Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
391,495
26,895,440,357
IssuesEvent
2023-02-06 12:04:47
ethereum/solidity
https://api.github.com/repos/ethereum/solidity
closed
Add more details around what it means to use Ether units
documentation :book: waiting for more input closed-due-inactivity stale
## Abstract Right now, it is rather unclear based on reading the docs here: https://github.com/ethereum/solidity/blob/v0.8.2/docs/units-and-global-variables.rst what we can actually use ether units for. ## Motivation Adding in more examples of how it can be used. I was specifically interested in how to solve the division/floating point problem in Solidity and was pointed to this section but it is not clear how I can actually use those ether units. ## Backwards Compatibility After updating the docs for 8.2, it should be propagated to older versions.
1.0
Add more details around what it means to use Ether units - ## Abstract Right now, it is rather unclear based on reading the docs here: https://github.com/ethereum/solidity/blob/v0.8.2/docs/units-and-global-variables.rst what we can actually use ether units for. ## Motivation Adding in more examples of how it can be used. I was specifically interested in how to solve the division/floating point problem in Solidity and was pointed to this section but it is not clear how I can actually use those ether units. ## Backwards Compatibility After updating the docs for 8.2, it should be propagated to older versions.
non_priority
add more details around what it means to use ether units abstract right now it is rather unclear based on reading the docs here what we can actually use ether units for motivation adding in more examples of how it can be used i was specifically interested in how to solve the division floating point problem in solidity and was pointed to this section but it is not clear how i can actually use those ether units backwards compatibility after updating the docs for it should be propagated to older versions
0
94,942
8,527,055,217
IssuesEvent
2018-11-02 18:13:06
ValveSoftware/steamvr_unity_plugin
https://api.github.com/repos/ValveSoftware/steamvr_unity_plugin
closed
Mismatch between TrackedDeviceClass and TrackedDeviceProperty
Need Retest
Hi ! From time to time, while developing an app on Unity, I'm suddenly facing a mismatch between the TrackedDevice Class and the TrackDevice Property of some controllers. It appears to come randomly, usually after a turn off/on of one controller. Only the Property seems to be “stuck” in a previous state, the Class always match the device index. The test code used is a loop over the first 8 devices that displays the device Class and the model name Property using those functions : ``` // Get TrackDevice Class : var deviceClass = OpenVR.System.GetTrackedDeviceClass(deviceId); // Get TrackDevice Property (ModelNumber) : var prop = ETrackedDeviceProperty.Prop_ModelNumber_String; OpenVR.System.GetStringTrackedDeviceProperty(deviceId, prop, result, capactiy, ref error); var deviceModel = result.ToString(); ``` In the end, I have this kind of result : ![steamvrerror](https://user-images.githubusercontent.com/43002630/45178153-436bdd80-b215-11e8-92a5-3766ed57c69e.png) Full test code here : ``` public static void Test() { for(int i = 0; i < 8; i++) { uint deviceIndex = (uint)i; Log.Debug("OpenVR : Index: [ " + deviceIndex + " ] - Class: [ " + OpenVR.System.GetTrackedDeviceClass(deviceIndex) + " ] - Properties: [ " + GetStringProperty(deviceIndex, ETrackedDeviceProperty.Prop_ModelNumber_String) + " ]"); } } public static string GetStringProperty(uint deviceId, ETrackedDeviceProperty prop) { var error = ETrackedPropertyError.TrackedProp_Success; var capactiy = OpenVR.System.GetStringTrackedDeviceProperty(deviceId, prop, null, 0, ref error); if(capactiy > 1) { var result = new System.Text.StringBuilder((int)capactiy); OpenVR.System.GetStringTrackedDeviceProperty(deviceId, prop, result, capactiy, ref error); return result.ToString(); } return (error != ETrackedPropertyError.TrackedProp_Success) ? "" : "<unknown>"; } ``` Do you have any suggestion on how I could fix this ? Is there any way to refresh OpenVR without turning off/on my computer or any way to refresh all devices info ? As of now, the only fix I found was to restart the computer. Restarting SteamVR or/and Unity doesn't fix the issue. Thank you very much for your help ! :) Julien
1.0
Mismatch between TrackedDeviceClass and TrackedDeviceProperty - Hi ! From time to time, while developing an app on Unity, I'm suddenly facing a mismatch between the TrackedDevice Class and the TrackDevice Property of some controllers. It appears to come randomly, usually after a turn off/on of one controller. Only the Property seems to be “stuck” in a previous state, the Class always match the device index. The test code used is a loop over the first 8 devices that displays the device Class and the model name Property using those functions : ``` // Get TrackDevice Class : var deviceClass = OpenVR.System.GetTrackedDeviceClass(deviceId); // Get TrackDevice Property (ModelNumber) : var prop = ETrackedDeviceProperty.Prop_ModelNumber_String; OpenVR.System.GetStringTrackedDeviceProperty(deviceId, prop, result, capactiy, ref error); var deviceModel = result.ToString(); ``` In the end, I have this kind of result : ![steamvrerror](https://user-images.githubusercontent.com/43002630/45178153-436bdd80-b215-11e8-92a5-3766ed57c69e.png) Full test code here : ``` public static void Test() { for(int i = 0; i < 8; i++) { uint deviceIndex = (uint)i; Log.Debug("OpenVR : Index: [ " + deviceIndex + " ] - Class: [ " + OpenVR.System.GetTrackedDeviceClass(deviceIndex) + " ] - Properties: [ " + GetStringProperty(deviceIndex, ETrackedDeviceProperty.Prop_ModelNumber_String) + " ]"); } } public static string GetStringProperty(uint deviceId, ETrackedDeviceProperty prop) { var error = ETrackedPropertyError.TrackedProp_Success; var capactiy = OpenVR.System.GetStringTrackedDeviceProperty(deviceId, prop, null, 0, ref error); if(capactiy > 1) { var result = new System.Text.StringBuilder((int)capactiy); OpenVR.System.GetStringTrackedDeviceProperty(deviceId, prop, result, capactiy, ref error); return result.ToString(); } return (error != ETrackedPropertyError.TrackedProp_Success) ? "" : "<unknown>"; } ``` Do you have any suggestion on how I could fix this ? Is there any way to refresh OpenVR without turning off/on my computer or any way to refresh all devices info ? As of now, the only fix I found was to restart the computer. Restarting SteamVR or/and Unity doesn't fix the issue. Thank you very much for your help ! :) Julien
non_priority
mismatch between trackeddeviceclass and trackeddeviceproperty hi from time to time while developing an app on unity i m suddenly facing a mismatch between the trackeddevice class and the trackdevice property of some controllers it appears to come randomly usually after a turn off on of one controller only the property seems to be “stuck” in a previous state the class always match the device index the test code used is a loop over the first devices that displays the device class and the model name property using those functions get trackdevice class var deviceclass openvr system gettrackeddeviceclass deviceid get trackdevice property modelnumber var prop etrackeddeviceproperty prop modelnumber string openvr system getstringtrackeddeviceproperty deviceid prop result capactiy ref error var devicemodel result tostring in the end i have this kind of result full test code here public static void test for int i i i uint deviceindex uint i log debug openvr index class properties public static string getstringproperty uint deviceid etrackeddeviceproperty prop var error etrackedpropertyerror trackedprop success var capactiy openvr system getstringtrackeddeviceproperty deviceid prop null ref error if capactiy var result new system text stringbuilder int capactiy openvr system getstringtrackeddeviceproperty deviceid prop result capactiy ref error return result tostring return error etrackedpropertyerror trackedprop success do you have any suggestion on how i could fix this is there any way to refresh openvr without turning off on my computer or any way to refresh all devices info as of now the only fix i found was to restart the computer restarting steamvr or and unity doesn t fix the issue thank you very much for your help julien
0
92,847
15,872,893,729
IssuesEvent
2021-04-09 01:01:27
KaterinaOrg/keycloak
https://api.github.com/repos/KaterinaOrg/keycloak
opened
CVE-2019-12402 (High) detected in commons-compress-1.18.jar
security vulnerability
## CVE-2019-12402 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-compress-1.18.jar</b></p></summary> <p>Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional Unix Compress, DEFLATE, DEFLATE64, LZ4, Brotli, Zstandard and ar, cpio, jar, tar, zip, dump, 7z, arj.</p> <p>Path to dependency file: keycloak/testsuite/utils/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar</p> <p> Dependency Hierarchy: - openshift-restclient-java-8.0.0.Final.jar (Root Library) - :x: **commons-compress-1.18.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress. <p>Publish Date: 2019-08-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12402>CVE-2019-12402</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12402">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12402</a></p> <p>Release Date: 2019-08-30</p> <p>Fix Resolution: 1.19</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.commons","packageName":"commons-compress","packageVersion":"1.18","packageFilePaths":["/testsuite/utils/pom.xml","/wildfly/server-subsystem/pom.xml","/testsuite/model/pom.xml","/testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/pom.xml","/examples/providers/domain-extension/pom.xml","/testsuite/integration-arquillian/servers/app-server/undertow/pom.xml","/model/jpa/pom.xml","/model/map/pom.xml","/testsuite/integration-arquillian/util/pom.xml","/services/pom.xml","/wildfly/extensions/pom.xml","/testsuite/integration-arquillian/servers/auth-server/undertow/pom.xml","/examples/providers/authenticator/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.openshift:openshift-restclient-java:8.0.0.Final;org.apache.commons:commons-compress:1.18","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.19"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-12402","vulnerabilityDetails":"The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12402","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-12402 (High) detected in commons-compress-1.18.jar - ## CVE-2019-12402 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-compress-1.18.jar</b></p></summary> <p>Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional Unix Compress, DEFLATE, DEFLATE64, LZ4, Brotli, Zstandard and ar, cpio, jar, tar, zip, dump, 7z, arj.</p> <p>Path to dependency file: keycloak/testsuite/utils/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar</p> <p> Dependency Hierarchy: - openshift-restclient-java-8.0.0.Final.jar (Root Library) - :x: **commons-compress-1.18.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress. <p>Publish Date: 2019-08-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12402>CVE-2019-12402</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12402">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12402</a></p> <p>Release Date: 2019-08-30</p> <p>Fix Resolution: 1.19</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.commons","packageName":"commons-compress","packageVersion":"1.18","packageFilePaths":["/testsuite/utils/pom.xml","/wildfly/server-subsystem/pom.xml","/testsuite/model/pom.xml","/testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/pom.xml","/examples/providers/domain-extension/pom.xml","/testsuite/integration-arquillian/servers/app-server/undertow/pom.xml","/model/jpa/pom.xml","/model/map/pom.xml","/testsuite/integration-arquillian/util/pom.xml","/services/pom.xml","/wildfly/extensions/pom.xml","/testsuite/integration-arquillian/servers/auth-server/undertow/pom.xml","/examples/providers/authenticator/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.openshift:openshift-restclient-java:8.0.0.Final;org.apache.commons:commons-compress:1.18","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.19"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-12402","vulnerabilityDetails":"The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12402","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in commons compress jar cve high severity vulnerability vulnerable library commons compress jar apache commons compress software defines an api for working with compression and archive formats these include gzip lzma xz snappy traditional unix compress deflate brotli zstandard and ar cpio jar tar zip dump arj path to dependency file keycloak testsuite utils pom xml path to vulnerable library home wss scanner repository org apache commons commons compress commons compress jar home wss scanner repository org apache commons commons compress commons compress jar home wss scanner repository org apache commons commons compress commons compress jar home wss scanner repository org apache commons commons compress commons compress jar home wss scanner repository org apache commons commons compress commons compress jar home wss scanner repository org apache commons commons compress commons compress jar home wss scanner repository org apache commons commons compress commons compress jar home wss scanner repository org apache commons commons compress commons compress jar home wss scanner repository org apache commons commons compress commons compress jar home wss scanner repository org apache commons commons compress commons compress jar home wss scanner repository org apache commons commons compress commons compress jar home wss scanner repository org apache commons commons compress commons compress jar home wss scanner repository org apache commons commons compress commons compress jar home wss scanner repository org apache commons commons compress commons compress jar dependency hierarchy openshift restclient java final jar root library x commons compress jar vulnerable library found in base branch master vulnerability details the file name encoding algorithm used internally in apache commons compress to can get into an infinite loop when faced with specially crafted inputs this can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by compress publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com openshift openshift restclient java final org apache commons commons compress isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails the file name encoding algorithm used internally in apache commons compress to can get into an infinite loop when faced with specially crafted inputs this can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by compress vulnerabilityurl
0
307,220
23,189,820,560
IssuesEvent
2022-08-01 11:39:14
QUT-Motorsport/QUTMS_Driverless
https://api.github.com/repos/QUT-Motorsport/QUTMS_Driverless
closed
9 Sept: AV Wiring Diagram
Documentation Rules Compliance Electrical
Autonomous Vehicle Wiring Diagram - [ ] Establish what's required - [ ] Design diagram - [ ] Submit
1.0
9 Sept: AV Wiring Diagram - Autonomous Vehicle Wiring Diagram - [ ] Establish what's required - [ ] Design diagram - [ ] Submit
non_priority
sept av wiring diagram autonomous vehicle wiring diagram establish what s required design diagram submit
0
47,615
6,062,021,755
IssuesEvent
2017-06-14 08:23:42
pythonapis/MLNGAHTE5T5NGNHWMPPDWFPE
https://api.github.com/repos/pythonapis/MLNGAHTE5T5NGNHWMPPDWFPE
reopened
dVpycdl8G4qrDKZZF/283HIUuAae7yh0UXZb+Dqan+MEjRWt6HTt43Q1SfQgPcLtg9b4833uLIkxgglppF82QkSgJyY6TDRGgaubNE5vQ4P8ZTjP2I08Cet2Qokff1CCnccVT+Or/yJ5PlziXdBHZkVhaes8Gv8CKNfQqzt0WVw=
design
jqaTtk6s2GG5crF4ZrvwdaA/3R0i58hHcX7+LQhhvqMu+Bp3+s0dkRouhlaoNprOYvraFRkl+QiziaD4iOiI9ZGhOVeujtklE1ut/EdoBbuYjVU0mumqHwCx3/aTxfMr/1sl9xwQvdqTh9ZQstpg9EkLllQSChFVBg73f/shhBHGCzl+fcJecvzK8XQzGyOm6reKfmaL32e4J4ItRomSQE+ABKR+isG3PJVy6PH8GYg+hV4Ohi/Q00FJaFzOvt74cjy/b7N2CUEeNaaZTDN0r8mXpiX2W5ikxGARc3p/I7s8CXQyj0vQmKA58qkUou2h9SfdkMz5HDTqqY2b9EbL3wERPBcWb6XFTUzNV31kPF/0/EzVYadjoQeK/WRWLtmZgg2y8V47mVvLaRsYS5BRI54PwOkfuw5MXFVPz8rWtA0iDJl//ewUXENynQSSCYyDXLS5DZtGnbY8NeERk0glHw06/seqZtcFqrLeb0x/t/VpEzphTy53P87YNKQ4q5vzHbhX1fiGdQUrWIKreTFHBIW2k6yTPADfGzIApYVjT2GfV2VOD4hTkrXHn4GHRXKlAg9CNocDCJo/DppGO2ZLwluACVjlP1OqtzPYFJFxcgnf0HuSkqYWEJUKrx1JtK3rC6uJpS3T5uGyXcIc9sRT9+9Fbc0AjVSpCsr8GpvnliYNSFLY+yein0UKKmSfpI9tTgn3CL9Bt0PMS9Y3ia0sxcMGTjmLtse3bzdFUt1neAuTIjy42F4NxstxXiBwWZmKkr2S/D58FNrMp5lmkCF2Tt0qrxv6BarMCfei4dM2AVJrM5BEa1x0CD/qS7xKjDmqtBXzwuWfBrFfkxlAz+3qF/Xsvbe/9b5Q3bU6MAPOermH89uZHJNDQNDEv2d2dUm7juVvKfRT5wQiNkLudegAE9t+Zc5FK8OdrRt9Z0cp4fRQW0O320mirJ4bTvohhASA7Xo3VKhziMZUiZir5+MeNZ7lBTVmYGgZ5gNDkGs8eq9pGnu+SFIHxZR7fqZSu2rBtJoWTH68bpb0I7BiVBy4ZubDxfMxPnAF1uwAZQO0terzZ0D4gVZcP9fzSRtafpbr44WIHF8XFyDKpN/oEPXxf6BcN7PGPLOLQwiYfr/O9LCDmH70hOd6ZcHAU+nMmfsI62VkhfFuO8Cbyf6+9qwA/u3iq2Nh/jQE1mrugxx9SLNcoHN+KQny1qioEvZOzi1T1QPmezH/MCC6j7xL7sB0AQ==
1.0
dVpycdl8G4qrDKZZF/283HIUuAae7yh0UXZb+Dqan+MEjRWt6HTt43Q1SfQgPcLtg9b4833uLIkxgglppF82QkSgJyY6TDRGgaubNE5vQ4P8ZTjP2I08Cet2Qokff1CCnccVT+Or/yJ5PlziXdBHZkVhaes8Gv8CKNfQqzt0WVw= - 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
non_priority
dqan or lqhhvqmu atxfmr shhbhgczl abkr ezvyadjoqek t xsvbe
0
14,023
16,823,885,292
IssuesEvent
2021-06-17 15:58:52
prisma/prisma
https://api.github.com/repos/prisma/prisma
closed
PANIC in query-engine/connectors/mongodb-query-connector/src/root_queries/read.rs:101:74called `Option::unwrap()` on a `None` value
bug/1-repro-available kind/bug process/candidate team/developer-productivity topic: mongodb
I am using mongoDB early-access and have noticed that the prisma client is not working. I was able to replicate the issue in a little demo app. Please find the autogenerated report and my code snippets below. @matthewmueller, you asked me to create a feature request for one-directional relationships and to report a bug regarding my prisma client issue. Please see below my prisma schema and my thoughts on it in the comments. If prisma client works, I really don't mind how prisma is handling the relationships internally and I am fine with the two-directional relationship in the prisma.schema. But again, from a mongoose / mongoDB perspective, the pointer back from the other relationship (Ingredient) is kind of unnecessary. I hope that thought process makes sense! But also, it really doesn't matter as long as its not shown in the DB and prisma client works! 💯 Thanks for your support! 🙏 Hi Prisma Team! My Prisma Client just crashed. This is the report: ## Versions | Name | Version | |-----------------|--------------------| | Node | v14.15.4 | | OS | undefined| | Prisma Client | in-memory | | Query Engine | query-engine c838e79f39885bc8e1611849b1eb28b5bb5bc922| | Database | undefined| ## Query ``` query { findManyIngredient( take: 5 skip: 5 ) { id name type createdAt updatedAt defaultIn { id name createdAt updatedAt ingredientIds substitutionIds } alternativeFor { id name createdAt updatedAt ingredientIds substitutionIds } } } ``` ## Logs ``` raf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine prisma:engine { flags: [ '--enable-raw-queries', '--port', '60387' ] } plusX Execution permissions of /Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine plusX Execution permissions of /Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine prisma:engine { flags: [ '--enable-raw-queries', '--port', '60388' ] } prisma:engine stdout Started http server on http://127.0.0.1:60387 prisma:engine stdout Started http server on http://127.0.0.1:60388 plusX Execution permissions of /Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine plusX Execution permissions of /Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine prisma:engine Client Version: in-memory prisma:engine Engine Version: query-engine c838e79f39885bc8e1611849b1eb28b5bb5bc922 prisma:engine Active provider: mongodb prisma:engine Client Version: in-memory prisma:engine Engine Version: query-engine c838e79f39885bc8e1611849b1eb28b5bb5bc922 prisma:engine Active provider: mongodb prisma:engine stdout PANIC in query-engine/connectors/mongodb-query-connector/src/root_queries/read.rs:101:74 called `Option::unwrap()` on a `None` value prisma:engine { prisma:engine error: SocketError: other side closed prisma:engine at Socket.onSocketEnd (/Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/prisma-client/runtime/index.js:25736:24) prisma:engine at Socket.emit (events.js:327:22) prisma:engine at Socket.EventEmitter.emit (domain.js:467:12) prisma:engine at endReadableNT (internal/streams/readable.js:1327:12) prisma:engine at processTicksAndRejections (internal/process/task_queues.js:80:21) { prisma:engine code: 'UND_ERR_SOCKET' prisma:engine } prisma:engine } prisma:engine { prisma:engine error: Error: connect ECONNREFUSED 127.0.0.1:60388 prisma:engine at TCPConnectWrap.afterConnect [as oncomplete] (net.js:1146:16) { prisma:engine errno: -61, prisma:engine code: 'ECONNREFUSED', prisma:engine syscall: 'connect', prisma:engine address: '127.0.0.1', prisma:engine port: 60388 prisma:engine } prisma:engine } prisma:engine { cwd: '/Users/andrelandgraf/workspaces/demo/prisma' } plusX Execution permissions of /Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine prisma:engine { flags: [ '--enable-raw-queries', '--port', '60400' ] } prisma:engine Stopping Prisma engine4 prisma:engine Waiting for start promise prisma:engine Done waiting for start promise prisma:engine stdout Started http server on http://127.0.0.1:60400 plusX Execution permissions of /Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine prisma:engine Client Version: in-memory prisma:engine Engine Version: query-engine c838e79f39885bc8e1611849b1eb28b5bb5bc922 prisma:engine Active provider: mongodb prisma:engine stdout PANIC in query-engine/connectors/mongodb-query-connector/src/root_queries/read.rs:101:74 called `Option::unwrap()` on a `None` value prisma:engine { prisma:engine error: SocketError: other side closed prisma:engine at Socket.onSocketEnd (/Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/prisma-client/runtime/index.js:25736:24) prisma:engine at Socket.emit (events.js:327:22) prisma:engine at Socket.EventEmitter.emit (domain.js:467:12) prisma:engine at endReadableNT (internal/streams/readable.js:1327:12) prisma:engine at processTicksAndRejections (internal/process/task_queues.js:80:21) { prisma:engine code: 'UND_ERR_SOCKET' prisma:engine } prisma:engine } ``` ## Client Snippet ```ts import { Ingredient, Recipe, FoodType } from '@prisma/client' import prisma from '../db.server'; // in my case that I try to simplify here, there would be separate forms, so lets make separate queries const ingredient = await prisma.ingredient.create({ data: { name: ingredientName, type: FoodType.dairy // we only support dairy for now... } }); const alternative = await prisma.ingredient.create({ data: { name: alternativeName, type: FoodType.dairy }}) // recipe will be created somewhen later. Ingredients have to be able to "live" without them! // const recipe = await prisma.recipe.create({ data: { // name, // ingredientIds: [ingredient.id], // substitutionIds: [alternative.id] // }}) ``` ## Schema ```prisma datasource db { provider = "mongodb" url = env("DATABASE_URL") } generator client { provider = "prisma-client-js" previewFeatures = ["mongodb"] } enum FoodType { veggie fruit meat dairy } model Ingredient { id String @id @default(dbgenerated()) @map("_id") @db.ObjectId name String @unique type FoodType createdAt DateTime @default(now()) updatedAt DateTime @updatedAt // fields below would not be necessary in mongoose / NoSQL-land // but I guess they don't hurt either // maybe it even provides some nice basic for advanced analytics defaultIn Recipe[] @relation("DefaultIntegredients") alternativeFor Recipe[] @relation("HealthierIntegredients") } model Recipe { id String @id @default(dbgenerated()) @map("_id") @db.ObjectId name String @unique createdAt DateTime @default(now()) updatedAt DateTime @updatedAt // the default ingredients for this recipe ingredients Ingredient[] @relation("DefaultIntegredients", fields: [ingredientIds], references: [id]) ingredientIds String[] @db.ObjectId substitutions Ingredient[] @relation("HealthierIntegredients", fields: [ingredientIds], references: [id]) substitutionIds String[] @db.ObjectId } ```
1.0
PANIC in query-engine/connectors/mongodb-query-connector/src/root_queries/read.rs:101:74called `Option::unwrap()` on a `None` value - I am using mongoDB early-access and have noticed that the prisma client is not working. I was able to replicate the issue in a little demo app. Please find the autogenerated report and my code snippets below. @matthewmueller, you asked me to create a feature request for one-directional relationships and to report a bug regarding my prisma client issue. Please see below my prisma schema and my thoughts on it in the comments. If prisma client works, I really don't mind how prisma is handling the relationships internally and I am fine with the two-directional relationship in the prisma.schema. But again, from a mongoose / mongoDB perspective, the pointer back from the other relationship (Ingredient) is kind of unnecessary. I hope that thought process makes sense! But also, it really doesn't matter as long as its not shown in the DB and prisma client works! 💯 Thanks for your support! 🙏 Hi Prisma Team! My Prisma Client just crashed. This is the report: ## Versions | Name | Version | |-----------------|--------------------| | Node | v14.15.4 | | OS | undefined| | Prisma Client | in-memory | | Query Engine | query-engine c838e79f39885bc8e1611849b1eb28b5bb5bc922| | Database | undefined| ## Query ``` query { findManyIngredient( take: 5 skip: 5 ) { id name type createdAt updatedAt defaultIn { id name createdAt updatedAt ingredientIds substitutionIds } alternativeFor { id name createdAt updatedAt ingredientIds substitutionIds } } } ``` ## Logs ``` raf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine prisma:engine { flags: [ '--enable-raw-queries', '--port', '60387' ] } plusX Execution permissions of /Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine plusX Execution permissions of /Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine prisma:engine { flags: [ '--enable-raw-queries', '--port', '60388' ] } prisma:engine stdout Started http server on http://127.0.0.1:60387 prisma:engine stdout Started http server on http://127.0.0.1:60388 plusX Execution permissions of /Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine plusX Execution permissions of /Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine prisma:engine Client Version: in-memory prisma:engine Engine Version: query-engine c838e79f39885bc8e1611849b1eb28b5bb5bc922 prisma:engine Active provider: mongodb prisma:engine Client Version: in-memory prisma:engine Engine Version: query-engine c838e79f39885bc8e1611849b1eb28b5bb5bc922 prisma:engine Active provider: mongodb prisma:engine stdout PANIC in query-engine/connectors/mongodb-query-connector/src/root_queries/read.rs:101:74 called `Option::unwrap()` on a `None` value prisma:engine { prisma:engine error: SocketError: other side closed prisma:engine at Socket.onSocketEnd (/Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/prisma-client/runtime/index.js:25736:24) prisma:engine at Socket.emit (events.js:327:22) prisma:engine at Socket.EventEmitter.emit (domain.js:467:12) prisma:engine at endReadableNT (internal/streams/readable.js:1327:12) prisma:engine at processTicksAndRejections (internal/process/task_queues.js:80:21) { prisma:engine code: 'UND_ERR_SOCKET' prisma:engine } prisma:engine } prisma:engine { prisma:engine error: Error: connect ECONNREFUSED 127.0.0.1:60388 prisma:engine at TCPConnectWrap.afterConnect [as oncomplete] (net.js:1146:16) { prisma:engine errno: -61, prisma:engine code: 'ECONNREFUSED', prisma:engine syscall: 'connect', prisma:engine address: '127.0.0.1', prisma:engine port: 60388 prisma:engine } prisma:engine } prisma:engine { cwd: '/Users/andrelandgraf/workspaces/demo/prisma' } plusX Execution permissions of /Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine prisma:engine { flags: [ '--enable-raw-queries', '--port', '60400' ] } prisma:engine Stopping Prisma engine4 prisma:engine Waiting for start promise prisma:engine Done waiting for start promise prisma:engine stdout Started http server on http://127.0.0.1:60400 plusX Execution permissions of /Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/engines/c838e79f39885bc8e1611849b1eb28b5bb5bc922/query-engine-darwin are fine prisma:engine Client Version: in-memory prisma:engine Engine Version: query-engine c838e79f39885bc8e1611849b1eb28b5bb5bc922 prisma:engine Active provider: mongodb prisma:engine stdout PANIC in query-engine/connectors/mongodb-query-connector/src/root_queries/read.rs:101:74 called `Option::unwrap()` on a `None` value prisma:engine { prisma:engine error: SocketError: other side closed prisma:engine at Socket.onSocketEnd (/Users/andrelandgraf/.npm/_npx/2778af9cee32ff87/node_modules/prisma/prisma-client/runtime/index.js:25736:24) prisma:engine at Socket.emit (events.js:327:22) prisma:engine at Socket.EventEmitter.emit (domain.js:467:12) prisma:engine at endReadableNT (internal/streams/readable.js:1327:12) prisma:engine at processTicksAndRejections (internal/process/task_queues.js:80:21) { prisma:engine code: 'UND_ERR_SOCKET' prisma:engine } prisma:engine } ``` ## Client Snippet ```ts import { Ingredient, Recipe, FoodType } from '@prisma/client' import prisma from '../db.server'; // in my case that I try to simplify here, there would be separate forms, so lets make separate queries const ingredient = await prisma.ingredient.create({ data: { name: ingredientName, type: FoodType.dairy // we only support dairy for now... } }); const alternative = await prisma.ingredient.create({ data: { name: alternativeName, type: FoodType.dairy }}) // recipe will be created somewhen later. Ingredients have to be able to "live" without them! // const recipe = await prisma.recipe.create({ data: { // name, // ingredientIds: [ingredient.id], // substitutionIds: [alternative.id] // }}) ``` ## Schema ```prisma datasource db { provider = "mongodb" url = env("DATABASE_URL") } generator client { provider = "prisma-client-js" previewFeatures = ["mongodb"] } enum FoodType { veggie fruit meat dairy } model Ingredient { id String @id @default(dbgenerated()) @map("_id") @db.ObjectId name String @unique type FoodType createdAt DateTime @default(now()) updatedAt DateTime @updatedAt // fields below would not be necessary in mongoose / NoSQL-land // but I guess they don't hurt either // maybe it even provides some nice basic for advanced analytics defaultIn Recipe[] @relation("DefaultIntegredients") alternativeFor Recipe[] @relation("HealthierIntegredients") } model Recipe { id String @id @default(dbgenerated()) @map("_id") @db.ObjectId name String @unique createdAt DateTime @default(now()) updatedAt DateTime @updatedAt // the default ingredients for this recipe ingredients Ingredient[] @relation("DefaultIntegredients", fields: [ingredientIds], references: [id]) ingredientIds String[] @db.ObjectId substitutions Ingredient[] @relation("HealthierIntegredients", fields: [ingredientIds], references: [id]) substitutionIds String[] @db.ObjectId } ```
non_priority
panic in query engine connectors mongodb query connector src root queries read rs option unwrap on a none value i am using mongodb early access and have noticed that the prisma client is not working i was able to replicate the issue in a little demo app please find the autogenerated report and my code snippets below matthewmueller you asked me to create a feature request for one directional relationships and to report a bug regarding my prisma client issue please see below my prisma schema and my thoughts on it in the comments if prisma client works i really don t mind how prisma is handling the relationships internally and i am fine with the two directional relationship in the prisma schema but again from a mongoose mongodb perspective the pointer back from the other relationship ingredient is kind of unnecessary i hope that thought process makes sense but also it really doesn t matter as long as its not shown in the db and prisma client works 💯 thanks for your support 🙏 hi prisma team my prisma client just crashed this is the report versions name version node os undefined prisma client in memory query engine query engine database undefined query query findmanyingredient take skip id name type createdat updatedat defaultin id name createdat updatedat ingredientids substitutionids alternativefor id name createdat updatedat ingredientids substitutionids logs raf npm npx node modules prisma engines query engine darwin are fine prisma engine flags plusx execution permissions of users andrelandgraf npm npx node modules prisma engines query engine darwin are fine plusx execution permissions of users andrelandgraf npm npx node modules prisma engines query engine darwin are fine prisma engine flags prisma engine stdout started http server on prisma engine stdout started http server on plusx execution permissions of users andrelandgraf npm npx node modules prisma engines query engine darwin are fine plusx execution permissions of users andrelandgraf npm npx node modules prisma engines query engine darwin are fine prisma engine client version in memory prisma engine engine version query engine prisma engine active provider mongodb prisma engine client version in memory prisma engine engine version query engine prisma engine active provider mongodb prisma engine stdout panic in query engine connectors mongodb query connector src root queries read rs called option unwrap on a none value prisma engine prisma engine error socketerror other side closed prisma engine at socket onsocketend users andrelandgraf npm npx node modules prisma prisma client runtime index js prisma engine at socket emit events js prisma engine at socket eventemitter emit domain js prisma engine at endreadablent internal streams readable js prisma engine at processticksandrejections internal process task queues js prisma engine code und err socket prisma engine prisma engine prisma engine prisma engine error error connect econnrefused prisma engine at tcpconnectwrap afterconnect net js prisma engine errno prisma engine code econnrefused prisma engine syscall connect prisma engine address prisma engine port prisma engine prisma engine prisma engine cwd users andrelandgraf workspaces demo prisma plusx execution permissions of users andrelandgraf npm npx node modules prisma engines query engine darwin are fine prisma engine flags prisma engine stopping prisma prisma engine waiting for start promise prisma engine done waiting for start promise prisma engine stdout started http server on plusx execution permissions of users andrelandgraf npm npx node modules prisma engines query engine darwin are fine prisma engine client version in memory prisma engine engine version query engine prisma engine active provider mongodb prisma engine stdout panic in query engine connectors mongodb query connector src root queries read rs called option unwrap on a none value prisma engine prisma engine error socketerror other side closed prisma engine at socket onsocketend users andrelandgraf npm npx node modules prisma prisma client runtime index js prisma engine at socket emit events js prisma engine at socket eventemitter emit domain js prisma engine at endreadablent internal streams readable js prisma engine at processticksandrejections internal process task queues js prisma engine code und err socket prisma engine prisma engine client snippet ts import ingredient recipe foodtype from prisma client import prisma from db server in my case that i try to simplify here there would be separate forms so lets make separate queries const ingredient await prisma ingredient create data name ingredientname type foodtype dairy we only support dairy for now const alternative await prisma ingredient create data name alternativename type foodtype dairy recipe will be created somewhen later ingredients have to be able to live without them const recipe await prisma recipe create data name ingredientids substitutionids schema prisma datasource db provider mongodb url env database url generator client provider prisma client js previewfeatures enum foodtype veggie fruit meat dairy model ingredient id string id default dbgenerated map id db objectid name string unique type foodtype createdat datetime default now updatedat datetime updatedat fields below would not be necessary in mongoose nosql land but i guess they don t hurt either maybe it even provides some nice basic for advanced analytics defaultin recipe relation defaultintegredients alternativefor recipe relation healthierintegredients model recipe id string id default dbgenerated map id db objectid name string unique createdat datetime default now updatedat datetime updatedat the default ingredients for this recipe ingredients ingredient relation defaultintegredients fields references ingredientids string db objectid substitutions ingredient relation healthierintegredients fields references substitutionids string db objectid
0
332,469
29,478,081,480
IssuesEvent
2023-06-02 01:17:36
DK96-OS/MathTools
https://api.github.com/repos/DK96-OS/MathTools
closed
Flaky Generator and Statistics Tests
testing
How to isolate these tests that occasionally fail due to statistical fluctuations, and use retry mechanics.
1.0
Flaky Generator and Statistics Tests - How to isolate these tests that occasionally fail due to statistical fluctuations, and use retry mechanics.
non_priority
flaky generator and statistics tests how to isolate these tests that occasionally fail due to statistical fluctuations and use retry mechanics
0
54,142
11,198,099,323
IssuesEvent
2020-01-03 15:06:37
tobiasanker/SakuraTree
https://api.github.com/repos/tobiasanker/SakuraTree
opened
Rework apt-blossoms
code cleanup / QA
## Cleanup-request ### Description The apt-blossoms have two big problems: - They are specific for debian-based systems - They are complex structures, which could be replaced by a set of multiple other existing blossoms and if-conditions. That why the should be moved to a more generic structure. Beside this, they should be transformed into a predefined subtree, which will be introduced with #109.
1.0
Rework apt-blossoms - ## Cleanup-request ### Description The apt-blossoms have two big problems: - They are specific for debian-based systems - They are complex structures, which could be replaced by a set of multiple other existing blossoms and if-conditions. That why the should be moved to a more generic structure. Beside this, they should be transformed into a predefined subtree, which will be introduced with #109.
non_priority
rework apt blossoms cleanup request description the apt blossoms have two big problems they are specific for debian based systems they are complex structures which could be replaced by a set of multiple other existing blossoms and if conditions that why the should be moved to a more generic structure beside this they should be transformed into a predefined subtree which will be introduced with
0
95,970
8,582,092,820
IssuesEvent
2018-11-13 16:10:46
spring-cloud/spring-cloud-dataflow-acceptance-tests
https://api.github.com/repos/spring-cloud/spring-cloud-dataflow-acceptance-tests
closed
Test the stream/task samples listed in the SCDF docs
in progress test-coverage
- [ ] Test all the samples - [ ] Fix where possible right away - [ ] Correct course when there is something that is not supported anymore - [ ] Remove stale samples - [ ] Automate all-the-things
1.0
Test the stream/task samples listed in the SCDF docs - - [ ] Test all the samples - [ ] Fix where possible right away - [ ] Correct course when there is something that is not supported anymore - [ ] Remove stale samples - [ ] Automate all-the-things
non_priority
test the stream task samples listed in the scdf docs test all the samples fix where possible right away correct course when there is something that is not supported anymore remove stale samples automate all the things
0
8,873
8,444,531,677
IssuesEvent
2018-10-18 18:43:01
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Suggest moving paragraph down one paragraph
app-service/svc assigned-to-author doc-enhancement triaged
The id tokens, access tokens, and refresh tokens cached for the authenticated session, and they're accessible only by the associated user. should be one paragraph down from where it is. --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 13176d24-57e1-33bb-1948-a086df502dca * Version Independent ID: 1c15986a-adf6-6f99-72b4-e2a351d0c15e * Content: [Authentication and authorization in Azure App Service](https://docs.microsoft.com/en-us/azure/app-service/app-service-authentication-overview) * Content Source: [articles/app-service/app-service-authentication-overview.md](https://github.com/Microsoft/azure-docs/blob/master/articles/app-service/app-service-authentication-overview.md) * Service: **app-service** * GitHub Login: @cephalin * Microsoft Alias: **mahender,cephalin**
1.0
Suggest moving paragraph down one paragraph - The id tokens, access tokens, and refresh tokens cached for the authenticated session, and they're accessible only by the associated user. should be one paragraph down from where it is. --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 13176d24-57e1-33bb-1948-a086df502dca * Version Independent ID: 1c15986a-adf6-6f99-72b4-e2a351d0c15e * Content: [Authentication and authorization in Azure App Service](https://docs.microsoft.com/en-us/azure/app-service/app-service-authentication-overview) * Content Source: [articles/app-service/app-service-authentication-overview.md](https://github.com/Microsoft/azure-docs/blob/master/articles/app-service/app-service-authentication-overview.md) * Service: **app-service** * GitHub Login: @cephalin * Microsoft Alias: **mahender,cephalin**
non_priority
suggest moving paragraph down one paragraph the id tokens access tokens and refresh tokens cached for the authenticated session and they re accessible only by the associated user should be one paragraph down from where it is document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service app service github login cephalin microsoft alias mahender cephalin
0
32,547
7,545,551,070
IssuesEvent
2018-04-17 22:04:33
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
program
code-of-conduct container-registry cxp triaged
[Enter feedback here] --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 11bbaa44-52ed-33fd-d710-af73d3665ec9 * Version Independent ID: b11deb17-311c-3aa3-78a7-1f8cdc7e9e5e * Content: [Azure Container Registry authentication with service principals](https://docs.microsoft.com/en-us/azure/container-registry/container-registry-auth-service-principal) * Content Source: [articles/container-registry/container-registry-auth-service-principal.md](https://github.com/Microsoft/azure-docs/blob/master/articles/container-registry/container-registry-auth-service-principal.md) * Service: **container-registry** * GitHub Login: @mmacy * Microsoft Alias: **marsma**
1.0
program - [Enter feedback here] --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 11bbaa44-52ed-33fd-d710-af73d3665ec9 * Version Independent ID: b11deb17-311c-3aa3-78a7-1f8cdc7e9e5e * Content: [Azure Container Registry authentication with service principals](https://docs.microsoft.com/en-us/azure/container-registry/container-registry-auth-service-principal) * Content Source: [articles/container-registry/container-registry-auth-service-principal.md](https://github.com/Microsoft/azure-docs/blob/master/articles/container-registry/container-registry-auth-service-principal.md) * Service: **container-registry** * GitHub Login: @mmacy * Microsoft Alias: **marsma**
non_priority
program document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service container registry github login mmacy microsoft alias marsma
0
163,043
20,257,653,558
IssuesEvent
2022-02-15 01:58:13
kapseliboi/crowi
https://api.github.com/repos/kapseliboi/crowi
opened
CVE-2021-37712 (High) detected in tar-4.4.8.tgz, tar-6.0.2.tgz
security vulnerability
## CVE-2021-37712 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tar-4.4.8.tgz</b>, <b>tar-6.0.2.tgz</b></p></summary> <p> <details><summary><b>tar-4.4.8.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.8.tgz">https://registry.npmjs.org/tar/-/tar-4.4.8.tgz</a></p> <p> Dependency Hierarchy: - cli-7.10.3.tgz (Root Library) - chokidar-2.1.8.tgz - fsevents-1.2.9.tgz - node-pre-gyp-0.12.0.tgz - :x: **tar-4.4.8.tgz** (Vulnerable Library) </details> <details><summary><b>tar-6.0.2.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-6.0.2.tgz">https://registry.npmjs.org/tar/-/tar-6.0.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cacache/node_modules/tar/package.json</p> <p> Dependency Hierarchy: - copy-webpack-plugin-6.0.2.tgz (Root Library) - cacache-15.0.4.tgz - :x: **tar-6.0.2.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p. <p>Publish Date: 2021-08-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37712>CVE-2021-37712</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p">https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p</a></p> <p>Release Date: 2021-08-31</p> <p>Fix Resolution: tar - 4.4.18, 5.0.10, 6.1.9</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-37712 (High) detected in tar-4.4.8.tgz, tar-6.0.2.tgz - ## CVE-2021-37712 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tar-4.4.8.tgz</b>, <b>tar-6.0.2.tgz</b></p></summary> <p> <details><summary><b>tar-4.4.8.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.8.tgz">https://registry.npmjs.org/tar/-/tar-4.4.8.tgz</a></p> <p> Dependency Hierarchy: - cli-7.10.3.tgz (Root Library) - chokidar-2.1.8.tgz - fsevents-1.2.9.tgz - node-pre-gyp-0.12.0.tgz - :x: **tar-4.4.8.tgz** (Vulnerable Library) </details> <details><summary><b>tar-6.0.2.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-6.0.2.tgz">https://registry.npmjs.org/tar/-/tar-6.0.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cacache/node_modules/tar/package.json</p> <p> Dependency Hierarchy: - copy-webpack-plugin-6.0.2.tgz (Root Library) - cacache-15.0.4.tgz - :x: **tar-6.0.2.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p. <p>Publish Date: 2021-08-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37712>CVE-2021-37712</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p">https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p</a></p> <p>Release Date: 2021-08-31</p> <p>Fix Resolution: tar - 4.4.18, 5.0.10, 6.1.9</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in tar tgz tar tgz cve high severity vulnerability vulnerable libraries tar tgz tar tgz tar tgz tar for node library home page a href dependency hierarchy cli tgz root library chokidar tgz fsevents tgz node pre gyp tgz x tar tgz vulnerable library tar tgz tar for node library home page a href path to dependency file package json path to vulnerable library node modules cacache node modules tar package json dependency hierarchy copy webpack plugin tgz root library cacache tgz x tar tgz vulnerable library found in base branch master vulnerability details the npm package tar aka node tar before versions and has an arbitrary file creation overwrite and arbitrary code execution vulnerability node tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted this is in part achieved by ensuring that extracted directories are not symlinks additionally in order to prevent unnecessary stat calls to determine whether a given path is a directory paths are cached when directories are created this logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value additionally on windows systems long path portions would resolve to the same file system entities as their short path counterparts a specially crafted tar archive could thus include a directory with one form of the path followed by a symbolic link with a different string that resolves to the same file system entity followed by a file using the first form by first creating a directory and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem it was thus possible to bypass node tar symlink checks on directories essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location thus allowing arbitrary file creation and overwrite these issues were addressed in releases and the branch of node tar has been deprecated and did not receive patches for these issues if you are still using a release we recommend you update to a more recent version of node tar if this is not possible a workaround is available in the referenced ghsa publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tar step up your open source security game with whitesource
0
285,866
21,556,947,536
IssuesEvent
2022-04-30 15:32:11
BoettcherDasOriginal/LeoConsole
https://api.github.com/repos/BoettcherDasOriginal/LeoConsole
opened
[Documetation] Wiki rework & README rework
documentation verified
# Description The README and wiki need to be made more informative and user-friendly # To Do: - [ ] rework README - [ ] rework Wiki
1.0
[Documetation] Wiki rework & README rework - # Description The README and wiki need to be made more informative and user-friendly # To Do: - [ ] rework README - [ ] rework Wiki
non_priority
wiki rework readme rework description the readme and wiki need to be made more informative and user friendly to do rework readme rework wiki
0
196,987
22,572,063,616
IssuesEvent
2022-06-28 01:51:19
ignatandrei/SimpleBookRental
https://api.github.com/repos/ignatandrei/SimpleBookRental
opened
CVE-2021-42740 (High) detected in shell-quote-1.7.2.tgz
security vulnerability
## CVE-2021-42740 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>shell-quote-1.7.2.tgz</b></p></summary> <p>quote and parse shell commands</p> <p>Library home page: <a href="https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz">https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz</a></p> <p>Path to dependency file: /src/WebDashboard/book-dashboard/package.json</p> <p>Path to vulnerable library: /src/WebDashboard/book-dashboard/node_modules/shell-quote/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.3.0.tgz (Root Library) - react-dev-utils-10.0.0.tgz - :x: **shell-quote-1.7.2.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character. <p>Publish Date: 2021-10-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42740>CVE-2021-42740</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42740">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42740</a></p> <p>Release Date: 2021-10-21</p> <p>Fix Resolution: shell-quote - 1.7.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-42740 (High) detected in shell-quote-1.7.2.tgz - ## CVE-2021-42740 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>shell-quote-1.7.2.tgz</b></p></summary> <p>quote and parse shell commands</p> <p>Library home page: <a href="https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz">https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz</a></p> <p>Path to dependency file: /src/WebDashboard/book-dashboard/package.json</p> <p>Path to vulnerable library: /src/WebDashboard/book-dashboard/node_modules/shell-quote/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.3.0.tgz (Root Library) - react-dev-utils-10.0.0.tgz - :x: **shell-quote-1.7.2.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character. <p>Publish Date: 2021-10-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42740>CVE-2021-42740</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42740">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42740</a></p> <p>Release Date: 2021-10-21</p> <p>Fix Resolution: shell-quote - 1.7.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in shell quote tgz cve high severity vulnerability vulnerable library shell quote tgz quote and parse shell commands library home page a href path to dependency file src webdashboard book dashboard package json path to vulnerable library src webdashboard book dashboard node modules shell quote package json dependency hierarchy react scripts tgz root library react dev utils tgz x shell quote tgz vulnerable library vulnerability details the shell quote package before for node js allows command injection an attacker can inject unescaped shell metacharacters through a regex designed to support windows drive letters if the output of this package is passed to a real shell as a quoted argument to a command with exec an attacker can inject arbitrary commands this is because the windows drive letter regex character class is a z instead of the correct a za z several shell metacharacters exist in the space between capital letter z and lower case letter a such as the backtick character publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution shell quote step up your open source security game with mend
0
2,142
4,272,560,830
IssuesEvent
2016-07-13 14:50:46
IBM-Bluemix/logistics-wizard
https://api.github.com/repos/IBM-Bluemix/logistics-wizard
opened
Use transaction in ERP simulator to avoid corruption of data in concurrent API calls
erp-service story
Aim of this story is to review the ERP simulator and use Loopback transactions whenever needed. Typically in demo.js, shipment.js, some remote methods alter multiple tables and objects at the same time. These methods should be protected against concurrent API calls that could potentially corrupt the data - as example executing two different shipment approvals at the same time could corrupt the inventory data today.
