Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
186,167
21,920,062,559
IssuesEvent
2022-05-22 12:39:03
turkdevops/sourcegraph
https://api.github.com/repos/turkdevops/sourcegraph
closed
CVE-2018-20190 (Medium) detected in node-sass-4.14.1.tgz - autoclosed
security vulnerability
## CVE-2018-20190 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sass-4.14.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p> <p> Dependency Hierarchy: - :x: **node-sass-4.14.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/sourcegraph/commit/5a4a7def9ddff6354e22069c494feb0f30196e36">5a4a7def9ddff6354e22069c494feb0f30196e36</a></p> <p>Found in base branch: <b>dev/seed-tool</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Eval::operator()(Sass::Supports_Operator*) in eval.cpp may cause a Denial of Service (application crash) via a crafted sass input file. <p>Publish Date: 2018-12-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20190>CVE-2018-20190</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sass/libsass/releases/tag/3.6.0">https://github.com/sass/libsass/releases/tag/3.6.0</a></p> <p>Release Date: 2018-12-17</p> <p>Fix Resolution: 5.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-20190 (Medium) detected in node-sass-4.14.1.tgz - autoclosed - ## CVE-2018-20190 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sass-4.14.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p> <p> Dependency Hierarchy: - :x: **node-sass-4.14.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/sourcegraph/commit/5a4a7def9ddff6354e22069c494feb0f30196e36">5a4a7def9ddff6354e22069c494feb0f30196e36</a></p> <p>Found in base branch: <b>dev/seed-tool</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Eval::operator()(Sass::Supports_Operator*) in eval.cpp may cause a Denial of Service (application crash) via a crafted sass input file. <p>Publish Date: 2018-12-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20190>CVE-2018-20190</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sass/libsass/releases/tag/3.6.0">https://github.com/sass/libsass/releases/tag/3.6.0</a></p> <p>Release Date: 2018-12-17</p> <p>Fix Resolution: 5.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in node sass tgz autoclosed cve medium severity vulnerability vulnerable library node sass tgz wrapper around libsass library home page a href dependency hierarchy x node sass tgz vulnerable library found in head commit a href found in base branch dev seed tool vulnerability details in libsass a null pointer dereference in the function sass eval operator sass supports operator in eval cpp may cause a denial of service application crash via a crafted sass input file publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
153,710
13,523,847,376
IssuesEvent
2020-09-15 10:35:36
paritytech/parity-signer
https://api.github.com/repos/paritytech/parity-signer
closed
Remove or replace recommended command to install NDK
F5-documentation
In https://github.com/paritytech/parity-signer/blob/master/create-ndk-standalone.sh#L23 we recommend that the user installs NDK using Homebrew, however this installs the latest version of NDK that may not work with Parity Signer instead of the version r13b that has been tested to actually work with Parity Signer. Also it deceptively prints a message that appears to be the users command prompt and the command, rather than differentiating itself as an actually message to the user
1.0
Remove or replace recommended command to install NDK - In https://github.com/paritytech/parity-signer/blob/master/create-ndk-standalone.sh#L23 we recommend that the user installs NDK using Homebrew, however this installs the latest version of NDK that may not work with Parity Signer instead of the version r13b that has been tested to actually work with Parity Signer. Also it deceptively prints a message that appears to be the users command prompt and the command, rather than differentiating itself as an actually message to the user
non_priority
remove or replace recommended command to install ndk in we recommend that the user installs ndk using homebrew however this installs the latest version of ndk that may not work with parity signer instead of the version that has been tested to actually work with parity signer also it deceptively prints a message that appears to be the users command prompt and the command rather than differentiating itself as an actually message to the user
0
81,227
30,760,095,859
IssuesEvent
2023-07-29 15:28:25
amyjko/bookish
https://api.github.com/repos/amyjko/bookish
closed
Horizontal rule has much more spacing in read mode than in editor
defect writing reading
Example rule in editor: ![image](https://github.com/amyjko/bookish/assets/1960801/25e63b3c-4dbd-41f1-a9d9-1817fd505501) Same rule in reader: ![image](https://github.com/amyjko/bookish/assets/1960801/6e710b77-62cb-4c8a-8e9f-49d9c97411c7) Setup: My usual: recent chrome on Win11 home Theme: I use the "Bookish" theme. I played around with adding the following custom CSS and did not see a difference: hr { margin: 10px 0 10px 0; } Thoughts: - The spacing in the editor is satisfactory for me. If we can get the same spacing in the reader, that would be perfect - If it requires custom CSS, I'm happy to add custom CSS, but I would need some advice on which spacing values I need to customize
1.0
Horizontal rule has much more spacing in read mode than in editor - Example rule in editor: ![image](https://github.com/amyjko/bookish/assets/1960801/25e63b3c-4dbd-41f1-a9d9-1817fd505501) Same rule in reader: ![image](https://github.com/amyjko/bookish/assets/1960801/6e710b77-62cb-4c8a-8e9f-49d9c97411c7) Setup: My usual: recent chrome on Win11 home Theme: I use the "Bookish" theme. I played around with adding the following custom CSS and did not see a difference: hr { margin: 10px 0 10px 0; } Thoughts: - The spacing in the editor is satisfactory for me. If we can get the same spacing in the reader, that would be perfect - If it requires custom CSS, I'm happy to add custom CSS, but I would need some advice on which spacing values I need to customize
non_priority
horizontal rule has much more spacing in read mode than in editor example rule in editor same rule in reader setup my usual recent chrome on home theme i use the bookish theme i played around with adding the following custom css and did not see a difference hr margin thoughts the spacing in the editor is satisfactory for me if we can get the same spacing in the reader that would be perfect if it requires custom css i m happy to add custom css but i would need some advice on which spacing values i need to customize
0
12,845
3,655,879,771
IssuesEvent
2016-02-17 17:46:57
ExcaliburZero/tempconvert-c
https://api.github.com/repos/ExcaliburZero/tempconvert-c
closed
Add reporting bugs section to manual file
documentation
A section should be added to the manual file with information on how to report bugs. See `man ls` for an example.
1.0
Add reporting bugs section to manual file - A section should be added to the manual file with information on how to report bugs. See `man ls` for an example.
non_priority
add reporting bugs section to manual file a section should be added to the manual file with information on how to report bugs see man ls for an example
0
113,471
14,441,132,811
IssuesEvent
2020-12-07 16:24:36
ParabolInc/parabol
https://api.github.com/repos/ParabolInc/parabol
closed
Comments should be able to be promoted to tasks
design stale
When I've mistakenly entered a commend I wished instead to be a task, I want an affordance for me to be able to change the comment into a task, so that I don't have to copy the comment text, paste into a new task, and delete the old commend (that's too cumbersome!) AC: - A medium-fi design for the above EE: - ​6 hours
1.0
Comments should be able to be promoted to tasks - When I've mistakenly entered a commend I wished instead to be a task, I want an affordance for me to be able to change the comment into a task, so that I don't have to copy the comment text, paste into a new task, and delete the old commend (that's too cumbersome!) AC: - A medium-fi design for the above EE: - ​6 hours
non_priority
comments should be able to be promoted to tasks when i ve mistakenly entered a commend i wished instead to be a task i want an affordance for me to be able to change the comment into a task so that i don t have to copy the comment text paste into a new task and delete the old commend that s too cumbersome ac a medium fi design for the above ee ​ hours
0
115,441
17,313,987,177
IssuesEvent
2021-07-27 01:40:45
bsbtd/Teste
https://api.github.com/repos/bsbtd/Teste
opened
CVE-2021-34552 (High) detected in Pillow-7.1.2-cp36-cp36m-manylinux1_x86_64.whl
security vulnerability
## CVE-2021-34552 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Pillow-7.1.2-cp36-cp36m-manylinux1_x86_64.whl</b></p></summary> <p>Python Imaging Library (Fork)</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/e0/50/8e78e6f62ffa50d6ca95c281d5a2819bef66d023ac1b723e253de5bda9c5/Pillow-7.1.2-cp36-cp36m-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/e0/50/8e78e6f62ffa50d6ca95c281d5a2819bef66d023ac1b723e253de5bda9c5/Pillow-7.1.2-cp36-cp36m-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: Teste/pytorch-metric-learning</p> <p>Path to vulnerable library: Teste/pytorch-metric-learning</p> <p> Dependency Hierarchy: - :x: **Pillow-7.1.2-cp36-cp36m-manylinux1_x86_64.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c. <p>Publish Date: 2021-07-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34552>CVE-2021-34552</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow">https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow</a></p> <p>Release Date: 2021-07-13</p> <p>Fix Resolution: Pillow-8.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-34552 (High) detected in Pillow-7.1.2-cp36-cp36m-manylinux1_x86_64.whl - ## CVE-2021-34552 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Pillow-7.1.2-cp36-cp36m-manylinux1_x86_64.whl</b></p></summary> <p>Python Imaging Library (Fork)</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/e0/50/8e78e6f62ffa50d6ca95c281d5a2819bef66d023ac1b723e253de5bda9c5/Pillow-7.1.2-cp36-cp36m-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/e0/50/8e78e6f62ffa50d6ca95c281d5a2819bef66d023ac1b723e253de5bda9c5/Pillow-7.1.2-cp36-cp36m-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: Teste/pytorch-metric-learning</p> <p>Path to vulnerable library: Teste/pytorch-metric-learning</p> <p> Dependency Hierarchy: - :x: **Pillow-7.1.2-cp36-cp36m-manylinux1_x86_64.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c. <p>Publish Date: 2021-07-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34552>CVE-2021-34552</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow">https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow</a></p> <p>Release Date: 2021-07-13</p> <p>Fix Resolution: Pillow-8.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in pillow whl cve high severity vulnerability vulnerable library pillow whl python imaging library fork library home page a href path to dependency file teste pytorch metric learning path to vulnerable library teste pytorch metric learning dependency hierarchy x pillow whl vulnerable library vulnerability details pillow through and pil aka python imaging library through allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in convert c publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution pillow step up your open source security game with whitesource
0
353,433
25,118,358,652
IssuesEvent
2022-11-09 05:20:42
WSUCptSCapstone-Fall2022Spring2023/remi-hpcstochpy
https://api.github.com/repos/WSUCptSCapstone-Fall2022Spring2023/remi-hpcstochpy
closed
Update Project Description Document to Include Testing and Acceptance Plans
documentation
Update the git repo to contain the newest version of the project description.
1.0
Update Project Description Document to Include Testing and Acceptance Plans - Update the git repo to contain the newest version of the project description.
non_priority
update project description document to include testing and acceptance plans update the git repo to contain the newest version of the project description
0
271,602
23,617,259,162
IssuesEvent
2022-08-24 16:58:12
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
ccl/multitenantccl/tenantcostclient: TestConsumption failed
C-test-failure O-robot branch-master release-blocker branch-release-22.2
ccl/multitenantccl/tenantcostclient.TestConsumption [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/5695797?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/5695797?buildTab=artifacts#/) on master @ [54b4fcaa231abd16260fb09722ed291dbd6a4900](https://github.com/cockroachdb/cockroach/commits/54b4fcaa231abd16260fb09722ed291dbd6a4900): ``` === RUN TestConsumption test_log_scope.go:79: test logs captured to: /artifacts/tmp/_tmp/8c8c3ac7e6f376e55ddb65c834857f3f/logTestConsumption2162408875 test_log_scope.go:80: use -show-logs to present logs inline tenant_side_test.go:886: usage after write: r_u:9.999999000000344 sql_pods_cpu_seconds:0.03000000000000025 tenant_side_test.go:910: -- test log scope end -- --- FAIL: TestConsumption (2.36s) ``` <p>Parameters: <code>TAGS=bazel,gss,deadlock</code> </p> <details><summary>Help</summary> <p> See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM) </p> </details> /cc @cockroachdb/multi-tenant <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestConsumption.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-17467
1.0
ccl/multitenantccl/tenantcostclient: TestConsumption failed - ccl/multitenantccl/tenantcostclient.TestConsumption [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/5695797?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/5695797?buildTab=artifacts#/) on master @ [54b4fcaa231abd16260fb09722ed291dbd6a4900](https://github.com/cockroachdb/cockroach/commits/54b4fcaa231abd16260fb09722ed291dbd6a4900): ``` === RUN TestConsumption test_log_scope.go:79: test logs captured to: /artifacts/tmp/_tmp/8c8c3ac7e6f376e55ddb65c834857f3f/logTestConsumption2162408875 test_log_scope.go:80: use -show-logs to present logs inline tenant_side_test.go:886: usage after write: r_u:9.999999000000344 sql_pods_cpu_seconds:0.03000000000000025 tenant_side_test.go:910: -- test log scope end -- --- FAIL: TestConsumption (2.36s) ``` <p>Parameters: <code>TAGS=bazel,gss,deadlock</code> </p> <details><summary>Help</summary> <p> See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM) </p> </details> /cc @cockroachdb/multi-tenant <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestConsumption.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-17467
non_priority
ccl multitenantccl tenantcostclient testconsumption failed ccl multitenantccl tenantcostclient testconsumption with on master run testconsumption test log scope go test logs captured to artifacts tmp tmp test log scope go use show logs to present logs inline tenant side test go usage after write r u sql pods cpu seconds tenant side test go test log scope end fail testconsumption parameters tags bazel gss deadlock help see also cc cockroachdb multi tenant jira issue crdb
0
170,668
20,883,817,841
IssuesEvent
2022-03-23 01:16:16
chaitanya00/aem-wknd
https://api.github.com/repos/chaitanya00/aem-wknd
opened
CVE-2021-44906 (Medium) detected in minimist-0.0.8.tgz, minimist-1.2.0.tgz
security vulnerability
## CVE-2021-44906 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary> <p> <details><summary><b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /.scannerwork/css-bundle/node_modules/mkdirp/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - tap-11.1.5.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-1.2.0.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /.scannerwork/css-bundle/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - browserify-13.3.0.tgz (Root Library) - subarg-1.0.0.tgz - :x: **minimist-1.2.0.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95). <p>Publish Date: 2022-03-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44906>CVE-2021-44906</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">https://nvd.nist.gov/vuln/detail/CVE-2021-44906</a></p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution: BumperLane.Public.Service.Contracts - 0.23.35.214-prerelease;cloudscribe.templates - 5.2.0;Virteom.Tenant.Mobile.Bluetooth - 0.21.29.159-prerelease;ShowingVault.DotNet.Sdk - 0.13.41.190-prerelease;Envisia.DotNet.Templates - 3.0.1;Yarnpkg.Yarn - 0.26.1;Virteom.Tenant.Mobile.Framework.UWP - 0.20.41.103-prerelease;Virteom.Tenant.Mobile.Framework.iOS - 0.20.41.103-prerelease;BumperLane.Public.Api.V2.ClientModule - 0.23.35.214-prerelease;VueJS.NetCore - 1.1.1;Dianoga - 4.0.0,3.0.0-RC02;Virteom.Tenant.Mobile.Bluetooth.iOS - 0.20.41.103-prerelease;Virteom.Public.Utilities - 0.23.37.212-prerelease;Indianadavy.VueJsWebAPITemplate.CSharp - 1.0.1;NorDroN.AngularTemplate - 0.1.6;Virteom.Tenant.Mobile.Framework - 0.21.29.159-prerelease;Virteom.Tenant.Mobile.Bluetooth.Android - 0.20.41.103-prerelease;z4a-dotnet-scaffold - 1.0.0.2;Raml.Parser - 1.0.7;CoreVueWebTest - 3.0.101;dotnetng.template - 1.0.0.4;SitecoreMaster.TrueDynamicPlaceholders - 1.0.3;Virteom.Tenant.Mobile.Framework.Android - 0.20.41.103-prerelease;Fable.Template.Elmish.React - 0.1.6;BlazorPolyfill.Build - 6.0.100.2;Fable.Snowpack.Template - 2.1.0;BumperLane.Public.Api.Client - 0.23.35.214-prerelease;Yarn.MSBuild - 0.22.0,0.24.6;Blazor.TailwindCSS.BUnit - 1.0.2;Bridge.AWS - 0.3.30.36;tslint - 5.6.0;SAFE.Template - 3.0.1;GR.PageRender.Razor - 1.8.0;MIDIator.WebClient - 1.0.105</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-44906 (Medium) detected in minimist-0.0.8.tgz, minimist-1.2.0.tgz - ## CVE-2021-44906 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary> <p> <details><summary><b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /.scannerwork/css-bundle/node_modules/mkdirp/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - tap-11.1.5.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-1.2.0.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /.scannerwork/css-bundle/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - browserify-13.3.0.tgz (Root Library) - subarg-1.0.0.tgz - :x: **minimist-1.2.0.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95). <p>Publish Date: 2022-03-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44906>CVE-2021-44906</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">https://nvd.nist.gov/vuln/detail/CVE-2021-44906</a></p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution: BumperLane.Public.Service.Contracts - 0.23.35.214-prerelease;cloudscribe.templates - 5.2.0;Virteom.Tenant.Mobile.Bluetooth - 0.21.29.159-prerelease;ShowingVault.DotNet.Sdk - 0.13.41.190-prerelease;Envisia.DotNet.Templates - 3.0.1;Yarnpkg.Yarn - 0.26.1;Virteom.Tenant.Mobile.Framework.UWP - 0.20.41.103-prerelease;Virteom.Tenant.Mobile.Framework.iOS - 0.20.41.103-prerelease;BumperLane.Public.Api.V2.ClientModule - 0.23.35.214-prerelease;VueJS.NetCore - 1.1.1;Dianoga - 4.0.0,3.0.0-RC02;Virteom.Tenant.Mobile.Bluetooth.iOS - 0.20.41.103-prerelease;Virteom.Public.Utilities - 0.23.37.212-prerelease;Indianadavy.VueJsWebAPITemplate.CSharp - 1.0.1;NorDroN.AngularTemplate - 0.1.6;Virteom.Tenant.Mobile.Framework - 0.21.29.159-prerelease;Virteom.Tenant.Mobile.Bluetooth.Android - 0.20.41.103-prerelease;z4a-dotnet-scaffold - 1.0.0.2;Raml.Parser - 1.0.7;CoreVueWebTest - 3.0.101;dotnetng.template - 1.0.0.4;SitecoreMaster.TrueDynamicPlaceholders - 1.0.3;Virteom.Tenant.Mobile.Framework.Android - 0.20.41.103-prerelease;Fable.Template.Elmish.React - 0.1.6;BlazorPolyfill.Build - 6.0.100.2;Fable.Snowpack.Template - 2.1.0;BumperLane.Public.Api.Client - 0.23.35.214-prerelease;Yarn.MSBuild - 0.22.0,0.24.6;Blazor.TailwindCSS.BUnit - 1.0.2;Bridge.AWS - 0.3.30.36;tslint - 5.6.0;SAFE.Template - 3.0.1;GR.PageRender.Razor - 1.8.0;MIDIator.WebClient - 1.0.105</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in minimist tgz minimist tgz cve medium severity vulnerability vulnerable libraries minimist tgz minimist tgz minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library scannerwork css bundle node modules mkdirp node modules minimist package json dependency hierarchy tap tgz root library mkdirp tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library scannerwork css bundle node modules minimist package json dependency hierarchy browserify tgz root library subarg tgz x minimist tgz vulnerable library found in base branch master vulnerability details minimist is vulnerable to prototype pollution via file index js function setkey lines publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bumperlane public service contracts prerelease cloudscribe templates virteom tenant mobile bluetooth prerelease showingvault dotnet sdk prerelease envisia dotnet templates yarnpkg yarn virteom tenant mobile framework uwp prerelease virteom tenant mobile framework ios prerelease bumperlane public api clientmodule prerelease vuejs netcore dianoga virteom tenant mobile bluetooth ios prerelease virteom public utilities prerelease indianadavy vuejswebapitemplate csharp nordron angulartemplate virteom tenant mobile framework prerelease virteom tenant mobile bluetooth android prerelease dotnet scaffold raml parser corevuewebtest dotnetng template sitecoremaster truedynamicplaceholders virteom tenant mobile framework android prerelease fable template elmish react blazorpolyfill build fable snowpack template bumperlane public api client prerelease yarn msbuild blazor tailwindcss bunit bridge aws tslint safe template gr pagerender razor midiator webclient step up your open source security game with whitesource
0
442,681
30,850,658,425
IssuesEvent
2023-08-02 16:28:54
re-organization-sandbox/sandbox-repo
https://api.github.com/repos/re-organization-sandbox/sandbox-repo
closed
Welcome to sandbox-repo Discussions!
bug documentation duplicate
### Discussed in https://github.com/re-organization-sandbox/sandbox-repo/discussions/3 <div type='discussions-op-text'> <sup>Originally posted by **SkPhilipp** August 2, 2023</sup> Please don't share your ideas here because this is a repository meant to record GitHub events, I definitely won't be reading any of this.</div> This seems important
1.0
Welcome to sandbox-repo Discussions! - ### Discussed in https://github.com/re-organization-sandbox/sandbox-repo/discussions/3 <div type='discussions-op-text'> <sup>Originally posted by **SkPhilipp** August 2, 2023</sup> Please don't share your ideas here because this is a repository meant to record GitHub events, I definitely won't be reading any of this.</div> This seems important
non_priority
welcome to sandbox repo discussions discussed in originally posted by skphilipp august please don t share your ideas here because this is a repository meant to record github events i definitely won t be reading any of this this seems important
0
450,957
32,000,740,953
IssuesEvent
2023-09-21 12:08:20
aws/sagemaker-python-sdk
https://api.github.com/repos/aws/sagemaker-python-sdk
closed
[DOC]sphinx_rtd_theme PackagesNotFoundError
type: documentation
**Describe the bug** Got the following error when attempting to build the docs locally. PackagesNotFoundError: The following packages are not available from current channels: - sphinx_rtd_theme=0.5.0 **To reproduce** Run the following: # conda conda create -n sagemaker python=3.7 conda activate sagemaker conda install sphinx=3.1.1 sphinx_rtd_theme=0.5.0 # pip pip install -r doc/requirements.txt **Expected behavior** Expect the package to download and update. **System information** A description of your system. Please provide: Trying to build through terminal on Mac running Mojave.
1.0
[DOC]sphinx_rtd_theme PackagesNotFoundError - **Describe the bug** Got the following error when attempting to build the docs locally. PackagesNotFoundError: The following packages are not available from current channels: - sphinx_rtd_theme=0.5.0 **To reproduce** Run the following: # conda conda create -n sagemaker python=3.7 conda activate sagemaker conda install sphinx=3.1.1 sphinx_rtd_theme=0.5.0 # pip pip install -r doc/requirements.txt **Expected behavior** Expect the package to download and update. **System information** A description of your system. Please provide: Trying to build through terminal on Mac running Mojave.
non_priority
sphinx rtd theme packagesnotfounderror describe the bug got the following error when attempting to build the docs locally packagesnotfounderror the following packages are not available from current channels sphinx rtd theme to reproduce run the following conda conda create n sagemaker python conda activate sagemaker conda install sphinx sphinx rtd theme pip pip install r doc requirements txt expected behavior expect the package to download and update system information a description of your system please provide trying to build through terminal on mac running mojave
0
255,048
21,896,969,855
IssuesEvent
2022-05-20 09:33:55
elastic/elasticsearch
https://api.github.com/repos/elastic/elasticsearch
opened
[CI] ActiveDirectoryGroupsResolverTests testResolveSubTree failing
>test-failure :Security/Authentication Team:Security
**Build scan:** https://gradle-enterprise.elastic.co/s/lbk5ynxsss7ym/tests/:x-pack:qa:third-party:active-directory:test/org.elasticsearch.xpack.security.authc.ldap.ActiveDirectoryGroupsResolverTests/testResolveSubTree **Reproduction line:** `./gradlew ':x-pack:qa:third-party:active-directory:test' --tests "org.elasticsearch.xpack.security.authc.ldap.ActiveDirectoryGroupsResolverTests.testResolveSubTree" -Dtests.seed=B75C7A14E63A1ABB -Dtests.locale=is-IS -Dtests.timezone=Australia/Adelaide -Druntime.java=18` **Applicable branches:** master **Reproduces locally?:** Didn't try **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.security.authc.ldap.ActiveDirectoryGroupsResolverTests&tests.test=testResolveSubTree **Failure excerpt:** ``` com.unboundid.ldap.sdk.LDAPException: A client-side timeout was encountered while waiting 5005ms for a response to simple bind request with message ID 1 for user 'cn=Bruce Banner,CN=Users,DC=ad,DC=test,DC=elasticsearch,DC=com' from server localhost:49182. at __randomizedtesting.SeedInfo.seed([B75C7A14E63A1ABB:3CE0D99C8300612D]:0) at com.unboundid.ldap.sdk.SimpleBindRequest.handleResponse(SimpleBindRequest.java:738) at com.unboundid.ldap.sdk.SimpleBindRequest.process(SimpleBindRequest.java:619) at com.unboundid.ldap.sdk.LDAPConnection.processBindOperation(LDAPConnection.java:4560) at com.unboundid.ldap.sdk.LDAPConnection.bind(LDAPConnection.java:2393) at com.unboundid.ldap.sdk.LDAPConnection.<init>(LDAPConnection.java:700) at org.elasticsearch.xpack.security.authc.ldap.LdapTestUtils.lambda$openConnection$0(LdapTestUtils.java:60) at java.security.AccessController.doPrivileged(AccessController.java:569) at org.elasticsearch.xpack.security.authc.ldap.support.LdapUtils.privilegedConnect(LdapUtils.java:76) at org.elasticsearch.xpack.security.authc.ldap.LdapTestUtils.openConnection(LdapTestUtils.java:55) at org.elasticsearch.xpack.security.authc.ldap.GroupsResolverTestCase.setUpLdapConnection(GroupsResolverTestCase.java:58) at jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMethodHandleAccessor.java:104) at java.lang.reflect.Method.invoke(Method.java:577) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:980) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
1.0
[CI] ActiveDirectoryGroupsResolverTests testResolveSubTree failing - **Build scan:** https://gradle-enterprise.elastic.co/s/lbk5ynxsss7ym/tests/:x-pack:qa:third-party:active-directory:test/org.elasticsearch.xpack.security.authc.ldap.ActiveDirectoryGroupsResolverTests/testResolveSubTree **Reproduction line:** `./gradlew ':x-pack:qa:third-party:active-directory:test' --tests "org.elasticsearch.xpack.security.authc.ldap.ActiveDirectoryGroupsResolverTests.testResolveSubTree" -Dtests.seed=B75C7A14E63A1ABB -Dtests.locale=is-IS -Dtests.timezone=Australia/Adelaide -Druntime.java=18` **Applicable branches:** master **Reproduces locally?:** Didn't try **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.security.authc.ldap.ActiveDirectoryGroupsResolverTests&tests.test=testResolveSubTree **Failure excerpt:** ``` com.unboundid.ldap.sdk.LDAPException: A client-side timeout was encountered while waiting 5005ms for a response to simple bind request with message ID 1 for user 'cn=Bruce Banner,CN=Users,DC=ad,DC=test,DC=elasticsearch,DC=com' from server localhost:49182. at __randomizedtesting.SeedInfo.seed([B75C7A14E63A1ABB:3CE0D99C8300612D]:0) at com.unboundid.ldap.sdk.SimpleBindRequest.handleResponse(SimpleBindRequest.java:738) at com.unboundid.ldap.sdk.SimpleBindRequest.process(SimpleBindRequest.java:619) at com.unboundid.ldap.sdk.LDAPConnection.processBindOperation(LDAPConnection.java:4560) at com.unboundid.ldap.sdk.LDAPConnection.bind(LDAPConnection.java:2393) at com.unboundid.ldap.sdk.LDAPConnection.<init>(LDAPConnection.java:700) at org.elasticsearch.xpack.security.authc.ldap.LdapTestUtils.lambda$openConnection$0(LdapTestUtils.java:60) at java.security.AccessController.doPrivileged(AccessController.java:569) at org.elasticsearch.xpack.security.authc.ldap.support.LdapUtils.privilegedConnect(LdapUtils.java:76) at org.elasticsearch.xpack.security.authc.ldap.LdapTestUtils.openConnection(LdapTestUtils.java:55) at org.elasticsearch.xpack.security.authc.ldap.GroupsResolverTestCase.setUpLdapConnection(GroupsResolverTestCase.java:58) at jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMethodHandleAccessor.java:104) at java.lang.reflect.Method.invoke(Method.java:577) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:980) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:44) at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:824) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:475) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:375) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:831) at java.lang.Thread.run(Thread.java:833) ```
non_priority
activedirectorygroupsresolvertests testresolvesubtree failing build scan reproduction line gradlew x pack qa third party active directory test tests org elasticsearch xpack security authc ldap activedirectorygroupsresolvertests testresolvesubtree dtests seed dtests locale is is dtests timezone australia adelaide druntime java applicable branches master reproduces locally didn t try failure history failure excerpt com unboundid ldap sdk ldapexception a client side timeout was encountered while waiting for a response to simple bind request with message id for user cn bruce banner cn users dc ad dc test dc elasticsearch dc com from server localhost at randomizedtesting seedinfo seed at com unboundid ldap sdk simplebindrequest handleresponse simplebindrequest java at com unboundid ldap sdk simplebindrequest process simplebindrequest java at com unboundid ldap sdk ldapconnection processbindoperation ldapconnection java at com unboundid ldap sdk ldapconnection bind ldapconnection java at com unboundid ldap sdk ldapconnection ldapconnection java at org elasticsearch xpack security authc ldap ldaptestutils lambda openconnection ldaptestutils java at java security accesscontroller doprivileged accesscontroller java at org elasticsearch xpack security authc ldap support ldaputils privilegedconnect ldaputils java at org elasticsearch xpack security authc ldap ldaptestutils openconnection ldaptestutils java at org elasticsearch xpack security authc ldap groupsresolvertestcase setupldapconnection groupsresolvertestcase java at jdk internal reflect directmethodhandleaccessor invoke directmethodhandleaccessor java at java lang reflect method invoke method java at com carrotsearch randomizedtesting randomizedrunner invoke randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testrulesetupteardownchained evaluate testrulesetupteardownchained java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at org apache lucene tests util testrulethreadandtestname evaluate testrulethreadandtestname java at org apache lucene tests util testruleignoreaftermaxfailures evaluate testruleignoreaftermaxfailures java at org apache lucene tests util testrulemarkfailure evaluate testrulemarkfailure java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting threadleakcontrol statementrunner run threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol forktimeoutingtask threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol evaluate threadleakcontrol java at com carrotsearch randomizedtesting randomizedrunner runsingletest randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testrulestoreclassname evaluate testrulestoreclassname java at com carrotsearch randomizedtesting rules noshadowingoroverridesonmethodsrule evaluate noshadowingoroverridesonmethodsrule java at com carrotsearch randomizedtesting rules noshadowingoroverridesonmethodsrule evaluate noshadowingoroverridesonmethodsrule java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testruleassertionsrequired evaluate testruleassertionsrequired java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at org apache lucene tests util testrulemarkfailure evaluate testrulemarkfailure java at org apache lucene tests util testruleignoreaftermaxfailures evaluate testruleignoreaftermaxfailures java at org apache lucene tests util testruleignoretestsuites evaluate testruleignoretestsuites java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting threadleakcontrol statementrunner run threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol lambda forktimeoutingtask threadleakcontrol java at java lang thread run thread java
0
142,454
21,768,736,998
IssuesEvent
2022-05-13 06:46:43
iFixit/react-commerce
https://api.github.com/repos/iFixit/react-commerce
closed
Excessive whitespace in mobile product list
design
On mobile, the product list view has a lot of whitespace. | Amazon | ebay | Alibaba | iFixit collection | | ------------- | ------------- | ------------- | ------------- | | ![image](https://user-images.githubusercontent.com/72166715/160652454-d9086af2-1d03-417d-94aa-94ef1c95119f.png) | ![image](https://user-images.githubusercontent.com/72166715/160652608-4f431ca2-b0a1-4173-8c2f-e8d191cec6af.png) | ![image](https://user-images.githubusercontent.com/72166715/160652778-2147a85c-ba2c-4f51-a75e-6bf0e1e63a8f.png) | ![image](https://user-images.githubusercontent.com/72166715/160652939-32db6ec4-11ba-4b62-be24-e5e036612065.png) |
1.0
Excessive whitespace in mobile product list - On mobile, the product list view has a lot of whitespace. | Amazon | ebay | Alibaba | iFixit collection | | ------------- | ------------- | ------------- | ------------- | | ![image](https://user-images.githubusercontent.com/72166715/160652454-d9086af2-1d03-417d-94aa-94ef1c95119f.png) | ![image](https://user-images.githubusercontent.com/72166715/160652608-4f431ca2-b0a1-4173-8c2f-e8d191cec6af.png) | ![image](https://user-images.githubusercontent.com/72166715/160652778-2147a85c-ba2c-4f51-a75e-6bf0e1e63a8f.png) | ![image](https://user-images.githubusercontent.com/72166715/160652939-32db6ec4-11ba-4b62-be24-e5e036612065.png) |
non_priority
excessive whitespace in mobile product list on mobile the product list view has a lot of whitespace amazon ebay alibaba ifixit collection
0
19,702
14,475,725,580
IssuesEvent
2020-12-10 02:20:04
NCAR/VAPOR
https://api.github.com/repos/NCAR/VAPOR
closed
Flow: Gridded seed distribution gives unexpected results
High Usability
The gridded seed distribution does not seem to do what is expected. With the default configuration for 3D data (a 5 x 5 x 5 grid) I'd expect to see 125 stream/path lines. What you see is something less. This is more obvious if you define an even coarser grid, for example 2 x 2 x 2. For some data sets nothing may be drawn. I suspect the problem is because the seeding grid is aligned to the domain extents. This is probably not what the user wants. Calculating the sample locations, Si, as follows would give more useful and intuitive results: Si = min + (0.5*delta) + (i*delta) : 0<i<nSamples where: delta = (max-min) / (nSamples) min and max are the domain extents nSamples are the number of samples To reproduce: 1. Load CM1/Orf/24Maycontrol 2. Enable the flow renderer 3. Change the grid to 2x2x2. Only one streamline is drawn and it's in a corner
True
Flow: Gridded seed distribution gives unexpected results - The gridded seed distribution does not seem to do what is expected. With the default configuration for 3D data (a 5 x 5 x 5 grid) I'd expect to see 125 stream/path lines. What you see is something less. This is more obvious if you define an even coarser grid, for example 2 x 2 x 2. For some data sets nothing may be drawn. I suspect the problem is because the seeding grid is aligned to the domain extents. This is probably not what the user wants. Calculating the sample locations, Si, as follows would give more useful and intuitive results: Si = min + (0.5*delta) + (i*delta) : 0<i<nSamples where: delta = (max-min) / (nSamples) min and max are the domain extents nSamples are the number of samples To reproduce: 1. Load CM1/Orf/24Maycontrol 2. Enable the flow renderer 3. Change the grid to 2x2x2. Only one streamline is drawn and it's in a corner
non_priority
flow gridded seed distribution gives unexpected results the gridded seed distribution does not seem to do what is expected with the default configuration for data a x x grid i d expect to see stream path lines what you see is something less this is more obvious if you define an even coarser grid for example x x for some data sets nothing may be drawn i suspect the problem is because the seeding grid is aligned to the domain extents this is probably not what the user wants calculating the sample locations si as follows would give more useful and intuitive results si min delta i delta i nsamples where delta max min nsamples min and max are the domain extents nsamples are the number of samples to reproduce load orf enable the flow renderer change the grid to only one streamline is drawn and it s in a corner
0
451,105
32,008,451,779
IssuesEvent
2023-09-21 16:15:58
mantidproject/mantid
https://api.github.com/repos/mantidproject/mantid
opened
Add Documentation for MagnetismReflectometryReduction
Reflectometry Documentation Maintenance
**Describe the outcome that is desired.** A documentation page should be available for the algorithm so the ? button doesn't redirect to a 404 page. **Describe any solutions you are considering** None **Additional context**
1.0
Add Documentation for MagnetismReflectometryReduction - **Describe the outcome that is desired.** A documentation page should be available for the algorithm so the ? button doesn't redirect to a 404 page. **Describe any solutions you are considering** None **Additional context**
non_priority
add documentation for magnetismreflectometryreduction describe the outcome that is desired a documentation page should be available for the algorithm so the button doesn t redirect to a page describe any solutions you are considering none additional context
0
64,992
19,006,969,575
IssuesEvent
2021-11-23 02:06:08
vector-im/element-ios
https://api.github.com/repos/vector-im/element-ios
opened
Value of type 'MXSDKOptions' has no member 'clientPermalinkBaseUrl'
T-Defect
### Steps to reproduce keep running into error :// Value of type 'MXSDKOptions' has no member 'clientPermalinkBaseUrl' ### Outcome no idea how to fix ### Your phone model _No response_ ### Operating system version _No response_ ### Application version _No response_ ### Homeserver _No response_ ### Will you send logs? Yes
1.0
Value of type 'MXSDKOptions' has no member 'clientPermalinkBaseUrl' - ### Steps to reproduce keep running into error :// Value of type 'MXSDKOptions' has no member 'clientPermalinkBaseUrl' ### Outcome no idea how to fix ### Your phone model _No response_ ### Operating system version _No response_ ### Application version _No response_ ### Homeserver _No response_ ### Will you send logs? Yes
non_priority
value of type mxsdkoptions has no member clientpermalinkbaseurl steps to reproduce keep running into error value of type mxsdkoptions has no member clientpermalinkbaseurl outcome no idea how to fix your phone model no response operating system version no response application version no response homeserver no response will you send logs yes
0
113,431
11,802,508,181
IssuesEvent
2020-03-18 21:43:00
rsmp-nordic/rsmp_sxl_traffic_lights
https://api.github.com/repos/rsmp-nordic/rsmp_sxl_traffic_lights
opened
S0205 uses comma-separated list, not colon-separated?
