Resolution (io.dropwizard:dropwizard-core): 1.3.21</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-5245</summary> ### Vulnerable Library - <b>dropwizard-validation-1.3.12.jar</b></p> <p>Dropwizard is a Java framework for developing ops-friendly, high-performance, RESTful web applications.</p> <p>Library home page: <a href="http://www.dropwizard.io/1.3.12">http://www.dropwizard.io/1.3.12</a></p> <p>Path to dependency file: /BaragonAgentService/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/dropwizard/dropwizard-validation/1.3.12/dropwizard-validation-1.3.12.jar,/home/wss-scanner/.m2/repository/io/dropwizard/dropwizard-validation/1.3.12/dropwizard-validation-1.3.12.jar,/home/wss-scanner/.m2/repository/io/dropwizard/dropwizard-validation/1.3.12/dropwizard-validation-1.3.12.jar</p> <p> Dependency Hierarchy: - dropwizard-core-1.3.12.jar (Root Library) - :x: **dropwizard-validation-1.3.12.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-33/commit/ea87cee35eb34356ed1a1407b15d17d4105e6e0c">ea87cee35eb34356ed1a1407b15d17d4105e6e0c</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. The issue has been fixed in dropwizard-validation 1.3.19 and 2.0.2. <p>Publish Date: 2020-02-24 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5245>CVE-2020-5245</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5245">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5245</a></p> <p>Release Date: 2020-02-24</p> <p>Fix Resolution (io.dropwizard:dropwizard-validation): 1.3.19</p> <p>Direct dependency fix Resolution (io.dropwizard:dropwizard-core): 1.3.19</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-42550</summary> ### Vulnerable Libraries - <b>logback-classic-1.2.3.jar</b>, <b>logback-core-1.2.3.jar</b></p> <p> ### <b>logback-classic-1.2.3.jar</b></p> <p>logback-classic module</p> <p>Library home page: <a href="http://logback.qos.ch">http://logback.qos.ch</a></p> <p>Path to dependency file: /BaragonData/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/ch/qos/logback/logback-classic/1.2.3/logback-classic-1.2.3.jar</p> <p> Dependency Hierarchy: - dropwizard-core-1.3.12.jar (Root Library) - dropwizard-logging-1.3.12.jar - :x: **logback-classic-1.2.3.jar** (Vulnerable Library) ### <b>logback-core-1.2.3.jar</b></p> <p>logback-core module</p> <p>Library home page: <a href="http://logback.qos.ch">http://logback.qos.ch</a></p> <p>Path to dependency file: /BaragonData/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/ch/qos/logback/logback-core/1.2.3/logback-core-1.2.3.jar</p> <p> Dependency Hierarchy: - dropwizard-core-1.3.12.jar (Root Library) - dropwizard-logging-1.3.12.jar - :x: **logback-core-1.2.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Baragon-33/commit/ea87cee35eb34356ed1a1407b15d17d4105e6e0c">ea87cee35eb34356ed1a1407b15d17d4105e6e0c</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers. <p>Publish Date: 2021-12-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42550>CVE-2021-42550</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.6</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2021-42550">https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2021-42550</a></p> <p>Release Date: 2021-12-16</p> <p>Fix Resolution (ch.qos.logback:logback-classic): 1.2.8</p> <p>Direct dependency fix Resolution (io.dropwizard:dropwizard-core): 2.0.27</p><p>Fix Resolution (ch.qos.logback:logback-core): 1.2.8</p> <p>Direct dependency fix Resolution (io.dropwizard:dropwizard-core): 2.0.27</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_priority
dropwizard core jar vulnerabilities highest severity is vulnerable library dropwizard core jar path to dependency file baragonagentservice pom xml path to vulnerable library home wss scanner repository ch qos logback logback core logback core jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high dropwizard validation jar transitive high dropwizard validation jar transitive medium detected in multiple dependencies transitive details cve vulnerable library dropwizard validation jar dropwizard is a java framework for developing ops friendly high performance restful web applications library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library home wss scanner repository io dropwizard dropwizard validation dropwizard validation jar home wss scanner repository io dropwizard dropwizard validation dropwizard validation jar home wss scanner repository io dropwizard dropwizard validation dropwizard validation jar dependency hierarchy dropwizard core jar root library x dropwizard validation jar vulnerable library found in head commit a href found in base branch master vulnerability details dropwizard validation before versions and has a remote code execution vulnerability a server side template injection was identified in the self validating feature enabling attackers to inject arbitrary java el expressions leading to remote code execution rce vulnerability if you are using a self validating bean an upgrade to dropwizard or later is strongly recommended the changes introduced in dropwizard and for cve unfortunately did not fix the underlying issue completely the issue has been fixed in dropwizard validation and or later we strongly recommend upgrading to one of these versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution io dropwizard dropwizard validation direct dependency fix resolution io dropwizard dropwizard core rescue worker helmet automatic remediation is available for this issue cve vulnerable library dropwizard validation jar dropwizard is a java framework for developing ops friendly high performance restful web applications library home page a href path to dependency file baragonagentservice pom xml path to vulnerable library home wss scanner repository io dropwizard dropwizard validation dropwizard validation jar home wss scanner repository io dropwizard dropwizard validation dropwizard validation jar home wss scanner repository io dropwizard dropwizard validation dropwizard validation jar dependency hierarchy dropwizard core jar root library x dropwizard validation jar vulnerable library found in head commit a href found in base branch master vulnerability details dropwizard validation before and may allow arbitrary code execution on the host system with the privileges of the dropwizard service account by injecting arbitrary java expression language expressions when using the self validating feature the issue has been fixed in dropwizard validation and publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution io dropwizard dropwizard validation direct dependency fix resolution io dropwizard dropwizard core rescue worker helmet automatic remediation is available for this issue cve vulnerable libraries logback classic jar logback core jar logback classic jar logback classic module library home page a href path to dependency file baragondata pom xml path to vulnerable library home wss scanner repository ch qos logback logback classic logback classic jar dependency hierarchy dropwizard core jar root library dropwizard logging jar x logback classic jar vulnerable library logback core jar logback core module library home page a href path to dependency file baragondata pom xml path to vulnerable library home wss scanner repository ch qos logback logback core logback core jar dependency hierarchy dropwizard core jar root library dropwizard logging jar x logback core jar vulnerable library found in head commit a href found in base branch master vulnerability details in logback version and prior versions an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from ldap servers publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos logback logback classic direct dependency fix resolution io dropwizard dropwizard core fix resolution ch qos logback logback core direct dependency fix resolution io dropwizard dropwizard core rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
0
250,816
27,111,629,002
IssuesEvent
2023-02-15 15:41:20
EliyaC/SecurityShepherd
https://api.github.com/repos/EliyaC/SecurityShepherd
closed
CVE-2022-21363 (Medium) detected in mysql-connector-java-5.1.24.jar - autoclosed
security vulnerability
## CVE-2022-21363 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.24.jar</b></p></summary> <p>MySQL JDBC Type 4 driver</p> <p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /tory/mysql/mysql-connector-java/5.1.24/mysql-connector-java-5.1.24.jar</p> <p> Dependency Hierarchy: - :x: **mysql-connector-java-5.1.24.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/EliyaC/SecurityShepherd/commit/1f36aeb28d3932e3a7ff2c6a02d21bb2091e47f9">1f36aeb28d3932e3a7ff2c6a02d21bb2091e47f9</a></p> <p>Found in base branch: <b>dev</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H). <p>Publish Date: 2022-01-19 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-21363>CVE-2022-21363</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-g76j-4cxx-23h9">https://github.com/advisories/GHSA-g76j-4cxx-23h9</a></p> <p>Release Date: 2022-01-19</p> <p>Fix Resolution: mysql:mysql-connector-java:8.0.28</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue
True
CVE-2022-21363 (Medium) detected in mysql-connector-java-5.1.24.jar - autoclosed - ## CVE-2022-21363 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.24.jar</b></p></summary> <p>MySQL JDBC Type 4 driver</p> <p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /tory/mysql/mysql-connector-java/5.1.24/mysql-connector-java-5.1.24.jar</p> <p> Dependency Hierarchy: - :x: **mysql-connector-java-5.1.24.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/EliyaC/SecurityShepherd/commit/1f36aeb28d3932e3a7ff2c6a02d21bb2091e47f9">1f36aeb28d3932e3a7ff2c6a02d21bb2091e47f9</a></p> <p>Found in base branch: <b>dev</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H). <p>Publish Date: 2022-01-19 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-21363>CVE-2022-21363</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-g76j-4cxx-23h9">https://github.com/advisories/GHSA-g76j-4cxx-23h9</a></p> <p>Release Date: 2022-01-19</p> <p>Fix Resolution: mysql:mysql-connector-java:8.0.28</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue
non_priority
cve medium detected in mysql connector java jar autoclosed cve medium severity vulnerability vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to dependency file pom xml path to vulnerable library tory mysql mysql connector java mysql connector java jar dependency hierarchy x mysql connector java jar vulnerable library found in head commit a href found in base branch dev vulnerability details vulnerability in the mysql connectors product of oracle mysql component connector j supported versions that are affected are and prior difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise mysql connectors successful attacks of this vulnerability can result in takeover of mysql connectors cvss base score confidentiality integrity and availability impacts cvss vector cvss av n ac h pr h ui n s u c h i h a h publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution mysql mysql connector java rescue worker helmet automatic remediation is available for this issue
0
37,014
5,098,125,138
IssuesEvent
2017-01-04 00:04:35
w3c/html
https://api.github.com/repos/w3c/html
closed
July 2016 Port 19 - Apply current entry in pushState earlier
needs tests WHATWG Port
Needs tests--will validate the dispatch of pushState in synchronous scenarios. (see details at https://github.com/whatwg/html/issues/1511) Change re-orders the algorithms to match for spec consistency. Not sure if this matches reality better or not. https://github.com/whatwg/html/commit/dd2166c88e6e01439fcfefb03817184cd5b116dc
1.0
July 2016 Port 19 - Apply current entry in pushState earlier - Needs tests--will validate the dispatch of pushState in synchronous scenarios. (see details at https://github.com/whatwg/html/issues/1511) Change re-orders the algorithms to match for spec consistency. Not sure if this matches reality better or not. https://github.com/whatwg/html/commit/dd2166c88e6e01439fcfefb03817184cd5b116dc
non_priority
july port apply current entry in pushstate earlier needs tests will validate the dispatch of pushstate in synchronous scenarios see details at change re orders the algorithms to match for spec consistency not sure if this matches reality better or not
0
232,802
17,795,213,042
IssuesEvent
2021-08-31 21:09:40
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
Microsoft.Extensions.Http undoc APIs
documentation untriaged area-Extensions-HttpClientFactory
Here is a list of undocumented APIs for @dotnet/ncl belonging to Microsoft.Extensions.Http. It's ok to move these to 7.0 since these APIs seem to exist before 6.0. If these APIs are already documented in triple slash, you can execute the DocsPortingTool command below to port them to dotnet-api-docs. If they aren't yet documented, since these namespaces don't yet have triple slash comments as their source of truth, you can either: - Get them documented directly in dotnet-api-docs (we will backport them to triple slash later), or - Get them documented in triple slash first, then use the command below to port them to dotnet-api-docs. ``` DocsPortingTool \ -Direction ToDocs \ -Docs %REPOS%\dotnet-api-docs\xml \ -Intellisense %REPOS%\runtime\artifacts\bin\ \ -IncludedAssemblies Microsoft.Extensions \ -IncludedNamespaces Microsoft.Extensions.Http \ -Save true ``` <details> <summary>Microsoft.Extensions.Http</summary> | Microsoft.Extensions.Http | |--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| [N:Microsoft.Extensions.Http](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/ns-Microsoft.Extensions.Http.xml) [M:Microsoft.Extensions.Http.HttpClientFactoryOptions.#ctor](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http/HttpClientFactoryOptions.xml) [M:Microsoft.Extensions.Http.HttpMessageHandlerBuilder.#ctor](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http/HttpMessageHandlerBuilder.xml) [M:Microsoft.Extensions.Http.HttpMessageHandlerBuilder.CreateHandlerPipeline(System.Net.Http.HttpMessageHandler,System.Collections.Generic.IEnumerable{System.Net.Http.DelegatingHandler})](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http/HttpMessageHandlerBuilder.xml) [M:Microsoft.Extensions.Http.IHttpMessageHandlerBuilderFilter.Configure(System.Action{Microsoft.Extensions.Http.HttpMessageHandlerBuilder})](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http/IHttpMessageHandlerBuilderFilter.xml) [N:Microsoft.Extensions.Http.Logging](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/ns-Microsoft.Extensions.Http.Logging.xml) [M:Microsoft.Extensions.Http.Logging.LoggingHttpMessageHandler.#ctor(Microsoft.Extensions.Logging.ILogger)](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingHttpMessageHandler.xml) [M:Microsoft.Extensions.Http.Logging.LoggingHttpMessageHandler.#ctor(Microsoft.Extensions.Logging.ILogger,Microsoft.Extensions.Http.HttpClientFactoryOptions)](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingHttpMessageHandler.xml) [T:Microsoft.Extensions.Http.Logging.LoggingHttpMessageHandler](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingHttpMessageHandler.xml) [M:Microsoft.Extensions.Http.Logging.LoggingHttpMessageHandler.SendAsync(System.Net.Http.HttpRequestMessage,System.Threading.CancellationToken)](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingHttpMessageHandler.xml) [M:Microsoft.Extensions.Http.Logging.LoggingScopeHttpMessageHandler.#ctor(Microsoft.Extensions.Logging.ILogger)](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingScopeHttpMessageHandler.xml) [M:Microsoft.Extensions.Http.Logging.LoggingScopeHttpMessageHandler.#ctor(Microsoft.Extensions.Logging.ILogger,Microsoft.Extensions.Http.HttpClientFactoryOptions)](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingScopeHttpMessageHandler.xml) [T:Microsoft.Extensions.Http.Logging.LoggingScopeHttpMessageHandler](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingScopeHttpMessageHandler.xml) [M:Microsoft.Extensions.Http.Logging.LoggingScopeHttpMessageHandler.SendAsync(System.Net.Http.HttpRequestMessage,System.Threading.CancellationToken)](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingScopeHttpMessageHandler.xml) </details>
1.0