1.0
Use transaction in ERP simulator to avoid corruption of data in concurrent API calls - Aim of this story is to review the ERP simulator and use Loopback transactions whenever needed. Typically in demo.js, shipment.js, some remote methods alter multiple tables and objects at the same time. These methods should be protected against concurrent API calls that could potentially corrupt the data - as example executing two different shipment approvals at the same time could corrupt the inventory data today.
non_priority
use transaction in erp simulator to avoid corruption of data in concurrent api calls aim of this story is to review the erp simulator and use loopback transactions whenever needed typically in demo js shipment js some remote methods alter multiple tables and objects at the same time these methods should be protected against concurrent api calls that could potentially corrupt the data as example executing two different shipment approvals at the same time could corrupt the inventory data today
0
236,454
18,097,964,142
IssuesEvent
2021-09-22 11:13:12
alphagov/govuk-frontend
https://api.github.com/repos/alphagov/govuk-frontend
opened
Add info about automated tools to accessibility criteria document
documentation accessibility
## What Based on user feedback, add info about automated tools to [accessibility criteria doc](https://github.com/alphagov/govuk-frontend/blob/main/docs/contributing/test-components-using-accessibility-acceptance-criteria.md). ## Why After we got 2i approval to publish our accessibility criteria, we realised it lacked content about automated tools that help detect accessibility issues. ### Points to consider - according to [GOV.UK's blog on testing with a deliberately inaccessible webpage](https://accessibility.blog.gov.uk/2017/02/24/what-we-found-when-we-tested-tools-on-the-worlds-least-accessible-webpage/), 29% of the accessibility barriers went undetected by any of the 10 automated tools used - for more info, see the section titled 'Lots of the barriers weren’t found by any of the tools' - however, automated tools (for example, Axe, SiteImprove) are still useful for picking up basic issues - we'd like to hear from the Design System community about the automated tools they find useful ## Who needs to know about this Technical Writer, Community Manager, Developers ## Done when - [ ] Developer and Technical Writer draft update - [ ] Update receives review from teammate - [ ] Update passes 2i - [ ] We publish update
1.0
Add info about automated tools to accessibility criteria document - ## What Based on user feedback, add info about automated tools to [accessibility criteria doc](https://github.com/alphagov/govuk-frontend/blob/main/docs/contributing/test-components-using-accessibility-acceptance-criteria.md). ## Why After we got 2i approval to publish our accessibility criteria, we realised it lacked content about automated tools that help detect accessibility issues. ### Points to consider - according to [GOV.UK's blog on testing with a deliberately inaccessible webpage](https://accessibility.blog.gov.uk/2017/02/24/what-we-found-when-we-tested-tools-on-the-worlds-least-accessible-webpage/), 29% of the accessibility barriers went undetected by any of the 10 automated tools used - for more info, see the section titled 'Lots of the barriers weren’t found by any of the tools' - however, automated tools (for example, Axe, SiteImprove) are still useful for picking up basic issues - we'd like to hear from the Design System community about the automated tools they find useful ## Who needs to know about this Technical Writer, Community Manager, Developers ## Done when - [ ] Developer and Technical Writer draft update - [ ] Update receives review from teammate - [ ] Update passes 2i - [ ] We publish update
non_priority
add info about automated tools to accessibility criteria document what based on user feedback add info about automated tools to why after we got approval to publish our accessibility criteria we realised it lacked content about automated tools that help detect accessibility issues points to consider according to of the accessibility barriers went undetected by any of the automated tools used for more info see the section titled lots of the barriers weren’t found by any of the tools however automated tools for example axe siteimprove are still useful for picking up basic issues we d like to hear from the design system community about the automated tools they find useful who needs to know about this technical writer community manager developers done when developer and technical writer draft update update receives review from teammate update passes we publish update
0
122,728
17,762,198,145
IssuesEvent
2021-08-29 22:32:38
ghc-dev/Jeffrey-Robinson-III
https://api.github.com/repos/ghc-dev/Jeffrey-Robinson-III
opened
CVE-2019-5413 (High) detected in morgan-1.6.1.tgz
security vulnerability
## CVE-2019-5413 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>morgan-1.6.1.tgz</b></p></summary> <p>HTTP request logger middleware for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/morgan/-/morgan-1.6.1.tgz">https://registry.npmjs.org/morgan/-/morgan-1.6.1.tgz</a></p> <p>Path to dependency file: Jeffrey-Robinson-III/package.json</p> <p>Path to vulnerable library: /node_modules/morgan/package.json</p> <p> Dependency Hierarchy: - :x: **morgan-1.6.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Jeffrey-Robinson-III/commit/ec04a6ec8a73d487cd30936b78859d9a2f6f122c">ec04a6ec8a73d487cd30936b78859d9a2f6f122c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1. <p>Publish Date: 2019-03-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-5413>CVE-2019-5413</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://hackerone.com/reports/390881">https://hackerone.com/reports/390881</a></p> <p>Release Date: 2019-03-21</p> <p>Fix Resolution: 1.9.1</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"morgan","packageVersion":"1.6.1","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"morgan:1.6.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.9.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-5413","vulnerabilityDetails":"An attacker can use the format parameter to inject arbitrary commands in the npm package morgan \u003c 1.9.1.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-5413","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-5413 (High) detected in morgan-1.6.1.tgz - ## CVE-2019-5413 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>morgan-1.6.1.tgz</b></p></summary> <p>HTTP request logger middleware for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/morgan/-/morgan-1.6.1.tgz">https://registry.npmjs.org/morgan/-/morgan-1.6.1.tgz</a></p> <p>Path to dependency file: Jeffrey-Robinson-III/package.json</p> <p>Path to vulnerable library: /node_modules/morgan/package.json</p> <p> Dependency Hierarchy: - :x: **morgan-1.6.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Jeffrey-Robinson-III/commit/ec04a6ec8a73d487cd30936b78859d9a2f6f122c">ec04a6ec8a73d487cd30936b78859d9a2f6f122c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1. <p>Publish Date: 2019-03-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-5413>CVE-2019-5413</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://hackerone.com/reports/390881">https://hackerone.com/reports/390881</a></p> <p>Release Date: 2019-03-21</p> <p>Fix Resolution: 1.9.1</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"morgan","packageVersion":"1.6.1","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"morgan:1.6.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.9.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-5413","vulnerabilityDetails":"An attacker can use the format parameter to inject arbitrary commands in the npm package morgan \u003c 1.9.1.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-5413","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in morgan tgz cve high severity vulnerability vulnerable library morgan tgz http request logger middleware for node js library home page a href path to dependency file jeffrey robinson iii package json path to vulnerable library node modules morgan package json dependency hierarchy x morgan tgz vulnerable library found in head commit a href found in base branch master vulnerability details an attacker can use the format parameter to inject arbitrary commands in the npm package morgan publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree morgan isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails an attacker can use the format parameter to inject arbitrary commands in the npm package morgan vulnerabilityurl
0
113,937
24,515,603,367
IssuesEvent
2022-10-11 04:32:40
sourcegraph/sourcegraph
https://api.github.com/repos/sourcegraph/sourcegraph
opened
Detect URLs in string literals and make them clickable
team/code-intelligence
This would be a small but nice QoL improvement. Often one has URLs in string literals, GitHub and many editors detect these and make them clickable. I suspect it shouldn't be terribly hard to do given that it doesn't need to be reliably, and can probably be accomplished by using a non-backtracking regex to start out...
1.0
Detect URLs in string literals and make them clickable - This would be a small but nice QoL improvement. Often one has URLs in string literals, GitHub and many editors detect these and make them clickable. I suspect it shouldn't be terribly hard to do given that it doesn't need to be reliably, and can probably be accomplished by using a non-backtracking regex to start out...
non_priority
detect urls in string literals and make them clickable this would be a small but nice qol improvement often one has urls in string literals github and many editors detect these and make them clickable i suspect it shouldn t be terribly hard to do given that it doesn t need to be reliably and can probably be accomplished by using a non backtracking regex to start out
0
7,760
8,050,637,409
IssuesEvent
2018-08-01 14:00:34
google/recaptcha
https://api.github.com/repos/google/recaptcha
closed
Broken, doesn't work as a CAPTCHA service and should be removed from internet
service discussion
For the past year reCAPTCHA has been broken. 9 out of 10 correct CAPTCHA submissions are returned as "Please try again". Many people have made videos about this but people just roll over and take it. @rowan-m You really need to fix this.
1.0
Broken, doesn't work as a CAPTCHA service and should be removed from internet - For the past year reCAPTCHA has been broken. 9 out of 10 correct CAPTCHA submissions are returned as "Please try again". Many people have made videos about this but people just roll over and take it. @rowan-m You really need to fix this.
non_priority
broken doesn t work as a captcha service and should be removed from internet for the past year recaptcha has been broken out of correct captcha submissions are returned as please try again many people have made videos about this but people just roll over and take it rowan m you really need to fix this
0
194,701
15,438,004,431
IssuesEvent
2021-03-07 18:46:51
JosueNicholson/ufc-gc-equipe1-2020.2.io
https://api.github.com/repos/JosueNicholson/ufc-gc-equipe1-2020.2.io
opened
Criar README.md com os passos básicos para rodar o projeto.
documentation
Descrever no README.md como abrir o projeto, além de conter uma breve descrição das tecnologias usadas no projeto.
1.0
Criar README.md com os passos básicos para rodar o projeto. - Descrever no README.md como abrir o projeto, além de conter uma breve descrição das tecnologias usadas no projeto.
non_priority
criar readme md com os passos básicos para rodar o projeto descrever no readme md como abrir o projeto além de conter uma breve descrição das tecnologias usadas no projeto
0
144,311
22,326,147,152
IssuesEvent
2022-06-14 10:48:04
Khanhtran47/react-movie
https://api.github.com/repos/Khanhtran47/react-movie
opened
Filter component
feature design
sadge nextui chưa có component select :( chắc xài tạm hàng của mui hoặc đợi khi mô có select của next thì lm ✌️
1.0
Filter component - sadge nextui chưa có component select :( chắc xài tạm hàng của mui hoặc đợi khi mô có select của next thì lm ✌️
non_priority
filter component sadge nextui chưa có component select chắc xài tạm hàng của mui hoặc đợi khi mô có select của next thì lm ✌️
0
27,649
11,524,338,179
IssuesEvent
2020-02-15 00:10:37
ambergkim/todo-api
https://api.github.com/repos/ambergkim/todo-api
opened
1324:handlebars:Arbitrary Code Execution
high security
No CVE CWE CWE-79 No References Versions of `handlebars` prior to 4.5.3 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It is due to an incomplete fix for a [previous issue](https://www.npmjs.com/advisories/1316). This vulnerability can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting). @ambergkim
True
1324:handlebars:Arbitrary Code Execution - No CVE CWE CWE-79 No References Versions of `handlebars` prior to 4.5.3 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It is due to an incomplete fix for a [previous issue](https://www.npmjs.com/advisories/1316). This vulnerability can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting). @ambergkim
non_priority
handlebars arbitrary code execution no cve cwe cwe no references versions of handlebars prior to are vulnerable to arbitrary code execution the package s lookup helper fails to properly validate templates allowing attackers to submit templates that execute arbitrary javascript in the system it is due to an incomplete fix for a this vulnerability can be used to run arbitrary code in a server processing handlebars templates or on a victim s browser effectively serving as cross site scripting ambergkim
0
274,271
29,953,112,949
IssuesEvent
2023-06-23 04:20:24
kxxt/aspeak
https://api.github.com/repos/kxxt/aspeak
closed
reqwest-0.11.18.crate: 1 vulnerabilities (highest severity is: 5.5) - autoclosed
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>reqwest-0.11.18.crate</b></p></summary> <p></p> <p> </details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (reqwest version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [WS-2023-0195](https://github.com/sfackler/rust-openssl/commit/f03a2dc8074ff87bf8502194d955f6d60c8fff65) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | openssl-0.10.54.crate | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> WS-2023-0195</summary> ### Vulnerable Library - <b>openssl-0.10.54.crate</b></p> <p>OpenSSL bindings</p> <p>Library home page: <a href="https://crates.io/api/v1/crates/openssl/0.10.54/download">https://crates.io/api/v1/crates/openssl/0.10.54/download</a></p> <p> Dependency Hierarchy: - reqwest-0.11.18.crate (Root Library) - tokio-native-tls-0.3.1.crate - native-tls-0.2.11.crate - :x: **openssl-0.10.54.crate** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> `openssl` `X509VerifyParamRef::set_host` buffer over-read <p>Publish Date: 2023-06-22 <p>URL: <a href=https://github.com/sfackler/rust-openssl/commit/f03a2dc8074ff87bf8502194d955f6d60c8fff65>WS-2023-0195</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-xcf7-rvmh-g6q4">https://github.com/advisories/GHSA-xcf7-rvmh-g6q4</a></p> <p>Release Date: 2023-06-22</p> <p>Fix Resolution: openssl - 0.10.55</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
True
reqwest-0.11.18.crate: 1 vulnerabilities (highest severity is: 5.5) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>reqwest-0.11.18.crate</b></p></summary> <p></p> <p> </details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (reqwest version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [WS-2023-0195](https://github.com/sfackler/rust-openssl/commit/f03a2dc8074ff87bf8502194d955f6d60c8fff65) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | openssl-0.10.54.crate | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> WS-2023-0195</summary> ### Vulnerable Library - <b>openssl-0.10.54.crate</b></p> <p>OpenSSL bindings</p> <p>Library home page: <a href="https://crates.io/api/v1/crates/openssl/0.10.54/download">https://crates.io/api/v1/crates/openssl/0.10.54/download</a></p> <p> Dependency Hierarchy: - reqwest-0.11.18.crate (Root Library) - tokio-native-tls-0.3.1.crate - native-tls-0.2.11.crate - :x: **openssl-0.10.54.crate** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> `openssl` `X509VerifyParamRef::set_host` buffer over-read <p>Publish Date: 2023-06-22 <p>URL: <a href=https://github.com/sfackler/rust-openssl/commit/f03a2dc8074ff87bf8502194d955f6d60c8fff65>WS-2023-0195</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-xcf7-rvmh-g6q4">https://github.com/advisories/GHSA-xcf7-rvmh-g6q4</a></p> <p>Release Date: 2023-06-22</p> <p>Fix Resolution: openssl - 0.10.55</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
non_priority
reqwest crate vulnerabilities highest severity is autoclosed vulnerable library reqwest crate vulnerabilities cve severity cvss dependency type fixed in reqwest version remediation available medium openssl crate transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the details section below to see if there is a version of transitive dependency where vulnerability is fixed details ws vulnerable library openssl crate openssl bindings library home page a href dependency hierarchy reqwest crate root library tokio native tls crate native tls crate x openssl crate vulnerable library found in base branch main vulnerability details openssl set host buffer over read publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution openssl step up your open source security game with mend
0
17,546
6,472,961,304
IssuesEvent
2017-08-17 14:59:10
moby/moby
https://api.github.com/repos/moby/moby
closed
Docker Build returns Error code 100
area/builder
<!-- If you are reporting a new issue, make sure that we do not have any duplicates already open. You can ensure this by searching the issue list for this repository. If there is a duplicate, please close your issue and add a comment to the existing issue instead. If you suspect your issue is a bug, please edit your issue description to include the BUG REPORT INFORMATION shown below. If you fail to provide this information within 7 days, we cannot debug your issue and will close it. We will, however, reopen it if you later provide the information. For more information about reporting issues, see https://github.com/docker/docker/blob/master/CONTRIBUTING.md#reporting-other-issues --------------------------------------------------- GENERAL SUPPORT INFORMATION --------------------------------------------------- The GitHub issue tracker is for bug reports and feature requests. General support can be found at the following locations: - Docker Support Forums - https://forums.docker.com - IRC - irc.freenode.net #docker channel - Post a question on StackOverflow, using the Docker tag --------------------------------------------------- BUG REPORT INFORMATION --------------------------------------------------- Use the commands below to provide key information from your environment: You do NOT have to include this information if this is a FEATURE REQUEST --> **Description** I am trying to create a Docker for SoapUI. The Dockerfile being the following: ```Dockerfile FROM tibco/bwce:latest MAINTAINER tibco # Version ENV SOAPUI_VERSION 5.3.0 COPY Rest.xml /opt/bin/Rest.xml RUN chmod +x /opt/bin/Rest.xml # Download and unarchive SoapUI RUN apt-get update && apt-get install -y --force-yes wget && rm -rf /var/lib/apt/lists/* RUN wget https://www.dropbox.com/s/shz5d3b8ppvw150/SoapUI-x64-5.3.0.sh?dl=0 # Set working directory WORKDIR /opt/bin # Set environment ENV PATH ${PATH}:/opt/SoapUI/bin EXPOSE 3000 #CMD["/opt/bin/Rest.xml"] ``` At `step 6: RUN apt-get update && apt-get install -y --force-yes wget && rm -rf /var/lib/apt/lists/*` It is showing error. Kindly Help me solve this issue. :) The XML file used is as follows: <?xml version="1.0" encoding="UTF-8"?> <con:soapui-project id="d4f0816d-1cde-4797-a134-77a49a43d099" activeEnvironment="Default" name="REST Project 1" resourceRoot="" soapui-version="5.3.0" abortOnError="false" runType="SEQUENTIAL" xmlns:con="http://eviware.com/soapui/config"><con:settings/><con:interface xsi:type="con:RestService" id="1c79b0af-dc7e-4e76-8bad-7a3bbd91d7b4" wadlVersion="http://wadl.dev.java.net/2009/02" name="http://10.0.2.15:9620" type="rest" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><con:settings/><con:definitionCache type="TEXT" rootPart=""/><con:endpoints><con:endpoint>http://10.0.2.15:9620</con:endpoint></con:endpoints><con:resource name="Customer" path="/getdetails/customer" id="2b14e707-67c9-419c-84e1-4fef6e532eac"><con:settings/><con:parameters><con:parameter><con:name>gsm_number</con:name><con:value>9987654321</con:value><con:style>QUERY</con:style><con:default>9987654321</con:default><con:path xsi:nil="true"/><con:description xsi:nil="true"/></con:parameter></con:parameters><con:method name="Customer 1" id="e6a240ff-7a35-4820-b880-3f618db5d85f" method="GET"><con:settings/><con:parameters/><con:representation type="FAULT"><con:mediaType>text/html;charset=ISO-8859-1</con:mediaType><con:status>400</con:status><con:params/><con:element>html</con:element></con:representation><con:representation type="RESPONSE"><con:mediaType xsi:nil="true"/><con:status>0</con:status><con:params/><con:element>data</con:element></con:representation><con:representation type="RESPONSE"><con:mediaType>application/json;charset=UTF-8</con:mediaType><con:status>200</con:status><con:params/><con:element xmlns:cus="http://10.0.2.15/getdetails/customer">cus:Response</con:element></con:representation><con:representation type="FAULT"><con:mediaType>text/plain</con:mediaType><con:status>500</con:status><con:params/><con:element>data</con:element></con:representation><con:request name="Request 1" id="9d57e9f4-ae54-4dd4-921f-9c96ed397de4" mediaType="application/json"><con:settings><con:setting id="com.eviware.soapui.impl.wsdl.WsdlRequest@request-headers">&lt;entry key="Accept" value="application/json" xmlns="http://eviware.com/soapui/config"/></con:setting></con:settings><con:endpoint>http://tibco.local:9620</con:endpoint><con:request/><con:originalUri>http://10.0.2.15/getdetails/customer</con:originalUri><con:credentials><con:authType>No Authorization</con:authType></con:credentials><con:jmsConfig JMSDeliveryMode="PERSISTENT"/><con:jmsPropertyConfig/><con:parameters/><con:parameterOrder><con:entry>gsm_number</con:entry></con:parameterOrder></con:request></con:method></con:resource></con:interface><con:testSuite id="e6077c55-4fa4-4435-8976-eadeb1b68a30" name="TestSuite 1"><con:settings/><con:runType>SEQUENTIAL</con:runType><con:testCase id="7b1da7ec-72f0-4857-b6c7-b2244a9f8ade" failOnError="true" failTestCaseOnErrors="true" keepSession="false" maxResults="0" name="TestCase 1" searchProperties="true"><con:settings/><con:testStep type="restrequest" name="Good Data" id="4f379948-4195-472a-9d5d-91ee6c633c60"><con:settings/><con:config service="http://10.0.2.15:9620" resourcePath="/getdetails/customer" methodName="Customer 1" xsi:type="con:RestRequestStep" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><con:restRequest name="REST Request" id="9d57e9f4-ae54-4dd4-921f-9c96ed397de4" mediaType="application/json"><con:settings><con:setting id="com.eviware.soapui.impl.wsdl.WsdlRequest@request-headers">&lt;entry key="Accept" value="application/json" xmlns="http://eviware.com/soapui/config"/></con:setting></con:settings><con:endpoint>http://10.0.2.15:9620</con:endpoint><con:request/><con:originalUri>http://10.0.2.15/getdetails/customer</con:originalUri><con:assertion type="Valid HTTP Status Codes" id="2990776b-c73a-4427-9f30-c21d53681032" name="Valid HTTP Status Codes"><con:configuration><codes>500</codes></con:configuration></con:assertion><con:credentials><con:username/><con:password/><con:authType>No Authorization</con:authType></con:credentials><con:jmsConfig JMSDeliveryMode="PERSISTENT"/><con:jmsPropertyConfig/><con:parameters><entry key="gsm_number" value="0000" xmlns="http://eviware.com/soapui/config"/></con:parameters><con:parameterOrder><con:entry>gsm_number</con:entry></con:parameterOrder></con:restRequest></con:config></con:testStep><con:testStep type="restrequest" name="Bad Data" id="24ddbeac-958a-47f4-9b5d-e0248b9fb83e"><con:settings/><con:config service="http://10.0.2.15:9620" resourcePath="/getdetails/customer" methodName="Customer 1" xsi:type="con:RestRequestStep" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><con:restRequest name="Bad Data" id="9d57e9f4-ae54-4dd4-921f-9c96ed397de4" mediaType="application/json"><con:settings><con:setting id="com.eviware.soapui.impl.wsdl.WsdlRequest@request-headers">&lt;entry key="Accept" value="application/json" xmlns="http://eviware.com/soapui/config"/></con:setting></con:settings><con:endpoint>http://10.0.2.15:9620</con:endpoint><con:request/><con:originalUri>http://10.0.2.15/getdetails/customer</con:originalUri><con:assertion type="Invalid HTTP Status Codes" id="bae01ebe-2ad6-4c3d-8635-5bb686bf40f7" name="Invalid HTTP Status Codes"><con:configuration><codes>500, 400</codes></con:configuration></con:assertion><con:assertion type="JsonPath Match" id="3f7f2aa8-6c69-4598-9dcc-bed5248dac39" name="First"><con:configuration><path>$.CustomerDetail[:1].First_Name</path><content>[Henry]</content><allowWildcards>false</allowWildcards><ignoreNamspaceDifferences>false</ignoreNamspaceDifferences><ignoreComments>false</ignoreComments></con:configuration></con:assertion><con:assertion type="JsonPath Match" id="3f7f2aa8-6c69-4598-9dcc-bed5248dac39" name="LastName"><con:configuration><path>$.CustomerDetail[:1].Last_Name</path><content>[Andrew]</content><allowWildcards>false</allowWildcards><ignoreNamspaceDifferences>false</ignoreNamspaceDifferences><ignoreComments>false</ignoreComments></con:configuration></con:assertion><con:credentials><con:username/><con:password/><con:authType>No Authorization</con:authType></con:credentials><con:jmsConfig JMSDeliveryMode="PERSISTENT"/><con:jmsPropertyConfig/><con:parameters><entry key="gsm_number" value="9987654321" xmlns="http://eviware.com/soapui/config"/></con:parameters><con:parameterOrder><con:entry>gsm_number</con:entry></con:parameterOrder></con:restRequest></con:config></con:testStep><con:properties/></con:testCase><con:properties/></con:testSuite><con:properties/><con:wssContainer/><con:oAuth2ProfileContainer/><con:oAuth1ProfileContainer/><con:sensitiveInformation/></con:soapui-project> **Steps to reproduce the issue:** 1.docker build -t rest . **Describe the results you received:** [root@tibco Soap-ing]# docker build -t rest . Sending build context to Docker daemon 9.216kB Step 1/10 : FROM tibco/bwce:latest ---> 9c8245fefeca Step 2/10 : MAINTAINER tibco ---> Using cache ---> bebdfef8b85f Step 3/10 : ENV SOAPUI_VERSION 5.3.0 ---> Using cache ---> 52da46652b37 Step 4/10 : COPY Rest.xml /opt/bin/Rest.xml ---> Using cache ---> 513ac0aa43d6 Step 5/10 : RUN chmod +x /opt/bin/Rest.xml ---> Using cache ---> 4dbd0a783038 Step 6/10 : RUN apt-get update && apt-get install -y --force-yes wget && rm -rf /var/lib/apt/lists/* ---> [Warning] IPv4 forwarding is disabled. Networking will not work. ---> Running in 2d251ad256d1 Err http://deb.debian.org jessie InRelease Err http://security.debian.org jessie/updates InRelease Err http://deb.debian.org jessie-updates InRelease Err http://security.debian.org jessie/updates Release.gpg Temporary failure resolving 'security.debian.org' Err http://deb.debian.org jessie Release.gpg Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org jessie-updates Release.gpg Temporary failure resolving 'deb.debian.org' Reading package lists... W: Failed to fetch http://deb.debian.org/debian/dists/jessie/InRelease W: Failed to fetch http://deb.debian.org/debian/dists/jessie-updates/InRelease W: Failed to fetch http://security.debian.org/dists/jessie/updates/InRelease W: Failed to fetch http://deb.debian.org/debian/dists/jessie/Release.gpg Temporary failure resolving 'deb.debian.org' W: Failed to fetch http://security.debian.org/dists/jessie/updates/Release.gpg Temporary failure resolving 'security.debian.org' W: Failed to fetch http://deb.debian.org/debian/dists/jessie-updates/Release.gpg Temporary failure resolving 'deb.debian.org' W: Some index files failed to download. They have been ignored, or old ones used instead. Reading package lists... Building dependency tree... Reading state information... The following extra packages will be installed: ca-certificates libffi6 libgmp10 libgnutls-deb0-28 libhogweed2 libicu52 libidn11 libnettle4 libp11-kit0 libpsl0 libtasn1-6 openssl Suggested packages: gnutls-bin The following NEW packages will be installed: ca-certificates libffi6 libgmp10 libgnutls-deb0-28 libhogweed2 libicu52 libidn11 libnettle4 libp11-kit0 libpsl0 libtasn1-6 openssl wget 0 upgraded, 13 newly installed, 0 to remove and 1 not upgraded. Need to get 9748 kB of archives. After this operation, 35.6 MB of additional disk space will be used. WARNING: The following packages cannot be authenticated! libffi6 libtasn1-6 libgnutls-deb0-28 Err http://security.debian.org/ jessie/updates/main libffi6 amd64 3.1-2+deb8u1 Temporary failure resolving 'security.debian.org' Err http://deb.debian.org/debian/ jessie/main libgmp10 amd64 2:6.0.0+dfsg-6 Temporary failure resolving 'deb.debian.org' Err http://security.debian.org/ jessie/updates/main libtasn1-6 amd64 4.2-3+deb8u3 Temporary failure resolving 'security.debian.org' Err http://deb.debian.org/debian/ jessie/main libnettle4 amd64 2.7.1-5+deb8u2 Temporary failure resolving 'deb.debian.org' Err http://security.debian.org/ jessie/updates/main libgnutls-deb0-28 amd64 3.3.8-6+deb8u6 Temporary failure resolving 'security.debian.org' Err http://deb.debian.org/debian/ jessie/main libhogweed2 amd64 2.7.1-5+deb8u2 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main libp11-kit0 amd64 0.20.7-1 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main libidn11 amd64 1.29-1+deb8u2 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main libicu52 amd64 52.1-8+deb8u5 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main libpsl0 amd64 0.5.1-1 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main wget amd64 1.16-1+deb8u2 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main openssl amd64 1.0.1t-1+deb8u6 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main ca-certificates all 20141019+deb8u3 Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/g/gmp/libgmp10_6.0.0+dfsg-6_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/n/nettle/libnettle4_2.7.1-5+deb8u2_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/n/nettle/libhogweed2_2.7.1-5+deb8u2_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://security.debian.org/pool/updates/main/libf/libffi/libffi6_3.1-2+deb8u1_amd64.deb Temporary failure resolving 'security.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/p/p11-kit/libp11-kit0_0.20.7-1_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://security.debian.org/pool/updates/main/libt/libtasn1-6/libtasn1-6_4.2-3+deb8u3_amd64.deb Temporary failure resolving 'security.debian.org' E: Failed to fetch http://security.debian.org/pool/updates/main/g/gnutls28/libgnutls-deb0-28_3.3.8-6+deb8u6_amd64.deb Temporary failure resolving 'security.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/libi/libidn/libidn11_1.29-1+deb8u2_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/i/icu/libicu52_52.1-8+deb8u5_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/libp/libpsl/libpsl0_0.5.1-1_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/w/wget/wget_1.16-1+deb8u2_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/o/openssl/openssl_1.0.1t-1+deb8u6_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/c/ca-certificates/ca-certificates_20141019+deb8u3_all.deb Temporary failure resolving 'deb.debian.org' E: Unable to fetch some archives, maybe run apt-get update or try with --fix-missing? The command '/bin/sh -c apt-get update && apt-get install -y --force-yes wget && rm -rf /var/lib/apt/lists/*' returned a non-zero code: 100 [root@tibco Soap-ing]# docker run -it --rm debian:jessie apt-get update WARNING: IPv4 forwarding is disabled. Networking will not work. Err http://deb.debian.org jessie InRelease Err http://security.debian.org jessie/updates InRelease Err http://deb.debian.org jessie-updates InRelease Err http://security.debian.org jessie/updates Release.gpg Temporary failure resolving 'security.debian.org' Err http://deb.debian.org jessie Release.gpg Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org jessie-updates Release.gpg Temporary failure resolving 'deb.debian.org' Reading package lists... Done W: Failed to fetch http://deb.debian.org/debian/dists/jessie/InRelease W: Failed to fetch http://deb.debian.org/debian/dists/jessie-updates/InRelease W: Failed to fetch http://security.debian.org/dists/jessie/updates/InRelease W: Failed to fetch http://deb.debian.org/debian/dists/jessie/Release.gpg Temporary failure resolving 'deb.debian.org' W: Failed to fetch http://security.debian.org/dists/jessie/updates/Release.gpg Temporary failure resolving 'security.debian.org' W: Failed to fetch http://deb.debian.org/debian/dists/jessie-updates/Release.gpg Temporary failure resolving 'deb.debian.org' W: Some index files failed to download. They have been ignored, or old ones used instead. **Output of `docker version`:** ``` Docker version 17.06.0-ce, build 02c1d87 ```
1.0
Docker Build returns Error code 100 - <!-- If you are reporting a new issue, make sure that we do not have any duplicates already open. You can ensure this by searching the issue list for this repository. If there is a duplicate, please close your issue and add a comment to the existing issue instead. If you suspect your issue is a bug, please edit your issue description to include the BUG REPORT INFORMATION shown below. If you fail to provide this information within 7 days, we cannot debug your issue and will close it. We will, however, reopen it if you later provide the information. For more information about reporting issues, see https://github.com/docker/docker/blob/master/CONTRIBUTING.md#reporting-other-issues --------------------------------------------------- GENERAL SUPPORT INFORMATION --------------------------------------------------- The GitHub issue tracker is for bug reports and feature requests. General support can be found at the following locations: - Docker Support Forums - https://forums.docker.com - IRC - irc.freenode.net #docker channel - Post a question on StackOverflow, using the Docker tag --------------------------------------------------- BUG REPORT INFORMATION --------------------------------------------------- Use the commands below to provide key information from your environment: You do NOT have to include this information if this is a FEATURE REQUEST --> **Description** I am trying to create a Docker for SoapUI. The Dockerfile being the following: ```Dockerfile FROM tibco/bwce:latest MAINTAINER tibco # Version ENV SOAPUI_VERSION 5.3.0 COPY Rest.xml /opt/bin/Rest.xml RUN chmod +x /opt/bin/Rest.xml # Download and unarchive SoapUI RUN apt-get update && apt-get install -y --force-yes wget && rm -rf /var/lib/apt/lists/* RUN wget https://www.dropbox.com/s/shz5d3b8ppvw150/SoapUI-x64-5.3.0.sh?dl=0 # Set working directory WORKDIR /opt/bin # Set environment ENV PATH ${PATH}:/opt/SoapUI/bin EXPOSE 3000 #CMD["/opt/bin/Rest.xml"] ``` At `step 6: RUN apt-get update && apt-get install -y --force-yes wget && rm -rf /var/lib/apt/lists/*` It is showing error. Kindly Help me solve this issue. :) The XML file used is as follows: <?xml version="1.0" encoding="UTF-8"?> <con:soapui-project id="d4f0816d-1cde-4797-a134-77a49a43d099" activeEnvironment="Default" name="REST Project 1" resourceRoot="" soapui-version="5.3.0" abortOnError="false" runType="SEQUENTIAL" xmlns:con="http://eviware.com/soapui/config"><con:settings/><con:interface xsi:type="con:RestService" id="1c79b0af-dc7e-4e76-8bad-7a3bbd91d7b4" wadlVersion="http://wadl.dev.java.net/2009/02" name="http://10.0.2.15:9620" type="rest" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><con:settings/><con:definitionCache type="TEXT" rootPart=""/><con:endpoints><con:endpoint>http://10.0.2.15:9620</con:endpoint></con:endpoints><con:resource name="Customer" path="/getdetails/customer" id="2b14e707-67c9-419c-84e1-4fef6e532eac"><con:settings/><con:parameters><con:parameter><con:name>gsm_number</con:name><con:value>9987654321</con:value><con:style>QUERY</con:style><con:default>9987654321</con:default><con:path xsi:nil="true"/><con:description xsi:nil="true"/></con:parameter></con:parameters><con:method name="Customer 1" id="e6a240ff-7a35-4820-b880-3f618db5d85f" method="GET"><con:settings/><con:parameters/><con:representation type="FAULT"><con:mediaType>text/html;charset=ISO-8859-1</con:mediaType><con:status>400</con:status><con:params/><con:element>html</con:element></con:representation><con:representation type="RESPONSE"><con:mediaType xsi:nil="true"/><con:status>0</con:status><con:params/><con:element>data</con:element></con:representation><con:representation type="RESPONSE"><con:mediaType>application/json;charset=UTF-8</con:mediaType><con:status>200</con:status><con:params/><con:element xmlns:cus="http://10.0.2.15/getdetails/customer">cus:Response</con:element></con:representation><con:representation type="FAULT"><con:mediaType>text/plain</con:mediaType><con:status>500</con:status><con:params/><con:element>data</con:element></con:representation><con:request name="Request 1" id="9d57e9f4-ae54-4dd4-921f-9c96ed397de4" mediaType="application/json"><con:settings><con:setting id="com.eviware.soapui.impl.wsdl.WsdlRequest@request-headers">&lt;entry key="Accept" value="application/json" xmlns="http://eviware.com/soapui/config"/></con:setting></con:settings><con:endpoint>http://tibco.local:9620</con:endpoint><con:request/><con:originalUri>http://10.0.2.15/getdetails/customer</con:originalUri><con:credentials><con:authType>No Authorization</con:authType></con:credentials><con:jmsConfig JMSDeliveryMode="PERSISTENT"/><con:jmsPropertyConfig/><con:parameters/><con:parameterOrder><con:entry>gsm_number</con:entry></con:parameterOrder></con:request></con:method></con:resource></con:interface><con:testSuite id="e6077c55-4fa4-4435-8976-eadeb1b68a30" name="TestSuite 1"><con:settings/><con:runType>SEQUENTIAL</con:runType><con:testCase id="7b1da7ec-72f0-4857-b6c7-b2244a9f8ade" failOnError="true" failTestCaseOnErrors="true" keepSession="false" maxResults="0" name="TestCase 1" searchProperties="true"><con:settings/><con:testStep type="restrequest" name="Good Data" id="4f379948-4195-472a-9d5d-91ee6c633c60"><con:settings/><con:config service="http://10.0.2.15:9620" resourcePath="/getdetails/customer" methodName="Customer 1" xsi:type="con:RestRequestStep" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><con:restRequest name="REST Request" id="9d57e9f4-ae54-4dd4-921f-9c96ed397de4" mediaType="application/json"><con:settings><con:setting id="com.eviware.soapui.impl.wsdl.WsdlRequest@request-headers">&lt;entry key="Accept" value="application/json" xmlns="http://eviware.com/soapui/config"/></con:setting></con:settings><con:endpoint>http://10.0.2.15:9620</con:endpoint><con:request/><con:originalUri>http://10.0.2.15/getdetails/customer</con:originalUri><con:assertion type="Valid HTTP Status Codes" id="2990776b-c73a-4427-9f30-c21d53681032" name="Valid HTTP Status Codes"><con:configuration><codes>500</codes></con:configuration></con:assertion><con:credentials><con:username/><con:password/><con:authType>No Authorization</con:authType></con:credentials><con:jmsConfig JMSDeliveryMode="PERSISTENT"/><con:jmsPropertyConfig/><con:parameters><entry key="gsm_number" value="0000" xmlns="http://eviware.com/soapui/config"/></con:parameters><con:parameterOrder><con:entry>gsm_number</con:entry></con:parameterOrder></con:restRequest></con:config></con:testStep><con:testStep type="restrequest" name="Bad Data" id="24ddbeac-958a-47f4-9b5d-e0248b9fb83e"><con:settings/><con:config service="http://10.0.2.15:9620" resourcePath="/getdetails/customer" methodName="Customer 1" xsi:type="con:RestRequestStep" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><con:restRequest name="Bad Data" id="9d57e9f4-ae54-4dd4-921f-9c96ed397de4" mediaType="application/json"><con:settings><con:setting id="com.eviware.soapui.impl.wsdl.WsdlRequest@request-headers">&lt;entry key="Accept" value="application/json" xmlns="http://eviware.com/soapui/config"/></con:setting></con:settings><con:endpoint>http://10.0.2.15:9620</con:endpoint><con:request/><con:originalUri>http://10.0.2.15/getdetails/customer</con:originalUri><con:assertion type="Invalid HTTP Status Codes" id="bae01ebe-2ad6-4c3d-8635-5bb686bf40f7" name="Invalid HTTP Status Codes"><con:configuration><codes>500, 400</codes></con:configuration></con:assertion><con:assertion type="JsonPath Match" id="3f7f2aa8-6c69-4598-9dcc-bed5248dac39" name="First"><con:configuration><path>$.CustomerDetail[:1].First_Name</path><content>[Henry]</content><allowWildcards>false</allowWildcards><ignoreNamspaceDifferences>false</ignoreNamspaceDifferences><ignoreComments>false</ignoreComments></con:configuration></con:assertion><con:assertion type="JsonPath Match" id="3f7f2aa8-6c69-4598-9dcc-bed5248dac39" name="LastName"><con:configuration><path>$.CustomerDetail[:1].Last_Name</path><content>[Andrew]</content><allowWildcards>false</allowWildcards><ignoreNamspaceDifferences>false</ignoreNamspaceDifferences><ignoreComments>false</ignoreComments></con:configuration></con:assertion><con:credentials><con:username/><con:password/><con:authType>No Authorization</con:authType></con:credentials><con:jmsConfig JMSDeliveryMode="PERSISTENT"/><con:jmsPropertyConfig/><con:parameters><entry key="gsm_number" value="9987654321" xmlns="http://eviware.com/soapui/config"/></con:parameters><con:parameterOrder><con:entry>gsm_number</con:entry></con:parameterOrder></con:restRequest></con:config></con:testStep><con:properties/></con:testCase><con:properties/></con:testSuite><con:properties/><con:wssContainer/><con:oAuth2ProfileContainer/><con:oAuth1ProfileContainer/><con:sensitiveInformation/></con:soapui-project> **Steps to reproduce the issue:** 1.docker build -t rest . **Describe the results you received:** [root@tibco Soap-ing]# docker build -t rest . Sending build context to Docker daemon 9.216kB Step 1/10 : FROM tibco/bwce:latest ---> 9c8245fefeca Step 2/10 : MAINTAINER tibco ---> Using cache ---> bebdfef8b85f Step 3/10 : ENV SOAPUI_VERSION 5.3.0 ---> Using cache ---> 52da46652b37 Step 4/10 : COPY Rest.xml /opt/bin/Rest.xml ---> Using cache ---> 513ac0aa43d6 Step 5/10 : RUN chmod +x /opt/bin/Rest.xml ---> Using cache ---> 4dbd0a783038 Step 6/10 : RUN apt-get update && apt-get install -y --force-yes wget && rm -rf /var/lib/apt/lists/* ---> [Warning] IPv4 forwarding is disabled. Networking will not work. ---> Running in 2d251ad256d1 Err http://deb.debian.org jessie InRelease Err http://security.debian.org jessie/updates InRelease Err http://deb.debian.org jessie-updates InRelease Err http://security.debian.org jessie/updates Release.gpg Temporary failure resolving 'security.debian.org' Err http://deb.debian.org jessie Release.gpg Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org jessie-updates Release.gpg Temporary failure resolving 'deb.debian.org' Reading package lists... W: Failed to fetch http://deb.debian.org/debian/dists/jessie/InRelease W: Failed to fetch http://deb.debian.org/debian/dists/jessie-updates/InRelease W: Failed to fetch http://security.debian.org/dists/jessie/updates/InRelease W: Failed to fetch http://deb.debian.org/debian/dists/jessie/Release.gpg Temporary failure resolving 'deb.debian.org' W: Failed to fetch http://security.debian.org/dists/jessie/updates/Release.gpg Temporary failure resolving 'security.debian.org' W: Failed to fetch http://deb.debian.org/debian/dists/jessie-updates/Release.gpg Temporary failure resolving 'deb.debian.org' W: Some index files failed to download. They have been ignored, or old ones used instead. Reading package lists... Building dependency tree... Reading state information... The following extra packages will be installed: ca-certificates libffi6 libgmp10 libgnutls-deb0-28 libhogweed2 libicu52 libidn11 libnettle4 libp11-kit0 libpsl0 libtasn1-6 openssl Suggested packages: gnutls-bin The following NEW packages will be installed: ca-certificates libffi6 libgmp10 libgnutls-deb0-28 libhogweed2 libicu52 libidn11 libnettle4 libp11-kit0 libpsl0 libtasn1-6 openssl wget 0 upgraded, 13 newly installed, 0 to remove and 1 not upgraded. Need to get 9748 kB of archives. After this operation, 35.6 MB of additional disk space will be used. WARNING: The following packages cannot be authenticated! libffi6 libtasn1-6 libgnutls-deb0-28 Err http://security.debian.org/ jessie/updates/main libffi6 amd64 3.1-2+deb8u1 Temporary failure resolving 'security.debian.org' Err http://deb.debian.org/debian/ jessie/main libgmp10 amd64 2:6.0.0+dfsg-6 Temporary failure resolving 'deb.debian.org' Err http://security.debian.org/ jessie/updates/main libtasn1-6 amd64 4.2-3+deb8u3 Temporary failure resolving 'security.debian.org' Err http://deb.debian.org/debian/ jessie/main libnettle4 amd64 2.7.1-5+deb8u2 Temporary failure resolving 'deb.debian.org' Err http://security.debian.org/ jessie/updates/main libgnutls-deb0-28 amd64 3.3.8-6+deb8u6 Temporary failure resolving 'security.debian.org' Err http://deb.debian.org/debian/ jessie/main libhogweed2 amd64 2.7.1-5+deb8u2 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main libp11-kit0 amd64 0.20.7-1 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main libidn11 amd64 1.29-1+deb8u2 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main libicu52 amd64 52.1-8+deb8u5 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main libpsl0 amd64 0.5.1-1 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main wget amd64 1.16-1+deb8u2 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main openssl amd64 1.0.1t-1+deb8u6 Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org/debian/ jessie/main ca-certificates all 20141019+deb8u3 Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/g/gmp/libgmp10_6.0.0+dfsg-6_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/n/nettle/libnettle4_2.7.1-5+deb8u2_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/n/nettle/libhogweed2_2.7.1-5+deb8u2_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://security.debian.org/pool/updates/main/libf/libffi/libffi6_3.1-2+deb8u1_amd64.deb Temporary failure resolving 'security.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/p/p11-kit/libp11-kit0_0.20.7-1_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://security.debian.org/pool/updates/main/libt/libtasn1-6/libtasn1-6_4.2-3+deb8u3_amd64.deb Temporary failure resolving 'security.debian.org' E: Failed to fetch http://security.debian.org/pool/updates/main/g/gnutls28/libgnutls-deb0-28_3.3.8-6+deb8u6_amd64.deb Temporary failure resolving 'security.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/libi/libidn/libidn11_1.29-1+deb8u2_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/i/icu/libicu52_52.1-8+deb8u5_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/libp/libpsl/libpsl0_0.5.1-1_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/w/wget/wget_1.16-1+deb8u2_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/o/openssl/openssl_1.0.1t-1+deb8u6_amd64.deb Temporary failure resolving 'deb.debian.org' E: Failed to fetch http://deb.debian.org/debian/pool/main/c/ca-certificates/ca-certificates_20141019+deb8u3_all.deb Temporary failure resolving 'deb.debian.org' E: Unable to fetch some archives, maybe run apt-get update or try with --fix-missing? The command '/bin/sh -c apt-get update && apt-get install -y --force-yes wget && rm -rf /var/lib/apt/lists/*' returned a non-zero code: 100 [root@tibco Soap-ing]# docker run -it --rm debian:jessie apt-get update WARNING: IPv4 forwarding is disabled. Networking will not work. Err http://deb.debian.org jessie InRelease Err http://security.debian.org jessie/updates InRelease Err http://deb.debian.org jessie-updates InRelease Err http://security.debian.org jessie/updates Release.gpg Temporary failure resolving 'security.debian.org' Err http://deb.debian.org jessie Release.gpg Temporary failure resolving 'deb.debian.org' Err http://deb.debian.org jessie-updates Release.gpg Temporary failure resolving 'deb.debian.org' Reading package lists... Done W: Failed to fetch http://deb.debian.org/debian/dists/jessie/InRelease W: Failed to fetch http://deb.debian.org/debian/dists/jessie-updates/InRelease W: Failed to fetch http://security.debian.org/dists/jessie/updates/InRelease W: Failed to fetch http://deb.debian.org/debian/dists/jessie/Release.gpg Temporary failure resolving 'deb.debian.org' W: Failed to fetch http://security.debian.org/dists/jessie/updates/Release.gpg Temporary failure resolving 'security.debian.org' W: Failed to fetch http://deb.debian.org/debian/dists/jessie-updates/Release.gpg Temporary failure resolving 'deb.debian.org' W: Some index files failed to download. They have been ignored, or old ones used instead. **Output of `docker version`:** ``` Docker version 17.06.0-ce, build 02c1d87 ```