documentation
Documentation states that the vehicle count list in S0205 is a list of integers separated by colons. I think it shoould say commas? https://github.com/rsmp-nordic/rsmp_sxl_traffic_lights/blob/master/sxl_traffic_controller.md#s0205
1.0
S0205 uses comma-separated list, not colon-separated? - Documentation states that the vehicle count list in S0205 is a list of integers separated by colons. I think it shoould say commas? https://github.com/rsmp-nordic/rsmp_sxl_traffic_lights/blob/master/sxl_traffic_controller.md#s0205
non_priority
uses comma separated list not colon separated documentation states that the vehicle count list in is a list of integers separated by colons i think it shoould say commas
0
138,229
11,195,282,664
IssuesEvent
2020-01-03 05:40:55
nwjs/nw.js
https://api.github.com/repos/nwjs/nw.js
closed
NW2: Event navigation get not fired
nw2 test-todo
NWJS Version : v0.43.3 Operating System : Windows 10 ### Expected behavior When I navigate to another page, the event should be triggered and the call should be prevented. For example when clicking on a Link like google. ### Actual behavior Event is not triggered. If I add "chromium-args": "--disable-features=nw2" in package.json, the Event is triggered. ### How to reproduce main.js > nw.Window.open('index.html', {}, function(win) { > win.on('navigation', function (frame, url, policy) { > console.log("navigation called: " + url); > policy.ignore(); > }); > }); index.html `<a href="https://www.google.de">Click</a>`
1.0
NW2: Event navigation get not fired - NWJS Version : v0.43.3 Operating System : Windows 10 ### Expected behavior When I navigate to another page, the event should be triggered and the call should be prevented. For example when clicking on a Link like google. ### Actual behavior Event is not triggered. If I add "chromium-args": "--disable-features=nw2" in package.json, the Event is triggered. ### How to reproduce main.js > nw.Window.open('index.html', {}, function(win) { > win.on('navigation', function (frame, url, policy) { > console.log("navigation called: " + url); > policy.ignore(); > }); > }); index.html `<a href="https://www.google.de">Click</a>`
non_priority
event navigation get not fired nwjs version operating system windows expected behavior when i navigate to another page the event should be triggered and the call should be prevented for example when clicking on a link like google actual behavior event is not triggered if i add chromium args disable features in package json the event is triggered how to reproduce main js nw window open index html function win win on navigation function frame url policy console log navigation called url policy ignore index html a href
0
84,210
7,894,584,751
IssuesEvent
2018-06-28 22:05:20
envoyproxy/envoy
https://api.github.com/repos/envoyproxy/envoy
closed
hotrestart_test flakes in spdlog with TSAN (and other sanitizers)
test flakes
Occasionally we've observed in CI that `hotrestart_test` flakes during early spdlog use in `ValidationClusterManager`. Something isn't quite right here, since we should be doing the kind of verbose logging that would trigger it. Previous investigations by @mattklein123 and myself point to possible validation init not doing the right setup for logging. We should figure this one out. ``` [2018-03-15 21:06:45.658][20070][info][main] external/envoy/source/server/server.cc:275] runtime symlink: /build/tmp/_bazel_bazel/400406edc57d332f0b9b805d2b8e33a1/execroot/envoy/bazel-out/k8-dbg/bin/external/envoy/test/integration/hotrestart_test.runfiles/envoy/test/common/runtime/test_data/current [2018-03-15 21:06:45.658][20070][info][main] external/envoy/source/server/server.cc:276] runtime subdirectory: envoy [2018-03-15 21:06:45.658][20070][info][main] external/envoy/source/server/server.cc:280] runtime override subdirectory: envoy_override/cluster [2018-03-15 21:06:45.659][20070][debug][file] external/envoy/source/common/filesystem/inotify/watcher_impl.cc:48] added watch for directory: '/build/tmp/_bazel_bazel/400406edc57d332f0b9b805d2b8e33a1/execroot/envoy/bazel-out/k8-dbg/bin/external/envoy/test/integration/hotrestart_test.runfiles/envoy/test/common/runtime/test_data' file: 'current' fd: 1 [2018-03-15 21:06:45.659][20070][debug][runtime] external/envoy/source/common/runtime/runtime_impl.cc:196] walking directory: /build/tmp/_bazel_bazel/400406edc57d332f0b9b805d2b8e33a1/execroot/envoy/bazel-out/k8-dbg/bin/external/envoy/test/integration/hotrestart_test.runfiles/envoy/test/common/runtime/test_data/current/envoy [2018-03-15 21:06:45.659][20070][debug][runtime] external/envoy/source/common/runtime/runtime_impl.cc:167] error creating runtime snapshot: unable to open directory: /build/tmp/_bazel_bazel/400406edc57d332f0b9b805d2b8e33a1/execroot/envoy/bazel-out/k8-dbg/bin/external/envoy/test/integration/hotrestart_test.runfiles/envoy/test/common/runtime/test_data/current/envoy [2018-03-15 21:06:45.673][20152][debug][grpc] external/envoy/source/common/grpc/google_async_client_impl.cc:34] completionThread running ================== WARNING: ThreadSanitizer: data race (pid=20070) Write of size 8 at 0x7b9000006000 by main thread: #0 memcpy ??:? (envoy-static+0x54755c) #1 std::basic_streambuf<char, std::char_traits<char> >::xsputn(char const*, long) ??:? (envoy-static+0x1b255da) #2 spdlog::logger::_sink_it(spdlog::details::log_msg&) /proc/self/cwd/external/com_github_gabime_spdlog/include/spdlog/details/logger_impl.h:321 (envoy-static+0x5d09cc) #3 void spdlog::logger::log<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >(spdlog::level::level_enum, char const*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /proc/self/cwd/external/com_github_gabime_spdlog/include/spdlog/details/logger_impl.h:74 (envoy-static+0x6b542a) #4 void spdlog::logger::debug<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >>(char const*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /proc/self/cwd/external/com_github_gabime_spdlog/include/spdlog/details/logger_impl.h:139 (envoy-static+0x69eedd) #5 ThreadLocalClusterManagerImpl /proc/self/cwd/external/envoy/source/common/upstream/cluster_manager_impl.cc:573 (envoy-static+0x9b60ac) #6 void __gnu_cxx::new_allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl>::construct<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&>(Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl*, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/ext/new_allocator.h:120 (envoy-static+0x9d7fd4) #7 void std::allocator_traits<std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl> >::construct<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&>(std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl>&, Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl*, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/alloc_traits.h:530 (envoy-static+0x9d7c20) #8 _Sp_counted_ptr_inplace<Envoy::Upstream::ClusterManagerImpl &, Envoy::Event::Dispatcher &, const Envoy::Optional<std::__cxx11::basic_string<char> > &> /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/shared_ptr_base.h:522 (envoy-static+0x9d76d9) #9 __shared_count<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl, std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl>, Envoy::Upstream::ClusterManagerImpl &, Envoy::Event::Dispatcher &, const Envoy::Optional<std::__cxx11::basic_string<char> > &> /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/shared_ptr_base.h:617 (envoy-static+0x9d733d) #10 __shared_ptr<std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl>, Envoy::Upstream::ClusterManagerImpl &, Envoy::Event::Dispatcher &, const Envoy::Optional<std::__cxx11::basic_string<char> > &> /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/shared_ptr_base.h:1096 (envoy-static+0x9d711a) #11 shared_ptr<std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl>, Envoy::Upstream::ClusterManagerImpl &, Envoy::Event::Dispatcher &, const Envoy::Optional<std::__cxx11::basic_string<char> > &> /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/shared_ptr.h:319 (envoy-static+0x9d7010) #12 std::shared_ptr<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl> std::allocate_shared<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl, std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl>, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&>(std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl> const&, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/shared_ptr.h:619 (envoy-static+0x9d6e74) #13 std::shared_ptr<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl> std::make_shared<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&>(Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/shared_ptr.h:635 (envoy-static+0x9d6cf0) #14 operator() /proc/self/cwd/external/envoy/source/common/upstream/cluster_manager_impl.cc:255 (envoy-static+0x9bbb91) #15 std::_Function_handler<std::shared_ptr<Envoy::ThreadLocal::ThreadLocalObject> (Envoy::Event::Dispatcher&), Envoy::Upstream::ClusterManagerImpl::ClusterManagerImpl(envoy::config::bootstrap::v2::Bootstrap const&, Envoy::Upstream::ClusterManagerFactory&, Envoy::Stats::Store&, Envoy::ThreadLocal::Instance&, Envoy::Runtime::Loader&, Envoy::Runtime::RandomGenerator&, Envoy::LocalInfo::LocalInfo const&, Envoy::AccessLog::AccessLogManager&, Envoy::Event::Dispatcher&)::$_5>::_M_invoke(std::_Any_data const&, Envoy::Event::Dispatcher&) /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/functional:1856 (envoy-static+0x9bb811) #16 std::function<std::shared_ptr<Envoy::ThreadLocal::ThreadLocalObject> (Envoy::Event::Dispatcher&)>::operator()(Envoy::Event::Dispatcher&) const /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/functional:2267 (envoy-static+0x8b2b69) #17 Envoy::ThreadLocal::InstanceImpl::SlotImpl::set(std::function<std::shared_ptr<Envoy::ThreadLocal::ThreadLocalObject> (Envoy::Event::Dispatcher&)>) /proc/self/cwd/external/envoy/source/common/thread_local/thread_local_impl.cc:104 (envoy-static+0x8af854) #18 ClusterManagerImpl /proc/self/cwd/external/envoy/source/common/upstream/cluster_manager_impl.cc:253 (envoy-static+0x9b04f3) #19 ValidationClusterManager /proc/self/cwd/external/envoy/source/server/config_validation/cluster_manager.cc:36 (envoy-static+0x8a40e0) #20 Envoy::Upstream::ValidationClusterManagerFactory::clusterManagerFromProto(envoy::config::bootstrap::v2::Bootstrap const&, Envoy::Stats::Store&, Envoy::ThreadLocal::Instance&, Envoy::Runtime::Loader&, Envoy::Runtime::RandomGenerator&, Envoy::LocalInfo::LocalInfo const&, Envoy::AccessLog::AccessLogManager&) /proc/self/cwd/external/envoy/source/server/config_validation/cluster_manager.cc:18 (envoy-static+0x8a3e99) #21 Envoy::Server::Configuration::MainImpl::initialize(envoy::config::bootstrap::v2::Bootstrap const&, Envoy::Server::Instance&, Envoy::Upstream::ClusterManagerFactory&) /proc/self/cwd/external/envoy/source/server/configuration_impl.cc:48 (envoy-static+0x10bb950) #22 Envoy::Server::ValidationInstance::initialize(Envoy::Server::Options&, std::shared_ptr<Envoy::Network::Address::Instance const>, Envoy::Server::ComponentFactory&) /proc/self/cwd/external/envoy/source/server/config_validation/server.cc:88 (envoy-static+0x87c097) #23 ValidationInstance /proc/self/cwd/external/envoy/source/server/config_validation/server.cc:45 (envoy-static+0x87b57e) #24 Envoy::Server::validateConfig(Envoy::Server::Options&, std::shared_ptr<Envoy::Network::Address::Instance const>, Envoy::Server::ComponentFactory&) /proc/self/cwd/external/envoy/source/server/config_validation/server.cc:24 (envoy-static+0x87ad4f) #25 Envoy::MainCommonBase::run() /proc/self/cwd/external/envoy/source/exe/main_common.cc:83 (envoy-static+0x600752) #26 Envoy::MainCommon::run() /proc/self/cwd/bazel-out/k8-dbg/bin/external/envoy/source/exe/_virtual_includes/envoy_main_common_lib/exe/main_common.h:43 (envoy-static+0x5d05bf) #27 main /proc/self/cwd/external/envoy/source/exe/main.cc:36 (envoy-static+0x5cec4d) Previous write of size 8 at 0x7b9000006000 by thread T3: #0 memcpy ??:? (envoy-static+0x54755c) #1 std::basic_streambuf<char, std::char_traits<char> >::xsputn(char const*, long) ??:? (envoy-static+0x1b255da) #2 spdlog::logger::_sink_it(spdlog::details::log_msg&) /proc/self/cwd/external/com_github_gabime_spdlog/include/spdlog/details/logger_impl.h:321 (envoy-static+0x5d09cc) #3 void spdlog::logger::log<>(spdlog::level::level_enum, char const*) /proc/self/cwd/external/com_github_gabime_spdlog/include/spdlog/details/logger_impl.h:95 (envoy-static+0x718c8c) #4 void spdlog::logger::debug<char [91]>(char const (&) [91]) /proc/self/cwd/external/com_github_gabime_spdlog/include/spdlog/details/logger_impl.h:176 (envoy-static+0xa759fd) #5 Envoy::Grpc::GoogleAsyncClientThreadLocal::completionThread() /proc/self/cwd/external/envoy/source/common/grpc/google_async_client_impl.cc:34 (envoy-static+0xa6e991) #6 operator() /proc/self/cwd/external/envoy/source/common/grpc/google_async_client_impl.cc:10 (envoy-static+0xa74d88) #7 std::_Function_handler<void (), Envoy::Grpc::GoogleAsyncClientThreadLocal::GoogleAsyncClientThreadLocal()::$_0>::_M_invoke(std::_Any_data const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/functional:1871 (envoy-static+0xa74b1a) #8 std::function<void ()>::operator()() const /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/functional:2267 (envoy-static+0x6c079e) #9 operator() /proc/self/cwd/external/envoy/source/common/common/thread.cc:20 (envoy-static+0x14480d4) #10 __invoke /proc/self/cwd/external/envoy/source/common/common/thread.cc:19 (envoy-static+0x1448068) ```
1.0
hotrestart_test flakes in spdlog with TSAN (and other sanitizers) - Occasionally we've observed in CI that `hotrestart_test` flakes during early spdlog use in `ValidationClusterManager`. Something isn't quite right here, since we should be doing the kind of verbose logging that would trigger it. Previous investigations by @mattklein123 and myself point to possible validation init not doing the right setup for logging. We should figure this one out. ``` [2018-03-15 21:06:45.658][20070][info][main] external/envoy/source/server/server.cc:275] runtime symlink: /build/tmp/_bazel_bazel/400406edc57d332f0b9b805d2b8e33a1/execroot/envoy/bazel-out/k8-dbg/bin/external/envoy/test/integration/hotrestart_test.runfiles/envoy/test/common/runtime/test_data/current [2018-03-15 21:06:45.658][20070][info][main] external/envoy/source/server/server.cc:276] runtime subdirectory: envoy [2018-03-15 21:06:45.658][20070][info][main] external/envoy/source/server/server.cc:280] runtime override subdirectory: envoy_override/cluster [2018-03-15 21:06:45.659][20070][debug][file] external/envoy/source/common/filesystem/inotify/watcher_impl.cc:48] added watch for directory: '/build/tmp/_bazel_bazel/400406edc57d332f0b9b805d2b8e33a1/execroot/envoy/bazel-out/k8-dbg/bin/external/envoy/test/integration/hotrestart_test.runfiles/envoy/test/common/runtime/test_data' file: 'current' fd: 1 [2018-03-15 21:06:45.659][20070][debug][runtime] external/envoy/source/common/runtime/runtime_impl.cc:196] walking directory: /build/tmp/_bazel_bazel/400406edc57d332f0b9b805d2b8e33a1/execroot/envoy/bazel-out/k8-dbg/bin/external/envoy/test/integration/hotrestart_test.runfiles/envoy/test/common/runtime/test_data/current/envoy [2018-03-15 21:06:45.659][20070][debug][runtime] external/envoy/source/common/runtime/runtime_impl.cc:167] error creating runtime snapshot: unable to open directory: /build/tmp/_bazel_bazel/400406edc57d332f0b9b805d2b8e33a1/execroot/envoy/bazel-out/k8-dbg/bin/external/envoy/test/integration/hotrestart_test.runfiles/envoy/test/common/runtime/test_data/current/envoy [2018-03-15 21:06:45.673][20152][debug][grpc] external/envoy/source/common/grpc/google_async_client_impl.cc:34] completionThread running ================== WARNING: ThreadSanitizer: data race (pid=20070) Write of size 8 at 0x7b9000006000 by main thread: #0 memcpy ??:? (envoy-static+0x54755c) #1 std::basic_streambuf<char, std::char_traits<char> >::xsputn(char const*, long) ??:? (envoy-static+0x1b255da) #2 spdlog::logger::_sink_it(spdlog::details::log_msg&) /proc/self/cwd/external/com_github_gabime_spdlog/include/spdlog/details/logger_impl.h:321 (envoy-static+0x5d09cc) #3 void spdlog::logger::log<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >(spdlog::level::level_enum, char const*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /proc/self/cwd/external/com_github_gabime_spdlog/include/spdlog/details/logger_impl.h:74 (envoy-static+0x6b542a) #4 void spdlog::logger::debug<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >>(char const*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /proc/self/cwd/external/com_github_gabime_spdlog/include/spdlog/details/logger_impl.h:139 (envoy-static+0x69eedd) #5 ThreadLocalClusterManagerImpl /proc/self/cwd/external/envoy/source/common/upstream/cluster_manager_impl.cc:573 (envoy-static+0x9b60ac) #6 void __gnu_cxx::new_allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl>::construct<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&>(Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl*, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/ext/new_allocator.h:120 (envoy-static+0x9d7fd4) #7 void std::allocator_traits<std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl> >::construct<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&>(std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl>&, Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl*, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/alloc_traits.h:530 (envoy-static+0x9d7c20) #8 _Sp_counted_ptr_inplace<Envoy::Upstream::ClusterManagerImpl &, Envoy::Event::Dispatcher &, const Envoy::Optional<std::__cxx11::basic_string<char> > &> /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/shared_ptr_base.h:522 (envoy-static+0x9d76d9) #9 __shared_count<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl, std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl>, Envoy::Upstream::ClusterManagerImpl &, Envoy::Event::Dispatcher &, const Envoy::Optional<std::__cxx11::basic_string<char> > &> /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/shared_ptr_base.h:617 (envoy-static+0x9d733d) #10 __shared_ptr<std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl>, Envoy::Upstream::ClusterManagerImpl &, Envoy::Event::Dispatcher &, const Envoy::Optional<std::__cxx11::basic_string<char> > &> /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/shared_ptr_base.h:1096 (envoy-static+0x9d711a) #11 shared_ptr<std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl>, Envoy::Upstream::ClusterManagerImpl &, Envoy::Event::Dispatcher &, const Envoy::Optional<std::__cxx11::basic_string<char> > &> /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/shared_ptr.h:319 (envoy-static+0x9d7010) #12 std::shared_ptr<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl> std::allocate_shared<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl, std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl>, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&>(std::allocator<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl> const&, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/shared_ptr.h:619 (envoy-static+0x9d6e74) #13 std::shared_ptr<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl> std::make_shared<Envoy::Upstream::ClusterManagerImpl::ThreadLocalClusterManagerImpl, Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&>(Envoy::Upstream::ClusterManagerImpl&, Envoy::Event::Dispatcher&, Envoy::Optional<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/bits/shared_ptr.h:635 (envoy-static+0x9d6cf0) #14 operator() /proc/self/cwd/external/envoy/source/common/upstream/cluster_manager_impl.cc:255 (envoy-static+0x9bbb91) #15 std::_Function_handler<std::shared_ptr<Envoy::ThreadLocal::ThreadLocalObject> (Envoy::Event::Dispatcher&), Envoy::Upstream::ClusterManagerImpl::ClusterManagerImpl(envoy::config::bootstrap::v2::Bootstrap const&, Envoy::Upstream::ClusterManagerFactory&, Envoy::Stats::Store&, Envoy::ThreadLocal::Instance&, Envoy::Runtime::Loader&, Envoy::Runtime::RandomGenerator&, Envoy::LocalInfo::LocalInfo const&, Envoy::AccessLog::AccessLogManager&, Envoy::Event::Dispatcher&)::$_5>::_M_invoke(std::_Any_data const&, Envoy::Event::Dispatcher&) /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/functional:1856 (envoy-static+0x9bb811) #16 std::function<std::shared_ptr<Envoy::ThreadLocal::ThreadLocalObject> (Envoy::Event::Dispatcher&)>::operator()(Envoy::Event::Dispatcher&) const /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/functional:2267 (envoy-static+0x8b2b69) #17 Envoy::ThreadLocal::InstanceImpl::SlotImpl::set(std::function<std::shared_ptr<Envoy::ThreadLocal::ThreadLocalObject> (Envoy::Event::Dispatcher&)>) /proc/self/cwd/external/envoy/source/common/thread_local/thread_local_impl.cc:104 (envoy-static+0x8af854) #18 ClusterManagerImpl /proc/self/cwd/external/envoy/source/common/upstream/cluster_manager_impl.cc:253 (envoy-static+0x9b04f3) #19 ValidationClusterManager /proc/self/cwd/external/envoy/source/server/config_validation/cluster_manager.cc:36 (envoy-static+0x8a40e0) #20 Envoy::Upstream::ValidationClusterManagerFactory::clusterManagerFromProto(envoy::config::bootstrap::v2::Bootstrap const&, Envoy::Stats::Store&, Envoy::ThreadLocal::Instance&, Envoy::Runtime::Loader&, Envoy::Runtime::RandomGenerator&, Envoy::LocalInfo::LocalInfo const&, Envoy::AccessLog::AccessLogManager&) /proc/self/cwd/external/envoy/source/server/config_validation/cluster_manager.cc:18 (envoy-static+0x8a3e99) #21 Envoy::Server::Configuration::MainImpl::initialize(envoy::config::bootstrap::v2::Bootstrap const&, Envoy::Server::Instance&, Envoy::Upstream::ClusterManagerFactory&) /proc/self/cwd/external/envoy/source/server/configuration_impl.cc:48 (envoy-static+0x10bb950) #22 Envoy::Server::ValidationInstance::initialize(Envoy::Server::Options&, std::shared_ptr<Envoy::Network::Address::Instance const>, Envoy::Server::ComponentFactory&) /proc/self/cwd/external/envoy/source/server/config_validation/server.cc:88 (envoy-static+0x87c097) #23 ValidationInstance /proc/self/cwd/external/envoy/source/server/config_validation/server.cc:45 (envoy-static+0x87b57e) #24 Envoy::Server::validateConfig(Envoy::Server::Options&, std::shared_ptr<Envoy::Network::Address::Instance const>, Envoy::Server::ComponentFactory&) /proc/self/cwd/external/envoy/source/server/config_validation/server.cc:24 (envoy-static+0x87ad4f) #25 Envoy::MainCommonBase::run() /proc/self/cwd/external/envoy/source/exe/main_common.cc:83 (envoy-static+0x600752) #26 Envoy::MainCommon::run() /proc/self/cwd/bazel-out/k8-dbg/bin/external/envoy/source/exe/_virtual_includes/envoy_main_common_lib/exe/main_common.h:43 (envoy-static+0x5d05bf) #27 main /proc/self/cwd/external/envoy/source/exe/main.cc:36 (envoy-static+0x5cec4d) Previous write of size 8 at 0x7b9000006000 by thread T3: #0 memcpy ??:? (envoy-static+0x54755c) #1 std::basic_streambuf<char, std::char_traits<char> >::xsputn(char const*, long) ??:? (envoy-static+0x1b255da) #2 spdlog::logger::_sink_it(spdlog::details::log_msg&) /proc/self/cwd/external/com_github_gabime_spdlog/include/spdlog/details/logger_impl.h:321 (envoy-static+0x5d09cc) #3 void spdlog::logger::log<>(spdlog::level::level_enum, char const*) /proc/self/cwd/external/com_github_gabime_spdlog/include/spdlog/details/logger_impl.h:95 (envoy-static+0x718c8c) #4 void spdlog::logger::debug<char [91]>(char const (&) [91]) /proc/self/cwd/external/com_github_gabime_spdlog/include/spdlog/details/logger_impl.h:176 (envoy-static+0xa759fd) #5 Envoy::Grpc::GoogleAsyncClientThreadLocal::completionThread() /proc/self/cwd/external/envoy/source/common/grpc/google_async_client_impl.cc:34 (envoy-static+0xa6e991) #6 operator() /proc/self/cwd/external/envoy/source/common/grpc/google_async_client_impl.cc:10 (envoy-static+0xa74d88) #7 std::_Function_handler<void (), Envoy::Grpc::GoogleAsyncClientThreadLocal::GoogleAsyncClientThreadLocal()::$_0>::_M_invoke(std::_Any_data const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/functional:1871 (envoy-static+0xa74b1a) #8 std::function<void ()>::operator()() const /usr/bin/../lib/gcc/x86_64-linux-gnu/5.4.0/../../../../include/c++/5.4.0/functional:2267 (envoy-static+0x6c079e) #9 operator() /proc/self/cwd/external/envoy/source/common/common/thread.cc:20 (envoy-static+0x14480d4) #10 __invoke /proc/self/cwd/external/envoy/source/common/common/thread.cc:19 (envoy-static+0x1448068) ```
non_priority
hotrestart test flakes in spdlog with tsan and other sanitizers occasionally we ve observed in ci that hotrestart test flakes during early spdlog use in validationclustermanager something isn t quite right here since we should be doing the kind of verbose logging that would trigger it previous investigations by and myself point to possible validation init not doing the right setup for logging we should figure this one out external envoy source server server cc runtime symlink build tmp bazel bazel execroot envoy bazel out dbg bin external envoy test integration hotrestart test runfiles envoy test common runtime test data current external envoy source server server cc runtime subdirectory envoy external envoy source server server cc runtime override subdirectory envoy override cluster external envoy source common filesystem inotify watcher impl cc added watch for directory build tmp bazel bazel execroot envoy bazel out dbg bin external envoy test integration hotrestart test runfiles envoy test common runtime test data file current fd external envoy source common runtime runtime impl cc walking directory build tmp bazel bazel execroot envoy bazel out dbg bin external envoy test integration hotrestart test runfiles envoy test common runtime test data current envoy external envoy source common runtime runtime impl cc error creating runtime snapshot unable to open directory build tmp bazel bazel execroot envoy bazel out dbg bin external envoy test integration hotrestart test runfiles envoy test common runtime test data current envoy external envoy source common grpc google async client impl cc completionthread running warning threadsanitizer data race pid write of size at by main thread memcpy envoy static std basic streambuf xsputn char const long envoy static spdlog logger sink it spdlog details log msg proc self cwd external com github gabime spdlog include spdlog details logger impl h envoy static void spdlog logger log std allocator spdlog level level enum char const std basic string std allocator const proc self cwd external com github gabime spdlog include spdlog details logger impl h envoy static void spdlog logger debug std allocator char const std basic string std allocator const proc self cwd external com github gabime spdlog include spdlog details logger impl h envoy static threadlocalclustermanagerimpl proc self cwd external envoy source common upstream cluster manager impl cc envoy static void gnu cxx new allocator construct std allocator const envoy upstream clustermanagerimpl threadlocalclustermanagerimpl envoy upstream clustermanagerimpl envoy event dispatcher envoy optional std allocator const usr bin lib gcc linux gnu include c ext new allocator h envoy static void std allocator traits construct std allocator const std allocator envoy upstream clustermanagerimpl threadlocalclustermanagerimpl envoy upstream clustermanagerimpl envoy event dispatcher envoy optional std allocator const usr bin lib gcc linux gnu include c bits alloc traits h envoy static sp counted ptr inplace usr bin lib gcc linux gnu include c bits shared ptr base h envoy static shared count envoy upstream clustermanagerimpl envoy event dispatcher const envoy optional usr bin lib gcc linux gnu include c bits shared ptr base h envoy static shared ptr envoy upstream clustermanagerimpl envoy event dispatcher const envoy optional usr bin lib gcc linux gnu include c bits shared ptr base h envoy static shared ptr envoy upstream clustermanagerimpl envoy event dispatcher const envoy optional usr bin lib gcc linux gnu include c bits shared ptr h envoy static std shared ptr std allocate shared envoy upstream clustermanagerimpl envoy event dispatcher envoy optional std allocator const std allocator const envoy upstream clustermanagerimpl envoy event dispatcher envoy optional std allocator const usr bin lib gcc linux gnu include c bits shared ptr h envoy static std shared ptr std make shared std allocator const envoy upstream clustermanagerimpl envoy event dispatcher envoy optional std allocator const usr bin lib gcc linux gnu include c bits shared ptr h envoy static operator proc self cwd external envoy source common upstream cluster manager impl cc envoy static std function handler envoy event dispatcher envoy upstream clustermanagerimpl clustermanagerimpl envoy config bootstrap bootstrap const envoy upstream clustermanagerfactory envoy stats store envoy threadlocal instance envoy runtime loader envoy runtime randomgenerator envoy localinfo localinfo const envoy accesslog accesslogmanager envoy event dispatcher m invoke std any data const envoy event dispatcher usr bin lib gcc linux gnu include c functional envoy static std function envoy event dispatcher operator envoy event dispatcher const usr bin lib gcc linux gnu include c functional envoy static envoy threadlocal instanceimpl slotimpl set std function envoy event dispatcher proc self cwd external envoy source common thread local thread local impl cc envoy static clustermanagerimpl proc self cwd external envoy source common upstream cluster manager impl cc envoy static validationclustermanager proc self cwd external envoy source server config validation cluster manager cc envoy static envoy upstream validationclustermanagerfactory clustermanagerfromproto envoy config bootstrap bootstrap const envoy stats store envoy threadlocal instance envoy runtime loader envoy runtime randomgenerator envoy localinfo localinfo const envoy accesslog accesslogmanager proc self cwd external envoy source server config validation cluster manager cc envoy static envoy server configuration mainimpl initialize envoy config bootstrap bootstrap const envoy server instance envoy upstream clustermanagerfactory proc self cwd external envoy source server configuration impl cc envoy static envoy server validationinstance initialize envoy server options std shared ptr envoy server componentfactory proc self cwd external envoy source server config validation server cc envoy static validationinstance proc self cwd external envoy source server config validation server cc envoy static envoy server validateconfig envoy server options std shared ptr envoy server componentfactory proc self cwd external envoy source server config validation server cc envoy static envoy maincommonbase run proc self cwd external envoy source exe main common cc envoy static envoy maincommon run proc self cwd bazel out dbg bin external envoy source exe virtual includes envoy main common lib exe main common h envoy static main proc self cwd external envoy source exe main cc envoy static previous write of size at by thread memcpy envoy static std basic streambuf xsputn char const long envoy static spdlog logger sink it spdlog details log msg proc self cwd external com github gabime spdlog include spdlog details logger impl h envoy static void spdlog logger log spdlog level level enum char const proc self cwd external com github gabime spdlog include spdlog details logger impl h envoy static void spdlog logger debug char const proc self cwd external com github gabime spdlog include spdlog details logger impl h envoy static envoy grpc googleasyncclientthreadlocal completionthread proc self cwd external envoy source common grpc google async client impl cc envoy static operator proc self cwd external envoy source common grpc google async client impl cc envoy static std function handler m invoke std any data const usr bin lib gcc linux gnu include c functional envoy static std function operator const usr bin lib gcc linux gnu include c functional envoy static operator proc self cwd external envoy source common common thread cc envoy static invoke proc self cwd external envoy source common common thread cc envoy static
0
2,017
2,869,582,584
IssuesEvent
2015-06-06 09:50:47
zikula/core
https://api.github.com/repos/zikula/core
reopened
composer no longer installing zikula-modules in /modules
Bug CI Build
composer no longer installing zikula-modules (legal/profile/breakit) correctly at least not on `composer update` Composer version 1.0-dev (e64470c987fdd6bff03b85eed823eb4b865a4152) 2015-05-28 14:52:12 it copies repos to `/vendors` and not `/modules
1.0
composer no longer installing zikula-modules in /modules - composer no longer installing zikula-modules (legal/profile/breakit) correctly at least not on `composer update` Composer version 1.0-dev (e64470c987fdd6bff03b85eed823eb4b865a4152) 2015-05-28 14:52:12 it copies repos to `/vendors` and not `/modules
non_priority
composer no longer installing zikula modules in modules composer no longer installing zikula modules legal profile breakit correctly at least not on composer update composer version dev it copies repos to vendors and not modules
0
233,543
25,765,567,937
IssuesEvent
2022-12-09 01:20:33
gabriel-milan/comp-soc
https://api.github.com/repos/gabriel-milan/comp-soc
opened
python_telegram_bot-13.12-py3-none-any.whl: 1 vulnerabilities (highest severity is: 6.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>python_telegram_bot-13.12-py3-none-any.whl</b></p></summary> <p></p> <p> </details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (python_telegram_bot version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-23491](https://www.mend.io/vulnerability-database/CVE-2022-23491) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.8 | certifi-2022.5.18.1-py3-none-any.whl | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-23491</summary> ### Vulnerable Library - <b>certifi-2022.5.18.1-py3-none-any.whl</b></p> <p>Python package for providing Mozilla's CA Bundle.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/11/dd/e015f3780f42dd9af62cf0107b44ea1298926627ecd70c17b0e484e95bcd/certifi-2022.5.18.1-py3-none-any.whl">https://files.pythonhosted.org/packages/11/dd/e015f3780f42dd9af62cf0107b44ea1298926627ecd70c17b0e484e95bcd/certifi-2022.5.18.1-py3-none-any.whl</a></p> <p> Dependency Hierarchy: - python_telegram_bot-13.12-py3-none-any.whl (Root Library) - :x: **certifi-2022.5.18.1-py3-none-any.whl** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion. <p>Publish Date: 2022-12-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23491>CVE-2022-23491</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-23491">https://www.cve.org/CVERecord?id=CVE-2022-23491</a></p> <p>Release Date: 2022-12-07</p> <p>Fix Resolution: certifi - 2022.12.07</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
True
python_telegram_bot-13.12-py3-none-any.whl: 1 vulnerabilities (highest severity is: 6.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>python_telegram_bot-13.12-py3-none-any.whl</b></p></summary> <p></p> <p> </details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (python_telegram_bot version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-23491](https://www.mend.io/vulnerability-database/CVE-2022-23491) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.8 | certifi-2022.5.18.1-py3-none-any.whl | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-23491</summary> ### Vulnerable Library - <b>certifi-2022.5.18.1-py3-none-any.whl</b></p> <p>Python package for providing Mozilla's CA Bundle.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/11/dd/e015f3780f42dd9af62cf0107b44ea1298926627ecd70c17b0e484e95bcd/certifi-2022.5.18.1-py3-none-any.whl">https://files.pythonhosted.org/packages/11/dd/e015f3780f42dd9af62cf0107b44ea1298926627ecd70c17b0e484e95bcd/certifi-2022.5.18.1-py3-none-any.whl</a></p> <p> Dependency Hierarchy: - python_telegram_bot-13.12-py3-none-any.whl (Root Library) - :x: **certifi-2022.5.18.1-py3-none-any.whl** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion. <p>Publish Date: 2022-12-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23491>CVE-2022-23491</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-23491">https://www.cve.org/CVERecord?id=CVE-2022-23491</a></p> <p>Release Date: 2022-12-07</p> <p>Fix Resolution: certifi - 2022.12.07</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
non_priority
python telegram bot none any whl vulnerabilities highest severity is vulnerable library python telegram bot none any whl vulnerabilities cve severity cvss dependency type fixed in python telegram bot version remediation available medium certifi none any whl transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the section details below to see if there is a version of transitive dependency where vulnerability is fixed details cve vulnerable library certifi none any whl python package for providing mozilla s ca bundle library home page a href dependency hierarchy python telegram bot none any whl root library x certifi none any whl vulnerable library found in base branch master vulnerability details certifi is a curated collection of root certificates for validating the trustworthiness of ssl certificates while verifying the identity of tls hosts certifi removes root certificates from trustcor from the root store these are in the process of being removed from mozilla s trust store trustcor s root certificates are being removed pursuant to an investigation prompted by media reporting that trustcor s ownership also operated a business that produced spyware conclusions of mozilla s investigation can be found in the linked google group discussion publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope changed impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution certifi step up your open source security game with mend
0
96,074
19,896,435,746
IssuesEvent
2022-01-25 00:01:29
detiuaveiro/RacingGame-
https://api.github.com/repos/detiuaveiro/RacingGame-
closed
Script para o Sol rodar à volta da cena
Code CV
Script para emular o movimento do sol relativo ao quarto.
1.0
Script para o Sol rodar à volta da cena - Script para emular o movimento do sol relativo ao quarto.
non_priority
script para o sol rodar à volta da cena script para emular o movimento do sol relativo ao quarto
0
8,984
3,244,233,404
IssuesEvent
2015-10-16 00:20:26
pyqg/pyqg
https://api.github.com/repos/pyqg/pyqg
opened
Add documentation for diagnostics in two-layer model
documentation
Why do we take the negative sign of the diagnostics before plotting? http://pyqg.readthedocs.org/en/stable/examples/two-layer.html#plot-diagnostics
1.0
Add documentation for diagnostics in two-layer model - Why do we take the negative sign of the diagnostics before plotting? http://pyqg.readthedocs.org/en/stable/examples/two-layer.html#plot-diagnostics
non_priority
add documentation for diagnostics in two layer model why do we take the negative sign of the diagnostics before plotting
0
106,285
11,474,403,539
IssuesEvent
2020-02-10 04:07:33
microsoft/vscode-docs
https://api.github.com/repos/microsoft/vscode-docs
closed
API page doesn't list the important bits
API documentation doc-enhancement extensibility
The [API](https://code.visualstudio.com/docs/extensionAPI/vscode-api)-page list the namespaces only but doesn't list any of the actual types in the page TOC. That make it hard to read/discover things.
