Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
1k
labels
stringlengths
4
1.38k
body
stringlengths
1
262k
index
stringclasses
16 values
text_combine
stringlengths
96
262k
label
stringclasses
2 values
text
stringlengths
96
252k
binary_label
int64
0
1
413,445
27,952,389,724
IssuesEvent
2023-03-24 09:51:10
ESMValGroup/ESMValCore
https://api.github.com/repos/ESMValGroup/ESMValCore
opened
ESMValCore 'stable' build still points to v2.7.1
documentation
The build for the 'stable' version of the ESMValCore documentation [failed](https://readthedocs.org/projects/esmvalcore/builds/19880948/), so the 'stable' label still points to the previous release. It looks like this happened because it tried to resolve links to the 'stable' ESMValTool documentation (which still points to ESMValTool v2.7), which are not available yet because they were introduced after that release. ``` /home/docs/checkouts/readthedocs.org/user_builds/esmvalcore/checkouts/stable/doc/contributing.rst:142: WARNING: undefined label: 'esmvaltool:backward-compatibility-policy' /home/docs/checkouts/readthedocs.org/user_builds/esmvalcore/checkouts/stable/doc/contributing.rst:586: WARNING: undefined label: 'esmvaltool:backward-compatibility-policy' /home/docs/checkouts/readthedocs.org/user_builds/esmvalcore/checkouts/stable/doc/contributing.rst:758: WARNING: undefined label: 'esmvaltool:release_steps' /home/docs/checkouts/readthedocs.org/user_builds/esmvalcore/checkouts/stable/doc/contributing.rst:805: WARNING: undefined label: 'esmvaltool:backward-compatibility-policy' ```
1.0
ESMValCore 'stable' build still points to v2.7.1 - The build for the 'stable' version of the ESMValCore documentation [failed](https://readthedocs.org/projects/esmvalcore/builds/19880948/), so the 'stable' label still points to the previous release. It looks like this happened because it tried to resolve links to the 'stable' ESMValTool documentation (which still points to ESMValTool v2.7), which are not available yet because they were introduced after that release. ``` /home/docs/checkouts/readthedocs.org/user_builds/esmvalcore/checkouts/stable/doc/contributing.rst:142: WARNING: undefined label: 'esmvaltool:backward-compatibility-policy' /home/docs/checkouts/readthedocs.org/user_builds/esmvalcore/checkouts/stable/doc/contributing.rst:586: WARNING: undefined label: 'esmvaltool:backward-compatibility-policy' /home/docs/checkouts/readthedocs.org/user_builds/esmvalcore/checkouts/stable/doc/contributing.rst:758: WARNING: undefined label: 'esmvaltool:release_steps' /home/docs/checkouts/readthedocs.org/user_builds/esmvalcore/checkouts/stable/doc/contributing.rst:805: WARNING: undefined label: 'esmvaltool:backward-compatibility-policy' ```
non_priority
esmvalcore stable build still points to the build for the stable version of the esmvalcore documentation so the stable label still points to the previous release it looks like this happened because it tried to resolve links to the stable esmvaltool documentation which still points to esmvaltool which are not available yet because they were introduced after that release home docs checkouts readthedocs org user builds esmvalcore checkouts stable doc contributing rst warning undefined label esmvaltool backward compatibility policy home docs checkouts readthedocs org user builds esmvalcore checkouts stable doc contributing rst warning undefined label esmvaltool backward compatibility policy home docs checkouts readthedocs org user builds esmvalcore checkouts stable doc contributing rst warning undefined label esmvaltool release steps home docs checkouts readthedocs org user builds esmvalcore checkouts stable doc contributing rst warning undefined label esmvaltool backward compatibility policy
0
279,828
8,674,065,802
IssuesEvent
2018-11-30 05:52:09
leo-project/leofs
https://api.github.com/repos/leo-project/leofs
opened
[docs] Add a FAQ - How to count the number of files in a specific bucket
Document Priority-MIDDLE v1.4
As I answered in https://github.com/leo-project/leofs/issues/1142#issuecomment-442707443, using the file generated by leofs-adm diagnose-start would be most efficient to count the number of files in a specific bucket. Other ways like using "s3cmd ls" or something similar with aws-sdk would be very inefficient and take much longer time so we have to recommend the way using leofs-adm diagnose-start in our official docs.
1.0
[docs] Add a FAQ - How to count the number of files in a specific bucket - As I answered in https://github.com/leo-project/leofs/issues/1142#issuecomment-442707443, using the file generated by leofs-adm diagnose-start would be most efficient to count the number of files in a specific bucket. Other ways like using "s3cmd ls" or something similar with aws-sdk would be very inefficient and take much longer time so we have to recommend the way using leofs-adm diagnose-start in our official docs.
priority
add a faq how to count the number of files in a specific bucket as i answered in using the file generated by leofs adm diagnose start would be most efficient to count the number of files in a specific bucket other ways like using ls or something similar with aws sdk would be very inefficient and take much longer time so we have to recommend the way using leofs adm diagnose start in our official docs
1
49,761
6,039,394,265
IssuesEvent
2017-06-10 02:36:28
ClassicWoW/Nefarian_1.12.1_Bugtracker
https://api.github.com/repos/ClassicWoW/Nefarian_1.12.1_Bugtracker
closed
[Naxxramas]Steinhautgargoyle
Auf Testserver Dev Behoben Script Kreaturen
Welches Verhalten wird beobachtet? Die Giftsalve kommt zu häufig, sie kommt circa alle [4 Sekunden](https://youtu.be/Olzvyf7ccso?t=1h15m). Wie sollte es sich verhalten? Die Salve sollte deutlich seltener kommen, nur circa alle 8-10 Sekunden. Schritte zur Reproduzierung Gargoyle pullen und die Frequenz der Salve überprüfen Zusätzliche Informationen (Screenshots, Videos, Klasse, Rasse, Level, etc.) [Hier](https://youtu.be/FH7ytRnmgDc?t=4m) sieht man, dass die Gargoyles die Salve nicht alle 4 Sekunden, sondern mit einer niedrigeren Frequenz benutzen. [Steinhautgargoyle auf Wowwiki](http://wowwiki.wikia.com/wiki/Stoneskin_Gargoyle?oldid=338320) Alle Kreaturen, Items, Objekte, Quests, Zauber etc. müssen aus unserer Datenbank verlinkt sein. https://datenbank.classic-wow.org/?npc=16168#abilities https://datenbank.classic-wow.org/?spell=29325
1.0
[Naxxramas]Steinhautgargoyle - Welches Verhalten wird beobachtet? Die Giftsalve kommt zu häufig, sie kommt circa alle [4 Sekunden](https://youtu.be/Olzvyf7ccso?t=1h15m). Wie sollte es sich verhalten? Die Salve sollte deutlich seltener kommen, nur circa alle 8-10 Sekunden. Schritte zur Reproduzierung Gargoyle pullen und die Frequenz der Salve überprüfen Zusätzliche Informationen (Screenshots, Videos, Klasse, Rasse, Level, etc.) [Hier](https://youtu.be/FH7ytRnmgDc?t=4m) sieht man, dass die Gargoyles die Salve nicht alle 4 Sekunden, sondern mit einer niedrigeren Frequenz benutzen. [Steinhautgargoyle auf Wowwiki](http://wowwiki.wikia.com/wiki/Stoneskin_Gargoyle?oldid=338320) Alle Kreaturen, Items, Objekte, Quests, Zauber etc. müssen aus unserer Datenbank verlinkt sein. https://datenbank.classic-wow.org/?npc=16168#abilities https://datenbank.classic-wow.org/?spell=29325
non_priority
steinhautgargoyle welches verhalten wird beobachtet die giftsalve kommt zu häufig sie kommt circa alle wie sollte es sich verhalten die salve sollte deutlich seltener kommen nur circa alle sekunden schritte zur reproduzierung gargoyle pullen und die frequenz der salve überprüfen zusätzliche informationen screenshots videos klasse rasse level etc sieht man dass die gargoyles die salve nicht alle sekunden sondern mit einer niedrigeren frequenz benutzen alle kreaturen items objekte quests zauber etc müssen aus unserer datenbank verlinkt sein
0
115,000
4,650,619,582
IssuesEvent
2016-10-03 05:59:36
TauCetiStation/TauCetiClassic
https://api.github.com/repos/TauCetiStation/TauCetiClassic
closed
Баг отображения Т-образной трубы.
bug priority: low
<!-- 1. ОТВЕТЫ ОСТАВЛЯТЬ ПОД СООТВЕТСТВУЮЩИЕ ЗАГОЛОВКИ (они в самом низу, после всех правил) 2. В ОДНОМ РЕПОРТЕ ДОЛЖНО БЫТЬ ОПИСАНИЕ ТОЛЬКО ОДНОЙ ПРОБЛЕМЫ 3. КОРРЕКТНОЕ НАЗВАНИЕ РЕПОРТА НЕ МЕНЕЕ ВАЖНО ЧЕМ ОПИСАНИЕ -. Ниже описание каждого пункта. 1. Весь данный текст что уже написан до вас - НЕ УДАЛЯТЬ И НЕ РЕДАКТИРОВАТЬ. Если нечего написать в тот или иной пункт - просто оставить пустым. 2. Не надо описывать пачку багов в одном репорте, (!даже если там все описать можно парой слов!) шанс что их исправят за раз, крайне мал. А вот использовать на гите удобную функцию - автозакрытия репорта при мерже пулл реквеста - исправляющего данный репорт, будет невозможно. 3. Корректное и в меру подробное название репорта - тоже очень важно! Чтобы даже не заходя в сам репорт - было понятно что за проблема. Плохой пример: "Ковер." - что мы должны понять из такого названия? Хороший пример: "Некорректное отображение спрайтов ковра." - а вот так уже будет понятно о чем репорт. Это надо как минимум для того, чтобы вам же самим - было видно, что репорта_нейм еще нет или наоборот, уже есть, и это можно было понять не углубляясь в - чтение каждого репорта внутри. Когда название не имеет конкретики, из - которого нельзя понять о чем репорт, это также затрудняет функцию поиска. --> #### Подробное описание проблемы Тобразная трубы отображена не верно. ![tau ceti station 2016-09-15 144645](https://cloud.githubusercontent.com/assets/7734424/18596994/7e783872-7c54-11e6-849b-6c305000abbc.png) Также если еще чтото прикрутить к Т-трубе ее отобразит как полная.
1.0
Баг отображения Т-образной трубы. - <!-- 1. ОТВЕТЫ ОСТАВЛЯТЬ ПОД СООТВЕТСТВУЮЩИЕ ЗАГОЛОВКИ (они в самом низу, после всех правил) 2. В ОДНОМ РЕПОРТЕ ДОЛЖНО БЫТЬ ОПИСАНИЕ ТОЛЬКО ОДНОЙ ПРОБЛЕМЫ 3. КОРРЕКТНОЕ НАЗВАНИЕ РЕПОРТА НЕ МЕНЕЕ ВАЖНО ЧЕМ ОПИСАНИЕ -. Ниже описание каждого пункта. 1. Весь данный текст что уже написан до вас - НЕ УДАЛЯТЬ И НЕ РЕДАКТИРОВАТЬ. Если нечего написать в тот или иной пункт - просто оставить пустым. 2. Не надо описывать пачку багов в одном репорте, (!даже если там все описать можно парой слов!) шанс что их исправят за раз, крайне мал. А вот использовать на гите удобную функцию - автозакрытия репорта при мерже пулл реквеста - исправляющего данный репорт, будет невозможно. 3. Корректное и в меру подробное название репорта - тоже очень важно! Чтобы даже не заходя в сам репорт - было понятно что за проблема. Плохой пример: "Ковер." - что мы должны понять из такого названия? Хороший пример: "Некорректное отображение спрайтов ковра." - а вот так уже будет понятно о чем репорт. Это надо как минимум для того, чтобы вам же самим - было видно, что репорта_нейм еще нет или наоборот, уже есть, и это можно было понять не углубляясь в - чтение каждого репорта внутри. Когда название не имеет конкретики, из - которого нельзя понять о чем репорт, это также затрудняет функцию поиска. --> #### Подробное описание проблемы Тобразная трубы отображена не верно. ![tau ceti station 2016-09-15 144645](https://cloud.githubusercontent.com/assets/7734424/18596994/7e783872-7c54-11e6-849b-6c305000abbc.png) Также если еще чтото прикрутить к Т-трубе ее отобразит как полная.
priority
баг отображения т образной трубы ответы оставлять под соответствующие заголовки они в самом низу после всех правил в одном репорте должно быть описание только одной проблемы корректное название репорта не менее важно чем описание ниже описание каждого пункта весь данный текст что уже написан до вас не удалять и не редактировать если нечего написать в тот или иной пункт просто оставить пустым не надо описывать пачку багов в одном репорте даже если там все описать можно парой слов шанс что их исправят за раз крайне мал а вот использовать на гите удобную функцию автозакрытия репорта при мерже пулл реквеста исправляющего данный репорт будет невозможно корректное и в меру подробное название репорта тоже очень важно чтобы даже не заходя в сам репорт было понятно что за проблема плохой пример ковер что мы должны понять из такого названия хороший пример некорректное отображение спрайтов ковра а вот так уже будет понятно о чем репорт это надо как минимум для того чтобы вам же самим было видно что репорта нейм еще нет или наоборот уже есть и это можно было понять не углубляясь в чтение каждого репорта внутри когда название не имеет конкретики из которого нельзя понять о чем репорт это также затрудняет функцию поиска подробное описание проблемы тобразная трубы отображена не верно также если еще чтото прикрутить к т трубе ее отобразит как полная
1
82,288
10,277,096,432
IssuesEvent
2019-08-25 00:25:37
acaloiaro/prwatch
https://api.github.com/repos/acaloiaro/prwatch
closed
Improve README.md
documentation
- Document that only Jira projects are supported (for now) - Document how Pull Requests require a project key, e.g. `MYPROJ-1234` anywhere in the description as a URL or plain text
1.0
Improve README.md - - Document that only Jira projects are supported (for now) - Document how Pull Requests require a project key, e.g. `MYPROJ-1234` anywhere in the description as a URL or plain text
non_priority
improve readme md document that only jira projects are supported for now document how pull requests require a project key e g myproj anywhere in the description as a url or plain text
0
218,316
7,331,065,934
IssuesEvent
2018-03-05 12:11:27
NCEAS/metacat
https://api.github.com/repos/NCEAS/metacat
closed
ESA path in data package acceptance email is incorrect
Category: metacat Component: Bugzilla-Id Priority: Normal Status: Resolved Tracker: Bug
--- Author Name: **Callie Bowdish** (Callie Bowdish) Original Redmine Issue: 3362, https://projects.ecoinformatics.org/ecoinfo/issues/3362 Original Date: 2008-06-03 Original Assignee: Jing Tao --- ESA email from moderator when the data package is accepted does not have the correct path to the data package. ------------- Example Dear Callie Bowdish, We are happy to inform you that the metadata entry for your article submission, Cedar creek, has been accepted. This part of the submission process is now complete. Your metadata entry can be cited in the future as <LSID>, and will be viewable online at /metacat/metacat?action=read&cfg=esa&docid=esa.5 after publication. Thank you for your cooperation. The Ecological Society of America
1.0
ESA path in data package acceptance email is incorrect - --- Author Name: **Callie Bowdish** (Callie Bowdish) Original Redmine Issue: 3362, https://projects.ecoinformatics.org/ecoinfo/issues/3362 Original Date: 2008-06-03 Original Assignee: Jing Tao --- ESA email from moderator when the data package is accepted does not have the correct path to the data package. ------------- Example Dear Callie Bowdish, We are happy to inform you that the metadata entry for your article submission, Cedar creek, has been accepted. This part of the submission process is now complete. Your metadata entry can be cited in the future as <LSID>, and will be viewable online at /metacat/metacat?action=read&cfg=esa&docid=esa.5 after publication. Thank you for your cooperation. The Ecological Society of America
priority
esa path in data package acceptance email is incorrect author name callie bowdish callie bowdish original redmine issue original date original assignee jing tao esa email from moderator when the data package is accepted does not have the correct path to the data package example dear callie bowdish we are happy to inform you that the metadata entry for your article submission cedar creek has been accepted this part of the submission process is now complete your metadata entry can be cited in the future as and will be viewable online at metacat metacat action read cfg esa docid esa after publication thank you for your cooperation the ecological society of america
1
51,445
13,635,124,799
IssuesEvent
2020-09-25 01:58:10
nasifimtiazohi/openmrs-module-referencedemodata-1.4.5
https://api.github.com/repos/nasifimtiazohi/openmrs-module-referencedemodata-1.4.5
opened
CVE-2019-2692 (Medium) detected in mysql-connector-java-5.1.28.jar
security vulnerability
## CVE-2019-2692 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.28.jar</b></p></summary> <p>MySQL JDBC Type 4 driver</p> <p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p> <p>Path to dependency file: openmrs-module-referencedemodata-1.4.5/api-1.10/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/mysql/mysql-connector-java/5.1.28/mysql-connector-java-5.1.28.jar</p> <p> Dependency Hierarchy: - openmrs-test-1.10.2.pom (Root Library) - databene-benerator-0.5.9.jar - :x: **mysql-connector-java-5.1.28.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/nasifimtiazohi/openmrs-module-referencedemodata-1.4.5/commit/bde9ded52a5d0cbe44d5b0945266860e2a9a582a">bde9ded52a5d0cbe44d5b0945266860e2a9a582a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). <p>Publish Date: 2019-04-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-2692>CVE-2019-2692</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: High - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-jcq3-cprp-m333">https://github.com/advisories/GHSA-jcq3-cprp-m333</a></p> <p>Release Date: 2019-04-23</p> <p>Fix Resolution: mysql:mysql-connector-java:8.0.16</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-2692 (Medium) detected in mysql-connector-java-5.1.28.jar - ## CVE-2019-2692 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.28.jar</b></p></summary> <p>MySQL JDBC Type 4 driver</p> <p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p> <p>Path to dependency file: openmrs-module-referencedemodata-1.4.5/api-1.10/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/mysql/mysql-connector-java/5.1.28/mysql-connector-java-5.1.28.jar</p> <p> Dependency Hierarchy: - openmrs-test-1.10.2.pom (Root Library) - databene-benerator-0.5.9.jar - :x: **mysql-connector-java-5.1.28.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/nasifimtiazohi/openmrs-module-referencedemodata-1.4.5/commit/bde9ded52a5d0cbe44d5b0945266860e2a9a582a">bde9ded52a5d0cbe44d5b0945266860e2a9a582a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). <p>Publish Date: 2019-04-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-2692>CVE-2019-2692</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: High - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-jcq3-cprp-m333">https://github.com/advisories/GHSA-jcq3-cprp-m333</a></p> <p>Release Date: 2019-04-23</p> <p>Fix Resolution: mysql:mysql-connector-java:8.0.16</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in mysql connector java jar cve medium severity vulnerability vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to dependency file openmrs module referencedemodata api pom xml path to vulnerable library home wss scanner repository mysql mysql connector java mysql connector java jar dependency hierarchy openmrs test pom root library databene benerator jar x mysql connector java jar vulnerable library found in head commit a href found in base branch master vulnerability details vulnerability in the mysql connectors component of oracle mysql subcomponent connector j supported versions that are affected are and prior difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where mysql connectors executes to compromise mysql connectors successful attacks require human interaction from a person other than the attacker successful attacks of this vulnerability can result in takeover of mysql connectors cvss base score confidentiality integrity and availability impacts cvss vector cvss av l ac h pr h ui r s u c h i h a h publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required high user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution mysql mysql connector java step up your open source security game with whitesource
0
283,552
8,719,850,506
IssuesEvent
2018-12-08 05:18:21
aowen87/BAR
https://api.github.com/repos/aowen87/BAR
closed
We need host profiles for the new LLNL machines aztec, edge and inca
asc enhancement priority reviewed
We need to create new host profiles for the LLNL machines aztec, edge and inca. The aztec one will probably be equivalent to yana and the inca one will be equivalent to hopi. The edge one will probably be like atlas. -----------------------REDMINE MIGRATION----------------------- This ticket was migrated from Redmine. As such, not all information was able to be captured in the transition. Below is a complete record of the original redmine ticket. Ticket number: 431 Status: Resolved Project: VisIt Tracker: Feature Priority: High Subject: We need host profiles for the new LLNL machines aztec, edge and inca Assigned to: Eric Brugger Category: Target version: 2.1.1 Author: Eric Brugger Start: 10/15/2010 Due date: % Done: 100 Estimated time: 1.0 Created: 10/15/2010 11:49 am Updated: 10/29/2010 01:51 pm Likelihood: Severity: Found in version: Impact: 3 - Medium Expected Use: 3 - Occasional OS: All Support Group: DOE/ASC Description: We need to create new host profiles for the LLNL machines aztec, edge and inca. The aztec one will probably be equivalent to yana and the inca one will be equivalent to hopi. The edge one will probably be like atlas. Comments: I also think our hera profile lists 8 procs as the default, however the nodes have 16 procs, so we should consider updating this as well.
1.0
We need host profiles for the new LLNL machines aztec, edge and inca - We need to create new host profiles for the LLNL machines aztec, edge and inca. The aztec one will probably be equivalent to yana and the inca one will be equivalent to hopi. The edge one will probably be like atlas. -----------------------REDMINE MIGRATION----------------------- This ticket was migrated from Redmine. As such, not all information was able to be captured in the transition. Below is a complete record of the original redmine ticket. Ticket number: 431 Status: Resolved Project: VisIt Tracker: Feature Priority: High Subject: We need host profiles for the new LLNL machines aztec, edge and inca Assigned to: Eric Brugger Category: Target version: 2.1.1 Author: Eric Brugger Start: 10/15/2010 Due date: % Done: 100 Estimated time: 1.0 Created: 10/15/2010 11:49 am Updated: 10/29/2010 01:51 pm Likelihood: Severity: Found in version: Impact: 3 - Medium Expected Use: 3 - Occasional OS: All Support Group: DOE/ASC Description: We need to create new host profiles for the LLNL machines aztec, edge and inca. The aztec one will probably be equivalent to yana and the inca one will be equivalent to hopi. The edge one will probably be like atlas. Comments: I also think our hera profile lists 8 procs as the default, however the nodes have 16 procs, so we should consider updating this as well.
priority
we need host profiles for the new llnl machines aztec edge and inca we need to create new host profiles for the llnl machines aztec edge and inca the aztec one will probably be equivalent to yana and the inca one will be equivalent to hopi the edge one will probably be like atlas redmine migration this ticket was migrated from redmine as such not all information was able to be captured in the transition below is a complete record of the original redmine ticket ticket number status resolved project visit tracker feature priority high subject we need host profiles for the new llnl machines aztec edge and inca assigned to eric brugger category target version author eric brugger start due date done estimated time created am updated pm likelihood severity found in version impact medium expected use occasional os all support group doe asc description we need to create new host profiles for the llnl machines aztec edge and inca the aztec one will probably be equivalent to yana and the inca one will be equivalent to hopi the edge one will probably be like atlas comments i also think our hera profile lists procs as the default however the nodes have procs so we should consider updating this as well
1
222,197
17,398,707,789
IssuesEvent
2021-08-02 16:28:42
nasa/cFE
https://api.github.com/repos/nasa/cFE
closed
Add (unsigned int) cast to MIR prints in time_UT.c
bug unit-test
**Is your feature request related to a problem? Please describe.** MIR prints in time_UT.c break the RTEMS build because %u expects (unsigned int), but uint32 in RTEMS is an unsigned long. **Describe the solution you'd like** Add (unsigned int) cast to MIR prints in time_UT.c **Requester Info** Jose F. Martinez Pedraza / NASA GSFC
1.0
Add (unsigned int) cast to MIR prints in time_UT.c - **Is your feature request related to a problem? Please describe.** MIR prints in time_UT.c break the RTEMS build because %u expects (unsigned int), but uint32 in RTEMS is an unsigned long. **Describe the solution you'd like** Add (unsigned int) cast to MIR prints in time_UT.c **Requester Info** Jose F. Martinez Pedraza / NASA GSFC
non_priority
add unsigned int cast to mir prints in time ut c is your feature request related to a problem please describe mir prints in time ut c break the rtems build because u expects unsigned int but in rtems is an unsigned long describe the solution you d like add unsigned int cast to mir prints in time ut c requester info jose f martinez pedraza nasa gsfc
0
395,122
27,055,748,625
IssuesEvent
2023-02-13 16:03:50
oemof/oemof-solph
https://api.github.com/repos/oemof/oemof-solph
opened
Add an example for the OffsetTransformer with two series of coefficients
documentation
Just to show, how that can be used/implemented.
1.0
Add an example for the OffsetTransformer with two series of coefficients - Just to show, how that can be used/implemented.
non_priority
add an example for the offsettransformer with two series of coefficients just to show how that can be used implemented
0
363,958
25,475,839,127
IssuesEvent
2022-11-25 14:22:19
swaros/contxt
https://api.github.com/repos/swaros/contxt
closed
update readme
documentation
todos - finalize structure documentation - add macros documentation - add documentation about templating - update main docu dependind windows builds - link the docus (toc)
1.0
update readme - todos - finalize structure documentation - add macros documentation - add documentation about templating - update main docu dependind windows builds - link the docus (toc)
non_priority
update readme todos finalize structure documentation add macros documentation add documentation about templating update main docu dependind windows builds link the docus toc
0
185,198
15,013,893,636
IssuesEvent
2021-02-01 05:31:20
arturo-lang/arturo
https://api.github.com/repos/arturo-lang/arturo
closed
How to compile without GTK?
documentation installer
The documentation says that GTK is required only for “complete” builds, but it doesn't specify how non make a non-“complete” build. Any help?
1.0
How to compile without GTK? - The documentation says that GTK is required only for “complete” builds, but it doesn't specify how non make a non-“complete” build. Any help?
non_priority
how to compile without gtk the documentation says that gtk is required only for “complete” builds but it doesn t specify how non make a non “complete” build any help
0
127,444
12,323,075,810
IssuesEvent
2020-05-13 11:30:40
Students-of-the-city-of-Kostroma/trpo_automation
https://api.github.com/repos/Students-of-the-city-of-Kostroma/trpo_automation
closed
Разработать сценарии тестирования лабораторной работы в виде гугл таблицы.
documentation
По итогу предоставить отчет о выполнении тестов, готовые сценарии,
1.0
Разработать сценарии тестирования лабораторной работы в виде гугл таблицы. - По итогу предоставить отчет о выполнении тестов, готовые сценарии,
non_priority
разработать сценарии тестирования лабораторной работы в виде гугл таблицы по итогу предоставить отчет о выполнении тестов готовые сценарии
0
737,719
25,528,316,091
IssuesEvent
2022-11-29 05:39:27
Hexlet/hexlet-cv
https://api.github.com/repos/Hexlet/hexlet-cv
closed
Add notice in tg and slack
help wanted good first issue hacktoberfest-accepted Priority: High
Make it so that the career track employee in the admin, when he repeatedly posted the same job, it will be added automatically to Slack and Telegram
1.0
Add notice in tg and slack - Make it so that the career track employee in the admin, when he repeatedly posted the same job, it will be added automatically to Slack and Telegram
priority
add notice in tg and slack make it so that the career track employee in the admin when he repeatedly posted the same job it will be added automatically to slack and telegram
1
51,461
27,086,809,415
IssuesEvent
2023-02-14 17:35:25
gchq/stroom
https://api.github.com/repos/gchq/stroom
opened
Consider changing `meta_val` table to be single row with multiple columns
enhancement f:performance
Currently meta is 1:* with meta_val, with ~10 meta_val records per meta. The meta_val KV pairs are pretty much a static set of keys so we could have a meta_attributes table that has one column per attr key. This would reduce the number of rows being inserted and would reduce the number of joins needed when querying meta with attr val conditions. Tests would be needed to see how this impacts insert and query performance.
True
Consider changing `meta_val` table to be single row with multiple columns - Currently meta is 1:* with meta_val, with ~10 meta_val records per meta. The meta_val KV pairs are pretty much a static set of keys so we could have a meta_attributes table that has one column per attr key. This would reduce the number of rows being inserted and would reduce the number of joins needed when querying meta with attr val conditions. Tests would be needed to see how this impacts insert and query performance.
non_priority
consider changing meta val table to be single row with multiple columns currently meta is with meta val with meta val records per meta the meta val kv pairs are pretty much a static set of keys so we could have a meta attributes table that has one column per attr key this would reduce the number of rows being inserted and would reduce the number of joins needed when querying meta with attr val conditions tests would be needed to see how this impacts insert and query performance
0
113,606
4,565,614,442
IssuesEvent
2016-09-15 01:28:03
rm-code/On-The-Roadside
https://api.github.com/repos/rm-code/On-The-Roadside
opened
Allow "opening" of backpacks in the inventory
Priority: Low Status: Accepted Type: Enhancement
One of the most annoying parts of the inventory is that the player has to equip backpacks if he wants to look into them. It would be nicer if you could click on a backpack and it would open a new list (replacing the "current" item list). By implementing this we could also get rid of the backpack list completely.
1.0
Allow "opening" of backpacks in the inventory - One of the most annoying parts of the inventory is that the player has to equip backpacks if he wants to look into them. It would be nicer if you could click on a backpack and it would open a new list (replacing the "current" item list). By implementing this we could also get rid of the backpack list completely.
priority
allow opening of backpacks in the inventory one of the most annoying parts of the inventory is that the player has to equip backpacks if he wants to look into them it would be nicer if you could click on a backpack and it would open a new list replacing the current item list by implementing this we could also get rid of the backpack list completely
1
442,113
30,818,046,320
IssuesEvent
2023-08-01 14:36:08
siemens/ix
https://api.github.com/repos/siemens/ix
closed
Improve migration guide
type: bug component: documentation triage
### What happened? Include breaking changes on comonent level to migration guide (link changelog)
1.0
Improve migration guide - ### What happened? Include breaking changes on comonent level to migration guide (link changelog)
non_priority
improve migration guide what happened include breaking changes on comonent level to migration guide link changelog
0
768,984
26,989,853,013
IssuesEvent
2023-02-09 18:57:23
chaotic-aur/packages
https://api.github.com/repos/chaotic-aur/packages
closed
[Request] monkeysphere
request:new-pkg interfere required priority:low
### Link to the package base(s) in the AUR https://aur.archlinux.org/packages/monkeysphere ### Utility this package has for you Leverage the OpenPGP web of trust for OpenSSH and Web authentication Lol, I just used to to convert my GPG key to an OenSSH one. ### Do you consider the package(s) to be useful for every Chaotic-AUR user? No, but for a few. ### Do you consider the package to be useful for feature testing/preview? - [ ] Yes ### Have you tested if the package builds in a clean chroot? - [ ] Yes ### Does the package's license allow redistributing it? YES! ### Have you searched the issues to ensure this request is unique? - [X] YES! ### Have you read the README to ensure this package is not banned? - [X] YES! ### More information Actually, build failed.
1.0
[Request] monkeysphere - ### Link to the package base(s) in the AUR https://aur.archlinux.org/packages/monkeysphere ### Utility this package has for you Leverage the OpenPGP web of trust for OpenSSH and Web authentication Lol, I just used to to convert my GPG key to an OenSSH one. ### Do you consider the package(s) to be useful for every Chaotic-AUR user? No, but for a few. ### Do you consider the package to be useful for feature testing/preview? - [ ] Yes ### Have you tested if the package builds in a clean chroot? - [ ] Yes ### Does the package's license allow redistributing it? YES! ### Have you searched the issues to ensure this request is unique? - [X] YES! ### Have you read the README to ensure this package is not banned? - [X] YES! ### More information Actually, build failed.
priority
monkeysphere link to the package base s in the aur utility this package has for you leverage the openpgp web of trust for openssh and web authentication lol i just used to to convert my gpg key to an oenssh one do you consider the package s to be useful for every chaotic aur user no but for a few do you consider the package to be useful for feature testing preview yes have you tested if the package builds in a clean chroot yes does the package s license allow redistributing it yes have you searched the issues to ensure this request is unique yes have you read the readme to ensure this package is not banned yes more information actually build failed
1
299,839
9,205,902,306
IssuesEvent
2019-03-08 12:03:02
qissue-bot/QGIS
https://api.github.com/repos/qissue-bot/QGIS
closed
detect invalid split if splitting line ends in polygon
Category: Digitising Component: Affected QGIS version Component: Crashes QGIS or corrupts data Component: Easy fix? Component: Operating System Component: Pull Request or Patch supplied Component: Regression? Component: Resolution Priority: Low Project: QGIS Application Status: Closed Tracker: Bug report
--- Author Name: **Marco Hugentobler** (Marco Hugentobler) Original Redmine Issue: 1201, https://issues.qgis.org/issues/1201 Original Assignee: Marco Hugentobler --- If a splitting line starts outside a polygon and ends inside it, the user should receive an error message. Instead, a vertex is added where the split line crosses the polygon border.
1.0
detect invalid split if splitting line ends in polygon - --- Author Name: **Marco Hugentobler** (Marco Hugentobler) Original Redmine Issue: 1201, https://issues.qgis.org/issues/1201 Original Assignee: Marco Hugentobler --- If a splitting line starts outside a polygon and ends inside it, the user should receive an error message. Instead, a vertex is added where the split line crosses the polygon border.
priority
detect invalid split if splitting line ends in polygon author name marco hugentobler marco hugentobler original redmine issue original assignee marco hugentobler if a splitting line starts outside a polygon and ends inside it the user should receive an error message instead a vertex is added where the split line crosses the polygon border
1
371,424
25,951,529,743
IssuesEvent
2022-12-17 17:14:34
ashn-dot-dev/sunder
https://api.github.com/repos/ashn-dot-dev/sunder
closed
Add compiler reference
documentation wontfix
Add high level documentation for the architecture of the compiler. This documentation should provide a high-level overview of the compiler, the phases of compilation, and the data structures used throughout the compiler's C source. It may be worth waiting until the compiler is stabilized before beginning this document as the language and compiler are still undergoing rapid changes.