non_priority
docker build returns error code if you are reporting a new issue make sure that we do not have any duplicates already open you can ensure this by searching the issue list for this repository if there is a duplicate please close your issue and add a comment to the existing issue instead if you suspect your issue is a bug please edit your issue description to include the bug report information shown below if you fail to provide this information within days we cannot debug your issue and will close it we will however reopen it if you later provide the information for more information about reporting issues see general support information the github issue tracker is for bug reports and feature requests general support can be found at the following locations docker support forums irc irc freenode net docker channel post a question on stackoverflow using the docker tag bug report information use the commands below to provide key information from your environment you do not have to include this information if this is a feature request description i am trying to create a docker for soapui the dockerfile being the following dockerfile from tibco bwce latest maintainer tibco version env soapui version copy rest xml opt bin rest xml run chmod x opt bin rest xml download and unarchive soapui run apt get update apt get install y force yes wget rm rf var lib apt lists run wget set working directory workdir opt bin set environment env path path opt soapui bin expose cmd at step run apt get update apt get install y force yes wget rm rf var lib apt lists it is showing error kindly help me solve this issue the xml file used is as follows name customer path getdetails customer id gsm number query text html charset iso html data application json charset utf text plain data lt entry key accept value application json xmlns authorization gsm number sequential lt entry key accept value application json xmlns type valid http status codes id name valid http status codes no authorization lt entry key accept value application json xmlns type invalid http status codes id name invalid http status codes customerdetail first name false false false customerdetail last name false false false no authorization entry key gsm number value xmlns steps to reproduce the issue docker build t rest describe the results you received docker build t rest sending build context to docker daemon step from tibco bwce latest step maintainer tibco using cache step env soapui version using cache step copy rest xml opt bin rest xml using cache step run chmod x opt bin rest xml using cache step run apt get update apt get install y force yes wget rm rf var lib apt lists forwarding is disabled networking will not work running in err jessie inrelease err jessie updates inrelease err jessie updates inrelease err jessie updates release gpg temporary failure resolving security debian org err jessie release gpg temporary failure resolving deb debian org err jessie updates release gpg temporary failure resolving deb debian org reading package lists w failed to fetch w failed to fetch w failed to fetch w failed to fetch temporary failure resolving deb debian org w failed to fetch temporary failure resolving security debian org w failed to fetch temporary failure resolving deb debian org w some index files failed to download they have been ignored or old ones used instead reading package lists building dependency tree reading state information the following extra packages will be installed ca certificates libgnutls openssl suggested packages gnutls bin the following new packages will be installed ca certificates libgnutls openssl wget upgraded newly installed to remove and not upgraded need to get kb of archives after this operation mb of additional disk space will be used warning the following packages cannot be authenticated libgnutls err jessie updates main temporary failure resolving security debian org err jessie main dfsg temporary failure resolving deb debian org err jessie updates main temporary failure resolving security debian org err jessie main temporary failure resolving deb debian org err jessie updates main libgnutls temporary failure resolving security debian org err jessie main temporary failure resolving deb debian org err jessie main temporary failure resolving deb debian org err jessie main temporary failure resolving deb debian org err jessie main temporary failure resolving deb debian org err jessie main temporary failure resolving deb debian org err jessie main wget temporary failure resolving deb debian org err jessie main openssl temporary failure resolving deb debian org err jessie main ca certificates all temporary failure resolving deb debian org e failed to fetch temporary failure resolving deb debian org e failed to fetch temporary failure resolving deb debian org e failed to fetch temporary failure resolving deb debian org e failed to fetch temporary failure resolving security debian org e failed to fetch temporary failure resolving deb debian org e failed to fetch temporary failure resolving security debian org e failed to fetch temporary failure resolving security debian org e failed to fetch temporary failure resolving deb debian org e failed to fetch temporary failure resolving deb debian org e failed to fetch temporary failure resolving deb debian org e failed to fetch temporary failure resolving deb debian org e failed to fetch temporary failure resolving deb debian org e failed to fetch temporary failure resolving deb debian org e unable to fetch some archives maybe run apt get update or try with fix missing the command bin sh c apt get update apt get install y force yes wget rm rf var lib apt lists returned a non zero code docker run it rm debian jessie apt get update warning forwarding is disabled networking will not work err jessie inrelease err jessie updates inrelease err jessie updates inrelease err jessie updates release gpg temporary failure resolving security debian org err jessie release gpg temporary failure resolving deb debian org err jessie updates release gpg temporary failure resolving deb debian org reading package lists done w failed to fetch w failed to fetch w failed to fetch w failed to fetch temporary failure resolving deb debian org w failed to fetch temporary failure resolving security debian org w failed to fetch temporary failure resolving deb debian org w some index files failed to download they have been ignored or old ones used instead output of docker version docker version ce build
0
310,919
23,361,554,614
IssuesEvent
2022-08-10 12:11:08
guardicore/monkey
https://api.github.com/repos/guardicore/monkey
closed
Host documentation on Linode
Documentation Impact: Low Complexity: Low
## Description The Hugo documentation needs to be hosted on Linode instead of Guardicore's server. ## Tasks - [x] Work with IT to get Linode an infection monkey account and accounts/roles for everyone on the team to access the infection monkey Linode resources. (0d) @ilija-lazoroski - [x] Configure an Object Storage ?bucket? to serve our documentation [as a static site](https://www.linode.com/docs/guides/host-static-site-object-storage/) (0d) @ilija-lazoroski - [x] Ensure all members of the team have write access - [x] Update the documentation deployment scrips to push documentation to Linode (0d) - [x] Upload the 1.13.0 documentation to Linode object storage (0d) - [x] Update the README that describes how to push updated documentation (0d)
1.0
Host documentation on Linode - ## Description The Hugo documentation needs to be hosted on Linode instead of Guardicore's server. ## Tasks - [x] Work with IT to get Linode an infection monkey account and accounts/roles for everyone on the team to access the infection monkey Linode resources. (0d) @ilija-lazoroski - [x] Configure an Object Storage ?bucket? to serve our documentation [as a static site](https://www.linode.com/docs/guides/host-static-site-object-storage/) (0d) @ilija-lazoroski - [x] Ensure all members of the team have write access - [x] Update the documentation deployment scrips to push documentation to Linode (0d) - [x] Upload the 1.13.0 documentation to Linode object storage (0d) - [x] Update the README that describes how to push updated documentation (0d)
non_priority
host documentation on linode description the hugo documentation needs to be hosted on linode instead of guardicore s server tasks work with it to get linode an infection monkey account and accounts roles for everyone on the team to access the infection monkey linode resources ilija lazoroski configure an object storage bucket to serve our documentation ilija lazoroski ensure all members of the team have write access update the documentation deployment scrips to push documentation to linode upload the documentation to linode object storage update the readme that describes how to push updated documentation
0
246,174
26,600,341,735
IssuesEvent
2023-01-23 15:21:08
lukebrogan-mend/django.nV
https://api.github.com/repos/lukebrogan-mend/django.nV
closed
CVE-2016-2512 (Low) detected in Django-1.8.3-py2.py3-none-any.whl - autoclosed
security vulnerability
## CVE-2016-2512 - Low Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Django-1.8.3-py2.py3-none-any.whl</b></p></summary> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a3/e1/0f3c17b1caa559ba69513ff72e250377c268d5bd3e8ad2b22809c7e2e907/Django-1.8.3-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/a3/e1/0f3c17b1caa559ba69513ff72e250377c268d5bd3e8ad2b22809c7e2e907/Django-1.8.3-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-1.8.3-py2.py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebroganws/django.nV/commit/442c6c7076c373c9762f875ec09227c88ad5d198">442c6c7076c373c9762f875ec09227c88ad5d198</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com. <p>Publish Date: 2016-04-08 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2512>CVE-2016-2512</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2512">https://nvd.nist.gov/vuln/detail/CVE-2016-2512</a></p> <p>Release Date: 2016-04-08</p> <p>Fix Resolution: 1.8.10,1.9.3</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
True
CVE-2016-2512 (Low) detected in Django-1.8.3-py2.py3-none-any.whl - autoclosed - ## CVE-2016-2512 - Low Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Django-1.8.3-py2.py3-none-any.whl</b></p></summary> <p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/a3/e1/0f3c17b1caa559ba69513ff72e250377c268d5bd3e8ad2b22809c7e2e907/Django-1.8.3-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/a3/e1/0f3c17b1caa559ba69513ff72e250377c268d5bd3e8ad2b22809c7e2e907/Django-1.8.3-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **Django-1.8.3-py2.py3-none-any.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebroganws/django.nV/commit/442c6c7076c373c9762f875ec09227c88ad5d198">442c6c7076c373c9762f875ec09227c88ad5d198</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com. <p>Publish Date: 2016-04-08 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2512>CVE-2016-2512</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2512">https://nvd.nist.gov/vuln/detail/CVE-2016-2512</a></p> <p>Release Date: 2016-04-08</p> <p>Fix Resolution: 1.8.10,1.9.3</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
non_priority
cve low detected in django none any whl autoclosed cve low severity vulnerability vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details the utils http is safe url function in django before and x before allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross site scripting xss attacks via a url containing basic authentication as demonstrated by publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution check this box to open an automated fix pr
0
317,272
27,223,898,964
IssuesEvent
2023-02-21 08:17:24
PalisadoesFoundation/talawa
https://api.github.com/repos/PalisadoesFoundation/talawa
closed
Tests for chat_message_bubble.dart
good first issue test points 01
- Please coordinate **issue assignment** and **PR reviews** with the contributors listed in this issue https://github.com/PalisadoesFoundation/talawa/issues/359 The Talawa code base needs to be 100% reliable. This means we need to have 100% test code coverage. Tests need to be written for file `lib/views/after_auth_screens/chat/widgets/chat_message_bubble.dart` - When complete, all methods, classes and/or functions in the file will need to be tested. - Our `test/` folder has the same structure as the `lib` folder. Place your test file in the equivalent folder under `test/`. You may need to create the appropriate directory structure to do this. - [Current test code coverage for this file can be found here](https://app.codecov.io/gh/PalisadoesFoundation/talawa?search=&displayType=list) ### IMPORTANT: Please refer to the parent issue on how to implement these tests correctly: - https://github.com/PalisadoesFoundation/talawa/issues/1217 ### PR Acceptance Criteria - When complete this file must show **100%** coverage when merged into the code base. This will be clearly visible when you submit your PR. - The PR will show a report for the code coverage for the file you have added. You can use that as a guide. - You can verify your own code coverage by creating an account at [Codecov.io](https://codecov.io)
1.0
Tests for chat_message_bubble.dart - - Please coordinate **issue assignment** and **PR reviews** with the contributors listed in this issue https://github.com/PalisadoesFoundation/talawa/issues/359 The Talawa code base needs to be 100% reliable. This means we need to have 100% test code coverage. Tests need to be written for file `lib/views/after_auth_screens/chat/widgets/chat_message_bubble.dart` - When complete, all methods, classes and/or functions in the file will need to be tested. - Our `test/` folder has the same structure as the `lib` folder. Place your test file in the equivalent folder under `test/`. You may need to create the appropriate directory structure to do this. - [Current test code coverage for this file can be found here](https://app.codecov.io/gh/PalisadoesFoundation/talawa?search=&displayType=list) ### IMPORTANT: Please refer to the parent issue on how to implement these tests correctly: - https://github.com/PalisadoesFoundation/talawa/issues/1217 ### PR Acceptance Criteria - When complete this file must show **100%** coverage when merged into the code base. This will be clearly visible when you submit your PR. - The PR will show a report for the code coverage for the file you have added. You can use that as a guide. - You can verify your own code coverage by creating an account at [Codecov.io](https://codecov.io)
non_priority
tests for chat message bubble dart please coordinate issue assignment and pr reviews with the contributors listed in this issue the talawa code base needs to be reliable this means we need to have test code coverage tests need to be written for file lib views after auth screens chat widgets chat message bubble dart when complete all methods classes and or functions in the file will need to be tested our test folder has the same structure as the lib folder place your test file in the equivalent folder under test you may need to create the appropriate directory structure to do this important please refer to the parent issue on how to implement these tests correctly pr acceptance criteria when complete this file must show coverage when merged into the code base this will be clearly visible when you submit your pr the pr will show a report for the code coverage for the file you have added you can use that as a guide you can verify your own code coverage by creating an account at
0
19,877
3,786,296,742
IssuesEvent
2016-03-21 01:04:14
rancher/rancher
https://api.github.com/repos/rancher/rancher
closed
Random mapping of ports is broken on upgrade
kind/bug status/resolved status/to-test
Rancher Version: Rancher 0.59.1 Docker Version: Docker 1.10.2 OS: Ubuntu 14.04.4 LTS Steps to Reproduce: 1. Create a Rancher catalog entry that deploys a stack containing a service that gets assigned a random high value port. For example, you could have a snippet of docker-compose.yml that looks like this. Note we only specify the private port for the collector. We rely on Rancher to assign the public port. ``` collector: ports: - "80" ``` 2. Deploy this Rancher catalog entry to a Rancher environment. The first time you deploy, everything will work great. Collector will be assigned a random high value port. 3. Now make a modification to the catalog entry. 4. Perform an upgrade to the new catalog version. Results: After upgrade, collector will have lost its public port. Expected: Collector should retain its public port.
1.0
Random mapping of ports is broken on upgrade - Rancher Version: Rancher 0.59.1 Docker Version: Docker 1.10.2 OS: Ubuntu 14.04.4 LTS Steps to Reproduce: 1. Create a Rancher catalog entry that deploys a stack containing a service that gets assigned a random high value port. For example, you could have a snippet of docker-compose.yml that looks like this. Note we only specify the private port for the collector. We rely on Rancher to assign the public port. ``` collector: ports: - "80" ``` 2. Deploy this Rancher catalog entry to a Rancher environment. The first time you deploy, everything will work great. Collector will be assigned a random high value port. 3. Now make a modification to the catalog entry. 4. Perform an upgrade to the new catalog version. Results: After upgrade, collector will have lost its public port. Expected: Collector should retain its public port.
non_priority
random mapping of ports is broken on upgrade rancher version rancher docker version docker os ubuntu lts steps to reproduce create a rancher catalog entry that deploys a stack containing a service that gets assigned a random high value port for example you could have a snippet of docker compose yml that looks like this note we only specify the private port for the collector we rely on rancher to assign the public port collector ports deploy this rancher catalog entry to a rancher environment the first time you deploy everything will work great collector will be assigned a random high value port now make a modification to the catalog entry perform an upgrade to the new catalog version results after upgrade collector will have lost its public port expected collector should retain its public port
0
230,623
18,680,154,845
IssuesEvent
2021-11-01 03:50:14
sak007/MyDollarBot
https://api.github.com/repos/sak007/MyDollarBot
closed
Build Failed - Please fix styling and linting issues
bug test
Please fix the issues with the latest commit - build is failing, so need to fix this. Problematic Commit 668268cd8c5bf686fc83b66d5012ee57d482714f
1.0
Build Failed - Please fix styling and linting issues - Please fix the issues with the latest commit - build is failing, so need to fix this. Problematic Commit 668268cd8c5bf686fc83b66d5012ee57d482714f
non_priority
build failed please fix styling and linting issues please fix the issues with the latest commit build is failing so need to fix this problematic commit
0
452,955
32,075,456,254
IssuesEvent
2023-09-25 10:41:25
geosolutions-it/MapStore2
https://api.github.com/repos/geosolutions-it/MapStore2
closed
User Guide - Change video for Images management in Identify template
Documentation User Guide BackportNeeded C265-ATOLCD-2023-DEV_MS_CNR
## Description <!-- A few sentences describing the documentation request --> <!-- screenshot, video, or link to mockup/prototype are welcome --> Change video on [Identify template](https://docs.mapstore.geosolutionsgroup.com/en/latest/user-guide/layer-settings/#templates) section *Documentation section involved* - [x] User Guide - [ ] Developer Guide ## Other useful information Related to #9381
1.0
User Guide - Change video for Images management in Identify template - ## Description <!-- A few sentences describing the documentation request --> <!-- screenshot, video, or link to mockup/prototype are welcome --> Change video on [Identify template](https://docs.mapstore.geosolutionsgroup.com/en/latest/user-guide/layer-settings/#templates) section *Documentation section involved* - [x] User Guide - [ ] Developer Guide ## Other useful information Related to #9381
non_priority
user guide change video for images management in identify template description change video on section documentation section involved user guide developer guide other useful information related to
0
399,594
27,246,933,624
IssuesEvent
2023-02-22 03:20:25
go-go-golems/glazed
https://api.github.com/repos/go-go-golems/glazed
opened
Add helpsystem support for layers
documentation enhancement
Now that we have clean layers, we can actually start adding doc pages that are directly linked to individual layers.
1.0
Add helpsystem support for layers - Now that we have clean layers, we can actually start adding doc pages that are directly linked to individual layers.
non_priority
add helpsystem support for layers now that we have clean layers we can actually start adding doc pages that are directly linked to individual layers
0
46,762
24,709,812,241
IssuesEvent
2022-10-19 22:57:07
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
closed
intel qat compression hardware acceleration support ?
feature performance
While be possible to add support Intel QAT compression acceleration ? Because they are integrate in new intel scalable cpu ! seem to 30% boost on hadoop : https://www.intel.com/content/www/us/en/architecture-and-technology/faster-hadoop-run-times-quickassist-technology.html
True
intel qat compression hardware acceleration support ? - While be possible to add support Intel QAT compression acceleration ? Because they are integrate in new intel scalable cpu ! seem to 30% boost on hadoop : https://www.intel.com/content/www/us/en/architecture-and-technology/faster-hadoop-run-times-quickassist-technology.html
non_priority
intel qat compression hardware acceleration support while be possible to add support intel qat compression acceleration because they are integrate in new intel scalable cpu seem to boost on hadoop
0
92,679
15,863,513,337
IssuesEvent
2021-04-08 12:52:28
mickelsonmichael/JustPickSomething
https://api.github.com/repos/mickelsonmichael/JustPickSomething
opened
CVE-2020-7788 (High) detected in ini-1.3.5.tgz
security vulnerability
## CVE-2020-7788 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ini-1.3.5.tgz</b></p></summary> <p>An ini encoder/decoder for node</p> <p>Library home page: <a href="https://registry.npmjs.org/ini/-/ini-1.3.5.tgz">https://registry.npmjs.org/ini/-/ini-1.3.5.tgz</a></p> <p>Path to dependency file: JustPickSomething/web/package.json</p> <p>Path to vulnerable library: JustPickSomething/web/node_modules/ini/package.json</p> <p> Dependency Hierarchy: - webpack-cli-3.3.12.tgz (Root Library) - global-modules-2.0.0.tgz - global-prefix-3.0.0.tgz - :x: **ini-1.3.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/mickelsonmichael/JustPickSomething/commit/5a59ce23a158f608dddc662366ad0417dac3e181">5a59ce23a158f608dddc662366ad0417dac3e181</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context. <p>Publish Date: 2020-12-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7788>CVE-2020-7788</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788</a></p> <p>Release Date: 2020-12-11</p> <p>Fix Resolution: v1.3.6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7788 (High) detected in ini-1.3.5.tgz - ## CVE-2020-7788 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ini-1.3.5.tgz</b></p></summary> <p>An ini encoder/decoder for node</p> <p>Library home page: <a href="https://registry.npmjs.org/ini/-/ini-1.3.5.tgz">https://registry.npmjs.org/ini/-/ini-1.3.5.tgz</a></p> <p>Path to dependency file: JustPickSomething/web/package.json</p> <p>Path to vulnerable library: JustPickSomething/web/node_modules/ini/package.json</p> <p> Dependency Hierarchy: - webpack-cli-3.3.12.tgz (Root Library) - global-modules-2.0.0.tgz - global-prefix-3.0.0.tgz - :x: **ini-1.3.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/mickelsonmichael/JustPickSomething/commit/5a59ce23a158f608dddc662366ad0417dac3e181">5a59ce23a158f608dddc662366ad0417dac3e181</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context. <p>Publish Date: 2020-12-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7788>CVE-2020-7788</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788</a></p> <p>Release Date: 2020-12-11</p> <p>Fix Resolution: v1.3.6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in ini tgz cve high severity vulnerability vulnerable library ini tgz an ini encoder decoder for node library home page a href path to dependency file justpicksomething web package json path to vulnerable library justpicksomething web node modules ini package json dependency hierarchy webpack cli tgz root library global modules tgz global prefix tgz x ini tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package ini before if an attacker submits a malicious ini file to an application that parses it with ini parse they will pollute the prototype on the application this can be exploited further depending on the context publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
374,192
26,104,874,210
IssuesEvent
2022-12-27 11:57:19
Anglepi/My-Many-Reads
https://api.github.com/repos/Anglepi/My-Many-Reads
closed
User recommendations story had some missing actions
documentation
Seems like on the last pull request (#63) I forgot to commit the last review action. I also noticed that the tasks to such story were not added to the docs.
1.0
User recommendations story had some missing actions - Seems like on the last pull request (#63) I forgot to commit the last review action. I also noticed that the tasks to such story were not added to the docs.
non_priority
user recommendations story had some missing actions seems like on the last pull request i forgot to commit the last review action i also noticed that the tasks to such story were not added to the docs
0
131,620
12,487,900,845
IssuesEvent
2020-05-31 11:38:02
haskell-unordered-containers/unordered-containers
https://api.github.com/repos/haskell-unordered-containers/unordered-containers
closed
Maintain CHANGELOG
documentation
Please journal changes in a CHANGELOG. Makes it much easier to decide whether new versions of unordered-containers are likely to work out-of-the-box, and upper bounds on version constraints can be safely relaxed.
1.0
Maintain CHANGELOG - Please journal changes in a CHANGELOG. Makes it much easier to decide whether new versions of unordered-containers are likely to work out-of-the-box, and upper bounds on version constraints can be safely relaxed.
non_priority
maintain changelog please journal changes in a changelog makes it much easier to decide whether new versions of unordered containers are likely to work out of the box and upper bounds on version constraints can be safely relaxed
0
35,185
7,919,491,122
IssuesEvent
2018-07-04 17:08:04
joomla/joomla-cms
https://api.github.com/repos/joomla/joomla-cms
closed
[4.0] Atum pagination override
No Code Attached Yet
As you can see in this code it will generate TWO class attributes. you can only have ONE https://github.com/joomla/joomla-cms/blob/4b01c64aad89d687ecb22c8a2d01fc8c86f2814d/administrator/templates/atum/html/pagination.php#L191-L199
1.0
[4.0] Atum pagination override - As you can see in this code it will generate TWO class attributes. you can only have ONE https://github.com/joomla/joomla-cms/blob/4b01c64aad89d687ecb22c8a2d01fc8c86f2814d/administrator/templates/atum/html/pagination.php#L191-L199
non_priority
atum pagination override as you can see in this code it will generate two class attributes you can only have one
0
13,594
8,290,501,108
IssuesEvent
2018-09-19 17:33:43
jruby/jruby
https://api.github.com/repos/jruby/jruby
closed
Performance regression with `Time.parse` from 1.7 to 9k
JRuby 9000 performance regression
<!-- This is a simple template for filing JRuby isuses. Please help us help you by providing the information below. Text inside XML comment tags will not be shown in your report. --> ### Environment <!-- Provide at least: * JRuby version (`jruby -v`) and command line (flags, JRUBY_OPTS, etc) * Operating system and platform (e.g. `uname -a`) Other relevant info you may wish to add: * Installed or activated gems * Application/framework version (e.g. Rails, Sinatra) * Environment variables --> JRuby 1.7.20.1, JRuby 9.1.0.0, JRuby 9.1.1.0; run from Java via ScriptingContainer, with various values tested for the setCompileMode method. Standalone script execution with no frameworks. ### Expected Behavior <!-- Describe your expectation of how JRuby should behave. Provide an executable Ruby script or a link to an example repository. --> Expected performance for `Time.parse` to be on par with performance for 1.7.x. ### Actual Behavior <!-- Describe or show the actual behavior. Provide text or screen capture showing the behavior. --> `Time.parse` seems to be roughly 60% slower in JRuby 9k than in 1.7.x. I have set up a github repo with a simple reproducer here: https://github.com/cprice404/jruby9k-benchmarks/tree/19a2719e4edddc17e3f1fabbf311b9d80c6eba80/time-parse-comparison Here are some relevant numbers from the benchmark output (the rest of it is available in the linked reproducer repro if you are interested): ``` JRUBY VERSION: 1.7.20.1 COMPILE MODE: off user system total real warmup (100 runs): 0.213000 0.000000 0.213000 ( 0.213000) middle (10000 runs): 1.179000 0.000000 1.179000 ( 1.179000) tail (100 runs): 0.009000 0.000000 0.009000 ( 0.009000) JRUBY VERSION: 9.1.1.0 COMPILE MODE: off user system total real warmup (100 runs): 0.730000 0.010000 0.740000 ( 0.138776) middle (10000 runs): 4.890000 0.300000 5.190000 ( 1.905043) tail (100 runs): 0.030000 0.010000 0.040000 ( 0.019285) ``` Also tested with `compileMode` set to `JIT`; that doesn't seem to make much difference in 1.7, and makes the numbers look worse in 9k (though the benchmark may not have had a long enough execution time to give a fair characterization of JIT).
True
Performance regression with `Time.parse` from 1.7 to 9k - <!-- This is a simple template for filing JRuby isuses. Please help us help you by providing the information below. Text inside XML comment tags will not be shown in your report. --> ### Environment <!-- Provide at least: * JRuby version (`jruby -v`) and command line (flags, JRUBY_OPTS, etc) * Operating system and platform (e.g. `uname -a`) Other relevant info you may wish to add: * Installed or activated gems * Application/framework version (e.g. Rails, Sinatra) * Environment variables --> JRuby 1.7.20.1, JRuby 9.1.0.0, JRuby 9.1.1.0; run from Java via ScriptingContainer, with various values tested for the setCompileMode method. Standalone script execution with no frameworks. ### Expected Behavior <!-- Describe your expectation of how JRuby should behave. Provide an executable Ruby script or a link to an example repository. --> Expected performance for `Time.parse` to be on par with performance for 1.7.x. ### Actual Behavior <!-- Describe or show the actual behavior. Provide text or screen capture showing the behavior. --> `Time.parse` seems to be roughly 60% slower in JRuby 9k than in 1.7.x. I have set up a github repo with a simple reproducer here: https://github.com/cprice404/jruby9k-benchmarks/tree/19a2719e4edddc17e3f1fabbf311b9d80c6eba80/time-parse-comparison Here are some relevant numbers from the benchmark output (the rest of it is available in the linked reproducer repro if you are interested): ``` JRUBY VERSION: 1.7.20.1 COMPILE MODE: off user system total real warmup (100 runs): 0.213000 0.000000 0.213000 ( 0.213000) middle (10000 runs): 1.179000 0.000000 1.179000 ( 1.179000) tail (100 runs): 0.009000 0.000000 0.009000 ( 0.009000) JRUBY VERSION: 9.1.1.0 COMPILE MODE: off user system total real warmup (100 runs): 0.730000 0.010000 0.740000 ( 0.138776) middle (10000 runs): 4.890000 0.300000 5.190000 ( 1.905043) tail (100 runs): 0.030000 0.010000 0.040000 ( 0.019285) ``` Also tested with `compileMode` set to `JIT`; that doesn't seem to make much difference in 1.7, and makes the numbers look worse in 9k (though the benchmark may not have had a long enough execution time to give a fair characterization of JIT).
non_priority
performance regression with time parse from to this is a simple template for filing jruby isuses please help us help you by providing the information below text inside xml comment tags will not be shown in your report environment provide at least jruby version jruby v and command line flags jruby opts etc operating system and platform e g uname a other relevant info you may wish to add installed or activated gems application framework version e g rails sinatra environment variables jruby jruby jruby run from java via scriptingcontainer with various values tested for the setcompilemode method standalone script execution with no frameworks expected behavior describe your expectation of how jruby should behave provide an executable ruby script or a link to an example repository expected performance for time parse to be on par with performance for x actual behavior describe or show the actual behavior provide text or screen capture showing the behavior time parse seems to be roughly slower in jruby than in x i have set up a github repo with a simple reproducer here here are some relevant numbers from the benchmark output the rest of it is available in the linked reproducer repro if you are interested jruby version compile mode off user system total real warmup runs middle runs tail runs jruby version compile mode off user system total real warmup runs middle runs tail runs also tested with compilemode set to jit that doesn t seem to make much difference in and makes the numbers look worse in though the benchmark may not have had a long enough execution time to give a fair characterization of jit
0
340,380
30,512,710,403
IssuesEvent
2023-07-18 22:30:02
cassiosantana/book_publisher
https://api.github.com/repos/cassiosantana/book_publisher
opened
Fix factories that were changed after previously created tests
bug test
These changes caused errors in several tests that depended on the previous state of a certain factory
1.0
Fix factories that were changed after previously created tests - These changes caused errors in several tests that depended on the previous state of a certain factory
non_priority
fix factories that were changed after previously created tests these changes caused errors in several tests that depended on the previous state of a certain factory
0
347,968
31,390,285,500
IssuesEvent
2023-08-26 08:45:25
Azure/ResourceModules
https://api.github.com/repos/Azure/ResourceModules
closed
Convert example module to check overall impact
[cat] testing
convert storage account folder and references open draft PR
1.0
Convert example module to check overall impact - convert storage account folder and references open draft PR
non_priority
convert example module to check overall impact convert storage account folder and references open draft pr
0
318,775
27,321,044,731
IssuesEvent
2023-02-24 19:52:26
peviitor-ro/ui-js
https://api.github.com/repos/peviitor-ro/ui-js
closed
Rocket image size
bug TestQuality Medium
## Precondition URL: https://beta.peviitor.ro Device: Iphone 12 Pro Browser: Chrome ## Steps to Reproduce: ### Step 1 <span style="color:#58b880"> **[Pass]** </span> Open URL in browser #### Expected Result The webpage is loaded without any errors ### Step 2 <span style="color:#ff5538"> **[Fail]** </span> Check if the rocket icon is displayed as per design on Figma https://www.figma.com/file/gY6yYTFjC0fuZ4bTRlUaH6/Pe-viitor?node-id&#x3D;1023%3A957 #### Expected Result Rocket icon is displayed as per design #### Actual Result Rocket image size as per design (156 X 170) ; actual rocket image size (161 x 170)
1.0
Rocket image size - ## Precondition URL: https://beta.peviitor.ro Device: Iphone 12 Pro Browser: Chrome ## Steps to Reproduce: ### Step 1 <span style="color:#58b880"> **[Pass]** </span> Open URL in browser #### Expected Result The webpage is loaded without any errors ### Step 2 <span style="color:#ff5538"> **[Fail]** </span> Check if the rocket icon is displayed as per design on Figma https://www.figma.com/file/gY6yYTFjC0fuZ4bTRlUaH6/Pe-viitor?node-id&#x3D;1023%3A957 #### Expected Result Rocket icon is displayed as per design #### Actual Result Rocket image size as per design (156 X 170) ; actual rocket image size (161 x 170)
non_priority
rocket image size precondition url device iphone pro browser chrome steps to reproduce step open url in browser expected result the webpage is loaded without any errors step check if the rocket icon is displayed as per design on figma expected result rocket icon is displayed as per design actual result rocket image size as per design x actual rocket image size x
0
138,148
12,808,034,350
IssuesEvent
2020-07-03 12:47:53
reapit/foundations
https://api.github.com/repos/reapit/foundations
closed
Improve webhooks documentation to clarify relationship between webhooks and platform API schemas
documentation platform-team
The documentation for our webhooks system includes details on the expected payload we will send, including an example. We should make it clearer that the `new`, `old` and `diff` attributes will contain content that relates to the same schema as we expose in the APIs we document in our interactive API explorer.
1.0
Improve webhooks documentation to clarify relationship between webhooks and platform API schemas - The documentation for our webhooks system includes details on the expected payload we will send, including an example. We should make it clearer that the `new`, `old` and `diff` attributes will contain content that relates to the same schema as we expose in the APIs we document in our interactive API explorer.
non_priority
improve webhooks documentation to clarify relationship between webhooks and platform api schemas the documentation for our webhooks system includes details on the expected payload we will send including an example we should make it clearer that the new old and diff attributes will contain content that relates to the same schema as we expose in the apis we document in our interactive api explorer
0
333,789
24,391,444,430
IssuesEvent
2022-10-04 15:31:09
microsoft/AzureTRE
https://api.github.com/repos/microsoft/AzureTRE
opened
Documentation: Shared service docs don't include makefile deployment step
bug documentation
**Describe the bug** Currently the docs at https://github.com/microsoft/AzureTRE/blob/main/docs/tre-admins/setup-instructions/configuring-shared-services.md mention configuring shared services, but they don't include the deployment step (which was removed from the `make all` path). We should include the deployment steps as part of the set up guide for each shared service and change the title from configuring shared services to deploying them.
1.0
Documentation: Shared service docs don't include makefile deployment step - **Describe the bug** Currently the docs at https://github.com/microsoft/AzureTRE/blob/main/docs/tre-admins/setup-instructions/configuring-shared-services.md mention configuring shared services, but they don't include the deployment step (which was removed from the `make all` path). We should include the deployment steps as part of the set up guide for each shared service and change the title from configuring shared services to deploying them.
non_priority
documentation shared service docs don t include makefile deployment step describe the bug currently the docs at mention configuring shared services but they don t include the deployment step which was removed from the make all path we should include the deployment steps as part of the set up guide for each shared service and change the title from configuring shared services to deploying them
0
55,032
23,387,108,101
IssuesEvent
2022-08-11 14:35:53
cityofaustin/atd-data-tech
https://api.github.com/repos/cityofaustin/atd-data-tech
closed
Add ability to create a new locations note
Type: Feature Impact: 2-Major Service: Dev Need: 1-Must Have Workgroup: VZ Product: Vision Zero Crash Data System
Copied from #9497 A user with editor access should be able to create a new note - [ ] Conditionally display form field for "Date" and "Note" text if user is an editor. Hide when user only has read-only access - [ ] When the user clicks "Add" button, send a graphQL mutation to insert a new record into the `notes` table. - [ ] Include info about current user with graphQL mutation for DB storage and display in "Updated by" column. _An open question we may need to re-address in the `notes` DB schema is if we need to store the `created_by` data as a user_id or as an email address. This depends on what's easiest to pull from Auth0, our user management and external authentication database/provider. We'll need to reference the the Users/Staff page to review queries and Auth0 data._ ![Locations - Notes – 2.png](https://images.zenhubusercontent.com/5d68810b05d7792664be403f/a442cd06-460b-4711-b889-bffbdccbfb7c)
1.0
Add ability to create a new locations note - Copied from #9497 A user with editor access should be able to create a new note - [ ] Conditionally display form field for "Date" and "Note" text if user is an editor. Hide when user only has read-only access - [ ] When the user clicks "Add" button, send a graphQL mutation to insert a new record into the `notes` table. - [ ] Include info about current user with graphQL mutation for DB storage and display in "Updated by" column. _An open question we may need to re-address in the `notes` DB schema is if we need to store the `created_by` data as a user_id or as an email address. This depends on what's easiest to pull from Auth0, our user management and external authentication database/provider. We'll need to reference the the Users/Staff page to review queries and Auth0 data._ ![Locations - Notes – 2.png](https://images.zenhubusercontent.com/5d68810b05d7792664be403f/a442cd06-460b-4711-b889-bffbdccbfb7c)
non_priority
add ability to create a new locations note copied from a user with editor access should be able to create a new note conditionally display form field for date and note text if user is an editor hide when user only has read only access when the user clicks add button send a graphql mutation to insert a new record into the notes table include info about current user with graphql mutation for db storage and display in updated by column an open question we may need to re address in the notes db schema is if we need to store the created by data as a user id or as an email address this depends on what s easiest to pull from our user management and external authentication database provider we ll need to reference the the users staff page to review queries and data
0
167,947
26,570,896,254
IssuesEvent
2023-01-21 05:37:37
BlossomLabs/OsmoticFund
https://api.github.com/repos/BlossomLabs/OsmoticFund
opened
Contracts: add a project list contract
👩‍🎨 design
Create a middle contract between the `ProjectRegistry` and the `OsmoticPool` so we can have a filter of the project registry and avoid the need of registering project in the pool.