Microsoft.Extensions.Http undoc APIs - Here is a list of undocumented APIs for @dotnet/ncl belonging to Microsoft.Extensions.Http. It's ok to move these to 7.0 since these APIs seem to exist before 6.0. If these APIs are already documented in triple slash, you can execute the DocsPortingTool command below to port them to dotnet-api-docs. If they aren't yet documented, since these namespaces don't yet have triple slash comments as their source of truth, you can either: - Get them documented directly in dotnet-api-docs (we will backport them to triple slash later), or - Get them documented in triple slash first, then use the command below to port them to dotnet-api-docs. ``` DocsPortingTool \ -Direction ToDocs \ -Docs %REPOS%\dotnet-api-docs\xml \ -Intellisense %REPOS%\runtime\artifacts\bin\ \ -IncludedAssemblies Microsoft.Extensions \ -IncludedNamespaces Microsoft.Extensions.Http \ -Save true ``` <details> <summary>Microsoft.Extensions.Http</summary> | Microsoft.Extensions.Http | |--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| [N:Microsoft.Extensions.Http](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/ns-Microsoft.Extensions.Http.xml) [M:Microsoft.Extensions.Http.HttpClientFactoryOptions.#ctor](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http/HttpClientFactoryOptions.xml) [M:Microsoft.Extensions.Http.HttpMessageHandlerBuilder.#ctor](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http/HttpMessageHandlerBuilder.xml) [M:Microsoft.Extensions.Http.HttpMessageHandlerBuilder.CreateHandlerPipeline(System.Net.Http.HttpMessageHandler,System.Collections.Generic.IEnumerable{System.Net.Http.DelegatingHandler})](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http/HttpMessageHandlerBuilder.xml) [M:Microsoft.Extensions.Http.IHttpMessageHandlerBuilderFilter.Configure(System.Action{Microsoft.Extensions.Http.HttpMessageHandlerBuilder})](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http/IHttpMessageHandlerBuilderFilter.xml) [N:Microsoft.Extensions.Http.Logging](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/ns-Microsoft.Extensions.Http.Logging.xml) [M:Microsoft.Extensions.Http.Logging.LoggingHttpMessageHandler.#ctor(Microsoft.Extensions.Logging.ILogger)](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingHttpMessageHandler.xml) [M:Microsoft.Extensions.Http.Logging.LoggingHttpMessageHandler.#ctor(Microsoft.Extensions.Logging.ILogger,Microsoft.Extensions.Http.HttpClientFactoryOptions)](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingHttpMessageHandler.xml) [T:Microsoft.Extensions.Http.Logging.LoggingHttpMessageHandler](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingHttpMessageHandler.xml) [M:Microsoft.Extensions.Http.Logging.LoggingHttpMessageHandler.SendAsync(System.Net.Http.HttpRequestMessage,System.Threading.CancellationToken)](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingHttpMessageHandler.xml) [M:Microsoft.Extensions.Http.Logging.LoggingScopeHttpMessageHandler.#ctor(Microsoft.Extensions.Logging.ILogger)](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingScopeHttpMessageHandler.xml) [M:Microsoft.Extensions.Http.Logging.LoggingScopeHttpMessageHandler.#ctor(Microsoft.Extensions.Logging.ILogger,Microsoft.Extensions.Http.HttpClientFactoryOptions)](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingScopeHttpMessageHandler.xml) [T:Microsoft.Extensions.Http.Logging.LoggingScopeHttpMessageHandler](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingScopeHttpMessageHandler.xml) [M:Microsoft.Extensions.Http.Logging.LoggingScopeHttpMessageHandler.SendAsync(System.Net.Http.HttpRequestMessage,System.Threading.CancellationToken)](https://github.com/dotnet/dotnet-api-docs/blob/main/xml/Microsoft.Extensions.Http.Logging/LoggingScopeHttpMessageHandler.xml) </details>
non_priority
microsoft extensions http undoc apis here is a list of undocumented apis for dotnet ncl belonging to microsoft extensions http it s ok to move these to since these apis seem to exist before if these apis are already documented in triple slash you can execute the docsportingtool command below to port them to dotnet api docs if they aren t yet documented since these namespaces don t yet have triple slash comments as their source of truth you can either get them documented directly in dotnet api docs we will backport them to triple slash later or get them documented in triple slash first then use the command below to port them to dotnet api docs docsportingtool direction todocs docs repos dotnet api docs xml intellisense repos runtime artifacts bin includedassemblies microsoft extensions includednamespaces microsoft extensions http save true microsoft extensions http microsoft extensions http
0
119,297
12,025,881,084
IssuesEvent
2020-04-12 11:33:20
krypton-org/krypton-auth
https://api.github.com/repos/krypton-org/krypton-auth
opened
Document JWTs
documentation
- What is a JWT? - Content (signature, payload/claims, ...) - JWT / refreshToken interaction
1.0
Document JWTs - - What is a JWT? - Content (signature, payload/claims, ...) - JWT / refreshToken interaction
non_priority
document jwts what is a jwt content signature payload claims jwt refreshtoken interaction
0
256,880
27,561,735,410
IssuesEvent
2023-03-07 22:43:03
samqws-marketing/box_box-ui-elements
https://api.github.com/repos/samqws-marketing/box_box-ui-elements
closed
CVE-2022-37598 (High) detected in uglify-js-3.6.9.tgz - autoclosed
security vulnerability
## CVE-2022-37598 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>uglify-js-3.6.9.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-3.6.9.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-3.6.9.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - conventional-changelog-3.1.18.tgz (Root Library) - conventional-changelog-core-4.1.4.tgz - conventional-changelog-writer-4.0.11.tgz - handlebars-4.5.3.tgz - :x: **uglify-js-3.6.9.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/box_box-ui-elements/commit/4fc776e2b95c8b497f6994cb2165365562ae1f82">4fc776e2b95c8b497f6994cb2165365562ae1f82</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ** DISPUTED ** Prototype pollution vulnerability in function DEFNODE in ast.js in mishoo UglifyJS 3.13.2 via the name variable in ast.js. NOTE: the vendor considers this an invalid report. <p>Publish Date: 2022-10-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-37598>CVE-2022-37598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-20</p> <p>Fix Resolution (uglify-js): 3.13.10</p> <p>Direct dependency fix Resolution (conventional-changelog): 3.1.19</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
True
CVE-2022-37598 (High) detected in uglify-js-3.6.9.tgz - autoclosed - ## CVE-2022-37598 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>uglify-js-3.6.9.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-3.6.9.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-3.6.9.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - conventional-changelog-3.1.18.tgz (Root Library) - conventional-changelog-core-4.1.4.tgz - conventional-changelog-writer-4.0.11.tgz - handlebars-4.5.3.tgz - :x: **uglify-js-3.6.9.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/box_box-ui-elements/commit/4fc776e2b95c8b497f6994cb2165365562ae1f82">4fc776e2b95c8b497f6994cb2165365562ae1f82</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ** DISPUTED ** Prototype pollution vulnerability in function DEFNODE in ast.js in mishoo UglifyJS 3.13.2 via the name variable in ast.js. NOTE: the vendor considers this an invalid report. <p>Publish Date: 2022-10-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-37598>CVE-2022-37598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-20</p> <p>Fix Resolution (uglify-js): 3.13.10</p> <p>Direct dependency fix Resolution (conventional-changelog): 3.1.19</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
non_priority
cve high detected in uglify js tgz autoclosed cve high severity vulnerability vulnerable library uglify js tgz javascript parser mangler compressor and beautifier toolkit library home page a href path to dependency file package json path to vulnerable library node modules uglify js package json dependency hierarchy conventional changelog tgz root library conventional changelog core tgz conventional changelog writer tgz handlebars tgz x uglify js tgz vulnerable library found in head commit a href found in base branch master vulnerability details disputed prototype pollution vulnerability in function defnode in ast js in mishoo uglifyjs via the name variable in ast js note the vendor considers this an invalid report publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution uglify js direct dependency fix resolution conventional changelog check this box to open an automated fix pr
0
86,524
10,509,368,859
IssuesEvent
2019-09-27 10:48:49
GEOLYTIX/xyz
https://api.github.com/repos/GEOLYTIX/xyz
opened
_new locations
Documentation
By default the locations.select function will query the endpoint for the locations data from the connected database. A new flag can be used to prevent the select method to query the location from the database. This is for example used when aggregate locations should be added the locations list and map. ``` _xyz.locations.select({ _new: true, geometry: JSON.parse(e.target.response.geomj), infoj: e.target.response.infoj, layer: layer, }); ```
1.0
_new locations - By default the locations.select function will query the endpoint for the locations data from the connected database. A new flag can be used to prevent the select method to query the location from the database. This is for example used when aggregate locations should be added the locations list and map. ``` _xyz.locations.select({ _new: true, geometry: JSON.parse(e.target.response.geomj), infoj: e.target.response.infoj, layer: layer, }); ```
non_priority
new locations by default the locations select function will query the endpoint for the locations data from the connected database a new flag can be used to prevent the select method to query the location from the database this is for example used when aggregate locations should be added the locations list and map xyz locations select new true geometry json parse e target response geomj infoj e target response infoj layer layer
0
385,412
26,635,568,055
IssuesEvent
2023-01-24 21:37:07
auth0/auth0-cli
https://api.github.com/repos/auth0/auth0-cli
closed
The process to use this tool on a private cloud is unclear
documentation
### Description The readme should clarify how to use this tool for private cloud instances. Currently, the readme has this to say: ``` The authenticator of the CLI defaults to the default Auth0 cloud auth0.auth0.com. This can be customized for personalized cloud offerings by setting the following env variables: AUTH0_AUDIENCE - The audience of the Auth0 Management API (System API) to use. AUTH0_CLIENT_ID - Client ID of an application configured with the Device Code grant type. AUTH0_DEVICE_CODE_ENDPOINT - Device Authorization URL AUTH0_OAUTH_TOKEN_ENDPOINT - OAuth Token URL ``` When I set these 4 env variables and run `auth0 login`, I am redirected to the finder app (I am running on a Mac) instead of the web browser. It is possible this is because I have the wrong values set and it is unable to start the device code process. Alternatively, there could be a bug with auth0-cli that will always redirect to finder if AUTH0_CLIENT_ID is set. See the conversation here: https://github.com/auth0/auth0-cli/issues/354 If I have the wrong values set, then it might be a good idea to clarify in the readme where these values can be found. ### Alternative Through trial and error, I did manage to get the CLI working by running these commands: ``` export AUTH0_CLI_CLIENT_DOMAIN=TENANT.PRIVATE_INSTANCE.auth0.com export AUTH0_CLI_CLIENT_ID=CLIENT_ID_OF_M2M_APPLICATION_IN_TENANT export AUTH0_CLI_CLIENT_SECRET=SECRET_OF_M2M_APPLICATION_IN_TENANT auth0 config init ``` This created ~.config/auth0/config.json and I was then able to run additional auth0 commands! If this is a valid method of setting this up, then I would suggest adding it to the readme.
1.0
The process to use this tool on a private cloud is unclear - ### Description The readme should clarify how to use this tool for private cloud instances. Currently, the readme has this to say: ``` The authenticator of the CLI defaults to the default Auth0 cloud auth0.auth0.com. This can be customized for personalized cloud offerings by setting the following env variables: AUTH0_AUDIENCE - The audience of the Auth0 Management API (System API) to use. AUTH0_CLIENT_ID - Client ID of an application configured with the Device Code grant type. AUTH0_DEVICE_CODE_ENDPOINT - Device Authorization URL AUTH0_OAUTH_TOKEN_ENDPOINT - OAuth Token URL ``` When I set these 4 env variables and run `auth0 login`, I am redirected to the finder app (I am running on a Mac) instead of the web browser. It is possible this is because I have the wrong values set and it is unable to start the device code process. Alternatively, there could be a bug with auth0-cli that will always redirect to finder if AUTH0_CLIENT_ID is set. See the conversation here: https://github.com/auth0/auth0-cli/issues/354 If I have the wrong values set, then it might be a good idea to clarify in the readme where these values can be found. ### Alternative Through trial and error, I did manage to get the CLI working by running these commands: ``` export AUTH0_CLI_CLIENT_DOMAIN=TENANT.PRIVATE_INSTANCE.auth0.com export AUTH0_CLI_CLIENT_ID=CLIENT_ID_OF_M2M_APPLICATION_IN_TENANT export AUTH0_CLI_CLIENT_SECRET=SECRET_OF_M2M_APPLICATION_IN_TENANT auth0 config init ``` This created ~.config/auth0/config.json and I was then able to run additional auth0 commands! If this is a valid method of setting this up, then I would suggest adding it to the readme.
non_priority
the process to use this tool on a private cloud is unclear description the readme should clarify how to use this tool for private cloud instances currently the readme has this to say the authenticator of the cli defaults to the default cloud com this can be customized for personalized cloud offerings by setting the following env variables audience the audience of the management api system api to use client id client id of an application configured with the device code grant type device code endpoint device authorization url oauth token endpoint oauth token url when i set these env variables and run login i am redirected to the finder app i am running on a mac instead of the web browser it is possible this is because i have the wrong values set and it is unable to start the device code process alternatively there could be a bug with cli that will always redirect to finder if client id is set see the conversation here if i have the wrong values set then it might be a good idea to clarify in the readme where these values can be found alternative through trial and error i did manage to get the cli working by running these commands export cli client domain tenant private instance com export cli client id client id of application in tenant export cli client secret secret of application in tenant config init this created config config json and i was then able to run additional commands if this is a valid method of setting this up then i would suggest adding it to the readme
0
198,899
15,727,423,246
IssuesEvent
2021-03-29 12:39:49
nim-lang/Nim
https://api.github.com/repos/nim-lang/Nim
closed
Documentation for strutils.escape is wrong
Documentation Stdlib
The documentation for strutils.escape says: > Escapes a string `s`. See system.addEscapedChar for the escaping scheme. But the actual escaping it does is not the same scheme mentioned in `addEscapedChar`. ```nim let msg = "\tHello world\n" var escaped = "" for c in msg: escaped.addEscapedChar(c) assert escaped == msg.escape("", "") # This fails ``` Either `escape` should do what it says on the tin, or the documentation should be updated to reflect what it actually does.
1.0
Documentation for strutils.escape is wrong - The documentation for strutils.escape says: > Escapes a string `s`. See system.addEscapedChar for the escaping scheme. But the actual escaping it does is not the same scheme mentioned in `addEscapedChar`. ```nim let msg = "\tHello world\n" var escaped = "" for c in msg: escaped.addEscapedChar(c) assert escaped == msg.escape("", "") # This fails ``` Either `escape` should do what it says on the tin, or the documentation should be updated to reflect what it actually does.
non_priority
documentation for strutils escape is wrong the documentation for strutils escape says escapes a string s see system addescapedchar for the escaping scheme but the actual escaping it does is not the same scheme mentioned in addescapedchar nim let msg thello world n var escaped for c in msg escaped addescapedchar c assert escaped msg escape this fails either escape should do what it says on the tin or the documentation should be updated to reflect what it actually does
0
155,892
19,803,103,257
IssuesEvent
2022-01-19 01:29:17
turkdevops/snyk
https://api.github.com/repos/turkdevops/snyk
opened
CVE-2022-23307 (Medium) detected in log4j-1.2.17.jar
security vulnerability
## CVE-2022-23307 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.17.jar</b></p></summary> <p>Apache Log4j 1.2</p> <p>Path to dependency file: /test/acceptance/workspaces/maven-multi-app/simple-child/pom.xml</p> <p>Path to vulnerable library: /r/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p> <p> Dependency Hierarchy: - :x: **log4j-1.2.17.jar** (Vulnerable Library) <p>Found in base branch: <b>ALL_HANDS/major-secrets</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists. <p>Publish Date: 2022-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23307>CVE-2022-23307</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-23307 (Medium) detected in log4j-1.2.17.jar - ## CVE-2022-23307 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.17.jar</b></p></summary> <p>Apache Log4j 1.2</p> <p>Path to dependency file: /test/acceptance/workspaces/maven-multi-app/simple-child/pom.xml</p> <p>Path to vulnerable library: /r/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p> <p> Dependency Hierarchy: - :x: **log4j-1.2.17.jar** (Vulnerable Library) <p>Found in base branch: <b>ALL_HANDS/major-secrets</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists. <p>Publish Date: 2022-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23307>CVE-2022-23307</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jar cve medium severity vulnerability vulnerable library jar apache path to dependency file test acceptance workspaces maven multi app simple child pom xml path to vulnerable library r repository jar dependency hierarchy x jar vulnerable library found in base branch all hands major secrets vulnerability details cve identified a deserialization issue that was present in apache chainsaw prior to chainsaw chainsaw was a component of apache x where the same issue exists publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href step up your open source security game with whitesource
0
7,589
3,587,365,834
IssuesEvent
2016-01-30 08:00:52
CodeforHawaii/organization
https://api.github.com/repos/CodeforHawaii/organization
closed
Conference Call w/ Andrew Hyder re: attendance tools
Code For America
Attendance Improvements Here are our hypothesis for why attendance is a super important data to track: 1. Fundraising 2. Identify new people, regulars, people who used to come 3. Pull stories, needs, and lessons from members 4. ??? What else would make you excited about this data? How would you prioritize these? How do you track attendance now? We want consistency? What challenges are there to collecting attendance? What are some other uses for this data? How can we package it for you?