1.0
Add compiler reference - Add high level documentation for the architecture of the compiler. This documentation should provide a high-level overview of the compiler, the phases of compilation, and the data structures used throughout the compiler's C source. It may be worth waiting until the compiler is stabilized before beginning this document as the language and compiler are still undergoing rapid changes.
non_priority
add compiler reference add high level documentation for the architecture of the compiler this documentation should provide a high level overview of the compiler the phases of compilation and the data structures used throughout the compiler s c source it may be worth waiting until the compiler is stabilized before beginning this document as the language and compiler are still undergoing rapid changes
0
183,169
21,714,465,472
IssuesEvent
2022-05-10 16:29:56
svg-GHC-2/test_django.nv
https://api.github.com/repos/svg-GHC-2/test_django.nv
opened
bootstrap-3.2.0.js: 6 vulnerabilities (highest severity is: 6.1)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.2.0.js</b></p></summary> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2019-8331](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-8331) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | bootstrap-3.2.0.js | Direct | bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1 | &#10060; | | [CVE-2018-14040](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14040) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | bootstrap-3.2.0.js | Direct | org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0 | &#10060; | | [CVE-2018-20677](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20677) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | bootstrap-3.2.0.js | Direct | Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0 | &#10060; | | [CVE-2018-20676](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20676) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | bootstrap-3.2.0.js | Direct | bootstrap - 3.4.0 | &#10060; | | [CVE-2018-14042](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14042) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | bootstrap-3.2.0.js | Direct | org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0 | &#10060; | | [CVE-2016-10735](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10735) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | bootstrap-3.2.0.js | Direct | bootstrap - 3.4.0, 4.0.0-beta.2 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-8331</summary> ### Vulnerable Library - <b>bootstrap-3.2.0.js</b></p> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute. <p>Publish Date: 2019-02-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-8331>CVE-2019-8331</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/pull/28236">https://github.com/twbs/bootstrap/pull/28236</a></p> <p>Release Date: 2019-02-20</p> <p>Fix Resolution: bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-14040</summary> ### Vulnerable Library - <b>bootstrap-3.2.0.js</b></p> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. <p>Publish Date: 2018-07-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14040>CVE-2018-14040</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/pull/26630">https://github.com/twbs/bootstrap/pull/26630</a></p> <p>Release Date: 2018-07-13</p> <p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-20677</summary> ### Vulnerable Library - <b>bootstrap-3.2.0.js</b></p> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property. <p>Publish Date: 2019-01-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20677>CVE-2018-20677</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677</a></p> <p>Release Date: 2019-01-09</p> <p>Fix Resolution: Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-20676</summary> ### Vulnerable Library - <b>bootstrap-3.2.0.js</b></p> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute. <p>Publish Date: 2019-01-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20676>CVE-2018-20676</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676</a></p> <p>Release Date: 2019-01-09</p> <p>Fix Resolution: bootstrap - 3.4.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-14042</summary> ### Vulnerable Library - <b>bootstrap-3.2.0.js</b></p> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. <p>Publish Date: 2018-07-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14042>CVE-2018-14042</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/pull/26630">https://github.com/twbs/bootstrap/pull/26630</a></p> <p>Release Date: 2018-07-13</p> <p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-10735</summary> ### Vulnerable Library - <b>bootstrap-3.2.0.js</b></p> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041. <p>Publish Date: 2019-01-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10735>CVE-2016-10735</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735</a></p> <p>Release Date: 2019-01-09</p> <p>Fix Resolution: bootstrap - 3.4.0, 4.0.0-beta.2</p> </p> <p></p> </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2019-8331","vulnerabilityDetails":"In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-8331","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-14040","vulnerabilityDetails":"In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14040","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-20677","vulnerabilityDetails":"In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20677","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"bootstrap - 3.4.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-20676","vulnerabilityDetails":"In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20676","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-14042","vulnerabilityDetails":"In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14042","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"bootstrap - 3.4.0, 4.0.0-beta.2","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2016-10735","vulnerabilityDetails":"In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10735","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}]</REMEDIATE> -->
True
bootstrap-3.2.0.js: 6 vulnerabilities (highest severity is: 6.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.2.0.js</b></p></summary> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2019-8331](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-8331) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | bootstrap-3.2.0.js | Direct | bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1 | &#10060; | | [CVE-2018-14040](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14040) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | bootstrap-3.2.0.js | Direct | org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0 | &#10060; | | [CVE-2018-20677](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20677) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | bootstrap-3.2.0.js | Direct | Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0 | &#10060; | | [CVE-2018-20676](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20676) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | bootstrap-3.2.0.js | Direct | bootstrap - 3.4.0 | &#10060; | | [CVE-2018-14042](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14042) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | bootstrap-3.2.0.js | Direct | org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0 | &#10060; | | [CVE-2016-10735](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10735) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | bootstrap-3.2.0.js | Direct | bootstrap - 3.4.0, 4.0.0-beta.2 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-8331</summary> ### Vulnerable Library - <b>bootstrap-3.2.0.js</b></p> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute. <p>Publish Date: 2019-02-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-8331>CVE-2019-8331</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/pull/28236">https://github.com/twbs/bootstrap/pull/28236</a></p> <p>Release Date: 2019-02-20</p> <p>Fix Resolution: bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-14040</summary> ### Vulnerable Library - <b>bootstrap-3.2.0.js</b></p> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. <p>Publish Date: 2018-07-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14040>CVE-2018-14040</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/pull/26630">https://github.com/twbs/bootstrap/pull/26630</a></p> <p>Release Date: 2018-07-13</p> <p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-20677</summary> ### Vulnerable Library - <b>bootstrap-3.2.0.js</b></p> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property. <p>Publish Date: 2019-01-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20677>CVE-2018-20677</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677</a></p> <p>Release Date: 2019-01-09</p> <p>Fix Resolution: Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-20676</summary> ### Vulnerable Library - <b>bootstrap-3.2.0.js</b></p> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute. <p>Publish Date: 2019-01-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20676>CVE-2018-20676</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676</a></p> <p>Release Date: 2019-01-09</p> <p>Fix Resolution: bootstrap - 3.4.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-14042</summary> ### Vulnerable Library - <b>bootstrap-3.2.0.js</b></p> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. <p>Publish Date: 2018-07-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14042>CVE-2018-14042</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/pull/26630">https://github.com/twbs/bootstrap/pull/26630</a></p> <p>Release Date: 2018-07-13</p> <p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-10735</summary> ### Vulnerable Library - <b>bootstrap-3.2.0.js</b></p> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.2.0/js/bootstrap.js</a></p> <p>Path to vulnerable library: /taskManager/static/taskManager/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/svg-GHC-2/test_django.nv/commit/021af4213e779168babc65f6444b6f78dda744c3">021af4213e779168babc65f6444b6f78dda744c3</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041. <p>Publish Date: 2019-01-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10735>CVE-2016-10735</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735</a></p> <p>Release Date: 2019-01-09</p> <p>Fix Resolution: bootstrap - 3.4.0, 4.0.0-beta.2</p> </p> <p></p> </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"bootstrap - 3.4.1,4.3.1;bootstrap-sass - 3.4.1,4.3.1","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2019-8331","vulnerabilityDetails":"In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-8331","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-14040","vulnerabilityDetails":"In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14040","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-20677","vulnerabilityDetails":"In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20677","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"bootstrap - 3.4.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-20676","vulnerabilityDetails":"In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20676","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.webjars.npm:bootstrap:4.1.2.org.webjars:bootstrap:3.4.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-14042","vulnerabilityDetails":"In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14042","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"bootstrap - 3.4.0, 4.0.0-beta.2","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2016-10735","vulnerabilityDetails":"In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10735","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}]</REMEDIATE> -->
non_priority
bootstrap js vulnerabilities highest severity is vulnerable library bootstrap js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library taskmanager static taskmanager js bootstrap js found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available medium bootstrap js direct bootstrap bootstrap sass medium bootstrap js direct org webjars npm bootstrap org webjars bootstrap medium bootstrap js direct bootstrap nordron angulartemplate dynamic net express projecttemplates dotnetng template znxtapp core module theme beta jmeter medium bootstrap js direct bootstrap medium bootstrap js direct org webjars npm bootstrap org webjars bootstrap medium bootstrap js direct bootstrap beta details cve vulnerable library bootstrap js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library taskmanager static taskmanager js bootstrap js dependency hierarchy x bootstrap js vulnerable library found in head commit a href found in base branch main vulnerability details in bootstrap before and x before xss is possible in the tooltip or popover data template attribute publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bootstrap bootstrap sass cve vulnerable library bootstrap js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library taskmanager static taskmanager js bootstrap js dependency hierarchy x bootstrap js vulnerable library found in head commit a href found in base branch main vulnerability details in bootstrap before xss is possible in the collapse data parent attribute publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org webjars npm bootstrap org webjars bootstrap cve vulnerable library bootstrap js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library taskmanager static taskmanager js bootstrap js dependency hierarchy x bootstrap js vulnerable library found in head commit a href found in base branch main vulnerability details in bootstrap before xss is possible in the affix configuration target property publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bootstrap nordron angulartemplate dynamic net express projecttemplates dotnetng template znxtapp core module theme beta jmeter cve vulnerable library bootstrap js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library taskmanager static taskmanager js bootstrap js dependency hierarchy x bootstrap js vulnerable library found in head commit a href found in base branch main vulnerability details in bootstrap before xss is possible in the tooltip data viewport attribute publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bootstrap cve vulnerable library bootstrap js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library taskmanager static taskmanager js bootstrap js dependency hierarchy x bootstrap js vulnerable library found in head commit a href found in base branch main vulnerability details in bootstrap before xss is possible in the data container property of tooltip publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org webjars npm bootstrap org webjars bootstrap cve vulnerable library bootstrap js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library taskmanager static taskmanager js bootstrap js dependency hierarchy x bootstrap js vulnerable library found in head commit a href found in base branch main vulnerability details in bootstrap x before and x beta before beta xss is possible in the data target attribute a different vulnerability than cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bootstrap beta istransitivedependency false dependencytree twitter bootstrap isminimumfixversionavailable true minimumfixversion bootstrap bootstrap sass isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails in bootstrap before and x before xss is possible in the tooltip or popover data template attribute vulnerabilityurl istransitivedependency false dependencytree twitter bootstrap isminimumfixversionavailable true minimumfixversion org webjars npm bootstrap org webjars bootstrap isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails in bootstrap before xss is possible in the collapse data parent attribute vulnerabilityurl istransitivedependency false dependencytree twitter bootstrap isminimumfixversionavailable true minimumfixversion bootstrap nordron angulartemplate dynamic net express projecttemplates dotnetng template znxtapp core module theme beta jmeter isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails in bootstrap before xss is possible in the affix configuration target property vulnerabilityurl istransitivedependency false dependencytree twitter bootstrap isminimumfixversionavailable true minimumfixversion bootstrap isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails in bootstrap before xss is possible in the tooltip data viewport attribute vulnerabilityurl istransitivedependency false dependencytree twitter bootstrap isminimumfixversionavailable true minimumfixversion org webjars npm bootstrap org webjars bootstrap isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails in bootstrap before xss is possible in the data container property of tooltip vulnerabilityurl istransitivedependency false dependencytree twitter bootstrap isminimumfixversionavailable true minimumfixversion bootstrap beta isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails in bootstrap x before and x beta before beta xss is possible in the data target attribute a different vulnerability than cve vulnerabilityurl
0
121,212
4,806,464,733
IssuesEvent
2016-11-02 18:37:22
BlythMeister/Gallifrey
https://api.github.com/repos/BlythMeister/Gallifrey
closed
Export Time to Harvest
Enhancement Low Priority
Using a config switch export time to harvests rather than jira. When config on, allow user to enter their harvest login details. When using harvest, the following needs to happen: 1) background export check run against harvest not jira 2) exported time check prior to exports check harvest and not jira 3) the time export goes to harvest rather than add work log to jira 4) remaining time adjustment still happen in jira
1.0
Export Time to Harvest - Using a config switch export time to harvests rather than jira. When config on, allow user to enter their harvest login details. When using harvest, the following needs to happen: 1) background export check run against harvest not jira 2) exported time check prior to exports check harvest and not jira 3) the time export goes to harvest rather than add work log to jira 4) remaining time adjustment still happen in jira
priority
export time to harvest using a config switch export time to harvests rather than jira when config on allow user to enter their harvest login details when using harvest the following needs to happen background export check run against harvest not jira exported time check prior to exports check harvest and not jira the time export goes to harvest rather than add work log to jira remaining time adjustment still happen in jira
1
204,812
23,283,659,012
IssuesEvent
2022-08-05 14:25:18
hirosystems/explorer
https://api.github.com/repos/hirosystems/explorer
closed
Word wrap for code lines (to increase visibility of hidden codes of any malicious exploit)
Enhancement 💡 P4 Enhancement 🕯 Security
**Is your feature request related to a problem? Please describe.** Time taken to search for hidden codes & exploits, e.g. during Arkadiko hack the exploit codes were hidden outside of the immediate visible view, even if you scroll down vertically, hidden exploit code could not be found. Eventually the hidden exploit was found by scrolling horizontally to the far far right hand side. Exploit contract: https://explorer.stacks.co/txid/0x4d78fe328be831db1b68e50c4eab7fc57c328af5f441d40238436893d1b8ee28?chain=mainnet <img src="https://user-images.githubusercontent.com/92864860/167154633-499bb732-a1e1-4faf-a634-19b3fab708a8.png" width="350px" /> **Describe the solution you'd like** * Word wrap (such as on the Windows Notepad) the lines that out of the immediate screen real estate, so ALL codes are visible immediate as you look at any page loaded. e.g. like below example solution. In the Arkadiko exploit the codes were hidden far right side out of the screen, you had to scroll horizontally a lot to find the hidden exploit codes <img src="https://user-images.githubusercontent.com/92864860/167013127-f6bf6460-a1bf-44be-acca-6b6783609457.png" width="650px" /> <img src="https://user-images.githubusercontent.com/92864860/167013253-7a322544-22aa-4e6c-8c08-f4e121acef16.png" width="200px" /> <img src="https://user-images.githubusercontent.com/92864860/167013184-d6cfb461-5023-4466-9047-18c37bd5116d.png" width="650px" /> **Describe alternatives you've considered** * A scroll bar at the top (Tho there is a scroll bar, but can be easily be missed as it's at the very bottom of the page.) * A scroll bar appear when you hover the code lines. **Benefits** * No codes can escape the view of the current window. Can identify the exploits or bugs much quicker, in order to deploy a counter-exploit much quicker, potentially save a lot of money from the hack. cc: @wileyj @philipdesmedt
True
Word wrap for code lines (to increase visibility of hidden codes of any malicious exploit) - **Is your feature request related to a problem? Please describe.** Time taken to search for hidden codes & exploits, e.g. during Arkadiko hack the exploit codes were hidden outside of the immediate visible view, even if you scroll down vertically, hidden exploit code could not be found. Eventually the hidden exploit was found by scrolling horizontally to the far far right hand side. Exploit contract: https://explorer.stacks.co/txid/0x4d78fe328be831db1b68e50c4eab7fc57c328af5f441d40238436893d1b8ee28?chain=mainnet <img src="https://user-images.githubusercontent.com/92864860/167154633-499bb732-a1e1-4faf-a634-19b3fab708a8.png" width="350px" /> **Describe the solution you'd like** * Word wrap (such as on the Windows Notepad) the lines that out of the immediate screen real estate, so ALL codes are visible immediate as you look at any page loaded. e.g. like below example solution. In the Arkadiko exploit the codes were hidden far right side out of the screen, you had to scroll horizontally a lot to find the hidden exploit codes <img src="https://user-images.githubusercontent.com/92864860/167013127-f6bf6460-a1bf-44be-acca-6b6783609457.png" width="650px" /> <img src="https://user-images.githubusercontent.com/92864860/167013253-7a322544-22aa-4e6c-8c08-f4e121acef16.png" width="200px" /> <img src="https://user-images.githubusercontent.com/92864860/167013184-d6cfb461-5023-4466-9047-18c37bd5116d.png" width="650px" /> **Describe alternatives you've considered** * A scroll bar at the top (Tho there is a scroll bar, but can be easily be missed as it's at the very bottom of the page.) * A scroll bar appear when you hover the code lines. **Benefits** * No codes can escape the view of the current window. Can identify the exploits or bugs much quicker, in order to deploy a counter-exploit much quicker, potentially save a lot of money from the hack. cc: @wileyj @philipdesmedt
non_priority
word wrap for code lines to increase visibility of hidden codes of any malicious exploit is your feature request related to a problem please describe time taken to search for hidden codes exploits e g during arkadiko hack the exploit codes were hidden outside of the immediate visible view even if you scroll down vertically hidden exploit code could not be found eventually the hidden exploit was found by scrolling horizontally to the far far right hand side exploit contract describe the solution you d like word wrap such as on the windows notepad the lines that out of the immediate screen real estate so all codes are visible immediate as you look at any page loaded e g like below example solution in the arkadiko exploit the codes were hidden far right side out of the screen you had to scroll horizontally a lot to find the hidden exploit codes describe alternatives you ve considered a scroll bar at the top tho there is a scroll bar but can be easily be missed as it s at the very bottom of the page a scroll bar appear when you hover the code lines benefits no codes can escape the view of the current window can identify the exploits or bugs much quicker in order to deploy a counter exploit much quicker potentially save a lot of money from the hack cc wileyj philipdesmedt
0
136,351
18,734,096,901
IssuesEvent
2021-11-04 03:39:33
Dima2022/kaltura-sample-code
https://api.github.com/repos/Dima2022/kaltura-sample-code
opened
CVE-2018-12022 (High) detected in jackson-databind-2.8.9.jar
security vulnerability
## CVE-2018-12022 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.9.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: kaltura-sample-code/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.9/jackson-databind-2.8.9.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-1.5.6.RELEASE.jar (Root Library) - :x: **jackson-databind-2.8.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2022/kaltura-sample-code/commit/e022312630d07a000d07ace8bd86a7f0590a0f65">e022312630d07a000d07ace8bd86a7f0590a0f65</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload. <p>Publish Date: 2019-03-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12022>CVE-2018-12022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022</a></p> <p>Release Date: 2019-03-21</p> <p>Fix Resolution: 2.7.9.4, 2.8.11.2, 2.9.6</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.9","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-web:1.5.6.RELEASE;com.fasterxml.jackson.core:jackson-databind:2.8.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.7.9.4, 2.8.11.2, 2.9.6"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-12022","vulnerabilityDetails":"An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12022","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2018-12022 (High) detected in jackson-databind-2.8.9.jar - ## CVE-2018-12022 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.9.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: kaltura-sample-code/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.9/jackson-databind-2.8.9.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-1.5.6.RELEASE.jar (Root Library) - :x: **jackson-databind-2.8.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2022/kaltura-sample-code/commit/e022312630d07a000d07ace8bd86a7f0590a0f65">e022312630d07a000d07ace8bd86a7f0590a0f65</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload. <p>Publish Date: 2019-03-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12022>CVE-2018-12022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022</a></p> <p>Release Date: 2019-03-21</p> <p>Fix Resolution: 2.7.9.4, 2.8.11.2, 2.9.6</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.9","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-web:1.5.6.RELEASE;com.fasterxml.jackson.core:jackson-databind:2.8.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.7.9.4, 2.8.11.2, 2.9.6"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-12022","vulnerabilityDetails":"An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12022","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file kaltura sample code pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in fasterxml jackson databind prior to and when default typing is enabled either globally or for a specific property the service has the jodd db jar for database access for the jodd framework in the classpath and an attacker can provide an ldap service to access it is possible to make the service execute a malicious payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org springframework boot spring boot starter web release com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails an issue was discovered in fasterxml jackson databind prior to and when default typing is enabled either globally or for a specific property the service has the jodd db jar for database access for the jodd framework in the classpath and an attacker can provide an ldap service to access it is possible to make the service execute a malicious payload vulnerabilityurl
0
272,923
29,795,133,492
IssuesEvent
2023-06-16 01:13:45
billmcchesney1/pacbot
https://api.github.com/repos/billmcchesney1/pacbot
closed
CVE-2019-7614 (Medium) detected in elasticsearch-5.6.2.jar, elasticsearch-5.6.8.jar - autoclosed
Mend: dependency security vulnerability
## CVE-2019-7614 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>elasticsearch-5.6.2.jar</b>, <b>elasticsearch-5.6.8.jar</b></p></summary> <p> <details><summary><b>elasticsearch-5.6.2.jar</b></p></summary> <p>Elasticsearch subproject :core</p> <p>Library home page: <a href="https://github.com/elastic/elasticsearch">https://github.com/elastic/elasticsearch</a></p> <p>Path to dependency file: /api/pacman-api-compliance/pom.xml</p> <p>Path to vulnerable library: /canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.2/elasticsearch-5.6.2.jar,/canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.2/elasticsearch-5.6.2.jar,/canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.2/elasticsearch-5.6.2.jar,/canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.2/elasticsearch-5.6.2.jar,/canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.2/elasticsearch-5.6.2.jar,/canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.2/elasticsearch-5.6.2.jar</p> <p> Dependency Hierarchy: - :x: **elasticsearch-5.6.2.jar** (Vulnerable Library) </details> <details><summary><b>elasticsearch-5.6.8.jar</b></p></summary> <p>Elasticsearch subproject :core</p> <p>Library home page: <a href="https://github.com/elastic/elasticsearch">https://github.com/elastic/elasticsearch</a></p> <p>Path to dependency file: /jobs/pacman-rule-engine-2.0/pom.xml</p> <p>Path to vulnerable library: /canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.8/elasticsearch-5.6.8.jar</p> <p> Dependency Hierarchy: - :x: **elasticsearch-5.6.8.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/billmcchesney1/pacbot/commit/acf9a0620c1a37cee4f2896d71e1c3731c5c7b06">acf9a0620c1a37cee4f2896d71e1c3731c5c7b06</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> A race condition flaw was found in the response headers Elasticsearch versions before 7.2.1 and 6.8.2 returns to a request. On a system with multiple users submitting requests, it could be possible for an attacker to gain access to response header containing sensitive data from another user. <p>Publish Date: 2019-07-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-7614>CVE-2019-7614</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7614">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7614</a></p> <p>Release Date: 2019-07-30</p> <p>Fix Resolution: 6.8.2</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
True
CVE-2019-7614 (Medium) detected in elasticsearch-5.6.2.jar, elasticsearch-5.6.8.jar - autoclosed - ## CVE-2019-7614 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>elasticsearch-5.6.2.jar</b>, <b>elasticsearch-5.6.8.jar</b></p></summary> <p> <details><summary><b>elasticsearch-5.6.2.jar</b></p></summary> <p>Elasticsearch subproject :core</p> <p>Library home page: <a href="https://github.com/elastic/elasticsearch">https://github.com/elastic/elasticsearch</a></p> <p>Path to dependency file: /api/pacman-api-compliance/pom.xml</p> <p>Path to vulnerable library: /canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.2/elasticsearch-5.6.2.jar,/canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.2/elasticsearch-5.6.2.jar,/canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.2/elasticsearch-5.6.2.jar,/canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.2/elasticsearch-5.6.2.jar,/canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.2/elasticsearch-5.6.2.jar,/canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.2/elasticsearch-5.6.2.jar</p> <p> Dependency Hierarchy: - :x: **elasticsearch-5.6.2.jar** (Vulnerable Library) </details> <details><summary><b>elasticsearch-5.6.8.jar</b></p></summary> <p>Elasticsearch subproject :core</p> <p>Library home page: <a href="https://github.com/elastic/elasticsearch">https://github.com/elastic/elasticsearch</a></p> <p>Path to dependency file: /jobs/pacman-rule-engine-2.0/pom.xml</p> <p>Path to vulnerable library: /canner/.m2/repository/org/elasticsearch/elasticsearch/5.6.8/elasticsearch-5.6.8.jar</p> <p> Dependency Hierarchy: - :x: **elasticsearch-5.6.8.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/billmcchesney1/pacbot/commit/acf9a0620c1a37cee4f2896d71e1c3731c5c7b06">acf9a0620c1a37cee4f2896d71e1c3731c5c7b06</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> A race condition flaw was found in the response headers Elasticsearch versions before 7.2.1 and 6.8.2 returns to a request. On a system with multiple users submitting requests, it could be possible for an attacker to gain access to response header containing sensitive data from another user. <p>Publish Date: 2019-07-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-7614>CVE-2019-7614</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7614">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7614</a></p> <p>Release Date: 2019-07-30</p> <p>Fix Resolution: 6.8.2</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
non_priority
cve medium detected in elasticsearch jar elasticsearch jar autoclosed cve medium severity vulnerability vulnerable libraries elasticsearch jar elasticsearch jar elasticsearch jar elasticsearch subproject core library home page a href path to dependency file api pacman api compliance pom xml path to vulnerable library canner repository org elasticsearch elasticsearch elasticsearch jar canner repository org elasticsearch elasticsearch elasticsearch jar canner repository org elasticsearch elasticsearch elasticsearch jar canner repository org elasticsearch elasticsearch elasticsearch jar canner repository org elasticsearch elasticsearch elasticsearch jar canner repository org elasticsearch elasticsearch elasticsearch jar dependency hierarchy x elasticsearch jar vulnerable library elasticsearch jar elasticsearch subproject core library home page a href path to dependency file jobs pacman rule engine pom xml path to vulnerable library canner repository org elasticsearch elasticsearch elasticsearch jar dependency hierarchy x elasticsearch jar vulnerable library found in head commit a href found in base branch master vulnerability details a race condition flaw was found in the response headers elasticsearch versions before and returns to a request on a system with multiple users submitting requests it could be possible for an attacker to gain access to response header containing sensitive data from another user publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution check this box to open an automated fix pr
0
709,257
24,371,902,334
IssuesEvent
2022-10-03 20:05:40
red-hat-storage/ocs-ci
https://api.github.com/repos/red-hat-storage/ocs-ci
closed
Handling existing cluster outside qe
High Priority lifecycle/stale
We have seen couple of issues that needs to be addressed when existing cluster is used from outside qe 1) Download of oc binary in bin/folder if not already present 2) Dont bailout on report version checks in operators and catalog namespace ex: """ -OPERATOR_CATALOG_SOURCE_NAME = "ocs-catalogsource" +OPERATOR_CATALOG_SOURCE_NAME = "redhat-operators" $ oc -n openshift-marketplace --kubeconfig /Users/kylebader/src/infra-nodes/kb/auth/kubeconfig get CatalogSource ocs-catalogsource -n openshift-marketplace -o yaml Error from server (NotFound): catalogsources.operators.coreos.com "ocs-catalogsource" not found """ 3) cluster-name should not be mandatory 4) mcg tests loads s3 config in pytest customization - add exception checks
1.0
Handling existing cluster outside qe - We have seen couple of issues that needs to be addressed when existing cluster is used from outside qe 1) Download of oc binary in bin/folder if not already present 2) Dont bailout on report version checks in operators and catalog namespace ex: """ -OPERATOR_CATALOG_SOURCE_NAME = "ocs-catalogsource" +OPERATOR_CATALOG_SOURCE_NAME = "redhat-operators" $ oc -n openshift-marketplace --kubeconfig /Users/kylebader/src/infra-nodes/kb/auth/kubeconfig get CatalogSource ocs-catalogsource -n openshift-marketplace -o yaml Error from server (NotFound): catalogsources.operators.coreos.com "ocs-catalogsource" not found """ 3) cluster-name should not be mandatory 4) mcg tests loads s3 config in pytest customization - add exception checks
priority
handling existing cluster outside qe we have seen couple of issues that needs to be addressed when existing cluster is used from outside qe download of oc binary in bin folder if not already present dont bailout on report version checks in operators and catalog namespace ex operator catalog source name ocs catalogsource operator catalog source name redhat operators oc n openshift marketplace kubeconfig users kylebader src infra nodes kb auth kubeconfig get catalogsource ocs catalogsource n openshift marketplace o yaml error from server notfound catalogsources operators coreos com ocs catalogsource not found cluster name should not be mandatory mcg tests loads config in pytest customization add exception checks
1
16,876
10,575,968,907
IssuesEvent
2019-10-07 16:49:09
cityofaustin/atd-vz-data
https://api.github.com/repos/cityofaustin/atd-vz-data
opened
VZD/E: Need ability to modify fatality flag
MVP Project: Vision Zero Crash Data System Service: Dev Workgroup: VZ
- [ ] Add Two new columns to Crash DB Table: - `apd_confirmed_fatality` - `apd_confirmed_death_count` - [ ] Add these fields as editable records on the Crash details page.
1.0
VZD/E: Need ability to modify fatality flag - - [ ] Add Two new columns to Crash DB Table: - `apd_confirmed_fatality` - `apd_confirmed_death_count` - [ ] Add these fields as editable records on the Crash details page.
non_priority
vzd e need ability to modify fatality flag add two new columns to crash db table apd confirmed fatality apd confirmed death count add these fields as editable records on the crash details page
0
277,258
30,610,816,814
IssuesEvent
2023-07-23 15:31:32
tyhal/tyhal.com
https://api.github.com/repos/tyhal/tyhal.com
closed
CVE-2021-24033 (Medium) detected in react-dev-utils-11.0.0.tgz
security vulnerability
## CVE-2021-24033 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>react-dev-utils-11.0.0.tgz</b></p></summary> <p>webpack utilities used by Create React App</p> <p>Library home page: <a href="https://registry.npmjs.org/react-dev-utils/-/react-dev-utils-11.0.0.tgz">https://registry.npmjs.org/react-dev-utils/-/react-dev-utils-11.0.0.tgz</a></p> <p>Path to dependency file: tyhal.com/package.json</p> <p>Path to vulnerable library: tyhal.com/node_modules/react-dev-utils/package.json</p> <p> Dependency Hierarchy: - react-scripts-4.0.0.tgz (Root Library) - :x: **react-dev-utils-11.0.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you. <p>Publish Date: 2021-03-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-24033>CVE-2021-24033</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.facebook.com/security/advisories/cve-2021-24033">https://www.facebook.com/security/advisories/cve-2021-24033</a></p> <p>Release Date: 2021-03-09</p> <p>Fix Resolution: react-dev-utils-11.0.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-24033 (Medium) detected in react-dev-utils-11.0.0.tgz - ## CVE-2021-24033 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>react-dev-utils-11.0.0.tgz</b></p></summary> <p>webpack utilities used by Create React App</p> <p>Library home page: <a href="https://registry.npmjs.org/react-dev-utils/-/react-dev-utils-11.0.0.tgz">https://registry.npmjs.org/react-dev-utils/-/react-dev-utils-11.0.0.tgz</a></p> <p>Path to dependency file: tyhal.com/package.json</p> <p>Path to vulnerable library: tyhal.com/node_modules/react-dev-utils/package.json</p> <p> Dependency Hierarchy: - react-scripts-4.0.0.tgz (Root Library) - :x: **react-dev-utils-11.0.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you. <p>Publish Date: 2021-03-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-24033>CVE-2021-24033</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.facebook.com/security/advisories/cve-2021-24033">https://www.facebook.com/security/advisories/cve-2021-24033</a></p> <p>Release Date: 2021-03-09</p> <p>Fix Resolution: react-dev-utils-11.0.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in react dev utils tgz cve medium severity vulnerability vulnerable library react dev utils tgz webpack utilities used by create react app library home page a href path to dependency file tyhal com package json path to vulnerable library tyhal com node modules react dev utils package json dependency hierarchy react scripts tgz root library x react dev utils tgz vulnerable library found in base branch master vulnerability details react dev utils prior to exposes a function getprocessforport where an input argument is concatenated into a command string to be executed this function is typically used from react scripts in create react app projects where the usage is safe only when this function is manually invoked with user provided values ie by custom code is there the potential for command injection if you re consuming it from react scripts then this issue does not affect you publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution react dev utils step up your open source security game with whitesource
0
321,200
9,794,968,580
IssuesEvent
2019-06-11 01:30:52
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
iontelevision.com - The TV schedule is not properly rendered
browser-firefox engine-gecko priority-normal severity-minor
<!-- @browser: Firefox Nightly 68.0a1 (2019-06-07) --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36 --> <!-- @reported_with: --> **URL**: https://iontelevision.com/schedule **Browser / Version**: Firefox Nightly 68.0a1 (2019-06-07) **Operating System**: Huawei P10 (Android 8.0) - 1080 x 1920 pixels (~432 ppi pixel density) **Tested Another Browser**: Yes **Problem type**: Design is broken **Description**: The TV schedule is not properly rendered **Steps to Reproduce**: 1. Navigate to https://iontelevision.com/schedule 2. Observe the displayed TV schedule. **Expected Behavior:** The TV schedule must be properly rendered. **Actual Behavior:** The schedule is not properly rendered. The layout is messed up and some dates and the weekdays from the top of the schedule are missing. The schedule is correctly displayed after a light scroll down the page. **Notes:** 1. The issue is not reproducible on Chrome Mobile 74.0.3729.157 2. Screenshots attached. **Watchers:** @softvision-oana-arbuzov @softvision-sergiulogigan @cipriansv sv; [![Screenshot Description](https://webcompat.com/uploads/2019/6/5cee1810-3642-4c9b-af6d-45f78a2b13d6-thumb.jpg)](https://webcompat.com/uploads/2019/6/5cee1810-3642-4c9b-af6d-45f78a2b13d6.jpg) <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
iontelevision.com - The TV schedule is not properly rendered - <!-- @browser: Firefox Nightly 68.0a1 (2019-06-07) --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36 --> <!-- @reported_with: --> **URL**: https://iontelevision.com/schedule **Browser / Version**: Firefox Nightly 68.0a1 (2019-06-07) **Operating System**: Huawei P10 (Android 8.0) - 1080 x 1920 pixels (~432 ppi pixel density) **Tested Another Browser**: Yes **Problem type**: Design is broken **Description**: The TV schedule is not properly rendered **Steps to Reproduce**: 1. Navigate to https://iontelevision.com/schedule 2. Observe the displayed TV schedule. **Expected Behavior:** The TV schedule must be properly rendered. **Actual Behavior:** The schedule is not properly rendered. The layout is messed up and some dates and the weekdays from the top of the schedule are missing. The schedule is correctly displayed after a light scroll down the page. **Notes:** 1. The issue is not reproducible on Chrome Mobile 74.0.3729.157 2. Screenshots attached. **Watchers:** @softvision-oana-arbuzov @softvision-sergiulogigan @cipriansv sv; [![Screenshot Description](https://webcompat.com/uploads/2019/6/5cee1810-3642-4c9b-af6d-45f78a2b13d6-thumb.jpg)](https://webcompat.com/uploads/2019/6/5cee1810-3642-4c9b-af6d-45f78a2b13d6.jpg) <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
priority
iontelevision com the tv schedule is not properly rendered url browser version firefox nightly operating system huawei android x pixels ppi pixel density tested another browser yes problem type design is broken description the tv schedule is not properly rendered steps to reproduce navigate to observe the displayed tv schedule expected behavior the tv schedule must be properly rendered actual behavior the schedule is not properly rendered the layout is messed up and some dates and the weekdays from the top of the schedule are missing the schedule is correctly displayed after a light scroll down the page notes the issue is not reproducible on chrome mobile screenshots attached watchers softvision oana arbuzov softvision sergiulogigan cipriansv sv browser configuration none from with ❤️
1
34,075
6,288,618,324
IssuesEvent
2017-07-19 17:23:16
hammerandchisel/discord-api-docs
https://api.github.com/repos/hammerandchisel/discord-api-docs
closed
Session Start Rate Limit
documentation needed
We're deploying a change soon that will hopefully automatically reset your bot's token if you're starting way too many sessions within a 24 hour period. Right now - that limit is 1,000 sessions (meaning successfully calling `IDENTIFY` via the websocket -`RESUME`s do not count). The reasoning behind this is that due to bad restart scripts/code, bots tend to get into "restart loops" - indefinitely until the bot operator notices. The idea here is to make it so that if your bot gets stuck into a restart loop, you'll have to manually intervene by updating it's token. When you reach the limit, you'll receive a notification e-mail saying your bot token has been reset. When this happens all active sessions for that bot will be terminated. This limit is for the given bot application, and is global across all shards. If you are running a large bot across many shards, having a test bot that you test stuff on is recommended rather than testing on your large bot and restarting it. ## TODO: - [x] Deploy This - [x] Add to Docs
1.0
Session Start Rate Limit - We're deploying a change soon that will hopefully automatically reset your bot's token if you're starting way too many sessions within a 24 hour period. Right now - that limit is 1,000 sessions (meaning successfully calling `IDENTIFY` via the websocket -`RESUME`s do not count). The reasoning behind this is that due to bad restart scripts/code, bots tend to get into "restart loops" - indefinitely until the bot operator notices. The idea here is to make it so that if your bot gets stuck into a restart loop, you'll have to manually intervene by updating it's token. When you reach the limit, you'll receive a notification e-mail saying your bot token has been reset. When this happens all active sessions for that bot will be terminated. This limit is for the given bot application, and is global across all shards. If you are running a large bot across many shards, having a test bot that you test stuff on is recommended rather than testing on your large bot and restarting it. ## TODO: - [x] Deploy This - [x] Add to Docs
non_priority
session start rate limit we re deploying a change soon that will hopefully automatically reset your bot s token if you re starting way too many sessions within a hour period right now that limit is sessions meaning successfully calling identify via the websocket resume s do not count the reasoning behind this is that due to bad restart scripts code bots tend to get into restart loops indefinitely until the bot operator notices the idea here is to make it so that if your bot gets stuck into a restart loop you ll have to manually intervene by updating it s token when you reach the limit you ll receive a notification e mail saying your bot token has been reset when this happens all active sessions for that bot will be terminated this limit is for the given bot application and is global across all shards if you are running a large bot across many shards having a test bot that you test stuff on is recommended rather than testing on your large bot and restarting it todo deploy this add to docs
0
455,540
13,128,710,087
IssuesEvent
2020-08-06 12:46:32
mozilla/addons-server
https://api.github.com/repos/mozilla/addons-server
opened
Use `hashed_guid`/`hashed_addon_id` for the download stats
component: statistics priority: p3
BQ will expose a `hashed_addon_id` column instead of the currently exposed `addon_id`. We introduced a `hashed_guid` field on the `AddonGUID` model in #15189. This issue is about using hashes to query the download stats (in `stats/utils.py`) as well as updating the CRON job for the weekly downloads.
