Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3 values | title stringlengths 1 1k | labels stringlengths 4 1.38k | body stringlengths 1 262k | index stringclasses 16 values | text_combine stringlengths 96 262k | label stringclasses 2 values | text stringlengths 96 252k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
43,262 | 7,035,159,488 | IssuesEvent | 2017-12-27 21:33:07 | vuematerial/vue-material | https://api.github.com/repos/vuematerial/vue-material | closed | [Docs] async / await for example | documentation | ### Steps to reproduce
Write a method in any example format like this:
```javascript
async onSelect (val) {
}
```
### Which browser?
`vue-material@vue-material@1.0.0-beta-7`
Chrome 63.0.3239.108 (64bit) on Xubuntu
### What is expected?
Transformed into `onSelect: async function onSelect (val) {`
### What is actually happening?
It's transformed into `async onSelect: function onSelect (val) {` and throw error:
```
ERROR in ./build/loaders/component-example-loader.js!./docs/app/pages/Components/Autocomplete/examples/AutocompleteTemplate.vue
Module build failed: SyntaxError: Unexpected token, expected (61:15)
59 | window.alert('noop')
60 | },
> 61 | async onSelect: function onSelect (val) {
| ^
62 | await this.$nextTick()
63 | this.value = val
64 | }
at createError$1 (/home/vipro/Documents/projects/maxwin/vue-material/node_modules/prettier/parser-babylon.js:1:50)
at parse (/home/vipro/Documents/projects/maxwin/vue-material/node_modules/prettier/parser-babylon.js:1:793)
at Object.parse (/home/vipro/Documents/projects/maxwin/vue-material/node_modules/prettier/index.js:4220:12)
at formatWithCursor (/home/vipro/Documents/projects/maxwin/vue-material/node_modules/prettier/index.js:24819:22)
at format (/home/vipro/Documents/projects/maxwin/vue-material/node_modules/prettier/index.js:24859:10)
at Object.format (/home/vipro/Documents/projects/maxwin/vue-material/node_modules/prettier/index.js:25098:12)
at Object.module.exports (/home/vipro/Documents/projects/maxwin/vue-material/build/loaders/component-example-loader.js:88:23)
@ ./docs/app/pages/Components/Autocomplete/Autocomplete.vue 39:18-123
@ ./docs/app/pages lazy ^\.\/.*$
@ ./docs/app/config.js
@ ./docs/app/index.js
@ multi ./docs/app/index.js ./build/local/client
```
Is it possible to replace [`vue-template-es2015-compiler`](https://github.com/vuematerial/vue-material/blob/8ae249cd70e610bb81c7d9f512329836ed98b4aa/build/loaders/component-example-loader.js#L83) with babel with same configuration as `.babelrc`?
I think it's might because `async / await` is `es2017` not `es2015` and [`Bublé`](https://github.com/yyx990803/buble)(which [`vue-template-es2015-compiler`](https://github.com/vuejs/vue-template-es2015-compiler) dependent on) is an **ES2015 compiler**?
Til now, we could still write `onSelect: async function onSelect (val) {` in our documentation example.
| 1.0 | [Docs] async / await for example - ### Steps to reproduce
Write a method in any example format like this:
```javascript
async onSelect (val) {
}
```
### Which browser?
`vue-material@vue-material@1.0.0-beta-7`
Chrome 63.0.3239.108 (64bit) on Xubuntu
### What is expected?
Transformed into `onSelect: async function onSelect (val) {`
### What is actually happening?
It's transformed into `async onSelect: function onSelect (val) {` and throw error:
```
ERROR in ./build/loaders/component-example-loader.js!./docs/app/pages/Components/Autocomplete/examples/AutocompleteTemplate.vue
Module build failed: SyntaxError: Unexpected token, expected (61:15)
59 | window.alert('noop')
60 | },
> 61 | async onSelect: function onSelect (val) {
| ^
62 | await this.$nextTick()
63 | this.value = val
64 | }
at createError$1 (/home/vipro/Documents/projects/maxwin/vue-material/node_modules/prettier/parser-babylon.js:1:50)
at parse (/home/vipro/Documents/projects/maxwin/vue-material/node_modules/prettier/parser-babylon.js:1:793)
at Object.parse (/home/vipro/Documents/projects/maxwin/vue-material/node_modules/prettier/index.js:4220:12)
at formatWithCursor (/home/vipro/Documents/projects/maxwin/vue-material/node_modules/prettier/index.js:24819:22)
at format (/home/vipro/Documents/projects/maxwin/vue-material/node_modules/prettier/index.js:24859:10)
at Object.format (/home/vipro/Documents/projects/maxwin/vue-material/node_modules/prettier/index.js:25098:12)
at Object.module.exports (/home/vipro/Documents/projects/maxwin/vue-material/build/loaders/component-example-loader.js:88:23)
@ ./docs/app/pages/Components/Autocomplete/Autocomplete.vue 39:18-123
@ ./docs/app/pages lazy ^\.\/.*$
@ ./docs/app/config.js
@ ./docs/app/index.js
@ multi ./docs/app/index.js ./build/local/client
```
Is it possible to replace [`vue-template-es2015-compiler`](https://github.com/vuematerial/vue-material/blob/8ae249cd70e610bb81c7d9f512329836ed98b4aa/build/loaders/component-example-loader.js#L83) with babel with same configuration as `.babelrc`?
I think it's might because `async / await` is `es2017` not `es2015` and [`Bublé`](https://github.com/yyx990803/buble)(which [`vue-template-es2015-compiler`](https://github.com/vuejs/vue-template-es2015-compiler) dependent on) is an **ES2015 compiler**?
Til now, we could still write `onSelect: async function onSelect (val) {` in our documentation example.
| non_priority | async await for example steps to reproduce write a method in any example format like this javascript async onselect val which browser vue material vue material beta chrome on xubuntu what is expected transformed into onselect async function onselect val what is actually happening it s transformed into async onselect function onselect val and throw error error in build loaders component example loader js docs app pages components autocomplete examples autocompletetemplate vue module build failed syntaxerror unexpected token expected window alert noop async onselect function onselect val await this nexttick this value val at createerror home vipro documents projects maxwin vue material node modules prettier parser babylon js at parse home vipro documents projects maxwin vue material node modules prettier parser babylon js at object parse home vipro documents projects maxwin vue material node modules prettier index js at formatwithcursor home vipro documents projects maxwin vue material node modules prettier index js at format home vipro documents projects maxwin vue material node modules prettier index js at object format home vipro documents projects maxwin vue material node modules prettier index js at object module exports home vipro documents projects maxwin vue material build loaders component example loader js docs app pages components autocomplete autocomplete vue docs app pages lazy docs app config js docs app index js multi docs app index js build local client is it possible to replace with babel with same configuration as babelrc i think it s might because async await is not and dependent on is an compiler til now we could still write onselect async function onselect val in our documentation example | 0 |
7,811 | 2,934,884,290 | IssuesEvent | 2015-06-30 11:28:41 | UnifiedViews/Plugins | https://api.github.com/repos/UnifiedViews/Plugins | closed | T-RdfToFiles - RDF format could be "Auto" options in dialog | priority: Normal resolution: invalid severity: enhancement status: ready for test |

so that a user doesn't have to set this parameter explicitly. | 1.0 | T-RdfToFiles - RDF format could be "Auto" options in dialog -

so that a user doesn't have to set this parameter explicitly. | non_priority | t rdftofiles rdf format could be auto options in dialog so that a user doesn t have to set this parameter explicitly | 0 |
75,842 | 3,476,550,374 | IssuesEvent | 2015-12-27 01:32:29 | joflashstudios/PGB | https://api.github.com/repos/joflashstudios/PGB | closed | Directory Scanner doesn't always catch UnauthorizedAccessException | bug high priority | Catch, but only one re-try, further down tryless calls to NextDirectory, etc. | 1.0 | Directory Scanner doesn't always catch UnauthorizedAccessException - Catch, but only one re-try, further down tryless calls to NextDirectory, etc. | priority | directory scanner doesn t always catch unauthorizedaccessexception catch but only one re try further down tryless calls to nextdirectory etc | 1 |
769,563 | 27,011,836,868 | IssuesEvent | 2023-02-10 15:59:24 | MartinXPN/profound.academy | https://api.github.com/repos/MartinXPN/profound.academy | closed | Change the AI Assistant to generate suggestions on what to change | enhancement priority/top | Change the AI Assistant to generate suggestions on what to change in the code.
* Modify the prompt
* Do not execute multiple suggestions on `LambdaJudge`
* Get 1 suggestion right from the model and show it to the user
This will make running the AI Assistant 3x cheaper and 2x faster.
Running the code on `LambdaJudge` can be a good idea for https://github.com/MartinXPN/profound.academy/issues/346 | 1.0 | Change the AI Assistant to generate suggestions on what to change - Change the AI Assistant to generate suggestions on what to change in the code.
* Modify the prompt
* Do not execute multiple suggestions on `LambdaJudge`
* Get 1 suggestion right from the model and show it to the user
This will make running the AI Assistant 3x cheaper and 2x faster.
Running the code on `LambdaJudge` can be a good idea for https://github.com/MartinXPN/profound.academy/issues/346 | priority | change the ai assistant to generate suggestions on what to change change the ai assistant to generate suggestions on what to change in the code modify the prompt do not execute multiple suggestions on lambdajudge get suggestion right from the model and show it to the user this will make running the ai assistant cheaper and faster running the code on lambdajudge can be a good idea for | 1 |
187,584 | 6,759,356,769 | IssuesEvent | 2017-10-24 16:49:56 | ariogato/Koramu | https://api.github.com/repos/ariogato/Koramu | closed | Speichern | difficulty:advanced priority:high | Im Pausemenü hat der Benutzer die Option zu speichern ("Save").
Ein Klick darauf soll die Speicherung des aktuellen Stands des Spiels (in einer xml-Datei) bewirken.
Dieser gespeicherte Stand soll das nächste mal, wenn der Spieler auf "Play" drückt geladen werden.
Dies soll ein Fortschreiten in der Story ermöglichen, ohne alles auf einmal durchspielen zu müssen.
Die Callback Funktion, die beim betätigen von "Save" aufgerufen wird, muss folgendes machen:
1. mainQuest und partQuest sollen vom Story Objekt in `TheGame` mit entsprechenden Methoden abrufen.
2. Mithilfe des Tiniyxml Frameworks sollen die beiden Werte irgendwie in einer xml Datei, die zu Beginn einmal manuell erstellt wird, untergebracht werden.
3. Die Position des Spielers genauso in die xml Datei schreiben
4. Als _Zusatz:_ Der Save Button sollte nachher nicht mehr betätigbar sein und das grüne Bild (Spalte 3) anzeigen
Außerdem muss an anderen Stellen im Code folgendes gemacht werden
1. `Storyparser`: Eine neue Methode erstellen, die den Spielstand wieder abruft
2. `Story::init()`: Den Spielstand über den Storyparser einlesen
3. `Player::init()`: DiePosition über den Storyparser einlesen | 1.0 | Speichern - Im Pausemenü hat der Benutzer die Option zu speichern ("Save").
Ein Klick darauf soll die Speicherung des aktuellen Stands des Spiels (in einer xml-Datei) bewirken.
Dieser gespeicherte Stand soll das nächste mal, wenn der Spieler auf "Play" drückt geladen werden.
Dies soll ein Fortschreiten in der Story ermöglichen, ohne alles auf einmal durchspielen zu müssen.
Die Callback Funktion, die beim betätigen von "Save" aufgerufen wird, muss folgendes machen:
1. mainQuest und partQuest sollen vom Story Objekt in `TheGame` mit entsprechenden Methoden abrufen.
2. Mithilfe des Tiniyxml Frameworks sollen die beiden Werte irgendwie in einer xml Datei, die zu Beginn einmal manuell erstellt wird, untergebracht werden.
3. Die Position des Spielers genauso in die xml Datei schreiben
4. Als _Zusatz:_ Der Save Button sollte nachher nicht mehr betätigbar sein und das grüne Bild (Spalte 3) anzeigen
Außerdem muss an anderen Stellen im Code folgendes gemacht werden
1. `Storyparser`: Eine neue Methode erstellen, die den Spielstand wieder abruft
2. `Story::init()`: Den Spielstand über den Storyparser einlesen
3. `Player::init()`: DiePosition über den Storyparser einlesen | priority | speichern im pausemenü hat der benutzer die option zu speichern save ein klick darauf soll die speicherung des aktuellen stands des spiels in einer xml datei bewirken dieser gespeicherte stand soll das nächste mal wenn der spieler auf play drückt geladen werden dies soll ein fortschreiten in der story ermöglichen ohne alles auf einmal durchspielen zu müssen die callback funktion die beim betätigen von save aufgerufen wird muss folgendes machen mainquest und partquest sollen vom story objekt in thegame mit entsprechenden methoden abrufen mithilfe des tiniyxml frameworks sollen die beiden werte irgendwie in einer xml datei die zu beginn einmal manuell erstellt wird untergebracht werden die position des spielers genauso in die xml datei schreiben als zusatz der save button sollte nachher nicht mehr betätigbar sein und das grüne bild spalte anzeigen außerdem muss an anderen stellen im code folgendes gemacht werden storyparser eine neue methode erstellen die den spielstand wieder abruft story init den spielstand über den storyparser einlesen player init dieposition über den storyparser einlesen | 1 |
169,539 | 20,841,777,630 | IssuesEvent | 2022-03-21 01:30:38 | uniquelyparticular/serverless-oauth | https://api.github.com/repos/uniquelyparticular/serverless-oauth | opened | CVE-2022-24772 (High) detected in node-forge-0.8.4.tgz, node-forge-0.7.4.tgz | security vulnerability | ## CVE-2022-24772 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-forge-0.8.4.tgz</b>, <b>node-forge-0.7.4.tgz</b></p></summary>
<p>
<details><summary><b>node-forge-0.8.4.tgz</b></p></summary>
<p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.8.4.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.8.4.tgz</a></p>
<p>Path to dependency file: /generic-oauth/package.json</p>
<p>Path to vulnerable library: /tmp/git/generic-oauth/node_modules/gcs-resumable-upload/node_modules/node-forge/package.json</p>
<p>
Dependency Hierarchy:
- firebase-admin-8.0.0.tgz (Root Library)
- storage-2.5.0.tgz
- gcs-resumable-upload-1.1.0.tgz
- google-auth-library-3.1.2.tgz
- gtoken-2.3.3.tgz
- google-p12-pem-1.0.4.tgz
- :x: **node-forge-0.8.4.tgz** (Vulnerable Library)
</details>
<details><summary><b>node-forge-0.7.4.tgz</b></p></summary>
<p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.7.4.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.7.4.tgz</a></p>
<p>Path to dependency file: /generic-oauth/package.json</p>
<p>Path to vulnerable library: /tmp/git/generic-oauth/node_modules/node-forge/package.json</p>
<p>
Dependency Hierarchy:
- firebase-admin-8.0.0.tgz (Root Library)
- :x: **node-forge-0.7.4.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.
<p>Publish Date: 2022-03-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24772>CVE-2022-24772</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24772</a></p>
<p>Release Date: 2022-03-18</p>
<p>Fix Resolution: node-forge - 1.3.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-24772 (High) detected in node-forge-0.8.4.tgz, node-forge-0.7.4.tgz - ## CVE-2022-24772 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-forge-0.8.4.tgz</b>, <b>node-forge-0.7.4.tgz</b></p></summary>
<p>
<details><summary><b>node-forge-0.8.4.tgz</b></p></summary>
<p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.8.4.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.8.4.tgz</a></p>
<p>Path to dependency file: /generic-oauth/package.json</p>
<p>Path to vulnerable library: /tmp/git/generic-oauth/node_modules/gcs-resumable-upload/node_modules/node-forge/package.json</p>
<p>
Dependency Hierarchy:
- firebase-admin-8.0.0.tgz (Root Library)
- storage-2.5.0.tgz
- gcs-resumable-upload-1.1.0.tgz
- google-auth-library-3.1.2.tgz
- gtoken-2.3.3.tgz
- google-p12-pem-1.0.4.tgz
- :x: **node-forge-0.8.4.tgz** (Vulnerable Library)
</details>
<details><summary><b>node-forge-0.7.4.tgz</b></p></summary>
<p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.7.4.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.7.4.tgz</a></p>
<p>Path to dependency file: /generic-oauth/package.json</p>
<p>Path to vulnerable library: /tmp/git/generic-oauth/node_modules/node-forge/package.json</p>
<p>
Dependency Hierarchy:
- firebase-admin-8.0.0.tgz (Root Library)
- :x: **node-forge-0.7.4.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.
<p>Publish Date: 2022-03-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24772>CVE-2022-24772</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24772">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24772</a></p>
<p>Release Date: 2022-03-18</p>
<p>Fix Resolution: node-forge - 1.3.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in node forge tgz node forge tgz cve high severity vulnerability vulnerable libraries node forge tgz node forge tgz node forge tgz javascript implementations of network transports cryptography ciphers pki message digests and various utilities library home page a href path to dependency file generic oauth package json path to vulnerable library tmp git generic oauth node modules gcs resumable upload node modules node forge package json dependency hierarchy firebase admin tgz root library storage tgz gcs resumable upload tgz google auth library tgz gtoken tgz google pem tgz x node forge tgz vulnerable library node forge tgz javascript implementations of network transports cryptography ciphers pki message digests and various utilities library home page a href path to dependency file generic oauth package json path to vulnerable library tmp git generic oauth node modules node forge package json dependency hierarchy firebase admin tgz root library x node forge tgz vulnerable library found in base branch master vulnerability details forge also called node forge is a native implementation of transport layer security in javascript prior to version rsa pkcs signature verification code does not check for tailing garbage bytes after decoding a digestinfo asn structure this can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used the issue has been addressed in node forge version there are currently no known workarounds publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution node forge step up your open source security game with whitesource | 0 |
49,602 | 3,003,708,046 | IssuesEvent | 2015-07-25 05:52:08 | jayway/powermock | https://api.github.com/repos/jayway/powermock | opened | PowerMock is of no use for code coverage | bug imported Priority-Medium | _From [srika....@gmail.com](https://code.google.com/u/109015946327936505335/) on March 21, 2014 08:12:16_
What steps will reproduce the problem? 1.Write a succesful testcase using PowerMock
2.Run maven command for cobertura report (or Sonar even)
3.Open cobertura report to see if code is covered What is the expected output? What do you see instead? Expected is - the code in the report must be shown as covered. But it is observed that the code remains uncovered. What version of the product are you using? On what operating system? easymock 3.0
powermock-module-junit4 1.4.12
powermock-api-easymock 1.4.12
Windows 7 for Cobertura and Linux for Sonar Please provide any additional information below. When the code coverage remains unchanged it is of no use using powermock. Would be delighted to see the resolution.
_Original issue: http://code.google.com/p/powermock/issues/detail?id=489_ | 1.0 | PowerMock is of no use for code coverage - _From [srika....@gmail.com](https://code.google.com/u/109015946327936505335/) on March 21, 2014 08:12:16_
What steps will reproduce the problem? 1.Write a succesful testcase using PowerMock
2.Run maven command for cobertura report (or Sonar even)
3.Open cobertura report to see if code is covered What is the expected output? What do you see instead? Expected is - the code in the report must be shown as covered. But it is observed that the code remains uncovered. What version of the product are you using? On what operating system? easymock 3.0
powermock-module-junit4 1.4.12
powermock-api-easymock 1.4.12
Windows 7 for Cobertura and Linux for Sonar Please provide any additional information below. When the code coverage remains unchanged it is of no use using powermock. Would be delighted to see the resolution.
_Original issue: http://code.google.com/p/powermock/issues/detail?id=489_ | priority | powermock is of no use for code coverage from on march what steps will reproduce the problem write a succesful testcase using powermock run maven command for cobertura report or sonar even open cobertura report to see if code is covered what is the expected output what do you see instead expected is the code in the report must be shown as covered but it is observed that the code remains uncovered what version of the product are you using on what operating system easymock powermock module powermock api easymock windows for cobertura and linux for sonar please provide any additional information below when the code coverage remains unchanged it is of no use using powermock would be delighted to see the resolution original issue | 1 |
778,894 | 27,332,989,260 | IssuesEvent | 2023-02-25 21:36:09 | noisy/portfolio | https://api.github.com/repos/noisy/portfolio | opened | Projects's descriptions are partially or fully covered on sliding hover effect (from top) | bug Priority: Low | Project's description is partially or fully covered on sliding hover effect when you hover a project's thumbnail (from top side). It looks differently on different widths, but almost always something is missing from description. Fine is only between 768px and 992px width. It could be fixed together with #19.
Steps:
1. Open page https://krzysztofszumny.com/projects
2. Hover over any of the projects thumbnails (from top side)
Expected effect: Project's name and description is fully visible
Actual Effect: Project's name and description is not fully visible
Screenshots:


Desktop:
Windows 10: Firefox 109.0.1
Windows 10: Chrome 110.0.5481.78
Ubuntu 20.04.4 LTS Chrome 110.0.5481.100
Mobile:
This sliding effect doesn't appear at all. | 1.0 | Projects's descriptions are partially or fully covered on sliding hover effect (from top) - Project's description is partially or fully covered on sliding hover effect when you hover a project's thumbnail (from top side). It looks differently on different widths, but almost always something is missing from description. Fine is only between 768px and 992px width. It could be fixed together with #19.
Steps:
1. Open page https://krzysztofszumny.com/projects
2. Hover over any of the projects thumbnails (from top side)
Expected effect: Project's name and description is fully visible
Actual Effect: Project's name and description is not fully visible
Screenshots:


Desktop:
Windows 10: Firefox 109.0.1
Windows 10: Chrome 110.0.5481.78
Ubuntu 20.04.4 LTS Chrome 110.0.5481.100
Mobile:
This sliding effect doesn't appear at all. | priority | projects s descriptions are partially or fully covered on sliding hover effect from top project s description is partially or fully covered on sliding hover effect when you hover a project s thumbnail from top side it looks differently on different widths but almost always something is missing from description fine is only between and width it could be fixed together with steps open page hover over any of the projects thumbnails from top side expected effect project s name and description is fully visible actual effect project s name and description is not fully visible screenshots desktop windows firefox windows chrome ubuntu lts chrome mobile this sliding effect doesn t appear at all | 1 |
703,082 | 24,146,261,495 | IssuesEvent | 2022-09-21 19:02:27 | rokwire/illinois-app | https://api.github.com/repos/rokwire/illinois-app | closed | [ACCESSIBILITY] Today's Wellness tip colors not meeting contrast ratio | Type: Accessibility Priority: High | Describe the accessibility issue
The white on orange is not meeting contrast standards.
[WCAG 1.4.3 Contrast (minimum) (AA)](https://www.w3.org/TR/WCAG21/#contrast-minimum)
To Reproduce
Steps to reproduce the behavior:
Launch app
Upon reaching the Wellness area of app there is "Today's wellness tip" in white on orange colors.
Expected behavior
This color contrast needs to meet 4:5:1 ratio for regular sized text.
Screenshots

Smartphone (please complete the following information):
Android Pixel 4a- Android 12
Additional context
Add any other context about the problem here.
| 1.0 | [ACCESSIBILITY] Today's Wellness tip colors not meeting contrast ratio - Describe the accessibility issue
The white on orange is not meeting contrast standards.
[WCAG 1.4.3 Contrast (minimum) (AA)](https://www.w3.org/TR/WCAG21/#contrast-minimum)
To Reproduce
Steps to reproduce the behavior:
Launch app
Upon reaching the Wellness area of app there is "Today's wellness tip" in white on orange colors.
Expected behavior
This color contrast needs to meet 4:5:1 ratio for regular sized text.
Screenshots