1.0
Contracts: add a project list contract - Create a middle contract between the `ProjectRegistry` and the `OsmoticPool` so we can have a filter of the project registry and avoid the need of registering project in the pool.
non_priority
contracts add a project list contract create a middle contract between the projectregistry and the osmoticpool so we can have a filter of the project registry and avoid the need of registering project in the pool
0
248,089
20,994,121,275
IssuesEvent
2022-03-29 12:05:29
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
opened
../src/Interpreters/ExternalLoader.cpp:1159:33: runtime error: member call on address 0x7fdb3c210500 which does not point to an object of type 'DB::IExternalLoadable' 0x7fdb3c210500: note: object is of type 'DB::CatBoostModel'
testing
test_catboost_model_first_evaluate ubsan ``` ../src/Interpreters/ExternalLoader.cpp:1159:33: runtime error: member call on address 0x7fdb3c210500 which does not point to an object of type 'DB::IExternalLoadable' 0x7fdb3c210500: note: object is of type 'DB::CatBoostModel' 00 00 00 00 88 29 52 0a 00 00 00 00 00 05 21 3c db 7f 00 00 20 ee 39 3c db 7f 00 00 74 69 74 61 ^~~~~~~~~~~~~~~~~~~~~~~ vptr for 'DB::CatBoostModel' #0 0x21ec5dbe in DB::ExternalLoader::LoadingDispatcher::calculateNextUpdateTime(std::__1::shared_ptr<DB::IExternalLoadable const> const&, unsigned long) const obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:1159:33 #1 0x21eb9a8c in DB::ExternalLoader::LoadingDispatcher::saveResultOfLoadingSingleObject(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, unsigned long, std::__1::shared_ptr<DB::IExternalLoadable const>, std::__1::shared_ptr<DB::IExternalLoadable const>, std::exception_ptr, unsigned long, DB::(anonymous namespace)::LoadingGuardForAsyncLoad const&) obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:1075:32 #2 0x21ec21fa in DB::ExternalLoader::LoadingDispatcher::doLoading(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, unsigned long, bool, unsigned long, bool, std::__1::shared_ptr<DB::ThreadGroupStatus>) obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:1005:17 #3 0x21ec13de in DB::ExternalLoader::LoadingDispatcher::startLoading(DB::ExternalLoader::LoadingDispatcher::Info&, bool, unsigned long) obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:936:13 #4 0x21eda12e in DB::ExternalLoader::LoadingDispatcher::loadImpl(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000l> >, bool, std::__1::unique_lock<std::__1::mutex>&)::'lambda'()::operator()() const obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:839:17 #5 0x21ed9ece in void std::__1::condition_variable::wait<DB::ExternalLoader::LoadingDispatcher::loadImpl(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000l> >, bool, std::__1::unique_lock<std::__1::mutex>&)::'lambda'()>(std::__1::unique_lock<std::__1::mutex>&, DB::ExternalLoader::LoadingDispatcher::loadImpl(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000l> >, bool, std::__1::unique_lock<std::__1::mutex>&)::'lambda'()) obj-x86_64-linux-gnu/../contrib/libcxx/include/__mutex_base:405:13 #6 0x21ed9ece in DB::ExternalLoader::LoadingDispatcher::loadImpl(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000l> >, bool, std::__1::unique_lock<std::__1::mutex>&) obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:846:19 #7 0x21ebc2df in DB::ExternalLoader::LoadResult DB::ExternalLoader::LoadingDispatcher::tryLoad<DB::ExternalLoader::LoadResult>(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000l> >) obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:612:23 #8 0x21ebc247 in DB::ExternalLoader::LoadResult DB::ExternalLoader::tryLoad<DB::ExternalLoader::LoadResult, void>(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000l> >) const obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:1371:32 #9 0x21ebc7cb in std::__1::shared_ptr<DB::IExternalLoadable const> DB::ExternalLoader::load<std::__1::shared_ptr<DB::IExternalLoadable const>, void>(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&) const obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:1383:19 #10 0x1555472d in DB::ExternalModelsLoader::getModel(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&) const (/usr/bin/clickhouse+0x1555472d) #11 0x15553d49 in DB::FunctionModelEvaluate::getReturnTypeImpl(std::__1::vector<DB::ColumnWithTypeAndName, std::__1::allocator<DB::ColumnWithTypeAndName> > const&) const (/usr/bin/clickhouse+0x15553d49) #12 0x2159ab7d in DB::IFunctionOverloadResolver::getReturnType(std::__1::vector<DB::ColumnWithTypeAndName, std::__1::allocator<DB::ColumnWithTypeAndName> > const&) const obj-x86_64-linux-gnu/../src/Functions/IFunction.cpp:385:45 #13 0x2159b2ce in DB::IFunctionOverloadResolver::build(std::__1::vector<DB::ColumnWithTypeAndName, std::__1::allocator<DB::ColumnWithTypeAndName> > const&) const obj-x86_64-linux-gnu/../src/Functions/IFunction.cpp:400:24 #14 0x21cb9bc6 in DB::ActionsDAG::addFunction(std::__1::shared_ptr<DB::IFunctionOverloadResolver> const&, std::__1::vector<DB::ActionsDAG::Node const*, std::__1::allocator<DB::ActionsDAG::Node const*> >, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >) obj-x86_64-linux-gnu/../src/Interpreters/ActionsDAG.cpp:186:36 #15 0x21e95467 in DB::ScopeStack::addFunction(std::__1::shared_ptr<DB::IFunctionOverloadResolver> const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >) obj-x86_64-linux-gnu/../src/Interpreters/ActionsVisitor.cpp:580:51 #16 0x21ea8b31 in DB::ActionsMatcher::Data::addFunction(std::__1::shared_ptr<DB::IFunctionOverloadResolver> const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >) obj-x86_64-linux-gnu/../src/Interpreters/ActionsVisitor.h:169:27 #17 0x21e9e74e in DB::ActionsMatcher::visit(DB::ASTFunction const&, std::__1::shared_ptr<DB::IAST> const&, DB::ActionsMatcher::Data&) obj-x86_64-linux-gnu/../src/Interpreters/ActionsVisitor.cpp:1076:14 #18 0x21ea492b in DB::ActionsMatcher::visit(DB::ASTExpressionList&, std::__1::shared_ptr<DB::IAST> const&, DB::ActionsMatcher::Data&) obj-x86_64-linux-gnu/../contrib/libcxx/include/vector #19 0x21e72d1e in DB::InDepthNodeVisitor<DB::ActionsMatcher, true, false, std::__1::shared_ptr<DB::IAST> const>::visit(std::__1::shared_ptr<DB::IAST> const&) obj-x86_64-linux-gnu/../src/Interpreters/InDepthNodeVisitor.h:34:13 #20 0x21e5dade in DB::ExpressionAnalyzer::getRootActions(std::__1::shared_ptr<DB::IAST> const&, bool, std::__1::shared_ptr<DB::ActionsDAG>&, bool) obj-x86_64-linux-gnu/../src/Interpreters/ExpressionAnalyzer.cpp:518:48 #21 0x21e67741 in DB::SelectQueryExpressionAnalyzer::appendSelect(DB::ExpressionActionsChain&, bool) obj-x86_64-linux-gnu/../src/Interpreters/ExpressionAnalyzer.cpp:1264:5 #22 0x21e6c418 in DB::ExpressionAnalysisResult::ExpressionAnalysisResult(DB::SelectQueryExpressionAnalyzer&, std::__1::shared_ptr<DB::StorageInMemoryMetadata const> const&, bool, bool, bool, std::__1::shared_ptr<DB::FilterDAGInfo> const&, DB::Block const&) obj-x86_64-linux-gnu/../src/Interpreters/ExpressionAnalyzer.cpp:1674:24 #23 0x22321d95 in DB::InterpreterSelectQuery::getSampleBlockImpl() obj-x86_64-linux-gnu/../src/Interpreters/InterpreterSelectQuery.cpp:660:23 #24 0x22315a24 in DB::InterpreterSelectQuery::InterpreterSelectQuery(std::__1::shared_ptr<DB::IAST> const&, std::__1::shared_ptr<DB::Context const>, std::__1::optional<DB::Pipe>, std::__1::shared_ptr<DB::IStora ge> const&, DB::SelectQueryOptions const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_tra its<char>, std::__1::allocator<char> > > > const&, std::__1::shared_ptr<DB::StorageInMemoryMetadata const> const&, std::__1::unordered_map<DB::PreparedSetKey, std::__1::shared_ptr<DB::Set>, DB::PreparedSetKey::Hash , std::__1::equal_to<DB::PreparedSetKey>, std::__1::allocator<std::__1::pair<DB::PreparedSetKey const, std::__1::shared_ptr<DB::Set> > > >)::$_1::operator()(bool) const obj-x86_64-linux-gnu/../src/Interpreters/Inte rpreterSelectQuery.cpp:525:25 #25 0x2230ec43 in DB::InterpreterSelectQuery::InterpreterSelectQuery(std::__1::shared_ptr<DB::IAST> const&, std::__1::shared_ptr<DB::Context const>, std::__1::optional<DB::Pipe>, std::__1::shared_ptr<DB::IStora ge> const&, DB::SelectQueryOptions const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_tra its<char>, std::__1::allocator<char> > > > const&, std::__1::shared_ptr<DB::StorageInMemoryMetadata const> const&, std::__1::unordered_map<DB::PreparedSetKey, std::__1::shared_ptr<DB::Set>, DB::PreparedSetKey::Hash , std::__1::equal_to<DB::PreparedSetKey>, std::__1::allocator<std::__1::pair<DB::PreparedSetKey const, std::__1::shared_ptr<DB::Set> > > >) obj-x86_64-linux-gnu/../src/Interpreters/InterpreterSelectQuery.cpp:528:5 #26 0x2230c150 in DB::InterpreterSelectQuery::InterpreterSelectQuery(std::__1::shared_ptr<DB::IAST> const&, std::__1::shared_ptr<DB::Context const>, DB::SelectQueryOptions const&, std::__1::vector<std::__1::bas ic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&) obj-x86_64-linux-gnu/. ./src/Interpreters/InterpreterSelectQuery.cpp:160:7 #27 0x225e90fd in std::__1::__unique_if<DB::InterpreterSelectQuery>::__unique_single std::__1::make_unique<DB::InterpreterSelectQuery, std::__1::shared_ptr<DB::IAST> const&, std::__1::shared_ptr<DB::Context>&, DB::SelectQueryOptions&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__ 1::allocator<char> > > > const&>(std::__1::shared_ptr<DB::IAST> const&, std::__1::shared_ptr<DB::Context>&, DB::SelectQueryOptions&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::_ _1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&) obj-x86_64-linux-gnu/../contrib/libcxx/include/memory:2068:32 #28 0x225e6266 in DB::InterpreterSelectWithUnionQuery::buildCurrentChildInterpreter(std::__1::shared_ptr<DB::IAST> const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::al locator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&) obj-x86_64-linux-gnu/../src/Interpreters/InterpreterSelectWithUnionQuery.cpp:22 3:16 #29 0x225e4020 in DB::InterpreterSelectWithUnionQuery::InterpreterSelectWithUnionQuery(std::__1::shared_ptr<DB::IAST> const&, std::__1::shared_ptr<DB::Context const>, DB::SelectQueryOptions const&, std::__1::ve ctor<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&) obj- x86_64-linux-gnu/../src/Interpreters/InterpreterSelectWithUnionQuery.cpp:140:13 #30 0x2227c3e9 in std::__1::__unique_if<DB::InterpreterSelectWithUnionQuery>::__unique_single std::__1::make_unique<DB::InterpreterSelectWithUnionQuery, std::__1::shared_ptr<DB::IAST>&, std::__1::shared_ptr<DB: :Context>&, DB::SelectQueryOptions const&>(std::__1::shared_ptr<DB::IAST>&, std::__1::shared_ptr<DB::Context>&, DB::SelectQueryOptions const&) obj-x86_64-linux-gnu/../contrib/libcxx/include/memory:2068:32 #31 0x2227aefd in DB::InterpreterFactory::get(std::__1::shared_ptr<DB::IAST>&, std::__1::shared_ptr<DB::Context>, DB::SelectQueryOptions const&) obj-x86_64-linux-gnu/../src/Interpreters/InterpreterFactory.cpp:1 20:16 #32 0x22986483 in DB::executeQueryImpl(char const*, char const*, std::__1::shared_ptr<DB::Context>, bool, DB::QueryProcessingStage::Enum, DB::ReadBuffer*) obj-x86_64-linux-gnu/../src/Interpreters/executeQuery.c pp:633:27 #33 0x22983ac9 in DB::executeQuery(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::shared_ptr<DB::Context>, bool, DB::QueryProcessingStage::Enum) obj-x86_ 64-linux-gnu/../src/Interpreters/executeQuery.cpp:986:30 #34 0x2387ade6 in DB::TCPHandler::runImpl() obj-x86_64-linux-gnu/../src/Server/TCPHandler.cpp:332:24 #35 0x23897a35 in DB::TCPHandler::run() obj-x86_64-linux-gnu/../src/Server/TCPHandler.cpp:1767:9 #36 0x24909d8b in Poco::Net::TCPServerConnection::start() obj-x86_64-linux-gnu/../contrib/poco/Net/src/TCPServerConnection.cpp:43:3 #37 0x2490a264 in Poco::Net::TCPServerDispatcher::run() obj-x86_64-linux-gnu/../contrib/poco/Net/src/TCPServerDispatcher.cpp:115:20 #38 0x24a7fc46 in Poco::PooledThread::run() obj-x86_64-linux-gnu/../contrib/poco/Foundation/src/ThreadPool.cpp:199:14 #39 0x24a7d52b in Poco::ThreadImpl::runnableEntry(void*) obj-x86_64-linux-gnu/../contrib/poco/Foundation/src/Thread_POSIX.cpp:345:27 #40 0x7fdcf9ee1608 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x8608) #41 0x7fdcf9e06162 in __clone (/lib/x86_64-linux-gnu/libc.so.6+0x11f162) SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior ../src/Interpreters/ExternalLoader.cpp:1159:33 in ```
1.0
../src/Interpreters/ExternalLoader.cpp:1159:33: runtime error: member call on address 0x7fdb3c210500 which does not point to an object of type 'DB::IExternalLoadable' 0x7fdb3c210500: note: object is of type 'DB::CatBoostModel' - test_catboost_model_first_evaluate ubsan ``` ../src/Interpreters/ExternalLoader.cpp:1159:33: runtime error: member call on address 0x7fdb3c210500 which does not point to an object of type 'DB::IExternalLoadable' 0x7fdb3c210500: note: object is of type 'DB::CatBoostModel' 00 00 00 00 88 29 52 0a 00 00 00 00 00 05 21 3c db 7f 00 00 20 ee 39 3c db 7f 00 00 74 69 74 61 ^~~~~~~~~~~~~~~~~~~~~~~ vptr for 'DB::CatBoostModel' #0 0x21ec5dbe in DB::ExternalLoader::LoadingDispatcher::calculateNextUpdateTime(std::__1::shared_ptr<DB::IExternalLoadable const> const&, unsigned long) const obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:1159:33 #1 0x21eb9a8c in DB::ExternalLoader::LoadingDispatcher::saveResultOfLoadingSingleObject(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, unsigned long, std::__1::shared_ptr<DB::IExternalLoadable const>, std::__1::shared_ptr<DB::IExternalLoadable const>, std::exception_ptr, unsigned long, DB::(anonymous namespace)::LoadingGuardForAsyncLoad const&) obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:1075:32 #2 0x21ec21fa in DB::ExternalLoader::LoadingDispatcher::doLoading(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, unsigned long, bool, unsigned long, bool, std::__1::shared_ptr<DB::ThreadGroupStatus>) obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:1005:17 #3 0x21ec13de in DB::ExternalLoader::LoadingDispatcher::startLoading(DB::ExternalLoader::LoadingDispatcher::Info&, bool, unsigned long) obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:936:13 #4 0x21eda12e in DB::ExternalLoader::LoadingDispatcher::loadImpl(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000l> >, bool, std::__1::unique_lock<std::__1::mutex>&)::'lambda'()::operator()() const obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:839:17 #5 0x21ed9ece in void std::__1::condition_variable::wait<DB::ExternalLoader::LoadingDispatcher::loadImpl(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000l> >, bool, std::__1::unique_lock<std::__1::mutex>&)::'lambda'()>(std::__1::unique_lock<std::__1::mutex>&, DB::ExternalLoader::LoadingDispatcher::loadImpl(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000l> >, bool, std::__1::unique_lock<std::__1::mutex>&)::'lambda'()) obj-x86_64-linux-gnu/../contrib/libcxx/include/__mutex_base:405:13 #6 0x21ed9ece in DB::ExternalLoader::LoadingDispatcher::loadImpl(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000l> >, bool, std::__1::unique_lock<std::__1::mutex>&) obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:846:19 #7 0x21ebc2df in DB::ExternalLoader::LoadResult DB::ExternalLoader::LoadingDispatcher::tryLoad<DB::ExternalLoader::LoadResult>(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000l> >) obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:612:23 #8 0x21ebc247 in DB::ExternalLoader::LoadResult DB::ExternalLoader::tryLoad<DB::ExternalLoader::LoadResult, void>(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::chrono::duration<long long, std::__1::ratio<1l, 1000l> >) const obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:1371:32 #9 0x21ebc7cb in std::__1::shared_ptr<DB::IExternalLoadable const> DB::ExternalLoader::load<std::__1::shared_ptr<DB::IExternalLoadable const>, void>(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&) const obj-x86_64-linux-gnu/../src/Interpreters/ExternalLoader.cpp:1383:19 #10 0x1555472d in DB::ExternalModelsLoader::getModel(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&) const (/usr/bin/clickhouse+0x1555472d) #11 0x15553d49 in DB::FunctionModelEvaluate::getReturnTypeImpl(std::__1::vector<DB::ColumnWithTypeAndName, std::__1::allocator<DB::ColumnWithTypeAndName> > const&) const (/usr/bin/clickhouse+0x15553d49) #12 0x2159ab7d in DB::IFunctionOverloadResolver::getReturnType(std::__1::vector<DB::ColumnWithTypeAndName, std::__1::allocator<DB::ColumnWithTypeAndName> > const&) const obj-x86_64-linux-gnu/../src/Functions/IFunction.cpp:385:45 #13 0x2159b2ce in DB::IFunctionOverloadResolver::build(std::__1::vector<DB::ColumnWithTypeAndName, std::__1::allocator<DB::ColumnWithTypeAndName> > const&) const obj-x86_64-linux-gnu/../src/Functions/IFunction.cpp:400:24 #14 0x21cb9bc6 in DB::ActionsDAG::addFunction(std::__1::shared_ptr<DB::IFunctionOverloadResolver> const&, std::__1::vector<DB::ActionsDAG::Node const*, std::__1::allocator<DB::ActionsDAG::Node const*> >, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >) obj-x86_64-linux-gnu/../src/Interpreters/ActionsDAG.cpp:186:36 #15 0x21e95467 in DB::ScopeStack::addFunction(std::__1::shared_ptr<DB::IFunctionOverloadResolver> const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >) obj-x86_64-linux-gnu/../src/Interpreters/ActionsVisitor.cpp:580:51 #16 0x21ea8b31 in DB::ActionsMatcher::Data::addFunction(std::__1::shared_ptr<DB::IFunctionOverloadResolver> const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >) obj-x86_64-linux-gnu/../src/Interpreters/ActionsVisitor.h:169:27 #17 0x21e9e74e in DB::ActionsMatcher::visit(DB::ASTFunction const&, std::__1::shared_ptr<DB::IAST> const&, DB::ActionsMatcher::Data&) obj-x86_64-linux-gnu/../src/Interpreters/ActionsVisitor.cpp:1076:14 #18 0x21ea492b in DB::ActionsMatcher::visit(DB::ASTExpressionList&, std::__1::shared_ptr<DB::IAST> const&, DB::ActionsMatcher::Data&) obj-x86_64-linux-gnu/../contrib/libcxx/include/vector #19 0x21e72d1e in DB::InDepthNodeVisitor<DB::ActionsMatcher, true, false, std::__1::shared_ptr<DB::IAST> const>::visit(std::__1::shared_ptr<DB::IAST> const&) obj-x86_64-linux-gnu/../src/Interpreters/InDepthNodeVisitor.h:34:13 #20 0x21e5dade in DB::ExpressionAnalyzer::getRootActions(std::__1::shared_ptr<DB::IAST> const&, bool, std::__1::shared_ptr<DB::ActionsDAG>&, bool) obj-x86_64-linux-gnu/../src/Interpreters/ExpressionAnalyzer.cpp:518:48 #21 0x21e67741 in DB::SelectQueryExpressionAnalyzer::appendSelect(DB::ExpressionActionsChain&, bool) obj-x86_64-linux-gnu/../src/Interpreters/ExpressionAnalyzer.cpp:1264:5 #22 0x21e6c418 in DB::ExpressionAnalysisResult::ExpressionAnalysisResult(DB::SelectQueryExpressionAnalyzer&, std::__1::shared_ptr<DB::StorageInMemoryMetadata const> const&, bool, bool, bool, std::__1::shared_ptr<DB::FilterDAGInfo> const&, DB::Block const&) obj-x86_64-linux-gnu/../src/Interpreters/ExpressionAnalyzer.cpp:1674:24 #23 0x22321d95 in DB::InterpreterSelectQuery::getSampleBlockImpl() obj-x86_64-linux-gnu/../src/Interpreters/InterpreterSelectQuery.cpp:660:23 #24 0x22315a24 in DB::InterpreterSelectQuery::InterpreterSelectQuery(std::__1::shared_ptr<DB::IAST> const&, std::__1::shared_ptr<DB::Context const>, std::__1::optional<DB::Pipe>, std::__1::shared_ptr<DB::IStora ge> const&, DB::SelectQueryOptions const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_tra its<char>, std::__1::allocator<char> > > > const&, std::__1::shared_ptr<DB::StorageInMemoryMetadata const> const&, std::__1::unordered_map<DB::PreparedSetKey, std::__1::shared_ptr<DB::Set>, DB::PreparedSetKey::Hash , std::__1::equal_to<DB::PreparedSetKey>, std::__1::allocator<std::__1::pair<DB::PreparedSetKey const, std::__1::shared_ptr<DB::Set> > > >)::$_1::operator()(bool) const obj-x86_64-linux-gnu/../src/Interpreters/Inte rpreterSelectQuery.cpp:525:25 #25 0x2230ec43 in DB::InterpreterSelectQuery::InterpreterSelectQuery(std::__1::shared_ptr<DB::IAST> const&, std::__1::shared_ptr<DB::Context const>, std::__1::optional<DB::Pipe>, std::__1::shared_ptr<DB::IStora ge> const&, DB::SelectQueryOptions const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_tra its<char>, std::__1::allocator<char> > > > const&, std::__1::shared_ptr<DB::StorageInMemoryMetadata const> const&, std::__1::unordered_map<DB::PreparedSetKey, std::__1::shared_ptr<DB::Set>, DB::PreparedSetKey::Hash , std::__1::equal_to<DB::PreparedSetKey>, std::__1::allocator<std::__1::pair<DB::PreparedSetKey const, std::__1::shared_ptr<DB::Set> > > >) obj-x86_64-linux-gnu/../src/Interpreters/InterpreterSelectQuery.cpp:528:5 #26 0x2230c150 in DB::InterpreterSelectQuery::InterpreterSelectQuery(std::__1::shared_ptr<DB::IAST> const&, std::__1::shared_ptr<DB::Context const>, DB::SelectQueryOptions const&, std::__1::vector<std::__1::bas ic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&) obj-x86_64-linux-gnu/. ./src/Interpreters/InterpreterSelectQuery.cpp:160:7 #27 0x225e90fd in std::__1::__unique_if<DB::InterpreterSelectQuery>::__unique_single std::__1::make_unique<DB::InterpreterSelectQuery, std::__1::shared_ptr<DB::IAST> const&, std::__1::shared_ptr<DB::Context>&, DB::SelectQueryOptions&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__ 1::allocator<char> > > > const&>(std::__1::shared_ptr<DB::IAST> const&, std::__1::shared_ptr<DB::Context>&, DB::SelectQueryOptions&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::_ _1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&) obj-x86_64-linux-gnu/../contrib/libcxx/include/memory:2068:32 #28 0x225e6266 in DB::InterpreterSelectWithUnionQuery::buildCurrentChildInterpreter(std::__1::shared_ptr<DB::IAST> const&, std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::al locator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&) obj-x86_64-linux-gnu/../src/Interpreters/InterpreterSelectWithUnionQuery.cpp:22 3:16 #29 0x225e4020 in DB::InterpreterSelectWithUnionQuery::InterpreterSelectWithUnionQuery(std::__1::shared_ptr<DB::IAST> const&, std::__1::shared_ptr<DB::Context const>, DB::SelectQueryOptions const&, std::__1::ve ctor<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, std::__1::allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&) obj- x86_64-linux-gnu/../src/Interpreters/InterpreterSelectWithUnionQuery.cpp:140:13 #30 0x2227c3e9 in std::__1::__unique_if<DB::InterpreterSelectWithUnionQuery>::__unique_single std::__1::make_unique<DB::InterpreterSelectWithUnionQuery, std::__1::shared_ptr<DB::IAST>&, std::__1::shared_ptr<DB: :Context>&, DB::SelectQueryOptions const&>(std::__1::shared_ptr<DB::IAST>&, std::__1::shared_ptr<DB::Context>&, DB::SelectQueryOptions const&) obj-x86_64-linux-gnu/../contrib/libcxx/include/memory:2068:32 #31 0x2227aefd in DB::InterpreterFactory::get(std::__1::shared_ptr<DB::IAST>&, std::__1::shared_ptr<DB::Context>, DB::SelectQueryOptions const&) obj-x86_64-linux-gnu/../src/Interpreters/InterpreterFactory.cpp:1 20:16 #32 0x22986483 in DB::executeQueryImpl(char const*, char const*, std::__1::shared_ptr<DB::Context>, bool, DB::QueryProcessingStage::Enum, DB::ReadBuffer*) obj-x86_64-linux-gnu/../src/Interpreters/executeQuery.c pp:633:27 #33 0x22983ac9 in DB::executeQuery(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, std::__1::shared_ptr<DB::Context>, bool, DB::QueryProcessingStage::Enum) obj-x86_ 64-linux-gnu/../src/Interpreters/executeQuery.cpp:986:30 #34 0x2387ade6 in DB::TCPHandler::runImpl() obj-x86_64-linux-gnu/../src/Server/TCPHandler.cpp:332:24 #35 0x23897a35 in DB::TCPHandler::run() obj-x86_64-linux-gnu/../src/Server/TCPHandler.cpp:1767:9 #36 0x24909d8b in Poco::Net::TCPServerConnection::start() obj-x86_64-linux-gnu/../contrib/poco/Net/src/TCPServerConnection.cpp:43:3 #37 0x2490a264 in Poco::Net::TCPServerDispatcher::run() obj-x86_64-linux-gnu/../contrib/poco/Net/src/TCPServerDispatcher.cpp:115:20 #38 0x24a7fc46 in Poco::PooledThread::run() obj-x86_64-linux-gnu/../contrib/poco/Foundation/src/ThreadPool.cpp:199:14 #39 0x24a7d52b in Poco::ThreadImpl::runnableEntry(void*) obj-x86_64-linux-gnu/../contrib/poco/Foundation/src/Thread_POSIX.cpp:345:27 #40 0x7fdcf9ee1608 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x8608) #41 0x7fdcf9e06162 in __clone (/lib/x86_64-linux-gnu/libc.so.6+0x11f162) SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior ../src/Interpreters/ExternalLoader.cpp:1159:33 in ```
non_priority
src interpreters externalloader cpp runtime error member call on address which does not point to an object of type db iexternalloadable note object is of type db catboostmodel test catboost model first evaluate ubsan src interpreters externalloader cpp runtime error member call on address which does not point to an object of type db iexternalloadable note object is of type db catboostmodel db ee db vptr for db catboostmodel in db externalloader loadingdispatcher calculatenextupdatetime std shared ptr const unsigned long const obj linux gnu src interpreters externalloader cpp in db externalloader loadingdispatcher saveresultofloadingsingleobject std basic string std allocator const unsigned long std shared ptr std shared ptr std exception ptr unsigned long db anonymous namespace loadingguardforasyncload const obj linux gnu src interpreters externalloader cpp in db externalloader loadingdispatcher doloading std basic string std allocator const unsigned long bool unsigned long bool std shared ptr obj linux gnu src interpreters externalloader cpp in db externalloader loadingdispatcher startloading db externalloader loadingdispatcher info bool unsigned long obj linux gnu src interpreters externalloader cpp in db externalloader loadingdispatcher loadimpl std basic string std allocator const std chrono duration bool std unique lock lambda operator const obj linux gnu src interpreters externalloader cpp in void std condition variable wait std allocator const std chrono duration bool std unique lock lambda std unique lock db externalloader loadingdispatcher loadimpl std basic string std allocator const std chrono duration bool std unique lock lambda obj linux gnu contrib libcxx include mutex base in db externalloader loadingdispatcher loadimpl std basic string std allocator const std chrono duration bool std unique lock obj linux gnu src interpreters externalloader cpp in db externalloader loadresult db externalloader loadingdispatcher tryload std basic string std allocator const std chrono duration obj linux gnu src interpreters externalloader cpp in db externalloader loadresult db externalloader tryload std basic string std allocator const std chrono duration const obj linux gnu src interpreters externalloader cpp in std shared ptr db externalloader load void std basic string std allocator const const obj linux gnu src interpreters externalloader cpp in db externalmodelsloader getmodel std basic string std allocator const const usr bin clickhouse in db functionmodelevaluate getreturntypeimpl std vector const const usr bin clickhouse in db ifunctionoverloadresolver getreturntype std vector const const obj linux gnu src functions ifunction cpp in db ifunctionoverloadresolver build std vector const const obj linux gnu src functions ifunction cpp in db actionsdag addfunction std shared ptr const std vector std basic string std allocator obj linux gnu src interpreters actionsdag cpp in db scopestack addfunction std shared ptr const std vector std allocator std allocator std allocator const std basic string std allocator obj linux gnu src interpreters actionsvisitor cpp in db actionsmatcher data addfunction std shared ptr const std vector std allocator std allocator std allocator const std basic string std allocator obj linux gnu src interpreters actionsvisitor h in db actionsmatcher visit db astfunction const std shared ptr const db actionsmatcher data obj linux gnu src interpreters actionsvisitor cpp in db actionsmatcher visit db astexpressionlist std shared ptr const db actionsmatcher data obj linux gnu contrib libcxx include vector in db indepthnodevisitor const visit std shared ptr const obj linux gnu src interpreters indepthnodevisitor h in db expressionanalyzer getrootactions std shared ptr const bool std shared ptr bool obj linux gnu src interpreters expressionanalyzer cpp in db selectqueryexpressionanalyzer appendselect db expressionactionschain bool obj linux gnu src interpreters expressionanalyzer cpp in db expressionanalysisresult expressionanalysisresult db selectqueryexpressionanalyzer std shared ptr const bool bool bool std shared ptr const db block const obj linux gnu src interpreters expressionanalyzer cpp in db interpreterselectquery getsampleblockimpl obj linux gnu src interpreters interpreterselectquery cpp in db interpreterselectquery interpreterselectquery std shared ptr const std shared ptr std optional std shared ptr db istora ge const db selectqueryoptions const std vector std allocator std allocator std basic string char std char tra its std allocator const std shared ptr const std unordered map db preparedsetkey hash std equal to std allocator operator bool const obj linux gnu src interpreters inte rpreterselectquery cpp in db interpreterselectquery interpreterselectquery std shared ptr const std shared ptr std optional std shared ptr db istora ge const db selectqueryoptions const std vector std allocator std allocator std basic string char std char tra its std allocator const std shared ptr const std unordered map db preparedsetkey hash std equal to std allocator obj linux gnu src interpreters interpreterselectquery cpp in db interpreterselectquery interpreterselectquery std shared ptr const std shared ptr db selectqueryoptions const std vector std bas ic string std allocator std allocator std allocator const obj linux gnu src interpreters interpreterselectquery cpp in std unique if unique single std make unique const std shared ptr db selectqueryoptions std vector std allocator std allocator std allocator const std shared ptr const std shared ptr db selectqueryoptions std vector std allocator std allocator std allocator const obj linux gnu contrib libcxx include memory in db interpreterselectwithunionquery buildcurrentchildinterpreter std shared ptr const std vector std al locator std allocator std allocator const obj linux gnu src interpreters interpreterselectwithunionquery cpp in db interpreterselectwithunionquery interpreterselectwithunionquery std shared ptr const std shared ptr db selectqueryoptions const std ve ctor std allocator std allocator std allocator const obj linux gnu src interpreters interpreterselectwithunionquery cpp in std unique if unique single std make unique std shared ptr db context db selectqueryoptions const std shared ptr std shared ptr db selectqueryoptions const obj linux gnu contrib libcxx include memory in db interpreterfactory get std shared ptr std shared ptr db selectqueryoptions const obj linux gnu src interpreters interpreterfactory cpp in db executequeryimpl char const char const std shared ptr bool db queryprocessingstage enum db readbuffer obj linux gnu src interpreters executequery c pp in db executequery std basic string std allocator const std shared ptr bool db queryprocessingstage enum obj linux gnu src interpreters executequery cpp in db tcphandler runimpl obj linux gnu src server tcphandler cpp in db tcphandler run obj linux gnu src server tcphandler cpp in poco net tcpserverconnection start obj linux gnu contrib poco net src tcpserverconnection cpp in poco net tcpserverdispatcher run obj linux gnu contrib poco net src tcpserverdispatcher cpp in poco pooledthread run obj linux gnu contrib poco foundation src threadpool cpp in poco threadimpl runnableentry void obj linux gnu contrib poco foundation src thread posix cpp in start thread lib linux gnu libpthread so in clone lib linux gnu libc so summary undefinedbehaviorsanitizer undefined behavior src interpreters externalloader cpp in
0
271,462
20,674,902,459
IssuesEvent
2022-03-10 08:15:58
renatogallo27/gruppo-coniche-G-C-P-C-F-M-T-D
https://api.github.com/repos/renatogallo27/gruppo-coniche-G-C-P-C-F-M-T-D
opened
diagramma di flusso
documentation
prima di procedere ad una seconda verifica del diagramma di flusso va ricostruito in modo corretto. - i blocchi devono essere descritti da una singola parola, che sarà il nome della funzione da creare per quel blocco. raggruppate, se possibile più blocchi in funzioni singole. ad esempio il primo potrebbe essere disegna_sfondo(). - valutare quale di questi debba gestire l'inizializzazione - creare il diagramma dei blocchi complessi, clicca per scegliere tipo di conica non ha senso come blocco, al massimo include quelli successivi, quindi va descritto un altro diagramma che spiega cosa fa fino a disegna l'astronave... che va rinominato e cosi via. -
1.0
diagramma di flusso - prima di procedere ad una seconda verifica del diagramma di flusso va ricostruito in modo corretto. - i blocchi devono essere descritti da una singola parola, che sarà il nome della funzione da creare per quel blocco. raggruppate, se possibile più blocchi in funzioni singole. ad esempio il primo potrebbe essere disegna_sfondo(). - valutare quale di questi debba gestire l'inizializzazione - creare il diagramma dei blocchi complessi, clicca per scegliere tipo di conica non ha senso come blocco, al massimo include quelli successivi, quindi va descritto un altro diagramma che spiega cosa fa fino a disegna l'astronave... che va rinominato e cosi via. -
non_priority
diagramma di flusso prima di procedere ad una seconda verifica del diagramma di flusso va ricostruito in modo corretto i blocchi devono essere descritti da una singola parola che sarà il nome della funzione da creare per quel blocco raggruppate se possibile più blocchi in funzioni singole ad esempio il primo potrebbe essere disegna sfondo valutare quale di questi debba gestire l inizializzazione creare il diagramma dei blocchi complessi clicca per scegliere tipo di conica non ha senso come blocco al massimo include quelli successivi quindi va descritto un altro diagramma che spiega cosa fa fino a disegna l astronave che va rinominato e cosi via
0
113,755
11,813,446,636
IssuesEvent
2020-03-19 22:26:05
react-hook-form/react-hook-form
https://api.github.com/repos/react-hook-form/react-hook-form
closed
Using Controller with React DatePicker
improve documentation question
I am trying to get some sanitised error reporting on the DatePicker custom input **Codesandbox link (Required)** Please check this out https://codesandbox.io/s/react-hook-form-and-react-date-picker-wrapped-at-controller-cyc48 - When first loaded the errors are {} and display the error style - If I hit submit immediately DatePicker takes over and does some HTML5 validation which I dont want - Selecting a date and hitting submit does not remove the errors as still {} Basically the issue is about getting the errors to validate correctly within this Controller situation Many thanks.
1.0
Using Controller with React DatePicker - I am trying to get some sanitised error reporting on the DatePicker custom input **Codesandbox link (Required)** Please check this out https://codesandbox.io/s/react-hook-form-and-react-date-picker-wrapped-at-controller-cyc48 - When first loaded the errors are {} and display the error style - If I hit submit immediately DatePicker takes over and does some HTML5 validation which I dont want - Selecting a date and hitting submit does not remove the errors as still {} Basically the issue is about getting the errors to validate correctly within this Controller situation Many thanks.
non_priority
using controller with react datepicker i am trying to get some sanitised error reporting on the datepicker custom input codesandbox link required please check this out when first loaded the errors are and display the error style if i hit submit immediately datepicker takes over and does some validation which i dont want selecting a date and hitting submit does not remove the errors as still basically the issue is about getting the errors to validate correctly within this controller situation many thanks
0
33,149
6,159,996,460
IssuesEvent
2017-06-29 02:53:55
IQSS/dataverse
https://api.github.com/repos/IQSS/dataverse
reopened
Dev Guide should give more guidance on type safety, code quality, code style, etc.
Component: Developer Guide Help Wanted: Documentation Mentor: pdurbin Type: Suggestion
We should mention the following 4 spaces javadoc dev-list options -> editor -> code completion -> auto popup create a settings bundle to import? We should add sample code, like the code from Netbeans tabs and spaces thing. We could separate into code style and code quality.
1.0
Dev Guide should give more guidance on type safety, code quality, code style, etc. - We should mention the following 4 spaces javadoc dev-list options -> editor -> code completion -> auto popup create a settings bundle to import? We should add sample code, like the code from Netbeans tabs and spaces thing. We could separate into code style and code quality.
non_priority
dev guide should give more guidance on type safety code quality code style etc we should mention the following spaces javadoc dev list options editor code completion auto popup create a settings bundle to import we should add sample code like the code from netbeans tabs and spaces thing we could separate into code style and code quality
0
342,776
30,637,782,703
IssuesEvent
2023-07-24 19:11:43
galaxyproject/galaxy
https://api.github.com/repos/galaxyproject/galaxy
closed
release notes bullhorn is blinking on every visit
kind/bug area/UI-UX release-testing-23.1
Every page reload resets the blinking so our use of localstorage for state persistence seems to not work correctly. xref https://github.com/galaxyproject/galaxy/pull/16049
1.0
release notes bullhorn is blinking on every visit - Every page reload resets the blinking so our use of localstorage for state persistence seems to not work correctly. xref https://github.com/galaxyproject/galaxy/pull/16049
non_priority
release notes bullhorn is blinking on every visit every page reload resets the blinking so our use of localstorage for state persistence seems to not work correctly xref
0
180,396
21,625,725,094
IssuesEvent
2022-05-05 01:40:45
Sh2dowFi3nd/Test_2
https://api.github.com/repos/Sh2dowFi3nd/Test_2
closed
CVE-2017-9787 (High) detected in struts2-core-2.3.31.jar - autoclosed
security vulnerability
## CVE-2017-9787 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>struts2-core-2.3.31.jar</b></p></summary> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/struts2-core/">http://struts.apache.org/struts2-core/</a></p> <p> Dependency Hierarchy: - :x: **struts2-core-2.3.31.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Sh2dowFi3nd/Test_2/commit/496ee93a49670cf2906171c7293cf9b50cc09d47">496ee93a49670cf2906171c7293cf9b50cc09d47</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33. <p>Publish Date: 2017-07-13 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9787>CVE-2017-9787</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://struts.apache.org/docs/s2-049.html">http://struts.apache.org/docs/s2-049.html</a></p> <p>Fix Resolution: Upgrade to Struts 2.5.12 or Struts 2.3.33</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2017-9787 (High) detected in struts2-core-2.3.31.jar - autoclosed - ## CVE-2017-9787 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>struts2-core-2.3.31.jar</b></p></summary> <p>Apache Struts 2</p> <p>Library home page: <a href="http://struts.apache.org/struts2-core/">http://struts.apache.org/struts2-core/</a></p> <p> Dependency Hierarchy: - :x: **struts2-core-2.3.31.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Sh2dowFi3nd/Test_2/commit/496ee93a49670cf2906171c7293cf9b50cc09d47">496ee93a49670cf2906171c7293cf9b50cc09d47</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33. <p>Publish Date: 2017-07-13 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9787>CVE-2017-9787</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://struts.apache.org/docs/s2-049.html">http://struts.apache.org/docs/s2-049.html</a></p> <p>Fix Resolution: Upgrade to Struts 2.5.12 or Struts 2.3.33</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in core jar autoclosed cve high severity vulnerability vulnerable library core jar apache struts library home page a href dependency hierarchy x core jar vulnerable library found in head commit a href vulnerability details when using a spring aop functionality to secure struts actions it is possible to perform a dos attack solution is to upgrade to apache struts version or publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href fix resolution upgrade to struts or struts step up your open source security game with whitesource
0
145,019
19,319,014,521
IssuesEvent
2021-12-14 01:50:03
peterwkc85/selenium-jupiter
https://api.github.com/repos/peterwkc85/selenium-jupiter
opened
CVE-2019-12402 (High) detected in commons-compress-1.18.jar
security vulnerability
## CVE-2019-12402 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-compress-1.18.jar</b></p></summary> <p>Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional Unix Compress, DEFLATE, DEFLATE64, LZ4, Brotli, Zstandard and ar, cpio, jar, tar, zip, dump, 7z, arj.</p> <p>Path to dependency file: /selenium-jupiter/build.gradle</p> <p>Path to vulnerable library: /root/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/root/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar</p> <p> Dependency Hierarchy: - docker-client-8.15.2.jar (Root Library) - :x: **commons-compress-1.18.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress. <p>Publish Date: 2019-08-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12402>CVE-2019-12402</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12402">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12402</a></p> <p>Release Date: 2019-08-30</p> <p>Fix Resolution: 1.19</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-12402 (High) detected in commons-compress-1.18.jar - ## CVE-2019-12402 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-compress-1.18.jar</b></p></summary> <p>Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional Unix Compress, DEFLATE, DEFLATE64, LZ4, Brotli, Zstandard and ar, cpio, jar, tar, zip, dump, 7z, arj.</p> <p>Path to dependency file: /selenium-jupiter/build.gradle</p> <p>Path to vulnerable library: /root/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar,/root/.m2/repository/org/apache/commons/commons-compress/1.18/commons-compress-1.18.jar</p> <p> Dependency Hierarchy: - docker-client-8.15.2.jar (Root Library) - :x: **commons-compress-1.18.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress. <p>Publish Date: 2019-08-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12402>CVE-2019-12402</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12402">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12402</a></p> <p>Release Date: 2019-08-30</p> <p>Fix Resolution: 1.19</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in commons compress jar cve high severity vulnerability vulnerable library commons compress jar apache commons compress software defines an api for working with compression and archive formats these include gzip lzma xz snappy traditional unix compress deflate brotli zstandard and ar cpio jar tar zip dump arj path to dependency file selenium jupiter build gradle path to vulnerable library root repository org apache commons commons compress commons compress jar root repository org apache commons commons compress commons compress jar dependency hierarchy docker client jar root library x commons compress jar vulnerable library vulnerability details the file name encoding algorithm used internally in apache commons compress to can get into an infinite loop when faced with specially crafted inputs this can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by compress publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
288,237
31,861,205,405
IssuesEvent
2023-09-15 11:03:10
nidhi7598/linux-v4.19.72_CVE-2022-3564
https://api.github.com/repos/nidhi7598/linux-v4.19.72_CVE-2022-3564
opened
CVE-2019-15222 (Medium) detected in linuxlinux-4.19.294
Mend: dependency security vulnerability
## CVE-2019-15222 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.294</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/nidhi7598/linux-v4.19.72_CVE-2022-3564/commit/9ffee08efa44c7887e2babb8f304df0fa1094efb">9ffee08efa44c7887e2babb8f304df0fa1094efb</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/sound/usb/helper.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/sound/usb/helper.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/sound/usb/helper.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in the Linux kernel before 5.2.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/helper.c (motu_microbookii) driver. <p>Publish Date: 2019-08-19 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-15222>CVE-2019-15222</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Physical - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15222</a></p> <p>Release Date: 2019-09-06</p> <p>Fix Resolution: v5.3-rc3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-15222 (Medium) detected in linuxlinux-4.19.294 - ## CVE-2019-15222 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.294</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/nidhi7598/linux-v4.19.72_CVE-2022-3564/commit/9ffee08efa44c7887e2babb8f304df0fa1094efb">9ffee08efa44c7887e2babb8f304df0fa1094efb</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/sound/usb/helper.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/sound/usb/helper.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/sound/usb/helper.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in the Linux kernel before 5.2.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/helper.c (motu_microbookii) driver. <p>Publish Date: 2019-08-19 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-15222>CVE-2019-15222</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Physical - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15222">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15222</a></p> <p>Release Date: 2019-09-06</p> <p>Fix Resolution: v5.3-rc3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in linuxlinux cve medium severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch main vulnerable source files sound usb helper c sound usb helper c sound usb helper c vulnerability details an issue was discovered in the linux kernel before there is a null pointer dereference caused by a malicious usb device in the sound usb helper c motu microbookii driver publish date url a href cvss score details base score metrics exploitability metrics attack vector physical attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
319,314
27,364,852,550
IssuesEvent
2023-02-27 18:20:13
metalbear-co/mirrord
https://api.github.com/repos/metalbear-co/mirrord
closed
Remove the word "test" from all tests.
enhancement easy tests
All of our tests are called `test_...`. Seems redundant. Since tests are marked with `#[rstest]`, we don't need to mark them with the word "test" at the beginning of their name. I suggest we just call them as what they are testing, so if a test is testing that a feature like http mirroring works, then we just call it `http_mirroring`, and if it verifies some invariant, then use the invariant as the name, e.g. `tmp_files_are_bypassed`. What do you think?