1.0
Use `hashed_guid`/`hashed_addon_id` for the download stats - BQ will expose a `hashed_addon_id` column instead of the currently exposed `addon_id`. We introduced a `hashed_guid` field on the `AddonGUID` model in #15189. This issue is about using hashes to query the download stats (in `stats/utils.py`) as well as updating the CRON job for the weekly downloads.
priority
use hashed guid hashed addon id for the download stats bq will expose a hashed addon id column instead of the currently exposed addon id we introduced a hashed guid field on the addonguid model in this issue is about using hashes to query the download stats in stats utils py as well as updating the cron job for the weekly downloads
1
224,050
17,657,824,213
IssuesEvent
2021-08-21 00:05:30
nasa/cFE
https://api.github.com/repos/nasa/cFE
closed
No Success Test for CFE_ES_RestartApp
good first issue unit-test
**Is your feature request related to a problem? Please describe.** From #548. No Success Test for CFE_ES_RestartApp. **Describe the solution you'd like** Add a success test for CFE_ES_RestartApp in cFE/modules/es/ut-coverage/es_UT.c. **Requester Info** Ariel Adams, ASRC Federal
1.0
No Success Test for CFE_ES_RestartApp - **Is your feature request related to a problem? Please describe.** From #548. No Success Test for CFE_ES_RestartApp. **Describe the solution you'd like** Add a success test for CFE_ES_RestartApp in cFE/modules/es/ut-coverage/es_UT.c. **Requester Info** Ariel Adams, ASRC Federal
non_priority
no success test for cfe es restartapp is your feature request related to a problem please describe from no success test for cfe es restartapp describe the solution you d like add a success test for cfe es restartapp in cfe modules es ut coverage es ut c requester info ariel adams asrc federal
0
74,816
9,807,919,560
IssuesEvent
2019-06-12 14:38:41
gitcoinco/web
https://api.github.com/repos/gitcoinco/web
closed
Cannot create bounties without Github API Key
bug documentation
**Describe the bug** If you do not enter a github account as noted in the local.env... ``` # These settings will enable github API notification # and gitcoinbot sync's. They are not necessary unless you are planning on # using the Github API ``` ...you cannot create/fund bounties on your local instance **To Reproduce** Use docker, do not enter Github API, try to create a new bounty **Expected behavior** Allow bounty creation **Screenshots** ![grafik](https://user-images.githubusercontent.com/761911/59201372-94d93c80-8b9a-11e9-97ca-bb7a2d45e673.png) ``` web_1 | 10.0.2.2 - - [10/Jun/2019 14:07:48] "GET /static/v2/images/close-red.png HTTP/1.1" 200 - web_1 | WARNING 2019-06-10 14:07:50,459 helpers 17 140381402012392 401 {'message': 'Bad credentials', 'documentation_url': 'https://developer.github.com/v3'} web_1 | 10.0.2.2 - - [10/Jun/2019 14:07:50] "GET /sync/get_issue_details?url=https%3A%2F%2Fgithub.com%2Fgitcoinco%2Fweb%2Fissues%2F4599&token= HTTP/1.1" 200 - web_1 | WARNING 2019-06-10 14:07:53,889 helpers 17 140381402012392 401 {'message': 'Bad credentials', 'documentation_url': 'https://developer.github.com/v3'} web_1 | 10.0.2.2 - - [10/Jun/2019 14:07:53] "GET /sync/get_issue_details?url=https%3A%2F%2Fgithub.com%2Fgitcoinco%2Fweb%2Fissues%2F4599&token= HTTP/1.1" 200 - ```
1.0
Cannot create bounties without Github API Key - **Describe the bug** If you do not enter a github account as noted in the local.env... ``` # These settings will enable github API notification # and gitcoinbot sync's. They are not necessary unless you are planning on # using the Github API ``` ...you cannot create/fund bounties on your local instance **To Reproduce** Use docker, do not enter Github API, try to create a new bounty **Expected behavior** Allow bounty creation **Screenshots** ![grafik](https://user-images.githubusercontent.com/761911/59201372-94d93c80-8b9a-11e9-97ca-bb7a2d45e673.png) ``` web_1 | 10.0.2.2 - - [10/Jun/2019 14:07:48] "GET /static/v2/images/close-red.png HTTP/1.1" 200 - web_1 | WARNING 2019-06-10 14:07:50,459 helpers 17 140381402012392 401 {'message': 'Bad credentials', 'documentation_url': 'https://developer.github.com/v3'} web_1 | 10.0.2.2 - - [10/Jun/2019 14:07:50] "GET /sync/get_issue_details?url=https%3A%2F%2Fgithub.com%2Fgitcoinco%2Fweb%2Fissues%2F4599&token= HTTP/1.1" 200 - web_1 | WARNING 2019-06-10 14:07:53,889 helpers 17 140381402012392 401 {'message': 'Bad credentials', 'documentation_url': 'https://developer.github.com/v3'} web_1 | 10.0.2.2 - - [10/Jun/2019 14:07:53] "GET /sync/get_issue_details?url=https%3A%2F%2Fgithub.com%2Fgitcoinco%2Fweb%2Fissues%2F4599&token= HTTP/1.1" 200 - ```
non_priority
cannot create bounties without github api key describe the bug if you do not enter a github account as noted in the local env these settings will enable github api notification and gitcoinbot sync s they are not necessary unless you are planning on using the github api you cannot create fund bounties on your local instance to reproduce use docker do not enter github api try to create a new bounty expected behavior allow bounty creation screenshots web get static images close red png http web warning helpers message bad credentials documentation url web get sync get issue details url https com token http web warning helpers message bad credentials documentation url web get sync get issue details url https com token http
0
186,785
6,742,692,801
IssuesEvent
2017-10-20 08:52:46
YetiForceCompany/YetiForceCRM
https://api.github.com/repos/YetiForceCompany/YetiForceCRM
closed
Global search issue
Category::Bug Subcategory::HighPriority
<!--- Before you create a new issue, please check out our [manual] (https://yetiforce.com/en/github/issues/126-issues.html) ---> #### Issue <!--- Provide a more detailed introduction to the issue itself, and why you consider it to be a bug. Descriptions can be provided in English or Polish (remember to add [PL] for Polish in the title). --> Global search for all records is not working. #### Actual Behavior <!--- Describe the result --> ![image](https://user-images.githubusercontent.com/20727670/31808862-5b2f95d0-b575-11e7-8711-c1ccd89b789d.png) #### Expected Behavior <!--- Describe what you would want the result to be --> #### How to trigger the error <!--- If possible, please make a video using [ScreenToGif] (https://screentogif.codeplex.com/) or any other program used for recording actions from your desktop. --> 1. 2. 3. #### Your Environment <!---Describe the environment --> * YetiForce Version used: * Browser name and version: * Environment name and version: * Operating System and version: <!--- Please check on your issue from time to time, in case we have questions or need some extra information. --->
1.0
Global search issue - <!--- Before you create a new issue, please check out our [manual] (https://yetiforce.com/en/github/issues/126-issues.html) ---> #### Issue <!--- Provide a more detailed introduction to the issue itself, and why you consider it to be a bug. Descriptions can be provided in English or Polish (remember to add [PL] for Polish in the title). --> Global search for all records is not working. #### Actual Behavior <!--- Describe the result --> ![image](https://user-images.githubusercontent.com/20727670/31808862-5b2f95d0-b575-11e7-8711-c1ccd89b789d.png) #### Expected Behavior <!--- Describe what you would want the result to be --> #### How to trigger the error <!--- If possible, please make a video using [ScreenToGif] (https://screentogif.codeplex.com/) or any other program used for recording actions from your desktop. --> 1. 2. 3. #### Your Environment <!---Describe the environment --> * YetiForce Version used: * Browser name and version: * Environment name and version: * Operating System and version: <!--- Please check on your issue from time to time, in case we have questions or need some extra information. --->
priority
global search issue issue global search for all records is not working actual behavior expected behavior how to trigger the error your environment yetiforce version used browser name and version environment name and version operating system and version
1
46,256
2,951,885,478
IssuesEvent
2015-07-07 03:54:58
rossPatton/stylint
https://api.github.com/repos/rossPatton/stylint
closed
Version 0.9.3 reports selector depth greater than <limit> in-error
bug low priority
```css // // Fonts for Bootstrap // // Import the fonts - using styles produced from fontsquirrel.com @font-face font-family: 'Corpid Heavy' src: url($icon-font-path + 'corpidc1s-heavy-webfont.eot') src: url($icon-font-path + 'corpidc1s-heavy-webfont.eot?#iefix') format('embedded-opentype'), url($icon-font-path + 'corpidc1s-heavy-webfont.woff2') format('woff2'), url($icon-font-path + 'corpidc1s-heavy-webfont.woff') format('woff'), url($icon-font-path + 'corpidc1s-heavy-webfont.ttf') format('truetype'), url($icon-font-path + 'corpidc1s-heavy-webfont.svg#CorpidC1sHeavyRegular') format('svg') font-style: normal font-weight: 500 ... ``` Console log: ```console Warning: selector depth greater than Warning: 3: File: src/modules/core/styles/component/fonts.styl Line: 10: url($icon-font-path + 'corpidc1s-heavy-webfont.woff2') format('woff2'), Warning: selector depth greater than Warning: 3: File: src/modules/core/styles/component/fonts.styl Line: 11: url($icon-font-path + 'corpidc1s-heavy-webfont.woff') format('woff'), Warning: selector depth greater than Warning: 3: File: src/modules/core/styles/component/fonts.styl Line: 12: url($icon-font-path + 'corpidc1s-heavy-webfont.ttf') format('truetype'), Warning: selector depth greater than Warning: 3: File: src/modules/core/styles/component/fonts.styl Line: 13: url($icon-font-path + 'corpidc1s-heavy-webfont.svg#CorpidC1sHeavyRegular') format('svg') ``` Config: ```json { "alphabetical": false, "borderNone": true, "brackets": false, "colons": false, "colors": false, "commaSpace": true, "commentSpace": false, "cssLiteral": false, "depthLimit": 3, "duplicates": false, "efficient": true, "enforceBlockStyle": false, "enforceVarStyle": true, "extendPref": "@extend", "globalDupe": true, "indentSpaces": 2, "leadingZero": false, "maxWarnings": 50, "maxWarningsKill": false, "mixed": true, "namingConvention": "BEM", "parenSpace": false, "placeholders": false, "semicolons": false, "universal": true, "valid": true, "whitespace": true, "zeroUnits": true, "zIndexDuplicates": false, "zIndexNormalize": false } ``` Stylint Version 0.9.4 Also, the line break in the warning message makes it harder to understand the error. Sorry for the trouble, Ross. I'll revert to 0.9.2 again.
1.0
Version 0.9.3 reports selector depth greater than <limit> in-error - ```css // // Fonts for Bootstrap // // Import the fonts - using styles produced from fontsquirrel.com @font-face font-family: 'Corpid Heavy' src: url($icon-font-path + 'corpidc1s-heavy-webfont.eot') src: url($icon-font-path + 'corpidc1s-heavy-webfont.eot?#iefix') format('embedded-opentype'), url($icon-font-path + 'corpidc1s-heavy-webfont.woff2') format('woff2'), url($icon-font-path + 'corpidc1s-heavy-webfont.woff') format('woff'), url($icon-font-path + 'corpidc1s-heavy-webfont.ttf') format('truetype'), url($icon-font-path + 'corpidc1s-heavy-webfont.svg#CorpidC1sHeavyRegular') format('svg') font-style: normal font-weight: 500 ... ``` Console log: ```console Warning: selector depth greater than Warning: 3: File: src/modules/core/styles/component/fonts.styl Line: 10: url($icon-font-path + 'corpidc1s-heavy-webfont.woff2') format('woff2'), Warning: selector depth greater than Warning: 3: File: src/modules/core/styles/component/fonts.styl Line: 11: url($icon-font-path + 'corpidc1s-heavy-webfont.woff') format('woff'), Warning: selector depth greater than Warning: 3: File: src/modules/core/styles/component/fonts.styl Line: 12: url($icon-font-path + 'corpidc1s-heavy-webfont.ttf') format('truetype'), Warning: selector depth greater than Warning: 3: File: src/modules/core/styles/component/fonts.styl Line: 13: url($icon-font-path + 'corpidc1s-heavy-webfont.svg#CorpidC1sHeavyRegular') format('svg') ``` Config: ```json { "alphabetical": false, "borderNone": true, "brackets": false, "colons": false, "colors": false, "commaSpace": true, "commentSpace": false, "cssLiteral": false, "depthLimit": 3, "duplicates": false, "efficient": true, "enforceBlockStyle": false, "enforceVarStyle": true, "extendPref": "@extend", "globalDupe": true, "indentSpaces": 2, "leadingZero": false, "maxWarnings": 50, "maxWarningsKill": false, "mixed": true, "namingConvention": "BEM", "parenSpace": false, "placeholders": false, "semicolons": false, "universal": true, "valid": true, "whitespace": true, "zeroUnits": true, "zIndexDuplicates": false, "zIndexNormalize": false } ``` Stylint Version 0.9.4 Also, the line break in the warning message makes it harder to understand the error. Sorry for the trouble, Ross. I'll revert to 0.9.2 again.
priority
version reports selector depth greater than in error css fonts for bootstrap import the fonts using styles produced from fontsquirrel com font face font family corpid heavy src url icon font path heavy webfont eot src url icon font path heavy webfont eot iefix format embedded opentype url icon font path heavy webfont format url icon font path heavy webfont woff format woff url icon font path heavy webfont ttf format truetype url icon font path heavy webfont svg format svg font style normal font weight console log console warning selector depth greater than warning file src modules core styles component fonts styl line url icon font path heavy webfont format warning selector depth greater than warning file src modules core styles component fonts styl line url icon font path heavy webfont woff format woff warning selector depth greater than warning file src modules core styles component fonts styl line url icon font path heavy webfont ttf format truetype warning selector depth greater than warning file src modules core styles component fonts styl line url icon font path heavy webfont svg format svg config json alphabetical false bordernone true brackets false colons false colors false commaspace true commentspace false cssliteral false depthlimit duplicates false efficient true enforceblockstyle false enforcevarstyle true extendpref extend globaldupe true indentspaces leadingzero false maxwarnings maxwarningskill false mixed true namingconvention bem parenspace false placeholders false semicolons false universal true valid true whitespace true zerounits true zindexduplicates false zindexnormalize false stylint version also the line break in the warning message makes it harder to understand the error sorry for the trouble ross i ll revert to again
1
100,050
11,171,782,182
IssuesEvent
2019-12-28 22:56:37
nori-io/nori
https://api.github.com/repos/nori-io/nori
opened
Nori Documentation: Intro / Get started
Documentation task
Create documentation: Intro / Get started: #### Intro / Get started There are two main ways to get started with Nori - [ ] Tutorial: Step-by-step instructions on how to install Nori, use and develop plugins. - [ ] Quick start: One page summary of how to install Nori and use plugins.
1.0
Nori Documentation: Intro / Get started - Create documentation: Intro / Get started: #### Intro / Get started There are two main ways to get started with Nori - [ ] Tutorial: Step-by-step instructions on how to install Nori, use and develop plugins. - [ ] Quick start: One page summary of how to install Nori and use plugins.
non_priority
nori documentation intro get started create documentation intro get started intro get started there are two main ways to get started with nori tutorial step by step instructions on how to install nori use and develop plugins quick start one page summary of how to install nori and use plugins
0
18,874
6,652,451,084
IssuesEvent
2017-09-29 01:32:58
HypothesisWorks/hypothesis-python
https://api.github.com/repos/HypothesisWorks/hypothesis-python
opened
Failing build on master due to pulled Numpy release
CI-and-build
https://travis-ci.org/HypothesisWorks/hypothesis-python/builds/281109967 https://www.reddit.com/r/Python/comments/731x9g/numpy_1132_released_with_security_fix/ https://pypi.python.org/pypi/numpy/1.13.2 - [ ] Wait for the Numpy team to release a fixed version - [ ] Merge the Pyup pull when it comes (or push a manual fix) - [ ] Build should pass and automatically deploy from master Hopefully this won't push our removal of 3.3 back to after the EOL date!
1.0
Failing build on master due to pulled Numpy release - https://travis-ci.org/HypothesisWorks/hypothesis-python/builds/281109967 https://www.reddit.com/r/Python/comments/731x9g/numpy_1132_released_with_security_fix/ https://pypi.python.org/pypi/numpy/1.13.2 - [ ] Wait for the Numpy team to release a fixed version - [ ] Merge the Pyup pull when it comes (or push a manual fix) - [ ] Build should pass and automatically deploy from master Hopefully this won't push our removal of 3.3 back to after the EOL date!
non_priority
failing build on master due to pulled numpy release wait for the numpy team to release a fixed version merge the pyup pull when it comes or push a manual fix build should pass and automatically deploy from master hopefully this won t push our removal of back to after the eol date
0
178,428
6,608,692,183
IssuesEvent
2017-09-19 12:03:00
chez-nestor/backoffice
https://api.github.com/repos/chez-nestor/backoffice
closed
Create an API endpoint on our API to list available rooms by city
[priority] P1 [type] enhancement
- [x] Modify the "extractWordpress" script to also return the url of the room - [x] Write a script that, for each room in the db: 1. finds the url of the room page from the data extracted previously 1. tries to fetch the html of the room page on chez-nestor.com, (otherwise, throws an error so that we can fix it manually) 1. parse the html using headless-chrome to list the photos of the room 1. generates a json listing all photos of all rooms - [x] Create a `Photo` smart-collection (see `Invoice` example) - [x] Add a `Photos` smart-association to Room that returns the list of photos from the pre-built JSON And we need to remember to run that script every time a room is added to the WordPress
1.0
Create an API endpoint on our API to list available rooms by city - - [x] Modify the "extractWordpress" script to also return the url of the room - [x] Write a script that, for each room in the db: 1. finds the url of the room page from the data extracted previously 1. tries to fetch the html of the room page on chez-nestor.com, (otherwise, throws an error so that we can fix it manually) 1. parse the html using headless-chrome to list the photos of the room 1. generates a json listing all photos of all rooms - [x] Create a `Photo` smart-collection (see `Invoice` example) - [x] Add a `Photos` smart-association to Room that returns the list of photos from the pre-built JSON And we need to remember to run that script every time a room is added to the WordPress
priority
create an api endpoint on our api to list available rooms by city modify the extractwordpress script to also return the url of the room write a script that for each room in the db finds the url of the room page from the data extracted previously tries to fetch the html of the room page on chez nestor com otherwise throws an error so that we can fix it manually parse the html using headless chrome to list the photos of the room generates a json listing all photos of all rooms create a photo smart collection see invoice example add a photos smart association to room that returns the list of photos from the pre built json and we need to remember to run that script every time a room is added to the wordpress
1
235,826
19,430,362,520
IssuesEvent
2021-12-21 11:12:13
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
roachtest: jepsen/multi-register/start-stop-2 failed
C-test-failure O-robot O-roachtest branch-master release-blocker
roachtest.jepsen/multi-register/start-stop-2 [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=3948712&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=3948712&tab=artifacts#/jepsen/multi-register/start-stop-2) on master @ [3f95a4bd83cce2952a12497de82692866b4da659](https://github.com/cockroachdb/cockroach/commits/3f95a4bd83cce2952a12497de82692866b4da659): ``` | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2050 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.runJepsen.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/jepsen.go:172 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.runJepsen.func3 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/jepsen.go:210 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1581 Wraps: (2) output in run_134034.325146640_n6_bash Wraps: (3) /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod run teamcity-3948712-1639818405-77-n6cpu4:6 -- bash -e -c "\ | cd /mnt/data1/jepsen/cockroachdb && set -eo pipefail && \ | ~/lein run test \ | --tarball file://${PWD}/cockroach.tgz \ | --username ${USER} \ | --ssh-private-key ~/.ssh/id_rsa \ | --os ubuntu \ | --time-limit 300 \ | --concurrency 30 \ | --recovery-time 25 \ | --test-count 1 \ | -n 10.142.1.99 -n 10.142.1.90 -n 10.142.1.63 -n 10.142.1.92 -n 10.142.1.105 \ | --test multi-register --nemesis start-stop-2 \ | > invoke.log 2>&1 \ | " returned | stderr: | Error: SSH_PROBLEM: exit status 255 | (1) SSH_PROBLEM | Wraps: (2) Node 6. Command with error: | | `````` | | bash -e -c "\ | | cd /mnt/data1/jepsen/cockroachdb && set -eo pipefail && \ | | ~/lein run test \ | | --tarball file://${PWD}/cockroach.tgz \ | | --username ${USER} \ | | --ssh-private-key ~/.ssh/id_rsa \ | | --os ubuntu \ | | --time-limit 300 \ | | --concurrency 30 \ | | --recovery-time 25 \ | | --test-count 1 \ | | -n 10.142.1.99 -n 10.142.1.90 -n 10.142.1.63 -n 10.142.1.92 -n 10.142.1.105 \ | | --test multi-register --nemesis start-stop-2 \ | | > invoke.log 2>&1 \ | | " | | `````` | Wraps: (3) exit status 255 | Error types: (1) errors.SSH (2) *hintdetail.withDetail (3) *exec.ExitError | | stdout: Wraps: (4) exit status 10 Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *cluster.WithCommandDetails (4) *exec.ExitError ``` <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> /cc @cockroachdb/kv-triage <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*jepsen/multi-register/start-stop-2.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
2.0
roachtest: jepsen/multi-register/start-stop-2 failed - roachtest.jepsen/multi-register/start-stop-2 [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=3948712&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=3948712&tab=artifacts#/jepsen/multi-register/start-stop-2) on master @ [3f95a4bd83cce2952a12497de82692866b4da659](https://github.com/cockroachdb/cockroach/commits/3f95a4bd83cce2952a12497de82692866b4da659): ``` | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2050 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.runJepsen.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/jepsen.go:172 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.runJepsen.func3 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/jepsen.go:210 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1581 Wraps: (2) output in run_134034.325146640_n6_bash Wraps: (3) /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod run teamcity-3948712-1639818405-77-n6cpu4:6 -- bash -e -c "\ | cd /mnt/data1/jepsen/cockroachdb && set -eo pipefail && \ | ~/lein run test \ | --tarball file://${PWD}/cockroach.tgz \ | --username ${USER} \ | --ssh-private-key ~/.ssh/id_rsa \ | --os ubuntu \ | --time-limit 300 \ | --concurrency 30 \ | --recovery-time 25 \ | --test-count 1 \ | -n 10.142.1.99 -n 10.142.1.90 -n 10.142.1.63 -n 10.142.1.92 -n 10.142.1.105 \ | --test multi-register --nemesis start-stop-2 \ | > invoke.log 2>&1 \ | " returned | stderr: | Error: SSH_PROBLEM: exit status 255 | (1) SSH_PROBLEM | Wraps: (2) Node 6. Command with error: | | `````` | | bash -e -c "\ | | cd /mnt/data1/jepsen/cockroachdb && set -eo pipefail && \ | | ~/lein run test \ | | --tarball file://${PWD}/cockroach.tgz \ | | --username ${USER} \ | | --ssh-private-key ~/.ssh/id_rsa \ | | --os ubuntu \ | | --time-limit 300 \ | | --concurrency 30 \ | | --recovery-time 25 \ | | --test-count 1 \ | | -n 10.142.1.99 -n 10.142.1.90 -n 10.142.1.63 -n 10.142.1.92 -n 10.142.1.105 \ | | --test multi-register --nemesis start-stop-2 \ | | > invoke.log 2>&1 \ | | " | | `````` | Wraps: (3) exit status 255 | Error types: (1) errors.SSH (2) *hintdetail.withDetail (3) *exec.ExitError | | stdout: Wraps: (4) exit status 10 Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *cluster.WithCommandDetails (4) *exec.ExitError ``` <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> /cc @cockroachdb/kv-triage <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*jepsen/multi-register/start-stop-2.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
non_priority
roachtest jepsen multi register start stop failed roachtest jepsen multi register start stop with on master home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go github com cockroachdb cockroach pkg cmd roachtest tests runjepsen home agent work go src github com cockroachdb cockroach pkg cmd roachtest tests jepsen go github com cockroachdb cockroach pkg cmd roachtest tests runjepsen home agent work go src github com cockroachdb cockroach pkg cmd roachtest tests jepsen go runtime goexit usr local go src runtime asm s wraps output in run bash wraps home agent work go src github com cockroachdb cockroach bin roachprod run teamcity bash e c cd mnt jepsen cockroachdb set eo pipefail lein run test tarball file pwd cockroach tgz username user ssh private key ssh id rsa os ubuntu time limit concurrency recovery time test count n n n n n test multi register nemesis start stop invoke log returned stderr error ssh problem exit status ssh problem wraps node command with error bash e c cd mnt jepsen cockroachdb set eo pipefail lein run test tarball file pwd cockroach tgz username user ssh private key ssh id rsa os ubuntu time limit concurrency recovery time test count n n n n n test multi register nemesis start stop invoke log wraps exit status error types errors ssh hintdetail withdetail exec exiterror stdout wraps exit status error types withstack withstack errutil withprefix cluster withcommanddetails exec exiterror help see see cc cockroachdb kv triage
0
105,863
16,661,239,939
IssuesEvent
2021-06-06 11:08:20
AlexRogalskiy/weather-time
https://api.github.com/repos/AlexRogalskiy/weather-time
opened
CVE-2021-23358 (High) detected in underscore-1.6.0.tgz
security vulnerability
## CVE-2021-23358 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>underscore-1.6.0.tgz</b></p></summary> <p>JavaScript's functional programming helper library.</p> <p>Library home page: <a href="https://registry.npmjs.org/underscore/-/underscore-1.6.0.tgz">https://registry.npmjs.org/underscore/-/underscore-1.6.0.tgz</a></p> <p>Path to dependency file: weather-time/package.json</p> <p>Path to vulnerable library: weather-time/node_modules/underscore/package.json</p> <p> Dependency Hierarchy: - jsonlint-1.6.3.tgz (Root Library) - nomnom-1.8.1.tgz - :x: **underscore-1.6.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/weather-time/commit/1553379ffedec7816ab860950e51a5683cc1da71">1553379ffedec7816ab860950e51a5683cc1da71</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized. <p>Publish Date: 2021-03-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358>CVE-2021-23358</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358</a></p> <p>Release Date: 2021-03-29</p> <p>Fix Resolution: underscore - 1.12.1,1.13.0-2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-23358 (High) detected in underscore-1.6.0.tgz - ## CVE-2021-23358 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>underscore-1.6.0.tgz</b></p></summary> <p>JavaScript's functional programming helper library.</p> <p>Library home page: <a href="https://registry.npmjs.org/underscore/-/underscore-1.6.0.tgz">https://registry.npmjs.org/underscore/-/underscore-1.6.0.tgz</a></p> <p>Path to dependency file: weather-time/package.json</p> <p>Path to vulnerable library: weather-time/node_modules/underscore/package.json</p> <p> Dependency Hierarchy: - jsonlint-1.6.3.tgz (Root Library) - nomnom-1.8.1.tgz - :x: **underscore-1.6.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/weather-time/commit/1553379ffedec7816ab860950e51a5683cc1da71">1553379ffedec7816ab860950e51a5683cc1da71</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized. <p>Publish Date: 2021-03-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358>CVE-2021-23358</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358</a></p> <p>Release Date: 2021-03-29</p> <p>Fix Resolution: underscore - 1.12.1,1.13.0-2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in underscore tgz cve high severity vulnerability vulnerable library underscore tgz javascript s functional programming helper library library home page a href path to dependency file weather time package json path to vulnerable library weather time node modules underscore package json dependency hierarchy jsonlint tgz root library nomnom tgz x underscore tgz vulnerable library found in head commit a href found in base branch master vulnerability details the package underscore from and before from and before are vulnerable to arbitrary code injection via the template function particularly when a variable property is passed as an argument as it is not sanitized publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution underscore step up your open source security game with whitesource
0
616,719
19,318,880,080
IssuesEvent
2021-12-14 01:34:58
ethereum/ethereum-org-website
https://api.github.com/repos/ethereum/ethereum-org-website
closed
Add section on crypto mining pool scams
feature :sparkles: help wanted content :fountain_pen: high priority good first issue
**Is your feature request related to a problem? Please describe.** Crypto mining pool scams seem to be the newest popular attack vector for scamming people out of their crypto. We should add this to our security page (and try to optimise for ranking for the term @samajammin ?) **Describe the solution you'd like** Add a section on crypto mining pool scams here on our [security and scam prevention page](https://ethereum.org/en/security/) **Additional context** https://www.indiatimes.com/technology/news/crypto-mining-pool-scam-on-twitter-555251.html https://www.reddit.com/r/CoinBase/comments/r0qe0e/scam_or_possible_incredible_payout/ https://www.reddit.com/r/CryptoCurrency/comments/r2atqi/im_the_guy_from_a_few_days_ago_that_got_scammed/ **Want to contribute?** We love contributions from the Ethereum community! Please comment on an issue if you're interested in helping out with a PR.
1.0
Add section on crypto mining pool scams - **Is your feature request related to a problem? Please describe.** Crypto mining pool scams seem to be the newest popular attack vector for scamming people out of their crypto. We should add this to our security page (and try to optimise for ranking for the term @samajammin ?) **Describe the solution you'd like** Add a section on crypto mining pool scams here on our [security and scam prevention page](https://ethereum.org/en/security/) **Additional context** https://www.indiatimes.com/technology/news/crypto-mining-pool-scam-on-twitter-555251.html https://www.reddit.com/r/CoinBase/comments/r0qe0e/scam_or_possible_incredible_payout/ https://www.reddit.com/r/CryptoCurrency/comments/r2atqi/im_the_guy_from_a_few_days_ago_that_got_scammed/ **Want to contribute?** We love contributions from the Ethereum community! Please comment on an issue if you're interested in helping out with a PR.
priority
add section on crypto mining pool scams is your feature request related to a problem please describe crypto mining pool scams seem to be the newest popular attack vector for scamming people out of their crypto we should add this to our security page and try to optimise for ranking for the term samajammin describe the solution you d like add a section on crypto mining pool scams here on our additional context want to contribute we love contributions from the ethereum community please comment on an issue if you re interested in helping out with a pr
1
129,265
12,403,273,987
IssuesEvent
2020-05-21 13:38:08
NovelCOVID/API
https://api.github.com/repos/NovelCOVID/API
closed
Add CONTRIBUTION guideline
documentation enhancement
Add CONTRIBUTION guideline for improved collaboration in the open source project. It enables a self-onboarding concept for developers.
1.0
Add CONTRIBUTION guideline - Add CONTRIBUTION guideline for improved collaboration in the open source project. It enables a self-onboarding concept for developers.
non_priority
add contribution guideline add contribution guideline for improved collaboration in the open source project it enables a self onboarding concept for developers
0
117,125
11,945,722,625
IssuesEvent
2020-04-03 06:34:42
alushingg/ped
https://api.github.com/repos/alushingg/ped
opened
Admin commands details are not in the UG
severity.Low type.DocumentationBug
In the UG there is only `admin`. ![image.png](https://raw.githubusercontent.com/alushingg/ped/master/files/18ac5f8a-f350-474c-b736-dd2e27c60eb7.png) However, there seems to be many different types of admin commands which you can consider adding into the UG.