1.0
API page doesn't list the important bits - The [API](https://code.visualstudio.com/docs/extensionAPI/vscode-api)-page list the namespaces only but doesn't list any of the actual types in the page TOC. That make it hard to read/discover things.
non_priority
api page doesn t list the important bits the list the namespaces only but doesn t list any of the actual types in the page toc that make it hard to read discover things
0
318,582
27,316,473,318
IssuesEvent
2023-02-24 16:05:01
unifyai/ivy
https://api.github.com/repos/unifyai/ivy
reopened
Fix math.test_tensorflow_erfcinv
TensorFlow Frontend Sub Task Failing Test
| | | |---|---| |tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/4054925606/jobs/6977404251" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a> |torch|<a href="https://github.com/unifyai/ivy/actions/runs/4011265503/jobs/6888662116" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a> |numpy|<a href="https://github.com/unifyai/ivy/actions/runs/4054925606/jobs/6977409309" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a> |jax|<a href="https://github.com/unifyai/ivy/actions/runs/4011265503/jobs/6888662116" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a> <details> <summary>Not found</summary> Not found </details> <details> <summary>FAILED ivy_tests/test_ivy/test_frontends/test_tensorflow/test_math.py::test_tensorflow_erfcinv[cpu-ivy.functional.backends.jax-False-False]</summary> 2023-01-26T00:55:36.2494480Z E AssertionError: 0.5426817005919033 != inf 2023-01-26T00:55:36.2494907Z E Falsifying example: test_tensorflow_erfcinv( 2023-01-26T00:55:36.2495435Z E dtype_and_x=(['float64'], [array(-1.)]), 2023-01-26T00:55:36.2496271Z E test_flags=num_positional_args=0. with_out=False. inplace=False. native_arrays=[False]. as_variable=[False]. , 2023-01-26T00:55:36.2496983Z E fn_tree='ivy.functional.frontends.tensorflow.math.erfcinv', 2023-01-26T00:55:36.2497530Z E frontend='tensorflow', 2023-01-26T00:55:36.2497945Z E on_device='cpu', 2023-01-26T00:55:36.2498441Z E ) 2023-01-26T00:55:36.2498757Z E 2023-01-26T00:55:36.2499494Z E You can reproduce this example by temporarily adding @reproduce_failure('6.55.0', b'AXicY2AAAkYGCADTAAAkAAM=') as a decorator on your test case </details> <details> <summary>Not found</summary> Not found </details> <details> <summary>FAILED ivy_tests/test_ivy/test_frontends/test_tensorflow/test_math.py::test_tensorflow_erfcinv[cpu-ivy.functional.backends.jax-False-False]</summary> 2023-01-26T00:55:36.2494480Z E AssertionError: 0.5426817005919033 != inf 2023-01-26T00:55:36.2494907Z E Falsifying example: test_tensorflow_erfcinv( 2023-01-26T00:55:36.2495435Z E dtype_and_x=(['float64'], [array(-1.)]), 2023-01-26T00:55:36.2496271Z E test_flags=num_positional_args=0. with_out=False. inplace=False. native_arrays=[False]. as_variable=[False]. , 2023-01-26T00:55:36.2496983Z E fn_tree='ivy.functional.frontends.tensorflow.math.erfcinv', 2023-01-26T00:55:36.2497530Z E frontend='tensorflow', 2023-01-26T00:55:36.2497945Z E on_device='cpu', 2023-01-26T00:55:36.2498441Z E ) 2023-01-26T00:55:36.2498757Z E 2023-01-26T00:55:36.2499494Z E You can reproduce this example by temporarily adding @reproduce_failure('6.55.0', b'AXicY2AAAkYGCADTAAAkAAM=') as a decorator on your test case </details>
1.0
Fix math.test_tensorflow_erfcinv - | | | |---|---| |tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/4054925606/jobs/6977404251" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a> |torch|<a href="https://github.com/unifyai/ivy/actions/runs/4011265503/jobs/6888662116" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a> |numpy|<a href="https://github.com/unifyai/ivy/actions/runs/4054925606/jobs/6977409309" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a> |jax|<a href="https://github.com/unifyai/ivy/actions/runs/4011265503/jobs/6888662116" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a> <details> <summary>Not found</summary> Not found </details> <details> <summary>FAILED ivy_tests/test_ivy/test_frontends/test_tensorflow/test_math.py::test_tensorflow_erfcinv[cpu-ivy.functional.backends.jax-False-False]</summary> 2023-01-26T00:55:36.2494480Z E AssertionError: 0.5426817005919033 != inf 2023-01-26T00:55:36.2494907Z E Falsifying example: test_tensorflow_erfcinv( 2023-01-26T00:55:36.2495435Z E dtype_and_x=(['float64'], [array(-1.)]), 2023-01-26T00:55:36.2496271Z E test_flags=num_positional_args=0. with_out=False. inplace=False. native_arrays=[False]. as_variable=[False]. , 2023-01-26T00:55:36.2496983Z E fn_tree='ivy.functional.frontends.tensorflow.math.erfcinv', 2023-01-26T00:55:36.2497530Z E frontend='tensorflow', 2023-01-26T00:55:36.2497945Z E on_device='cpu', 2023-01-26T00:55:36.2498441Z E ) 2023-01-26T00:55:36.2498757Z E 2023-01-26T00:55:36.2499494Z E You can reproduce this example by temporarily adding @reproduce_failure('6.55.0', b'AXicY2AAAkYGCADTAAAkAAM=') as a decorator on your test case </details> <details> <summary>Not found</summary> Not found </details> <details> <summary>FAILED ivy_tests/test_ivy/test_frontends/test_tensorflow/test_math.py::test_tensorflow_erfcinv[cpu-ivy.functional.backends.jax-False-False]</summary> 2023-01-26T00:55:36.2494480Z E AssertionError: 0.5426817005919033 != inf 2023-01-26T00:55:36.2494907Z E Falsifying example: test_tensorflow_erfcinv( 2023-01-26T00:55:36.2495435Z E dtype_and_x=(['float64'], [array(-1.)]), 2023-01-26T00:55:36.2496271Z E test_flags=num_positional_args=0. with_out=False. inplace=False. native_arrays=[False]. as_variable=[False]. , 2023-01-26T00:55:36.2496983Z E fn_tree='ivy.functional.frontends.tensorflow.math.erfcinv', 2023-01-26T00:55:36.2497530Z E frontend='tensorflow', 2023-01-26T00:55:36.2497945Z E on_device='cpu', 2023-01-26T00:55:36.2498441Z E ) 2023-01-26T00:55:36.2498757Z E 2023-01-26T00:55:36.2499494Z E You can reproduce this example by temporarily adding @reproduce_failure('6.55.0', b'AXicY2AAAkYGCADTAAAkAAM=') as a decorator on your test case </details>
non_priority
fix math test tensorflow erfcinv tensorflow img src torch img src numpy img src jax img src not found not found failed ivy tests test ivy test frontends test tensorflow test math py test tensorflow erfcinv e assertionerror inf e falsifying example test tensorflow erfcinv e dtype and x e test flags num positional args with out false inplace false native arrays as variable e fn tree ivy functional frontends tensorflow math erfcinv e frontend tensorflow e on device cpu e e e you can reproduce this example by temporarily adding reproduce failure b as a decorator on your test case not found not found failed ivy tests test ivy test frontends test tensorflow test math py test tensorflow erfcinv e assertionerror inf e falsifying example test tensorflow erfcinv e dtype and x e test flags num positional args with out false inplace false native arrays as variable e fn tree ivy functional frontends tensorflow math erfcinv e frontend tensorflow e on device cpu e e e you can reproduce this example by temporarily adding reproduce failure b as a decorator on your test case
0
314,008
26,969,690,454
IssuesEvent
2023-02-09 02:59:38
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
[wasm] Runtime test `simpleprovidervalidation.sh` failing on CI
arch-wasm blocking-clean-ci in-pr test-failure
[Rolling build](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164624&view=logs&j=3e93a48f-6568-53f2-76b3-1285c183c39d), and [log](https://helixre107v0xdeko0k025g8.blob.core.windows.net/dotnet-runtime-refs-heads-main-c5375adeae8e4f48a4/PayloadGroup0/1/console.74f02e35.log?helixlogtype=result): ``` Starting: tracing.eventpipe.XUnitWrapper (parallel test collections = on, max threads = 2) tracing/eventpipe/simpleprovidervalidation/simpleprovidervalidation/simpleprovidervalidation.sh [FAIL] {"name":"ExitStatus","message":"Program terminated with exit(-1)","status":-1} Return code: 1 Raw output file: /datadisks/disk1/work/B644095B/w/B577098C/uploads/Reports/tracing.eventpipe/simpleprovidervalidation/simpleprovidervalidation/simpleprovidervalidation.output.txt Raw output: BEGIN EXECUTION MSBuild version 17.5.0-preview-23056-01+d89d4bc91 for .NET AppDir: /datadisks/disk1/work/B644095B/w/B577098C/e/tracing/eventpipe/simpleprovidervalidation/simpleprovidervalidation/WasmApp/ TestBinDir: /datadisks/disk1/work/B644095B/w/B577098C/e/tracing/eventpipe/simpleprovidervalidation/simpleprovidervalidation ArtifactsBinDir: /datadisks/disk1/work/B644095B/p/build/WasmApp.targets(412,5): warning WASM0004: Loading assembly reference 'Microsoft.Diagnostics.Tools.RuntimeClient, Version=1.0.4.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35' for 'common, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null' failed: Could not find assembly 'Microsoft.Diagnostics.Tools.RuntimeClient, Version=1.0.4.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35'. Either explicitly load this assembly using a method such as LoadFromAssemblyPath() or use a MetadataAssemblyResolver that returns a valid assembly. Skipping. [/datadisks/disk1/work/B644095B/p/wasm-test-runner/WasmTestRunner.proj] Generated app bundle at /datadisks/disk1/work/B644095B/w/B577098C/e/tracing/eventpipe/simpleprovidervalidation/simpleprovidervalidation/WasmApp/ Incoming arguments: --run simpleprovidervalidation.dll Application arguments: --run simpleprovidervalidation.dll console.info: Initializing dotnet version 8.0.0-ci commit hash 0304f1f5157a8280fa093bdfc7cfb8d9f62e016f 0.0s: ==TEST STARTING== 0.1s: System.PlatformNotSupportedException: System.Diagnostics.Process is not supported on this platform. at System.Diagnostics.Process.GetProcesses() at Tracing.Tests.Common.IpcTraceTest.<>c.<EnsureCleanEnvironment>b__10_0() at Tracing.Tests.Common.IpcTraceTest.EnsureCleanEnvironment() at Tracing.Tests.Common.IpcTraceTest.Validate(Boolean enableRundownProvider) at Tracing.Tests.Common.IpcTraceTest.RunAndValidateEventCounts(Dictionary`2 expectedEventCounts, Action eventGeneratingAction, List`1 providers, Int32 circularBufferMB, Func`2 optionalTraceValidator, Boolean enableRundownProvider) 0.1s: ==TEST FINISHED: FAILED!== WASM EXIT -1 Expected: 100 Actual: 255 END EXECUTION - FAILED ``` This change was merged in https://github.com/dotnet/runtime/pull/80382 . The test did fail was on the PR, but it got merged on red. cc @LakshanF <!-- Error message template --> ### Known Issue Error Message Fill the error message using [known issues guidance](https://github.com/dotnet/arcade/blob/main/Documentation/Projects/Build%20Analysis/KnownIssues.md#how-to-fill-out-a-known-issue-error-section). ```json { "ErrorPattern": ".*warning WASM0004: Loading assembly reference 'Microsoft.Diagnostics.Tools.RuntimeClient.*", "BuildRetry": false } ``` <!--Known issue error report start --> ### Report |Build|Definition|Test|Pull Request| |---|---|---|---| |[164331](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164331)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164331&view=ms.vss-test-web.build-test-results-tab&runId=3355952&resultId=103655)|dotnet/runtime#81831| |[164665](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164665)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164665&view=ms.vss-test-web.build-test-results-tab&runId=3351536&resultId=103655)|dotnet/runtime#81843| |[164636](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164636)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164636&view=ms.vss-test-web.build-test-results-tab&runId=3351013&resultId=103655)|dotnet/runtime#79544| |[164618](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164618)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164618&view=ms.vss-test-web.build-test-results-tab&runId=3350586&resultId=103655)|dotnet/runtime#81827| |[164573](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164573)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164573&view=ms.vss-test-web.build-test-results-tab&runId=3350081&resultId=103655)|dotnet/runtime#78852| |[164555](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164555)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164555&view=ms.vss-test-web.build-test-results-tab&runId=3349848&resultId=103655)|dotnet/runtime#81407| |[164522](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164522)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164522&view=ms.vss-test-web.build-test-results-tab&runId=3349564&resultId=103655)|dotnet/runtime#81836| |[164512](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164512)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164512&view=ms.vss-test-web.build-test-results-tab&runId=3349425&resultId=103655)|dotnet/runtime#81480| |[163901](https://dev.azure.com/dnceng-public/public/_build/results?buildId=163901)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=163901&view=ms.vss-test-web.build-test-results-tab&runId=3341456&resultId=103654)|dotnet/runtime#80382| #### Summary |24-Hour Hit Count|7-Day Hit Count|1-Month Count| |---|---|---| |9|9|9| <!--Known issue error report end -->
1.0
[wasm] Runtime test `simpleprovidervalidation.sh` failing on CI - [Rolling build](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164624&view=logs&j=3e93a48f-6568-53f2-76b3-1285c183c39d), and [log](https://helixre107v0xdeko0k025g8.blob.core.windows.net/dotnet-runtime-refs-heads-main-c5375adeae8e4f48a4/PayloadGroup0/1/console.74f02e35.log?helixlogtype=result): ``` Starting: tracing.eventpipe.XUnitWrapper (parallel test collections = on, max threads = 2) tracing/eventpipe/simpleprovidervalidation/simpleprovidervalidation/simpleprovidervalidation.sh [FAIL] {"name":"ExitStatus","message":"Program terminated with exit(-1)","status":-1} Return code: 1 Raw output file: /datadisks/disk1/work/B644095B/w/B577098C/uploads/Reports/tracing.eventpipe/simpleprovidervalidation/simpleprovidervalidation/simpleprovidervalidation.output.txt Raw output: BEGIN EXECUTION MSBuild version 17.5.0-preview-23056-01+d89d4bc91 for .NET AppDir: /datadisks/disk1/work/B644095B/w/B577098C/e/tracing/eventpipe/simpleprovidervalidation/simpleprovidervalidation/WasmApp/ TestBinDir: /datadisks/disk1/work/B644095B/w/B577098C/e/tracing/eventpipe/simpleprovidervalidation/simpleprovidervalidation ArtifactsBinDir: /datadisks/disk1/work/B644095B/p/build/WasmApp.targets(412,5): warning WASM0004: Loading assembly reference 'Microsoft.Diagnostics.Tools.RuntimeClient, Version=1.0.4.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35' for 'common, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null' failed: Could not find assembly 'Microsoft.Diagnostics.Tools.RuntimeClient, Version=1.0.4.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35'. Either explicitly load this assembly using a method such as LoadFromAssemblyPath() or use a MetadataAssemblyResolver that returns a valid assembly. Skipping. [/datadisks/disk1/work/B644095B/p/wasm-test-runner/WasmTestRunner.proj] Generated app bundle at /datadisks/disk1/work/B644095B/w/B577098C/e/tracing/eventpipe/simpleprovidervalidation/simpleprovidervalidation/WasmApp/ Incoming arguments: --run simpleprovidervalidation.dll Application arguments: --run simpleprovidervalidation.dll console.info: Initializing dotnet version 8.0.0-ci commit hash 0304f1f5157a8280fa093bdfc7cfb8d9f62e016f 0.0s: ==TEST STARTING== 0.1s: System.PlatformNotSupportedException: System.Diagnostics.Process is not supported on this platform. at System.Diagnostics.Process.GetProcesses() at Tracing.Tests.Common.IpcTraceTest.<>c.<EnsureCleanEnvironment>b__10_0() at Tracing.Tests.Common.IpcTraceTest.EnsureCleanEnvironment() at Tracing.Tests.Common.IpcTraceTest.Validate(Boolean enableRundownProvider) at Tracing.Tests.Common.IpcTraceTest.RunAndValidateEventCounts(Dictionary`2 expectedEventCounts, Action eventGeneratingAction, List`1 providers, Int32 circularBufferMB, Func`2 optionalTraceValidator, Boolean enableRundownProvider) 0.1s: ==TEST FINISHED: FAILED!== WASM EXIT -1 Expected: 100 Actual: 255 END EXECUTION - FAILED ``` This change was merged in https://github.com/dotnet/runtime/pull/80382 . The test did fail was on the PR, but it got merged on red. cc @LakshanF <!-- Error message template --> ### Known Issue Error Message Fill the error message using [known issues guidance](https://github.com/dotnet/arcade/blob/main/Documentation/Projects/Build%20Analysis/KnownIssues.md#how-to-fill-out-a-known-issue-error-section). ```json { "ErrorPattern": ".*warning WASM0004: Loading assembly reference 'Microsoft.Diagnostics.Tools.RuntimeClient.*", "BuildRetry": false } ``` <!--Known issue error report start --> ### Report |Build|Definition|Test|Pull Request| |---|---|---|---| |[164331](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164331)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164331&view=ms.vss-test-web.build-test-results-tab&runId=3355952&resultId=103655)|dotnet/runtime#81831| |[164665](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164665)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164665&view=ms.vss-test-web.build-test-results-tab&runId=3351536&resultId=103655)|dotnet/runtime#81843| |[164636](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164636)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164636&view=ms.vss-test-web.build-test-results-tab&runId=3351013&resultId=103655)|dotnet/runtime#79544| |[164618](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164618)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164618&view=ms.vss-test-web.build-test-results-tab&runId=3350586&resultId=103655)|dotnet/runtime#81827| |[164573](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164573)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164573&view=ms.vss-test-web.build-test-results-tab&runId=3350081&resultId=103655)|dotnet/runtime#78852| |[164555](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164555)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164555&view=ms.vss-test-web.build-test-results-tab&runId=3349848&resultId=103655)|dotnet/runtime#81407| |[164522](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164522)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164522&view=ms.vss-test-web.build-test-results-tab&runId=3349564&resultId=103655)|dotnet/runtime#81836| |[164512](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164512)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=164512&view=ms.vss-test-web.build-test-results-tab&runId=3349425&resultId=103655)|dotnet/runtime#81480| |[163901](https://dev.azure.com/dnceng-public/public/_build/results?buildId=163901)|dotnet/runtime|[PayloadGroup0.WorkItemExecution](https://dev.azure.com/dnceng-public/public/_build/results?buildId=163901&view=ms.vss-test-web.build-test-results-tab&runId=3341456&resultId=103654)|dotnet/runtime#80382| #### Summary |24-Hour Hit Count|7-Day Hit Count|1-Month Count| |---|---|---| |9|9|9| <!--Known issue error report end -->
non_priority
runtime test simpleprovidervalidation sh failing on ci and starting tracing eventpipe xunitwrapper parallel test collections on max threads tracing eventpipe simpleprovidervalidation simpleprovidervalidation simpleprovidervalidation sh name exitstatus message program terminated with exit status return code raw output file datadisks work w uploads reports tracing eventpipe simpleprovidervalidation simpleprovidervalidation simpleprovidervalidation output txt raw output begin execution msbuild version preview for net appdir datadisks work w e tracing eventpipe simpleprovidervalidation simpleprovidervalidation wasmapp testbindir datadisks work w e tracing eventpipe simpleprovidervalidation simpleprovidervalidation artifactsbindir datadisks work p build wasmapp targets warning loading assembly reference microsoft diagnostics tools runtimeclient version culture neutral publickeytoken for common version culture neutral publickeytoken null failed could not find assembly microsoft diagnostics tools runtimeclient version culture neutral publickeytoken either explicitly load this assembly using a method such as loadfromassemblypath or use a metadataassemblyresolver that returns a valid assembly skipping generated app bundle at datadisks work w e tracing eventpipe simpleprovidervalidation simpleprovidervalidation wasmapp incoming arguments run simpleprovidervalidation dll application arguments run simpleprovidervalidation dll console info initializing dotnet version ci commit hash test starting system platformnotsupportedexception system diagnostics process is not supported on this platform at system diagnostics process getprocesses at tracing tests common ipctracetest c b at tracing tests common ipctracetest ensurecleanenvironment at tracing tests common ipctracetest validate boolean enablerundownprovider at tracing tests common ipctracetest runandvalidateeventcounts dictionary expectedeventcounts action eventgeneratingaction list providers circularbuffermb func optionaltracevalidator boolean enablerundownprovider test finished failed wasm exit expected actual end execution failed this change was merged in the test did fail was on the pr but it got merged on red cc lakshanf known issue error message fill the error message using json errorpattern warning loading assembly reference microsoft diagnostics tools runtimeclient buildretry false report build definition test pull request summary hour hit count day hit count month count
0
418,503
28,117,931,299
IssuesEvent
2023-03-31 12:15:16
biaslab/ReactiveMP.jl
https://api.github.com/repos/biaslab/ReactiveMP.jl
opened
The CVI re-use optimiser at each prod call, and this behaviour can be not suitable for some optimisers
bug documentation enhancement
Imagine you have an optimizer that has an inner state and somehow changes its parameters with each iteration (e.g., Adam). If you will try to use it in several optimization tasks with a shared state: the convergence of each following task is not granted. So if CVI used in several consequent products with such optimizer it can start brake from some point. The following code starts to find a bad approximation from some point: ```julia using ReactiveMP using StableRNGs using Distributions using Flux n1 = NormalMeanVariance(10 * randn(rng), 10 * rand(rng)) n2 = NormalMeanVariance(10 * randn(rng), 10 * rand(rng)) n_analytical = prod(ProdAnalytical(), n1, n2) cvi_result = prod(cvi, ContinuousUnivariateLogPdf((x) -> logpdf(n1, x)), n2) @info n_analytical @info prod(cvi, ContinuousUnivariateLogPdf((x) -> logpdf(n1, x)), n2) @info isapprox(cvi_result, n_analytical, atol = 0.1) for i in 1:10000 cvi_result = prod(cvi, ContinuousUnivariateLogPdf((x) -> logpdf(n1, x)), n2) if !isapprox(cvi_result, n_analytical, atol = 0.1) @info "broken at $(i) iteration" end end ``` This code works fine: ```julia n1 = NormalMeanVariance(10 * randn(rng), 10 * rand(rng)) n2 = NormalMeanVariance(10 * randn(rng), 10 * rand(rng)) n_analytical = prod(ProdAnalytical(), n1, n2) rng = StableRNG(42) cvi = CVI(rng, 1, 1000, Flux.Adam(0.007), ForwardDiffGrad(), 10, Val(true), true) cvi_result = prod(cvi, ContinuousUnivariateLogPdf((x) -> logpdf(n1, x)), n2) @info n_analytical @info prod(cvi, ContinuousUnivariateLogPdf((x) -> logpdf(n1, x)), n2) @info isapprox(cvi_result, n_analytical, atol = 0.1) for i in 1:10000 cvi = CVI(rng, 1, 1000, Flux.Adam(0.007), ForwardDiffGrad(), 10, Val(true), true) cvi_result = prod(cvi, ContinuousUnivariateLogPdf((x) -> logpdf(n1, x)), n2) if !isapprox(cvi_result, n_analytical, atol = 0.1) @info "broken at $(i) iteration" end end ``` Should we give a user an ability to reset an optimizer between iterations?
1.0
The CVI re-use optimiser at each prod call, and this behaviour can be not suitable for some optimisers - Imagine you have an optimizer that has an inner state and somehow changes its parameters with each iteration (e.g., Adam). If you will try to use it in several optimization tasks with a shared state: the convergence of each following task is not granted. So if CVI used in several consequent products with such optimizer it can start brake from some point. The following code starts to find a bad approximation from some point: ```julia using ReactiveMP using StableRNGs using Distributions using Flux n1 = NormalMeanVariance(10 * randn(rng), 10 * rand(rng)) n2 = NormalMeanVariance(10 * randn(rng), 10 * rand(rng)) n_analytical = prod(ProdAnalytical(), n1, n2) cvi_result = prod(cvi, ContinuousUnivariateLogPdf((x) -> logpdf(n1, x)), n2) @info n_analytical @info prod(cvi, ContinuousUnivariateLogPdf((x) -> logpdf(n1, x)), n2) @info isapprox(cvi_result, n_analytical, atol = 0.1) for i in 1:10000 cvi_result = prod(cvi, ContinuousUnivariateLogPdf((x) -> logpdf(n1, x)), n2) if !isapprox(cvi_result, n_analytical, atol = 0.1) @info "broken at $(i) iteration" end end ``` This code works fine: ```julia n1 = NormalMeanVariance(10 * randn(rng), 10 * rand(rng)) n2 = NormalMeanVariance(10 * randn(rng), 10 * rand(rng)) n_analytical = prod(ProdAnalytical(), n1, n2) rng = StableRNG(42) cvi = CVI(rng, 1, 1000, Flux.Adam(0.007), ForwardDiffGrad(), 10, Val(true), true) cvi_result = prod(cvi, ContinuousUnivariateLogPdf((x) -> logpdf(n1, x)), n2) @info n_analytical @info prod(cvi, ContinuousUnivariateLogPdf((x) -> logpdf(n1, x)), n2) @info isapprox(cvi_result, n_analytical, atol = 0.1) for i in 1:10000 cvi = CVI(rng, 1, 1000, Flux.Adam(0.007), ForwardDiffGrad(), 10, Val(true), true) cvi_result = prod(cvi, ContinuousUnivariateLogPdf((x) -> logpdf(n1, x)), n2) if !isapprox(cvi_result, n_analytical, atol = 0.1) @info "broken at $(i) iteration" end end ``` Should we give a user an ability to reset an optimizer between iterations?
non_priority
the cvi re use optimiser at each prod call and this behaviour can be not suitable for some optimisers imagine you have an optimizer that has an inner state and somehow changes its parameters with each iteration e g adam if you will try to use it in several optimization tasks with a shared state the convergence of each following task is not granted so if cvi used in several consequent products with such optimizer it can start brake from some point the following code starts to find a bad approximation from some point julia using reactivemp using stablerngs using distributions using flux normalmeanvariance randn rng rand rng normalmeanvariance randn rng rand rng n analytical prod prodanalytical cvi result prod cvi continuousunivariatelogpdf x logpdf x info n analytical info prod cvi continuousunivariatelogpdf x logpdf x info isapprox cvi result n analytical atol for i in cvi result prod cvi continuousunivariatelogpdf x logpdf x if isapprox cvi result n analytical atol info broken at i iteration end end this code works fine julia normalmeanvariance randn rng rand rng normalmeanvariance randn rng rand rng n analytical prod prodanalytical rng stablerng cvi cvi rng flux adam forwarddiffgrad val true true cvi result prod cvi continuousunivariatelogpdf x logpdf x info n analytical info prod cvi continuousunivariatelogpdf x logpdf x info isapprox cvi result n analytical atol for i in cvi cvi rng flux adam forwarddiffgrad val true true cvi result prod cvi continuousunivariatelogpdf x logpdf x if isapprox cvi result n analytical atol info broken at i iteration end end should we give a user an ability to reset an optimizer between iterations
0
288,370
24,901,350,914
IssuesEvent
2022-10-28 21:17:58
Merck/gsDesign2
https://api.github.com/repos/Merck/gsDesign2
closed
Add tests of AHR related functions
tests
The functions to be tested include: - `AHR.R` - `gs_design_ahr.R` - `gs_info_ahr` - `gs_power_ahr` To test the above functions, please copy the test files from the following two `testthat` folders. - https://github.com/Merck/gsdmvn/tree/main/tests/testthat - https://github.com/Merck/gsDesign2/tree/7538aac9fa2f0d818114f71ca20c0de32f5fd1bb/tests/testthat
1.0
Add tests of AHR related functions - The functions to be tested include: - `AHR.R` - `gs_design_ahr.R` - `gs_info_ahr` - `gs_power_ahr` To test the above functions, please copy the test files from the following two `testthat` folders. - https://github.com/Merck/gsdmvn/tree/main/tests/testthat - https://github.com/Merck/gsDesign2/tree/7538aac9fa2f0d818114f71ca20c0de32f5fd1bb/tests/testthat
non_priority
add tests of ahr related functions the functions to be tested include ahr r gs design ahr r gs info ahr gs power ahr to test the above functions please copy the test files from the following two testthat folders
0
135,032
12,651,661,103
IssuesEvent
2020-06-17 01:04:23
ProjectEvergreen/greenwood
https://api.github.com/repos/ProjectEvergreen/greenwood
opened
expose unified presets through greenwood configuration
CLI documentation enhancement
## Type of Change - [x] New Feature Request - [ ] Documentation / Website - [ ] Improvement / Suggestion - [ ] Bug - [ ] Other (please clarify below) ## Summary In addition to the principal web languages (HTML, CSS, JavaScript) Greenwood should also support markdown out of the box. In particular, being able to take advantage of passing [**unified**](https://unifiedjs.com/) compatible presets to [**wc-markdown-loader**](https://github.com/hutchgrant/wc-markdown-loader#unified-presets). ## Details 1. Add a configuration option called `unified` that should take an object with `settings` and `presets` keys 1. It should "forward" that config to **wc-markdown-loader** 1. Add documentation to [Docs -> Markdown](https://www.greenwoodjs.io/docs/markdown) section detailing unified support and best practices / tips for how to use this in the context of the loader 1. Add unit tests
1.0
expose unified presets through greenwood configuration - ## Type of Change - [x] New Feature Request - [ ] Documentation / Website - [ ] Improvement / Suggestion - [ ] Bug - [ ] Other (please clarify below) ## Summary In addition to the principal web languages (HTML, CSS, JavaScript) Greenwood should also support markdown out of the box. In particular, being able to take advantage of passing [**unified**](https://unifiedjs.com/) compatible presets to [**wc-markdown-loader**](https://github.com/hutchgrant/wc-markdown-loader#unified-presets). ## Details 1. Add a configuration option called `unified` that should take an object with `settings` and `presets` keys 1. It should "forward" that config to **wc-markdown-loader** 1. Add documentation to [Docs -> Markdown](https://www.greenwoodjs.io/docs/markdown) section detailing unified support and best practices / tips for how to use this in the context of the loader 1. Add unit tests
non_priority
expose unified presets through greenwood configuration type of change new feature request documentation website improvement suggestion bug other please clarify below summary in addition to the principal web languages html css javascript greenwood should also support markdown out of the box in particular being able to take advantage of passing compatible presets to details add a configuration option called unified that should take an object with settings and presets keys it should forward that config to wc markdown loader add documentation to section detailing unified support and best practices tips for how to use this in the context of the loader add unit tests
0
271,118
29,269,905,267
IssuesEvent
2023-05-24 01:06:56
cniweb/cniweb-demo
https://api.github.com/repos/cniweb/cniweb-demo
opened
CVE-2019-17573 (Medium) detected in cxf-rt-transports-http-3.1.12.jar
Mend: dependency security vulnerability
## CVE-2019-17573 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cxf-rt-transports-http-3.1.12.jar</b></p></summary> <p>Apache CXF Runtime HTTP Transport</p> <p>Library home page: <a href="http://cxf.apache.org">http://cxf.apache.org</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/cxf/cxf-rt-transports-http/3.1.12/cxf-rt-transports-http-3.1.12.jar</p> <p> Dependency Hierarchy: - cxf-spring-boot-starter-jaxrs-3.1.12.jar (Root Library) - :x: **cxf-rt-transports-http-3.1.12.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable. <p>Publish Date: 2020-01-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17573>CVE-2019-17573</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://lists.apache.org/thread/3h62d52yw0y9hzsj5nn3wwl0gqrhbd92">https://lists.apache.org/thread/3h62d52yw0y9hzsj5nn3wwl0gqrhbd92</a></p> <p>Release Date: 2020-01-16</p> <p>Fix Resolution (org.apache.cxf:cxf-rt-transports-http): 3.2.12</p> <p>Direct dependency fix Resolution (org.apache.cxf:cxf-spring-boot-starter-jaxrs): 3.2.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-17573 (Medium) detected in cxf-rt-transports-http-3.1.12.jar - ## CVE-2019-17573 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cxf-rt-transports-http-3.1.12.jar</b></p></summary> <p>Apache CXF Runtime HTTP Transport</p> <p>Library home page: <a href="http://cxf.apache.org">http://cxf.apache.org</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/cxf/cxf-rt-transports-http/3.1.12/cxf-rt-transports-http-3.1.12.jar</p> <p> Dependency Hierarchy: - cxf-spring-boot-starter-jaxrs-3.1.12.jar (Root Library) - :x: **cxf-rt-transports-http-3.1.12.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable. <p>Publish Date: 2020-01-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17573>CVE-2019-17573</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://lists.apache.org/thread/3h62d52yw0y9hzsj5nn3wwl0gqrhbd92">https://lists.apache.org/thread/3h62d52yw0y9hzsj5nn3wwl0gqrhbd92</a></p> <p>Release Date: 2020-01-16</p> <p>Fix Resolution (org.apache.cxf:cxf-rt-transports-http): 3.2.12</p> <p>Direct dependency fix Resolution (org.apache.cxf:cxf-spring-boot-starter-jaxrs): 3.2.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in cxf rt transports http jar cve medium severity vulnerability vulnerable library cxf rt transports http jar apache cxf runtime http transport library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org apache cxf cxf rt transports http cxf rt transports http jar dependency hierarchy cxf spring boot starter jaxrs jar root library x cxf rt transports http jar vulnerable library found in base branch master vulnerability details by default apache cxf creates a services page containing a listing of the available endpoint names and addresses this webpage is vulnerable to a reflected cross site scripting xss attack which allows a malicious actor to inject javascript into the web page please note that the attack exploits a feature which is not typically not present in modern browsers who remove dot segments before sending the request however mobile applications may be vulnerable publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache cxf cxf rt transports http direct dependency fix resolution org apache cxf cxf spring boot starter jaxrs step up your open source security game with mend
0
50,472
7,605,579,158
IssuesEvent
2018-04-30 09:36:42
NateWr/restaurant-reservations
https://api.github.com/repos/NateWr/restaurant-reservations
closed
Add more information to docs about email deliverability
documentation
There's a bit more detail in this support request: https://wordpress.org/support/topic/e-mails-not-being-send?replies=6#post-8716463 And a more simple breakdown here: https://wordpress.org/support/topic/confirmation-booking-notification-doesnt-work/#post-8328133
1.0
Add more information to docs about email deliverability - There's a bit more detail in this support request: https://wordpress.org/support/topic/e-mails-not-being-send?replies=6#post-8716463 And a more simple breakdown here: https://wordpress.org/support/topic/confirmation-booking-notification-doesnt-work/#post-8328133
non_priority
add more information to docs about email deliverability there s a bit more detail in this support request and a more simple breakdown here
0
52,538
6,260,826,570
IssuesEvent
2017-07-14 21:44:36
rook/rook
https://api.github.com/repos/rook/rook
closed
Improve integration test logging
test
switch to capnslog from Test.Log() which doesn't output to stdout in real-time. Also, improve logging on existing tests.
1.0
Improve integration test logging - switch to capnslog from Test.Log() which doesn't output to stdout in real-time. Also, improve logging on existing tests.
non_priority
improve integration test logging switch to capnslog from test log which doesn t output to stdout in real time also improve logging on existing tests
0
110,730
13,934,117,090
IssuesEvent
2020-10-22 09:35:51
radicle-dev/radicle-upstream
https://api.github.com/repos/radicle-dev/radicle-upstream
closed
Improve seed node input in setting
design improvement ui
As experienced in the integration party there's a need to improve the seed node input. There's an old commit lying around somewhere where it was implemented in a better way. Let's see if we can revert it to that or else I think we still have the designs somewhere. This is what it is about: <img width="1151" alt="Screenshot 2020-10-13 at 20 36 16" src="https://user-images.githubusercontent.com/2326909/95901512-c1efbd80-0d93-11eb-90d2-b587c69ea239.png">
1.0
Improve seed node input in setting - As experienced in the integration party there's a need to improve the seed node input. There's an old commit lying around somewhere where it was implemented in a better way. Let's see if we can revert it to that or else I think we still have the designs somewhere. This is what it is about: <img width="1151" alt="Screenshot 2020-10-13 at 20 36 16" src="https://user-images.githubusercontent.com/2326909/95901512-c1efbd80-0d93-11eb-90d2-b587c69ea239.png">
non_priority
improve seed node input in setting as experienced in the integration party there s a need to improve the seed node input there s an old commit lying around somewhere where it was implemented in a better way let s see if we can revert it to that or else i think we still have the designs somewhere this is what it is about img width alt screenshot at src
0
122,891
17,771,616,589
IssuesEvent
2021-08-30 14:16:14
Tim-sandbox/barista
https://api.github.com/repos/Tim-sandbox/barista
opened
CVE-2017-18342 (High) detected in PyYAML-3.12.tar.gz
security vulnerability
## CVE-2017-18342 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>PyYAML-3.12.tar.gz</b></p></summary> <p>YAML parser and emitter for Python</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/4a/85/db5a2df477072b2902b0eb892feb37d88ac635d36245a72a6a69b23b383a/PyYAML-3.12.tar.gz">https://files.pythonhosted.org/packages/4a/85/db5a2df477072b2902b0eb892feb37d88ac635d36245a72a6a69b23b383a/PyYAML-3.12.tar.gz</a></p> <p>Path to vulnerable library: barista-scan/tools/scancode-toolkit/thirdparty/PyYAML-3.12.tar.gz</p> <p> Dependency Hierarchy: - :x: **PyYAML-3.12.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Tim-sandbox/barista/commit/2b8e77b2ff0d688bfd2ffb44061287e82fa71967">2b8e77b2ff0d688bfd2ffb44061287e82fa71967</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function. <p>Publish Date: 2018-06-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18342>CVE-2017-18342</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18342">https://nvd.nist.gov/vuln/detail/CVE-2017-18342</a></p> <p>Release Date: 2018-06-27</p> <p>Fix Resolution: PyYAML - 5.1</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"PyYAML","packageVersion":"3.12","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"PyYAML:3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"PyYAML - 5.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-18342","vulnerabilityDetails":"In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18342","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2017-18342 (High) detected in PyYAML-3.12.tar.gz - ## CVE-2017-18342 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>PyYAML-3.12.tar.gz</b></p></summary> <p>YAML parser and emitter for Python</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/4a/85/db5a2df477072b2902b0eb892feb37d88ac635d36245a72a6a69b23b383a/PyYAML-3.12.tar.gz">https://files.pythonhosted.org/packages/4a/85/db5a2df477072b2902b0eb892feb37d88ac635d36245a72a6a69b23b383a/PyYAML-3.12.tar.gz</a></p> <p>Path to vulnerable library: barista-scan/tools/scancode-toolkit/thirdparty/PyYAML-3.12.tar.gz</p> <p> Dependency Hierarchy: - :x: **PyYAML-3.12.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Tim-sandbox/barista/commit/2b8e77b2ff0d688bfd2ffb44061287e82fa71967">2b8e77b2ff0d688bfd2ffb44061287e82fa71967</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function. <p>Publish Date: 2018-06-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18342>CVE-2017-18342</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18342">https://nvd.nist.gov/vuln/detail/CVE-2017-18342</a></p> <p>Release Date: 2018-06-27</p> <p>Fix Resolution: PyYAML - 5.1</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"PyYAML","packageVersion":"3.12","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"PyYAML:3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"PyYAML - 5.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-18342","vulnerabilityDetails":"In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the \u0027UnsafeLoader\u0027 has been introduced for backward compatibility with the function.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18342","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in pyyaml tar gz cve high severity vulnerability vulnerable library pyyaml tar gz yaml parser and emitter for python library home page a href path to vulnerable library barista scan tools scancode toolkit thirdparty pyyaml tar gz dependency hierarchy x pyyaml tar gz vulnerable library found in head commit a href found in base branch master vulnerability details in pyyaml before the yaml load api could execute arbitrary code if used with untrusted data the load function has been deprecated in version and the unsafeloader has been introduced for backward compatibility with the function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution pyyaml rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree pyyaml isminimumfixversionavailable true minimumfixversion pyyaml basebranches vulnerabilityidentifier cve vulnerabilitydetails in pyyaml before the yaml load api could execute arbitrary code if used with untrusted data the load function has been deprecated in version and the has been introduced for backward compatibility with the function vulnerabilityurl
0
71,106
23,447,399,558
IssuesEvent
2022-08-15 21:10:52
department-of-veterans-affairs/va.gov-team
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
opened
VA Forms System Core [Component]: Multiple screens - Step 1, 6, 7, 8 - Radio buttons and checkboxes need fieldsets and legends
508/Accessibility 508-defect-1
### Point of contact Angela Fowler ### Severity level 1, Launchblocker. Critical. Must be fixed before launch. ### Details On Step 1, 6, 7, 8, several of the radio button and checkbox components aren't contained in fieldsets. For example, when navigating to the "relationship to deceased" radio button, the question isn't read. Similar issues occur on other steps as well. ### Reproduction steps 1. Go to one of the steps listed. 2. Inspect HTML. 3. Note that the radio button and checkbox question lack fieldsets. ### Proposed solution or next steps Add the radio button and checkbox question to fieldsets. Like: ```html <fieldset> <lenged>Question text</legend> …radio buttons… </fieldset> ``` A bigger question? Is this not the default container for this component in the design system? Is that something we could make work out of the box when teams use radio button or checkbox components? ### References, articles, or WCAG support WCAG 1.3.1 Info and Relationships ### Type of issue - [X] Screenreader - [ ] Keyboard - [ ] Focus - [ ] Headings - [ ] Color - [ ] Zoom - [ ] Semantics - [ ] Axe-core - [ ] Something else
1.0
VA Forms System Core [Component]: Multiple screens - Step 1, 6, 7, 8 - Radio buttons and checkboxes need fieldsets and legends - ### Point of contact Angela Fowler ### Severity level 1, Launchblocker. Critical. Must be fixed before launch. ### Details On Step 1, 6, 7, 8, several of the radio button and checkbox components aren't contained in fieldsets. For example, when navigating to the "relationship to deceased" radio button, the question isn't read. Similar issues occur on other steps as well. ### Reproduction steps 1. Go to one of the steps listed. 2. Inspect HTML. 3. Note that the radio button and checkbox question lack fieldsets. ### Proposed solution or next steps Add the radio button and checkbox question to fieldsets. Like: ```html <fieldset> <lenged>Question text</legend> …radio buttons… </fieldset> ``` A bigger question? Is this not the default container for this component in the design system? Is that something we could make work out of the box when teams use radio button or checkbox components? ### References, articles, or WCAG support WCAG 1.3.1 Info and Relationships ### Type of issue - [X] Screenreader - [ ] Keyboard - [ ] Focus - [ ] Headings - [ ] Color - [ ] Zoom - [ ] Semantics - [ ] Axe-core - [ ] Something else
non_priority
va forms system core multiple screens step radio buttons and checkboxes need fieldsets and legends point of contact angela fowler severity level launchblocker critical must be fixed before launch details on step several of the radio button and checkbox components aren t contained in fieldsets for example when navigating to the relationship to deceased radio button the question isn t read similar issues occur on other steps as well reproduction steps go to one of the steps listed inspect html note that the radio button and checkbox question lack fieldsets proposed solution or next steps add the radio button and checkbox question to fieldsets like html question text …radio buttons… a bigger question is this not the default container for this component in the design system is that something we could make work out of the box when teams use radio button or checkbox components references articles or wcag support wcag info and relationships type of issue screenreader keyboard focus headings color zoom semantics axe core something else
0
143,272
13,057,817,981
IssuesEvent
2020-07-30 08:01:49
ggirmay/Top-Shop-e-commerce
https://api.github.com/repos/ggirmay/Top-Shop-e-commerce
closed
Construct Package Structure
documentation enhancement good first issue
Selecting architectures (hexagonal and command query architecture) and construct the packages.