1.0
Conference Call w/ Andrew Hyder re: attendance tools - Attendance Improvements Here are our hypothesis for why attendance is a super important data to track: 1. Fundraising 2. Identify new people, regulars, people who used to come 3. Pull stories, needs, and lessons from members 4. ??? What else would make you excited about this data? How would you prioritize these? How do you track attendance now? We want consistency? What challenges are there to collecting attendance? What are some other uses for this data? How can we package it for you?
non_priority
conference call w andrew hyder re attendance tools attendance improvements here are our hypothesis for why attendance is a super important data to track fundraising identify new people regulars people who used to come pull stories needs and lessons from members what else would make you excited about this data how would you prioritize these how do you track attendance now we want consistency what challenges are there to collecting attendance what are some other uses for this data how can we package it for you
0
18,380
3,688,647,530
IssuesEvent
2016-02-25 13:48:11
mautic/mautic
https://api.github.com/repos/mautic/mautic
closed
SQL statement exception for the mautic:campaign:trigger command
Bug Ready To Test
Hi, I'm getting the following error when running cron für campaign update: [Doctrine\DBAL\DBALException], An exception occurred while executing 'SELECT max(list_leads.lead_id) as max_id, count(distinct(list_leads.lead_id)) as lead_count FROM lead_lists_leads list_leads WHERE (list_leads.manually_removed = ?) AND (list_leads.leadlist_id IN ()) AND (li st_leads.date_added <= '2015-12-26 06:45:02') AND (NOT EXISTS (SELECT null FROM campaign_leads campaign_leads WHERE (campaign_leads.lead_id = list_leads.lead_id) AND (campaign_leads.manually_removed = ?) AND (campaign_leads.campaign_id = 6)))' with params [0, 0]:, SQLSTATE[42000]: Syntax error or access violation: 1064 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ')) AND (list_leads.date_added <= '2015-12-26 06:45:02') AND (NOT EXISTS (SELECT ' at line 1,,,,,,, [PDOException], SQLSTATE[42000]: Syntax error or access violation: 1064 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ')) AND (list_leads.date_added <= '2015-12-26 06:45:02') AND (NOT EXISTS (SELECT ' at line 1,,,,mautic:campaigns:update [-l|--batch-limit[="..."]] [-m|--max-leads[="..."]] [-i|--campaign-id[="..."]] [-f|--force],, What to do? Robert
1.0
SQL statement exception for the mautic:campaign:trigger command - Hi, I'm getting the following error when running cron für campaign update: [Doctrine\DBAL\DBALException], An exception occurred while executing 'SELECT max(list_leads.lead_id) as max_id, count(distinct(list_leads.lead_id)) as lead_count FROM lead_lists_leads list_leads WHERE (list_leads.manually_removed = ?) AND (list_leads.leadlist_id IN ()) AND (li st_leads.date_added <= '2015-12-26 06:45:02') AND (NOT EXISTS (SELECT null FROM campaign_leads campaign_leads WHERE (campaign_leads.lead_id = list_leads.lead_id) AND (campaign_leads.manually_removed = ?) AND (campaign_leads.campaign_id = 6)))' with params [0, 0]:, SQLSTATE[42000]: Syntax error or access violation: 1064 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ')) AND (list_leads.date_added <= '2015-12-26 06:45:02') AND (NOT EXISTS (SELECT ' at line 1,,,,,,, [PDOException], SQLSTATE[42000]: Syntax error or access violation: 1064 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ')) AND (list_leads.date_added <= '2015-12-26 06:45:02') AND (NOT EXISTS (SELECT ' at line 1,,,,mautic:campaigns:update [-l|--batch-limit[="..."]] [-m|--max-leads[="..."]] [-i|--campaign-id[="..."]] [-f|--force],, What to do? Robert
non_priority
sql statement exception for the mautic campaign trigger command hi i m getting the following error when running cron für campaign update an exception occurred while executing select max list leads lead id as max id count distinct list leads lead id as lead count from lead lists leads list leads where list leads manually removed and list leads leadlist id in and li st leads date added and not exists select null from campaign leads campaign leads where campaign leads lead id list leads lead id and campaign leads manually removed and campaign leads campaign id with params sqlstate syntax error or access violation you have an error in your sql syntax check the manual that corresponds to your mysql server version for the right syntax to use near and list leads date added and not exists select at line sqlstate syntax error or access violation you have an error in your sql syntax check the manual that corresponds to your mysql server version for the right syntax to use near and list leads date added and not exists select at line mautic campaigns update what to do robert
0
106,799
11,498,608,166
IssuesEvent
2020-02-12 12:21:30
paritytech/substrate
https://api.github.com/repos/paritytech/substrate
closed
Link to llvm on Mac OSX in README
F5-documentation 📄
The "Hacking on Substrate" section of the readme file instructs Mac users to `brew install llvm` but this won't necessarily override the llvm path if a user is using Xcode build tools. I recommend adding an instruction to temporarily set the new path `export PATH="/usr/local/opt/llvm/bin:$PATH"` or whatever their path is from `brew --prefix llvm`. That got substrate to build for me.
1.0
Link to llvm on Mac OSX in README - The "Hacking on Substrate" section of the readme file instructs Mac users to `brew install llvm` but this won't necessarily override the llvm path if a user is using Xcode build tools. I recommend adding an instruction to temporarily set the new path `export PATH="/usr/local/opt/llvm/bin:$PATH"` or whatever their path is from `brew --prefix llvm`. That got substrate to build for me.
non_priority
link to llvm on mac osx in readme the hacking on substrate section of the readme file instructs mac users to brew install llvm but this won t necessarily override the llvm path if a user is using xcode build tools i recommend adding an instruction to temporarily set the new path export path usr local opt llvm bin path or whatever their path is from brew prefix llvm that got substrate to build for me
0
29,741
4,535,654,405
IssuesEvent
2016-09-08 18:01:03
umts/pvta-multiplatform
https://api.github.com/repos/umts/pvta-multiplatform
closed
Tests For MyBusesController
testing-controller
We need to build out our testing coverage. The scope of this issue is unit tests for the functions defined within My Buses.
1.0
Tests For MyBusesController - We need to build out our testing coverage. The scope of this issue is unit tests for the functions defined within My Buses.
non_priority
tests for mybusescontroller we need to build out our testing coverage the scope of this issue is unit tests for the functions defined within my buses
0
135,344
12,682,380,767
IssuesEvent
2020-06-19 17:16:21
pawamoy/mkdocstrings
https://api.github.com/repos/pawamoy/mkdocstrings
reopened
Formatting objects differently depending on their inheritance
documentation feature
**Is your feature request related to a problem? Please describe.** For models and schemas it would be nice to display these in table format, rather than the current list of headers. I realise this makes sense for normal classes, but it is very verbose for a model class like pydantic, dataclasses, and marshmallow. I would like to show these in a more compact format. **Describe the solution you'd like** Markdown table would be good **Additional context** If you point me in the right direction i could look at adding a per class type jinja template or something? Related to https://github.com/pawamoy/pytkdocs/pull/51
1.0
Formatting objects differently depending on their inheritance - **Is your feature request related to a problem? Please describe.** For models and schemas it would be nice to display these in table format, rather than the current list of headers. I realise this makes sense for normal classes, but it is very verbose for a model class like pydantic, dataclasses, and marshmallow. I would like to show these in a more compact format. **Describe the solution you'd like** Markdown table would be good **Additional context** If you point me in the right direction i could look at adding a per class type jinja template or something? Related to https://github.com/pawamoy/pytkdocs/pull/51
non_priority
formatting objects differently depending on their inheritance is your feature request related to a problem please describe for models and schemas it would be nice to display these in table format rather than the current list of headers i realise this makes sense for normal classes but it is very verbose for a model class like pydantic dataclasses and marshmallow i would like to show these in a more compact format describe the solution you d like markdown table would be good additional context if you point me in the right direction i could look at adding a per class type jinja template or something related to
0
275,912
23,953,346,573
IssuesEvent
2022-09-12 13:17:14
wazuh/wazuh-kibana-app
https://api.github.com/repos/wazuh/wazuh-kibana-app
opened
Automation - Fix - Decoder - Restart warning after saves
automation automated-testcase
| Wazuh | Elastic | Rev | Security | | ----- | ------- | ---- | -------- | | 4.3.7 | 7.17.4 | 4308 | WZD | | Browser | | ------- | | Chrome | Description: The feature fails because there is a problem related to the "Restart warning" after creating a new decoder Actual response: message error is displayed ` AssertionError: Timed out retrying after 6500ms: Expected to find element: Spect result: Should run success without fail steps.
1.0
Automation - Fix - Decoder - Restart warning after saves - | Wazuh | Elastic | Rev | Security | | ----- | ------- | ---- | -------- | | 4.3.7 | 7.17.4 | 4308 | WZD | | Browser | | ------- | | Chrome | Description: The feature fails because there is a problem related to the "Restart warning" after creating a new decoder Actual response: message error is displayed ` AssertionError: Timed out retrying after 6500ms: Expected to find element: Spect result: Should run success without fail steps.
non_priority
automation fix decoder restart warning after saves wazuh elastic rev security wzd browser chrome description the feature fails because there is a problem related to the restart warning after creating a new decoder actual response message error is displayed assertionerror timed out retrying after expected to find element spect result should run success without fail steps
0
398,172
27,187,483,274
IssuesEvent
2023-02-19 11:57:01
DHBW-FN/OxideWM
https://api.github.com/repos/DHBW-FN/OxideWM
closed
reworking documentation
Documentation
Reworking documentation like performance specifications regarding formulating sentences instead of bullet points etc.
1.0
reworking documentation - Reworking documentation like performance specifications regarding formulating sentences instead of bullet points etc.
non_priority
reworking documentation reworking documentation like performance specifications regarding formulating sentences instead of bullet points etc
0
321,769
23,870,982,699
IssuesEvent
2022-09-07 14:48:43
signalfx/splunk-otel-collector-chart
https://api.github.com/repos/signalfx/splunk-otel-collector-chart
closed
Confusion regarding "Collector" vs "Connector"
documentation
AFAICT, the use of "Connector" is legacy or a typo or something. I think it should say "Collector" everywhere it says "Connector" today (e.g. in the About section in this repo). I suggest that we either a) change all occurrences of Connector to Collector, or b) clarify in the README what the difference is. :)
1.0
Confusion regarding "Collector" vs "Connector" - AFAICT, the use of "Connector" is legacy or a typo or something. I think it should say "Collector" everywhere it says "Connector" today (e.g. in the About section in this repo). I suggest that we either a) change all occurrences of Connector to Collector, or b) clarify in the README what the difference is. :)
non_priority
confusion regarding collector vs connector afaict the use of connector is legacy or a typo or something i think it should say collector everywhere it says connector today e g in the about section in this repo i suggest that we either a change all occurrences of connector to collector or b clarify in the readme what the difference is
0
155,483
12,257,805,078
IssuesEvent
2020-05-06 14:13:40
ubtue/DatenProbleme
https://api.github.com/repos/ubtue/DatenProbleme
closed
ISSN 1465-3877 Journal of Moral Education Mix aus Latest Articles und Standardartikel
Zotero_AUTO_RSS blocked ready for testing
Beim Harvesten mittels RSS werden auch die Latest Articles erfasst.
1.0
ISSN 1465-3877 Journal of Moral Education Mix aus Latest Articles und Standardartikel - Beim Harvesten mittels RSS werden auch die Latest Articles erfasst.
non_priority
issn journal of moral education mix aus latest articles und standardartikel beim harvesten mittels rss werden auch die latest articles erfasst
0
70,156
8,495,057,543
IssuesEvent
2018-10-29 02:40:18
Microsoft/vscode-azure-iot-edge
https://api.github.com/repos/Microsoft/vscode-azure-iot-edge
closed
context Path is not right on ubuntu
as designed
"contextPath": ".\\" iot@iot-box:~/Documents/file/1009/EdgeSolutionjava/EdgeSolution25$ docker build --rm -f "/home/iot/Documents/file/1009/EdgeSolutionjava/EdgeSolution25/modules/SampleModule25/Dockerfile.amd64" -t localhost:5000/samplemodule25:0.0.1-amd64 "/home/iot/Documents/file/1009/EdgeSolutionjava/EdgeSolution25/modules/SampleModule25/.\" "contextPath": ".\\abc" iot@iot-box:~/Documents/file/1009/EdgeSolutionjava/EdgeSolution25$ docker build --rm -f "/home/iot/Documents/file/1009/EdgeSolutionjava/EdgeSolution25/modules/SampleModule25/Dockerfile.amd64" -t localhost:5000/samplemodule25:0.0.1-amd64 "/home/iot/Documents/file/1009/EdgeSolutionjava/EdgeSolution25/modules/SampleModule25/.\" "contextPath": "\\home\\iot\\Document\\file\\1009\\" iot@iot-box:~/Documents/file/1009/EdgeSolutionjava/EdgeSolution25$ docker build --rm -f "/home/iot/Documents/file/1009/EdgeSolutionjava/EdgeSolution25/modules/SampleModule25/Dockerfile.amd64" -t localhost:5000/samplemodule25:0.0.1-amd64 "/home/iot/Documents/file/1009/EdgeSolutionjava/EdgeSolution25/modules/SampleModule25/\home\iot\Document\file\1009\"
1.0
context Path is not right on ubuntu - "contextPath": ".\\" iot@iot-box:~/Documents/file/1009/EdgeSolutionjava/EdgeSolution25$ docker build --rm -f "/home/iot/Documents/file/1009/EdgeSolutionjava/EdgeSolution25/modules/SampleModule25/Dockerfile.amd64" -t localhost:5000/samplemodule25:0.0.1-amd64 "/home/iot/Documents/file/1009/EdgeSolutionjava/EdgeSolution25/modules/SampleModule25/.\" "contextPath": ".\\abc" iot@iot-box:~/Documents/file/1009/EdgeSolutionjava/EdgeSolution25$ docker build --rm -f "/home/iot/Documents/file/1009/EdgeSolutionjava/EdgeSolution25/modules/SampleModule25/Dockerfile.amd64" -t localhost:5000/samplemodule25:0.0.1-amd64 "/home/iot/Documents/file/1009/EdgeSolutionjava/EdgeSolution25/modules/SampleModule25/.\" "contextPath": "\\home\\iot\\Document\\file\\1009\\" iot@iot-box:~/Documents/file/1009/EdgeSolutionjava/EdgeSolution25$ docker build --rm -f "/home/iot/Documents/file/1009/EdgeSolutionjava/EdgeSolution25/modules/SampleModule25/Dockerfile.amd64" -t localhost:5000/samplemodule25:0.0.1-amd64 "/home/iot/Documents/file/1009/EdgeSolutionjava/EdgeSolution25/modules/SampleModule25/\home\iot\Document\file\1009\"
non_priority
context path is not right on ubuntu contextpath iot iot box documents file edgesolutionjava docker build rm f home iot documents file edgesolutionjava modules dockerfile t localhost home iot documents file edgesolutionjava modules contextpath abc iot iot box documents file edgesolutionjava docker build rm f home iot documents file edgesolutionjava modules dockerfile t localhost home iot documents file edgesolutionjava modules contextpath home iot document file iot iot box documents file edgesolutionjava docker build rm f home iot documents file edgesolutionjava modules dockerfile t localhost home iot documents file edgesolutionjava modules home iot document file
0
216,104
16,629,193,301
IssuesEvent
2021-06-03 13:36:41
Concordium/concordium.github.io
https://api.github.com/repos/Concordium/concordium.github.io
closed
Create variable info for mainnet and new testnet
[Type] Task documentation
Use variables instead of net names in the documentation to make it easier to maintain and update.