Smartphone (please complete the following information):
Android Pixel 4a- Android 12
Additional context
Add any other context about the problem here.
| priority | today s wellness tip colors not meeting contrast ratio describe the accessibility issue the white on orange is not meeting contrast standards to reproduce steps to reproduce the behavior launch app upon reaching the wellness area of app there is today s wellness tip in white on orange colors expected behavior this color contrast needs to meet ratio for regular sized text screenshots smartphone please complete the following information android pixel android additional context add any other context about the problem here | 1 |
56,522 | 3,080,196,197 | IssuesEvent | 2015-08-21 20:38:33 | pavel-pimenov/flylinkdc-r5xx | https://api.github.com/repos/pavel-pimenov/flylinkdc-r5xx | closed | Зависание MediaInfo на некоторых файлах. | bug Component-Logic Component-MediaInfo imported Priority-Medium | _From [a.rain...@gmail.com](https://code.google.com/u/117892482479228821242/) on March 20, 2012 10:12:03_
В версии r502 -beta6 build 9479 MediaInfo входит в бесконечный цикл на файле magnet:?xt=urn:tree:tiger:YLAV4JILJOWHXKIZSOOXBRPLIYP64LE5O7BUPMQ&xl=254684390&dn=Probki(divx).avi
p.s: программа не закрывается, приходится убивать через диспетчер.
p.p.s: самомe чинить лень :)
_Original issue: http://code.google.com/p/flylinkdc/issues/detail?id=720_ | 1.0 | Зависание MediaInfo на некоторых файлах. - _From [a.rain...@gmail.com](https://code.google.com/u/117892482479228821242/) on March 20, 2012 10:12:03_
В версии r502 -beta6 build 9479 MediaInfo входит в бесконечный цикл на файле magnet:?xt=urn:tree:tiger:YLAV4JILJOWHXKIZSOOXBRPLIYP64LE5O7BUPMQ&xl=254684390&dn=Probki(divx).avi
p.s: программа не закрывается, приходится убивать через диспетчер.
p.p.s: самомe чинить лень :)
_Original issue: http://code.google.com/p/flylinkdc/issues/detail?id=720_ | priority | зависание mediainfo на некоторых файлах from on march в версии build mediainfo входит в бесконечный цикл на файле magnet xt urn tree tiger xl dn probki divx avi p s программа не закрывается приходится убивать через диспетчер p p s самомe чинить лень original issue | 1 |
234,599 | 18,009,829,947 | IssuesEvent | 2021-09-16 07:14:35 | pdf-association/pdf-issues | https://api.github.com/repos/pdf-association/pdf-issues | closed | Table 145 additional entries for transparency group attributes dict is unclear which dict(s) these are additional to | bug documentation help wanted | Table 145 "Additional entries specific to a transparency group attributes dictionary" is unclear which dictionary(s) these keys are additional to. Furthermore, do all the requirements from whatever the 'base' dictionary is then still hold for a transparency group attributes dictionary???
The text between 11.6.6 "Transparency group XObjects" and Table 145 states:
> A transparency group is represented in PDF as a special type of group XObject (see 8.10.3, "Group XObjects") called a transparency group XObject. A group XObject is in turn a type of form XObject, distinguished by the presence of a Group entry in its form dictionary (see 8.10.2, "Form dictionaries"). The value of this entry is a group attributes dictionary defining the properties of the group.
Clause 8.10.3 Group XObjects defines Table 94 "Entries common to all group attributes dictionaries" but just has optional **Type** and required **S** - **S** is mentioned in Table 145 and so all is OK.
But from the reference to clause 8.10.2 it can be assumed that Table 145 are additions to what is in Table 93 "Additional entries specific to a Type 1 form dictionary". But this also means that a transparency group attributes dictionary can also have a **Group** key ('cos that's in Table 145 - which makes the whole thing recursive!), a **Ref** key, **OC**, and potentially **Measure**, **PtData**, and **StructParent**. I think some of that makes no sense for a transparency group XObject. It also implies that **BBox** in the transparency group attributes dictionary is also required.
This could do with clarification - and maybe stating that certain keys from normal Form XObject dictionaries should be ignored when in transparency group XObject dictionaries. | 1.0 | Table 145 additional entries for transparency group attributes dict is unclear which dict(s) these are additional to - Table 145 "Additional entries specific to a transparency group attributes dictionary" is unclear which dictionary(s) these keys are additional to. Furthermore, do all the requirements from whatever the 'base' dictionary is then still hold for a transparency group attributes dictionary???
The text between 11.6.6 "Transparency group XObjects" and Table 145 states:
> A transparency group is represented in PDF as a special type of group XObject (see 8.10.3, "Group XObjects") called a transparency group XObject. A group XObject is in turn a type of form XObject, distinguished by the presence of a Group entry in its form dictionary (see 8.10.2, "Form dictionaries"). The value of this entry is a group attributes dictionary defining the properties of the group.
Clause 8.10.3 Group XObjects defines Table 94 "Entries common to all group attributes dictionaries" but just has optional **Type** and required **S** - **S** is mentioned in Table 145 and so all is OK.
But from the reference to clause 8.10.2 it can be assumed that Table 145 are additions to what is in Table 93 "Additional entries specific to a Type 1 form dictionary". But this also means that a transparency group attributes dictionary can also have a **Group** key ('cos that's in Table 145 - which makes the whole thing recursive!), a **Ref** key, **OC**, and potentially **Measure**, **PtData**, and **StructParent**. I think some of that makes no sense for a transparency group XObject. It also implies that **BBox** in the transparency group attributes dictionary is also required.
This could do with clarification - and maybe stating that certain keys from normal Form XObject dictionaries should be ignored when in transparency group XObject dictionaries. | non_priority | table additional entries for transparency group attributes dict is unclear which dict s these are additional to table additional entries specific to a transparency group attributes dictionary is unclear which dictionary s these keys are additional to furthermore do all the requirements from whatever the base dictionary is then still hold for a transparency group attributes dictionary the text between transparency group xobjects and table states a transparency group is represented in pdf as a special type of group xobject see group xobjects called a transparency group xobject a group xobject is in turn a type of form xobject distinguished by the presence of a group entry in its form dictionary see form dictionaries the value of this entry is a group attributes dictionary defining the properties of the group clause group xobjects defines table entries common to all group attributes dictionaries but just has optional type and required s s is mentioned in table and so all is ok but from the reference to clause it can be assumed that table are additions to what is in table additional entries specific to a type form dictionary but this also means that a transparency group attributes dictionary can also have a group key cos that s in table which makes the whole thing recursive a ref key oc and potentially measure ptdata and structparent i think some of that makes no sense for a transparency group xobject it also implies that bbox in the transparency group attributes dictionary is also required this could do with clarification and maybe stating that certain keys from normal form xobject dictionaries should be ignored when in transparency group xobject dictionaries | 0 |
18,474 | 4,274,551,640 | IssuesEvent | 2016-07-13 20:52:42 | tdwg/vocab | https://api.github.com/repos/tdwg/vocab | closed | Does TDWG have a web page that contains copyright, licensing, and disclamer statements? | documentation | The previous draft documentation spec said the footer should contain "A reference or link to a document containing the Copyright, Licensing and Disclaimer statements that govern this document. This will usually be the standard one supplied by TDWG". Does TDWG have this? If so, where is it? Should we require the link? See section 3.2.3.4 of the documentation spec | 1.0 | Does TDWG have a web page that contains copyright, licensing, and disclamer statements? - The previous draft documentation spec said the footer should contain "A reference or link to a document containing the Copyright, Licensing and Disclaimer statements that govern this document. This will usually be the standard one supplied by TDWG". Does TDWG have this? If so, where is it? Should we require the link? See section 3.2.3.4 of the documentation spec | non_priority | does tdwg have a web page that contains copyright licensing and disclamer statements the previous draft documentation spec said the footer should contain a reference or link to a document containing the copyright licensing and disclaimer statements that govern this document this will usually be the standard one supplied by tdwg does tdwg have this if so where is it should we require the link see section of the documentation spec | 0 |
19,843 | 10,427,055,824 | IssuesEvent | 2019-09-16 19:01:28 | gandrade/assessment | https://api.github.com/repos/gandrade/assessment | opened | CVE-2019-14379 (High) detected in jackson-databind-2.9.8.jar | security vulnerability | ## CVE-2019-14379 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /tmp/ws-scm/assessment/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.4.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.4.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/gandrade/assessment/commit/0b0141cbd532a1b08f6a2060584c3620fcb2527e">0b0141cbd532a1b08f6a2060584c3620fcb2527e</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used, leading to remote code execution.
<p>Publish Date: 2019-07-29
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379>CVE-2019-14379</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p>
<p>Release Date: 2019-07-29</p>
<p>Fix Resolution: 2.9.9.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-14379 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2019-14379 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /tmp/ws-scm/assessment/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.4.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.4.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/gandrade/assessment/commit/0b0141cbd532a1b08f6a2060584c3620fcb2527e">0b0141cbd532a1b08f6a2060584c3620fcb2527e</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used, leading to remote code execution.
<p>Publish Date: 2019-07-29
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379>CVE-2019-14379</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p>
<p>Release Date: 2019-07-29</p>
<p>Fix Resolution: 2.9.9.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tmp ws scm assessment pom xml path to vulnerable library root repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library found in head commit a href vulnerability details subtypevalidator java in fasterxml jackson databind before mishandles default typing when ehcache is used leading to remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
106,125 | 16,665,005,837 | IssuesEvent | 2021-06-07 01:01:42 | AlexRogalskiy/quotes | https://api.github.com/repos/AlexRogalskiy/quotes | opened | CVE-2020-28469 (Medium) detected in glob-parent-5.1.1.tgz | security vulnerability | ## CVE-2020-28469 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>glob-parent-5.1.1.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.1.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.1.tgz</a></p>
<p>Path to dependency file: quotes/package.json</p>
<p>Path to vulnerable library: quotes/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- eslint-7.19.0.tgz (Root Library)
- :x: **glob-parent-5.1.1.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
<p>Publish Date: 2021-06-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469>CVE-2020-28469</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469</a></p>
<p>Release Date: 2021-06-03</p>
<p>Fix Resolution: glob-parent - 5.1.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-28469 (Medium) detected in glob-parent-5.1.1.tgz - ## CVE-2020-28469 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>glob-parent-5.1.1.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.1.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.1.tgz</a></p>
<p>Path to dependency file: quotes/package.json</p>
<p>Path to vulnerable library: quotes/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- eslint-7.19.0.tgz (Root Library)
- :x: **glob-parent-5.1.1.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
<p>Publish Date: 2021-06-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469>CVE-2020-28469</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469</a></p>
<p>Release Date: 2021-06-03</p>
<p>Fix Resolution: glob-parent - 5.1.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in glob parent tgz cve medium severity vulnerability vulnerable library glob parent tgz extract the non magic parent path from a glob string library home page a href path to dependency file quotes package json path to vulnerable library quotes node modules glob parent package json dependency hierarchy eslint tgz root library x glob parent tgz vulnerable library found in base branch master vulnerability details this affects the package glob parent before the enclosure regex used to check for strings ending in enclosure containing path separator publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent step up your open source security game with whitesource | 0 |
1,907 | 3,421,702,454 | IssuesEvent | 2015-12-08 19:52:00 | dotnet/roslyn | https://api.github.com/repos/dotnet/roslyn | opened | System.ArgumentNullException in Binaries\Debug\RunTests.exe | Area-Infrastructure Contributor Pain | The error occured in:
http://dotnet-ci.cloudapp.net/job/roslyn_prtest_win_dbg_unit32/1882/
Here's the stacktrace
```
11:33:13 Unhandled Exception: System.AggregateException: One or more errors occurred. ---> System.ArgumentNullException: Value cannot be null.
11:33:13 Parameter name: path1
11:33:13 at System.IO.Path.Combine(String path1, String path2)
11:33:13 at RunTests.TestRunner.PrintFailedTestResult(TestResult testResult) in d:\j\workspace\roslyn_prtest_win_dbg_unit32\src\Tools\Source\RunTests\TestRunner.cs:line 105
11:33:13 at RunTests.TestRunner.Print(List`1 testResults) in d:\j\workspace\roslyn_prtest_win_dbg_unit32\src\Tools\Source\RunTests\TestRunner.cs:line 89
11:33:13 at RunTests.TestRunner.<RunAllAsync>d__3.MoveNext() in d:\j\workspace\roslyn_prtest_win_dbg_unit32\src\Tools\Source\RunTests\TestRunner.cs:line 78
11:33:13 --- End of inner exception stack trace ---
11:33:13 at System.Threading.Tasks.Task`1.GetResultCore(Boolean waitCompletionNotification)
11:33:13 at System.Threading.Tasks.Task`1.get_Result()
11:33:13 at RunTests.Program.Main(String[] args) in d:\j\workspace\roslyn_prtest_win_dbg_unit32\src\Tools\Source\RunTests\Program.cs:line 45
```
FYI @dotnet/roslyn-infrastructure | 1.0 | System.ArgumentNullException in Binaries\Debug\RunTests.exe - The error occured in:
http://dotnet-ci.cloudapp.net/job/roslyn_prtest_win_dbg_unit32/1882/
Here's the stacktrace
```
11:33:13 Unhandled Exception: System.AggregateException: One or more errors occurred. ---> System.ArgumentNullException: Value cannot be null.
11:33:13 Parameter name: path1
11:33:13 at System.IO.Path.Combine(String path1, String path2)
11:33:13 at RunTests.TestRunner.PrintFailedTestResult(TestResult testResult) in d:\j\workspace\roslyn_prtest_win_dbg_unit32\src\Tools\Source\RunTests\TestRunner.cs:line 105
11:33:13 at RunTests.TestRunner.Print(List`1 testResults) in d:\j\workspace\roslyn_prtest_win_dbg_unit32\src\Tools\Source\RunTests\TestRunner.cs:line 89
11:33:13 at RunTests.TestRunner.<RunAllAsync>d__3.MoveNext() in d:\j\workspace\roslyn_prtest_win_dbg_unit32\src\Tools\Source\RunTests\TestRunner.cs:line 78
11:33:13 --- End of inner exception stack trace ---
11:33:13 at System.Threading.Tasks.Task`1.GetResultCore(Boolean waitCompletionNotification)
11:33:13 at System.Threading.Tasks.Task`1.get_Result()
11:33:13 at RunTests.Program.Main(String[] args) in d:\j\workspace\roslyn_prtest_win_dbg_unit32\src\Tools\Source\RunTests\Program.cs:line 45
```
FYI @dotnet/roslyn-infrastructure | non_priority | system argumentnullexception in binaries debug runtests exe the error occured in here s the stacktrace unhandled exception system aggregateexception one or more errors occurred system argumentnullexception value cannot be null parameter name at system io path combine string string at runtests testrunner printfailedtestresult testresult testresult in d j workspace roslyn prtest win dbg src tools source runtests testrunner cs line at runtests testrunner print list testresults in d j workspace roslyn prtest win dbg src tools source runtests testrunner cs line at runtests testrunner d movenext in d j workspace roslyn prtest win dbg src tools source runtests testrunner cs line end of inner exception stack trace at system threading tasks task getresultcore boolean waitcompletionnotification at system threading tasks task get result at runtests program main string args in d j workspace roslyn prtest win dbg src tools source runtests program cs line fyi dotnet roslyn infrastructure | 0 |
76,740 | 21,562,992,540 | IssuesEvent | 2022-05-01 12:55:02 | haskell/cabal | https://api.github.com/repos/haskell/cabal | closed | Package sections in cabal.project are insufficient, need local section | type: enhancement cabal-install: nix-local-build attention: pr-welcome re: project-file | I'm working on a project and I want to turn on `-Werror`. OK, I'll add `ghc-options: -Werror` to my `cabal.project`. BUT WAIT, this turns on `-Werror` for all my dependencies too. Well, the package I'm building is called `Cabal`, so I'll put it in a package section `package Cabal`.
BUT WAIT: setup dependencies caused an older version of Cabal to be built, which also got `-Werror` applied. Disaster!
All I want is a section that lets me finger the packages that are going to be built inplace.
| 1.0 | Package sections in cabal.project are insufficient, need local section - I'm working on a project and I want to turn on `-Werror`. OK, I'll add `ghc-options: -Werror` to my `cabal.project`. BUT WAIT, this turns on `-Werror` for all my dependencies too. Well, the package I'm building is called `Cabal`, so I'll put it in a package section `package Cabal`.
BUT WAIT: setup dependencies caused an older version of Cabal to be built, which also got `-Werror` applied. Disaster!
All I want is a section that lets me finger the packages that are going to be built inplace.
| non_priority | package sections in cabal project are insufficient need local section i m working on a project and i want to turn on werror ok i ll add ghc options werror to my cabal project but wait this turns on werror for all my dependencies too well the package i m building is called cabal so i ll put it in a package section package cabal but wait setup dependencies caused an older version of cabal to be built which also got werror applied disaster all i want is a section that lets me finger the packages that are going to be built inplace | 0 |
119,424 | 10,052,820,478 | IssuesEvent | 2019-07-21 11:43:07 | tgstation/tgstation | https://api.github.com/repos/tgstation/tgstation | closed | Shuttles have no atmosphere | Atmospherics Bug Priority: CRITICAL Tested/Reproduced | Issue reported from Round ID: 113532 (/tg/Station Terry [EU] [100% LAG FREE] [New-Dedi])
Reporting client version: 512.1471
they dont have an atmosphere. its the same Thing on the 2 rounds before that.
you also cant create one if you vent canisters into them. the gas just disappears.
my assumption is that the shuttle tiles are somehow not replacing the space tiles when they arrive. ->no atmos | 1.0 | Shuttles have no atmosphere - Issue reported from Round ID: 113532 (/tg/Station Terry [EU] [100% LAG FREE] [New-Dedi])
Reporting client version: 512.1471
they dont have an atmosphere. its the same Thing on the 2 rounds before that.
you also cant create one if you vent canisters into them. the gas just disappears.
my assumption is that the shuttle tiles are somehow not replacing the space tiles when they arrive. ->no atmos | non_priority | shuttles have no atmosphere issue reported from round id tg station terry reporting client version they dont have an atmosphere its the same thing on the rounds before that you also cant create one if you vent canisters into them the gas just disappears my assumption is that the shuttle tiles are somehow not replacing the space tiles when they arrive no atmos | 0 |
55,542 | 11,447,622,494 | IssuesEvent | 2020-02-06 00:23:47 | dotnet/runtime | https://api.github.com/repos/dotnet/runtime | opened | Poor loop optimization in BilinearInterpol benchmark | area-CodeGen tenet-performance | The `Vector<T>` version of this benchmark (`BilinearInterpol_Vector`) has a number of weaknesses:
First, although the temporary array `doubleTemp` is allocated with a constant length:
```
STMT00015 (IL 0x0AD... ???)
[000113] -ACXG------- * ASG ref
[000112] D------N---- +--* LCL_VAR ref V24 loc15
[000111] --CXG------- \--* CALL help ref HELPER.CORINFO_HELP_NEWARR_1_VC
[000110] ------------ arg0 +--* CNS_INT(h) long 0x7ffafe875b00 class
[000109] ------------ arg1 \--* CNS_INT long 4 vector element count
```
The loop cloning code is unable to determine `V24.length`:
```
Considering condition 0: (4 LE V24.Length), could not be evaluated
```
So it decides to clone the loop, AFAICT so that it can eliminate the range check on `doubleTemp`, but then it eliminates it from both clones so we have identical loops. Furthermore, although the exact loop count is available, none of the 4 original loops, nor their identical clones, are unrolled. | 1.0 | Poor loop optimization in BilinearInterpol benchmark - The `Vector<T>` version of this benchmark (`BilinearInterpol_Vector`) has a number of weaknesses:
First, although the temporary array `doubleTemp` is allocated with a constant length:
```
STMT00015 (IL 0x0AD... ???)
[000113] -ACXG------- * ASG ref
[000112] D------N---- +--* LCL_VAR ref V24 loc15
[000111] --CXG------- \--* CALL help ref HELPER.CORINFO_HELP_NEWARR_1_VC
[000110] ------------ arg0 +--* CNS_INT(h) long 0x7ffafe875b00 class
[000109] ------------ arg1 \--* CNS_INT long 4 vector element count
```
The loop cloning code is unable to determine `V24.length`:
```
Considering condition 0: (4 LE V24.Length), could not be evaluated
```
So it decides to clone the loop, AFAICT so that it can eliminate the range check on `doubleTemp`, but then it eliminates it from both clones so we have identical loops. Furthermore, although the exact loop count is available, none of the 4 original loops, nor their identical clones, are unrolled. | non_priority | poor loop optimization in bilinearinterpol benchmark the vector version of this benchmark bilinearinterpol vector has a number of weaknesses first although the temporary array doubletemp is allocated with a constant length il acxg asg ref d n lcl var ref cxg call help ref helper corinfo help newarr vc cns int h long class cns int long vector element count the loop cloning code is unable to determine length considering condition le length could not be evaluated so it decides to clone the loop afaict so that it can eliminate the range check on doubletemp but then it eliminates it from both clones so we have identical loops furthermore although the exact loop count is available none of the original loops nor their identical clones are unrolled | 0 |
603,465 | 18,667,391,793 | IssuesEvent | 2021-10-30 03:32:41 | AY2122S1-CS2113T-T12-1/tp | https://api.github.com/repos/AY2122S1-CS2113T-T12-1/tp | closed | Add assertions helper class for model | type.Task priority.Medium | - Can create assertions for expiry to put inside forex and crypto constructors
- Can create assertions for instrumentManager index within bounds | 1.0 | Add assertions helper class for model - - Can create assertions for expiry to put inside forex and crypto constructors
- Can create assertions for instrumentManager index within bounds | priority | add assertions helper class for model can create assertions for expiry to put inside forex and crypto constructors can create assertions for instrumentmanager index within bounds | 1 |
484,883 | 13,958,605,890 | IssuesEvent | 2020-10-24 12:47:26 | AY2021S1-CS2103-T16-3/tp | https://api.github.com/repos/AY2021S1-CS2103-T16-3/tp | closed | As an OHS admin I can archive the current Semester's data | priority.Medium type.Story | ... so that I can keep the data for auditing purposes, but not have it distract me while dealing with the current semester. | 1.0 | As an OHS admin I can archive the current Semester's data - ... so that I can keep the data for auditing purposes, but not have it distract me while dealing with the current semester. | priority | as an ohs admin i can archive the current semester s data so that i can keep the data for auditing purposes but not have it distract me while dealing with the current semester | 1 |
682,792 | 23,357,905,057 | IssuesEvent | 2022-08-10 09:04:37 | apache/incubator-devlake | https://api.github.com/repos/apache/incubator-devlake | closed | [Feature][config-ui] config-ui new user flow stage 2 | type/feature-request priority/high type/epic | ### Description
## Hide passwords/tokens from connection settings pages (BE/FE)
1. #2423 @warren830
2. #2384
3. #1908
`config-ui` github connection would call `TestConnection` for each token and print out `username` for them if succeeded, or an error message in red. For other plugins, making the input field to `password` type would be sufficient. @yumengwang03 will finish the design before 1st July, @e2corporation
## Displaying links to available dashboards based on `blueprint.settings` (Frontend only)
- #2255
Create a JSON file like the following in config-ui to indicate the requirement of each dashboard, and display links to those dashboards for a specific `blueprint`
```json
{
"dashboards": [
{
"name": "Demo-Average Requirement Lead Time By Assignee",
"url": "/d/kB0IbH37k/demo-average-requirement-lead-time-by-assignee",
"dependencies": [
{
"plugin": "github",
"entities": [
"CODE",
"TICKET"
]
}
]
}
]
}
```
## Pipeline progress (Frontend only)
- #2197
note: the `name` and `finishedRecords` of subtask are missing from the current design, @yumengwang03 will work on it and fix the design first. the `finishedRecords` IS VERY VERY VERY SUPER EXTREMELY IMPORTANT because subtask can run for a LONG LONG LONG time causing the PROGRESS to seemingly dead to the user, we HAVE to show it off to prevent anyone from killing DevLake. And I have kept bringing it up countless times. Give me the `finishedRecord` unless you have a better solution.
## User be able to download pipeline log for debugging(BE/FE)
- API endpoint `GET /pipeline/:id/logs.tar.gz` downloads logs of pipelines in compressed format
- Config-ui shows the link to `logs.tar.gz` for finished pipelines | 1.0 | [Feature][config-ui] config-ui new user flow stage 2 - ### Description
## Hide passwords/tokens from connection settings pages (BE/FE)
1. #2423 @warren830
2. #2384
3. #1908
`config-ui` github connection would call `TestConnection` for each token and print out `username` for them if succeeded, or an error message in red. For other plugins, making the input field to `password` type would be sufficient. @yumengwang03 will finish the design before 1st July, @e2corporation
## Displaying links to available dashboards based on `blueprint.settings` (Frontend only)
- #2255
Create a JSON file like the following in config-ui to indicate the requirement of each dashboard, and display links to those dashboards for a specific `blueprint`
```json
{
"dashboards": [
{
"name": "Demo-Average Requirement Lead Time By Assignee",
"url": "/d/kB0IbH37k/demo-average-requirement-lead-time-by-assignee",
"dependencies": [
{
"plugin": "github",
"entities": [
"CODE",
"TICKET"
]
}
]
}
]
}
```
## Pipeline progress (Frontend only)
- #2197
note: the `name` and `finishedRecords` of subtask are missing from the current design, @yumengwang03 will work on it and fix the design first. the `finishedRecords` IS VERY VERY VERY SUPER EXTREMELY IMPORTANT because subtask can run for a LONG LONG LONG time causing the PROGRESS to seemingly dead to the user, we HAVE to show it off to prevent anyone from killing DevLake. And I have kept bringing it up countless times. Give me the `finishedRecord` unless you have a better solution.
## User be able to download pipeline log for debugging(BE/FE)
- API endpoint `GET /pipeline/:id/logs.tar.gz` downloads logs of pipelines in compressed format
- Config-ui shows the link to `logs.tar.gz` for finished pipelines | priority | config ui new user flow stage description hide passwords tokens from connection settings pages be fe config ui github connection would call testconnection for each token and print out username for them if succeeded or an error message in red for other plugins making the input field to password type would be sufficient will finish the design before july displaying links to available dashboards based on blueprint settings frontend only create a json file like the following in config ui to indicate the requirement of each dashboard and display links to those dashboards for a specific blueprint json dashboards name demo average requirement lead time by assignee url d demo average requirement lead time by assignee dependencies plugin github entities code ticket pipeline progress frontend only note the name and finishedrecords of subtask are missing from the current design will work on it and fix the design first the finishedrecords is very very very super extremely important because subtask can run for a long long long time causing the progress to seemingly dead to the user we have to show it off to prevent anyone from killing devlake and i have kept bringing it up countless times give me the finishedrecord unless you have a better solution user be able to download pipeline log for debugging be fe api endpoint get pipeline id logs tar gz downloads logs of pipelines in compressed format config ui shows the link to logs tar gz for finished pipelines | 1 |
150,348 | 11,957,319,893 | IssuesEvent | 2020-04-04 14:00:15 | RobertBeaudenon/SOEN390-CampusGuideMap | https://api.github.com/repos/RobertBeaudenon/SOEN390-CampusGuideMap | closed | AT-17: Provide side menu to access app features | Acceptance Test | ### Test Case ID: AT-17
### User Story: CC-65 (#65)
As a user, I want to be able to use a side menu so that I can easily access the various functionalities of the application.
### Acceptance Criteria
Given that the user has launched the application and completed viewing the splash screen,
The user should be able to access the main system features through the side menu by selecting the hamburger menu option at the top left of the screen. | 1.0 | AT-17: Provide side menu to access app features - ### Test Case ID: AT-17
### User Story: CC-65 (#65)
As a user, I want to be able to use a side menu so that I can easily access the various functionalities of the application.
### Acceptance Criteria
Given that the user has launched the application and completed viewing the splash screen,
The user should be able to access the main system features through the side menu by selecting the hamburger menu option at the top left of the screen. | non_priority | at provide side menu to access app features test case id at user story cc as a user i want to be able to use a side menu so that i can easily access the various functionalities of the application acceptance criteria given that the user has launched the application and completed viewing the splash screen the user should be able to access the main system features through the side menu by selecting the hamburger menu option at the top left of the screen | 0 |
43,012 | 23,074,659,242 | IssuesEvent | 2022-07-25 21:48:07 | JuliaGPU/AMDGPU.jl | https://api.github.com/repos/JuliaGPU/AMDGPU.jl | closed | Add option to disable automatic mark/wait of specific arrays | good first issue performance | Since arrays may not actually be modified by a given operation, or might only be partially modified (or the user has some other way to ensure correctness). | True | Add option to disable automatic mark/wait of specific arrays - Since arrays may not actually be modified by a given operation, or might only be partially modified (or the user has some other way to ensure correctness). | non_priority | add option to disable automatic mark wait of specific arrays since arrays may not actually be modified by a given operation or might only be partially modified or the user has some other way to ensure correctness | 0 |
206,445 | 16,042,369,038 | IssuesEvent | 2021-04-22 09:28:19 | reclosedev/requests-cache | https://api.github.com/repos/reclosedev/requests-cache | closed | Add Readthedocs maintainers | documentation | Hi @reclosedev, would you be willing to add myself (https://readthedocs.org/profiles/JWCook/) and @skorokithakis (https://readthedocs.org/profiles/stavrosk/) as maintainers for the requests-cache project on Readthedocs?
I would like to add some [automation rules](https://docs.readthedocs.io/en/stable/automation-rules.html) for things like:
* Publishing to `/stable` on git tags, so users don't see in-development changes there
* Making multiple versions of the docs available, so a user can go to, for example, `/v0.5.2` to see docs for the previous version
It would also be convenient for future maintenance if I could do things like manually trigger builds, activate previous versions, etc.
Thanks! | 1.0 | Add Readthedocs maintainers - Hi @reclosedev, would you be willing to add myself (https://readthedocs.org/profiles/JWCook/) and @skorokithakis (https://readthedocs.org/profiles/stavrosk/) as maintainers for the requests-cache project on Readthedocs?
I would like to add some [automation rules](https://docs.readthedocs.io/en/stable/automation-rules.html) for things like:
* Publishing to `/stable` on git tags, so users don't see in-development changes there
* Making multiple versions of the docs available, so a user can go to, for example, `/v0.5.2` to see docs for the previous version
It would also be convenient for future maintenance if I could do things like manually trigger builds, activate previous versions, etc.
Thanks! | non_priority | add readthedocs maintainers hi reclosedev would you be willing to add myself and skorokithakis as maintainers for the requests cache project on readthedocs i would like to add some for things like publishing to stable on git tags so users don t see in development changes there making multiple versions of the docs available so a user can go to for example to see docs for the previous version it would also be convenient for future maintenance if i could do things like manually trigger builds activate previous versions etc thanks | 0 |
40,483 | 12,798,606,787 | IssuesEvent | 2020-07-02 14:10:50 | TreyM-WSS/awesome-go | https://api.github.com/repos/TreyM-WSS/awesome-go | opened | WS-2015-0020 (High) detected in marked-0.3.6.js | security vulnerability | ## WS-2015-0020 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>marked-0.3.6.js</b></p></summary>
<p>A markdown parser built for speed</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/marked/0.3.6/marked.js">https://cdnjs.cloudflare.com/ajax/libs/marked/0.3.6/marked.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/awesome-go/tmpl/tmpl.html</p>
<p>Path to vulnerable library: /awesome-go/tmpl/assets/marked.js,/awesome-go/tmpl/assets/marked.js</p>
<p>
Dependency Hierarchy:
- :x: **marked-0.3.6.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/TreyM-WSS/awesome-go/commit/527b430257fb91be1e331da8bc1859c4319e8791">527b430257fb91be1e331da8bc1859c4319e8791</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Marked is an application that is meant to parse and compile markdown. Due to the way that marked parses input, specifically HTML entities, it's possible to bypass marked's content injection protection (sanitize: true) to inject a javascript: URL.
<p>Publish Date: 2015-05-20
<p>URL: <a href=https://github.com/chjj/marked/pull/592/commits/2cff85979be8e7a026a9aca35542c470cf5da523>WS-2015-0020</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: N/A
- Attack Complexity: N/A
- Privileges Required: N/A
- User Interaction: N/A
- Scope: N/A
- Impact Metrics:
- Confidentiality Impact: N/A
- Integrity Impact: N/A
- Availability Impact: N/A
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/101">https://nodesecurity.io/advisories/101</a></p>
<p>Release Date: 2016-04-18</p>
<p>Fix Resolution: To mitigate the flaw you have a couple of options. There's a [pull request](https://github.com/chjj/marked/pull/592) open that fixes this issue. Another option would be to switch to another markdown library such as remarkable.</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"marked","packageVersion":"0.3.6","isTransitiveDependency":false,"dependencyTree":"marked:0.3.6","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"WS-2015-0020","vulnerabilityDetails":"Marked is an application that is meant to parse and compile markdown. Due to the way that marked parses input, specifically HTML entities, it\u0027s possible to bypass marked\u0027s content injection protection (sanitize: true) to inject a javascript: URL.","vulnerabilityUrl":"https://github.com/chjj/marked/pull/592/commits/2cff85979be8e7a026a9aca35542c470cf5da523","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> --> | True | WS-2015-0020 (High) detected in marked-0.3.6.js - ## WS-2015-0020 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>marked-0.3.6.js</b></p></summary>
<p>A markdown parser built for speed</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/marked/0.3.6/marked.js">https://cdnjs.cloudflare.com/ajax/libs/marked/0.3.6/marked.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/awesome-go/tmpl/tmpl.html</p>
<p>Path to vulnerable library: /awesome-go/tmpl/assets/marked.js,/awesome-go/tmpl/assets/marked.js</p>
<p>
Dependency Hierarchy:
- :x: **marked-0.3.6.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/TreyM-WSS/awesome-go/commit/527b430257fb91be1e331da8bc1859c4319e8791">527b430257fb91be1e331da8bc1859c4319e8791</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Marked is an application that is meant to parse and compile markdown. Due to the way that marked parses input, specifically HTML entities, it's possible to bypass marked's content injection protection (sanitize: true) to inject a javascript: URL.
<p>Publish Date: 2015-05-20
<p>URL: <a href=https://github.com/chjj/marked/pull/592/commits/2cff85979be8e7a026a9aca35542c470cf5da523>WS-2015-0020</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: N/A
- Attack Complexity: N/A
- Privileges Required: N/A
- User Interaction: N/A
- Scope: N/A
- Impact Metrics:
- Confidentiality Impact: N/A
- Integrity Impact: N/A
- Availability Impact: N/A
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/101">https://nodesecurity.io/advisories/101</a></p>
<p>Release Date: 2016-04-18</p>
<p>Fix Resolution: To mitigate the flaw you have a couple of options. There's a [pull request](https://github.com/chjj/marked/pull/592) open that fixes this issue. Another option would be to switch to another markdown library such as remarkable.</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"marked","packageVersion":"0.3.6","isTransitiveDependency":false,"dependencyTree":"marked:0.3.6","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"WS-2015-0020","vulnerabilityDetails":"Marked is an application that is meant to parse and compile markdown. Due to the way that marked parses input, specifically HTML entities, it\u0027s possible to bypass marked\u0027s content injection protection (sanitize: true) to inject a javascript: URL.","vulnerabilityUrl":"https://github.com/chjj/marked/pull/592/commits/2cff85979be8e7a026a9aca35542c470cf5da523","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> --> | non_priority | ws high detected in marked js ws high severity vulnerability vulnerable library marked js a markdown parser built for speed library home page a href path to dependency file tmp ws scm awesome go tmpl tmpl html path to vulnerable library awesome go tmpl assets marked js awesome go tmpl assets marked js dependency hierarchy x marked js vulnerable library found in head commit a href vulnerability details marked is an application that is meant to parse and compile markdown due to the way that marked parses input specifically html entities it s possible to bypass marked s content injection protection sanitize true to inject a javascript url publish date url a href cvss score details base score metrics exploitability metrics attack vector n a attack complexity n a privileges required n a user interaction n a scope n a impact metrics confidentiality impact n a integrity impact n a availability impact n a for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution to mitigate the flaw you have a couple of options there s a open that fixes this issue another option would be to switch to another markdown library such as remarkable isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier ws vulnerabilitydetails marked is an application that is meant to parse and compile markdown due to the way that marked parses input specifically html entities it possible to bypass marked content injection protection sanitize true to inject a javascript url vulnerabilityurl | 0 |
4,924 | 2,566,262,677 | IssuesEvent | 2015-02-08 10:11:05 | bitsuperlab/bitshares_play | https://api.github.com/repos/bitsuperlab/bitshares_play | closed | Support import bts json wallet, for claiming bts snapshot, generate a new genesis | high priority new feature | Other than pts/btc, we need a new import support for bts | 1.0 | Support import bts json wallet, for claiming bts snapshot, generate a new genesis - Other than pts/btc, we need a new import support for bts | priority | support import bts json wallet for claiming bts snapshot generate a new genesis other than pts btc we need a new import support for bts | 1 |
21,737 | 3,549,126,706 | IssuesEvent | 2016-01-20 16:52:22 | dart-lang/sdk | https://api.github.com/repos/dart-lang/sdk | closed | incremental analysis puts warnings in the wrong location after editing super call | area-analyzer Priority-Medium Type-Defect | To reproduce, paste into Atom:
```
abstract class Coercion {
Coercion(fromType, toType);
}
class CoercionError extends Coercion {
CoercionError() : super(null, null);
}
abstract class CoercionInfo {
static const String _propertyName = 'dev_compiler.src.info.CoercionInfo';
}
```
There should be a warning:
The value of the field '_propertyName' is not used - test.dart, line 10
Then delete the open parenthesis after "super" on 6.
The location of the warning shifts two characters to the left:
```
static const String _propertyName = 'dev_compiler.src.info.CoercionInfo';
^^^^^^^^^^^^^
```
Then reanalyze sources, and undo the edit. Now the location of the warning is two characters too far to the right.
Reanalyze sources to fix it again.
(Found with a stress test.) | 1.0 | incremental analysis puts warnings in the wrong location after editing super call - To reproduce, paste into Atom:
```
abstract class Coercion {
Coercion(fromType, toType);
}
class CoercionError extends Coercion {
CoercionError() : super(null, null);
}
abstract class CoercionInfo {
static const String _propertyName = 'dev_compiler.src.info.CoercionInfo';
}
```
There should be a warning:
The value of the field '_propertyName' is not used - test.dart, line 10
Then delete the open parenthesis after "super" on 6.
The location of the warning shifts two characters to the left:
```
static const String _propertyName = 'dev_compiler.src.info.CoercionInfo';
^^^^^^^^^^^^^
```
Then reanalyze sources, and undo the edit. Now the location of the warning is two characters too far to the right.
Reanalyze sources to fix it again.