1.0
Construct Package Structure - Selecting architectures (hexagonal and command query architecture) and construct the packages.
non_priority
construct package structure selecting architectures hexagonal and command query architecture and construct the packages
0
228,169
18,162,996,464
IssuesEvent
2021-09-27 11:50:42
elastic/elasticsearch
https://api.github.com/repos/elastic/elasticsearch
opened
[CI] SearchableSnapshotEnableAllocationDeciderIntegTests testAllocationDisabled failing
:Distributed/Snapshot/Restore >test-failure
**Build scan:** https://gradle-enterprise.elastic.co/s/iesmgw5two4y6/tests/:x-pack:plugin:searchable-snapshots:internalClusterTest/org.elasticsearch.xpack.searchablesnapshots.allocation.SearchableSnapshotEnableAllocationDeciderIntegTests/testAllocationDisabled **Reproduction line:** `./gradlew ':x-pack:plugin:searchable-snapshots:internalClusterTest' --tests "org.elasticsearch.xpack.searchablesnapshots.allocation.SearchableSnapshotEnableAllocationDeciderIntegTests.testAllocationDisabled" -Dtests.seed=B37144B9F5C71BEC -Dtests.locale=de-AT -Dtests.timezone=America/Kentucky/Monticello -Druntime.java=11` **Applicable branches:** master **Reproduces locally?:** No **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.searchablesnapshots.allocation.SearchableSnapshotEnableAllocationDeciderIntegTests&tests.test=testAllocationDisabled **Failure excerpt:** ``` com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=875, name=elasticsearch[node_t0][generic][T#6], state=RUNNABLE, group=TGRP-SearchableSnapshotEnableAllocationDeciderIntegTests] at __randomizedtesting.SeedInfo.seed([B37144B9F5C71BEC:5311FC9EB41E488A]:0) Caused by: java.lang.AssertionError: no previous metadata found for [wvbksxreci/gtSvVp42R9CmXLKQ-Sz8pQ] at __randomizedtesting.SeedInfo.seed([B37144B9F5C71BEC]:0) at org.elasticsearch.xpack.searchablesnapshots.cache.blob.BlobStoreCacheMaintenanceService$MaintenanceTask.doRun(BlobStoreCacheMaintenanceService.java:146) at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingAbstractRunnable.doRun(ThreadContext.java:737) at org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at java.lang.Thread.run(Thread.java:834) ```
1.0
[CI] SearchableSnapshotEnableAllocationDeciderIntegTests testAllocationDisabled failing - **Build scan:** https://gradle-enterprise.elastic.co/s/iesmgw5two4y6/tests/:x-pack:plugin:searchable-snapshots:internalClusterTest/org.elasticsearch.xpack.searchablesnapshots.allocation.SearchableSnapshotEnableAllocationDeciderIntegTests/testAllocationDisabled **Reproduction line:** `./gradlew ':x-pack:plugin:searchable-snapshots:internalClusterTest' --tests "org.elasticsearch.xpack.searchablesnapshots.allocation.SearchableSnapshotEnableAllocationDeciderIntegTests.testAllocationDisabled" -Dtests.seed=B37144B9F5C71BEC -Dtests.locale=de-AT -Dtests.timezone=America/Kentucky/Monticello -Druntime.java=11` **Applicable branches:** master **Reproduces locally?:** No **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.searchablesnapshots.allocation.SearchableSnapshotEnableAllocationDeciderIntegTests&tests.test=testAllocationDisabled **Failure excerpt:** ``` com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=875, name=elasticsearch[node_t0][generic][T#6], state=RUNNABLE, group=TGRP-SearchableSnapshotEnableAllocationDeciderIntegTests] at __randomizedtesting.SeedInfo.seed([B37144B9F5C71BEC:5311FC9EB41E488A]:0) Caused by: java.lang.AssertionError: no previous metadata found for [wvbksxreci/gtSvVp42R9CmXLKQ-Sz8pQ] at __randomizedtesting.SeedInfo.seed([B37144B9F5C71BEC]:0) at org.elasticsearch.xpack.searchablesnapshots.cache.blob.BlobStoreCacheMaintenanceService$MaintenanceTask.doRun(BlobStoreCacheMaintenanceService.java:146) at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingAbstractRunnable.doRun(ThreadContext.java:737) at org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at java.lang.Thread.run(Thread.java:834) ```
non_priority
searchablesnapshotenableallocationdeciderintegtests testallocationdisabled failing build scan reproduction line gradlew x pack plugin searchable snapshots internalclustertest tests org elasticsearch xpack searchablesnapshots allocation searchablesnapshotenableallocationdeciderintegtests testallocationdisabled dtests seed dtests locale de at dtests timezone america kentucky monticello druntime java applicable branches master reproduces locally no failure history failure excerpt com carrotsearch randomizedtesting uncaughtexceptionerror captured an uncaught exception in thread thread state runnable group tgrp searchablesnapshotenableallocationdeciderintegtests at randomizedtesting seedinfo seed caused by java lang assertionerror no previous metadata found for at randomizedtesting seedinfo seed at org elasticsearch xpack searchablesnapshots cache blob blobstorecachemaintenanceservice maintenancetask dorun blobstorecachemaintenanceservice java at org elasticsearch common util concurrent threadcontext contextpreservingabstractrunnable dorun threadcontext java at org elasticsearch common util concurrent abstractrunnable run abstractrunnable java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java
0
345,552
30,822,580,239
IssuesEvent
2023-08-01 17:26:25
coder/coder
https://api.github.com/repos/coder/coder
closed
bug: improve performance of GetAuthorizedWorkspaces query
scaletest bug
# Problem: GET `/api/v2/workspaces` can take a long time to load with a number of active workspaces. See the following trace for more information: https://console.cloud.google.com/traces/list?project=v2-loadtest&tid=18cccfc446a9f8550aebf0656b8f26b4 (Partial screenshot below) ![image](https://github.com/coder/coder/assets/4949514/22407d5d-0b80-416e-8504-2bc3e4a47a6e) Essentially it looks like the `GetAuthorizedWorkspaces` query is having to call `GetWorkspaceByID` on every workspace. This is going to kill performance in the long run.
1.0
bug: improve performance of GetAuthorizedWorkspaces query - # Problem: GET `/api/v2/workspaces` can take a long time to load with a number of active workspaces. See the following trace for more information: https://console.cloud.google.com/traces/list?project=v2-loadtest&tid=18cccfc446a9f8550aebf0656b8f26b4 (Partial screenshot below) ![image](https://github.com/coder/coder/assets/4949514/22407d5d-0b80-416e-8504-2bc3e4a47a6e) Essentially it looks like the `GetAuthorizedWorkspaces` query is having to call `GetWorkspaceByID` on every workspace. This is going to kill performance in the long run.
non_priority
bug improve performance of getauthorizedworkspaces query problem get api workspaces can take a long time to load with a number of active workspaces see the following trace for more information partial screenshot below essentially it looks like the getauthorizedworkspaces query is having to call getworkspacebyid on every workspace this is going to kill performance in the long run
0
6,321
5,375,282,514
IssuesEvent
2017-02-23 03:56:31
Microsoft/WinObjC
https://api.github.com/repos/Microsoft/WinObjC
opened
Trim size of UIKit.dll if possible
Area-User Experience Performance Task
We should investigate why UIKit.dll is ~13MB, and trim that down if possible.
True
Trim size of UIKit.dll if possible - We should investigate why UIKit.dll is ~13MB, and trim that down if possible.
non_priority
trim size of uikit dll if possible we should investigate why uikit dll is and trim that down if possible
0
293,940
25,334,835,996
IssuesEvent
2022-11-18 15:59:12
WASdev/websphere-liberty-operator
https://api.github.com/repos/WASdev/websphere-liberty-operator
opened
License test failure in OCP
test
Build [719](https://cloud.ibm.com/devops/pipelines/tekton/c3b2797d-c8ad-4dab-9660-2ec8c0643a76/runs/eb70f36d-51a6-44fd-a6f3-54449ae615ec/deploy-acceptance-tests/run-stage?env_id=ibm:yp:us-south) License e2e/kuttl test failed in OCP. It passed in Kind/minikube test though. Could it be a timing issue? or is it checking wrong Pod? ``` Name: license State: fail Errors: resource Pod:wlo-test-719/: .metadata.annotations.productChargedContainers: value mismatch, expected: app != actual: ALL ```
1.0
License test failure in OCP - Build [719](https://cloud.ibm.com/devops/pipelines/tekton/c3b2797d-c8ad-4dab-9660-2ec8c0643a76/runs/eb70f36d-51a6-44fd-a6f3-54449ae615ec/deploy-acceptance-tests/run-stage?env_id=ibm:yp:us-south) License e2e/kuttl test failed in OCP. It passed in Kind/minikube test though. Could it be a timing issue? or is it checking wrong Pod? ``` Name: license State: fail Errors: resource Pod:wlo-test-719/: .metadata.annotations.productChargedContainers: value mismatch, expected: app != actual: ALL ```
non_priority
license test failure in ocp build license kuttl test failed in ocp it passed in kind minikube test though could it be a timing issue or is it checking wrong pod name license state fail errors resource pod wlo test metadata annotations productchargedcontainers value mismatch expected app actual all
0
5,830
7,346,549,693
IssuesEvent
2018-03-07 21:06:41
Microsoft/vscode-cpptools
https://api.github.com/repos/Microsoft/vscode-cpptools
closed
VSCode C/C++ Extension(ms-vscode.cpptools) can be cached?
Language Service bug
As my usage, I usually open 2 or more Linux Kernel Source projects in vscode, it's very huge. When I open vscode, ms-vscode.cpptools will auto start preparation of C/C++ IntelliSense, such as symbol search ing, goto defination and so on. But as I say, the project of kernel source code is very huge and ms-vscode.cpptools will take a lot of time to finish. Every time I open vscode, this preparation job will run again and take a lot of time. I'm thinking that ms-vscode.cpptools should add cache support for a project.
1.0
VSCode C/C++ Extension(ms-vscode.cpptools) can be cached? - As my usage, I usually open 2 or more Linux Kernel Source projects in vscode, it's very huge. When I open vscode, ms-vscode.cpptools will auto start preparation of C/C++ IntelliSense, such as symbol search ing, goto defination and so on. But as I say, the project of kernel source code is very huge and ms-vscode.cpptools will take a lot of time to finish. Every time I open vscode, this preparation job will run again and take a lot of time. I'm thinking that ms-vscode.cpptools should add cache support for a project.
non_priority
vscode c c extension ms vscode cpptools can be cached as my usage i usually open or more linux kernel source projects in vscode it s very huge when i open vscode ms vscode cpptools will auto start preparation of c c intellisense such as symbol search ing goto defination and so on but as i say the project of kernel source code is very huge and ms vscode cpptools will take a lot of time to finish every time i open vscode this preparation job will run again and take a lot of time i m thinking that ms vscode cpptools should add cache support for a project
0
274,371
23,834,930,619
IssuesEvent
2022-09-06 04:17:59
Automattic/woocommerce-payments
https://api.github.com/repos/Automattic/woocommerce-payments
opened
Failing Internal E2E Test
type: bug component: deposits component: tests
### Describe the bug TBC ### To Reproduce <!-- Describe the steps to reproduce the behavior. --> 1. Go to '…' 2. Click on '…' 3. Scroll down to …' 4. See error ### Actual behavior <!-- A clear and concise description of what actually happens. --> ### Screenshots <!-- If applicable, add screenshots to help explain your problem. --> ### Expected behavior <!-- A clear and concise description of what you expected to happen. --> ### Desktop (please complete the following information): * OS: [e.g. iOS] * Browser [e.g. chrome, safari] * Version [e.g. 22] ### Smartphone (please complete the following information): * Device: [e.g. iPhone6] * OS: [e.g. iOS8.1] * Browser [e.g. stock browser, safari] * Version [e.g. 22] ### Additional context <!-- Any additional context or details you think might be helpful. --> <!-- Ticket numbers/links, plugin versions, system statuses etc. -->
1.0
Failing Internal E2E Test - ### Describe the bug TBC ### To Reproduce <!-- Describe the steps to reproduce the behavior. --> 1. Go to '…' 2. Click on '…' 3. Scroll down to …' 4. See error ### Actual behavior <!-- A clear and concise description of what actually happens. --> ### Screenshots <!-- If applicable, add screenshots to help explain your problem. --> ### Expected behavior <!-- A clear and concise description of what you expected to happen. --> ### Desktop (please complete the following information): * OS: [e.g. iOS] * Browser [e.g. chrome, safari] * Version [e.g. 22] ### Smartphone (please complete the following information): * Device: [e.g. iPhone6] * OS: [e.g. iOS8.1] * Browser [e.g. stock browser, safari] * Version [e.g. 22] ### Additional context <!-- Any additional context or details you think might be helpful. --> <!-- Ticket numbers/links, plugin versions, system statuses etc. -->
non_priority
failing internal test describe the bug tbc to reproduce go to … click on … scroll down to … see error actual behavior screenshots expected behavior desktop please complete the following information os browser version smartphone please complete the following information device os browser version additional context
0
17,779
12,551,770,971
IssuesEvent
2020-06-06 15:52:41
javahippie/clj-test-containers
https://api.github.com/repos/javahippie/clj-test-containers
closed
Set up clojars deployment
infrastructure
The library should be published on clojars, so other users can include it in their build pipeline.
1.0
Set up clojars deployment - The library should be published on clojars, so other users can include it in their build pipeline.
non_priority
set up clojars deployment the library should be published on clojars so other users can include it in their build pipeline
0
113,201
24,378,500,468
IssuesEvent
2022-10-04 05:00:12
appsmithorg/appsmith
https://api.github.com/repos/appsmithorg/appsmith
closed
[Bug] Check for stale datasource connection before execution for Mysql plugin.
Bug Backend Datasources Critical community BE Coders Pod Project
## Description 1. Check for stale datasource connection before execution for the Mysql plugin. 2. Return stale connection exception. ## Context Currently, stale connection is not checked for, and hence an exception occurs during execution which gets returned to UI as it is. With a stale connection, the new action implementation class catches this exception and takes corrective action. ### Steps to reproduce the behavior: 1. Create MySQL datasource. 2. Restart MySQL to invalidate connection. 3. Run MySQL query. ### Important Details - Version: Any - OS: Any - Browser: Any
1.0
[Bug] Check for stale datasource connection before execution for Mysql plugin. - ## Description 1. Check for stale datasource connection before execution for the Mysql plugin. 2. Return stale connection exception. ## Context Currently, stale connection is not checked for, and hence an exception occurs during execution which gets returned to UI as it is. With a stale connection, the new action implementation class catches this exception and takes corrective action. ### Steps to reproduce the behavior: 1. Create MySQL datasource. 2. Restart MySQL to invalidate connection. 3. Run MySQL query. ### Important Details - Version: Any - OS: Any - Browser: Any
non_priority
check for stale datasource connection before execution for mysql plugin description check for stale datasource connection before execution for the mysql plugin return stale connection exception context currently stale connection is not checked for and hence an exception occurs during execution which gets returned to ui as it is with a stale connection the new action implementation class catches this exception and takes corrective action steps to reproduce the behavior create mysql datasource restart mysql to invalidate connection run mysql query important details version any os any browser any
0
272,135
20,734,397,633
IssuesEvent
2022-03-14 12:27:44
RasmusDahlJensen/testrepo
https://api.github.com/repos/RasmusDahlJensen/testrepo
closed
Opdater README med fiktiv CV første entry
documentation
Opdater README med et fiktivt CV der indeholder en beskrivelse af et fiktivt arbejde
1.0
Opdater README med fiktiv CV første entry - Opdater README med et fiktivt CV der indeholder en beskrivelse af et fiktivt arbejde
non_priority
opdater readme med fiktiv cv første entry opdater readme med et fiktivt cv der indeholder en beskrivelse af et fiktivt arbejde
0
87,890
25,241,502,982
IssuesEvent
2022-11-15 07:53:13
onlydustxyz/kaaper
https://api.github.com/repos/onlydustxyz/kaaper
closed
Publish kaaper on npm
Type: build Context: isolated Duration: under a day State: open Techno: js Difficulty: easy
Publish kaaper on npm upon new release (tag `v*`), using github action. Here is an example: https://github.com/onlydustxyz/backoffice-wallet-link/blob/main/.github/workflows/deployment.yml
1.0
Publish kaaper on npm - Publish kaaper on npm upon new release (tag `v*`), using github action. Here is an example: https://github.com/onlydustxyz/backoffice-wallet-link/blob/main/.github/workflows/deployment.yml
non_priority
publish kaaper on npm publish kaaper on npm upon new release tag v using github action here is an example
0
448,074
31,765,486,448
IssuesEvent
2023-09-12 08:31:19
MobileReality/react-native-select-pro
https://api.github.com/repos/MobileReality/react-native-select-pro
closed
[BUG] SelectModalProvider not working in IOS
bug documentation
**Describe the bug** A clear and concise description of what the bug is when you open modal and click the list but do not select anything and click any where in the screen to close the select list and then try to Hide modal in **IOS**. **To Reproduce** Steps to reproduce the behavior: 1. Go to your Modal provider link `https://themobilereality.com/react-native-select-pro-docs` 2. Just open your own example in expo. 3. open the list and just close it by clicking anywhere and just **click hide modal** you will see the **BUG** **Expected behavior** Modal will close. **Environment (please complete the following information):** - OS: [iOS/Android] - OS Version: [eq. iOS 14] - React Native Version - Device on which issue is presented **Additional context** https://github.com/MobileReality/react-native-select-pro/assets/132438054/c598d348-06df-4362-a480-a1b59c86bee0
1.0
[BUG] SelectModalProvider not working in IOS - **Describe the bug** A clear and concise description of what the bug is when you open modal and click the list but do not select anything and click any where in the screen to close the select list and then try to Hide modal in **IOS**. **To Reproduce** Steps to reproduce the behavior: 1. Go to your Modal provider link `https://themobilereality.com/react-native-select-pro-docs` 2. Just open your own example in expo. 3. open the list and just close it by clicking anywhere and just **click hide modal** you will see the **BUG** **Expected behavior** Modal will close. **Environment (please complete the following information):** - OS: [iOS/Android] - OS Version: [eq. iOS 14] - React Native Version - Device on which issue is presented **Additional context** https://github.com/MobileReality/react-native-select-pro/assets/132438054/c598d348-06df-4362-a480-a1b59c86bee0
non_priority
selectmodalprovider not working in ios describe the bug a clear and concise description of what the bug is when you open modal and click the list but do not select anything and click any where in the screen to close the select list and then try to hide modal in ios to reproduce steps to reproduce the behavior go to your modal provider link just open your own example in expo open the list and just close it by clicking anywhere and just click hide modal you will see the bug expected behavior modal will close environment please complete the following information os os version react native version device on which issue is presented additional context
0
32,805
4,790,798,175
IssuesEvent
2016-10-31 10:05:33
muller89/ubix
https://api.github.com/repos/muller89/ubix
opened
[P#:['98181284']] Implement Modified Policy Evaluation for MDP-based agents in AC
agentframework rl test
Pivotal Issue: https://www.pivotaltracker.com/story/show/98181284 See Russel & Norvig Chap 17 on Policy Iteration.
1.0
[P#:['98181284']] Implement Modified Policy Evaluation for MDP-based agents in AC - Pivotal Issue: https://www.pivotaltracker.com/story/show/98181284 See Russel & Norvig Chap 17 on Policy Iteration.
non_priority
implement modified policy evaluation for mdp based agents in ac pivotal issue see russel norvig chap on policy iteration
0
13,425
5,359,045,537
IssuesEvent
2017-02-21 01:05:02
SEED-platform/seed
https://api.github.com/repos/SEED-platform/seed
closed
Settings not saved on Detail View
Building Detail P-1
instance: seeddev SHA: 514e883 See this doc https://drive.google.com/open?id=1bjJdnl5UIZFIFQ5MspH34saNCj-2LQqTZR_GIiD5G2k I have only tested this on Property Detail Settings, so please test on Tax Lot Detail Settings when this is fixed.
1.0
Settings not saved on Detail View - instance: seeddev SHA: 514e883 See this doc https://drive.google.com/open?id=1bjJdnl5UIZFIFQ5MspH34saNCj-2LQqTZR_GIiD5G2k I have only tested this on Property Detail Settings, so please test on Tax Lot Detail Settings when this is fixed.
non_priority
settings not saved on detail view instance seeddev sha see this doc i have only tested this on property detail settings so please test on tax lot detail settings when this is fixed
0
4,682
7,299,572,205
IssuesEvent
2018-02-26 20:34:29
LLK/scratch-vm
https://api.github.com/repos/LLK/scratch-vm
closed
Errors when no sprites are in loaded Scratch 2.0 project
bug compatibility
> Uncaught TypeError: Cannot read property 'blocks' of undefined Presumably, I've made an assumption somewhere that there would be a stage and a first sprite. However this is not always the case: https://llk.github.io/scratch-vm/#125571490 The project functions fine as far as execution, but the blocks loading fails; must be something about setting the editing target.
True
Errors when no sprites are in loaded Scratch 2.0 project - > Uncaught TypeError: Cannot read property 'blocks' of undefined Presumably, I've made an assumption somewhere that there would be a stage and a first sprite. However this is not always the case: https://llk.github.io/scratch-vm/#125571490 The project functions fine as far as execution, but the blocks loading fails; must be something about setting the editing target.
non_priority
errors when no sprites are in loaded scratch project uncaught typeerror cannot read property blocks of undefined presumably i ve made an assumption somewhere that there would be a stage and a first sprite however this is not always the case the project functions fine as far as execution but the blocks loading fails must be something about setting the editing target
0
155,958
13,637,750,421
IssuesEvent
2020-09-25 08:20:03
tejanc/StocksApp
https://api.github.com/repos/tejanc/StocksApp
closed
AWS S3 Bucket redirection error
documentation
404 Key not found See below for fix: https://stackoverflow.com/questions/51218979/react-router-doesnt-work-in-aws-s3-bucket Use 'index.html' in the error document
1.0
AWS S3 Bucket redirection error - 404 Key not found See below for fix: https://stackoverflow.com/questions/51218979/react-router-doesnt-work-in-aws-s3-bucket Use 'index.html' in the error document
non_priority
aws bucket redirection error key not found see below for fix use index html in the error document
0
326,667
28,010,422,894
IssuesEvent
2023-03-27 18:11:44
elastic/kibana
https://api.github.com/repos/elastic/kibana
closed
Failing test: X-Pack EPM API Integration Tests.x-pack/test/fleet_api_integration/apis/epm/install_prerelease·ts - Fleet Endpoints EPM Endpoints installs package that has a prerelease version should bulk install the GA packages when prerelease is not set
failed-test skipped-test Team:Fleet v8.7.0 v8.8.0
A test failed on a tracked branch ``` Error: expected undefined to equal '8.6.1' at Assertion.assert (expect.js:100:11) at Assertion.equal (expect.js:227:8) at Context.<anonymous> (install_prerelease.ts:99:46) at runMicrotasks (<anonymous>) at processTicksAndRejections (node:internal/process/task_queues:96:5) at Object.apply (wrap_function.js:73:16) ``` First failure: [CI Build - main](https://buildkite.com/elastic/kibana-on-merge/builds/26462#0186272d-d5c7-40c7-868d-9a4f03982386) <!-- kibanaCiData = {"failed-test":{"test.class":"X-Pack EPM API Integration Tests.x-pack/test/fleet_api_integration/apis/epm/install_prerelease·ts","test.name":"Fleet Endpoints EPM Endpoints installs package that has a prerelease version should bulk install the GA packages when prerelease is not set","test.failCount":9}} -->
2.0
Failing test: X-Pack EPM API Integration Tests.x-pack/test/fleet_api_integration/apis/epm/install_prerelease·ts - Fleet Endpoints EPM Endpoints installs package that has a prerelease version should bulk install the GA packages when prerelease is not set - A test failed on a tracked branch ``` Error: expected undefined to equal '8.6.1' at Assertion.assert (expect.js:100:11) at Assertion.equal (expect.js:227:8) at Context.<anonymous> (install_prerelease.ts:99:46) at runMicrotasks (<anonymous>) at processTicksAndRejections (node:internal/process/task_queues:96:5) at Object.apply (wrap_function.js:73:16) ``` First failure: [CI Build - main](https://buildkite.com/elastic/kibana-on-merge/builds/26462#0186272d-d5c7-40c7-868d-9a4f03982386) <!-- kibanaCiData = {"failed-test":{"test.class":"X-Pack EPM API Integration Tests.x-pack/test/fleet_api_integration/apis/epm/install_prerelease·ts","test.name":"Fleet Endpoints EPM Endpoints installs package that has a prerelease version should bulk install the GA packages when prerelease is not set","test.failCount":9}} -->
non_priority
failing test x pack epm api integration tests x pack test fleet api integration apis epm install prerelease·ts fleet endpoints epm endpoints installs package that has a prerelease version should bulk install the ga packages when prerelease is not set a test failed on a tracked branch error expected undefined to equal at assertion assert expect js at assertion equal expect js at context install prerelease ts at runmicrotasks at processticksandrejections node internal process task queues at object apply wrap function js first failure
0
74,569
9,086,690,900
IssuesEvent
2019-02-18 11:39:06
IBM-Blockchain/blockchain-vscode-extension
https://api.github.com/repos/IBM-Blockchain/blockchain-vscode-extension
closed
As a developer I can create a contract through the ui
design phase 2 user story
Currently there is no way to create a smart contract through the ui only a command
1.0
As a developer I can create a contract through the ui - Currently there is no way to create a smart contract through the ui only a command
non_priority
as a developer i can create a contract through the ui currently there is no way to create a smart contract through the ui only a command
0
158,684
20,028,877,460
IssuesEvent
2022-02-02 01:25:04
manishshanker/numericRangeInput
https://api.github.com/repos/manishshanker/numericRangeInput
opened
CVE-2020-11022 (Medium) detected in jquery-1.9.1.js
security vulnerability
## CVE-2020-11022 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.9.1.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.1/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.1/jquery.js</a></p> <p>Path to dependency file: /numericRangeInput/code/index.html</p> <p>Path to vulnerable library: /numericRangeInput/code/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.9.1.js** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-11022 (Medium) detected in jquery-1.9.1.js - ## CVE-2020-11022 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.9.1.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.1/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.1/jquery.js</a></p> <p>Path to dependency file: /numericRangeInput/code/index.html</p> <p>Path to vulnerable library: /numericRangeInput/code/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.9.1.js** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jquery js cve medium severity vulnerability vulnerable library jquery js javascript library for dom operations library home page a href path to dependency file numericrangeinput code index html path to vulnerable library numericrangeinput code index html dependency hierarchy x jquery js vulnerable library vulnerability details in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
119,675
12,036,834,257
IssuesEvent
2020-04-13 20:34:51
golang/go
https://api.github.com/repos/golang/go
closed
errors: example code for errors.As has extraneous code
Documentation NeedsInvestigation
The example code for `errors.As` (viewed at https://pkg.go.dev/errors?tab=doc#As) is the [entire contents of the `wrap_test.go` file](https://github.com/golang/go/blob/go1.14.1/src/errors/wrap_test.go). It should be just `func ExampleAs() { ... }` I presume. In talking this over with @FiloSottile, this may be a more systemic issue which can be improved in `godoc`. For example, we have the same issue with the [chacha20poly1305.NewX](https://pkg.go.dev/golang.org/x/crypto/chacha20poly1305?tab=doc#NewX) example code. However, perhaps we should fix the example for the errors package for now either way. While we're in there, perhaps we should check if there are any improvements to the documentation for errors as tracked in https://github.com/golang/go/issues/31716. /cc @jba @mpvl
1.0
errors: example code for errors.As has extraneous code - The example code for `errors.As` (viewed at https://pkg.go.dev/errors?tab=doc#As) is the [entire contents of the `wrap_test.go` file](https://github.com/golang/go/blob/go1.14.1/src/errors/wrap_test.go). It should be just `func ExampleAs() { ... }` I presume. In talking this over with @FiloSottile, this may be a more systemic issue which can be improved in `godoc`. For example, we have the same issue with the [chacha20poly1305.NewX](https://pkg.go.dev/golang.org/x/crypto/chacha20poly1305?tab=doc#NewX) example code. However, perhaps we should fix the example for the errors package for now either way. While we're in there, perhaps we should check if there are any improvements to the documentation for errors as tracked in https://github.com/golang/go/issues/31716. /cc @jba @mpvl
non_priority
errors example code for errors as has extraneous code the example code for errors as viewed at is the it should be just func exampleas i presume in talking this over with filosottile this may be a more systemic issue which can be improved in godoc for example we have the same issue with the example code however perhaps we should fix the example for the errors package for now either way while we re in there perhaps we should check if there are any improvements to the documentation for errors as tracked in cc jba mpvl
0
88,997
10,585,761,096
IssuesEvent
2019-10-08 18:13:44
spotify/heroic
https://api.github.com/repos/spotify/heroic
closed
Document aggregations of resource identifiers
note:accepted type:documentation
When talking various squads the use case for this is as follows. Alerts are typically a max/avg within a given region. When an alert fires the on-call person will often change the aggregation from region -> instance. With kubernetes, instance is now becoming podname which is not in the suggest index. With Grafana, it should be documented that resource identifiers can be added free-form even though they won't show up as suggestions. Also for a nicer UX perhaps we can have a fixed list of RI's or get the list of RI's returned by the query to populate the dropdown.