1.0
Create variable info for mainnet and new testnet - Use variables instead of net names in the documentation to make it easier to maintain and update.
non_priority
create variable info for mainnet and new testnet use variables instead of net names in the documentation to make it easier to maintain and update
0
297,778
25,763,258,384
IssuesEvent
2022-12-08 22:36:56
curl/curl
https://api.github.com/repos/curl/curl
closed
hyper: root cause of curl test 265 failure
HTTP tests Hyper
<!-- Only file bugs here! Ask questions on the mailing lists https://curl.se/mail/ SECURITY RELATED? Post it here: https://hackerone.com/curl There are collections of known issues to be aware of: https://curl.se/docs/knownbugs.html https://curl.se/docs/todo.html --> ### I did this Ran curl test 265, analyzed the debug trace and generated logs, concluded that hyper is probably closing the connection on receiving a HTTP/1.0 response. I switched HTTP/1.0 with HTTP/1.1 at these locations - https://github.com/curl/curl/blob/bda0d5fb84286db683c1b50c2c7e74e16b26047d/tests/data/test265#L17 https://github.com/curl/curl/blob/bda0d5fb84286db683c1b50c2c7e74e16b26047d/tests/data/test265#L55 The test seems to be passing, though there are a few small differences in the output - ```log 265: protocol FAILED: --- log/check-expected 2022-05-14 16:27:59.457379329 +0530 +++ log/check-generated 2022-05-14 16:27:59.457379329 +0530 @@ -1,16 +1,16 @@ -CONNECT test.remote.example.com.265:44167 HTTP/1.1[LF] +CONNECT test.remote.example.com.265:44167 HTTP/1.1[CR][LF] Host: test.remote.example.com.265:44167[CR][LF] Proxy-Authorization: NTLM TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA=[CR][LF] User-Agent: curl/7.83.1-DEV[CR][LF] Proxy-Connection: Keep-Alive[CR][LF] [CR][LF] -CONNECT test.remote.example.com.265:44167 HTTP/1.1[LF] +CONNECT test.remote.example.com.265:44167 HTTP/1.1[CR][LF] Host: test.remote.example.com.265:44167[CR][LF] Proxy-Authorization: NTLM TlRMTVNTUAADAAAAGAAYAEAAAAAYABgAWAAAAAAAAABwAAAACAAIAHAAAAAIAAgAeAAAAAAAAAAAAAAAhoIBAFpkQwKRCZFMhjj0tw47wEjKHRHlvzfxQamFcheMuv8v+xeqphEO5V41xRd7R9deOXRlc3R1c2VyY3VybGhvc3Q=[CR][LF] User-Agent: curl/7.83.1-DEV[CR][LF] Proxy-Connection: Keep-Alive[CR][LF] [CR][LF] -POST /path/2650002 HTTP/1.1[LF] +POST /path/2650002 HTTP/1.1[CR][LF] Host: test.remote.example.com.265:44167[CR][LF] User-Agent: curl/7.83.1-DEV[CR][LF] Accept: */*[CR][LF] ``` ### I expected the following After switching to HTTP/1.1, I expected the test case to pass, but there are a few small differences. ### curl/libcurl version ```output curl 7.83.1-DEV (x86_64-pc-linux-gnu) libcurl/7.83.1-DEV OpenSSL/1.1.1o zlib/1.2.12 brotli/1.0.9 zstd/1.5.2 libidn2/2.3.2 libpsl/0.21.1 (+libidn2/2.3.0) librtmp/2.3 Hyper/0.14.18 OpenLDAP/2.6.1 Release-Date: [unreleased] Protocols: dict file ftp ftps gopher gophers http https imap imaps ldap ldaps mqtt pop3 pop3s rtmp smb smbs smtp smtps telnet tftp Features: alt-svc AsynchDNS brotli Debug HSTS HTTP2 HTTPS-proxy IDN Largefile libz NTLM NTLM_WB PSL SSL TLS-SRP TrackMemory UnixSockets zstd ``` ### operating system <!-- On Unix please post the output of "uname -a" --> ```output Linux msi 5.15.38-1-MANJARO #1 SMP PREEMPT Mon May 9 07:52:21 UTC 2022 x86_64 GNU/Linux ```
1.0
hyper: root cause of curl test 265 failure - <!-- Only file bugs here! Ask questions on the mailing lists https://curl.se/mail/ SECURITY RELATED? Post it here: https://hackerone.com/curl There are collections of known issues to be aware of: https://curl.se/docs/knownbugs.html https://curl.se/docs/todo.html --> ### I did this Ran curl test 265, analyzed the debug trace and generated logs, concluded that hyper is probably closing the connection on receiving a HTTP/1.0 response. I switched HTTP/1.0 with HTTP/1.1 at these locations - https://github.com/curl/curl/blob/bda0d5fb84286db683c1b50c2c7e74e16b26047d/tests/data/test265#L17 https://github.com/curl/curl/blob/bda0d5fb84286db683c1b50c2c7e74e16b26047d/tests/data/test265#L55 The test seems to be passing, though there are a few small differences in the output - ```log 265: protocol FAILED: --- log/check-expected 2022-05-14 16:27:59.457379329 +0530 +++ log/check-generated 2022-05-14 16:27:59.457379329 +0530 @@ -1,16 +1,16 @@ -CONNECT test.remote.example.com.265:44167 HTTP/1.1[LF] +CONNECT test.remote.example.com.265:44167 HTTP/1.1[CR][LF] Host: test.remote.example.com.265:44167[CR][LF] Proxy-Authorization: NTLM TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA=[CR][LF] User-Agent: curl/7.83.1-DEV[CR][LF] Proxy-Connection: Keep-Alive[CR][LF] [CR][LF] -CONNECT test.remote.example.com.265:44167 HTTP/1.1[LF] +CONNECT test.remote.example.com.265:44167 HTTP/1.1[CR][LF] Host: test.remote.example.com.265:44167[CR][LF] Proxy-Authorization: NTLM TlRMTVNTUAADAAAAGAAYAEAAAAAYABgAWAAAAAAAAABwAAAACAAIAHAAAAAIAAgAeAAAAAAAAAAAAAAAhoIBAFpkQwKRCZFMhjj0tw47wEjKHRHlvzfxQamFcheMuv8v+xeqphEO5V41xRd7R9deOXRlc3R1c2VyY3VybGhvc3Q=[CR][LF] User-Agent: curl/7.83.1-DEV[CR][LF] Proxy-Connection: Keep-Alive[CR][LF] [CR][LF] -POST /path/2650002 HTTP/1.1[LF] +POST /path/2650002 HTTP/1.1[CR][LF] Host: test.remote.example.com.265:44167[CR][LF] User-Agent: curl/7.83.1-DEV[CR][LF] Accept: */*[CR][LF] ``` ### I expected the following After switching to HTTP/1.1, I expected the test case to pass, but there are a few small differences. ### curl/libcurl version ```output curl 7.83.1-DEV (x86_64-pc-linux-gnu) libcurl/7.83.1-DEV OpenSSL/1.1.1o zlib/1.2.12 brotli/1.0.9 zstd/1.5.2 libidn2/2.3.2 libpsl/0.21.1 (+libidn2/2.3.0) librtmp/2.3 Hyper/0.14.18 OpenLDAP/2.6.1 Release-Date: [unreleased] Protocols: dict file ftp ftps gopher gophers http https imap imaps ldap ldaps mqtt pop3 pop3s rtmp smb smbs smtp smtps telnet tftp Features: alt-svc AsynchDNS brotli Debug HSTS HTTP2 HTTPS-proxy IDN Largefile libz NTLM NTLM_WB PSL SSL TLS-SRP TrackMemory UnixSockets zstd ``` ### operating system <!-- On Unix please post the output of "uname -a" --> ```output Linux msi 5.15.38-1-MANJARO #1 SMP PREEMPT Mon May 9 07:52:21 UTC 2022 x86_64 GNU/Linux ```
non_priority
hyper root cause of curl test failure only file bugs here ask questions on the mailing lists security related post it here there are collections of known issues to be aware of i did this ran curl test analyzed the debug trace and generated logs concluded that hyper is probably closing the connection on receiving a http response i switched http with http at these locations the test seems to be passing though there are a few small differences in the output log protocol failed log check expected log check generated connect test remote example com http connect test remote example com http host test remote example com proxy authorization ntlm tlrmtvntuaabaaaaboiiaaaaaaaaaaaaaaaaaaaaaaa user agent curl dev proxy connection keep alive connect test remote example com http connect test remote example com http host test remote example com proxy authorization ntlm user agent curl dev proxy connection keep alive post path http post path http host test remote example com user agent curl dev accept i expected the following after switching to http i expected the test case to pass but there are a few small differences curl libcurl version output curl dev pc linux gnu libcurl dev openssl zlib brotli zstd libpsl librtmp hyper openldap release date protocols dict file ftp ftps gopher gophers http https imap imaps ldap ldaps mqtt rtmp smb smbs smtp smtps telnet tftp features alt svc asynchdns brotli debug hsts https proxy idn largefile libz ntlm ntlm wb psl ssl tls srp trackmemory unixsockets zstd operating system output linux msi manjaro smp preempt mon may utc gnu linux
0
68,934
8,361,819,406
IssuesEvent
2018-10-03 15:13:55
WordPress/gutenberg
https://api.github.com/repos/WordPress/gutenberg
closed
"Stick to the Front Page" should use a toggle instead of a checkmark
Accessibility Needs Design Feedback
**Is your feature request related to a problem? Please describe.** We using toggles to indicate on/off. I think that the sticky option is an on/off option, and should use a toggle instead of a checkmark. **Describe the solution you'd like** Change the action from a checkmark to a toggle. ![image](https://user-images.githubusercontent.com/2846578/46363252-7fda0000-c640-11e8-92e6-1c11c36ab9ce.png) Related: #2146, #3072
1.0
"Stick to the Front Page" should use a toggle instead of a checkmark - **Is your feature request related to a problem? Please describe.** We using toggles to indicate on/off. I think that the sticky option is an on/off option, and should use a toggle instead of a checkmark. **Describe the solution you'd like** Change the action from a checkmark to a toggle. ![image](https://user-images.githubusercontent.com/2846578/46363252-7fda0000-c640-11e8-92e6-1c11c36ab9ce.png) Related: #2146, #3072
non_priority
stick to the front page should use a toggle instead of a checkmark is your feature request related to a problem please describe we using toggles to indicate on off i think that the sticky option is an on off option and should use a toggle instead of a checkmark describe the solution you d like change the action from a checkmark to a toggle related
0
7,342
7,893,008,722
IssuesEvent
2018-06-28 16:37:41
uber/cadence
https://api.github.com/repos/uber/cadence
opened
Include LastHeartbeatTimestamp on ActivityTimedout event
serviceability
If we timeout an activity due to heartbeat we immediately delete the activity info and it becomes very hard to identify if the timeout happened due to client not calling heartbeat or some other server issue. It will be useful to also include last heartbeat timestamp on the history event for debugging purpose.
1.0
Include LastHeartbeatTimestamp on ActivityTimedout event - If we timeout an activity due to heartbeat we immediately delete the activity info and it becomes very hard to identify if the timeout happened due to client not calling heartbeat or some other server issue. It will be useful to also include last heartbeat timestamp on the history event for debugging purpose.
non_priority
include lastheartbeattimestamp on activitytimedout event if we timeout an activity due to heartbeat we immediately delete the activity info and it becomes very hard to identify if the timeout happened due to client not calling heartbeat or some other server issue it will be useful to also include last heartbeat timestamp on the history event for debugging purpose
0
68,298
17,212,010,065
IssuesEvent
2021-07-19 06:31:29
eclipse/hono
https://api.github.com/repos/eclipse/hono
opened
Run ITs using a dedicated Infinispan server
build system
The ITs are currently run using an embedded Infinispan cache in the Command Router and Device Connection components. However, in production a dedicated Infinispan server/cluster will usually be employed. It therefore seems reasonable to run ITs using a dedicated Infinispan server as well, in order to identify issues early on in the development process.
1.0
Run ITs using a dedicated Infinispan server - The ITs are currently run using an embedded Infinispan cache in the Command Router and Device Connection components. However, in production a dedicated Infinispan server/cluster will usually be employed. It therefore seems reasonable to run ITs using a dedicated Infinispan server as well, in order to identify issues early on in the development process.
non_priority
run its using a dedicated infinispan server the its are currently run using an embedded infinispan cache in the command router and device connection components however in production a dedicated infinispan server cluster will usually be employed it therefore seems reasonable to run its using a dedicated infinispan server as well in order to identify issues early on in the development process
0
12,753
3,644,509,684
IssuesEvent
2016-02-15 10:14:33
fergiemcdowall/search-index
https://api.github.com/repos/fergiemcdowall/search-index
closed
Add wiki page for stopwords and why it's a common error
documentation
Add a wiki page, explaining how stopwords work, and that it's quite common error when getting no results back from your index. ```JSON /search?q={"*": ["my", "way"]} ``` [Stopword arrays available](https://github.com/fergiemcdowall/stopword/tree/master/lib) in `search-index` for the different languages.
1.0
Add wiki page for stopwords and why it's a common error - Add a wiki page, explaining how stopwords work, and that it's quite common error when getting no results back from your index. ```JSON /search?q={"*": ["my", "way"]} ``` [Stopword arrays available](https://github.com/fergiemcdowall/stopword/tree/master/lib) in `search-index` for the different languages.
non_priority
add wiki page for stopwords and why it s a common error add a wiki page explaining how stopwords work and that it s quite common error when getting no results back from your index json search q in search index for the different languages
0
2,668
3,572,761,804
IssuesEvent
2016-01-27 01:15:29
hashicorp/consul
https://api.github.com/repos/hashicorp/consul
opened
Periodically redistribute RPC client connections...
bug enhancement performance
Right now RPC clients will reuse their last connection indefinitely if they've made a recent RPC request. Clients should periodically change the server they talk to in order to redistribute query volume across the entire cluster of consul servers.
True
Periodically redistribute RPC client connections... - Right now RPC clients will reuse their last connection indefinitely if they've made a recent RPC request. Clients should periodically change the server they talk to in order to redistribute query volume across the entire cluster of consul servers.
non_priority
periodically redistribute rpc client connections right now rpc clients will reuse their last connection indefinitely if they ve made a recent rpc request clients should periodically change the server they talk to in order to redistribute query volume across the entire cluster of consul servers
0
240,153
26,254,327,648
IssuesEvent
2023-01-05 22:33:07
TreyM-WSS/terra-clinical
https://api.github.com/repos/TreyM-WSS/terra-clinical
opened
CVE-2021-3918 (High) detected in json-schema-0.2.3.tgz
security vulnerability
## CVE-2021-3918 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>json-schema-0.2.3.tgz</b></p></summary> <p>JSON Schema validation and specifications</p> <p>Library home page: <a href="https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz">https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/json-schema/package.json</p> <p> Dependency Hierarchy: - terra-toolkit-6.0.0.tgz (Root Library) - node-sass-4.14.0.tgz - request-2.88.2.tgz - http-signature-1.2.0.tgz - jsprim-1.4.1.tgz - :x: **json-schema-0.2.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/TreyM-WSS/terra-clinical/commit/0940364474cdf2812b34bb24824139d7e3f8060b">0940364474cdf2812b34bb24824139d7e3f8060b</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') <p>Publish Date: 2021-11-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-3918>CVE-2021-3918</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">https://nvd.nist.gov/vuln/detail/CVE-2021-3918</a></p> <p>Release Date: 2021-11-13</p> <p>Fix Resolution (json-schema): 0.4.0</p> <p>Direct dependency fix Resolution (terra-toolkit): 6.1.0</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue
True
CVE-2021-3918 (High) detected in json-schema-0.2.3.tgz - ## CVE-2021-3918 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>json-schema-0.2.3.tgz</b></p></summary> <p>JSON Schema validation and specifications</p> <p>Library home page: <a href="https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz">https://registry.npmjs.org/json-schema/-/json-schema-0.2.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/json-schema/package.json</p> <p> Dependency Hierarchy: - terra-toolkit-6.0.0.tgz (Root Library) - node-sass-4.14.0.tgz - request-2.88.2.tgz - http-signature-1.2.0.tgz - jsprim-1.4.1.tgz - :x: **json-schema-0.2.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/TreyM-WSS/terra-clinical/commit/0940364474cdf2812b34bb24824139d7e3f8060b">0940364474cdf2812b34bb24824139d7e3f8060b</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') <p>Publish Date: 2021-11-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-3918>CVE-2021-3918</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">https://nvd.nist.gov/vuln/detail/CVE-2021-3918</a></p> <p>Release Date: 2021-11-13</p> <p>Fix Resolution (json-schema): 0.4.0</p> <p>Direct dependency fix Resolution (terra-toolkit): 6.1.0</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue
non_priority
cve high detected in json schema tgz cve high severity vulnerability vulnerable library json schema tgz json schema validation and specifications library home page a href path to dependency file package json path to vulnerable library node modules json schema package json dependency hierarchy terra toolkit tgz root library node sass tgz request tgz http signature tgz jsprim tgz x json schema tgz vulnerable library found in head commit a href found in base branch master vulnerability details json schema is vulnerable to improperly controlled modification of object prototype attributes prototype pollution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution json schema direct dependency fix resolution terra toolkit rescue worker helmet automatic remediation is available for this issue
0
125,094
16,721,777,172
IssuesEvent
2021-06-10 08:13:12
elastic/observability-design
https://api.github.com/repos/elastic/observability-design
closed
Explore design solutions for consistent filtering patterns across Observability
design unified-observability
## Summary of the problem Continuing from our research and interviews with stakeholders, we want to take the next step and start our design exploration of how we can apply and enhance existing patterns that will enable the user to have an intuitive and simple filtering experience in all of the Observability apps. ## Deliverables In this phase, we are planning on delivering specific design solutions and define an approach for how to implement more consistent filtering across Observability. ### Research [Figma file](https://www.figma.com/file/QBl103r3ftaGnWu9fVGcRX/1244-Filtering?node-id=2%3A0) with examples of existing filtering experiences within Kibana. WIP ### User journeys/flows TBD ### User journey diagram TBD ### Low-fi wireframes TBD ### (Optional) hi-fi mockups/prototypes TBD ## Related issues https://github.com/elastic/kibana/issues/82751 https://github.com/elastic/kibana/issues/94879
1.0
Explore design solutions for consistent filtering patterns across Observability - ## Summary of the problem Continuing from our research and interviews with stakeholders, we want to take the next step and start our design exploration of how we can apply and enhance existing patterns that will enable the user to have an intuitive and simple filtering experience in all of the Observability apps. ## Deliverables In this phase, we are planning on delivering specific design solutions and define an approach for how to implement more consistent filtering across Observability. ### Research [Figma file](https://www.figma.com/file/QBl103r3ftaGnWu9fVGcRX/1244-Filtering?node-id=2%3A0) with examples of existing filtering experiences within Kibana. WIP ### User journeys/flows TBD ### User journey diagram TBD ### Low-fi wireframes TBD ### (Optional) hi-fi mockups/prototypes TBD ## Related issues https://github.com/elastic/kibana/issues/82751 https://github.com/elastic/kibana/issues/94879
non_priority
explore design solutions for consistent filtering patterns across observability summary of the problem continuing from our research and interviews with stakeholders we want to take the next step and start our design exploration of how we can apply and enhance existing patterns that will enable the user to have an intuitive and simple filtering experience in all of the observability apps deliverables in this phase we are planning on delivering specific design solutions and define an approach for how to implement more consistent filtering across observability research with examples of existing filtering experiences within kibana wip user journeys flows tbd user journey diagram tbd low fi wireframes tbd optional hi fi mockups prototypes tbd related issues
0
9,863
4,662,169,842
IssuesEvent
2016-10-05 01:59:01
enove/Thriver
https://api.github.com/repos/enove/Thriver
opened
Work Section Content Accordions
build
We will need to implement the collapsed content we talked about in the work section. How will we be going about doing this? @micchickenburger I will comment the commit on this issue once styles for details/accordion are complete.