(Found with a stress test.) | non_priority | incremental analysis puts warnings in the wrong location after editing super call to reproduce paste into atom abstract class coercion coercion fromtype totype class coercionerror extends coercion coercionerror super null null abstract class coercioninfo static const string propertyname dev compiler src info coercioninfo there should be a warning the value of the field propertyname is not used test dart line then delete the open parenthesis after super on the location of the warning shifts two characters to the left static const string propertyname dev compiler src info coercioninfo then reanalyze sources and undo the edit now the location of the warning is two characters too far to the right reanalyze sources to fix it again found with a stress test | 0 |
737,738 | 25,529,358,762 | IssuesEvent | 2022-11-29 06:53:33 | rstudio/gt | https://api.github.com/repos/rstudio/gt | closed | Setting Custom Themes for Tables | Difficulty: [2] Intermediate Effort: [3] High Priority: [2] Medium Type: ★ Enhancement | Is it be possible to set a custom `gt` theme like you can do using `ggplot2::theme`? The thought would be to set up consistently used parameters. For me that would be something to the effect of:
```
df %>%
gt() %>%
fmt_currency(
columns = (matches("^salary|^revenue")),
decimals = 0
) %>%
fmt_percent(
columns = starts_with("pct"),
decimals = 0)
```
I also saw this issue, and I'm not sure if the intent was to include this type of request as a part of it:
https://github.com/rstudio/gt/issues/238
| 1.0 | Setting Custom Themes for Tables - Is it be possible to set a custom `gt` theme like you can do using `ggplot2::theme`? The thought would be to set up consistently used parameters. For me that would be something to the effect of:
```
df %>%
gt() %>%
fmt_currency(
columns = (matches("^salary|^revenue")),
decimals = 0
) %>%
fmt_percent(
columns = starts_with("pct"),
decimals = 0)
```
I also saw this issue, and I'm not sure if the intent was to include this type of request as a part of it:
https://github.com/rstudio/gt/issues/238
| priority | setting custom themes for tables is it be possible to set a custom gt theme like you can do using theme the thought would be to set up consistently used parameters for me that would be something to the effect of df gt fmt currency columns matches salary revenue decimals fmt percent columns starts with pct decimals i also saw this issue and i m not sure if the intent was to include this type of request as a part of it | 1 |
211,150 | 23,792,972,172 | IssuesEvent | 2022-09-02 16:15:23 | HoloRes/suisei-bot | https://api.github.com/repos/HoloRes/suisei-bot | closed | CVE-2021-43138 (High) detected in async-2.6.3.tgz - autoclosed | security vulnerability | ## CVE-2021-43138 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>async-2.6.3.tgz</b></p></summary>
<p>Higher-order functions and common patterns for asynchronous code</p>
<p>Library home page: <a href="https://registry.npmjs.org/async/-/async-2.6.3.tgz">https://registry.npmjs.org/async/-/async-2.6.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/async/package.json</p>
<p>
Dependency Hierarchy:
- mongoose-sequence-5.3.1.tgz (Root Library)
- :x: **async-2.6.3.tgz** (Vulnerable Library)
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.
<p>Publish Date: 2022-04-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43138>CVE-2021-43138</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43138">https://nvd.nist.gov/vuln/detail/CVE-2021-43138</a></p>
<p>Release Date: 2022-04-06</p>
<p>Fix Resolution: async - 2.6.4,3.2.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-43138 (High) detected in async-2.6.3.tgz - autoclosed - ## CVE-2021-43138 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>async-2.6.3.tgz</b></p></summary>
<p>Higher-order functions and common patterns for asynchronous code</p>
<p>Library home page: <a href="https://registry.npmjs.org/async/-/async-2.6.3.tgz">https://registry.npmjs.org/async/-/async-2.6.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/async/package.json</p>
<p>
Dependency Hierarchy:
- mongoose-sequence-5.3.1.tgz (Root Library)
- :x: **async-2.6.3.tgz** (Vulnerable Library)
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.
<p>Publish Date: 2022-04-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43138>CVE-2021-43138</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43138">https://nvd.nist.gov/vuln/detail/CVE-2021-43138</a></p>
<p>Release Date: 2022-04-06</p>
<p>Fix Resolution: async - 2.6.4,3.2.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in async tgz autoclosed cve high severity vulnerability vulnerable library async tgz higher order functions and common patterns for asynchronous code library home page a href path to dependency file package json path to vulnerable library node modules async package json dependency hierarchy mongoose sequence tgz root library x async tgz vulnerable library found in base branch develop vulnerability details in async before and x before a malicious user can obtain privileges via the mapvalues method aka lib internal iterator js createobjectiterator prototype pollution publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution async step up your open source security game with mend | 0 |
705,312 | 24,230,843,145 | IssuesEvent | 2022-09-26 18:07:54 | brave/brave-browser | https://api.github.com/repos/brave/brave-browser | closed | Changelog file should have our own information | priority/P5 closed/stale | Changelog file should have our own information
See: https://github.com/brave/brave-browser/issues/12#issuecomment-402348033 | 1.0 | Changelog file should have our own information - Changelog file should have our own information
See: https://github.com/brave/brave-browser/issues/12#issuecomment-402348033 | priority | changelog file should have our own information changelog file should have our own information see | 1 |
216,722 | 7,311,193,020 | IssuesEvent | 2018-02-28 17:01:19 | craftercms/craftercms | https://api.github.com/repos/craftercms/craftercms | closed | [craftercms] Migrate.sh copies configured-lists to the wrong location | bug priority: medium | migrate.sh is copying configured-lists to form-control-config/configured-lists/configured-lists. | 1.0 | [craftercms] Migrate.sh copies configured-lists to the wrong location - migrate.sh is copying configured-lists to form-control-config/configured-lists/configured-lists. | priority | migrate sh copies configured lists to the wrong location migrate sh is copying configured lists to form control config configured lists configured lists | 1 |
623,187 | 19,662,832,717 | IssuesEvent | 2022-01-10 18:52:55 | nanaynaomi/multnomah-falls-research | https://api.github.com/repos/nanaynaomi/multnomah-falls-research | opened | Create new logo - check with Ingrid | medium priority low difficulty content | 1/10/2022
Create some various logo designs to replace the other logo and/or change the coloring of the old logo. Confirm with Ingrid before starting this. Once logo designs are created, show them to Ingrid to hear her thoughts on them and how we could change them to work with the site. | 1.0 | Create new logo - check with Ingrid - 1/10/2022
Create some various logo designs to replace the other logo and/or change the coloring of the old logo. Confirm with Ingrid before starting this. Once logo designs are created, show them to Ingrid to hear her thoughts on them and how we could change them to work with the site. | priority | create new logo check with ingrid create some various logo designs to replace the other logo and or change the coloring of the old logo confirm with ingrid before starting this once logo designs are created show them to ingrid to hear her thoughts on them and how we could change them to work with the site | 1 |
669,279 | 22,618,692,741 | IssuesEvent | 2022-06-30 02:44:15 | craftercms/craftercms | https://api.github.com/repos/craftercms/craftercms | closed | [studio-ui] Unsupported browsers should display a message that asks users to switch to a supported browser. | enhancement priority: high CI validate | ### Feature Request
#### Is your feature request related to a problem? Please describe.
Currently, when a user attempts to sign in to Crafter Studio on the Safari browser, they are introduced to an infinite "spinning wheel."
#### Describe the solution you'd like
Display a user-friendly message to tell users to use Chrome/Firefox for any browser other than those supported by Crafter Studio.
#### Describe alternatives you've considered
N/A | 1.0 | [studio-ui] Unsupported browsers should display a message that asks users to switch to a supported browser. - ### Feature Request
#### Is your feature request related to a problem? Please describe.
Currently, when a user attempts to sign in to Crafter Studio on the Safari browser, they are introduced to an infinite "spinning wheel."
#### Describe the solution you'd like
Display a user-friendly message to tell users to use Chrome/Firefox for any browser other than those supported by Crafter Studio.
#### Describe alternatives you've considered
N/A | priority | unsupported browsers should display a message that asks users to switch to a supported browser feature request is your feature request related to a problem please describe currently when a user attempts to sign in to crafter studio on the safari browser they are introduced to an infinite spinning wheel describe the solution you d like display a user friendly message to tell users to use chrome firefox for any browser other than those supported by crafter studio describe alternatives you ve considered n a | 1 |
569 | 10,055,992,754 | IssuesEvent | 2019-07-22 08:05:13 | rice-solar-physics/group_webpage | https://api.github.com/repos/rice-solar-physics/group_webpage | opened | More information on past alumni | people | There is only information (e.g. current position, institution) available for a few alumni. Would look better to fill in the rest. | 1.0 | More information on past alumni - There is only information (e.g. current position, institution) available for a few alumni. Would look better to fill in the rest. | non_priority | more information on past alumni there is only information e g current position institution available for a few alumni would look better to fill in the rest | 0 |
65,210 | 7,866,887,500 | IssuesEvent | 2018-06-23 00:34:09 | merenlab/anvio | https://api.github.com/repos/merenlab/anvio | closed | rRNA HMM hits don't show up in the refine mode | design interface metagenomic workflow priority | Hi, using anvi'o v.4 here,
I just wanted to let the developers know that rRNA HMM hits don't show up in the anvi-refine mode (when they show-up nicely in anvi-interactvie mode). I think this "bug" has always been around. However, I apology if this has already been fixed in the master (I currently have issues using it).
Anyways, would be great to see rRNAs on the anvi-refine mode in anvi'o v.5
Tom | 1.0 | rRNA HMM hits don't show up in the refine mode - Hi, using anvi'o v.4 here,
I just wanted to let the developers know that rRNA HMM hits don't show up in the anvi-refine mode (when they show-up nicely in anvi-interactvie mode). I think this "bug" has always been around. However, I apology if this has already been fixed in the master (I currently have issues using it).
Anyways, would be great to see rRNAs on the anvi-refine mode in anvi'o v.5
Tom | non_priority | rrna hmm hits don t show up in the refine mode hi using anvi o v here i just wanted to let the developers know that rrna hmm hits don t show up in the anvi refine mode when they show up nicely in anvi interactvie mode i think this bug has always been around however i apology if this has already been fixed in the master i currently have issues using it anyways would be great to see rrnas on the anvi refine mode in anvi o v tom | 0 |
257,347 | 8,136,196,095 | IssuesEvent | 2018-08-20 07:32:31 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | unifi.ubnt.com - site is not usable | browser-firefox priority-normal | <!-- @browser: Firefox 63.0 -->
<!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:63.0) Gecko/20100101 Firefox/63.0 -->
<!-- @reported_with: desktop-reporter -->
<!-- @extra_labels: type-tracking-protection-basic -->
**URL**: https://unifi.ubnt.com/
**Browser / Version**: Firefox 63.0
**Operating System**: Windows 10
**Tested Another Browser**: Yes
**Problem type**: Site is not usable
**Description**: Site fails to load app after logging in. Redirects to "https://unifi.ubnt.com/#/fatal". Issue not present on other browsers or Firefox 61.
**Steps to Reproduce**:
Noticed issue yesterday evening. Does not occur in other browsers.
[](https://webcompat.com/uploads/2018/8/efc07216-96f4-4cf9-8ceb-a425871ce672.jpg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>mixed active content blocked: false</li><li>buildID: 20180819100312</li><li>tracking content blocked: true (basic)</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.all: false</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>channel: nightly</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_ | 1.0 | unifi.ubnt.com - site is not usable - <!-- @browser: Firefox 63.0 -->
<!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:63.0) Gecko/20100101 Firefox/63.0 -->
<!-- @reported_with: desktop-reporter -->
<!-- @extra_labels: type-tracking-protection-basic -->
**URL**: https://unifi.ubnt.com/
**Browser / Version**: Firefox 63.0
**Operating System**: Windows 10
**Tested Another Browser**: Yes
**Problem type**: Site is not usable
**Description**: Site fails to load app after logging in. Redirects to "https://unifi.ubnt.com/#/fatal". Issue not present on other browsers or Firefox 61.
**Steps to Reproduce**:
Noticed issue yesterday evening. Does not occur in other browsers.
[](https://webcompat.com/uploads/2018/8/efc07216-96f4-4cf9-8ceb-a425871ce672.jpg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>mixed active content blocked: false</li><li>buildID: 20180819100312</li><li>tracking content blocked: true (basic)</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.all: false</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>channel: nightly</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_ | priority | unifi ubnt com site is not usable url browser version firefox operating system windows tested another browser yes problem type site is not usable description site fails to load app after logging in redirects to issue not present on other browsers or firefox steps to reproduce noticed issue yesterday evening does not occur in other browsers browser configuration mixed active content blocked false buildid tracking content blocked true basic gfx webrender blob images true gfx webrender all false mixed passive content blocked false gfx webrender enabled false image mem shared true channel nightly from with ❤️ | 1 |
204,644 | 7,089,571,581 | IssuesEvent | 2018-01-12 03:36:52 | dmwm/WMCore | https://api.github.com/repos/dmwm/WMCore | closed | Adapt WMCore OS/Arch requirements to Glidein proposed version | Medium Priority ToDo | See Stefano's talk for exact values. https://indico.cern.ch/event/293016/session/5/contribution/49/material/slides/0.pdf
Policy twiki to come, should be linked here when it does.
I inadvertently filed this in CRABServer and @belforte comments from there are reproduced below.
| 1.0 | Adapt WMCore OS/Arch requirements to Glidein proposed version - See Stefano's talk for exact values. https://indico.cern.ch/event/293016/session/5/contribution/49/material/slides/0.pdf
Policy twiki to come, should be linked here when it does.
I inadvertently filed this in CRABServer and @belforte comments from there are reproduced below.
| priority | adapt wmcore os arch requirements to glidein proposed version see stefano s talk for exact values policy twiki to come should be linked here when it does i inadvertently filed this in crabserver and belforte comments from there are reproduced below | 1 |
8,542 | 7,473,615,356 | IssuesEvent | 2018-04-03 15:50:16 | openscholar/openscholar | https://api.github.com/repos/openscholar/openscholar | closed | Debug Memory Leak | Infrastructure | Under load our AWS EC2 instances in elastic beanstalk where running out of memory.
There was a steady increase in memory till the machine locked up. We have a script for a greaceful restart of apache that free's up memory in this case but would like to fix the underlying issue if possible.
Also, we need to assure that apache/php is tuned so that the max number of processes matches the memory limit of the machine.
[memorycheck.config.txt](https://github.com/openscholar/openscholar/files/1763532/memorycheck.config.txt)
| 1.0 | Debug Memory Leak - Under load our AWS EC2 instances in elastic beanstalk where running out of memory.
There was a steady increase in memory till the machine locked up. We have a script for a greaceful restart of apache that free's up memory in this case but would like to fix the underlying issue if possible.
Also, we need to assure that apache/php is tuned so that the max number of processes matches the memory limit of the machine.
[memorycheck.config.txt](https://github.com/openscholar/openscholar/files/1763532/memorycheck.config.txt)
| non_priority | debug memory leak under load our aws instances in elastic beanstalk where running out of memory there was a steady increase in memory till the machine locked up we have a script for a greaceful restart of apache that free s up memory in this case but would like to fix the underlying issue if possible also we need to assure that apache php is tuned so that the max number of processes matches the memory limit of the machine | 0 |
155,775 | 5,960,773,221 | IssuesEvent | 2017-05-29 15:01:30 | mkdo/kapow-grunt | https://api.github.com/repos/mkdo/kapow-grunt | opened | New Task: grunt-sass-globbing | Priority: Medium Status: Pending Type: Enhancement | It would be advantageous to introduce globbing so that certain folders in Kapow! Sass would automatically pick up when a new partial was introduced. | 1.0 | New Task: grunt-sass-globbing - It would be advantageous to introduce globbing so that certain folders in Kapow! Sass would automatically pick up when a new partial was introduced. | priority | new task grunt sass globbing it would be advantageous to introduce globbing so that certain folders in kapow sass would automatically pick up when a new partial was introduced | 1 |
285,813 | 8,774,925,795 | IssuesEvent | 2018-12-18 21:22:06 | pulumi/pulumi | https://api.github.com/repos/pulumi/pulumi | closed | Add pulumi.all operator to Python SDK | area/core customer/feedback language/python3 priority/P1 | Per @swgillespie, this combinator operator already exists in the JS SDK.
This is useful when you need to build an Output based on multiple Output instances.
Code snippet based on chat thread with @swgillespie:
`pulumi.all(arn1, arn2, arn3).apply(lambda arns: do_something_with_arns(arns))` | 1.0 | Add pulumi.all operator to Python SDK - Per @swgillespie, this combinator operator already exists in the JS SDK.
This is useful when you need to build an Output based on multiple Output instances.
Code snippet based on chat thread with @swgillespie:
`pulumi.all(arn1, arn2, arn3).apply(lambda arns: do_something_with_arns(arns))` | priority | add pulumi all operator to python sdk per swgillespie this combinator operator already exists in the js sdk this is useful when you need to build an output based on multiple output instances code snippet based on chat thread with swgillespie pulumi all apply lambda arns do something with arns arns | 1 |
698,809 | 23,992,193,561 | IssuesEvent | 2022-09-14 02:55:12 | yugabyte/yugabyte-db | https://api.github.com/repos/yugabyte/yugabyte-db | reopened | [YSQL] Fix pg_stat_monitor tests | kind/bug area/ysql priority/medium | Jira Link: [DB-770](https://yugabyte.atlassian.net/browse/DB-770)
### Description
The following tests fail when upstream pg_stat_monitor version [0.9.0](https://github.com/percona/pg_stat_monitor/releases/tag/REL0_9_0_STABLE) is integrated with YB.
- [ ] yb_pg_error.sql
`ELECET * FROM unknown; -- syntax error`
When executed the following query `select * from pg_stat_monitor`, we see the following output
```
SELECT query, elevel, sqlcode, message FROM pg_stat_monitor ORDER BY query COLLATE "C",elevel;
query | elevel | sqlcode | message
------------------------------------------------------------------------------------------------+--------+---------+-----------------------------------
insufficient disk/shared space | 20 | 42601 | syntax error at or near "ELECET"
(1 row)
```
Instead of` ELECET * FROM unknown;`, in the query colunm `insufficient disk/shared space` is printed.
This is inconsistent and has been observed in the mac platform.
- [ ] yb_pg_histogram.sql
```
INSERT INTO t1 VALUES(generate_series(1,1000000));
ANALYZE t1;
SELECT count(*) FROM t1;
INSERT INTO t1 VALUES(generate_series(1,1000000));
ANALYZE t1;
SELECT count(*) FROM t1;
```
The following inserts works well. However the number of calls that are displayed for the query,
`SELECT query, calls FROM pg_stat_monitor ORDER BY query COLLATE "C";`
varies every time. Sometimes, there are two entries for the same query for which the sum of
them is equal to the total number of times SELECT has been executed. Hence we comment
these queries.
- [ ] yb_pg_state.sql
`SELECT 1;`
pg_stat_monitor_reset does not remove this from shared memory and hence this might appear
in subsequent pg_stat_monitor tables. Hence we comment this query. We need to verify the
functionality of pg_stat_monitor_reset.
- [ ] yb_pg_tags.sql
` SELECT 1 AS num /* { "application", psql_app, "real_ip", 192.168.1.3) */; `
Comments are not parsed in some platforms, mainly alma8.
- [ ] yb_pg_top_query.sql
Top query has run to run variability in YB.
Sometimes, top queries are not displayed. This happens frequently in alma8 platforms.
- [ ] yb_pg_user.sql
pg_stat_monitor parsing logic has run to run variability for parsing users. | 1.0 | [YSQL] Fix pg_stat_monitor tests - Jira Link: [DB-770](https://yugabyte.atlassian.net/browse/DB-770)
### Description
The following tests fail when upstream pg_stat_monitor version [0.9.0](https://github.com/percona/pg_stat_monitor/releases/tag/REL0_9_0_STABLE) is integrated with YB.
- [ ] yb_pg_error.sql
`ELECET * FROM unknown; -- syntax error`
When executed the following query `select * from pg_stat_monitor`, we see the following output
```
SELECT query, elevel, sqlcode, message FROM pg_stat_monitor ORDER BY query COLLATE "C",elevel;
query | elevel | sqlcode | message
------------------------------------------------------------------------------------------------+--------+---------+-----------------------------------
insufficient disk/shared space | 20 | 42601 | syntax error at or near "ELECET"
(1 row)
```
Instead of` ELECET * FROM unknown;`, in the query colunm `insufficient disk/shared space` is printed.
This is inconsistent and has been observed in the mac platform.
- [ ] yb_pg_histogram.sql
```
INSERT INTO t1 VALUES(generate_series(1,1000000));
ANALYZE t1;
SELECT count(*) FROM t1;
INSERT INTO t1 VALUES(generate_series(1,1000000));
ANALYZE t1;
SELECT count(*) FROM t1;
```
The following inserts works well. However the number of calls that are displayed for the query,
`SELECT query, calls FROM pg_stat_monitor ORDER BY query COLLATE "C";`
varies every time. Sometimes, there are two entries for the same query for which the sum of
them is equal to the total number of times SELECT has been executed. Hence we comment
these queries.
- [ ] yb_pg_state.sql
`SELECT 1;`
pg_stat_monitor_reset does not remove this from shared memory and hence this might appear
in subsequent pg_stat_monitor tables. Hence we comment this query. We need to verify the
functionality of pg_stat_monitor_reset.
- [ ] yb_pg_tags.sql
` SELECT 1 AS num /* { "application", psql_app, "real_ip", 192.168.1.3) */; `
Comments are not parsed in some platforms, mainly alma8.
- [ ] yb_pg_top_query.sql
Top query has run to run variability in YB.
Sometimes, top queries are not displayed. This happens frequently in alma8 platforms.
- [ ] yb_pg_user.sql
pg_stat_monitor parsing logic has run to run variability for parsing users. | priority | fix pg stat monitor tests jira link description the following tests fail when upstream pg stat monitor version is integrated with yb yb pg error sql elecet from unknown syntax error when executed the following query select from pg stat monitor we see the following output select query elevel sqlcode message from pg stat monitor order by query collate c elevel query elevel sqlcode message insufficient disk shared space syntax error at or near elecet row instead of elecet from unknown in the query colunm insufficient disk shared space is printed this is inconsistent and has been observed in the mac platform yb pg histogram sql insert into values generate series analyze select count from insert into values generate series analyze select count from the following inserts works well however the number of calls that are displayed for the query select query calls from pg stat monitor order by query collate c varies every time sometimes there are two entries for the same query for which the sum of them is equal to the total number of times select has been executed hence we comment these queries yb pg state sql select pg stat monitor reset does not remove this from shared memory and hence this might appear in subsequent pg stat monitor tables hence we comment this query we need to verify the functionality of pg stat monitor reset yb pg tags sql select as num application psql app real ip comments are not parsed in some platforms mainly yb pg top query sql top query has run to run variability in yb sometimes top queries are not displayed this happens frequently in platforms yb pg user sql pg stat monitor parsing logic has run to run variability for parsing users | 1 |
716,707 | 24,644,863,289 | IssuesEvent | 2022-10-17 14:12:54 | jellywallet/extension | https://api.github.com/repos/jellywallet/extension | closed | Check DFX staking prerequisites | Task: Feature Priority: High | There are two prerequisite to do staking with DFX:
- One buy or sell transactions completed
- KYC process completed
On the staking page:
- #17
- #14
If all the prerequisites are met show the regular staking page. | 1.0 | Check DFX staking prerequisites - There are two prerequisite to do staking with DFX:
- One buy or sell transactions completed
- KYC process completed
On the staking page:
- #17
- #14
If all the prerequisites are met show the regular staking page. | priority | check dfx staking prerequisites there are two prerequisite to do staking with dfx one buy or sell transactions completed kyc process completed on the staking page if all the prerequisites are met show the regular staking page | 1 |
28,188 | 6,964,040,182 | IssuesEvent | 2017-12-08 19:53:57 | dotnet/coreclr | https://api.github.com/repos/dotnet/coreclr | opened | JIT: x86 inconsistent behavior for overly long long shifts | area-CodeGen bug | Test cases added for #15291 and #15319 are failing on x86 because the behavior of overly long left shifts is inconsistent, depending on whether the jit optimizes or not.
The 15291 test is asserting that two different ways of shifting 1LL by 64 and then casting to Int32 give the same result.
In the first case the compiler can fold the shift. RyuJit's `gtFoldExprConst` uses modulo logic here, so
```
1LL << 64 ==> 1 << 0 ==> 1
```
In the second case the shift amount is not visible to the jit, so it emits code to call `CORINFO_HELP_LLSH`. This is an assembly language helper:
```asm
JIT_LLsh PROC
; Handle shifts of between bits 0 and 31
cmp ecx, 32
jae short LLshMORE32
shld edx,eax,cl
shl eax,cl
ret
; Handle shifts of between bits 32 and 63
LLshMORE32:
; The x86 shift instructions only use the lower 5 bits.
mov edx,eax
xor eax,eax
shl edx,cl
ret
```
This gets called with eax=0x1 and ecx=0x20. It jumps to the second case. This forms 0x1:0x0 in edx:eax, then shifts edx by 64 (mod 32) == 0. So result is 0x1:0x0,.
Jit then uses eax as the result, so gets 0.
So the jit helper is also not handling the >= 64 case the same way the jit is handling it. Possibly it should be changed to conform:
```asm
JIT_LLsh PROC
; Reduce shift amount mod 64
and ecx, 63
; Handle shifts of between bits 0 and 31
cmp ecx, 32
jae short LLshMORE32
shld edx,eax,cl
shl eax,cl
ret
; Handle shifts of between bits 32 and 63
LLshMORE32:
; The x86 shift instructions only use the lower 5 bits.
mov edx,eax
xor eax,eax
shl edx,cl
ret
```
Since C# puts a mod 64 in the IL this kind of behavior requires IL or some other language to observe. | 1.0 | JIT: x86 inconsistent behavior for overly long long shifts - Test cases added for #15291 and #15319 are failing on x86 because the behavior of overly long left shifts is inconsistent, depending on whether the jit optimizes or not.
The 15291 test is asserting that two different ways of shifting 1LL by 64 and then casting to Int32 give the same result.
In the first case the compiler can fold the shift. RyuJit's `gtFoldExprConst` uses modulo logic here, so
```
1LL << 64 ==> 1 << 0 ==> 1
```
In the second case the shift amount is not visible to the jit, so it emits code to call `CORINFO_HELP_LLSH`. This is an assembly language helper:
```asm
JIT_LLsh PROC
; Handle shifts of between bits 0 and 31
cmp ecx, 32
jae short LLshMORE32
shld edx,eax,cl
shl eax,cl
ret
; Handle shifts of between bits 32 and 63
LLshMORE32:
; The x86 shift instructions only use the lower 5 bits.
mov edx,eax
xor eax,eax
shl edx,cl
ret
```
This gets called with eax=0x1 and ecx=0x20. It jumps to the second case. This forms 0x1:0x0 in edx:eax, then shifts edx by 64 (mod 32) == 0. So result is 0x1:0x0,.
Jit then uses eax as the result, so gets 0.
So the jit helper is also not handling the >= 64 case the same way the jit is handling it. Possibly it should be changed to conform:
```asm
JIT_LLsh PROC
; Reduce shift amount mod 64
and ecx, 63
; Handle shifts of between bits 0 and 31
cmp ecx, 32
jae short LLshMORE32
shld edx,eax,cl
shl eax,cl
ret
; Handle shifts of between bits 32 and 63
LLshMORE32:
; The x86 shift instructions only use the lower 5 bits.
mov edx,eax
xor eax,eax
shl edx,cl
ret
```
Since C# puts a mod 64 in the IL this kind of behavior requires IL or some other language to observe. | non_priority | jit inconsistent behavior for overly long long shifts test cases added for and are failing on because the behavior of overly long left shifts is inconsistent depending on whether the jit optimizes or not the test is asserting that two different ways of shifting by and then casting to give the same result in the first case the compiler can fold the shift ryujit s gtfoldexprconst uses modulo logic here so in the second case the shift amount is not visible to the jit so it emits code to call corinfo help llsh this is an assembly language helper asm jit llsh proc handle shifts of between bits and cmp ecx jae short shld edx eax cl shl eax cl ret handle shifts of between bits and the shift instructions only use the lower bits mov edx eax xor eax eax shl edx cl ret this gets called with eax and ecx it jumps to the second case this forms in edx eax then shifts edx by mod so result is jit then uses eax as the result so gets so the jit helper is also not handling the case the same way the jit is handling it possibly it should be changed to conform asm jit llsh proc reduce shift amount mod and ecx handle shifts of between bits and cmp ecx jae short shld edx eax cl shl eax cl ret handle shifts of between bits and the shift instructions only use the lower bits mov edx eax xor eax eax shl edx cl ret since c puts a mod in the il this kind of behavior requires il or some other language to observe | 0 |
302,304 | 26,138,658,677 | IssuesEvent | 2022-12-29 15:18:58 | oeg-upm/yarrrml-translator | https://api.github.com/repos/oeg-upm/yarrrml-translator | closed | Systematic testing | testing | Use Pytest and the current mappings in the folder test, to systematically test the engine.
| 1.0 | Systematic testing - Use Pytest and the current mappings in the folder test, to systematically test the engine.
| non_priority | systematic testing use pytest and the current mappings in the folder test to systematically test the engine | 0 |
706,803 | 24,284,237,170 | IssuesEvent | 2022-09-28 20:20:45 | Betarena/scores | https://api.github.com/repos/Betarena/scores | closed | Populate seasons from 21/22 Historic Fixtures | enhancement high priority | We will populate the data for the games widget (21/22). Populate the data of all seasons for those years.
This data will not use the cache to be visualized because it is sporadically accessed and does not justify using the upstash.
Using this logic, we should create the following method:
Only `current_seasons` from the `historic_fixtures` endpoint are added to the cache to Upstash. All others will not be added. | 1.0 | Populate seasons from 21/22 Historic Fixtures - We will populate the data for the games widget (21/22). Populate the data of all seasons for those years.
This data will not use the cache to be visualized because it is sporadically accessed and does not justify using the upstash.
Using this logic, we should create the following method:
Only `current_seasons` from the `historic_fixtures` endpoint are added to the cache to Upstash. All others will not be added. | priority | populate seasons from historic fixtures we will populate the data for the games widget populate the data of all seasons for those years this data will not use the cache to be visualized because it is sporadically accessed and does not justify using the upstash using this logic we should create the following method only current seasons from the historic fixtures endpoint are added to the cache to upstash all others will not be added | 1 |
620,310 | 19,558,800,692 | IssuesEvent | 2022-01-03 13:32:22 | bounswe/2021SpringGroup1 | https://api.github.com/repos/bounswe/2021SpringGroup1 | closed | Planning on implementing privacy measures | Type: Research Priority: Medium Status: In Progress Platform: Backend | There exists a privacy setting for the current community models. However, we need to change our backend API to implement robust privacy measures. There is a built-in [Permission](https://www.django-rest-framework.org/api-guide/permissions/) module in REST framework that could be useful. We also need to discuss and flesh out requirements based on privacy before implementation. | 1.0 | Planning on implementing privacy measures - There exists a privacy setting for the current community models. However, we need to change our backend API to implement robust privacy measures. There is a built-in [Permission](https://www.django-rest-framework.org/api-guide/permissions/) module in REST framework that could be useful. We also need to discuss and flesh out requirements based on privacy before implementation. | priority | planning on implementing privacy measures there exists a privacy setting for the current community models however we need to change our backend api to implement robust privacy measures there is a built in module in rest framework that could be useful we also need to discuss and flesh out requirements based on privacy before implementation | 1 |
20,116 | 4,500,683,936 | IssuesEvent | 2016-09-01 06:18:57 | google/protobuf | https://api.github.com/repos/google/protobuf | opened | Regenerate C# API documentation | c# documentation | The docs at https://developers.google.com/protocol-buffers/docs/reference/csharp/ are slightly out of date. (Not by much - the public API hasn't changed very much.) We should regenerate them. | 1.0 | Regenerate C# API documentation - The docs at https://developers.google.com/protocol-buffers/docs/reference/csharp/ are slightly out of date. (Not by much - the public API hasn't changed very much.) We should regenerate them. | non_priority | regenerate c api documentation the docs at are slightly out of date not by much the public api hasn t changed very much we should regenerate them | 0 |
1,705 | 2,603,969,814 | IssuesEvent | 2015-02-24 18:59:58 | chrsmith/nishazi6 | https://api.github.com/repos/chrsmith/nishazi6 | opened | 沈阳阴茎长疙瘩怎么回事 | auto-migrated Priority-Medium Type-Defect | ```
沈阳阴茎长疙瘩怎么回事〓沈陽軍區政治部醫院性病〓TEL:02
4-31023308〓成立于1946年,68年專注于性傳播疾病的研究和治療�
��位于沈陽市沈河區二緯路32號。是一所與新中國同建立共輝�
��的歷史悠久、設備精良、技術權威、專家云集,是預防、保
健、醫療、科研康復為一體的綜合性醫院。是國家首批公立��
�等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學�
��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍
空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集��
�二等功。
```
-----
Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 7:24 | 1.0 | 沈阳阴茎长疙瘩怎么回事 - ```
沈阳阴茎长疙瘩怎么回事〓沈陽軍區政治部醫院性病〓TEL:02
4-31023308〓成立于1946年,68年專注于性傳播疾病的研究和治療�
��位于沈陽市沈河區二緯路32號。是一所與新中國同建立共輝�
��的歷史悠久、設備精良、技術權威、專家云集,是預防、保
健、醫療、科研康復為一體的綜合性醫院。是國家首批公立��
�等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學�
��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍
空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集��
�二等功。
```
-----
Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 7:24 | non_priority | 沈阳阴茎长疙瘩怎么回事 沈阳阴茎长疙瘩怎么回事〓沈陽軍區政治部醫院性病〓tel: 〓 , � �� 。是一所與新中國同建立共輝� ��的歷史悠久、設備精良、技術權威、專家云集,是預防、保 健、醫療、科研康復為一體的綜合性醫院。是國家首批公立�� �等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學� ��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍 空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集�� �二等功。 original issue reported on code google com by gmail com on jun at | 0 |
171,630 | 14,334,089,112 | IssuesEvent | 2020-11-27 07:25:15 | Huy-Ngo/skin-crawler | https://api.github.com/repos/Huy-Ngo/skin-crawler | opened | Tutorial report | documentation | 
# Skin cancer image crawler
>List of the members.
## 1 Introduction
>Maybe paraphrase the task.
## 2 Crawler
### 2.1 Crawler workflow
>Describe how and where we crawl the datasets
>Describe how the crawled datasets are given to the users.
>Describe how we link everything togethers
#### 2.1.1 Crawler's backend
>Paraphrase/copy the whole modules documentations.
#### 2.1.2 Crawler's frontend
#### 2.1.3 Crawler's linker
>Describe the file that link everything. `app.py`
## 3 Datasets
### 3.1 Kaggle
### 3.2 ISIC
### 3.3 Yandex
### 3.4 Wikimedia
## 4 Interface
>What can user do with the web app
| 1.0 | Tutorial report - 
# Skin cancer image crawler
>List of the members.
## 1 Introduction
>Maybe paraphrase the task.
## 2 Crawler
### 2.1 Crawler workflow
>Describe how and where we crawl the datasets
>Describe how the crawled datasets are given to the users.
>Describe how we link everything togethers
#### 2.1.1 Crawler's backend
>Paraphrase/copy the whole modules documentations.
#### 2.1.2 Crawler's frontend
#### 2.1.3 Crawler's linker
>Describe the file that link everything. `app.py`
## 3 Datasets
### 3.1 Kaggle
### 3.2 ISIC
### 3.3 Yandex
### 3.4 Wikimedia
## 4 Interface
>What can user do with the web app
| non_priority | tutorial report skin cancer image crawler list of the members introduction maybe paraphrase the task crawler crawler workflow describe how and where we crawl the datasets describe how the crawled datasets are given to the users describe how we link everything togethers crawler s backend paraphrase copy the whole modules documentations crawler s frontend crawler s linker describe the file that link everything app py datasets kaggle isic yandex wikimedia interface what can user do with the web app | 0 |
509,016 | 14,710,734,339 | IssuesEvent | 2021-01-05 05:57:30 | StrangeLoopGames/EcoIssues | https://api.github.com/repos/StrangeLoopGames/EcoIssues | opened | Linking Steam to SLG doesn't work for a user | Category: Accounts Priority: Medium | `Doesnt link slg and steam account. Writes You do not own Eco, while the game was bought on Steam several years ago. I would like to link and change the icon. User ID: slg187377 Steam ID: STEAM_0:0:29674335 (SteamID64: 76561198019614398)` | 1.0 | Linking Steam to SLG doesn't work for a user - `Doesnt link slg and steam account. Writes You do not own Eco, while the game was bought on Steam several years ago. I would like to link and change the icon. User ID: slg187377 Steam ID: STEAM_0:0:29674335 (SteamID64: 76561198019614398)` | priority | linking steam to slg doesn t work for a user doesnt link slg and steam account writes you do not own eco while the game was bought on steam several years ago i would like to link and change the icon user id steam id steam | 1 |
50,439 | 13,529,187,533 | IssuesEvent | 2020-09-15 17:53:33 | Agoric/SES-shim | https://api.github.com/repos/Agoric/SES-shim | closed | Document limitation: `evaluate` leaks scopeProxy as `this` | security | Referencing https://github.com/tc39/proposal-realms/issues/173 from @erights:
See related https://github.com/tc39/proposal-realms/issues/171 https://github.com/tc39/proposal-realms/issues/172
All the own property names on the safeGlobal that are non-configurable, non-writable data properties are candidates for including in the optimizer's list of optimized variable name lookups. These names are looked up on the scopeProxy before the normal call to direct eval.
If the user could somehow install an accessor property that is looked up during this lookup, the getter might dereference a free variable "eval". This might trigger the scopeHander's "provide unsafeEval the first time" logic, enabling unsafeEval to be captured by that free variable lookup.
| True | Document limitation: `evaluate` leaks scopeProxy as `this` - Referencing https://github.com/tc39/proposal-realms/issues/173 from @erights:
See related https://github.com/tc39/proposal-realms/issues/171 https://github.com/tc39/proposal-realms/issues/172
All the own property names on the safeGlobal that are non-configurable, non-writable data properties are candidates for including in the optimizer's list of optimized variable name lookups. These names are looked up on the scopeProxy before the normal call to direct eval.
If the user could somehow install an accessor property that is looked up during this lookup, the getter might dereference a free variable "eval". This might trigger the scopeHander's "provide unsafeEval the first time" logic, enabling unsafeEval to be captured by that free variable lookup.
| non_priority | document limitation evaluate leaks scopeproxy as this referencing from erights see related all the own property names on the safeglobal that are non configurable non writable data properties are candidates for including in the optimizer s list of optimized variable name lookups these names are looked up on the scopeproxy before the normal call to direct eval if the user could somehow install an accessor property that is looked up during this lookup the getter might dereference a free variable eval this might trigger the scopehander s provide unsafeeval the first time logic enabling unsafeeval to be captured by that free variable lookup | 0 |
493,088 | 14,225,917,209 | IssuesEvent | 2020-11-17 22:03:10 | internetarchive/openlibrary | https://api.github.com/repos/internetarchive/openlibrary | closed | Schema.org tags for authors | Good First Issue Lead: @tabshaikh Needs: Help Priority: 2 Theme: Distribution Theme: SEO Type: Feature Request hacktoberfest | <!-- What problem are we solving? What does the experience look like today? What are the symptoms? -->
When we search for **books by \<name\>** [https://www.google.com/search?q=books+by+mark+twain+openlibrary&oq=books+by+mark+twain+openlibrary](https://www.google.com/search?q=books+by+mark+twain+openlibrary&oq=books+by+mark+twain+openlibrary) we are shown a search result as shown below but the author does not have schema markup so my proposal is to add `person` schema.org tag to the author.
***Opportunity:*** It could have search engine consequences for 8 million of our author pages.
@tfmorris:
As @seabelis pointed out on Slack, not all authors are people, but we can probably safely tag anyone with a birth or death date. In addition to Person.birthDate and Person.deathDate, other markup which could be added includes Thing.alternateName for each of the AKAs, Thing.sameAs to link to Wikidata.
The works on the page are already tagged as schema.org Books, but they could additionally be decorated with CreativeWork.author, CreativeWork.about (ie subjects), CreativeWork.publication, CreativeWork.inLanguage, etc.