1.0
Admin commands details are not in the UG - In the UG there is only `admin`. ![image.png](https://raw.githubusercontent.com/alushingg/ped/master/files/18ac5f8a-f350-474c-b736-dd2e27c60eb7.png) However, there seems to be many different types of admin commands which you can consider adding into the UG.
non_priority
admin commands details are not in the ug in the ug there is only admin however there seems to be many different types of admin commands which you can consider adding into the ug
0
194,146
6,891,929,776
IssuesEvent
2017-11-22 18:53:22
GoogleChrome/lighthouse
https://api.github.com/repos/GoogleChrome/lighthouse
opened
TypeError: Cannot read property '_timing' of undefined
bug needs-priority Sentry
``` TypeError: Cannot read property '_timing' of undefined File "/usr/lib/node_modules/lighthouse/lighthouse-core/audits/time-to-first-byte.js", line 29, col 26, in Function.caclulateTTFB const timing = record._timing; File "/usr/lib/node_modules/lighthouse/lighthouse-core/audits/time-to-first-byte.js", line 47, col 33, in artifacts.requestNetworkRecords.then const ttfb = TTFBMetric.caclulateTTFB(finalUrlRequest); File "internal/process/next_tick.js", line 135, col 7, in process._tickDomainCallback ``` https://sentry.io/google-lighthouse/lighthouse/issues/407357986/
1.0
TypeError: Cannot read property '_timing' of undefined - ``` TypeError: Cannot read property '_timing' of undefined File "/usr/lib/node_modules/lighthouse/lighthouse-core/audits/time-to-first-byte.js", line 29, col 26, in Function.caclulateTTFB const timing = record._timing; File "/usr/lib/node_modules/lighthouse/lighthouse-core/audits/time-to-first-byte.js", line 47, col 33, in artifacts.requestNetworkRecords.then const ttfb = TTFBMetric.caclulateTTFB(finalUrlRequest); File "internal/process/next_tick.js", line 135, col 7, in process._tickDomainCallback ``` https://sentry.io/google-lighthouse/lighthouse/issues/407357986/
priority
typeerror cannot read property timing of undefined typeerror cannot read property timing of undefined file usr lib node modules lighthouse lighthouse core audits time to first byte js line col in function caclulatettfb const timing record timing file usr lib node modules lighthouse lighthouse core audits time to first byte js line col in artifacts requestnetworkrecords then const ttfb ttfbmetric caclulatettfb finalurlrequest file internal process next tick js line col in process tickdomaincallback
1
699,880
24,035,967,680
IssuesEvent
2022-09-15 19:12:19
ME-ICA/tedana
https://api.github.com/repos/ME-ICA/tedana
opened
Improve summaries and visualizations of results with modularized decision tree
enhancement help wanted good first issue reports priority: medium impact: medium
Write code to automatically create a flow chart or other summary/visualization for a decision tree. This can also be used to make a run-specific visualization that shows how components were reclassified at each node of the decision tree. ### Summary The decision tree modularization (#756) is getting close to done. The "Decision Tree" is the series of steps through which each ICA component is classified as accepted or rejected. A nice feature of this work is a lot of useful information about what happened during processing is logged in structured formats. This information can be visualized and summarized in ways that will help users better understand what is happening and better understand their own data. This can be done by someone who enjoys writing code for interactive visualizations and flow charts even if they don't know much about the internal workings of tedana. ### Additional Detail #### Flow chart for decision tree - #355 has an extended discussion on different ways to visualize the decision tree in flow charts. All of these were semi-manually visualized. - [./tedana/resources/decision_trees](https://github.com/jbteves/tedana/tree/JT_DTM/tedana/resources/decision_trees) contains JSON files for each decision tree that is distributed with tedana. There are a series of elements that detail each step in the process and these can be used to generate a flow chart - After tedana is run on a dataset, a file called `desc-ICA_decision_tree.json` is saved with the rest of the program's outputts. That file contains the same decision tree that was ran along with an `output` key for each step in the process. Information on what how many component classifications changed and what they changed to is stored there. Other values, such as calculations for various thresholds are also stored. It should be possible to generate a flow charts that highlights exactly which steps affected component classifications. - Another potentially useful output is `desc-ICA_status_table.tsv` which has a row for each component and a column for each step (node) in the decision process. Each components classification after each node is stored there. #### Interactive report visualizations - When tedana is run, the output includes an interactive visualization of the results in `tedana_report.html` This currently includes the components with there kappa values, rho values, variance explained, final classifications, spatial maps, and time series. This information is displayed across several subplots. - Currently accepted components are green and rejected components are red. - We will now be saving classification tags for each component and each component could have more than one tag. It would be useful to be able to highlight subsets of components using these classification tags. - Additional information, such as a mini summary of when components changed their classifications and thresholding metrics that were calculated across components could also be visualized or summarized in this report. ### Next Steps - If you are interested in working on this, and haven't previously contributed to tedana, let @handwerkerd know so that he can provide additional guidance - A bit more information on how things are named and stored is in [./tedana/docs/building_decision_trees.rst](https://github.com/jbteves/tedana/blob/JT_DTM/docs/building%20decision%20trees.rst)
1.0
Improve summaries and visualizations of results with modularized decision tree - Write code to automatically create a flow chart or other summary/visualization for a decision tree. This can also be used to make a run-specific visualization that shows how components were reclassified at each node of the decision tree. ### Summary The decision tree modularization (#756) is getting close to done. The "Decision Tree" is the series of steps through which each ICA component is classified as accepted or rejected. A nice feature of this work is a lot of useful information about what happened during processing is logged in structured formats. This information can be visualized and summarized in ways that will help users better understand what is happening and better understand their own data. This can be done by someone who enjoys writing code for interactive visualizations and flow charts even if they don't know much about the internal workings of tedana. ### Additional Detail #### Flow chart for decision tree - #355 has an extended discussion on different ways to visualize the decision tree in flow charts. All of these were semi-manually visualized. - [./tedana/resources/decision_trees](https://github.com/jbteves/tedana/tree/JT_DTM/tedana/resources/decision_trees) contains JSON files for each decision tree that is distributed with tedana. There are a series of elements that detail each step in the process and these can be used to generate a flow chart - After tedana is run on a dataset, a file called `desc-ICA_decision_tree.json` is saved with the rest of the program's outputts. That file contains the same decision tree that was ran along with an `output` key for each step in the process. Information on what how many component classifications changed and what they changed to is stored there. Other values, such as calculations for various thresholds are also stored. It should be possible to generate a flow charts that highlights exactly which steps affected component classifications. - Another potentially useful output is `desc-ICA_status_table.tsv` which has a row for each component and a column for each step (node) in the decision process. Each components classification after each node is stored there. #### Interactive report visualizations - When tedana is run, the output includes an interactive visualization of the results in `tedana_report.html` This currently includes the components with there kappa values, rho values, variance explained, final classifications, spatial maps, and time series. This information is displayed across several subplots. - Currently accepted components are green and rejected components are red. - We will now be saving classification tags for each component and each component could have more than one tag. It would be useful to be able to highlight subsets of components using these classification tags. - Additional information, such as a mini summary of when components changed their classifications and thresholding metrics that were calculated across components could also be visualized or summarized in this report. ### Next Steps - If you are interested in working on this, and haven't previously contributed to tedana, let @handwerkerd know so that he can provide additional guidance - A bit more information on how things are named and stored is in [./tedana/docs/building_decision_trees.rst](https://github.com/jbteves/tedana/blob/JT_DTM/docs/building%20decision%20trees.rst)
priority
improve summaries and visualizations of results with modularized decision tree write code to automatically create a flow chart or other summary visualization for a decision tree this can also be used to make a run specific visualization that shows how components were reclassified at each node of the decision tree summary the decision tree modularization is getting close to done the decision tree is the series of steps through which each ica component is classified as accepted or rejected a nice feature of this work is a lot of useful information about what happened during processing is logged in structured formats this information can be visualized and summarized in ways that will help users better understand what is happening and better understand their own data this can be done by someone who enjoys writing code for interactive visualizations and flow charts even if they don t know much about the internal workings of tedana additional detail flow chart for decision tree has an extended discussion on different ways to visualize the decision tree in flow charts all of these were semi manually visualized contains json files for each decision tree that is distributed with tedana there are a series of elements that detail each step in the process and these can be used to generate a flow chart after tedana is run on a dataset a file called desc ica decision tree json is saved with the rest of the program s outputts that file contains the same decision tree that was ran along with an output key for each step in the process information on what how many component classifications changed and what they changed to is stored there other values such as calculations for various thresholds are also stored it should be possible to generate a flow charts that highlights exactly which steps affected component classifications another potentially useful output is desc ica status table tsv which has a row for each component and a column for each step node in the decision process each components classification after each node is stored there interactive report visualizations when tedana is run the output includes an interactive visualization of the results in tedana report html this currently includes the components with there kappa values rho values variance explained final classifications spatial maps and time series this information is displayed across several subplots currently accepted components are green and rejected components are red we will now be saving classification tags for each component and each component could have more than one tag it would be useful to be able to highlight subsets of components using these classification tags additional information such as a mini summary of when components changed their classifications and thresholding metrics that were calculated across components could also be visualized or summarized in this report next steps if you are interested in working on this and haven t previously contributed to tedana let handwerkerd know so that he can provide additional guidance a bit more information on how things are named and stored is in
1
145,530
19,339,485,137
IssuesEvent
2021-12-15 01:36:53
billmcchesney1/t-vault
https://api.github.com/repos/billmcchesney1/t-vault
opened
WS-2018-0650 (High) detected in useragent-2.3.0.tgz
security vulnerability
## WS-2018-0650 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>useragent-2.3.0.tgz</b></p></summary> <p>Fastest, most accurate & effecient user agent string parser, uses Browserscope's research for parsing</p> <p>Library home page: <a href="https://registry.npmjs.org/useragent/-/useragent-2.3.0.tgz">https://registry.npmjs.org/useragent/-/useragent-2.3.0.tgz</a></p> <p>Path to dependency file: t-vault/tvaultui/package.json</p> <p>Path to vulnerable library: t-vault/tvaultui/node_modules/useragent/package.json</p> <p> Dependency Hierarchy: - karma-0.13.22.tgz (Root Library) - :x: **useragent-2.3.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>dev</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Regular Expression Denial of Service (ReDoS) vulnerability was found in useragent through 2.3.0. <p>Publish Date: 2018-02-27 <p>URL: <a href=https://hackerone.com/reports/320159>WS-2018-0650</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"useragent","packageVersion":"2.3.0","packageFilePaths":["/tvaultui/package.json"],"isTransitiveDependency":true,"dependencyTree":"karma:0.13.22;useragent:2.3.0","isMinimumFixVersionAvailable":false,"isBinary":false}],"baseBranches":["dev"],"vulnerabilityIdentifier":"WS-2018-0650","vulnerabilityDetails":"Regular Expression Denial of Service (ReDoS) vulnerability was found in useragent through 2.3.0.","vulnerabilityUrl":"https://hackerone.com/reports/320159","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
WS-2018-0650 (High) detected in useragent-2.3.0.tgz - ## WS-2018-0650 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>useragent-2.3.0.tgz</b></p></summary> <p>Fastest, most accurate & effecient user agent string parser, uses Browserscope's research for parsing</p> <p>Library home page: <a href="https://registry.npmjs.org/useragent/-/useragent-2.3.0.tgz">https://registry.npmjs.org/useragent/-/useragent-2.3.0.tgz</a></p> <p>Path to dependency file: t-vault/tvaultui/package.json</p> <p>Path to vulnerable library: t-vault/tvaultui/node_modules/useragent/package.json</p> <p> Dependency Hierarchy: - karma-0.13.22.tgz (Root Library) - :x: **useragent-2.3.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>dev</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Regular Expression Denial of Service (ReDoS) vulnerability was found in useragent through 2.3.0. <p>Publish Date: 2018-02-27 <p>URL: <a href=https://hackerone.com/reports/320159>WS-2018-0650</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"useragent","packageVersion":"2.3.0","packageFilePaths":["/tvaultui/package.json"],"isTransitiveDependency":true,"dependencyTree":"karma:0.13.22;useragent:2.3.0","isMinimumFixVersionAvailable":false,"isBinary":false}],"baseBranches":["dev"],"vulnerabilityIdentifier":"WS-2018-0650","vulnerabilityDetails":"Regular Expression Denial of Service (ReDoS) vulnerability was found in useragent through 2.3.0.","vulnerabilityUrl":"https://hackerone.com/reports/320159","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
ws high detected in useragent tgz ws high severity vulnerability vulnerable library useragent tgz fastest most accurate effecient user agent string parser uses browserscope s research for parsing library home page a href path to dependency file t vault tvaultui package json path to vulnerable library t vault tvaultui node modules useragent package json dependency hierarchy karma tgz root library x useragent tgz vulnerable library found in base branch dev vulnerability details regular expression denial of service redos vulnerability was found in useragent through publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree karma useragent isminimumfixversionavailable false isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails regular expression denial of service redos vulnerability was found in useragent through vulnerabilityurl
0
43,374
11,210,043,365
IssuesEvent
2020-01-06 12:08:25
angular/angular-cli
https://api.github.com/repos/angular/angular-cli
closed
({}).toString.call(null) returns [object Window] for ES6 only builds
comp: devkit/build-angular freq1: low severity3: broken type: bug/fix
# 🐞 Bug report ### Command (mark with an `x`) - [ ] new - [x] build - [ ] serve - [ ] test - [ ] e2e - [ ] generate - [ ] add - [ ] update - [ ] lint - [ ] xi18n - [ ] run - [ ] config - [ ] help - [ ] version - [ ] doc ### Is this a regression? Unsure. ### Description On a project with a `browserslist` that only ends up targeting ES6 browsers, the result of `({}).toString.call(null)` is `"[object Window]"`, not `"[object Null]"` as expected. I came across this bug as our project only targets ES6 and we recently upgraded to Bootstrap 4.4 which uses this method for checking the type of parameters. In https://github.com/twbs/bootstrap/pull/29251 an new option was added which has a default value of `null`, which returns a type of `window` in their type checker which causes an error with this CLI configuration. ## 🔬 Minimal Reproduction - `ng new toStringRepo` - `ng serve` - Open console of served app - Execute `({}).toString.call(null)` and observe that it returns `"[object Null]"` - Stop serving - Change content of `browserslist` to `last 2 Chrome versions` - `ng serve` - Open console of served app - Execute `({}).toString.call(null)` and observe that it returns `"[object Window]"` ## 🔥 Exception or Error None ## 🌍 Your Environment <pre><code>$ ng version _ _ ____ _ ___ / \ _ __ __ _ _ _| | __ _ _ __ / ___| | |_ _| / △ \ | '_ \ / _` | | | | |/ _` | '__| | | | | | | / ___ \| | | | (_| | |_| | | (_| | | | |___| |___ | | /_/ \_\_| |_|\__, |\__,_|_|\__,_|_| \____|_____|___| |___/ Angular CLI: 8.3.21 Node: 10.15.3 OS: win32 x64 Angular: 8.2.14 ... animations, common, compiler, compiler-cli, core, forms ... language-service, platform-browser, platform-browser-dynamic ... router Package Version ----------------------------------------------------------- @angular-devkit/architect 0.803.21 @angular-devkit/build-angular 0.803.21 @angular-devkit/build-optimizer 0.803.21 @angular-devkit/build-webpack 0.803.21 @angular-devkit/core 8.3.21 @angular-devkit/schematics 8.3.21 @angular/cli 8.3.21 @ngtools/webpack 8.3.21 @schematics/angular 8.3.21 @schematics/update 0.803.21 rxjs 6.4.0 typescript 3.5.3 webpack 4.39.2 </code></pre> **Anything else relevant?** Upgrading the test project to Angular 9 with `ng update @angular/core @angular/cli --next` resolves the issue.
1.0
({}).toString.call(null) returns [object Window] for ES6 only builds - # 🐞 Bug report ### Command (mark with an `x`) - [ ] new - [x] build - [ ] serve - [ ] test - [ ] e2e - [ ] generate - [ ] add - [ ] update - [ ] lint - [ ] xi18n - [ ] run - [ ] config - [ ] help - [ ] version - [ ] doc ### Is this a regression? Unsure. ### Description On a project with a `browserslist` that only ends up targeting ES6 browsers, the result of `({}).toString.call(null)` is `"[object Window]"`, not `"[object Null]"` as expected. I came across this bug as our project only targets ES6 and we recently upgraded to Bootstrap 4.4 which uses this method for checking the type of parameters. In https://github.com/twbs/bootstrap/pull/29251 an new option was added which has a default value of `null`, which returns a type of `window` in their type checker which causes an error with this CLI configuration. ## 🔬 Minimal Reproduction - `ng new toStringRepo` - `ng serve` - Open console of served app - Execute `({}).toString.call(null)` and observe that it returns `"[object Null]"` - Stop serving - Change content of `browserslist` to `last 2 Chrome versions` - `ng serve` - Open console of served app - Execute `({}).toString.call(null)` and observe that it returns `"[object Window]"` ## 🔥 Exception or Error None ## 🌍 Your Environment <pre><code>$ ng version _ _ ____ _ ___ / \ _ __ __ _ _ _| | __ _ _ __ / ___| | |_ _| / △ \ | '_ \ / _` | | | | |/ _` | '__| | | | | | | / ___ \| | | | (_| | |_| | | (_| | | | |___| |___ | | /_/ \_\_| |_|\__, |\__,_|_|\__,_|_| \____|_____|___| |___/ Angular CLI: 8.3.21 Node: 10.15.3 OS: win32 x64 Angular: 8.2.14 ... animations, common, compiler, compiler-cli, core, forms ... language-service, platform-browser, platform-browser-dynamic ... router Package Version ----------------------------------------------------------- @angular-devkit/architect 0.803.21 @angular-devkit/build-angular 0.803.21 @angular-devkit/build-optimizer 0.803.21 @angular-devkit/build-webpack 0.803.21 @angular-devkit/core 8.3.21 @angular-devkit/schematics 8.3.21 @angular/cli 8.3.21 @ngtools/webpack 8.3.21 @schematics/angular 8.3.21 @schematics/update 0.803.21 rxjs 6.4.0 typescript 3.5.3 webpack 4.39.2 </code></pre> **Anything else relevant?** Upgrading the test project to Angular 9 with `ng update @angular/core @angular/cli --next` resolves the issue.
non_priority
tostring call null returns for only builds 🐞 bug report command mark with an x new build serve test generate add update lint run config help version doc is this a regression unsure description on a project with a browserslist that only ends up targeting browsers the result of tostring call null is not as expected i came across this bug as our project only targets and we recently upgraded to bootstrap which uses this method for checking the type of parameters in an new option was added which has a default value of null which returns a type of window in their type checker which causes an error with this cli configuration 🔬 minimal reproduction ng new tostringrepo ng serve open console of served app execute tostring call null and observe that it returns stop serving change content of browserslist to last chrome versions ng serve open console of served app execute tostring call null and observe that it returns 🔥 exception or error none 🌍 your environment ng version △ angular cli node os angular animations common compiler compiler cli core forms language service platform browser platform browser dynamic router package version angular devkit architect angular devkit build angular angular devkit build optimizer angular devkit build webpack angular devkit core angular devkit schematics angular cli ngtools webpack schematics angular schematics update rxjs typescript webpack anything else relevant upgrading the test project to angular with ng update angular core angular cli next resolves the issue
0
215,017
16,587,595,317
IssuesEvent
2021-06-01 00:30:55
fleetdm/fleet
https://api.github.com/repos/fleetdm/fleet
opened
Document tier requirements in API docs
documentation idea
### Goal It should be clear to a Fleet user which license tier is required to use a given API. Let's document this in the API documentation.
1.0
Document tier requirements in API docs - ### Goal It should be clear to a Fleet user which license tier is required to use a given API. Let's document this in the API documentation.
non_priority
document tier requirements in api docs goal it should be clear to a fleet user which license tier is required to use a given api let s document this in the api documentation
0
55,175
6,444,677,444
IssuesEvent
2017-08-12 15:31:46
disco-lang/disco
https://api.github.com/repos/disco-lang/disco
closed
Allow QuickCheck properties in test suite
U-Testing
The title of the issue says it all. We need an easy way to incorporate randomized, property-based testing into the test suite.
1.0
Allow QuickCheck properties in test suite - The title of the issue says it all. We need an easy way to incorporate randomized, property-based testing into the test suite.
non_priority
allow quickcheck properties in test suite the title of the issue says it all we need an easy way to incorporate randomized property based testing into the test suite
0
806,387
29,819,933,806
IssuesEvent
2023-06-17 00:30:25
googleapis/google-cloud-go
https://api.github.com/repos/googleapis/google-cloud-go
closed
spanner: many tests failed
type: bug priority: p1 api: spanner flakybot: issue
Many tests failed at the same time in this package. * I will close this issue when there are no more failures in this package _and_ there is at least one pass. * No new issues will be filed for this package until this issue is closed. * If there are already issues for individual test cases, I will close them when the corresponding test passes. You can close them earlier, if you prefer, and I won't reopen them while this issue is still open. Here are the tests that failed: * TestPartitionRoundTrip * TestClient_Single * TestClient_Single_Unavailable * TestClient_Single_InvalidArgument * TestClient_Single_SessionNotFound * TestClient_Single_Read_SessionNotFound * TestClient_Single_ReadRow_SessionNotFound * TestClient_Single_RetryableErrorOnPartialResultSet * TestClient_Single_NonRetryableErrorOnPartialResultSet * TestClient_Single_NonRetryableInternalErrors * TestClient_Single_DeadlineExceeded_WithErrors * TestClient_ReturnDatabaseName * TestClient_ReadWriteTransactionCommitAborted * TestClient_ReadWriteTransaction_SessionNotFoundOnCommit * TestClient_ReadWriteTransaction_SessionNotFoundOnBeginTransaction * TestClient_ReadWriteTransaction_SessionNotFoundOnExecuteUpdate * TestClient_ReadWriteTransaction_FirstStatementAsQueryReturnsUnavailableRetryReturnsAborted * TestClient_ReadWriteTransaction_BatchDmlWithErrorOnFirstStatement * TestClient_ReadWriteTransaction_BatchDmlWithErrorOnSecondStatement * TestClient_ReadWriteTransaction_MultipleReadsWithoutNext * TestClient_ReadWriteTransaction_WithCancelledContext * TestClient_ApplyAtLeastOnce * TestClient_ApplyAtLeastOnceReuseSession * TestClient_ApplyAtLeastOnceInvalidArgument * TestClient_ApplyAtLeastOnce_NonRetryableInternalErrors * TestClient_Apply_ApplyOptions * TestReadWriteTransaction_ErrUnexpectedEOF * TestReadWriteTransaction_WrapError * TestReadWriteTransaction_WrapSessionNotFoundError * TestClient_WriteStructWithPointers * TestClient_WriteStructWithCustomTypes * TestReadWriteTransaction_ContextTimeoutDuringCommit * TestFailedCommit_NoRollback * TestFailedUpdate_ShouldRollback * TestClient_NumChannels * TestClient_WithGRPCConnectionPool * TestClient_WithGRPCConnectionPoolAndNumChannels * TestClient_WithGRPCConnectionPoolAndNumChannels_Misconfigured * TestClient_WithCustomBatchTimeout * TestClient_WithoutCustomBatchTimeout * TestClient_CallOptions * TestClient_QueryWithCallOptions * TestClient_Single_Read_WithNumericKey * TestIntegration_DbRemovalRecovery (#7677) * TestIntegration_QueryWithRoles ----- commit: b429aa13975e41e45f9978e5de3f9f6054941e35 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/c69e871d-e4b1-441b-b32a-2c980b9676ac), [Sponge](http://sponge2/c69e871d-e4b1-441b-b32a-2c980b9676ac) status: failed
1.0
spanner: many tests failed - Many tests failed at the same time in this package. * I will close this issue when there are no more failures in this package _and_ there is at least one pass. * No new issues will be filed for this package until this issue is closed. * If there are already issues for individual test cases, I will close them when the corresponding test passes. You can close them earlier, if you prefer, and I won't reopen them while this issue is still open. Here are the tests that failed: * TestPartitionRoundTrip * TestClient_Single * TestClient_Single_Unavailable * TestClient_Single_InvalidArgument * TestClient_Single_SessionNotFound * TestClient_Single_Read_SessionNotFound * TestClient_Single_ReadRow_SessionNotFound * TestClient_Single_RetryableErrorOnPartialResultSet * TestClient_Single_NonRetryableErrorOnPartialResultSet * TestClient_Single_NonRetryableInternalErrors * TestClient_Single_DeadlineExceeded_WithErrors * TestClient_ReturnDatabaseName * TestClient_ReadWriteTransactionCommitAborted * TestClient_ReadWriteTransaction_SessionNotFoundOnCommit * TestClient_ReadWriteTransaction_SessionNotFoundOnBeginTransaction * TestClient_ReadWriteTransaction_SessionNotFoundOnExecuteUpdate * TestClient_ReadWriteTransaction_FirstStatementAsQueryReturnsUnavailableRetryReturnsAborted * TestClient_ReadWriteTransaction_BatchDmlWithErrorOnFirstStatement * TestClient_ReadWriteTransaction_BatchDmlWithErrorOnSecondStatement * TestClient_ReadWriteTransaction_MultipleReadsWithoutNext * TestClient_ReadWriteTransaction_WithCancelledContext * TestClient_ApplyAtLeastOnce * TestClient_ApplyAtLeastOnceReuseSession * TestClient_ApplyAtLeastOnceInvalidArgument * TestClient_ApplyAtLeastOnce_NonRetryableInternalErrors * TestClient_Apply_ApplyOptions * TestReadWriteTransaction_ErrUnexpectedEOF * TestReadWriteTransaction_WrapError * TestReadWriteTransaction_WrapSessionNotFoundError * TestClient_WriteStructWithPointers * TestClient_WriteStructWithCustomTypes * TestReadWriteTransaction_ContextTimeoutDuringCommit * TestFailedCommit_NoRollback * TestFailedUpdate_ShouldRollback * TestClient_NumChannels * TestClient_WithGRPCConnectionPool * TestClient_WithGRPCConnectionPoolAndNumChannels * TestClient_WithGRPCConnectionPoolAndNumChannels_Misconfigured * TestClient_WithCustomBatchTimeout * TestClient_WithoutCustomBatchTimeout * TestClient_CallOptions * TestClient_QueryWithCallOptions * TestClient_Single_Read_WithNumericKey * TestIntegration_DbRemovalRecovery (#7677) * TestIntegration_QueryWithRoles ----- commit: b429aa13975e41e45f9978e5de3f9f6054941e35 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/c69e871d-e4b1-441b-b32a-2c980b9676ac), [Sponge](http://sponge2/c69e871d-e4b1-441b-b32a-2c980b9676ac) status: failed
priority
spanner many tests failed many tests failed at the same time in this package i will close this issue when there are no more failures in this package and there is at least one pass no new issues will be filed for this package until this issue is closed if there are already issues for individual test cases i will close them when the corresponding test passes you can close them earlier if you prefer and i won t reopen them while this issue is still open here are the tests that failed testpartitionroundtrip testclient single testclient single unavailable testclient single invalidargument testclient single sessionnotfound testclient single read sessionnotfound testclient single readrow sessionnotfound testclient single retryableerroronpartialresultset testclient single nonretryableerroronpartialresultset testclient single nonretryableinternalerrors testclient single deadlineexceeded witherrors testclient returndatabasename testclient readwritetransactioncommitaborted testclient readwritetransaction sessionnotfoundoncommit testclient readwritetransaction sessionnotfoundonbegintransaction testclient readwritetransaction sessionnotfoundonexecuteupdate testclient readwritetransaction firststatementasqueryreturnsunavailableretryreturnsaborted testclient readwritetransaction batchdmlwitherroronfirststatement testclient readwritetransaction batchdmlwitherroronsecondstatement testclient readwritetransaction multiplereadswithoutnext testclient readwritetransaction withcancelledcontext testclient applyatleastonce testclient applyatleastoncereusesession testclient applyatleastonceinvalidargument testclient applyatleastonce nonretryableinternalerrors testclient apply applyoptions testreadwritetransaction errunexpectedeof testreadwritetransaction wraperror testreadwritetransaction wrapsessionnotfounderror testclient writestructwithpointers testclient writestructwithcustomtypes testreadwritetransaction contexttimeoutduringcommit testfailedcommit norollback testfailedupdate shouldrollback testclient numchannels testclient withgrpcconnectionpool testclient withgrpcconnectionpoolandnumchannels testclient withgrpcconnectionpoolandnumchannels misconfigured testclient withcustombatchtimeout testclient withoutcustombatchtimeout testclient calloptions testclient querywithcalloptions testclient single read withnumerickey testintegration dbremovalrecovery testintegration querywithroles commit buildurl status failed
1
155,050
13,609,332,590
IssuesEvent
2020-09-23 04:57:49
backdrop/backdrop-issues
https://api.github.com/repos/backdrop/backdrop-issues
opened
hook_taxonomy_term_page_alter() isn't documented
good first issue type - documentation
[Line 69](https://github.com/backdrop/backdrop/blob/1.x/core/modules/taxonomy/taxonomy.pages.inc#L69) of taxonomy.pages.inc has this: > `backdrop_alter('taxonomy_term_page', $build);` This means that you can implement `hook_taxonomy_term_page_alter()`, however that hook isn't documented.It should be detailed in [taxonomy.api.php](https://github.com/backdrop/backdrop/blob/1.x/core/modules/taxonomy/taxonomy.api.php).