1.0
Remove the word "test" from all tests. - All of our tests are called `test_...`. Seems redundant. Since tests are marked with `#[rstest]`, we don't need to mark them with the word "test" at the beginning of their name. I suggest we just call them as what they are testing, so if a test is testing that a feature like http mirroring works, then we just call it `http_mirroring`, and if it verifies some invariant, then use the invariant as the name, e.g. `tmp_files_are_bypassed`. What do you think?
non_priority
remove the word test from all tests all of our tests are called test seems redundant since tests are marked with we don t need to mark them with the word test at the beginning of their name i suggest we just call them as what they are testing so if a test is testing that a feature like http mirroring works then we just call it http mirroring and if it verifies some invariant then use the invariant as the name e g tmp files are bypassed what do you think
0
19,095
6,670,661,006
IssuesEvent
2017-10-04 01:14:32
Amber-MD/cmake-buildscripts
https://api.github.com/repos/Amber-MD/cmake-buildscripts
closed
need to handle dependencies between tools with FORCE_DISABLE_TOOLS
potential build error
Also, I need to rename that variable to `DISABLE_TOOLS` once it is less of a hack
1.0
need to handle dependencies between tools with FORCE_DISABLE_TOOLS - Also, I need to rename that variable to `DISABLE_TOOLS` once it is less of a hack
non_priority
need to handle dependencies between tools with force disable tools also i need to rename that variable to disable tools once it is less of a hack
0
15,990
10,422,162,438
IssuesEvent
2019-09-16 08:22:06
Azure/azure-powershell
https://api.github.com/repos/Azure/azure-powershell
closed
Get-AzureRmHDInsightOperationsManagementSuite throwing an error
Bug HDInsight Service Attention
### Cmdlet(s) Get-AzureRmHDInsightOperationsManagementSuite ### PowerShell Version 5.1.16299.64 ### Module Version 5.1.1 ### OS Version 10.0.16299.64 ### Description The cmdlet Get-AzureRmHDInsightOperationsManagementSuite or Get-AzureRmHDInsightOMS throws an error saying "Get-AzureRmHDInsightOMS : Can not convert Object to String." ### Debug Output ``` DEBUG: 5:37:34 PM - GetAzureHDInsightOMSCommand begin processing with ParameterSet '__AllParameterSets'. DEBUG: 5:37:34 PM - using account id ''... DEBUG: [Common.Authentication]: Authenticating using Account: '', environment: 'AzureCloud', tenant: '' DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: - TokenCache: Serializing token cache with 1 items. DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: - TokenCache: Serializing token cache with 1 items. DEBUG: [Common.Authentication]: Authenticating using configuration values: Domain: '', Endpoint: 'https://login.micro softonline.com/', ClientId: '1950a258-227b-4e31-a9cf-717495945fc2', ClientRedirect: 'urn:ietf:wg:oauth:2.0:oob', ResourceClientUri: 'https://management.c ore.windows.net/', ValidateAuthrity: 'True' DEBUG: [Common.Authentication]: Acquiring token using context with Authority 'https://login.microsoftonline.com/[]/', C orrelationId: '00000000-0000-0000-0000-000000000000', ValidateAuthority: 'True' DEBUG: [Common.Authentication]: Acquiring token using AdalConfiguration with Domain: '', AdEndpoint: 'https://login.m icrosoftonline.com/', ClientId: '1950a258-227b-4e31-a9cf-717495945fc2', ClientRedirectUri: urn:ietf:wg:oauth:2.0:oob DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: c1031d68-7328-476b-945f-e19a38adc00c - AcquireTokenHandlerBase: === Token Acquisition started: Authority: https://login.microsoftonline.com/[]/ Resource: https://management.core.windows.net/ ClientId: 1950a258-227b-4e31-a9cf-717495945fc2 CacheType: Microsoft.Azure.Commands.Common.Authentication.AuthenticationStoreTokenCache (1 items) Authentication Target: User DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Verbose: 1 : DEBUG: 12/14/2017 12:07:34: c1031d68-7328-476b-945f-e19a38adc00c - TokenCache: Looking up cache for a token... DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: c1031d68-7328-476b-945f-e19a38adc00c - TokenCache: An item matching the requested resource was found in the cache DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Verbose: 1 : DEBUG: 12/14/2017 12:07:34: c1031d68-7328-476b-945f-e19a38adc00c - TokenCache: 56.4458936066667 minutes left until token in cache expires DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: c1031d68-7328-476b-945f-e19a38adc00c - TokenCache: A matching item (access token or refresh token or both) was found in the c ache DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: c1031d68-7328-476b-945f-e19a38adc00c - AcquireTokenHandlerBase: === Token Acquisition finished successfully. An access token was retuned: Access Token Hash: xWyE+rB6cdcNmsih8ZmfQk52hkOqi//9AkhRGvJf6mk= Refresh Token Hash: tL0M9bYpVY88CGIGjoU2ycft5M0PdKlis3i+Cz7J0C0= Expiration Time: 12/14/2017 13:04:00 +00:00 User Hash: Mk9l/pRzYF4eQmXWbqXQaY/LIcv6KvisB6i/dFJg36U= DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: - TokenCache: Serializing token cache with 1 items. DEBUG: [Common.Authentication]: Received token with LoginType 'LiveId', Tenant: '', UserId: '' DEBUG: [Common.Authentication]: Renewing Token with Type: 'Bearer', Expiry: '12/14/2017 13:04:00 +00:00', MultipleResource? 'True', Tenant: '', UserId: '' DEBUG: [Common.Authentication]: User info for token DisplayId: '', Name: Vinay Damisetty, IdProvider: 'https://sts.w indows.net/[]/', Uid: '2a4b3d72-419c-43b2-9560-8ec7aad95a1b' DEBUG: [Common.Authentication]: Checking token expiration, token expires '12/14/2017 13:04:00 +00:00' Comparing to '12/14/2017 12:07:34 +00:00' With thre shold '00:05:00', calculated time until token expiry: '00:56:26.7526131' DEBUG: ============================ HTTP REQUEST ============================ HTTP Method: GET Absolute Uri: https://management.azure.com/subscriptions/[]/resourceGroups/[]/providers/Microsoft.HDInsight//clusters/sarhd6/extensions/clustermonitoring?api-version=2015-03-01-preview Headers: Body: DEBUG: ============================ HTTP RESPONSE ============================ Status Code: OK Headers: Pragma : no-cache x-ms-hdi-matched-rule : ClusterResourcesAndSubResources x-ms-hdi-routed-to : RegionalRp x-ms-request-id : beb497d0-7ac3-468e-8a41-c5fa569dc23f x-ms-hdi-served-by : northeurope Strict-Transport-Security : max-age=31536000; includeSubDomains x-ms-ratelimit-remaining-subscription-reads: 14704 x-ms-correlation-request-id : f9cc2fa1-fa44-4635-9b37-3e320fd5cfb0 x-ms-routing-request-id : SOUTHINDIA:20171214T120734Z:f9cc2fa1-fa44-4635-9b37-3e320fd5cfb0 Cache-Control : no-cache Date : Thu, 14 Dec 2017 12:07:34 GMT Body: { "clusterMonitoringEnabled": false, "workspaceId": null } Get-AzureRmHDInsightOMS : Can not convert Object to String. At line:1 char:1 + Get-AzureRmHDInsightOMS -Name sarhd6 -ResourceGroupName ... + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : CloseError: (:) [Get-AzureRmHDIn...ManagementSuite], ArgumentException + FullyQualifiedErrorId : Microsoft.Azure.Commands.HDInsight.GetAzureHDInsightOMSCommand DEBUG: AzureQoSEvent: CommandName - Get-AzureRmHDInsightOperationsManagementSuite; IsSuccess - False; Duration - 00:00:00.5367373; Exception - System.Arg umentException: Can not convert Object to String. at Newtonsoft.Json.Linq.JToken.op_Explicit(JToken value) at Microsoft.Azure.Management.HDInsight.ClusterOperations.<GetMonitoringStatusAsync>d__58.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw() at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at Microsoft.Azure.Management.HDInsight.ClusterOperationsExtensions.GetMonitoringStatus(IClusterOperations operations, String resourceGroupName, Strin g clusterName) at Microsoft.Azure.Commands.HDInsight.GetAzureHDInsightOMSCommand.ExecuteCmdlet() at Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet.ProcessRecord(); DEBUG: Finish sending metric. DEBUG: 5:37:39 PM - GetAzureHDInsightOMSCommand end processing. DEBUG: 5:37:39 PM - GetAzureHDInsightOMSCommand end processing. ``` ### Script/Steps for Reproduction Create an HDInsight cluster. Invoke the cmdlet Get-AzureRmHDInsightOMS -Name [] -ResourceGroupName []
1.0
Get-AzureRmHDInsightOperationsManagementSuite throwing an error - ### Cmdlet(s) Get-AzureRmHDInsightOperationsManagementSuite ### PowerShell Version 5.1.16299.64 ### Module Version 5.1.1 ### OS Version 10.0.16299.64 ### Description The cmdlet Get-AzureRmHDInsightOperationsManagementSuite or Get-AzureRmHDInsightOMS throws an error saying "Get-AzureRmHDInsightOMS : Can not convert Object to String." ### Debug Output ``` DEBUG: 5:37:34 PM - GetAzureHDInsightOMSCommand begin processing with ParameterSet '__AllParameterSets'. DEBUG: 5:37:34 PM - using account id ''... DEBUG: [Common.Authentication]: Authenticating using Account: '', environment: 'AzureCloud', tenant: '' DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: - TokenCache: Serializing token cache with 1 items. DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: - TokenCache: Serializing token cache with 1 items. DEBUG: [Common.Authentication]: Authenticating using configuration values: Domain: '', Endpoint: 'https://login.micro softonline.com/', ClientId: '1950a258-227b-4e31-a9cf-717495945fc2', ClientRedirect: 'urn:ietf:wg:oauth:2.0:oob', ResourceClientUri: 'https://management.c ore.windows.net/', ValidateAuthrity: 'True' DEBUG: [Common.Authentication]: Acquiring token using context with Authority 'https://login.microsoftonline.com/[]/', C orrelationId: '00000000-0000-0000-0000-000000000000', ValidateAuthority: 'True' DEBUG: [Common.Authentication]: Acquiring token using AdalConfiguration with Domain: '', AdEndpoint: 'https://login.m icrosoftonline.com/', ClientId: '1950a258-227b-4e31-a9cf-717495945fc2', ClientRedirectUri: urn:ietf:wg:oauth:2.0:oob DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: c1031d68-7328-476b-945f-e19a38adc00c - AcquireTokenHandlerBase: === Token Acquisition started: Authority: https://login.microsoftonline.com/[]/ Resource: https://management.core.windows.net/ ClientId: 1950a258-227b-4e31-a9cf-717495945fc2 CacheType: Microsoft.Azure.Commands.Common.Authentication.AuthenticationStoreTokenCache (1 items) Authentication Target: User DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Verbose: 1 : DEBUG: 12/14/2017 12:07:34: c1031d68-7328-476b-945f-e19a38adc00c - TokenCache: Looking up cache for a token... DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: c1031d68-7328-476b-945f-e19a38adc00c - TokenCache: An item matching the requested resource was found in the cache DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Verbose: 1 : DEBUG: 12/14/2017 12:07:34: c1031d68-7328-476b-945f-e19a38adc00c - TokenCache: 56.4458936066667 minutes left until token in cache expires DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: c1031d68-7328-476b-945f-e19a38adc00c - TokenCache: A matching item (access token or refresh token or both) was found in the c ache DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: c1031d68-7328-476b-945f-e19a38adc00c - AcquireTokenHandlerBase: === Token Acquisition finished successfully. An access token was retuned: Access Token Hash: xWyE+rB6cdcNmsih8ZmfQk52hkOqi//9AkhRGvJf6mk= Refresh Token Hash: tL0M9bYpVY88CGIGjoU2ycft5M0PdKlis3i+Cz7J0C0= Expiration Time: 12/14/2017 13:04:00 +00:00 User Hash: Mk9l/pRzYF4eQmXWbqXQaY/LIcv6KvisB6i/dFJg36U= DEBUG: Microsoft.IdentityModel.Clients.ActiveDirectory Information: 2 : DEBUG: 12/14/2017 12:07:34: - TokenCache: Serializing token cache with 1 items. DEBUG: [Common.Authentication]: Received token with LoginType 'LiveId', Tenant: '', UserId: '' DEBUG: [Common.Authentication]: Renewing Token with Type: 'Bearer', Expiry: '12/14/2017 13:04:00 +00:00', MultipleResource? 'True', Tenant: '', UserId: '' DEBUG: [Common.Authentication]: User info for token DisplayId: '', Name: Vinay Damisetty, IdProvider: 'https://sts.w indows.net/[]/', Uid: '2a4b3d72-419c-43b2-9560-8ec7aad95a1b' DEBUG: [Common.Authentication]: Checking token expiration, token expires '12/14/2017 13:04:00 +00:00' Comparing to '12/14/2017 12:07:34 +00:00' With thre shold '00:05:00', calculated time until token expiry: '00:56:26.7526131' DEBUG: ============================ HTTP REQUEST ============================ HTTP Method: GET Absolute Uri: https://management.azure.com/subscriptions/[]/resourceGroups/[]/providers/Microsoft.HDInsight//clusters/sarhd6/extensions/clustermonitoring?api-version=2015-03-01-preview Headers: Body: DEBUG: ============================ HTTP RESPONSE ============================ Status Code: OK Headers: Pragma : no-cache x-ms-hdi-matched-rule : ClusterResourcesAndSubResources x-ms-hdi-routed-to : RegionalRp x-ms-request-id : beb497d0-7ac3-468e-8a41-c5fa569dc23f x-ms-hdi-served-by : northeurope Strict-Transport-Security : max-age=31536000; includeSubDomains x-ms-ratelimit-remaining-subscription-reads: 14704 x-ms-correlation-request-id : f9cc2fa1-fa44-4635-9b37-3e320fd5cfb0 x-ms-routing-request-id : SOUTHINDIA:20171214T120734Z:f9cc2fa1-fa44-4635-9b37-3e320fd5cfb0 Cache-Control : no-cache Date : Thu, 14 Dec 2017 12:07:34 GMT Body: { "clusterMonitoringEnabled": false, "workspaceId": null } Get-AzureRmHDInsightOMS : Can not convert Object to String. At line:1 char:1 + Get-AzureRmHDInsightOMS -Name sarhd6 -ResourceGroupName ... + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : CloseError: (:) [Get-AzureRmHDIn...ManagementSuite], ArgumentException + FullyQualifiedErrorId : Microsoft.Azure.Commands.HDInsight.GetAzureHDInsightOMSCommand DEBUG: AzureQoSEvent: CommandName - Get-AzureRmHDInsightOperationsManagementSuite; IsSuccess - False; Duration - 00:00:00.5367373; Exception - System.Arg umentException: Can not convert Object to String. at Newtonsoft.Json.Linq.JToken.op_Explicit(JToken value) at Microsoft.Azure.Management.HDInsight.ClusterOperations.<GetMonitoringStatusAsync>d__58.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw() at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at Microsoft.Azure.Management.HDInsight.ClusterOperationsExtensions.GetMonitoringStatus(IClusterOperations operations, String resourceGroupName, Strin g clusterName) at Microsoft.Azure.Commands.HDInsight.GetAzureHDInsightOMSCommand.ExecuteCmdlet() at Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet.ProcessRecord(); DEBUG: Finish sending metric. DEBUG: 5:37:39 PM - GetAzureHDInsightOMSCommand end processing. DEBUG: 5:37:39 PM - GetAzureHDInsightOMSCommand end processing. ``` ### Script/Steps for Reproduction Create an HDInsight cluster. Invoke the cmdlet Get-AzureRmHDInsightOMS -Name [] -ResourceGroupName []
non_priority
get azurermhdinsightoperationsmanagementsuite throwing an error cmdlet s get azurermhdinsightoperationsmanagementsuite powershell version module version os version description the cmdlet get azurermhdinsightoperationsmanagementsuite or get azurermhdinsightoms throws an error saying get azurermhdinsightoms can not convert object to string debug output debug pm getazurehdinsightomscommand begin processing with parameterset allparametersets debug pm using account id debug authenticating using account environment azurecloud tenant debug microsoft identitymodel clients activedirectory information debug tokencache serializing token cache with items debug microsoft identitymodel clients activedirectory information debug tokencache serializing token cache with items debug authenticating using configuration values domain endpoint softonline com clientid clientredirect urn ietf wg oauth oob resourceclienturi ore windows net validateauthrity true debug acquiring token using context with authority c orrelationid validateauthority true debug acquiring token using adalconfiguration with domain adendpoint icrosoftonline com clientid clientredirecturi urn ietf wg oauth oob debug microsoft identitymodel clients activedirectory information debug acquiretokenhandlerbase token acquisition started authority resource clientid cachetype microsoft azure commands common authentication authenticationstoretokencache items authentication target user debug microsoft identitymodel clients activedirectory verbose debug tokencache looking up cache for a token debug microsoft identitymodel clients activedirectory information debug tokencache an item matching the requested resource was found in the cache debug microsoft identitymodel clients activedirectory verbose debug tokencache minutes left until token in cache expires debug microsoft identitymodel clients activedirectory information debug tokencache a matching item access token or refresh token or both was found in the c ache debug microsoft identitymodel clients activedirectory information debug acquiretokenhandlerbase token acquisition finished successfully an access token was retuned access token hash xwye refresh token hash expiration time user hash debug microsoft identitymodel clients activedirectory information debug tokencache serializing token cache with items debug received token with logintype liveid tenant userid debug renewing token with type bearer expiry multipleresource true tenant userid debug user info for token displayid name vinay damisetty idprovider indows net uid debug checking token expiration token expires comparing to with thre shold calculated time until token expiry debug http request http method get absolute uri resourcegroups providers microsoft hdinsight clusters extensions clustermonitoring api version preview headers body debug http response status code ok headers pragma no cache x ms hdi matched rule clusterresourcesandsubresources x ms hdi routed to regionalrp x ms request id x ms hdi served by northeurope strict transport security max age includesubdomains x ms ratelimit remaining subscription reads x ms correlation request id x ms routing request id southindia cache control no cache date thu dec gmt body clustermonitoringenabled false workspaceid null get azurermhdinsightoms can not convert object to string at line char get azurermhdinsightoms name resourcegroupname categoryinfo closeerror argumentexception fullyqualifiederrorid microsoft azure commands hdinsight getazurehdinsightomscommand debug azureqosevent commandname get azurermhdinsightoperationsmanagementsuite issuccess false duration exception system arg umentexception can not convert object to string at newtonsoft json linq jtoken op explicit jtoken value at microsoft azure management hdinsight clusteroperations d movenext end of stack trace from previous location where exception was thrown at system runtime exceptionservices exceptiondispatchinfo throw at system runtime compilerservices taskawaiter handlenonsuccessanddebuggernotification task task at microsoft azure management hdinsight clusteroperationsextensions getmonitoringstatus iclusteroperations operations string resourcegroupname strin g clustername at microsoft azure commands hdinsight getazurehdinsightomscommand executecmdlet at microsoft windowsazure commands utilities common azurepscmdlet processrecord debug finish sending metric debug pm getazurehdinsightomscommand end processing debug pm getazurehdinsightomscommand end processing script steps for reproduction create an hdinsight cluster invoke the cmdlet get azurermhdinsightoms name resourcegroupname
0
67,226
12,890,056,617
IssuesEvent
2020-07-13 15:24:51
spotify/backstage
https://api.github.com/repos/spotify/backstage
opened
TechDocs: Reading Documentation
docs-like-code documentation
<!--- Provide a general summary of the feature request in the Title above --> Create a guide that walks through what reading documentation in TechDocs looks like. Screenshots, some basic explanation of the tech, etc. The consumers of this should be mostly non-technical (i.e. engineering managers, leads, etc) who are considering deploying TechDocs in their own organization.
1.0
TechDocs: Reading Documentation - <!--- Provide a general summary of the feature request in the Title above --> Create a guide that walks through what reading documentation in TechDocs looks like. Screenshots, some basic explanation of the tech, etc. The consumers of this should be mostly non-technical (i.e. engineering managers, leads, etc) who are considering deploying TechDocs in their own organization.
non_priority
techdocs reading documentation create a guide that walks through what reading documentation in techdocs looks like screenshots some basic explanation of the tech etc the consumers of this should be mostly non technical i e engineering managers leads etc who are considering deploying techdocs in their own organization
0
21,486
7,030,577,260
IssuesEvent
2017-12-26 11:03:28
chros73/build-mc
https://api.github.com/repos/chros73/build-mc
closed
Add initial content
build enhancement git
Add initial content and: - update Readme - add `.gitignore` - add changelog
1.0
Add initial content - Add initial content and: - update Readme - add `.gitignore` - add changelog
non_priority
add initial content add initial content and update readme add gitignore add changelog
0
24,772
3,910,936,751
IssuesEvent
2016-04-20 01:56:29
hotosm/hotosm-website
https://api.github.com/repos/hotosm/hotosm-website
closed
website analysis (summary)
design/theming enhancement
I made a very simple visual sitemap to get a better understanding of the structure. I also considered page content like text, links, pictures. In general I have to say that the problem is not so much content and structure, but usability and visual conception. The mission and projects of HOT are widely covered, all the information is there. But it has to be presented in a different way to show the diversity of HOT, the variety of projects, the worldwide community and all the different ways to get involved. I don´t want to get too much in detail here, so this is only a summary of my main points. Design (general): grid-based layout, 1-2 main columns plus marginal column, tiles. Application of photos, maps and infographics. Consistent use of fonts, rules for text structuring, add a second color to support the logo red→create a manual. Homepage: every aspect of HOT should be presented here. One (or two) ongoing and prominent projects featured on top of the page. Selection of news / updates with a short introduction text and pictures. Illustrated link to “get involved” and “donate” (icon, pictrogram). I would be great to have some “faces of HOT” here, like a volunteer profile picture with a quote. About: a bit confusing because “about” has the same text as “the organization” page. Should “Kits” really be part of the organization? Is board=leadership? Hot Capacities: much of the information about HOT is “hidden” here (use of OSM, partnerships, network, crisis response, data collection, community building) In my opinion every aspect diserves its own page. Updates: Great opportunity to show HOTs mission. Needs much more visuals. Use of columns to avoid scrolling down. Projects: I think every chapter (disaster, community, technical) should have a text, not only a list of ongoing and archives projects. Get involved / Donate: both have to be much more catchy. I missed mapathons a a way to get involved. So how do I go on from now? Start with a draft? ![sitemap_analysis](https://cloud.githubusercontent.com/assets/12475465/8024716/b38c5f20-0d3d-11e5-94e2-ca8fc024f8b4.jpg)
1.0
website analysis (summary) - I made a very simple visual sitemap to get a better understanding of the structure. I also considered page content like text, links, pictures. In general I have to say that the problem is not so much content and structure, but usability and visual conception. The mission and projects of HOT are widely covered, all the information is there. But it has to be presented in a different way to show the diversity of HOT, the variety of projects, the worldwide community and all the different ways to get involved. I don´t want to get too much in detail here, so this is only a summary of my main points. Design (general): grid-based layout, 1-2 main columns plus marginal column, tiles. Application of photos, maps and infographics. Consistent use of fonts, rules for text structuring, add a second color to support the logo red→create a manual. Homepage: every aspect of HOT should be presented here. One (or two) ongoing and prominent projects featured on top of the page. Selection of news / updates with a short introduction text and pictures. Illustrated link to “get involved” and “donate” (icon, pictrogram). I would be great to have some “faces of HOT” here, like a volunteer profile picture with a quote. About: a bit confusing because “about” has the same text as “the organization” page. Should “Kits” really be part of the organization? Is board=leadership? Hot Capacities: much of the information about HOT is “hidden” here (use of OSM, partnerships, network, crisis response, data collection, community building) In my opinion every aspect diserves its own page. Updates: Great opportunity to show HOTs mission. Needs much more visuals. Use of columns to avoid scrolling down. Projects: I think every chapter (disaster, community, technical) should have a text, not only a list of ongoing and archives projects. Get involved / Donate: both have to be much more catchy. I missed mapathons a a way to get involved. So how do I go on from now? Start with a draft? ![sitemap_analysis](https://cloud.githubusercontent.com/assets/12475465/8024716/b38c5f20-0d3d-11e5-94e2-ca8fc024f8b4.jpg)
non_priority
website analysis summary i made a very simple visual sitemap to get a better understanding of the structure i also considered page content like text links pictures in general i have to say that the problem is not so much content and structure but usability and visual conception the mission and projects of hot are widely covered all the information is there but it has to be presented in a different way to show the diversity of hot the variety of projects the worldwide community and all the different ways to get involved i don´t want to get too much in detail here so this is only a summary of my main points design general grid based layout main columns plus marginal column tiles application of photos maps and infographics consistent use of fonts rules for text structuring add a second color to support the logo red→create a manual homepage every aspect of hot should be presented here one or two ongoing and prominent projects featured on top of the page selection of news updates with a short introduction text and pictures illustrated link to “get involved” and “donate” icon pictrogram i would be great to have some “faces of hot” here like a volunteer profile picture with a quote about a bit confusing because “about” has the same text as “the organization” page should “kits” really be part of the organization is board leadership hot capacities much of the information about hot is “hidden” here use of osm partnerships network crisis response data collection community building in my opinion every aspect diserves its own page updates great opportunity to show hots mission needs much more visuals use of columns to avoid scrolling down projects i think every chapter disaster community technical should have a text not only a list of ongoing and archives projects get involved donate both have to be much more catchy i missed mapathons a a way to get involved so how do i go on from now start with a draft
0
3,778
5,969,058,607
IssuesEvent
2017-05-30 19:27:25
rancher/rancher
https://api.github.com/repos/rancher/rancher
closed
security & networking field are not being saved
area/container area/service area/ui kind/bug status/resolved status/to-test
**Rancher versions:** 5/24 **Steps to Reproduce:** 1. Create a container where every field in Security/Host config section is changed or has new value 2. View details of container **Results:** Pull Image, Physical Memory and Swap Memory are not saving
1.0
security & networking field are not being saved - **Rancher versions:** 5/24 **Steps to Reproduce:** 1. Create a container where every field in Security/Host config section is changed or has new value 2. View details of container **Results:** Pull Image, Physical Memory and Swap Memory are not saving
non_priority
security networking field are not being saved rancher versions steps to reproduce create a container where every field in security host config section is changed or has new value view details of container results pull image physical memory and swap memory are not saving
0
52,442
12,965,574,456
IssuesEvent
2020-07-20 22:40:13
walkingeyerobot/r38
https://api.github.com/repos/walkingeyerobot/r38
closed
deckbuilder should use image_uris instead of /proxy
deckbuilder
I deleted /proxy because the uris in the image_uris array are correctly cached.
1.0
deckbuilder should use image_uris instead of /proxy - I deleted /proxy because the uris in the image_uris array are correctly cached.
non_priority
deckbuilder should use image uris instead of proxy i deleted proxy because the uris in the image uris array are correctly cached
0
132,971
28,455,164,953
IssuesEvent
2023-04-17 06:22:04
appsmithorg/appsmith
https://api.github.com/repos/appsmithorg/appsmith
closed
[Bug]: For nested list, the onItemClick action is throwing Syntax error
Bug App Viewers Pod Needs Triaging Release Blocker FE Coders Pod List Widget V2 Action Selector
### Is there an existing issue for this? - [X] I have searched the existing issues ### Description https://www.loom.com/share/f28977e6ea044fee9c0e90cecc77ddc2 ### Steps To Reproduce 1. DnD a list and drop another child List 2. Configure the onItemClick of the child list 3. Click on child item ### Public Sample App _No response_ ### Environment Production ### Issue video log _No response_ ### Version Release
1.0
[Bug]: For nested list, the onItemClick action is throwing Syntax error - ### Is there an existing issue for this? - [X] I have searched the existing issues ### Description https://www.loom.com/share/f28977e6ea044fee9c0e90cecc77ddc2 ### Steps To Reproduce 1. DnD a list and drop another child List 2. Configure the onItemClick of the child list 3. Click on child item ### Public Sample App _No response_ ### Environment Production ### Issue video log _No response_ ### Version Release
non_priority
for nested list the onitemclick action is throwing syntax error is there an existing issue for this i have searched the existing issues description steps to reproduce dnd a list and drop another child list configure the onitemclick of the child list click on child item public sample app no response environment production issue video log no response version release
0
200,800
15,801,812,155
IssuesEvent
2021-04-03 06:40:53
Winniehyx/ped
https://api.github.com/repos/Winniehyx/ped
opened
User guide seems to be a little messy, why is there example commands?
severity.VeryLow type.DocumentationBug
No details provided. ![image.png](https://raw.githubusercontent.com/Winniehyx/ped/main/files/c41ba569-2a26-455e-b08e-22405af1267d.png) <!--session: 1617429874885-4d901b2f-3afa-46d5-a5f4-bd27c581edab-->
1.0
User guide seems to be a little messy, why is there example commands? - No details provided. ![image.png](https://raw.githubusercontent.com/Winniehyx/ped/main/files/c41ba569-2a26-455e-b08e-22405af1267d.png) <!--session: 1617429874885-4d901b2f-3afa-46d5-a5f4-bd27c581edab-->
non_priority
user guide seems to be a little messy why is there example commands no details provided
0
41,479
10,723,121,533
IssuesEvent
2019-10-27 16:36:30
letscontrolit/ESPEasy
https://api.github.com/repos/letscontrolit/ESPEasy
closed
since 20181004 NeoPixel SK6812/WS2812B pixel errors (2.4.1 vs 2.4.2)
Category: Build Category: Plugin Category: Stabiliy
### If you self compile, please state this and PLEASE try to ONLY REPORT ISSUES WITH OFFICIAL BUILDS! ### <!--- If you self compile, please state this and PLEASE try to ONLY REPORT ISSUES WITH OFFICIAL BUILDS! ---> <!--- NOTE: This is not a support forum! For questions and support go here: ---> <!--- https://www.letscontrolit.com/forum/viewforum.php?f=1 ---> <!--- Remove topics that are not applicable to your feature request of issue ---> <!--- Remember to have a "to the point" TITLE ---> ### Summarize of the problem/feature request <!--- Describe the problem or feature request ---> I use a precompiled version: ESPEasy_mega_20181004_test_ESP8266_4096_VCC. Since this version, there are problems with my Neopixel strip (SK6812 at GPIO 0) with the Plugin38. Some LEDs light up in an uncontrolled manner. When change the color or brightness, most pixels are ok, but some are faulty. The number and colors of the wrongly lit LED's changes. Possibly, faulty timing caused by going back from Core 2.4.2 to 2.4.1? ### Expected behavior <!--- Tell us what should happen? ---> ### Actual behavior <!--- Tell us what happens instead? ---> ### Steps to reproduce <!--- How can we trigger this problem? ---> 1. up to version ESPEasy_mega_20181003_test_ESP8266_4096_VCC it works perfectly 2. since version ESPEasy_mega_20181004_test_ESP8266_4096_VCC and up it don't works correctly <!--- Does the problem persists after powering off and on? (just resetting isn't enough sometimes) ---> <!--- Please document if you have restarted the unit and if the problem is then gone etc. etc. ---> ### System configuration <!--- Please add as much information and screenshots as possible ---> Hardware: NodeMCU V1.0, 4M Flash. NeoPixel strip with SK6812 LED's (40 Pixels in use) Power Supply 5V/5A, 1000uF Elko directly on strip supply wires <!--- You should also provide links to hardware pages etc where we can find more info ---> <!--- If you self compile, please state this and PLEASE try to ONLY REPORT ISSUES WITH OFFICIAL BUILDS! ---> ESP Easy version: ESPEasy_mega_20181004_test_ESP8266_4096_VCC <!--- In order to have a better readablity of your issue then you should place screenshots here ---> <!--- Simply drag and drop them onto this template, move the text string below the "ESP Easy settings/screenshots" topic ---> ESP Easy settings/screenshots: ### Rules or log data <!--- place your code/rules between the two ``` rows ---> <!--- remove if not applicable! --->
1.0
since 20181004 NeoPixel SK6812/WS2812B pixel errors (2.4.1 vs 2.4.2) - ### If you self compile, please state this and PLEASE try to ONLY REPORT ISSUES WITH OFFICIAL BUILDS! ### <!--- If you self compile, please state this and PLEASE try to ONLY REPORT ISSUES WITH OFFICIAL BUILDS! ---> <!--- NOTE: This is not a support forum! For questions and support go here: ---> <!--- https://www.letscontrolit.com/forum/viewforum.php?f=1 ---> <!--- Remove topics that are not applicable to your feature request of issue ---> <!--- Remember to have a "to the point" TITLE ---> ### Summarize of the problem/feature request <!--- Describe the problem or feature request ---> I use a precompiled version: ESPEasy_mega_20181004_test_ESP8266_4096_VCC. Since this version, there are problems with my Neopixel strip (SK6812 at GPIO 0) with the Plugin38. Some LEDs light up in an uncontrolled manner. When change the color or brightness, most pixels are ok, but some are faulty. The number and colors of the wrongly lit LED's changes. Possibly, faulty timing caused by going back from Core 2.4.2 to 2.4.1? ### Expected behavior <!--- Tell us what should happen? ---> ### Actual behavior <!--- Tell us what happens instead? ---> ### Steps to reproduce <!--- How can we trigger this problem? ---> 1. up to version ESPEasy_mega_20181003_test_ESP8266_4096_VCC it works perfectly 2. since version ESPEasy_mega_20181004_test_ESP8266_4096_VCC and up it don't works correctly <!--- Does the problem persists after powering off and on? (just resetting isn't enough sometimes) ---> <!--- Please document if you have restarted the unit and if the problem is then gone etc. etc. ---> ### System configuration <!--- Please add as much information and screenshots as possible ---> Hardware: NodeMCU V1.0, 4M Flash. NeoPixel strip with SK6812 LED's (40 Pixels in use) Power Supply 5V/5A, 1000uF Elko directly on strip supply wires <!--- You should also provide links to hardware pages etc where we can find more info ---> <!--- If you self compile, please state this and PLEASE try to ONLY REPORT ISSUES WITH OFFICIAL BUILDS! ---> ESP Easy version: ESPEasy_mega_20181004_test_ESP8266_4096_VCC <!--- In order to have a better readablity of your issue then you should place screenshots here ---> <!--- Simply drag and drop them onto this template, move the text string below the "ESP Easy settings/screenshots" topic ---> ESP Easy settings/screenshots: ### Rules or log data <!--- place your code/rules between the two ``` rows ---> <!--- remove if not applicable! --->
non_priority
since neopixel pixel errors vs if you self compile please state this and please try to only report issues with official builds summarize of the problem feature request i use a precompiled version espeasy mega test vcc since this version there are problems with my neopixel strip at gpio with the some leds light up in an uncontrolled manner when change the color or brightness most pixels are ok but some are faulty the number and colors of the wrongly lit led s changes possibly faulty timing caused by going back from core to expected behavior actual behavior steps to reproduce up to version espeasy mega test vcc it works perfectly since version espeasy mega test vcc and up it don t works correctly system configuration hardware nodemcu flash neopixel strip with led s pixels in use power supply elko directly on strip supply wires esp easy version espeasy mega test vcc esp easy settings screenshots rules or log data
0
48,001
7,370,510,079
IssuesEvent
2018-03-13 08:44:15
ABI-Team-30/Fresnel-Forms
https://api.github.com/repos/ABI-Team-30/Fresnel-Forms
opened
hideProperties works if in code through other means than FF GUI
check documentation
See if hideProperties works even if in code through other means than the Fresnel Forms tab GUI. Examples of such means include text editing the saved file and then reloading in Protégé. It is less likely but still work checking if one can use the individual tab in Protégé to add the hideProperty triples to a lens. If it works then it should be in the documentation and set up for checking in the Fresnel Forms MediaWiki extension.
1.0
hideProperties works if in code through other means than FF GUI - See if hideProperties works even if in code through other means than the Fresnel Forms tab GUI. Examples of such means include text editing the saved file and then reloading in Protégé. It is less likely but still work checking if one can use the individual tab in Protégé to add the hideProperty triples to a lens. If it works then it should be in the documentation and set up for checking in the Fresnel Forms MediaWiki extension.
non_priority
hideproperties works if in code through other means than ff gui see if hideproperties works even if in code through other means than the fresnel forms tab gui examples of such means include text editing the saved file and then reloading in protégé it is less likely but still work checking if one can use the individual tab in protégé to add the hideproperty triples to a lens if it works then it should be in the documentation and set up for checking in the fresnel forms mediawiki extension
0
350,903
25,005,596,506
IssuesEvent
2022-11-03 11:34:35
spring-projects/spring-graphql
https://api.github.com/repos/spring-projects/spring-graphql
closed
Provide guidance on how to set up multiple GraphQL endpoints
type: documentation status: superseded
I want two separate endpoints, each with their own schemas to not expose our internal schemas to clients through GraphiQL. Both will need have different security configurations as well. (Just reiterating that this is something we need to do) I found this stack overflow asking for something similar, but was hoping to see if someone more familiar with this project had a better way of doing something like this? https://stackoverflow.com/questions/62202051/is-there-a-way-to-expose-2-graphql-endpoints-using-spring-boot-starter-app-graph Any advice would be appreciated here!
1.0
Provide guidance on how to set up multiple GraphQL endpoints - I want two separate endpoints, each with their own schemas to not expose our internal schemas to clients through GraphiQL. Both will need have different security configurations as well. (Just reiterating that this is something we need to do) I found this stack overflow asking for something similar, but was hoping to see if someone more familiar with this project had a better way of doing something like this? https://stackoverflow.com/questions/62202051/is-there-a-way-to-expose-2-graphql-endpoints-using-spring-boot-starter-app-graph Any advice would be appreciated here!