### Stakeholders
<!-- @ tag stakeholders of this bug -->
@tabshaikh | 1.0 | Schema.org tags for authors - <!-- What problem are we solving? What does the experience look like today? What are the symptoms? -->
When we search for **books by \<name\>** [https://www.google.com/search?q=books+by+mark+twain+openlibrary&oq=books+by+mark+twain+openlibrary](https://www.google.com/search?q=books+by+mark+twain+openlibrary&oq=books+by+mark+twain+openlibrary) we are shown a search result as shown below but the author does not have schema markup so my proposal is to add `person` schema.org tag to the author.
***Opportunity:*** It could have search engine consequences for 8 million of our author pages.
@tfmorris:
As @seabelis pointed out on Slack, not all authors are people, but we can probably safely tag anyone with a birth or death date. In addition to Person.birthDate and Person.deathDate, other markup which could be added includes Thing.alternateName for each of the AKAs, Thing.sameAs to link to Wikidata.
The works on the page are already tagged as schema.org Books, but they could additionally be decorated with CreativeWork.author, CreativeWork.about (ie subjects), CreativeWork.publication, CreativeWork.inLanguage, etc.

### Stakeholders
<!-- @ tag stakeholders of this bug -->
@tabshaikh | priority | schema org tags for authors when we search for books by we are shown a search result as shown below but the author does not have schema markup so my proposal is to add person schema org tag to the author opportunity it could have search engine consequences for million of our author pages tfmorris as seabelis pointed out on slack not all authors are people but we can probably safely tag anyone with a birth or death date in addition to person birthdate and person deathdate other markup which could be added includes thing alternatename for each of the akas thing sameas to link to wikidata the works on the page are already tagged as schema org books but they could additionally be decorated with creativework author creativework about ie subjects creativework publication creativework inlanguage etc stakeholders tabshaikh | 1 |
203,345 | 15,878,733,501 | IssuesEvent | 2021-04-09 11:27:30 | haxor-music/hxr-jam-live-11-public | https://api.github.com/repos/haxor-music/hxr-jam-live-11-public | closed | Improve Documentation for r1.0 | documentation | Improve documentation at Wiki for the release 1.0
- [x] install instructions
- [x] screenshots
- [x] LoadMode configuration | 1.0 | Improve Documentation for r1.0 - Improve documentation at Wiki for the release 1.0
- [x] install instructions
- [x] screenshots
- [x] LoadMode configuration | non_priority | improve documentation for improve documentation at wiki for the release install instructions screenshots loadmode configuration | 0 |
116,747 | 4,706,054,579 | IssuesEvent | 2016-10-13 16:03:09 | zom/Zom-iOS | https://api.github.com/repos/zom/Zom-iOS | opened | Make iMessage sticker pack! | high-priority | For Olo:
Yay!
Prayer
Eating (with tea)
Flower
Love
For Pema:
Tashi Delek
Cool
Don't Worry
Thank you
Sleeping
| 1.0 | Make iMessage sticker pack! - For Olo:
Yay!
Prayer
Eating (with tea)
Flower
Love
For Pema:
Tashi Delek
Cool
Don't Worry
Thank you
Sleeping
| priority | make imessage sticker pack for olo yay prayer eating with tea flower love for pema tashi delek cool don t worry thank you sleeping | 1 |
179,410 | 6,624,941,379 | IssuesEvent | 2017-09-22 13:46:00 | pmem/issues | https://api.github.com/repos/pmem/issues | closed | pmembench : removing directory fail | Exposure: Low OS: Linux Priority: 4 low State: To be verified Type: Bug | When trying to remove directory at the begging of scenario, an error is being printed:
removing file failed: No such file or directory
It is because a file name isn't zeroed in util_file_dir_next function, just overwritten by the new one. It causes that when on the list of subfolders are "." and "..", the second one is replaced by "..." which is treated as an unknown file.
Solution is to zero file name before strcat function. | 1.0 | pmembench : removing directory fail - When trying to remove directory at the begging of scenario, an error is being printed:
removing file failed: No such file or directory
It is because a file name isn't zeroed in util_file_dir_next function, just overwritten by the new one. It causes that when on the list of subfolders are "." and "..", the second one is replaced by "..." which is treated as an unknown file.
Solution is to zero file name before strcat function. | priority | pmembench removing directory fail when trying to remove directory at the begging of scenario an error is being printed removing file failed no such file or directory it is because a file name isn t zeroed in util file dir next function just overwritten by the new one it causes that when on the list of subfolders are and the second one is replaced by which is treated as an unknown file solution is to zero file name before strcat function | 1 |
590,260 | 17,775,171,757 | IssuesEvent | 2021-08-30 18:14:10 | literakl/mezinamiridici | https://api.github.com/repos/literakl/mezinamiridici | opened | Images revisited | type: enhancement priority: P2 | Uploaded pictures shall have a caption and author attributes.