1.0
hook_taxonomy_term_page_alter() isn't documented - [Line 69](https://github.com/backdrop/backdrop/blob/1.x/core/modules/taxonomy/taxonomy.pages.inc#L69) of taxonomy.pages.inc has this: > `backdrop_alter('taxonomy_term_page', $build);` This means that you can implement `hook_taxonomy_term_page_alter()`, however that hook isn't documented.It should be detailed in [taxonomy.api.php](https://github.com/backdrop/backdrop/blob/1.x/core/modules/taxonomy/taxonomy.api.php).
non_priority
hook taxonomy term page alter isn t documented of taxonomy pages inc has this backdrop alter taxonomy term page build this means that you can implement hook taxonomy term page alter however that hook isn t documented it should be detailed in
0
759,207
26,584,379,628
IssuesEvent
2023-01-22 21:02:30
yugabyte/yugabyte-db
https://api.github.com/repos/yugabyte/yugabyte-db
closed
[YSQL] Delete query takes more time for foreign key referenced table
kind/bug area/ysql priority/medium status/awaiting-triage
Jira Link: [DB-5064](https://yugabyte.atlassian.net/browse/DB-5064) ### Description DB Version: `2.17.1.0-b432` **Steps**: 1. Create universe with Turn ON the GFlag enable_replicate_transaction_status_table on master and disable automatic tablet splitting 2. Create database and 2 tables and 3 indexes ``` CREATE EXTENSION IF NOT EXISTS "uuid-ossp"; CREATE TYPE complex AS (re float8, im float8); CREATE TABLE table1 (id text, uuid_col uuid DEFAULT uuid_generate_v4 (), name text, f_name text, c complex, info json, contact JSONB, arr smallint[], cash money, i inet, m macaddr, i2 serial, i3 bigserial, val smallint, age int, collated_data text collate "POSIX",date DATE,n NUMERIC (3, 2),r real, c1 CHAR(1), created_at timestamptz, uuid0 uuid DEFAULT uuid_nil(), uuid1 uuid DEFAULT uuid_generate_v1(), p1 POINT,t1 TIME,ts1 TIMESTAMP,i4 INTERVAL,p2 path, p3 polygon,b box, c2 circle, l line, l1 lseg, a2 text[][], primary key (id ASC)); CREATE TABLE table2 (id text, uuid_col uuid DEFAULT uuid_generate_v4 (), name text primary key, f_name text, c complex, info json, contact JSONB, arr smallint[], cash money, i inet, m macaddr, i2 serial, i3 bigserial, val smallint, age int, collated_data text collate "POSIX",date DATE,n NUMERIC (3, 2),r real, c1 CHAR(1), created_at timestamptz, uuid0 uuid DEFAULT uuid_nil(), uuid1 uuid DEFAULT uuid_generate_v1(), p1 POINT,t1 TIME,ts1 TIMESTAMP,i4 INTERVAL,p2 path, p3 polygon,b box, c2 circle, l line, l1 lseg, a2 text[][], CONSTRAINT fk_table1 FOREIGN KEY(id) REFERENCES table1(id)) SPLIT INTO 8 TABLETS; create index idx_1 on table1(age) where age>10 and age< 50; create index idx_2 on table2(f_name); create index idx_3 on table1(created_at) include(uuid1); ``` 3. Run transactional workload(load 100K+ rows in each table) 4. Stop workload, wait for some time 5. Run bootstrap_cdc_producer command # not necessary step, mentioned as I used 6. Run delete queries `delete from table1 where age>15 and age<20;` - Fails with `ERROR: update or delete on table "table1" violates foreign key constraint "fk_table1" on table "table2”. ` —— expected `delete from table2 where age>15 and age<20;` - Works(takes < 5 seconds) `delete from table1 where age>15 and age<20; ` - takes more than 10 min to complete for 7K rows [DB-5064]: https://yugabyte.atlassian.net/browse/DB-5064?atlOrigin=eyJpIjoiNWRkNTljNzYxNjVmNDY3MDlhMDU5Y2ZhYzA5YTRkZjUiLCJwIjoiZ2l0aHViLWNvbS1KU1cifQ
1.0
[YSQL] Delete query takes more time for foreign key referenced table - Jira Link: [DB-5064](https://yugabyte.atlassian.net/browse/DB-5064) ### Description DB Version: `2.17.1.0-b432` **Steps**: 1. Create universe with Turn ON the GFlag enable_replicate_transaction_status_table on master and disable automatic tablet splitting 2. Create database and 2 tables and 3 indexes ``` CREATE EXTENSION IF NOT EXISTS "uuid-ossp"; CREATE TYPE complex AS (re float8, im float8); CREATE TABLE table1 (id text, uuid_col uuid DEFAULT uuid_generate_v4 (), name text, f_name text, c complex, info json, contact JSONB, arr smallint[], cash money, i inet, m macaddr, i2 serial, i3 bigserial, val smallint, age int, collated_data text collate "POSIX",date DATE,n NUMERIC (3, 2),r real, c1 CHAR(1), created_at timestamptz, uuid0 uuid DEFAULT uuid_nil(), uuid1 uuid DEFAULT uuid_generate_v1(), p1 POINT,t1 TIME,ts1 TIMESTAMP,i4 INTERVAL,p2 path, p3 polygon,b box, c2 circle, l line, l1 lseg, a2 text[][], primary key (id ASC)); CREATE TABLE table2 (id text, uuid_col uuid DEFAULT uuid_generate_v4 (), name text primary key, f_name text, c complex, info json, contact JSONB, arr smallint[], cash money, i inet, m macaddr, i2 serial, i3 bigserial, val smallint, age int, collated_data text collate "POSIX",date DATE,n NUMERIC (3, 2),r real, c1 CHAR(1), created_at timestamptz, uuid0 uuid DEFAULT uuid_nil(), uuid1 uuid DEFAULT uuid_generate_v1(), p1 POINT,t1 TIME,ts1 TIMESTAMP,i4 INTERVAL,p2 path, p3 polygon,b box, c2 circle, l line, l1 lseg, a2 text[][], CONSTRAINT fk_table1 FOREIGN KEY(id) REFERENCES table1(id)) SPLIT INTO 8 TABLETS; create index idx_1 on table1(age) where age>10 and age< 50; create index idx_2 on table2(f_name); create index idx_3 on table1(created_at) include(uuid1); ``` 3. Run transactional workload(load 100K+ rows in each table) 4. Stop workload, wait for some time 5. Run bootstrap_cdc_producer command # not necessary step, mentioned as I used 6. Run delete queries `delete from table1 where age>15 and age<20;` - Fails with `ERROR: update or delete on table "table1" violates foreign key constraint "fk_table1" on table "table2”. ` —— expected `delete from table2 where age>15 and age<20;` - Works(takes < 5 seconds) `delete from table1 where age>15 and age<20; ` - takes more than 10 min to complete for 7K rows [DB-5064]: https://yugabyte.atlassian.net/browse/DB-5064?atlOrigin=eyJpIjoiNWRkNTljNzYxNjVmNDY3MDlhMDU5Y2ZhYzA5YTRkZjUiLCJwIjoiZ2l0aHViLWNvbS1KU1cifQ
priority
delete query takes more time for foreign key referenced table jira link description db version steps create universe with turn on the gflag enable replicate transaction status table on master and disable automatic tablet splitting create database and tables and indexes create extension if not exists uuid ossp create type complex as re im create table id text uuid col uuid default uuid generate name text f name text c complex info json contact jsonb arr smallint cash money i inet m macaddr serial bigserial val smallint age int collated data text collate posix date date n numeric r real char created at timestamptz uuid default uuid nil uuid default uuid generate point time timestamp interval path polygon b box circle l line lseg text primary key id asc create table id text uuid col uuid default uuid generate name text primary key f name text c complex info json contact jsonb arr smallint cash money i inet m macaddr serial bigserial val smallint age int collated data text collate posix date date n numeric r real char created at timestamptz uuid default uuid nil uuid default uuid generate point time timestamp interval path polygon b box circle l line lseg text constraint fk foreign key id references id split into tablets create index idx on age where age and age create index idx on f name create index idx on created at include run transactional workload load rows in each table stop workload wait for some time run bootstrap cdc producer command not necessary step mentioned as i used run delete queries delete from where age and age fails with error update or delete on table violates foreign key constraint fk on table ” —— expected delete from where age and age works takes seconds delete from where age and age takes more than min to complete for rows
1
167,323
6,336,622,570
IssuesEvent
2017-07-26 21:31:13
Esri/solutions-geoprocessing-toolbox
https://api.github.com/repos/Esri/solutions-geoprocessing-toolbox
closed
Position Analysis Template RangeRings.py with german localization. "is not working with with floating-point numbers"
4 - Done B - Known Issue F - Data Management priority-moderate
Position Analysis Template Reported on 11/16/2015: [ArcGIS.com ](http://www.arcgis.com/home/item.html?id=f10d78ae29cd471ebe2e96bad9b67277) The Range Rings model is not working with floating-point numbers when using a german localization. Within the RangeRings.py you should use: `ringInterval = arcpy.GetParameter(2) instead of: ringInterval = float(arcpy.GetParameterAsText(2))` otherwise there will be an error when the script is trying to parse e.g. ‘5,6’ No further information. ┆Issue is synchronized with this [Asana task](https://app.asana.com/0/129342386639048/129373015346259)
1.0
Position Analysis Template RangeRings.py with german localization. "is not working with with floating-point numbers" - Position Analysis Template Reported on 11/16/2015: [ArcGIS.com ](http://www.arcgis.com/home/item.html?id=f10d78ae29cd471ebe2e96bad9b67277) The Range Rings model is not working with floating-point numbers when using a german localization. Within the RangeRings.py you should use: `ringInterval = arcpy.GetParameter(2) instead of: ringInterval = float(arcpy.GetParameterAsText(2))` otherwise there will be an error when the script is trying to parse e.g. ‘5,6’ No further information. ┆Issue is synchronized with this [Asana task](https://app.asana.com/0/129342386639048/129373015346259)
priority
position analysis template rangerings py with german localization is not working with with floating point numbers position analysis template reported on the range rings model is not working with floating point numbers when using a german localization within the rangerings py you should use ringinterval arcpy getparameter instead of ringinterval float arcpy getparameterastext otherwise there will be an error when the script is trying to parse e g ‘ ’ no further information ┆issue is synchronized with this
1
294,931
9,050,707,512
IssuesEvent
2019-02-12 09:25:41
prometheus/tsdb
https://api.github.com/repos/prometheus/tsdb
closed
Compaction blocks Prometheus shutdown
bug help wanted priority: medium
When Prometheus starts a SIGTERM shutdown any in-flight compaction operations will block the shutdown.
1.0
Compaction blocks Prometheus shutdown - When Prometheus starts a SIGTERM shutdown any in-flight compaction operations will block the shutdown.
priority
compaction blocks prometheus shutdown when prometheus starts a sigterm shutdown any in flight compaction operations will block the shutdown
1
26,366
2,684,340,517
IssuesEvent
2015-03-28 21:54:01
ConEmu/old-issues
https://api.github.com/repos/ConEmu/old-issues
closed
ConEmu Crashes at boot (assertion lbFound at ConEmu.cpp:13657)
11–20 stars bug imported Priority-Medium
_From [simen.kj...@gmail.com](https://code.google.com/u/116127060082078003686/) on April 22, 2013 02:19:52_ OS version: Win7 SP1 x64 ConEmu version: 130421 I just updated ConEmu to v. 130421, and it gives a dialog box at startup, with this message: ConEmu 130421 [64] Assertion lbFound at ConEmu .cpp:13657 Press \<Retry> to copy text information to clipboard and report a bug (open project web page) If I press \<retry>, I get another message, this time from powershell: powershell (admin)r CreateDumpForReport called, create dump file failed C:\Users\&#37;username&#37;\Desktop\ConEmuTap\Trap-130421-2744.dmp Press \<Yes> to copy this text to clipboard and open project web page LastError 0x00000020 The process cannot access the file because it is being used by another process. After which ConEmu crashes. Now, if I don't press \<retry>, it continues working with no hiccups yet. _Original issue: http://code.google.com/p/conemu-maximus5/issues/detail?id=1035_
1.0
ConEmu Crashes at boot (assertion lbFound at ConEmu.cpp:13657) - _From [simen.kj...@gmail.com](https://code.google.com/u/116127060082078003686/) on April 22, 2013 02:19:52_ OS version: Win7 SP1 x64 ConEmu version: 130421 I just updated ConEmu to v. 130421, and it gives a dialog box at startup, with this message: ConEmu 130421 [64] Assertion lbFound at ConEmu .cpp:13657 Press \<Retry> to copy text information to clipboard and report a bug (open project web page) If I press \<retry>, I get another message, this time from powershell: powershell (admin)r CreateDumpForReport called, create dump file failed C:\Users\&#37;username&#37;\Desktop\ConEmuTap\Trap-130421-2744.dmp Press \<Yes> to copy this text to clipboard and open project web page LastError 0x00000020 The process cannot access the file because it is being used by another process. After which ConEmu crashes. Now, if I don't press \<retry>, it continues working with no hiccups yet. _Original issue: http://code.google.com/p/conemu-maximus5/issues/detail?id=1035_
priority
conemu crashes at boot assertion lbfound at conemu cpp from on april os version conemu version i just updated conemu to v and it gives a dialog box at startup with this message conemu assertion lbfound at conemu cpp press to copy text information to clipboard and report a bug open project web page if i press i get another message this time from powershell powershell admin r createdumpforreport called create dump file failed c users username desktop conemutap trap dmp press to copy this text to clipboard and open project web page lasterror the process cannot access the file because it is being used by another process after which conemu crashes now if i don t press it continues working with no hiccups yet original issue
1
20,818
3,420,915,975
IssuesEvent
2015-12-08 16:38:30
dkfans/keeperfx
https://api.github.com/repos/dkfans/keeperfx
closed
Creatures do not come from the Portal anymore after dropping some into it [original levels 2,3,4]
Branch-Stable Component-Logic Priority-Critical Status-Fixed Type-Defect
Game version: 0.4.6 This similar issue happened to me in original levels 2, 3 and 4. However, I failed to replicate the issue in a new game. What did I do? In level 2, after I had built my Training Room, I dropped my Flies into the Portal. Then creatures do not come from the Portal anymore. Save file: ![fx1g0000](https://cloud.githubusercontent.com/assets/1058376/9844468/254a7128-5af6-11e5-9980-0da7a382b369.jpg) (Please change the filename, including the extension, to fx1g0000.sav after downloading.) Similarly, in level 3, after I had built my Library, I dropped my Flies into the Portal. Then creatures do not come from the Portal anymore. Save file: ![fx1g0001](https://cloud.githubusercontent.com/assets/1058376/9844483/44d44230-5af6-11e5-9872-af1f1c417f1c.jpg) (Please change the filename, including the extension, to fx1g0001.sav after downloading.) In level 4, I dropped my Flies into the portal. After that if I build a Workshop (at least 3x3), then creatures do not come from the Portal anymore. The following save file was created just before building a Workshop. Save file: ![fx1g0002](https://cloud.githubusercontent.com/assets/1058376/9844497/521fb604-5af6-11e5-99d1-481367f783c0.jpg) (Please change the filename, including the extension, to fx1g0002.sav after downloading.)
1.0
Creatures do not come from the Portal anymore after dropping some into it [original levels 2,3,4] - Game version: 0.4.6 This similar issue happened to me in original levels 2, 3 and 4. However, I failed to replicate the issue in a new game. What did I do? In level 2, after I had built my Training Room, I dropped my Flies into the Portal. Then creatures do not come from the Portal anymore. Save file: ![fx1g0000](https://cloud.githubusercontent.com/assets/1058376/9844468/254a7128-5af6-11e5-9980-0da7a382b369.jpg) (Please change the filename, including the extension, to fx1g0000.sav after downloading.) Similarly, in level 3, after I had built my Library, I dropped my Flies into the Portal. Then creatures do not come from the Portal anymore. Save file: ![fx1g0001](https://cloud.githubusercontent.com/assets/1058376/9844483/44d44230-5af6-11e5-9872-af1f1c417f1c.jpg) (Please change the filename, including the extension, to fx1g0001.sav after downloading.) In level 4, I dropped my Flies into the portal. After that if I build a Workshop (at least 3x3), then creatures do not come from the Portal anymore. The following save file was created just before building a Workshop. Save file: ![fx1g0002](https://cloud.githubusercontent.com/assets/1058376/9844497/521fb604-5af6-11e5-99d1-481367f783c0.jpg) (Please change the filename, including the extension, to fx1g0002.sav after downloading.)
non_priority
creatures do not come from the portal anymore after dropping some into it game version this similar issue happened to me in original levels and however i failed to replicate the issue in a new game what did i do in level after i had built my training room i dropped my flies into the portal then creatures do not come from the portal anymore save file please change the filename including the extension to sav after downloading similarly in level after i had built my library i dropped my flies into the portal then creatures do not come from the portal anymore save file please change the filename including the extension to sav after downloading in level i dropped my flies into the portal after that if i build a workshop at least then creatures do not come from the portal anymore the following save file was created just before building a workshop save file please change the filename including the extension to sav after downloading
0
1,040
4,845,426,833
IssuesEvent
2016-11-10 08:10:37
ansible/ansible-modules-extras
https://api.github.com/repos/ansible/ansible-modules-extras
closed
Haproxy module fails - itertools.imap object has no attribute __getitem__
affects_2.2 bug_report networking waiting_on_maintainer
##### ISSUE TYPE - Bug Report ##### COMPONENT NAME haproxy module ##### ANSIBLE VERSION ``` ansible 2.2.0.0 ``` ##### CONFIGURATION ##### OS / ENVIRONMENT Ubuntu 14.04.1 LTS ##### SUMMARY Can't change backend status using haproxy module with ansible 2.2.0.0. It fails with unexpected error. ##### STEPS TO REPRODUCE playbook : ```yaml - name: "disable backend server" haproxy: "state=disabled host={{ haproxy_server_name }} socket={{ hostvars[item]['haproxy_socket_path'] }} backend={{ haproxy_backend_name }} wait=yes" delegate_to: "{{ item }}" with_items: "{{ groups['proxy'] }}" become_user: root ``` inventory: ```yaml haproxy-01 haproxy-02 [proxy] haproxy-01 haproxy-02 ``` group_vars: ```yaml haproxy_socket_path: /run/haproxy.sock ``` host_vars: ``` yaml haproxy_server_name: app01 ``` vars: ``` yaml haproxy_backend_name: myapp ``` ##### EXPECTED RESULTS ``` TASK [disable backend server] *************************** changed: [appserver01 -> 172.X.X.X] => (item=haproxy-01) ``` ##### ACTUAL RESULTS ``` An exception occurred during task execution. To see the full traceback, use -vvv. The error was: TypeError: 'itertools.imap' object has no attribute '__getitem__' failed: [appserver01 -> 172.X.X.X] (item=haproxy-01) => {"failed": true, "item": "haproxy-01", "module_stderr": "Traceback (most recent call last):\n File \"/tmp/ansible_eJMmvQ/ansible_module_haproxy.py\", line 350, in <module>\n main()\n File \"/tmp/ansible_eJMmvQ/ansible_module_haproxy.py\", line 345, in main\n ansible_haproxy.act()\n File \"/tmp/ansible_eJMmvQ/ansible_module_haproxy.py\", line 306, in act\n self.disabled(self.host, self.backend, self.shutdown_sessions)\n File \"/tmp/ansible_eJMmvQ/ansible_module_haproxy.py\", line 291, in disabled\n self.execute_for_backends(cmd, backend, host, 'MAINT')\n File \"/tmp/ansible_eJMmvQ/ansible_module_haproxy.py\", line 237, in execute_for_backends\n self.wait_until_status(backend, svname, wait_for_status)\n File \"/tmp/ansible_eJMmvQ/ansible_module_haproxy.py\", line 262, in wait_until_status\n if state[0]['status'] == status:\nTypeError: 'itertools.imap' object has no attribute '__getitem__'\n", "module_stdout": "", "msg": "MODULE FAILURE"} An exception occurred during task execution. To see the full traceback, use -vvv. The error was: TypeError: 'itertools.imap' object has no attribute '__getitem__' failed: [appserver01 -> 172.X.X.Y] (item=haproxy-02) => {"failed": true, "item": "haproxy-02", "module_stderr": "Traceback (most recent call last):\n File \"/tmp/ansible_X3ixtX/ansible_module_haproxy.py\", line 350, in <module>\n main()\n File \"/tmp/ansible_X3ixtX/ansible_module_haproxy.py\", line 345, in main\n ansible_haproxy.act()\n File \"/tmp/ansible_X3ixtX/ansible_module_haproxy.py\", line 306, in act\n self.disabled(self.host, self.backend, self.shutdown_sessions)\n File \"/tmp/ansible_X3ixtX/ansible_module_haproxy.py\", line 291, in disabled\n self.execute_for_backends(cmd, backend, host, 'MAINT')\n File \"/tmp/ansible_X3ixtX/ansible_module_haproxy.py\", line 237, in execute_for_backends\n self.wait_until_status(backend, svname, wait_for_status)\n File \"/tmp/ansible_X3ixtX/ansible_module_haproxy.py\", line 262, in wait_until_status\n if state[0]['status'] == status:\nTypeError: 'itertools.imap' object has no attribute '__getitem__'\n", "module_stdout": "", "msg": "MODULE FAILURE"} ``` This relates to https://github.com/ansible/ansible-modules-extras/issues/3364.
True
Haproxy module fails - itertools.imap object has no attribute __getitem__ - ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME haproxy module ##### ANSIBLE VERSION ``` ansible 2.2.0.0 ``` ##### CONFIGURATION ##### OS / ENVIRONMENT Ubuntu 14.04.1 LTS ##### SUMMARY Can't change backend status using haproxy module with ansible 2.2.0.0. It fails with unexpected error. ##### STEPS TO REPRODUCE playbook : ```yaml - name: "disable backend server" haproxy: "state=disabled host={{ haproxy_server_name }} socket={{ hostvars[item]['haproxy_socket_path'] }} backend={{ haproxy_backend_name }} wait=yes" delegate_to: "{{ item }}" with_items: "{{ groups['proxy'] }}" become_user: root ``` inventory: ```yaml haproxy-01 haproxy-02 [proxy] haproxy-01 haproxy-02 ``` group_vars: ```yaml haproxy_socket_path: /run/haproxy.sock ``` host_vars: ``` yaml haproxy_server_name: app01 ``` vars: ``` yaml haproxy_backend_name: myapp ``` ##### EXPECTED RESULTS ``` TASK [disable backend server] *************************** changed: [appserver01 -> 172.X.X.X] => (item=haproxy-01) ``` ##### ACTUAL RESULTS ``` An exception occurred during task execution. To see the full traceback, use -vvv. The error was: TypeError: 'itertools.imap' object has no attribute '__getitem__' failed: [appserver01 -> 172.X.X.X] (item=haproxy-01) => {"failed": true, "item": "haproxy-01", "module_stderr": "Traceback (most recent call last):\n File \"/tmp/ansible_eJMmvQ/ansible_module_haproxy.py\", line 350, in <module>\n main()\n File \"/tmp/ansible_eJMmvQ/ansible_module_haproxy.py\", line 345, in main\n ansible_haproxy.act()\n File \"/tmp/ansible_eJMmvQ/ansible_module_haproxy.py\", line 306, in act\n self.disabled(self.host, self.backend, self.shutdown_sessions)\n File \"/tmp/ansible_eJMmvQ/ansible_module_haproxy.py\", line 291, in disabled\n self.execute_for_backends(cmd, backend, host, 'MAINT')\n File \"/tmp/ansible_eJMmvQ/ansible_module_haproxy.py\", line 237, in execute_for_backends\n self.wait_until_status(backend, svname, wait_for_status)\n File \"/tmp/ansible_eJMmvQ/ansible_module_haproxy.py\", line 262, in wait_until_status\n if state[0]['status'] == status:\nTypeError: 'itertools.imap' object has no attribute '__getitem__'\n", "module_stdout": "", "msg": "MODULE FAILURE"} An exception occurred during task execution. To see the full traceback, use -vvv. The error was: TypeError: 'itertools.imap' object has no attribute '__getitem__' failed: [appserver01 -> 172.X.X.Y] (item=haproxy-02) => {"failed": true, "item": "haproxy-02", "module_stderr": "Traceback (most recent call last):\n File \"/tmp/ansible_X3ixtX/ansible_module_haproxy.py\", line 350, in <module>\n main()\n File \"/tmp/ansible_X3ixtX/ansible_module_haproxy.py\", line 345, in main\n ansible_haproxy.act()\n File \"/tmp/ansible_X3ixtX/ansible_module_haproxy.py\", line 306, in act\n self.disabled(self.host, self.backend, self.shutdown_sessions)\n File \"/tmp/ansible_X3ixtX/ansible_module_haproxy.py\", line 291, in disabled\n self.execute_for_backends(cmd, backend, host, 'MAINT')\n File \"/tmp/ansible_X3ixtX/ansible_module_haproxy.py\", line 237, in execute_for_backends\n self.wait_until_status(backend, svname, wait_for_status)\n File \"/tmp/ansible_X3ixtX/ansible_module_haproxy.py\", line 262, in wait_until_status\n if state[0]['status'] == status:\nTypeError: 'itertools.imap' object has no attribute '__getitem__'\n", "module_stdout": "", "msg": "MODULE FAILURE"} ``` This relates to https://github.com/ansible/ansible-modules-extras/issues/3364.
non_priority
haproxy module fails itertools imap object has no attribute getitem issue type bug report component name haproxy module ansible version ansible configuration os environment ubuntu lts summary can t change backend status using haproxy module with ansible it fails with unexpected error steps to reproduce playbook yaml name disable backend server haproxy state disabled host haproxy server name socket hostvars backend haproxy backend name wait yes delegate to item with items groups become user root inventory yaml haproxy haproxy haproxy haproxy group vars yaml haproxy socket path run haproxy sock host vars yaml haproxy server name vars yaml haproxy backend name myapp expected results task changed item haproxy actual results an exception occurred during task execution to see the full traceback use vvv the error was typeerror itertools imap object has no attribute getitem failed item haproxy failed true item haproxy module stderr traceback most recent call last n file tmp ansible ejmmvq ansible module haproxy py line in n main n file tmp ansible ejmmvq ansible module haproxy py line in main n ansible haproxy act n file tmp ansible ejmmvq ansible module haproxy py line in act n self disabled self host self backend self shutdown sessions n file tmp ansible ejmmvq ansible module haproxy py line in disabled n self execute for backends cmd backend host maint n file tmp ansible ejmmvq ansible module haproxy py line in execute for backends n self wait until status backend svname wait for status n file tmp ansible ejmmvq ansible module haproxy py line in wait until status n if state status ntypeerror itertools imap object has no attribute getitem n module stdout msg module failure an exception occurred during task execution to see the full traceback use vvv the error was typeerror itertools imap object has no attribute getitem failed item haproxy failed true item haproxy module stderr traceback most recent call last n file tmp ansible ansible module haproxy py line in n main n file tmp ansible ansible module haproxy py line in main n ansible haproxy act n file tmp ansible ansible module haproxy py line in act n self disabled self host self backend self shutdown sessions n file tmp ansible ansible module haproxy py line in disabled n self execute for backends cmd backend host maint n file tmp ansible ansible module haproxy py line in execute for backends n self wait until status backend svname wait for status n file tmp ansible ansible module haproxy py line in wait until status n if state status ntypeerror itertools imap object has no attribute getitem n module stdout msg module failure this relates to
0
828,858
31,845,417,649
IssuesEvent
2023-09-14 19:31:50
GoogleCloudPlatform/alloydb-auth-proxy
https://api.github.com/repos/GoogleCloudPlatform/alloydb-auth-proxy
opened
tests: TestPostgresAuthWithCredentialsJSON failed
type: bug priority: p2 flakybot: issue
This test failed! To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot). If I'm commenting on this issue too often, add the `flakybot: quiet` label and I will stop commenting. --- commit: a176cce63958e448ddac90c92a56f96424f04b3f buildURL: https://github.com/GoogleCloudPlatform/alloydb-auth-proxy/actions/runs/6189779161 status: failed <details><summary>Test output</summary><br><pre> connection_test.go:87: unable to verify proxy was serving: 2023/09/14 19:31:06 The proxy has encountered a terminal error: unable to start: [alloydb-connector-testing.us-central1.cluster.instance] Unable to mount socket: listen tcp 127.0.0.1:5432: bind: address already in use </pre></details>
1.0
tests: TestPostgresAuthWithCredentialsJSON failed - This test failed! To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot). If I'm commenting on this issue too often, add the `flakybot: quiet` label and I will stop commenting. --- commit: a176cce63958e448ddac90c92a56f96424f04b3f buildURL: https://github.com/GoogleCloudPlatform/alloydb-auth-proxy/actions/runs/6189779161 status: failed <details><summary>Test output</summary><br><pre> connection_test.go:87: unable to verify proxy was serving: 2023/09/14 19:31:06 The proxy has encountered a terminal error: unable to start: [alloydb-connector-testing.us-central1.cluster.instance] Unable to mount socket: listen tcp 127.0.0.1:5432: bind: address already in use </pre></details>
priority
tests testpostgresauthwithcredentialsjson failed this test failed to configure my behavior see if i m commenting on this issue too often add the flakybot quiet label and i will stop commenting commit buildurl status failed test output connection test go unable to verify proxy was serving the proxy has encountered a terminal error unable to start unable to mount socket listen tcp bind address already in use
1
375,886
11,135,670,467
IssuesEvent
2019-12-20 14:53:51
overture-stack/billing
https://api.github.com/repos/overture-stack/billing
closed
Fix Remaining Vulnerabilities in 'billing-invoice', 'invoice-api'
Priority: High bug
Fix remaining Github security vulnerabilities in these services: * billing-invoice * invoice-api This could not be done until Python was upgraded and @yuanhengzhao had fixed the missing billing tests
1.0
Fix Remaining Vulnerabilities in 'billing-invoice', 'invoice-api' - Fix remaining Github security vulnerabilities in these services: * billing-invoice * invoice-api This could not be done until Python was upgraded and @yuanhengzhao had fixed the missing billing tests
priority
fix remaining vulnerabilities in billing invoice invoice api fix remaining github security vulnerabilities in these services billing invoice invoice api this could not be done until python was upgraded and yuanhengzhao had fixed the missing billing tests
1
384,976
26,610,387,023
IssuesEvent
2023-01-23 23:23:45
marloss/konohASCII
https://api.github.com/repos/marloss/konohASCII
closed
Preset system / Programozható rendszer
documentation
When launching the game, it creates a text file, where it saves the presets (like button mappings). If the player changes mappings, or game settings, after applying, the game overwrites said text file. Amikor a játék elindul, létrehoz egy txt fájlt, ahova lementi a beállításokat (mint a gomb kiosztást). Ha a játékos beállít a játékban egy új beállítást, miután alkalmazta, a játék fellülírja az említett fájlt.
1.0
Preset system / Programozható rendszer - When launching the game, it creates a text file, where it saves the presets (like button mappings). If the player changes mappings, or game settings, after applying, the game overwrites said text file. Amikor a játék elindul, létrehoz egy txt fájlt, ahova lementi a beállításokat (mint a gomb kiosztást). Ha a játékos beállít a játékban egy új beállítást, miután alkalmazta, a játék fellülírja az említett fájlt.
non_priority
preset system programozható rendszer when launching the game it creates a text file where it saves the presets like button mappings if the player changes mappings or game settings after applying the game overwrites said text file amikor a játék elindul létrehoz egy txt fájlt ahova lementi a beállításokat mint a gomb kiosztást ha a játékos beállít a játékban egy új beállítást miután alkalmazta a játék fellülírja az említett fájlt
0
65,188
7,860,818,709
IssuesEvent
2018-06-21 21:18:51
publiclab/plots2
https://api.github.com/repos/publiclab/plots2
opened
Don't allow newcomers to make/edit wiki pages until they've 1 question/post/note/activity approved
Ruby break-me-up design help-wanted
This still needs some more specific design thoughts -- something like: * a lock icon where the wiki edit tab is, for newcomers, and * have it popup a tooltip saying `Please post a question or other content before editing the wiki. Click to learn why.` or something. * a rerouting of /wiki/new or the new wiki form to the dashboard with a similar friendly message alert for newcomers. This is a temporary solution while we make a plan for a more robust wiki moderation system. Any help on this appreciated!
1.0
Don't allow newcomers to make/edit wiki pages until they've 1 question/post/note/activity approved - This still needs some more specific design thoughts -- something like: * a lock icon where the wiki edit tab is, for newcomers, and * have it popup a tooltip saying `Please post a question or other content before editing the wiki. Click to learn why.` or something. * a rerouting of /wiki/new or the new wiki form to the dashboard with a similar friendly message alert for newcomers. This is a temporary solution while we make a plan for a more robust wiki moderation system. Any help on this appreciated!