1.0
Document aggregations of resource identifiers - When talking various squads the use case for this is as follows. Alerts are typically a max/avg within a given region. When an alert fires the on-call person will often change the aggregation from region -> instance. With kubernetes, instance is now becoming podname which is not in the suggest index. With Grafana, it should be documented that resource identifiers can be added free-form even though they won't show up as suggestions. Also for a nicer UX perhaps we can have a fixed list of RI's or get the list of RI's returned by the query to populate the dropdown.
non_priority
document aggregations of resource identifiers when talking various squads the use case for this is as follows alerts are typically a max avg within a given region when an alert fires the on call person will often change the aggregation from region instance with kubernetes instance is now becoming podname which is not in the suggest index with grafana it should be documented that resource identifiers can be added free form even though they won t show up as suggestions also for a nicer ux perhaps we can have a fixed list of ri s or get the list of ri s returned by the query to populate the dropdown
0
182,570
14,142,489,451
IssuesEvent
2020-11-10 14:07:44
deathlyrage/pot-demo-bugs
https://api.github.com/repos/deathlyrage/pot-demo-bugs
closed
[Demo Public Test] Secondly used attack type is stucked
bug needs testing public-test
## Expected Behavior All attacks can be used in any order. ## Current Behavior After changing attack type, the one which is used in second time is stucked, the first one cannot be used (i.e. it makes no harm) anymore. E.g., if firstly bitten (also more then once), then slapped, then only slap works afterwards. If firstly slapped, then bite is used, then only bite harms afterwards. ## Reproduction Steps Log in (SP or MP), and try attack any prey with Sucho, Spino or Conca (i.e. which has currently secondary attack enabled). ## Evidence (Screenshots & Videos) Bitten (harms), then slapped (harms), then bite doesn't harm anymore: https://www.youtube.com/watch?v=jj2sdX0F1YQ Slapped (harms), then bitten (harms), thereafter slap is not harming anymore: https://www.youtube.com/watch?v=zzxV17PCcSo ## Crash Logs (If Applicable. No logs needed if there is no crash.) ## Build Information **Game Version:** 0.0.0.10043 Operating System & Version: Win10 Education N (1909) Alderon Games ID: 735-756-627
2.0
[Demo Public Test] Secondly used attack type is stucked - ## Expected Behavior All attacks can be used in any order. ## Current Behavior After changing attack type, the one which is used in second time is stucked, the first one cannot be used (i.e. it makes no harm) anymore. E.g., if firstly bitten (also more then once), then slapped, then only slap works afterwards. If firstly slapped, then bite is used, then only bite harms afterwards. ## Reproduction Steps Log in (SP or MP), and try attack any prey with Sucho, Spino or Conca (i.e. which has currently secondary attack enabled). ## Evidence (Screenshots & Videos) Bitten (harms), then slapped (harms), then bite doesn't harm anymore: https://www.youtube.com/watch?v=jj2sdX0F1YQ Slapped (harms), then bitten (harms), thereafter slap is not harming anymore: https://www.youtube.com/watch?v=zzxV17PCcSo ## Crash Logs (If Applicable. No logs needed if there is no crash.) ## Build Information **Game Version:** 0.0.0.10043 Operating System & Version: Win10 Education N (1909) Alderon Games ID: 735-756-627
non_priority
secondly used attack type is stucked expected behavior all attacks can be used in any order current behavior after changing attack type the one which is used in second time is stucked the first one cannot be used i e it makes no harm anymore e g if firstly bitten also more then once then slapped then only slap works afterwards if firstly slapped then bite is used then only bite harms afterwards reproduction steps log in sp or mp and try attack any prey with sucho spino or conca i e which has currently secondary attack enabled evidence screenshots videos bitten harms then slapped harms then bite doesn t harm anymore slapped harms then bitten harms thereafter slap is not harming anymore crash logs if applicable no logs needed if there is no crash build information game version operating system version education n alderon games id
0
56,247
23,730,008,529
IssuesEvent
2022-08-31 00:16:56
dockstore/dockstore
https://api.github.com/repos/dockstore/dockstore
closed
Collections endpoint not indicating verified entries
bug web-service review
**Describe the bug** The collections endpoint indicates verified is false for all entries, even if they are verified. **To Reproduce** 1. ``` curl 'https://dev.dockstore.net/api/organizations/bdcatalyst/collections/TOPMedworkflows/name' -H 'Accept: application/json' | jq '.' ... "entryPath": "github.com/DataBiosphere/topmed-workflows/UM_aligner_wdl", "entryType": "workflow", "id": 5817, "labels": [ "u-of-michigan", "datastage", "topmed", "datacommons" ], "verified": false, ... ``` 2. Go to https://dev.dockstore.net/workflows/github.com/DataBiosphere/topmed-workflows/UM_aligner_wdl:1.32.0?tab=info. See how the entry is verified in the UI (checkmark at the top) **Expected behavior** The API should indicate the entry is verified. This will have the effect of altering the UI as well, as we [display the done icon](https://github.com/dockstore/dockstore-ui2/blob/133fd1b20c6a59a2ee520455b25f454d27cc0103/src/app/organizations/collection/collection.component.html#L143) if verified is true. **Additional context** [Webservice](https://github.com/dockstore/dockstore/commits/6d891ef) - 6d891ef [UI](https://github.com/dockstore/dockstore-ui2/commits/97af6aee) - 2.8.4-107-g97af6aee [Compose Setup](https://github.com/dockstore/compose_setup/commits/5454f4a) - 5454f4a [Deploy](https://github.com/dockstore/dockstore-deploy/commits/b5fc8b9) - 1.11.2-106-gb5fc8b9 galaxyParsingLambdaVersion: 0.0.6 ┆Issue is synchronized with this [Jira Story](https://ucsc-cgl.atlassian.net/browse/DOCK-2027) ┆fixVersions: Dockstore 1.13 ┆friendlyId: DOCK-2027 ┆sprint: 92- T ┆taskType: Story
1.0
Collections endpoint not indicating verified entries - **Describe the bug** The collections endpoint indicates verified is false for all entries, even if they are verified. **To Reproduce** 1. ``` curl 'https://dev.dockstore.net/api/organizations/bdcatalyst/collections/TOPMedworkflows/name' -H 'Accept: application/json' | jq '.' ... "entryPath": "github.com/DataBiosphere/topmed-workflows/UM_aligner_wdl", "entryType": "workflow", "id": 5817, "labels": [ "u-of-michigan", "datastage", "topmed", "datacommons" ], "verified": false, ... ``` 2. Go to https://dev.dockstore.net/workflows/github.com/DataBiosphere/topmed-workflows/UM_aligner_wdl:1.32.0?tab=info. See how the entry is verified in the UI (checkmark at the top) **Expected behavior** The API should indicate the entry is verified. This will have the effect of altering the UI as well, as we [display the done icon](https://github.com/dockstore/dockstore-ui2/blob/133fd1b20c6a59a2ee520455b25f454d27cc0103/src/app/organizations/collection/collection.component.html#L143) if verified is true. **Additional context** [Webservice](https://github.com/dockstore/dockstore/commits/6d891ef) - 6d891ef [UI](https://github.com/dockstore/dockstore-ui2/commits/97af6aee) - 2.8.4-107-g97af6aee [Compose Setup](https://github.com/dockstore/compose_setup/commits/5454f4a) - 5454f4a [Deploy](https://github.com/dockstore/dockstore-deploy/commits/b5fc8b9) - 1.11.2-106-gb5fc8b9 galaxyParsingLambdaVersion: 0.0.6 ┆Issue is synchronized with this [Jira Story](https://ucsc-cgl.atlassian.net/browse/DOCK-2027) ┆fixVersions: Dockstore 1.13 ┆friendlyId: DOCK-2027 ┆sprint: 92- T ┆taskType: Story
non_priority
collections endpoint not indicating verified entries describe the bug the collections endpoint indicates verified is false for all entries even if they are verified to reproduce curl h accept application json jq entrypath github com databiosphere topmed workflows um aligner wdl entrytype workflow id labels u of michigan datastage topmed datacommons verified false go to see how the entry is verified in the ui checkmark at the top expected behavior the api should indicate the entry is verified this will have the effect of altering the ui as well as we if verified is true additional context galaxyparsinglambdaversion ┆issue is synchronized with this ┆fixversions dockstore ┆friendlyid dock ┆sprint t ┆tasktype story
0
11,429
14,248,198,428
IssuesEvent
2020-11-19 12:35:47
tikv/tikv
https://api.github.com/repos/tikv/tikv
closed
UCP: Migrate scalar function `User` from TiDB
challenge-program difficulty/easy sig/coprocessor
## Description Port the scalar function `User` from TiDB to coprocessor. ## Score * 50 ## Mentor(s) * @lonng ## Recommended Skills * Rust programming ## Learning Materials Already implemented expressions ported from TiDB - https://github.com/tikv/tikv/tree/master/components/tidb_query/src/rpn_expr) - https://github.com/tikv/tikv/tree/master/components/tidb_query/src/expr)
1.0
UCP: Migrate scalar function `User` from TiDB - ## Description Port the scalar function `User` from TiDB to coprocessor. ## Score * 50 ## Mentor(s) * @lonng ## Recommended Skills * Rust programming ## Learning Materials Already implemented expressions ported from TiDB - https://github.com/tikv/tikv/tree/master/components/tidb_query/src/rpn_expr) - https://github.com/tikv/tikv/tree/master/components/tidb_query/src/expr)
non_priority
ucp migrate scalar function user from tidb description port the scalar function user from tidb to coprocessor score mentor s lonng recommended skills rust programming learning materials already implemented expressions ported from tidb
0
10,612
13,437,423,364
IssuesEvent
2020-09-07 15:54:28
timberio/vector
https://api.github.com/repos/timberio/vector
opened
Add support for parsing and normalizing time units in the remap sytnax
domain: processing type: feature
With log data, especially after parsing, it's common for numbers to contain units in string format. ## Example For example, this common Elixir log contains time units (`5.4ms`): ``` 17:42:51.469 [info] GET /17:42:51.469 [info] Sent 200 in 5.4ms ``` But the unit can change depending on the duration (`167µs`): ``` 17:42:51.469 [info] GET /17:42:51.469 [info] Sent 200 in 167µs ``` In addition to the changing unit, you'll notice we went from floats to integers. ## Proposal In the same vein that we have `int` and `float` functions, I propose that we add a `duration` function that handles parsing and normalizing. For example, when parsing this log: ``` 17:42:51.469 [info] GET /17:42:51.469 [info] Sent 200 in 5.4ms ``` You'll likely end up with a `duration` (or whatever name they want) field: ```js { // ... "duration": "5.4ms", // ... } ``` And in order parse this into a normalized unit, I would recommend the user use the remap syntax to do the following: ``` .duration_seconds = duration(.duration, "s") del(duration) ``` This would result in: ```js { // ... "duration_seconds": 0.0054, // ... } ``` The `duration` function handles all of the intricacies to normalize any value passed to it to seconds. This means: * Handling unit suffixes. * Converting units between each other. ## Requirements - [ ] Recognize [valid time units](https://en.wikipedia.org/wiki/Orders_of_magnitude_(time)#Less_than_one_second) for our use case: `µs` (microsecond), `ns` (nanosecond), `ms` (millisecond), `s` (second), `m` (minute), `h` (hour), `d` (day). - [ ] Be forgiving with parsing: `10ms` or `10 ms`. - [ ] Convert and normalized units to the specified unit.
1.0
Add support for parsing and normalizing time units in the remap sytnax - With log data, especially after parsing, it's common for numbers to contain units in string format. ## Example For example, this common Elixir log contains time units (`5.4ms`): ``` 17:42:51.469 [info] GET /17:42:51.469 [info] Sent 200 in 5.4ms ``` But the unit can change depending on the duration (`167µs`): ``` 17:42:51.469 [info] GET /17:42:51.469 [info] Sent 200 in 167µs ``` In addition to the changing unit, you'll notice we went from floats to integers. ## Proposal In the same vein that we have `int` and `float` functions, I propose that we add a `duration` function that handles parsing and normalizing. For example, when parsing this log: ``` 17:42:51.469 [info] GET /17:42:51.469 [info] Sent 200 in 5.4ms ``` You'll likely end up with a `duration` (or whatever name they want) field: ```js { // ... "duration": "5.4ms", // ... } ``` And in order parse this into a normalized unit, I would recommend the user use the remap syntax to do the following: ``` .duration_seconds = duration(.duration, "s") del(duration) ``` This would result in: ```js { // ... "duration_seconds": 0.0054, // ... } ``` The `duration` function handles all of the intricacies to normalize any value passed to it to seconds. This means: * Handling unit suffixes. * Converting units between each other. ## Requirements - [ ] Recognize [valid time units](https://en.wikipedia.org/wiki/Orders_of_magnitude_(time)#Less_than_one_second) for our use case: `µs` (microsecond), `ns` (nanosecond), `ms` (millisecond), `s` (second), `m` (minute), `h` (hour), `d` (day). - [ ] Be forgiving with parsing: `10ms` or `10 ms`. - [ ] Convert and normalized units to the specified unit.
non_priority
add support for parsing and normalizing time units in the remap sytnax with log data especially after parsing it s common for numbers to contain units in string format example for example this common elixir log contains time units get sent in but the unit can change depending on the duration get sent in in addition to the changing unit you ll notice we went from floats to integers proposal in the same vein that we have int and float functions i propose that we add a duration function that handles parsing and normalizing for example when parsing this log get sent in you ll likely end up with a duration or whatever name they want field js duration and in order parse this into a normalized unit i would recommend the user use the remap syntax to do the following duration seconds duration duration s del duration this would result in js duration seconds the duration function handles all of the intricacies to normalize any value passed to it to seconds this means handling unit suffixes converting units between each other requirements recognize for our use case µs microsecond ns nanosecond ms millisecond s second m minute h hour d day be forgiving with parsing or ms convert and normalized units to the specified unit
0
154,083
12,192,471,331
IssuesEvent
2020-04-29 13:00:35
WordPress/gutenberg
https://api.github.com/repos/WordPress/gutenberg
closed
v8.0.0-RC1: Image block sits outside of perceived conatiner in editor (Twenty Twenty theme)
Needs Testing [Block] Image
**Describe the bug** In v8.0.0-RC1 and the Twenty Twenty theme enabled, within the editor the image block sits outside of the central 'container' of the page. This issue is related to #21885 and #21911 (but this issue is about when no alignment is set). It looks like this is to do with the change in https://github.com/WordPress/gutenberg/pull/21822 where the wrapper `div` was removed from the Image block in the editor. This change means that the [following styling in the Twenty Twenty theme](https://core.trac.wordpress.org/browser/trunk/src/wp-content/themes/twentytwenty/assets/css/editor-style-block.css#L366) now overrides the margins that should centre the block: ```css .editor-styles-wrapper figure { margin: 0; } ``` Whereas if you disable the plugin, then the wrapper div element is targeted by ``` .edit-post-visual-editor .block-editor-block-list__block { ``` This particular selector was removed in https://github.com/WordPress/gutenberg/pull/20951 at [this line](https://github.com/WordPress/gutenberg/pull/20951/files#diff-947e2eca7278f9a543620b68d7187d09L40). A solution to this issue could be either to fix this in Twenty Twenty, or add back in the div wrapper to the Image block to mitigate the specificity issue. **To reproduce** Steps to reproduce the behavior: 1. Activate the Twenty Twenty theme on your site 2. Add an Image block and select any image and set it to left aligned 3. Instead of the image block being centered within the perceived container of the page, the image is left aligned outside of that 'container'. **Expected behavior** The image block to sit within the perceived 'container' of the page in Twenty Twenty as it does on the front end. **Screenshots** ### Before (WordPress 5.4, plugin disabled) ![image](https://user-images.githubusercontent.com/14988353/80554224-cad01b00-8a0f-11ea-92ef-cf918f8a264d.png) ### After (WordPress 5.4, plugin v8.0.0-RC1 enabled) ![image](https://user-images.githubusercontent.com/14988353/80554182-a3794e00-8a0f-11ea-9a5b-44766e82b967.png) **Editor version (please complete the following information):** - WordPress version: 5.4, Gutenberg v8.0.0-RC1 **Desktop (please complete the following information):** - OS: MacOS - Browser: Chrome 81
1.0
v8.0.0-RC1: Image block sits outside of perceived conatiner in editor (Twenty Twenty theme) - **Describe the bug** In v8.0.0-RC1 and the Twenty Twenty theme enabled, within the editor the image block sits outside of the central 'container' of the page. This issue is related to #21885 and #21911 (but this issue is about when no alignment is set). It looks like this is to do with the change in https://github.com/WordPress/gutenberg/pull/21822 where the wrapper `div` was removed from the Image block in the editor. This change means that the [following styling in the Twenty Twenty theme](https://core.trac.wordpress.org/browser/trunk/src/wp-content/themes/twentytwenty/assets/css/editor-style-block.css#L366) now overrides the margins that should centre the block: ```css .editor-styles-wrapper figure { margin: 0; } ``` Whereas if you disable the plugin, then the wrapper div element is targeted by ``` .edit-post-visual-editor .block-editor-block-list__block { ``` This particular selector was removed in https://github.com/WordPress/gutenberg/pull/20951 at [this line](https://github.com/WordPress/gutenberg/pull/20951/files#diff-947e2eca7278f9a543620b68d7187d09L40). A solution to this issue could be either to fix this in Twenty Twenty, or add back in the div wrapper to the Image block to mitigate the specificity issue. **To reproduce** Steps to reproduce the behavior: 1. Activate the Twenty Twenty theme on your site 2. Add an Image block and select any image and set it to left aligned 3. Instead of the image block being centered within the perceived container of the page, the image is left aligned outside of that 'container'. **Expected behavior** The image block to sit within the perceived 'container' of the page in Twenty Twenty as it does on the front end. **Screenshots** ### Before (WordPress 5.4, plugin disabled) ![image](https://user-images.githubusercontent.com/14988353/80554224-cad01b00-8a0f-11ea-92ef-cf918f8a264d.png) ### After (WordPress 5.4, plugin v8.0.0-RC1 enabled) ![image](https://user-images.githubusercontent.com/14988353/80554182-a3794e00-8a0f-11ea-9a5b-44766e82b967.png) **Editor version (please complete the following information):** - WordPress version: 5.4, Gutenberg v8.0.0-RC1 **Desktop (please complete the following information):** - OS: MacOS - Browser: Chrome 81
non_priority
image block sits outside of perceived conatiner in editor twenty twenty theme describe the bug in and the twenty twenty theme enabled within the editor the image block sits outside of the central container of the page this issue is related to and but this issue is about when no alignment is set it looks like this is to do with the change in where the wrapper div was removed from the image block in the editor this change means that the now overrides the margins that should centre the block css editor styles wrapper figure margin whereas if you disable the plugin then the wrapper div element is targeted by edit post visual editor block editor block list block this particular selector was removed in at a solution to this issue could be either to fix this in twenty twenty or add back in the div wrapper to the image block to mitigate the specificity issue to reproduce steps to reproduce the behavior activate the twenty twenty theme on your site add an image block and select any image and set it to left aligned instead of the image block being centered within the perceived container of the page the image is left aligned outside of that container expected behavior the image block to sit within the perceived container of the page in twenty twenty as it does on the front end screenshots before wordpress plugin disabled after wordpress plugin enabled editor version please complete the following information wordpress version gutenberg desktop please complete the following information os macos browser chrome
0
147,391
13,207,103,124
IssuesEvent
2020-08-14 21:58:13
airctic/mantisshrimp
https://api.github.com/repos/airctic/mantisshrimp
opened
Add an example on backbones usage for Faster RCNN
documentation example request good first issue help wanted
## 📓 New <Tutorial/Example> **Is this a request for a tutorial or for an example?** This is an example on how to use the different backbones that Mantisshrimp offer for the Faster RCNN model **What is the task?** Object detection **Is this example for a specific model?** FasterRCNN **Is this example for a specific dataset?** Either the Raccoon or the Fridge Objects datasets. --- **Don't remove** Main issue for examples: #39
1.0
Add an example on backbones usage for Faster RCNN - ## 📓 New <Tutorial/Example> **Is this a request for a tutorial or for an example?** This is an example on how to use the different backbones that Mantisshrimp offer for the Faster RCNN model **What is the task?** Object detection **Is this example for a specific model?** FasterRCNN **Is this example for a specific dataset?** Either the Raccoon or the Fridge Objects datasets. --- **Don't remove** Main issue for examples: #39
non_priority
add an example on backbones usage for faster rcnn 📓 new is this a request for a tutorial or for an example this is an example on how to use the different backbones that mantisshrimp offer for the faster rcnn model what is the task object detection is this example for a specific model fasterrcnn is this example for a specific dataset either the raccoon or the fridge objects datasets don t remove main issue for examples
0
250,084
21,259,254,121
IssuesEvent
2022-04-13 01:02:10
RamiMustafa/WAF_Sec_Test
https://api.github.com/repos/RamiMustafa/WAF_Sec_Test
opened
Provide guidance for either platform managed keys (PMK) or customer managed keys (CMK), based on security or compliance requirements of this workload
WARP-Import WAF_Sec_Test Security Operational Procedures Configuration & Secrets Management
<a href="https://docs.microsoft.com/azure/security/fundamentals/encryption-models">Provide guidance for either platform managed keys (PMK) or customer managed keys (CMK), based on security or compliance requirements of this workload</a> <p><b>Why Consider This?</b></p> Different approaches can be used by the workload team. Decisions are often driven by security, compliance and specific data classification requirements. Understanding these requirements is important to determine which key types are best suitable (Platform-Managed Keys, Customer-Managed Keys or Bring Your Own Key(BYOK)). <p><b>Context</b></p> <p><b>Suggested Actions</b></p> <p><span>Provide guidance for either platform managed keys (PMK) or customer managed keys (CMK), based on security or compliance requirements of this workload</span></p> <p><b>Learn More</b></p> <p><a href="https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-models" target="_blank"><span>https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-models</span></a><span /></p><p><a href="https://docs.microsoft.com/en-us/azure/compliance" target="_blank"><span>Azure compliance documentation</span></a><span /></p>
1.0
Provide guidance for either platform managed keys (PMK) or customer managed keys (CMK), based on security or compliance requirements of this workload - <a href="https://docs.microsoft.com/azure/security/fundamentals/encryption-models">Provide guidance for either platform managed keys (PMK) or customer managed keys (CMK), based on security or compliance requirements of this workload</a> <p><b>Why Consider This?</b></p> Different approaches can be used by the workload team. Decisions are often driven by security, compliance and specific data classification requirements. Understanding these requirements is important to determine which key types are best suitable (Platform-Managed Keys, Customer-Managed Keys or Bring Your Own Key(BYOK)). <p><b>Context</b></p> <p><b>Suggested Actions</b></p> <p><span>Provide guidance for either platform managed keys (PMK) or customer managed keys (CMK), based on security or compliance requirements of this workload</span></p> <p><b>Learn More</b></p> <p><a href="https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-models" target="_blank"><span>https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-models</span></a><span /></p><p><a href="https://docs.microsoft.com/en-us/azure/compliance" target="_blank"><span>Azure compliance documentation</span></a><span /></p>
non_priority
provide guidance for either platform managed keys pmk or customer managed keys cmk based on security or compliance requirements of this workload why consider this different approaches can be used by the workload team decisions are often driven by security compliance and specific data classification requirements understanding these requirements is important to determine which key types are best suitable platform managed keys customer managed keys or bring your own key byok context suggested actions provide guidance for either platform managed keys pmk or customer managed keys cmk based on security or compliance requirements of this workload learn more azure compliance documentation
0
37,595
6,623,050,181
IssuesEvent
2017-09-22 04:24:22
YaleDecisionNeuro/PsychTaskFramework
https://api.github.com/repos/YaleDecisionNeuro/PsychTaskFramework
closed
Sphinx code documentation
documentation
Doxygen is annoying; [Sphinx](http://www.sphinx-doc.org/en/stable/tutorial.html) with [matlabdomain](https://pypi.python.org/pypi/sphinxcontrib-matlabdomain) seems like a good way to _sort of_ do the standard MathWorks thing while maintaining a good external resource (e.g. with [ReadTheDocs](https://docs.readthedocs.io/en/latest/getting_started.html)). It's a good way to integrate the cookbook (#62) with code details, too.
1.0
Sphinx code documentation - Doxygen is annoying; [Sphinx](http://www.sphinx-doc.org/en/stable/tutorial.html) with [matlabdomain](https://pypi.python.org/pypi/sphinxcontrib-matlabdomain) seems like a good way to _sort of_ do the standard MathWorks thing while maintaining a good external resource (e.g. with [ReadTheDocs](https://docs.readthedocs.io/en/latest/getting_started.html)). It's a good way to integrate the cookbook (#62) with code details, too.
non_priority
sphinx code documentation doxygen is annoying with seems like a good way to sort of do the standard mathworks thing while maintaining a good external resource e g with it s a good way to integrate the cookbook with code details too
0
3,032
8,743,165,896
IssuesEvent
2018-12-12 18:21:57
dotnet/dotnet-api-docs
https://api.github.com/repos/dotnet/dotnet-api-docs
opened
Ensure return values conform to standard pattern
:bookmark_tabs: Information Architecture up-for-grabs
## Ensure return values conform to standard pattern OPS displays return value information as follows: ![image](https://user-images.githubusercontent.com/10886961/49889738-1ff99580-fdf7-11e8-9865-da2d5cd61ec0.png) The only authored content is the description itself, which should describe the return value, optimally without repeating the return type. In many case, the return value description doesn't conform to this pattern. The most egregious violation of it, and one that we should eliminate, is: > "return-type-as-authored-content" > "return value description, usually including return type as well" This duplicates (and sometimes even triples) the return type. We should identify and modify these instances to that they conform to the standard pattern.
1.0
Ensure return values conform to standard pattern - ## Ensure return values conform to standard pattern OPS displays return value information as follows: ![image](https://user-images.githubusercontent.com/10886961/49889738-1ff99580-fdf7-11e8-9865-da2d5cd61ec0.png) The only authored content is the description itself, which should describe the return value, optimally without repeating the return type. In many case, the return value description doesn't conform to this pattern. The most egregious violation of it, and one that we should eliminate, is: > "return-type-as-authored-content" > "return value description, usually including return type as well" This duplicates (and sometimes even triples) the return type. We should identify and modify these instances to that they conform to the standard pattern.
non_priority
ensure return values conform to standard pattern ensure return values conform to standard pattern ops displays return value information as follows the only authored content is the description itself which should describe the return value optimally without repeating the return type in many case the return value description doesn t conform to this pattern the most egregious violation of it and one that we should eliminate is return type as authored content return value description usually including return type as well this duplicates and sometimes even triples the return type we should identify and modify these instances to that they conform to the standard pattern
0
64,301
7,783,414,870
IssuesEvent
2018-06-06 09:49:03
openebs/openebs
https://api.github.com/repos/openebs/openebs
closed
OpenEBS components deployment strategy / tracker
Epic area/maya kind/design solution/dedicated solution/hyperconverged summerhack
This will act as a common placeholder to discuss & debate about deployment, maintenance, upgrade, rollback strategies of various OpenEBS components. We should have clarity to questions like: - Should OpenEBS components rely on systemd ? - Should OpenEBS components run as containers & managed by some tool similar to kubelet ? - Should OpenEBS components runs as containers or standalone binaries & managed by Nomad ? - *Here Nomad is being referred as tool for deployment & management of OpenEBS components* - What happens if container runtime require an upgrade ? - Can multiple versions of container runtime (*e.g. dockerd, rkt engine*) be used across hosts ? - What happens if orchestrator engine requires an upgrade ? - Can multiple versions of orchestrator engine be used across hosts ? ### Alternatively: ```yaml - Can we just use tried & tested tools like Ansible: - https://github.com/openshift/openshift-ansible - https://www.ansible.com/tower - https://github.com/ansible-semaphore/semaphore - https://github.com/purpleidea/mgmt - https://github.com/dmsimard/ara ``` ### Alternative: ```yaml - http://operable.io/ ``` ### References: - https://www.infoq.com/news/2017/02/common-kubernetes-fail-reasons - [Lets find why deployment failed](https://github.com/rosskukulinski/k8s-scripts/blob/master/bin/debug-deployment)
1.0
OpenEBS components deployment strategy / tracker - This will act as a common placeholder to discuss & debate about deployment, maintenance, upgrade, rollback strategies of various OpenEBS components. We should have clarity to questions like: - Should OpenEBS components rely on systemd ? - Should OpenEBS components run as containers & managed by some tool similar to kubelet ? - Should OpenEBS components runs as containers or standalone binaries & managed by Nomad ? - *Here Nomad is being referred as tool for deployment & management of OpenEBS components* - What happens if container runtime require an upgrade ? - Can multiple versions of container runtime (*e.g. dockerd, rkt engine*) be used across hosts ? - What happens if orchestrator engine requires an upgrade ? - Can multiple versions of orchestrator engine be used across hosts ? ### Alternatively: ```yaml - Can we just use tried & tested tools like Ansible: - https://github.com/openshift/openshift-ansible - https://www.ansible.com/tower - https://github.com/ansible-semaphore/semaphore - https://github.com/purpleidea/mgmt - https://github.com/dmsimard/ara ``` ### Alternative: ```yaml - http://operable.io/ ``` ### References: - https://www.infoq.com/news/2017/02/common-kubernetes-fail-reasons - [Lets find why deployment failed](https://github.com/rosskukulinski/k8s-scripts/blob/master/bin/debug-deployment)
non_priority
openebs components deployment strategy tracker this will act as a common placeholder to discuss debate about deployment maintenance upgrade rollback strategies of various openebs components we should have clarity to questions like should openebs components rely on systemd should openebs components run as containers managed by some tool similar to kubelet should openebs components runs as containers or standalone binaries managed by nomad here nomad is being referred as tool for deployment management of openebs components what happens if container runtime require an upgrade can multiple versions of container runtime e g dockerd rkt engine be used across hosts what happens if orchestrator engine requires an upgrade can multiple versions of orchestrator engine be used across hosts alternatively yaml can we just use tried tested tools like ansible alternative yaml references
0
55,004
23,381,167,501
IssuesEvent
2022-08-11 09:35:43
elastic/kibana
https://api.github.com/repos/elastic/kibana
closed
[Reporting] Allow sharing reports to different users in Kibana
enhancement Feature:Reporting loe:week Team:AppServicesSv impact:low Team:Reporting Services EnableJiraSync
**Describe the feature:** Currently (Kibana 7.3.0) users can only see the reports that they created, but it would be great if users can mark reports as 'public' or 'shared' to allow other users to access them. A UI to do this withing Kibana would be ideal but it should be fine if it can be done programmatically by modifying the 'created_by' field to some specific value. **Describe a specific use case for the feature:** Kibana users that need to share generated reports with other users without needing for each to generate their own.
2.0
[Reporting] Allow sharing reports to different users in Kibana - **Describe the feature:** Currently (Kibana 7.3.0) users can only see the reports that they created, but it would be great if users can mark reports as 'public' or 'shared' to allow other users to access them. A UI to do this withing Kibana would be ideal but it should be fine if it can be done programmatically by modifying the 'created_by' field to some specific value. **Describe a specific use case for the feature:** Kibana users that need to share generated reports with other users without needing for each to generate their own.
non_priority
allow sharing reports to different users in kibana describe the feature currently kibana users can only see the reports that they created but it would be great if users can mark reports as public or shared to allow other users to access them a ui to do this withing kibana would be ideal but it should be fine if it can be done programmatically by modifying the created by field to some specific value describe a specific use case for the feature kibana users that need to share generated reports with other users without needing for each to generate their own
0
260,569
27,784,573,414
IssuesEvent
2023-03-17 01:19:03
iworkforthem/ts-screenshot
https://api.github.com/repos/iworkforthem/ts-screenshot
opened
CVE-2023-28155 (Medium) detected in request-2.88.2.tgz
Mend: dependency security vulnerability
## CVE-2023-28155 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>request-2.88.2.tgz</b></p></summary> <p>Simplified HTTP request client.</p> <p>Library home page: <a href="https://registry.npmjs.org/request/-/request-2.88.2.tgz">https://registry.npmjs.org/request/-/request-2.88.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/request/package.json</p> <p> Dependency Hierarchy: - jest-26.6.3.tgz (Root Library) - core-26.6.3.tgz - jest-config-26.6.3.tgz - jest-environment-jsdom-26.6.2.tgz - jsdom-16.4.0.tgz - :x: **request-2.88.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/iworkforthem/ts-screenshot/commit/797a6cdc19b4e999d2f8fcc15cea4b7c6b0fc2e6">797a6cdc19b4e999d2f8fcc15cea4b7c6b0fc2e6</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ** UNSUPPORTED WHEN ASSIGNED ** The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. <p>Publish Date: 2023-03-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-28155>CVE-2023-28155</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2023-28155 (Medium) detected in request-2.88.2.tgz - ## CVE-2023-28155 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>request-2.88.2.tgz</b></p></summary> <p>Simplified HTTP request client.</p> <p>Library home page: <a href="https://registry.npmjs.org/request/-/request-2.88.2.tgz">https://registry.npmjs.org/request/-/request-2.88.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/request/package.json</p> <p> Dependency Hierarchy: - jest-26.6.3.tgz (Root Library) - core-26.6.3.tgz - jest-config-26.6.3.tgz - jest-environment-jsdom-26.6.2.tgz - jsdom-16.4.0.tgz - :x: **request-2.88.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/iworkforthem/ts-screenshot/commit/797a6cdc19b4e999d2f8fcc15cea4b7c6b0fc2e6">797a6cdc19b4e999d2f8fcc15cea4b7c6b0fc2e6</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ** UNSUPPORTED WHEN ASSIGNED ** The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. <p>Publish Date: 2023-03-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-28155>CVE-2023-28155</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in request tgz cve medium severity vulnerability vulnerable library request tgz simplified http request client library home page a href path to dependency file package json path to vulnerable library node modules request package json dependency hierarchy jest tgz root library core tgz jest config tgz jest environment jsdom tgz jsdom tgz x request tgz vulnerable library found in head commit a href found in base branch main vulnerability details unsupported when assigned the request package through for node js allows a bypass of ssrf mitigations via an attacker controller server that does a cross protocol redirect http to https or https to http note this vulnerability only affects products that are no longer supported by the maintainer publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with mend
0
345,043
30,783,108,603
IssuesEvent
2023-07-31 11:26:28
cosmos/ibc-go
https://api.github.com/repos/cosmos/ibc-go
closed
GetValsAtHeight should account for current uncommitted height
testing
<!-- < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < ☺ v ✰ Thanks for opening an issue! ✰ v Before smashing the submit button please review the template. v Word of caution: poorly thought-out proposals may be rejected v without deliberation ☺ > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > --> ## Summary https://github.com/cosmos/ibc-go/commit/57777235f6c1cb33a67de300414b9b824b050f29 `GetValsAtHeight` should account for the current uncommitted height. A comment should be added explaining this reasoning and it should be looked into if we can remove the if statement [here](https://github.com/cosmos/ibc-go/blob/main/testing/chain.go#L428) When the latest committed height == trusted height (happens when testing misbehaviour), this will fail. The validator set associated with a trusted height is the next validator set for that height. When the next height is uncommitted the correct validator set cannot be obtained through historical information and must be returned from the `TestChain` struct Note: the print statement was accidentally committed, it should not be included ____ #### For Admin Use - [ ] Not duplicate issue - [ ] Appropriate labels applied - [ ] Appropriate contributors tagged/assigned
1.0
GetValsAtHeight should account for current uncommitted height - <!-- < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < ☺ v ✰ Thanks for opening an issue! ✰ v Before smashing the submit button please review the template. v Word of caution: poorly thought-out proposals may be rejected v without deliberation ☺ > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > --> ## Summary https://github.com/cosmos/ibc-go/commit/57777235f6c1cb33a67de300414b9b824b050f29 `GetValsAtHeight` should account for the current uncommitted height. A comment should be added explaining this reasoning and it should be looked into if we can remove the if statement [here](https://github.com/cosmos/ibc-go/blob/main/testing/chain.go#L428) When the latest committed height == trusted height (happens when testing misbehaviour), this will fail. The validator set associated with a trusted height is the next validator set for that height. When the next height is uncommitted the correct validator set cannot be obtained through historical information and must be returned from the `TestChain` struct Note: the print statement was accidentally committed, it should not be included ____ #### For Admin Use - [ ] Not duplicate issue - [ ] Appropriate labels applied - [ ] Appropriate contributors tagged/assigned
non_priority
getvalsatheight should account for current uncommitted height ☺ v ✰ thanks for opening an issue ✰ v before smashing the submit button please review the template v word of caution poorly thought out proposals may be rejected v without deliberation ☺ summary getvalsatheight should account for the current uncommitted height a comment should be added explaining this reasoning and it should be looked into if we can remove the if statement when the latest committed height trusted height happens when testing misbehaviour this will fail the validator set associated with a trusted height is the next validator set for that height when the next height is uncommitted the correct validator set cannot be obtained through historical information and must be returned from the testchain struct note the print statement was accidentally committed it should not be included for admin use not duplicate issue appropriate labels applied appropriate contributors tagged assigned
0
34,228
28,808,114,878
IssuesEvent
2023-05-03 00:41:05
grafana/agent
https://api.github.com/repos/grafana/agent
closed
integrations/process_exporter scrape read_bytes_total counter / write_bytes_total counter value always 0
type/infrastructure
hello I use integrations/process_exporter and find out there always 0 in scrape read_bytes_total counter / write_bytes_total counter when I install process-exporter can see value change OS: ubuntu 22.04 agent version: ``` agent, version v0.32.1 (branch: HEAD, revision: f48e41a9) build user: root@ce4f3c31cd6b build date: 2023-03-06T19:07:00Z go version: go1.20 platform: linux/amd64 ``` agent config: ``` server: log_level: warn metrics: global: scrape_interval: 15s external_labels: node_name: 'sample_node' remote_write: - url: https://XXXXX:XXX/api/v1/push tls_config: insecure_skip_verify: true headers: X-Scope-OrgID: prometheus basic_auth: username: "mimirwrite" password: "mimirwrite" wal_directory: '/var/lib/grafana-agent' wal_cleanup_age: "12h" configs: - name: local host_filter: false scrape_configs: - job_name: 'process-exporter' # https://www.rabbitmq.com/prometheus.html static_configs: - targets: ['127.0.0.1:9256'] integrations: agent: enabled: true node_exporter: enabled: true include_exporter_metrics: true process_exporter: enabled: true process_names: - name: "{{.Comm}}" cmdline: - '.+' ``` grafana explore [Imgur](https://imgur.com/AaPYegx)
1.0
integrations/process_exporter scrape read_bytes_total counter / write_bytes_total counter value always 0 - hello I use integrations/process_exporter and find out there always 0 in scrape read_bytes_total counter / write_bytes_total counter when I install process-exporter can see value change OS: ubuntu 22.04 agent version: ``` agent, version v0.32.1 (branch: HEAD, revision: f48e41a9) build user: root@ce4f3c31cd6b build date: 2023-03-06T19:07:00Z go version: go1.20 platform: linux/amd64 ``` agent config: ``` server: log_level: warn metrics: global: scrape_interval: 15s external_labels: node_name: 'sample_node' remote_write: - url: https://XXXXX:XXX/api/v1/push tls_config: insecure_skip_verify: true headers: X-Scope-OrgID: prometheus basic_auth: username: "mimirwrite" password: "mimirwrite" wal_directory: '/var/lib/grafana-agent' wal_cleanup_age: "12h" configs: - name: local host_filter: false scrape_configs: - job_name: 'process-exporter' # https://www.rabbitmq.com/prometheus.html static_configs: - targets: ['127.0.0.1:9256'] integrations: agent: enabled: true node_exporter: enabled: true include_exporter_metrics: true process_exporter: enabled: true process_names: - name: "{{.Comm}}" cmdline: - '.+' ``` grafana explore [Imgur](https://imgur.com/AaPYegx)
non_priority
integrations process exporter scrape read bytes total counter write bytes total counter value always hello i use integrations process exporter and find out there always in scrape read bytes total counter write bytes total counter when i install process exporter can see value change os ubuntu agent version agent version branch head revision build user root build date go version platform linux agent config server log level warn metrics global scrape interval external labels node name sample node remote write url tls config insecure skip verify true headers x scope orgid prometheus basic auth username mimirwrite password mimirwrite wal directory var lib grafana agent wal cleanup age configs name local host filter false scrape configs job name process exporter static configs targets integrations agent enabled true node exporter enabled true include exporter metrics true process exporter enabled true process names name comm cmdline grafana explore
0
183,380
31,394,479,793
IssuesEvent
2023-08-26 19:01:03
activist-org/activist
https://api.github.com/repos/activist-org/activist
closed
Create base MediaVideo component
help wanted good first issue design
### Terms - [X] I have searched [open and closed design issues](https://github.com/activist-org/activist/issues?q=is%3Aissue+label%3Adesign) - [X] I agree to follow activist's [Code of Conduct](https://github.com/activist-org/activist/blob/main/.github/CODE_OF_CONDUCT.md) ### Description This issue would create a baseline file for the `MediaVideo` component that could be used to either show a video on a page or link in to a video call if the event is online. This component is generally defined in the designs with the other [Page Media components](https://www.figma.com/file/I9McFfaLu1RiiWp5IP3YjE/activist_public_designs?type=design&node-id=2673%3A20111&mode=design&t=hJRakNbmbK83mZ9P-1) that are then created in the [components/media](https://github.com/activist-org/activist/tree/main/frontend/components/media) directory :) We do not need a full implementation for this task, but more a component that: - Has a required `link` prop - Is sized similar to other components in the [components/media](https://github.com/activist-org/activist/tree/main/frontend/components/media) directory - Follows coloration as set out in [tailwind.config.ts](https://github.com/activist-org/activist/blob/main/frontend/tailwind.config.ts) Later on we can add to this component where video links would lead to a popover or video links would direct the user to the call. An example of the basis we want for now is: ![Mode=Dark, Mobile=False, Type=Video](https://github.com/activist-org/activist/assets/24387426/f149a3fb-8a5b-4818-8763-3011af743f4f) ### Contribution Happy to support someone on this issue or work on it myself :)
1.0
Create base MediaVideo component - ### Terms - [X] I have searched [open and closed design issues](https://github.com/activist-org/activist/issues?q=is%3Aissue+label%3Adesign) - [X] I agree to follow activist's [Code of Conduct](https://github.com/activist-org/activist/blob/main/.github/CODE_OF_CONDUCT.md) ### Description This issue would create a baseline file for the `MediaVideo` component that could be used to either show a video on a page or link in to a video call if the event is online. This component is generally defined in the designs with the other [Page Media components](https://www.figma.com/file/I9McFfaLu1RiiWp5IP3YjE/activist_public_designs?type=design&node-id=2673%3A20111&mode=design&t=hJRakNbmbK83mZ9P-1) that are then created in the [components/media](https://github.com/activist-org/activist/tree/main/frontend/components/media) directory :) We do not need a full implementation for this task, but more a component that: - Has a required `link` prop - Is sized similar to other components in the [components/media](https://github.com/activist-org/activist/tree/main/frontend/components/media) directory - Follows coloration as set out in [tailwind.config.ts](https://github.com/activist-org/activist/blob/main/frontend/tailwind.config.ts) Later on we can add to this component where video links would lead to a popover or video links would direct the user to the call. An example of the basis we want for now is: ![Mode=Dark, Mobile=False, Type=Video](https://github.com/activist-org/activist/assets/24387426/f149a3fb-8a5b-4818-8763-3011af743f4f) ### Contribution Happy to support someone on this issue or work on it myself :)
non_priority
create base mediavideo component terms i have searched i agree to follow activist s description this issue would create a baseline file for the mediavideo component that could be used to either show a video on a page or link in to a video call if the event is online this component is generally defined in the designs with the other that are then created in the directory we do not need a full implementation for this task but more a component that has a required link prop is sized similar to other components in the directory follows coloration as set out in later on we can add to this component where video links would lead to a popover or video links would direct the user to the call an example of the basis we want for now is contribution happy to support someone on this issue or work on it myself
0
144,290
19,286,134,892
IssuesEvent
2021-12-11 01:45:02
samq-wsdemo/struts-demo
https://api.github.com/repos/samq-wsdemo/struts-demo
opened
WS-2016-7112 (Medium) detected in spring-context-3.0.5.RELEASE.jar
security vulnerability
## WS-2016-7112 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-context-3.0.5.RELEASE.jar</b></p></summary> <p>Spring Framework Parent</p> <p>Path to dependency file: struts-demo/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-context/3.0.5.RELEASE/spring-context-3.0.5.RELEASE.jar,struts-demo/target/struts2-showcase/WEB-INF/lib/spring-context-3.0.5.RELEASE.jar</p> <p> Dependency Hierarchy: - struts2-spring-plugin-2.3.20.jar (Root Library) - :x: **spring-context-3.0.5.RELEASE.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Spring Framework, versions 3.0.0.RELEASE through 3.2.17.RELEASE, 4.0.0.RELEASE through 4.2.7.RELEASE and 4.3.0.RELEASE through 4.3.1.RELEASE are vulnerable to Stack-based Buffer Overflow, which allows an authenticated attacker to crash the application when giving CronSequenceGenerator a reversed range in the “minutes” or “hours” fields. <p>Publish Date: 2021-09-23 <p>URL: <a href=https://github.com/spring-projects/spring-framework/commit/e431624e8472b3b53d1a0c4528bf736c612f1fd9>WS-2016-7112</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/spring-projects/spring-framework/releases/tag/v5.0.0.M1">https://github.com/spring-projects/spring-framework/releases/tag/v5.0.0.M1</a></p> <p>Release Date: 2016-07-14</p> <p>Fix Resolution: org.springframework:spring-context:3.2.18.RELEASE,4.2.8.RELEASE,4.3.2.RELEASE,5.0.0.RELEASE</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.springframework","packageName":"spring-context","packageVersion":"3.0.5.RELEASE","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.apache.struts:struts2-spring-plugin:2.3.20;org.springframework:spring-context:3.0.5.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.springframework:spring-context:3.2.18.RELEASE,4.2.8.RELEASE,4.3.2.RELEASE,5.0.0.RELEASE","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2016-7112","vulnerabilityDetails":"In Spring Framework, versions 3.0.0.RELEASE through 3.2.17.RELEASE, 4.0.0.RELEASE through 4.2.7.RELEASE and 4.3.0.RELEASE through 4.3.1.RELEASE are vulnerable to Stack-based Buffer Overflow, which allows an authenticated attacker to crash the application when giving CronSequenceGenerator a reversed range in the “minutes” or “hours” fields.","vulnerabilityUrl":"https://github.com/spring-projects/spring-framework/commit/e431624e8472b3b53d1a0c4528bf736c612f1fd9","cvss3Severity":"medium","cvss3Score":"4.9","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> -->
True
WS-2016-7112 (Medium) detected in spring-context-3.0.5.RELEASE.jar - ## WS-2016-7112 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-context-3.0.5.RELEASE.jar</b></p></summary> <p>Spring Framework Parent</p> <p>Path to dependency file: struts-demo/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-context/3.0.5.RELEASE/spring-context-3.0.5.RELEASE.jar,struts-demo/target/struts2-showcase/WEB-INF/lib/spring-context-3.0.5.RELEASE.jar</p> <p> Dependency Hierarchy: - struts2-spring-plugin-2.3.20.jar (Root Library) - :x: **spring-context-3.0.5.RELEASE.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Spring Framework, versions 3.0.0.RELEASE through 3.2.17.RELEASE, 4.0.0.RELEASE through 4.2.7.RELEASE and 4.3.0.RELEASE through 4.3.1.RELEASE are vulnerable to Stack-based Buffer Overflow, which allows an authenticated attacker to crash the application when giving CronSequenceGenerator a reversed range in the “minutes” or “hours” fields. <p>Publish Date: 2021-09-23 <p>URL: <a href=https://github.com/spring-projects/spring-framework/commit/e431624e8472b3b53d1a0c4528bf736c612f1fd9>WS-2016-7112</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/spring-projects/spring-framework/releases/tag/v5.0.0.M1">https://github.com/spring-projects/spring-framework/releases/tag/v5.0.0.M1</a></p> <p>Release Date: 2016-07-14</p> <p>Fix Resolution: org.springframework:spring-context:3.2.18.RELEASE,4.2.8.RELEASE,4.3.2.RELEASE,5.0.0.RELEASE</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.springframework","packageName":"spring-context","packageVersion":"3.0.5.RELEASE","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.apache.struts:struts2-spring-plugin:2.3.20;org.springframework:spring-context:3.0.5.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.springframework:spring-context:3.2.18.RELEASE,4.2.8.RELEASE,4.3.2.RELEASE,5.0.0.RELEASE","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2016-7112","vulnerabilityDetails":"In Spring Framework, versions 3.0.0.RELEASE through 3.2.17.RELEASE, 4.0.0.RELEASE through 4.2.7.RELEASE and 4.3.0.RELEASE through 4.3.1.RELEASE are vulnerable to Stack-based Buffer Overflow, which allows an authenticated attacker to crash the application when giving CronSequenceGenerator a reversed range in the “minutes” or “hours” fields.","vulnerabilityUrl":"https://github.com/spring-projects/spring-framework/commit/e431624e8472b3b53d1a0c4528bf736c612f1fd9","cvss3Severity":"medium","cvss3Score":"4.9","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> -->
non_priority
ws medium detected in spring context release jar ws medium severity vulnerability vulnerable library spring context release jar spring framework parent path to dependency file struts demo pom xml path to vulnerable library home wss scanner repository org springframework spring context release spring context release jar struts demo target showcase web inf lib spring context release jar dependency hierarchy spring plugin jar root library x spring context release jar vulnerable library found in base branch master vulnerability details in spring framework versions release through release release through release and release through release are vulnerable to stack based buffer overflow which allows an authenticated attacker to crash the application when giving cronsequencegenerator a reversed range in the “minutes” or “hours” fields publish date url a href cvss score details base score metrics exploitability metrics attack vector n a attack complexity n a privileges required n a user interaction n a scope n a impact metrics confidentiality impact n a integrity impact n a availability impact n a for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring context release release release release isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org apache struts spring plugin org springframework spring context release isminimumfixversionavailable true minimumfixversion org springframework spring context release release release release isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails in spring framework versions release through release release through release and release through release are vulnerable to stack based buffer overflow which allows an authenticated attacker to crash the application when giving cronsequencegenerator a reversed range in the “minutes” or “hours” fields vulnerabilityurl
0
74,987
25,468,743,880
IssuesEvent
2022-11-25 08:11:48
matrix-org/matrix-hookshot
https://api.github.com/repos/matrix-org/matrix-hookshot
opened
Empty admin rooms should be discarded or unused
T-Defect Admin Room S-Minor javascript
If a user leaves their admin room, Hookshot continues to use it for posting URLs generated by `!hookshot webhook`. Since admin rooms are typically invite-only DMs, the user will never be able rejoin the room after leaving it, and will never be able to see those messages. To prevent posting messages in inaccessible admin rooms, Hookshot should either leave empty admin rooms (on startup or in response to the user leaving), or should invite the user back to an admin room when posting a new message in it. My preference is the former, because it prevents Hookshot's room list from slowly growing larger and larger.