1.0
Work Section Content Accordions - We will need to implement the collapsed content we talked about in the work section. How will we be going about doing this? @micchickenburger I will comment the commit on this issue once styles for details/accordion are complete.
non_priority
work section content accordions we will need to implement the collapsed content we talked about in the work section how will we be going about doing this micchickenburger i will comment the commit on this issue once styles for details accordion are complete
0
229,880
17,581,306,895
IssuesEvent
2021-08-16 07:50:52
flutter/flutter
https://api.github.com/repos/flutter/flutter
closed
[video_player] Remove iOS simulator support warning from documentation
platform-ios plugin p: first party p: video_player documentation passed first triage P5
Remove the following warning from https://pub.dev/packages/video_player#installation when the fix lands in flutter's stable channel. Currently, this is only working on `master` for me. ```bash iOS Warning: The video player is not functional on iOS simulators. An iOS device must be used during development/testing. ``` Reference -> https://github.com/flutter/flutter/issues/14647#issuecomment-706323442
1.0
[video_player] Remove iOS simulator support warning from documentation - Remove the following warning from https://pub.dev/packages/video_player#installation when the fix lands in flutter's stable channel. Currently, this is only working on `master` for me. ```bash iOS Warning: The video player is not functional on iOS simulators. An iOS device must be used during development/testing. ``` Reference -> https://github.com/flutter/flutter/issues/14647#issuecomment-706323442
non_priority
remove ios simulator support warning from documentation remove the following warning from when the fix lands in flutter s stable channel currently this is only working on master for me bash ios warning the video player is not functional on ios simulators an ios device must be used during development testing reference
0
91,377
8,303,852,649
IssuesEvent
2018-09-21 19:00:26
tschottdorf/cockroach
https://api.github.com/repos/tschottdorf/cockroach
closed
teamcity: failed test: lint/TestLint
C-test-failure O-robot
The following tests appear to have failed on release-banana. You may want to check [for open issues](https://github.com/cockroachdb/cockroach/issues?q=is%3Aissue+is%3Aopen+lint/TestLint). [#864629](https://teamcity.cockroachdb.com/viewLog.html?buildId=864629): ``` --- FAIL: lint/TestLint (146.050s) --- FAIL: lint/TestLint: TestLint/TestGolint (71.030s) lint_test.go:1202: pkg/kv/txn_coord_sender.go:717:10: if block ends with a return statement, so drop this else and outdent its block ------- Stdout: ------- === PAUSE TestLint/TestGolint --- FAIL: lint/TestLint (146.050s) --- FAIL: lint/TestLint: TestLint/TestGolint (71.030s) lint_test.go:1202: pkg/kv/txn_coord_sender.go:717:10: if block ends with a return statement, so drop this else and outdent its block ------- Stdout: ------- === PAUSE TestLint/TestGolint ``` Please assign, take a look and update the issue accordingly.
1.0
teamcity: failed test: lint/TestLint - The following tests appear to have failed on release-banana. You may want to check [for open issues](https://github.com/cockroachdb/cockroach/issues?q=is%3Aissue+is%3Aopen+lint/TestLint). [#864629](https://teamcity.cockroachdb.com/viewLog.html?buildId=864629): ``` --- FAIL: lint/TestLint (146.050s) --- FAIL: lint/TestLint: TestLint/TestGolint (71.030s) lint_test.go:1202: pkg/kv/txn_coord_sender.go:717:10: if block ends with a return statement, so drop this else and outdent its block ------- Stdout: ------- === PAUSE TestLint/TestGolint --- FAIL: lint/TestLint (146.050s) --- FAIL: lint/TestLint: TestLint/TestGolint (71.030s) lint_test.go:1202: pkg/kv/txn_coord_sender.go:717:10: if block ends with a return statement, so drop this else and outdent its block ------- Stdout: ------- === PAUSE TestLint/TestGolint ``` Please assign, take a look and update the issue accordingly.
non_priority
teamcity failed test lint testlint the following tests appear to have failed on release banana you may want to check fail lint testlint fail lint testlint testlint testgolint lint test go pkg kv txn coord sender go if block ends with a return statement so drop this else and outdent its block stdout pause testlint testgolint fail lint testlint fail lint testlint testlint testgolint lint test go pkg kv txn coord sender go if block ends with a return statement so drop this else and outdent its block stdout pause testlint testgolint please assign take a look and update the issue accordingly
0
21,978
11,660,548,074
IssuesEvent
2020-03-03 03:43:14
cityofaustin/atd-vz-data
https://api.github.com/repos/cityofaustin/atd-vz-data
closed
VZD | Automated location associations to crash records
Epic Need: 1-Must Have Project: Vision Zero Crash Data System Service: Dev Workgroup: VZ
The scope of #483 was specific to setting up the columns required and performing a one-off association for non-CR3 records. In discussions for that issue we've identified more work that needs to be tackled for the long-term management of associating locations to crashes: [] Automate CR3 records association to locations [] Automate non-CR3 records association to locations [] At a minimum, these association scripts could run as an hourly or daily job, but ideally, each script would run on new record creation, or when coordinates get updated on an existing record We should hold off on tackling this work until we have a more comprehensive dataset of locations which is currently pending from the VZ team.
1.0
VZD | Automated location associations to crash records - The scope of #483 was specific to setting up the columns required and performing a one-off association for non-CR3 records. In discussions for that issue we've identified more work that needs to be tackled for the long-term management of associating locations to crashes: [] Automate CR3 records association to locations [] Automate non-CR3 records association to locations [] At a minimum, these association scripts could run as an hourly or daily job, but ideally, each script would run on new record creation, or when coordinates get updated on an existing record We should hold off on tackling this work until we have a more comprehensive dataset of locations which is currently pending from the VZ team.
non_priority
vzd automated location associations to crash records the scope of was specific to setting up the columns required and performing a one off association for non records in discussions for that issue we ve identified more work that needs to be tackled for the long term management of associating locations to crashes automate records association to locations automate non records association to locations at a minimum these association scripts could run as an hourly or daily job but ideally each script would run on new record creation or when coordinates get updated on an existing record we should hold off on tackling this work until we have a more comprehensive dataset of locations which is currently pending from the vz team
0
108,518
9,309,588,973
IssuesEvent
2019-03-25 16:48:09
mozilla/iris
https://api.github.com/repos/mozilla/iris
closed
Fix open_bookmark_from_toolbar
test case
open_bookmark_from_toolbar - Open a bookmark in a New Tab By: dbakaev -- 1 | 3:36:40 AM | 019-03-18 03:36:40,110 [ERROR] [iris.test_case] >>> ERROR <<< Error encountered in test
1.0
Fix open_bookmark_from_toolbar - open_bookmark_from_toolbar - Open a bookmark in a New Tab By: dbakaev -- 1 | 3:36:40 AM | 019-03-18 03:36:40,110 [ERROR] [iris.test_case] >>> ERROR <<< Error encountered in test
non_priority
fix open bookmark from toolbar open bookmark from toolbar open a bookmark in a new tab by dbakaev am error error encountered in test
0
373,986
26,094,892,107
IssuesEvent
2022-12-26 17:39:46
thalesgroup-cert/Watcher
https://api.github.com/repos/thalesgroup-cert/Watcher
closed
[Improvements] Suggesting some improvements
documentation enhancement
First of all thanks for creating and sharing such a great project. 💯 I have some suggestions regarding the code and the documentation. For the documentation it would be useful if you can add docker and docker-compose version which are compatible and used by your project. Regarding the code: Django apps contains `core.py` maybe it's better to use a different filename as 'core' in Django also refers to builtin core modules of Django. I'd suggest `services.py` or `utils.py` it would make the code more clear and readable. Regarding the `threats_watcher` app why are you saving only tokenized words in `TrendyWord` and not the complete post content? IMHO it's more useful to have the complete content of a post. While I was checking your code I found that `RSS-Bridge` is used for Twitter. If the docker is used only for Twitter maybe you can use some tool like https://github.com/InQuest/ThreatIngestor which can extract and aggregate threat intelligence from RSS feeds, Twitter, Pastebin and other sources. This would smoother more your project as a docker image like `RSS-Bridge` is overkill if only used for twitter. In the `site_monitoring` app's model rtir – Identification number of RTIR should be a non required field as some people might not have https://github.com/bestpractical/rt RTIR platform configured o in place. Also the `Expiry Date` field in some cases is not the best option as you might want to monitor a certain domain until it's takendown and you don't know the exact date when this will happen at first. Screenshots: In `site_monitoring` and in `dns_finder` it's an awesome feature if you can take screenshots of domain and also check for changes of the image. You could use https://hub.docker.com/r/scrapinghub/splash to take screenshots and https://pypi.org/project/ImageHash/ to check how the image was changed. Why are you using MySQL as the DB? There are some other solutions like PostgreSQL which has builtin ArrayFields and JSONFields which could ease some model implementations. Hope this helps.
1.0
[Improvements] Suggesting some improvements - First of all thanks for creating and sharing such a great project. 💯 I have some suggestions regarding the code and the documentation. For the documentation it would be useful if you can add docker and docker-compose version which are compatible and used by your project. Regarding the code: Django apps contains `core.py` maybe it's better to use a different filename as 'core' in Django also refers to builtin core modules of Django. I'd suggest `services.py` or `utils.py` it would make the code more clear and readable. Regarding the `threats_watcher` app why are you saving only tokenized words in `TrendyWord` and not the complete post content? IMHO it's more useful to have the complete content of a post. While I was checking your code I found that `RSS-Bridge` is used for Twitter. If the docker is used only for Twitter maybe you can use some tool like https://github.com/InQuest/ThreatIngestor which can extract and aggregate threat intelligence from RSS feeds, Twitter, Pastebin and other sources. This would smoother more your project as a docker image like `RSS-Bridge` is overkill if only used for twitter. In the `site_monitoring` app's model rtir – Identification number of RTIR should be a non required field as some people might not have https://github.com/bestpractical/rt RTIR platform configured o in place. Also the `Expiry Date` field in some cases is not the best option as you might want to monitor a certain domain until it's takendown and you don't know the exact date when this will happen at first. Screenshots: In `site_monitoring` and in `dns_finder` it's an awesome feature if you can take screenshots of domain and also check for changes of the image. You could use https://hub.docker.com/r/scrapinghub/splash to take screenshots and https://pypi.org/project/ImageHash/ to check how the image was changed. Why are you using MySQL as the DB? There are some other solutions like PostgreSQL which has builtin ArrayFields and JSONFields which could ease some model implementations. Hope this helps.
non_priority
suggesting some improvements first of all thanks for creating and sharing such a great project 💯 i have some suggestions regarding the code and the documentation for the documentation it would be useful if you can add docker and docker compose version which are compatible and used by your project regarding the code django apps contains core py maybe it s better to use a different filename as core in django also refers to builtin core modules of django i d suggest services py or utils py it would make the code more clear and readable regarding the threats watcher app why are you saving only tokenized words in trendyword and not the complete post content imho it s more useful to have the complete content of a post while i was checking your code i found that rss bridge is used for twitter if the docker is used only for twitter maybe you can use some tool like which can extract and aggregate threat intelligence from rss feeds twitter pastebin and other sources this would smoother more your project as a docker image like rss bridge is overkill if only used for twitter in the site monitoring app s model rtir – identification number of rtir should be a non required field as some people might not have rtir platform configured o in place also the expiry date field in some cases is not the best option as you might want to monitor a certain domain until it s takendown and you don t know the exact date when this will happen at first screenshots in site monitoring and in dns finder it s an awesome feature if you can take screenshots of domain and also check for changes of the image you could use to take screenshots and to check how the image was changed why are you using mysql as the db there are some other solutions like postgresql which has builtin arrayfields and jsonfields which could ease some model implementations hope this helps
0
155,297
24,442,337,463
IssuesEvent
2022-10-06 15:21:19
AlaskaAirlines/AuroDesignTokens
https://api.github.com/repos/AlaskaAirlines/AuroDesignTokens
closed
Add accent text color token
Type: Feature design tokens
**Is your feature request related to a problem? Please describe.** Designers have been using auro-color-background-darker for accent text color. **Describe the solution you'd like** Add an accent text color token (midnight-400). `auro-color-text-accent-on-light: var(--auro-color-brand-midnight-400)` **Describe alternatives you've considered** Using the personality palette for text has been considered, but there were concerns around maintaining consistency across accent text.