non_priority
don t allow newcomers to make edit wiki pages until they ve question post note activity approved this still needs some more specific design thoughts something like a lock icon where the wiki edit tab is for newcomers and have it popup a tooltip saying please post a question or other content before editing the wiki click to learn why or something a rerouting of wiki new or the new wiki form to the dashboard with a similar friendly message alert for newcomers this is a temporary solution while we make a plan for a more robust wiki moderation system any help on this appreciated
0
46,648
19,350,659,246
IssuesEvent
2021-12-15 15:20:19
geometry-labs/icon-status-page
https://api.github.com/repos/geometry-labs/icon-status-page
opened
🛑 EU Mainnet Contracts Service is down
status eu-mainnet-contracts-service
In [`f12ff57`](https://github.com/geometry-labs/icon-status-page/commit/f12ff57f3c6fcc863e4b8ecb774b1a8e48e5efba ), EU Mainnet Contracts Service (https://euw1.tracker.icon.geometry.io/api/v1/contracts) was **down**: - HTTP code: 503 - Response time: 73 ms
1.0
🛑 EU Mainnet Contracts Service is down - In [`f12ff57`](https://github.com/geometry-labs/icon-status-page/commit/f12ff57f3c6fcc863e4b8ecb774b1a8e48e5efba ), EU Mainnet Contracts Service (https://euw1.tracker.icon.geometry.io/api/v1/contracts) was **down**: - HTTP code: 503 - Response time: 73 ms
non_priority
🛑 eu mainnet contracts service is down in eu mainnet contracts service was down http code response time ms
0
828,442
31,829,314,577
IssuesEvent
2023-09-14 09:33:02
zephyrproject-rtos/zephyr
https://api.github.com/repos/zephyrproject-rtos/zephyr
reopened
arc64 local variable corruption in z_init_static_threads
bug priority: low area: ARC area: picolibc
**Describe the bug** When running the sample.portability.cmsis_rtos_v2.timer_synchronization test on arc64 under qemu using picolibc, `z_init_static_threads` goes into an infinite loop in the second instance of `_FOREACH_STATIC_THREAD` where it's calling `schedule_new_thread`. Debugging this, I discover that the register holding the termination value has been trashed and holds a completely bogus value (0x4275de2 instead of 0x80407594). Perturbing the code above the loop in essentially any way at all (I added `__asm__("")` just after `k_sched_lock()`) makes this issue go away. The difference in the assembly code is trivial -- it moves the load of `__static_thread_data_list_start` after the call to `k_sched_lock` Please also mention any information which could help others to understand the problem you're facing: - What target platform are you using? - qemu_arc_hs5x - SDK version zephyr-sdk-0.16.2-rc1-5-g8d9b4fe - picolibc instead of minimal C library. - What have you tried to diagnose or workaround this issue? Modifying the code in even trivial ways appears to work around this issue. I applied this diff: ``` diff --git a/kernel/thread.c b/kernel/thread.c index fb578eb48d..5721023929 100644 --- a/kernel/thread.c +++ b/kernel/thread.c @@ -783,6 +783,7 @@ void z_init_static_threads(void) * delay of K_FOREVER. */ k_sched_lock(); + __asm__(""); _FOREACH_STATIC_THREAD(thread_data) { if (thread_data->init_delay != K_TICKS_FOREVER) { schedule_new_thread(thread_data->init_thread, ``` This generated the following change in the generated code: ``` --- broken.S 2023-07-05 23:27:30.536430480 -0700 +++ working.S 2023-07-05 23:27:18.483894200 -0700 @@ -1073,8 +1073,8 @@ add2 r14,r14,11 .L106: blo_s .L107 - mov_s r14,@__static_thread_data_list_start bl @k_sched_lock + mov_s r14,@__static_thread_data_list_start .L108: mov_s r0,@__static_thread_data_list_end cmp_s r14,r0 ``` setting a break point on the `cmp_s` instruction here also makes things work. That makes me suspect that qemu might be at fault somehow? - Is this a regression? If yes, have you been able to "git bisect" it to a specific commit? - I haven't tried bisecting. **To Reproduce** Steps to reproduce the behavior: 1. ./scripts/twister -O arc64-bug -xCONFIG_PICOLIBC=y -p qemu_arc_hs5x --test samples/subsys/portability/cmsis_rtos_v2/timer_synchronization/sample.portability.cmsis_rtos_v2.timer_synchronization **Expected behavior** Test completes successfully **Impact** This will delay the switch to using picolibc as the default C library. **Environment (please complete the following information):** - OS: Debian unstable - Toolchain: SDK version 0.16.2-rc1-5-g8d9b4fe - Commit SHA or Version used: 8560fb319249e3fad3122f8541df4c4beef6e5e2 (main as of this writing)
1.0
arc64 local variable corruption in z_init_static_threads - **Describe the bug** When running the sample.portability.cmsis_rtos_v2.timer_synchronization test on arc64 under qemu using picolibc, `z_init_static_threads` goes into an infinite loop in the second instance of `_FOREACH_STATIC_THREAD` where it's calling `schedule_new_thread`. Debugging this, I discover that the register holding the termination value has been trashed and holds a completely bogus value (0x4275de2 instead of 0x80407594). Perturbing the code above the loop in essentially any way at all (I added `__asm__("")` just after `k_sched_lock()`) makes this issue go away. The difference in the assembly code is trivial -- it moves the load of `__static_thread_data_list_start` after the call to `k_sched_lock` Please also mention any information which could help others to understand the problem you're facing: - What target platform are you using? - qemu_arc_hs5x - SDK version zephyr-sdk-0.16.2-rc1-5-g8d9b4fe - picolibc instead of minimal C library. - What have you tried to diagnose or workaround this issue? Modifying the code in even trivial ways appears to work around this issue. I applied this diff: ``` diff --git a/kernel/thread.c b/kernel/thread.c index fb578eb48d..5721023929 100644 --- a/kernel/thread.c +++ b/kernel/thread.c @@ -783,6 +783,7 @@ void z_init_static_threads(void) * delay of K_FOREVER. */ k_sched_lock(); + __asm__(""); _FOREACH_STATIC_THREAD(thread_data) { if (thread_data->init_delay != K_TICKS_FOREVER) { schedule_new_thread(thread_data->init_thread, ``` This generated the following change in the generated code: ``` --- broken.S 2023-07-05 23:27:30.536430480 -0700 +++ working.S 2023-07-05 23:27:18.483894200 -0700 @@ -1073,8 +1073,8 @@ add2 r14,r14,11 .L106: blo_s .L107 - mov_s r14,@__static_thread_data_list_start bl @k_sched_lock + mov_s r14,@__static_thread_data_list_start .L108: mov_s r0,@__static_thread_data_list_end cmp_s r14,r0 ``` setting a break point on the `cmp_s` instruction here also makes things work. That makes me suspect that qemu might be at fault somehow? - Is this a regression? If yes, have you been able to "git bisect" it to a specific commit? - I haven't tried bisecting. **To Reproduce** Steps to reproduce the behavior: 1. ./scripts/twister -O arc64-bug -xCONFIG_PICOLIBC=y -p qemu_arc_hs5x --test samples/subsys/portability/cmsis_rtos_v2/timer_synchronization/sample.portability.cmsis_rtos_v2.timer_synchronization **Expected behavior** Test completes successfully **Impact** This will delay the switch to using picolibc as the default C library. **Environment (please complete the following information):** - OS: Debian unstable - Toolchain: SDK version 0.16.2-rc1-5-g8d9b4fe - Commit SHA or Version used: 8560fb319249e3fad3122f8541df4c4beef6e5e2 (main as of this writing)
priority
local variable corruption in z init static threads describe the bug when running the sample portability cmsis rtos timer synchronization test on under qemu using picolibc z init static threads goes into an infinite loop in the second instance of foreach static thread where it s calling schedule new thread debugging this i discover that the register holding the termination value has been trashed and holds a completely bogus value instead of perturbing the code above the loop in essentially any way at all i added asm just after k sched lock makes this issue go away the difference in the assembly code is trivial it moves the load of static thread data list start after the call to k sched lock please also mention any information which could help others to understand the problem you re facing what target platform are you using qemu arc sdk version zephyr sdk picolibc instead of minimal c library what have you tried to diagnose or workaround this issue modifying the code in even trivial ways appears to work around this issue i applied this diff diff git a kernel thread c b kernel thread c index a kernel thread c b kernel thread c void z init static threads void delay of k forever k sched lock asm foreach static thread thread data if thread data init delay k ticks forever schedule new thread thread data init thread this generated the following change in the generated code broken s working s blo s mov s static thread data list start bl k sched lock mov s static thread data list start mov s static thread data list end cmp s setting a break point on the cmp s instruction here also makes things work that makes me suspect that qemu might be at fault somehow is this a regression if yes have you been able to git bisect it to a specific commit i haven t tried bisecting to reproduce steps to reproduce the behavior scripts twister o bug xconfig picolibc y p qemu arc test samples subsys portability cmsis rtos timer synchronization sample portability cmsis rtos timer synchronization expected behavior test completes successfully impact this will delay the switch to using picolibc as the default c library environment please complete the following information os debian unstable toolchain sdk version commit sha or version used main as of this writing
1
79,611
3,537,667,790
IssuesEvent
2016-01-18 03:40:18
flike/kingshard
https://api.github.com/repos/flike/kingshard
closed
SQL执行结果错误,ks有数据返回,mysql没有
bug fixed low priority
仅用一个节点做测试: 错误描述,where a.id=b.id应该等效内连接,ks有结果返回,mysql没有 /*左表(分区)全部数据*/ [root@127.0.0.1]-[test]>select * from test_shard_hash a where 1 = 1; +----+------+------+-------+-----+------+ | id | str | f | e | u | i | +----+------+------+-------+-----+------+ | 1 | abc1 | 3.14 | test1 | 255 | -127 | | 2 | abc2 | 3.14 | test2 | 255 | -127 | | 3 | abc3 | 3.14 | test3 | 255 | -127 | | 4 | abc4 | 3.14 | test4 | 255 | -127 | | 5 | abc5 | 3.14 | test5 | 255 | -127 | +----+------+------+-------+-----+------+ 5 rows in set (0.01 sec) /*右表全部数据*/ [root@127.0.0.1]-[test]>select * from test_bug; Empty set (0.01 sec) /*ks执行*/ [root@127.0.0.1]-[test]>select * from test_shard_hash a,test_bug b where a.id = b.id; +----+------+------+-------+-----+------+ | id | str | f | e | u | i | +----+------+------+-------+-----+------+ | 1 | abc1 | 3.14 | test1 | 255 | -127 | | 2 | abc2 | 3.14 | test2 | 255 | -127 | | 3 | abc3 | 3.14 | test3 | 255 | -127 | | 4 | abc4 | 3.14 | test4 | 255 | -127 | | 5 | abc5 | 3.14 | test5 | 255 | -127 | +----+------+------+-------+-----+------+ 5 rows in set (0.01 sec) /*mysql执行*/ [root@127.0.0.1]-[test]>select * from test_shard_hash_0000 a,test_bug b where a.id = b.id; Empty set (0.01 sec)
1.0
SQL执行结果错误,ks有数据返回,mysql没有 - 仅用一个节点做测试: 错误描述,where a.id=b.id应该等效内连接,ks有结果返回,mysql没有 /*左表(分区)全部数据*/ [root@127.0.0.1]-[test]>select * from test_shard_hash a where 1 = 1; +----+------+------+-------+-----+------+ | id | str | f | e | u | i | +----+------+------+-------+-----+------+ | 1 | abc1 | 3.14 | test1 | 255 | -127 | | 2 | abc2 | 3.14 | test2 | 255 | -127 | | 3 | abc3 | 3.14 | test3 | 255 | -127 | | 4 | abc4 | 3.14 | test4 | 255 | -127 | | 5 | abc5 | 3.14 | test5 | 255 | -127 | +----+------+------+-------+-----+------+ 5 rows in set (0.01 sec) /*右表全部数据*/ [root@127.0.0.1]-[test]>select * from test_bug; Empty set (0.01 sec) /*ks执行*/ [root@127.0.0.1]-[test]>select * from test_shard_hash a,test_bug b where a.id = b.id; +----+------+------+-------+-----+------+ | id | str | f | e | u | i | +----+------+------+-------+-----+------+ | 1 | abc1 | 3.14 | test1 | 255 | -127 | | 2 | abc2 | 3.14 | test2 | 255 | -127 | | 3 | abc3 | 3.14 | test3 | 255 | -127 | | 4 | abc4 | 3.14 | test4 | 255 | -127 | | 5 | abc5 | 3.14 | test5 | 255 | -127 | +----+------+------+-------+-----+------+ 5 rows in set (0.01 sec) /*mysql执行*/ [root@127.0.0.1]-[test]>select * from test_shard_hash_0000 a,test_bug b where a.id = b.id; Empty set (0.01 sec)
priority
sql执行结果错误,ks有数据返回,mysql没有 仅用一个节点做测试: 错误描述,where a id b id应该等效内连接,ks有结果返回,mysql没有 左表(分区)全部数据 select from test shard hash a where id str f e u i rows in set sec 右表全部数据 select from test bug empty set sec ks执行 select from test shard hash a test bug b where a id b id id str f e u i rows in set sec mysql执行 select from test shard hash a test bug b where a id b id empty set sec
1
61,263
12,157,225,342
IssuesEvent
2020-04-25 20:54:54
Sonia-corporation/il-est-midi-discord
https://api.github.com/repos/Sonia-corporation/il-est-midi-discord
closed
Fix "method_lines" issue in src/features/github/functions/get-humanized-release-notes.ts
code-climate
Function `getHumanizedReleaseNotes` has 30 lines of code (exceeds 25 allowed). Consider refactoring. https://codeclimate.com/github/Sonia-corporation/il-est-midi-discord/src/features/github/functions/get-humanized-release-notes.ts#issue_5e81d19376162700010000b8
1.0
Fix "method_lines" issue in src/features/github/functions/get-humanized-release-notes.ts - Function `getHumanizedReleaseNotes` has 30 lines of code (exceeds 25 allowed). Consider refactoring. https://codeclimate.com/github/Sonia-corporation/il-est-midi-discord/src/features/github/functions/get-humanized-release-notes.ts#issue_5e81d19376162700010000b8
non_priority
fix method lines issue in src features github functions get humanized release notes ts function gethumanizedreleasenotes has lines of code exceeds allowed consider refactoring
0
330,926
28,496,125,890
IssuesEvent
2023-04-18 14:21:22
microsoft/vscode
https://api.github.com/repos/microsoft/vscode
opened
Build failed: EditorMemento - use with editor input Assertion failed: (timeout != -1)
unit-test-failure
Build: https://dev.azure.com/monacotools/a6d41577-0fa3-498e-af22-257312ff0545/_build/results?buildId=211221 Changes: https://github.com/Microsoft/vscode/compare/7559567...498b681 ![Screenshot 2023-04-18 at 7 18 00 AM](https://user-images.githubusercontent.com/29464607/232806208-d58b1915-ace0-4d29-af3c-51836029f502.png)
1.0
Build failed: EditorMemento - use with editor input Assertion failed: (timeout != -1) - Build: https://dev.azure.com/monacotools/a6d41577-0fa3-498e-af22-257312ff0545/_build/results?buildId=211221 Changes: https://github.com/Microsoft/vscode/compare/7559567...498b681 ![Screenshot 2023-04-18 at 7 18 00 AM](https://user-images.githubusercontent.com/29464607/232806208-d58b1915-ace0-4d29-af3c-51836029f502.png)
non_priority
build failed editormemento use with editor input assertion failed timeout build changes
0
356,905
10,599,053,185
IssuesEvent
2019-10-10 06:59:19
constellation-app/constellation
https://api.github.com/repos/constellation-app/constellation
opened
Support for a generic JDBC connector
enhancement priority request
<!-- ### Requirements * Filling out the template is required. Any pull request that does not include enough information to be reviewed in a timely manner may be closed at the maintainers' discretion. * Have you read Constellation's Code of Conduct? By filing an issue, you are expected to comply with it, including treating everyone with respect: https://github.com/constellation-app/constellation/blob/master/CODE_OF_CONDUCT.md --> ### Prerequisites * [X] Put an X between the brackets on this line if you have done all of the following: * Running the latest version of Constellation * Attached the ***Support Package*** via `Help` > `Support Package` * Checked the FAQs: https://github.com/constellation-app/constellation/wiki/FAQ * Checked that your issue isn't already filed: https://github.com/constellation-app/constellation/issues * Checked that there is not already a module that provides the described functionality: https://github.com/constellation-app/constellation/wiki/Catalogue-of-Repositories ### Description The ability to connect Constellation to a database using JDBC is required for end users to be able to import data into Constellation without needing to be a developer and writing their own connector. The JDBC Import GUI should allow a user to connect to a database by providing the host, port, database, username and password. You should be able type your SQL query and then map the results to node or transaction attributes. Consider using the Import From Delimited to achieve this. Suggestions welcomed.
1.0
Support for a generic JDBC connector - <!-- ### Requirements * Filling out the template is required. Any pull request that does not include enough information to be reviewed in a timely manner may be closed at the maintainers' discretion. * Have you read Constellation's Code of Conduct? By filing an issue, you are expected to comply with it, including treating everyone with respect: https://github.com/constellation-app/constellation/blob/master/CODE_OF_CONDUCT.md --> ### Prerequisites * [X] Put an X between the brackets on this line if you have done all of the following: * Running the latest version of Constellation * Attached the ***Support Package*** via `Help` > `Support Package` * Checked the FAQs: https://github.com/constellation-app/constellation/wiki/FAQ * Checked that your issue isn't already filed: https://github.com/constellation-app/constellation/issues * Checked that there is not already a module that provides the described functionality: https://github.com/constellation-app/constellation/wiki/Catalogue-of-Repositories ### Description The ability to connect Constellation to a database using JDBC is required for end users to be able to import data into Constellation without needing to be a developer and writing their own connector. The JDBC Import GUI should allow a user to connect to a database by providing the host, port, database, username and password. You should be able type your SQL query and then map the results to node or transaction attributes. Consider using the Import From Delimited to achieve this. Suggestions welcomed.
priority
support for a generic jdbc connector requirements filling out the template is required any pull request that does not include enough information to be reviewed in a timely manner may be closed at the maintainers discretion have you read constellation s code of conduct by filing an issue you are expected to comply with it including treating everyone with respect prerequisites put an x between the brackets on this line if you have done all of the following running the latest version of constellation attached the support package via help support package checked the faqs checked that your issue isn t already filed checked that there is not already a module that provides the described functionality description the ability to connect constellation to a database using jdbc is required for end users to be able to import data into constellation without needing to be a developer and writing their own connector the jdbc import gui should allow a user to connect to a database by providing the host port database username and password you should be able type your sql query and then map the results to node or transaction attributes consider using the import from delimited to achieve this suggestions welcomed
1
78,466
22,284,212,203
IssuesEvent
2022-06-11 11:03:27
cgeo/cgeo
https://api.github.com/repos/cgeo/cgeo
opened
Runtime JAR files in the classpath should have the same version
CI server / Build tools
### Describe your problem! since PR #12883 with integration of loupe(`implementation 'io.github.igreenwood.loupe:loupe:1.2.2'`) we see this warning in the gradle output: ~~~ 11:47:38 > Task :main:lintBasicDebug 11:47:38 w: Runtime JAR files in the classpath should have the same version. These files were found in the classpath: 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib-common/1.5.31/43331609c7de811fed085e0dfd150874b157c32/kotlin-stdlib-common-1.5.31.jar (version 1.5) 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib-jdk8/1.4.21/3ad7f99fb330947a12451ea16767d192d763600a/kotlin-stdlib-jdk8-1.4.21.jar (version 1.4) 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib-jdk7/1.5.31/77e0f2568912e45d26c31fd417a332458508acdf/kotlin-stdlib-jdk7-1.5.31.jar (version 1.5) 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib/1.5.31/6628d61d0f5603568e72d2d5915d2c034b4f1c55/kotlin-stdlib-1.5.31.jar (version 1.5) 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib-jdk7/1.4.21/26b6082f9296911bdcb8e72a7cc68692c7025a03/kotlin-stdlib-jdk7-1.4.21.jar (version 1.4) 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib/1.4.21/4a668382d7c38688d3490afde93b6a113ed46698/kotlin-stdlib-1.4.21.jar (version 1.4) 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib-common/1.4.21/7f48a062aa4b53215998780f7c245a4276828e1d/kotlin-stdlib-common-1.4.21.jar (version 1.4) 11:47:38 w: Some runtime JAR files in the classpath have an incompatible version. Consider removing them from the classpath ~~~ ### How to reproduce? see the Jenkins console output ### Actual result after these steps? _No response_ ### Expected result after these steps? _No response_ ### Reproducible Yes ### c:geo Version today nightly, PR, Release 220606 ### System information ```text https://ci.cgeo.org/job/cgeo%20nightly/2691/console https://ci.cgeo.org/job/cgeo%20release/115/console ``` ### Additional Information _No response_
1.0
Runtime JAR files in the classpath should have the same version - ### Describe your problem! since PR #12883 with integration of loupe(`implementation 'io.github.igreenwood.loupe:loupe:1.2.2'`) we see this warning in the gradle output: ~~~ 11:47:38 > Task :main:lintBasicDebug 11:47:38 w: Runtime JAR files in the classpath should have the same version. These files were found in the classpath: 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib-common/1.5.31/43331609c7de811fed085e0dfd150874b157c32/kotlin-stdlib-common-1.5.31.jar (version 1.5) 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib-jdk8/1.4.21/3ad7f99fb330947a12451ea16767d192d763600a/kotlin-stdlib-jdk8-1.4.21.jar (version 1.4) 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib-jdk7/1.5.31/77e0f2568912e45d26c31fd417a332458508acdf/kotlin-stdlib-jdk7-1.5.31.jar (version 1.5) 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib/1.5.31/6628d61d0f5603568e72d2d5915d2c034b4f1c55/kotlin-stdlib-1.5.31.jar (version 1.5) 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib-jdk7/1.4.21/26b6082f9296911bdcb8e72a7cc68692c7025a03/kotlin-stdlib-jdk7-1.4.21.jar (version 1.4) 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib/1.4.21/4a668382d7c38688d3490afde93b6a113ed46698/kotlin-stdlib-1.4.21.jar (version 1.4) 11:47:38 /home/jenkins/.gradle/caches/modules-2/files-2.1/org.jetbrains.kotlin/kotlin-stdlib-common/1.4.21/7f48a062aa4b53215998780f7c245a4276828e1d/kotlin-stdlib-common-1.4.21.jar (version 1.4) 11:47:38 w: Some runtime JAR files in the classpath have an incompatible version. Consider removing them from the classpath ~~~ ### How to reproduce? see the Jenkins console output ### Actual result after these steps? _No response_ ### Expected result after these steps? _No response_ ### Reproducible Yes ### c:geo Version today nightly, PR, Release 220606 ### System information ```text https://ci.cgeo.org/job/cgeo%20nightly/2691/console https://ci.cgeo.org/job/cgeo%20release/115/console ``` ### Additional Information _No response_
non_priority
runtime jar files in the classpath should have the same version describe your problem since pr with integration of loupe implementation io github igreenwood loupe loupe we see this warning in the gradle output task main lintbasicdebug w runtime jar files in the classpath should have the same version these files were found in the classpath home jenkins gradle caches modules files org jetbrains kotlin kotlin stdlib common kotlin stdlib common jar version home jenkins gradle caches modules files org jetbrains kotlin kotlin stdlib kotlin stdlib jar version home jenkins gradle caches modules files org jetbrains kotlin kotlin stdlib kotlin stdlib jar version home jenkins gradle caches modules files org jetbrains kotlin kotlin stdlib kotlin stdlib jar version home jenkins gradle caches modules files org jetbrains kotlin kotlin stdlib kotlin stdlib jar version home jenkins gradle caches modules files org jetbrains kotlin kotlin stdlib kotlin stdlib jar version home jenkins gradle caches modules files org jetbrains kotlin kotlin stdlib common kotlin stdlib common jar version w some runtime jar files in the classpath have an incompatible version consider removing them from the classpath how to reproduce see the jenkins console output actual result after these steps no response expected result after these steps no response reproducible yes c geo version today nightly pr release system information text additional information no response
0
139,820
18,855,911,598
IssuesEvent
2021-11-12 06:14:45
kubesphere/kubesphere
https://api.github.com/repos/kubesphere/kubesphere
closed
Secure third-party services
area/security kind/need-to-verify kind/feature-request
**What's it about?** Some services like Kiali or Jaeger didn't provide a built-in authentication mechanism or security setup up with default settings. All the tenancies could access those services directly within the cluster, so there a potential risk of information exposure. We need to find a proper way to protect each of the third-party services. And use secure connections between ks-apiserver and third-party services. **What's the reason why we need it?** Security is one of the most important features of KubeSphere. Some other discussions in the [forum](https://kubesphere.com.cn/forum/d/4970-kubersphere-310-kiali) **Area Suggestion** /area security /kind feature-request /cc @wansir @zryfish
True
Secure third-party services - **What's it about?** Some services like Kiali or Jaeger didn't provide a built-in authentication mechanism or security setup up with default settings. All the tenancies could access those services directly within the cluster, so there a potential risk of information exposure. We need to find a proper way to protect each of the third-party services. And use secure connections between ks-apiserver and third-party services. **What's the reason why we need it?** Security is one of the most important features of KubeSphere. Some other discussions in the [forum](https://kubesphere.com.cn/forum/d/4970-kubersphere-310-kiali) **Area Suggestion** /area security /kind feature-request /cc @wansir @zryfish
non_priority
secure third party services what s it about some services like kiali or jaeger didn t provide a built in authentication mechanism or security setup up with default settings all the tenancies could access those services directly within the cluster so there a potential risk of information exposure we need to find a proper way to protect each of the third party services and use secure connections between ks apiserver and third party services what s the reason why we need it security is one of the most important features of kubesphere some other discussions in the area suggestion area security kind feature request cc wansir zryfish
0
365,349
10,780,943,654
IssuesEvent
2019-11-04 14:01:11
vigetlabs/npm
https://api.github.com/repos/vigetlabs/npm
closed
[QA] Quote block polish
High Priority Needs QA Fixes
* [x] **Carousel functionality doesn’t appear to be working**—if multiple testimonials are added, nothing happens when I click the arrows (image and text doesn’t change). * [x] If there’s **only one testimonial in the testimonial block** (carousel w/ image on homepage), the arrows should be hidden. * [x] **Image should take up the full height of the block** (teal background). ([screenshot with comp on left, staging on right](https://www.dropbox.com/s/u012285ylik35f7/Screenshot%202019-10-18%2008.30.25.png?dl=0))
1.0
[QA] Quote block polish - * [x] **Carousel functionality doesn’t appear to be working**—if multiple testimonials are added, nothing happens when I click the arrows (image and text doesn’t change). * [x] If there’s **only one testimonial in the testimonial block** (carousel w/ image on homepage), the arrows should be hidden. * [x] **Image should take up the full height of the block** (teal background). ([screenshot with comp on left, staging on right](https://www.dropbox.com/s/u012285ylik35f7/Screenshot%202019-10-18%2008.30.25.png?dl=0))
priority
quote block polish carousel functionality doesn’t appear to be working —if multiple testimonials are added nothing happens when i click the arrows image and text doesn’t change if there’s only one testimonial in the testimonial block carousel w image on homepage the arrows should be hidden image should take up the full height of the block teal background
1
443,289
12,780,803,798
IssuesEvent
2020-07-01 01:55:48
wearable-learning-cloud-platform/wlcp-issues
https://api.github.com/repos/wearable-learning-cloud-platform/wlcp-issues
closed
Game Editor: On State Cancel State Name Persists
bug game editor low priority
Steps for Replication: 1. Make a state 2. Type something into the state description (first field) 3. Hit cancel on the state The state name is changed on the diagram despite cancelling.
1.0
Game Editor: On State Cancel State Name Persists - Steps for Replication: 1. Make a state 2. Type something into the state description (first field) 3. Hit cancel on the state The state name is changed on the diagram despite cancelling.
priority
game editor on state cancel state name persists steps for replication make a state type something into the state description first field hit cancel on the state the state name is changed on the diagram despite cancelling
1
96,085
19,897,257,456
IssuesEvent
2022-01-25 01:26:16
WISE-Community/WISE-Client
https://api.github.com/repos/WISE-Community/WISE-Client
closed
Remove componentController
Code Quality
### Description ComponentController is no longer used. It was part of AngularJS app and has been replaced by ComponentStudent in Angular. Remove and test that everything works as before.
1.0
Remove componentController - ### Description ComponentController is no longer used. It was part of AngularJS app and has been replaced by ComponentStudent in Angular. Remove and test that everything works as before.
non_priority
remove componentcontroller description componentcontroller is no longer used it was part of angularjs app and has been replaced by componentstudent in angular remove and test that everything works as before
0
476,316
13,736,754,690
IssuesEvent
2020-10-05 12:14:57
DimiMikadze/create-social-network
https://api.github.com/repos/DimiMikadze/create-social-network
opened
Detect no authorized request
priority: critical source: api source: frontend
Detect if a User isn't authorized to make a request and automatically sign out from the application.
1.0
Detect no authorized request - Detect if a User isn't authorized to make a request and automatically sign out from the application.
priority
detect no authorized request detect if a user isn t authorized to make a request and automatically sign out from the application
1
3,413
4,402,570,078
IssuesEvent
2016-08-11 01:57:11
zcash/zcash
https://api.github.com/repos/zcash/zcash
closed
Address Sanitizer Finding alloc-dealloc-mismatch
bug PoW and mining SECURITY
0x602004828bd0 is located 0 bytes inside of 16-byte region [0x602004828bd0,0x602004828be0) allocated by thread T0 here: #0 0x560f9b129090 in operator new[](unsigned long) (/home/rcs/Test/zcash/zcash/src/test/test_bitcoin+0x14e090) #1 0x560f9b4dec0d in TruncatedStepRow<20ul>::GetTruncatedIndices(unsigned long, unsigned long) const crypto/equihash.cpp:203 #2 0x560f9b4dec0d in Equihash<96u, 5u>::OptimisedSolve(crypto_generichash_blake2b_state const&, std::function<bool (std::vector<unsigned int, std::allocator<unsigned int> >)>, std::function<bool (EhSolverCancelCheck)>) crypto/equihash.cpp:428 #3 0x560f9b1e10f3 in EhOptimisedSolve(unsigned int, unsigned int, crypto_generichash_blake2b_state const&, std::function<bool (std::vector<unsigned int, std::allocator<unsigned int> >)>, std::function<bool (EhSolverCancelCheck)>) crypto/equihash.h:224 #4 0x560f9b1e10f3 in EhOptimisedSolveUncancellable(unsigned int, unsigned int, crypto_generichash_blake2b_state const&, std::function<bool (std::vector<unsigned int, std::allocator<unsigned int> >)>) crypto/equihash.h:236 #5 0x560f9b1e10f3 in equihash_tests::TestEquihashSolvers(unsigned int, unsigned int, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, arith_uint256 const&, std::set<std::vector<unsigned int, std::allocator<unsigned int> >, std::less<std::vector<unsigned int, std::allocator<unsigned int> > >, std::allocator<std::vector<unsigned int, std::allocator<unsigned int> > > > const&) test/equihash_tests.cpp:72 #6 0x560f9b1e1acc in equihash_tests::solver_testvectors::test_method() test/equihash_tests.cpp:98 #7 0xb (<unknown module>) #8 0xac0b210072656460 (<unknown module>) SUMMARY: AddressSanitizer: alloc-dealloc-mismatch (/home/rcs/Test/zcash/zcash/src/test/test_bitcoin+0x14e570) in operator delete(void*)
True
Address Sanitizer Finding alloc-dealloc-mismatch - 0x602004828bd0 is located 0 bytes inside of 16-byte region [0x602004828bd0,0x602004828be0) allocated by thread T0 here: #0 0x560f9b129090 in operator new[](unsigned long) (/home/rcs/Test/zcash/zcash/src/test/test_bitcoin+0x14e090) #1 0x560f9b4dec0d in TruncatedStepRow<20ul>::GetTruncatedIndices(unsigned long, unsigned long) const crypto/equihash.cpp:203 #2 0x560f9b4dec0d in Equihash<96u, 5u>::OptimisedSolve(crypto_generichash_blake2b_state const&, std::function<bool (std::vector<unsigned int, std::allocator<unsigned int> >)>, std::function<bool (EhSolverCancelCheck)>) crypto/equihash.cpp:428 #3 0x560f9b1e10f3 in EhOptimisedSolve(unsigned int, unsigned int, crypto_generichash_blake2b_state const&, std::function<bool (std::vector<unsigned int, std::allocator<unsigned int> >)>, std::function<bool (EhSolverCancelCheck)>) crypto/equihash.h:224 #4 0x560f9b1e10f3 in EhOptimisedSolveUncancellable(unsigned int, unsigned int, crypto_generichash_blake2b_state const&, std::function<bool (std::vector<unsigned int, std::allocator<unsigned int> >)>) crypto/equihash.h:236 #5 0x560f9b1e10f3 in equihash_tests::TestEquihashSolvers(unsigned int, unsigned int, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, arith_uint256 const&, std::set<std::vector<unsigned int, std::allocator<unsigned int> >, std::less<std::vector<unsigned int, std::allocator<unsigned int> > >, std::allocator<std::vector<unsigned int, std::allocator<unsigned int> > > > const&) test/equihash_tests.cpp:72 #6 0x560f9b1e1acc in equihash_tests::solver_testvectors::test_method() test/equihash_tests.cpp:98 #7 0xb (<unknown module>) #8 0xac0b210072656460 (<unknown module>) SUMMARY: AddressSanitizer: alloc-dealloc-mismatch (/home/rcs/Test/zcash/zcash/src/test/test_bitcoin+0x14e570) in operator delete(void*)
non_priority
address sanitizer finding alloc dealloc mismatch is located bytes inside of byte region allocated by thread here in operator new unsigned long home rcs test zcash zcash src test test bitcoin in truncatedsteprow gettruncatedindices unsigned long unsigned long const crypto equihash cpp in equihash optimisedsolve crypto generichash state const std function std function crypto equihash cpp in ehoptimisedsolve unsigned int unsigned int crypto generichash state const std function std function crypto equihash h in ehoptimisedsolveuncancellable unsigned int unsigned int crypto generichash state const std function crypto equihash h in equihash tests testequihashsolvers unsigned int unsigned int std basic string std allocator const arith const std set std less std allocator const test equihash tests cpp in equihash tests solver testvectors test method test equihash tests cpp summary addresssanitizer alloc dealloc mismatch home rcs test zcash zcash src test test bitcoin in operator delete void
0
103,117
4,164,703,282
IssuesEvent
2016-06-19 00:29:14
notsecure/uTox
https://api.github.com/repos/notsecure/uTox
closed
Timed history clear
enhancement low_priority
Clear messages after X time would be very useful for those that do not use remember history but keep uTox running in places where closing is not needed but auto clear would be good.
1.0
Timed history clear - Clear messages after X time would be very useful for those that do not use remember history but keep uTox running in places where closing is not needed but auto clear would be good.
priority
timed history clear clear messages after x time would be very useful for those that do not use remember history but keep utox running in places where closing is not needed but auto clear would be good
1
168,688
14,170,189,061
IssuesEvent
2020-11-12 14:14:04
NRL-Plasma-Physics-Division/turbopy
https://api.github.com/repos/NRL-Plasma-Physics-Division/turbopy
opened
Add "Attribution" section to the readme
documentation
There should be more details in the readme file on how to appropriately cite turboPy.
1.0
Add "Attribution" section to the readme - There should be more details in the readme file on how to appropriately cite turboPy.