The original picture must be preserved and new optimized pictures shall be generated for srcset attribute. Maybe webp format if it is widespread now? Largest served picture must be Full HD dimension under 3 MB. | 1.0 | Images revisited - Uploaded pictures shall have a caption and author attributes.

The original picture must be preserved and new optimized pictures shall be generated for srcset attribute. Maybe webp format if it is widespread now? Largest served picture must be Full HD dimension under 3 MB. | priority | images revisited uploaded pictures shall have a caption and author attributes the original picture must be preserved and new optimized pictures shall be generated for srcset attribute maybe webp format if it is widespread now largest served picture must be full hd dimension under mb | 1 |
103,997 | 22,552,185,200 | IssuesEvent | 2022-06-27 06:59:52 | dart-lang/site-www | https://api.github.com/repos/dart-lang/site-www | closed | Add null-aware operators to Null safety codelab | p1-high codelabs e1-hours e2-days null-safety | ### Page URL
https://dart.dev/codelabs/null-safety.html
### Page source
https://github.com/dart-lang/site-www/tree/main/src/codelabs/null-safety.md
### Describe the problem
Now that null safety has been out for a while, this codelab is more useful as a whole when understanding handling `null` values as a whole. We have the new strategies for dealing with `null` but not the preexisting ones, such as `??`, `??=`, and `?.`
### Expected fix
We should add some basic introductory sections and exercises to these operators so people can build a complete picture of null safety.
### Additional context
_No response_ | 1.0 | Add null-aware operators to Null safety codelab - ### Page URL
https://dart.dev/codelabs/null-safety.html
### Page source
https://github.com/dart-lang/site-www/tree/main/src/codelabs/null-safety.md
### Describe the problem
Now that null safety has been out for a while, this codelab is more useful as a whole when understanding handling `null` values as a whole. We have the new strategies for dealing with `null` but not the preexisting ones, such as `??`, `??=`, and `?.`
### Expected fix
We should add some basic introductory sections and exercises to these operators so people can build a complete picture of null safety.
### Additional context
_No response_ | non_priority | add null aware operators to null safety codelab page url page source describe the problem now that null safety has been out for a while this codelab is more useful as a whole when understanding handling null values as a whole we have the new strategies for dealing with null but not the preexisting ones such as and expected fix we should add some basic introductory sections and exercises to these operators so people can build a complete picture of null safety additional context no response | 0 |
106,504 | 16,680,908,855 | IssuesEvent | 2021-06-07 23:33:04 | NuGet/NuGetGallery | https://api.github.com/repos/NuGet/NuGetGallery | closed | Determine delta re WhiteSource vs GitHub vulnerabilities, ascertain priority of including WhiteSource | Area: Security Pillar: Security | We don't see https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1469 in GitHub. How many others are there, and how many apply to NuGet.org packages? | True | Determine delta re WhiteSource vs GitHub vulnerabilities, ascertain priority of including WhiteSource - We don't see https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1469 in GitHub. How many others are there, and how many apply to NuGet.org packages? | non_priority | determine delta re whitesource vs github vulnerabilities ascertain priority of including whitesource we don t see in github how many others are there and how many apply to nuget org packages | 0 |
57,077 | 11,707,994,534 | IssuesEvent | 2020-03-08 10:28:41 | KMRNicholson/nsld | https://api.github.com/repos/KMRNicholson/nsld | closed | Create Add/Edit/Del Meal View and Functionality | code-behind ui | Add a page for adding a meal to the current day, with the associated functionality for doing so.
Criteria:
- Meals will require the user to enter a name for the meal. | 1.0 | Create Add/Edit/Del Meal View and Functionality - Add a page for adding a meal to the current day, with the associated functionality for doing so.
Criteria:
- Meals will require the user to enter a name for the meal. | non_priority | create add edit del meal view and functionality add a page for adding a meal to the current day with the associated functionality for doing so criteria meals will require the user to enter a name for the meal | 0 |
763,212 | 26,747,519,973 | IssuesEvent | 2023-01-30 16:59:54 | MarketSquare/robotframework-browser | https://api.github.com/repos/MarketSquare/robotframework-browser | closed | [Bug] Get code completion for LibraryComponent.library does not work correctly | bug priority: medium | this is just a notice from RoboCon
If I rename__init__.pyi to browser.pyi it works for VSCode. | 1.0 | [Bug] Get code completion for LibraryComponent.library does not work correctly - this is just a notice from RoboCon
If I rename__init__.pyi to browser.pyi it works for VSCode. | priority | get code completion for librarycomponent library does not work correctly this is just a notice from robocon if i rename init pyi to browser pyi it works for vscode | 1 |
287,779 | 8,820,319,976 | IssuesEvent | 2019-01-01 10:57:11 | TwinePlatform/twine-visitor | https://api.github.com/repos/TwinePlatform/twine-visitor | closed | Layout issues on visits page using Firefox | bug priority-5 | I don't think this needs to be addressed in this sprint as we need to talk to PO to discuss what browsers/devices we are building for. Keeping this in an issue for future reference:
Layout for visits page is currently broken on firefox developer edition:
<img width="1022" alt="screen shot 2018-04-05 at 9 34 22 am" src="https://user-images.githubusercontent.com/14337958/38355159-b8117a7a-38c4-11e8-9fa8-5b80e0cd2ef6.png">
| 1.0 | Layout issues on visits page using Firefox - I don't think this needs to be addressed in this sprint as we need to talk to PO to discuss what browsers/devices we are building for. Keeping this in an issue for future reference:
Layout for visits page is currently broken on firefox developer edition:
<img width="1022" alt="screen shot 2018-04-05 at 9 34 22 am" src="https://user-images.githubusercontent.com/14337958/38355159-b8117a7a-38c4-11e8-9fa8-5b80e0cd2ef6.png">
| priority | layout issues on visits page using firefox i don t think this needs to be addressed in this sprint as we need to talk to po to discuss what browsers devices we are building for keeping this in an issue for future reference layout for visits page is currently broken on firefox developer edition img width alt screen shot at am src | 1 |
696,108 | 23,885,013,774 | IssuesEvent | 2022-09-08 06:52:49 | DroidKaigi/conference-app-2022 | https://api.github.com/repos/DroidKaigi/conference-app-2022 | closed | add TagsLine in session detail Screen | welcome contribute high priority | **Idea Description**
use KaigiTag slot api
**Reference images and links**
Design
<img src="https://user-images.githubusercontent.com/60292683/188349438-4aacd5c9-aded-4be8-a9e4-48d00ff64dd8.png" width="300" >
Current app
<img width="382" alt="image" src="https://user-images.githubusercontent.com/1386930/188361924-415feb15-db3e-4fca-9210-fecb4697ff72.png">
Design Kit
https://www.figma.com/file/XsVzpDZSkEQANgCZLRTDDy/DroidKaigi-2022-Material-3-Design-Kit?node-id=11%3A1833
App Design
https://www.figma.com/file/NcSMs6dMsD88d4wOY0g3rK/DroidKaigi-2022-Conference-App?node-id=0%3A1 | 1.0 | add TagsLine in session detail Screen - **Idea Description**
use KaigiTag slot api
**Reference images and links**
Design
<img src="https://user-images.githubusercontent.com/60292683/188349438-4aacd5c9-aded-4be8-a9e4-48d00ff64dd8.png" width="300" >
Current app
<img width="382" alt="image" src="https://user-images.githubusercontent.com/1386930/188361924-415feb15-db3e-4fca-9210-fecb4697ff72.png">
Design Kit
https://www.figma.com/file/XsVzpDZSkEQANgCZLRTDDy/DroidKaigi-2022-Material-3-Design-Kit?node-id=11%3A1833
App Design
https://www.figma.com/file/NcSMs6dMsD88d4wOY0g3rK/DroidKaigi-2022-Conference-App?node-id=0%3A1 | priority | add tagsline in session detail screen idea description use kaigitag slot api reference images and links design current app img width alt image src design kit app design | 1 |
331,651 | 29,044,895,587 | IssuesEvent | 2023-05-13 12:34:02 | elastic/kibana | https://api.github.com/repos/elastic/kibana | closed | Failing test: X-Pack Case API Integration Tests.x-pack/test/cases_api_integration/security_and_spaces/tests/common/comments/delete_comment·ts - cases security and spaces enabled: basic Common delete_comment happy path should delete a comment | failed-test Team:ResponseOps | A test failed on a tracked branch
```
Error: expected 200 "OK", got 403 "Forbidden"
at Test._assertStatus (node_modules/supertest/lib/test.js:268:12)
at Test._assertFunction (node_modules/supertest/lib/test.js:283:11)
at Test.assert (node_modules/supertest/lib/test.js:173:18)
at localAssert (node_modules/supertest/lib/test.js:131:12)
at /home/buildkite-agent/builds/kb-n2-4-spot-0ad5b54f22e77b43/elastic/kibana-on-merge/kibana/node_modules/supertest/lib/test.js:128:5
at Test.Request.callback (node_modules/superagent/lib/node/index.js:728:3)
at /home/buildkite-agent/builds/kb-n2-4-spot-0ad5b54f22e77b43/elastic/kibana-on-merge/kibana/node_modules/superagent/lib/node/index.js:916:18
at IncomingMessage.<anonymous> (node_modules/superagent/lib/node/parsers/json.js:19:7)
at IncomingMessage.emit (node:events:525:35)
at endReadableNT (node:internal/streams/readable:1358:12)
at processTicksAndRejections (node:internal/process/task_queues:83:21)
```
First failure: [CI Build - 8.8](https://buildkite.com/elastic/kibana-on-merge/builds/30378#01881150-c3cf-46cc-8e12-e81979b28f55)
<!-- kibanaCiData = {"failed-test":{"test.class":"X-Pack Case API Integration Tests.x-pack/test/cases_api_integration/security_and_spaces/tests/common/comments/delete_comment·ts","test.name":"cases security and spaces enabled: basic Common delete_comment happy path should delete a comment","test.failCount":2}} --> | 1.0 | Failing test: X-Pack Case API Integration Tests.x-pack/test/cases_api_integration/security_and_spaces/tests/common/comments/delete_comment·ts - cases security and spaces enabled: basic Common delete_comment happy path should delete a comment - A test failed on a tracked branch
```
Error: expected 200 "OK", got 403 "Forbidden"
at Test._assertStatus (node_modules/supertest/lib/test.js:268:12)
at Test._assertFunction (node_modules/supertest/lib/test.js:283:11)
at Test.assert (node_modules/supertest/lib/test.js:173:18)
at localAssert (node_modules/supertest/lib/test.js:131:12)
at /home/buildkite-agent/builds/kb-n2-4-spot-0ad5b54f22e77b43/elastic/kibana-on-merge/kibana/node_modules/supertest/lib/test.js:128:5
at Test.Request.callback (node_modules/superagent/lib/node/index.js:728:3)
at /home/buildkite-agent/builds/kb-n2-4-spot-0ad5b54f22e77b43/elastic/kibana-on-merge/kibana/node_modules/superagent/lib/node/index.js:916:18
at IncomingMessage.<anonymous> (node_modules/superagent/lib/node/parsers/json.js:19:7)
at IncomingMessage.emit (node:events:525:35)
at endReadableNT (node:internal/streams/readable:1358:12)
at processTicksAndRejections (node:internal/process/task_queues:83:21)
```
First failure: [CI Build - 8.8](https://buildkite.com/elastic/kibana-on-merge/builds/30378#01881150-c3cf-46cc-8e12-e81979b28f55)
<!-- kibanaCiData = {"failed-test":{"test.class":"X-Pack Case API Integration Tests.x-pack/test/cases_api_integration/security_and_spaces/tests/common/comments/delete_comment·ts","test.name":"cases security and spaces enabled: basic Common delete_comment happy path should delete a comment","test.failCount":2}} --> | non_priority | failing test x pack case api integration tests x pack test cases api integration security and spaces tests common comments delete comment·ts cases security and spaces enabled basic common delete comment happy path should delete a comment a test failed on a tracked branch error expected ok got forbidden at test assertstatus node modules supertest lib test js at test assertfunction node modules supertest lib test js at test assert node modules supertest lib test js at localassert node modules supertest lib test js at home buildkite agent builds kb spot elastic kibana on merge kibana node modules supertest lib test js at test request callback node modules superagent lib node index js at home buildkite agent builds kb spot elastic kibana on merge kibana node modules superagent lib node index js at incomingmessage node modules superagent lib node parsers json js at incomingmessage emit node events at endreadablent node internal streams readable at processticksandrejections node internal process task queues first failure | 0 |
779,488 | 27,354,556,123 | IssuesEvent | 2023-02-27 11:57:37 | NFT-Limited/nf-bugs | https://api.github.com/repos/NFT-Limited/nf-bugs | opened | [FEATURE REQUEST] Hide onXRP preminted NFTs | feature request Priority 2 | **Is your feature request related to a problem? Please describe.**
If onXRP pre-mints the collection, it's becoming available in the app with broken data.

**Describe the solution you'd like**
Hide the pre-minted NFTs or move them to the end of the view list.
**Describe alternatives you've considered**
Here are a few examples of NFTs that's been pre-minted:
000817026AA186E4C4BA5E7FCAAFEE2914A5161AF286090E9C2868B100000012
000817026AA186E4C4BA5E7FCAAFEE2914A5161AF286090E216B4FA200000023
000817026AA186E4C4BA5E7FCAAFEE2914A5161AF286090E42D7FCFD00000046
**Additional context**
Add any other context or screenshots about the feature request here.
| 1.0 | [FEATURE REQUEST] Hide onXRP preminted NFTs - **Is your feature request related to a problem? Please describe.**
If onXRP pre-mints the collection, it's becoming available in the app with broken data.

**Describe the solution you'd like**
Hide the pre-minted NFTs or move them to the end of the view list.
**Describe alternatives you've considered**
Here are a few examples of NFTs that's been pre-minted:
000817026AA186E4C4BA5E7FCAAFEE2914A5161AF286090E9C2868B100000012
000817026AA186E4C4BA5E7FCAAFEE2914A5161AF286090E216B4FA200000023
000817026AA186E4C4BA5E7FCAAFEE2914A5161AF286090E42D7FCFD00000046
**Additional context**
Add any other context or screenshots about the feature request here.
| priority | hide onxrp preminted nfts is your feature request related to a problem please describe if onxrp pre mints the collection it s becoming available in the app with broken data describe the solution you d like hide the pre minted nfts or move them to the end of the view list describe alternatives you ve considered here are a few examples of nfts that s been pre minted additional context add any other context or screenshots about the feature request here | 1 |
151,801 | 23,874,231,175 | IssuesEvent | 2022-09-07 17:25:09 | department-of-veterans-affairs/va.gov-team | https://api.github.com/repos/department-of-veterans-affairs/va.gov-team | opened | Multiple validation errors are not read out to screenreaders | triage needs-grooming vsp-design-system-team | ### User story(ies)
As a user of VA.gov navigating with a screenreader, I need to know when multiple fields have a validation error so I can correct all the problems with the form.
_Example: As a VFS developer, I need to be able to create a custom error message for the XYZ form, so that I can implement the unique error message content that has been approved via the VSP Collaboration Cycle._
### Additional details/notes/links
During a screenreader accessibility audit, we learned that when multiple form fields are in an error state, only the first validation error is announced to a screenreader. Is this a known issue with the form system, or something wrong with our specific implementation? This was seem on va.gov/profile/contact-information
### Acceptance criteria
Screenreader users should be able to hear all the validation errors on their forms.
### What type of issue is this?
- [x] Bug
- [ ] Request new feature
- [ ] Request update to existing feature
- [ ] Documentation change
- [ ] Other (please describe) | 1.0 | Multiple validation errors are not read out to screenreaders - ### User story(ies)
As a user of VA.gov navigating with a screenreader, I need to know when multiple fields have a validation error so I can correct all the problems with the form.
_Example: As a VFS developer, I need to be able to create a custom error message for the XYZ form, so that I can implement the unique error message content that has been approved via the VSP Collaboration Cycle._
### Additional details/notes/links
During a screenreader accessibility audit, we learned that when multiple form fields are in an error state, only the first validation error is announced to a screenreader. Is this a known issue with the form system, or something wrong with our specific implementation? This was seem on va.gov/profile/contact-information
### Acceptance criteria
Screenreader users should be able to hear all the validation errors on their forms.
### What type of issue is this?
- [x] Bug
- [ ] Request new feature
- [ ] Request update to existing feature
- [ ] Documentation change
- [ ] Other (please describe) | non_priority | multiple validation errors are not read out to screenreaders user story ies as a user of va gov navigating with a screenreader i need to know when multiple fields have a validation error so i can correct all the problems with the form example as a vfs developer i need to be able to create a custom error message for the xyz form so that i can implement the unique error message content that has been approved via the vsp collaboration cycle additional details notes links during a screenreader accessibility audit we learned that when multiple form fields are in an error state only the first validation error is announced to a screenreader is this a known issue with the form system or something wrong with our specific implementation this was seem on va gov profile contact information acceptance criteria screenreader users should be able to hear all the validation errors on their forms what type of issue is this bug request new feature request update to existing feature documentation change other please describe | 0 |
494,206 | 14,246,619,410 | IssuesEvent | 2020-11-19 10:18:42 | ballerina-platform/ballerina-lang | https://api.github.com/repos/ballerina-platform/ballerina-lang | closed | Class Cast Exception thrown from node transformer | Area/Parser Priority/Blocker SwanLakeDump Team/CompilerFE Type/Bug | **Description:**
Consider the following source snippet,
```
import ballerina/java;
public type TypeDescName
function foo(string filePath) {
string [] columnHeaders = [];
boolean testBool = true;
if (testBool) {
}
}
```
When tries to compile, this throws the following CCE,
```
Caused by: java.lang.ClassCastException: io.ballerinalang.compiler.syntax.tree.MappingBindingPatternNode cannot be cast to io.ballerinalang.compiler.syntax.tree.CaptureBindingPatternNode
at org.wso2.ballerinalang.compiler.parser.BLangNodeTransformer.transform(BLangNodeTransformer.java:545)
at org.wso2.ballerinalang.compiler.parser.BLangNodeTransformer.transform(BLangNodeTransformer.java:435)
at io.ballerinalang.compiler.syntax.tree.ModuleVariableDeclarationNode.apply(ModuleVariableDeclarationNode.java:67)
at org.wso2.ballerinalang.compiler.parser.BLangNodeTransformer.transform(BLangNodeTransformer.java:530)
at org.wso2.ballerinalang.compiler.parser.BLangNodeTransformer.transform(BLangNodeTransformer.java:435)
at io.ballerinalang.compiler.syntax.tree.ModulePartNode.apply(ModulePartNode.java:54)
at org.wso2.ballerinalang.compiler.parser.BLangNodeTransformer.accept(BLangNodeTransformer.java:460)
at org.wso2.ballerinalang.compiler.parser.Parser.generateCompilationUnitNew(Parser.java:126)
at org.wso2.ballerinalang.compiler.parser.Parser.parse(Parser.java:99)
at org.wso2.ballerinalang.compiler.PackageLoader.parse(PackageLoader.java:487)
at org.wso2.ballerinalang.compiler.PackageLoader.loadEntryPackage(PackageLoader.java:374)
at org.wso2.ballerinalang.compiler.Compiler.compilePackages(Compiler.java:166)
at org.wso2.ballerinalang.compiler.Compiler.compilePackages(Compiler.java:147)
at org.ballerinalang.langserver.compiler.LSModuleCompiler.compilePackagesSafe(LSModuleCompiler.java:279)
... 11 more
```
| 1.0 | Class Cast Exception thrown from node transformer - **Description:**
Consider the following source snippet,
```
import ballerina/java;
public type TypeDescName
function foo(string filePath) {
string [] columnHeaders = [];
boolean testBool = true;
if (testBool) {
}
}
```
When tries to compile, this throws the following CCE,
```
Caused by: java.lang.ClassCastException: io.ballerinalang.compiler.syntax.tree.MappingBindingPatternNode cannot be cast to io.ballerinalang.compiler.syntax.tree.CaptureBindingPatternNode
at org.wso2.ballerinalang.compiler.parser.BLangNodeTransformer.transform(BLangNodeTransformer.java:545)
at org.wso2.ballerinalang.compiler.parser.BLangNodeTransformer.transform(BLangNodeTransformer.java:435)
at io.ballerinalang.compiler.syntax.tree.ModuleVariableDeclarationNode.apply(ModuleVariableDeclarationNode.java:67)
at org.wso2.ballerinalang.compiler.parser.BLangNodeTransformer.transform(BLangNodeTransformer.java:530)
at org.wso2.ballerinalang.compiler.parser.BLangNodeTransformer.transform(BLangNodeTransformer.java:435)
at io.ballerinalang.compiler.syntax.tree.ModulePartNode.apply(ModulePartNode.java:54)
at org.wso2.ballerinalang.compiler.parser.BLangNodeTransformer.accept(BLangNodeTransformer.java:460)
at org.wso2.ballerinalang.compiler.parser.Parser.generateCompilationUnitNew(Parser.java:126)
at org.wso2.ballerinalang.compiler.parser.Parser.parse(Parser.java:99)
at org.wso2.ballerinalang.compiler.PackageLoader.parse(PackageLoader.java:487)
at org.wso2.ballerinalang.compiler.PackageLoader.loadEntryPackage(PackageLoader.java:374)
at org.wso2.ballerinalang.compiler.Compiler.compilePackages(Compiler.java:166)
at org.wso2.ballerinalang.compiler.Compiler.compilePackages(Compiler.java:147)
at org.ballerinalang.langserver.compiler.LSModuleCompiler.compilePackagesSafe(LSModuleCompiler.java:279)
... 11 more
```
| priority | class cast exception thrown from node transformer description consider the following source snippet import ballerina java public type typedescname function foo string filepath string columnheaders boolean testbool true if testbool when tries to compile this throws the following cce caused by java lang classcastexception io ballerinalang compiler syntax tree mappingbindingpatternnode cannot be cast to io ballerinalang compiler syntax tree capturebindingpatternnode at org ballerinalang compiler parser blangnodetransformer transform blangnodetransformer java at org ballerinalang compiler parser blangnodetransformer transform blangnodetransformer java at io ballerinalang compiler syntax tree modulevariabledeclarationnode apply modulevariabledeclarationnode java at org ballerinalang compiler parser blangnodetransformer transform blangnodetransformer java at org ballerinalang compiler parser blangnodetransformer transform blangnodetransformer java at io ballerinalang compiler syntax tree modulepartnode apply modulepartnode java at org ballerinalang compiler parser blangnodetransformer accept blangnodetransformer java at org ballerinalang compiler parser parser generatecompilationunitnew parser java at org ballerinalang compiler parser parser parse parser java at org ballerinalang compiler packageloader parse packageloader java at org ballerinalang compiler packageloader loadentrypackage packageloader java at org ballerinalang compiler compiler compilepackages compiler java at org ballerinalang compiler compiler compilepackages compiler java at org ballerinalang langserver compiler lsmodulecompiler compilepackagessafe lsmodulecompiler java more | 1 |
403,214 | 27,405,579,625 | IssuesEvent | 2023-03-01 06:23:14 | island-games/CommunityProject | https://api.github.com/repos/island-games/CommunityProject | opened | Main Story | documentation | We need someone to write a main story. The story must give the player a sense of purpose. This story does not need to be extremely detailed, biut at least do the following:
- Name an antagonist
- Give the player purpose for their adventure
- List notable NPCs the player will meet along the way
- Create a framework so quest can be written | 1.0 | Main Story - We need someone to write a main story. The story must give the player a sense of purpose. This story does not need to be extremely detailed, biut at least do the following:
- Name an antagonist
- Give the player purpose for their adventure
- List notable NPCs the player will meet along the way
- Create a framework so quest can be written | non_priority | main story we need someone to write a main story the story must give the player a sense of purpose this story does not need to be extremely detailed biut at least do the following name an antagonist give the player purpose for their adventure list notable npcs the player will meet along the way create a framework so quest can be written | 0 |
670,649 | 22,697,630,732 | IssuesEvent | 2022-07-05 07:47:55 | googleapis/python-spanner | https://api.github.com/repos/googleapis/python-spanner | closed | tests.system.test_dbapi: test_staleness failed | api: spanner type: bug priority: p2 flakybot: issue flakybot: flaky | This test failed!
To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot).
If I'm commenting on this issue too often, add the `flakybot: quiet` label and
I will stop commenting.
---
commit: 5d8b0558f43a3505f62f9a8eae4228c91c6f0ada
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/1cf3dcb8-f5ed-4566-b514-044a4c6a5022), [Sponge](http://sponge2/1cf3dcb8-f5ed-4566-b514-044a4c6a5022)
status: failed
<details><summary>Test output</summary><br><pre>shared_instance = <google.cloud.spanner_v1.instance.Instance object at 0x7fcdc7ceaf10>
dbapi_database = <google.cloud.spanner_v1.database.Database object at 0x7fcdc7c8ad30>
def test_staleness(shared_instance, dbapi_database):
"""Check the DB API `staleness` option."""
conn = Connection(shared_instance, dbapi_database)
cursor = conn.cursor()
before_insert = datetime.datetime.utcnow().replace(tzinfo=UTC)
cursor.execute(
"""
INSERT INTO contacts (contact_id, first_name, last_name, email)
VALUES (1, 'first-name', 'last-name', 'test.email@example.com')
"""
)
conn.commit()
conn.read_only = True
conn.staleness = {"read_timestamp": before_insert}
cursor.execute("SELECT * FROM contacts")
conn.commit()
> assert len(cursor.fetchall()) == 0
E AssertionError: assert 1 == 0
E + where 1 = len([(1, 'first-name', 'last-name', 'test.email@example.com')])
E + where [(1, 'first-name', 'last-name', 'test.email@example.com')] = <bound method check_not_closed.<locals>.wrapper of <google.cloud.spanner_dbapi.cursor.Cursor object at 0x7fcdc790fd00>>()
E + where <bound method check_not_closed.<locals>.wrapper of <google.cloud.spanner_dbapi.cursor.Cursor object at 0x7fcdc790fd00>> = <google.cloud.spanner_dbapi.cursor.Cursor object at 0x7fcdc790fd00>.fetchall
tests/system/test_dbapi.py:463: AssertionError</pre></details> | 1.0 | tests.system.test_dbapi: test_staleness failed - This test failed!
To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot).
If I'm commenting on this issue too often, add the `flakybot: quiet` label and
I will stop commenting.
---
commit: 5d8b0558f43a3505f62f9a8eae4228c91c6f0ada
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/1cf3dcb8-f5ed-4566-b514-044a4c6a5022), [Sponge](http://sponge2/1cf3dcb8-f5ed-4566-b514-044a4c6a5022)
status: failed
<details><summary>Test output</summary><br><pre>shared_instance = <google.cloud.spanner_v1.instance.Instance object at 0x7fcdc7ceaf10>
dbapi_database = <google.cloud.spanner_v1.database.Database object at 0x7fcdc7c8ad30>
def test_staleness(shared_instance, dbapi_database):
"""Check the DB API `staleness` option."""
conn = Connection(shared_instance, dbapi_database)
cursor = conn.cursor()
before_insert = datetime.datetime.utcnow().replace(tzinfo=UTC)
cursor.execute(
"""
INSERT INTO contacts (contact_id, first_name, last_name, email)
VALUES (1, 'first-name', 'last-name', 'test.email@example.com')
"""
)
conn.commit()
conn.read_only = True
conn.staleness = {"read_timestamp": before_insert}
cursor.execute("SELECT * FROM contacts")
conn.commit()
> assert len(cursor.fetchall()) == 0
E AssertionError: assert 1 == 0
E + where 1 = len([(1, 'first-name', 'last-name', 'test.email@example.com')])
E + where [(1, 'first-name', 'last-name', 'test.email@example.com')] = <bound method check_not_closed.<locals>.wrapper of <google.cloud.spanner_dbapi.cursor.Cursor object at 0x7fcdc790fd00>>()
E + where <bound method check_not_closed.<locals>.wrapper of <google.cloud.spanner_dbapi.cursor.Cursor object at 0x7fcdc790fd00>> = <google.cloud.spanner_dbapi.cursor.Cursor object at 0x7fcdc790fd00>.fetchall
tests/system/test_dbapi.py:463: AssertionError</pre></details> | priority | tests system test dbapi test staleness failed this test failed to configure my behavior see if i m commenting on this issue too often add the flakybot quiet label and i will stop commenting commit buildurl status failed test output shared instance dbapi database def test staleness shared instance dbapi database check the db api staleness option conn connection shared instance dbapi database cursor conn cursor before insert datetime datetime utcnow replace tzinfo utc cursor execute insert into contacts contact id first name last name email values first name last name test email example com conn commit conn read only true conn staleness read timestamp before insert cursor execute select from contacts conn commit assert len cursor fetchall e assertionerror assert e where len e where wrapper of e where wrapper of fetchall tests system test dbapi py assertionerror | 1 |
8,455 | 5,716,641,441 | IssuesEvent | 2017-04-19 15:32:11 | edoddridge/aronnax | https://api.github.com/repos/edoddridge/aronnax | closed | Ship helpers for preparing common patterns of input | usability | I noticed when writing the repeatability test suite that the examples had repeated patterns in the input:
- f-plane Coriolis force field
- beta-plane Coriolis force field
- rectangular bordered pool geometry (i.e., the wetmask being all 1 except for a 1-cell border)
I think it's a good idea (in principle, no comment on priority) to ship helper functions that implement these patterns so that users doing basic things can get started more easily.
There is a choice about whether to implement those features in the Fortran core of MIM or in Python/Matlab/etc helper code that the project ships in conjunction with the Fortran.
- Pro Fortran: Implemented just once in one place (whereas, if there come to be both Python and Matlab frontends, these helpers will be duplicated across them and will need to be kept in sync).
- Pro Fortran: Feature is available to the hypothetical user that just compiles the Fortran and doesn't use any frontend.
- Pro frontend: Programming in Fortran is tedious and error-prone.
- Pro frontend: Helpers will be simple to unit-test (though, I don't know whether Matlab's unit testing framework(s) are any easier to use than Fortran's).
- Pro frontend: Additional such patterns will be easier to add, if there aren't very many frontends to which they need to be added.
- Pro frontend: Lower core maintenance burden and maintenance churn: If these helper functions change, the rest of the core does not need to be reverified, and does not even seem to need to be reverified.
- Pro frontend: Research results are more reproducible because the computed inputs are always present to be saved, and loaded from. We can presumably minimize this point by dumping the computed inputs even if they are computed in Fortran, but I think that having that computation in the frontend(s) emphasizes the distinction more.
If Issue #21 is implemented, sinusoidal and stochastic wind will become two more such input patterns. | True | Ship helpers for preparing common patterns of input - I noticed when writing the repeatability test suite that the examples had repeated patterns in the input:
- f-plane Coriolis force field
- beta-plane Coriolis force field
- rectangular bordered pool geometry (i.e., the wetmask being all 1 except for a 1-cell border)
I think it's a good idea (in principle, no comment on priority) to ship helper functions that implement these patterns so that users doing basic things can get started more easily.
There is a choice about whether to implement those features in the Fortran core of MIM or in Python/Matlab/etc helper code that the project ships in conjunction with the Fortran.
- Pro Fortran: Implemented just once in one place (whereas, if there come to be both Python and Matlab frontends, these helpers will be duplicated across them and will need to be kept in sync).
- Pro Fortran: Feature is available to the hypothetical user that just compiles the Fortran and doesn't use any frontend.
- Pro frontend: Programming in Fortran is tedious and error-prone.
- Pro frontend: Helpers will be simple to unit-test (though, I don't know whether Matlab's unit testing framework(s) are any easier to use than Fortran's).
- Pro frontend: Additional such patterns will be easier to add, if there aren't very many frontends to which they need to be added.
- Pro frontend: Lower core maintenance burden and maintenance churn: If these helper functions change, the rest of the core does not need to be reverified, and does not even seem to need to be reverified.
- Pro frontend: Research results are more reproducible because the computed inputs are always present to be saved, and loaded from. We can presumably minimize this point by dumping the computed inputs even if they are computed in Fortran, but I think that having that computation in the frontend(s) emphasizes the distinction more.
If Issue #21 is implemented, sinusoidal and stochastic wind will become two more such input patterns. | non_priority | ship helpers for preparing common patterns of input i noticed when writing the repeatability test suite that the examples had repeated patterns in the input f plane coriolis force field beta plane coriolis force field rectangular bordered pool geometry i e the wetmask being all except for a cell border i think it s a good idea in principle no comment on priority to ship helper functions that implement these patterns so that users doing basic things can get started more easily there is a choice about whether to implement those features in the fortran core of mim or in python matlab etc helper code that the project ships in conjunction with the fortran pro fortran implemented just once in one place whereas if there come to be both python and matlab frontends these helpers will be duplicated across them and will need to be kept in sync pro fortran feature is available to the hypothetical user that just compiles the fortran and doesn t use any frontend pro frontend programming in fortran is tedious and error prone pro frontend helpers will be simple to unit test though i don t know whether matlab s unit testing framework s are any easier to use than fortran s pro frontend additional such patterns will be easier to add if there aren t very many frontends to which they need to be added pro frontend lower core maintenance burden and maintenance churn if these helper functions change the rest of the core does not need to be reverified and does not even seem to need to be reverified pro frontend research results are more reproducible because the computed inputs are always present to be saved and loaded from we can presumably minimize this point by dumping the computed inputs even if they are computed in fortran but i think that having that computation in the frontend s emphasizes the distinction more if issue is implemented sinusoidal and stochastic wind will become two more such input patterns | 0 |
653,307 | 21,579,194,008 | IssuesEvent | 2022-05-02 16:47:51 | metabase/metabase | https://api.github.com/repos/metabase/metabase | closed | In the relative date picker, changing the granularity of the Past/Next range picker should change the granularity of the Starting From picker | Type:Bug Priority:P3 Querying/Parameters & Variables .Frontend Querying/GUI .bugbash | When I change the time granularity of the Past/Next option, e.g. from Days to Months, the granularity of the Starting From option doesn’t change to match, but is supposed to.
The reverse should not be true; i.e. changing the granularity of the “Starting from” option should not change the granularity of the Past/Next picker, since I might want to do something like the past 30 days starting 2 years ago)