1.0
Empty admin rooms should be discarded or unused - If a user leaves their admin room, Hookshot continues to use it for posting URLs generated by `!hookshot webhook`. Since admin rooms are typically invite-only DMs, the user will never be able rejoin the room after leaving it, and will never be able to see those messages. To prevent posting messages in inaccessible admin rooms, Hookshot should either leave empty admin rooms (on startup or in response to the user leaving), or should invite the user back to an admin room when posting a new message in it. My preference is the former, because it prevents Hookshot's room list from slowly growing larger and larger.
non_priority
empty admin rooms should be discarded or unused if a user leaves their admin room hookshot continues to use it for posting urls generated by hookshot webhook since admin rooms are typically invite only dms the user will never be able rejoin the room after leaving it and will never be able to see those messages to prevent posting messages in inaccessible admin rooms hookshot should either leave empty admin rooms on startup or in response to the user leaving or should invite the user back to an admin room when posting a new message in it my preference is the former because it prevents hookshot s room list from slowly growing larger and larger
0
63,468
7,723,338,031
IssuesEvent
2018-05-24 12:10:10
status-im/status-react
https://api.github.com/repos/status-im/status-react
opened
Add indicator of unread messages (navigation bar)
:eyes: design-input-required desktop feature
### User Story As a user, I want to see so that that I have unread messages in app ### Description *Type*: Feature *Summary*: add the red badge of unread messages, like ![unread](https://user-images.githubusercontent.com/4557972/40484398-1ef740a6-5f64-11e8-8177-ce0c100d1262.png) Not implemented in mobile.
1.0
Add indicator of unread messages (navigation bar) - ### User Story As a user, I want to see so that that I have unread messages in app ### Description *Type*: Feature *Summary*: add the red badge of unread messages, like ![unread](https://user-images.githubusercontent.com/4557972/40484398-1ef740a6-5f64-11e8-8177-ce0c100d1262.png) Not implemented in mobile.
non_priority
add indicator of unread messages navigation bar user story as a user i want to see so that that i have unread messages in app description type feature summary add the red badge of unread messages like not implemented in mobile
0
54,163
23,184,402,143
IssuesEvent
2022-08-01 07:03:00
filecoin-project/venus
https://api.github.com/repos/filecoin-project/venus
closed
venus-messager存在内存泄漏问题, 存在持续的内存增长的情况
P2 BU-chain-service
### Checklist - [X] This is **not** a new feature or an enhancement to the Filecoin protocol. If it is, please open an [FIP issue](https://github.com/filecoin-project/FIPs/blob/master/FIPS/fip-0001.md). - [X] This is **not** a new feature request. If it is, please file a [feature request](https://github.com/filecoin-project/venus/issues/new?assignees=&labels=need%2Ftriage%2Ckind%2Ffeature&template=feature_request.yml) instead. - [X] This is **not** brainstorming ideas. If you have an idea you'd like to discuss, please open a new discussion on [the venus forum](https://github.com/filecoin-project/venus/discussions/categories/ideas) and select the category as `Ideas`. - [X] I **have** a specific, actionable, and well motivated improvement to propose. ### Venus component - [ ] venus daemon - [chain service] chain sync - [ ] venus auth - [chain service] authentication - [X] venus messager - [chain service] message management (mpool) - [ ] venus gateway - [chain service] gateway - [ ] venus miner - [chain service] mining and block production - [ ] venus sealer/worker - sealing - [ ] venus sealer - proving (WindowPoSt) - [ ] venus market - storage deal - [ ] venus market - retrieval deal - [ ] venus market - data transfer - [ ] venus light-weight client - [ ] venus JSON-RPC API - [ ] Other ### Improvement Suggestion 当venus-messager运行一段时间后,占用的内存越来越大,且不会主动释放资源,参考下图 <img width="1746" alt="image" src="https://user-images.githubusercontent.com/43364105/176819679-ceeea0cf-8ccf-44e6-b38f-93f8cb3a72aa.png">
1.0
venus-messager存在内存泄漏问题, 存在持续的内存增长的情况 - ### Checklist - [X] This is **not** a new feature or an enhancement to the Filecoin protocol. If it is, please open an [FIP issue](https://github.com/filecoin-project/FIPs/blob/master/FIPS/fip-0001.md). - [X] This is **not** a new feature request. If it is, please file a [feature request](https://github.com/filecoin-project/venus/issues/new?assignees=&labels=need%2Ftriage%2Ckind%2Ffeature&template=feature_request.yml) instead. - [X] This is **not** brainstorming ideas. If you have an idea you'd like to discuss, please open a new discussion on [the venus forum](https://github.com/filecoin-project/venus/discussions/categories/ideas) and select the category as `Ideas`. - [X] I **have** a specific, actionable, and well motivated improvement to propose. ### Venus component - [ ] venus daemon - [chain service] chain sync - [ ] venus auth - [chain service] authentication - [X] venus messager - [chain service] message management (mpool) - [ ] venus gateway - [chain service] gateway - [ ] venus miner - [chain service] mining and block production - [ ] venus sealer/worker - sealing - [ ] venus sealer - proving (WindowPoSt) - [ ] venus market - storage deal - [ ] venus market - retrieval deal - [ ] venus market - data transfer - [ ] venus light-weight client - [ ] venus JSON-RPC API - [ ] Other ### Improvement Suggestion 当venus-messager运行一段时间后,占用的内存越来越大,且不会主动释放资源,参考下图 <img width="1746" alt="image" src="https://user-images.githubusercontent.com/43364105/176819679-ceeea0cf-8ccf-44e6-b38f-93f8cb3a72aa.png">
non_priority
venus messager存在内存泄漏问题, 存在持续的内存增长的情况 checklist this is not a new feature or an enhancement to the filecoin protocol if it is please open an this is not a new feature request if it is please file a instead this is not brainstorming ideas if you have an idea you d like to discuss please open a new discussion on and select the category as ideas i have a specific actionable and well motivated improvement to propose venus component venus daemon chain sync venus auth authentication venus messager message management mpool venus gateway gateway venus miner mining and block production venus sealer worker sealing venus sealer proving windowpost venus market storage deal venus market retrieval deal venus market data transfer venus light weight client venus json rpc api other improvement suggestion 当venus messager运行一段时间后,占用的内存越来越大,且不会主动释放资源,参考下图 img width alt image src
0
70,171
13,434,284,428
IssuesEvent
2020-09-07 11:07:24
Regalis11/Barotrauma
https://api.github.com/repos/Regalis11/Barotrauma
closed
Repeatable outpost event
Bug Code
- [ Yes] I have searched the issue tracker to check if the issue has already been reported. **Description** The 'Bug station crew' outpost event is repeatable and grants full 2k marks reward each time completed. We replicated this 4 times in a row. **Steps To Reproduce** Find a military outpost that grants the above event, complete the event, undock from station and redock, each time you redock the event triggers with the crew chief requested a representative to meet them. **Version** 0.10.4.0 - Windows 10
1.0
Repeatable outpost event - - [ Yes] I have searched the issue tracker to check if the issue has already been reported. **Description** The 'Bug station crew' outpost event is repeatable and grants full 2k marks reward each time completed. We replicated this 4 times in a row. **Steps To Reproduce** Find a military outpost that grants the above event, complete the event, undock from station and redock, each time you redock the event triggers with the crew chief requested a representative to meet them. **Version** 0.10.4.0 - Windows 10
non_priority
repeatable outpost event i have searched the issue tracker to check if the issue has already been reported description the bug station crew outpost event is repeatable and grants full marks reward each time completed we replicated this times in a row steps to reproduce find a military outpost that grants the above event complete the event undock from station and redock each time you redock the event triggers with the crew chief requested a representative to meet them version windows
0
146,198
13,173,620,744
IssuesEvent
2020-08-11 20:40:53
department-of-veterans-affairs/va.gov-team
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
closed
Migrate Sidekiq setup instrux to -sensitive
content-ia-team documentation documentation-support
This doc: https://github.com/department-of-veterans-affairs/vets.gov-team/blob/master/Products/Platform/Vets-API/Sidekiq%20Enterprise%20Setup.md Should be migrated to `va.gov-team-sensitive` And the link to it should be updated here: https://github.com/department-of-veterans-affairs/vets-api/#sidekiq-enterprise
2.0
Migrate Sidekiq setup instrux to -sensitive - This doc: https://github.com/department-of-veterans-affairs/vets.gov-team/blob/master/Products/Platform/Vets-API/Sidekiq%20Enterprise%20Setup.md Should be migrated to `va.gov-team-sensitive` And the link to it should be updated here: https://github.com/department-of-veterans-affairs/vets-api/#sidekiq-enterprise
non_priority
migrate sidekiq setup instrux to sensitive this doc should be migrated to va gov team sensitive and the link to it should be updated here
0
48,220
6,084,080,115
IssuesEvent
2017-06-17 00:24:27
18F/crime-data-explorer
https://api.github.com/repos/18F/crime-data-explorer
closed
Need to make label for agency bar chart dynamic based on data type
bug workflow: design-review
Currently the label for the agency bar chart says the data is derived from NIBRS regardless of the agency's reporting type. The label should update based on what data type that state and or agency reports
1.0
Need to make label for agency bar chart dynamic based on data type - Currently the label for the agency bar chart says the data is derived from NIBRS regardless of the agency's reporting type. The label should update based on what data type that state and or agency reports
non_priority
need to make label for agency bar chart dynamic based on data type currently the label for the agency bar chart says the data is derived from nibrs regardless of the agency s reporting type the label should update based on what data type that state and or agency reports
0
71,127
9,480,252,191
IssuesEvent
2019-04-20 16:12:38
kubernetes/kops
https://api.github.com/repos/kubernetes/kops
closed
Help with creating dns-free cluster
area/documentation good-starter-issue lifecycle/rotten
1. kops version 1.9.1 2. kubectl client version 1.11.0 3. aws 4. I was following the tutorial on how to use kops in aws-china, but in us-west-2 (I just wanted a dns-free cluster). Everything went smooth until I reached the `kops validate cluster` part. 5. ```Using cluster from kubectl context: xxxxxxxxx-example.k8s.local Validating cluster xxxxxxxxx-example.k8s.local unexpected error during validation: error listing nodes: Get https://internal-api-xxxxxxxxx-exam-6vnila-578615394.us-west-2.elb.amazonaws.com/api/v1/nodes: dial tcp xxx.xx.xx.xx:443: i/o timeout ``` 6. I expected everything to work like in the tutorial/ 7. cluster manifest: ```apiVersion: kops/v1alpha2 kind: Cluster metadata: creationTimestamp: 2018-07-05T11:29:14Z name: xxxxxxxxx-example.k8s.local spec: api: loadBalancer: type: Internal authorization: rbac: {} channel: stable cloudProvider: aws configBase: s3://xxxxxxxxx-example-com-state-store/xxxxxxxxx-example.k8s.local etcdClusters: - etcdMembers: - instanceGroup: master-us-west-2a name: a name: main - etcdMembers: - instanceGroup: master-us-west-2a name: a name: events iam: allowContainerRegistry: true legacy: false kubernetesApiAccess: - 0.0.0.0/0 kubernetesVersion: 1.9.6 masterPublicName: api.xxxxxxxxx-example.k8s.local networkCIDR: 172.20.0.0/16 networking: weave: mtu: 8912 nonMasqueradeCIDR: 100.64.0.0/10 sshAccess: - 0.0.0.0/0 subnets: - cidr: 172.20.32.0/19 name: us-west-2a type: Private zone: us-west-2a - cidr: 172.20.0.0/22 name: utility-us-west-2a type: Utility zone: us-west-2a topology: dns: type: Public masters: private nodes: private --- apiVersion: kops/v1alpha2 kind: InstanceGroup metadata: creationTimestamp: 2018-07-05T11:29:15Z labels: kops.k8s.io/cluster: xxxxxxxxx-example.k8s.local name: master-us-west-2a spec: associatePublicIp: false image: kope.io/k8s-1.9-debian-jessie-amd64-hvm-ebs-2018-03-11 machineType: m3.medium maxSize: 1 minSize: 1 nodeLabels: kops.k8s.io/instancegroup: master-us-west-2a role: Master subnets: - us-west-2a --- apiVersion: kops/v1alpha2 kind: InstanceGroup metadata: creationTimestamp: 2018-07-05T11:29:16Z labels: kops.k8s.io/cluster: xxxxxxxxx-example.k8s.local name: nodes spec: associatePublicIp: false image: kope.io/k8s-1.9-debian-jessie-amd64-hvm-ebs-2018-03-11 machineType: t2.medium maxSize: 2 minSize: 2 nodeLabels: kops.k8s.io/instancegroup: nodes role: Node subnets: - us-west-2a```
1.0
Help with creating dns-free cluster - 1. kops version 1.9.1 2. kubectl client version 1.11.0 3. aws 4. I was following the tutorial on how to use kops in aws-china, but in us-west-2 (I just wanted a dns-free cluster). Everything went smooth until I reached the `kops validate cluster` part. 5. ```Using cluster from kubectl context: xxxxxxxxx-example.k8s.local Validating cluster xxxxxxxxx-example.k8s.local unexpected error during validation: error listing nodes: Get https://internal-api-xxxxxxxxx-exam-6vnila-578615394.us-west-2.elb.amazonaws.com/api/v1/nodes: dial tcp xxx.xx.xx.xx:443: i/o timeout ``` 6. I expected everything to work like in the tutorial/ 7. cluster manifest: ```apiVersion: kops/v1alpha2 kind: Cluster metadata: creationTimestamp: 2018-07-05T11:29:14Z name: xxxxxxxxx-example.k8s.local spec: api: loadBalancer: type: Internal authorization: rbac: {} channel: stable cloudProvider: aws configBase: s3://xxxxxxxxx-example-com-state-store/xxxxxxxxx-example.k8s.local etcdClusters: - etcdMembers: - instanceGroup: master-us-west-2a name: a name: main - etcdMembers: - instanceGroup: master-us-west-2a name: a name: events iam: allowContainerRegistry: true legacy: false kubernetesApiAccess: - 0.0.0.0/0 kubernetesVersion: 1.9.6 masterPublicName: api.xxxxxxxxx-example.k8s.local networkCIDR: 172.20.0.0/16 networking: weave: mtu: 8912 nonMasqueradeCIDR: 100.64.0.0/10 sshAccess: - 0.0.0.0/0 subnets: - cidr: 172.20.32.0/19 name: us-west-2a type: Private zone: us-west-2a - cidr: 172.20.0.0/22 name: utility-us-west-2a type: Utility zone: us-west-2a topology: dns: type: Public masters: private nodes: private --- apiVersion: kops/v1alpha2 kind: InstanceGroup metadata: creationTimestamp: 2018-07-05T11:29:15Z labels: kops.k8s.io/cluster: xxxxxxxxx-example.k8s.local name: master-us-west-2a spec: associatePublicIp: false image: kope.io/k8s-1.9-debian-jessie-amd64-hvm-ebs-2018-03-11 machineType: m3.medium maxSize: 1 minSize: 1 nodeLabels: kops.k8s.io/instancegroup: master-us-west-2a role: Master subnets: - us-west-2a --- apiVersion: kops/v1alpha2 kind: InstanceGroup metadata: creationTimestamp: 2018-07-05T11:29:16Z labels: kops.k8s.io/cluster: xxxxxxxxx-example.k8s.local name: nodes spec: associatePublicIp: false image: kope.io/k8s-1.9-debian-jessie-amd64-hvm-ebs-2018-03-11 machineType: t2.medium maxSize: 2 minSize: 2 nodeLabels: kops.k8s.io/instancegroup: nodes role: Node subnets: - us-west-2a```
non_priority
help with creating dns free cluster kops version kubectl client version aws i was following the tutorial on how to use kops in aws china but in us west i just wanted a dns free cluster everything went smooth until i reached the kops validate cluster part using cluster from kubectl context xxxxxxxxx example local validating cluster xxxxxxxxx example local unexpected error during validation error listing nodes get dial tcp xxx xx xx xx i o timeout i expected everything to work like in the tutorial cluster manifest apiversion kops kind cluster metadata creationtimestamp name xxxxxxxxx example local spec api loadbalancer type internal authorization rbac channel stable cloudprovider aws configbase xxxxxxxxx example com state store xxxxxxxxx example local etcdclusters etcdmembers instancegroup master us west name a name main etcdmembers instancegroup master us west name a name events iam allowcontainerregistry true legacy false kubernetesapiaccess kubernetesversion masterpublicname api xxxxxxxxx example local networkcidr networking weave mtu nonmasqueradecidr sshaccess subnets cidr name us west type private zone us west cidr name utility us west type utility zone us west topology dns type public masters private nodes private apiversion kops kind instancegroup metadata creationtimestamp labels kops io cluster xxxxxxxxx example local name master us west spec associatepublicip false image kope io debian jessie hvm ebs machinetype medium maxsize minsize nodelabels kops io instancegroup master us west role master subnets us west apiversion kops kind instancegroup metadata creationtimestamp labels kops io cluster xxxxxxxxx example local name nodes spec associatepublicip false image kope io debian jessie hvm ebs machinetype medium maxsize minsize nodelabels kops io instancegroup nodes role node subnets us west
0
154,459
12,215,184,162
IssuesEvent
2020-05-01 12:12:00
Students-of-the-city-of-Kostroma/trpo_automation
https://api.github.com/repos/Students-of-the-city-of-Kostroma/trpo_automation
closed
Создание экземпляров класса Letter
Sprint 6 Sprint 7 Testing
Доделать экземпляры писем после каждой из функций Создать экземпляры класса Letter для тестирования системы. - 10 экземпляров на вход; - 1-2 экземпляра, прошедшие обработку после каждой функции, заданной глобально;
1.0
Создание экземпляров класса Letter - Доделать экземпляры писем после каждой из функций Создать экземпляры класса Letter для тестирования системы. - 10 экземпляров на вход; - 1-2 экземпляра, прошедшие обработку после каждой функции, заданной глобально;
non_priority
создание экземпляров класса letter доделать экземпляры писем после каждой из функций создать экземпляры класса letter для тестирования системы экземпляров на вход экземпляра прошедшие обработку после каждой функции заданной глобально
0
101,423
12,683,314,471
IssuesEvent
2020-06-19 19:27:04
pythonindia/inpycon2020
https://api.github.com/repos/pythonindia/inpycon2020
closed
Make the website responsive
design dev responsive
There are few areas that clearly needs more attention right now: - [x] Banner section - [x] The dates for devsprint, workshop, etc (might need to adjust the padding and margins) - [x] Navbar cc @aavrug
1.0
Make the website responsive - There are few areas that clearly needs more attention right now: - [x] Banner section - [x] The dates for devsprint, workshop, etc (might need to adjust the padding and margins) - [x] Navbar cc @aavrug
non_priority
make the website responsive there are few areas that clearly needs more attention right now banner section the dates for devsprint workshop etc might need to adjust the padding and margins navbar cc aavrug
0
23,480
3,830,401,655
IssuesEvent
2016-03-31 14:29:07
primefaces/primefaces
https://api.github.com/repos/primefaces/primefaces
closed
NPE in DataTableRenderer when sorting AND grouping is used
defect
The NPE happens only when both sorting AND grouping is used, and when the sorted column actually contains data. See PullRequest #1286 for a fix.
1.0
NPE in DataTableRenderer when sorting AND grouping is used - The NPE happens only when both sorting AND grouping is used, and when the sorted column actually contains data. See PullRequest #1286 for a fix.
non_priority
npe in datatablerenderer when sorting and grouping is used the npe happens only when both sorting and grouping is used and when the sorted column actually contains data see pullrequest for a fix
0
222,486
24,708,979,234
IssuesEvent
2022-10-19 21:54:33
lukebrogan-mend/railsgoat
https://api.github.com/repos/lukebrogan-mend/railsgoat
closed
CVE-2022-23634 (Medium) detected in actionpack-6.0.0.gem - autoclosed
security vulnerability
## CVE-2022-23634 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>actionpack-6.0.0.gem</b></p></summary> <p>Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.</p> <p>Library home page: <a href="https://rubygems.org/gems/actionpack-6.0.0.gem">https://rubygems.org/gems/actionpack-6.0.0.gem</a></p> <p> Dependency Hierarchy: - sassc-rails-2.1.2.gem (Root Library) - railties-6.0.0.gem - :x: **actionpack-6.0.0.gem** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebroganws/railsgoat/commit/d94b554e8b55637d1bbc827a129348c0c2562d12">d94b554e8b55637d1bbc827a129348c0c2562d12</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability. <p>Publish Date: 2022-02-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23634>CVE-2022-23634</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/puma/puma/security/advisories/GHSA-rmj8-8hhh-gv5h,https://github.com/advisories/GHSA-wh98-p28r-vrc9">https://github.com/puma/puma/security/advisories/GHSA-rmj8-8hhh-gv5h,https://github.com/advisories/GHSA-wh98-p28r-vrc9</a></p> <p>Release Date: 2022-02-11</p> <p>Fix Resolution: puma - 4.3.11, 5.6.2; actionpack - 5.2.6.2, 6.0.4.6, 6.1.4.6, 7.0.2.2</p> </p> </details> <p></p>
True
CVE-2022-23634 (Medium) detected in actionpack-6.0.0.gem - autoclosed - ## CVE-2022-23634 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>actionpack-6.0.0.gem</b></p></summary> <p>Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.</p> <p>Library home page: <a href="https://rubygems.org/gems/actionpack-6.0.0.gem">https://rubygems.org/gems/actionpack-6.0.0.gem</a></p> <p> Dependency Hierarchy: - sassc-rails-2.1.2.gem (Root Library) - railties-6.0.0.gem - :x: **actionpack-6.0.0.gem** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebroganws/railsgoat/commit/d94b554e8b55637d1bbc827a129348c0c2562d12">d94b554e8b55637d1bbc827a129348c0c2562d12</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability. <p>Publish Date: 2022-02-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23634>CVE-2022-23634</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/puma/puma/security/advisories/GHSA-rmj8-8hhh-gv5h,https://github.com/advisories/GHSA-wh98-p28r-vrc9">https://github.com/puma/puma/security/advisories/GHSA-rmj8-8hhh-gv5h,https://github.com/advisories/GHSA-wh98-p28r-vrc9</a></p> <p>Release Date: 2022-02-11</p> <p>Fix Resolution: puma - 4.3.11, 5.6.2; actionpack - 5.2.6.2, 6.0.4.6, 6.1.4.6, 7.0.2.2</p> </p> </details> <p></p>
non_priority
cve medium detected in actionpack gem autoclosed cve medium severity vulnerability vulnerable library actionpack gem web apps on rails simple battle tested conventions for building and testing mvc web applications works with any rack compatible server library home page a href dependency hierarchy sassc rails gem root library railties gem x actionpack gem vulnerable library found in head commit a href found in base branch master vulnerability details puma is a ruby rack web server built for parallelism prior to puma version puma may not always call close on the response body rails prior to version depended on the response body being closed in order for its currentattributes implementation to work correctly the combination of these two behaviors puma not closing the body rails executor implementation causes information leakage this problem is fixed in puma versions and this problem is fixed in rails versions and upgrading to a patched rails or puma version fixes the vulnerability publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution puma actionpack
0
6,784
2,860,030,835
IssuesEvent
2015-06-03 14:04:06
davidyell/CakePHP3-Proffer
https://api.github.com/repos/davidyell/CakePHP3-Proffer
closed
Test for multiple uploads on one model
testing
Need to create tests to ensure that you can properly upload more than one file on a single table. Such as, ```php $config = [ 'photo' => [ 'dir' => 'photo_dir', 'thumbnailSizes' => [ 'square' => ['w' => 200, 'h' => 200, 'crop' => true], 'portrait' => ['w' => 100, 'h' => 300], ] ], 'profile_image' => [ 'dir' => 'profile_image_dir', 'thumbnailSizes' => [ 'square' => ['w' => 200, 'h' => 200, 'crop' => true], 'portrait' => ['w' => 100, 'h' => 300], ] ] ] ```
1.0
Test for multiple uploads on one model - Need to create tests to ensure that you can properly upload more than one file on a single table. Such as, ```php $config = [ 'photo' => [ 'dir' => 'photo_dir', 'thumbnailSizes' => [ 'square' => ['w' => 200, 'h' => 200, 'crop' => true], 'portrait' => ['w' => 100, 'h' => 300], ] ], 'profile_image' => [ 'dir' => 'profile_image_dir', 'thumbnailSizes' => [ 'square' => ['w' => 200, 'h' => 200, 'crop' => true], 'portrait' => ['w' => 100, 'h' => 300], ] ] ] ```
non_priority
test for multiple uploads on one model need to create tests to ensure that you can properly upload more than one file on a single table such as php config photo dir photo dir thumbnailsizes square portrait profile image dir profile image dir thumbnailsizes square portrait
0
172,301
21,043,344,112
IssuesEvent
2022-03-31 14:06:19
jgeraigery/dynatrace-service-broker
https://api.github.com/repos/jgeraigery/dynatrace-service-broker
opened
WS-2016-7112 (Medium) detected in spring-context-4.0.8.RELEASE.jar
security vulnerability
## WS-2016-7112 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-context-4.0.8.RELEASE.jar</b></p></summary> <p>Spring Context</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-context/4.0.8.RELEASE/spring-context-4.0.8.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-security-1.1.9.RELEASE.jar (Root Library) - :x: **spring-context-4.0.8.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/dynatrace-service-broker/commit/075c652078643180fb05751cdbc793df371d6844">075c652078643180fb05751cdbc793df371d6844</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Spring Framework, versions 3.0.0.RELEASE through 3.2.17.RELEASE, 4.0.0.RELEASE through 4.2.7.RELEASE and 4.3.0.RELEASE through 4.3.1.RELEASE are vulnerable to Stack-based Buffer Overflow, which allows an authenticated attacker to crash the application when giving CronSequenceGenerator a reversed range in the “minutes” or “hours” fields. <p>Publish Date: 2021-09-23 <p>URL: <a href=https://github.com/spring-projects/spring-framework/commit/e431624e8472b3b53d1a0c4528bf736c612f1fd9>WS-2016-7112</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/spring-projects/spring-framework/releases/tag/v5.0.0.M1">https://github.com/spring-projects/spring-framework/releases/tag/v5.0.0.M1</a></p> <p>Release Date: 2016-07-14</p> <p>Fix Resolution: org.springframework:spring-context:3.2.18.RELEASE,4.2.8.RELEASE,4.3.2.RELEASE,5.0.0.RELEASE</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.springframework","packageName":"spring-context","packageVersion":"4.0.8.RELEASE","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-security:1.1.9.RELEASE;org.springframework:spring-context:4.0.8.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.springframework:spring-context:3.2.18.RELEASE,4.2.8.RELEASE,4.3.2.RELEASE,5.0.0.RELEASE","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2016-7112","vulnerabilityDetails":"In Spring Framework, versions 3.0.0.RELEASE through 3.2.17.RELEASE, 4.0.0.RELEASE through 4.2.7.RELEASE and 4.3.0.RELEASE through 4.3.1.RELEASE are vulnerable to Stack-based Buffer Overflow, which allows an authenticated attacker to crash the application when giving CronSequenceGenerator a reversed range in the “minutes” or “hours” fields.","vulnerabilityUrl":"https://github.com/spring-projects/spring-framework/commit/e431624e8472b3b53d1a0c4528bf736c612f1fd9","cvss3Severity":"medium","cvss3Score":"4.9","cvss3Metrics":{"A":"High","AC":"Low","PR":"High","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
WS-2016-7112 (Medium) detected in spring-context-4.0.8.RELEASE.jar - ## WS-2016-7112 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-context-4.0.8.RELEASE.jar</b></p></summary> <p>Spring Context</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-context/4.0.8.RELEASE/spring-context-4.0.8.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-security-1.1.9.RELEASE.jar (Root Library) - :x: **spring-context-4.0.8.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/dynatrace-service-broker/commit/075c652078643180fb05751cdbc793df371d6844">075c652078643180fb05751cdbc793df371d6844</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Spring Framework, versions 3.0.0.RELEASE through 3.2.17.RELEASE, 4.0.0.RELEASE through 4.2.7.RELEASE and 4.3.0.RELEASE through 4.3.1.RELEASE are vulnerable to Stack-based Buffer Overflow, which allows an authenticated attacker to crash the application when giving CronSequenceGenerator a reversed range in the “minutes” or “hours” fields. <p>Publish Date: 2021-09-23 <p>URL: <a href=https://github.com/spring-projects/spring-framework/commit/e431624e8472b3b53d1a0c4528bf736c612f1fd9>WS-2016-7112</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/spring-projects/spring-framework/releases/tag/v5.0.0.M1">https://github.com/spring-projects/spring-framework/releases/tag/v5.0.0.M1</a></p> <p>Release Date: 2016-07-14</p> <p>Fix Resolution: org.springframework:spring-context:3.2.18.RELEASE,4.2.8.RELEASE,4.3.2.RELEASE,5.0.0.RELEASE</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.springframework","packageName":"spring-context","packageVersion":"4.0.8.RELEASE","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-security:1.1.9.RELEASE;org.springframework:spring-context:4.0.8.RELEASE","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.springframework:spring-context:3.2.18.RELEASE,4.2.8.RELEASE,4.3.2.RELEASE,5.0.0.RELEASE","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2016-7112","vulnerabilityDetails":"In Spring Framework, versions 3.0.0.RELEASE through 3.2.17.RELEASE, 4.0.0.RELEASE through 4.2.7.RELEASE and 4.3.0.RELEASE through 4.3.1.RELEASE are vulnerable to Stack-based Buffer Overflow, which allows an authenticated attacker to crash the application when giving CronSequenceGenerator a reversed range in the “minutes” or “hours” fields.","vulnerabilityUrl":"https://github.com/spring-projects/spring-framework/commit/e431624e8472b3b53d1a0c4528bf736c612f1fd9","cvss3Severity":"medium","cvss3Score":"4.9","cvss3Metrics":{"A":"High","AC":"Low","PR":"High","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
ws medium detected in spring context release jar ws medium severity vulnerability vulnerable library spring context release jar spring context library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org springframework spring context release spring context release jar dependency hierarchy spring boot starter security release jar root library x spring context release jar vulnerable library found in head commit a href found in base branch master vulnerability details in spring framework versions release through release release through release and release through release are vulnerable to stack based buffer overflow which allows an authenticated attacker to crash the application when giving cronsequencegenerator a reversed range in the “minutes” or “hours” fields publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring context release release release release isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org springframework boot spring boot starter security release org springframework spring context release isminimumfixversionavailable true minimumfixversion org springframework spring context release release release release isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails in spring framework versions release through release release through release and release through release are vulnerable to stack based buffer overflow which allows an authenticated attacker to crash the application when giving cronsequencegenerator a reversed range in the “minutes” or “hours” fields vulnerabilityurl
0
41,917
10,824,823,972
IssuesEvent
2019-11-09 12:02:51
dpa99c/cordova-plugin-firebasex
https://api.github.com/repos/dpa99c/cordova-plugin-firebasex
closed
Cannot install plugin - Failed to install 'cordova-plugin-firebasex': undefined
build issue documentation investigate ios
# Bug report **Current behavior:** Fails on installation **Expected behavior:** Should install sucsessfully **Steps to reproduce:** cordova plugin add cordova-plugin-firebasex@6.0.6 **Environment information** <!-- Please supply full details of your development environment including: --> - Cordova CLI version - `9.0.0 (cordova-lib@9.0.1)` - Cordova platform version - `ios 5.0.0` - Plugins & versions installed in project (including this plugin) - `cordova-plugin-add-swift-support 2.0.2 "AddSwiftSupport" cordova-plugin-advanced-http 2.1.1 "Advanced HTTP plugin" cordova-plugin-androidx 1.0.2 "cordova-plugin-androidx" cordova-plugin-androidx-adapter 1.1.0 "cordova-plugin-androidx-adapter" cordova-plugin-camera 4.1.0 "Camera" cordova-plugin-chooser 1.2.5 "Chooser" cordova-plugin-crop 0.3.1 "CropPlugin" cordova-plugin-device 2.0.3 "Device" cordova-plugin-file 6.0.2 "File" cordova-plugin-file-transfer 1.7.1 "File Transfer" cordova-plugin-filepath 1.5.6 "cordova-plugin-filepath" cordova-plugin-firebasex 6.0.6 "Google Firebase Plugin" cordova-plugin-ionic-keyboard 2.1.3 "cordova-plugin-ionic-keyboard" cordova-plugin-ionic-webview 3.1.2 "cordova-plugin-ionic-webview" cordova-plugin-nativestorage 2.3.2 "NativeStorage" cordova-plugin-splashscreen 5.0.3 "Splashscreen" cordova-plugin-statusbar 2.4.3 "StatusBar" cordova-plugin-whitelist 1.3.4 "Whitelist"` - Dev machine OS and version, e.g. - OSX - `ProductName: Mac OS X ProductVersion: 10.14.6 BuildVersion: 18G87` **Console output** <details> <summary>Installing "cordova-plugin-firebasex" for ios Installing "cordova-plugin-androidx" for ios Installing "cordova-plugin-androidx-adapter" for ios Failed to install 'cordova-plugin-firebasex': undefined CordovaError: Promise rejected with non-error: 'Version should contain only numbers and dots' at cli.catch.err (/usr/local/lib/node_modules/cordova/bin/cordova:29:15) at process._tickCallback (internal/process/next_tick.js:68:7) [ERROR] An error occurred while running subprocess cordova.</summary> ```
1.0
Cannot install plugin - Failed to install 'cordova-plugin-firebasex': undefined - # Bug report **Current behavior:** Fails on installation **Expected behavior:** Should install sucsessfully **Steps to reproduce:** cordova plugin add cordova-plugin-firebasex@6.0.6 **Environment information** <!-- Please supply full details of your development environment including: --> - Cordova CLI version - `9.0.0 (cordova-lib@9.0.1)` - Cordova platform version - `ios 5.0.0` - Plugins & versions installed in project (including this plugin) - `cordova-plugin-add-swift-support 2.0.2 "AddSwiftSupport" cordova-plugin-advanced-http 2.1.1 "Advanced HTTP plugin" cordova-plugin-androidx 1.0.2 "cordova-plugin-androidx" cordova-plugin-androidx-adapter 1.1.0 "cordova-plugin-androidx-adapter" cordova-plugin-camera 4.1.0 "Camera" cordova-plugin-chooser 1.2.5 "Chooser" cordova-plugin-crop 0.3.1 "CropPlugin" cordova-plugin-device 2.0.3 "Device" cordova-plugin-file 6.0.2 "File" cordova-plugin-file-transfer 1.7.1 "File Transfer" cordova-plugin-filepath 1.5.6 "cordova-plugin-filepath" cordova-plugin-firebasex 6.0.6 "Google Firebase Plugin" cordova-plugin-ionic-keyboard 2.1.3 "cordova-plugin-ionic-keyboard" cordova-plugin-ionic-webview 3.1.2 "cordova-plugin-ionic-webview" cordova-plugin-nativestorage 2.3.2 "NativeStorage" cordova-plugin-splashscreen 5.0.3 "Splashscreen" cordova-plugin-statusbar 2.4.3 "StatusBar" cordova-plugin-whitelist 1.3.4 "Whitelist"` - Dev machine OS and version, e.g. - OSX - `ProductName: Mac OS X ProductVersion: 10.14.6 BuildVersion: 18G87` **Console output** <details> <summary>Installing "cordova-plugin-firebasex" for ios Installing "cordova-plugin-androidx" for ios Installing "cordova-plugin-androidx-adapter" for ios Failed to install 'cordova-plugin-firebasex': undefined CordovaError: Promise rejected with non-error: 'Version should contain only numbers and dots' at cli.catch.err (/usr/local/lib/node_modules/cordova/bin/cordova:29:15) at process._tickCallback (internal/process/next_tick.js:68:7) [ERROR] An error occurred while running subprocess cordova.</summary> ```
non_priority
cannot install plugin failed to install cordova plugin firebasex undefined bug report current behavior fails on installation expected behavior should install sucsessfully steps to reproduce cordova plugin add cordova plugin firebasex environment information cordova cli version cordova lib cordova platform version ios plugins versions installed in project including this plugin cordova plugin add swift support addswiftsupport cordova plugin advanced http advanced http plugin cordova plugin androidx cordova plugin androidx cordova plugin androidx adapter cordova plugin androidx adapter cordova plugin camera camera cordova plugin chooser chooser cordova plugin crop cropplugin cordova plugin device device cordova plugin file file cordova plugin file transfer file transfer cordova plugin filepath cordova plugin filepath cordova plugin firebasex google firebase plugin cordova plugin ionic keyboard cordova plugin ionic keyboard cordova plugin ionic webview cordova plugin ionic webview cordova plugin nativestorage nativestorage cordova plugin splashscreen splashscreen cordova plugin statusbar statusbar cordova plugin whitelist whitelist dev machine os and version e g osx productname mac os x productversion buildversion console output installing cordova plugin firebasex for ios installing cordova plugin androidx for ios installing cordova plugin androidx adapter for ios failed to install cordova plugin firebasex undefined cordovaerror promise rejected with non error version should contain only numbers and dots at cli catch err usr local lib node modules cordova bin cordova at process tickcallback internal process next tick js an error occurred while running subprocess cordova
0
16,571
22,612,229,776
IssuesEvent
2022-06-29 18:14:26
uqfoundation/pyina
https://api.github.com/repos/uqfoundation/pyina
opened
remove dead code blocks from unsupported python versions
compatibility
Can remove dead code blocks for python < 3.7.