non_priority
add attribution section to the readme there should be more details in the readme file on how to appropriately cite turbopy
0
79,690
10,137,199,752
IssuesEvent
2019-08-02 14:45:04
pesser/edflow
https://api.github.com/repos/pesser/edflow
opened
document features
documentation
some features were added and we should find a place to document them: - expansion with retrieve - path based command line updates of config - path based variable substitution in config other existing functionality also needs some promotion: - pprint and pp2mkdtable are useful but forgotten - retrieve, set_value, walk, contains_key offer nice functionality for path based dictionary manipulations
1.0
document features - some features were added and we should find a place to document them: - expansion with retrieve - path based command line updates of config - path based variable substitution in config other existing functionality also needs some promotion: - pprint and pp2mkdtable are useful but forgotten - retrieve, set_value, walk, contains_key offer nice functionality for path based dictionary manipulations
non_priority
document features some features were added and we should find a place to document them expansion with retrieve path based command line updates of config path based variable substitution in config other existing functionality also needs some promotion pprint and are useful but forgotten retrieve set value walk contains key offer nice functionality for path based dictionary manipulations
0
231,874
25,552,078,106
IssuesEvent
2022-11-30 01:11:48
massimobonanni/AzureFunctionsSamples
https://api.github.com/repos/massimobonanni/AzureFunctionsSamples
closed
CVE-2017-0249 (High) detected in system.net.http.4.3.0.nupkg - autoclosed
security vulnerability
## CVE-2017-0249 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>system.net.http.4.3.0.nupkg</b></p></summary> <p>Provides a programming interface for modern HTTP applications, including HTTP client components that...</p> <p>Library home page: <a href="https://api.nuget.org/packages/system.net.http.4.3.0.nupkg">https://api.nuget.org/packages/system.net.http.4.3.0.nupkg</a></p> <p>Path to dependency file: /AppConfigSyncFunction/AppConfigSyncFunction.Tests/AppConfigSyncFunction.Tests.csproj</p> <p>Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg</p> <p> Dependency Hierarchy: - microsoft.net.sdk.functions.3.0.10.nupkg (Root Library) - microsoft.azure.webjobs.extensions.http.3.0.0.nupkg - microsoft.aspnet.webapi.client.5.2.4.nupkg - newtonsoft.json.bson.1.0.1.nupkg - netstandard.library.1.6.1.nupkg - :x: **system.net.http.4.3.0.nupkg** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An elevation of privilege vulnerability exists when the ASP.NET Core fails to properly sanitize web requests. <p>Publish Date: 2017-05-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0249>CVE-2017-0249</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2017-05-12</p> <p>Fix Resolution: System.Text.Encodings.Web - 4.0.1,4.3.1;System.Net.Http - 4.1.2,4.3.2;System.Net.Http.WinHttpHandler - 4.0.2,4.3.1;System.Net.Security - 4.0.1,4.3.1;System.Net.WebSockets.Client - 4.0.1,4.3.1;Microsoft.AspNetCore.Mvc - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Core - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Abstractions - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.ApiExplorer - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Cors - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.DataAnnotations - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Json - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Localization - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Razor.Host - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Razor - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.TagHelpers - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.ViewFeatures - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.0.4,1.1.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2017-0249 (High) detected in system.net.http.4.3.0.nupkg - autoclosed - ## CVE-2017-0249 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>system.net.http.4.3.0.nupkg</b></p></summary> <p>Provides a programming interface for modern HTTP applications, including HTTP client components that...</p> <p>Library home page: <a href="https://api.nuget.org/packages/system.net.http.4.3.0.nupkg">https://api.nuget.org/packages/system.net.http.4.3.0.nupkg</a></p> <p>Path to dependency file: /AppConfigSyncFunction/AppConfigSyncFunction.Tests/AppConfigSyncFunction.Tests.csproj</p> <p>Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg</p> <p> Dependency Hierarchy: - microsoft.net.sdk.functions.3.0.10.nupkg (Root Library) - microsoft.azure.webjobs.extensions.http.3.0.0.nupkg - microsoft.aspnet.webapi.client.5.2.4.nupkg - newtonsoft.json.bson.1.0.1.nupkg - netstandard.library.1.6.1.nupkg - :x: **system.net.http.4.3.0.nupkg** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An elevation of privilege vulnerability exists when the ASP.NET Core fails to properly sanitize web requests. <p>Publish Date: 2017-05-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0249>CVE-2017-0249</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2017-05-12</p> <p>Fix Resolution: System.Text.Encodings.Web - 4.0.1,4.3.1;System.Net.Http - 4.1.2,4.3.2;System.Net.Http.WinHttpHandler - 4.0.2,4.3.1;System.Net.Security - 4.0.1,4.3.1;System.Net.WebSockets.Client - 4.0.1,4.3.1;Microsoft.AspNetCore.Mvc - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Core - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Abstractions - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.ApiExplorer - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Cors - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.DataAnnotations - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Json - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Localization - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Razor.Host - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Razor - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.TagHelpers - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.ViewFeatures - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.0.4,1.1.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in system net http nupkg autoclosed cve high severity vulnerability vulnerable library system net http nupkg provides a programming interface for modern http applications including http client components that library home page a href path to dependency file appconfigsyncfunction appconfigsyncfunction tests appconfigsyncfunction tests csproj path to vulnerable library home wss scanner nuget packages system net http system net http nupkg dependency hierarchy microsoft net sdk functions nupkg root library microsoft azure webjobs extensions http nupkg microsoft aspnet webapi client nupkg newtonsoft json bson nupkg netstandard library nupkg x system net http nupkg vulnerable library found in base branch master vulnerability details an elevation of privilege vulnerability exists when the asp net core fails to properly sanitize web requests publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version release date fix resolution system text encodings web system net http system net http winhttphandler system net security system net websockets client microsoft aspnetcore mvc microsoft aspnetcore mvc core microsoft aspnetcore mvc abstractions microsoft aspnetcore mvc apiexplorer microsoft aspnetcore mvc cors microsoft aspnetcore mvc dataannotations microsoft aspnetcore mvc formatters json microsoft aspnetcore mvc formatters xml microsoft aspnetcore mvc localization microsoft aspnetcore mvc razor host microsoft aspnetcore mvc razor microsoft aspnetcore mvc taghelpers microsoft aspnetcore mvc viewfeatures microsoft aspnetcore mvc webapicompatshim step up your open source security game with mend
0
679,844
23,247,448,529
IssuesEvent
2022-08-03 21:50:35
brave/brave-browser
https://api.github.com/repos/brave/brave-browser
closed
[Android] Verified Twitch account doesn't show verified in BR panel
feature/rewards priority/P3 QA/Yes OS/Android
<!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue. PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE. INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED--> ## Description <!--Provide a brief description of the issue--> Verified Twitch account doesn't show verified in BR panel ## Steps to Reproduce <!--Please add a series of steps to reproduce the issue--> 1. Open verified twitch account on staging 2. Check the BR panel, shows non-verified 3. Open a-c list, shows as verified ## Actual result: <!--Please add screenshots if needed--> ![screenshot_20190302-165531](https://user-images.githubusercontent.com/17010094/53688423-a6948380-3d11-11e9-9028-b2750ca39076.png) ![screenshot_20190302-165543](https://user-images.githubusercontent.com/17010094/53688424-a6948380-3d11-11e9-9072-90dd227643c6.png) ## Expected result: Should show verified in all places ## Issue reproduces how often: <!--[Easily reproduced/Intermittent issue/No steps to reproduce]--> ## Issue happens on: <!-- Mention yes or no --> - Current Playstore version? - Beta build? ## Device Details: - Install Type(ARM, x86):ARM - Device(Phone, Tablet, Phablet): Phone - Android Version: 9.0 ## Brave version: 1.0.85 ### Website problems only: - Does the issue resolve itself when disabling Brave Shields? - Is the issue reproducible on the latest version of Chrome? ### Additional Information <!--Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue-->
1.0
[Android] Verified Twitch account doesn't show verified in BR panel - <!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue. PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE. INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED--> ## Description <!--Provide a brief description of the issue--> Verified Twitch account doesn't show verified in BR panel ## Steps to Reproduce <!--Please add a series of steps to reproduce the issue--> 1. Open verified twitch account on staging 2. Check the BR panel, shows non-verified 3. Open a-c list, shows as verified ## Actual result: <!--Please add screenshots if needed--> ![screenshot_20190302-165531](https://user-images.githubusercontent.com/17010094/53688423-a6948380-3d11-11e9-9028-b2750ca39076.png) ![screenshot_20190302-165543](https://user-images.githubusercontent.com/17010094/53688424-a6948380-3d11-11e9-9072-90dd227643c6.png) ## Expected result: Should show verified in all places ## Issue reproduces how often: <!--[Easily reproduced/Intermittent issue/No steps to reproduce]--> ## Issue happens on: <!-- Mention yes or no --> - Current Playstore version? - Beta build? ## Device Details: - Install Type(ARM, x86):ARM - Device(Phone, Tablet, Phablet): Phone - Android Version: 9.0 ## Brave version: 1.0.85 ### Website problems only: - Does the issue resolve itself when disabling Brave Shields? - Is the issue reproducible on the latest version of Chrome? ### Additional Information <!--Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue-->
priority
verified twitch account doesn t show verified in br panel have you searched for similar issues before submitting this issue please check the open issues and add a note before logging a new issue please use the template below to provide information about the issue insufficient info will get the issue closed it will only be reopened after sufficient info is provided description verified twitch account doesn t show verified in br panel steps to reproduce open verified twitch account on staging check the br panel shows non verified open a c list shows as verified actual result expected result should show verified in all places issue reproduces how often issue happens on current playstore version beta build device details install type arm arm device phone tablet phablet phone android version brave version website problems only does the issue resolve itself when disabling brave shields is the issue reproducible on the latest version of chrome additional information
1
793,990
28,019,044,663
IssuesEvent
2023-03-28 02:48:02
insightsengineering/tern
https://api.github.com/repos/insightsengineering/tern
closed
Wrapper for split_cols_by overall level
research priority
In future `rtables` releases the argument `add_overall_col` may be deprecated. Propose a design for a layout function in `tern` that can be a wrapper for `split_cols_by(split_fun = add_overall_level(xx))` Provenance: ``` Creator: anajens ```
1.0
Wrapper for split_cols_by overall level - In future `rtables` releases the argument `add_overall_col` may be deprecated. Propose a design for a layout function in `tern` that can be a wrapper for `split_cols_by(split_fun = add_overall_level(xx))` Provenance: ``` Creator: anajens ```
priority
wrapper for split cols by overall level in future rtables releases the argument add overall col may be deprecated propose a design for a layout function in tern that can be a wrapper for split cols by split fun add overall level xx provenance creator anajens
1
141,104
5,429,199,045
IssuesEvent
2017-03-03 17:47:37
NoffearrDeathProjecT/DeathCore
https://api.github.com/repos/NoffearrDeathProjecT/DeathCore
closed
Build failed
Branch-7.x.x InvalidReport Platform-Win Priority:Low
hi see this post !!!! Build is faild because : https://github.com/NoffearrDeathProjecT/DeathCore/commit/f2e528cf75ff8c9ed7882f35655ffc2a6889a83a When compile this source has given errors: Severity Code Description Project File Line Suppression State Error C2039 'SpellEffectExtraData': is not a member of 'Movement' game D:\src\server\game\Entities\Unit\Unit.h 1686
1.0
Build failed - hi see this post !!!! Build is faild because : https://github.com/NoffearrDeathProjecT/DeathCore/commit/f2e528cf75ff8c9ed7882f35655ffc2a6889a83a When compile this source has given errors: Severity Code Description Project File Line Suppression State Error C2039 'SpellEffectExtraData': is not a member of 'Movement' game D:\src\server\game\Entities\Unit\Unit.h 1686
priority
build failed hi see this post build is faild because when compile this source has given errors severity code description project file line suppression state error spelleffectextradata is not a member of movement game d src server game entities unit unit h
1
366,370
25,580,501,010
IssuesEvent
2022-12-01 03:39:22
tubearchivist/tubearchivist
https://api.github.com/repos/tubearchivist/tubearchivist
closed
[Installation]: Installation instructions need updating for v0.2.4
documentation
### Installation instructions - [X] I have read and understand the [installation instructions](https://github.com/tubearchivist/tubearchivist#installing-and-updating). - [X] My issue is not described in the [potential pitfalls](https://github.com/tubearchivist/tubearchivist#potential-pitfalls) section. ### Operating System Synology ### Your installation or setup question Instructions require update for v0.2.4. ### Relevant log output ```shell Not required. This is for tracking required changes for documentation. ```
1.0
[Installation]: Installation instructions need updating for v0.2.4 - ### Installation instructions - [X] I have read and understand the [installation instructions](https://github.com/tubearchivist/tubearchivist#installing-and-updating). - [X] My issue is not described in the [potential pitfalls](https://github.com/tubearchivist/tubearchivist#potential-pitfalls) section. ### Operating System Synology ### Your installation or setup question Instructions require update for v0.2.4. ### Relevant log output ```shell Not required. This is for tracking required changes for documentation. ```
non_priority
installation instructions need updating for installation instructions i have read and understand the my issue is not described in the section operating system synology your installation or setup question instructions require update for relevant log output shell not required this is for tracking required changes for documentation
0
76,069
26,225,177,076
IssuesEvent
2023-01-04 17:59:58
department-of-veterans-affairs/va.gov-cms
https://api.github.com/repos/department-of-veterans-affairs/va.gov-cms
closed
Homepage modal: Using a screen reader when closing modal announces header before skip link
Defect VA.gov frontend VA.gov homepage ⭐️ Public Websites
## Describe the defect Using a screen reader, when the homepage modal is closed, regardless of how it's closed (X, button, ESC key), before the skip link is announced, the first header in the footer (Veterans programs and services) is announced. ## To Reproduce Steps to reproduce the behavior: 1. Turn on your screen reader (i.e. NVDA) 2. Go to (when this is deployed I can add the staging homepage) 3. Close the modal by using the ESC key, the X in the corner or the "Not today..." button 4. Note that the screen reader announces "Veterans programs and services" then announces "Skip to content" 5. However, visually the Skip link is shown as focused immediately ## AC / Expected behavior - [ ] When the modal is closed (using the X, the button or the ESC), the SR should announce the same element as what is visually focused - in this case the Skip to content link - [ ] When resolved / verified in prod, also close https://github.com/department-of-veterans-affairs/va.gov-team/issues/51155 ## Additional Context @jtmst mentioned he thought he knew what was going on here and what would need to be looked at to resolve it: > there was an issue with set-focus not working properly when closing the modal, a solution ive used for similar bugs is adding a 50ms delay before changing focus. I didnt anticipate it affecting screen readers this way. ### CMS Team Please check the team(s) that will do this work. - [ ] `Program` - [ ] `Platform CMS Team` - [ ] `Sitewide Crew` - [ ] `⭐️ Sitewide CMS` - [x] `⭐️ Public Websites` - [ ] `⭐️ Facilities` - [ ] `⭐️ User support`
1.0
Homepage modal: Using a screen reader when closing modal announces header before skip link - ## Describe the defect Using a screen reader, when the homepage modal is closed, regardless of how it's closed (X, button, ESC key), before the skip link is announced, the first header in the footer (Veterans programs and services) is announced. ## To Reproduce Steps to reproduce the behavior: 1. Turn on your screen reader (i.e. NVDA) 2. Go to (when this is deployed I can add the staging homepage) 3. Close the modal by using the ESC key, the X in the corner or the "Not today..." button 4. Note that the screen reader announces "Veterans programs and services" then announces "Skip to content" 5. However, visually the Skip link is shown as focused immediately ## AC / Expected behavior - [ ] When the modal is closed (using the X, the button or the ESC), the SR should announce the same element as what is visually focused - in this case the Skip to content link - [ ] When resolved / verified in prod, also close https://github.com/department-of-veterans-affairs/va.gov-team/issues/51155 ## Additional Context @jtmst mentioned he thought he knew what was going on here and what would need to be looked at to resolve it: > there was an issue with set-focus not working properly when closing the modal, a solution ive used for similar bugs is adding a 50ms delay before changing focus. I didnt anticipate it affecting screen readers this way. ### CMS Team Please check the team(s) that will do this work. - [ ] `Program` - [ ] `Platform CMS Team` - [ ] `Sitewide Crew` - [ ] `⭐️ Sitewide CMS` - [x] `⭐️ Public Websites` - [ ] `⭐️ Facilities` - [ ] `⭐️ User support`
non_priority
homepage modal using a screen reader when closing modal announces header before skip link describe the defect using a screen reader when the homepage modal is closed regardless of how it s closed x button esc key before the skip link is announced the first header in the footer veterans programs and services is announced to reproduce steps to reproduce the behavior turn on your screen reader i e nvda go to when this is deployed i can add the staging homepage close the modal by using the esc key the x in the corner or the not today button note that the screen reader announces veterans programs and services then announces skip to content however visually the skip link is shown as focused immediately ac expected behavior when the modal is closed using the x the button or the esc the sr should announce the same element as what is visually focused in this case the skip to content link when resolved verified in prod also close additional context jtmst mentioned he thought he knew what was going on here and what would need to be looked at to resolve it there was an issue with set focus not working properly when closing the modal a solution ive used for similar bugs is adding a delay before changing focus i didnt anticipate it affecting screen readers this way cms team please check the team s that will do this work program platform cms team sitewide crew ⭐️ sitewide cms ⭐️ public websites ⭐️ facilities ⭐️ user support
0
478,849
13,786,454,434
IssuesEvent
2020-10-09 01:53:52
kubeapps/kubeapps
https://api.github.com/repos/kubeapps/kubeapps
closed
Ability to view the history of events on a release
component/dashboard component/helm help wanted kind/feature priority/low wontfix
It would be nice to be able to view the list of events that happened to a release . The description of the bug is awfully short but I am not sure what else I can add.
1.0
Ability to view the history of events on a release - It would be nice to be able to view the list of events that happened to a release . The description of the bug is awfully short but I am not sure what else I can add.
priority
ability to view the history of events on a release it would be nice to be able to view the list of events that happened to a release the description of the bug is awfully short but i am not sure what else i can add
1
351,057
25,011,925,033
IssuesEvent
2022-11-03 15:49:19
Noovolari/leapp
https://api.github.com/repos/Noovolari/leapp
closed
How to use AWS AssumeRole with MFA
bug documentation
Sorry, this is not really a bug nor a feature request. My colleague is experimenting with `aws-vault` so we can enforce MFA for our cluster. He has a aws config file like this: ``` [profile xx-xx-prod] role_arn=arn:aws:iam::xx:role/xxAdminAccessForLogin source_profile=xx-login mfa_serial=arn:aws:iam::xx:mfa/XXXXXXXXXXX region=eu-west-1 [profile xx-xx-staging] role_arn=arn:aws:iam::xx:role/xxAdminAccessForLogin source_profile=xx-login mfa_serial=arn:aws:iam::xx:mfa/XXXXXXXXXXXXXXXXXX region=eu-central-1 [profile xx-login] #yes, nothing here ``` He can then use this to do `terraform` commands and for example start Lens through: `aws-vault exec xx-xx-staging -- kontena-lens --context=arn:aws:eks:eu-central-1:xx:cluster/xx-xx-staging` However I don't really like this as this prevents the option from having multiple clusters open in one Lens window. You would need to restart it every time. So: then I found Leapp. If I understand it correctly this should solve the problem described above. However I don't really understand how to set it up. First I add a session for the 'login' account: ![image](https://user-images.githubusercontent.com/662896/163181441-8b451a59-4980-4fbb-804b-67afd4337d9b.png) When I start that session I get asked for a MFA serial and then it succeeds. Then I want to add the account I use to "AssumeRole": ![image](https://user-images.githubusercontent.com/662896/163181789-4a4151eb-372a-490b-8211-9e4d1832dcad.png) I can also create/start this session with no problem. I do see credentials in `~/.aws/credentials`. However when I want to run a `terraform apply` for example I get this error: ``` ╷ │ Error: Kubernetes cluster unreachable: invalid configuration: no configuration has been provided, try setting KUBERNETES_MASTER environment variable │ │ ╵ ╷ │ Error: error configuring Terraform AWS Provider: no valid credential sources for Terraform AWS Provider found. │ │ Please see https://registry.terraform.io/providers/hashicorp/aws │ for more information about providing credentials. │ │ Error: NoCredentialProviders: no valid providers in chain │ caused by: EnvAccessKeyNotFound: failed to find credentials in the environment. │ SharedCredsLoad: failed to load profile, . │ EC2RoleRequestError: no EC2 instance role found │ caused by: RequestError: send request failed │ caused by: Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": context deadline exceeded (Client.Timeout exceeded while awaiting headers) │ │ │ with module.shared.provider["registry.terraform.io/hashicorp/aws"], │ on ../shared/main.tf line 41, in provider "aws": │ 41: provider "aws" { │ ``` I cannot post the entire terraform files but I think this is the relevant part: ``` terraform { backend "s3" { bucket = "xx-terraform-state-xx-staging" key = "network/terraform.tfstate" region = "eu-central-1" profile="xx-xx-staging" } required_providers { aws = { source = "hashicorp/aws" version = "3.72.0" } } } provider "aws" { region = "eu-central-1" profile="xx-xx-staging" } ``` If I remove the profile from the terraform files and run init I get: ``` │ Error: error configuring S3 Backend: no valid credential sources for S3 Backend found. │ │ Please see https://www.terraform.io/docs/language/settings/backends/s3.html │ for more information about providing credentials. │ │ Error: NoCredentialProviders: no valid providers in chain. Deprecated. │ For verbose messaging see aws.Config.CredentialsChainVerboseErrors ``` So I am hoping that there are some people here that have some experience and can give some pointers. Can we even use Leapp to solve the problem as described? I'm I using the wrong config? I don't really understand how it should work. edit: incuded the wrong error
1.0
How to use AWS AssumeRole with MFA - Sorry, this is not really a bug nor a feature request. My colleague is experimenting with `aws-vault` so we can enforce MFA for our cluster. He has a aws config file like this: ``` [profile xx-xx-prod] role_arn=arn:aws:iam::xx:role/xxAdminAccessForLogin source_profile=xx-login mfa_serial=arn:aws:iam::xx:mfa/XXXXXXXXXXX region=eu-west-1 [profile xx-xx-staging] role_arn=arn:aws:iam::xx:role/xxAdminAccessForLogin source_profile=xx-login mfa_serial=arn:aws:iam::xx:mfa/XXXXXXXXXXXXXXXXXX region=eu-central-1 [profile xx-login] #yes, nothing here ``` He can then use this to do `terraform` commands and for example start Lens through: `aws-vault exec xx-xx-staging -- kontena-lens --context=arn:aws:eks:eu-central-1:xx:cluster/xx-xx-staging` However I don't really like this as this prevents the option from having multiple clusters open in one Lens window. You would need to restart it every time. So: then I found Leapp. If I understand it correctly this should solve the problem described above. However I don't really understand how to set it up. First I add a session for the 'login' account: ![image](https://user-images.githubusercontent.com/662896/163181441-8b451a59-4980-4fbb-804b-67afd4337d9b.png) When I start that session I get asked for a MFA serial and then it succeeds. Then I want to add the account I use to "AssumeRole": ![image](https://user-images.githubusercontent.com/662896/163181789-4a4151eb-372a-490b-8211-9e4d1832dcad.png) I can also create/start this session with no problem. I do see credentials in `~/.aws/credentials`. However when I want to run a `terraform apply` for example I get this error: ``` ╷ │ Error: Kubernetes cluster unreachable: invalid configuration: no configuration has been provided, try setting KUBERNETES_MASTER environment variable │ │ ╵ ╷ │ Error: error configuring Terraform AWS Provider: no valid credential sources for Terraform AWS Provider found. │ │ Please see https://registry.terraform.io/providers/hashicorp/aws │ for more information about providing credentials. │ │ Error: NoCredentialProviders: no valid providers in chain │ caused by: EnvAccessKeyNotFound: failed to find credentials in the environment. │ SharedCredsLoad: failed to load profile, . │ EC2RoleRequestError: no EC2 instance role found │ caused by: RequestError: send request failed │ caused by: Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": context deadline exceeded (Client.Timeout exceeded while awaiting headers) │ │ │ with module.shared.provider["registry.terraform.io/hashicorp/aws"], │ on ../shared/main.tf line 41, in provider "aws": │ 41: provider "aws" { │ ``` I cannot post the entire terraform files but I think this is the relevant part: ``` terraform { backend "s3" { bucket = "xx-terraform-state-xx-staging" key = "network/terraform.tfstate" region = "eu-central-1" profile="xx-xx-staging" } required_providers { aws = { source = "hashicorp/aws" version = "3.72.0" } } } provider "aws" { region = "eu-central-1" profile="xx-xx-staging" } ``` If I remove the profile from the terraform files and run init I get: ``` │ Error: error configuring S3 Backend: no valid credential sources for S3 Backend found. │ │ Please see https://www.terraform.io/docs/language/settings/backends/s3.html │ for more information about providing credentials. │ │ Error: NoCredentialProviders: no valid providers in chain. Deprecated. │ For verbose messaging see aws.Config.CredentialsChainVerboseErrors ``` So I am hoping that there are some people here that have some experience and can give some pointers. Can we even use Leapp to solve the problem as described? I'm I using the wrong config? I don't really understand how it should work. edit: incuded the wrong error
non_priority
how to use aws assumerole with mfa sorry this is not really a bug nor a feature request my colleague is experimenting with aws vault so we can enforce mfa for our cluster he has a aws config file like this role arn arn aws iam xx role xxadminaccessforlogin source profile xx login mfa serial arn aws iam xx mfa xxxxxxxxxxx region eu west role arn arn aws iam xx role xxadminaccessforlogin source profile xx login mfa serial arn aws iam xx mfa xxxxxxxxxxxxxxxxxx region eu central yes nothing here he can then use this to do terraform commands and for example start lens through aws vault exec xx xx staging kontena lens context arn aws eks eu central xx cluster xx xx staging however i don t really like this as this prevents the option from having multiple clusters open in one lens window you would need to restart it every time so then i found leapp if i understand it correctly this should solve the problem described above however i don t really understand how to set it up first i add a session for the login account when i start that session i get asked for a mfa serial and then it succeeds then i want to add the account i use to assumerole i can also create start this session with no problem i do see credentials in aws credentials however when i want to run a terraform apply for example i get this error ╷ │ error kubernetes cluster unreachable invalid configuration no configuration has been provided try setting kubernetes master environment variable │ │ ╵ ╷ │ error error configuring terraform aws provider no valid credential sources for terraform aws provider found │ │ please see │ for more information about providing credentials │ │ error nocredentialproviders no valid providers in chain │ caused by envaccesskeynotfound failed to find credentials in the environment │ sharedcredsload failed to load profile │ no instance role found │ caused by requesterror send request failed │ caused by get context deadline exceeded client timeout exceeded while awaiting headers │ │ │ with module shared provider │ on shared main tf line in provider aws │ provider aws │ i cannot post the entire terraform files but i think this is the relevant part terraform backend bucket xx terraform state xx staging key network terraform tfstate region eu central profile xx xx staging required providers aws source hashicorp aws version provider aws region eu central profile xx xx staging if i remove the profile from the terraform files and run init i get │ error error configuring backend no valid credential sources for backend found │ │ please see │ for more information about providing credentials │ │ error nocredentialproviders no valid providers in chain deprecated │ for verbose messaging see aws config credentialschainverboseerrors so i am hoping that there are some people here that have some experience and can give some pointers can we even use leapp to solve the problem as described i m i using the wrong config i don t really understand how it should work edit incuded the wrong error
0
35,826
2,793,203,747
IssuesEvent
2015-05-11 09:22:10
synergy/synergy
https://api.github.com/repos/synergy/synergy
opened
High logging rate causes Windows service to crash
bug priority-urgent
After seeing #4650, it looks like the high rate of logging (which is stored in a buffer) causes the Windows service to crash (probably because it runs out of memory). The IPC logging buffer should store only 1000 lines.... any more than that is probably useless anyway.
1.0
High logging rate causes Windows service to crash - After seeing #4650, it looks like the high rate of logging (which is stored in a buffer) causes the Windows service to crash (probably because it runs out of memory). The IPC logging buffer should store only 1000 lines.... any more than that is probably useless anyway.
priority
high logging rate causes windows service to crash after seeing it looks like the high rate of logging which is stored in a buffer causes the windows service to crash probably because it runs out of memory the ipc logging buffer should store only lines any more than that is probably useless anyway
1
639,727
20,763,331,884
IssuesEvent
2022-03-15 18:10:05
npm/cli
https://api.github.com/repos/npm/cli
closed
[BUG] npm install attempts to fetch already bundled indirect dependency from registry
Release 7.x Bug Priority 1
It appears that `npm install` sometimes attempts to fetch indirect dependencies from the registry even though they have already been bundled with the package being installed. This causes issues if these dependencies are only available in an internal registry during install/pack-time but not available on the registry where the package is published to and eventually installed from. My understanding is that dependencies listed in `bundledDependencies` also include indirect dependencies. I can only reproduce this on Windows with npm 7. The package installs just fine with npm 6 on Windows and with npm 7 on macOS. I've created a minimal repro from my original package and used a `file:` dependency to avoid the need for a custom registry. The error looks a little different than with my original package since it fails with an error saying that it cannot find the package on the registry but I think it's the same cause. This is what my repro package looks like: `package.json`: ``` { "name": "foo", "version": "1.0.0", "dependencies": { "bar": "file:bar-1.0.0.tgz", "tmp": "0.0.33" }, "bundledDependencies": [ "bar", "tmp" ] } ``` where `bar-1.0.0.tgz` contains a single file `bar/package.json`: ``` { "name": "bar", "version": "1.0.0", "dependencies": { "tmp-promise": "2.0.2" } } ``` Here's a zip file with the above files: [foo.zip](https://github.com/npm/cli/files/6025260/foo.zip) There are a couple of issues already that appear similar but I'm not entirely sure they're the same: - https://github.com/npm/cli/issues/1817 (the issue I'm seeing only reproduced on npm 7) - https://github.com/npm/cli/issues/2143 ### Current Behavior: Install fails on npm@7.5.6 as it attempts to fetch already bundled indirect dependency `rimraf` from the dummy registry `https://0.0.0.0` even though it should already be bundled with the package: ``` PS C:\Users\salva\Desktop\repro\foo> node --version v15.9.0 PS C:\Users\salva\Desktop\repro\foo> npm --version 7.5.6 PS C:\Users\salva\Desktop\repro\foo> npm list -g C:\Users\salva\AppData\Roaming\npm `-- npm@7.5.6 PS C:\Users\salva\Desktop\repro\foo> npm install added 17 packages, and audited 18 packages in 1s 1 package is looking for funding run `npm fund` for details found 0 vulnerabilities PS C:\Users\salva\Desktop\repro\foo> npm pack npm notice npm notice package: foo@1.0.0 npm notice === Tarball Contents === npm notice 228B bar-1.0.0.tgz npm notice 173B package.json npm notice === Bundled Dependencies === npm notice balanced-match npm notice brace-expansion npm notice concat-map npm notice fs.realpath npm notice glob npm notice inflight npm notice inherits npm notice minimatch npm notice once npm notice os-tmpdir npm notice path-is-absolute npm notice rimraf npm notice tmp-promise npm notice tmp npm notice wrappy npm notice bar npm notice === Tarball Details === npm notice name: foo npm notice version: 1.0.0 npm notice filename: foo-1.0.0.tgz npm notice package size: 62.2 kB npm notice unpacked size: 238.5 kB npm notice shasum: f5b9dea47ae5d48a40f7079d99728e905a48e808 npm notice integrity: sha512-P9Yat2HlAmr2b[...]1/ACmYuDlxUZw== npm notice bundled deps: 16 npm notice bundled files: 0 npm notice own files: 81 npm notice total files: 81 npm notice foo-1.0.0.tgz PS C:\Users\salva\Desktop\repro\foo> npm install -g --registry https://0.0.0.0 foo-1.0.0.tgz npm ERR! code ECONNREFUSED npm ERR! syscall connect npm ERR! errno ECONNREFUSED npm ERR! FetchError: request to https://0.0.0.0/rimraf failed, reason: connect ECONNREFUSED 0.0.0.0:443 npm ERR! at ClientRequest.<anonymous> (C:\Users\salva\AppData\Roaming\npm\node_modules\npm\node_modules\minipass-fetch\lib\index.js:97:14) npm ERR! at ClientRequest.emit (node:events:378:20) npm ERR! at TLSSocket.socketErrorListener (node:_http_client:462:9) npm ERR! at TLSSocket.emit (node:events:390:22) npm ERR! at emitErrorNT (node:internal/streams/destroy:188:8) npm ERR! at emitErrorCloseNT (node:internal/streams/destroy:153:3) npm ERR! at processTicksAndRejections (node:internal/process/task_queues:81:21) npm ERR! FetchError: request to https://0.0.0.0/rimraf failed, reason: connect ECONNREFUSED 0.0.0.0:443 npm ERR! at ClientRequest.<anonymous> (C:\Users\salva\AppData\Roaming\npm\node_modules\npm\node_modules\minipass-fetch\lib\index.js:97:14) npm ERR! at ClientRequest.emit (node:events:378:20) npm ERR! at TLSSocket.socketErrorListener (node:_http_client:462:9) npm ERR! at TLSSocket.emit (node:events:390:22) npm ERR! at emitErrorNT (node:internal/streams/destroy:188:8) npm ERR! at emitErrorCloseNT (node:internal/streams/destroy:153:3) npm ERR! at processTicksAndRejections (node:internal/process/task_queues:81:21) { npm ERR! code: 'ECONNREFUSED', npm ERR! errno: 'ECONNREFUSED', npm ERR! syscall: 'connect', npm ERR! address: '0.0.0.0', npm ERR! port: 443, npm ERR! type: 'system' npm ERR! } npm ERR! npm ERR! If you are behind a proxy, please make sure that the npm ERR! 'proxy' config is set properly. See: 'npm help config' npm ERR! A complete log of this run can be found in: npm ERR! C:\Users\salva\AppData\Local\npm-cache\_logs\2021-02-22T21_35_06_434Z-debug.log ``` [2021-02-22T21_35_06_434Z-debug.log](https://github.com/npm/cli/files/6025301/2021-02-22T21_35_06_434Z-debug.log) ### Expected Behavior: Install succeeds on npm@6.14.11: ``` PS C:\Users\salva\Desktop\repro\foo> node --version v15.9.0 PS C:\Users\salva\Desktop\repro\foo> npm --version 6.14.11 PS C:\Users\salva\Desktop\repro\foo> npm list -g --depth=0 C:\Users\salva\AppData\Roaming\npm `-- npm@6.14.11 PS C:\Users\salva\Desktop\repro\foo> npm install npm notice created a lockfile as package-lock.json. You should commit this file. npm WARN foo@1.0.0 No description npm WARN foo@1.0.0 No repository field. npm WARN foo@1.0.0 No license field. added 17 packages from 6 contributors and audited 17 packages in 1.766s 1 package is looking for funding run `npm fund` for details found 0 vulnerabilities PS C:\Users\salva\Desktop\repro\foo> npm pack npm notice npm notice package: foo@1.0.0 npm notice === Tarball Contents === npm notice 173B package.json npm notice 228B bar-1.0.0.tgz npm notice === Bundled Dependencies === npm notice tmp npm notice bar npm notice === Tarball Details === npm notice name: foo npm notice version: 1.0.0 npm notice filename: foo-1.0.0.tgz npm notice package size: 65.3 kB npm notice unpacked size: 254.1 kB npm notice shasum: 238cc607fa070001da971e27992fb1da963f1f63 npm notice integrity: sha512-YYaLB9+Lv5qmo[...]NvWxcaPI3fHPQ== npm notice bundled deps: 2 npm notice bundled files: 79 npm notice own files: 2 npm notice total files: 81 npm notice foo-1.0.0.tgz PS C:\Users\salva\Desktop\repro\foo> npm install -g --registry https://0.0.0.0 foo-1.0.0.tgz + foo@1.0.0 added 18 packages from 6 contributors in 0.524s ``` ### Steps To Reproduce: 1. Download [foo.zip](https://github.com/npm/cli/files/6025260/foo.zip) 2. Extract foo.zip 3. `cd foo` 4. `npm install` 5. `npm pack` 6. `npm install -g --registry https://0.0.0.0 foo-1.0.0.tgz` 7. Observe error (after timeout) when npm attempts to fetch indirect dependency `rimraf` from the dummy registry `https://0.0.0.0` ### Environment: - OS: Windows 10.0.19042 Build 19042 - Node: 15.9.0 - npm: 7.5.6