| 1.0 | In the relative date picker, changing the granularity of the Past/Next range picker should change the granularity of the Starting From picker - When I change the time granularity of the Past/Next option, e.g. from Days to Months, the granularity of the Starting From option doesn’t change to match, but is supposed to.
The reverse should not be true; i.e. changing the granularity of the “Starting from” option should not change the granularity of the Past/Next picker, since I might want to do something like the past 30 days starting 2 years ago)

| priority | in the relative date picker changing the granularity of the past next range picker should change the granularity of the starting from picker when i change the time granularity of the past next option e g from days to months the granularity of the starting from option doesn’t change to match but is supposed to the reverse should not be true i e changing the granularity of the “starting from” option should not change the granularity of the past next picker since i might want to do something like the past days starting years ago | 1 |
384,035 | 26,573,354,177 | IssuesEvent | 2023-01-21 13:22:12 | scaleway/docs-content | https://api.github.com/repos/scaleway/docs-content | opened | 👩💻 Documentation Request: How to use Scaleway Container Registry with Github Actions | Documentation Request | ### Summary
How to configure and use Github Actions to build Docker images and push them into Scaleway Container Registry.
---
Outline:
- Configure a Container Registry namespace in Scaleway Console
- Retrieve credentials and store them securely in Github secrets
- Create a Github Action that connects to the Container Registry namespace, builds a Docker image and push it to the registry with version management.
### Why is it needed?
Github Actions are becoming increasingly popular to create continuous integration pipelines. Combined with Scaleway Container Registry, they allow the user to build their own Docker image and store them into the registry for further use through other managed resources.
### Want to write this documentation yourself?
Yes
### Related PR(s)
n/a
### (Optional) Scaleway Organization ID
4993020b-9474-4a6b-bd92-f75236709147
### Email address
antoine.champion@outlook.fr | 1.0 | 👩💻 Documentation Request: How to use Scaleway Container Registry with Github Actions - ### Summary
How to configure and use Github Actions to build Docker images and push them into Scaleway Container Registry.
---
Outline:
- Configure a Container Registry namespace in Scaleway Console
- Retrieve credentials and store them securely in Github secrets
- Create a Github Action that connects to the Container Registry namespace, builds a Docker image and push it to the registry with version management.
### Why is it needed?
Github Actions are becoming increasingly popular to create continuous integration pipelines. Combined with Scaleway Container Registry, they allow the user to build their own Docker image and store them into the registry for further use through other managed resources.
### Want to write this documentation yourself?
Yes
### Related PR(s)
n/a
### (Optional) Scaleway Organization ID
4993020b-9474-4a6b-bd92-f75236709147
### Email address
antoine.champion@outlook.fr | non_priority | 👩💻 documentation request how to use scaleway container registry with github actions summary how to configure and use github actions to build docker images and push them into scaleway container registry outline configure a container registry namespace in scaleway console retrieve credentials and store them securely in github secrets create a github action that connects to the container registry namespace builds a docker image and push it to the registry with version management why is it needed github actions are becoming increasingly popular to create continuous integration pipelines combined with scaleway container registry they allow the user to build their own docker image and store them into the registry for further use through other managed resources want to write this documentation yourself yes related pr s n a optional scaleway organization id email address antoine champion outlook fr | 0 |
359,599 | 10,678,550,551 | IssuesEvent | 2019-10-21 17:30:11 | wso2/product-apim | https://api.github.com/repos/wso2/product-apim | closed | Changing endpoint security configuration causes an error | 3.0.0 Priority/Highest Severity/Blocker | When endpoint security drop down is selected, following error is thrown
<img width="1075" alt="Screen Shot 2019-10-18 at 4 00 41 PM" src="https://user-images.githubusercontent.com/4861150/67088276-5bf14a00-f1c2-11e9-9634-87972cbc8cc5.png">
this is working in carbon.apimgt v6.5.282 but not working in v6.5.283 | 1.0 | Changing endpoint security configuration causes an error - When endpoint security drop down is selected, following error is thrown
<img width="1075" alt="Screen Shot 2019-10-18 at 4 00 41 PM" src="https://user-images.githubusercontent.com/4861150/67088276-5bf14a00-f1c2-11e9-9634-87972cbc8cc5.png">
this is working in carbon.apimgt v6.5.282 but not working in v6.5.283 | priority | changing endpoint security configuration causes an error when endpoint security drop down is selected following error is thrown img width alt screen shot at pm src this is working in carbon apimgt but not working in | 1 |
585,038 | 17,469,598,709 | IssuesEvent | 2021-08-06 23:32:48 | bcgov/entity | https://api.github.com/repos/bcgov/entity | closed | INC0089149 - NR - Extra Pro - Corp. Number not Found - Heredia Building Company Inc. | blocked Priority1 ENTITY OPS | #### ServiceNow incident:
INC0089149
#### Contact information
Staff Name: Not sure
#### Description
>Can you please assist with the request below? Patty had received a response from Bruce and updated INC0089149, it turned out not to be a NRO issue. As Bruce has confirmed this is an issue relating to Names Request can you please investigate? In case you cannot see notes in Service now, here is the content:
>
> This client is trying to submit a Name Approval Request for an extra provincial registration – head office in Alberta.
> When she types in her Corporate Access Number, our computer says it cannot be found.
> It also cannot find the business name.
>
> How can she proceed?
>
> Company name: Heredia Building Company Inc.
> Corporate Access Number: [redacted]
> (see documents attached)”
>
> Here is Bruce’s response to Patty in the email in the thread below:
>
> Hello Patty
>
> My apologies for the delay in getting back to you.
> I notice, when you were able to fine the legal entity, you used BCOnline.
> Unfortunately, our client is not a BCOnline account holder – she's using the bcregisrtry/namerequest screens.
> I tried that website this morning using IE, Chrome, Opera, Firefox and Egde – it doesn't work in any of those.
>
> Please advise.
>
> Thank you
> Regards
> Bruce M.
#### Tasks
- [x] When ticket has been created, post the ticket in RocketChat '#Operations Tasks' channel
- [x] Add **entity** or **relationships** label to zenhub ticket
- [x] Add 'Priority1' label to zenhub ticket
- [x] Reply All to IT Ops email and provide zenhub ticket number opened and which team it was assigned to
- [ ] Dev/BAs to complete work & close zenhub ticket
- [ ] Author of zenhub ticket to mark ServiceNow ticket as resolved or ask IT Ops to do so
| 1.0 | INC0089149 - NR - Extra Pro - Corp. Number not Found - Heredia Building Company Inc. - #### ServiceNow incident:
INC0089149
#### Contact information
Staff Name: Not sure
#### Description
>Can you please assist with the request below? Patty had received a response from Bruce and updated INC0089149, it turned out not to be a NRO issue. As Bruce has confirmed this is an issue relating to Names Request can you please investigate? In case you cannot see notes in Service now, here is the content:
>
> This client is trying to submit a Name Approval Request for an extra provincial registration – head office in Alberta.
> When she types in her Corporate Access Number, our computer says it cannot be found.
> It also cannot find the business name.
>
> How can she proceed?
>
> Company name: Heredia Building Company Inc.
> Corporate Access Number: [redacted]
> (see documents attached)”
>
> Here is Bruce’s response to Patty in the email in the thread below:
>
> Hello Patty
>
> My apologies for the delay in getting back to you.
> I notice, when you were able to fine the legal entity, you used BCOnline.
> Unfortunately, our client is not a BCOnline account holder – she's using the bcregisrtry/namerequest screens.
> I tried that website this morning using IE, Chrome, Opera, Firefox and Egde – it doesn't work in any of those.
>
> Please advise.
>
> Thank you
> Regards
> Bruce M.
#### Tasks
- [x] When ticket has been created, post the ticket in RocketChat '#Operations Tasks' channel
- [x] Add **entity** or **relationships** label to zenhub ticket
- [x] Add 'Priority1' label to zenhub ticket
- [x] Reply All to IT Ops email and provide zenhub ticket number opened and which team it was assigned to
- [ ] Dev/BAs to complete work & close zenhub ticket
- [ ] Author of zenhub ticket to mark ServiceNow ticket as resolved or ask IT Ops to do so
| priority | nr extra pro corp number not found heredia building company inc servicenow incident contact information staff name not sure description can you please assist with the request below patty had received a response from bruce and updated it turned out not to be a nro issue as bruce has confirmed this is an issue relating to names request can you please investigate in case you cannot see notes in service now here is the content this client is trying to submit a name approval request for an extra provincial registration – head office in alberta when she types in her corporate access number our computer says it cannot be found it also cannot find the business name how can she proceed company name heredia building company inc corporate access number see documents attached ” here is bruce’s response to patty in the email in the thread below hello patty my apologies for the delay in getting back to you i notice when you were able to fine the legal entity you used bconline unfortunately our client is not a bconline account holder – she s using the bcregisrtry namerequest screens i tried that website this morning using ie chrome opera firefox and egde – it doesn t work in any of those please advise thank you regards bruce m tasks when ticket has been created post the ticket in rocketchat operations tasks channel add entity or relationships label to zenhub ticket add label to zenhub ticket reply all to it ops email and provide zenhub ticket number opened and which team it was assigned to dev bas to complete work close zenhub ticket author of zenhub ticket to mark servicenow ticket as resolved or ask it ops to do so | 1 |
280,503 | 30,828,293,387 | IssuesEvent | 2023-08-01 22:12:11 | snowdensb/redis | https://api.github.com/repos/snowdensb/redis | opened | CVE-2023-28859 (Medium) detected in redis-4.5.1-py3-none-any.whl | Mend: dependency security vulnerability | ## CVE-2023-28859 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>redis-4.5.1-py3-none-any.whl</b></p></summary>
<p>Python client for Redis database and key-value store</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/06/b5/328851ee54bbf00cc609671a658e0420d88aa2b4f5ace7aa669932d59a0e/redis-4.5.1-py3-none-any.whl">https://files.pythonhosted.org/packages/06/b5/328851ee54bbf00cc609671a658e0420d88aa2b4f5ace7aa669932d59a0e/redis-4.5.1-py3-none-any.whl</a></p>
<p>Path to dependency file: /utils/req-res-validator/requirements.txt</p>
<p>Path to vulnerable library: /utils/req-res-validator/requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **redis-4.5.1-py3-none-any.whl** (Vulnerable Library)
<p>Found in base branch: <b>unstable</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
redis-py before 4.4.4 and 4.5.x before 4.5.4 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request. (This could, for example, happen for a non-pipeline operation.) NOTE: the solutions for CVE-2023-28859 address data leakage across AsyncIO connections in general.
<p>Publish Date: 2023-03-26
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-28859>CVE-2023-28859</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28859">https://nvd.nist.gov/vuln/detail/CVE-2023-28859</a></p>
<p>Release Date: 2023-03-26</p>
<p>Fix Resolution: 4.5.3</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue | True | CVE-2023-28859 (Medium) detected in redis-4.5.1-py3-none-any.whl - ## CVE-2023-28859 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>redis-4.5.1-py3-none-any.whl</b></p></summary>
<p>Python client for Redis database and key-value store</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/06/b5/328851ee54bbf00cc609671a658e0420d88aa2b4f5ace7aa669932d59a0e/redis-4.5.1-py3-none-any.whl">https://files.pythonhosted.org/packages/06/b5/328851ee54bbf00cc609671a658e0420d88aa2b4f5ace7aa669932d59a0e/redis-4.5.1-py3-none-any.whl</a></p>
<p>Path to dependency file: /utils/req-res-validator/requirements.txt</p>
<p>Path to vulnerable library: /utils/req-res-validator/requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **redis-4.5.1-py3-none-any.whl** (Vulnerable Library)
<p>Found in base branch: <b>unstable</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
redis-py before 4.4.4 and 4.5.x before 4.5.4 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request. (This could, for example, happen for a non-pipeline operation.) NOTE: the solutions for CVE-2023-28859 address data leakage across AsyncIO connections in general.
<p>Publish Date: 2023-03-26
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-28859>CVE-2023-28859</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28859">https://nvd.nist.gov/vuln/detail/CVE-2023-28859</a></p>
<p>Release Date: 2023-03-26</p>
<p>Fix Resolution: 4.5.3</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue | non_priority | cve medium detected in redis none any whl cve medium severity vulnerability vulnerable library redis none any whl python client for redis database and key value store library home page a href path to dependency file utils req res validator requirements txt path to vulnerable library utils req res validator requirements txt dependency hierarchy x redis none any whl vulnerable library found in base branch unstable vulnerability details redis py before and x before leaves a connection open after canceling an async redis command at an inopportune time and can send response data to the client of an unrelated request this could for example happen for a non pipeline operation note the solutions for cve address data leakage across asyncio connections in general publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue | 0 |
264,095 | 8,305,145,876 | IssuesEvent | 2018-09-22 02:10:08 | RoboJackets/apiary | https://api.github.com/repos/RoboJackets/apiary | closed | CAS_AuthenticationException in GET / | area / backend priority / low type / bug | ## Error in Apiary
**CAS_AuthenticationException** in **GET /**
[View on Bugsnag](https://app.bugsnag.com/robojackets/apiary/errors/59de356e05c209001ac6194c?event_id=59e01bad55dccc001c6b7e66&i=gh&m=ci)
## Stacktrace
app/Http/Middleware/CASAuthenticate.php:38 - App\Http\Middleware\CASAuthenticate::handle
[View full stacktrace](https://app.bugsnag.com/robojackets/apiary/errors/59de356e05c209001ac6194c?event_id=59e01bad55dccc001c6b7e66&i=gh&m=ci)
*Created by RoboJackets Admin via Bugsnag* | 1.0 | CAS_AuthenticationException in GET / - ## Error in Apiary
**CAS_AuthenticationException** in **GET /**
[View on Bugsnag](https://app.bugsnag.com/robojackets/apiary/errors/59de356e05c209001ac6194c?event_id=59e01bad55dccc001c6b7e66&i=gh&m=ci)
## Stacktrace
app/Http/Middleware/CASAuthenticate.php:38 - App\Http\Middleware\CASAuthenticate::handle
[View full stacktrace](https://app.bugsnag.com/robojackets/apiary/errors/59de356e05c209001ac6194c?event_id=59e01bad55dccc001c6b7e66&i=gh&m=ci)
*Created by RoboJackets Admin via Bugsnag* | priority | cas authenticationexception in get error in apiary cas authenticationexception in get stacktrace app http middleware casauthenticate php app http middleware casauthenticate handle created by robojackets admin via bugsnag | 1 |
542,306 | 15,858,425,954 | IssuesEvent | 2021-04-08 06:41:31 | wso2/product-apim | https://api.github.com/repos/wso2/product-apim | closed | Websocket API topic description not getting saved | API-M 4.0.0 Feature/AsyncAPIs Priority/Normal Type/Bug | ### Description:
<!-- Describe the issue -->
When I try to add a description for the WebSocket API topic, it is not getting persisted.

### Steps to reproduce:
1. Created a WebSocket API in the publisher. (Inside a tenant)
2. Created a topic under the API.
3. Tried to add a description for the topic. But it s not getting saved.
### Affected Product Version:
<!-- Members can use Affected/*** labels -->
4.0.0-alpha
### Environment details (with versions):
- OS: MacOS
- Client:
- Env (Docker/K8s):
| 1.0 | Websocket API topic description not getting saved - ### Description:
<!-- Describe the issue -->
When I try to add a description for the WebSocket API topic, it is not getting persisted.