non_priority
provide guidance on how to set up multiple graphql endpoints i want two separate endpoints each with their own schemas to not expose our internal schemas to clients through graphiql both will need have different security configurations as well just reiterating that this is something we need to do i found this stack overflow asking for something similar but was hoping to see if someone more familiar with this project had a better way of doing something like this any advice would be appreciated here
0
58,883
14,499,537,614
IssuesEvent
2020-12-11 16:50:36
aiorazabala/qmethod
https://api.github.com/repos/aiorazabala/qmethod
closed
spurious travis CI build fail
build
I'm trying to set up Travis continuous integration for our development (as per #88). Unfortunately, part of my `array.viz.R` calls the package `stringr`, which causes Travis to fail (apparently intermittently). Also reported in: - https://github.com/Rexamine/stringi/issues/155 - https://github.com/hadley/stringr/issues/68 This seems to be an artefact of Travis, not of my code. I'm looking for a fix for this, but the issue should stay open until the root cause in travis CI is solved (see above issues)
1.0
spurious travis CI build fail - I'm trying to set up Travis continuous integration for our development (as per #88). Unfortunately, part of my `array.viz.R` calls the package `stringr`, which causes Travis to fail (apparently intermittently). Also reported in: - https://github.com/Rexamine/stringi/issues/155 - https://github.com/hadley/stringr/issues/68 This seems to be an artefact of Travis, not of my code. I'm looking for a fix for this, but the issue should stay open until the root cause in travis CI is solved (see above issues)
non_priority
spurious travis ci build fail i m trying to set up travis continuous integration for our development as per unfortunately part of my array viz r calls the package stringr which causes travis to fail apparently intermittently also reported in this seems to be an artefact of travis not of my code i m looking for a fix for this but the issue should stay open until the root cause in travis ci is solved see above issues
0
261,172
27,794,017,381
IssuesEvent
2023-03-17 11:04:35
PowerDNS-Admin/PowerDNS-Admin
https://api.github.com/repos/PowerDNS-Admin/PowerDNS-Admin
closed
Feature: configurable OTP label
feature / request mod / accepted bug / security-vulnerability
Hi, Right now the OTP label is hardcoded to be `PowerDNS-Admin` https://github.com/PowerDNS-Admin/PowerDNS-Admin/blob/204c996c81f2f2ef14f6d98e5ea907e69a7ede92/powerdnsadmin/models/user.py#L92 It would be great for it to either be configurable or to match the `site_name`, as some authenticator apps tend to overwrite the key if the label is the same. Proposed change: ```diff --- original.py 2022-07-22 09:08:18.460801206 +0000 +++ user.py 2022-07-22 09:06:39.660791555 +0000 @@ -89,8 +89,8 @@ return '<User {0}>'.format(self.username) def get_totp_uri(self): - return "otpauth://totp/PowerDNS-Admin:{0}?secret={1}&issuer=PowerDNS-Admin".format( - self.username, self.otp_secret) + return "otpauth://totp/{2}:{0}?secret={1}&issuer={2}".format( + self.username, self.otp_secret, Setting().get('site_name')) def verify_totp(self, token): totp = pyotp.TOTP(self.otp_secret) ```
True
Feature: configurable OTP label - Hi, Right now the OTP label is hardcoded to be `PowerDNS-Admin` https://github.com/PowerDNS-Admin/PowerDNS-Admin/blob/204c996c81f2f2ef14f6d98e5ea907e69a7ede92/powerdnsadmin/models/user.py#L92 It would be great for it to either be configurable or to match the `site_name`, as some authenticator apps tend to overwrite the key if the label is the same. Proposed change: ```diff --- original.py 2022-07-22 09:08:18.460801206 +0000 +++ user.py 2022-07-22 09:06:39.660791555 +0000 @@ -89,8 +89,8 @@ return '<User {0}>'.format(self.username) def get_totp_uri(self): - return "otpauth://totp/PowerDNS-Admin:{0}?secret={1}&issuer=PowerDNS-Admin".format( - self.username, self.otp_secret) + return "otpauth://totp/{2}:{0}?secret={1}&issuer={2}".format( + self.username, self.otp_secret, Setting().get('site_name')) def verify_totp(self, token): totp = pyotp.TOTP(self.otp_secret) ```
non_priority
feature configurable otp label hi right now the otp label is hardcoded to be powerdns admin it would be great for it to either be configurable or to match the site name as some authenticator apps tend to overwrite the key if the label is the same proposed change diff original py user py return format self username def get totp uri self return otpauth totp powerdns admin secret issuer powerdns admin format self username self otp secret return otpauth totp secret issuer format self username self otp secret setting get site name def verify totp self token totp pyotp totp self otp secret
0
110,505
9,458,615,643
IssuesEvent
2019-04-17 06:04:12
appium/appium
https://api.github.com/repos/appium/appium
closed
Xcode 10.1 has a maximum SDK version of 12.1. It does not support iOS version 12.1.2
Bug XCUITest
## The problem Xcode 10.1 has a maximum SDK version of 12.1. It does not support iOS version 12.1.2 ## Environment * Appium 1.12.1 * macOS Mojave version 10.14.4 (18E226) * iPhone 7 Plus with iOS 12.1.2 * Real device ## Details Error message comes from appium-xcuitest-driver. https://github.com/appium/appium-xcuitest-driver/blob/273d9ce89de8c52afba015c40530040688f1f829/lib/driver.js#L306 ## Link to Appium logs https://gist.github.com/devarshgandhi1/c244f1d9a5b3ed1e29a6a5b6238d1a78
1.0
Xcode 10.1 has a maximum SDK version of 12.1. It does not support iOS version 12.1.2 - ## The problem Xcode 10.1 has a maximum SDK version of 12.1. It does not support iOS version 12.1.2 ## Environment * Appium 1.12.1 * macOS Mojave version 10.14.4 (18E226) * iPhone 7 Plus with iOS 12.1.2 * Real device ## Details Error message comes from appium-xcuitest-driver. https://github.com/appium/appium-xcuitest-driver/blob/273d9ce89de8c52afba015c40530040688f1f829/lib/driver.js#L306 ## Link to Appium logs https://gist.github.com/devarshgandhi1/c244f1d9a5b3ed1e29a6a5b6238d1a78
non_priority
xcode has a maximum sdk version of it does not support ios version the problem xcode has a maximum sdk version of it does not support ios version environment appium macos mojave version iphone plus with ios real device details error message comes from appium xcuitest driver link to appium logs
0
181,468
21,658,684,038
IssuesEvent
2022-05-06 16:39:17
doc-ai/snipe-it
https://api.github.com/repos/doc-ai/snipe-it
closed
WS-2020-0003 (High) detected in phpunit/phpunit-5.7.27 - autoclosed
security vulnerability
## WS-2020-0003 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>phpunit/phpunit-5.7.27</b></p></summary> <p>The PHP Unit Testing framework.</p> <p> Dependency Hierarchy: - phpunit/php-token-stream-1.4.11 (Root Library) - :x: **phpunit/phpunit-5.7.27** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/doc-ai/snipe-it/git/commits/1bb1f7342f5fd2a27a26ec3c154baca7bd51e0db">1bb1f7342f5fd2a27a26ec3c154baca7bd51e0db</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Some autoupgrade module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow an attacker to perform RCE on a webserver. <p>Publish Date: 2019-12-10 <p>URL: <a href=https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f>WS-2020-0003</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f">https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f</a></p> <p>Release Date: 2020-01-09</p> <p>Fix Resolution: 7.5.19,8.5.1</p> </p> </details> <p></p>
True
WS-2020-0003 (High) detected in phpunit/phpunit-5.7.27 - autoclosed - ## WS-2020-0003 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>phpunit/phpunit-5.7.27</b></p></summary> <p>The PHP Unit Testing framework.</p> <p> Dependency Hierarchy: - phpunit/php-token-stream-1.4.11 (Root Library) - :x: **phpunit/phpunit-5.7.27** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/doc-ai/snipe-it/git/commits/1bb1f7342f5fd2a27a26ec3c154baca7bd51e0db">1bb1f7342f5fd2a27a26ec3c154baca7bd51e0db</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Some autoupgrade module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow an attacker to perform RCE on a webserver. <p>Publish Date: 2019-12-10 <p>URL: <a href=https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f>WS-2020-0003</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f">https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f</a></p> <p>Release Date: 2020-01-09</p> <p>Fix Resolution: 7.5.19,8.5.1</p> </p> </details> <p></p>
non_priority
ws high detected in phpunit phpunit autoclosed ws high severity vulnerability vulnerable library phpunit phpunit the php unit testing framework dependency hierarchy phpunit php token stream root library x phpunit phpunit vulnerable library found in head commit a href vulnerability details some autoupgrade module zip archives have been built with phpunit dev dependencies phpunit contains a php script that would allow an attacker to perform rce on a webserver publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution
0
41,022
10,266,659,120
IssuesEvent
2019-08-22 22:08:23
department-of-veterans-affairs/va.gov-team
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
opened
[SCREENREADER]: GIBCT® VETTEC - We should set focus on the H1 when users click Search Schools and school detail links
508-defect-2 508/Accessibility BAH
## Description <!-- This is a detailed description of the issue. It should include a restatement of the title, and provide more background information. --> We are not managing focus when users click on the `Search Schools` button or click on a school detail link like "GALVANIZE INC". This focus management is important for screen reader users to understand something has changed on the page. Screenshots attached below. ## Point of Contact <!-- If this issue is being opened by a VFS team member, please add a point of contact. Usually this is the same person who enters the issue ticket. --> **VFS Point of Contact:** _Trevor_ ## Acceptance Criteria <!-- As a keyboard user, I want to open the Level of Coverage widget by pressing Spacebar or pressing Enter. These keypress actions should not interfere with the mouse click event also opening the widget. --> * As a screen reader user, I want to hear "16 search results, heading level one" when I am routed to the search results page. * I also want to hear "Galvanize Inc, heading level one" when I am routed to a VETTEC school detail view. * As a tester, I want to be able to verify the H1 is focused by entering `document.activeElement` on the Dev Tools console. ## Environment * MacOS Mojave * Chrome latest ## Steps to Recreate ## WCAG or Vendor Guidance (optional) * [Focus Order: Understanding SC 2.4.3](https://www.w3.org/TR/UNDERSTANDING-WCAG20/navigation-mechanisms-focus-order.html) ## Screenshots or Trace Logs <!-- Drop any screenshots or error logs that might be useful for debugging --> ![Screen Shot 2019-08-22 at 4.57.52 PM.png](https://images.zenhubusercontent.com/5ac217b74b5806bc2bcd3fc8/4fa0d386-9790-4273-876f-3f34da2830d0) --- ![Screen Shot 2019-08-22 at 4.57.59 PM.png](https://images.zenhubusercontent.com/5ac217b74b5806bc2bcd3fc8/1415a886-4285-4336-bd7c-dd675d6d1cd7)
1.0
[SCREENREADER]: GIBCT® VETTEC - We should set focus on the H1 when users click Search Schools and school detail links - ## Description <!-- This is a detailed description of the issue. It should include a restatement of the title, and provide more background information. --> We are not managing focus when users click on the `Search Schools` button or click on a school detail link like "GALVANIZE INC". This focus management is important for screen reader users to understand something has changed on the page. Screenshots attached below. ## Point of Contact <!-- If this issue is being opened by a VFS team member, please add a point of contact. Usually this is the same person who enters the issue ticket. --> **VFS Point of Contact:** _Trevor_ ## Acceptance Criteria <!-- As a keyboard user, I want to open the Level of Coverage widget by pressing Spacebar or pressing Enter. These keypress actions should not interfere with the mouse click event also opening the widget. --> * As a screen reader user, I want to hear "16 search results, heading level one" when I am routed to the search results page. * I also want to hear "Galvanize Inc, heading level one" when I am routed to a VETTEC school detail view. * As a tester, I want to be able to verify the H1 is focused by entering `document.activeElement` on the Dev Tools console. ## Environment * MacOS Mojave * Chrome latest ## Steps to Recreate ## WCAG or Vendor Guidance (optional) * [Focus Order: Understanding SC 2.4.3](https://www.w3.org/TR/UNDERSTANDING-WCAG20/navigation-mechanisms-focus-order.html) ## Screenshots or Trace Logs <!-- Drop any screenshots or error logs that might be useful for debugging --> ![Screen Shot 2019-08-22 at 4.57.52 PM.png](https://images.zenhubusercontent.com/5ac217b74b5806bc2bcd3fc8/4fa0d386-9790-4273-876f-3f34da2830d0) --- ![Screen Shot 2019-08-22 at 4.57.59 PM.png](https://images.zenhubusercontent.com/5ac217b74b5806bc2bcd3fc8/1415a886-4285-4336-bd7c-dd675d6d1cd7)
non_priority
gibct® vettec we should set focus on the when users click search schools and school detail links description we are not managing focus when users click on the search schools button or click on a school detail link like galvanize inc this focus management is important for screen reader users to understand something has changed on the page screenshots attached below point of contact if this issue is being opened by a vfs team member please add a point of contact usually this is the same person who enters the issue ticket vfs point of contact trevor acceptance criteria as a screen reader user i want to hear search results heading level one when i am routed to the search results page i also want to hear galvanize inc heading level one when i am routed to a vettec school detail view as a tester i want to be able to verify the is focused by entering document activeelement on the dev tools console environment macos mojave chrome latest steps to recreate wcag or vendor guidance optional screenshots or trace logs
0
27,046
13,168,509,451
IssuesEvent
2020-08-11 12:15:37
mozilla-mobile/fenix
https://api.github.com/repos/mozilla-mobile/fenix
closed
FNX-5136 ⁃ [Bug] Experiment loading happens on the main thread and blocks startup
eng:performance 🐞 bug
## Steps to reproduce Start the application. ### Expected behavior Experiments should be loaded (more quickly than they are) ### Actual behavior Experiments are loaded, but only after having blocked progress on the main thread. ### Device information * Android device: Any * Fenix version: Nightly
True
FNX-5136 ⁃ [Bug] Experiment loading happens on the main thread and blocks startup - ## Steps to reproduce Start the application. ### Expected behavior Experiments should be loaded (more quickly than they are) ### Actual behavior Experiments are loaded, but only after having blocked progress on the main thread. ### Device information * Android device: Any * Fenix version: Nightly
non_priority
fnx ⁃ experiment loading happens on the main thread and blocks startup steps to reproduce start the application expected behavior experiments should be loaded more quickly than they are actual behavior experiments are loaded but only after having blocked progress on the main thread device information android device any fenix version nightly
0
85,917
8,007,283,475
IssuesEvent
2018-07-24 01:30:08
ryuichl/v3-report
https://api.github.com/repos/ryuichl/v3-report
closed
【問題】無法建立序號
bug wating-for-test
加入序號機元件後 點選建立序號機 卻出現這個畫面 <img width="325" alt="2018-07-23 3 20 53" src="https://user-images.githubusercontent.com/34560641/43062669-307170de-8e8c-11e8-863b-a78703cd8077.png"> 點選啟用序號機後 會顯示 「無權限」 <img width="325" alt="2018-07-23 3 22 29" src="https://user-images.githubusercontent.com/34560641/43062706-46b65a80-8e8c-11e8-99e5-e51c9b789e27.png"> 求解求解
1.0
【問題】無法建立序號 - 加入序號機元件後 點選建立序號機 卻出現這個畫面 <img width="325" alt="2018-07-23 3 20 53" src="https://user-images.githubusercontent.com/34560641/43062669-307170de-8e8c-11e8-863b-a78703cd8077.png"> 點選啟用序號機後 會顯示 「無權限」 <img width="325" alt="2018-07-23 3 22 29" src="https://user-images.githubusercontent.com/34560641/43062706-46b65a80-8e8c-11e8-99e5-e51c9b789e27.png"> 求解求解
non_priority
【問題】無法建立序號 加入序號機元件後 點選建立序號機 卻出現這個畫面 img width alt src 點選啟用序號機後 會顯示 「無權限」 img width alt src 求解求解
0
262,272
22,828,098,413
IssuesEvent
2022-07-12 10:23:20
foundry-rs/foundry
https://api.github.com/repos/foundry-rs/foundry
closed
Allow forking from different RPCs/block numbers when testing
A-evm T-feature Cmd-forge-test C-forge Cmd-forge-debug
### Component Forge ### Describe the feature you would like Currently if you want to test against mainnet state, you can pass in an RPC url and block number to fork from. However it isn't possible to run tests on multiple networks or fork from different block numbers. For example, you might want 1 test to run against the state at block number 10000, and another at block number 20000. Hardhat has a method called `hardhat_reset` which allows you to change the RPC url/block number mainnet state is forked from: https://hardhat.org/hardhat-network/guides/mainnet-forking.html#resetting-the-fork A cheatcode similar to that would be useful. It could look like this: ```solidity hevm.reset("https://infura.io/....", 12345); ``` ### Additional context _No response_
1.0
Allow forking from different RPCs/block numbers when testing - ### Component Forge ### Describe the feature you would like Currently if you want to test against mainnet state, you can pass in an RPC url and block number to fork from. However it isn't possible to run tests on multiple networks or fork from different block numbers. For example, you might want 1 test to run against the state at block number 10000, and another at block number 20000. Hardhat has a method called `hardhat_reset` which allows you to change the RPC url/block number mainnet state is forked from: https://hardhat.org/hardhat-network/guides/mainnet-forking.html#resetting-the-fork A cheatcode similar to that would be useful. It could look like this: ```solidity hevm.reset("https://infura.io/....", 12345); ``` ### Additional context _No response_
non_priority
allow forking from different rpcs block numbers when testing component forge describe the feature you would like currently if you want to test against mainnet state you can pass in an rpc url and block number to fork from however it isn t possible to run tests on multiple networks or fork from different block numbers for example you might want test to run against the state at block number and another at block number hardhat has a method called hardhat reset which allows you to change the rpc url block number mainnet state is forked from a cheatcode similar to that would be useful it could look like this solidity hevm reset additional context no response
0
451,338
32,024,210,063
IssuesEvent
2023-09-22 07:39:47
JoberChipFrappuccino/joberchip-fe
https://api.github.com/repos/JoberChipFrappuccino/joberchip-fe
closed
중간 점검 제출 전 사전 문서 작업 및 기능 정리
documentation
# 기능 중간 점검 제출 전 사전 문서 작업 및 기능 정리를 진행합니다. # 적용되는 페이지 # 추가 설명 # 예상 시작일 2023-09-22 # 예상 완료일 2023-09-22
1.0
중간 점검 제출 전 사전 문서 작업 및 기능 정리 - # 기능 중간 점검 제출 전 사전 문서 작업 및 기능 정리를 진행합니다. # 적용되는 페이지 # 추가 설명 # 예상 시작일 2023-09-22 # 예상 완료일 2023-09-22
non_priority
중간 점검 제출 전 사전 문서 작업 및 기능 정리 기능 중간 점검 제출 전 사전 문서 작업 및 기능 정리를 진행합니다 적용되는 페이지 추가 설명 예상 시작일 예상 완료일
0
141,730
11,433,369,927
IssuesEvent
2020-02-04 15:35:28
libuv/libuv
https://api.github.com/repos/libuv/libuv
reopened
ci,macos: flaky process_title_threadsafe test
macos test
It times out frequently again after 00c6b1649d13fdd94bedbfe7ad26c9269c80b32c was reverted in 97e86dde84198208984b4ed107adb76b8632409f: ``` not ok 195 - process_title_threadsafe # timeout # Output from process `process_title_threadsafe`: (no output) ``` <hr> Observation by @cjihrig in https://github.com/libuv/libuv/pull/2405#issuecomment-517972086: > moving the `pSetApplicationIsDaemon(1) != noErr` check out of `uv__set_process_title()`, and into `uv__set_process_title_platform_init()` seems to fix https://github.com/nodejs/node/issues/28945 for me. <sup>(edit: removed comment that was me misinterpreting the statement above :-))</sup>
1.0
ci,macos: flaky process_title_threadsafe test - It times out frequently again after 00c6b1649d13fdd94bedbfe7ad26c9269c80b32c was reverted in 97e86dde84198208984b4ed107adb76b8632409f: ``` not ok 195 - process_title_threadsafe # timeout # Output from process `process_title_threadsafe`: (no output) ``` <hr> Observation by @cjihrig in https://github.com/libuv/libuv/pull/2405#issuecomment-517972086: > moving the `pSetApplicationIsDaemon(1) != noErr` check out of `uv__set_process_title()`, and into `uv__set_process_title_platform_init()` seems to fix https://github.com/nodejs/node/issues/28945 for me. <sup>(edit: removed comment that was me misinterpreting the statement above :-))</sup>
non_priority
ci macos flaky process title threadsafe test it times out frequently again after was reverted in not ok process title threadsafe timeout output from process process title threadsafe no output observation by cjihrig in moving the psetapplicationisdaemon noerr check out of uv set process title and into uv set process title platform init seems to fix for me edit removed comment that was me misinterpreting the statement above
0
36,575
6,540,580,596
IssuesEvent
2017-09-01 15:59:03
endless-sky/endless-sky
https://api.github.com/repos/endless-sky/endless-sky
closed
webhook for discord server
documentation
hey MZ, you probably know we have this discord server, and it would be neat if a update alert was automatically pushed to our announcement channel. more information is in the e-mail i sent you a while back, but since i figured that that one month vacation is just a vacation from heavy tasks, i decided to bring this up.it's a rather lightweight thing.
1.0
webhook for discord server - hey MZ, you probably know we have this discord server, and it would be neat if a update alert was automatically pushed to our announcement channel. more information is in the e-mail i sent you a while back, but since i figured that that one month vacation is just a vacation from heavy tasks, i decided to bring this up.it's a rather lightweight thing.
non_priority
webhook for discord server hey mz you probably know we have this discord server and it would be neat if a update alert was automatically pushed to our announcement channel more information is in the e mail i sent you a while back but since i figured that that one month vacation is just a vacation from heavy tasks i decided to bring this up it s a rather lightweight thing
0
7,321
3,535,728,771
IssuesEvent
2016-01-16 18:56:13
marthjod/jeux
https://api.github.com/repos/marthjod/jeux
opened
Remove `previousRoundId` from code and DB schema
code enhancement
Only roundId remains somewhat necessary (for sorting purposes). Since a round switch is no longer a round switch but carried out on a per-group basis, previous round info is no longer needed.
1.0
Remove `previousRoundId` from code and DB schema - Only roundId remains somewhat necessary (for sorting purposes). Since a round switch is no longer a round switch but carried out on a per-group basis, previous round info is no longer needed.
non_priority
remove previousroundid from code and db schema only roundid remains somewhat necessary for sorting purposes since a round switch is no longer a round switch but carried out on a per group basis previous round info is no longer needed
0
203,185
15,873,733,027
IssuesEvent
2021-04-09 03:10:58
AY2021S2-CS2103T-W15-3/tp
https://api.github.com/repos/AY2021S2-CS2103T-W15-3/tp
closed
[PE-D] Command format given in user guide for adding a dish does not match with the command format accepted by Jjimy.
type.Documentation
In the user guide the command format for adding a dish is given as `menu add n/[NAME] p/[PRICE]` as can be seen in the screenshot below. ![image.png](https://raw.githubusercontent.com/simran-bhadani3/ped/main/files/22a0fa12-250b-4e89-b5b5-36351036928f.png) However, when using this command format in the application I get an `Invalid command format!` error as can be seen in the screenshot below. ![image.png](https://raw.githubusercontent.com/simran-bhadani3/ped/main/files/9ec0a882-9104-4345-832a-c93e4520a37f.png) There are additional parameters mentioned in the application `/i and /q` which are not mentioned in the user guide for this particular command. <!--session: 1617429865863-fd1b9681-5db8-42a5-8d26-2ea061c5ecb4--> ------------- Labels: `severity.Medium` `type.DocumentationBug` original: simran-bhadani3/ped#4
1.0
[PE-D] Command format given in user guide for adding a dish does not match with the command format accepted by Jjimy. - In the user guide the command format for adding a dish is given as `menu add n/[NAME] p/[PRICE]` as can be seen in the screenshot below. ![image.png](https://raw.githubusercontent.com/simran-bhadani3/ped/main/files/22a0fa12-250b-4e89-b5b5-36351036928f.png) However, when using this command format in the application I get an `Invalid command format!` error as can be seen in the screenshot below. ![image.png](https://raw.githubusercontent.com/simran-bhadani3/ped/main/files/9ec0a882-9104-4345-832a-c93e4520a37f.png) There are additional parameters mentioned in the application `/i and /q` which are not mentioned in the user guide for this particular command. <!--session: 1617429865863-fd1b9681-5db8-42a5-8d26-2ea061c5ecb4--> ------------- Labels: `severity.Medium` `type.DocumentationBug` original: simran-bhadani3/ped#4
non_priority
command format given in user guide for adding a dish does not match with the command format accepted by jjimy in the user guide the command format for adding a dish is given as menu add n p as can be seen in the screenshot below however when using this command format in the application i get an invalid command format error as can be seen in the screenshot below there are additional parameters mentioned in the application i and q which are not mentioned in the user guide for this particular command labels severity medium type documentationbug original simran ped
0
200,126
22,739,447,865
IssuesEvent
2022-07-07 01:14:34
AnhaaD/auth-server
https://api.github.com/repos/AnhaaD/auth-server
closed
WS-2019-0333 (High) detected in handlebars-4.1.2.tgz - autoclosed
security vulnerability
## WS-2019-0333 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.1.2.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz</a></p> <p>Path to dependency file: /auth-server/package.json</p> <p>Path to vulnerable library: auth-server/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - karma-coverage-istanbul-reporter-1.4.3.tgz (Root Library) - istanbul-api-1.3.7.tgz - istanbul-reports-1.5.1.tgz - :x: **handlebars-4.1.2.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In handlebars, versions prior to v4.5.3 are vulnerable to prototype pollution. Using a malicious template it's possbile to add or modify properties to the Object prototype. This can also lead to DOS and RCE in certain conditions. <p>Publish Date: 2019-11-18 <p>URL: <a href=https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08>WS-2019-0333</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1325">https://www.npmjs.com/advisories/1325</a></p> <p>Release Date: 2019-11-18</p> <p>Fix Resolution: handlebars - 4.5.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2019-0333 (High) detected in handlebars-4.1.2.tgz - autoclosed - ## WS-2019-0333 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-4.1.2.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz">https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz</a></p> <p>Path to dependency file: /auth-server/package.json</p> <p>Path to vulnerable library: auth-server/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - karma-coverage-istanbul-reporter-1.4.3.tgz (Root Library) - istanbul-api-1.3.7.tgz - istanbul-reports-1.5.1.tgz - :x: **handlebars-4.1.2.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In handlebars, versions prior to v4.5.3 are vulnerable to prototype pollution. Using a malicious template it's possbile to add or modify properties to the Object prototype. This can also lead to DOS and RCE in certain conditions. <p>Publish Date: 2019-11-18 <p>URL: <a href=https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08>WS-2019-0333</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1325">https://www.npmjs.com/advisories/1325</a></p> <p>Release Date: 2019-11-18</p> <p>Fix Resolution: handlebars - 4.5.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws high detected in handlebars tgz autoclosed ws high severity vulnerability vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file auth server package json path to vulnerable library auth server node modules handlebars package json dependency hierarchy karma coverage istanbul reporter tgz root library istanbul api tgz istanbul reports tgz x handlebars tgz vulnerable library vulnerability details in handlebars versions prior to are vulnerable to prototype pollution using a malicious template it s possbile to add or modify properties to the object prototype this can also lead to dos and rce in certain conditions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution handlebars step up your open source security game with whitesource
0
213,393
16,521,858,201
IssuesEvent
2021-05-26 15:19:06
mjd-programming/Tetris
https://api.github.com/repos/mjd-programming/Tetris
closed
Create logging functionality
big issue/addition documentation
create logging functionality for testing purposes; there are a couple of issues in the game (freezing/lines not being properly cleared) and the log files will be used to determine where the problems are coming from and an entry will be added to the log file whenever a line is cleared logs are to include: date/time current grid status current piece current locked positions current total cleared lines most recent keys pressed (5 keys) below is an example of what an entry into the log file will look like: [05/25/21 - 15:05:49] Current Piece: L Total Lines Cleared: 15 Grid: [[grid[0][0], grid[0][1], ...],[grid[1][0], grid[1][1], ...]] Locked Positions: {(locked_positions[a][b]):color, ...} separate each entry with an empty line
1.0
Create logging functionality - create logging functionality for testing purposes; there are a couple of issues in the game (freezing/lines not being properly cleared) and the log files will be used to determine where the problems are coming from and an entry will be added to the log file whenever a line is cleared logs are to include: date/time current grid status current piece current locked positions current total cleared lines most recent keys pressed (5 keys) below is an example of what an entry into the log file will look like: [05/25/21 - 15:05:49] Current Piece: L Total Lines Cleared: 15 Grid: [[grid[0][0], grid[0][1], ...],[grid[1][0], grid[1][1], ...]] Locked Positions: {(locked_positions[a][b]):color, ...} separate each entry with an empty line
non_priority
create logging functionality create logging functionality for testing purposes there are a couple of issues in the game freezing lines not being properly cleared and the log files will be used to determine where the problems are coming from and an entry will be added to the log file whenever a line is cleared logs are to include date time current grid status current piece current locked positions current total cleared lines most recent keys pressed keys below is an example of what an entry into the log file will look like current piece l total lines cleared grid grid grid locked positions locked positions color separate each entry with an empty line
0
155,701
13,631,858,465
IssuesEvent
2020-09-24 18:41:32
PerfectStorms/java-interview-questions
https://api.github.com/repos/PerfectStorms/java-interview-questions
closed
Implement task with stream api
documentation
There is a task with the list of EPAM interviews, with the condition of the solution with streams. Please, implement a task and surrond it with java code style
1.0
Implement task with stream api - There is a task with the list of EPAM interviews, with the condition of the solution with streams. Please, implement a task and surrond it with java code style
non_priority
implement task with stream api there is a task with the list of epam interviews with the condition of the solution with streams please implement a task and surrond it with java code style
0
73,388
8,870,584,937
IssuesEvent
2019-01-11 09:56:51
cockpit-project/cockpit
https://api.github.com/repos/cockpit-project/cockpit
closed
docker: Display cpu quota and not just shares
needsdesign review-2019-01
Seems when cpu quota is set shares stays at zero. We should display the quota as well. https://bugzilla.redhat.com/show_bug.cgi?id=1523646
1.0
docker: Display cpu quota and not just shares - Seems when cpu quota is set shares stays at zero. We should display the quota as well. https://bugzilla.redhat.com/show_bug.cgi?id=1523646
non_priority
docker display cpu quota and not just shares seems when cpu quota is set shares stays at zero we should display the quota as well
0
226,823
17,363,201,970
IssuesEvent
2021-07-30 01:08:57
mygoodsupporter/mygoodsupporter
https://api.github.com/repos/mygoodsupporter/mygoodsupporter
closed
[Kickstarter]API
Documentation Help wanted
# Kickstarter ## User GET'/settings/account/ POST'/profile' ``` email newPassword confirmPassword currentPassword ``` GET'/settings/profile' POST'/profile' ``` name avatar(profile_image) biography ``` view Profile ``` https://www.kickstarter.com/profile/637606299/about ``` GET'/profile/credit_cards' | Payment Methods POST'/profile/credit_cards/ ``` CardNumber Cardholder Name ExpirationMonth ExpirationYear SecurityCode Zip/PostalCode ``` GET'/profile/addresses' New address Saved Addresses POST'/profile/addresses' ## Project Builder : Persona(Creator) GET'/learn' GET'/start' ``` 1/3 Category 2/3 Description 3/3 Agreement ``` POST'/https://api.icy-lake.kickstarter.com/v1/t' Redirect:/projects/:username/:projectId/build ### /projects/:username/:projectId/build GET'/projects/:username/:projectId/edit/preview' #### PROJECT OVERVIEW ``` Basics GET'/projects/:username/:projectId/edit/basics Funding GET'/projects/:username/:projectId/edit/funding Rewards GET'/projects/:username/:projectId/edit/rewards Story GET'/projects/:username/:projectId/edit/story People GET'/projects/:username/:projectId/edit/people Payment '/projects/:username/:projectId/edit/payment ``` Submit Project for review ``` Project review ``` delete project POST'/projects/:username/:projectId/delete #### GET'/projects/:username/:projectId/edit/basics Post'/projects/:username/:projectId/edit/basics' ``` Title Subtitle Category project Image Capaign Duration ``` Capaign Duration 사용자가 날짜를 지정했는데 리뷰 통과를 그 전에 못했다면? #### GET'/projects/:username/:projectId/edit/funding ``` Goal Amount ``` #### GET'/projects/:username/:projectId/edit/rewards Add a reward With Preview( w-1/3 hidden lg:flex) ``` Title Amount Description Estimated Delivery List<Items> Shipping Select Option [NO | Yes] Project Quantity [ Unlimited | Limited ] ``` #### GET'/projects/:username/:projectId/edit/items POST'/projects/:username/:projectId/edit/items ``` Title ``` GET'/projects/:username/:projectId/edit/payment POST'/projects/:username/:projectId/edit/payment ``` BankAccount ``` ## Project : Persona(Backer) ``` GET'/projects/:username/:project-name' GET'/projects/:username/:project-name/description' GET'/projects/:username/:project-name/faqs' GET'/projects/:username/:project-name/posts' GET'/projects/:username/:project-name/comments' GET'/projects/:username/:project-name/pledge/new' ``` GET'/projects/:username/:project-name/pledge/new POST'/porjects/:username/:project-name/pledge has 3 form with input:radio filled with reward-id redirect: /checkouts/168892723/payments/new
1.0
[Kickstarter]API - # Kickstarter ## User GET'/settings/account/ POST'/profile' ``` email newPassword confirmPassword currentPassword ``` GET'/settings/profile' POST'/profile' ``` name avatar(profile_image) biography ``` view Profile ``` https://www.kickstarter.com/profile/637606299/about ``` GET'/profile/credit_cards' | Payment Methods POST'/profile/credit_cards/ ``` CardNumber Cardholder Name ExpirationMonth ExpirationYear SecurityCode Zip/PostalCode ``` GET'/profile/addresses' New address Saved Addresses POST'/profile/addresses' ## Project Builder : Persona(Creator) GET'/learn' GET'/start' ``` 1/3 Category 2/3 Description 3/3 Agreement ``` POST'/https://api.icy-lake.kickstarter.com/v1/t' Redirect:/projects/:username/:projectId/build ### /projects/:username/:projectId/build GET'/projects/:username/:projectId/edit/preview' #### PROJECT OVERVIEW ``` Basics GET'/projects/:username/:projectId/edit/basics Funding GET'/projects/:username/:projectId/edit/funding Rewards GET'/projects/:username/:projectId/edit/rewards Story GET'/projects/:username/:projectId/edit/story People GET'/projects/:username/:projectId/edit/people Payment '/projects/:username/:projectId/edit/payment ``` Submit Project for review ``` Project review ``` delete project POST'/projects/:username/:projectId/delete #### GET'/projects/:username/:projectId/edit/basics Post'/projects/:username/:projectId/edit/basics' ``` Title Subtitle Category project Image Capaign Duration ``` Capaign Duration 사용자가 날짜를 지정했는데 리뷰 통과를 그 전에 못했다면? #### GET'/projects/:username/:projectId/edit/funding ``` Goal Amount ``` #### GET'/projects/:username/:projectId/edit/rewards Add a reward With Preview( w-1/3 hidden lg:flex) ``` Title Amount Description Estimated Delivery List<Items> Shipping Select Option [NO | Yes] Project Quantity [ Unlimited | Limited ] ``` #### GET'/projects/:username/:projectId/edit/items POST'/projects/:username/:projectId/edit/items ``` Title ``` GET'/projects/:username/:projectId/edit/payment POST'/projects/:username/:projectId/edit/payment ``` BankAccount ``` ## Project : Persona(Backer) ``` GET'/projects/:username/:project-name' GET'/projects/:username/:project-name/description' GET'/projects/:username/:project-name/faqs' GET'/projects/:username/:project-name/posts' GET'/projects/:username/:project-name/comments' GET'/projects/:username/:project-name/pledge/new' ``` GET'/projects/:username/:project-name/pledge/new POST'/porjects/:username/:project-name/pledge has 3 form with input:radio filled with reward-id redirect: /checkouts/168892723/payments/new
non_priority
api kickstarter user get settings account post profile email newpassword confirmpassword currentpassword get settings profile post profile name avatar profile image biography view profile get profile credit cards payment methods post profile credit cards cardnumber cardholder name expirationmonth expirationyear securitycode zip postalcode get profile addresses new address saved addresses post profile addresses project builder persona creator get learn get start category description agreement post redirect projects username projectid build projects username projectid build get projects username projectid edit preview project overview basics get projects username projectid edit basics funding get projects username projectid edit funding rewards get projects username projectid edit rewards story get projects username projectid edit story people get projects username projectid edit people payment projects username projectid edit payment submit project for review project review delete project post projects username projectid delete get projects username projectid edit basics post projects username projectid edit basics title subtitle category project image capaign duration capaign duration 사용자가 날짜를 지정했는데 리뷰 통과를 그 전에 못했다면 get projects username projectid edit funding goal amount get projects username projectid edit rewards add a reward with preview w hidden lg flex title amount description estimated delivery list shipping select option project quantity get projects username projectid edit items post projects username projectid edit items title get projects username projectid edit payment post projects username projectid edit payment bankaccount project persona backer get projects username project name get projects username project name description get projects username project name faqs get projects username project name posts get projects username project name comments get projects username project name pledge new get projects username project name pledge new post porjects username project name pledge has form with input radio filled with reward id redirect checkouts payments new
0
110,403
16,979,887,447
IssuesEvent
2021-06-30 07:27:36
SmartBear/ready-mqtt-plugin
https://api.github.com/repos/SmartBear/ready-mqtt-plugin
closed
CVE-2020-36184 (High) detected in jackson-databind-2.1.4.jar - autoclosed
security vulnerability
## CVE-2020-36184 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.1.4.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Path to dependency file: ready-mqtt-plugin/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.1.4/jackson-databind-2.1.4.jar</p> <p> Dependency Hierarchy: - ready-api-soapui-pro-3.3.1.jar (Root Library) - jasperreports-6.4.0-sb-fixed.jar - :x: **jackson-databind-2.1.4.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource. <p>Publish Date: 2021-01-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184>CVE-2020-36184</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2998">https://github.com/FasterXML/jackson-databind/issues/2998</a></p> <p>Release Date: 2021-01-06</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.1.4","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.smartbear:ready-api-soapui-pro:3.3.1;net.sf.jasperreports:jasperreports:6.4.0-sb-fixed;com.fasterxml.jackson.core:jackson-databind:2.1.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36184","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-36184 (High) detected in jackson-databind-2.1.4.jar - autoclosed - ## CVE-2020-36184 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.1.4.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Path to dependency file: ready-mqtt-plugin/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.1.4/jackson-databind-2.1.4.jar</p> <p> Dependency Hierarchy: - ready-api-soapui-pro-3.3.1.jar (Root Library) - jasperreports-6.4.0-sb-fixed.jar - :x: **jackson-databind-2.1.4.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource. <p>Publish Date: 2021-01-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184>CVE-2020-36184</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2998">https://github.com/FasterXML/jackson-databind/issues/2998</a></p> <p>Release Date: 2021-01-06</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.1.4","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.smartbear:ready-api-soapui-pro:3.3.1;net.sf.jasperreports:jasperreports:6.4.0-sb-fixed;com.fasterxml.jackson.core:jackson-databind:2.1.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36184","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jackson databind jar autoclosed cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api path to dependency file ready mqtt plugin pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy ready api soapui pro jar root library jasperreports sb fixed jar x jackson databind jar vulnerable library found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp datasources peruserpooldatasource publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com smartbear ready api soapui pro net sf jasperreports jasperreports sb fixed com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind basebranches vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp datasources peruserpooldatasource vulnerabilityurl
0
294,833
22,163,741,616
IssuesEvent
2022-06-04 22:37:30
cloudflare/cloudflare-docs
https://api.github.com/repos/cloudflare/cloudflare-docs
opened
"R2 get started guide" has missing steps
documentation content:edit
### Which Cloudflare product does this pertain to? R2 ### Existing documentation URL(s) https://developers.cloudflare.com/r2/get-started/ ### Section that requires update 5. Access your R2 bucket from your Worker ​7. Deploy your bucket ### What needs to change? when following document as written, multiple issues are encountered Section 5 states "Add the following snippet into your project’s index.js file" however no index.js will exist at this point Section 7 states to run "wrangler publish" however this will fail due to no package.json ``` $ wrangler publish ✨ Basic JavaScript project found. Skipping unnecessary build! Error: Your JavaScript project is missing a `package.json` file; is `/home/cmcphers/wrangler` the wrong directory? ``` ### How should it change? There appears to be a missing step, running "wrangler generate" which creates the missing index.js and package.json files ### Additional information _No response_
1.0
"R2 get started guide" has missing steps - ### Which Cloudflare product does this pertain to? R2 ### Existing documentation URL(s) https://developers.cloudflare.com/r2/get-started/ ### Section that requires update 5. Access your R2 bucket from your Worker ​7. Deploy your bucket ### What needs to change? when following document as written, multiple issues are encountered Section 5 states "Add the following snippet into your project’s index.js file" however no index.js will exist at this point Section 7 states to run "wrangler publish" however this will fail due to no package.json ``` $ wrangler publish ✨ Basic JavaScript project found. Skipping unnecessary build! Error: Your JavaScript project is missing a `package.json` file; is `/home/cmcphers/wrangler` the wrong directory? ``` ### How should it change? There appears to be a missing step, running "wrangler generate" which creates the missing index.js and package.json files ### Additional information _No response_
non_priority
get started guide has missing steps which cloudflare product does this pertain to existing documentation url s section that requires update access your bucket from your worker ​ deploy your bucket what needs to change when following document as written multiple issues are encountered section states add the following snippet into your project’s index js file however no index js will exist at this point section states to run wrangler publish however this will fail due to no package json wrangler publish ✨ basic javascript project found skipping unnecessary build error your javascript project is missing a package json file is home cmcphers wrangler the wrong directory how should it change there appears to be a missing step running wrangler generate which creates the missing index js and package json files additional information no response
0
78,690
22,348,350,590
IssuesEvent
2022-06-15 09:46:09
flutter/flutter
https://api.github.com/repos/flutter/flutter
reopened
`flutter build apk --analyze-size --target-platform android-arm` fails with `Exception: AOT snapshotter exited with code -2147483645`
severe: crash platform-android waiting for customer response tool dependency: dart t: gradle a: build