1.0
[BUG] npm install attempts to fetch already bundled indirect dependency from registry - It appears that `npm install` sometimes attempts to fetch indirect dependencies from the registry even though they have already been bundled with the package being installed. This causes issues if these dependencies are only available in an internal registry during install/pack-time but not available on the registry where the package is published to and eventually installed from. My understanding is that dependencies listed in `bundledDependencies` also include indirect dependencies. I can only reproduce this on Windows with npm 7. The package installs just fine with npm 6 on Windows and with npm 7 on macOS. I've created a minimal repro from my original package and used a `file:` dependency to avoid the need for a custom registry. The error looks a little different than with my original package since it fails with an error saying that it cannot find the package on the registry but I think it's the same cause. This is what my repro package looks like: `package.json`: ``` { "name": "foo", "version": "1.0.0", "dependencies": { "bar": "file:bar-1.0.0.tgz", "tmp": "0.0.33" }, "bundledDependencies": [ "bar", "tmp" ] } ``` where `bar-1.0.0.tgz` contains a single file `bar/package.json`: ``` { "name": "bar", "version": "1.0.0", "dependencies": { "tmp-promise": "2.0.2" } } ``` Here's a zip file with the above files: [foo.zip](https://github.com/npm/cli/files/6025260/foo.zip) There are a couple of issues already that appear similar but I'm not entirely sure they're the same: - https://github.com/npm/cli/issues/1817 (the issue I'm seeing only reproduced on npm 7) - https://github.com/npm/cli/issues/2143 ### Current Behavior: Install fails on npm@7.5.6 as it attempts to fetch already bundled indirect dependency `rimraf` from the dummy registry `https://0.0.0.0` even though it should already be bundled with the package: ``` PS C:\Users\salva\Desktop\repro\foo> node --version v15.9.0 PS C:\Users\salva\Desktop\repro\foo> npm --version 7.5.6 PS C:\Users\salva\Desktop\repro\foo> npm list -g C:\Users\salva\AppData\Roaming\npm `-- npm@7.5.6 PS C:\Users\salva\Desktop\repro\foo> npm install added 17 packages, and audited 18 packages in 1s 1 package is looking for funding run `npm fund` for details found 0 vulnerabilities PS C:\Users\salva\Desktop\repro\foo> npm pack npm notice npm notice package: foo@1.0.0 npm notice === Tarball Contents === npm notice 228B bar-1.0.0.tgz npm notice 173B package.json npm notice === Bundled Dependencies === npm notice balanced-match npm notice brace-expansion npm notice concat-map npm notice fs.realpath npm notice glob npm notice inflight npm notice inherits npm notice minimatch npm notice once npm notice os-tmpdir npm notice path-is-absolute npm notice rimraf npm notice tmp-promise npm notice tmp npm notice wrappy npm notice bar npm notice === Tarball Details === npm notice name: foo npm notice version: 1.0.0 npm notice filename: foo-1.0.0.tgz npm notice package size: 62.2 kB npm notice unpacked size: 238.5 kB npm notice shasum: f5b9dea47ae5d48a40f7079d99728e905a48e808 npm notice integrity: sha512-P9Yat2HlAmr2b[...]1/ACmYuDlxUZw== npm notice bundled deps: 16 npm notice bundled files: 0 npm notice own files: 81 npm notice total files: 81 npm notice foo-1.0.0.tgz PS C:\Users\salva\Desktop\repro\foo> npm install -g --registry https://0.0.0.0 foo-1.0.0.tgz npm ERR! code ECONNREFUSED npm ERR! syscall connect npm ERR! errno ECONNREFUSED npm ERR! FetchError: request to https://0.0.0.0/rimraf failed, reason: connect ECONNREFUSED 0.0.0.0:443 npm ERR! at ClientRequest.<anonymous> (C:\Users\salva\AppData\Roaming\npm\node_modules\npm\node_modules\minipass-fetch\lib\index.js:97:14) npm ERR! at ClientRequest.emit (node:events:378:20) npm ERR! at TLSSocket.socketErrorListener (node:_http_client:462:9) npm ERR! at TLSSocket.emit (node:events:390:22) npm ERR! at emitErrorNT (node:internal/streams/destroy:188:8) npm ERR! at emitErrorCloseNT (node:internal/streams/destroy:153:3) npm ERR! at processTicksAndRejections (node:internal/process/task_queues:81:21) npm ERR! FetchError: request to https://0.0.0.0/rimraf failed, reason: connect ECONNREFUSED 0.0.0.0:443 npm ERR! at ClientRequest.<anonymous> (C:\Users\salva\AppData\Roaming\npm\node_modules\npm\node_modules\minipass-fetch\lib\index.js:97:14) npm ERR! at ClientRequest.emit (node:events:378:20) npm ERR! at TLSSocket.socketErrorListener (node:_http_client:462:9) npm ERR! at TLSSocket.emit (node:events:390:22) npm ERR! at emitErrorNT (node:internal/streams/destroy:188:8) npm ERR! at emitErrorCloseNT (node:internal/streams/destroy:153:3) npm ERR! at processTicksAndRejections (node:internal/process/task_queues:81:21) { npm ERR! code: 'ECONNREFUSED', npm ERR! errno: 'ECONNREFUSED', npm ERR! syscall: 'connect', npm ERR! address: '0.0.0.0', npm ERR! port: 443, npm ERR! type: 'system' npm ERR! } npm ERR! npm ERR! If you are behind a proxy, please make sure that the npm ERR! 'proxy' config is set properly. See: 'npm help config' npm ERR! A complete log of this run can be found in: npm ERR! C:\Users\salva\AppData\Local\npm-cache\_logs\2021-02-22T21_35_06_434Z-debug.log ``` [2021-02-22T21_35_06_434Z-debug.log](https://github.com/npm/cli/files/6025301/2021-02-22T21_35_06_434Z-debug.log) ### Expected Behavior: Install succeeds on npm@6.14.11: ``` PS C:\Users\salva\Desktop\repro\foo> node --version v15.9.0 PS C:\Users\salva\Desktop\repro\foo> npm --version 6.14.11 PS C:\Users\salva\Desktop\repro\foo> npm list -g --depth=0 C:\Users\salva\AppData\Roaming\npm `-- npm@6.14.11 PS C:\Users\salva\Desktop\repro\foo> npm install npm notice created a lockfile as package-lock.json. You should commit this file. npm WARN foo@1.0.0 No description npm WARN foo@1.0.0 No repository field. npm WARN foo@1.0.0 No license field. added 17 packages from 6 contributors and audited 17 packages in 1.766s 1 package is looking for funding run `npm fund` for details found 0 vulnerabilities PS C:\Users\salva\Desktop\repro\foo> npm pack npm notice npm notice package: foo@1.0.0 npm notice === Tarball Contents === npm notice 173B package.json npm notice 228B bar-1.0.0.tgz npm notice === Bundled Dependencies === npm notice tmp npm notice bar npm notice === Tarball Details === npm notice name: foo npm notice version: 1.0.0 npm notice filename: foo-1.0.0.tgz npm notice package size: 65.3 kB npm notice unpacked size: 254.1 kB npm notice shasum: 238cc607fa070001da971e27992fb1da963f1f63 npm notice integrity: sha512-YYaLB9+Lv5qmo[...]NvWxcaPI3fHPQ== npm notice bundled deps: 2 npm notice bundled files: 79 npm notice own files: 2 npm notice total files: 81 npm notice foo-1.0.0.tgz PS C:\Users\salva\Desktop\repro\foo> npm install -g --registry https://0.0.0.0 foo-1.0.0.tgz + foo@1.0.0 added 18 packages from 6 contributors in 0.524s ``` ### Steps To Reproduce: 1. Download [foo.zip](https://github.com/npm/cli/files/6025260/foo.zip) 2. Extract foo.zip 3. `cd foo` 4. `npm install` 5. `npm pack` 6. `npm install -g --registry https://0.0.0.0 foo-1.0.0.tgz` 7. Observe error (after timeout) when npm attempts to fetch indirect dependency `rimraf` from the dummy registry `https://0.0.0.0` ### Environment: - OS: Windows 10.0.19042 Build 19042 - Node: 15.9.0 - npm: 7.5.6
priority
npm install attempts to fetch already bundled indirect dependency from registry it appears that npm install sometimes attempts to fetch indirect dependencies from the registry even though they have already been bundled with the package being installed this causes issues if these dependencies are only available in an internal registry during install pack time but not available on the registry where the package is published to and eventually installed from my understanding is that dependencies listed in bundleddependencies also include indirect dependencies i can only reproduce this on windows with npm the package installs just fine with npm on windows and with npm on macos i ve created a minimal repro from my original package and used a file dependency to avoid the need for a custom registry the error looks a little different than with my original package since it fails with an error saying that it cannot find the package on the registry but i think it s the same cause this is what my repro package looks like package json name foo version dependencies bar file bar tgz tmp bundleddependencies bar tmp where bar tgz contains a single file bar package json name bar version dependencies tmp promise here s a zip file with the above files there are a couple of issues already that appear similar but i m not entirely sure they re the same the issue i m seeing only reproduced on npm current behavior install fails on npm as it attempts to fetch already bundled indirect dependency rimraf from the dummy registry even though it should already be bundled with the package ps c users salva desktop repro foo node version ps c users salva desktop repro foo npm version ps c users salva desktop repro foo npm list g c users salva appdata roaming npm npm ps c users salva desktop repro foo npm install added packages and audited packages in package is looking for funding run npm fund for details found vulnerabilities ps c users salva desktop repro foo npm pack npm notice npm notice package foo npm notice tarball contents npm notice bar tgz npm notice package json npm notice bundled dependencies npm notice balanced match npm notice brace expansion npm notice concat map npm notice fs realpath npm notice glob npm notice inflight npm notice inherits npm notice minimatch npm notice once npm notice os tmpdir npm notice path is absolute npm notice rimraf npm notice tmp promise npm notice tmp npm notice wrappy npm notice bar npm notice tarball details npm notice name foo npm notice version npm notice filename foo tgz npm notice package size kb npm notice unpacked size kb npm notice shasum npm notice integrity acmyudlxuzw npm notice bundled deps npm notice bundled files npm notice own files npm notice total files npm notice foo tgz ps c users salva desktop repro foo npm install g registry foo tgz npm err code econnrefused npm err syscall connect npm err errno econnrefused npm err fetcherror request to failed reason connect econnrefused npm err at clientrequest c users salva appdata roaming npm node modules npm node modules minipass fetch lib index js npm err at clientrequest emit node events npm err at tlssocket socketerrorlistener node http client npm err at tlssocket emit node events npm err at emiterrornt node internal streams destroy npm err at emiterrorclosent node internal streams destroy npm err at processticksandrejections node internal process task queues npm err fetcherror request to failed reason connect econnrefused npm err at clientrequest c users salva appdata roaming npm node modules npm node modules minipass fetch lib index js npm err at clientrequest emit node events npm err at tlssocket socketerrorlistener node http client npm err at tlssocket emit node events npm err at emiterrornt node internal streams destroy npm err at emiterrorclosent node internal streams destroy npm err at processticksandrejections node internal process task queues npm err code econnrefused npm err errno econnrefused npm err syscall connect npm err address npm err port npm err type system npm err npm err npm err if you are behind a proxy please make sure that the npm err proxy config is set properly see npm help config npm err a complete log of this run can be found in npm err c users salva appdata local npm cache logs debug log expected behavior install succeeds on npm ps c users salva desktop repro foo node version ps c users salva desktop repro foo npm version ps c users salva desktop repro foo npm list g depth c users salva appdata roaming npm npm ps c users salva desktop repro foo npm install npm notice created a lockfile as package lock json you should commit this file npm warn foo no description npm warn foo no repository field npm warn foo no license field added packages from contributors and audited packages in package is looking for funding run npm fund for details found vulnerabilities ps c users salva desktop repro foo npm pack npm notice npm notice package foo npm notice tarball contents npm notice package json npm notice bar tgz npm notice bundled dependencies npm notice tmp npm notice bar npm notice tarball details npm notice name foo npm notice version npm notice filename foo tgz npm notice package size kb npm notice unpacked size kb npm notice shasum npm notice integrity npm notice bundled deps npm notice bundled files npm notice own files npm notice total files npm notice foo tgz ps c users salva desktop repro foo npm install g registry foo tgz foo added packages from contributors in steps to reproduce download extract foo zip cd foo npm install npm pack npm install g registry foo tgz observe error after timeout when npm attempts to fetch indirect dependency rimraf from the dummy registry environment os windows build node npm
1
343,594
30,675,140,353
IssuesEvent
2023-07-26 04:11:42
snack-exercise/snack-exercise-server
https://api.github.com/repos/snack-exercise/snack-exercise-server
closed
[Test] Repository, Service 계층 단위 테스트 코드 작성
✅ Test 🔮 진서 🔮
## 💡 이슈 내용 - Member, JoinList, Exgroup, Mission Repository 계층 단위 테스트 작성 - Exgroup Service 계층 테스트 코드 작성 ## Repository Test - Service와의 결합을 끊고 Repository의 기능만 테스트하기 위해 @DataJpaTest 사용 ### DataJpaTest - JPA 관련된 설정만 로드한다. (WebMVC와 관련된 Bean이나 기능은 로드되지 않는다) - JPA를 사용해서 CRUD 테스트 가능 - @Transactional을 기본적으로 내장하고 있으므로, 매 테스트 코드가 종료되면 자동으로 DB가 롤백된다. - 기본적으로 내장 DB를 사용하는데, 설정을 통해 실제 DB로 테스트도 가능하다. - @Entity가 선언된 클래스를 스캔하여 저장소를 구성한다. ## ServiceTest - Controller와의 연결을 끊으려면 Web에 대한 의존성을 받으면 안된다. (@WebMvcTest, @SpringBootTest 사용 X) - Repository와의 연결을 끊기 위해 (실제로 DB에 저장하지 않으면서 도메인의 비즈니스 로직은 수행) Repository Bean에 의존하면 안된다. - 따라서 Repository 객체는 Mocking 사용
1.0
[Test] Repository, Service 계층 단위 테스트 코드 작성 - ## 💡 이슈 내용 - Member, JoinList, Exgroup, Mission Repository 계층 단위 테스트 작성 - Exgroup Service 계층 테스트 코드 작성 ## Repository Test - Service와의 결합을 끊고 Repository의 기능만 테스트하기 위해 @DataJpaTest 사용 ### DataJpaTest - JPA 관련된 설정만 로드한다. (WebMVC와 관련된 Bean이나 기능은 로드되지 않는다) - JPA를 사용해서 CRUD 테스트 가능 - @Transactional을 기본적으로 내장하고 있으므로, 매 테스트 코드가 종료되면 자동으로 DB가 롤백된다. - 기본적으로 내장 DB를 사용하는데, 설정을 통해 실제 DB로 테스트도 가능하다. - @Entity가 선언된 클래스를 스캔하여 저장소를 구성한다. ## ServiceTest - Controller와의 연결을 끊으려면 Web에 대한 의존성을 받으면 안된다. (@WebMvcTest, @SpringBootTest 사용 X) - Repository와의 연결을 끊기 위해 (실제로 DB에 저장하지 않으면서 도메인의 비즈니스 로직은 수행) Repository Bean에 의존하면 안된다. - 따라서 Repository 객체는 Mocking 사용
non_priority
repository service 계층 단위 테스트 코드 작성 💡 이슈 내용 member joinlist exgroup mission repository 계층 단위 테스트 작성 exgroup service 계층 테스트 코드 작성 repository test service와의 결합을 끊고 repository의 기능만 테스트하기 위해 datajpatest 사용 datajpatest jpa 관련된 설정만 로드한다 webmvc와 관련된 bean이나 기능은 로드되지 않는다 jpa를 사용해서 crud 테스트 가능 transactional을 기본적으로 내장하고 있으므로 매 테스트 코드가 종료되면 자동으로 db가 롤백된다 기본적으로 내장 db를 사용하는데 설정을 통해 실제 db로 테스트도 가능하다 entity가 선언된 클래스를 스캔하여 저장소를 구성한다 servicetest controller와의 연결을 끊으려면 web에 대한 의존성을 받으면 안된다 webmvctest springboottest 사용 x repository와의 연결을 끊기 위해 실제로 db에 저장하지 않으면서 도메인의 비즈니스 로직은 수행 repository bean에 의존하면 안된다 따라서 repository 객체는 mocking 사용
0
265,900
8,360,206,538
IssuesEvent
2018-10-03 10:44:59
metasfresh/metasfresh-webui-frontend
https://api.github.com/repos/metasfresh/metasfresh-webui-frontend
opened
QR code support
priority:high
### Is this a bug or feature request? FR ### What is the current behavior? QR code is not supported #### Which are the steps to reproduce? e.g. * open Manufacturing Orders view: https://w101.metasfresh.com:8443/window/53009 * click on Issue/Receipt (barcode) action * try to scan an QR code => it shall be recognized. NOTE: i don't care if that order# does exist. ### What is the expected or desired behavior? The barcode reading functionality shall seamless support regular 1D barcodes (EAN etc) and QR codes too.
1.0
QR code support - ### Is this a bug or feature request? FR ### What is the current behavior? QR code is not supported #### Which are the steps to reproduce? e.g. * open Manufacturing Orders view: https://w101.metasfresh.com:8443/window/53009 * click on Issue/Receipt (barcode) action * try to scan an QR code => it shall be recognized. NOTE: i don't care if that order# does exist. ### What is the expected or desired behavior? The barcode reading functionality shall seamless support regular 1D barcodes (EAN etc) and QR codes too.
priority
qr code support is this a bug or feature request fr what is the current behavior qr code is not supported which are the steps to reproduce e g open manufacturing orders view click on issue receipt barcode action try to scan an qr code it shall be recognized note i don t care if that order does exist what is the expected or desired behavior the barcode reading functionality shall seamless support regular barcodes ean etc and qr codes too
1
145,946
5,584,346,002
IssuesEvent
2017-03-29 04:35:36
dondi/GRNsight
https://api.github.com/repos/dondi/GRNsight
closed
Implement adaptive drafting board resizing algorithm
feature request functionality priority 0 review requested
If the user has selected an adaptive drafting board (Issue #396), an algorithm needs to detect when nodes hit the edge of the drafting board and expand it gradually.
1.0
Implement adaptive drafting board resizing algorithm - If the user has selected an adaptive drafting board (Issue #396), an algorithm needs to detect when nodes hit the edge of the drafting board and expand it gradually.
priority
implement adaptive drafting board resizing algorithm if the user has selected an adaptive drafting board issue an algorithm needs to detect when nodes hit the edge of the drafting board and expand it gradually
1
41,229
2,868,987,376
IssuesEvent
2015-06-05 22:23:50
dart-lang/pub
https://api.github.com/repos/dart-lang/pub
closed
Pub Serve not noticing file changes from editors in 'safe write' mode (e.g., IntelliJ) on OSX
bug Fixed Priority-High Pub-Serve
<a href="https://github.com/pq"><img src="https://avatars.githubusercontent.com/u/67586?v=3" align="left" width="96" height="96"hspace="10"></img></a> **Issue by [pq](https://github.com/pq)** _Originally opened as dart-lang/sdk#21402_ ---- Pub serve does not appear to play nice with editors (specifically IntelliJ/IDEA) on OS X that use a 'safe write' mode (e.g., new file content is first saved to a temporary file, then the original file is deleted after which the temporary file is renamed to the original file name). We were able to reproduce with InitelliJ on OSX using the Finance_Dart sample like so: &nbsp;&nbsp;\* Open Finance_Dart/client/web/app.html in browser (Chrome or Dartium or ...). Wait for page load. &nbsp;&nbsp;\* Modify Finance_Dart.client/web/app/view/item_list/day_purchases_list.html. For example, change &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;border-bottom: 1px dashed; &nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;to: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;border-bottom: 1px dashed red; &nbsp;&nbsp;\* Refresh browser and you won't see dashed line color change. :( Only restarting pub serve will do it. NOTE: this issue does NOT affect Dart Editor as it triggers explicit reloads itself on text editor pane content changes. It would be super awesome if we could get this looked at for 1.8. :)
1.0
Pub Serve not noticing file changes from editors in 'safe write' mode (e.g., IntelliJ) on OSX - <a href="https://github.com/pq"><img src="https://avatars.githubusercontent.com/u/67586?v=3" align="left" width="96" height="96"hspace="10"></img></a> **Issue by [pq](https://github.com/pq)** _Originally opened as dart-lang/sdk#21402_ ---- Pub serve does not appear to play nice with editors (specifically IntelliJ/IDEA) on OS X that use a 'safe write' mode (e.g., new file content is first saved to a temporary file, then the original file is deleted after which the temporary file is renamed to the original file name). We were able to reproduce with InitelliJ on OSX using the Finance_Dart sample like so: &nbsp;&nbsp;\* Open Finance_Dart/client/web/app.html in browser (Chrome or Dartium or ...). Wait for page load. &nbsp;&nbsp;\* Modify Finance_Dart.client/web/app/view/item_list/day_purchases_list.html. For example, change &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;border-bottom: 1px dashed; &nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;to: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;border-bottom: 1px dashed red; &nbsp;&nbsp;\* Refresh browser and you won't see dashed line color change. :( Only restarting pub serve will do it. NOTE: this issue does NOT affect Dart Editor as it triggers explicit reloads itself on text editor pane content changes. It would be super awesome if we could get this looked at for 1.8. :)
priority
pub serve not noticing file changes from editors in safe write mode e g intellij on osx issue by originally opened as dart lang sdk pub serve does not appear to play nice with editors specifically intellij idea on os x that use a safe write mode e g new file content is first saved to a temporary file then the original file is deleted after which the temporary file is renamed to the original file name we were able to reproduce with initellij on osx using the finance dart sample like so nbsp nbsp open finance dart client web app html in browser chrome or dartium or wait for page load nbsp nbsp modify finance dart client web app view item list day purchases list html for example change nbsp nbsp nbsp nbsp nbsp nbsp nbsp border bottom dashed nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp nbsp to nbsp nbsp nbsp nbsp nbsp nbsp nbsp border bottom dashed red nbsp nbsp refresh browser and you won t see dashed line color change only restarting pub serve will do it note this issue does not affect dart editor as it triggers explicit reloads itself on text editor pane content changes it would be super awesome if we could get this looked at for
1
350,183
24,972,006,903
IssuesEvent
2022-11-02 02:39:31
kevinren1108/Apollo-Capstone-Project
https://api.github.com/repos/kevinren1108/Apollo-Capstone-Project
opened
Project Scope
documentation
Stakeholders will need to know the scope of this project. - [ ] Stakeholders need to know the general goals for the project. - [ ] Stakeholders need to know the business opportunity for the project. - [ ] Stakeholders need to know the project's objectives and some acceptance criteria.
1.0
Project Scope - Stakeholders will need to know the scope of this project. - [ ] Stakeholders need to know the general goals for the project. - [ ] Stakeholders need to know the business opportunity for the project. - [ ] Stakeholders need to know the project's objectives and some acceptance criteria.
non_priority
project scope stakeholders will need to know the scope of this project stakeholders need to know the general goals for the project stakeholders need to know the business opportunity for the project stakeholders need to know the project s objectives and some acceptance criteria
0
129,300
27,439,455,296
IssuesEvent
2023-03-02 09:58:50
microsoft/AL
https://api.github.com/repos/microsoft/AL
closed
Warn on FlowFilter as Column in Query Object
static-code-analysis requires-triage
<!-- Read the contributing https://github.com/microsoft/AL/blob/master/CONTRIBUTING.md guide before proceeding Please follow this template in order for our developers to investigate your issue efficiently. Do not edit or remove the titles; e.g. "Describe the bug". Use the latest version of the AL language extension from the [Visual Studio Code Marketplace](https://marketplace.visualstudio.com/items?itemName=ms-dynamics-smb.al) or shipped as part of the [AL Developer Preview builds](README.md#al-developer-preview-builds) for Dynamics 365 Business Central. Disable all extensions except the AL Language extension. --> Please include the following with each issue: **1. Describe the bug** When you use a FlowFilter as Column in a Query the Query Object cannot be used. **2. To Reproduce** Add any FlowFilter field to a query object ``` AL query 50000 MyQuery { QueryType = Normal; elements { dataitem(Customer;Customer) { column(No_;"No.") { } filter(Date_Filter;"Date Filter") { } } } } ``` **3. Expected behavior** The compiler should at least warn on a FlowFilter field in the query column. Better would be an error. **4. Actual behavior** No warning or error. A runtime Error occurs at executing the query. **5. Versions:** - AL Language: v10.2.719883 - Visual Studio Code: 1.74.2 - Business Central: AT Business Central 21.2 (Platform 21.0.49939.51260 + Application 21.2.49946.49990) - List of Visual Studio Code extensions that you have installed:
1.0
Warn on FlowFilter as Column in Query Object - <!-- Read the contributing https://github.com/microsoft/AL/blob/master/CONTRIBUTING.md guide before proceeding Please follow this template in order for our developers to investigate your issue efficiently. Do not edit or remove the titles; e.g. "Describe the bug". Use the latest version of the AL language extension from the [Visual Studio Code Marketplace](https://marketplace.visualstudio.com/items?itemName=ms-dynamics-smb.al) or shipped as part of the [AL Developer Preview builds](README.md#al-developer-preview-builds) for Dynamics 365 Business Central. Disable all extensions except the AL Language extension. --> Please include the following with each issue: **1. Describe the bug** When you use a FlowFilter as Column in a Query the Query Object cannot be used. **2. To Reproduce** Add any FlowFilter field to a query object ``` AL query 50000 MyQuery { QueryType = Normal; elements { dataitem(Customer;Customer) { column(No_;"No.") { } filter(Date_Filter;"Date Filter") { } } } } ``` **3. Expected behavior** The compiler should at least warn on a FlowFilter field in the query column. Better would be an error. **4. Actual behavior** No warning or error. A runtime Error occurs at executing the query. **5. Versions:** - AL Language: v10.2.719883 - Visual Studio Code: 1.74.2 - Business Central: AT Business Central 21.2 (Platform 21.0.49939.51260 + Application 21.2.49946.49990) - List of Visual Studio Code extensions that you have installed:
non_priority
warn on flowfilter as column in query object read the contributing guide before proceeding please follow this template in order for our developers to investigate your issue efficiently do not edit or remove the titles e g describe the bug use the latest version of the al language extension from the or shipped as part of the readme md al developer preview builds for dynamics business central disable all extensions except the al language extension please include the following with each issue describe the bug when you use a flowfilter as column in a query the query object cannot be used to reproduce add any flowfilter field to a query object al query myquery querytype normal elements dataitem customer customer column no no filter date filter date filter expected behavior the compiler should at least warn on a flowfilter field in the query column better would be an error actual behavior no warning or error a runtime error occurs at executing the query versions al language visual studio code business central at business central platform application list of visual studio code extensions that you have installed
0
292,978
22,040,916,956
IssuesEvent
2022-05-29 10:43:13
luigiberrettini/NLog.Targets.Syslog
https://api.github.com/repos/luigiberrettini/NLog.Targets.Syslog
closed
Build badges in README are not relevant
documentation
**Describe the problem to solve** Build badges in README still refer to AppVeyor and TravisCI. **Describe the improvement proposed** Remove out-of-date badges and add GitHub badge.
1.0
Build badges in README are not relevant - **Describe the problem to solve** Build badges in README still refer to AppVeyor and TravisCI. **Describe the improvement proposed** Remove out-of-date badges and add GitHub badge.
non_priority
build badges in readme are not relevant describe the problem to solve build badges in readme still refer to appveyor and travisci describe the improvement proposed remove out of date badges and add github badge
0
158,420
6,026,974,509
IssuesEvent
2017-06-08 12:45:40
OperationCode/operationcode_frontend
https://api.github.com/repos/OperationCode/operationcode_frontend
closed
Add Hacker Rank Logo to Partners
Priority: Medium Status: In Progress
<!-- Please fill out one of the sections below based on the type of issue you're creating --> # Feature ## Why is this feature being added? <!-- What problem is it solving? What value does it add? --> We're partnering with hacker rank and can now add their logo to our page ## What should your feature do? Add the attached logo to our partners section ![logo_hrwordmark2700x670_2](https://user-images.githubusercontent.com/334550/26850792-ff80192c-4ac5-11e7-9e6f-dc419758a9cd.png)
1.0
Add Hacker Rank Logo to Partners - <!-- Please fill out one of the sections below based on the type of issue you're creating --> # Feature ## Why is this feature being added? <!-- What problem is it solving? What value does it add? --> We're partnering with hacker rank and can now add their logo to our page ## What should your feature do? Add the attached logo to our partners section ![logo_hrwordmark2700x670_2](https://user-images.githubusercontent.com/334550/26850792-ff80192c-4ac5-11e7-9e6f-dc419758a9cd.png)
priority
add hacker rank logo to partners feature why is this feature being added we re partnering with hacker rank and can now add their logo to our page what should your feature do add the attached logo to our partners section
1
302,203
26,131,045,147
IssuesEvent
2022-12-29 05:00:03
boostup-project/boostup-project
https://api.github.com/repos/boostup-project/boostup-project
opened
[BE] 리뷰 컨트롤러 테스트 - 1
BE조경민 ✅ Test
## 📝 Github Issue 리뷰 컨트롤러 테스트 ## 💫 Branch feat/이슈요약#[이슈번호] > ex) feat/member#0 ## ✔️ Check List > 이슈 체크리스트 - [ ] BookmarkCreateTest - [ ] BookmarkDeleteTest - [ ] BookmarkGetTest - [ ] MyPageBookmarkGetTest
1.0
[BE] 리뷰 컨트롤러 테스트 - 1 - ## 📝 Github Issue 리뷰 컨트롤러 테스트 ## 💫 Branch feat/이슈요약#[이슈번호] > ex) feat/member#0 ## ✔️ Check List > 이슈 체크리스트 - [ ] BookmarkCreateTest - [ ] BookmarkDeleteTest - [ ] BookmarkGetTest - [ ] MyPageBookmarkGetTest
non_priority
리뷰 컨트롤러 테스트 📝 github issue 리뷰 컨트롤러 테스트 💫 branch feat 이슈요약 ex feat member ✔️ check list 이슈 체크리스트 bookmarkcreatetest bookmarkdeletetest bookmarkgettest mypagebookmarkgettest
0
41,079
2,868,971,764
IssuesEvent
2015-06-05 22:17:36
dart-lang/pub
https://api.github.com/repos/dart-lang/pub
closed
Pub serve exits if an error occurs in a transformer during startup
bug Fixed Priority-Medium Pub-Serve
<a href="https://github.com/munificent"><img src="https://avatars.githubusercontent.com/u/46275?v=3" align="left" width="96" height="96"hspace="10"></img></a> **Issue by [munificent](https://github.com/munificent)** _Originally opened as dart-lang/sdk#17415_ ---- Once pub serve is up and running, we catch errors from transformers and keep going. But, while pub serve is being started up, if a transformer emits an error, we exit. This is deliberate so that if an error occurs while loading the transformer itself, we don't continue to run pub serve with a broken or missing transformer. The problem is that most errors coming from transformers while pub serve is starting up don't actually effect the transformers being loaded. For example, the &quot;rewrite imports&quot; transformer parses all .dart files and emits an error if the file has a syntax error. That means you can't run pub serve if any .dart file in your application -- even ones not imported by any transformers -- have syntax errors. We should loosen this so that those errors are reported but don't take down the system.
1.0
Pub serve exits if an error occurs in a transformer during startup - <a href="https://github.com/munificent"><img src="https://avatars.githubusercontent.com/u/46275?v=3" align="left" width="96" height="96"hspace="10"></img></a> **Issue by [munificent](https://github.com/munificent)** _Originally opened as dart-lang/sdk#17415_ ---- Once pub serve is up and running, we catch errors from transformers and keep going. But, while pub serve is being started up, if a transformer emits an error, we exit. This is deliberate so that if an error occurs while loading the transformer itself, we don't continue to run pub serve with a broken or missing transformer. The problem is that most errors coming from transformers while pub serve is starting up don't actually effect the transformers being loaded. For example, the &quot;rewrite imports&quot; transformer parses all .dart files and emits an error if the file has a syntax error. That means you can't run pub serve if any .dart file in your application -- even ones not imported by any transformers -- have syntax errors. We should loosen this so that those errors are reported but don't take down the system.
priority
pub serve exits if an error occurs in a transformer during startup issue by originally opened as dart lang sdk once pub serve is up and running we catch errors from transformers and keep going but while pub serve is being started up if a transformer emits an error we exit this is deliberate so that if an error occurs while loading the transformer itself we don t continue to run pub serve with a broken or missing transformer the problem is that most errors coming from transformers while pub serve is starting up don t actually effect the transformers being loaded for example the quot rewrite imports quot transformer parses all dart files and emits an error if the file has a syntax error that means you can t run pub serve if any dart file in your application even ones not imported by any transformers have syntax errors we should loosen this so that those errors are reported but don t take down the system
1
219,962
17,139,199,966
IssuesEvent
2021-07-13 07:42:28
milvus-io/milvus
https://api.github.com/repos/milvus-io/milvus
opened
Support multi clients in test runners
sig/testing
**Please state your issue using the following template and, most importantly, in English.** Support multi test clients in locust runner, used in load testing. **What would you like to be added ?** **Why is this needed ?**
1.0
Support multi clients in test runners - **Please state your issue using the following template and, most importantly, in English.** Support multi test clients in locust runner, used in load testing. **What would you like to be added ?** **Why is this needed ?**
non_priority
support multi clients in test runners please state your issue using the following template and most importantly in english support multi test clients in locust runner used in load testing what would you like to be added why is this needed
0
180,397
13,930,467,542
IssuesEvent
2020-10-22 02:31:53
ota-rider/zohowebhooktest
https://api.github.com/repos/ota-rider/zohowebhooktest
closed
test
test 文賢
テスト本文テスト本文テスト本文 テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文
1.0
test - テスト本文テスト本文テスト本文 テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文
non_priority
test テスト本文テスト本文テスト本文 テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文テスト本文
0
652,801
21,562,134,738
IssuesEvent
2022-05-01 10:19:03
PyPSA/pypsa-eur
https://api.github.com/repos/PyPSA/pypsa-eur
closed
Provide `Dockerfile` and docker image for quick start
enhancement low priority
The idea is to provide a `Dockerfile` in the PyPSA-Eur repository for tutorials (and maybe continuous integration) that contains - the `pypsa-eur` environment provided in `environment.yaml` - an already extracted data bundle (e.g. minimal data bundle #40) - an open-source solver or commercial solver (e.g. like Gurobi) without a license One could then run everything from the docker image without having to install and copy the data bundles. One can copy results for post-processing to the host with ```shell docker cp CONTAINER-ID:/docker-container/source-path /host/target-path ``` One can get a list of `CONTAINER-ID`s with `docker ps`. Copying also works vice-versa (e.g. copying a modified `config.yaml` or a Gurobi license file) Open questions: - [x] Can we use a minimal data-bundle docker image and open-source solvers for continuous integration (#40)? This way the image would have a twofold use to us: tutorials and CI. YES - [x] It probably would not make much sense to provide a docker image with the full data bundle and only an open-source solver. Maybe a complete data-bundle and a Gurobi installation -- where the user has to copy the Gurobi license file if Gurobi is selected -- is a viable way? - [x] Where to host the docker image? [Docker Hub](https://hub.docker.com/) or own public repository?
1.0
Provide `Dockerfile` and docker image for quick start - The idea is to provide a `Dockerfile` in the PyPSA-Eur repository for tutorials (and maybe continuous integration) that contains - the `pypsa-eur` environment provided in `environment.yaml` - an already extracted data bundle (e.g. minimal data bundle #40) - an open-source solver or commercial solver (e.g. like Gurobi) without a license One could then run everything from the docker image without having to install and copy the data bundles. One can copy results for post-processing to the host with ```shell docker cp CONTAINER-ID:/docker-container/source-path /host/target-path ``` One can get a list of `CONTAINER-ID`s with `docker ps`. Copying also works vice-versa (e.g. copying a modified `config.yaml` or a Gurobi license file) Open questions: - [x] Can we use a minimal data-bundle docker image and open-source solvers for continuous integration (#40)? This way the image would have a twofold use to us: tutorials and CI. YES - [x] It probably would not make much sense to provide a docker image with the full data bundle and only an open-source solver. Maybe a complete data-bundle and a Gurobi installation -- where the user has to copy the Gurobi license file if Gurobi is selected -- is a viable way? - [x] Where to host the docker image? [Docker Hub](https://hub.docker.com/) or own public repository?
priority
provide dockerfile and docker image for quick start the idea is to provide a dockerfile in the pypsa eur repository for tutorials and maybe continuous integration that contains the pypsa eur environment provided in environment yaml an already extracted data bundle e g minimal data bundle an open source solver or commercial solver e g like gurobi without a license one could then run everything from the docker image without having to install and copy the data bundles one can copy results for post processing to the host with shell docker cp container id docker container source path host target path one can get a list of container id s with docker ps copying also works vice versa e g copying a modified config yaml or a gurobi license file open questions can we use a minimal data bundle docker image and open source solvers for continuous integration this way the image would have a twofold use to us tutorials and ci yes it probably would not make much sense to provide a docker image with the full data bundle and only an open source solver maybe a complete data bundle and a gurobi installation where the user has to copy the gurobi license file if gurobi is selected is a viable way where to host the docker image or own public repository
1