### Steps to reproduce:
1. Created a WebSocket API in the publisher. (Inside a tenant)
2. Created a topic under the API.
3. Tried to add a description for the topic. But it s not getting saved.
### Affected Product Version:
<!-- Members can use Affected/*** labels -->
4.0.0-alpha
### Environment details (with versions):
- OS: MacOS
- Client:
- Env (Docker/K8s):
| priority | websocket api topic description not getting saved description when i try to add a description for the websocket api topic it is not getting persisted steps to reproduce created a websocket api in the publisher inside a tenant created a topic under the api tried to add a description for the topic but it s not getting saved affected product version alpha environment details with versions os macos client env docker | 1 |
148,923 | 19,560,734,801 | IssuesEvent | 2022-01-03 15:53:11 | shaimael/Webgoat | https://api.github.com/repos/shaimael/Webgoat | opened | CVE-2019-11358 (Medium) detected in jquery-2.1.4.min.js, jquery-1.10.2.min.js | security vulnerability | ## CVE-2019-11358 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-2.1.4.min.js</b>, <b>jquery-1.10.2.min.js</b></p></summary>
<p>
<details><summary><b>jquery-2.1.4.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js</a></p>
<p>Path to vulnerable library: /webgoat-container/src/main/resources/static/js/libs/jquery-2.1.4.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.1.4.min.js** (Vulnerable Library)
</details>
<details><summary><b>jquery-1.10.2.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p>
<p>Path to vulnerable library: /webgoat-container/src/main/resources/static/js/jquery/jquery-1.10.2.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.10.2.min.js** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/shaimael/Webgoat/commit/06d8d0b5bb8a459ba3d47f61a64fe00c62662d81">06d8d0b5bb8a459ba3d47f61a64fe00c62662d81</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
<p>Publish Date: 2019-04-20
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358>CVE-2019-11358</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p>
<p>Release Date: 2019-04-20</p>
<p>Fix Resolution: 3.4.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.1.4","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"jquery:2.1.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0","isBinary":false},{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.10.2","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"jquery:1.10.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2019-11358","vulnerabilityDetails":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2019-11358 (Medium) detected in jquery-2.1.4.min.js, jquery-1.10.2.min.js - ## CVE-2019-11358 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-2.1.4.min.js</b>, <b>jquery-1.10.2.min.js</b></p></summary>
<p>
<details><summary><b>jquery-2.1.4.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js</a></p>
<p>Path to vulnerable library: /webgoat-container/src/main/resources/static/js/libs/jquery-2.1.4.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.1.4.min.js** (Vulnerable Library)
</details>
<details><summary><b>jquery-1.10.2.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p>
<p>Path to vulnerable library: /webgoat-container/src/main/resources/static/js/jquery/jquery-1.10.2.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.10.2.min.js** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/shaimael/Webgoat/commit/06d8d0b5bb8a459ba3d47f61a64fe00c62662d81">06d8d0b5bb8a459ba3d47f61a64fe00c62662d81</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
<p>Publish Date: 2019-04-20
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358>CVE-2019-11358</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p>
<p>Release Date: 2019-04-20</p>
<p>Fix Resolution: 3.4.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.1.4","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"jquery:2.1.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0","isBinary":false},{"packageType":"JavaScript","packageName":"jquery","packageVersion":"1.10.2","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"jquery:1.10.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2019-11358","vulnerabilityDetails":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in jquery min js jquery min js cve medium severity vulnerability vulnerable libraries jquery min js jquery min js jquery min js javascript library for dom operations library home page a href path to vulnerable library webgoat container src main resources static js libs jquery min js dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to vulnerable library webgoat container src main resources static js jquery jquery min js dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch main vulnerability details jquery before as used in drupal backdrop cms and other products mishandles jquery extend true because of object prototype pollution if an unsanitized source object contained an enumerable proto property it could extend the native object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion isbinary false packagetype javascript packagename jquery packageversion packagefilepaths istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails jquery before as used in drupal backdrop cms and other products mishandles jquery extend true because of object prototype pollution if an unsanitized source object contained an enumerable proto property it could extend the native object prototype vulnerabilityurl | 0 |
83,200 | 3,631,881,571 | IssuesEvent | 2016-02-11 05:32:47 | devints47/stratalogue | https://api.github.com/repos/devints47/stratalogue | closed | Create Playbook Page | Normal Priority | Page with inputs
- Name
- Private
- Map
- 5 Roles
Creates a Playbook object | 1.0 | Create Playbook Page - Page with inputs
- Name
- Private
- Map
- 5 Roles
Creates a Playbook object | priority | create playbook page page with inputs name private map roles creates a playbook object | 1 |
729,326 | 25,120,492,874 | IssuesEvent | 2022-11-09 07:40:37 | stratosphererl/stratosphere | https://api.github.com/repos/stratosphererl/stratosphere | opened | As a website user, I want to have a neatly organized menu, so that I can easily navigate the website. | type: user story priority: medium work: complicated [2] work: obvious [1] area: frontend | # Acceptance Criteria
- [ ] Given the website has a navigation bar
- [ ] When the user selects an item on the nav bar
- [ ] Then the user is redirected elsewhere
# Estimation of Work
- Implementation: 3-4 hrs (1-2 days)
- Design: 2 hrs (1 day)
_Note: Implementation and Design may or may not happen simultaneously_
# Tasks
- [ ] What needs to get done?
# Notes
The purpose of this issue is to begin a common theme or design when further developing the website.
This is not a very strict issue, it is meant to be rather open-ended and possibly changed to be more specific later. | 1.0 | As a website user, I want to have a neatly organized menu, so that I can easily navigate the website. - # Acceptance Criteria
- [ ] Given the website has a navigation bar
- [ ] When the user selects an item on the nav bar
- [ ] Then the user is redirected elsewhere
# Estimation of Work
- Implementation: 3-4 hrs (1-2 days)
- Design: 2 hrs (1 day)
_Note: Implementation and Design may or may not happen simultaneously_
# Tasks
- [ ] What needs to get done?
# Notes
The purpose of this issue is to begin a common theme or design when further developing the website.
This is not a very strict issue, it is meant to be rather open-ended and possibly changed to be more specific later. | priority | as a website user i want to have a neatly organized menu so that i can easily navigate the website acceptance criteria given the website has a navigation bar when the user selects an item on the nav bar then the user is redirected elsewhere estimation of work implementation hrs days design hrs day note implementation and design may or may not happen simultaneously tasks what needs to get done notes the purpose of this issue is to begin a common theme or design when further developing the website this is not a very strict issue it is meant to be rather open ended and possibly changed to be more specific later | 1 |
74,245 | 3,436,709,732 | IssuesEvent | 2015-12-12 16:32:45 | speedovation/kiwi | https://api.github.com/repos/speedovation/kiwi | closed | Drag and Create Project | 3 - Done High Priority | On Project explorer by dragging folder it should create project space.
1. Read folder path
2. Parse and add files & folders recursively
3. Save Project file.
Decide New file extension of project.
1. KiWi_Project.Kw
2. Project.Kw
3. Project.Kiwi
<!---
@huboard:{"order":5.960464477539063e-08,"milestone_order":2.288818359375e-05,"custom_state":""}
-->
| 1.0 | Drag and Create Project - On Project explorer by dragging folder it should create project space.
1. Read folder path
2. Parse and add files & folders recursively
3. Save Project file.
Decide New file extension of project.
1. KiWi_Project.Kw
2. Project.Kw
3. Project.Kiwi
<!---
@huboard:{"order":5.960464477539063e-08,"milestone_order":2.288818359375e-05,"custom_state":""}
-->
| priority | drag and create project on project explorer by dragging folder it should create project space read folder path parse and add files folders recursively save project file decide new file extension of project kiwi project kw project kw project kiwi huboard order milestone order custom state | 1 |
98,129 | 8,675,016,085 | IssuesEvent | 2018-11-30 09:38:51 | humera987/FXLabs-Test-Automation | https://api.github.com/repos/humera987/FXLabs-Test-Automation | closed | FXLabs Testing 30 : ApiV1RunsIdTestSuiteSummaryGetQueryParamPageInvalidDatatype | FXLabs Testing 30 | Project : FXLabs Testing 30
Job : uat
Env : uat
Region : US_WEST
Result : fail
Status Code : 404
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=NGFkNjlkYjctNzRlOC00NDVmLWE5Y2EtZjQ2NTBmOWUwZDI2; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Fri, 30 Nov 2018 09:37:14 GMT]}
Endpoint : http://13.56.210.25/api/v1/api/v1/runs/wdoVEwoJ/test-suite-summary?page=nR9voG
Request :
Response :
{
"timestamp" : "2018-11-30T09:37:15.411+0000",
"status" : 404,
"error" : "Not Found",
"message" : "No message available",
"path" : "/api/v1/api/v1/runs/wdoVEwoJ/test-suite-summary"
}
Logs :
Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]
--- FX Bot --- | 1.0 | FXLabs Testing 30 : ApiV1RunsIdTestSuiteSummaryGetQueryParamPageInvalidDatatype - Project : FXLabs Testing 30
Job : uat
Env : uat
Region : US_WEST
Result : fail
Status Code : 404
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=NGFkNjlkYjctNzRlOC00NDVmLWE5Y2EtZjQ2NTBmOWUwZDI2; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Fri, 30 Nov 2018 09:37:14 GMT]}
Endpoint : http://13.56.210.25/api/v1/api/v1/runs/wdoVEwoJ/test-suite-summary?page=nR9voG
Request :
Response :
{
"timestamp" : "2018-11-30T09:37:15.411+0000",
"status" : 404,
"error" : "Not Found",
"message" : "No message available",
"path" : "/api/v1/api/v1/runs/wdoVEwoJ/test-suite-summary"
}
Logs :
Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]
--- FX Bot --- | non_priority | fxlabs testing project fxlabs testing job uat env uat region us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options set cookie content type transfer encoding date endpoint request response timestamp status error not found message no message available path api api runs wdovewoj test suite summary logs assertion resolved to result assertion resolved to result fx bot | 0 |
9,299 | 8,583,602,416 | IssuesEvent | 2018-11-13 20:12:44 | terraform-providers/terraform-provider-aws | https://api.github.com/repos/terraform-providers/terraform-provider-aws | closed | aws_eip data source missing support for tags | enhancement good first issue help wanted service/ec2 | _This issue was originally opened by @MaximF as hashicorp/terraform#17361. It was migrated here as a result of the [provider split](https://www.hashicorp.com/blog/upcoming-provider-changes-in-terraform-0-10/). The original body of the issue is below._
<hr>
### Terraform Version
```
> terraform -v
Terraform v0.11.3
+ provider.aws v1.9.0
```
### Terraform Configuration Files
```hcl
data "aws_eip" "sample" {
tags {
Name ="A valuable IP"
}
}
```
### Crash Output
```hcl
Error: data.aws_eip.sample: : invalid or unknown key: tags
```
### Expected Behavior
Terraform would return an IP with a described "Name" tag value
### Actual Behavior
Error: data.aws_eip.sample: : invalid or unknown key: tags
### Steps to Reproduce
1. `terraform init`
2. `terraform apply`
### References
The same issue was fixed for `aws_eip` resource just over a month ago at hashicorp/terraform#16993.
Now it is a turn for `aws_eip` data source
| 1.0 | aws_eip data source missing support for tags - _This issue was originally opened by @MaximF as hashicorp/terraform#17361. It was migrated here as a result of the [provider split](https://www.hashicorp.com/blog/upcoming-provider-changes-in-terraform-0-10/). The original body of the issue is below._
<hr>
### Terraform Version
```
> terraform -v
Terraform v0.11.3
+ provider.aws v1.9.0
```
### Terraform Configuration Files
```hcl
data "aws_eip" "sample" {
tags {
Name ="A valuable IP"
}
}
```
### Crash Output
```hcl
Error: data.aws_eip.sample: : invalid or unknown key: tags
```
### Expected Behavior
Terraform would return an IP with a described "Name" tag value
### Actual Behavior
Error: data.aws_eip.sample: : invalid or unknown key: tags
### Steps to Reproduce
1. `terraform init`
2. `terraform apply`
### References
The same issue was fixed for `aws_eip` resource just over a month ago at hashicorp/terraform#16993.
Now it is a turn for `aws_eip` data source
| non_priority | aws eip data source missing support for tags this issue was originally opened by maximf as hashicorp terraform it was migrated here as a result of the the original body of the issue is below terraform version terraform v terraform provider aws terraform configuration files hcl data aws eip sample tags name a valuable ip crash output hcl error data aws eip sample invalid or unknown key tags expected behavior terraform would return an ip with a described name tag value actual behavior error data aws eip sample invalid or unknown key tags steps to reproduce terraform init terraform apply references the same issue was fixed for aws eip resource just over a month ago at hashicorp terraform now it is a turn for aws eip data source | 0 |
470,685 | 13,542,794,779 | IssuesEvent | 2020-09-16 17:55:13 | carbon-design-system/carbon-addons-iot-react | https://api.github.com/repos/carbon-design-system/carbon-addons-iot-react | opened | [Pull Request Template] add a Regression Test field / question | status: needs priority :inbox_tray: status: needs triage :mag: type: enhancement :bulb: type: question :grey_question: | <!--
Use this template if you want to request a new feature, or a change to an
existing feature.
If you'd like to request an entirely new component, please use the component request template instead.
If you are reporting a bug or problem, please use the bug template instead.
-->
### What package is this for?
- [x] React
- [x] Angular
### Summary
The current PR template has an Acceptance Test field/question currently that is helpful to remind the dev to give the reader some idea on how to test the PR. I think it would be beneficial (and I've added it myself before) to have a similar 'Regression Test' field to remind the user to think about how they could have broken old functionality. An example could be:
**Regression Test (how to make sure this PR doesn't break old functionality)**
It doesn't necessarily have to be specific instructions as it could be fully tested for, but it helps to jog the dev's brain
### Specific timeline issues / requests
Do you want this work within a specific time period? Is it related to an
upcoming release?
N/A
### Available extra resources
What resources do you have to assist this effort?
Can add myself if others think this would be valuable | 1.0 | [Pull Request Template] add a Regression Test field / question - <!--
Use this template if you want to request a new feature, or a change to an
existing feature.
If you'd like to request an entirely new component, please use the component request template instead.
If you are reporting a bug or problem, please use the bug template instead.
-->
### What package is this for?
- [x] React
- [x] Angular
### Summary
The current PR template has an Acceptance Test field/question currently that is helpful to remind the dev to give the reader some idea on how to test the PR. I think it would be beneficial (and I've added it myself before) to have a similar 'Regression Test' field to remind the user to think about how they could have broken old functionality. An example could be:
**Regression Test (how to make sure this PR doesn't break old functionality)**
It doesn't necessarily have to be specific instructions as it could be fully tested for, but it helps to jog the dev's brain
### Specific timeline issues / requests
Do you want this work within a specific time period? Is it related to an
upcoming release?
N/A
### Available extra resources
What resources do you have to assist this effort?
Can add myself if others think this would be valuable | priority | add a regression test field question use this template if you want to request a new feature or a change to an existing feature if you d like to request an entirely new component please use the component request template instead if you are reporting a bug or problem please use the bug template instead what package is this for react angular summary the current pr template has an acceptance test field question currently that is helpful to remind the dev to give the reader some idea on how to test the pr i think it would be beneficial and i ve added it myself before to have a similar regression test field to remind the user to think about how they could have broken old functionality an example could be regression test how to make sure this pr doesn t break old functionality it doesn t necessarily have to be specific instructions as it could be fully tested for but it helps to jog the dev s brain specific timeline issues requests do you want this work within a specific time period is it related to an upcoming release n a available extra resources what resources do you have to assist this effort can add myself if others think this would be valuable | 1 |
79,974 | 15,586,254,260 | IssuesEvent | 2021-03-18 01:31:24 | hiucimon/ClamScanService | https://api.github.com/repos/hiucimon/ClamScanService | opened | CVE-2020-10672 (High) detected in jackson-databind-2.8.5.jar | security vulnerability | ## CVE-2020-10672 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /ClamScanService/build.gradle</p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.8.5/b3035f37e674c04dafe36a660c3815cc59f764e2/jackson-databind-2.8.5.jar,/root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.5/jackson-databind-2.8.5.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-thymeleaf-1.4.3.RELEASE.jar (Root Library)
- spring-boot-starter-web-1.4.3.RELEASE.jar
- :x: **jackson-databind-2.8.5.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).
<p>Publish Date: 2020-03-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10672>CVE-2020-10672</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10672">https://nvd.nist.gov/vuln/detail/CVE-2020-10672</a></p>
<p>Release Date: 2020-03-18</p>
<p>Fix Resolution: jackson-databind-2.9.10.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-10672 (High) detected in jackson-databind-2.8.5.jar - ## CVE-2020-10672 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /ClamScanService/build.gradle</p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.8.5/b3035f37e674c04dafe36a660c3815cc59f764e2/jackson-databind-2.8.5.jar,/root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.5/jackson-databind-2.8.5.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-thymeleaf-1.4.3.RELEASE.jar (Root Library)
- spring-boot-starter-web-1.4.3.RELEASE.jar
- :x: **jackson-databind-2.8.5.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).
<p>Publish Date: 2020-03-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10672>CVE-2020-10672</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10672">https://nvd.nist.gov/vuln/detail/CVE-2020-10672</a></p>
<p>Release Date: 2020-03-18</p>
<p>Fix Resolution: jackson-databind-2.9.10.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file clamscanservice build gradle path to vulnerable library root gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar root repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter thymeleaf release jar root library spring boot starter web release jar x jackson databind jar vulnerable library vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache aries transaction jms internal xapooledconnectionfactory aka aries transaction jms publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jackson databind step up your open source security game with whitesource | 0 |
109,888 | 16,902,900,253 | IssuesEvent | 2021-06-24 01:04:10 | idonthaveafifaaddiction/flink | https://api.github.com/repos/idonthaveafifaaddiction/flink | opened | CVE-2021-34428 (Low) detected in jetty-server-9.3.20.v20170531.jar | security vulnerability | ## CVE-2021-34428 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jetty-server-9.3.20.v20170531.jar</b></p></summary>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.3.20.v20170531/jetty-server-9.3.20.v20170531.jar</p>
<p>
Dependency Hierarchy:
- hive-exec-3.1.2.jar (Root Library)
- hive-llap-tez-3.1.2.jar
- hive-common-3.1.2.jar
- :x: **jetty-server-9.3.20.v20170531.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34428>CVE-2021-34428</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>2.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Physical
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6">https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution: org.eclipse.jetty:jetty-server:9.4.41.v20210516,10.0.3,11.0.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.eclipse.jetty","packageName":"jetty-server","packageVersion":"9.3.20.v20170531","packageFilePaths":[],"isTransitiveDependency":true,"dependencyTree":"org.apache.hive:hive-exec:3.1.2;org.apache.hive:hive-llap-tez:3.1.2;org.apache.hive:hive-common:3.1.2;org.eclipse.jetty:jetty-server:9.3.20.v20170531","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.eclipse.jetty:jetty-server:9.4.41.v20210516,10.0.3,11.0.3"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-34428","vulnerabilityDetails":"For Eclipse Jetty versions \u003c\u003d 9.4.40, \u003c\u003d 10.0.2, \u003c\u003d 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34428","cvss3Severity":"low","cvss3Score":"2.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"Required","AV":"Physical","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-34428 (Low) detected in jetty-server-9.3.20.v20170531.jar - ## CVE-2021-34428 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jetty-server-9.3.20.v20170531.jar</b></p></summary>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.3.20.v20170531/jetty-server-9.3.20.v20170531.jar</p>
<p>
Dependency Hierarchy:
- hive-exec-3.1.2.jar (Root Library)
- hive-llap-tez-3.1.2.jar
- hive-common-3.1.2.jar
- :x: **jetty-server-9.3.20.v20170531.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34428>CVE-2021-34428</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>2.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Physical
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6">https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution: org.eclipse.jetty:jetty-server:9.4.41.v20210516,10.0.3,11.0.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.eclipse.jetty","packageName":"jetty-server","packageVersion":"9.3.20.v20170531","packageFilePaths":[],"isTransitiveDependency":true,"dependencyTree":"org.apache.hive:hive-exec:3.1.2;org.apache.hive:hive-llap-tez:3.1.2;org.apache.hive:hive-common:3.1.2;org.eclipse.jetty:jetty-server:9.3.20.v20170531","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.eclipse.jetty:jetty-server:9.4.41.v20210516,10.0.3,11.0.3"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-34428","vulnerabilityDetails":"For Eclipse Jetty versions \u003c\u003d 9.4.40, \u003c\u003d 10.0.2, \u003c\u003d 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-34428","cvss3Severity":"low","cvss3Score":"2.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"Required","AV":"Physical","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve low detected in jetty server jar cve low severity vulnerability vulnerable library jetty server jar the core jetty server artifact library home page a href path to vulnerable library home wss scanner repository org eclipse jetty jetty server jetty server jar dependency hierarchy hive exec jar root library hive llap tez jar hive common jar x jetty server jar vulnerable library found in base branch master vulnerability details for eclipse jetty versions if an exception is thrown from the sessionlistener sessiondestroyed method then the session id is not invalidated in the session id manager on deployments with clustered sessions and multiple contexts this can result in a session not being invalidated this can result in an application used on a shared computer being left logged in publish date url a href cvss score details base score metrics exploitability metrics attack vector physical attack complexity high privileges required none user interaction required scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org eclipse jetty jetty server isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org apache hive hive exec org apache hive hive llap tez org apache hive hive common org eclipse jetty jetty server isminimumfixversionavailable true minimumfixversion org eclipse jetty jetty server basebranches vulnerabilityidentifier cve vulnerabilitydetails for eclipse jetty versions if an exception is thrown from the sessionlistener sessiondestroyed method then the session id is not invalidated in the session id manager on deployments with clustered sessions and multiple contexts this can result in a session not being invalidated this can result in an application used on a shared computer being left logged in vulnerabilityurl | 0 |
671,323 | 22,756,068,512 | IssuesEvent | 2022-07-07 16:39:16 | PecanProject/pecan | https://api.github.com/repos/PecanProject/pecan | closed | Switch "var" naming convention to "nc_var" | Priority: 02 - Normal Misc: good first issue | <!--- Provide a general summary of the issue in the Title above -->
## Description
@serbinsh noticed we are using the object ```var``` to store values even though ```var() is an internal function. This needs a cleanup.
## Context
This will help keep code clean and clear.
## Possible Implementation
Change the object ```var``` to ```nc_var```.
| 1.0 | Switch "var" naming convention to "nc_var" - <!--- Provide a general summary of the issue in the Title above -->
## Description
@serbinsh noticed we are using the object ```var``` to store values even though ```var() is an internal function. This needs a cleanup.
## Context
This will help keep code clean and clear.
## Possible Implementation
Change the object ```var``` to ```nc_var```.
| priority | switch var naming convention to nc var description serbinsh noticed we are using the object var to store values even though var is an internal function this needs a cleanup context this will help keep code clean and clear possible implementation change the object var to nc var | 1 |
194,144 | 14,670,355,043 | IssuesEvent | 2020-12-30 04:32:52 | atom-ide-community/atom-script | https://api.github.com/repos/atom-ide-community/atom-script | closed | Install Fail | installation please-try-the-latest-version | Tried numerous time to install this, I have git installed and have no problems installing/cloning other pkgs from github using Atom. I have tried to no avail:
**git config --global url."https://".insteadOf git://**
This message appears to me to be a firewall/connectivity issue. Anyone else experience this ? I am running the latest version of OSX 10.11.
npm ERR! git clone --template=/Users/teradata/.atom/.apm/_git-remotes/_templates --mirror git://github.com/monsterkodi/node-simple-plist.git /Users/teradata/.atom/.apm/_git-remotes/git-github-com-monsterkodi-node-simple-plist-git-6a71a541: Cloning into bare repository '/Users/teradata/.atom/.apm/_git-remotes/git-github-com-monsterkodi-node-simple-plist-git-6a71a541'...
npm ERR! git clone --template=/Users/teradata/.atom/.apm/_git-remotes/_templates --mirror git://github.com/monsterkodi/node-simple-plist.git /Users/teradata/.atom/.apm/_git-remotes/git-github-com-monsterkodi-node-simple-plist-git-6a71a541: fatal: unable to connect to github.com:
npm ERR! git clone --template=/Users/teradata/.atom/.apm/_git-remotes/_templates --mirror git://github.com/monsterkodi/node-simple-plist.git /Users/teradata/.atom/.apm/_git-remotes/git-github-com-monsterkodi-node-simple-plist-git-6a71a541: github.com[0: 192.30.252.122]: errno=Operation timed out
npm ERR! Darwin 15.6.0
npm ERR! argv "/Users/teradata/Downloads/Atom.app/Contents/Resources/app/apm/bin/node" "/Users/teradata/Downloads/Atom.app/Contents/Resources/app/apm/node_modules/npm/bin/npm-cli.js" "--globalconfig" "/Users/teradata/.atom/.apm/.apmrc" "--userconfig" "/Users/teradata/.atom/.apmrc" "install" "/private/var/folders/dx/0ksjcpjx0l5130vgc4hz5wf00000gp/T/d-116527-31202-19ty9k6/package.tgz" "--target=0.36.8" "--arch=x64"
npm ERR! node v0.10.40
npm ERR! npm v2.13.3
npm ERR! code 128
npm ERR! Command failed: Cloning into bare repository '/Users/teradata/.atom/.apm/_git-remotes/git-github-com-monsterkodi-node-simple-plist-git-6a71a541'...
npm ERR! fatal: unable to connect to github.com:
npm ERR! github.com[0: 192.30.252.122]: errno=Operation timed out
npm ERR!
npm ERR!
npm ERR!
npm ERR! If you need help, you may report this error at:
npm ERR! https://github.com/npm/npm/issues
npm ERR! Please include the following file with any support request:
npm ERR! /private/var/folders/dx/0ksjcpjx0l5130vgc4hz5wf00000gp/T/apm-install-dir-116527-31202-ko9ozk/npm-debug.log
| 1.0 | Install Fail - Tried numerous time to install this, I have git installed and have no problems installing/cloning other pkgs from github using Atom. I have tried to no avail:
**git config --global url."https://".insteadOf git://**
This message appears to me to be a firewall/connectivity issue. Anyone else experience this ? I am running the latest version of OSX 10.11.
npm ERR! git clone --template=/Users/teradata/.atom/.apm/_git-remotes/_templates --mirror git://github.com/monsterkodi/node-simple-plist.git /Users/teradata/.atom/.apm/_git-remotes/git-github-com-monsterkodi-node-simple-plist-git-6a71a541: Cloning into bare repository '/Users/teradata/.atom/.apm/_git-remotes/git-github-com-monsterkodi-node-simple-plist-git-6a71a541'...
npm ERR! git clone --template=/Users/teradata/.atom/.apm/_git-remotes/_templates --mirror git://github.com/monsterkodi/node-simple-plist.git /Users/teradata/.atom/.apm/_git-remotes/git-github-com-monsterkodi-node-simple-plist-git-6a71a541: fatal: unable to connect to github.com:
npm ERR! git clone --template=/Users/teradata/.atom/.apm/_git-remotes/_templates --mirror git://github.com/monsterkodi/node-simple-plist.git /Users/teradata/.atom/.apm/_git-remotes/git-github-com-monsterkodi-node-simple-plist-git-6a71a541: github.com[0: 192.30.252.122]: errno=Operation timed out
npm ERR! Darwin 15.6.0
npm ERR! argv "/Users/teradata/Downloads/Atom.app/Contents/Resources/app/apm/bin/node" "/Users/teradata/Downloads/Atom.app/Contents/Resources/app/apm/node_modules/npm/bin/npm-cli.js" "--globalconfig" "/Users/teradata/.atom/.apm/.apmrc" "--userconfig" "/Users/teradata/.atom/.apmrc" "install" "/private/var/folders/dx/0ksjcpjx0l5130vgc4hz5wf00000gp/T/d-116527-31202-19ty9k6/package.tgz" "--target=0.36.8" "--arch=x64"
npm ERR! node v0.10.40
npm ERR! npm v2.13.3
npm ERR! code 128
npm ERR! Command failed: Cloning into bare repository '/Users/teradata/.atom/.apm/_git-remotes/git-github-com-monsterkodi-node-simple-plist-git-6a71a541'...
npm ERR! fatal: unable to connect to github.com:
npm ERR! github.com[0: 192.30.252.122]: errno=Operation timed out
npm ERR!
npm ERR!
npm ERR!
npm ERR! If you need help, you may report this error at:
npm ERR! https://github.com/npm/npm/issues
npm ERR! Please include the following file with any support request:
npm ERR! /private/var/folders/dx/0ksjcpjx0l5130vgc4hz5wf00000gp/T/apm-install-dir-116527-31202-ko9ozk/npm-debug.log
| non_priority | install fail tried numerous time to install this i have git installed and have no problems installing cloning other pkgs from github using atom i have tried to no avail git config global url git this message appears to me to be a firewall connectivity issue anyone else experience this i am running the latest version of osx npm err git clone template users teradata atom apm git remotes templates mirror git github com monsterkodi node simple plist git users teradata atom apm git remotes git github com monsterkodi node simple plist git cloning into bare repository users teradata atom apm git remotes git github com monsterkodi node simple plist git npm err git clone template users teradata atom apm git remotes templates mirror git github com monsterkodi node simple plist git users teradata atom apm git remotes git github com monsterkodi node simple plist git fatal unable to connect to github com npm err git clone template users teradata atom apm git remotes templates mirror git github com monsterkodi node simple plist git users teradata atom apm git remotes git github com monsterkodi node simple plist git github com errno operation timed out npm err darwin npm err argv users teradata downloads atom app contents resources app apm bin node users teradata downloads atom app contents resources app apm node modules npm bin npm cli js globalconfig users teradata atom apm apmrc userconfig users teradata atom apmrc install private var folders dx t d package tgz target arch npm err node npm err npm npm err code npm err command failed cloning into bare repository users teradata atom apm git remotes git github com monsterkodi node simple plist git npm err fatal unable to connect to github com npm err github com errno operation timed out npm err npm err npm err npm err if you need help you may report this error at npm err npm err please include the following file with any support request npm err private var folders dx t apm install dir npm debug log | 0 |
312,486 | 9,547,947,635 | IssuesEvent | 2019-05-02 02:14:33 | carbon-design-system/carbon-components-react | https://api.github.com/repos/carbon-design-system/carbon-components-react | closed | Label is not color highlighting when user is interacting with an input field | Severity 2 priority: high type: bug 🐛 wontfix | <!-- Feel free to remove sections that aren't relevant.
## Title line template: [Title]: Brief description
-->
## Detailed description
According to our carbon components spec, the labels should highlight when the user has focused on an input field.
I believe this was injected by the a11y fix. I believe this fix injected the issue because the css no longer finds the label field since it's been reordered: https://github.com/IBM/carbon-components-react/commit/f02c1f9a7ecb92bb42028b34b8b95bb09ac2e425
> Is this a feature request (new component, new icon), a bug, or a general issue?
bug
> Is this issue related to a specific component?
Select
> What did you expect to happen? What happened instead? What would you like to see changed?
expected label to highlight
> What browser are you working in?
Chrome
> What version of the Carbon Design System are you using?
6.18.4
> What offering/product do you work on? Any pressing ship or release dates we should be aware of?
## Steps to reproduce the issue
Simply interact with the Select widget in this storybook. The label should be highlighted red as you interact.
http://react.carbondesignsystem.com/?selectedKind=Select&selectedStory=invalid&full=0&addons=1&stories=1&panelRight=0&addonPanel=storybook%2Factions%2Factions-panel
<!--
Please try to re-create the issue using our Codesandbox template available here:
https://codesandbox.io/s/x2mjypo6pp
This helps reduce the issue to an isolated case that helps us out when debugging.
If you're able to reproduce using the codesandbox link above, please include the
link in addition to the steps to reproduce. Thanks so much!
-->
<!-- [Codesandbox](<url>) -->
1. Step one
2. Step two
3. Step three
4. etc.
## Additional information
* Screenshots or code
* Notes
| 1.0 | Label is not color highlighting when user is interacting with an input field - <!-- Feel free to remove sections that aren't relevant.
## Title line template: [Title]: Brief description
-->
## Detailed description
According to our carbon components spec, the labels should highlight when the user has focused on an input field.
I believe this was injected by the a11y fix. I believe this fix injected the issue because the css no longer finds the label field since it's been reordered: https://github.com/IBM/carbon-components-react/commit/f02c1f9a7ecb92bb42028b34b8b95bb09ac2e425
> Is this a feature request (new component, new icon), a bug, or a general issue?
bug
> Is this issue related to a specific component?
Select
> What did you expect to happen? What happened instead? What would you like to see changed?
expected label to highlight
> What browser are you working in?
Chrome
> What version of the Carbon Design System are you using?
6.18.4
> What offering/product do you work on? Any pressing ship or release dates we should be aware of?
## Steps to reproduce the issue
Simply interact with the Select widget in this storybook. The label should be highlighted red as you interact.
http://react.carbondesignsystem.com/?selectedKind=Select&selectedStory=invalid&full=0&addons=1&stories=1&panelRight=0&addonPanel=storybook%2Factions%2Factions-panel
<!--
Please try to re-create the issue using our Codesandbox template available here:
https://codesandbox.io/s/x2mjypo6pp
This helps reduce the issue to an isolated case that helps us out when debugging.
If you're able to reproduce using the codesandbox link above, please include the
link in addition to the steps to reproduce. Thanks so much!
-->
<!-- [Codesandbox](<url>) -->
1. Step one
2. Step two
3. Step three
4. etc.
## Additional information
* Screenshots or code
* Notes
| priority | label is not color highlighting when user is interacting with an input field feel free to remove sections that aren t relevant title line template brief description detailed description according to our carbon components spec the labels should highlight when the user has focused on an input field i believe this was injected by the fix i believe this fix injected the issue because the css no longer finds the label field since it s been reordered is this a feature request new component new icon a bug or a general issue bug is this issue related to a specific component select what did you expect to happen what happened instead what would you like to see changed expected label to highlight what browser are you working in chrome what version of the carbon design system are you using what offering product do you work on any pressing ship or release dates we should be aware of steps to reproduce the issue simply interact with the select widget in this storybook the label should be highlighted red as you interact please try to re create the issue using our codesandbox template available here this helps reduce the issue to an isolated case that helps us out when debugging if you re able to reproduce using the codesandbox link above please include the link in addition to the steps to reproduce thanks so much step one step two step three etc additional information screenshots or code notes | 1 |
241,823 | 20,164,128,992 | IssuesEvent | 2022-02-10 01:24:37 | microsoft/AzureStorageExplorer | https://api.github.com/repos/microsoft/AzureStorageExplorer | closed | It would be better to allow edit the 'Blob container or directory URL' field in the 'Enter Connection Info' dialog | :heavy_check_mark: merged 🧪 testing :gear: adls gen2 | **Storage Explorer Version**: 1.23.0-dev
**Build Number**: 20220209.5
**Branch**: main
**Platform/OS**: Windows 10
**How Found**: From running test case
**Regression From**: Not a regression
## Steps to Reproduce ##
1. Expand one ADLS Gen2 storage account -> Blob Containers.
2. Create a blob container -> Create a new folder -> Upload one file to the folder.
3. Right click the file -> Click 'Copy Direct Link'.
4. Paste the direct link to Edge browser -> Open the direct link.
5. Click 'Attach Directory' option -> Select one Azure account -> Click 'Next'.
6. There is an error message in the 'Enter Connection Info' page.
## Expected Experience ##
It would be better to 'Blob container or directory URL' field.
## Actual Experience ##
Can't edit the 'Blob container or directory URL' field.
 | 1.0 | It would be better to allow edit the 'Blob container or directory URL' field in the 'Enter Connection Info' dialog - **Storage Explorer Version**: 1.23.0-dev
**Build Number**: 20220209.5
**Branch**: main
**Platform/OS**: Windows 10
**How Found**: From running test case
**Regression From**: Not a regression
## Steps to Reproduce ##
1. Expand one ADLS Gen2 storage account -> Blob Containers.
2. Create a blob container -> Create a new folder -> Upload one file to the folder.
3. Right click the file -> Click 'Copy Direct Link'.
4. Paste the direct link to Edge browser -> Open the direct link.
5. Click 'Attach Directory' option -> Select one Azure account -> Click 'Next'.
6. There is an error message in the 'Enter Connection Info' page.
## Expected Experience ##
It would be better to 'Blob container or directory URL' field.
## Actual Experience ##
Can't edit the 'Blob container or directory URL' field.
 | non_priority | it would be better to allow edit the blob container or directory url field in the enter connection info dialog storage explorer version dev build number branch main platform os windows how found from running test case regression from not a regression steps to reproduce expand one adls storage account blob containers create a blob container create a new folder upload one file to the folder right click the file click copy direct link paste the direct link to edge browser open the direct link click attach directory option select one azure account click next there is an error message in the enter connection info page expected experience it would be better to blob container or directory url field actual experience can t edit the blob container or directory url field | 0 |
682,013 | 23,330,153,443 | IssuesEvent | 2022-08-09 03:48:02 | City-Bureau/city-scrapers-atl | https://api.github.com/repos/City-Bureau/city-scrapers-atl | closed | New Scraper: NPU X | priority-unset | Create a new scraper for NPU X
Website: https://www.atlantaga.gov/government/departments/city-planning/neighborhood-and-npu-contacts
Jurisdiction: City of Atlanta
Classification: NPU
(Capitol View, Sylvan Hills) — Might suggest we hold off on NPUs
| 1.0 | New Scraper: NPU X - Create a new scraper for NPU X
Website: https://www.atlantaga.gov/government/departments/city-planning/neighborhood-and-npu-contacts
Jurisdiction: City of Atlanta
Classification: NPU
(Capitol View, Sylvan Hills) — Might suggest we hold off on NPUs
| priority | new scraper npu x create a new scraper for npu x website jurisdiction city of atlanta classification npu capitol view sylvan hills — might suggest we hold off on npus | 1 |
4,131 | 4,212,695,861 | IssuesEvent | 2016-06-29 17:01:28 | coreos/etcd | https://api.github.com/repos/coreos/etcd | closed | Values in rafthttp encode/decode | area/performance | Hi!
Found that `encode`/`decode` methods in `rafthttp` module accept/return `raftpb.Message` by value instead of by pointer:
```
func (enc *messageEncoder) encode(m raftpb.Message) error {
if err := binary.Write(enc.w, binary.BigEndian, uint64(m.Size())); err != nil {
return err
}
_, err := enc.w.Write(pbutil.MustMarshal(&m))
return err
}
```
Seems like there is no need to pass object copy for encoding. Simple test like this:
```
func BenchmarkEncodeMemoryUsage(b *testing.B) {
m := raftpb.Message{
Type: raftpb.MsgApp,
From: 1,
To: 2,
Term: 1,
LogTerm: 1,
Index: 3,
Entries: []raftpb.Entry{{Term: 1, Index: 4}},
}
b.ReportAllocs()
buf := &bytes.Buffer{}
enc := &messageEncoder{w: buf}
for i:=0; i< b.N; i++ {
enc.encode(m)
buf.Reset()
}
}
```
shows that passing pointer does show performance improvements if we pass pointer to encode:
```
benchmark old ns/op new ns/op delta
BenchmarkEncodeMemoryUsage-4 668 526 -21.26%
benchmark old allocs new allocs delta
BenchmarkEncodeMemoryUsage-4 4 3 -25.00%
benchmark old bytes new bytes delta
BenchmarkEncodeMemoryUsage-4 320 64 -80.00%
```
(I had to hack a little to make test work with pointers because changing interface here requires a lot of changes all over the code).
I'd like to work on pull request to move to pointers but not quite sure if this interface is accidental or it is intended. | True | Values in rafthttp encode/decode - Hi!
Found that `encode`/`decode` methods in `rafthttp` module accept/return `raftpb.Message` by value instead of by pointer:
```
func (enc *messageEncoder) encode(m raftpb.Message) error {
if err := binary.Write(enc.w, binary.BigEndian, uint64(m.Size())); err != nil {
return err
}
_, err := enc.w.Write(pbutil.MustMarshal(&m))
return err
}
```
Seems like there is no need to pass object copy for encoding. Simple test like this:
```
func BenchmarkEncodeMemoryUsage(b *testing.B) {
m := raftpb.Message{
Type: raftpb.MsgApp,
From: 1,
To: 2,
Term: 1,
LogTerm: 1,
Index: 3,
Entries: []raftpb.Entry{{Term: 1, Index: 4}},
}
b.ReportAllocs()
buf := &bytes.Buffer{}
enc := &messageEncoder{w: buf}
for i:=0; i< b.N; i++ {
enc.encode(m)
buf.Reset()
}
}
```
shows that passing pointer does show performance improvements if we pass pointer to encode:
```
benchmark old ns/op new ns/op delta
BenchmarkEncodeMemoryUsage-4 668 526 -21.26%
benchmark old allocs new allocs delta
BenchmarkEncodeMemoryUsage-4 4 3 -25.00%
benchmark old bytes new bytes delta
BenchmarkEncodeMemoryUsage-4 320 64 -80.00%
```
(I had to hack a little to make test work with pointers because changing interface here requires a lot of changes all over the code).
I'd like to work on pull request to move to pointers but not quite sure if this interface is accidental or it is intended. | non_priority | values in rafthttp encode decode hi found that encode decode methods in rafthttp module accept return raftpb message by value instead of by pointer func enc messageencoder encode m raftpb message error if err binary write enc w binary bigendian m size err nil return err err enc w write pbutil mustmarshal m return err seems like there is no need to pass object copy for encoding simple test like this func benchmarkencodememoryusage b testing b m raftpb message type raftpb msgapp from to term logterm index entries raftpb entry term index b reportallocs buf bytes buffer enc messageencoder w buf for i i b n i enc encode m buf reset shows that passing pointer does show performance improvements if we pass pointer to encode benchmark old ns op new ns op delta benchmarkencodememoryusage benchmark old allocs new allocs delta benchmarkencodememoryusage benchmark old bytes new bytes delta benchmarkencodememoryusage i had to hack a little to make test work with pointers because changing interface here requires a lot of changes all over the code i d like to work on pull request to move to pointers but not quite sure if this interface is accidental or it is intended | 0 |
157,844 | 6,016,990,789 | IssuesEvent | 2017-06-07 08:34:15 | minishift/minishift | https://api.github.com/repos/minishift/minishift | closed | certificate is valid for *.xip.io not certificate is valid for *.nip.io | kind/bug priority/major | minishift v1.1.0
I'm trying to log into the new fabric8 ui vi a keycloak openshift provider. We get a certificate error which mentions valid "xip.io" hostnames but not "nip.io" which is the route suffix that's used.
`post fail Post https://keycloak-fabric8.192.168.64.82.nip.io/auth/realms/fabric8/protocol/openid-connect/token: x509: certificate is valid for *.192.168.64.82.xip.io, 192.168.64.82.xip.io, not keycloak-fabric8.192.168.64.82.nip.io?error`
I'm not really sure what's causing the issue yet but initially wondered if there's certificates being generated by minishift / oc cluster up that use the old xip default rather than nip after it was switched? https://github.com/minishift/minishift/commit/aafa268f4965dda559cb7c16bc6817b5bb93aae1
Does this sounds feasible? | 1.0 | certificate is valid for *.xip.io not certificate is valid for *.nip.io - minishift v1.1.0
I'm trying to log into the new fabric8 ui vi a keycloak openshift provider. We get a certificate error which mentions valid "xip.io" hostnames but not "nip.io" which is the route suffix that's used.
`post fail Post https://keycloak-fabric8.192.168.64.82.nip.io/auth/realms/fabric8/protocol/openid-connect/token: x509: certificate is valid for *.192.168.64.82.xip.io, 192.168.64.82.xip.io, not keycloak-fabric8.192.168.64.82.nip.io?error`
I'm not really sure what's causing the issue yet but initially wondered if there's certificates being generated by minishift / oc cluster up that use the old xip default rather than nip after it was switched? https://github.com/minishift/minishift/commit/aafa268f4965dda559cb7c16bc6817b5bb93aae1
Does this sounds feasible? | priority | certificate is valid for xip io not certificate is valid for nip io minishift i m trying to log into the new ui vi a keycloak openshift provider we get a certificate error which mentions valid xip io hostnames but not nip io which is the route suffix that s used post fail post certificate is valid for xip io xip io not keycloak nip io error i m not really sure what s causing the issue yet but initially wondered if there s certificates being generated by minishift oc cluster up that use the old xip default rather than nip after it was switched does this sounds feasible | 1 |
245,236 | 18,775,075,309 | IssuesEvent | 2021-11-07 14:27:26 | NOAA-EMC/NCEPLIBS-g2c | https://api.github.com/repos/NOAA-EMC/NCEPLIBS-g2c | closed | update gh-pages branch with latest documentation fixes... | documentation | We have a lot of documentation improvements. We can put them out there... | 1.0 | update gh-pages branch with latest documentation fixes... - We have a lot of documentation improvements. We can put them out there... | non_priority | update gh pages branch with latest documentation fixes we have a lot of documentation improvements we can put them out there | 0 |
225,409 | 24,829,454,202 | IssuesEvent | 2022-10-26 01:06:57 | RG4421/spark-tpcds-benchmark | https://api.github.com/repos/RG4421/spark-tpcds-benchmark | reopened | CVE-2022-40153 (High) detected in woodstox-core-5.0.3.jar | security vulnerability | ## CVE-2022-40153 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>woodstox-core-5.0.3.jar</b></p></summary>
<p>Woodstox is a high-performance XML processor that
implements Stax (JSR-173), SAX2 and Stax2 APIs</p>
<p>Library home page: <a href="https://github.com/FasterXML/woodstox">https://github.com/FasterXML/woodstox</a></p>
<p>Path to dependency file: /spark-tpcds-benchmark-runner/build.gradle</p>
<p>Path to vulnerable library: /20210226193317_RPTMIF/downloadResource_EEVKWP/20210226193503/woodstox-core-5.0.3.jar,/tmp/ws-ua_20210226193317_RPTMIF/downloadResource_EEVKWP/20210226193503/woodstox-core-5.0.3.jar</p>
<p>
Dependency Hierarchy:
- :x: **woodstox-core-5.0.3.jar** (Vulnerable Library)
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
<p>Publish Date: 2022-09-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-40153>CVE-2022-40153</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-09-16</p>
<p>Fix Resolution: woodstox-core-5.4.0,woodstox-core-6.4.0</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue | True | CVE-2022-40153 (High) detected in woodstox-core-5.0.3.jar - ## CVE-2022-40153 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>woodstox-core-5.0.3.jar</b></p></summary>
<p>Woodstox is a high-performance XML processor that
implements Stax (JSR-173), SAX2 and Stax2 APIs</p>
<p>Library home page: <a href="https://github.com/FasterXML/woodstox">https://github.com/FasterXML/woodstox</a></p>
<p>Path to dependency file: /spark-tpcds-benchmark-runner/build.gradle</p>
<p>Path to vulnerable library: /20210226193317_RPTMIF/downloadResource_EEVKWP/20210226193503/woodstox-core-5.0.3.jar,/tmp/ws-ua_20210226193317_RPTMIF/downloadResource_EEVKWP/20210226193503/woodstox-core-5.0.3.jar</p>
<p>
Dependency Hierarchy:
- :x: **woodstox-core-5.0.3.jar** (Vulnerable Library)
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
<p>Publish Date: 2022-09-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-40153>CVE-2022-40153</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-09-16</p>
<p>Fix Resolution: woodstox-core-5.4.0,woodstox-core-6.4.0</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue | non_priority | cve high detected in woodstox core jar cve high severity vulnerability vulnerable library woodstox core jar woodstox is a high performance xml processor that implements stax jsr and apis library home page a href path to dependency file spark tpcds benchmark runner build gradle path to vulnerable library rptmif downloadresource eevkwp woodstox core jar tmp ws ua rptmif downloadresource eevkwp woodstox core jar dependency hierarchy x woodstox core jar vulnerable library found in base branch develop vulnerability details those using xstream to seralize xml data may be vulnerable to denial of service attacks dos if the parser is running on user supplied input an attacker may supply content that causes the parser to crash by stackoverflow this effect may support a denial of service attack publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution woodstox core woodstox core rescue worker helmet automatic remediation is available for this issue | 0 |
337,455 | 10,218,240,447 | IssuesEvent | 2019-08-15 15:28:23 | cBioPortal/cbioportal | https://api.github.com/repos/cBioPortal/cbioportal | closed | SV: Save and reuse UI state for logged in users | frontend priority study page | - [x] Save study view state (chart order, visible charts and chart type for this round) for log'ed users
- [x] Use the latest study view state (for particular user and study list) in visualizing page
- [x] Save custom chart | 1.0 | SV: Save and reuse UI state for logged in users - - [x] Save study view state (chart order, visible charts and chart type for this round) for log'ed users
- [x] Use the latest study view state (for particular user and study list) in visualizing page
- [x] Save custom chart | priority | sv save and reuse ui state for logged in users save study view state chart order visible charts and chart type for this round for log ed users use the latest study view state for particular user and study list in visualizing page save custom chart | 1 |
580,755 | 17,265,898,738 | IssuesEvent | 2021-07-22 13:46:29 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | venmo.com - site is not usable | browser-firefox-ios device-tablet os-ios priority-normal | <!-- @browser: Firefox -->
<!-- @ua_header: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.1 Safari/605.1.15 -->
<!-- @reported_with: mobile-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/80930 -->
<!-- @extra_labels: browser-firefox-ios -->
**URL**: https://venmo.com/account/settings/profile
**Browser / Version**: Firefox
**Operating System**: Mac OS X 10.15.4
**Tested Another Browser**: No
**Problem type**: Site is not usable
**Description**: Page not loading correctly
**Steps to Reproduce**:
Venmo won’t close my account says loading forever.
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_ | 1.0 | venmo.com - site is not usable - <!-- @browser: Firefox -->
<!-- @ua_header: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.1 Safari/605.1.15 -->
<!-- @reported_with: mobile-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/80930 -->
<!-- @extra_labels: browser-firefox-ios -->
**URL**: https://venmo.com/account/settings/profile
**Browser / Version**: Firefox
**Operating System**: Mac OS X 10.15.4
**Tested Another Browser**: No
**Problem type**: Site is not usable
**Description**: Page not loading correctly
**Steps to Reproduce**:
Venmo won’t close my account says loading forever.
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_ | priority | venmo com site is not usable url browser version firefox operating system mac os x tested another browser no problem type site is not usable description page not loading correctly steps to reproduce venmo won’t close my account says loading forever browser configuration none from with ❤️ | 1 |
495,791 | 14,288,090,774 | IssuesEvent | 2020-11-23 17:12:14 | AGROFIMS/hagrofims | https://api.github.com/repos/AGROFIMS/hagrofims | closed | Allow ''Other'' management practices | flexibility high priority management practices | - [ ] Add ''Other'' to the list of management practicies