When I run `flutter build apk --analyze-size --target-platform android-arm` I get: <pre> <code> Dart snapshot generator failed with exit code -2147483645 FAILURE: Build failed with an exception. * Where: Script 'D:\flutter\packages\flutter_tools\gradle\flutter.gradle' line: 1102 * What went wrong: Execution failed for task ':app:compileFlutterBuildRelease'. > Process 'command 'D:\flutter\bin\flutter.bat'' finished with non-zero exit value 1 * Try: Run with --stacktrace option to get the stack trace. Run with --info or --debug option to get more log output. Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 40s</code> </pre> <details> <summary>flutter doctor -v</summary> ``` [√] Flutter (Channel stable, 2.10.0, on Microsoft Windows [Versión 10.0.22000.434], locale es-MX) • Flutter version 2.10.0 at D:\flutter • Upstream repository https://github.com/flutter/flutter.git • Framework revision 5f105a6ca7 (2 days ago), 2022-02-01 14:15:42 -0800 • Engine revision 776efd2034 • Dart version 2.16.0 • DevTools version 2.9.2 [√] Android toolchain - develop for Android devices (Android SDK version 30.0.3) • Android SDK at D:\Android\SDK • Platform android-31, build-tools 30.0.3 • ANDROID_HOME = D:\Android\SDK • Java binary at: C:\Program Files\Android\Android Studio\jre\bin\java • Java version OpenJDK Runtime Environment (build 11.0.11+9-b60-7590822) • All Android licenses accepted. [√] Chrome - develop for the web • Chrome at C:\Program Files\Google\Chrome\Application\chrome.exe [√] Visual Studio - develop for Windows (Visual Studio Community 2019 16.11.9) • Visual Studio at C:\Program Files (x86)\Microsoft Visual Studio\2019\Community • Visual Studio Community 2019 version 16.11.32106.194 • Windows 10 SDK version 10.0.19041.0 [√] Android Studio (version 2021.1) • Android Studio at C:\Program Files\Android\Android Studio • Flutter plugin can be installed from: https://plugins.jetbrains.com/plugin/9212-flutter • Dart plugin can be installed from: https://plugins.jetbrains.com/plugin/6351-dart • Java version OpenJDK Runtime Environment (build 11.0.11+9-b60-7590822) [√] IntelliJ IDEA Ultimate Edition (version 2021.2) • IntelliJ at C:\Program Files\JetBrains\IntelliJ IDEA 2021.2.1 • Flutter plugin can be installed from: https://plugins.jetbrains.com/plugin/9212-flutter • Dart plugin can be installed from: https://plugins.jetbrains.com/plugin/6351-dart ``` </details> <details> <summary>Logs</summary> `flutter build apk --analyze-size --target-platform android-arm -v` ```console [ +89 ms] executing: [D:\flutter/] git -c log.showSignature=false log -n 1 --pretty=format:%H [ +99 ms] Exit code 0 from: git -c log.showSignature=false log -n 1 --pretty=format:%H [ ] 5f105a6ca7a5ac7b8bc9b241f4c2d86f4188cf5c [ ] executing: [D:\flutter/] git tag --points-at 5f105a6ca7a5ac7b8bc9b241f4c2d86f4188cf5c [ +65 ms] Exit code 0 from: git tag --points-at 5f105a6ca7a5ac7b8bc9b241f4c2d86f4188cf5c [ ] 2.10.0 [ +10 ms] executing: [D:\flutter/] git rev-parse --abbrev-ref --symbolic @{u} [ +51 ms] Exit code 0 from: git rev-parse --abbrev-ref --symbolic @{u} [ ] origin/stable [ ] executing: [D:\flutter/] git ls-remote --get-url origin [ +49 ms] Exit code 0 from: git ls-remote --get-url origin [ ] https://github.com/flutter/flutter.git [ +131 ms] executing: [D:\flutter/] git rev-parse --abbrev-ref HEAD [ +53 ms] Exit code 0 from: git rev-parse --abbrev-ref HEAD [ ] stable [ +86 ms] Artifact Instance of 'AndroidGenSnapshotArtifacts' is not required, skipping update. [ ] Artifact Instance of 'AndroidInternalBuildArtifacts' is not required, skipping update. [ ] Artifact Instance of 'IOSEngineArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'FlutterWebSdk' is not required, skipping update. [ +8 ms] Artifact Instance of 'WindowsEngineArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'WindowsUwpEngineArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'MacOSEngineArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'LinuxEngineArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'LinuxFuchsiaSDKArtifacts' is not required, skipping update. [ ] Artifact Instance of 'MacOSFuchsiaSDKArtifacts' is not required, skipping update. [ ] Artifact Instance of 'FlutterRunnerSDKArtifacts' is not required, skipping update. [ ] Artifact Instance of 'FlutterRunnerDebugSymbols' is not required, skipping update. [ +75 ms] Artifact Instance of 'MaterialFonts' is not required, skipping update. [ ] Artifact Instance of 'GradleWrapper' is not required, skipping update. [ +4 ms] Artifact Instance of 'AndroidInternalBuildArtifacts' is not required, skipping update. [ ] Artifact Instance of 'IOSEngineArtifacts' is not required, skipping update. [ ] Artifact Instance of 'FlutterWebSdk' is not required, skipping update. [ ] Artifact Instance of 'FlutterSdk' is not required, skipping update. [ ] Artifact Instance of 'WindowsEngineArtifacts' is not required, skipping update. [ ] Artifact Instance of 'WindowsUwpEngineArtifacts' is not required, skipping update. [ ] Artifact Instance of 'MacOSEngineArtifacts' is not required, skipping update. [ ] Artifact Instance of 'LinuxEngineArtifacts' is not required, skipping update. [ ] Artifact Instance of 'LinuxFuchsiaSDKArtifacts' is not required, skipping update. [ ] Artifact Instance of 'MacOSFuchsiaSDKArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'FlutterRunnerSDKArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'FlutterRunnerDebugSymbols' is not required, skipping update. [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ +3 ms] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] Artifact Instance of 'FontSubsetArtifacts' is not required, skipping update. [ ] Artifact Instance of 'PubDependencies' is not required, skipping update. [ +118 ms] Skipping pub get: version match. [ +54 ms] Found plugin firebase_auth at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_auth-3.3.6\ [ +9 ms] Found plugin firebase_auth_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_auth_web-3.3.7\ [ +2 ms] Found plugin firebase_core at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_core-1.12.0\ [ +3 ms] Found plugin firebase_core_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_core_web-1.5.4\ [ +7 ms] Found plugin flutter_secure_storage at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage-5.0.2\ [ +4 ms] Found plugin flutter_secure_storage_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_linux-1.1.0\ [ +3 ms] Found plugin flutter_secure_storage_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_macos-1.1.0\ [ +3 ms] Found plugin flutter_secure_storage_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_web-1.0.2\ [ +3 ms] Found plugin flutter_secure_storage_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_windows-1.1.2\ [ +24 ms] Found plugin path_provider at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider-2.0.8\ [ +3 ms] Found plugin path_provider_android at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_android-2.0.11\ [ +3 ms] Found plugin path_provider_ios at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_ios-2.0.7\ [ +3 ms] Found plugin path_provider_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_linux-2.1.5\ [ +1 ms] Found plugin path_provider_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_macos-2.0.5\ [ +2 ms] Found plugin path_provider_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_windows-2.0.5\ [ +9 ms] Found plugin sqflite at D:\flutter\.pub-cache\hosted\pub.dartlang.org\sqflite-2.0.2\ [ +12 ms] Found plugin url_launcher at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher-6.0.18\ [ +2 ms] Found plugin url_launcher_android at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_android-6.0.14\ [ +2 ms] Found plugin url_launcher_ios at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_ios-6.0.14\ [ +2 ms] Found plugin url_launcher_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_linux-2.0.3\ [ +3 ms] Found plugin url_launcher_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_macos-2.0.3\ [ +2 ms] Found plugin url_launcher_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_web-2.0.6\ [ +2 ms] Found plugin url_launcher_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_windows-2.0.2\ [ +101 ms] Found plugin firebase_auth at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_auth-3.3.6\ [ +2 ms] Found plugin firebase_auth_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_auth_web-3.3.7\ [ +1 ms] Found plugin firebase_core at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_core-1.12.0\ [ +2 ms] Found plugin firebase_core_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_core_web-1.5.4\ [ +6 ms] Found plugin flutter_secure_storage at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage-5.0.2\ [ +4 ms] Found plugin flutter_secure_storage_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_linux-1.1.0\ [ +1 ms] Found plugin flutter_secure_storage_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_macos-1.1.0\ [ +3 ms] Found plugin flutter_secure_storage_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_web-1.0.2\ [ +3 ms] Found plugin flutter_secure_storage_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_windows-1.1.2\ [ +13 ms] Found plugin path_provider at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider-2.0.8\ [ +3 ms] Found plugin path_provider_android at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_android-2.0.11\ [ +1 ms] Found plugin path_provider_ios at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_ios-2.0.7\ [ +1 ms] Found plugin path_provider_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_linux-2.1.5\ [ +3 ms] Found plugin path_provider_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_macos-2.0.5\ [ +2 ms] Found plugin path_provider_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_windows-2.0.5\ [ +9 ms] Found plugin sqflite at D:\flutter\.pub-cache\hosted\pub.dartlang.org\sqflite-2.0.2\ [ +14 ms] Found plugin url_launcher at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher-6.0.18\ [ +1 ms] Found plugin url_launcher_android at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_android-6.0.14\ [ +1 ms] Found plugin url_launcher_ios at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_ios-6.0.14\ [ +3 ms] Found plugin url_launcher_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_linux-2.0.3\ [ +1 ms] Found plugin url_launcher_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_macos-2.0.3\ [ +3 ms] Found plugin url_launcher_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_web-2.0.6\ [ +2 ms] Found plugin url_launcher_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_windows-2.0.2\ [ +23 ms] Generating D:\hackv\Documents\Flutter\mujeres_app\android\app\src\main\java\io\flutter\plugins\GeneratedPluginRegistrant.java [ +101 ms] Building with sound null safety [ +22 ms] Running Gradle task 'assembleRelease'... [ +7 ms] Using gradle from D:\hackv\Documents\Flutter\mujeres_app\android\gradlew.bat. [ +6 ms] Building with Flutter multidex support enabled. [ +8 ms] executing: C:\Program Files\Android\Android Studio\jre\bin\java -version [ +152 ms] Exit code 0 from: C:\Program Files\Android\Android Studio\jre\bin\java -version [ +1 ms] openjdk version "11.0.11" 2021-04-20 OpenJDK Runtime Environment (build 11.0.11+9-b60-7590822) OpenJDK 64-Bit Server VM (build 11.0.11+9-b60-7590822, mixed mode) [ +2 ms] executing: [D:\hackv\Documents\Flutter\mujeres_app\android/] D:\hackv\Documents\Flutter\mujeres_app\android\gradlew.bat -Pverbose=true -Ptarget-platform=android-arm -Ptarget=lib\main.dart -Pmultidex-enabled=true -Pbase-application-name=android.app.Application -Pdart-obfuscation=false -Ptrack-widget-creation=true -Ptree-shake-icons=true -Pcode-size-directory=build\flutter_size_12 assembleRelease [+4929 ms] > Configure project :firebase_auth [ +1 ms] WARNING: The option setting 'android.enableR8=true' is deprecated. [ +1 ms] It will be removed in version 5.0 of the Android Gradle plugin. [ ] You will no longer be able to disable R8 [+2382 ms] > Task :app:compileFlutterBuildRelease [ +1 ms] [ +72 ms] executing: [D:\flutter/] git -c log.showSignature=false log -n 1 --pretty=format:%H [ +1 ms] [ +90 ms] Exit code 0 from: git -c log.showSignature=false log -n 1 --pretty=format:%H [ ] [ ] 5f105a6ca7a5ac7b8bc9b241f4c2d86f4188cf5c [ ] [ ] executing: [D:\flutter/] git tag --points-at 5f105a6ca7a5ac7b8bc9b241f4c2d86f4188cf5c [ ] [ +66 ms] Exit code 0 from: git tag --points-at 5f105a6ca7a5ac7b8bc9b241f4c2d86f4188cf5c [ ] [ ] 2.10.0 [ +1 ms] [ +8 ms] executing: [D:\flutter/] git rev-parse --abbrev-ref --symbolic @{u} [ +1 ms] [ +50 ms] Exit code 0 from: git rev-parse --abbrev-ref --symbolic @{u} [ ] [ ] origin/stable [ +1 ms] [ ] executing: [D:\flutter/] git ls-remote --get-url origin [ ] [ +46 ms] Exit code 0 from: git ls-remote --get-url origin [ ] [ ] https://github.com/flutter/flutter.git [ ] [ +52 ms] executing: [D:\flutter/] git rev-parse --abbrev-ref HEAD [ ] [ +55 ms] Exit code 0 from: git rev-parse --abbrev-ref HEAD [ ] [ ] stable [ ] [ +60 ms] Artifact Instance of 'AndroidGenSnapshotArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'AndroidInternalBuildArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'IOSEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterWebSdk' is not required, skipping update. [ ] [ +3 ms] Artifact Instance of 'WindowsEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'WindowsUwpEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'MacOSEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'LinuxEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'LinuxFuchsiaSDKArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'MacOSFuchsiaSDKArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterRunnerSDKArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterRunnerDebugSymbols' is not required, skipping update. [ ] [ +96 ms] Artifact Instance of 'MaterialFonts' is not required, skipping update. [ +1 ms] [ ] Artifact Instance of 'GradleWrapper' is not required, skipping update. [ ] [ +4 ms] Artifact Instance of 'AndroidInternalBuildArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'IOSEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterWebSdk' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterSdk' is not required, skipping update. [ ] [ ] Artifact Instance of 'WindowsEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'WindowsUwpEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'MacOSEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'LinuxEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'LinuxFuchsiaSDKArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'MacOSFuchsiaSDKArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterRunnerSDKArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterRunnerDebugSymbols' is not required, skipping update. [ ] [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ +1 ms] [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FontSubsetArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'PubDependencies' is not required, skipping update. [ ] [ +85 ms] Initializing file store [ +1 ms] [ +26 ms] Skipping target: gen_localizations [ ] [ +15 ms] gen_dart_plugin_registrant: Starting due to {InvalidatedReasonKind.inputChanged: The following inputs have updated contents: D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\package_config_subset} [ +1 ms] [ +43 ms] Found plugin firebase_auth at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_auth-3.3.6\ [ ] [ +5 ms] Found plugin firebase_auth_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_auth_web-3.3.7\ [ ] [ +1 ms] Found plugin firebase_core at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_core-1.12.0\ [ ] [ +2 ms] Found plugin firebase_core_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_core_web-1.5.4\ [ +1 ms] [ +5 ms] Found plugin flutter_secure_storage at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage-5.0.2\ [ +1 ms] [ +1 ms] Found plugin flutter_secure_storage_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_linux-1.1.0\ [ +1 ms] [ +2 ms] Found plugin flutter_secure_storage_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_macos-1.1.0\ [ ] [ +2 ms] Found plugin flutter_secure_storage_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_web-1.0.2\ [ +1 ms] [ +1 ms] Found plugin flutter_secure_storage_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_windows-1.1.2\ [ ] [ +14 ms] Found plugin path_provider at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider-2.0.8\ [ ] [ +1 ms] Found plugin path_provider_android at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_android-2.0.11\ [ +1 ms] [ +1 ms] Found plugin path_provider_ios at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_ios-2.0.7\ [ ] [ +1 ms] Found plugin path_provider_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_linux-2.1.5\ [ +1 ms] [ +1 ms] Found plugin path_provider_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_macos-2.0.5\ [ +1 ms] [ +2 ms] Found plugin path_provider_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_windows-2.0.5\ [ ] [ +6 ms] Found plugin sqflite at D:\flutter\.pub-cache\hosted\pub.dartlang.org\sqflite-2.0.2\ [ +1 ms] [ +7 ms] Found plugin url_launcher at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher-6.0.18\ [ ] [ +1 ms] Found plugin url_launcher_android at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_android-6.0.14\ [ ] [ ] Found plugin url_launcher_ios at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_ios-6.0.14\ [ ] [ +1 ms] Found plugin url_launcher_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_linux-2.0.3\ [ ] [ ] Found plugin url_launcher_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_macos-2.0.3\ [ ] [ +1 ms] Found plugin url_launcher_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_web-2.0.6\ [ ] [ ] Found plugin url_launcher_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_windows-2.0.2\ [ +1 ms] [ +23 ms] gen_dart_plugin_registrant: Complete [ ] [ +3 ms] kernel_snapshot: Starting due to {} [ ] [ +14 ms] D:\flutter\bin\cache\dart-sdk\bin\dart.exe --disable-dart-dev D:\flutter\bin\cache\artifacts\engine\windows-x64\frontend_server.dart.snapshot --sdk-root D:\flutter\bin\cache\artifacts\engine\common\flutter_patched_sdk_product/ --target=flutter --no-print-incremental-dependencies -Ddart.vm.profile=false -Ddart.vm.product=true --aot --tfa --packages D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\package_config.json --output-dill D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\flutter_build\8ad1451e94816d1bbf60843428c2999a\app.dill --depfile D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\flutter_build\8ad1451e94816d1bbf60843428c2999a\kernel_snapshot.d D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\flutter_build\generated_main.dart [+18738 ms] [+19081 ms] kernel_snapshot: Complete [ +886 ms] [ +916 ms] android_aot_release_android-arm: Starting due to {} [ +1 ms] [ +4 ms] Extra gen_snapshot options: [--write-v8-snapshot-profile-to=build\flutter_size_12\snapshot.armeabi-v7a.json, --trace-precompiler-to=build\flutter_size_12\trace.armeabi-v7a.json] [ +1 ms] [ +1 ms] executing: D:\flutter\bin\cache\artifacts\engine\android-arm-release\windows-x64\gen_snapshot --deterministic --write-v8-snapshot-profile-to=build\flutter_size_12\snapshot.armeabi-v7a.json --trace-precompiler-to=build\flutter_size_12\trace.armeabi-v7a.json --snapshot_kind=app-aot-elf --elf=D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\flutter_build\8ad1451e94816d1bbf60843428c2999a\armeabi-v7a\app.so --strip --no-sim-use-hardfp --no-use-integer-division D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\flutter_build\8ad1451e94816d1bbf60843428c2999a\app.dill [ +2 ms] [ ] aot_android_asset_bundle: Starting due to {} [ +105 ms] [ +164 ms] Running command: D:\flutter\bin\cache\dart-sdk\bin\dart.exe --disable-dart-dev D:\flutter\bin\cache\artifacts\engine\windows-x64\const_finder.dart.snapshot --kernel-file D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\flutter_build\8ad1451e94816d1bbf60843428c2999a\app.dill --class-library-uri package:flutter/src/widgets/icon_data.dart --class-name IconData [ +894 ms] [ +893 ms] Running font-subset: D:\flutter\bin\cache\artifacts\engine\windows-x64\font-subset.exe D:\hackv\Documents\Flutter\mujeres_app\build\app\intermediates\flutter\release\flutter_assets\fonts/MaterialIcons-Regular.otf D:\flutter\bin\cache\artifacts\material_fonts\MaterialIcons-Regular.otf, using codepoints 58332 57490 57491 57706 58727 58372 [ +1 ms] [ +16 ms] aot_android_asset_bundle: Complete [+9108 ms] [+9087 ms] Dart snapshot generator failed with exit code -2147483645 [ +3 ms] [ +3 ms] Persisting file store [ +1 ms] [ +13 ms] Done persisting file store [ +88 ms] [ +11 ms] Target android_aot_release_android-arm failed: Exception: AOT snapshotter exited with code -2147483645 [ +1 ms] #0 AndroidAot.build (package:flutter_tools/src/build_system/targets/android.dart:257:7) [ +1 ms] <asynchronous suspension> [ ] #1 _BuildInstance._invokeInternal (package:flutter_tools/src/build_system/build_system.dart:839:9) [ ] <asynchronous suspension> [ ] #2 Future.wait.<anonymous closure> (dart:async/future.dart:473:21) [ ] <asynchronous suspension> [ ] #3 _BuildInstance.invokeTarget (package:flutter_tools/src/build_system/build_system.dart:777:32) [ ] <asynchronous suspension> [ ] #4 FlutterBuildSystem.build (package:flutter_tools/src/build_system/build_system.dart:606:16) [ ] <asynchronous suspension> [ ] #5 AssembleCommand.runCommand (package:flutter_tools/src/commands/assemble.dart:317:32) [ ] <asynchronous suspension> [ ] #6 FlutterCommand.run.<anonymous closure> (package:flutter_tools/src/runner/flutter_command.dart:1161:27) [ ] <asynchronous suspension> [ ] #7 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) [ ] <asynchronous suspension> [ +1 ms] #8 CommandRunner.runCommand (package:args/command_runner.dart:209:13) [ ] <asynchronous suspension> [ ] #9 FlutterCommandRunner.runCommand.<anonymous closure> (package:flutter_tools/src/runner/flutter_command_runner.dart:281:9) [ ] <asynchronous suspension> [ +1 ms] #10 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) [ ] <asynchronous suspension> [ ] #11 FlutterCommandRunner.runCommand (package:flutter_tools/src/runner/flutter_command_runner.dart:229:5) [ ] <asynchronous suspension> [ ] #12 run.<anonymous closure>.<anonymous closure> (package:flutter_tools/runner.dart:62:9) [ ] <asynchronous suspension> [ ] #13 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) [ ] <asynchronous suspension> [ +1 ms] #14 main (package:flutter_tools/executable.dart:94:3) [ +1 ms] <asynchronous suspension> [ +1 ms] [ +4 ms] [ ] #0 throwToolExit (package:flutter_tools/src/base/common.dart:10:3) [ ] #1 AssembleCommand.runCommand (package:flutter_tools/src/commands/assemble.dart:334:7) [ ] <asynchronous suspension> [ ] #2 FlutterCommand.run.<anonymous closure> (package:flutter_tools/src/runner/flutter_command.dart:1161:27) [ ] <asynchronous suspension> [ ] #3 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) [ ] <asynchronous suspension> [ ] #4 CommandRunner.runCommand (package:args/command_runner.dart:209:13) [ ] <asynchronous suspension> [ ] #5 FlutterCommandRunner.runCommand.<anonymous closure> (package:flutter_tools/src/runner/flutter_command_runner.dart:281:9) [ ] <asynchronous suspension> [ ] #6 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) [ ] <asynchronous suspension> [ ] #7 FlutterCommandRunner.runCommand (package:flutter_tools/src/runner/flutter_command_runner.dart:229:5) [ ] <asynchronous suspension> [ ] #8 run.<anonymous closure>.<anonymous closure> (package:flutter_tools/runner.dart:62:9) [ ] <asynchronous suspension> [ ] #9 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) [ ] <asynchronous suspension> [ ] #10 main (package:flutter_tools/executable.dart:94:3) [ ] <asynchronous suspension> [ +1 ms] [ +10 ms] "flutter assemble" took 30,607ms. [ +54 ms] [ +139 ms] ensureAnalyticsSent: 138ms [ +1 ms] [ +1 ms] Running shutdown hooks [ ] [ ] Shutdown hooks complete [ ] [ ] exiting with code 1 [ +72 ms] > Task :app:compileFlutterBuildRelease FAILED [ +1 ms] FAILURE: Build failed with an exception. [ ] * Where: [ ] Script 'D:\flutter\packages\flutter_tools\gradle\flutter.gradle' line: 1102 [ ] * What went wrong: [ ] Execution failed for task ':app:compileFlutterBuildRelease'. [ ] > Process 'command 'D:\flutter\bin\flutter.bat'' finished with non-zero exit value 1 [ ] * Try: [ ] Run with --stacktrace option to get the stack trace. Run with --info or --debug option to get more log output. Run with --scan to get full insights. [ ] * Get more help at https://help.gradle.org [ ] BUILD FAILED in 37s [ +1 ms] Deprecated Gradle features were used in this build, making it incompatible with Gradle 7.0. [ +1 ms] Use '--warning-mode all' to show the individual deprecation warnings. [ ] See https://docs.gradle.org/6.7/userguide/command_line_interface.html#sec:command_line_warnings [ +1 ms] 1 actionable task: 1 executed [ +519 ms] Running Gradle task 'assembleRelease'... (completed in 38.1s) [ +3 ms] "flutter apk" took 38,877ms. [ +5 ms] Gradle task assembleRelease failed with exit code 1 [ +1 ms] #0 throwToolExit (package:flutter_tools/src/base/common.dart:10:3) #1 AndroidGradleBuilder.buildGradleApp (package:flutter_tools/src/android/gradle.dart:400:9) <asynchronous suspension> #2 AndroidGradleBuilder.buildApk (package:flutter_tools/src/android/gradle.dart:179:5) <asynchronous suspension> #3 BuildApkCommand.runCommand (package:flutter_tools/src/commands/build_apk.dart:112:5) <asynchronous suspension> #4 FlutterCommand.run.<anonymous closure> (package:flutter_tools/src/runner/flutter_command.dart:1161:27) <asynchronous suspension> #5 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) <asynchronous suspension> #6 CommandRunner.runCommand (package:args/command_runner.dart:209:13) <asynchronous suspension> #7 FlutterCommandRunner.runCommand.<anonymous closure> (package:flutter_tools/src/runner/flutter_command_runner.dart:281:9) <asynchronous suspension> #8 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) <asynchronous suspension> #9 FlutterCommandRunner.runCommand (package:flutter_tools/src/runner/flutter_command_runner.dart:229:5) <asynchronous suspension> #10 run.<anonymous closure>.<anonymous closure> (package:flutter_tools/runner.dart:62:9) <asynchronous suspension> #11 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) <asynchronous suspension> #12 main (package:flutter_tools/executable.dart:94:3) <asynchronous suspension> [ +140 ms] ensureAnalyticsSent: 133ms [ +1 ms] Running shutdown hooks [ ] Shutdown hooks complete [ +1 ms] exiting with code 1 ``` </details>
1.0
`flutter build apk --analyze-size --target-platform android-arm` fails with `Exception: AOT snapshotter exited with code -2147483645` - When I run `flutter build apk --analyze-size --target-platform android-arm` I get: <pre> <code> Dart snapshot generator failed with exit code -2147483645 FAILURE: Build failed with an exception. * Where: Script 'D:\flutter\packages\flutter_tools\gradle\flutter.gradle' line: 1102 * What went wrong: Execution failed for task ':app:compileFlutterBuildRelease'. > Process 'command 'D:\flutter\bin\flutter.bat'' finished with non-zero exit value 1 * Try: Run with --stacktrace option to get the stack trace. Run with --info or --debug option to get more log output. Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 40s</code> </pre> <details> <summary>flutter doctor -v</summary> ``` [√] Flutter (Channel stable, 2.10.0, on Microsoft Windows [Versión 10.0.22000.434], locale es-MX) • Flutter version 2.10.0 at D:\flutter • Upstream repository https://github.com/flutter/flutter.git • Framework revision 5f105a6ca7 (2 days ago), 2022-02-01 14:15:42 -0800 • Engine revision 776efd2034 • Dart version 2.16.0 • DevTools version 2.9.2 [√] Android toolchain - develop for Android devices (Android SDK version 30.0.3) • Android SDK at D:\Android\SDK • Platform android-31, build-tools 30.0.3 • ANDROID_HOME = D:\Android\SDK • Java binary at: C:\Program Files\Android\Android Studio\jre\bin\java • Java version OpenJDK Runtime Environment (build 11.0.11+9-b60-7590822) • All Android licenses accepted. [√] Chrome - develop for the web • Chrome at C:\Program Files\Google\Chrome\Application\chrome.exe [√] Visual Studio - develop for Windows (Visual Studio Community 2019 16.11.9) • Visual Studio at C:\Program Files (x86)\Microsoft Visual Studio\2019\Community • Visual Studio Community 2019 version 16.11.32106.194 • Windows 10 SDK version 10.0.19041.0 [√] Android Studio (version 2021.1) • Android Studio at C:\Program Files\Android\Android Studio • Flutter plugin can be installed from: https://plugins.jetbrains.com/plugin/9212-flutter • Dart plugin can be installed from: https://plugins.jetbrains.com/plugin/6351-dart • Java version OpenJDK Runtime Environment (build 11.0.11+9-b60-7590822) [√] IntelliJ IDEA Ultimate Edition (version 2021.2) • IntelliJ at C:\Program Files\JetBrains\IntelliJ IDEA 2021.2.1 • Flutter plugin can be installed from: https://plugins.jetbrains.com/plugin/9212-flutter • Dart plugin can be installed from: https://plugins.jetbrains.com/plugin/6351-dart ``` </details> <details> <summary>Logs</summary> `flutter build apk --analyze-size --target-platform android-arm -v` ```console [ +89 ms] executing: [D:\flutter/] git -c log.showSignature=false log -n 1 --pretty=format:%H [ +99 ms] Exit code 0 from: git -c log.showSignature=false log -n 1 --pretty=format:%H [ ] 5f105a6ca7a5ac7b8bc9b241f4c2d86f4188cf5c [ ] executing: [D:\flutter/] git tag --points-at 5f105a6ca7a5ac7b8bc9b241f4c2d86f4188cf5c [ +65 ms] Exit code 0 from: git tag --points-at 5f105a6ca7a5ac7b8bc9b241f4c2d86f4188cf5c [ ] 2.10.0 [ +10 ms] executing: [D:\flutter/] git rev-parse --abbrev-ref --symbolic @{u} [ +51 ms] Exit code 0 from: git rev-parse --abbrev-ref --symbolic @{u} [ ] origin/stable [ ] executing: [D:\flutter/] git ls-remote --get-url origin [ +49 ms] Exit code 0 from: git ls-remote --get-url origin [ ] https://github.com/flutter/flutter.git [ +131 ms] executing: [D:\flutter/] git rev-parse --abbrev-ref HEAD [ +53 ms] Exit code 0 from: git rev-parse --abbrev-ref HEAD [ ] stable [ +86 ms] Artifact Instance of 'AndroidGenSnapshotArtifacts' is not required, skipping update. [ ] Artifact Instance of 'AndroidInternalBuildArtifacts' is not required, skipping update. [ ] Artifact Instance of 'IOSEngineArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'FlutterWebSdk' is not required, skipping update. [ +8 ms] Artifact Instance of 'WindowsEngineArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'WindowsUwpEngineArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'MacOSEngineArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'LinuxEngineArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'LinuxFuchsiaSDKArtifacts' is not required, skipping update. [ ] Artifact Instance of 'MacOSFuchsiaSDKArtifacts' is not required, skipping update. [ ] Artifact Instance of 'FlutterRunnerSDKArtifacts' is not required, skipping update. [ ] Artifact Instance of 'FlutterRunnerDebugSymbols' is not required, skipping update. [ +75 ms] Artifact Instance of 'MaterialFonts' is not required, skipping update. [ ] Artifact Instance of 'GradleWrapper' is not required, skipping update. [ +4 ms] Artifact Instance of 'AndroidInternalBuildArtifacts' is not required, skipping update. [ ] Artifact Instance of 'IOSEngineArtifacts' is not required, skipping update. [ ] Artifact Instance of 'FlutterWebSdk' is not required, skipping update. [ ] Artifact Instance of 'FlutterSdk' is not required, skipping update. [ ] Artifact Instance of 'WindowsEngineArtifacts' is not required, skipping update. [ ] Artifact Instance of 'WindowsUwpEngineArtifacts' is not required, skipping update. [ ] Artifact Instance of 'MacOSEngineArtifacts' is not required, skipping update. [ ] Artifact Instance of 'LinuxEngineArtifacts' is not required, skipping update. [ ] Artifact Instance of 'LinuxFuchsiaSDKArtifacts' is not required, skipping update. [ ] Artifact Instance of 'MacOSFuchsiaSDKArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'FlutterRunnerSDKArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'FlutterRunnerDebugSymbols' is not required, skipping update. [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ +1 ms] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ +3 ms] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] Artifact Instance of 'FontSubsetArtifacts' is not required, skipping update. [ ] Artifact Instance of 'PubDependencies' is not required, skipping update. [ +118 ms] Skipping pub get: version match. [ +54 ms] Found plugin firebase_auth at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_auth-3.3.6\ [ +9 ms] Found plugin firebase_auth_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_auth_web-3.3.7\ [ +2 ms] Found plugin firebase_core at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_core-1.12.0\ [ +3 ms] Found plugin firebase_core_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_core_web-1.5.4\ [ +7 ms] Found plugin flutter_secure_storage at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage-5.0.2\ [ +4 ms] Found plugin flutter_secure_storage_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_linux-1.1.0\ [ +3 ms] Found plugin flutter_secure_storage_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_macos-1.1.0\ [ +3 ms] Found plugin flutter_secure_storage_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_web-1.0.2\ [ +3 ms] Found plugin flutter_secure_storage_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_windows-1.1.2\ [ +24 ms] Found plugin path_provider at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider-2.0.8\ [ +3 ms] Found plugin path_provider_android at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_android-2.0.11\ [ +3 ms] Found plugin path_provider_ios at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_ios-2.0.7\ [ +3 ms] Found plugin path_provider_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_linux-2.1.5\ [ +1 ms] Found plugin path_provider_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_macos-2.0.5\ [ +2 ms] Found plugin path_provider_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_windows-2.0.5\ [ +9 ms] Found plugin sqflite at D:\flutter\.pub-cache\hosted\pub.dartlang.org\sqflite-2.0.2\ [ +12 ms] Found plugin url_launcher at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher-6.0.18\ [ +2 ms] Found plugin url_launcher_android at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_android-6.0.14\ [ +2 ms] Found plugin url_launcher_ios at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_ios-6.0.14\ [ +2 ms] Found plugin url_launcher_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_linux-2.0.3\ [ +3 ms] Found plugin url_launcher_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_macos-2.0.3\ [ +2 ms] Found plugin url_launcher_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_web-2.0.6\ [ +2 ms] Found plugin url_launcher_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_windows-2.0.2\ [ +101 ms] Found plugin firebase_auth at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_auth-3.3.6\ [ +2 ms] Found plugin firebase_auth_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_auth_web-3.3.7\ [ +1 ms] Found plugin firebase_core at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_core-1.12.0\ [ +2 ms] Found plugin firebase_core_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_core_web-1.5.4\ [ +6 ms] Found plugin flutter_secure_storage at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage-5.0.2\ [ +4 ms] Found plugin flutter_secure_storage_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_linux-1.1.0\ [ +1 ms] Found plugin flutter_secure_storage_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_macos-1.1.0\ [ +3 ms] Found plugin flutter_secure_storage_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_web-1.0.2\ [ +3 ms] Found plugin flutter_secure_storage_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_windows-1.1.2\ [ +13 ms] Found plugin path_provider at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider-2.0.8\ [ +3 ms] Found plugin path_provider_android at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_android-2.0.11\ [ +1 ms] Found plugin path_provider_ios at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_ios-2.0.7\ [ +1 ms] Found plugin path_provider_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_linux-2.1.5\ [ +3 ms] Found plugin path_provider_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_macos-2.0.5\ [ +2 ms] Found plugin path_provider_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_windows-2.0.5\ [ +9 ms] Found plugin sqflite at D:\flutter\.pub-cache\hosted\pub.dartlang.org\sqflite-2.0.2\ [ +14 ms] Found plugin url_launcher at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher-6.0.18\ [ +1 ms] Found plugin url_launcher_android at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_android-6.0.14\ [ +1 ms] Found plugin url_launcher_ios at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_ios-6.0.14\ [ +3 ms] Found plugin url_launcher_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_linux-2.0.3\ [ +1 ms] Found plugin url_launcher_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_macos-2.0.3\ [ +3 ms] Found plugin url_launcher_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_web-2.0.6\ [ +2 ms] Found plugin url_launcher_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_windows-2.0.2\ [ +23 ms] Generating D:\hackv\Documents\Flutter\mujeres_app\android\app\src\main\java\io\flutter\plugins\GeneratedPluginRegistrant.java [ +101 ms] Building with sound null safety [ +22 ms] Running Gradle task 'assembleRelease'... [ +7 ms] Using gradle from D:\hackv\Documents\Flutter\mujeres_app\android\gradlew.bat. [ +6 ms] Building with Flutter multidex support enabled. [ +8 ms] executing: C:\Program Files\Android\Android Studio\jre\bin\java -version [ +152 ms] Exit code 0 from: C:\Program Files\Android\Android Studio\jre\bin\java -version [ +1 ms] openjdk version "11.0.11" 2021-04-20 OpenJDK Runtime Environment (build 11.0.11+9-b60-7590822) OpenJDK 64-Bit Server VM (build 11.0.11+9-b60-7590822, mixed mode) [ +2 ms] executing: [D:\hackv\Documents\Flutter\mujeres_app\android/] D:\hackv\Documents\Flutter\mujeres_app\android\gradlew.bat -Pverbose=true -Ptarget-platform=android-arm -Ptarget=lib\main.dart -Pmultidex-enabled=true -Pbase-application-name=android.app.Application -Pdart-obfuscation=false -Ptrack-widget-creation=true -Ptree-shake-icons=true -Pcode-size-directory=build\flutter_size_12 assembleRelease [+4929 ms] > Configure project :firebase_auth [ +1 ms] WARNING: The option setting 'android.enableR8=true' is deprecated. [ +1 ms] It will be removed in version 5.0 of the Android Gradle plugin. [ ] You will no longer be able to disable R8 [+2382 ms] > Task :app:compileFlutterBuildRelease [ +1 ms] [ +72 ms] executing: [D:\flutter/] git -c log.showSignature=false log -n 1 --pretty=format:%H [ +1 ms] [ +90 ms] Exit code 0 from: git -c log.showSignature=false log -n 1 --pretty=format:%H [ ] [ ] 5f105a6ca7a5ac7b8bc9b241f4c2d86f4188cf5c [ ] [ ] executing: [D:\flutter/] git tag --points-at 5f105a6ca7a5ac7b8bc9b241f4c2d86f4188cf5c [ ] [ +66 ms] Exit code 0 from: git tag --points-at 5f105a6ca7a5ac7b8bc9b241f4c2d86f4188cf5c [ ] [ ] 2.10.0 [ +1 ms] [ +8 ms] executing: [D:\flutter/] git rev-parse --abbrev-ref --symbolic @{u} [ +1 ms] [ +50 ms] Exit code 0 from: git rev-parse --abbrev-ref --symbolic @{u} [ ] [ ] origin/stable [ +1 ms] [ ] executing: [D:\flutter/] git ls-remote --get-url origin [ ] [ +46 ms] Exit code 0 from: git ls-remote --get-url origin [ ] [ ] https://github.com/flutter/flutter.git [ ] [ +52 ms] executing: [D:\flutter/] git rev-parse --abbrev-ref HEAD [ ] [ +55 ms] Exit code 0 from: git rev-parse --abbrev-ref HEAD [ ] [ ] stable [ ] [ +60 ms] Artifact Instance of 'AndroidGenSnapshotArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'AndroidInternalBuildArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'IOSEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterWebSdk' is not required, skipping update. [ ] [ +3 ms] Artifact Instance of 'WindowsEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'WindowsUwpEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'MacOSEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'LinuxEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'LinuxFuchsiaSDKArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'MacOSFuchsiaSDKArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterRunnerSDKArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterRunnerDebugSymbols' is not required, skipping update. [ ] [ +96 ms] Artifact Instance of 'MaterialFonts' is not required, skipping update. [ +1 ms] [ ] Artifact Instance of 'GradleWrapper' is not required, skipping update. [ ] [ +4 ms] Artifact Instance of 'AndroidInternalBuildArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'IOSEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterWebSdk' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterSdk' is not required, skipping update. [ ] [ ] Artifact Instance of 'WindowsEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'WindowsUwpEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'MacOSEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'LinuxEngineArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'LinuxFuchsiaSDKArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'MacOSFuchsiaSDKArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterRunnerSDKArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FlutterRunnerDebugSymbols' is not required, skipping update. [ ] [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ +1 ms] [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'IosUsbArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'FontSubsetArtifacts' is not required, skipping update. [ ] [ ] Artifact Instance of 'PubDependencies' is not required, skipping update. [ ] [ +85 ms] Initializing file store [ +1 ms] [ +26 ms] Skipping target: gen_localizations [ ] [ +15 ms] gen_dart_plugin_registrant: Starting due to {InvalidatedReasonKind.inputChanged: The following inputs have updated contents: D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\package_config_subset} [ +1 ms] [ +43 ms] Found plugin firebase_auth at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_auth-3.3.6\ [ ] [ +5 ms] Found plugin firebase_auth_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_auth_web-3.3.7\ [ ] [ +1 ms] Found plugin firebase_core at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_core-1.12.0\ [ ] [ +2 ms] Found plugin firebase_core_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\firebase_core_web-1.5.4\ [ +1 ms] [ +5 ms] Found plugin flutter_secure_storage at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage-5.0.2\ [ +1 ms] [ +1 ms] Found plugin flutter_secure_storage_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_linux-1.1.0\ [ +1 ms] [ +2 ms] Found plugin flutter_secure_storage_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_macos-1.1.0\ [ ] [ +2 ms] Found plugin flutter_secure_storage_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_web-1.0.2\ [ +1 ms] [ +1 ms] Found plugin flutter_secure_storage_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\flutter_secure_storage_windows-1.1.2\ [ ] [ +14 ms] Found plugin path_provider at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider-2.0.8\ [ ] [ +1 ms] Found plugin path_provider_android at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_android-2.0.11\ [ +1 ms] [ +1 ms] Found plugin path_provider_ios at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_ios-2.0.7\ [ ] [ +1 ms] Found plugin path_provider_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_linux-2.1.5\ [ +1 ms] [ +1 ms] Found plugin path_provider_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_macos-2.0.5\ [ +1 ms] [ +2 ms] Found plugin path_provider_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\path_provider_windows-2.0.5\ [ ] [ +6 ms] Found plugin sqflite at D:\flutter\.pub-cache\hosted\pub.dartlang.org\sqflite-2.0.2\ [ +1 ms] [ +7 ms] Found plugin url_launcher at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher-6.0.18\ [ ] [ +1 ms] Found plugin url_launcher_android at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_android-6.0.14\ [ ] [ ] Found plugin url_launcher_ios at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_ios-6.0.14\ [ ] [ +1 ms] Found plugin url_launcher_linux at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_linux-2.0.3\ [ ] [ ] Found plugin url_launcher_macos at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_macos-2.0.3\ [ ] [ +1 ms] Found plugin url_launcher_web at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_web-2.0.6\ [ ] [ ] Found plugin url_launcher_windows at D:\flutter\.pub-cache\hosted\pub.dartlang.org\url_launcher_windows-2.0.2\ [ +1 ms] [ +23 ms] gen_dart_plugin_registrant: Complete [ ] [ +3 ms] kernel_snapshot: Starting due to {} [ ] [ +14 ms] D:\flutter\bin\cache\dart-sdk\bin\dart.exe --disable-dart-dev D:\flutter\bin\cache\artifacts\engine\windows-x64\frontend_server.dart.snapshot --sdk-root D:\flutter\bin\cache\artifacts\engine\common\flutter_patched_sdk_product/ --target=flutter --no-print-incremental-dependencies -Ddart.vm.profile=false -Ddart.vm.product=true --aot --tfa --packages D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\package_config.json --output-dill D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\flutter_build\8ad1451e94816d1bbf60843428c2999a\app.dill --depfile D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\flutter_build\8ad1451e94816d1bbf60843428c2999a\kernel_snapshot.d D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\flutter_build\generated_main.dart [+18738 ms] [+19081 ms] kernel_snapshot: Complete [ +886 ms] [ +916 ms] android_aot_release_android-arm: Starting due to {} [ +1 ms] [ +4 ms] Extra gen_snapshot options: [--write-v8-snapshot-profile-to=build\flutter_size_12\snapshot.armeabi-v7a.json, --trace-precompiler-to=build\flutter_size_12\trace.armeabi-v7a.json] [ +1 ms] [ +1 ms] executing: D:\flutter\bin\cache\artifacts\engine\android-arm-release\windows-x64\gen_snapshot --deterministic --write-v8-snapshot-profile-to=build\flutter_size_12\snapshot.armeabi-v7a.json --trace-precompiler-to=build\flutter_size_12\trace.armeabi-v7a.json --snapshot_kind=app-aot-elf --elf=D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\flutter_build\8ad1451e94816d1bbf60843428c2999a\armeabi-v7a\app.so --strip --no-sim-use-hardfp --no-use-integer-division D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\flutter_build\8ad1451e94816d1bbf60843428c2999a\app.dill [ +2 ms] [ ] aot_android_asset_bundle: Starting due to {} [ +105 ms] [ +164 ms] Running command: D:\flutter\bin\cache\dart-sdk\bin\dart.exe --disable-dart-dev D:\flutter\bin\cache\artifacts\engine\windows-x64\const_finder.dart.snapshot --kernel-file D:\hackv\Documents\Flutter\mujeres_app\.dart_tool\flutter_build\8ad1451e94816d1bbf60843428c2999a\app.dill --class-library-uri package:flutter/src/widgets/icon_data.dart --class-name IconData [ +894 ms] [ +893 ms] Running font-subset: D:\flutter\bin\cache\artifacts\engine\windows-x64\font-subset.exe D:\hackv\Documents\Flutter\mujeres_app\build\app\intermediates\flutter\release\flutter_assets\fonts/MaterialIcons-Regular.otf D:\flutter\bin\cache\artifacts\material_fonts\MaterialIcons-Regular.otf, using codepoints 58332 57490 57491 57706 58727 58372 [ +1 ms] [ +16 ms] aot_android_asset_bundle: Complete [+9108 ms] [+9087 ms] Dart snapshot generator failed with exit code -2147483645 [ +3 ms] [ +3 ms] Persisting file store [ +1 ms] [ +13 ms] Done persisting file store [ +88 ms] [ +11 ms] Target android_aot_release_android-arm failed: Exception: AOT snapshotter exited with code -2147483645 [ +1 ms] #0 AndroidAot.build (package:flutter_tools/src/build_system/targets/android.dart:257:7) [ +1 ms] <asynchronous suspension> [ ] #1 _BuildInstance._invokeInternal (package:flutter_tools/src/build_system/build_system.dart:839:9) [ ] <asynchronous suspension> [ ] #2 Future.wait.<anonymous closure> (dart:async/future.dart:473:21) [ ] <asynchronous suspension> [ ] #3 _BuildInstance.invokeTarget (package:flutter_tools/src/build_system/build_system.dart:777:32) [ ] <asynchronous suspension> [ ] #4 FlutterBuildSystem.build (package:flutter_tools/src/build_system/build_system.dart:606:16) [ ] <asynchronous suspension> [ ] #5 AssembleCommand.runCommand (package:flutter_tools/src/commands/assemble.dart:317:32) [ ] <asynchronous suspension> [ ] #6 FlutterCommand.run.<anonymous closure> (package:flutter_tools/src/runner/flutter_command.dart:1161:27) [ ] <asynchronous suspension> [ ] #7 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) [ ] <asynchronous suspension> [ +1 ms] #8 CommandRunner.runCommand (package:args/command_runner.dart:209:13) [ ] <asynchronous suspension> [ ] #9 FlutterCommandRunner.runCommand.<anonymous closure> (package:flutter_tools/src/runner/flutter_command_runner.dart:281:9) [ ] <asynchronous suspension> [ +1 ms] #10 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) [ ] <asynchronous suspension> [ ] #11 FlutterCommandRunner.runCommand (package:flutter_tools/src/runner/flutter_command_runner.dart:229:5) [ ] <asynchronous suspension> [ ] #12 run.<anonymous closure>.<anonymous closure> (package:flutter_tools/runner.dart:62:9) [ ] <asynchronous suspension> [ ] #13 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) [ ] <asynchronous suspension> [ +1 ms] #14 main (package:flutter_tools/executable.dart:94:3) [ +1 ms] <asynchronous suspension> [ +1 ms] [ +4 ms] [ ] #0 throwToolExit (package:flutter_tools/src/base/common.dart:10:3) [ ] #1 AssembleCommand.runCommand (package:flutter_tools/src/commands/assemble.dart:334:7) [ ] <asynchronous suspension> [ ] #2 FlutterCommand.run.<anonymous closure> (package:flutter_tools/src/runner/flutter_command.dart:1161:27) [ ] <asynchronous suspension> [ ] #3 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) [ ] <asynchronous suspension> [ ] #4 CommandRunner.runCommand (package:args/command_runner.dart:209:13) [ ] <asynchronous suspension> [ ] #5 FlutterCommandRunner.runCommand.<anonymous closure> (package:flutter_tools/src/runner/flutter_command_runner.dart:281:9) [ ] <asynchronous suspension> [ ] #6 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) [ ] <asynchronous suspension> [ ] #7 FlutterCommandRunner.runCommand (package:flutter_tools/src/runner/flutter_command_runner.dart:229:5) [ ] <asynchronous suspension> [ ] #8 run.<anonymous closure>.<anonymous closure> (package:flutter_tools/runner.dart:62:9) [ ] <asynchronous suspension> [ ] #9 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) [ ] <asynchronous suspension> [ ] #10 main (package:flutter_tools/executable.dart:94:3) [ ] <asynchronous suspension> [ +1 ms] [ +10 ms] "flutter assemble" took 30,607ms. [ +54 ms] [ +139 ms] ensureAnalyticsSent: 138ms [ +1 ms] [ +1 ms] Running shutdown hooks [ ] [ ] Shutdown hooks complete [ ] [ ] exiting with code 1 [ +72 ms] > Task :app:compileFlutterBuildRelease FAILED [ +1 ms] FAILURE: Build failed with an exception. [ ] * Where: [ ] Script 'D:\flutter\packages\flutter_tools\gradle\flutter.gradle' line: 1102 [ ] * What went wrong: [ ] Execution failed for task ':app:compileFlutterBuildRelease'. [ ] > Process 'command 'D:\flutter\bin\flutter.bat'' finished with non-zero exit value 1 [ ] * Try: [ ] Run with --stacktrace option to get the stack trace. Run with --info or --debug option to get more log output. Run with --scan to get full insights. [ ] * Get more help at https://help.gradle.org [ ] BUILD FAILED in 37s [ +1 ms] Deprecated Gradle features were used in this build, making it incompatible with Gradle 7.0. [ +1 ms] Use '--warning-mode all' to show the individual deprecation warnings. [ ] See https://docs.gradle.org/6.7/userguide/command_line_interface.html#sec:command_line_warnings [ +1 ms] 1 actionable task: 1 executed [ +519 ms] Running Gradle task 'assembleRelease'... (completed in 38.1s) [ +3 ms] "flutter apk" took 38,877ms. [ +5 ms] Gradle task assembleRelease failed with exit code 1 [ +1 ms] #0 throwToolExit (package:flutter_tools/src/base/common.dart:10:3) #1 AndroidGradleBuilder.buildGradleApp (package:flutter_tools/src/android/gradle.dart:400:9) <asynchronous suspension> #2 AndroidGradleBuilder.buildApk (package:flutter_tools/src/android/gradle.dart:179:5) <asynchronous suspension> #3 BuildApkCommand.runCommand (package:flutter_tools/src/commands/build_apk.dart:112:5) <asynchronous suspension> #4 FlutterCommand.run.<anonymous closure> (package:flutter_tools/src/runner/flutter_command.dart:1161:27) <asynchronous suspension> #5 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) <asynchronous suspension> #6 CommandRunner.runCommand (package:args/command_runner.dart:209:13) <asynchronous suspension> #7 FlutterCommandRunner.runCommand.<anonymous closure> (package:flutter_tools/src/runner/flutter_command_runner.dart:281:9) <asynchronous suspension> #8 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) <asynchronous suspension> #9 FlutterCommandRunner.runCommand (package:flutter_tools/src/runner/flutter_command_runner.dart:229:5) <asynchronous suspension> #10 run.<anonymous closure>.<anonymous closure> (package:flutter_tools/runner.dart:62:9) <asynchronous suspension> #11 AppContext.run.<anonymous closure> (package:flutter_tools/src/base/context.dart:150:19) <asynchronous suspension> #12 main (package:flutter_tools/executable.dart:94:3) <asynchronous suspension> [ +140 ms] ensureAnalyticsSent: 133ms [ +1 ms] Running shutdown hooks [ ] Shutdown hooks complete [ +1 ms] exiting with code 1 ``` </details>
non_priority