1.0
Add accent text color token - **Is your feature request related to a problem? Please describe.** Designers have been using auro-color-background-darker for accent text color. **Describe the solution you'd like** Add an accent text color token (midnight-400). `auro-color-text-accent-on-light: var(--auro-color-brand-midnight-400)` **Describe alternatives you've considered** Using the personality palette for text has been considered, but there were concerns around maintaining consistency across accent text.
non_priority
add accent text color token is your feature request related to a problem please describe designers have been using auro color background darker for accent text color describe the solution you d like add an accent text color token midnight auro color text accent on light var auro color brand midnight describe alternatives you ve considered using the personality palette for text has been considered but there were concerns around maintaining consistency across accent text
0
46,634
7,272,759,301
IssuesEvent
2018-02-21 00:45:51
unruffledBeaver/react-animation-components
https://api.github.com/repos/unruffledBeaver/react-animation-components
closed
Typo in TweenTransform example in README.md
documentation
Hello, just wanted to inform you in your TweenTransform example you imported it correctly, but the implementation is spelled wrong, **TweenTranform** (forgot the s in Transform) ``` import { TweenTransform } from 'react-animation-components' <TweenTranform enter="translateX(100px)" in> <h1>I'm transitioning from my initial position to 100px right when `in` is `true`</h1> </TweenTranform> <TweenTranform enter="translateX(100px)" exit="translateX(-100px)" in> <h1> I'm 100px to the left of my initial position and I transition 100px right of my initial when `in` is `true` </h1> </TweenTranform> <TweenTranform enter="rotate(90deg)" in> <h1>I transition from initial positon to rotate 90deg when `in` is `true`</h1> </TweenTranform> ``` should be ``` import { TweenTransform } from 'react-animation-components' <TweenTransform enter="translateX(100px)" in> <h1>I'm transitioning from my initial position to 100px right when `in` is `true`</h1> </TweenTransform> <TweenTransform enter="translateX(100px)" exit="translateX(-100px)" in> <h1> I'm 100px to the left of my initial position and I transition 100px right of my initial when `in` is `true` </h1> </TweenTransform> <TweenTransform enter="rotate(90deg)" in> <h1>I transition from initial positon to rotate 90deg when `in` is `true`</h1> </TweenTransform> ``` I hope this helps
1.0
Typo in TweenTransform example in README.md - Hello, just wanted to inform you in your TweenTransform example you imported it correctly, but the implementation is spelled wrong, **TweenTranform** (forgot the s in Transform) ``` import { TweenTransform } from 'react-animation-components' <TweenTranform enter="translateX(100px)" in> <h1>I'm transitioning from my initial position to 100px right when `in` is `true`</h1> </TweenTranform> <TweenTranform enter="translateX(100px)" exit="translateX(-100px)" in> <h1> I'm 100px to the left of my initial position and I transition 100px right of my initial when `in` is `true` </h1> </TweenTranform> <TweenTranform enter="rotate(90deg)" in> <h1>I transition from initial positon to rotate 90deg when `in` is `true`</h1> </TweenTranform> ``` should be ``` import { TweenTransform } from 'react-animation-components' <TweenTransform enter="translateX(100px)" in> <h1>I'm transitioning from my initial position to 100px right when `in` is `true`</h1> </TweenTransform> <TweenTransform enter="translateX(100px)" exit="translateX(-100px)" in> <h1> I'm 100px to the left of my initial position and I transition 100px right of my initial when `in` is `true` </h1> </TweenTransform> <TweenTransform enter="rotate(90deg)" in> <h1>I transition from initial positon to rotate 90deg when `in` is `true`</h1> </TweenTransform> ``` I hope this helps
non_priority
typo in tweentransform example in readme md hello just wanted to inform you in your tweentransform example you imported it correctly but the implementation is spelled wrong tweentranform forgot the s in transform import tweentransform from react animation components i m transitioning from my initial position to right when in is true i m to the left of my initial position and i transition right of my initial when in is true i transition from initial positon to rotate when in is true should be import tweentransform from react animation components i m transitioning from my initial position to right when in is true i m to the left of my initial position and i transition right of my initial when in is true i transition from initial positon to rotate when in is true i hope this helps
0
397
7,294,595,389
IssuesEvent
2018-02-26 01:09:03
dotnet/project-system
https://api.github.com/repos/dotnet/project-system
reopened
Visual studio 15.6 preview 3 crashes on solution load
Area-New-Project-System Bug Feature - Up-to-date Resolution-No Repro Tenet-Reliability Urgency-Soon
15.6 crashes on load of this solution https://github.com/btrepp/vspreviewcrash Repro steps Clone repo paket install Open solution in 15.6 preview 3 Expected behavior Solution loads like in 15.5.6 Actual behavior A popup with "a non fatal error has occured" appears, but then VS locks up Known workarounds None Related information Operating system is windows 10, Machine had brand new windows installed and then Visual studio installed. Original Issue: __https://github.com/Microsoft/visualfsharp/issues/4300__ I guess this is CPS or Project System, at least looking at the stacks involved.
True
Visual studio 15.6 preview 3 crashes on solution load - 15.6 crashes on load of this solution https://github.com/btrepp/vspreviewcrash Repro steps Clone repo paket install Open solution in 15.6 preview 3 Expected behavior Solution loads like in 15.5.6 Actual behavior A popup with "a non fatal error has occured" appears, but then VS locks up Known workarounds None Related information Operating system is windows 10, Machine had brand new windows installed and then Visual studio installed. Original Issue: __https://github.com/Microsoft/visualfsharp/issues/4300__ I guess this is CPS or Project System, at least looking at the stacks involved.
non_priority
visual studio preview crashes on solution load crashes on load of this solution repro steps clone repo paket install open solution in preview expected behavior solution loads like in actual behavior a popup with a non fatal error has occured appears but then vs locks up known workarounds none related information operating system is windows machine had brand new windows installed and then visual studio installed original issue i guess this is cps or project system at least looking at the stacks involved
0
42,208
10,885,422,201
IssuesEvent
2019-11-18 10:21:57
PowerDNS/pdns
https://api.github.com/repos/PowerDNS/pdns
closed
dnsdist: addAction/rmRule consumes incrementally more memory
defect dnsdist
- Program: dnsdist - Issue type: Bug report ### Short description Adding/removing rules which reference a large network mask group causes increasing memory usage. ### Environment - Operating system: Debian - Software version: master - Software source: master compiled ### Steps to reproduce Create a minimal dnsdist config: ``` -- security key for libsodium setKey("xx") -- listen for console connection controlSocket("127.0.0.1") addLocal("0.0.0.0:5353", {reusePort=true}) newServer({address="8.8.8.8"}) dropTest = newNMG() for line in io.lines("ips") do dropTest:addMask(line) end ``` where ips is of decent size `for x in $(seq 1 200); do for y in $(seq 1 200); do echo "2001::$y:$x/128"; done; done > ips` Now add/remove the rule a hundred times (this is just to simulate that we wish to periodically update these from a central source - in reality we would clear() the NMG, add entries, add a new rule, and move it to the top and delete the other one - but this seems simpler to reproduce) ``` rmRule(0) addAction(NetmaskGroupRule(dropTest, true, true), DropAction()) ``` ### Expected behaviour Memory usage to stay relatively consistent. ### Actual behaviour ``` $ ps -eo rss,args | grep dnsdist 37248 ./dnsdist -C dnsdist.conf $ for x in $(seq 1 100); do ./dnsdist -c -C dnsdist.conf < repro; done Error: attempt to delete non-existing rule $ ps -eo rss,args | grep dnsdist 836568 ./dnsdist -C dnsdist.conf ``` ### Other information
1.0
dnsdist: addAction/rmRule consumes incrementally more memory - - Program: dnsdist - Issue type: Bug report ### Short description Adding/removing rules which reference a large network mask group causes increasing memory usage. ### Environment - Operating system: Debian - Software version: master - Software source: master compiled ### Steps to reproduce Create a minimal dnsdist config: ``` -- security key for libsodium setKey("xx") -- listen for console connection controlSocket("127.0.0.1") addLocal("0.0.0.0:5353", {reusePort=true}) newServer({address="8.8.8.8"}) dropTest = newNMG() for line in io.lines("ips") do dropTest:addMask(line) end ``` where ips is of decent size `for x in $(seq 1 200); do for y in $(seq 1 200); do echo "2001::$y:$x/128"; done; done > ips` Now add/remove the rule a hundred times (this is just to simulate that we wish to periodically update these from a central source - in reality we would clear() the NMG, add entries, add a new rule, and move it to the top and delete the other one - but this seems simpler to reproduce) ``` rmRule(0) addAction(NetmaskGroupRule(dropTest, true, true), DropAction()) ``` ### Expected behaviour Memory usage to stay relatively consistent. ### Actual behaviour ``` $ ps -eo rss,args | grep dnsdist 37248 ./dnsdist -C dnsdist.conf $ for x in $(seq 1 100); do ./dnsdist -c -C dnsdist.conf < repro; done Error: attempt to delete non-existing rule $ ps -eo rss,args | grep dnsdist 836568 ./dnsdist -C dnsdist.conf ``` ### Other information
non_priority
dnsdist addaction rmrule consumes incrementally more memory program dnsdist issue type bug report short description adding removing rules which reference a large network mask group causes increasing memory usage environment operating system debian software version master software source master compiled steps to reproduce create a minimal dnsdist config security key for libsodium setkey xx listen for console connection controlsocket addlocal reuseport true newserver address droptest newnmg for line in io lines ips do droptest addmask line end where ips is of decent size for x in seq do for y in seq do echo y x done done ips now add remove the rule a hundred times this is just to simulate that we wish to periodically update these from a central source in reality we would clear the nmg add entries add a new rule and move it to the top and delete the other one but this seems simpler to reproduce rmrule addaction netmaskgrouprule droptest true true dropaction expected behaviour memory usage to stay relatively consistent actual behaviour ps eo rss args grep dnsdist dnsdist c dnsdist conf for x in seq do dnsdist c c dnsdist conf repro done error attempt to delete non existing rule ps eo rss args grep dnsdist dnsdist c dnsdist conf other information
0
263,066
28,012,639,339
IssuesEvent
2023-03-27 19:51:59
microsoft/Microsoft365DSC
https://api.github.com/repos/microsoft/Microsoft365DSC
closed
[SCSensitivityLabel] Remove deprecated properties
Security & Compliance Center Breaking Changes
#### Details of the scenario you tried and the problem that is occurring The SCSensitivityLabel resource has a few deprecated properties: - Disabled - ApplyContentMarkingFooterFontName - ApplyContentMarkingHeaderFontName - ApplyWaterMarkingFontName - EncryptionAipTemplateScopes These need to get removed in the next Breaking Changes release of April 5th. #### Verbose logs showing the problem #### Suggested solution to the issue #### The DSC configuration that is used to reproduce the issue (as detailed as possible) ```powershell # insert configuration here ``` #### The operating system the target node is running <!-- Please provide as much as possible about the target node, for example edition, version, build and language. On OS with WMF 5.1 the following command can help get this information. Get-ComputerInfo -Property @( 'OsName', 'OsOperatingSystemSKU', 'OSArchitecture', 'WindowsVersion', 'WindowsBuildLabEx', 'OsLanguage', 'OsMuiLanguages') --> #### Version of the DSC module that was used ('dev' if using current dev branch) dev
True
[SCSensitivityLabel] Remove deprecated properties - #### Details of the scenario you tried and the problem that is occurring The SCSensitivityLabel resource has a few deprecated properties: - Disabled - ApplyContentMarkingFooterFontName - ApplyContentMarkingHeaderFontName - ApplyWaterMarkingFontName - EncryptionAipTemplateScopes These need to get removed in the next Breaking Changes release of April 5th. #### Verbose logs showing the problem #### Suggested solution to the issue #### The DSC configuration that is used to reproduce the issue (as detailed as possible) ```powershell # insert configuration here ``` #### The operating system the target node is running <!-- Please provide as much as possible about the target node, for example edition, version, build and language. On OS with WMF 5.1 the following command can help get this information. Get-ComputerInfo -Property @( 'OsName', 'OsOperatingSystemSKU', 'OSArchitecture', 'WindowsVersion', 'WindowsBuildLabEx', 'OsLanguage', 'OsMuiLanguages') --> #### Version of the DSC module that was used ('dev' if using current dev branch) dev
non_priority
remove deprecated properties details of the scenario you tried and the problem that is occurring the scsensitivitylabel resource has a few deprecated properties disabled applycontentmarkingfooterfontname applycontentmarkingheaderfontname applywatermarkingfontname encryptionaiptemplatescopes these need to get removed in the next breaking changes release of april verbose logs showing the problem suggested solution to the issue the dsc configuration that is used to reproduce the issue as detailed as possible powershell insert configuration here the operating system the target node is running please provide as much as possible about the target node for example edition version build and language on os with wmf the following command can help get this information get computerinfo property osname osoperatingsystemsku osarchitecture windowsversion windowsbuildlabex oslanguage osmuilanguages version of the dsc module that was used dev if using current dev branch dev
0
75,507
7,473,653,803
IssuesEvent
2018-04-03 15:56:32
PixelVision8/GameCreator
https://api.github.com/repos/PixelVision8/GameCreator
closed
Need to make sure code export still works
untested
After the refactor the code export logic was disabled. Need to make sure code can still be correctly saved.
1.0
Need to make sure code export still works - After the refactor the code export logic was disabled. Need to make sure code can still be correctly saved.
non_priority
need to make sure code export still works after the refactor the code export logic was disabled need to make sure code can still be correctly saved
0
74,213
14,220,946,741
IssuesEvent
2020-11-17 15:07:49
paulevsGitch/BetterNether
https://api.github.com/repos/paulevsGitch/BetterNether
closed
"Chiseled" should be "Chiselled" for en_gb
enhancement in dev code
Expected Behaviour *Chiseled Soul Sandstone* would be spelled *Chiselled Soul Sandstone* when the player's language is set to English (United Kingdom). Actual Behaviour *Chiseled Soul Sandstone* does not use the UK spelling when the player's language is set to English (United Kingdom). This does not match the other chiselled blocks in vanilla Minecraft.
1.0
"Chiseled" should be "Chiselled" for en_gb - Expected Behaviour *Chiseled Soul Sandstone* would be spelled *Chiselled Soul Sandstone* when the player's language is set to English (United Kingdom). Actual Behaviour *Chiseled Soul Sandstone* does not use the UK spelling when the player's language is set to English (United Kingdom). This does not match the other chiselled blocks in vanilla Minecraft.
non_priority
chiseled should be chiselled for en gb expected behaviour chiseled soul sandstone would be spelled chiselled soul sandstone when the player s language is set to english united kingdom actual behaviour chiseled soul sandstone does not use the uk spelling when the player s language is set to english united kingdom this does not match the other chiselled blocks in vanilla minecraft
0
95,889
12,058,176,612
IssuesEvent
2020-04-15 17:00:29
cloudfour/cloudfour.com-patterns
https://api.github.com/repos/cloudfour/cloudfour.com-patterns
closed
Thumbnail patterns
size:2 🎨 design
We have several different styles of thumbnails, some are within a contained shape and some have borders. These may need to be different patterns, especially the calendar. <img width="615" alt="Thumbnails" src="https://user-images.githubusercontent.com/42841342/75062496-c2031c00-5497-11ea-968f-ef2fbfe19bac.png">
1.0
Thumbnail patterns - We have several different styles of thumbnails, some are within a contained shape and some have borders. These may need to be different patterns, especially the calendar. <img width="615" alt="Thumbnails" src="https://user-images.githubusercontent.com/42841342/75062496-c2031c00-5497-11ea-968f-ef2fbfe19bac.png">
non_priority
thumbnail patterns we have several different styles of thumbnails some are within a contained shape and some have borders these may need to be different patterns especially the calendar img width alt thumbnails src
0
27,606
7,999,904,290
IssuesEvent
2018-07-22 09:12:58
fossasia/susi_skill_cms
https://api.github.com/repos/fossasia/susi_skill_cms
closed
Add rendering tests for new components
Botbuilder tests
**Expected Behaviour** We're going to implement different components for different views in design and configure tabs. So, rendering tests need to added for them. <!-- State here what the feature should enable the user to do. --> **Would you like to work on the issue?** Yes <!-- Please let us know if you can work on it or the issue should be assigned to someone else. -->
1.0
Add rendering tests for new components - **Expected Behaviour** We're going to implement different components for different views in design and configure tabs. So, rendering tests need to added for them. <!-- State here what the feature should enable the user to do. --> **Would you like to work on the issue?** Yes <!-- Please let us know if you can work on it or the issue should be assigned to someone else. -->
non_priority
add rendering tests for new components expected behaviour we re going to implement different components for different views in design and configure tabs so rendering tests need to added for them would you like to work on the issue yes
0
158,897
24,914,063,271
IssuesEvent
2022-10-30 07:14:26
osamhack2022-v2/APP_FreshPlus_TakeCareMyRefrigerator
https://api.github.com/repos/osamhack2022-v2/APP_FreshPlus_TakeCareMyRefrigerator
closed
Implementing signup in Flutter
design front
현재 구현되고 잇는 회원가입화면에서 비밀번호 재설정 회원가입 공통적으로 google에서 제공하는 기능을 그대로 사용해도 좋을 것 같습니다. 따라서 원래 군번을 아이디로 사용하기로 했었지만, 이메일을 아이디로 변경하는 것이 좋을 것 같습니다.