- [ ] When '' Other'' is selected, blank boxes appear to allow users to create their own management practices. (it should work like ''other'' in Factor) - Only one value (one date, one number) per line.

- [ ] These new management practices are exported in the Excel tab Protocol
Management practices name --> Trait Name
Value--> Value
Unit--> TraitUnit
| 1.0 | Allow ''Other'' management practices - - [ ] Add ''Other'' to the list of management practicies

- [ ] When '' Other'' is selected, blank boxes appear to allow users to create their own management practices. (it should work like ''other'' in Factor) - Only one value (one date, one number) per line.

- [ ] These new management practices are exported in the Excel tab Protocol
Management practices name --> Trait Name
Value--> Value
Unit--> TraitUnit
| priority | allow other management practices add other to the list of management practicies when other is selected blank boxes appear to allow users to create their own management practices it should work like other in factor only one value one date one number per line these new management practices are exported in the excel tab protocol management practices name trait name value value unit traitunit | 1 |
100,700 | 8,752,749,398 | IssuesEvent | 2018-12-14 04:59:37 | humera987/FXLabs-Test-Automation | https://api.github.com/repos/humera987/FXLabs-Test-Automation | closed | Testing 14 : ApiV1JobsProjectIdIdGetPathParamIdMongodbNoSqlInjectionTimebound | Testing 14 | Project : Testing 14
Job : UAT
Env : UAT
Region : US_WEST
Result : fail
Status Code : 404
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=OTQxMjEyZTMtYjQyNy00NGE2LThmMzctMjFlNTRiZGRiM2Yw; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Fri, 14 Dec 2018 04:58:19 GMT]}
Endpoint : http://13.56.210.25/api/v1/api/v1/jobs/project-id/
Request :
Response :
{
"timestamp" : "2018-12-14T04:58:19.987+0000",
"status" : 404,
"error" : "Not Found",
"message" : "No message available",
"path" : "/api/v1/api/v1/jobs/project-id/"
}
Logs :
Assertion [@ResponseTime < 7000 OR @ResponseTime > 10000] resolved-to [654 < 7000 OR 654 > 10000] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]
--- FX Bot --- | 1.0 | Testing 14 : ApiV1JobsProjectIdIdGetPathParamIdMongodbNoSqlInjectionTimebound - Project : Testing 14
Job : UAT
Env : UAT
Region : US_WEST
Result : fail
Status Code : 404
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=OTQxMjEyZTMtYjQyNy00NGE2LThmMzctMjFlNTRiZGRiM2Yw; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Fri, 14 Dec 2018 04:58:19 GMT]}
Endpoint : http://13.56.210.25/api/v1/api/v1/jobs/project-id/
Request :
Response :
{
"timestamp" : "2018-12-14T04:58:19.987+0000",
"status" : 404,
"error" : "Not Found",
"message" : "No message available",
"path" : "/api/v1/api/v1/jobs/project-id/"
}
Logs :
Assertion [@ResponseTime < 7000 OR @ResponseTime > 10000] resolved-to [654 < 7000 OR 654 > 10000] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]
--- FX Bot --- | non_priority | testing project testing job uat env uat region us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options set cookie content type transfer encoding date endpoint request response timestamp status error not found message no message available path api api jobs project id logs assertion resolved to result assertion resolved to result fx bot | 0 |
289,602 | 24,999,134,010 | IssuesEvent | 2022-11-03 05:34:41 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | opened | roachtest: network/authentication/nodes=4 failed | C-test-failure O-robot O-roachtest branch-master release-blocker | roachtest.network/authentication/nodes=4 [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/7288517?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/7288517?buildTab=artifacts#/network/authentication/nodes=4) on master @ [9c9d55d707ad9a768027e9b7a3775c7c7cde8de7](https://github.com/cockroachdb/cockroach/commits/9c9d55d707ad9a768027e9b7a3775c7c7cde8de7):
```
test artifacts and logs in: /artifacts/network/authentication/nodes=4/run_1
(test_impl.go:291).Fatal: monitor failure: monitor task failed: Non-zero exit code: 1
```
<p>Parameters: <code>ROACHTEST_cloud=gce</code>
, <code>ROACHTEST_cpu=4</code>
, <code>ROACHTEST_encrypted=false</code>
, <code>ROACHTEST_ssd=0</code>
</p>
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
/cc @cockroachdb/kv-triage
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*network/authentication/nodes=4.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
| 2.0 | roachtest: network/authentication/nodes=4 failed - roachtest.network/authentication/nodes=4 [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/7288517?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/7288517?buildTab=artifacts#/network/authentication/nodes=4) on master @ [9c9d55d707ad9a768027e9b7a3775c7c7cde8de7](https://github.com/cockroachdb/cockroach/commits/9c9d55d707ad9a768027e9b7a3775c7c7cde8de7):
```
test artifacts and logs in: /artifacts/network/authentication/nodes=4/run_1
(test_impl.go:291).Fatal: monitor failure: monitor task failed: Non-zero exit code: 1
```
<p>Parameters: <code>ROACHTEST_cloud=gce</code>
, <code>ROACHTEST_cpu=4</code>
, <code>ROACHTEST_encrypted=false</code>
, <code>ROACHTEST_ssd=0</code>
</p>
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
/cc @cockroachdb/kv-triage
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*network/authentication/nodes=4.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
| non_priority | roachtest network authentication nodes failed roachtest network authentication nodes with on master test artifacts and logs in artifacts network authentication nodes run test impl go fatal monitor failure monitor task failed non zero exit code parameters roachtest cloud gce roachtest cpu roachtest encrypted false roachtest ssd help see see cc cockroachdb kv triage | 0 |
249,857 | 7,964,768,914 | IssuesEvent | 2018-07-13 23:22:04 | raxod502/radian | https://api.github.com/repos/raxod502/radian | closed | Turn off Paredit and Aggressive Indentation on merge conflicts | aggressive-indent conflict emacs enhancement git lisp low priority paredit smerge-mode | To productively resolve merge conflicts in Lisps, one simply must turn off both Paredit and Aggressive Indentation. It would be nice if this were done automatically. (It would be even better if they were turned back on after you were finished.) Regardless of whether Magit is added as per #4, it would be nice to have this behavior when using git from the command line.
| 1.0 | Turn off Paredit and Aggressive Indentation on merge conflicts - To productively resolve merge conflicts in Lisps, one simply must turn off both Paredit and Aggressive Indentation. It would be nice if this were done automatically. (It would be even better if they were turned back on after you were finished.) Regardless of whether Magit is added as per #4, it would be nice to have this behavior when using git from the command line.
| priority | turn off paredit and aggressive indentation on merge conflicts to productively resolve merge conflicts in lisps one simply must turn off both paredit and aggressive indentation it would be nice if this were done automatically it would be even better if they were turned back on after you were finished regardless of whether magit is added as per it would be nice to have this behavior when using git from the command line | 1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.