flutter build apk analyze size target platform android arm fails with exception aot snapshotter exited with code when i run flutter build apk analyze size target platform android arm i get dart snapshot generator failed with exit code failure build failed with an exception where script d flutter packages flutter tools gradle flutter gradle line what went wrong execution failed for task app compileflutterbuildrelease process command d flutter bin flutter bat finished with non zero exit value try run with stacktrace option to get the stack trace run with info or debug option to get more log output run with scan to get full insights get more help at build failed in flutter doctor v flutter channel stable on microsoft windows locale es mx • flutter version at d flutter • upstream repository • framework revision days ago • engine revision • dart version • devtools version android toolchain develop for android devices android sdk version • android sdk at d android sdk • platform android build tools • android home d android sdk • java binary at c program files android android studio jre bin java • java version openjdk runtime environment build • all android licenses accepted chrome develop for the web • chrome at c program files google chrome application chrome exe visual studio develop for windows visual studio community • visual studio at c program files microsoft visual studio community • visual studio community version • windows sdk version android studio version • android studio at c program files android android studio • flutter plugin can be installed from • dart plugin can be installed from • java version openjdk runtime environment build intellij idea ultimate edition version • intellij at c program files jetbrains intellij idea • flutter plugin can be installed from • dart plugin can be installed from logs flutter build apk analyze size target platform android arm v console executing git c log showsignature false log n pretty format h exit code from git c log showsignature false log n pretty format h executing git tag points at exit code from git tag points at executing git rev parse abbrev ref symbolic u exit code from git rev parse abbrev ref symbolic u origin stable executing git ls remote get url origin exit code from git ls remote get url origin executing git rev parse abbrev ref head exit code from git rev parse abbrev ref head stable artifact instance of androidgensnapshotartifacts is not required skipping update artifact instance of androidinternalbuildartifacts is not required skipping update artifact instance of iosengineartifacts is not required skipping update artifact instance of flutterwebsdk is not required skipping update artifact instance of windowsengineartifacts is not required skipping update artifact instance of windowsuwpengineartifacts is not required skipping update artifact instance of macosengineartifacts is not required skipping update artifact instance of linuxengineartifacts is not required skipping update artifact instance of linuxfuchsiasdkartifacts is not required skipping update artifact instance of macosfuchsiasdkartifacts is not required skipping update artifact instance of flutterrunnersdkartifacts is not required skipping update artifact instance of flutterrunnerdebugsymbols is not required skipping update artifact instance of materialfonts is not required skipping update artifact instance of gradlewrapper is not required skipping update artifact instance of androidinternalbuildartifacts is not required skipping update artifact instance of iosengineartifacts is not required skipping update artifact instance of flutterwebsdk is not required skipping update artifact instance of fluttersdk is not required skipping update artifact instance of windowsengineartifacts is not required skipping update artifact instance of windowsuwpengineartifacts is not required skipping update artifact instance of macosengineartifacts is not required skipping update artifact instance of linuxengineartifacts is not required skipping update artifact instance of linuxfuchsiasdkartifacts is not required skipping update artifact instance of macosfuchsiasdkartifacts is not required skipping update artifact instance of flutterrunnersdkartifacts is not required skipping update artifact instance of flutterrunnerdebugsymbols is not required skipping update artifact instance of iosusbartifacts is not required skipping update artifact instance of iosusbartifacts is not required skipping update artifact instance of iosusbartifacts is not required skipping update artifact instance of iosusbartifacts is not required skipping update artifact instance of iosusbartifacts is not required skipping update artifact instance of fontsubsetartifacts is not required skipping update artifact instance of pubdependencies is not required skipping update skipping pub get version match found plugin firebase auth at d flutter pub cache hosted pub dartlang org firebase auth found plugin firebase auth web at d flutter pub cache hosted pub dartlang org firebase auth web found plugin firebase core at d flutter pub cache hosted pub dartlang org firebase core found plugin firebase core web at d flutter pub cache hosted pub dartlang org firebase core web found plugin flutter secure storage at d flutter pub cache hosted pub dartlang org flutter secure storage found plugin flutter secure storage linux at d flutter pub cache hosted pub dartlang org flutter secure storage linux found plugin flutter secure storage macos at d flutter pub cache hosted pub dartlang org flutter secure storage macos found plugin flutter secure storage web at d flutter pub cache hosted pub dartlang org flutter secure storage web found plugin flutter secure storage windows at d flutter pub cache hosted pub dartlang org flutter secure storage windows found plugin path provider at d flutter pub cache hosted pub dartlang org path provider found plugin path provider android at d flutter pub cache hosted pub dartlang org path provider android found plugin path provider ios at d flutter pub cache hosted pub dartlang org path provider ios found plugin path provider linux at d flutter pub cache hosted pub dartlang org path provider linux found plugin path provider macos at d flutter pub cache hosted pub dartlang org path provider macos found plugin path provider windows at d flutter pub cache hosted pub dartlang org path provider windows found plugin sqflite at d flutter pub cache hosted pub dartlang org sqflite found plugin url launcher at d flutter pub cache hosted pub dartlang org url launcher found plugin url launcher android at d flutter pub cache hosted pub dartlang org url launcher android found plugin url launcher ios at d flutter pub cache hosted pub dartlang org url launcher ios found plugin url launcher linux at d flutter pub cache hosted pub dartlang org url launcher linux found plugin url launcher macos at d flutter pub cache hosted pub dartlang org url launcher macos found plugin url launcher web at d flutter pub cache hosted pub dartlang org url launcher web found plugin url launcher windows at d flutter pub cache hosted pub dartlang org url launcher windows found plugin firebase auth at d flutter pub cache hosted pub dartlang org firebase auth found plugin firebase auth web at d flutter pub cache hosted pub dartlang org firebase auth web found plugin firebase core at d flutter pub cache hosted pub dartlang org firebase core found plugin firebase core web at d flutter pub cache hosted pub dartlang org firebase core web found plugin flutter secure storage at d flutter pub cache hosted pub dartlang org flutter secure storage found plugin flutter secure storage linux at d flutter pub cache hosted pub dartlang org flutter secure storage linux found plugin flutter secure storage macos at d flutter pub cache hosted pub dartlang org flutter secure storage macos found plugin flutter secure storage web at d flutter pub cache hosted pub dartlang org flutter secure storage web found plugin flutter secure storage windows at d flutter pub cache hosted pub dartlang org flutter secure storage windows found plugin path provider at d flutter pub cache hosted pub dartlang org path provider found plugin path provider android at d flutter pub cache hosted pub dartlang org path provider android found plugin path provider ios at d flutter pub cache hosted pub dartlang org path provider ios found plugin path provider linux at d flutter pub cache hosted pub dartlang org path provider linux found plugin path provider macos at d flutter pub cache hosted pub dartlang org path provider macos found plugin path provider windows at d flutter pub cache hosted pub dartlang org path provider windows found plugin sqflite at d flutter pub cache hosted pub dartlang org sqflite found plugin url launcher at d flutter pub cache hosted pub dartlang org url launcher found plugin url launcher android at d flutter pub cache hosted pub dartlang org url launcher android found plugin url launcher ios at d flutter pub cache hosted pub dartlang org url launcher ios found plugin url launcher linux at d flutter pub cache hosted pub dartlang org url launcher linux found plugin url launcher macos at d flutter pub cache hosted pub dartlang org url launcher macos found plugin url launcher web at d flutter pub cache hosted pub dartlang org url launcher web found plugin url launcher windows at d flutter pub cache hosted pub dartlang org url launcher windows generating d hackv documents flutter mujeres app android app src main java io flutter plugins generatedpluginregistrant java building with sound null safety running gradle task assemblerelease using gradle from d hackv documents flutter mujeres app android gradlew bat building with flutter multidex support enabled executing c program files android android studio jre bin java version exit code from c program files android android studio jre bin java version openjdk version openjdk runtime environment build openjdk bit server vm build mixed mode executing d hackv documents flutter mujeres app android gradlew bat pverbose true ptarget platform android arm ptarget lib main dart pmultidex enabled true pbase application name android app application pdart obfuscation false ptrack widget creation true ptree shake icons true pcode size directory build flutter size assemblerelease configure project firebase auth warning the option setting android true is deprecated it will be removed in version of the android gradle plugin you will no longer be able to disable task app compileflutterbuildrelease executing git c log showsignature false log n pretty format h exit code from git c log showsignature false log n pretty format h executing git tag points at exit code from git tag points at executing git rev parse abbrev ref symbolic u exit code from git rev parse abbrev ref symbolic u origin stable executing git ls remote get url origin exit code from git ls remote get url origin executing git rev parse abbrev ref head exit code from git rev parse abbrev ref head stable artifact instance of androidgensnapshotartifacts is not required skipping update artifact instance of androidinternalbuildartifacts is not required skipping update artifact instance of iosengineartifacts is not required skipping update artifact instance of flutterwebsdk is not required skipping update artifact instance of windowsengineartifacts is not required skipping update artifact instance of windowsuwpengineartifacts is not required skipping update artifact instance of macosengineartifacts is not required skipping update artifact instance of linuxengineartifacts is not required skipping update artifact instance of linuxfuchsiasdkartifacts is not required skipping update artifact instance of macosfuchsiasdkartifacts is not required skipping update artifact instance of flutterrunnersdkartifacts is not required skipping update artifact instance of flutterrunnerdebugsymbols is not required skipping update artifact instance of materialfonts is not required skipping update artifact instance of gradlewrapper is not required skipping update artifact instance of androidinternalbuildartifacts is not required skipping update artifact instance of iosengineartifacts is not required skipping update artifact instance of flutterwebsdk is not required skipping update artifact instance of fluttersdk is not required skipping update artifact instance of windowsengineartifacts is not required skipping update artifact instance of windowsuwpengineartifacts is not required skipping update artifact instance of macosengineartifacts is not required skipping update artifact instance of linuxengineartifacts is not required skipping update artifact instance of linuxfuchsiasdkartifacts is not required skipping update artifact instance of macosfuchsiasdkartifacts is not required skipping update artifact instance of flutterrunnersdkartifacts is not required skipping update artifact instance of flutterrunnerdebugsymbols is not required skipping update artifact instance of iosusbartifacts is not required skipping update artifact instance of iosusbartifacts is not required skipping update artifact instance of iosusbartifacts is not required skipping update artifact instance of iosusbartifacts is not required skipping update artifact instance of iosusbartifacts is not required skipping update artifact instance of fontsubsetartifacts is not required skipping update artifact instance of pubdependencies is not required skipping update initializing file store skipping target gen localizations gen dart plugin registrant starting due to invalidatedreasonkind inputchanged the following inputs have updated contents d hackv documents flutter mujeres app dart tool package config subset found plugin firebase auth at d flutter pub cache hosted pub dartlang org firebase auth found plugin firebase auth web at d flutter pub cache hosted pub dartlang org firebase auth web found plugin firebase core at d flutter pub cache hosted pub dartlang org firebase core found plugin firebase core web at d flutter pub cache hosted pub dartlang org firebase core web found plugin flutter secure storage at d flutter pub cache hosted pub dartlang org flutter secure storage found plugin flutter secure storage linux at d flutter pub cache hosted pub dartlang org flutter secure storage linux found plugin flutter secure storage macos at d flutter pub cache hosted pub dartlang org flutter secure storage macos found plugin flutter secure storage web at d flutter pub cache hosted pub dartlang org flutter secure storage web found plugin flutter secure storage windows at d flutter pub cache hosted pub dartlang org flutter secure storage windows found plugin path provider at d flutter pub cache hosted pub dartlang org path provider found plugin path provider android at d flutter pub cache hosted pub dartlang org path provider android found plugin path provider ios at d flutter pub cache hosted pub dartlang org path provider ios found plugin path provider linux at d flutter pub cache hosted pub dartlang org path provider linux found plugin path provider macos at d flutter pub cache hosted pub dartlang org path provider macos found plugin path provider windows at d flutter pub cache hosted pub dartlang org path provider windows found plugin sqflite at d flutter pub cache hosted pub dartlang org sqflite found plugin url launcher at d flutter pub cache hosted pub dartlang org url launcher found plugin url launcher android at d flutter pub cache hosted pub dartlang org url launcher android found plugin url launcher ios at d flutter pub cache hosted pub dartlang org url launcher ios found plugin url launcher linux at d flutter pub cache hosted pub dartlang org url launcher linux found plugin url launcher macos at d flutter pub cache hosted pub dartlang org url launcher macos found plugin url launcher web at d flutter pub cache hosted pub dartlang org url launcher web found plugin url launcher windows at d flutter pub cache hosted pub dartlang org url launcher windows gen dart plugin registrant complete kernel snapshot starting due to d flutter bin cache dart sdk bin dart exe disable dart dev d flutter bin cache artifacts engine windows frontend server dart snapshot sdk root d flutter bin cache artifacts engine common flutter patched sdk product target flutter no print incremental dependencies ddart vm profile false ddart vm product true aot tfa packages d hackv documents flutter mujeres app dart tool package config json output dill d hackv documents flutter mujeres app dart tool flutter build app dill depfile d hackv documents flutter mujeres app dart tool flutter build kernel snapshot d d hackv documents flutter mujeres app dart tool flutter build generated main dart kernel snapshot complete android aot release android arm starting due to extra gen snapshot options executing d flutter bin cache artifacts engine android arm release windows gen snapshot deterministic write snapshot profile to build flutter size snapshot armeabi json trace precompiler to build flutter size trace armeabi json snapshot kind app aot elf elf d hackv documents flutter mujeres app dart tool flutter build armeabi app so strip no sim use hardfp no use integer division d hackv documents flutter mujeres app dart tool flutter build app dill aot android asset bundle starting due to running command d flutter bin cache dart sdk bin dart exe disable dart dev d flutter bin cache artifacts engine windows const finder dart snapshot kernel file d hackv documents flutter mujeres app dart tool flutter build app dill class library uri package flutter src widgets icon data dart class name icondata running font subset d flutter bin cache artifacts engine windows font subset exe d hackv documents flutter mujeres app build app intermediates flutter release flutter assets fonts materialicons regular otf d flutter bin cache artifacts material fonts materialicons regular otf using codepoints aot android asset bundle complete dart snapshot generator failed with exit code persisting file store done persisting file store target android aot release android arm failed exception aot snapshotter exited with code androidaot build package flutter tools src build system targets android dart buildinstance invokeinternal package flutter tools src build system build system dart future wait dart async future dart buildinstance invoketarget package flutter tools src build system build system dart flutterbuildsystem build package flutter tools src build system build system dart assemblecommand runcommand package flutter tools src commands assemble dart fluttercommand run package flutter tools src runner flutter command dart appcontext run package flutter tools src base context dart commandrunner runcommand package args command runner dart fluttercommandrunner runcommand package flutter tools src runner flutter command runner dart appcontext run package flutter tools src base context dart fluttercommandrunner runcommand package flutter tools src runner flutter command runner dart run package flutter tools runner dart appcontext run package flutter tools src base context dart main package flutter tools executable dart throwtoolexit package flutter tools src base common dart assemblecommand runcommand package flutter tools src commands assemble dart fluttercommand run package flutter tools src runner flutter command dart appcontext run package flutter tools src base context dart commandrunner runcommand package args command runner dart fluttercommandrunner runcommand package flutter tools src runner flutter command runner dart appcontext run package flutter tools src base context dart fluttercommandrunner runcommand package flutter tools src runner flutter command runner dart run package flutter tools runner dart appcontext run package flutter tools src base context dart main package flutter tools executable dart flutter assemble took ensureanalyticssent running shutdown hooks shutdown hooks complete exiting with code task app compileflutterbuildrelease failed failure build failed with an exception where script d flutter packages flutter tools gradle flutter gradle line what went wrong execution failed for task app compileflutterbuildrelease process command d flutter bin flutter bat finished with non zero exit value try run with stacktrace option to get the stack trace run with info or debug option to get more log output run with scan to get full insights get more help at build failed in deprecated gradle features were used in this build making it incompatible with gradle use warning mode all to show the individual deprecation warnings see actionable task executed running gradle task assemblerelease completed in flutter apk took gradle task assemblerelease failed with exit code throwtoolexit package flutter tools src base common dart androidgradlebuilder buildgradleapp package flutter tools src android gradle dart androidgradlebuilder buildapk package flutter tools src android gradle dart buildapkcommand runcommand package flutter tools src commands build apk dart fluttercommand run package flutter tools src runner flutter command dart appcontext run package flutter tools src base context dart commandrunner runcommand package args command runner dart fluttercommandrunner runcommand package flutter tools src runner flutter command runner dart appcontext run package flutter tools src base context dart fluttercommandrunner runcommand package flutter tools src runner flutter command runner dart run package flutter tools runner dart appcontext run package flutter tools src base context dart main package flutter tools executable dart ensureanalyticssent running shutdown hooks shutdown hooks complete exiting with code
0
77,360
15,528,259,373
IssuesEvent
2021-03-13 10:06:37
jonathan-wiens/hwr-kurs19a-g2
https://api.github.com/repos/jonathan-wiens/hwr-kurs19a-g2
opened
CVE-2018-19827 (High) detected in opennmsopennms-source-26.0.0-1, node-sass-4.14.1.tgz
security vulnerability
## CVE-2018-19827 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>opennmsopennms-source-26.0.0-1</b>, <b>node-sass-4.14.1.tgz</b></p></summary> <p> <details><summary><b>node-sass-4.14.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p> <p>Path to dependency file: hwr-kurs19a-g2/package.json</p> <p>Path to vulnerable library: hwr-kurs19a-g2/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - :x: **node-sass-4.14.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jonathan-wiens/hwr-kurs19a-g2/commit/e8dc35c22b4d589d2941dc86cb947a0137795c70">e8dc35c22b4d589d2941dc86cb947a0137795c70</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In LibSass 3.5.5, a use-after-free vulnerability exists in the SharedPtr class in SharedPtr.cpp (or SharedPtr.hpp) that may cause a denial of service (application crash) or possibly have unspecified other impact. <p>Publish Date: 2018-12-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19827>CVE-2018-19827</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sass/libsass/pull/2784">https://github.com/sass/libsass/pull/2784</a></p> <p>Release Date: 2019-08-29</p> <p>Fix Resolution: LibSass - 3.6.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-19827 (High) detected in opennmsopennms-source-26.0.0-1, node-sass-4.14.1.tgz - ## CVE-2018-19827 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>opennmsopennms-source-26.0.0-1</b>, <b>node-sass-4.14.1.tgz</b></p></summary> <p> <details><summary><b>node-sass-4.14.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p> <p>Path to dependency file: hwr-kurs19a-g2/package.json</p> <p>Path to vulnerable library: hwr-kurs19a-g2/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - :x: **node-sass-4.14.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jonathan-wiens/hwr-kurs19a-g2/commit/e8dc35c22b4d589d2941dc86cb947a0137795c70">e8dc35c22b4d589d2941dc86cb947a0137795c70</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In LibSass 3.5.5, a use-after-free vulnerability exists in the SharedPtr class in SharedPtr.cpp (or SharedPtr.hpp) that may cause a denial of service (application crash) or possibly have unspecified other impact. <p>Publish Date: 2018-12-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19827>CVE-2018-19827</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sass/libsass/pull/2784">https://github.com/sass/libsass/pull/2784</a></p> <p>Release Date: 2019-08-29</p> <p>Fix Resolution: LibSass - 3.6.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in opennmsopennms source node sass tgz cve high severity vulnerability vulnerable libraries opennmsopennms source node sass tgz node sass tgz wrapper around libsass library home page a href path to dependency file hwr package json path to vulnerable library hwr node modules node sass package json dependency hierarchy x node sass tgz vulnerable library found in head commit a href found in base branch master vulnerability details in libsass a use after free vulnerability exists in the sharedptr class in sharedptr cpp or sharedptr hpp that may cause a denial of service application crash or possibly have unspecified other impact publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution libsass step up your open source security game with whitesource
0
68,152
28,152,980,635
IssuesEvent
2023-04-03 04:10:52
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Email points to Email page, but description points to SMS
triaged cxp product-question Pri1 azure-communication-services/svc
Under common scenarios heading, check first table for errant description. Page uses phone (mostly) but also telephone. Different meaning? --- #### Document Details ⚠ *Do not edit this section. It is required for learn.microsoft.com ➟ GitHub issue linking.* * ID: d5c2b60c-dd58-86ec-9186-2e18720f66c5 * Version Independent ID: eda0832c-3c21-2c4d-6364-25a77556fb3c * Content: [What is Azure Communication Services?](https://learn.microsoft.com/en-us/azure/communication-services/overview) * Content Source: [articles/communication-services/overview.md](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/communication-services/overview.md) * Service: **azure-communication-services** * GitHub Login: @tophpalmer * Microsoft Alias: **chpalm**
1.0
Email points to Email page, but description points to SMS - Under common scenarios heading, check first table for errant description. Page uses phone (mostly) but also telephone. Different meaning? --- #### Document Details ⚠ *Do not edit this section. It is required for learn.microsoft.com ➟ GitHub issue linking.* * ID: d5c2b60c-dd58-86ec-9186-2e18720f66c5 * Version Independent ID: eda0832c-3c21-2c4d-6364-25a77556fb3c * Content: [What is Azure Communication Services?](https://learn.microsoft.com/en-us/azure/communication-services/overview) * Content Source: [articles/communication-services/overview.md](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/communication-services/overview.md) * Service: **azure-communication-services** * GitHub Login: @tophpalmer * Microsoft Alias: **chpalm**
non_priority
email points to email page but description points to sms under common scenarios heading check first table for errant description page uses phone mostly but also telephone different meaning document details ⚠ do not edit this section it is required for learn microsoft com ➟ github issue linking id version independent id content content source service azure communication services github login tophpalmer microsoft alias chpalm
0
298,298
25,811,901,908
IssuesEvent
2022-12-11 23:01:21
Metalab/mos
https://api.github.com/repos/Metalab/mos
closed
iCal Export doesn't properly parse Wiki Page URLs
bug calendar needs tests
Enter a Wiki Page with Spaces in the title. MediaWiki does replace them with underscores. iCal Export cuts off at the first space instead of replacing them with underscores. This results in URLs in the iCal exported events that point to a defunct or a totally different wiki page.
1.0
iCal Export doesn't properly parse Wiki Page URLs - Enter a Wiki Page with Spaces in the title. MediaWiki does replace them with underscores. iCal Export cuts off at the first space instead of replacing them with underscores. This results in URLs in the iCal exported events that point to a defunct or a totally different wiki page.
non_priority
ical export doesn t properly parse wiki page urls enter a wiki page with spaces in the title mediawiki does replace them with underscores ical export cuts off at the first space instead of replacing them with underscores this results in urls in the ical exported events that point to a defunct or a totally different wiki page
0
231,790
17,755,035,565
IssuesEvent
2021-08-28 15:34:52
petrusjt/youtube-remote
https://api.github.com/repos/petrusjt/youtube-remote
opened
Remove part related to mouse controller from README.md
documentation
Mouse controller is not needed in the application since commit 58c1b6fb9788d5111bec5af606078ffd8ff28a99. The related part of README.md was not removed since.
1.0
Remove part related to mouse controller from README.md - Mouse controller is not needed in the application since commit 58c1b6fb9788d5111bec5af606078ffd8ff28a99. The related part of README.md was not removed since.
non_priority
remove part related to mouse controller from readme md mouse controller is not needed in the application since commit the related part of readme md was not removed since
0
140,075
31,828,080,517
IssuesEvent
2023-09-14 08:50:09
amplication/amplication
https://api.github.com/repos/amplication/amplication
closed
Server: Connected Repository Default README.md
type: feature request git code sync status: assigned
Creare default amplication README.md file for connected GitHub repositories. When users create a new GitHub repository through Amplication, repositories should be created with Amplication default README.md file.
1.0
Server: Connected Repository Default README.md - Creare default amplication README.md file for connected GitHub repositories. When users create a new GitHub repository through Amplication, repositories should be created with Amplication default README.md file.
non_priority
server connected repository default readme md creare default amplication readme md file for connected github repositories when users create a new github repository through amplication repositories should be created with amplication default readme md file
0
29,609
14,214,259,360
IssuesEvent
2020-11-17 04:45:46
golang/protobuf
https://api.github.com/repos/golang/protobuf
closed
proto.Unmarshal consumes a lot of cpu, any idea to fix this?
performance waiting-for-info
env: protobuf: github.com/golang/protobuf v1.4.3 protoc: 3.5.1 golang: go1.13 linux/amd64 in my application, the whole process work like this: * start a thrift server * accept request, an get pb_bytes from cache * unmarshal all the pb_bytes, and do my business logic * return my response to the client pb_bytes is of avg size of 50kB each request will unmarshal 100 pb_bytes when i call the thrift server with 20 request per second, 2 of 8 cores is occupied by the thrift server, most of the cpu cost is doing unmarshal. as you can see from the pprof flame graph: ![image](https://user-images.githubusercontent.com/11331995/98507480-a1365d00-2298-11eb-9839-6deaa08ef3c1.png) ![image](https://user-images.githubusercontent.com/11331995/98507598-dfcc1780-2298-11eb-9eba-4a41fddaa6fa.png) ![image](https://user-images.githubusercontent.com/11331995/98507580-d5118280-2298-11eb-93f4-d90396d140ce.png) even after i depoly my application to an docker env, the cpu&memory metrics really seems wired: ![image](https://user-images.githubusercontent.com/11331995/98507841-5c5ef600-2299-11eb-98c3-28040d5420b8.png)
True
proto.Unmarshal consumes a lot of cpu, any idea to fix this? - env: protobuf: github.com/golang/protobuf v1.4.3 protoc: 3.5.1 golang: go1.13 linux/amd64 in my application, the whole process work like this: * start a thrift server * accept request, an get pb_bytes from cache * unmarshal all the pb_bytes, and do my business logic * return my response to the client pb_bytes is of avg size of 50kB each request will unmarshal 100 pb_bytes when i call the thrift server with 20 request per second, 2 of 8 cores is occupied by the thrift server, most of the cpu cost is doing unmarshal. as you can see from the pprof flame graph: ![image](https://user-images.githubusercontent.com/11331995/98507480-a1365d00-2298-11eb-9839-6deaa08ef3c1.png) ![image](https://user-images.githubusercontent.com/11331995/98507598-dfcc1780-2298-11eb-9eba-4a41fddaa6fa.png) ![image](https://user-images.githubusercontent.com/11331995/98507580-d5118280-2298-11eb-93f4-d90396d140ce.png) even after i depoly my application to an docker env, the cpu&memory metrics really seems wired: ![image](https://user-images.githubusercontent.com/11331995/98507841-5c5ef600-2299-11eb-98c3-28040d5420b8.png)
non_priority
proto unmarshal consumes a lot of cpu any idea to fix this env protobuf github com golang protobuf protoc golang linux in my application the whole process work like this start a thrift server accept request an get pb bytes from cache unmarshal all the pb bytes and do my business logic return my response to the client pb bytes is of avg size of each request will unmarshal pb bytes when i call the thrift server with request per second of cores is occupied by the thrift server most of the cpu cost is doing unmarshal as you can see from the pprof flame graph even after i depoly my application to an docker env the cpu memory metrics really seems wired
0
66,051
12,705,466,973
IssuesEvent
2020-06-23 04:44:10
topcoder-platform/community-app
https://api.github.com/repos/topcoder-platform/community-app
closed
[$40]Submission: 404 error is displayed when clicking on submit button
Beta Env Challenge Details Screen P0 QA Pass Test Env tcx_Assigned tcx_FixAccepted v5-intgration-sub-code
Submission: 404 error is displayed when clicking on submit button example: https://beta-community-app.topcoder.com/challenges/3724cf55-e2ab-427e-a30f-863c750a277c/submit (user must be registered) https://test-community-app.topcoder-dev.com/challenges/68a1cb52-a313-4130-8900-87a21959fdae (user:dan_developer/dantopcoder123) <img width="1440" alt="Screenshot 2020-06-19 at 10 05 50 AM" src="https://user-images.githubusercontent.com/58783823/85097255-9b21e000-b214-11ea-8d6b-f8b668f71dfa.png">
1.0
[$40]Submission: 404 error is displayed when clicking on submit button - Submission: 404 error is displayed when clicking on submit button example: https://beta-community-app.topcoder.com/challenges/3724cf55-e2ab-427e-a30f-863c750a277c/submit (user must be registered) https://test-community-app.topcoder-dev.com/challenges/68a1cb52-a313-4130-8900-87a21959fdae (user:dan_developer/dantopcoder123) <img width="1440" alt="Screenshot 2020-06-19 at 10 05 50 AM" src="https://user-images.githubusercontent.com/58783823/85097255-9b21e000-b214-11ea-8d6b-f8b668f71dfa.png">
non_priority
submission error is displayed when clicking on submit button submission error is displayed when clicking on submit button example user must be registered user dan developer img width alt screenshot at am src
0
222,167
24,684,694,580
IssuesEvent
2022-10-19 01:55:32
kapseliboi/Node-Data
https://api.github.com/repos/kapseliboi/Node-Data
opened
CVE-2022-3517 (High) detected in multiple libraries
security vulnerability
## CVE-2022-3517 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimatch-2.0.10.tgz</b>, <b>minimatch-3.0.4.tgz</b>, <b>minimatch-0.3.0.tgz</b>, <b>minimatch-0.2.14.tgz</b></p></summary> <p> <details><summary><b>minimatch-2.0.10.tgz</b></p></summary> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz">https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - istanbul-0.4.2.tgz (Root Library) - fileset-0.2.1.tgz - :x: **minimatch-2.0.10.tgz** (Vulnerable Library) </details> <details><summary><b>minimatch-3.0.4.tgz</b></p></summary> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz</a></p> <p> Dependency Hierarchy: - gulp-nodemon-2.0.6.tgz (Root Library) - nodemon-1.18.9.tgz - :x: **minimatch-3.0.4.tgz** (Vulnerable Library) </details> <details><summary><b>minimatch-0.3.0.tgz</b></p></summary> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz">https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/recursive-readdir-synchronous/node_modules/minimatch/package.json,/node_modules/jasmine-node/node_modules/glob/node_modules/minimatch/package.json,/node_modules/jasmine/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - jasmine-node-1.14.5.tgz (Root Library) - gaze-0.3.4.tgz - fileset-0.1.8.tgz - glob-3.2.11.tgz - :x: **minimatch-0.3.0.tgz** (Vulnerable Library) </details> <details><summary><b>minimatch-0.2.14.tgz</b></p></summary> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-0.2.14.tgz">https://registry.npmjs.org/minimatch/-/minimatch-0.2.14.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/globule/node_modules/minimatch/package.json,/node_modules/jasmine-node/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - jasmine-node-1.14.5.tgz (Root Library) - gaze-0.3.4.tgz - :x: **minimatch-0.2.14.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/kapseliboi/Node-Data/commit/289c77565fc637d4c0e4bf4a9a1e81df96cd190a">289c77565fc637d4c0e4bf4a9a1e81df96cd190a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. <p>Publish Date: 2022-10-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-3517>CVE-2022-3517</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-17</p> <p>Fix Resolution: minimatch - 3.0.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-3517 (High) detected in multiple libraries - ## CVE-2022-3517 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimatch-2.0.10.tgz</b>, <b>minimatch-3.0.4.tgz</b>, <b>minimatch-0.3.0.tgz</b>, <b>minimatch-0.2.14.tgz</b></p></summary> <p> <details><summary><b>minimatch-2.0.10.tgz</b></p></summary> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz">https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - istanbul-0.4.2.tgz (Root Library) - fileset-0.2.1.tgz - :x: **minimatch-2.0.10.tgz** (Vulnerable Library) </details> <details><summary><b>minimatch-3.0.4.tgz</b></p></summary> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz</a></p> <p> Dependency Hierarchy: - gulp-nodemon-2.0.6.tgz (Root Library) - nodemon-1.18.9.tgz - :x: **minimatch-3.0.4.tgz** (Vulnerable Library) </details> <details><summary><b>minimatch-0.3.0.tgz</b></p></summary> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz">https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/recursive-readdir-synchronous/node_modules/minimatch/package.json,/node_modules/jasmine-node/node_modules/glob/node_modules/minimatch/package.json,/node_modules/jasmine/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - jasmine-node-1.14.5.tgz (Root Library) - gaze-0.3.4.tgz - fileset-0.1.8.tgz - glob-3.2.11.tgz - :x: **minimatch-0.3.0.tgz** (Vulnerable Library) </details> <details><summary><b>minimatch-0.2.14.tgz</b></p></summary> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-0.2.14.tgz">https://registry.npmjs.org/minimatch/-/minimatch-0.2.14.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/globule/node_modules/minimatch/package.json,/node_modules/jasmine-node/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - jasmine-node-1.14.5.tgz (Root Library) - gaze-0.3.4.tgz - :x: **minimatch-0.2.14.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/kapseliboi/Node-Data/commit/289c77565fc637d4c0e4bf4a9a1e81df96cd190a">289c77565fc637d4c0e4bf4a9a1e81df96cd190a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. <p>Publish Date: 2022-10-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-3517>CVE-2022-3517</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-17</p> <p>Fix Resolution: minimatch - 3.0.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries minimatch tgz minimatch tgz minimatch tgz minimatch tgz minimatch tgz a glob matcher in javascript library home page a href path to dependency file package json path to vulnerable library node modules minimatch package json dependency hierarchy istanbul tgz root library fileset tgz x minimatch tgz vulnerable library minimatch tgz a glob matcher in javascript library home page a href dependency hierarchy gulp nodemon tgz root library nodemon tgz x minimatch tgz vulnerable library minimatch tgz a glob matcher in javascript library home page a href path to dependency file package json path to vulnerable library node modules recursive readdir synchronous node modules minimatch package json node modules jasmine node node modules glob node modules minimatch package json node modules jasmine node modules minimatch package json dependency hierarchy jasmine node tgz root library gaze tgz fileset tgz glob tgz x minimatch tgz vulnerable library minimatch tgz a glob matcher in javascript library home page a href path to dependency file package json path to vulnerable library node modules globule node modules minimatch package json node modules jasmine node node modules minimatch package json dependency hierarchy jasmine node tgz root library gaze tgz x minimatch tgz vulnerable library found in head commit a href found in base branch master vulnerability details a vulnerability was found in the minimatch package this flaw allows a regular expression denial of service redos when calling the braceexpand function with specific arguments resulting in a denial of service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution minimatch step up your open source security game with mend
0
6,325
2,809,515,190
IssuesEvent
2015-05-16 02:56:07
robotlolita/raven
https://api.github.com/repos/robotlolita/raven
closed
Support changing the font sizes and paragraph styles
0 - Backlog C-design E-unknown K-enhancement P-low
Maybe this could be supported by themes. But iunno <!--- @huboard:{"order":0.0003662109375,"milestone_order":71,"custom_state":""} -->
1.0
Support changing the font sizes and paragraph styles - Maybe this could be supported by themes. But iunno <!--- @huboard:{"order":0.0003662109375,"milestone_order":71,"custom_state":""} -->
non_priority
support changing the font sizes and paragraph styles maybe this could be supported by themes but iunno huboard order milestone order custom state
0
13,964
10,562,542,444
IssuesEvent
2019-10-04 18:35:47
dotnet/corefx
https://api.github.com/repos/dotnet/corefx
closed
Installing System.Net.Http using Install-Package fails with "Dependency loop detected for package"
area-Infrastructure
I am installing packages to a folder using the following pwsh commands: `Register-PackageSource -Location https://www.nuget.org/api/v2 -Name Nuget -ProviderName Nuget -Trusted -force` `Install-Package -Name System.Net.Http -ProviderName Nuget -Destination $somedir` It fails with: ``` Install-Package : Dependency loop detected for package 'System.Net.Http'. At C:\git\mobiltracker-ps-docker\Publish-PackageDll.ps1:81 char:1 + Install-Package -Name $Name -ProviderName Nuget -Destination $Source ... + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : Deadlock detected: (System.Net.Http:String) [Install-Package], Exception + FullyQualifiedErrorId : DependencyLoopDetected,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage ``` It looks like the offending package is System.Diagnostics.DiagnosticSource v4.6.0 **Workaround:** Installing in the current order works: 1. `Install-Package System.Diagnostics.DiagnosticSource -RequiredVersion 4.5.1 -Provider nuget` 2. `Install-Package System.Net.Http -Provider nuget` 3. `Install-Package System.Diagnostics.DiagnosticSource -Provider nuget`
1.0
Installing System.Net.Http using Install-Package fails with "Dependency loop detected for package" - I am installing packages to a folder using the following pwsh commands: `Register-PackageSource -Location https://www.nuget.org/api/v2 -Name Nuget -ProviderName Nuget -Trusted -force` `Install-Package -Name System.Net.Http -ProviderName Nuget -Destination $somedir` It fails with: ``` Install-Package : Dependency loop detected for package 'System.Net.Http'. At C:\git\mobiltracker-ps-docker\Publish-PackageDll.ps1:81 char:1 + Install-Package -Name $Name -ProviderName Nuget -Destination $Source ... + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : Deadlock detected: (System.Net.Http:String) [Install-Package], Exception + FullyQualifiedErrorId : DependencyLoopDetected,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage ``` It looks like the offending package is System.Diagnostics.DiagnosticSource v4.6.0 **Workaround:** Installing in the current order works: 1. `Install-Package System.Diagnostics.DiagnosticSource -RequiredVersion 4.5.1 -Provider nuget` 2. `Install-Package System.Net.Http -Provider nuget` 3. `Install-Package System.Diagnostics.DiagnosticSource -Provider nuget`
non_priority
installing system net http using install package fails with dependency loop detected for package i am installing packages to a folder using the following pwsh commands register packagesource location name nuget providername nuget trusted force install package name system net http providername nuget destination somedir it fails with install package dependency loop detected for package system net http at c git mobiltracker ps docker publish packagedll char install package name name providername nuget destination source categoryinfo deadlock detected system net http string exception fullyqualifiederrorid dependencyloopdetected microsoft powershell packagemanagement cmdlets installpackage it looks like the offending package is system diagnostics diagnosticsource workaround installing in the current order works install package system diagnostics diagnosticsource requiredversion provider nuget install package system net http provider nuget install package system diagnostics diagnosticsource provider nuget
0
47,691
13,248,502,568
IssuesEvent
2020-08-19 19:05:17
kenferrara/cbp-theme
https://api.github.com/repos/kenferrara/cbp-theme
opened
CVE-2016-7103 (Medium) detected in jquery-ui-1.10.3.js
security vulnerability
## CVE-2016-7103 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-ui-1.10.3.js</b></p></summary> <p>A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.10.3/jquery-ui.js">https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.10.3/jquery-ui.js</a></p> <p>Path to dependency file: /tmp/ws-scm/cbp-theme/cbp-theme/node_modules/selectize/examples/plugins.html</p> <p>Path to vulnerable library: /cbp-theme/cbp-theme/node_modules/selectize/examples/js/jqueryui.js</p> <p> Dependency Hierarchy: - :x: **jquery-ui-1.10.3.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kenferrara/cbp-theme/commit/00f1482f5efa0120a277f069fffcee0de8e6adec">00f1482f5efa0120a277f069fffcee0de8e6adec</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function. <p>Publish Date: 2017-03-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-7103>CVE-2016-7103</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7103">https://nvd.nist.gov/vuln/detail/CVE-2016-7103</a></p> <p>Release Date: 2017-03-15</p> <p>Fix Resolution: 1.12.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jqueryui","packageVersion":"1.10.3","isTransitiveDependency":false,"dependencyTree":"jqueryui:1.10.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.12.0"}],"vulnerabilityIdentifier":"CVE-2016-7103","vulnerabilityDetails":"Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-7103","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2016-7103 (Medium) detected in jquery-ui-1.10.3.js - ## CVE-2016-7103 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-ui-1.10.3.js</b></p></summary> <p>A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.10.3/jquery-ui.js">https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.10.3/jquery-ui.js</a></p> <p>Path to dependency file: /tmp/ws-scm/cbp-theme/cbp-theme/node_modules/selectize/examples/plugins.html</p> <p>Path to vulnerable library: /cbp-theme/cbp-theme/node_modules/selectize/examples/js/jqueryui.js</p> <p> Dependency Hierarchy: - :x: **jquery-ui-1.10.3.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kenferrara/cbp-theme/commit/00f1482f5efa0120a277f069fffcee0de8e6adec">00f1482f5efa0120a277f069fffcee0de8e6adec</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function. <p>Publish Date: 2017-03-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-7103>CVE-2016-7103</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7103">https://nvd.nist.gov/vuln/detail/CVE-2016-7103</a></p> <p>Release Date: 2017-03-15</p> <p>Fix Resolution: 1.12.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jqueryui","packageVersion":"1.10.3","isTransitiveDependency":false,"dependencyTree":"jqueryui:1.10.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.12.0"}],"vulnerabilityIdentifier":"CVE-2016-7103","vulnerabilityDetails":"Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-7103","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in jquery ui js cve medium severity vulnerability vulnerable library jquery ui js a curated set of user interface interactions effects widgets and themes built on top of the jquery javascript library library home page a href path to dependency file tmp ws scm cbp theme cbp theme node modules selectize examples plugins html path to vulnerable library cbp theme cbp theme node modules selectize examples js jqueryui js dependency hierarchy x jquery ui js vulnerable library found in head commit a href vulnerability details cross site scripting xss vulnerability in jquery ui before might allow remote attackers to inject arbitrary web script or html via the closetext parameter of the dialog function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails cross site scripting xss vulnerability in jquery ui before might allow remote attackers to inject arbitrary web script or html via the closetext parameter of the dialog function vulnerabilityurl
0
186,024
21,910,353,715
IssuesEvent
2022-05-21 01:07:56
tctc008/WebGoat-develop
https://api.github.com/repos/tctc008/WebGoat-develop
opened
CVE-2022-22976 (Medium) detected in spring-security-crypto-5.5.2.jar
security vulnerability
## CVE-2022-22976 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-security-crypto-5.5.2.jar</b></p></summary> <p>Spring Security</p> <p>Library home page: <a href="https://spring.io/projects/spring-security">https://spring.io/projects/spring-security</a></p> <p>Path to dependency file: /webgoat-integration-tests/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/security/spring-security-crypto/5.5.2/spring-security-crypto-5.5.2.jar</p> <p> Dependency Hierarchy: - webwolf-8.2.3-SNAPSHOT.jar (Root Library) - spring-boot-starter-security-2.5.4.jar - spring-security-config-5.5.2.jar - spring-security-core-5.5.2.jar - :x: **spring-security-crypto-5.5.2.jar** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not affected by this CVE. <p>Publish Date: 2022-05-19 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22976>CVE-2022-22976</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tanzu.vmware.com/security/cve-2022-22976">https://tanzu.vmware.com/security/cve-2022-22976</a></p> <p>Release Date: 2022-05-19</p> <p>Fix Resolution: org.springframework.security:spring-security-crypto:5.5.7,5.6.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-22976 (Medium) detected in spring-security-crypto-5.5.2.jar - ## CVE-2022-22976 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-security-crypto-5.5.2.jar</b></p></summary> <p>Spring Security</p> <p>Library home page: <a href="https://spring.io/projects/spring-security">https://spring.io/projects/spring-security</a></p> <p>Path to dependency file: /webgoat-integration-tests/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/security/spring-security-crypto/5.5.2/spring-security-crypto-5.5.2.jar</p> <p> Dependency Hierarchy: - webwolf-8.2.3-SNAPSHOT.jar (Root Library) - spring-boot-starter-security-2.5.4.jar - spring-security-config-5.5.2.jar - spring-security-core-5.5.2.jar - :x: **spring-security-crypto-5.5.2.jar** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not affected by this CVE. <p>Publish Date: 2022-05-19 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22976>CVE-2022-22976</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tanzu.vmware.com/security/cve-2022-22976">https://tanzu.vmware.com/security/cve-2022-22976</a></p> <p>Release Date: 2022-05-19</p> <p>Fix Resolution: org.springframework.security:spring-security-crypto:5.5.7,5.6.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in spring security crypto jar cve medium severity vulnerability vulnerable library spring security crypto jar spring security library home page a href path to dependency file webgoat integration tests pom xml path to vulnerable library home wss scanner repository org springframework security spring security crypto spring security crypto jar dependency hierarchy webwolf snapshot jar root library spring boot starter security jar spring security config jar spring security core jar x spring security crypto jar vulnerable library found in base branch main vulnerability details spring security versions x prior to x prior to and earlier unsupported versions contain an integer overflow vulnerability when using the bcrypt class with the maximum work factor the encoder does not perform any salt rounds due to an integer overflow error the default settings are not affected by this cve publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required high user interaction none scope changed impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework security spring security crypto step up your open source security game with whitesource
0
104,490
8,973,386,410
IssuesEvent
2019-01-29 20:53:26
tikv/tikv
https://api.github.com/repos/tikv/tikv
reopened
server::load_statistics::linux::tests::test_thread_load_statistic fails unexpectedly
C: Test/Bench T: Bug
As stated in title. I've seen this fail recently. No further info.
1.0
server::load_statistics::linux::tests::test_thread_load_statistic fails unexpectedly - As stated in title. I've seen this fail recently. No further info.
non_priority
server load statistics linux tests test thread load statistic fails unexpectedly as stated in title i ve seen this fail recently no further info
0
248,924
26,866,144,102
IssuesEvent
2023-02-04 00:08:50
elastic/beats
https://api.github.com/repos/elastic/beats
closed
Update auditbeat docs for systemd to add LimitNOFILE to systemd service
docs Auditbeat Stalled Team:Docs Team:Security-External Integrations
The current docs only talk about macOS when getting "too many open files": https://www.elastic.co/guide/en/beats/auditbeat/master/ulimit.html However this can also be an issue with systemd as it only applies the default 1024. In production this can be too low as well as seen here for example: https://discuss.elastic.co/t/auditbeat-filebeat-error-system-socket-dataset-setup-failed-unable-to-monitor-probe-p-inet6-create-inet6-create-proto-p3-perf-event-open-too-many-open-files/251210 The documentation either known issues above or in the URL: https://www.elastic.co/guide/en/beats/auditbeat/master/running-with-systemd.html Add this to /lib/systemd/system/auditbeat.service or use /etc/systemd/system/auditbeat.service.d/override.conf with something like: [Service] LimitNOFILE=1048576
True
Update auditbeat docs for systemd to add LimitNOFILE to systemd service - The current docs only talk about macOS when getting "too many open files": https://www.elastic.co/guide/en/beats/auditbeat/master/ulimit.html However this can also be an issue with systemd as it only applies the default 1024. In production this can be too low as well as seen here for example: https://discuss.elastic.co/t/auditbeat-filebeat-error-system-socket-dataset-setup-failed-unable-to-monitor-probe-p-inet6-create-inet6-create-proto-p3-perf-event-open-too-many-open-files/251210 The documentation either known issues above or in the URL: https://www.elastic.co/guide/en/beats/auditbeat/master/running-with-systemd.html Add this to /lib/systemd/system/auditbeat.service or use /etc/systemd/system/auditbeat.service.d/override.conf with something like: [Service] LimitNOFILE=1048576
non_priority
update auditbeat docs for systemd to add limitnofile to systemd service the current docs only talk about macos when getting too many open files however this can also be an issue with systemd as it only applies the default in production this can be too low as well as seen here for example the documentation either known issues above or in the url add this to lib systemd system auditbeat service or use etc systemd system auditbeat service d override conf with something like limitnofile
0