1.0
Implementing signup in Flutter - 현재 구현되고 잇는 회원가입화면에서 비밀번호 재설정 회원가입 공통적으로 google에서 제공하는 기능을 그대로 사용해도 좋을 것 같습니다. 따라서 원래 군번을 아이디로 사용하기로 했었지만, 이메일을 아이디로 변경하는 것이 좋을 것 같습니다.
non_priority
implementing signup in flutter 현재 구현되고 잇는 회원가입화면에서 비밀번호 재설정 회원가입 공통적으로 google에서 제공하는 기능을 그대로 사용해도 좋을 것 같습니다 따라서 원래 군번을 아이디로 사용하기로 했었지만 이메일을 아이디로 변경하는 것이 좋을 것 같습니다
0
12,746
5,238,098,847
IssuesEvent
2017-01-31 02:40:44
jeff1evesque/cis-benchmark
https://api.github.com/repos/jeff1evesque/cis-benchmark
opened
Implement vagrant 'v2.0.0' box in 'Vagrantfile'
build centos7x enhancement
We need to create a version `v2.0.0` [base box](https://atlas.hashicorp.com/jeff1evesque/boxes/centos7x), which will entail the following enhancements: - removal of ssh keys - generate corresponding md5 hash Then, we'll need to implement a corresponding switch statement within our `Vagrantfile`, which will allow users to choose between the linux operating systems.
1.0
Implement vagrant 'v2.0.0' box in 'Vagrantfile' - We need to create a version `v2.0.0` [base box](https://atlas.hashicorp.com/jeff1evesque/boxes/centos7x), which will entail the following enhancements: - removal of ssh keys - generate corresponding md5 hash Then, we'll need to implement a corresponding switch statement within our `Vagrantfile`, which will allow users to choose between the linux operating systems.
non_priority
implement vagrant box in vagrantfile we need to create a version which will entail the following enhancements removal of ssh keys generate corresponding hash then we ll need to implement a corresponding switch statement within our vagrantfile which will allow users to choose between the linux operating systems
0
62,911
8,648,528,420
IssuesEvent
2018-11-26 16:48:26
byuweb/byu-theme-components
https://api.github.com/repos/byuweb/byu-theme-components
closed
[byu-user-info] Using wrong fallback fonts
documentation
# Description ```css .my-custom-login-class a { color: white; font-family: 'HCo Ringside Narrow SSm', Helvetica, sans-serif; cursor: pointer; } ``` That should be referencing Arial, not Helvetica. The is in the _Overriding Your CMS_ section. # Websites Affected http://2017-components-demo.cdn.byu.edu/byu-user-info.html # Issue Type *Is this (add an x in the boxes that apply)* - [ ] A difference between the components and the [Official Specification](https://brand.byu.edu)? - [ ] A bug, such as a Javascript error, or the UI not rendering properly on a page? - [ ] Inconsistent appearance/behavior between browsers? - [ ] An issue on mobile browsers? - [ ] A request for a new feature/enhancement? # Browsers Affected *Add an x in all the boxes that apply. Please mark desktop and mobile browsers separately.* **We support the last two versions of Chrome, Firefox, Safari, and Edge.** ## Desktop Browsers - [ ] Google Chrome - [ ] Mozilla Firefox - [ ] Apple Safari - [ ] Microsoft Edge - [ ] Other (please specify) ## Mobile Browsers - [ ] Any browser on iOS - [ ] Chrome for Android - [ ] Firefox Mobile for Android - [ ] Other (please specify) # Web Site Platform *What is hosting your website?* - [ ] Drupal 7 - [ ] Drupal 8 - [ ] Wordpress - [ ] Custom Site - [ ] Don't Know
1.0
[byu-user-info] Using wrong fallback fonts - # Description ```css .my-custom-login-class a { color: white; font-family: 'HCo Ringside Narrow SSm', Helvetica, sans-serif; cursor: pointer; } ``` That should be referencing Arial, not Helvetica. The is in the _Overriding Your CMS_ section. # Websites Affected http://2017-components-demo.cdn.byu.edu/byu-user-info.html # Issue Type *Is this (add an x in the boxes that apply)* - [ ] A difference between the components and the [Official Specification](https://brand.byu.edu)? - [ ] A bug, such as a Javascript error, or the UI not rendering properly on a page? - [ ] Inconsistent appearance/behavior between browsers? - [ ] An issue on mobile browsers? - [ ] A request for a new feature/enhancement? # Browsers Affected *Add an x in all the boxes that apply. Please mark desktop and mobile browsers separately.* **We support the last two versions of Chrome, Firefox, Safari, and Edge.** ## Desktop Browsers - [ ] Google Chrome - [ ] Mozilla Firefox - [ ] Apple Safari - [ ] Microsoft Edge - [ ] Other (please specify) ## Mobile Browsers - [ ] Any browser on iOS - [ ] Chrome for Android - [ ] Firefox Mobile for Android - [ ] Other (please specify) # Web Site Platform *What is hosting your website?* - [ ] Drupal 7 - [ ] Drupal 8 - [ ] Wordpress - [ ] Custom Site - [ ] Don't Know
non_priority
using wrong fallback fonts description css my custom login class a color white font family hco ringside narrow ssm helvetica sans serif cursor pointer that should be referencing arial not helvetica the is in the overriding your cms section websites affected issue type is this add an x in the boxes that apply a difference between the components and the a bug such as a javascript error or the ui not rendering properly on a page inconsistent appearance behavior between browsers an issue on mobile browsers a request for a new feature enhancement browsers affected add an x in all the boxes that apply please mark desktop and mobile browsers separately we support the last two versions of chrome firefox safari and edge desktop browsers google chrome mozilla firefox apple safari microsoft edge other please specify mobile browsers any browser on ios chrome for android firefox mobile for android other please specify web site platform what is hosting your website drupal drupal wordpress custom site don t know
0
225,866
17,291,196,434
IssuesEvent
2021-07-24 19:47:49
mrjones2014/yaclt
https://api.github.com/repos/mrjones2014/yaclt
closed
Update documentation
documentation
The docs need to be updated to say that any option can be a function when using a JS config file.
1.0
Update documentation - The docs need to be updated to say that any option can be a function when using a JS config file.
non_priority
update documentation the docs need to be updated to say that any option can be a function when using a js config file
0
63,548
7,725,329,595
IssuesEvent
2018-05-24 17:37:09
phetsims/equality-explorer-basics
https://api.github.com/repos/phetsims/equality-explorer-basics
closed
add Lab screen
design:general status:ready-for-review
Add a screen that allows the user to change the values of the mystery objects. @amanda-phet please specify: - [x] name for the screen (tentatively "Lab") **AM: Lab fits the paradigm we use in other sims so I think that is fine here.** - [x] icon(s) for home screen and navigation bar **square = picker** - [x] the 3 objects, and associated artwork (icon and shadow) if they are new. (Please provide .ai file and credits.) **shapes: sphere, square, triangle** - [x] default values, and value ranges **AM: defaults should all be 1. Ranges can be [1,10].** - [x] control for changing the values (tentatively 3 pickers arranged horizontally in an accordion box below the snapshots accordion box) **AM: 3 pickers arranged horizontally are working well so I'd like to keep that.** - [x] title for the accordion box **AM: Values**
1.0
add Lab screen - Add a screen that allows the user to change the values of the mystery objects. @amanda-phet please specify: - [x] name for the screen (tentatively "Lab") **AM: Lab fits the paradigm we use in other sims so I think that is fine here.** - [x] icon(s) for home screen and navigation bar **square = picker** - [x] the 3 objects, and associated artwork (icon and shadow) if they are new. (Please provide .ai file and credits.) **shapes: sphere, square, triangle** - [x] default values, and value ranges **AM: defaults should all be 1. Ranges can be [1,10].** - [x] control for changing the values (tentatively 3 pickers arranged horizontally in an accordion box below the snapshots accordion box) **AM: 3 pickers arranged horizontally are working well so I'd like to keep that.** - [x] title for the accordion box **AM: Values**
non_priority
add lab screen add a screen that allows the user to change the values of the mystery objects amanda phet please specify name for the screen tentatively lab am lab fits the paradigm we use in other sims so i think that is fine here icon s for home screen and navigation bar square picker the objects and associated artwork icon and shadow if they are new please provide ai file and credits shapes sphere square triangle default values and value ranges am defaults should all be ranges can be control for changing the values tentatively pickers arranged horizontally in an accordion box below the snapshots accordion box am pickers arranged horizontally are working well so i d like to keep that title for the accordion box am values
0
189,167
14,491,495,166
IssuesEvent
2020-12-11 04:47:37
kalexmills/github-vet-tests-dec2020
https://api.github.com/repos/kalexmills/github-vet-tests-dec2020
closed
metcalf/saypi: say/say_test.go; 9 LoC
fresh test tiny
Found a possible issue in [metcalf/saypi](https://www.github.com/metcalf/saypi) at [say/say_test.go](https://github.com/metcalf/saypi/blob/f05d2e93d0df5907f3f4f2347d8b3b9a6bce3353/say/say_test.go#L296-L304) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > function call which takes a reference to line at line 301 may start a goroutine [Click here to see the code in its original context.](https://github.com/metcalf/saypi/blob/f05d2e93d0df5907f3f4f2347d8b3b9a6bce3353/say/say_test.go#L296-L304) <details> <summary>Click here to show the 9 line(s) of Go which triggered the analyzer.</summary> ```go for i, line := range []say.Line{line1, line2} { got, err := cli.GetLine(convo.ID, line.ID) if err != nil { t.Fatalf("%d: %s", i, err) } if !reflect.DeepEqual(got, &line) { t.Errorf("%d: expected to get line %#v but got %#v", i, line, got) } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: f05d2e93d0df5907f3f4f2347d8b3b9a6bce3353
1.0
metcalf/saypi: say/say_test.go; 9 LoC - Found a possible issue in [metcalf/saypi](https://www.github.com/metcalf/saypi) at [say/say_test.go](https://github.com/metcalf/saypi/blob/f05d2e93d0df5907f3f4f2347d8b3b9a6bce3353/say/say_test.go#L296-L304) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > function call which takes a reference to line at line 301 may start a goroutine [Click here to see the code in its original context.](https://github.com/metcalf/saypi/blob/f05d2e93d0df5907f3f4f2347d8b3b9a6bce3353/say/say_test.go#L296-L304) <details> <summary>Click here to show the 9 line(s) of Go which triggered the analyzer.</summary> ```go for i, line := range []say.Line{line1, line2} { got, err := cli.GetLine(convo.ID, line.ID) if err != nil { t.Fatalf("%d: %s", i, err) } if !reflect.DeepEqual(got, &line) { t.Errorf("%d: expected to get line %#v but got %#v", i, line, got) } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: f05d2e93d0df5907f3f4f2347d8b3b9a6bce3353
non_priority
metcalf saypi say say test go loc found a possible issue in at below is the message reported by the analyzer for this snippet of code beware that the analyzer only reports the first issue it finds so please do not limit your consideration to the contents of the below message function call which takes a reference to line at line may start a goroutine click here to show the line s of go which triggered the analyzer go for i line range say line got err cli getline convo id line id if err nil t fatalf d s i err if reflect deepequal got line t errorf d expected to get line v but got v i line got leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id
0
342,200
24,733,116,436
IssuesEvent
2022-10-20 19:24:29
OBOFoundry/OBOFoundry.github.io
https://api.github.com/repos/OBOFoundry/OBOFoundry.github.io
closed
Display usage field on ontology detail pages
website documentation usability feature attn: Technical WG
See #1008 we now have usage field curated for many ontologies But this is not visible on the ontology page. Should be on the sidebar, e.g. on http://obofoundry.org/ontology/uberon This would be a simple addition to _layouts/ontology_detail.html
1.0
Display usage field on ontology detail pages - See #1008 we now have usage field curated for many ontologies But this is not visible on the ontology page. Should be on the sidebar, e.g. on http://obofoundry.org/ontology/uberon This would be a simple addition to _layouts/ontology_detail.html
non_priority
display usage field on ontology detail pages see we now have usage field curated for many ontologies but this is not visible on the ontology page should be on the sidebar e g on this would be a simple addition to layouts ontology detail html
0
226,860
17,364,611,240
IssuesEvent
2021-07-30 04:41:42
cambialens/lens-api-doc
https://api.github.com/repos/cambialens/lens-api-doc
closed
Trouble using the "include" field
documentation question
Hi there, I'm not having any success limiting the columns returned using the "include" field. This means that I have to download every column which for a large set of patents is a huge amount of data. The following query returns a 400 error: ``` { "query": { "bool": { "must": [ { "terms": { "lens_id": [ "150-506-464-347-086", "089-744-818-392-604", "107-433-773-744-882", "161-777-856-080-134", "182-283-251-489-844", "048-418-903-199-808", "048-721-214-075-449", "115-342-293-268-334", "022-009-123-795-923", "032-877-796-510-155" ] } } ] } }, "size": 500, "scroll": "1m", "include": [ "invention_title", "legal_status", "biblio.priority_claims" ] } ``` It doesn't seem to matter what columns I include. The above are the columns from the example in the swagger UI so it should be okay. Whereas if I just remove the "include" field altogether, it runs fine: ``` { "query": { "bool": { "must": [ { "terms": { "lens_id": [ "150-506-464-347-086", "089-744-818-392-604", "107-433-773-744-882", "161-777-856-080-134", "182-283-251-489-844", "048-418-903-199-808", "048-721-214-075-449", "115-342-293-268-334", "022-009-123-795-923", "032-877-796-510-155" ] } } ] } }, "size": 500, "scroll": "1m" } ``` Am I doing it wrong or is there a bug?
1.0
Trouble using the "include" field - Hi there, I'm not having any success limiting the columns returned using the "include" field. This means that I have to download every column which for a large set of patents is a huge amount of data. The following query returns a 400 error: ``` { "query": { "bool": { "must": [ { "terms": { "lens_id": [ "150-506-464-347-086", "089-744-818-392-604", "107-433-773-744-882", "161-777-856-080-134", "182-283-251-489-844", "048-418-903-199-808", "048-721-214-075-449", "115-342-293-268-334", "022-009-123-795-923", "032-877-796-510-155" ] } } ] } }, "size": 500, "scroll": "1m", "include": [ "invention_title", "legal_status", "biblio.priority_claims" ] } ``` It doesn't seem to matter what columns I include. The above are the columns from the example in the swagger UI so it should be okay. Whereas if I just remove the "include" field altogether, it runs fine: ``` { "query": { "bool": { "must": [ { "terms": { "lens_id": [ "150-506-464-347-086", "089-744-818-392-604", "107-433-773-744-882", "161-777-856-080-134", "182-283-251-489-844", "048-418-903-199-808", "048-721-214-075-449", "115-342-293-268-334", "022-009-123-795-923", "032-877-796-510-155" ] } } ] } }, "size": 500, "scroll": "1m" } ``` Am I doing it wrong or is there a bug?
non_priority
trouble using the include field hi there i m not having any success limiting the columns returned using the include field this means that i have to download every column which for a large set of patents is a huge amount of data the following query returns a error query bool must terms lens id size scroll include invention title legal status biblio priority claims it doesn t seem to matter what columns i include the above are the columns from the example in the swagger ui so it should be okay whereas if i just remove the include field altogether it runs fine query bool must terms lens id size scroll am i doing it wrong or is there a bug
0
72,652
7,308,053,324
IssuesEvent
2018-02-28 06:30:07
omegaup/omegaup
https://api.github.com/repos/omegaup/omegaup
closed
Agregar un mecanismo para auto-agregar privilegios en sandbox.omegaup.com
5 P2 omegaUp For Contests
Como un usuario normal, quiero poder probar cosas en el sandbox de omegaup sin la intervención de un administrador, para no tener que esperar a que ellos lo hagan manualmente. ## Comportamiento Esperado Una interfaz con un panel de administración (que sería bueno tener de cualquier manera para producción). Esta interfaz debe poder permitir agregar a un usuario a uno de los privilegios globales ( https://github.com/omegaup/omegaup/blob/e9dd1cc9c9034e2ce4b5455722caf40f3da1cd91/frontend/server/libs/Authorization.php#L17-L27 ) o uno de los grupos globales ( https://github.com/omegaup/omegaup/blob/e9dd1cc9c9034e2ce4b5455722caf40f3da1cd91/frontend/server/libs/Authorization.php#L32-L36 ) ## Comportamiento Actual Un administrador debe manualmente editar la base de datos.