True
remove dead code blocks from unsupported python versions - Can remove dead code blocks for python < 3.7.
non_priority
remove dead code blocks from unsupported python versions can remove dead code blocks for python
0
89,051
8,188,579,311
IssuesEvent
2018-08-30 02:44:32
rtfd/readthedocs.org
https://api.github.com/repos/rtfd/readthedocs.org
closed
Add better tests for regex file search
Needed: tests
We fixed the regex search issue in #4584, test coverage is still required though. The PR was hotfixed in.
1.0
Add better tests for regex file search - We fixed the regex search issue in #4584, test coverage is still required though. The PR was hotfixed in.
non_priority
add better tests for regex file search we fixed the regex search issue in test coverage is still required though the pr was hotfixed in
0
283,865
21,335,785,055
IssuesEvent
2022-04-18 14:25:17
ifgi/optimetaPortal
https://api.github.com/repos/ifgi/optimetaPortal
opened
OpenAPI docs for the API
documentation enhancement
Possible starting point: https://dev.to/errietta/documenting-a-django-api-with-openapi-and-dataclasses-1p6h OpenAPI docs should be automatically generated from the code and served at `/docs`.
1.0
OpenAPI docs for the API - Possible starting point: https://dev.to/errietta/documenting-a-django-api-with-openapi-and-dataclasses-1p6h OpenAPI docs should be automatically generated from the code and served at `/docs`.
non_priority
openapi docs for the api possible starting point openapi docs should be automatically generated from the code and served at docs
0
282,374
21,315,485,240
IssuesEvent
2022-04-16 07:38:01
AAlghrairy/pe
https://api.github.com/repos/AAlghrairy/pe
opened
Inaccurate information about resetting passwords
type.DocumentationBug severity.Medium
The User guide has the following diagram in the Getting Started section: ![image.png](https://raw.githubusercontent.com/AAlghrairy/pe/main/files/30f30edc-cb9b-40eb-a3ae-83a5ce951ee4.png) However, the FAQ states that you cannot reset passwords: ![image.png](https://raw.githubusercontent.com/AAlghrairy/pe/main/files/f46f92d9-7f7b-488b-bb7c-4f50b039bb71.png) <!--session: 1650088430122-d7db7cda-41bb-4a35-974d-cbeb28fb6dc7--> <!--Version: Web v3.4.2-->
1.0
Inaccurate information about resetting passwords - The User guide has the following diagram in the Getting Started section: ![image.png](https://raw.githubusercontent.com/AAlghrairy/pe/main/files/30f30edc-cb9b-40eb-a3ae-83a5ce951ee4.png) However, the FAQ states that you cannot reset passwords: ![image.png](https://raw.githubusercontent.com/AAlghrairy/pe/main/files/f46f92d9-7f7b-488b-bb7c-4f50b039bb71.png) <!--session: 1650088430122-d7db7cda-41bb-4a35-974d-cbeb28fb6dc7--> <!--Version: Web v3.4.2-->
non_priority
inaccurate information about resetting passwords the user guide has the following diagram in the getting started section however the faq states that you cannot reset passwords
0
252,668
21,609,531,884
IssuesEvent
2022-05-04 08:39:54
hzi-braunschweig/SORMAS-Project
https://api.github.com/repos/hzi-braunschweig/SORMAS-Project
opened
Fix failing regression e2e testcases
testing task e2e-tests
<!-- If you've never submitted an issue to the SORMAS repository before or this is your first time using this template, please read the Contributing guidelines (https://github.com/hzi-braunschweig/SORMAS-Project/blob/development/docs/CONTRIBUTING.md) for an explanation of the information we need you to provide. You don't have to remove this comment or any other comment from this issue as they will automatically be hidden. --> **Tests that have a success rate of 25% or lower and need fixing** - Check reference definition for cases - fails at the same step - Fill the case person tab - fails at the same step - Refine the update mechanism between case outcome and person other cause date - fails at different step every time flaky test - Check checkboxes filters on Case directory page for DE specific - fails at the same step - Testing bulk edit of Events - fails at the same step - Test Inactive Destrict Feauture for Travel Entries - fails at the same step - Edit existent person - fails at the same step
2.0
Fix failing regression e2e testcases - <!-- If you've never submitted an issue to the SORMAS repository before or this is your first time using this template, please read the Contributing guidelines (https://github.com/hzi-braunschweig/SORMAS-Project/blob/development/docs/CONTRIBUTING.md) for an explanation of the information we need you to provide. You don't have to remove this comment or any other comment from this issue as they will automatically be hidden. --> **Tests that have a success rate of 25% or lower and need fixing** - Check reference definition for cases - fails at the same step - Fill the case person tab - fails at the same step - Refine the update mechanism between case outcome and person other cause date - fails at different step every time flaky test - Check checkboxes filters on Case directory page for DE specific - fails at the same step - Testing bulk edit of Events - fails at the same step - Test Inactive Destrict Feauture for Travel Entries - fails at the same step - Edit existent person - fails at the same step
non_priority
fix failing regression testcases if you ve never submitted an issue to the sormas repository before or this is your first time using this template please read the contributing guidelines for an explanation of the information we need you to provide you don t have to remove this comment or any other comment from this issue as they will automatically be hidden tests that have a success rate of or lower and need fixing check reference definition for cases fails at the same step fill the case person tab fails at the same step refine the update mechanism between case outcome and person other cause date fails at different step every time flaky test check checkboxes filters on case directory page for de specific fails at the same step testing bulk edit of events fails at the same step test inactive destrict feauture for travel entries fails at the same step edit existent person fails at the same step
0
172,936
21,083,976,668
IssuesEvent
2022-04-03 10:29:48
AlexRogalskiy/java-patterns
https://api.github.com/repos/AlexRogalskiy/java-patterns
opened
CVE-2018-1000620 (High) detected in cryptiles-2.0.5.tgz
security vulnerability
## CVE-2018-1000620 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cryptiles-2.0.5.tgz</b></p></summary> <p>General purpose crypto utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/hawk/node_modules/cryptiles/package.json,/node_modules/npmi/node_modules/npm/node_modules/request/node_modules/hawk/node_modules/cryptiles/package.json</p> <p> Dependency Hierarchy: - gitbook-cli-2.3.2.tgz (Root Library) - npm-5.1.0.tgz - request-2.81.0.tgz - hawk-3.1.3.tgz - :x: **cryptiles-2.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/java-patterns/commit/293ab07ba323c57f39a3e1d9c3bc0f2e7ecf9e11">293ab07ba323c57f39a3e1d9c3bc0f2e7ecf9e11</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2. <p>Publish Date: 2018-07-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000620>CVE-2018-1000620</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620</a></p> <p>Release Date: 2018-07-09</p> <p>Fix Resolution: v4.1.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-1000620 (High) detected in cryptiles-2.0.5.tgz - ## CVE-2018-1000620 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cryptiles-2.0.5.tgz</b></p></summary> <p>General purpose crypto utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/hawk/node_modules/cryptiles/package.json,/node_modules/npmi/node_modules/npm/node_modules/request/node_modules/hawk/node_modules/cryptiles/package.json</p> <p> Dependency Hierarchy: - gitbook-cli-2.3.2.tgz (Root Library) - npm-5.1.0.tgz - request-2.81.0.tgz - hawk-3.1.3.tgz - :x: **cryptiles-2.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/java-patterns/commit/293ab07ba323c57f39a3e1d9c3bc0f2e7ecf9e11">293ab07ba323c57f39a3e1d9c3bc0f2e7ecf9e11</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2. <p>Publish Date: 2018-07-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000620>CVE-2018-1000620</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620</a></p> <p>Release Date: 2018-07-09</p> <p>Fix Resolution: v4.1.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in cryptiles tgz cve high severity vulnerability vulnerable library cryptiles tgz general purpose crypto utilities library home page a href path to dependency file package json path to vulnerable library node modules npm node modules request node modules hawk node modules cryptiles package json node modules npmi node modules npm node modules request node modules hawk node modules cryptiles package json dependency hierarchy gitbook cli tgz root library npm tgz request tgz hawk tgz x cryptiles tgz vulnerable library found in head commit a href found in base branch master vulnerability details eran hammer cryptiles version earlier contains a cwe insufficient entropy vulnerability in randomdigits method that can result in an attacker is more likely to be able to brute force something that was supposed to be random this attack appear to be exploitable via depends upon the calling application this vulnerability appears to have been fixed in publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
114,941
14,666,652,880
IssuesEvent
2020-12-29 16:46:03
dotnet/aspnetcore
https://api.github.com/repos/dotnet/aspnetcore
opened
UriHelper.BuildAbsolute: opportunity for performance improvement
design-proposal
## Summary `UriHelper.BuildAbsolute` creates an intermediary string for the combined path that is used only for concatenating with the other components to create the final URL. It also uses a non-pooled `StringBuilder` that is instantiated on every invocation. Although optimized in size, it is a heap allocation with an intermediary buffer. ```csharp public static string BuildAbsolute( string scheme, HostString host, PathString pathBase = new PathString(), PathString path = new PathString(), QueryString query = new QueryString(), FragmentString fragment = new FragmentString()) { if (scheme == null) { throw new ArgumentNullException(nameof(scheme)); } var combinedPath = (pathBase.HasValue || path.HasValue) ? (pathBase + path).ToString() : "/"; var encodedHost = host.ToString(); var encodedQuery = query.ToString(); var encodedFragment = fragment.ToString(); // PERF: Calculate string length to allocate correct buffer size for StringBuilder. var length = scheme.Length + SchemeDelimiter.Length + encodedHost.Length + combinedPath.Length + encodedQuery.Length + encodedFragment.Length; return new StringBuilder(length) .Append(scheme) .Append(SchemeDelimiter) .Append(encodedHost) .Append(combinedPath) .Append(encodedQuery) .Append(encodedFragment) .ToString(); } ``` ## Motivation and goals This method is frequently use in hot paths like redirect and rewrite rules. # Detailed design ## StringBuilder_WithoutCombinedPathGeneration Just by not generating the intermediary `combinePath`, there are memory usage improvements in the when the number of components is highier. There are also time improvements in those cases, but it's wrost in the other cases. ## String_Concat_WithArrayArgument Given that the final URL is composed of more than 4 parts, the use of `string.Concat` incurs in an array allocation. But it still always performs better in terms of time and memory usage that using a `StringBuilder`. ## String_Create `string.Create` excels here in comparison to all the other options. It was created exactly for these use cases. # Benchmarks ``` ini BenchmarkDotNet=v0.12.1, OS=Windows 10.0.21277 Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R), 1 CPU, 8 logical and 4 physical cores .NET Core SDK=5.0.200-preview.20614.14 [Host] : .NET Core 5.0.1 (CoreCLR 5.0.120.57516, CoreFX 5.0.120.57516), X64 RyuJIT DefaultJob : .NET Core 5.0.1 (CoreCLR 5.0.120.57516, CoreFX 5.0.120.57516), X64 RyuJIT ``` | Method | host | pathBase | path | query | fragment | Mean | Error | StdDev | Median | Ratio | RatioSD | Gen 0 | Gen 1 | Gen 2 | Allocated | |-------------------------------------------- |----------------- |----------- |-------------------- |------------------------------------------- |---------- |---------:|---------:|---------:|---------:|------:|--------:|-------:|------:|------:|----------:| | **UriHelper_BuildRelative** | **cname.domain.tld** | | | | | **201.1 ns** | **9.05 ns** | **25.52 ns** | **191.8 ns** | **1.00** | **0.00** | **0.0477** | **-** | **-** | **200 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | | | | 189.3 ns | 5.81 ns | 15.91 ns | 188.4 ns | 0.96 | 0.16 | 0.0477 | - | - | 200 B | | String_Concat_WithArrayArgument | cname.domain.tld | | | | | 142.8 ns | 2.91 ns | 4.70 ns | 141.6 ns | 0.74 | 0.10 | 0.0381 | - | - | 160 B | | String_Create | cname.domain.tld | | | | | 129.9 ns | 3.74 ns | 10.96 ns | 129.0 ns | 0.66 | 0.10 | 0.0172 | - | - | 72 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | | | **#fragment** | **170.9 ns** | **4.67 ns** | **13.54 ns** | **168.8 ns** | **1.00** | **0.00** | **0.0572** | **-** | **-** | **240 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | | | #fragment | 181.8 ns | 6.66 ns | 19.22 ns | 179.5 ns | 1.07 | 0.15 | 0.0572 | - | - | 240 B | | String_Concat_WithArrayArgument | cname.domain.tld | | | | #fragment | 151.2 ns | 3.09 ns | 4.24 ns | 150.2 ns | 0.86 | 0.08 | 0.0420 | - | - | 176 B | | String_Create | cname.domain.tld | | | | #fragment | 111.3 ns | 2.26 ns | 2.32 ns | 111.2 ns | 0.65 | 0.05 | 0.0229 | - | - | 96 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | | **?param1=value1&amp;param2=value2&amp;param3=value3** | | **236.3 ns** | **3.59 ns** | **3.35 ns** | **235.6 ns** | **1.00** | **0.00** | **0.0877** | **-** | **-** | **368 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 247.0 ns | 5.05 ns | 4.72 ns | 247.5 ns | 1.05 | 0.03 | 0.0877 | - | - | 368 B | | String_Concat_WithArrayArgument | cname.domain.tld | | | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 227.2 ns | 4.64 ns | 9.47 ns | 225.7 ns | 0.99 | 0.04 | 0.0572 | - | - | 240 B | | String_Create | cname.domain.tld | | | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 189.4 ns | 3.90 ns | 8.22 ns | 185.9 ns | 0.82 | 0.04 | 0.0381 | - | - | 160 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | | **?param1=value1&amp;param2=value2&amp;param3=value3** | **#fragment** | **246.6 ns** | **5.04 ns** | **8.15 ns** | **244.2 ns** | **1.00** | **0.00** | **0.0954** | **-** | **-** | **400 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 252.3 ns | 5.12 ns | 10.35 ns | 250.2 ns | 1.03 | 0.06 | 0.0954 | - | - | 400 B | | String_Concat_WithArrayArgument | cname.domain.tld | | | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 224.9 ns | 2.22 ns | 1.74 ns | 225.3 ns | 0.92 | 0.03 | 0.0610 | - | - | 256 B | | String_Create | cname.domain.tld | | | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 192.0 ns | 3.62 ns | 5.08 ns | 192.2 ns | 0.78 | 0.04 | 0.0420 | - | - | 176 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | **/path/one/two/three** | | | **309.4 ns** | **3.35 ns** | **2.97 ns** | **309.7 ns** | **1.00** | **0.00** | **0.0648** | **-** | **-** | **272 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | /path/one/two/three | | | 321.7 ns | 4.44 ns | 3.93 ns | 321.1 ns | 1.04 | 0.01 | 0.0648 | - | - | 272 B | | String_Concat_WithArrayArgument | cname.domain.tld | | /path/one/two/three | | | 300.6 ns | 5.86 ns | 12.74 ns | 296.0 ns | 1.01 | 0.04 | 0.0477 | - | - | 200 B | | String_Create | cname.domain.tld | | /path/one/two/three | | | 247.0 ns | 5.06 ns | 7.25 ns | 244.7 ns | 0.81 | 0.03 | 0.0267 | - | - | 112 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | **/path/one/two/three** | | **#fragment** | **319.5 ns** | **4.68 ns** | **4.15 ns** | **318.9 ns** | **1.00** | **0.00** | **0.0725** | **-** | **-** | **304 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | /path/one/two/three | | #fragment | 307.3 ns | 4.89 ns | 4.58 ns | 306.4 ns | 0.96 | 0.02 | 0.0725 | - | - | 304 B | | String_Concat_WithArrayArgument | cname.domain.tld | | /path/one/two/three | | #fragment | 302.8 ns | 6.11 ns | 8.77 ns | 300.1 ns | 0.95 | 0.04 | 0.0515 | - | - | 216 B | | String_Create | cname.domain.tld | | /path/one/two/three | | #fragment | 253.0 ns | 5.12 ns | 8.13 ns | 251.5 ns | 0.79 | 0.03 | 0.0305 | - | - | 128 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | **/path/one/two/three** | **?param1=value1&amp;param2=value2&amp;param3=value3** | | **421.7 ns** | **8.49 ns** | **15.09 ns** | **418.3 ns** | **1.00** | **0.00** | **0.1049** | **-** | **-** | **440 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 395.9 ns | 4.71 ns | 4.18 ns | 395.1 ns | 0.94 | 0.02 | 0.1049 | - | - | 440 B | | String_Concat_WithArrayArgument | cname.domain.tld | | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 372.2 ns | 6.86 ns | 5.73 ns | 370.3 ns | 0.88 | 0.03 | 0.0687 | - | - | 288 B | | String_Create | cname.domain.tld | | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 325.6 ns | 6.51 ns | 6.69 ns | 323.5 ns | 0.78 | 0.02 | 0.0458 | - | - | 192 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | **/path/one/two/three** | **?param1=value1&amp;param2=value2&amp;param3=value3** | **#fragment** | **396.1 ns** | **7.65 ns** | **7.16 ns** | **395.3 ns** | **1.00** | **0.00** | **0.1144** | **-** | **-** | **480 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 394.3 ns | 3.10 ns | 2.42 ns | 393.8 ns | 0.99 | 0.02 | 0.1144 | - | - | 480 B | | String_Concat_WithArrayArgument | cname.domain.tld | | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 377.6 ns | 4.22 ns | 3.74 ns | 377.8 ns | 0.95 | 0.02 | 0.0725 | - | - | 304 B | | String_Create | cname.domain.tld | | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 329.2 ns | 6.29 ns | 6.46 ns | 327.9 ns | 0.83 | 0.02 | 0.0515 | - | - | 216 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | | | | **241.0 ns** | **2.40 ns** | **2.25 ns** | **241.4 ns** | **1.00** | **0.00** | **0.0572** | **-** | **-** | **240 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | | | | 245.4 ns | 4.99 ns | 4.66 ns | 245.3 ns | 1.02 | 0.02 | 0.0572 | - | - | 240 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | | | | 215.0 ns | 2.70 ns | 2.11 ns | 214.9 ns | 0.89 | 0.01 | 0.0439 | - | - | 184 B | | String_Create | cname.domain.tld | /base-path | | | | 164.7 ns | 1.27 ns | 1.19 ns | 164.8 ns | 0.68 | 0.01 | 0.0229 | - | - | 96 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | | | **#fragment** | **243.2 ns** | **4.56 ns** | **11.85 ns** | **240.1 ns** | **1.00** | **0.00** | **0.0648** | **-** | **-** | **272 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | | | #fragment | 236.3 ns | 4.75 ns | 6.66 ns | 234.3 ns | 0.96 | 0.05 | 0.0648 | - | - | 272 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | | | #fragment | 233.3 ns | 3.86 ns | 3.22 ns | 233.0 ns | 0.95 | 0.05 | 0.0477 | - | - | 200 B | | String_Create | cname.domain.tld | /base-path | | | #fragment | 171.6 ns | 2.93 ns | 2.88 ns | 170.8 ns | 0.70 | 0.04 | 0.0267 | - | - | 112 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | | **?param1=value1&amp;param2=value2&amp;param3=value3** | | **324.3 ns** | **6.38 ns** | **7.59 ns** | **322.2 ns** | **1.00** | **0.00** | **0.0954** | **-** | **-** | **400 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 324.8 ns | 6.06 ns | 5.37 ns | 323.4 ns | 1.00 | 0.03 | 0.0954 | - | - | 400 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 298.9 ns | 5.48 ns | 4.58 ns | 298.2 ns | 0.92 | 0.03 | 0.0629 | - | - | 264 B | | String_Create | cname.domain.tld | /base-path | | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 252.5 ns | 5.12 ns | 8.26 ns | 250.9 ns | 0.78 | 0.03 | 0.0420 | - | - | 176 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | | **?param1=value1&amp;param2=value2&amp;param3=value3** | **#fragment** | **319.1 ns** | **4.57 ns** | **4.06 ns** | **318.7 ns** | **1.00** | **0.00** | **0.1049** | **-** | **-** | **440 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 320.0 ns | 4.47 ns | 4.18 ns | 319.2 ns | 1.00 | 0.02 | 0.1049 | - | - | 440 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 320.8 ns | 6.39 ns | 11.19 ns | 315.0 ns | 1.02 | 0.05 | 0.0687 | - | - | 288 B | | String_Create | cname.domain.tld | /base-path | | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 249.8 ns | 5.07 ns | 5.21 ns | 250.2 ns | 0.78 | 0.02 | 0.0458 | - | - | 192 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | **/path/one/two/three** | | | **421.9 ns** | **6.69 ns** | **6.25 ns** | **419.6 ns** | **1.00** | **0.00** | **0.0935** | **-** | **-** | **392 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | /path/one/two/three | | | 389.2 ns | 6.62 ns | 7.08 ns | 387.0 ns | 0.92 | 0.02 | 0.0744 | - | - | 312 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | /path/one/two/three | | | 362.6 ns | 6.17 ns | 6.85 ns | 361.0 ns | 0.86 | 0.02 | 0.0534 | - | - | 224 B | | String_Create | cname.domain.tld | /base-path | /path/one/two/three | | | 318.4 ns | 6.41 ns | 8.56 ns | 315.5 ns | 0.76 | 0.03 | 0.0305 | - | - | 128 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | **/path/one/two/three** | | **#fragment** | **412.6 ns** | **4.19 ns** | **3.72 ns** | **412.5 ns** | **1.00** | **0.00** | **0.1030** | **-** | **-** | **432 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | /path/one/two/three | | #fragment | 390.0 ns | 7.68 ns | 18.84 ns | 381.2 ns | 0.94 | 0.04 | 0.0839 | - | - | 352 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | /path/one/two/three | | #fragment | 360.9 ns | 5.15 ns | 4.30 ns | 359.0 ns | 0.87 | 0.01 | 0.0572 | - | - | 240 B | | String_Create | cname.domain.tld | /base-path | /path/one/two/three | | #fragment | 322.3 ns | 5.97 ns | 5.30 ns | 320.7 ns | 0.78 | 0.01 | 0.0362 | - | - | 152 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | **/path/one/two/three** | **?param1=value1&amp;param2=value2&amp;param3=value3** | | **488.9 ns** | **6.15 ns** | **5.75 ns** | **490.3 ns** | **1.00** | **0.00** | **0.1335** | **-** | **-** | **560 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 476.3 ns | 9.62 ns | 15.81 ns | 470.6 ns | 0.98 | 0.04 | 0.1144 | - | - | 480 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 439.7 ns | 7.73 ns | 7.23 ns | 438.8 ns | 0.90 | 0.02 | 0.0725 | - | - | 304 B | | String_Create | cname.domain.tld | /base-path | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 396.9 ns | 7.76 ns | 7.62 ns | 393.0 ns | 0.81 | 0.02 | 0.0515 | - | - | 216 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | **/path/one/two/three** | **?param1=value1&amp;param2=value2&amp;param3=value3** | **#fragment** | **496.5 ns** | **9.76 ns** | **13.68 ns** | **494.4 ns** | **1.00** | **0.00** | **0.1411** | **-** | **-** | **592 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 525.1 ns | 16.74 ns | 49.10 ns | 517.1 ns | 1.01 | 0.08 | 0.1221 | - | - | 512 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 449.7 ns | 8.55 ns | 9.50 ns | 447.6 ns | 0.90 | 0.03 | 0.0763 | - | - | 320 B | | String_Create | cname.domain.tld | /base-path | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 398.3 ns | 6.32 ns | 5.60 ns | 397.2 ns | 0.79 | 0.02 | 0.0553 | - | - | 232 B | ## Code ```csharp [MemoryDiagnoser] public class BuildAbsoluteBenchmark { public IEnumerable<object[]> Data() => TestData.HostPathBasePathQueryFragment(); [Benchmark(Baseline = true)] [ArgumentsSource(nameof(Data))] public string UriHelper_BuildRelative(HostString host, PathString pathBase, PathString path, QueryString query, FragmentString fragment) => UriHelper.BuildAbsolute("https", host, pathBase, path, query, fragment); [Benchmark] [ArgumentsSource(nameof(Data))] public string StringBuilder_WithoutCombinedPathGeneration(HostString host, PathString pathBase, PathString path, QueryString query, FragmentString fragment) { var scheme = "https"; var SchemeDelimiter = Uri.SchemeDelimiter; var encodedHost = host.ToUriComponent(); var encodedPathBase = pathBase.ToUriComponent(); var encodedPath = path.ToUriComponent(); var encodedQuery = query.ToUriComponent(); var encodedFragment = fragment.ToUriComponent(); // PERF: Calculate string length to allocate correct buffer size for StringBuilder. var length = scheme.Length + SchemeDelimiter.Length + encodedHost.Length + encodedPathBase.Length + encodedPath.Length + encodedQuery.Length + encodedFragment.Length; if (!pathBase.HasValue && !path.HasValue) { length++; } var builder = new StringBuilder(length) .Append(scheme) .Append(SchemeDelimiter) .Append(encodedHost); if (!pathBase.HasValue && !path.HasValue) { builder.Append("/"); } else { builder .Append(encodedPathBase) .Append(encodedPath); } return builder .Append(encodedQuery) .Append(encodedFragment) .ToString(); } [Benchmark] [ArgumentsSource(nameof(Data))] public string String_Concat_WithArrayArgument(HostString host, PathString pathBase, PathString path, QueryString query, FragmentString fragment) { var scheme = "https"; var SchemeDelimiter = Uri.SchemeDelimiter; if (!pathBase.HasValue && !path.HasValue) { return scheme + SchemeDelimiter + "/" + host.ToUriComponent() + "/" + query.ToUriComponent() + fragment.ToUriComponent(); } else { return scheme + SchemeDelimiter + pathBase.ToUriComponent() + path.ToUriComponent() + host.ToUriComponent() + "/" + query.ToUriComponent() + fragment.ToUriComponent(); } } private static readonly SpanAction<char, (string scheme, string host, string pathBase, string path, string query, string fragment)> InitializeStringAction = new(InitializeString); [Benchmark] [ArgumentsSource(nameof(Data))] public string String_Create(HostString host, PathString pathBase, PathString path, QueryString query, FragmentString fragment) { var uriParts = ( scheme: "https", host: host.ToUriComponent(), pathBase: pathBase.ToUriComponent(), path: path.ToUriComponent(), query: query.ToUriComponent(), fragment: fragment.ToUriComponent()); // PERF: Calculate string length to allocate correct buffer size for StringBuilder. var length = uriParts.scheme.Length + Uri.SchemeDelimiter.Length + uriParts.host.Length + uriParts.pathBase.Length + uriParts.path.Length + uriParts.query.Length + uriParts.fragment.Length; if (!pathBase.HasValue && !path.HasValue) { uriParts.path = "/"; length++; } return string.Create(length, uriParts, InitializeStringAction); } private static void InitializeString(Span<char> buffer, (string scheme, string host, string pathBase, string path, string query, string fragment) uriParts) { var index = 0; index = Copy(buffer, index, uriParts.scheme); index = Copy(buffer, index, Uri.SchemeDelimiter); index = Copy(buffer, index, uriParts.host); index = Copy(buffer, index, uriParts.pathBase); index = Copy(buffer, index, uriParts.path); index = Copy(buffer, index, uriParts.query); _ = Copy(buffer, index, uriParts.fragment); [MethodImpl(MethodImplOptions.AggressiveInlining)] static int Copy(Span<char> buffer, int index, string text) { if (!string.IsNullOrEmpty(text)) { var span = text.AsSpan(); span.CopyTo(buffer.Slice(index, span.Length)); return index + span.Length; } return index; } } } public static class TestData { private static readonly string[] hosts = new[] { "cname.domain.tld" }; private static readonly string[] basePaths = new[] { "", "/base-path", }; private static readonly string[] paths = new[] { "", "/path/one/two/three", }; private static readonly string[] queries = new[] { "", "?param1=value1&param2=value2&param3=value3", }; private static readonly string[] fragments = new[] { "", "#fragment", }; public static IEnumerable<object[]> HostPathBasePathQueryFragment() { foreach (var host in hosts) { foreach (var basePath in basePaths) { foreach (var path in paths) { foreach (var query in queries) { foreach (var fragment in fragments) { yield return new object[] { new HostString(host), new PathString(basePath), new PathString(path), new QueryString(query), new FragmentString(fragment), }; } } } } } } } ```
1.0
UriHelper.BuildAbsolute: opportunity for performance improvement - ## Summary `UriHelper.BuildAbsolute` creates an intermediary string for the combined path that is used only for concatenating with the other components to create the final URL. It also uses a non-pooled `StringBuilder` that is instantiated on every invocation. Although optimized in size, it is a heap allocation with an intermediary buffer. ```csharp public static string BuildAbsolute( string scheme, HostString host, PathString pathBase = new PathString(), PathString path = new PathString(), QueryString query = new QueryString(), FragmentString fragment = new FragmentString()) { if (scheme == null) { throw new ArgumentNullException(nameof(scheme)); } var combinedPath = (pathBase.HasValue || path.HasValue) ? (pathBase + path).ToString() : "/"; var encodedHost = host.ToString(); var encodedQuery = query.ToString(); var encodedFragment = fragment.ToString(); // PERF: Calculate string length to allocate correct buffer size for StringBuilder. var length = scheme.Length + SchemeDelimiter.Length + encodedHost.Length + combinedPath.Length + encodedQuery.Length + encodedFragment.Length; return new StringBuilder(length) .Append(scheme) .Append(SchemeDelimiter) .Append(encodedHost) .Append(combinedPath) .Append(encodedQuery) .Append(encodedFragment) .ToString(); } ``` ## Motivation and goals This method is frequently use in hot paths like redirect and rewrite rules. # Detailed design ## StringBuilder_WithoutCombinedPathGeneration Just by not generating the intermediary `combinePath`, there are memory usage improvements in the when the number of components is highier. There are also time improvements in those cases, but it's wrost in the other cases. ## String_Concat_WithArrayArgument Given that the final URL is composed of more than 4 parts, the use of `string.Concat` incurs in an array allocation. But it still always performs better in terms of time and memory usage that using a `StringBuilder`. ## String_Create `string.Create` excels here in comparison to all the other options. It was created exactly for these use cases. # Benchmarks ``` ini BenchmarkDotNet=v0.12.1, OS=Windows 10.0.21277 Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R), 1 CPU, 8 logical and 4 physical cores .NET Core SDK=5.0.200-preview.20614.14 [Host] : .NET Core 5.0.1 (CoreCLR 5.0.120.57516, CoreFX 5.0.120.57516), X64 RyuJIT DefaultJob : .NET Core 5.0.1 (CoreCLR 5.0.120.57516, CoreFX 5.0.120.57516), X64 RyuJIT ``` | Method | host | pathBase | path | query | fragment | Mean | Error | StdDev | Median | Ratio | RatioSD | Gen 0 | Gen 1 | Gen 2 | Allocated | |-------------------------------------------- |----------------- |----------- |-------------------- |------------------------------------------- |---------- |---------:|---------:|---------:|---------:|------:|--------:|-------:|------:|------:|----------:| | **UriHelper_BuildRelative** | **cname.domain.tld** | | | | | **201.1 ns** | **9.05 ns** | **25.52 ns** | **191.8 ns** | **1.00** | **0.00** | **0.0477** | **-** | **-** | **200 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | | | | 189.3 ns | 5.81 ns | 15.91 ns | 188.4 ns | 0.96 | 0.16 | 0.0477 | - | - | 200 B | | String_Concat_WithArrayArgument | cname.domain.tld | | | | | 142.8 ns | 2.91 ns | 4.70 ns | 141.6 ns | 0.74 | 0.10 | 0.0381 | - | - | 160 B | | String_Create | cname.domain.tld | | | | | 129.9 ns | 3.74 ns | 10.96 ns | 129.0 ns | 0.66 | 0.10 | 0.0172 | - | - | 72 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | | | **#fragment** | **170.9 ns** | **4.67 ns** | **13.54 ns** | **168.8 ns** | **1.00** | **0.00** | **0.0572** | **-** | **-** | **240 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | | | #fragment | 181.8 ns | 6.66 ns | 19.22 ns | 179.5 ns | 1.07 | 0.15 | 0.0572 | - | - | 240 B | | String_Concat_WithArrayArgument | cname.domain.tld | | | | #fragment | 151.2 ns | 3.09 ns | 4.24 ns | 150.2 ns | 0.86 | 0.08 | 0.0420 | - | - | 176 B | | String_Create | cname.domain.tld | | | | #fragment | 111.3 ns | 2.26 ns | 2.32 ns | 111.2 ns | 0.65 | 0.05 | 0.0229 | - | - | 96 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | | **?param1=value1&amp;param2=value2&amp;param3=value3** | | **236.3 ns** | **3.59 ns** | **3.35 ns** | **235.6 ns** | **1.00** | **0.00** | **0.0877** | **-** | **-** | **368 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 247.0 ns | 5.05 ns | 4.72 ns | 247.5 ns | 1.05 | 0.03 | 0.0877 | - | - | 368 B | | String_Concat_WithArrayArgument | cname.domain.tld | | | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 227.2 ns | 4.64 ns | 9.47 ns | 225.7 ns | 0.99 | 0.04 | 0.0572 | - | - | 240 B | | String_Create | cname.domain.tld | | | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 189.4 ns | 3.90 ns | 8.22 ns | 185.9 ns | 0.82 | 0.04 | 0.0381 | - | - | 160 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | | **?param1=value1&amp;param2=value2&amp;param3=value3** | **#fragment** | **246.6 ns** | **5.04 ns** | **8.15 ns** | **244.2 ns** | **1.00** | **0.00** | **0.0954** | **-** | **-** | **400 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 252.3 ns | 5.12 ns | 10.35 ns | 250.2 ns | 1.03 | 0.06 | 0.0954 | - | - | 400 B | | String_Concat_WithArrayArgument | cname.domain.tld | | | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 224.9 ns | 2.22 ns | 1.74 ns | 225.3 ns | 0.92 | 0.03 | 0.0610 | - | - | 256 B | | String_Create | cname.domain.tld | | | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 192.0 ns | 3.62 ns | 5.08 ns | 192.2 ns | 0.78 | 0.04 | 0.0420 | - | - | 176 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | **/path/one/two/three** | | | **309.4 ns** | **3.35 ns** | **2.97 ns** | **309.7 ns** | **1.00** | **0.00** | **0.0648** | **-** | **-** | **272 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | /path/one/two/three | | | 321.7 ns | 4.44 ns | 3.93 ns | 321.1 ns | 1.04 | 0.01 | 0.0648 | - | - | 272 B | | String_Concat_WithArrayArgument | cname.domain.tld | | /path/one/two/three | | | 300.6 ns | 5.86 ns | 12.74 ns | 296.0 ns | 1.01 | 0.04 | 0.0477 | - | - | 200 B | | String_Create | cname.domain.tld | | /path/one/two/three | | | 247.0 ns | 5.06 ns | 7.25 ns | 244.7 ns | 0.81 | 0.03 | 0.0267 | - | - | 112 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | **/path/one/two/three** | | **#fragment** | **319.5 ns** | **4.68 ns** | **4.15 ns** | **318.9 ns** | **1.00** | **0.00** | **0.0725** | **-** | **-** | **304 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | /path/one/two/three | | #fragment | 307.3 ns | 4.89 ns | 4.58 ns | 306.4 ns | 0.96 | 0.02 | 0.0725 | - | - | 304 B | | String_Concat_WithArrayArgument | cname.domain.tld | | /path/one/two/three | | #fragment | 302.8 ns | 6.11 ns | 8.77 ns | 300.1 ns | 0.95 | 0.04 | 0.0515 | - | - | 216 B | | String_Create | cname.domain.tld | | /path/one/two/three | | #fragment | 253.0 ns | 5.12 ns | 8.13 ns | 251.5 ns | 0.79 | 0.03 | 0.0305 | - | - | 128 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | **/path/one/two/three** | **?param1=value1&amp;param2=value2&amp;param3=value3** | | **421.7 ns** | **8.49 ns** | **15.09 ns** | **418.3 ns** | **1.00** | **0.00** | **0.1049** | **-** | **-** | **440 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 395.9 ns | 4.71 ns | 4.18 ns | 395.1 ns | 0.94 | 0.02 | 0.1049 | - | - | 440 B | | String_Concat_WithArrayArgument | cname.domain.tld | | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 372.2 ns | 6.86 ns | 5.73 ns | 370.3 ns | 0.88 | 0.03 | 0.0687 | - | - | 288 B | | String_Create | cname.domain.tld | | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 325.6 ns | 6.51 ns | 6.69 ns | 323.5 ns | 0.78 | 0.02 | 0.0458 | - | - | 192 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | | **/path/one/two/three** | **?param1=value1&amp;param2=value2&amp;param3=value3** | **#fragment** | **396.1 ns** | **7.65 ns** | **7.16 ns** | **395.3 ns** | **1.00** | **0.00** | **0.1144** | **-** | **-** | **480 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 394.3 ns | 3.10 ns | 2.42 ns | 393.8 ns | 0.99 | 0.02 | 0.1144 | - | - | 480 B | | String_Concat_WithArrayArgument | cname.domain.tld | | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 377.6 ns | 4.22 ns | 3.74 ns | 377.8 ns | 0.95 | 0.02 | 0.0725 | - | - | 304 B | | String_Create | cname.domain.tld | | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 329.2 ns | 6.29 ns | 6.46 ns | 327.9 ns | 0.83 | 0.02 | 0.0515 | - | - | 216 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | | | | **241.0 ns** | **2.40 ns** | **2.25 ns** | **241.4 ns** | **1.00** | **0.00** | **0.0572** | **-** | **-** | **240 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | | | | 245.4 ns | 4.99 ns | 4.66 ns | 245.3 ns | 1.02 | 0.02 | 0.0572 | - | - | 240 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | | | | 215.0 ns | 2.70 ns | 2.11 ns | 214.9 ns | 0.89 | 0.01 | 0.0439 | - | - | 184 B | | String_Create | cname.domain.tld | /base-path | | | | 164.7 ns | 1.27 ns | 1.19 ns | 164.8 ns | 0.68 | 0.01 | 0.0229 | - | - | 96 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | | | **#fragment** | **243.2 ns** | **4.56 ns** | **11.85 ns** | **240.1 ns** | **1.00** | **0.00** | **0.0648** | **-** | **-** | **272 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | | | #fragment | 236.3 ns | 4.75 ns | 6.66 ns | 234.3 ns | 0.96 | 0.05 | 0.0648 | - | - | 272 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | | | #fragment | 233.3 ns | 3.86 ns | 3.22 ns | 233.0 ns | 0.95 | 0.05 | 0.0477 | - | - | 200 B | | String_Create | cname.domain.tld | /base-path | | | #fragment | 171.6 ns | 2.93 ns | 2.88 ns | 170.8 ns | 0.70 | 0.04 | 0.0267 | - | - | 112 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | | **?param1=value1&amp;param2=value2&amp;param3=value3** | | **324.3 ns** | **6.38 ns** | **7.59 ns** | **322.2 ns** | **1.00** | **0.00** | **0.0954** | **-** | **-** | **400 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 324.8 ns | 6.06 ns | 5.37 ns | 323.4 ns | 1.00 | 0.03 | 0.0954 | - | - | 400 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 298.9 ns | 5.48 ns | 4.58 ns | 298.2 ns | 0.92 | 0.03 | 0.0629 | - | - | 264 B | | String_Create | cname.domain.tld | /base-path | | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 252.5 ns | 5.12 ns | 8.26 ns | 250.9 ns | 0.78 | 0.03 | 0.0420 | - | - | 176 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | | **?param1=value1&amp;param2=value2&amp;param3=value3** | **#fragment** | **319.1 ns** | **4.57 ns** | **4.06 ns** | **318.7 ns** | **1.00** | **0.00** | **0.1049** | **-** | **-** | **440 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 320.0 ns | 4.47 ns | 4.18 ns | 319.2 ns | 1.00 | 0.02 | 0.1049 | - | - | 440 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 320.8 ns | 6.39 ns | 11.19 ns | 315.0 ns | 1.02 | 0.05 | 0.0687 | - | - | 288 B | | String_Create | cname.domain.tld | /base-path | | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 249.8 ns | 5.07 ns | 5.21 ns | 250.2 ns | 0.78 | 0.02 | 0.0458 | - | - | 192 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | **/path/one/two/three** | | | **421.9 ns** | **6.69 ns** | **6.25 ns** | **419.6 ns** | **1.00** | **0.00** | **0.0935** | **-** | **-** | **392 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | /path/one/two/three | | | 389.2 ns | 6.62 ns | 7.08 ns | 387.0 ns | 0.92 | 0.02 | 0.0744 | - | - | 312 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | /path/one/two/three | | | 362.6 ns | 6.17 ns | 6.85 ns | 361.0 ns | 0.86 | 0.02 | 0.0534 | - | - | 224 B | | String_Create | cname.domain.tld | /base-path | /path/one/two/three | | | 318.4 ns | 6.41 ns | 8.56 ns | 315.5 ns | 0.76 | 0.03 | 0.0305 | - | - | 128 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | **/path/one/two/three** | | **#fragment** | **412.6 ns** | **4.19 ns** | **3.72 ns** | **412.5 ns** | **1.00** | **0.00** | **0.1030** | **-** | **-** | **432 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | /path/one/two/three | | #fragment | 390.0 ns | 7.68 ns | 18.84 ns | 381.2 ns | 0.94 | 0.04 | 0.0839 | - | - | 352 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | /path/one/two/three | | #fragment | 360.9 ns | 5.15 ns | 4.30 ns | 359.0 ns | 0.87 | 0.01 | 0.0572 | - | - | 240 B | | String_Create | cname.domain.tld | /base-path | /path/one/two/three | | #fragment | 322.3 ns | 5.97 ns | 5.30 ns | 320.7 ns | 0.78 | 0.01 | 0.0362 | - | - | 152 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | **/path/one/two/three** | **?param1=value1&amp;param2=value2&amp;param3=value3** | | **488.9 ns** | **6.15 ns** | **5.75 ns** | **490.3 ns** | **1.00** | **0.00** | **0.1335** | **-** | **-** | **560 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 476.3 ns | 9.62 ns | 15.81 ns | 470.6 ns | 0.98 | 0.04 | 0.1144 | - | - | 480 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 439.7 ns | 7.73 ns | 7.23 ns | 438.8 ns | 0.90 | 0.02 | 0.0725 | - | - | 304 B | | String_Create | cname.domain.tld | /base-path | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | | 396.9 ns | 7.76 ns | 7.62 ns | 393.0 ns | 0.81 | 0.02 | 0.0515 | - | - | 216 B | | | | | | | | | | | | | | | | | | | **UriHelper_BuildRelative** | **cname.domain.tld** | **/base-path** | **/path/one/two/three** | **?param1=value1&amp;param2=value2&amp;param3=value3** | **#fragment** | **496.5 ns** | **9.76 ns** | **13.68 ns** | **494.4 ns** | **1.00** | **0.00** | **0.1411** | **-** | **-** | **592 B** | | StringBuilder_WithoutCombinedPathGeneration | cname.domain.tld | /base-path | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 525.1 ns | 16.74 ns | 49.10 ns | 517.1 ns | 1.01 | 0.08 | 0.1221 | - | - | 512 B | | String_Concat_WithArrayArgument | cname.domain.tld | /base-path | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 449.7 ns | 8.55 ns | 9.50 ns | 447.6 ns | 0.90 | 0.03 | 0.0763 | - | - | 320 B | | String_Create | cname.domain.tld | /base-path | /path/one/two/three | ?param1=value1&amp;param2=value2&amp;param3=value3 | #fragment | 398.3 ns | 6.32 ns | 5.60 ns | 397.2 ns | 0.79 | 0.02 | 0.0553 | - | - | 232 B | ## Code ```csharp [MemoryDiagnoser] public class BuildAbsoluteBenchmark { public IEnumerable<object[]> Data() => TestData.HostPathBasePathQueryFragment(); [Benchmark(Baseline = true)] [ArgumentsSource(nameof(Data))] public string UriHelper_BuildRelative(HostString host, PathString pathBase, PathString path, QueryString query, FragmentString fragment) => UriHelper.BuildAbsolute("https", host, pathBase, path, query, fragment); [Benchmark] [ArgumentsSource(nameof(Data))] public string StringBuilder_WithoutCombinedPathGeneration(HostString host, PathString pathBase, PathString path, QueryString query, FragmentString fragment) { var scheme = "https"; var SchemeDelimiter = Uri.SchemeDelimiter; var encodedHost = host.ToUriComponent(); var encodedPathBase = pathBase.ToUriComponent(); var encodedPath = path.ToUriComponent(); var encodedQuery = query.ToUriComponent(); var encodedFragment = fragment.ToUriComponent(); // PERF: Calculate string length to allocate correct buffer size for StringBuilder. var length = scheme.Length + SchemeDelimiter.Length + encodedHost.Length + encodedPathBase.Length + encodedPath.Length + encodedQuery.Length + encodedFragment.Length; if (!pathBase.HasValue && !path.HasValue) { length++; } var builder = new StringBuilder(length) .Append(scheme) .Append(SchemeDelimiter) .Append(encodedHost); if (!pathBase.HasValue && !path.HasValue) { builder.Append("/"); } else { builder .Append(encodedPathBase) .Append(encodedPath); } return builder .Append(encodedQuery) .Append(encodedFragment) .ToString(); } [Benchmark] [ArgumentsSource(nameof(Data))] public string String_Concat_WithArrayArgument(HostString host, PathString pathBase, PathString path, QueryString query, FragmentString fragment) { var scheme = "https"; var SchemeDelimiter = Uri.SchemeDelimiter; if (!pathBase.HasValue && !path.HasValue) { return scheme + SchemeDelimiter + "/" + host.ToUriComponent() + "/" + query.ToUriComponent() + fragment.ToUriComponent(); } else { return scheme + SchemeDelimiter + pathBase.ToUriComponent() + path.ToUriComponent() + host.ToUriComponent() + "/" + query.ToUriComponent() + fragment.ToUriComponent(); } } private static readonly SpanAction<char, (string scheme, string host, string pathBase, string path, string query, string fragment)> InitializeStringAction = new(InitializeString); [Benchmark] [ArgumentsSource(nameof(Data))] public string String_Create(HostString host, PathString pathBase, PathString path, QueryString query, FragmentString fragment) { var uriParts = ( scheme: "https", host: host.ToUriComponent(), pathBase: pathBase.ToUriComponent(), path: path.ToUriComponent(), query: query.ToUriComponent(), fragment: fragment.ToUriComponent()); // PERF: Calculate string length to allocate correct buffer size for StringBuilder. var length = uriParts.scheme.Length + Uri.SchemeDelimiter.Length + uriParts.host.Length + uriParts.pathBase.Length + uriParts.path.Length + uriParts.query.Length + uriParts.fragment.Length; if (!pathBase.HasValue && !path.HasValue) { uriParts.path = "/"; length++; } return string.Create(length, uriParts, InitializeStringAction); } private static void InitializeString(Span<char> buffer, (string scheme, string host, string pathBase, string path, string query, string fragment) uriParts) { var index = 0; index = Copy(buffer, index, uriParts.scheme); index = Copy(buffer, index, Uri.SchemeDelimiter); index = Copy(buffer, index, uriParts.host); index = Copy(buffer, index, uriParts.pathBase); index = Copy(buffer, index, uriParts.path); index = Copy(buffer, index, uriParts.query); _ = Copy(buffer, index, uriParts.fragment); [MethodImpl(MethodImplOptions.AggressiveInlining)] static int Copy(Span<char> buffer, int index, string text) { if (!string.IsNullOrEmpty(text)) { var span = text.AsSpan(); span.CopyTo(buffer.Slice(index, span.Length)); return index + span.Length; } return index; } } } public static class TestData { private static readonly string[] hosts = new[] { "cname.domain.tld" }; private static readonly string[] basePaths = new[] { "", "/base-path", }; private static readonly string[] paths = new[] { "", "/path/one/two/three", }; private static readonly string[] queries = new[] { "", "?param1=value1&param2=value2&param3=value3", }; private static readonly string[] fragments = new[] { "", "#fragment", }; public static IEnumerable<object[]> HostPathBasePathQueryFragment() { foreach (var host in hosts) { foreach (var basePath in basePaths) { foreach (var path in paths) { foreach (var query in queries) { foreach (var fragment in fragments) { yield return new object[] { new HostString(host), new PathString(basePath), new PathString(path), new QueryString(query), new FragmentString(fragment), }; } } } } } } } ```
non_priority
urihelper buildabsolute opportunity for performance improvement summary urihelper buildabsolute creates an intermediary string for the combined path that is used only for concatenating with the other components to create the final url it also uses a non pooled stringbuilder that is instantiated on every invocation although optimized in size it is a heap allocation with an intermediary buffer csharp public static string buildabsolute string scheme hoststring host pathstring pathbase new pathstring pathstring path new pathstring querystring query new querystring fragmentstring fragment new fragmentstring if scheme null throw new argumentnullexception nameof scheme var combinedpath pathbase hasvalue path hasvalue pathbase path tostring var encodedhost host tostring var encodedquery query tostring var encodedfragment fragment tostring perf calculate string length to allocate correct buffer size for stringbuilder var length scheme length schemedelimiter length encodedhost length combinedpath length encodedquery length encodedfragment length return new stringbuilder length append scheme append schemedelimiter append encodedhost append combinedpath append encodedquery append encodedfragment tostring motivation and goals this method is frequently use in hot paths like redirect and rewrite rules detailed design stringbuilder withoutcombinedpathgeneration just by not generating the intermediary combinepath there are memory usage improvements in the when the number of components is highier there are also time improvements in those cases but it s wrost in the other cases string concat witharrayargument given that the final url is composed of more than parts the use of string concat incurs in an array allocation but it still always performs better in terms of time and memory usage that using a stringbuilder string create string create excels here in comparison to all the other options it was created exactly for these use cases benchmarks ini benchmarkdotnet os windows intel core cpu kaby lake r cpu logical and physical cores net core sdk preview net core coreclr corefx ryujit defaultjob net core coreclr corefx ryujit method host pathbase path query fragment mean error stddev median ratio ratiosd gen gen gen allocated urihelper buildrelative cname domain tld ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld ns ns ns ns b string concat witharrayargument cname domain tld ns ns ns ns b string create cname domain tld ns ns ns ns b urihelper buildrelative cname domain tld fragment ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld fragment ns ns ns ns b string concat witharrayargument cname domain tld fragment ns ns ns ns b string create cname domain tld fragment ns ns ns ns b urihelper buildrelative cname domain tld amp amp ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld amp amp ns ns ns ns b string concat witharrayargument cname domain tld amp amp ns ns ns ns b string create cname domain tld amp amp ns ns ns ns b urihelper buildrelative cname domain tld amp amp fragment ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld amp amp fragment ns ns ns ns b string concat witharrayargument cname domain tld amp amp fragment ns ns ns ns b string create cname domain tld amp amp fragment ns ns ns ns b urihelper buildrelative cname domain tld path one two three ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld path one two three ns ns ns ns b string concat witharrayargument cname domain tld path one two three ns ns ns ns b string create cname domain tld path one two three ns ns ns ns b urihelper buildrelative cname domain tld path one two three fragment ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld path one two three fragment ns ns ns ns b string concat witharrayargument cname domain tld path one two three fragment ns ns ns ns b string create cname domain tld path one two three fragment ns ns ns ns b urihelper buildrelative cname domain tld path one two three amp amp ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld path one two three amp amp ns ns ns ns b string concat witharrayargument cname domain tld path one two three amp amp ns ns ns ns b string create cname domain tld path one two three amp amp ns ns ns ns b urihelper buildrelative cname domain tld path one two three amp amp fragment ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld path one two three amp amp fragment ns ns ns ns b string concat witharrayargument cname domain tld path one two three amp amp fragment ns ns ns ns b string create cname domain tld path one two three amp amp fragment ns ns ns ns b urihelper buildrelative cname domain tld base path ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld base path ns ns ns ns b string concat witharrayargument cname domain tld base path ns ns ns ns b string create cname domain tld base path ns ns ns ns b urihelper buildrelative cname domain tld base path fragment ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld base path fragment ns ns ns ns b string concat witharrayargument cname domain tld base path fragment ns ns ns ns b string create cname domain tld base path fragment ns ns ns ns b urihelper buildrelative cname domain tld base path amp amp ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld base path amp amp ns ns ns ns b string concat witharrayargument cname domain tld base path amp amp ns ns ns ns b string create cname domain tld base path amp amp ns ns ns ns b urihelper buildrelative cname domain tld base path amp amp fragment ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld base path amp amp fragment ns ns ns ns b string concat witharrayargument cname domain tld base path amp amp fragment ns ns ns ns b string create cname domain tld base path amp amp fragment ns ns ns ns b urihelper buildrelative cname domain tld base path path one two three ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld base path path one two three ns ns ns ns b string concat witharrayargument cname domain tld base path path one two three ns ns ns ns b string create cname domain tld base path path one two three ns ns ns ns b urihelper buildrelative cname domain tld base path path one two three fragment ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld base path path one two three fragment ns ns ns ns b string concat witharrayargument cname domain tld base path path one two three fragment ns ns ns ns b string create cname domain tld base path path one two three fragment ns ns ns ns b urihelper buildrelative cname domain tld base path path one two three amp amp ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld base path path one two three amp amp ns ns ns ns b string concat witharrayargument cname domain tld base path path one two three amp amp ns ns ns ns b string create cname domain tld base path path one two three amp amp ns ns ns ns b urihelper buildrelative cname domain tld base path path one two three amp amp fragment ns ns ns ns b stringbuilder withoutcombinedpathgeneration cname domain tld base path path one two three amp amp fragment ns ns ns ns b string concat witharrayargument cname domain tld base path path one two three amp amp fragment ns ns ns ns b string create cname domain tld base path path one two three amp amp fragment ns ns ns ns b code csharp public class buildabsolutebenchmark public ienumerable data testdata hostpathbasepathqueryfragment public string urihelper buildrelative hoststring host pathstring pathbase pathstring path querystring query fragmentstring fragment urihelper buildabsolute https host pathbase path query fragment public string stringbuilder withoutcombinedpathgeneration hoststring host pathstring pathbase pathstring path querystring query fragmentstring fragment var scheme https var schemedelimiter uri schemedelimiter var encodedhost host touricomponent var encodedpathbase pathbase touricomponent var encodedpath path touricomponent var encodedquery query touricomponent var encodedfragment fragment touricomponent perf calculate string length to allocate correct buffer size for stringbuilder var length scheme length schemedelimiter length encodedhost length encodedpathbase length encodedpath length encodedquery length encodedfragment length if pathbase hasvalue path hasvalue length var builder new stringbuilder length append scheme append schemedelimiter append encodedhost if pathbase hasvalue path hasvalue builder append else builder append encodedpathbase append encodedpath return builder append encodedquery append encodedfragment tostring public string string concat witharrayargument hoststring host pathstring pathbase pathstring path querystring query fragmentstring fragment var scheme https var schemedelimiter uri schemedelimiter if pathbase hasvalue path hasvalue return scheme schemedelimiter host touricomponent query touricomponent fragment touricomponent else return scheme schemedelimiter pathbase touricomponent path touricomponent host touricomponent query touricomponent fragment touricomponent private static readonly spanaction initializestringaction new initializestring public string string create hoststring host pathstring pathbase pathstring path querystring query fragmentstring fragment var uriparts scheme https host host touricomponent pathbase pathbase touricomponent path path touricomponent query query touricomponent fragment fragment touricomponent perf calculate string length to allocate correct buffer size for stringbuilder var length uriparts scheme length uri schemedelimiter length uriparts host length uriparts pathbase length uriparts path length uriparts query length uriparts fragment length if pathbase hasvalue path hasvalue uriparts path length return string create length uriparts initializestringaction private static void initializestring span buffer string scheme string host string pathbase string path string query string fragment uriparts var index index copy buffer index uriparts scheme index copy buffer index uri schemedelimiter index copy buffer index uriparts host index copy buffer index uriparts pathbase index copy buffer index uriparts path index copy buffer index uriparts query copy buffer index uriparts fragment static int copy span buffer int index string text if string isnullorempty text var span text asspan span copyto buffer slice index span length return index span length return index public static class testdata private static readonly string hosts new cname domain tld private static readonly string basepaths new base path private static readonly string paths new path one two three private static readonly string queries new private static readonly string fragments new fragment public static ienumerable hostpathbasepathqueryfragment foreach var host in hosts foreach var basepath in basepaths foreach var path in paths foreach var query in queries foreach var fragment in fragments yield return new object new hoststring host new pathstring basepath new pathstring path new querystring query new fragmentstring fragment
0
223,152
17,105,238,143
IssuesEvent
2021-07-09 16:39:32
BB-33/multiplication-website
https://api.github.com/repos/BB-33/multiplication-website
opened
Make a project board
documentation
Define a scope and set of goals that I want the project to have: What am I going to teach? How am I going to do it? What are the different stages to teaching this? Lay out some broad strokes goals for this.
1.0
Make a project board - Define a scope and set of goals that I want the project to have: What am I going to teach? How am I going to do it? What are the different stages to teaching this? Lay out some broad strokes goals for this.
non_priority
make a project board define a scope and set of goals that i want the project to have what am i going to teach how am i going to do it what are the different stages to teaching this lay out some broad strokes goals for this
0
242,501
20,251,331,870
IssuesEvent
2022-02-14 18:11:15
metaplex-foundation/metaplex
https://api.github.com/repos/metaplex-foundation/metaplex
closed
[Bug]: Cannot withdraw funds of candy machine on mainnet-beta
needs tests bug needs more information
### Which package is this bug report for? candy machine cli ### Issue description Hello, I have been retrying for one hour and still can't get the candymachine withdrawed... Always getting this error ### Command ```shell ts-node ./~/metaplex/js/packages/cli/src/candy-machine-v2-cli.ts withdraw -e mainnet-beta -k ./~/.config/AFC4FpBPaBFzx1DyQbh6cJQEXe7Ga6CQbLMhwgjj4KYR.json ``` ### Relevant log output ```shell wallet public key: AFC4FpBPaBFzx1DyQbh6cJQEXe7Ga6CQbLMhwgjj4KYR Total Number of Candy Machine Config Accounts to drain 1 1.67640648 SOL locked up in configs WARNING: This command will drain ALL of the Candy Machine config accounts that are owned by your current KeyPair, this will break your Candy Machine if its still in use Rejecting for timeout... Timeout Error caught { timeout: true } Withdraw has failed for config account 2va6XAGAZGur2TuWU2vEpXSKvypi6SLhLRYUNL1mEbkd Error: Timed out awaiting confirmation on transaction Congratulations, 0 config accounts have been successfully drained. Now you kinda rich, please consider supporting Open Source developers. ``` ### Operating system Windows 10 ### Priority this issue should have Medium (should be fixed soon) ### Check the Docs First - [X] I have checked the docs and it didn't solve my issue
1.0
[Bug]: Cannot withdraw funds of candy machine on mainnet-beta - ### Which package is this bug report for? candy machine cli ### Issue description Hello, I have been retrying for one hour and still can't get the candymachine withdrawed... Always getting this error ### Command ```shell ts-node ./~/metaplex/js/packages/cli/src/candy-machine-v2-cli.ts withdraw -e mainnet-beta -k ./~/.config/AFC4FpBPaBFzx1DyQbh6cJQEXe7Ga6CQbLMhwgjj4KYR.json ``` ### Relevant log output ```shell wallet public key: AFC4FpBPaBFzx1DyQbh6cJQEXe7Ga6CQbLMhwgjj4KYR Total Number of Candy Machine Config Accounts to drain 1 1.67640648 SOL locked up in configs WARNING: This command will drain ALL of the Candy Machine config accounts that are owned by your current KeyPair, this will break your Candy Machine if its still in use Rejecting for timeout... Timeout Error caught { timeout: true } Withdraw has failed for config account 2va6XAGAZGur2TuWU2vEpXSKvypi6SLhLRYUNL1mEbkd Error: Timed out awaiting confirmation on transaction Congratulations, 0 config accounts have been successfully drained. Now you kinda rich, please consider supporting Open Source developers. ``` ### Operating system Windows 10 ### Priority this issue should have Medium (should be fixed soon) ### Check the Docs First - [X] I have checked the docs and it didn't solve my issue
non_priority
cannot withdraw funds of candy machine on mainnet beta which package is this bug report for candy machine cli issue description hello i have been retrying for one hour and still can t get the candymachine withdrawed always getting this error command shell ts node metaplex js packages cli src candy machine cli ts withdraw e mainnet beta k config json relevant log output shell wallet public key total number of candy machine config accounts to drain sol locked up in configs warning this command will drain all of the candy machine config accounts that are owned by your current keypair this will break your candy machine if its still in use rejecting for timeout timeout error caught timeout true withdraw has failed for config account error timed out awaiting confirmation on transaction congratulations config accounts have been successfully drained now you kinda rich please consider supporting open source developers operating system windows priority this issue should have medium should be fixed soon check the docs first i have checked the docs and it didn t solve my issue
0
27,951
22,635,740,979
IssuesEvent
2022-06-30 18:47:21
google/site-kit-wp
https://api.github.com/repos/google/site-kit-wp
closed
Fix broken stories for Gathering Data
P1 Type: Infrastructure
## Bug Description The `DashboardOverallPageMetricsWidget` stories for gathering data states are no longer showing properly. This is due to an invalid report being received in Storybook. ## Steps to reproduce https://google.github.io/site-kit-wp/storybook/main/?path=/story/modules-analytics-widgets-dashboardoverallpagemetricswidget--gathering-data-zero-data-states ## Screenshots <img width="916" alt="image" src="https://user-images.githubusercontent.com/1621608/174874299-2c3f940f-2398-4a11-aa15-82271d28ebff.png"> --------------- _Do not alter or remove anything below. The following sections will be managed by moderators only._ ## Acceptance criteria * All "gathering data" stories should show a gathering data state ## Implementation Brief * Update use of `receiveGetReport` in `DashboardOverallPageMetricsWidget` to receive an empty array instead of an empty object * No other improper uses found when reviewing calls to `receiveGetReport` * Merge #5405 ### Test Coverage * No changes ## QA Brief * This change only affects Storybook, no changes to production code have been made * Once merged, the fix should be verifiable in Storybook here: https://google.github.io/site-kit-wp/storybook/develop/?path=/story/modules-analytics-widgets-dashboardoverallpagemetricswidget--gathering-data-zero-data-states ## Changelog entry * N/A
1.0
Fix broken stories for Gathering Data - ## Bug Description The `DashboardOverallPageMetricsWidget` stories for gathering data states are no longer showing properly. This is due to an invalid report being received in Storybook. ## Steps to reproduce https://google.github.io/site-kit-wp/storybook/main/?path=/story/modules-analytics-widgets-dashboardoverallpagemetricswidget--gathering-data-zero-data-states ## Screenshots <img width="916" alt="image" src="https://user-images.githubusercontent.com/1621608/174874299-2c3f940f-2398-4a11-aa15-82271d28ebff.png"> --------------- _Do not alter or remove anything below. The following sections will be managed by moderators only._ ## Acceptance criteria * All "gathering data" stories should show a gathering data state ## Implementation Brief * Update use of `receiveGetReport` in `DashboardOverallPageMetricsWidget` to receive an empty array instead of an empty object * No other improper uses found when reviewing calls to `receiveGetReport` * Merge #5405 ### Test Coverage * No changes ## QA Brief * This change only affects Storybook, no changes to production code have been made * Once merged, the fix should be verifiable in Storybook here: https://google.github.io/site-kit-wp/storybook/develop/?path=/story/modules-analytics-widgets-dashboardoverallpagemetricswidget--gathering-data-zero-data-states ## Changelog entry * N/A
non_priority
fix broken stories for gathering data bug description the dashboardoverallpagemetricswidget stories for gathering data states are no longer showing properly this is due to an invalid report being received in storybook steps to reproduce screenshots img width alt image src do not alter or remove anything below the following sections will be managed by moderators only acceptance criteria all gathering data stories should show a gathering data state implementation brief update use of receivegetreport in dashboardoverallpagemetricswidget to receive an empty array instead of an empty object no other improper uses found when reviewing calls to receivegetreport merge test coverage no changes qa brief this change only affects storybook no changes to production code have been made once merged the fix should be verifiable in storybook here changelog entry n a
0
2,680
3,801,423,072
IssuesEvent
2016-03-23 22:51:22
MozillaFoundation/plan
https://api.github.com/repos/MozillaFoundation/plan
closed
Science site refresh: homepage comps + programs wireframes
Convening Learning Membership MLN Infrastructure p1 production Size: large
We have enough agreement about IA, homepage wireframes, and copy to complete the following: - [ ] [Homepage comps](https://github.com/mozillascience/site/issues/101) - [x] [Wireframes for Programs and Events](https://github.com/mozillascience/site/issues/100) - [x] [Determine urls](https://github.com/mozillascience/site/issues/99)
1.0
Science site refresh: homepage comps + programs wireframes - We have enough agreement about IA, homepage wireframes, and copy to complete the following: - [ ] [Homepage comps](https://github.com/mozillascience/site/issues/101) - [x] [Wireframes for Programs and Events](https://github.com/mozillascience/site/issues/100) - [x] [Determine urls](https://github.com/mozillascience/site/issues/99)
non_priority
science site refresh homepage comps programs wireframes we have enough agreement about ia homepage wireframes and copy to complete the following
0
6,365
3,014,850,182
IssuesEvent
2015-07-29 16:41:12
Cardshifter/Cardshifter
https://api.github.com/repos/Cardshifter/Cardshifter
closed
Add @example JavaDoc tag
documentation
I will be using an `@example` keyword throughout API and perhaps other documentation. If possible please have it added to the pom or Gradle so that it is recognized as a valid JavaDoc tag. Example usage: /** * Constructor. * @param username the incoming user name passed from client to server, not null * @example Message: <code>{ "command":"login","username":"JohnDoe" }</code> * @example Response: <code>{"command":"loginresponse","status":200,"userId":6,"message":"OK"}</code> */ public LoginMessage(String username) { super("login"); this.username = username; }
1.0
Add @example JavaDoc tag - I will be using an `@example` keyword throughout API and perhaps other documentation. If possible please have it added to the pom or Gradle so that it is recognized as a valid JavaDoc tag. Example usage: /** * Constructor. * @param username the incoming user name passed from client to server, not null * @example Message: <code>{ "command":"login","username":"JohnDoe" }</code> * @example Response: <code>{"command":"loginresponse","status":200,"userId":6,"message":"OK"}</code> */ public LoginMessage(String username) { super("login"); this.username = username; }
non_priority
add example javadoc tag i will be using an example keyword throughout api and perhaps other documentation if possible please have it added to the pom or gradle so that it is recognized as a valid javadoc tag example usage constructor param username the incoming user name passed from client to server not null example message command login username johndoe example response command loginresponse status userid message ok public loginmessage string username super login this username username
0
409,678
27,748,312,979
IssuesEvent
2023-03-15 18:38:55
rak3rman/rakerman-status
https://api.github.com/repos/rak3rman/rakerman-status
opened
Create README.md
documentation enhancement
Create a new README.md document describing how to use and deploy this project. Should contain all documentation.
1.0
Create README.md - Create a new README.md document describing how to use and deploy this project. Should contain all documentation.
non_priority
create readme md create a new readme md document describing how to use and deploy this project should contain all documentation
0
120,326
17,644,088,539
IssuesEvent
2021-08-20 01:39:43
DavidSpek/pipelines
https://api.github.com/repos/DavidSpek/pipelines
opened
CVE-2021-29616 (High) detected in tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl
security vulnerability
## CVE-2021-29616 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/ec/98/f968caf5f65759e78873b900cbf0ae20b1699fb11268ecc0f892186419a7/tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/ec/98/f968caf5f65759e78873b900cbf0ae20b1699fb11268ecc0f892186419a7/tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl</a></p> <p>Path to dependency file: pipelines/contrib/components/openvino/ovms-deployer/containers/requirements.txt</p> <p>Path to vulnerable library: pipelines/contrib/components/openvino/ovms-deployer/containers/requirements.txt,pipelines/samples/core/ai_platform/training</p> <p> Dependency Hierarchy: - :x: **tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> TensorFlow is an end-to-end open source platform for machine learning. The implementation of TrySimplify(https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointer in corner cases that result in optimizing a node with no inputs. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. <p>Publish Date: 2021-05-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29616>CVE-2021-29616</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvv-7x94-7vq8">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvv-7x94-7vq8</a></p> <p>Release Date: 2021-05-14</p> <p>Fix Resolution: tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-29616 (High) detected in tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl - ## CVE-2021-29616 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/ec/98/f968caf5f65759e78873b900cbf0ae20b1699fb11268ecc0f892186419a7/tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/ec/98/f968caf5f65759e78873b900cbf0ae20b1699fb11268ecc0f892186419a7/tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl</a></p> <p>Path to dependency file: pipelines/contrib/components/openvino/ovms-deployer/containers/requirements.txt</p> <p>Path to vulnerable library: pipelines/contrib/components/openvino/ovms-deployer/containers/requirements.txt,pipelines/samples/core/ai_platform/training</p> <p> Dependency Hierarchy: - :x: **tensorflow-1.15.0-cp27-cp27mu-manylinux2010_x86_64.whl** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> TensorFlow is an end-to-end open source platform for machine learning. The implementation of TrySimplify(https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointer in corner cases that result in optimizing a node with no inputs. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. <p>Publish Date: 2021-05-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29616>CVE-2021-29616</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvv-7x94-7vq8">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvv-7x94-7vq8</a></p> <p>Release Date: 2021-05-14</p> <p>Fix Resolution: tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in tensorflow whl cve high severity vulnerability vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file pipelines contrib components openvino ovms deployer containers requirements txt path to vulnerable library pipelines contrib components openvino ovms deployer containers requirements txt pipelines samples core ai platform training dependency hierarchy x tensorflow whl vulnerable library found in base branch master vulnerability details tensorflow is an end to end open source platform for machine learning the implementation of trysimplify has undefined behavior due to dereferencing a null pointer in corner cases that result in optimizing a node with no inputs the fix will be included in tensorflow we will also cherrypick this commit on tensorflow tensorflow tensorflow and tensorflow as these are also affected and still in supported range publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tensorflow tensorflow cpu tensorflow gpu step up your open source security game with whitesource
0