1.0
Agregar un mecanismo para auto-agregar privilegios en sandbox.omegaup.com - Como un usuario normal, quiero poder probar cosas en el sandbox de omegaup sin la intervención de un administrador, para no tener que esperar a que ellos lo hagan manualmente. ## Comportamiento Esperado Una interfaz con un panel de administración (que sería bueno tener de cualquier manera para producción). Esta interfaz debe poder permitir agregar a un usuario a uno de los privilegios globales ( https://github.com/omegaup/omegaup/blob/e9dd1cc9c9034e2ce4b5455722caf40f3da1cd91/frontend/server/libs/Authorization.php#L17-L27 ) o uno de los grupos globales ( https://github.com/omegaup/omegaup/blob/e9dd1cc9c9034e2ce4b5455722caf40f3da1cd91/frontend/server/libs/Authorization.php#L32-L36 ) ## Comportamiento Actual Un administrador debe manualmente editar la base de datos.
non_priority
agregar un mecanismo para auto agregar privilegios en sandbox omegaup com como un usuario normal quiero poder probar cosas en el sandbox de omegaup sin la intervención de un administrador para no tener que esperar a que ellos lo hagan manualmente comportamiento esperado una interfaz con un panel de administración que sería bueno tener de cualquier manera para producción esta interfaz debe poder permitir agregar a un usuario a uno de los privilegios globales o uno de los grupos globales comportamiento actual un administrador debe manualmente editar la base de datos
0
76,681
14,664,437,680
IssuesEvent
2020-12-29 12:00:37
ppy/osu
https://api.github.com/repos/ppy/osu
opened
PlaylistsRoomManager is potentially sending double the requests it needs to
type:code-quality type:online
It is running two sets of polling when a selection it made, from the lounge. It likely doesn't need to do the second poll unless in a subscreen. Probably needs some serious refactoring since the whole setup feels quite iffy.
1.0
PlaylistsRoomManager is potentially sending double the requests it needs to - It is running two sets of polling when a selection it made, from the lounge. It likely doesn't need to do the second poll unless in a subscreen. Probably needs some serious refactoring since the whole setup feels quite iffy.
non_priority
playlistsroommanager is potentially sending double the requests it needs to it is running two sets of polling when a selection it made from the lounge it likely doesn t need to do the second poll unless in a subscreen probably needs some serious refactoring since the whole setup feels quite iffy
0
152,814
12,127,155,730
IssuesEvent
2020-04-22 18:14:18
ansible/awx
https://api.github.com/repos/ansible/awx
closed
Add support for surveys on WFJT
component:ui_next state:in_progress state:needs_test type:feature
##### ISSUE TYPE - Feature Idea ##### SUMMARY The hope is that we've built reusable components ^^ that can be dropped in on the WFJT survey related tab. The only difference between these two areas is the endpoint that we'll be interacting with.
1.0
Add support for surveys on WFJT - ##### ISSUE TYPE - Feature Idea ##### SUMMARY The hope is that we've built reusable components ^^ that can be dropped in on the WFJT survey related tab. The only difference between these two areas is the endpoint that we'll be interacting with.
non_priority
add support for surveys on wfjt issue type feature idea summary the hope is that we ve built reusable components that can be dropped in on the wfjt survey related tab the only difference between these two areas is the endpoint that we ll be interacting with
0
115,722
9,809,948,978
IssuesEvent
2019-06-12 19:15:00
fecgov/fec-testing
https://api.github.com/repos/fecgov/fec-testing
closed
Test language around "latest version" of filings
Content Testing idea
We should test whether the "Current version" and "Previous version" language for filings makes sense to users, or whether alternate language like "Latest version" and "Prior version" work better. (From this discussion: https://github.com/18F/openFEC-web-app/issues/1785)
1.0
Test language around "latest version" of filings - We should test whether the "Current version" and "Previous version" language for filings makes sense to users, or whether alternate language like "Latest version" and "Prior version" work better. (From this discussion: https://github.com/18F/openFEC-web-app/issues/1785)
non_priority
test language around latest version of filings we should test whether the current version and previous version language for filings makes sense to users or whether alternate language like latest version and prior version work better from this discussion
0
264,053
23,098,273,925
IssuesEvent
2022-07-26 22:07:53
TeamRizu/OutFox
https://api.github.com/repos/TeamRizu/OutFox
closed
[BUG] Beat bars and backplates zoom/rotation
BUG Gameplay Theme Lua Fix in Testing Alpha-4
### Is there an existing issue for this? - [X] I have searched the existing issues and none matched. ### Operating System Windows 10 ### CPU _No response_ ### GPU _No response_ ### Storage External HDD ### Game Version 4.15.0 ### Game Mode dance ### Theme Default theme, latest with minor edits. ### Describe the problem This is a 4.15.1 issue, which seems to be absent from this form's dropdown. Backplates and beat bars, when enabled in dance, pump, smx, or techno; do not follow note field X/Y rotation, but do match rotation with perspectives. The backplate also seems to bee slightly too thin in pump and techno (possibly in smx as well, but the lanes are messed up so I can't tell [possibly a related issue? Happens a little bit in pump as well.]) ![extreme example](https://cdn.discordapp.com/attachments/540706498159050762/996592661370769448/unknown.png) In addition, beat bars desynchronies from notes when note field zoom % is not 100. ![out of synch](https://cdn.discordapp.com/attachments/540706498159050762/996593304571478036/unknown.png) ### Describe what should happen Ensure all parts of the note field move together. Correct plate width, possibly also lane spacing. Adjust beat bar offset relative to note field zoom %. ### Relevant Log output Nothing relevant appears in the logs.
1.0
[BUG] Beat bars and backplates zoom/rotation - ### Is there an existing issue for this? - [X] I have searched the existing issues and none matched. ### Operating System Windows 10 ### CPU _No response_ ### GPU _No response_ ### Storage External HDD ### Game Version 4.15.0 ### Game Mode dance ### Theme Default theme, latest with minor edits. ### Describe the problem This is a 4.15.1 issue, which seems to be absent from this form's dropdown. Backplates and beat bars, when enabled in dance, pump, smx, or techno; do not follow note field X/Y rotation, but do match rotation with perspectives. The backplate also seems to bee slightly too thin in pump and techno (possibly in smx as well, but the lanes are messed up so I can't tell [possibly a related issue? Happens a little bit in pump as well.]) ![extreme example](https://cdn.discordapp.com/attachments/540706498159050762/996592661370769448/unknown.png) In addition, beat bars desynchronies from notes when note field zoom % is not 100. ![out of synch](https://cdn.discordapp.com/attachments/540706498159050762/996593304571478036/unknown.png) ### Describe what should happen Ensure all parts of the note field move together. Correct plate width, possibly also lane spacing. Adjust beat bar offset relative to note field zoom %. ### Relevant Log output Nothing relevant appears in the logs.
non_priority
beat bars and backplates zoom rotation is there an existing issue for this i have searched the existing issues and none matched operating system windows cpu no response gpu no response storage external hdd game version game mode dance theme default theme latest with minor edits describe the problem this is a issue which seems to be absent from this form s dropdown backplates and beat bars when enabled in dance pump smx or techno do not follow note field x y rotation but do match rotation with perspectives the backplate also seems to bee slightly too thin in pump and techno possibly in smx as well but the lanes are messed up so i can t tell in addition beat bars desynchronies from notes when note field zoom is not describe what should happen ensure all parts of the note field move together correct plate width possibly also lane spacing adjust beat bar offset relative to note field zoom relevant log output nothing relevant appears in the logs
0
41,974
16,991,179,318
IssuesEvent
2021-06-30 20:43:17
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Add information regarding size restrictions for PVCs
Pri2 assigned-to-author container-service/svc doc-enhancement triaged
Please can we add clarification that for Azure Files standard tier, minimum size is 1GiB, and also that the units for the PVCs needs to be created in 1GiB units - i.e. we cannot have 1.5GiB or 0.5GiB, nor 1536Mi - additionally only integer values are supported for the capacity. --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: a57e48b4-dc33-0b9d-b773-42ce7d2bffd0 * Version Independent ID: e912ac2d-cf6a-0b54-4697-1940b1270874 * Content: [Dynamically create Azure Files share - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/azure-files-dynamic-pv) * Content Source: [articles/aks/azure-files-dynamic-pv.md](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/aks/azure-files-dynamic-pv.md) * Service: **container-service** * GitHub Login: @mlearned * Microsoft Alias: **mlearned**
1.0
Add information regarding size restrictions for PVCs - Please can we add clarification that for Azure Files standard tier, minimum size is 1GiB, and also that the units for the PVCs needs to be created in 1GiB units - i.e. we cannot have 1.5GiB or 0.5GiB, nor 1536Mi - additionally only integer values are supported for the capacity. --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: a57e48b4-dc33-0b9d-b773-42ce7d2bffd0 * Version Independent ID: e912ac2d-cf6a-0b54-4697-1940b1270874 * Content: [Dynamically create Azure Files share - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/azure-files-dynamic-pv) * Content Source: [articles/aks/azure-files-dynamic-pv.md](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/aks/azure-files-dynamic-pv.md) * Service: **container-service** * GitHub Login: @mlearned * Microsoft Alias: **mlearned**
non_priority
add information regarding size restrictions for pvcs please can we add clarification that for azure files standard tier minimum size is and also that the units for the pvcs needs to be created in units i e we cannot have or nor additionally only integer values are supported for the capacity document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service container service github login mlearned microsoft alias mlearned
0
82,322
10,240,703,213
IssuesEvent
2019-08-19 21:32:04
matomo-org/matomo
https://api.github.com/repos/matomo-org/matomo
closed
Improve evolution graph series picker visibility
c: Design / UI c: Usability
The position of the series picker in evolution graphs currently moves with the number of selected elements. To improve the usability it might be good to give it a fixed position either completely left or right. ![image](https://user-images.githubusercontent.com/1579355/38109010-efc83090-3396-11e8-9d03-ceef1b6a30f8.png) ![image](https://user-images.githubusercontent.com/1579355/38109041-0de233a0-3397-11e8-9f9a-f1efde937bfd.png)
1.0
Improve evolution graph series picker visibility - The position of the series picker in evolution graphs currently moves with the number of selected elements. To improve the usability it might be good to give it a fixed position either completely left or right. ![image](https://user-images.githubusercontent.com/1579355/38109010-efc83090-3396-11e8-9d03-ceef1b6a30f8.png) ![image](https://user-images.githubusercontent.com/1579355/38109041-0de233a0-3397-11e8-9f9a-f1efde937bfd.png)
non_priority
improve evolution graph series picker visibility the position of the series picker in evolution graphs currently moves with the number of selected elements to improve the usability it might be good to give it a fixed position either completely left or right
0
24,613
12,133,225,498
IssuesEvent
2020-04-23 08:40:54
cityofaustin/atd-data-tech
https://api.github.com/repos/cityofaustin/atd-data-tech
closed
Meet with LIT, new BSA and Stakeholders
Product: AMANDA Project: ATD AMANDA Backlog Service: Apps Service: Product Workgroup: ROW Workgroup: TDSD
### Objective Consensus and clarity about the AMANDA Backlog — priority, level of effort, logical "release" bundles ### Participants DTS: Nate, Surbhi, Tracy, Amenity, John ROW: Paloma, Ryan, Kim P.(?) LIT: Raj - Assign level of effort to backlog items - Determine what order/groups make sense fo delivery
2.0
Meet with LIT, new BSA and Stakeholders - ### Objective Consensus and clarity about the AMANDA Backlog — priority, level of effort, logical "release" bundles ### Participants DTS: Nate, Surbhi, Tracy, Amenity, John ROW: Paloma, Ryan, Kim P.(?) LIT: Raj - Assign level of effort to backlog items - Determine what order/groups make sense fo delivery
non_priority
meet with lit new bsa and stakeholders objective consensus and clarity about the amanda backlog — priority level of effort logical release bundles participants dts nate surbhi tracy amenity john row paloma ryan kim p lit raj assign level of effort to backlog items determine what order groups make sense fo delivery
0
214,808
16,613,313,778
IssuesEvent
2021-06-02 14:01:14
SAP/ui5-webcomponents
https://api.github.com/repos/SAP/ui5-webcomponents
closed
WizardStep: text not vertically aligned in the centre
Low Prio Release Testing TOPIC RL bug
**Describe the bug** WizardStep: text not vertically aligned in the centre **To reproduce** Steps to reproduce the behavior: 1. Go to https://sap.github.io/ui5-webcomponents/master/playground/fiori/pages/Wizard_test/ 2. Use the first example 3. Notice the "2" number is shifted upwards **Expected behavior** The text should be vertically aligned in the centre **Screenshots** If applicable, add screenshots to help explain your problem. web comp <img width="621" alt="Screenshot 2021-05-14 at 09 05 01" src="https://user-images.githubusercontent.com/15702139/118228814-7faa6e00-b493-11eb-9f1e-363fb9bac88a.png"> openui5 <img width="635" alt="Screenshot 2021-05-14 at 09 04 09" src="https://user-images.githubusercontent.com/15702139/118228748-62759f80-b493-11eb-8ce5-50c0223a3ead.png"> **Context** UI5 Web Components version master OS/Platform: {...} MacOS Browser (if relevant): {...} Chrome Other information: {...}
1.0
WizardStep: text not vertically aligned in the centre - **Describe the bug** WizardStep: text not vertically aligned in the centre **To reproduce** Steps to reproduce the behavior: 1. Go to https://sap.github.io/ui5-webcomponents/master/playground/fiori/pages/Wizard_test/ 2. Use the first example 3. Notice the "2" number is shifted upwards **Expected behavior** The text should be vertically aligned in the centre **Screenshots** If applicable, add screenshots to help explain your problem. web comp <img width="621" alt="Screenshot 2021-05-14 at 09 05 01" src="https://user-images.githubusercontent.com/15702139/118228814-7faa6e00-b493-11eb-9f1e-363fb9bac88a.png"> openui5 <img width="635" alt="Screenshot 2021-05-14 at 09 04 09" src="https://user-images.githubusercontent.com/15702139/118228748-62759f80-b493-11eb-8ce5-50c0223a3ead.png"> **Context** UI5 Web Components version master OS/Platform: {...} MacOS Browser (if relevant): {...} Chrome Other information: {...}
non_priority
wizardstep text not vertically aligned in the centre describe the bug wizardstep text not vertically aligned in the centre to reproduce steps to reproduce the behavior go to use the first example notice the number is shifted upwards expected behavior the text should be vertically aligned in the centre screenshots if applicable add screenshots to help explain your problem web comp img width alt screenshot at src img width alt screenshot at src context web components version master os platform macos browser if relevant chrome other information
0
31,786
26,120,306,654
IssuesEvent
2022-12-28 11:48:52
treeverse/lakeFS
https://api.github.com/repos/treeverse/lakeFS
closed
Helm Chart: option to disable migrations on upgrade
infrastructure team/cloud-native
Add a Helm parameter to disable migrations on Helm Upgrade. When this parameter is true, upgrades that include migrations should fail with a meaningful message.
1.0
Helm Chart: option to disable migrations on upgrade - Add a Helm parameter to disable migrations on Helm Upgrade. When this parameter is true, upgrades that include migrations should fail with a meaningful message.
non_priority
helm chart option to disable migrations on upgrade add a helm parameter to disable migrations on helm upgrade when this parameter is true upgrades that include migrations should fail with a meaningful message
0